Professional Documents
Culture Documents
Logica Difusa El Estado de Un Arte PDF
Logica Difusa El Estado de Un Arte PDF
Scope: Design, study and development of structures, organizations and systems aimed at
formal applications mainly in the social and human sciences but also relevant to the
information sciences. Within these bounds three types of study are of particular interest.
First, formal definition and development of fundamental theory and/or methodology, second,
computational and/or algorithmic implementations and third, comprehensive empirical
studies, observation or case studies. Although submissions of edited collections will appear
occasionally, primarily monographs will be considered for publication in the series. To
emphasize the changing nature of the fields of interest we refrain from giving a clear
delineation and exhaustive list of topics. However, certainly included are: artificial
intelligence (including machine learning, expert and knowledge based systems approaches),
information systems (particularly decision support .systems), approximate reasoning
(including fuzzy approaches and reasoning under uncertainty), knowledge acquisition and
representation, modeling, diagnosis, and control.
The titles published in this series are listed at the end of this volume.
FUZZYLOGIC
State ofthe Art
edited by
R.LOWEN
University ofAntwerp, Antwerp, Belgium
and
M. ROUBENS
Universitlff de Liege, Liege, Belgium
ISBN 978-94-010-4890-3
AH Rights Reserved
© 1993 Springer Science+Business Media Dordrecht
Originally published by Kluwer Academic Publishers in 1993
Softcover reprint ofthe hardcover Ist edition 1993
No part of the material protected by this copyright notice may be reproduced or
utilized in any form or by any means, electronic or mechanical,
including photocopying, recording or by any information storage and
retrieval system, without written permission from the copyright owner.
TABLE OF CONTENTS
Preface ix
I. MATHEMATICS
A Visual Interactive Method for MOLP Problems with Fuzzy Coefficients 321
P. Czytak and R. Slowinski
On the Evaluation of Simple Fuzzy Relational Queries : Principles and Measures 355
P. Bosc and O. Pivert
Numerical and Logical Approaches to Fuzzy Set Theory by the Context Model 365
R. Kruse, J. Gebhardt and F. Klawonn
IV. ENGINEERING
Stability Analysis of Fuzzy Control Systems Based on the Conicity Criterion 487
J. Aracil. A. Garda-Cerezo, A. Barreiro and A. Ollero
The chapter on mathematical aspects deals with a number of various topics such as,
on the theoretical side, e. g. MV algebras and fuzzy topology, and on the applied side,
e. g. possibility and probability, fuzzy relations, calculus with fuzzy sets, reasoning
with conditional information, and parametrization of fuzzy sets.
The chapter on artificial intelligence, although the shortest of the four, nevertheless
deals with interestinz topics such as e. g. theorem provers, rules of inference,
knowledge bases, and pattern classification.
The chapter on computer, management and systems science deals with e. g. fuzzy
linear programming, multiobjective linear and nonlinear programming, fuzzy 0-1
programming, classifier systems, analysis of fuzzy data, and implication and
inclusion operations.
We are convinced that this book accurately reflects important areas of present-day
work in the field, and we would like to sincerely thank all colleagues who have
contributed to this volume, thus making it a real state of the art, as far as applications
and ongoing research in the wide field of fuzzy set theory is concerned.
R. Lowen M. Roubens
ix
MATHEMATICS
Nonmonotonicity. Fuzziness, and Multi-Values
Patrick Doherty*and Dimiter Driankov
Abstract
The use of fu7,zy sets to represent extensions of predicates has as a
consequence that the truth of a predicate belongs to the interval [0,1].
In this case the underlying logic is a many-valued one in which the law
of excluded middle does not hold. This is due to the presence of a truth-
value which expresses ignorance about whether an object has a property
or not without rejecting the possibility that it might have this property.
This is exactly the type of knowledge used in non-monotonic reasoning
systems which allows a fact to be asserted as true by default. We cap-
italize on the natural existence of such a truth value when interpreting
fuzzy predicates and propose a formalization of a fuzzy non-monotonic
logic. We start by extending fuzzy logic with two connectives M and L
where MO' reads as "it may be the case that 0' is true" and LO' reads
as "it is the case that 0' is true. In addition, a default operator D is
added where DO' is interpret.ed as "0' is true by default". The logic has
an intuitive model theoretic semantics without any appeal to the use of
a fixpoint semantics for the default operator. The semantics is based on
the notion of preferential entailment, where a set of sentences r prefer-
entially entails a sentence 0', if and only if a preferred set of the models
of r are models of 0'. The logic also belongs to the class of cumulative
non-monotonic formalisms which are a subject of current interest.
3
R. Lowen and M. Roubens (eds.). FuZZY Logic. 3-15.
© 1993 Kluwer Academic Publishers.
4
_ not conclusive evidence for the truth of "u has the property F"
_ not evidence against the truth of "u has the property F"
- evidence which suggests the possibility of "u has the property F" being
true
- MP(u) -+ DP(u)
5
where we read MP( tt) as "it may be the case that u has the property F", and
DP(u) as "P(u) is true by default". Here, M is a truth-functional connective
which asserts the possibility of P( u) being true when we are ignorant as to
whether u has the-'property F, and D is a modal-like operator which asserts
the truth of P( u) by default.
It is along these lines that we propose a formalization of a fuzzy non-
monotonic logic which integrates the concept of incomplete information states
due to the presence of degrees of membership of 0.5, with the notion of default
defined in terms of a preferential ordering on these incomplete information
states. As an extra feature, the logic belongs to the class of cumulative logics,
which are a subject of current interest.
The paper is structured as follows. In section (2), we consider general
issues regarding non-monotonic formalisms. In section (3), the propositional
version of a fuzzy non-monotonic formalism is described. In section (4), we
consider some properties of FNML3, in particular the property of cumulativity.
In section (5), we comment on future and related work. An extended version
of this paper has already been published as [4].
• A normative statement of the type "tall men are normally heavy" ,where
"tall" and "heavy" are fuzzy predicates is represented as the wff
LTall(x)/\MHeavy(x)-+DHeavy(x). Ma may be read as "it may be
the case that Heavy(x) is true (to a degree)". La may be read as "it
is the case that Tall(x) is true (to a degree)". Technically fuzzy logic
is extended with two additional truth-functional connectives M and L
where Ma is true when a is true or undecided and La is true only when
a is true.
3.2 Definitions
We begin with some definitions for both a truth and information ordering on
truth values, where the information ordering is extended to partial interpreta-
tions.
• Tr =TrT U Tr F U TrU
where
The values given to the sentence symbols could reflect either a degree-of-
information ordering or a degree-of-truth ordering which can then be extended
to partial interpretations. The degree-of-information ordering will be used to
compare partial interpretations, while the degree-of-truth ordering will be used
to evaluate formulas in a partial interpretation.
Ym E Mod(f) : m 1= a
where M od(f) denotes the class of all models for f. Preferential entailment
strengthens the notion of entailment by characterizing a preferred subclass
of M od(f), denoted by Pmod(f). A sentence a is said to be preferentially
entailed by f if it is satisfied by all models in Pmod(f). The set Pmod(f)
can be defined equivalently, by placing an ordering on M od(f). The subclass
of preferred models will then be those that are minimal relative to the defined
ordering. In our formalism, models are replaced by model frames (defined
below) and the preference on model frames is induced by the nature of the wffs
in the premise set.
Definition 3.6 (Model Frame) A model frame is a pair (~, u), where ~
is a (non-empty) set of interpretations and u E ~, is viewed as the actual
situation (interpretation). It is always assumed that u ~i v, for any v E~. If
u E~, then we write~" to denote the set {v E ~: u ~i v}.
The rules of satisfaction are defined relative to a model frame M = (~, u) and
an interpretation in ~. The following notation is used:
Let v I=M <pG, mean that v assigns the interval truth-value I, IE TrT(I E
TrF) to <p when 0 is +(- ),respectively. v I=M <p+ and v I=M <p- are abbrevi-
ated to val(<p, v, M) = I, IE TrT and val(<p, v, M) =
I, IE TrF, respectively.
The binary operators min and max are defined on Tr relative to the truth
ordering ~t. The function val is defined recursively as follows:
Furthermore, min is defined as: Let vale rp, v, M) is equal to either one of
the interval truth-values [x, y], [x, 0.5), or (0.5, y] and val(rp, v, M) is equal to
either one of [z, w], [z, 0.5), or (0.5, w].
The D Operator
In addition, the satisfaction rules are extended for the D operator as follows,
Points 1 and 2 clearly follow from the satisfaction condition for the default
operator. Point 3 will become clearer when the preference ordering on model
frames and the notion of preferential entailment is defined below.
Remark 3.1 The definition above prefers the model framers) that satisfy the
sentences in the context r using the minimal amount of information. If u = u',
prefer the framers) with the maximal number of interpretations in~. This is
only one of a number of alternatives. Another interesting alternative would be
to minimize only those propositional constants in the scope of the M connective,
thus providing a finer grained minimization criterion.
Theorem 4.2 (Right Weakening) If 0'-,8 E PE(i) and 0' E PEb) then
,8 E P E(i)·
The conditions of cautious monotony and cut together tell us that if plau-
sible consequences are later acquired as facts, then the original set of plausible
consequences remains unchanged. Such a property is useful, as it can make
the belief revision process normally associated with non-monotonic formalisms
more efficient.
Lemma 4.1 The rules of cut and cautious monotony may be expressed to-
gether by the following principle: if {3 E P E( 0') then P E( 0') == P E( 0'1\{3).
Theorem 4.5 (Or) If l' E P E( 0') and l' E P E({3) then l' E P E( O'V{3).
We strongly suspect that the OR rule holds in our system, but we have no
proof. However, the following weaker result is easily obtainable.
We say that a formula 0' E £ is positively persistent iff for any partial
interpret.ations u and v for £, ujjV and u(O')=T imply v(O')=T.
Theorem 4.6 For any r ~ £(8), any positively persistent formulas 0', {3 E
£(8), (4.5) holds.
The second important property of FNML3 is that for each set of premisses
r, there exists a unique set of formulas preferentially entailed by r. In default
logic and auto-epistemic logic, this is simply not the case, although one may
choose to extra-logically define entailment relative to the intersection of all
extensions or stable expansions, respectively.
5 Summary
In this paper, we've introduced a fuzzy non-monotonic logic which permits a
great deal of expressivity in the language. It has a sound and intuitive semantics
which we believe directly modehdhe characteristics normally associated with
default reasoning. The semantics follows naturally from the notion of partial
interpretations which are inherently connected with the use offuzzy predicates.
FNML3 has some nice formal properties and belongs to the class of cumu-
lative logics. At the present moment we are developing a decision procedure
for a subset of the language, based on semantic tableaux.
14
References
[1] Ernest W. Adams. The Logic of Conditionals. D. Reidel, Dordrecht, 1975.
[8] R. C. T. Lee. Fuzzy logic and the resolution principle. J. Assoc. for
Computing Machinary, 19:109-119,1972.
Sergei Ovchinnikov
Mathematics Department
San Francisco State University
1600 Holloway Avenue
San Francisco, CA 94132, U.S.A.
1. INTRODUCTION
. { lJ(b)}
I prod( b Ia) = Mill 1, lJ(a)
2. MAIN RESULTS
Therefore, R is a pre-ordering on A.
. { fla(X)} . { R(x, a) }
Ra (
x, )
y = Mill 1, fla(Y) = Mill 1, R(y, a)
PR(x,y) = 1 implies R(y, x) < 1, which implies Ri(y, x) < 1 for all i, which
implies Ri(z, y) < 1 and Ri(y, z) = 1 for all i. Since each R i is an ordering,
we have Ri(x, z) =1 and Ri(z, x) = Ri(z, y). R/y, x) < 1 for all 1.
We have now
binary relation.
I, if i > j,
R(x., x.) = ., -
{ J -I 'f'
1 J E ,I 1 < J..
PR(Xj' xi) = 1 implying j > i, a contradiction. The case when R(xi' Xj) < 1
is trivial by definition of E.
-, €
for all x E A',
R (xmin' x)
where 0 < €
-,
< Mln{ R(x, x max ) . R (xmin' x)}.
Let us prove that thus defined R is an ordering on A such that
R(a, b) = R(a, b) and R ~ R.
We have
Now, R(x, y) ::; R(x, y) for all x and y in A' by the induction
hypothesis. If R(x max ' x) < 1, then PR(x, x max ) = 1, which is impossible
since x max is a maximal element. Therefore,
R(x max ' x) = 1 = R(xmax ' x).
We also have
€
-,
R(x, x max ) . R (xmin' x)
-, < -, = R(x, xmax ).
R (xmin' x) R (xmin' x)
We proved that R ~ R.
Otherwise, only x can be the maximal element x max , for R(t, x max ) < 1 for
all tEA'. Then, by definition of R, R(x max ' z) = 1. Suppose
R'(z, xmin) < 1. Then PR(xmin' z) = 1, which is impossible since xmin is a
minimal element. Therefore, R'(z, xmin) = 1 and R'(y, z) = R(y, z) = 1.
By the induction hypothesis, R' is an ordering. Therefore,
R'(xmin' z)· R'(z, y) = R'(xmin' y)
and
€. R'(z, y)
R(z, x max ) -, R'(xmin' z)· R'(z, y)
R (xmin' z)
-, €
= R (z, y) . R-( . ) R(z, y). R(y, x max ).
x mlll ' y
o
Let us denote O(A), ~O(A), and n~(A) the sets of all ordereings,
pre-orderings, and qausi-transitive relations on A, respectively. It follows
from theorems 2 and 3, that any ordering is a pre-ordering and quiasi-
transitive relation. In other words, O(A) ~ ~O(A) n n~(A). The following
theorem shows that orderings are the only fuzzy binary relations satisfying
this property.
3. CONCLUSION
REFERENCES
[1] Aczel, J. and Alsina, C., Synthesizing judgements: a functional equation
approach, Mathematical Modelling 6 (1987), 311-320.
[2] Alsina, C. and Trillas, E., Synthesizing implications, to appear in
Journal of Artificial Intelligence.
[3] Fodor, J. and Roubens, M., Preference modelling and aggregation
procedures with valued binary relations, (to appear).
[4] Hardy, G.H., Littlewood, J.E., and Polya, G., Inequalities (Cambridge,
The University Press, 1934)
[5] Mirkin, B.G., Group Choice (Winston, Washington, D.C., 1979)
[6] Ovchinnikov, S.V., Choice theory for cardinal scales, in: M.M. Gupta
and E. Sanchez (eds.), Fuzzy Information and Decision Processes
(North-Holland Publishing Company, 1982), 323-336.
[7] Ovchinnikov, S.V., Representations of transitive fuzzy relations,
in: H.J. Skala, S. Termini, and E. Trillas (eds.), Aspects of Vagueness
(D. Reidel Publishing Company, 1984), 105-118.
[8] Ovchinnikov, S., Means and social welfare functions in fuzzy binary
relation spaces, in: J. Kacprzyk and M. Fedrizzi (eds.), Multiperson
Decision Making Using Fuzzy Sets and Possibility Theory
(Kluwer Academic Publishers, 1990), 143-154.
[9] Szpilrajn, E., Sur l'extension de l'ordre partiel, Fund. Math.
16 (1930), 386-389.
[10] Trillas, E. and Alsina, C., Some remarks on approximate entailment,
International Journal of Approximate reasoning, 6 (4), 525-533.
[11] Trillas, E. and Valverde, L., On implication and indistinguishability in
the setting of fuzzy logic, in: Management Decision Support Systems
Using Fuzzy Sets and Possibility Theory, Verlag TUV Rheinland (1985)
PREFERENCE MODELLING AND AGGREGATION
PROCEDURES WITH VALUED BINARY RELATIONS
Janos C. Fodor*
Lorand EOtvos University
P.O. Box 157, H-1502 Budapest 112, Hungary
Ma,rc Roubens
University of Liege
Avenue des Tilleuls, 15, B-4000 Liege, Belgium
Abstract
In this paper a recent axiomatic approach to fuzzy preference mo-
delling is summarized. These results are applied to multiple criteria
decision making problems in order to find aggregation rules which give
the same global strict preference independently of their use before or
after individual considerations.
This definition implies that R is a reflexive relation, i.e., aRa holds for any
aE A.
Three binary relations corresponding to the given preference relation Rare
also defined as follows:
These relations form a preference structure (P, I, J) and are linked together:
PuI = R, (1)
• Partially supported by OTKA.
29
R. Lowen and M. Roubens (eds.J, Fuzzy Logic, 29-38.
© 1993 Kluwer Academic Publishers.
30
PnI 0, (2)
PnJ 0, (3)
InJ 0, (4)
puIuP- 1 Ru R- 1 . (5)
(6)
In what follows only continuous t-norms and t-conorms are considered. A key
role is played by strong (or Lukasiewicz-like) De Morgan triples (T,S,n), i.e.,
for which
(S) Symmetry:
i(x, y) and j(x, y) are symmetric functions.
Let a, b E A and denote x = R(a, b), y = R(b, a) for short. We can translate
properties (1) and (6) as a system of functional equations:
Theorem 1 Assume that axioms (IA), (PA) and (S) hold. If < p, i,j, T, S, n >
fulfils (8) and (9) then
(e) P U p- 1 U I u J = A x A] i.e.]
S(P(a,b),p-1(a,b),I(a,b),J(a,b)) = 1 for all a,b EA.
then there exists an automorphism 1j; of the unit interval such that P is
£1/1 -tmnsitive (P(a, b) 2:: 1j;-l(max{ 1j;(x) + 1j;(y) - 1, O}) for every a, b, c E
A).
where T 1 and T 2 are t-norms. In this case we. have the following result (see
[11]).
Theorem 2 Assume that p, i, j are defined by (10). Then < p, i, j, T, S, n >
fulfils (8) and (9) if and only if there exists s E [0, +00] such that
T1(x,y) = cp-l(TS(cp(x),cp(y))),
T2(X, y) = cp-l(T1/s(cp(x), cp(y))),
with the notation 1/0 = +00, 1/ + 00 = 0] and where cp is the same automor-
phism as in the representation of (T, S, n) and
max{x + y - 1, O} if s = 0
xy if s = 1
TS(x, y) = min(x, y) if s = +00
{
logs (1 + V-;~~Y-l)) otherwise
Rj : A xA -4 [0,1]
(1) a (crisp) complete preorder (Pj , I j ) on the set of actions A is given and
(2) a valuation vj(a) is made for every a E A on the j-th criterion - the higher
vj(a), the better the action satisfies the decision maker - and
where Ii : [0, 1F
[0, 1] is nondecreasing in both arguments and
-4
Figure 1
34
(3) a fuzzy interval ttj(x) (Le., a fuzzy set of the real line which is normal and
convex and hence every Q;-cut is a closed interval of the real line) related
to any a E A for criterion j is given and
Rj(a, b) = supmin[J.Lj(x),tt~(y)].
x;:::y
R1,.··,Rm
complete,
negatively transitive
R
:/~ P1, ... ,Pm
complete, antisymmetric,
negatively transitive transitive
~ P
antisymmetric,
~
P'
antisymmetric,
transitive transitive
J1 {j I Aj :S min(xj, Yj)},
J2 {j IXj <Aj:SYj},
J3 {jIYj<Aj:SXj},
J4 {j I max(xj,Yj) < Aj}.
36
Then obviously, the left hand side of (11) can be expressed as follows :
while the right hand side of (11) is given according to the next expressions:
and
Closing this section, consider case (1). Suppose that the relative impor-
tances of criteria are given by WI, .. . , Wm E [0,1]' respectively with Lj Wj = 1.
Define
p+(a,b) = L Wj, p=(a, b) = LWj and p-(a,b) = p+(b,a).
aPjb aljb
Then, obviously,
and
R(b,a) = LW.iRj(b,a) =p-(a,b)+p=(a,b).
j
References
[1] C. Alsina, On a family of connectives for fuzzy sets, Fuzzy Sets and Systems
16 (1985) 231-235.
[2] M. Baas and H. Kwakernaak, Rating and ranking of multiple aspect al-
ternatives using fuzzy sets, A~domatica 13 (1977) 47-58.
[3] D. Dubois and H. Prade, Weighted minimum and maximum in fuzzy set
theory, Inform. Sci. 39 (1986) 205-210.
[4] D. Dubois and H. Prade, On the ranking of ill-known values in possibility
theory, Fuzzy Sets and Systems 43 (1991) 311-317.
[5] J. C. Fodor, Strict preference relations based on weak t-norms, Fuzzy Sets
and Systems 43 (1991) 327-336.
Patrik EKLUND
Abo Akademi University, Department of Computer Science, SF-20520 Abo, Finland
Werner GAHLER
Universitat Potsdam, Fachbereich Mathematik
Am Neilen Palais, D 0-1571 Potsdam, Germany
Abstract
In this paper a type of completions, called Kowalsky comple-
tions, is constructed. Under some assumption, Kowalsky comple-
tions are special compactifications, called Richardson compactifi-
cations. The completions and with that also the compactifications,
considered here, depend on a fixed monad. Besides the general
case, we focus our attention on two special cases, namely that of
fuzzy filters and that of well-behaved fuzzy filters.
1. Introduction
first case, we only consider one condition, denoted (Bl). It is needed for
constructing the Kowalsky completions. In the second case besides (Bl)
the further conditions (B2) to (B5) appear. (Bl) to (B5) are used for the
Richardson compactifications. These conditions altogether guarantee
that the respecting completions are compactifications.
Sections 3 and 4 deal with the fuzzy filter case. We point out that
in this case conditions (Bl) to (B4) are satisfied, whereas (B5) may not
be fulfilled. Because of this fact, in section 5 we additionally consider
a further case, the so' called well-behaved fuzzy filter case. In this case
(Bl) to (B5) are all satisfied.
Sections 6 and 7 are mainly about definitions. Besides the notion
of regularity for limit spaces an analog notion is introduced for Cauchy
spaces, called Cauchy regularity. Both these notions are defined by
means of /1. It is shown that the associated limit structure of a Cauchy
regular Cauchy space is regular.
Sections 8 and 9 consist of the main part of this paper. They are
devoted to the constructions of Kowalsky completions and Richardson
compactifications. As in the classical case of Richardson compactifica-
tion, regularity plays an important role. In generalizing a well-known
property of the classical Richardson compactification we have that each
continuous mapping from a separated limit space A to a separated, com-
pact and regular limit space is uniquely extendable onto the Richardson
compactification of A. For Kowalsky completions an analog result holds
related to Cauchy regularity.
Let SET denote the category of sets and PROSET the category of pre-
ordered sets (prosets) with the isotone mappings between prosets as
morphisms. Frequently a covariant functor <I> : SET - t PROSET will
be written as a pair (¢J, :::;), where ¢J is the underlying set functor of <I>,
that is, ¢J is the composition of <I> with the underlying set functor of
PROSET. Each covariant functor <I> : SET - t PROSET assigns to each
set X a proset <I>X = (c.pX,:::;) and to each mapping f : X - t Y an
isotone mapping c.p f : (c.pX, :::;) - t (c.pY, :::;). c.p : SET - t SET is the under-
lying set functor of <I>. Concerning examples we refer to [2,3]. In this
paper we will only recall one of them, namely the example of fuzzy filter
functor. It will be considered in the next section.
In the following let a covariant functor <I> : SET -t PROSET and a
41
monad (cp, "1, p,) over SET be fixed, where cp is the underlying set functor
of <I>. Recall that "1 : id --t cp and It: cp 0 cp --t cp are natural transforma-
tions consisting of mappings "1x : X --t cpX and p, : cpcpX --t cpX, where
id: SET --t SET is the identity set functor (for details see e.g. [3]).
For the completion and compactification constructions we need some
assumptions. These conditions will be listed in the following.
Assumption on <I> and (cp, "1, p,) for completion constructions
For completion constructions only the following condition will be
needed.
(Bl) <I> is ranging in SEMIPLAT and for each set X, P,x : (cpcpX,~) --t
(B2) For each set X and M E cpX there exists an ultra <I>-object U on
X such that U ~ M.
(B3) For each mapping f : X --t Y and for each ultra <I>-object U on X,
cpf(U) is an ultra <I>-object on Y.
There exists the submonad (cp', "1', p,') of (cp, "1, p,) with respect to
the subfunctor cp' of cp (defined in a canonical way, see [3]).
42
f /\ 9 is defined componentwise.
The fuzzy filter functor FL : SET ~ SET assigns to each set X the
set FLX of all L-fuzzy filters on X and to each mapping f : X ~ Y the
mapping FLf: FLX ~ FLY defined for each M E FLX and 9 E LY by
Endowing each set FLX with the inversion ~' of the componentwise
defined partial ordering :S' :
"1X(x)(f) = f(x)
JLX(U) =UoE
for all U E c.p'c.p' X, where e is the inclusion mapping of c.p'X into c.pX
and E' : LX ~ L'P' X is the mapping f I--t E(f) 0 e.
43
For (F L, 2:') and the fuzzy filter monad (F L, "7, J.L), L being a linearly
ordered complete lattice, conditions (Bl) to (B4) are all satisfied. In
particular, the ultra fuzzy filter functor UL can be defined.
Problem: In the classical case L = {O, I} (the usual filter case)
there exists the submonad of (F L, "7, J.L) related to UL, namely the ultra
filter monad, that is, in this case also (B5) is satisfied. However, already
in the case of L = {O,!, I}, (B5) is not fulfilled, which will be shown at
the end of the next section.
To remedy this situation, instead of FL we consider a subfunctor
arising from so-called well-behaved fuzzy filters. Section 5 is devoted to
this subfunctor.
(3) For each f E LX there exists the greatest element h of {g E Big :::;
f} and we have h = f 1\ sup h.
iI 12 fa f4 f5 f6
° °1
1 1
U1 2 1 1 2
° °
1 1
U2 2 2 1
° °
1 1 1
Ua 2 2 1 2
° °
1 1 1
U4 2 2 2 1
There are sixteen ultra fuzzy filters on ULX = {UI, ... ,U4}. Let U
be that one for which the main part of the large base consists of the
°
mappings 9 : ULX - 4 Land h : ULX - 4 L defined at U1 , ... ,U4 as
follows: The values of 9 are resp. ~,O, 0, and of hare resp. 0,1,0. !'
Let E' : LX - 4 LULX be the mapping for which E'(f)(Uk) = Uk(f) for
all f E LX and k = 1, ... ,4. Then U 0 E' : LX - 4 L is the fuzzy filter
descibed as follows:
45
UoE' 1
"2 o 1
"2 o 1 1
"2
Obviously, U 0 E' is not one of the above ultra fuzzy filters Ul, ... ,U4.
In the following results on ultra fuzzy filters the notion of fuzzy filter
base is used. Let L be a completely distributive complete lattice, and
let M a fuzzy filter on a set X.
Proof. For each f E LX, for which sup(f 1\ g) = supf I\supg for
all 9 E baseM, baseM U {f 1\ gig E baseM} is a base of a fuzzy filter
N?:.M. Because of that, the assertion easily follows. 0
Proof. Fix f E LX such that sup(f I\g) = supg for all 9 E baseM
with sup 9 :S sup f, and put a = sup f. Then for all 9 E baseM with
sup 9 > a we have sup(f I\g) = sup(f I\g Ni) = sup(g I\a) = sup f I\sup g.
o
Proof . The first part of the assertion is easily seen. Assume now
that M is an ultra L-fuzzy filter. Fix a mapping f : X ~ La such that
sup(f 1\ g) = sup 9 for all 9 E baseM a with sup 9 :S sup f. Because of
Corollary 1 it follows f E baseM and therefore f E baseM a . Thus, M a
is an ultra La-fuzzy filter. 0
46
For sake of simplicity we assume in the sequel that the following condi-
tion is fulfilled:
f(x) = V ,8
xEM/3
(3'
f
,8
x
J.1x(M) = U n
MEM:FEM
F.
6. Limit Spaces
Let <P be a covariant functor from SET to PROSET and (tp, TJ, 1£) a monad,
where tp is the underlying set functor of <P. Assume that tp is connected,
Le. tpI is a singleton. Then TJ is uniquely given by tp (see [3]).
Let X be a set. A tp-convergence structure t on X, L e. a subset t
of tpX x X, is called a <P-limit structure or a <P-pseudo-topology if the
following conditions are satisfied:
grt
'{)X ,-----. X
Note that ILx 0 '{)tl and '{)t2 are both mappings from '{)grt to '{)X. As
in [5], (X, t) will be called /L-regular iffor all M E '{)grt and y EX, from
(/LX 0 '()tl)(M) T x it follows '()t2(M) T x.
In the filter case IL-regularity coincides with the usual regularity of
a limit space, as has been shown in [5].
(C3) If M,N E s and {M,N} has a lower bound in (cpX, :sJ, then
there is an upper bound U E s of {M, N}.
8. Kowalsky Completions
(Jtx 0 cp..\)(M) = U n
F>"EMxEF>"
..\(x) = {F I FA EM},
K -- M~
S/\
{:::=:> (p,x ° cp/'i,)(K) E M~ for all /'i, E r.
Separatedness is trivial. D
~lr
(Y,u)
u. Hence, for each /'i, E r, cp f 0 /'i, has a factorization i 0 aK. with aK. a
mapping of X/\ into u.
Because of the assumption f/\ = v' 0 aK. is a mapping of X/\ into Y
which is independent of /'i,. /'i, 0 /, = fix and the separatedness of v imply
(f/\ 0 /')(x) = (v' 0 cpJ)(flX(X)) = (v' 0 1]Y)(f(x)) = f(x) for each x E X,
and therefore f/\ 0 /, = f.
Fix M~ E X/\ and K E cpX/\ such that K - M~ and hence (/-Lx 0
SA
In the sequel assume that the conditions (Bl) to (B5) are fulfilled.
Let A = (X, t) be a separated ep-limit space and let s consist of all
elements M of cpX converging to some x EX, together with all non-
convergent ultra ep-objects. It is easily seen that (X, s) so becomes a
ep-Cauchy space and t is the associated ep-limit structure. As in the pre-
ceeding section, let X/\ be the corresponding set of equivalence classes.
Note that all ultra ep-objects on X are members of these equivalence
classes. Let also /, : X - X/\ be defined as in the preceeding section.
Here only one choice function /'i, will be used which is given through
flx(X) and /'i,(U~) = U for all x E X and all non-convergent
/'i,(flX(X)~) =
ultra ep-objects U.
The ep-limit structure s/\ defined with respect to r = {/'i,} as in the
preceeding section will be denoted t/\.
into a separated, compact and regular <I>-limit space. Then there exists
precisely one continuous mapping fll : All --t (Y, u) such that f = fll 0 L.
Proof. In the following let A* = (XII, t*) and (Y, u') be the <I>-Cauchy
spaces whose structures t* and u' resp. consist of all convergent objects
with respect to til and u. (Y, u') is complete and Cauchy regular. A
mapping of All into (Y, u) is continuous if and only it is - as mapping
of A* into (Y, u') - Cauchy continuous. Since f : (X, s) --t (Y, u') is
Cauchy continuous, the assertion therefore follows from Proposition 10.
o
56
References
INTRODUCTION
In this paper we identify for a fuzzy topological space (X, ,6,) a
collection VeX) of new points, some or all of which can be appended to X in
order to produce various compactifications of X. Specifically, we consider
compactification and ultra-compactification of (X, ,6,). VeX) has its roots in
Shanin's generalization of Wallman's construction as given in [14]. Our
construction is analogous to (Shanin's generalization of) Wallman's
compactification for topological spaces in that we explicitly describe the
closed sets and convergence of prefilters in the compactification; in fact, it
coincides with Wallman's compactification if (X, ,6,) is topologically
generated. Thus our compactifications are good extensions of Wallman's
compactification to the fuzzy setting. Our construction coincides with (and
extends) the corresponding compactifications given in [1] for fuzzy
neighborhood spaces. However, the constructions given here apply to all fuzzy
topological spaces; no separation properties are required nor is (X, ,6,)
restricted in any way. Thus our construction has advantages over previous
fuzzy compactifications in e.g. [1], [2], [4]' and [12], which apply to a smaller
class of fuzzy spaces (sometimes only to topologically generated spaces).
PRELIMINARIES
We assume familiarity with most of the concepts and notations in
the realm of fuzzy topology. Nevertheless, we recall here some of those which
are particularly needed in this paper. We shall work only with real-valued
(not arbitrary lattice-valued) fuzzy sets; i.e., a fuzzy subset of X is a function
p,:X -t I where I denotes the unit interval I = [0, 1]. We shall also have
occasion to use 10 = (0, 1] and 11 = [0, 1). We require all fuzzy topological
spaces (X, ,6,) to be fully stratified; i.e., r E ,6, for all I' E I where r denotes
the constant function with value r. The (ordinary) topology on X generated
by the collection of all sets of the form p, -1 (Ct, 1] where Ii E,6, and Ct E I is
denoted i(,6,). If r is a collection of fuzzy sets we denote by r C the collection
of all its pseudo-complements; i.e., p, E r iff (1 - p) E r C. A collection ir of
fuzzy subsets of X is called a prefilter provided
57
a) 0 ~ lr
b) ifJ.L Elrandl/ Elr, then J.L 1\ 1/ Elr
c) if J.L 2: 1/ for some 1/ E If, then J.L E If
A collection If C D. c is called a closed prefilter if it satisfies a) and b) above
and
c/ ) if J.L 2: 1/ for some 1/ E lr and J.L E D. c , then J.L E lr·
A collection lB of fuzzy subsets of X is called a prefilter basis provided
a/) 0 ~ lB
b/) if J.L E lB and 1/ E lB, then there is some 'Y E lB for which
'Y :S J.L 1\ 1/.
If lB C t.c is a prefilter basis, then lB is called a closed prefilter basis; if
furthermore, lB C Bet.c where B is a basis for D. c, then lB is called a B-
closed prefilter basis.
If 6 C IX, then the character of 6 is the real number
c(6) := 1\ { V J.L(x): J.L E 6}; if lr is a (closed) prefilter, then c(lf) is just
the infimum xo¥he values of the constant functions in the prefilter lr. If lB
C IX satisfies the FIP (J.Lll\ I-t2 1\ ... 1\ J.Ln #- 0 for all finite collections I-t l ,
I-t?, ... , J.Ln E lB), then [lB] denotes the smallest prefilter containing lB and is
called the prefilter generated by lB; if lB does not satisfy the FIP, then [lB] is
defined to be IX and in this case c([lB]) := O. If J.L E IX then we denote by [I-t]
the prefilter generated by {J.L}. If Q: is a filter on X then w( Q:) stands for the
prefilter generated by {I E: EEQ3}. Iflr, ID E IX, then lfVID = [lfUID];
if this is a prefilter, it is called the prefilter generated by If and ID. A subset
A of a fuzzy topological space (X, t.) is called dense if it fulfills the property
that for all J.L E D., sup{J.L(x): x E A} = sup{J.L(x) : x E X}. The adherence of
a prefilter !Jl is defined as adh !Jl = 1\ {v : 1/ E !l!} where v denotes the
closure of 1/. A fuzzy topological space (X, t.) is said to be compact provided
sup{(adh !Jl)(x) : x EX} 2: c(!Jl) for all prefilters!l!. Equivalently, (X, t.)
is compact if and only if sup{(adh lB)(x) : x E X} 2: c(!l!) for all B-closed
prefilter bases lB, where B denotes any preselected basis for t.c (B = D. c is
permitted).
An extension (Y, r) of a fuzzy topological space (X, t.) is called a.
compactification of X if X is densely embedded in Y and Y is compact. For
basic results on compactification in topological spaces we refer the reader to
[13) and [14]. For discussions of compactness notions in fuzzy topological
spaces, we refer the reader to [3), [8), and [9).
X* we extend the closed fuzzy sets in X to X* and then use these as a basis
for the closed fuzzy sets in X*. Given jl E ~c we define jJ,(x) := jl(x) for all x
E X; if m1 E X* - X, then m1 E V(X) and we define jJ,(m1) := c([jl] V w(m1)).
jJ,(m1) can be characterized as the infimum of the constants l' so that jl(x) <
l' for all x in some M E m1:
jJ,(m1) =
inf sup jl(x)
MEm1 xEM
Proof. The verification of (1) is trivial. For (2) and (3) we first
remark that if ~, () E 6..c satisfy () :::; ~ then iJ:::; ~ so we already have
jJ, V v :::; /-L Vv and /-L Av :::; jJ, /\ V. Now let !JJ1 E \X* - X) satisfy /-L Vv(!JJ1) >
o and observe that if Q E II is such that (/-L V vr [Q, 1] E!JJ1 then, since !JJ1 has
the prime property and (/-L V vr 1[Q, 1] = /-L-l[Q, 1] U v- 1 [Q, 1],
either /-L-l[Q, 1] E!JJ1 or v- 1 [Q, 1] E!JJ1. Thus
1
/-L V v(!JJ1) = sup{Q Ell : (/-L V vr [Q, 1] E!JJ1}
:::; sup{Q E II : /-L-1[Q, 1] E!JJ1} V sup{Q E II : v- 1 [Q, 1] E!JJ1}
= jJ,(!JJ1) V v(!JJ1).
Analogously if Q E II and (3 E II are such that It- 1 [Q, 1] E!JJ1 and v- 1 [(3, 1] E!JJ1
then by the maximality of !JJ1 and the fact that
It- 1 [Q, 1] n V-I [(3, 1] C (/-LI\ vr 1[c¥ 1\ (3, I]
1
we have (It 1\ vr [Q 1\ (3, 1] E!JJ1. Thus
jJ,(!JJ1) 1\ v(!JJ1) = sup{Q El : /-L-l[Q, 1] E!JJ1} 1\ sup{(3 El : v- 1 [(3, 1] E!JJ1}
= sup{Q 1\ (3 : /-L-1[Q, 1] E!JJ1 and v- 1 [(3, 1] E!JJ1}
1
:::; suph Ell : (/-LI\ vr [-y, 1] E!JJ1}
= /-L Av(!JJ1).
As a consequence of this proposition the family B* = {jJ, : /-L E 6.. C} is
a basis for the closed fuzzy sets of some fuzzy topology on X*, which we shall
denote 6..*.
If X is not compact, then there is a closed prefilter basis !ll for which
sup{(adh lB)(x) : x E X} < c(!ll). It then follows that /-L-l[Q, 1] f. 0 provided
/-L E!ll and Q < c(!ll). Since!ll is a closed prefilter basis, the set ~(!ll) =
{ /-L-1[Q, 1] : /-L E!ll and Q < c(!ll)} is a ~(6..)-family and since adh !ll < c(\'Il) ,
~(\'Il) is a vanishing ~(6..)-family. Let !JJ1(\'Il) be a maximal ~(6..) family
containing ~(\'Il); thus !JJ1(\'Il) is also vanishing. Let
V*(X) = {!JJ1(\'Il):\'Il is a closed prefilter basis for which sup (adh \'Il)(x) < c(\'Il)}
xEX
jl-1[ex, 1] = I-L -1[ex, 1] U {!JJ1 E V(X) : f-L - \8, 1] E!JJ1 for all {3 < ex}
P.
for all f-L E c and ex E 11, Let (F)j E J be a subfamily of mwith. n Fj =0
and write FJ" := jl~1[exJ"'
J
1]. Then J EJ
F· = p. U Q.
A •
and in particular
jEJ
n p. = jEJ
J
n Q. = 0 J
(*)
(r) :3 K C J with n
jEK
Pj = 0 and :3 L C J with n
jEL
Qj = 0.
Then K U L C J and n
j E K uL
Fj = 0.
62
(2°) V K C J, n
j EK
Pj i= 0.
This means that (P)j E J is a m(b.)-family which thus is contained in a
maximal m(b.)-family ml and which by (*) is vanishing. For each j E J we
now have
jJ-~l[Ct.,
] ]
1] = p.] E ml
and thus, again by the Lemma flj(ml) ~ Ctj' This implies that ml E n Qj
which by (*) is a contradiction. j EJ
(3°) V L C J, n Q i= 0.
jEL
j
If then L C J and ml E n{Qj : j E L} and if for each j E J we take f3j < Ctj it
follows again by the Lemma that jJ- jl([f3 j , 1]) E ml for all j E L. Since this
holds for all L C J and all choices of f3j < Ctj it follows that the whole family
{jJ-~1[f3, 1] : j E J, f3 < Ctj}
is a m(b.)-family and therefore is contained in some maximal m(b.)-farnily
ml. Now if ml is non-vanishing, there exists x E X such that jJ-/x) ~ f3 for
all j E J and f3 < Ct, and thus n {Pj : j E J} i= 0 which is a con~radiction. If
ml is vanishing then it follows from its very definition that ml E Qj for all j E J
which is also a contradiction. This shows that of the three cases which we
have considered only the first one can occur. Alexander's Subbase Lemma
then indicates that /.(X) is compact. Again Proposition 1(1) implies that X is
dense in X so that (X, Li) is an ultra-compactification of (X, b.).
Because of the relationship of this compactification to the Wallman
compactification for topological spaces, we shall call it the Wallman ultra-
compactification of (X< b.).
c
o := ~ VII (3
r [ ,1) E Ll .
and thus
sup J1f\O(x) = sup{O': J1- 1[0', 1] n 0- 1[0',1] i=- 0} = 1.
xEX
By maximality of lr' this implies that 0 E lr' and thus C1 [,8, 1] =
0- 1 [,8, 1] E 8(lr') which is a contradiction. Consequently 8(lr') is a vanishing
maximal !D(6.)-family and 8(lr') = Wl(lr').
Thus to each FNS new point lr' E Rc(X), there corresponds one of our
new points 8(lr') E V*(X).
In what follows, for each J1 E 6.c and 0' E I we shall put
J10' : = J1 V 1 -1 .
J1 [0', 1)
Again by Theorem 4.4 [17] we know that J1 E 6.c implies J10' E 6.c.
defined by o*(x) := X for all x E X and o*('if) := o(tr) for all 'if E R(X) is a
homeomorphism. 2.* defined by 2.*(x) := x for all x E X and 2.*(m1) := 2.(m1)
for all m1 E V(X) is in each case the inverse of 0*. Furthermore it = j.l 0 0*
and j.l = it 0 2.* hold for any P E tlc.
Proof. From Proposition 4 we already know that 0* is a bijection.
Let P E tlc, Ir E Rc(X), and EE I(p, Ir). Then EE 10 , (J.l + () 1\ 1 E Ir , and
for all (3 E II we have
J.l-l[(3 - E, 1] = [(J.l + E) 1\ 1] -1[(3, 1] E o(Ir)
Thus by the Lemma, (3':'" E:::; j.l(o(Ir)] for all (3 E 11 and then
1 - E :::; j.l(o(tr)]. Consequently it :::; j.l 0 0*.
Conversely, if a < j.l(o(tr)], then p- 1 [a, 1] E o(Ir) and ~-1[(3, 1] E o(tr)
for all (3 E 10 and ~ E Ir so that
r
p-l[a, 1] n 1[,6, 1] =F 0
for all ,6 E 10 and ~ E Ir. Thus
sup(J.l+1-a) 1\ ~(x) = 1
x EX
and 8* are continuous since the inverse image of each basic fuzzy closed set is
then a fuzzy closed set. This completes the proof.
REFERENCES
REFERENCES
77
R. LowenandM. Roubens(eds.), Fuzzy Logic. 77-81.
© 1993 Kluwer Academic Publishers.
78
REFERENCES
M.W. WARNER
§l. Introduction
</>(x) = {i\ E I
pt(L) i\ ~ x} 't:jX E L
x x pt(L) where </>: Pf(X) ----7 P(X x pt(L)) is the frame morphism
defined by
This map </> will be injective if and only if the frame Pf(X) is
spatial. [Warner 1991] has shown that this is the case if and
only if L is spatial.
I
</>(A) = {(X,A) A ~ A(x)} VA E T
t£ = {[O,a) Ia E U
x
A
E U, YIJ. E V, and (Vz E X) U(Z) = ° or V(z) = 0.
1: = {U E P(X) XuI E T}
{t ELI t :j; A}
a E g ,x E hand ¢(g A h) 0,
q x p x x x
or equivalent with
g (a)
x
:$ IJ., h (x)
x
f A and (Vz E X)g (z) =
x
° or h x (z) = 0.
Now
V({f} u {h
x
Ix E
1
f- ([0,AJ)}) f A
1
so by compactness there are xl' ... , x E f- ([0,A]) with
n
f v h v ... v h ~ A.
xl x
n
1
Now if y E f- ([0,A]) there is an r E {l, .. " n} with h (y)
x
r
f A and it follows that g
x
(y) 0. Define
r
G
q
G (a)
IJ.
f IJ. and G (y) =
. IJ.
° (Vy E f
-1
([O,A])).
Define r by
a
r (a) = 1
a
and r (y) =
a
°
Now define g by
g = V{r
a
Ia E
1
f- ([O,i\))}
then
gET, g(y) = 0
1
(Vy E f- ([O,i\))), g(y) = (Vy E f
-1
(L -
[O,i\]J).
A. Blilbtil
1985. On the connection between the countability proper-
ties of (X,w(J) and (X,J), Fuzzy Sets and Systems
15, 91-97.
M.S. Eroglu
1989. On a topological model for the category of fuzzy to-
pological spaces 1, Fuzzy Sets ahd Systems 32, 327-
336.
G. Gierz et al
1980. A compendium of continuous lattices, Springer
Verlag, Berlin.
S. Gottwald
1981. Fuzzy points and local properties of fuzzy
topological spaces, Fuzzy Sets and Systems 5, 199-
201.
C.M. Hu
1985. Fuzzy topological spaces, J. Math. AnaL AppL 110,
141-176.
P. T. Johnstone
1982. Stone Spaces, Cambridge University Press.
A.J. Klein
1987. When is a fuzzy topology topological?, Rocky Mountain
J. Math. 17, 15-18.
R. Lowen
1978. A comparison of different compactness notions in
fuzzy topological spaces, J. Math. AnaL AppL 64,
446-456.
S.E. Rodabaugh
1980. The Hausdorff separation axiom for fuzzy topological
94
M.W. Warner
1989. A note on the relation between G- and Q-theories for
first countability and sequentiaiity, Fuzzy Sets and
Systems 33, 393-396.
1. INTRODUCTION
A fruitful approach to fuzzy set theory is to characterize a fuzzy
set u in terms of its level sets [u].B, (3 E I. Then, for many pur-
poses, the most useful way of considering a fuzzy valued function
F is to model it as a family of set-valued functions {Fp }.BEl. From
this point of view, the subject has a decidably geometric flavour
and many techniques and results serve as generalisations and ex-
tensions of multifunctions and set-valued analysis. Results along
these lines include study of metric spaces [3],[4], theoretical sta-
tistical techniques [2], [7], [8], Optimization Theory [5], [9] and
differential equations [6].
This paper addresses the question of representation by a single-
valued function. More precisely, let (£n, dp ) be the space of normal
fuzzy convex fuzzy sets on ~n, suitably metrized (see Section 2),
let Z ~ ~k and suppose that (0, A) is a measurable space. Con-
sider a mapping F : 0 X Z ~ £n. We study the representation of
95
R. Lowen and M. Roubens (eds.), Fuzzy Logic, 95-101.
© 1993 Kluwer Academic Publishers.
96
V(w,z)EnxZ, and,8EI,
[F(w,z)].B = {!(,8,w,z,:v) : :v E B n } ,
and ! is continuous in (z,:v) for each (,8, w) aIid measurable in w
for each (z,:v).
Various definitions, known results and preliminaries are set out
in the next section and section 3 sketches the proof of the
parametrization representation.
2. PRELIMINARIES
Let IC eo denote the space of nonempty convex compacta in !Rn .
and let £n denote the class of normal fuzzy convex uppersemicon-
tinuous fuzzy sets on !Rn , with compact support.
If u E £n, then for each 0 < a :s
1, the a-level set [u]a =
{:v E !Rn : u(:v) 2: a} is a nonempty compact convex subset
of !Rn , as' is the support set [u]O ~ The linear structure of IC
induces addition u + v and scalar multiplication cu, c E !R+, on
oo
£n in terms of the a-level sets in the following way: for u, 11 E £n
[u + v]a = [u]a + [v]a [cu]a = c[u]a, for all a E 1= [0,1].
To ~ach K E IC eo there corresponds a support function
c(sn-l, !R), where sn-l is the unit sphere in !Rn ,
8K E
boo (A, B) = min{ inf sup lIa- bll, inf sup lIa - bll}.
aEAbEB bEBaEA
where c is independent of F.
3. THE PARAMETERIZATION
The principal result of this paper is:
Theorem 4. Let (0, A) be a measure space and let Z ~ ~k.
Let F : 0 X Z ~ £n be Caratheodory. Then there exists a
Caratheodory parametrization on I x 0, ! : I x 0 x Z x B n ~ ~n
such that for all (w, x) E 0 x Z,
hoo(G(ak,w,z),G(a,w,z)) ---70
as ak i a E I or ak 1 a = 0 in I. It follows that IIG(ak,w, z)11 ---7
IIG(a,w, z)11 under the same restrictions on ak, a. Then define the
set-valued map H: I x 0 x Z X ~n ~ KeD by
and
-
Corollary 6. If u : [0, T] - t £n , 0 < T < 00, is continuous in
the doo norm, then for the parametrization
! : I x [0,1] x B n - t !Rn ,
!(·,a,p) is continuous for all a E I and p E B n . Moreover, the
continuity is uniform in t over I X B n .
