Type 2 representation and reasoning for CWW

Fuzzy Sets and Systems 127 (2002) 17–36
www.elsevier.com/locate/fss
Type 2 representation and reasoning for CWW
I. Burhan T(urk*sen ∗
Information=Intelligent Systems Laboratory, Department of Mechanical and Industrial Engineering,
University of Toronto, Toronto, Ont., Canada M5S 3G8
Abstract
Computing with words (CWW) is enriched by Type 2 fuzziness. Type 2 fuzziness exists and provides a richer knowledge
representation and approximate reasoning for computing with words. First, it has been shown that membership functions,
whether (1) they are obtained by subjective measurement experiments, such as direct or reverse rating procedures which
captures varying degrees of membership and hence varying meanings of words or else (2) they are obtained with the
application of modi/ed fuzzy clustering methods, where they all reveal a scatter plot, which captures varying degrees of
meaning for words in a fuzzy cluster. Secondly, it has been shown that the combination of linguistic values with linguistic
operators, “AND”, “OR”, “IMP”, etc., as opposed to crisp connectives that are known as t-norms and t-conorms and standard
negation, lead to the generation of Fuzzy Disjunctive and Conjunctive Canonical Forms, FDCF and FCCF, respectively. In
this paper, we /rst discuss how one captures Type 2 representation. Then we concentrate on Type 2 reasoning that rests on
Type 1 representation. Next, we show how one computes Type 2 reasoning starting with Type 2 representation. It is to be
forecasted that in the new millennium more and more researchers will attempt to capture Type 2 representation and develop
reasoning with Type 2 formulas that reveal the rich information content available in information granules, as well as expose
the risk associated with the graded representation of words and computing with words. This will entail more realistic system
model developments, which will help explore computing with perceptions, and computing with words by exposing graded
c 2002 Published by Elsevier
:exibility as well as uncertainty embedded in meaning representation. Crown Copyright Science B.V. All rights reserved.
1. Introduction
In most current investigations, fuzzy set representations and their logical combinations are based on
Type 1 schema for both the knowledge representation
and approximate reasoning. First, Type 1 representation is a “reductionist” approach for it discards the
spread of membership values by averaging or curve
/tting techniques and hence, camou:ages the “uncer∗
Tel.: +1-416-978-1298; fax: +1-416-978-3453.
E-mail address: [email protected] (I.B. T(urk*sen).
tainty” embedded in the spread of membership values. Therefore, Type 1 representation does not provide a good approximation to meaning representation
of words and does not allow computing with words a
richer platform. Secondly, Type 1 approximate reasoning relies just on the fuzzi/ed version of the “shortest”
forms of the classical Boolean Normal Form formulas,
with the “assumption” that the linguistic “AND” corresponds to a t-norm and linguistic “OR” corresponds
to a t-conorm in a one-to-one mapping. In Type 1 approximate reasoning, “AND”ness is simply mapped
to disjunctive normal form (DNF), and “OR”ness is
c 2002 Published by Elsevier Science B.V. All rights reserved.
0165-0114/02/$ - see front matter Crown Copyright PII: S 0 1 6 5 - 0 1 1 4 ( 0 1 ) 0 0 1 5 0 - 6
18
I.B. T(urks*en / Fuzzy Sets and Systems 127 (2002) 17–36
simply mapped to conjunctive normal form (CNF),
etc. This is again a reductionist, as well as, “myopic”
approach to approximate reasoning. It is an old habit
from two-valued to fuzzy-valued theory. At least two
intuitive expectations come to mind in the light of
the limitations of Type 1 representation and reasoning
outlined above.
First, intuitively, it is natural to expect that a combination of two imprecise Type 1 memberships should
produce new membership functions that capture the
compounded increase of imprecision, i.e., produce a
Type 2 membership function. Thus, one needs to develop formulas that represent Type 2 uncertainty that
arises out of the combination of Type 1 memberships
with linguistic connectives, “AND”, “OR”, “IMP”,
etc.
Second, again intuitively, we would expect that
the combination of two Type 2 memberships should
produce new membership functions that capture the
compounded increase of imprecision realizable with
additional granulation of information.
2. Sources of Type 2 fuzziness
In a historical perspective, it is to be noted that,
Zadeh [49] outlined the importance of interval-valued
(a special case of Type 2) fuzzy sets in decision processes. Furthermore, Zadeh [50] discussed Type 2
fuzzy set representation and its potential in approximate reasoning. A number of researchers began to investigate Type 2 fuzzy sets and their properties after
Zadeh’s introduction of this topic. Some of these are as
follows: Mizumoto and Tanaka [23] (1981); Niemien
[24]; Yager [47]; Hisdal [12]; Wagenkneckt and Hartmann [46]; Roy and Biswas [30]; Burillo and Bustince
[5,6]; Bustince and Burillo [7]; John [13]; John et
al. [14]; Karniak [15]; Karniak and Mendel [16,17];
Liang and Mendel [19,20].
There are two aspects of Type 2 fuzziness in these
investigations: First, it is not explicitly stated how the
Type 2 fuzzy set memberships are acquired with the
exception of (i) John et al. [14], which indicates that
Type 2 fuzzy sets are obtained via neuro-fuzzy clustering of radiographic images and (ii) Mendel et al.,
which indicate that they are computed by mean , and
of the scatter points obtained from questionnaires.
Secondly, most of these works discuss axiomatic pro-
Fig. 1. Direct rating for “tall” man (subject #3).
perties and related approximate reasoning results, and
use the myopic formulas of Type-1 reasoning in developing inference schemas, e.g., Mendel et al., i.e.,
they do not consider FDCF and FCCF formulas in
reasoning schemas.
In contrast, in our investigations, we have dealt with
interval-valued Type 2 representation and reasoning
starting in the early 80s. First, in experimental studies of measurement of membership functions, it was
shown by Norwich and T(urk*sen [25 – 27] that direct
measurement experiments, conducted in order to extract membership functions for “tall” men, “pleasing”
houses, reveal a Type 2 membership representation
that can be identi/ed with the mean and spread of scatter points, with standard deviations (Figs. 1 and 2).
It should be observed that in these graphs, the spread
of scatter points come from the same subject. It is natural to conjecture that the spread would be larger if
the scatter points come from a number of subjects in a
measurement experiment. It should be noted that the
same individual when asked in an experiment gives
diQerent membership values to the same height of an
individual. The replicated experiments are designed so
that there is no memory. Type 2 fuzziness is a natural
outcome of the measurement theory. Since individuals
give diQerent membership values, the spread of membership values re:ects on the one hand the uncertainty
I.B. T(urks*en / Fuzzy Sets and Systems 127 (2002) 17–36
19
of searching the optimal (m; c) pair (m∗ ; c∗ ), we can
identify a set of m’s, {m} that minimize a c, say
c∗ . Thus having identi/ed c∗ , we can then choose a
lower value, m∗L = minm {m; c∗ } and an upper value
m∗U = maxm {m; c∗ }.
Thus, for diQerent levels of fuzziness, i.e., order of
fuzzy overlaps, m’s, we get a scatter plot that gives us a
ground for Type 2 representation. This means that we
can acquire Type 2 membership functions in inductive,
unsupervized, learning experiments with training data
(Fig. 3).
Before we continue, it should be noted that there are
essentially two types of Type 2 fuzziness: (i) intervalvalued Type 2 and (ii) full Type 2.
