Professional Documents
Culture Documents
Advances in Fuzzy Sets Possibility
Advances in Fuzzy Sets Possibility
POSSIBILITY THEORY,
AND APPLICATIONS
ADVANCES IN FUZZY SETS,
POSSIBILITY THEORY,
AND APPLICATIONS
Edited by
Paul P. Wang
Duke University
Durham, North Carolina
K. S. Fu
President, North American Fuzzy
Information Processing Society
Lafayette, Indiana
December 1982
vii
ACKNOWLEDGEMENTS
ix
x ACKNOWLEDGMENTS
Paul P. Wang
April 1983 in Durham, N.C.
CONTENTS
xi
xii CONTENTS
remain to this day one of the major objections to the use of the
new concept among its uninformed detractors. l
lIt is only fair to add that this state of confusion has not been
helped by some authors which have embraced the use of fuzzy
theoretical concepts without in many cases fully understanding
the real nature of the conceptual differences between random
functions and fuzzy sets.
4 P. P. WANG ET AL.
In the next chapter Huang and Tong show some invariant prop-
erties of fuzzy events under five operators, proceeding then to the
development of fuzzy probability and possibility spaces. Also
presented in Chapter VI are some sufficient and necessary conditions
for fuzzy independence and noninteraction between fuzzy events.
concept of a fuzzy tree and its properties are explained via graph
theory. The fuzzy string grammar, defined by Lee and Zadeh, is
then extended to the fuzzy tree grammar. Fuzzy tree grammar is
also a generalization of the ordinary tree grammar as proposed by
Brainerd. The fuzzy forest grammar, on the other hand, is the
result of a further extension of the above development. Chu
concludes that there are two interesting connections between a
fuzzy forest and a binary tree: a fuzzy forest language and an n-
fold fuzzy language proposed by Mizumoto.
We would like to thank all the authors for their fine contri-
butions to this volume and, once again, express our pleasure to be
able to contribute our skills to the compilation and editing of a
collection of this importance.
Arnold Kaufmann
2, allee du Chene
Corenc - Montfleury
38700 - La Tronche, France
13
14 A. KAUFMANN
When the central figure and also founder of fuzzy sets Lotfi
A. Zadeh introduced possibility theory a decade ago, the new theory
began to mature. The role possibility theory plays for fuzzy sets
is analogous to the sam~ role that mathematical expectancy plays
in probability theory. This type of valuation gives the best
agreement with information available subjectively. Of course,
presently we may find in the research group of Professor Zadeh in
Berkeley the best papers on the subject. Discussions between
probabilists and possibilists are by no means ended. My personal
opinion is that such conversations are unnecessary. Each concept
is useful in its own domain, and blending is normal in several
situations. We can probabilize the fuzzy sets as well as fuzzify
the events. To avoid some confusion I propose to use the word
"sensation" when possibility is considered and the word "event"
when probability is used. Of course a sensation is something
weaker than an event. I hope in the interest of developing the
fuzzy set theory that a general study of the terminology used will
be reconsidered.
During the decade between 1970 and 1980, a lot of papers have
been published on fuzzy automatons. It is now more rare. Probably
researchers reported their own interest in a system theory which is
more general. But reading some works in automaton theory I
discovered that several authors implicitly used fuzzy concepts,
without using the word, which is suspicious for some.
In the 1980 period more than 600 authors are concerned with
fuzzy set theory and applications. I estimate that, allover the
world, more than 10,000 scientists know, study, develop, extend,
apply, teach, and are devotees of fuzzy sets. Zadeh can be very
proud of initiating a new and active area of research and applica-
tions, fuzzy sets.
Structural Concepts.
China II, France III, Norway I, U.K. I, U.S.A. 1111111, Spain II,
West Germany I.
Membership Functions.
France II, Japan III, U.K. 11111111, U.S.A. lIllI, West Germany I.
Matrices.
General Properties.
Uncertainty - Imprecision.
Fuzzy Topology.
Possibility Theory.
China 11/, D.D.R. I, Finland II, France /1/1/, Japan III, Norway /,
U.S.A. //1//, West Germany II.
Fuzzy Numbers.
Topois.
Categories Theory.
France /, U.S.A. /.
Convexity.
Belgium II.
ADVANCES IN FUZZY SETS-AN OVERVIEW 25
Cardinality.
Statistics.
China II/I, France /, Japan /, Spain II, U.S.A. II/I, West Germany /.
Management Science.
Identification.
D.D.R. /, France III, Poland II, U.K. II, U.S.A. II, U.S.R.R. /,
West Germany II.
Clustering.
Optimization Theory.
Utility Theory.
France II II II I.
Medicine.
France I.
Geophysics - Geolosy.
Kcenomoc - Socio-economoc·
U.S.A. I I.
28 A.KAUFMANN
Production Process.
France I, Japan I.
Military Applications.
U.S.A. II.
Ecology - Pollution - Environment.
Nederland I, U.S.A. I.
Literature.
China I, Japan I.
Reliability.
Linear Equations.
China /, France I.
Didactics.
Belgium I.
Human Brain.
U.S.R.R. I.
Coding.
U.S.A. I.
Physiology.
China I, U.S.A. I.
Agronomy - Agriculture.
Hydrology.
Queuing Theory.
France /.
Transportation.
Poland I.
Banking.
U.K. I, U.S.A. I I.
30 A.KAUFMANN
Forecasting.
Institute of Mathematics
Sichuan University
Chengdu, Sichuan, China
31
32 B.-M. PU AND Y.-M. LlU
REFERENCES
Liu Ying-Ming
Department of Mathematics
Sichuan University
Chengdu, Sichuan, China
1. INTRODUCTION
37
38 Y.-M. LlU
2. PRELIMINARIES
={ E ai = 1, x
1
p
E
1
aix i }
then
The fuzzy set A on Y is said to be fuzzy compact iff for all family
6 ~ ] satisfying sup 6 ~ A and for all E > o. there exists a
finite subfamily 6 such that sup 60 > A-E.
o -
Lemma 2. If A is fuzzy compact set on E (E equipped with induced
fuzzy topology). then for each a > o. A-l[a.l] is compact.
Remark. Under the assumption of the above Lemma. the set A-l(a.l]
is not compact in general.
Furthermore, we designate
x e: A(a,j),
otherwise,
x e: la'
otherwise,
v(y) I YEB
= c otherwise,
s = {~ : ~ES}.
We say that B
is an open Q-cover of A'+En in the subspace supp A.
In f~ct, we may take any x E SUpp~A. If (A'+En)(X) = 1, then by
sup S (x) ~ A(X) > 0 we have sup S (x) + (A'+En)(X) > 1; If _
(A'+En)(X)~< 1, then (A'+En)(X) = ! - A(X) + En' Since sup 6 ~ A,
hence_sup Sex) + (A'+En)(X) = sup sex) - A(X) + 1 + En ~ 1 + En > 1.
Thus S indeed is an open Q-cover of A' + En' By the Q-compactness
of A' + En there exis!s a finite subfamily So of S such that for
each x E supp A, sup SO(X)+(A'+En)(X) > 1. Now, whe~ 1 - A(X) +
En ~ 1 we have (A'+En)(X) = 1 - A(X) + En' thus sup S~(x) > A(X)-E n ;
When 1 - A(X) + En > 1, we have A(X) < En,_hence sup ~o(x) ~ 0 >
A(X) - E. To sum up, we always have sup So(x) > A(X) - E for
each x EnSUPP A. Put 60 = {~E6:crESo}' Then 60 is a finit~ sub-
family of S and sup So ~ A - En > A-E. By Definition 6, A is a
fuzzy compact set in (Y,J).
Proof. We first point out that the fuzzy set! defined by the
above-mentioned formula is a subspace. In fact, by definition of
r we have X(x) = XC-x). Now we need to prove the following
formula holds for any reals a1 and aZ and any points xl and xZ:
(*)
z2-w2=Y2}
i.e. the formula (*) still holds. Next, since X(o) is the
greatest X(x), hence
= ):'(Yl) 1\ r(Y2)
= ~(xl) 1\ ).'(x2 )·
Hence, we claim that r
is a fuzzy subspace. Next, it is quite
obvious that r < A. Finally, let v be a fuzzy subspace contained
in A, then v(x)- v(x)Av(-x) ~ X(x)AX(-x) = X(x). Hence, we
conclude
,..
v < X.
REFERENCES
Umberto Cerruti
Istituto di Geometria
Universita di Torino
10123 Torino, Italy
1. INTRODUCTION
49
50 U. CERRUTI
2. ADMISSIBLE EXTENSIONS
2.1 Definition
2.2 Remarks
2.3 Examples
2.4 Definition
2.5 Property
/\ V V
1 (x) .::. x8X\A o.
qE~(H) x8H A lA (x)
52 U.CERRUTI
2.6 Definition
2.7 Property
2.8 Remark
2.9 Lemma
~ : IX + I Y is a lattice morphism.
Proof - I)
-H\1/\ y)
By Lemma 2.9 it is sufficient to prove that ~(\1)AHv) < ~(]1J\v).
Let us take y s.t. qt</>(\1 )(\</>(Vy2. Then for ~xample qt</>S]1y) and
y 2. 1\ {a : qt<P(]1a)}. Th~n y 2. <H]1), q > 2. <</>(]1), q>A< </>(v), q>.
- -
I t is sufficient to prove that ~(]1Vv) < </>(]1)V </>(v).
2.11 Remarks
-
2.11.1. It is easy to see that </> does not preserve pseudo-
complements.
3.1 Definition
3.2 Remark
3.3 Theorem
II) Let us suppose now that (X,~) is not compact. Then there
exists an open cover {Ai}' J of X which has no finite subcover.
Then the family {Bi}' J wfi~re B1• = X\A. has the FIP and there
1E 1
exists yE ('I HBi) . Taken any XEX, xEAk for some kEJ and AkEF[x].
1
But YE~(Bk) = Y\~(Ak)' Then yi~(Ak) and (x,y)iN.
3.4 Remark
3.5 Definition
3.6 Remark
From the fact that ~e:~a.(p) and from Remark 2.11.2 we have
\f a. 'V p V q, N(a.,p,q) 2. a..
3.7 Definitions
Given a.e:IO' qe:Y, pe:X we say that ~ is a.-near to E if N(a.,p,q)
has its maximum possible value in (p,q), i.e. if N(a.,p,q) = a.. We
say that qe:Y is a.-near to the set! i f p¥x N(a.,p,q) = a.. We say
that qe:Y is near .!2.. pe:X if \If a.e:IO N(a.,p,q) = a.. We say that qe:Y is
~ to the set! i f 'f/ a.e:IO p¥x N(a.,p,q) = a..
3.8 Theorem
So v(p) > 0, pe:v o = {xe:X: v(x) > o}e:F[p] and qe:~(VO). Now q is in
56 U. CERRUTI
$(H); so there exists r in Hf\v a• Since rEH, v(r) < a and since
rEV a, v(r) > a, and this is a contradiction.
3.9 Theorem
II) Let (X,~) be compact. Let us suppose that there exists qEY
not near to X. So there exists a > 0 s.t. Vx N(a,p,q) < a.
Then we can find E pE
Then
QE<j>(]1:k). So QE~(]1Xk)n~(HXk)
E
(see (*» and there exists
rE]1 xk n HXk. But this is a contradiction because rE]1xk implies
E E
]1xk(r) > E while rEH xk implies (see (*» ]1xk(r) < E.
REFERENCES
1. INTRODUCTION
(1)
a=l
adO,l)
{wI1-~B(w)E[O,a]}
{wl~B(w)E[l-a,l]}EL
{wl~ u B (w)E[O,a]}
i=l i
{W
00
sUP{~B
i i
(W)}E[O,a]}
n {wl~B.(w)E[O,a]}EL
i=l 1
00
namely V B.ES.
1
Q.E.D.
i=l
COROLLARY 1.
00
1. B is a fuzzy event on n.
2. ~B is a L-m.
3. VaE[O,l], BaEL, where Ba is the strong a-cut of B, i. e. ,
Ba = {wl~B(w).::.a}.
4. 'I1aE[O, 1], Baw EL , where Baw is the weak a-cut of B, i. e. ,
Baw = {wl~B(w»a}.
5. 'VCE (-00,00), {WI~B(W»c}EL
6. 'r/ c (_00 , (0) , {w ~B(w)<c}EL
Now that
and
{wl~A(w)-~B(w»c} = U {wl~A(w»Yi}(){wl~B(w)<Yi-c}'
i=l
Since E is a a-algebra, ~A(W)-~B(w) is a E-m.
p( U Bn) = .E P(B n )·
n=l n=l
L: flB (w)
n=l n
Then
00
E[ L flB ]
n=l n
00
Q.E.D.
7T(Af\B) = 7T(A)A7T(B).
PROPOSITION 8.
independent.
If l1A (w) = const. then \fBES. A and Bare P-
Q wI w2
P x I-x
7T 7TI 7T2
A al a2
B bl b2
Since
PROOF. We have
Q
wI w2 w3
P x y l-x-y
'IT 'IT 1 'IT 2 'IT 3
A al a2 a3
B bl bZ b3
'IT (A) 1\ 7f (B) = [('IT I" a l ) V ('IT2I\a 2 ) V (7f 3" a 3)] 1\ [(7f 1 A b l )
= ~(x,y).
.., N ....
P(A)P(B)-P(A'B) Q.E.D.
PROPOSITION 16. If al = a3' then A and B are independent to
each other under any probability distribution.
Q.E.D.
PROPOSITION 18. Assume that a l > a2 = a3' Then if and only
i f b 2 /\ b 3 < b l < b 2 V b 3 , A and B can be independent to each other
under some undegenerative probability distribution P. And in this
case, the probability distribution P(x,y,l-x-y) satisfies the fol-
lowing linear equation
L Sgn(b.-b.) = 1,
1.s.i<j.s.3 1 ]
Q.E.D.
Fig. 1
70 Z. HUANG AN.D T. ZHENGXIANG
REFERENCES
Cao Zhi-Qiang
Institute of Automation
Academia Sinica
Beijing, China
I. INTRODUCTION
In the last ten years many operations of fuzzy sets were intro-
duced for various applications, some algebraic properties of the
fuzzy sets with these operations and some related theories of
fuzzy matrices with these operations were discussed by a series of
papers. In fact, these operations have some common properties.
