
Citation: Yang Chen, Jinxia Wu, Jie Lan. Study on reasonable initialization enhanced Karnik-Mendel algorithms for centroid type-reduction of interval type-2 fuzzy logic systems[J]. AIMS Mathematics, 2020, 5(6): 6149-6168. doi: 10.3934/math.2020395
[1] | Yang Chen, Jiaxiu Yang, Chenxi Li . Design of reasonable initialization weighted enhanced Karnik-Mendel algorithms for centroid type-reduction of interval type-2 fuzzy logic systems. AIMS Mathematics, 2022, 7(6): 9846-9870. doi: 10.3934/math.2022549 |
[2] | Yang Chen, Chenxi Li . Study on sensible beginning divided-search enhanced Karnik-Mendel algorithms for centroid type-reduction of general type-2 fuzzy logic systems. AIMS Mathematics, 2024, 9(5): 11851-11876. doi: 10.3934/math.2024580 |
[3] | Yang Chen, Jinxia Wu, Jie Lan . Study on weighted-based noniterative algorithms for centroid type-reduction of interval type-2 fuzzy logic systems. AIMS Mathematics, 2020, 5(6): 7719-7745. doi: 10.3934/math.2020494 |
[4] | Farah Liyana Azizan, Saratha Sathasivam, Nurshazneem Roslan, Ahmad Deedat Ibrahim . Logic mining with hybridized 3-satisfiability fuzzy logic and harmony search algorithm in Hopfield neural network for Covid-19 death cases. AIMS Mathematics, 2024, 9(2): 3150-3173. doi: 10.3934/math.2024153 |
[5] | Caicai Feng, Saratha Sathasivam, Nurshazneem Roslan, Muraly Velavan . 2-SAT discrete Hopfield neural networks optimization via Crow search and fuzzy dynamical clustering approach. AIMS Mathematics, 2024, 9(4): 9232-9266. doi: 10.3934/math.2024450 |
[6] | Chuang Liu, Jinxia Wu, Weidong Yang . Robust $ {H}_{\infty} $ output feedback finite-time control for interval type-2 fuzzy systems with actuator saturation. AIMS Mathematics, 2022, 7(3): 4614-4635. doi: 10.3934/math.2022257 |
[7] | Abbarapu Ashok, Nadiminti Nagamani . Adaptive estimation: Fuzzy data-driven gamma distribution via Bayesian and maximum likelihood approaches. AIMS Mathematics, 2025, 10(1): 438-459. doi: 10.3934/math.2025021 |
[8] | Yu-ting Wu, Heng-you Lan, Chang-jiang Liu . On implicit coupled systems of fuzzy fractional delay differential equations with triangular fuzzy functions. AIMS Mathematics, 2021, 6(4): 3741-3760. doi: 10.3934/math.2021222 |
[9] | Iqra Nayab, Shahid Mubeen, Rana Safdar Ali, Faisal Zahoor, Muath Awadalla, Abd Elmotaleb A. M. A. Elamin . Novel fractional inequalities measured by Prabhakar fuzzy fractional operators pertaining to fuzzy convexities and preinvexities. AIMS Mathematics, 2024, 9(7): 17696-17715. doi: 10.3934/math.2024860 |
[10] | Nurshazneem Roslan, Saratha Sathasivam, Farah Liyana Azizan . Conditional random k satisfiability modeling for k = 1, 2 (CRAN2SAT) with non-monotonic Smish activation function in discrete Hopfield neural network. AIMS Mathematics, 2024, 9(2): 3911-3956. doi: 10.3934/math.2024193 |
As we all know, the membership grades of type-1 fuzzy sets (T1 FSs) are crisp numbers as 0 or 1, therefore, the membership functions (MFs) of T1 FSs are not inherently uncertain and they can only measure uncertainties in a limited scope. The membership grades of interval type-2 fuzzy sets (IT2 FSs) are intervals, so the IT2 FSs are capable of better model uncertainties [1,2]. In the past decades, great progresses have been made transiting from type-1 fuzzy logic systems (T1 FLSs) to interval type-2 fuzzy logic systems (IT2 FLSs). IT2 FLSs based on IT2 FSs can approximate real continuous functions defined on compact sets with arbitrary accuracy. Furthermore, IT2 FLSs have been successfully applied in many fields with uncertainty, nonlinearity and time-varying characteristics like autonomous mobile robots [3,4], intelligent controllers [5], financial systems [6], power systems [7,8], permanent magnetic drive [9,10,11], edge detection [12], medical systems [13] and hot strip mill [14,15] and so on.
Generally speaking, IT2 FLSs (see Figure 1) are composed of fuzzifier, rules, inference [16], type-reducer and defuzzifier. Among which, the block of type-reduction (TR) under the guidance of inference plays the central role, and its main function is to transform the IT2 FS to the T1 FS. Then the defuzzification changes the T1 FS to the crisp output. The operations in TR are the differences between T1 and IT2 FLSs, which makes the latter with more challenges.
Currently, the computationally intensive iterative Karnik-Mendel (KM) algorithms and enhanced Karnik-Mendel (EKM) algorithms [18,19,20] are the most popular approaches for performing the TR. These two types of algorithms have the advantages of preserving the uncertainties flow in the systems and converge in super-convergence speed. However, the initializations of KM and EKM algorithms are usually given by trial and error of extensive simulation experiments. This paper analyzes the initializations [21] of KM and EKM algorithms, and provides reasonable initialization EKM (RIEKM) algorithms for performing the centroid TR and defuzzification of IT2 FLSs. According the accurate benchmark CNT algorithms [22], the proposed RIEKM algorithms have smaller absolute errors and faster convergence speeds compared with the EKM algorithms.
The rest of this paper is organized as follows. Section 2 gives the background of IT2 FLSs. Section 3 provides the RIEKM algorithms, and how to adopt them to perform the centroid TR of IT2 FLSs. In Section 4, four computer simulation experiments are used to illustrate and analyze the performances of RIEKM algorithms. Finally the conclusions and expectations are given in Section 5.
The rules uncertainties of IT2 FLSs generate from numerical or language uncertainties in knowledge, while these uncertainties can be solved by T2 FSs. In fact, the concept of T2 FSs can be viewed as the extension of concept of T1 FSs.
Definition 1. A T2 FS ˜A can be characterized by its T2 MF μ˜A(x,u), i.e.,
˜A={(x,u),μ˜A(x,u)|∀x∈X,∀u∈[0,1]} | (1) |
in which the primary variable x∈X, and the secondary variable u∈[0,1], here equation (1) is usually referred to as the point-value expression, and whose compact form is as:
˜A=∫x∈X∫u∈Jx⊆[0,1]μ˜A(x,u)/(x,u). | (2) |
Definition 2. A vertical slice of μ˜A(x,u) is the secondary MF, i.e.,
μ˜A(x=x′,u)≡μ˜A(x′)=∫∀u∈Jx′fx′(u)/u. | (3) |
Definition 3. The two dimensional support of μ˜A(x,u) is called as the footprint of uncertainty (FOU), i.e.,
FOU(˜A)={(x,u)∈X×[0,1]|μ˜A(x,u)>0} | (4) |
here the upper and lower bounds of FOU(˜A) are referred to as the upper MF (UMF) and lower MF (LMF), respectively, i.e.,
UMF(˜A)=¯μ˜A(x)=¯FOU(˜A),LMF(˜A)=μ_˜A(x)=FOU(˜A)_. | (5) |
For any IT2 FSs, they can be completely characterized by their UMFs and LMFs. That’s because the secondary membership grades of IT2 FSs must be equal to 1, i.e., fx(u)≡1.
From the aspect of inference structure, IT2 FLSs can be divided into Mamdani type [7,11,14] and Takagi-Sugeno-Kang (TSK) type [10,15]. Without loss of generality, consider a Mamdani IT2 FLS with p inputs x1∈X1,x2∈X2,⋯,xp∈Xp and one output y∈Y, there are a total of M fuzzy rules, where the lth rule is of the form:
If x1 is ˜Fl1 and x2 is ˜Fl2 and … and xp is ˜Flp, then y is ˜Gl (l=1,Λ,M) | (6) |
In order to simplify the expressions, we model the input measurements as crisp sets, i.e., singleton fuzzifier is adopted. Then the process of fuzzy reasoning [7,16,23] is given as follows:
The fuzzy relation of each fuzzy rule is as:
˜Rl:˜Fl1טFl2⋯טFlp→˜Gl=˜Al→˜Gl | (7) |
whose MF is as:
μ˜Rl(x,y)=μ˜Al→˜Gl(x,y)=[∩pi=1μ˜Fli(x′i)]∩μ˜Gl(y) | (8) |
where the sign ∩ is the product or minimum t-norm [24].
