1.
Introduction
Interval T2 (IT2) FLSs [1,2,3] have been applied to many fields with higher uncertainties and nonlinear characteristics. Despite this, since the alpha-plane (or z-slice) representation theory [4,5,6,7] of GT2 FSs was put forward by a few different research groups, much of the academic attention has shifted from IT2 fuzzy logic to GT2 fuzzy logic. As the computational complexity has been decreased significantly, they are increasingly being applied to in fields like border detection [8,9], fuzzy logic control [10,11], permanent magnetic drive [12,13,14,15], and so forth. As the secondary membership grades of GT2 FSs exist between zero and one, so that, they may be considered as more advanced order parameter models compared with IT2 FSs. Because the design degrees of freedom increase, GT2 FLSs have more of an ability to cope with issues arising from uncertainties in contrast to IT2 FLSs.
GT2 FLSs [7] are made up of five blocks: Fuzzifier, rules, inference, TR, and defuzzification. TR is the kernel block, which plays the role of transforming the GT2 FS to the type-1 (T1) FS. The block of defuzzification maps the T1 FS to the crisp output. The most popular enhanced Karnik-Mendel (EKM [16,17,18,19,20,21,22,23]) TR algorithms have the advantage of keeping the uncertainty flows between the lower membership functions (LMFs) and upper MFs (UMFs). Despite so, this kind of algorithm is still computationally intensive. Liu gave the initialization interpretations [18] for the EKM algorithms, then the sensible beginning (SB, or say reasonable initialization) EKM (SBEKM) algorithms [24] can be generated. Based on these studies, this paper further divides the search space [25] of SBEKM algorithms, and then proposes the sensible beginning divided-search EKM (SBDEKM) algorithms for performing the centroid TR for GT2 FLSs.
The remainder is organized as follows: Section 2 provides the background knowledge of GT2 FLSs. The SBDEKM algorithms are proposed to complete the centroid TR and defuzzification of GT2 FLSs in Section 3. Section 4 provides computer simulations to show the performance of the SBDEKM algorithms compared with the EKM algorithms and SBEKM algorithms. Finally, Section 5 gives the conclusions and expectations.
2.
Background of GT2 FLSs
In general, we may categorize the GT2 FLSs into two types from the aspect of inference: Mamdani [7,26,27] and Takagi-Sugeno-Kang [12,29,30]. In this paper, without loss of generality, consider a GT2 FLS with n inputs x1∈X1,⋯xn∈Xn and one output ˜B, among which, the sth is given as:
in which ˜Fsi(i=1,⋯,n;s=1,⋯,M) is the antecedent, and ˜Gs(s=1,2,⋯,M) is the consequent.
For the sake of simplifying the expressions, here the singleton fuzzifier xi=x′i is used, only one vertical slice (secondary membership) ˜Fsi(x′i) of antecedent ˜Fsi is activated, and the alpha-cut decomposition can be represented as:
For each rule, the firing interval at the corresponding alpha-level is:
where p denotes the number of antecedents, and T represents the minimum or product t-norm.
Let ˜Gsα be the alpha-plane of consequent ˜Gs under the corresponding alpha-level, i.e.,
In the following, we merge the firing interval of each rule with the related rule consequent alpha-plane ˜Gsα to get the firing rule alpha-plane ˜Bsα, i.e.,
Aggregating all the ˜Bsα to get the output alpha-plane ˜Bα, i.e.,
Calculating the centroid of ˜Bα at the corresponding alpha-level to obtain the type-reduced set l˜Bα=ξl˜Bα, i.e.,
in which r˜Bα(x′) and l˜Bα(x′) can be computed by many different kinds of TR algorithms [16,17,18,19,20,21,27,28] as:
where n is the number of sampling points, and the specific IT2 FS R˜Bα=α/˜Bα.
Aggregating all the YC,α to obtain the final T1 type-reduced set YC, i.e.,
Suppose that the number of alpha-planes is m, that is to say, alpha is decomposed into α1,α2,⋯,αm, and then the output should:
3.
SBDEKM algorithms
First of all, we provide the sensible beginning (or say reasonable initialization) EKM algorithms [18,24,31,32] for finishing the centroid TR and defuzzification of GT2 FLSs. According to the inference, let the output of the GT2 FLSs be ˜B, whose primary variable is discretized into c=y1<⋯<yn=d, then l˜Bα and r˜Bα under the alpha-level can be computed by a continuous version of the KM algorithms:
For computing the two end points, Tables 1 and 2 give the computation steps for CKM and CEKM algorithms. According to the representations Fl˜Bα in (12) and Fr˜Bα in (13), i.e.,
When l˜Bα=ηl˜Bα, and r˜Bα=ηr˜Bα, the iteration finishes, and we have that,
For initializing the algorithms, as y∈[c,d], let f_R˜Bα(y)=¯fR˜Bα(y)≡θ(y), so that, θ(y)=[¯fR˜Bα(y)+f_R˜Bα(y)]/2. Then Eqs (12) and (13) turn out to be the same.
The initialization of the CKM algorithms may be represented as η(1), that is to say,
Tables 3 and 4 give the computation steps for the discrete KM, and discrete EKM algorithms, respectively. Here the discrete representation of η(1) can be written as:
Suppose that,
For y∈[c,d], as ¯fR˜Bα(y)⩾f_R˜Bα(y), therefore, ρ⩾1. Let both ¯fR˜Bα(y) and f_R˜Bα(y) be constants, that is to say, ¯fR˜Bα(y)=ρN>0, so that,
Find the derivative of Fl˜Bα(η) to η, that is to say,
Let F′l˜Bα(η)=0, so that,
Therefore,
As η∈[a,ηl˜Bα), F′l˜Bα(η)<0; and as η∈(ηl˜Bα,b], F′l˜Bα(η)>0. So ηl˜Bα is the minimum value of Fl˜Bα(η).
In a similar manner, let us seek the maximum value of Fr˜Bα(η), i.e.,
Find the derivative of Fr˜Bα(η) to η, that is to say,
Let F′r˜Bα(η)=0, so that,
Therefore, the solution of above equation can be written as:
As η∈[c,ηr˜Bα), F′r˜Bα(η)>0; and as η∈(ηr˜Bα,d], F′r˜Bα(η)<0. Therefore, ηr˜Bα is the minimum value of Fr˜Bα(η).
Considering the Eqs (24) and (28) comprehensively, the sensible beginning method for η may be represented as η(2), i.e.,
Comparing the initializations of discrete EKM and CEKM algorithms, we can get the discrete.
form of Eq (29) as:
in which ρ=n∑i=1¯fR˜Bα(y)/n∑i=1¯fR˜Bα(y)n∑i=1f_R˜Bα(y)n∑i=1f_R˜Bα(y).
Interestingly, as ρ=2, 1+√ρ=1+√2≈2.4, and 1+√1/ρ=1+√1/2≈1.7, so the Eq (30) turns out to be the initialization of the EKM algorithms.
Meanwhile, for the SBEKM algorithms, ρ should be determined according to the corresponding experiments. Then the computation steps of the SBEKM and SBCEKM algorithms are given in Tables 5 and 6, respectively.
In order to give the proposed SBDEKM algorithms, we divide the searching space for SBEKM algorithms. Wang et al. proposed the divided-search EKM (DEKM) algorithms [20] for calculating the centroids of IT2 FSs. Here we first extend it for completing the centroid TR for GT2 FLSs. For computing l˜Bα, the initialization of the DEKM algorithms is:
The initialization of the SBDEKM algorithms is:
Next, we introduce how to divide the searching points for the SBDEKM (or DEKM) algorithms. Here, they are given as: round(k/2), k(or round[(k+n)/2)]).The analysis process is as follows:
At the corresponding alpha-level, for l˜Bα, initialize k and find k′. Comparing the values of the current l˜Bα=α/β, yk, and yk+1. There may be three major situations:
Major situation 1: If l˜Bα<yk, judge the relations between l˜Bα and yround(k/2), for which there are three minor situations: i) l˜Bα<yround(k/2), ii) yround(k/2)⩽l˜Bα<yround(k/2)+1, and iii) yround(k/2)+1⩽l˜Bα.
In i): Search down from round(k/2)−1 to 1, seek the k′ which satisfies yk′⩽α/β⩽yk′+1.
In ii): L=round(k/2).
In iii): Search up from round(k/2)+1 to k−1, find the k′ which satisfies yk′⩽α/β⩽yk′+1.
Major situation 2: If yk⩽l˜Bα<yk+1, L=k.
Major situation 3: If yk+1⩽l˜Bα, then judge the relations between l˜Bα and yround[(k+n)/2]. There may be three minor situations: i)l˜Bα<yround[(k+n)/2], ii)yround[(k+n)/2]⩽l˜Bα<yround[(k+n)/2]+1, and iii)yround[(k+n)/2]+1⩽l˜Bα.
In i): Search down from round[(k+n)/2] to 1, seek the k′ which satisfies yk′⩽α/β⩽yk′+1.
In ii): L=round[(k+n)/2].
In iii): Search up from L=round[(k+n)/2]+1 to n−1, find the k′ which satisfies yk′⩽α/β⩽yk′+1.
For r˜Bα, initialize k and find k′. Comparing the values of the current r˜Bα=α/β, yk, and yk+1. There maybe three major situations:
Major situation 1: If r˜Bα<yk, judge the relations between r˜Bα and yround(k/2), for which there are three minor situations: i) r˜Bα<yround(k/2), ii) yround(k/2)⩽r˜Bα<yround(k/2)+1, and iii) yround(k/2)+1⩽r˜Bα.
In i): Search down from round(k/2)−1 to 1, seek for the k′ which satisfies yk′⩽α/β⩽yk′+1.
In ii): R=round(k/2).
In iii): Search up from round(k/2)+1 to k−1, find the k′ which satisfies yk′⩽α/β⩽yk′+1.
Major situation 2: If yk⩽r˜Bα<yk+1, R=k.
Major situation 3: If yk+1⩽r˜Bα, then judge the relations between r˜Bα and yround[(k+n)/2]. There may be three minor situations: i)r˜Bα<yround[(k+n)/2], ii)yround[(k+n)/2]⩽r˜Bα<yround[(k+n)/2]+1, and iii)yround[(k+n)/2]+1⩽r˜Bα.
In i): Search down from round[(k+n)/2] to 1, seek for the k′ which satisfies yk′⩽α/β⩽yk′+1.
In ii): R=round[(k+n)/2].
In iii): Search up from R=round[(k+n)/2]+1 to n−1, find the k′ which satisfies yk′⩽α/β⩽yk′+1.
Finally, we provide the computation steps for the SBDEKM algorithms.
For l˜Bα,
Step 1. Set k=[n/(1+√ρ)].
Step 2. Compute α=k∑i=1yi¯f˜Bα(yi)+n∑i=k+1yif_˜Bα(yi), and β=k∑i=1¯f˜Bα(yi)+n∑i=k+1f_˜Bα(yi).
Step 3. If α/β<yk and α/β<yround(k/2), then search down from round(k/2)−1 to 1, seek the k′ which satisfies yk′⩽α/β⩽yk′+1, and go to Step 10.
Step 4. If yround(k/2)⩽α/β<yround(k/2)+1, then l˜Bα=α/β, L=k, and go to Step 10.
Step 5. If yround(k/2)⩽α/β<yk, then search down from round(k/2)+1 to k−1, find the k′ which satisfies yk′⩽α/β⩽yk′+1, and go to Step 10.
Step 6. If yk⩽α/β<yk+1, then l˜Bα=α/β, L=k, and go to Step 10.
Step 7. If yk+1⩽α/β<yround[(k+n)/2], then search down from round[(k+n)/2]−1 to k+1, find the k′ which satisfies yk′⩽α/β⩽yk′+1, and go to Step 10.
Step 8. If yround[(k+n)/2]⩽α/β<yround[(k+n)/2]+1, let l˜Bα=α/β, L=round[(k+n)/2], and go to Step 10.
Step 9. If yk+1⩽α/β and yround[(k+n)/2]+1⩽α/β, then search up from round[(k+n)/2]+1 to n−1, seek for the k′ which meets yk′⩽α/β⩽yk′+1, and go to Step 10.
Step 10. Calculate s=sign(k′−k),
Step 11. Update k=k′.
Step 12. Search down from k to 1, seek the k′ which satisfies yk′⩽α/β⩽yk′+1.
Step 13. While k′≠k.
Step 14. Update α′=α−k∑i=k′+1yi[¯f˜Bα(yi)−f_˜Bα(yi)], β′=β−k∑i=k′+1[¯f˜Bα(yi)−f_˜Bα(yi)], and k=k′.
Step 15. Search down from k to 1, seek the k′ which satisfies yk′⩽α/β⩽yk′+1.
Step 16. End while.
Step 17. Let l˜B=α/β, L=k.
For r˜Bα:
Step 1. Set k=[n/(1+√1/ρ)].
Step 2. Compute α=k∑i=1yif_˜Bα(yi)+n∑i=k+1yi¯f˜Bα(yi), and β=k∑i=1f_˜Bα(yi)+n∑i=k+1¯f˜Bα(yi).
Step 3. If α/β<yk and α/β<yround(k/2), then search down from round(k/2)−1 to 1, seek for the k′ which satisfies yk′⩽α/β⩽yk′+1, and go to Step 10.
Step 4. If yround(k/2)+1⩽α/β<yk, then search up from round(k/2)+1 to k−1, find the k′ which meets yk′⩽α/β⩽yk′+1, and go to Step 10.
Step 5. If yround(k/2)⩽α/β<yround(k/2)+1, let r˜Bα=α/β, R=k, and go to Step 10.
Step 6. If yk+1⩽α/β and yround[(k+n)/2]+1⩽α/β, then search up from round[(k+n)/2]+1 to n−1, seek for the k′ which satisfies yk′⩽α/β⩽yk′+1, and go to Step 10.
Step 7. If yk+1⩽α/β<yround[(k+n)/2], then search down from round[(k+n)/2]−1 to k+1, find the k′ which satisfies yk′⩽α/β⩽yk′+1, and go to Step 10.
Step 8. If yround[(k+n)/2]⩽α/β<yround[(k+n)/2]+1, let r˜Bα=α/β, R=round[(k+n)/2], and go to Step 10.
Step 9. If yk⩽α/β<yk+1, then r˜Bα=α/β, R=k, and go to Step 10.
Step 10. Calculate s=sign(k′−k),
Step 11. Update k=k′.
Step 12. Search up from k to n−1, seek the k′ which satisfies yk′⩽α/β⩽yk′+1.
Step 13. While k′≠k.
Step 14. Update α′=α−k∑i=k′+1yi[¯f˜Bα(yi)−f_˜Bα(yi)], β′=β−k∑i=k′+1[¯f˜Bα(yi)−f_˜Bα(yi)], and k=k′.
Step 15. Search up from k to n−1, seek the k′ which satisfies yk′⩽α/β⩽yk′+1.
Step 16. End while.
Step 17. Let r˜Bα=α/β, R=k.
4.
Simulation
Here we give four simulation examples. According to the fuzzy inference, by combining the firing fuzzy rule, let the output GT2 FS be known in advance.
In example one, the footprint of uncertainty (FOU) of primary membership function (MF) is composed of piecewise linear functions [17,18,33,34,35], while the secondary MF (or say vertical slice) is selected as the trapezoidal MF. In example two, for the primary MF, FOU is composed of Gaussian functions and linear functions [36,37,38,39,40,41], while the vertical slice is selected as the trapezoidal MF. In example three, for the primary MF, whose FOU is completely composed of Gaussian functions [17,18,33,34,35], while the secondary MF is selected as the triangle MF. In instance four, for the primary MF, FOU is selected as the Gaussian T2 MF which has uncertain standard deviations [36,37,38,39,40,41], while the secondary MF is selected as the triangle MF.
In computer simulation experiments, the alpha is equally decomposed into: 0,1/Δ,⋯,1, where Δ represents the number of effective values. Here we let Δ be varied from one to a hundred with a step size of 1. First Table 7 and Figure 1 provide the defined FOUs for the four examples.
Let the primary variable be y∈[0,10] in Examples 1, 3 and 4. Suppose that the primary variable is y∈[−5, 14] in instance two. Moreover, the Table 8 and Figure 2 provide the vertical slices of four instances.
Because the computations of l˜Bα and r˜Bα are quite similar, only the l˜Bα is calculated in four simulations. Here the SBCEKM algorithms are considered as a benchmark. As the number of effective alpha-planes Δ=100, let the error accuracy ε=10−6, then the left centroid type-reduced sets calculated by the benchmark are given in Figure 3.
Then the left centroid type-reduced sets computed by the EKM algorithms, SBEKM algorithms and proposed SBDEKM algorithms are provided in Figure 4.
Furthermore, for comparing the performances of these three algorithms, the defined graphs for the absolute errors of type-reduced sets between the benchmark SBCEKM, EKM algorithms, SBEKM algorithms and the proposed SBDEKM algorithms are provided in Figure 5, in which the independent variable is the grade of type-reduced MF.
In order to measure the calculational accuracies of the EKM, SBEKM, and SBDEKM algorithms quantitatively, we define the means of relative absolute errors as:|CEKMi,SBEKMi,SBDEKMi−CSBCEKMi|/|CSBCEKMi|(i=1,2,⋯,4), where CSBCEKMi is the benchmark results of SBCEKM algorithms. Table 9 provides the means of absolute errors of the EKM, SBDEKM, and SBDEKM algorithms, where the results in this table are divided by 10−4.
Observing Figures 4, 5 and Table 9, we can make the following conclusions:
For the absolute errors of type-reduced sets between the benchmark SBCEKM algorithms and the EKM, SBEKM, and SBDEKM algorithms, the results of all of them converge to certain values. In example one, the SBDEKM algorithms obtain the smallest value. In other three examples and for the total average, the EKM algorithms get the smallest value. However, as the results in Table 9 should be divided by 10−4, the differences between these results are very small (see the Figure 3), and so these three kinds of discrete algorithms can get almost the same computational accuracies. If more attention was paid to computational accuracy, we should use the SBWEKM algorithms.
Next, the more important computational times for these three types of algorithms are researched for potential applications. Here the unrepeatable computational times rely on the computer hardware and software environments. The simulation platform consists of a dual core CPU desktop and MATLAB 2013a. In the test, as the number of samples of primary variable is selected as n=50:5000 with a stepsize of 50. The specific unrepeatable calculation times for four instances are given in Figure 6.
Generally speaking, the computational times of the three types of algorithms vary linearly in correspondence with the number of samples. Therefore, the linear regression model t=g+hn can be selected here for simulation, where t represents the calculation time, and g and h are two coefficients. Finally, Table 10 provides the regression coefficients. The calculational time variance rate is given as:
Observing Figure 6 and Table 10, it is clear that the computational times of proposed SBDEKM algorithms are much less than the EKM and SBEKM algorithms. The SBDEKM algorithms should be considered as the first, and the other two types of algorithms should be viewed as the second. As the start of the SBEKM algorithms is more complicated than the EKM algorithms, the computational times of EKM algorithms are better than SBEKM algorithms. In a word, the relation between the times of three kinds of algorithms is:
SBDEKM < EKM < SBDEKM. Moreover, the computational time difference rate for these four instances is between 17.68%~71.16%.
On the basis of the above analysis, it is reasonable to see that the initialization and searching spaces have an effect on completing the centroid TR. Therefore, we should adopt the SBDEKM algorithms for studying the TR. If we only consider the computational accuracies, these three types of algorithms almost have the same performances. However, if we consider both the calculational accuracies and times comprehensively, it is suggested that one uses the SBDEKM algorithms for performing the centroid TR with piece-wise defined primary MF and trapezoidal secondary MF as in instance 1, Gaussian and linear primary MFs and trapezoidal vertical slice as in Example 2, Gaussian primary MF and triangular secondary MF as in Example 3, and uncertain derivation primary MF and triangular secondary MF as in Example 4.
5.
Conclusions
This paper explains the sensible beginning and divides the searching space for EKM algorithms, and then the SBDEKM algorithms are put forward to complete the centroid TR. Compared with both the EKM and SBEKM algorithms, the SBDEKM algorithms can significantly improve the efficiencies of computations.
Next, we will study the SBWEKM algorithms for finishing the TR of IT2 and GT2 FLSs. Both the computational accuracy and efficiency should be enhanced. Furthermore, the center-of-sets (COS) TR [42,43] of IT2 FLSs and GT2 FLSs should continue to be investigated, and designing and applying T2 FLSs optimized with the hybrid application of different kinds of optimization algorithms [9,10,40,41,42,43,44,45,46,47,48,49] will be further focused on.
Use of AI tools declaration
The authors declare that they have not used Artificial Intelligence (AI) tools in the creation of this article.
Acknowledgments
The paper is supported by the National Natural Science Foundation of China (61973146, 61773188), and the Education Department of Liaoning Province (LJKQZ2021143).
The author is thankful to the Professor Mendel, who has provided some important advices.
Conflict of interest
The authors declare that they have no conflict of interest.