Hence, it will be helpful to abstract their common properties in
algebraic language for the further investigation of the properties
of these operations. This is just the main reason we introduce the
new algebraic system.
- 71
72 c. ZHI-QIANG
II. SLOPE
(3) a·(b+c)=a.b+a·c
(4) a+a'b=a
Example 2.2 Mp=( [0, 1], V, .), with the ordinary multiplication of
real numbers ".", is a slope.
Proposition 2.2 A slope with the identities 0 and 1 has the follow-
ing properties:
Definition 2.2 A slope is an integral slope iff for any a, bEP the
following conditions are held:
Examples 2.6 The slopes Mm, Mp, Mc and My all are integral slopes.
a(x+y)=ax+ay
a(bx)=(a'b)x
(a+b)x=ax+bx
lx=x
ox=e
74 C. ZHI-QIANG
(1) ax+x=x
(2) ae=9
I a .. f.
~J J
i=1,2, •.. ,m. (3.1)
j
SYSTEM GENERALIZING FUZZY SUBSETS OF A SET 75
e.
1
L a .. b .. =1
j 1J J1
(kit).
(kli),
a .. b .. =1.
1J J1
a .. =b .. =1.
1J J1
Thus
bjk=O (k;'i).
due to K. H. Kim and F. W. Routh [3] is very useful for the discus-
sion of a finitely generated module.
S,
1
I a, ,s,
1J J
j
SCi) = {a .. : s, =
11 1
I, la J.. s,}
J
J
has at least a minimal element, then there exists at least a
standard basis of M.
sl el + I aljs j
j
x = I d,s,
1 1
= dlel+(dla12+d2)s2+···+(dlaln+dn)sn '
i
free module over the slope Mm. In fact, the result of [4] is
applicable to any totally ordered set yet.
e.1 L y.
j J
Yj L a·kek
k J
we have
e.
1 = L <I: a·k)ek •
k j J
e.
1 <I a .. )e.
J1 1
j
a
ni L a J1
..
j
e. = '\ y. > Y .
1 ~ J - n
J
Theorem 4.1 Let pX be the set of all of the slope fuzzy subsets of
X, (f+g)(x)=f(x)+g(x) and (fg)(x)=f(x)g(x) for all f,gEPX. Then
pX is a slope.
Proposition 5.1 For any n)(m matrices A=(aij)' B=(bij} and aEP we
have
(1) A+B=(ai/b ij }
(2) AB=(L ai,b'k}
j J J
(3) aA=(a'aij }·
SYSTEM GENERALIZING FUZZY SUBSETS OF A SET 79
oxx •.
oox •.. x 'X]
[ 000 ••• x
... .
000 ••• x
Ay = I
i l l
b.Ae. I 0
when
y I
ill
b.e, f 0,
Now we have shown that the matrix TAT' has the following form:
TAT'= [
OBI J•
o Al
Since A~=O, repeating the above proof we prove the theorem.
VI. ACKNOWLEDGMENT S
VII. REFERENCES
Wang Pei-zhuang
Department of Mathematics
Beijing Normal University
Beijing, China
INTRODUCTION
1. An universe of discourse U;
2. A fixed element u E U;
3. The trials on ~ , &hich yields a movable set A*. The set
is variable in different trials but must be fixed once a trial is
completed.
1. A fundamental space ~;
2. A fixed event A ;
3. A point WE~ be~ng constrained by the condition S where
w is the variable in different trials but it must be fixed once a
trial is performed.
The main difference between the fuzzy statistics and the pro-
bability statistics is: In fuzzy statistical experiments the
element u is fixed and the subset A* is variable, but in proba-
bility stgtistical experiments the subset (event) A is fixed and
the element w is the variable. 0
(Graph 1)
Preliminary Knowledge
satisfying that
D. e: B (i E I) ; (2.3)
1
U D = u· (2.4)
iEI i '
D.nD. = cP (i~ j). (2.5)
1 J
v= V(U,B).
1
2 We further define that dl -< d 2 iff for any Di E d l ' there is
Dj E d 2 such that
D~ C D: . (2.6)
1 J
Hence, (V,~) is a poset.
del) = {D l ,D 2 },
~(Dl) = ~(D2) = 1/2;
(2)
d = {Dll,D12,D2l,D22}'
DU UD 12 = Dl '
(2.10)
(2.14)
(2.17)
where
Co I
{{ u} u E U}, (2.18)
v
is the smallest a-algebra on B containning C
o
(2.19)
EEB< >EE
v
B. (2.20)
r: ~ -+ P(U). (2.21)
FUZZY STATISTICS TO FALLING RANDOM SUBSETS 85
(r *: P(U) -+ P (m
E~E ~ r-l(E) .6 {wlr(w) EE}) (2.23)
*r v .,
( U E
tET t
r= UE·
tET t'
( U E )
tET t
* U E*
tET t
(2.25)
( (I E ) = (IE- ( (I E ) (IE (2.26)
tET tV tETvt' tET t * tET t*
(2.27)
or equivalently, if
(2.29)
*
]1 : B -+ [0,1]
* ,~
(2.30)
)l (B) = )l(B ).
(]1*: B -+ [0,1]
(2.31)
]1*(B) ~ )l(B*»
(r t : SI -+ P(U» (2.32)
( U r )(w) ~ U r (w); (2.33)
tET t tET t
86 W. PEI-ZHUANG
Gr ~ {(w,u)lr(w)3u}. (2.36)
Clearly, we have the following identities;
UG (2.37)
tET r t
G n G (2.38)
( n r) tET r
tET t t
c
G = (Gr ) . (2.39)
rC
Let G C rl xU, the section and projection of it are designated as
follows:
(2.42)
where A x B is the product measurable space:
Ax B ~ I
[{A x B A E A, B E B}] • (2.43)
~ E F(U) is called B-measurable fuzzy subset on (u ,B) i f its
membership function ~A is B-measurable. All of them may be denoted
as F = F (U, B) • -
o 0
such that
A .,
(R.2) B is thin;
(R.3) B is c-closed;
s: ~ -+ B (3.3)
r -1 (B)
" -1"
={r (f)IEEB} = {{wlr(w) Ec,}1
"
E B} CA. (3.4)
PROOF. Set
B' {E lEE
"
B}
= (3.5)
Because B
is t-closed, we may establish the following identity by
invoking (2.20).
=> (n E) = nEE
n=l nv n=l vn
=> E EB'.
n=l n
n
So that B' is an a-algebra.
B'~ B (3.7)
88 w. PEI-ZHUANG
"-
If s is A-B measurable, then from (3.7) we have that
so that
(3.9)
s~G (4.1)
s
here, G is the graph of s defined in (2.36).
s
THEOREM 4.1. The mapping 1> is a bijection between S and A x B.
G E A xB. (4.2)
s
Consider arbitrary division dE O(U ,B) :
d = {D.} (i
1
E I) (D.
1
E B) (4.3)
Set
u *
(D. xD.), (4.4)
iEI 1 1
FUZZY ST ATISTICS TO FALLING RANDOM SUBSETS 89
where
*
D. = s -1"
(D.).
1 1
*1
D. XD.E A xB ,
1
(4.5)
therefore
GdEAxB (4.6)
s
From (2.6) and (2.27), i t is clear that i f d l ~d2' then
d d
G Ie G 2 (4.7)
s s
We also have that
G = n Gd (4.8)
s dEV s
In fact, on the one hand, we have the inclusion identity as
shown in the following.
G
s
e Gd
s
(d E V), (4.9)
so that
G e n Gd (4,10)
s dEV s '
But on the other hand, suppose that (w ,u ) ¢G , we may take
o 0 s
d
o
= {{u }, {u }c} E
0 0
V, (4.11)
d
..I.
(w ,u )q.({u} * x{u}) c * x{u})
u «{u}) c G 0 (4.12)
o 0 0 0 0 0 s '
therefore we have
(w ,u ) ¢ n Gd (4.13)
o 0 dEV S
so that
G => n Gd (4.14)
s dEV s
from (4.10) and (4.14) we have proved (4.8).
s:st+B
B ~ (st x B)
G
nG E A x B. (4.18)
(4.19)
But
B* . (4.20)
s
So that s is A - B strong measurable. From theorem 3.1, we have
that s E S(R). This implies that the mapping tP is a surjection.
(4.21)
End. (4.22)
S ;;;; A xB (4.23)
G
s
I ·U
= s-l({ti}) = {u}* .
s
(4.25)
This permits us to call a downfallen of s the downfallen of G •
s
The Correspondence Between S and ~.
A
v: S -+- F(U)
(downfallen of s) (5.1)
s = S/_ (5.5)
Because that
(5.6)
For any
-
ss ES, define that
(n -+ (0). (5.10)
Note that A has a fixed normal net V* defined in (Z.10), for any
fixed n":'1, define mapping on the set of n-array:
Obviously,
k=l, ..• , n} and
(5.13)
Denote that
k n
U D . (k=l, ... ,Z ), (5.14)
i=l ~(~)
clearly, B~n)sA, and
Define that
Gn =
k=l
6n
(B(n)x X[]J > k/Zn]).
k A _
(5.16)
n
Obviously, G s A x B, and
(5.17)
By setting
G
* = lim noon
G= U G. (5.19)
n+oo n=l
It is clear that G* sA x B, and
FUZZY STATISTICS TO FALLING RANDOM SUBSETS 93
(5.21)
DEFINITION 5.1. The falling random subset s* (resp. its graph G*)
defined in (5.21) (resp. (5.19)) is called the represent of ss
(resp. G = {G Is ESS}), or the represent falling random subset
(resp. graph)sof A. The collection of represent random subsets in
S is denoted by S, hence we have o
G
o
= {G s Is E S 0 }. (5.23)
Case 1. Represent in So
THEOREM 6.1. Denoting the downfallen of s by ~s' then for any
sl' s2 ES o ' we have that slU s2' sln s2 ES o ' where
(i=1,2) (6.4)
(6.7)
so that
G = G UG (6.9)
s sl s2
However, G U G G so that
sl s2 (sl U s2)'
sl Us 2=s (6.10)
+ J.1 (G
s2
I ·U ) -< 1 <=> (6.11)
+ J.1 (G I )
s2 . u
> 1 <=> (6.12)
PROOF.
REFERENCES
1. Choquet, G., Theorem of capacities, Ann. Inst. Four., U.
Grenoble, V. 131-296, 1954.
2. Goodman, I. R., Identification of fuzzy sets with a class of
canonically induced random sets and some applications,
Proc. 19th I.E.E.E. confer. on Des is ion and Control (Albu-
querque, NM) and (Longer version) Naval research laboratory
report 8415, 1980.
3. Goodman, I. R., Fuzzy sets as equivalence class of random
96 W. PEI-ZHUANG
CNRS I
University of Paris VI
Tour 45, 4 Place JUSSIEU
75230 PARIS CEDEX 05
France
ENST 2
46 rue Barrault
75634 PARIS CEDEX 13
France
I. INTRODUCTION
R is:
- definite: for x, y in E, R(x,y) = 1 if and only if x = y.
- symmetric: R(x,y) = R(y,x) Vx, Vy.
- *-transitive: R(x,y) > v (R(x,z) * R(y,z)) with * being an
- zeE
operation from [0,1] x [0,1] to [0,1]. (v denotes the supremum).
Proposition 2. UM ~ P ~ T.
The proof follows from a/\ b > ab > (a+b-l)VO for all a,b in
[0,1].
Definition 2. A distance d is said r-homogenous if
B (r)
x
n By (r) o or B (r) = B (r)
x y
't/ x, y •
r = 1 - 1\ R(v,w)
{(v,w), R(v,w) + O}
For all x, B (r) = {zIR(x,z) ~ l-r} = {zIR(x,z) > oJ. Let x and
y be in E an~ z belong to Bx(r) (l By(r). For all t in Bx(r) ,
R(t,z) > R(t,x) • R(x,z) > 0 and R{t,y) > R(z,y) • R(t,z) > 0; so
t is in-By(r) and Bx(r) = By(r). -
III. PARTITIONS OF E
..L
P~= {P.}
~
is_ anI hard partition of E if PiC: E, UP
I- i
= E and
i T j Pi~ P j- ~.
111.2. Quasi-partitions
Then for r = d(xp"x q ), there exist two r-cliques C(r) and C'(r)
with xl£C(r), x2tC(r), xltC'(r), x2cC'(r) and
C(r)(\C'(r)..::J{x3, ... ,xk+2}. Hence IC(r)nc'(r)\ ~k and d is not
weakly k - liM. Let us consider the following generalization of
partitions:
ifx;'P.1
and
m
L ll. (x) = I X E E
i=l 1
. .., 1} .
Ci(I) 1 \f p E I
Ci(I) 0 VP t I
cP (I)
N
=
• I
L (1)
lE
and
(2)
p(k-l) N
CP(I ) = I (s) c(k-l, S, p(k-l)). (3)
N 0 S=l
1
Example. 10 {O, 2' l}, k 3.
1 1 1 1 0 0
2 1 2 3 2 1
I6
~
3 1 3 7
4 1 4 10 16
5 1 5 15 30 45
ON FUZZY RELATIONS AND PARTITIONS 103
For N = 4, p = 2
2
C4 (I O) 19
C2 (I ) + C3 / 2 (I ) + Cl3 (IO)
3 0 3 0
6 + 7 + 6
4
I (~) (2, S, 4).
S=l
and
N-s
D~ ,s (I) I (N-s) cp (1*) (5)
r s
r=o
with 1* = I - {OL
m
Sm = I (-1) i (~) (k-2+m-i
k-l )
N
(7)
N 1
i=O
1
Example. I
0
= {O,
2
, l} , k 3.
Values of Sm N"Z 1 2 3
N
1 1 1 0
2 1 7 12
3 1 25 l38
V. REFERENCES
Zhang Jinwen
For any classic Set X, let F(X) be the set of all fuzzy
107
108 Z.JINWEN
F(X) := {~
--
A ex}
of course, F(X) is a classic Set, but its elements are fuzzy Sets.
FO := S U {<j>}
Fa+I := Fa U F(Fa )
x ® := 1 - x.
Now we define::::} by
if x ~ y
otherwise ,
where < is the natural order of real numbers, and ~is called
strong-implication. Dr. E. Sanchez ca1igd ~ the a-operator. It
is a very important operator in Sanchez •
x ~ y := x ~ y ® y ~ x.
a ® b ® (b ~ c) 2. a ® c.
(a ~ b) =1 iff a = b.
Lemma 6. If a, b, C E [0, 1] and b 2. c, then
110 Z.JINWEN
a ~ b < a ~ c.
(c ~ a) ~ (b ~ a).
(a ~ b) ~ «a => b ~ ) ~ a ® ) < 1.
«a ~ b) ~ a) => b < 1.
x£y
if x and yare identical
x ~ y
otherwise.
if p(y) =0
KEY:- { :
llY(Z) ® z ;; x, otherwise.
zEdom(y)
FUZZY SET STRUCTURE WITH STRONG IMPLICATION 111
o if xe:s or ye:s
A (lJ.x(z) =:;> 0) i f y= ~,
ze:dom(x)
A (ll (z) =:::) 0) if x = ~,
ze:dom(y) y
x = y :=
A (Il y (z) ===> z~x) ®
ze:dom(y)
1) x;: x,
2) II (z) < ze:x, if p{x) > 1 and ze:dom(x).
x - ...
3) x:; y = y ;: x.
4) x;:y Ii'
\:!:I
y =
"V
z < x = z.
- "'"
6) X! y @ z~x ~ z~y.
Proof: 1) is proved by induction on the well-founded
relation ze:dom(x). Assume that (Z!z) = 1 for all ze:dom(x). Then
if ze:dom(x), we have
ze:x
,.. = v llx(Y) @ z ::: y ~ llx(Z) ® z = ... (3.1)
YEdom(x)
3) holds by symmetry.
x y ® y! z x ,..= z.
~
-<
(1) We can ob tain that
x:; y ® x~z
= V llz(t) ® t =x ®
'"
x z y
te:dom(z)
= Yf z.
(2) If te:dom(y), then
x == t ® lly (t) @ Y ! z
< x! t ® lly(t) ® (lly(t) ~ t.;z)
x: y @ y z z @ llx(t)
~ x ;; y ® y ~ z @ t£x
- te:z.
<
'"
FUZZY SET STRUCTURE WITH STRONG IMPLICATION 113
So we have
«A -+ B) -+ A) -+ A
1 - 6, 8 - 12 as in K1eene 10 .
7. A -+ ., ., A;
13. x =x
14. (x = y) ~ ~(x) -+ ~(y), where ~(x), ~(y) are formulas
which do not contain negation'.
114 Z.JINWEN
15. A+B
2°. When le] < (AD, we divide it further into two cases.
First assume (B) ~«e D , in which case we can easily verify desired
result.
lb is proved.
3°. When [A] > [c] ~ [B] , we have ( [AVB] ::I> [c] ) =
([A] ==" [c]) = [c]. So we get our desired result.
4°. When bJ > [C] ~ [Al , [A VB+C] = [c.D and LB+C] = [C) ,
we can get the desired result. Also, we have the following two
propositions.
= " [C+A(x)]
x£F
= [V x (C+A (x) ) ]
= [C+A(x)]
= 1.
we need to prove
Either I
hold simultaneously, or II
(4.14)
FUZZY SET STRUCTURE WITH STRONG IMPLICATION 117
(4.15)
x Z y 2 [<Pl(x)] (4.16)
(4.19)
hold simultaneously, or IV
hold simultaneously.
We shall omit the proof of rules 15-19 since they are quite
obvious.
(4.24)
(4.25)
Let
dom(x) = S( ~ FO)
dom(y) = S( ~ FO)
lly(t) =1 if tEdom(y).
x=y=..l...
,.. 10
II
u
(x) = -1
10
, llu(Y) =~
10
Hence we have:
XEU
. = V llu (z) ® z .:e x
zEdom(u)
[Vxeu~(x) ]
= [ "x(xeu -+ ~(x»]
= A ([xeu]~[ Nx)D )
xeF
1\ ( V ].I (z) ® z;;:, x :::;. [<p(x)] )
x£F z£dom(u) u
/\ t\ (IJ (z) => (z ~ x ~[~(x)] )
z£dom(u) x£F u
A (].Iu(z),:::::> /\ (x ~ z => [~(x)] )
z£dom(u) x£F
t\ (].l (z)
u
=> [V x (z ~ x --1> (x)] )
z£dom(u)
[u = v] G' = [u = v] G (6.2)
[u = Y] G' = [u = y] G (6.4)
[YEU] G' = [YEU] G (6.5)
= [UEV] G.
= /\ (llu(Y) ~ [YEV] G) ® /\
YEdom(u) zEdom(v)
(llv(z)~ [ZEU] G)
FUZZY SET STRUCTURE WITH STRONG IMPLICATION 121
=[u=v]G.
[Hc,cl"" ,cn )] G.
corresponding element *
Definition 6. For any element x in M, we will define the
in F(G) as follows:
v
(1) When x = ¢ or XES, x:=x.
p(G). This set of elements is also called the standard set. Now
let us point out some basic properties on the standard sets.
[~ = y] G [~ EV]
y2E 2 (7.3)
v v
x Ey iff x Ey (7.4)
[UE~]G V [u=y]G.
yEX
G
Proof: [u E ~] = V llv (z) ® [u = z]
zEdom(~) x
v 10\[
V II )y) ~
v G
u == y]
yEx X
V [u y]G.
yEX
[u = t] 2 = 1 (7.6)
Since [u = 1]2 =
v [x = y]
yst
2) ~(c1,
.
.•• ,cn ) is true 1ff F(G)
t v
~(c1,
v )•
••• ,cn
~ ( c1,
. true iff F(G)
.•• ,cn ) 1S ~ ~
(vc , .•• ,c
v ).
1 n
Now, let us prove the desired result. Suppose ~(cO,c2, ••• ,cn)
is true, that is,
124 Z. JINWEN
F(G) 1= X1 V V v
E -gO A ~(cl.c2.···.cn) (7.8)
Lemma 15. The weak axiom of the urelement se;: is true in our
structure, namely
1\ [XES -+ , (x = ¢) 1\ 3 Z(ZEX)]
xEF
[x = ~]* ® [3z(z£x)t~ = 1,
Hence
dom(xl) = S
[Xl=</>]= A (l.tx(z):::>O)
zsdom(xl) 1
z~S (t ~O)
0,
V l.t x (t) ® [t z]
t£dom(xl) 1
V l.t x (t) ~ [t = z]
te: S 1
z]
126 Z.JINWEN
while ZES
v ~x (t) ® [t = z]
tES 1
But
V ~S (z)® [z = xl]
zEdom(S)
V ~S(z)® [z xl]
ZES
So
Hence
That is
= 1.
= [x = y] .
Hence we can obtain that
[V'Z(ZEX_ZEY) -+ x = Y] = 1.
dom(z) = {x, y}
Hence
[UEZ] v (].Iz(t)®[t=u])
tEdom(z)
Proof:
For any xEF, when x = $ or XES, if we put y = $, then
(4) holds. When p(x} > 1, we will define fuzzy set y as shown in
the following:
128 Z.JINWEN
11 (z)
y
= [3 tex(zet)] I i f zedom(y).
[~zeY3tex(zet)] = 1 (8.1)
1.
~ V I1x(t)® [zet]
tedom(x)
= [3 tex(zet)]
and that
So we have
> 1\
tedom(x)
= 1.
FUZZY SET STRUCTURE WITH STRONG IMPLICATION 129
Lemma 19. The power set axiom is true in our structure, namely,
dom(y) = {~}
(8i,3)
[zs.~-+Z=~] =1 (8i,4)
[ Z S ~ -+ ~EY ] =1 (8i,5)
[Z ~ ~] 2. [z ~ ~ 1\ ~ ~ z] 2. [z = ~].
Hence we have proved (8i,4). To prove (8i,5), we note that
[~EY] .:.. ~ (~) = 1, and we may say ( [z £ ~ 11 ~ [ ~EY]) = 1.
Consequently (8i,5) holds. Finally, we say (ai,3 holds, too. Due
to the fact that zEF is arbitrary, we get the proof of (8i,2).
A (ll (z)~ [z ~ ~] )
ze:{~} y
= (lly ( ~) ~ [ ~ ~ ~] )
1.
"[te:~-+te:~]=1.
te:r
(ii) For any xe:F - FO' we designate the fuzzy set y as follows:
dom(y) = F(dom(x»
= V ( [t f x] ® [t = z] )
te:dom(y)
[ze:y-+ (zS;x)] = 1
Therefore
[v z(ze:y -+ z ~ x) ] = 1 (8.4)
Secondly, we need to prove that
To this end, for any given fuzzy set ze:F, we designate the fuzzy
set z'e:r as follows:
dom(z') = dom(x)
FUZZY SET STRUCTURE WITH STRONG IMPLICATION 131
[z~x-+z=z,] 1 (8.6)
[z ~ x -+ ZEY] = 1.
= V ( [ue:z] ® [u = t] )
tEdom(z')
= [te:z] •
Therefore we have
~ V ( [u = t] ® [ue:z] )
ue:dom(x)
V ( [u = t] ® ]J ,( u) )
~~m(~ ~
te:z'
[ Z <;, x] = [ V t (t E Z -+ t E X)]
A ( [tEZ]~ [ tEX] )
tEF
< A ([tEZ].::>[tEX])
tEdom(z')
= [V tEZ' (tEX)]
[Z'E x]
J.l (z')
y
2. [z' EY] •
Hence (8.7) holds.
Lemma 21. For any formula ~(x,y) not including the negation
, we have
dom(t) and the range being a set of ordinals such that, for each
xe:dom(t):
(8.10)
1\ (~t(x):::> V [iP(x,y)]
xe:dom(t) ye:F
(8.11)
(8.12)
Proof: Taking any fuzzy set ueF - FO' from the axiom of
choice in M, we may establish that there exists an ordinal a and
a function g of a onto dom(u). By defining feF, we may write:
So,
~f(x) = 1, if xedom(f).
II. [ Fun(f)] = 1.
~ [y z].
In the course of deriving the steps as shown above, Eq. (7.5) has
been employed. When My , we have [B=Y] = O.
III. [dom(f) = a] = 1.
V V ( [e=x] ® h(8)=z] )
zeF S<Cl
V [B=x]
8<a
= [ xe:ii]
V [g(S)=z] 1.
ze:F
This proves III.
IV. [u c: ran(f)] = L
= V IT <x, y > E f ]
xEF
V ([g(8) = Y] ® V [ 8 = x] )
8<a xEF
V [g(8) = Y]
8<a
V [Z=Y]
zEdom(u)
> V ([Z=y]®llu(Z)
zsdom(u)
= [YEU] •
REFERENCES
1. Zhang Jinwen, The Normal Fuzzy Set Structures and the Boolean-
valued Models, J. of Huazhong Institute of Technology.
vol. VII, no. 2, 1979 (in Chinese with an English abstract);
English Edition, vol. 2, no. I, 1980.
2. Zhang Jinwen, Some Basic Properties of Normal Fuzzy Set
Structures, J. of Huazhong Institute of Technology, vol. VII,
no. 3, 1979 (in Chinese with an English abstract). There is
a separate edition (in English).
3. Zhang Jinwen, Fuzzy Set Structures and Normal Fuzzy Set
Structures, submitted for formal publication, to appear,
Symposium on Fuzzy Sets and Possibility Theory, December 12-
16, 1980 at Acapulco, Mexico.
4. Zhang Jinwen, A Unified Treatment of Fuzzy Set Theory and
Boolean-valued Set Theory - Fuzzy Set Structures and Normal
Fuzzy Set Structures, J. of Mathematical Analysis and
Applications, vol. 76, no. 1, July 1980.
5. Zhang Jinwen, A Kind of Nonstandard Models of the Axiomatic
Set Theory with Ure1ements - the Normal Fuzzy Set Structure,
Selected papers on Mathematics at 1979's Annual Meeting of
Beijing Society for Mathematics.
6. Zhang Jinwen, Normal Fuzzy Set Structures, Fuzzy Sets and
Systems, to appear.
7. Pan Xuehai and Zhang Jinwen, Fuzzy Set Theory, Applications of
the Computers and Applied Mathematics (in Chinese)
September 1976.
8. P. J. Cohen, "Set Theory and the Continuum Hypothesis," W. A.
Benjamin, Inc., New York, 1966, Amsterdam.
9. B. R. Gaines, Foundations of Fuzzy Reasoning, in: "Fuzzy
Automata and Decision Processes", M. M. Gupta and G. N.
Saridis, eds., pp. 19-76, North-Holland/Elsevier, Amsterdam,
1977.
10. S. C. Kleene, "Introduction to Metamathematics", Amsterdam and
Groningen, New York and Toronto, 1952.
11. A. Levy, Formula Hierarchy in Set Theory, 1974.
12. D. Scott, Boolean-valued Models for Set Theory. Mimeographed
notes for the 1967 American Math. Soc. Symposium on axiomatic
set theory.
13. J. R. Shoenfield, "Mathematical Logic", Addison-Wesley Publishing
Co., 1967.
14. M. Sugeno, Fuzzy Measures and Fuzzy Integrats: A Survey, Ibid,
[ 9 ), pp. 89-101-
15. A. Zadeh, Fuzzy Set Theory: A Perspective, Ibid, pp. 3-4.
16. E. Sanchez, Compositions of Fuzzy Relations, .!n: "Advances in
Fuzzy Set Theory and Applications", M. M. Gupta, R. K. Racade,
and R. R. Yager, eds., pp. 421-461, North-Holland, 1979.
INFERENCE REGIONS FOR FUZZY PROPOSITIONS*
I. B. TUrksen
INTRODUCTION
137
138 I. B. TURKSEN
k Pk (Name)
1 Complete Affirmation
2 Complete Negation
3 Disjunction
4 Conjunctive Negation
5 Incompatibility
6 Conjunction
7 Implication
8 Non-Implication
9 Inverse Implication
10 Non-Inverse Implication
11 Equivalence
12 Exclusion
13 Affirmation (1)
14 Negation (1)
15 Affirmation (2)
16 Negation (2)
P 3 - fuzzy disjunction: Sl OR S2
A x U2 U Ul x B, P6 as A x U2 (\ Ul x B, and
P 7 as Ax U2 U Ul x B,
FCNF(3)
FCNF(7), respectively, whereas for P6 and P10 ' they were expressed
as the fuzzy disjunctive normal forms, FDNF(6) and FDNF(10),
respectively.
Definitions:
where rio denotes the (i, j)th element of the fuzzy relation
(matrix)J R•
(R)ij ~ (R1 0 R)
2 ij
= V(r
k ik
(1) A r
kj
(2»
(R)ij ~ 1 - (R)ij
INFERENCE REGIONS FOR FUZZY PROPOSITIONS 141
For this paper, we set aside our concern that this normative
definition needs to be reassessed in the light of empirical
measurement results [23, 24J.
Lemmas:
(1) If R1 ~ R2 then R1 2 R2
For illustration the cases for k=3,6,7 and 10 are shown here, the
rest can be shown to hold in a similar manner.
P3: r(FDNF(3»ij = (].1i (1)" ].1j (2» V (].1i (1) 1\ (l-].1j (2»)
Since ].1 (1)" ].1 (2) < ]1 (1) ]1 (1) " (1-]1 (2» .=:. ]1i(l) , and
i j -i 'i j
(1-].1.(1» A ].1J.(2) < ].1.(2), V i,j, we have
1 - J
~ (1) < ~ (1) V (I-~. (2» and ~.(2) < (I-~ (1» v ~.(2) •
i -i J J - i J
We have r(FDNF(6»ij ~ r(FCNF(6»ij' V i,j.
V «I-~i(1»" (I-~/2»
such that
FIR(3) III~\"
FCNF(3)
1.0
~ 0.5
ON FUZZY CONNECTIVES
ON FUZZY REASONING
Ant 1: IF Sl THEN S2
Ant Z: S3
Cons: S4
P 7 ~ {P IFDNF(7) ~ P S; FCNF(7)}
Ant 1: IF Sl THEN S2
Ant 2: S4
Cons S3'
{:
if 11i (1) < l.l.(2)
- J
r(F l )
" if 11.(1) > 11 (2)
l. j .
Obviously, we always have
11i (1) > 11j (2) and 1-11 j (2) > llj (2)
Hence we have
FDNF(10) ~ P(F 2) ~ FCNF(lO)
CONCLUSION
REFERENCES
Chu Shang-Yong
I. INTRODUCTION
149
150 C. SHANG-YONG
defined by Santos are established (Th. 2.7, Th. 2.9) via leaves
drawing operation (Def. 2.7); the relations between fuzzy tree
language and tree language by Brainerd are established (Corollary
to Th. 2.12) via A-cut concept (Def. 2.11). Furthermore, fuzzy
forest grammar (Def. 3.6) and fuzzy forest language (Def. 3.10)
are discussed. Similar results corresponded with fuzzy tree
language are obtained. An "isomorphism" between fuzzy tree
language and fuzzy forest language is established. (Th. 3.1). As
a conclusion, it is worthwhile to point out that the type 2 n-fo1d
fuzzy language by Mizumoto may be replaced by a fuzzy forest
language via leave drawing operation.
(yYl,].l(YYl»"'" (z,O'(z»>.
If W(xO'~)=«xO'O'(xO»' (xOxl,].l(xOxl)""'(~'O'(~»> is a
close walk and Xi I Xj for i/j (0 <i, j <k), then W(xO'~) is
called a fuzzy cycle.
The set of all fuzzy trees in which the first labels of nodes
are over B is denoted by 'J (B).
r
\f (J (B), I is called a fuzzy tree over B. Defining that the
single tree {x} and the null tree ~ are fuzzy trees, i.e., {x},
~ ( (B). However, for the convenience in the following discussion,
we do not consider the properties about null tree ~ except a special
announcement.
(1) If (x1 :n1 )+(x 2 :n 2 ), then one and only one relation is true be-
t
tween (x1 :n1 ) < (x 2 :n 2 ) and (xl:n l ) (x 2 :n 2 );
(4) t t
~f (xl:n l ) < (xz:n z ), (xl:n l ) (x 3 :n 3 ), then (x 2 :n Z) (x 3 :n;3);
t
lf addlng to (x 3 :n 3 ) (xl :n l ), (xl :n l ) < (x:n), then (x:n) 'f
t
(x 3 :n 3 ) and (x 3 :n 3 ) (x:n);
(1) If W(x l :n l ,x 2 :n Z)C 'II' then the fuzzy subtree !lU !2 is called
a union of fuzzy subtrees II and I 2 , where
(2) I
If (x:n)=min{(y:m) (y:m) €I l , (y:m) €I 2 }, then the fuzzy sub-
tree IlIII2 is called an intersection of fuzzy subtrees II
and I 2 , where IlIII2 = {W(x:n,z) IW(x:n,z)C II' W(x:n,z)C I z }
IllI 1:2 =1\ iff tliere is not any node in II as in 1: 2 .
Proof: vr ,r
1 2 € L, Il()I z fA, by proposition 1.2/(5), we
get RO: 1 ) '::'R(I Z) in II' or R(I Z) < R(I 1 ) in I 2 • We may suppose
R<:~l) '::'R(I 2 ), then R(IlU I 2 ) = R(I l ), R(IP I z ) = R(I z )·
I1 n (I 2U I 3) (I/1 I 2 )U (I 1 n I 3)
I1 U (I 2n I 3 ) (I 1U I 2 )n (I 1 U I 3 ). tl
Since (s2:1) t
(z:l) in 'I[(x:n) +-! [(y:m) +-1' ]], and (y:m) t
(z:l) in T[(x:n) +-T 1 ], thus W(s,z)C 1: [tx:n) +-'I 1 J1(y:m) +-'I 2].
Proposition 1.8: ~f 'I~ 1:1 are fuzzy trees, 1:()1:a.. =A, (x:n),
(xl: n 1 ), (x 2 :n 2 ) ('I satlsfYlng (xl: nl) < (x: n), (x: n) 1- (x 2 :n 2 ) and
t
(x 2 :n 2 ) (x:n), then for.any (z:l) (!1' (xl :n 1 ) < (z:l), (z:l) t
t
(x 2 :n 2 ), (x 2 :n 2 ) (z:l) In ![(x:n) +-!1].
t
Since (x 2 :n 2 ) (x:n) in T, then there does not exist a walk
H(x 2 ,x) in!, i.e., there doe~ not exist a walk W(x 2 ,sl) in
'I[(x:n) +-!1]·
Since (z:l) ('I 1 , there does not exist a walk H(x 2 ,z) in
n(x:n) +-'I 1], i.e., (x 2 :n 2 ) f (z:l).
Proposition 1.9: If T, 'I" 12 are fuzzy trees, 1:n 'I 1=1: n 'IJ
='I1~ 1:2 =/\, (x,:n1~' (x;:n 2 ) ('I: an: (Xt:~l) t (x?:n2)~ (x2:n2~ 1-
(x l ·n 1 ), then'I1(x1·n1) 'I 1 J [(x 2 ·n 2 ) 'I 2 - 'I[(x2 ·n 2 ) 'I 2 ] L(x1 ·n 1 )
+-'I 1]·
Proof: Let R(I) = (s:l), R(I 1 ) = (sl:l), R(T 2 ) = (s2:1). We
take VW(s,y)C 'I [(x2 :n 2 ) +-1'2] [(x 1 :n 1 ) +-'I:t.]. If (sl:l) (y:m), ~hen t
W(s,y)C ![(x2 :n2 ) +-'E 2] and (x 1 :n 1 )t (y:mJ. When (s2:1) (y:m) In t
t
T [(x 2 :n 2 ) +-'I 2 ] , since W(s ,y)C I, (x 2 :n 2 ) (y:m) in 1:, we have
W(s ,y)C I [(xl :n1 ) +-I 1 ] [(x 2 :n 2 ) +-!2]'
FUZZY TREE GRAMMAR AND FUZZY FOREST GRAMMAR 157
Definition Z.2:
Let G be a FTG, fuzzy trees II' I2 €:T(VNU VT)'
G, fer)
(x:n) € II' then a fuzzy direct deduction II (x:n) ,cf)I2 at node
fer)
(x:n) from Tl to TZ under G, or an fd-deduction Tl > T from Tl
- - - (r) - Z -
to I briefly, means 3 [(r)<f> -+ 'I' fer)] sP,H'/(x:n) = <f>,
z
fer)
II [(x:n)+--- '1']= !Z' where (x:n) is a node of this deduction and
'I' n l' =" - Don't point out this in next arguments, as we always
suppose it.
A fuzzy deduction
f(r l ,··· ,f(rk )
I >Q, or
(r l' ... , r k ) '"
160 C. SHANG-YONG
There are several f-deduction chains with start tree T and end
tree g under C.
In !-Q f-deduction chain, Q is called an end tree of fuzzy
tree grammar C and this f-deduction chain is called a 9 f-deduction
chain of C, if its start tree ! E r.
Proposition 2.1: 1', QE](VNU VT), (x:n), (y:m) E,!, and (x:n)
«y:m), l' fer) ~~ Q, then !/(x:n) fer) ) Q/(x:n).
(y:DJXr) (y:m)(r)
and ![(y:m)<f(r),¥] = Q.
f
Since g[(x:n)~T]/(y:m) = T/(y:m) = ~ , by proposition 1.7'
f1 f( ) f1 Ur)
!! [(x:n)-(--T] [(y :m)~'¥] = g [(x:n)+--';!; [(y :m)~'¥]]
f1
= Q[(x:n)+-=-g],
f1 fer) f1
thus, !! [(x:n)+--!] =7!:! [(x:n)~] . II
(r)
![(y:m)~~] = g.
Since (y:m) {(x:n), (x:n) {(y:m), by proposition 1.10'
£
I[(x:n)~!!]/(y:m) = T/(y:m) = ~ , and by proposition 1.9'
f1 fer) fer) f1
n(x:n)-(--g] [(y:m)~_,¥] = n(y:m)~,¥] [(x:n)-(--g]
f1
= 9[(x:n)+-!!],
f1 f() f1
then I [(x:n)+--JJ] r ==7 Q[(x:n)+--JJ]. II
(y:m),(r)
162 C. SHANG-YONG
f
~].
Definition 2.4: A fuzzy tree language (FTL) generated by a
fuzzy tree grammar G = (VN, VT' P, r, J, f) is a fuzzy subset
L(G) of set J(VT) , where ]1L(G) (g) = ]1G(g) for all 9 s J(VT)·
Also, L(G) may be called a futzy tree language over VT.
if ]1L (Q) = ]1L (Q), then we say (Q, ]1L (Q» s L or immediately QS L.
1 1
Otherwise (Q, ]1L (Q» EL or QSL. If the fuzzy subsets L,M
of J (VT), satisfying l VQ S L we have Q S M, then we write L<!: M.
Clearly, L<!: M, MG L iff L=M; if L~ M, we get LC M.
(3) Let I,
(4) Let I,
v
Q=C(I l ;I 2 , ... ,It)
{jl
Ll
(T)
~l
~Il EL l ,1'2,···,1't EL 2
'fig EL,
jlL(g) = jlG(g) >0,3 f-deduction chain S
G G G G
r==>!l ~.. . >lk >g, ~ jlS (g) = jlL (9) •
Let the set of productions of chain S be A. If Anp' = ¢ and
l' E r, then S is an f-deduction chain under Gl , thus (g,jlG(g» E
Ll~ C<f>(L l ;L 2)·
If it, Anp'
fO (2)
---TO ]f(fO )}' has one and only one production, then A=AlU A2
{production r~}, where Al CP l , A CP 2 . Thus f-deduction chain S
may be resolved into f-deduction Sl under Gl with the start tree I,
166 C, SHANG-YONG
the end tree 9 1 E: Ll and the set of 2)roductions AI' and f-deduction
S2 under G2 with the start tree!6 ' the end tree 92E: L2 and the
set of productions A2'
fO
Thus Q=Ql[(xO:nO)-Q2]' ]1L(Q) =]1L (Ql) Af O A]1L (Q2)
1 2
]1 (L 'L ) (9), i.e" 9 E: C<f>(L 1 ;L 2)·
c<f> l' 2
By induction, we may prove that the conclusion is true, when
the productions of set A rip' are more than one,
Any fuzzy tree I can be written as R(I) [(I1 ,]1l)'" .,(10 ,]1 )],
where n is a number of out-edges of R(T), R(T,)~i= , ... ,n) 1S ~e
direct descendants of R(I), its signs ~re ord~red from the left to
the right, and T, = T/R(T,),]1,1 = ]1(R(T)R(T,), i=l, .•. ,no
~1 ~ ~1 ~ ~1
JH (T );
-n
productions [(r.)A.+a. f(r.) = p.] EP (i=l, ...• n), P=Pl AP2A .•. A
Pn iff Yi E (trTOVN )*.(i;!;l, ... ;n-l).Yo= a, Yn= S, Yi is given by
that a i replaces A which is the place of number k i in Y'- l ' and
called airect deduction of y.1- l' If this direct deducti6n is
p. 0
existed. we denote it by Yi-l~ Yi ' otherwise by cr==>/I S .
Set up G=(VN,E U{II}, p.r, Jl.f), where r = {II [(A.h(A»] /VAEVN '
168 C. SHANG-YONG
(r)x-+a[(x l ,].1l)' (x 2 ,]J2), ... ,(xn ,]J )]f(r), where ].1l, ... ,].1nE::(O,l],
others are the same as Theorem 2.8).
For the context-free fuzzy language under the sense of Lee and
Zadeh, the Theorem 2. 7 and Theorem 2.9 can be es tab lished as the
same as above.
Definition 2.11: For A E:: [0,1), a A-cut of the fuzzy subset L
of J(A) is a subset C(L,)..) of All, satisfying TE C(L,A) iff T is a
basic tree of J', ]' ELand ].1L (]') > A .
"IT £C(L, A), 31'. £L, I-l, (1'.) > A , and T is the basic tree of I.
Since J £L, we have I f-deduction chain Sunder G:
IO~ II } ... } I k_ l ====9 I, where IO £ r, the set of
(r l ) (r 2 ) (r k _ l ) (rk )
(i) (i) .
productions is {(ri)~ + 'I' f(r i ), 1=1, ... ,k}, and ~a(!)
Because the nodes of a fuzzy tree are same as the nodes of its
basic tree, the inverse of above process is obvious, i.e., C(L,A) =
L(G l ). tl
If ~ e: r,
~-a f-deduction chain is called @ f-deduction chai:n
of F , ~ is called end forest of ft.
