Processing math: 53%
Research article Special Issues

Contactless temperature and distance measuring device: A low-cost, novel infrared ―based "Badge"-shaped structural model for measuring physical distance and body temperature

  • Academic editor: Reza K. Amineh
  • This work eases the feasibility of infrared thermometer application and reliability to introduce a novel design with upgraded applications & functions. The custom-designed compact device "Badge" structured comprises the operative methods through the electronic packages of an optimal level. The physical and social distance measured by the ToF (Time of Flight) infrared laser sensor within 1 m from the subject and the measuring equipment (MLX90632 SMD QFN and VL530LX ToF). When the distance is not maintained, or the physical distance condition is not met, the flashing LED, or vibration should trigger an indication (warning for physical distancing and alteration for pyrexia warning, respectively). Statistical analysis and simulation-based studies criticized the accuracy of ±0.5°F and relational model of the independent and dependent variable for this device with significant R2 = 0.99 and P < = 1; values with the lowest accuracy error of ±0.2°F and least residual sum of squares 0.01462 values. The portable, lightweight, and dynamic body temperature monitoring altered the application from static to continuous, complete structural design. This alternative provides the best technique to combine worn (personnel) medical devices with primary healthcare instruments to help body temperature measurements that are not contactable, fast, and accurate. It builds a way of processing through the protocol Covid-19.

    Citation: Abhijeet Kumar, Arpit Kumar. Contactless temperature and distance measuring device: A low-cost, novel infrared ―based 'Badge'-shaped structural model for measuring physical distance and body temperature[J]. AIMS Electronics and Electrical Engineering, 2022, 6(1): 43-60. doi: 10.3934/electreng.2022004

    Related Papers:

    [1] Yinyin Wu, Fanfan Chen, Qingchi Ma, Dingbian Qian . Subharmonic solutions for degenerate periodic systems of Lotka-Volterra type with impulsive effects. AIMS Mathematics, 2023, 8(9): 20080-20096. doi: 10.3934/math.20231023
    [2] Chunmei Song, Qihuai Liu, Guirong Jiang . Harmonic and subharmonic solutions of quadratic Liénard type systems with sublinearity. AIMS Mathematics, 2021, 6(11): 12913-12928. doi: 10.3934/math.2021747
    [3] Faizan A. Khan, Rohit K. Bhardwaj, Tirth Ram, Mohammed A. S. Tom . On approximate vector variational inequalities and vector optimization problem using convexificator. AIMS Mathematics, 2022, 7(10): 18870-18882. doi: 10.3934/math.20221039
    [4] Kirti Kaushik, Anoop Kumar, Aziz Khan, Thabet Abdeljawad . Existence of solutions by fixed point theorem of general delay fractional differential equation with p-Laplacian operator. AIMS Mathematics, 2023, 8(5): 10160-10176. doi: 10.3934/math.2023514
    [5] José L. Díaz . Non-Lipschitz heterogeneous reaction with a p-Laplacian operator. AIMS Mathematics, 2022, 7(3): 3395-3417. doi: 10.3934/math.2022189
    [6] Sabbavarapu Nageswara Rao, Abdullah Ali H. Ahmadini . Multiple positive solutions for system of mixed Hadamard fractional boundary value problems with (p1,p2)-Laplacian operator. AIMS Mathematics, 2023, 8(6): 14767-14791. doi: 10.3934/math.2023755
    [7] Hai-yun Deng, Jue-liang Zhou, Yu-bo He . Existence of periodic solutions for a class of (ϕ1,ϕ2)-Laplacian discrete Hamiltonian systems. AIMS Mathematics, 2023, 8(5): 10579-10595. doi: 10.3934/math.2023537
    [8] Qitong Ou, Huashui Zhan . The viscosity solutions of a nonlinear equation related to the p-Laplacian. AIMS Mathematics, 2017, 2(3): 400-421. doi: 10.3934/Math.2017.3.400
    [9] Shaomin Wang, Cunji Yang, Guozhi Cha . On the variational principle and applications for a class of damped vibration systems with a small forcing term. AIMS Mathematics, 2023, 8(9): 22162-22177. doi: 10.3934/math.20231129
    [10] Hany A. Hosham, Alaa A. Alzulaibani, Tarek Sellami, Khaled Sioud, Thoraya N. Alharthi . A class of discontinuous systems exhibit perturbed period doubling bifurcation. AIMS Mathematics, 2024, 9(9): 25098-25113. doi: 10.3934/math.20241223
  • This work eases the feasibility of infrared thermometer application and reliability to introduce a novel design with upgraded applications & functions. The custom-designed compact device "Badge" structured comprises the operative methods through the electronic packages of an optimal level. The physical and social distance measured by the ToF (Time of Flight) infrared laser sensor within 1 m from the subject and the measuring equipment (MLX90632 SMD QFN and VL530LX ToF). When the distance is not maintained, or the physical distance condition is not met, the flashing LED, or vibration should trigger an indication (warning for physical distancing and alteration for pyrexia warning, respectively). Statistical analysis and simulation-based studies criticized the accuracy of ±0.5°F and relational model of the independent and dependent variable for this device with significant R2 = 0.99 and P < = 1; values with the lowest accuracy error of ±0.2°F and least residual sum of squares 0.01462 values. The portable, lightweight, and dynamic body temperature monitoring altered the application from static to continuous, complete structural design. This alternative provides the best technique to combine worn (personnel) medical devices with primary healthcare instruments to help body temperature measurements that are not contactable, fast, and accurate. It builds a way of processing through the protocol Covid-19.



