Research on adaptive deformable mirror technology for voice coil actuators(VCAs)is an important trend in the development of large ground-based telescopes.A voice coil adaptive deformable mirror contains a large number...Research on adaptive deformable mirror technology for voice coil actuators(VCAs)is an important trend in the development of large ground-based telescopes.A voice coil adaptive deformable mirror contains a large number of actuators,and there are problems with structural coupling and large temperature increases in their internal coils.Additionally,parameters of the traditional proportional integral derivative(PID)control cannot be adjusted in real-time to adapt to system changes.These problems can be addressed by introducing fuzzy control methods.A table lookup method is adopted to replace real-time calculations of the regular fuzzy controller during the control process,and a prototype platform has been established to verify the effectiveness and robustness of this process.Experimental tests compare the control performance of traditional and fuzzy proportional integral derivative(Fuzzy-PID)controllers,showing that,in system step response tests,the fuzzy control system reduces rise time by 20.25%,decreases overshoot by 78.24%,and shortens settling time by 67.59%.In disturbance rejection experiments,fuzzy control achieves a 46.09%reduction in the maximum deviation,indicating stronger robustness.The Fuzzy-PID controller,based on table lookup,outperforms the standard controller significantly,showing excellent potential for enhancing the dynamic performance and disturbance rejection capability of the voice coil motor actuator system.展开更多
In this article, we propose by using the Hausdorff distance Simpson’s rule for the triple integral of a fuzzy-valued function and the error bound of this method, one of the variables of which is fuzzy. In addition, t...In this article, we propose by using the Hausdorff distance Simpson’s rule for the triple integral of a fuzzy-valued function and the error bound of this method, one of the variables of which is fuzzy. In addition, thin δ-fine partitions are introduced. The integration domain is a quasi-fuzzy parallelipiped. A numerical example is presented in order to show the application and the significance of the method.展开更多
In this article, we use the Hausdorf distance to treat triple Simpson’s rule of the Henstock triple integral of a fuzzy valued function as well as the error bound of the method. We also introduce δ-fine subdivisions...In this article, we use the Hausdorf distance to treat triple Simpson’s rule of the Henstock triple integral of a fuzzy valued function as well as the error bound of the method. We also introduce δ-fine subdivisions for a Henstock triple integral and numerical example is presented in order to show the application and the consequence of the method.展开更多
In this manuscript,our goal is to introduce the notion of intuitionistic extended fuzzy b-metric-like spaces.We establish some fixed point theorems in this setting.Also,we plot some graphs of an example of obtained re...In this manuscript,our goal is to introduce the notion of intuitionistic extended fuzzy b-metric-like spaces.We establish some fixed point theorems in this setting.Also,we plot some graphs of an example of obtained result for better understanding.We use the concepts of continuous triangular norms and continuous triangular conorms in an intuitionistic fuzzy metric-like space.Triangular norms are used to generalize with the probability distribution of triangle inequality in metric space conditions.Triangular conorms are known as dual operations of triangular norms.The obtained results boost the approaches of existing ones in the literature and are supported by some examples and applications.展开更多
This work aimed to construct an epidemic model with fuzzy parameters.Since the classical epidemic model doesnot elaborate on the successful interaction of susceptible and infective people,the constructed fuzzy epidemi...This work aimed to construct an epidemic model with fuzzy parameters.Since the classical epidemic model doesnot elaborate on the successful interaction of susceptible and infective people,the constructed fuzzy epidemicmodel discusses the more detailed versions of the interactions between infective and susceptible people.Thenext-generation matrix approach is employed to find the reproduction number of a deterministic model.Thesensitivity analysis and local stability analysis of the systemare also provided.For solving the fuzzy epidemic model,a numerical scheme is constructed which consists of three time levels.The numerical scheme has an advantage overthe existing forward Euler scheme for determining the conditions of getting the positive solution.The establishedscheme also has an advantage over existing non-standard finite difference methods in terms of order of accuracy.The stability of the scheme for the considered fuzzy model is also provided.From the plotted results,it can beobserved that susceptible people decay by rising interaction parameters.展开更多
The main goal of informal computing is to overcome the limitations of hypersensitivity to defects and uncertainty while maintaining a balance between high accuracy,accessibility,and cost-effectiveness.This paper inves...The main goal of informal computing is to overcome the limitations of hypersensitivity to defects and uncertainty while maintaining a balance between high accuracy,accessibility,and cost-effectiveness.This paper investigates the potential applications of intuitionistic fuzzy sets(IFS)with rough sets in the context of sparse data.When it comes to capture uncertain information emanating fromboth upper and lower approximations,these intuitionistic fuzzy rough numbers(IFRNs)are superior to intuitionistic fuzzy sets and pythagorean fuzzy sets,respectively.We use rough sets in conjunction with IFSs to develop several fairly aggregation operators and analyze their underlying properties.We present numerous impartial laws that incorporate the idea of proportionate dispersion in order to ensure that the membership and non-membership activities of IFRNs are treated equally within these principles.These operations lead to the development of the intuitionistic fuzzy rough weighted fairly aggregation operator(IFRWFA)and intuitionistic fuzzy rough ordered weighted fairly aggregation operator(IFRFOWA).These operators successfully adjust to membership and non-membership categories with fairness and subtlety.We highlight the unique qualities of these suggested aggregation operators and investigate their use in the multiattribute decision-making field.We use the intuitionistic fuzzy rough environment’s architecture to create a novel strategy in situation involving several decision-makers and non-weighted data.Additionally,we developed a novel technique by combining the IFSs with quaternion numbers.We establish a unique connection between alternatives and qualities by using intuitionistic fuzzy quaternion numbers(IFQNs).With the help of this framework,we can simulate uncertainty in real-world situations and address a number of decision-making problems.Using the examples we have released,we offer a sophisticated and systematically constructed illustrative scenario that is intricately woven with the complexity ofmedical evaluation in order to thoroughly assess the relevance and efficacy of the suggested methodology.展开更多
Model checking is an automated formal verification method to verify whether epistemic multi-agent systems adhere to property specifications.Although there is an extensive literature on qualitative properties such as s...Model checking is an automated formal verification method to verify whether epistemic multi-agent systems adhere to property specifications.Although there is an extensive literature on qualitative properties such as safety and liveness,there is still a lack of quantitative and uncertain property verifications for these systems.In uncertain environments,agents must make judicious decisions based on subjective epistemic.To verify epistemic and measurable properties in multi-agent systems,this paper extends fuzzy computation tree logic by introducing epistemic modalities and proposing a new Fuzzy Computation Tree Logic of Knowledge(FCTLK).We represent fuzzy multi-agent systems as distributed knowledge bases with fuzzy epistemic interpreted systems.In addition,we provide a transformation algorithm from fuzzy epistemic interpreted systems to fuzzy Kripke structures,as well as transformation rules from FCTLK formulas to Fuzzy Computation Tree Logic(FCTL)formulas.Accordingly,we transform the FCTLK model checking problem into the FCTL model checking.This enables the verification of FCTLK formulas by using the fuzzy model checking algorithm of FCTL without additional computational overheads.Finally,we present correctness proofs and complexity analyses of the proposed algorithms.Additionally,we further illustrate the practical application of our approach through an example of a train control system.展开更多
The idea of linear Diophantine fuzzy set(LDFS)theory with its control parameters is a strong model for machine learning and optimization under uncertainty.The activity times in the critical path method(CPM)representat...The idea of linear Diophantine fuzzy set(LDFS)theory with its control parameters is a strong model for machine learning and optimization under uncertainty.The activity times in the critical path method(CPM)representation procedures approach are initially static,but in the Project Evaluation and Review Technique(PERT)approach,they are probabilistic.This study proposes a novel way of project review and assessment methodology for a project network in a linear Diophantine fuzzy(LDF)environment.The LDF expected task time,LDF variance,LDF critical path,and LDF total expected time for determining the project network are all computed using LDF numbers as the time of each activity in the project network.The primary premise of the LDF-PERT approach is to address ambiguities in project network activity timesmore simply than other approaches such as conventional PERT,Fuzzy PERT,and so on.The LDF-PERT is an efficient approach to analyzing symmetries in fuzzy control systems to seek an optimal decision.We also present a new approach for locating LDF-CPM in a project network with uncertain and erroneous activity timings.When the available resources and activity times are imprecise and unpredictable,this strategy can help decision-makers make better judgments in a project.A comparison analysis of the proposed technique with the existing techniques has also been discussed.The suggested techniques are demonstrated with two suitable numerical examples.展开更多
Let G be a locally compact Lie group and its Lie algebra. We consider a fuzzy analogue of G, denoted by called a fuzzy Lie group. Spherical functions on are constructed and a version of the existence result of the Hel...Let G be a locally compact Lie group and its Lie algebra. We consider a fuzzy analogue of G, denoted by called a fuzzy Lie group. Spherical functions on are constructed and a version of the existence result of the Helgason-spherical function on G is then established on .展开更多
The intuitive fuzzy set has found important application in decision-making and machine learning.To enrich and utilize the intuitive fuzzy set,this study designed and developed a deep neural network-based glaucoma eye ...The intuitive fuzzy set has found important application in decision-making and machine learning.To enrich and utilize the intuitive fuzzy set,this study designed and developed a deep neural network-based glaucoma eye detection using fuzzy difference equations in the domain where the retinal images converge.Retinal image detections are categorized as normal eye recognition,suspected glaucomatous eye recognition,and glaucomatous eye recognition.Fuzzy degrees associated with weighted values are calculated to determine the level of concentration between the fuzzy partition and the retinal images.The proposed model was used to diagnose glaucoma using retinal images and involved utilizing the Convolutional Neural Network(CNN)and deep learning to identify the fuzzy weighted regularization between images.This methodology was used to clarify the input images and make them adequate for the process of glaucoma detection.The objective of this study was to propose a novel approach to the early diagnosis of glaucoma using the Fuzzy Expert System(FES)and Fuzzy differential equation(FDE).The intensities of the different regions in the images and their respective peak levels were determined.Once the peak regions were identified,the recurrence relationships among those peaks were then measured.Image partitioning was done due to varying degrees of similar and dissimilar concentrations in the image.Similar and dissimilar concentration levels and spatial frequency generated a threshold image from the combined fuzzy matrix and FDE.This distinguished between a normal and abnormal eye condition,thus detecting patients with glaucomatous eyes.展开更多
The concepts of connectedness play a critical role in digital picture segmentation and analyses. However, the crisp nature of set theory imposes hard boundaries that restrict the extension of the underlying topologica...The concepts of connectedness play a critical role in digital picture segmentation and analyses. However, the crisp nature of set theory imposes hard boundaries that restrict the extension of the underlying topological notions and results. Whilst fuzzy set theory was introduced to address this inherent drawback, most human processes are not just fuzzy but also double-sided. Most phenomena will exhibit both a positive side and a negative side. Therefore, it is not enough to have a theory that addresses imprecision, uncertainty and ambiguity;rather, the theory must also be able to model polarity. Hence the study of bipolar fuzzy theory is of potential significance in an attempt to model real-life phenomena. This paper extends some concepts of fuzzy digital topology to bipolar fuzzy subsets including some important basic properties such as connectedness and surroundedness.展开更多
The presence of numerous uncertainties in hybrid decision information systems(HDISs)renders attribute reduction a formidable task.Currently available attribute reduction algorithms,including those based on Pawlak attr...The presence of numerous uncertainties in hybrid decision information systems(HDISs)renders attribute reduction a formidable task.Currently available attribute reduction algorithms,including those based on Pawlak attribute importance,Skowron discernibility matrix,and information entropy,struggle to effectively manages multiple uncertainties simultaneously in HDISs like the precise measurement of disparities between nominal attribute values,and attributes with fuzzy boundaries and abnormal values.In order to address the aforementioned issues,this paper delves into the study of attribute reduction withinHDISs.First of all,a novel metric based on the decision attribute is introduced to solve the problem of accurately measuring the differences between nominal attribute values.The newly introduced distance metric has been christened the supervised distance that can effectively quantify the differences between the nominal attribute values.Then,based on the newly developed metric,a novel fuzzy relationship is defined from the perspective of“feedback on parity of attribute values to attribute sets”.This new fuzzy relationship serves as a valuable tool in addressing the challenges posed by abnormal attribute values.Furthermore,leveraging the newly introduced fuzzy relationship,the fuzzy conditional information entropy is defined as a solution to the challenges posed by fuzzy attributes.It effectively quantifies the uncertainty associated with fuzzy attribute values,thereby providing a robust framework for handling fuzzy information in hybrid information systems.Finally,an algorithm for attribute reduction utilizing the fuzzy conditional information entropy is presented.The experimental results on 12 datasets show that the average reduction rate of our algorithm reaches 84.04%,and the classification accuracy is improved by 3.91%compared to the original dataset,and by an average of 11.25%compared to the other 9 state-of-the-art reduction algorithms.The comprehensive analysis of these research results clearly indicates that our algorithm is highly effective in managing the intricate uncertainties inherent in hybrid data.展开更多
A dissertation is a research report or scientific paper written by an author to obtain a certain degree. It reflects postgraduates’ research achievements and the educational quality of an institute, even a country. T...A dissertation is a research report or scientific paper written by an author to obtain a certain degree. It reflects postgraduates’ research achievements and the educational quality of an institute, even a country. To construct an optimized quality evaluation system for postgraduate dissertation (QESPD), we summarized the influencing factors and invited 10 experienced specialists to rate and prioritize them based on fuzzy analytic hierarchy process. Four primary indicators (innovation, integrity, scientificity and normativity) and 16 sub-indicators were selected to form the evaluation system. The order of primary indicators by weight, was innovation (0.4269), scientificity (0.2807), integrity (0.1728) and normativity (0.1196). The top five sub-dimensions were theoretical originality, scientific value, data reliability, design rationality and evidence credibility. To demonstrate the effectiveness of the proposed system, a case study was performed. In the case study, it was demonstrated that the established two-index-hierarchy QESPD in this study was a more scientific and reasonable evaluation system worthy of promotion and application.展开更多
Traditional wireless sensor networks(WSNs)are typically deployed in remote and hostile environments for information collection.The wireless communication methods adopted by sensor nodes may make the network highly vul...Traditional wireless sensor networks(WSNs)are typically deployed in remote and hostile environments for information collection.The wireless communication methods adopted by sensor nodes may make the network highly vulnerable to various attacks.Traditional encryption and authentication mechanisms cannot prevent attacks launched by internal malicious nodes.The trust-based security mechanism is usually adopted to solve this problem in WSNs.However,the behavioral evidence used for trust estimation presents some uncertainties due to the open wireless medium and the inexpensive sensor nodes.Moreover,how to efficiently collect behavioral evidences are rarely discussed.To address these issues,in this paper,we present a trust management mechanism based on fuzzy logic and a cloud model.First,a type-II fuzzy logic system is used to preprocess the behavioral evidences and alleviate uncertainty.Then,the cloud model is introduced to estimate the trust values for sensor nodes.Finally,a dynamic behavior monitoring protocol is proposed to provide a balance between energy conservation and safety assurance.Simulation results demonstrate that our trust management mechanism can effectively protect the network from internal malicious attacks while enhancing the energy efficiency of behavior monitoring.展开更多
To solve the problems of a few optical fibre line fault samples and the inefficiency of manual communication optical fibre fault diagnosis,this paper proposes a communication optical fibre fault diagnosis model based ...To solve the problems of a few optical fibre line fault samples and the inefficiency of manual communication optical fibre fault diagnosis,this paper proposes a communication optical fibre fault diagnosis model based on variational modal decomposition(VMD),fuzzy entropy(FE)and fuzzy clustering(FC).Firstly,based on the OTDR curve data collected in the field,VMD is used to extract the different modal components(IMF)of the original signal and calculate the fuzzy entropy(FE)values of different components to characterize the subtle differences between them.The fuzzy entropy of each curve is used as the feature vector,which in turn constructs the communication optical fibre feature vector matrix,and the fuzzy clustering algorithm is used to achieve fault diagnosis of faulty optical fibre.The VMD-FE combination can extract subtle differences in features,and the fuzzy clustering algorithm does not require sample training.The experimental results show that the model in this paper has high accuracy and is relevant to the maintenance of communication optical fibre when compared with existing feature extraction models and traditional machine learning models.展开更多
In this paper,we offer a review of type-3 fuzzy logic systems and their applications in control.The main objective of this work is to observe and analyze in detail the applications in the control area using type-3 fuz...In this paper,we offer a review of type-3 fuzzy logic systems and their applications in control.The main objective of this work is to observe and analyze in detail the applications in the control area using type-3 fuzzy logic systems.In this case,we review their most important applications in control and other related topics with type-3 fuzzy systems.Intelligent algorithms have been receiving increasing attention in control and for this reason a review in this area is important.This paper reviews the main applications that make use of Intelligent Computing methods.Specifically,type-3 fuzzy logic systems.The aim of this research is to be able to appreciate,in detail,the applications in control systems and to point out the scientific trends in the use of Intelligent Computing techniques.This is done with the construction and visualization of bibliometric networks,developed with VosViewer Software,which it is a free Java-based program,mainly intended to be used for analyzing and visualizing bibliometric networks.With this tool,we can create maps of publications,authors,or journals based on a co-citation network or construct maps of keywords,countries based on a co-occurrence networks,research groups,etc.展开更多
The optimization of the rule base of a fuzzy logic system (FLS) based on evolutionary algorithm has achievednotable results. However, due to the diversity of the deep structure in the hierarchical fuzzy system (HFS) a...The optimization of the rule base of a fuzzy logic system (FLS) based on evolutionary algorithm has achievednotable results. However, due to the diversity of the deep structure in the hierarchical fuzzy system (HFS) and thecorrelation of each sub fuzzy system, the uncertainty of the HFS’s deep structure increases. For the HFS, a largenumber of studies mainly use fixed structures, which cannot be selected automatically. To solve this problem, thispaper proposes a novel approach for constructing the incremental HFS. During system design, the deep structureand the rule base of the HFS are encoded separately. Subsequently, the deep structure is adaptively mutated basedon the fitness value, so as to realize the diversity of deep structures while ensuring reasonable competition amongthe structures. Finally, the differential evolution (DE) is used to optimize the deep structure of HFS and theparameters of antecedent and consequent simultaneously. The simulation results confirm the effectiveness of themodel. Specifically, the root mean square errors in the Laser dataset and Friedman dataset are 0.0395 and 0.0725,respectively with rule counts of rules is 8 and 12, respectively.When compared to alternative methods, the resultsindicate that the proposed method offers improvements in accuracy and rule counts.展开更多
The Kingdom of Saudi Arabia(KSA)has achieved significant milestones in cybersecurity.KSA has maintained solid regulatorymechanisms to prevent,trace,and punish offenders to protect the interests of both individual user...The Kingdom of Saudi Arabia(KSA)has achieved significant milestones in cybersecurity.KSA has maintained solid regulatorymechanisms to prevent,trace,and punish offenders to protect the interests of both individual users and organizations from the online threats of data poaching and pilferage.The widespread usage of Information Technology(IT)and IT Enable Services(ITES)reinforces securitymeasures.The constantly evolving cyber threats are a topic that is generating a lot of discussion.In this league,the present article enlists a broad perspective on how cybercrime is developing in KSA at present and also takes a look at some of the most significant attacks that have taken place in the region.The existing legislative framework and measures in the KSA are geared toward deterring criminal activity online.Different competency models have been devised to address the necessary cybercrime competencies in this context.The research specialists in this domain can benefit more by developing a master competency level for achieving optimum security.To address this research query,the present assessment uses the Fuzzy Decision-Making Trial and Evaluation Laboratory(Fuzzy-DMTAEL),Fuzzy Analytic Hierarchy Process(F.AHP),and Fuzzy TOPSIS methodology to achieve segment-wise competency development in cyber security policy.The similarities and differences between the three methods are also discussed.This cybersecurity analysis determined that the National Cyber Security Centre got the highest priority.The study concludes by perusing the challenges that still need to be examined and resolved in effectuating more credible and efficacious online security mechanisms to offer amoreempowered ITES-driven economy for SaudiArabia.Moreover,cybersecurity specialists and policymakers need to collate their efforts to protect the country’s digital assets in the era of overt and covert cyber warfare.展开更多
基金supported by the National Key R&D Program of China (2022YFA1603001,2021YFC2801402)the National Nature Science Foundation of China (12073053)the Science and Technology Plan of Inner Mongolia (2021GG0245).
文摘Research on adaptive deformable mirror technology for voice coil actuators(VCAs)is an important trend in the development of large ground-based telescopes.A voice coil adaptive deformable mirror contains a large number of actuators,and there are problems with structural coupling and large temperature increases in their internal coils.Additionally,parameters of the traditional proportional integral derivative(PID)control cannot be adjusted in real-time to adapt to system changes.These problems can be addressed by introducing fuzzy control methods.A table lookup method is adopted to replace real-time calculations of the regular fuzzy controller during the control process,and a prototype platform has been established to verify the effectiveness and robustness of this process.Experimental tests compare the control performance of traditional and fuzzy proportional integral derivative(Fuzzy-PID)controllers,showing that,in system step response tests,the fuzzy control system reduces rise time by 20.25%,decreases overshoot by 78.24%,and shortens settling time by 67.59%.In disturbance rejection experiments,fuzzy control achieves a 46.09%reduction in the maximum deviation,indicating stronger robustness.The Fuzzy-PID controller,based on table lookup,outperforms the standard controller significantly,showing excellent potential for enhancing the dynamic performance and disturbance rejection capability of the voice coil motor actuator system.
文摘In this article, we propose by using the Hausdorff distance Simpson’s rule for the triple integral of a fuzzy-valued function and the error bound of this method, one of the variables of which is fuzzy. In addition, thin δ-fine partitions are introduced. The integration domain is a quasi-fuzzy parallelipiped. A numerical example is presented in order to show the application and the significance of the method.
文摘In this article, we use the Hausdorf distance to treat triple Simpson’s rule of the Henstock triple integral of a fuzzy valued function as well as the error bound of the method. We also introduce δ-fine subdivisions for a Henstock triple integral and numerical example is presented in order to show the application and the consequence of the method.
文摘In this manuscript,our goal is to introduce the notion of intuitionistic extended fuzzy b-metric-like spaces.We establish some fixed point theorems in this setting.Also,we plot some graphs of an example of obtained result for better understanding.We use the concepts of continuous triangular norms and continuous triangular conorms in an intuitionistic fuzzy metric-like space.Triangular norms are used to generalize with the probability distribution of triangle inequality in metric space conditions.Triangular conorms are known as dual operations of triangular norms.The obtained results boost the approaches of existing ones in the literature and are supported by some examples and applications.
基金the support of Prince Sultan University for paying the article processing charges(APC)of this publication.
文摘This work aimed to construct an epidemic model with fuzzy parameters.Since the classical epidemic model doesnot elaborate on the successful interaction of susceptible and infective people,the constructed fuzzy epidemicmodel discusses the more detailed versions of the interactions between infective and susceptible people.Thenext-generation matrix approach is employed to find the reproduction number of a deterministic model.Thesensitivity analysis and local stability analysis of the systemare also provided.For solving the fuzzy epidemic model,a numerical scheme is constructed which consists of three time levels.The numerical scheme has an advantage overthe existing forward Euler scheme for determining the conditions of getting the positive solution.The establishedscheme also has an advantage over existing non-standard finite difference methods in terms of order of accuracy.The stability of the scheme for the considered fuzzy model is also provided.From the plotted results,it can beobserved that susceptible people decay by rising interaction parameters.
基金funded by King Khalid University through a large group research project under Grant Number R.G.P.2/449/44.
文摘The main goal of informal computing is to overcome the limitations of hypersensitivity to defects and uncertainty while maintaining a balance between high accuracy,accessibility,and cost-effectiveness.This paper investigates the potential applications of intuitionistic fuzzy sets(IFS)with rough sets in the context of sparse data.When it comes to capture uncertain information emanating fromboth upper and lower approximations,these intuitionistic fuzzy rough numbers(IFRNs)are superior to intuitionistic fuzzy sets and pythagorean fuzzy sets,respectively.We use rough sets in conjunction with IFSs to develop several fairly aggregation operators and analyze their underlying properties.We present numerous impartial laws that incorporate the idea of proportionate dispersion in order to ensure that the membership and non-membership activities of IFRNs are treated equally within these principles.These operations lead to the development of the intuitionistic fuzzy rough weighted fairly aggregation operator(IFRWFA)and intuitionistic fuzzy rough ordered weighted fairly aggregation operator(IFRFOWA).These operators successfully adjust to membership and non-membership categories with fairness and subtlety.We highlight the unique qualities of these suggested aggregation operators and investigate their use in the multiattribute decision-making field.We use the intuitionistic fuzzy rough environment’s architecture to create a novel strategy in situation involving several decision-makers and non-weighted data.Additionally,we developed a novel technique by combining the IFSs with quaternion numbers.We establish a unique connection between alternatives and qualities by using intuitionistic fuzzy quaternion numbers(IFQNs).With the help of this framework,we can simulate uncertainty in real-world situations and address a number of decision-making problems.Using the examples we have released,we offer a sophisticated and systematically constructed illustrative scenario that is intricately woven with the complexity ofmedical evaluation in order to thoroughly assess the relevance and efficacy of the suggested methodology.
基金The work is partially supported by Natural Science Foundation of Ningxia(Grant No.AAC03300)National Natural Science Foundation of China(Grant No.61962001)Graduate Innovation Project of North Minzu University(Grant No.YCX23152).
文摘Model checking is an automated formal verification method to verify whether epistemic multi-agent systems adhere to property specifications.Although there is an extensive literature on qualitative properties such as safety and liveness,there is still a lack of quantitative and uncertain property verifications for these systems.In uncertain environments,agents must make judicious decisions based on subjective epistemic.To verify epistemic and measurable properties in multi-agent systems,this paper extends fuzzy computation tree logic by introducing epistemic modalities and proposing a new Fuzzy Computation Tree Logic of Knowledge(FCTLK).We represent fuzzy multi-agent systems as distributed knowledge bases with fuzzy epistemic interpreted systems.In addition,we provide a transformation algorithm from fuzzy epistemic interpreted systems to fuzzy Kripke structures,as well as transformation rules from FCTLK formulas to Fuzzy Computation Tree Logic(FCTL)formulas.Accordingly,we transform the FCTLK model checking problem into the FCTL model checking.This enables the verification of FCTLK formulas by using the fuzzy model checking algorithm of FCTL without additional computational overheads.Finally,we present correctness proofs and complexity analyses of the proposed algorithms.Additionally,we further illustrate the practical application of our approach through an example of a train control system.
基金supported by the Deanship of Scientific Research,Vice Presidency for Graduate Studies and Scientific Research,King Faisal University,Saudi Arabia[Grant No.GRANT3862].
文摘The idea of linear Diophantine fuzzy set(LDFS)theory with its control parameters is a strong model for machine learning and optimization under uncertainty.The activity times in the critical path method(CPM)representation procedures approach are initially static,but in the Project Evaluation and Review Technique(PERT)approach,they are probabilistic.This study proposes a novel way of project review and assessment methodology for a project network in a linear Diophantine fuzzy(LDF)environment.The LDF expected task time,LDF variance,LDF critical path,and LDF total expected time for determining the project network are all computed using LDF numbers as the time of each activity in the project network.The primary premise of the LDF-PERT approach is to address ambiguities in project network activity timesmore simply than other approaches such as conventional PERT,Fuzzy PERT,and so on.The LDF-PERT is an efficient approach to analyzing symmetries in fuzzy control systems to seek an optimal decision.We also present a new approach for locating LDF-CPM in a project network with uncertain and erroneous activity timings.When the available resources and activity times are imprecise and unpredictable,this strategy can help decision-makers make better judgments in a project.A comparison analysis of the proposed technique with the existing techniques has also been discussed.The suggested techniques are demonstrated with two suitable numerical examples.
文摘Let G be a locally compact Lie group and its Lie algebra. We consider a fuzzy analogue of G, denoted by called a fuzzy Lie group. Spherical functions on are constructed and a version of the existence result of the Helgason-spherical function on G is then established on .
基金funding the publication of this research through the Researchers Supporting Program (RSPD2023R809),King Saud University,Riyadh,Saudi Arabia.
文摘The intuitive fuzzy set has found important application in decision-making and machine learning.To enrich and utilize the intuitive fuzzy set,this study designed and developed a deep neural network-based glaucoma eye detection using fuzzy difference equations in the domain where the retinal images converge.Retinal image detections are categorized as normal eye recognition,suspected glaucomatous eye recognition,and glaucomatous eye recognition.Fuzzy degrees associated with weighted values are calculated to determine the level of concentration between the fuzzy partition and the retinal images.The proposed model was used to diagnose glaucoma using retinal images and involved utilizing the Convolutional Neural Network(CNN)and deep learning to identify the fuzzy weighted regularization between images.This methodology was used to clarify the input images and make them adequate for the process of glaucoma detection.The objective of this study was to propose a novel approach to the early diagnosis of glaucoma using the Fuzzy Expert System(FES)and Fuzzy differential equation(FDE).The intensities of the different regions in the images and their respective peak levels were determined.Once the peak regions were identified,the recurrence relationships among those peaks were then measured.Image partitioning was done due to varying degrees of similar and dissimilar concentrations in the image.Similar and dissimilar concentration levels and spatial frequency generated a threshold image from the combined fuzzy matrix and FDE.This distinguished between a normal and abnormal eye condition,thus detecting patients with glaucomatous eyes.
文摘The concepts of connectedness play a critical role in digital picture segmentation and analyses. However, the crisp nature of set theory imposes hard boundaries that restrict the extension of the underlying topological notions and results. Whilst fuzzy set theory was introduced to address this inherent drawback, most human processes are not just fuzzy but also double-sided. Most phenomena will exhibit both a positive side and a negative side. Therefore, it is not enough to have a theory that addresses imprecision, uncertainty and ambiguity;rather, the theory must also be able to model polarity. Hence the study of bipolar fuzzy theory is of potential significance in an attempt to model real-life phenomena. This paper extends some concepts of fuzzy digital topology to bipolar fuzzy subsets including some important basic properties such as connectedness and surroundedness.
基金Anhui Province Natural Science Research Project of Colleges and Universities(2023AH040321)Excellent Scientific Research and Innovation Team of Anhui Colleges(2022AH010098).
文摘The presence of numerous uncertainties in hybrid decision information systems(HDISs)renders attribute reduction a formidable task.Currently available attribute reduction algorithms,including those based on Pawlak attribute importance,Skowron discernibility matrix,and information entropy,struggle to effectively manages multiple uncertainties simultaneously in HDISs like the precise measurement of disparities between nominal attribute values,and attributes with fuzzy boundaries and abnormal values.In order to address the aforementioned issues,this paper delves into the study of attribute reduction withinHDISs.First of all,a novel metric based on the decision attribute is introduced to solve the problem of accurately measuring the differences between nominal attribute values.The newly introduced distance metric has been christened the supervised distance that can effectively quantify the differences between the nominal attribute values.Then,based on the newly developed metric,a novel fuzzy relationship is defined from the perspective of“feedback on parity of attribute values to attribute sets”.This new fuzzy relationship serves as a valuable tool in addressing the challenges posed by abnormal attribute values.Furthermore,leveraging the newly introduced fuzzy relationship,the fuzzy conditional information entropy is defined as a solution to the challenges posed by fuzzy attributes.It effectively quantifies the uncertainty associated with fuzzy attribute values,thereby providing a robust framework for handling fuzzy information in hybrid information systems.Finally,an algorithm for attribute reduction utilizing the fuzzy conditional information entropy is presented.The experimental results on 12 datasets show that the average reduction rate of our algorithm reaches 84.04%,and the classification accuracy is improved by 3.91%compared to the original dataset,and by an average of 11.25%compared to the other 9 state-of-the-art reduction algorithms.The comprehensive analysis of these research results clearly indicates that our algorithm is highly effective in managing the intricate uncertainties inherent in hybrid data.
文摘A dissertation is a research report or scientific paper written by an author to obtain a certain degree. It reflects postgraduates’ research achievements and the educational quality of an institute, even a country. To construct an optimized quality evaluation system for postgraduate dissertation (QESPD), we summarized the influencing factors and invited 10 experienced specialists to rate and prioritize them based on fuzzy analytic hierarchy process. Four primary indicators (innovation, integrity, scientificity and normativity) and 16 sub-indicators were selected to form the evaluation system. The order of primary indicators by weight, was innovation (0.4269), scientificity (0.2807), integrity (0.1728) and normativity (0.1196). The top five sub-dimensions were theoretical originality, scientific value, data reliability, design rationality and evidence credibility. To demonstrate the effectiveness of the proposed system, a case study was performed. In the case study, it was demonstrated that the established two-index-hierarchy QESPD in this study was a more scientific and reasonable evaluation system worthy of promotion and application.
基金supported in part by the Chongqing Electronics Engineering Technology Research Center for Interactive Learningin part by the Chongqing key discipline of electronic informationin part by the Science and Technology Research Program of Chongqing Municipal Education Commission(KJQN202201630)。
文摘Traditional wireless sensor networks(WSNs)are typically deployed in remote and hostile environments for information collection.The wireless communication methods adopted by sensor nodes may make the network highly vulnerable to various attacks.Traditional encryption and authentication mechanisms cannot prevent attacks launched by internal malicious nodes.The trust-based security mechanism is usually adopted to solve this problem in WSNs.However,the behavioral evidence used for trust estimation presents some uncertainties due to the open wireless medium and the inexpensive sensor nodes.Moreover,how to efficiently collect behavioral evidences are rarely discussed.To address these issues,in this paper,we present a trust management mechanism based on fuzzy logic and a cloud model.First,a type-II fuzzy logic system is used to preprocess the behavioral evidences and alleviate uncertainty.Then,the cloud model is introduced to estimate the trust values for sensor nodes.Finally,a dynamic behavior monitoring protocol is proposed to provide a balance between energy conservation and safety assurance.Simulation results demonstrate that our trust management mechanism can effectively protect the network from internal malicious attacks while enhancing the energy efficiency of behavior monitoring.
基金This paper is supported by State Grid Gansu Electric Power Company Science and Technology Project(20220515003).
文摘To solve the problems of a few optical fibre line fault samples and the inefficiency of manual communication optical fibre fault diagnosis,this paper proposes a communication optical fibre fault diagnosis model based on variational modal decomposition(VMD),fuzzy entropy(FE)and fuzzy clustering(FC).Firstly,based on the OTDR curve data collected in the field,VMD is used to extract the different modal components(IMF)of the original signal and calculate the fuzzy entropy(FE)values of different components to characterize the subtle differences between them.The fuzzy entropy of each curve is used as the feature vector,which in turn constructs the communication optical fibre feature vector matrix,and the fuzzy clustering algorithm is used to achieve fault diagnosis of faulty optical fibre.The VMD-FE combination can extract subtle differences in features,and the fuzzy clustering algorithm does not require sample training.The experimental results show that the model in this paper has high accuracy and is relevant to the maintenance of communication optical fibre when compared with existing feature extraction models and traditional machine learning models.
文摘In this paper,we offer a review of type-3 fuzzy logic systems and their applications in control.The main objective of this work is to observe and analyze in detail the applications in the control area using type-3 fuzzy logic systems.In this case,we review their most important applications in control and other related topics with type-3 fuzzy systems.Intelligent algorithms have been receiving increasing attention in control and for this reason a review in this area is important.This paper reviews the main applications that make use of Intelligent Computing methods.Specifically,type-3 fuzzy logic systems.The aim of this research is to be able to appreciate,in detail,the applications in control systems and to point out the scientific trends in the use of Intelligent Computing techniques.This is done with the construction and visualization of bibliometric networks,developed with VosViewer Software,which it is a free Java-based program,mainly intended to be used for analyzing and visualizing bibliometric networks.With this tool,we can create maps of publications,authors,or journals based on a co-citation network or construct maps of keywords,countries based on a co-occurrence networks,research groups,etc.
基金the Sichuan Science and Technology Program(2021ZYD0016).
文摘The optimization of the rule base of a fuzzy logic system (FLS) based on evolutionary algorithm has achievednotable results. However, due to the diversity of the deep structure in the hierarchical fuzzy system (HFS) and thecorrelation of each sub fuzzy system, the uncertainty of the HFS’s deep structure increases. For the HFS, a largenumber of studies mainly use fixed structures, which cannot be selected automatically. To solve this problem, thispaper proposes a novel approach for constructing the incremental HFS. During system design, the deep structureand the rule base of the HFS are encoded separately. Subsequently, the deep structure is adaptively mutated basedon the fitness value, so as to realize the diversity of deep structures while ensuring reasonable competition amongthe structures. Finally, the differential evolution (DE) is used to optimize the deep structure of HFS and theparameters of antecedent and consequent simultaneously. The simulation results confirm the effectiveness of themodel. Specifically, the root mean square errors in the Laser dataset and Friedman dataset are 0.0395 and 0.0725,respectively with rule counts of rules is 8 and 12, respectively.When compared to alternative methods, the resultsindicate that the proposed method offers improvements in accuracy and rule counts.
文摘The Kingdom of Saudi Arabia(KSA)has achieved significant milestones in cybersecurity.KSA has maintained solid regulatorymechanisms to prevent,trace,and punish offenders to protect the interests of both individual users and organizations from the online threats of data poaching and pilferage.The widespread usage of Information Technology(IT)and IT Enable Services(ITES)reinforces securitymeasures.The constantly evolving cyber threats are a topic that is generating a lot of discussion.In this league,the present article enlists a broad perspective on how cybercrime is developing in KSA at present and also takes a look at some of the most significant attacks that have taken place in the region.The existing legislative framework and measures in the KSA are geared toward deterring criminal activity online.Different competency models have been devised to address the necessary cybercrime competencies in this context.The research specialists in this domain can benefit more by developing a master competency level for achieving optimum security.To address this research query,the present assessment uses the Fuzzy Decision-Making Trial and Evaluation Laboratory(Fuzzy-DMTAEL),Fuzzy Analytic Hierarchy Process(F.AHP),and Fuzzy TOPSIS methodology to achieve segment-wise competency development in cyber security policy.The similarities and differences between the three methods are also discussed.This cybersecurity analysis determined that the National Cyber Security Centre got the highest priority.The study concludes by perusing the challenges that still need to be examined and resolved in effectuating more credible and efficacious online security mechanisms to offer amoreempowered ITES-driven economy for SaudiArabia.Moreover,cybersecurity specialists and policymakers need to collate their efforts to protect the country’s digital assets in the era of overt and covert cyber warfare.