-t
Clearly, each a-8 f-deduction chain under a fuzzy forest
grammar may be resolved into the k f-deduction chains, 11--9 ,
1'2-- 92' .•• ,1'k- 9k ' under the fuzzy tree grammar, where a = l, r1
···,tk]' ~ = [9 l ,···,9 k ]·
Definition 3.9: The grade of the generation of an end forest
~ of a fuzzy forest grammar -t
F is
l<i<k.
- - J
where the sense of each term is same as that of definition 2.3.
JlL(F )(a) = l<~<k ).lL(F )CI i )· Thus, for any ~E:L(Et)' correspond-
-t - - -t
ing to a vector of membership (Jl L(E t )(!l)"'" L(Et)(!k»' and
Proof: For fuzzy subset M of 'PJ (A), we define a map Bin from
Minto :Tb(A U {U}) as follow:
V[(r)4>-+'¥ f(r)] €P, where 4> =[4>l,· .. ,4>k], '¥ =[':I'l, ... ,':I'k],
4>i,':I'i € '](VNUA), (i=l, ... ,k), f(r) = (f(rl), ... ,f(rk », we
establish 4>' = Bin(4)), ':1" = Bin(':I'), where the vector of member-
ship of 4> is (1, .•• ,1), of 'I' is (f(r1), .•• ,f(rk », and p' = {(r)4>'
-+ 'I' ' f' (r) I \f [ ( r) 4> -+'1' f ( r)] € P wh ere f' (r) = 12 t~. k f ( r i) •
aELl;Sl""'S EL2
~ ~ ~m
l2.j2. k
operation between Ll and L 2 .
Also, the f.Ci=O,l, ... ,n) may be called i-fold fuzzy function.
1
If m'::'n, let
fO Cr l ) = ~1' f~Cr1;r2) = ~2,···,fm_1(r1'···'
~
1 ~2 3 ~m
r m- 1; r m) = ~ m' then S --'>-a
r l 1 --+a 2 --+. .. --+a •
r2 r3 rm m
We take Iff. VN U L
REFERENCES
INTRODUCTION
181
182 L. LESMO ET AL.
But the fuzzy approach seems very appealing also to face another
pro blem which is common to all production rule sys terns, 1. e. the one
of knowledge acquisition. In fact, the purely heuristic approaches
require a great deal of effort to adjust the weights occurring in the
rules, because the lack of an adequate theory makes difficult the de-
sign of efficient algorithms for the automatic learning. On the other
hand, the theoretically based approaches make very difficult the in-
teraction with the human expert which could allow the introduction
into the system of knowledge which is already available. On the con-
trary, the already noticed homogeneity of the fuzzy approach allows
to represent in a formally sound way the knowledge available to the
system (so that efficient learning algorithms may be designed), but
this representation, and in particular the use of fuzzy linguistic
variables, shows a strict correspondence to the way people express
their knowledge of the deduction rules they use (so that it is also
possible to directly translate the information given by the expert
into internal fuzzy rules).
C -~-~ H (1)
Amk » (2)
m
wI
CI -----.- H
W z
C2 -----~ H (3)
w
CQ --_Q_.- H
correlation with the hypothesis is not sure in that the actual state-
ment of the relationships between data and hypotheses will be made by
the learning algorithm (this means that in cases where the number of
available features is low enough, the pre-selection is unnecessary).
The set of all possible production rules (after the above men-
tioned pre-selection step) may be partitioned depending on the hy-
pothesis a particular rule refers to. In fact we may define
)(= {Hl,H2' ••• , HT} to be the set of all possible hypotheses; the
subset~t associated with the hypothesis Ht contains rule~ of the
following form:
(6)
where
(7)
The number of different rules of the form (6), which have po-
tentially to be taken into account, obviously depends on the cardi-
nality of the~H and of the different A~t)(l<j<R). In fact, the
t J - - t
number of a-priori possible rules referring to the hypothesis Ht is:
() K(t)
M t = 2 - 1 (8)
188 L. LESMO ET AL.
where
(9)
and K(t) represents the total number of different terms which can
occur in the condition part of the rules. Notice that M(t) repre-
sents the cardinality ofjPt'
Let Z = {zl' z2' ••. , zN} be the training set used to infer the
strength of the rules; for each element zi of Z one and only one
hypothesis HtE;tis supposed to be true and it is communicated by the
expert to the system. For a particular element ziEZ it is possible
to determine the possibility value pet) (zi) representing the compati-
p.k.
bility degree between the term (Vp{t) ~ l(tk) ) and the experimental
j Pj j
data associated with zi' It follows that, according to (5), the evi-
dence degree of C(t) (see (7» is:
s
IT{c(t)lz) (10)
s i
o
Fig. 1. Definition of fuzzy restrictions corresponding to the
linguistic terms: Very Low Evidence (VLE); Low Evidence
(LE); Medium Evidence (ME); High Evidence (HE); Very High
Evidence (VHE).
1r
Fig. 2. Definition of fuzzy restrictions corresponding to the
linguistic terms: Very Low Relevance (VLR); Low Relevance
(LR); Medium Relevance (MR); High Relevance (HR); Very
High Relevance (VHR).
FUZZY PRODUCTION RULES: A LEARNING METHODOLOGY 191
LE- v!..E: LE LE LE LE
ME VLEi LE HE \'IE HE
C~H
and the linguistic value of the strength w.
if ~k = Max ~.
l~2..4
J
if ~k " Max ~j
12.12..4
~{l
.,..
-
1 ~- ~k 2
-(--)
-
if ~k Min
l~2..4
~j
e 2 ok if ~k "MLn ~j
1~2..4
where ~k and ok represent the mean value and the standard deviation
computed for the individuals belonging to the k-th class (12k2..4).
f
Very Slightly
Altered Altered Altered Normal
of.
0.'
t.'
••It
0.'1.
0
.2.~ ~.o s.5 Serum
Albumine
Fig. 4. Definition of the linguistic terms qualifying the linguistic
variable corresponding to the base variable "Serum Albu-
mine". This definition takes into account the medical ex-
perience.
::1
0.'5
oii
o 1 4 Serum
Albumine
EXAMPLE OF APPLICATION
11 12
Among various applications ' the described learning procedure
has been applied to infer a set of rules (used in the context of
liver disease analysis) referring to the emission of hypotheses about
the presence of impairments in the liver functional assessment.
C2 - (CHE=Very Altered)
(15)
Highly Relevant
-------~~BIOSYNTHETIC IMPAIRMENT VERY SEVERE
Let us consider a patient with" the following values for the labora-
tory tests:
From Figure 4 (and analogous definitions for the other two laboratory
tests) we obtain:
*The three laboratory tests are: ALB Serum A1bumine; CHE = Serum
Cho1in Esterase; PT = Prototombin Time.
FUZZY PRODUCTION RULES: A LEARNING METHODOLOGY 195
(16)
C2 is VHE (17)
By accessing the table of Figure 3 with the pair <VHE,VHR> for rule
(14) and with the pair <VHE,HR> for rule (15) we get respectively:
and:
To show that also rule (15) may be useful for supporting the asso-
ciated hypothesis, consider the following set of values:
PI = 0.24
So that the rule (15) allows the system to conclude that the hy-
pothesis H is HE (High Evidence).
CONCLUSIONS
ACKNOWLEDGEMENTS
REFERENCES
I. PRODUCTION SYSTEMS
Introduction
199
200 T. WHALEN AND B. SCHOTT
Advantages
Disadvantages
the syntax for any fuzzy value of the variable, and a unique fuzzy
value from the fuzzy powerset of the variable's universe of dis-
course for any syntactically-correct phrase. (Several synonymous
phrases will generate the same fuzzy set and several similar fuzzy
sets will generate the same phrase, so the two functions are not
strictly mutually inverse.) As a result, the value of a linguistic
variable may be given either directly by a fuzzy subset of that
variable's universe of discourse, or indirectly by a linguistic
description of that fuzzy subset. For example, a linguistic vari-
able such as PRICE might take the value "very high" or the value
"more or less medium," as well as a vector representation.
Metric for
Universe of Discourse Base Values
YEAR (time): 0 1 2 3 4 5 6 7 8 9 10
DOLLAR (price): 0 2 4 6 8 10 12 14 16 18 20
UNKNOWN: 1 1 1 1 1 1 1 1 1 1 1
UNDEFINED: 0 0 0 0 0 0 0 0 0 0 0
DECISION SUPPORT WITH FUZZY PRODUCTION SYSTEMS 207
$8 0 0 0 0 1 0 0 0 0 0 0
$9 0 0 0 0 1 1 0 0 0 0 0
$9.25 0 0 0 0 1/3 1 0 0 0 0 0
MEDImf- 0 0 0 0 .4 1 .4 0 0 0 0
(X) (T) (H V) (V C V) (V cv V)
NEWPRICE SHOULDBE
(PRICE)
syllogism
(PRICE IS BELOW OTHERSPRICE) IMPLIES (NEWPRICE SHOULD BE MEDIUM)
~ SHOULDBE
(!l IS H VI)
syllogism
(Xl IS H VI) IMPLIES (Xo SHOULDBE Vo)
DECISION SUPPORT WITH FUZZY PRODUCTION SYSTEMS 211
Database
TIME o YEAR
In the data base the two variable names which are distinguished
by an asterisk (*) are meant to appear only on the right-hand-side
of a fuzzy production. Variable names in the database which include
the word NEW in the compound variable name all refer to variables
in the upcoming decision period. Variable names which do not in-
clude the name NEW assume the values from the decision period just
completed. The initial values show the assumed values of the vari-
ables before the game is played. It can be seen from the initial
value column that some of the variables are rather crisp and
others are rather fuzzy. The variables are grouped according to
common base value scales.
Six fuzzy productions are listed below. The first four sug-
gest values for the variable NEWPRICE (price to be charged next
quarter), and the last two make suggestions regarding NEWSHAREGOAL
(importance of the goal of building market share relative to the
goal of short-term profit).
Rules 1 and 2 give similar but not identical results. Rule 3 gives
a result for NEWPRICE which is close to the result of rule 2, but
it also takes into account rule 1. Rules number 5 and 6 both sug-
gest values for NEWSHAREGOAL. Notice that since in rule 5 the
antecedents are connected by AND, the result of rule 5 is UNKNOWN.
However, in rule 6 the antecedent parts are connected by OR; the
result of rule 6 is more precise, ABOVE UPPER MEDIUM.
Presumably the user would select the least fuzzy suggestions
from among the outputs of the various rules which adhere to his
other criteria for acceptance. In the absence of other evidence
the user might select the result of production rule 3 as the best
guide to price, and the result of rule 6 as the best guide to the
firm's balance of goals.
VI. SUMMARY
VII • REFERENCES
INTRODUCTION
217
218 R. JAIN AND S. HAYNES
FUZZINESS
°limits
or 1. The restriction of the characteristic function to ° and 1,
of an element in a set in classical set theory is binary, either
torily by only °
are some classes whose membership cannot be represented satisfac-
and 1.
and
(5)
X. E X (6)
1
Using the above equation the baldness of the group {Bill, Tom,
Jake, Bob} is 0.8. A detailed discussion of properties of a group
is in [1].
222 R. JAIN AND S. HAYNES
IMPRECISE PROPERTIES
1 2 345 6 789
1 2 345 2 345
113
2 7
4 751
26 12223 1
38987656565555443211
8898765546466421255554321
398685343321 68978765544221
889876554321 8 498775554321
75984 334287 398898766554321
88898765555221898889876554321
3889876425574 199731
77 6
75 1512
34 () 95
15946 664 345
259488 451 11 11
159488 27666761
269388
468588
356139
451 1
25
F = {ABS(asc-desc)/(asc+desc)} ** 2
where asc and desc represent the number of ascending and descending
subsequences of length greater than 2 in the given sequence, respec-
tively. The function F represents mono tonicity of a sequence.
Note that this function will classify both sequences given above as
having perfect (1.0) mono tonicity , but will assign 0.0 mono tonicity
to the sequence
543212345.
Fr = {ABS(A-D)/(A+D)} ** 2.
Vector descllption
of event /
Combination
Description of
various features
Imilge with
neighborhood
considered
where
VILI
COGNITIVE
PROCESSES
KNOWLEDGE
BASE
ATTENTIVE
PROCESSES
PERI PHERAL
KNOWLEDGE PROCESSES
SOURCE
CAMERA
information about the region. A given process may use the results
of another process to aid its computation, or even its own earlier
results (for an earlier frame) may help (priming the pump). The
processes make use of knowledge of imaging. These reasonably
accurate region descriptions are written to a buffer sitting
between the attentive level and the next higher level.
228 R. JAIN AND S. HAYNES
(4a)
(4b)
Early in the sequence only the white car is moving . The very low
contrast car to the left is just beginning to enter the scene.
The result of applying the operator described on the first two
frames, is shown in Figure 5. Only the moving car gives good
response. The spurious edges shown arise from registration error
(that is, the frames are shifted with respect to each other) . Thus
the static edginess values are not thrown away before they are
needed, but rather are made use of until the last possible minute
before decision. This way edginess and difference can both be used
to support a decision about time varying edginess.
Working through the model space with all these varying likeli-
hoods is a stupefying task. It is very likely that the given
results of the attentive phase are insufficient to resolve an
ambiguity, though the attentive phase has the resources to provide
the required datum. Perhaps the attentive phase simply chose to
examine an area which was not of interest to the cognitive phase.
When the system is entirely data-driven there is a lot of unneces-
sary work being done. Therefore we envision the cognitive level
providing the top-down control of the attentive level. If the
cognitive level finds that more information about a region will
resolve some ambiguity it will send an instruction to the attentive
level (via the interface). This instruction may contain the
region, current information available on it, and what sort of
information it needs. Note the cognitive level-does not know about
individual attentive level knowledge sources, so it cannot directly
234 R. JAIN AND S. HAYNES
When the system is first turned on, nearly all operation will
be data-driven, the cognitive level may be tuned to the domain
(e.g., it knows it's looking at a traffic scene), but giving very
few directives. As frames come in, get processed, the attentive
level acquires more and more reliable image attributes, we expect
the cognitive level to take a more active role -- channeling more
and more of the attentive level's activity as it knows, increasingly,
what is important to analyze in the scene.
CONCLUSION
ACKNOWLEDGEMENTS
REFERENCES
Henri Prade
I. INTRODUCTION
237
238 H.PRADE
20
240 H.PRADE
Generally we have:
h (AR(lPRE) r/: 1 - h (ARflpRE)
The formula
In the first example, the system has to find out all the more
or less big objects recorded in its associative memory. In the
second example, the system has to find out the box whose qualifi-
cation by BIG has a maximal meaningfulness, (Goguen 1976), the
box whose qualification by LITTLE has a maximal meaningfulness and
finally to add their weights. In both cases, a procedure of fuzzy
pattern-matching (see next section) is needed.
Examples:
(a) do some steps on the left
(S) increaie by ~ the pressure (x is an identifier of the
already computed fuzzy quantity)
(y) go-and-fetch the greenish big cub.
• x is very large
the temperature is rather small.
-One or several data match the pattern in the same way: there may
be several data which have (at least approximately) the same
possibility measure and the same necessity with respect to the
pattern; then the data are said to be interchangeable.
Note that the results are coherent with our intuition. The
system yields the data that may correspond to the pattern.
V. CONCLUDING REMARKS
ACKNOWLEDGEMENTS
REFERENCES
SS' year.s
2) Universe : height
to lerance : A - 0 tolerance: A - 5
Fuzzy labels Il(PID) N(pID) Il(PID) N(P D)
Pattern MEDIUM: (165,175,2,2)
TALL: (175,210,10,15)
11EDIUM; (165,175,2,2) °0.5 °0.77
Data RATHER-TALL: (J70,180,IO,IO) 0 0.11
SMALL: (155,160,5,5) 0.28 0 0.58 0
VERY-SMALL: (150, 155, 5,5) 0 0 0.15 0
FUZZY PROGRAMMING: WHY AND HOW? 251
(Continued)
\
\
\_ti""ct..-.
A1S' A,&O AU
3) Universe : weight
tolerance ).:·0
ll(pID) N(pID),
....
Pattern OVER-SEVENTY: (70,120,2,0)
~ .., ,,,,,,
ABOUT-FIFTY:
(55,65,3,3)
(47,53,2,2)
a
0
a
0
Data FIFTY: (50,50,0,0) 0 0
ABOUT-SEVENTY-FIVE: (72,78,4,4) 0.67
SIXTY-NINE-AND-HALF: (69.5,69.5. 0,0) 0.75 0.75
-i
0,'
O,G
O~
O.~
o 4~ .60 65 to
A FUZZY, HEURISTIC, INTERACTIVE APPROACH TO THE OPTIMAL NETWORK
PROBLEM
Didier Dubois*
INTRODUCTION
253
254 D.DUBOIS
I. EXISTING METHODS
xk 0 <=> CJ.k ~ A~ A k 1. t
xk 1 <x> ak e: A~A k 1. t
2) Discussion of Methods
However, the main reproach that can be raised against ~l, ~2,
~3, statements of the problem, is their lack of realism even when
heuristic methods are provided to reduce intractability. The
classical operations research approach (optimizing one criterion
under linear constraints) is to some extent irrelevant to trans-
portation network design. Computationally feasible algorithms,
taking into account the complexity of the real problem, together
with our inability to assimilate it precisely, are needed.
II. A METHODOLOGY
1) Interactive Programming
- :\<- _.
"5 V",=to IS" ""'.p.I,.
Fig. 1 Fig. 2. Medium Speed
I t:.v -x
= L(~) x < v
e: a - a
and we write
Di' - D
lJD(Dij) = 1. -
D-D--
D < Dij < D
o Dij < .Q
lJST(t) = 1
This latter notation is the same as for va; using the approximate
formula for the inverse of a fuzzy number, it was proved [8] that
mean and spreads can be taken as:
CL
t
The main point is that the above formula does not depend upon the
functional forms of membership functions, provided that the refer-
ences are the same for all tao This contrasts with stochastic
approaches [36] where, instead of a fuzzy number, t a is a random
variable. ta must then be assumed_normal for the sake of compu-
tational simplicity. Travel time tt j on path p!j between i and j
is:
,RL
using the exact formula for the addition of fuzzy numbers ([10]).
For each path p~~ the truth value of the proposition "pk is the
ij
shortest path be ween i and j" is computed, 1. e. :
k
v kij max min (l1 ij (x), l1ij (y»
x,y:x:5Y
where
k k and
l1 ij and l1 ij are the membership functions of Eij Eij
ti~ is the fuzzy travel time of the path having the shortest
av rage travel time.
vtj is the degree of consistency of l1tj and l1i' (see [40]). V~j
is easily computed (see [11]), and only the paihs such that
vkiJ· > v i are kept. v. is a parameter of the procedure, and is
- mn nun .
used to control the selectiv1ty of Phase 1.
Start~ I
END
Medium
\0l1li 1
and
~
Allor nothing high
Assignment
Assignment
Multlpath assignment
C33 The amount of time saved between work places and popula-
tions.
Criteria Cl and C2 are local because their values depend only upon
the considered path. C3 tries to evaluate the influence of the
path on the remainder of the partial network. Other criteria
could be considered, for instance the quality of a path. It could
involve the number of lanes, the type and degree of damage of the
pavement and so on. Using quality indices qa for links a, as me~
bership values of a fuzzy graph [39] (cf. III 1), we could set the
quality qk of a path as that of the worse link:
qk = min qa.
a on path k
C3l(k), C32(k), C33(k) are built in the same way. Those three
indices express a percentage of travels whose time can be diminished,
and evaluate to what extent route k is fitted to the partial network.
NB: shortest paths in the graph made of route k and partial network
are not recomputed using usual shortest path algorithms, which is
expensive, but through a fast procedure generalizing the one of
Loubal for link addition [23] to route addition (see details in [7]).
3
C3(k) I i))i 8 C31(i)
i=l
3
C(k) = I Wi e Ci(k)
i=l
where the criteria values are normalized, together with the weights.
Land 8 means extended sum and product of fuzzy numbers (see [10]).
C(k) is thus a fuzzy number, which is the result of a fuzzy linear
aggregation. The closer to 0 is C(k), the better is route k.
8
a)
L.L----'-:i-'---'--~ C (k;)
b)
Fig. 4
(*) (0(n 3) for initial shortest path search, 0(n 2) for the assign-
ment and path addition, where n is the number of nodes}
272 D. DUBOIS
STE P 1
I
Evaluations of Characteristics
Computation of AI ternative5
Choice of a cluster
Evaluation of
candidate routes
l
[criteria agreg ati0 '21
Automatic
decision
l , 7
yes One route no
best routes ca II
for decisionmaker
, 1 External decisi~ II
Are evaluations
yes \precise enough?
1 no
Change weights
--r-.J
or data
CONCLUSION
REFERENCES
I. INTRODUCTION
lSee, for example, Batra (1975) and the references contained herein.
277
278 G. Q. CHEN ET AL.
The theory of fuzzy set was originated with the seminal work
by Zadeh (1965). The theory was refined and further developed by
Kaufman (1975), Kandel and Lee (1979) and Dubois and Prade (1980),
among many others.
o~---c-----L--------~---
\l
x
Fig. 1. A one-dimensional fuzzy set and its membership function.
APPLICATION OF FUZZY SET THEORY TO ECONOMICS 279
o ~ ~
Fig. 2. A two-dimensional fuzzy set and its membership function.
Two fuzzy sets A and Bare equal, i f and only i f 1I A<x) = 1I B(X)
for all X in X.
A is contained in B i f and only i f 1I A(X) ~ lIB <x). In symbols
\I.e
o Supp A x
Fig. 3. Support of fuzzy set A and its characteristic function.
280 G. Q. CHEN ET AL.
x
llAOB
Fig. 4. The union and intersection of two fuzzy sets.
= IlA(x) V IlB(X)
= IlA(x) A Il B(X)
where 11 AU Band 11 Af\ B are the membership functions of AU Band
AIlB, respectively. In the case where the membership function of
the fuzzy set B is a constant 13, we may express the intersection
of the two fuzzy sets B(\A by SA.
ll.e
a~----~~--------~
~--~--~--------~~~----x
I - '\J. --f
Fig. 5. An a-cut of a fuzzy set A and its characteristic function
CAn (X)·
APPLICATION OF FUZZY SET THEORY TO ECONOMICS 281
II
x
~AS
Fig. 6. A S-cut of a fuzzy set A and its membership function
!lAS (X) •
x ••• R =
)(2
Fig. 7. Fuzzy relation and its projection.
282 G. Q. CHEN ET AL.
\lA
0.3
0.6
1.0
o
Xz
Fig. 8. Expansion of a one-dimensional fuzzy set into a three-
dimensional fuzzy set through cylindrical extension.
A =
Xz
Fig. 9. Expansion of a two-dimensional fuzzy set into three-
dimensional fuzzy set through cylindrical extension.
APPLICATION OF FUZZY SET THEORY TO ECONOMICS 283
Projection
RoA ~-----/---I~"'<?'~
RoS = Px .x Z (iil'\ S)
max[min(UR<X'y)" US(Y.z»]
y
A fuzzy set A is convex iff all of its a-cut sets are convex.
An equivalent definition of convexity is: A is convex iff
Note that this definition does not necessarily imply that llA is a
convex function of X. (See Fig. 11.)
284 G. Q. CHEN ET AL.
x X
~~
Ac;I.
(a)
(b)
Fig. 11. (a) Convex fuzzy set and its convex (l-cut.
(b) Non-convex fuzzy set and its non-convex (l-cut.
a) 3 X e: E lJ A(Xo) = 1
b) lJ A is piecewise continuous.
x = (Xl"" ,X n )·
With Xi denoting the amount of the ith good (i=l, ••• ,n).
where lJ1, ••• ,lJi, ••• denote the membership grades of commodity
APPLICATION OF FUZZY SET THEORY TO ECONOMICS 285
o 100
Fig. 12. Age described by fuzzy numbers.
f:X -+ F(U)
2Statements in our daily life like "I would rather prefer compact
cars with dark blue color," "I like that nice restaurant very
much," or "A calculator is quite useful for students in an
econometrics class," are full of fuzziness.
~~------------------~~----;-----------~ xl
x2
Fig. 13. One type of fuzzy uti1i~y function.
project; on
~------~-----/f-----x------------~- X
1M/" .
Fig. 14. A one-dimensional indifference set of commodity bundles.
288 G. Q. CHEN ET AL.
)(2
Iu = PX(Rfl(u,x»
Q.E.D.
I t may be noted that when N = {l/u}CM, I C 1M' Hence, the
indifference set of a determinate utility indigator is included in
the indifference set of a fuzzy utility indicator provided that the
determinate utility indicator is included in the fuzzy counterpart.
In general, two indifference sets are covered with each other to
some extent. (See Fig. 16.)
290 G. Q. CHEN ET AL.
MR = Rf'I i('M) ,
u
R = RfH(u).
SR = Rf\ S1(u)
Figures 19, 20, and 21 depict MR, uR, and SR, respectively, where
commodity spaces are 1-dimensiona1 spaces.
I(M)
~
'::>x
~
Mc£) TOO
/<('r//«
x
Fig. 20. An upper sharp partition.
APPLICATION OF FUZZY SET THEORY TO ECONOMICS 293
t1(u)
u
~ 0
X
I{M)oRf l
PX (MR'fI)
similarly,
Q.E.D.
p=o.o-
p=0.7-
p=1.0
)10=0.
p.=o.
~----------+---------------X1
X2
IT IT IT
u=oo
u=O.O
--.... ........ u=O .0
-
u=0.7 Yu=O .7
u=0.7
~....-.".u=1.0
u=l p=1.0
3 u=0.3
u=2
--r
~ ......u=l .0
:::p=o .7
___...,..........,u=O.l K_~~-' u=O.O _p=O .0
III.o_I--..... u=0.3 M3
u=O.O
1
x x
(al (b) (cl
Fig. 23. Convexity and connectivity.
APPLICATION OF FUZZY SET THEORY TO ECONOMICS 295
~~~~~~~~----------~ u2
u1
--------~~--~--~~--~----------~------~Xl
----~~~~~~~~~~~~L---------------+-Xl
~R~l(x,u2) (X) = 1.
Due to the convexity property of l(M) , we have ~l(M)(u2) ~ ~l(M)(ul)'
Thus
~-cut set of R
\l
X2
where v~ij IVXij is the S-consumption equilibrium point for the Si-cut
of l(Mj )
)J
, ,-
".
I
M. /
J I
I
/
U~------------~~ ______- L______ ~__~
uj
y ~
>: E C £ ~
u>Uj Uj M>Mj j
and
E E C E ~
u>o Uj M>O j
or
o.4/a
O.9/b
consumption
equilibrium point
X2 Labour service o
Fig. 30. The existence of multiple consumption equilibriums.
thus R. = E
-oM u' since ~ and En include each other. Q.E.D.
It is of interest to note the existence of multiple consumption
equilibriums. Consider, for example, a fuzzy utility function
defined over nonfuzzy wheat and fuzzy labor services. Such a fuzzy
utility function is depicted in Fig. 30. With the exceptions of the
corner points, all contours of various a-cut of weak u preference
set for every u are nonintersecting owing to the convexity of
utility indicators. Assuming marginal utility is diminishing, the
contours of equal a-cut of various weak u preference sets are also
nonintersecting. However, the contours of different levels a-cut
in different u may interest each other. It follows that the points
of tangency between the budget lines and the contours of the a-cut
in different u cannot overlap.
302 G. Q. CHEN ET AL.
o
0.3
0.7
wI
budget 1i ne
a abc d budget 1i ne
(a) (b)
1.0
0.8
0.6
0.4
0.2
membership grades of all the other points on the budget line for
the same utility level must be smaller than al' In this case,
where all of the utility indicators are comparable, the membership
grade of the point a is maximum at any of the other utility levels.
The case in which the utility indicators are not comparable is
depicted in Fig. 31 b.
(X~ - Xl + 1)/10
U = (1 - ~ X2) (1 - e )
------~\l=0
",-- • ~ \1=0.5
X2~,.__~~___ ,~~~__~~__~
2
Fig. 33. Relation between U and X2 on the budget line.
304 G. Q. CHEN ET AL.
\l,U
VI. SUMMARY
REFERENCES
INDUSTRIAL PROCESSES
n
{ U s jl xs j2 x .•• xsjP+a j 1+a j2+ ••• +a jr }
j=J..
... ,
The above represents the rule structure for the general case of a
multi-input multi-output system. R consists of r subsets of rules
(rule blocks, RB), one for each output. Each rule block consists
of n rules in which the situation has p variables and the action
only one variable. Thus for a multi-output system the multi-output
controller can be decomposed to a number of single-output controllers.
s.1
R
a. -
1
~ {sj:~j
j=l a~
1
} (1)
and
n
a. U a~
1
j=l 1
310 E. H. MAMDANI ET AL.
if DOF I then a j
i
o and
if DOF I then a j
i
Finally, the action to be taken by the controller ai is simply a
fuzzy union of the individual actions a~.
1
RULES
FUZZY SET
R ~)~ DEFINITION
a.
CONTROL
ALGORITHM -- s.
r-1
1 1
1
INPUT
INTERFACE
PROCESS
~-~ OUTPUT
INTERFACE
The dotted arrows indicate that in general ai-l does not give rise
312 E. H. MAMDANI ET AL.
(a)
,---1 .
I ... I .
I .
I
*:4 +--~'-1
• f • (i). , • 1
L_+_;!c.)IC.. t
.. 1.1·'·t
1.._ 4.. .. .l.<. j
·x ..
(b)
IN SN ZP MP
1.0 1.0
0,5 0.5
0 0
-1.0 0 1.0 -1.0 0 to
Fig. 4. Definition of some fuzzy primary terms.
314 E. H. MAMDANI ET AL.
[l,M] •
Comparing the above with eqn. 1 we see that the inference has been
implemented by a mUltiplication operation.
k = [l,M] •
(fl ITL--L~
L(l 0- a"
l[l lL[ LDp Resulting
~-~-~P
Adjustment
of fuel rate
~-[l--U:P 1.0V\l/L
O.oI--f~o\
[L lLL LiLP l.FUEL
m3/h
=-0. 046 m3/h
t=o
t=t+l
Find a .
m~n
N
and a
max
a . =1
m~n
a =(G)
max a max
a.=${~ . +a )/2}
~ m~n max
.. ·1·2 ..
sJ+aJ = sJ xsJ x ... xsJP+a J
The array [R] is shown in Fig. 7. Now, let us examine the output
from the control algorithm for 5 different inputs
(a) Input = (2,5): It can be seen from [R] that no rule is within
318 E. H. MAMDANI ET AL.
1 2 3 4 5
2 90
3 80
5 50
7 50 21
9 50 99
Fig. 7. Rule matrix for simplified controller example.
a = ~{(50+50)/2} = 50
(c) Input = (5,3): This input corresponds exactly to the rule RI.
Thus
a = ~{(50+50)/2} 50
a = ~{(50+21)/2} = ~{35.5} = 36
(e) Input = (9,3): Four rules, R4, R5, R6 and R7, are at distance
£ = 2 from (9,3). The maximum output is 99 and the minimum
RULE-BASED CONTROL OF INDUSTRIAL PROCE3SES 319
Si-<ix
6a.
1.
os.1.
PERFORMAN;::E
PAST
SYSTEM a i _d
.... RULE
MODIFIER <t- MODEL -.. TABLE
STATES.
0
x
~
S.
1.
RULES
R
U1
CONTROL
FUZZY SET
DEFINITION
ALGORI'mM ~
-..
a.1. 5i
'7
INPUT
INTERFACE e~~ --- -
Si OUTPUT
- - - l > INTERFACE
correction and the area forms the set of desired responses. These
entries ensure
Thus, the further away from the desired trajectories, the greatest
the required output correction, one way or another.
or
where oa., oSi are the values of oai and oSi at the process input
and outpUt. Thus by normalizing [M] we obtain
oa i [M~l] oSi
Change in error.
Towards set-point Away from set-point
-6 -5 -4 -3 -2 - I 0 +1 +2 +3 +4 +5 +6
-6 0 0 0 0 0 0 6 6 6 6 6 6 6
-5 0 0 0 2 2 3 6 6 6 6 6 6 6
Below -4 0 0 0 2 4 5 6 6 6 6 6 6 6
sct-point -3 0 0 0 2 2 3 4 4 4 4 S 5 6
-2 0 0 0 0 0 0 2 2 2 3 4 5 6
-I 0 0 0 0 0 0 I \ I 2 3 4 5
Error -0 0 0 0 0 0 0 0 0 0 1 2 3 4
+0 0 0 0 0 0 0 0 0 0 -\ -2 -3 -4
+1 0 0 0 0 0 0 -I -\ -I -2 -3 -4 -s
+2 0 0 0 0 0 0 -2 -2 -2 -3 -4 -s -6
Above +3 0 0 0 -2 -2 -3 -4 -4 -4 -4 -5 -5 -6
sct.point +4 0 0 0 -2 -4 -5 -6 -6 -6 -6 -6 -6 -6
+5 0 0 0 -2 -2 -3 -6 -6 -6 -6 -6 -6 -6
+6 0 0 0 0 0 0 -6 -6 -6 -6 -6 -6 -6
The rule modifier (see Fig. 10) inserts new rules to the rules
store, if necessary, and deletes any redundant rules in view of the
latest rule generated.
si = ei x ci
s. = e. x c.
~ ~ ~
os.
~
= n{s.} ~
-1
oa i = [M ] os.
s ~
+ (a. d
~-
+ oa.)
~
d > 1,
x- x
x
Store last
state
Si_l +a i _l
,-------,P1 N
Delete old
Store new
rule
Sn+l+a n +l
n+1
,.J
s si-d
x n+1 n+1
s +a
n+1 (a i _ d +
a
x
4. REFERENCE S
1. INTRODUCTION
325
326 M. SUGENOANDT. TAKAGI
Now we deal with the case that control objective is to set the
output at zero. Let us design fuzzy controllers with respect to
en-1 and en where e n- 1 = -Yn-1 and en = -Yn. For simplicity we
use Yn-1 and Yn instead of e n- 1 and en·
Controller 1
n-l n n+l
Fig. 1. Control 1 when (yn- l' yn ) is (P, p2)
A NEW APPROACH TO DESIGN OF FUZZY CONTROLLER 327
Then '3 would be approximately equal to '1 and '2' In this case
we can find that '1 .. '2 ... "very true". It follows from truth
qualification that X = N2 by letting '3 = very true. Also when
(Yn-l' Yo) is (N, p) as is shown in Fig. 2, let us decrease y from
P to pIlL. The value un+l is found to be N in a similar manner.
Finally we obtain the following four control rules:
(Yn-l is P, Yn is N) + un is p (14)
(Yn-l is N, Yn is P) + un is N (15)
Controller 2
P
~
p2
___ pl.4
- "'-0- 2-- --'"':- pO.S
Nny n n+l
n-l n n+l
Fig. 3. Control 2 when Fig. 4. Control 2 when
(Yn-l' Yn ) is (P, p2) (Yn-l' Yn ) is (N, P)
(Yn-l is P, Yn is N) -+ un is P (18)
(Yn-l is N, Yn is P) -+ un is N (19)
Controller 3
(Yn-l is N, Yn is P) un is N3 / 2
-+ (23)
2 is p3/2
(Yn-l is N, Yn is N ) -+ un (24)
p2
~""' .......... ,
p
P pO.7 ~____ pO_35
~
~ -~
n-l n n+l ~? n n+l
3. SIMULATION
4. CONCLUSIONS
5 10 lS
o
I=~~==--~~~==~---n
-1
y
1
y
1
o 40
30 n
-1 I--_...J
REFERENCES
APPENDIX
/A -+ B/ = (1 - /A! + /BI) 1\ 1,
~ = (1 - R. + .Q) " 1
where the operations - + and A are extended ones for fuzzy sets.
For calculation it is better to take strong a - cut. We have
~ = (1 - fu + ~) 1\ 1
~ (r(a), 1]
fa (Pl(a), P2(a)),
x is p', x is P + Y is Q
y is Q'
1) Given a premise p', set p' ~ P is P. By converse of truth
qualification, P is found as
Q' = hQ -l(Q) ,
(x is AI' Y is Bl ) + Z is Cll
(x is A2' Y is BI ) + Z is C21
(x is A2 , Y is B2) + Z is C22 •
then clearly
Y is B ~ Y is BI is T
Let us next infer z at the same point (AI' B) this time from
(AI' B2)· That is,
Now let
ty
I B2 - C12 - - c22-
1
I I
B 1 - Cl l - - C21-
I B2
~
1 B - - Dl->O« -D2 -
I I
1
I
I
L ________ ~-;;..
Al A2
B1 ~
Al A A2
(x is AI' Y is B) + Z is DI •
Here DI may be obtained in another way: DI = CII ' n CI2 '. For
the point (A 2 , B) we can also obtain an implication sucIi that
(x is A2 , Y is B) + Z is D2 •
HAZARD DETECTION
Masao Mukaidono
Faculty of Engineering
Meiji University
1-1-1 Higashi-mita Tama-ku
Kawasaki-shi 214 Japan
1. INTRODUCTION
335
336 M. MUKAIDONO
Pass A
----- ---------,,
,
Jl
I
I
I.!-
f: binary switching
function
F: fuzzy switching
function
Pass B
hazard due to an input change (in this paper an input change may
involve one or more input variables) if and only if (1) the output
of F before the change is equal to the output after the change and
(2) during the change spurious pulses may appear in the output.
(1)
XI
0 0 1 1
~
:x.. 0 1 1 0
0 0 0 1 1
1 0 0 0 1
Fig. 2. Karnaugh map representing the binary
switching function f of the example.
338 M. MUKAIDONO
ized by the fact that the complementary laws x'x=O and X+X=l do
not hold.
(6)
(9)
(10)
F(A)U(B).
is changing from °
Here. Ci€(O.l), that is, cit{O.lJ means that the input variable xi
to 1 or from 1 to 0. If Ci€B, then it means tnat
Xi does not change. The subject of this paper centers on combina-
tional switching circuits composed of gate-type AND, OR, NOT, NAND
and NOR elements and it is assumed that each such element does not
contain any logic hazard.
l~
-t.\. 0 1
0 0 V:t
1 ¥~ 1
FUZZY SWITCHING FUNCTIONS TO HAZARD DETECTION 343
°(
A logic ( function) hazard is called logic ( function)
hazard if it is a static 1) hazard.
° ( 1)
In our example of Figure 1, for example, the input change
(0,1,1) ++ (1,1,1) has a logic °
hazard because of F«O,l,l)U
(1,1,1»==F(1/2,1,1)=1/2, F(O,l,l)=F(l,l,l)=O and F«1/2,1,1)*)={0},
and the input change (1,1,0)++(1,0,1) has a function 1 hazard
because of F«1,1,0)U(1,0,1»=F(1,1/2,1/2)=1/2, F(l,l,O)=F(l,O,l)=l
and F«1,1/2,1/2)*)=={F(1,0,O), F(l,O,l), F(l,l,O), F(l,l,l)}=={O,l}.
whether it is a static °
input change A++B and we can further determine from Corollary 1
hazard or a static 1 hazard. Although the
detection of whether logic hazards or function hazards is possible
by Corollary 2 and 3, such detection is difficult because we need
to examine the value of F for all elements of (AUB)*.
From the above theorem it is seen that every law held in the
fuzzy logic is a transformation that preserves static hazards. On
the other hand, every fuzzy switching function can be expanded into
the disjunctive ( conjunctive) form. Therefore, it is sufficient
to show the effectiveness of the methods of detection and identifi-
cation of static hazards involved in the above two forms. In the
first half of this section we will deal with the detection and
identification of various kinds of static hazards by obtaining the
FUZZY SWITCHING FUNCTIONS TO HAZARD DETECTION 345
JL
(1) Fsd(AUB) 0,
(1) Fsc(AUB) = 1,
6. CONCLUSION
REFERENCES
1. INTRODUCTION
One method which has been developed for working with systems
which have lost information in the modeling process is fuzzy set
theory. Since fuzzy sets do not require strict partitioning of
objects into groups, it is possible to handle situations where one
desires the creation of sets where different elements of the set
have differing amounts of membership in the set. An example of
this type of set is the set of all mechanisms which will stop a
specific undesired action where the effectiveness of any specific
mechanism in stopping the undesired action is not fully understood.
2. FUZZY TOOLS
of these sets have some elements which can and should be considered
to be partial members of the set. It is this type of set with
which fuzzy set theory deals.
1)
2)
°p{n')peA) 1- 1
<
=
<
1)
2)
~(~) =
1
~(n) =
°
3) If a, S £ B with a £ S, then ~(a) < ~(S)
4) If {aj I 1 ~ j ~ ~} is a monotone sequence, then
~im[~(aj)] = ~[!im(aj)] [9].
J-+<» J-+<»
Sup{Min[T'~(;T)]} (2.1)
T + [0,1]
where
T* = aT + b,
and
356 W. S. BRUCEANDA. KANDEL
{x ax(x) ~ aT}
{x X(x) ~ T}
Thus
where
T* = aT + b,
and
Thus
FUZZY SET THEORY TO A RISK ANALYSIS 357
b + Sup{Min[aT, a~(~T)]}
T -+ [0,1]
b + a . Inf{Max[T, ~(~T)]}
T -+ [0,1]
b + a . FEV(X).
3. POSSIBILITY THEORY
The second approach which can be taken for this type of dis-
tribution argues that since the maximum amount of probability
which an event can have is directly related to the amount of po-
ssibility that event has, the probability value for'that event
FUZZY SET THEORY TO A RISK ANALYSIS 361
value which has been determined for that event in that specific
distribution. After all the single distributions have been evalu-
ated in this fashion, a monotonic numeric series of values are
assigned to the events in the universe if the events are not
numeric. The next step is to compute the fuzzy expected value of
the events using the numeric values assigned to the events as the
compatibility values and the weights of occurrence as data for
computing the measure (~T). The fuzzy expected value in this case
will be computed in the interval defined by the low and high
numeric values assigned to the events. If the events are numeric
events the fuzzy expected value gives a typical event which is
produced by that polu1ation of possibility distributions. If the
events are not numeric, the fuzzy expected value must be converted
back to the original set of events. In either case, if the fuzzy
expected value is a real number and the events are defined only in
terms of integrer numbers, the fuzzy expected value can be rounded
to the closest integer to predict a typical event.
One generalized model which has been used with some success
in the preparation of a program for designing and modifying security
programs for a computing system is the risk analysis model. Martin
[13], Pritchard [15], and Farr et al. [3] have all written quite
extensive volumes discussing the use of this model in designing
security systems. It is this type of model, specifically the model
presented in a paper by Brocks [1], which we shall fuzzify in this
study.
if that threat takes place [2]. Other terms for vulnerability are
loss expectancy and cost.
The first step in the fuzzy risk analysis model is the identi-
fication of threats to the system. It is obvious that any and all
models of security must have some knowledge of what threats they
are attempting to deter. Thus, the first step of the new model will
consist of the determination of a set of n threats T with a generic
element of T being denoted by the symbol Ti , 1 ~ i ~ n.
n
R'
i
,I R ••
J
(5.1)
j=l
366 W. S. BRUCE AND A. KANDEL
The third step in the fuzzy risk analysis model is the deter-
mination of a set of most effective protection mechanisms for the
set of threats confronting the system. This step can be divided
into five distinct parts.
n
Oif L Cij > Total
i=l
Poss(M , ••• ,M j) (5.2)
lj n
n
L pP. x Poss(M .. ) if otherwise
~ ~J
i=l
The final step in the fuzzy risk analysis model is the imple-
mentation and monitoring of the security mechanisms chosen. This
step is the same as in Brocks' model. The only addition which this
model makes is the requirement that the security group meet at set
intervals of time to reevaluate the protection mechanisms selected.
which are to be used by the staff of the second project. The orga-
nization desires to provide security for the room, but must do so
within the maximum cost of $600 per year.
The third part of the risk assessment step in the model is the
computation of the risk for each threat. Using the formula
Ri Vi x Pi' the risks are computed to be Rl = $60, R2 = $720 and
R3 = $420.
Tl Stolen Terminal
MIl Bolting the terminals to the tables
M12 Installing a new lock on terminal room door
M13 Bolting the terminals to the tables and
installing a new lock on terminal room door
M14 The null mechanism
T2 Fire in Terminal Room
M2l Installing a sprinkler system
M22 Installing fire extinguishers
M23 The null mechanism
T3 Unauthorized Use of Terminal
M3l Using badge system to activate terminals
M32 Using passwords to limit access to terminals
M33 The null mechanism
i (where this is not clear from the context) and the mechanism
number j.
Along with defining the fuzzy sets, each member of the security
The final step in the fuzzy risk analysis model is the imple-
mentation and monitoring of the measures. To provide protection
for the terminal room, the organization takes the following steps:
1) The terminals are bolted to the tables; 2) New locks are placed
on the terminal room doors; 3) Fire extinguishers are placed in
the terminal room; and 4) A badge system is installed to limit
access to the use of the terminals. As a final step, the security
group agrees to review the success of the protection mechanism
chosen every three months.
7. CONCLUSIONS
The validity of the fuzzy model presented has not been demon-
strated by experimental or observational evidence. Comparing the
effectiveness of the fuzzy model against the effectiveness of other
models remains a problem for future study. Original experimentation
in this area should probably consist of in-depth comparisons of the
effectiveness of the set of protection mechanisms suggested by the
fuzzy model and the set of protection mechanisms suggested by the
probabilistic risk analysis model in identical situations. Due to
the complexity of these models, these first experiments should
probably be limited to systems whose security requirements are
fairly obvious. For the application of the fuzzy model to complex
systems, the development of a computer program which takes the
conjunction of the possibility distributions would be extremely
helpful. Since this process is algorithmic in nature, such a
program would probably be fairly easy to write.
The use of the fuzzy expected value and the typical value of
a population of possibility distributions algorithm in the fuzzy
risk analysis model is just one possible application of these
methods to decision making. These methods can and should be
applied to situations where decisions (particularly group decisions)
must be made in an uncertain environment. Some possible areas of
application of these methods are stock selection, urban planning,
business decision making and computer pattern recognition.
8. REFERENCES
William B. Rouse
INTRODUCTION
377
378 W. B. ROUSE
Structural Approach
Rule-Based Approach
Crisp Sets
Structural Approach
Rule-Based Approach
Measurement of Membership
Inferring Membership
values inferred in this way. All that one can really claim is that
these membership values are consistent with the observed human be-
havior. One does not know that these are the "true" values. How-
ever, this limitation usually does not cause difficulty, unless
the purpose of the modeling effort is to determine membership
values rather than describe problem solving behavior.
Evaluation
DISCUSSION
Typical Results
There are two main ways in which fuzzy models of human problem
solving have been useful. One way involves using the model as a
basis for automating a task that had been performed by humans.
The process and ship control work noted earlier are good examples
of successful use of fuzzy models in this way4,5,6,7. In these
cases, automatic controllers based on fuzzy models of human con-
trollers performed better than automatic controllers based on tra-
ditional system theoretic approaches.
Comparison of Approaches
CONCLUSIONS
ACKNOWLEDGEMENT
REFERENCES
Yee Leung
Department of Geography
The Chinese University of Hong Kong
Shatin, Hong Kong
I. INTRODUCTION
Fuzzy sets theory [19], since its inception, has been exerting
propagating influence on the methodological development in a
variety of disciplines. Its impact on decision analysis is a
typical example. Based on the conceptualization of a fuzzy
decision-making environment, new theories and methods have been
constructed and applied to decision-making processes in general
(see for example [2, 5, 10, 21]), and multicriteria decision~aking
processes (see for example [6, 8, 17]) in particular. In spite of
the proliferation of fuzzy sets approach in this field, its plau-
sible application to conflict resolution involving multiple
criteria, a special class of decision-making problems, though
important, has only been subjected to limited scrutinization
recently [12, 16, 22, 23]).
*This paper was completed while the author was a Visiting Senior
Fellow of The Center for Metropolitan Planning and Research and a
Visiting Associate Professor of the Department of Geography and
Environmental Engineering at the Johns Hopkins University in the
spring semester, 1982.
387
388 Y. LEUNG
Let
A FUZZY IDEAL FOR MULTICRITERIA CONFLICT RESOLUTION 389
(1)
i
be the performance matrix whose e1emp.nt p. is a verbal evaluation
of the performance of an alternative Xi wIth respect to criterion
Yi. For convenience of presentation, the superscript instead of
tne subscript i is employed to denote the alternatives. The
general format of the evaluation PI
is a linguistic proposition
Pi Y is Fi (2)
j j j
Y. is F~ -+
~.J F~ (3)
J J J
such that
i
Poss (Y. = y.) = 'lTy. (Yj) = llFi (y.). (4)
J J j J
J
(5)
(6)
Its element [Y~' y~] is a fuzzy interval associated with the possi-
J J .
bility distribution ~ and a minimal level of satisfaction, a, and
is obtained as j
i
'1Ty.
1 J
a ~-------------7~----~~-------
O~------~----~~i------~'----~---------
y..,.l. Y.
-j Yj J
(8)
with
II (11)
F.
J
()F~
J
n (\F~
J
and
(12)
392 Y. LEUNG
(13)
h
were, Yj* an d-*
Yj are the minimum and maximum values respectively.
i i
ny. (y j) ~ 1Ty (y.) ~F .CF . for all i, (14)
J j J J J
-*
Yj min y~ (15)
i J
i -i]
then, for any YJ' in [y~, YJ~]' it is also an e 1ement 0 f [Yj' Yj .
* y.]
Consequently, [Yj' * J can be treated as a fuzzy interval speci-
fying a set of iaealJvalues for Yj .
Y. j
J
/~
ex r-------~~--+------
0 0
4 1 -1 Y. 4 2 ~
Y.
lj y. J y. V':
.] ]
) -]
Cd) 4 4 eel
ITy (P. 1 3
/ j J ITy. (P~)
]
J
ex ex
( e)
ITy (P.)
. )
;/J
4 Y.
J
X* *
= {( YI" * ••• , y*)
•• , y.,
J m
Iv..s.
*
-
y.*
J -
.s. -*
Y., J.
J
= 1 , ••• , m} • (17)
L J
Let
m • ] lip
[
L (1 - ~cZose to -y~ (ylJ.)P , 1~ P~ 00 , (18)
j=l J
l/p
(19)
m i (20)
Z.
\'L (1 - 11""cose t oy, (y J -* ,» .
j=l J
, 2 1/2
cZ.ose to Yj -*(y:»]
J
, (21)
max
,
1
{I - 11 c Z. ose to y, (l»).
-*
J
J
(22)
By the same token, taking the minimum ~) (yr, ... , yj, ... ,
of the fuzzy ideal as an ideal solution, another set of compromise
solutions, with its element denoted as XC = (YI' ... , yj, ... , ~),
can be derived through the distance minimization procedure
accordingly.
396 Y. LEUNG
!lelose to fuzzy
(for Y2 ) ideal
!lclose to
(for Y1)
I i
sup min [ 7T y (y.), ..• , 7T y ~y .) , ... , (23)
j J J J
a ~------~--------~---------------
m i ] IIp
[
I (1 - ~aZo8e to y~(YJ'»p , 1 ~P < 00 (25)
j=l J
i i*
1Ty (Yj) (26)
j
fuzzy ideal
\lerose to
(for y 1)
Fig. 5. Compromise solutions with respect to a ~ero-in point-
value fuzzy ideal.
(a) (b)
ar-----;~----___4..__- a~---~~--------
oL---~~--~------~----------
/ I---y~------- Y
-J J j
1 2
sup 1Ty. sup 1Ty.
r J
J
0
1*
= 100 =Y I--
, Y2---
Yj j
IV. CONCLUSION
V. ACKNOWLEDGEMENTS
VI. REFERENCES
405
406 APPENDIX
Hu Shu-li Li Xiang
Department of Mathematics Gui Zhow University, Gui Zhow
Sichuan University Fuzzy Logic
Chengdu, Sichuan Li Zai-Fu
Fuzzy topology
Wuhan Medical College
Wuhan, Hubei
Huang Jin-li
Application of the fuzzy set
Department of Mathematics theory to medicine
Shanghai Teacher's College
Shanghai
Liang Ji-hua
Fuzzy control, Fuzzy integral
Department of Mathematics
Sichuan University
Huang Zhende
Huazhong Institute of Technology Chengdu, Sichuan
Fuzzy topology
Wuhan, Hubei
Fuzzy mathematics, Fuzzy pattern
recognition Liao Qun
Electrical Power Res. Institute
Qinghe, Beijing
Jiang Jiquang Fuzzy system, Fuzzy logic,
Department of Mathematics Fuzzy linguastic model
Sichuan University
Cheng du, Sichian Liao Zu-wei
Fuzzy topology Chinese Central Television Univ.
Beijing
Kong You-kun Fuzzy matrix, Fuzzy relation
Academy of Meteorological Sci. equations, Fuzzy systems
Central Meteorological Bureau
Beijing Lin Yan-Wu
Meteorological statistics Department of Mathematics
Sichuan University
Li Bi-Xang Chengdu, Sichuan
Huangshi Normal College Fuzzy logic
Wuhan, Hubei
Fuzzy relational equation Liu Dsosu
Department of Mathematics
Li Zong-fu Sichuan University
Department of Mathematics Chengdu, Sichuan
Sichuan University Fuzzy integrals and fuzzy
Chengdu, Sichuan probability theory
Foundation of fuzzy set theor
Liu Jun-jie
Li Tai-Hang Department of Mathematics
Inst. of Computing Technology Shanghai Teacher's College
Academia Sinica Shanghai
Shanghai Fuzzy control, Fuzzy system
Application of the fuzzy set
theory to solve artificial
intelligence problems
APPENDIX 409
413
414 AUTHOR INDEX
Radizikowski, W., 387, 403 Wang, Paul P., 1,
Rouse, William B., 377 Wang, Pei-zhuang, 81
Routh, F. W., 76, 80 Weiss, M. D., 35
Ruspini, Enrique H., 1 Wens top , Fred, 204, 217
Whalen, Thomas, 199
Saitta, L., 181 Wu, Xuemou, 20
Sanchez, 16, 20, 82, 109
Saska, J., 387, 403 Yager, R. R., 72, 137, 145, 146
Schott, Brian, 199 Yang, C. T., 32
Smith, M. H., 242, 249 Yu, S. H. Eden, 325
Stairs, S., 257, 276 Yu, P. L., 387, 403
Sugeno, M., 16, 325
Zadeh, Lotfi A., 17, 19, 31, 37,
Takagi, R., 325 40, 59, 108, 137, 147,
Tong, Zhengxiang, 59 202, 218, 237, 242, 254,
Torasso, P., 181 278, 331, 352, 387
Toulouse Transportation System, Zeleny, M., 387, 403
272 Zhang, Jinwen, 107
Tsukamoto, Y., 331 Zhang, Nan-1un, 81
TUrksen. I. B., 137 Zimmermann, H., 21, 137, 147
SUBJECT INDEX
415
SUBJECT INDEX
416
Control Entropy
algorithm, 314 probabilistic, 15
fuzzy, 329 Equation
process, 356 seman tical, 327
rule-based, 307 Estimation
Controller traffic, 263
fuzzy, 325 Evaluation
learning, 311 verbal, 389
self-organizing, 311, 319 Even
Convex fuzzy set, 34 fuzzy, 60
Convex hull, 38 Expected value
Convolution fuzzy, 353
max-min, 17 Expert time, 208
Cylindrical extension, 282 Extensions
admissible, 50
D 0 composition, 16
D 0 F, 310 Falling random subsets, 81
Data Feature
base, 18, 199 point, 230
fuzzy, 245, 246 Filter, 50
homologous atomic, 243 neighborhood, 53
soft, 357 ultra, 54
Decision F,M,S" 21
analysis, 387 Function
business-making, 375 B-measurable, 354
group, 375 characteristic, 220, 278
making, 200, 259, 271, 375, 387 compatibility, 357
Defuzzification, 241 fuzzy, 15, 238
Degree of fulfillment (DOF) , 314 fuzzy utility, 277, 290
Dendral, 200 judge, 67
Detection linguistic approximation, 239
hazard, 335 membership, 278
Diagnosis Fuzzification, 14
medical, 379 de-, 214, 397
Disjunctive Fuzzified Lukasiewicz's logic, 331
form, 338 Fuzzy
fuzzy, 138 algorithm, 20
Distance, 97 assignment, 268
probability (or P-), 19, 98 compactness, 32, 52
R-homogenous, 98 compromise solutions, 388
T, 97 control algorithm, 311
UM, 98 controller, 325
Distribution convex cone, 45
possibility, 59 function, 15, 238
probability, 59 game, 21
Distributive, 338 ideal, 387, 401
implications, 107, 140, 202, 325
Econometrics, 259, 277 instruction, 238
Edginess, 228 interval, 390
language, 19
SUBJECT INDEX 417