Next Article in Journal
Expected Values of Some Molecular Descriptors in Random Cyclooctane Chains
Next Article in Special Issue
On Some Laws of Large Numbers for Uncertain Random Variables
Previous Article in Journal
Three-Phase Feeder Load Balancing Based Optimized Neural Network Using Smart Meters
Previous Article in Special Issue
Sine Entropy of Uncertain Random Variables
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Arithmetic Operations and Expected Values of Regular Interval Type-2 Fuzzy Variables

School of Management, Shanghai University, Shanghai 200444, China
*
Author to whom correspondence should be addressed.
Submission received: 18 October 2021 / Revised: 10 November 2021 / Accepted: 11 November 2021 / Published: 17 November 2021
(This article belongs to the Special Issue Fuzzy Set Theory and Uncertainty Theory)

Abstract

:
High computation complexity restricts the application prospects of the interval type-2 fuzzy variable (IT2-FV), despite its high degree of freedom in representing uncertainty. Thus, this paper studies the fuzzy operations for the regular symmetric triangular IT2-FVs (RSTIT2-FVs)—the simplest IT2-FVs having the greatest membership degrees of 1. Firstly, by defining the medium of an RSTIT2-FV, its membership function, credibility distribution, and inverse distribution are analytically and explicitly expressed. Secondly, an operational law for fuzzy arithmetic operations regarding mutually independent RSTIT2-FVs is proposed, which can simplify the calculations and directly output the inverse credibility of the functions. Afterwards, the operational law is applied to define the expected value operator of the IT2-FV and prove the linearity of the operator. Finally, some comparative examples are provided to verify the efficiency of the proposed operational law.

1. Introduction

There are various types of uncertainty in real life (e.g., fluctuations in the stock market, the costs and demands in the suppliers’ market, etc.), forcing us to choose reasonable mathematical tools to describe the research objects. Therefore, the ordinary fuzzy set theory proposed by Zadeh [1] in 1965 has “deepened” over the past five decades. Among the vast amount of theories(e.g., the fuzzy random sets [2], the twofold fuzzy sets [3], the bifuzzy sets [4], the fuzzy soft sets [5], the interval-valued picture hesitant fuzzy set [6]), the type-2 fuzzy set (T2-FS) is an important branch attracting constant attention due to its superiority in representing the uncertainty of the membership function (MF).
The MF, which measures the degree to which an FV is likely to take a certain value, is usually provided by experts, based on their experiences or experiments under the circumstances where there are a lack of data, or where semantic ambiguity exists. In the ordinary fuzzy set theory, the MF of an FV should be uniquely determined. In reality, however, different people have their own understanding of the same fuzzy concept; that is, the determination process of the MF is subjective. Then, how could one guarantee that subjective judgments lead to objective results? There is no mature or effective method yet. Consequently, in order to reflect the inner- and inter-individual differences, Zadeh [7] proposed the concept of T2-FS in 1975, the MF (named primary MF) of which is also an FV.
For a general T2-FV, the fuzziness of its secondary MFs (the MFs of the primary MF) brings about both high computational complexity and visualization difficulty [8]. Although numerous scholars have made delicate research on type-reduction approaches, including the Karnik-Mendel (KM) algorithm-based iterative methods [9], the statistical sampling based geometric strategies [10], and the possibility measure based methods [11,12,13], the applicability of the T2-FVs is seriously restricted. Up until now, the studies on the application of T2-FVs have mainly focused on fuzzy logic systems, programmings, and game theory [14,15,16,17,18]. Readers may refer to [19,20,21] for related papers on T2-FS type-reduction and its application areas.
As a special case, the interval T2-FVs (IT2-FVs), whose secondary MFs are identically equal to 1 [22], the uncertainty of the secondary MFs disappears, and a single IT2-FV is uniquely determined by its upper MF (UMF) and lower MF (LMF). Therefore, it can be visualized in a plane. Compared to the generalized T2-FVs, the theories concerning IT2-FVs are, nowadays, relatively mature (see, e.g., [23,24]), and the application areas are extended to computer science, finance, commerce, etc. [25,26,27,28].
To the best of our knowledge, however, the existing studies focus on algorithm-based type-reductions and defuzzification methods, whereas the research for fuzzy arithmetic operations of the IT2-FVs are relatively limited. The first work is by Lee and Chen [29] who defined three arithmetic operations between two IT2-FVs, whose UMF and LMF are both r-polygonal shape, named addition, subtraction, and multiplication. Since then, some scholars have followed Lee and Chen’s work while applying multi-attribute decision making approaches [30], such as the analytic hierarchy process [31,32] and TOPSIS [33], to make ranking and evaluation decisions [34,35,36]. Besides, for the trapezoidal interval type-2 fuzzy numbers, some other operators, such as the geometric Bonferroni mean operator [37] and Heronian mean operators [38] were proposed. Aguero and Vargas [39] is another work focusing on the operations between two IT2-FVs, where the vertex method, based on α cut, was suggested. Nevertheless, these operators involve complex operations themselves, and thus are inadequate at solving many realistic problems concerning more complex operations. Hence, there is an urgent need to put forward a brand-new and convenient operational law for fuzzy arithmetic operations of the IT2-FVs.
On the other hand, within the framework of the traditional fuzzy set theory, Zhou et al. [40] proposed an operational law for calculating the inverse credibility distribution of the strictly monotone functions between mutually independent type-1 FVs (T1-FVs) and verified that their method can greatly simplify the fuzzy arithmetical operations. Therefore, learning from their ideas, we attempt to extend the inverse credibility distribution-based operational law to the type-2 fuzzy set theory. To demonstrate the efficiency of the proposed method, the simplest and most special type of IT2-FVs, i.e., the regular symmetric triangular IT2-FV (RSTIT2-FV), is studied in this paper, as an extension of the most commonly used symmetric triangular FV in the type-1 fuzzy set system. The RSTIT2-FV this paper focuses on has two characteristics: (1) the shapes of the UMF and LMF are both symmetric triangles; (2) the vertexes of the UMF and LMF overlap at the membership degree of 1.
The main contributions of this paper are as follows. First, we give a clear mathematical definition of the RSTIT2-FV and define the medium of an RSTIT2-FV as a type-reduction operator, and then set forth the possibility, necessity, and credibility measures, as well as the credibility distribution and inverse credibility distribution. Second, the operational law based on the proposed inverse credibility distribution for mutually independent RSTIT2-FVs is given, which can help calculate for the strictly monotone functions of the RSTIT2-FVs in a relatively easy way. Thirdly, an expected value operator via inverse credibility distribution for the RSTIT2-FV is defined, and its linearity is proved. Finally, some numerical examples are illustrated to verify the efficiency of the proposed methodology.
The rest of this paper is organized as follows. In Section 2, the related concepts are briefly introduced. Then, the RSTIT2-FV is defined in Section 3, as well as the credibility distribution function and inverse credibility distribution. In Section 4, the operation law for the proposed RSTIT2-FV is provided. Finally, the expected value and its property of linearity are introduced and proved in Section 5.

