Next Article in Journal
On Sandwich-Type Results for a Subclass of Certain Univalent Functions Using a New Hadamard Product Operator
Next Article in Special Issue
Novel Aczel–Alsina Operators for Pythagorean Fuzzy Sets with Application in Multi-Attribute Decision Making
Previous Article in Journal
Some Rational Approximations and Bounds for Bateman’s G-Function
Previous Article in Special Issue
Spare Parts Transportation Optimization Considering Supportability Based on Uncertainty Theory
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Entropy and Semi-Entropies of Regular Symmetrical Triangular Interval Type-2 Fuzzy Variables

School of Management, Shanghai University, Shanghai 200444, China
*
Author to whom correspondence should be addressed.
Submission received: 18 March 2022 / Revised: 21 April 2022 / Accepted: 27 April 2022 / Published: 2 May 2022
(This article belongs to the Special Issue Fuzzy Set Theory and Uncertainty Theory)

Abstract

:
Fuzzy entropy has a wide range of applications in uncertainty problems. Due to the dual-complexity of its characteristics and calculation, the study on type-2 fuzzy entropy is rare, let alone the semi-ones. Given this, the paper takes the lead in proposing the credibility-based type-2 entropy and semi-entropies delivered around a specific symmetric type-2 fuzzy variable. After presenting the relevant theorems and definitions, we give the corresponding examples of linear entropy and semi-entropies to illustrate and verify the favorable property of our study. This series of formulas on type-2 entropy proposed has a strong advantage in reducing computational complexity. It can be commonly applied to measure fuzziness and solve return-oriented and cost-oriented problems in the business field. A sequence of measures on type-2 fuzzy entropy developed in this paper delivers fresh insights into this field. It also provides a new reasonable tool for the decision-making on cost and investment control in companies.

1. Introduction

In 1975, Zadeh [1] extended the fuzzy set theory to the type-2 fuzzy set theory, which means the problem appeared that the membership function of classical fuzzy sets can be fuzzified. Mendel et al. [2,3,4,5] broadened the theory of type-2 fuzzy sets, establishing a type-2 fuzzy logic system and the related uncertainty measures. Mendel [6] discovered that type-2 fuzzy set theory can be useful when such systems are used in situations where multi-uncertainties exist. Since type-2 fuzzy sets can predict uncertain information more accurately [7,8], they have been successfully applied in many fields, such as machine learning [9], image recognition [10] and network security [11].
Numerous statistical measures are utilized to characterize the relationships between fuzzy variables (e.g., expected value, variance) [12,13]. For example, Nieminen [14] gave a detailed description of the geometric structure of type-2 fuzzy sets. Wu [15] proposed various uncertainty measures for the interval type-2 fuzzy sets, including center of mass, cardinality, fuzziness, variance and skewness. Considering that information entropy can be used to measure the uncertainty degree of the system [16], Bolturk [17] proposed an interval-valued neutral hierarchical analysis based on the cosine similarity measures in a type-2 fuzzy setting. Moreover, Roy and Bhaumik [18] developed a triangular type-2 intuitionistic fuzzy matrix games approach used into water management. Fuzzy entropy can well weigh information and denote the uncertainty [19]. Apart from that, it can also be applied into the field of operation management, including the decisions about portfolio [20] and cost controlling [21]. As a result, among these fuzzy measures, fuzzy entropy has received attention and has been widely accepte [22].
This paper summarizes the related studies about type-2 fuzzy entropy and organized the main contents of Table 1, including the type of fuzzy variables and the formulas for calculating them. Obviously, from this table, we can see that all of the calculation formulas about type-2 fuzzy entropy in Table 1 involve complex calculation processes, implying that they might bring high calculation costs to obtain the final results [23]. Additionally, we can see that previous studies mostly focused on discrete fuzzy numbers, yet there are rarely studies about the continuous ones. While continuous fuzzy variables are more common, those such as triangles, trapezoids, and normal fuzzy sets all belong to continuous type [24]. Therefore, there is a necessity to study the continuous fuzzy entropy.
In this regard, we found that Zhou et al. [33] put forward a series of concepts about type-1 fuzzy entropy based on the credibility measurement. Because of the nature of credibility, this kind of calculation formula can make fuzzy entropy meet self-duality, and the results of type-1 fuzzy entropy can be acquired by the inverse credibility distribution (ICD) of fuzzy sets, which can reduce the calculation difficulty. Compared with other formulas, the entropy based on the credibility measurement has irreplaceable advantages in the generality of application.
Inspired by the type-1 entropy defined by Zhou et al. [33], this paper introduces the credibility-based fuzzy entropy and semi-entropy for the type-2 fuzzy sets for reducing the complexity of calculations. Due to their inherent complexity, this paper takes the study of Li and Cai [34] as an example to study a special type-2 fuzzy sets (RSTIT2-FV) and give a series of methods to calculate their fuzzy entropies. This paper further fills the current lack of the study on continuous type-2 fuzzy entropy and semi-entropies, facilitating the popularization of type-2 fuzzy entropy at the application level in the future.
The rest of this paper is as follows. Section 2 reviews several concepts related to the RTIT2-FVs. Subsequently, Section 3 introduces the definition of the credibility-based type-2 fuzzy entropy, and some related theorems are proved and followed by some examples. Moreover, the definitions of the lower and upper semi-entropies with some examples are presented to quantify the uncertainty on the only one side. Section 4 proposes the formula of calculating the entropy and semi-entropies of a linear function constructed by RSTIT2-FVs. Finally, the conclusions are drawn in Section 5.

2. Preliminaries

In the following, some necessary concepts and operational laws of fuzzy set theory that lay the foundation for the following sections are reviewed successively, and some concepts and theorems of type-2 fuzzy set, i.e., regular symmetric triangular interval type-2 fuzzy variable (RSTIT2-FV), are briefly introduced.

2.1. Type-1 Fuzzy Variable

Definition 1. 
(Zadeh [35]) A type-1 fuzzy set (T1-FS) B can be defined as
B = x X μ B ( x ) x ,
where μ B ( x ) is the real-valued membership function (MF), and X is the universe of x.
Definition 2. 
(Liu [36]) Given that Θ is a nonempty set, Γ ( Θ ) is the power set of Θ, Pos is a possibility measure, and R is a real number set. Let the triad Θ , Γ ( Θ ) , Pos be a possibility space, then the map η: Θ , Γ ( Θ ) , Pos R is called a type-1 fuzzy variable (T1-FV).
Definition 3. 
(Liu [36]) The credibility distribution (CD) Φ and credibility function (CF) v for a T1-FV η can be calculated by
Φ η ( x ) = Cr { η x } = 1 2 sup η x μ η ( x ) + 1 sup η > x μ η ( x ) , v ( x ) = Cr { δ = x }
where μ η ( x ) is the MF of η.
Definition 4. 
(Dubois and Prade [37]) A T1-FV η is called an LR-type FV if its shape function and scalers α > 0 , c > 0 satisfy
μ η ( x ) = L c x α , x ( , c ] R x c α , x [ c , + ) ,
where the shape function L (for left) and R (for right) are decreasing functions from R + [ 0 , 1 ] and satisfy L(0) = R(0) = 1 and L(1) = R(1) = 0.
Definition 5. 
(Zhou et al. [33]) A LR-type FV η, which has a continuous and strictly increasing credibility distribution Φ η , is called a regular LR-FV.
Definition 6. 
(Zhou et al. [33]) For a LR fuzzy number δ∼ ( σ , α , β ) L R with the MF μ in Equation (1), its credibility distribution (CD) can be worked out in view of Equation (3) as
Φ ( x ) = 1 2 L σ x α , i f   x σ 1 1 2 R x σ β , i f   x > σ .
Theorem 1. 
(Zhou et al. [38]) Let δ 1 , δ 2 , ⋯, δ n be independent regular LR fuzzy numbers, their CDs are, respectively, Φ 1 , Φ 2 , ⋯, Φ n . If f ( x 1 , x 2 , , x n ) is a strictly increasing function with regard to x 1 , x 2 , ⋯, x m and a strictly decreasing function with regard to x m + 1 , x m + 2 , ⋯, x n , then δ = f ( δ 1 , δ 2 , , δ n ) is a regular LR fuzzy number and has the inverse credibility distribution (ICD).
Φ 1 ( γ ) = f ( Φ 1 1 ( γ ) , , Φ m 1 ( γ ) , Φ m + 1 1 ( 1 γ ) , , Φ n 1 ( 1 γ ) ) .

2.2. Type-2 Fuzzy Variable

Definition 7. 
(Zadeh [35], De and Termini [39]) A type-2 fuzzy set (T2-FS), denoted as S and characterized by a type MF μ S ( x , u ) , can be expressed as
S = x X u J x μ S ( x , u ) ( x , u ) ,
where u J x [ 0 , 1 ] , x X is called the primary MF of x, μ S ( x , u ) is called the secondary MF of u.
Definition 8. 
(Mendel and John [3]) For any x X , let the primary membership function of a T2-FV, S, be J x [ 0 , 1 ] , the FOU of S is the union of all the primary membership functions and, thus, can be expressed as
F O U ( S ) = x X J x .
The upper and lower bounds of the FOU are called the upper membership function (UMF) and lower membership function (LMF) of S, respectively.
Definition 9. 
(Li and Cai [34]) An IT2-FV S is called a regular symmetric triangular IT2-FV (RSTIT2-FV) if its UMF and LMF in the following forms,
UMF = 1 l U x c l U l U , x [ c l U , c ) 1 l U x + c + l U l U , x [ c , c + l U ] 0 , o t h e r w i s e ,
and
LMF = 1 l L x c l L l L , x [ c l L , c ) 1 l L x + c + l L l L , x [ c , c + l L ] 0 , o t h e r w i s e ,
and can be denoted as c l U c c + l U c l L c c + l L , where the spreads of the UMF and LMF, l U and l L , satisfy l U > l L , and the peak of them, 1, are reached when x is equal to c.
Definition 10. 
(Li and Cai [34]) Let S be an RSTIT2-FV, η be a T1-FV, and their MFs satisfy
μ η ( x ) = 1 2 U M F + 1 2 L M F .
Then, η is called the medium of S, and the analytical expression of μ η ( x ) can be calculated as
μ η ( x ) = 1 2 1 l U x c l U l U , x [ c l U , c l L ) 1 2 1 l U x c l U l U + 1 2 1 l L x c l L l L , x [ c l L , c ) 1 2 1 l U x + c + l U l U + 1 2 1 l L x + c + l L l L , x [ c , c + l L ) 1 2 1 l U x + c + l U l U , x [ c + l L , c + l U ] 0 , o t h e r w i s e .
Definition 11. 
(Li and Cai [34]) By means of the medium η, the CD and ICD of an RSTIT2-FV can be defined as
Φ S ( x ) = Cr { S x } = 0 , x ( , c l U ] 1 4 1 l U x c l U l U , x ( c l U , c l L ] 1 4 1 l U x c l U l U + 1 4 1 l L x c l L l L , x ( c l L , c + l L ] 1 + 1 4 1 l U x c + l U l U , x ( c + l L , c + l U ] 1 , x ( c + l U , + ) ,
and
Φ S 1 ( α ) = 4 l U α + c l U , α 0 , l U l L 4 l U 4 l U l L α 2 l U l L l U + l L + c , α l U l L 4 l U , 1 l U l L 4 l U 4 l U α + c 3 l U , α 1 l U l L 4 l U , 1 .
Remark 1. 
Figure 1 gives the visualization of Φ S 1 . Obviously, Φ S 1 is a continuous and strictly increasing function.
Definition 12. 
(Li and Cai [34]) Assume that S i , i = 1 , 2 , , n , are RSTIT2-FVs with the mediums of η i , and f is a function from R n to R , then the credibility distribution of S = f ( S 1 , S 2 , , S n ) , Φ S ( x ) = Cr { S x } , is defined as
Φ S ( x ) = Φ η ( x ) ,
where η = f ( η 1 , η 2 , , η n ) is the medium of S, and the inverse credibility distribution of S is the inverse function of Φ S ( α ) , i.e., Φ S 1 ( α ) .
Remark 2. 
According to Definition 12, it can be easily deduced that
Φ S 1 ( α ) = Φ η 1 ( α ) .
Definition 13. 
(Li and Cai [34]) Let S be a linear function formed by multiple RSTIT2-FVs S i , i = 1 , 2 , , n , and S is a strictly increasing function with regard to S 1 , S 2 , , S t and a strictly decreasing function with regard to S t + 1 , S t + 2 , , S n . Then, its ICD can be defined as
Φ S 1 ( α ) = f Φ S 1 1 ( α ) , , Φ S t 1 ( α ) , Φ S t + 1 1 ( 1 α ) , , Φ S n 1 ( 1 α ) .
Definition 14. 
(Li and Cai [34]) Suppose that S is an RSTIT2-FV or a linear function derived from multiple RSTIT2-FVs, then the expected value of S can be defined as
E [ S ] = 0 + Cr { S x } d x 0 Cr { S x } d x = 0 1 Φ S 1 ( α ) d α = c .
Definition 15. 
(Li and Cai [34]) The RSTIT2-FVs S i , i = 1 , 2 , , n , are said to be mutually independent if
Cr { S i B i , i = 1 , 2 , , n } = min 1 i n Cr { S i B i }
for any subsets B 1 , B 2 , , B n .
Definition 16. 
(Li and Liu [40]) Let δ be a continuous fuzzy number with a credibility function (CF) v. Then, the entropy of δ can be defined as
H [ δ ] = + S v ( x ) d x ,
where the function S ( t ) = t ln t ( 1 t ) ln ( 1 t ) , as shown in Figure 2.
Definition 17. 
(Zhou et al. [33]) Given that δ is a continuous fuzzy number and its entropy exists, then the entropy is
H [ δ ] = + S ( Φ ( x ) ) d x ,
where Φ is the CD of δ.
Definition 18. 
(Zhou et al. [33]) Let δ be a regular LR fuzzy number. Then, the entropy of δ can be calculated as
H [ δ ] = 0 1 Φ 1 ( γ ) ln γ 1 γ d γ ,
where Φ 1 is the ICD of δ.
Definition 19. 
(Zhou et al. [33]) Suppose that δ 1 , δ 2 , , δ n are independent regular LR fuzzy numbers, and f ( x 1 , x 2 , . . . , x n ) = λ 1 x 1 + λ 2 x 2 + + λ n x n , where λ 1 , λ 2 , , λ n are real numbers, then the entropy of δ = f ( δ 1 , δ 2 , , δ n ) is
H [ δ ] = | λ 1 | H [ δ 1 ] + | λ 2 | H [ δ 2 ] + + | λ n | H [ δ n ] .
Definition 20. 
(Zhou et al. [33]) Let δ be a continuous fuzzy number with the expected value e and CF v. Then, its lower semi-entropy can be expressed as
H S [ δ ] = + S ( v ( x ) ) d x ,
where S ( t ) = t ln t ( 1 t ) ln ( 1 t ) , and
v ( x ) = v ( x ) , i f   x e 0 , i f   x > e .
Since S ( 0 ) = 0 , the lower semi-entropy of δ can be simplified as
H S [ δ ] = e S ( v ( x ) ) d x .
Similarly, the upper semi-entropy can be obtained following the above steps. Since S ( 0 ) = 0 , the upper semi-entropy of the fuzzy number δ can be simplified as the following specification
H S [ δ ] + = e + S ( v ( x ) ) d x .
Definition 21. 
(Zhou et al. [33]) Let δ be a regular LR fuzzy number with the ICD Φ 1 and expected value e. Then, the lower and upper semi-entropies of δ can be calculated as
H S [ δ ] = 0 Φ ( e ) ( Φ 1 γ ) e ln γ 1 γ d γ , i f   e 0 0 Φ ( e ) Φ 1 ( γ ) ln γ 1 γ d γ + e Φ ( e ) 1 ln γ 1 γ d γ , i f   e > 0 ,
H S [ δ ] + = e 0 Φ ( e ) ln γ 1 γ d γ + Φ ( e ) 1 Φ 1 ( γ ) ln γ 1 γ d γ , i f   e 0 Φ ( e ) 1 ( Φ 1 γ ) e ln γ 1 γ d γ , i f   e > 0 .

3. Entropy and Semi-Entropies of an RSTIT2-FV

By using the above-mentioned definitions and theorems, we can redefine and calculate the entropy and semi-entropies of an RSTIT2-FV via their ICD. To verify the performance of the proposed formulas, some examples are illustrated.

3.1. The Entropy of an RSTIT2-FV

Based on the entropy of a regular LR fuzzy number from Zhou et al. [33], the credibility-based type-2 entropy is defined in this paper as follows.
Theorem 2. 
Given that V is an RSTIT2-FV and its entropy exists, then the entropy is
H [ V ] = + S ( Φ V ( α ) ) d α ,
where Φ is the CD of V.
Proof of Theorem 2. 
Denote Φ V ( α ) and v ( α ) as the CD and CF of an RSTIT2-FV V, respectively. By virtue of Definitions 11 and 16, we have
H [ V ] = + S v ( α ) d α = c l U S v ( α ) d α + c l U c l L S v ( α ) d α + c l L c + l L S v ( α ) d x α + c + l L c + l U S v ( α ) d α + c + l U + S v ( α ) d α = + S ( Φ V ( α ) ) d α .
Theorem 3. 
Let V be an RSTIT2-FV. Then, the entropy of V can be calculated as
H [ V ] = 0 1 Φ V 1 ( α ) ln α 1 α d α ,
where Φ V 1 is the ICD of α.
Proof of Theorem 3. 
With a view to Definition 16 and Theorem 2, the entropy can be expressed as
H [ V ] = + S Φ V ( α ) d α = 0 0 Φ V ( α ) S ( α ) d α d α + 0 Φ V ( α ) 1 S ( α ) d α d α ,
where S ( α ) = α ln α ( 1 α ) ln ( 1 α ) = ln α 1 α . By using the Fubini theorem [41], we have
H [ V ] = 0 Φ V ( 0 ) Φ V 1 ( α ) 0 S ( α ) d α d α + Φ V ( 0 ) 1 0 Φ V 1 ( α ) S ( α ) d α d α = 0 1 Φ V 1 ( α ) S ( α ) d α = 0 1 Φ V 1 ( α ) ln α 1 α d α .
Theorem 4. 
Suppose that V is an RSTIT2-FV with the ICD Φ V 1 and medium of η, then its entropy is
H [ V ] = 0 1 Φ η 1 ( α ) ln α 1 α d α .
Proof of Theorem 4. 
According to Remark 2, we have Equation (17) immediately. □
Remark 3. 
According to Definition 11 and Theorem 4, the specific formula of the RSTIT2-FVs’ entropy is
H [ V ] = 0 l U l L 4 l U 4 l U α + c l U ln α 1 α d α + l U l L 4 l U 1 l U l L 4 l U 4 l U l L α l U + l L ln α 1 α d α + 1 l U l L 4 l U 1 4 l U α + c 3 l U ln α 1 α d α
Example 1. 
According to Theorem 3, if we denote an RSTIT2-FV as V 1 = 2 5 8 3 5 7 , then it follows Equation (18)
H [ V 1 ] = 0 1 12 ( 12 α + 2 ) ln α 1 α d α + 1 12 11 12 24 α 5 ln α 1 α d α + 11 12 1 ( 12 α 4 ) ln α 1 α d α = ln 144 · 11 5 8 121 + 297 · ln 11 40 8 · ln 12 + 3

3.2. The Semi-Entropies of an RSTIT2-FV

In the type-1 fuzzy set theory, the semi-entropies usually are used in controlling cost and investment risk, which can be regarded as an emerging and effective tool to manage the uncertainty of projected revenue for a company. In reality, these risks are difficult to accurately describe, so it is appropriate to catch these situations with fuzzy variables, and apply the semi-entropies to predict them.
In the light of the definitions proposed by Zhou et al. [33], we can also define the semi-entropies of an RSTIT2-FV via the CD and ICD.
Definition 22. 
Let V be an RSTIT2-FV with the ICD of Φ 1 , expected value of e and medium of η. Then, its credibility-based type-2 semi-entropies can be expressed as
H [ V ] = 0 Φ η ( e ) ( Φ η 1 α ) e ln α 1 α d α , i f   e 0 0 Φ η ( e ) Φ η 1 ( α ) ln α 1 α d α + e Φ η ( e ) 1 ln α 1 α d α , i f   e > 0 ,
H [ V ] + = e 0 Φ η ( e ) ln α 1 α d α + Φ η ( e ) 1 Φ η 1 ( α ) ln α 1 α d α , i f   e 0 Φ η ( e ) 1 ( Φ η 1 α ) e ln α 1 α d α , i f   e > 0 .
Remark 4. 
By using Definitions 11 and 22, we can easily obtain the lower and upper semi-entropies of an RSTIT2-FV as
H [ V ] = 0 l U l L 4 l U 4 l U α l U ln α 1 α d α + l U l L 4 l U 1 2 4 l U l L α 2 l U l L l U + l L ln α 1 α d α , i f   e 0 0 l U l L 4 l U 4 l U α + c l U ln α 1 α d α + c 1 2 1 ln α 1 α d α + l U l L 4 l U 1 2 4 l U l L α 2 l U l L l U + l L + c ln α 1 α d α , i f   e > 0 ,
H [ V ] + = c 0 1 2 ln α 1 α d α + 1 l U l L 4 l U 1 4 l U α + c 3 l U ln α 1 α d α + 1 2 1 l U l L 4 l U 4 l U l L α 2 l U l L l U + l L + c ln α 1 α d α , i f   e 0 1 2 1 l U l L 4 l U 4 l U l L α 2 l U l L l U + l L ln α 1 α d α + 1 l U l L 4 l U 1 4 l U α 3 l U ln α 1 α d α . i f   e > 0 ,
Corollary 1. 
Let V be an RSTIT2-FV. Then, we have
H [ V ] = H [ V ] + H [ V ] + .
Proof of Corollary 1. 
Following from Equations (19) and (20), we have
H [ V ] + H [ V ] + = 0 Φ η ( e ) Φ η 1 ( α ) ln α 1 α d α + e Φ η ( e ) 1 ln α 1 α d α + Φ η ( e ) 1 ( Φ η 1 ( α ) e ) ln α 1 α d α = Φ η ( e ) 1 Φ η 1 ( α ) ln α 1 α d α + 0 Φ η ( e ) Φ η 1 ( α ) ln α 1 α d α = 0 1 Φ η 1 ( α ) ln α 1 α d α
which is exactly equal to H ( V ) of Equation (17) in Theorem 4. □
Example 2. 
Assume that the deficit probability of a bank’s real estate investment project can be described as an RSTIT2-FV V 2 = 0 0.2 0.4 0.1 0.2 0.3 , its investment risk can be further accurately depicted by the lower semi-entropy proposed in this paper. In the light of Equations (6)–(8) and the MF of its medium η 2 , the CD and ICD of V 2 are as follows:
μ V 2 ( x ) = 5 2 x , x 0 , 1 10 15 2 x 1 2 , x 1 10 , 1 5 15 2 x + 5 2 , x 1 5 , 3 10 5 2 x + 3 4 , x 3 10 , 2 5 0 , o t h e r w i s e ,
Φ η 2 ( x ) = 0 , x , 0 5 4 x , x 0 , 1 10 15 4 x 1 4 , x 1 10 , 3 10 5 4 x + 1 2 , x 3 10 , 2 5 1 , x 2 5 , + ,
Φ η 2 1 ( α ) = 4 5 α , α 0 , 1 8 4 15 α + 2 15 , α 1 8 , 7 8 4 5 α 2 5 , α 7 8 , 1 .
Finally, the lower semi-entropy of the bank’s investment risk can be derived as
H [ V 2 ] = 0 1 8 ( 0.8 α ) ln α 1 α d α + 1 8 1 2 0.08 α 0.04 0.3 + 0.2 ln α 1 α d α + 0.2 1 2 1 ln α 1 α d α = ln 2 5 + ln 2 4 5 · 7 63 160 4 + ln 2 2 5 · 7 389 480 7 + 1 10 .
Similarly, the risk that costs go over budgets can be described as an RSTIT2-FV. By using the upper semi-entropy, we can give a measure in this kind of issues.
Example 3. 
Given that V 3 = 0.4 0.7 1 0.6 0.7 0.8 is an RSTIT2-FV, then the MF of its medium η 3 , the credibility distribution and inverse credibility distribution are as follows:
μ V 3 ( x ) = 5 3 x 2 3 , x 2 5 , 3 5 20 3 x 11 3 , x 3 5 , 7 10 20 3 x + 17 3 , x 7 10 , 4 5 5 3 x + 5 3 , x 4 5 , 1 0 , o t h e r w i s e ,
Φ η 3 ( x ) = 0 , x , 2 5 5 6 x 1 3 , x 2 5 , 3 5 10 3 x 11 6 , x 3 5 , 4 5 5 6 x + 1 6 , x 4 5 , 1 1 , x 1 , + ,
Φ η 3 1 ( α ) = 6 5 α + 2 5 , α 0 , 1 6 3 10 α + 11 20 , α 1 6 , 5 6 6 5 α 1 5 , α 5 6 , 1 .
Accordingly, the upper semi-entropy of the cost control risk can be shown as
H [ V 3 ] + = 1 2 5 6 0.12 α 0.06 0.4 ln α 1 α d α + 5 6 1 ( 1.2 α 0.9 ) ln α 1 α d α = ln 5 1 3 · 6 7 10 6 ln 5 48 + 3 20 .

4. Entropy and Semi-Entropies of Linear Function of RSTIT2-FVs

In order for verifying the desirable property of linearity in the credibility-based type-2 entropy, the formula for calculating the entropy and semi-entropies of a linear function constructed by the RSTIT2-FVs is considered in this section.

4.1. Entropy and Semi-Entropies of Linear Function of RSTIT2-FVs

Theorem 5. 
Suppose that V i , i = 1 , 2 , , n are mutually independent RSTIT2-FVs with the mediums of η i . If the function f ( x 1 , , x t , x t + 1 , , x n ) is strictly increasing with respect to x i , i = 1 , 2 , , t and strictly decreasing with respect to x i , i = t + 1 , t + 2 , , n , then
V = f ( V 1 , , V t , V t + 1 , , V n ) ,
has the ICD of
Φ V 1 ( α ) = f Φ V 1 1 ( α ) , , Φ V t 1 ( α ) , Φ V t + 1 1 ( 1 α ) , , Φ V n 1 ( 1 α )
Proof of Theorem 5. 
It follows from Theorem 1 immediately. □
Theorem 6. 
Suppose that V 1 , V 2 , , V n are independent RSTIT2-FVs, and f ( V 1 , V 2 , . . . , V n ) = λ 1 V 1 + λ 2 V 2 + + λ n V n , where λ 1 , λ 2 , , λ n are real numbers, then the entropy of V = f ( V 1 , V 2 , , V n ) is
H [ V ] = | λ 1 | H [ V 1 ] + | λ 2 | H [ V 2 ] + + | λ n | H [ V n ] .
Proof of Theorem 6. 
Suppose that the mediums of V i ( i = 1 , 2 , , n ) are, respectively, η i , and the function f ( x 1 , , x t , x t + 1 , , x n ) is strictly increasing with respect to x i , i = 1 , 2 , , t and strictly decreasing with respect to x i , i = t + 1 , t + 2 , , n ,
V = f ( V 1 , , V t , V t + 1 , , V n ) .
λ 1 , , λ t > 0 , and λ t + 1 , , λ n < 0 . Then, on the basis of Theorem 5, we have
Φ V 1 ( α ) = f Φ V 1 1 ( α ) , , Φ V t 1 ( α ) , Φ V t + 1 1 ( 1 α ) , , Φ V n 1 ( 1 α ) = Φ V 1 1 ( α ) + + Φ V t 1 ( α ) + Φ V t + 1 1 ( 1 α ) + + Φ V n 1 ( 1 α ) .
According to Theorem 6, it can be derived that
H [ f ( V 1 , V 2 , , V n ) ] = 0 1 ( λ 1 Φ V 1 1 ( α ) + + λ t Φ V t 1 ( α ) + λ t + 1 Φ V t + 1 1 ( 1 α ) + + λ n Φ V n 1 ( 1 α ) ) ln α 1 α d α = 0 1 ( λ 1 Φ η 1 1 ( α ) + + λ t Φ η t 1 ( α ) + λ t + 1 Φ η t + 1 1 ( 1 α ) + + λ n Φ η n 1 ( 1 α ) ) ln α 1 α d α = i = 1 t λ i 0 1 Φ η i 1 ( α ) ln α 1 α d α + i = t + 1 n λ i 0 1 Φ η i 1 ( 1 α ) ln α 1 α d α = i = 1 t λ i 0 1 Φ η i 1 ( α ) ln α 1 α d α i = t + 1 n λ i 0 1 Φ η i 1 ( α ) ln α 1 α d α = i = 1 t λ i H [ V i ] i = t + 1 n λ i H [ V i ] = i = 1 n | λ i | H [ V i ] .
Remark 5. 
Assume that V i , i = 1 , 2 , , n , are RSTIT2-FVs with the mediums of η i , and f is a function from R n to R , then the entropy of the linear function, V = f ( V 1 , V 2 , , V n ) satisfy
H ( V ) = H ( η ) ,
where η = f ( η 1 , η 2 , , η n ) is the medium of V.
Proof of Remark 5. 
It follows from Remark 2 and Theorem 3 immediately. □
Example 4. 
Given that V 4 = 0 2 4 1 2 3 and V 5 = 2 5 8 3 5 7 are two RSTIT2-FVs, then the entropy of H [ f ( V 4 , V 5 ) ] = 3 H [ V 4 ] 5 H [ V 5 ] is
H [ f ( V 4 , V 5 ) ] = 3 H [ V 4 ] 5 H [ V 5 ] = 3 0 1 8 ( 8 α ) ln α 1 α d α + 1 8 7 8 ( 8 α 3 ) ln α 1 α d α + 7 8 1 ( 8 α 4 ) ln α 1 α d α + 5 0 1 12 ( 12 α + 2 ) ln α 1 α d α + 1 12 11 12 ( 24 α 5 ) ln α 1 α d α + 11 12 1 ( 12 α 4 ) ln α 1 α d α = 3 · ln 343 · 7 15 16 4096 + 21 · ln 7 48 + 5 · ln 144 · 11 5 8 121 + 297 · ln 11 8 40 ln 12 + 21 .

4.2. The Semi-Entropies of a Linear Function of RSTIT2-FVs

Based on Theorem 5, we can obtain the semi-entropies of a linear function contributed by multiple RSTIT2-FVs. This paper provides two examples as follows.
Example 5. 
According to Remark 5, if we denote two RSTIT2-FVs as V 6 = 4 9 14 6 9 12 , V 7 = 0 3 6 1 3 5 and we have V 8 = V 6 V 7 , then it follows Equations (19), (20) and (24) that
Φ V 8 1 ( α ) = Φ V 6 1 ( α ) Φ V 7 1 ( 1 α ) = 8 α + 4 , α 0 , 1 8 8 3 α + 14 3 , α 1 8 , 7 8 8 α , α 7 8 , 1 .
H [ V 8 ] = 0 1 8 ( 8 α + 4 ) ln α 1 α d α + 1 8 1 2 ( 8 α 4 3 + 6 ) ln α 1 α d α + 6 1 2 1 ln α 1 α d α = ln 4096 · 7 29 48 117649 18 · ln 2 + 119 · ln 7 16 + 1 H [ V 8 ] + = 1 2 7 8 ( 8 α 4 3 ) ln α 1 α d α + 7 8 1 ( 8 α 6 ) ln α 1 α d α = ln 49 · 7 3 16 64 + 7 ln 7 48 + 1
Example 6. 
Similarly, if we denote three RSTIT2-FVs as V 9 = 0 2 4 1 2 3 , V 10 = 2 5 8 3 5 7 and V 11 = 0 3 6 1 3 5 , and assume that V 12 = V 9 + V 10 + V 11 , then it follows Equation (24) that
Φ V 12 1 ( α ) = Φ V 9 1 ( α ) + Φ V 10 1 ( α ) + Φ V 11 1 ( α ) = 32 α + 2 , α 0 , 3 32 160 13 α + 50 13 , α 3 32 , 29 32 32 α 14 , α 29 32 , 1 .
H [ V 12 ] = 0 2 32 ( 32 α + 5 ) ln α 1 α d α + 3 32 1 2 ( 160 α 80 13 + 6 ) ln α 1 α d α + 6 1 2 1 ln α 1 α d α = 39 ln 3 64 99 ln 2 + 1305 · ln 29 64 + ln 1.68 · 10 7 · 3 223 832 · 29 289 832 · 87 9 13 5.17 · 10 10 + 4 , H [ V 12 ] + 1 2 29 32 ( 160 α 80 13 ) ln α 1 α d α + 29 32 1 ( 32 α 24 ) ln α 1 α d α = ln 5 · 10 11 · 3 25 64 · 29 39 64 3.3 · 10 12 + ln 3 435 832 · 29 397 832 29 + 4
Compared with the previous study, in terms of calculating the type-2 semi-entropies, the formulas presented in this paper have an advantage in reducing computational complexity. This study makes it possible to evaluate the indicators that are formed by a set of RSTIT2-FVs in related areas, such as business investment and cost control. Theoretically, Remark 4 provided a way to help enterprises and other entities in operation management.

5. Conclusions

This paper proposed the concepts and formulas of the credibility-based type-2 fuzzy entropy and semi-entropies for the interval type-2 fuzzy variables, and we even explored these in a linear function. Based on the inverse credibility distribution, they can be efficiently figured out without complex calculations. Furthermore, this paper put forward that for independent type-2 fuzzy variables, the entropy and semi-entropies can be calculated even if the variable distribution formed by their linear combination is not known.
However, there are still certain limitations in this paper that can be explored in future studies. Firstly, it is worth noting that due to the complicated calculation of type-2 fuzzy variables and entropy, this paper only applied regular symmetric triangular interval type-2 fuzzy variables (RSTIT2-FVs) proposed by Li and Cai [34] to numerical verification, but the formulas can be extended to the general interval type-2 variable, which is about to be expanded in its application prospects and deepening theoretical research. Moreover, this paper only sets up several numerical experiments for possible application fields in real situations. The research on its application in this paper is still vacant, such as cost and risk control in operation management and the portfolio decisions in financial investment [42], the market share problem [43], and even the bio-gas implementation problem [44]. The above issues are waiting for more in-depth empirical research in future work.

Author Contributions

Conceptualization, M.Z. and Z.W.; methodology, M.Z.; software, M.Z.; validation, M.Z., Z.W.; formal analysis, Z.W.; investigation, Z.W.; resources, M.Z., Z.W.; data curation, Z.W.; writing—original draft preparation, Z.W.; writing—review and editing, Z.W.; visualization, Z.W.; supervision, Z.W., M.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Acknowledgments

The authors especially thank the editors and anonymous reviewers for their kind reviews and helpful comments.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in the manuscript:
CDcredibility distribution
CFcredibility function
FOUfootprint of uncertainty
FVfuzzy variable
ICDinverse credibility distribution
IT2-FVinterval type-2 fuzzy variable
LMFlower membership function
MFmembership function
T1-FVtype-1 fuzzy variable
T2-FVtype-2 fuzzy variable
RSTIT2-FVregular symmetric triangular Interval type-2 fuzzy variable
UMFupper membership function

References

  1. Zadeh, L.A. Concept of a linguistic variable and its application to approximate reasoning—I. Inf. Sci. 1975, 8, 199–249. [Google Scholar] [CrossRef]
  2. Liang, Q.; Mendel, J.M. Interval type-2 fuzzy logic systems: Theory and design. IEEE Trans. Fuzzy Syst. 2000, 8, 535–550. [Google Scholar] [CrossRef] [Green Version]
  3. Mendel, J.M.; John, R.I.B. Type-2 fuzzy sets made simple. IEEE Trans. Fuzzy Syst. 2002, 10, 117–127. [Google Scholar] [CrossRef]
  4. Mendel, J.M.; Jerry, M. General type-2 fuzzy logic systems made simple: A tutorial. IEEE Trans. Fuzzy Syst. 2014, 22, 1162–1182. [Google Scholar] [CrossRef]
  5. Zhai, D.; Mendel, J.M. Uncertainty measures for general type-2 fuzzy sets. Inf. Sci. 2011, 181, 503–518. [Google Scholar] [CrossRef]
  6. Mendel, J.M. Type-2 fuzzy sets: Some questions and answers. IEEE Connect. 2003, 1, 10–13. [Google Scholar]
  7. Zadeh, L.A. Fuzzy sets. Inf. Control 1965, 8, 338–353. [Google Scholar] [CrossRef] [Green Version]
  8. Gao, M.; Zhang, Q.; Zhao, G.; Wang, G. Mean-entropy-based shadowed sets: A novel three-way approximation of fuzzy sets. Int. J. Approx. Reason. 2020, 120, 102–124. [Google Scholar] [CrossRef]
  9. Hullermeier, E. Does machine learning need fuzzy logic? Fuzzy Set Syst. 2015, 25, 292–299. [Google Scholar] [CrossRef]
  10. Wang, G.; Jin, Y.; Liu, L. Logo recognition based on membership degree and clossness degree of fuzzy sets. Comput. Sci. 2009, 36, 184–193. [Google Scholar]
  11. Huang, W.; Chen, H. A network anomaly detection method incorporating domain knowledge. J. Nanjing Univ. Sci. Technol. 2016, 49, 229–235. [Google Scholar]
  12. Yager, R. A measurement-informational discussion of fuzzy union and fuzzy intersection. Int. J. Man–Mach. Stud. 2015, 84, 189–200. [Google Scholar] [CrossRef]
  13. Kaufmann, A. Introduction to the Theory of Fuzzy Sets, 2nd ed.; Academic Press: New York, NY, USA, 1975. [Google Scholar]
  14. Nieminen, J.M. On the algebraic structure of fuzzy sets of type-2. Kybernetica 1977, 13, 887–896. [Google Scholar]
  15. Wu, D.; Mendel, J.M. Fuzzy multiple attributes group decision-making based on the interval type-2 TOPSIS method. Inf. Sci. 2007, 117, 5378–5393. [Google Scholar] [CrossRef]
  16. Chen, X.; Dai, W. Maximum entropy principle for uncertain variables. Int. J. Fuzzy Syst. 2011, 13, 232–236. [Google Scholar]
  17. Bolturk, E.; Kahraman, C. A novel interval-valued neutrosophic AHP with cosine similarity measured. Soft Comput. 2018, 22, 4941–4958. [Google Scholar] [CrossRef]
  18. Roy, S.K.; Bhaumik, A. Intelligent water management: A triangular type-2 intuitionistic fuzzy matrix games approach. Soft Comput. 2018, 32, 949–968. [Google Scholar] [CrossRef]
  19. Jiang, Y.; Tang, Y.; Liu, H.; Chen, Z. Entropy on intuitionistic fuzzy soft sets and on interval-valued fuzzy soft sets. Inf. Sci. 2013, 240, 95–114. [Google Scholar] [CrossRef]
  20. Zhou, J.; Shen, J.; Zhao, Z.; Gu, Y.; Zhao, M. Performance of different risk indicators in a multi-period polynomial portfolio selection problem based on credibility measure. Entropy 2019, 21, 491. [Google Scholar] [CrossRef] [Green Version]
  21. Zhou, D.; Li, X.; Pedrycz, W.S. Mean-semi-entropy models of fuzzy portfolio selection. IEEE Trans. Fuzzy Syst. 2016, 24, 1627–1636. [Google Scholar] [CrossRef]
  22. Pelayo, Q.; Pedro, A.; Humberto, B.; Irene, D.; Susana, M. An entropy measure definition for finite interval-valued hesitant fuzzy sets. Knowl.-Based Syst. 2015, 84, 121–133. [Google Scholar]
  23. Shen, J.; Zhou, J. Calculation formulas and simulation algorithms for entropy of function of LR fuzzy intervals. Entropy 2019, 21, 289. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  24. Li, W.; Zhao, Y.; Wang, Q.; Zhou, J. Twenty years of entropy research: A bibliometric overview. Entropy 2019, 21, 694. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  25. Burillo, P.; Bustince, H. Entropy on intuitionistic fuzzy sets and on interval-valued fuzzy sets. Fuzzy Set Syst. 1996, 78, 305–316. [Google Scholar] [CrossRef]
  26. Szmidt, E.; Kacprzyk, J. Entropy for intuitionistic fuzzy sets. Fuzzy Set Syst. 2001, 118, 467–477. [Google Scholar] [CrossRef]
  27. Zeng, W.; Li, H. Relationship between similarity measure and entropy of interval valued fuzzy sets. Fuzzy Set Syst. 2006, 157, 1477–1484. [Google Scholar] [CrossRef]
  28. Vlachos, G.; Sergiadis, G. Submethood, entropy, and cardinality for interval-valued fuzzy sets—An algebraic derivation. Fuzzy Set Syst. 2007, 158, 1384–1396. [Google Scholar] [CrossRef]
  29. Cornelis, C.; Kerre, E. Inclusion measures in intuitionistic fuzzy set theory. Lect. Notes Comput. Sci. 2004, 2711, 345–356. [Google Scholar]
  30. Huang, C.; Miin, S.; Wen, L.; Stanley, L. Similarity, inclusion and entropy measures between type-2 fuzzy sets based on the Sugeno integral. Math. Comput. Model. 2011, 53, 1788–1797. [Google Scholar]
  31. Ozkan, I.; Turksen, I.B. Entropy assessment for type-2 fuzziness. IEEE Int. Conf. Fuzzy Syst. 2004, 2, 1111–1115. [Google Scholar]
  32. Zhang, X.; Zheng, G. Relationship between Similarity Measure and Entropy of Interval Type-2Fuzzy Sets. IEEE Circuits Syst. Soc. 2013, 15, 89–98. [Google Scholar]
  33. Zhou, J.; Huang, C.; Zhao, M.; Li, H. Entropy and semi-entropies of LR fuzzy numbers’ linear function with applications to fuzzy programming. Entropy 2019, 21, 697. [Google Scholar] [CrossRef] [Green Version]
  34. Li, H.; Cai, J. Arithmetic operations and expected value of regular interval type-2 fuzzy variables. Symmetry 2021, 13, 2196. [Google Scholar] [CrossRef]
  35. Zadeh, L.A. The concept of a linguistic variable and its application to approximate reasoning—II. Inf. Sci. 1975, 8, 301–357. [Google Scholar] [CrossRef]
  36. Liu, B.; Liu, Y. Expected value of fuzzy variable and fuzzy expected value model. IEEE Trans. Fuzzy Syst. 2002, 10, 445–450. [Google Scholar]
  37. Dubois, D.; Prade, H. Twofold fuzzy sets: An approach to the representation of sets with fuzzy boundaries based on possibility and necessity measures. J. Fuzzy Math. 1983, 3, 53–76. [Google Scholar]
  38. Zhou, J.; Yang, F.; Wang, K. Fuzzy arithmetic on LR fuzzy numbers with applications to fuzzy programming. J. Intell. Fuzzy Syst. 2016, 30, 71–87. [Google Scholar] [CrossRef]
  39. De, A.; Termini, S. A definition of no probabilistic entropy in the setting of fuzzy sets theory. Inform. Comput. 1972, 20, 301–312. [Google Scholar]
  40. Li, P.; Liu, B. Entropy of credibility distributions for fuzzy variables. IEEE Trans. Fuzzy Syst. 2008, 16, 123–129. [Google Scholar]
  41. Kim, D.S.; Kim, T.; Kwon, H.I.; Park, J.W. Two variable higher-order fubini polynomials. J. Korean Math. Soc. 2018, 55, 975–986. [Google Scholar] [CrossRef]
  42. Liang, Q.; Karnik, N.N.; Mendel, J.M. Connection admission control in ATM networks using survey-based type-2 fuzzy logic systems. IEEE Trans. Fuzzy Syst. Man. C 2000, 30, 329–339. [Google Scholar]
  43. Seikh, M.R.; Dutta, S.; Li, D.F. Solution of matrix games with rough interval pay-offs and its application in the telecom market share problem. Int. J. Intell. Syst. 2021, 36, 6066–6100. [Google Scholar] [CrossRef]
  44. Shuvasree, K.; Mijanur, R.S.; Oscar, C. Type-2 intuitionistic fuzzy matrix games based on a new distance measure: Application to biogas-plant implementation problem. Appl. Soft Comput. 2021, 106, 107357. [Google Scholar]
Figure 1. The inverse credibility distribution of S, Φ S 1 .
Figure 1. The inverse credibility distribution of S, Φ S 1 .
Symmetry 14 00930 g001
Figure 2. The function S ( t ) in Definition 16.
Figure 2. The function S ( t ) in Definition 16.
Symmetry 14 00930 g002
Table 1. The fuzzy-entropy measures for interval type-2 fuzzy variables (IT2-FVs).
Table 1. The fuzzy-entropy measures for interval type-2 fuzzy variables (IT2-FVs).
LiteratureType of
Fuzzy Variable
The Formula for Calculating Entropy
Burillo & Bustince [25]D. H ( A ˜ ) = i = 1 N μ ¯ A ˜ x i μ ̲ A ˜ x i
Szmidt & Kacprzyk [26]D. H ( A ˜ ) = 1 N i = 1 N 1 max 1 μ ¯ A ˜ x i , μ A ˜ x i 1 min 1 μ ¯ A ˜ x i , μ ̲ A ˜ x i
Zeng & Li [27]D. H ( A ˜ ) = 1 1 N i = 1 N μ ¯ A ˜ x i + μ ̲ A ˜ x i 1
Vlachos & Sergiadis [28]D. H ( A ˜ ) = p A ˜ A ˜ c p A ˜ A ˜ c
Cornelis & Kerre [29]D. H ( A ˜ ) = 2 N i = 1 N min μ ̲ A ˜ x i , 1 μ ¯ A ˜ ( x ) ,
2 N i = 1 N min 0.5 , 1 μ ̲ A ˜ x i , μ ¯ A ˜ ( x )
Hwang & Miin [30]D. H ( A ˜ ) = 1 n m i n x X u J x m i n f x ( u ) , 1 f x ( u ) u J x f x ( u ) ,
x X u J x m i n 1 f x ( u ) , f x ( u ) u J x 1 f x ( u )
Ozkan & Turksen [31]D. H ( x + Δ x ) = k = 1 n d
i = 1 n c μ i , k ( x + Δ x ) ln μ i , k ( x + Δ x )
Zhang & Zheng [32]C. H ( A ˜ ) = 1 b a a b min μ ¯ A ˜ ( x ) , 1 μ A ˜ ( x ) max μ ¯ A ˜ ( x ) , 1 μ A ˜ ( x ) d x
D. and C. are the abbreviations of discrete and continuous, respectively.
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Zhang, M.; Wang, Z. Entropy and Semi-Entropies of Regular Symmetrical Triangular Interval Type-2 Fuzzy Variables. Symmetry 2022, 14, 930. https://0-doi-org.brum.beds.ac.uk/10.3390/sym14050930

AMA Style

Zhang M, Wang Z. Entropy and Semi-Entropies of Regular Symmetrical Triangular Interval Type-2 Fuzzy Variables. Symmetry. 2022; 14(5):930. https://0-doi-org.brum.beds.ac.uk/10.3390/sym14050930

Chicago/Turabian Style

Zhang, Meixi, and Zhiyi Wang. 2022. "Entropy and Semi-Entropies of Regular Symmetrical Triangular Interval Type-2 Fuzzy Variables" Symmetry 14, no. 5: 930. https://0-doi-org.brum.beds.ac.uk/10.3390/sym14050930

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop