Pub Date : 2024-06-07DOI: 10.1016/j.fss.2024.109037
Fang-Fang Guo , Rong Fu , Jie Shen
This paper mainly considers the post-inverse matrix of a fuzzy relation matrix in terms of addition-min composition. A necessary and sufficient condition for the consistency of the inverse matrix problem is given by transforming the problem into a series of particular fuzzy relation equations. The uniqueness of the post-inverse is also investigated. Furthermore, it is proved that the search for the minimal solutions of the particular fuzzy relation equations can be converted into solving a linear system. Based on these discussions, an algorithm is constructed for solving a post-inverse of a given fuzzy relation matrix.
{"title":"Inverses of fuzzy relation matrices with addition-min composition","authors":"Fang-Fang Guo , Rong Fu , Jie Shen","doi":"10.1016/j.fss.2024.109037","DOIUrl":"https://doi.org/10.1016/j.fss.2024.109037","url":null,"abstract":"<div><p>This paper mainly considers the post-inverse matrix of a fuzzy relation matrix in terms of addition-min composition. A necessary and sufficient condition for the consistency of the inverse matrix problem is given by transforming the problem into a series of particular fuzzy relation equations. The uniqueness of the post-inverse is also investigated. Furthermore, it is proved that the search for the minimal solutions of the particular fuzzy relation equations can be converted into solving a linear system. Based on these discussions, an algorithm is constructed for solving a post-inverse of a given fuzzy relation matrix.</p></div>","PeriodicalId":55130,"journal":{"name":"Fuzzy Sets and Systems","volume":"490 ","pages":"Article 109037"},"PeriodicalIF":3.9,"publicationDate":"2024-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141324674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-07DOI: 10.1016/j.fss.2024.109036
Jun Geng , Rina Wang , Ziwen Chen
In this paper, we investigate several classes of binary operations within the preordered framework. First, we give the definition of quasi-t-subnorm on preordered sets. Subsequently, we research two classes of quasi-t-subnorms by means of Adjunctions and Left Galois Connections respectively. Meanwhile, we introduce new preorders differing from the inclusion order on powersets. Importantly, quasi-t-subnorms can be defined on powersets with preorders. Then we get a class of extensive binary operations via Adjunctions between preordered sets and the preordered sets consisting of powersets, which generalizes the previous results. The relationship between related binary operations is explored at last.
本文研究了预排序框架内的几类二元运算。首先,我们给出了预序集上的准 t 次规范的定义。随后,我们分别通过邻接和左伽罗瓦连接研究了两类准 t 次矩阵。同时,我们引入了不同于幂集包含阶的新预序。重要的是,准 t 次矩阵可以定义在有前序的权集上。然后,我们通过前序集和由幂集组成的前序集之间的 Adjunctions 得到了一类广泛的二进制运算,从而推广了之前的结果。最后,我们探讨了相关二进制运算之间的关系。
{"title":"Generating quasi-t-subnorms on preordered sets via Adjunctions and Left Galois Connections","authors":"Jun Geng , Rina Wang , Ziwen Chen","doi":"10.1016/j.fss.2024.109036","DOIUrl":"https://doi.org/10.1016/j.fss.2024.109036","url":null,"abstract":"<div><p>In this paper, we investigate several classes of binary operations within the preordered framework. First, we give the definition of quasi-t-subnorm on preordered sets. Subsequently, we research two classes of quasi-t-subnorms by means of Adjunctions and Left Galois Connections respectively. Meanwhile, we introduce new preorders differing from the inclusion order on powersets. Importantly, quasi-t-subnorms can be defined on powersets with preorders. Then we get a class of extensive binary operations via Adjunctions between preordered sets and the preordered sets consisting of powersets, which generalizes the previous results. The relationship between related binary operations is explored at last.</p></div>","PeriodicalId":55130,"journal":{"name":"Fuzzy Sets and Systems","volume":"490 ","pages":"Article 109036"},"PeriodicalIF":3.9,"publicationDate":"2024-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141314324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-07DOI: 10.1016/j.fss.2024.109039
Rim Achour, Bilel Selmi
Consider as a complete metric space and as the space of probability Borel measures on Y. Let be the general upper box dimension of the set . We begin by proving that the general packing dimension of the typical compact set, in the sense of the Baire category, is at least where is the closed ball in Y with center at x and radii . Next, we obtain some estimates of the general upper and lower box dimensions of typical measures in the sense of the Baire category. Finally, we demonstrate that if is equipped with the weak topology and under some assumptions then the set of measures possessing the general upper and lower correlation dimension zero are residual. Furthermore, the general upper correlation dimension of typical measures (in the sense of the Baire category) is approximated through the general local lower and upper entropy dimensions of Y.
将 (Y,ρ) 视为完全度量空间,S 视为 Y 上的概率玻尔量空间。设 dim‾BΨ,Φ(E) 为集合 E⊂Y 的一般上箱维度。我们首先证明,在贝雷范畴的意义上,典型紧凑集的一般包装维度至少是 inf{dim‾BΨ,Φ(B(x,r))|x∈Y,r>0} 其中 B(x,r) 是 Y 中以 x 为中心、以 r>0 为半径的闭球。接下来,我们会得到一些关于贝雷范畴意义上的典型度量的一般上下盒维的估计值。最后,我们证明,如果 S 具有弱拓扑,并且在某些假设条件下,那么具有一般上下相关维数为零的度量集合是残差的。此外,典型度量的一般上相关维度(在贝雷范畴的意义上)是通过 Y 的一般局部下熵维度和上熵维度近似得到的。
{"title":"General fractal dimensions of typical sets and measures","authors":"Rim Achour, Bilel Selmi","doi":"10.1016/j.fss.2024.109039","DOIUrl":"https://doi.org/10.1016/j.fss.2024.109039","url":null,"abstract":"<div><p>Consider <span><math><mo>(</mo><mi>Y</mi><mo>,</mo><mi>ρ</mi><mo>)</mo></math></span> as a complete metric space and <span><math><mi>S</mi></math></span> as the space of probability Borel measures on <em>Y</em>. Let <span><math><msubsup><mrow><mover><mrow><mi>dim</mi></mrow><mo>‾</mo></mover></mrow><mrow><mi>B</mi></mrow><mrow><mi>Ψ</mi><mo>,</mo><mi>Φ</mi></mrow></msubsup><mo>(</mo><mi>E</mi><mo>)</mo></math></span> be the general upper box dimension of the set <span><math><mi>E</mi><mo>⊂</mo><mi>Y</mi></math></span>. We begin by proving that the general packing dimension of the typical compact set, in the sense of the Baire category, is at least <span><math><mi>inf</mi><mo></mo><mrow><mo>{</mo><msubsup><mrow><mover><mrow><mi>dim</mi></mrow><mo>‾</mo></mover></mrow><mrow><mi>B</mi></mrow><mrow><mi>Ψ</mi><mo>,</mo><mi>Φ</mi></mrow></msubsup><mo>(</mo><mi>B</mi><mo>(</mo><mi>x</mi><mo>,</mo><mi>r</mi><mo>)</mo><mo>)</mo><mspace></mspace><mo>|</mo><mspace></mspace><mi>x</mi><mo>∈</mo><mi>Y</mi><mo>,</mo><mi>r</mi><mo>></mo><mn>0</mn><mo>}</mo></mrow></math></span> where <span><math><mi>B</mi><mo>(</mo><mi>x</mi><mo>,</mo><mi>r</mi><mo>)</mo></math></span> is the closed ball in <em>Y</em> with center at <em>x</em> and radii <span><math><mi>r</mi><mo>></mo><mn>0</mn></math></span>. Next, we obtain some estimates of the general upper and lower box dimensions of typical measures in the sense of the Baire category. Finally, we demonstrate that if <span><math><mi>S</mi></math></span> is equipped with the weak topology and under some assumptions then the set of measures possessing the general upper and lower correlation dimension zero are residual. Furthermore, the general upper correlation dimension of typical measures (in the sense of the Baire category) is approximated through the general local lower and upper entropy dimensions of <em>Y</em>.</p></div>","PeriodicalId":55130,"journal":{"name":"Fuzzy Sets and Systems","volume":"490 ","pages":"Article 109039"},"PeriodicalIF":3.9,"publicationDate":"2024-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141323410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-03DOI: 10.1016/j.fss.2024.109026
Pablo Cordero, Manuel Enciso, Ángel Mora, Francisco Pérez-Gámez
Simplification logic, a logic for attribute implications, was originally defined for Boolean sets. It was extended to distributive fuzzy sets by using a complete dual Heyting algebra. In this paper, we weaken this restriction in the sense that we prove that it is possible to define a simplification logic on fuzzy sets in which the membership value structure is not necessarily distributive. For this purpose, we replace the structure of the complete dual Heyting algebra by the so-called weak complete dual Heyting algebra. We demonstrate the soundness and completeness of this simplification logic, and provide a characterisation of the operations defining weak complete dual Heyting algebras.
{"title":"Attribute implications with unknown information based on weak Heyting algebras","authors":"Pablo Cordero, Manuel Enciso, Ángel Mora, Francisco Pérez-Gámez","doi":"10.1016/j.fss.2024.109026","DOIUrl":"10.1016/j.fss.2024.109026","url":null,"abstract":"<div><p>Simplification logic, a logic for attribute implications, was originally defined for Boolean sets. It was extended to distributive fuzzy sets by using a complete dual Heyting algebra. In this paper, we weaken this restriction in the sense that we prove that it is possible to define a simplification logic on fuzzy sets in which the membership value structure is not necessarily distributive. For this purpose, we replace the structure of the complete dual Heyting algebra by the so-called weak complete dual Heyting algebra. We demonstrate the soundness and completeness of this simplification logic, and provide a characterisation of the operations defining weak complete dual Heyting algebras.</p></div>","PeriodicalId":55130,"journal":{"name":"Fuzzy Sets and Systems","volume":"490 ","pages":"Article 109026"},"PeriodicalIF":3.9,"publicationDate":"2024-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0165011424001726/pdfft?md5=ee2ac4c6b8ecd2ed61b7fd43fe035028&pid=1-s2.0-S0165011424001726-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141280384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-03DOI: 10.1016/j.fss.2024.109027
Liquan Zhao, Yiyu Yao
Three basic issues of granular computing are construction or definition of granules, measures of granules, and computation or reasoning with granules. This paper reviews the main theories of granular computing and introduces the definition of spatial granules. A granule is composed of one or more atomic granules. The rationality of this definition is explained from the four aspects: simplicity, applicability, measurability and visualization. A one-to-one correspondence is established between the granules and the points in the unit hypercube, and the coarsening and refining of the granules are the descending and ascending dimensions of the points, respectively. The weak fuzzy tolerance relation and weak fuzzy equivalence relation are defined so as to study on all fuzzy binary relations. The notion of layer granularity/fineness is introduced and each granule can be easily denoted by two numbers, which can be used to pre-process macro knowledge space and greatly improve the search speed. This paper also discusses the main properties of granules including the necessary and sufficient conditions of coarse-fine relation and the main principles of granular space.
{"title":"Towards the definition of spatial granules","authors":"Liquan Zhao, Yiyu Yao","doi":"10.1016/j.fss.2024.109027","DOIUrl":"10.1016/j.fss.2024.109027","url":null,"abstract":"<div><p>Three basic issues of granular computing are construction or definition of granules, measures of granules, and computation or reasoning with granules. This paper reviews the main theories of granular computing and introduces the definition of spatial granules. A granule is composed of one or more atomic granules. The rationality of this definition is explained from the four aspects: simplicity, applicability, measurability and visualization. A one-to-one correspondence is established between the granules and the points in the unit hypercube, and the coarsening and refining of the granules are the descending and ascending dimensions of the points, respectively. The weak fuzzy tolerance relation and weak fuzzy equivalence relation are defined so as to study on all fuzzy binary relations. The notion of layer granularity/fineness is introduced and each granule can be easily denoted by two numbers, which can be used to pre-process macro knowledge space and greatly improve the search speed. This paper also discusses the main properties of granules including the necessary and sufficient conditions of coarse-fine relation and the main principles of granular space.</p></div>","PeriodicalId":55130,"journal":{"name":"Fuzzy Sets and Systems","volume":"490 ","pages":"Article 109027"},"PeriodicalIF":3.9,"publicationDate":"2024-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141278881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-31DOI: 10.1016/j.fss.2024.109025
Mikel Ferrero-Jaurrieta , Rui Paiva , Anderson Cruz , Benjamín Bedregal , Xiaohong Zhang , Zdenko Takáč , Carlos López-Molina , Humberto Bustince
Overlap and grouping functions can be used to measure events in which we must consider either the maximum or the minimum lack of knowledge. The commutativity of overlap and grouping functions can be dropped out to introduce the notions of pseudo-overlap and pseudo-grouping functions, respectively. These functions can be applied in problems where distinct orders of their arguments yield different values, i.e., in non-symmetric contexts. Intending to reduce the complexity of pseudo-overlap and pseudo-grouping functions, we propose new construction methods for these functions from generalized concepts of additive and multiplicative generators. We investigate the isomorphism between these families of functions. Finally, we apply these functions in an illustrative problem using them in a time series prediction combined model using the IOWA operator to evidence that using these generators and functions implies better performance.
{"title":"Reduction of complexity using generators of pseudo-overlap and pseudo-grouping functions","authors":"Mikel Ferrero-Jaurrieta , Rui Paiva , Anderson Cruz , Benjamín Bedregal , Xiaohong Zhang , Zdenko Takáč , Carlos López-Molina , Humberto Bustince","doi":"10.1016/j.fss.2024.109025","DOIUrl":"https://doi.org/10.1016/j.fss.2024.109025","url":null,"abstract":"<div><p>Overlap and grouping functions can be used to measure events in which we must consider either the maximum or the minimum lack of knowledge. The commutativity of overlap and grouping functions can be dropped out to introduce the notions of pseudo-overlap and pseudo-grouping functions, respectively. These functions can be applied in problems where distinct orders of their arguments yield different values, i.e., in non-symmetric contexts. Intending to reduce the complexity of pseudo-overlap and pseudo-grouping functions, we propose new construction methods for these functions from generalized concepts of additive and multiplicative generators. We investigate the isomorphism between these families of functions. Finally, we apply these functions in an illustrative problem using them in a time series prediction combined model using the IOWA operator to evidence that using these generators and functions implies better performance.</p></div>","PeriodicalId":55130,"journal":{"name":"Fuzzy Sets and Systems","volume":"490 ","pages":"Article 109025"},"PeriodicalIF":3.9,"publicationDate":"2024-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0165011424001714/pdfft?md5=3ed86ab47bd97e1aac2a168c62d02481&pid=1-s2.0-S0165011424001714-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141290041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-29DOI: 10.1016/j.fss.2024.109024
Gayathri G. , Sunil Mathew , J.N. Mordeson
<div><p>Directed fuzzy incidence graphs (DFIGs) are fuzzy incidence structures where each edge and incidence pair has a specific direction. In these graphs, the relationships are not symmetric, making it easier to identify the extent of interaction between nodes and arcs. The comprehensive investigation of connectivity in directed fuzzy incidence graphs holds the potential to provide solutions for a wide range of real-world problems including traffic flow optimization in one-way traffic networks and migration analysis of refugees across various countries. The main objective of this paper is to extend the connectivity concepts of directed fuzzy incidence graphs, which help to analyze various stochastic networks influenced by external factors. The major concepts discussed in this article are legal fuzzy incidence blocks, legal flow reduction sets, and the DFIG-version of Menger's theorem. Directed fuzzy incidence graphs having no legal flow reduction nodes are defined as legal fuzzy incidence blocks (LFI-blocks). Legal flow reduction nodes (LFR-nodes) are distinct elements, the elimination of which results in a reduction of the directed incidence connectivity between some other pair of nodes. Since LFI-blocks lack these elements, the removal of none of the nodes reduce the legal flow between other pair of nodes. Consequently, for each node under consideration, any other pair of nodes connected by at least one <em>di</em>-path must possess a widest legal <em>di</em>-path which avoids that specific node. LFI-blocks exhibit differing attributes in contrast to their counterparts in fuzzy graphs and fuzzy incidence graphs. This viewpoint motivated the authors to investigate these distinctions and assess the possibility of defining equivalent conditions for LFI-blocks, similar to the equivalent conditions established for fuzzy blocks and fuzzy incidence blocks. A key characteristic of legal fuzzy incidence blocks is their capacity to incorporate legal flow reduction links, even allowing for the presence of shared nodes among two legal flow reduction links. This contrasts with fuzzy graphs and fuzzy incidence graphs, where if two fuzzy bridges happen to share a common node, it results in that node being a fuzzy cutnode. Two equivalent conditions are proposed for a directed fuzzy incidence graph to become a legal fuzzy incidence block. It is shown that any two nodes in a legal fuzzy incidence block which are connected by at least one <em>di</em>-path, but not by a legal flow reduction link will have at least two internally disjoint widest legal <em>di</em>-paths joining them. To identify the maximum number of such internally disjoint widest legal <em>di</em>-paths, the notion of legal flow reduction set of nodes and arcs is introduced. These sets are characterized using widest legal <em>di</em>-paths. Moreover, the DFIG-version of Menger's theorem for nodes is established, which explains the relation between number of internally disjoint widest legal <em>d
{"title":"Legal fuzzy incidence blocks and legal flow reduction sets with application to water distribution networks","authors":"Gayathri G. , Sunil Mathew , J.N. Mordeson","doi":"10.1016/j.fss.2024.109024","DOIUrl":"https://doi.org/10.1016/j.fss.2024.109024","url":null,"abstract":"<div><p>Directed fuzzy incidence graphs (DFIGs) are fuzzy incidence structures where each edge and incidence pair has a specific direction. In these graphs, the relationships are not symmetric, making it easier to identify the extent of interaction between nodes and arcs. The comprehensive investigation of connectivity in directed fuzzy incidence graphs holds the potential to provide solutions for a wide range of real-world problems including traffic flow optimization in one-way traffic networks and migration analysis of refugees across various countries. The main objective of this paper is to extend the connectivity concepts of directed fuzzy incidence graphs, which help to analyze various stochastic networks influenced by external factors. The major concepts discussed in this article are legal fuzzy incidence blocks, legal flow reduction sets, and the DFIG-version of Menger's theorem. Directed fuzzy incidence graphs having no legal flow reduction nodes are defined as legal fuzzy incidence blocks (LFI-blocks). Legal flow reduction nodes (LFR-nodes) are distinct elements, the elimination of which results in a reduction of the directed incidence connectivity between some other pair of nodes. Since LFI-blocks lack these elements, the removal of none of the nodes reduce the legal flow between other pair of nodes. Consequently, for each node under consideration, any other pair of nodes connected by at least one <em>di</em>-path must possess a widest legal <em>di</em>-path which avoids that specific node. LFI-blocks exhibit differing attributes in contrast to their counterparts in fuzzy graphs and fuzzy incidence graphs. This viewpoint motivated the authors to investigate these distinctions and assess the possibility of defining equivalent conditions for LFI-blocks, similar to the equivalent conditions established for fuzzy blocks and fuzzy incidence blocks. A key characteristic of legal fuzzy incidence blocks is their capacity to incorporate legal flow reduction links, even allowing for the presence of shared nodes among two legal flow reduction links. This contrasts with fuzzy graphs and fuzzy incidence graphs, where if two fuzzy bridges happen to share a common node, it results in that node being a fuzzy cutnode. Two equivalent conditions are proposed for a directed fuzzy incidence graph to become a legal fuzzy incidence block. It is shown that any two nodes in a legal fuzzy incidence block which are connected by at least one <em>di</em>-path, but not by a legal flow reduction link will have at least two internally disjoint widest legal <em>di</em>-paths joining them. To identify the maximum number of such internally disjoint widest legal <em>di</em>-paths, the notion of legal flow reduction set of nodes and arcs is introduced. These sets are characterized using widest legal <em>di</em>-paths. Moreover, the DFIG-version of Menger's theorem for nodes is established, which explains the relation between number of internally disjoint widest legal <em>d","PeriodicalId":55130,"journal":{"name":"Fuzzy Sets and Systems","volume":"489 ","pages":"Article 109024"},"PeriodicalIF":3.9,"publicationDate":"2024-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141249860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-24DOI: 10.1016/j.fss.2024.109023
Marc Munar , Miguel Couceiro , Sebastia Massanet , Daniel Ruiz-Aguilera
The enumeration of logical connectives and aggregation functions defined on a finite chain has been a hot topic in the literature for the last decades. Multiple advantages can be derived from knowing a general formula about their cardinality, for instance, the ability to anticipate the computational cost required for generating operators with different properties. This is of paramount importance in image processing and decision making scenarios, where the identification of the most optimal operator is essential. Furthermore, it facilitates the examination of how constraining a certain property is in relation to its parent class. As a consequence, this paper aims to compile the main existing formulas and the methodologies with which they have been derived. Additionally, we introduce some novel formulas for the number of smooth discrete aggregation functions with neutral element or absorbing element, idempotent conjunctions, and commutative and idempotent conjunctions.
{"title":"A survey on the enumeration of classes of logical connectives and aggregation functions defined on a finite chain, with new results","authors":"Marc Munar , Miguel Couceiro , Sebastia Massanet , Daniel Ruiz-Aguilera","doi":"10.1016/j.fss.2024.109023","DOIUrl":"10.1016/j.fss.2024.109023","url":null,"abstract":"<div><p>The enumeration of logical connectives and aggregation functions defined on a finite chain has been a hot topic in the literature for the last decades. Multiple advantages can be derived from knowing a general formula about their cardinality, for instance, the ability to anticipate the computational cost required for generating operators with different properties. This is of paramount importance in image processing and decision making scenarios, where the identification of the most optimal operator is essential. Furthermore, it facilitates the examination of how constraining a certain property is in relation to its parent class. As a consequence, this paper aims to compile the main existing formulas and the methodologies with which they have been derived. Additionally, we introduce some novel formulas for the number of smooth discrete aggregation functions with neutral element or absorbing element, idempotent conjunctions, and commutative and idempotent conjunctions.</p></div>","PeriodicalId":55130,"journal":{"name":"Fuzzy Sets and Systems","volume":"490 ","pages":"Article 109023"},"PeriodicalIF":3.9,"publicationDate":"2024-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0165011424001696/pdfft?md5=b68d5fcda92a3ef66deb2634bd618add&pid=1-s2.0-S0165011424001696-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141134216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this article, an Interval Type-3 Fuzzy Logic System (IT3FLS) for enhancing the performance in Bee Colony Optimization (BCO) is outlined. The efficiency of the IT3FLS approach is verified with results on a set of benchmark mathematical functions. The IT3FLS provides an approach that helps to identify the optimal values in and parameters that allows to improve the performance in the original BCO. The IT3FLS approach exhibits advantages in the optimization of the benchmark functions. It can be noted that a IT3FLS exhibits better results in the minimal values of the set of mathematical functions. The experimentation demostrates that the implementation of the IT3FLS approach enhances the performance of BCO when compared with respect to the variants utilizing Generalized Type-2 FLS (GT2FLS), Interval Type-2 FLS (IT2FLS) and Type-1 FLS (T1FLS).
{"title":"Type-3 fuzzy dynamic adaptation of Bee colony optimization applied to mathematical functions","authors":"Leticia Amador-Angulo , Oscar Castillo , Patricia Melin , Zong Woo Geem","doi":"10.1016/j.fss.2024.109014","DOIUrl":"10.1016/j.fss.2024.109014","url":null,"abstract":"<div><p>In this article, an Interval Type-3 Fuzzy Logic System (IT3FLS) for enhancing the performance in Bee Colony Optimization (BCO) is outlined. The efficiency of the IT3FLS approach is verified with results on a set of benchmark mathematical functions. The IT3FLS provides an approach that helps to identify the optimal values in <span><math><mi>α</mi></math></span> and <span><math><mi>β</mi></math></span> parameters that allows to improve the performance in the original BCO. The IT3FLS approach exhibits advantages in the optimization of the benchmark functions. It can be noted that a IT3FLS exhibits better results in the minimal values of the set of mathematical functions. The experimentation demostrates that the implementation of the IT3FLS approach enhances the performance of BCO when compared with respect to the variants utilizing Generalized Type-2 FLS (GT2FLS), Interval Type-2 FLS (IT2FLS) and Type-1 FLS (T1FLS).</p></div>","PeriodicalId":55130,"journal":{"name":"Fuzzy Sets and Systems","volume":"489 ","pages":"Article 109014"},"PeriodicalIF":3.9,"publicationDate":"2024-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141139472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-20DOI: 10.1016/j.fss.2024.109015
Ewa Rak , Jaromir Sarzyński , Rafał Rak
With the growing complexity and frequency of cyber threats, there is a pressing need for more effective defense mechanisms. Machine learning offers the potential to analyze vast amounts of data and identify patterns indicative of malicious activity, enabling faster and more accurate threat detection. Ensemble methods, by incorporating diverse models with varying vulnerabilities, can increase resilience against adversarial attacks. This study covers the usage and evaluation of the relevance of an innovative approach of ensemble classification for identifying intrusion threats on a large CICIDS2017 dataset. The approach is based on the distributivity equation that appropriately aggregates the underlying classifiers. It combines various standard supervised classification algorithms, including Multilayer Perceptron Network, k-Nearest Neighbors, and Naive Bayes, to create an ensemble. Experiments were conducted to evaluate the effectiveness of the proposed hybrid ensemble method. The performance of the ensemble approach was compared with individual classifiers using measures such as accuracy, precision, recall, F-score, and area under the ROC curve. Additionally, comparisons were made with widely used state-of-the-art ensemble models, including the soft voting method (Weighted Average Probabilities), Adaptive Boosting (AdaBoost), and Histogram-based Gradient Boosting Classification Tree (HGBC) and with existing methods in the literature using the same dataset, such as Deep Belief Networks (DBN), Deep Feature Learning via Graph (Deep GFL). Based on these experiments, it was found that some ensemble methods, such as AdaBoost and Histogram-based Gradient Classification Tree, do not perform reliably for the specific task of identifying network attacks. This highlights the importance of understanding the context and requirements of the data and problem domain. The results indicate that the proposed hybrid ensemble method outperforms traditional algorithms in terms of classification precision and accuracy, and offers insights for improving the effectiveness of intrusion detection systems.
{"title":"Effectiveness of an ensemble technique based on the distributivity equation in detecting suspicious network activity","authors":"Ewa Rak , Jaromir Sarzyński , Rafał Rak","doi":"10.1016/j.fss.2024.109015","DOIUrl":"https://doi.org/10.1016/j.fss.2024.109015","url":null,"abstract":"<div><p>With the growing complexity and frequency of cyber threats, there is a pressing need for more effective defense mechanisms. Machine learning offers the potential to analyze vast amounts of data and identify patterns indicative of malicious activity, enabling faster and more accurate threat detection. Ensemble methods, by incorporating diverse models with varying vulnerabilities, can increase resilience against adversarial attacks. This study covers the usage and evaluation of the relevance of an innovative approach of ensemble classification for identifying intrusion threats on a large CICIDS2017 dataset. The approach is based on the distributivity equation that appropriately aggregates the underlying classifiers. It combines various standard supervised classification algorithms, including Multilayer Perceptron Network, k-Nearest Neighbors, and Naive Bayes, to create an ensemble. Experiments were conducted to evaluate the effectiveness of the proposed hybrid ensemble method. The performance of the ensemble approach was compared with individual classifiers using measures such as accuracy, precision, recall, <em>F</em>-score, and area under the ROC curve. Additionally, comparisons were made with widely used state-of-the-art ensemble models, including the soft voting method (Weighted Average Probabilities), Adaptive Boosting (AdaBoost), and Histogram-based Gradient Boosting Classification Tree (HGBC) and with existing methods in the literature using the same dataset, such as Deep Belief Networks (DBN), Deep Feature Learning via Graph (Deep GFL). Based on these experiments, it was found that some ensemble methods, such as AdaBoost and Histogram-based Gradient Classification Tree, do not perform reliably for the specific task of identifying network attacks. This highlights the importance of understanding the context and requirements of the data and problem domain. The results indicate that the proposed hybrid ensemble method outperforms traditional algorithms in terms of classification precision and accuracy, and offers insights for improving the effectiveness of intrusion detection systems.</p></div>","PeriodicalId":55130,"journal":{"name":"Fuzzy Sets and Systems","volume":"488 ","pages":"Article 109015"},"PeriodicalIF":3.9,"publicationDate":"2024-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141077980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}