    As we all know, the membership grades of type-1 fuzzy sets (T1 FSs) are crisp numbers as 0 or 1, therefore, the membership functions (MFs) of T1 FSs are not inherently uncertain and they can only measure uncertainties in a limited scope. The membership grades of interval type-2 fuzzy sets (IT2 FSs) are intervals, so the IT2 FSs are capable of better model uncertainties [1,2]. In the past decades, great progresses have been made transiting from type-1 fuzzy logic systems (T1 FLSs) to interval type-2 fuzzy logic systems (IT2 FLSs). IT2 FLSs based on IT2 FSs can approximate real continuous functions defined on compact sets with arbitrary accuracy. Furthermore, IT2 FLSs have been successfully applied in many fields with uncertainty, nonlinearity and time-varying characteristics like autonomous mobile robots [3,4], intelligent controllers [5], financial systems [6], power systems [7,8], permanent magnetic drive [9,10,11], edge detection [12], medical systems [13] and hot strip mill [14,15] and so on.

    Generally speaking, IT2 FLSs (see Figure 1) are composed of fuzzifier, rules, inference [16], type-reducer and defuzzifier. Among which, the block of type-reduction (TR) under the guidance of inference plays the central role, and its main function is to transform the IT2 FS to the T1 FS. Then the defuzzification changes the T1 FS to the crisp output. The operations in TR are the differences between T1 and IT2 FLSs, which makes the latter with more challenges.

    Figure 1.  An IT2 FLS [2,17].

    Currently, the computationally intensive iterative Karnik-Mendel (KM) algorithms and enhanced Karnik-Mendel (EKM) algorithms [18,19,20] are the most popular approaches for performing the TR. These two types of algorithms have the advantages of preserving the uncertainties flow in the systems and converge in super-convergence speed. However, the initializations of KM and EKM algorithms are usually given by trial and error of extensive simulation experiments. This paper analyzes the initializations [21] of KM and EKM algorithms, and provides reasonable initialization EKM (RIEKM) algorithms for performing the centroid TR and defuzzification of IT2 FLSs. According the accurate benchmark CNT algorithms [22], the proposed RIEKM algorithms have smaller absolute errors and faster convergence speeds compared with the EKM algorithms.

    The rest of this paper is organized as follows. Section 2 gives the background of IT2 FLSs. Section 3 provides the RIEKM algorithms, and how to adopt them to perform the centroid TR of IT2 FLSs. In Section 4, four computer simulation experiments are used to illustrate and analyze the performances of RIEKM algorithms. Finally the conclusions and expectations are given in Section 5.

    The rules uncertainties of IT2 FLSs generate from numerical or language uncertainties in knowledge, while these uncertainties can be solved by T2 FSs. In fact, the concept of T2 FSs can be viewed as the extension of concept of T1 FSs.

    Definition 1. A T2 FS ˜A can be characterized by its T2 MF μ˜A(x,u), i.e.,

    ˜A={(x,u),μ˜A(x,u)|xX,u[0,1]} (1)

    in which the primary variable xX, and the secondary variable u[0,1], here equation (1) is usually referred to as the point-value expression, and whose compact form is as:

    ˜A=xXuJx[0,1]μ˜A(x,u)/(x,u). (2)

    Definition 2. A vertical slice of μ˜A(x,u) is the secondary MF, i.e.,

    μ˜A(x=x,u)μ˜A(x)=uJxfx(u)/u. (3)

    Definition 3. The two dimensional support of μ˜A(x,u) is called as the footprint of uncertainty (FOU), i.e.,

    FOU(˜A)={(x,u)X×[0,1]|μ˜A(x,u)>0} (4)

    here the upper and lower bounds of FOU(˜A) are referred to as the upper MF (UMF) and lower MF (LMF), respectively, i.e.,

    UMF(˜A)=¯μ˜A(x)=¯FOU(˜A),LMF(˜A)=μ_˜A(x)=FOU(˜A)_. (5)

    For any IT2 FSs, they can be completely characterized by their UMFs and LMFs. That’s because the secondary membership grades of IT2 FSs must be equal to 1, i.e., fx(u)1.

    From the aspect of inference structure, IT2 FLSs can be divided into Mamdani type [7,11,14] and Takagi-Sugeno-Kang (TSK) type [10,15]. Without loss of generality, consider a Mamdani IT2 FLS with p inputs x1X1,x2X2,,xpXp and one output yY, there are a total of M fuzzy rules, where the lth rule is of the form:

     If   x1   is   ˜Fl1   and   x2   is    ˜Fl2   and      and   xp   is   ˜Flp, then   y   is   ˜Gl  (l=1,Λ,M) (6)

    In order to simplify the expressions, we model the input measurements as crisp sets, i.e., singleton fuzzifier is adopted. Then the process of fuzzy reasoning [7,16,23] is given as follows:

    The fuzzy relation of each fuzzy rule is as:

    ˜Rl:˜Fl1טFl2טFlp˜Gl=˜Al˜Gl (7)

    whose MF is as:

    μ˜Rl(x,y)=μ˜Al˜Gl(x,y)=[pi=1μ˜Fli(xi)]μ˜Gl(y) (8)

    where the sign is the product or minimum t-norm [24].

    The T2 output of each fuzzy rule is ˜Bl=Ax˜Rl, and whose MF is as:

    μ˜Bl(y)=xX[μAx(x)μ˜Al˜Gl(x,y)]=μ˜Gl(y)[pi=1μ˜Fli(xi)]=μ˜Gl(y)Fl(x) (9)

    in which is the composition operation, and is the maximum t-norm. Fl(x) is the defined firing interval, i.e.,

    Fl:{Fl(x)[f_l(x),¯fl(x)]f_l(x)pi=1μ_˜Fli(xi)¯fl(x)pi=1¯μ˜Fli(xi) (10)

    Here the most popular centroid TR approach [21] is selected, i.e., the output IT2 FS ˜Bl of each rule (which generates by merging each fuzzy rule and its corresponding consequent IT2 FS) is described as:

    {FOU(˜Bl)=[μ_˜Bl(y|x),¯μ˜Bl(y|x)]μ_˜Bl(y|x)=f_l(x)μ_˜Gl(y)¯μ˜Bl(y|x)=¯fl(x)¯μ˜Gl(y) (11)

    where denotes the product or minimum t-norm.

    Then agammaegating all the firing rule IT2 FS ˜Bl to obtain the final output ˜B, i.e.,

    ˜B:{FOU(˜B)=[μ_˜B(y|x),¯μ˜B(y|x)]μ_˜B(y|x)=μ_˜B1(y|x)μ_˜BM(y|x)¯μ˜B(y|x)=¯μ˜B1(y|x)¯μ˜BM(y|x) (12)

    where represents the maximum operation. Then the type-reduced set YC can be obtained by computing the centroid C˜B of ˜B, i.e.,

    YC=C˜B=1/[l˜B,r˜B] (13)

    where l˜B and r˜B can be computed by KM types of algorithms as:

    l˜B=mink=1,,Nl˜B(k)=mink=1,,Nki=1yi¯μ˜B(yi)+Ni=k+1yiμ_˜B(yi)ki=1¯μ˜B(yi)+Ni=k+1μ_˜B(yi) (14)
    r˜B=maxk=1,,Nr˜B(k)=maxk=1,,Nki=1yiμ_˜B(yi)+Ni=k+1yi¯μ˜B(yi)ki=1μ_˜B(yi)+Ni=k+1¯μ˜B(yi) (15)

    where N is the number of sampling of primary variable y, and k is the switch point.

    Finally the crisp output is computed by taking the arithmetic average of l˜B and r˜B, i.e.,

    y=(l˜B+r˜B)/2. (16)

    First of all, we derive the theoretical interpretations of initialization of KM and EKM algorithms. Let a=y1<y2<<yN=b, then the continuous KM and EKM algorithms compute as (see Eqs (14) and (15)):

    l˜B=minξ[a,b]Fl(ξ)=minξ[a,b]ξay¯μ˜B(y)dy+bξyμ_˜B(y)dyξa¯μ˜B(y)dy+bξμ_˜B(y)dy (17)
    r˜B=minξ[a,b]Fr(ξ)=minξ[a,b]ξayμ_˜B(y)dy+bξy¯μ˜B(y)dyξaμ_˜B(y)dy+bξ¯μ˜B(y)dy. (18)

    In addition, the specific computation steps of CKM and CEKM algorithms are given in Tables 1 and 2. According to the notations Fl in (17) and Fr in (18), from Steps 2 and 4 in Table 1, we can find:

    ξl=Fl(ξ), and  ξl=ξ (19)
    ξr=Fr(ξ), and   ξr=ξ. (20)
    Table 1.  CKM algorithms [18,21,25] for computing the centroid of ˜B.
    Step CKM algorithm for l˜B,
    l˜B=minθ(y)[μ_˜B(y),¯μ˜B(y)]bayθ(y)dybaθ(y)dy
    1 Let θ(y)=[μ_˜B(y)+¯μ˜B(y)]/2, and compute ξ=bayθ(y)dybaθ(y)dy.
    2 Set θ(y)=¯μ˜B(y) when yξ, and θ(y)=μ_˜B(y) when y>ξ, and compute ξl=bayθ(y)dybaθ(y)dy.
    3 Check if |ξξl|ε(ε is a given error bound), if yes, stop and set l˜B=ξl, if no, go to Step 4.
    4 Set ξ=ξl and go to Step 2.
    Step CKM algorithm for r˜B, r˜B=maxθ(y)[μ_˜B(y),¯μ˜B(y)]bayθ(y)dybaθ(y)dy
    1 Let θ(y)=[μ_˜B(y)+¯μ˜B(y)]/2, and compute ξ=bayθ(y)dybaθ(y)dy.
    2 Set θ(y)=μ_˜B(y) when yξ, and θ(y)=¯μ˜B(y) when y>ξ, and compute ξr=bayθ(y)dybaθ(y)dy.
    3 Check if |ξξr|ε(ε is a given error bound), if yes, stop and set r˜B=ξr, if no, go to Step 4.
    4 Set ξ=ξl and go to Step 2.

     | Show Table
    DownLoad: CSV
    Table 2.  CEKM algorithms [18,21,25] for computing the centroid of ˜B.
    Step CEKM algorithm for l˜B
    1 Set c=a+(ba)/2.4, and compute α=cay¯μ˜B(y)dy+bcyμ_˜B(y)dy, β=ca¯μ˜B(y)dy+bcμ_˜B(y)dy, c=α/β.
    2 Check if |cc|ε, if yes, stop and set c=l˜B, if no, go to Step 4.
    3 Compute s=sign(cc), α=α+smax(c,c)min(c,c)y[¯μ˜B(y)μ_˜B(y)]dy, β=β+smax(c,c)min(c,c)[¯μ˜B(y)μ_˜B(y)]dy, c=α/β.
    4 Set c=c,c=c,α=α,β=β and go to Step 2.
    Step CEKM algorithm for r˜B
    1 Set c=a+(ba)/1.7, and compute α=cayμ_˜B(y)dy+bcy¯μ˜B(y)dy, β=caμ_˜B(y)dy+bc¯μ˜B(y)dy, c=α/β.
    2 Check if |cc|ε, if yes, stop and set c=r˜B, if no, go to Step 4.
    3 Compute s=sign(cc), α=αsmax(c,c)min(c,c)y[¯μ˜B(y)μ_˜B(y)]dy, β=βsmax(c,c)min(c,c)[¯μ˜B(y)μ_˜B(y)]dy, c=α/β.
    4 Set c=c,c=c,α=α,β=β and go to Step 2.

     | Show Table
    DownLoad: CSV

    When iterations terminate, l˜B=ξl and r˜B=ξr, therefore

    l˜B=Fl(l˜B),r˜B=Fr(r˜B) (21)

    here l˜B and r˜B are the fixed points of Fl(ξ) and Fr(ξ), respectively. In like manner, the relations of (21) still hold for the CEKM algorithms as in Table 2.

    In order to set the initialization of the algorithms, let μ_˜B(y)=¯μ˜B(y)=θ(y) for all y[a,b], then θ(y)=[μ_˜B(y)+¯μ˜B(y)]/2. In this case, Eqs (17) and (18) become the same, so that,

    l˜B=r˜B=bayθ(y)dybaθ(y)dy=bay[μ_˜B(y)+¯μ˜B(y)]/2dyba[μ_˜B(y)+¯μ˜B(y)]/2dy (22)

    Equation (22) is the initialization approach of CKM algorithms given in Table 1, denoted here as ξ(1), i.e.,

    ξ(1)=bayθ(y)dybaθ(y)dy (23)

    in which θ(y)=[μ_˜B(y)+¯μ˜B(y)]/2.

    The specific computation steps of discrete KM and EKM algorithms are provided in Tables 3 and 4. And the discrete form of ξ(1) is established in Steps 1 and 2 in Table 3, i.e.,

    k(1)={k|ykNi=1yi[μ_˜B(yi)+¯μ˜B(yi)]Ni=1[μ_˜B(yi)+¯μ˜B(yi)]<yk+1,1kN1} (24)
    Table 3.  KM algorithms [18,21,25] for computing the centroid of ˜B.
    Step KM algorithm for l˜B, l˜B=minθi[μ_˜B(yi),¯μ˜B(yi)](Ni=1yiθi)/(Ni=1θi)
    1 Set θ(i)=[μ_˜B(yi)+¯μ˜B(yi)]/2,i=1,,N and compute c=(Ni=1yiθi)/(Ni=1θi).
    2 Find k(1kN1) such that ykc<yk+1.
    3 Set θi=¯μ˜B(yi) when ik, and θi=μ_˜B(yi) when i>k, and compute l˜B(k)=(Ni=1yiθi)/(Ni=1θi).
    4 Check if l˜B(k)=c, if yes, stop and set l˜B(k)=l˜B and k=L, if no, go to Step 5.
    5 Set c=l˜B(k) and go to Step 2.
    Step KM algorithm for r˜B, r˜B=maxθi[μ_˜B(yi),¯μ˜B(yi)](Ni=1yiθi)/(Ni=1θi)
    1 Set θ(i)=[μ_˜B(yi)+¯μ˜B(yi)]/2,i=1,,N and compute c=(Ni=1yiθi)/(Ni=1θi).
    2 Find k(1kN1) such that ykc<yk+1.
    3 Set θi=μ_˜B(yi) when ik, and θi=¯μ˜B(yi) when i>k, and compute r˜B(k)=(Ni=1yiθi)/(Ni=1θi).
    4 Check if r˜B(k)=c, if yes, stop and set r˜B(k)=r˜B and k=R, if no, go to Step 5.
    5 Set c=r˜B(k) and go to Step 2.

     | Show Table
    DownLoad: CSV
    Table 4.  EKM algorithms [18,19,21,25] for computing the centroid of ˜B.
    Step EKM algorithm for l˜B
    1 Set k=[N/2.4] (the nearest integer to N/2.4) and computeα=ki=1yi¯μ˜B(yi)+Ni=k+1yiμ_˜B(yi), β=ki=1¯μ˜B(yi)+Ni=k+1μ_˜B(yi), c=α/β.
    2 Find k(1k<N1) such that ykc<yk+1.
    3 Check if k=k, if yes, stop and set c=l˜B and k=L, if no, go to Step 4.
    4 Compute s=sign(kk), α=α+smax(k,k)i=min(k,k)+1yi[¯μ˜B(yi)μ_˜B(yi)], β=β+smax(k,k)i=min(k,k)+1[¯μ˜B(yi)μ_˜B(yi)], c=α/β.
    5 Set c=c,α=α,β=β,k=k and go to Step 2.
    Step EKM algorithm for r˜B
    1 Set k=[N/1.7] and compute α=ki=1yiμ_˜B(yi)+Ni=k+1yi¯μ˜B(yi), β=ki=1μ_˜B(yi)+Ni=k+1¯μ˜B(yi), c=α/β.
    2 Find k(1k<N1) such that ykc<yk+1.
    3 Check if k=k, if yes, stop and set c=r˜B and k=R, if no, go to Step 4.
    4 Compute s=sign(kk), α=αsmax(k,k)i=min(k,k)+1yi[¯μ˜B(yi)μ_˜B(yi)], β=βsmax(k,k)i=min(k,k)+1[¯μ˜B(yi)μ_˜B(yi)], c=α/β.
    5 Set c=c,α=α,β=β,k=k and go to Step 2.

     | Show Table
    DownLoad: CSV

    this KM initialization approach can provide excellent results as μ_˜B(y) and ¯μ˜B(y) are very close to each other, that’s because it becomes the exact optimal solution of (14) or (15) when μ_˜B(y)=¯μ˜B(y).

    For the EKM algorithms, the initialization approach is based on the difference between μ_˜B(y) and ¯μ˜B(y). Let’s make an assumption that

    ρ=ba¯μ˜B(y)dybaμ_˜B(y)dy. (25)

    Attention that ρ1, because ¯μ˜B(y)μ_˜B(y) for all y[a,b].

    In order to initialize the EKM algorithms, suppose that both μ_˜B(y) and ¯μ˜B(y) be constants for y[a,b], i.e., μ_˜B(y)=n>0, and ¯μ˜B(y)=ρn>0, according to Eq (14), so that

    Fl(ξ)=ξay¯μ˜B(y)dy+bξyμ_˜B(y)dyξa¯μ˜B(y)dy+bξμ_˜B(y)dy=ξaρnydy+bξnydyξaρndy+bξndy=ξaρydy+bξydyξaρdy+bξdy=ρ(ξ2a2)+(b2ξ2)2[ρ(ξa)+(bξ)]. (26)

    Then find the derivative of Fl(ξ), so that

    Fl(ξ)=(ρ1)[ρ(ξa)2(bξ)2]2[ρ(ξa)+(bξ)]2. (27)

    Setting Fl(ξ)=0, therefore

    (bξ)2(ξa)2=ρ,bξξa=ρ. (28)

    Solving Eq (28) for ξ, we can obtain

    ξl=b+aρ1+ρ=a+ba1+ρ. (29)

    For the Eq (27), ξl is the minimum value of Fl(ξ). Because Fl(ξ)<0 for ξ[a,ξl), and Fl(ξ)>0 for ξ(ξl,b]. Therefore, l˜B=Fl(ξl)=ξl.

    In like manners, it can be obtained:

    Fr(ξ)=(ξ2a2)+ρ(b2ξ2)2[(ξa)+ρ(bξ)] (30)

    Therefore,

    Fr(ξ)=(ρ1)[(ξa)2ρ(bξ)2]2[(ξa)+ρ(bξ)]2. (31)

    Setting Fr(ξ)=0, it follows that:

    (bξ)2(ξa)2=1ρ,bξξa=1/ρ. (32)

    Solving Eq (30) for ξ, we can obtain

    ξr=b+a1/ρ1+1/ρ=a+ba1+1/ρ. (33)

    For the Eq (30), ξr is the maximum value of Fr(ξ). Because Fr(ξ)>0 for ξ[a,ξr), and Fr(ξ)<0 for ξ(ξr,b]. Therefore, r˜B=Fr(ξr)=ξr. Considering the Eqs (29) and (33) together, the new initialization approach for ξ can be denoted as ξ(2), i.e.,

    ξ(2)={a+ba1+ρforl˜B,a+ba1+1/ρforr˜B. (34)

    Here ρ1, therefore, ξ(2)a+12(ba) for l˜B, and ξ(2)a+12(ba) for r˜B.

    Comparing the initializations of EKM algorithms in Table 4 and CEKM algorithms in Table 2, the discrete form of Eq (34) can be as:

    k(2)={[N/(1+ρ)]  for  l˜B,[N/(1+1/ρ)]  for  r˜B. (35)

    where N denotes the number of sampling of primary variable, and this ρ=[Ni=1¯μ˜B(y)]/[Ni=1μ_˜B(y)].

    Interestingly, when ρ=2, it can be obtained that1+ρ=1+22.4, and 1+1/ρ=1+1/21.7, therefore, the equation (35) becomes:

    k(2)={[N/2.4]  for  l˜B,[N/1.7]  for  r˜B. (36)

    Equation (36) is just the initialization approach of EKM algorithms, which generates from empirical extensive simulation experiments. For the proposed reasonable initialization EKM (RIEKM) algorithms, we should determine each specific ρ for the corresponding simulations. Finally the specific computation steps of discrete RIEKM algorithms are provided in Table 5.

    Table 5.  RIEKM algorithms for computing the centroid of ˜B.
    Step RIEKM algorithm for l˜B
    1 Set k=[N/(1+ρ)] (ρ=[Ni=1¯μ˜B(y)]/[Ni=1μ_˜B(y)], which is depend on the specific examples) and computeα=ki=1yi¯μ˜B(yi)+Ni=k+1yiμ_˜B(yi),β=ki=1¯μ˜B(yi)+Ni=k+1μ_˜B(yi), c=α/β.
    2 Find k(1k<N1) such that ykc<yk+1.
    3 Check if k=k, if yes, stop and set c=l˜B and k=L, if no, go to Step 4.
    4 Compute s=sign(kk), α=α+smax(k,k)i=min(k,k)+1yi[¯μ˜B(yi)μ_˜B(yi)], β=β+smax(k,k)i=min(k,k)+1[¯μ˜B(yi)μ_˜B(yi)], c=α/β.
    5 Set c=c,α=α,β=β,k=k and return to Step 2.
    Step RIEKM algorithm for r˜B
    1 Set k=[N/(1+1/ρ)] and compute α=ki=1yiμ_˜B(yi)+Ni=k+1yi¯μ˜B(yi), β=ki=1μ_˜B(yi)+Ni=k+1¯μ˜B(yi), c=α/β
    2 Find k(1k<N1) such that ykc<yk+1.
    3 Check if k=k, if yes, stop and set c=r˜B and k=R, if no, go to Step 4.
    4 Compute s=sign(kk), α=αsmax(k,k)i=min(k,k)+1yi[¯μ˜B(yi)μ_˜B(yi)], β=βsmax(k,k)i=min(k,k)+1[¯μ˜B(yi)μ_˜B(yi)], c=α/β.
    5 Set c=c,α=α,β=β,k=k and return to Step 2.

     | Show Table
    DownLoad: CSV

    Four computer simulation examples are provided in this section to illustrate the performances RIEKM algorithms. Before performing the centroid TR, suppose that the FOU of centroid output IT2 FS be known by weighting and agammaegating all the fuzzy rules under the guidance of inference. Here the primary variable of centroid output IT2 FS is denoted by the letter x, x is uniformly sampled, and the number of sampling is chosen as N=50:50:9000.

    In the first example, the FOU is bounded by the piecewise linear functions [21,22,23,25,26]. In the second example, the FOU is bounded by both the Gaussian functions and piecewise linear functions [20,21,22,27,28,29,30,31]. In the third example, the FOU is bounded by the Gaussian functions [21,22,23,25,26]. In the last example, the FOU is a Gaussian IT2 MF with uncertainty standard deviation [20,21,22,27,28,29,30,31]. Then the Figure 2 and Table 6 provide the defined FOUs for four examples.

    Figure 2.  The graphs of FOUs, (a) example 1; (b) example 2; (c) example 3, and (d) example 4.
    Table 6.  MF expressions for FOUs.
    Num Expressions
    1 μ_˜A1(x)=max{[x16,1x47x6,4<x70,otherwise],[x36,3x58x9,5<x80,otherwise]}¯μ˜A1(x)=max{[x12,1x37x4,3<x70,otherwise],[x25,2x6162x5,6<x80,otherwise]}
    2 μ_˜A2(x)={0.6(x+5)19,5x2.60.4(14x)19,2.6<x14¯μ˜A2(x)={exp[12(x25)2],5x7.185exp[12(x91.75)2],7.185<x14
    3 μ_˜A3(x)=max{0.5exp[(x3)22],0.4exp[(x6)22]}¯μ˜A3(x)=max{exp[0.5(x3)24],0.8exp[0.5(x6)24]}
    4 μ_˜A4(x)=exp[12(x30.25)2],¯μ˜A4(x)=exp[12(x31.75)2]

     | Show Table
    DownLoad: CSV

    In examples 1, 2 and 4, let the primary variable x[0,10]. In addition, let the primary variable x[5,14]in example 2. The accurate continuous Nie-Tan (CNT) algorithms [22,25] compute the centroid output of IT2 FS ˜A as:

    yCNT=bax[μ_˜A(x)+¯μ˜A(x)]dxba[μ_˜A(x)+¯μ˜A(x)]dx. (37)

    Therefore, the CNT algorithms are firstly considered as the benchmark to compute the defuzzified values for four examples as: y1=4.320794, y2=3.714087, y3=4.395260, and y4=4.999999. Then graphs of defuzzified values computed by two types of discrete EKM algorithms are shown in Figure 3.

    Figure 3.  The graphs of defuzzifed values computed by the EKM and RIEKM algorithms, (a) example 1; (b) example 2; (c) example 3, and (d) example 4.

    Furthermore, the absolute errors between the benchmark CNT algorithms and two types of discrete EKM algorithms are provided in Figure 4.

    Figure 4.  The functional graphs of absolute errors between the CNT algorithms and two types of discrete EKM algorithms, (a) example 1; (b) example 2; (c) example 3, and (d) example 4.

    In order to further measure the performances of two types of algorithms, here we define the absolute errors sum 180i=1|yCNTiyEKMi(RIEKMi)| of defuzzified values for four examples, and they are shown in Table 7, in which the last column denotes the total average of absolute errors sum for the EKM algorithms and RIEKM algorithms.

    Table 7.  The absolute errors sum of defuzzified values for the CNT algorithms and two types of discrete EKM algorithms.
    Algorithms EKM RIEKM
    Example 1 0.932160 0.889015
    Example 2 15.595056 14.933244
    Example 3 3.577131 3.546304
    Example 4 0.027159 0.000251
    Total average 5.032877 4.842204

     | Show Table
    DownLoad: CSV

    Observing from the Figures 3, 4 and the Table 7, the following conclusions can be made:

    1) As the number of sampling increases, these two types of discrete EKM algorithms all converge to certain values. The absolute errors of RIEKM algorithms are always less than the EKM algorithms in these four examples (as the red error curves of RIEKM algorithms are under the corresponding blue error curves of EKM algorithms).

    2) In example 1, the RIEKM algorithms can obtain the result that is closed to the benchmark value with the number of sampling of 150. In other three examples, the RIEKM algorithms can almost get the optimal value just at the number of sampling of 50 (starting number of sampling).

    3) As N=50:50:9000, the RIEKM algorithms can obtain smaller absolute errors sum than the EKM algorithms in all four examples. In addition, the total average absolute errors sum of RIEKM algorithms is less than the EKM algorithms.

    4) According to the items one to three, it is evidence that the proposed RIEKM algorithms can obtain better calculation accuracy than the EKM algorithms.

    For the sake of applying these algorithms, next we study the specific unrepeatable computation times that depend on the hardware and software environments. Here the computer simulation platform is a dual CPU desktop with the Microsoft Windows XP operating system, E5300@2.6GHz and 2.00GB memory. All the programs are performed by the Matlab 2013a. Then Figure 5 gives the computation times for four examples, and the unit of time is the second (s).

    Figure 5.  The computation times of EKM and RIEKM algorithms, (a) example 1; (b) example 2; (c) example 3, and (d) example 4.

    For the sake of applying these algorithms, next we study the specific unrepeatable computation times that depend on the hardware and software environments. Here the computer simulation platform is a dual CPU desktop with the Microsoft Windows XP operating system, E5300@2.6GHz and 2.00GB memory. All the programs are performed by the Matlab 2013a. Then Figure 5 gives the computation times for four examples, and the unit of time is the second (s).

    As shown in Figure 5, except for some fluctuations, the computation times of two types of discrete EKM algorithms emerge linear variation. In most number of sampling, the computation times of EKM algorithms are slightly better than the RIEKM algorithms. In other words, the convergence speeds of RIEKM algorithms are faster than the EKM algorithms in general. When the number of sampling is fixed, the computation times of two types of EKM algorithms are as: RIEKM > EKM for all four examples. This may because the initialization of RIEKM algorithms is more complex than the simple EKM algorithms.

    Here we should point out that the paper focuses on the theoretical performances of RIEKM algorithms compared with the EKM algorithms. Four computer simulation examples show the advantages of RIEKM algorithms on high computation accuracy requirement. However, if the requirement of calculation accuracy is not very high, the simple EKM algorithms will complete with slightly faster computation speeds.

