Evaluations | A | B | A conflicts B? | A→B |
e1 | 0 | 0 | conflict-free | 1 |
e2 | 0 | 1 | conflict-free | 1 |
e3 | 1 | 0 | conflict-free | 1 |
e4 | 1 | 1 | conflict | 0 |
The Boolean models of argumentation semantics have been established in various ways. These models commonly translate the conditions of extension-based semantics into some constraints of the models. The goal of this work is to explore a simple method to build Boolean models for argumentation. In this paper, the attack relation is treated as an operator, and its value is calculated by the values of its target and source arguments. By examining the values of the attacks, a Boolean model of conflict-free sets is introduced. This novel method simplifies the existing ways by eliminating the various constraints. The conflict-free sets can be calculated by simply checking the values of the attacks.
Citation: Jiachao Wu. A Boolean model for conflict-freeness in argumentation frameworks[J]. AIMS Mathematics, 2023, 8(2): 3913-3919. doi: 10.3934/math.2023195
[1] | Jiachao Wu, Lingqiang Li, Weihua Sun . Gödel semantics of fuzzy argumentation frameworks with consistency degrees. AIMS Mathematics, 2020, 5(4): 4045-4064. doi: 10.3934/math.2020260 |
[2] | Hui Yang, Yi Shi . $L$-biconvex sets on some fuzzy algebraic substructures. AIMS Mathematics, 2020, 5(5): 4311-4321. doi: 10.3934/math.2020275 |
[3] | Liying Yang, Jinjin Li, Yiliang Li, Qifang Li . Sub-base local reduct in a family of sub-bases. AIMS Mathematics, 2022, 7(7): 13271-13277. doi: 10.3934/math.2022732 |
[4] | Imran Shahzad Khan, Choonkil Park, Abdullah Shoaib, Nasir Shah . A study of fixed point sets based on Z-soft rough covering models. AIMS Mathematics, 2022, 7(7): 13278-13291. doi: 10.3934/math.2022733 |
[5] | Claude Carlet . Identifying codewords in general Reed-Muller codes and determining their weights. AIMS Mathematics, 2024, 9(5): 10609-10637. doi: 10.3934/math.2024518 |
[6] | Abd El-Mohsen Badawy, Alaa Helmy . Permutabitity of principal $ MS $-algebras. AIMS Mathematics, 2023, 8(9): 19857-19875. doi: 10.3934/math.20231012 |
[7] | N. Pazhaniraja, Shakila Basheer, Kalaipriyan Thirugnanasambandam, Rajakumar Ramalingam, Mamoon Rashid, J. Kalaivani . Multi-objective Boolean grey wolf optimization based decomposition algorithm for high-frequency and high-utility itemset mining. AIMS Mathematics, 2023, 8(8): 18111-18140. doi: 10.3934/math.2023920 |
[8] | Muhammad Arshad, Muhammad Saeed, Khuram Ali Khan, Nehad Ali Shah, Wajaree Weera, Jae Dong Chung . A robust MADM-approach to recruitment-based pattern recognition by using similarity measures of interval-valued fuzzy hypersoft set. AIMS Mathematics, 2023, 8(5): 12321-12341. doi: 10.3934/math.2023620 |
[9] | Xiaoyu Zhao, Shihua Fu . Trajectory tracking approach to logical (control) networks. AIMS Mathematics, 2022, 7(6): 9668-9682. doi: 10.3934/math.2022538 |
[10] | Muhammad Naeem, Aziz Khan, Shahzaib Ashraf, Saleem Abdullah, Muhammad Ayaz, Nejib Ghanmi . A novel decision making technique based on spherical hesitant fuzzy Yager aggregation information: application to treat Parkinson's disease. AIMS Mathematics, 2022, 7(2): 1678-1706. doi: 10.3934/math.2022097 |
The Boolean models of argumentation semantics have been established in various ways. These models commonly translate the conditions of extension-based semantics into some constraints of the models. The goal of this work is to explore a simple method to build Boolean models for argumentation. In this paper, the attack relation is treated as an operator, and its value is calculated by the values of its target and source arguments. By examining the values of the attacks, a Boolean model of conflict-free sets is introduced. This novel method simplifies the existing ways by eliminating the various constraints. The conflict-free sets can be calculated by simply checking the values of the attacks.
Argumentation is a non-monotonic reasoning model based on the construction and evaluation of interacting arguments. One of the most widely studied argumentation systems is Dung's abstract argumentation frameworks (abbreviated as AF) [1]. An AF consists of a set of arguments and a binary attack relation between the arguments. Based on conflict-freeness and acceptability, a series of extension-based semantics is established, including admissible extensions, stable extensions, preferred extensions, etc.
The computation of argumentation semantics is critical and complex when the arguments and attacks are numerous. People explored several methods to calculate them. For example, Caminada [2] introduced the labelling approach, where each argument is assigned a value in the set {in, out, undecide}, and the semantics are checked according to legal principles. Liao [3] investigated the dynamic AFs, which reduce the computation complexity when the AF's arguments increase or reduce. Pu et al. [4] solved the complex problem with Boolean vectors and Boolean matrices. Cerutti et al. [5] summarized the Boolean satisfaction of the AFs. This paper is also a study in the Boolean approach. Its goal is to investigate a simple Boolean model for argumentation.
In this paper, an evaluation of an AF assigns each argument a value of 0 or 1. Every attack is considered as an operator between arguments. Its value is calculated according to the interpreted values of its target and its source arguments. Then, by checking the values of the attack, an evaluation can be checked to be some semantics or not. Following this idea, a Boolean model of conflict-free sets is established, where the value of each attack should be 1. Moreover, the soundness and the completeness are given.
This work provides a new Boolean method for computing conflict-free sets. It simplifies the previous Boolean methods by removing the various constraints. The calculation process avoids checking these constraints. Hence, the new method is efficient. At the same time, the idea of this method demonstrates a possible way of constructing Boolean models for other semantics. Therefore, this work is also an exploration of new methods for the Boolean solutions for AFs.
The contents are arranged as follows. In Section 2, we recall the theory of Dung's AFs and Boolean algebras. In Section 3, we introduce a Boolean algebra-based conflict-free model for an AF. In Section 4, some related work is discussed. Finally, the last section concludes.
Boolean algebra has a history of more than one hundred years and has been widely applied in mathematical logic. A Boolean algebra is a tuple (A,∧,∨,¬), where ∧, ∨ and ¬ are operations on the set A. In this paper, the set A is selected as {0,1}, and the three operations are defined as follows: ∀x,y∈{0,1}:
x∧y=xy=min{x,y};x∨y=x+y−xy=max{x,y};¬x=1−x. |
A Dung's AF contains a set of arguments and a set of attack relations between the arguments.
Definition 2.1. An AF is a pair (Args,Atts) where Args is a set of arguments and Atts⊆Args×Args shows the attack relation between the arguments.
For example, an attack (A,B)∈Atts means that the argument A attacks the argument B. In AF theory, (A,B)∈Atts is usually denoted by A→B, where the arrow symbol → is not a logic operator.
Given S⊆Args, the set R+(S)={A∈Args:∃B∈S s.t. B→A} represents all the arguments attacked by S, and the set R−(S)={A∈Args:∃B∈S s.t. A→B} represents all the arguments attacking S.
The semantics of AFs are based on two key notions: conflict-free sets and acceptability.
Definition 2.2. (Conflict-free sets) A set S⊆Args is conflict-free if there are no arguments A,B∈S such that (A,B)∈Atts.
Definition 2.3. (Acceptability) An argument A∈Args is acceptable to (or defended by) a set S⊆Args if for every B∈Args s.t. (B,A)∈Atts, there is some C∈S s.t. (C,B)∈Atts.
A variety of semantics are then established. For instance, an admissible extension is a conflict-free set of arguments which defends each argument in it; a complete extension is an admissible extension including every element it defends; a preferred extension is the maximal admissible extensions; and a stable extension is a conflict-free set which attacks each element out of it.
In this section, a Boolean algebra-based algorithm is presented for calculating conflict-free sets. In line with embedding proposition logic in Boolean algebra, we assign a number in {0,1} to each argument and then calculate a value for each attack. The same as before, 1 means valid or accepted, and 0 stands for rejection.
Definition 3.1. Given an AF (Args,Att), an evaluation e on it is a total function from Args to {0,1}, assigning each argument A a number e(A)∈{0,1}.
Obviously, if an AF has n elements, then there are 2n evaluations.
Example 3.1. Consider the AF: A→B→C, where the letters stand for arguments, and the arrows stand for attacks. There are 23=8 evaluations from e1={0,0,0} to e8={1,1,1}.
Several approaches have been introduced to check whether an evaluation e is conflict-free. Here, we examine it by computing the values of all the attacks: When the values of all the attacks are 1, e is regarded as conflict-free.
According to Definition 2.2, if there exists an attack A→B in an AF, then conflict-free semantics must reject at least one of A and B. In other words, e(A) and/or e(B) is 0. In these cases, we assign value 1 to the attack A→B as the evaluation of this attack, as shown in Table 1. Intuitively, value 1 on an attack indicates that the status of this attack adheres to conflict-free semantics. Otherwise, when both e(A) and e(B) are 1, we assign number 0 to A→B, meaning that given the status of arguments A and B, A→B blocks A,B being conflict-free.
Evaluations | A | B | A conflicts B? | A→B |
e1 | 0 | 0 | conflict-free | 1 |
e2 | 0 | 1 | conflict-free | 1 |
e3 | 1 | 0 | conflict-free | 1 |
e4 | 1 | 1 | conflict | 0 |
According to the above table, the values of attacks can be calculated by a binary operator ∗ on {0, 1}, where
∀a,b∈{0,1}, a∗b=¬a∨¬b=¬(a∧b). |
Therefore, we introduce the next definition for the values of the attacks.
Definition 3.2. Given an evaluation e of an AF (Args,Att), for each attack A→B∈Atts,
e(A→B)=e(A)∗e(B)=¬e(A)∨¬e(B). |
Example 3.2. (Continued from Example 3.1) The evaluation in Example 3.1 can be extended to include the evaluation of the attacks, as shown in Table 2.
Evaluations | A | B | C | A→B | B→C |
e1 | 0 | 0 | 0 | 1 | 1 |
e2 | 0 | 0 | 1 | 1 | 1 |
e3 | 0 | 1 | 0 | 1 | 1 |
e4 | 0 | 1 | 1 | 1 | 0 |
e5 | 1 | 0 | 0 | 1 | 1 |
e6 | 1 | 0 | 1 | 1 | 1 |
e7 | 1 | 1 | 0 | 0 | 1 |
e8 | 1 | 1 | 1 | 0 | 0 |
Given an attack A→B, if a set of arguments S, prescribed by an evaluation e, is conflict-free (i.e., ∃X∈{A,B} s.t. X∉S), then we say e models A→B. This is captured by the following definition.
Definition 3.3. Given an attack α in an AF, an evaluation e models α if its value is 1, i.e., e(α)=1.
Example 3.3. (Continued from Example 3.2) Obviously, e4 models A→B, but it does not model B→C. While e7 models B→C, it does not model A→B. The evaluations e1, e2, e3, e5 and e6 model both A→B and B→C.
Given an AF, if an evaluation models all the attacks, then the set of arguments prescribed by this evaluation is conflict-free. We call such an evaluation a conflict-free model.
Definition 3.4. Given an AF, a conflict-free model of the attack is an evaluation e on the AF, where it models every attack in the AF.
Example 3.4. (Continued from Example 3.2) From the above table, we can see that e1, e2, e3, e5 and e6 are conflict-free models, and e4, e7 and e8 are not.
The next two theorems provide soundness and completeness of our model. They follow from the establishing process of the conflict-free models in Definition 3.4.
Theorem 3.1. (Soundness) Given an AF, let e be a Boolean model of it. Then, the set {A∈Args:e(A)=1} is a conflict-free set in the AF.
Theorem 3.2. (Completeness) Given an AF, let S be a conflict-free set in it. Then, the function e:Args⟶{0,1} defined in Eq (3.1) is a Boolean model of the AF.
e(A)={1,ifA∈S,0,otherwise. | (3.1) |
Dung's AF theory has proven to be a simple and powerful theoretical analysis tool, and it has been applied in many fields of artificial intelligence, ranging from decision-making [6,7], multi-agent systems [8,9,10], input/output systems [11,12,13,14] to law [15], voting [16], etc. Theoretically, the AF theory has been developed in various ways [17]. For example, [18] studied the ranking semantics. The work [19] investigated AFs with support relation. The works [20,21,22,23] discussed the gradual AFs.
Boolean algebra and its extended forms [24,25,26] are classical tool in exploring logic semantics. The Boolean satisfaction problem is, of course, an interesting and useful topic in AF theory. Cerutti et al. reviewed previous works in Boolean approaches in [5]. Dung's original restrictions for each semantics are translated into a complex formula. An evaluation is a Boolean model of some semantics, if the corresponding formula is valid. Pu et al. introduced a Boolean method in [4] by Boolean-vectors and Boolean-matrices. Similar to other works, for each semantics, there are around four constraints to represent Dung's original conditions. Every Boolean model satisfies all the constraints.
Unlike these existing methods, our method does not translate the original conditions. On the contrary, whether an evaluation is a Boolean model is determined by the calculated attack values. When the values of all the attacks are 1, the evaluation is considered as a conflict-free model. This method avoids the steps to check the kinds of constraints. Therefore, our method simplifies the previous methods. Furthermore, this method can possibly be extended for other semantics. Hence, it provides a novel and simple idea for the establishment of Boolean models of AF semantics.
At the same time, there are some weaknesses in our work. First of all, this work is only the first step to follow this idea, and it only provides Boolean models for conflict-free sets. Second, although our Boolean conflict-free model can calculate all the conflict-free sets in an AF, its efficiency is not high. For example, if the cardinality of the arguments set is n, it needs to check 2n evaluation functions.
Mathematical models of propositional logic transform logic deduction into algebraic calculations. The Boolean model of an AF also connects the derivation of the semantics with computation in a Boolean structure.
This paper builds the Boolean evaluations of an AF by viewing the attack relation as a connection between arguments, which is mapped to a composite operator in the Boolean algebra. Then, the concept of conflict-free models is introduced, and the soundness and completeness theorems are given.
The main contribution is a new way to build Boolean models for argumentation. Different from the constraints in the existing works, the argument semantics can be simply checked by checking the attacks' values. Another contribution is the establishment of the Boolean models for conflict-free sets. This new model of conflict-free sets demonstrates our idea to build Boolean semantics. It also provides a foundation for further exploration of Boolean models for argumentation semantics.
In the future, we will discuss the Boolean models of other extensions, like complete extensions, stable extensions, etc. Also, the models of extended AFs can be discussed.
The author declares no conflict of interest.
[1] |
P. M. Dung, On the acceptability of arguments and its fundamental role in nonmonotonic reasoning, logic programming and n-person games, Artif. Intell., 77 (1995), 321–357. https://doi.org/10.1016/0004-3702(94)00041-X doi: 10.1016/0004-3702(94)00041-X
![]() |
[2] | M. Caminada, On the issue of reinstatement in argumentation, In: Logics in artificial intelligence, Berlin, Heidelberg: Springer, 2006,111–123. https://doi.org/10.1007/11853886_11 |
[3] |
B. S. Liao, L. Jin, R. C. Koons, Dynamics of argumentation systems: a division-based method, Artif. Intell., 175 (2011), 1790–1814. https://doi.org/10.1016/j.artint.2011.03.006 doi: 10.1016/j.artint.2011.03.006
![]() |
[4] |
F. Pu, G. M. Luo, Z. Jiang, Encoding argumentation semantics by Boolean algebra, IEICE Trans. Inform. Syst., E100-D (2017), 838–848. https://doi.org/10.1587/transinf.2016EDP7313 doi: 10.1587/transinf.2016EDP7313
![]() |
[5] | F. Cerutti, S. A. Gaggl, M. Thimm, J. P. Wallner, Foundations of implementations for formal argumentation, IfCoLog J. Log. Appl., 4 (2017), 2623–2705. |
[6] |
J. Ahmmad, T. Mahmood, R. Chinram, A. Iampan, Some average aggregation operators based on spherical fuzzy soft sets and their applications in multi-criteria decision making, AIMS Math., 6 (2021), 7798–7832. https://doi.org/10.3934/math.2021454 doi: 10.3934/math.2021454
![]() |
[7] |
A. Saha, D. Dutta, S. Kar, Some new hybrid hesitant fuzzy weighted aggregation operators based on Archimedean and Dombi operations for multi-attribute decision making, Neural Comput. Appl., 33 (2021), 8753–8776. https://doi.org/10.1007/s00521-020-05623-x doi: 10.1007/s00521-020-05623-x
![]() |
[8] |
S. P. Ferrando, E. Onaindia, Defeasible-argumentation-based multi-agent planning, Inform. Sci., 411 (2017), 1–22. https://doi.org/10.1016/j.ins.2017.05.014 doi: 10.1016/j.ins.2017.05.014
![]() |
[9] |
X. D. Li, X. Y. Yang, S. J. Song, Lyapunov conditions for finite-time stability of time-varying time-delay systems, Automatica, 103 (2019), 135–140. https://doi.org/10.1016/j.automatica.2019.01.031 doi: 10.1016/j.automatica.2019.01.031
![]() |
[10] |
X. Xie, T. D. Wei, X. D. Li, Hybrid event-triggered approach for quasi-consensus of uncertain multi-agent systems with impulsive protocols, IEEE Trans. Circuits Syst. I. Regul. Pap., 69 (2022), 872–883. https://doi.org/10.1109/TCSI.2021.3119065 doi: 10.1109/TCSI.2021.3119065
![]() |
[11] |
P. Baroni, G. Boella, F. Cerutti, M. Giacomin, L. van der Torre, S. Villata, On the input/output behavior of argumentation frameworks, Artif. Intell., 217 (2014), 144–197. https://doi.org/10.1016/j.artint.2014.08.004 doi: 10.1016/j.artint.2014.08.004
![]() |
[12] |
X. D. Li, P. Li, Input-to-state stability of nonlinear systems: event-triggered impulsive control, IEEE Trans. Automat. Control, 67 (2022), 1460–1465. https://doi.org/10.1109/TAC.2021.3063227 doi: 10.1109/TAC.2021.3063227
![]() |
[13] |
X. D. Li, T. X. Zhang, J. H. Wu, Input-to-state stability of impulsive systems via event-triggered impulsive control, IEEE Trans. Cybernet., 52 (2022), 7187–7195. https://doi.org/10.1109/TCYB.2020.3044003 doi: 10.1109/TCYB.2020.3044003
![]() |
[14] |
X. D. Li, H. T. Zhu, S. J. Song, Input-to-state stability of nonlinear systems using observer-based event-triggered impulsive control, IEEE Trans. Syst. Man Cybernet., 51 (2021), 6892–6900. https://doi.org/10.1109/TSMC.2020.2964172 doi: 10.1109/TSMC.2020.2964172
![]() |
[15] |
K. Atkinson, T. Bench-Capon, Argumentation schemes in AI and law, Argum. Comput., 12 (2021), 417–434. https://doi.org/10.3233/AAC-200543 doi: 10.3233/AAC-200543
![]() |
[16] |
I. Benedetti, S. Bistarelli, From argumentation frameworks to voting systems and back, Fund. Inform., 150 (2017), 25–48. https://doi.org/10.3233/FI-2017-1459 doi: 10.3233/FI-2017-1459
![]() |
[17] |
P. Baroni, F. Toni, B. Verheij, On the acceptability of arguments and its fundamental role in nonmonotonic reasoning, logic programming and n-person games: 25 years later, Argum. Comput., 11 (2020), 1–14. https://doi.org/10.3233/AAC-200901 doi: 10.3233/AAC-200901
![]() |
[18] | K. Skiba, T. Rienstra, M. Thimm, J. Heyninck, G. Kern-Isberner, Ranking extensions in abstract argumentation, In: Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021, 2047–2053. https://doi.org/10.24963/ijcai.2021/282 |
[19] |
M. G. E. Gonzalez, M. C. D. Budán, G. I. Simari, G. R. Simari, Labeled bipolar argumentation frameworks, J. Artif. Intell. Res., 70 (2021), 1557–1636. https://doi.org/10.1613/jair.1.12394 doi: 10.1613/jair.1.12394
![]() |
[20] |
J. C. Wu, L. Q. Li, W. H. Sun, Gödel semantics of fuzzy argumentation frameworks with consistency degrees, AIMS Math., 5 (2020), 4045–4064. https://doi.org/10.3934/math.2020260 doi: 10.3934/math.2020260
![]() |
[21] |
S. Y. Zhao, J. C. Wu, An efficient algorithm of fuzzy reinstatement labelling, AIMS Math., 7 (2022), 11165–11187. https://doi.org/10.3934/math.2022625 doi: 10.3934/math.2022625
![]() |
[22] |
L. Amgoud, D. Doder, S. Vesic, Evaluation of argument strength in attack graphs: foundations and semantics, Artif. Intell., 302 (2022), 103607. https://doi.org/10.1016/j.artint.2021.103607 doi: 10.1016/j.artint.2021.103607
![]() |
[23] |
P. E. Dunne, A. Hunter, P. McBurney, S. Parsons, M. Wooldridge, Weighted argument systems: basic definitions, algorithms, and complexity results, Artif. Intell., 175 (2011), 457–486. https://doi.org/10.1016/j.artint.2010.09.005 doi: 10.1016/j.artint.2010.09.005
![]() |
[24] |
H. X. Liu, EBL-algebras, Soft Comput., 24 (2020), 14333–14343. https://doi.org/10.1007/s00500-020-05235-6 doi: 10.1007/s00500-020-05235-6
![]() |
[25] | F. Xie, H. X. Liu, Ehoops, J. Mult. Valued Logic Soft Comput., 37 (2021), 77–106. |
[26] |
H. X. Liu, On topology of maximal ideals of EBL-algebras, Soft Comput., 26 (2022), 4541–4552. https://doi.org/10.1007/s00500-022-06860-z doi: 10.1007/s00500-022-06860-z
![]() |
Evaluations | A | B | A conflicts B? | A→B |
e1 | 0 | 0 | conflict-free | 1 |
e2 | 0 | 1 | conflict-free | 1 |
e3 | 1 | 0 | conflict-free | 1 |
e4 | 1 | 1 | conflict | 0 |
Evaluations | A | B | C | A→B | B→C |
e1 | 0 | 0 | 0 | 1 | 1 |
e2 | 0 | 0 | 1 | 1 | 1 |
e3 | 0 | 1 | 0 | 1 | 1 |
e4 | 0 | 1 | 1 | 1 | 0 |
e5 | 1 | 0 | 0 | 1 | 1 |
e6 | 1 | 0 | 1 | 1 | 1 |
e7 | 1 | 1 | 0 | 0 | 1 |
e8 | 1 | 1 | 1 | 0 | 0 |