Fig. 2. Direct rating for “pleasing” house (subject #1).
associated in the meaning of a word, say, “tall”, and
robustness association with meaning representation of
linguistic variables.
Secondly, in modi/ed FCM experiments which we
have began to carry out recently, we have observed
that the dilemma concerning the choice of (m; c)
pair, can be resolved in the following way. Instead
(i) Interval-valued Type 2 fuzziness is a special
Type 2 fuzziness where the upper and lower bounds
of membership are identi/ed and the spread of membership, either fuzzy or probabilistic and where the
spread of membership distribution is ignored with the
assumption that membership values between upper
and lower values are uniformly distributed or scattered
with a membership value of “1” on the ((·)) axis
as shown in Fig. 4. Thus, the upper and lower bounds
of interval-valued Type 2 fuzziness specify the range
of uncertainty about the membership values.
(ii) Full Type 2 fuzziness identi/es upper and
lower membership values as well as the spread of
Fig. 3. Type 2 fuzzy sets: (a) a set of membership functions of a cluster; (b) interval-valued membership functions of a cluster.
20
I.B. T(urks*en / Fuzzy Sets and Systems 127 (2002) 17–36
we obtain a graded distribution of uncertainty between
the bounds.
3. Interval-valued fuzzy sets
Fig. 4. Interval-valued Type 2.
In conjunction with Type 2 fuzziness found in measurement experiments, interval-valued fuzzy sets were
discovered in combination of concepts and hence approximate reasoning by T(urk*sen [32 – 35] where it was
shown that disjunctive and conjunctive normal forms
(DNF) and (CNF) of Boolean logic are no longer
equivalent due to the fact that the law of excluded
middle (LEM), and its dual the law of contradiction
(LC) do not hold in fuzzy set and logic theory which
were relaxed by Zadeh [48] in his seminal paper.
At the same time, it was pointed out that linguistic
operators, “AND”, “OR”, etc., are fuzzy operators and
they do not directly correspond to one of the t-norms
and t-conorms, which are crisp operators. Linguistic
operators “AND”, “OR”, etc., being inherently fuzzy,
need to be interpreted in a graded manner, whereas
t-norms, T’s, and t-conorms, ’s, are crisp operators that combine singleton fuzzy degrees of information granules and give a singleton fuzzy degree, i.e.,
1 T2 = 3 or 1 2 = 4 .
In fact, Zimmerman and Zysno [53] had shown
that human use of “AND”, “OR” do not directly
correspond to a t-norm, such as min, or algebraic
product and to a t-conorm, such as max or algebraic
sum, respectively. They had proposed “Compensatory
‘AND’”, which either linearly or exponentially combines a t-norm and a t-conorm, such as min–max,
or algebraic product and sum with a compensation
operator, ; i.e.,
(i) Convex linear compensation:
F1 (A ; B ; 1 ) = 1 (A ∧ B )
+(1 − 1 )(A ∨ B )
Fig. 5. Full Type 2.
membership values between these bounds either probabilistically or fuzzily. That is there is a probabilistic
or possibilistic distribution of membership values that
are between upper and lower bound of membership
values in the ((·)) axis as shown in Fig. 5. Thus,
or
(ii) Exponential compensation:
F2 (A ; B ; 2 ) = (A ∧ B )2 (A ∨ B )(1−2 ) ;
where 061 ; 2 61.
Later, T(urk*sen [37] showed that in fact operators of Zimmermann and Zysno [53] were compensation weights that combined DNF and CNF values
I.B. T(urks*en / Fuzzy Sets and Systems 127 (2002) 17–36
of “AND”ness, “OR”ness that T(urk*sen discovered in
1986. That is, the degrees of “AND”ness should be
captured, for the case of complex linear compensation
as
FLAND (A ; B; LAND )
= LAND DNF(A AND B) + (1 − LAND )CNF(A AND B) ;
where “LAND” stands for linear ‘AND’ compensation; the degrees of “OR”ness are captured as
FLOR (A ; B ; LOR )
= LOR DNF(A OR B) + (1 − LOR )CNF(A OR B) ;
where “LOR” stands for linear ‘OR’ compensation;
and the degrees of “AND=OR”ness are captured as
FL(AND=OR) (A ; B ; L(AND=OR) )
= L(AND=OR) CNF(A AND B)
+(1 − L(AND=OR) )DNF(A OR B) ;
where “L(AND=OR)” stands for linear ‘AND=OR’
compensation.
In a similar manner, the degrees of “AND”ness for
the exponential compensation are captured as
FEAND (A ; B ; EAND )
= (DNF(A AND B) )EAND (CNF(A AND B) )(1−EAND ) ;
where ‘EAND’ stands for exponential ‘AND’ compensation; the degrees of “OR”ness are captured as
FEOR (A ; B ; EOR )
(DNF(A OR B) )EOR (CNF(A OR B) )(1−EOR ) ;
where ‘EOR’ stands for exponential ‘OR’ compensation; and the degrees of “AND=OR”ness are captured
as
21
reduced Type-2 uncertainty generated by DNF and
CNF formulae to Type-1 membership functions with
the assignment of operators. In Fig. 6, “exponential
compensatory ‘AND’” is shown for a = 0:8, and
b = 0:6.
But there remained a fundamental question that
needed to be answered from a theoretical point of
view. It was known that Boolean formulae, DNF
(·) ≡ (·) CNF (·) for all 16 possible combinations
of any two two-valued sets. But, it was shown that
Boolean DNF and CNF formulae are no longer equivalent, when used with fuzzy membership values [35].
That is, they give results such that DNF (·) =
CNF (·), where (·) stands for any of the sixteen
combinations of any two linguistic values of any two
linguistic variables (see Table 1). In fact, it is also
shown that DNF ⊆ CNF for the well-known cases
of t-norm and t-conorm based De Morgan Triples
formed with standard negation such as (∧; ∨; −),
(⊗; ⊕; −), (L⊗ ; L⊕ ; −), (D⊗ ; D⊕ ; −), where (∧; ∨)
stand for min–max, (⊗; ⊕) stand for algebraic product
and sum, (L⊗ ; L⊕ ) stand for Lukasiewicz intersection
and union, and (D⊗ ; D⊕ ) stand for drastic intersection
and union operators [40].
The fundamental question at this juncture was
whether or not fuzzy disjunctive and conjunctive
canonical forms can be derived from fuzzy truth tables. In 1970, it was argued that fuzzy truth tables
could not be formed [21] for it would require a table
with in/nite number of rows. In a series of papers
[38 – 42], it was progressively shown that fuzzy truth
tables can be constructed and fuzzy disjunctive and
conjunctive canonical forms (FDCF) and (FCCF)
can be derived from the fuzzy truth tables. More
recently, Resconi and T(urk*sen [29] have shown that
there are deeper reasons why FDCF and FCCF are
realized.
Along the way, other researchers began to investigate such topics “AND=OR” intervals of possible degrees of belief [54], and Fuzzy normal forms [8,9].
FE(AND=OR) (A ; B ; E(AND=OR) )
= (CNF(A AND B) )E(AND=OR) (DNF(A OR B) )(1−E(AND=OR) ) ;
where ‘E(AND=OR)’ stands for exponential ‘AND=
OR’ compensation.