    This paper gives the fuzzy reasoning process of IT2 FLSs, and discusses the initializations of EKM algorithms. And the reasonable initialization EKM (RIEKM) algorithms are provided to perform the centroid TR and defuzzification of IT2 FLSs. For computing the defuzzified values of IT2 FLSs, the proposed RIEKM algorithms can obtain better absolute errors and faster convergence speeds than the EKM algorithms.

    Many interesting works still lie ahead, including extending and weighting the RIEKM algorithms to perform the centroid TR [17,27,28,31,32,40,41,42,43,44,49,50] of general type-2 fuzzy logic systems, and studying the center-of-sets TR of T2 FLSs [33], and the relations between discrete and continuous TR algorithms [18,21,28,29,30]. Future studies will also be focused on designing and applying IT2 or GT2 FLSs based on intelligent optimization algorithms [3,7,8,9,10,11,12,34,35,36,37,38,39,45,46,47,48,53] for forecasting, control [51,52] and identification.

    The paper is sponsored by the National Natural Science Foundation of China (No. 61973146, No. 61773188, No. 61903167, No. 61803189), the Liaoning Province Natural Science Foundation Guidance Project (No. 20180550056), and Talent Fund Project of Liaoning University of Technology (No. xr2020002). The author is very grateful for professor Jerry Mendel, who has given the author some valuable suggestions.

    The authors declare that they have no conflict of interest.



    [1] Piezo-electrics & Acousto-optic (2001) 23: 202-205.
    [2] Chaglla EJ, Celik N, Balachandran W (2018) Measurement of Core Body Temperature Using Graphene-Inked Infrared Thermopile Sensor. Sensors 18: 3315. https://doi.org/10.3390/s18103315 doi: 10.3390/s18103315
    [3] Craig JV, Lancaster GA, Taylor S, et al. (2002) Infrared ear thermometry compared with rectal thermometry in children: A systematic review. Lancet 360: 603-609. https://doi.org/10.1016/S0140-6736(02)09783-0 doi: 10.1016/S0140-6736(02)09783-0
    [4] Crawford D, Hicks B, Thompson M (2006) Which thermometer? Factors influencing best choice for intermittent clinical temperature assessment. J Med Eng Technol 30: 199-211. https://doi.org/10.1080/03091900600711464 doi: 10.1080/03091900600711464
    [5] Di Gennaro F, Pizzol D, Marotta C, et al. (2020) Coronavirus diseases (COVID-19) current status and future perspectives: A narrative review. Int J Env Res Pub He 17: 2690. https://doi.org/10.3390/ijerph17082690 doi: 10.3390/ijerph17082690
    [6] Geneva Ⅱ, Cuzzo B, Fazili T, et al. (2019) Normal body temperature: A systematic review. Open Forum Infect Di 6: ofz032. https://doi.org/10.1093/ofid/ofz032
    [7] Melexis. (n.d.). Datasheet for MLX90632 #Melexis. Retrieved May 31, 2021. Available from: https://www.melexis.com/en/documents/documentation/datasheets/datasheet-mlx90632
    [8] Recommendations CDC (2009) CDC Recommendations for the Amount of Time Persons with Influenza-Like Illness Should be Away from Others. Centers for Disease Control and Prevention. Available from: https://www.cdc.gov/h1n1flu/guidance/exclusion.htm
    [9] Rodriguez-Lozano FJ, León-García F, Ruiz de Adana M, et al. (2019) Non-Invasive Forehead Segmentation in Thermographic Imaging. Sensors 19: 4096. https://doi.org/10.3390/s19194096 doi: 10.3390/s19194096
    [10] STMicroelectronics. (n.d.). STMicroelectronics. Retrieved May 31, 2021. Available from: https://www.st.com/resource/en/datasheet/vl53l0x.pdf
    [11] Sund-Levander M, Grodzinsky E, Loyd D, et al. (2004) Errors in body temperature assessment related to individual variation, measuring technique and equipment. Int J Nurs Pract 10: 216-223. https://doi.org/10.1111/j.1440-172X.2004.00483.x doi: 10.1111/j.1440-172X.2004.00483.x
    [12] Xie J, Zhu Y (2020) Association between ambient temperature and COVID-19 infection in 122 cities from China. Sci Total Environ 724: 138201. https://doi.org/10.1016/j.scitotenv.2020.138201 doi: 10.1016/j.scitotenv.2020.138201
    [13] Yaffe-Bellany D (2020) Thermometer Guns' on Coronavirus Front Lines are "Notoriously not Accurate". The New York Times 390: 391.
  • This article has been cited by:

    1. Liangying Miao, Man Xu, Zhiqian He, Existence and multiplicity of positive solutions for one-dimensional p-Laplacian problem with sign-changing weight, 2023, 31, 2688-1594, 3086, 10.3934/era.2023156
  • Reader Comments
  • © 2022 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(5255) PDF downloads(257) Cited by(1)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog