首页 > 最新文献

Fuzzy Sets and Systems最新文献

英文 中文
Inverses of fuzzy relation matrices with addition-min composition 模糊关系矩阵的加分-减分构成的倒数
IF 3.9 1区 数学 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-06-07 DOI: 10.1016/j.fss.2024.109037
Fang-Fang Guo , Rong Fu , Jie Shen

This paper mainly considers the post-inverse matrix of a fuzzy relation matrix in terms of addition-min composition. A necessary and sufficient condition for the consistency of the inverse matrix problem is given by transforming the problem into a series of particular fuzzy relation equations. The uniqueness of the post-inverse is also investigated. Furthermore, it is proved that the search for the minimal solutions of the particular fuzzy relation equations can be converted into solving a linear system. Based on these discussions, an algorithm is constructed for solving a post-inverse of a given fuzzy relation matrix.

本文主要从加减法构成的角度考虑模糊关系矩阵的后逆矩阵。通过将问题转化为一系列特定的模糊关系方程,给出了逆矩阵问题一致性的必要条件和充分条件。还研究了后逆的唯一性。此外,还证明了寻找特定模糊关系方程的最小解可以转换为求解线性系统。在这些讨论的基础上,构建了一种求解给定模糊关系矩阵后逆的算法。
{"title":"Inverses of fuzzy relation matrices with addition-min composition","authors":"Fang-Fang Guo ,&nbsp;Rong Fu ,&nbsp;Jie Shen","doi":"10.1016/j.fss.2024.109037","DOIUrl":"https://doi.org/10.1016/j.fss.2024.109037","url":null,"abstract":"<div><p>This paper mainly considers the post-inverse matrix of a fuzzy relation matrix in terms of addition-min composition. A necessary and sufficient condition for the consistency of the inverse matrix problem is given by transforming the problem into a series of particular fuzzy relation equations. The uniqueness of the post-inverse is also investigated. Furthermore, it is proved that the search for the minimal solutions of the particular fuzzy relation equations can be converted into solving a linear system. Based on these discussions, an algorithm is constructed for solving a post-inverse of a given fuzzy relation matrix.</p></div>","PeriodicalId":55130,"journal":{"name":"Fuzzy Sets and Systems","volume":"490 ","pages":"Article 109037"},"PeriodicalIF":3.9,"publicationDate":"2024-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141324674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generating quasi-t-subnorms on preordered sets via Adjunctions and Left Galois Connections 通过邻接和左伽罗瓦连接生成预序集上的准 T 次规范
IF 3.9 1区 数学 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-06-07 DOI: 10.1016/j.fss.2024.109036
Jun Geng , Rina Wang , Ziwen Chen

In this paper, we investigate several classes of binary operations within the preordered framework. First, we give the definition of quasi-t-subnorm on preordered sets. Subsequently, we research two classes of quasi-t-subnorms by means of Adjunctions and Left Galois Connections respectively. Meanwhile, we introduce new preorders differing from the inclusion order on powersets. Importantly, quasi-t-subnorms can be defined on powersets with preorders. Then we get a class of extensive binary operations via Adjunctions between preordered sets and the preordered sets consisting of powersets, which generalizes the previous results. The relationship between related binary operations is explored at last.

本文研究了预排序框架内的几类二元运算。首先,我们给出了预序集上的准 t 次规范的定义。随后,我们分别通过邻接和左伽罗瓦连接研究了两类准 t 次矩阵。同时,我们引入了不同于幂集包含阶的新预序。重要的是,准 t 次矩阵可以定义在有前序的权集上。然后,我们通过前序集和由幂集组成的前序集之间的 Adjunctions 得到了一类广泛的二进制运算,从而推广了之前的结果。最后,我们探讨了相关二进制运算之间的关系。
{"title":"Generating quasi-t-subnorms on preordered sets via Adjunctions and Left Galois Connections","authors":"Jun Geng ,&nbsp;Rina Wang ,&nbsp;Ziwen Chen","doi":"10.1016/j.fss.2024.109036","DOIUrl":"https://doi.org/10.1016/j.fss.2024.109036","url":null,"abstract":"<div><p>In this paper, we investigate several classes of binary operations within the preordered framework. First, we give the definition of quasi-t-subnorm on preordered sets. Subsequently, we research two classes of quasi-t-subnorms by means of Adjunctions and Left Galois Connections respectively. Meanwhile, we introduce new preorders differing from the inclusion order on powersets. Importantly, quasi-t-subnorms can be defined on powersets with preorders. Then we get a class of extensive binary operations via Adjunctions between preordered sets and the preordered sets consisting of powersets, which generalizes the previous results. The relationship between related binary operations is explored at last.</p></div>","PeriodicalId":55130,"journal":{"name":"Fuzzy Sets and Systems","volume":"490 ","pages":"Article 109036"},"PeriodicalIF":3.9,"publicationDate":"2024-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141314324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
General fractal dimensions of typical sets and measures 典型集合和度量的一般分形维数
IF 3.9 1区 数学 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-06-07 DOI: 10.1016/j.fss.2024.109039
Rim Achour, Bilel Selmi

Consider (Y,ρ) as a complete metric space and S as the space of probability Borel measures on Y. Let dimBΨ,Φ(E) be the general upper box dimension of the set EY. We begin by proving that the general packing dimension of the typical compact set, in the sense of the Baire category, is at least inf{dimBΨ,Φ(B(x,r))|xY,r>0} where B(x,r) is the closed ball in Y with center at x and radii r>0. Next, we obtain some estimates of the general upper and lower box dimensions of typical measures in the sense of the Baire category. Finally, we demonstrate that if S is equipped with the weak topology and under some assumptions then the set of measures possessing the general upper and lower correlation dimension zero are residual. Furthermore, the general upper correlation dimension of typical measures (in the sense of the Baire category) is approximated through the general local lower and upper entropy dimensions of Y.

将 (Y,ρ) 视为完全度量空间,S 视为 Y 上的概率玻尔量空间。设 dim‾BΨ,Φ(E) 为集合 E⊂Y 的一般上箱维度。我们首先证明,在贝雷范畴的意义上,典型紧凑集的一般包装维度至少是 inf{dim‾BΨ,Φ(B(x,r))|x∈Y,r>0} 其中 B(x,r) 是 Y 中以 x 为中心、以 r>0 为半径的闭球。接下来,我们会得到一些关于贝雷范畴意义上的典型度量的一般上下盒维的估计值。最后,我们证明,如果 S 具有弱拓扑,并且在某些假设条件下,那么具有一般上下相关维数为零的度量集合是残差的。此外,典型度量的一般上相关维度(在贝雷范畴的意义上)是通过 Y 的一般局部下熵维度和上熵维度近似得到的。
{"title":"General fractal dimensions of typical sets and measures","authors":"Rim Achour,&nbsp;Bilel Selmi","doi":"10.1016/j.fss.2024.109039","DOIUrl":"https://doi.org/10.1016/j.fss.2024.109039","url":null,"abstract":"<div><p>Consider <span><math><mo>(</mo><mi>Y</mi><mo>,</mo><mi>ρ</mi><mo>)</mo></math></span> as a complete metric space and <span><math><mi>S</mi></math></span> as the space of probability Borel measures on <em>Y</em>. Let <span><math><msubsup><mrow><mover><mrow><mi>dim</mi></mrow><mo>‾</mo></mover></mrow><mrow><mi>B</mi></mrow><mrow><mi>Ψ</mi><mo>,</mo><mi>Φ</mi></mrow></msubsup><mo>(</mo><mi>E</mi><mo>)</mo></math></span> be the general upper box dimension of the set <span><math><mi>E</mi><mo>⊂</mo><mi>Y</mi></math></span>. We begin by proving that the general packing dimension of the typical compact set, in the sense of the Baire category, is at least <span><math><mi>inf</mi><mo>⁡</mo><mrow><mo>{</mo><msubsup><mrow><mover><mrow><mi>dim</mi></mrow><mo>‾</mo></mover></mrow><mrow><mi>B</mi></mrow><mrow><mi>Ψ</mi><mo>,</mo><mi>Φ</mi></mrow></msubsup><mo>(</mo><mi>B</mi><mo>(</mo><mi>x</mi><mo>,</mo><mi>r</mi><mo>)</mo><mo>)</mo><mspace></mspace><mo>|</mo><mspace></mspace><mi>x</mi><mo>∈</mo><mi>Y</mi><mo>,</mo><mi>r</mi><mo>&gt;</mo><mn>0</mn><mo>}</mo></mrow></math></span> where <span><math><mi>B</mi><mo>(</mo><mi>x</mi><mo>,</mo><mi>r</mi><mo>)</mo></math></span> is the closed ball in <em>Y</em> with center at <em>x</em> and radii <span><math><mi>r</mi><mo>&gt;</mo><mn>0</mn></math></span>. Next, we obtain some estimates of the general upper and lower box dimensions of typical measures in the sense of the Baire category. Finally, we demonstrate that if <span><math><mi>S</mi></math></span> is equipped with the weak topology and under some assumptions then the set of measures possessing the general upper and lower correlation dimension zero are residual. Furthermore, the general upper correlation dimension of typical measures (in the sense of the Baire category) is approximated through the general local lower and upper entropy dimensions of <em>Y</em>.</p></div>","PeriodicalId":55130,"journal":{"name":"Fuzzy Sets and Systems","volume":"490 ","pages":"Article 109039"},"PeriodicalIF":3.9,"publicationDate":"2024-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141323410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Attribute implications with unknown information based on weak Heyting algebras 基于弱海廷代数的未知信息属性含义
IF 3.9 1区 数学 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-06-03 DOI: 10.1016/j.fss.2024.109026
Pablo Cordero, Manuel Enciso, Ángel Mora, Francisco Pérez-Gámez

Simplification logic, a logic for attribute implications, was originally defined for Boolean sets. It was extended to distributive fuzzy sets by using a complete dual Heyting algebra. In this paper, we weaken this restriction in the sense that we prove that it is possible to define a simplification logic on fuzzy sets in which the membership value structure is not necessarily distributive. For this purpose, we replace the structure of the complete dual Heyting algebra by the so-called weak complete dual Heyting algebra. We demonstrate the soundness and completeness of this simplification logic, and provide a characterisation of the operations defining weak complete dual Heyting algebras.

简化逻辑是一种属性含义逻辑,最初是为布尔集合定义的。通过使用一个完整的对偶海廷代数,它被扩展到分布式模糊集。在本文中,我们弱化了这一限制,证明了在模糊集合上定义简化逻辑是可能的,其中的成员值结构不一定是分布式的。为此,我们用所谓的弱完全对偶海廷代数取代了完全对偶海廷代数的结构。我们证明了这种简化逻辑的合理性和完备性,并提供了定义弱完整对偶海廷代数的运算特征。
{"title":"Attribute implications with unknown information based on weak Heyting algebras","authors":"Pablo Cordero,&nbsp;Manuel Enciso,&nbsp;Ángel Mora,&nbsp;Francisco Pérez-Gámez","doi":"10.1016/j.fss.2024.109026","DOIUrl":"10.1016/j.fss.2024.109026","url":null,"abstract":"<div><p>Simplification logic, a logic for attribute implications, was originally defined for Boolean sets. It was extended to distributive fuzzy sets by using a complete dual Heyting algebra. In this paper, we weaken this restriction in the sense that we prove that it is possible to define a simplification logic on fuzzy sets in which the membership value structure is not necessarily distributive. For this purpose, we replace the structure of the complete dual Heyting algebra by the so-called weak complete dual Heyting algebra. We demonstrate the soundness and completeness of this simplification logic, and provide a characterisation of the operations defining weak complete dual Heyting algebras.</p></div>","PeriodicalId":55130,"journal":{"name":"Fuzzy Sets and Systems","volume":"490 ","pages":"Article 109026"},"PeriodicalIF":3.9,"publicationDate":"2024-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0165011424001726/pdfft?md5=ee2ac4c6b8ecd2ed61b7fd43fe035028&pid=1-s2.0-S0165011424001726-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141280384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards the definition of spatial granules 空间颗粒的定义
IF 3.9 1区 数学 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-06-03 DOI: 10.1016/j.fss.2024.109027
Liquan Zhao, Yiyu Yao

Three basic issues of granular computing are construction or definition of granules, measures of granules, and computation or reasoning with granules. This paper reviews the main theories of granular computing and introduces the definition of spatial granules. A granule is composed of one or more atomic granules. The rationality of this definition is explained from the four aspects: simplicity, applicability, measurability and visualization. A one-to-one correspondence is established between the granules and the points in the unit hypercube, and the coarsening and refining of the granules are the descending and ascending dimensions of the points, respectively. The weak fuzzy tolerance relation and weak fuzzy equivalence relation are defined so as to study on all fuzzy binary relations. The notion of layer granularity/fineness is introduced and each granule can be easily denoted by two numbers, which can be used to pre-process macro knowledge space and greatly improve the search speed. This paper also discusses the main properties of granules including the necessary and sufficient conditions of coarse-fine relation and the main principles of granular space.

粒度计算的三个基本问题是粒度的构造或定义、粒度的度量以及使用粒度进行计算或推理。本文回顾了颗粒计算的主要理论,并介绍了空间颗粒的定义。颗粒由一个或多个原子颗粒组成。本文从简洁性、适用性、可测量性和可视化四个方面阐述了这一定义的合理性。颗粒与单位超立方体中的点之间建立一一对应关系,颗粒的粗化和细化分别是点的降维和升维。定义了弱模糊容差关系和弱模糊等价关系,以研究所有模糊二元关系。本文引入了层粒度/细度的概念,每个粒度可以很容易地用两个数字来表示,这可以用来预处理宏知识空间,大大提高搜索速度。本文还讨论了颗粒的主要性质,包括粗细关系的必要条件和充分条件以及颗粒空间的主要原理。
{"title":"Towards the definition of spatial granules","authors":"Liquan Zhao,&nbsp;Yiyu Yao","doi":"10.1016/j.fss.2024.109027","DOIUrl":"10.1016/j.fss.2024.109027","url":null,"abstract":"<div><p>Three basic issues of granular computing are construction or definition of granules, measures of granules, and computation or reasoning with granules. This paper reviews the main theories of granular computing and introduces the definition of spatial granules. A granule is composed of one or more atomic granules. The rationality of this definition is explained from the four aspects: simplicity, applicability, measurability and visualization. A one-to-one correspondence is established between the granules and the points in the unit hypercube, and the coarsening and refining of the granules are the descending and ascending dimensions of the points, respectively. The weak fuzzy tolerance relation and weak fuzzy equivalence relation are defined so as to study on all fuzzy binary relations. The notion of layer granularity/fineness is introduced and each granule can be easily denoted by two numbers, which can be used to pre-process macro knowledge space and greatly improve the search speed. This paper also discusses the main properties of granules including the necessary and sufficient conditions of coarse-fine relation and the main principles of granular space.</p></div>","PeriodicalId":55130,"journal":{"name":"Fuzzy Sets and Systems","volume":"490 ","pages":"Article 109027"},"PeriodicalIF":3.9,"publicationDate":"2024-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141278881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reduction of complexity using generators of pseudo-overlap and pseudo-grouping functions 利用伪重叠和伪分组函数生成器降低复杂性
IF 3.9 1区 数学 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-05-31 DOI: 10.1016/j.fss.2024.109025
Mikel Ferrero-Jaurrieta , Rui Paiva , Anderson Cruz , Benjamín Bedregal , Xiaohong Zhang , Zdenko Takáč , Carlos López-Molina , Humberto Bustince

Overlap and grouping functions can be used to measure events in which we must consider either the maximum or the minimum lack of knowledge. The commutativity of overlap and grouping functions can be dropped out to introduce the notions of pseudo-overlap and pseudo-grouping functions, respectively. These functions can be applied in problems where distinct orders of their arguments yield different values, i.e., in non-symmetric contexts. Intending to reduce the complexity of pseudo-overlap and pseudo-grouping functions, we propose new construction methods for these functions from generalized concepts of additive and multiplicative generators. We investigate the isomorphism between these families of functions. Finally, we apply these functions in an illustrative problem using them in a time series prediction combined model using the IOWA operator to evidence that using these generators and functions implies better performance.

重叠函数和分组函数可用于测量我们必须考虑最大或最小知识缺失的事件。我们可以舍弃重叠函数和分组函数的交换性,分别引入伪重叠函数和伪分组函数的概念。这些函数可用于参数的不同顺序产生不同值的问题,即非对称情况。为了降低伪重叠函数和伪分组函数的复杂性,我们从加法生成器和乘法生成器的广义概念出发,为这些函数提出了新的构造方法。我们研究了这些函数族之间的同构性。最后,我们在使用 IOWA 算子的时间序列预测组合模型中应用了这些函数,以证明使用这些生成器和函数意味着更好的性能。
{"title":"Reduction of complexity using generators of pseudo-overlap and pseudo-grouping functions","authors":"Mikel Ferrero-Jaurrieta ,&nbsp;Rui Paiva ,&nbsp;Anderson Cruz ,&nbsp;Benjamín Bedregal ,&nbsp;Xiaohong Zhang ,&nbsp;Zdenko Takáč ,&nbsp;Carlos López-Molina ,&nbsp;Humberto Bustince","doi":"10.1016/j.fss.2024.109025","DOIUrl":"https://doi.org/10.1016/j.fss.2024.109025","url":null,"abstract":"<div><p>Overlap and grouping functions can be used to measure events in which we must consider either the maximum or the minimum lack of knowledge. The commutativity of overlap and grouping functions can be dropped out to introduce the notions of pseudo-overlap and pseudo-grouping functions, respectively. These functions can be applied in problems where distinct orders of their arguments yield different values, i.e., in non-symmetric contexts. Intending to reduce the complexity of pseudo-overlap and pseudo-grouping functions, we propose new construction methods for these functions from generalized concepts of additive and multiplicative generators. We investigate the isomorphism between these families of functions. Finally, we apply these functions in an illustrative problem using them in a time series prediction combined model using the IOWA operator to evidence that using these generators and functions implies better performance.</p></div>","PeriodicalId":55130,"journal":{"name":"Fuzzy Sets and Systems","volume":"490 ","pages":"Article 109025"},"PeriodicalIF":3.9,"publicationDate":"2024-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0165011424001714/pdfft?md5=3ed86ab47bd97e1aac2a168c62d02481&pid=1-s2.0-S0165011424001714-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141290041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Legal fuzzy incidence blocks and legal flow reduction sets with application to water distribution networks 法律模糊发生率块和法律流量减少集在配水管网中的应用
IF 3.9 1区 数学 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-05-29 DOI: 10.1016/j.fss.2024.109024
Gayathri G. , Sunil Mathew , J.N. Mordeson
<div><p>Directed fuzzy incidence graphs (DFIGs) are fuzzy incidence structures where each edge and incidence pair has a specific direction. In these graphs, the relationships are not symmetric, making it easier to identify the extent of interaction between nodes and arcs. The comprehensive investigation of connectivity in directed fuzzy incidence graphs holds the potential to provide solutions for a wide range of real-world problems including traffic flow optimization in one-way traffic networks and migration analysis of refugees across various countries. The main objective of this paper is to extend the connectivity concepts of directed fuzzy incidence graphs, which help to analyze various stochastic networks influenced by external factors. The major concepts discussed in this article are legal fuzzy incidence blocks, legal flow reduction sets, and the DFIG-version of Menger's theorem. Directed fuzzy incidence graphs having no legal flow reduction nodes are defined as legal fuzzy incidence blocks (LFI-blocks). Legal flow reduction nodes (LFR-nodes) are distinct elements, the elimination of which results in a reduction of the directed incidence connectivity between some other pair of nodes. Since LFI-blocks lack these elements, the removal of none of the nodes reduce the legal flow between other pair of nodes. Consequently, for each node under consideration, any other pair of nodes connected by at least one <em>di</em>-path must possess a widest legal <em>di</em>-path which avoids that specific node. LFI-blocks exhibit differing attributes in contrast to their counterparts in fuzzy graphs and fuzzy incidence graphs. This viewpoint motivated the authors to investigate these distinctions and assess the possibility of defining equivalent conditions for LFI-blocks, similar to the equivalent conditions established for fuzzy blocks and fuzzy incidence blocks. A key characteristic of legal fuzzy incidence blocks is their capacity to incorporate legal flow reduction links, even allowing for the presence of shared nodes among two legal flow reduction links. This contrasts with fuzzy graphs and fuzzy incidence graphs, where if two fuzzy bridges happen to share a common node, it results in that node being a fuzzy cutnode. Two equivalent conditions are proposed for a directed fuzzy incidence graph to become a legal fuzzy incidence block. It is shown that any two nodes in a legal fuzzy incidence block which are connected by at least one <em>di</em>-path, but not by a legal flow reduction link will have at least two internally disjoint widest legal <em>di</em>-paths joining them. To identify the maximum number of such internally disjoint widest legal <em>di</em>-paths, the notion of legal flow reduction set of nodes and arcs is introduced. These sets are characterized using widest legal <em>di</em>-paths. Moreover, the DFIG-version of Menger's theorem for nodes is established, which explains the relation between number of internally disjoint widest legal <em>d
有向模糊入射图(DFIG)是一种模糊入射结构,其中每条边和入射对都有特定的方向。在这些图中,关系并不对称,因此更容易识别节点和弧之间的交互程度。全面研究有向模糊入射图中的连通性,有可能为单向交通网络中的交通流优化和不同国家间的难民迁移分析等一系列现实问题提供解决方案。本文的主要目的是扩展有向模糊入射图的连接性概念,帮助分析受外部因素影响的各种随机网络。本文讨论的主要概念包括合法模糊入射块、合法流量缩减集和 DFIG 版本的门格尔定理。没有合法流量减少节点的有向模糊入射图被定义为合法模糊入射块(LFI-block)。合法流量缩减节点(LFR-nodes)是不同的元素,消除这些元素会导致其他一些节点对之间的有向入射连通性降低。由于 LFI 块缺乏这些元素,因此删除任何节点都不会减少其他节点对之间的合法流量。因此,对于所考虑的每个节点而言,任何由至少一条有向路径连接的其他节点对都必须拥有一条避开该特定节点的最宽合法有向路径。LFI 块与模糊图和模糊入射图中的对应块相比,表现出不同的属性。这一观点促使作者研究这些区别,并评估为 LFI 块定义等效条件的可能性,类似于为模糊块和模糊入射块建立的等效条件。合法模糊入射区块的一个主要特点是,它们能够包含合法流量缩减链接,甚至允许两个合法流量缩减链接之间存在共享节点。这与模糊图和模糊入射图形成了鲜明对比,在模糊图和模糊入射图中,如果两个模糊桥恰好共享一个共同节点,就会导致该节点成为一个模糊切割节点。我们提出了有向模糊入射图成为合法模糊入射块的两个等价条件。研究表明,合法模糊入射图块中的任何两个节点,如果通过至少一条二路径连接,但不是通过合法流量缩减链接连接,则至少有两条内部不相交的最宽合法二路径连接它们。为了确定这种内部不相交的最宽合法二路径的最大数量,引入了节点和弧的合法流量缩减集的概念。这些集合使用最宽合法二路径来表征。此外,还建立了节点的门格尔定理的 DFIG 版本,该定理解释了有向模糊入射图中内部互不相交的最宽合法二路径的数量与合法流量缩减集的心率之间的关系。此外,还提出了针对配水管网的门格尔定理说明。
{"title":"Legal fuzzy incidence blocks and legal flow reduction sets with application to water distribution networks","authors":"Gayathri G. ,&nbsp;Sunil Mathew ,&nbsp;J.N. Mordeson","doi":"10.1016/j.fss.2024.109024","DOIUrl":"https://doi.org/10.1016/j.fss.2024.109024","url":null,"abstract":"&lt;div&gt;&lt;p&gt;Directed fuzzy incidence graphs (DFIGs) are fuzzy incidence structures where each edge and incidence pair has a specific direction. In these graphs, the relationships are not symmetric, making it easier to identify the extent of interaction between nodes and arcs. The comprehensive investigation of connectivity in directed fuzzy incidence graphs holds the potential to provide solutions for a wide range of real-world problems including traffic flow optimization in one-way traffic networks and migration analysis of refugees across various countries. The main objective of this paper is to extend the connectivity concepts of directed fuzzy incidence graphs, which help to analyze various stochastic networks influenced by external factors. The major concepts discussed in this article are legal fuzzy incidence blocks, legal flow reduction sets, and the DFIG-version of Menger's theorem. Directed fuzzy incidence graphs having no legal flow reduction nodes are defined as legal fuzzy incidence blocks (LFI-blocks). Legal flow reduction nodes (LFR-nodes) are distinct elements, the elimination of which results in a reduction of the directed incidence connectivity between some other pair of nodes. Since LFI-blocks lack these elements, the removal of none of the nodes reduce the legal flow between other pair of nodes. Consequently, for each node under consideration, any other pair of nodes connected by at least one &lt;em&gt;di&lt;/em&gt;-path must possess a widest legal &lt;em&gt;di&lt;/em&gt;-path which avoids that specific node. LFI-blocks exhibit differing attributes in contrast to their counterparts in fuzzy graphs and fuzzy incidence graphs. This viewpoint motivated the authors to investigate these distinctions and assess the possibility of defining equivalent conditions for LFI-blocks, similar to the equivalent conditions established for fuzzy blocks and fuzzy incidence blocks. A key characteristic of legal fuzzy incidence blocks is their capacity to incorporate legal flow reduction links, even allowing for the presence of shared nodes among two legal flow reduction links. This contrasts with fuzzy graphs and fuzzy incidence graphs, where if two fuzzy bridges happen to share a common node, it results in that node being a fuzzy cutnode. Two equivalent conditions are proposed for a directed fuzzy incidence graph to become a legal fuzzy incidence block. It is shown that any two nodes in a legal fuzzy incidence block which are connected by at least one &lt;em&gt;di&lt;/em&gt;-path, but not by a legal flow reduction link will have at least two internally disjoint widest legal &lt;em&gt;di&lt;/em&gt;-paths joining them. To identify the maximum number of such internally disjoint widest legal &lt;em&gt;di&lt;/em&gt;-paths, the notion of legal flow reduction set of nodes and arcs is introduced. These sets are characterized using widest legal &lt;em&gt;di&lt;/em&gt;-paths. Moreover, the DFIG-version of Menger's theorem for nodes is established, which explains the relation between number of internally disjoint widest legal &lt;em&gt;d","PeriodicalId":55130,"journal":{"name":"Fuzzy Sets and Systems","volume":"489 ","pages":"Article 109024"},"PeriodicalIF":3.9,"publicationDate":"2024-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141249860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A survey on the enumeration of classes of logical connectives and aggregation functions defined on a finite chain, with new results 关于枚举定义在有限链上的逻辑连接词和聚合函数类的调查及新结果
IF 3.9 1区 数学 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-05-24 DOI: 10.1016/j.fss.2024.109023
Marc Munar , Miguel Couceiro , Sebastia Massanet , Daniel Ruiz-Aguilera

The enumeration of logical connectives and aggregation functions defined on a finite chain has been a hot topic in the literature for the last decades. Multiple advantages can be derived from knowing a general formula about their cardinality, for instance, the ability to anticipate the computational cost required for generating operators with different properties. This is of paramount importance in image processing and decision making scenarios, where the identification of the most optimal operator is essential. Furthermore, it facilitates the examination of how constraining a certain property is in relation to its parent class. As a consequence, this paper aims to compile the main existing formulas and the methodologies with which they have been derived. Additionally, we introduce some novel formulas for the number of smooth discrete aggregation functions with neutral element or absorbing element, idempotent conjunctions, and commutative and idempotent conjunctions.

过去几十年来,枚举定义在有限链上的逻辑连接词和聚合函数一直是文献中的热门话题。通过了解关于其万有引力的一般公式可以获得多种优势,例如,可以预测生成具有不同属性的算子所需的计算成本。这在图像处理和决策制定场景中至关重要,因为在这些场景中,确定最优算子至关重要。此外,它还有助于研究特定属性与其父类之间的制约关系。因此,本文旨在汇编现有的主要公式及其推导方法。此外,我们还引入了一些新公式,用于计算具有中性元素或吸收元素的光滑离散聚合函数数、幂等连词以及交换和幂等连词。
{"title":"A survey on the enumeration of classes of logical connectives and aggregation functions defined on a finite chain, with new results","authors":"Marc Munar ,&nbsp;Miguel Couceiro ,&nbsp;Sebastia Massanet ,&nbsp;Daniel Ruiz-Aguilera","doi":"10.1016/j.fss.2024.109023","DOIUrl":"10.1016/j.fss.2024.109023","url":null,"abstract":"<div><p>The enumeration of logical connectives and aggregation functions defined on a finite chain has been a hot topic in the literature for the last decades. Multiple advantages can be derived from knowing a general formula about their cardinality, for instance, the ability to anticipate the computational cost required for generating operators with different properties. This is of paramount importance in image processing and decision making scenarios, where the identification of the most optimal operator is essential. Furthermore, it facilitates the examination of how constraining a certain property is in relation to its parent class. As a consequence, this paper aims to compile the main existing formulas and the methodologies with which they have been derived. Additionally, we introduce some novel formulas for the number of smooth discrete aggregation functions with neutral element or absorbing element, idempotent conjunctions, and commutative and idempotent conjunctions.</p></div>","PeriodicalId":55130,"journal":{"name":"Fuzzy Sets and Systems","volume":"490 ","pages":"Article 109023"},"PeriodicalIF":3.9,"publicationDate":"2024-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0165011424001696/pdfft?md5=b68d5fcda92a3ef66deb2634bd618add&pid=1-s2.0-S0165011424001696-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141134216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Type-3 fuzzy dynamic adaptation of Bee colony optimization applied to mathematical functions 蜂群优化的第 3 类模糊动态适应应用于数学函数
IF 3.9 1区 数学 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-05-21 DOI: 10.1016/j.fss.2024.109014
Leticia Amador-Angulo , Oscar Castillo , Patricia Melin , Zong Woo Geem

In this article, an Interval Type-3 Fuzzy Logic System (IT3FLS) for enhancing the performance in Bee Colony Optimization (BCO) is outlined. The efficiency of the IT3FLS approach is verified with results on a set of benchmark mathematical functions. The IT3FLS provides an approach that helps to identify the optimal values in α and β parameters that allows to improve the performance in the original BCO. The IT3FLS approach exhibits advantages in the optimization of the benchmark functions. It can be noted that a IT3FLS exhibits better results in the minimal values of the set of mathematical functions. The experimentation demostrates that the implementation of the IT3FLS approach enhances the performance of BCO when compared with respect to the variants utilizing Generalized Type-2 FLS (GT2FLS), Interval Type-2 FLS (IT2FLS) and Type-1 FLS (T1FLS).

本文概述了一种用于提高蜂群优化(BCO)性能的区间-3 型模糊逻辑系统(IT3FLS)。在一组基准数学函数上的结果验证了 IT3FLS 方法的效率。IT3FLS 提供的方法有助于确定 α 和 β 参数的最佳值,从而提高原始 BCO 的性能。IT3FLS 方法在优化基准函数方面具有优势。可以看出,IT3FLS 在数学函数集的最小值方面表现出更好的效果。实验表明,与使用通用 2 型 FLS(GT2FLS)、区间 2 型 FLS(IT2FLS)和 1 型 FLS(T1FLS)的变体相比,IT3FLS 方法的实施提高了 BCO 的性能。
{"title":"Type-3 fuzzy dynamic adaptation of Bee colony optimization applied to mathematical functions","authors":"Leticia Amador-Angulo ,&nbsp;Oscar Castillo ,&nbsp;Patricia Melin ,&nbsp;Zong Woo Geem","doi":"10.1016/j.fss.2024.109014","DOIUrl":"10.1016/j.fss.2024.109014","url":null,"abstract":"<div><p>In this article, an Interval Type-3 Fuzzy Logic System (IT3FLS) for enhancing the performance in Bee Colony Optimization (BCO) is outlined. The efficiency of the IT3FLS approach is verified with results on a set of benchmark mathematical functions. The IT3FLS provides an approach that helps to identify the optimal values in <span><math><mi>α</mi></math></span> and <span><math><mi>β</mi></math></span> parameters that allows to improve the performance in the original BCO. The IT3FLS approach exhibits advantages in the optimization of the benchmark functions. It can be noted that a IT3FLS exhibits better results in the minimal values of the set of mathematical functions. The experimentation demostrates that the implementation of the IT3FLS approach enhances the performance of BCO when compared with respect to the variants utilizing Generalized Type-2 FLS (GT2FLS), Interval Type-2 FLS (IT2FLS) and Type-1 FLS (T1FLS).</p></div>","PeriodicalId":55130,"journal":{"name":"Fuzzy Sets and Systems","volume":"489 ","pages":"Article 109014"},"PeriodicalIF":3.9,"publicationDate":"2024-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141139472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effectiveness of an ensemble technique based on the distributivity equation in detecting suspicious network activity 基于分布方程的集合技术在检测可疑网络活动方面的有效性
IF 3.9 1区 数学 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-05-20 DOI: 10.1016/j.fss.2024.109015
Ewa Rak , Jaromir Sarzyński , Rafał Rak

With the growing complexity and frequency of cyber threats, there is a pressing need for more effective defense mechanisms. Machine learning offers the potential to analyze vast amounts of data and identify patterns indicative of malicious activity, enabling faster and more accurate threat detection. Ensemble methods, by incorporating diverse models with varying vulnerabilities, can increase resilience against adversarial attacks. This study covers the usage and evaluation of the relevance of an innovative approach of ensemble classification for identifying intrusion threats on a large CICIDS2017 dataset. The approach is based on the distributivity equation that appropriately aggregates the underlying classifiers. It combines various standard supervised classification algorithms, including Multilayer Perceptron Network, k-Nearest Neighbors, and Naive Bayes, to create an ensemble. Experiments were conducted to evaluate the effectiveness of the proposed hybrid ensemble method. The performance of the ensemble approach was compared with individual classifiers using measures such as accuracy, precision, recall, F-score, and area under the ROC curve. Additionally, comparisons were made with widely used state-of-the-art ensemble models, including the soft voting method (Weighted Average Probabilities), Adaptive Boosting (AdaBoost), and Histogram-based Gradient Boosting Classification Tree (HGBC) and with existing methods in the literature using the same dataset, such as Deep Belief Networks (DBN), Deep Feature Learning via Graph (Deep GFL). Based on these experiments, it was found that some ensemble methods, such as AdaBoost and Histogram-based Gradient Classification Tree, do not perform reliably for the specific task of identifying network attacks. This highlights the importance of understanding the context and requirements of the data and problem domain. The results indicate that the proposed hybrid ensemble method outperforms traditional algorithms in terms of classification precision and accuracy, and offers insights for improving the effectiveness of intrusion detection systems.

随着网络威胁日趋复杂和频繁,迫切需要更有效的防御机制。机器学习提供了分析海量数据和识别恶意活动模式的潜力,从而实现更快、更准确的威胁检测。集合方法通过整合具有不同漏洞的各种模型,可以提高抵御对抗性攻击的能力。本研究介绍了在大型 CICIDS2017 数据集上识别入侵威胁的组合分类创新方法的使用和相关性评估。该方法基于分布式方程,可适当聚合底层分类器。它结合了各种标准监督分类算法,包括多层感知器网络、k-近邻和奈维贝叶斯,创建了一个集合。为了评估所提出的混合集合方法的有效性,我们进行了实验。使用准确率、精确度、召回率、F-分数和 ROC 曲线下面积等指标,将集合方法的性能与单个分类器进行了比较。此外,还与广泛使用的最先进的集合模型进行了比较,包括软投票法(加权平均概率)、自适应提升法(AdaBoost)和基于直方图的梯度提升分类树(HGBC),以及使用相同数据集的现有文献方法,如深度信念网络(DBN)、通过图的深度特征学习(Deep GFL)。基于这些实验,我们发现一些集合方法,如 AdaBoost 和基于直方图的梯度分类树,在识别网络攻击的特定任务中表现并不可靠。这凸显了了解数据和问题领域的背景和要求的重要性。结果表明,所提出的混合集合方法在分类精度和准确性方面优于传统算法,并为提高入侵检测系统的有效性提供了启示。
{"title":"Effectiveness of an ensemble technique based on the distributivity equation in detecting suspicious network activity","authors":"Ewa Rak ,&nbsp;Jaromir Sarzyński ,&nbsp;Rafał Rak","doi":"10.1016/j.fss.2024.109015","DOIUrl":"https://doi.org/10.1016/j.fss.2024.109015","url":null,"abstract":"<div><p>With the growing complexity and frequency of cyber threats, there is a pressing need for more effective defense mechanisms. Machine learning offers the potential to analyze vast amounts of data and identify patterns indicative of malicious activity, enabling faster and more accurate threat detection. Ensemble methods, by incorporating diverse models with varying vulnerabilities, can increase resilience against adversarial attacks. This study covers the usage and evaluation of the relevance of an innovative approach of ensemble classification for identifying intrusion threats on a large CICIDS2017 dataset. The approach is based on the distributivity equation that appropriately aggregates the underlying classifiers. It combines various standard supervised classification algorithms, including Multilayer Perceptron Network, k-Nearest Neighbors, and Naive Bayes, to create an ensemble. Experiments were conducted to evaluate the effectiveness of the proposed hybrid ensemble method. The performance of the ensemble approach was compared with individual classifiers using measures such as accuracy, precision, recall, <em>F</em>-score, and area under the ROC curve. Additionally, comparisons were made with widely used state-of-the-art ensemble models, including the soft voting method (Weighted Average Probabilities), Adaptive Boosting (AdaBoost), and Histogram-based Gradient Boosting Classification Tree (HGBC) and with existing methods in the literature using the same dataset, such as Deep Belief Networks (DBN), Deep Feature Learning via Graph (Deep GFL). Based on these experiments, it was found that some ensemble methods, such as AdaBoost and Histogram-based Gradient Classification Tree, do not perform reliably for the specific task of identifying network attacks. This highlights the importance of understanding the context and requirements of the data and problem domain. The results indicate that the proposed hybrid ensemble method outperforms traditional algorithms in terms of classification precision and accuracy, and offers insights for improving the effectiveness of intrusion detection systems.</p></div>","PeriodicalId":55130,"journal":{"name":"Fuzzy Sets and Systems","volume":"488 ","pages":"Article 109015"},"PeriodicalIF":3.9,"publicationDate":"2024-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141077980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Fuzzy Sets and Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1