The T2 output of each fuzzy rule is ˜Bl=Ax∘˜Rl, and whose MF is as:
μ˜Bl(y)=∪x∈X[μAx(x)∩μ˜Al→˜Gl(x,y)]=μ˜Gl(y)∩[∩pi=1μ˜Fli(x′i)]=μ˜Gl(y)∩Fl(x′) | (9) |
in which ∘ is the composition operation, and ∪ is the maximum t-norm. Fl(x′) is the defined firing interval, i.e.,
Fl:{Fl(x′)≡[f_l(x′),¯fl(x′)]f_l(x′)≡∩pi=1μ_˜Fli(x′i)¯fl(x′)≡∩pi=1¯μ˜Fli(x′i) | (10) |
Here the most popular centroid TR approach [21] is selected, i.e., the output IT2 FS ˜Bl of each rule (which generates by merging each fuzzy rule and its corresponding consequent IT2 FS) is described as:
{FOU(˜Bl)=[μ_˜Bl(y|x′),¯μ˜Bl(y|x′)]μ_˜Bl(y|x′)=f_l(x′)∗μ_˜Gl(y)¯μ˜Bl(y|x′)=¯fl(x′)∗¯μ˜Gl(y) | (11) |
where ∗ denotes the product or minimum t-norm.
Then agammaegating all the firing rule IT2 FS ˜Bl to obtain the final output ˜B, i.e.,
˜B:{FOU(˜B)=[μ_˜B(y|x′),¯μ˜B(y|x′)]μ_˜B(y|x′)=μ_˜B1(y|x′)∨⋯∨μ_˜BM(y|x′)¯μ˜B(y|x′)=¯μ˜B1(y|x′)∨⋯∨¯μ˜BM(y|x′) | (12) |
where ∨ represents the maximum operation. Then the type-reduced set YC can be obtained by computing the centroid C˜B of ˜B, i.e.,
YC=C˜B=1/[l˜B,r˜B] | (13) |
where l˜B and r˜B can be computed by KM types of algorithms as:
l˜B=mink=1,⋯,Nl˜B(k)=mink=1,⋯,Nk∑i=1yi¯μ˜B(yi)+N∑i=k+1yiμ_˜B(yi)k∑i=1¯μ˜B(yi)+N∑i=k+1μ_˜B(yi) | (14) |
r˜B=maxk=1,⋯,Nr˜B(k)=maxk=1,⋯,Nk∑i=1yiμ_˜B(yi)+N∑i=k+1yi¯μ˜B(yi)k∑i=1μ_˜B(yi)+N∑i=k+1¯μ˜B(yi) | (15) |
where N is the number of sampling of primary variable y, and k is the switch point.
Finally the crisp output is computed by taking the arithmetic average of l˜B and r˜B, i.e.,
y=(l˜B+r˜B)/2. | (16) |
First of all, we derive the theoretical interpretations of initialization of KM and EKM algorithms. Let a=y1<y2<⋯<yN=b, then the continuous KM and EKM algorithms compute as (see Eqs (14) and (15)):
l˜B=minξ∈[a,b]Fl(ξ)=minξ∈[a,b]∫ξay¯μ˜B(y)dy+∫bξyμ_˜B(y)dy∫ξa¯μ˜B(y)dy+∫bξμ_˜B(y)dy | (17) |
r˜B=minξ∈[a,b]Fr(ξ)=minξ∈[a,b]∫ξayμ_˜B(y)dy+∫bξy¯μ˜B(y)dy∫ξaμ_˜B(y)dy+∫bξ¯μ˜B(y)dy. | (18) |
In addition, the specific computation steps of CKM and CEKM algorithms are given in Tables 1 and 2. According to the notations Fl in (17) and Fr in (18), from Steps 2 and 4 in Table 1, we can find:
ξl=Fl(ξ′), and ξl=ξ′ | (19) |
ξr=Fr(ξ′), and ξr=ξ′. | (20) |
Step | CKM algorithm for l˜B, l˜B=min∀θ(y)∈[μ_˜B(y),¯μ˜B(y)]∫bayθ(y)dy∫baθ(y)dy |
1 | Let θ(y)=[μ_˜B(y)+¯μ˜B(y)]/2, and compute ξ′=∫bayθ(y)dy∫baθ(y)dy. |
2 | Set θ(y)=¯μ˜B(y) when y⩽ξ′, and θ(y)=μ_˜B(y) when y>ξ′, and compute ξl=∫bayθ(y)dy∫baθ(y)dy. |
3 | Check if |ξ′−ξl|⩽ε(ε is a given error bound), if yes, stop and set l˜B=ξl, if no, go to Step 4. |
4 | Set ξ′=ξl and go to Step 2. |
Step | CKM algorithm for r˜B, r˜B=max∀θ(y)∈[μ_˜B(y),¯μ˜B(y)]∫bayθ(y)dy∫baθ(y)dy |
1 | Let θ(y)=[μ_˜B(y)+¯μ˜B(y)]/2, and compute ξ′=∫bayθ(y)dy∫baθ(y)dy. |
2 | Set θ(y)=μ_˜B(y) when y⩽ξ′, and θ(y)=¯μ˜B(y) when y>ξ′, and compute ξr=∫bayθ(y)dy∫baθ(y)dy. |
3 | Check if |ξ′−ξr|⩽ε(ε is a given error bound), if yes, stop and set r˜B=ξr, if no, go to Step 4. |
4 | Set ξ′=ξl and go to Step 2. |
Step | CEKM algorithm for l˜B |
1 | Set c=a+(b−a)/2.4, and compute α=∫cay¯μ˜B(y)dy+∫bcyμ_˜B(y)dy, β=∫ca¯μ˜B(y)dy+∫bcμ_˜B(y)dy, c′=α/β. |
2 | Check if |c′−c|⩽ε, if yes, stop and set c′=l˜B, if no, go to Step 4. |
3 | Compute s=sign(c′−c), α′=α+s∫max(c,c′)min(c,c′)y[¯μ˜B(y)−μ_˜B(y)]dy, β′=β+s∫max(c,c′)min(c,c′)[¯μ˜B(y)−μ_˜B(y)]dy, c″=α′/β′. |
4 | Set c=c′,c′=c″,α=α′,β=β′ and go to Step 2. |
Step | CEKM algorithm for r˜B |
1 | Set c=a+(b−a)/1.7, and compute α=∫cayμ_˜B(y)dy+∫bcy¯μ˜B(y)dy, β=∫caμ_˜B(y)dy+∫bc¯μ˜B(y)dy, c′=α/β. |
2 | Check if |c′−c|⩽ε, if yes, stop and set c′=r˜B, if no, go to Step 4. |
3 | Compute s=sign(c′−c), α′=α−s∫max(c,c′)min(c,c′)y[¯μ˜B(y)−μ_˜B(y)]dy, β′=β−s∫max(c,c′)min(c,c′)[¯μ˜B(y)−μ_˜B(y)]dy, c″=α′/β′. |
4 | Set c=c′,c′=c″,α=α′,β=β′ and go to Step 2. |
When iterations terminate, l˜B=ξl and r˜B=ξr, therefore
l˜B=Fl(l˜B),r˜B=Fr(r˜B) | (21) |
here l˜B and r˜B are the fixed points of Fl(ξ) and Fr(ξ), respectively. In like manner, the relations of (21) still hold for the CEKM algorithms as in Table 2.
In order to set the initialization of the algorithms, let μ_˜B(y)=¯μ˜B(y)=θ(y) for all y∈[a,b], then θ(y)=[μ_˜B(y)+¯μ˜B(y)]/2. In this case, Eqs (17) and (18) become the same, so that,
l˜B=r˜B=∫bayθ(y)dy∫baθ(y)dy=∫bay[μ_˜B(y)+¯μ˜B(y)]/2dy∫ba[μ_˜B(y)+¯μ˜B(y)]/2dy | (22) |
Equation (22) is the initialization approach of CKM algorithms given in Table 1, denoted here as ξ(1), i.e.,
ξ(1)=∫bayθ(y)dy∫baθ(y)dy | (23) |
in which
The specific computation steps of discrete KM and EKM algorithms are provided in Tables 3 and 4. And the discrete form of ξ(1) is established in Steps 1 and 2 in Table 3, i.e.,
k(1)={k|yk⩽N∑i=1yi[μ_˜B(yi)+¯μ˜B(yi)]N∑i=1[μ_˜B(yi)+¯μ˜B(yi)]<yk+1,1⩽k⩽N−1} | (24) |
Step | KM algorithm for l˜B, l˜B=min∀θi∈[μ_˜B(yi),¯μ˜B(yi)](N∑i=1yiθi)/(N∑i=1θi) |
1 | Set θ(i)=[μ_˜B(yi)+¯μ˜B(yi)]/2,i=1,⋯,N and compute c′=(N∑i=1yiθi)/(N∑i=1θi). |
2 | Find k′(1⩽k′⩽N−1) such that yk′⩽c′<yk′+1. |
3 | Set θi=¯μ˜B(yi) when i⩽k′, and θi=μ_˜B(yi) when i>k′, and compute l˜B(k′)=(N∑i=1yiθi)/(N∑i=1θi). |
4 | Check if l˜B(k′)=c′, if yes, stop and set l˜B(k′)=l˜B and k′=L, if no, go to Step 5. |
5 | Set c′=l˜B(k′) and go to Step 2. |
Step | KM algorithm for r˜B, r˜B=max∀θi∈[μ_˜B(yi),¯μ˜B(yi)](N∑i=1yiθi)/(N∑i=1θi) |
1 | Set θ(i)=[μ_˜B(yi)+¯μ˜B(yi)]/2,i=1,⋯,N and compute c′=(N∑i=1yiθi)/(N∑i=1θi). |
2 | Find k′(1⩽k′⩽N−1) such that yk′⩽c′<yk′+1. |
3 | Set θi=μ_˜B(yi) when i⩽k′, and θi=¯μ˜B(yi) when i>k′, and compute r˜B(k′)=(N∑i=1yiθi)/(N∑i=1θi). |
4 | Check if r˜B(k′)=c′, if yes, stop and set r˜B(k′)=r˜B and k′=R, if no, go to Step 5. |
5 | Set c′=r˜B(k′) and go to Step 2. |
Step | EKM algorithm for l˜B |
1 | Set k=[N/2.4] (the nearest integer to N/2.4) and computeα=k∑i=1yi¯μ˜B(yi)+N∑i=k+1yiμ_˜B(yi), β=k∑i=1¯μ˜B(yi)+N∑i=k+1μ_˜B(yi), c′=α/β. |
2 | Find k′(1⩽k′<N−1) such that yk′⩽c′<yk′+1. |
3 | Check if k′=k, if yes, stop and set c′=l˜B and k=L, if no, go to Step 4. |
4 | Compute s=sign(k′−k), α′=α+smax(k,k′)∑i=min(k,k′)+1yi[¯μ˜B(yi)−μ_˜B(yi)], β′=β+smax(k,k′)∑i=min(k,k′)+1[¯μ˜B(yi)−μ_˜B(yi)], c″=α′/β′. |
5 | Set c′=c″,α=α′,β=β′,k=k′ and go to Step 2. |
Step | EKM algorithm for r˜B |
1 | Set k=[N/1.7] and compute α=k∑i=1yiμ_˜B(yi)+N∑i=k+1yi¯μ˜B(yi), β=k∑i=1μ_˜B(yi)+N∑i=k+1¯μ˜B(yi), c′=α/β. |
2 | Find k′(1⩽k′<N−1) such that yk′⩽c′<yk′+1. |
3 | Check if k′=k, if yes, stop and set c′=r˜B and k=R, if no, go to Step 4. |
4 | Compute s=sign(k′−k), α′=α−smax(k,k′)∑i=min(k,k′)+1yi[¯μ˜B(yi)−μ_˜B(yi)], β′=β−smax(k,k′)∑i=min(k,k′)+1[¯μ˜B(yi)−μ_˜B(yi)], c″=α′/β′. |
5 | Set c′=c″,α=α′,β=β′,k=k′ and go to Step 2. |
this KM initialization approach can provide excellent results as μ_˜B(y) and ¯μ˜B(y) are very close to each other, that’s because it becomes the exact optimal solution of (14) or (15) when μ_˜B(y)=¯μ˜B(y).
For the EKM algorithms, the initialization approach is based on the difference between μ_˜B(y) and ¯μ˜B(y). Let’s make an assumption that
ρ=∫ba¯μ˜B(y)dy∫baμ_˜B(y)dy. | (25) |
Attention that ρ⩾1, because ¯μ˜B(y)⩾μ_˜B(y) for all y∈[a,b].
In order to initialize the EKM algorithms, suppose that both μ_˜B(y) and ¯μ˜B(y) be constants for y∈[a,b], i.e., μ_˜B(y)=n>0, and ¯μ˜B(y)=ρn>0, according to Eq (14), so that
Fl(ξ)=∫ξay¯μ˜B(y)dy+∫bξyμ_˜B(y)dy∫ξa¯μ˜B(y)dy+∫bξμ_˜B(y)dy=∫ξaρnydy+∫bξnydy∫ξaρndy+∫bξndy=∫ξaρydy+∫bξydy∫ξaρdy+∫bξdy=ρ(ξ2−a2)+(b2−ξ2)2[ρ(ξ−a)+(b−ξ)]. | (26) |
Then find the derivative of Fl(ξ), so that
F′l(ξ)=(ρ−1)[ρ(ξ−a)2−(b−ξ)2]2[ρ(ξ−a)+(b−ξ)]2. | (27) |
Setting F′l(ξ)=0, therefore
(b−ξ)2(ξ−a)2=ρ,b−ξξ−a=√ρ. | (28) |
Solving Eq (28) for ξ, we can obtain
ξl=b+a√ρ1+√ρ=a+b−a1+√ρ. | (29) |
For the Eq (27), ξl is the minimum value of Fl(ξ). Because F′l(ξ)<0 for ξ∈[a,ξl), and F′l(ξ)>0 for ξ∈(ξl,b]. Therefore, l˜B=Fl(ξl)=ξl.
In like manners, it can be obtained:
Fr(ξ)=(ξ2−a2)+ρ(b2−ξ2)2[(ξ−a)+ρ(b−ξ)] | (30) |
Therefore,
F′r(ξ)=−(ρ−1)[(ξ−a)2−ρ(b−ξ)2]2[(ξ−a)+ρ(b−ξ)]2. | (31) |
Setting F′r(ξ)=0, it follows that:
(b−ξ)2(ξ−a)2=1ρ,b−ξξ−a=√1/ρ. | (32) |
Solving Eq (30) for ξ, we can obtain
ξr=b+a√1/ρ1+√1/ρ=a+b−a1+√1/ρ. | (33) |
For the Eq (30), ξr is the maximum value of Fr(ξ). Because F′r(ξ)>0 for ξ∈[a,ξr), and F′r(ξ)<0 for ξ∈(ξr,b]. Therefore, r˜B=Fr(ξr)=ξr. Considering the Eqs (29) and (33) together, the new initialization approach for ξ can be denoted as ξ(2), i.e.,
ξ(2)={a+b−a1+√ρforl˜B,a+b−a1+√1/ρforr˜B. | (34) |
Here ρ⩾1, therefore, ξ(2)⩽a+12(b−a) for l˜B, and ξ(2)⩾a+12(b−a) for r˜B.
Comparing the initializations of EKM algorithms in Table 4 and CEKM algorithms in Table 2, the discrete form of Eq (34) can be as:
k(2)={[N/(1+√ρ)] for l˜B,[N/(1+√1/ρ)] for r˜B. | (35) |
where N denotes the number of sampling of primary variable, and this ρ=[N∑i=1¯μ˜B(y)]/[N∑i=1μ_˜B(y)].
Interestingly, when ρ=2, it can be obtained that1+√ρ=1+√2≈2.4, and 1+√1/ρ=1+√1/2≈1.7, therefore, the equation (35) becomes:
k(2)={[N/2.4] for l˜B,[N/1.7] for r˜B. | (36) |
Equation (36) is just the initialization approach of EKM algorithms, which generates from empirical extensive simulation experiments. For the proposed reasonable initialization EKM (RIEKM) algorithms, we should determine each specific ρ for the corresponding simulations. Finally the specific computation steps of discrete RIEKM algorithms are provided in Table 5.
Step | RIEKM algorithm for l˜B |
1 | Set k=[N/(1+√ρ)] (ρ=[N∑i=1¯μ˜B(y)]/[N∑i=1μ_˜B(y)], which is depend on the specific examples) and computeα=k∑i=1yi¯μ˜B(yi)+N∑i=k+1yiμ_˜B(yi),β=k∑i=1¯μ˜B(yi)+N∑i=k+1μ_˜B(yi), c′=α/β. |
2 | Find k′(1⩽k′<N−1) such that yk′⩽c′<yk′+1. |
3 | Check if k′=k, if yes, stop and set c′=l˜B and k=L, if no, go to Step 4. |
4 | Compute s=sign(k′−k), α′=α+smax(k,k′)∑i=min(k,k′)+1yi[¯μ˜B(yi)−μ_˜B(yi)], β′=β+smax(k,k′)∑i=min(k,k′)+1[¯μ˜B(yi)−μ_˜B(yi)], c″=α′/β′. |
5 | Set c′=c″,α=α′,β=β′,k=k′ and return to Step 2. |
Step | RIEKM algorithm for r˜B |
1 | Set k=[N/(1+√1/ρ)] and compute α=k∑i=1yiμ_˜B(yi)+N∑i=k+1yi¯μ˜B(yi), β=k∑i=1μ_˜B(yi)+N∑i=k+1¯μ˜B(yi), c′=α/β |
2 | Find k′(1⩽k′<N−1) such that yk′⩽c′<yk′+1. |
3 | Check if k′=k, if yes, stop and set c′=r˜B and k=R, if no, go to Step 4. |
4 | Compute s=sign(k′−k), α′=α−smax(k,k′)∑i=min(k,k′)+1yi[¯μ˜B(yi)−μ_˜B(yi)], β′=β−smax(k,k′)∑i=min(k,k′)+1[¯μ˜B(yi)−μ_˜B(yi)], c″=α′/β′. |
5 | Set c′=c″,α=α′,β=β′,k=k′ and return to Step 2. |
Four computer simulation examples are provided in this section to illustrate the performances RIEKM algorithms. Before performing the centroid TR, suppose that the FOU of centroid output IT2 FS be known by weighting and agammaegating all the fuzzy rules under the guidance of inference. Here the primary variable of centroid output IT2 FS is denoted by the letter x, x is uniformly sampled, and the number of sampling is chosen as N=50:50:9000.
In the first example, the FOU is bounded by the piecewise linear functions [21,22,23,25,26]. In the second example, the FOU is bounded by both the Gaussian functions and piecewise linear functions [20,21,22,27,28,29,30,31]. In the third example, the FOU is bounded by the Gaussian functions [21,22,23,25,26]. In the last example, the FOU is a Gaussian IT2 MF with uncertainty standard deviation [20,21,22,27,28,29,30,31]. Then the Figure 2 and Table 6 provide the defined FOUs for four examples.
Num | Expressions |
1 | μ_˜A1(x)=max{[x−16,1⩽x⩽47−x6,4<x⩽70,otherwise],[x−36,3⩽x⩽58−x9,5<x⩽80,otherwise]}¯μ˜A1(x)=max{[x−12,1⩽x⩽37−x4,3<x⩽70,otherwise],[x−25,2⩽x⩽616−2x5,6<x⩽80,otherwise]} |
2 | μ_˜A2(x)={0.6(x+5)19,−5⩽x⩽2.60.4(14−x)19,2.6<x⩽14¯μ˜A2(x)={exp[−12(x−25)2],−5⩽x⩽7.185exp[−12(x−91.75)2],7.185<x⩽14 |
3 | μ_˜A3(x)=max{0.5exp[−(x−3)22],0.4exp[−(x−6)22]}¯μ˜A3(x)=max{exp[−0.5(x−3)24],0.8exp[−0.5(x−6)24]} |
4 | μ_˜A4(x)=exp[−12(x−30.25)2],¯μ˜A4(x)=exp[−12(x−31.75)2] |
In examples 1, 2 and 4, let the primary variable x∈[0,10]. In addition, let the primary variable x∈[−5,14]in example 2. The accurate continuous Nie-Tan (CNT) algorithms [22,25] compute the centroid output of IT2 FS ˜A as:
yCNT=∫bax[μ_˜A(x)+¯μ˜A(x)]dx∫ba[μ_˜A(x)+¯μ˜A(x)]dx. | (37) |
Therefore, the CNT algorithms are firstly considered as the benchmark to compute the defuzzified values for four examples as: y∗1=4.320794, y∗2=3.714087, y∗3=4.395260, and y∗4=4.999999. Then graphs of defuzzified values computed by two types of discrete EKM algorithms are shown in Figure 3.
Furthermore, the absolute errors between the benchmark CNT algorithms and two types of discrete EKM algorithms are provided in Figure 4.
In order to further measure the performances of two types of algorithms, here we define the absolute errors sum 180∑i=1|y∗CNTi−yEKMi(RIEKMi)| of defuzzified values for four examples, and they are shown in Table 7, in which the last column denotes the total average of absolute errors sum for the EKM algorithms and RIEKM algorithms.
Algorithms | EKM | RIEKM |
Example 1 | 0.932160 | 0.889015 |
Example 2 | 15.595056 | 14.933244 |
Example 3 | 3.577131 | 3.546304 |
Example 4 | 0.027159 | 0.000251 |
Total average | 5.032877 | 4.842204 |
Observing from the Figures 3, 4 and the Table 7, the following conclusions can be made:
1) As the number of sampling increases, these two types of discrete EKM algorithms all converge to certain values. The absolute errors of RIEKM algorithms are always less than the EKM algorithms in these four examples (as the red error curves of RIEKM algorithms are under the corresponding blue error curves of EKM algorithms).
2) In example 1, the RIEKM algorithms can obtain the result that is closed to the benchmark value with the number of sampling of 150. In other three examples, the RIEKM algorithms can almost get the optimal value just at the number of sampling of 50 (starting number of sampling).
3) As N=50:50:9000, the RIEKM algorithms can obtain smaller absolute errors sum than the EKM algorithms in all four examples. In addition, the total average absolute errors sum of RIEKM algorithms is less than the EKM algorithms.
4) According to the items one to three, it is evidence that the proposed RIEKM algorithms can obtain better calculation accuracy than the EKM algorithms.
For the sake of applying these algorithms, next we study the specific unrepeatable computation times that depend on the hardware and software environments. Here the computer simulation platform is a dual CPU desktop with the Microsoft Windows XP operating system, E5300@2.6GHz and 2.00GB memory. All the programs are performed by the Matlab 2013a. Then Figure 5 gives the computation times for four examples, and the unit of time is the second (s).
For the sake of applying these algorithms, next we study the specific unrepeatable computation times that depend on the hardware and software environments. Here the computer simulation platform is a dual CPU desktop with the Microsoft Windows XP operating system, E5300@2.6GHz and 2.00GB memory. All the programs are performed by the Matlab 2013a. Then Figure 5 gives the computation times for four examples, and the unit of time is the second (s).
As shown in Figure 5, except for some fluctuations, the computation times of two types of discrete EKM algorithms emerge linear variation. In most number of sampling, the computation times of EKM algorithms are slightly better than the RIEKM algorithms. In other words, the convergence speeds of RIEKM algorithms are faster than the EKM algorithms in general. When the number of sampling is fixed, the computation times of two types of EKM algorithms are as: RIEKM > EKM for all four examples. This may because the initialization of RIEKM algorithms is more complex than the simple EKM algorithms.
Here we should point out that the paper focuses on the theoretical performances of RIEKM algorithms compared with the EKM algorithms. Four computer simulation examples show the advantages of RIEKM algorithms on high computation accuracy requirement. However, if the requirement of calculation accuracy is not very high, the simple EKM algorithms will complete with slightly faster computation speeds.
This paper gives the fuzzy reasoning process of IT2 FLSs, and discusses the initializations of EKM algorithms. And the reasonable initialization EKM (RIEKM) algorithms are provided to perform the centroid TR and defuzzification of IT2 FLSs. For computing the defuzzified values of IT2 FLSs, the proposed RIEKM algorithms can obtain better absolute errors and faster convergence speeds than the EKM algorithms.
Many interesting works still lie ahead, including extending and weighting the RIEKM algorithms to perform the centroid TR [17,27,28,31,32,40,41,42,43,44,49,50] of general type-2 fuzzy logic systems, and studying the center-of-sets TR of T2 FLSs [33], and the relations between discrete and continuous TR algorithms [18,21,28,29,30]. Future studies will also be focused on designing and applying IT2 or GT2 FLSs based on intelligent optimization algorithms [3,7,8,9,10,11,12,34,35,36,37,38,39,45,46,47,48,53] for forecasting, control [51,52] and identification.
The paper is sponsored by the National Natural Science Foundation of China (No. 61973146, No. 61773188, No. 61903167, No. 61803189), the Liaoning Province Natural Science Foundation Guidance Project (No. 20180550056), and Talent Fund Project of Liaoning University of Technology (No. xr2020002). The author is very grateful for professor Jerry Mendel, who has given the author some valuable suggestions.
The authors declare that they have no conflict of interest.
[1] |
D. R. Wu, J. M. Mendel, Uncertainty measures for interval type-2 fuzzy sets, Inf. Sci., 177 (2007), 5378-5393. doi: 10.1016/j.ins.2007.07.012
![]() |
[2] | J. M. Mendel, Uncertain Rule-Based Fuzzy Logic Systems: Introduction and New Directions, Englewood Cliffs, NJ, USA: Prentice-Hall, 2001, 1-547. |
[3] |
P. Melin, L. Astudillo, O. Castillo, et al. Optimal design of type-2 and type-1 fuzzy tracking controllers for autonomous mobile robots under perturbed torques using a new chemical optimization paradigm, Expert Syst. Appl., 40 (2013), 3185-3195. doi: 10.1016/j.eswa.2012.12.032
![]() |
[4] |
H. Hagras, A hierarchical type-2 fuzzy logic control architecture for autonomous mobile robots, IEEE Trans. Fuzzy Syst., 12 (2004), 524-539. doi: 10.1109/TFUZZ.2004.832538
![]() |
[5] |
C. W. Tao, J. S. Taur, C. W. Chang, et al. Simplified type-2 fuzzy sliding controller for wing rocket system, Fuzzy Sets Syst., 207 (2012), 111-129. doi: 10.1016/j.fss.2012.02.015
![]() |
[6] | D. Bernardo, H. Hagras, E. Tsang, A genetic type-2 fuzzy logic based system for the generation of summarized linguistic predictive models for financial applications, Soft Comput., 17 (2013), 2185-2201. |
[7] | Y. Chen, D. Z. Wang, S. C. Tong, Forecasting studies by designing Mamdani interval type-2 fuzzy logic systems: With combination of BP algorithms and KM algorithms, Neurocomputing, 174 (2016), 1133-1146. |
[8] |
A. Khosravi, S. Nahavandi, D. Creighton, et al., Interval type-2 fuzzy logic systems for load forecasting: a comparative study, IEEE Trans. Power Syst., 27 (2012), 1274-1282. doi: 10.1109/TPWRS.2011.2181981
![]() |
[9] |
S. Barkat, A. Tlemcani, H. Nouri, Noninteracting adaptive control of PMSM using interval type-2 fuzzy logic systems, IEEE Trans. Fuzzy Syst., 19 (2011), 925-936. doi: 10.1109/TFUZZ.2011.2152815
![]() |
[10] | D. Z. Wang, Y. Chen, Study on permanent magnetic drive forecasting by designing Takagi Sugeno Kang type interval type-2 fuzzy logic systems, Trans. Institute Meas. Control, 40 (2018), 2011-2023. |
[11] | Y. Chen, D. Z. Wang, Forecasting by designing Mamdani general type-2 fuzzy logic systems optimized with quantum particle swarm optimization algorithms, Trans. Institute Meas. Control, 41 (2019), 2886-2896. |
[12] | P. Melin, O. Mendoza, O. Castillo, An improved method for edge detection based on interval type-2 fuzzy logic, Expert Syst. Appl., 37 (2010), 8527-8535. |
[13] | C. S. Lee, M. H. Wang, H. Hagras, Type-2 fuzzy ontology and its application to personal diabetic-diet recommendation, IEEE Trans. Fuzzy Syst., 18 (2010), 316-328. |
[14] | G. M. Méndez, M. D. L. A. Hernandez, Hybrid learning for interval type-2 fuzzy logic systems based on orthogonal least-squares and back-propagation methods, Inf. Sci., 179 (2009), 2146-2157. |
[15] |
G. M. Méndez, M. D. L. A. Hernandez, Hybrid learning mechanism for interval A2-C1 type-2 non-singleton type-2 Takagi-Sugeno-Kang fuzzy logic systems, Inf. Sci., 220 (2013), 149-169. doi: 10.1016/j.ins.2012.01.024
![]() |
[16] | T. Wang, Y. Chen, S. C. Tong, Fuzzy reasoning models and algorithms on type-2 fuzzy sets, Int. J. Innovative Comput. Inf. Control, 4 (2008), 2451-2460. |
[17] | J. M. Mendel, General type-2 fuzzy logic systems made simple: A tutorial, IEEE Trans. Fuzzy Sys., 22 (2014), 1162-1182. |
[18] |
J. M. Mendel, On KM algorithms for solving type-2 fuzzy set problems, IEEE Trans. Fuzzy Syst., 21 (2013), 426-446. doi: 10.1109/TFUZZ.2012.2227488
![]() |
[19] |
D. R. Wu, J. M. Mendel, Enhanced Karnik-Mendel algorithms, IEEE Trans. Fuzzy Syst., 17 (2009), 923-934. doi: 10.1109/TFUZZ.2008.924329
![]() |
[20] |
J. M. Mendel, F. L. Liu, Super-exponential convergence of the Karnik-Mendel algorithms for computing the centroid of an interval type-2 fuzzy set, IEEE Trans. Fuzzy Syst., 15 (2007), 309-320. doi: 10.1109/TFUZZ.2006.882463
![]() |
[21] |
X. W. Liu, J. M. Mendel, D. R. Wu, Study on enhanced Karnik-Mendel algorithms: Initialization explanations and computation improvements, Inf. Sci., 184 (2012), 75-91. doi: 10.1016/j.ins.2011.07.042
![]() |
[22] | J. W. Li, R. John, S. Coupland, et al., On Nie-Tan operator and type-reduction of interval type-2 fuzzy sets, IEEE Trans. Fuzzy Syst., 26 (2018), 1036-1039. |
[23] | Y. Chen, Study on weighted Nagar-Bardini algorithms for centroid type-reduction of interval type-2 fuzzy logic systems, J. Intell. Fuzzy Syst., 34 (2018), 2417-2428. |
[24] |
J. M. Mendel, R. I. John, F. L. Liu, Interval type-2 fuzzy logic systems made simple, IEEE Trans. Fuzzy Syst., 14 (2006), 808-821. doi: 10.1109/TFUZZ.2006.879986
![]() |
[25] | Y. Chen, D. Z. Wang, Study on centroid type-reduction of general type-2 fuzzy logic systems with weighted Nie-Tan algorithms, Soft Comput., 22 (2018), 7659-7678. |
[26] |
F. L. Liu, An efficient centroid type-reduction strategy for general type-2 fuzzy logic system, Inf. Sci., 178 (2008), 2224-2236. doi: 10.1016/j.ins.2007.11.014
![]() |
[27] | J. M. Mendel, X. W. Liu, Simplified interval type-2 fuzzy logic systems, IEEE Trans. Fuzzy Syst., 21 (2013), 1056-1069. |
[28] | S. Greenfield, F. Chiclana, Accuracy and complexity evaluation of defuzzification strategies for the discretised interval type-2 fuzzy set, Int. J. Approximate Reasoning, 54 (2013), 1013-1033. |
[29] | Y. Chen, Study on centroid type-reduction of interval type-2 fuzzy logic systems based on noniterative algorithms, Complexity, 2019 (2019), 1-12. |
[30] | T. Kumbasar, Revisiting Karnik-Mendel algorithms in the framework of linear fractional programming, Int. J. Approximate Reasoning, 82 (2017), 1-21. |
[31] |
S. Greenfield, F. Chiclana, S. Coupland, et al., The collapsing method of defuzzification for discretised interval type-2 fuzzy sets, Inf. Sci., 179 (2009), 2055-2069. doi: 10.1016/j.ins.2008.07.011
![]() |
[32] | D. R. Wu, Approaches for reducing the computational cost of interval type-2 fuzzy logic systems: overview and comparisons, IEEE Trans. Fuzzy Syst., 21 (2013), 80-99. |
[33] |
M. A. Khanesar, A. Jalalian, O. Kaynak, Improving the speed of center of set type-reduction in interval type-2 fuzzy systems by eliminating the need for sorting, IEEE Trans. Fuzzy Syst., 25 (2017), 1193-1206. doi: 10.1109/TFUZZ.2016.2602392
![]() |
[34] | Y. Chen, D. Z. Wang, W. Ning, Forecasting by TSK general type-2 fuzzy logic systems optimized with genetic algorithms, Optimal Control Appl. Methods, 39 (2018), 393-409. |
[35] | Y. Chen, D. Z. Wang, Forecasting by general type-2 fuzzy logic systems optimized with QPSO algorithms, Int. J. Control, Automation Syst., 15 (2017), 2950-2958. |
[36] |
F. Gaxiola, P. Melin, F. Valdez, et al. Optimization of type-2 fuzzy weights in backpropagation learning for neural networks using GAs and PSO, Appl. Soft Comput., 38 (2016), 860-871. doi: 10.1016/j.asoc.2015.10.027
![]() |
[37] |
Q. F. Fan, T. Wang, Y. Chen, et al., Design and application of interval type-2 TSK fuzzy logic system based on QPSO algorithm, Int. J. Fuzzy Syst., 20 (2018), 835-846. doi: 10.1007/s40815-017-0357-3
![]() |
[38] | C. H. Hsu, C. F. Juang, Evolutionary robot wall-following control using type- 2 fuzzy controller with species-de-activated continuous ACO, IEEE Trans. Fuzzy Syst., 21 (2013), 100-112. |
[39] | D. R. Wu, J. M. Mendel, Recommendations on designing practical interval type-2 fuzzy systems, Eng. Appl. Artif. Intell., 85 (2019), 182-193. |
[40] | X. L. Liu, S. P. Wan, Combinatorial iterative algorithms for computing the centroid of an interval type-2 fuzzy set, IEEE Trans. Fuzzy Syst., 2019, DOI: 10.1109/TFUZZ.2019.2911918. |
[41] | H. Z. Hu, Y. Wang, Y. L. Cai, Advantages of the enhanced opposite direction searching algorithm for computing the centroid of an interval type-2 fuzzy set, Asian J. Control, 14 (2012), 1422-1430. |
[42] | J. H. Hu, P. P. Chen, Y. Yang, The fruit fly optimization algorithms for patient-centered care based on interval trapezoidal type-2 fuzzy numbers, Int. J. Fuzzy Syst., 21 (2019), 1270-1287. |
[43] | M. Javanmard, H. Mishmast Nehi, A solving method for fuzzy linear programming problem with interval type-2 fuzzy numbers, Int. J. Fuzzy Syst., 21 (2019), 882-891. |
[44] |
C. Chen, R. John, J. Twycross, et al. A direct approach for determining the switch points in the Karnik-Mendel algorithm, IEEE Trans. Fuzzy Syst., 26 (2018), 1079-1085. doi: 10.1109/TFUZZ.2017.2699168
![]() |
[45] | O. Castillo, L. Amador-Angulo, J. R. Castro, et al. A comparative study of type-1 fuzzy logic systems, interval type-2 fuzzy logic systems and generalized type-2 fuzzy logic systems in control problems, Inf. Sci., 354 (2016), 257-274. |
[46] | L. Cervantes, O. Castillo, Type-2 fuzzy logic aggregation of multiple fuzzy controllers for airplane flight control, Inf. Sci., 324 (2015), 247-256. |
[47] | O. Castillo, P. Melin, E. Ontiveros, et al. A high-speed interval type 2 fuzzy system approach for dynamic parameter adaptation in metaheuristics, Eng. Appl. Artificial Intelligence, 85 (2019), 666-680. |
[48] | E. Ontiveros-Robles, P. Melin, O. Castillo, Comparative analysis of noise robustness of type 2 fuzzy logic controllers, Kybernetika, 54 (2018), 175-201. |
[49] |
E. Ontiveros-Robles, P. Melin, O. Castillo, New methodology to approximate type-reduction based on a continuous root-finding karnik mendel algorithm, Algorithms, 10 (2017), 77-96. doi: 10.3390/a10030077
![]() |
[50] | Y. Chen, Study on sampling-based discrete noniterative algorithms for centroid type-reduction of interval type-2 fuzzy logic systems, Soft Comput., 24 (2020), 11819-11828. |
[51] |
S. C. Tong, Y. M. Li, Robust adaptive fuzzy backstepping output feedback tracking control for nonlinear system with dynamic uncertainties, Sci. China Inf. Sci., 53 (2010), 307-324. doi: 10.1007/s11432-010-0031-y
![]() |
[52] | S. C. Tong, Y. M. Li, Observer-based adaptive fuzzy backstepping control of uncertain pure-feedback systems, Sci. China Inf. Sci., 57 (2014), 1-14. |
[53] | M. Deveci, I. Z. Akyurt, S. Yavuz, GIS-based interval type-2 fuzzy set for public bread factory site selection, J. Enterprise Inf. Manage., 31 (2018), 820-847. |
1. | Yang Chen, Jiaxiu Yang, Study on center-of-sets type-reduction of interval type-2 fuzzy logic systems with noniterative algorithms, 2021, 10641246, 1, 10.3233/JIFS-202264 | |
2. | Xiaomei Li, Yang Chen, Discrete Non-iterative Centroid Type-Reduction Algorithms on General Type-2 Fuzzy Logic Systems, 2021, 1562-2479, 10.1007/s40815-020-00996-6 | |
3. | Yang Chen, Design of Begian–Melek–Mendel structure-based interval type-2 fuzzy logic systems optimized with backpropagation algorithms, 2022, 44, 0142-3312, 3057, 10.1177/01423312221099700 | |
4. | Yang Chen, Jiaxiu Yang, Chenxi Li, Design of reasonable initialization weighted enhanced Karnik-Mendel algorithms for centroid type-reduction of interval type-2 fuzzy logic systems, 2022, 7, 2473-6988, 9846, 10.3934/math.2022549 | |
5. | Chuang Liu, Jinxia Wu, Weidong Yang, Robust $ {H}_{\infty} $ output feedback finite-time control for interval type-2 fuzzy systems with actuator saturation, 2022, 7, 2473-6988, 4614, 10.3934/math.2022257 | |
6. | Yang Chen, Chenxi Li, Jiaxiu Yang, Design of Discrete Noniterative Algorithms for Center-of-Sets Type Reduction of General Type-2 Fuzzy Logic Systems, 2022, 24, 1562-2479, 2024, 10.1007/s40815-022-01256-5 | |
7. | Xiaoyu Peng, Xiaodong Pan, Interval type-2 fuzzy systems on the basis of vague partitions and their approximation properties, 2024, 43, 2238-3603, 10.1007/s40314-024-02629-2 | |
8. | Yang Chen, Chenxi Li, Study on sensible beginning divided-search enhanced Karnik-Mendel algorithms for centroid type-reduction of general type-2 fuzzy logic systems, 2024, 9, 2473-6988, 11851, 10.3934/math.2024580 | |
9. | Yang Chen, Study on centroid type-reduction of general type-2 fuzzy logic systems with sensible beginning weighted enhanced Karnik–Mendel algorithms, 2023, 27, 1432-7643, 9261, 10.1007/s00500-023-08269-8 |
Step | CKM algorithm for l˜B, l˜B=min∀θ(y)∈[μ_˜B(y),¯μ˜B(y)]∫bayθ(y)dy∫baθ(y)dy |
1 | Let θ(y)=[μ_˜B(y)+¯μ˜B(y)]/2, and compute ξ′=∫bayθ(y)dy∫baθ(y)dy. |
2 | Set θ(y)=¯μ˜B(y) when y⩽ξ′, and θ(y)=μ_˜B(y) when y>ξ′, and compute ξl=∫bayθ(y)dy∫baθ(y)dy. |
3 | Check if |ξ′−ξl|⩽ε(ε is a given error bound), if yes, stop and set l˜B=ξl, if no, go to Step 4. |
4 | Set ξ′=ξl and go to Step 2. |
Step | CKM algorithm for r˜B, r˜B=max∀θ(y)∈[μ_˜B(y),¯μ˜B(y)]∫bayθ(y)dy∫baθ(y)dy |
1 | Let θ(y)=[μ_˜B(y)+¯μ˜B(y)]/2, and compute ξ′=∫bayθ(y)dy∫baθ(y)dy. |
2 | Set θ(y)=μ_˜B(y) when y⩽ξ′, and θ(y)=¯μ˜B(y) when y>ξ′, and compute ξr=∫bayθ(y)dy∫baθ(y)dy. |
3 | Check if |ξ′−ξr|⩽ε(ε is a given error bound), if yes, stop and set r˜B=ξr, if no, go to Step 4. |
4 | Set ξ′=ξl and go to Step 2. |
Step | CEKM algorithm for l˜B |
1 | Set c=a+(b−a)/2.4, and compute α=∫cay¯μ˜B(y)dy+∫bcyμ_˜B(y)dy, β=∫ca¯μ˜B(y)dy+∫bcμ_˜B(y)dy, c′=α/β. |
2 | Check if |c′−c|⩽ε, if yes, stop and set c′=l˜B, if no, go to Step 4. |
3 | Compute s=sign(c′−c), α′=α+s∫max(c,c′)min(c,c′)y[¯μ˜B(y)−μ_˜B(y)]dy, β′=β+s∫max(c,c′)min(c,c′)[¯μ˜B(y)−μ_˜B(y)]dy, c″=α′/β′. |
4 | Set c=c′,c′=c″,α=α′,β=β′ and go to Step 2. |
Step | CEKM algorithm for r˜B |
1 | Set c=a+(b−a)/1.7, and compute α=∫cayμ_˜B(y)dy+∫bcy¯μ˜B(y)dy, β=∫caμ_˜B(y)dy+∫bc¯μ˜B(y)dy, c′=α/β. |
2 | Check if |c′−c|⩽ε, if yes, stop and set c′=r˜B, if no, go to Step 4. |
3 | Compute s=sign(c′−c), α′=α−s∫max(c,c′)min(c,c′)y[¯μ˜B(y)−μ_˜B(y)]dy, β′=β−s∫max(c,c′)min(c,c′)[¯μ˜B(y)−μ_˜B(y)]dy, c″=α′/β′. |
4 | Set c=c′,c′=c″,α=α′,β=β′ and go to Step 2. |
Step | KM algorithm for l˜B, l˜B=min∀θi∈[μ_˜B(yi),¯μ˜B(yi)](N∑i=1yiθi)/(N∑i=1θi) |
1 | Set θ(i)=[μ_˜B(yi)+¯μ˜B(yi)]/2,i=1,⋯,N and compute c′=(N∑i=1yiθi)/(N∑i=1θi). |
2 | Find k′(1⩽k′⩽N−1) such that yk′⩽c′<yk′+1. |
3 | Set θi=¯μ˜B(yi) when i⩽k′, and θi=μ_˜B(yi) when i>k′, and compute l˜B(k′)=(N∑i=1yiθi)/(N∑i=1θi). |
4 | Check if l˜B(k′)=c′, if yes, stop and set l˜B(k′)=l˜B and k′=L, if no, go to Step 5. |
5 | Set c′=l˜B(k′) and go to Step 2. |
Step | KM algorithm for r˜B, r˜B=max∀θi∈[μ_˜B(yi),¯μ˜B(yi)](N∑i=1yiθi)/(N∑i=1θi) |
1 | Set θ(i)=[μ_˜B(yi)+¯μ˜B(yi)]/2,i=1,⋯,N and compute c′=(N∑i=1yiθi)/(N∑i=1θi). |
2 | Find k′(1⩽k′⩽N−1) such that yk′⩽c′<yk′+1. |
3 | Set θi=μ_˜B(yi) when i⩽k′, and θi=¯μ˜B(yi) when i>k′, and compute r˜B(k′)=(N∑i=1yiθi)/(N∑i=1θi). |
4 | Check if r˜B(k′)=c′, if yes, stop and set r˜B(k′)=r˜B and k′=R, if no, go to Step 5. |
5 | Set c′=r˜B(k′) and go to Step 2. |
Step | EKM algorithm for l˜B |
1 | Set k=[N/2.4] (the nearest integer to N/2.4) and computeα=k∑i=1yi¯μ˜B(yi)+N∑i=k+1yiμ_˜B(yi), β=k∑i=1¯μ˜B(yi)+N∑i=k+1μ_˜B(yi), c′=α/β. |
2 | Find k′(1⩽k′<N−1) such that yk′⩽c′<yk′+1. |
3 | Check if k′=k, if yes, stop and set c′=l˜B and k=L, if no, go to Step 4. |
4 | Compute s=sign(k′−k), α′=α+smax(k,k′)∑i=min(k,k′)+1yi[¯μ˜B(yi)−μ_˜B(yi)], β′=β+smax(k,k′)∑i=min(k,k′)+1[¯μ˜B(yi)−μ_˜B(yi)], c″=α′/β′. |
5 | Set c′=c″,α=α′,β=β′,k=k′ and go to Step 2. |
Step | EKM algorithm for r˜B |
1 | Set k=[N/1.7] and compute α=k∑i=1yiμ_˜B(yi)+N∑i=k+1yi¯μ˜B(yi), β=k∑i=1μ_˜B(yi)+N∑i=k+1¯μ˜B(yi), c′=α/β. |
2 | Find k′(1⩽k′<N−1) such that yk′⩽c′<yk′+1. |
3 | Check if k′=k, if yes, stop and set c′=r˜B and k=R, if no, go to Step 4. |
4 | Compute s=sign(k′−k), α′=α−smax(k,k′)∑i=min(k,k′)+1yi[¯μ˜B(yi)−μ_˜B(yi)], β′=β−smax(k,k′)∑i=min(k,k′)+1[¯μ˜B(yi)−μ_˜B(yi)], c″=α′/β′. |
5 | Set c′=c″,α=α′,β=β′,k=k′ and go to Step 2. |
Step | RIEKM algorithm for l˜B |
1 | Set k=[N/(1+√ρ)] (ρ=[N∑i=1¯μ˜B(y)]/[N∑i=1μ_˜B(y)], which is depend on the specific examples) and computeα=k∑i=1yi¯μ˜B(yi)+N∑i=k+1yiμ_˜B(yi),β=k∑i=1¯μ˜B(yi)+N∑i=k+1μ_˜B(yi), c′=α/β. |
2 | Find k′(1⩽k′<N−1) such that yk′⩽c′<yk′+1. |
3 | Check if k′=k, if yes, stop and set c′=l˜B and k=L, if no, go to Step 4. |
4 | Compute s=sign(k′−k), α′=α+smax(k,k′)∑i=min(k,k′)+1yi[¯μ˜B(yi)−μ_˜B(yi)], β′=β+smax(k,k′)∑i=min(k,k′)+1[¯μ˜B(yi)−μ_˜B(yi)], c″=α′/β′. |
5 | Set c′=c″,α=α′,β=β′,k=k′ and return to Step 2. |
Step | RIEKM algorithm for r˜B |
1 | Set k=[N/(1+√1/ρ)] and compute α=k∑i=1yiμ_˜B(yi)+N∑i=k+1yi¯μ˜B(yi), β=k∑i=1μ_˜B(yi)+N∑i=k+1¯μ˜B(yi), c′=α/β |
2 | Find k′(1⩽k′<N−1) such that yk′⩽c′<yk′+1. |
3 | Check if k′=k, if yes, stop and set c′=r˜B and k=R, if no, go to Step 4. |
4 | Compute s=sign(k′−k), α′=α−smax(k,k′)∑i=min(k,k′)+1yi[¯μ˜B(yi)−μ_˜B(yi)], β′=β−smax(k,k′)∑i=min(k,k′)+1[¯μ˜B(yi)−μ_˜B(yi)], c″=α′/β′. |
5 | Set c′=c″,α=α′,β=β′,k=k′ and return to Step 2. |
Num | Expressions |
1 | μ_˜A1(x)=max{[x−16,1⩽x⩽47−x6,4<x⩽70,otherwise],[x−36,3⩽x⩽58−x9,5<x⩽80,otherwise]}¯μ˜A1(x)=max{[x−12,1⩽x⩽37−x4,3<x⩽70,otherwise],[x−25,2⩽x⩽616−2x5,6<x⩽80,otherwise]} |
2 | μ_˜A2(x)={0.6(x+5)19,−5⩽x⩽2.60.4(14−x)19,2.6<x⩽14¯μ˜A2(x)={exp[−12(x−25)2],−5⩽x⩽7.185exp[−12(x−91.75)2],7.185<x⩽14 |
3 | μ_˜A3(x)=max{0.5exp[−(x−3)22],0.4exp[−(x−6)22]}¯μ˜A3(x)=max{exp[−0.5(x−3)24],0.8exp[−0.5(x−6)24]} |
4 | μ_˜A4(x)=exp[−12(x−30.25)2],¯μ˜A4(x)=exp[−12(x−31.75)2] |
Algorithms | EKM | RIEKM |
Example 1 | 0.932160 | 0.889015 |
Example 2 | 15.595056 | 14.933244 |
Example 3 | 3.577131 | 3.546304 |
Example 4 | 0.027159 | 0.000251 |
Total average | 5.032877 | 4.842204 |
Step | CKM algorithm for l˜B, l˜B=min∀θ(y)∈[μ_˜B(y),¯μ˜B(y)]∫bayθ(y)dy∫baθ(y)dy |
1 | Let θ(y)=[μ_˜B(y)+¯μ˜B(y)]/2, and compute ξ′=∫bayθ(y)dy∫baθ(y)dy. |
2 | Set θ(y)=¯μ˜B(y) when y⩽ξ′, and θ(y)=μ_˜B(y) when y>ξ′, and compute ξl=∫bayθ(y)dy∫baθ(y)dy. |
3 | Check if |ξ′−ξl|⩽ε(ε is a given error bound), if yes, stop and set l˜B=ξl, if no, go to Step 4. |
4 | Set ξ′=ξl and go to Step 2. |
Step | CKM algorithm for r˜B, r˜B=max∀θ(y)∈[μ_˜B(y),¯μ˜B(y)]∫bayθ(y)dy∫baθ(y)dy |
1 | Let θ(y)=[μ_˜B(y)+¯μ˜B(y)]/2, and compute ξ′=∫bayθ(y)dy∫baθ(y)dy. |
2 | Set θ(y)=μ_˜B(y) when y⩽ξ′, and θ(y)=¯μ˜B(y) when y>ξ′, and compute ξr=∫bayθ(y)dy∫baθ(y)dy. |
3 | Check if |ξ′−ξr|⩽ε(ε is a given error bound), if yes, stop and set r˜B=ξr, if no, go to Step 4. |
4 | Set ξ′=ξl and go to Step 2. |
Step | CEKM algorithm for l˜B |
1 | Set c=a+(b−a)/2.4, and compute α=∫cay¯μ˜B(y)dy+∫bcyμ_˜B(y)dy, β=∫ca¯μ˜B(y)dy+∫bcμ_˜B(y)dy, c′=α/β. |
2 | Check if |c′−c|⩽ε, if yes, stop and set c′=l˜B, if no, go to Step 4. |
3 | Compute s=sign(c′−c), α′=α+s∫max(c,c′)min(c,c′)y[¯μ˜B(y)−μ_˜B(y)]dy, β′=β+s∫max(c,c′)min(c,c′)[¯μ˜B(y)−μ_˜B(y)]dy, c″=α′/β′. |
4 | Set c=c′,c′=c″,α=α′,β=β′ and go to Step 2. |
Step | CEKM algorithm for r˜B |
1 | Set c=a+(b−a)/1.7, and compute α=∫cayμ_˜B(y)dy+∫bcy¯μ˜B(y)dy, β=∫caμ_˜B(y)dy+∫bc¯μ˜B(y)dy, c′=α/β. |
2 | Check if |c′−c|⩽ε, if yes, stop and set c′=r˜B, if no, go to Step 4. |
3 | Compute s=sign(c′−c), α′=α−s∫max(c,c′)min(c,c′)y[¯μ˜B(y)−μ_˜B(y)]dy, β′=β−s∫max(c,c′)min(c,c′)[¯μ˜B(y)−μ_˜B(y)]dy, c″=α′/β′. |
4 | Set c=c′,c′=c″,α=α′,β=β′ and go to Step 2. |
Step | KM algorithm for l˜B, l˜B=min∀θi∈[μ_˜B(yi),¯μ˜B(yi)](N∑i=1yiθi)/(N∑i=1θi) |
1 | Set θ(i)=[μ_˜B(yi)+¯μ˜B(yi)]/2,i=1,⋯,N and compute c′=(N∑i=1yiθi)/(N∑i=1θi). |
2 | Find k′(1⩽k′⩽N−1) such that yk′⩽c′<yk′+1. |
3 | Set θi=¯μ˜B(yi) when i⩽k′, and θi=μ_˜B(yi) when i>k′, and compute l˜B(k′)=(N∑i=1yiθi)/(N∑i=1θi). |
4 | Check if l˜B(k′)=c′, if yes, stop and set l˜B(k′)=l˜B and k′=L, if no, go to Step 5. |
5 | Set c′=l˜B(k′) and go to Step 2. |
Step | KM algorithm for r˜B, r˜B=max∀θi∈[μ_˜B(yi),¯μ˜B(yi)](N∑i=1yiθi)/(N∑i=1θi) |
1 | Set θ(i)=[μ_˜B(yi)+¯μ˜B(yi)]/2,i=1,⋯,N and compute c′=(N∑i=1yiθi)/(N∑i=1θi). |
2 | Find k′(1⩽k′⩽N−1) such that yk′⩽c′<yk′+1. |
3 | Set θi=μ_˜B(yi) when i⩽k′, and θi=¯μ˜B(yi) when i>k′, and compute r˜B(k′)=(N∑i=1yiθi)/(N∑i=1θi). |
4 | Check if r˜B(k′)=c′, if yes, stop and set r˜B(k′)=r˜B and k′=R, if no, go to Step 5. |
5 | Set c′=r˜B(k′) and go to Step 2. |
Step | EKM algorithm for l˜B |
1 | Set k=[N/2.4] (the nearest integer to N/2.4) and computeα=k∑i=1yi¯μ˜B(yi)+N∑i=k+1yiμ_˜B(yi), β=k∑i=1¯μ˜B(yi)+N∑i=k+1μ_˜B(yi), c′=α/β. |
2 | Find k′(1⩽k′<N−1) such that yk′⩽c′<yk′+1. |
3 | Check if k′=k, if yes, stop and set c′=l˜B and k=L, if no, go to Step 4. |
4 | Compute s=sign(k′−k), α′=α+smax(k,k′)∑i=min(k,k′)+1yi[¯μ˜B(yi)−μ_˜B(yi)], β′=β+smax(k,k′)∑i=min(k,k′)+1[¯μ˜B(yi)−μ_˜B(yi)], c″=α′/β′. |
5 | Set c′=c″,α=α′,β=β′,k=k′ and go to Step 2. |
Step | EKM algorithm for r˜B |
1 | Set k=[N/1.7] and compute α=k∑i=1yiμ_˜B(yi)+N∑i=k+1yi¯μ˜B(yi), β=k∑i=1μ_˜B(yi)+N∑i=k+1¯μ˜B(yi), c′=α/β. |
2 | Find k′(1⩽k′<N−1) such that yk′⩽c′<yk′+1. |
3 | Check if k′=k, if yes, stop and set c′=r˜B and k=R, if no, go to Step 4. |
4 | Compute s=sign(k′−k), α′=α−smax(k,k′)∑i=min(k,k′)+1yi[¯μ˜B(yi)−μ_˜B(yi)], β′=β−smax(k,k′)∑i=min(k,k′)+1[¯μ˜B(yi)−μ_˜B(yi)], c″=α′/β′. |
5 | Set c′=c″,α=α′,β=β′,k=k′ and go to Step 2. |
Step | RIEKM algorithm for l˜B |
1 | Set k=[N/(1+√ρ)] (ρ=[N∑i=1¯μ˜B(y)]/[N∑i=1μ_˜B(y)], which is depend on the specific examples) and computeα=k∑i=1yi¯μ˜B(yi)+N∑i=k+1yiμ_˜B(yi),β=k∑i=1¯μ˜B(yi)+N∑i=k+1μ_˜B(yi), c′=α/β. |
2 | Find k′(1⩽k′<N−1) such that yk′⩽c′<yk′+1. |
3 | Check if k′=k, if yes, stop and set c′=l˜B and k=L, if no, go to Step 4. |
4 | Compute s=sign(k′−k), α′=α+smax(k,k′)∑i=min(k,k′)+1yi[¯μ˜B(yi)−μ_˜B(yi)], β′=β+smax(k,k′)∑i=min(k,k′)+1[¯μ˜B(yi)−μ_˜B(yi)], c″=α′/β′. |
5 | Set c′=c″,α=α′,β=β′,k=k′ and return to Step 2. |
Step | RIEKM algorithm for r˜B |
1 | Set k=[N/(1+√1/ρ)] and compute α=k∑i=1yiμ_˜B(yi)+N∑i=k+1yi¯μ˜B(yi), β=k∑i=1μ_˜B(yi)+N∑i=k+1¯μ˜B(yi), c′=α/β |
2 | Find k′(1⩽k′<N−1) such that yk′⩽c′<yk′+1. |
3 | Check if k′=k, if yes, stop and set c′=r˜B and k=R, if no, go to Step 4. |
4 | Compute s=sign(k′−k), α′=α−smax(k,k′)∑i=min(k,k′)+1yi[¯μ˜B(yi)−μ_˜B(yi)], β′=β−smax(k,k′)∑i=min(k,k′)+1[¯μ˜B(yi)−μ_˜B(yi)], c″=α′/β′. |
5 | Set c′=c″,α=α′,β=β′,k=k′ and return to Step 2. |
Num | Expressions |
1 | μ_˜A1(x)=max{[x−16,1⩽x⩽47−x6,4<x⩽70,otherwise],[x−36,3⩽x⩽58−x9,5<x⩽80,otherwise]}¯μ˜A1(x)=max{[x−12,1⩽x⩽37−x4,3<x⩽70,otherwise],[x−25,2⩽x⩽616−2x5,6<x⩽80,otherwise]} |
2 | μ_˜A2(x)={0.6(x+5)19,−5⩽x⩽2.60.4(14−x)19,2.6<x⩽14¯μ˜A2(x)={exp[−12(x−25)2],−5⩽x⩽7.185exp[−12(x−91.75)2],7.185<x⩽14 |
3 | μ_˜A3(x)=max{0.5exp[−(x−3)22],0.4exp[−(x−6)22]}¯μ˜A3(x)=max{exp[−0.5(x−3)24],0.8exp[−0.5(x−6)24]} |
4 | μ_˜A4(x)=exp[−12(x−30.25)2],¯μ˜A4(x)=exp[−12(x−31.75)2] |
Algorithms | EKM | RIEKM |
Example 1 | 0.932160 | 0.889015 |
Example 2 | 15.595056 | 14.933244 |
Example 3 | 3.577131 | 3.546304 |
Example 4 | 0.027159 | 0.000251 |
Total average | 5.032877 | 4.842204 |