These investigations were conducted within the
spirit of the “reductionist” approach and therefore
4. FDCF and FCCF expressions
The application of the normal form derivation algorithm [see Appendix A] gives us the derivation
of FDCF and FCCF expressions for “A AND B”,
shown in row 6 of Table 1, from the fuzzy truth table,
22
I.B. T(urks*en / Fuzzy Sets and Systems 127 (2002) 17–36
Fig. 6. IVFS “A AND B”, “A OR B”, expressed in DNF and CNF and “exponential compensatory AND” using algebraic sum-product De
Morgan Triple, (⊕; ⊗; −) for realization of t-conorm and t-norm for (A = 0:8; B = 0:6 and ∈ [0; 1].
Table 5, as
FDCF (A AND B)
= (A ∩ B); A ⊇ B XOR A ⊂ B is T;
As well, with an appropriate modi/cation of the last
column of Table 5, we can drive FDCF and FCCF
expressions shown in Table 2 for all the remaining 15
meta-linguistic combinations shown in Table 1. For
example for “A OR B”, we get
FCCF (A AND B)
= (A ∪ B) ∩ (B ∪ c(A) ∩ (c(B) ∪ A);
A ⊇ B XOR A ⊂ B is T
for all t-norm, t-conorm and standard complementbased De Morgan Triples that correspond to symbolic
set operation “∩”, “∪”, “c” in the numerical domain,
respectively.
FDCF (A OR B)
= (A ∩ B) ∪ (A ∩ c(B)) ∪ (c(A) ∩ B);
A ⊇ B; XOR A ⊂ B is T;
FCCF (A OR B)
= (A ∪ B); A ⊇ B XOR A ⊂ B is T:
I.B. T(urks*en / Fuzzy Sets and Systems 127 (2002) 17–36
Table 1
Meta-linguistic expressions of combined concepts for any A and B
No.
Meta-linguistic expressions
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
UNIVERSE
EMPTY SET
A OR B
NOT A AND NOT B
NOT A OR NOT B
A AND B
A IMPLIES B
A AND NOT B
A OR NOT B
NOT A AND B
A IF AND ONLY IF B
A EXCLUSIVE OR B
A
NOT A
B
NOT B
For another example, for “A IMPLIES B”, (A → B),
we get
FDCF (A → B)
= (A ∩ B) ∪ (c(A) ∩ B) ∪ (c(A) ∩ c(B));
A ⊆ B; XOR A ⊂ B is T;
FCCF (A → B)
= (c(A) ∪ B); A ⊇ B; XOR A ⊂ B is T:
Again these formulae hold, true for all t-norm, tconorm and standard complementation operations in
the numerical domain that correspond to symbolic set
operations “∩”, “∪”, and “c”, respectively.
It should be noted that for pseudo t-norm, t-conorm
and standard complementation, we need to abide by
the order of A ⊇ B XOR A ⊂ B and adjust all the
formulae accordingly, since they are not commutative
and associative.
5. Impact of FDCF and FCCF
The discovery that we ought to use FDCF and FCCF
in fuzzy combination of linguistic concepts and hence
approximate reasoning, opens up at least three avenues
for the formation of the combination of linguistic con-
23
Table 2
Classical disjunctive normal and fuzzy disjunctive canonical forms
(DNF) and (FDCNF) and classic conjunctive normal and fuzzy
conjunctive canonical forms (CNF) and (FCCF), where ∩ is a
conjunction, ∪ is a disjunctive and c is a complementary operator
No. Fuzzy disjunctive canonical forms=disjunctive normal forms
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
(A ∩ B) ∪ (A ∩ c(B)) ∪ (c(A) ∩ B) ∪ (c(A) ∩ c(B))
(A ∩ B) ∪ (A ∩ c(B)) ∪ (c(A) ∩ B)
(c(A) ∩ c(B))
(A ∩ c(B)) ∪ (c(A) ∩ B) ∪ (c(A) ∩ c(B))
(A ∩ B)
(A ∩ B) ∪
(c(A) ∩ B) ∪ (c(A) ∩ c(B))
(A ∩ c(B))
(A ∩ B) ∪ (A ∩ c(B)) ∪
(c(A) ∩ c(B))
(c(A) ∩ B)
(A ∩ B) ∪
(c(A) ∩ c(B))
(A ∩ c(B)) ∪ (c(A) ∩ B)
(A ∩ B) ∪ (A ∩ c(B))
(c(A) ∩ B) ∪ (c(A) ∩ c(B))
(A ∩ B) ∪
(c(A) ∩ B)
(A ∩ c(B)) ∪
(c(A) ∩ c(B))
No. Fuzzy conjunctive canonical forms=conjunctive normal forms
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
I
(A ∪ B) ∩ (A ∪ c(B)) ∩ (c(A) ∪ B) ∩ (c(A) ∪ c(B))
(A ∪ B)
(A ∪ c(B)) ∩ (c(A) ∪ B) ∩ (c(A) ∪ (c(B))
(c(A) ∪ c(B))
(A ∪ B) ∩ (A ∪ c(B)) ∩ (c(A) ∪ B)
(c(A) ∪ B)
(A ∪ B) ∩ (A ∪ c(B)) ∩
(c(A) ∪ c(B))
(A ∪ c(B))
(A ∪ B) ∩
(c(A) ∪ B) ∩ (c(A) ∪ c(B))
(A ∪ c(B)) ∩ (c(A) ∪ B)
(A ∪ B) ∩
(c(A) ∪ c(B))
(A ∪ B) ∩ (A ∪ c(B))
(c(A) ∪ B) ∩ (c(A) ∪ c(B))
(A ∪ B) ∩
(c(A) ∪ B)
(A ∪ c(B)) ∩
(c(A) ∪ c(B))
cepts and hence approximate reasoning as possible approaches to computing with words:
(i) If we start out with Type 1 membership functions
in knowledge representation, say two fuzzy sets A and
B, then the combination of these two Type 1 fuzzy
sets produce Type 2 fuzzy sets with FDCF ⊆ FCCF. In
Fig. 7, an example of linguistic “OR” combination of
two Type 1 fuzzy membership values are shown with
FDCF(A OR B) (1 ; 2 ) and FCCF(A OR B) (1 ; 2 ).
24
I.B. T(urks*en / Fuzzy Sets and Systems 127 (2002) 17–36
Fig. 7. (1 ; 2 ) for ⊕; ⊗; −
OR combination of two Type 1 memberships say 1 = A (x), and 2 = B (y) where 1 ; 2 ∈ [0; 1],
x ∈ X; y ∈ Y , and A; B two fuzzy sets.
Furthermore, combinations of more than two fuzzy
sets generate 2N −1 membership functions in a binary
tree, where N is the member of linguistic terms. For
example, for the combination of three fuzzy sets with
Type 1 membership functions, we have, 23−1 = 4
membership functions:
(1) FDCF(FDCF(1 ; 2 ); 3 );
(2) FDCF(FCCF(1 ; 2 ); 3 );
(3) FCCF(FDCF(1 ; 2 ); 3 );
(4) FCCF(FCCF(1 ; 2 ); 3 );
etc:
As it should be appreciated, in this case, when there
are more than two fuzzy sets with Type 1 membership
functions, the consequent of the combined linguistic
terms approximately becomes Full Type 2 fuzzy sets.
(ii) If we start out with interval-valued Type 2 fuzzy
sets in knowledge representation, say two fuzzy sets,
A and B then the combination of these two interval-
valued Type 2 fuzzy sets, an approximate Full Type 2
fuzzy set with eight elements is obtained as follows:
(1) FDCF(1L ; 2L );
(3) FDCF(1U ; 2L );
(5) FCCF(1L ; 2L );
(7) FCCF(1U ; 2L );
(2) FDCF(1L ; 2U );
(4) FDCF(1U ; 2U );
(6) FCCF(1L ; 2U );
(8) FCCF(1U ; 2U );
where the pair (1L ; 1U ) de/nes the interval-valued
Type 2 fuzzy set, say, A, and (2L ; 2U ) de/nes the
interval-valued Type 2 fuzzy set, say, B. Naturally, the
combination of more than two interval-valued fuzzy
sets generate 2N −1 · 2N membership values, where N
is the number of linguistic terms.
(iii) If we start out with Full Type 2 fuzzy sets
in knowledge representation, say for two fuzzy sets,
A and B, then the combination of these two Full
Type 2 fuzzy sets produce Type 3 fuzzy sets with
FDCF = FCCF computed on (1 ) and (2 ). Con-
I.B. T(urks*en / Fuzzy Sets and Systems 127 (2002) 17–36
25
Fig. 8. Type 3 fuzzy set memberships generated on Type 2 memberships with FDFC and FCCF.
sequently, we would obtain FDCF ((1 ); (2 )) and
FCCF ((1 ); (2 )) as Type 3 fuzzy sets for all points
(1 ) ∈ [0; 1] and (2 ) ∈ [0; 1].
It should be noted that Karniak and Mendel
[16,17], Luang and Mendel [20] only compute
FDCF ((1 ); (2 )) and ignore FCCF ((1 ); (2 ))
in computing “AND”ness, etc. On the other hand,
they compute FCCF ((1 ); (2 )), but ignore
FDCF ((1 ); (2 )) in computing “OR”ness. That is,
they use the “reductionist”,(myopic) formulas, i.e.,
short form of the Boolean formulas for “AND”ness
and “OR”ness.
It is clear that Type 1–Type 2 and Type 2–Type 3
membership generation created by FDCF and FCCF
formulas create computational complexity. One way
to simplify these, after the application of FDCF and
FCCF between any two fuzzy sets with either Type 1
or interval-valued Type 2 or Full Type 2 membership
functions, we may discard the values generated between upper and lower membership values generated
in () space for Type 2 generation and (()) space
for Type 3 generation, and hence reduce the computational complexity to the computation of intervalvalued Type 2 and interval-valued Type 3 membership
generation, if and when, we cannot aQord extended
computing time and eQort. For some applications, this
may be justi/ed. A skeleton of Type 3 membership
generation is shown in Fig. 8.
26
I.B. T(urks*en / Fuzzy Sets and Systems 127 (2002) 17–36
Fig. 9. Various representation theorems for membership functions.
5.1. Type-2 knowledge representation
There are two approaches to obtain Type-2 knowledge representation: (i) Membership measurement
experiments conducted with experts and (2) Fuzzy
cluster experiments conducted with FCM algorithm.
Measurement of membership. Membership measurement experiments conducted with experts, i.e.,
subjects, expose the need to represent knowledge with
Type-2 fuzzy sets as depicted in Figs. 1 and 2. We have
presented various aspects of measurement of membership both theoretically and experimentally [1 – 4,25 –
28,31 – 33,36,43].
Brie:y, /rst it is worthwhile to note that measurement theory deals with representation and uniqueness
from empirical relational domain to numerical relational domain. A particular interest in this regard is the
scale strength of the numerical representation depending on which axioms of measurement theory can be
validated for a particular experimental data obtained
from experts. In this regard, it is to be realized that var-
ious representation theorems associated with various
quantitative structures generate algebraic representation from ordinal to absolute scale strengths (Fig. 9).
Secondly, issues of the scale strength aside, analysts
generally get a scatter plot of expert responses. In order to capture variability of these responses, and their
information granules, one needs to represent membership values in Type-2 schemas (Figs. 1–5).
This becomes particularly important from the perspective of computing with perceptions and words
paradigm [51,52]. In this perspective it is essential that
the meaning of words, linguistic terms of linguistic
variables are represented eQectively with membership
grades of the membership, i.e., variation of membership values.
Type 2 representation exposes the variation of membership values and causes a more richer and robust
meaning representation of words and their computation.
Fuzzy clustering. In applications of fuzzy clustering algorithm, FCM, a major concern is the selection
I.B. T(urks*en / Fuzzy Sets and Systems 127 (2002) 17–36
of (m; c) pairs that provide “good” clusters of linguistic values of linguistic variables. A general heuristic
is to choose m = 2, level of fuzziness, and then determine the optimal c, the number of clusters. Then
one determines in general a Type 1 membership over
these fuzzy clusters with curve /tting techniques.
Another approach is to search through 1¡m¡∞,
the level of fuzziness, and c = 2; : : : ; 10; : : : ; the
number of possible clusters, in order to /nd an optimal pair (m; c) that will give a “good” system
model.
Recently, we have conducted experiments which
show that for certain c-values there are many m-values
that cause minimization of the cluster validity index
for certain c’s. This has led us to choose a c-value
that minimizes the cluster validity index and develops
Type-2 fuzziness around the chosen c-value with all
the m-values that give minimization for that particular
c. In particular, let c∗ be the number of clusters for
which there are a set of m values, {m}. In such a case,
choose mL = minm {(m; c∗ )} and mU = max{(m; c∗ )}.
Next, obtain all the scatter plots for all m ∈{(mL ; c∗ );
: : : ; (mU ; c∗ )}. First /t a curve to the scatter points of
(mL ; c∗ ) to determine the lower bound membership
function and then /t a curve to the scatter points of
(mU ; c∗ ) to determine the upper bound membership
function for an interval-valued Type 2 representation
in -space. For Full Type 2 representation, one needs
to determine the possibilistic or probabilistic distribution function of Type 2 membership in () space.
This also requires that a curve be /tted to all the scatter points obtained from m ∈ {(mL ; c∗ ); : : : ; (mU ; c∗ )}.
Naturally, there are various alternatives. They depend on whether scatter points demonstrate a particular shape or not or whether the analyst needs to
simplify the fuzzy set representation to be triangular,
trapezoidal, S or curves or even some form of exponential. Other simpli/cations can be made by computing mean values and variances with the statistical
methods and the curve may be simpli/ed with statistical methods, etc. These details are application and
context dependent and should be chosen by the system analyst.
In this manner, Type-2 fuzziness is identi/ed
with unsupervised learning and with the application
of FCM. This also provides a more reasonable approach to determine suitable (m; c) pairs. This can be
observed in Fig. 3, as shown before.
27
The determination of Type-2 fuzziness with FCM
algorithm also settles the scale strength issue raised
in measurement theory. That is, if input data that is
used in FCM algorithm is on the absolute scale, then
the resulting membership values in Type-2 representation turn out to be on the absolute scale due to the
computations required in the FCM algorithm.
5.2. Type 2- approximate reasoning
Type 2 approximate reasoning can be computed in
two ways as follows: (1) Interval-valued Type 2 reasoning where we reduce the Type 2 uncertainty by
computing FDCF and FCCF formulas only for the
determination of upper and lower values of Type 2
memberships; and (2) Full Type 2 reasoning where all
available grades between upper and lower membership values are combined in a pairwise combination.
The /rst approach is partially reductionist, but computationally eWcient in comparison to “Full” Type 2
computations. Whereas, the second approach leads to
computational complexity of a higher order as discussed previously. In Table 2, the FDCF and FCCF
formulas are shown. A detailed discussion and derivation of FDCF and FCCF may be found in T(urk*sen [40].
Here, we brie:y review the derivation of FDCF and
FCCF formulae.
In Table 1, meta-linguistic expressions of combined
concepts are shown for any two linguistic concepts
A and B whether they are represented by two or in/nite (fuzzy) valued sets. In Table 2, classical and
fuzzy canonical forms are shown under the headings of
fuzzy disjunctive canonical forms, FDCF=disjunctive
normal forms, DNF, and fuzzy conjunctive canonical forms, FCCF=conjunctive normal forms, CNF, for
fuzzy=classical logic, respectively. The derivation of
classical normal forms are based on Classical Truth
Table, Table 3. The equivalence of classical formula,
i.e., DNF(·) ≡ CNF(·) for all the 16 possible combinations can be shown to hold with the axioms of classical set and logic theory operations. It should be noted
that the set operations, ∩, ∪, are implicitly assumed to
be two-valued, i.e., in {0; 1}, whereas in Table 3, their
truthfullness are explicitly shown to be two-valued,
i.e., {T; F}. Also, in Table 4, “Axioms of classical
set and logic operations”, the set operations, ∩, ∪, are
again implicitly assumed to be two-valued. It should
be pointed out that in Tables 1–4 there is no explicit
28
I.B. T(urks*en / Fuzzy Sets and Systems 127 (2002) 17–36
Table 3
Classical truth table interpretations of “A AND B”
Truth assignments to classical
meta-linguistic variables
Truth assignments to the
meta-linguistic expression
A
B
“A AND B”
T (A)
T (A)
F(A)
F(A)
T (B)
F(B)
T (B)
F(B)
T (A
F(A
F(A
F(A
Table 4
Axioms of classical and set and logic operations
Involution
Commutativity
Associativity
Distributivity
Idempotence
Absorption
Absorption by X and Identity
Law of contradiction
Law of excluded middle
De Morgan’s laws
c(c(A) = A
A∪B=B∪A
A∩B=B∩A
(A ∪ B) ∪ C = A ∪ (B ∪ C)
(A ∩ B) ∩ C = A ∩ (B ∩ C)
A ∪ (B ∩ C) = (A ∪ B) ∩ (A ∪ C)
A ∩ (B ∪ C) = (A ∩ B) ∪ (A ∩ C)
A∪A=A
A∩A=A
A ∪ (A ∩ B) = A
A ∩ (A ∪ B) = A
A∪X =X
A∩=
A∪=A
A∩X =A
A ∩ c(A) = A ∪ c(A) = X
c(A ∩ B) = c(A) ∪ c(B)
c(A ∪ B) = c(A) ∩ c(B)
indication as to whether sets A and B are two valued
or not.
It is shown, as pointed out previously, that just by
substituting values in [0; 1] as opposed to {0; 1} for
the set membership, we get DNF(·) = CNF(·) [35].
Later, it was shown that /rst, the classical truth table
can be extended to a fuzzy truth table, Table 5, with
the realization that there is an order relationship between the membership values of fuzzy set A, a, and
the membership values of fuzzy set B, b, i.e., a¿b,
and a¡b, a; b ∈ [0; 1].
In the formation of fuzzy truth Table 5, it should be
noted that there, fuzzy set membership values are now
shown explicitly to be in the interval [0; 1] in contrast
AND
AND
AND
AND
Primary conjunctions
B)
B)
B)
B)
A∩B
A ∩ c(B)
c(A) ∩ B
c(A) ∩ c(B)
Table 5
The “fuzzy truth table” of “A AND B” where a; b 0 [0; 1]
A
(1:1:1)
(1:1:1)
(1:2:1)
(1:2:1)
(1:1:2)
(1:1:2)
(1:2:2)
(1:2:2)
a¿b
a¿b
a¡b
a¡b
a¡b
a¡b
a¿b
a¿b
B
T
T
F
F
T
T
F
F
(2:1:1)
(2:2:1)
(2:1:1)
(2:2:1)
(2:1:2)
(2:2:2)
(2:1:2)
(2:2:2)
A AND B
a¿b
a¡b
a¿b
a¡b
a¡b
a¿b
a¡b
a¿b
T
F
T
F
T
F
T
F
T
F
F
F
T
F
F
F
to Table 3, but the truthfullness of the order relationship a¿b, and a¡b are shown to be two-valued as
{T; F} [38].
When we apply the same canonical form derivation
algorithm (see Appendix A), we obtain the same expression, but they are equivalent in form only, not in
content. We discuss this next.
6. Containment vs. equivalence
In classical theory, we have DNF(·) ≡ CNF(·) for
all 16 cases shown in Tables 1 and 2. It is shown that
FDNF(·) ⊆ CNF(·) for all 16 cases in fuzzy theory for
the four well-known de Morgan Triples [35,40]. This
is now demonstrated very brie:y. For this purpose, we
will /rst show the equivalence of DNF(·) ≡ CNF(·),
and then FDNF(·) ⊆ CNF(·).
Equivalence of DNF and CNF
In classical theory, we have for example:
CNF(A AND B) ≡ DNF(A AND B)
I.B. T(urks*en / Fuzzy Sets and Systems 127 (2002) 17–36
To show this, we start out with the expressions:
DNF (A AND B) = A ∩ B
CNF (A AND B)
= (A ∪ B) ∩ (A ∪ c(B)) ∩ (c(A) ∪ B)
Next, we apply certain axioms to CNF (·), as
follows:
In a similar manner for the other 15 possible combinations of concepts shown in Table 1, it can be shown
that DNF(·) ≡ CNF(·) in two-valued set and logic.
Containment of FCNF and FCCF
(3)
Next, we show that (1) holds for well-known cases
of t-norms and t-conorms. The following statements
are true in general for the class of t-norms and tconorms. First, it is well known that (4) and (5) are
true:
aD⊗ b 6 aL⊗ b 6 a ⊗ b 6 a ∧ b:
(4)
Next, it is also well known that
In fuzzy theory, we have
a ∨ b 6 a ⊕ b 6 aL⊕ b 6 aD⊕ b:
FDCF(A AND B) ⊆ FCCF(A AND B)
To show this, we start out again with the expressions:
(5)
Consider next the following inequalities, which are all
true:
[(a; b); (a;
X b)] 6 b
FDCF (A AND B) = A ∩ B
FCCF (A AND B)
= (A ∪ B) ∩ (A ∪ c(B)) ∩ (c(A) ∪ B)
(for = V; = ∧; and −);
As indicated, the expressions are the same but in
form only. In general, for the class of t-norms and tconorms and standard complement De Morgan Triples
that correspond to the prepositional set operators, “∩”,
“∪”, “c”, respectively. The axioms of idempotency,
distributivity and the law of contradiction, shown in
Table 4, are not applicable in fuzzy theory. It is because these axioms are relaxed in general in fuzzy theory that we obtain the containment of FDCF in FCCF.
Next, let us demonstrate this containment relationship as an example for the case of “A OR B” combination and this time in the numerical domain where
t-norm, , and t-conorm, operators are applicable.
That is, we need to show that
i:e:;
(A ∩ B) ∪ (c(A) ∩ B) ∪ (A ∩ c(B)) ⊆ A ∪ B:
In the numerical membership domain, we need to
show that
[(a; b); (a;
X b)] 6 b and
(2)
hold in general where aX = 1 − a, bX = 1 − b, and
a; b ∈ [0; 1]. While (2) is true in general for all tnorms, (1) requires a bit of work, but can be shown
to hold for the four well-known De Morgan Triples
as will be done shortly below. If (1) and (2) hold, it
is true that (3) holds.
X (a; b)] 6 (a; b):
[[(a;
X b); (a; b)];
(idempotency and distributivity)
= [A ∪ (B ∩ c(B))] ∩ [B ∪ (A ∩ c(A))]
(law of contradiction) = [A ∪ ∅] ∩ [B ∪ ∅]
(identity; boundary) = A ∩ B
FDCF (A OR B) ⊆ FCCF (A OR B);
X 6a
(a; b)
29
(1)
(6)
[(a; b); (a;
X b)] 6 b
(for = ⊕; = ⊗; and −);
(7)
[(a; b); (a;
X b)] 6 b
(for = L⊕ ; = L⊗ ; and −);
(8)
[(a; b); (a;
X b)] 6 b
(for = D⊕ ; = D⊗ ; and −):
(9)
In expressions (3), (4), (6), (7), (8), (9), D⊗ , L⊗ ,
⊗, and ∧ are “drastic”, Lukasiewicz, “algebraic” and
“minimum” intersection operators, respectively. Also,
D⊕ , L⊕ , ⊕, and V are “drastic”, Lukasiewicz, “algebraic”, and “maximum” union operators, respectively.
Since (2) holds in general for all t-norms
and conorms then it is clear that for the wellknown cases discussed above, we have FDCF
(A AND B) ⊆ FCCF (A AND B)!
30
I.B. T(urks*en / Fuzzy Sets and Systems 127 (2002) 17–36
Also, it can be shown that this containment holds
true for all 16 combinations of concepts shown in
Table 1 for the well known-cases of t-norms and
t-conorms discussed above. It is also clear that special
classes of t-norm and t-conorms that are transformed
to one of these well-known t-norms and t-conorms
also have the containment relationship. However, a
general proof for all t-norms and conorms have not
been shown as yet. This is left as an open question
for researchers!
8. FDCF(AND) ⊆ FCCF(→)
Let us show that FDCF (A AND B) is included
in FCCF (A → B) in a similar manner such that
FDCF (A AND B) ⊆ FCCF (A OR B) which is shown
in T(urk*sen [37]. However, we will show the alternate
proof here.
Recall that
FDCF (A AND B) = A ∩ B;
FCCF (A AND B)
7. Comprimized reasoning
= (A ∪ B) ∩ (c(A) ∪ B) ∩ (A ∪ c(B));
Yager and Filev (1994) proposed “Comprimized
Reasoning” as the convex linear combination of the
two extreme reasoning methods that are used in the
current literature as F(y) = (1− )FM (y)+ FGMP (y)
where FM (y) is the consequence of Mamdanitype reasoning and FGMP (y) is the consequence of
GMP-type reasoning. It should be recalled that in
Mamdani-type product reasoning, the implication
A → B = A × B and in GMP-reasoning, the implication A → B = c(A) ∪ B are used.
Naturally, for a singleton observation
A (x) = 1 for x = x0 , we get
FDCF (A → B)
= (A ∩ B) ∪ (c(A) ∩ B) ∪ (c(A) ∩ c(B));
FCCF (A → B) = c(A) ∪ B:
With the general result of subsection previously
discussed, it can be shown that
FDCF (A AND B) ⊆ FCCF (A AND B)
and
FDCF (A → B) ⊆ FCCF (A → B)
for the four well-known t-norms and t-conorms.
Also, it is clear that
A (x0 ) ◦ (A(x) → B(y)) = A(x0 )TB(y)
FDCF (A AND B) ⊆ FCCF (A → B):
in Mamdani-type reasoning, and
for all t-norms and t-conorms.
Next, it is clear that, for some but not all t-norms
and t-conorms
0
0
A (x ) ◦ (A(x) → B(y)) = c(A(x )B(y)
in GMP-type reasoning.
We observe that
FCCF (A AND B) ⊆ FDCF (A → B):
However, it can be shown that
FDCF (A AND B) = A ∩ B;
FDCF (A AND B) ⊆ FDCF (A → B):
FCCF (A → B) = c(A) ∪ B:
Since,
Therefore, we can write
A ∩ B ⊆ (A ∩ B) ∪ (c(A) ∩ B) ∪ (c(A) ∩ c(B)):
A(x0 )TB(y)
6 (1 − )[A(x0 )B(y)] + [c(A(x0 ))B(y)]
6 c(A(x0 ))B(y) for
∈ [0; 1]:
But, we need to show that A ∩ B ⊆ c(A) ∪ B in general in order to prove that values can be found either experimentally or computationally via supervised
learning.
These arguments are graphically shown in Fig. 10.
Therefore, the “convex-linear-comprimized-reasoning”
A(x0 )TB(y)
6 (1 − )[A(x0 )TB(y)] + [c(A(x0 ))B(y)]
6 c(A(x0 ))B(y);
(10)
I.B. T(urks*en / Fuzzy Sets and Systems 127 (2002) 17–36
31
Fig. 10. The lattice diagram showing the containment relationship between FDCF(AND), FCCF(AND) and FDCF(→) and FCCF(→).
Fig. 11. Graph of convex linear compromize reasoning = (1−) (A(x∗ ) ⊗ B(y))+(c(A(x∗ )) ⊕ B(y)) for A(x∗ ) = (0:8) and B(y) = (0:6)
for algebraic operators.
where “T” represents a t-norm and “” represents a
t-conorm.
Therefore, inequality (10) represents all gradations between the two boundaries of Mamdani-type
reasoning identi/ed by FDCF (A AND B) and
FCCF (A AND B), and the two boundaries of GMPtype reasoning identi/ed by FDCF (A → B) and
FCCF (A → B).
This “convex-linear-comprimize-reasoning” is
demonstrated graphically in Figs. 11 and 12 for a
32
I.B. T(urks*en / Fuzzy Sets and Systems 127 (2002) 17–36
Fig. 12. Graph of convex linear compromize reasoning = (1−) (A(x∗ )L⊗ B(y))+(c(A(x∗ ))L⊕ B(y)) for A(x∗ ) = (0:8) and B(y) = (0:6)
for bold operators.
particular A(x) and B(y) and for algebraic and bold
operators.
It is to be observed that the upper and lower bounds
of material and product implications are equal to each
other for bold operators (Fig. 12).
The “exponential-comprimize-reasoning” is demonstrated in Figs. 13 and 14 graphically for particular
values of A(x) and B(y) and for algebraic and bold
operators.
Here, again it should be observed that the upper and
lower bounds of material and product implications are
equal to each other for bold operators (Fig. 14).
9. Exponential-comprimized-reasoning
In analogy to the “linear-comprimized”, we next
proposed the “exponential-comprimized-reasoning”.
That is,
F(y) = [FM (y)]
1−
[FGMP (y)] :
It can be shown that
A(x0 )TB(y) 6 [A(x0 )TB(y)]1− [c(A(x0 ))B(y)]
6 c(A(x0 ))B(y):
Since A ∩ B ⊆ c(A) ∪ B due to the properties of
t-norms and co-norms.
10. Conclusion
It is argued that Type 2 membership functions provide a better and richer grounding for the meaning representation of words and reasoning with robust computations in computing meaning of words in CWW.
The initial step in developing “Full” Type 2 system
modeling is “Interval-Valued” Type 2 schema.
Also, it is suggested that Type-2 knowledge representation and reasoning add further re/nements to
fuzzy system modeling. In Type 2 representation,
second-order gradation for the meaning of words,
linguistic terms of linguistic variables are induced
I.B. T(urks*en / Fuzzy Sets and Systems 127 (2002) 17–36
33
Fig. 13. Graph of exponential compromize reasoning = [A(x∗ ) ⊗ B(y)](1−) + [c(A(x∗ )) ⊕ B(y)] for A(x∗ ) = (0:8) and B(y) = (0:6)
for algebraic operators.
to add further re/nements to meaning representation of words in computing. There are advantages to
Type 2 knowledge representation and reasoning because it does not reduce information granulation due
to reductionist curve /tting techniques in knowledge
representation and it does not reduce the imprecision
expansion due to disjunction and conjunctive canonical forms. The exposition of information content
embedded in information granules allows decision
makers to be more aware of risks associated with
imprecise information availability and its analysis.
It was also shown that for lower and upper bounds
determined with bold operators, the material implication and the product implication types of reasoning
are equivalent to each other. Such results suggest that
there is an extra information content to be discovered
with Type 2 knowledge representation and computation which is executed with Type 2 reasoning formulas.
This further suggests that if we capture knowledge
representation with Type 2 schema and compute with
Type 2 reasoning formulas, we can discover additional
information content. For example, Full Type 2 reasoning produces Type 3 fuzziness which may be useful in
some cases. It should be recalled that Type 1, Type 2
and Type 3 information are analogous to /rst, second
and third moments in statistical calculations but not
the same. We expect to report on some of these insights in future investigations.
Appendix A Canonical form derivation algorithm
(a) First, assign truth values T; F to the metalinguistic values (labels, variables) A and B and then
assign truth values T; F to the meta-linguistic expression of concern, say “A AND B” in order to de/ne its
meaning.
(b) Next, construct primary conjunctions of the set
symbols A; B, corresponding to linguistic values such
that in a given row,
34
I.B. T(urks*en / Fuzzy Sets and Systems 127 (2002) 17–36
Fig. 14. Graph of exponential compromize reasoning = [A(x∗ ) ⊗ B(y)]1− + [c(A(x∗ )) ⊕ B(y)] for A(x∗ ) = (0:8) and B(y) = (0:6) for
bold operators.
(i) if a T appears, then take the set aWrmation symbol of that meta-linguistic variable; otherwise
(ii) if an F appears, then take the set of complementation symbol of that meta-linguistic variable;
(iii) next, conjunct the two symbols.
(c) Then, construct the disjunctive normal form of
the meta-linguistic expression of concern:
(i) /rst, take the conjunctions corresponding to the
T ’s of the truth assignment made under the column of the meta-linguistic expression, such as
“A AND B”, and
(ii) next, combine these conjunctions with disjunctions.
(d) Next, construct the conjunctive normal form of
the meta-linguistic expression of concern:
(i) /rst, take the conjunctions corresponding to F’s
of the truth assignment made under the column of
the meta-linguistic expression, such as “A AND
B” and
(ii) then, combine these conjunctions with disjunctions, and
(iii) next, take the complement of these disjuncted
conjunctions.
References
[1] T. Bilgic, I.B. T(urk*sen, Measurement–theoretical justi/cation of connectives in fuzzy set theory, Fuzzy Sets and
Systems 76 (1995) 289–307.
[2] T. Bilgic, I.B. T(urk*sen, Elicitation of membership functions:
how far can theory take us?, Proceedings of the
Fuzzy-IEEE ’97, July 1–5, Barcelona, Spain, Vol. III, 1997,
pp. 1321–1325.
[3] T. Bilgic, I.B. T(urk*sen, Measurement–theoretical frameworks in fuzzy theory, in: A. Ralescue, T. Martin (Eds.),
Fuzzy Logic in Arti/cial Intelligence, Springer, Berlin, 1997,
pp. 552–565.
[4] T. Bilgic, I.B. T(urk*sen, Measurement of membership
functions: theoretical and empericial work, in: D. Dubois, H.
Prade (Eds.), Handbook of Fuzzy Theory, 2000.
[5] P. Burillo, H. Bustince, Intuitionistic fuzzy relations Part I,
Mathware Soft Comput. 2 (1995) 5–38.
I.B. T(urks*en / Fuzzy Sets and Systems 127 (2002) 17–36
[6] P. Burillo, H. Bustince, Entropy on intuitionistic fuzzy sets
and on interval valued fuzzy sets, Fuzzy Sets and Systems
78 (1996) 305–316.
[7] H. Bustince, P. Burillo, Interval valued fuzzy relations in a
set structures, J. Fuzzy Math. 4 (1996) 765–785.
[8] M. Gehrke, C. Walker, E. Walker, Some comments on
interval-valued fuzzy sets, Internat. J. Intell. Systems 11
(1996) 751–759.
[9] M. Gehrke, C. Walker, E. Walker, Fuzzy normal forms and
truth tables, Proceedings of the JCIS- 2000, February 27–
March 3, Atlantic City, NJ, 2000, pp. 211–214.
[10] M. Gehrke, C. Walker, E. Walker, Some comments on fuzzy
normal forms, Proceeding of the FUZZY-IEEE’2000, 7–10
May, San Antonio, 2000, pp. 593–598.
[11] M.B. Gorzalczany, A method of inference in approximate
reasoning based on interval-valued, Fuzzy Sets and Systems
21 (1987) 1–17.
[12] E. Hisdal, The IF THEN ELSE statement and interval-valued
fuzzy sets of higher type, Internat. J. Man-Mach. Stud. 15
(1981) 385–455.
[13] R.I. John, Type 2 fuzzy sets: an appraisal of theory
and applications, Internat. J. Uncertainty, Fuzziness
Knowledge-based Systems 6 (6) (1998) 563–576.
[14] R.I. John, P.R. Innocent, M.R. Barns, Type 2 fuzzy sets
and neuro-fuzzy clustering of radiographic tibia images, 1998
IEEE International Conference on Fuzzy Systems, Anchorage,
AK., May 1998, pp. 1373–1376.
[15] N.N. Karnik, Type 2 fuzzy logic systems, Ph.D. Dissertation,
University of Southern California, Los Angeles, CA, 1998.
[16] N.N. Karnik, J.M. Mendel, Type 2 fuzzy logic systems:
type-reduction, Presented at 1998 IEEE SMC Conference,
San Diego, CA, October 1998 (CD).
[17] N.N. Karnik, J.M. Mendel, Introduction to type 2 fuzzy
logic systems, Presented at 1998 IEEE FUZZ Conference,
Anchorage, AK. May 1998, pp. 915 –920.
[18] N.N. Karnik, J.M. Mendel, Q. Liang, Type 2 fuzzy logic
system, IEEE Trans. Fuzzy Systems 7 (1999) 643–658.
[19] Q. Liang, J.M. Mendel, Interval type 2 fuzzy logic system,
Proceedings of the Nineth IEEE International Conference
on Fuzzy Systems, 7–10 May, San Antonio, TX, 2000,
pp. 328–333.
[20] Q. Liang, J.M. Mendel, Decision feedback equalizers for
non-linear time varying channels using Type 2 fuzzy
adaptive /lters, Proceedings of the Nineth IEEE International
Conference on Fuzzy Systems, 7–10 May, San Antonio, TX,
2000, pp. 883–888.
[21] P.N. Marinos, Fuzzy logic and its application to switching
systems, IEEE-Trans. Comput. 4 (1969) 343–348.
[22] K. Menger, Statistical metrics, Proceedings of the N.A.S,
Vol. 28, 1942.
[23] M. Mizumoto, K. Tanaka, Some properties of fuzzy sets of
type 2, Inform. Control 31 (1976) 312–340.
[24] J. Niemien, On the algebraic structure of fuzzy sets of type
2, Kybernetica 13 (4) (1977).
[25] A.M. Norwich. I.B. T(urk*sen, The fundamental measurement
of fuzziness, in: R.R. Yager (Ed.), Fuzzy Sets and Possibility
Theory, Pergamon Press, New York, 1982, pp. 49–60.
35
[26] A.M. Norwich, I.B. T(urk*sen, The construction of membership
functions, in: R.R. Yager (Ed.), Fuzzy Sets and
Possibility Theory, Pergamon Press, New York, 1982,
pp. 61–67.
[27] A.M. Norwich, I.B. T(urk*sen, Stochastic fuzziness, in: M.M.
Gupta, E.E. Sanches (Eds.), Fuzzy Information and Decision
Processes, North-Holland, Amsterdam, 1982, pp. 13–22.
[28] A.M. Norwich, I.B. T(urk*sen, A model for the measurement
of membership and the consequences of its empirical
implementation, Fuzzy Sets and Systems 12 (1984) 1–25.
[29] G. Resconi, I.B. T(urk*sen, Canonical forms of fuzzy truthoods
by meta-theory based upon modal logic, Inform. Sci., in press.
[30] M.K. Roy, R. Biswas, I-v fuzzy relations and Sanchez’s
approach for medical diagnosis, Fuzzy Sets and Systems 47
(1992) 35–38.
[31] I.B. T(urk*sen, Measurement of linguistic variables,
Proceedings of the 23rd Annual North American Meeting,
Society for General Systems Research, January 3– 6, Houston,
TX, 1979, pp. 278–284.
[32] I.B. T(urk*sen, Stochastic and fuzzy sets, Proceedings of the
Second World Conference on Mathematics at the Service of
Man, June 28–July 3, Las Palmas, Canary Islands, Spain,
1982, pp. 649 – 654.
[33] I.B. T(urk*sen, Inference regions for fuzzy propositions, in:
P.P. Wang (Ed.), Advances in Fuzzy Sets, Possibility
Theory and Applications, Plenum Press, New York, 1983,
pp. 137–148.
[34] I.B. T(urk*sen, Measurement of fuzziness: an interpretation
of the azioms of measurement, Proceedings of the
IFAC Symposium, Marseill, France, July 19 –21, 1983,
pp. 97–102.
[35] I.B. T(urk*sen, Interval-valued fuzzy sets based on normal
forms, Fuzzy Sets and Systems 20 (1986) 191–210.
[36] I.B. T(urk*sen, Measurement of membership functions and their
acquisitions, Fuzzy Sets and Systems 40 (1991) 5–38.
[37] I.B. T(urk*sen, Interval-valued fuzzy sets and ‘Compensatory
AND’, Fuzzy Sets and Systems 51 (1992) 295–307.
[38] I.B. T(urk*sen, Fuzzy normal forms, Fuzzy Sets and Systems
69 (1995) 319–346.
[39] I.B. T(urk*sen, T. Bilgic, Interval-valued strict preference with
Zadeh triples, Fuzzy Sets and Systems 78 (1996) 183–195.
[40] I.B. T(urk*sen, Theories of set and logic with crisp or fuzzy
information granules, J. Adv. Comput. Intell. 3 (4) (2000)
264–273.
[41] I.B. T(urk*sen, A. Kandel, Y.Q. Zhang, Universal truth tables
and normal forms, IEEE Trans. Fuzzy Systems 6 (2) (1998)
295–303.
[42] I.B. T(urk*sen, A. Kandel, Y.Q. Zhang, Normal forms of
fuzzy middle and fuzzy contradiction, IEEE-SMC, 29, Part
B (Cybernetics) 2, 1999, pp. 237–253.
[43] I.B. T(urk*sen, A.M. Norwich, Measurement of fuzziness,
Proceedings of the International Conference on Policy
Analysis and Inform. Systems, August 19 –22, Taipei,
Taiwan, Meadea Enterprises Co., Ltd. Taipei, Taiwan, 1981,
pp. 745 –754.
[44] I.B. T(urk*sen, D.D. Yao, Bounds on fuzzy inference, Proceedings of the Sixth European Meeting on Cybernetics and
System Research, Vienna, April 13–16, 1982, pp. 729 –734.
36
I.B. T(urks*en / Fuzzy Sets and Systems 127 (2002) 17–36
[45] I.B. T(urk*sen, Z. Zhong, An approximate analogical
reasoning schema based on similarity measures and
interval-valued fuzzy sets, Fuzzy Sets and Systems 34 (1990)
323–346.
[46] M. Wagenknecht, K. Hartmann, Application of fuzzy sets of
Type 2 to the solution of fuzzy equation systems, Fuzzy Sets
and Systems 25 (1988) 183–190.
[47] R.R. Yager, Fuzzy subsets of Type II in decisions,
J. Cybernet. 10 (1980) 137–159.
[48] L.A. Zadeh, Fuzzy sets, Inform. Control Systems 8 (1965)
338–353.
[49] L.A. Zadeh, Outline of a new approach to the analysis
of complex systems and decision processes interval-valued
fuzzy sets, IEEE Trans. Systems Man Cybernet. 3 (1973)
28–44.
[50] L.A. Zadeh, The concept of a linguistic variable and its
application to approximate reasoning, Part II, Inform. Sci. 8
(1975) 301–357.
[51] L.A. Zadeh, Fuzzy logic = computing with words, IEEE
Trans. Fuzzy Systems 4 (2) (1996) 103–111.
[52] L.A. Zadeh, Computing with perceptions, Keynote Address,
IEEE-Fuzzy Theory Conference, San Antonicq, May 7–10,
2000.
[53] H.J. Zimmermann, Zysno, Latent connectives in human
decision making, Fuzzy Sets and Systems 4 (1980) 37–51.
[54] Q. Zuo, I.B. T(urk*sen, Hung T. Nguyen, et al., In expert
systems, even if we /x AND=OR operations, a natural answer
to a composite query is the interval of possible degrees of
belief, Reliable Computing, Supplement (Extended Abstracts
of APIC ’95: International Workshop on Applications of
Interval Computations), El Paso, TX, February 23–25, 1995,
pp. 236 –240.