Proof. Let Z = [0, T] and consider the set-valued function
G(a, z) = [u(z )]0:. This is boo-continuous in t for each fixed a. So
IIG(a,z)11 is continuous in t for each fixed a E I. In the notation
of the proof of Theorem 4, set <I> ( a, z, x) = H( a, z, x) G( a, z). n
Hence, the analogue of (3.2) is
boo (<I> ( a, z, x), <I> ( a, z' , x))
(3.4)
~ Moo(G(a,z),G(a,z')) ,
and that of (3.3) is
110"n ( <I> ( a, z, x)) - 0"n ( <I> ( a, z' , x)) II
(3.5)
~ nboo(<I>(a,z,x), <I>(a,z' ,x))
Since !(a,z,x) = O"n (<I>(a,z,x)) , combining (3.4), (3.5) gives
11!(a,z,x) - !(a,z',x)11 ~ 5nboo (G(a,z),G(a,z'))
~ 5nd oo (u(z),u(z'))
and continuity of u(z) E en is uniform in z over I x B n . 0
There is a converse to Corollary 5.
101
REFERENCES
1. J.-P. Aubin and H. Frankowska, Set-Valued Analysis, Birkhauser,
Boston, 1990.
2. P. Diamond, Fuzzy Kriging, Fuzzy Sets and Systems 33 (1989), 315-332.
3. P. Diamond and P. Kloeden, Characterization of compact subsets of fuzzy
sets, Fuzzy Sets and Systems 29 (1989), 341-348.
4. P. Diamond and P. Kloeden, Metric spaces of fuzzy sets, Fuzzy Sets and
Systems 35 (19S:l), 241-249.
5. P. Diamond and P. Kloeden, Optimization under uncertainty (with P.
Kloeden), Proceedings of The Third International Conference on Infor-
mation Processing and Management of Uncertainty, 1990, pp. 247-249B.
Bouchon-Meunier and R.R. Yager (eds.), , Paris.
6. O. Kaleva, Fuzzy differential equations, Fuzzy Sets and Systems 24
(1987), 301-317.
7. E. P. Klement, M. L. Puri and D. A. Ralescu, Limit theorems for fuzzy
random variables, Proc. R. Soc. Lond. A 407 (1986), 171-182.
8. M.L. Puri and D.A. Ralescu, Fuzzy random variables, J. Math. Anal.
Applns. 114 (1986), 409-422.
9. H. Tanaka, S. Uejima and K. Asai, Linear regression analysis with fuzzy
model, IEEE Trans. Systems Man Cybernet. 12 (1982), 903-907.
\
\
ON POSSIBILITY/PROBABILITY
TRANSFORMATIONS
ileA) = 1, thus bracketting is never tight since it is always of the form [a,I] or
[O,~]. In order to keep as much information as possible one should get the tightest
intervals as possible. It means that the fuzzy set with membership function 1t
should be minimal in the sense of inclusion so that 1t is maximally specific. A
refinement in this specificity ordering consists in requesting that this fuzzy set have
minimal cardinality, i.e. 2.xE X 1t(x) is minimum (in the finite case). Of course the
preference preservation constraint should be respected. The above principles for
possibility/ probability transformations sound reasonable but alternative ones have
been proposed as well. These alternative views are interesting as well and are
commented further below in section 6.
f
f(IXI) -
and decreasing, p(x) is of theform 0 da/2r- 1(a) 'V x E [-1,+1], which may be
more or less easy to compute according to the form taken by function f.
xn }, Pi = P([xi}), 1ti = TI({xi}) and PI ~ P2 ~ ... ~ Pn' then the optimal solution is:
r
minimizes the integral of 1t on [a,b]) that dominates p is defined by
rx + of
Proof: Let <p(x) = Jx p(t)dt, and consider xO the modal value of p. It is easy to
108
check that if x + .f < xo, then cp(x) < cp(xO - .f). This is because p(x) is increasing
on [a,xo]. By symmetry if xO < x, then cp(x) < cp(xO)' Hence only the case when
xO r +.f p(t)dt whose derivative
xo E I is to be considered. Now cp(x) = fx p(t)dt +
xO
J~
is cp'(x) = -p(x) + p(x + .f).Hence cp'(x) = 0 requires p(x) = p(x + .f). The nature of p
is such that this equation is satisfied for a single value of x, Q.E.D.
Lemma 4 : The smallest interval I such that P(I) = a contains the modal value of
=
p and is such that I [x,f(x)] where f(x) = max (y I p(y) ~ p(x)}.
Proof: Note that the function g(x) = P([x,f(x))) where x < xO and f defined as in
Lemma 4, is a continuous deCreasing function such that g(-oo) = 1 and g(xO) = O.
Hence an interval I as defined above exists and is unique. Assume xo < inf I where
P(I) = a and I = [x, yea)]. Let .f(~) = yea) - x. Because p is decreasing on [xO,+oo),
- rxO+.f(a) . (y(a) fy(a)
it is easy to check that Jx p(t)dt = Jx pet + Xo - x)dt > x p(t)dt = a.
o -
Let YO(a) be such that P([xo,yO( a))) =- a ; hence we have YO(a) < xO + .f (a), i.e.
the length of the interval [xo,yO(a)] is smaller than that of [x,y(a)]. The same
reasoning holds if-sup I < xo. Hence xo E I . Now let I = [x,f(x)] as in Lemma 4,
and I' = [x',y'] such that x < x' < xo' III = 11'1, xo E I. From Lemma 3 it is easy to
conclude that PCI') < P(I) = a. Hence y'(a) such that P([x',y'(a))) = a verifies
y'(a) > y', Q.E.D.
r
The situation can be summarized as follows: in order for n to dominate p, we need
are the level cuts of n, then ndominates p. To minimize ff<><> n(t)dt, it is enough to
--00
minimize the size of these intervals, and Lemma 4 tells us that they should be taken
as the level cuts of the probability density itself. Lemma 2 points out that this is
equivalent to request that the preference induced by p should be preserved by n.
This information has been suggested by Dubois and Peade (1983). Although the
109
obtained possibility distribution makes sense (it does dominate p, and respects the
preference induced by p), itis not maximally specific, i.e. T2(P) <- T1\p) generally;
in other words the possibility distribution obtained from T2(P) is generally more
For instance, if p(x) =-I Log(lxl) as obtained by T I from n(x) = I - Ixl when x =
2
[-1,+ I] this triangular fuzzy number is recovered when (6) is applied to it.
1 1
2 2=
Let us consider T . In the discrete case T (n) is easily calculated by inversion of
(3), assuming nl ~ n2 ~ ... ~ nn ~ 1tn + I 0 :
-I
T2 : Pi = ni -ni+I' 1. = I,n. (7)
1
2
The main problem with transformation T is that it does not respect the preference
ordering induced on X by the Pi'S especially ni > ni+ I does not imply Pi > Pi+ I'
Clearly the mass ni - ni+ I is moved as a whole to Xi instead of being shared
among the elements of the ni-level cut. This assignment looks arbitrary. In the
continuous case, let us assume n is of the form (4) so that it is
differentiable,unimodal and with bounded support. Let x < xo such that n(xO) = 1.
By differentiating (4) it is found:
n'(x) =p(x) - p(f(x» . f '(x)
where f is defined as in Proposition 2 and the prime denotes the derivatives. Letting
f(x) =y, so that (f is bijective) x =r-I(y), we also find for y > xo
Example: Consider the pdf p(x) = max(O, I -Ixl). It!S easy to check that T2(P) is
Especially we get a uniform pdf which forgets about the role of most plausible
value played by O.
commensurate. It means that entropy and imprecisi()n capture the same facet of
uncertainty, albeit in different guises. Clearly our approach disagrees with this
postulate. The last point of divergence is that Klir does not try to respect the
probability/possibility consistency principle, which enables a nice link between
possibility and probability to be maintained, casting possibility measures in the
setting of upper and lower probabilities. By taking a measurement-theoretic view,
the possibility distribution obtained through uncertainty invariance cannot be
considered as a bracketting approximation of the original probability measure.
Civanlar and Trussell (1986) have considered a transformation T from probability to
possibility by requiring that the probability of the fuzzy event described by 1t = T(p)
should be above a given threshold, and I,1t[ should be minimum. The first
requirement writes p(1t) = I,i=l,n 1tiPi ;::: c. Note that p(1t) was introduced by Zadeh
as a probability/possibility consistency index. The drawbacks of this method are that
its result is threshold-dependent, and may violate the probability/possibility
consistency principle. Moreover minimizing I,1tf for k =1= 2 would give another
solution. Lastly it was proved in Dubois and Prade (1990b) that p(1t) is constant for
all 1t that are minimum elements (in the sense of inclusion) among possibility
distributions that dominate p.
Further research is needed in the continuous case. Especially it is interesting to
investigate for which class of pdf and possibility distributions the transformations
make sense, and what are the minimal assumptions required to ensure that (2) and
(4), as well as (6) and (8) are the converse of each other. Another important issue is
to extend the results presented here to the case of joint probability or possibility
distributions. Probability-possibility transformations have been applied to data
fusion problems in multisource interrogation systems and reliability expert opinion
modeling (Sandri et al., 1989; Sandri, 1990).
REFERENCES
Chanas S., Nowakowski M. (1988) Single value simulation of fuzzy variable.
Fuzzy Sets and Systems, 25, 43-57.
Civanlar M.R., Trussell H.J. (1986) Constructing membership functions using
statistical data. Fuzzy Sets and Systems, 18, 1-13.
Delgado M., Moral S. (1987) On the concept of possibility-probability consistency.
Fuzzy Sets and Systems, 21, 311-318.
Dubois D., Prarle H. (1980) Fuzzy Sets and Systems : Theory and Applications.
Academic Press, New York.
Dubois D., Prade H. (1982) On several representations of an uncertain body of
evidence. In : Fuzzy Information and Decision Processes (M.M. Gupta,
E. Sanchez, eds.), North-Holland, Amsterdam, 167-181.
Dubois D., Prade H. (1983) Unfair coins and necessity measures: towards a
possibilistic interpretation of histograms. Fuzzy Sets and Systems, 10, 15-20.
Dubois D., Prade H. (1988) Possibility Theory: An Approach to Computerized
112
Abstract
1. INTRODUCTION
(b) 0 E B.
From (a) and (b) we have that FEB. We refer to B as a complete class of
subsets of set P.
Function J.I:B ... [0,1] is called a pseudomeasure on (P,B) iff it
satisfies the following conditions:
(1) J.I(0) = 0,
(2) n ~ fi ~ J.I(n ) ~ J.I(n ) ,
l z l z
(3) J.I(P) = 1.
With each pseudomeasure J.I on (P,B) we associate a function J.I*:B ...
[0,1] as follows:
1
subsets generated by B .
The next step is to equip (P,B) with a pair of mutually dual
pseudomeasures, based on M1 and M*1 • For any set IT E B,1 i.e. IT = IT 1xIT Z ' IT i
E B,1 , i=1,2, we define:
the maximal (by set inclusion) set having the same projections as n for
all aEA. In other words, set n is the union of all sets ll' such that
na(ll') = nam) for all aEA. Set n s 'l3 is called rectangular iff n = n,
i.e. if it is the rectangular hull of itself.
1
Denote by '8 class of all rectangular subsets of 'l3 such that
1 1
n E '8 ~ n (n) E B , for any aEA. Then we add to '8 sets of the form 'l3\n,
1 a a
n E '8 and denote the resulting class by '8. We shall call '8 the complete
class of subsets of 'l3 generated by the family B , aEA.
a
As a result, we have set 'l3 and complete class '8 of its subsets. Now we
shall define a pair of dual pseudomeasures on 'B, i .e . functions m,
m*:'8 ~ [0,1]. Similarly to the above finite case, we define these
1 1
functions on subclass '8 of rectangular subsets as follows (n E 'B ):
mm) = inf
J.la(llam)); m*m) = inf J.I*(O ill))
aEA aEA a a
and then extend this definition to the complete class 'B (Le. also for
1
sets of the form'l3\n, n E '8 ) as follows:
m*('l3\n) =1 - mill) =1 -
inf J.I ill (0)) = sup J.I*(P \0 ill))
aa aaa
aEA aEA
As a result we have constructed product space with pseudomeasure ('l3,'B,m)
and the dual pseudomeasure m *
3. DECCMPOSABLE PROPERTY
Va(x) '*
+ va(x) = 1, 'VAEX,
For a decomposable property a we interpret the complementary property
a'* as the property consisting in not showing a. In other words, L'<€a,
x~a*) and (X¢a, .'<€a*) are pairs of equivalent assertions. Therefore, Va(x)
is the degree to which object x shows property a (degree of AEa), or,
equivalently, the degree to which object x does not show property a '*
(degree of .~a'*); similarly, V~(x) is the degree to which object x shows
propertya'* (degree of AEa'*) , or, equivalently, the degree to which x does
not show property a (degree of .~a).
/icmaxn~) = llama)·Il~(n.&),
References
ANTONIO DI NOLA
Mathematical Institute, Faculty of Architecture
University of Naples, via Monteoliveto 3
80134 Naples, Italy
1. INTRODUCTION
In their paper [29], Rose and Rosser gave a proof of the completeness
of the infinite-valued sentential calculus of Lukasiewicz. Their proof is
syntactic in nature. In two subsequent papers [7], [8], Chang introduced MV
algebras (many-valued algebras), and gave an algebraic proof of the
completeness theorem using these structures. Thus, MV algebras were
originally introduced as algebraic counterparts of many-valued logic, just as
Boolean algebras are the algebraic counterpart of classical, two-valued, logic.
Recently, however, MV algebras have found novel and surprising
applications, and today they are studied per se. As proved in [19], MV
algebras are categorically equivalent to abelian lattice-groups with strong unit.
They are also equivalent to bounded commutative BCK algebras [20], and to
several other mathematical structures. Composition with the Grothendieck
functor Ko yields a one-one correspondence between countable MY algebras and
approximately finite-dimensional (AF) C*-algebdls whose Murray von
Neumann ordering of projections is a lattice order. This correspondence has
many applications [10], [19], [21], [22], [23]. AF C*-algebras are the
mathematical counterpart of quantum spin systems.
Our aim in this paper is to survey the connections between MV
algebras and fuzzy set theory, and to see how MV algebras can be used in the
treatment of uncertainty. The present author proved that every MY algebra is
an algebra of nonstandard fuzzy sets, thus generalizing previously known
representation theorems stating that every semisimple MV algebra is an
algebra of fuzzy sets.
1. x· (y . z) = (x . y) . z
2. x· y = y . x
3. x· 0 = 0
4. x· I = x
5. 0* = 1
6. 1* = 0
7. (x*· y)* . y = (y* . x)* . x
8. x $ y = (x* . y*)*.
123
R. Lowen and M. Roubens (eds.J, Fuzzy Logic, 123-131.
© 1993 Kluwer Academic Publishers.
124
Example 1. Let A = [0, 1] be the real unit interval. For all x and y in A
define the operations of (Lukasiewicz) disjunction, conjunction, and negation
as follows:
Example 2. Let X be a nonempty set. Then the set B = [0, I]K of all
[O,l]-valued functions over X, equipped with pointwise operations, is an
MV algebra. As we will see in Theorem 3, up to isomorphism, subalgebras
of B provide the most general possible examples of semisimple (i.e., having
zero intersection of maximal ideals) MValgebras.
Then the above two maps are each the inverse of the other; up to isomorphism,
they induce a one-one correspondence between totally ordered MV algebras and
totally ordered abelian groups with strong unit.
Generalizing this duality, Mundici proved in [19] that the restriction
functor rof Example 5 is a categorical equivalence between MV algebras and
abelian lattice-ordered groups with strong unit. Using the properties of r we
can now prove our main representation theorem:
Ulam's game naturally fits in the theory of communication with noise and
feedback [4], and is important in coding theory [28], [11], [24]. Let us
identify the first player with Pinocchio, while author and reader are identified
with the second player. Pinocchio picks a number c within a certain set S.
We must discover c. During the game, Pinocchio is allowed to lie at most I
times.
Our state of knowledge after Pinocchio's answers Al , ,At is
completely described by a function s: S ~ (O, 1/(1+1),2/(1+1), , //(1+1),
I} where for each XES, the truth-value s(x) is the distance of x,
measured in units of 1+1, from the condition offalsifying too many answers.
Thus, s(x) = 0 iff x falsifies too many (i.e., ~ 1+1) answers; s(x) =
1/(1+1) iff x falsifies I answers, ... , s(x) = 1/(1+1) iff x falsifies only
one answer; s(x) = 1 iff x falsifies no answer.
As proved in [26], our current state of knowledge is uniquely
determined by the pointwise conjunction sl· ...·St of the single states of
knowledge Si determined by the answers Ai. In the context of Ulam's game,
the natural pointwise order r $; s simply means that state r is more
informative than state s. Using the negation operation, we can turn
inequations into equations by writing r . s* = 0 instead of r $; s.
Let U(I,S) be the set of states in Ulam's game with I lies and search
space S, equipped with the MV operations * and ., and with the
distinguished constant states 0 (the incompatible state) and 1 (the initial state).
Consider the problem of algorithmically obtaining all absolute inequations-
those inequations that hold in all algebras U(I,S) independently of I and S.
An instance of an absolute inequality is the following obvious principle: "the
conjunction of two states of knowledge is more informative than the first state
alone". By the above discussion, we can safely restrict attention to absolute
equations. Further, it is no loss of generality to introduce the disjunction
operation x Ef) y = (x* . y*)*. Examples of absolute equations are those stating
that conjunction and disjunction are associative and commutative.
128
For each x E A, we write ord x < 00 iff for some integer n> °
of totally ordered MV algebras, and every totally ordered MV algebra is local.
we
have 1 =x <:B x <:B •••<:B x (n times). Otherwise, we write ord x =00. It is
not hard to see that A is local iff for every x E A either ord x < 00 or ord
x* < 00. If A is local its Boolean largest subalgebra B(A) coincides with the
two-element Boolean algebra (O,l). Further, as noted in [2], every local MV
algebra is indecomposable. The converse is not true, as shown by the example
of all continuous functions from the real line into [0,1].
To describe subclasses of local MV algebras, following [2] we say
that A is perfect iff for every x E A we have
REFERENCES
[1] L.P. Belluce, Semisimple algebras of infinite valued logic and boldfuzzy
set theory, Canadian J. Math., 38 (1986) 1356-1379.
[2] L.P. Belluce, A. Di Nola, A. Lettieri, Local MV-algebras, preprint.
[3] L.P. Belluce, A. Di Nola, S. Sessa, On the prime spectrum of MV-
algebras, preprint.
[4] E.R. Berlekamp, Block coding for the binary symmetric channel with
noiseless, delaylessfeedback, In: "Error Correcting Codes", Wiley, New York,
1968, pp.61-68.
[5] A.Bigard, K.Keimel, S.Wolfenstein, "Groupes et anneaux reticules",
Lecture Notes in Mathematics, 608, 1977.
[6] G. Birkhoff, "Lattice Theory", Amer. Math. Soc. Colloquium Publ., Vol.
25, 1967.
[7] C.C. Chang, Algebraic analysis of many valued logics, Trans. Amer.
Math. Soc., 88 (1958) 467-490.
[8] C.C. Chang, A new proof of the completeness of the Lukasiewicz
axioms, Trans. Amer. Math. Soc., 93 (1959) 74-80.
[9] C.c. Chang and H. J. Keisler, "Model Theory", North-Holland,
Amsterdam, 1973.
[10] R. Cignoli, G. A. Elliott, D. Mundici, Reconstructing C*-algebras
from their Murray von Neumann orders, Advances in Mathematics, to appear.
[11] J. Czyzowicz, D. Mundici, A. Pelc, Ulam's searching game with lies,
J. Combinatorial Theory, Series A, 52 (1989) 62-76.
131
1. Introduction.
In view of the successes of knowledge-based systems in general,
and of fuzzy systems in particular, in industrial applications, it is
time to look at two fundamental. problems: explaining the reasons
of their successes and providing more basic tools for further develop-
ments.
For the first problem, the state-of-the-art is this. In a sense, we
are facing the old and well-known problem of approximation offunc-
tions, but from a constructive viewpoint. Neural networks, e.g. as
learning devices, are nothing more than a neat way of constructing
133
R. LowenandM. Raubens(eds.), FuuyLogic. 133,-142.
© 1993 Kluwer Academic Publishers.
134
2. Conditional propositions.
As stated in the Introduction, the rest of this paper is devoted
to an investigation into the possibility of using algebraic logic as a
mathematical foundation for reasoning with conditional and uncer-
tain information in knowledge-based systems.
In view of Stone's representation theorem, we represent proposi-
tions (in some language) by a Boolean algebra R of subsets of some
set n. Elements of R are denoted as a, b, ... j usual set operations are
1\ (or· for intersection), V (union), (.)' (complementation), + (sym-
metric difference or "exclusive or"), and 0,1 sometimes denotes the
empty set (/) and n, respectively. The truth space is the Boolean al-
136
{x E R: a ~ x ~ b}.
3. Conditional logics.
Having specified each conditional proposition as a collection of
ordinary propositions, we are going to investigate the algebraic struc-
ture of the conditional space R I R. First, note that, if we take R =
{O, I}, then R I R is the three-element set {(Oil), (0 I 0), (Ill)}. It
is no longer a Boolean algebra. This can be seen even in the general
case
R I R = {[a,b]: a,b E R,a:::; b}.
If we extend the partial order :::; on R to RI R by
then [e,d] :::; [b',b ' ]. Thus [a,b]* = [b',b ' ] is a pseudo-complement of
[a,b]. Moreover, it is easy to verify that
4. Fuzzy conditionals.
The above syntax development for conditionals can be extended
to fuzzy conditionals in various ways. Since we have probability
compatibility condition in mind, we will explore the following path.
First, by a fuzzy conditional we mean an implicative statement
of the form "if B then A" where A, B are fuzzy concepts expressed
in a natural language. The numerical modeling of a fuzzy concept
can be described as follows. A fuzzy concept is a property of some
collection of individuals or objects. For example, A = "tall (men)".
Here, A is related to the population M of men. Some elements of M
do not possess the property A, while others share it but in different
fashions. Quantifying these differences in sharing A leads to the
concept of membership function. Specifically, since in this example,
we are in fact talking about height, we can replace M by the range
of this variable, say, H = [0,10]. For each x E [0,10], we assign a
value f( x) E [0,1], expressing the degree to which x is "compatible"
with A. How to obtain f(·) is the most difficult theoretical question!
At the application level, there are several ways to obtain f(·), either
by common sense (subjective) or by a "frequency" approach.
The following connection with probability concepts might suggest
a clue! If f : H -+ [0,1] is given, then we can see that f is obtained
139
when g(w) i: o.
Thus a fuzzy conditional (A I B) can be defined as
if wE ab
'1'( a I b)(w) ~{ ~ if wE a'b
if wEb'.
But if we let
if wE ab
'1',( a I b)( w) ~{ ~ if wE a'b
if wEb'
then, taking u = [0, 1], we have
Selected Bibliography.
[3] Cotter, N.E. (1990). The Stone-Weierstrass theorem and its ap~
plication to neural networks. IEEE Trans. Neural Networks
(4), 290-295.
[7] Goodman, I.R., Nguyen, H.T. and Walker, E.A. (1991). Condi-
tional Inference and Logic for Intelligent Systems: A Theory
of Measure-Free Conditioning, North-Holland.
Abstract
In order to successfully apply possibility theory to the study of physi-
cal systems, there is a need for methods of taking measurements on them
which yield data governed by possibility theory. Set-based statistics are
used to generate empirically derived random sets. Normal possibility dis-
tributions are available for consistent random sets, and a set of focused
consistent transformations is available for inconsistent random sets. The
Principle of Uncertainty Invariance is modified to provide a method which
selects that consistent transformation with Minimal Information Distor-
tion from the measured random set.
Traditional uses of possibility theory are based on the assumption that while
probabilistic randomness can be measured and applied in the physical world,
possibilistic nonspecificity is a result of human psychology, perception, and de-
scription [27]. This presumption has many consequences. First, the semantics
of fuzziness and possibility have been overwhelmingly dominated by "linguis-
tic variables" and similar concepts which attempt to model the subjectivity
of people. Similarly, there is a preponderance of measurement methods which
derive possibility values from the opinions of people (for example, "experts" in
some field) [21, 28]. Lacking even this level of method, ad hoc possibility dis-
tributions are posited without formal justification (e.g. [9]). Finally, sometimes
the issue of possibilistic measurement is avoided altogether by taking stochastic
frequency data and then converting it to a possibilistic form [3, 16].
Second, while traditional (probabilistic) information theory was developed
in close relation to the physics of many-body problems and thermodynamic
systems [1], applications of possibilistic models are overwhelmingly in the areas
of "knowledge" or "informational engineering" such as knowledge-based control
systems, approximate reasoning, and decision support. Even in those attempts
to apply possibilistic methods to the theory or modeling of natural, physical
systems, data is predominantly collected on the basis of opinion (e.g. [9]).2
We are concerned with developing possibilistic models of physical systems.
Thus we require measurement methods which use empirically derived data, and
a semantics of possibility which is not wedded to human psychology. This paper
discusses a method by which an empirically derived random set can generate
a possibility distribution (see also [11, 13]). In another paper [12] we discuss
measurement techniques that can generate such random sets.
Mathematical Preliminaries
We begin with the standard Dempster-Shafer evidence and possibility theo-
ries [4, 18]. Given a finite universe n = {Wi}, 1 ~ i ~ n, we will call a
set function m: 20 ....... [0,1] an evidence function 3 when m(0) 0 and =
LACO m(A) = 1. Denote a random set generated from an evidence func-
tion as S = {( A j , mj ) : mj > O}, where ( .) is a vector, A j C n, mj = m(A j ),
and 1 ~ j ~ lSI ~ 2n - 1. We also denote the focal set F = {Aj: mj > O}
and the core C(S) = n:F
A j . S is consistent when C(S) =f. 0. The dual
belief and plausibility measures on 'VA C n are Bel(A) =
LAjCA mj and
PI(A) = LAjnA;e0 mj. We denote the plausibility assignment of S as
PI = {PI({w;} ) ) = {PI;}.
2 Although there are some exceptions [23].
3Frequently called a "basic assignment" or "basic probability assignment".
145
lSI
N(S) =L mj log2(IAj I),
j=1
D(S) = - E(1I"i -
,=1
1I"i+d log2 [1- ti
k=,+1
k(:~ 1)]
N(S) = ~1I"ilOg2 [i~ 1] = ~(1I"i -1I"i+1)log2(i).
It has been established [7] that in this case D(S) is bounded from above with
limlsl __ oo < 0.892. Hence, possibility measures are almost discord free; their
discord may often be neglected, especially when lSI is large.
Opinion-Based Methods
There are various means by which possibility distributions are derived from
the opinions of people. Sometimes a certain distribution is simply asserted
based on the opinion of the researcher and the theoretical, methodological,
or other ad hoc considerations which they bring to bear on the problem, e.g.
[9]. In other cases people who have expert knowledge of the modeled system
are submitted to sophisticated polling techniques to provide their opinions of
the possibility values, e.g. [28, pp. 344-349]. Another common technique is
called "fuzzification", in which measured crisp data is compared against a set
of possibility distributions determined from some opinion method, and then
aggregated to give an overall distribution of the measured data, e.g. [10].
No doubt there are situations in which such metlrods are either necessary
or completely sufficient. For example, these methods are natural and useful
when people control and intervene in system operation, and so psychological
disposition is a serious factor. In other circumstances, there is a good theory of
the system being modeled and little or no access to physical measurement. But
these methods are unsatisfactory at best for the modeling of physical systems or
other systems in which individuals do not provide direct input. Where possible,
data should be derived from physical measurements in a manner which directly
captures the possibilistic nature of that data.
Converted Frequencies
In stochastic models, observations are made of the occurrence of one or another
outcome Wi. Denoting that count of these occurrences as Ci, then for a given
total count of M, we can arrive at a frequency distribution I: Q 1-+ [0,1], I(wi) =
f
Ii = cd M. Denoted as a vector, = (Ii ) is a natural probability distribution
with normalization 2::i Ii = 1 and additive measure F: 211 1-+ [0,1], given by the
formula 'VA C Q, F(A) = 2:: w iEA Ii.
A variety of methods are available which convert an observed frequency dis-
tribution f to a possibility distribution if [3,16]. But there can be no doubt that
f is in fact a natural probability distribution. There may be a good conversion
f:::} if, and surely such a transformation must be used when only frequency
data are available. But the representation if is never ultimately appropriate for
the data gathered by a frequency distribution f. It is preferable to obtain data
in a form more directly similar to the ultimate possibilistic representation.
Set-Based Statistics
In a possibilistic model, data are governed by possibility distributions and pos-
sibilistic reasoning methods. While the semantics of probabilistic reasoning is
based on the notions of likelihood, chance, tendency, propensity, and frequency,
the semantics of possibilistic reasoning derives from notions such as similarity,
compatibility, capacity, intensity, and "degree of ease" [25].
Therefore this method begins with the use of set-based statistics [6].
Instead of counting outcomes of the W E Q, outcomes of subsets A C Q are
147
=
Thus, for a consistent, non-consonant SE, we know that PI if is a possibility
:listribution, and that the reconstructed random set S7r is an optimal approx-
imation to SE accordin~ to this measure. Therefore we accept consistency as
3. sufficient criteria to generate a possibility distribution if from a random set
SE.
148
Consistent Transformations
In a consistent random set, all the evidential claims are in partial agreement,
since they all include the core. If F is a nest, then C(S) = A l E F. Therefore
a consistent random set is in some sense a "partial" nest, and it is appropriate
to consider possibility distributions which approximate SE.
But when SE is not even consistent, then it is less clear what a good pos-
sibilistic approximation to it might be. However, SE will need to be modified
from its given form, and in a way which distorts the original structure as little
as possible. We begin with the following definitions:
Definition 3 (Consistent Transformation) A consistent transformation of
a random set S, denoted S 1-+ S with focal set:F and evidence function m, moves
some evidential claims (A, m) E S to A E :F such that A C A.
Since A C A, all the evidence of the old claim is accounted for in the new
claim A. We also have that S C W S, and N(S) ~ N(S). However, sometimes
D(S) ~ D(S), and sometimes D(S) 2: D(S).·
Definition 4 (Focused Consistent Transformations) A consistent trans-
formation focused on Wi E Q of a random set S, denoted S 1-+ Si with focal
set:Fi and evidence functio-d m i , moves '</ Aj E F the evidence mj from Aj to
A j U {w;} E :Fi.
There is a family of n random sets Si' one for each Wi E Q. For a given A j , if
Wi (/. Aj, then m(Aj ) becomes zero while the evidence for Aj is added to the
evidence of the "promoted" subset A j U {w;}; whereas if Wi E A j , then it is
unchanged. Now since '</Aj E :Fi,wi E Aj, therefore all the Si are consistent
with normal possibility distributions, and generating consonant random sets.
When C(S) = 0, then the effect of each Si is to create a core C(Si) {w;} =
with the evidential claims in S concentrated on the focus Wi. What is required
is a method to choose the "correct" focus for a given S.
We have the following results:
Theorem 3
mi(Aj) ={ om,j + m(Aj - {W;}) , Wi E Aj
wi(/.Aj
Proof: Let Wi and Aj be fixed. We can consider the losses, gains, and retentions
of the evidence forA j under the transformation S 1-+ Si. The only losses will
occur if Wi (/. Aj , in which case mj is lost. If Wi E A j then mj is retained.
Finally, Aj will receive gains from any A k such that A k =
A j U {w;}. This is
=
only true for A k A j (considered in the case of retention) or Ak A j - {Wi}. =
Case 1: Let Wi (/. A j . Then we have the loss of mj, no retention, and since
Aj - {w;} = Aj, no gains. Therefore mi(Aj) =
O. Case 2: Let Wi E Aj.
Then we have no losses, mj is retained, and we gain m(Aj - {w;}). Therefore
mi(Aj) = mj + m(Aj - {w;}) . •
Theorem 4 S 1-+ Si induces the transformation:
PI= (Ph, PI2 ,· .. , P4, ... , PI".) 1-+ if = (Ph, PI2 , •.. , 1, ... , PI".)
Proof: See [13].
149
An Example
Let n = {x,y,z},n = 3, and assume the following inconsistent empirically
derived random set with the following properties:
Sx= {( {x}, .1) , ( {x, y}, .7} , { {x, z}, .2} }, 7rx = {I, .7, .2}
N(Sx) = .9,D(Sx) = .317, T(Sx) = 1.21, ~(SE,Sx) = .288
Sy ={{ {x, y}, .8) , { {x, z}, .2) }, 7ry ={ .8, 1, .2}
151
.2
References
[1] Brillouin, Leon: (1964) Scientific Uncertainty and Information, Academic
Press, New York
[2] Christensen, Ronald: (1980) Entropy Minimax Sourcebook, v. 1-4, Entropy
Limited, Lincoln, MA
[3] Dubois, Didier, and Prade, Henri: (1986) "Fuzzy Sets and Statistical
Data", European J. of Operational Research, v. 25, pp. 345-356
[4] Dubois, Didier and Prade, Henri: (1988) Possibility Theory, Plenum Press,
New York
[5] Dubois, Didier, and Prade, Henri: (1990) "Consonant Approximations of
Belief Functions", Int. J. Approximate Reasoning, v. 4, pp. 419-449
[6] Dubois, Didier and Prade, Henri: (1992) "Evidence, Knowledge and Belief
Functions", Int. J. Approximate Reasoning, v. 6:3, pp. 295-320
[7] Geer, James, and Klir, George: (1991) "Discord in Possibility Theory",
Int. J. General Systems, v. 19, pp. 119-132
[8] Geer, James, and Klir, George: (1992) "A Mathematical Analysis ofInfor-
mation Preserving Transformations Between Probabilistic and Possibilistic
Formulations of Uncertainty", Int. J. General Systems, v. 20, pp. 143-176
[9] Giering, EW, and Kandel, A: (1983) "Application of Fuzzy Set Theory
to the Modelling of Competition in Ecological Systems", Fuzzy Sets and
Systems, v. 9, pp. 103-127
152
REFERENCES
Wyllis Bandler
and
Ladislav J. Kohout
Department of Computer Science B-173
The Florida State University
Tallahassee FL 32306-4019
U.S.A.
We are concerned with certain useful special properties which fuzzy relations on
a set may possess or lack. They are generalizations of properties of crisp rela-
tions, which is to say that the fuzzy definitions coincides with the crisp definition
whenever the the relation in question is in fact crisp.
We are also concerned with two meta-properties that are equally useful in the
theory and in practical computation, namely with cutworthiness and closeability.
A special property P will here be called cutworthy when it is true that a fuzzy
relation possesses P (in the fuzzy sense) if and only if every a-cut of the relation
possesses P (in the crisp sense). In [1],[2] the present authors listed a number of
elementary properties with definitions such that all of them were cutworthy, as
were the compound properties derivable from them.
The important novelty was that of locally reflexive, which embodies the idea
that every element is related to itself to at least as high a degree as it is related
to anything else, or as anything else is related to it. If we call the greatest degree
to which an element Xi is related to anything its degree of active participation,
and the greatest degree to which anything is related to it its degree of passive
participation, and the greater of these tout court its degree of participation, then a
relation is locally reflexive iff every element is related to itself to its degree of par-
ticipation. In many actual circumstances this is a more reasonable requirement
than the more familiar one of (global) reflexivity, which requires every element to
be related to itself utterly, that is, to degree 1. Essentially the same list is given
in the following table. The definitions are couched in terms of the components
Rij of the matrix representation of the relation.
The present paper proceeds to a single theorem, not difficult but extremely useful.
In practical work with empirical relations it is common to encounter a relation
which "ought to have" certain properties on theoretical or semantic grounds, but
falls short of them in actuality. An empirically recorded preference relation, for
example, is quite likely to fail in transitivity, owing to imperfect consistency of
the human respondent. Must the investigator then throw all the data away, or is
it legitimate to move the results towards the ideal? This immediately raises the
question, "Move them by how much?" if the inconsistency is venial and minor,
that is one thing; if vast and fundamental, that is another. But how is one to
measure these things?
The present authors run into similar problems very frequently. The triangle
product of a relation with its converse [3],[4] would be expected to produce a
(local) preorder. In the realm of medical diagnostics, this underlies a hierarchy
of symptoms or of patients [5],[6],[7] ; in the realm of urbanistics a hierarchy of
mental constructs or of urban objects [8],[9],[10]; in automated reasoning [11],[12];
and so on in many other realms [13],[3],[14],[15],[16],[17]. But human flaws in
the data, and more importantly, the lack of reflexivity and transitivity in the
implication operators used, as well as the vagaries of the averaging process, cause
departures from (local) preorderness. How does one determine when this vitiates
the findings as against when it is only a minor disturbance which can be rectified?
Our answer is, for any closeable property P, compare the original empirically
derived relation with its P-closure. Adopt a measure of deviation or of closeness,
and a criterion of strictness. When your criterion is met, proceed to analyse the
closure in place of the original; when it is not met, recognize genuine failure.
Following our own advice, with great care, has required computation of the
P-closure (in most cases, the (local) preorder closure) of each relation under
scrutiny, and then of every single a-cut of it which we wish to examine [18],[6].
The theorem of the present paper relieves us (or rather, our computer) of this
voluminous labor and redundant output. It is sufficient to take the closure of the
original fuzzy relation once and for all; its a-cuts are the closures of the a-cuts of
the relation. Among other advantages, this encourages the study of more different
a-cuts, and gives a criterion (degree of P-ness) for selecting among them.
We are concerned with binary (2-place) relations, both crisp and fuzzy, from a
set X to itself, that is "an X". These constitute a class B(X -+ X) = B(X). For
164
any property P which such a relation R may have or may fail to have, there is
the following definition:
1. C has property P
2. R!;;; C
If P is cutworthy and closeable, then for all R E B(X) and all a E]O, 1], the
a-cut of the P-closure of R is the same as the P-closure of the a-cut of R, that
is (P-clo R)a= P-clo (R a ).
Proof: Let us call L=P-clo R, and for each a let us call M(a) =P-clo (Ra ).
1) Now, since L has property P, each a-cut La of L will have property P, and
since R!;;; L, each R a !;;; La. Hence by the minimality of the P-closure (part (3)
of the definition), P-clo R a !;;; La, that is, M(a) !;;; La.
M = U aE )O.l)aM(a),
with the virtue that its a-cuts give us back M(a): Ma =M(a).
165
What was proved in (1) is now M ~ L, and we seek the appropriate inclusion,
as follows: Since for all a, R OI ~ MOl, we have R ~ M. Since each a-cut of M has
property P (in the crisp sense), so does M (in the fuzzy sense). Then, again by
minimality (part (3) of its definition of P-closure), P-clo R ~ M, that is L ~ M.
This completes the proof.
References
1. Bandler, W. and Kohout, L.J.
Special properties, closures and interiors of crisp and fuzzy relations.
Fuzzy [;-;ts and Systems, 26(3):317-332, June 1988.
10. Bandler, W., Mancini, V., and Stiller, E.M. (Guest Editors).
The URBS Project: Acquisition, Representation and Manipulation of
Knowledge for a Computerized Advisory System on City Problems.
In Journal of Intelligent Systems (A special issue), Freund Publishing
House Ltd., London, U.K., 1993.
The introduction of the notion of fuzzy set by Zadeh (1965) was mainly motivated
by the problem of modelling linguistically expressible categories with unsharp
boundaries. Then starting with the usual convention for set characteristic functions:
zero (0) for non-membership, one (1) for membership, it leads to take (0,]) as a
possible set of intennediary degrees of membership. Very soon after the introduction
of fuzzy sets, Goguen (1967) proposed to generalize the idea of a fuzzy set by
replacing the real interval [0,1] by some abstract set L equipped with some
mathematical structure. Until now, in spite of the theoretical interest of
L-fuzzy sets, only [O,I]-valued fuzzy sets are considered in practice.
In this paper, which extends a preliminary version (Dubois and Prade, ]991), we
raise the following questions: Is there any other numerical scale of interest when
generalizing classical subsets by extending the possible range of their characteristic
functions ? Has this change of scale an effect on the practical interpretation of the
corresponding generalized subsets, on the mathematical structure with which we can
equip them?
More particularly, we investigate the use of the real scale [0,+(0) U {+oo} underlying
a cost interpretation. Namely a zero cost will coincide with the idea of an
undebatable, unquestionable membership, while an infinite cost will represent an
impossible membership, an absolute non-membership. Following the development
of fuzzy sets which gave birth to possibility theory (Zadeh, 1978), which in tum is
the basis for possibilistic logic (Dubois and Prade, 1987 ; Dubois et aI., 1989), the
paper is organized in three sections, first introducing so-called "toll sets" where
membership is related to the idea of a cost to pay, then discussing toll measures
defined from toll sets, and finally giving a first insight of toll logic and of its
potential applications.
1. TOLL SETS
Aubin (1990) has recently extended so-called indicator functions used in convex
analysis and thus introduced a special kind of "fuzzy set". The indicator function "'T
169
R. Lowen and M. Roubens (eds.), Fuzzy Logic, 169-177.
© 1993 Kluwer Academic Publishers.
170
0 if x E T
"'T(x) ={ +00 if x E: T
Using the scale [0.+00 ) u (+00), a membership grade can be easily interpreted in
terms of the "toll" to pay in order to be admitted as a member of the considered
subset. This is why we propose to call "toll set" this kind of generalized subset,
rather than "fuzzy set" (which does not suggest a cost interpretation). In this
framework, the grade of membership of John to the "fuzzy set" of young people.
"'young(John) would be understood as the price that John must pay. or would have
to pay, to be called a young man (like a club-membership fee). When "'T(x) = O. it
means that there is no obstacle for x to belong to T (free membership) ; when
"'T(x) = +00, it is forbidden for x to belong to T, since only finite costs may be
paid. This interpretation suggests that
(1)
since any x should belong for free to a class or to its complement, and if you have
to pay for being T. this is because you are rather not T, Le. f ; moreover both T
and f cannot be toll-free, Le.
(2)
(3)
since to be a member of S or T, x has just to "pay" the cheapest fare. Thus (1)
expresses the law of excluded middle T u f = X. Several choices are possible for the
* operation defining the intersection. i.e. * should obey the following inequalities
The lower bound in (4) corresponds to the maximal possible "discount" for joint
171
membership (x only pays the higher toll) while the upper bound corresponds to no
discount at all : x has to pay full tolls for both S and T. Note that (2) is thus some
kind of law of non-contradiction, but not completely fulfilled since TnT "# 0.
Inclusion is defined, like for ordinary fuzzy sets (except that the scale works in the
opposite way), by
(5)
Clearly using the one-to-one mapping ex = e-~ from [0,+00) u (+00) to [0,1], we can
compare toll sets with usual fuzzy sets: ([0,+00) u (+00), min, *) is mapped on
([0,1], max, .1.) with min(a,b) ;<: a .1. b ;<: a' b. Note that due to (1)-(2) the
complementation of toll sets is not compositional but should obey the constraint
(6)
which has a "para-consistent" flavor (indeed TnT "# 0 for some T, i.e. it is allowed
for an element x to belong to T and to somewhat belong to T, provided that the
corresponding cost is finite). As we can see, changing the membership scale
modifies the interpretation and leads to privilege operations on [0,+00) U (+00)
which are not necessarily the counterparts (in the sense of a correspondence such as
ex = e-~) of the most standard operations used on the scale [0,1].
1
'It E Y . ()={infx 'l'T(X)ifr (y);#:.0
y , 'I'f(T) Y +00 otherwise.
This is the exact counterpart of Zadeh's extension principle since 'max' is changed
into 'min' and 'sup' into 'inC in the new scale. It expresses that in order to compute
the toll that y has to pay in order to belong to f(T), we look for the less costly
realization of y = f(x) from an x E X, with respect to T. The algebraic structure of
toll sets needs to be investigated in greater details, as well as its links with "exotic
algebras" (Dubois, 1988).
Note that another way of justifying the scale [0,+00) for membership grades is to
consider 'I'p(x) = 1 - f.lp(x) where f.lp(x) is a usual [O,I]-valued membership grade.
f.lp(x)
In that case, 'I'p(x) is a relative non-membership grade and we have 'I'p(x) . 'I'p(x) =
1 that defines the complementation. This complementation makes no sense when
172
'ifF (x) is interpreted as a toll. Set-theoretic operations for fuzzy sets in tenns of
relative membership grades could be derived from the works of Aczel and Saaty
(1983) and Aczel and Alsina (1987).
2. TOLL MEASURES
Following Zadeh (1978) who built possibility measures from fuzzy sets, we can
induce a set function from a tool set. Based on a toll set T, a "measure" K, from 2 X
to [0,+00) U (+00), is thus defined by
As it can be seen, the above extension principle is the expression of a toll measure,
namely 'lff(T)(y) = K(f- 1(y». A similar kind of measures, restricted to integer
values, has been already introduced, independently from fuzzy sets, by Spohn (1988)
under the name "ordinal conditional functions", and their relation to possibility
measures has been recognized (see Dubois and Prade, 1990). Clearly we have
V A k X, V B k X, K(A u B) = min(K(A),K(B»,
and K is monotonically decreasing with respect to set inclusion. The membership
function '1fT of the toll set T plays the role of a toll distribution which estimates the
extent to which each value x E X is impossible or unfeasible (because too costly).
A possibility distribution in the sense of Zadeh (1978) describes an incomplete state
of knowledge by restricting the more or less possible values of a variable refering to
the real state of a described situation. A toll distribution describes the more or less
unfeasible states which may be reached (remember that the toll scale works in the
sense opposite to the one of a possibility distribution). K(A) is an estimate of the
'impossibility" of A as containing a reachable state, since K(A) reflects the cost to
pay (according to '1fT) in order to be somewhere in A : the larger K(A), the more
impossible (i.e. the more costly) A. Note also that as soon as '1fT is normalized, i.e.
:3 x E X, 'lfT(x) =0 (which expresses that a value in X is completely possible), we
have min(K(A),K(A» =0 ; it is in agreement with the idea that among two opposite
events at most one may be somewhat impossible.
Possibility measures are obtained for * = max, and then (8) is equivalent to V A,
VB, g(A u B) = max(g(A),g(B» (without the condition A n B = 0). The axiom (8)
written for non-negative set-functions (rather than [O,I]-valued set functions)
characterizes the generalized measures of infonnation introduced by Kampe de Feriet
et al. (1969) and Forte (1969).
173
=
for.L min. =
reA n B) max(reA),r(B» ; (10)
for.L =product. A u B =X => reA n B) =reA) + reB). (11)
Clearly. for .L = min. r enjoys a property dual to the one characterizing the set
functions K . With a set function r. we can associate another set function K defined
by 'if A. K(A) = reA). This is similar to the duality between g and g. except that
there is no "natural" involution on [0.+00) n {+oo},like 1 - (.) on [0.1]. Then. K is
valued on a scale with is reversed in comparison with the range of r ; namely
K(0) = 0 and K(X) = +00. (10) and (11) then translate into
As it can be seen. for .L = min. K-functions are similar to Spohn functions K except
that the scale is reversed. while for .L =product. K is a non-finite additive measure.
For X finite. there exists a function X : X ~ [0.+00) U {+oo} such that reA) =
max XE A X(x) if .L = min and rcA) = LXE A X(x) if .L = product. X has an
interpretation dual to the one of the toll set distribution function 'l'T. i.e. X(x)
corresponds to the cost for eliminating x from the pOSSibilities. since A =
n XE A (X - (xl) and X(x) = reX - (xl). In terms of K-functions. we have the
simple expressions K(A) =max XE A X(x), and K(A) =LXE A X(x) for.L =min and
.L =product respectively.
174
the odds function P(A) or the surprize degree -Ln(p(A», or the weight of evidence
P(A)
Ln(P(~»), where A is the complement of A (see e.g. Tribus, 1969).
P(A)
3. TOLL LOGIC
Similarly, a toll logic knowledge base would be a set of classical logic formulas,
each weighted by an element of [0,+00). To each classical formula p we attach a
finite number C E [0,+00) interpreted as an upper bound of a cost function r, i.e.
r(p) ~ C is understood as "p true" can be considered as realized as soon as we pay C
cost unit(s). This interpretation is consistent with the use of upper bounds since if
we pay more than the minimal amount which is required (and which may be
unknown), p can still be realized. r(p) ~ C can be also interpreted as an
overestimate of the computation cost for establishing p. When r(p) =0, p is true is
certain since it costs nothing, while r(p) = +00 expresses that the truth of p is
impossible to realize or to establish since no finite amount of resource can make it
true.
The idea of associating classical logic formulas with positive weights which can be
combined additively can be also found in a recent work by Pinkas (1991). However
his interpretation of the weights differs from the one advocated here. Indeed, the
weight associated to a formula q> is used by Pinkas as a penalty which is incurred if
preference is given to a model which falsifies q> in a default reasoning system. The
global penalty attached to a model is then the sum of the weight of the formulas
present in the knowledge base which are falsified by this model. Let us also mention
Giles (1985)' additive logic of assertions where weights belonging to [0,1] are
interpreted in a betting framework, and have a probabilistic flavor. Possible links
between toll logic and these two proposals are not investigated here.