2. Preliminaries

To begin, some fundamental concepts of the fuzzy set theory will be briefly introduced in advance.
Definition 1. (Zadeh [7]) A type-1 fuzzy set (T1-FS) B can be defined as
B = x X μ B ( x ) x ,
where μ B ( x ) is the real-valued membership function, and X is the universe of x.
Definition 2. (Liu [41]) Given that Θ is a nonempty set, Γ ( Θ ) is the power set of Θ, Pos is a possibility measure, and R is a real number set. Let the triad Θ , Γ ( Θ ) , Pos be a possibility space, then the map η: Θ , Γ ( Θ ) , Pos R is called a type-1 fuzzy variable (T1-FV).
Definition 3. (Liu [41]) The credibility distribution for a T1-FV η can be calculated by
Φ η ( x ) = Cr { η x } = 1 2 sup η x μ η ( x ) + 1 sup η > x μ η ( x ) ,
where μ η ( x ) is the MF of η.
Definition 4. (Doubois and Prade [42]) A T1-FV η is called an LR-type FV if its shape function and scalers α > 0 , c > 0 satisfy
μ η ( x ) = L c x α , x ( , c ] R x c α , x [ c , + ) ,
where the shape function L (for left) and R (for right) are decreasing functions from R + [ 0 , 1 ] and satisfy L(0) = R(0) = 1 and L(1) = R(1) = 0.
Definition 5. (Zhou et al. [40]) An LR-type FV η, which has a continuous and strictly increasing credibility distribution Φ η is called a regular LR-FV.
Definition 6. (Zadeh [7], Mendel and John [43]) A type-2 fuzzy set (T2-FS), denoted as S and characterized by a type MF μ S ( x , u ) . And S can be expressed as
S = x X u J x μ S ( x , u ) ( x , u ) .
where u J x [ 0 , 1 ] , x X is called the primary MF of x, μ S ( x , u ) is called the secondary MF of u.
It can be easily seen from Definition 6 that T2-FS is defined on a three-dimensional space. To better characterize its features, Mendel and John [43] defined the information it mapped to the two-dimensional plane as the footprint of uncertainty (FOU).
Definition 7. (Mendel and John [43]) For any x X , let the primary membership function of a T2-FS S be J x [ 0 , 1 ] , then the FOU of S is the union of all the primary membership functions and, thus, can be expressed as
F O U ( S ) = x X J x .
The upper and lower bounds of the FOU are called the upper membership function (UMF) and lower membership function (LMF) of S, respectively.
Definition 8. (Mendel et al. [22]) For a T2-FS S who has an N-element discrete universe of discourse X and primary membership functions J x 1 , J x 2 , , J x N , an embedded T1-FS S e has N elements, one each from J x i , i = 1 , 2 , , N , namely u 1 , u 2 , , u N , i.e.,
S e = i = 1 N u i x i , u i J x i [ 0 , 1 ] .
Remark 1.
The embedded T1-FS can be extended to the continuous situations and expressed as
S e = u x , u J x [ 0 , 1 ] .
Obviously, there are uncountable numbers of embedded T1-FSs in infinite domains.
Definition 9. (Liu and Liu [11]) Let S be a T2-FV, then the secondary possibility distribution function, μ ˜ S ( x ) , is a map R [ 0 , 1 ] satisfying μ ˜ S ( x ) = Pos ˜ γ Θ | S ( γ ) = x , x R , and the type-2 possibility distribution function, μ S ( x , u ) , is a map R × J x [ 0 , 1 ] satisfying μ S ( x , u ) = Pos μ ˜ S ( x ) = u , x , u R × J x .
Remark 2.
In fact, for a given x = x , μ S ( x ) in Definition 9 is exactly the secondary MF, μ S ( x , u ) , in Definition 6. Therefore, J x in Definition 9 can also be regarded as the primary MF in Definition 6.
Definition 10. (Men at al. [44]) For any x X and u J x , if μ S ( x , u ) is identically equal to 1, then the T2-FS S is an interval T2-FV (IT2-FV).
According to Definition 10, the secondary membership of an IT2-FV is unique and equal everywhere, i.e., the uncertainty of the MF and the information of the third dimension for an IT2-FV can be ignored, and the IT2-FV can be uniquely determined by the region bounded by its UMF and LMF.

3. Symmetric Triangular Interval Type-2 Fuzzy Variable

In this section, a special kind of IT2-FV, named regular symmetric triangular IT2-FV, is introduced.

3.1. RSTIT2-FV and Its Medium

The specific definition of the IT2-FV studied in this paper is as follows.
Definition 11.
An IT2-FV S is called a regular symmetric triangular IT2-FV (RSTIT2-FV) if its UMF and LMF are as in the following forms,
UMF = 1 l U x c l U l U , x [ c l U , c ) 1 l U x + c + l U l U , x [ c , c + l U ] 0 , o t h e r w i s e ,
and
LMF = 1 l L x c l L l L , x [ c l L , c ) 1 l L x + c + l L l L , x [ c , c + l L ] 0 , o t h e r w i s e ,
and can be denoted as c l U c c + l U c l L c c + l L , where the spreads of the UMF and LMF, l U and l L , satisfy l U > l L , and the peak of them, 1, are reached when x is equal to c.
An RSTIT2-FV is visualized in Figure 1 and Figure 2, respectively, in a three-dimensional space and two-dimensional plane, respectively, and Figure 2 can be understood as a top view of Figure 1.
In order to facilitate the subsequent definitions of credibility distribution and operational law for the RSTIT2-FV, the medium of an RSTIT2-FV is defined in advance.
Definition 12.
Let S be an RSTIT2-FV, η be a T1-FV, and their MFs satisfy
μ η ( x ) = 1 2 UMF + 1 2 LMF ,
then η is called the medium of S.
Definition 12 endows equal weights to every possible value of the MFs for a certain x, it is a relatively evenhanded way to eliminate the uncertainty of MFs in an uncertain and complex environment. Following from Definition 12, the analytical expression of μ η ( x ) can be calculated as
μ η ( x ) = 1 2 1 l U x c l U l U , x [ c l U , c l L ) 1 2 1 l U x c l U l U + 1 2 1 l L x c l L l L , x [ c l L , c ) 1 2 1 l U x + c + l U l U + 1 2 1 l L x + c + l L l L , x [ c , c + l L ) 1 2 1 l U x + c + l U l U , x [ c + l L , c + l U ] 0 , o t h e r w i s e ,
according to Equations (1) and (2). Figure 3 shows the medium η with the red polyline representing its MF, from which we can readily infer that η is a regular LR-FV. Moreover, μ η can be regarded as one of the embedded type-1 sets of S, according to Definition 8.

3.2. The Credibility Distribution of the RSTIT2-FVs

By means of the medium η , we can define the credibility distribution and inverse credibility distribution in light of Liu [41]’s definition of credibility measure for the T1-FVs. Beforehand, the definition of the credibility measure for an RSTIT2-FV is given.
Definition 13.
Let S be an RSTIT2-FV with the medium of η, and A be a fuzzy event from the universe, then the possibility, necessity, and credibility measures of A for S are, respectively,
Pos { A } = sup x A μ η ( x ) , Nec { A } = 1 sup x A c μ η ( x ) , Cr { A } = 1 2 Pos { A } + Nec { A } .
It can be easily proven that the credibility measure of an RSTIT2-FV is self-dual and satisfies the monotonicity.
Theorem 1.
For a fuzzy event A from the universe and the credibility measure of an RSTIT2-FV, Cr , we have
Cr { A } + Cr { A c } = 1 .
Proof. 
According to Definition 13, it can be deduced that
Cr { A } + Cr { A c } = 1 2 Pos { A } + Nec { A } + 1 2 Pos { A c } + Nec { A c } = 1 2 Pos { A } + Pos { A c } + 1 Pos { A c } + 1 Pos { A } = 1 .
Theorem 2.
Suppose that C and D are two fuzzy events satisfying C D , then for the credibility measure of the RSTIT2-FV, we have Cr { C } Cr { D } .
Proof. 
In light of Definition 13, it can be obtained that
Cr { C } = 1 2 Pos { C } + 1 Pos { C c } , Cr { D } = 1 2 Pos { D } + 1 Pos { D c } .
On the other hand, we have D c C c since C is a subset of D. Thus, we can further obtain
sup x D c μ η ( x ) sup x C c μ η ( x ) , sup x C μ η ( x ) sup x D μ η ( x ) .
Again, on the basis of Definition 13, we have
Pos { C } = sup x C μ η ( x ) Pos { D } = sup x D μ η ( x ) , Pos { D c } = sup x D c μ η ( x ) Pos { C c } = sup x C c μ η ( x ) .
Accordingly, it can be derived that
Cr { C } Cr { D }
in view of Equations (4) and (5). □
Based on Definition 13 and Theorems 1 and measure-mono, the possibility, necessity, and credibility measures of a specific fuzzy event S r for an RSTIT2-FV S can be calculated by
Pos { S r } = sup x r μ η ( x ) , Nec { S r } = 1 sup x > r μ η ( x ) , Cr { S r } = 1 2 sup x r μ η ( x ) + 1 sup x > r μ η ( x ) .
Next, we can define the credibility distribution of S as follows.
Definition 14.
Suppose that S is an RSTIT2-FV with a medium of η, then the credibility distribution Φ S of S is defined as Cr { S x } .
On the basis of Definition 13 and Equation (3), we can easily obtain that
Pos { S x } = 0 , x ( , c l U ] 1 2 1 l U x c l U l U , x ( c l U , c l L ] 1 2 1 l U x c l U l U + 1 2 1 l L x c l L l L , x ( c l L , c ] 1 , x ( c , + ) ,
and
Nec { S x } = 0 , x ( , c ] 1 + 1 2 1 l U x c + l U l U + 1 2 1 l L x c + l L l L , x ( c , c + l L ] 1 + 1 2 1 l U x c + l U l U , x ( c + l L , c + l U ] 1 , x ( c + l U , + ) .
Then by using Definition 14 and Equations (1) and (6), the credibility distribution Φ S can be easily calculated as
Φ S ( x ) = Cr { S x } = 0 , x ( , c l U ] 1 4 1 l U x c l U l U , x ( c l U , c l L ] 1 4 1 l U x c l U l U + 1 4 1 l L x c l L l L , x ( c l L , c + l L ] 1 + 1 4 1 l U x c + l U l U , x ( c + l L , c + l U ] 1 , x ( c + l U , + ) .
Figure 4 gives the visualization of Φ S . Obviously, Φ S is a continuous and strictly increasing function.
Definition 15.
Let S be an RSTIT2-FV, then its inverse credibility distribution is defined as the inverse function of Φ S (see Figure 5) and can be calculated by
Φ S 1 ( α ) = 4 l U α + c l U , α 0 , l U l L 4 l U 4 l U l L α 2 l U l L l U + l L + c , α l U l L 4 l U , 1 l U l L 4 l U 4 l U α + c 3 l U , α 1 l U l L 4 l U , 1 .
Remark 3.
According to the definition of the credibility distribution [45] and inverse credibility distribution [40] of the TI-FV, we have Φ η ( x ) = Φ S ( x ) and Φ η 1 ( α ) = Φ S 1 ( α ) , where Φ η and Φ η 1 are, respectively, the credibility distribution and inverse credibility distribution of the medium η.
Example 1.
Denote an RSTIT2-FV as S 1 = 1 4 7 3 4 5 , then according to Definition 11, we have l U = 3 and l L = 1 , and the UMF and LMF are, respectively,
UMF = 1 3 x 1 3 , x [ 1 , 4 ) 1 3 x + 7 3 , x [ 4 , 7 ) 0 , o t h e r w i s e , LMF = x 3 , x [ 3 , 4 ) x + 5 , x [ 4 , 5 ) 0 , o t h e r w i s e ,
Afterwards, based on Equation (3) in Definition 12, the MF of the medium η 1 for S 1 is
μ η 1 ( x ) = 1 6 x 1 6 , x [ 1 , 3 ) 2 3 x 5 3 , x [ 3 , 4 ) 2 3 x + 11 3 , x [ 4 , 5 ) 1 6 x + 7 6 , x [ 5 , 7 ] , 0 , o t h e r w i s e ,
Consequently, on the basis of Definition 14, the possibility of the fuzzy event S x is
Pos { S x } = 0 , x ( , 1 ] 1 6 x 1 6 , x ( 1 , 3 ] 2 3 x 5 3 , x ( 3 , 4 ] 1 , x ( 4 , + ) ,
and the necessity of it is
Nec { S x } = 0 , x ( , 4 ] 2 3 x 8 3 , x ( 4 , 5 ] 1 6 x 1 6 , x ( 5 , 7 ] 1 , x ( 7 , + ) .
Thus, following from Definition 13 and Equation (14), the credibility (credibility distribution) is
Φ S 1 ( x ) = Cr { S x } = 0 , x ( , 1 ) 1 12 x 1 12 , x [ 1 , 3 ) 1 3 x 5 6 , x [ 3 , 5 ) 1 12 x + 5 12 , x [ 5 , 7 ] 1 , x ( 7 , + ) .
Finally, with a view to Equation (9) in Definition 15, we have
Φ S 1 1 ( α ) = 12 α + 1 , α 0 , 1 6 3 α + 5 2 , α 1 6 , 5 6 12 α 5 , α 5 6 , 1 .
Example 2.
Given that S 2 = 0 4 8 2 4 6 is an RSTIT2-FV, then the MF of its medium η 2 , the credibility distribution and inverse credibility distribution are as follows,
μ η 2 ( x ) = 1 8 x , x [ 0 , 2 ) 3 8 x 1 2 , x [ 2 , 4 ) 1 4 x + 5 2 , x [ 4 , 6 ) 1 8 x + 1 , x [ 6 , 8 ] 0 , o t h e r w i s e , Φ S 2 ( x ) = 0 , x ( , 0 ) 1 16 x , x [ 0 , 2 ) 3 16 x 1 4 , x [ 2 , 6 ) 1 16 x + 1 2 , x [ 6 , 8 ] 1 , x ( 8 , + ) ,
Φ S 2 1 ( α ) = 16 α , α 0 , 1 8 16 3 α + 4 3 , α 1 8 , 7 8 16 α 8 , α 7 8 , 1 .
following from Equations (3), (8) and (9).
In the previous subsection, the credibility distribution and the inverse credibility distribution for a single RSTIT2-FV had been given. Now, we consider a situation where more than one RSTIT2-FV are involved in an arithmetic operation.
Definition 16.
Assume that S i , i = 1 , 2 , , n are RSTIT2-FVs with the mediums of η i , i = 1 , 2 , , n , respectively, and f is a function from R n to R , then the credibility distribution of S = f ( S 1 , S 2 , , S n ) , Φ S ( x ) = Cr { S x } is defined as
Φ S ( x ) = Φ η ( x ) ,
where η = f ( η 1 , η 2 , , η n ) is the medium of S. The inverse credibility distribution of S is the inverse function of Φ S , i.e., Φ S 1 .
Remark 4.
According to Definition 16, it can be easily deduced that Φ S 1 ( α ) = Φ η 1 ( α ) .

4. Operational Law

This section introduces the operational law for fuzzy arithmetic operations regarding RSTIT2-FVs, which can help efficiently calculate Φ S in Definition 16. As a prerequisite for its application, the definition of independence is introduced at first.

4.1. Independence

Although Liu and Liu [11] has given the definition of independence for T2-FVs based on the possibility measure, it is somewhat more complex and is not that practicable. Therefore, a new definition of independence based on the credibility measure and the concept of medium in Definition 13 is proposed in this section.
Definition 17.
The RSTIT2-FVs S i , i = 1 , 2 , , n . S i , i = 1 , 2 , , n are said to be mutually independent if
Cr { S i B i , i = 1 , 2 , , n } = min 1 i n Cr { S i B i }
for any subsets B 1 , B 2 , , B n .
Definition 18. (Liu and Gao [46]) Let η i , i = 1 , 2 , , n be n T1-FVs, they are said to be mutually independent if
Cr { η i B i , i = 1 , 2 , , n } = min 1 i n Cr { η i B i }
for any subsets B 1 , B 2 , , B n .
Remark 5.
Since the independence of the RSTIT2-FVs are derived from their credibility measures, and the credibility measure of the RSTIT2-FVs are based on their mediums, T1-FVs η i , i = 1 , 2 , , n , once RSTIT2-FVs S i , i = 1 , 2 , , n are mutually independent, it means that
Cr { η i B i , i = 1 , 2 , , n } = min 1 i n Cr { η i B i }
holds. Thus, according to Definition 18, the mediums η i , i = 1 , 2 , , n are also mutually independent.

4.2. Operational Law for Strictly Monotone Function of RSTIT2-FVs

Prior to the introduction of the operational law, the definition of the strictly monotone function is set forth.
Definition 19. (Zhou et al. [40]) A real-valued function f ( x 1 , x 2 , , x n ) is said to be strictly monotone if it is strictly increasing with respect to x 1 , x 2 , , x t and strictly decreasing with respect to x t + 1 , x t + 2 , , x n ; that is,
f ( x 1 , , x t , x t + 1 , , x n ) f ( y 1 , , y t , y t + 1 , , y n )
whenever x i y i for i = 1 , 2 , , t and x i y i for i = t + 1 , , n , and
f ( x 1 , , x t , x t + 1 , , x n ) < f ( y 1 , , y t , y t + 1 , , y n )
whenever x i < y i for i = 1 , 2 , , t and x i > y i for i = t + 1 , , n .
Theorem 3.
(Zhou et al. [40]) Let η i , i = 1 , 2 , , n be independent regular LR FVs with the credibility distributions of Φ η i , i = 1 , 2 , , n , respectively. If the function f ( x 1 , , x t , x t + 1 , , x n ) is strictly increasing with respect to x i , i = 1 , 2 , , t and strictly decreasing with respect to x i , i = t + 1 , t + 2 , , n , then the inverse credibility distribution of
η = f ( η 1 , , η t , η t + 1 , , η n ) ,
can be calculated by
Φ η 1 ( α ) = f Φ η 1 1 ( α ) , , Φ η t 1 ( α ) , Φ η t + 1 1 ( 1 α ) , , Φ η n 1 ( 1 α ) .
Theorem 4.
Suppose that S i , i = 1 , 2 , , n are mutually independent RSTIT2-FVs with the mediums of η i , i = 1 , 2 , , n , respectively. If the function f ( x 1 , , x t , x t + 1 , , x n ) is strictly increasing with respect to x i , i = 1 , 2 , , t and strictly decreasing with respect to x i , i = t + 1 , t + 2 , , n , then
S = f ( S 1 , , S t , S t + 1 , , S n ) ,
has the inverse credibility distribution of
Φ S 1 ( α ) = f Φ S 1 1 ( α ) , , Φ S t 1 ( α ) , Φ S t + 1 1 ( 1 α ) , , Φ S n 1 ( 1 α ) .
Proof. 
Since η i , i = 1 , 2 , , n are the mediums of the RSTIT2-FVs S i , i = 1 , 2 , , n , according to Definition 16, we have
Φ S i 1 ( α ) = Φ η i 1 ( α ) , i = 1 , 2 , , t , Φ S i 1 ( 1 α ) = Φ η i 1 ( 1 α ) , i = t + 1 , t + 2 , , n .
Let η = f ( η 1 , , η t , η t + 1 , , η n ) , then Definition 16, we have
Φ S 1 ( α ) = Φ η 1 ( α ) ,
By using Theorem 3, it can be deduced that
Φ η 1 ( α ) = f Φ η 1 1 ( α ) , , Φ η t 1 ( α ) , Φ η t + 1 1 ( 1 α ) , , Φ η n 1 ( 1 α ) ,
Accordingly, we can easily obtain that
Φ S 1 ( α ) = f Φ η 1 1 ( α ) , , Φ η t 1 ( α ) , Φ η t + 1 1 ( 1 α ) , , Φ η n 1 ( 1 α ) = f Φ S 1 1 ( α ) , , Φ S t 1 ( α ) , Φ S t + 1 1 ( 1 α ) , , Φ S n 1 ( 1 α ) .
In order to show the efficiency of our proposed operational law in calculating the inverse credibility distribution of the fuzzy arithmetic operations, we present three comparative examples, as follows.
Example 3.
Suppose that S 1 in Example 1 and S 2 in Example 2 are mutually independent RSTIT2-FVs, and f i ( S 1 , S 2 ) , i = 1 , 2 , 3 are three functions of them. Then the inverse credibility distributions of f i ( S 1 , S 2 ) can be given directly by Equation (12).
Case 1: Set f 1 ( S 1 , S 2 ) = S 1 + S 2 . It is obviously seen that f 1 is strictly increasing with respect to S 1 and S 2 . Hence, on the basis of Theorem 4 and Equations (10) and (11), we have
Φ f 1 1 ( α ) = ( 12 α + 1 ) + 16 α , α [ 0 , 1 / 8 ) ( 12 α + 1 ) + ( 16 / 3 α + 4 / 3 ) , α [ 1 / 8 , 1 / 6 ) ( 3 α + 5 / 2 ) + ( 16 / 3 α + 4 / 3 ) , α [ 1 / 6 , 5 / 6 ) ( 12 α 5 ) + ( 16 / 3 α + 4 / 3 ) , α [ 5 / 6 , 7 / 8 ) ( 12 α 5 ) + ( 16 α 8 ) , α [ 7 / 8 , 1 ] .
Figure 6 provides the graph of Φ f 1 1 ( α ) .
Case 2: Set f 2 ( S 1 , S 2 ) = S 1 S 2 . In this case, f 2 is strictly increasing with respect to S 1 , and strictly decreasingm with respect to S 2 . Following from Equation (11), we have
Φ S 2 1 ( 1 α ) = 8 16 α , α [ 0 , 1 / 8 ) ( 20 16 α ) / 3 , α [ 1 / 8 , 7 / 8 ) 16 ( 1 α ) , α [ 7 / 8 , 1 ] ,
Then, with a view to Theorem 4 and Equations (10) and (14), we can readily obtain that
Φ f 2 1 ( α ) = ( 12 α + 1 ) ( 8 16 α ) , α [ 0 , 1 / 8 ) ( 12 α + 1 ) ( 20 16 α ) / 3 , α [ 1 / 8 , 1 / 6 ) ( 3 α + 5 / 2 ) ( 20 16 α ) / 3 , α [ 1 / 6 , 5 / 6 ) ( 12 α 5 ) ( 20 16 α ) / 3 , α [ 5 / 6 , 7 / 8 ) ( 12 α 5 ) 16 ( 1 α ) , α [ 7 / 8 , 1 ] ,
which can be visualized in Figure 7.
Case 3: Set f 3 ( S 1 , S 2 ) = S 2 / S 1 . Similarly, f 3 is strictly increasing with respect to S 2 , and strictly decreasing with respect to S 1 . According to Equation (10)
Φ S 1 1 ( 1 α ) = 7 12 α , α [ 0 , 1 / 6 ) 11 / 2 3 α , α [ 1 / 6 , 5 / 6 ) 13 12 α , α [ 5 / 6 , 1 ] ,
Therefore, it can be obtained that
Φ f 3 1 ( α ) = 16 α 7 12 α , α [ 0 , 1 / 8 ) 16 α / 3 + 4 / 3 7 12 α , α [ 1 / 8 , 1 / 6 ) 16 α / 3 + 4 / 3 11 / 2 3 α , α [ 1 / 6 , 5 / 6 ) 16 α / 3 + 4 / 3 13 12 α , α [ 5 / 6 , 7 / 8 ) 16 α 8 13 12 α , α [ 7 / 8 , 1 ]
following from Theorem 4 and Equations (11) and (16), as shown in Figure 8.
Comparatively, if we calculate the inverse credibility function of S 1 + S 2 by means of Zadeh’s extension principle [1], we should first determine the turning points of the MF of the medium f i ( η 1 , η 2 ) for f i ( S 1 , S 2 ) by identifying the key values of μ η 1 ( x ) and μ η 2 ( x ) , and then calculate the MF μ f ( η 1 , η 2 ) ( x ) and credibility distribution Φ f i ( S 1 , S 2 ) ( x ) . Due to space limitations, the solution process is placed in Appendix A, from which we can see that the operational law proposed in this paper can simplify the fuzzy operations without computing the intermediate procedures and possess the correctness.

5. Expected Value

The expected value operator is a crucial numerical characteristic of fuzzy variables; however, to the best of our knowledge, there is not yet a clear expected value definition for the IT2-FVs in the existing literature. Therefore, we define the expected value of the IT2-FVs as well as their strictly monotone functions via the credibility distribution in this section.
Definition 20.
Suppose that S is an RSTIT2-FV or an FV derived from multiple RSTIT2-FVs operations, then the expected value of S can be defined as
E [ S ] = 0 + Cr { S x } d x 0 Cr { S x } d x .
Obviously, both integrals in Equation (18) are finite.
Theorem 5.
Given that S is an RSTIT2-FV or obtained from multiple RSTIT2-FVs operations, then its expected value can be simplified as the following form
E [ S ] = 0 1 Φ S 1 ( α ) d α .
Proof. 
In light of Definitions 5 and 20, we have
E [ S ] = 0 + Cr { S x } d x 0 Cr { S x } d x = 0 + 1 Φ S ( x ) d x 0 Φ S ( x ) d x = Φ S ( 0 ) 1 Φ S 1 ( α ) d α + 0 Φ S ( 0 ) Φ S 1 ( α ) d α = 0 1 Φ S 1 ( α ) d α .
Example 4.
By means of Theorem 5, the expected value of the RSTIT2-FV S 1 in Example 1 is
E [ S 1 ] = 0 1 / 6 ( 12 α + 1 ) d α + 1 / 6 5 / 6 3 α + 5 2 d α + 5 / 6 1 ( 12 α 5 ) d α = 4 .
Analogously, the excepted value of S 2 in Example 2 can be calculated as
E [ S 2 ] = 0 1 / 8 ( 16 α ) d α + 1 / 8 7 / 8 16 3 α + 4 3 d α + 7 / 8 1 ( 16 α 8 ) d α = 4 .
From Example 4, it can be observed that E [ S 1 ] = E [ S 2 ] = 4 . In fact, we can easily obtain that the expected value of an RSTIT2-FV S determined by the MF c l U c c + l U c l L c c + l L is constantly equal to the center value c, i.e.,
E [ S ] = 0 1 Φ S 1 ( α ) d α = c ,
where Φ S 1 ( α ) is the inverse credibility distribution of S, which can be calculated by Equation (9). The results show that the expected value operator we defined is an unbiased estimation.
Example 5.
Following from Theorem 5 and Equation (13), the expected values of f 1 = S 1 + S 2 in Example 3 can be calculated as
E [ f 1 ] = 0 1 Φ f 1 1 ( α ) d α = 0 1 / 8 ( 28 α + 1 ) d α + 1 / 8 1 / 6 1 3 ( 52 α + 7 ) d α + 1 / 6 5 / 6 1 6 ( 50 α + 23 ) d α + 5 / 6 7 / 8 1 3 ( 52 α 11 ) d α + 7 / 8 1 ( 28 α 13 ) d α = 8 .
In a similar way, we can get E [ f 2 ] = 0 and E [ f 3 ] = 1.3800 .
Theorem 6.
Let S be an RSTIT2-FV and k be a constant, then we have
E [ k S ] = k E [ S ] .
Proof. 
When k > 0 , it is easy to know from Definition 4 that the inverse credibility distribution of k S is k Φ S 1 ( α ) . Then, by using Theorem 5, it can be deduced that
E [ k S ] = 0 1 k Φ S 1 ( α ) d α = k 0 1 Φ S 1 ( α ) d α = k E [ S ] .
when k < 0 , the inverse credibility distribution of k S is k Φ S 1 ( 1 α ) , then we have
E [ k S ] = 0 1 k Φ S 1 ( 1 α ) d α = k 1 0 Φ S 1 ( t ) d t = k 0 1 Φ S 1 ( α ) d α = k E [ S ] .
Theorem 7.
Let S 1 and S 2 be two mutually independent RSTIT2-FVs, then the linearity of the expected value operator concerning the two RSTIT2-FVs can be expressed in the following form,
E k 1 S 1 + k 2 S 2 = k 1 E [ S 1 ] + k 2 E [ S 2 ] .
Proof. 
When k 1 > 0 and k 2 > 0 , ( k 1 S 1 + k 2 S 2 ) is strictly increasing monotone with respect to S 1 and S 2 and, thus, the inverse credibility distribution of ( k 1 S 1 + k 2 S 2 ) can be easily obtained as k 1 Φ S 1 1 ( α ) + k 2 Φ S 2 1 ( α ) in the views of Definition 4. Following that, and based on Theorems 5 and 6, we have
E k 1 S 1 + k 2 S 2 = 0 1 k 1 Φ S 1 1 ( α ) + k 2 Φ S 2 1 ( α ) d α = k 1 E S 1 + k 2 E S 2 .
when k 1 > 0 and k 2 < 0 , ( k 1 S 1 + k 2 S 2 ) is strictly increasing with respect to S 1 but strictly decreasing with respect to S 2 . It follows immediately from Theorems 5 and 6 that
E k 1 S 1 + k 2 S 2 = 0 1 k 1 Φ S 1 1 ( α ) + k 2 Φ S 2 1 ( 1 α ) d α = k 1 E S 1 + k 2 E S 2 .
In the other two cases (i.e., k 1 < 0 and k 2 > 0 , k 1 < 0 and k 2 < 0 ), it is easy to verify that Theorem 7 still holds. Due to space limitations, the details of the proofs are not provided in this paper. □
Remark 6.
Definition 7 can be extended to the general case as
E i = 1 n k i S i = i = 1 n k i E [ S i ] ,
where S 1 , S 2 , , S n are mutually independent RSTIT2-FVs and k 1 , k 2 , , k n are constants.
Theorem 7 and Remark 6 demonstrate that the introduced expected value operator is consistent with the property of linearity, which can help calculate the expected values of the functions of mutually independent RSTIT2-FVs without calculating the inverse credibility distribution of these RSTIT2-FVs.
Example 6.
On the basis of Theorem 7 and Example 4, the expected value of the RSTIT2-FV f 1 = S 1 + S 2 in Example 3 can be easily calculated by
E [ f 1 ] = E [ S 1 ] + E [ S 2 ] = 4 + 4 = 8 ,
which is equal to the result figured out by the integral form in Example 5.

6. Conclusions

In this paper, we defined a special kind of TIT2-FV based on the most typical and simplest symmetric triangular type-1 FV, and proposed a novel operational law to calculate the arithmetic operations for the strictly monotone functions of the mutually independent RSTIT2-FVs as well as the expected value operator via the inverse credibility distribution. The comparative results of the numerical examples verified that the operational law is conducive to simplify the calculation processes, and the expected value operator is an unbiased estimator possessing the property of linearity. Thus, it can be applied to many areas involving complex fuzzy operations.
It is noteworthy that the methodology presented in this paper are not confined to the symmetric and triangular types, but could also be extended to the asymmetric cases and many other types of type-2 fuzzy variables, such as trapezoidal and normal TIT2-FVs, and the regularity of the TIT2-FVs can be extended to more generalized cases, which would be analyzed in the near future. In other words, the proposed method is a universal methodology, providing new insight for future research of many scholars, in both theory and practice, regarding the type-2 fuzzy set theory.

Author Contributions

Conceptualization, J.C.; formal analysis, J.C.; investigation, H.L.; methodology, J.C. and H.L.; software, J.C.; supervision, H.L.; validation, H.L., J.C.; writing—original draft, H.L., J.C.; writing—review and editing, H.L. All authors have read and agreed to the published version of the manuscript.

Funding

This research is supported by the National Natural Science Foundation of China (grant no. 71872110).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Acknowledgments

The authors especially thank the editors and anonymous reviewers for their kind reviews and helpful comments. Any remaining errors are ours.

Conflicts of Interest

We declare that we have no relevant or material financial interests that relate to the research described in this paper. The manuscript has neither been published before, nor has it been submitted for consideration of publication in another journal.

Abbreviations

The following abbreviations are used in the manuscript:
IT2-FVinterval type-2 fuzzy variable
RSTIT2-FVregular symmetric triangular Interval type-2 fuzzy variable
T2-FStype-2 fuzzy set
MFmembership function
FVfuzzy variable
T2-FVtype-2 fuzzy variable
UMFupper membership function
LMFlower membership function
T1-FStype-1 fuzzy set
T1-FVtype-1 fuzzy variable
FOUfootprint of uncertainty

Appendix A

Example A1.
In views of Example 1, the key values of μ η 1 ( x ) for S 1 are, respectively, (1, 0), (3, 1/3), (4, 1), (5, 1/3) and (7, 0), as shown in Figure A1a. Similarly, those of μ η 2 ( x ) for S 2 are, respectively, (0, 0), (2, 1/4), (4, 1), (6, 1/4) and (8, 0), as Figure A1b shows.
According to Zadeh’s extension principle [1], the fuzzy operations of η 1 and η 2 can only be conducted when the MFs are not piecewise functions. That is, the MFs of the medium for the functions f i are piecewise functions which have turning points at μ η 1 + η 2 ( x ) = 0 , 1 / 4 , 1 / 3 and 1, respectively. In order to obtain these turning points, the x values for μ η 1 ( x ) = 1 / 4 and for μ η 2 ( x ) = 1 / 3 should be calculated (see Table A1). Hence, the key values of η 1 + η 2 can be deduced, as summarized in the last row of Table A1.
Subsequently, the MF of the medium η 1 + η 2 for S 1 + S 2 is (see Figure A2)
μ η 1 + η 2 ( x ) = x / 14 1 / 14 , x [ 1 , 9 / 2 ) 3 x / 26 7 / 26 , x [ 9 / 2 , 47 / 9 ) 6 x / 25 23 / 25 , x [ 47 / 9 , 8 ) 6 x / 25 + 73 / 25 , x [ 8 , 97 / 9 ] 3 x / 26 + 41 / 26 , x [ 97 / 9 , 23 / 2 ] 1 x / 14 + 15 / 14 , x [ 23 / 2 , 15 ] 0 , o t h e r w i s e ,
Accordingly, the credibility distribution can be obtained as
Φ f 1 ( x ) = x / 28 1 / 28 , x [ 1 , 9 / 2 ) 3 x / 52 7 / 52 , x [ 9 / 2 , 47 / 9 ) 3 x / 25 23 / 50 , x [ 47 / 9 , 97 / 9 ) 3 x / 52 + 11 / 52 , x [ 97 / 9 , 23 / 2 ) x / 28 + 13 / 28 , x [ 23 / 2 , 15 ] .
and the inverse credibility distribution is
Φ f 1 1 ( α ) = 28 α + 1 , α [ 0 , 1 / 8 ) 52 α / 3 + 7 / 3 , α [ 1 / 8 , 1 / 6 ) 25 α / 3 + 23 / 6 , α [ 1 / 6 , 5 / 6 ) 52 α / 3 11 / 3 , α [ 5 / 6 , 7 / 8 ) 28 α 13 , α [ 7 / 8 , 1 ] .
Analogously, on the basis of the x values for μ η 1 and μ η 2 at μ = 0 , 1 / 4 , 1 / 3 and 1, the key values of the mediums for S 1 S 2 can be derived, as shown in Table A2 and Figure A3.
Then, we have the MF of
μ η 1 η 2 ( x ) = x / 14 + 1 / 2 , x [ 7 , 7 / 2 ) 3 x / 26 + 17 / 26 , x [ 7 / 2 , 25 / 9 ) 6 x / 25 + 1 , x [ 25 / 9 , 0 ) 6 x / 25 + 1 , x [ 0 , 25 / 9 ] 3 x / 26 + 17 / 26 , x [ 25 / 9 , 7 / 2 ] x / 14 + 1 / 2 , x [ 7 / 2 , 7 ] , 0 , o t h e r w i s e ,
Then, the credibility distribution is
Φ f 2 ( x ) = x / 28 + 1 / 4 , x [ 7 , 7 / 2 ) 3 x / 52 + 17 / 52 , x [ 7 / 2 , 25 / 9 ) 3 x / 25 + 1 / 2 , x [ 25 / 9 , 25 / 9 ) 3 x / 52 + 35 / 52 , x [ 25 / 9 , 7 / 2 ] x / 28 + 3 / 4 , x [ 7 / 2 , 7 ]
and the inverse credibility distribution is
Φ f 2 1 ( α ) = 28 α 7 , α [ 0 , 1 / 8 ) 52 α / 3 17 / 3 , α [ 1 / 8 , 1 / 6 ) 25 α / 3 25 / 6 , α [ 1 / 6 , 5 / 6 ) 52 α / 3 35 / 3 , α [ 5 / 6 , 7 / 8 ) 28 α 21 , α [ 7 / 8 , 1 ] ,
which is identical with Equation (15).
Following from Table A1, the key values of the medium for f 3 = S 2 / S 1 are summarized in Table A3, and we can get the identical inverse credibility of Equation (17) for f 3 .
Figure A1. The MF of η 1 for S 1 (a) and η 2 for S 2 (b).
Figure A1. The MF of η 1 for S 1 (a) and η 2 for S 2 (b).
Symmetry 13 02196 g0a1
Table A1. The key values of the MFs of the mediums for S 1 , S 2 and S 1 + S 2 .
Table A1. The key values of the MFs of the mediums for S 1 , S 2 and S 1 + S 2 .
μ 01/41/311/31/40
x for μ η 1 15/234511/27
x for μ η 2 0220/9452/968
x for μ η 1 + η 2 19/247/9897/923/215
Figure A2. The MF of η 1 + η 2 .
Figure A2. The MF of η 1 + η 2 .
Symmetry 13 02196 g0a2
Table A2. The key values of the MFs of the mediums for S 1 , S 2 and S 1 S 2 .
Table A2. The key values of the MFs of the mediums for S 1 , S 2 and S 1 S 2 .
μ 01/41/311/31/40
x for μ η 1 15/234511/27
x for μ η 2 −8−6−52/9−4−20/9−20
x for μ η 2 η 2 −7−7/2−25/9025/97/27
Figure A3. The MF of η 1 η 2 .
Figure A3. The MF of η 1 η 2 .
Symmetry 13 02196 g0a3
Table A3. The key values of the MF of the medium for S 2 / S 1 .
Table A3. The key values of the MF of the medium for S 2 / S 1 .
μ 01/41/311/31/40
x for μ 1 η 1 1/72/111/51/41/32/51
x for μ η 2 0220/9452/968
x for μ η 2 / η 1 04/114/9152/2712/58

References

  1. Zadeh, L.A. Fuzzy sets. Inf. Control 1965, 8, 338–353. [Google Scholar] [CrossRef] [Green Version]
  2. Kwakernaak, H. Fuzzy random variables. Part I: Definitions and theorems. Inf. Sci. 1978, 19, 1–15. [Google Scholar] [CrossRef] [Green Version]
  3. Dubois, D.; Prade, H. Twofold fuzzy sets: An approach to the representation of sets with fuzzy boundaries based on possibility and necessity measures. J. Fuzzy Math. 1983, 3, 53–76. [Google Scholar]
  4. Liu, B. Toward fuzzy optimization without mathematical ambiguity. Fuzzy Optim. Decis. Mak. 2002, 1, 43–63. [Google Scholar] [CrossRef]
  5. Petchimuthu, S.; Garg, H.; Kamaci, H.; Atagun, A.O. The mean operators and generalized products of fuzzy soft matrices and their applications in MCGDM. Comput. Appl. Math. 2020, 39, 68. [Google Scholar] [CrossRef]
  6. Kamaci, H.; Petchimuthu, S.; Akcetin, E. Dynamic aggregation operators and Einstein operations based on interval-valued picture hesitant fuzzy information and their applications in multi-period decision making. Comput. Appl. Math. 2021, 40, 127. [Google Scholar] [CrossRef]
  7. Zadeh, L.A. The concept of a linguistic variable and its application to approximate reasoning—I. Inf. Sci. 1975, 8, 199–251. [Google Scholar] [CrossRef]
  8. Kundu, P.; Majumder, S.; Kar, S.; Maiti, M. A method to solve linear programming problem with interval type-2 fuzzy parameters. Fuzzy Optim. Decis. Mak. 2019, 18, 101–130. [Google Scholar] [CrossRef]
  9. Karnik, N.N.; Mendel, J.M. Centroid of a type-2 fuzzy set. Inform. Sci. 2001, 132, 195–220. [Google Scholar] [CrossRef]
  10. Coupland, S.; John, R. Geometric interval type-2 fuzzy systems. In Proceedings of the Joint 4th Conference of the European Society for Fuzzy Logic and Technology and the 11th Rencontres Francophones sur la Logique Floue et ses Applications, Barcelona, Spain, 7–9 September 2005; pp. 449–454. [Google Scholar]
  11. Liu, Z.; Liu, Y. Type-2 fuzzy variables and their arithmetic. Soft Comput. 2010, 14, 729–747. [Google Scholar] [CrossRef]
  12. Qin, R.; Liu, Y.; Liu, Z. Methods of critical value reduction for type-2 fuzzy variables and their applications. J. Comput. Appl. Math. 2011, 235, 1454–1481. [Google Scholar] [CrossRef]
  13. Roy, S.K.; Maiti, S.K. Reduction methods of type-2 fuzzy variables and their applications to Stackelberg game. Appl. Intell. 2020, 50, 1398–1415. [Google Scholar] [CrossRef]
  14. Liang, Q.; Karnik, N.N.; Mendel, J.M. Connection admission control in ATM networks using survey-based type-2 fuzzy logic systems. IEEE Trans. Fuzzy Syst. Man C. 2000, 30, 329–339. [Google Scholar]
  15. Liu, J.; Li, Y.; Huang, G.; Chen, L. A recourse-based type-2 fuzzy programming method for water pollution control under uncertainty. Symmetry 2017, 9, 265. [Google Scholar] [CrossRef] [Green Version]
  16. Wu, Y.; Xu, C.; Huang, Y.; Li, X. Green supplier selection of electric vehicle charging based on Choquet integral and type-2 fuzzy uncertainty. Soft Comput. 2020, 24, 3781–3795. [Google Scholar] [CrossRef]
  17. Karmakar, S.; Seikh, M.R.; Castillo, O. Type-2 intuitionistic fuzzy matrix games based on a new distance measure: Application to biogas-plant implementation problem. Appl. Soft Comput. 2021, 106, 107357. [Google Scholar] [CrossRef]
  18. Seikh, M.R.; Karmakar, S.; Castillo, O. A novel defuzzification approach of Type-2 fuzzy variable to solving matrix games: An application to plastic ban problem. Iran. J. Fuzzy Syst. 2021, 18, 155–172. [Google Scholar]
  19. Torshizi, A.D.; Zarandi, M.H.F.; Zakeri, H. On type-reduction of type-2 fuzzy sets: A review. Appl. Soft Comput. 2015, 27, 614–627. [Google Scholar] [CrossRef]
  20. Mittal, K.; Jain, A.; Vaisla, K.S.; Oscar Castillo, O.; Kacprzyk, J. A comprehensive review on type 2 fuzzy logic applications: Past, present and future. Eng. Appl. Artif. Intel. 2020, 95, 103916. [Google Scholar] [CrossRef]
  21. Shulla, A.K.; Banshal, S.K.; Seth, T.; Basu, A.; John, R.; Muhuri, P. A bibliometric overview of the field of type-2 fuzzy sets and systems. IEEE Comput. Intell. M. 2020, 15, 89–98. [Google Scholar]
  22. Mendel, J.M.; John, R.I.; Liu, F. Interval type-2 fuzzy logic systems made simple. IEEE Trans. Fuzzy Syst. 2006, 14, 808–821. [Google Scholar] [CrossRef] [Green Version]
  23. Celik, E.; Gul, M.; Aydin, N.; Gumus, A.T.; Guneri, A.F. A comprehensive review of multi criteria decision making approaches based on interval type-2 fuzzy sets. Knowl.-Based Syst. 2015, 85, 329–341. [Google Scholar] [CrossRef]
  24. Javanmard, M.; Nehi, H.M. Rankings and operations for interval type-2 fuzzy numbers: A review and some new methods. J. Appl. Math. Comput. 2019, 59, 597–630. [Google Scholar] [CrossRef]
  25. Hosseini-Pozveh, M.S.; Safayani, M.; Mirzaei, A. Interval type-2 fuzzy restricted boltzmann machine. IEEE Trans. Fuzzy Syst. 2021, 29, 1133–1142. [Google Scholar] [CrossRef]
  26. Sang, X.; Zhou, Y.; Yu, X. An uncertain possibility-probability information fusion method under interval type-2 fuzzy environment and its application in stock selection. Inf. Sci. 2019, 504, 546–560. [Google Scholar] [CrossRef]
  27. Wu, T.; Liu, X. A dynamic interval type-2 fuzzy customer segmentation model and its application in E-commerce. Appl. Soft Comput. 2020, 94, 106366. [Google Scholar] [CrossRef]
