LINZ
2004
th
25 Linz Seminar on
Fuzzy Set Theory
Mathematics of
Fuzzy Systems
Bildungszentrum St. Magdalena, Linz, Austria
February 3 – 7, 2004
Abstracts
Erich Peter Klement, Endre Pap
Editors
LINZ 2004
—
M ATHEMATICS OF F UZZY S YSTEMS
A BSTRACTS
Erich Peter Klement, Endre Pap
Editors
Printed by: Universitätsdirektion, Johannes Kepler Universität, A-4040 Linz
2
Since their inception in 1979 the Linz Seminars on Fuzzy Set Theory have emphasized the development of mathematical aspects of fuzzy sets by bringing together researchers in fuzzy sets and established mathematicians whose work outside the fuzzy setting can provide direction for further research.
The seminar is deliberately kept small and intimate so that informal critical discussion remains central. There are no parallel sessions and during the week there are several round tables to discuss open
problems and promising directions for further work.
LINZ 2004 will be already the 25th seminar carrying on this tradition. It is therefore a good
opportunity to review the most important mathematical aspects of fuzzy systems. As usual, the aim
of the seminar is an intermediate and interactive exchange of surveys and recent results. We expect
that the presented talks will provide a comprehensive mathematical framework for the theory and
application of fuzzy systems.
Erich Peter Klement
Endre Pap
3
4
Program Committee
Endre Pap (Chairman), Novi Sad, Serbia and Montenegro
Ulrich Bodenhofer, Hagenberg, Austria
Dan Butnariu, Haifa, Israel
Didier Dubois, Toulouse, France
János C. Fodor, Budapest, Hungary
Lluis Godo, Barcelona, Spain
Siegfried Gottwald, Leipzig, Germany
Petr Hájek, Praha, Czech Republic
Ulrich Höhle, Wuppertal, Germany
Erich Peter Klement, Linz, Austria
Wesley Kotzé, Grahamstown, South Africa
Radko Mesiar, Bratislava, Slovak Republic
Daniele Mundici, Milano, Italy
Stephen E. Rodabaugh, Youngstown, OH, USA
Marc Roubens, Liège, Belgium
Lawrence N. Stout, Bloomington, IL, USA
Aldo Ventre, Napoli, Italy
Siegfried Weber, Mainz, Germany
Executive Committee
Erich Peter Klement
Ulrich Höhle
Stephen E. Rodabaugh
Siegfried Weber
Local Organizing Committee
Erich Peter Klement (Chairman), Fuzzy Logic Laboratorium Linz-Hagenberg
Ulrich Bodenhofer, Software Competence Center Hagenberg
Sabine Lumpi, Fuzzy Logic Laboratorium Linz-Hagenberg
Susanne Saminger, Fuzzy Logic Laboratorium Linz-Hagenberg
5
6
Contents
María Ángeles Gil
Fuzzy random variables: development and state of the art . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Joseph M. Barone
Fuzzy filter functors revisited: a 2-categorical overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Raymond Bisdorff
On a natural fuzzification of Boolean logic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Ulrich Bodenhofer, Bernard De Baets, János C. Fodor
A review of construction and representation results for fuzzy weak orders . . . . . . . . . . . . . . . . . . . . . . 27
Giulianella Coletti
A bridge between fuzzy set theory and coherent conditional probabilities (II) . . . . . . . . . . . . . . . . . . . 29
Bernard De Baets, Hans De Meyer
Stable commutative copulas in pairwise comparison models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Mustafa Demirci
Vague ordered fields: towards an axiomatic theory of vague real line . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Antonio Di Nola, Brunella Gerla
MV-algebras and semirings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
Didier Dubois, Henri Prade
On different ways of ordering conjoint evaluations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
Didier Dubois, Henri Prade, Philippe Smets
A definition of subjective possibility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Patrik Eklund, Werner Gähler
Partially ordered monads and powerset Kleene algebras . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Anna Frascella, Cosimo Guido
Structured lattices and ground categories of L-sets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
Siegfried Gottwald
Fuzzy relation equations and fuzzy control — some old and some new ideas . . . . . . . . . . . . . . . . . . . . 55
Michel Grabisch
Capacities on lattices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
7
Javier Gutiérrez García
Order-reversing involutions and residuated lattices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
Petr Hájek
Fuzzy predicate logic — a survey . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
Ulrich Höhle
Fuzzy sets and sheaves . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
Martin Kalina, Ol’ga Nánásiová
Joint distributions on MV-algebras as interactions of fuzzy events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
Frank Klawonn
The concept of independence in the context of similarity relations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
Erich Peter Klement, Radko Mesiar, Endre Pap
Triangular norms as special semigroups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
Anna Kolesárová
A characterization and composition of quasi-copulas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
Jari Kortelainen
Modifying L-sets: two views based on level-sets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
Volker Krätschmer
Integrals of random fuzzy sets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
Tomáš Kroupa
Copulas and characterization of T -product possibility measures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
Tomasz Kubiak
Semicontinuous L-real valued functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
Paavo Kukkurainen
Topological locally finite MV-algebra and the Riemann surface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110
Grigorii Litvinov
Dequantization of mathematics, idempotent semirings and fuzzy sets . . . . . . . . . . . . . . . . . . . . . . . . . 113
Koen Maes, Bernard De Baets
De Morgan triplets in the theory of fuzzified normal forms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
Jean-Luc Marichal
k-intolerant capacities and Choquet integrals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
8
Ricardo A. Marques Pereira, Silvia Bortot
Choquet measures, Shapley values, and inconsistent pairwise comparison matrices:
an extension of Saaty’s A.H.P. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130
Jorma K. Mattila
Construction of compositional modifiers generated by n-ary functions . . . . . . . . . . . . . . . . . . . . . . . . 136
Patrick Meyer, Marc Roubens
Ordinal sorting in the presence of interacting points of view: TOMASO . . . . . . . . . . . . . . . . . . . . . . . 144
Mirko Navara, Pavel Pták
Regular measures on tribes of fuzzy sets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153
Vilém Novák
The logic and algebra of fuzzy IF-THEN rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162
Irina Perfilieva
Solvability and approximate solvability of a system of fuzzy relation equations from
functional point of view . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164
Stephen E. Rodabough
Point-set lattice-theoretic (poslat) topology: a (partly) categorical perspective . . . . . . . . . . . . . . . . 181
Romano Scozzafava
A bridge between fuzzy set theory and coherent conditional probabilities (I) . . . . . . . . . . . . . . . . . . . 194
Mamoru Shimoda
Fuzzy group in a natural interpretation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199
Alexander Šostak
On many-valued topologies on L-powersets of many-valued sets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202
Lawrence Neff Stout
A categorical fabric for fuzzy predicate logic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206
Márta Takács
Residuum-based approximate reasoning with distance-based uninorms . . . . . . . . . . . . . . . . . . . . . . . 209
Peter Vojtáš
Fuzzy deductive and inductive systems with similarity based unification . . . . . . . . . . . . . . . . . . . . . . .213
9
10
Fuzzy random variables: development and state of the art
M ARÍA Á NGELES G IL
Departamento de Estadística e I.O. y D.M.
Universidad de Oviedo
33071 Oviedo, Spain
E-mail: ❛♥❣❡❧❡s❅♣✐♥♦♥✳❝❝✉✳✉♥✐♦✈✐✳❡s
1
Introduction
The concept of random variable is clearly fundamental to the fields of Probability and Statistics.
A random experiment is a process in which the result or outcome is not known with certainty
before the experiment is performed. A (classical) random variable is a measurable function defined
on the sample space of the random experiment which converts each particular experimental outcome
into a real or vectorial value. Measurability is supposed to guarantee that many useful probabilities
can be computed.
In addition to randomness, a certain imprecision can arise either in perceiving or reporting existing
real/vectorial values, or in identifying existing values which are essentially imprecise. Fuzzy random
variables have been introduced to model imprecisely-valued measurable functions where imprecision
is formalized in terms of fuzzy sets.
2
Fuzzy random variables as a model for fuzzy perceptions/observations
of existing real-valued random mechanisms
Kwakernaak (1978, 1979), and later Kruse and Meyer (1987) in a more elaborated way, introduced
fuzzy random variables as a model for the situations in which fuzzy imprecision arises either in the
perception or in the report of values of a real-valued random variable (referred to as the ‘original’).
Let Fc (R) denote the class of the normal convex fuzzy subsets of the Euclidean space R having
compact α-levels for α ∈ [0, 1], that is, the class of mappings U : R −→ [0, 1] such that Uα = {x ∈
R |U(x) ≥ α} if α ∈ (0, 1], = cl(suppU) if α = 0, are nonempty compact intervals. Then,
Definition 1. (Kruse and Meyer, 1987) Let (Ω, A , P) be a probability space. A fuzzy random
variable is a mapping X : Ω −→ Fc (R) such that for any
inf Xα :
α ∈ [0, 1] the real-valued mappings
Ω −→ R, sup Xα : Ω −→ R (with inf Xα (ω) = inf X (ω) α , sup Xα (ω) = sup X (ω) α , for all ω ∈ Ω)
are real-valued random variables (i.e., Borel-measurable real-valued functions).
In this approach when one refers to parameters associated with a fuzzy random variable, one
is considering either real/vectorial-valued parameters of the probability distribution of the original
random variable or fuzzy-valued parameters defined on the basis of Zadeh’s extension principle (see
11
Kruse and Meyer, 1987). Thus, if θ(X) is a parameter of a real-valued random variable X, and
E (Ω, A , P) is the class of possible originals of X , the associated fuzzy parameter of variable X corresponds to θ(X ) : R −→ [0, 1] such that
θ(X )(t) =
sup
inf X (ω) X(ω)
for all t ∈ R.
X∈E (Ω,A ,P), θ(X)=t ω∈Ω
In particular, when θ(X) = E(X|P) is the population expected valueof X, then the population
fuzzy expected value θ(X ) is the fuzzy set in Fc (R) such that θ(X ) α = E(inf Xα |P), E(sup Xα |P)
for all α ∈ [0, 1].
3
Fuzzy random variables as a model for existing fuzzy-valued random
mechanisms
A second approach to fuzzy random variables conceives them as a model for the situations in which
fuzzy imprecision arises in the definition of the values of the random mechanism or variable. More
precisely, a fuzzy random variable is intended to be a measurable function defined on the sample space
of the random experiment and converting each particular experimental outcome into a fuzzy subset of
a separable Banach space (often a Euclidean one).
Let (B, | · |) be a separable Banach space, and let F (B) = {U : B −→ [0, 1] |Uα ∈ K (B) for all α ∈
[0, 1]}, with Uα = {x ∈ B |U(x) ≥ α} for α ∈ (0, 1], = cl(suppU) if α = 0, and K (B) = {nonempty
bounded and closed subsets of B}. In other words, F (B) is the class of the normal upper semicontinuous [0, 1]-valued functions defined on B with bounded closure of the support.
Puri and Ralescu (1986) formalized fuzzy random variables (also called random fuzzy sets) as an
extension of random sets as follows:
Definition 2. (Puri and Ralescu, 1986) Let (Ω, A , P) be a probability space. A fuzzy random
variable is a mapping X : Ω −→
F (B) such that for any α ∈ [0, 1] the set-valued mapping Xα : Ω −→
K (B) (with Xα (ω) = X (ω) α for all ω ∈ Ω) is a compact random set, that is, it is Borel-measurable
with the Borel σ-field generated by the topology associated with the well-known Hausdorff metric on
K (B),
′
′
|k
−
k
|,
sup
inf
|k
−
k
|
.
dH (K, K ′ ) = max sup inf
′
′
k∈K k ∈K
k′ ∈K ′ k∈K
Recently (see Colubi et al., 2001, 2002), Definition 3.1 has been proven to be equivalent to the
one formalizing fuzzy random variables as F (B)-valued random elements (that is, Borel-measurable
F (B)-valued functions) when F (B) is equipped with the Skorohod metric
′
′
dS (U,U ) = inf max sup |λ(α) − α| , sup dH (Uα ,Uλ(α) ) ,
λ∈Λ
α
α
where Λ = {λ : [0, 1] −→ [0, 1] | strict increasing function with λ(0) = 0, λ(1) = 1} for U,U ′ ∈ F (B).
Furthermore (see also Colubi et al., 2001, 2002), the measurability condition in Definition 3.1 has
been proven to be equivalent to that (cf. Diamond and Kloeden, 1994) based on the dq metrics on
R
q 1/q
F (B) by Klement et al. (1986), for all q ∈ [1, ∞), where dq (U,U ′ ) = [0,1] dH (Uα ,Uα′ ) dα
.
On the other hand, Klement et al. (1986) have introduced fuzzy random variables as F (B)-valued
random elements when F (B) is equipped with the sup-metric, that is,
12
Definition 3. (Klement, Puri and Ralescu, 1986) Let (Ω, A , P) be a probability space. A fuzzy
random variable is a mapping X : Ω −→ F (B) which is Borel-measurable with the Borel σ-field
generated by the topology associated with the metric
d∞ (U,U ′ ) = sup dH (Uα ,Uα′ )
for all U,U ′ ∈ F (B).
α∈[0,1]
The connections between notions in Definitions 3.1 and 3.2 are the following ones (see Colubi et
al., 2001, 2002):
Proposition 4. If X : Ω −→ F (B) is Borel-measurable with the Borel σ-field generated by the topology associated with d∞ , then it is Borel-measurable with the Borel σ-field generated by the topology
associated with the dS .
However, the converse implication fails, since the requirements for fuzzy random variables in
Definition 3.2 are too rectrictive. An illustrative counterexample for this assertion can be found in
Colubi et al. (2002).
Moreover, when B = R and Im X ⊂ Fc (R), then Definitions 2.1 and 3.1 coincide (see, for instance,
Zhong and Zhou, 1987), although they represent models for different situations in practice.
In this second approach the parameters associated with a fuzzy random variable X are usually
defined on the basis of those
for the corresponding parameters for compact random sets. As an example, if E dH (X0 , {0}) P < ∞, then Puri and Ralescu (1986) have
defined the fuzzy expected value
of X as the unique fuzzy set E(X |P) ∈ F (B) such that E(X |P) α = Aumann’s integral of the com
pact random set Xα for all α ∈ [0, 1] (i.e., E(X |P) α = E(X|P) | X : Ω −→ B, X ∈ L1 (Ω, A , P),
X ∈ Xα a.s. [P] ).
It is convenient to remark that ranges of fuzzy random variables have been extended in some
studies to include unbounded values (see, for instance, Li and Ogura, 1999).
4
Some probabilistic and statistical studies concerning fuzzy random
variables
Since from a mathematical viewpoint Definition 3.1 includes 2.1 and 3.2 as special cases, from now
on we will assume fuzzy random variables we deal with are random elements in the Skorohod sense.
Metric properties of the space (F (B), dS ) indicate (Colubi et al., 2002) that it is complete and
separable. In this respect, it should be pointed out that (F (B), d∞ ) is complete but non-separable
(Puri and Ralescu, 1986, Klement et al., 1986), whence handling this space would be definitely more
complex than working with (F (B), dS ).
Fuzzy random variables can be characterized in general as certain limits of sequences of elementary types (more precisely, either simple or having simple α-levels) of these variables (see López-Díaz
and Gil, 1997, 1998a).
In the set-valued case, when we work in a statistical setting the choice of the Aumann expectation
(1965) of a compact random set among possible integrals (see, for instance, Molchanov, 1998), can
be justified by means of the Laws of Large Numbers for random sets (see Artstein and Vitale, 1975).
13
In an analogous way, Laws of Large Numbers (like those by Klement et al., 1986, Colubi et al., 1999,
Molchanov, 1999, Taylor et al., 2001, Krätschmer, 2002, Proske and Puri, 2003, and so on) justify the
choice of the fuzzy expected value in Puri and Ralescu’s sense.
Some other probabilistic results concerning differentiability (see, for instance, Puri and Ralescu,
1983, Román-Flores and Rojas Medar, 1998, Rodríguez-Muñiz et al., 2003), integrability (see, for
instance, Gong and Wu, 2002, Rodríguez-Muñiz and López-Díaz, 2003, Krätschmer, 2004), limit
theorems (cf. Taylor et al., 2001, Li et al., 2003), reversing the order of integration (see López-Díaz
and Gil, 1998b), fuzzy martingales (see, Stojaković, 1994, Li and Ogura, 2001, Terán, 2003), and so
on, can be found in the recent literature.
In which concern statistical developments involving fuzzy random variables, we can mention
on one hand decision problems including fuzzy-valued utilities or rewards (see Gil and López-Díaz,
1996, Kurano et al., 2002), regression analysis (see Näther and Körner, 2002, Wünsche and Näther,
2002) and, on the other hand, recent studies on inferential techniques on either real- or fuzzy-valued
parameters of a fuzzy random variable. As an example for the last one, we can mention inferences on
the fuzzy expected value of a fuzzy random variable (see Körner, 2000, Montenegro et al., 2003).
Acknowledgements
The research in this paper has been partially supported by MCYT Grant BFM2002-01057. The
financial support is gratefully acknowledged. The author is grateful to her colleagues Professors
Miguel López-Díaz, Ana Colubi and J. Santos Domínguez-Menchero, as well as to Professor Dan
A. Ralescu from the University of Cincinnati (Ohio), for the valuable studies they have developed in
connection with fuzzy random variables.
References
Artstein, Z. and Vitale, R.A. (1975). A strong law of large numbers for random compact sets. Ann. Probab. 3, 879–882.
Aumann, R.J. (1965). Integrals of set-valued functions. J. Math. Anal. Appl. 12, 1–12.
Colubi, A., Domínguez-Menchero, J.S., López-Díaz, M. and Ralescu, D.A. (2001). On the formalization of fuzzy random
variables. Inform. Sci 133, 3–6.
Colubi, A., Domínguez-Menchero, J.S., López-Díaz, M. and Ralescu, D.A. (2002). A DE [0, 1] representation of random
upper semicontinuous functions. Proc. Am. Math. Soc. 130, 3237–3242.
Colubi, A., López-Díaz, M., Domínguez-Menchero, J.S. and Ralescu, D.A. (1999). A generalized strong law of large
numbers. Probab. Theory Relat. Fields 114, 401–417.
Diamond, P. and Kloeden, P. (1994). Metric Spaces of Fuzzy Sets: Theory and Applications. World Scientific.
Gil, M.A. and López-Díaz, M. (1996). Fundamentals and Bayesian analyses of decision problems with fuzzy-valued utilities. Int. J. Appr. Reas. 15, 203–224.
Gong, Z. and Wu, C. (2002). Bounded variation, absolute continuity and absolute integrability for fuzzy-number-valued
functions. Fuzzy Sets and Systems 129, 83–94.
Klement, E.P., Puri, M.L. and Ralescu, D.A. (1986). Limit theorems for fuzzy random variables. Proc. Royal Soc. London
A 407, 171–182.
Körner, R. (2000). An asymptotic α-test for the expectation of random fuzzy variables. J. Stat. Plann. Infer. 83, 331–346.
Krätschmer, V. (2002). Limit Theorems for fuzzy-random-variables. Fuzzy Sets and Systems 126, 253–263.
Krätschmer, V. (2004). Integrals of random fuzzy sets. Proc. 25th Linz Sem. on Fuzzy Set Theory (This volume).
Kruse, R. and Meyer, K.D. (1987). Statistics with Vague Data. D. Reidel Pub. Co..
Kurano, M., Yasuda, M., Nakagami, J. and Yoshida, Y. (2002). Markov decision processes with fuzzy rewards. Proc. Int.
Conf. on Nonlinear Analysis and Convex Analysis (Hirosaki, Japan), 221–232.
14
Kwakernaak, H. (1978, 1979). Fuzzy random variables - I. Definitions and theorems; II. Algorithms and examples for the
discrete case. Inform. Sci. 15, 1–9; 17, 253–278.
Li, S. and Ogura, Y. (1999). Convergence of set-valued and fuzzy-valued martingales. Fuzzy Sets and Systems 101, 453–
461.
Li, S., Ogura, Y. and Nguyen, H.T. (2001). Gaussian processes and martingales for fuzzy valued random variables with
continuous parameter. Inform. Sci. 133, 7–21.
Li, S., Ogura, Y., Proske, F.N. and Puri, M.L. (2003). Central limit theorems for generalized set-valued random variables.
J. Math. Anal. Appl. 285, 250–263.
López-Díaz, M. and Gil, M.A. (1997). Constructive definitions of fuzzy random variables. Stat. Probab. Lett. 36, 135–143.
López-Díaz, M. and Gil, M.A. (1998a). Approximating integrably bounded fuzzy random variables in terms of the “generalized” Hausdorff metric. Inform. Sci. 104, 279–291.
López-Díaz, M. and Gil, M.A. (1998b). Reversing the order of integration in iterated expectations of fuzzy random variables,
and statistical applications. J. Stat. Plann. Infer. 74, 11–29.
Molchanov, I.S. (1998). Averaging of random sets and binary images. CWI Q. 11, 371–384.
Molchanov, I.S. (1999). On strong laws of large numbers for random upper semicontinuous functions. J. Math. Anal. Appl.
235, 349–355.
Montenegro, M., Colubi, A., Casals, M.R. and Gil, M.A. (2003). Asymptotic and bootstrap techniques for testing the
expected value of a fuzzy random variable. Metrika (in press).
Näther, W. and Körner, R. (2002). Linear regression with random fuzzy observations.In Statistical Modelling, Analysis and
Management of Fuzzy Data (C. Bertoluzza, M.A. Gil, D.A. Ralescu, eds.), Physica-Verlag, 282–305.
Proske, F.N. and Puri, M.L. (2003). A strong law of large numbers for generalized random sets from the viewpoint of
empirical processes. Proc. Amer. Math. Soc. 131, 2937–2944.
Puri, M.L. and Ralescu, D.A. (1986). Fuzzy random variables. J. Math. Anal. Appl. 114, 409–422.
Rodríguez-Muñiz, L.J. López-Díaz, M., Gil; M.A. and Ralescu, D.A. (2003). The s-differentiability of a fuzzy-valued
mapping. Inform. Sci. 151, 283–299.
Rodríguez-Muñiz, L.J. and López-Díaz, M. (2003). Hukuhara derivative of the fuzzy expected value. Fuzzy Sets and
Systems 138, 593–600.
Román-Flores, H. and Rojas-Medar, M. Differentiability of fuzzy-valued mappings. Rev. Mat. Estat. 16, 223–239.
Stojaković, M. (1994). Fuzzy random variables, expectation, and martingales. J. Math. Anal. Appl. 184, 594–606.
Taylor, R.L., Seymour, L. and Chen, Y. (2001). Weak laws of large numbers for fuzzy random sets. Nonlinear Analysis 47,
1245–1256.
Terán, P. (2004). Cones and decomposition of sub- and supermartingales. Fuzzy Sets and Systems (in press).
Wünsche, A. and Näther, W. (2002). Least-squares fuzzy regression with fuzzy random variables. Fuzzy Sets and Systems
130, 43–50.
Zhong, C. and Zhou, G. (1987). The equivalence of two definitions of fuzzy random variables. Proc. 2nd IFSA Congress
(Tokyo, Japan), 59–62.
15
Fuzzy filter functors revisited: a 2-categorical overview
J OSEPH M. BARONE
321 East 43rd Street
New York, NY 10017, USA
E-mail: s❡❝r❡t❛r②❅♥❛❢✐♣s✳♦r❣
It was noted in [1] that limits in 2-categories are not as easy to describe as limits in ordinary categories.
In particular, there is a class of (2-categorical) limits called weighted or indexed limits [2-4] which can
be defined as follows: take a 2-functor G: D −→ H, and define also a weight on D to be a 2-functor F:
D −→ CAT (the category of categories). If, following the notation of [4], we denote by [D, CAT] the
2-category whose objects are 2-functors from D to CAT, whose 1-cells are natural transformations,
and whose 2-cells are modifications, then the F-weighted limit of G: D −→ H is a representing object
for [D, CAT] (F, H(-, G)). A great advantage of a 2-categorical point-of-view and of the more general
versions of limits it allows is that paths are opened to simple algebraic constructions over categories
which may not be available if the scope is restricted to ordinary categories.
Eklund and Gahler [5] defined a fuzzy filter to be an element M of LLx s.t.
(1) M(α− ) = α (α is the constant mapping of X into L with value α)
(2) f, g in LX and f ≤ g imply M(f) ≤ M(g)
(3) ∀f, g in LX , M(f ∧ g) ≥ M(f) ∧ M(g)
where X is a set and M is a meet semilattice. They then define the covariant set functor FL related
to L, which they call the fuzzy filter functor, to be the functor which assigns each set X to the set of all
(L-) fuzzy filters on X. When L is {0, 1}, they call FL the proper filter functor. As noted in [1], they
show that the proper filter functor becomes a monad in certain cases, as does the fuzzy filter functor,
and they point out that Eilenberg-Moore objects can be defined for the proper filter functor as monad,
but they do not carry this further to FL as monad.
But, again as discussed in [1], a great deal more can be done. In fact, it is proved in [1] that the
fuzzy filter functor is (isomorphic to) a 2-functor FS : Dsimp −→ idl, where Dsimp is the category
with one object (*) whose morphisms (from * to *) comprise the simplicial category of finite ordinals
and order-preserving maps (see [2] or [4]) and idl is the 2-category whose 1-cells (morphisms) are
order-ideals (relations compatible with the orders on the domain and on the codomain) and whose
2-cells are inclusions. Given this, Eilenberg-Moore objects for the fuzzy filter functor emerge naturally as they do for any other 2-functor from Dsimp to any 2-category. Furthermore, it is known that
Eilenberg-Moore objects are constructible from products, inserters, and equifiers (see [4], p. 44).
Since Eilenberg-Moore objects are constructible from the fuzzy filter functor, it must be the case that
a relation exists between the fuzzy filter functor and the more elementary constructs products, inserters, and equifiers. This means that the fuzzy filter functor can be broken down into a set of simpler
functors (details and references may be found in [1]).
This paper carries these results and ideas a bit further. We describe, first of all, exactly what
these constructs (products, inserters, and equifiers) which underlie the fuzzy functor would look like.
Second, we show that certain already known properties of the fuzzy filter functor have very simple
16
2-categorical analogues. Thus, for instance, the fact the fuzzy filter monad is a submonad of the
crisp filter monad ([5], Prop. 7.14, p.135) has an interesting simple expression when expressed in
2-categorical terms. We also explore the implications of this 2-categorical view for fuzzy topology.
Perhaps most importantly, this paper takes a number of finite limit types, including products,
inserters, equifiers, inverters, and lax limits, and describes how requirements for their existence “constrain” the set (lattice, semilattice, ...) over which the fuzzy filters are taken and how they constrain
the nature of the fuzzy filters themselves. Consider, for instance, the inserter. If I is the inserter object
and A is any object, then for any pair of 1-cells a, b : A -> I, there must exist a 2-cell (the “inserted”
2-cell) θ : i • a => i • b (see, e.g., [4], p. 38). Now consider the enriched monad D of finitely generated up sets over Pos as described in [6] (see esp. p. 262). The internal hom-functor over its (strict)
algebras is given by the equalizer
Hom((B, ≤), (A, ≤)) = all order-preserving maps in AB ordered pointwise
which equalizes AB − > A(DB) and AB − > DA(DB) − > A(DB) . If we now “generalize” this equalizer to be an inserter, we must restrict further the set of maps in Hom((B, ≤), (A, ≤)) to ensure that
the inserted 2-cells actually exist. Such restrictions and conditions have interesting implications for
the nature of Eilenberg-Moore objects over fuzzy filters and for fuzzy topologies.
SOME USEFUL BACKGROUND
MONADS
Given a category C, a monad consists of an endofunctor T along with two natural transformations
η: idC −→ T and µ : T2 −→ T s.t. µ(A) • Tη(A) = idTA = µ(A) • η(TA) and µ(A) • Tµ(A) =
µ(A) • µ(TA). In a 2-category C, a monad may be defined as an object X along with an endo-1-cell S
and two 2-cells, a unit 2-cell η: 1 −→ S and a multiplication 2-cell µ: SS −→ S [7].
LIMITS
Generally speaking, one takes limits over functors whose domains are small categories (I, J, ...)
and whose codomains are locally small categories (C). The so-called abstract definition of a limit is
the definition in terms of representations. For a functor G: I −→ C, an object L in C is a limit for G
iff there is a representation C(X, L) ∼
= [I, C](∆X, G), i.e., for every natural transformation from the
diagonal functor to G there is a representing morphism from X to the limit object in C for every object
X in C. This description converts readily to the “concrete” description in terms of cones. Note that for
ordinary categories the natural isomorphism from C(X, L) (the covariant hom-functor) to [I, C](∆X,
G), two functors from C to Set, is straightforward.
Now consider the definition of a limit in a 2-category. We shall define such a limit, for reasons
that will soon be apparent, as follows: a (2-categorical) limit L for a 2-functor G: I −→ C is given by
the representation C(X, L) ∼
= [Iop , Cat](!, (∆X, G)) (here ! is the terminal 2-category - see [8]). There
are two important aspects of this definition for our purposes. First, both sides of the isomorphism
are categories (by assumption), so we must take account of 2-cells as well as morphisms (1-cells).
Second, we expand the right side to include !; this doesn’t accomplish anything in particular here but
will prove useful when we turn to weighted limits below. As far as 2-cells are concerned, the universal
property requires that there be an invertible 2-cell which takes each Gu (Gi −→ G j ) • τi (X −→ Gi )
to τ j (X −→ G j ).
For full generality, we need somewhat more from our notion of a limit. Suppose we replace the
terminal 2-category (!) in our definition above by a (any) 2-functor from I to Cat (known as an
“index” or “weight”). Now, since (∆X, G) is also a functor from I to Cat (by composition of G and
17
the hom-functor), a weighted cone over G with vertex X is given by a 2-natural transformation from
F to (∆X, G). Where an ordinary limit, then, requires only a single morphism to connect X with each
vertex of G (each G(-) in the diagram below), a weighted limit requires a set of morphisms (in fact,
since these are 2-categories, a category of morphisms) from X to each Gi .
←
X
−→
f
j
↓ fk
↓
G( j) −→ G(k)
u : j −→ k
G(u)
FUZZY FILTERS AS MONADS
There are two fundamental objectives served by the construction of monads in a (2-) category
C. One is the derivation of Eilenberg-Moore objects or algebras from the monads, and the other is
the construction of a (2-) category of the monads themselves through which functors into C may be
factored. Suppose we begin with rel, the 2-category whose objects are sets, whose 1-cells (morphisms)
are binary relations, and whose 2-cells (morphisms of morphisms) are inclusions. We ask what sorts
of objects in rel (i.e., which sets), if any, are monadic, that is, which objects X may be equipped with
an associative multiplication χ (more specifically, an endo-1-cell x and a 2-cell χ such that χ takes
xx to x and is associative), and with a unit 2-cell χ‘ from X (i.e., the 1-cell idx ) to x (note that we
follow here, for the most part, the presentation in [9]). Monads in rel, then, are just pre-ordered sets
<X, ≤>, the pre-ordering providing the obvious multiplication and unit. These pre-ordered sets can
be seen to be the objects of a 2-category with morphisms (called M-modules by Koslowski in [9])
<X, ≤> −→ <Y,< − > those relations r for which (≤r) ⊆ r ⊆ (r<-). In other words, if there is
an arrow x −→ x’ in X and r: x’ −→ y then also r: x −→ y and the same mutatis mutandis for r, y,
and y’. Such relations are called order-ideals, and, along with inclusions as 2-cells, they comprise the
category of monads in rel called idl in [9].
We know also ([5], p. 135) that the fuzzy filter functor generates monads in (the ordinary category)
set, i.e., that the set of all fuzzy filters on a set X is a monad in set. However, in a 2-categorical sense,
the set of all fuzzy filters on a set X may also be thought of as a monad in idl, since such monads are
simply closure operators (see [9], p. 198). It is this role which leads to the construction of EilenbergMoore objects for the fuzzy filter functor and hence to pie limits as described above.
References
1. J. M. Barone, “Fuzzy Weighted Limits,” Proc. JCIS 2003, Cary, North Carolina, September,
2003, 80-83.
2. R. Street, “Limits Indexed by Category-Valued 2-Functors,” J. Pure Appl. Algebra 8, 1976,
149-181.
3. G. Bird et. al., “Flexible Limits for 2-Categories,” J. Pure Appl. Algebra 61, 1989, 1-27.
4. J. Power and E. Robinson, “A characterization of pie limits,” Math. Proc. Camb. Phil. Soc.
110, 1991, 33-47.
5. P. Eklund and W. Gahler, “Fuzzy Filter Functions and Convergence,” in S. Rodabaugh et. al.
(eds.), Applications of Category Theory to Fuzzy Subsets, Dordrecht, Kluwer Academic Publishers,
1992, 109-136.
6. J. Adamek, F. Lawvere, and J. Rosicky, “Continuous Categories Revisited,” Theory and Application of Categories 11, 2003, 252-282.
7. R. Street, “The Formal Theory of Monads,” J. Pure Appl. Algebra 2, 1972, 149-168.
18
8. V. Sassone and P. Sobocinski, “Deriving Bisimulation Congruences using 2-categories,” Nordic
Journal of Computing.
9. J. Koslowski, “Monads and Interpolads in Bicategories,” Theory and Applications of Categories
3, 1997, 182-212.
19
On a natural fuzzification of Boolean logic
R AYMOND B ISDORFF
Faculty of Law, Economics and Finance
University of Luxembourg
1511 Luxembourg, G.D. Luxembourg
E-mail: ❜✐s❞♦r❢❢❅❝✉✳❧✉
1
Introduction
In this communication we propose two logically sound fuzzification and defuzzification techniques for
implementing a credibility calculus on a set of propositional expressions. Both rely on a credibility
evaluation domain using the rational interval [−1, 1] where the sign carries a split truth/falseness
denotation. The first technique implements the classic min and max operators where as the second
technique implements Bochvar-like operators. Main interest in the communication is given to the
concept of natural fuzzification of a propositional calculus. A formal definition is proposed and the
demonstration that both fuzzification techniques indeed verify this definition is provided.
2
2.1
Logical fuzzification and polarization: an adjoint pair
Introducing logical fuzziness
Let P be a set of constants or ground propositions. Let ¬, ∨ and ∧ denote respectively the contradiction, disjunction and conjunction operators.
The set E of all well formulated finite expressions will be generated inductively from the following
grammar:
∀p ∈ P : p ∈ E,
∀x, y ∈ E : ¬x | (x) | x ∨ y | x ∧ y ∈ E.
(1)
(2)
The unary contradiction operator ¬ has a higher precedence in the interpretation of a formula, but
we generally use brackets to control the application range of a given operator and thus to make all
formulas have unambiguous semantics. We suppose in the sequel that all other operators such as
implication, equivalence, xor etc are derived with the help of these three basic operators: contradiction,
conjunction and disjunction.
With these well formulated propositional expressions we associate a rational credibility evaluation
r : E → [−1, 1] where ∀x, y ∈ E, rx = 1 means x is certainly true, rx = −1 means that x is certainly
false and rx > ry (resp. rx < ry ) means that propositional expression x is more (resp. less) credible
than propositional expression y. Such a credibility domain is called L , and we denote E L = {(x, rx ) |
20
x ∈ E, rx ∈ [−1, 1]} a given set of such more or less credible propositional expressions, also called for
short L -expressions.
We implement the contradiction operator on L -expressions by simply changing the sign of the
associated credibility evaluation, i.e.
∀(x, rx ) ∈ E L : ¬(r, rx ) = (¬x, −rx ).
(3)
The sign exchange thus implements an antitone bijection on the rational interval [−1, 1] where the
zero value appears as contradiction fix-point.
In classical bi-valued logic, it is usual to work syntactically only on the truth point of view of
the logic, the untruth or falseness point of view being redundant through the coercion to the excluded
middle. For instance, writing ”(a, b) ∈ R” implicitly means assuming that this proposition is actually
true and its contradiction false, otherwise we would write ”(a, b) 6∈ R”.
We will also rely syntactically on such an implicit truthfulness point of view and always denote
the truthfulness possibly induced from the underlying credibility calculus through a truth projection
operator1 µ, acting as a positive domain and range restriction on the credibility operator r.
Figure 1: Split Truth/Falseness Semantics
Let (x, rx ) ∈ E L be an L -expression:
(
(x, rx ) if rx ≥ r¬x ,
µ(x, rx ) =
(¬x, r¬x ) otherwise.
(4)
Truthfulness of a given expression x is thus only defined in case the expression’s credibility rx
exceeds the credibility r¬x of its contradiction ¬x, otherwise the logical point of view is switched to
¬x, i.e the contradicted version of the expression (see Figure 1).
As rx ≥ r¬x ⇔ rx ≥ 0 it follows from Equation 4 that the sign (+ or −) of rx immediately carries
the truth functional semantics of L -expressions, in the sense that an L -expression (x, rx ) such that
rx ≥ 0 may be called more or less true (L -true for short) and an expression (x, rx ) such that rx ≤ 0
may be called more or less false (L -false for short).
1 In fuzzy set theory, the µ operator generally denotes a fuzzy membership function. We here choose the same µ symbol
on purpose as our main L -valued formulas mostly concern L -valued characteristic functions.
21
Only 0-valued expressions appear to be both L -true and L -false, therefore they are called L −
undetermined 2 .
To be able to compute the credibility evaluation associated with any L -expression, we still need
to implement L -valued versions of the conjunction and disjunction operators.
The classic min and max operators may be used:
∀(x, rx ), (y, ry ) ∈ E L :
(x, rx ) ∨ (y, ry ) = (x ∨ y, max(rx , ry ))
(x, rx ) ∧ (y, ry ) = (x ∧ y, min(rx , ry ))
(5)
(6)
The operator triple < −, min, max > implements on the rational interval [−1, 1] an ordinal credibility calculus, denoted for short Lo , that gives a first example of what we shall call a natural fuzzification
of propositional calculus.
To appreciate usefulness of our split truth/falseness semantics, let us look at what happens in the
Lo -valued framework with the truthfulness of certain classical tautologies or antilogies.
For instance, truthfulness of the tautology (x ∨ ¬x) is always given, as max( rx , −rx ) ) ≥ 0 in any
case. Tautological Lo -valued propositions thus appear as being Lo -true in any case. Therefore we
call them Lo -tautologies. On the other hand, truthfulness of the antilogy (x ∧ ¬x) is only defined
when min(rx , r¬x ) = 0. More or less “untruthfulness” of such an expression is however always given.
Therefore, we call such propositions Lo -antilogies.
Finally, let us investigate an implicative Lo -tautology such as the modus ponens for instance.
If we take the classical negative (Kleene-Dienes) definition of the implication, i.e. falseness of the
conjunction of r(x) and ¬r(y), we obtain
min( rx , max(−rx , ry ) ) ≥ 0 ⇒ ry ≥ 0,
i.e. the following Lo -tautology: “ (x, rx ) and (x, rx ) ⇒ (y, ry ) being conjointly Lo -true always implies
(y, ry ) being Lo -true “.
As a main result of our construction, we recover in this sense all classical tautologies and antilogies
as particular limit case if we reduce our Lo -valued credibility calculus to a bi-valued {−1, 1} one.
2.2
On natural logical polarization
To explore the formal consequences of our split truth/falseness semantics, we need to formalize the
logical defuzzification or polarization we implicitly operate when applying to L -expressions an L -true
or L -false denotation.
Unfortunately, the standard defuzzification technique, denoted in the fuzzy literature as λ-cuts
(see Fodor & Roubens [4]), where λ ∈ [−1, 1] represents the level of credibility rx from which on a
given L -expression is considered to be true, is not generally consistent with our split truth/falseness
semantics (see Bisdorff [2]).
2 “. . .
I have long felt that it is a serious defect in existing logic that it takes no heed of the limit between two realms. I
do not say that the Principle of Excluded Middle is downright false; but I do say that in every field of thought whatsoever
there is an intermediate ground between positive assertion and negative assertion which is just as Real as they. . . . “(C. S.
Peirce, Letter from February 29, 1909 to William James)
22
What we need is an extended three-valued cut operator (see Bisdorff & Roubens [1]). Let E L be
a set of L -expressions and let L 3 denote the restriction of L to the three credibility values {−1, 0, 1}.
3
π : E L → E L represents a logical polarization operator defined as follows:
∀(x, rx ) ∈ E L :
⇔ rx > 0
(x, 1)
(x, −1) ⇔ rx < 0
π(x, rx ) =
(x, 0)
⇔ rx = 0
That π operator indeed implements our split truth/falseness semantics may be summarized by stating
the following categorical equation.
µ ◦ π = π ◦ µ.
(7)
and a credibility calculus L verifying Equation 7 is called natural.
For instance, we may show that Lo implements a such natural credibility calculus. For this we
must proof that the π operation gives a natural transformation of Lo -valued expressions. Following
the general inductive construction of E L it is sufficient to show naturality of Lo for each of the basic
logical operators.
Lo -valued contradiction: for any (x, rx ) ∈ E Lo , if rx > 0 , µ(π(x, rx )) = µ(x, 1) = (x, 1) = π(µ(x, rx ));
if rx < 0 , µ(π(x, rx )) = µ(x, −1) = (¬x, 1) = π(¬x, −rx ) = π(µ(x, rx )); and if rx = 0 , µ(π(x, rx )) =
µ(x, 0) = (x, 1) == π(x, rx ) = π(µ(x, rx )).
Lo -valued disjubction: for any (x, rx ), (y, ry ) ∈ E Lo , if rx > 0 or ry > 0, µ(π(x ∨ y, max(rx , ry ))) =
µ(x ∨ y, 1) = (x ∨ y, 1) = π(x ∨ y, max(rx , ry )) = π(µ(x ∨ y, max(rx , ry ))); if rx < 0 and ry < 0, µ(π(x ∨
y, max(rx , ry ))) = µ(x ∨ y, −1) = (¬(x ∨ y), 1) = π(¬(x ∨ y), min(−rx , −ry )) = π(µ(x ∨ y, max(rx , ry ))).
Finally, Lo -valued conjunction: for any (x, rx ), (y, ry ) ∈ E Lo , if rx > 0 and ry > 0, µ(π(x∧y, min(rx , ry ))) =
µ(x ∧ y, 1) = (x ∧ y, 1) = π(x ∧ y, min(rx , ry )) = π(µ(x ∧ y, min(rx , ry ))); if rx < 0 or ry < 0, µ(π(x ∧
y, min(rx , ry ))) = µ(x ∧ y, −1) = (¬(x ∧ y), 1) = π(¬(x ∧ y), max(−rx , −ry )) = π(µ(x ∧ y, min(rx , ry ))).
This completes the demonstration.
The Lo credibility calculus is however not the only possible natural credibility calculus we may
define on E.
3
A Bochvar-like fuzzification of propositional expressions
A second example is given by a multiplicative fuzzification of the classic three-valued Bochvar logic.
We shall denote Lb such a credibility calculus where the operator triple is denoted < −, g, f >.
We keep the traditional sign exchange as Lb -valued contradiction.
The multiplicative conjunction operator f on a set E L of L -expressions is defined as follows:
| rx × ry | if (rx > 0) ∧ ry > 0),
∀x, y ∈ E : rx∧y = rx f ry =
− | rx × ry | otherwise.
In Figure 2, we may notice that the f-operator, when restricted to a {−1, 1}-valued domain, is
isomorphic to the classic Boolean conjunction operator.
Similarly, we define the multiplicative disjunction operator g as follows:
23
1
0.8
0.6
0.4
0.2
0
-0.2
-0.4
-0.6
1
-0.8
0
-1
0.8
0.5
0.2
-0.4
-0.1
-1
-0.7
-1
Figure 2: Graphical representation of the multiplicative conjunctive operator
1
0.8
0.6
0.4
0.2
0
-0.2
-0.4
-0.6
1
-0.8
0
-1
0.8
0.5
0.2
-0.4
-0.1
-1
-0.7
-1
Figure 3: Graphical representation of the multiplicative disjunctive operator
∀x, y ∈ P : rx∨y = rx g ry =
− | rx × ry | if (rx < 0) ∧ (ry < 0),
| rx × ry | otherwise.
Again, we may notice in Figure 3 that we recover in the limit, when restricted to only −1, 1-valued
expressions, the classic Boolean disjunction operator.
First, we may verify that the De Morgan duality properties are verified in Lb . Indeed, we easily
see that:
∀(x, rx ), (y, ry ) ∈ E Lb : rx∧y = r(¬(¬x ∨ ¬y) ) .
Indeed, if rx , ry > 0, rx f ry = rx × ry . At the same time, r¬x g r¬y = (r¬x × r¬y ) = −(rx × ry ). On the
contrary, if rx , ry < 0, rx f ry = −(rx × ry ), then r¬x g r¬y ) = (r¬x × r¬y ) = (−rx × −r(y ) = rx × ry . If
either rx > 0 and ry < 0 or vice versa, the duality relation is equally verified.
It is most interesting to notice that in the case where both Lb -expressions are Lb -true, respectively
Lb -false, both operators f and g give the same Lb -credibility. The operators diverge in their result
only when contradictory Lb -truth assessments are to be combined. The conjunctive operator aligns
the Lb -false part where as the disjunctive operator sustains the Lb -true part of the pair of propositions.
24
We may furthermore notice that the negational fix-point, the zero value, figures as logical “black
hole” as is usual in the three-valued Bochvar logic, absorbing all possible logical determinism through
any of both binary operators.
∀(x, rx ) ∈ E Lb : rx f 0 = rx g 0 = 0.
Lb
Let us denote E/−1;1
the equivalence classes of all certainly true or false Lb -expressions. The
Lb
gives a classic Boolean algebra.
restriction of the Lb credibility calculus to E/−1:1
It is remarkable however, that such a priori obvious properties as impotency of conjunction and
disjunction, are only satisfied in this limit Boolean case. Indeed in general, the natural logical consequence of combining more and more fuzzy propositions will sooner or later necessarily end up with
a completely undetermined proposition. The same is true when combining conjunctively or disjunctively a number of times the same fuzzy proposition. Indeed, ∀(x, rx ), (y, ry ) ∈ E Lb such that rx 6= 0 we
have:
| rx | > | rx f ry |,
| rx | > | rx g ry | .
We recover here a similar situation as in classic error propagation. The more we operate with imprecise numbers, we more we increase the imprecision of the out-coming result, and this imprecision is
essentially related to the imprecision of the initial inputs.
Finally, to validate now the naturality property of the Lb calculus, we must show that the curly
operators g and f verify Equation 7. In order to do so, it is again sufficient to show that for any
(x, rx ), (y, ry ) ∈ E Lb and both the curly operators we have:
µ(π(x ∨ y, rx g ry )) = π(µ(x ∨ y, rx g ry )),
µ(π(x ∧ y, rx f ry )) = π(µ(x ∧ y, rx f ry )).
Indeed, for any (x, rx ), (y, ry ) ∈ E Lo , if rx > 0 or ry > 0, µ(π(x ∨ y, rx g ry ))) = µ(x ∨ y, 1) = (x ∨
y, 1) = π(x ∨ y, rx g ry ) = π(µ(x ∨ y, rx g ry ); if rx < 0 and ry < 0, µ(π(x ∨ y, rx g ry )) = µ(x ∨ y, −1) =
(¬(x ∨ y), 1) = π(¬(x ∨ y), rx f ry ) = π(µ(x ∨ y, rx g ry )).
And for any (x, rx ), (y, ry ) ∈ E Lo , if rx > 0 and ry > 0, µ(π(x ∧y, rx f ry )) = µ(x ∧y, 1) = (x ∧y, 1) =
π(x ∧ y, rx f ry ) = π(µ(x ∧ y, rx f ry ); if rx < 0 or ry < 0, µ(π(x ∧ y, rx f ry )) = µ(x ∧ y, −1) = (¬(x ∧
y), 1) = π(¬(x ∧ y), rx g ry ) = π(µ(x ∧ y, rx f ry )).
This concludes the demonstration that Lb does indeed implements a natural credibility calculus.
4
Moving on
In order to situate now the whole family of natural credibility calculus one may define on propositional
expressions, let us explore two directions for further investigations.
Following the general properties of the Lo calculus, we may want to consider the t-norm concept
as potential generalization. Unfortunately, the split truth/falseness semantics is not quite compatible
25
with the formal properties of a t-norm. Indeed, let us recall that a t-norm T defined on the interval
[−1; 1] should verify the following four axioms:
T (1, rx ) = rx , ∀rx ∈ [−1; 1]
T (rx , ry ) = T (ry , rx ), ∀rx , ry ∈ [−1; 1]
T (rx , ry ) ≤ T (ru , rv ) if −1 ≤ rx ≤ ru ≤ 1, −1 ≤ ry ≤ rv ≤ 1
T (rx , T (ry , rz )) = T (T (rx , ry ), rz ), ∀rx , ry , rz ∈ [−1; 1].
(8)
(9)
(10)
(11)
It is easily verified that the multiplicative conjunctive operator f verifies three of these axioms, i.e.
all except the third one. This is not astonishing, as this axiom is not so “naturally” a logical axiom but
rather a geometrical axiom underlying the “triangularity” heritage of the t-norm concept.
What axiom could advantageously replace the “triangular” t-norm condition in order to make fit
conceptually the t-norm to a natural credibility calculus on the rational interval [−1, 1] ?
A possibility might be the following:
| T (rx , ry ) |≤| T (ru , rv ) | if 0 ≤| rx |≤| ru |≤ 1, 0 ≤| ry |≤| rv |≤ 1.
In some sense we would recover the triangular axiom in some absolute terms. But this idea has still
to be further explored.
Finally, more following the semiotical intuitions of C.S. Peirce, we may interpret the classic ordinal Lo credibility calculus and the above introduced Bochvar-like Lb credibility calculus as some
limit constructions of a same semiotical foundation of logical fuzziness. Indeed, the Lo calculus to be
applicable in a practical setting supposes a same closed universal semiotical reference for all ground
propositions p ∈ P as is usual in a mathematical logic context for instance, where as the multiplicative
model apparently supposes shared semiotical references for all determined parts and disjoint semiotical references for the logically undetermined parts of each proposition p ∈ P as is usual for instance
in repetitive physical measures with error propagation.
These general considerations leave open the case where each ground expression p ∈ P is completely supported by a different semiotical reference. In this last case we would get as third limit case
some kind of aggregational logic (see Bisdorff [3]) as implemented by the concordance principle in
the multicriteria approach to preference aggregation for instance.
References
[1] Bisdorff, R. and Roubens, M. (1996), On defining fuzzy kernels from L -valued simple graphs,
in: Proceedings Information Processing and Management of Uncertainty, IPMU’96, Granada,
593–599.
[2] Bisdorff, R. (2000), Logical foundation of fuzzy preferential systems with application to the Electre decision aid methods, Computers & Operations Research 27 673–687.
[3] Bisdorff, R. (2002), Logical Foundation of Multicriteria Preference Aggregation. Essay in Aiding
Decisions with Multiple Criteria, D. Bouyssou et al. (editors), Kluwer Academic Publishers, pp.
379-403.
[4] Fodor, J. and Roubens, M., Fuzzy preference modelling and multi-criteria decision support.
Kluwer Academic Publishers (1994)
26
A review of construction and representation results for
fuzzy weak orders
U LRICH B ODENHOFER1 , B ERNARD D E BAETS2 , JÁNOS C. F ODOR3
1 Software
Competence Center Hagenberg
4232 Hagenberg, Austria
E-Mail: ❯❧r✐❝❤✳❇♦❞❡♥❤♦❢❡r❅s❝❝❤✳❛t
2 Dept.
of Applied Mathematics, Biometrics, and Process Control
Ghent University
9000 Gent, Belgium
E-Mail: ❇❡r♥❛r❞✳❉❡❇❛❡ts❅❯●❡♥t✳❜❡
3 Dept.
of Biomathematics and Informatics
Szent István University
1078 Budapest, Hungary
E-Mail: ❥❢♦❞♦r❅✉♥✐✈❡t✳❤✉
Weak orders, i.e. reflexive, transitive, and complete binary relations, are among the most fundamental
concepts in preference modeling. It is well-known that weak orders are nothing else but linear orders
of equivalence classes, where the corresponding equivalence relation is the symmetric kernel of the
weak order. If the underlying set of alternatives X is finite, a weak order can be represented by a single
score function [2].
In analogy to the crisp case, fuzzy weak orders are fundamental concepts in fuzzy preference
modeling [3, 4, 5]. Given a non-empty set of alternatives X, a fuzzy relation R : X 2 → [0, 1] is a fuzzy
weak order if it fulfills the following three axioms for all x, y, z ∈ X (where T is a left-continuous
t-norm):
R(x, x) = 1
(reflexivity)
T R(x, y), R(y, z) ≤ R(x, z) (T -transitivity)
R(x, y) = 1 or R(y, x) = 1
(strong completeness)
In this contribution, we give an overview of construction and representation results for fuzzy weak
orders. This includes both known results and new insights:
(i) Every fuzzy weak order can be represented as a union of a crisp linear order and a fuzzy equivalence relation—which is a full analogue to the crisp case [1]. Based on this discovery, we
are able to construct fuzzy weak orders from pseudo-metrics if the t-norm T is continuous
Archimedean [1].
(ii) For the case that X is finite, we give a necessary and sufficient condition that a fuzzy weak order
is determined only by the degrees to which two consecutive equivalence classes are related to
each other.
(iii) Every fuzzy weak order can be represented by score functions [6], but not necessarily by a single
one, not even if X is finite [3]. A necessary and sufficient condition for the representability by
a single score function is given.
27
(iv) Fuzzy weak orders can be represented by an embedding to the fuzzy power set F (X) equipped
with the fuzzy inclusion induced by the t-norm T [1].
All these reviews and new results are demonstrated by means of detailed examples.
Acknowledgements
Ulrich Bodenhofer gratefully acknowledges support by the Austrian Government, the State of Upper
Austria, and the Johannes Kepler University Linz in the framework of the Kplus Competence Center
Program. Bernard De Baets and János Fodor gratefully acknowledge partial support by the Bilateral
Scientific and Technological Cooperation Flanders-Hungary BIL00/51 (B-08/2000).
References
[1] U. Bodenhofer. Representations and constructions of similarity-based fuzzy orderings. Fuzzy Sets and
Systems, 137(1):113–136, 2003.
[2] G. Cantor. Beiträge zur Begründung der transfiniten Mengenlehre. Math. Ann., 46:481–512, 1895.
[3] B. De Baets, J. Fodor, and E. E. Kerre. Gödel representable fuzzy weak orders. Internat. J. Uncertain.
Fuzziness Knowledge-Based Systems, 7(2):135–154, 1999.
[4] J. Fodor and M. Roubens. Fuzzy Preference Modelling and Multicriteria Decision Support. Kluwer Academic Publishers, Dordrecht, 1994.
[5] S. Ovchinnikov. An introduction to fuzzy relations. In D. Dubois and H. Prade, editors, Fundamentals
of Fuzzy Sets, volume 7 of The Handbooks of Fuzzy Sets, pages 233–259. Kluwer Academic Publishers,
Boston, 2000.
[6] L. Valverde. On the structure of F-indistinguishability operators. Fuzzy Sets and Systems, 17(3):313–328,
1985.
28
A bridge between fuzzy set theory and coherent conditional
probabilities (II)
G IULIANELLA C OLETTI
Dip. Matematica e Informatica
University of Perugia
06123 Perugia, Italy
E-mail: ❝♦❧❡tt✐❅❞✐♣♠❛t✳✉♥✐♣❣✳✐t
In this talk (strictly linked with that by Romano Scozzafava with the same title) we start from our
approach to fuzzy set theory in terms of conditional events and coherent conditional probabilities,
showing also how the concept of possibility function naturally arises in this context. Coherent conditional probability is looked on as a general non-additive “uncertainty” measure ψ(·) = P(E| ·) of
the conditioning events. In particular, we show that ψ can be interpreted as a possibility measure,
giving a relevant characterization: ψ is a possibility if and only if it is a capacity. Moreover, we give
also a characterization of the measure ψ as an (antimonotone) information measure. Any coherent
extension of a membership function is between these two extreme cases, but the converse is not true.
So we discuss also a characterization of coherence of such extensions in terms of a suitable weighted
mean of conditional probabilities.
We recall from the previous talk (with the same title) the following basic notions.
Let ϕ be any property related to a random quantity X : notice that a property, even if expressed by
a statement, does not single–out an event, since the latter needs to be expressed by a nonambiguous
proposition that can be either true or false.
Consider now the event Eϕ = “You claim ϕ ” and a coherent conditional probability P(Eϕ |Ax ),
looked on as a real function µEϕ (x) = P(Eϕ |Ax ) defined on CX , the range of X. Then a fuzzy subset Eϕ∗
of CX is the pair
Eϕ∗ = {Eϕ , µEϕ },
with µEϕ (x) = P(Eϕ |Ax ) for every x ∈ CX .
So a coherent conditional probability P(Eϕ |Ax ) is a measure of how much You, given the event
Ax = {X = x}, are willing to claim the property ϕ , and it plays the role of the membership function
of the fuzzy subset Eϕ∗ . We recall that we have been able not only to define fuzzy subsets, but also to
introduce in a very natural way the basic continuous T-norms and the relevant dual T-conorms, bound
to the former by coherence.
On the other hand, if we consider the weakest T -norm
(
min(x, y) if max(x, y) = 1 ,
To (x, y) =
0
otherwise
we can prove that the choice of p = P(Eϕ ∧ Eψ |Ax ∧ Ay ) agreeing with To is not coherent.
29
The three coherent choices discussed in the previous talk correspond to the particular values λ = 0,
λ = 1, λ = ∞, respectively, of the fundamental (archimedean) Frank t-norms Tλ and t-conorms Sλ (see
[6]), with λ ∈ [0, ∞], that is (for λ different from the above three values)
(λx − 1)(λy − 1)
(λ1−x − 1)(λ1−y − 1)
Tλ (x, y) = logλ 1 +
, Sλ (x, y) = 1 − logλ 1 +
.
λ−1
λ−1
In our framework (where, given a t-norm singling-out the value P(Eϕ ∧ Eψ |Ax ∧ Ay ) of the conjunction, then the corresponding choice of the t-conorm, which determines the value of the disjunction
P(Eϕ ∨ Eψ |Ax ∧ Ay ) , is uniquely driven by the coherence of the relevant conditional probability) we
are able to capture also Frank t-norms and t-conorms (for any λ ∈ [0, ∞]), archimedean or not.
In our setting it is completely natural to consider fuzzy measures, taking as starting point a membership function, regarded as a pointwise distribution. This requires in fact only to extend a coherent
conditional probability assessment on the family {Eϕ |Ax } to the larger family of events {Eϕ |A}, with
A element of the algebra A spanned by events {Ax }.
Intuitively, P(Eϕ |A) is the probability that “You claim ϕ” in the hypothesis that the value of the
variable X belongs to A.
The results that follow are mainly taken from [3] and [4]. Let us introduce the following (“natural”) definitions:
(D1) Let E be an arbitrary event and P any coherent conditional probability on the family G =
{E} × {Ax }x∈CX , admitting P(E|Ω) = 1 as (coherent) extension. A distribution of possibility on CX is
the real function π defined by π(x) = P(E|Ax ).
Actually, along the same lines we can as well introduce any general distribution ψ, to be called
just uncertainty measure.
(D2) Under the same conditions of (D1), a distribution of uncertainty measure on CX is the real
function ψ defined by ψ(x) = P(E|Ax ).
When CX is finite, since every extension of P(E| · ) must satisfy the axioms of a conditional probability, condition P(E|Ω) = 1 gives
P(E|Ω) =
∑ P(Ax |Ω)P(E|Ax )
x∈Cx
and
∑ P(Ax |Ω) = 1 .
x∈Cx
Then 1 = P(E|Ω) ≤ maxP(E|Ax ) ; therefore P(E|Ax ) = 1 for at least one event Ax .
x∈Cx
On the other hand, we notice that in our framework (where null probabilities for possible conditioning events are allowed) it does not necessarily follow that P(E|Ax ) = 1 for every x; in fact we may
well have P(E|Ay ) = 0 (or else equal to any other number between 0 and 1) for some y ∈ CX . Obviously, the constraint P(E|Ax ) = 1 for some x is not necessary when the cardinality of CX is infinite.
From now on, given an arbitrary event E, let C be a family of conditional events {E|Hi }i∈I , where
card(I) is arbitrary and events Hi ’s are a partition of Ω , P(E| · ) an arbitrary (coherent) conditional
/
probability on C , H the algebra spanned by the Hi ’s, and H o = H \ {0}.
Here we list some of the main results:
30
(A) Any coherent extension of P to C ′ = {E|H : H ∈ H o } is such that, for every H, K ∈ H , with
/
H ∧ K = 0,
(1)
min{P(E|H), P(E|K)} ≤ P(E|H ∨ K) ≤ max{P(E|H), P(E|K)} .
It follows that any coherent extension of P to C ′ = {E|H : H ∈ H o } is such that, for every
H, K ∈ H , with H ∧ K = 0/ ,
P(E|H ∨ K) ≤ P(E|H) + P(E|K).
On the other hand
/
(B) Any real function f defined on H such that, if H ∧ K = 0,
min{ f (H), f (K)} ≤ f (H ∨ K) ≤ max{ f (H), f (K)} ,
is a capacity if and only if, for every H, K ∈ H ,
f (H ∨ K) = max{ f (H), f (K)} .
So the function f (H) = P(E|H), with P a coherent conditional probability, in general is not a capacity.
The question now is: are there coherent conditional probabilities P(E| · ) monotone with respect
to ⊆ ? We reached a positive answer by means of the following result (given in [5]), which represents the main tool to introduce possibility measures in our context referring to coherent conditional
probabilities.
(C) Let f : C → [0, 1] be any function such that
(2)
f (E|Hi ) = 0 if E ∧ Hi = 0/ and f (E|Hi ) = 1 if Hi ⊆ E
holds. Then any P extending f on K = {E} × H o and such that
(3)
P(E|H ∨ K) = max{P(E|H), P(E|K)} ,
for every H, K ∈ H o
is a coherent conditional probability.
(D3) Let H be an algebra of subsets of CX and E an arbitrary event. If P is any coherent conditional probability on K = {E} × H o , with P(E|Ω) = 1 and such that
P(E|H ∨ K) = max{P(E|H), P(E|K)} ,
for every H, K ∈ H o ,
then a possibility measure on H is the real function Π defined by Π(H) = P(E|H) for H ∈ H o and
/ = 0.
Π(0)
In our context, (C) assures that any possibility measure can be obtained as coherent extension
(unique, in the finite case) of a possibility distribution. Vice versa, given any possibility measure Π
on an algebra H , there exists an event E and a coherent conditional probability P on K = {E} × H o
/ = 0) coincides with Π.
agreeing with Π, i.e. whose extension to {E} × H (putting P(E|0)
So an immediate consequence of (B) and (C) is that any coherent P extending f on K = {E} ×
H o is a capacity if and only if it is a possibility.
31
Going back to our interpretation of a membership function µ(x) through a suitable coherent conditional probability (a measure of how much You, given the event Ax , are willing to claim the relevant
property ϕ ), and putting
Ho = {x ∈ CX : µ(x) = 0} , H1 = {x ∈ CX : µ(x) = 1} ,
the conditional probability P(E|H c ), with H = Ho ∨ H1 , is a measure of how much You are willing
to claim property ϕ if the only fact you know is that x ∈ H c . On the other hand, every membership
function can be regarded as a possibility distribution. If A is an algebra of subsets of CX , the ensuing
possibility measure can be interpreted in the following way: it is a sort of “global” membership
(relative to each finite A ∈ A ) which takes, among all the possible choices for its value on A , i.e.
among all possible extensions satisfying (2), the maximum of the membership in A.
Moreover, we can regard every possibility measure Π as a decreasing function of the elements
of the zero-layer set {0, 1, 2, . . . , k} associated to the class {Pα } of unconditional probabilities that
are used to represent a coherent conditional probability in our main characterization theorem (see [2],
p.81).
In conclusion, the coherent extensions of a conditional probability P(E|Ax ) that satisfy (3) give
rise to different zero-layers for the atoms Ax corresponding to different P(E|Ax ), so that such a coherent conditional probability P(E| · ) can be suitably associated to a measure of your “disbelief” in the
events A ∈ A .
Then some of the usual arguments may appear counterintuitive: in fact, the “global” membership
should possibly decrease when the information is not concentrated on a given x, but is “spread” over a
larger set (for example, considering the statement “Mary is young”, you may be willing, if you know
that Mary’s age is x = 39, to put µ(x) = .2, while if you know that her age is y = 26, you may be willing
to put µ(y) = .9 ; on the other hand, knowing that her age is between 26 and 39, the corresponding
possibility is still .9).
So our results may suggest to take as such global measure a function which is not a capacity, yet
satisfying the weaker conditions under (A).
With the aim of studying information measures in the framework of coherent conditional probabilities, we gave also the following definition, which parallels, in a sense, those (D1) and (D2) for
uncertainty (including possibility) measures.
(D4) Let F be an arbitrary event and P any coherent conditional probability on the family G =
{F} × {Ax }x∈CX , admitting P(F|Ω) = 0 as (coherent) extension. We define pointwise information
measure on CX the real function ψ defined by ψ(x) = P(F|Ax ).
When CX is finite, since every extension of P(F| · ) must satisfy the axioms of a conditional probability, considering the condition P(F|Ω) = 0, we necessarily have
P(F|Ω) =
∑ P(Ax |Ω)P(F|Ax )
x∈Cx
and
∑ P(Ax |Ω) = 1 .
x∈Cx
Then 0 = P(F|Ω) ≥ minP(F|Ax ), so P(F|Ax ) = 0 for at least one event Ax .
x∈Cx
On the other hand, we notice that in our framework it does not necessarily follow that P(F|Ax ) = 0
for every x; in fact we may well have P(F|Ay ) = 1 (or to any other number between 0 and 1) for some
32
y ∈ CX . Obviously, the constraint P(F|Ax ) = 0 for some x is not necessary when the cardinality of CX
is infinite.
Under the same conditions mentioned before (A), we get an immediate consequence of (A) itself:
/
(B1) Any real function f defined on H such that, if H ∧ K = 0,
min{ f (H), f (K)} ≤ f (H ∨ K) ≤ max{ f (H), f (K)} ,
is antimonotone with respect to ⊆ if and only if, for every H, K ∈ H ,
f (H ∨ K) = min{ f (H), f (K)} .
The following result proves the existence of coherent conditional probabilities P(F| · ) antimonotone with respect to ⊆ . It represents also the main tool to introduce information measures in our
context referring to coherent conditional probabilities.
(C1) Let f : C → [0, 1] be any function such that
f (F|Hi ) = 0 if F ∧ Hi = 0/ and f (F|Hi ) = 1 if Hi ⊆ F
holds . Then any P extending f on K = {F} × H o and such that
P(F|H ∨ K) = min{P(F|H), P(F|K)} ,
for every H, K ∈ H o ,
is a coherent conditional probability.
In the case that the assessment P(F|Hi ) admits P(F|Ω) = 0 as coherent extension, we obtain as
well a coherent extension by requiring both P(F|Ω) = 0 and choosing “min” as combination rule to
make the extension of P.
Are the two extreme cases
– P(E|Ax ) extended to the disjunction of conditioning events by taking the maximum (possibility
measure, monotone)
– P(E|Ax ) extended to the disjunction of conditioning events taking the minimum (antimonotone
measure)
the most natural ways to extend membership functions?
We recall that coherence implies
min{P(E|H), P(E|K)} ≤ P(E|H ∨ K) ≤ max{P(E|H), P(E|K)}
but the converse is NOT true. So, in general, a value between the two extremes is not necessarily
a coherent choice for the conditional probability P(E|H ∨ K) (which can be looked on as a sort of
“global” membership ...).
Coherent choices have been characterized in [1]: they are weighted means of P(E|H) and P(E|K)
(weights equal to zero or one are allowed). More generally, this result can be stated with reference to
the disjunction of any finite number of conditioning events.
33
References
[1] S. Ceccacci, C. Morici, and T. Paneni, “Conditional probability as a function of the conditioning
event: characterization of coherent enlargements”, Proc. WUPES 2003, Hejnice, pp. 35–45.
[2] G. Coletti and R. Scozzafava, Probabilistic Logic in a Coherent Setting, Dordrecht, Kluwer, 2002.
[3] G. Coletti and R. Scozzafava, “Coherent conditional probability as a measure of uncertainty of the
relevant conditioning events”. In: Lecture Notes in Computers Science LNAI 2711 (ECSQARU2003, Aalborg), 2003, pp. 407–418.
[4] G. Coletti and R. Scozzafava, “Coherent conditional probability as a measure of information of the
relevant conditioning events”. In: Lecture Notes in Computers Science LNCS 2810 (IDA-2003,
Berlin), 2003, pp. 123–133.
[5] G. Coletti and R. Scozzafava, “Conditional probability, fuzzy sets and possibility: a unifying
view”, Fuzzy Sets and Systems, 2004, to appear.
[6] M.J. Frank, “On the simultaneous associativity of F(x, y) and x + y − F(x, y)”, Aequationes Math.,
19: 194–226, 1979.
34
Stable commutative copulas in pairwise comparison models
B ERNARD D E BAETS1 , H ANS D E M EYER2
1 Dept.
of Applied Mathematics, Biometrics, and Process Control
Ghent University
9000 Gent, Belgium
E-Mail: ❇❡r♥❛r❞✳❉❡❇❛❡ts❅❯●❡♥t✳❜❡
2 Dept.
of Applied Mathematics and Computer Science
Ghent University
9000 Gent, Belgium
E-Mail: ❍❛♥s✳❉❡▼❡②❡r❅❯●❡♥t✳❜❡
The purpose of this lecture is twofold. Firstly, we revise the class of stable copulas [7], i.e. the class of
copulas that coincide with their survival copula [11]. Secondly, we describe two comparison models,
a deterministic one and a stochastic one, in which stable commutative copulas play a simplifying role.
We propose a method for constructing copulas which largely generalizes the ordinal sum construction method. The method is based on a grid structure and the use of what we have called foreground
and background copulas [2]. It can be applied in particular to construct commutative copulas and stable commutative copulas. Requiring associativity as well leads to the usual ordinal sum construction
of t-norms, which for the purpose of constructing stable copulas reduces to the well-known ‘symmetric’ ordinal sums of Frank t-norms [7].
In the deterministic model, objects are represented by feature vectors that indicate presence or
absence of certain properties. A typical way of comparing objects is by means of cardinality-based
similarity measures operating on the corresponding feature vectors [4]. The generalization to fuzzy
feature vectors requires the choice of an appropriate model of fuzzy intersection along with fuzzification rules for other set-theoretic operations [1]. For more than two decades now, t-norms have become
the standard model for that purpose, and their use is hardly questioned. However, here we show the
power of stable commutative copulas. Indeed, TL -transitivity and TP -transitivity of the cardinalitybased similarity measures are preserved in the fuzzification process when using a stable commutative
copula as model for fuzzy set intersection [9]. Links with Bell-type inequalities for copulas and tnorms will be discussed as well [8, 10].
The second comparison model deals with random variables. For a random vector (X1 , X2 , . . . , Xn ),
its components are compared pairwisely by considering the ‘winning probabilities’ of one over the
other. More specifically, a probabilistic relation Q is defined: Q(Xi , X j ) = P (Xi > X j ) + 1/2 P (Xi =
X j ). This relation indeed satisfies Q(Xi , X j ) + Q(X j , Xi ) = 1. Moreover, its computation requires only
the knowledge of the bivariate marginal distributions, which are in turn uniquely determined from the
univariate marginal distributions and the copula that binds them. We consider the case where all pairs
of variables are coupled by a same commutative copula C. One of the key issues in comparison models
is the transitivity exhibited by the model. For probabilistic relations, we have previously developed
the rich framework of cycle-transitivity [6]. Remarkably, the transitivity of the probabilistic relation
expressing the winning probabilities can be classified within this framework, and the corresponding
upper bound function only depends on the commutative copula C considered [5]. In case C is stable,
35
this upper bound function is given by U(α, β, γ) = β + C(1 − β, γ) = γ + C(β, 1 − γ). In particular,
F (β, γ). In the specific case of independent
when C = TλF is a Frank t-norm, then U(α, β, γ) = S1/λ
random variables, i.e. C = TP , we recover the previously studied dice model [6] characterized by
U(α, β, γ) = β + γ − βγ, i.e. dice-transitivity.
References
[1] B. De Baets and H. De Meyer, Transitivity-preserving fuzzification schemes for cardinality-based
similarity measures, European J. Oper. Res., to appear.
[2] B. De Baets and H. De Meyer, Copulas and the pairwise probabilistic comparison of ordered
lists, Proc. Tenth Internat. Conference on Information Processing and Management of Uncertainty in Knowledge-based Systems (Perugia, Italy), 2004, submitted.
[3] B. De Baets, H. De Meyer, B. De Schuymer and S. Jenei, Cyclic evaluation of transitivity of
reciprocal relations, Social Choice and Welfare, to appear.
[4] B. De Baets, H. De Meyer and H. Naessens, A class of rational cardinality-based similarity
measures, J. Comput. Appl. Math. 132 (2001), 51–69.
[5] H. De Meyer, B. De Baets and B. De Schuymer, Transitive comparison of independent and
dependent random variables, in: Principles of Fuzzy Preference Modelling and Decision Making
(B. De Baets and J. Fodor, eds.), Academia Press, 2003, pp. 249–265.
[6] B. De Schuymer, H. De Meyer, B. De Baets and S. Jenei, On the cycle-transitivity of the dice
model, Theory and Decision 54 (2003), 264–285.
[7] E.P. Klement, R. Mesiar and E. Pap, Invariant copulas, Kybernetika 38 (2002), 275–285.
[8] S. Janssens, B. De Baets and H. De Meyer, Meta-theorems on fuzzy set cardinalities, in: Principles of Fuzzy Preference Modelling and Decision Making (B. De Baets and J. Fodor, eds.),
Academia Press, 2003, pp. 27–42.
[9] S. Janssens, B. De Baets and H. De Meyer, Some meta-theorems on fuzzy cardinalities and their
application, Proc. Third EUSFLAT Conference (Zittau, Germany), 2003, pp. 318–321.
[10] S. Janssens, B. De Baets and H. De Meyer, Bell-type inequalities for commutative quasi-copulas,
Fuzzy Sets and Systems, submitted.
[11] R. Nelsen, An Introduction to Copulas, Lecture Notes in Statistics 139, Springer-Verlag, New
York, 1998.
36
Vague ordered fields: towards an axiomatic theory of vague real line
M USTAFA D EMIRCI
Department of Mathematics
Faculty of Sciences and Arts
Akdeniz University
07058 Antalya, Turkey
E-mail: ❞❡♠✐r❝✐❅❛❦❞❡♥✐③✳❡❞✉✳tr
The notion of fuzzy function based on many-valued equivalence relations (many-valued similarity
relations (equalities) [17, 18, 19], fuzzy equivalence relations [4, 6, 7, 21, 22, 26], similarity relations
[1, 2, 3, 15, 28], indistinguishability operators [27], etc.) has been introduced by several authors, and
applied to category theory [5], approximate reasoning and fuzzy control theory [8, 10, 15, 22]. The
author of this talk [8, 9, 10] later proposed other versions of this kind of fuzzy function, known as
strong fuzzy function and perfect fuzzy function, which have more desirable and powerful representation properties than the others. Many-valued equivalence relation-based fuzzy orderings have been
studied by Höhle-Blanchard [16] and Bodenhofer [1, 2, 3] w.r.t. different special integral, commutative cqm-lattices. Later on, these fuzzy orderings are generalized on the basis of a fixed and a general
integral, commutative cqm-lattice M = (L, ≤, ∗) under the name M-vague orderings [13, 14]. For a
given nonempty set X and an M-equivalence relation E on it, an M-vague ordering on X is a special
L-fuzzy relation on X satisfying some further properties by means of E.
Strong (perfect) fuzzy functions [8, 9, 10] form the elementary tools of vague algebra [9, 11, 12]
and vague lattices [13, 14]. In contrast to fuzzy algebra [23] and fuzzy lattices [25], vague algebra
and vague lattices basically involve vaguely defined binary operations (M-vague binary operations
[9, 11, 12]) and vaguely defined ordering relations (M-vague orderings), where the integral, commutative cqm-lattice M = (L, ≤, ∗) [10, 20] denotes the many-valued logical basis of these studies. A
vague binary operation ◦˜ on X can be roughly described as a special L-fuzzy relation (more precisely,
a special strong fuzzy function) from X × X to X with some reasonable properties formulated in terms
of E [9, 11, 12]. Strong (perfect) fuzzy functions propose a new approach to the fuzzy setting of numerous different branches of mathematics. Vague algebra and vague lattices are only two important
cases of such an approach. The development of a sound theory of real line equipped with M-vague
orderings, M-vague addition operations and M-vague multiplication operations [9, 12], which will
be called vague real line, lies at the heart of future studies in the theory of many-valued equivalence
relation-based fuzzy functions. It is well-known that basic axioms of the real line in the classical sense
have been derived starting from an abstract ordered field in the classical sense. For this reason, in an
analogue manner to the real line in the classical case, it is natural to start from a vague ordered field
for the establishment of an axiomatic theory of vague real line. Vague ordered fields and the transition
from vague ordered fields to the vague real line will be the main subjects of this presentation. The
outline of this talk can be expressed as follows. After a brief introduction of strong (perfect) fuzzy
functions and vague algebraic notions, we will define many-valued equivalence relation-based strict
fuzzy orderings, which will be an essential tool of the vague ordered fields, and establish the connection between these kinds of strict fuzzy orderings and M-vague orderings. Then we will introduce
vague ordered fields, and touch on the problem of the derivation of the basic axioms of vague real line
37
starting from vague ordered fields. All necessary fundamental axioms of vague real line, which have
not yet been revealed in their entirity, are crucial problems in developing a sound theory for vague real
line. The aim of this talk can be summarized as the introduction of vague real line and the invitation
of the researchers to this new and bachelor field.
Acknowledgement
This presentation is supported by Turkish Academy of Sciences in the framework of the Young Scientist Award Program (MD/TÜBA-GEBİP/2002-1-8).
References
[1] U. Bodenhofer, A Similarity-Based Generalization of Fuzzy Orderings Preserving the Classical
Axioms, Int. J. Uncertainty, Fuzziness and Knowledge-Based Systems 8 (3) (2000) 593-610.
[2] U. Bodenhofer, Similarity-Based Fuzzy Orderings: A Comprehensive Overview, Proc. EUROFUSE Workshop on Preference Modelling and Applications, Granada, Spain, 2001, pp. 21-27.
[3] U. Bodenhofer, Representations and Constructions of Similarity-Based Fuzzy Orderings, Fuzzy
Sets and Systems 137 (2003), 113-136.
[4] D. Boixader, J. Jacas and J. Recasens, Fuzzy Equivalence Relations: Advanced Material, in: D.
Dubois and H. Prade (Eds.), Fundamentals of Fuzzy Sets, The handbooks of fuzzy sets series,
Vol. 7, Kluwer Academic Publishers, Boston, 2000, pp. 261-290.
[5] U. Cerruti, U. Höhle, An Approach to Uncertainty Using Algebras Over a Monoidal Closed
Category, Suppl. Rend. Circ. Matem. Palermo Ser. II 12 (1986), 47-63.
[6] B. De Baets and R. Mesiar, Pseudo-Metrics and T -Equivalences, J. Fuzzy Math. 5 (1997),
471-481.
[7] B. De Baets and R. Mesiar, Metrics and T -Equalities, J. Math. Anal. Appl. 267 (2002), 531-547.
[8] M. Demirci, Fuzzy Functions and Their Applications, J. Math. Anal. Appl. 252 (2000) 495-517.
[9] M. Demirci, Fundamentals of M-Vague Algebra and M-Vague Arithmetic Operations, Int. J.
Uncertainty, Fuzziness and Knowledge-Based Systems 10 (1) (2002) 25-75.
[10] M. Demirci, Foundations of Fuzzy Functions and Vague Algebra Based on Many-Valued Equivalence Relations, Part I: Fuzzy Functions and Their Applications, Int. J. General Systems 32 (2)
(2003) 123-155.
[11] M. Demirci, Foundations of Fuzzy Functions and Vague Algebra Based on Many-Valued Equivalence Relations, Part II: Vague Algebraic Notions, Int. J. General Systems 32 (2) (2003) 157175.
[12] M. Demirci, Foundations of Fuzzy Functions and Vague Algebra Based on Many-Valued Equivalence Relations, Part III: Constructions of Vague Algebraic Notions and Vague Arithmetic Operations, Int. J. General Systems 32 (2) (2003) 177-201.
38
[13] M. Demirci, Theory of Vague Lattices Based on Many-Valued Equivalence Relations-I: Vague
Orderings, Vague Lattices and Their Representations, Fuzzy Sets and Systems (Submitted).
[14] M. Demirci, Theory of Vague Lattices Based on Many-Valued Equivalence Relations-II: Complete Vague Lattices and Their Representations, Fuzzy Sets and Systems (Submitted).
[15] P. Hájek, Metamathematics of Fuzzy Logic, Kluwer Academic Publishers, Dordrecht, Boston,
London, 1998.
[16] U. Höhle and N. Blanchard, Partial Ordering in L-Underdeterminate Sets, Inform. Sci. 35 (1985),
133-144.
[17] U. Höhle, Quotients with Respect to Similarity Relations, Fuzzy Sets and Systems 27 (1988)
31-44.
[18] U. Höhle, Many-Valued Equalities, Singletons and Fuzzy Partitions, Soft Computing 2 (1998)
134-140.
[19] U. Höhle, Classification of Subsheaves over GL-Algebra, Logic Colloquium’98, Lecture Notes
in Logic 13, Springer-Verlag, 1998.
[20] U. Höhle and A.P. Šostak, Axiomatic Foundations of Fixed-Basis Fuzzy Topology, in: U. Höhle
and S. E. Rodabaugh (Eds.), Mathematics of Fuzzy Sets: Logic, Topology and Measure Theory,
The hand books of fuzzy sets series, Vol.3, Kluwer Academic Publishers, Boston, Dordrecht,
1999, pp. 123-273.
[21] F. Klawonn and J. L. Castro, Similarity in Fuzzy Reasoning, Mathware and Soft Computing 2
(1995) 197-2281.
[22] F. Klawonn, Fuzzy Points, Fuzzy Relations and Fuzzy Functions, in: V. Novâk and I. Perfilieva
(Eds.), Discovering World with Fuzzy Logic, Physica-Verlag, Heidelberg, 2000, pp. 431-453.
[23] J. N. Mordeson and D.S. Malik, Fuzzy Commutative Algebra, World Scientific Publishing Co.
Pte. Ltd, Singapore, 1998.
[24] A. Rosenfeld, Fuzzy Groups, J. Math. Anal. Appl. 35 (1971) 512-517.
[25] A. Tepavčevič and G. Trajkovski, L-fuzzy Lattices: An Introduction, Fuzzy Sets and Systems
123 (2001) 209-216.
[26] H. Thiele and N. Schmechel, The Mutual Defineability of Fuzzy Equivalence Relations and
Fuzzy Partitions, Proc. Inter. Joint Conference of the Fourth IEEE International Conference on
Fuzzy Systems and the Second International Fuzzy Engineering Symposium, Yokohama, Japan,
1995, pp. 1383-1390.
[27] E. Trillas and L. Valverde, An Inquiry on Indistinguishability Operators, in: H. Skala et al.
(Eds.), Aspects of Vagueness, Reidel, Dordrecht, 1984, pp. 231-256.
[28] L. A. Zadeh, Similarity Relations and Fuzzy Orderings, Inform. Sci. 3 (1971) 177-200.
39
MV-algebras and semirings
A NTONIO D I N OLA , B RUNELLA G ERLA
Soft Computing Laboratory
Dept. Mathematics and Informatics
University of Salerno
84081 Baronissi (SA), Italy
E-mail: {❛❞✐♥♦❧❛|❜❣❡r❧❛}❅✉♥✐s❛✳✐t
Semirings are algebraic structures with two associative binary operations, where one distributes over
the other, introduced by Vandiver [10] in 1934. In more recent times semirings have been deeply
studied, especially in relation with applications ([5]). For example semirings have been used to model
formal languages and automata theory (see [4]), to deal with scheduling problems ([3]) and semirings
over real numbers ((max, +)-semirings) are the basis for the idempotent analysis [7].
In this work, we establish a relationship between semirings and many-valued logics.
Many-valued logic has been proposed to model phenomena in which uncertainty and vagueness
are involved. One of the more general classes of many-valued logics is the Basic logic defined in
[6] as the logic of continuous t-norms. Special cases of Basic logics are Łukasiewicz, Godel and
Product logic. In particular Łukasiewicz logic has been deeply investigated, together with its algebraic
counterpart, MV-algebras, introduced by Chang in [1] to prove completeness theorem of Łukasiewicz
logic.
MV-algebras have nice algebraic properties and can be considered as intervals of lattice-ordered
groups (see [2]). Łukasiewicz disjunction and conjunction are interpreted by the operations ⊕ and ⊙
of the MV-algebra [0, 1] given by
x ⊕ y = min{1, x + y}, x ⊙ y = max{0, x + y − 1}.
In spite of satisfying theoretical results regarding Łukasiewicz logic, all the attempts to use it as
an instrument to deal with uncertainty phenomena, for example in the fuzzy context, had to deal with
one of its main characteristic: conjunction and disjunction do not distribute one with respect to the
other.
In this paper we stress that operations ⊙ and ⊕ in any MV-algebra A both come from the same
operation in the lattice ordered group associated with A. In order to model the notion of conjunction
and disjunction one have instead to consider a lattice operation ∧ (or dually, ∨) together with the
MV-algebraic operation ⊕ (or dually ⊙).
An example of how this representation can be useful to model fuzzy phenomena will be given
in the field of automata. Indeed in [4], semirings have been proposed to give a generalization of
automata, the so called K-Σ- automata. More recently, automata with values in semirings over the
natural numbers or the real numbers sets have been deeply investigated both to finding results on
nondeterminism or infinite behavior of finite automata, and in the context of formal power series (see
[8], [9]). We shall give a description of automata having values in BL-algebras and MV-algebras.
40
References
[1] C.C. Chang, Algebraic analysis of many-valued logics. Trans. Amer. Math. Soc., 88:467490,1958.
[2] R. Cignoli, I.M.L. D’Ottaviano, D. Mundici. Algebraic foundations of many-valued reasoning,
volume 7 of Trends in Logic. Kluwer, Dordrecht, 2000.
[3] R. Cuninghame-Green. Minimax algebra. Lecture Notes in Economics and Mathematical Systems, no 166. Springer-Verlag, 1979.
[4] S. Eilenberg, Automata, Languages, and Machines, Academic Press, 1974.
[5] J. S. Golan. The theory of semirings with applications in mathematics and theoretical computer
science, Longman Scientific and Technical, 1992.
[6] P. Hájek. Metamathematics of Fuzzy Logic, Kluwer, Dordrecht, 1998.
[7] V.N. Kolokoltsov, V.P. Maslov. em Idempotent analysis and its applications, volume 401 of
Mathematics and its Applications. Kluwer, 1997.
[8] D. Krob. Some automata-theoretic aspects of min-max-plus semirings, In Idempotency, J. Gunawardena Ed., Cambridge University Press, 70-79, 1998.
[9] I. Simon. Recognizable sets with multiplicities in the tropical semiring. In M.P.Chytil et al., eds,
Lect. Notes in Computer Science, 324:107-120, 1988.
[10] H.S. Vandiver. Note on a simple type of algebra in which cancellation law of addition does not
hold. Bull. Amer. Math. Soc., 40:914-920, 1934.
41
On different ways of ordering conjoint evaluations
D IDIER D UBOIS , H ENRI P RADE
IRIT
Université Paul Sabatier
31062, Toulouse, cedex 4, France
E-mail: {❞✉❜♦✐s|♣r❛❞❡}❅✐r✐t✳❢r
Introduction
Operations for combining [0,1]–valued fuzzy set membership functions pointwisely,
such as triangular norms or co-norms, uni-norms, null-norms, etc, have been extensively
studied. Such operations indeed provide two services by returning a real number as a result of
the combination of the membership degrees: i) a numerical degree of conjoint membership is
assessed ; ii) one can take advantage of the linear order of the real numbers for comparing the
degrees.
However, in many practical problems (such as multiple criteria analysis, flexible
constraints satisfaction problems), the scale [0,1] is too rich for being used, and more
qualitative scales having a finite number of levels have to be preferred. But, the internal
operations that can be defined on the latter scales (e.g., Godo and Sierra, 1988; Mas et al.,
1999; Fodor, 2000) have a limited discriminating power since they take values on a finite
range.
In order to escape the dilemma of using either too expressive a scale which would
enable an accurate discrimination between the degrees, or a more appropriate scale leading to
too many ties, we investigate another route in this preliminary note. We are no longer looking
for global evaluations which then can be compared, but we are rather handling the
comparison of vectors of the membership degrees directly (following ideas already outlined in
(Dubois and Prade, 2001)) by introducing refinements of Pareto ordering.
Let L = {α0 = 0 < α1 < …< αL = 1} be a finite scale. Vectors of a given size N (α1, …,
α , … , αN) made of values in L, can be partially ordered by Pareto ordering, denoted by <P.
Let us, for instance, consider the case N = 2. We have (α0, α0) <P (α0, α1) <P (α1, α1) <P … <P
(αL-1, αL) <P (αL, αL). For notational simplicity we shall write (i, j) < (i’, j’), in place of (αi,
αj) <P (αi’, αj’). We assume symmetry, thus pairs (i, j) and (j, i) are equivalent, and by
convention when we write (i, j) it is assumed that i j. More generally, we have (i, j) < (k, l)
as soon as i k and j < l, or i < k and j l. The only undetermined cases are such that i < k
and j > l.
k
Motivating example
Once Pareto ordering is applied, what remains to specify is the ordering between pairs (i, j)
and (k, l) such that i > k and j < l (Moura-Pires and Prade, 2000). The situation for the case N
= 2, with L = {α0 = 0 < α1 < α2 < α3 = 1}, is pictured in Fig. 1.
42
Fig. 1. Refinements of Pareto ordering
The pending decisions are indicated in dotted lines. Such a refinement of <P will be
denoted by <r (refined ordering). For instance, as pictured in Fig. 1, (1, 3) <P (2, 3) and (2, 2)
<P (2, 3), while (2, 2) is <P-incomparable to (1, 3) and to (0, 3). Moreover, when specifying a
refinement <r, one should obey the transitivity requirement. For instance, it is impossible to
enforce (1, 3) <r (2, 2) and (2, 2) <r (0, 3) in the same time. One may also choose to complete
the Pareto ordering by enforcing equalities, e.g. (1, 1) =r (0, 2).
It can be checked that there are 12 different “linearizations” of <P without ties for N =
2 and L = 3. Here are four examples (the added decisions are indicated in bold):
(0, 0) <r (0, 1) <r (0, 2) <r (0, 3) <r (1, 1) <r (1, 2) <r (1, 3) <r (2, 2) <r (2, 3) <r (3, 3)
(0, 0) <r (0, 1) <r (1, 1) <r (0, 2) <r (1, 2) <r (2, 2) <r (0, 3) <r (1, 3) <r (2, 3) <r (3, 3)
(0, 0) <r (0, 1) <r (0, 2) <r (1, 1) <r (0, 3) <r (1, 2) <r (1, 3) <r (2, 2) <r (2, 3) <r (3, 3)
(0, 0) <r (0, 1) <r (1, 1) <r (0, 2) <r (1, 2) <r (0, 3) <r (1, 3) <r (2, 2) <r (2, 3) <r (3, 3).
The two first orderings are just the lexi-min and the lexi-max ordering respectively. In case L
is an interval scale, the third ordering above would correspond to the one that would be given
by an arithmetic mean refined by minimum, while the last ordering seems to be less simple to
interpret. Note that the number of levels that are thus obtained amounts to 10 elements (from
(0, 0) to (3, 3)), while L has 4 levels only.
Conversely, one may also consider the possibility of a coarsening (<c) of the Pareto
ordering, if some pairs, ordered by <P, are found as equally good, e. g., ∀i,j (0, i) =c (0, j), or
∀i,j (i, k) =c (j, k) for some k. We can thus express a form of absorption-like property for
some levels. Thus, other combination schemes can be recovered, by both completing and
coarsening the Pareto ordering, including the minimum:
(0, 0) =c (0, 1) =c (0, 2) =c (0, 3) <r (1, 1) =c (1, 2) =c (1, 3) <r (2, 2) =c (2, 3) <P (3, 3).
General framework
The above example has shown that it is possible to specify a variety of ranking modes
that are sufficiently discriminating, but still remaining in a qualitative setting. Generally
43
speaking, the problem is how to efficiently describe any Pareto-compatible ranking using a
small number of conditions on the relative positioning of a few tuples and to study the
characteristic properties of such rankings.
Lexi-f and other refinements
A natural idea is to start with an operation f from L×…×L to L, defined by an
aggregation structure (f1, f2, f3, …, fk, …) where f1 is the identity and fk is defined on Lk has k
arguments, and to use a refinement principle. One may for instance apply the lexi-f, a
generalization of the lexi-min or the lexi-max, defined for any globally increasing f (f strictlty
increases when all its arguments strictly increase), defined in the following way (Dubois,
Prade, 2001). Let us consider two N-vectors of evaluations I = (i1, … , iN) and J = (j1, … , jN).
Then I >lexi-f J ⇔ f(M(I) – M(J)) > f(M(J) – M(I)) where M(I) is the multi-set of evaluations
αik associated with I, and thus identical evaluations are discarded before applying f. This
means that in the above example with a 4-level scale, f(L×L) = {f2(0, 0), f2(1, 1), f2(2, 2), f2(3,
3)}. Thus, we cannot represent in this way an ordering such that (1, 1) < (0, 3) < (2, 2) for
instance (as it is the case for the two last examples of linear orderings of the previous section),
since f2(0, 3)∈ f(L×L) and the lexi-f cannot provide any refinement for the considered pairs. It
shows that any complete pre-order cannot be generated has a lexi-f ordering for some
qualitative aggregation structure f. An open question is how to characterize the descriptive
power of the lexi-f? Are there other meaningful refinement principles based on a N-ary
operation closed on L? We might think of using a transposition of Lorenz dominance defined
for real-valued vectors by u <Lorenz v ⇔ L(u) <P L(v) where L(u) = (u1, u1 + u2, …, u1 + … +
uN), assuming u1 X2 «XN. Taking L(u) = (u1, f(u1, u2), …, f(u1, …, uN)) enables the
non-trivial refinement of Pareto ordering for suitable choices of f.
Possible requirements
Indeed the above example indicates that there exists a large set of worth investigating
refinements which can be specified without using an aggregation structure f. Obviously, it
raises the question of how requirements on the ordering between the vectors can be expressed
in the general case, i.e., for N larger than 2, or when L has more than 4 levels. What would be
natural in order to moderate the combinatorics for defining a complete relation <r in the
general case is to introduce various requirements on the ordering. We already mentioned the
symmetry condition (the comparison of two vectors should not depend on the way the
components of the vectors are displayed). Other possible natural requirements that may be
thought of are the following ones:
- A weak form of preferential independence holds, namely:
(αi, αj) <r (αi’, αj’) ⇒ (αI, αi, αJ, αj, αK) <r (αI, αi', αJ, αj’, αK)
(PI)
where I, J, K are subsets of exponents and α stands for the vector of α ’s where k ∈ I. Note
that this requirement is still in the spirit of the lexi-f. This leads using Pareto ordering to
I
k
(αi, αj) <r (αi’, αj’), αI P αI’, αJ P αJ’, αK P αK’ ⇒ (αI, αi, αJ, αj, αK) <r (αI’, αi’, αJ’, αj’,
α )
K’
Thus, we will have (1, 1) < r (0, 2) ⇒ (1, 1, 1) <r (0, 1, 2) <P (0, 2, 2).
- However, the use of this principle can be seriously questioned as suggested by the following
example. Assume (0, 3) <r (1, 2). Then (0, 3, 4, 5) < (1, 2, 4, 5) applying PI. But it may be the
case that (3, 4) >r (2, 5) and (0, 5) >r (1, 4), which would rather lead to state (0, 3, 4, 5) >r (1,
2, 4, 5), at least if we assume the other natural cumulative principle and we use symmetry:
αI <r αI’, αJ <r αJ’ ⇒ (αI, αJ) <r (αI’, αJ’)
(C)
But this new principle itself cannot lead to a safe extension of <r, as shown by the following
example. Assume (0, 3) <r (1, 2), (3, 6) <r (4, 5), (2, 4) <r (3, 3), (1, 5) <r (0, 6). (C) applied to
44
the two first relations entail (0, 3, 3, 6) <r (1, 2, 4, 5), while the last two lead to (0, 3, 3, 6) >r
(1, 2, 4, 5)!
- Other examples of generic principles are “translation” rules. Namely,
(αI, αi , αJ, αj, αK) <r (αI’, αi’, αJ’, αj’, αK’) ⇒ (αI, αi+x , αJ, αj+x, αK) <r (αI’, αi’+x, αJ’, αj’+x,
αK’)
for x> 0, and i+x, j+x, i'+x, j’+x less than L. A similar condition can be used changing + x
into − x.
- Lastly, one may also use a “transference” principle of the form (i, i) < (i − 1, i + 1) for any i
RUPRUHJHQHUDOO\WKDW LM L− 1, j + 1) (we may also think of the converse principle).
This latter condition applied to the case of a 5-level scale, for instance, considerably reduces
the number of remaining questions to answer in order to define a complete ordering. Namely
we have, applying Pareto ordering together with the latter condition, (0, 0) < (0, 1) < (1, 1) <
(0, 2) < (1, 2) < (0, 3)? (2, 2) < (1, 3) < (0, 4)? (2, 3) < (1, 4)? (3, 3) < (2, 4) < (3, 4) < (4, 4),
where the question marks stand for undetermined relations. We would even have only one
indetermination, (0, 3)? (2, 2), if we add the previous translation constraints (i, j) < (i', j’) ⇒
(i, j + 1) < (i', j’ +1) and (i + 1, j) < (i' + 1, j’) with i + 1 < j and i' + 1 < j’.
Note that the transference principle is in the spirit of Pigou-Dalton transferring in social
choice, which enables Pareto ordering on vectors of real numbers u = (u1, …, uN) to be
extended by stating (..., ui, …, uj, …) < (..., ui − ε, …, uj + ε, …) where 0 ε Xi − uj. It is
known that this refinement is equivalent to Lorenz dominance. See (Spanjaard, 2003) for
details and references. Note that in our framework, the counterpart of this idea is written
(αi, αj) < (αi−1, αj+1) where ∀k, αk∈ L, since neither αj + ε nor αj + αk make sense.
Using conditions on the rank of the elements of the scale
As it can be seen, the refinements of Pareto ordering raise problems, and anyway do
not lead to a complete ordering generally. A more efficient way for getting complete
orderings is to define them through conditions and operations on the indices numbering the
elements of the scale. Namely
f(i, j) < f(i’, j’) ⇒ (αi, αj) <r (αi’, αj’)
If f is associative, it is simple to extend the definition to N-vectors. This is compatible with
Pareto ordering if f is non-decreasing, i.e.
(αi, αj) <P (αi’, αj’) ⇒ f(i, j) < f(i’, j’)
In case f(i, j) = f(i’, j’) it might be further refined by another condition. For example,
(0, 0) <r (0, 1) <r (0, 2) <r (1, 1) <r (0, 3) <r (1, 2) <r (1, 3) <r (2, 2) <r (2, 3) <r (3, 3)
is generated by f(i, j) = i +j refined by min(i, j) < min(i’, j’) if i + j = i’ + j’. Note that this
ordering violates the transference property.
However, generally speaking, it is not clear that any complete pre-ordering refining Pareto
ordering can be specified in such a way using integer-valued arithmetic operations.
Conclusion
This informal discussion is not intended to bring any new substantial result. Still it is a
preliminary attempt at understanding how to characterize complete pre-order structures
capable of modeling different behaviors for comparing qualitative evaluation profiles.
References
D. Dubois, H. Prade. Refining aggregation operations in finite ordinal scales. Proc. Inter. Conf. in Fuzzy Logic
and Technology (EUSFLAT 01), Leicester, UK, Sept. 5-7, 2001, 175-178.
J. Fodor Smooth associative operations on finite ordinal scales. IEEE Trans. Fuzzy Systems, 8, 791-795, 2000.
45
L. Godo, C. Sierra A new approach to connective generation in the framework of expert systems using fuzzy
logic. Proc. 18th Inter. Symp. Multiple-Valued Logic, Palma, 157-162, 1988.
M. Mas, G. Mayor, J. Torrens t—operators and uninorms on a finite totally ordered set. Int. J. Intelligent
Systems, 14, 909-922, 1999.
J. Moura-Pires, H. Prade. Specifying fuzzy constraints interactions without using aggregation operators. Proc.
9th IEEE Int. Conf. on Fuzzy Systems (FUZZ-IEEE’00), San Antonio (Texas), May 7-10, 2000, 228-233.
O. Spanjaard, Exploitation de préférences non-classiques dans les problèmes combinatoires: modèles et
algorithmes pour les graphes. Thèse de Doctorat en Informatique, Université Paris IX Dauphine, 16 déc. 2003.
46
A definition of subjective possibility
D IDIER D UBOIS1 , H ENRI P RADE1 , P HILIPPE S METS2
1 IRIT
Université Paul Sabatier
31062, Toulouse, cedex 4, France
E-Mail: {❞✉❜♦✐s|♣r❛❞❡}❅✐r✐t✳❢r
2 IRIDIA
Université Libre de Bruxelles
1050 Bruxelles, Belgium
E-Mail: ♣s♠❡ts❅✉❧❜✳❛❝✳❜❡
Quantitative possibility theory (QPT) was proposed as an approach to the representation of
quantified uncertainty (Zadeh, 1978; Dubois and Prade 1988, 2000). In order to sustain this
claim, operational semantics could be instrumental. In the subjectivist context, quantitative
possibility theory somehow competes with probability theory in its personalistic or Bayesian
views and with the Transferable Belief Model (TBM) (Smets and Kennes 1994; Smets 1998),
both of which also intend to represent degrees of belief. We use the term ‘subjectivist’ to
mean that we consider the concepts of beliefs (how much we believe) and betting behaviors
(how much would we pay to enter into a game) without regard to the possible random nature
and repeatability of the events. An operational definition, and the assessment methods that
can be derived from it, provides a meaning to the value .7 encountered in statements like ‘my
degree of belief is .7’. Bayesians claim that any state of incomplete knowledge of an agent can
be modeled by a single probability distribution on the appropriate referential, and that degrees
of belief coincide with probabilities that can be revealed by a betting experiment in which the
agent provides betting odds under an exchangeable bet assumption. A similar setting exists
for imprecise probabilities (Walley, 1991), relaxing the assumption of exchangeable bets, and
more recently for the TBM as well (Smets, 1997), introducing several betting frames
corresponding to various partitions of the referential. In that sense, numerical values
encountered in these three theories are well defined.
QPT seems to be a theory worth exploring as well, and rejecting it because of the current lack
of convincing semantics would be unfortunate. The recent revival, by De Cooman and
colleagues (1999), of a form of subjectivist QPT due to Giles (1982), and the development of
possibilistic networks based on incomplete statistical data (Borgelt and Kruse, 2003) suggests
on the contrary that it is fruitful to investigate various operational semantics for possibility
theory. This is due to several reasons: first possibility theory is a special case of most existing
non-additive uncertainty theories, be they numerical or not. Hence progress in one of these
theories usually has impact in possibility theory. Another major reason is that possibility
theory is very simple, certainly the simplest competitor for probability theory, for instance
when using fuzzy numbers in fuzzy optimization problems. The aim of this paper is to
propose subjectivist semantics for numerical possibility theory.
47
Such subjectivist semantics differs from the upper and lower probabilistic setting proposed by
Giles and followers, without questioning its merit. Instead of making the bets nonexchangeable, we assume that the exchangeable betting rates only imperfectly reflect an
agent’s beliefs.
For long, it had been realized that possibility functions are mathematically identical to
consonant plausibility functions (Shafer, 1976) so using the semantics of the TBM for
producing a semantics for quantitative epistemic possibility theory is an obvious approach,
even if not explored in depth so far.
Consider what beliefs held by an agent on what is the actual value of a variable ranging on a
set Falled the frame of discernment. It is assumed that such beliefs can be represented by a
belief function. A belief function can be mathematically defined from a finite random set that
has a very specific interpretation. The so-called basic belief mass assigned to each set is
understood as the weight given to the fact that all the agent may know is that the value of the
variable of interest lies somewhere in that set. A plausibility function evaluates to what extent
events are consistent with the available evidence. When the sets with positive mass are nested,
the plausibility function is called a possibility measure, and can be characterized, just like
probability, by an assignment of weights to singletons, called a possibility distribution.
The agent’s beliefs cannot be directly assessed. All that can be known is the value of the
`pignistic' probabilities the agent would use to bet on the frame 6PHWV 7KH
pignistic probability induced by a mass function is built by defining a uniform probability on
each set of positive mass, and performing the convex mixture of these probabilities according
to the mass function. In terms of game theory it corresponds to the Shapley value of a game;
in terms of upper and lower probabilities it is the centre of gravity of the set of probabilities
dominating the belief function. The pignistic probability is what is obtained by means of the
random simulation of a fuzzy number, picking a cut at random followed by a random choice
of an element in the cut, as studied by Chanas and Nowakowski (1988), among others.
The knowledge of the values of the probability p allocated to the elements of Ω is not
sufficient to construct a unique underlying belief function whose pignistic transform is p.
Many belief functions induce the same probability distribution. For instance, uniform betting
rates on Ω either correspond to complete ignorance on the values of the variable, or to the
knowledge that the variable is random and uniformly distributed. So all that is known about
the mass function that represents the agent's beliefs is that it belongs to the ones that induce
the supplied probability. Under this scheme, we do not question the exchangeability of bets,
as done by Walley, Giles and others. What we question is the assumption of a one-to-one
correspondence between betting rates produced by the agent, and the actual beliefs
entertained by the agent. Betting rates do not tell if the uncertainty of the agent results from
the perceived randomness of the phenomenon under study or from a simple lack of
information about it.
The belief functions whose pignistic transform is p are called isopignistic belief functions and
form the set IP(p). Since several mass functions lead to the same betting rates, one has to
select one that most plausibly reflects the actual state of belief of the agent. A cautious
approach is to obey a `least commitment principle' that states that one should never
48
presuppose more beliefs than justified. Then, one should select the ‘least committed’ element
in the family of mass functions compatible with the pignistic probability function prescribed
by the obtained betting rates. The first main result of this paper is that the least committed
belief function, among the ones which share the same pignistic transform, is consonant, that
is, the corresponding plausibility function is a possibility function. This possibility function is
the unique one in the set of plausibility functions having this prescribed pignistic probability,
because the pignistic transformation is a bijection between possibilities and probabilities. So
this possibility function corresponds to the least committed mass function whose transform is
equal to the probability supplied by the agent.
This result is formalized on the basis of a measure of non-commitment of a belief function,
namely the average of the cardinalities of its focal elements weighted by the mass function.
Let m be a mass function from 2 to [0, 1], and let I(m) = A⊆Ω m(A)card(A) be its
imprecision measure estimating the extent to which it is non-committal. Let p be the
probability distribution obtained by eliciting an agent’s betting rates on the frame ,W LV
assumed that the actual belief of the agent is modeled by a mass function on VXFKWKDWS
Pig(m) is the pignistic transform of m, that is :
p(w) = A: w ∈A m(A)/ card(A)
(1)
This is an extension of Laplace indifference principle, according to which equally possible
outcomes have equal probability. It is a weighted form thereof. It is suggested that the least
debatable representation of an agent’s belief is the mass function m* which maximizes I(m)
under the constraint (1) induced by betting rates.
Theorem 1: The mass function m* which maximizes I(m) under the constraint Pig(m) = p is
consonant. It defines a unique possibility distribution π defined by
π(w) = u ∈ min(p(w), p(u)), w ∈
It is the converse of the pignistic transform of a possibility distribution, the converse of the
transformation used by Chanas and Nowakovski. This probability/possibility transform was
already proposed without formal justification by Dubois and Prade (1983).
This result was already announced by the authors in (Dubois et al. 2001), but its proof is still
unpublished. It contrasts with a similar result by Smets (2000) that uses a notion of
information index based on the commonality function.
Moreover, Smets (2000) suggested that the least specific isopignistic belief function
−1
according to the commonality ordering (based on Q(A) = A⊆E m(E) ) is also Pig (Pig(m)).
This ordering is less intuitive than the specialization ordering and the inclusion of Bel-Pl
intervals. However, there is indeed a unique minimally Q-informative belief function in
IP(p), and it is precisely the one found by maximizing I(m). But the commonality ordering
turns to be more natural than one could think at first glance, since, in order to show the above
result expressed by Theorem 2 below, we first prove that, for ensuring comparability in the
49
sense of the Q-informativeness ordering between a consonant belief function and a belief
function, it is enough to rely on singletons:
Lemma : Consider a belief function with mass function m and a possibility distribution
π with respective commonality functions Q and Qπ.. Then Qπ(A) ≥ Q(A), ∀A ⊆ Ω if and only
if π(ω) ≥ Pl({ω}), ∀ω ∈ Ω.
Theorem 2: The unique consonant mass function in IP(p) (induced by the possibility
distribution defined by (2)), is minimally Q-informative.
These results provide a first reply to objections raised by Bayesian subjectivists against the
use of fuzzy numbers and numerical possibility theory in decision-making and uncertainty
modeling tasks. Interestingly, this approach does not refute the Bayesian operational setting; it
only questions the interpretation of betting rates as full-fledged degrees of belief.
References
C. Borgelt R. Kruse (2003) Learning graphical possibilistioc models from data. IEEE trans. On Fuzzy Systems,
11, 159-171.
Chanas S. and Nowakowski M. (1988). Single value simulation of fuzzy variable, Fuzzy Sets and Systems, 25,
43-57.
De Cooman G., Aeyels D. (1999). Supremum-preserving upper probabilities. Inform. Sciences, 118, 173 –212.
Dubois D. and Prade H. (1983) Unfair coins and necessity measures: towards a possibilistic interpretation of
histograms. Fuzzy Sets and Systems, 10, 15-20.
Dubois D. and Prade H. (1988). Possibility Theory, Plenum Press, New York.
Dubois D., Nguyen H. T., Prade H. (2000) Possibility theory, probability and fuzzy sets: misunderstandings,
bridges and gaps. In: Fundamentals of Fuzzy Sets, (Dubois, D. Prade,H., Eds.), Kluwer , Boston, Mass., The
Handbooks of Fuzzy Sets Series, 343-438.
Dubois D. and Prade H. Smets P. (2001) New semantics for quantitative possibility theory. Proc. of the
6th.European Conference on Symbolic and Quantitative Approaches to Reasoning and Uncertainty
(ECSQARU 2001, Toulouse, France). LNAI 2143, Springer-Verlag, 410-421.
Giles R. (1982). Foundations for a theory of possibility, Fuzzy Information and Decision Processes (Gupta M.M.
and Sanchez E., eds.), North-Holland, 183-195.
Shafer G. (1976). A Mathematical Theory of Evidence, Princeton University Press, Princeton.
Smets P. (1990). Constructing the pignistic probability function in a context of uncertainty, Uncertainty in
Artificial Intelligence 5 (Henrion M. et al., Eds.), North-Holland, Amsterdam, 29-39.
Smets P. and Kennes R. (1994). The transferable belief model, Artificial Intelligence, 66, 191-234.
Smets P. (1997). The normative representation of quantified beliefs by belief functions. Artificial Intelligence,
92, 229-242.
Smets P. (1998) The transferable belief model for quantified belief representation. Handbook of Defeasible
Reasoning and Uncertainty Management Systems, vol.1. (D.M. Gabbay, P. Smets, eds) Kluwer, Dordrecht,
The Netherlands, 267-301.
Smets, P. (2000) Quantified possibility theory seen as an hypercautious transferable belief model. Proc.
Rencontres Francophones sur les Logiques Floues et ses Applications. (LFA 2000, La Rochelle, France),
Cepadues, Editions, Toulouse, France, 343-353.
Walley P. (1991). Statistical Reasoning with Imprecise Probabilities, Chapman and Hall.
Zadeh L. A. (1978). Fuzzy sets as a basis for a theory of possibility, Fuzzy Sets and Systems, 1, 3-28.
50
Partially ordered monads and powerset Kleene algebras
PATRIK E KLUND1 , W ERNER G ÄHLER2
1 Department
of Computing Science
Umeå University
90187 Umeå, Sweden
E-Mail: ♣❡❦❧✉♥❞❅❝s✳✉♠✉✳s❡
2 Scheibenbergstr.
37
12685 Berlin, Germany
E-Mail: ❣❛❡❤❧❡r❅r③✳✉♥✐✲♣♦ts❞❛♠✳❞❡
Composing various powerset functors with the term monad gives rise to the concept of generalised
terms. The goal is to extend traditional term unification with unification involving powersets of terms.
This enables a study of substitutions and unifiers within Kleisli categories related to particular monads.
As constructions of monads involve complicated calculations with natural transformations, proofs
are supported by a graphical approach that provides a useful tool for handling various conditions, such
as those for distributive laws.
Monads equipped with order structures extends suitably to so called partially ordered monads.
We will show how these partially ordered monads, together with their subconstructions, contribute
to providing a generalised notion of powerset Kleene algebras. This generalisation builds upon more
general powerset functor setting far beyond just strings (Kleene, 1956) and relations (Tarski, 1941)
References
[1] P. Eklund, W. Gähler, Fuzzy filter functors and convergence, Applications of category theory
to fuzzy subsets. (S. E. Rodabaugh, et al ed.), Theory and Decision Library B, Kluwer, 1992,
109-136.
[2] P. Eklund, W. Gähler, Completions and Compactifications by Means of Monads, in: Fuzzy
Logic; State of Art, Kluwer, Dortrecht/Boston/London 1993, pp 39-56.
[3] P. Eklund, M.A. Galán, M. Ojeda-Aciego, A. Valverde, Set functors and generalised terms,
Proc. 8th Information Processing and Management of Uncertainty in Knowledge-Based Systems
Conference (IPMU 2000), 1595-1599.
[4] P. Eklund, M.A. Galán, J. Medina, M. Ojeda-Aciego, A. Valverde, Composing submonads, Proc.
31st IEEE Int. Symposium on Multiple-Valued Logic (ISMVL 2001), May 22-24, 2001, Warsaw,
Poland, 367-372.
[5] P. Eklund, M. A. Galán, J. Medina, M. Ojeda Aciego, A. Valverde, A categorical approach to
unification of generalised terms, Electronic Notes in Theoretical Computer Science 66 No 5
(2002). URL: http://www.elsevier.nl/locate/entcs
/volume66.html.
51
[6] W. Gähler, General Topology – The monadic case, examples, applications, Acta Math. Hungar.
88 (2000), 279-290.
[7] W. Gähler, P. Eklund, Extension structures and compactifications, In: Categorical Methods in
Algebra and Topology (CatMAT 2000), 181–205.
[8] S. C. Kleene, Representation of events in nerve nets and finite automata, In: Automata Studies
(Eds. C. E. Shannon, J. McCarthy), Princeton University Press, 1956, 3-41.
[9] D. E. Rydeheard, R. M. Burstall, A categorical unification algorithm, Proc. Summer Workshop
on Category Theory and Computer Programming, 1985, LNCS 240, Springer-Verlag, 1986,
493-505.
[10] A. Tarski, On the calculus of relations, J. Symbolic Logic 6 (1941), 65-106.
52
Structured lattices and ground categories of L-sets
A NNA F RASCELLA , C OSIMO G UIDO
Dept. of Mathematics
University of Lecce
73100 Lecce, Italy
E-mail: ❝♦s✐♠♦✳❣✉✐❞♦❅✉♥✐❧❡✳✐t
It is quite well known since [4] in the contest of fuzzy mathematics that in many disciplines and
especially in fuzzy topology it is very useful to set up the classes of objects and of morphisms to deal
with (e.g. the working category, dubbed “ground category”) as well as to associate to each morphism
between two objects suitable operators, in both directions,(namely powerset operators) between the
lattices of “canonical subobjects”(namely powersets) of the considered objects.
Among papers mainly devoted to this topic we quote [2, 3, 5, 6] : the ground categories constructed
in [5, 6], either in the fixed-basis or in the variable-basis context, contain only objects associated to
(crisp) sets; the objects of the ground categories considered in [2, 3] are arbitrary L-sets (L a suitable,
fixed complete lattice).
Though not explicitly listed among the elements of the ground categories, powersets associated to
objects and powerset operators associated to morphisms (i.e. powerset functors, as they are defined
in [2]) are fundamental in most applications of this sort of set theory based on ground categories; for
instance, in fuzzy topology, which in any case lies between classical topology and pointless topology,
topologies are (M)-subsets of some ground object and (special) morphisms are maps satisfying properties expressed in terms of the powerset operators. In [5, 6] one can find a detailed and motivated
justification for extending powersets and powerset operators from the traditional case of classical set
theory to a more general context, including, as a first step, the Zadeh powerset operators. These operators are also the fundamental tool for the construction of powerset operators in [2, 3] and so they
will be in this new approach.
Here an original idea of [1] is extended and developed so as to allow the construction of powerset
operators to be applied in more general situation, including those considered in [2, 3] and a special
case of variable-basis fuzzy set theory extended to arbitrary L-sets.
The fundamental aspect of the construction presented here is a sort of localization of the process
leading to the definition of forward and backward powerset operators both of which can be obtained
in the same way, by using the corresponding Zadeh operators.
This process could be further extended by considering fuzzy sets as lattice-bundles so as to extend
and include the general case of Rodabaugh’s variable-basis fuzzy set theories.
References
[1] C. De Mitri and C. Guido, G-fuzzy topological spaces and subspaces, Rend. Circolo Matem.
Palermo Suppl. 29 (1992) 363-383
53
[2] C. De Mitri and C. Guido, Some remarks on fuzzy powerset operators, Fuzzy Sets and System
126 (2002) 241-251.
[3] C. Guido, The subspace problem in the traditional point-set context of fuzzy topology, Quaestiones Mathematicae 20 (3) (1997) 351-372.
[4] U. Höhle and S. E. Rodabaugh,eds, Mathematics of Fuzzy Sets: Logic, Topology, and Measure Theory, The Handbooks of Fuzzy Sets Series, Vol 3 (1999), Kluwer Academic Publishers(Dordrecht).
[5] S. E. Rodabaugh, Powerset operator foundations for poslat fuzzy set theories and topologies in
[4], 91-116.
[6] S. E. Rodabaugh Powerset operator based foundation for point-set lattice- theoretic (poslat)
fuzzy-set theories and topologies, Quaestiones Mathematicae 20(3) (1997), 463-530.
54
Fuzzy relation equations and fuzzy control —
some old and some new ideas
S IEGFRIED G OTTWALD
Institute for Logic and Philosophy of Science
Leipzig University
04107 Leipzig,Germany
E-mail: ❣♦tt✇❛❧❞❅✉♥✐✲❧❡✐♣③✐❣✳❞❡
In fuzzy control, it is a well known approach to transfer, with reference to the compositional rule of
inference, a list of linguistic control rules of the form
IF
α is Ai , THEN β is Bi ,
i = 1, . . . , n
into a system of fuzzy relation equations
Ai ◦ R = Bi ,
1 ≤ i ≤ n,
for a fuzzy relation R which has to be determined as a solution of this system of relation equations.
The presentation shall have its focus on methodological considerations, will remind some approaches toward solvability considerations for such systems as well as toward approximate solutions
like [4, 3], and extend them slightly with reference to some recent results explained e.g. in the papers
[1, 2, 5].
But we will also give an embedding of this methodology to treat fuzzy control problems into a
wider perspective of handling an interpolation problem in an approximative way.
And we shall go on to look at some open problems from a rather general point of view.
References
[1] S. Gottwald, Generalised solvability behaviour for systems of fuzzy equations, in: V. Novák, I. Perfilieva (Eds.), Discovering the World with Fuzzy Logic, Advances in Soft Computing, Physica-Verlag:
Heidelberg, 2000, 401–430.
[2] S. Gottwald, V. Novák, I. Perfilieva, Fuzzy control and t-norm-based fuzzy logic. Some recent results,
in: Proc. 9th Internat. Conf. IPMU’2002, ESIA – Universit’e de Savoie, Annecy, 2002, 1087–1094.
[3] G. Klir, B. Yuan, Approximate solutions of systems of fuzzy relation equations, in: FUZZ-IEEE ’94.
Proc. 3rd Internat. Conf. Fuzzy Systems, Orlando FL, 1994, 1452–1457.
[4] F. Klawonn, Fuzzy points, fuzzy relations and fuzzy functions, in: V. Novák, I. Perfilieva (Eds.), Discovering the World with Fuzzy Logic, Advances in Soft Computing, Physica-Verlag: Heidelberg, 2000,
431–453.
[5] I. Perfilieva, S. Gottwald, Fuzzy function as a solution to a system of fuzzy relation equations, Internat.
J. General Systems, 32 (2003) 361–372.
55
Capacities on lattices
M ICHEL G RABISCH
Université Paris I Panthéon-Sorbonne
75015 Paris, France
E-mail: ▼✐❝❤❡❧✳●r❛❜✐s❝❤❅❧✐♣✻✳❢r
1
Introduction
Capacities [3] have been introduced by Choquet, and rediscovered by Sugeno [13] under the name of
fuzzy measures. On a mathematical point of view, these are monotonic set functions µ : P (N) −→ [0, 1]
over some set N (assumed to be finite in this paper), or otherwise said, isotone mappings from the
Boolean lattice (2N , ⊆) to the linear lattice ([0, 1], ≤), preserving top and bottom. Usual tools used in
capacity theory are the Möbius transform [11], the Choquet integral, and interaction index [5].
Recently, Grabisch and Labreuche have proposed the concept of bi-capacities [7, 6], which generalizes capacities for bipolar scales in a context of decision making. Mathematically speaking, these
/ being increasare functions v : Q (N) −→ [−1, 1], where Q (N) := {(A, B) ∈ 2N × 2N | A ∩ B = 0},
ing in first coordinate and decreasing in second one. More abstractly, a bi-capacity is an isotone
mapping from the lattice (3N , ⊑) to the linear lattice ([−1, 1], ≤) preserving top and bottom, where
(A, B) ⊑ (C, D) iff A ⊆ C and B ⊇ D. Usual tools of capacity theory mentionned above have all been
generalized to bi-capacities.
Taking this as a starting point, one may define capacities as isotone mappings from some lattice L
to ([−1, 1], ≤), preserving top and bottom. This can be interpreted in decision making and even larger
domains such as knowledge discovery [10]. The aim of the paper is to show how to generalize usual
tools of capacity theory to this general setting, using the less possible restrictions on the lattice L. For
the Choquet integral, we refer the reader to [9].
We will make a particular mention of belief functions (see a pioneering work by Barthélemy
defining belief functions on lattices [1]), and refer the reader to [8] for the case of possibility measures.
2
Capacities on lattices
(for a reference on lattices, see [2]) Let (L, ≤) be a finite lower locally distributive lattice, we denote
as usual ∨, ∧, ⊤, ⊥ supremum, infimum, top and bottom. Any such lattice can be represented uniquely
by its ∨-irreducible elements in an irredundant decomposition [4]. An element i ∈ L is a ∨-irreducible
element if i 6= ⊥ and it has only one predecessor. Let us call J (L) the set of all ∨-irreducible elements
of L. For any x ∈ L, we denote by η∗ (x) its unique irredundant decomposition in join-irreducible
elements.
For x, y ∈ L, we say that x covers y (or y is a predecessor of x), denoted x ≻ y, if there is no
z ∈ L, z 6= x, y such that x ≤ z ≤ y.
56
Let v : L −→ R be a real-valued function on L. v is a capacity if v is isotone. Bottom and top have
to be preserved if one replaces R by any closed interval.
3
Möbius transform
The first fundamental concept in capacity theory is the Möbius transform. Following the general
definition of Rota [11] (see also [2, p. 102]), we have already a definition for the general case. For any
function f on (L, ≤), the Möbius transform of f is the function m : L −→ R solution of the equation:
f (x) =
∑ m(y).
y≤x
The expression of m is obtained through the Möbius function µ by:
m(x) =
∑ µ(y, x) f (y)
y≤x
where µ is defined inductively by
1,
− ∑x≤t<y µ(x,t),
µ(x, y) =
0,
4
if x = y
if x < y
otherwise.
Derivative of functions on lattices
Let (L, ≤) be a finite lower locally distributive lattice, and f : L −→ R a real-valued function on it.
Definition 1. Let i ∈ J (L). The derivative of f w.r.t. i at point x ∈ L is given by:
∆i f (x) := f (x ∨ i) − f (x).
Note that ∆i f (x) = 0 if i ≤ x. We say that the derivative ∆i f (x) is Boolean if [x, x ∨ i] is the Boolean
lattice 21 , otherwise said x ∨ i ≻ x.
Using the irredundant decomposition, the derivative w.r.t any element y can be defined.
Definition 2. Let x, y ∈ L, and y = ∨nk=1 ik be the irredundant decomposition of y into join-irreducible
elements. Then the derivative of f w.r.t y at point x is given by:
∆y f (x) = ∆i1 (∆i2 (· · · ∆in f (x) · · · )).
The derivative is Boolean if [x, x ∨ y] is the Boolean lattice 2n . The derivative is 0 if for some k,
ik ≤ x.
We express the derivative in terms of the Möbius transform of f .
Theorem 3. Let x, y ∈ L, such that ∆y f (x) is Boolean. Then
∆y f (x) =
∑
z∈[y,x∨y]
57
m(z).
5
Shapley value and interaction index
We need some additional structure on L at this point. We consider finite lower locally distributive
lattices L1 , . . . , Ln , with top and bottom of Li denoted ⊤i , ⊥i , i = 1, . . . , n, and L is the product lattice
L := L1 × · · · × Ln with the product order. A vertex of L is an element x = (x1 , . . . , xn ) of L where xi is
either ⊤i or ⊥i , for i = 1, . . . , n. We denote Γ(L) the set of vertices of L. Note that if L is a Boolean
lattice, then L = Γ(L).
We begin by defining the importance index as the interaction index w.r.t. a single join-irreducible
element.
Definition 4. Let i = (⊥1 , . . . , ⊥ j−1 , i0 , ⊥ j+1 , . . . , ⊥n ) be a join-irreducible element of L. The interaction w.r.t. i of v is any function of the form
∑
I(i) :=
α1h(x) ∆i v(x),
(1)
j−1
x∈Γ(∏k=1 Lk )×{i0 }×Γ(∏nk= j+1 Lk )
where i0 is the (unique) predecessor of i0 in L j , h(x) is the number of components of x equal to ⊤l ,
l = 1, . . . , n, and α1k ∈ R for any integer k.
Observe that the constants α1h(x) do not depend on i. Also, the derivative is Boolean.
S
Let us generalize Definition 4 to a class of elements of L denoted L̃ and defined as follows: L̃ :=
J⊆N L̃J , with
L̃J := {x ∈ L | ∀k ∈ J, ∃ik ∈ Lk such that ∀i ∈ η∗ (xk ), i ≻ ik ,
and xk = ⊥k if k ∈ N \ J}
In words, it is the set of elements whose coordinates are either bottom or such that the irredundant
decomposition covers a unique element. Observe that for the case where Lk is a linear lattice or a
Boolean one (i.e. practical cases fo interest), L̃ = L.
Definition 5. Let K ⊆ N, and x ∈ L̃K , and denote as above for all k ∈ K, ik the element covered by all
i ∈ η∗ (xk ). The interaction w.r.t. x of v is any function of the form
∑
I(x) :=
|J|
αh(y) ∆x v(y)
(2)
y|yk =⊤k or ⊥k if k6∈K,yk =ik else
where J is the set of join-irreducible elements in the decomposition of x.
The derivative is Boolean if in addition the Lk ’s are modular (and hence distributive).
We have the following general result.
Theorem 6. Let K ⊆ N, and assume distributivity holds for every Lk , k ∈ K. The expression of the
interaction index for x ∈ L̃K in terms of the Möbius transform is given by:
I(x) =
∑
|J|,|K|
βk(z) m(z),
z∈[x,x̌]
with x̌k := (⊤k ) for k 6∈ K, and x̌k = xk else, J is the set of join-irreducible elements in the decomposition of x, and k(z) is the number of coordinates of z not equal to ⊥l , l = 1, . . . , n. Moreover, the real
|J|,|K|
|J|
constants βk(z) are related to the αh(x) ’s by:
|J|,|K|
βk(z)
=
n−k(z)
∑
l=0
n − k(z) |J|
α(k(z)−|K|+l)
l
58
(3)
6
Belief functions on lattices
Let L be a lattice. Following the classical definition, we say that a capacity v : L −→ [0, 1] on L is a
belief function iff its Möbius transform is non negative, and v preserves top and bottom. Barthélemy
has shown in [1] that this is equivalent to say that v is k-monotone for all k > 2, the definition of
k-monotonicity being adapted in the obvious way for our general setting.
In fact, most of properties of belief functions are still true when defined on a lattice. We show in
the sequel the decomposition of belief functions into simple support functions, which generalizes the
classical result of Shafer [12].
For any belief function b on L, we define the corresponding commonality function q by q(x) :=
∑y≥x m(y), where m is the Möbius transform of b.
Let b1 , b2 be two belief functions on L, m1 , m2 their Möbius transform, and q1 , q2 their commonality functions. The Dempster rule of combination of b1 , b2 , denoted b1 ⊕ b2 is defined in terms of its
Möbius transform by
m1 ⊕ m2 (x) = ∑ m1 (y1 )m2 (y2 )
y1 ∧y2 =x
It is easy to show that the commonality function q1 ⊕ q2 associated to b1 ⊕ b2 is
q1 ⊕ q2 (x) = q1 (x)q2 (x).
Definition 7. We call simple support function focussed on y, denoted yω , the function of which the
Möbius transform satisfies
1 − ω, if x = y
m(x) = ω,
if x = ⊤
0,
otherwise.
The decomposition of some belief function b in terms of simple support functions is thus to write
b under the form:
M
b(x) =
yωy (x).
y∈L
It can be shown that the coefficients ωy of this decomposition write
ωy = ∏ q(x)−µ(x,y)
x≥y
where µ(x, y) is the Möbius function. Note that as in the classical case, these coefficients may be
strictly greater than 1, hence corresponding simple support functions have negative Möbius transform.
References
[1] J.P. Barthélemy. Monotone functions on finite lattices: an ordinal approach to capacities, belief and
necessity functions. In J. Fodor, B. De Baets, and P. Perny, editors, Preferences and Decisions under
Incomplete Knowledge, pages 195–208. Physica Verlag, 2000.
[2] G. Birkhoff. Lattice Theory. American Mathematical Society, 3d edition, 1967.
[3] G. Choquet. Theory of capacities. Annales de l’Institut Fourier, 5:131–295, 1953.
59
[4] R.P. Dilworth. Lattices with unique irreducible representations. Annals of Mathematics, 41:771–777,
1940.
[5] M. Grabisch. k-order additive discrete fuzzy measures and their representation. Fuzzy Sets and Systems,
92:167–189, 1997.
[6] M. Grabisch and Ch. Labreuche. Bi-capacities. In Joint Int. Conf. on Soft Computing and Intelligent
Systems and 3d Int. Symp. on Advanced Intelligent Systems, Tsukuba, Japan, October 2002.
[7] M. Grabisch and Ch. Labreuche. Bi-capacities for decision making on bipolar scales. In EUROFUSE
Workshop on Informations Systems, pages 185–190, Varenna, Italy, September 2002.
[8] M. Grabisch and Ch. Labreuche. Bi-belief functions and bi-possibility measures. In Proc. of the Int. Fuzzy
Systems Association World Congress (IFSA 2003), pages 155–158, Istanbul, Turkey, June 2003.
[9] M. Grabisch and Ch. Labreuche. Capacities on lattices and k-ary capacities. In 3d Int, Conf. of the European Soc. for Fuzzy Logic and Technology (EUSFLAT 2003), pages 304–307, Zittau, Germany, September
2003.
[10] M. Grabisch and Ch. Labreuche. Interaction between attributes in a general setting for knowledge discovery. In 4th Int. JIM Conf. (Journées de l’Informatique Messine) on Knowledge Discovery and Discrete
Mathematics, pages 215–222, Metz, France, September 2003.
[11] G.C. Rota. On the foundations of combinatorial theory I. Theory of Möbius functions. Zeitschrift für
Wahrscheinlichkeitstheorie und Verwandte Gebiete, 2:340–368, 1964.
[12] G. Shafer. A Mathematical Theory of Evidence. Princeton Univ. Press, 1976.
[13] M. Sugeno. Theory of fuzzy integrals and its applications. PhD thesis, Tokyo Institute of Technology,
1974.
60
Order-reversing involutions and residuated lattices
JAVIER G UTIÉRREZ G ARCÍA
Depto. de Matemáticas
Universidad del Pais Vasco
48080 Bilbao, Spain
E-mail: ♠t♣❣✉❣❛❥❅❧❣✳❡❤✉✳❡s
Abstract
Given a complete lattice (L, ≤) with an order–reversing involution, we find conditions to exist a
residuated binary operation ∗ such that the order–reversing involution is determined by the residuation associated to the binary operation ∗. Particularly, if (L, ≤, ) is a completely distributive
lattice with an order–reversing involution ′ we prove that there exists an operation ∗ such that
(L, ≤, ∗) is an integral, commutative Frobenius lattice in which α −→ ⊥ = α′ for each α ∈ L if
and only if α ≤ β′ whenever α ∧ β.
Keywords: Order–reversing involution, po–semigroup, residuation, Heyting algebra.
AMS Classification: 18A40, 54A40.
1
Preliminaries
W
V
Let (L, ≤) be a complete lattice with universal bounds ⊥ and ⊤. In particular ∅ = ⊥ and ∅ =
⊤. A unary operation ′ is an order–reversing involution (or a quasi-complementation) if it is an
involution (i.e. α′′ = α for all α ∈ L) that inverts the ordering (i.e. α ≤ β implies β′ ≤ α′ ).
A po–groupoid (short for partially ordered groupoid) is a poset (L, ≤) with a binary operation ∗
on L which satisfies the isotonicity condition:
α ≤ β implies α ∗ γ ≤
β ∗ γ and γ ∗ α ≤ γ ∗ β for all α, β, γ ∈ L. When ∗ is commutative or associative, (L, ≤, ∗) is called a
commutative po–groupoid or po–semigroup, respectively.
In a po–groupoid (L, ≤, ∗) an element α is called ideal element if α ∗ β ≤ α ∧ β for all α, β ∈ L.
An po–groupoid (L, ≤, ∗) is called integral if and only if the universal upper bound ⊤ acts as unit
element w.r.t. ∗. In an integral po–groupoid (L, ≤, ∗) all elements are ideal.
∗
Let (L, ≤, ∗) be a po–groupoid and α, β ∈ L. The right–residual α −→r β of β by α is the largest
∗
γ ∈ L (if it exists) such that α ∗ γ ≤ β; the left–residual α −→l β of β by α is the largest γ ∈ L (if
∗
it exists) such that γ ∗ α ≤ β. A residuated lattice is an m–lattice (L, ≤, ∗) in which α −→r β and
∗
∗
α −→l β always exists for any α, β ∈ L. Obviously, in case (L, ≤, ∗) is commutative, both α −→r β
∗
∗
and α −→l β coincide. We shall denote them by α −→ β and call it the implication associated to
∗. The existence of residuals implies that the operation ∗ preserves all existing supremss in each
argument.
∗
∗
A po–groupoid (L, ≤, ∗) in which α −→l ⊥ −→r ⊥ = α for every right-ideal element α and
∗
∗
β −→r ⊥ −→l ⊥ = β for every left-ideal element β is a Frobenius po–groupoid (cf. [1, page
61
341]). In particular, if (L, ≤, ∗) is an integral commutative residuated lattice, then it is Frobenius if
∗
∗
and only if α −→ ⊥ −→ ⊥ = α for every α ∈ L.
A lattice (L, ≤) is said to be a Heyting algebra if (L, ≤, ∧) is a residuated lattice. Obviously,
(L, ≤, ∧) is an integral commutative residuated lattice.
An element p in a lattice L is called prime if and only if the relation p ≥ α ∧ β always implies
p ≥ α or p ≥ β. The set of all prime elements is denoted PRIME L. Dually, an element q in a lattice
L is called coprime if and only if the relation q ≤ α ∨ β always implies q ≤ α or q ≤ β. The set of
all coprime elements is denoted COPRIME L.
2
Order-reversing involutions and residuated lattices
We shall try to answer the following question:
Given a lattice with an order–reversing involution (L, ≤, ′ ), does there exist a binary
operation ∗ such that the order–reversing involution ′ is determined by the implication
∗
∗
−→ associated to ∗, i.e. α −→ ⊥ = α′ for each α ∈ L ?
In view of the structures considered in the preliminaries, we can reformulate the previous question
in a more precise way:
Given a lattice with an order–reversing involution (L, ≤, ′ ), does there exist an integral
commutative Frobenius lattice (L, ≤, ∗) such that the order–reversing involution ′ is de∗
∗
termined by the implication −→ associated to ∗, i.e. α −→ ⊥ = α′ for each α ∈ L ?
This question has been studied by Esteva and Godo in [2] in the case of bounded chains.
The answer to the previous question is obviously NOT in general. In fact, we have the following
example:
Example Let L = {⊥, α, β, ⊤} where α ∧ β = ⊥, α ∨ β = ⊤, α′ = α and β′ = β. Let assume that
there exists an integral, commutative m–lattice (L, ≤, ∗) such that the order–reversing involution ′ is
∗
∗
determined by the implication −→. Then α ∗ β ≤ α ∧ β = ⊥ and so β ≤ α −→ ⊥ = α′ = α.
Consequently we see that in order to have a positive answer the lattice must satisfy some additional
condition. Particularly, the existence of such a binary operation requires that the order–reversing
involution satisfies the following condition:
∀α, β ∈ L
α∧β = ⊥
=⇒
α ≤ β′
Now we can reformulate the previous question:
Given a lattice with an order–reversing involution (L, ≤, ′ ) satisfying condition ⋆, does
there exist an integral, commutative, Frobenius lattice (L, ≤, ∗) such that the order–
∗
∗
reversing involution ′ is given by the implication −→, that is, α′ = α −→ ⊥ for all
α ∈ L?
62
(⋆)
In order to have an answer to this question we shall use the residuation associated to the infimum
and consequently from now on we shall assume that (L, ≤) is a Heyting algebra. We have then the
following lemmata:
Lemma 1. Let (L, ≤, ′ ) be a Heyting algebra with an order–reversing involution ′ . Then condition
⋆ is equivalent to the following condition:
∀α ∈ L
∧
α −→ ⊥ ≤ α′
(⋆⋆)
Lemma 2. Let (L, ≤, ′ ) be a Heyting algebra with an order–reversing involution ′ . Then for each
α, β ∈ L such that β is coprime we have
⊤, if α ≤ β′ ;
∧
′
α −→ β =
β′ , if α 6≤ β′ .
Consequently
∧
α ∧ α −→ β
′ ′
=
⊥,
if α ≤ β′ ;
≤γ
α ∧ β, if α 6≤ β′ .
⇐⇒
∧
β ≤ α′ ∨ α −→ γ
Corollary 3. Let (L, ≤, ′ ) be a Heyting algebra with an order–reversing involution ′ . Then for each
α, β ∈ L such that α and β are coprime we have
′
′
′
′
∧
∧
∧
∧
α −→ β′ ∧ β −→ α′ = β ∧ β −→ α′ = α −→ β′ ∧ α.
Theorem 4. Let (L, ≤, ′ ) be a complete lattice with an order–reversing involution ′ such that:
(i) (L, ≤) is a Heyting algebra and
(ii) any element of L is the supremum of all coprime elements below it.
Then the following binary operation ∗ defined for each α, β ∈ L by
α ∗ β = ∨ q1 ∧ q2 : q1 , q2 coprime, q1 ≤ α, q2 ≤ β and q1 6≤ q′2
∗
determines a commutative, residuated lattice structure (L, ≤, ∗). The corresponding residuation −→
is defined for each β, γ ∈ L by
∗
β −→ γ = ∧ q′ ∨ p : q coprime, p prime, q ≤ β, γ ≤ p .
Moreover, if (L, ≤, ′ ) satisfies condition ⋆, then (L, ≤, ∗) is an integral, commutative Frobenius
∗
lattice satisfying α′ = α −→ ⊥ for all α ∈ L.
As a consequence on the previous theorem we have the following corollaries which are the announced answers to the stated question:
Corollary 5. Let (L, ≤, ′ ) be a Heyting algebra with an order–reversing involution ′ such that any
element is the supremum of all coprime elements below it. Then there exists an operation ∗ such that
∗
(L, ≤, ∗) is an integral, commutative Frobenius lattice in which α −→ ⊥ = α′ for each α ∈ L if and
only if condition ⋆ is satisfied.
If the lattice is continuous, then condition (i) in the theorem is equivalent to distributivity of the
lattice (see [4]). Moreover, a lattice is completely distributive if and only if it is continuous and
satisfies condition (ii) in the theorem. Consequently, we have the following:
63
Corollary 6. Let (L, ≤, ′ ) be a completely distributive lattice with an order–reversing involution ′ .
Then there exists an operation ∗ such that (L, ≤, ∗) is an integral, commutative Frobenius lattice in
∗
which α −→ ⊥ = α′ for each α ∈ L if and only if condition ⋆ is satisfied.
Particularly in the case of a bounded chain, condition ⋆ is always satisfied and we have the
following:
Corollary 7. (Proposition A.4 in [2]) Let (L, ≤, ′ ) be a bounded chain with an order–reversing involution ′ . Then there exists an operation ∗ such that (L, ≤, ∗) is an integral, commutative Frobenius
∗
lattice in which α −→ ⊥ = α′ for each α ∈ L.
References
[1] G. Birkhoff, Lattice Theory, 3rd (new) ed. Providence, RI: Amer. Math. Soc., 1967.
[2] F. Esteva and L. Godo, Monoidal t–norm based logic: towards a logic for left-continuous t–norm,
Fuzzy Sets and Systems 124(3) (2001), 271–288.
[3] J.C. Fodor, Contrapositive Symmetry of Fuzzy implications Technical Report 1993/1, Eötvös
Loránd University, Budapest 1993.
[4] G. Gierz, K.H. Hofmann, K. Keimel , J.D. Lawson, M. Mislove and D.S. Scott, A Compendium
of Continuous Lattices, Springer, Berlin, 1980.
[5] U. Höhle and S.E. Rodabaugh (Eds.), “Mathematics of Fuzzy Sets: Logic, Topology, and Measure
Theory," The Handbooks of Fuzzy Sets Series: Vol.3, Kluwer Academic Publishers, Boston,
Dordrecht, London, 1999.
[6] U. Höhle, Commutative, residuated l-monoids, in U. Höhle and E.P. Klement (Eds.), “Nonclassical Logics and Their Applications to Fuzzy Subsets", pp. 53–106, Kluwer Academic Publishers,
Boston, Dordrecht, London, 1995.
64
Fuzzy predicate logic – a survey
P ETR H ÁJEK
Institute of Computer Science
Academy of Sciences
18207 Praha 8, Czech Republic
E-mail: ❤❛❥❡❦❅❝s✳❝❛s✳❝③
Mathematical fuzzy logic (or fuzzy logic in the narrow sense) is understood as a kind of many-valued
logic with comparative notion of truth and with the real unit interval [0, 1] as the standard set of truth
values. We further postulate truth-functionality (existence of truth-functions of connectives) and base
the theory of truth functions on the notion of a t-norm as a truth function of conjunction. The basic
fuzzy logic BL works with continuous t-norms as truth functions of conjunction and their residua as
corresponding truth functions of implication; more generally, the monoidal t-norm based logic MTL
works with left-continuous t-norms and their residua. Other generalizations will be mentioned.
Part 1 of the talk will be devoted to a very quick survey of propositional logics BL, MTL and
stronger logics related to particular t-norms (Łukasiewicz, Gödel, product logic and some others).
(For a detailed survey see [8].)
Part 2 will describe in some details the predicate logics BL∀ and MTL∀ and other predicate logics
built over the propositional logics of Part 1 ([9, 6, 7, 10]). Here again we shall distinguish standard
semantics (of [0,1]-fuzzy relational structures) and general semantics (fuzzy relational structures over
linearly ordered BL-algebras, MTL-algebras and similar algebras). Tarski style truth definition will
be given and completeness of very natural axiom systems with respect to the general semantics will be
presented. But several important predicate fuzzy logic are not recursively axiomatizable with respect
to their standard semantics; some others are. This will be surveyed and degree of undecidability of
most of these logics will be explicitly stated ([12, 13, 1, 2, 3, 4, 19, 17, 18]). Main examples: the
set of standard tautologies of the fuzzy predicate logic BL∀ is not arithmetical, whereas the set of
standard tautologies of the logic MTL∀ coincides with the set of general tautologies of this logic
and therefore is recursively enumerable. When defining the general semantics of BL∀ we cannot
restrict ourselves to interpretations over BL-chains that are completely ordered; this would lead again
to a non-arithmetical set of tautologies [20]. On the other hand, we can give up linear order of the
algebras; one gets a complete axiomatization of this semantics just by deleting one axiom from the
corresponding axiomatization based on linearly ordered algebras. Then we refer on corresponding
falsity-free (positive) logics and their semantics based on algebras called hoops [7]. Completeness
and conservativity results will be presented.
Part 3 will deal with mathematics based on fuzzy predicate logic. We go into some details concerning set theory. We describe a Zermelo-Fraenkel-like fuzzy set theory over Basic predicate logic
and Cantor-like set theory with full comprehension over Łukasiewicz predicate logic. The latter theory
can be shown to contain full Peano arithmetic with its classical logic ([23, 24, 25, 15, 16, 14]).
65
References
[1] Baaz M., Leitsch A., Zach R.: Incompleteness of an infinite-valued first-order Gödel logic and
of some temporal logics of programs. Computer Science Logic CSL’95, Springer 1996
[2] Baaz M., Veith H.: Quantifier elimination in fuzzy logic. Computer Science Logic CSL’98
Springer 1998, 399-414
[3] Baaz M., Preining N., Zach R.: Characterization of the axiomatizable prenex fragments of firstorder Gödel logics. 3rd Int. Symp. Multiple-valued Logic, IEEE Computer Society Press 2003,
175-180
[4] Baaz M., Ciabattoni A., Fermüller C.: Herbrand’s theorem for prenex Gödel logic and its consequences for theorem proving. In: Proceedings of logic programming and automated reasoning
(LPAR’2001) Cuba 2001, Springer-Verlag LNAI 2250, 201-216
[5] Drossos C., Mundici D.: Many-valued points and equality. Synthese 125 (2000), 97-101
[6] Esteva F., Godo L.: Monoidal t-norm based logic: Towards an axiomatization of the logic of left
continuous t-norms. Fuzzy Sets and Systems, 124 (2001) 271-288.
[7] Esteva F., Godo L. Hájek P., Montagna F.: Hoops and fuzzy logic. J.Logic Computat. 13 (2003)
531-555
[8] Gottwald S., Hájek P.: T-norm based fuzzy logics. In: (Klement and Mesiar, ed.) Triangular
Norms. To appear.
[9] Hájek P.: Metamathematics of fuzzy logic, Kluwer, 1998.
[10] Hájek P.: Mathematical fuzzy logic – state of art 2001. Matemática contemporanea 24 (2003)
71-89
[11] Hájek P.: A true unprovable formula of fuzzy product logic. Submitted.
[12] Hájek P.: Fuzzy logic and arithmetical hierarchy III. Studia Logica 68 (2001) 129-142
[13] Hájek P.: Fuzzy logic and arithmetical hierarchy IV. To appear in the proceedings of the conference FOL 75 (Berlin 2003)
[14] Hájek P.: Mathematical fuzzy logic and set theory (Extended abstract.) Proceedings of Takeuti
Symposium, December 17-19 2003 Kobe (Japan)
[15] Hájek, P., Haniková, Z.: A set theory within fuzzy logic, Proc. 31st IEEE ISMVL Warsaw (2001)
319-324
[16] H ÁJEK P., H ANIKOVÁ Z.: A Development of Set Theory in Fuzzy Logic. In: Beyond Two:
Theory and Applications of Multiple-Valued Logic (Ed.: Fitting M., Orlowska E.) - Heidelberg,
Physica-Verlag 2003, pp. 273-285
[17] Montagna F.: Three complexity problems in quantified fuzzy logic. Studia Logica 68 (2001)
143-152
[18] Montagna F.: On the predicate logics of continuous t-norm BL-algebras. Submitted.
66
[19] Montagna F., Ono H.: Kripke semantics, undecidability and standard completeness for Esteva
and Godo’s logic MTL∀. Studia Logica 71 (2002) 183-192
[20] Montagna F., Sachetti L.: Kripke-style semantics for many-valued logics. Math. Log. Quart. 49
(2003) 629-641
[21] Takano M. Strong completeness of lattice-valued logic. Arch. Math. Logic 41 (2002) 497-505
[22] Takeuti, G., Titani S.: Globalization of intuitionistic set theory. Annals Pure Appl Logic 33
(1987), 195-211.
[23] Takeuti, G., Titani, S.: Intuitionistic fuzzy logic and intuitionistic fuzzy set theory,
J. Symb. Logic 49 (1984) 851-866
[24] Takeuti, G., Titani, S.: Fuzzy logic and fuzzy set theory, Arch. Math. Logic 32 (1992) 1-32
[25] Titani, S.: A lattice-valued set theory, Arch. Math. Logic 38 (1999) 395-421
67
Fuzzy sets and sheaves
U LRICH H ÖHLE
FB C Mathematik und Naturwissenschaften
Bergische Universität
42097 Wuppertal, Germany
E-mail: ❯❧r✐❝❤✳❍♦❡❤❧❡❅♠❛t❤✳✉♥✐✲✇✉♣♣❡rt❛❧✳❞❡
It is a remarkable fact that the historic development of fuzzy set theory (cf. [2]) proceeds completely
isolated from sheaf theory3 . Also the long lasting debate on categorical foundations of fuzzy set
theory (cf. [6]) does not open the horizon for sheaf-theoretic arguments in the formulation of such
fundamental notions as membership function, measurement of membership, similarity, fuzzy ordering,
fuzzy relational equation, etc.
The aim of this paper is to explain that large parts of fuzzy set theory are actually subfields of sheaf
theory. We show that fuzzy sets are subsheaves of simple sheaves — so-called sheaves of level cuts,
similarity relations are sheaves of ordinary equivalence relations, fuzzy subgroups are subsheaves
of subgroups of simple sheaves of groups, and stratified Ω-valued topological spaces are topological
space objects in the category of sheaves. Further, intersections, unions, images and inverse images
of fuzzy sets, the max − min-composition of fuzzy relations are special categorical constructions in
the category of sheaves. Fuzzy power sets are nothing but power sheaves of simple sheaves. Fuzzy
relational equations are equations in the Kleisli category associated with the power object monad in the
category of sheaves. Moreover, fuzzy theorists are not able to give a proper solution of the quotient
problem w.r.t. similarity relations and a proper construction of fuzzy factor groups w.r.t. invariant
fuzzy subgroups.
In order to overcome these shortcomings some fundamental knowledge from sheaf theory is inevitable. Therefore we begin with some basic facts from sheaf theory including the role of the socalled espace étalé, the concept of Ω-valued sets and the tilde-construction. We recall the construction of the subobject classifier and the identification of subobjects with characteristic morphisms in the
category of sheaves, resp. complete Ω-valued sets. The importance of these constructions will appear
immediately for every fuzzy set theoretist, when their relationships to standard techniques in fuzzy
set theory are explained — e.g. level cut techniques or the interpretation of fuzzy sets by their prototypes. Further, we discuss the set-theoretical operations on fuzzy sets in the light of sheaf theory and
quote the important categorical axioms for fuzzy preorderings, similarity relations and fuzzy partial
orderings. We solve the quotient problem w.r.t. similarity relations in terms of an exact diagram and
show by using only categorical arguments that the symmetrization of (fuzzy) preorders leads always
to a (fuzzy) partial ordering on the respective quotient.
Further, we describe group objects in the category of sheaves, resp. complete Ω-valued sets and
characterize fuzzy subgroups as subgroup objects of simple sheaves of groups. Since we have already
solved the quotient problem w.r.t. similarity relations, we are in the position to give a proper construction of fuzzy factor groups which are again of course a part of an exact diagram. Finally, we study
higher order constructions and give a detailed description of the formation of union of fuzzy systems
3A
historic account on sheaf theory can be found in [3].
68
of fuzzy sets. After having understood the power object monad in the category of sheaves, resp.
complete Ω-valued sets, we recall the axioms of topological space objects, and show that topological space objects on simple sheaves and stratified Ω-valued topological spaces are the same things.
We close this talk with two important examples of topological space objects: One is generated by
fibrewise topological spaces, while the other one is construced from separated presheaves of ordinary
topological spaces. In this context it is interesting to see that there exists an adjoint situation between
topological space objects on complete Ω-valued sets and separated presheaves of ordinary topological
spaces on Ω.
References
[1] D. Dubois and H. Prade (eds.), Fundamentals of Fuzzy Sets (Kluwer Academic Publishers,
Boston, London, Dordrecht 2000).
[2] D. Dubois, W. Ostasiewicz and H. Prade, Fuzzy sets: history and basic notions, in: Fundamentals
of Fuzzy Sets (eds. D. Dubois and H. Prade), 21–124 (Kluwer Academic Publishers, Boston,
London, Dordrecht 2000).
[3] J.W. Gray, Fragments of the history of sheaf theory, in: M.P Fourman, C.J. Mulvey and D.S.
Scott, Applications of Sheaves, Lecture Notes in Mathematics 753, 1–79 (Springer-Verlag,
Berlin Heidelberg, New York, 1979).
[4] U. Höhle and S.E. Rodabaugh (eds.), Mathematics of Fuzzy Sets — Logic, Topology and Measure
Theory (Kluwer Academic Publishers, Boston, London, Dordrecht 1999).
[5] U. Höhle, Fuzzy Sets and Sheaves (Preprint Wuppertal, November 2003).
[6] O. Wyler, Fuzzy logic and categories of fuzzy sets, in: Non-classical Logics and Their Applications to Fuzzy Subsets (eds. U. Höhle and E.P. Klement), 235–268 (Kluwer Academic Publishers, Dordrecht, Boston, London, 1995).
69
Joint distributions on MV-algebras as interactions of fuzzy events
M ARTIN K ALINA , O L’GA NÁNÁSIOVÁ
Dept. of Mathematics
Slovak University of Technology
81368 Bratislava, Slovakia
E-mail: {❦❛❧✐♥❛|♦❧❣❛}❅♠❛t❤✳s❦
In recent years many papers have been written generalizing some theorems, known from the Kolmogorovian probability theory, to MV-algebras. To achieve such results, so-called product MValgebras were introduced and, using the product, the joint probability distribution was defined. In
this paper we present an approach how to define the joint distributions on MV-algebras which are not
necessarily closed under product. First we construct conditional measures on a given MV-algebra.
And, using these conditional measures, we define the joint probability distributions.
We will work with a semi-simple MV-algebra, M , which is represented by a system of integrable
functions defined on a probability space (Ω, S , µ) with their range in [0; 1] and such that 0/ ∈ M and
the system M is closed under the operations ∗ and ⊕ defined pointwise by
f ∗ (x) = 1 − f (x),
( f ⊕ g)(x) = min{1, f (x) + g(x)}
The conditional probability distribution, γ, on the MV-algebra M is an additive normed measure
on M , defined as follows
ν( f ) = ν(g)γ( f |g) + ν(g∗ )γ( f |g∗ )
with the following conditions holding for γ
Z
Z
where ν( f ) =
R
f g dµ = 0
⇒
γ( f |g) = 0
f g∗ dµ = 0
⇒
γ( f |g∗ ) = 0
f dµ.
Now, we will show that such conditional distibutions on M are not given uniquely.
Denote T the system of all transformations τ : M −→ [0; 1]Ω such that for each f ∈ M
1. τ( f ) is S -measurable
2.
R
R
f dµ = τ( f ) dµ
3. for any x ∈ Ω there holds f (x) = 0
⇒
(τ( f ))(x) = 0.
Theorem 1. Let τ ∈ T be such that for any g ∈ M
τ(g∗ ) = 1 − τ(g)
70
(1)
Define for any f , g ∈ M
γ( f |g) =
R
Rf ·τ(g) dµ
τ(g) dµ
ν( f )
0
if 0 < ν(g) < 1
if ν(g) = 1
if ν(g) = 0.
(2)
Then for any g ∈ M such that ν(g) > 0, γ(.|g) is a conditional measure.
We will say that event f is independent of g with respect to a conditional measure γ iff ν( f ) =
γ( f |g). γ will always denote the conditional measure defined by Formula 2 from Theorem 1.
Remark 2. As we will see in the next example, the independence of event f of g does not imply
the independence of the event g of f . This nonsymmetric relation of independence allows us to
distinguish between a cause and its effects. Similar results concerning the ortho-modular lattices have
been achieved also by O. Nánásiová in [4].
Example 3. Let Ω = [0; 1] and µ be Lebesgue measure. Let τ be the transformation given by
R
1
µ(A( f )) RA( f ) f dµ iff f (x) ∈]0.5; 1[ and A( f ) = {x ∈ Ω; f (x) ∈]0.5; 1[}
1
(τ( f ))(x) =
µ(B( f )) B( f ) f dµ iff f (x) ∈]0; 0.5[ and B( f ) = {x ∈ Ω; f (x) ∈]0; 0.5[}
f (x)
otherwise
provided µ(A( f )) 6= 0, µ(B( f )) 6= 0. If e.g. µ(A( f )) = 0, we can put any value to (τ(g))(x) for
x ∈ A( f ).
Take f (x) = x and g(x) = 21 x.Then we get
0.25 iff x ∈]0; 0.5[
0.25 iff x ∈]0; 1[
0.75 iff x ∈]0.5; 1[
(τ(g))(x) =
(τ( f ))(x) =
x
otherwise
x
otherwise
Now, compute the conditional measure
γ( f |g) =
γ(g|g) =
γ(g| f ) =
R1
0
R1
R1
0
0
R1
0
γ( f | f ) =
f dµ
R1
0
=
0
f dµ
g dµ
g · τ(g) dµ
R1
g dµ
0.25
f · τ( f ) dµ
R1
R1
0
0
g · τ( f ) dµ
f · τ(g) dµ
=
R 0.5
0
0.25
=
R
0.25 01 x dµ
= 0.5 = ν( f )
=
0.25
0.25
R1
0.5x dµ
= 0.25 = ν(g)
0.25
0
0.5x dµ + 0.75
0.5
R 0.5
0
R1
x dµ + 0.75
0.5
0.5 0.5x dµ
R1
0.5 x dµ
=
=
5
6= ν(g) = 0.25
16
5
6= ν( f ) = 0.5
8
Hence we get that g is dependent on f and f is also dependent on f . On the other hand, f is independent of g and also g is independent of itself. In the Kolmogorovian probability theory we are not
used to the fact that an event is independent of itself. But even this can happen when dealing with
MV-algebtras instead of Boolean algebras.
Remark 4. Once having defined for any pair f , g of elements of the MV-algebra M the measure
γ( f |g), the conditional measure if ν(g) > 0, we can define also the two-dimensional distribution on
M × M – the measure (probability) of occurence of this pair f , g. This, in fact represents the interaction of f and g. And the interaction can be different if we change the order.
71
The measure of interaction of a pair f , g ∈ M will be denoted by p( f , g) and defined as
p( f , g) = γ( f |g)γ(g|1)
(3)
Theorem 5 (Basic properties of p). Let p be a measure of interaction on the MV-algebra M and
f , g be any elements of M . Then
1. p( f , 1) = p(1, f ) = ν( f )
2. p( f , g) = p(g, f ) = 0, if
R
f g dµ = 0
3. p( f , g) ≤ min{ν( f ); ν(g)}, particularly p( f , f ) ≤ ν( f )
4. the variables of p do not commute, i.e. in general p( f , g) 6= p(g, f )
Example 6. Assume that Ω = [0; 1] and µ is the Lebesgue measure. The transformation τ will be
defined by the following
0,
1,
(τ( f ))(x) =
if f (x) = 0
if f (x) = 1
R
1
µ(A ( f )) A ( f )
f (x) dµ(x) otherwise, where A ( f ) = {x; 0 < f (x) < 1}
Let f (x) = x and g(x) = min{0, x − 0.5}. Then
0, if x = 0
1, if x = 1
(τ( f ))(x) =
0.5 otherwise
(τ(g))(x) =
Then
p(g, f ) =
Z 1
0,
if x ≤ 0.5
0.25 if x > 0.5
g0.5 dµ = 0.5
0.5
0
p( f , g) =
Z 1
p( f , f ) =
Z 1
0.5
13
3
=
4 8 32
x0.5dµ =
0
Z 1
(0.5 − x) dµ =
x0.25 dµ =
0.5
p(g, g) =
Z 1
1
4
(x − 0.5)0.25dµ =
1
32
We add some references where you can find papers with related topics.
72
1
16
References
[1] C.C. Chang, Algebraic analysis of many valued logics, Trans. Amer. Math. Soc. 88 (1958), 467–
490.
[2] F. Chovanec, States and observables on MV-algebras, Tatra Mountains Math. Publ. 3 (1993),
55–63.
[3] M. Jurečková, B. Riečan, Weak law of large numbers for weak observables in MV algebras,
Tatra Mountains Math. Publ. 12 (1997), 221–228.
[4] O. Nánásiová, Map for simultaneous measurements for a quantum logic, Internat. J. Theoret.
Phys 42 (2003), 1889–1902.
[5] B. Riečan, On the sum of observables in MV algebras of fuzzy sets, Tatra Mountains Math. Publ.
14 (1998), 225–232.
[6] B. Riečan, On the strong law of large numbers for weak observables in MV algebras, Tatra
Mountains Math. Publ. 15 (1998), 13–21.
[7] B. Riečan, Weak observables in MV algebras, Internat. J. Theoret. Phys. 37 (1998), 183–189.
[8] B. Riečan, On the product MV algebras, Tatra Mountains Math. Publ. 16 (1999), 143–149.
Acknowledgement
This work was supported by Science and Technology Assistance Agency under the contract No.
APVT-20-023402, and by the VEGA grant agency, grant numbers 1/0085/03 and 1/0273/03.
73
The concept of independence in the context of similarity relations
F RANK K LAWONN
Department of Computer Science
University of Applied Sciences Braunschweig/Wolfenbuettel
38302 Wolfenbuettel, Germany
E-mail: ❢✳❦❧❛✇♦♥♥❅❢❤✲✇♦❧❢❡♥❜✉❡tt❡❧✳❞❡
The success of fuzzy systems in real world applications is based on their capability to model human
expert knowledge in an easily understandable way using simple rules incorporating vague concepts
represented by fuzzy sets. However, the use of rules in conjunction with vague concepts alone does
not guarantee the interpretability of a fuzzy system.
There is a number of other aspects that have to be considered.
• The shape of the fuzzy sets should be chosen in such a way that they really correspond to real
world vague concepts.
• The number of rules should be strictly limited, especially the number of rules firing at the same
time.
• The number of attributes or variables occurring in a single rule should be kept very small.
• Finally, the way in which the fuzzy sets are aggregated to determine the firing degree of a rule,
implies a certain independence assumption of the underlying vague concepts.
Here we will mainly concentrate on the last of these aspects.
Understanding fuzzy sets as induced concepts in the context of similarity or equality relations
[9, 6, 8, 2, 5, 7, 1] leads to a rigorous and consistent interpretation the vague concepts. Fuzzy sets can
no longer be chosen arbitrarily, but have to be in accordance with the underlying similarity relations.
A very simple way to define suitable equality relations is based on the concept of scaling [4].
The similarity relations specify how exact values have to be distinguished in a certain range of a
domain in order to solve the task for which the fuzzy system is designed. Taking a look at standard
fuzzy systems, the underlying similarity relations for the single domains are assumed to be independent, i.e. the similarity of two tuples of values depends only on the similarities of the single values.
However, this assumption is only partly satisfied in most real world applications.
Here we take a closer look at the notion of independence in the context of similarity relations. It
turns out [3] that independence in the context of similarity relations is a non-symmetric concept in
contrast to the well known probabilistic independence notion, where for instance P(A|B) = P(A) ⇒
P(B|A) = P(B) holds.
74
References
[1] D. Dubois, H. Prade: Similarity-Based Approximate Reasoning. In: J.M. Zurada, R.J. Marks II,
C.J. Robinson (eds.): Computational Intelligence Imitating Life. IEEE Press, New York (1994),
69-80
[2] U. Höhle, L.N. Stout: Foundations of Fuzzy Sets. Fuzzy Sets and Systems 40 (1991), 257-296
[3] F. Höppner, F. Klawonn, P. Eklund: Learning Indistinguishability from Data. Soft Computing 6
(2002), 6-13
[4] F. Klawonn: Fuzzy Sets and Vague Environments. Fuzzy Sets and Systems 66 (1994), 207-221
[5] F. Klawonn, R. Kruse: Equality Relations as a Basis for Fuzzy Control. Fuzzy Sets and Systems
54 (1993), 147-156
[6] E.H. Ruspini: On the Semantics of Fuzzy Logic. Intern. Journ. of Approximate Reasoning 5
(1991), 45-88
[7] H. Thiele, N. Schmechel: The Mutual Defineability of Fuzzy Equivalence Relations and Fuzzy
Partitions. Proc. Intern. Joint Conference of the Fourth IEEE International Conference on Fuzzy
Systems and the Second International Fuzzy Engineering Symposium, Yokohama (1995), 13831390
[8] E. Trillas, L. Valverde: An Inquiry into Indistinguishability Operators. In: H.J. Skala, S. Termini,
E. Trillas (eds.): Aspects of Vagueness. Reidel, Dordrecht (1984), 231-256
[9] L.A. Zadeh: Similarity Relations and Fuzzy Orderings. Information Sciences 3 (1971), 177-200
75
Triangular norms as special semigroups
E RICH P ETER K LEMENT1 , R ADKO M ESIAR2 , E NDRE PAP3
1 Department
of Knowledge-Based Mathematical Systems
Johannes Kepler University
4040 Linz, Austria
E-Mail: ❡♣✳❦❧❡♠❡♥t❅❥❦✉✳❛t
2 Department
of Mathematics and Descriptive Geometry
Faculty of Civil Engineering
Slovak University of Technology
81368 Bratislava, Slovakia
E-Mail: ♠❡s✐❛r❅❝✈t✳st✉❜❛✳s❦
Institute of Information Theory and Automation
Czech Academy of Sciences
18207 Prague, Czech Republic
3 Department
of Mathematics and Informatics
University of Novi Sad
21000 Novi Sad, Serbia and Montenegro
E-Mail: ♣❛♣❅✐♠✳♥s✳❛❝✳②✉, ♣❛♣❡❅❡✉♥❡t✳②✉
1
Introduction
Clearly, each triangular norm [15, 26] is a special semigroup operation on the unit interval [0, 1]. To
be precise, ([0, 1], T, ≤) is a fully ordered abelian semigroup with neutral element 1. Several results
and constructions from the theory of general semigroups [3, 6, 9] have been carried over to t-norms.
Well-known examples are [24, 25] and the full characterization of continuous t-norms based on Isemigroups [5, 19, 20]. In this contribution we give a survey on recent advances in this context (for
an extensive survey see [17]).
2
Archimedean components
To simplify terminology, we shall identify, if T is a triangular norm, the fully ordered semigroup
([0, 1], T, ≤) with the t-norm T since the underlying set and the order are clear in this context. In
particular, we shall also speak about subsemigroups of t-norms (which are necessarily fully ordered)
without mentioning the order ≤ explicitly.
In semigroups (X, ∗) with X ⊆ R, in particular for ([0, 1], T ) where T is a t-norm, we shall write
(n)
and xT , respectively, or simply x(n) if the semigroup operation is clear, in order to distinguish it
from the usual power xn (with respect to the multiplication of real numbers).
(n)
x∗
76
Let T be a t-norm and let (X, ∗) be a subsemigroup of T . Then it is evident that (X, ∗) is a fully
ordered commutative semigroup where the operation ∗ is bounded from above by the minimum, i.e.,
x ∗ y ≤ min(x, y) for all x, y ∈ X. If 0 and 1 are contained in X then they are annihilator and neutral
element of (X, ∗), respectively.
In general, it is not clear whether for each semigroup (X, ∗, ≤), where X ⊆ [0, 1], where the operation ∗ is bounded from above by the minimum and where 1, whenever it is contained in X, acts as
neutral element, the operation ∗ can be extended to a triangular norm.
However, in the special case when X is a convex subset of [0, 1], i.e., a subinterval of [0, 1], we
shall see that such an extension is always possible. In order to show this, we use the following notions
going back to [16] and [10]. Note that the name tosab is an acronym for totally ordered semigroup,
abelian, bounded by the minimum.
Definition 1. Let I be a non-empty subinterval of the closed unit interval [0, 1].
(i) A fully ordered commutative semigroup (I, ∗) where ∗ is bounded from above by the minimum
will be called a tosab.
(ii) If ([0, 1], ∗) is a tosab then the operation ∗ is called a t-subnorm.
When investigating the structure of t-norms, their Archimedean subsemigroups play an important
role (compare [6, 14]).
Definition 2. Let T be a t-norm. Two elements x, y ∈ [0, 1] are called Archimedean equivalent if there
is an n ∈ N such that x(n) ≤ y ≤ x or y(n) ≤ x ≤ y. For each x ∈ [0, 1] the equivalence class Ix containing
x is called a T -Archimedean class of T or Archimedean class if T is either irrelevant or clear from
context.
Clearly, as noted in [7], each Archimedean class is a convex subset of [0, 1]. Obviously, by complete analogy we may define the Archimedean classes of tosabs and, in particular, of t-subnorms. The
following result can be found in [14, Proposition 3.2].
Proposition 3. Let T be a t-norm.
(i) For all (x, y) ∈ [0, 1]2 we have IT (x,y) = Imin(x,y) .
(ii) For each x ∈ [0, 1] the pair (Ix , T |Ix2 ) is a subsemigroup of ([0, 1], T ) (and, hence, a tosab), and it
is called an Archimedean component of T .
As a consequence, for two t-norms T1 and T2 with the same Archimedean components we have
(n)
(n)
xT1 = xT2 for each x ∈ [0, 1] and n ∈ N.
A necessary and sufficient condition for a singleton {x} to be a (trivial) Archimedean class for a tnorm T is that T (y, z) = x holds if and only if min(y, z) = x. As a consequence, {1} is an Archimedean
class of each t-norm T .
It is easy to see that a triangular norm is Archimedean if and only if its only non-trivial Archimedean class is either [0, 1[ or ]0, 1[. Similarly, a non-trivial tosab is Archimedean if and only if it has
only one non-trivial Archimedean class.
From [15, Proposition 1.6 and Theorem 2.12] the following characterization of Archimedean
components follows immediately.
77
Lemma 4. A fully ordered commutative semigroup (I, ∗) is an Archimedean component of some tnorm T if and only if either I = {1} or I is a convex subset of [0, 1[ such that for all x ∈ I we have
(n)
lim x∗ = inf I.
n−→∞
The following result, whose proof is straightforward, will be helpful for determining the uniqueness of t-norms with given Archimedean components.
Lemma 5. Let T be a t-norm and {Ix | x ∈ [0, 1]} the set of Archimedean components. Then the
following are equivalent:
(i) For each t-norm T̃ with T̃ 6= T there is an element x ∈ [0, 1] such that the Archimedean component
(I˜x , T̃ |(I˜x )2 ) of T̃ and the Archimedean component (Ix , T |Ix2 ) of T are different.
(ii) For all (x, y) ∈ [0, 1]2 with x ≤ y there is a unique fully ordered commutative semigroup (I{x,y} , ∗),
where the operation ∗ is bounded from above by the minimum, such that both (Ix , T |Ix2 ) and
(Iy , T |Iy2 ) are subsemigroups of (I{x,y} , ∗).
Lemma 6. Assume that Iu equals [a, b[ or ]a, b[ and let (Iu , ∗u ) be an Archimedean component of some
t-norm T such that for each x ∈ ]a, b[ there is a y ∈ ]a, b[ with x ∗u y > a and such that the conditional
cancellation law holds. Then, putting I = Iu ∪ Ib , the semigroup (I, T |I 2 ) is the ordinal sum of (Iu , ∗u )
and (Ib , T |I 2 ).
b
Theorem 7. Let T be a t-norm and suppose that each of its non-trivial Archimedean components
satisfies the hypotheses of Lemma 6. Then there is no other t-norm T̃ having the same Archimedean
components as T .
Corollary 8. Let T be a t-norm, suppose that each of its non-trivial Archimedean components is
continuous and satisfies the hypotheses of Lemma 6 and, additionally, limzրbx T (y, z) = y if x ∈ [0, 1],
y ∈ Ix and bx = sup Ix . Then T is a continuous t-norm, and it is uniquely determined by its Archimedean
components.
Example
that T is a t-norm whose Archimedean components are 0, 21 , ∗1 with x ∗1 y =
1 9. Assume
x · y, 2 , 1 , ∗2 with x ∗2 y = 21 , and the trivial component ({1}, ∗). Then we get
x · y
2
if (x, y) ∈ 0, 12 ,
2
T (x, y) = 12
if (x, y) ∈ 12 , 1 ,
min(x, y) otherwise,
i.e., T necessarily is the ordinal sum of its Archimedean components (see Proposition 13).
Note also that Archimedean components play a key role in the characterization of several specific semigroups. For example, in the torsion semigroups introduced in [22] for each x the set
{x1 , x2 , . . . , xn , . . . } is finite. Therefore, for a torsion t-norm T and for each x ∈ [0, 1] there is an
(n)
n ∈ N such that xT is an idempotent element of T . However, this is equivalent to the fact that each
Archimedean component (I, ∗) of T is a torsion semigroup which, in addition, satisfies inf I ∈ I. Observe that, for a continuous t-norm T , ([0, 1], T ) is a torsion semigroup if and only if each Archimedean
summand of T is nilpotent. A special subclass of torsion t-norms are the so-called n-contractive t(n)
norms studied in [1], in which case xT is an idempotent element for each x ∈ [0, 1] (so n-contractive
t-norms can be viewed as uniform torsion semigroups). A characterization of n-contractive t-norms
78
by means of their Archimedean components, together with a construction method for n-contractive
t-norms, can be found in [18].
Another interesting algebraic property closely linked to Archimedean components is the weak
cancellativity investigated in [23]. A semigroup (X, ∗) is said to be weakly cancellative if x∗x = x∗y =
y ∗ y implies x = y, which, in the case of a t-norm T , is equivalent with saying that T (x, x) = T (y, y)
implies x = y, because of the monotonicity of T . Observe that a continuous t-norm T is weakly
cancellative if and only if each Archimedean summand of T is strict. In general, a t-norm T is weakly
cancellative if and only each Archimedean component of T is weakly cancellative. Note that a weakly
cancellative Archimedean t-norm never has zero divisors, but it is not necessarily cancellative (an
example for that is the Krause t-norm [15, Appendix B]).
3
Ordinal sums
Ordinal sums of abstract semigroups were introduced by A. H. Clifford in [2] (see also [8, 21]),
foreshadowed in [4, 12], yielding a semigroup structure on the union of pairwise disjoint semigroups.
We recall this fundamental result for convenience.
Theorem 10. Let (A, ) be a linearly ordered set with A 6= 0/ and ((Xα , ∗α ))α∈A a family of semigroups
S
such that Xα ∩ Xβ = 0/ whenever α 6= β. Put X = α∈A Xα and define the operation ∗ : X 2 −→ X by
2
x ∗α y if (x, y) ∈ Xα ,
x∗y = x
if (x, y) ∈ Xα × Xβ and α ≺ β,
y
if (x, y) ∈ Xα × Xβ and β ≺ α.
(1)
Then (X, ∗) is a semigroup, and it will be called the ordinal sum of the semigroups ((Xα , ∗α ))α∈A .
This result can be directly applied (see [25, 26] and Theorem 7.1 in Chapter 1) to construct new
triangular norms from a given family of t-norms. The t-norm obtained via this construction will be
referred to as an ordinal sum of t-norms:
Theorem 11. Let (Tα )α∈A be a family of t-norms and (]aα , bα [)α∈A be a family of non-empty, pairwise
disjoint open subintervals of [0, 1]. Then the following function T : [0, 1]2 −→ [0, 1] is a t-norm:
T (x, y) =
(
aα + (bα − aα ) · Tα
min(x, y)
x−aα y−aα
bα −aα , bα −aα
if (x, y) ∈ [aα , bα [2 ,
otherwise.
(2)
Proposition 12. Let (A, ) be a linearly ordered set with A 6= 0/ and ((Xα , ∗α ))α∈A a family of semigroups such that (Xα )α∈A is a partition of the closed unit interval [0, 1]. If the operation ∗ : [0, 1]2 −→
[0, 1] given by (1) is a triangular norm, then we have:
(i) Each Xα is a subinterval of [0, 1].
(ii) Each semigroup (Xα , ∗α ) is a fully ordered commutative semigroup where the operation ∗α is
bounded from above by the minimum, i.e., we have x ∗α y ≤ min(x, y) for all x, y ∈ Xα .
(iii) The order on A is compatible with the usual order ≤ on [0, 1], i.e., for α, β ∈ A we have α ≺ β
if and only if x < y for all x ∈ Xα and y ∈ Xβ .
79
(iv) For all (x, y) ∈ [0, 1]2 we have
(
x ∗α y
if (x, y) ∈ Xα2 ,
x∗y =
min(x, y) otherwise.
(3)
Proposition 13. Let ([0, 1], ∗) be the ordinal sum of a family ((Xα , ∗α ))α∈A of semigroups. Then the
operation ∗ is a t-norm if and only if each (Xα , ∗α ) is a tosab, if the order on A is compatible with
the usual order ≤ on [0, 1], and if there is an α0 ∈ A such that 1 is the neutral element of ∗α0 .
Theorem 14. Let I be a non-empty subinterval of [0, 1]. A semigroup (I, ∗) is a continuous tosab
if and only if it is an ordinal sum of idempotent tosabs and continuous Archimedean tosabs with
neutral element with possibly one exception if for some summand (Iα0 , ∗α0 ) we have sup Iα0 = sup I ∈
Iα0 ∪ ([0, 1] \ I), in which case (Iα0 , ∗α0 ) need not have a neutral element.
Definition 15. A tosab is called ordinally irreducible if it cannot be expressed as an ordinal sum of
two or more non-singleton tosabs.
Proposition 16. Let T be a t-norm. Then the following are equivalent:
(i) T is ordinally irreducible.
(ii) For each x ∈ ]0, 1[ there exist y, z ∈ [0, 1] with y < x < z and T (y, z) < y.
The following modification of Theorem 11, where the resulting t-norm T will be referred to as an
ordinal sum of t-subnorms, was proved in [11].
Theorem 17. Let (Vα )α∈A be a family of t-subnorms and (]aα , bα [)α∈A be a family of non-empty,
pairwise disjoint open subintervals of [0, 1]. Further, if bα0 = 1 for some α0 ∈ A then assume that Vα0
is a t-norm, and if bα0 = aβ0 for some α0 , β0 ∈ A then assume either that Vα0 is a t-norm or that Vβ0
has no zero divisors. Then the following function T : [0, 1]2 −→ [0, 1] is a t-norm:
(
α
α
aα + (bα − aα ) ·Vα bx−a
if (x, y) ∈ ]aα , bα ]2 ,
, by−a
−a
−a
α
α
α
α
T (x, y) =
(4)
min(x, y)
otherwise.
The construction in Theorem 17 is not identical to the one in Theorem 10 (for instance, T |]aα ,bα ]2 is
not necessarily a semigroup operation on ]aα , bα ]). However, in Theorem 18 below we shall show that
each t-norm T where ([0, 1], T ) is an ordinal sum of semigroups as in Theorem 10 can be rewritten as
an ordinal sum of t-subnorms as in Theorem 17.
In [16, Theorem 3.1] it was shown that the construction in Theorem 17 is the most general way to
obtain a t-norm as an ordinal sum of semigroups.
Theorem 18. Let T be a t-norm. Then the following are equivalent:
(i) ([0, 1], T ) is an ordinal sum of semigroups.
(ii) T is an ordinal sum of t-subnorms.
Acknowledgements
This work was supported by two European actions (CEEPUS network SK-42 and COST action 274),
by Project 42s2 of the Action Austria-Slovakia as well as by grants APVT np. 20-023402, VEGA
1/0273/03 and MNTRS-1866.
80
References
[1] A. Ciabattoni, F. Esteva, and L. Godo, T -norm based logics with n-contraction, Neural Network World 5
(2002), 441–453.
[2] A. H. Clifford, Naturally totally ordered commutative semigroups, Amer. J. Math. 76 (1954), 631–646.
[3] A. H. Clifford and G. B. Preston, The algebraic theory of semigroups, American Mathematical Society,
Providence, 1961.
[4] A. C. Climescu, Sur l’équation fonctionelle de l’associativité, Bull. École Polytechn. Iassy 1 (1946), 1–16.
[5] W. M. Faucett, Compact semigroups irreducibly connected between two idempotents, Proc. Amer. Math.
Soc. 6 (1955), 741–747.
[6] L. Fuchs, Partially ordered algebraic systems, Pergamon Press, Oxford, 1963.
[7] I. W. Hion, Ordered semigroups, Izv. Akad. Nauk SSSR 21 (1957), 209–222, (Russian).
[8] K. H. Hofmann and J. D. Lawson, Linearly ordered semigroups: Historic origins and A. H. Clifford’s
influence, in Hofmann and Mislove [9], pp. 15–39.
[9] K. H. Hofmann and M. W. Mislove (eds.), Semigroup theory and its applications, London Math. Soc.
Lecture Notes, vol. 231, Cambridge University Press, Cambridge, 1996.
[10] S. Jenei, Structure of left-continuous triangular norms with strong induced negations. (I) Rotation construction, J. Appl. Non-Classical Logics 10 (2000), 83–92.
[11]
, A note on the ordinal sum theorem and its consequence for the construction of triangular norms,
Fuzzy Sets and Systems 126 (2002), 199–205.
[12] F. Klein-Barmen, Über gewisse Halbverbände und kommutative Semigruppen II, Math. Z. 48 (1942–43),
715–734.
[13] E. P. Klement and R. Mesiar (eds.), Triangular norms and related operators in many-valued logics (in
preparation).
[14] E. P. Klement, R. Mesiar, and E. Pap, Archimedean components of triangular norms, J. Aust. Math. Soc.
(in press, FLLL-TR-0206).
[15]
[16]
[17]
, Triangular norms, Kluwer Academic Publishers, Dordrecht, 2000.
, Triangular norms as ordinal sums of semigroups in the sense of A. H. Clifford, Semigroup Forum
65 (2002), 71–82.
, Semigroups and triangular norms, in Klement and Mesiar [13] (in preparation).
[18] A. Mesiarová and J. Mesiarová, n-contractive t-norms, Proceedings Tenth IFSA World Congress 2003,
Istanbul, 2003, pp. 69–72.
[19] P. S. Mostert and A. L. Shields, On the structure of semi-groups on a compact manifold with boundary,
Ann. of Math., II. Ser. 65 (1957), 117–143.
[20] A. B. Paalman-de Miranda, Topological semigroups, Matematisch Centrum, Amsterdam, 1964.
[21] G. B. Preston, A. H. Clifford: an appreciation of his work on the occasion of his sixty-fifth birthday,
Semigroup Forum 7 (1974), 32–57.
[22] Š. Schwarz, Contribution to the theory of torsion semigroups, Čehoslovack. Mat. Ž. 3(78) (1953), 7–21,
(Russian).
[23]
, Semigroups satisfying some weakened forms of the cancellation law, Mat.-Fyz. Časopis.
Slovensk. Akad. Vied 6 (1956), 149–158, (Slovak).
81
[24] B. Schweizer and A. Sklar, Associative functions and statistical triangle inequalities, Publ. Math. Debrecen 8 (1961), 169–186.
[25]
, Associative functions and abstract semigroups, Publ. Math. Debrecen 10 (1963), 69–81.
[26]
, Probabilistic metric spaces, North-Holland, New York, 1983.
82
A characterization and composition of quasi-copulas
A NNA KOLESÁROVÁ
Dept. of Mathematics
Faculty of Chemical and Food Technology
Slovak University of Technology
81237 Bratislava, Slovakia
E-mail: ❦♦❧❡s❛r♦❅❝✈t✳st✉❜❛✳s❦
1
Introduction
In this contribution the main attention will be paid to two–dimensional quasi–copulas, which are a
special type of binary 1–Lipschitz aggregation operators. Quasi–copulas will be characterized as
solutions to a certain functional equation. We also show that quasi–copulas and dual quasi–copulas are
important for describing the structure of 1–Lipschitz aggregation operators with any neutral element
or annihilator in the unit interval. Finally, we will study under which conditions the composition
of any two quasi–copulas is again a quasi–copula. The study of these problems was motivated by
several papers on fuzzy preference modeling [5, 6], and by papers concerning some problems in fuzzy
probability calculus, e.g., [10] and others. Therefore we expect applications of obtained results in
these areas.
Recall first the definitions and properties of basic notions which are used throughout the paper.
Definition 1. Let n ∈ N, n ≥ 2. An n–ary aggregation operator A is a non–decreasing function
A : [0, 1]n −→ [0, 1] satisfying the boundary conditions A(0, . . . , 0) = 0 and A(1, . . . , 1) = 1.
In this paper we will deal with binary aggregation operators only. Therefore if no confusion can
arise, we will use for them the name aggregation operators only.
Aggregation operators satisfying the standard Lipschitz condition with constant 1, i.e., satisfying the
property
|A(x1 , y1 ) − A(x2 , y2 )| ≤ |x1 − x2 | + |y1 − y2 |,
for all x1 , x2 , y1 , y2 ∈ [0, 1], will be called 1–Lipschitz aggregation operators.
From well–known types of binary aggregation operators, for example, the arithmetic mean M, the
product operator Π, Min and Max operators, as well as weighted means, OWA operators, copulas,
quasi–copulas, Choquet integral-based aggregation operators, Sugeno intergal–based aggregation operators are 1–Lipschitz aggregation operators. More details on these classes of aggregation operators
can be found, e.g., in [2].
Distinguished classes of 1–Lipschitz aggregation operators are the classes of copulas and quasi–
copulas.
83
Definition 2. A (two–dimensional) copula C is a function C : [0, 1]2 −→ [0, 1] with the properties:
• C(0, x) = C(x, 0) = 0 and C(x, 1) = C(1, x) = x for all x ∈ [0, 1];
• C(x1 , y1 ) + C(x2 , y2 ) ≥ C(x2 , y1 ) + C(x1 , y2 ) for all x1 , x2 , y1 , y2 ∈ [0, 1] such that x1 ≤ x2 and
y1 ≤ y2 .
Definition 3. [9] A (two–dimensional) quasi–copula Q is a function Q : [0, 1]2 −→ [0, 1] with the
properties:
• Q(0, x) = Q(x, 0) = 0 and Q(x, 1) = Q(1, x) = x for all x ∈ [0, 1];
• Q is non–decreasing in each of its arguments;
• Q satisfies Lipschitz’s condition with constant 1.
Copulas are also non–decreasing functions in each variable and 1–Lipschitz. Each copula is evidently a quasi–copula. Due to the 1–Lipschitz property, copulas as well as quasi–copulas are continuous functions on the unit square.
Note that the conditions in the first two items of the definition of a quasi–copula mean that quasi–
copulas are aggregation operators with zero annihilator and neutral element equal to 1. One of the
last two properties is superfluous because for 1–Lipschitz aggregation operators they are equivalent.
Therefore quasi–copulas can be equivalently characterized as
• 1–Lipschitz aggregation operators with neutral element 1,
or as
• 1–Lipschitz aggregation operators with zero annihilator.
The set of all quasi–copulas will be denoted by Q .
The following claim is only a slight modification of a given definition of a quasi–copula.
Lemma 4. A function Q : [0, 1]2 −→ [0, 1] is a quasi–copula if and only if it satisfies the following
conditions:
(i) Q is non–decreasing;
(ii) Q is 1–Lipschitz;
(iii) Q(0, 1) = Q(1, 0) = 0 and Q(1, 1) = 1.
Since an aggregation operator A is always monotone and satisfies the property A(1, 1) = 1, we obtain
the following result.
Corollary 5. An aggregation operator A is a quasi–copula if and only if it is 1–Lipschitz and A(0, 1) =
A(1, 0) = 0.
84
For any Q ∈ Q , the function Q∗ , so–called dual of a quasi–copula Q, is defined by
Q∗ : [0, 1]2 −→ [0, 1],
Q∗ (x, y) = x + y − Q(x, y).
The dual of any quasi–copula is also a non–decreasing and 1–Lipschitz function, but with zero neutral
element and annihilator equal to 1.
Denote by D the set of all functions f : [0, 1]2 −→ [0, 1] which are non–decreasing, 1–Lipschitz and
with zero neutral element (and 1 as neutral element). The set D will be called the set of all dual
quasi–copulas.
2
Characterization of quasi–copulas
In [12], cf. [16], 1–Lipschitz aggregation operators have been characterized as solutions to a simple
functional equation, similar to the Frank functional equation [8], in the following way.
Theorem 6. A binary aggregation operator A is 1–Lipschitz if and only if there is a binary aggregation
operator B, such that for all x, y ∈ [0, 1] it holds
A(x, y) + B(x, y) = x + y .
(1)
Commutative quasi–copulas can also be characterized as solutions to the following type of a functional equation.
Theorem 7. A commutative aggregation operator A is a commutative quasi–copula if and only if
there exists an aggregation operator B such that for all x, y ∈ [0, 1] we have
A(x, y) + B(1 − x, y) = y.
(2)
Remark 8. The previous claim without the commutativity condition must be reformulated in the
following way: An aggregation operator A is a quasi–copula if and only if there exist aggregation
operators B and C such that for each x, y ∈ [0, 1] we have
A(x, y) + B(1 − x, y) = y
3
and
A(x, y) +C(x, 1 − y) = x.
The structure of binary 1–Lipschitz aggregation operators with annihilator or neutral element
Quasi–copulas also play an important role in the characterization of 1–Lipschitz aggregation operators with annihilator or neutral element from the unit interval. We first show that each 1–Lipschitz
aggregation operator with annihilator a ∈]0, 1[ can be built up from a quasi–copula, dual quasi–copula
and the value a. Then we also clarify the structure of 1–Lipschitz aggregation operators with neutral
element e ∈]0, 1[.
For a given aggregation operator A denote A∗ (x, y) = x+y−A(x, y), (x, y) ∈ [0, 1]2 . Then (A∗ )∗ = A
and due to Theorem 6 it holds that the operator A is 1–Lipschitz if and only if A∗ is a 1–Lipschitz
aggregation operator.
85
If a 1–Lipschitz aggregation operator A has neutral element eA , then for ∀ x ∈ [0, 1], A∗ (x, eA ) =
A∗ (eA , x) = eA , which means that the element eA is the annihilator of the operator A∗ , i.e., eA = aA∗ .
Analogously, for the annihilator of A, if it exists, we have aA = eA∗ .
The structure of 1–Lipschitz aggregation operators with annihilator
Let A be a 1–Lipschitz aggregation operator with annihilator aA ∈ [0, 1]. According to the previous
discussions:
• if aA = 0 then A is a quasi–copula;
• if aA = 1 then A is a dual quasi–copula.
• In the case that aA = a ∈ ]0, 1[, define, similarly as in the case of nullnorms [3], the mappings
ϕa , ψa by
x−a
x
.
(3)
ϕa (x) = , , ψa (x) =
a
1−a
Then the function QA : [0, 1]2 −→ [0, 1],
A(a + (1 − a)x, a + (1 − a)y) − a
−1
QA (x, y) = ψa A ψ−1
=
a (x), ψa (y)
1−a
(4)
is a quasi–copula, and the function DA : [0, 1]2 −→ [0, 1]
A(ax, ay)
−1
DA (x, y) = ϕa A ϕ−1
=
a (x), ϕa (y)
a
(5)
is a dual quasi–copula.
Therefore the operator A can be expressed on the squares [0, a]2 and [a, 1]2 , as a transformation of
some dual quasi–copula and some quasi–copula, respectively, i.e.,
A(x, y) =
If (x, y) ∈ [0, a[×]a, 1], then
ϕ−1
if (x, y) ∈ [0, a]2
a (DA (ϕa (x), ϕa (y)))
−1
ψa (QA (ψa (x), ψa (y))) if (x, y) ∈ [a, 1]2 .
a = A(x, a) ≤ A(x, y) ≤ A(a, y) = a,
which means that A(x, y) = a, and the same is true for the rest of the unit square ]a, 1] × [0, a[.
The structure of 1–Lipschitz aggregation operators with neutral element
A similar situation to the previous one is for 1–Lipschitz aggregation operators with neutral element.
Let A be a 1–Lipschitz aggregation operator with neutral element eA ∈ [0, 1]. Trivially,
• if eA = 1 then A is a quasi–copula;
• if eA = 0 then A is a dual quasi–copula.
86
• If eA = e ∈ ]0, 1[, then the function QA : [0, 1]2 −→ [0, 1],
−1
QA (x, y) = ϕe A ϕ−1
e (x), ϕe (y)
(6)
is a quasi–copula, and the function DA : [0, 1]2 −→ [0, 1],
−1
DA (x, y) = ψe A ψ−1
e (x), ψe (y)
(7)
is a dual quasi–copula. Therefore
−1
ϕe (QA (ϕe (x), ϕe (y))) if (x, y) ∈ [0, e]2
A(x, y) =
2
ψ−1
e (DA (ψe (x), ψe (y))) if (x, y) ∈ [e, 1] .
In the case of uninorms [7] which is similar to this one, the values on the rest parts of the unit square
are not determined uniquely, they are between the values of Min and Max operators, in general. In the
case of 1–Lipschitz aggregation operators the values at the points (x, y) ∈ [0, e[×]e, 1] ∪ ]e, 1] × [0, e[
are determined uniquely. Indeed, if the operator A is 1–Lipschitz aggregation operator, the same is
true for A∗ , and moreover, aA∗ = e. Using the results of the previous part, the values of A∗ at these
points are A∗ (x, y) = e, that is, A(x, y) = x + y − e at all points (x, y) ∈ [0, e[×]e, 1] ∪ ]e, 1] × [0, e[.
4
On composition of quasi–copulas
For arbitrary binary aggregation operators A, B and F, the function F(A, B) : [0, 1]2 −→ [0, 1] defined
by
F(A, B)(x, y) = F(A(x, y), B(x, y)),
is also a binary aggregation operator and is called a composed aggregation operator. It is easy to
verify that F(A, B) really possesses the properties of an aggregation operator.
In this section we give a necessary and sufficient condition under which composition of any two
quasi–copulas is again a quasi–copula.
Preserving the 1–Lipschitz property: It is known, that although all three aggregation operators
A, B, F are 1–Lipschitz, the composed aggregation operator F(A, B) need not be of this property. For
example, despite the Łukasiewicz t–conorm SL is a 1–Lipschitz aggregation operator, the composed
operator SL (SL , SL ) does not possess this property [12]. However, if the outer operator F is a kernel
aggregation operator, and A, B are 1–Lipschitz, then F(A, B) is always 1–Lipschitz aggregation operator [4, 12].
Recall that a binary aggregation operator F has the kernel property if
for all u1 , u2 , v1 , v2 ∈ [0, 1]2 we have
|F(u1 , v1 ) − F(u2 , v2 )| ≤ max (|u1 − u2 |, |v1 − v2 |) .
It is clear that each kernel aggregation operator is also 1–Lipschitz. More details on kernel aggregation
operators can be found in [13, 14, 15]. It can be shown that the kernel property of an outer operator is
also a necessary condition for the 1–Lipschitz property of a composed aggregation operator [16].
Theorem 9. Let F be a binary aggregation operator. Then for any binary 1-Lipschitz aggregation
operators A and B the composed aggregation operator F(A, B) is 1-Lipschitz if and only if F is a
kernel aggregation operator.
87
As a consequence of this theorem we obtain the sufficient condition for quasi–copulas.
Corollary 10. If the outer operator F is kernel, then composition of any two quasi–copulas is a quasi–
copula.
The 1–Lipschitz property of the composed operator F(Q1 , Q2 ) is preserved by Theorem 9. Observe
that due to the property F(0, 0) = 0 the operator F(Q1 , Q2 ) possesses zero as annihilator.
However, for quasi–copulas, as a special type of 1–Lipschitz aggregation operators, the kernel
property of F on [0, 1]2 can be relaxed, because the points with coordinates (Q1 (x, y), Q2 (x, y)) for
any two quasi–copulas Q1 , Q2 and all points (x, y) ∈ [0, 1]2 , never fill in the whole unite square.
Lemma 11. Denote K = {(Q1 (x, y), Q2 (x, y)) ; (x, y) ∈ [0, 1]2 , Q1 , Q2 ∈ Q }. Then
u+1
.
K = (u, v) ; u ∈ [0, 1], v ∈ max(2u − 1, 0),
2
Because of this property of quasi–copulas we obtain the following claim.
Theorem 12. Let F be an aggregation operator. For any quasi–copulas Q1 , Q2 , a composed aggregation operator F(Q1 , Q2 ) is a quasi–copula if and only if the operator F has the kernel property on the
set K defined in Lemma 11.
Note that for composition of copulas the claim analogous to that one in Corollary 2, is not true.
Despite the outer operator is kernel, the composition of two copulas need not be a copula, as we can
see in the following example.
Example 13. Let F = medk , k ∈ [0, 1], i.e., F(x, y) = med(x, y, k). Set C1 = TL and C2 = TP , where TP
is the product t–norm. Then the composed operator is Ak = medk (TL , TP ).
The operators C1 and C2 are copulas and each operator F = medk is a kernel aggregation operator on
[0, 1]2 . According to Theorem 9, the composed operator Ak is always 1–Lipschitz. For example, for
k = 0.5 we obtain the operator
TL (x, y) if TL (x, y) ≥ 0.5
TP (x, y) if TP (x, y) ≤ 0.5
A0.5 (x, y) =
0.5
if TL ≤ 0.5 ≤ TP (x, y).
The operator A0.5 is not a copula because it is not 2–monotone. To show this, consider the points
x = 23 , x′ = 34 , y = 32 and y′ = 43 . Then we have
2 2
2 3
3 2
4
1
3 3
A0.5 ( , ) + A0.5 ( , ) − A0.5 ( , ) − A0.5 ( , ) = 0.5 + − 0.5 − 0.5 = − < 0,
4 4
3 3
3 4
4 3
9
18
which contradicts the 2–monotonicity of A0.5 .
Note that by the previous theorem, all operators Ak , k ∈ [0, 1], are quasi–copulas. The claim follows
from the facts that TL and TP are quasi–copulas (each copula is also a quasi–copula) and the outer
operator med(x, y, k) is kernel on [0, 1]2 and thus also on the set K.
Acknowledgement
The support of the grant VEGA 1/0085/03 and action Cost 274 TARSKI is kindly announced. This
work was also supported by Science and Technology Assistance Agency under the contract No.
APVT–20–023402.
88
References
[1] C. Alsina, R.B. Nelsen and B. Schweizer: On the characterization of a class of binary operations
on distributions functions. Stat. Probab. Lett. 17 (1993) 85–89.
[2] T. Calvo, A. Kolesárová, M. Komorníková and R. Mesiar: Aggregation operators: Properties, Classes and Construction methods. In: Aggregation Operators (T. Calvo, G. Mayor and
R. Mesiar, eds.). Physica Verlag, Heidelberg, 2002, pp. 3-104.
[3] T. Calvo, B. De Baets, and J.C. Fodor: The functional equations of Alsina and Frank for uninorms and nullnorms. Fuzzy Sets and Systems 120 (2001) 385–394.
[4] T. Calvo, R. Mesiar: Stability of aggegation operators. Proceedings EUSFLAT’2001, Leicester,
2001, pp. 475–478.
[5] B. De Baets and J.Fodor: Generator triplets of additive fuzzy preference structures. Proc. Sixth
Internat. Workshop on Relational Methods in Computer Science, Tilburg, The Netherlands,
2001, pp. 306-315.
[6] B. De Baets: T–norms and copulas in fuzzy preference modeling. Proc. Linz Seminar’2003,
Linz, 2003, p. 101.
[7] J.C. Fodor, R.R. Yager and Rybalov: Structure of uninorms. Int. J. of Uncertainty, Fuzziness and
Knowledge–Based Systems 5 (1997) 411–427.
[8] M.J. Frank: On the simultaneous associativity of F(x, y) and x + y − F(x, y). Aequationes Math.
19 (1979) 194–226.
[9] C. Genest, L. Molina, L. Lallena and C. Sempi: A characterization of quasi–copulas. Journal of
Multivariate Analysis 69 (1999) 193–205.
[10] S. Janssens, B. De Baets and H. De Meyer: Bell-type inequalities for commutative quasi–
copulas. Preprint, 2003.
[11] E.P. Klement, R. Mesiar and E. Pap: Triangular Norms, Kluwer Academic Publishers, Dordrecht, 2000.
[12] A. Kolesárová and J. Mordelová: 1–Lipschitz and kernel aggregation operators. Proc.
AGOP’2001, Oviedo, Spain, 2001, pp. 71–76.
[13] A. Kolesárová, J. Mordelová, E. Muel: Kernel aggregation operators and their marginals. Fuzzy
Sets and Systems, accepted.
[14] A. Kolesárová, J. Mordelová, E. Muel: Construction of kernel aggregation operators from
marginal functions. Int. J. of Uncertainty, Fuzziness and Knowledge–Based Systems 10/s (2002)
37–50.
[15] A. Kolesárová, J. Mordelová, E. Muel: A review of of binary kernel aggregation operators. Proc.
AGOP’2003, Alcalá de Henares, Spain, 2003, pp. 97–102.
[16] A. Kolesárová: 1–Lipschitz aggregation operators and quasi–copulas. Kybernetika 39 (2003)
615–629.
89
[17] R. Mesiar: Compensatory operators based on triangular norms. Proc. of EUFIT’95, Aachen.
1995, pp.131–135.
[18] R.B. Nelsen: An Introduction to Copulas. Lecture Notes in Statistics 139, Springer Verlag, New
York 1999.
[19] R.B. Nelsen: Copulas: An introduction to their properties and applications. Preprint, 2003.
90
Modifying L-sets: two views based on level-sets
JARI KORTELAINEN
Laboratory of Applied Mathematics
Lappeenranta University of Technology
53851 Lappeenranta, Finland
E-mail: ❥❛r✐✳❦♦rt❡❧❛✐♥❡♥❅❧✉t✳❢✐
In this paper we present two views of modifiers defined by means of level-sets. The author has studied
these modifiers earlier and the current paper serves mainly as a survey of this work.
The author has studied compositional modifier operators (see e.g. [4, 5, 6, 11]), and especially
modifiers which are also interior operators in Alexandroff topologies. In an Alexandroff topology the
intersection of every family of open sets is open (see e.g. [1]). L-sets on U ([2]) are generalizations of
fuzzy sets ([13]), defined as mappings A : U −→ L, and they are modified by operating its level-sets by
means of interior operators in Alexandroff topologies. These generalized operators are called levelset generated modifiers and denoted by F L ([10]). In this case Representation Theorems presented
by C. V. Negoita and D. A. Ralescu (see [12] and also [3]) are applicable when representing L-sets
by means of level-sets. In this paper we demand that L = (L, ≤, ∧, ∨, ⊗) is a cl-quasi-monoid ([3]),
and axioms for L-interior operators and L-topologies are given in [3]. Under certain conditions the
level-set generated modifiers are also L-interior operators ([10]).
The author has also studied coarsening operators in [7, 8, 9]. Certain coarsening operators,
namely natural coarsening operators denoted by C L , can be defined by means of open sets of Alexandroff topologies, and L-sets are modified by omitting those level-sets which are not open. In this case
also Representation Theorems are applicable when representing L-sets by means of level-sets.
Because under certain conditions the level-set generated modifiers are L-interior operators, the
image of this operator is a L-topology, say T 1 . In this case we will show that the image of a natural
coarsening operator is also a L-topology, say T 2 , while the natural coarsening operators do not generally need to be L-interior operators (see [9]). We will show that ∀A ∈ LU , C L (A) ⊂ F L (A) and
T 1 = T 2 . Still, the category of produced L-topological spaces is isomorphic to the category of crisp
Alexandroff spaces.
References
[1] F. G. Arenas. Alexandroff spaces. Acta Mathematica Universitatis Comenianae, LXVIII:17–25,
1999.
[2] J. A. Goguen. L-fuzzy sets. Journal of Mathematical Analysis and Applications, 18:145–174,
1967.
[3] U. Höhle and A. P. Šostak. Axiomatic foundations of fixed-basis fuzzy topology. In U. Höhle
and S. E. Rodabaugh, editors, Mathematics of Fuzzy Sets: Logic, Topology, and Measure Theory.
Kluwer Academic Publishers, Dordrecht, The Netherlands, 1999.
91
[4] J. Kortelainen. On relationship between modified sets, topological spaces and rough sets. Fuzzy
Sets and Systems, 61:91–95, 1994.
[5] J. Kortelainen. Modifiers connect L-fuzzy sets to topological spaces. Fuzzy Sets and Systems,
89:267–273, 1997.
[6] J. Kortelainen. A Topological Approach to Fuzzy Sets. Ph.D. dissertation, Lappeenranta University of Technology, Lappeenranta, Finland, 1999. Acta Universitatis Lappeenrantaensis 90.
[7] J. Kortelainen. Natural and complement coarsening operators. In N. Baba, L. C. Jain, and
R. J. Howlett, editors, Knowledge-Based Intelligent Information Engineering Systems & Allied
Technologies, KES ’01, volume 69 of Frontiers of Artificial Intelligence, pages 700–704. IOS
Press, 2001.
[8] J. Kortelainen. On coarsenings of L-sets. In Proceedings of Joint 9th IFSA World Congress and
20th NAFIPS International Conference, pages 2951–2954, Vancouver, Canada, 2001.
[9] J. Kortelainen. L-topologies and natural coarsening operators. In Proceedings of SCIS & ISIS
2002, Tsukuba, Japan, 2002. paper 25B3-2.
[10] J. Kortelainen. Some compositional modifier operators generate L-interior operators. In IFSA
2003: Proceedings of the 10th IFSA World Congress, pages 480–483, İstanbul, Turkey, 2003.
[11] J. K. Mattila. On modifier logic. In L. A. Zadeh and J. Kacprzyk, editors, Fuzzy Logic for
Management of Uncertainty. John Wiley, New York, 1992.
[12] C. V. Negoita and D. A. Ralescu. Representation theorems for fuzzy concepts. In D. Dubois,
H. Prade, and R. R. Yager, editors, Readings in Fuzzy Sets for Intelligent Systems. Morgan &
Kaufmann Publ, Inc., San Mateo, CA, 1993.
[13] L. A. Zadeh. Fuzzy sets. Information and Control, 8:338–353, 1965.
92
Integrals of random fuzzy sets
VOLKER K RÄTSCHMER
Statistics and Econometrics
Faculty of Law and Economics
University of Saarland
66041 Saarbrücken, Germany
E-mail: ✈✳❦r❛❡ts❝❤♠❡r❅♠①✳✉♥✐✲s❛❛r❧❛♥❞✳❞❡
1
Introduction
Concepts of random fuzzy sets, often also called fuzzy random variables, have been introduced to
extend the classical notion of random variables to random experiments with outcomes in form of
fuzzy subsets of Rk . The idea behind is to represent outcomes of random experiments in a more
adequate way by integrating those inherent aspects of vagueness which are of non-random nature.
From a technical point of view it had been turned out that the notion of random fuzzy sets by Puri
and Ralescu (cf. [15]) is the most general suggestion which admits also a probobability theory with
extensions of the classical limit theorems (cf. [10], [13]). The talk deals with the notion of integrals
of random fuzzy sets in the sense of Puri and Ralescu. The aim of the talk is to develop different ways
to define integrals and then to investigate their mutual relationships.
The seminal paper by Puri and Ralescu has offered the mostly accepted approach. As they defined
random fuzzy sets as extended random compact sets they could transfer Aumann’s concept to define
integrals for random compact sets, the so called Aumann-integral. A new direction has been initialized
by Diamond and Kloeden who introduced the class of L p −metrics on sample spaces consisting of
fuzzy subsets of Rk ([4], for extensions see [12]). These metrics yield other concepts of random fuzzy
sets as random elements in Banach spaces which makes possible to embed the probability theory with
fuzzy observations into the general probability theory in Banach spaces ([9], [14], [11], [13]). The
L p −metrics work on subspaces of the sample spaces considered by Puri and Ralescu. Moreover, it
has been shown that in most cases the different notions of random fuzzy sets coincide ([10], [13]).
Therefore, reasonable alternatives to define integrals might be obtained by adaption of Bochner- and
Pettis-integration.
Then two problems will be tackled within the talk. If the range of a random fuzzy set is restricted
to a sample space where one of the L p −metrics works, when does the Aumann-integral belong to this
sample space? Secondly what are the mutual relationships between Aumann- and the adaptions of
Bochner- as well as Pettis-integration? Both problems are not investigated systematically in literature.
A first attempt concerning the first problem had been offered by the talk "Probability theory in sample
spaces of fuzzy subsets” held at the 23rd Linz-Seminar of Fuzzy Sets 2003 (cf.[13]). Answers to the
second problem w.r.t. the L2 −metric are given in [9] and [14], a comprehensive account was presented
at the 23rd Linz-Seminar (cf. [13]). However these results suffer from quite unsatisfactory conditions
of integrability that the random fuzzy sets should fulfil. Moreover, only sufficient conditions are
93
available which ensure that the Aumann-integral of a random fuzzy set belongs to the sample space
under consideration. The conditions of integrability will be improved and the sufficient conditions
will be completed by necessary ones.
As applications of the investigations dominated convergence theorems and strong laws of large
numbers as well as central limit theorems will be derived. The obtained versions generalize and
improve already known results from literature, especially those that were presented at the 23rd LinzSeminar.
2
Random fuzzy sets
Let Kco+ (Rk ) gather all nonvoid convex compact subsets of Rk . We will restrict ourselves to the sample
no (Rk ) which consists of all fuzzy subsets of Rk with α−cuts belonging to K + (Rk ). Applying
space Fcoc
co
no (Rk ) a semilinear structure {⊕ , λ⊙ | λ ∈ R}. It
Zadeh’s extension principle we can define on Fcoc
F
F
turns out that it is inherited from the Minkowski operations on Kco+ (Rk ) on the α−cuts, that is
e ⊕F B]
e α ⊕ [B]
e α = λ ⊙ [A]
eα
e α , [λ ⊙F A]
e α = [A]
[A
no (Rk ), λ ∈ R, α ∈]0, 1] (c.f. e.g. [4]). The fuzzy subset of Rk with 1
e Be ∈ Fcoc
for all A,
{0} as membership
function will be denoted by e
0. It is the neutral element w.r.t. ⊕F .
Due to a widely used suggestion by Puri and Ralescu ([15]) we can extend the notion of random
no (Rk ) in the following way:
compact sets to Fcoc
no (Rk ) is associated with its α−cut-mappings
Each mapping Ye : Ω → Fcoc
[Ye ]α : Ω → Kco+ (Rk ), ω 7→ [Ye (ω)]α (α ∈]0, 1])
no (Rk ) a fuzzy random variable over some probability
Puri and Ralescu called a mapping Ye : Ω → Fcoc
space (Ω, F , P) if all the α−cut-mappings are convex-valued random compact sets over (Ω, F , P).
However from the point of view of general probability theory this definition is not convenient since
there is not any natural notion of distribution emerging from it. Therefore it is more reasonable to
no (Rk )−valued measurable mappings. For this purpose we
conceptualize random fuzzy sets as Fcoc
no
k
need a suitable σ−algebra on Fcoc (R ). The suggestion below was introduced the first time in [10].
Since every fuzzy subset of Rk is uniquely determined by it positive rational α−cuts we may
k ]0,1]∩Q w.r.t. the
no
k
+
no on F
deduce a topology τFcoc
coc (R ) from the product topology τ pδ∞ on Kco (R )
Hausdorff metric δ∞ , which is separably metrizable.
no (Rk ) is defined to be a random fuzzy set if it is Borel-measurable
Now a mapping Ye : Ω → Fcoc
e is called the distribution of Ye . Since τF no is metrizable, every
no . The image measure under Y
w.r.t. τFcoc
coc
no (Rk ) w.r.t. to every metric which induces τ no . Therefore
random fuzzy set is a random element in Fcoc
Fcoc
it is natural to speak of a simple random fuzzy set in the case that a random fuzzy set has only a
finite range. In fact the introduced notion of random fuzzy sets is equivalent with the concept of fuzzy
random variables by Puri and Ralescu (cf. [10]).
Other concepts to define random fuzzy sets are based on the identification of each fuzzy subset
no (Rk ) with its support function s : [0, 1] × Sk−1 → R, where Sk−1 denotes the euclidean
e from Fcoc
A
e
A
unit sphere in Rk . Every support function is measurable w.r.t the product σ−algebra consisting of the
Borel subsets of [0, 1] × Sk−1 ([12]). This property is the basis to build the subspaces of fuzzy subsets
94
with integrable support functions. Integrability will be defined w.r.t. λ1 ⊗ λS , the product measure
k−1
of the Lebesgue-Borel measure λ1 on [0, 1] and λS , the unit Lebesgue-Borel measure on Sk−1 .
k−1
no (Rk ) to consist of fuzzy subsets from F no (Rk ) with support
Let for p ∈ [1, ∞[ define the space Fcocp
coc
k−1
k
1
S
no
functions being λ ⊗ λ −integrable of order p. Additionally, let Fcoc∞ (R ) be the space of all fuzzy
no (Rk ) with support functions being essentially bounded w.r.t. λ1 ⊗ λSk−1 . Indeed
subsets from Fcoc
no (Rk ) with bounded supports. The restriction of the
this space gathers all the fuzzy subsets from Fcoc
no
semilinear structure {⊕F , λ⊙F | λ ∈ R} to Fcocp (Rk ) is well defined for every p ∈ [1, ∞] (cf. [13]).
no
k
k−1 ) (p ∈ [1, ∞]), which identifies fuzzy
By the mapping jFcocp
no (Rk ) : Fcocp (R ) → L p ([0, 1] × S
no (Rk ) can
subsets with the respective equivalence classes of their support functions every space Fcocp
k−1
be embedded into the L p −space L p ([0, 1] × Sk−1 ) w.r.t. λ1 ⊗ λS as a positive cone (cf. [13]).
no (Rk ), called the
Using the L p −norm on L p ([0, 1] × Sk−1 ) one can define a metric ρ p on Fcocp
L p −metric. Another custom concept is the so called L p,∞ −metric, which is a completion of the
no (Rk ) introduced by Klement, Puri and Ralescu in [8] (cf. [12]). Each pair ρ , d
metric on Fcoc∞
p p
induces the same topology (cf. [12]), and in the case of p = ∞ both metrics are even identical (cf.
[13]).
The L p − and L p,∞ −metrics give the opportunity to consider random elements in the subspaces
no (Rk ) w.r.t. the respective L − or L
Fcocp
p
p,∞ −metric. Those random elements can be identified, via the
k−1 ). It turns out that in
embeddings jFcocp
no (Rk ) , with random elements in the L p −spaces L p ([0, 1] × S
fact all these random elements are random fuzzy sets ([10], [13]).
no (Rk ). Then we can state:
Proposition 1. Let (Ω, F , P) be a probability space and let Ye : Ω → Fcoc
no (Rk )−valued for p ∈ [1, ∞[, then the following statements are equivalent:
.1 If Ye is Fcocp
(i) Ye is a random fuzzy set over (Ω, F , P).
no (Rk ) w.r.t. ρ over (Ω, F , P).
(ii) Ye is a random element in Fcocp
p
no (Rk ) w.r.t. d over (Ω, F , P).
(iii) Ye is a random element in Fcocp
p
no (Rk )−valued, then the following statements are equivalent:
.2 If Ye is Fcoc∞
(i) Ye is a random fuzzy set over (Ω, F , P).
(ii) Every mapping [Ye ]α : Ω → Kco+ (Rk ), ω 7→ [Ye (ω)]α (α ∈ [0, 1]) is a convex-valued random
compact set over (Ω, F , P), where [Ye (ω)]0 denotes the topological closure of the support
of Ye (ω).
no (Rk ) w.r.t. ρ = d over (Ω, F , P), then it is a random fuzzy
.3 If Ye is a random element in Fcoc∞
∞
∞
set over (Ω, F , P). The converse is not necessarily true.
3
Integrably bounded random fuzzy sets
Since every random fuzzy set can be regarded as an extended convex-valued random compact set,
it suggests itself to define integrals for random fuzzy sets by carrying over Aumann’s well accepted
95
no (Rk )
concept (cf. [1]). Related to a random fuzzy set Ye the task is to find a fuzzy subset EeAYe ∈ Fcoc
which satisfies [EeAYe ]α = E A [Ye ]α for all α ∈]0, 1]. Since the sets E A [Ye ]α (α ∈]0, 1]) should belong to
Kco+ (Rk ), the α−cut mappings [Ye ]α (α ∈]0, 1]) have to be integrably bounded convex-valued random
compact sets.
A random fuzzy set with integrably bounded α−cut mappings is known as an integrably bounded
random fuzzy set (cf. [15]). Indeed the concept of integrably bounded random fuzzy sets is sufficient
to find the desired extended Aumann-integral (cf. [15], Theorem 3.1).
The Aumann-integral for a simple random fuzzy set Ye with distribution QYe and different outcomes
no (Rk ) may be easily calculated as
e1 , ..., A
em ∈ Fcoc
A
em ) ⊙F A
em )
e1 ) ⊙F A
e1 ) ⊕F ... ⊕F (QeYe −1 (A
EeAYe = (QYeYe −1 (A
Y
no is separably metrizable, every integrably bounded random fuzzy set can be approximated
Since τFcoc
pointwise by a sequence of simple random fuzzy sets. So we can raise the question whether the
Aumann-integral of integrably bounded random fuzzy sets can be described as a kind of Bochnerintegral? Is it possible to attain the Aumann-integral of integrably bounded random fuzzy sets as limit
points of sequences of Aumann-integrals of simple random fuzzy sets? The answer is affirmative as
the following theorem shows.
no (Rk ) that induces τ no , let δ be the Hausdorff metric on
Theorem 2. Let d be a metric on Fcoc
∞
Fcoc
no (Rk ) be a random fuzzy set over some probability space (Ω, F , P). Then
Kco+ (Rk ), and let Ye : Ω → Fcoc
the following statements are equivalent:
.1 Ye is integrably bounded.
.2 There exists some A ∈ F , P A = 1, and a sequence (Yen )n of simple random fuzzy sets over
(Ω, F , P) such that
(i) lim d(Yen (ω), Ye (ω)) = 0 for all ω ∈ A.
n−→∞
(ii) sup δ∞ ([Yen ]α , {0}) is P −integrable for every α ∈]0, 1] ∩ Q.
n
If one of the statements .1, .2 is satisfied, then lim d(EeAYen , EeAYe ) = 0 holds for any sequence (Yen )n of
n−→∞
simple random fuzzy sets as in statement .2.
Remark:
Theorem 2 is an extension of a classical result from the theory of random compact sets: Debreu
suggested a kind of Bochner-integral for convex-valued random compact sets. He has shown that it
coincides with the Aumann-integral in the case of integrably bounded convex-valued random compact
sets (cf. [3]; see also [7]). The characterization of the integral by statement .2 of Theorem 2 may be
regarded as an generalization of Debreu’s concept. Moreover, the extensions of the Aumann- as well
as Debreu-integrals coincide.
no (Rk ) w.r.t. the respective L −
Considering random fuzzy sets with outcomes in the spaces Fcocp
p
or L p,∞ −metrics it is interesting to find necessary and sufficient conditions which characterize them
as integrably bounded with Aumann-integrals belonging to the respective subspace. The following
theorem gives a complete answer to this problem.
96
no (Rk ) denote a random fuzzy set over some probability
Theorem 3. Let p ∈ [1, ∞] and let Ye : Ω → Fcocp
space (Ω, F , P).
no (Rk ) if and only if
.1 For p = 1 the random fuzzy set Ye is integrably bounded with EeAYe ∈ Fcoc1
e is P −Pettis-integrable and
no (Rk ) ◦ Y
either ρ1 (Ye , e
0) or d1 (Ye , e
0) is P −integrable. In this case jFcoc1
A
jF no (Rk ) (Ee Ye ) coincides with the Pettis integral of jF no (Rk ) ◦ Ye .
coc1
coc1
no (Rk ) if and only
.2 For p ∈]1, ∞[ the random fuzzy set Ye is integrably bounded with EeAYe ∈ Fcocp
e is P −Pettis-integrable as well as either ρ1 (Ye , e
0) or d1 (Ye , e
0) is P −integrable. In
if jFcocp
no (Rk ) ◦ Y
A
e
e
e
this case jF no (Rk ) (E Y ) coincides with the Pettis integral of jF no (Rk ) ◦ Y .
cocp
cocp
no (Rk ) if and only if
.3 For p = ∞ the random fuzzy set Ye is integrably bounded with EeAYe ∈ Fcoc∞
e
e
e
e
ρ∞ (Y , 0) = d∞ (Y , 0) is P −integrable.
Remark:
no (Rk )−valued random fuzzy set Y
e over a probability space
In [13] it has been shown that some Fcocp
no (Rk ) if ρ (Y
ee
(Ω, F , P) is integrably bounded with EeAYe ∈ Fcocp
p , 0) is
(
P −integrable of order p : p ∈ [1, ∞[
.
P −integrable
: p=∞
This result is now improved by Theorem 3. Moreover, the converse direction has been found.
4
Pettis-integrable random fuzzy sets
no (Rk )−valued random fuzzy sets are considered as random elements w.r.t. the L −metric ρ
If Fcocp
p
p
or the L p,∞ −metric d p , they can be identified, via the standard embedding, with random elements
in a real Banach space. So the concepts of Pettis- or Bochner-integrals may be used as alternative
ways to define integrals for random fuzzy sets. This section deals with the approach inspired by the
Pettis-integration.
no (Rk ) denote a random fuzzy set over some probability
Definition 4. Let p ∈ [1, ∞] and let Ye : Ω → Fcocp
space (Ω, F , P). Then Ye will be defined as P −Pettis-integrable w.r.t. ρ p if it satisfies the following
properties
no (Rk ) w.r.t. ρ over (Ω, F , P).
(i) Ye is a random element in Fcocp
p
e is P −Pettis-integrable.
(ii) jFcocp
no (Rk ) ◦ Y
no (Rk ) with j
ePYe ) being identical with the Pettis-integral
(iii) There exists some EePYe ∈ Fcocp
no (Rk ) (E
Fcocp
of jF no (Rk ) ◦ Ye .
cocp
If Ye is P −Pettis-integrable w.r.t. ρ p , then EePYe will be called the Pettis-integral of Ye .
97
Remark:
ePYe is unique if it exists.
Since the embedding jFcocp
no (Rk ) is injective, the fuzzy subset E
no (Rk )One can derive the following relationship between Aumann- and Pettis-integration of Fcocp
valued random fuzzy sets for p ∈ [1, ∞].
no (Rk ) denote a random fuzzy set over some probability
Theorem 5. Let p ∈ [1, ∞] and let Ye : Ω → Fcocp
space (Ω, F , P).
no (Rk ), then Y
e is P −Pettis-integrable
.1 If p ∈ [1, ∞[, and if Ye is integrably bounded with EeAYe ∈ Fcocp
P
A
e
e
e
e
and E Y = E Y .
.2 If d∞ (Ye , e
0) = ρ∞ (Ye , e
0) is P −integrable, then Ye is P −Pettis-integrable with EeAYe = EePYe .
Remark:
no (Rk )−valued ranAs remarked above after Theorem 3, Theorem 5 improves a former result for Fcocp
dom fuzzy sets Ye with ρ p (Ye , e
0) being integrable of order p for p ∈ [1, ∞[. In particular, it also improves
no (Rk )−valued random fuzzy sets Y
e
a result by Näther who has shown the result of Theorem 5 for Fcoc2
with ρ2 (Ye , e
0) being integrable of order 2 (cf. [14]).
5
Bochner-integrable random fuzzy sets
Analogously to Pettis-integrability one can develop Bochner-integration of random fuzzy sets.
no (Rk ) denote a random fuzzy set over some probability
Definition 6. Let p ∈ [1, ∞] and let Ye : Ω → Fcocp
space (Ω, F , P). Then Ye will be defined as P −Bochner-integrable w.r.t. ρ p if it satisfies the following
properties
no (Rk ) w.r.t. ρ over (Ω, F , P).
(i) Ye is a separably-valued random element in Fcocp
p
e is P −Bochner-integrable.
(ii) jFcocp
no (Rk ) ◦ Y
no (Rk ) with j
eBYe ) being identical with the Bochner(iii) There exists some EeBYe ∈ Fcocp
no (Rk ) (E
Fcocp
integral of jF no (Rk ) ◦ Ye .
cocp
If Ye is P −Bochner-integrable w.r.t. ρ p , then EeBYe will be called the Bochner-integral of Ye .
Remarks:
eBYe is unique if it exists.
1) Since each embedding jFcocp
no (Rk ) is injective, the fuzzy subset E
no (Rk )−valued random fuzzy sets are exactly the
2) Observe that for every p ∈ [1, ∞[ the Fcocp
no
separably-valued random elements in Fcocp (Rk ) w.r.t. ρ p since ρ p is separable.
no (Rk ) w.r.t. ρ is integrably bounded
3) For every p ∈ [1, ∞] each simple random element in Fcocp
p
as well as Bochner-integrable, and EeAYe = EeBYe holds.
98
no (Rk )−valued random
It turns out that for p ∈ [1, ∞[ Aumann- and Bochner-integration of Fcocp
fuzzy sets are closely related.
no (Rk ) denote a random fuzzy set over some probability
Theorem 7. Let p ∈ [1, ∞[, and let Ye : Ω → Fcocp
space (Ω, F , P). Then the following statements are equivalent:
.1 Ye is P −Bochner-integrable.
no (Rk ), and j
e is P −Bochner-integrable with
.2 Ye is integrably bounded with EeAYe ∈ Fcocp
no (Rk ) ◦ Y
Fcocp
jF no (Rk ) (EeAYe ) being identical with the Bochner-integral of jF no (Rk ) ◦ Ye .
cocp
cocp
.3 Either ρ p (Ye , e
0) or d p (Ye , e
0) is P −integrable.
no (Rk )−valued random fuzzy sets over (Ω, F , P)
.4 There exists some sequence (Yen )n of simple Fcocp
which satisfy
(i) lim ρ p (Yen (ω), Ye (ω)) = 0 for all ω ∈ Ω
n−→∞
(ii) lim Eρ p (Yen , Ye ) = 0
n−→∞
no (Rk ), and
If any of the statements .1 - .4 is fulfilled, then Ye is integrably bounded with EeAYe ∈ Fcocp
EeAYe = EeBYe as well as lim ρ p (EeAYen , EeAYe ) = 0
n−→∞
no (Rk )−valued random fuzzy sets as in statement .4.
whenever (Yen )n is a sequence of simple Fcocp
Remark:
no (Rk )− valued
Theorem 7 improves a former result in [13] where it has been shown that a Fcocp
random fuzzy set Ye satisfies statement .2 of Theorem 7 if ρ p (Ye , e
0) is integrable of order p. In particular also a result by Körner is improved who has proved that statement .2 of Theorem 7 holds for a
no (Rk )−valued random fuzzy set Y
e with ρ2 (Ye , e
0) being integrable of order 2 (cf. [9]).
Fcoc2
no (Rk )−valued random fuzzy sets the concept of Bochner-integrals are much
In the case of Fcoc∞
more restrictive than Aumann-integration.
no (Rk ) denote a random fuzzy set over some probability space (Ω, F , P).
Theorem 8. Let Ye : Ω → Fcoc∞
Then the following statements are equivalent:
.1 Ye is P −Bochner-integrable.
no (Rk ), and j
e is P −Bochner-integrable with
.2 Ye is integrably bounded with EeAYe ∈ Fcoc∞
no (Rk ) ◦ Y
Fcoc∞
eAYe ) being identical with the Bochner-integral of jF no (Rk ) ◦ Ye .
jFcoc∞
no (Rk ) (E
coc∞
no (Rk ) w.r.t. ρ = d
.3 Ye is a separably-valued random element in Fcoc∞
∞
∞
over (Ω, F , P), and ρ∞ (Ye , e
0) = d∞ (Ye , e
0) is P −integrable.
no (Rk )−valued random fuzzy sets over (Ω, F , P)
.4 There exists some sequence (Yen )n of simple Fcoc∞
which satisfy
99
(i) lim ρ∞ (Yen (ω), Ye (ω)) = 0 for all ω ∈ Ω
n−→∞
(ii) lim Eρ∞ (Yen , Ye ) = 0
n−→∞
no (Rk ), and
If any of the statements .1 - .4 is fulfilled, then Ye is integrably bounded with EeAYe ∈ Fcoc∞
EeAYe = EeBYe as well as lim ρ∞ (EeAYen , EeAYe ) = 0
n−→∞
no (Rk )−valued random fuzzy sets as in statement .4.
whenever (Yen )n is a sequence of simple Fcoc∞
Every Bochner-integrable random fuzzy set is Pettis-integrable, and the Bochner- coincides with
the Pettis-integral. This is a result in accordance with the integration of random elements in Banach
spaces.
no (Rk ) be a random fuzzy set over some probability
Theorem 9. Let p ∈ [1, ∞] and let Ye : Ω → Fcocp
space (Ω, F , P).
If Ye is P −Bochner-integrable w.r.t. ρ p , then it is also P −Pettis-integrable w.r.t. ρ p with EeBYe =
EePYe .
6
Dominated convergence theorems for random fuzzy sets
As a quite easy application of the discussion on integrability of random fuzzy sets we can derive
several dominated convergence theorems, dependent on the sample space.
Theorem 10. Let {Ye , Yen | n ∈ N} be a set of integrably bounded random fuzzy sets over some probability space (Ω, F , P) such that sup δ∞ ([Yen ]α , {0}) is P −integrable for every α ∈]0, 1] ∩ Q.
n
eAYen , EeAYe ) = 0.
no , then lim d(E
If lim d(Yen , Ye ) = 0 a.s. holds for any metric d which induces τFcoc
n−→∞
n−→∞
no (Rk )−valued random fuzzy sets (p ∈ [1, ∞]), one obtains the following domiDealing with Fcocp
nated convergence theorem.
no (Rk )−valued random
Theorem 11. Let p ∈ [1, ∞] be fixed and let {Ye , Yen | n ∈ N} be a set of Fcocp
fuzzy sets over some probability space (Ω, F , P) which satisfy
(i) ρ p (Ye , e
0) is P −integrable.
(ii) sup ρ p (Yen , e
0) is P −integrable.
n
.1 If p ∈ [1, ∞[, and if lim ρ p (Yen , Ye ) = 0 a.s., then
n−→∞
lim ρ p (EeAYen , EeAYe ) = lim ρ p (EePYen , EePYe ) = lim ρ p (EeBYen , EeBYe )
n−→∞
=
n−→∞
n−→∞
lim d p (EeAYen , EeAYe ) = lim d p (EePYen , EePYe ) = lim d p (EeBYen , EeBYe )
n−→∞
n−→∞
= 0
100
n−→∞
.2 If lim ρ∞ (Yen , Ye ) = 0 a.s., then lim d∞ (EeAYen , EeAYe ) = lim ρ∞ (EeAYen , EeAYe ) = 0
n−→∞
n−→∞
n−→∞
Remark:
Statement .2 of Theorem 11 is known from [13], whereas statement .2 generalizes and improves
already known dominated convergence theorems:
• All the previous results are formulated w.r.t. the Aumann-integrals only.
no (Rk )−valued random fuzzy sets
• The respective theorems in [8] and [11] are restricted to Fcoc∞
e
e
e
e
assuming that the mappings d∞ (Yn , 0) and d∞ (Y , 0) are integrable.
no (Rk )−valued random
• In [13] the results from [8] and [11] have been extended to arbitrary Fcocp
fuzzy sets Ye , Yen under the quite unsatisfactory condition that the mappings ρ p (Ye , e
0) and ρ p (Yen , e
0)
are integrable of order p for p ∈ [1, ∞[.
7
Strong law of large numbers and central limit theorems for random
fuzzy sets
no (Rk )−valued integrably bounded random fuzzy sets are closely related with BochnerSince Fcocp
integrable random elements in L p ([0, 1] × Sk−1 ) for p ∈ [1, ∞[, we can make use of limit theorems
for random elements in real Banach spaces to obtain strong laws of large numbers and central limit
theorems for random fuzzy sets.
Considering pairwise independent, identically distributed random fuzzy sets, Etemadi’s strong law
of large numbers ([5]) may be applied since (L p ([0, 1] × Sk−1 ), k · k p ) is a real separable Banach space
for p ∈ [1, ∞[.
Theorem 12. Let p ∈ [1, ∞[, and let (Yen )n denote a sequence of pairwise independent, identically
no (Rk )−valued random fuzzy sets over some probability space (Ω, F , P).
distributed Fcocp
If ρ p (Ye1 , e
0) is P −integrable, then lim ρ p ( n1 ⊙F (Ye1 ⊕F ... ⊕F Yen ), EeAYe1 ) = 0 a.s..
n−→∞
no (Rk ) such that lim ρ ( 1 ⊙ (Y
e0 ∈ Fcocp
e0 ) =
e1 ⊕F ... ⊕F Yen ), A
Conversely, if there exists some A
p n F
n−→∞
0 a.s. holds, then ρ p (Ye1 , e
0) is P −integrable, in particular Ye1 is integrably boundend as well as
no (Rk ).
e0 ∈ Fcocp
P −Bochner- and P −Pettis-integrable with EeAYe1 = EeBYe1 = EePYe1 = A
Remark:
no (Rk )−valued random fuzzy sets by Colubi, Lopez-Diaz
Theorem 12 completes a result for Fcoc∞
and Gil (cf. [2]).
Hoffmann-Jorgensen and Pisier introduced a classification of Banach spaces, where classical
strong laws of large numbers and central limit theorems can be extended immediately. Their investigations led to the concept of types of Banach spaces. The type of a Banach space is directly
linked with the validity of certain limit theorems (cf. [6]). Since (L p ([0, 1] × Sk−1 ), k · k p ) is a real
separable Banach space of type p in the case of p ∈ [1, 2] and of type 2 if p ∈ [2, ∞[, one can draw on
the limit theorems for random elements in these classes of real Banach spaces.
101
no (Rk )−valued random fuzzy
Theorem 13. Let p ∈ [1, ∞[ and (Yen )n be a sequence of independent Fcocp
sets over some probability space (Ω, F , P) such that
(i) ρ p (Yen , e
0) is P −integrable for all n,
Eρ p (Yen , EeAYen )q
< ∞ for q = p if p ∈ [1, 2] and q = 2 if p ∈ [2, ∞[.
nq
n=1
∞
(ii) ∑
Then
lim ρ p
n−→∞
1
1
⊙F (Ye1 ⊕F ... ⊕F Yen ), ⊙F (EeAYe1 ⊕F ... ⊕F EeAYen ) = 0 a.s.
n
n
Theorem 14. Let p ∈ [2, ∞[, and let (Yen )n denote a sequence of independent and identically distributed
no (Rk )−valued random fuzzy sets over some probability space (Ω, F , P) such that ρ (Y
e e
Fcocp
p 1 , 0) is P −
integrable of order 2.
Then there exists a Gaussian element Z in L p ([0, 1] × Sk−1 ) with vanishing Bochner-integral and
n
√
covariance operator as jF no (Rk ) ◦ Ye1 such that the sequence √1 ∑ jF no (Rk ) ◦ Yei − n jF no (Rk ) (EeAYe1 )
n
cocp
i=1
cocp
cocp
n
converges weakly to Z.
Remark:
Theorems 13, 14 improve corresponding previous results in [11] (Theorems 5.1, 5.2) and [13] (Theono (Rk )−valued random fuzzy sets are considered with
rems 5, 6) where sequences of independent Fcocp
ρ p (Yen , e
0) being integrable of order p for all n.
References
[1] Aumann, R. J. (1965). Integrals of Set-Valued Functions. J. Math. Anal. Appl. 12, 1-12.
[2] Colubi, A., Lopez-Diaz, M., Gil, M. A. (1999). A Generalized strong law of large numbers.
Probab. Theory Related Fields 114, 401-417.
[3] Debreu, G. (1967). Integration of Correspondences. In Proceedings of the Fifth Berkely Symposium on Mathematical Statistics and Probability, Vol.II, Part I, University of California Press,
Berkeley/Los Angeles, pp. 351-372.
[4] Diamond, P.,Kloeden, P. (1994). Metric Spaces of Fuzzy Sets, World Scientific, Singapore.
[5] Etemadi, N. (1981). An elementary proof of the strong law of large numbers. Z. Wahrsch. Gebiete 55, 119-122.
[6] Hoffmann-Jorgensen, J./Pisier, G. (1976). The law of large numbers and the central limit theorem
in Banach spaces. Ann. Probab. 4, 587-599.
[7] Klein, E.,Thomson, A.C. (1984). Theory of Correspondences, Wiley & Sons, New York.
[8] Klement, E.P.,Puri, M.L.,Ralescu, D.A. (1986). Limit theorems for fuzzy random variables.
Proc.R.Soc.Lond. A 407, 171-182.
102
[9] Körner, R. (1997). On the variance of fuzzy random variables. Fuzzy Sets and Systems 92, 83-93.
[10] Krätschmer, V. (2001). A unified approach to fuzzy random variables. Fuzzy Sets and Systems
123, 1-9.
[11] Krätschmer, V. (2002). Limit theorems for fuzzy-random variables. Fuzzy Sets and Systems 126,
253-263.
[12] Krätschmer, V. (2002). Some complete metrics on spaces of fuzzy subsets. Fuzzy Sets and Systems 130, 357-365.
[13] Krätschmer, V. (2003). Probability theory in fuzzy sample spaces. To appear in Metrika.
[14] Näther, W. (2000). On random fuzzy variables of second order and their application to linear
statistical inference with fuzzy data. Metrika 51, 201-221.
[15] Puri, M.L.,Ralescu, D.A. (1986). Fuzzy Random Variables. J. Math. Anal. Appl. 114, 409-422.
103
Copulas and characterization of T -product possibility measures
T OMÁŠ K ROUPA
Faculty of Electrical Engineering
Czech Technical University
16627 Praha, Czech Republic
Institute of Information Theory and Automation
Czech Academy of Sciences
18208 Praha 8, Czech Republic
E-mail: ❦r♦✉♣❛❅✉t✐❛✳❝❛s✳❝③
1
Introduction
The aim of this contribution is a partial characterization of T -product possibility measures, where
T is a t-norm satisfying the Lipschitz property with the constant 1. Any possibility measure can
be assigned a set of distribution functions which are dominated by this possibility measure. It will
be demonstrated that the set of all joint distribution functions dominated by a T -product possibility
measure contains each joint distribution function obtained by an application of a copula C ≤ T to
some marginal distribution functions dominated by marginal possibility measures.
2
2.1
Basic Notions
Possibility Theory and t-norms
See [1] for a thorough theoretical exposition. Let X be a non-empty set and A be a complete Boolean
algebra of its subsets: A contains X and it is closed under complementation and arbitrary unions.
Consequently, A is closed under arbitrary intersections. A possibility measure Π on X is a set function
Π : A → [0, 1] such that for any family (Ai )i∈I of elements of A the condition
S
Π( i∈I Ai ) = supi∈I Π(Ai ) is satisfied and Π(X) = 1. The last condition means that only normal
possibility measures are considered. A possibility distribution π is a mapping π : X → [0, 1] such that
Π(A) = supx∈A π(x) for any A ∈ A and π−1 ({a ∈ [0, 1] : a ≤ a′ }) ∈ A for any a′ ∈ [0, 1]. A purely
technical requirement is that X always contains an element x such that π(x) = 0. Assume that ΠX×Y
is a possibility measure on a Cartesian product X × Y . Then its marginal possibility measure ΠX is
uniquely determined by the formula ΠX (A) := ΠX×Y (A ×Y ), A ∈ A .
The t-norm T is a commutative, associative and monotone binary operation on [0, 1] with the
neutral element 1. Significant examples of (continuous) t-norms are these: the t-norm minimum
TM (a, b) = min(a, b), the product t-norm TP (a, b) = ab and the Łukasiewicz’ t-norm TL (a, b) =
max(0, a + b − 1). If ΠX , ΠY are possibility measures on X, Y , respectively, and T is a continuous
104
t-norm, then we say that ΠTX×Y : AX ⊗ AY → [0, 1] is a T -product possibility measure on X ×Y , where
AX ⊗ AY ⊆ 2X×Y is a product algebra of AX and AY , if
ΠTX×Y (A × B) = T (ΠX (A), ΠY (B)),
A ∈ AX , B ∈ AY .
(1)
A notion of the T -product possibility measure was introduced in [1] and it is evidently a more general
analog of the product probability measure used in classical probability theory.
2.2
Copulas
A copula C is a binary operation on [0, 1] such that
1. for every a, b ∈ [0, 1],
C(a, 0) = C(0, b) = 0,
and
C(a, 1) = a
and C(1, b) = b;
2. for every a1 , a2 , b1 , b2 ∈ [0, 1] such that a1 ≤ a2 and b1 ≤ b2 ,
C(a2 , b2 ) −C(a2 , b1 ) −C(a1 , b2 ) +C(a1 , b1 ) ≥ 0.
The t-norms TM , TP , TL are all copulas. Moreover, for every copula C and (a, b) ∈ [0, 1]2 ,
TL (a, b) ≤ C(a, b) ≤ TM (a, b).
(2)
Any t-norm T is a copula if and only if T satisfies Lipschitz property with the constant 1 [3].
3
Characterization of T -product Possibilities
Each possibility measure ΠX on X can be assigned a set PΠX of finitely-additive probability measures
PX on X dominated by ΠX :
n
PΠX := PX : PX (A) ≤ ΠX (A), A ∈ AX }.
(3)
It was proven in [2] that ΠX is even an upper envelope of PΠX , i.e.
ΠX (A) = sup PX (A),
PX ∈PΠX
A ∈ AX .
(4)
Instead of probability measures, distribution functions can be considered. Let be the total
ordering on X agreeing with the one given by values of the possibility distribution πX , that is x1 x2
iff πX (x1 ) ≤ πX (x2 ). Let then x and x denote the greatest and the lowest element of X in this ordering,
respectively. Consequently, the mapping FX : X → [0, 1] defined by
FX (x) := PX ({x′ ∈ X : x′ x}),
105
x ∈ X,
(5)
is a distribution function since FX is non-decreasing and FX (x) = 1, FX (x) = 0. We can define
n
o
′
′
FΠX := FX : F(x) ≤ ΠX ({x ∈ X : x x}), x ∈ X .
(6)
If FX and FY are distribution functions on X and Y , respectively, and C is a copula, then the mapping
C
FX×Y
(x, y) := C(FX (x), FY (y)),
(x, y) ∈ X ×Y,
(7)
is the joint distribution function of FX and FY on X ×Y .
Let us consider a T -product possibility measure ΠTX×Y , where the t-norm T satisfies Lipschitz
property with the constant 1. Under this assumption, we can partially characterize the set of joint
distribution functions dominated by ΠTX×Y .
Proposition 1. Let ΠX , ΠY be possibility measures on X, Y , respectively, ΠTX×Y be a T -product
possibility measure, where T is a t-norm satisfying Lipschitz property with the constant 1. Consider
the set of copulas
CT = {C : C ≤ T }.
Then any FX×Y ∈ FΠTX×Y has marginal distribution functions FX ∈ FΠX , FY ∈ FΠY and
FΠTX×Y ⊇
[
o
n
C
C
FX×Y
: FX×Y
= C(FX , FY ), C ∈ CT .
(8)
(FX ,FY )∈FΠX ×FΠY
Proof. For the sake of further brevity, let us stipulate that
{x′ x} := {x′ ∈ X : x′ x}.
Let FX×Y ∈ FΠTX×Y . Then
FX (x) = FX×Y (x, y) ≤ ΠTX×Y ({x′ x} ×Y ) = ΠX ({x′ x}),
and analogously for FY . Consequently, FX ∈ FΠX and FY ∈ FΠY . Notice that the set CT is always
non-empty since T is also a copula and, according to (2), there is always at least one copula which
is lower or equal to T . To prove the second part of the proposition, let us consider an arbitrary pair
of marginal distribution functions (FX , FY ) ∈ FΠX × FΠY and any copula C ∈ CT . Then for any pair
(x, y) ∈ X ×Y ,
C
FX×Y
(x, y) = C(FX (x), FY (y)) ≤ T (FX (x), FY (y)) ≤ T (ΠX ({x′ ≤ x}), ΠY ({y′ ≤ y})),
C
and thus FX×Y
∈ FΠTX×Y .
✷
The previous proposition provides merely a partial characterization of T -product possibility measures:
it can be demonstrated that in general case the set of joint distribution functions on the right-hand side
of (8) is a proper subset of FΠTX×Y . Nevertheless, a complete characterization is obtained in some
special cases as the following example demonstrates.
106
Example 2. If T = TM , then CTM consists of all copulas since TM is the greatest copula. Due to
Proposition 1, any FX×Y ∈ FΠTM has marginal distribution functions FX , FY belonging to FΠX and
X×Y
FΠY , respectively. Sklar’s theorem [4] now implies that there is a copula C such that FX×Y = C(FX , FY )
and FΠTM thus consists of the joint distribution functions obtained by an application of all copulas to
X×Y
all pairs (FX , FY ) ∈ FΠX × FΠY .
Acknowledgements
The work on this paper was partially supported by the grant AV ČR A2075302 and by the European
project CEEPUS SK-42. The author would like to express his gratitude to Prof. Radko Mesiar for
valuable comments and suggestions regarding the presented topic.
References
[1] de Cooman, G.: Possibility theory I-III. Int. Journal of General Systems (1997) 291–371
[2] de Cooman, G., Aeyels, D.: Supremum preserving upper probabilities. Information Sciences
(1999) 173–212
[3] Klement, E.P., Mesiar, R., Pap, E.: Triangular Norms. Kluwer Academic Publishers, Dordrecht
(2000)
[4] Nelsen, R.: An Introduction to Copulas. Lecture Notes in Statistics. Springer, New York (1999)
107
Semicontinuous L-real valued functions
T OMASZ K UBIAK
Wydział Matematyki i Informatyki
Uniwersytet im. Adama Mickiewicza
61614 Poznań, Poland
E-mail: t❦✉❜✐❛❦❅❛♠✉✳❡❞✉✳♣❧
Recall that when X is a topological space, the lower and upper limit functions f∗ and f ∗ of a given
f : X → R (or to R) are defined as follows:
f∗ (x) =
_ ^
{
f (U) : U is an open nbhd of x}
f ∗ (x) =
^ _
f (U) : U is an open nbhd of x}.
and
{
In this report we study lower and upper limits of L-real valued functions by extending the operators
(·)∗ and (·)∗ to the framework of L-topological spaces. The approach we are taking involves scales of
L-sets.
More specifically, let (L,′ ) be a complete lattice with an order-reversing involution and let X be
a set. Each order-preserving family A = {ar : r ∈ Q ∩ R} ⊂ LX is called an extended scale of L,
W
V
and it is called a scale whenever A = 1X and A = 10/ . It is well known that for every x ∈ X and
V
t ∈ R, the function αx : R → L, defined by αx (t) = r<t ar′ (x), is order-reversing and, when A is a
W
V
scale, then αx (R) = 1 and αx (R) = 0. The function f : X → R(L) (respectively, R(L)), defined by
f (x) = [αx ], is said to be genrated by the scale (respectively, extended scale) A . For X an L-topological
space and an (extended) scale A , we let
A∗ = {ClX ar : r ∈ Q ∩ R} and A ∗ = {IntX ar : r ∈ Q ∩ R}.
Then the functions f∗ and f ∗ generated by, respectively, A∗ and A ∗ , are called lower and limit
functions of f . When the L-real line R(L) is endowed with the right L-topology RL = {Rt : t ∈
R} ∪ {10/ , 1R(L) } or with the left L-topology LL = {Lt : t ∈ R } ∪ {10/ , 1R(L) }, then members of
LSC(X, R(L)) = { f ∈ R(L)X : u ◦ f is open in X for all u ∈ RL }
and
USC(X, R(L)) = { f ∈ R(L)X : u ◦ f is open in X for all u ∈ LL }
are called lower and uper semicontinuous function on X.
A detailed study of the operators (·)∗ and (·)∗ will be presented. In particular, one has LSC(X) =
{ f : f = f∗ } and USC(X) = { f : f = f ∗ }. Also, the concept of an epigraph of an L-real valued
function will be defined and the classical relationship between the closedness of the epigraph and
108
lower semicontinuity will be shown to hold for the case of stratified L-topological space. Specifically,
when (L,′ ) is a frame, then f ∈ LSC(X, R(L)) if and only if
Gf =
_
t∈R
(Rt ◦ f ) × Lt
is open in the product L-topological space X × R(L).
For I(L)-valued function, the assignment I(L)X ∋ f 7→ G f ∈ LX×[0,1)(L) will be used to construct
the hypergraph functor form the category TOP(I(L)) of I(L)-topological spaces into the category
TOP(L) of L-topological spaces, which with L the two-pont chain reduces to the classical hypergraph
functor. With L a meet-continuous lattice, the link between that hypergraph functor and the functors
ΩL : TOP(L) → TOP(I(L)) and IL : TOP(I(L)) → TOP(L) continues to hold.
Semicontinuous L-real valued functions are well-known to play an important role in characterizing
some important classes of L-topological spaces, including L-normal and completely L-regular spaces.
Some of those results will be restated (and sometimes reproved) in trems of lower and upper limit
functions.
109
Topological locally finite MV-algebra and the Riemann Surface
PAAVO K UKKURAINEN
Lappeenranta University of Technology
53851 Lappeenranta, Finland
E-mail: ♣❛❛✈♦✳❦✉❦❦✉r❛✐♥❡♥❅❧✉t✳❢✐
1
Preliminaries
For MV -algebras, we refer to [1], [2] and for bounded commutative BCK-algebras to [3]. In [3]
refered to [7], it is showed that an MV - algebra defines a bounded commutative BCK-algebra and
conversely. In fact, let · and + be the binary operations and − the unary operation of an MV -algebra.
If ⋆ is the operation of a bounded commutative BCK-algebra, then x ⋆ y = x · ȳ. On the other hand,
we have x̄ = 1 ⋆ x, x · y = x ⋆ ȳ, x + y = (x̄ ⋆ y)− . The partial ordering ≤ in a bounded commutative
BCK-algebra is defined as follows: x ≤ y iff x ⋆ y = 0. By [3], I is an ideal of an MV -algebra iff I is an
ideal of a BCK-algebra. For BCK-algebras and ideals of a BCK-algebra and an MV -algebra see [5],
[1] and [2]. For the Riemann surfaces we refer to [6].
2
2.1
Topological locally finite MV -algebra
Linear Topology induced by Ideals
In [4], it is constructed a topology for an MV -algebra A considered as a bounded commutative BCKalgebra.
Let Λ be a directed set i.e. a partially ordered set such that for λ, µ ∈ Λ there is ν ∈ Λ for which
λ ≤ ν and µ ≤ ν.
Let F = {Iλ | λ ∈ Λ} be a family of ideals of A such that if λ < µ then Iµ ⊂ Iλ . Define a relation ∼
in the following way [5]:
x ∼ y mod Iλ
iff
x ⋆ y ∈ Iλ
and
y ⋆ x ∈ Iλ ,
(1)
and let
U(x, λ) = {y ∈ A | x ∼ y mod Iλ }
(2)
The neighborhoods U(x, λ) defines a topology in A called the linear topology induced by F. Further, (x, y) → x ⋆ y and x → x̄ are continuous. Therefore, A is a topological MV -algebra.
110
2.2
Locally finite MV -algebras as Topological MV -algebras
The following proposition is proved by C.S.Hoo:
Proposition 1. [4] The topology on a locally finite MV -algebra is one of the following types:
1. Hausdorff and connected,
2. Hausdorff and totally disconnected,
3. the trivial topology.
It is known that a locally finite MV -algebra A is isomorphic to a subset of the unit interval [0,1],
[1], with a Lukasiewicz structure. Without loss of generality we suppose that the smallest and the
greatest elements of this subset are 0 and 1. We keep A just as this subset and obtain
x ⋆ y = x · ȳ = max(0, x + 1 − y − 1) = max(0, x − y).
(3)
y ⋆ x = y · x̄ = max(0, y + 1 − x − 1) = max(0, y − x).
(4)
Therefore, if
x ≥ y,
x ⋆ y = x − y = |x − y|
(5)
y⋆x = 0
y ≥ x,
(6)
y ⋆ x = y − x = |y − x|
(7)
x⋆y = 0
(8)
Let I be an ideal of A. By relation ∼ modulo I
x ∼ y mod I
iff
x⋆y ∈ I
and
y⋆x ∈ I
iff
|x − y| ∈ I.
(9)
and so
U(x) = {y ∈ A | x ∼ y mod I} = {y ∈ A | |x − y| ∈ I}.
(10)
Since the only ideals of A are {0} and the whole A [1], we analyse the results of Proposition 1
with the neighborhoods U(x):
1. Let I = {0}. Then x = y and U(x) = {x} for every x ∈ A. In this case every singleton {x} is
open and the topology is discrete and so totally disconnected. Conversely, if A is totally disconnected,
then for every x ∈ A, the component of x is {x}. Especially, the component of 0 is {0}. Since the
component is an ideal [4], I = {0}. It is proved that I = {0} iff A is totally disconnected.
2. Let I = A. The topology is trivial iff U(x) = A for every x ∈ A.
3. Let I = A such that U(x) 6= A for some x ∈ A. Neither A is totally disconnected nor the topology
on A is trivial, by Proposition 1, A is Hausdorff and connected. In this case we choose the relative
usual topology on A.
111
3
Topological locally finite MV -algebra as the Riemann Surface
The theory of the Riemann surface which is used is found from [6]. Let A be a topological locally
finite MV -algebra. Consider the case where A is Hausdorff and connected.
Proposition 2. Let A be a topological locally finite MV -algebra. If A is Hausdorff and connected,
then A × A is a compact Riemann surface which is topologically a torus.
Proof. The theory of the Riemann surface which is used is found from [6]. Let S be a Riemann surface
which has the complex plane as its universal covering surface D. Assume the covering group G has
two generators z → z + 1 and z → z + i (translations). A fundamental domain is now the interior of the
square with vertices at 0, 1, 1 + i, i, which is (isomorphic to) the interior of [0, 1] × [0, 1]. In this case
the Riemann surface S = D/G (modulo conformal equivalence) is compact. Since the opposite sides
of the square 0, 1, 1 + i, i are equivalent under G, topologically S = A × A is a torus.
References
[1] L.P.Belluce, Semisimple algebras of infinite valued logic and bold fuzzy set theory, Can.J.Math.38
No.6(1986),1356-1379.
[2] C.C.Chang, Algebraic analysis of many value logics, Trans.Amer.Math.Soc.88(1958).
[3] C.S.Hoo, MV-algebras, ideals and semisimplicity, Math.Japonica 34, No.4(1989),563-583.
[4] C.S.Hoo, Topological MV-algebras, Topology and its Applications 81(1997),103-121.
[5] K.Iseki and S.Tanaka, An introduction to the theory of BCK-algebra, Math.Japon.23 No.1(1978).
[6] O.Lehto, Univalent Functions and Teichmuller Spaces, Springer-Verlag,New York,1987.
[7] D.Mundici, MV-algebras and categorially equivalent to bounded commutative BCK-algebra,
Math.Japon.31(1986),889-894.
112
Dequantization of mathematics, idempotent semirings and fuzzy sets
G RIGORII L ITVINOV
Center for continuous mathematical education
Independent University of Moscow
121002 Moscow, Russia
E-mail: ❣❧✐t✈✐♥♦✈❅♠❛✐❧✳r✉
1. Introduction. The traditional mathematics over numerical fields can be dequantized as the
Planck constant h̄ tends to zero taking pure imaginary values. This dequantization leads to the
so-called Idempotent Mathematics based on replacing the usual arithmetic operations by a new set
of basic operations (e.g., such as maximum or minimum), that is on the concepts of idempotent
semifield and semiring. Typical examples are given by the so-called (max, +) algebra Rmax and
(min, +) algebra Rmin . Let R be the field of real numbers. Then Rmax = R ∪ {−∞} with operations
x ⊕ y = max{x, y} and x ⊙ y = x + y. Similarly Rmin = R ∪ {+∞} with the operations ⊕ = min, ⊙ = +.
The new addition ⊕ is idempotent, i.e., x ⊕ x = x for all elements x. Some problems that are nonlinear
in the traditional sense turn out to be linear over a suitable idempotent semiring (idempotent superposition principle [1]). For example, the Hamilton-Jacobi equation (which is an idempotent version of
the Schrödinger equation) is linear over Rmin and Rmax .
The basic paradigm is expressed in terms of an idempotent correspondence principle [2].This
principle is similar to the well-known correspondence principle of N. Bohr in quantum theory (and
closely related to it). Actually, there exists a heuristic correspondence between important, interesting
and useful constructions and results of the traditional mathematics over fields and analogous constructions and results over idempotent semirings and semifields (i.e., semirings and semifields with
idempotent addition). For example, the well-known Legendre transform can be treated as an Rmax version of the traditional Fourier transform (this observation is due to V. P. Maslov).
A systematic and consistent application of the idempotent correspondence principle leads to a
variety of results, often quite unexpected. As a result, in parallel with the traditional mathematics
over rings, its “shadow”, the Idempotent Mathematics, appears. This “shadow” stands approximately
in the same relation to the traditional mathematics as classical physics to quantum theory. In many
respects Idempotent Mathematics is simpler than the traditional one. However, the transition from
traditional concepts and results to their idempotent analogs is often nontrivial.
In this talk a brief survey of basic ideas of Idempotent Mathematics is presented. Relations between this theory and the theory of fuzzy sets as well as the possibility theory and some applications
(including computer applications) are discussed. Hystorical surveys and the corresponding references
can be found in [2]–[5].
2. Semirings, semifields, and idempotent dequantization. Consider a set S equipped with two
algebraic operations: addition ⊕ and multiplication ⊙. It is a semiring if the following conditions are
satisfied:
• the addition ⊕ and the multiplication ⊙ are associative;
• the addition ⊕ is commutative;
113
• the multiplication ⊙ is distributive with respect to the addition ⊕: x ⊙ (y ⊕ z) = (x ⊙ y) ⊕ (x ⊙ z)
and (x ⊕ y) ⊙ z = (x ⊙ z) ⊕ (y ⊙ z) for all x, y, z ∈ S.
The semiring is commutative if the multiplication ⊙ is commutative. A unity of a semiring S is
an element 1 ∈ S such that 1 ⊙ x = x ⊙ 1 = x for all x ∈ S. A zero of a semiring S is an element 0 ∈ S
such that 0 6= 1 and 0 ⊕ x = x, 0 ⊙ x = x ⊙ 0 = 0 for all x ∈ S. A semiring S is called an idempotent
semiring if x ⊕ x = x for all x ∈ S. A semiring S with neutral elements 0 and 1 is called a semifield if
every nonzero element of S is invertible.
The following examples are important. Let P be the segment [0, 1] equipped with the operations
x ⊕ y = max{x, y} and x ⊙ y = min{x, y}; then P is a commutative idempotent semiring (but not a
semifield). The subset B = {0, 1} in M equipped with the same operations is the well-known Boolean
algebra which is an idempotent semifield. In this case ⊕ and ⊙ are the usual Boolean operations
(disjunction and conjunction). In the general case the semiring addition and multiplication could be
treated as generalized logical (Boolean) operations.
Let R be the field of real numbers and R+ the semiring of all nonnegative real numbers (with
respect to the usual addition and multiplication). The change of variables x 7→ u = h ln x, h > 0,
defines a map Φh : R+ −→ S = R ∪ {−∞}. Let the addition and multiplication operations be mapped
from R to S by Φh , i.e., let u ⊕h v = h ln(exp(u/h) + exp(v/h)), u ⊙ v = u + v, 0 = −∞ = Φh (0),
1 = 0 = Φh (1). It can easily be checked that u ⊕h v −→ max{u, v} as h −→ 0 and S forms a semiring
with respect to addition u ⊕ v = max{u, v} and multiplication u ⊙ v = u + v with zero 0 = −∞ and unit
1 = 0. Denote this semiring by Rmax ; it is idempotent. The semiring Rmax is actually a commutative
semifield. This construction is due to V.P. Maslov [1]; now it is known as Maslov’s dequantization.
The analogy with quantization is obvious; the parameter h plays the rôle of the Planck constant,
so R+ (or R) can be viewed as a “quantum object” and Rmax as the result of its “dequantization”. A
similar procedure gives the semiring Rmin = R ∪ {+∞} with the operations ⊕ = min, ⊙ = +; in this
case 0 = +∞, 1 = 0. The semirings Rmax and Rmin are isomorphic. Connections with physics and
imaginary values of the Planck constant are discussed in [4]. The commutative idempotent semiring
R ∪ {−∞} ∪ {+∞} with the operations ⊕ = max, ⊙ = min can be obtained as a result of a “second
dequantization” of R (or R+ ). Dozens of interesting examples of nonisomorphic idempotent semirings
may be cited as well as a number of standard methods of deriving new semirings from these (see, e.g.,
[2]–[5]).
Idempotent dequantization is a generalization of Maslov’s dequantization. This is a passage from
fields to idempotent semifields and semirings in mathematical constructions and results. The idempotent correspondence principle (see Introduction and [2, 4]) often works for this idempotent dequantization.
3. Idempotent Analysis. Let S be an arbitrary semiring with idempotent addition ⊕ (which is
always assumed to be commutative), multiplication ⊙, zero 0, and unit 1. The set S is supplied with
the standard partial order 4: by definition, a 4 b if and only if a ⊕ b = b. Thus all elements of S are
positive: 0 4 a for all a ∈ S. Due to the existence of this order, Idempotent Analysis is closely related
to the lattice theory, the theory of vector lattices, and the theory of ordered spaces. Moreover, this
partial order allows to simulate a number of basic notions and results of Idempotent Analysis at the
purely algebraic level.
Calculus deals mainly with functions whose values are numbers. The idempotent analog of a
numerical function is a map X −→ S, where X is an arbitrary set and S is an idempotent semiring.
Functions with values in S can be added, multiplied by each other, and multiplied by elements of S.
114
The idempotent analog of a linear functional space is a set of S-valued functions that is closed
under addition of functions and multiplication of functions by elements of S, or an S-semimodule.
Consider, e.g., the S-semimodule B (X, S) of functions X −→ S that are bounded in the sense of the
standard order on S.
If S = Rmax , then the idempotent analog of integration is defined by the formula
I(ϕ) =
Z ⊕
X
ϕ(x) dx = sup ϕ(x),
(1)
x∈X
where ϕ ∈ B (X, S). Indeed, a Riemann sum of the form ∑ ϕ(xi ) · σi corresponds to the expression
L
i
i
ϕ(xi ) ⊙ σi = max{ϕ(xi ) + σi }, which tends to the right-hand side of (1) as σi −→ 0. Of course,
i
this is a purely heuristic argument. Formula (1) defines the idempotent integral not only for functions
taking values in Rmax , but also in the general case when any of bounded (from above) subsets of S has
the least upper bound.
An idempotent measure on X is defined by mψ (Y ) = sup ψ(x), where ψ ∈ B (X, S). The integral
x∈Y
with respect to this measure is defined by
Iψ (ϕ) =
Z ⊕
X
ϕ(x) dmψ =
Z ⊕
X
ϕ(x) ⊙ ψ(x) dx = sup(ϕ(x) ⊙ ψ(x)).
(2)
x∈X
Obviously, if S = Rmin , then the standard order 4 is opposite to the conventional order 6, so in
this case equation (2) assumes the form
Z ⊕
X
ϕ(x) dmψ =
Z ⊕
X
ϕ(x) ⊙ ψ(x) dx = inf (ϕ(x) ⊙ ψ(x)),
x∈X
(3)
where inf is understood in the sense of the conventional order 6.
The functionals I(ϕ) and Iψ (ϕ) are linear over S; their values correspond to limits of Lebesgue
(or Riemann) sums. The formula for Iψ (ϕ) defines the idempotent scalar product of the functions ψ
and ϕ. Various idempotent functional spaces and an idempotent version of the theory of distributions
can be constructed on the basis of the idempotent integration, see, e.g., [1], [3]–[5]. The analogy
of idempotent and probability measures leads to spectacular parallels between optimization theory
and probability theory. For example, the Chapman–Kolmogorov equation corresponds to the Bellman
equation (see, e.g., [6, 5]). Many other idempotent analogs may be cited (in particular, for basic
constructions and theorems of functional analysis [4]).
4. The superposition principle and linear problems. Basic equations of quantum theory are
linear (the superposition principle). The Hamilton–Jacobi equation, the basic equation of classical
mechanics, is nonlinear in the conventional sense. However it is linear over the semirings Rmin and
Rmax . Also, different versions of the Bellman equation, the basic equation of optimization theory,
are linear over suitable idempotent semirings (V. P. Maslov’s idempotent superposition principle), see
[1, 3]. For instance, the finite-dimensional stationary Bellman equation can be written in the form X =
H ⊙X ⊕F, where X, H, F are matrices with coefficients in an idempotent semiring S and the unknown
matrix X is determined by H and F [7]. In particular, standard problems of dynamic programming and
the well-known shortest path problem correspond to the cases S = Rmax and S = Rmin , respectively. In
[7], it was shown that main optimization algorithms for finite graphs correspond to standard methods
for solving systems of linear equations of this type (i.e., over semirings). Specifically, Bellman’s
115
shortest path algorithm corresponds to a version of Jacobi’s algorithm, Ford’s algorithm corresponds
to the Gauss–Seidel iterative scheme, etc.
Linearity of the Hamilton–Jacobi equation over Rmin (and Rmax ) is closely related to the (conventional) linearity of the Schrödinger equation, see [4] for details.
5. Correspondence principle for algorithms and their computer implementations. The idempotent correspondence principle is valid for algorithms as well as for their software and hardware
implementations [2]. In particular, according to the superposition principle, analogs of linear algebra
algorithms are especially important. It is well-known that algorithms of linear algebra are convenient
for parallel computations; so their idempotent analogs accept a parallelization. This is a regular way to
use parallel computations for many problems including basic optimization problems. It is convenient
to use universal algorithms which do not depend on a concrete semiring and its concrete computer
model. Software implementations for universal semiring algorithms are based on object-oriented and
generic programming; program modules can deal with abstract (and variable) operations and data
types, see [2, 8] for details.
The most important and standard algorithms have many hardware realizations in the form of technical devices or special processors. These devices often can be used as prototypes for new hardware
units generated by substitution of the usual arithmetic operations for its semiring analogs, see [2] for
details. Good and efficient technical ideas and decisions can be transposed from prototypes into new
hardware units. Thus the correspondence principle generates a regular heuristic method for hardware
design. Note that to get a patent it is necessary to present the so-called “invention formula”, that is to
indicate a prototype for the suggested device and the difference between these devices.
6. Idempotent interval analysis. An idempotent version of the traditional interval analysis is
presented in [9]. Let S be an idempotent semiring equipped with the standard partial order (see the
beginning of Section 3). A closed interval in S is a subset of the form x = [x, x] = {x ∈ S|x 4 x 4 x},
where the elements x 4 x are called lower and upper bounds of the interval x. A weak interval extension I(S) of the semiring S is the set of all closed intervals in S endowed with operations ⊕ and ⊙
defined as x ⊕ y = [x ⊕ y, x ⊕ y], x ⊙ y = [x ⊙ y, x ⊙ y]; the set I(S) is a new idempotent semiring with
respect to these operations. It is proved that basic problems of idempotent linear algebra are polynomial, whereas in the traditional interval analysis problems of this kind are generally NP-hard. Exact
interval solutions for the discrete stationary Bellman equation (this is the matrix equation discussed
in Section 4) and for the corresponding optimization problems are constructed and examined.
7. Generalized fuzzy sets. Let Ω be the so-called universe consisting of “elementary events” and
S an idempotent semiring. Denote by F (S) the set of functions defined on Ω and taking their values
in S; then F (S) is an idempotent semiring with respect to the pointwise addition and multiplication
of functions. We shall say that elements of F (S) are generalized fuzzy sets. We have the well known
classical definition of fuzzy sets (L.A. Zadeh [10]) if S = P, where P is the segment [0, 1] with the
semiring operations ⊕ = max and ⊙ = min, see Section 2. Of course, functions from F (P) taking
their values in the Boolean algebra B = {0, 1} ⊂ P correspond to traditional sets from Ω and semiring
operations correspond to standard operations for sets. In the general case if S has neutral elements 0
and 1 (and 0 6= 1), then functions from F (S) taking their values in B = {0, 1} ⊂ S can be treated as
traditional subsets in Ω. If S is a lattice (i.e. x ⊙ y = inf{x, y} and x ⊕ y = sup{x, y}), then generalized
fuzzy sets coincide with L-fuzzy sets in the sense of J.A. Goguen [11]. The set I(S) of intervals is an
idempotent semiring (see Section 6), so elements of F (I(S)) can be treated as interval (generalized)
fuzzy sets.
116
It is well known that the classical theory of fuzzy sets is a basis for the theory of possibility
[12]. Of course, it is possible to develop a similar generalized theory of possibility starting from
generalized fuzzy sets. In general the generalized theories are noncommutative; they seem to be more
qualitative and less quantitative with respect to the classical theories presented in [10, 12]. We see
that Idempotent Analysis and the theory of (generalized) fuzzy sets and possibility have the same
objects, i.e. functions taking their values in semirings. However, basic problems and methods could
be different for these theories (like for the measure theory and the probability theory).
References
[1] V. P. Maslov, Méthodes opératorielles, Mir, Moscou, 1987.
[2] G.L. Litvinov and V.P. Maslov, Correspondence principle for idempotent calculus and some computer applications, (IHES/M/95/33), Institut des Hautes Etudes Scientifiques, Bures-sur-Yvette
1995, also in: [5], 420–443. E-print math.GM/0101021 (http://arXiv.org).
[3] V.N. Kolokoltsov and V. P. Maslov, Idempotent Analysis and Applications, Kluwer Acad. Publ.,
Dordrecht, 1997.
[4] G. L. Litvinov, V. P. Maslov, G. B. Shpiz, Idempotent functional analysis: an algebraic approach,
Mathematical Notes, 69, no. 5 (2001), 696–729, E-print math.FA/0009128 (http://arXiv.org).
[5] J. Gunawardena (ed.), Idempotency, Publ. of the Newton Institute, Cambridge Univ. Press, Cambridge, 1998.
[6] P. Del Moral, A survey of Maslov optimization theory, In [3].
[7] B. A. Carré, An algebra for network routing problems, J. Inst. Math. Appl., 7 (1971), 273–294.
[8] G.L. Litvinov and E.V. Maslova, Universal numerical algorithms and their software implementation, Programming and Computer Software, 26, no. 5 (2000), 275–280. E-print math.SC/0102114
(http://arXiv.org).
[9] G.L. Litvinov and A.N. Sobolevskii, Idempotent interval analysis and optimization problems,
Reliable Computing, 7, no. 5 (2001), 353–377. E-print math.SC/0101080 (http://arXiv.org).
[10] L.A. Zadeh, Fuzzy sets, Information and Control, 8 (1965), 338–353.
[11] J.A. Goguen, L-fuzzy sets, J. of Math. Anal. Appl., 18, no. 1 (1967), 145–174.
[12] L.A. Zadeh, Fuzzy sets as a basis for a theory of possibility, Fuzzy Sets and Systems, 1 (1978),
3–28.
117
De Morgan triplets in the theory of fuzzified normal forms
KOEN M AES , B ERNARD D E BAETS
Dept. of Applied Mathematics, Biometrics, and Process Control
Ghent University
9000 Gent, Belgium
E-mail: {❑♦❡♥✳▼❛❡s|❇❡r♥❛r❞✳❉❡❇❛❡ts}❅❯●❡♥t✳❜❡
Abstract
The purpose of normal forms is to provide a standard representation or approximation of various kinds of functions. Boolean functions, for instance, have both a disjunctive and conjunctive
normal form representation. Interpreting these normal forms in a suitable t-norm-based logic
leads to some interval-valued fuzzification of the original Boolean function. We will deal with
two mathematical questions: first, in which t-norm-based logic do we actually obtain intervals
and second, if so, to what extent does the length of the intervals depend on the original Boolean
function.
1
Introduction
A Boolean expression is an expression involving variables each of which can take either the value true
or false. These variables are combined using Boolean operations such as conjunction (∧), disjunction
(∨) and negation (′ ). It is common knowledge that each Boolean function can be represented by a
well-formed formula in Boolean propositional logic. Moreover, there are two special forms, the disjunctive and conjunctive normal form, which are of great interest, for each of these forms defines the
Boolean function in a unique way.
In many cases, crisp models are too ‘poor’ to represent the ‘human way of thinking’. Fuzzy sets
provide a widely accepted solution to that end. Typical to fuzzy set theory is the large set of options
(logical operations, shapes of membership functions, parameters) that are available to the user. A
unique and definite definition of the intersection of two fuzzy sets, for instance, cannot be expected.
However, fuzzifying the disjunctive and conjunctive normal form representation of a Boolean expression results in two standard fuzzifications of the original Boolean function. All attention so far has
focused on the comparability of these fuzzified normal forms, in particular for binary Boolean functions [1, 3, 11, 12, 13, 14]. We contribute to the existing knowledge on this comparability. Because of
their theoretical importance, special attention will be drawn to left-continuous t-norms.
Before we start we fix some notations. Let φ be an [0, 1]-automorphism and N the standard negator,
then the De Morgan triplets h(TM )φ , (SM )φ , Nφ i, h(TP )φ , (SP )φ , Nφ i, h(TL )φ , (SL )φ , Nφ i,
h(TD )φ , (SD )φ , Nφ i and h(T nM )φ , (SnM )φ , Nφ i will be called respectively (M, φ)-, (P, φ)-, (L, φ)-, (D, φ)and (nM, φ)-triplets. In case φ is the identity mapping, we talk about the M-, P-, L-, D- and nM-triplet.
118
2
Fuzzified normal forms of n-ary Boolean functions
Consider the Boolean algebra ({0, 1}, ∨, ∧,′ , 0, 1). The disjunctive and conjunctive normal forms of
an n-ary Boolean function f are given by
_
x1e1 ∧ ... ∧ xnen
^
x11 ∨ ... ∨ xnn ,
DB ( f )(x1 , ..., xn ) =
f (e1 ,...,en )=1
and
CB ( f )(x1 , ..., xn ) =
f (e1 ,...,en )=0
e′
e′
(1)
(2)
if e = 0. One can fuzzify expressions (1) and (2) by replacing (∧, ∨,′ )
by a triplet (T, S, N), with N an involutive negation. The corresponding disjunctive and conjunctive
fuzzified normal forms are denoted by DF and CF . For each n-ary Boolean function f we obtain two
[0, 1]n −→ [0, 1] mappings DF ( f ) and CF ( f ):
where xe
= x if e = 1 and xe
= x′
DF ( f )(x) = S{ f (e) T (xe ) | e ∈ {0, 1}n } ,
)
(
0 N N
n
(e )
| e ∈ {0, 1} ,
(1 − f (e)) S x
CF ( f )(x) = T
where x ∈ [0, 1]n , 0 = (0, ..., 0) and xe = (x1e1 , ..., xnen ).
While DF ≤ CF 4 does not hold for all continuous De Morgan triplets [14, 10], we wonder whether
DF ≤ CF is true for the basic continuous De Morgan triplets (M, φ), (P, φ), and (L, φ). Remark that,
in case we work with the M-triplet, the inequality DF ≤ CF also follows from [3].
Theorem 1. [10] For any (M, φ)-, (P, φ)- and (L, φ)-triplet it holds that DF ( f ) ≤ CF ( f ), for all n-ary
Boolean functions f .
Because a full characterization of non-continuous t-norms, in particular left-continuous ones, is
still lacking, we restrict ourselves in the non-continuous case to the basic triplets (D, φ) and (nM, φ).
We obtain a similar result as for the three prototypical continuous triplets.
Theorem 2. [10] For any (D, φ)-, (nM, φ)-triplet it holds that DF ( f ) ≤ CF ( f ), for all n-ary Boolean
functions f .
3
Independence of the n-ary Boolean function:
a system of functional equations
Knowing that DF ≤ CF holds for a triplet (T, S, N), it remains an intriguing problem, from a mathematical point of view, to understand to what extent CF ( f ) − DF ( f ) depends on the n-ary Boolean
function f . More specifically, we wonder for which triplets CF ( f )(x) − DF ( f )(x) is only a function
of the variable x ∈ [0, 1]n (i.e. independent of the Boolean function f ). In [10], we have already encountered three solutions: the L-triplet, the nM-triplet and all (D, φ)-triplets.
4D
F
≤ CF is a shorthand to express that DF ( f )(x) ≤ CF ( f )(x), for every x ∈ [0, 1]n
119
n
As shown in the following lemma, although there are 22 different n-ary Boolean functions f , imposing that CF ( f )(x) − DF ( f )(x) must be independent of the Boolean function f , is equivalent to a
system of 3 functional equations.
Theorem 3. Consider a triplet (T, S, N), with N an involutive negation with fixpoint aN . Then
CF ( f )(x) − DF ( f )(x) is independent of the Boolean function f if and only if for all x ∈ [0, aN ]n ,
x1 ≤ x2 ≤ ... ≤ xn , the following expressions are equal to each other
N , xN ) ,
S(x1 , ..., xn−1 , xnN ) − T (x1N , ..., xn−1
n
N ,x ),
S(x1 , ..., xn−1 , xn ) − T (x1N , ..., xn−1
n
(3)
(4)
T (S(x1 , ..., xn−1 , xnN ), S(x1 , ..., xn−1 , xn )) ,
(5)
N , x ), T (xN , ..., xN , xN )) .
1 − S(T (x1N , ..., xn−1
n
1
n−1 n
(6)
When considering a De Morgan triplet hT, S, N i, this system of functional equations reduces to a
single functional equation in two dimensions:
Theorem 4. Consider a De Morgan triplet hT, S, N i. Then CF ( f )(x) − DF ( f )(x) is independent of
the Boolean function f if and only if
S(T (xN , y), T (xN , yN )) = T (xN , y) + T (xN , yN ) ,
for any (x, y) ∈ [0, 1/2]2 , x ≤ y.
We have shown that the L-triplet is the only continuous De Morgan triplet for which the difference
between both normal forms is independent of the n-ary Boolean function f .
Theorem 5. Consider a triplet (T, S, N), with T a left-continuous t-norm, S a right-continuous tconorm and N an involutive negation with fixpoint aN . Suppose that T (x, aN ) and S(x, aN ) are continuous and that (T, S, N) is a De Morgan triplet or N = N . Then CF ( f )(x) − DF ( f )(x) is independent
of the Boolean function f if and only if (T, S, N) is the L-triplet.
Further, we characterize the De Morgan triplets hT, S, Ni, with T a left-continuous t-norm that
fulfills some additional continuity conditions, for which CF ( f )(x) − DF ( f )(x) is only a function of
the variable x ∈ [0, 1]n . We obtain a unique De Morgan triplet that is based on a t-norm Tλ , with
λ ∈ [0, 1/2[, defined by
0
min(x, y)
Tλ (x, y) = x + y − 1
1−λ
, if x + y ≤ 1 ,
, if x + y > 1 ∧ min(x, y) ∈ ]λ, 1 − λ] ,
, if x + y > 1
∧ (x + y ≥ 2 − λ ∨ min(x, y) ∈ [0, λ]) ,
, if x + y ≤ 2 − λ ∧ min(x, y) ∈ ]1 − λ, 1] .
Every t-norm in this family can be obtained by applying the rotation construction of Jenei [4, 5, 6, 7]
on a suitable ordinal sum [8]. The nilpotent minimum T nM [2] corresponds to λ = 0.
120
Theorem 6. Consider a De Morgan triplet hT, S, Ni based on a left-continuous t-norm T and an
involutive negation N with fixpoint aN . Suppose that Ty (x) := T (x, y) is continuous on ]yN , 1] for any
y ∈ [0, aN ] and is continuous on [y, 1] for any y ∈ ]aN , 1]. Suppose also that
lim T (x, aN ) > 0 .
>
x→aN
Then CF ( f )(x) − DF ( f )(x) is independent of the Boolean function f if and only if N = N and T = Tλ ,
for some λ ∈ [0, 1/2[.
4
Further research
In future work, it would be worthwhile to try once again to get rid of the extra conditions (N = N ,
(T, S, N) is a De Morgan triplet, ...) in the characterization theorems. Moreover, the new insights in
the treated system of functional equations force us to review the inequality DF ≤ CF more closely. It
would be preferable to establish a necessary condition on (T, S, N) for DF ≤ CF to hold, when working
with n-ary Boolean functions, and which covers all the known suitable triplets (T, S, N). Finally, we
are challenged to lay bare all connections between interval-valued preference structures, based on
fuzzified normal forms [1], and those based on a pair of generators [9].
References
[1] T. Bilgiç, Interval-valued preference structures, European J. of Operational Research 105
(1998), 162–183.
[2] J. Fodor, Contrapositive symmetry of fuzzy implications, Fuzzy Sets and Systems 69 (1995),
141–156.
[3] M. Gehrke, C. Walker, and E. Walker, Normal forms and truth tables for fuzzy logics, Fuzzy Sets
and Systems 138 (2003), 25–51.
[4] S. Jenei, Structure of left-continuous triangular norms with strong induced
negations. (I) Rotation construction, J. Appl. Non-Classical Logics 10 (2000),
83–92.
[5] S. Jenei, Structure of left-continuous triangular norms with strong induced negations. (II)
Rotation-annihilation construction, J. Appl. Non-Classical Logics 11 (2001), 351–366.
[6] S. Jenei, Structure of left-continuous triangular norms with strong induced negations. (III) Construction and decomposition, Fuzzy Sets and Systems 128 (2002), 197–208.
[7] S. Jenei, A characterization theorem on the rotation construction for triangular norms, Fuzzy
Sets and Systems 136 (2003), 283–289.
[8] E. Klement, R. Mesiar, and E. Pap, Triangular Norms, Trends in Logic, Vol. 8, Kluwer, Dordrecht, 2000.
[9] K. Maes and B. De Baets, Extracting strict orders from fuzzy preference relations, Lecture Notes
in Computer Science 2715 (2003), 261–268.
121
[10] K. Maes and B. De Baets, Facts and figures on fuzzified normal forms, 2003, submitted.
[11] I. Türkşen, Interval-valued fuzzy sets based on normal forms, Fuzzy Sets and Systems 20 (1986),
191–210.
[12] I. Türkşen, Fuzzy normal forms, Fuzzy Sets and Systems 69 (1995), 319–346.
[13] C. Walker and E. Walker, Inequalities in De Morgan systems I, Proc. IEEE World Congress
(Hawai), 2002, pp. 607–609.
[14] C. Walker and E. Walker, Inequalities in De Morgan systems II, Proc. IEEE World Congress
(Hawai), 2002, pp. 610–615.
122
k-intolerant capacities and Choquet integrals
J EAN -L UC M ARICHAL
Faculty of Law, Economics and Finance
University of Luxembourg
1511 Luxembourg, G.D. Luxembourg
E-mail: ♠❛r✐❝❤❛❧❅❝✉✳❧✉
Abstract
We define an aggregation function to be (at most) k-intolerant if it is bounded from above
by its kth lowest input value. Applying this definition to the discrete Choquet integral and its
underlying capacity, we introduce the concept of k-intolerant capacities which, when varying k
from 1 to n, cover all the possible capacities on n objects. Just as the concepts of k-additive
capacities and p-symmetric capacities have been previously introduced essentially to overcome
the problem of computational complexity of capacities, k-intolerant capacities are proposed here
for the same purpose but also for dealing with intolerant or tolerant behaviors of aggregation.
Keywords: multi-criteria analysis, interacting criteria; capacities; Choquet integral.
1
Introduction
In a previous work [7] the author investigated the intolerant behavior of the discrete Choquet integral
when used to aggregate interacting criteria. Roughly speaking, the Choquet integral Cv , or equivalently its associated capacity v, has an intolerant behavior if its output (aggregated) value is often
close to the lowest of its input values. More precisely, consider the domain [0, 1]n of Cv as a probability space, with uniform distribution, and the mathematical expectation of Cv , which expresses the
typical position of Cv within the unit interval. A low expectation then means that the Choquet integral
is rather intolerant and behaves nearly like the minimum on average. Similarly, a high expectation
means that the Choquet integral is rather tolerant and behaves nearly like the maximum on average.
Note that such an analysis is meaningless when criteria are independent since, in that case, the Choquet integral boils down to a weighted arithmetic mean whose expectation is always one half (neither
tolerant nor intolerant.)
In this paper we pursue this idea by defining k-intolerant Choquet integrals 5 . The case k = 1
corresponds to the unique most intolerant Choquet integral, namely the minimum. The case k = 2
corresponds to the subclass of n-variable Choquet integrals that are bounded from above by their
second lowest input values. Those Choquet integrals are more or less intolerant but not as much as
the minimum. As an example, the following 3-variable Choquet integral
1
2
1
2
Cv (x1 , x2 , x3 ) = min(x1 , x2 ) + min(x1 , x3 )
5 Equivalently, we define k-intolerant capacities since there is a one-to-one correspondence between n-variable Choquet
integrals and capacities defined on n objects.
123
is clearly 2-intolerant, while being different from the minimum.
More generally, denoting by x(1) , . . . , x(n) the order statistics resulting from reordering x1 , . . . , xn in
the nondecreasing order, we say that an n-variable Choquet integral Cv , or equivalently its underlying
capacity v, is at most k-intolerant if
(x ∈ [0, 1]n )
Cv (x) ≤ x(k)
(1)
∗
and it is exactly k-intolerant if, in addition, there is x∗ ∈ [0, 1]n such that Cv (x∗ ) > x(k−1)
, with convention that x(0) := 0.
Interestingly, condition (1) clearly implies that the output value of Cv is zero whenever at least k
input values are zeros. We will see in Section 3 that the converse holds true as well.
At first glance, defining k-intolerant aggregation functions may appear as a pure mathematical
exercise without any real application behind. In fact, in many real-life decision problems, experts or
decision-makers are or must be intolerant. This is often the case when, in a given selection problem,
we search for most qualified candidates among a wide population of potential alternatives. It is then
sensible to reject every candidate which fails at least k criteria.
Example 1. Consider a (simplified) problem of selecting candidates applying for a university permanent position and suppose that the evaluation procedure is handled by appointed expert-consultants on
the basis of the following academic selection criteria:
1. Scientific value of curriculum vitae,
2. Teaching effectiveness,
3. Ability to supervise staff and work in a team environment,
4. Ability to communicate easily in English,
5. Work experience in the industry,
6. Recommendations by faculty and other individuals.
Assume also that one of the rules of the evaluation procedure states that the complete failure of any
two of these criteria results in automatic rejection of the applicant. This quite reasonable rule forces
the Choquet integral, when used for the aggregation procedure, to be 2-intolerant, thus restricting the
class of possible Choquet integrals for such a selection problem.
On the other hand, there are real-life situations where it is recommended to be tolerant, especially
if the criteria are hard to meet simultaneously and if the potential alternatives are not numerous. To
deal with such situations, we introduce k-tolerant aggregation functions and we will say that an nvariable Choquet integral Cv , or equivalently its underlying capacity v, is at most k-tolerant if
Cv (x) ≥ x(n−k+1)
(x ∈ [0, 1]n ).
In that case, the output value of Cv is one whenever at least k input values are ones.
Example 2. Consider a family who consults a Real Estate agent to buy a house. The parents propose
the following house buying criteria:
124
1. Close to a school,
2. With parks for their children to play in,
3. With safe neighborhood for children to grow up in,
4. At least 100 meters from the closest major road,
5. At a fair distance from the nearest shopping mall,
6. Within reasonable distance of the airport.
Feeling that it is likely unrealistic to satisfy all six criteria simultaneously, the parents are ready to
accept a house that would fully succeed any five over the six criteria. If a 6-variable Choquet integral
is used in this selection problem, it must be 5-tolerant.
Considering k-intolerant and k-tolerant capacities can also be viewed as a way to make real applications easier to model from a computational viewpoint. Those “simplified” capacities indeed require
less parameters than classical capacities (actually O(nk−1 ) parameters instead of O(2n ); see Section 3).
Moreover, when varying k from 1 to n, we clearly recover all the possible capacities on n objects.
Notice however that this idea of partitioning capacities into subclasses is not new. Grabisch [3]
proposed the k-additive capacities, which gradually cover all the possible capacities starting from
additive capacities (k = 1). Later, Miranda et al. [8] introduced the p-symmetric capacities, also
covering the possible capacities but starting from symmetric capacities (p = 1). Note also that other
approaches to overcome the exponential complexity of capacities have also been previously proposed
in the literature: Sugeno λ-measures [10], ⊥-decomposable measures (see e.g. [5]), hierarchically
decomposable measures [11], distorted probabilities (see e.g. [9]) to name a few.
2
Basic definitions
Let F : [0, 1]n −→ [0, 1] be an aggregation function. By considering the cube [0, 1]n as a probability
space with uniform distribution, we can compute the mathematical expectation of F, that is,
E(F) :=
Z
[0,1]n
F(x) dx.
(2)
This value gives the average position of F within the interval [0, 1].
When F is internal (i.e., min ≤ F ≤ max) then it is convenient to rescale E(F) within the interval
[E(min), E(max)]. This leads to the following normalized and mutually complementary values [1, 7]:
E(max) − E(F)
E(max) − E(min)
E(F) − E(min)
orness(F) :=
E(max) − E(min)
andness(F) :=
(3)
(4)
Thus defined, the degree of andness (resp. orness) of F represents the degree or intensity (between
0 and 1) to which the average value of F is close to that of “min” (resp. “max”). In some sense, it also
reflects the extent to which F behaves like the minimum (resp. the maximum) on average.
125
Define the kth order statistic function OSk : [0, 1]n −→ [0, 1] as
(x ∈ [0, 1]n ),
OSk (x) = x(k)
where x(k) is the kth lowest coordinate of x. It can be proved [7] that
E(OSk ) =
k
n+1
(k ∈ {1, . . . , n})
and hence the set {E(OSk ) | k = 1, . . . , n} partitions the unit interval [0, 1] into n + 1 equal-length
subintervals.
Now, as mentioned in the introduction, when a function F : [0, 1]n −→ [0, 1] is used to aggregate
decision criteria, it is clear that the more E(F) is low, the more F has an intolerant behavior. This
suggests the following definition:
Definition 3. Let k ∈ {1, . . . , n}. An aggregation function F : [0, 1]n −→ [0, 1] is at most k-intolerant
if F ≤ OSk . It is k-intolerant if, in addition, F OSk−1 , where OS0 := 0 by convention.
It follows immediately from this definition that, for any k-intolerant function F, we have E(F) ≤
E(OSk ) and, if F is internal, we have andness(F) ≥ andness(OSk ) and orness(F) ≤ orness(OSk ).
Example 4. The product F(x) = ∏i xi , defined on [0, 1]n , is 1-intolerant and we have E(F) = 1/2n .
By duality, we can also introduce k-tolerant functions as follows:
Definition 5. Let k ∈ {1, . . . , n}. An aggregation function F : [0, 1]n −→ [0, 1] is at most k-tolerant if
F ≥ OSn−k+1 . It is k-tolerant if, in addition, F OSn−k+2 , where OSn+1 := 1 by convention.
It is immediate to see that when a function F : [0, 1]n −→ [0, 1] is k-intolerant, its dual F ∗ :
[0, 1]n −→ [0, 1], defined by
F ∗ (x1 , . . . , xn ) := 1 − F(1 − x1 , . . . , 1 − xn )
(x ∈ [0, 1]n )
(5)
is k-tolerant and vice versa.
In the next section we investigate the particular case where F is the Choquet integral and we define
the concepts of k-intolerant and k-tolerant capacities.
3
Case of Choquet integrals and capacities
The use of the Choquet integral has been proposed by many authors as an adequate substitute to the
weighted arithmetic mean to aggregate interacting criteria; see e.g. [2, 6]. In the weighted arithmetic
mean model, each criterion is given a weight representing the importance of this criterion in the
decision. In the Choquet integral model, where criteria can be dependent, a capacity is used to define
a weight on each combination of criteria, thus making it possible to model the interaction existing
among criteria.
Let us first recall the formal definitions of these concepts. Throughout, we will use the notation
N := {1, . . . , n} for the set of criteria.
126
Definition 6. A capacity on N is a set function v : 2N −→ [0, 1], that is nondecreasing with respect to
set inclusion and such that v(∅) = 0 and v(N) = 1.
Definition 7. Let v be a capacity on N. The Choquet integral of x : N −→ R with respect to v is
defined by
n
Cv (x) := ∑ x(i) [v(A(i) ) − v(A(i+1) )],
(6)
i=1
where (·) indicates a permutation on N such that x(1) ≤ . . . ≤ x(n) . Furthermore A(i) := {(i), . . . , (n)}
and A(n+1) := ∅.
In this section we apply the ideas of k-intolerance and k-tolerance (cf. Definitions 3 and 5) to the
Choquet integral. Since this integral is internal, it can be seen as a function from [0, 1]n to [0, 1].
Let us denote by FN the set of all capacities on N. The following proposition, inspired from [7,
S4], gives equivalent conditions for a Choquet integral to be at most k-intolerant.
Proposition 8. Let k ∈ {1, . . . , n} and v ∈ FN . Then the following assertions are equivalent:
i)
ii)
iii)
iv)
v)
Cv (x) ≤ x(k) ∀x ∈ [0, 1]n ,
v(T ) = 0 ∀T ⊆ N such that |T | ≤ n − k,
Cv (x) = 0 ∀x ∈ [0, 1]n such that x(k) = 0,
Cv (x) is independent of x(k+1) , . . . , x(n) ,
∃λ ∈ [0, 1) such that ∀x ∈ [0, 1]n we have x(k) ≤ λ ⇒ Cv (x) ≤ λ,
As we can see, some assertions of Proposition 8 are natural and can be interpreted easily. Some
others are more surprising and show that the Choquet integral may have an unexpected behavior.
First, assertion (ii) enables us to define k-intolerant capacities as follows:
Definition 9. Let k ∈ {1, . . . , n}. A capacity v ∈ FN is k-intolerant if v(T ) = 0 for all T ⊆ N such that
|T | ≤ n − k and there is T ∗ ⊆ N, with |T ∗ | = n − k + 1, such that v(T ∗ ) 6= 0.
Assertion (iii) says that the output value of the Choquet integral is zero whenever at least k input
values are zeros. This is actually a straightforward consequence of k-intolerance.
Assertion (iv) is more surprising. It says that the output value of the Choquet integral does not
take into account the values of x(k+1) , . . . , x(n) . Back to Example 1, only the two lowest scores are
taken into account to provide a global evaluation, regardless of the other scores.
Assertion (v) is also of interest. By imposing that Cv (x) ≤ λ whenever x(k) ≤ λ for a given threshold λ ∈ [0, 1), we necessarily force Cv to be at most k-intolerant. For instance, consider the problem
of evaluating students with respect to different courses and suppose that it is decided that if the lowest
k marks obtained by a student are less than 18/20 then his/her global mark must be less than 18/20. In
this case, the Choquet integral utilized is at most k-intolerant.
Proposition 8 can be easily rewritten for k-tolerance by considering the dual Cv∗ of the Choquet
integral Cv as defined in Eq. (5). On this issue, Grabisch et al. [4, S4] showed that the dual Cv∗ of Cv is
the Choquet integral Cv∗ defined from the dual capacity v∗ , which is constructed from v by
v(T ) = 1 − v(N \ T )
(T ⊆ N).
We then have
Cv ≥ OSn−k+1
⇔
127
Cv∗ ≤ OSk .
Proposition 10. Let k ∈ {1, . . . , n} and v ∈ FN . Then the following assertions are equivalent:
i)
ii)
iii)
iv)
v)
Cv (x) ≥ x(n−k+1) ∀x ∈ [0, 1]n ,
v(T ) = 1 ∀T ⊆ N such that |T | ≥ k,
Cv (x) = 1 ∀x ∈ [0, 1]n such that x(n−k+1) = 1,
Cv (x) is independent of x(1) , . . . , x(n−k) ,
∃λ ∈ (0, 1] such that ∀x ∈ [0, 1]n we have x(n−k+1) ≥ λ ⇒ Cv (x) ≥ λ,
Here again, some assertions are of interest. First, assertion (ii) enables us to define k-tolerant
capacities as follows:
Definition 11. Let k ∈ {1, . . . , n}. A capacity v ∈ FN is k-tolerant if v(T ) = 1 for all T ⊆ N such that
|T | ≥ k and there is T ∗ ⊆ N, with |T ∗ | = k − 1, such that v(T ∗ ) 6= 1.
Assertion (iii) says that the output value of the Choquet integral is one whenever at least k input
values are ones.
Assertion (iv) says that the output value of the Choquet integral does not take into account the
values of x(1) , . . . , x(n−k) . As an application, consider students who are evaluated according to n homework assignments and assume that the evaluation procedure states that the two lowest homework
scores of each student are dropped, which implies that each student can miss two homework assignments without affecting his/her final grade. If a n-variable Choquet integral is used to aggregate the
homework scores, it should not take x(1) and x(2) into consideration and hence it is at most (n − 2)tolerant.
4
Conclusion
In this paper, which can be considered as the sequel of [7], we have proposed the concepts of kintolerant and k-tolerant Choquet integrals and capacities. Besides the obvious computational advantage of these concepts (comparable to that of k-additive and p-symmetric capacities), they can be
easily interpreted in practical decision problems where the decision makers must be intolerant or tolerant. In an extended version of this paper, we also introduce axiomatically intolerance and tolerance
indices which measure the degree to which the Choquet integral is k-intolerant and k-tolerant. These
indices, when varying k from 1 to n − 1, make it possible to identify and measure the intolerant or
tolerant character of the decision maker.
References
[1] J. J. Dujmović. Weighted conjunctive and disjunctive means and their application in system
evaluation. Univ. Beograd. Publ. Elektrotehn. Fak. Ser. Mat. Fiz., (461-497):147–158, 1974.
[2] M. Grabisch. The application of fuzzy integrals in multicriteria decision making. European J.
Oper. Res., 89(3):445–456, 1996.
[3] M. Grabisch. k-order additive discrete fuzzy measures and their representation. Fuzzy Sets and
Systems, 92(2):167–189, 1997.
128
[4] M. Grabisch, T. Murofushi, and M. Sugeno. Fuzzy measure of fuzzy events defined by fuzzy
integrals. Fuzzy Sets and Systems, 50(3):293–313, 1992.
[5] M. Grabisch, H. T. Nguyen, and E. A. Walker. Fundamentals of uncertainty calculi with applications to fuzzy inference, volume 30 of Theory and Decision Library. Series B: Mathematical
and Statistical Methods. Kluwer Academic Publishers, Dordrecht, 1995.
[6] J.-L. Marichal. An axiomatic approach of the discrete Choquet integral as a tool to aggregate
interacting criteria. IEEE Trans. Fuzzy Syst., 8(6):800–807, 2000.
[7] J.-L. Marichal. Tolerant or intolerant character of interacting criteria in aggregation by the Choquet integral. European J. Oper. Res., in press.
[8] P. Miranda, M. Grabisch, and P. Gil. p-symmetric fuzzy measures. Internat. J. Uncertain.
Fuzziness Knowledge-Based Systems, 10(Suppl. December 2002):105–123, 2002.
[9] Y. Narukawa, V. Torra, and T. Gakuen. Fuzzy measure and probability distributions: distorted
probabilities. IEEE Trans. Fuzzy Syst., submitted.
[10] M. Sugeno. Theory of fuzzy integrals and its applications. PhD thesis, Tokyo Institute of Technology, Tokyo, 1974.
[11] V. Torra. On hierarchically s-decomposable fuzzy measures. Internat. J. Intelligent Systems,
14(9):923–934, 1999.
129
Choquet measures, Shapley values, and inconsistent pairwise
comparison matrices: an extension of Saaty’s A.H.P.
R ICARDO A. M ARQUES P EREIRA , S ILVIA B ORTOT
Dipartimento di Informatica e Studi Aziendali
Università di Trento
38100 Trento, Italy
E-mail: ♠♣❅❝s✳✉♥✐t♥✳✐t|s❜♦rt♦t❅❡❝♦♥♦♠✐❛✳✉♥✐t♥✳✐t
The Analytic Hierarchy Process (AHP), developed by Thomas L. Saaty [6] [7] [8] [9], is a well-known
multicriteria aggregation model. It is based on pairwise comparison matrices at two fundamental
levels: the lower level encodes pairwise comparison matrices between alternatives (one such matrix
for each criterion) and the higher level encodes a single pairwise comparison matrix between criteria.
In its most general form, the higher level of the AHP can be structured hierarchically, with several
layers of criteria, but in this paper we focus on the single layer case, with a single matrix of pairwise
comparisons between criteria.
Pairwise comparison matrices are typically inconsistent. However, the AHP extracts from each pairwise comparison matrix a vector of importance weights (also called priorities) given by the principal
eigenvector or, alternatively, by the geometric mean vector. In both cases the priority vectors have
positive components normalized to unit sum. In this paper we consider only the geometric mean
method, because its structural properties are more suited for our study. Once the priority vectors are
obtained, the AHP uses the priority vector at the higher level to aggregate (by means of a weighted
average) the lower level priority vectors.
In this paper we propose an extension of Saaty’s AHP based on Choquet measures. In our model,
inconsistency is explicitly used in the aggregation process in order to attenuate the importance values
of those criteria that (on average) are more inconsistent with the others. Accordingly, our model
emphasizes the importance values of those criteria that (on average) are more consistent with the
remaining ones.
Consider a finite set of interacting criteria N = {1, 2, . . . , n}.
A Choquet measure [2] on the set N is a set function µ : P (N) −→ [0, 1] satisfying
/ = 0, µ(N) = 1
(i) µ(0)
(ii) S ⊆ T ⊆ N
⇒
µ(S) ≤ µ(T ).
Given a Choquet measure µ we can define the Choquet integral [2] [3] [4] of a vector x = (x1 , . . . , xn ) ∈
[0, 1]n with respect to µ as
n
Cµ (x) = ∑ [µ(A(i) ) − µ(A(i+1) )] x(i)
(1)
i=1
where (·) indicates a permutation on N such that x(1) ≤ x(2) ≤ . . . ≤ x(n) . Also A(i) = {(i), . . . , (n)} and
/
A(n+1) = 0.
130
Notice that the Choquet integral with respect to an additive measure µ reduces to a weighted arithmetic
mean, whose weights wi are given by the µ(i) values,
µ(A(i) ) = µ((i)) + µ((i + 1)) + . . . + µ((n))
n
n
n
i=1
i=1
i=1
Cµ (x) = ∑ [µ(A(i) ) − µ(A(i+1) )] x(i) = ∑ µ((i))x(i) = ∑ wi xi .
(2)
The importance index or Shapley value [5] [10] of criterion i ∈ N with respect to µ is defined as
n
(n − 1 − t)!t!
[µ(T ∪ i) − µ(T )] ,
∑
n!
T ⊆N\i
∑ φµ (i) = 1 .
φµ (i) =
(3)
i=1
It amounts to a weighted average of the marginal contribution of element i with respect to all coalitions
T ⊆ N \ i and it can be interpreted as an effective importance weight.
Consider now a positive reciprocal n × n matrix A = [ai j ],
ai j > 0
a ji = 1/ai j
i, j = 1, . . . , n
(4)
All pairwise comparison matrices in Saaty’s AHP are of this form. However, our model regards
only the single pairwise comparison matrix between criteria at the higher level of the AHP. This is
because that matrix is the one that controls the aggregation process: in Saaty’s AHP, the aggregation is
performed through a weighted average whose weights are the components of the higher level priority
vector.
In general, the positive reciprocal matrix A above is inconsistent, where consistency means ai j = aik ak j
for all i, j, k = 1, . . . , n. However, we can associate to the matrix A a consistent matrix à = [ãi j ] in the
following way,
ãi j = wi /w j
wi = ui /Σnj=1 u j
i, j = 1, . . . , n
(5)
where ui is the geometric mean of the elements of the row i,
q
ui = n Πnj=1 ai j
i, j = 1, . . . , n
(6)
and the weights wi > 0 are normalized Σnj=1 wi = 1.
The positive reciprocal matrix à is in fact consistent, since
ãi j = wi /w j = (wi /wk )(wk /w j ) = ãik ãk j
i, j, k = 1, . . . , n .
(7)
q
q
Moreover, ũi = n Πnj=1 ãi j = wi / n Πnj=1 w j and thus w̃i = ũi /Σnj=1 ũ j = wi , which means that the consistent matrix associated to à is again à itself.
Given an element ai j of the matrix A we define the neighbourhood U(ai j ) as the set of the elements
of the row i and the column j of A,
U(ai j ) = {aik , al j | k, l = 1, . . . , n} .
(8)
We say that ai j is locally consistent if, on average, it is consistent with the elements in its neighbourhood,
p
i, j = 1, . . . , n .
(9)
ai j = ãi j = n Πnk=1 aik ak j
We now define the scaling function f : (0, ∞) → (0, 1) as f (x) = 2/(x + x−1 ), for x > 0, whose graph
is shown below.
131
1
0.8
0.6
0.4
0.2
2
4
6
8
Notice that the scaling function f has a single critical point at x = 1, where it reaches the maximum
value f (1) = 1. Moreover, the scaling function f has the important property f (x) = f (x−1 ), for all
x > 0.
By means of the scaling function f , we can associate a positive symmetric n × n matrix V = [vi j ] to
the matrix A = [ai j ] in the following way,
vi j = f (ai j /ãi j )
i, j = 1, . . . , n
(10)
We have
vi j ∈ (0, 1]
vi j = v ji
i, j = 1, . . . , n .
(11)
The fact that the n × n matrix V = [vi j ] is symmetric is due to the reciprocity of the positive matrix A
plus the fact that f (x) = f (x−1 ), for x > 0, since
v ji = f (a ji /ã ji ) = f (ãi j /ai j ) = f (ai j /ãi j ) = vi j
i, j = 1, . . . , n .
(12)
Notice that vi j = 1 if and only if ai j = ãi j , otherwise 0 < vi j < 1: the more ai j /ãi j differs from 1
the more vi j gets closer to 0. Therefore we can consider the matrix V = [vi j ] as a measure of local
consistency. Moreover, we note that our matrix V = [vi j ] can be regarded as a [0, 1]-scaled version
of the so-called totally inconsistent matrix associated with the original pairwise comparison matrix
A = [ai j ], see [1].
Given a general (typically inconsistent) positive reciprocal n × n matrix A = [ai j ], one can define a 2additive Choquet measure µ : 2N −→ [0, 1] in the following way: making use of the Möbius transform
m of the measure µ, we define m(i) = wi /N for each singlet {i} and m(i j) = −wi (1 − vi j )w j /N for
each doublet {i, j}, with null higher order terms. Then, we define the value of the 2-additive measure
µ on a coalition S as the sum of the singlets and doublets contained in the coalition S, as given by the
Möbius transform m,
µ(S) = ∑ wi /N + ∑ (−wi (1 − vi j )w j )/N
(13)
{i}⊆S
{i, j}⊆S
where the normalization factor N is the sum of all singlets and doublets in the set N,
N =
∑
{i}⊆N
wi +
∑
−wi (1 − vi j )w j = 1 −
{i, j}⊆N
1 n
wi (1 − vi j )w j
2 i,∑
j=1
n
n
1
1
1
= (1 + ∑ wi vi j w j ) = (1 + ∑ wi vi ) = (1 + v)
2
2
2
i, j=1
i=1
(14)
where vi = ∑nj=1 vi j w j and v = ∑ni=1 wi vi denote weighted averages of local consistency values, with
wi < vi ≤ 1 for i = 1, . . . , n and ∑ni=1 w2i < v ≤ 1. In particular, we have
µ(i) = wi /N
i, j = 1, . . . , n
132
µ(i j) = (wi + w j − wi (1 − vi j )w j )/N .
(15)
The graph interpretation of this definition, in which singlets correspond to nodes and doublets correspond to edges between nodes, is that the value of the 2-additive measure µ on a coalition S is the sum
of the nodes and edges contained in the subgraph associated with the coalition S.
/ = 0 and µ(N) = 1, and is monotonic and subThe measure µ satisfies the boundary conditions µ(0)
additive. The (strict) monotonicity of the measure is guaranteed by the fact that the positive value
wi associated to each node of the graph dominates (in absolute value) the sum of the negative values
−wi (1 − vi j )w j associated to the n − 1 edges connecting that node with the other nodes in the graph,
n
wi − ∑ wi (1 − vi j )w j = wi − wi (1 − vi ) = wi vi > w2i > 0
i = 1, . . . , n .
(16)
j=1
Notice that this model is an extension of Saaty’s AHP: if the matrix A is consistent then the Choquet
measure µ is additive and the Choquet integral coincides with a weighted arithmetic mean whose
weights are wi as in Saaty’s AHP.
The Shapley values φi , i = 1, . . . , n associated with the measure µ defined above are given by
φi =
ϕi
n
Σ j=1 ϕ j
i = 1, . . . , n
(17)
where the unnormalized values ϕi > 0, i = 1, . . . , n are given by
ϕi = wi −
1
2
n
1
∑ wi (1 − vi j )w j = 2 wi (1 + vi )
i = 1, . . . , n
(18)
j=1
which means that Σnj=1 ϕ j = 21 (1 + v) = N .
In our multicriteria aggregation model the Shapley values encode the effective importance weights
of the various criteria. When the matrix A is consistent, we have vi j = 1 for all i, j = 1, . . . , n and
equation (18) implies that the Shapley values are φi = wi . In general, the fact that A is inconsistent
changes the original distribution of weights, attenuating the importance values of those criteria that on
average are more inconsistent with the others and emphasizing those criteria that on average are more
consistent with the others.
In fact, if we compute the second order Taylor expansion of the Shapley values φi = wi (1+vi )/(1+v),
i = 1, . . . , n, around the consistency condition we get
1
1
φi ≈ wi (1 + (vi − v)(1 + (1 − v)))
2
2
i = 1, . . . , n
(19)
Notice that the second order approximation of the Shapley values is still normalized to unit sum,
since ∑ni=1 wi (vi − v) = 0. Moreover, the Taylor expansion above shows clearly that, in the small
inconsistency approximation, the Shapley value φi increases if vi > v and decreases if vi < v. In other
words, the Shapley value increases (decreases) if the single consistency measure vi is greater (smaller)
than the overall consistency measure v, in a compensatory mechanism typical of weighted averaging
schemes.
Finally, we note that the definition of the scaling function can easily be extended in order to accommodate a free parameter β ≥ 0. We define the parametrized scaling function f : (0, ∞) → (0, 1) as
fβ (x) = 2/(xβ + x−β ), for x > 0. Clearly, fβ=0 = 1. The graphs of the scaling function fβ for β = 2, 4
and β = 12 , 14 are shown below.
133
beta=2
beta=4
1
0.8
0.6
0.4
0.2
1
0.8
0.6
0.4
0.2
2
4
6
8
2
beta=0.5
4
6
8
beta=0.25
1
0.8
0.6
0.4
0.2
1
0.8
0.6
0.4
0.2
2
4
6
8
2
4
6
8
As before, the scaling function fβ has a single critical point at x = 1, where it reaches the maximum
value fβ (1) = 1. Moreover, the scaling function fβ has the important property fβ (x) = fβ (x−1 ), for all
x > 0.
The scaling function fβ has two different asymptotic behaviours close to the origin in relation with
the parameter ranges 0 < β < 1 (vertical asymptote at the origin) and β > 1 (horizontal asymptote at
the origin), as can be easily derived from the expressions below,
fβ (x) =
2xβ
1 + x2β
fβ′ (x) =
2βxβ−1 (1 − x2β )
(1 + x2β )2
x>0.
(20)
Moreover, it is straightforward to show that the consistency measure provided by the scaling function
becomes stricter for increasing values of β. In other words, as β increases, all the local consistency
measures vi j (β) decrease, with the exception of those associated with exact consistency vi j = 1. Accordingly, the inconsistency effects in the context of our model can be attenuated or emphasized,
relatively to the original case β = 1, by means of appropriate choices of the parameter β: higher
values of the parameter lead to stronger inconsistency effects.
References
[1] J. Barzilai, Consistency measures for pairwise comparison matrices, Journal of Multi-Criteria Decision
Analysis 7 (3) (1998) 123-132.
[2] G. Choquet, Theory of capacities, Annales de l’Institut Fourier 5 (1953) 131-295.
[3] M. Grabisch, Fuzzy integral in multicriteria decision making, Fuzzy Sets and Systems 69 (1995) 279-298.
[4] M. Grabisch, The application of fuzzy integrals in multicriteria decision making, European Journal of
Operational Research 89 (1996) 445-456.
[5] M. Grabisch and M. Roubens, An axiomatic approach to the concept of interaction among players in
cooperative games, Int. J. of Game Theory 28 (1999) 547-565.
134
[6] T.L. Saaty, A Scaling Method for Priorities in Hierarchical Structures, Journal of Mathematical Psychology 15 (1977) 234-281.
[7] T.L. Saaty, Axiomatic foundation of the analytic hierarchy process, Management Science 32 (7) (1986)
841-855.
[8] T.L. Saaty, Multicriteria Decision Making: The Analytic Hierarchy Process, RWS Publications, Pittsburgh
PA, 1988. Original version published by McGraw-Hill, 1980.
[9] T.L. Saaty and L.G. Vargas, Prediction, Projection and Forecasting, Kluwer Academic Publishers, Norwell MA, 1991.
[10] L.S.. Shapley, A value for n-person games, in: H.W. Kuhn and A.W. Tucker (eds.) Contributions to the
Theory of Games, vol. II, Annals of Mathematics Studies, Princeton University Press NJ (1953) 307-317.
135
Construction of compositional modifiers generated by n-ary functions
J ORMA K. M ATTILA
Laboratory of Applied Mathematics
Lappeenranta University of Technology
53851 Lappeenranta, Finland
E-mail: ❏♦r♠❛✳▼❛tt✐❧❛❅❧✉t✳❢✐
1
Introduction
We consider an idea, how to generate modifiers by n-placed functions defined on [0, 1]n . The subject
matter of modifiers are fuzzy sets, i.e. membership functions defined on interval I = [0, 1]. We give the
definition of modifiers and the case, how n-placed generator functions fit together with this definition.
We consider some few properties of modifiers. Some examples of generator functions and modifiers
generated by them are given. The examples illustrate how graded modifier systems can be created.
The place number n of a generator function can take effect to the strength of a modifier. It is also
possible to keep the place number n constant and use numbers 1 or 0 in some places of the variables
of the function.
The concept of ’modifier’ appears in many ways in the scope of fuzzy logic. For example, Prof.
L. A. Zadeh used this term already in the early theory of fuzzy logic. The author has studied modifiers
and their logics from modal logical point of view and created some logical systems for modifiers
basing on relational Kripke structures of graded modalities (see e.g. Mattila [9]). Kortelainen’s [3]
concept modified sets is one example about the use of this term. In the linguistic view, a modifier can
be an adjective, or an adverb, or a phase or clause acting as an adjective or adverb. In every case, the
basic principle is the same: the modifier adds information to another element in the sentence (Frances
Peck, ’Terms of use’, University of Ottawa). Also some fuzzy logic blocs altering the behavior of PID
controllers are called modifiers, too.
The author has considered modifiers and modifier logics in several situations (see e.g. J. K. Mattila
[6, 7, 8]). Some considerations about modifiers generated by t-norms and t-conorms are done in [8].
After this work Dr. József Dombi suggested the author to study modifiers generated by n-placed
functions in the way to use some t-norms and t-conorms generalized for several variables. Some
results from these studies are [10] and [11].
We refer to Kortelainen’s concept modified sets. His operators are set functions modifying at first
hand ordinary sets. We concentrate here upon modifiers generated by n-placed functions, n = 2, 3, . . . .
Entities M considered here are so-called compositional modifiers because the result of modifying a
fuzzy set µ by a modifier M is the composition of M and µ, M ◦ µ. The aim is to consider modifiers as
operators for modifying fuzzy sets. One important example is to use especially t-norms and t-conorms
and their generalizations for more than two-placed cases as basic tools. (This case is considered in
[10].)
136
2
Basic Concepts
We choose the range of fuzzy sets (i.e. membership functions) to be the unit interval I = [0, 1], as
usually. Thus the set of all fuzzy sets of a non-empty set X is the set I X (including the usual power-set
2X (i.e. the set of all characteristic functions of the usual subsets of X) as a special case). It is also a
well-known fact that I and I X are partially ordered sets. In fact, they are also completely distributed
complete lattices and Brouwerian lattices (see e.g. Lowen [5]).
These modifiers we consider here are compositional, because when we apply a modifier to a fuzzy
set we form a composition of two functions.
Definition 1. (Modifier). We say that a mapping M : I X −→ I X is (i) a substantiating modifier if for
any fuzzy set µ ∈ I X ,
∀x ∈ X, M(µ(x)) ≤ µ(x),
(1)
(ii) a weakening modifier if for any µ ∈ I X ,
∀x ∈ X, µ(x) ≤ M(µ(x)),
(2)
(iii) an identity modifier if for any µ ∈ I X ,
∀x ∈ X, M(µ(x)) = µ(x).
(3)
Identity modifiers are identity mappings on I X . They are sometimes needed as links between
substantiating and weakening modifiers in some logical structures of modifiers.
A given modifier we can associate with the dual modifier according to the following
Definition 2. (Dual Modifier). Let M and M ∗ be modifiers. We say that M ∗ is the dual modifier
associated with M, if for any fuzzy set µ ∈ I X ,
∀x ∈ X, M ∗ (µ(x)) = n(M(n(µ(x)))),
(4)
where n is a strong negation.
Proposition 3. If M is a substantiating modifier then its dual M ∗ is a weakening modifier and vice
versa.
Proof. (See also [10]) Suppose µ ∈ I X , and M is a substantiating modifier. Thus ∀x ∈ X, M(µ(x)) ≤
µ(x). We have to show that ∀x ∈ X, µ(x) = M ∗ (µ(x)). Let n be a strong negation function. Thus
∀x ∈ X, M ∗ ((x)) = n(M(n(µ(x)))). Clearly
M(n(µ(x))) ≤ n(µ(x))
by Def.1. From this it follows by the properties of membership functions that
∀x ∈ X, n(M(n(µ(x)))) ≥ n(n(µ(x))) = µ(x),
i.e.
M ∗ (µ(x)) ≥ µ(x).
Conversely, the result follows in the similar way.
137
(5)
The condition
∀x ∈ X, M ∗ (µ(x)) = n(M(n(µ(x))))
(6)
in the previous proof says that the operators M, M ∗ , and n satisfy DeMorganńs law. Thus dual pairs
of modifiers with strong negation form classes called DeMorgan triples of operators ([1]). Originally,
DeMorgan triples used to consist of a t-norm, corresponding t-conorm, and negation.
We denote α-level set of a fuzzy set µ, as usually,
µα = {x ∈ X | µ(x) ≥ α, α ∈ I}
Thus the α-level set of M(µ) is
(M ◦ µ)α = {x ∈ X | M(µ(x)) ≥ α, α ∈ I}.
(7)
It is easy to see that modifiers have following properties. Suppose M is a substantiating modifier.
Then we have
M(0X ) = 0X ,
∗
M (1X ) = 1X ,
∗ ∗
(M ) (µ(x)) = M(µ(x)),
(8)
(9)
(10)
where 0X and 1X are the constant functions 0X (x) = 0 and 1X (x) = 1 for all x ∈ X.
3
The idea of generating modifiers using n-ary functions
The simplest idea using n-ary functions for generating modifiers for fuzzy sets is to replace every
variable with the membership function of a fuzzy set to be modified. To illustrate the idea, we proceed
in the following way. We put the same argument x in every place in the n-tuple of arguments in
the function f . Thus we have the generating formulas for substantiating, weakening and identity
modifiers. A substantiating modifier is generated by any function f , such that
∀ x ∈ I,
f (x, x, . . . , x) ≤ x.
(11)
A weakening modifier is generated by any function f , such that
∀ x ∈ I,
f (x, x, . . . , x) ≥ x.
(12)
An identity operator is generated by any function f , such that
∀ x ∈ I,
f (x, x, . . . , x) = x.
(13)
According to the formulas (11), (12), and (13), we prove some results concerning modifiers generated by those n-ary functions. For this task, suppose that a modifier M is generated by a function
f (x1 , x2 , . . . , xn ), xi ∈ I (i = 1, . . . , n), such that
M(µ) = M ◦ µ = f (µ, µ, . . . , µ),
where µ is any fuzzy set. The function f is (at least piecewise) continuous on the interval I.
138
(14)
Proposition 4. Let f : I n −→ I be an n-ary function, then f generates a substantiating modifier
F(µ(x)) = (F ◦ µ)(x) = f (µ(x), µ(x), . . . , µ(x))
(15)
if for all t1 ,t2 , . . . ,tn ∈ [0, 1] the condition
f (t1 ,t2 , . . . ,tn ) ≤ min(t1 ,t2 , . . . ,tn )
(16)
holds.
Proof. Suppose the formula (16) holds and denote min(t1 ,t2 , . . . ,tn ) = tmin . Especially, if ti = a
for all ti ∈ I then tmin = a, and thus f (a, . . . , a) ≤ a for any a ∈ I by (16). Let µ be any fuzzy set and
x0 ∈ X arbitrarily chosen. Thus
f (µ(x0 ), µ(x0 ), . . . , µ(x0 )) ≤ µ(x0 ).
Because x0 is arbitrarily chosen from X, the same holds for other x’s, too. Thus we have
f (µ(x), µ(x), . . . , µ(x)) = F(µ(x)) ≤ µ(x)
for any x ∈ X. Thus the formula (15) holds, and f generates a substantiating modifier F by means of
Def.1.
Proposition 5. Let f : I n −→ I be an n-ary function, then f generates a weakening modifier
H(µ(x)) = (H ◦ µ)(x) = f (µ(x), µ(x), . . . , µ(x))
(17)
if for all t1 ,t2 , . . . ,tn ∈ [0, 1] the condition
f (t1 ,t2 , . . . ,tn ) ≥ max(t1 ,t2 , . . . ,tn )
(18)
holds.
Proof. Suppose the formula (18) holds. From this it follows that for all a ∈ I,
a by (14). Let µ be any fuzzy set, and x0 ∈ X is arbitrarily chosen. Thus
H(a) = f (a, . . . , a) ≥
H(µ(x0 )) = f (µ(x0 ), . . . , µ(x0 )) ≥ µ(x0 ).
Because x0 is an arbitray element of X, the formula
∀ x ∈ X,
H(µ(x), . . . , µ(x)) ≥ µ(x)
holds. Thus the formula (17) holds, and f generates a weakening modifier.
Proposition 6. Let f : I n −→ I be an n-ary function, then f generates an identity modifier
F0 (µ(x)) = (F0 ◦ µ) = f (µ(x), µ(x), . . . , µ(x))
(19)
if for all t1 ,t2 , . . . ,tn ∈ [0, 1] the condition
min(t1 ,t2 , . . . ,tn ) ≤ f (t1 ,t2 , . . . ,tn ) ≤ max(t1 ,t2 , . . . ,tn )
holds.
139
(20)
Proof. Suppose the formula (20) holds. From this it follows that for all a ∈ I, min(a, . . . , a) ≤
f (a, . . . , a) ≤ max(a, . . . , a). This is equivalent to a ≤ f (a, . . . , a) ≤ a which is equivalent to f (a, . . . , a) =
a. Let µ be any fuzzy set and x0 ∈ X is arbitrarily chosen. Thus we have F0 (µ(x0 )) = f (µ(x0 ), . . . , µ(x0 )) =
µ(x0 ). Because x0 is arbitrarily chosen from X, this means that the formula
∀ x ∈ X,
F0 (µ(x)) f (µ(x), . . . , µ(x)) = µ(x).
Thus the formula (19) holds, and f generates an identity modifier.
We see that the Definition1 and the Propositions 4, 5 and 6 correspond to each others.
According to the Propositions 4, 5, and 6, we can use the formulas (16), (18), and (20) as the
conditions for n-ary functions generating modifiers.
We can have the inverse results of the Propositions 4, 5, and 6. For this we need the following
lemma.
Lemma 7. Let f : I n −→ I be a (at least piecewise) continuous n-ary function.
(a) If f generates a substantiating modifier then this implies the formula (16).
(b) If f generates a weakening modifier then this implies the formula (18).
(c) If f generates an identity modifier then this implies the formula (20).
Proof. (a) Let us give the counter-hypothesis: f (t1 , . . . ,tn ) > min(t1 , . . . ,tn ). From this it follows
that f generates either an identity modifier by Proposition 6 or a weakening modifier by Proposition
5. This contradicts the supposition that f generates a substantiating modifier. Thus the counterhypothesis is not correct.
The cases (b) and (c) can be proved in similar ways.
.
After collecting the results from Propositions 4, 5, 6, and Lemma 7 we have proved the following
Theorem 8. Let f : I n −→ I be (at least piecewise) continuous n-ary function. f generates a modifier
F ◦ µ which is
(a) substantiating iff f (t1 , . . . ,tn ) ≤ min(t1 , . . . ,tn ),
(b) weakening iff f (t1 , . . . ,tn ) ≥ max(t1 , . . . ,tn ),
(c) an identity modifier iff min(t1 , . . . ,tn ) ≤ f (t1 , . . . ,tn ) ≤ max(t1 , . . . ,tn ),
where the compositions are calculated by means of (14.
Using Theorem 8 we can prove the following
Theorem 9. Let f : I n −→ I be a function generating a substantiating modifier F. Then the function
fco : I n −→ I : fco (x1 , . . . , xn ) = 1 − f (1 − x1 , . . . , 1 − xn ) generates a weakening modifier being the
dual of F.
140
Proof. It follows from the supposition, that f generates a substantiating modifier, that f (x1 , . . . , xn ) ≤
min(x1 , . . . , xn ), and ∀ x ∈ X, F(µ(x) = f (µ(x), . . . , µ(x)) ≤ µ(x) by Theorem 8. This is equivalent to
1 − F(µ(x)) ≥ 1 − µ(x). Replace µ(x) by 1 − µ(x), then we have
1 − F(1 − µ(x)) ≥ 1 − (1 − µ(x)).
On the other hand, 1 − F(1 − µ(x)) = 1 − f (1 − µ(x), . . . , 1 − µ(x)). Thus
1 − f (1 − µ(x), . . . , 1 − µ(x)) ≥ 1 − (1 − µ(x)).
Thus the conclusion is that the function fco (x1 , . . . , xn ) = 1 − f (1 − x1 , . . . , 1 − xn ) generates a weakening modifier by Theorem 8. Clearly this modifier is the dual of F.
Example 10. The formula
n
f (x1 , x2 , . . . , xn ) = ∏ xi ,
i=1
∀i, xi ∈ [0, 1],
(21)
generates a substantiating modifier
Fn−1 (µ(x)) = (µ(x))n ,
∀x ∈ X,
(22)
because it clearly satisfies the condition (16), i.e. f (x1 , x2 , . . . , xn ) ≤ min(x1 , x2 , . . . , xn ). The bigger n is
the more substantiating modifier we have. Thus we can have a graded system of modifiers. Especially,
if n = 1, we have the identity modifier F0 = µ, that have no substantiating effect.
Example 11. The formula
n
f (x1 , x2 , . . . , xn ) = 1 − ∏(1 − xi ),
i=1
∀i, xi ∈ [0, 1],
(23)
generates a weakening modifier
Hn−1 (µ(x)) = 1 − (1 − µ(x))n ,
∀x ∈ X
(24)
because it clearly satisfies the condition (18). To see this, let a delivery of values from the interval [0, 1]
be such that xk , 1 ≤ k ≤ n, has the greatest value. In this situation we can write max(x1 , x2 , . . . , xn ) = xk .
Thus we have 1 − xk ≥ 1 − xi , 1 ≤ i ≤ n, and this implies
n
(1 − xk )n ≥ ∏(1 − xi )
i=1
which implies
n
1 − ∏(1 − xi ≥ 1 − (1 − xk )n .
i=1
From this it clearly follows that 1 − (1 − xk )n ≥ 1 − (1 − xk ) = xk = max(x1 , x2 , . . . , xn ) by the suppoaition of the delivery of values. The special case n = 1 gives the idetity modifier H0 (µ(x)) =
µ(x)∀x ∈ X, as it should be.
141
Example 12. In addition to the special cases of previous examples, consider some generators for
identity modifier. The formula
1
f (x1 , x2 , . . . , xn ) = (x1 + x2 + . . . + xn ),
n
(25)
generates identity modifier, because (18) holds clearly.
Another way for generating identity modifier is to use the function
n
f (x1 , x2 , . . . , xn ) = ∑ λi xi ,
(26)
i=1
where ∑ni=1 λi = 1. It is easy to show that this function satisfies the condition (18).
Also max(x1 , x2 , . . . , xn ) and min(x1 , x2 , . . . , xn ) generate identity modifiers, because the operators
max and min do not have any modifying effect.
According to Def.2, the dual of a modifier F is defined by the condition
F ∗ (x) = n(F(n(x)))
(27)
where n is a strong negation function. This also means that if F is substantiating then F ∗ is weakening,
and if H is weakening then H ∗ is substantiating, by Proposition 3.
Example 13. The modifiers given in Examples 10 and 11 are duals of each others when ∀x ∈
X, n(µ(x)) = 1 − µ(x). The modifiers (22) and (24) are basing on extensions of the t-norm algebraic
product and the t-conorm algebraic sum, respectively.
4
Some Concluding Remarks
One purpose for studying modifiers is to create some concrete tools for manipulating fuzzy numbers
so that we can have arithmetic operations to be easily used. However, these operations should be in
accordance with the original definition where extension principle is used. Also the study of logical
systems of modifiers is very interesting. From this study we can draw connections to topological
properties of fuzzy systems (see e.g. Kortelainen’s paper [3] and his other papers, too).
According to the substance itself, n-ary functions being extensions of some Archimedean t-norms
and t-conorms are very interesting for generators of modifiers, as we already had a short view in the
form of Examples 10 – 13 above. It is well known that Archimedean t-norms and corresponding
t-conorms have modifying effects (see e.g. Mattila [8]).
References
[1] J. Dombi, A general class of fuzzy operators, the DeMorgan class of fuzzy operators and fuzziness measures induced by fuzzy operators, Fuzzy Sets and Systems,8, 1982
[2] J. Kortelainen, On algebraic approach to modifiers in fuzzy sets, in: Lowen, Roubens (eds.)
Computer, Management & Systems Science, Proceedings of IFSA 91, Brussels, Belgium 1991
142
[3] J. Kortelainen, On relationship between modified sets, topological spaces and rough sets, Fuzzy
Sets and Systems 61, 91 - 95, North-Holland, 1994
[4] G. Lakoff, Hedges: A study in meaning criteria and the logic of fuzzy concepts, The Journal of
Philosophical Logic, 2, 1973
[5] R. Lowen, Fuzzy Set Theory. Basic Concepts, Techniques and Bibliography, Kluwer Academic
Publishers, 1996
[6] J. K. Mattila, Modeling fuzziness by Kripke structures, in: T. Terano, M. Sugeno, M.
Mukaidono, K. Shigemasu (eds.), Fuzzy Engineering toward Human Friendly Systems, Vol. 2,
Proc. of IFES ’91, Nov. 13 - 15, 1991, Yokohama, Japan
[7] J. K. Mattila, On modifier logic, in: L. A. Zadeh, J. Kacprzyk (eds.), Fuzzy Logic for Management of Uncertainty, John Wiley & Sons, Inc., New York, 1992
[8] J. K. Mattila, Reasoning with graded chains of t-norms and t-conorms, in: Proceedings of the
Conference 3rd International Conference on Fuzzy Logic, Neural Nets and Soft Computing
(IIZUKA ’94), August 1-7, 1994, Fukuoka, Japan
[9] J. K. Mattila, Modifier Logics Based on Graded Modalities, Journal of Advanced Computational
Intelligence and Intelligent Informatics, Vol. 7 No. 2, 2003
[10] J. K. Mattila, Modifiers Based on Some t-norms in Fuzzy Logic, Soft Computing, to appear
[11] J. K. Mattila, On Logic of Some t-norms Based Modifiers, in: Proceedings of the 10th IFSA
World Congress, June 29 - July 2, 2003, Istanbul, TURKEY
[12] J. K. Mattila, On modifiers based on n-placed functions, in: Proceedings of Third Conference of
European Society for Fuzzy Logic and Technology, September 10 - 12, 2003, Zittau, Germany,
p. 235 - 238.
143
Ordinal sorting in the presence of interacting points of view: TOMASO
PATRICK M EYER1 , M ARC ROUBENS2
1 Complex
Enterprise Systems Institute
Faculty of Law, Economics and Finance
University of Luxembourg
1511 Luxembourg, G.D. Luxembourg
E-Mail: ♣❛tr✐❝❦✳♠❡②❡r❅✐♥t❡r♥❡t✳❧✉
2 MATHRO
Faculté Polytechnique of Mons
7000 Mons, Belgium
E-Mail: ♠✳r♦✉❜❡♥s❅✉❧❣✳❛❝✳❜❡
1
Introduction
This paper presents an ordered sorting procedure based on the Choquet integral as a discriminant
function. It uses information provided by the Decision Maker (DM) in terms of a set of prototypes
(alternatives well-known to the DM). The capacities of the Choquet integral are assessed through the
solving of a linear program or a quadratic program. An interpretation of the results is provided by
means of importance and interaction indexes of the points of view.
We analyze a sorting procedure for ordinal data in a very general case, where the points of view
can have interactions. Its name, T OMASO stands for Tool for Ordinal MultiAttribute Sorting and
Ordering. The first version of this method has been described in [7] and [9]. Later, in [6] the authors
present further evolutions to the first ideas, and describe a software which is directly inspired from the
sorting procedure.
Three important features differentiate this procedure from other multiple criteria sorting methods.
First of all, the possibility to treat purely ordinal data. Secondly, the use of a Choquet integral [1] as
a discriminant function. And finally, the way the capacities ("weights") of the aggregator are learnt
from a reference set of alternatives called prototypes. These three key features allow to treat a quite
large set of problems. In particular, the learning feature of the method is interesting as it allows to
ask the Decision Maker (DM) a minimal set of technical details. In order to allow a more effective
and objective analysis of the problem, we think that it is useful to have a permanent interaction with
the DM. But this questioning should mainly be restricted to his expertise domain and not to technical
parameters of the method. The use of the prototypes fits to this philosophy.
The method works in two steps. First of all, the ordinal data is transformed into partial net scores,
where each alternative is compared to all the other ones for each point of view. Then, the Choquet
integral is used to aggregate these partial net scores. As already mentioned earlier, the capacities
of the aggregator are learnt from the reference set of prototypes. Here, two options appear: either
the prototypes don’t violate the axioms ([11]) for the use of a Choquet integral as a discriminant
function, or the structure of the prototypes does not allow its use as an aggregator. In the first case,
144
the capacities are learnt by solving a linear constraints satisfaction problem. This procedure is briefly
recalled in section 3.1. In the second case, the capacities are learnt by trying to be as close as possible
to the original sorting imposed by the prototypes. This part is described in section 3.2.
This paper is organized as follows. First of all, general concepts are introduced in section 2. Then,
in section 3.1 we recall the first ideas of T OMASO already published in [6]. In section 3.2 we present
how to work in case the classical way fails. Finally, in 4 we draw some conclusions, and discuss
further improvements.
2
Preliminary considerations
Let A be a set of q potential alternatives which are to be assigned to disjoint ordered classes. Let
F = {g1 , . . . , gn } be a set of points of view. For each index of point of view j ∈ J = {1, . . . , n}, the
alternatives are evaluated according to a s j -point ordinal performance scale represented by a totally
ordered set
j
X j := {g1 ≺ j . . . ≺ j gsj j }.
Therefore, an alternative x ∈ A can be identified with its corresponding profile
n
(x1 , . . . , xn ) ∈ ∏ X j =: X,
j=1
where for any j ∈ J , x j is the partial evaluation of x on point of view j.
m .
Let us consider a partition of X := Πnj=1 X j into m nonempty increasingly ordered classes {Clt }t=1
This means that for any r, s ∈ {1, . . . , m}, with r > s, the elements of Clr are considered as better than
the elements of Cls . The sorting problem we are dealing with consists in partitioning assigning the
m .
alternatives of A to the classes {Clt }t=1
In Roubens [9] it is justified how an n-place Choquet integral as a discriminant function and
normalised scores as criteria function can be used to solve this problem. Hereafter we present the
sorting procedure derived from this particular case.
3
The T OMASO method
The T OMASO method (Technique for Ordinal Multiattribute Sorting and Ordering) is mainly based
on two techniques (which can lead to the same results under certain conditions). The original method
has first been described in [9]. In the following Subsection, we present its basics. In Subsection 3.2
we show how it is possible to deal with a larger set of problems.
3.1
The classical way
The different stages of the original T OMASO are listed below:
1. Modification of the criteria evaluations into normalised scores;
2. Use of a Choquet integral as a discriminant function;
145
3. Assessment of fuzzy measures by questionning the
satisfaction problem;
DM
and by solving a linear constraint
4. Calculation of the borders of the classes and assignment of the alternatives to the classes;
5. Analysis of the results (interaction, importance, leave one out, visualisation).
In this Section we roughly present these different elements.
First of all, concerning the scales on the points of view, two natural approaches can be considered:
either the score of each alternative is built on the basis of all the alternatives in A or this score is constructed in a context-free manner, that is, independently of the other alternatives. The decision maker
must be aware that the final results may significantly differ according to the considered approach.
Therefore, a prior analysis of the problem is recommended to choose the scores appropriately.
In the first approach, one possible way to build the scores is to consider comparisons of the alternatives on each of the points of view. We consider S j (x), the jth partial net score of alternative
x ∈ A along point of view j ∈ J , as the number of times that x is preferred to any other alternative of
A minus the number of times that any other alternative of A is preferred to x for point of view j. We
furthermore normalize these scores so that they range in the unit interval, i.e.,
SNj (x) :=
S j (x) + (q − 1)
∈ [0, 1]
2(q − 1)
(j ∈ J,
where q = |A|. Clearly, this normalized score is not a utility, and should not be considered as such.
Indeed, observing an extreme value (close to 0 or 1) means that x is rather “atypical” compared to
the other alternatives along point of view j. Thus, the resulting evaluations strongly depend on the
alternatives which have been chosen to build A.
Consider now the second approach, that is, where the score of each alternative does not depend
on the other alternatives in A. In this case, we suggest the decision maker provides the score functions
as utility functions. Alternatively, we can approximate these utility functions by the following linear
formula:
ord j (x) − 1
∈ [0, 1]
( j ∈ J ),
SNj (x) :=
sj −1
j
where ord j : A → {1, . . . , s j } is a mapping defined by ord j (x) = r if and only if x j = gr . In this latter
case, SNj does not necessarily represent a real utility and probably does not correspond to the utility
the decision maker has in mind. We therefore continue to call it a score.
We now come to the crucial part of the aggregation of the normalised partial net scores of a given
alternative x by means of a Choquet integral [1]. The advantage of this aggregator is mainly that it
allows to deal with interacting (depending) points of view. According to the general definition of the
Choquet integral, we have:
Cv (SN (x)) :=
n
∑ S(Nj) (x)[v(A( j) ) − v(A( j+1) )]
j=1
/ = 0 and
where v is a fuzzy measure on J ; that is a monotone set function v : 2J → [0, 1] fulfilling v(0)
v(J ) = 1. The parentheses used for indexes stand for a permutation on J such that
N
N
S(1)
(x) ≤ . . . ≤ S(n)
(x),
146
and for any j ∈ J , A( j) represents the subset {( j), . . . , (n)}. The characterisation of the Choquet
integral by Marichal ( [4], [5]) clearly justifies the way the partial scores are aggregated.
The next step of this method is to assess the fuzzy measures in order to classify the alternatives
of A. One can easily understand that it is impossible to ask the DM to give values for the 2n − 2
free parameters of the fuzzy measure v. Practically, the assessment of the fuzzy measures is done by
asking the DM to provide a set of prototypes P ⊆ A and their assignments to the given classes; that is
m where P := P ∩ Cl for t ∈ {1, . . . , m}. The values of
a partition of P into prototypic classes {Pt }t=1
t
t
the fuzzy measure are then derived from this information as described hereafter.
We would like the Choquet integral to strictly separate the classes Clt . Therefore, the following
necessary condition is imposed
Cv (SN (x)) − Cv (SN (x′ )) ≥ ε
(1)
for each ordered pair (x, x′ ) ∈ Pt × Pt−1 and each t ∈ {2, . . . , m}, where ε is a given strictly positive
thershold.
Due to the increasing monotonicity of the Choquet integral, the number of separation constraints 1
can be reduced significantly. Thus, it is enough to consider border elements of the classes. To formalise this concept, we first define a dominance relation D (partial order) on X by
xDy
iff x j j y j , for all j ∈ J .
As upper border of the prototypic class Pt we use the set of non-dominated alternatives of Pt defined
by
NDt := {x ∈ Pt s.t. 6 ∃x′ ∈ Pt \ {x} : x′ Dx}.
Similarly, the lower border of the prototypic class is given by the set of non-dominating alternatives
of Pt which is defined by
Ndt := {x ∈ Pt s.t. 6 ∃x′ ∈ Pt \ {x} : xDx′ }.
The separation conditions restricted to the prototypes of the subsets NDt ∪ Ndt , t ∈ {1, . . . , m} put
together with the monotonicity constraints on the fuzzy measure, form a linear program [7] whose
unknowns are the capacities v(S), S ⊂ J and where ε is a non-negative variable to be maximised in
order to deliver well separated classes.
We use the principle of parsimony for the resolution of this problem. If there exists a k-additive
fuzzy measure v∗ ([3]), k being kept as low as possible, then we determine the boundaries of the
classes as follows:
• lower boundary of Clt : z(t) := minx∈Ndt Cv∗ (SN (x));
• upper boundary of Clt : Z(t) := maxx∈NDt Cv∗ (SN (x)).
At this point, any alternative x ∈ A can be classified in the following way:
• x is assigned to class Clt if zt ≤ Cv∗ (SN (x)) ≤ Zt ;
• x is assigned to class Clt ∪Clt−1 if Zt−1 < Cv∗ (SN (x)) < zt .
147
A final step of the classical T OMASO method concerns the evaluation of the results and the interpretation of the behavior of the Choquet integral. The meaning of the values v(T ) is not clear to the
DM . They don’t immediatly indicate the global importance of the points of view, nor their degree of
interaction. It is possible to derive some indexes from the fuzzy measure which are helpful to interpret its behavior. Among them, the T OMASO method proposes to have a closer look at the importance
indexes [10] and the interaction indexes [8].
3.2
An alternate way
It may happen that the linear program described in Subsection 3.1 has no solution. This occurs when
the prototypic elements violate the axioms that are imposed to produce a discriminant function of
Choquet type ([5] [11]), in particular the triple cancellation axiom.
In such a case, and in order to present a solution to the DM, we suggest to find a fuzzy measure by
solving the following quadratic program
min
∑
[Cv (SN (x)) − y(x)]2 ,
x∈∪t∈{1,...,m} {NDt ∪NDt }
where the unkowns are
• the capacities v(S) which determine the fuzzy measure;
• some global evaluations y(x) for each x ∈ ∪t∈{1,...,m} {NDt ∪ Ndt }.
The capacities v(S) are constrained by the monotonicity conditions (as previously shown in Section 3.1). The global evaluations y(x) must verify the classification imposed by the DM. In other
words, for every ordered pair (x, x′ ) ∈ Ndt × NDt−1 , t ∈ {2, . . . , m} the condition y(x) − y(x′ ) ≥ ε′ ,
ε′ > 0 must be satisfied.
Intuitively, for a given alternative x ∈ A, its Choquet integral Cv (SN (x)) should be as close as possible to the global evaluation y(x), without being constrained by monotonicity conditions which might
violate the triple cancellation axiom for example. On the other hand, the evaluation y(x) is constrained
by the conditions derived from the original classification given by the DM on the prototypes.
Unlike the method described in Section 3.1, in this case, ε′ plays the role of a parameter, which
needs to be fixed by the DM. As previously, we use the principle of parsimony when searching for a
solution (keep k as low as possible; at worst k equals the number of points of view). A correct choice
of ε′ remains one of the main challenges of our future research. It is clear that ε′ has to be chosen in
]0, 1/n[.
As in the classical method, the next step is to determine the structure of the classes. We determine
an assignment for every alternative of X in terms of intervals of contiguous classes on the basis of the
information provided by the Choquet integrals related to the prototypes of P ⊆ A.
First of all, let us suppose that SN (x− ) := (0, . . . , 0) is classified to the worst class, Cl1 and that
SN (x+ ) := (1, . . . , 1) is classified to the best class, Clm .
To each assignment I(x) correspond a lower class label l(x) and an upper class label l(x), l, l ∈ J .
We say that the alternative x ∈ X is precisely assigned to Cll(x) if for the assignment I(x) we have
l(x) = l(x) =: l(x). Else, the alternative x is said to be ambiguously assigned to the interval of labels
148
I(x) = [l(x), l(x)]. The degree of the assignment corresponds to the number of contiguous classes
contained in I(x), d(x) = l(x) − l(x) + 1.
The assignments are done according to the procedure described hereafter. Starting from the prototypes x ∈ P, their Choquet integrals Cv (SN (x)) and their original classification label Cl(x) (according
to the DM’s choice), we define for every u ∈ [0, 1],
m(u) =
max
x∈P:Cv (SN (x))≤u
M(u) =
min
Cl(x), and
x∈P:Cv (SN (x))≥u
Cl(x).
m (resp. M) is a right (resp. left) continuous stepwise function of argument u with values belonging
to the discrete finite set J .
We now define for each u ∈ [0, 1] an interval of contiguous classes I(u) = [l(u), l(u)] where
l(u) = min{m(u), M(u)}
l(u) = max{m(u), M(u)}.
Obviously l(u) ≤ l(u) and due to monotonicity of m and M we have: l(u) ≤ l(v), l(u) ≤ l(v), ∀u, v ∈
[0, 1] with u ≤ v.
The interval [0, 1] is partitioned into (closed, semi-open or open) intervals Is , s = 1, . . . , S, and
each of those intervals of [0, 1] receives an assignment of the type [l(s), l(s)] (or semi-open or open)
in such a way that: if u, v ∈ [0, 1], u ≤ v and if u is assigned to Ir := [l(r), l(r)] and v is assigned to
Ir′ := [l(r′ ), l(r′ )] then l(r) ≤ l(r′ ) and l(r) ≤ l(r′ ).
Moreover if u = Cv (SN (x)), x ∈ P then l(u) ≤ Cl(x) ≤ l(u). This means that each prototype is
correctly classified, possibly with ambiguity if d(x) ≥ 1.
The assignment of a prototype a to the intervals of classes leads now to two scenarios:
• a is assigned to a single class (d(a) = 1) which corresponds to the original class decided by the
DM
• a is assigned to an interval of classes and the original class decided by the DM belongs to this
interval.
The quality of a model (classifier) depends on different ratios. A good model has the following
natural properties:
• a simple model according to parsimony (low k);
• a high number of precise assignments of the elements of P;
• a low number of ambiguous assignments of the elements of P (and the lower the degree of the
assignment, the better the model)
For a given ε′ , the DM has to select a model (k) which seems the best compromise to him in terms
of the previously described assignments. The simplest additive model (k = 1) can in certain situations
be this ideal compromise between simplicity and quality. But in more complex problems, k has to be
increased in order to obtain a satisfying number of precisely assigned prototypes.
149
3.3
Behavioral analysis of aggregation
Now that we have a sorting model for assigning alternatives to classes (based on the linear program
or the quadratic program), an important question arises: How can we interpret the behavior of the
Choquet integral or that of its associated fuzzy measure? Of course the meaning of the values v(T )
is not always clear for the DM. These values do not give immediately the global importance of the
points of view, nor the degree of interaction among them.
In fact, from a given fuzzy measure, it is possible to derive some indexes or parameters that will
enable us to interpret the behavior of the fuzzy measure. These indexes constitute a kind of id card of
the fuzzy measure. The T OMASO method presently allows to analyse both the importance of points
of view (Shapley indexes [10]), and their interactions ([8]).
3.4
Interpretation of the behaviour of the fuzzy measure
In this Section we briefly show the main advantage to use a Choquet integral rather than the weighted
sum as a discriminant function. We therefore take the simple case of two points of view, which can
be represented in a plane. Figure 4 presents 5 possible ranges of values for the weights v and the
corresponding structures of the limits of the classes. One can see that the main difference between the
classical weighted sum and the Choquet integral is the greater flexibility of the borders of the classes.
The Choquet integral creates piecewise linear borders, which allows to build more precise classes.
The different possibilities are summarised by the following list:
• I: v(1) + v(2) < v(12): synergy
• II: v(1) + v(2) > v(12): redundancy
• III: v(1) + v(2) = v(12) = 1: additivity
• IV: v(1) = v(2) = 0: limit case; maximal synergy
• V: v(1) = v(2) = 1: limit case; maximal redundancy
2
2
Cl1
2
Cl1
Cl1
Cl2
Cl2
Cl2
1
I
2 Cl2
1
II
III
1
2
Cl1
Cl1
Cl2
IV
1
V
1
Figure 4: Interpretation of the discriminant functions
150
In [2] the authors give an interpretation to the first two cases. In case of synergy, although the
importance of a single criterion for the decision is rather low, the importance of the pair is large. The
criteria are said to be complementary. In case of redundance, or negative synergy, the union of criteria
does not bring much, and the importance of the pair might be roughly the same as the importance of
a single criterion.
The limit case (IV) occurs for maximal synergy. In that case, the Choquet integral corresponds
to the aggregation by the min function. Maximal redundancy occurs for case (V), where the Choquet
integral is the max function.
In case the number of points of view is larger than two, it becomes quite hard to represent the
problem. Nevertheless, the previous short example helps to understand how the borders of the classes
are built in such more general examples.
3.5
The software T OMASO
In this short part of the paper we briefly present the key-characteristics of the software T OMASO .
It can be downloaded on http://patrickmeyer.tripod.com. It is an implementation of the algorithms
which were presented previously. Its name stands for “Tool for Ordinal MultiAttribute Sorting and
Ordering”. It is written in Visual Basic and uses two external solvers: a free linear program solver
(lp_solve 3.0, ftp://ftp.ics.ele.tue.nl/pub/lp_solve/, released under the LGPL license), and a non free
quadratic program solver (bpmpd, free trial version at http://www.sztaki.hu/ meszaros/bpmpd/).
It is still under development and many improvements are added on a regular basis. The general
steps of the software are outlined hereafter:
• Loading of the ordinal data;
• Choice of a scoring method according to the problem’s specificities and calculation of the normalised partial net scores;
• Definition of the prototypes by the DM;
• Search for a fuzzy measure (either by the linear program, or the quadratic program)
• Analysis of the results (classes, Shapley indexes, interaction indexes, accuracies, . . .)
A detailed description of the software can be obtained from the author.
4
Concluding remarks
We have presented a procedure for ordinal sorting in the presence of interacting points of view. It
has already been applied to real life cases (in particular to a noise annoyance problem) quite successfully. Future work will concern the simplification of the software in order to make it even more
user-friendly. Furthermore, the automatic determination of ε′ will also be one of our main concerns.
The implementation of other indexes (veto, favour, . . .) is also planned.
151
References
[1] G. Choquet, Theory of capacities, Annales de l’Institut Fourier, 5, (1953) 131-295.
[2] M. Grabisch, M. Roubens, Application of the Choquet Integral in Multicriteria Decision Making,
In: M. Grabisch, T. Murofushi, M. Sugeno (eds.): Fuzzy Measures and Integrals, Physica Verlag,
Heidelberg, (2000) 348-374.
[3] M. Grabisch, k-order additive discrete fuzzy measure and their representation, Fuzzy Sets and
Systems, 92, (1997) 167-189.
[4] J.-L. Marichal, Aggregation operators for multicriteria decision aid, Ph.D. thesis, Institute of
Mathematics, University of Liège, Liège, Belgium, (1998).
[5] J-L. Marichal, An axiomatic approach of the discrete Choquet integral as a tool to aggregate
interacting criteria, IEEE Transactions on Fuzzy Systems, 8, (2000) 800-807.
[6] J.-L. Marichal, P. Meyer and M. Roubens, Sorting multiattribute alternatives: The TOMASO
method, International Journal of Computers & Operations Research, 2003, in press.
[7] J-L. Marichal, M. Roubens, On a sorting procedure in the presence of qualitative interacting
points of view. In: J. Chojean, J. Leski (eds.):Fuzzy Sets and their Applications. Silesian University Press, Gliwice, (2001) 217-230.
[8] T. Murofushi, S. Soneda, Techniques for reading fuzzy measures (III): interaction index, 9th
Fuzzy Sytem Symposium, Sapporo, Japan, (1993) 693-696. In Japanese.
[9] M. Roubens, Ordinal multiattribute sorting and ordering in the presence of interacting points
of view. In: D. Bouyssou, E. Jacquet-Lagrèze, P. Perny, R. Slowinsky, D. Vanderpooten and
P. Vincke (eds.): Aiding Decisions with Multiple Criteria: Essays in Honour of Bernard Roy.
Kluwer Academic Publishers, Dordrecht, (2001) 229-246.
[10] L.S. Shapley, A value for n-person games. In: H.W. Kuhn, A.W. Tucker (eds.): Contributions
to the Theory of Games, Vol. II, Annals of Mathematics Studies, 28, Princeton University Press,
Princeton, NJ, (1953) 307-317.
[11] P. Wakker, Additive Representations of Preferences: A new Foundation of Decision Analysis,
Kluwer Academic Publishers, Dordrecht, Boston, London, (1989).
152
Regular measures on tribes of fuzzy sets
M IRKO NAVARA1 , PAVEL P TÁK2
1 Center
for Machine Perception, Department of Cybernetics
Faculty of Electrical Engineering
Czech Technical University
16627 Praha, Czech Republic
E-Mail: ♥❛✈❛r❛❅❝♠♣✳❢❡❧❦✳❝✈✉t✳❝③
2 Department
of Mathematics
Faculty of Electrical Engineering
Czech Technical University
16627 Praha, Czech Republic
E-Mail: ♣t❛❦❅♠❛t❤✳❢❡❧❞✳❝✈✉t✳❝③
Abstract
The classical measure and probability theory is based on the notion of σ-algebra of subsets of
a set. Butnariu and Klement [3] generalized it to fuzzy sets by considering collections of fuzzy
sets called T -tribes (where T denotes a fixed triangular norm). Their concept of T -measure is
fundamental in the fuzzification of classical measure theory. However, it has been successfully
applied elsewhere, too (e.g., in finding solutions of games with fuzzy coalitions, see [4]). Here
we summarize results about characterization of measures on tribes. Unlike preceding papers, we
put emphasis on regular measures which were introduced in [21]. We argue that this notion could
be considered as a promising alternative to the original notion of Butnariu and Klement.
1
Introduction
The notion of “fuzzy measure theory” is used in different meanings (see [10] and the overview in [23]).
Here we try to define real-valued measures on collections of fuzzy sets. Thus, we want to fuzzify the
domain but not the range of a measure. When the generalized notions are restricted to systems of
crisp sets, we expect them to coincide with the classical ones. A certain work in this direction was
initiated by Butnariu and Klement [3, 4, 11]. They introduced T -tribes of fuzzy sets with T -measures
as a natural generalization of a measure space. They made the first steps towards a characterization of
monotone real-valued T -measures for a Frank triangular norm T . This project has been completed by
Mesiar and Navara in [16]. Detailed summaries of this approach, together with a thorough analysis of
Jordan decomposition, Lyapunov theorem, etc., may be found in [5, 6].
Later on, Barbieri and H. Weber and independently Navara found two generalizations, one for
vector-valued T -measures with respect to Frank t-norms (in particular for non-monotone ones) [2],
the other for monotone real-valued T -measures with respect to general strict t-norms [20]. A common
generalization of these two results was proved by Barbieri, Navara, and H. Weber in[1]—
a characterization of non-monotone (even vector-valued) T -measures with respect to an arbitrary strict
t-norm.
153
All these results assumed a special structure of the tribes. Recently in [7] it was found that these
assumptions are satisfied for many, but not all strict t-norms. The measure-theoretical consequences of
this fact, as well as a new approach to proofs of all preceding results, form the subject of the paper [21];
here we summarize its main conclusions. Unless specified otherwise, we use the terminology and
notation of [12].
2
Tribes
The notion of tribe was suggested by Butnariu and Klement [3, 4] as a fuzzification of a σ-algebra.
In order to define measures on fuzzy subsets of some set, we need the underlying collections of
measurable fuzzy sets (tribes) to be closed under fuzzy operations corresponding to those used in a
σ-algebra. In particular, we need a fuzzy complement and a fuzzy union or a fuzzy intersection.
Assumption 1. Throughout this paper we assume that a fuzzy complement, f ′ , of a fuzzy set f is obtained by the pointwise application of a (strong) fuzzy negation, i.e., an involutive decreasing bijection
′ : [0, 1] −→ [0, 1]. A fuzzy intersection, resp. a fuzzy union, is obtained by a pointwise application of
a t-norm T , resp. the t-conorm S dual to T with respect to ′ . (We use the same symbols for fuzzy
operations on truth values from [0, 1] and operations on fuzzy sets induced by them.) The symbol
≤ denotes the usual ordering of fuzzy sets as real-valued functions (fuzzy inclusion), and fn ր f
(resp. fn ց f ) stands for the pointwise convergence of an increasing (resp. decreasing) sequence of
functions ( fn )n∈N .
Definition 2. Let X be a non-empty set. A tribe on X is a pentuple (T , T, ′ , 0, ≤), where T ⊆ [0, 1]X ,
T is a t-norm, ′ is a fuzzy negation, 0 is the constant zero function on X, ≤ is the fuzzy inclusion, and
the following conditions are satisfied:
(T1)
0∈T,
(T2)
f ∈ T =⇒ f ′ ∈ T ,
(T3)
f , g ∈ T =⇒ T ( f , g) ∈ T ,
(T4)
( fn )n∈N ∈ T N , fn ր f =⇒ f ∈ T .
We refer to X as the domain of the tribe (T , T, ′ , 0, ≤). By T -tribe operations we mean the following
operations: nulary 0, unary ′ , binary T , and the limit of increasing sequences.
Assumption 3. From now on, we shall consider only tribes with the standard negation a′ = 1 − a.
Remark 4. The latter assumption is not much restrictive, because every tribe is isomorphic to a
tribe in which ′ is the standard negation. (All preceding papers—including [3, 4]—admitted only the
standard negation in the definition of a tribe. In this aspect, our definition is more general.)
Using a multiplicative generator, also any strict t-norm may be considered equivalent to the product t-norm. However, this does not mean that any tribe is isomorphic to a tribe with the product t-norm
and the standard negation. The problem is that the multiplicative generator does not have to preserve
the standard negation. Thus only one of the operations—the t-norm or the fuzzy negation—can be
standardized using an isomorphism of tribes.
154
We have already fixed the standard fuzzy negation ′ . Also 0 and ≤ have their stable meaning. On
the other hand, the choice of the t-norm T is crucial and we shall always need to specify it. When
there is no risk of confusion, we shall speak briefly of a tribe (T , T ) (as in [1]), resp. of a T -tribe T .
(The latter is the original terminology of [3, 4]. The full notation (T , T, ′ , 0, ≤) was used in [23].) We
also speak of a T -tribe when we need to refer to the t-norm T , but not to the tribe itself.
Condition (T2) allows us to use duality, hence every T -tribe contains the constant function 1 and it
is closed under the t-conorm S dual to T and under limits of decreasing sequences. Thus every T -tribe
is closed also under the application of t-norm T to infinite sequences:
(T3+)
( fn )n∈N ∈ T N =⇒ T fn ∈ T ,
n∈N
because T n∈N fn is the limit of the decreasing sequence (T kn=1 fn )k∈N . In the original definition of a T tribe by Butnariu and Klement [3, 4], conditions (T3), (T4) were replaced by (T3+). In this aspect, our
definition is slightly less general. However, this difference is not essential. In fact, in many important
cases the two definitions coincide. In particular, all results found in the literature were obtained for
tribes which satisfy also our definition. We shall see that the definition presented here is quite natural
and advantageous for introducing measures on tribes.
Let T be a t-norm and (T , T ) be a tribe on X. The elements of T ∩ {0, 1}X are called Boolean
elements.
Let A be a σ-algebra of subsets of a set X. Let S be the corresponding collection of characteristic
functions,
S = {χA | A ∈ A } ,
and
T = { f ∈ [0, 1]X | f is A -measurable} .
For any t-norm T , (S , T ) is a tribe called the Boolean tribe induced by A . For any measurable t-norm
T , (T , T ), is a tribe called the full tribe induced by A . (Full tribes were first studied in [3], where they
were called generated tribes. Here we use the terminology from [22].)
3
Measures on tribes
In [3, 4], Butnariu and Klement introduced T -measures as a natural generalization of σ-additive measures on σ-algebras. Here we call them only measures because the t-norm T is specified with the
tribe. By R+ we denote the set of all non-negative reals.
Definition 5. Let (T , T, ′ , 0, ≤) be a tribe. A functional µ : T −→ R+ is called a measure if it satisfies
the following axioms:
(M1)
µ(0) = 0 ,
(M2)
f , g ∈ T =⇒ µ(T ( f , g)) + µ(S( f , g)) = µ( f ) + µ(g) ,
(M3)
( fn )n∈N ∈ T N , fn ր f =⇒ lim µ( fn ) = µ( f ) .
n∈N
155
Remark 6. Condition (T4) ensures that f ∈ T in (M3). In the original definition of a T -measure [3],
(T4) was not required and (M3) was replaced by a weaker condition which applies only to sequences
whose limits are in T :
(M3–)
f ∈ T , ( fn )n∈N ∈ T N , fn ր f =⇒ lim µ( fn ) = µ( f ) .
n∈N
Although using a more general condition (M3–), all previous papers on this topic dealt with special
cases of tribes satisfying (T4) and measures satisfying (M3).
Condition (M3) is the left continuity of the measure. In fact, in a Boolean tribe it implies also the
right continuity. However, this is not generally true for tribes. Therefore the following more specific
notion has been introduced in [21]:
Definition 7. A measure µ on a tribe (T , T ) is called regular if it satisfies (M1), (M2), and
(M3+)
( fn )n∈N ∈ T N , ( fn ր f or fn ց f ) =⇒ lim µ( fn ) = µ( f ) .
n∈N
Proposition 8. Let T be a t-norm and (T , T, ′ , 0, ≤) be a tribe satisfying the law of contradiction,
i.e., T ( f , f ′ ) = 0 for all f ∈ T . Then every measure on (T , T, ′ , 0, ≤) is regular. In particular, every
measure on a Boolean tribe or on a TL -tribe (where TL is the Łukasiewicz t-norm) is regular.
For a tribe (T , T ) on X, we define
Ť = {A ⊆ X | χA ∈ T } .
It is a σ-algebra of subsets of X. A measure µ on (T , T ) induces a measure µ̌ on Ť (introduced in [3])
µ̌(A) = µ(χA ) .
4
Frank and nearly Frank t-norms
Frank t-norms TλF , λ ∈ [0, ∞], were defined in [9] by
(λx −1)(λy −1)
log
1
+
λ
λ−1
F
Tλ (x, y) := min(x, y)
x·y
max(x + y − 1, 0)
if λ ∈ ]0, ∞[ \ {1} ,
if λ = 0 ,
if λ = 1 ,
if λ = ∞ .
(The t-norms TM = T0F , TP = T1F , TL = T∞F are the minimum, the product, and the Łukasiewicz t-norm,
respectively.) Frank t-norms TλF are strict iff λ ∈ ]0, ∞[. They play a special role in the characterization
of measures due to the following property [9]:
Theorem 9. Let T be a Frank t-norm and S its dual t-conorm. Then
∀a, b ∈ [0, 1] : T (a, b) + S(a, b) = a + b .
Conversely, if a continuous Archimedean t-norm T and its dual S satisfy (1), then they are Frank.
156
(1)
Let us recall the definition of nearly Frank t-norms [20]. We say that an increasing bijection
h : [0, 1] −→ [0, 1] commutes with the standard negation if
∀a ∈ [0, 1] : h(a′ ) = h(a)′ .
(Then h is called a negation preserving automorphism [20].)
Definition 10. A t-norm T is called nearly Frank if there is an increasing bijection h : [0, 1] −→ [0, 1]
which commutes with the standard negation and a Frank t-norm T ∗ satisfying
T ∗ (a, b) = h(T (h−1 (a), h−1 (b)))
(2)
for all a, b ∈ [0, 1].
Proposition 11 (see [20]). If T is a nearly Frank t-norm different from TM , then the bijection h and
the Frank t-norm T ∗ satisfying (2) are unique.
The question of how to recognize whether or not a given t-norm is nearly Frank has been solved
in [15].
5
Characterization of regular measures
Measures on T -tribes, where T is a nearly Frank t-norm, were characterized in [16]. For regular
measures, we obtain the following consequence:
Theorem 12. Let T be a strict nearly Frank t-norm with h satisfying (2) and (T , T ) be a tribe. Then
regular measures on (T , T ) are exactly all functionals of the form
µ( f ) =
Z
f ∈T ,
h ◦ f dν ,
(3)
where ν = µ̌ is a measure on Ť .
For Frank t-norms, h = id and we obtain the following:
Corollary 13. Let TλF , λ ∈ ]0, ∞[, be a strict Frank t-norm and (T , TλF ) be a tribe. Then also (T , TL )
is a tribe and regular measures on (T , TλF ) are exactly (regular) measures on (T , TL ). They are of the
form
Z
µ( f ) =
f dν ,
f ∈T ,
(4)
where ν = µ̌ is a measure on Ť .
Following [20], a regular measure µ of the form (3) is called a (generalized) integral measure. The
particular form (4) obtained for Frank t-norms is called a linear integral measure. It coincides with
measures on σ-complete MV-algebras studied in [8, 22].
If the t-norm T is not nearly Frank, the characterization of measures is different. For the special
case of a full tribe, it follows from [1]:
157
Theorem 14. Let T be a strict t-norm which is not nearly Frank. Then there is no non-zero regular
measure on any full T -tribe.
To analyze tribes which are not full, we introduce several notions. Let (T , T ) be a tribe on X and
Y be a non-empty subset of X. Let
TY = { f ↾Y | f ∈ T } ⊆ [0, 1]Y .
Then (TY , T ) is a tribe on Y called the restriction of (T , T ) to Y . Suppose, moreover, that Y ∈ Ť and
µ is a measure on (T , T ). Then µY : TY −→ R+ defined by
µY ( f ↾Y ) = µ( f · χY )
(5)
is a measure on (TY , T ) called the restriction of µ to Y .
Remark 15. In fact, the restriction µY of a measure µ may be understood as a measure conditioned by
a (crisp) event Y . A probabilistic interpretation is straightforward. Nevertheless, attempts to introduce
conditional probability which is conditioned by fuzzy events lead to difficulties even in the special
case of TL -tribes (see [22]).
Let (T , T ) be a tribe. For f ∈ T , we denote the following subsets:
U f = f −1 (1) ,
F f = f −1 (]0, 1[) ,
supp f = U f ∪ F f = f −1 (]0, 1])
(the support of f ).
They all belong to Ť .
Proposition 16. Let (T , T ) be a tribe and let µ be a measure on (T , T ). Then
µ( f ) = µ(χU f ) + µ( f · χF f ) = µ̌(U f ) + µF f ( f ↾ F f ) .
(6)
/ then f is Boolean and µ( f ) = µ̌(U f ). It only remains to determine the summand
If F f = 0,
/ We have its characterization if the restriction (TF f , T ) is a full tribe. As we
µF f ( f ↾ F f ) for F f 6= 0.
shall see, this is often the case (not only for strict nearly Frank t-norms). Even if (TF f , T ) is not a full
tribe, we can characterize regular measures [21]. For this, we define
It is a σ-ideal in the σ-algebra Ť .
∆T = {F f | f ∈ T } .
Theorem 17. Let T be a strict t-norm which is not nearly Frank and (T , T ) be a tribe. Then regular
measures on (T , T ) are exactly all functionals of the form (4), where ν = µ̌ is a measure on Ť such
that ν ↾ ∆T = 0.
Remark 18. In Theorem 17, ν(F f ) = µ̌(F f ) = 0. Then (4) may be written in many equivalent forms:
µ( f ) =
Z
f dν = ν(supp f ) = ν(U f )
and also as (3), where h : [0, 1] −→ [0, 1] is any increasing bijection.
According to the above results, any regular measure on a tribe is fully determined by a measure
on a σ-algebra. This characterization allows us to use many results derived in the classical measure
theory. On the other hand, the context of full tribes is more general and extension to fuzzy subsets
brings new phenomena.
158
6
Characterization of general measures
Now we shall generalize the results from the preceding section to measures which need not be regular
(we assume only left continuity in (M3)). A new type of measure occurs:
Proposition 19. Let T be a t-norm and (T , T ) be a tribe. The functional µ on T defined by
µ( f ) = µ̌(supp f )
is a measure on (T , T ) called a support measure.
The characterization from [20] may be reformulated as follows:
Theorem 20. Let T be a strict nearly Frank t-norm and let (T , T ) be a tribe on X. Every measure µ
on (T , T ) is a linear combination of an integral measure and a support measure.
As in Remark 18, a measure on a Boolean element may be considered an integral measure as well
as a support measure. Therefore the decomposition to an integral measure and a support measure in
Theorem 20 is not unique. The coefficients of the linear combination need not be non-negative:
Example 21. Let TλF , λ ∈ ]0, ∞[ be a strict Frank t-norm. Then each measure µ on ([0, 1], TλF ) (the full
TλF -tribe with a singleton domain) is of the form
(
p + q a if a > 0,
µ(a) =
0
if a = 0,
where p ≥ 0 and p + q ≥ 0. The measure µ is
• regular iff p = 0,
• monotone iff q ≥ 0.
E.g., if we take p = 1, q = −1, we obtain
(
1−a
µ(a) =
0
if a > 0,
if a = 0.
This is a measure which is not monotone.
As in the case of regular measures, we use Proposition 16. It is helpful if the restriction (TF f , T )
is full. In fact, the proof of Theorem 20 is based on Proposition 19, the characterization of regular
measures from Theorem 12, and the following:
Lemma 22. Let T be a strict nearly Frank t-norm and let (T , T ) be a tribe on X. If there is an f ∈ T
such that F f = X, then the restriction (T , T ) is a full tribe.
Recently in [7] Lemma 22 was generalized to many other strict t-norms which are called sufficient
because they give rise to sufficient (or functionally complete) sets of fuzzy logical connectives (see [7]
for details about this notion). In particular, sufficient t-norms include all t-norms from the Aczél–
Alsina and Mizumoto eighth and tenth families (see [12, 13] for the definitions and [7] for further
examples).
159
Theorem 23. Let T be a strict sufficient t-norm which is not nearly Frank and let (T , T ) be a tribe.
Every measure µ on (T , T ) is a support measure.
The question whether Lemma 22 remains valid for all strict t-norms has been open for many years.
It is related to problems published, e.g., in [14, 16, 17, 18]. Counterexamples were found recently
in [7]; the Hamacher product is one of them. For t-norms which are not sufficient, a characterization
of measures on tribes is known only in special cases when it leads again to support measures.
Problem 24. Is there a strict t-norm T which is not nearly Frank, a tribe (T , T ) and a measure µ on
(T , T ) which is not a support measure?
For regular measures, the characterization is known for all strict t-norms.
Acknowledgements
The first author gratefully acknowledges the support of the Czech Ministry of Education under Research Programme MSM 212300013 “Decision Making and Control in Manufacturing" and CEEPUS
network SK-042. The second author was supported by grant 201/02/1540 of the Grant Agency of the
Czech Republic.
References
[1] G. Barbieri, M. Navara, and H. Weber. Characterization of T -measures. Soft Computing 8:44Ű50, 2003.
[2] G. Barbieri and H. Weber. A representation theorem and a Lyapunov theorem for Ts -measures:
The solution of two problems of Butnariu and Klement. J. Math. Anal. Appl., 244:408–424,
2000.
[3] D. Butnariu and E. P. Klement. Triangular norm-based measures and their Markov kernel representation. J. Math. Anal. Appl., 162:111–143, 1991.
[4] D. Butnariu and E. P. Klement. Triangular Norm-Based Measures and Games with Fuzzy Coalitions. Kluwer Academic Publishers, Dordrecht, 1993.
[5] D. Butnariu and E. P. Klement. Triangular norm-based measures: Properties and integral representations. In M. Grabisch, T. Murofushi, and M. Sugeno, editors, Fuzzy Measures and Integrals.
Theory and Applications, Physica-Verlag, Heidelberg, pages 233–246, 2000.
[6] D. Butnariu and E. P. Klement. Triangular norm-based measures. In E. Pap, editor, Handbook
of Measure Theory. Elsevier Science, Amsterdam, chapter 23, pages 947–1010, 2002.
[7] D. Butnariu, E. P. Klement, R. Mesiar and M. Navara. Sufficient triangular norms in manyvalued logics with standard negation. Submitted.
[8] R. Cignoli, I. M. L. D’Ottaviano and D. Mundici. Algebraic Foundations of Many-Valued Reasoning. Kluwer Academic Publishers, Dordrecht, 1999.
160
[9] M. J. Frank. On the simultaneous associativity of F(x, y) and x + y − F(x, y). Aequationes Math.,
19:194–226, 1979.
[10] U. Höhle and S. Weber. Uncertainty measures, realizations and entropies. In J. Goutaias,
R.P.S. Mahler, and H.T. Nguyen, editors, Random Sets: Theory and Applications, Springer,
Heidelberg, pages 259–295, 1997.
[11] E. P. Klement. Construction of fuzzy σ-algebras using triangular norms. J. Math. Anal. Appl.,
85:543–565, 1982.
[12] E. P. Klement, R. Mesiar, and E. Pap. Triangular Norms. Kluwer Academic Publishers, Dordrecht, 2000.
[13] R. Lowen. Fuzzy Set Theory. Basic Concepts, Techniques and Bibliography. Kluwer Academic
Publishers, Dordrecht, 1996.
[14] R. Mesiar. On the structure of Ts -tribes. Tatra Mt. Math. Publ., 3:167–172, 1993.
[15] R. Mesiar. Nearly Frank t-norms. Tatra Mt. Math. Publ., 16:127–134, 1999.
[16] R. Mesiar and M. Navara. Ts -tribes and Ts -measures. J. Math. Anal. Appl., 201:91–102, 1996.
[17] R. Mesiar and V. Novák. Open problems from the 2nd International Conference on Fuzzy Sets
Theory and Its Applications. Fuzzy Sets and Systems, 81:185–190, 1996.
[18] M. Navara. A characterization of triangular norm based tribes. Tatra Mt. Math. Publ., 3:161–
166, 1993.
[19] M. Navara. Nearly frank t-norms and the characterization of T -measures. In D. Butnariu and
E. P. Klement, editors, Proceedings of the 19th Linz Seminar on Fuzzy Set Theory, pages 9–16,
Linz, 1998.
[20] M. Navara. Characterization of measures based on strict triangular norms. J. Math. Anal. Appl.,
236:370–383, 1999.
[21] M. Navara. T-norms and measures of fuzzy sets. InE. P. Klement and R. Mesiar, editors, Triangular Norms and Related Operators, to appear.
[22] B. Riečan and D. Mundici. Probability on MV-algebras. In E. Pap, editor, Handbook of Measure
Theory. Elsevier Science, Amsterdam, chapter 21, pages 869–910, 2002.
[23] S. Weber and E. P. Klement. Fundamentals of a generalized measure theory, In U. Höhle et al.,
editors, Mathematics of Fuzzy Sets. Logic, Topology, and Measure Theory, Kluwer Academic
Publishers, Dordrecht, pages 633–651, 1999.
161
The logic and algebra of fuzzy IF-THEN rules
V ILÉM N OVÁK
Institute for Research and Applications of Fuzzy Modelling
University of Ostrava
70103 Ostrava, Czech Republic
E-mail: ❱✐❧❡♠✳◆♦✈❛❦❅♦s✉✳❝③
This paper is an (incomplete) overview of the existing approaches to interpretation of fuzzy IF-THEN
rules and derivation of a conclusion on the basis of them.
We will focus especially on two principal interpretations of linguistic description. The first one
is called relational. The main idea is to find a good approximation of some function known only
roughly. Therefore, it is divided into imprecise “parts” using fuzzy relations constructed from fuzzy
sets with continuous membership functions of more or less arbitrary shape. Each such membership
function is assigned some name to be able to get better orientation in the rules, but without real
linguistic meaning. Formally, these are sets of fuzzy IF-THEN rules assigned one of two kinds of
normal forms: the disjunctive or conjunctive normal form (see [10]). The resulting fuzzy relation then
depends on the choice of the underlying algebra of truth values.
Most interpretations of fuzzy IF-THEN rules found in the literature stick on this interpretation.
Then derivation of a conclusion on the basis of them is done on the level of semantics rather than on
the level of syntax. However, there are also logical interpretations, e.g. those presented in [6, 9] and
elsewhere. An important case which, at the same time, belongs to logical interpretation is presented
in [9, 7]. Its main goal is to use genuine linguistic expressions interpreted in a way which mimics
human understanding to them. The fuzzy IF-THEN rules, which are then interpreted as linguistically
characterised logical implications, form special axioms of some formal theory.
There are several other kinds of interpretations which in various degrees can be ranked to the
relational one (cf. [5]). In the paper, we will discuss and compare these interpretations from several
points of view.
References
[1] Da Ruan and E. E. Kerre (Eds.): Fuzzy If-Then Rules in Computational Intelligence: Theory
and Applications. Kluwer Academic Publishers, Boston 2000.
[2] Dubois D. and Prade H. (1990b). Fuzzy sets in approximate reasoning — Part 1: Inference with
possibility distributions. Fuzzy Sets and Systems, 40, 143–202.
[3] Dubois D., Lang J. and Prade H. (1991). Fuzzy sets in approximate reasoning — Part 2: Inference with possibility distributions. Fuzzy Sets and Systems, 40, 203–244.
[4] Dubois D. and Prade H. (1992), Gradual inference rules in approximate reasoning. Information
Sciences, 61(1–2),103–122.
162
[5] Dubois D. and Prade H. (1992), The Semantics of Fuzzy “IF...THEN...” Rules. In: Novák,
V., Ramík, J., Mareš, M., Černý, M., Nekola, J. (eds.), Fuzzy Approach to Reasoning and
Decision–Making. Kluwer, Dordrecht 1992, Academia, Praha 1992.
[6] Hájek, P. (1998), Metamathematics of fuzzy logic. Kluwer, Dordrecht.
[7] Novák, V. (2003), Approximation Abilities of Perception-based Logical Deduction. Proc. Third
Conf. EUSFLAT 2003, University of Applied Sciences at Zittau/Goerlitz, Germany, 630–635.
[8] Novák, V. (2003), Fuzzy logic deduction with words applied to ancient sea level estimation.
In: Demicco, R. and Klir, G.J. (Eds), Fuzzy logic in geology. Academic Press, Amsterdam,
301–336.
[9] Novák, V., Perfilieva I., Močkoř, J. (1999), Mathematical Principles of Fuzzy Logic. Kluwer,
Boston/Dordrecht.
[10] Perfilieva, I. (2001), Normal Forms for Fuzzy Logic Functions and Their Approximation Ability.
Fuzzy Sets and Systems 124, 371–384.
163
Solvability and approximate solvability of a system of fuzzy relation
equations from functional point of view
I RINA P ERFILIEVA
Institute for Research and Applications of Fuzzy Modelling
University of Ostrava
70103 Ostrava, Czech Republic
E-mail: ■r✐♥❛✳P❡r❢✐❧✐❡✈❛❅♦s✉✳❝③
Abstract: The paper summarized the last author’s results concerning the problem of solvability and
approximate solvability of a system of fuzzy relation equations. A number of new criteria of the so
called Mamdani relation to be a solution to the system is suggested. At the same time those criteria
are sufficient conditions of a solvability of the system in general. A new, easy to check criterion of a
solvability of the system with special fuzzy parameters is found.
With the notion of a fuzzy function as a mapping between universes of fuzzy sets we threw a
new light on the problem of solvability and approximate solvability. In this setting, precise and approximate solutions to a system of fuzzy relation equations are considered as the interpolating and
approximating fuzzy functions with respect to the given data. Different approximating spaces and different criteria of approximation have been introduced. We have proved that the widely known fuzzy
relations introduced by E. Sanchez and E. H. Mamdani are the best approximations in the respective
spaces and under the respective criteria.
Keywords: system of fuzzy relation equations, solvability of a fuzzy relation equation system, fuzzy
equivalence, fuzzy point, fuzzy function
1
Introduction
Systems of fuzzy relation equations are connected with applications like fuzzy control, identification of fuzzy systems, prediction of fuzzy systems, decision-making, etc. Such systems arise in the
process of formalization of fuzzy IF–THEN rules, which well recommend themselves as an approximating instrument for continuous dependencies. In this correspondence, the problem of solvability of
a system of fuzzy relation equations relates to a problem of verification of correctness of the chosen
formalization of fuzzy IF–THEN rules.
In the proposed overview, we will consider the problem of solvability of a system of fuzzy relation
equations in the following aspects:
• criteria of general solvability, i.e. necessary and sufficient and only necessary or only sufficient
[4, 10, 16, 18, 19];
• simple criteria of solvability in special cases where original data are fuzzy sets which constitute
fuzzy partitions of respective universes [10, 15];
• solvability and interpolation of fuzzy functions [17, 16];
164
• criteria of solvability in the case of finite universes;
• approximate solvability in different approximating spaces and with respect to different criteria
[17, 16];
• approximate solvability and approximation of fuzzy functions [13, 16, 17, 20];
• approximate solvability in special metric spaces induced by t-norm.
For this publication we have chosen only new results recently established by the author.
1.1
Basic algebra of logic operations
We choose a BL-algebra (BL stands for basic fuzzy logic) as a basic algebra of operations. In a
certain sense, the BL-algebra generalizes boolean one and occurs when the conjunction is split in two
different operations: a pure lattice operation and the other monoidal one (called multiplication) which
a pseudo-inverse. The following definition summarizes definitions originally introduced in [9].
Definition 1. A BL-algebra is an algebra
L = hL, ∨, ∧, ∗, →, 0, 1i
(1)
with four binary operations and two constants such that
(i) (L, ∨, ∧, 0, 1) is a lattice with 0 and 1 as the least and greatest elements w.r.t. the lattice ordering,
(ii) (L, ∗, 1) is a commutative semigroup with unit 1, such that the multiplication ∗ is associative,
commutative and 1 ∗ x = x for all x ∈ L,
(iii) ∗ and → form an adjoint pair, i.e.
z ≤ (x → y) iff x ∗ z ≤ y for all x, y, z ∈ L,
(iv) and moreover, for all x, y ∈ L
x ∗(x → y) = x ∧ y,
(x → y) ∨ (y → x) = 1.
The well known examples of BL-algebra are Gødel, Łukasiewicz and product algebras.
Another binary operation ↔ of L can be defined by:
x ↔ y = (x → y) ∧ (y → x).
The following properties will be used in the sequel:
x≤y
x↔y=1
iff (x → y) = 1,
iff x = y.
Note that, in particular, if L = [0, 1] then ∗ is a t-norm.
From now and until the end of this paper, we fix some complete BL-algebra L with a support L.
165
1.2
Fuzzy sets and fuzzy relations
We accept here a mathematical definition of a fuzzy set. Let X be a non-empty set. Then a fuzzy set
or better, a fuzzy subset of X is identified with a function A : X −→ L. This function is known as a
membership function of fuzzy set A. The set of all fuzzy subsets of X is denoted by F (X), so that we
can write
F (X) = {A : X −→ L} = LX .
For two fuzzy sets A, B ∈ F (X) we let
A=B
iff (∀x)A(x) = B(x)
and
A ≤ B iff
(∀x)A(x) ≤ B(x).
A fuzzy set A ∈ F (X) is called normal if A(x0 ) = 1 holds for some x0 ∈ X. The algebra of
operations over fuzzy subsets of X is introduced as the induced BL-algebra on LX . This means that
each operation from L is the operation on LX taken pointwise. For example, the ∗-operation between
fuzzy sets A and B is defined by
(A ∗ B)(x) = A(x) ∗ B(x).
The operations over fuzzy subsets fulfill the same properties as the corresponding operations in the
respective BL-algebra.
Let X and Y be two universes, not necessary different. A (binary) fuzzy relation on X × Y is a
fuzzy subset of this set, i.e. a function R : X × Y −→ L. The set of all fuzzy relations on X × Y is
denoted by F (X × Y). An n-ary fuzzy relation can be introduced analogously.
If R ∈ F (X × Y) and S ∈ F (Y × Z) then the fuzzy relation T on X × Z
T (x, z) =
_
y∈Y
R(x, y) ∗ S(y, z)
is called a composition (or sup −∗-composition) of R and S and denoted by
T = R ◦ S.
In particular, if A is a unary fuzzy relation on X or a fuzzy subset of X then sup −∗-composition
between A and R ∈ F (X × Y) is defined by
B(y) =
_
x∈X
A(x) ∗ R(x, y),
so that B = A ◦ R and B ∈ F (Y).
1.3
Fuzzy equivalence and fuzzy points
Fuzzy equivalence is a special fuzzy relation on a universe X which, analogously as the classical
equivalence fulfills the properties of reflexivity, symmetry and transitivity, but with the generalized
meaning. Namely, we say that E : X × X −→ L is a fuzzy equivalence on X if
E(x, x) = 1,
E(x, y) = E(y, x),
E(x, y) ∗ E(y, z) ≤ E(x, z)
166
holds true for all x, y, z ∈ X.
Suppose that some fuzzy equivalence E on X is given. Then we may fix one argument x = x0 and
consider the function A(x) = E(x0 , x) which determines a normal fuzzy subset of X. We say that the
fuzzy subset of this type is a fuzzy point of X with respect to x0 and fuzzy equivalence E.
It is not difficult to show that each normal fuzzy subset A of X, such that A(x0 ) = 1, can be
considered as a fuzzy point with respect to x0 and special fuzzy equivalence E given by
E(x, y) = A(x) ↔ A(y).
The situation is more difficult if we have a collection of normal fuzzy subsets of X. The following
theorem has been proved in [11].
Theorem 2. Let Ai , i ∈ I, be a family of normal fuzzy subsets of X, such that there exist xi ∈ X which
make true the following: Ai (xi ) = 1. Then the following two statements are equivalent
• there exists a fuzzy equivalence E on X, such that all fuzzy sets Ai are fuzzy points with respect
to xi and E, i.e.
Ai (x) = E(xi , x)
(2)
• for all i, j ∈ I
_
x∈X
(Ai (x) ∗ A j (x)) ≤
^
(Ai (y) ↔ A j (y))
(3)
y∈X
holds.
Remark 3. From the proof of this theorem it follows that
• if (3) is true then each fuzzy set Ai from the above given family is a fuzzy point with respect to
xi and fuzzy equivalence Ê given by
Ê(x, y) =
^
i∈I
(Ai (x) ↔ Ai (y)).
(4)
• if each fuzzy set Ai from the above given family is a fuzzy point with respect to xi and some
fuzzy equivalence E then it is a fuzzy point with respect to xi and fuzzy equivalence Ê.
The following lemma can be proved as a corollary of Theorem 2.
Lemma 4. Let Ai , i ∈ I, be a family of normal fuzzy subsets of X, such that there exist xi ∈ X which
make true the following: Ai (xi ) = 1. Moreover, let inequality (3) hold true. Then inequality (3) turns
to the equality
_
(Ai (x) ∗ A j (x)) =
x∈X
^
(Ai (y) ↔ A j (y))
y∈X
=Ê(xi , x j )
(5)
where i, j ∈ I and Ê(x, y) is given by (4).
Corollary 5. Let the conditions of Lemma 4 be fulfilled. Then inequality (3) turns to the equality
_
x∈X
(Ai (x) ∗ A j (x)) =
^
(Ai (y) ↔ A j (y)) =
y∈X
= E(xi , x j )
(6)
where i, j ∈ I and E(x, y) is any fuzzy equivalence which makes all fuzzy subsets Ai to be fuzzy points
with respect to it and xi .
167
1.4
System of fuzzy relation equations
Let X and Y be two universes, not necessary different. A system of fuzzy relation equations
Ai ◦ R = Bi ,
1 ≤ i ≤ n,
(7)
where Ai ∈ F (X), Bi ∈ F (Y) and R ∈ F (X × Y) and ‘◦’ is the sup-*-composition, is considered with
respect to unknown fuzzy relation R.
Since in general, solution of (7) may not exist, the investigation of necessary and sufficient, or
also of only sufficient conditions for solvability becomes necessary. This problem has been widely
studied in the literature, and some nice theoretical results have been obtained. Let us point out some
of them: [19], [18], [4] with necessary and sufficient conditions, [5], [10] with sufficient conditions.
All of these results have practical importance only in the case when universes of discourse X and
Y are finite. If these universes are infinite, then the complexity of verification of these conditions is
comparable with the direct checking of solvability. Therefore, the problem of discovering easy to
check solvability conditions or criteria is still actual. This paper is a contribution to this topic.
We recall basic facts concerning solvability of system (7) of fuzzy relation equations
Ai ◦ R = Bi ,
1 ≤ i ≤ n,
where Ai ∈ F (X), Bi ∈ F (Y) and R ∈ F (X × Y).
• If system (7) with respect to unknown fuzzy relation R is solvable then relation
R̂(x, y) =
n
^
(Ai (x) → Bi (y))
(8)
i=1
is the greatest solution to (7) (see [19]).
• Let fuzzy sets Ai ∈ F (X) and Bi ∈ F (Y), 1 ≤ i ≤ n, be normal. Then fuzzy relation
Ř(x, y) =
n
_
i=1
(Ai (x) ∗ Bi (y))
(9)
is a solution to (7) if and only if for all i, j = 1, . . . , n
_
(Ai (x) ∗ A j (x)) ≤
x∈X
^
(Bi (y) ↔ B j (y))
(10)
y∈Y
holds (see [10]).
It is worth notice that fuzzy relation Ř is known in literature as Mamdani relation.
2
Sufficient conditions of solvability
As mentioned above, a system of fuzzy relation equations arises on the way of formalization of a set of
fuzzy IF–THEN rules. In fact, a fuzzy relation R which solves the system of fuzzy relation equations
in the form (7) describes a certain dependence between variables x ∈ X and y ∈ Y. If the variable x is
168
furthermore specified by some value expressed by a fuzzy set A ∈ F (X) then the respective (fuzzy)
value of variable y can be computed by taking the sup-*-composition
B = A ◦ R.
(11)
This procedure is used as an interpretation of so the called Generalized Modus Ponens inference rule
in the fuzzy logic in broader sense.
Keeping in mind the computation of sup-*-composition (11), in which R is replaced by a solution
to system (7), we may argue that fuzzy relation Ř requires less computations that fuzzy relation R̂.
Therefore, the conditions which guarantee that Ř is a solution to (7) are more important than conditions of general solvability. On the other hand, these conditions are sufficient with respect to general
solvability of (7).
Therefore, we focus in this section on conditions ensuring that Ř is a solution to (7). Of course, the
inequality (10) is the first representative of such conditions. The next theorem proved in [1], presents
the equivalence between (10) and another inequality, which can be used as the second condition of
this type.
Theorem 6. The inequality (10) is equivalent with
Ř ≤ R̂.
(12)
The following corollary immediately follows from Theorem 6 and Klawonn’s condition of solvability.
Corollary 7. Let fuzzy sets Ai ∈ F (X) and Bi ∈ F (Y), 1 ≤ i ≤ n, be normal. Then the fuzzy relation
Ř in (9) is a solution to (7) if and only if Ř ≤ R̂.
Remark 8. If the fuzzy relation Ř is a solution to (7) then the system (7) is solvable. Therefore, the
condition (12) is a sufficient condition for the solvability of the system (7), provided that fuzzy sets
Ai ∈ F (X) and Bi ∈ F (Y) are normal.
Let us investigate a special situation when fuzzy sets Ai ∈ F (X) and Bi ∈ F (Y) are fuzzy points
with respect to fuzzy equivalences E on X and F on Y. The following nice (and easy to check)
criterion of solvability of (7) by fuzzy relation Ř summarizes almost all the facts discussed above.
Theorem 9. Let fuzzy sets Ai ∈ F (X) and Bi ∈ F (Y), 1 ≤ i ≤ n, be normal, so that there exist xi ∈ X
and yi ∈ Y which make true the following: Ai (xi ) = 1, Bi (yi ) = 1. Further, let fuzzy equivalence E on
X and fuzzy equivalence F on Y exist so that all the fuzzy sets Ai are fuzzy points with respect to xi
and E, and all the fuzzy sets Bi are fuzzy points with respect to yi and F, i.e.
(∀x)Ai (x) = E(xi , x)
(13)
(∀y)Bi (y) = F(yi , y).
(14)
and
Then the fuzzy relation Ř in (9) is a solution to (7) if and only if
(∀i)(∀ j)Ai (x j ) ≤ Bi (y j ).
(15)
We can again remark that condition (15) and the assumptions of Theorem 9 give easy to check
sufficient condition of solvability of system (7).
169
3
One useful necessary condition of solvability
Necessary conditions are very useful in verifying the solvability in general. When they are not fulfilled, the system cannot be solvable. We will suggest hear one condition which has easy to understand
interpretation.
Theorem 10. If the system (7) is solvable then for arbitrary i, j ∈ {1, . . . , n}
^
(Ai (x) ↔ A j (x)) ≤
x∈X
^
(Bi (y) ↔ B j (y)).
(16)
y∈Y
The interpretation of the condition (16) is such that the sets Ai , A j cannot be closer than their
respective counterparts Bi and B j .
4
A new criterion of solvability
In this section we prove even more: the condition (15) is the necessary and sufficient condition for the
solvability of system (7) provided that (13) is fulfilled.
Theorem 11. Let the conditions of Theorem 9 be fulfilled. Then (15) is the necessary and sufficient
condition of the general solvability of system (7).
5
Fuzzy function. Interpolation of a fuzzy function
We will introduce the problem of solvability of fuzzy relation equations in a new framework as the
problem of interpolation and approximation of a fuzzy function.
Our idea is to introduce a fuzzy function as a mapping between two universes F (X) and F (Y) of
fuzzy sets, so that it maps uniquely a fuzzy “point” from one universe to the respective fuzzy “point”
from the other universe. Trying to be as much as possible close to the classical case we give the
following definition (see also Perfilieva & Gottwald [17]).
Definition 12. Let F (X), F (Y) be the classes of all fuzzy subsets on the universes of discourse X and
Y. A mapping f from F (X) into F (Y) is called a fuzzy function if for any fuzzy subsets A, A′ ∈ F (X)
and for fuzzy subsets B, B′ ∈ F (Y) which are f -related with A, A′ , respectively,
A = A′ ⇒ B = B′ .
(17)
holds true.
Example 13. Any fuzzy relation R ∈ F (X × Y) determines via sup-*-composition a fuzzy function,
defined as the mapping fR from F (X) to F (Y) which is described by
fR (A)(y) = (A ◦ R)(y) =
_
(A(x) ∗ R(x, y)).
x∈X
In this example, the fuzzy set fR (A) = A ◦ R is the value of fuzzy function fR determined by R in
the “fuzzy point” determined by A.
170
Remark 14. As mentioned in Introduction, there is another approach to the notion of a fuzzy function
shared by the authors [9, 10]. According to their approach, a fuzzy function is a special kind of a
fuzzy relation — which “respects” two given similarities on the universes of discourse. The “fuzzy”
constituent in their definitions refers to the uniqueness property, so that they define what may be called
a “blurred” mapping. Moreover, they clearly distinguish between partial and total fuzzy function.
Contrary to the definitions cited above, we stress that a fuzzy function is a (ordinary) mapping
between two universes of fuzzy sets, so that it maps uniquely a fuzzy “point” from one universe to
the respective fuzzy “point” from the other universe. In our opinion, it is not necessary to indicate in
the general definition of a function whether it is partially defined or not. It is reasonable to stress this
characteristics when we speak, for example about the problem of interpolation. (Below, we formulate
this problem and discuss methods of its solution.) However, in general we suppose that a fuzzy
function is defined on the whole universe F (X).
The definition of a (fuzzy) function, in general, does not provide us with a constructive way of its
representation (except for finite F (X)). Therefore, the problem of representation of a function is of a
primary importance. By this we mean, that having a function as a mapping, we want to find a formula
which represents this mapping. However, in practice we know a mapping (between infinite or large
universes) only partially, as a finite set of couples and therefore, the problem of representation may
be solved also partially. There are two possible approaches to obtain a formulation of, say, partial
representation problem: one leads to the interpolation and the other one — to the approximation of a
function. We give formulations of both problems in fuzzy setting and then discuss the specificity of
these problems in the case when fuzzy function is determined by a fuzzy relation.
Definition 15. Let a list of original data consisting of ordered pairs of fuzzy sets (Ai , Bi ) where Ai ∈
F (X), Bi ∈ F (Y), i = 1, . . . , n, be given. A fuzzy function f defined on F (X) interpolates these data
if
f (Ai ) = Bi ,
i = 1, . . . , n.
(18)
We will also call f an interpolating fuzzy function.
Very often, the above defined interpolation problem appears in the literature as a problem of
finding a fuzzy relation partially described by a list of fuzzy IF–THEN rules
IF x is Ai THEN y is Bi ,
i = 1, . . . , n,
where Ai ∈ F (X), Bi ∈ F (Y). The natural requirement for such a fuzzy relation is that it should
“agree” with the original data. This means in our terminology that the required fuzzy relation determines the fuzzy function which interpolates the given data (the details are below in Lemma 16).
As an important remark, we point out that interpolation of a fuzzy function may not exist; if it
exists, it need not be unique. In the latter case, this is the reason why the interpolation problem in
classical mathematics is solved in a predetermined class of (interpolating) functions, for example in
the class of polynomials.
We consider a solution to the fuzzy interpolation problem in the class of fuzzy functions represented by fuzzy relations. It is easy to see that there is a close relation between the existence of an
interpolation function and the solvability of the respective system of fuzzy relation equations.
Lemma 16. Let ordered pairs of fuzzy sets (Ai , Bi ) be given where Ai ∈ F (X), Bi ∈ F (Y), i = 1, . . . , n.
A fuzzy relation R determines an interpolating fuzzy function with respect to the given data (Ai , Bi ),
i = 1, . . . , n, if and only if R is a solution of the corresponding system (7) of relation equations.
171
Proof. Obvious.
As a consequence of this statement, we can assert that not every fuzzy function can be determined
by the respective fuzzy relation. This is due to the fact that not every system of fuzzy relation equations
is solvable.
6
Approximation of a fuzzy function. Approximate solutions to a system of fuzzy relation equations and their approximation quality
The problem of approximation of a partially given fuzzy function arises when we want to complete
partially given mapping, but we do not insist on a precise agreement with the given data. The other
reason to consider approximation is that the interpolation problem may not be solvable in the chosen
class of interpolating functions. For example, if interpolating fuzzy functions are those which are
determined by fuzzy relations then the interpolation problem is equivalent to the existence of a solution
to system (7). Because the latter may not be solvable, this implies that there exist fuzzy data (Ai , Bi ),
i = 1, . . . , n, which cannot be “joined” by any fuzzy relation. In this situation we may weaken the
interpolation problem and consider the problem of approximation. We start with a rough formulation
of this problem and then, after explanation of details, give a precise formulation.
Given fuzzy data (Ai , Bi ) where Ai ∈ F (X), Bi ∈ F (Y), i = 1, . . . , n, find a fuzzy function, determined by a fuzzy relation which gives an approximate solution to system (7).
By this formulation, we reduce the problem of finding of an approximating fuzzy function to
the problem of finding an approximate solution to system (7). The latter will be the core of our
investigation in the rest of this paper. However, it requires further specification. Two things have to
be specified: an approximating space and a quality of approximation. Below we will introduce three
different approximating spaces and different qualities of approximation in them.
1. The widest approximating space consists of all fuzzy relations on X × Y
R = {R | R ∈ F (X × Y)}.
(19)
However, we will not deal with this space in this paper, because it is too wide to find an optimal
approximation in it.
We will consider two other, more restrictive approximation spaces which are subspaces of R
(Perfilieva & Gottwald [17]). Unlike R , they are determined by parameters Ai , Bi of system (7).
2. The space of lower approximations
Rl = {R ∈ F (X × Y) | Ai ◦ R ≤ Bi , 1 ≤ i ≤ n}
(20)
consists of those relations which make compositions lower than the intended right hand sides.
3. The space of upper approximations
Ru = {R ∈ F (X × Y) | Ai ◦ R ≥ Bi , 1 ≤ i ≤ n}.
(21)
consists of those relations which make compositions greater than the intended right hand sides.
172
An evaluation of a quality of approximation in R stems from a comparison of the intended values
Bi and those ones determined by the composition R ∈ R and Ai , i.e. from a value (Gottwald [6])
δ(R) =
n ^
^
i=1 y∈Y
(Bi (y) ↔ (Ai ◦ R)(y)).
(22)
Being equipped with the evaluation δ(R) of a quality of approximation we may compare two
different approximate solutions, saying that R′ ∈ R is better than R′′ ∈ R if and only if its solution
degree is higher; formally
R′ ≤δ R′′ iff δ(R′′ ) ≤ δ(R′ ).
(23)
The same index δ(R) may serve as a quality of approximation in two other spaces Rl and Ru .
It is easy to see that with help of δ(R) we have introduced a preorder ≤δ (i.e. reflexive and
transitive binary relation) on each of the approximation spaces R , Rl and Ru .
Though a quality of approximation in Rl and Ru may be estimated by δ(R), we will also use
another, non-numeric estimation according to the following preorders ≤l on Rl
R′ ≤l R′′
iff R′ , R′′ ∈ Rl
and
Ai ◦ R′′ ≤ Ai ◦ R′ ,
1 ≤ i ≤ n,
(24)
R′ ≤u R′′
iff R′ , R′′ ∈ Ru
and
Ai ◦ R′ ≤ Ai ◦ R′′ ,
1 ≤ i ≤ n.
(25)
and ≤u on Ru
Let us remark that in the literature on fuzzy relation equations, the preorder ≤l has been implicitly
used in Wu [20] and later on in Klir & Yuan [13] for estimation of approximation quality in Rl .
7
Optimal approximations
In a certain sense, any element from an approximating space can be taken as an approximate solution
so that the respective quality of approximation can be computed. However, we would prefer to have an
approximate solution with the best possible quality of approximation. This leads us to the following
definitions (cf. Perfilieva & Gottwald [17]).
Definition 17. A fuzzy relation Ropt is a best approximate solution to system (7) in the approximation
space R (Rl or Ru ) with respect to the quality δ(R) if
δ(Ropt ) = sup δ(R)
(26)
R∈R
(δ(Ropt ) = sup δ(R) or
R∈Rl
δ(Ropt ) = sup δ(R)).
(27)
R∈Ru
In the approximation spaces Rl and Ru , we may also define best approximation with respect to
preorders ≤l and ≤u .
Definition 18.
• Rlopt ∈ Rl is a best approximate solution to system (7) w.r.t. ≤l if there is no
fuzzy relation R ∈ Rl such that R ≤l Rlopt and Ai ◦ R 6= Ai ◦ Rlopt for at least one i ∈ {1, . . . , n}.
173
• Ruopt ∈ Ru is a best approximate solution to system (7) w.r.t. ≤u if there is no fuzzy relation
R ∈ Ru such that R ≤u Ruopt and Ai ◦ R 6= Ai ◦ Ruopt for at least one i ∈ {1, . . . , n}.
As we will see later, a best approximate solution to system (7) in the approximating space Rl w.r.t.
≤l maximizes forms Ai ◦ R, i = 1, . . . , n (see Theorem 21), and a best approximate solution to system (7) in the approximating space Ru w.r.t. ≤u minimizes forms Ai ◦ R, i = 1, . . . , n (see Theorem 27).
As a consequence of this, a best approximate solution to system (7) in Rl or Ru with respect to
above introduced approximation qualities if it exists, may not be unique. In Subsection 10 we will see
where it may happen. Therefore, in those particular cases we will take into consideration additional
characteristics of approximate solutions.
Our next goal is to show that pseudo-solutions R̂ and Ř are the best approximate solutions to
system (7) in the spaces Rl , Ru with respect to the introduced preorders.
For the pseudo-solution R̂, an optimality in the approximation space Rl and a preorder similar to
(24), has been proved in [20, 13]. Below, we will prove a more rigid result.
8
Optimality of pseudo-solution R̂
We will show that R̂ is a best approximate solution to system (7) in the approximation space Rl with
respect to both preorders ≤l and ≤δ(R) . Moreover, R̂ is the greatest element in this space with respect
to the ordinary ordering ≤ between fuzzy sets.
Lemma 19. If the system (7) is unsolvable then the fuzzy relation R̂ is the greatest element in the
approximation space Rl w.r.t. the ordinary ordering ≤.
8.1
Optimality of R̂ with respect to the preorder ≤l
In the theorem given below, we prove the first of the best approximation results about R̂ in Rl with
respect to ≤l .
Theorem 20. Let the system (7) be unsolvable. Then the fuzzy relation
R̂(x, y) =
n
^
i=1
(Ai (x) → Bi (y))
is a best approximate solution to system (7) in the space Rl under the preorder ≤l (cf. (24)).
The following simple theorem shows even more. If the original system (7) is unsolvable then the
first solvable system (when decreasing the right hand sides of (7)) is the system with Bi replaced by
Ai ◦ R̂.
Theorem 21. Let system (7) be unsolvable and fuzzy sets Ci ∈ F (Y) fulfill the inequalities
Ci ≤ Bi ,
i = 1, . . . , n.
Then if the system
is solvable then
where B̂i = Ai ◦ R̂.
Ai ◦ R = Ci ,
Ci ≤ B̂i ,
i = 1, . . . , n.
i = 1, . . . , n,
174
8.2
Optimality of R̂ with respect to the preorder ≤δ
The theorem below contains the second of the best approximation results about R̂ in Rl with respect
to ≤δ .
Theorem 22. Let system (7) be unsolvable. Then the fuzzy relation
R̂(x, y) =
n
^
i=1
(Ai (x) → Bi (y))
is a best approximate solution to system (7) in Rl with respect to the approximation quality δ(R) (cf.
(22)).
9
Optimality of pseudo-solution Ř
The relation Ř given by (9) is not an optimal approximate solution to system (7) in the space Ru either
with respect to the preorder ≤u or with respect to the quality δ(R). This result has been proved in
[17]. However, we will obtain the optimality of Ř in both cases for special systems of fuzzy relation
equations, such that they are solvable if and only if when they are Ř-solvable.
9.1
Solvability and Ř-solvability
We put restrictions on fuzzy sets A1 , . . . , An ∈ F (X) assuming that they are normal and form a semipartition of X. For this, we recall the definition of a semi-partition (see [3]).
Definition 23. Normal fuzzy sets A1 , . . . , An ∈ F (X) form a semi-partition of X if
(∀i)(∀ j)
_
x∈X
(Ai (x) ∗ A j (x)) ≤
^
!
(Ai (x) ↔ A j (x)) .
x∈X
(28)
Throughout this section we will suppose that fuzzy sets A1 , . . . , An ∈ F (X) in system (7) are
normal and form a semi-partition of X.
Definition 24. We say that system (7) of fuzzy relation equations is Ř-solvable if its pseudo-solution
Ř given by (9) is a solution to this system. We also denote
B̌i (y) = (Ai ◦ Ř)(y),
1 ≤ i ≤ n.
(29)
Although solvability and Ř-solvability of system (7) are not in general equivalent, this is true under
the accepted assumption about semi-partitioning of X. The theorem given below proves this fact.
Theorem 25. Let fuzzy sets A1 , . . . , An ∈ F (X) be normal and form a semi-partition of X. Then system
(7) is solvable if and only if it is Ř-solvable.
175
9.2
Optimality of Ř with respect to the preorder ≤u
For systems of fuzzy relation equations whose parameters Ai , 1 ≤ i ≤ n, form a semi-partition of X,
we will prove the optimality of Ř in Ru with respect to the preorder ≤u , and with respect to ≤δ in the
next subsection.
Theorem 26. Let system (7) be unsolvable and fuzzy sets Ai , 1 ≤ i ≤ n, be normal and form a semipartition of X. Then the fuzzy relation
Ř(x, y) =
n
_
(Ai (x) ∗ Bi (y))
i=1
is a best approximate solution to system (7) in the space Ru with respect to the preorder ≤u (cf. (25)).
The following theorem shows that if the original system (7) is unsolvable then the first solvable
system (when increasing the right hand sides of (7)) is the system with Bi replaced by B̌i .
Theorem 27. Let the conditions of Theorem 26 be fulfilled and fuzzy sets Ci ∈ F (Y) be such that
Ci ≥ Bi ,
i = 1, . . . , n.
Then if the system
Ai ◦ R = Ci ,
i = 1, . . . , n.
is solvable then
Ci ≥ B̌i ,
i = 1, . . . , n,
where B̌i = Ai ◦ Ř.
9.3
Optimality of Ř with respect to the preorder ≤δ
As the last result of this section, we will prove that Ř(x, y) is an optimal solution to system (7) with
respect to ≤δ too.
Theorem 28. Let the conditions of Theorem 26 be satisfied. Then fuzzy relation Ř(x, y) is a best
approximate solution to system (7) in Ru with respect to the approximation quality δ(R).
10
Optimality of other pseudo-solutions
Though we introduced various approximation spaces, only two representatives, i.e. R̂ and Ř have been
considered as their members. We have introduced in [8] another candidate for optimal approximation
— the iterated relation
ˇ y) = _ (A (x) ∗ B̂ (y)) = _ (A (x) ∗ _ (A (x) ∗ ^ (A (x) → B (y)))).
R̂(x,
j
j
i
i
i
i
n
n
n
i=1
i=1
x∈X
j=1
As before, we use the notation
B̂i (y)) = (Ai ◦ R̂)(y) =
_
x∈X
(Ai (x) ∗
176
n
^
j=1
(A j (x) → B j (y))).
The idea lying in the construction of R̂ˇ is to replace Bi s in the relation Ř by Ai ◦ R̂ (which are smaller)
and by this, create a new relation which is smaller than Ř. Actually,
R̂ˇ ≤ Ř
and, as shown in [8],
Ai ◦ R̂ ≤ Ai ◦ R̂ˇ ≤ Ai ◦ Ř.
Therefore, the optimality of R̂ˇ is expected, and this is proved in the theorem below.
Theorem 29. Let system (7) be not solvable and suppose that the system
Ai ◦ R = B̂i
(30)
is Ř-solvable. Then the iterated relation R̂ˇ is a best approximate solution to (7) in Rl with respect to
the preorder ≤l as well as with respect to the quality δ(R).
Remark 30.
• It follows from Theorem 29 that there are at least two best approximate solutions
to (7) in Rl , both with respect to the preorder ≤l as well as to the quality δ(R).
The non-uniqueness of a best approximation is a consequence of the fact that the solvability of
(7) is not equivalent to the existence of exactly one solution. Let us explain this claim in more
details.
Our optimality criteria have been chosen in such a way that they measure a deviation from the
original right-hand side of system (7). Therefore, if some approximate solution R̃ is optimal then
any other fuzzy relation which solves (7) with the same right-hand side as R̃ does, is optimal as
well.
• If we want to distinguish various best approximations more subtly, we should specify fuzzy relations (solutions) according to their additional properties. For example, the approximate solution
R̂ is the greatest element in Rl (with respect to the ordinary ordering), and this distinguishes it
among other (best) approximate solutions.
• We conlucde from Theorems 22, 28, 29 that δ(R) can be taken as a universal measure of approximation quality in the approximation spaces Rl and Ru .
11
Optimality under the stronger criterion
Let us summarize the above used methodology for construction of approximate solutions to system
(7). We replaced the right-hand sides of equations in (7) by those which guarantee the solvability
and took the guaranteed solution as the approximate one. Then we have noticed that the guaranteed
solutions composed with the fixed left-hand sides of equations in (7) produced either lower or upper
approximations of the given right-hand sides. This observation led us to the introduction of two
approximating spaces consisting of those fuzzy relations which, when composed with the fixed lefthand sides, produce various lower or upper approximations of the given right-hand sides. In each
approximating space the respective guaranteed solution was among the best approximate solutions to
system (7).
In this section, we will extend the approximating space by fuzzy relations which, when composed
with fuzzy sets greater than the given left-hand sides of equations in (7), produce smaller right-hand
177
sides than the given ones. We will show that in such extended space the known fuzzy relation R̂ is
again among the best approximate solutions with respect to the below introduced preorder ≤γ .
Suppose as before that system (7) is not solvable and introduce the approximating space
Rlr = {R ∈ F (X × Y) | Di ◦ R = Ci , 1 ≤ i ≤ n,
for some D1 , . . . , Dn ∈ F (X),C1 , . . . ,Cn ∈ F (Y) such that
Ai ≤ Di ,Ci ≤ Bi } (31)
and the following quality of approximation
γ(R) =
n
^
i=1
^
(Bi (y) ↔ (Ai ◦ R)(y))∧
y∈Y
∧
^
(Ai (x) ↔
x∈X
^
y∈Y
!
(R(x, y) → Bi (y))) . (32)
The second term in (32) arises from the expression in (??) which gives the maximal solution to (7)
with respect to unknown Ai .
We can compare different relations saying that R′ ∈ Rlr is better than R′′ ∈ Rlr if and only if its
γ-quality γ(R′ ) is higher. Formally:
R′ ≤γ R′′
iff γ(R′′ ) ≤ γ(R′ ).
(33)
Moreover, we can define an optimal approximation as follows.
Definition 31. A fuzzy relation Ropt is a best approximate solution to system (7) in the approximation
space Rlr with respect to the quality γ(R) if
γ(Ropt ) = sup γ(R).
(34)
R∈Rlr
The following theorem shows that the relation R̂ is again a best one with respect to the quality
γ(R).
Theorem 32. Let system (7) be not solvable. Then the set Rlr is non-empty and fuzzy relation R̂ is a
best approximate solution in the set Rlr with respect to the quality γ(R).
Corollary 33. The fuzzy relation R̂ is the largest approximate solution in Rlr with respect to the
ordinal ordering ≤.
12
Concluding remarks
Most of the known results about solvability of systems of fuzzy relation equations have practical
importance only in the case when universes of discourse X and Y are finite. In case when these
universes are infinite, the complexity of verifying theoretical conditions is comparable with a direct
checking of a solvability. Therefore, the problem of discovering easy to check conditions or criteria
is still actual. This paper is (among others) a contribution to this topic.
178
A number of new criteria of the so called Mamdani relation to be a solution to the system is
suggested. At the same time, these criteria are sufficient conditions for solvability of the system in
general. A new, easy to check criterion of a solvability of the system with special fuzzy parameters is
found.
With the notion of a fuzzy function as a mapping between universes of fuzzy sets we threw a new
light on the problem of solvability and approximate solvability. In this setting, precise and approximate solutions to a system of fuzzy relation equations are considered as the interpolating and approximating fuzzy functions with respect to the given data. We concentrated on a problem of approximate
solvability of a system of fuzzy relation equations. Different approximating spaces and different criteria of approximation have been introduced. We have proved that the widely known fuzzy relations
introduced by E. Sanchez and E. H. Mamdani are the best approximations in the respective spaces and
under the respective criteria.
References
[1] De Baets B., A note on Mamdani controllers, in: Proc. 2nd Int. Workshop on Fuzzy Logic and
Intel. Techn. in Nuclear Science, FLINS 1996, World Scientific Publ., Singapore, 22–28, 1996.
[2] De Baets B., Analytical Solution Methods for Fuzzy Relation Equations, Fundamentals of Fuzzy
Sets, The Handbooks of Fuzzy Sets Series (D. Dubois and H. Prade, eds.), 1, Kluwer Academic
Publishers, 2000, 291-340.
[3] B. De Baets, R. Mesiar, T-partitions, Fuzzy Sets Systems, 97 (1998) 211–223.
[4] Gavalec M., Solvability and Unique Solvability of max-min Fuzzy Equations, Fuzzy Sets Systems, 124, 385–394, 2001.
[5] Gottwald S., Fuzzy Sets and Fuzzy Logic. The Foundations of Application – from a Mathematical
Point of View. Vieweg: Braunschweig/Wiesbaden and Teknea. Toulouse, 1993.
[6] S. Gottwald, Generalised solvability behaviour for systems of fuzzy equations, in: V. Novák,
I. Perfilieva (Eds.), Discovering the World with Fuzzy Logic, Advances in Soft Computing,
Physica-Verlag: Heidelberg, 2000, 401–430.
[7] Gottwald S., V. Novak, I. Perfilieva(2002) : Fuzzy control and pseudo-solutions of fuzzy relation
equations. Proc. East-West Fuzzy Colloquium 2002, 10th Zittau Fuzzy Coll., Sept., 4-6, Germ.,
12-18.
[8] S. Gottwald, V. Novák, I. Perfilieva, Fuzzy control and t-norm-based fuzzy logic. Some recent
results, in: Proc. 9th Internat. Conf. IPMU’2002, ESIA – Universit’e de Savoie, Annecy, 2002,
1087–1094.
[9] Hájek P., Metamathematics of fuzzy logic, Kluwer, Dordrecht, 1998.
[10] Klawonn F., Fuzzy points, fuzzy relations and fuzzy functions, in: Discovering the World with
Fuzzy Logic, (V. Novák, I. Perfilieva eds.) Advances in Soft Computing, Physica-Verlag: Heidelberg, 431–453, 2000.
[11] Kruse R., Gebhart J., Klawonn F., Fuzzy-Systeme, B.E. Teubner, Stuttgart, 1993.
179
[12] Mamdani A., Assilian S., An experiment in linguistic synthesis with a fuzzy logic controller,
Internat. J. Man-Machine Studies, 7, 1–13, 1975.
[13] G. Klir, B. Yuan, Fuzzy Sets and Fuzzy Logic, Theory and Applications, Prentice Hall: Upper
Saddle River, 1995.
[14] Novák, V., Perfilieva, I., Močkoř, J., Mathematical Principles of Fuzzy Logic. Kluwer Acad.
Publ., Boston, 1999.
[15] Perfilieva I., Solvability of a System of Fuzzy Relation Equations: Easy to Check Conditions,
Neural Network World, 13(5), 571–580.
[16] Perfilieva I., Fuzzy Function As an Approximate Solution to a System Of Fuzzy Relation Equations, Fuzzy Sets Systems, to appear.
[17] Perfilieva I., S. Gottwald(2003): Fuzzy function as a solution to a system of fuzzy relation
equations, Int. J. of General Systems, 2003, Vol.32 (4), 361– 372.
[18] Perfilieva I., Tonis A., Compatibility of systems of fuzzy relation equations, Internat. J. General
Systems, 29, 511–528, 2000.
[19] Sanchez E., Resolution of composite fuzzy relation equations, Information and Control, 30, 38–
48, 1976.
[20] W. Wu, Fuzzy reasoning and fuzzy relation equations, Fuzzy Sets Systems, 20 (1986) 67–78.
180
Point-set lattice-theoretic (poslat) topology:
a (partly) categorical perspective
S TEPHEN E. RODABAUGH
Department of Mathematics and Statistics
Youngstown State University
Youngstown, OH 44555-3609, USA
E-mail: r♦❞❛❜❛✉❣❅❛s✳②s✉✳❡❞✉
Point-set lattice-theoretic (or poslat) topology refers to that sort of topology for which a space, roughly
speaking, is determined from a (carrier) set X, a lattice L of some sort, and an associated topology—
either a family of L-valued mappings on X or an operator on the powerset of all L-valued mappings,
and for which there are appropriate continuous morphisms. Such topology is also called lattice-valued,
many-valued, fuzzy, etc.
For the last 35 years, poslat topology has been intensely developed, aided in significant measure
by the International Seminar on Fuzzy Set Theory, also known as the Linz Seminar. It is our purpose
to outline certain aspects of this poslat topology from a (partly) categorical point of view with the
general goal of identifying some categories which serve as relevant frameworks for poslat topology,
relevant in the sense that these categories are topological and contain important examples.
This goal is pursued by doing the following: sampling well-known lattice-theoretic and ground
categories and overlying fixed-basis and variable-basis categories for poslat topology; discussing their
relationships to point-free categories for topology, Wang’s category for lattice-valued topology, and
Vicker’s category for topological systems arising from domains in computer science; indicating in
what sense these categories are topological; sketching functorial relationships between these categories; and inventoring some important examples of objects and morphisms for poslat topology.
1
1.1
Preliminaries
Lattice-theoretic conditions
The most general lattice structure we will consider is that of a complete quasi-monoidal lattice
(cqml) as defined in [61]: a complete lattice equipped with a binary operation, called a tensor product, which is isotone in both arguments and has the top element as an idempotent. See [23] for
stronger versions of this definition. Many examples of cqml’s are catalogued in [23, 64].
1.2
Lattice-theoretic categories
The category Cqml [23, 61] comprises the class of all cqml’s, together with the class of all mappings
between cqml’s which preserve tensor products, arbitrary joins, and top elements. The dual category
Cqmlop is denoted Loqml and is called the category of localic quasi-monoidal lattices. Most of the
181
lattice-theoretic categories of interest in poslat topology are isomorphic to subcategories of Cqml or
Loqml, including [61] SFrm (semiframes), its dual SLoc (semilocales), Frm (frames), Loc (locales),
Dmrg (complete deMorgan algebras), its dual Dmrgop , Hut (Hutton algebras), and its dual FuzLat,
as well as various categories in which the tensor is not the binary meet.
1.3
Ground categories and powerset operators
1.3.1 Fixed-basis grounds and powerset operators
For the case when the cqml L is fixed, the ground category is Set, with the associated Zadeh powerset
operators fL→ , fL← between LX and LY for a ground morphism f : X → Y [10, 46, 59, 60]. Many
properties and characterizations are known for these Zadeh operators, including that fL→ ⊣ fL← .
1.3.2 Variable-basis grounds and powerset operators
For the case when the cqml L may vary, a subcategory C of Loqml—within which L varies—is fixed
and the ground category is Set × C, with ground morphisms of the form ( f , φ) : (X, L) → (Y, M)
with f : X → Y in Set and φop : L ← M in Cop ⊂ Cqml, and with the associated powerset operators
( f , φ)→ , ( f , φ)← are between LX and MY [10, 54, 55, 56, 59, 60]
Theorem. ( f , φ)→ ⊣ ( f , φ)← if and only if φop preserves arbitrary meets. The consequent holds if: φ ∈
Dmrgop (L, M); φop is a backward Zadeh operator; i.e. ∃ N ∈ |CQML| , ∃ g ∈ Set (W, Z) , φop = g←
N;φ
is any of the examples constructed in 7.1.7.2 of [61] or 9.9(2(b), 3) of [62]; or φ is an isomorphism in
Loqml.
1.4
Adjoint Functor Theorem
Let f : L → M, g : L ← M be isotone maps between preordered sets. Then f ⊣ g provided [∀a ∈ L, a ≤ g ( f (a))]
and [∀b ∈ M, f (g (b)) ≤ b], or equivalently, [∀a ∈ L, b ∈ M, a ≤ g (b) ⇔ f (a) ≤ b]. If f ⊣ g, then we
write g = f ⊢ and f = g⊣ .
Theorem (Adjoint Functor Theorem [26]). Let f : L → M [g : L ← M] be a function such that L
W V
W
[M] has arbitrary [ ] and f [g] preserves arbitrary [M, respectively]. Then f [g] is isotone,
V W
∃ ! f ⊢ : L ← M [g⊣ : L → M], and f ⊢ [g⊣ ] preserves all [ ] existing in M [L].
2
2.1
Categories For Poslat Topological Structures
Some Fixed-Basis Categories
Fixed-basis categories are fixed with respect to the underlying cqml L, but varying with respect to the
underlying ground object (or set).
Fixing L in Cqml, the well-known category L-Top [2, 11, 23, 61] has ground category Set, with
the topology being a crisp subset of the L-powerset closed under (binary) tensor products and arbitrary
182
W
and containing the top L-subset; and the well-known category L-FTop [15, 31, 71, 22, 40, 23] has
ground category Set, with the topology being an L-subset of the L-powerset which assigns as degree
of openness to tensor products the least degree of the tensorands, to arbitrary joins the least degree of
the disjuncts, and to the top L-subset the top element of L. See the analysis of important subcategories
in [23], often using underlying L with richer structure or with additional conditions on the topology
(such as in [42]).
2.2
Some Point-Free Categories
The category Loc may be considered to have ground Setop . Each locale may be regarded as the (sober)
topology of some L-topological space; and if L turns out to be 2 in that statement, the locale is called
spatial [55, 56, 57, 58]. More generally, we may replace Loc with Loqml or C ֒→ Loqml; restated,
each subcategory of Loqml can be viewed as a point-free category of topological structures.
Fixing C a subcategory of Loqml, the category C-HTop [25, 55, 61] has ground category C, with
the topology being a crisp subset of some L in C that is closed under the tensor and arbitrary joins
and containing the top element; the famous definition originally given in [25] used C = FuzLat as the
ground category. Further, the category C-HFTop has ground category C, with the topology being an
L-subset of some L in C which has properties analogous to those of the topologies in L-FTop.
It is our contention that every point-free approach is essentially a variable-basis approach (see
below). We have listed these separately from the variable-basis approaches since, with the exception
of C-HFTop, their origins were independent of, and prior to, variable-basis topology.
2.3
Some Variable-Basis Categories
The underlying set is free to change in fixed-basis topology while the lattice-theoretic base is fixed; and
the underlying set is fixed in point-free topology (as a singleton—see below) while the lattice-theoretic
base is free to change. In variable-basis topology, both the underlying set and the lattice-theoretic base
are free to change.
Fixing C a subcategory of Loqml, the category C-Top [5, 6, 7, 10, 52, 53, 55, 56, 61] has ground
category Set × C, objects being of the form (X, L, τ), with (X, τ) ∈ |L-Top|, and morphisms being of
the form ( f , φ) : (X, L, τ) → (Y, M, σ), with τ ⊃ (( f , φ)← )→ (σ) . Further, the category C-FTop [61] has
ground category Set × C, objects being of the form (X, L, T ), with (X, T ) ∈ |L-FTop|, and morphisms
being of the form ( f , φ) : (X, L, T ) → (Y, M, S ), with T ◦ ( f , φ)← ≥ φop ◦ S on MY .
2.4
Category Of Topological Systems
Topological systems [75] stem from placing domain theory of computer science into a topological
setting [68, 69, 70]. The central idea in topological systems is that of a satisfaction or modeling
relation.
We initially view topological systems as categorically having Set × Loc as ground. The category
TopSys [75] has objects of the form (X, A, |=), with (X, A) ∈ |Set × Loc| and |= ⊂ X × A satisfying:
1. ∀x ∈ X, ∀S ⊂ A, x |=
W
S ⇔ ∃ a ∈ A, x |= a.
2. ∀x ∈ X, ∀ finite S ⊂ A, x |=
V
S ⇔ ∀a ∈ A, x |= a.
183
And morphisms are of the form ( f , φ) : (X, A, |=) → (Y, M, |=), where ∀x ∈ X, ∀ b ∈ B, f (x) |= b ⇔
x |= φop (b). (The same symbol is used for both the domain and codomain satisfaction relations.)
Clearly, TopSys is a variable-basis approach. But we have separately listed this approach for
two reasons: the notion of topological system arose independently of, and subsequent to, variablebasis topology; and the categorical behavior of topological systems is strikingly different than that of
variable-basis topology (see below).
2.5
Category Of Wang Topological Spaces
From [76, 77, 78] comes a schemum of categories not having an obvious ground category. Let
C ֒→ Dmrgop (the original definition requires C = FuzLat).
Given L, M ∈ |C|, a set mapping
′ φ : L → M is an order homomorphism if φ preserves arbitrary
and∀b ∈ M, φ⊢ (b′ ) = φ⊢ (b) (i.e. φ⊢ ∈ Dmrg). The category C-WTop has objects of the form
X,τ →
LX , τ , where X ∈ |Set|, L ∈ |C|, and (X, τ) ∈ |L-Top|, and morphisms
of
the
form
φ
:
L
→
MY , σ , where φ : LX → MY is an order homomorphism and τ ⊃ φ⊢ (σ).
W
As will be seen below, the Wang approach is essentially a point-free approach and is isomorphic
to a subcategory of singleton spaces in C-Top.
3
Topological Categories For Poslat Topological Structures
3.1
Definition Of Topological Categories
The definition of “A is topological w.r.t. category X and functor V ” comes from [1]; see commentary on this definition in [61]. These variations are also useful:
1. A is small topological w.r.t. category X and functor V if the indexing class for V -structured
sources is always a set.
2. A is quasi-topological w.r.t. category X and functor V if the unique existence of the lifted
morphism in the definition of initiality is replaced by existence.
3. A is c.e.m. topological w.r.t. category X and functor V if the V -structured source is collectionwise extremally monomorphic in the language of [49] or a mono-extremal source in the language of [1].
4. A is essentially topological [small toplogical, quasi-topological, c.e.m. topological] w.r.t.
category X and functor V if “unique initial V -lift” is replaced by the condition that initial
V -lifts of the same V -structured source are isomorphic in the appropriate definitions above.
3.2
Examples Of Topological Categories
In the following statements, the functor V is the forgetful functor, such a functor being obvious once
the ground category is specified (using the word “over”).
184
Theorem [23, 61]. If L ∈ |Cqml|, then L-Top and L-FTop are topological over Set; if C ֒→ Loqml,
then C-Top and C-FTop are topological over Set × C; and if C ֒→ Loqml, then C, C-HTop, CHFTop are topological over Set × C w.r.t. the forgetful functor of the previous theorem as modified
by the embeddings given below of these categories into C-Top, C-Top, and C-FTop, respectively (so
that Loc is topological in this way over Set × Loc).
3.3
Special Case Of Topological Systems
In view of the motivation of topological systems and their relationship to variable-basis spaces given
later, the behavior of TopSys is rather surprising.
Theorem. TopSys is not topological over Set × Loc in any sense or with any modifier as defined
above—V -structured sources comprising only one morphism need not even have lifts; TopSys is
essentially small topological over Set—each small V -structured source has a initial lift that is unique
up to isomorphism; and SobTopSys is essentially c.e.m. topological and essentially quasi-topological
over Loc.
Conjecture. TopSys is neither topological over Set nor over Loc.
3.4
Special Case Of Wang Topological Spaces
Let C ֒→ Dmrgop . The problem with C-WTop is the lack so far of a well-defined ground category. It
is therefore not known in what sense (if any) C-WTop is topological.
4
Relationships Between Categories For Poslat Topological Structures
4.1
Adjoint Pairs Between Top And L-Top
The relationships between Top and L-Top may be classified as concrete or nonconcrete.
4.1.1 Concrete Adjunctions Between Top And L-Top
Many of the concrete adjoint relationships between Top and L-Top can be unified by the concept
of indexed families of mappings between the traditional and L-based fibres [48]. Fix X ∈ |Set| and
L ∈ |SFrm|, and let TXL be the fibre of all traditional topologies on X and τXL be the fibre of all
L-topologies on X. A pair of isotone maps FXL : TX → τXL , GXL : TX ← τXL is said to be an (L)fibre pair (of maps) and this fibre-pair is covariant [contravariant] if GXL ⊣ FXL [FXL ⊣ GXL ]. An
indexed family {FXL , GXL }X ∈ |Set| of such maps is said to be an covariant [contravariant] indexed
family of (L-)fibre pairs, and the following conditions can be considered:
1. Such a family joint-covariantly [joint-contravariantly] generated if ∀ X ∈ |Set| , ∃ a generator
gXL : 2℘(X) ← LX [ fXL : 2℘(X) → LX ]
185
such that ∀T ∈ TX , ∀τ ∈ τXL ,
FXL (T) =
h
hhg←
XL (↓(T))ii
FXL (T) = hhg←
XL (↓(T))ii ,
,
GXL (τ) =
**
[
gXL (u)
u∈τ
GXL (τ) =
DDn[
++
oEEi
←
U : U ∈ fXL
(τ)
2. A
jointly-covariantly
[jointly-contravariantly]
generated
family
{FXL , GXL }X ∈ |Set| is joint-covariantly [joint-contravariantly] natural if ∀ X,Y ∈ |Set|, the
diagram commutes:
gXL ◦ fL← = ( f ← )→ ◦ gY L
[ fXL ◦ ( f ← )→ = fL← ◦ fY L ]
3. An indexed family {FXL , GXL }X ∈ |Set| of fibre-pairs is separately generated if ∀ X ∈ |Set| , ∃
generators
fXL : ℘(X) → LX , gXL : ℘(X) ← LX
such that ∀T ∈ TX , ∀τ ∈ τXL ,
→
(T)ii ,
FXL (T) = hh fXL
GXL (τ) = hhg→
XL (τ)ii
4. A separately generated family {FXL , GXL }X ∈ |Set| of fibre-pairs is separately natural if these
diagrams commute:
fXL ◦ f ← = fL← ◦ fY L , gXL ◦ fL← = f ← ◦ gY L
Examples. The characteristic and Martin Gχ , Mχ fibre maps [47, 61] comprise a joint-contravariantly
natural family of fibre-pairs as well as a separately natural, contravariant family of fibre-maps; the
Kubiak-Lowen ωL , ιL fibre maps [42, 34] comprise a joint-covariantly natural family of fibre-pairs;
and the level fibre maps Fα , Sα [43, 51, 55, 61] comprise a joint-covariantly natural family of fibrepairs (α prime).
Theorem. Let L ∈ |SFrm|, let {FXL , GXL }X ∈ |Set| be an indexed family of L-fibre pairs, and let the
bi-level mappings F : Top → L-Top, G : Top ← L-Top be defined as follows:
F (X, T) = (X, FXL (T)) ,
F (f) = f
G (X, τ) = (X, GXL (τ)) ,
G( f ) = f
1. If {FXL , GXL }X ∈ |Set| is joint-covariantly natural, then F is a concrete functor, G is a concrete
functor, and F ⊣ G.
2. If {FXL , GXL }X ∈ |Set| is joint-contravariantly natural, then F is a concrete functor, G is a concrete
functor, and G ⊣ F.
3. If {FXL , GXL }X ∈ |Set| is separately natural covariant [contravariant], then F is a concrete functor,
G is a concrete functor, and F ⊣ G [G ⊣ F].
Corollary. The examples and the theorem imply the Mχ ⊣ Gχ , ωL ⊣ ιL , Fα ⊣ Sα (α prime) adjunctions
between Top and L-Top.
186
4.1.2 Non-Concrete Adjunctions Between Top And L-Top
Examples of non-concrete adjunctions include the hypergraph functor [67, 43, 51, 9] and the adjunction based on it (assuming L a spatial frame) in [17, 18], as well as the adjunction based on the L-2
and 2-L soberification functors [62]. The role of the hypergraph functor in fuzzy addition and fuzzy
multiplication can be seen in the references of [63], and the role of the soberification adjunction in
building alternative fuzzy real lines and unit intervals can be seen in Sections 2 and 8 of [62]..
4.2
Embedding Of Fixed-Basis And Crisp Variable-Basis Into Fuzzy Variable-Basis
Given L ∈ |C|, L-Top embeds into C-Top and L-FTop embeds into C-FTop by simply choosing
φ = idL . The adjunction between C-Top and C-FTop (Section 6 of [61]) induces from an “indexed
family of fibre pairs” which are an extension of the characteristic-Martin fibre pairs referenced above.
V
In this more general setting, given (X, L, τ) and (X, L, T ), Gχ (τ) = T ≥ χτ T and Mχ (T ) = coker(T ) .
4.3
Singleton Embeddings Of Point-Free And Wang Into Variable-Basis
The embeddings of Loc, C ֒→ Loqml, C-HTop into C-Top and the embedding of C-HTop into CFTop are given in [54, 55, 61] and are all singleton functors making each point-free category isomorphic to a subcategory of singleton spaces.
To illustrate, Loc embeds into Loc-Top via A 7→ 1, A, A1 , [φ : A → B] 7→ (id, φ) : 1, A, A1 → 1, B, B1 .
Letting S : Loc → Loc-Top be the embedding just described and Loc-Topsk be the full subcategory
of stratified singleton spaces, S ⊣ Ω|Loc-Topsk ⊣ S, where Ω (X, L, τ) = τ and Ω ( f , φ) = [( f , φ)← ]op .
It follows that S is an isomorphism onto Loc-Topsk and we should regard Loc as a special case of
variable-basis point-set lattice-theoretic topology, namely Loc is a special case of singleton variablebasis topology or variable-basis topology of singleton spaces. From this point of view, point-free
topology is not a generalization of topology, but rather the special and important case of singleton
space topology which focuses on the lattice-theoretics of poslat topology.
The case of C-WTop (with C ֒→ Dmrgop ) requires only a slight modification of the singleton
functor embedding C-HTop into C-Top:
X 1
LX , τ →
7
1, L , τ ,
i
h op X 1
φ : LX , τ → MY , σ 7→ id, φ⊢
: 1, L , τ → 1, MY , σ1
This embedding means that the Wang approach is isomorphic to a subcategory of singleton spaces,
despite the set exponent in Wang objects being non-singleton.
Essentially, the Wang morphisms do not recognize these non-singleton sets and treats them as
if they are singletons. Restated, the Wang approach is essentially point-free. For categories of the
form C-WTop, it would seem that the mixed syntax, lack of a clearly defined ground category, and
seeming lack of being a topological category are issues and questions that need resolution for this
popular approach.
187
4.4
Embeddings Of Fixed-Basis Into Topological Systems [4]
For many L ∈ |Frm|, there are simple embeddings of L-Top into TopSys. Fix L ∈ |Frm| such that L
has a prime element α, and let (X, τ) ∈ |L-Top|. Note (X, τ) ∈ |Set × Loc|. Define |=τ,α on (X, τ) by
putting ∀x ∈ X, u ∈ τ, x |=τ,α u ⇔ u (x) > α. Further, given f : (X, τ) → (Y, σ) ∈ L-Top, define the
ground morphism ( f , ( fL← )op ) : (X, τ) → (Y, σ) in Set × Loc. Then Fα (X, τ) = (X, τ, |=τ,α ) , Fα ( f ) =
( f , ( fL← )op ) defines Fα as a functor from L-Top to TopSys which is an embedding. This generalizes
the spatialization embedding of Top into TopSys of [75].
4.5
Embedding Of Topological Systems Into Variable-Basis [4]
The relationship between TopSys and Loc-Top is induced by another variety of maps between posets
of structures.
Let (X, A, |=) ∈ |TopSys| be given, put
F (|=) = τ|=
≡ u ∈ AX : (∀x ∈ X) (x |= u (x)) or (∀x ∈ X) (u (x) = ⊥)
F (X, A, |=) = X, A, τ|= , F ( f , φ) = ( f , φ). Then F : TopSys → Loc-Top is a functorial embedding.
We note TopSys is isomorphic to a proper subcategory of Loc-Top since the latter is topological over
Set × Loc and TopSys is not topological over Set × Loc and the forgetful functor from TopSys to
Set × Loc factors through F and the forgetful functor from Loc-Top to Set × Loc.
Given that each of Loc and Top embed into TopSys—the former [latter] by the localification
[spatialization] functor of [75], we can now answer a long-standing question whether Loc-Top is the
smallest supercategory, up to embedding, of Loc and Top: the answer is no, namely, Loc and Top
embed properly into TopSys and TopSys embeds properly into Loc-Top.
Finally, the fact that TopSys is not topological means that only in Loc-Top can the initial and final
lifts of forgetful functor structured sources from TopSys be constructed.
5
Examples Of Objects And Morphisms For Poslat Topological Structures
It is not sufficient to have topological categories. Such categories must also exhibit important examples of objects and morphisms justifying the study of such categories and the approaches to topology
they represent.
From [4, 8, 17, 18, 19, 23, 24, 30, 33, 34, 35, 36, 37, 38, 39, 44, 45, 50, 51, 55, 58, 59, 61, 62, 63,
64] and their bibliographies an inventory of many important examples can be constructed.
Here is a sample of significant objects in poslat topology:
1. R(L) and I(L), for L a deMorgan quasi-monoidal lattice (which includes distributive and nondistributive deMorgan algebras).
2. R and I equipped with the dual L-topologies induced from R(L) and I(L) (L as above).
188
3. R∗ (L) and I∗ (L), the alternative L-fuzzy real line and L-fuzzy unit interval, formed by the L-2
soberification functor acting on R and I for any complete quasi-monoidal lattice (which includes
all complete lattices)—and indeed each complete lattice A generates a canonical L-sober space
LPT (A).
4. The space of probability measures on the Borel sets of a separable metric space, which gives a
stratified, non-generated I-topological space.
5. Traditional limit spaces generate for each complete Heyting algebra a class of L-topological
spaces.
6. I-rigid topological spaces constructed using τ-smooth Borel probability measures on ordinary
spaces and Radon measures on ordinary compact Hausdorff spaces, constructions allowing
Boolean negation to extend continuously to Łukasiewicz negation.
7. Each ordinary T1 space X with at most finitely many components generates an L-topological
space X (L) for L ∈ |Hut| with ⊥ meet-irreducible such that if L = 2, X (L) is L-homeomorphic
to Gχ (X), and if X = R or I, X (L) is L-homeomorphic to R (L) or I (L).
8. Variable-basis spaces generated from specific topological systems.
Here is a sample of significant morphisms in poslat topology:
9. Fuzzy addition and fuzzy multiplication in R (L).
10. Fuzzy translation and fuzzy scaling (especially in light of the behavior of the inverse mappings
of these maps)
11. Fuzzy addition as uniformly continuous
12. Units of adjunctions having universal lifting and extension properties, such as the L-continuous
and variable-basis morphisms generated by compactification reflectors from any non-(Chang)
compact space such as the canonical R(L), R∗ (L), (0, 1)(L), (0, 1)∗ (L), etc, catalogued above.
13. Extensions of important continuous maps.
14. The rich inventory of variable-basis morphisms between fuzzy real lines, between induced
spaces, between soberifications, all with different underlying bases.
Acknowledgements
Dedicated to Prof. W. J. Kotzé upon his retirement from Rhodes University. Appreciation is expressed
to Prof. Ritchey, Chair, Department of Mathematics and Statistics of Youngstown State University,
for his support.
References
[1] J. Adámek, H. Herrlich, G. E. Strecker, Abstract And Concrete Categories: The Joy Of Cats,
Wiley Interscience Pure and Applied Mathematics, John Wiley & Sons (Brisbane/Chicester/New
York/Singapore/Toronto), 1990.
189
[2] C. L. Chang, Fuzzy topology, J. Math. Anal. Appl. 24(1968), 182–190.
[3] C. De Mitri, C. Guido, Some remarks on fuzzy powerset operators, Fuzzy Sets and Systems 126(2002),
241–251.
[4] J. Denniston, S. E. Rodabaugh, Relationships between topological systems and variable-basis topological
spaces, in progress.
[5] P. Eklund, Category theoretic properties of fuzzy topological spaces, Fuzzy Sets and Systems 13(1984),
303–310.
[6] P. Eklund, A comparison of lattice-theoretic approaches to fuzzy topology, Fuzzy Sets and Systems
19(1986), 81–87.
[7] P. Eklund, Categorical fuzzy topology, Doctoral Dissertation, (1986), Åbo Akademi (Turku, Finland).
[8] T. E. Gantner, R. C. Steinlage, R. H. Warren, Compactness in fuzzy topological spaces, J. Math. Anal.
Appl. 62(1978), 547–562.
[9] G. Gerla, Representations of fuzzy topologies, Fuzzy Sets and Systems 11(1980), 103–113.
[10] J. A. Goguen, L-fuzzy sets, J. Math. Anal. Appl. 18 (1967), 145–167.
[11] J. A. Goguen, The fuzzy Tychonoff Theorem, J. Math. Anal. Appl. 43(1973), 734–742.
[12] C. Guido, The subspace problem in the traditional point-set context of fuzzy topology, in [27], 351–372 .
[13] C. Guido, Powerset operators based approach to fuzzy topologies on fuzzy sets, Chapter 15 in[66], pp.
401–413.
[14] J. Gutiérrez García, M. A. de Prada Vicente, A. P. Šostak, A unified approach to the concept of fuzzy
L-uniform space, Chapter 3 in [66], pp. 81–114.
[15] U. Höhle, Uppersemicontinuous fuzzy sets and applications, J. Math. Anal. Appl. 78(1980), 659–673.
[16] U. Höhle, Limit structures and many valued topology, J. Math. Anal. Appl. 251(2000), 549–556.
[17] U. Höhle, Many Valued Topology And Its Applications,
(Boston/Dordrecht/London), 2001.
Kluwer Academic Publishers
[18] U. Höhle, A note on the hypergraph functor, Fuzzy Sets and Systems 131(2002), 353–356.
[19] U. Höhle, Many valued topologies and Borel probability measures, Chapter 4 in [66], pp. 115–135.
[20] U. Höhle, S. E. Rodabaugh, eds, Mathematics Of Fuzzy Sets: Logic, Topology, And Measure Theory, The Handbooks of Fuzzy Sets Series, Volume 3(1999), Kluwer Academic Publishers
(Boston/Dordrecht/London).
[21] U. Höhle, S. E. Rodabaugh, Appendix to Chapter 6: weakening the requirement that L be a complete
chain, in [66], pp. 189–197.
[22] U. Höhle, A. P. Šostak, A general theory of fuzzy topological spaces, Fuzzy Sets and Systems 73(1995),
131–149.
[23] U. Höhle, A. Šostak, Axiomatic foundations of fixed-basis fuzzy topology, Chapter 3 in [4], 123–272.
[24] B. Hutton, Normality in fuzzy topological spaces, J. Math. Anal. Appl. 50(1975), 74–79.
[25] B. Hutton, Products of fuzzy topological spaces, Topology Appl. 11(1980), 59–67.
[26] P. T. Johnstone, Stone Spaces, Cambridge University Press (Cambridge), 1982.
[27] W. Kotzé, ed., Special Issue, Quaestiones Mathematicae 20(3)(1997).
[28] W. J. Kotzé, Lifting of sobriety concepts with particular reference to (L, M)-topological spaces, Chapter
16 in [66], pp. 415–426.
190
[29] W. Kotzé, T. Kubiak, Fuzzy topologies of Scott continuous functions and their relation to the hypergraph
functor, Quastiones Mathematicae 15(1992), 175–187.
[30] W. Kotzé, T. Kubiak, Inserting L-fuzzy real-valued functions, Math. Japon. 164(1993), 5–11.
[31] T. Kubiak, On Fuzzy Topologies, Doctoral Dissertation, Adam Mickiewicz University (Poznan, Poland),
1985.
[32] T. Kubiak, Extending continuous L-real functions, Math. Japon. 31(1986), 875–887.
[33] T. Kubiak, L-fuzzy normal spaces and Tietze extension theorem, J. Math. Anal. Appl. 125(1987), 141–153.
[34] T. Kubiak, The topological modification of the L-fuzzy unit interval, Chapter 11 in [65], 275–305.
[35] T. Kubiak, A strengthening of the Katětov-Tong insertion theorem, Comment. Math. Univ. Carolinae
34(1993), 357–362.
[36] T. Kubiak, On L-Tychonoff spaces, Fuzzy Sets and Systems 73(1995), 25–53.
[37] T. Kubiak, The fuzzy Brouwer fixed-point theorem, J. Math. Anal. Appl. 222(1998), 62–66.
[38] T. Kubiak, Separation Axioms: Extensions of Mappings and Embedding of Spaces, Chapter 6 in [20],
433–479.
[39] T. Kubiak, Fuzzy reals: topological results surveyed, Brouwer fixed point theorem, open questions, Chapter 3 in [66], pp. 137–151.
[40] T. Kubiak, A. P. Šostak, Lower set-valued fuzzy topologies, in [27], 423-429.
[41] Liu Ying-Ming and Luo Mao-Kang, Fuzzy Topology, 1997 (Chinese), 1998 (English), World Scientific
Publishing (Singapore).
[42] R. Lowen, Fuzzy topological spaces and fuzzy compactness, J. Math. Anal. Appl. 56(1976), 621–633.
[43] R. L. Lowen, A comparison of different compactness notions in fuzzy topological spaces, J. Math. Anal.
Appl. 64(1978), 446–454.
[44] R. Lowen, On the existence of natural fuzzy topologies on spaces of probability measures, Math. Nachr.
115(1984), 33–57.
[45] R. Lowen, The order aspect of the fuzzy real line, Manuscripta Math. 49(1985), 293–309.
[46] E. G. Manes, Algebraic Theories, Springer Verlag (Berlin/Heidelberg/New York), 1976.
[47] H. W. Martin, Weakly induced fuzzy topological spaces, J. Math. Anal. Appl. 78(1980), 634–639.
[48] C. Ostheimer, S. E. Rodabaugh, Concrete categorial adjunctions induced from families of fibre maps, in
progress.
[49] A. Pultr, S. E. Rodabaugh, Lattice-valued frames, functor categories, and classes of sober spaces, Chapter
6 in [66], pp. 153–187.
[50] A. Pultr, S. E. Rodabaugh, Examples for different sobrieties in fixed-basis topology, Chapter 17 in [66],
pp. 427–440.
[51] S. E. Rodabaugh, The Hausdorff separation axiom for fuzzy topological spaces, Topology and its Applications 11(1980), 319–334.
[52] S. E. Rodabaugh, A categorical accommodation of various notions of fuzzy topology: preliminary report,
in E. P. Klement, ed, Proceedings of the Third International Seminar on Fuzzy Set Theory 3(1981), 119–
152, Johannes Kepler Universitätsdirektion, Linz (Austria).
[53] S. E. Rodabaugh, A categorical accommodation of various notions of fuzzy topology, Fuzzy Sets and
Systems 9(1983), 241–265.
191
[54] S. E. Rodabaugh, A point set lattice-theoretic framework T which contains LOC as a subcategory of
singleton spaces and in which there are general classes of Stone representation and compactification theorems, first draft February 1986 / second draft April 1987, Youngstown State University Central Printing
Office (Youngstown, Ohio).
[55] S. E. Rodabaugh, Point-set lattice-theoretic topology, Fuzzy Sets and Systems 40(1991), 297–345.
[56] S. E. Rodabaugh, Categorical frameworks for Stone representation theorems, Chapter 7 in [65], 178-231.
[57] S. E. Rodabaugh, Necessity of Chang-Goguen topologies, Rendiconti Circolo Matematico Palermo Suppl.,
Serie II 29(1992), 299-314.
[58] S. E. Rodabaugh, Applications of localic separation axioms, compactness axioms, representations, and
compactifications to poslat topological spaces, Fuzzy Sets and Systems 73(1995), 55–87.
[59] S. E. Rodabaugh, Powerset operator based foundation for point-set lattice-theoretic (poslat) fuzzy set
theories and topologies, in [27], 463–530.
[60] S. E. Rodabaugh, Powerset operator foundations for poslat fuzzy set theories and topologies, Chapter 2 in
[4], 91–116.
[61] S. E. Rodabaugh, Categorical foundations of variable-basis fuzzy topology, Chapter 4 in [4], 273–388.
[62] S. E. Rodabaugh, Separation axioms: representation theorems, compactness, and compactifications,
Chapter 7 in [4], 481–552.
[63] S. E. Rodabaugh, Fuzzy real lines and dual real lines as poslat topological, uniform, and metric ordered
semirings with unity, Chapter 10 in [4], pp. 607–632.
[64] S. E. Rodabaugh, Axiomatic foundations for uniform operator quasi-uniformities, Chapter 7 in [66], pp.
199–233.
[65] S. E. Rodabaugh, E. P. Klement, U. Höhle, eds, Application Of Category Theory To Fuzzy Sets, Theory and Decision Library—Series B: Mathematical and Statistical Methods 14(1992), Kluwer Academic
Publishers (Boston/Dordrecht/London).
[66] S. E. Rodabaugh, E. P. Klement, eds, Topological And Algebraic Structures In Fuzzy Sets: A Handbook
of Recent Developments in the Mathematics of Fuzzy Sets, Trends in Logic 20(2003), Kluwer Academic
Publishers (Boston/Dordrecht/London).
[67] E. S. Santos, Topology versus fuzzy topology, preprint, Youngstown State University (1977).
[68] D. S. Scott, C. Strachey, Towards a mathematical semantics for computer languages, in J. Fox, ed, Proceedings of the Symposium on Computers and Automata, Polytechnic Institute of Brooklyn Press (New
York, 1971), 19–46; and Technical Monograph PRG-6, Programming Research Group, University of Oxford (1971).
[69] M. Smyth, Powerdomains and predicate transformers: a topological view, in J. Diaz, ed, Automata,
Languages, and Programming, Lectures Notes in Computer Science 154(1983), 662–675, Springer Verlag
(Berlin/Heidelberg/New York).
[70] M. Smyth, Quasi-uniformities: reconciling domains with metric spaces, M. Main, et al, eds, Mathematical
Foundations of Programming Language Semantics, Lectures notes in Computer Science 288(1988), 236–
253, Springer Verlag (Berlin/Heidelberg.New York).
[71] A. P. Šostak, On a fuzzy topological structure, Suppl. Rend. Circ. Matem. Palermo, sr. II, 11(1985), 89103.
[72] A. Šostak, Towards the concept of a fuzzy category, Acta Univ. Latviensis (ser. Math.) 562(1991), 85–94.
[73] A. Šostak, Fuzzy categories related to algebra and topology, Tatra Mount. Math. Publ. 16(1999), 159–
186.
192
[74] A. P. Šostak, On some fuzzy categories related to the category L-Top of L-topological spaces, Chapter 12
in [66], pp. 337–372.
[75] S. Vickers, Topology Via Logic, Cambridge Tracts in Theoretical Computer Science 5(1989), reprinted
1990, paperback 1996, Cambridge University Press (Cambridge/Melbourne/New York).
[76] G. Wang, Order-homomorphism on fuzzes, Fuzzy Sets and Systems 12(1984), 281–288.
[77] G. Wang, Theory Of L-Fuzzy Topological Spaces, in Chinese, Shaanxi Normal University Press (Xi’an,
1988).
[78] G. Wang, Theory Of Topological Molecular Lattices, in Chinese, Shaanxi Normal University Press (Xi’an,
1990).
[79] L. A. Zadeh, Fuzzy sets, Information and Control 8(1965), 338–353.
193
A bridge between fuzzy set theory and coherent conditional
probabilities (I)
ROMANO S COZZAFAVA
Dip. Metodi e Modelli Matematici
Univ. “La Sapienza”
00161 Roma, Italy
E-mail: r♦♠s❝♦③③❅❞♠♠♠✳✉♥✐r♦♠❛✶✳✐t
In this talk (strictly linked with that by Giulianella Coletti with the same title) we expound our interpretation of fuzzy set theory (both from a semantic and a syntactic point of view) in terms of conditional
events and coherent conditional probabilities. During past years, many papers have been devoted to
support the negative view maintaining that probability is inadequate to capture what is usually treated
by fuzzy theory. In our approach we emphasize the role of conditioning (in a proper framework,
i.e. de Finetti’s coherence) to get rid of many controversial aspects. Moreover, we introduce suitable
operations between fuzzy subsets, looked on as corresponding operations between conditional events
endowed with the relevant conditional probability.
Let us start from the intuitive idea of fuzzy subset: where does it come from and what is its
“operational” meaning? We will refer to the state of information (at a given moment) of a real (or
fictitious) person (for instance, a “randomly” chosen one) that will be denoted by “You”.
If X is a (not necessarily numerical) random quantity with range CX , let Ax , for any x ∈ CX , be the
event {X = x}. The family {Ax }x∈Cx is obviously a partition of the certain event Ω = CX . Now, let ϕ
be any property related to the random quantity X : from a pragmatic point of view, it is natural to think
that You have some information about possible values of X, which allows You to refer to a suitable
membership function of the fuzzy subset of “elements of CX with the property ϕ”.
For example, if X is a numerical quantity, for You the membership function may be put equal to
1 for values of X less than a given x1 , while it is put equal to 0 for values greater than x2 ; then it is
taken as decreasing from 1 to 0 in the interval from x1 to x2 : this choice of the membership function
implies that, for You, elements of CX less than x1 have the property ϕ, while those greater than x2 do
not. So the real problem is that You are uncertain on having or not the property ϕ those elements of
CX between x1 and x2 .
Then the interest is in fact directed toward conditional events such as E|Ax , where x ranges over
the interval from x1 to x2 , with
E ={You claim the property ϕ},
Ax ={the value of X is x}.
It follows that You may assign a subjective probability P(E|Ax ) equal, e.g., to 0.2 without any
need to assign a degree of belief of 0.8 to the event E under the assumption Acx (i.e., the value of X is
not x), since an additivity rule with respect to the conditioning events does not hold.
In other words, it seems sensible to identify the values of the membership function with suitable
conditional probabilities. In particular, putting
194
Ho ={the value of X is greater than x2 },
H1 ={the value of X is less than x1 },
we may assume that E and Ho are incompatible and that H1 implies E, so that, by the properties of a
conditional probability, P(E|Ho ) = 0 and P(E|H1 ) = 1.
Notice that the conditional probability P(E|Ax ) has been directly introduced as a function on the
set of conditional events (and without assuming any given algebraic structure). Is that possible? In the
usual (Kolmorogovian) approach to conditional probability the answer is NO, since the introduction
of P(E|Ax ) would require the consideration (and the assessment) of P(E ∧ Ax ) and P(Ax ) (assuming
positivity of the latter). But this is a not a simple task: in fact in this context the only sensible
procedure is to assign directly P(E|Ax ) . For example, to assign the (conditional) probability that You
claim “Mary is young” knowing her age x, but not that of “the probability that Mary has the age x”
(not to mention that, for different choices of the random quantity X , the corresponding probability
can be zero).
The probabilistic approach adopted here differs radically from the usual theory based on a measuretheoretic framework, which assumes that a unique probability measure is defined on an algebra (or
σ-algebra) of events constituting the so-called sample space Ω. Directing attention to events as subsets of the sample space (and to algebras of events) may be unsuitable for many real world situations,
which make instead very significant both giving events a more general meaning and not assuming any
specific structure for the set where probability is assessed.
Probability is seen as a measure of belief in a given proposition. Notice that a proposition – which
can be either true or false – must not be looked on as an assertion: so, even if beliefs may come from
various sources, they can be treated in the same way, since the relevant events (including possibly
statistical data) need always to be considered (going back to a terminology due to Koopman) as being
contemplated (or, similarly, assumed) and not asserted propositions.
This aspect is very crucial, since in our approach an essential role is played by conditioning: in
fact the very concept of conditional probability is deeper than the usual restrictive view emphasizing
P(E|H) only as a probability for each given H (looked on as a given fact). Regarding instead also
the conditioning event H as a “variable”, we get something which is not just a probability (notice that
H also – like E – plays the role of an uncertain event whose truth value is not necessarily given and
known).
Our probabilistic framework is that based on the concept of conditional event and on the ensuing
concept of coherent conditional probability. Our concept of conditional events differs from those
adopted by many others in the relevant literature. Actually, in [1] we showed that, if we do not assign
the same “third value” t(E|H) = u (undetermined) to all conditional events, but make it suitably
depend on E|H, it turns out that this function t(E|H) can be taken as a general conditional uncertainty
measure (and conditional probability corresponds to a particular choice of the relevant operations
between conditional events).
Then a conditional probability P(E|H) can be – through coherence – directly introduced and it is
not defined as the ratio of the (unconditional) probabilities P(E ∧ H) and P(H), assuming positivity of
the latter. This allows to deal with conditioning events of zero probability, avoiding to resort, as in the
classic approach, to the Radon-Nikodym framework, which (rather than make conditional probability
just depend on the given conditioning event) requires the knowledge of the whole conditioning distribution, a situation which is clearly unsound and contradicts the “inferential” meaning of a conditional
event.
195
Finally, among the peculiarities of the concept of coherent conditional probability versus the usual
one, we underline the possibility for P(E|H) of assuming the extreme values 0 and 1 also for situations
which are different, respectively, from the trivial ones E ∧ H = 0/ and H ⊆ E ; moreover, we emphasize
the “natural” looking at the conditional event E|H as “a whole”, and not separately at the two events
E and H.
A complete account of probabilistic logic in a coherent setting is in the book [2]. We just mention
that a coherent conditional probability can be characterized by suitably representing it by means of a
class {Pα } of unconditional probabilities giving rise to the so-called zero-layers (for details, see [2],
p.81).
In particular, given a family C of conditional events {Ei |Hi }i∈I , where card(I) is arbitrary and
the events Hi ’s are a partition of Ω, we recall the following two corollaries of the aforementioned
characterization theorem:
(A) Any function f : C → [0, 1] such that f (Ei |Hi ) = 0 if Ei ∧ Hi = 0/ and f (Ei |Hi ) = 1 if Hi ⊆ Ei
is a coherent conditional probability.
(B) If P(·|·) is a coherent conditional probability such that P(E|Hi ) ∈ {0, 1}, then the following
two statements are equivalent
(i) P(·|·) is the only coherent assessment on C ;
(ii) it is Hi ∧ E = 0/ for every Hi ∈ Ho and Hi ⊆ E for every Hi ∈ H1 , where Hr = {Hi : P(E|Hi ) =
r} , r = 0, 1 .
The results that follow are taken from [3]. Let ϕ be any property related to the random quantity
X : notice that a property, even if expressed by a statement, does not single–out an event, since the
latter needs to be expressed by a nonambiguous proposition that can be either true or false.
Consider now the event Eϕ = “You claim ϕ ” and a coherent conditional probability P(Eϕ |Ax ),
looked on as a real function µEϕ (x) = P(Eϕ |Ax ) defined on CX .
Since the events Ax are incompatible, then – by (A) – every µEϕ (x) with values in [0, 1] is a coherent
conditional probability. So we can define a fuzzy subset in this way:
Given a random quantity X with range CX and a related property ϕ, a fuzzy subset Eϕ∗ of CX is the
pair
Eϕ∗ = {Eϕ , µEϕ },
with µEϕ (x) = P(Eϕ |Ax ) for every x ∈ CX .
So a coherent conditional probability P(Eϕ |Ax ) is a measure of how much You, given the event
Ax = {X = x}, are willing to claim the property ϕ , and it plays the role of the membership function
of the fuzzy subset Eϕ∗ .
Notice also that (as already remarked above) the significance of the conditional event Eϕ |Ax is
reinforced by looking on it as “a whole”, avoiding a separate consideration of the two propositions Eϕ
and Ax .
Obviously, a fuzzy subset Eϕ∗ is a crisp set when there is only a coherent assessment µEϕ (x) =
P(Eϕ |Ax ) with range {0, 1}.
Then, by property (B) above, a fuzzy subset Eϕ∗ is a crisp set when the property ϕ is such that, for
every x ∈ CX , either Eϕ ∧ Ax = 0/ or Ax ⊆ Eϕ .
196
Given two fuzzy subsets Eϕ∗ , Eψ∗ , corresponding to the random quantities X and Y (possibly X =
Y ), assume that, for every x ∈ CX and y ∈ CY , both the following equalities hold
(1)
P(Eϕ |Ax ∧ Ay ) = P(Eϕ |Ax ) , P(Eψ |Ax ∧ Ay ) = P(Eψ |Ay ) ,
with Ay = {Y = y}. The definitions of the binary operations of union and intersection and that of
complementation are as follows:
Given two fuzzy subsets (respectively, of CX and CY ) Eϕ∗ and Eψ∗ , put
Eϕ∗ ∪ Eψ∗ = {Eϕ∨ψ , µEϕ∨ψ } , Eϕ∗ ∩ Eψ∗ = {Eϕ∧ψ , µEϕ∧ψ } , (Eϕ∗ )′ = {E¬ϕ , µE¬ϕ } ,
where (by a fairly improper notation) ϕ ∨ ψ , ϕ ∧ ψ denote, respectively, the properties “ϕ or ψ ” , “ϕ
and ψ ” , and Eϕ∨ψ = Eϕ ∨ Eψ , Eϕ∧ψ = Eϕ ∧ Eψ , while µEϕ∨ψ and µEϕ∧ψ are defined on CXY = CX ×CY
by putting
µEϕ∨ψ (x, y) = P(Eϕ ∨ Eψ |Ax ∧ Ay ) , µEϕ∧ψ (x, y) = P(Eϕ ∧ Eψ |Ax ∧ Ay ) .
The conditional event (Eϕ ∨ Eψ )|(Ax ∧ Ay ) is true iff Ax ∧ Ay and Eϕ ∨ Eψ are both true: and the
latter event is true, by definition of disjunction, when at least one of the two events is true, that is
when “You claim ϕ” or when “You claim ψ”. On the other hand, Eϕ∨ψ is true when “You claim ϕ
or ψ”, and this requires to put Eϕ∨ψ = Eϕ ∨ Eψ . Similar considerations apply to the events Eϕ∧ψ and
Eϕ ∧ Eψ . Notice also the following relation: E¬ϕ 6= (Eϕ )c , where (Eϕ )c denotes the contrary of the
event Eϕ (while the equality holds only for a crisp set); for example, the propositions “You claim
not young” and “You do not claim young” are logically independent. Then, while Eϕ ∨ (Eϕ )c = CX ,
we have instead Eϕ ∨ E¬ϕ ⊆ CX . We could also introduce the tautological property T = ϕ ∨ ¬ϕ (for
any ϕ ), which satisfies (trivially) the relation ET ⊆ Ω , and the void property V = ϕ ∧ ¬ϕ (for any
ϕ ), which satisfies the relation EV 6= 0/ . Therefore, if we consider the union of a fuzzy subset and its
complement
Eϕ∗ ∪ (Eϕ∗ )′ = {Eϕ∨¬ϕ , µEϕ∨¬ϕ }
we obtain in general a fuzzy subset of (the universe) CX .
On the other hand, it is easy to check that the complement of a crisp set is also a crisp set: in fact,
from Eϕ ∧ Ax = 0/ it follows Ax ⊆ (Eϕ )c = E¬ϕ , and from Ax ⊆ Eϕ it follows (Eϕ )c ∧ Ax = 0/ , that is
E¬ϕ ∧ Ax = 0/ .
Consider now two fuzzy subsets Eϕ∗ and Eψ∗ : the rules of conditional probability give, taking into
account (1),
(2)
P(Eϕ ∨ Eψ |Ax ∧ Ay ) = P(Eϕ |Ax ) + P(Eψ |Ay ) − P(Eϕ ∧ Eψ |Ax ∧ Ay ) .
Therefore, to evaluate P(Eϕ ∨ Eψ |Ax ∧ Ay ) it is necessary (and sufficient) to know also the value of
the conditional probability p = P(Eϕ ∧ Eψ |Ax ∧ Ay ), and vice versa.
By resorting to the theorem characterizing coherent conditional probability assessments, it is not
difficult to prove that the only constraint for the value of p is
max{P(Eϕ |Ax ) + P(Eψ |Ay ) − 1 , 0} ≤ p ≤ min{P(Eϕ |Ax ), P(Eψ |Ay )} .
Three possible choices for the value of the conditional probability p give rise to different wellknown (see, e.g., [4]) t-norms and t-conorms :
197
(a) give p the maximum possible value, that is p = min{P(Eϕ |Ax ), P(Eψ |Ay )} ; then in this case
we necessarily obtain, by (2), that
P(Eϕ ∨ Eψ |Ax ∧ Ay ) = max{P(Eϕ |Ax ), P(Eψ |Ay )}.
This assignment corresponds to the choice of the so-called TM and SM as T -norm and T -conorm.
(b) give p the minimum value, that is max{P(Eϕ |Ax ) + P(Eψ |Ay ) − 1 , 0} , i.e. the Łukasiewicz
T-norm. In this case we necessarily obtain, again by (2), that
P(Eϕ ∨ Eψ |Ax ∧ Ay ) = min{P(Eϕ |Ax ) + P(Eψ |Ay ) , 1}
i.e. the Łukasiewicz T-conorm.
(c) give p the value P(Eϕ |Ax )P(Eψ |Ay ) , that is assume that Eϕ is stochastically independent of
Eψ given Ax ∧ Ay . In this case we necessarily obtain
P(Eϕ ∨ Eψ |Ax ∧ Ay ) = P(Eϕ |Ax ) + P(Eψ |Ay ) − P(Eϕ |Ax )P(Eψ |Ay ) ,
i.e. the so-called probabilistic sum SP and product TP .
References
[1] G. Coletti and R. Scozzafava, “From conditional events to conditional measures: a new axiomatic
approach”. Annals of Mathematics and Artificial Intelligence, 32: 373–392, 2001.
[2] G. Coletti and R. Scozzafava, Probabilistic Logic in a Coherent Setting, Dordrecht, Kluwer, 2002.
[3] G. Coletti and R. Scozzafava, “Conditional probability, fuzzy sets and possibility: a unifying
view”, Fuzzy Sets and Systems, to appear.
[4] E. P. Klement, R. Mesiar, E. Pap, Triangular Norms, Dordrecht, Kluwer, 2000.
198
Fuzzy group in a natural interpretation
M AMORU S HIMODA
Shimonoseki City University
Shimonoseki 751-8510, Japan
E-mail: ♠❛♠♦r✉✲s❅s❤✐♠♦♥♦s❡❦✐✲❝✉✳❛❝✳❥♣
We present a natural interpretation of fuzzy groups in a cumulative Heyting valued model for intuitionistic set thoery. With the interpretation we can deduce the essential part of the definitions of fuzzy
groups in the literature.
In the natural interpretation fuzzy sets and fuzzy relations are interpreted as sets and relations in
the model. Membership functions are related to fuzzy sets by using the canonical embedding from the
class of all crisp sets into the model, which assigns each crisp set to its check set. We can deduce most
of the standard equations or inequalities of definitions or properties on the basic concepts of fuzzy
sets or fuzzy relations ([3]). Fuzzy mappings are interpreted as mappings in the same model, and
we can obtain a characterization of fuzzy mappings with membership functions, which is different
from all known definitions. The meaning of the extension princilple by Zadeh is made clear with
the interpretation of fuzzy mappings ([5]). We can also consider notions such as operations of fuzzy
subsets of different universes, fuzzy relations and mappings between fuzzy subsets ([2]). Moreover
fuzzy equivalence relations and corresponding fuzzy partitions can be naturally considered with the
interpretation ([4]).
Therefore, as far as fuzzy sets, fuzzy relations, etc. are considered as extensions of crisp sets,
relations etc., this interpretation seems to be most natural.
In the following we first recall briefly some properties on the canonical embedding and fuzzy
mappings, then we consider fuzzy subgroups of a crisp group and present a characterization of fuzzy
subgroup with membership functions, which is almost the same as the defining equations in the literature. Our interpretation has its origin from [1], where the interpretation is applied only to elements
of a group.
Let H be a complete Heyting algebra and V H be the cumulative H-valued model. The Heyting
value kϕk is defined for every sentence ϕ of V H . For u, v ∈ V H , u and v are similar iff ku = vk = 1.
For every crisp set x in V , x̌ ∈ V H is defined recursively by:
D(x̌) = {y̌; y ∈ x},
E x̌ = 1,
x̌ : y̌ 7−→ 1.
We call x̌ the check set of x. The check set of a pair (resp. an ordered pair or a cartesian product)
of crisp sets is exactly identical with the pair (resp. the ordered pair or the cartesian product) of the
check sets of the crisp sets.
Proposition 1. Suppose ϕ(a1 , · · · , an ) is a bounded formula of V H and x1 , · · · , xn ∈ V . Then
ϕ(x1 , · · · , xn ) holds
¬ϕ(x1 , · · · , xn ) holds
iff
iff
kϕ(x̌1 , · · · , x̌n )k = 1, and
kϕ(x̌1 , · · · , x̌n )k = 0.
199
Basic operations such as intersection, union, and complement of sets, composition and inverse of
relations (and mappings) are naturally defined in the model.
Every set A in V H is called an H-fuzzy set, and for a crisp set X every subset in V H of the check set
X̌ is called an H-fuzzy subset of X. The mapping µA : X −→H; x 7−→ k x̌∈ A k is called the membership
function of A on X. There is a natural correspondence between H-fuzzy subsets of X and mappings
from X to H, which preserves order and basic set operations.
An H-fuzzy subset R of X × Y is called an H-fuzzy relation from X to Y . An H-fuzzy mapping
from X to Y is a mapping from X̌ to Y̌ in V H .
Lemma 2. Let ϕ : X −→ Y be a crisp mapping between crisp sets. Then the check set ϕ̌ is an H-fuzzy
mapping from X to Y , and ϕ̌(x̌) is similar to the check set of ϕ(x) for every x ∈ X.
In the model various algebras such as groups, rings etc. can be considered. Here a crisp group
means a crisp set which is a group with suitable operations. Then the canonical embedding preserves
the group structre as following.
Proposition 3. For every set G, G is a crisp group iff Ǧ is a group in V H .
The check sets of the operations (multiplication, inverse, and unit) on G become the corresponding
operations on the check set Ǧ by Proposition 1 and Lemma 2. Since the axioms of group are bounded,
Proposition 1 is used in the proof.
For a crisp group G, a set K in V H is called an H-fuzzy subgroup of G if kK is a subgroup of Ǧk =
1. Obviously an H-fuzzy subgroup of G is an H-fuzzy subset of G.
Theorem 4. Let G be a crisp group with the unit e, K be an H-fuzzy subset of Ǧ, and µK be the
membership function of K on G. Then K is an H-fuzzy subgroup of G iff it satisfies the following three
conditions:
(1) µK (x) ∧ µK (y) ≤ µK (xy) (∀x, y ∈ X),
(2) µK (x) ≤ µK (x−1 ) (∀x ∈ X),
(3) µK (e) = 1.
In general, a subgroup K of a group G is normal iff xy ∈ K implies yx ∈ K for every x, y ∈ G. Then
in the theorem K is a normal subgroup of Ǧ in V H iff it additionally satisfies the following condition:
(4) µK (xy) = µK (yx) (∀x, y ∈ X).
Theorem 5. Let G be a crisp group with the unit e and µ be a crisp mapping from G to H. Suppose
µ satisfies the following three conditions:
(1) µ(x) ∧ µ(y) ≤ µ(xy) (∀x, y ∈ X),
(2) µ(x) ≤ µ(x−1 ) (∀x ∈ X),
(3) µ(e) = 1.
Then there is an H-fuzzy subgroup K of G such that µ = µK , where µK is the membership function of
K on G.
200
In the theorem if µ also satisfies the following condition:
(4) µ(xy) = µ(yx) (∀x, y ∈ X),
then the H-fuzzy subgroup K becomes normal.
References
[1] H. Kodera, [0,1]-valued sheaf model of an intuitionistic set theory and fuzzy groups, Bulletin of
Aichi Univ. of Education, 44 (Natural Science), 9-23, 1995.
[2] M. Shimoda, A natural interpretation of fuzzy set theory, in: M.J. Smith, W.A. Gruver, L.O. Hall
(Eds.), Proceedings of Joint 9th IFSA World Congress and 20th NAFIPS International Conference, 493-498, 2001.
[3] M. Shimoda, A natural interpretation of fuzzy sets and fuzzy relations, Fuzzy Sets and Systems,
128(2), 135-147, 2002.
[4] M. Shimoda, Fuzzy equivalence in a natural interpretation, in: T. Bilgic and B.D. Baets (Eds.),
IFSA 2003: Proceedings of the 10th IFSA World Congress, 23-26, 2003.
[5] M. Shimoda, A natural interpretation of fuzzy mappings, Fuzzy Sets and Systems, 138(1), 67-82,
2003.
201
On many-valued topologies on L-powersets of many-valued sets
A LEXANDER Š OSTAK
University of Latvia
1586 Rı̄ga, Latvia
E-mail: s♦st❛❦s❅❧❛t♥❡t✳❧✈
Let M = (M, ≤, ∧, ∨, ∗) be a GL-monoid with universal upper and lower bounds 1 and 0 resp. and let
7→ : E × E −→ E be the corresponding residuation. Following U. Höhle [1] by a (global) M-valued
equality on a set X we call a mapping E : X × X −→ M such that:
1. E(x, x) = 1 ∀x ∈ X;
2. E(x, y) = E(y, x) ∀x, y ∈ X;
3. E(x, y) ∗ E(y, z)) ≤ E(x, z) ∀x, y, z ∈ X.
An M-valued equality E is called separated if E(x, y) = 1 implies x = y. In case E satisfies at least the
first two of these conditions, it will be called an M-valued similarity relation.
A many-valued, or an M-valued set is a pair (X, E) where X is a set and E is an M-valued equality
on it. Let SET(M) denote the category whose objects are M-valued sets and whose morphisms are
mappings f : (X, EX ) −→ (Y, EY ) s.t. EX (x, x′ ) ≤ EY ( f (x), f (x′ )) for all x, x′ ∈ X (cf [1]), and let
SET(Ms ) denote its full subcategory consisting of separated M-valued sets. In some cases we restrict
the set of values which E can accept by a complete submonoid K ⊂ M. The corresponding full
subcategory of SET(M) is denoted by SET(M, K).
Further, let L be a complete sublattice of M. An L-subset A of (X, E) is called extensional if
A(x) ∗ E(x, x′ ) ≤ A(x′ ) for all x, x′ ∈ X. Let LX (resp. L(X,E) ) denote the family of all (resp. all
extensional) L-subsets of X.
Given L-subsets A, B of X we define the degree of similarity as follows:
^
_
E (A, B) = I (A, B) ∧ I (B, A) where I (A, B) :=
A(x)7→ (E(x, x′ ) ∗ B(x′ )) .
x
x′
Proposition 1. The mapping E : LX × LX −→ M thus defined is an M-valued similarity relation on
LX and its restriction to L(X,E) is an M-valued equality.
Note that if E is crisp and L = M = K, then E is the natural equality relation on LX considered in
[3, p. 157]. On the other hand for any M-valued equality E the induced M-valued equality E when
restricted to L(X,E) also coincides with the natural equality.
Given a morphism f : (X, EX ) −→ (Y, EY ) in SET(M) let f −→ : LX −→ LY be the corresponding
(forward) L-powerset operator (see e.g. [5]).
Proposition 2. If f : (X, EX ) −→ (Y, EY ) is a morphism in SET(M) and L is completely distributive,
then EX (A, B) ≤ EY f −→ (A), f −→ (B) ∀A, B ∈ LX .
202
Proposition 3. If f : (X, EX ) −→ (Y, EY ) is a morphism in SET(M, K) and C, D ∈ L(X,E) , then
EY (C, D) ≤ EX (C ◦ f , D ◦ f ).
Proposition 4. Let f : (X, EX ) −→ (Y, EY ) be a morphism in SET(M, K) and L be completely distributive. Then for any extensional L-sets A, B ∈ L(X,E) it holds f → (A) ∗ E (A, B) ≤ f → (B).
Let L-SET(M, K) denote the category whose objects are quadruples (X, E, LX , E ) where (X, E) ∈
O ⌊(SET(M, K)), LX is the L-powerset of X and E is the similarity relation on LX induced by E and
whose morphisms are pairs ( f , f → ) where f : (X, EX ) −→ (Y, EY ) is a morphism in SET(M, K) and
f → : (LX , EX ) −→ (LY , EY ) is the corresponding powerset operator. Further, let EL-SET(M, K) be
the full subcategory of L-SET(M, K) whose objects are of the form (X, E, L(X,E) , E ).
Theorem 5. By assigning to an M-valued set (X, E) the quadruple ΦL (X, E) := (X, E, LX , E ) and
assigning to a morphism f : (X, EX ) −→ (Y, EY ) the pair ΦL ( f ) := ( f , f → ) we define a functor ΦL :
SET(M, K) −→ L − SET(M, K). Besides, if A, B ∈ L(X,E) , then ΦL ( f )(A) ∗ E (A, B) ≤ ΦL ( f )(B). The
forgetful functor ΨL : L − SET(M, K) −→ SET(M, K) defined by ΨL (X, E, LX ) = (X, E) on objects
and ΨL ( f , f → ) = f on morphisms is obviously left inverse of ΦL .
Recall that an M-valued topology on the L-powerset LX or an (L, M)-topology on a set X for short
is a mapping T : LX −→ M such that
1. T (0X ) = T (1X ) = 1;
2. T (U ∧V ) ≥ T (U) ∧ T (V ) ∀U,V ∈ LX ;
W
3. T (
i∈I (Ui )
≥
V
i∈I T
(Ui ) ∀{Ui | i ∈ I} ⊂ LX .
A mapping f : (X, TX ) −→ (Y, TY ) is called continuous if TX (V ◦ f ) ≥ TY (V ) ∀V ∈ LY . Theory of
M-valued L-topologies in case when E is crisp (and mostly when M = L) was developed in [3], [2],
[4], and in other works.
Since in our case the ground categories L − SET(M, K) and EL − SET(M, K) are defined on
the basis of many-valued sets (X, E), our pricipal interest concerns extensional topologies, that is
topologies such that
T (U) ∗ E (U,V ) ≤ T (V ) ∀U,V ∈ LX (resp.U,V ∈ L(X,E) ).
Sometimes we restrict the codomain of T by a complete sublattice N of M.
[Lattices of (L, N)-topologies] Let (X, E) be an object of SET(M, K) and let TKM (L, N, X) denote the
family of all (L, N)-topologies on it. Let
T1 T2 iff T1 (A) ≤ T2 (A) for all A ∈ LX .
Then TKM (L, N, X) endowed with relation becomes a complete lattice, its upper bound and lower
bounds are respectively the discrete and indiscrete (L, N)-topologies Tdis and Tind Further, since intersection of a family of extensional (L, N)-topologies is extensional, the family ETKM (L, N, X) of all
extensional (L, N)-topologies on (X, E) is a complete sublattice of TKM (L, N, X).
[Generation of (L, N)-topologies] Given (X, E) ∈ O ⌊(SET(M, K)) and a mapping S : LX −→ N let
TS (resp. ETS ) denote the family of all (resp. all extensional) (L, N)-topologies on (X, E) such that
203
for all A ∈ LX . The infimum TS of TS belongs to TS and hence is the minimal element of this family; S is called a subbase of the (L, N)-topology TS . Respectively, the infimum TES
of ETS is the minimal element of this family; in this case S is called a subbase of the extensional
(L, N)-topology TES .
S (A) ≤ T (A)
We define categories L-TOPN (M, K), L-ETOPN (M, K), EL-TOPN (M, K) and EL-ETOPN (M, K) as
follows:
1. Objects of L-TOPN (M, K) are pairs (X , T ) where X = (X, E, LX , E ) is an object of L-SET(M, K)
and T : LX −→ N is an (L, N)-topology on it.
2. Objects of EL-TOPN (M, K) are pairs (X , T ) where X = (X, E, LX , E ) is an object of ELSET(M, K) and T : L(X,E) −→ N is an (L, N)-topology on it.
3. Objects of L-ETOPN (M, K) are pairs (X , T ) where X = (X, E, LX , E ) is an object of L-SET(M, K)
and T : LX −→ N is an extensional (L, N)-topology on it.
X
4. Objects of EL-ETOPN (M, K) are pairs (X , T ) where X = (X, E, L( ,E) , E ) is an object of ELSET(M, K) and T : LX −→ N is an extensional (L, N)-topology on it.
As morphisms between (X , TX ) and (Y , TY ) in all these categories we take those morphisms ( f , f → ) :
X −→ Y which are continuous with respect to the corresponding (L, N)-topologies.
Example (1) The category 2-TOP2 (2s , 2) is the category of ordinary topological spaces.
(2)The category L-TOPL (Ls ,2) is the category L-FTOP studied in [3];
(3) The category EL-TOPL (Ms , 2) is isomorphic to the category EL-ETOPL (Ms ,2) and in case M = L
it is the category EL-FTOP introduced in [3].
(4) The category L-TOP2 (Ms ,2) is isomorphic to the category L-TOP of Chang-Goguen L-topological
spaces.
Proposition 6. Let (X1 , T1 ) := (X1 , E1 , LX1 , T1 ) and (X2 , T2 ) := (X2 , E2 , LX2 , T2 ) be objects of L-TOPN (M, K)
and ( f , f → ) : X1 −→ X2 be a morphism in L-SET(M, K). Further, let S : LX2 −→ N be a subbase for
T2 . Then the following are equivalent:
1. ( f , f → ) : (X1 , T1 ) −→ (X2 , T2 ) is continuous;
2. S (B) ≤ T1 (B ◦ f ) for every B ∈ LX2 .
Proposition 7. Let ( f , f → ) : X1 −→ X2 be a morphism in L-SET(M, K) and let T1 be an extensional
(L, N)-topology on X1 . Then the mapping R : L(X2 ,E2 ) −→ N defined by R (B) := T1 (B ◦ f ) for all
B ∈ L(X2 ,E2 ) is an extensional (L, N)-topology on X2 , E2 , L(X2 ,E2 ) , E2 ).
Theorem 8. (a) Category L-TOPN (M, K) is topological over the ground category L-SET(M, K)
with respect to the forgetful functor F : L-TOPN (M, K) −→ L-SET(M, K).
(b) Category EL-TOPN (M, K) is topological over the ground category EL-SET(M, K) with respect
to the forgetful functor F : EL-TOPN (M, K) −→ EL-SET(M, K).
Theorem 9.
(a) L-ETOPN (M, K) is a coreflective subcategory of the category L-TOP(M, K).
(b) EL-ETOPN (M, K) is a coreflective subcategory of the category EL-TOP(M, K)
204
References
[1] U. Höhle, M-valued sets and sheaves over integral commutative cl-monoids, In: Appl. of Category Theory to Fuzzy Subsets S.E. Rodabaugh, E.P. Klement and U. Höhle eds., Kluwer, Dodrecht, Boston, 1992, pp. 33 - 72.
[2] U.Höhle, Many Valued Topology and its Applications, Kluwer Acad. Publ., Boston, Dordrecht,
London, 2001.
[3] U. Höhle, A. Šostak, Axiomatics of fixed-basis fuzzy topologies, In: Mathematics of Fuzzy Sets:
Logic, Topology and Measure Theory , U. Höhle, S.E. Rodabaugh eds. - Handbook Series, vol.3,
Chapter 3, pp. 123 - 271. Kluwer Acad. Publ., Dordrecht, Boston. - 1999.
[4] T. Kubiak, A.Šostak, A fuzzification of the category of M-valued L-topological spaces, Applied
General Topology, (to appear).
[5] S.E. Rodabaugh, Powerset operator foundations for poslat fuzzy set theories and topologies In:
Mathematics of Fuzzy Sets: Logic, Topology and Measure Theory , U. Höhle, S.E. Rodabaugh
eds. - Handbook Series, vol.3. Chapter 2, pp. 91 - 116, Kluwer Acad. Publ., Dordrecht, Boston.
- 1999.
205
A categorical fabric for fuzzy predicate logic
L AWRENCE N EFF S TOUT
Department of Mathematics and Computer Science
Illinois Wesleyan University
Bloomington, IL 61702-2900, USA
E-mail: ▲st♦✉t❅✐✇✉✳❡❞✉
Much of the existing work on categorical foundations for Fuzzy sets deals with a single category of
fuzzy sets with values in a particular lattice with sufficient a dditional properties to capture the connectives used in fuzzy propositional logic. Goguen’s early characterization of fuzzy set categories
[1], my work relating fuzzy set categories to topoi and quasitopoi [10, 11, 12, 13] (particularly using
the Higgs [2] approach to sheaves on a complete Heyting algebra and the fuzzy powerset of Pultr [9]
as starting point2), Höhle’s work on structures based on MV algebras, and further consideration of
monoidal structures and weak classification of subobjects of various kinds [4, 5, 3] all fix the lattice
in which the fuzzy sets are to have their truth values. The categories we have looked at all allow for
a certain amount of internalization of the higher order logic of fuzzy sets with values in a particular
complete lattice ordered semigroup– including both quantification and powerobject formation paralleling, though somewhat more difficult because of non-uniqueness concerns– paralleling the theory in
topoi.
At the Linz seminar in 2000 I presented some preliminary work on properties of the lattice change
functors between categories of fuzzy sets using the Goguen definition and the predicate logic structure given by unbalanced subobjects and a second monoidal structure arising from a t-norm as in [12].
Through participation in the Linz seminar I have become aware of Rodabaugh’s work in fuzzy topology in which a much larger category is considered in fuzzy topologies with values in many different
lattices are all objects in a single category and constructions are allowed to change lattice to solve
topological problems. That suggested to me that it might be valuable to look at a single kind of structure incorporating categorical viewpoints on the propositional and predicate logic of fuzzy sets over
many different lattices. Bart Jacobs’s work on the use of fibrations as a framework for categorical
logic [6] suggested to me that looking at a double fibration (over both Sets and Closg might combine
the structures in categories of fuzzy sets into one rich structure. This paper takes a different approach,
making a structure out of several closely linked categories rather than putting all of the objects into a
single category.
This paper presents an approach to predicate logic in a fuzzy setting using a categorical fabric.
This structure has two dimensions woven together: one dimension connects the predicates of different
types (where types are taken from the “warp” category, often Sets for us) but with a fixed propositional logic given by a complete lattice; the other dimension connects predicates of a single type with
variation of the lattice for propositional logic, making a category of lattices of possible truth values
into the “weft” of our fabric.
If we restrict our attention to fuzzy predicate logic over Sets with values in a particular lattice L for
each set S we get a category PL (S ) (typically a partial order) of predicates about S. These categories
of predicates are connected to each other using trios of functors: for any function f : S −→ T there
206
are functors f ∗ : PL (T ) −→ PL (S), ∃ f : PL (S) −→ PL (T ) and ∀ f : PL (S) −→ PL (T ) with ∃ f −| f ∗−| ∀ f .
Furthermore, a pullback square in Sets
f
S −→ T
h ↓ pull ↓ g
k
U −→ V
gives rise to the Beck conditions
∃h f ∗ = k∗ ∃g and ∀h f ∗ = k∗ ∀g
as in the internal logic of topoi. This representation of predicate logic has its roots in the early work
of Lawvere in [7, 8].
The truth functional nature of fuzzy sets shows up in our ability to recapture the lattice of truth
values L from the structures on the terminal ⊤ (a one element set) and then use the fact that the
terminal is a generator in Sets to recover PL (S) as a colimit of the diagram consisting of the functors
paq∗ : PL (S) −→ PL (⊤) for all of the functions paq : ⊤ −→ S.
If we restrict our attention to a particular set S and look at how variation in the propositional
logic affects predicates we again get from a suitable function of lattices λ : L −→ L′ a trio of functors
λ↑ , λ◦ , λ↓ . In the cases of fuzzy sets with values in the lattices these have the following effects:
λ◦ : PL (S) −→ PL′ (S) takes α : S −→ L to λ ◦ α : S −→ L′
λ↑ : PL′ (S) −→ PL (S) takes β : S −→ L′ to s 7→
λ↓ : PL′ (S) −→ PL (S) takes β : S −→ L′ to s 7→
_
^
{l ∈ L|λ(l) ≤ β(s)}
{l ∈ L|λ(l) ≥ β(s)}
With these definitions λ↑ is the smallest left inverse for λ◦ and λ↓ is the largest left inverse. In particW
V
ular, if λ preserves then λ↑−| λ◦ ; if λ preserves then λ◦−| λ↓ .
If we think of all of the categories PL (S) as objects in a category where the arrows are functors
between them, then the assignment of PL (S) to a set S with functors f ∗ assigned to functions f : S −→
T gives a contravariant functor for each lattice L. All of the functors λ↓ , λ◦ , and λ↑ then give natural
transformations. Naturality of any of these with the covariant functors using ∃ f or ∀ f will require that
λ have further preservation properties or that the relevant lattices be completely distributive.
References
[1] Joseph A. Goguen, Jr. L-fuzzy sets. Journal of Mathematical Analysis and its Appllications,
18:145–174, 1967.
[2] D. Higgs. A category approach to boolean-valued set theory. unpublished manuscript, Waterloo,
1973.
[3] Ulrich Höhle. Fuzzy real numbers as dedekind cuts with respect to a multiple-valued logic.
Fuzzy Sets and Systems, 24:263–278, 1987.
[4] Ulrich Höhle. M-valued sets and sheaves over integral, commutative cl-monoids. In U. Höhle
S.E. Rodabaugh, E.P. Klement, editor, Applications of Category Theory to Fuzzy Subsets.
Kluwer, 1992.
207
[5] Ulrich Höhle and Lawrence Neff Stout. Foundations of fuzzy sets. Fuzzy Sets and Systems,
40(2):257–296, 1991.
[6] Bart Jacobs. Categorical logic and the foundations of type theory, volume 141 of Studies in
logic and the foundations of mathematics. Elsevier Science, Amsterdam, New York, 1999.
[7] F.William Lawvere. Equality in hyperdoctrines and comprehension schema as an adjoint functor. In Applications of Categorical Algebra, number 17 in Proceedings ofSymposia in Pure
Mathematics, pages 1–14. American Mathematical Society, 1970.
[8] F.William Lawvere. Quantifiers and sheaves. In Actes du Congrès International des Mathématiciens (Nice, 1970), volume 1, pages 329–334, Paris, 1971. Gauthier-Villars.
[9] Aleš Pultr. Closed categories and L-fuzzy sets. In Vortrage zur Automaten und Algorithmentheorie. Technische Universität Dresden, 1975.
[10] Lawrence N. Stout. Topoi and categories of fuzzy sets. Fuzzy Sets and Systems, 12:169–184,
1984.
[11] Lawrence N. Stout. Fuzzy set and topos theory. In Proceedings of the Second IFSA Congress,
Tokyo, 1987. IFSA.
[12] Lawrence N. Stout. The logic of unbalanced subobjects in a category with two closed structures.
In U. Höhle S.E. Rodabaugh, E.P. Klement, editor, Applications of Category Theory to Fuzzy
Subsets. Kluwer, 1991.
[13] Lawrence N. Stout. Fuzzy sets with values in a quantale or projectale. In Ulrich Höhle and
Erich Peter Klement, editors, Non-classical Logics and their Applications to Fuzzy Subsets,
pages 219–234. Kluwer Academic Publishers, Dordrecht, Boston, London, 1995.
208
Residuum-based approximate reasoning with distance-based uninorms
M ÁRTA TAKÁCS
Budapest Polytechnic
1081 Budapest, Hungary
E-mail: ♠❛rt❛❅✈ts✳s✉✳❛❝✳②✉✱ t❛❦❛❝s✳♠❛rt❛❅♥✐❦✳❜♠❢✳❤✉
In fuzzy control system the system state is described by a fuzzy rule base system, and the relationship between fuzzy rule base system, system output and system input is modeled by compositional
rule of inference. The first successful practical applications of fuzzy sets were realized by means of
the Mamdani inference [12], but the Mamdani’s approach is not fully coherent with the paradigm of
approximate reasoning [1, 11]. In the fuzzy rule based control theory and usually in the approximate
reasoning the covering over of fuzzy rule base input and rule premise of a rule determine the importance of that fuzzy rule and the rule output, too. The practical realization of that notion usually
depends on the application. A very thorough overview of mathematical background of that principle
can be found in [4, 7]. The Mamdani type controller is based on Generalized Modus Ponens (GMP)
inference rule, and the rule output is given with a fuzzy set, which is derived from rule consequence,
as a cut of them. This cut is the generalized degree of firing level of the rule, considering actual rule
base input, and usually it is the supremum of the minimum of the rule premise and rule input (calculating with their membership functions, of course). In fact the uninorms [5] offer new possibilities in
fuzzy approximate reasoning, because the low level of covering over of rule premise and rule input has
measurable influence on rule output as well. In some applications the meaning of that novel approach,
has practical importance. The modified Mamdani’s approach , with similarity measures between rule
premises and rule input, does not rely on the compositional rule inference any more, but still satisfies
the basic conditions supposed for the approximate reasoning for a fuzzy rule base system [14]. The
using of distance based operators in fuzzy logic control theory (FLC) was described in [13]. From
mathematical point of view, and having results from [3], we can introduce residuum-based inference
mechanism ([9]) using distance-based uninorms.
The distance-based operators can be expressed by means of the min and max operators. The
modification of the distance based operators from [10] is related to the boundary condition for the
neutral element e. The maximum distance minimum operator with respect to e ∈]0, 1] is defined by
max(x, y) if y > 2e − x,
min(x, y) if y < 2e − x,
maxmin
=
e
min(x, y) if y = 2e − x.
The minimum distance minimum operator with respect to e ∈ [0, 1[ is defined by
min(x, y) if y > 2e − x,
max(x, y) if y < 2e − x,
minmin
=
e
min(x, y) if y = 2e − x.
209
The maximum distance maximum operator with respect to e ∈]0, 1] is defined by
max(x, y) if y > 2e − x,
max
maxe = min(x, y) if y < 2e − x,
max(x, y) if y = 2e − x.
The minimum distance maximum operator with respect to e ∈ [0, 1[ is defined by
min(x, y) if y > 2e − x,
max(x, y) if y < 2e − x,
minmin
=
e
max(x, y) if y = 2e − x.
The distance-based operators have the following properties
• maxmin
and maxmax
are uninorms,
e
e
• the dual operator of the uninorm maxmin
is maxmax
e
1−e , and
• the dual operator of the uninorm maxmax
is maxmin
e
1−e .
In [3] and [2] there were studied two important classes of uninorms: the class of left-continuous
and the class of right-continuos ones. We can find there also the properties of the conjunctive leftcontinuous idempotent uninorm with neutral element e ∈]0, 1] , and of the disjunctive right-continuous
idempotent uninorm with neutral element e ∈ [0, 1[ with a super-involutive decreasing unary operator
g. Based on [3] and [2], we conclude: Operator maxmin
0.5 is a conjunctive left-continuous idempotent
uninorm with neutral element e ∈]0, 1] with the super-involutive decreasing unary operator g(x) =
2e − x = 1 − x. Operator minmax
0.5 is a disjunctive right-continuous idempotent uninorm with neutral
element e ∈]0, 1] with the sub-involutive decreasing unary operator g(x) = 2e − x = 1 − x.
The paper [3] contain general theoretical results related the residual implicators of uninorms,
based on residual implicators of t-norms and t-conorms. Residual operator RU , considering a uninorm
U can be represented in the following form for all (x, y) ∈ [0, 1]2
RU (x, y) = sup{z ∈ [0, 1] | U(x, z) ≤ y}.
Uninorms with neutral elements e = 0 and e = 1 are t-norms and t-conorms, respectively, and
related residual operators are investigated in [3, 5, 6, 8, 9]. If we consider a uninorm U with neutral
element e ∈]0, 1[ , then the binary operator RU is an implicator if and only if (∀z ∈]e, 1[)(U(0, z) = 0)
. The residual implicator RU of uninorm U is denoted by ImpU . According to Theorem 8. in [3]
min
we introduce implicator of the distance based operator maxmin
0.5 . Operator max0.5 is a conjunctive
left-continuous idempotent uninorm with the unary operator g(x) = 1 − x, and its residual implicator
Impmaxmin is given by
0.5
max(1 − x, y) if x ≤ y,
(1)
Impmaxmin =
0.5
min(1 − x, y) elsewhere.
In the theory of approximate reasoning introduced by Zadeh in 1979, the knowledge of system
behavior and system control can be stated in the form of if-then rules. In Mamdani-based sources it
was suggested to represent an
if x is A then y is B
210
rule simply as a connection (for example as a t-norm, T (A, B), specially min) between the so called
rule premise: x is A and rule consequence: y is B. Let x be from universe X, y from universe Y , and
let x and y be linguistic variables. Normal fuzzy set A on X ⊂ R finite universe is characterized by its
membership function µA : X −→ [0, 1], and normal fuzzy set B on universe Y ⊂ R is characterized by
its membership function µB : Y −→ [0, 1]. The Generalized Modus Ponens reflects the real influences
of the implication or connection choice on the inference mechanisms in fuzzy systems. Usually the
general rule consequence B′i (y) for ith rule from a rule system, for rule base input A′ (x) is obtained by
′
Bi (y) = sup(T (A′ (x), Imp(Ai (x), Bi (y))).
(2)
x∈X
The FLC rule base output is constructed as a crisp value calculated with a defuzzification model, from
rule base output
′
′
′
′
′
′
Bout (y) = S(Bn , S(Bn−1 , S(. . . , S(B1 , B2 , B1 )))).
′
Rule base output is an aggregation of all rule consequences Bi (y) from the rule base (i = 1, 2, . . . , n).
As aggregation operator, t-conorms are usually used.
Although the minimum plays an exceptional role in fuzzy control theory, there are situations requiring new models. In system control one would intuitively expect: to make the powerful coincidence
between fuzzy sets stronger, and the weak coincidence even weaker. The distance-based operators
group satisfy these properties. The papers [13, 14] contain the basics of approximate reasoning with
distance-based operators using Degree of Coincidence (Doc) in the inference mechanism.
Let we consider residuum-based approximate reasoning and inference mechanism for special class
of distance based operators. Hence, and because of the results from (2), we can consider the general
rule consequence for ith rule from a rule system as
′
′
Bi (y) = sup(maxmin
0.5 (A (x), Impmaxmin (Ai (x), Bi (y))),
0.5
x∈X
or using (1)
′
Bi (y) = sup
x∈X
′
maxmin
0.5 (A (x), max(1 − Ai (x), Bi (y)) if Ai (x) ≤ Bi (y),
′
maxmin
0.5 (A (x), min(1 − Ai (x), Bi (y)) elsewhere.
(3)
The crisp rule base output is constructed also with a defuzzyfication model, from rule base output
′
Bout by (3). As aggregation operator for rule consequences in this case, dual operator maxmax
0.5 of the
min
max0.5 can be used.
Taken into account Proposition 13 from [3], it can be conclude, that conjunctive left-continuous
idempotent uninorm maxmin
0.5 and its implicator Impmaxmin satisfy the inequality
0.5
′
maxmin
0.5 (A (x), Impmaxmin (Ai (x), Bi (y)) ≤ Bi (y)
0.5
if A′ (x) = Ai (x) for all x ∈ X.
1
Acknowledgement
This work was supported by the Hungarian Research Foundation, OTKA T 043177.
211
References
[1] B. De Baets (1996) A note on Mamdani controllers, Intelligent Systems and Soft Comupting for
Nuclear Science and Industry, D. Ruan, E. Kerre. Eds., Singapur: World Scientific, pp., 22-28.
[2] B. De Baets (1999) Idempotent uninorms, Oper. Res. 118, pp. 631-642.
[3] B. De Baets, J. Fodor (1999) Residual operators of uninorms, Soft Computing 3, 89-100.
[4] D. Driankov, H. Hellendron, M. Reinfrank (1996) An Introduction to Fuzzy Control, SpringerVerlag, Berlin-Heidelberg-NewYork.
[5] J. Fodor, B. De Baets, T. Calvo (2003), Structure of uninorms with given continuous underlying
t-norms and t-conorms, 24th Linz Seminar on Fuzzy Sets.
[6] J. Fodor, M. Roubens (1994) Fuzzy Preference Modelling and Multicriteria Decision Support,
Kluwer Academic Publishers.
[7] R. Fullér (1998) Fuzzy reasoning and fuzzy optimization, TUCS General Publication, Turku, Finnland.
[8] E. P. Klement, R. Mesiar, E. Pap (1996) On the relationship of associative compensatory operators to triangular norms and conorms, Uncertainty, Fuzziness and Knowledge-Based Systems 4,
129-144.
[9] E. P. Klement, R. Mesiar, E. Pap (2000) Triangular Norms, Kluwer Academic Publishers.
[10] I. Rudas, O. Kaynak (1998) New Types of Generalized Operations Computational Intelligence,
Soft Computing and Fuzzy-Neuro Integration with Applications, Springer NATO ASI Series.
Series F, Computer and Systems Sciences, Vol. 192. (O. Kaynak, L. A. Zadeh, B. Turksen,I. .J.
Rudas editors), pp. 128-156.
[11] B. Moser, M. Navara, Fuzzy controllers with conditionally firing rules, IEEE Transactions on
fuzzy systems, vol. 10, No. 3, pp. 340-348
[12] E. H. Mamdani, S. Assilian (1975), An experiment in linguistic syntesis with a fuzzy logic controller, Intern. J. Man-Machine Stud. 7., pp. 1-13.
[13] M. Tákács (2003), Similarity measures in approximate reasoning and in fuzzy logic control
theory, in Proceedings of the ICCC 2003 Conference, Siofok, Hungary, 2003, August.
[14] M. Tákács (2003a), Approximate reasoning with Distance-based Operators and degrees of coincidence, in Principles of Fuzzy Preference Modelling and Decision Making, edited by Bernard
de Baets, János Fodor, Academia Press Gent, 2003
212
Fuzzy deductive and inductive systems with similarity based unification
P ETER VOJTÁŠ
Institute of Informatics
P. J. Safárik University
04154 Košice, Slovak Republic
E-mail: ✈♦❥t❛s❅✉♣❥s✳s❦
We will present mathematical results on deductive and inductive aspects of different rule based systems of fuzzy logic motivated by computer science applications and related to fuzzy logic programming (FLP), fuzzy databases, fuzzy inductive logic programming (FILP) and fuzzy similarity based
unification. We refer on results obtained with several coauthors. Our results are mainly generalizations of older results of many other researchers in the direction of extending them to a wider class of
operators. In the talk we will try to put them into a suitable historical perspective (which we cannot
list completely here in this extended abstract).
We split our presentation to results on rule based systems and to results on fuzzy similarity based
unification.
In the classical logic the implication H ← B is equivalent to the clause H ∨ ¬B. This is no more
true in fuzzy logic in general. So, it is natural to study two types of rule systems – those where rules
are implications and those where rules are clauses ([2]).
Implication rule systems without negation. We will study an FLP system based on the fuzzy
modus ponens for weighted formulas
(B, b), (H ← B, r)
(H,CI (b, r))
where I is the truth function of the implication ←, and CI is the residual conjunctor (not necessary a
t-norm). The FLP computation can be based on the backward use of this rule, namely, starting with
query ? − H, having the rule (H ← B, r) we proceed with query ? −CI (B, r), and having the fact (B, b)
we finish with the computed answer CI (b, r). The notion of a correct answer is based on satisfaction of
truth functional fuzzy logic in narrow sense ([4]). To model the aggregation of partial results, bodies
of our rules have the form @(B1 , . . . , ...Bn ).
We prove ([10]) a Pavelka-like completeness results for implication rule based FLP systems without negation under condition that all CI ’s and aggregations @ in body are left continuous.
We show ([6]) that FLP are equivalent to a variant of generalized annotated programs GAP under
following transformations:
FLP (H ← @(B1 , . . . , Bn ), r) transform to GAP H : CI (@(x1 , . . . , xn ), r) ← B1 : x1 & . . . &Bn : xn
where CI (@(x1 , . . . , xn ), r) is here considered as an head annotation term and
GAP H : f (x1 , . . . , xn ) ← B1 : x1 & . . . &Bn : xn transform to FLP (H ← @ f (B1 , . . . , Bn ), 1)
213
where @ f is a body aggregation induced by the head annotation term f .
We study a fuzzy relational algebra based on this FLP and discuss join evaluation strategies for
finding best, top-k, threshold and ε-best answer based on an upper residuation operator.
A model of fuzzy inductive logic programming ([11]) is based on a multiple use of classical
ILP system learning the annotation term of the transformed GAP program for a graded classification
example. A comparison with classification trees on a small example will be given. A problem of
learning with qualitative condition will be formulated.
Our acquaintance is that FLP systems are more suitable for deductive (database) applications and
GAP systems are more suitable for inductive tasks. Equivalence between FLP and GAP yields a
system with unified deductive and inductive part. Informally, we can say, that what is in FLP hidden
in the aggregation operator of the body, this is in the GAP represented by the annotation term of the
head of the rule.
We will discuss connections of FLP, and more directly of GAP, to Bayesian networks, where the
probability production operator corresponds to the head annotation term.
Fuzzy resolution for clausal rule systems. We study operators f∨ for which the fuzzy resolution
rule with weighted clauses
(γ ∨ α, x), (β ∨ ¬α, y)
(γ ∨ β, f∨ (x, y))
is sound and compare it to results in the deMorgan logic with involutive negation ([1,5]), approximate
reasoning, possibilistic logic and different forms of residuation and fuzzy operators. Having D the
truth function of the disjunction and RD the corresponding residual, for the operator
f∨ (x, y) = inf (D(RD (a, x), RD (1 − a, y)))
a∈[0,1]
we prove the soundness result ([9]).
Similarity based unification. Based on the presented model of FLP ([7]), a similarity based unification approach is constructed by adding axioms of fuzzy equality to a fuzzy logic program. Connections to several max-min similarity based systems ([3], [8]]) are discussed. Several models of
generating fuzzy similarities are presented (e.g. from the geometry of the sample space, from fuzzy
sets of linguistic expressions, ...).
From a point of view of flexible querying systems, we consider the object-attribute model. We
distinguish, whether the data type of the attribute value is an element of the attribute domain from the
case when the data type is a subset of the domain. In the case when a fuzzy set acts as an attribute
value of data type being an element of the domain, we discuss several possibilities of defining the
degree of unification (e.g. degree of fuzzy equality of fuzzy sets, measure theoretic and metric space
approach, generalization of the probability of the equality of two random variables, ...).
We will illustrate our approach on several small illustrative examples. Several problems will be
formulated.
References
[1] D. Butnariu, E. P. Klement, S. Zafrany: On triangular norm-based propositional fuzzy logics,
Fuzzy Sets and Systems 69 (1995), 241–295.
214
[2] D. Dubois, J. Lang, H. Prade: Fuzzy sets in approximate reasoning. Part 2: Logical approaches,
Fuzzy Sets and Systems 40 (1991) 203–244
[3] F. Formato, G. Gerla, M. I. Sessa: Similarity based unification, Fund. Inform. 41 (2000) 393–414
[4] P. Hájek: Metamathematics of fuzzy logic, Kluwer, Dodrecht, (1999)
[5] E. P. Klement, M. Navara: A survey of different triangular norm-based propositional logics,
Fuzzy Sets and Systems 101 (1999) 241–251
[6] S. Krajči, R. Lencses, P. Vojtáš: A comparison of fuzzy and annotated logic programming, To
appear in Fuzzy Sets and Systems 2004
[7] J. Medina, M. Ojeda-Aciego, P. Vojtáš: Similarity based unification: a multiadjoint approach,
To appear in Fuzzy Sets and Systems 2004
[8] M. I. Sessa: Approximate reasoning by similarity-based SLD resolution, Theoret. Comp.
Sci. 275 (2002) 389–426
[9] D. Smutná-Hliněná, P. Vojtáš: Graded many-valued resolution with aggregation, To appear in
Fuzzy Sets and Systems 2004
[10] P. Vojtáš: Fuzzy logic programming, Fuzzy Sets and Systems 124 (2001) 361–370
[11] P. Vojtáš, T. Horváth, S. Krajči, R. Lencses: An ILP model for a monotone graded classification
problem, To appear in Kybernetika 2004
215
216
Fuzzy Logic Laboratorium Linz-Hagenberg
Dept. of Knowledge-Based Mathematical Systems
Johannes Kepler Universität
Software Competence Center Hagenberg
Hauptstrasse 99
A-4232 Hagenberg, Austria
A-4040 Linz, Austria
Tel.: +43 732 2468 9194
Tel.: +43 7236 3343 800
Fax: +43 732 2468 1351
Fax: +43 7236 3343 888
E-Mail: info@flll.jku.at
WWW: http://www.flll.jku.at/
E-Mail: sekr@scch.at
WWW: http://www.scch.at/