Deduction from a toll logic knowledge base will be controlled by the total (finite)
cost allowed : each time a weighted formula is used in a deduction, the
corresponding cost is deduced from the total amount permitted (only the pieces of
knowledge with a zero weight can be used for free I). This idea can be implemented
using the set functions r obeying to (11). Then the following resolution rule holds
175
Let us consider an example. Let % be the toll logic knowledge base % = {(P,CI),
(-,p v q, C2), (-,p v r, C3), (-,q v -,r v s, C4)}, where weighted formulae are
denoted by pairs of the form (cp,e) to be interpreted as r(cp) ~ C. From % using the
above resolution rule, we can derive (q, CI + C2), (r, CI + C3), then (-,r v s, CI +
C2 + C4), and finally (s, 2CI + C2 + C3 + C4). However letting t == q /\ r, % can
be written %' = {(p,C I), (-,p v t, C'), (-,t v s, C4)} where C' should be such that
C' ~ C2 + C3. Note that %, and %' together with t == q /\ r, are semantically
equivalent in the classical sense when we do not take into account the weights. Then
from %', using the resolution rule we can deduce (s, CI + C2 + C3 + C4), Le. s
with an upper bound smaller than in the first case where we start from %.
maximize r(s)
under constraints r(p) ~ CI ; r(-,p v q) ~ C2 ; r(-,p v r) ~ C3 ;
(
r(-,q v -,r v s) ~ C4
is indeed r(s) =CI + C2 + C3 + C4' i.e. the upper bound obtained only after the
renaming t == q /\ r. This can be easily seen in the following way. Using K-
functions the constraints can be rewritten K(-,p) ~ CI ; K(p /\ -,q) ~ C2 ;
K(p /\ -,r) ~ C3 ; K(q /\ r /\ -,s) ~ C4. Let us choose K such that K(-,p /\ -,s) =CI
and K(-,p /\ s) = 0 ; K(p /\ -,q /\ -,s /\ r) = C2 and K(p /\ -,q /\ (s v -,r» = 0 ;
K(p /\ -,r /\ -,s /\ q) =C3 and K(p /\ -,r /\ (s v -,q» =0 ; K(q /\ r/\ -,s /\ p) =C4 and
K(q /\ r /\ -,s /\ -,p) = 0, which is in agreement with the constraints since An B =
o ~ K(A u B) = K(A) + K(B). Then K(-,s) = K(-,p /\ -,s) + K(p /\ -,q /\ -,s /\ r) +
K(p /\ -,r /\ -,s /\ q) + K(q /\ r /\ -,s /\ p) = CI + C2 + C3 + C4' since K(p /\ -,q /\
-,r /\ -,s) =0, i.e. r(s) = CI + C2 + C3 + C4.
However the other obtained upper bound which is larger is also valid (but not as
accurate as the optimal one). In fact the two solutions, namely the first one obtained
by using the resolution rule syntactically, and the second one obtained by
176
This paper has only introduced the idea of toll sets, outlined some basic ideas
underlying various toll measures based on them, and suggested possible uses of two
kinds of toll logic not including the one by Pinkas (1991). More studies are
necessary to develop this proposal at the algebraic and logical levels especially.
Anyway the idea of reconsidering fuzzy set and possibility theory with a scale other
than [0,1] seems to be fruitful and may lead to new applications.
REFERENCES
1 INTRODUCTION
Current automated theorem prover ITP adopts strategies called set of support
strategy [5] and weighting strategy [6]. The reason for using strategies is that the
automated reasoning program can avoid many fruitless paths by their judicious
and "informed" application. The weighting strategy assigns some priorities to
each term, literal, and clause. With the weighting, one can assist the reasoning
program by contributing some of one's own experience capturing one's intuition,
in order to give the program hints. Weighting means assigning "weights" to
various axioms or concepts. Unfortunately, this weighting strategy is too heuristic
and too dependable on the subjective side of one's experience or intuition.
Here, we describe some of our results in applying the fast fuzzy relational
algorithms [3] as an automatic technique for extracting the weighting strategy.
Instead of determining the weighting patterns heuristically by an trial and error
approach, the new scheme provides a technique for selecting the weights auto-
181
R. Lowen and M. Roubens (eds.), Fuzzy Logic, 181-192.
© 1993 Kluwer Academic Publishers.
182
1. A set 0 of clauses 0.
The set of clauses used in the fuzzy matrix is formed from the logical axioms
of the problem to be solved, and from the immediate consequences of these ax-
ioms. Both are unified with the set of support by a suitable unification algorithm.
The immediate consequences consist of the very first level resolvent that is gen-
erated by applying the selected inference rules to the axioms and set of support,
by means of breadth first search. The set of properties is formed from the terms
which appear in the clauses representing the axioms and the immediate conse-
quences. The fuzzy relational matrix Dij gives the degree of relatedness between
the i-th element of the set clauses and the j-th element of the set of properties.
Let D ij denote the degree to which clause Oi is related to descriptor tj. Its value
can be viewed as the degree of relevance of the features described by descriptor
tj to clause 0i. The fuzzy degrees are determined by the recursive application of
the following rules [7]:
1. If the property j is an element of the clause i, then the degree of the relat-
edness D ij is 1.
2. If the property j is not an element of the clause i, then the degree of the
relatedness D ij is O.
3. If the property j is an element of a subterm (i.e., g(a)) of the clause i, then
the degree of the relatedness Dij is 0.5.
183
Once the matrix has been constructed, the next step is to build a descriptor
hierarchy from the fuzzy matrix. For this purpose the triangle relational products
are used. There are several types of product used to produce product-relations,
each distinctive in its intention and use. But, when the relations are fuzzy, there
is a further wide choice of realization for each of the four kinds of products,
because of the plethora of the many-valued logics based candidates [8] for the
role of implication operator and other connectives. The conceptual distinction
among the four main logical types of products (circle, both triangle types, and the
square type) is important [9], [10], as is the way in which the requirement for an
implication or equivalence operator [11] comes in. Each product type performs a
different logical action on the intermediate sets, because each logical type of
the product enforces a distinct specific meaning on the resulting product-relation
R*S.
The customary logical symbols for the logic connectives AND, OR, both
implications and the equivalence in the above formulas represent the connectives
of some many-valued logic, chosen according to the properties of the products
required. It is important to distinguish from what we call the harsh products
(defined above), the family of the mean products. Given the general formula
(R@S)ik ::= #(Rij * Sjk) the outer connective denoted # is replaced by L
and the resulting product normalized appropriately. The mean products are very
important in some applications [12], although their mathematical theory does not
take such a neat form as that of the harsh products. The mean products are used
in all subsequent investigations described in this paper.
Let us form the mean product type (DT@D)jk = #(D~ * Dik), where @ E
{<l, D} and look at the meaning of the respective relational composites. The
triangle sub-product and square product of D with its transpose DT will acquire
the following meaning:
184
In order to extract the descriptor hierarchy from the matrix (D T <I D)jk
derived as described above, we need to test this relation for its local relational
properties, to determine tho~e tis that are related at least in a fuzzy local pre-
order (i.e. have the property of local reflexivity, transitivity to a degree). This
processing is routinely done by the TRISYS program [13]. TRISYS uses the
fast fuzzy relational algorithm described by Bandler and Kohout[3] to compute
the fuzzy closure of the triangle product tracloD T <I D and compare it with
the original fuzzy composite D T <I D, to determine to what degree it possesses
the required local properties which are already fuzzy. The fast fuzzy relational
algorithms and the standard processing of a fuzzy local preorder for building the
Hasse diagram were described in detail by Bandler and Kohout in [3].
So, considered in practical terms, TRISYS accepts a matrix built in the way
shown above and extracts a descriptor hierarchy. The descriptor hierarchy is
a tree of terms or variables which appeared in the input axioms of the theorem
prover. The hierarchy is ordered in such a way, that the higher terms or variables
are more likely to produce the empty clause than lower terms. Since the resolution
theorem prover picks a clause which has the lightest weight first, the weight
assignement has to be ordered in such a way, that a lighter weight is assigned to
a descriptors that appears higher in the hierarchy extracted by the TRYSIS.
Our new weighting technique has been applied to several classes of problems that
are ameneable to the automated reasoning approach. The first example illustrat-
ing the results of the new weighting technique to be described here is the following
theorem of the group theory: "In a group, if the square of every element is the
identity, the group is commutative". The second application listed in the com-
parison below, involves a digital circuit problem of verifying the correct function
of the full adder [14]. The third demonstration of our technique presented here
is concerned with the well known AI problem called" the block problem" .
Our method significantly reduced the total number of steps and CPU time
that the ITP needed to reach the conclusion. The performance results of the
solution to all the three problems just described are listed in the table below. The
experiments were run on SUN 3/50 under UNIX, where the ITP was installed.
185
The Hasse diagrams extracted by TRISYS that provided the weighting leading
to the results listed in the above table were computed by the algorithm described
in [3] using the implication operators as follows: group theorem - L5 (a-cut at
.89, mean level); digital circuit - L6 (a-cut at .93, half-upper level); block world
- L55 (a-cut at .95, half-upper level). L5 is Lukasiewicz and L6 Kiene-Dienes
implication operator, respectively. Note that for each problem domain, a different
implication operator appears to be the best. Eleven different operators were
compared for each problem in this evaluation. For the mathematical definitions
of these operators see [15], [2]. It was concluded that the type of implication
operator in the fuzzy algorithms is strongly problem and data dependent, as
previously demonstrated in other applications [2], [16].
Let us describe in some detail the clause axioms and the example used in this
papers to demonstrate the results. The logical clauses (listed below) describe the
micro-world situation consisting of three blocks that can be spatially re-arranged.
The initial arrangement of the blocks, called the initial state is given together with
the goal state, specifying the final spatial arrangement that is to be achieved. The
notion of state used in the axiomatization is a snapshot of the world at a given
186
point in time. In describing a state of the Block World, we use the binary relation
On, Clear, and a unary relation symbol Table. And, to write state-dependent
sentences, we use the binary relation constant T to assert that a property is true
of a particular state. The symbol On is used to assert that one block is directly
on top of another block in a given state, while the symbol Clear is used to assert
that a block has no blocks on top of it in a given state. The Table is a unary
relation symbol that means a block is on the table in a given state. For example,
T(On(A,B),SI) means that block A is on block B in state S1. An action is to
change a state of world to a new state. An operator is a function from objects
to actions, which maps a group of objects into a common way of manipulating
those objects.
Let us choose the following block arrangement (problem 4): The initial state
is that block a, b, and c are on the table. The goal state is that block a is on block b,
and block b is on block c. The clause language for the block world problem (with
the initial and goal states for problem 4 incorpotated) consists of the following
clauses:
4 -T(Table(u),z) I T(Table(u),Do(U(x,y),z)).
5 -T(Clear(u),z) I T(Clear(u),Do(U(x,y),z)).
6 -T(On(u,v),z) I (u = x) I T(On(u,v),Do(U(x,y),z)).
7 -T(Table(u),z) I (u = x) I T(Table(u),Do(S(x,y),z)).
8 -T(Clear(u),z) I (u = y) I T(Clear(u),Do(S(x,y),z)).
9 -T(On(u,v),z) I T(On(u,v),Do(S(x,y),z)).
10 -T(x,z) I T(x,Do(Noop,z)).
11 -T(x,z) I T(x,Do(O,z)).
12 -T(x,Do(w,Do(y,z))) I T(x,Do([ylw]'z)).
13 -T(Table(x),z) I-T(On(x,y),z).
14 -T(Clear(y),z) I-T(On(x,y),z).
15 -T(On(x,y),z) I (y = w) I-T(On(x,w),z).
16 -T(On(A,B),x) I-T(On(B,C),x) I Goal(x).
17 -Goal(Do(x,y)) I Ans(x).
18 (A != B).
19 (A != C).
20 (B != A).
21 (B != C).
22 (C != A).
23 (C != B).
24 T(Table(A),Sl).
187
25 T(Table(B),SI).
26 T(Table(C),SI).
27 T( Clear(A),S 1).
28 T(Clear(B),SI).
29 T(Clear(C),SI).
30 -Ans([S(B,C)IS(A,B)]).
The Green's method uses the executability predicate to check every answer re-
turned by the process. If we find an answer that satisfies the predicate, we return
that term as answer to the overall planning problem.
Shown in Table 2, in each row are: the number of clauses generated, the
number of clauses kept in the proof, and the numbers in the parenthesis indi-
cate the cpu time. The experiment was run on the SUN sparc station under
UNIX, using OTTER. The inference rules hyperresolution and UR-resolution
were used simultaneously, with the best performance 3251 clauses generated and
1446 clauses kept, in 27 seconds. For comparison, the default weighting strat-
egy produces the proof consisting of 18595 clauses generated and 10716 clauses
kept, in 456 seconds, On the other hand, breadth first search reaches the conclu-
sion with 37381 clauses generated and 12455 clauses kept, in 1445 seconds. The
number of input clauses (axioms) is 30 in all cases.
A closer look at the Table 2 given below can help one to decide what is the
most suitable implication operator and the best a-cut for this specific domain.
188
TABLE 2: The Block World Problem - initial state: block A, B, and C are on the
table. Goal state: block B is on block C, block A is on block B.
Fuzzy implication operators L5, L6, and L7 at the a-cut of half-upper level
produce best results in the block world problems. The effect of the new weighting
mechanism, and the superiority of our approach using the many-valued logic
implication operators becomes more pronounced with the increase of complexity
of problems in this particular domain. It is interesting to note that the reduction
of complexity of the proofs is relatively higher for the problems that are more
difficult from the AI standpoint, that is for those problem<=; in which the subgoals
of the problem interact.
To evaluate more accurately the effect of the fuzzy algorithm on the weight-
ing strategy of the theorem prover, we make use of several distinct performance
evaluation measures. Let us define first, the meaning of the symbols used in the
formulas:
Four cases of the block world problem that were chosen for comparison were
arranged in the order of complexity. Description of the initial state and the goal
state of each of the four cases follows.
• block world 1: The initial state is that block a is on block b, and block b
is on block c. The goal state is block a is on the table.
• block world 2: The initial state is that block a is on block b, and block b
is on block c. The goal state is both of the block a and block c are on the
table.
• block world 3: The initial state is that block a is on block b, and block b
is on block c. The goal state is block b is on the table.
• block world 4: The initial state is that block a, b, and c are on the table.
The goal state is that block a is on block b, and block b is on block c.
The values of the coefficients Pp , PA, and PT of block problem 4 given above are
as follows:
BLOCK PROBLEM 4
Cl hyper. + OR-resol.
Pp 17 %
PA 13 %
PT 6%
The percentages listed in the tables above display the degree of complexity of
the tested strategy relative to the default strategy. So, for example, in the block
problem listed above, the duration of computation performed by FWS is only 6%
of the duration of computation performed by the default strategy DWS (taken
as 100%). This is a very significant improvement.
of the improvement measure for the proofs of four different block problems (see
above), produced by a FWS in which the new fuzzy mechanism is used to decide
the weights. The four block problems shown in the table below are arranged in
order of increasing complexity and their detailed description can be found in [21].
As seen in the table, the effect of the fuzzy algorithm becomes stronger when
the search for a conclusion of the proof is more complex. Thus 'block l' and
'block 2' are problems with non-interacting subgoals that are conveniently solved
by the conventional AI technique using and-or graphs. 'Block 3' and 'block 4'
on the other hand represent problems in which the subgoals mutually interact.
These problems are notoriously difficult. In this kind of problems the complexity
of search over and-or graph families representing interacting subgoals sharply in-
creases, in comparison with the problems that have noninteracting subgoals. It is
encouraging to see that for the difficult problems 'block 3' and 'block 4' the im-
provement produced by our new fuzzy-based weighting strategy is approximately
twelvefold. This indicates that our approach may have considerable power when
dealing with complex problems, in which subgoals and activities interact.
References
1. Wos, L., Overbeek R. Lusk E. and Boyle, J.
A utomated Reasoning: Introduction and Applications.
Prentice Hall, Englewood Cliffs, NJ, 1984.
2. Bandler, W. and Kohout, L.J.
Semantics of implication operators and fuzzy relational products.
Internal. Journal of Man-Machine Studies, 12:89-116, 1980.
Reprinted in Mamdani, E.H. and Gaines, B.R. eds. Fuzzy Reasoning
and its Applications. Academic Press, London, 1981, pages 219-246.
3. Bandler, W. and Kohout, L.J.
Special properties, closures and interiors of crisp and fuzzy relations.
Fuzzy Sets and Systems, 26(3):317-332, June 1988.
4. Lusk, E. L. and Overbeek, R.
The Automated Reasoning System ITP.
Aragonne National Laboratory, Aragonne, IL, 1984.
5. Wos, L.
A utomated Reasoning: 33 Basic Research Problems.
Prentice Hall, Englewood Cliffs, NJ, 1988.
191
Abstract
This paper deals with Zadeh's compositional rule of inference [Zad73]
under triangular norms: IF X is P AND X and Y have relation R,
THEN Y is Q, where P and Q are fuzzy sets of the real line R, R
is a fuzzy relation on R and the conclusion Q is defined via sup-T
composition of P and R:
It is shown that (i) when the triangular norm T and the membership.
function of the observation P are continuous, then the conclusion Q
depends continuously on the observation; (ii) when T and the member-
ship function of the relation R are continuous, then the observation Q
has continuous membership function. Furthermore, we present similar
results for the discrete case and for multiple fuzzy reasoning schemes.
·Supported by the Hungarian Research Foundation under the projects OTKA T 4281,
OTKA I/3 2152 and by the German Academic Exchange Service (DAAD).
193
R. Lowen and M. Roubens (eds.), Fuzzy Logic. 193-200.
© 1993 Kluwer Academic Publishers.
194
1. PRELIMINARIES
In this Section we set up the notations and present a lemma needed in
order to prove stability and continuity properties of the compositional rule
of inference under continuous triangular norms.
Definition 2.1. A fuzzy interval A is a fuzzy quantity with a contin-
uous, finite-supported, fuzzy-convex and normalized membership function
J.LA : R -+ [0,1].
The family of all fuzzy intervals will be denoted by F. Fuzzy intervals are
often used to represent linguistic variables [Wer90]. An a-level set of a fuzzy
interval A is a non-fuzzy set denoted by [AY:\' and is defined by
The following lemma [Fed92] shows that if the distance between the a-level
sets of fuzzy intervals A and B is small, then the distance between their
membership grades can not be too big.
195
The following theorem shows that when the observations are close to each
other in the metric D, then there can be only a small deviation in the
membership functions of the conclusions.
Theorem 3.1. Let b ~ 0 and T be a continuous triangular norm, and
let P, pI be fuzzy intervals. If
then
sup I/LQ(Y) - /LQ'(Y)I ~ wT(max{wp(6),wp,(6)}).
yER
I/LQ(Y) - /LQ'(Y)I =
I sup T(/LP(X),/LR(X,y)) - sup T(/LP(X),/LR(X,y))! ~
xER xER
sup IT(/Lp(X),/LR(X,y)) - T(/Lp'(X),/LR(X,Y))1 ~
xER
sup wT(I/Lp(x) - /Lp,(x)I) ~ sup wT(max{wp(6),wp,( 6)}) =
xER xER
wT(max{wp( b),wp,( b)}).
where H denotes the Hamming distance and the conclusions Q and Q' are
computed as
J-lQ(Yj) = . max T(J-lP(Xi), J-lR(Xi, Yj)),
t=l, ... ,m
Observation: P P'
Implication 1: PI --+ Ql P'1 --+ Q'1
Conclusion: Q Q'
Q = Po n
m
i=l
Pi -+ Qi, Q' = P' 0 nPI
i=l
m
-+ Q~,
i.e.,
I-"Q(Y) = sup T(I-"p(x),. min I-"p;(x) -+ I-"Q;(Y)),
xER l=l, ... ,m
The following two theorems can be proved similarly to Theorems 3.1 and
3.2.
Theorem 3.4.Let {j ~ 0, let T be a continuous triangular norm,
let P,P',Pi,PI,Qi,Qi, i = 1, ... ,m, be fuzzy intervals and let - + be a
continuous fuzzy implication operator. If
then
sup II-"Q(Y) - I-"QI(Y)I ::; wT(max{w({j),w-;(w({j))}),
yER
where w(b) = max {wp; ({j), wp:({j),wQ;({j),wQ:({j)} and W-; denotes the mod-
ulus of continuity of the fuzzy implication operator.
Theorem 3.5. Let - + be a continuous fuzzy implication operator, let
P, P', Pi, PI, Qi, Qi, i = 1, ... , m, be fuzzy intervals and let T be a continuous
t-norm. Then Q is continuous and
The stability property of the conclusion under small changes of the mem-
bership function of the observation and rules guarantees that small rounding
errors of digital computation and small errors of measurement of the input
data can cause only a small deviation in the conclusion, Le. every successive
approximation method can be applied to the computation of the linguistic
approximation of the exact conclusion.
References
[Dub88] D.Dubois, R.Martin-Clouarie and H.Prade, Practical comput-
ing in fuzzy logic, In: M.M.Gupta and T.Yamakawa eds.,
Fuzzy Computing: Theory, Hardware, and Applications, North-
Holland, Amsterdam, 1988 11-34.
[Mar89] P.Margrez and P.Smets, Fuzzy modus ponens: A new model suit-
able for applications in knowledge-based systems, International
Journal of Intelligent systems, 4(1989) 181-200.
[Zim87] H.-J .Zimmermann, Fuzzy sets, Decision Making and Expert Sys-
tems, Boston, Dordrecht, Lancaster 1987.
INTERVAL VALUED APPROXIMATE REASONING
FOR IGNORANCE PROCESSING
Kazuo Nakamura
Industrial Products Research Institute
1-1-4, Higashi, Tsukuba, Ibaraki 305, Japan
INTRODUCTION
Fuzzy sets with interval valued membership functions were introduced for
enhancing conventional fuzzy sets of Zadeh's original type[l5]. They are
briefly called interval valued fuzzy sets ([2][4][5][13]). This must be realistic
way coping with ambiguity of membership functions rather than type 2 fuzzy
sets[l6]. In these circumstances the need to extend approximate reasoning
based on such interval valued fuzzy sets has arisen, but the formalization
frame has not yet been established with significant concepts. For this the
interval valued fuzzy logic might be quite informitive.
In this report the formalization of extended approximate reasoning based on
interval valued fuzzy sets is proposed not only for single rule inference but
also for multiple rules inferences. The basic idea of the proposals derived
from the view points of aggregating the significances of several conventional
types of approximate reasoning for composing interval valued fuzzy relations
corresponding to rules, and from the view points of modifying Dempster's rule
of combination [10] for amalgamating the rules of a family.
o 1
truth
a*(x)
1------- a L (x) --~
Thus the fuzzy set A is called an interval valued fuzzy set (IVFS) if its
membership function is compatible with the interval truth value with respect
to "x is A" for each x in X. Fig.2 illustrates the concept of "OLD AGED".
~ upper of a(x) /
i 0.5 .f
~ .....
.8 .•••
E ••••
~ 0.0 +-_..:-"'T"'--Lr-.........-.-..,......--j
40 50 60 70 80
Age x
The fuzzy sets with extreme interval valued membership functions have
special meaning as described below.
The empty set lP :
l/Jdx) = l/Ju(x) =0, for all x in X, (8)
the universal set Q :
for all x in X, (9)
204
Conjunction A (l B:
I!lJ (l 1ffi(x)
=< a*(x) ~ b*(x), 1 - a*(x) ~ b*(x) - a- (x) V b- (x), a- (x) V b- (x) >
= [adx) ~ b dx), au(x) ~ b u(x)], (12)
where ~ and V respectively stand for t-norm and t-conorm of various types.
Disjunction A u B :
(IIu b(x)
= < a*(x) V b*(x), 1 - a*(x) V b*(x) - a- (x) ~ b- (x), a- (x) ~ b- (x)
=[ a L (x) V b L (x), a u (x) V b u (x) ]. (13)
The above set operations seem quite natural in the sense that Zadeh's
extension principle on operations of intervals follows such results ([7][16]).
Suppose IVFS's A and B are the set of all tall girls and the one of all
healthy girls of a school. Then the set of all healthy tall girls of the
school is given by A ( l B, and the one of all healthy or tall girls is given
by A u B introduced above.
Combination A © B :
Suppose that X is a collection of "old coins" which includes real ones and
imitations. One expert guesses A of X is the set of real old coins based on
some evidences, while the other expert guesses B of X is the set of real
205
B true
A b*(x)
true true
a*(x) a* ~ b*
true
a-~ b*
•
Fig. 3 Combination operation of A and B
206
[Proposition] For any az(x) and hex) and in both type of combinations,
(d9b)dx):S:; (d9b)u(x). (27)
Fig.4 illustrates the combination operations in two cases with different level of
conflict, i.e., a non-pathological conflict case and a pathological conflict case.
o .5 o .5 1
A d"iEfl}'ff::: A
0 . 5 9 1 i l.. . 111 [0,5,0.8]
1 ~l l l li~I I,~1 1 1 1 1 1 1
B
~~3
B
b;.4 [0.4,0,6] I Bjll1l il i l1l1lililll'IIlillillllllllili [0.3,0.5]
i) sum-product type
(a © b)*
(a i \
b)-
(a © bf (a © b)*
/ (a J b)- \
\ (a /© br
\ / ii) max-min type \
0.5 1 1!1 !'i!l ljl l il ~il ~~.~~~~;~O 0.5 l.i~ ~ I I !i',I ~ l il ~~~~i~.t;0.2
a) Non-pathological conflict case b) Pathological conflict case
Fig.4 Some illustrations of combination operations
B'=A'o R, (28)
where R is an interval valued fuzzy relation on X xY being compatible with
the given rule. That is,
b'dy) = sup [a 'dx) 1\ , dx ,y)] (29)
x
b'u (y) = sup [a 'u(x) 1\ 'u(x,y)]. (30)
x
Thus the issue addressed here is the formulation of R as an IVFS in X x Y .
Though a simple way introducing IVFS to conventional approximate reasoning
is established by employing extension principles (see e.g. Schwarts [9],
Gorzarczany [2]). However we introduce here differrent formulation for taking
account of ignorance positively
'dx,y) = a dX) .1 b L (y) (31)
'u(x,y) = (l-a L (x» V'bu(y) (32)
Note that lower membership function is given by Mamdani type while the
upper one is given by logical type. Further, note that a u(x) is irrelevant to
R. Representative cases are shown below.
(cl) When III '(x) {= [a, /3] : if x = xo
= [ 0, 0] : else,
then
b'L(y) = (a~aL(xo)}~bL(y)'
b' u (y) = ( 13.1 b u (y) ) V' { 13.1 (l - a dxo» ). (33)
Especially
(cl-l) when la, 13] =[ 1 , 1 ],
let a L (xo) =y, then
b'L (y) = y.1 b L (y),
b'u(y) = (l - y) V' bu (y) (34)
See Fig.5 (a) (b) (c) for this case.
(cl-2) When la, 13] =[0,1]
let a L (xo) = y, then
b' L (y) = 0,
b' u(y) = (l - y ) V' b u (y) (35)
(cl-3) when [a, 13] = [0, OJ,
b'dy) = 0,
b' u (y) = O. (36)
209
· ,.
!
~ 1.0 :0 1.0
~ ~
~
.~
~
~
.
."
0.5 a'
~
."
0.5
~
.0
li
.0
E E
0.0 0.0
~
::E
0 15
:;!
5 X-axl, 10 XO 0 5 Y-axis 10 15
.~
~
~ l-y .................
b'u /
i
~."
. .
~
."
0.5 0.5
bu
E y :: y ....:..'
b'l
.0
E
!E
:;! 0.0 0.0
0 15
:;! 0 15
5 Y-axis 10
r
~ 1.0 :0 1.U
b'u
..
~
~
~
~
.. 0.5
.
~
."
0.5 b uo'/
~ ~
li
b'L
~ .0
E :
:;! 0.0 0.0
0 xo :;! 0 10 15
5 X-axis 10 15 5 V-axis
,
(C) (JJ (XO) = [1,1], (JJ (Xo) = [0, 0]
m· 1.0
,. 1.0
.
.0
....
~
a
~
~
a ~
".
~
0.5 " 05
j
E
~
.8E
:;! 0.0 :;! 0.0
5 _ l0 15 0 10 15
0 X axh 5 V-axis
I
o'
~ bu,"'-
~
."
0.5 0.5
" ~"
b'L
.... ,
~
.0
CI. li
.0
CI.
o'
E E 0.0
o'
00 :;!
:;! 0 10 15 0 10 15
5 X-axis 5 Y-axis
(e) A' =A C
(c2) When a '(x) = a (x) for all x inX, aM supadx) =sup au(x) =1,
x x
b'dy) =b dy)
b' u (y) = b' u(Y) V sup [a u (x) ~ (1 - a u (x)) } (37)
x
See Fig. 5 (d).
(c3) When a '(x) = aC(x) for all x inX, aM supaL(x) =sup au (x) =1,
x x
b' L(y) = sup (a L(x) ~ (1 - a u (x)) } ~ b L (y),
x
b' u (y) =1 (38)
See Fig. 5 (e).
(c4) When cOl '(x) = [a, 13] for all x in X,
b' L (y) =a. .1 b dy),
b' u (y) =~ (39)
CONCLUSIONS
Ignorance is one of the crucial issues in knowledge processing. This paper
focuses on ignorance in approximate reasoning by employing interval valued
fuzzy sets and composing interval valued fuzzy relations for given rules. This
scheme is conceptually considered the aggregation of logical type and Mamdani type
inferences in approximate reasoning.
The author is grateful to Prof. M.Smithson for his comments and suggestions in
connection with the concept of conflict.
[REFERENCES]
[1] J.F.Baldwin, Evidential support logic programming, Fuzzy Sets ans Systems
24 (1987) 1-26.
[2] M.B.Gorzalczany, A method on inference in appoximate reasoning based on
interval-valued fuzzy sets, Fuzzy Sets and Systems, 21 (1987) 1-17.
[3] M.B.GorzaIczany, Interval-valued fuzzy inference involving uncertain
(inconsistent) conditional propositions, Fuzzy Sets and Systems, 29 (1989)
235-240.
[4] K.Hirota and A.Watanabe, Some properties of fuzzy evaluation in knowledge
representation, 4th Fuzzy System Symposium, (1988) 175-180 (in Japanese).
[5] FJ.Klir and T.A.Folger, Fuzzy Sets, Uncertainty, and Information, Prentice-Hall,
(1988).
[6] G.Lakoff, Hedges:A study in meaning criteria and logic of fuzzy concepts,
J.Philosophical Logic 2 (1973) 458-508.
[7] M.Mizumoto and K.Tanaka, Some properties of fuzzy sets of type 2, Information
212
Figure 1: Chains sets for labels A with AND connectives or their equiv-
alent.
ul=Sunday 1 0 ul=Sunday 1 0 1
u2=Monday 0 1 u2=Monday 0 1 1
P(Alch)=poss 1 1 P( Alch )=poss 1 1 1
P(chi A)=prob 0.5 0.5 P(chIA)=prob 1/3 1/3 1/3
cardinality 1 1 cardinality 1 1 2
P(ch) P(Alch)
P(chIA) = ~n P(ch n ) P(Alch n ) ,
(1)
the index n running over all chains. ch without index denotes a partic-
ular chain and P( ch) its probability when there is no conditioning by
A. Eq. (1) shows that a possibility 0 always implies a probability O. The
corresponding chains are usually left out from the chain set.
When the bloc entries are all 'pure', Le. either 1 or 0, we can also have
a cardinality row. The cardinality of a pure chain is equal to its number
of 1 entries. Taken together with the probability row, the cardinality
row represents a probability distribution over the nonnegative integers.
For example, Fig. 2(b) shows that when we are informed that 'Margy
is at home on Sunday OR Monday' (inclusive OR), then the number of
days on which Margy is at home (out of the days Sunday, Monday) is
1 with probability 1/3+1/3=2/3, 2 with probability 1/3 and 0 with
probability O.
Su 1 0 Su b b b Su 1 0 0
Mo 0 1 Mo 1 0 1 Mo 0 1 1
Tu b b Tu 0 1 1 Tu 1 0 1
poss 1 1 poss 1 1 1 poss 1 1 1
prob .! .! prob .! .! .! prob .! .! .!
2 2 3 3 3 3 3 3
Su 1 1 0 0 1 0 1
Mo 0 0 1 1 1 0 1
Tu 0 1 0 1 0 1 1
poss 1 1 1 1 1 1 1
1 1 1 1 1 1 1
prob "7 "7 "7 "7 "7 "7 "7
To find the chain set for 'A1 ORA A2', we first 'extend' every chain
in Ch),l and Ch),2 which contains one or more 'b' entries. This operation
consists of replacing the chain by two chains whose 0 and 1 bloc entries
are the same as those of the original chain. While the 'b' entry of the
original chain is replaced by 0 in one of the chains and by 1 in the other.
If the resultant chains still contain a 'b' entry, the extension operation
is repeated etc..
The chain set for 'A1 ORA A2' is now defined as a chain set over U
whose set of chains consists of the union of the set of chains of Ch),l and
Ch),2 respectively, see Fig. 3(d). To obtain the chain set for 'A1 ORE
A2' (exclusive OR) we must delete from (d) the three chains of (c). In
all cases the probabilities must be normalized so that they add up to 1.
The summation goes over all chains which are common to Ch qu and
Chinjo' We see that in order to answer a question, we need the possibility
row of Ch qu and the probability row of Ch injo '
Expressed in words, the operation of eq. (2) is the following. Take
the first chain of Ch injo , and check whether it has a matching chain in
Ch qu . If it does, then multiply the probability of that chain in Chinjo by
its possibility in Ch qu ' This product is the contribution of the first chain
of Chinjo to the answer value. Repeat this procedure for every chain of
Chinjo' The final answer is the sum of the contributions from each chain
of Ch injo '
As an example, the question 'Su ORA Mo' based on the information
'Su ORE Mo' (see Fig. 2(a),(b) ) gives the answer 0.5·1+0.5'1=1. In
contrast, the question 'Su ORE Mo' based on the information 'Su ORA
Mo' gives the answer (1/3)·1 + (1/3) ·1=2/3.
The above procedure assumes that Chinjo and Ch qu are pure chain
sets over the same ground universe. When the ground universe of Ch qu
is a subset of that of Chinfo, then Chinjo must be 'shortened' before
eq. (2) is applied. This means that all rows of Ch injo corresponding
to elements of its ground universe which are absent from the ground
universe of Ch qu are erased from Chinjo' If there is a duplication of
chains in the resulting chain set, then these chains are replaced by a
single chain whose probability is equal to the sum of the probabilities of
the originally duplicated chains.
°
I-dimensional cube, where I is the number of elements in the ground
universe. There are two points on each axis, the point for negation
of the corresponding element of the ground universe, and the point 1
for affirmation. Each vertex of the cube represents a 0-1 chain, and th.e
probability of that chain or vertex is the joint probability for the simul-
taneous negation or affirmation of the I elements of the ground universe,
based on the information in Ainjo' However, an IF AA THEN AC ques-
tion, e.g., 'IF Margy is NOT at home on Su, is she THEN at home
on Mo?' enquires about a conditional probability, based on information
Ainjo stored in the knowledge base. This is found in the following way.
218
Let Chinjo, cond be the product of Ch injo and Ch A , the chain set for the
antecedent of the IF THEN question. The question chain set is that of
Ae, the consequent of the conditional question. The question answering
procedure of section 3 is now applied to Chinjo, cond, the question being
represented by Ch e . (See end of sect. 7 for an example.)
5. Fuzzy Chain Sets. The chain sets of figs. 1,2 are nonfuzzy,
Le. the entries of their possibility row are either 1 or o. (The default
possibility value of missing 0-1 chains is 0). The upper table of Fig. 4
illustrates a possible fuzzy chain set for A=tall woman, for which the
P( Alch) possibilities can take values in the continuous interval [0,1].
The ground universe consists of possible exactly measured height values.
Every chain of this chain set has exactly one I-entry, the other entries
being 0, because a person can have one and only one exact height. The
chain set is therefore said to be of the Xl type. An Xl chain set always
degenerates to the form of the more compact table in the lower part of
Fig. 4.
(160,165] 1 0 0 0 0 0 0
(165,170] 0 1 0 0 0 0 0
(170,175] 0 0 1 0 0 0 0
(175,180] 0 0 0 1 0 0 0
(180,185] 0 0 0 0 1 0 0
(185,190] 0 0 0 0 0 1 0
(190,195] 0 0 0 0 0 0 1
Possib 0 0.5 0.8 0.9 1 1 1
Probab 0 0.096 0.154 0.173 0.192 0.192 0.192
measured height in cm
(160, (165, (170, (175, (180, (185, (190,
165] 170] 175] 180] 185] 190] 195]
Possib 0 0.5 0.8 0.9 1 1 1
Probab 0 0.096 0.154 0.173 0.192 0.192 0.192
Figure 4: The upper table represents a possible fuzzy Xl chain set for
'tall woman'. Since every chain may contain exactly one l-entry, it de-
generates to an ordinary possibility and probability distribution, shown
in the lower table, over the universe of measured height values. The
probability distribution is computed from the assumed possibility distri-
bution and an assumed probability distribution of women as a function
of height, using eq. {1J.
219
J.Ltall =
Margy 0.9 1 0 1 0 1 0 1 0
Ruth 004 1 1 0 0 1 1 0 0
John 0.7 1 1 1 1 0 0 0 0
Probability .252 .028 .378 .042 .108 .012 .162 .018
Cardinality 3 2 2 1 2 1 1 0
Figure 5: The chain-subset 'tall people' of the set {Margy,Ruth,John}.
Fig. 5 shows a non-Xl, fuzzy chain set which could be the knowledge
base subentry of 'tall people'. Its ground universe is the set of people
{Margy, Ruth, John}. The J.Ltall grades of membership or possibilities of
these persons are shown in the second column of the left margin.
To illustrate the meaning of the probability values we choose the
second chain in Fig. 5, ch= fO 1 11. The probability value of .028 for
this chain is obtained by multiplying 1-0.9=0.1 (the probability of a 'no'
answer to the question 'Is Margy tall?') by 004 and 0.7; its meaning
is Prob[(Margy is NOT tall), (Ruth is tall), (John is tall)], given that
J.Ltall(Margy) = 0.9, J.Ltall(Ruth) = 004, J.Ltall(John) = 0.7. A more
precise formulation of the last sentence must be based on the TEE model
interpretation of grades of membership [2], [4]. Note that the grade of
membership curve of John as a function of the exact height need not be
the same as that used for assigning grades of membership to Margy and
Ruth in order to construct the table of Fig. 5.
The cardinality, together with the probability row of Fig. 5, specify
the probabilistic cardinality of the subset of {Margy, Ruth, John} con-
sisting of those persons who are assigned a 'yes' answer concerning their
being 'tall'.
A 1 0 A 1 0 0 A 1 0 0
C 1 b C 1 0 1 C 0 1 0
poss 1 b poss 1 1 b poss 1 1 b
prob b b prob b b b prob b b b
then 'inverted'. The inversion of a chain set row does not change the
meaning of the chain set. It consists of 1) Replacing the element of the
ground universe of that row by its negation, in our case O/C is replaced
by I/C=C. 2) All the bloc entries of the row are inverted, Le. a 1 is
replaced by 0 and vice versa. A possible 'b' bloc entry is left unchanged.
So are the entries of the possibility and probability row.
A = IFATHENB
IFB THENC
A '\ IFATHENB A
1\;= IFBTHENC A
A l'
I
IFDTHENC
A £~~
C 1 0 1 1 C 1 1 0 1 1 1 1
B 1 0 0 1 B 1 1 000 1 1
A 1 0 0 0 A 1 1 000 0 0
D 1 o 0 1 0 1 0
poss 1 1 1 oss
(a) (b)
physical object 1 1 0 1 1
organism 0 1 0 0 1
non-organism 1 0 0 1 0
virus 1 1 o 0 0
possibility .6 .4 1 1 1
Figure 8: A simple fuzzy tree and its chain set. Notice the two fuzzy
possibility values.
the ground universe. When the chain set table becomes too big, it
can be decomposed into two or more smaller tables by 'cutting it over'
horizontally, and combining identical chains into one.
A forward-chaining inference follows the upward pointers in the rule-
based system. The corresponding procedure in the chain set system
looks for all chains with a I-entry in the row of the given antecedent
or condition, and finds those elements of the ground universe which
have only I-entries in these chains. In backward chaining we follow a
downward direction in the graph to find those nodes which may cause
the given final node. In the chain set we then look for elements of the
ground universe which imply the final specified element.
Multiple partition quantification structures and fuzzy trees are de-
scribed in [3]. Chain sets are well-suited to describe both structures.
Fig. 8 shows a simple fuzzy tree. Its chain set is characterized by fuzzy
possibility values.
References
[1] William S. Ratcher. The Logical Foundations of Mathematics. PWS-Kent Pub-
lishing Company, Boston, 1989.
[2] E. Risdal. Are grades of membership probabilities? Fuzzy Sets and Systems,
25:325-348, 1988.
[3] E. Risdal. A flexible classification structure. In M.M. Gupta and T. Yamakawa,
editors, Fuzzy Logic in Knowledge-Based Systems, Decision and Control, pages
11-67. Elsevier, North Rolland, 1988.
[4] E. Risdal. Infinite-valued logic based on two-valued logic and probability,
parts 1.3, 1.1. "The TEE model" and "Reference experiments and label sets".
Research Reports 147, 148, Institute of Informatics, University of Oslo, Box 1080
Blindern, 0316 Oslo 3, Norway, 1988,1990. ISBN 82-7368-054-1, and 053-3.
[5] E. Risdal. Naturalized logic and chain sets. Information Sciences, 57-58:31-77,
1991. Special number on 'Information Sciences - Past, Present, Future'.
[6] S.C. Kleene. Mathematical Logic. John Wiley, New York, London, 1968.
APPROXIMATE PATTERN CLASSIFICATION USING NEURAL NETWORKS
1. INTRODUCTION
...•.
H • H •
HHHQl Q)
·• • Qr.
• H.• H.H ..• ~> PRR~~+~ ••..•
..., .6."6 .Q.Q • •
;j
··0 ~.Q.~.O ~ • •
§<
H.
0·'0
Fig.l An example of the two deci- Fig.2 An example of the two deci-
sion areas that correctly sion areas that have some
classify all the patterns. misclasslfied patterns.
2. APPROXIMATE CLASSIFICATION
We use 'the following three areas in order to approximately classify the
pattern space Q.
Q,UQ2UQ'2=Q, (2.1)
n2
net p = ::E. WjOpj + O. (3.5)
j=1
(3.8)
(3.13)
(3.14)
where
(3.15)
(3.16)
The biases 8 j and 8 can be changed in the same manner as the weights
Wj i and Wj, respectively.
if Xp belongs to Class 1,
(3.17)
if Xp belongs to Class 2.
From (3.17). we can see that the different penalties (L e .• 1 and w (u) to
the patterns in Class 1 and Class 2. respectively) are attached to the
squared errors.
The learning with the cost function (3.17) can be easily implemented
as a computer program by modifying 0 p defined by (3.15) in the BP algo-
rithm as
(1) In the early stage (Le.• while u is small). the learning with the cost
function (3.17) is similar to the standard BP algorithm.
(2) In the late stage (Le.• while u is large). the learning for the patterns
in Class 2 is slight while it is substantial for the patterns in Class 1.
after enough iterations of the learning algorithm with the cost function
(3.17). The following condition can be used as one of the stopping condi-
tions of the learning algorithm.
0.2, 0.25, 0.35, 0.65, 0.75, 0.8, 0.85, 0.9, 0.95, I}.
In this example, all the patterns in the area of 0.4 ~ x ~ 0.6 belong to
Class 1 and all the patterns in x~0.25 or 0.75~x belong to Class 2. Two
areas 0.25 < x < 0.4 and 0.6< x < 0.75 can be viewed as boundary areas be-
tween Class 1 and Class 2.
We show the simulation result of the learning using the cost function
(3.17) in Fig.4. Fig.4 shows the shape of the output from the neural net-
work with five hidden units after 10,000 iterations of the learning algo-
rithm with (3.17). From this figure, we can see that the output is close to
1 (I.e., op'" 1) for all the patterns in Class 1 denoted by closed circles.
The output from the trained neural network can be viewed as indicating
the possibility of Class 1.
For the necessity analysis of Class I, the following cost function is em-
ployed instead of (3.17) used for the possibility analysis.
if Xp belongs to Class I,
(3.22)
if Xp belongs to Class 2.
We can see from w (u) < 1 that greater importance is attached to the pat-
terns in Class 2 than those in Class I, which is opposite to (3.17).
The learning with the cost functIon (3.22) can be easily Implemented
as a computer program by modifying oniy 0 p in the BP algorithm as
if Xp belongs to Class L
(3.23)
If Xp belongs to Class 2.
~:>
l.il .. . •..
that the following relation holds. ....,
~ il<
op '" 0 for all the patterns ....,0. .V
in Class 2. (3.24) ~
o
As one of the stopping condItions
il.5 I.il
of the learnIng algorithm, the
following condition can be used. Input value
op<0.5 for all the patterns Fig.S Simulation result of the
in Class 2. (3.25) necessIty analysIs of Class 1.
232
The simulation result with (3.22) is shown in Fig.5. From Fig.5, we can
see that the output is close to 0 (I.e., op'" 0) for all the patterns in
Class 2 denoted by open circles. The output from the trained neural net-
work can be viewed as Indicating the necessity of Class 1.
Let the two neural networks trained by the learning algorithms with
(3.17) and (3.22) be NN'" and NN"" respectively. We denote the outputs from
NN'" and NN", for the input vector x as /l. "'(x) and /l. ",(x), respectively. Let
us assume that the following conditions are satisfied (see (3.21) and
(3.25».
/l. "'(xp) > 0.5 for all the patterns in Class I, (3.26)
/l. ",(xp) < 0.5 for all the patterns in Class 2, (3.27)
Then the following inequalities hold since 0< /l. "'(xp)< 1 and 0< /l. ",(x p)< 1.
/l. (xp) > 0.25 for all the patterns in Class 1, (3.28)
/l. (xp) < 0.75 for all the patterns in Class 2, (3.29)
where
Output
/l. (x) = {/l. "'(x) + /l. ",(x)}/2. (3.30)
Q,UQ'2={X: /l.(x»0.25}.
NN* NN*
(3.31)
Possibility Analysis Necessity Analysis
Q2UQ '2 = {x: /l. (x)<0.75}.
(3.32)
I
2
Q , =Q - (Q UQ
2 12)
Input Vector
= {X: /l. (x)60.75}. (3.33)
Q2 = Q - (Q , U Q '2) Fig.6 Architecture of the proposed
= {x: /l. (x)~0.25}, (3.34) approximate classification system.
233
4. SIMULATION RESULTS
Example 2. Let us assume that the following 24 patterns are given in the
pattern space [0, 1].
In this example, there are two patterns at each of x = 0.4, x = 0.5 and x =
0.6. One of the two patterns belongs to Class 1 and the other to Class 2.
We trained the two neural networks with five hidden units using the
cost functions (3.17) and (3.22), respectively. Using the two trained neu-
ral networks NN'" and NN"" we obtained the approximate classification
system. In Fig.8, we show the shape of the output from the approximate
234
Q)
;::l
1.0 Q) 1.0 ...........
~ ~>
....,> ....,
....,2.
;::l
0.5 0.. 0.5
....,
;::l ;::l
o o
0.5 1.0
Input value
Input value
Fig.8 SImulation result with the Fig.9 Simulation result with the
proposed method. standard BP algorithm.
5. CONCLUSION
.~.
. ••• • ••• Ql.
••• •••
••
••
•
•
•-+•
O.S 1.0
Input value Xl
Fig.lO The output tJ. (x) from the ap- Fig.ll The three decision areas
proximate classification system. obtained from tJ. (x) in Fig. 10.
vided into the three decision areas: the two areas are the decision areas
of the two classes and the other area is the boundary area between them.
The main contribution of this paper is to propose a classification method
that explicitly assume the existence of the boundary area between the
two classes. A similar approach was also proposed in Archer & Wang[ 11]
from a different learning method where the concept of A -complement was
employed for modifying the target output for each pattern.
From the viewpoint of the learning of neural networks, the learning
algorithms employed in this paper are different from the standard BP al-
gorithm in the point that our approach is based on squared errors with
different penalty for each pattern. Similar learning algorithms were em-
ployed for the approximation of non-linear interval functions by two
neural networks in Ishibuchi et a1. [12,13]. Those learning algori thms can
be applied to the learning of neural networks with interval weights and
interval biases[14].
REFERENCES
ABSTRACT
INTRODUCTION
o otherwise
n
v = L ai r wi (5j)
i=l
L4 = Ll 0 L3 (6b)
I: L4 x L2 ---> {O,l}
such that
m n
]1 (ti, rk) = ~ ~]1 (dt, dr)
t=l r=l
s n
]1 (c~, rj) = ~ ~]1 (dc, dr)
c=l r=l
n
v = L ai r wi (9a)
i=l
1 if v ~ 02
ak = ---1 f(v) if
o otherwise
01 ~ v ~ 02 (9b)
where:
..
LOh) G is the qenetic defininq the
'f
syntax of '1', a and
CONCLUSION
REFERENCES
1. Introduction
A large class of decision problems can be characterized by what
we shall call screening problems In these types of problems one
usually starts with a large subset, X, of possible alternative
solutions. Each alternative is essentially represented by a minimal
amount of information supporting its appropriateness as the best
solution. This minimal amount of information provided by each
alternative is used to help select a subset A of X to be further
investigated. Two prototypical examples of this kind of problem
can be mentioned. The first is the job selection problem. Here a
large number of candidates, X, submit a resume, minimal
information, to a job announcement. Based upon these resumes a
small subset of X, A, are called in for interviews. These interviews,
which provide more detailed information, are the basis of selecting
winning candidate from A. A second example of these types of
problems occur in proposal selection problems. Here a large class
of candidates, X, submit preliminary proposals, minimal
information. Based upon these preliminary proposals a small subset
of X, A, are requested to submit full detailed proposals. These
detailed proposals are the basis of selecting winning candidate from
A.
251
R. Lowen and M. Roubens (eds.), Fuzzy Logic, 251-261.
© 1993 Kluwer Academic Publishers.
252
a rating for each alternative on each of the criteria. We note that each
of the criteria may have a different level of importance. As
previously noted the values to be used for the evaluation of the
ratings and importances will be drawn from a linguistic scale which
makes it easier for the evaluator to provide the information. We use
a methodology developed in [2, 3] to provide a single value rating
for each evaluator for each alternative. This rating is again a
linguistic value from the same simple linguistic scale. In the second
stage, we use a methodology introduced in [4] and extended in [5]
to aggregate the individual experts evaluations to obtain an overall
linguistic value for each object. This overall evaluation can then be
used by the decision maker as an aid in the selection process.
2. Problem Formulation
The problem we are interested in addressing can be seen to
consist of three components. The fIrst component is a collection
X = {XJ, ... X p }
of alternative solutions from amongst which we desire to select
some subset to investigated further.
The second component is a group of experts or panelists whose
opinion solicited in screening the alternatives. We denote this set of
experts as A = {A1, . . . Ar }. Generally r is much smaller than p.
A third component is a collection of criteria which are
considered relevant in the choice of the objects to be further
considered. We denote this as C = {CJ, ... Cn }. As we shall
subsequently see it is note required that each expert have the same
importance associated with each of the criteria.
1 An expert is not required to provide this information for any criteria which he
considers to have no importance in the decision process or for which he
considers himself unqualified to judge.
254
Memum(M) S4
Low S3
Very Low S2
None Sl
The use of such a scale provides of course a natural ordering,
Si > Sj if i > j. Of primary significance is that the use of such a
scale doesn't impose undue burden upon the evaluator in that it
doesn't impose the meaningless precision of numbers. The scale is
essentially a linear ordering and just implies that one score is better
then another. However, the use of linguistic terms associated with
these scores makes it easier for the evaluator to manipulate. The use
of such a linguistic scale also implicitly implies some concept of
being satisfactory or not. The use of such a seven point scale
appears also to be in line with Miller's [6] observation that human
beings can reasonably manage to keep in mind seven or so items.
Implicit in this scale are two operators, the maximum and
minimum of any two scores:
Max(Si, Sj) = Si if Si ~ Sj
Min(Si, Sj) = Sj if Sj S; Si
We shall denote the max by v and the min by 1\.
Thus for any arbitrary alternative Xi each expert will provide a
collection of n values.
[Xik(Cl), Xik(C2), .... Xik(C n )]
where Xik(Cj) is the rating of the ith alternative on the jth criteria by
the kth expert. Each Xik(Cj) is an element in the set S of allowable
scores.
Assuming n = 6, a typical scoring for an alternative from one
expert would be:
Xik: (high, medium, low, perfect, very high, perfect)
Independent of this evaluation of alternative satisfaction to
criteria each expert must assign a measure of importance to each of
the criteria. An expert uses the same scale, S, to provide the
importance associated with the criteria. It should be noted that there
is no overall requirement on the allocation of importances2. We
shall use Ii(Cj) to indicate the importance assigned to the jth criteria
by the ith expert. A possible realization for importances could be
Ii(ql) = p
Ii(q2) = VH
Ii(q3) = VH
2Prom a pragmatic point of view we suggest that those that are most important
be given the rating P.
255
Ii(q4) = M
Ii(q5) = L
Ii(q6) = L
The next step in the process is to find the overall valuation for a
alternative by a given expert.
In order to accomplish this overall evaluation, we use a
methodology suggested by Yager [2]. This approach was recently
discussed by Caudell [3].
A crucial aspect of this approach is the taking of the negation of
the importances. In [2], we introduced a technique for taking the
negation on a linear scale of the type we have used. In particular, it
was suggested that if we have a scale of q items of the kind we are
using then
Neg(Si) = Sq-i+ 1.
We note that this operation satisfies the desirable properties of
such a negation as discussed by Dubois & Prade [7].
(1) Closure
For any s E S, Neg(s) E S
(2) Order Reversal
For Si > Sj, Neg(Si) ;5; Neg(Sj)
(3) Ir.volution
Neg(Neg(Si)) =Si for all i
For the scale that we are using, we see that the negation
operation provides the following
Neg(P) = N (Neg(S7) = S1)
Neg(VH) = VL (Neg(S6) = S2)
Neg(H) = L (Neg(S5) = S3)
Neg(M) = M (Neg(S4) = S4)
Neg(L) = H (Neg(S3) = S5)
Neg(VL) = VH (Neg(S2) = S6)
Neg(N) = P (Neg(SI) = S7)
The methodology suggested by Yager [2] which can be used to
find the unit score of each alternative by each expert, which we shall
denote as Xik, is as follows
Xik = Minj [Neg(I(Cj) v Cik(Cj)] I
In the above v indicates the max operation. We first note that this
formulation can be implemented on elements drawn from a linear
scale as it only involves max, min and negation.
We note that I essentially is an anding of the criteria
satisfactions modified by the importance of the criteria. The formula
256
where
q-1
b(k) = Int [1 + (k * -r-)]'
We note that whatever the values of q and r it is always the case
that
QA(O) = S1
QA(r) = Sq.
As an example of this function if r = 3 and q = 7 then
b(k) = Int [1 + (k * ~)] = Int [1 + 2k]
and
QA(O) = S1
QA(1) = S3
QA(2) =S5
QA(3) = S7
If r = 4 and q = 7 then
b(k) = Int [1 + k * 1.5]
and
QA(O) = S1
QA(1) = S3
QA(2) = S4
QA(3) = S6
QA(4) = S7
In the case where r = 10 and q=7 then
b(k) = lot [1 + k *~]
10
then
QA(O) = S1
QA(1) = S2
QA(2) = S2
QA(3) = S3
259
QA(4) = S3
QA(5) = S4
QA(6) = S5
QA(7) = S5
QA(8) = S6
QA(9) = S6
QA(lO) = S7
Having appropriately selected Q we are now in the position to
use the ordered weighted averaging (OWA) method [4, 5] for
aggregating the expert opinions. Assume we have r experts, each of
which has a unit evaluation for the ith projected denoted Xik. The
first step in the OWA procedure is to order the Xik'S in descending
order, thus we shall denote Bj as the jth highest score among the
experts unit scores for the project. To find the overall evaluation for
the i th project, denoted Xi, we calculate
Xi = Maxj=l, ...r [Q(j) /\ Bjl.
In order to appreciate the workings of this formulation we must
realize that Bj can be seen as the worst of the jth top scores.
Furthermore Q(j) can be seen as an indication of how important the
decision maker feels that the support of at least j experts is. The
term Q(j) /\ Bj can be seen as a weighting of an objects j best scores,
Bj, and the decision maker requirement that j people support the
project, Q(j). The max operation plays a role akin to the summation
in the usual numeric averaging procedure. More details on this
technique can be found in [4, 5].
Example: Assume we have four experts each providing a unit
evaluation for project i obtained by the methodology discussed in the
previous section.
XiI =M
Xi2=H
Xi3=L
Xi4=VH
Reordering these scores we get
BI =VH
B2=H
B3=M
B4=L.
Furthermore, we shall assume that our decision making body
260
EXPERT 2
Satisfactions
...--------.
1m ortanees
Expert
ConsensU3
L
X
EXPERT n
Satisfactions
1m ortanees
Figure# 1
261
5. Conclusion
We have described a methodology to be used in the evaluation
of objects which is based upon a non-numeric linguistic scale. The
process allows for the multi-criteria evaluation of each object by
experts and then a aggregation of these individual experts to obtain
an overall object evaluation. This methodology has been suggested
as an approach to the screening of alternatives.
6. References
[1]. Arrow, K. 1., Social Choice and Individual Values, John Wiley
& Sons: New York, 1951.
[7]. Dubois, D. and Prade, H., "A review of fuzzy sets aggregation
connectives," Information Sciences 36, 85 - 121, 1985.
Margit KovAcs
Department of Computer Science, L.Eotvos University,
Budapest 112, P.D.Box 157, H-1502, Hungary
Abstract
In this paper a new class of fuzzy linear programming will be treated.
It is supposed that both coefficients of the objective and constraint func-
tions both the unknown decision variables are centered fuzzy numbers
of given basis and the min- and max- extended arithmetic operations
on the centered fuzzy numbers are defined as in (3). Using different
combinations of the min- and max- operations 8 different fuzzy linear
programming problems can be formulated, the optimality conditions of
which will be discussed.
[(eywords: Centered fuzzy numbers, linear programming, fuzzy linear
programming, optimality conditions
1. Introduction
In the classical linear programming it is supposed that the parameters are
well known characteristics of the problem. However, in a lot of practical prob-
lems the parameters are known only approximatively. In the fuzzy linear pro-
gramming the perturbations of the parameters are given by fuzzy sets, ex-
pressing in what degree may be a point acceptable as a real parameter. In the
practical problems, however, we can additionally suppose, that
- for every parameter there exists its desirable value;
- the uncertainty in a data is given as compared to this desirable value;
- the rate of acceptability of the parameters does not increase if we move
away its desirable value.
This assumption motivates us to use fuzzy numbers and consider the desirable
value of the parameter as the center of the fuzzy number.
The usual approach to the fuzzy linear programming defines the fuzzy func-
tion values by the t-norm modified extension principle. It is proved in [2] for
a wide cJass of t-norms that the fuzzified linear function value is also a fuzzy
number vf the same type as the fuzzifying parameters, but the spread of this
"This research has been partially supported by OTKA 1/3-2152 (Hungary)
265
R. Lowen and M. Roubens (eds.), Fuzzy Logic, 265-275.
© 1993 Kluwer Academic Publishers.
266
fuzzy function value depends on the weighted norm of the point in which the
function value is computed, and it grows if this point moves away from the
origin. However, in some practical problems the fuzziness ofthe function value
does not depend on the place of computation, it depends only on the shape of
the fuzzifying parameters. This fact has motivated us to introduce new arith-
metic operations between fuzzy numbers having center and define the fuzzy
linear programming with these operations.
Analogous problem was discussed in [1] extending the sum-operation by the
max-operation and the product by an Archimedean t-norm.
It is proved in [3], that F RB is closed for the operations defined by (1) and
(FRB,+(i\),€o), (FRB,+(V),Xo), (FRB,.(i\),€t), (FRB,.(i\),Xl) are lattice
ordered monoids, where Xa =
(a,x{O}) and €a =
(a,€) . Moreover, the
pairs of operations (+(i\), .(i\»), (+(i\), .(V»), (+(V), .(i\»), (+(V), .(V»)
are distributive.
(-1'1, ct) .(0) (~1, xt) +(#) 00 • +(#) (')'n, en) .(0) (~n, Xn ) ---+ min (2)
subject to
l, ... ,m,
j=l,oo.,n, (4)
where # and * are either the V or the 1\ operations, R is either the :S or the ~
relation,cj,aij,bi,xjEB, 'Yj,O:ij,f3i,~jE/R, i=l, ... ,m, j=l, ... ,n.
The problem F LP(R, #, *) with different combinations of R, # and *
represents 8 different fuzzy linear problems, the optimality conditions of which
are formulated in the following theorems.
/Rn is a solution of the F LP(R, #, *) problem, then e* is optimal for the clas-
sical linear programming problem
n
subject to
In other cases extra condition for the basis functions is not demanded.
e
Proof The necessity of feasibility of for (5)-(7) follows from the definition of
the extended operations and relations between centered fuzzy numbers. On the
other hand it is also obvious from the mentioned definitions, that the spreads
of basis elements of the coefficients and the unknown parameters play role in
the question of feasibility only if there are active constraints at the point for e
(6)-(7) .
(1) If (e, x) is feasible for F LP('.5., A, A) and 1$(~) f. 0 then x must satisfy
the following inequalities:
Then for every i E 1$ (~) there exists j E {I, ... , n} such that
which can be satisfied only if for every i there exists j such that aij '.5.8 bi , but
this condition is equivalent with the condition given in the theorem.
(3) The condition of feasibility of (e,x) for FLP('.5., V,A) if 1$(~) f. 0 is
It fulfill~ iffor every i E I S (~) and j E {I, ... , n}:aij A Xj '.5.8 bi , which is valid
without any condition.
(4) If (e,x) is feasible for FLP('.5., V, V) and 1«~) f. 0 then x must satisfy
the inequalities -
V'l=l(aij V Xj) '.5.8 bi , i E IS(~)'
Using the associativity of the V operation we can describe this inequality in
the equivalent form
269
This inequality system is solvable only if VJ=laij ~8 bi for all i E I~(~), what
was demanded.
(5) The feasible set fOl" F LP("2, 1\, 1\) is not empty if the system
1\'J=l(aij I\Xj) "28 bi, i E h(~)
has solution. This condition is equivalent with the condition that for every
j E {I, ... , n} the system
aij 1\ Xj "28 bi, i E I~(~)
has solution. This last condition can be fulfilled only iffor every j E {I, ... , n}:
aij "28 bi, i E I~ (~), consequently if the condition of the theorem holds.
(6) For the problem F LP("2, 1\, V) the condition of feasibility of the con-
straint set in an active center point is the existence of a solution of the system
1\'J=l(aij V Xj) "28 bi, i E h(~)
It is equivalent with the condition that for every j E 1, ... , n the system
aij V Xj"28 bi, i E I~({)
has solution. But this condition one can satisfy without any condition for the
basis elements of the coefficients.
(7) If there exists feasible (e, x) for F LP("2, V, 1\) in an active center point
e then x must satisfy the inequality system
Vj"=l(aij I\Xj) "28 bi, i E I~(O·
It means that for every j E 1, ... , n the existence of the solution of the system
aij 1\ Xj "28 bi, i E I~({)
is necessary. But these systems can be solved only if there exists j E {I, ... , n}
such that aij "28 bi fOl" all i E 1>(0. Fwm this condition follows the condition
given in the theol"em.
(8) In the case of F LP("2, V, V) for the feasibility of the constraint set in
e
an active center point the existence of the solution of the system
V J=l(aij V Xj) "28 bi, i E I~(~)
is necessary. Using the associativity of the V operation we have the condition
in the fmm
(Vj=Iaij) V (Vj=IXj)"28 bi, i E I?: ({),
which can be fulfilled without any condition on the parameters. 0
Since the solutione* of the classical linear programming problem (5)-(7)
is a boundery point of the feasible set (6)-(7) , therefore the active index set
IR(C) i.> not empty. Consequently we have to examine the basis system in
point of view of optimality.
Let us intwduce the following denotions:
10 {i E I~(C) : 1\j"=laij <8 bd
II {i E I~(C) : Vj"=Iaij <8 bd
270
Theorem 3 Let us assume, that the coefficients of the objective function (5)
are proper centered fuzzy numbers and the conditions of the Theorem 2 for the
existence of feasible basis in the active constraint points hold. If (e*, x*) is op-
timal for F LP( R, #, *) , then the basis x must satisfy the following conditions:
1. For F LP(~, A, A) :
An
"j=l x*j -- X{OJ,.
2. For F LP(~, A, V) :
3. For F LP(~, V, A) :
V nj=l x*j --13 X{O},.
4. For F LP(~, V, V) :
5. For F LP(?, A, A) :
6. For F LP(?, A, V) :
7. For F LP(?, V, A) :
8. For F LP(?, V, V) :
for all feasible x. Since /\'!=1 X j =8 X{O} is feasible, the optimal basis must
satisfy the inequality
(2) In the case of F LP('.5., /\, V) from the feasibility of x· follows that for
every i E IS(C) there exists j(i) E {I, ... , n} such that
Since
we have
/\'!=1 x; '.5.6 /\iEI~(e*)bi' (8)
Otherwise, since x j =6 X{O}, j E {I, ... , n} is feasible, for x· we have
From this follows that there exists j E {I, ... , n} such that
therefore
(9)
(8) and (9 together give the condition of the theorem.
(3) In the case F LP('.5., V, /\) Xj =6 X{O}, j E {I, ... , n} is feasible, so for
the optimal basis we have to satisfy the inequality
has solution. Since the coefficients are proper fuzzy numbers, this inequality
can be fulfilled only if
(10)
272
Since x j =6 X {o}, j E {I, ... , n} is feasible, for the optimal basis we have
(11)
(10) and (11) together give the corresponding condition of the theorem.
(5) From the feasibility inequality for F LP(?, II, II) we have that
which gives the following upper bound for the optimal basis:
(12)
J J
(II =1 Cj) II (1Ij'=1 xi) :S6 (II =1 Cj) II (ViE/?({*)b;). (13)
from which
A']=1 x; :S6 ViE/?({*)b;. (14)
From (12) and (14) we get the corresponding statement of the theorem.
(6) In the case of F LP(?, II, V) x' is feasible at e* if
i.e. if
aij V x; ?6 bi , i E I~(C), j E {I, ... , n}. (15)
Ifi E 1~(C) is such that
then thE inequalities in (15) corresponding to this i can be fulfilled with any x.
Therefore the feasible set depends only on indexes i E 1>(C), which belong to
the index su bset 10 . -
If 10 = 0 then x j =6 X{O}, j E {I, ... , n} is feasible, so the optimal basis
must satisfy the inequality
273
From this we have, that there exists j E {I, ... ,n} such that Cj V xi ::;8 /\i=1 Cj
i.e. there exists j E {I, ... , n} such that xi ::;8 /\'J=1Cj. Consequently,
therefore
/\'!=1 Xj ::;8 (/\'!=1 Cj) V (ViEIobi).
(17)
(7) If the necessary condition for the feasibility fulfills then x* is feasible
basis at C if there exists j E {I, ... ,n} such that Xj 2:13 bi for all i E h (C),
from which follows that -
(18)
Let xi =13 ViEl~ w )bi , j E {I, ... , n} . It is a feasible basis, therefore for
the optimal basis
274
If 1\'1=1 Cj >13 ViEI~W)bi, then x; :::;13 ViEl>(~.)bi must be satisfied for every
j E {I, ... , n}. This condition gives with (i8) together the statement of the
theorem. Ifthere exists j E {I, ... , n} such that Cj :::;13 ViEI>(~.)bi, then for
this index xi can be chosen arbitrary satisfying (18). -
(8) For the problem F LP(~, v, V) the feasibility condition is
If for an:; i E I ~ (C) V'!= 1 aij ~ 13 bi then for this i the corresponding inequality
can be satisfied with any x. Therefore only the indexes i E 11 play role in
obtainin 6 the feasible set, and if h i- 0 then
(20)
If h = 0 then xj =13 X{O}, j E {1, ... ,n} is feasible, so for the optimal
basis
from where
V'J=1 x; :::;8 V'J=1 Cj.
Let hi- 0. Choose x j =13 ViEhbi, j E {1, ... ,n}. It is feasible, so the
optimal basis must satisfy the inequality
From this follows that the optimal basis is a solution of the system
275
From this one can obtain that x j ::; 13 Vj= 1 Cj for all j E {I, ... , n}, consequently
from where
V'l=lXj ::;13 ViEh bi ,
4. Conclusion
The problem of fuzzy linear programming discussed in the previous sections
is useful for modelling many practical problems, the parameters of which are
known only approximativelly and when we want to follow the influence of the
parameter perturbation on the optimal result. Contrary with the usual fuzzy
linear programming models this approach produces the fuzziness of the solution
by coordinates. From computational point of view it is very easy, it requests
to solve only classical LP problem.
References
[1] M. Kovacs. Linear programming with centered fuzzy numbers. Annales
Univ. Sci. Budapest, Sectio Comp., 12:159-165, 1991.
[2] M. Kovacs. A stable embedding of ill-posed linear systems into fuzzy sys-
tems Fuzzy Sets and Systems, 45(3):305-312, 1992.
Masatoshi SAKAWA
Department of Industrial and Systems Engineering,
Faculty of Engineering, Hiroshima University,
Higashi-Hiroshima 724, Japan
Hitoshi YANO
Nagoya Municipal Women's College, Nagoya 464, Japan
ABSTRACT
In this paper, we focus on multiobjective nonlinear programming problems
with fuzzy parameters and introduce new solution concepts by assuming that
the decision maker may have fuzzy goals for each of the objective functions with
fuzzy parameters. In order to deal with multiobjective nonlinear programming
problems with fuzzy parameters, two types offeasibility and two types of Pareto
optimality are introduced by making use of several indices for ranking two
fuzzy numbers proposed by Dubois and Prade. Then new solution concepts
are defined by considering both two types of feasibility and Pareto optimality,
and it is shown that new solutions proposed here can be obtained on the basis
of nonlinear programming for appropriate satisficing levels..
Keywords : multiobjective nonlinear programming problems, fuzzy parame-
ters, fuzzy goals, possibility, necessity.
INTRODUCTION
In general, considering the imprecise nature of the human judgements in
the real-world decision situations, two types of fuzziness of human judgements
should be incorporated in multiobjective programming problems. One is the ex-
perts) ambiguous understanding ofthe nature of the parameters in the problem-
formulation process, and the other is the fuzzy goals ofthe decision maker (DM)
for each of the objective functions.
Recently, Sakawa and Yano [10] defined the four types of a-feasibility and
four types of ,-Pareto optimality concepts for multiobjective nonlinear pro-
gramming problems with fuzzy parameters which reflect the experts' ambigu-
ous understanding of the nature of the parameters in the problem-formulation
process, by using four indices proposed by Dubois and Prade [2,4] for ranking
two fuzzy numbers via the concepts of possibility and necessity. By combining
a-feasibility with ,-Pareto optimality, they introduced (a,,)- Pareto optimal
solution for multiobjective nonlinear programming problems with fuzzy param-
eters, and showed that some (a,,)- Pareto optimal solutions can be obtained
on the basis of nonlinear programming.
More recently, by assuming that the fuzzy goals of the DM for each of the
objective functions can be quantified by eliciting the corresponding membership
277
R. Lowen and M. Roubens (eds.), Fuzzy Logic, 277-286.
© 1993 Kluwer Academic Publishers.
278
functions, Sakawa and Yano [11,12] defined the extended Pareto optimal solu-
tion concepts in the index space for multiobjective linear and linear fractional
programming problems with fuzzy parameters by incorporating fuzzy goals,
and proposed linear programming based interactive decision making methods
to derive the satisficing solution of the DM from among the extended Pareto
optimal solution set.
In this paper, as further generalizations, we focus on the multiobjective
nonlinear programming problems with fuzzy parameters incorporating fuzzy
goals of the DM. To cope with such problems, by adopting two types of indices
as the degree of coincidence between the fuzzy goals of the DM and the objec-
tive function values involving fuzzy parameters, two types of extended Pareto
optimality are defined in the index space. Then an algorithm to generate the
extended Pareto optimal solutions is developed together with an illustrative
numerical example.
Pos(m ~ n) sup{min(Jim(u),Ji,;,(v)) IU v}
~ (1)
Pos(m> n) sup{inf{min(Jim( u) 1 - Ji,;,( v)) I U ::; v}} (2)
u v
Nes(m ~ n) inf{sup{max(l- Pm(u),Ji,;,(v))
u v
I U ~ v}} (3)
where Jim (u) or Ji,;, (v) is the membership function of m or n, and Pos or N es
is short for Possibility or Necessity.
They also defined the following two indices for equality relations between
two fuzzy numbers.
Definition 2
The following theorem shows the relationships between these indices and the
a-level sets of the fuzzy numbers, where m~, m;;, n~ and n;; are the left and
right side extreme points of the a-level sets of the fuzzy numbers m and n
respectively.
Theorem 1
N es( m 2: ii) 2: a
<==> (9)
Nes(m > ii) 2: a <==> (10)
Pos(m = ii) 2: a <==> (11)
Nes(m J ii)2: a <==> (12)
PROBLEM FORMULATION
Consider the following multiobjective nonlinear programming problem in-
volving fuzzy parameters (MONLP-FP) [10] :
if flR 2: Ii,
"oJ/;) = { :CCfl R
- f;)/(J,OR - flR)) if flR < Ii < fpR, (16)
if fpR:s fi,
(2) i E h :
if fpL 2: Ii,
"c.(J,) ~ { ~CC!lL - /;)/C!PL - flL)) if fPL<fi<fl L , (17)
if flL:s Ii,
(3) i E 13 :
o if fpR:s Ii,
R((flR - f;)/(fpR - flR)) if JlR < Ii < fpR,
J.lai(Ji) = 1 if JlL:s fi :S JlR, (18)
L((flL - Ji)/(fpL - ilL)) if fpL < Ii < JlL,
o if fpL 2: Ii,
where fi = fi (x, ai) and L(-) and R(-) are reference functions [3] and fpL and
fpR are unacceptable levels for fi(X, ai) and JlL and flR are totally desirable
levels for Ii(x, ai).
After eliciting the membership function J.la. (.) of the DM for each of the ob-
jective functions in the GMONLP, if we incorporate the fuzzy goals of the DM
into the MONLP-FP, the MONLP-FP can be formally transformed as the fol-
lowing fuzzy multiobjective nonlinear decision making problem (FMONLDMP).
maximize (J.la, (fI_(x, ih)), J.la 2 (f2(x, (2)), ... ,J.la. (!k(x, ak)))} (19)
subject to x E X(b).
In order to deal with this problem involving fuzzy parameters, we must resolve
the following questions.
281
(1) How can we define the feasibility concept for the constraints involving
fuzzy parameters ?
(2) How can we define the degree of the attainment of the fuzzy goal for the
objective function value involving fuzzy parameters?
In order to resolve these two questions, in the following, we introduce new
solution concepts for the FMONLDMP by using several indices for comparing
two fuzzy numbers which are introduced in the previous section.
a-FEASIBILITY
In order to deal with the constraint set involving fuzzy parameters
(20)
Sakawa and Yano (10) have already introduced foul' types of a-feasibility using
the foUl' indices for ranking two fuzzy numbers.
Definition 3 (a-feasibility)
(1) x E R n is a-Very Weak feasible (a-VWF) to (20), if and only if
I-PARETO OPTIMALITY
In order to deal with the FMONLDMP, we have to extend the ordinary
Pareto optimality concept. To do so, consider the following multiobjective
nonlinear programming problems where only the parameters of the objective
functions are fuzzy numbers.
ma~imize (PG , (J:(x,iit)), PG~(h(x, a~)), ... '~Gk (!k(x, ak )))} (28)
subject to x E X(b) = {x E R I 9j(x,bj ) :::; 0,) = 1, ... , m}.
As was pointed out by Inuiguchi et al. [6,7], while the fuzziness in the
parameters expresses uncertainty of the parameters, the fuzzy goals of the
DM for each of the objective functions express the indefiniteness in nature
or character as idea, feeling, etc. From such a point of view, in this paper,
by using the two indices for equality relation between two fuzzy numbers, we
adopt the following definition as the degree of the attainment of the fuzzy goals
Gi ,i=I, ... ,k.
Definition 4 (satisficing level)
(1) x* E X(b) is I-Weak Pareto oQ.timal (I-WP) to (31), if and only if there
does not exist another x E X (b) such that
N es(Ji(x, iii) C C;) ?:: N es(Ji(x*, iii) C Ci), i = 1, ... ,k. (34)
with strictly inequality holding for at least one i.
(39)
By using this theorem together with the bisection method, we can now con-
struct the algorithm to generate the corresponding 1- WP for some given l3i, i =
1, ... , k.
ALGORITHM 1
Step 1 : Ask the DM to set the initial degree 13?, (0 :S 13? :S 1), i = 1, ... , k,
in his/her subjective manner.
Step 2 : For the initial degree 13?, i = 1, ... , k, check whether an admissible
set satisfying the inequalities (37) and (38) exists or not. If an admissible
set does not exist, then update I3l = 0, i = 1, " ., k. Otherwise, update
I3l = 13? / l3~ax, i = 1, ... , k, where l3~ax = maxi=l .... k I3r set n = 1.
Step 3 : For the degree I3r, i = 1, ... , k, check whether an admissible set sat-
isfying the inequalities (37) and (38) exists or not. If an admissible set
does not exist, then update I3f+1 = I3r- Il3r -l3f- 1 1 /2, i = 1, ... , k.
=
Otherwise, update 13~+1 l3i+ Il3r -13~-1 1/2, i =
1, ... , k.
Step 4 : If the termination condition 1:7=1 Il3f+1 -l3r 1< f is satisfied, then
go to Step 5. Otherwise set n <-- n + 1, and go to Step 3, where f > 0 is
the convergence parameter.
Step 5 : For the values of l3i = .ef+1, i = 1, ... , k, solve one of the following
nonlinear programming problem, where 1 E h is assumed.
NUMERICAL EXAMPLE
To clarify the concept of I-a-VWP as well as the proposed algorithm
for deriving the satisficing solution of the DM, consider the following three
objective nonlinear programming problem involving fuzzy parameters.
where ai, a2 and a3 are fuzzy numbers whose membership functions are defined
by:
fJal (ad = max(l- I a1 - 1.5 I, 0)
fJa2(a2) = max(1 - 0.2 I a2 - 6 1,0)
fJa3(a3) = max(1- 0.2/ a3 - 51,0)
Now, for illustrative purposes, suppose that the interaction with the hypothet-
ical DM establishes the following simple linear membership functions for the
fuzzy goals 6 1,6 2 and 6 3.
h:::; 20
"".eM = { ~- 1f, - 20 1/10, 20 < G 1 < 30
It 2: 30
!z:::; 29
"G,(j,) ={ ~- 1 j, - 291/5, 29 < h < 34
h 2: 34
fa :::; 16
"",(h) = {~-I h - 161/5, 16 < fa < 21
h 2: 21
Also assume that the hypothetical DM selects the initial satisficing levels
((31,/32,(33) to be (3/8,3/5,9/20). Then, by applying Algorithm 1, the param-
eters ((31,(32,(33) converge to (1/2, 4/5, 3/5), and the corresponding nonlinear
programming problem in Step 5 of Algorithm 1 is expressed as:
This nonlinear programming problem has the unique optimal solution (xi, xi) =
(5,3), and (ai,ai,a s)=(1,5,3).
CONCLUSIONS
In this paper, by assuming that the DM has the fuzzy goals for each of the
objective functions, two types of a-feasibility and two types of I-Pareto opti-
mality are introduced for multiobjective nonlinear programming problems with
fuzzy parameters via the concept of possibility and necessity. By combining
a-feasibility and I-Pareto optimality concepts, I-a-Pareto optimal solutions are
introduced, and it has been shown that any I-a-Pareto optimal solutions can be
obtained on the basis of nonlinear programming. However, applications to the
real-world problems must be carried out in cooperation with a person actually
involved in decision making. From such experiences the proposed method must
be revised.
REFERENCES
[1] Chankong V. and Y. Y. Haimes (1983) Multiobjective Decision Making:
Theory and Methodology. North-Holland, New York.
[2] Dubois D. (1987) Linear Programming with Fuzzy Data, in J. C. Bezdek
(Ed.): Analysis of Fuzzy Information, Vol. 3, CRC Press, pp. 241-263.
[3] Dubois D. and H. Prade (1980) Fuzzy Sets and Systems: Theory and
Applications, Academic Press.
[4] Dubois D. and H. Prade (1983) Ranking Fuzzy Numbers in the Setting of
Possibility Theory, Information Science, 30, pp. 183-224.
[5] Dubois D. and H. Prade (1987) Fuzzy Numbers: An Overview, in J .C.
Bezdek (Ed.) : Analysis of Fuzzy Information, Vol. 1, CRC Press, pp.
3-39.
[6] Inuiguchi M. and Y. Kume (1989) Modality Goal Programming Problems,
JORSJ, 32, pp. 326-351 (in Japanese).
[7] Inuiguchi M., H. Ichihashi and Y. Kume (1989) A Modalistic Formulation
of Fuzzy Mathematical Programming, ISCIE, 2, pp. 69-79 (in Japanese).
[8] Sakawa M. (1986) Optimization in Nonlinear Systems with Single and
Multiple Objectives, Morikita (in Japanese).
[9] Sakawa M. (1989) Theory and Applications of Fuzzy Theory, Morikita (in
Japanese) .
[10] Sakawa M. and H. Yano (1991) Feasibility and Pareto optimality for multi-
objective nonlinear programming problems with fuzzy parameters, Fuzzy
Sets and Systems, Vol. 43, pp. 1-15.
[11] Sakawa M. and H. Yano (1990) Interactive decision making for multiobjec-
tive linear fractional programming problems with fuzzy parameters based
on a solution concept incorporating fuzzy goals, Proceedings of Interna-
tional Conference on Fuzzy Logic & Neural Networks, IIZUKA 90, Vol.
2, pp. 821-824, Fukuoka, Japan.
[12] Sakawa M. and H. Yano A Interactive decision making for multiobjective
linear programming problems with fuzzy parameters based on a solution
concept incorporating fuzzy goals, in M. Fedrizzi, J. Kacprzyk and M.
Roubens (Eds.) Interactive Fuzzy Optimization and Mathematical Pro-
gr amming, Springer-Verlag, (to appear).
ON OPTIMIZATION WITH
Christer Carlsson
INTRODUCTION
There are numerous methods available for finding xi(cf e.g. [5], [12],
[13]), if (i) the set of feasible alternatives is well-defined, (ii) there is
a rationally structured model of preferences, where the preferences
satisfy some necessary mathematical properties, and (iii) the problem
of finding an efficient alternative is a well-formulated mathematical
problem (cf [6]). If the criteria are independent, there are various
aggregation methods (additive forms, weighted sums, expected utility,
and utility additive and multiplicative forms) available for comparing
and ranking nondominated alternatives, which (in a sense) reduces the
multiple criteria problem to a situation comparable with the single
criterion decision - and quite a few insights in the decision problem
are simplified away.
A recent paper of Sakawa and Yano [9] very nicely demonstrates the
state of the art when we want to deal with multiple criteria problems
which are - and cannot be - well-defined. Their model is a multiple
objective linear fractional programming model, with fuzzy parameters
and an uncertain goal for the objective function. The uncertainty is of
two types: (i) an uncertainty of the satisfaction with the value of an
objective function; and (ii) an uncertainty of the possibility to generate
289
INTERDEPENDENT CRITERIA
Seller's Buyer's
resetvation price resetvation price
There is also some interaction among the Seller's and the Buyer's
objectives, which partly explains why they are negotiating. (C 3 and C4)
are mutually supportive; C6 unilaterally supports the objective C3, and
(Cs, Cs) are conflicting.
Let the objectives (C\,..., Cs) be represented (cf [9]) by the following
criteria (ck(\)"'" ck(S»), where each of the (k(1),...,k(8)) represents (n\,...,ns)
attribute dimensions. Let the set x be the strategic assets of the
company targeted for the takeover; the strategic assets are evaluated
in the (n\, ns) attribute dimensions, for a strategic planning interval T,
which should form the basis for a negotiated takeover price.
Let Ij(x) denote the importance and Aj(x) the attainment of a criterion
292
The Ij(x) = [IP(x), Iq(x), r(xH, Le. the importance is dependent upon
if the criterion i is in conflict with / unilaterally supports / mutually
supports (one or more) other criteria; the importance is evaluated over
all criteria by,
The weights Ws = [wp, wq, wr] are used to assign importance to the
criteria according to the following scheme:
(i) conflicts:
293
ws(i) = WJ(i)
· about 0.75 for mutual support with a minority of other criteria;
· [0.75, 1] for mutual support with about half of the other criteria;
· close to 1 for mutual support with a majority of the other criteria;
Let us now assume that we (i) know Iis(x) and Ai(x), and (ii) could
construct H', the OWA-operator (cf [10]). Then we could evaluate and
rank-order all criteria according to their grade of effective attainment.
The outcome would differ according to the forms of interdependence:
conflict, unilateral support and mutual support ("O-effective" denotes
294
SCENARIO
· the necessary growth profile
· expected sales of old product line
· expected sales of new product line
· growth gap: growth profile - expected sales
· expected sales in existing export markets
· expected sales in new export markets
· export gap: growth gap - export sales
296
II
· turnover
· - direct costs
· - marketing costs
· marketing margin RETURN ON CAPITAL EMPLOYED
· - indirect costs · fin equity
· operating margin · inv equity
· - depreciation · fac equity~
· operating result · ROC - [C 6J
· - interest \
· profit - - [ClJ CASH FLOW PLAN
· cash inflow ~ [C 4J
INVESTMENT PLAN · - change in operating capital
· buildings / · cash flow I
· machines ~ [CsJ · + loans from pension funds
· research and development[CsJ · + new loans
· - investments
FINANCING PLAN · cash flow II
· new loans - [C,J · - taxes
· loan payments · - dividends
· interest new loans · - loan payments
· interest old loans · cash flow III
X is A is probable X is A
Y is B if X is A f(X) is f(A)
Y is B is > probable
X is A X is A
usually (Y is B if X is A) X is B
usually (Y is B) X is AAB
CONCLUSIONS
REFERENCES
[1] Carlsson, C. and Korhonen, P. (1986), A Parametric Approach to
Fuzzy Linear Programming, Fuzzy Sets and Systems, 20, 17-33
[2] Carlsson, C. (1988), Approximate Reasoning through Fuzzy
MCDM-Methods, Operational Research'87, North-Holland, 817-828
[3] Carlsson, C. (1990), On Interdependent Fuzzy Multiple Criteria, in
Trappl (ed.): Cybernetics and Systems'90, World Scientific, 139-146
[4] Carlsson, C. (1991), On Optimization with Interdependent Multiple
Criteria, in Lowen and Roubens (eds.): Proceedings of IFSA '91,
Brussels 1991, 19-22
[5] Kacprzyk, J. and Yager, R.R. (1990), Using Fuzzy Logic with
Linguistic Quantifiers in Multiobjective Decision Making and
Optimization: A Step Towards More Human-Consistent Models, in
Slowinski and Teghem (eds.): Stochastic versus Fuzzy Approaches to
Multiobjective Mathematical Programming under Uncertainty, Kluwer,
331-350
[6] Roy, B. (1990), Decision-Aid and Decision-Making, in Bana e
Costa (ed.): Readings in Multiple Criteria Decision Aid, Springer
Verlag, 17-35
[7] Sakawa, M. and Yano, H. (1989), Interactive Decision Making for
Multiobjective Nonlinear Programming Problems, Fuzzy Sets and
Systems, 315-326
[8] Sakawa, M. and Yano, H. (1990), Feasibility and Pareto
Optimality for Multiobjective Linear Programming Problems with
Fuzzy Decision Variables and Fuzzy Parameters, in Trappl (ed.):
Cybernetics and Systems'90, World Scientific, 155-162
[9] Sakawa, M. and Yano, H. (1991), Interactive Decision Making for
Multiobjective Linear Fractional Programming Problems with Fuzzy
Parameters Based on Solution Concepts Incorporating Fuzzy Goals,
Japanese Journal of Fuzzy Theory and Systems, 3, 45-62
[10] Yager, R.R. (1987), On Ordered Weighted Averaging Aggregation
Operators in Multi-Criteria Decision Making, Tech. Report #MII-705,
Iona College
[11] Takeda, E. and Nishida, T. (1980), Multiple Criteria Decision
Problems with Fuzzy Domination Structures, Fuzzy Sets and Systems,
3, 123-136
300
Abstract
1. Introduction
1-1. Diagnosis of Diabetes Mellitus
Diabetes Mellitus is one of the most common disease in adult. This
disease is defined as relative rack of insulin effect. Table 1 shows classic
symptoms of diabetes mellitus. The worldwide prevalence rate is 2-5%,
and rapid increase is shown especially in Japan.
301
R. Lowen and M. Roubens (edr.), Fuzzy Logic, 301-310.
© 1993 Kluwer Academic Publishers.
302
Table 2 shows the diagnostic criteria for the 75g oral glucose tolerance
test (OTT) in adults. Diagnosis is mainly carried out according to the
criteria of the WHO. Off course the GTT is unnecessary in the presence
of the classic symptoms of diabetes mellitus together with an unequivocal
elevation on more than one occasion of plasma glucose equal to or higher
than the values described here.
diabetes mellitus
fasting value 2:6.7 2:6.7 2:7.8 2:7.8
(2: 120) (2: 120) (2:140) (2: IlO)
2 hr. after glucos. load 2: 10.0 2:11.1 2:11.1 2: 12.2
(2:180) (2:200) (2:200) (2:220)
impaired glucose tolerance
fasting value <6.7 <6.7 <7.8 <7.8
«120) ( <120) «140) ( <140)
2 hrs aft.r glucos. load 6.7-10.0 7.8-11.1 7.8-11.1 8.9-12.2
020-180) <140-200) <140-200) <160-220)
There are some serious problems with these criteria. The glucose
tolerance of all patients is dealt with in a crisp set. (Fig.I) A patient, for
example, is diagnosed as diabetes or non diabetic. However, the real data
is a fussy set in every possible aspect. Therefore, clinically, it seems
unreasonable that one person whose glucose level at two hours is
200mgldl should be diagnosed as OM, while another whose value is
I99mgldl is not. Glucose tolerance shows a heterogeneity that reflects the
varied course to onset of diabetes.
The most serious problem is making a diagnosis of diabetes from the
evaluation of glucose tolerance is that no such diagnostic system can be
the equivalent of the direct inspection which is done in a biopsy for a
303
OM OM
IObservation I
(Measured time sequentially)
75g Glucose
O· - 30· - 60· - 90· - 120· -180·
Glucose Insulin
~o(~m.I")IRI(U~U/")
'0
20
10 5
.
IRI(oU/ml) IRI
BC (mg/dl) (oU/mll
500 800
400 240
180
200 120
100 60
o 2\l €4J 90 120 IS\) (minutes) 0 100 200 300 400 500 (mgB/~lI
IGT
IRI(\JU!ml)
BC (mg/dl)
500
400
300 f'.-..
.. 180 120' 90'
200 120 J /') 60'
100
60 180'~30'1'
NORMAL
.
IRI (\lU/ml) IRI
BG (mg/dl) loU/mll
500 800
400 240
180
120
100 ro
I!
o 2\l €.(J 00 1313 12\l (minutes) 0
"
100 """ -"" '00' 0= BG
~"" "''''' ~ "'""" (mg/dll
IRI
..
(pU/hlJ)
200 IGT .•.•• "
, ~' IJo \
,
,,
\
,, I
\
," II
I - 60'
;1 ~
.:
150
, "/ :
Normal .'0',.
, .... "
II
/' X :
. f'
100 O ,
/O:~6
"
:'
,
,., :: t f
:0 :°'6 ,
• ' I I
I I I A I
: I ~ "
; :0 ,III. to 6 '" II: I
O~.,
50 "
: 0CQOO ~O
'...
:6,,.,'..
6 A 11.......... - - .. - .. --,"- .. - - - - - - - .. - ...........
t~'
.,... ....... OM
, 0 0 g"{ .:. A"" nt/ • III
,
\ 0 0,' '~'" II :,' ... III ·11
""II M. II
\
"0°,'
' ......... ',
I
• ....... ,.Jj..........
,..........
\,....111.
,.
.11 • . ,, .
".
100 200 300 ~OO 500
BG(mg/dl)
IRI
D~INAMIC
~RAPH _
ICT
ICT
02 ~D~ ~
t8~
Be
t=60' t:=90'
t=180'
~~B
~ WN0Na.NI EJ
~1.79
~~Cl
~~~
References
Masatoshi SAKAWA
Kazuya SAWADA
ABSTRACT
The original Hopfield neural network model has been successfully applied
for finding acceptable solutions to combinatorial optimization problems such
as traveling salesperson problems and Hitchcock problems. However, in the
original model, the formulated minimization problem of an energy function
can never escape from the local minimum. By adding a Gaussian noise in the
original neural networks, and using so-called annealing and sharpening schemes,
it becomes possible to reach the global minimum of the energy function. In
this paper, we focus on crisp and fuzzy 0-1 programming problems and examine
the feasibility and efficiency of both the original and modified Hopfield neural
network approaches via their energy minimization processes.
INTRODUCTION
The original Hopfield and Tank neural network model [4,5] with symmetri-
cally interconnected network has been successfully applied for finding reason-
able solutions to combinatorial optimization problems such as traveling sales-
311
person problems [5] and Hitchcock problems [11]. However, in the model with-
out noise, the formulated minimization problem of an energy function can never
escape from the local minimum when an energy function has multiple minima.
By adding a Gaussian noise in the original neural networks, and using so-called
annealing [6] and sharpening schemes, it is possible to get the global minimum
of the energy function by means of the modified neural networks [1,2,8,9].
In this paper, we focus on a number of interesting crisp and fuzzy 0-1 pro-
gramming problems such as project selection problems, which include inequal-
ity constraints. Then, by realizing that both the original and modified Hopfield
neural networks are essentially an analog implementation of the penalty and
barrier methods for constrained optimization, we examine the feasibility and
efficiency of both the neural network approaches to combinatorial optimization
problems including the fuzzy versions via their spontaneous energy minimiza-
tion processes through a lot of personal computer software simulations using C
language.
mllllmize
subject to :: ~xb } (1)
xj = 0 or 1 for all j
where C = (Cl, ... ,Cn ), X = (xl, ... ,xnf, b = (bl, ... ,bm)T, and A = (a;j) is
an m x n matrix.
ex:::s Zo }
Ax -< b (2)
XjE{O,I}
where the symbol " :::S " denotes a relaxed or fuzzy version of the ordinary
inequality " :=:; ". To be more explicit, these fuzzy inequalities representing
the DM's fuzzy goal and fuzzy constraints mean that" the objective function
cx should be essentially smaller than or equal to an aspiration level Zo of the
313
DM" and " the constraints Ax should be essentially smaller than or equal to
b", respectively.
In the same spirit as the fuzzy decision of Bellman and Zadeh [3], considering
the fuzzy goal ex ~ Zo and fuzzy constraints Ax ~ b are equally important, the
problem can be expressed as follows:
Bx -< b' }
(3)
XjE{O,I}
where
(4)
°
Such a fuzzy inequality concept can be treated by introducing membership
functions which assume the value 1 if the conditions are satisfied, and if the
conditions are violated beyond their limits. The simplest version of such a
membership function is a linear one defined by [12] :
(BX)i :s bi
J.li((Bx);) = { ~ _ (BX)i - bi bi:S (BX)i:S bi + di (5)
d·,
where each di
° (BX)i bi + di ~
Following the fuzzy decision of Bellman and Zadeh [3] together with the
linear membership functions, the problem of finding the maximizing decision
IS:
1
E = -2 EET;jV;Vj - EliV;, (8)
i j i
315
and stop at a local minima of this quantity. On the basis of this fact, Hopfield
and Tank [5] demonstrated that a certain class of combinatorial optimization
problems can be solved using their network model. However, when an energy
function has multiple minima, the possibility of the convergence to one of the
local minima is very high. In order to escape from a local minima of an energy
function of a network, a Gaussian machine [2] is proposed by incorporating
both annealing and sharpening techniques. Essentially, a Gaussian machine
can be viewed as a modified version of the original Hopfield model by adding
a Gaussian noise to each neuron i.
In the Hopfield model, each neuron i receives input T ij Vi from other neurons
j and a bias input Ii associated with itself, namely each neuron's net input Ui
is defined by:
z= Iij Vi +
N
Ui = Ii, (9)
j::::l
where Tij represents the effectiveness of a synapse and ith neuron output lI,; is
governed by a nonlinear sigmoid input/output function defined as :
(10)
In the Gaussian machine [2], each neuron's net input Ui is defined by:
N
Ui = L Iij Vi + Ii + C, (11)
j::::l
where the added noise term c is a random variable with mean 0 and variation
(T2 obeying a Gaussian distribution. Standard deviation (T is defined as :
(T = kT (12)
tends to O.
maXImIze LdjPjVi
j
subject to La'VJ J <b
-
(13)
j
Vi = 0 or 1 fo< all j. )
For this project selection problem, first assume the following energy func-
tion.
E = "2A ""'
LJ Vj(Vj - 1) - "2 LJ(pjdj Vj) 2 + "2
B ""' C F (V), (18)
j j
0 if b - L aj Vj ~ 0
F(V) = j (19)
{ (b-~ajVj)2 ifb-LajVj<O.
J j
Here F(V) can be interpreted to represent the degree of satisfaction of the
constraints.
From this energy function, the synapes weights and thresholds are derived,
and simulations on a personal computer are performed by using both the Hop-
field model and the Gaussian machine. However, concerning this energy func-
tion, the state of the network is very unstable and cannot converge to the
solution satisfying the constraints.
L aj Vj + bs = b. (20)
j
(21)
A
Ii = -2" + bCai. (22)
maxImIze A
subject to A ~ J.l( - L djpj 10)
j
(23)
LajVj ~ b
j
V = 0 or 1 for all j
where J.l( - Lj djpj Vj) denotes the membership function representing the fuzzy
goal of the DM.
319
Having specified the admissible violation level, if we use the same data
as in Table 1 with some modifications concerning the energy function, neural
computing methods are applicable.
E=
(24)
CONCLUSIONS
how to determine not only the appropriate energy functions but also the proper
parameter values.
REFERENCES
[1] D. H. Ackley, G. E. Hinton and T. J. Sejonowski, "A learning algorithm
for Boltzmann machines," Cognitive Science 9, 147-169 (1985)
[2] Y. Akiyama, A. Yamasita, M. Kajiura and H. Aiso, "Combinatorialopti-
mization with Gaussian machines," IEEE/INNS International Joint Con-
ference on Neural Networks, 1,533-540 (1989)
[3] R. E. Bellman and L. A. Zadeh, "Decision making in a fuzzy environment,"
Management Science 17, 141-164 (1970)
[4] J. J. Hopfield, "Neurons with graded response have collective computa-
tional properties like those of two-state neurons," Proceedings of National
Academy of Science 81, 3088-3092 (1984)
[5] J. J. Hopfield and D. W. Tank, "Neural computation of decision in opti-
mization problems," Biological Cybernetics 52, 141-152 (1985)
[6] S. Kirkpatrick, C. D. Gelatt, Jr., and M. P. Vecchi, "Optimization by
simulated annealing," Science 220, 671-680 (1983)
[7] K. G. Murty, "Linear and Combinatorial Programming," John Wiley and
Sons (1976)
[8] M. Sakawa, "Fuzzy combinatorial optimization by neural networks," Pro-
ceeding of International Computer Symposium, 751-756, Taipei, (1990)
[9] M. Sakawa and H. Yano, "Combinatorial optimization by neural networks,"
Proceeding ofInternational Conference on Fuzzy logic & Neural Networks,
783-786, IIZUKA, Japan (1990)
[10] M. Sakawa and H. Yano, "An interactive fuzzy satisficing method for gen-
eralized multiobjective linear programming problems with fuzzy parame-
ters," Fuzzy Sets and Systems 35, 125-142 (1990)
[11] M. Takeda and J. W. Goodman, "Neural network for computation: num-
ber representation and programming complexity," Applied Optics 25, 3033-
3046 (1986)
[12] H.-J. Zimmermann, "Description and optimization of fuzzy systems," In-
ternational Journal of General Systems 2, 209-215 (1976)
ACKNOWLEDGEMENT
The authors would like to thank Mr. Toru Mitani for his cooperation in
this study.
A VISUAL INTERACTIVE METHOD FOR MOLP PROBLEMS
WITII: FUZZY COEFFICIENTS
321
R. Lowen and M. Roubens (eds.), Fuzzy Logic, 321-332.
© 1993 Kluwer Academic Publishers.
322
1. INTRODUCTION
The complexity of real decision problems involves the use of more and
more sophisticated tools for solving them. One of very early proposed tools
for modelling and solving a large class of decision problems was linear
programming (LPl. However. the traditional mono-criterion deterministic
approach is often insufficient in practical situations. especially in
long-term planning problems. development strategies and agricultural decision
problems. In last 20 years a number of a new ideas have emerged to improve the
quality of LP models. First of all, many different approaches were proposed to
handle multiple criteria. We refer to these models as to multi-objective
linear programming (MOLP) ones. On the other hand, the coefficients that
appear in the LP and MOLP problems may not be precise nor certain, either
because their values depend upon other parameters lnot accounted for in the
model) or because they cannot be precisely assessed, and only approximate
estimates of these coefficients are available. Moreover, the constraints
expressed by linear equalities or inequalities are often softer in reality
that what their mathematical expression might let us believe.
This situation has motivated a search for more flexible formulations of
optimization models that, although remaining rigorous. may help bridging the
gap between the mathematical models and the real decision-making situations,
through handling of uncertainty and imprecision. Two distinct lines of
research try to address these issues: stochastic linear programming and fuzzy
linear programming that have developed independently. A large comparative
study of these two approaches to MOLP has been recently described in the
volume edited by Slowinski and Teghem 11990l.
In. this paper, we characterize a method, called 'FLIp·', representing the
fuzzy approach to modelling of uncertainty and imprecision. It is a modified
version of the 'FLIP' method which relies on a special comparison principle of
fuzzy numbers in order to transform the fuzzy MOLP problem into an associate
deterministic problem. The comparison principle has been given first by
Slowinski (J986) and then developed by Slowinski (l990l. 'FLIP' has been
applied for solving many real-life decision problems, in particular, water
supply planning problem lSlowinski, 1986; Slowinski, Urbaniak, W~glarz, 1987;
Slowinski, 1987), diet optimization for farm animals (Czyzak, 1989; Czyzak,
323
0)
S. t. a.x :s
-1-
b.1 l ..... m (2)
2£~Q (3)
from the calculation point of view. It is. however, still very usuful as a
kind of reference for evaluation of solutions generated during the search for
the best compromise solution.
All fuzzy coefficients are given as L-R type fuzzy numbers. i.e. number a
is a triple of parameters (a.a./3) of its membership function
L((a-x)la) if x <a
~a(X)=
1 R((x-a)//3) if x ) a
where a is the "most possible" value. a and /3 are nonnegative left and right
"spreads" of ;;:, respectively. and L. R are symmetric reference functions that
are decreasing in (-'" • OJ) and UO)=R(O)=I. L())=R())=O. When the spreads are
zero. then a is a nonfuzzy (crisp) number equal to a. In a computer
implementation of the 'FLIp·' method. the membership functions of fuzzy
numbers are approximated by piecewise-linear function. We propose to use up to
three linear pieces on each side of a middle value.
For the sake of clarity, we assume that the reference functions of all fuzzy
coefficients are of two kinds only: L and R. This is not, however, a general
assumpion of the comparison principle (cf. Slowinski, 1990).
It should be specified that all arithmetic operations on fuzzy numbers
taking place in () )-(3) are extended operations in the sense of Zadeh's
325
Pessimistic index 11 follows from the comparison of the right slopes of ~i:1£
and (4)
where 1:,1) E IO,Il and e E (-0:>."'). e~o means that for any pair (v,y) such that
V~~i:1£, y~bi and O:Slla.x(V)=ll . (y):S1). inequality y~v is true. A negative value
-1-
b1
of e makes possible that inequality y~v is not true.
The constants 1:,1) and e are called "safety parameters" because they are
responsible for the safety of the assertion that b.1 is greater than ;;:.
-j-
x. Let
us remark that using 1:.1) and e one can control the risk of violation of the
constraint.
Thus, application of the above comparison principle. transforms every fuzzy
constraint (2) into two linear constraints corresponding to conditions (4) on
0" and 11, respectively (cf. Slowinski, 1990):
-1
:s L (1:i)(~i~ + 0i) i=I•...• m (5)
i=l,. .. ,m (6)
Having the tools for control of the risk of violation of the constraints,
we want to point out two different ways of interpreting fuzzy constraints and
326
1 r-------=---.....,... .
o Ct· X -0('
_ 1_X
_1 _ 9i~ : bi+6i
I
Qi~ + J2i.zs.
1
---
--
~l
O'-------"'''-----!-----I----+--'--------
minimize (0)
s. t. (5).(6).(3).
Window 1 Window 2
Point 6 Max. crit. 2 Analyse crit. Point 6 Max. cr it 2 Ano.lyse crit. 2
1 .:)( 9 1 ex g_
Window 3 Window 4
Point G Max.crit. 2 Const. 1=< Point 6 Max. crit. 2 Canst. 2 =<
ba.x ax b
1 ------ 1-- - - - - -
Window 5 Window 6
Point 5 Max. crit. 1 Analyse crit.1 Point 5 Max. crit. 1 Analyse crit. Z
9 ex ex 9_
1---------
Window 7 Window 8
Point 5 Max. crit. 1 Const. 1 =- < Point 5 Max. crit. 1 Coost. 2::: (
OJ( b l __ Q)(_ _ b
1------
REF ERE N C E S
1. Brouwer-Zadeh posets
The structure of Brouwer-Zadeh (or BZ)-poset has been first investigated in
Cattaneo and Nistico [1] drawing inspiration from the examples of generalized
characteristic functionals (fuzzy sets) on a reference space and of generalized or-
thogonal projections (fuzzy operators) on a Hilbert space [2-4]. A characteristic
feature of these partially ordered structures is a splitting of the standard ortho-
complementation mapping into two forms of non-usual ortocomplementations:
The first of these orthocompementations " called the Zadeh orthocomplemen-
tation, is the algebraic generalization of usual orthocomplementation of fuzzy
set theory (fuzzy-like orthocomplementation) and the second one -, called
the Brouwer orthocomplementation, generalizes the orthocomplementation ob-
tained from any Brouwerian lattice (intuitionistic-like orthocomplementation).
In conclusion, a BZ poset can be summarized as a structure (~,~, " -,0,1)
°
of poset bounded by the minimum element and the maximum element 1 and
equipped with the two non-usual orthocomplementations' : ~ 1-+ ~ (the fuzzy-
like such that a = 0./1; a ~ & implies &' ~ a'; a ~ a' and &' ~ b imply a ~ &) and
~ : ~ 1-+ ~ (the intuitionistic-like such that a ~ 0.--; a ~ b implies &- ~ a~;
a 1\ a~ =0) interconnected by the rule Va E ~, 0.-' a--. =
In any BZ poset it is possible to distinguish the set of exact (or sharp) ele-
ments, i.e., those elements which are closed with respect to Brouwerian or tho-
complementation: a = a-~; the elements which are not exact are called fuzzy
(or unsharp). In this structure one introduces two unary operators which, in
the framework of BZ-posets, can be considered as algebraic generalized ver-
=
sions of the "necessity" 1/(0.) a ,- and the "possibility" J.l( a) =
0.-' operators
of modal logic ("impossibility" is then J.l( a)' =
a-, i.e., coincides with the
intuition istic-like orthocomplement).
(L J (X,ff), 1;;;, " ~, 0,1), of all preclusivitypropositions endowed with the order-
ing relation (AI, A o) I;;; (B 1, B o) iff Al ~ B 1 and B o ~ A o, and the two ortho-
complementations: (AI,A o)' := (Ao,A I ) (fuzzy) and (A1,Ao)~ := (Ao,A~)
(intuitionistic). This BZ-lattice is bounded by the absurd or contradictory
preclusivity proposition 0 := (0, X) and the certain or tautological preclu-
sivity proposition 1 := (X,0). The g.l.b. and the l.u.b. of any family of
preclusivity propositions are given respectively by the preclusivity proposi-
tions n \
/ AU)
1'0
AU») -
- \
/ nAU)
l'
VAU»)
0
and U \
/ AU) AU») - /(VAU) nAU») .
1'0 -\ l' 0 ,
moreover, the modal-like operators are given by II «AI, A o)) = (AI, A~) and
Jl «AI, A o)) = (A~, A o). The exact preclusivity propositions are of the type
(A, AU), whose collection is denoted by Le(X, U). The orthocomplemented com-
plete lattice C(X, U) of all closed elements of (X, U) is identified with the ortho-
complemented complete lattice of all exact preclusivity propositions, Le(X, U)
according to the diagram:
(A 1 ,A o) ELJ(X,U)
111 UI
(AI,A~)ELe(X,U) = C(X,ff)3A 1
from E(7-l) whereas any proposition of the corresponding exact quantum lat-
tice Lj(X(7-l), l..)e == M(7-l) is experimentally tested by one and unique exact
yes-no measurement device from II(7-l).
(c.p I PA(~)c.p) = (3.1) = 11c.p 11 2 p(c.p, PA(~)) = 1Ic.p1l2 fm. X6 d(p<p 0 PA)
(c.p I A c.p )
W
= 1Ic.p1l2 f
!Rid d(pcp ° F~) .
338
V(A) =0
v( -,(3) = v({3)'
v(......, (3) = v«(3)-
v({3 A 'Y) = v({3) n v({) .
339
"''''''' a ~ '" a .
BZL'
if a l-
rsZL
,8 then ",,8 l- '"
raZL
a .
c) Moreover, we have:
-." Q' L- -'0" -,n l.L ~ 0' . -, ,....., (l' I- -"'1"">../ (l' .
~ZL' 'BZL' raZL
domain of situations where the sentence certainly does not hold. Similarly to
Kripke-semantics, the situations we are referring to can be thought of as a kind
of possible worlds. However, differently from the standard kripkean behaviour,
the positive domain of a given sentence does not generally determine the neg-
ative domain of the same sentence. As a consequence, propositions are here
identified with particular pairs of sets of worlds, rather than with particular
sets of worlds (as happens in the usual possible worlds semantics).
Let us again assume the B Z L language. We will define the notion of re-
alization with positive and negative certainty domains (shortly ortko-pair real-
ization) for a BZL language.
a- = { 1, if a = 0
o, otherwise
1 = 1; 0 = O.
Let 0 < v(p) < 1/2. We will have v(p V ~ p) max( v(p) ,0)= v(p) < 1/2. But =
v(pV-,p) = max(v(p), I-v(p» = I-v(p) 1/2. Hence: v(pv ~ p) < v(pV-,p).
~
As a consequence, the orthopair-semantics characterizes a logic stronger
than BZL. We will call this logic BZL 3 . BZL 3 can be axiomatized and a
completeness theorem can be proved with respect to the ortho-pair semantics
[5]. BZ L 3 can be equivalently characterized by means of an algebraic semantics
based on the class of all BZ 3 lattices [11], where a BZ 3 lattice is a BZ lattice
A = (I:, ~ " , - ,1,0) which satisfies the following conditions Va, bE A:
(1) (a n b)- = a- U b- ; (2) a'- ~ b and a ~ b-- implies a ~ b.
342
71" r;;; P iff \/x EX: x(7I"):S; x(p)' where x(7I") = 7' iff x E 7I"(r).
The fuzzy-negation:
(7l"') r = {x I x( 71") = 1 - r} .
The intuitionistic-negation:
(71"-)1 = 71"0·
(71"-)0 = (71"0)" .
(7I"-)r = (7I"')r \ (7l"o)", if l' f/. {O, 1}.
(7TUp)1 = 7T 1Vpl.
(7TUp)O = 7ToAPI'
(7T Up),. = {x I :Ja,b(x E 7r a ,X E Pb and l' = max(a,b))} \ { 7r l V pd,
ifl'~{O,l}.
(1/(7T))1 = 7Tl·
(1/(7T))0 = (7Td .
(1/(7T))r = {x I X(7T) = I'} \ (7Td , if I' ~ {O, I} .
(j.L(7r))1 = {7ro}U .
(j.L(7T))0 = (7T 0).
(j.L(7T))r = 7Tr \ (7TO)U U 7T0) , if r ~ {O, I} .
(0)0 = x.
(0),. = 0, if I' -# o.
The certain proposition:
1 = 0'.
10.1.2) L is defined as in the ortllo-pair semantics.
One can show that the structure (L, n ,U,' ,- ,1 0) is a BZ lattice.
10.1.3) v is defined as in the ortho-pair semantics.
Let BZL oo be the logic which is characterized by the class of all ortho-
infinite many valued realizations. One can prove that
with respect to the relation of Logical consequence. If we take into account only
the notion of Logical truth, then one can prove that
REFERENCES
[1] Cattaneo, G. and Nistico, G., "Brouwer-Zadeh posets and three-valued
Lukasiewicz posets", Fuzzy Sets ans Systems, 33, pp. 165-190, 1989.
[2] Cattaneo, G., "Brouwer-Zadeh (fuzzy-intuitionistic) posets for unsharp
quantum mechanics" , to be published in International Journal of Theo-
retical Physics, 31, 1992.
[3] Cattaneo, G., Garola C. and Nistico, G., "Preparation-effect versus
question-proposition structures", PllYS. Essays, 2, 197-216, 1989.
[4] Cattaneo, G. and Nistico, G., "The physical content of substructures
from preparation-question structures and Brouwer-Zadeh lattices", to
be published in International Journal of Theoretical Physics, 31, 1992.
[5] Cattaneo, G., Dalla Chiara, M.L. and Giuntini, R., "Fuzzy inutitionistic
quantum logics" , to be published in Studia Logica.
[6] Dalla Chiara, M.L., "Quantum logic", in D. Gabbay, F. Guenthner
(eds.), Handbook of Philosophical Logic, III, pp. 427-469, Reidel, Dor-
drecht, 1986.
[7] Dalla Chiara, M.L. and Giuntini, R., "Paraconsistent quantum logics" ,
Foundations of Physics, 19, pp. 891-904, 1989.
[8] Dishkant, H., "Semantics of the minimal logic of quantum mechanics",
Studia Logica, 30, pp. 23-30, 1972.
[9] Giuntini, R., "Brouwer-Zadeh logic and the operational approach to
quantum mechanics", Foundations of Physics, 20, pp. 701-714, 1990.
[10] Giuntini, R., "A semantical investigation on Brouwer-Zadeh logics",
Journal of Philosophical Logic, 20, pp. 411-433,1991.
[11] Giuntini, R., "Semantic alternatives in Brouwer-Zadeh logics", to be
published in International Journal of Theoretical Physics, 31, 1992.
[12] Giuntini, R., "Brouwer-Zadeh logic, decidability and bimodal system",
to be published in Studia Logica.
Fuzzy Classifier Systems
ANDREAS GEYER-SCHULZ
Department of Applied Computer Science
Institute of Information Processing and Information Economics
Vienna University of Economics and Business Administration
Augasse 2-6, A-lOgO Vienna, Austria
Abstract. Fuzzy classifier systems are genetic based machine learning systems
which integrate a fuzzy rule base, a genetic algorithm and an apportionment
of credit function. In this paper we present a Monte-Carlo selection rule which
enables us to give a global convergence proof for (fuzzy) classifier systems and
thus combines the advantages of genetic algorithms and simulated annealing
algorithms. With the help of the representation theorem we define a mapping
from a fuzzy rule language to a crisp rule language and we compare the com-
plexity of the resulting crisp and fuzzy classifier systems. We prove that in the
context of genetic based machine learning the performance of the fuzzy version
is better than the crisp version.
Introduction
A growing number of applications in robotics and industrial automation (e.g.
[1], [9], [11]) documents the success of fuzzy control and its "human opera-
tor" metaphor which basically says that it is often of advantage to substitute
a mathematical control problem with the set of verbal rules used by a human
operator. Because the elicitation of the human operator's control strategy is a
long and expensive process, it is far more attractive to automate the knowledge
acquisition process with the help of learning algorithms. The simple syntactic
structure and the small number of rules which are characteristics often ob-
served in fuzzy control applications support genetic based machine learning
algorithms. We therefore proceed as follows:
In the following section we define a fuzzy classifier system and in the third
section we introduce the Monte Carlo selection rule. In the fourth and fifth
sections we play devil's advocate and ask, why we should prefer a fuzzy clas-
sifier system to a crisp one. In order to find an answer to this question we
345
R. Lowen and M. Roubens (eds.), Fuzzy Logic, 345-354.
© 1993 Kluwer Academic Publishers.
346
use the representation theorem of [10] to translate fuzzy rule bases to crisp ap-
proximations in the fourth section and finally, in the fifth section we establish
the proof that the performance of a fuzzy classifier system is better than the
corresponding crisp approximation.
2. Select the best of all the p + c individual rule-bases as the first rule-base
in the next population.
347
4. Select p - 2 rule-bases from all the p + c rule-bases by any rule you like.
Definition 2 A "Monte Carlo" mutation operator selects a rule-base from the
set R of all rule-bases which can be generated in a language L with at most d
derivations with probability P = car~(R)'
Theorem 1 A genetic algorithm with "Monte Carlo" selection rule learns the
optimal rule-base in language L with respect to the apportionment of credit
function f in n generations with the probability of failure tending to zero as n
tends to 00. (Global Convergence)
The two occurrences of (label) in the condition part of the rule are sub-
stituted with the (interval list) which represents the a-level set denoted by
(label). The (label) in the action part of the rule is substituted by the (real)
which results from applying an appropriate selector function to the fuzzy set
denoted by (label).
Of course, <P is not suitable for computer implementation, because it gen-
erates for each rule in F L an infinite number of rules in L. By substituting the
real unit interval [0,1] with a finite chain I whose elements are from [0,1] we
approximate <P by <PI:
In the following section we assume that I = {0.25, 0.5, 0.75, 0.9, I} which is
sufficient for most practical purposes [7]. This means card(I) = 5.
Theorem 3 By using a classifier system with a Monte Carlo selection rule the
probability P(rFL op ,) of reaching an optimal rule base in SFL is higher than the
probability P(rL opt ) of reaching an optimal rule base in SL'
Proof By definition 2 for a Monte Carlo mutation operator the probability
of reaching an optimal rule base rFLop' in SFL is P(rFLop,) = eard/S FL)' in S L
it is P(rL op ,) = earJ(SL)' Since card(SFd < card(SL) implies P(rFL op ,) >
P(rL op ,)' we use lemma 1 to complete the proof_
Lemma 1 card(SFL,n) < card(SL,1>d n )), for all n E N.
By SFL,n we denote the search space in F L for rule bases with up to n
rules. SL,1>d n ) is the search space in L generated with the minimal number of
derivations, so that all the translations of all rule bases in SFL,n by CPr are in
SL,1>r(n)' <Pr(n) tells us, how many rules we get in L when translating an n-rule
rule base by CPr from F L to L. Note, that in our example <Pr(n) = n· card(I).
Proof In order to prove lemma 1 we proceed by the following steps.
1. We define FL. F L has already been defined in section "A Fuzzy Classifier
System" .
2. We define L. L has already been defined already defined in section "The
Crisp Representation of a Fuzzy Classifier System".
3. We employ the mapping CPr as translation from FL to L. CPr has already
been defined in section "The Crisp Representation of a Fuzzy Classifier
System" .
4. In order to count the derivations necessary for generating a word from
the grammar of a context free language, we need an appropriate counting
function. We can derive a recursive scheme of the counting function
by rewriting the production rules in the following way: We map the
empty word and all terminal symbols to O. We map each derivation
symbol := in the production rules to the assignment symbol = and the
successor function which is defined by s(n) = n + 1 and s(O) = 1. We
map catenation to addition. Each non-terminal symbol is mapped to a
function <p : VN --> N which returns the number of derivations necessary
to generate a word starting with this non-terminal symbol. <pm denotes
the number of derivations necessary to generate a word with the argument
as start symbol and applying the rule corresponding to <p m-times. In
doing so, we exploit a natural interconnection between formal languages
and formal power series [5, 6].
By rewriting the production rules of F L we derive the counting function
<ph ( (rule base}):
1 + <PFL((rule)) if i = 0
4l((,"le bMe)) = { 1 + 'PFL((rule))+ if i > 0
+<ph ((rule base))
350
<PFL( (variable)) = 1
<PFL ( (label)) =1
In the special case of F L we can easily simplify the recursive scheme of the
counting function and the number of derivations necessary for generating
one rule in F Lis:
<PFL((rule)) =7
And for a rule base with n-rules we get:
1 + <PL( (rule)) if i = 0
<p~+l((rule base)) ={ 1 + <pL((rule))+ if i > 0
+<pi,((rule base))
1 + <pL( (interval)) if j = 0
<pi+ 1 ((intervallist)) ={ 1 +<pL((interval))+ if j > 0
+<Pi( (interval list) )
<PL((alpha)) = 1
351
<PL( (variable) =1
<PL( (real) =1
Again, we considerably simplify the recursive scheme of the counting
function and the number of derivations needed to generate one rule in L
is:
<pL((rule) = 14
Observe, that <ph((rule base) < <p!r(n)((rule base) holds for all n E N.
IIFL((rule) if i = 0
II11( (rule base) =. II~L( (rule)· if i > 0
{ ·IIh((rule base)
IIFL( (variable) = 3
IIFL ((label) =5
352
IlFL((rule)) = 3375
This means, we can write 3375 different rules in FL. For the search
space size of rule bases with up to n rules in F L we obtain the following
polynomial:
n n
card(SFL,n) = 2)IlFL( (rule)))i = 2:: 3375 i (3)
i=1 i=1
IlL( (rule)) if i = 0
Il~+I((rule base)) = Il~((rule)). if i > 0
{
.IlL( (rule base))
IlL( (interval)) if j =0
Il{+I((intervallist)) = IlL((interval))· if j >0
{ .Il{( (interval list) )
IlL( (variable)) = 3
n.card(I) 5n
card(SL,q,r(n)) = 2:: (IlL((rule)))i = 2::(3 3 • 2384 )i (4)
i=1 i=1
353
Table 1: The Depth of the Derivation Trees and the Search Space Sizes in L
and FL
Summary
In this paper we have presented a fuzzy classifier system based on a Monte
Carlo selection rule. We have shown that fuzzy rule-bases as for instance those
used in fuzzy control are suited for genetic based machine learning systems like
fuzzy classifier systems because of the restricted syntax of the fuzzy rule lan-
guages used and because of the small number of rules used for one application.
For practitioners the main advantage of the algorithm is that no expertise is
required for its application.
With the help of the representation theorem of [10] we have shown that for
learning purposes fuzzy classifier systems perform better than crisp classifier
systems. The reason for this is that fuzzy rule languages are very high level
languages which provide a compact notation for control strategies and thus
keep the cardinality of the search space smaller than crisp rule languages. For
354
References
[1] T. Akiyama, T. Sasaki: Extended Fuzzy Traffic Control Model on Urban
Expressway. Preprints of Second IFSA Congress 1 (1987), 1, 278 - 279.
[2] A. Geyer-Schulz: Fuzzy Rule-Based Expert Systems. in: J .R. Kraemer and
P.C. Berry: APL Techniques in Expert Systems. ACM SIGAPL, Syracuse,
NY 1988.
[3] A. Geyer-Schulz: On Learning in a Fuzzy Rule-Based Expert System.
Kybernetika28 (1992), 33-36.
[4] D. E. Goldberg: Genetic Algorithms in Search, Optimization & Machine
Learning. Addison-Wesley, Reading, MA 1989.
[5] I. P. Goulden, D. M. Jackson: Combinatorial Enumeration. John Wiley &
Sons, New York 1983.
[6] W. Kuich, A. Salomaa: Semirings, Automata, Languages. EATCS Mono-
graphs on Theoretical Computer Science, Vol. 5, Springer Verlag, Berlin,
1986.
[7] R. Kruse, K. D. Meyer: Statistics with Vague Data. D. Reidel Publishing
Company, Dordrecht, 1987.
[8] R.F. Hartl: Global Convergence Proof for a Class of Genetic Algorithms.
Unpublished Manuscript.
[9] K. Hirota, Y. Arai, S. Hachisu: Real Time Pattern Recognition and Fuzzy
Controlled Robot-Arm. Preprints of Second IFSA Congress 1 (1987), 1,
274 - 277.
[10] C. V. Negoita, D. A. Ralescu: Representation Theorems for Fuzzy Con-
cepts. Kybernetes 4 (1975), 4, 169 - 174.
[11] D. Yasuhiko, M. Honma: Improved Fuzzy-Set Temperature Distribution
Control for Electric Furnace. Preprints of Second IFSA Congress 1 (1987),
1,270 - 273.
ON THE EVALUATION OF SIMPLE
FUZZY RELATIONAL QUERIES :
PRINCIPLES AND MEASURES
Patrick BOSC & Olivier PIVERT
IRISA/ENSSAT
BP447
22305 Lannion Cedex
FRANCE
Abstract
In this paper, we consider the evaluation of queries addressed to usual relations and
involving imprecise predicates. The queries considered here are modelled as lambda-cuts
of complex fuzzy predicates and we study to what extent query processing can be at
least partly performed by a regular database management system. In this respect, we
show that any tuple must comply with some boolean conditions in order to belong to
the lambda-cut of a compound predicate. The transformation process looks like a
rewriting mechanism based on rules. As a matter of fact, some selected tuples do not
really belong to the desired lambda-cut and measures were made in order to estimate the
difference depending on the connectors and the predicates appearing in the query.
INTRODUCTION
The database domain is presently subject to many evolutions and in the context of
ordinary databases where precise data are stored, one interesting field concerns the
facilities and capabilities of querying, the user is provided with. Since the available
DBMS's suffer from a lack of flexibility, we have been suggesting to allow for
imprecision inside user queries [2]. More specifically, we propose a language including
imprecise conditions that are interpreted according to the fuzzy sets theory. An SQL-
like language has been designed that permits conditions to apply to both individual
tuples and sets of tuples [3].
In [4], this powerful language was shown to be as expressive as most of the boolean
based systems aiming at imprecise querying [8, 10] but an important point concerns
the evaluation of such queries. In conventional relational DBMS's, a query expresses
"what" and the system is in charge of determining an algorithm expressing "how" the
query will be processed. This topic remains somewhat open since given a query, in
general the optimal way cannot be reached. We do not intend to solve the problem in
general for fuzzy queries which would be unrealistic since the process cannot become
easier for two main reasons: i) the available access paths cannot be directly used, and
ii) a larger number of tuples is selected by fuzzy conditions with respect to boolean
ones. We will rather consider a subset of queries for which an "efficient" processing can
be found out in order to design a method that is expected to afford acceptable
performances.
The basic idea is to wonder how fuzzy query processing can come down to boolean
query processing (at least partly). In such a context, the boolean part of the processing
can be handled efficiently by means of a conventional DBMS. In other words, the
principle will be based on some properties existing between tuples selected by a usual
query and a fuzzy one. Very often a user is interested only in a very small number of
355
R. Lowen and M. Roubens (eds.), Fuzzy Logic, 355-364.
© 1993 Kluwer Academic Publishers.
356
tuples in the answer. Let us assume that a threshold A is given (i.e the user wants
those tuples whose grade of membership to the resulting fuzzy relation is greater than
A). The idea is to discard as many tuples as possible provided they do not compete to
acceptable resulting tuples. The ideal situation is reached if we succeed in the
determination of exactly those tuples that are the desired A-cut.
Anyway, the number of tuples selected by this step has decreased and then fuzzy query
processing could be naIve without damage for performances. The condition for the
validity of the process lies in the fact that the fuzzy query must lead to the same result
as if it were processed on the original set of tuples and this is similar to equivalences
between queries [1]. We consider relational fuzzy queries, which are called "simple", i.e
involving only one projection and a number of selections and joins, known as PSJ
queries. Since selection and join are basic algebraic operations, boolean PSJ queries
have received attention and it seems interesting to consider their extension to the fuzzy
case.
The paper is structured as follows. Firstly, various kinds of fuzzy predicates likely to
appear in a query are presented as well as the principle used to derive a boolean query
starting with a fuzzy one. The next section contains the boolean expressions obtained
for atomic and compound predicates. Then, we outline the use of the derivation strategy
for relational selections and joins. Generally, this strategy produces extra tuples with
respect to the desired A-cut and the last section is dedicated to the result of measures
performed in order to predict the difference.
FUZZY PREDICATES AND DERIVATION PRINCIPLE
In this section, we will consider predicates P applying to individual elements of
a collection X, i.e P: x E X ~ [0,1], as opposed to operators mapping a whole set
of elements into [0,1]. We now present the principal types of fuzzy predicates and in
the next paragraph, we will describe the basis according to which boolean predicates
can be issued from these fuzzy predicates.
Fuzzy predicates
First of all, we have base (or atomic) predicates, each represented by a
membership function over a subset of the underlying domains of C. Moreover, we can
define other predicates, called modified predicates, using unary operators. Hereafter is a
list of some possible modifiers :
- the negation, according to the definition: Ilnot P (x) = 1 - IIp(x),
- adverbs seen as either exponential operators [9, 14], in which case the predicate
mod P is defined as: J..lmod P (x) = Ilpn (x) = (Ilp(x»n, or powers of fuzzy sets
[13]: J..lmod p (x) = Ilpn (x) = (P e... e P)(x) (e a non idempotent t-norm for a
concentrator (t-conorm for a dilator), is applied n times),
- adverbs seen as translators. For instance, according to B. Bouchon-Meunier
[5], the modifier "really" is applying to an ordered sequence of predicates
{PI> ... , P2n+l} such that: Ilreally p.J (x) = IIp.J (x + d) with d> 0 if i ~ n,
d < 0 otherwise,
- antonyms, such as small and large, or young and old and we have:
'"
IIp (x) =IlP (M - x) where P is the antonym of P defined on x E [O,M]).
357
Other aggregation operators and quantifiers are not developed here and are presented in
[12].
The derivation principle
The idea which will be developed in the rest of the paper is situated in the scope of the
evaluation of such predicates for a given threshold A (satisfaction degree). We will
show that any previously defined predicate can be associated with a boolean predicate
that defines a superset of the elements which satisfy P at a degree over A (sometimes
this set can be reached exactly). If one considers a fuzzy predicate P applying to a set X
of tuples, we suggest the construction of a boolean query called envelope E = P [d ~ A]
which delivers a set X' involving at least all the tuples of X whose grade d is over A. It
should be noted that due to the fact that predicates can be negated, the case P [d ~ A]
has to be considered. We can design a set of transformation (derivation) rules to
construct it. Basically, the objective is to express the envelope for P, which may be a
fuzzy selection or fla3zy join predicate as a boolean combination of those of the
components of P.
Let us consider a fuzzy query Q applying to a base B made of relations {RI> ... , Rn}
whose extensions are denoted {SI>'" , Sn} and form a database state 8. We can define a
partial order::; over the database states as : S ::; S' <=> Vi card(Sj) ::; card(S'j). The idea is
to change the initial database state S into S' by means of a boolean predicate BP such
that: i) S ~ S', ii) Q(S) = Q(S') i.e the result of the query Q is preserved, and iii) BP is
a condition derived from a fuzzy predicate FP applying to a given relation R i .
Successive changes can be performed using predicates connected to the various relations
implied in a query Q.
A derivation rule tells that we can replace the expression A by the expression Band
two cases occur depending on whether the set of tuples selected by A is the same as or
a superset of those selected by B. In the first situation, we have a strong rule denoted
A H B (for any tuple t, A(t) <=> B(t), i.e B is a condition equivalent to A),
otherwise the rule is said weak and is written A ~ B (for any tuple t, A(t) => B(t),
i.e B is a necessary condition for A). When only strong rules are used, a minimal
state is reached, i.e a state in which every tuple participates in the construction of the
answer. On the contrary, if at least one weak rule is applied, the state that is built is
potentially reduced but not minimal. This point is obviously important since in the
worst case, step by step, there is a risk for the method to deliver the initial set if only
358
weak rules are applied. The situations likely to happen for weak rules are detailed in the
section "Simulation and measures".
DERIVED EXPRESSIONS
As we mentioned before, various kinds of predicates can appear in an extended
relational query and we successively describe the boolean expressions tied to atomic,
modified and complex fuzzy predicates.
Atomic and modified predicates
Let us recall that according to our assumption, we want to characterize the x's of a set
X whose degree is over a threshold A with respect to a predicate P. First of all, we
consider the case where P is an elementary predicate represented by a one parameter
increasing-decreasing membership function (trapezium or triangle for instance). In this
context, it is clear that P(x) ~ A is equivalent to "x belongs to an interval" and then
we have the rule:
We now review the rules which may apply for the various kinds of modified predicates
and it can be noted that in all cases, we have strong rules. Consider the predicate "mod
P" where mod is a modifier interpreted as an exponential operator, «mod P)(x)) ~ Ais
equivalent to (P(X))h ~ A and then we have the two rules:
(mod P)[d ~ A] f-7 P [d ~ A11h] and (mod P)[d ~ A] f-7 P [d ~ A11h].
If mod is represented by a power of a fuzzy set, a particular formula holds for each
modifier and each norm or co-norm chosen. For example, with the norm e defined as :
e(x, y) =max(x + y - 1,0), the predicate "very P" could be (P e P) and in this case the
following two rules are valid:
(very P)[d ~ A] f-7 P [d ~ «A+ 1)/2)] (2) and (very P)[d ~ A] f-7 P [d:$ «A+ 1)/2)].
If the modifier is a translation, the elements such that (mod P)(x) ~ A are once again
belonging to an interval and we have a strong rule similar to rule (1). Finally, let us
consider a pair <P, Q> of antonym predicates. We have obviously: Q(x) ~ A<=> P(M
- x) ~ Aand consequently, here again, a strong rule analogous to rule (1) is valid.
Complex predicates
First, we present the derived expressions tied to the usual connectors (AND/OR), then
we deal with mean operators. We specify the envelopes related to both P [d ~ A] and P
[d:$ A].
If a predicate P is a conjunction AND(PI,...,Pn), P(x) ~ A <=> min(PI(x),... ,Pn(x)) ~ A
and the rule is : P [d ~ A] f-7 PI [d ~ A] and ... and Pn [d ~ A] (3).
Similarly, we can get the rule: P [d ~ A] f-7 PI [d :$ A] or ... or Pn [d :$ A].
In case of a disjunction P = OR(PI, ... , Pn) : P(x) ~ A <=> max(Pi (x), ... , Pn(x)) ~ A
and the rules are: P [d ~ A] f-7 PI [d ~ A] or ... or Pn [d ~ A],
359
The second property is the monotonicity : mc(xI, ... , xn) ~ mc(x'I, ... , x 'n) iff Vi Xi
~ X'i' According to this, we will point out some more specific rules for the geometric
mean, the harmonic mean, the weighted mean which subsumes the arithmetic mean
and then the ordered weighted averaging aggregation:
- gm(PI, ,Pn)(x) ~ A<=> (PI(X) * ... * Pn(x))1/n ~ A ~ Vi Pi(C) ~ An; the rule is :
gm(PI, ,Pn)[d ~ A] ~ PI[d ~ An] and ... and Pn[d ~ An],
- hm(P}. ... , Pn)(x) ~ A <=> (n/(I/PI(x) + ... + l/Pn(x))) ~ A ~ Vi Pj(c) ~ A./(2 - A),
the rule is : hm(P b ... , Pn)[d ~ A] ~ PI [d ~ A/(2-A)] and ... and P n [d ~ A/(2-A)].
No specific rule was found out for gm/hm(pb ... ,Pn)[d ~ A],
- wm(wI, ... , wn' PI, ... ,Pn)(X) ~ A <=> (WI * PI(x) + ... + wn * Pn(x)) ~ A
~ Vi Wi * Pj(x) + (l - wJ ~ A;
- the rules valid for the arithmetic mean are obtained with the previous formulae with
Wi = lin Vi. So, we have:
am(P I , ... ,Pn)[d ~ A] ~ PI [d ~ (n*A + 1 - n)] and ... and P n [d ~ (n*A + 1 - n)]
and am(PI, ,Pn)[d ~ A] ~ PI [d ~ n*A] and ... and P n [d ~ n*A],
Examples
First, let us consider the condition not young and very well-paid with A = }j, where
and is the usual conjunction, very P is interpreted as (P 9 P) with 9(x,y) = x + y - 1
and the membership functions for young and well-paid are drawn below.
well-paid
.8
We have to derive a boolean condition for the expression: (not young and very well-
paid) [d ~ .6]. According to rule (3), we have:
(not young and very well-paid)[d~. 6] H (not young)[~.6] and (very well-paid)[d~ .6].
We can derive: (not young)[~.6] H young [d S; .4]
and according to rule (2) : (very well-paid)[~ .6] H well-paid [~ .8].
Finally, using rules of type (1), we have a boolean expression which is equivalent to
the initial cut : age~ 36 and salary ~ 28.
In this second example, we consider a weighted mean with weights (.2,.3,.5), A =.75.
wm(.2,.3,.5,PJ,P2.P3) [d ~ .75] gives rise to two partial (weak) conditions:
PI[d ~ .75] or P2 [d ~ .75] or P3[d ~ .75] according to (4),
PI [d ~ -.25] and P2 [d ~ .5/3] and P3 [d ~ .5] according to (5).
Since PI [d ~ - .25] is trivially satisfied, we can obtain a weak final global boolean
condition by ANDing the two, which yields:
(PI[d ~ .75] or P2 [d ~ .75] or P3[d ~ .75]) and P2 [d ~ .5/3] and P3 [d ~ .5].
USE IN A DBMS CONTEXT
Introductive remarks
This approach can be applied in the scope of a conventional relational database
management system, only able to perform operations based on 1?oolean predicates. We
will consider "simple queries", i.e queries containing only some selection and join
predicates along with one projection, usually called PSI queries. Such queries can be
represented by means of a single complex predicate P applying to one or several
relations in the framework of the SQL language. Our approach will allow for taking
advantage of existing processing strategies implemented in the DBMS (access paths
such as indexes, efficient algorithms) and thus, the computation of the satisfaction
degree for each tuple of the relation, which would be too time consuming, will be
avoided.
However, a first important assumption resides in the knowledge of the value of A (let
us notice that A =0 can always be taken). Two main cases can be considered: the user
gave it in his query and we are done, or the user only indicates a number of results. In
this last situation, sometimes, thanks to some statistical information, an appropriate
value can be deduced; otherwise, the only remaining solution would be to try several
361
values in an iterative manner, i.e to submit an initial query obtained for Aa, then
another for Al if necessary, and so on.
In addition, with respect to a naIve processing, two kinds of improvements can be
sought: i) to decrease the number of disk accesses which is possible if an
indexed term is connected by an AND to the rest of the query. For instance, the
evaluation of the condition PI allil (P2 Q!. ... Q!. P n ) over the relation R can be
performed in first accessing the set R' of tuples of R satisfying PI (using an available
index) and then verifying the other conditions over R'. This process is prohibited
over P2, ... , P n since they are ORed; ii) to decrease the computations, especially those
related to membership degrees. This point is partly implied by the limitation of tuples
access, but it is also strongly connected to the extra tuples appearing when weak rules
are applied.
Possible use of a regular DBMS
,
From a technical point of view, the major problem is to calculate the membership
degree tied to each selected tuple. Although some other solutions are possible, we
suggest to proceed as shown on the figure drawn below.
initial fuzzy query
,
derivation step
,
boolean query
for a given A
final result
The initial fuzzy query concerns a set of relations and it involves selection and join
predicates (crisp and/or fuzzy). It is easy to show that any such query is equivalent to
the selection of tuples of the cartesian product of the relations according to the various
initial predicates. For example, the SQL-like query :
select A * from R S where predl(R.A, S.A) and pred2(R.B) and pred3(S.C)
362
involves two selection predicates: pred2 and pred3 and a joining predicate predl. To
retrieve the answers over A, we suggest to evaluate the derived query :
select * from R S where predl'(R.A, S.A) and pred2'(R.B) and pred3'(S.C)
where predj' denotes a boolean derived predicate, which will deliver a set of tuples onto
which a degree, with respect to the initial query, will be evaluated. The advantage of
this processing is its simplicity. On the other hand, the number of returned tuples can
be very large if some of the imprecise predicates are derived using weak rules. An
alternate strategy would be to derive one boolean query per relation and then to perform
the initial joins over these reduced relations along with the calculation of the final
membership degree. Such a method can sometimes be efficient when the total size of
all the relations is much smaller than the cartesian product issued in the former
method. The choice is clearly not obvious and is a matter of estimations.
To conclude this paragraph, let us say some words about join predicates. First of all, a
joining condition can be fuzzy, such as in the query : "find the best ten employees
whose salary is much smaller than their manager's one. A fuzzy join where the
condition P refers to the attributes A of relation Rand B of relation S can be
equivalently replaced by a boolean one as far as it complies with:
V (a, b) E domain(A) x domain(B), J..lp(a,b) =f(a-b) or g(a/b)
since we recognize the situation dealt with rule I. So, such fuzzy joins give birth to
strong rules in the derivation process.
Moreover, it was shown that given a join predicate, it is possible to restrict the size of
each of the involved relations through semi-join operations [1]. Such an operation is
not described here but it could be used in the scope of the alternate method tackled
above.
SIMULAnON AND MEASURES
Weak rules cause the appearence of extra tuples with respect to a A-cut. For instance,
let us consider the second example given before, where the initial fuzzy query and the
weakly derived condition (envelope) were:
If we have three tuples such that the values of PI are respectively: I, .8, .8, those of
Pz : .5, .6, .9 and those of P3 : .8, .48, .7, their global satisfaction degree with respect
to the fuzzy condition are : .65, .58 and .78; consequently, only the third one is
satisfactory. However, the first and the third are both selected by the derived boolean
condition since PI > .75, Pz> .5/3 and P3 > .5.
So, it is interesting to have some idea about the difference between the result (issued
from the envelope) and the pure A-cut and we have initialized some measurements
based on a simulation. The parameters considered hert~ are : i) the type of fuzzy
connectors, ii) the value of the threshold I, iii) the selectivity of the fuzzy predicates.
We worked with a 2000 tuples relation EMPLOYEE(#emp, #dep, age, salary,
commission, sales) very close to that of DeWitt's benchmark [6]. The values are
363
assumed to be uniformly distributed for each attribute which take respectively, #dep :
10 values, age: 40 values, salary: 105 values, commission: 45 values and sales: 70
values. In this experiment made using the INFORMIX database management system,
only binary operators (arithmetic, geometric, weighted mean and OW A) connecting the
two predicates young and well-paid, whose respective selectivity is .5 and .67, were
considered. The ratio r = (n2 - nt) / nt where n2 is the number of tuples selected by the
derived condition and nt is the number of elements of the pure A-cut, is taken as
representing the behaviour of a query. The results obtained are drawn below:
25 300
20
15 200
10
100
5
o o
o .2 .4 .6 .8 o .2 .4 .6 .8 1 ')..
It is clear that r remains small for the arithmetic and geometric mean. In the case of the
arithmetic mean the specific condition applies for A ~ .5, point where the curve
decreases significantly. A similar phenomenon occurs for the weighted mean and the
OW A when A ~ .7. The most important fact is the high values of r for the OW A
aggregation.
In order to evaluate the influence of the selectivity, we used the fuzzy predicate "salary
around 9000" whose selectivity is .24 and we concluded that: i) the shape of the curves
does not change significantly, ii) the value of the extremum increases (from 25 to 95%
for the arithmetic mean) and iii) the breaking when a specific condition becomes valid
is more stressed
CONCLUSION
In this paper, we have been dealing with the evaluation of complex fuzzy predicates in
the scope of a database management system. One interesting objective is to use a
regular DBMS to process at least partly imprecise queries and this implies that boolean
conditions can be issued. We presented a mechanism called derivation, based on the
distribution of the A-cut of a complex predicate over its components, thus providing
boolean conditions. If this approach works for a wide range of complex predicates, we
have shown that very often the initial A-cut and the obtained boolean condition were
not equivalent, since the latter represents only a necessary condition with respect to the
former. This method can be used for simple relational queries involving only selections
and joins where the conditions (selection or join) may be imprecise. Under this
assumption, a query can be seen as a condition applying to a single relation and a
364
REFERENCES
[I] Bernstein P. A. and Chiu D. M. W., "Using semi-joins to solve relational queries",
Journal of the ACM, 28, I, 1981,25-40.
[2] Bosc P., Galibourg M., Hamon G., "Fuzzy querying with SQL : extensions and
implementation aspects", Fuzzy Sets and Systems, 28, 1988,333-349.
[3] Bosc P., Pivert 0., "About equivalences in SQLf, a relational language supporting
imprecise querying", Proc. IFES, Yokohama (Japan), Nov. 1991,309-320.
[4] Bosc P., Pivert 0., "Discriminated answers and databases: fuzzy sets as a unified
expression means", Proc. 1st International IEEE Conference on Fuzzy Systems FUZZ-
IEEE'92, San Diego (USA), March 1992,745-752.
[6] DeWitt DJ., Bitton D., Turbyfill C., "Benchmarking database systems - A
systematic approach", Proc. VLDB Conference, 1983,8-19.
[7] Dubois D., Prade H., "Weighted minimum and maximum operations in fuzzy set
theory", Information Sciences, 39, 1986,205-210.
[8] Ichikawa T., Hirakawa M., "ARES: a relational database with the capability of
performing flexible interpretation of queries", IEEE Transactions on Software
Engineering, 12, 5, 1986,624-634.
[9] Lakoff G., "Hedges: a study in meaning criteria and the logic of fuzzy concepts",
Journal of Philosophical Logic. 2, 1973,458-508.
[10] Motro A., "VAGUE: a user interface to relational databases that permits vague
queries", ACM Trans. on Off. Inf. Syst., 6,3,1988,187-214.
[II] Yager RR, "On ordered weighted averaging aggregation operators in multicriteria
decisionmaking", IEEE Trans. on Syst.. Man and Cyber., 18, 1988, 183-190.
[12] Yager RR, "Connectives and quantifiers in fuzzy sets", Fuzzy Sets and Systems,
40, 1991,39-75.
[13] Yong-Yi c., "An approach to fuzzy operators", Busefal. 9,1981,59-65.
[14] Zadeh L.A., "A fuzzy-set-theoretic interpretation of linguistic hedges", Journal of
Cybernetics. 2, 1972,4-34.
Numerical and Logical Approaches to
Fuzzy Set Theory by the Context Model
Keywords
Context Model, Context Logic, Possibility Theory, Fuzzy Set, Extension
Principle, Fuzzy Statistics, Hypotheses Testing
Abstract
The origin of imperfect data is due to situations, where we are not able
to specify an object by an original tuple of elementary characteristics
because of incomplete information available by our observation of this
object in its actual state. To simplify matters we only distinguish be-
tween two kinds of imperfect knowledge, which are vagueness and uncer-
tainty. Vagueness is related to the specification of a vague characteristic
as a description of imprecise, perhaps contradicting and partly incor-
rect observations of the underlying original characteristic within a finite
number of competing contexts of consideration. The view of competing
contexts is related to the phenomenon of conflict, whereas imprecision
indicates that without having further information we are not in a po-
sition to specialize context-dependent observed characteristics into ele-
mentary characteristics. Thus, vagueness is viewed to be a combination
of the two independent phenomena of conflict (competing contexts) and
imprecision.
Uncertainty, on the other hand, is referred to the valuation of vague
characteristics: When applying a vague characteristic as a vague obser-
vation of an inaccessible elementary characteristic related to an object's
attribute in a given state, a decision maker should be enabled to quantify
his or her degree of belief in this vague observation either by objective
measurement or by subjective valuation. Hence, the theory 6f measure-
ment seems to be the adequate formal environment for the handling of
uncertainty aspects.
This section formalizes some basic concepts of the context model, keyed
to the interpretation of fuzzy sets.
Let D be a nonempty universe of discourse (a domain of a data type)
and C a nonempty finite set of contexts.
rc(D) IlJ b I I : C -+ 2D } is called the set of all vague characteristics
of D w.r.t. C. I E rc(D) is elementary, iff (Yc E C)(IJ(c)1 = 1). We
introduce the empty characteristicOc E fc(D) by oc(C) = {0}, which
means that all projections Oc(c), c E C, are contradictory. Assuming
II, 12 E f c( D), then 11 is said to be more specific than 12 (,1 is a
specialization of 12; 12 is correct w.r.t. Id, iff (Yc E C)( 11( c) ~ 12( c».
367
(1) F is correct for f w.r.t. ({l"""n) and (al, ... ,an ), iff
('V(A l , ... , An) E 2D1 X ... X 2 Dn )
(('Vi E {I, ... , n} )({i ai- cor'rect w.r.t. Ai) ===> F correct w.r'.t.
J(A l , ... , An)).
(2) F is sufficient for f w.r.t. ({I, .. ",n) and (al, .. . ,an ), iff
F fulfils (1) and ('V F* C F) (F* is not correct for f w. r. t.
({I, .. '"n) and (al, ... ,an )).
Let F(JR) denote the class of all normal fuzzy sets j.t of the real line that
fulfil 1j.t(JR)1 E IN, i.e. F(JR) C POSS(JR).
Suppose to have 1l"[,i] E F(JR), i = 1, ... , n, induced by non-available
specifications Ii E f(j(Di) of valuated vague observations of unknown
elementary originals Ai ~ JR. Consider a function 9 : JRn -+ JR and
define f : (2 lR )n -+ 2R , f(Al, ... ,An ) I?J g(A l x ... x An). It is
easy to show that f is sufficiency- and contradiction-preserving. Since
f( 1l"[,l]O', ... , 1l"[,n]O') is sufficient for f w.r.t. (,ll ... , In) and (a, , a),
it is the most specific characteristic that is correct w.r.t. f(Al, , An)
for all AI, ... , An, if the a-correctness of Ii w.r. t Ai, i = 1, , n, is
assumed. On the other hand, for all a > 0, f( 1l"[,l]O', ... , 1l"[,n]O') is the
a-cut of the fuzzy set which is induced by application of Zadeh's exten-
sion principle [17] w.r.t. 9 and 1l"[,iJ, i = 1, .. . ,n. Hence, we have found
a justification of this principle within the context model.
In a similar way we obtain a justification of the well-known operations
max and min on fuzzy sets, if we apply the sufficiency-preservation of
the set-theoretical union and intersection, respectively.
4 Context Logic
(i) for all c E C: TH(Ji(c)) = {<p ELI Ji(c) I-L <p} = Ji(c)
(ii) for all c E C : ..L ~ Ji(c), (where..L - <p 1\ -'<p)
(iii) for all <p E L : {c E C I <p E Ji(c)} E A.
where inf 0 = 1.
if <p E L o
aLo : L -+ [0,1],
otherwise
(i) P(Co) = 1
A nested context evaluation reflects the idea, that there are no contra-
dicting possible worlds, but only worlds being more specific than others,
in the sense that they contain more theorems. On a very strict level, only
those formulae known for sure, are taken into account, but on a more
speculative level more formulae are thought of as possible. In this way,
the nested worlds can be weighted accordingly, inducing the necessity
and possibility measures on L. A nested or consonant view of possibility
distributions was already described in [4] and [5], where also a purely
qualitative view of possibilistic logic is described, indicating the rela-
tions of Spohn's generalized possible worlds model [16] and possibilistic
logic. Without semantics for the numbers, possibilistic logic reduces to
a model with a set of nested possible worlds, describing nothing more
but a (preference) ordering on the worlds. But the semantics provided
by the context model justifies the use of the numbers.
The following three theorems describe the connection between possibilis-
tic logic and context logic.
N=Pw
6 Final Remarks
References
[1] Dubois, D., Lang, J., Prade, H. (1991): Fuzzy Sets in Approximate
Reasoning, Part 2: Logical Approaches, Fuzzy Sets and Systems 40,
203-244.
[4] Dubois, D., Prade, H. (1989): Fuzzy Sets, Probability and Measure-
ment, European Journal of Operational Research 40, 135-154.
[9] Klir, G.J., Folger, T.A. (1988): Fuzzy Sets, Uncertainty and Infor-
mation. Prentice Hall, New York.
376
[12J Kruse, R., Meyer, K.D. (1987): Statistics with Vague Data. Series
B: Mathematical and Statistical Methods, Reidel, Dordrecht.
[15] Nguyen, H.T. (1978): On Random Sets and Belief Functions. Jour-
nal of Mathemetical Analysis and Appl. 65, 532-542.
[17] Zadeh, L.A. (1975): The Concept of a Linguistic Variable and its
Application to Approximate Reasoning. Part I: Inform. Sciences
8, 199-249, Part II: Inform. Sciences 8, 301-357, Part III: Inform.
Sciences 9,43-80.
A Class of Fuzzy Featural Models of Similarity Judgments
The SIR model represents the Sij by a ratio of Si (J Sj and Si so that the d operator in
(1) is division:
Mij + c =ai/Ci, (2)
where aij = Si (J Sj, q = ~g(Sj,Sj) = Sj, and k and c are constants. In our simplest
model, we determine c on the basis of the smallest possible similarity rating and
consider the model specifiable only up to scalar multiplication, so that the aij and q ar
solved for by the following alternating least-squares estimations:
1
Cj = - Laj'/si'
N-l JFl
"-L' J J
and (3)
1
~j ="2 (CiSij + CjSji).
The SID model represents the Sij by a difference between Si (J Sj and Si so that th<
d operator in (1) is subtraction:
k~ij + c = aij - q, (4)
where aij = Si (J Sj, q = ~g(Si,Sj) = Si - Sj. and k and c are constants. In our simples
model, we determine k on the basis of the largest possible similarity rating and consid<
the model specifiable only up to scalar subtraction, so that the aij and q are solved for
by the following alternating least-squares estimations:
1
Cj = - L(aj' - sj')
N-l J'Fl
'-L" J J
\
and (5)
1
~j ="2 (q + Sij + Cj + Sji).
Table 1: Original Sij from Shiina's Data (Renormalized)
USA HoI. China Thai USSR NKor Brazil Cuba
USA 1 .354 .214 .153 .224 .085 .429 .296
HoI. .431 1 .148 .201 .193 .111 .232 .196
China .232 .175 1 .447 .558 .534 .193 .331
Thai. .187 .185 .508 1 .172 .392 .402 .362
USSR .257 .201 .495 .164 1 .476 .169 .439
N.Kor. .124 .119 .611 .405 .595 1 .172 .423
Brazil .550 .310 .246 .357 .188 .175 1 .511
Cuba .362 .198 .328 .347 .508 .421 .508 1
those of Shiina's model and against those of the SID model. For the first graph
Spearman's rho = 0.642; for the second rho = 0.997.
60
55 ••
50 • • •
•
45
•
<U 40
•
•• • • ••
,
.~
~ 35 • •
30
25 •• •• • • •
20 • •
15 •
.2 .4 .6 .8 1.2 1.4 1.6 1.8 2 2.2 2.4
SIR
3.45
3.4
•I
3.35
3.3 • •
• •
3.25
3.2 ,.
Cl
00 3.15
••
•••
3.1
..
.
3.05 ~
.~
2.95
3
•
2.9
.2 .4 .6 .8 1.2 1.4 1.6 1.8 2 2.2 2.4
SIR
Figure 1: Scatterplots for aij Values
Can the SIR and SID models provide any interpretive value. and do they yield
similar featural interpretations of the data? A reasonable interpretation for the aij and
Ci is that they are monotonically related to the fuzzy cardinalities of Si n Sj and Si
380
respectively. We may therefore use the estimated values for those parameters to
address questions such as these: (1) What are the relative sizes of the features
common to two or more countries; (2) What are the relative sizes of features unique
to each country; and (3) What part of the aij are unique to each pair of countries.
To do this requires that we derive the values for features Ilki which obey the
constraints:
Lmin(llkj, Ilki) = aij and Lllki = Ci·
k k
An algorithm for doing so -in such a way as to minimize Lllki is as follows:
k
(1) Rank-order the aij from lowest to highest. Let us denote the reordered aij by am.
(2) Set k = m = 1. Add al to all Si.
(3) Set m = m+ 1. Add am to all Si for which there is no Sj such that min(Si'sj) >
aij·
(4) Repeat st~p (3). If-step (3) is no longer possible, then set Illi = Si for all i.
(5) Set k =k+1.
(6) Add am to all Si for which there is no Sj such that
k-l k-l k-l
Lmin(llri> Ilrj) + min {(Si - L Ilri, Sj - L Ilrj} > aij-
r=l r=l r=l
(7) Set m ::;:; m+1. Repeat step (6). If step (6) is no longer possible, then set
k-l
Ilki = Si - L Ilri for all i.
r=l
(8) If the largest am has not been used, then return to step (5). Otherwise, stop.
For the SIR model it is then possible to add a unique component Ilk+li for each
of the sets if for any i, Lllki < ci so that Si ultimately estimates ci. This algorithm
k
is not the only possible method for extracting Ilki but it does maximize
'compression' of the Ilki. Tables 2 and 3 display the Ilki obtained for the SIR and
SID models, respectively. Because in the SIR model the ci are estimates of the
cardinality of Si, it is also possible to convert the algorithm into one which provides
minimally compressed Ilki. Table 2 displays in italicized entries the resultant Ilki
that differ from those obtained under maximal compression. These upper and lower
bounds on the IlId render the SIR model interpretively richer than the SID, since it is
possible to employ sensitivity analysis on relationships among more than two
countries.
For example, it is clear that for both models the outstanding overlap among more
than two countries involves China, the USSR, and North Korea (probably because at
the time of the study they all were geographically proximal Communist nations).
For the SIR model, upper and lower bounds on the joint intersection of these three
countries may be estimated (see [9] pp.161-163 for a discussion of the appropriate
methods for doing so). The size of that intersection is 1.76-1.98,41-46% of the
largest ci among them (USSR). Cuba is Communist but not geo-culturally
proximal, and it overlaps moderately with all three. Likewise, Thailand is geo-
culturally proximal to China and North Korea but not the USSR, and it overlaps
substantially with the fIrst two but not with the latter.
381
Both the SID and SIR models yield 18 features. However, the rank-orders of the
Ilki for the two models agree only moderately: Spearman's rho = 0.577 when the 80
cases for which both models have Ilki = 0 are ignored (Figure 2 shows a scatterplot
of the Ilki without the 80 data-points at (0,0». Moreover, the 1l9i for the SID and
the Ill5i for the SIR have no obvious correspondence with features from the other
model. Nevertheless, the remaining 17 features emerge in the same order from the
algorithm.
1.2
•• .*
.8
0 .6
Ci5
.4
• ••
.2
A
0
•• ff ~
0 .2 .4 .6 .8 1.2 1.4
SIR
Figure 2: Scatterplot of the Ilki for the SIR and SID Models
It is somewhat suplising that the features extracted from the SIR and SID models
via the same algorithm should differ to such an extent, given the close agreement
between both models and their excellent fit with the original data. How interpretively
important might these differences be? At least some of them may be dismissed as
trivial. The eight points in the upper part of the scatterplot above correspond to the
Illh which simply means that the SID model accords nonunique overlaps among the
countries a greater weight than does the SIR model. Likewise both models agree on
high ranks for the three rightmost points, which represent the nonzero valued 1l17i,
the overlap among China, the USSR, and North Korea.
However, the next right-most cluster containing three pairs of points reveals
what seems to be an obvious disagreement between the two models. Those pairs
represent nonzero ll13h Ill4i, and Ill6i (SIR feature numbers) which correspond to
overlaps between China and Thailand, Brazil and Cuba, and the U.S.A. and Brazil
respectively. The SID model agrees with SIR on the evaluation of the first pair, but
the second two features are given substantially lower rankings in the SID model. The
main reason for this may be appreciated by examining the leftmost triplet which
corresponds to SID's 9th feature, for which there is no equivalent in SIR. That
feature represents a three-way overlap among the U.S.A., Brazil, and Cuba; and it
effectively deflates the importance of those other features. Thus, the two models
383
actually do agree on the relative importance of those overlaps, but they have
partitioned them differently.
It is noteworthy that Shiina's model's four fuzzy features are captured reasonably
well by the Ilki from either the SIR or the SID models. With only 8 cases, we must
restrict regressions to only a few predictors. Nevertheless, using three SIR features to
predict each of Shiina's features yields adjusted R2 values of .929, .886, .939, and
.979 respectively.
The question about unique features for each country may be addressed directly via
the SIR model and somewhat less so through the SID model. The difficulty with the
ci in the SID model is that they could be interpreted as related to the cardinality of
unique features of the Si or to the cardinality of the Si themselves. Circumstantial
evidence shown in Figure 3 below suggests that they are well-correlated with the
SIR q. As it turns out, they are not highly correlated with the "unique surplus"
values for the SIR model listed in Table 2. Therefore the second interpretation seems
more plausible here.
.88
. 87 •
• •
.86
o
en .85
. 84
.83
. 82
•
I
. 81 +-"----r--.---r-----r---r-----r--......---,r---+
3.6 3.8 4 4.2 4.4 4.6 4.8
SIR
Figure 3: SIR versus SID Ci Values
We may use the SIR unique surplus figures, then, to address the question
concerning uniqueness of features. It is clear that the U.S.A. and Holland both carry
high portions of unique Ilki (1.399-1.577 for the U.S.A. which is 28.5%-31.8% of
its cardinality, and 2.242-2.400 for Holland which is 53.1 %-56.9% of its
cardinality). Thailand, the USSR, and North Korea carry smaller portions of unique
Ilki comprising 10%-20% of their cardinalities, while China, Brazil, and Cuba have
virtually no unique components to their features. Lastly, while both models agree
that the U.S.A. and Holland, and China and Thailand share a substantial pairwise
overlap in isolation from their mutual overlap with other countries, they disagree
over whether the U.S.A. and Brazil have a substantial unique overlap.
In conclusion, this paper has proposed a new class of generalized models for
asymmetric similarity judgment data, and demonstrated that certain special cases are
384
very simple and psychologically plausible while modeling real data quite accurately.
In particular, the SIR and SID models are based on a straightforward hypothesis that
the perceived similarity of two stimuli is a function of the extent to which the first
stimulus presented shares salient features with the second stimulus relative to the
'size' of the first one. When augmented by fuzzy set theory, even simple models such
as these provide us with a number of insights into the molar properties and features
underlying similarity judgments. We are able to extract features that enable us to
determine which stimuli possess unique (unshared) characteristics, and which stimuli
share features with one another.
Our investigations demonstrated that even when one model has a reasonable
degree of fit with the data, improvements on that fit may lead to a substantially
different model. The large differences between Shiina's model and the SIR and SID
results point to a need for researchers to exercise caution regarding their beliefs in the
stability of all aspects of their models despite goodness of fit. A rather more startling
result of this investigation, however, is that even though two models may fit the
data extremely well and agree very closely with one another, the qualitative
interpretations extracted via featural analysis may differ on crucial matters. The rank-
order correlations between the SID and SIR models' aij and Ci estimates are .997 and
.952 respectively, yet their nonzero /lki extracted under an identical algorithm have a
rank-order correlation of only .577. Indeed, ignoring the /lli outliers yields a rho of
.447. Clearly further investigation into the sensitivity of featural models to minor
variations is needed, given that the extraction of features is essential for
interpretation.
References
[1] Bezdek, J.C. 1974 Journal ofMathematical Biology 1, 57-71.
[2] Coulter, S. and Tversky, A. 1986 Psychometrika 51,
[3] DeSarbo, W. 1982 Psychometrika 47, 449-463.
[4] Dunn, J.C . 1974 Journal of Cybernetics 3, 32-57.
[5] Kruskal, J.B. 1964 Psychometrika 29, 115-129.
(6) Ruspini, E.H. 1969 Information and Control 15, 22-32.
-[7] Shepard, R.N. and Arabie, P. 1979 Psychological Review 86,87-123.
[8] Shiina, K. 1988 Japanese Psychological Research 30, 95-104.
[9] Smithson, M. 1987 Fuzzy Set Analysis for Behavioral and Social Sciences. New
York: Springer Verlag.
[10] Tversky, A. 1977 Psychological Review 84, 327-352.
Fuzzy ANALYSIS OF FUZZY DATA
Hans Bandemer
Department of Mathematics, Freiberg Mining Academy,
DO-9200 Freiberg, Germany
Fuzzy DATA
The wording "datum" means, literally, "something actually given".
It expresses that" something" was found in a state characterized by just
this datum. Obviously, such a datum contains information only if there
are at least two different possibilities for the state of the "something"
in question. Hence we can consider every datum as a realization of a
certain variable u in a set of values, as usually called the universe of
discourse U, and reflecting the possibilities for the state in the given
context.
An element x E U is called an element-valued datum, iff it expresses
the statement
u = x. (1)
u= A. (2)
Sometimes this statement occurs as "u is A", for example: "The relia-
bility is HIGH".
Obviously, simple fuzzy data are fuzzy sets on a suitable universe
U. The new denotation refers to the part they have to play within the
process of inference. Simple fuzzy data contain each a certain piece
of information on the state of the "something", on which inference is
required.
Examples of simple fuzzy data are
(i) marks, scores, grades and other ordinal evaluations with a verbal
background
385
R. Lowen and M. Roubens (eds.), Fuzzy Logic, 385-394.
© 1993 Kluwer Academic Publishers.
386
(3)
388
where Xij specifies the i-th feature of the j-th object. The Xij'S are
allowed to be fuzzy data over appropriate universes Ui, and the character
of Ui may vary from feature to feature.
The first structural element of a fuzzy diagnostic system is a vector
R = (Rl, ... , R t ) of fuzzy similarity relations Ri on Ui X Ui, respectively,
specifiying the degree of similarity of each pair (x, y) of elements in Ui.
If Xij and Xik are strict fuzzy data then their similarity, in the sense
of Ri, can be expressed by a fuzzy set
using the extension principle. The fuzzy set Sijk can be interpreted as
a value of a linguistic variable SIMILARITY and represents the fuzzily
expressed fuzzy similarity of OJ and Ok with respect to the i-th feature
(in the sense of Ri).
Considering all pairs of objects and all features the hypermatrix
(5)
represents the similarity structure of the system.
Since scalars are better suited for numerical handling there are sev-
eral approaches using functionals of the fuzzy data for expressing their
similarity. Specifying the degree of truth that Xij (= A) and Xik (= B)
are in relation Ri (= R), e.g. by-interpreting the well-known proposal
from mathematical logic
rijk rcard(Xij,Xik,Ri)
card(Xij n Xik n Ri)/card(Xij x Xik) (8)
389
where Xij and Xik are to be taken as the cylindrical extensions with
respect to Ui X Ui.
Both these suggestions are only examples from a wide class of ap-
proaches (see BANDEMER/NATHER 1992).
Considering all pairs of objects and all features the hypermatrix
(9)
(10)
reflects the fuzzy similarity of all objects with respect to the io-th feature.
A neighbourhood of the feature i o can now be defined by
d( E, F) = m.ax Ieij -
~J
fij I (12)
was used. Obviously, also some other distance can be used for this
purpose, if it reflects the opinion with respect to diversity of features.
This can be the starting point for feature selection as well as for choosing
similar features for interpolating missing values. Moreover, R(i o) can be
used to evaluate the discriminability of the io-th feature with respect to
the given set of objects, e.g. by Shannon's entropy.
For fixed j = jo and k = ko' the vector
(13)
390
reflects the fuzzy similarity of the two objects 0 jo and 0 ko with respect
to all features. A neighbourhood of an object Ojo would then be
V(jojro) = {k E {1, ... ,n}: Vi E {1, ... ,t}: rijok ~ TO} (14)
(15)
M =U
.
Mi : m( x, y) = m?-x
z
mi ( x, y) (17)
z
391
mA(a) = J
Ux
m(x,g(x,a))dx / J
Ux
dx (19)
where Ux is the universe where the Xi's are defined. The integral mA
considered as a function on a defines a fuzzy set, say A*, over A, and
A* can, e.g., be used as a fuzzy estimation of some true but unknown
parameter value a*, controlling the process under investigation.
Another transfer principle, obtained by fuzzyfication of the state-
ment: "There is a point (x*, y*) in a crisp set C with y* = g( x*)", leads
to the joint grade of validity of the functional relationship
REFERENCES
BANDEMER, H. 1990:
Quantifying similarity for handling information in knowledge bases
J. Chemometrics 4, 147-158
BANDEMER, H. 1991:
Some ideas to minimize an empirically given fuzzy function
Optimization 22, 139-151
CELMINS, A. 1987:
Least squares model fitting to fuzzy vector data
Fuzzy Sets and Systems 22, 245-269
DIAMOND, P. 1988:
Fuzzy least squares
Inf. Sciences 46, 141-157
Abstract
A fuzzy-measure-hased approach to semantics for modal logic is pre-
sented and its several properties are discussed. Measure-hased models for
modal logic are defined and the soundness and completeness theorems of
several systems of modal logic are proved with respect to classes of fi-
nite measure-hased models, particularly, formulated by fuz;,;y, possibility,
necessity, probability, and Dirac measures.
1 INTRODUCTION
There are two main approaches to treat belief in the area of artificial intelligence
(cf.[7] ): a logical approach using modallogic[l], and a measure-based approach
using probability theory, the Dempster-Shafer theory of evidence[6], and so on.
However, the relationship between the two approaches has not been studied in
details. Then, we formulate in this paper fuzzy-mea:mre-based models for modal
logic and discuRs the correspondence between the systems of modal logic and
several fuzzy measures in the sense of soundness and completeness. We adopt
Chellas's notations[l] for logic with some exceptions in the following.
logical operators:
T(tr'uth constant), .(negation), /\(coniunction), and
O(necess-ity),
parentheses: (,),
Note that models M =< W, N, v > and M' =< W, {m"'}"'Ew, 11 > agree
from the beginning on non-modal sentences because they have Wand 11 in COlll-
mono So, to construct M' results in defining a fuzzy measure m", : 2 w -> [0,1]
such that
X E N(a) {::::::::} m",(X) =1 (X ~ W)
for each a E W. This is the main point of proving completeness in this paper.
3 FUZZY-MEASURE-BASED MODELS
First, we show the soundness of the system EMNP with respect to C pm .
Lemma 5 For any finite fuzzy-meas'ure-based model M,
(1) F M P <-t q {::::::::} FMOP <-t Oq (RE)
(2) FM O(p/\q) -> Op/\ Oq (M)
(3) FM OT (N)
(4) FM -.0.1 (P)
Proof. (1) Since FM p <-t q is equivalent to Ilpll = Ilqll , m",(lIpID = m",(IlqlD
for each world a. Therefore, FM Op <-t Oq. (2) If F~ O(p /\ q) then
m",(lIp /\ qlll = 1. By the monotonicity of ma , m",(lIplll = m",(lIqlll = 1,
that is, F~ Op /\ Oq. Therefore, F~ O(p /\ q) -> (Op /\ Oq) for any world
a in M. (3) Since IITII = W, m",(IITIIl = m",(W) = 1. (4) Since 11.111 = 4>,
m",(II.111l = m,,,(4)) = 0 < 1.
The system EMNP is the smallest system containing the rule R.E and the ax-
ioms M, N, and P besides the rule and axiollls of propositional logic. Therefore,
we have the following soundness theorem from Lemma 5.
399
Theorem 6 The system EMNP is so'und with r-espect to the class of finite fuzzy-
meas'ure-based models C Fm.
To show t.he complet.eness of EMNP wit.h respect t.o CFm. we use t.he class
of finite minimal models sat.isfying the following condit.ions:
rEMNP p ~ FCEMNP p.
Lemma 7 For any minimal model M =< W,N,'l1 > in CEMNP, there is a
fuzzy measure mO! on W such that mO!(X) = I ~ X E N(a).
~f
mO! (X) -
{I0 ifif XE N(a)
X fi N(a)
Theorem 8 The system EMNP is complete with respect to the class of finite
fuzzy-measure-based models CFm.
4 POSSIBILITY-MEASURE-BASED MODELS
A fuzzy measure Pos satisfying
Since possibility measures are also fuzzy measures, the soundness theorem
follows from Lemmas 5 and 9.
Theorem 10 The system EMFNP is so'und with respect to the class of finite
possibility-measure-based models CPos.
To show the completeness of EMFNP with respect to Cpos' we use the class
of finite minimal models satisfying the condition:
besides (m), (n), and (p). The class, denoted by CEMFNP, determines EMFNP
(d.[I]):
Lemma 11 For any minimal model M =< W,N,v > in CEMFNP, there is a
possibil'ity measure Pas", on W such that Pos",(X) = 1 ¢=::> X E N(a).
P
as",
({ J})
!
~f {I 0
if;3 E N(a)
if!J (j N(a)
for each world!J E W. Note that N(a) must have 1J,t least one singleton. Because
we can split any X E N (a) using the condition (f) until some singleton {a'} is
isolated and {a'} E N(a). This means max{Pos",({fJ})} = 1 and thus Pas",
{3EW
is a possibility measure. We can conclude om lemma by showing the following
equivalence:
The complet.eness of EMFNP with respect. t.o CPos follows from Theorem 4
and Lemma 11.
Theorem 12 The system EMFNP is complete with respect to the cla.ss of finite
possibility-meas'Ure- based models CPOB'
5 NECESSITY-MEASURE-BASED MODELS
A fuzzy measure N ec satisfying
RN. f- KD p :=} f- KD Op
K O(p ----> q) ----> (Op ----> Oq)
Th~ Op ----> Oq.
Note that KDi?iaentical with the system EMCNP (d.[l]). Therefore, to prove
the soundness, we ha;e-ollly to show that the axiom
C. Opl\Oq----> O(pl\q)
is true in any necessity-measure-based model.
Since necessity measures are also fuzzy measures. we have the following
soundness t.heorem from Lemmas 5 and 13.
402
Theorem 14 The system KD( or, EMCNP) is sO'und w'ith respect to the class
of finite necessity-meaS'u're-based models CNec.
N
eco<
(W _ {tJ}) ~f
I"
{I 0
if nN(ex.) ~ W - {j3}
if nN(ex.) q; W _ {j3}
n
for each world /3 E W. If W - {/3} E N(ex.) for all world /3 E W, then, by (c),
¢= (W - {j3}) E N(ex.), but this contradicts (p). Therefore, there must be a
I3EW
world ex. ' such that W - {(VI} rt N ((V) and equivalently min {N ec", (W - {/3})} = 0
{jEW
Hence, N eco< is a necessity measure. The following equivalence with the above
(**) concludes the proof of this lemma:
Neco«X) = I {::::=:} nN((V) ~ X
for any X E 2w . Suppose Neca(X) = I and n ' E nN(a). Then, obviously
nN(n) q; W - {a'l and so, Neca(W - {(VI}) = O. So if a ' rt X, then
Neca(X) = Nec a ( n (W - {j3}) = min Neca(W - {/3}) = 0,
I3~X I3~X
Theorem 16 The system KD ,is complete 'W,ith respect to the class of finite
necessity-meaS'ure-based models C Nee.
6 PROBABILITY-BASED MODELS
We can also show that KD is sound with respect to the class C p ,>,
Proof. Suppose p~ Opl\ Oq, that is, Pra(!lpl!) = PT a (lIqll) = 1 for each world
a. Thus, we have Pra(llpll u Ilqll). Then, since
Since probability measures are also fuzzy measures, we have the following
soundness theorem from Lemmas 5 and 17.
Theorem 18 The systern KD is so'und wdh respect to the class of,finite probability-
based models C p".
P1'00f. By the condition (c) and the finiteness of W, N (tv) must have the smallest
set nN(n). Let k =1 nN(n) I. Then, we can define a probability PTa for each
world a by its density:
7 DIRAC-MEASURE-BASED MODELS
We can show the soundness of the system KD! with respect to the class CD,
where KD! is axiomatized by the axiom:
D!. op -+ Op
along with the rules and axioms of KD. Note that KD! is identical with the
system EMCFNP (d.[l]). Therefore, to prove the sounchless, it is enough to
show that the axioms C and F is true in M. But, this is trivial since Dirac
measures are both possibility and probability measures.
Theorem 22 The .~ystem KD! is sO'llnd with r'espect to the clo.ss of finite Dirac-
measure-based models CD.
I- KD ! p ¢=:} FC KD ! p.
Proof. The conditions (f) and (c) imply that N(a) must. have at least one
singleton and, at the same t.ime, have t.he smallest set. Therefore, t.here is a
unique world a' such that. X E N(a) ¢=:} a' E X for each world a. Then, we
can define a Dirac measure 8ex by
{j
ex
(X) ~f
-
{I0 if a'
if a'
EXX
~
Theorem 24 The systern KD! is complete 'With respect to the cla,ss of finite
Dirac-mea.mre-based models CD.
405
8 CONCLUSION
The soundness and completeness theorems proved in this paper show us what.
logic Ule extreme value, L of measures is subject to. Such a logic at least
contains the system EMNP determined by fuzzy measures and is at most con-
tained in the system KD! determined by Dirac measures. We can also prove t.he
soundness and completeness for the models formulat.ed by intermediate values of
measures, though we do not treat them here. Hence, we can conclude that modal
logic is inherent in measure-based methods. In particular, this has significant
meaning in modeling of belief in artificial intelligence, because it makes clear
the role of doxastic modal logic in belief revision and updating using the Bayes'
rule, the Dempster-Shafer theory of evidence, and so on (see [5] for details).
Along such lines, we have applied measure-based semantics for doxastic modal
logic to the modeling of indexing[4] in document retrieval in which an indexer
assigns keywords to documents based on his belief. This approach presents new
framework of weighting logical retrieval, where the weight.s of documents for
keywords are regarded as the bodies of evidence and where retrieval logic is
subject. to t.he laws of doxastic modal logic. This is a quite different approach
to document retrieval from the usual fuzzy one (cf. [3]).
References
[1] B.F.Chellas, Modal Logic: An Introduction. Cambridge University Press,
1980.
[2] D.Dubois and H.Prade, A Class of Fuzzy Measures Based 011 Triangular
Norms. International Journal of General Systems, 8( 1982), 43-61.
PHIL DIAMOND
Mathematics Department,
University of Queensland,
QLD 4072 AUSTRALIA.
1. INTRODUCTION
Linear estimation techniques for imprecise data, modelled as fuzzy
sets, fall broadly into two distinct areas. The first consists of adap-
tation of existing algorithms and estimators by the extension prin-
ciple. This technique has been used by Heshmaty and Kandel [8].
Bardossy et al [1] have extended the geostatics kriging functional
to the fuzzy case in much the same way. Yager [15] used fuzzy
arithmetic directly in crisply derived regression equations. A sec-
ond approach is to derive new estimators by directly dealing with
models formulated in a fuzzy context. Tanaka et al performed
linear regression by minimizing a functional subject to possibil-
Ity constraints [13],[14], thus effectively reducing the regression
problem to linear programming. However, these techniques do
407
R. Lowen and M. Roubens (eds.), Fuzzy Logic, 407-416.
© 1993 Kluwer Academic Publishers.
408
not give error estimates in the form of residuals. Celmil}s has ap-
plied least squares methods with possibilistic constraints for least
squares fitting of symmetric fuzzy numbers appearing as vector
elements and having conically dependent membership functions
[2],[3].
Classical least squares is approximation by projection onto a
closed linear subspace or cone. This has recently been applied
to triangular fuzzy number data by introducing a metric on the
set of such fuzzy numbers. Least squares then extends naturally
to a number of linear models [4]' [5]' and to BLUE kriging estima-
tors [6]. These techniques are surveyed below. Section 2 discusses
the appropriate metric space, its completeness, and a projection
theorem. Section 3 looks at a number of linear models and the
last section considers fuzzy kriging.
2. PRELIMINARIES
Let K denote the space of nonempty compact intervals in ~ and
let £ denote the class of normal fuzzy convex uppersemicontinuous
fuzzy sets on ~ that are of compact support. We will refer to these
as fuzzy numbers.
If u E £, then for each 0 < a ::s 1, the a-level set [u]a =
{x E ~ : u(x) 2: a} is a nonempty compact interval, as is the
support set [u]o. The linear structure of K [9] is compatible with
fuzzy addition u + v and scalar multiplication cu, c E ~+, on £
in terms of the a-level sets in the following way: for u, v E £,
[u + v]a = [u]a + [v]a, [cu]a = c[u]a, for all a E 1= [0,1].
Denote by T C £ the set of triangular fuzzy numbers, namely
those u 6 (u-,um,u+) with u- ::s u m ::s u+ and membership
function u(x) = 0 if x < u- or x > u+, while
while
E([u]a) = in[u]a dP
3. REGRESSION MODELS
fuzzy input, fuzzy output.
Observations consist of data pairs Xi, Yi, i = 1,2, ... , N, where
Xi = (Xi-,Xi,Xt), Yi = (Yi-,Yim,Y/) are triangular fuzzy
numbers. Assume that X E P, i.e. X i- 2 0, by translation of
data if needed. Consider the model Y = a + bX, a, b E ~, to
be fitted to the data in the sense of best fit with respect to the
D 2 -metric. This is the same as minimising :ED2(a + bXi ,Yi)2.
Recall that, if b 2 0, bX = (bX-, bxm, bX+), while if b < 0, bX =
(bX+ , bxm, bX-). If b 2 0, we minimise
weight has the effect of reversing the spreads of the fuzzy number
it multiplies.
With ordinary data that is spatially distributed, kriging under
the stationary hypothesis amounts to finding those weights of an
estimator that is a combination of data values, which minimise
the variance of the estimator. The fuzzy-valued counterpart min-
imises the variance of a linear combination of fuzzy data, where
the variance is with respect to the D 2 -norm in P. Suppose that
w( x) is a fuzzy- valued regionalised variable which is a realisa-
tion of a second order stationary random function W (x), over a
region V. Consider a quantity Yo, fuzzy-valued and associated
with the regionalised variable w(x). For example, yo = w(xo),
the value taken by w at x Iv
= Xo, or Yo = IVI- 1 w( a) da,
which may be interpreted as an ((average value" of the fuzzy vari-
able w(x) over the whole field V. Here IVI denotes the volume
of V while integration is that defined in, for example, [7],[13].
Given N data values w(XI),W(X2)"" ,W(XN) observed at points
Xi E V, i = 1,2"" , N, we want to estimate Yo. It is convenient
to estimate a whole class of estimators into a single problem by
considering Yo as an average value over some region Vo ~ V, con-
taining the point xo. This is certainly justified in the the limit for
the case of integrably bounded regionalised variables which are
also continuous (see [7] for further details).
To estimate Yo, consider a weighted average of the data,
N
y; = L ,xiW(Xi)'
i=l
Let the random function corresponding to Yo be denoted by Yo.
This defines a corresponding estimator Yo* = I:[:l ,xiW (Xi) for
Yo from the set of random variables {W(Xi) : i = 1,2" .. , N}.
The weights ,xi are to be estimated so that the estimator is
unbiased, and minimises the variance E D 2(Yo*, Yo )2, with con-
straints ,xi 2: O. The unbiasedness of Yo* means that E(Yo*) =
E(Yo) = E(W(x)), and this determines the equality constraint
I:[:l ,xi = 1. The quantity to be minimised is
E D 2(Yo*, YO )2 = E((Yo*- ~ Yo-)2 + (Yo*m - Yom )2 + (Yo*+ - YO+)2).
415
N
- 2 L Ai(C-(zi, YO) + Cm(Zi, Yo) + C+(Zi, Vo))
i=1
+ C-(Vo, Yo) + Cm(VO' YO) + C+(VO, YO),
where the various symbols C(Zi, Yo), C(Vo, Yo), etc., involve in-
tegrals of the covariance functions C-, cm, C+ over the volume
Vo ([6]). It is worth emphasising that without the condition for
non-negative weights, the above equation has no meaning.
To minimise this variance, introduce a Lagrange multiplier J.t for
the equality constraint, and Kuhn-Tucker multipliers L I , . .. ,LN
corresponding to inequality constraints Al ~ 0, ... ,AN ~ O.
Theorem [6]. Let Yo* = ~~I AiW(zi) be an estimator as above.
Suppose the matrix
rij = C-(Zi - Zj) + cm(Zi - Zj) + C+(Zi - Zj), i,i = 1, ... ,N,
is strictly positive definite. Then there exists a unique linear un-
biased P-valued estimator minimising the variance. The weights
satisfy the system
N
L rijAi - Lj - J.t = L Cf3(zj, V), i = 1, ... , N ,
i=1 (3E:J
N N
L Ai = 1, L: Li Ai = 0, Li, Ai ~ 0,
i=1 i=1
with residual
(1"2 = J.t + C-(V, V) + Cm(V, V) + C+(V, V)
N
- L: Ai (C-(Zi, V) + Cm(Zi, V) + C+(Zi, V)) .
i=1
The proof proceeds from the projection theorem, with metric the
expectation of the Lrdistance of T-valued random variables. Fur-
ther details can be found in [6].
416
REFERENCES
1. A. Bardossy, 1. Bogardi and W.E. Kelly, Imprecise (fuzzy) information
in geostatistics, Mathematical Geology 20 (1988), 287-311.
2. A. Celmins, Least squares model fitting to fuzzy vector data, Fuzzy Sets
and Systems 22 (1987), 245-269.
3. A. Celmins, Multidimensional least-squares fitting of fuzzy models, Math!.
Modelling 9 (1987), 669-690.
4. P. Diamond, Fuzzy least squares, Information Sciences 46 (1988),
141-157.
5. P. Diamond, Least squares fitting of several fuzzy variables, Analy-
sis of Fuzzy Information, J.C. Bezdek (ed.), CRC Press, Tokyo, 1987,
pp. 329-331.
6. P. Diamond, Fuzzy Kriging, Fuzzy Sets and Systems 33 (1989), 315-332.
7. P. Diamond and P. Kloeden, Metric spaces of fuzzy sets, Fuzzy Sets and
Systems 35 (1990), 241-249.
8. B. Heshmaty and A. Kandel, Fuzzy linear regression and its applica-
tions to forecasting in uncertain environment, Fuzzy Sets and Systems
15 (1985), 159-191.
9. A. Kaufman and M. M. Gupta, Introduction to Fuzzy Arithmetic, Van
Nostrand Reinhold, New York, 1985.
10. E. P. Klement, M. L. Puri and D. A. Ralescu, Limit theorems for fuzzy
random variables, Proc. R. Soc. Lond. A 407 (1986), 171-182.
11. R.E. Moore, Methods and Applications of Interval Analysis, SIAM,
Philadelphia, 1979.
12. M. L. Puri and D. A. Ralescu, Fuzzy random variables, J. Math. Anal.
Applns. 114 (1986), 409-422.
13. H. Tanaka, S. Uejima and K. Asai, Fuzzy linear regression model, IEEE
Trans. Systems man Cybernet. 10 (1980), 2933-2938.
14. H. Tanaka, S. Uejima and K. Asai, Linear regression analysis with fuzzy
model, IEEE Systems man Cybernet. 12 (1982), 903-907.
15. R.R. Yager, Fuzzy prediction based on regression models, Information Sci-
ences 26 (1982), 45-63.
INFORMATION-PRESERVING PROBABILITY-
POSSIBILITY TRANSFORMATIONS:
Recent Developments
1. INTRODUCTION
Decision-making
situation
Probabilistic T
formalization
p=( P1 •P2 • •••• Pn )
n
H(p) = - 1: Pi log2 Pi' (1)
i =1
In possibility theory, two types of uncertainty coexist, which are referred
to as nonspecijicity and strife; their measures are expressed by the formulas
n
N(p) =E (ri - ri + 1) log2 i, (2)
i=2
S(r) =
n
= N(r) - E (ri - ri + 1) log2 E rj (3)
i=2 j=1
respectively, where rn+1 =0 by convention [17]. Total possibilistic
uncertainty, NS, is defined as the sum of the two uncertainty types:
transfonnations based upon them are in general not unique [14,21]. This
flexibility is not necessarily a disadvantage since it allows us to employ
additional requirements. We may require, for example, that the degree of
probability-possibility consistency, c, expressed by the fonnula
n
C =E Pi e ri
(7)
i .1
a
Eg.!: r.- (Pi)
-
I Pl
Pi
Eg.JI::
,
f
H(p)
I
I
. N(r) + S(r)
I
a.
1/0. rj
rj
Pi ..
Eg.JlI:
I/
k.. '
1/
k a.
1.0 r----.....---,--~-~--~-~-___..._-___r--,...__-__.___-_,
0.8
0.6
0.4
0.2
2 10 20
n
n ~¢¢o¢o <> 0 0 0 0
20 o:xxx><>oooooo <> 0 0 0
00000(>0 0 0 0 0
00 <> <> 0 0
10 000 0 0 0
00 0 0
0 0 0 0
0 0 0
2 0
o 0.5 1.0
Pi (8)
r·=_,
1 PI
ri
Pi=------ (9)
r l + r 2 + ... + r n
(11)
which were proposed by Dubois and Prade [4,5]. The third type of
transfonnations, which were proposed by Dubois, Prade, and Sandri [7],
are asymmetric transfonnations. For r ~ p, they are defined by Eq. (11);
for p ~ r, they are defined by the fonnula
n
ri =E Pj'
(12)
j == i
0.8
0.6
0.4 r -. p
0.2
0.0
t
~ -0.2
-0.4
-0.6
p .... r
-0.8
-1.0
-1.2
-1.4
2 4 8 16 32 64 128 256
n •
Figure 5. Gain of unsupported (biasing) infonnation or loss of real
infonnation by the various probability-possibility transformations.
4. CONCLUSIONS
The motivation to study probability-possibility transfonnations has
arisen not only from our desire to comprehend the relationship between the
two theories of uncertainty, but also from some practical problems.
Examples of these problems are: constructing a membership grade
function of a fuzzy set from statistical data [1, 2, 6], constructing a
probability measure from a given possibility measure in the context of
decision making or systems modelling [24, 25], combining probabilistic
and possibilistic infonnation in expert systems [9, 16], or transfonning
probabilities to possibilities to reduce computational complexity.
As argued by Klir and PaIViz [21], probability theory and
possibility theory are complementary theories of uncertainty, neither of
. which is weaker or stronger than the other one. According to this view,
any transfonnations that do not preseIVe infonnation are ill-conceived.
This conclusion is reinforced by extensive experimental results, which
show consistently that second-order properties of given distributions are
best preseIVed under the infonnation-preselVing transfonnations.
Infonnation-preselVing transfonnations between probabilities and
possibilities are well developed for 10g-inteIVal scales. Although these
transfonnations are theoretically sound as well as computationally
convenient, they seem to be unnecessarily rigid. Much greater flexibility
would be obtained by allowing ordinal scales. At this time, however,
ordinal-scale transfonnations that preseIVe infonnation are not sufficiently
developed.
The principle of infonnation preseIVation, also referred to as
principle of uncertainty invariance, is not restricted to probability-
possibility transfonnations. It can be applied to transfonnations between
other uncertainty theories as well [14, 16]. If not applicable, it may be
replaced with a weaker principle of minimal infonnation loss [12].
We should mention that the analysis leading to the results
regarding infonnation-preselVing probability-possibility transfonnations,
which are summarized in Sec. 2, has not been published as yet, but it
almost completely mirrors the analysis presented in Ref. [9]. The two
analyses differ in one of the components of total possibilistic uncertainty.
Instead of strife, the published analysis involves an uncertainty measure
427
referred to as discord [22]. Since strife is now better justified than discord
as the appropriate measure of uncertainty [18], we employ it in this paper
to formulate the information-preserving transformations. Possibilistic
discord is analyzed in great detail in Ref. [8]; our more recent analysis of
possibilistic strife revealed that both functions are bounded from above by
the same value and that they have exactly the same maxima for various
values of n (Fig. 3), but the maxima are obtained for slightly different
possibility distributions (Fig. 4).
REFERENCES
1. Bharathi-Devi, B. and V.V.S. Sarma, "Estimation of fuzzy
memberships from histograms." Information Sciences, 35, No.1, 1985,
pp.35-59.
2. Civanlar, M.R. and H.I. Trussell, "Constructing membership functions
using statistical data." Fuzzy Sets and Systems, 18, No.1, 1986, pp. 1-
13.
3. Delgado, M. and S. Moral, "On the concept of possibility-probability
consistency." Fuzzy Sets and Systems, 21, No.3, 1987, pp. 311-318.
4. Dubois, D. and H. Prade, Possibility Theory. Plenum Press, New York,
1988.
5. Dubois, D. and H. Prade, "Unfair coins and necessity measures:
towards a possibilistic interpretation of histograms." Fuzzy Sets and
Systems, 10, No.1, 1983, pp. 15-20.
6. Dubois, D. and H. Prade, "Fuzzy sets and statistical data." European J.
of Operations Research, 25, 1986, pp. 345-356.
7. Dubois, D., H. Prade, and S. Sandri, "On possibility/probability
transformations." Proc.IFSA '91 (Mathematics), 1991, pp. 50-53.
8. Geer, J.F. and G.J. Klir, "Discord in possibility theory." Intern. J. of
General Systems, 19, No.2, 1991, pp. 119-132.
9. Geer, J.F. and G.J. Klir, "A mathematical analysis of information-
preserving transformations between probabilistic and possibilistic
formulations of uncertainty." Int. J. of General Systems, 20, No.2,
1992, pp. 143-176.
10. Henkind, S.I. and M.C. Harrison, "An analysis of four uncertainty
calculi." IEEE Trans. on Systems, Man, and Cybernetics, 18, No.5,
1988, pp. 700-714.
11. Horvitz, E.J., D.E. Heckerman, and C.P. Langlotz, "A framework for
comparing alternative formalisms for plausible reasoning." Proc. Fifth
National Conf. on Artificial Intelligence, Philadelphia, 1986, pp. 210-
214.
12. Joslyn, C. and G.J. Klir, "Minimal information loss possibilistic
428
1. INTRODUCTION
Statistics is concerned with the making of decisions or inferences about a popula-
tion, on the basis of the information supplied by the performance of some random
experiment associated with that population. Statistics is closely related to uncer-
tainty. since one cannot usually guarantee that the making of decisions or inferences
is developed under absolutely certain conditions and leads to absolutely certain
conclusions.
Types and sources of uncertainty cannot be described in a unique way. Thus.
some common types of uncertainty are randomness and fuzziness, and some common
sources of uncertainty are experimental errors, lack of information, imprecise data
reports, uncertain meaning, and others.
Among the approaches to model uncertainty, Probability Theory and Fuzzy Set
Theory have become the most used ones, and since fuzzy sets were introduced by
Zadeh several authors have studied different connections between both theories.
Maybe, the most controversial connection is that stating that membership
functions characterizing fuzzy sets can be regarded as an "imitation" of probability
distributions. In that way, Lindley (1982,1987) claimed that "... only probability is
a sensible description of uncertainty ...". Criticisms about Lindley's claim have
been presented based on different arguments, from Generalized Information Theory to
Statistics (see Goodman & Nguyen, 1985, Zadeh, 1986, Nguyen, 1987, Klir, 1989,
Goodmanet al., 1991, Maggi, 1991, Weber, 1991, and others).
429
R. Lowen and M. Roubens (eds.), Fuzzy Logic, 429-439.
© 1993 Kluwer Academic Publishers.
430
A..lgnmenlof
the""", EXACTNESS
d.lbutlan
prior
distribution if ~
Spec'lcatlon
lhepor..._
of
or."lItofnlture
I I
RANDOMNESS I
parameter
value 9
or atate ,
A_gnmentof
Pe CJ) x
expoflmental Numeric'"
Quantlftcatlon
dlatrlbutlon
experimental . . • experimental L.- ....... variable
distribution outcome value
EXACTNESS I RANDOMNESS I EXACTNESS
x
exact
•I1-___I~=..
YES (or NOT)
answer to
~
datum occunence
EXACTNESS EXACTNESS
and so on. On the other hand, the quantification process in the random variable can
associate with each experimental outcome an imprecise value like « a 41~ 'WIAfP.
41a£ue. », or « a tTTVX£eN:tte 41aRae )), or others. In a similar way, the observer can report
the exact variable value through imprecise ones. Finally, the definition of events of
interest associated with the random experiment can involve imprecision, in the sense
that one cannot answer YES or NOT to their occurrence based on exact observer
reports, but rather one prefers to supply the "degree" of occurrence of those events.
Obviously, the four situations we have described can arise combined in the same
problem. Furthermore, fuzziness can be involved in getting the parameter value or
state and/or the experimental outcomes, although this last fact does not affect the
development and application of Probability Theory, since those elements are not
necessarily assumed to be real values or exact outputs.
c.o ~~:::::::;:-:::;:-::=:::::::::::::::::':::i~~j
NOT
(excepting when
:> fuzzy datum =
incomplete-nonfuzzy
datum)
(RRnDOmnESS??)
On the basis of the discussion we have just presented, we are now going to
develop that corresponding to the assignment of (prior and experimental) probability
distributions.
The assignment of probabilities could be accomplished in accordance with either
an objective or a subjective approach, and the discussion about the meaning of fuzzy
probabilities will depend on the considered approach. Thus,
if 0 < x $; 2.5
if lO < x $; 15
if 2.5 < x $; lO
otherwise
437
what means a definitively conversome expression that is much harder to get than that
for the "fuzzy addition". On the other hand, under the assumed independence of the
438
involved variables, the membership function of the fuzzy number (.9l. + 13) + (.9l. + C)
does not coincide with the one-point coverage function of the random interval
(I.9l.+113)+(I.9l.+ I C)·
5. CONCLUDING REMARKS
Randomness and fuzziness are indeed two different types of uncertainty. Randomness
means the uncertainty associated with occurrence of well-defined elements. Fuzziness
means the uncertainty associated with the definition of ill-defined elements. Random-
ness and fuzziness can arise combined in some problems.
In particular, when fuzziness arises in elements of a random experiment, then
fuzziness can only mean a special kind of randomness if it is involved in imprecise
observer reports or in imprecise objective assignments of (prior or experimental)
distributions. Anyway, if there are evidences about the random nature of that
imprecision, then we have to use random sets to model imprecise elements.
However, if there are no evidences about random imprecision, but there are evidences
of an underlying fuzziness, then it is advisable using fuzzy sets to model imprecise
elements, since there are not real advantages in treating fuzzy sets as random ones.
REFERENCES
1. Gil, M.A. (1992a). A note on the connection between fuzzy numbers and random
intervals, Statist. Probab. Lett., 13,311-319.
2. Gil, M.A. (1992b). Statistical management of fuzzy elements in random
experiments. Part 1: a discussion on treating fuzziness as a kind of randomness,
Inform Sciences (to appear).
4. Goodman, I.R and Nguyen, H.T. (1985). Uncertainty Models for Knowledge
Based Systems. North-Holland, Amsterdam.
5. Goodman, I., Nguyen, H.T. and Rogers, G.S. (1991). On the scoring approach to
admissibility of uncertainty measures in expert systems, J. Math. Anal. Appl. ,
16,550-594.
439
Leonid Kitainik
Computing Center of the Russian Acad. Sci.,
Vavilova 40, 117333 Moscow
e-mail: kitainik@sms.ccas.msk.su
Abstract
I, <x=Ov(3=1 a, (<X,13)=(1,0)
<x~(3= <x~(3=
{ 0, otherwise {1, otherwise
(iv) With any ~3(Dt&C-,), ~EI, both a~O, and 1~ belong to ~(t) •
1' <x::>{J
a~(3= { *
(3 , otherwise
Proof (an outline), (i) Set J=~ (t ), We will prove that t is uniquely
determined by J, and that any JE(l; determines at-norm t- 1 (J)E1l(D),
k k
Combining reflexivity of with D , we derive <X~(X =(a~) =1; hence,
~
t
by definition of~, (If k) (If }'E[O, l[) (<x/\}'::>a k ). It follows that a 2::>a/\}'::>a 3 ;
t t
2 3 2
hence, <x =<x , and (If }'E[<x,1[) (a/\}'=a l. Therefore, the following assertions
t
446
(1) (V k>1)(a
k
=oh;
(2) a2E~(t);
2
(3) t can be reconstructed from the function a :
aA~=(aA~)A(av~)=(aA~)2.
t t
If
2
a <a, then, for each ~E[a
2
,a], ~
224
E[a ,a ]=~a
2
r, so that
a2 2 a] =const.
[<x, Th ere f ore, f or each ArchO1med ean e I ement <x, a 2= (a 2)2 1S
.
1
2
the closest to the bottom non-Archimedean element. In other words, a =a*,
Now, let us calculate a~~. Since, for all residuated t-norms, a$~
is already proved, 'I 2=13 2$~. It follows that a~~<:(3 *. In case when '1>(3 , *
there exist two possibilities. If 13=~*, then ~=inf~l~,l]n~(t)r; it follows
that some I1El~,'Il also belongs to ~(t), so that 'I 2<:T) 2 =T»~ *=~. If 13<f3, *
then [f3 *,'I]n~(t)~0, .
so that 11 can be selected 1n the latter intersection,
'I2$~; it follows that a~f3$f3*, which, together with thee already proved
a~f3<:13 *, yields a~f3=~ *.
Since J=~(t) is obviously upper closed for any t-norm, we proved that L
aA(3, aV~=l
L' (J) (a,I3)=
{ (aA~)*, otherwise
The only thing needed to prove is that L' (J) is a t-norm, and that
~ ( L' (J) )=J. Commutativi ty and properties of 0, and 1 are straightfon~ard
a,#EJy 2 ,y[, a>#. Then a~#=# *>y>a>#, and aAa~#=a>~, so that ~ does not
t
satisfy frlP " The min-norm A obviously satisfies frlPA (aAa~~=aA#~~).
t
Proof, (i) Let a*=inf~ak~. Let us prove that a*=O for all aEI O' Indeed,
2
let us assume that a>O, and a*>O. Since t is Archimedean, a*<a*, On the
Proof. Let us suppose that, for some a;tO, 1#1, (X~f3>O. Since t is lower
semi-continuous in (l,ll, sup(a 2 )=1. (fi,ing to D , y2~f3 implies
t
2
(a~y\ =a~y ~a~p>O,
2 Q
so that ..,
a~Y~~2(t), which is in contradiction with
Proposition 2 (ii\. So, a~f3=O for all a;tO, f3;t1. Once more referring to
Proposition 2 (ii), we find (VaEI\((a~O=O)&(l~=O)\, so that ~=~.
1
Continuous t-norms of this class are equivalent to Lukasiewicz' norm -
see, for instance, [15]
450
(ii) reflexivity+transitivity.
References
18. 1'1. Wygralak, Fuzzy Inclusion and Fuzzy Equality of THo Fuzzy Subsets,
Fuzzy Operations for Fuzzy Subsets, Fuzzy Sets and Systems, Vol. 10
(1983), pp. 157-168.
ABSTRACT
The paper addresses the issue of robust computations realized in the framework
of fuzzy sets. First we will refer to some qualitative claims made with this respect in
the existing literature and provide some formal definitions leading to a quantitative
characterization of robustness. The robustness is discussed in terms of a standard
frame of cognition (fl:zzy partition) and static transformations. Comparisons are
made with respect to the corresponding results produced in presence of Boolean
(two-valued) partitions. Numerical examples reveal consistently higher robustness
supplied by fuzzy sets as opposed to that provided by sets.
1. INTRODUCTION
In this section we will start with the simplest structure in which a single
variable is involved along with one -or several linguistic labels associated with it.
The labels constitute a so-called frame of cognitive perspective, see e.g. [3]. Their
role is to complete partition of the space in which the variable is defined into a
certain number of entities (aggregates). Each of them conveys clear semantics. For
instance, in a space of error variable in fuzzy controller we can distinguish several
terms (linguistic labels) of error such as small negative, negative medium. around
zero. positive small, ... etc. They are afterwards utilized to constitute a structure in
which the overall conttol problem is perceived and represented.
We will also refer to these linguistic labels as forming a fuzzy partition of the
universe of discourse. On the other hand, any Boolean partition of the universe is
formed by sets.
1
Starting from a single linguistic label (i.e. fuzzy set) A let x E X be an exact
pointwise input information available to the system. Then A(x) can be viewed as a
degree to which x has activated (matched) A. Now let us consider a noise-biased
version of x in which noise or imprecision E shifts x into a new biased value, say
x + E. In sequel it causes that A becomes activated at a new level, say A(X+E). Our
intent is to minimize (suppress) the impact of the noise on the derived grade of
membership. This calls for a minimization of a difference (or generally any distance
function) between A(X+E) and A(x). In other words we would like to form a
situation in which A is not sensitive to noises. Despite their occurence the degree of
activation of the linguistic label A should remain fairly the same and close to zero.
Bearing this in mind an obvious measure of sensitivity can be introduced as a
distance function p between the grades of membership A(x) and A(x+£). Denote this
quantity by s(x, E)
=
s(x, E) p(A(x), A(x + £» (I)
If for a certain x, A(X+E) and A(x) are similar this indicates that A is not sensitive to
noises at this point of the universe of discourse. The fIrst argument of (I) is used to
highlight its local character. It directly refers to a certain element of the universe of
discourse as well as the properties of noises. Further analysis of (I) can lead to the
following general fmdings:
(i) the more "fuzzy" A, the lower the sensitivity. A transitional character of
changes of the grades of membership can cope with disturbances by lowering the
values of s(x, E). As we can observe a transom part of the fuzzy set A [5] starts to
playa primordial role in this context.
(ii) sets exhibit zero values of s(x, E) for some values of x. This occurs mainly for
x's being situated relatively far from the ends of the support of A. At the borders of
the support, however, the obtained values of sensitivity attain maximum and are
equal to 1. In this way in some regions of X the sensitivity property attains values
equal to I,
s(x, E) = I
The global measure of robustness has a complementary character to the measure of
IPor clarity of presentation we will assume that A has a continuous membership function
defmed inX.
455
senslUvlty. Let us assume that the universe of discourse in which A is defined has a
finite cardinality, card (X)<+oo. The measure of robustness rA(e) is thus defmed as
rA(e) = card(X) - s(e)
card(X)
where s(e) is averaged over X. s(e) = L
s(x, e)
x
Note that s(x, e) E [0,1] so that rie) E [0,1]. The higher the value ofrA(e) the
higher the robustness of A.
s(e) =L s(x, e)
x
It is also evident that, bearing in mind a stochastic character of noise e, the measures
of robustness for a single fuzzy set as well as the fuzzy partition are random
variables. One can then compute expected values E( in order to derive representative
0
)
Example 1
to
/
///
\
.8
\\ I
/
I
\ /
.\
~ .6
i
'"
.4
/1 \\
\
.2
/ \
\"
0
1 2 3 4
"""""--- 5
lC
The results of experiments (40 repetitions) for several standard deviations of noise E
for the fuzzy and the Boolean partition are visualized in Fig. 2 (the distance function
is specified as the Hamming one).
.8
\
I J \ a
~
fullY parUlic:n
I
.6 .... - D
,- .. paltiticn
Bod~an
J
.4
I
I J \
r
I \
.'2 1
0
1 '2 3 5
x
457
10 r----------.,..-------,
b
.8
.6
.4
.2 1 ' - - - - - - - - ·
2 3 4 5
x
17,------;:====::::;-1 .-. -t funy partitm c
.. - -0 BOOean parlitial
•~
13
..
0
0
'2 3 4 5
J(
Fig. 2. s(x) for fuzzy and Boolean partition for selected standard deviation
of noise (a) (1=0.25 (b) (1=1.0 (c) (1=3.0.
It is obvious that in all the cases the Boolean partition yields higher values of
sensitivity measure. For (1=1 the resulting histograms of s(x) show this property
even more transparently, see Fig. 3.
50
a
40
39
ItL 20
10
0
nrJln Inn
0 .5 \0 15 2.0
458
25 , - - - - - - - - - - - - - - - - ,
b
20
15
10
.5 10
nn 15 2.0
Fig. 3. Histogram of values s(x) for fuzzy (a) and Boolean (b) partition
For the same cognitive perspective and a uniform noise distribution (a random
variable with a uniform distribution over [0, 1]; note that this noise implies a
systematic error equal to 1/2) the results are summarized in Fig. 4.
20
15
n t
~ BOOLEAN PARTITI
( I
r
I J I
~ ; t
10 I f I
I I
1 FUZZY PAATITION
\
.5
0
1 2 3 4 5
Example 2
The fuzzy model constructed now uses an architecture of the Cerebellum Model
Articulation Controller (CMAC), see [1], refer also to [2] regarding the interpretation
of the CMAC in the context of fuzzy modelling and fuzzy controllers.
For illustrative purposes we will concentrate on a single-input single-output
model. The architecture of the fuzzy model can be specified accordingly:
(i) the input variable is partitioned into several linguistic labels say AI' ~, ...Ae'
Input data (which might be numerical or, non-numerical) are transformed into the
corresponding levels of activation of A;.s. Denote this vector of activations by
x.
(ii) The transformation of x to the output variable is carried out by a relational
structure, namely
z=xoR ~
where "0" denotes a standard Sot composition, cf. [4], Chapter 5.
(iii) At last the grades of membership z are re-transformed into a scalar quantity
representing the numerical output of the fuzzy model. This is accomplished
accordingly
- -
y = ZlYl + Z2yZ + zpYP (7)
Zl + Z2 + Zp
where Yl, Y2 and yp are selected numerical values defined in the space of the output
variable of the model.
Assuming that yj's are specified in advance, the relational structure has to be
determined by computing the fuzzy relation R. The supervised learning is based on a
460
10
!
t'
/
.8
6
I
/
4 /
0
0 2 4 8 10
The data set and the results produced by the obtained relational structure (based on the
fuzzy partition) are summarized in Fig. 6.
8r------------------.
•
2 0~---::::2----:-4---6:----------l10
x
Fig. 6. Data set and results of the relational structure
461
Again as one could have noticed the fuzzy partition plays a profound stabilizing role
in the computations.
4. CONCLUSIONS
ACKNOWLEDGEMENT
Support from the Natural Sciences and Engineering Research Council of Canada
is gratefully appreciated.
462
20
a
..'Iota
~oo~n~~
Qf -. 4
15 I, +
I.'I ~
10 "
'\ I,
I. +
I I 'I
),
.5 I~
,\ '\
fuzzy partitiCl1 J, 1.
etal Qfcr-0074
LJ ;L
2 4 8 to
output
4r------------------,
b
3 +
Bcdear, partltiCl1
\ total Qfcr- 1868
"
2 'I
/Ij 1
If '\
),
I I
~ ~ t \
fl.!ZZY partiti~ 'I t) ~
total errcr-u373.\ , I \
I +
-~
4 6 8 10
o'Jtput
5. REFERENCES
1. J .A. Albus, "A new approach to manipulator control: The Cerebellar Model
Articulation Controller (CMAC)",Trans. of the ASME, 9, 1975,220-227.
2. K. Hirota, W. Pedrycz, "Logic based neural networks", Information Sciences,
submitted.
3. W. Pedrycz, "Fuzzy set framework for development of a perception perspective",
Fuzzy Sets and Systems, 37, 1990, pp. 123-137.
4. W. Pedrycz, "Fuzzy Control and Fuzzy Systems", 2nd edition, Research Studies
Pressfl. Wiley, Taunton, New York, 1992.
5. E. Roventa, "On the degree of fuzziness of a fuzzy set", Fuzzy Sets and
Systems~ Vol. 36, 1990, pp. 259-264.
ENGINEERING
A Self-Tuning Method of Fuzzy Inference Rules
by Descent Method
Hiroyoshi Nomura, Isao Hayashi, Noboru Wakami
Central Research Laboratories
Matsushita Electric Industrial Co., Ltd.
3-15, Yagumo-Nakamachi, Moriguchi, Osaka, 570 JAPAN
Abstract
In this paper, we propose a self-tuning method of fuzzy inference rules
by a descent method. From input-output data, the inference rules ex-
pressing the input-output relation of the data are obtained automatically
using the proposed method. The membership functions in antecedent
parts and the real numbers in consequent parts of inference rules are
tuned by means of the descent method. The learning speed and the
generalization capability of this method are higher than those of a con-
ventional backpropagation type neural network. In order to demonstrate
these advantages over the conventional neural network, some numerical
examples, an application to a mobile robot that avoids a moving obstacle
and its computer simulation are reported.
INTRODUCTION
In order to provide fuzzy reasoning with learning function, works are being
carried out to combine a fuzzy reasoning and a neural network. Under these
efforts, the neural network driven fuzzy reasoning[l], the self-tuning method by
Bopfield neural network[2] etc. had been proposed. But, these methods don't
have a sufficient generalization capability and high speed learning capability.
For the purpose of solving such tuning problem, we propose a new self-tuning
method offuzzy inference rules using a descent method[3, 4].
In this self-tuning method, triangular formed membership functions of the
antecedent part and a real number of the consequent part are assumed. The
center value and the width of the triangular membership function and a real
number of consequent part are tuned by means of the descent method[5].
The learning speed of this method are higher than that of a conventional
backpropagation type neural network[6] since only the inference rules matched
input data are tuned. Furthermore, unlike the case of neural network, this
method has a capability to express the knowledge acquired from input-output
data in terms of fuzzy inference rules.
465
R. Lowen and M. Roubens (eds.), Fuzzy Logic, 465-475.
© 1993 Kluwer Academic Publishers.
466
Aij
1.0···························
0.01--~=
In this paper, the algorithm of the proposed method is explained first, and
its high speed learning capability is explained next by referring some numeri-
cal examples. Then, in order to demonstrate its generalization capability, an
application to a mobile robot which is capable of avoiding a moving obstacle is
reported.
When the input are expressed by Xl, X2, ... ,X m , and the output is expressed
by y, the inference rule of simplified fuzzy reasoning[7] can be expressed by the
following.
Rule i:
If Xl is Ail and ... and Xm is Aim then y is Wi. (i = 1, ... , n)
where i is the rule number, A ij , (j = 1, ... , m) are the membership functions
of the antecedent part, and Wi is a real number of the consequent part.
The membership function Aij of the antecedent part is expressed by an
isoscales triangle shown in Figure 1. The parameters determining the shape of
membership function are the center value aij and the width bij. The member-
ship value is derived by the following formula.
(1)
Output Layer
Hidden Layer
Input Layer
2:JLi' Wi
i=l
Y = ':='=n-- (3)
Algorithm of Self-Tuning
A descent method[5] is to search for the vector Z which minimizes an ob-
jective function E( Z), where Z is a p-dimensional vector of the tuning param-
eters, (Zl, Z2, •.. , zp). In the descent method, the learning rule for searching is
expressed by the following formula.
aE(Z)
Zi(t + 1) = z;(t) - K----a;:- (i = 1, ... ,p) (4)
(5)
where yr is the desirable output. The objective function E means the inference
error between the desirable output yr and the output of fuzzy reasoning y. By
substituting Eqs. 2 and 3 into Eq. 5, the objective function E can be expressed
by the following.
(6)
Since the shape of membership function A;j is defined by the center value aij
and the width bij , the objective function E consists of the tuning parameters
aij, bij , and Wi. Therefore, when the vector Z is defined as the follows, this self-
tuning method of fuzzy reasoning can be an application of the descent method,
(7)
where p = 2nm+ n
Using Eq. 4, the learning rules of simplified fuzzy reasoning are expressed
by the following formulas.
aE
a;j(t + 1) = a;j(t) - K a aa;j (8)
aE
b;j(t + 1) = b;j(t) - Kb ab (9)
ij
469
Wi(t + 1) = Wi(t) - K w -
aE (10)
aWi
Eqs. 8 to 10 show respective (t + l)th values of tuning parameters. Ka,Kb and
K w are constants. By substituting Eqs. 1 '" 3 into Eqs. 8 '" 10, the learning
rules of the simplified fuzzy reasoning can be expressed by Eqs. 11 to 13 shown
below.
Pi r 2.sgn(Xj- aij(t))
aij(t+1)=aij(t)-KaLP/Y-Y)(Wi(t)-y) Aij(Xj)bij(t) (11)
fJ" 1-A.,(x·) 1
bij(t+1)=bij(t)-KbL~/y-yr)(wi(t)-Y) Aij(~j/ bij(t) (12)
Procedure of Self-Tuning
A typical iterative learning procedure is shown in the following.
[Step 7] The inference error E(t) is calculated from Eq. 14, and [Step 3] to
[Step 6] are repeated until its change I E(t) - E(t - 1) I is less than a
threshold value.
(14)
NUMERICAL EXAMPLES
the higher capability of this method to express the input-output relation, and
the number of iteration for learning are substantially less than those obtained
by neural network also. In another word, this means the learning of proposed
method can be executed in substantially shorter period.
Precondition shown below for this obstacle avoiding problem are assumed
472
Target
Point
(a) (b)
3. Tuning of fuzzy inference rules is performed by using [Step 3]...... [Step 7].
In this case, the number of iteration for learning is set at 10.
CONCLUSION
(a) (b)
I, '
(c) (d)
I I
(e)
REFERENCES
INTRODUCTION
of the boolean classical ones. Finally, the application of appropriate fuzzy logical
operators, related to the classical ones, allows to obtain low and medium level
desired results. Gray-tone and real images, either continuous and sparse, have been
used to check the consistency and the performances of the method here proposed.
The program codes have been implemented in FORTRAN 77 on a SUN-
4/110, and integrated as context, named MMFUZZY [14], in the open MIDAS [15]
environment for image analysis and processing.
where "C" represents the complement of a set, and where SEx is the translation of
SE on I, by mapping its own "central pixel" on the image pixel "x". The
transformation obtained by applying a morphological operator on an image is
strictly dependent on the geometry and topology of the structuring element, and on
the definition of its "central pixel". Fig.l shows the results of erosion, dilation,
opening, and closing on a binary image, via a flat square binary structuring element
3x3, with central pixel in position (2,2). Erosion and dilation reduce and enlarge the
input image, respectively (Fig. I-b,c); opening and closing smooth the image
contours from the inside and outside, respectively (Fig. I-d,e).
f
J1P a) b)
I 1fJd) e)
Fig.] - The four basic morphological operators applied via a 3x3
centred flat square structuring element; a) input image; b) erosion; c)
dilation; d) opening; e) closing.
Fuzzifiers
where min and max are the minimum and maximum values of the input
image I, and Iij is the intensity value of the input image at the pixel (i,j).
The use of norma-function performs a simple scaling of the image-values,
while S- and 1t- functions can select intensity bands, depending on the values of
ex,~, and "(.
Fig.2 shows the result of S- and 1t- fuzzifiers applied on a real astronomical
image in the optical range (Fig.2-a) with intensity values ranging from 36.25 to
1008.25 and with intensity distribution given in Fig.2-b. S-fuzzifier has been
applied with ex=300, ~=400, and "(=500; 1t-fuzzifier has been applied with "(=500,
and ~=200. Under these conditions, S-fuzzifier (Fig.2-c) cuts all values less than
300, reduces those in the range [300,400], and enhances the other ones, by setting
equal to I all the values greater than 500; 1t-fuzzifier (Fig.2-d) cuts the values greater
than 700 and less than 300, reduces those in the ranges [300,400] and [600,700], and
enhances the central part [400,600].
b)
.(.
~
1
-1000
t XlC·'
~II ,
-I
-" I
co
0
j
j
'-
zoo '100
,
&1J
'
P1xel value 01
,
)
630 1(00
~) d),
Defuzzifiers
Structuring element
The structuring element SE' is a fuzzy matrix of nxm elements, with a given
central pixel, and active elements values in the real range [0,1]. Moreover,
unconstrained structuring element can be defined by setting equal to -I all those
pixels not considered in the application of the morphological operators.
In the case of fuzzy mathematical operators, the properties found for the
classical ones are transformed as follows, where 1'. and I'z are two fuzzy input
images, and where SE'. and SE'z are two fuzzy structuring elements:
In the fuzzy framework, "fand" and "for" logical operators are naturally
defined by using "min" and "max", Here we introduce the definition of a new
logical operator, "fxor", that is an extension of the boolean exclusive "or":
where A' and B' are two fuzzy images of equal size.
Another fuzzy operator named "fxonned" has been defined; it considers the
two maximum differences, dl and d2, between corresponding pixels in the input and
processed fuzzy images inside a 3x3 window centred on the pixel (i,j), together with
the difference d(ij) computed on the corresponding pixels (i,j) we are dealing with:
During the last decade, methods based on the mathematical morphology have
been developed to simplify image data preserving their essential geometrical shape
and eliminating irrelevancies. Many researchers [2,3,4,16,17,18,19] were interested
in nonlinear morphological filters applied on binary and gray-tone images, in their
syntactic and statistical properties which are related to the corresponding properties
of the median-type filters, and in their behaviour in noisy conditions.
The basic morphological filters are erosion, dilation, opening, and closing,
that generally perform reduction, enlargement, smoothing from the inside, and
smoothing from the outside of an object, respectively. Furthermore, another
interesting class of such filters includes the open-closing (OC) and the close-opening
(CO) transformations, performed by closing an open image, and by opening a closed
one, respectively. These filters, so as single opening and closing, maintain the
geometrical dimension of the object to be analyzed.
We have applied all these morphological filters on continuous and sparse
images with the fuzzy extension described above, and with metrics chosen according
to the given conditions. Our approach falls within the class of non-linear filtering
techniques; moreover, it allows the easy processing of images in the real domain.
In Fig.3 we present an example of fuzzy morphological filtering performed
on the X-ray supernova remnant Thyco, detected by the EXOSAT satellite
experiment as a sparse image with real values (Fig.3-a). After fuzzification with the
norma-function, the fuzzy morphological filters close Cave(l' ,SE') and close-
opening COave(l' ,SEt) have been applied, (Fig.3-c,d), with a square flat structuring
element of size 3x3. The "average" metrics has been used to take into account the
sparse distribution of the data. The results show the ability of this morphological
filter to enhance the relevant signal region from the background, and to preserve the
inner finer structures of the object. Fig.3-b concerns the intensity plot along a line
of the two filtered images, as marked in Fig.3-c,d, and it shows how, although
close-opening performs a further smoothing of the image, the geometrical
dimension is still maintained.
According to the final aim one wants to reach, a morphological gradient can
be defined by applying a difference operator between two filtered images, or between
input and filtered images [3,4,16,20].
The difference operator we used to detect edges, in the case of fuzzy
mathematical morphology, is the "fxormed" one; for example, if applied between
input and eroded fuzzy images, "fxormed" operator allows to detect the internal
edges, while medium edges are detected if this operator is applied between dilated and
eroded fuzzy images.
FigA shows some results drawn out from a continuous gray-tone image
representing a plane in a cloudy sky (FigA-a). The original data was firstly fuzzified
via a norma-function; edge detection has been perfoflllcd by applying "fxormed"
logical operator between the fuzzified input image and its minimum-erosion (FigA-
c), and its minimum-dilation (FigA-d), computed with a square structuring element
3x3. The two differences respectively enhances internal and external borders and they
are compatible with the results obtained by applying a classical gradient filter on the
original image, as shown in FigA-b. We point out that the same results can be
obtained by using the "umbra" technique with "min" function.
484
~~
i
'Z
i'\. close
IS
\,
II \
)I '//'...\l·f,~Y\ ,
.',71 '\
close-openin
Fig.3 - X-ray Thyco image; a) input image; b) intensity plot of the two lines
marked in c) and d); c) result after application of the average close, and d)
average close-opening filtering.
CONCLUSIONS
Fig.4 - Plane test image; a) input; b) gradient filtering; c) internal border detected
as difference between input and eroded images; d) external border detected as
difference between input and dilated images.
486
REFERENCES
[1] J.Serra, Image Analysis and Mathematical Morphology ,Acad.Press, N.York, 1982.
[2] J.Serra, Image Analysis and Mathematical Morphology: Volume 2 , Academic
Press, New York, 1988.
[3] R.M. Haralick, S.R. Sternberg, and X. Zhuang, "Image Analysis using
Mathematical Morphology" ,IEEE Trans.PAMI ,Vol.9,No.4,pp.532-550,July 1987.
[4] S.R.Sternberg, "Grayscale Morphology", ComputYision Graphics Image Process.,
Vo1.35, pp.333-355, 1986.
[5] F.Y.-C. Shih and O.R. Mitchell, "Threshold Decomposition of Gray-Scale
Morphology into Binary Morphology", IEEE Trans. on PAMI , VoUl, No.1,
pp.31-42, 1989.
[6] P. Maragos and R.D. Ziff, "Threshold Superposition in Morphological Operators
for Gray-Tone Images", IEEE Trans. on PAMI , VoU2, No.5, pp.498-504, 1990.
[7] F.Y.-C. Shih and O.R. Mitchell, "Decomposition of Gray-Scale Morphological
Structuring Elements", Pattern Recognition, Vol.24, No.3, pp.195-203, 1991.
[8] L.Zadeh, "Fuzzy Sets", Information and Control, Vol.8, p.338-353, 1965.
[9] A.Kandel,Fuzzy Mathematical Techniques with Application, AddisonWesley, 1986.
[10] S.K.Pal and D.K.Dutta Majumder, Fuzzy Mathematical Approach to Pattern
Recognition, A Halseted Press Book, John Wiley & Sons, 1986.
[11] C.A. Murthy and S.K. Pal, "Fuzzy Thresholding: Mathematical Framework, Bound
Functions and Weighted Moving Average Technique", Pattern Recognition Letters,
11, pp.197-206, 1990.
[12] W. Pedrycz, "Fuzzy Sets in Pattern Recognition: Methodology and Methods",
Pattern Recognition, Vol.23, No.l/2, pp.121-146, 1990
[13] V. Di Gesu and M. Tripiciano, " Comparison of Morphological Operators for Gray-
Tone Images", Progress in Image Analysis and Processing, V. Cantoni,L.P.
CordelIa,S. Levialdi,G. Sanniti di Baja,(Eds.), World Publ. Corp., pp.59-64, 1990.
[14] V. Di Gesu, M.C. Maccarone, and M. Tripiciano, "MMFUZZY: Mathematical
Morphology based on Fuzzy Operators", Proc. IFSA '91 World Congress, R.
Lowen, M. Roubens, (Eds.), Vol. Engineering, pp.29-32, 1991.
[15] K. Banse, D. Ponz, Ch. Ounnas, P. Grosbol, and R. Warmels, "The MIDAS Image
Processing System", Instrumentation for Ground-Based Optical Astronomy, L.R.
Robinson, (Ed.), Springer-Verlag, New York, pp.431-442, 1988.
[16] I. Pitas and A.N. Venetsanopoulos, Nonlinear Digital Filters - Principles and
Applications, Kluwer Academic Pub!., 1990.
[17] I. Serra and L. Vincent, "An Overview of Morphological Filtering", Circuits
Systems Signal Process, VoUl, No.1, pp.47-108, 1992.
[18] I.-F. Rivest, P. Soille, and S. Beucher, "Morphological Gradients", Proc.
SPIEIIS&T's Symp. on Nonlinear Image Processing, San Jose, CA, Febr. 1992.
[19] L. Koskinen and J. Astola," Statistical Properties of Soft Morphological Filters",
Proc. SPJEIIS&T's Symposium on Nonlinear Image Processing, San Jose, CA,
Febr. 1992.
[20] D. Wang and J. Ronsin, "Comparison of Morphological Filters with Median-type
Filters", Proc. SPIEIIS&T's Symposium on Nonlinear Image Processing, San Jose,
CA, Febr. 1992.
[21] M.C. Maccarone and M. Tripiciano, "Image Analysis Context Development in ESO-
MIDAS Environment at the IFCAI/CNR, Palermo", ESO Conference and Workshop
Proceedings, PJ. Grosbol and R.H. Warmels, (Eds.), No.38, pp.89-93, 1991.
[22] M.C. Maccarone, M. Tripiciano, V. Di Gesu, and D. Tegolo, "PDB: A Pictorial Data
Base oriented to Data Analysis", Software Practice and Experience, (submitted),
1991.
STABILITY ANALYSIS OF FUZZY CONTROL SYSTEMS
BASED ON THE CONICITY CRITERION.
Abstract
The conicity criterion [11, [21 is applied to the general feedback system of
Fig. 1, where the controller 0(.) is a p x m nonlinear static function obtained from a
set of fuzzy rules, and G(s) is the m x p transfer function of the time invariant pro-
cess to be controlled. Notice that if the process to be controlled is non linear, then
we can maintain the linearized model in G(s) and include the nonlinear terms additi-
vely with 0(.).
According with the criterion, a sufficient condition for stability is that for
487
R. Lowen and M. Roubens (eds.;, Fuzzy Logic, 487-496.
© 1993 Kluwer Academic Publishers.
488
bOX>
y
pxl
0(x)
pxm
U UmX 1 ,---'-G(S-)
m-------'x
P P=O~
Fig. 1. The general feedback system.
some scalar r (called center) and for some p x m matriz C (called radius), the follo-
wing conditions bold:
This criterion gives rise, in the scalar case, to the well known Circle Crite-
rion, wbere the condition 1. means that the graph of y = 0(x) must lie inside the
conic sector of limiting slopes r ± C.
The first ant third conditions yield, respectively (see Fig. 2):
def 110(x)-Cxll
f c f 0 (C) = maXx;tO II x II
489
where rG(C) is the conic deviation of the fuzzy protocol y =0(x) from the linear law
y = Cx, and rG(C) is a measure of the robustness of the feedback linear system for-
med with G(s) and C.
The second condition limits the possible cones to the subset Sc' formed with
centers C that give rise to a stable linear feedback of G(s). In the boundary of Sc'
max ro "F(jro) " tends to infinite, and RG tends to zero.
From Fig. 2, an interpretation of the Conicity Criterion is that for some sta-
ble feedback C, the robustness rG(c) of G(s) with feedback C must be greater than the
conic deviation r0(C) of the fuzzy law y = 0(x) from the linear y = C x.
L-_-~-----------~--- .... C
dim n
where the linguistic tenns are based on fuzzy sets defined on the universe of the res-
pective variables. It is posible [3], [4] to compile the protocol rules to produce a
non-linear function 0(x). This function can be segmented into regions, each region
associated to a dominant rule i (Fig. 3). The conic deviation defined above has the
following contribution due to the Xi' Yi pair.
(i) II Yi - c \ II
f0 (C) = IIx.1I
1
with c = (cl' ~) and Xi =(xli' x2i) T. The global deviation of the set of fuzzy rules
is:
f
0
(c) =m~ { fg) (c) }
1
In the r-C space, this deviation is the polyhedrical surface of Fig. 4. where
each face is labelled with (or associated to) one of the fuzzy rules. The surface will
nonnally have a global minimun at some c*. To identify the critical fuzzy rules with
more influency on stability, we must compare the conic deviation surface r with
0
the linear feedback surface r a obtained from the plant G(s). These rules will normally
be the associated to one of the adjacents faces at the minimun r0(c*) (rules i, j, k ..
in Fig.4).
Simulation Examples
The results above are applied to the two-joint manipulator in [5]. The model
is strongly nonlinear, so that acomputed torque control is implemented. If the arm
parameters are well known, the computed torque method linearizes the model and
uncouples the two joints, so that the dynamics of each joint are transformed to a
closed loop such as that of Fig.l, where G(s)=(lls2,lIsl is a double integrator
(where the outputs are the angular position and velocity) and cI>( e) is a fuzzy gain
modifier controller (where the inputs are (eP' ev) the position and velocity errors, and
the output is the control torque). Consider the nonlinear control law cI>(e) ,obtained
from a set of fuzzy rules referred to the error ep and error derivative ev signals:
492
To ensure stability, fIrst we must select a central value c=;( c1,c2) for the gains
Kp,Kv' giving a constant stable feedback (that is, Cj,c2 >0). To use similar gain
values as in [4], we choose c=;(200,20). Then, we compute the robustness radius for
the plant with respect to the central feedback c, and obtain rG(200,20) "'" 15.
Finally, the stability condition rH < rG"" 15 implies that the fuzzy gains Kp,Kv
must lie, in the gain plane, inside a circle of center c=;(200,20) and radius rG""15:
The manipulator will normally work with ramp references, so that the critical
time instants will be the times of change of slope of the ramp reference. At these
instants, the velocity error ev is big, the value Kve v will be greater than Kpe p and
the control acceleration u will be possibly saturated. The more signifIcative gain is
K v' and will be adjusted from a set of fuzzy rules referred to the velocity error ev .
The position gain Kp will be kept at the constant value Kp =;200.
Finally, the responses after a positive and negative change of the reference
slope rv will be symmetrical. A way to reduce the number of rules, based on the sign
symmetry, is to use a normalized velocity error eb=;-e v·sign(,1rv)' where ,1rv is the
change of velocity reference. The control action will be:
The fuzzy design of the gain modifIer Kv=;(j)(eb) has been accomplished based
on the membership functions of Fig. 5, referred to the normalized velocity error eb
and to the velocity gain K v. The quantization of the fuzzy rules yields the velocity
gain Kv as a nonlinear function of the velocity error eb (see Fig.6).
avoiding high oscillations, the low limit for the admisible velocity gain is fixed at
K v =15.
NMG NM PN P
FN NG N MPN ,---
1.
If e is FN then k is P
b y
Ife is NG then k is G
b y
If e is N then k is LMG
b y
Ife is MPN then k is M
b y
PM G MG LMG
Ifebis NMGthenk is M
y
If e is NM then k is MG
b y
Ife is PN then k is MG
b y
If e is P then k is P
b y
The results of simulation are represented in the Fig.7. The linear gain setting
in Fig.7.a, whith a small velocity gain K v=15, gives big initial errors and an
494
36
34
32
30
28
26
24
22
20
18
-1 -0.8 -0.6 -0.4 .0.2 0.2 0.4
Velocity error
_::,-"J.cr=~:~-······:t·I",:,-;.;-+;~.::;"._.
1- p,{)sitiorl refer~nce (r 10.2$ rad)
-0.4 ......... ; . . . . j ,..,p , .
. 2- ppsitiory (x JP.25 rad)
-0.6 ....; .........................., , P , , .
, 3- Velocity (xviI rad{s) .
-0.8 ;.
···········..4~Aciuatibn . (ujiOrad),~2)···
-I 0"'"--:0.....0..,.5--0~.1--0~.1-5--0~.2:---0.,....~25:---0c:-'.3----,-0.~35--0.~4--0 ....
.4-5--'0.5
Time (Se<:)
"
0.8 \"
"
0.6 ';,... .
"
! .,. .
.. 0.225
. . --l~ .. : .. ·.·T:·:.:j···.·····..L
.......:
'" .-- ::f..~,~ : ; ..,. ":::;i;·· :.'~' _ ~ "' ~ , '''' n'
·0.2
~··-
9,0275 r,ad 1- Positioh reference (r 10.25 rad.
·0.4 ...., , ,. ,.P , .
j . • 2- fosition (x p /0,25 rad) .
·0,6 '. . ' j~Vel<.lc~ty(x~'lriadJs)
4~Aduati6ri(u/20i'iid!s2) .•
0.1 0.15 0.2 0.25 0.3 0.35 0.4 0.45 0.5
Time (Sec)
0.4 r==t====:7.1--=..~...:...:~~.~".~..
0.2 .•.• ,,);::':;"'<'!'" "'::j" "3" ,
.......:>..::.. ::::
-,c"1~:~75iad 4 , -' .~ ,,, . ", , - -., .
-0,2
1- Position reference (r 10,25 rad)
·0.4 .......;. ...................., ,.......•........., ,..p , .
2- J;'ositiop (x 10.25 r~d)
-0.6 ; ......, , , , P.., , .
3- yeloci~y (xv: II radls) .
-0.8 . . ·· .. ··,························'<2··· ' .
4- {\ctuat~on (u!20 rad/s )
.1 L----,--':-:---,-'-:---:-'-,,-----'--':-:---'---J.-,.---:-'----'----'
o 0.05 0.1 0.15 0.2 0,25 0.3 0.35 0.4 0.45 0.5
Time (Sec)
oscillating response. The linear setting in Fig.7.b, with a high velocity gain K v =35,
gives small errors, but a slow convergence. Compared to the linear gain settings
(200,15) and (200,35) the implementation of the fuzzy gain modifier gives a better
global response, as seen in Fig.7.c. Simulations of the computed torque control, but
with small errors in the estimates of the mechanical parameters, show similar robust
responses.
Conclusions
References
[I] G. Zames , On the 1-0 stability of time Varying Non-Linear Feedback Systems.
IEEE Trans. on Autom. Control, vol AC-ll, pp. 228-238. (1966).
[2] C.A Desoer and M.Vidyasagar, Feesback Systems. Input-Output Properties, Aca-
demic Press. (1975).
[4] J. Aracil, AOHero, AGarcia-Cerezo. Stability Indices for the Global Analysis of
Expert Control Systems. IEEE Trans. on SMC, Vol 19, N 5, pp. 998-1007. (1989).
Y. Nakamori
Department of Applied Mathematics, Konan University
8-9-1 Okamoto, Higashinada-ku, Kobe 658, Japan
K. Suzuki and T. Yamanaka
Laboratory for International Fuzzy Engineering Research
89-1 Yamashita-cho, Naka-ku, Yokohama 231, Japan
Abstract
INTRODUCTION
The fuzzy sets theory[1] has been widely applied to process
control systems which require skilled experts' knowledge in op-
eration. But only a few applications to multi-variable process
systems have been considered so far. The reason of this is that
the design methodology based on the process model has not been
fully equipped in the architecture of the fuzzy control because of
the difficulty to build understandable nonlinear process models.
In this paper we propose a multi-variable fuzzy modeling tech-
nique from input-output time-series data by applying the Takagi-
Sugeno-Kang method[2][3].
497
R. Lowen and M. Roubens (eds.), Fuzzy Logic, 497-506.
© 1993 Kluwer Academic Publishers.
498
FUZZY MODELING
The fuzzy modeling[2][3] consists of some difficult tasks in di-
viding data, determining membership functions, and selecting ex-
planatory variables in linear models. These tasks are strongly
related to each other to make the modeling quite difficult. We
propose an interactive fuzzy modeling technique which utilizes
human subjective knowledge on the process under study. The
basic modeling steps are the following.
Step 1: Data Observation
499
(1)
500
where ql, q2 and q3 are the first, second and third quartiles of the
subset, respectively, and t1, t2 are parameters to adjust the shape
of the membership function.
Step 5: Parameter Tuning
The behavior of an identified fuzzy model is checked by com-
puter simulation using real data or random inputs. Adjustment of
parameters in membership functions is carried out by minimizing
the prediction error defined by
E = 2- ~ I Yi - yf I (2)
N ~ Yi
where A~, A~, ... are fuzzy subsets with respective membership
functions, elk, Dr coefficient matrices, and
Yi = (Y1(t), Y2(t)···, Yo(t))T output variables,
Ut = (1l1 (t), 1l2(t) ... , u I(t)) T input variables,
V k -_ (k k
V1'V2···'V k)T
O ... constants..
The estimate of yt can be obtained by the following formula:
,",p k y,k
Y,* - L..k-1 W t · t
t - ,",P k' (4)
L..k=1 W t
501
where p is the number of rules, and ~k the output from the rule
R k . The weight w~ is given by the product of membership grades
of all conditional variables.
PREDICTIVE CONTROL
An attempt to design controllers using fuzzy models is done
in Sugeno and Kang[3], where the linear control theory is used to
design optimal regulators based on the respective rule models, and
then the optimal control in the universe of discourse is obtained by
taking account of the degrees of confidence of rules. However, the
weighted sum of respective optimal regulators is not necessarily
optimal in the universe of discourse.
We propose here an algorithm for control design based on the
idea of model predictive control as follows:
Step 1: Model Transformation
First we transform the ARX model to the fuzzy impulse re-
sponse model:
q q
Rule R k : ~k = k
L l I l . Ut-I + LG~. v k . (5)
1=1 1=1
where
YM = [(~+L)T'(Y;'+L+1)T""'(Y/+L+P_1fjT
YMo = [(l~m)T,(Yr)T, ... ,(Ytm)TjT
U F = [(Ut)T,(Ut+dT,,,,,(Ut+M_dTF
H t+ L H t+ L L:L-M+1 H t + L
L L-M+Z 1=1 1
H t +L +1 JIt+L+1 L:L-M+Z JIt+L+1
L+1 L-M+3 1=1 1
JIF =
JI t + L+ P - 1 H t + L+ P - 1 L:L-M+P H t + L +P - 1
L+P-1 L-M+P+1 1=1 1
H t +L _ H t H t +L _ H t
L+1 1 L+l q
H t + L +1 _ H t H t + +1 _ Ht
L+Z 1 L+q+1 q
Ho =
H t + L +P - 1 _ H t H t + L +P - 1 _ H t
L+P 1 L+q+P-1 q
",q G t +L ",q G t
L...I=l 1 - L...I=l 1
",q G t+L +1 _ ",q Gt
L...I=l 1 L...I=l 1
Go =
",q G t +L + P - 1 _ ",q Gt
L...I=l 1 L...I=l TI
(10)
503
which is given by
~'+l = O'(l-L+l)}'t + (1 - O'(l-L+l»)y*, (14)
Step 4: Repetition
The measured out.put.s at the next. time step t + 1 may be
different from the predicted values at t.he current. time t. Then we
repeat the same steps from Step 2 by resetting t + 1 as the current
time.
APPLICATION
We have carried out an application study on a stable incinera-
tion problem of a rot.ary-kiln process treating excess sludge from
a municipal wastewater treatment plant. The rotary-kiln process
has a rotating cylindrical structure of 1.9m in diameter and 22.0m
in length. It is a very complex process system with the following
characteristics:
(1) The input to the system is cake-like substance containing
suspended solid, microorganisms, sands, et.c. which are discharged
from the wastewater treatment process. Their components and
physical states are different day-by-day, that is, water cont.ents,
calorific values, sizes of solids, viscosit.y, etc. are changeable.
(2) There are strong interferences between manipulated vari-
ables and controlled variables; t.his fad forces us to consider a
multi-variable control.
(3) The incineration reaction in the rotary-kiln is very com-
plex because drying, combustion, aging of ash, etc. occur in the
kiln. Since we have no index to represent. t.he incinerat.ion reac-
tion directly, we have to estimat.e t.he state of incinerat.ion in the
kiln indirectly from measurable t.emperatures at. several rest.ricted
points. This fad forces us t.o build st.at.istical models inst.ead of
theoretical models.
The control of this process should maintain the finishing point
of incineration in the desired range to produce good ash with a
few percent of ignition loss and to prevent creation of clinker. In
the case of cement kiln, some control systems has been studied:
505
CONCLUSION
This paper proposed the algorithms to develop fuzzy dynamic
process models and to design model predictive controllers using
the developed models. The application study presented here was
the stable incineration control of a rotary kiln of sewage sludge, in
which we introduced the motivation of our study and difficulties
in applying the theory t.o an actual situation. -
506
References
Abstract
1. Introduction
the trend of the response, if the error does not decrease over a consider-
able duration of time, we can guess that the controller fails. If the error
decreases, the controller will be regarded as functioning well. Such an ob-
servation is represented by a set of linguistic descriptions which generally
makes use of fuzzy logic[4-6].
In this paper, we use the fuzzy logic to propose a new parallel redun-
dant control scheme which effectively minimizes the loss of a controller
due to false alarms caused by short disturbances. The concept of vary-
ing time weight combined with fuzzy failure detection logic has a robust
fault-tolerant capability in ill-defined environments or short period dis-
turbances.
rl I u.(t)
Controller
CI
y/t) D
!
,,-
Failure Detection u(t) yell
and Controlled
Reconfigur:ltion
I--- Process
L.j Controller
C2
I u (t)
2
(4)
(5)
2r
and the MTTF of the system is c . This is 50% longer than that of a
single control system which does not have redundancy.
Figure 2 shows the membership functions for E, CE, FM and TS. For
each variable, five membership functions are defined: PB, PS, ZE, NS and
NB. Here, PB, PS, ZE, NS and NB denote positive big, positive small,
zero, negative small and negative big, respectively. The error and change
in error are scaled to have the same universes ranging from -2 to +2.
NB NS ZE PS PB NB NS ZE PS PB
-2 0 2 -T/2 o T/2
(a) E, CE, and FM (b) TS
IF E = PH and CE = PH THEN FM = PH
ELSE
IF E = PH and CE = NH THEN FM = NH.
This expression defines a fuzzy relationship between a set of observed
imprecise values of error(E) and change in error(CE) and the the appro-
priate degree of failure(FM).
For a fuzzy controller, the control action rules are often extracted from
expert operators. For failure detection, however, the situation is different
from control because experiences of failure is rare and this knowledge
about failure is too incomplete to form a functional rule base.
To construct more accurate rule base, consider the performance index
J(k) at t = kT defined as follows:
J(k) = T1 i kT
(k-l)T
e2 (r)dr (6)
i
dJ 2 kT de
-(k) () ()d
er-drr (7)
dt T (k-l)T t
(9)
512
E
NB NS ZE PS PB
NB PB PB ZE NB NB
NS PB PS ZE NS NB
CE ZE ZE ZE ZE ZE ZE
PS NB NS ZE PS PB
PB NB NB ZE PB PB
3.3 Reconfiguration
NB NS ZE PS PB
NB -ZE NS NS NB NB
NS PS ZE ZE NS NB
FMl ZE PS ZE ZE ZE NS
PS PB PS ZE ZE NS
PB PB PB PS PS ZE
(10)
4. Simulation Example
2
! - ,(1) :
h..-_,.....L------,----
[ ,(t) i-
!/\j\ 1\
j' - -,.(t)
0------' ---t-
--,.(t)
!
....
>:; 0 1----
-I
1
-----i-----:-- -I ~
i\
-2L-----i---~-- -2
o 20 .40 60 0 20 40 60
(a) Single controller case (b) Dual controller case
2 ~--....-------,-----,
! - fml
-----~----- - 1m, 6
~----;-_.-_.
-I ._---+---------1
_21-_ _..........._ _ ~ _ _--J
o 20 40 60 o 20 40 60
(c) Failure measures (d) Switch
Figure 4 shows the response for the failure type 2. In this case, the
failure measure is relatively smaller than the former case. Thus, the failed
controller is removed from the control loop slowly. Since the weight of
the controller is reduced, the effect of the failed controller is suppressed
as shown in Fig. 4(b).
2 , 2
'~
- ,(t)
--,.(t)
I" 1\
--
- 1(t>
1
Ilf i h---...J-~--l"- ,.(t)
I
....
>:; 0 ---i; ....
>:; 0
-I !\ -I 1\
-2 -2
0 20 40 60 0 20 40 60
(a) Single controller case (b) Dual controller case
2
-1m,
-- 1m, 6
~
0-'
.E _-J"
e..--'
I
-I '-' cS
-2
0 20 40 60 0
(c) Failure measures (d) Switch
Figure 5 shows the response for the failure type 3. In the conventional
redundant control scheme, it can make the loss of functioning controller
due to its switching mechanism. In the response of the proposed scheme,
however, the control system only reduces the time weight for C 1 during
the period of being disturbed. In this way, the proposed scheme can
maintain its redundancy so that we can reduce the cost of repair.
5. Conclusion
References
Takehisa ONISAWA
1. INTRODUCTION
A failure rate and an error rate are necessary to the con-
ventional reliability analysis based on the probabilistic meth-
od. Furthermore information about, e.g., the dependence level
between subsystems failures or human errors, a possibility that
a subsystem failure or a human error leads to a system accident,
is also necessary to analyze system reliability. In practice,
however, the failure rate and the error rate are not sometimes
available since we have not enough amount of data to estimate
these rates. And it is much more difficult to get information
on the dependence level, the possibility level, etc. by numeri-
cal values. Even if numerical information is obtained, numeri-
cal values do not necessarily have objectivity and preciseness
as they themselves show. All one can reasonably estimate is the
possibility or the plausibility of such an event taking place,
given the information that you can have on hand or can reason-
ably assemble[l]. Natural language expressions are appropriate
for reliability estimate, the dependence level estimate, the
possibility level estimate, etc. A natural language plays an
important role even in the reliability analysis. Meanings of
natural language expressions are closely related to fuzzy sets
theory and this theory is necessary to the system reliability
analysis.
This paper describes a model of system reliability analysis
using natural language information and numerical information.
In this model numerical information or natural language infor-
mation on system reliability is employed according as which of
the two informations is available. However, since meanings of
natural language information and numerical information about
system reliability have latent fuzziness[2]. they are expressed
517
R. Lowen and M. Roubens (eds.J, Fuzzy Logic, 517-529.
© 1993 Kluwer Academic Publishers.
518
by fuzzy sets on the unit interval. The present model uses the
fuzzy sets. The result of the fuzzy reliability analysis is ex-
pressed by a natural language. Through an example usefulness of
the model is shown. This paper finally discusses a few remarks
about subjective reliability analysis for a future research.
2. FAILURE POSSIBILITY
A failure possibility is defined by a fuzzy set on the unit
interval [0, 1] such as
1
F(x)=------ (1)
m
1+20*lx- xo , l
where x and m are parameters.
o
The conventional probabilistic reliability analysis uses a
failure rate and an error rate as the objective measure of un-
reliability. On the other hand the present model uses the fail-
ure possibility as the subjective measure of unreliability. The
parameter x gives the maximal grade of F(x) and the parameter
m is relateR to fuzziness. Fig. 1 shows the failure possibility.
1..--...,....,.....----------,
ol------!.-------~
XO 1
Fig. 1 An Example of Failure Possibility
In Fig.1 the axis of abscissas mean unreliability based on the
subjective estimate. The failure possibility with x =0.5 shows
O expert's
"standard reliability". "Standard reliability" implles
subjective standard estimate of system reliability. The smaller
the parameter Xo is, the higher reliability the failure possi-
bility shows. Tfie axis of ordinates mean the grade of member-
ship. For example, F(O) shows the grade of unreliability 0 and
F(1) shows the grade of unreliability 1. Unreliability 0 im-
plies that a machine is estimated not to fail during the opera-
tion, or a human operator is estimated not to make an error in
a given task. On the other hand unreliability 1 implies that it
is estimated to fail during the operation or he is estimated to
make an error in the task.
519
i) In the case that the failure rate and the error rate(numeri-
cal values) are available[3].
The failure rate and the error rate are usually given by the
triplet of [PL' PM' pIll, where PM is the recommended value of
the failure rate and the error rate, PL is its lower bound and
Pu is its upper bound. The parameter xo should be derived from
subjective estimate of the failure rate, the error rate, many
factors which affect machine reliability or human reliability
[3]. In this paper, however, only subjective estimate of the
failure rate or the error rate is considered for simplicity.
The parameter x is derived from Eq.(2).
o
1
(2)
xo=-l-+-(-K-*-l-O-g-(l-/-P-M-))-3-,
S
where KS is a constant and xo=O when PM=O.
In Eq. (2)
KS=1/10g(1/PS) . (3)
where Ps IS a subjective standard failure or error rate.
The parameter Ks means a subjective safety criterion. The para-
meter xo equals to 0.5 when PM=PS' That is, the failure possi-
bility with X =0.5 shows stanaara reliability as mentioned be-
fore. O
The parameter m is derived from ratios k=PM/PL' PU/PM con-
sidering that the larger these ratios are, the fuzzier ~he
estimated reliability is.
ii) In the case that the failure rate and the error rate(nume-
rical values) are not available[2]
It is often difficult to estimate the failure rate and the
error rate by numerical values. However even in this case a
natural language is rather appropriate for the expression of
reliability estimate. In this paper when it is difficult to es-
timate reliability by numerical values, then reliability esti-
mate is expressed by a natural language in the form of estimate
of reliability and its fuzziness. Table 1 shows natural lan-
guage expressions about estimate of reliability. Table 1 also
shows correspondence between natural language expressions and
numerical values of the parameter xo ' The boldfaced numerical
value is assumed to belong to the class. The parameter X in
Eq.(l) is assumed to take a middle value in the range of oX as
o
a representative value of each class when reliability estimate
is expressed by a natural language. The failure possibility in
the class 1 is defined by
I, x=l,
F(x)= (4)
{ 0,
520
F(x)=
{ 0,
1,
x'%O,
x=O.
(5)
1
H(x,y)= 1/3 1/3 3 (6)
l+(((l-x)/x) +((l-y)/y) ),
where O<x,y~l and H(O,y)=H(x,O)=O.
(7)
The parameter Xo which gives the maximal grade of the failure
possibility of this system is obtained by
f(p)=f(PMA*PMB)
=H(f\PMAJ, f(PMB))' (9)
P=PMA+PMB-PMA*PMB' (11)
The function G is approximately compatible with the "or"
operation of failure rates or error rates in the sense of
Eq.(12).
522
xO=G(f(PMA),f(PMB))
=f(p)=iTPMA+PMB-PMA*PMB), (12)
where PMA and PMB are assumed to be estimated by the same
parameter K in Eq.(2).
S
3.3 Dependence between Subsystems Failures or Human Errors[3]
Two kinds of dependences are considered here. Let FA and F
be failure possibilities of subsystems A and B including humanB
error, respectively, and R be a fuzzy set representing the de-
pendence level.
3.3.1 Dependence I
It is assumed that troubles of subsystems A and B lead to a
system accident and that if the trouble happens to the subsys-
tem A, then the trouble is liable to happen to the subsystem B.
Let F'R be the failure possibility of the subsystem B influ-
enced 5y the trouble in the subsystem A. In this paper F'B is
estimated by "FA AND R". The failure possibility of the total
system is estimated by the following model.
(1) The case in which the subsystem B is influenced by the
trouble in the subsystem A.
F'B.is the failure possibility of the total system in this
case, I.e.,
(13)
(2) The case in which the subsystem B is not influenced by the
trouble in the subsystem A.
As far as the dependence is not complete, the subsystem B is
not always influenced by the trouble in the subsystem A. The
portion of the failure possibility of the subsystem A which
does not influence the subsystem B is obtained by
FA=G(F'A,F'B) (14)
where F'A is this portion.
F=G(F'B,F'). (16)
F'=H(F,R). (18)
For example, if a human operator is estimated to detect and
correct his failure completely, then h(F,R) is equal to O(this
fuzzy set is expressed by Eq. (5)). On the other hand if the
trouble in the subsystem is assumed to lead to an accident cer-
tainly, then H(F,R) is equal to F(this is the failure possibil-
ity of this subsystem).
3.5 Natural Language Expressions of Dependence Level and
Possibility Level[2]
It is difficult to express the dependence level and the pos-
sibility level by numerical values. Even if the dependence
level is expressed by a numerical value, e.g., by a conditional
probability, there is latent fuzziness behind the numerical
value. A natural language is also appropriate for expressions
524
1 Complete Possibility *1
2 Very High Possibility 1.0
3 High Possibility 0.95
4 Medium Possibility 0.75
5 Low Possibility 0'~2
6 Zero Possibility
(1 2 2 1/2
d= )o((X
1R (ot)-X 1S (ot)) +((x 2R (()l')-x 2S (()())) dQl. (19)
o and gate
W or gate
4-6
6-1 6-2
(2)
1 1
F
S
Fa
~ ~
~ ~
~ ~
~ ~
M M
o • 1 1
(1) (2)
Fig. 3 Results of Reliability Analysis
~~s
[11K.J.Schmucker:Fuzzy Sets, Natural Language Computations, and
Risk Analysis, Computer Science Press, 1984.
[21T.Onisawa:Fuzzy Model for System-Reliability Analysis and a
Prototype of a Fuzzy-Reliability Analyzer, submitted to IEEE
Tans. on Reliabiliy.
[3]T.Onisawa:An Application of Fuzzy Concepts to Modelling of
Reliability Analysis, Fuzzy Sets and Systems, Vol.37, No.3,
pp.267-286, 1990.
[4]M.Mizumoto:Pictorial Representations of Fuzzy Connectives,
Part I: Cases of t-norms, t-conorms and Averaging Operators,
Fuzzy Sets and Systems, VOl.31, No.2, pp.217-242, 1989.
PARAMETER ADJUSTMENT LAWS OF FUZZY PI CONTROLLERS
FOR FIRST ORDER LAG SYSTEMS WITH DEAD TIME
Kazuo TANAKA and Manabu SANO
Department of Mechanical Systems Engineering
Kanazawa University
Abstract
This paper presents a new parameter tuning method of
fuzzy controllers for first order lag systems with dead
time. The parameter adjustment laws are employed to
realize a simple and systematic parameter tuning.
Simulation results show that the parameter adjustment
laws guarantee good control performance.
1. Introduction
One of the difficulties for design of fuzzy controllers
is to find optimum parameters. We lack at present sys-
tematic tuning methods in the field of fuzzy control. In
order to develop a systematic tuning method, we should
identify parameter adjustment laws which can find
optimum parameters of fuzzy controllers. The purpose of
this paper is to identify parameter adjustment laws of
fuzzy PI controllers for first order lag systems with
dead time.
A first order lag system with dead time is described as
K - e -LS ,
-- (1.1)
Ts + 1
where K, T and L denote the gain, the time constant and
the dead time, respectively. It is well known that the
optimum parameters of linear PI controllers for first
order lag systems with dead time can be calculated using
K, T and L as follows:
O.6T
Kp = TI= T, (1. 2)
KL
531
2. Fuzzy PI Controller
Table 1 shows a typical control rule table of fuzzy PI
controllers. Fig.l shows membership functions in the
premise and the consequent parts.
NB NM NS ZO PS PM PB
NB NB NB NB NM NM NS ZO
NM NB NB NM NM NS ZO PS
NS NB NM NM NS ZO PS PM
e ZO NM NM NS ZO PS PM PM
PS NM NS ZO PS PM PM PB
PM NS ZO PS PM PM PB PB
PB ZO PS PM PM PB PB PB
NB NM NS ZO PSPM PB NB NM NS ZO PS PM PB
-a
I-b)
o a e
(b) (e) -
C o c '
=
[-::::: :~:;:] [:] (2.1)
dv e•
I
NB NM NS ZO PS PM PB
dv I
any NB NM NS ZO PS PM PB
NB NM NS ZO PS PM PB f'JB NM NS ZO PS PM PB
-I'---f---l---1I---+--f---t- V -1--lf---+--f-----'1- U
-r o r -c C.
2
C
-1 /3T
(} 0 = tan (- (3.2)
a T-l
r = I eo sin (} 0 (3.3)
dv v
.\:::""
e
3.2 Derivation of c
The parameter c is closely related to the gain of fuzzy
PI controller. As result of separately considering two
cases of L=O and L>O, we can introduce the parameter ad:"
justment law
L=O,
c =\ 2.0 P (3.4)
0.3 P
L>O,
JT
where
K "
P= - {(aT-i) cos (Jo + ,BTsin (Jo}.
max (0 , 5) L>O,
tJ. (J (rad.) = (3.5)
{
o L=O,
(3.6)
4. Simulation Results
Fig.5 - Fig. 7 show control results of fuzzy PI
controllers. The parameters of the fuzzy PI controllers
are calculated using Eqs.(3.2)- (3.6), where a = /3 = 2.0.
From these figures, we can point out that the
adjustment laws of Eqs. (3. 2) - (3.6) guarantee good con-
trol performance.
538
TIME lEI
y
~ ----- - --
O~-..£:.....-.;l...------Jl...-----'----'----J
o TIME IE) 5)
O;;-"-----'------1.-_ _-l..-_ _. 1 - - _ - - J
o TIME (:xc..) 5)
5. Conclusion
We have discussed a new parameter tuning method based
on parameter adjustment laws. From simulation results, we
have pointed out that the parameter adjustment laws
identified in this paper guarantee good control
performance.
540
Reference
[l ]T. Veda et al.: Simplification of Constructing Member-
ship Functions of Fuzzy Control for Power Systems,
T. lEE Japan, Vol.lIO-B, no.5, pp.445-446(l990)
in Japanese.
ADAPfIVE FUZZY CONTROL
Abstract
This paper presents an adaptive controller using fuzzy logic and connexionnist
methods. This controller requires two blocks: the first one is an adaptive feedforward
controller, designed by training and/or human knowledge. It learns the inverse
dynamics of an unknown plant and drives it to a desired output. The second block
performs a state feedback to compensate the committed error. The controller is tested
on a non linear system with coupled outputs.
Keywords
Fuzzy logic, neural network, non linear plant, learning, adaptive control.
1. Introduction
In the control of a process, a natural method is to consider two steps: the first
step generates a control input which drives the plant to reach an output near the set
point (feedforward controller), the second corrects the initial control input from the
observed error (feedback controller). The feedforward controller, alone, can't generally
give a correct command at the first go, for several reasons: disturbances modifying
the plant behaviour, incomplete modelling, time varying parameters. On the other
hand, the smaller the feedforward error, the swifter the feedback compensation is. In
the past decades, major advances have been made in adaptive control for linear plant
with unknown parameters. But few results exist for non linear systems. For those
systems, neural networks [I], [10], [II] or fuzzy logic [12], have proved successful
in control.
541
R. Lowen and M. Roubens (eds.), Fuzzy Logic. 541-551.
© 1993 Kluwer Academic Publishers.
542
In this paper, we propose to associate two fuzzy controllers for the feedforward
and the feedback actions. Using the feedback error for learning, the feedforward
controller is able to acquire the model of the inverse dynamics of the plant, after a
period of training. We use a steepest descent algorithm for learning. This controller
is tested on a black box which is a two inputs two outputs non-linear system, with
highly coupled outputs.
2. "Neuro-fuzzy" networks
A fuzzy controller has the internal structure of an expert system with a
knowledge base consisting of linguistic rules of the form :
1. define the fuzzy subsets on the variation domain of each variable and the
membership functions x ~ J.l.A (x) e [0,1]. In this paper, we use triangular
membership functions, for simplicity, but similar results are obtained with smooth
membership functions (gaussian or sigmoidal).
2. for an input (xO'YO"'zO ), compute the truth value of the premise part of
each rule. Usually, the AND operator is chosen as :
~ = min (J.l.Ail (xO ), J.l.Ai2(YO ) ,.. J.l.Ain(zO ) }
or
(1)
As emphasized by several authors [4], [6], [7], [8], this scheme presents many
analogies with artificial neural networks :
1. parallel processing of the truth values CXj of the premises, by units called
Rule neurons,
544
2. each Rule neuron emits its output signal to the output neurons which
compute (1).
3. with the simplified fuzzy reasoning method, B = (b l ,... ,bn)t is an adaptive
synaptic weight vector.
There are three specialised layers: the first evaluates the inputs according to the
given fuzzy subsets in the premises, the second processes the truth values and the
third gives the consequents. This different presentation of fuzzy controllers places a
multilayer structure in a prominent position, with outputs as nonlinear functions of
weights.
It is possible, by a judicious choice of membership functions and of AND
operator, to entirely map a fuzzy-rule-based system on a Neural Network, cf [5].
However, in this paper, we consider the simpler following case: the last layer is a
Neural Network with, as inputs, the firing strength of each rule and, as output, the
control action expressed by (1). In this case, the weights of this Neural Network are
the crisp values, (hi h, in the consequent part of the rules. Unlike ordinary Neural
Networks, to interpret such a neuro-fuzzy network is obvious. Conversely, if we
have no initial knowledge, the learning algorithm developed in paragraph 4 permits
the subsequent drawing of rules.
3- Interpretation
For simplicity, we take a two inputs-one output system with triangular
membership functions crossing at grade 0.5, and with fuzzy rules:
In consequence,
1- the learning process must tune the 16 Cjj values,
2- and the inference process performs a nonlinear interpolation between these
points.
The error with a particular set of weight is Yj - dj . We must find a B = (hi' .. bn)t
vector which minimizes the global error: E(B) = 1/2 I. I Yj - d j I 2 by gradient
descent:
We use ClE/Clbk to change the weights after every input-output case. With the
particular form of the activation function of output neuron, ClE/Clbk is easy to
compute and the weight modification is :
(2)
Weights are modified proportionally to the committed error and the neuron relative
activities. A momentum term speeds up the learning.
For a given input vector, only a few rules are used for inference. Therefore only
the corresponding weights are updated. The learning algorithm acts locally, unlike
BackPropagation which updates every weight. .
As shown in Fig. 4, we know the error signal at the system output but not the
error between the actual and the desired command. An alternative to analytical
modelling is to use a behaviour model described by rules. We shall use the previous
learning algorithm in a dedicated architecture for on-line training of a feedforward
controller.
3- Retropropagate L in FFC
4- Go to 1
547
Set Point
~'IlI'~L~
disturbances
(1)
dz-1t Plfeedback
controller
dU
...o_i_nt
Set P ..... feedforward U disturbances
controller
(II)
5.2 implementation
The PI feedback controller is deduced from the operator's knowledge. In some
cases, we have used the MacVicar-Wheelan 's rule base, [9].
The same algorithm can be used for both the feedback and the feedforward fuzzy
controllers.
"\.NB NM NS ZR PS PM PB
NB 0.15 0.10 0.05 0.02 0.01 0.005 0.00
NM 0.10 0.05 0.02 om 0.005 0.00 -.005
TE NS 0.05 0.02 om 0.005 0.00 -.005 -.01
ZR 0.02 om 0.005 0.00 -.005 -.01 -.02
PS 0.01 0.005 0.00 -.005 -.01 -.02 -.05
PM 0.005 0.00 -.005 -.01 -.02 -.05 -.10
This matrix is then expanded for seven fuzzy subsets, namely NB, NM, NS,
ZR, PS, PM and PB (N for Negative, M for Medium, B for Big, ... ), cf Fig. 6 b).
For change in CO, we have taken the same matrix with rows in the reverse order.
The matrix coefficients are the weight vectors of the two output neurons of the
feedback controller.
549
~~ O~OC~
l~
0.4 0.6 0.8 1.0 1.2 1.4 1.7 10 20 30 40 50 60 70
We start learning without initial knowledge (all the weights are zero), with a
training set of 200 tupples (Ti , Fi ) and we use the learning algorithm 5.1. The
PI-like fuzzy controller computes the feedforward error and the weights are updated
after each input pattern, according to equation (2), with a gain Tl = 0.08 and a
momentum term y =0.9. Fig. 8 shows the error curve and the learned control surface
for hot water opening.
• ·3
t ) " s
fig.8- error curve and learned control surface for hot water opening.
As we can see, in Fig. 9, the feedforward action gives results close to the desired
output for T and F.
desired T "'" 30 "'" 40 "'" 50 "'" 60 "'" 70
actual T 27.0 41.5 50.5 57.3 72.5
actualF 1.05 0.98 0.99 1.01 0.99
Fig. 9 mixer tap response before the feedback action, for F about 1
Conclusion
The inverse model of a plant can be learned by a feedforward fuzzy controller.
By teaching the controller with a limited number of samples, the control surface can
be learned easily. The feedforward control action speeds up the response of the
system and the feedback part takes random disturbances into consideration.
The advantage of using a fuzzy controller is that "rule of thumb" can be easily
incorporated into the design of the controller, to speed learning up.
references
[1]- Chen and Pao, "Learning control with neural network", Proc. of
Int. Conf. on Robotics and Automation, 1989 IEEE.
[2]- Glorennec P.Y., "Association d'un reseau neuronal et de regles floues pour Ie
contrale d'un processus dynamique", Proc. of Third Int. Workshop
Neuro-Nimes'90.
[3]- Glorennec P.Y., "Application of Fuzzy Control for Building Energy
Management", Proc. of IBPSA-BS'91, Nice, Aug. 91.
[4] Glorennec P.Y. "Un reseau neuro-flou evolutif" Proc. of Third Int.
Workshop Neuro-Nimes'91.
[5] Glorennec PY "A Neuro-Fuzzy Inference System Designed for
Implementation on a Neural VLSI Chip", Proc. of Iizuka, july 1992.
[6] Hayashi and AI. "Fuzzy Neural Controoler" Proc. ofFUZZ-IEEE'92
551
[7]- Horikawa S. and aI., "A fuzzy controller using neural network and its
capability to learn expert's control rules", Proc. of IIZUKA'90,
Fukuoka, july 90.
[8] Lin and Lee "NN-based fuzzy logic control and decision systems" IEEE
Trans. on Computers, vol 20 dec. 91.
[9] MacVicar-Wheelan P.J. "Fuzzy sets for man-machine interaction", Int. J.
Man-Machine Studies, vol 8, nov. 1976.
[10]- Narendra K. and Parthasarathy K., "Identification and control of
dynamical systems using neural networks", IEEE Trans. on Neural
Networks, vol. 1 no 1, March 90.
[11] Saerens & Soquet, "Un systeme de contr6le connexionniste", 4emes joumees
fran~aises de l'apprentissage, 1989.
[12]- Sugeno M., "An introductory survey of fuzzy control", Inform. Sci.,
vol 36, no 1 and 2, july 85.
[13]- Takagi H. "Fusion technology of fuzzy theory and neural networks",
Proc. of IlZUKA'90, Fukuoka, july 90.
[14] Takagi T. & Sugeno M. "Derivation of fuzzy control rules from human
operator's control actions" Proc. of IFAC Symp. on Fuzzy Information, p
55-60, July 1983.
FUZZY CONTROL
FOR HIGH FREQUENCY TUBE WELDING SYSTEM
Tadashi lokibe
Computer System Division
Meidensha Corporation
5-5, Ohosaki 5-chome
Shinagawa-Ku Tokyo
141 Japan
1. INTRODUCTION
With this as a background, a fuzzy control for high frequency tube welding
system having functions for automatic generation of fuzzy rules and membership
functions based on expert operation data, fuzzy adaptive control to deal with changes
in mill performance with time and weld temperature true value estimation to make
up for the shortcomings of a two-color pyrometer in application to ERW tube
production, was developed by combining the fuzzy control technology and our heat
control technology.
Two-color pyrometer
Uncoiler
Fig. 1 Electric Resistance Welded Tube Production Line
Configuration
555
3.1 Outline
This system is built around our f-l PORT-II32 32-bit industrial computer.
Automatic, semi-automatic and manual operation modes are provided.
In the automatic mode the operation is fully automatic, using a proper set
of fuzzy rules based on production conditions (tube type, steel type, pipe outside
diameter and sheet steel thickness) set by a host computer. In the semi-automatic
mode the operation is the same as in the automatic mode except for entering the
production conditions from the CRT display keyboard of the system.
The control modes are on-line, simulation and off-line. In the on-line
mode automatic heat input control is executed using all the control algorithms. In
the simulation mode the validity of the fuzzy rules and membership functions of
self-learning is evaluated. The heat control block diagram of this system is shown
in Fig. 2.
For fuzzy reasoning this system uses a fuzzy reasoning package to run on
the fJ PORT-II series computer mentioned before.
,
Master file
•. - - - - - - Self-learning
Um
Ts w
tandard value FF control self·leamiog unit Ep
V,
decision unit II'
,T ,I
I
0"
se~
FF cOOirol FF fuzzy comrol circuit
:11fOI rule MSFse'
1 l
Ts
Vw
+
Ts
~
Ow
If there is no difference in tube type, steel type and outside diameter in heat
control for ERW tube production, the line speed and heat input are usually related as
shown in Fig. 3, allowing for a difference in sheet steel thickness. This relation is
represented as follows by a mathematical model.
Heat input
p
O,:----------- v
o Line Speed
Fig. 3 Line Speed • Heat Input Characteristic Model
558
P = (Pr + Ps) X T
Pr = aV + b
Ps = e/(cV + d)
The actual welding temperatures used for this feedback fuzzy control are
estimated by the welding temperature true value estimating function described later.
the Rules No. 10 and No. 80 of Fig. 4 this system changes the effectiveness of
control smoothly according to deviations between the standard and line speeds.
Concretely, the closer the line speed to the standard speed, the stronger the control
applied, and vice versa.
In addition, this feedback fuzzy control is used jointly with the fuzzy
adaptive control described later.
10 IF DVS=ZE THEN
20 IF DS=NB THEN DU=PB
30 IF DS=NS THEN DU=PS
40 IF DS=ZE THEN DU=ZE
50 IF DS=PS THEN DU=NS
60 IF DS=PB THEN DU=NB
70 ENDIF
80 IF DVS=¥ZE THEN DU=ZE
90 DEFUZZY DU
100 END.
Fig. 4 Example of Fuzzy Rule Set for Feedback Control
This unit automatically generates the fuzzy rules and membership functions
for feedforward fuzzy control based on the data collected in manual operation by
expert operators for production of ERW tubes of identical tube type, steel type and
outside diameter using band steel of typical sheet thickness.
As shown in Fig. 3, the feed forward control can be divided into the
following three areas.
Area 2: Typical speed (Vx) where the stationary and moving heating
areas overlap and associated heat input (Px) are present.
How to decide on the fuzzy rules and membership functions for each area is
described below, using the Area 3 data actually measurable and assuming a standard
sheet steel thickness (Ts).
For these areas it is difficult to prepare the rules based on data collected in
manual operation. As the heat input in each of these areas varies with the sheet
steel thickness, the heat inputs (Po, Px) are found by fuzzy reasoning based on the
standard sheetthickness (Ts). Assuming the line speeds ofYo=O and Yx=YwX 1/2
at each characteristic point, the fuzzy rules should then be generated as follows.
IF Yw is Yo THEN Pw is Po
IF Yw is Yx THEN Pw is Px
where Yo, Yx, Po and Px are the fuzzy labels of the speed and heat input.
The rules for this area can be estimated in the following two ways,
depending on the line characteristics.
manipulated variable (Um) at each point should be collected, and the fuzzy rules and
membership functions should be generated in the same way as (a) based on them.
The characteristic values of feedback fuzzy control, that is, the rise
characteristic (El), overshoot (E2) and settling (E3), are found by changing the
target welding temperature step-wise from (J sO to (J sI when feedback control is
applied in a steady state (line speed close to standard speed). The amounts of
correction (Vd (J s and Vd (J s) to be applied to the membership functions are found
by reasoning and the membership functions (d (J s) and (d (J s) are then corrected
automatically.
FE FE control adaptive
control adaptive learning membership
Characteristic value calculating unit learning rule set function set
Tl
e,oR"~;~~ii;~~i; , 1 1
8s
. E2=AI/A 0
E!
E2 Fuzzy reasoning unit
Vdas
8w E3=T2 Vdas
---W-'1
E3
iAl
as!
AD
T2
In heat input control for ERW tube production the welding temperature is a
major factor of feedback control. However, the reproducibility and stability of its
562
In order to settle the above problems, this system estimates the true value
(8 w) of welding temperature by fuzzy reasoning and uses it as an input for feedback
control. Fig. 7 is the block diagram of this true value estimating function.
It should also be noted that the parameters unmeasurable on-line are entered
from the keyboard.
Measuring point
True value OUTside
00 "
Visual field slippage 0 //
9"
0"
... /'00
Speed ~ / 00
Low."""" 0 IN side
/
o 0 "
Outside light -<r 0 00 9"/
Much a l l 0 ~
Sheet thickness • • .........
".
0 0 High
Thick • •/ • •
/
0(( / ••
Slbl
ou e • • Little
0((0(( .....0((
#/0(( 0((
Frequency MuchA /0((
A A ,,'4 0(( Thin
Low AI' A
, A A
V "I' A
V" Little
V V,," V
V;; _V V
" V .
........ V HIgh
/
/
/
Measuring value
Fig. 6 Relation of Measured and True Values of Welding
Temperature in Presence of Disturbance
4. RESULTS OF OPERATION
The results of use of this system in our test mill and a production mill are
introduced in this section.
563
Vw
Ts
Rw dOw Ow
f-'w Fuzzy reasoning unit +
w
~ f-
,
1 1
°P-D 8p-p
True value True value
estimating estimating
--
I I Oave
rule set membership
B V function set
8o-p
Sw=8p-p
8o-p
-'-
Mean value
calculating
unit
The maximum speed of this test mill was 20 m/min and the feed steel
SUS304, outside diameter 34_0 mm and sheet thicknesses 1.0 mm and 1.4 mm.
By sampling the manual operation data in the manner described in 3.4 (2)
(b) the fuzzy rules and membership functions for feedforward fuzzy control were
generated automatically. The results of control using these rules are shown in Fig.
9. The fully rules and membership functions of automatic generation are shown in
Figs. 9 and 10 respectively.
In Fig. 10 the Rules No. 20 - No. 100 apply to operation on steel 1.0 mm
thick and No. 11.0 - 190 supply to 1.4 mm thick. The other rules were added
automatically by the functions described in 3.4 (4) (c).
564
The maximum speed of this mill line was 150 mlmin and the feed steel
was SUS430, outside diameter 38.1 mm and sheet steel thickness 1.0 mm.
Vw 8.8w Ep Ip
m/min °C kV A
25 1400 8 95 8.24
1300°C
5 1080 1. 9 1. 64
20 50 - 1320
Ow
15 40 1240 5 7 -4. 9E
10 30 1160 3 8 3 3:
5 2G 1080 u 1 9 1. 64
o 10 1000.L..---'-'--J..JL...L..JL..----------------...\..L-'--lo.~--L 0-- 0
w
o
«
0:::
(.9
O--_............--¥JI&.....U&lL...&...~I----+- -+__----l
__
a
Fig. 11
566
Vw I U 8,fNI Ep Ip
m/ % "C kV A
105 80 1560 10.15 26.6
/95"C
/~fNI
90 70 1480 8,70 22,8
rEp
75- 60 1400 725 19.0
lip
r Vw
60 50 1320 580 152
45 40 1240
r U 435 11.4
I
30 30 1160 2.90 7.6
10 1000 0,00 00
S. CONCLUSION
Conventional systems for heat control for ERW tube production suffered
from heavy disturbances in welding temperature measurement itself, making it
considerably difficult to maintain the quality of products at a desired level of
stability by feedback control. However, the heat control system developed by the
authors and featuring the feedforward fuzzy control learning function, feedback fuzzy
control adaptive function and welding temperature true value estimating function
realized stable heat inputs throughout the areas from line speed zero (0) to the
standard speed as shown in Figs. 9 and 12. In previous stainless steel welding
processes it was considered especially difficult to hold the welding temperature
within ±20°C of the target. But the system introduced herein succeeded in
controlling the welding temperature fluctuations within ± 8°C as shown in the
results of its operation at a production plant. This is considered epochal in ERW
tube production.
Another point of note is that the automatic generation of fuzzy rules and
membership functions took about 30 seconds after collection of data. The system
was thus able to be put to operation in a very short time.
567
[REFERENCE]
(1) Tadashi Iokibe: "Seam Welded Pipe Production Heat Input Control System
Using Fuzzy Reasoning", Collection of Papers Published in FY '90 National
Meeting, Industrial Application division. Japan Society of Electric Engineers.
(2) Tadashi Iokibe: "Seam Welded Pipe Production Heat Input Control System
Using Fuzzy Reasoning, Collection of Papers Published in 6th Fuzzy System
Symposium, Japan Fuzzy System Association.
(3) Tadashi Iokibe: "Fuzzy Control for High Frequency Tube Welding System".
4th Fuzzy System Symposium Proceedings International, Japan Fuzzy system
Association.
Hybrid Fuzzy Self-Organizing Controller for Visual Tracking
Abstract
1. Introduction
Vertical tracking
RD = AI- A2 (1)
Al
where Al : the object area at desired position,
A2 : the object area at present position
The key feature of RD is that one can work out the rule regardless of
572
the absolute object area. Using this RD value one can effectively obtain
the fuzzy rules for the vertical tracking, The input linguistic variable of
the fuzzy rules for vertical tracking is RD and the output variable is the
robot motion for the direction of optical axis.
Change Error
-7 -6 -5 -4 -3 -2 -1 0 1 2 3 4 5 6 7
I
---J
I
"" I
<.1>
....
I PI type Rule
...... -
I
c..:>
I
N
0
..... I
c..:>
....
PI type Rule
<.1>
""
---J
E -7 -6 -5 -4 -3 -2 -1 0 1 2 3 4 5 6 7
CE
-7 -6 -6 -5 -5 -4 -4 -3 -3 -2 -2 -2 -1 -1 -1 0
-6 -6 -6 -5 -5 -4 -4 -3 -3 -2 -2 -1 -1 -1 0 1
-5 -5 -5 -5 -4 -4 -3 -3 -2 -2 -1 -1 -1 -0 1 1
-4 -5 -5 -4 -4 -3 -3 -2 -2 -1 -1 -1 -0 1 1 1
-3 -4 -4 -4 -3 -3 -2 -2 -1 -1 -1 -0 1 1 1 2
-2 -4 -4 -3 -3 -2 -2 -1 -1 -1 -0 1 1 1 2 2
-1 -4 -3 -3 -2 -2 -1 -1 -1 -0 1 1 1 2 2 3
0 -3 -3 -2 -2 -1 -1 -1 -0 1 1 1 2 2 3 3
1 -2 -2 -2 -1 -1 -1 -0 1 1 1 2 2 3 3 3
2 -2 -2 -1 -1 -1 -0 1 1 1 2 2 3 3 4 4
3 -2 -1 -1 -1 -0 1 1 1 2 2 3 3 4 4 4
4 -1 -1 -1 -0 1 1 1 2 2 3 3 4 4 5 5
5 -1 -1 -0 1 1 1 2 2 3 3 '1 4 5 5 6
6 -1 -0 1 1 1 2 2 3 3 4 4 5 5 6 6
7 0 1 1 1 2 2 2 3 3 4 4 5 6 6 6
It can be seen from the table that even if E* is positive large, if CE*
is negative large, the process is considered to be in a desired state. Here
E*=O and CE*=O are the final desired state. The rules are modified by
the performance index as follows:
6. Experiments
PI : P =0.7 PI = 0.0:>
t\ 1\
~ If
\ ~.-om
11\1
· \
1\ f
~
.-om
V IV
~v
· V v
·
· .. o• ..
control step
7. Conclusion
4 -iF
I
l'
0.8
~
....... 1\ L~
1
3 0.6
E first w
2 + '"
~ 10th "W :1';
t 0.4
Q
f ~
I "-"' 0.2
1)
LUton "Wor , +
first worl :
o o .Ie
o 20 40 o 20 40
control step control step
center U
200
150
(..J...
a;
.:=i
"'" \...' ..
::;- 100 I
.... irst worl :
'"
"''"" 50
!
1 lOth "Wor ;
References
[1] Sanderson, Arthur C. and Lee E. Weiss, "Adaptive Visual Servo
Control of Robots," in Robot Vision, ed. Alan Pugh, pp.107-116,
IFS Ltd., 1983.
578
[2] Weiss, Lee E., Arthur C. Sanderson and Charles P.Neuman, "Dy-
namic Sensor-based Control of Robots with Visual Feedback,"IEEE
Journal of Robotics and Automation, vol 3, no.6, pp.404-417,
IEEE, Oct. 1987.
[5] Jang W., K.J. Kim, M.J. Chung and Z. Bien, "Concepts of Aug-
mented Image Space and Transformed Feature Space for Efficient
Visual Servoing of Eye-In-Hand Robot," accepted for publication
in ROBOTICA.
[6] Chuen C. Lee, "Fuzzy Logic in Control Systems: Fuzzy Logic Con-
troller", IEEE Transaction on Systems, Man, And Cybernetics, vol.
20, no 2,IEEE, March 1990.
Integration of Symbolic Path-Planning and Fuzzy Control
Abstract: This paper presents the control architecture of mobile robots within a
framework of an intelligent contol system. It is based on a dual-looped control system: a
high-level symbolic processing loop and a low-level numerical processing loop. In the
former, goal-directed, supervisory tasks for the other loop are assigned such as planning
paths and generating intermediary subgoals, and the importance and validity of
execution-time planning by spatial reasoning is stressed, while in the latter the local
repetitive control tasks using a fuzzy linguistic controller is implemented so that it can
be reactive to external stimuli.
INTRODUCTION
Intelligent control is a new paradigm for solving control problems, which was
originally proposed by Saridis as an intersection of artificial intelligence, operations
research and control theory [1]. This is characterized by the containment of
recognition in the control loop and by the enlargement of the range of information
besides the one in a conventional mathematical form. In this paper, we present an
architecture of an intelligent control system for a mobile robot that moves about in
a large-scale space. Especially, we put emphasis on the following issues:
As shown in Fig.I, our suggesting system is divided into the following three
modules.
subgoal event
:;;;::;::=7===%\
observed viewframeIPo=p=po=rt=u=n=is2tic=p=a=th=_
Planner
Landmark Detecto
signals
51 nal Processor
ultrasonic steering
sonar sensor
environment
(2) Planning module for generating proper control sequences required for
actuations of the robot by doing spatial reasoning about a current visual world. The
necessity of the execution-time planning is due to the fact that the robot may
encounter unexpected situations in which the planned behaviors cannot be executed
properly or the robot may discover opportunities by accident to improve its
execution, both of which were missed in a plan-generation phase.
(3) Control module for a robot's steering using fuzzy linguistic rules in
blending both numerical and symbolic information that are sent from perception and
planning modules, respectively. This enables the robot to execute a goal-directed
task given by the planner, while providing reactivity to external stimuli from the
environment.
dealt with and the supervisory tasks for the other loop are assigned to it; scheduling,
planning, and generating intermediary subgoals for the low-level controller.
Moreover, it also includes the tasks of monitoring and understanding ongoing
behaviors. The other low-level numerical loop is equivalent to the one of the
conventional controller and deals with numerical signals. The tasks of this loop are
restricted to the local, repetitive control tasks, which should be promptly reactive to
the occurrences of unexpected events.
PERCEPTION MODULE
A Signal Processor
When the robot moves about in the world, the mounted sonar sensor scans the
world in intermittent 24 directions with the interval of 15 degrees. It returns sensing
data that consist of two values (Ph 6i> (i = 1,..,24): a distance Pi « 127 inches) and
a relative orientation 6i between the robot and an object.
A Landmark Detector
The robot successively obtains the data with a fixed time interval and calculates
the relative positions of the reflection points on the reflector of the object. From
this information, the robot at first groups a set of reflection points that are close to
each other into a cluster that represents reflection points from the common obstacle.
Then, comparing these at successive measurement times, it identifies whether each
of those clusters is the one for a fixed obstacle or for a moving obstacle. Moreover,
for a fixed obstacle that is large enough as compared with the size of the robot, the
system monitors a trajectory of the reflection points as the robot moves and detects
the points where the direction of the trajectory drastically changes as feature points
representing comers of the object. Based on these, an object having a complex shape
is approximated as a polygon.
BElWEEN(3.0·O) ..
. .r\ reflection points lor a
• ••.• moving obstacle
{.-"~... ,; ;. :'.~/
...... _......
BElWEEN(6.0·0)
o •.
fixed obstacle \) ..
~
r£.--~~-"1!~
\ BElWEEN(6.8)
lelure point \
\ BElWEEN[3.8]
. \ \
o '. J"A
fixed obstacle \
.
(a) Sonar sensor and an environment (b) Dynamic sensing ollhe world
Fig.2 Simulated result from perception module
582
In this way, in the tutorial mode the robot selectively detects fixed objects from
the environment, and they are stored as landmarks in the global detabase with their
object identifications and their constituent feature points as shown in Fig.2. t
Note that the verification of these three types of crossing can be easily done by the
sonar sensor by watching which landmark of the pair occludes another. Having
identified the occurrences of those crossing events, two viewframes observed before
and after the crossing are generated and are stored in the global database in the
tutorial mode. Thus, the dynamically changing views that are acquired when the
robot moves along some path is represented as ordered sequences of visual scenes in
which viewframes and crossing events appear in turn. In the execution mode, the
detection of the occurrence of the crossing events is reported to the planning
module.
PLANNING MODULE
t In the current version, it is assumed that objects are identified from its shape and color
that are detected with an aid of vision sensor.
583
!
BETWEEN[F,GI~BETWEENIC,GIt-LEFTIA,CJ~BETwEEN(F,E)..-eETwEEN(C,E)
Then, the system constructs a path that starts with the current viewframe and ends
with the destination viewframe, and yields a skeletal path as a sequence of crossing
events that are ordered according to their occurrences in the above path. Wherein, the
crossing events that pass through the sanle LPB from different sides are eliminated.
Then, the remaining crossing events are collected into a initial list of "crossing
events in activation," each of which is an intermediary subgoal to be attained for the
provided mission. Fig.3(a) and (b) illustrate these procedures.
Successive exections of the crossing events in the above skeletal path does not
always result in an efficient, purposive behavior for the robot, but it may force it
perform redundant passages and may miss to find an unexpected shortcut. For
instance, let us suppose that the robot is executing a crossing event BETWEEN[A,B]
at position Y different from position X in Fig.3(a). Though the crossing events to
be attained consequently are in an order of BETWEEN[C,B] and BETWEEN[A,D]
according to the skeletal path, it may cause redundant backtracks, and the attainment'
of BETWEEN[A,D] in advance to BETWEEN[C,B] is more rational. Moreover, let us
assume that the robot has to attain the three crossing events as shown in Fig.4(a).
In this situation, an attainment of a single crossing event BETWEEN[B,C] is
equivalent to the attainments of all those events, although this event is not
explicitly present in any of the crossing events in activation. These two examples
are demonstrating that the skeletal path generated in the pre-planner is only loosely
constraining the robot's goal-directed behavior and full specification of execution-
plans should be delayed until the plan-execution time.
584
C
A RIGHT(C,Oj . . •
visible landmarks: IA, B. c. OJ
• :--BETWEEN[!'.Dj ..... ::::::.0
...•. B .,~ . ABC i events in activation
0
land~a;~·.···· cros~ing ··---·--:··--··-:---··-:;---1-····--···--------···.··--
"
inferred
LEFT(A.Bj event t i ("""1 i RIGHT(C.O)
r'· >: . :. i LEFT(A.B)
scanned"~"
direction it ~ i BETWEENIA,OJ
·'.front
[{I ~ BETWEEN[B.Cj
inferred crossing event
robot
(a) (b)
Step 1: Select crossing events that consist of the landmarks contained in the
currently-observed viewframe.
Step 2: Order the landmark list linearly and mark the intervals below it through
which the robot may pass ·for each of the selected crossing events.
Step 3: Detect the interval that is shared by all of the intervals marked in Step 2
and transform it into an equivalent crossing event, which is an intermediary
subgoal event to be sent to the control module.
Having done this reasoning, the planning module remains asleep until the
completion of the subgoal is reported from the event detector, while the other
crossing events are dynamically eliminated from the activation list in reply to the
reports from the event detector.
CONTROL MODULE
The task of the control module is an execution of the subgoal event in reply to
the call from the planning module. This task can be divided into the following two
subtasks; to determine the robot's desirable orientation and to decide the actual
amont of steering to attain this goal. Wherein, two kinds of information is
provided; one is a symbolic subgoal event for attaining the robot's final mission and
the other one is a signal sent from the perception module. The control strategies to
be taken at this time are summarized as follows.
1.0
• BETWEEN[A,Bj
(p ~e i)" . :
: .... goal direction
-=~·J{(~·~~·;!dmark ~;~ooL.--i---+-'----++-1800
B
front direction pi p;+90 0 pi+2700
(a) Surrounding world (b) EleJ1'lentary fuzzy set for obstacle avoidance
·180· .18<1'
Note that the first strategy concerns only with signals sent from the perception
module, while the latter two are related to a subgoal event that is sent from the
planning module. Thus, the system has to determine the desired orientation
integrating those three kinds of strategies. For this purpose, it at first organizes a
fuzzy set for each strategy that is separately defmed above the common discourse of
universe, i.e., intermittent 24 orientations arround the robot. For the first and the
second strategies, a fuzzy set is organized by taking an intersection of elementary
fuzzy sets, each of which is organized for an individual reflection point (Fig.5(a))
utilizing its values of distance Pi and orientation 6i as parameters of their
membership functions as shown in Fig.5(b) and (c). As for the third strategy, we
introduce another set of primitive predicates left(x) and right(x), which represent that
landmark x is on the robot's left-hand-side and right-hand-side, respectively. In order
to attain the crossing event specified in the subgoal event, the following
conjunctions of the primitives should be true;
where the primitives left(x) and right(y) imply constraints on the robot's allowed
steering S as follows;
An intersection of the above three kinds of fuzzy sets organized for each
strategy denotes an integrated concept that represents a desirable orientation at a
current position of the robot. From this, the system determines a singleton
orientation having the maximum membership as a desired orientation 6d as
illustrated in Fig.5(c).
Future development will concern mainly the following several tasks. First,
another sensing device such as vision sensor should be introduced for improving the
efficiency in distinguishing landmarks, which requires another planning problem for
sensing tasks. Secondly, the current path-planning only using landmarks is quite
limited especially in a world where the landmarks are distributed sparsely. In such a
situation, another control algorithm like wall-following, as well as the reasoning
capability using part-to-whole relationships of the environment should be
developed. This requires improving a representation of object descriptions to
incorporate different abstract levels of features.
587
landmark F . "
BElWEEN[F,G]
e
landmark C·
posilionZ landmarkG ,
•
"
'-
//
I '
I
,
" BElWEEN[C,E]
I
landmark B / position Y
• BElWEEN[C,O]
landmark E
landmark 0
REFERENCES
[1] Saridis, G.N.: Intelligent Robotic Control, IEEE Trans. on Automatic Control,
AC-28-5, 547-557, 1983.
[2] Agee, P. and Chapman, D.: Pengi: An Implementation of a Theory of Activity,
Proc. of 6th AAAI, 268-272, 1987.
[3] Brooks, R.A.: A Robust Layered Control System for a Mobile Robot, IEEE
Journal of Robotics and Automation, 2-1,14-23,.-1986.
[4] Kuipers, BJ.: Modeling Spatial Knowledge, Cognitive Science, 2, pp.128-
153, 1978.
[5] Hayes-Roth, B. et a1.: A Cognitive Model of Planning, Cognitive Science, 3,
275-310, 1979,
THEORY AND DECISION LIBRARY
1. E.R. Caianiello and M.A. Aizerman (eds.): Topics in the General Theory of
Structures. 1987 ISBN 90-277-2451-2
2. M.E. Carvallo (ed.): Nature, Cognition and System I. Current Systems-
Scientific Research on Natural and Cognitive Systems. With a Foreword by
G.I. Klir. 1988 ISBN 90-277-2740-6
3. A. Di Nola, S. Sessa, W. Pedrycz and E. Sanchez: Fuzzy Relation Equations
and Their Applications to Knowledge Engineering. With a Foreword by L.A.
Zadeh. 1989 ISBN 0-7923-0307-5
4. S. Miyamoto: Fuzzy Sets in Information Retrieval and Cluster Analysis. 1990
ISBN 0-7923-0721-6
5. W.H. Janko, M. Roubens and H.-J. Zimmermann (eds.): Progress in Fuzzy
Sets and Systems. 1990 ISBN 0-7923-0730-5
6. R. Slowinski and J. Teghem (eds.): Stochastic versus Fuzzy Approaches to
Multiobjective Mathematical Programming under Uncertainty. 1990
ISBN 0-7923-0887-5
7. P.L. Dann, S.H. Irvine and J.M. Collis (eds.): Advances in Computer-Based
Human Assessment. 1991 ISBN 0-7923-1071-3
8. V. Novak, J. Ramfk, M. Mares, M. Cerny and J. Nekola (eds.): Fuzzy
Approach to Reasoning and Decision-Making. 1992 ISBN 0-7923-1358-5
9. Z. Pawlak: Rough Sets. Theoretical Aspects of Reasoning about Data. 1991
ISBN 0-7923-1472-7
10. M.E. Carvallo (ed.): Nature, Cognition and System II. Current Systems-
Scientific Research on Natural and Cognitive Systems. Vol. 2: On Com-
plementarity and Beyond. 1992 ISBN 0-7923-1788-2
11. R. Slowinski (ed.): Intelligent Decision Support. Handbook of Applications
and Advances of the Rough Sets Theory. 1992 ISBN 0-7923-1923-0
12. R. Lowen and M. Roubens (eds.): Fuzzy Logic. State of the Art. 1993
ISBN 0-7923-2324-6
13. L. Kitaimik: Fuzzy Decision Procedures with Binary Relations. Toward a
Unified Theory. 1993 ISBN 0-7923-2367-X