  28. Wu, T.; Liu, X.; Qin, J.; Herrera, F. An interval type-2 fuzzy Kano-prospect-TOPSIS based QFD model: Application to Chinese e-commerce service design. Appl. Soft Comput. 2021, 111, 107665. [Google Scholar] [CrossRef]
  29. Lee, L.W.; Chen, S.M. A new method for fuzzy multiple attributes group decision-making based on the arithmetic operations of interval type-2 fuzzy sets. In Proceedings of the Seventh International Conference on Machine Learning and Cybernetics, Kunming, China, 12–15 July 2008. [Google Scholar]
  30. Chen, S.M.; Lee, L.W. Fuzzy multiple attributes group decision-making based on the interval type-2 TOPSIS method. Expert Syst. Appl. 2010, 37, 2790–2798. [Google Scholar] [CrossRef]
  31. Kiraci, K.; Akan, E. A new type-2 fuzzy set of linguistic variables for the fuzzy analytic hierarchy process. Expert Syst. Appl. 2014, 41, 3297–3305. [Google Scholar]
  32. Kahraman, C.; Oztaysi, B.; Sari, I.U.; Turanoglu, E. Fuzzy analytic hierarchy process with interval type-2 fuzzy sets. Knowl.-Based Syst. 2014, 59, 48–57. [Google Scholar] [CrossRef]
  33. Toklu, M.C. Interval type-2 fuzzy TOPSIS method for calibration supplier selection problem: A case study in an automotive company. Arab. J. Geosci. 2014, 59, 11–13. [Google Scholar]
  34. Hesamian, G. Measuring Similarity and Ordering Based on Interval Type-2 Fuzzy Numbers. IEEE Trans. Fuzzy Syst. 2017, 25, 788–798. [Google Scholar] [CrossRef]
  35. Chutia, R. Ranking interval type-2 fuzzy number based on a novel value-ambiguity ranking index and its application in risk analysis. Soft Comput. 2021, 25, 8177–8196. [Google Scholar] [CrossRef]
  36. Kilic, M.; Kaya, I. Investment project evaluation by a decision making methodology based on type-2 fuzzy sets. Appl. Soft Comput. 2015, 25, 8177–8196. [Google Scholar]
  37. Gong, Y.; Dai, L.; Hu, N. Interval type-2 fuzzy information aggregation based on Einstein operators and its application to decision making. Int. J. Innov. Comput. I. 2016, 12, 2011–2026. [Google Scholar]
  38. Wang, H.; Ju, Y.; Liu, P.; Ju, D.; Liu, Z. Some trapezoidal interval type-2 fuzzy Heronian mean operators and their application in multiple attribute group decision making. J. Intell. Fuzzy Syst. 2018, 35, 2323–2337. [Google Scholar] [CrossRef]
  39. Aguero, J.R.; Vargas, A. Calculating functions of interval type-2 fuzzy numbers for fault current analysis. IEEE Trans. Fuzzy Syst. 2007, 15, 31–40. [Google Scholar] [CrossRef]
  40. Zhou, J.; Yang, F.; Wang, K. Fuzzy arithmetic on LR fuzzy numbers with applications to fuzzy programming. J. Intell. Fuzzy Syst. 2016, 30, 71–87. [Google Scholar] [CrossRef]
  41. Liu, B. Uncertainty Theory, 2nd ed.; Springer: Berlin/Heidelberg, Germany, 2007. [Google Scholar]
  42. Dubois, D.; Prade, P. Operations on fuzzy numbers. Int. J. Syst. Sci. 1978, 9, 613–626. [Google Scholar] [CrossRef]
  43. Mendel, J.M.; John, R.I. Type-2 fuzzy sets made simple. IEEE Trans. Fuzzy Syst. 2002, 10, 117–127. [Google Scholar] [CrossRef]
  44. Men, J.; Jiang, P.; Xu, H. A chance constrained programming approach for hazMat capacitated vehicle routing problem in Type-2 fuzzy environment. J. Clean. Prod. 2019, 237, 117754. [Google Scholar] [CrossRef]
  45. Liu, B. Theory and Practice of Uncertain Programming; Springer: Berlin/Heidelberg, Germany, 2002. [Google Scholar]
  46. Liu, Y.; Gao, J. The independence of fuzzy variables in credibility theory and its applications. Int. J. Uncertain. Fuzz. 2007, 15, 1–20. [Google Scholar] [CrossRef]
Figure 1. The solid visualization of an RSTIT2-FV.
Figure 1. The solid visualization of an RSTIT2-FV.
Symmetry 13 02196 g001
Figure 2. The plane visualization of an RSTIT2-FV.
Figure 2. The plane visualization of an RSTIT2-FV.
Symmetry 13 02196 g002
Figure 3. The visualization of the medium η .
Figure 3. The visualization of the medium η .
Symmetry 13 02196 g003
Figure 4. The credibility distribution of S, Φ S .
Figure 4. The credibility distribution of S, Φ S .
Symmetry 13 02196 g004
Figure 5. The inverse credibility distribution of S, Φ S 1 .
Figure 5. The inverse credibility distribution of S, Φ S 1 .
Symmetry 13 02196 g005
Figure 6. The inverse credibility function of f 1 ( S 1 , S 2 ) = S 1 + S 2 .
Figure 6. The inverse credibility function of f 1 ( S 1 , S 2 ) = S 1 + S 2 .
Symmetry 13 02196 g006
Figure 7. The inverse credibility function of f 2 ( S 1 , S 2 ) = S 1 S 2 .
Figure 7. The inverse credibility function of f 2 ( S 1 , S 2 ) = S 1 S 2 .
Symmetry 13 02196 g007
Figure 8. The inverse credibility function of f 3 ( S 1 , S 2 ) = S 2 / S 1 .
Figure 8. The inverse credibility function of f 3 ( S 1 , S 2 ) = S 2 / S 1 .
Symmetry 13 02196 g008
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Li, H.; Cai, J. Arithmetic Operations and Expected Values of Regular Interval Type-2 Fuzzy Variables. Symmetry 2021, 13, 2196. https://0-doi-org.brum.beds.ac.uk/10.3390/sym13112196

AMA Style

Li H, Cai J. Arithmetic Operations and Expected Values of Regular Interval Type-2 Fuzzy Variables. Symmetry. 2021; 13(11):2196. https://0-doi-org.brum.beds.ac.uk/10.3390/sym13112196

Chicago/Turabian Style

Li, Hui, and Junyang Cai. 2021. "Arithmetic Operations and Expected Values of Regular Interval Type-2 Fuzzy Variables" Symmetry 13, no. 11: 2196. https://0-doi-org.brum.beds.ac.uk/10.3390/sym13112196

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop