[go: up one dir, main page]

Academia.eduAcademia.edu
LINZ 2004 th 25 Linz Seminar on Fuzzy Set Theory Mathematics of Fuzzy Systems Bildungszentrum St. Magdalena, Linz, Austria February 3 – 7, 2004 Abstracts Erich Peter Klement, Endre Pap Editors LINZ 2004 — M ATHEMATICS OF F UZZY S YSTEMS A BSTRACTS Erich Peter Klement, Endre Pap Editors Printed by: Universitätsdirektion, Johannes Kepler Universität, A-4040 Linz 2 Since their inception in 1979 the Linz Seminars on Fuzzy Set Theory have emphasized the development of mathematical aspects of fuzzy sets by bringing together researchers in fuzzy sets and established mathematicians whose work outside the fuzzy setting can provide direction for further research. The seminar is deliberately kept small and intimate so that informal critical discussion remains central. There are no parallel sessions and during the week there are several round tables to discuss open problems and promising directions for further work. LINZ 2004 will be already the 25th seminar carrying on this tradition. It is therefore a good opportunity to review the most important mathematical aspects of fuzzy systems. As usual, the aim of the seminar is an intermediate and interactive exchange of surveys and recent results. We expect that the presented talks will provide a comprehensive mathematical framework for the theory and application of fuzzy systems. Erich Peter Klement Endre Pap 3 4 Program Committee Endre Pap (Chairman), Novi Sad, Serbia and Montenegro Ulrich Bodenhofer, Hagenberg, Austria Dan Butnariu, Haifa, Israel Didier Dubois, Toulouse, France János C. Fodor, Budapest, Hungary Lluis Godo, Barcelona, Spain Siegfried Gottwald, Leipzig, Germany Petr Hájek, Praha, Czech Republic Ulrich Höhle, Wuppertal, Germany Erich Peter Klement, Linz, Austria Wesley Kotzé, Grahamstown, South Africa Radko Mesiar, Bratislava, Slovak Republic Daniele Mundici, Milano, Italy Stephen E. Rodabaugh, Youngstown, OH, USA Marc Roubens, Liège, Belgium Lawrence N. Stout, Bloomington, IL, USA Aldo Ventre, Napoli, Italy Siegfried Weber, Mainz, Germany Executive Committee Erich Peter Klement Ulrich Höhle Stephen E. Rodabaugh Siegfried Weber Local Organizing Committee Erich Peter Klement (Chairman), Fuzzy Logic Laboratorium Linz-Hagenberg Ulrich Bodenhofer, Software Competence Center Hagenberg Sabine Lumpi, Fuzzy Logic Laboratorium Linz-Hagenberg Susanne Saminger, Fuzzy Logic Laboratorium Linz-Hagenberg 5 6 Contents María Ángeles Gil Fuzzy random variables: development and state of the art . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 Joseph M. Barone Fuzzy filter functors revisited: a 2-categorical overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 Raymond Bisdorff On a natural fuzzification of Boolean logic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 Ulrich Bodenhofer, Bernard De Baets, János C. Fodor A review of construction and representation results for fuzzy weak orders . . . . . . . . . . . . . . . . . . . . . . 27 Giulianella Coletti A bridge between fuzzy set theory and coherent conditional probabilities (II) . . . . . . . . . . . . . . . . . . . 29 Bernard De Baets, Hans De Meyer Stable commutative copulas in pairwise comparison models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 Mustafa Demirci Vague ordered fields: towards an axiomatic theory of vague real line . . . . . . . . . . . . . . . . . . . . . . . . . . 37 Antonio Di Nola, Brunella Gerla MV-algebras and semirings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 Didier Dubois, Henri Prade On different ways of ordering conjoint evaluations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 Didier Dubois, Henri Prade, Philippe Smets A definition of subjective possibility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47 Patrik Eklund, Werner Gähler Partially ordered monads and powerset Kleene algebras . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 Anna Frascella, Cosimo Guido Structured lattices and ground categories of L-sets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 Siegfried Gottwald Fuzzy relation equations and fuzzy control — some old and some new ideas . . . . . . . . . . . . . . . . . . . . 55 Michel Grabisch Capacities on lattices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 7 Javier Gutiérrez García Order-reversing involutions and residuated lattices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61 Petr Hájek Fuzzy predicate logic — a survey . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65 Ulrich Höhle Fuzzy sets and sheaves . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68 Martin Kalina, Ol’ga Nánásiová Joint distributions on MV-algebras as interactions of fuzzy events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70 Frank Klawonn The concept of independence in the context of similarity relations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74 Erich Peter Klement, Radko Mesiar, Endre Pap Triangular norms as special semigroups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76 Anna Kolesárová A characterization and composition of quasi-copulas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83 Jari Kortelainen Modifying L-sets: two views based on level-sets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91 Volker Krätschmer Integrals of random fuzzy sets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93 Tomáš Kroupa Copulas and characterization of T -product possibility measures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104 Tomasz Kubiak Semicontinuous L-real valued functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108 Paavo Kukkurainen Topological locally finite MV-algebra and the Riemann surface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110 Grigorii Litvinov Dequantization of mathematics, idempotent semirings and fuzzy sets . . . . . . . . . . . . . . . . . . . . . . . . . 113 Koen Maes, Bernard De Baets De Morgan triplets in the theory of fuzzified normal forms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118 Jean-Luc Marichal k-intolerant capacities and Choquet integrals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123 8 Ricardo A. Marques Pereira, Silvia Bortot Choquet measures, Shapley values, and inconsistent pairwise comparison matrices: an extension of Saaty’s A.H.P. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130 Jorma K. Mattila Construction of compositional modifiers generated by n-ary functions . . . . . . . . . . . . . . . . . . . . . . . . 136 Patrick Meyer, Marc Roubens Ordinal sorting in the presence of interacting points of view: TOMASO . . . . . . . . . . . . . . . . . . . . . . . 144 Mirko Navara, Pavel Pták Regular measures on tribes of fuzzy sets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153 Vilém Novák The logic and algebra of fuzzy IF-THEN rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162 Irina Perfilieva Solvability and approximate solvability of a system of fuzzy relation equations from functional point of view . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164 Stephen E. Rodabough Point-set lattice-theoretic (poslat) topology: a (partly) categorical perspective . . . . . . . . . . . . . . . . 181 Romano Scozzafava A bridge between fuzzy set theory and coherent conditional probabilities (I) . . . . . . . . . . . . . . . . . . . 194 Mamoru Shimoda Fuzzy group in a natural interpretation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199 Alexander Šostak On many-valued topologies on L-powersets of many-valued sets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202 Lawrence Neff Stout A categorical fabric for fuzzy predicate logic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206 Márta Takács Residuum-based approximate reasoning with distance-based uninorms . . . . . . . . . . . . . . . . . . . . . . . 209 Peter Vojtáš Fuzzy deductive and inductive systems with similarity based unification . . . . . . . . . . . . . . . . . . . . . . .213 9 10 Fuzzy random variables: development and state of the art M ARÍA Á NGELES G IL Departamento de Estadística e I.O. y D.M. Universidad de Oviedo 33071 Oviedo, Spain E-mail: ❛♥❣❡❧❡s❅♣✐♥♦♥✳❝❝✉✳✉♥✐♦✈✐✳❡s 1 Introduction The concept of random variable is clearly fundamental to the fields of Probability and Statistics. A random experiment is a process in which the result or outcome is not known with certainty before the experiment is performed. A (classical) random variable is a measurable function defined on the sample space of the random experiment which converts each particular experimental outcome into a real or vectorial value. Measurability is supposed to guarantee that many useful probabilities can be computed. In addition to randomness, a certain imprecision can arise either in perceiving or reporting existing real/vectorial values, or in identifying existing values which are essentially imprecise. Fuzzy random variables have been introduced to model imprecisely-valued measurable functions where imprecision is formalized in terms of fuzzy sets. 2 Fuzzy random variables as a model for fuzzy perceptions/observations of existing real-valued random mechanisms Kwakernaak (1978, 1979), and later Kruse and Meyer (1987) in a more elaborated way, introduced fuzzy random variables as a model for the situations in which fuzzy imprecision arises either in the perception or in the report of values of a real-valued random variable (referred to as the ‘original’). Let Fc (R) denote the class of the normal convex fuzzy subsets of the Euclidean space R having compact α-levels for α ∈ [0, 1], that is, the class of mappings U : R −→ [0, 1] such that Uα = {x ∈ R |U(x) ≥ α} if α ∈ (0, 1], = cl(suppU) if α = 0, are nonempty compact intervals. Then, Definition 1. (Kruse and Meyer, 1987) Let (Ω, A , P) be a probability space. A fuzzy random variable is a mapping X : Ω −→ Fc (R) such that for any inf Xα :   α ∈ [0, 1] the real-valued mappings Ω −→ R, sup Xα : Ω −→ R (with inf Xα (ω) = inf X (ω) α , sup Xα (ω) = sup X (ω) α , for all ω ∈ Ω) are real-valued random variables (i.e., Borel-measurable real-valued functions). In this approach when one refers to parameters associated with a fuzzy random variable, one is considering either real/vectorial-valued parameters of the probability distribution of the original random variable or fuzzy-valued parameters defined on the basis of Zadeh’s extension principle (see 11 Kruse and Meyer, 1987). Thus, if θ(X) is a parameter of a real-valued random variable X, and E (Ω, A , P) is the class of possible originals of X , the associated fuzzy parameter of variable X corresponds to θ(X ) : R −→ [0, 1] such that   θ(X )(t) = sup inf X (ω) X(ω) for all t ∈ R. X∈E (Ω,A ,P), θ(X)=t ω∈Ω In particular, when θ(X) = E(X|P) is the population expected valueof X, then the population fuzzy expected value θ(X ) is the fuzzy set in Fc (R) such that θ(X ) α = E(inf Xα |P), E(sup Xα |P) for all α ∈ [0, 1]. 3 Fuzzy random variables as a model for existing fuzzy-valued random mechanisms A second approach to fuzzy random variables conceives them as a model for the situations in which fuzzy imprecision arises in the definition of the values of the random mechanism or variable. More precisely, a fuzzy random variable is intended to be a measurable function defined on the sample space of the random experiment and converting each particular experimental outcome into a fuzzy subset of a separable Banach space (often a Euclidean one). Let (B, | · |) be a separable Banach space, and let F (B) = {U : B −→ [0, 1] |Uα ∈ K (B) for all α ∈ [0, 1]}, with Uα = {x ∈ B |U(x) ≥ α} for α ∈ (0, 1], = cl(suppU) if α = 0, and K (B) = {nonempty bounded and closed subsets of B}. In other words, F (B) is the class of the normal upper semicontinuous [0, 1]-valued functions defined on B with bounded closure of the support. Puri and Ralescu (1986) formalized fuzzy random variables (also called random fuzzy sets) as an extension of random sets as follows: Definition 2. (Puri and Ralescu, 1986) Let (Ω, A , P) be a probability space. A fuzzy random variable is a mapping X : Ω −→  F (B) such that for any α ∈ [0, 1] the set-valued mapping Xα : Ω −→ K (B) (with Xα (ω) = X (ω) α for all ω ∈ Ω) is a compact random set, that is, it is Borel-measurable with the Borel σ-field generated by the topology associated with the well-known Hausdorff metric on K (B),   ′ ′ |k − k |, sup inf |k − k | . dH (K, K ′ ) = max sup inf ′ ′ k∈K k ∈K k′ ∈K ′ k∈K Recently (see Colubi et al., 2001, 2002), Definition 3.1 has been proven to be equivalent to the one formalizing fuzzy random variables as F (B)-valued random elements (that is, Borel-measurable F (B)-valued functions) when F (B) is equipped with the Skorohod metric   ′ ′ dS (U,U ) = inf max sup |λ(α) − α| , sup dH (Uα ,Uλ(α) ) , λ∈Λ α α where Λ = {λ : [0, 1] −→ [0, 1] | strict increasing function with λ(0) = 0, λ(1) = 1} for U,U ′ ∈ F (B). Furthermore (see also Colubi et al., 2001, 2002), the measurability condition in Definition 3.1 has been proven to be equivalent to that (cf. Diamond and Kloeden, 1994) based on the dq metrics on R  q 1/q F (B) by Klement et al. (1986), for all q ∈ [1, ∞), where dq (U,U ′ ) = [0,1] dH (Uα ,Uα′ ) dα . On the other hand, Klement et al. (1986) have introduced fuzzy random variables as F (B)-valued random elements when F (B) is equipped with the sup-metric, that is, 12 Definition 3. (Klement, Puri and Ralescu, 1986) Let (Ω, A , P) be a probability space. A fuzzy random variable is a mapping X : Ω −→ F (B) which is Borel-measurable with the Borel σ-field generated by the topology associated with the metric d∞ (U,U ′ ) = sup dH (Uα ,Uα′ ) for all U,U ′ ∈ F (B). α∈[0,1] The connections between notions in Definitions 3.1 and 3.2 are the following ones (see Colubi et al., 2001, 2002): Proposition 4. If X : Ω −→ F (B) is Borel-measurable with the Borel σ-field generated by the topology associated with d∞ , then it is Borel-measurable with the Borel σ-field generated by the topology associated with the dS . However, the converse implication fails, since the requirements for fuzzy random variables in Definition 3.2 are too rectrictive. An illustrative counterexample for this assertion can be found in Colubi et al. (2002). Moreover, when B = R and Im X ⊂ Fc (R), then Definitions 2.1 and 3.1 coincide (see, for instance, Zhong and Zhou, 1987), although they represent models for different situations in practice. In this second approach the parameters associated with a fuzzy random variable X are usually defined on the basis of those  for the corresponding parameters for compact random sets. As an example, if E dH (X0 , {0}) P < ∞, then Puri and Ralescu (1986) have  defined the fuzzy expected value of X as the unique fuzzy set E(X |P) ∈ F (B) such that E(X |P) α = Aumann’s integral of the com  pact random set Xα for all α ∈ [0, 1] (i.e., E(X |P) α = E(X|P) | X : Ω −→ B, X ∈ L1 (Ω, A , P), X ∈ Xα a.s. [P] ). It is convenient to remark that ranges of fuzzy random variables have been extended in some studies to include unbounded values (see, for instance, Li and Ogura, 1999). 4 Some probabilistic and statistical studies concerning fuzzy random variables Since from a mathematical viewpoint Definition 3.1 includes 2.1 and 3.2 as special cases, from now on we will assume fuzzy random variables we deal with are random elements in the Skorohod sense. Metric properties of the space (F (B), dS ) indicate (Colubi et al., 2002) that it is complete and separable. In this respect, it should be pointed out that (F (B), d∞ ) is complete but non-separable (Puri and Ralescu, 1986, Klement et al., 1986), whence handling this space would be definitely more complex than working with (F (B), dS ). Fuzzy random variables can be characterized in general as certain limits of sequences of elementary types (more precisely, either simple or having simple α-levels) of these variables (see López-Díaz and Gil, 1997, 1998a). In the set-valued case, when we work in a statistical setting the choice of the Aumann expectation (1965) of a compact random set among possible integrals (see, for instance, Molchanov, 1998), can be justified by means of the Laws of Large Numbers for random sets (see Artstein and Vitale, 1975). 13 In an analogous way, Laws of Large Numbers (like those by Klement et al., 1986, Colubi et al., 1999, Molchanov, 1999, Taylor et al., 2001, Krätschmer, 2002, Proske and Puri, 2003, and so on) justify the choice of the fuzzy expected value in Puri and Ralescu’s sense. Some other probabilistic results concerning differentiability (see, for instance, Puri and Ralescu, 1983, Román-Flores and Rojas Medar, 1998, Rodríguez-Muñiz et al., 2003), integrability (see, for instance, Gong and Wu, 2002, Rodríguez-Muñiz and López-Díaz, 2003, Krätschmer, 2004), limit theorems (cf. Taylor et al., 2001, Li et al., 2003), reversing the order of integration (see López-Díaz and Gil, 1998b), fuzzy martingales (see, Stojaković, 1994, Li and Ogura, 2001, Terán, 2003), and so on, can be found in the recent literature. In which concern statistical developments involving fuzzy random variables, we can mention on one hand decision problems including fuzzy-valued utilities or rewards (see Gil and López-Díaz, 1996, Kurano et al., 2002), regression analysis (see Näther and Körner, 2002, Wünsche and Näther, 2002) and, on the other hand, recent studies on inferential techniques on either real- or fuzzy-valued parameters of a fuzzy random variable. As an example for the last one, we can mention inferences on the fuzzy expected value of a fuzzy random variable (see Körner, 2000, Montenegro et al., 2003). Acknowledgements The research in this paper has been partially supported by MCYT Grant BFM2002-01057. The financial support is gratefully acknowledged. The author is grateful to her colleagues Professors Miguel López-Díaz, Ana Colubi and J. Santos Domínguez-Menchero, as well as to Professor Dan A. Ralescu from the University of Cincinnati (Ohio), for the valuable studies they have developed in connection with fuzzy random variables. References Artstein, Z. and Vitale, R.A. (1975). A strong law of large numbers for random compact sets. Ann. Probab. 3, 879–882. Aumann, R.J. (1965). Integrals of set-valued functions. J. Math. Anal. Appl. 12, 1–12. Colubi, A., Domínguez-Menchero, J.S., López-Díaz, M. and Ralescu, D.A. (2001). On the formalization of fuzzy random variables. Inform. Sci 133, 3–6. Colubi, A., Domínguez-Menchero, J.S., López-Díaz, M. and Ralescu, D.A. (2002). A DE [0, 1] representation of random upper semicontinuous functions. Proc. Am. Math. Soc. 130, 3237–3242. Colubi, A., López-Díaz, M., Domínguez-Menchero, J.S. and Ralescu, D.A. (1999). A generalized strong law of large numbers. Probab. Theory Relat. Fields 114, 401–417. Diamond, P. and Kloeden, P. (1994). Metric Spaces of Fuzzy Sets: Theory and Applications. World Scientific. Gil, M.A. and López-Díaz, M. (1996). Fundamentals and Bayesian analyses of decision problems with fuzzy-valued utilities. Int. J. Appr. Reas. 15, 203–224. Gong, Z. and Wu, C. (2002). Bounded variation, absolute continuity and absolute integrability for fuzzy-number-valued functions. Fuzzy Sets and Systems 129, 83–94. Klement, E.P., Puri, M.L. and Ralescu, D.A. (1986). Limit theorems for fuzzy random variables. Proc. Royal Soc. London A 407, 171–182. Körner, R. (2000). An asymptotic α-test for the expectation of random fuzzy variables. J. Stat. Plann. Infer. 83, 331–346. Krätschmer, V. (2002). Limit Theorems for fuzzy-random-variables. Fuzzy Sets and Systems 126, 253–263. Krätschmer, V. (2004). Integrals of random fuzzy sets. Proc. 25th Linz Sem. on Fuzzy Set Theory (This volume). Kruse, R. and Meyer, K.D. (1987). Statistics with Vague Data. D. Reidel Pub. Co.. Kurano, M., Yasuda, M., Nakagami, J. and Yoshida, Y. (2002). Markov decision processes with fuzzy rewards. Proc. Int. Conf. on Nonlinear Analysis and Convex Analysis (Hirosaki, Japan), 221–232. 14 Kwakernaak, H. (1978, 1979). Fuzzy random variables - I. Definitions and theorems; II. Algorithms and examples for the discrete case. Inform. Sci. 15, 1–9; 17, 253–278. Li, S. and Ogura, Y. (1999). Convergence of set-valued and fuzzy-valued martingales. Fuzzy Sets and Systems 101, 453– 461. Li, S., Ogura, Y. and Nguyen, H.T. (2001). Gaussian processes and martingales for fuzzy valued random variables with continuous parameter. Inform. Sci. 133, 7–21. Li, S., Ogura, Y., Proske, F.N. and Puri, M.L. (2003). Central limit theorems for generalized set-valued random variables. J. Math. Anal. Appl. 285, 250–263. López-Díaz, M. and Gil, M.A. (1997). Constructive definitions of fuzzy random variables. Stat. Probab. Lett. 36, 135–143. López-Díaz, M. and Gil, M.A. (1998a). Approximating integrably bounded fuzzy random variables in terms of the “generalized” Hausdorff metric. Inform. Sci. 104, 279–291. López-Díaz, M. and Gil, M.A. (1998b). Reversing the order of integration in iterated expectations of fuzzy random variables, and statistical applications. J. Stat. Plann. Infer. 74, 11–29. Molchanov, I.S. (1998). Averaging of random sets and binary images. CWI Q. 11, 371–384. Molchanov, I.S. (1999). On strong laws of large numbers for random upper semicontinuous functions. J. Math. Anal. Appl. 235, 349–355. Montenegro, M., Colubi, A., Casals, M.R. and Gil, M.A. (2003). Asymptotic and bootstrap techniques for testing the expected value of a fuzzy random variable. Metrika (in press). Näther, W. and Körner, R. (2002). Linear regression with random fuzzy observations.In Statistical Modelling, Analysis and Management of Fuzzy Data (C. Bertoluzza, M.A. Gil, D.A. Ralescu, eds.), Physica-Verlag, 282–305. Proske, F.N. and Puri, M.L. (2003). A strong law of large numbers for generalized random sets from the viewpoint of empirical processes. Proc. Amer. Math. Soc. 131, 2937–2944. Puri, M.L. and Ralescu, D.A. (1986). Fuzzy random variables. J. Math. Anal. Appl. 114, 409–422. Rodríguez-Muñiz, L.J. López-Díaz, M., Gil; M.A. and Ralescu, D.A. (2003). The s-differentiability of a fuzzy-valued mapping. Inform. Sci. 151, 283–299. Rodríguez-Muñiz, L.J. and López-Díaz, M. (2003). Hukuhara derivative of the fuzzy expected value. Fuzzy Sets and Systems 138, 593–600. Román-Flores, H. and Rojas-Medar, M. Differentiability of fuzzy-valued mappings. Rev. Mat. Estat. 16, 223–239. Stojaković, M. (1994). Fuzzy random variables, expectation, and martingales. J. Math. Anal. Appl. 184, 594–606. Taylor, R.L., Seymour, L. and Chen, Y. (2001). Weak laws of large numbers for fuzzy random sets. Nonlinear Analysis 47, 1245–1256. Terán, P. (2004). Cones and decomposition of sub- and supermartingales. Fuzzy Sets and Systems (in press). Wünsche, A. and Näther, W. (2002). Least-squares fuzzy regression with fuzzy random variables. Fuzzy Sets and Systems 130, 43–50. Zhong, C. and Zhou, G. (1987). The equivalence of two definitions of fuzzy random variables. Proc. 2nd IFSA Congress (Tokyo, Japan), 59–62. 15 Fuzzy filter functors revisited: a 2-categorical overview J OSEPH M. BARONE 321 East 43rd Street New York, NY 10017, USA E-mail: s❡❝r❡t❛r②❅♥❛❢✐♣s✳♦r❣ It was noted in [1] that limits in 2-categories are not as easy to describe as limits in ordinary categories. In particular, there is a class of (2-categorical) limits called weighted or indexed limits [2-4] which can be defined as follows: take a 2-functor G: D −→ H, and define also a weight on D to be a 2-functor F: D −→ CAT (the category of categories). If, following the notation of [4], we denote by [D, CAT] the 2-category whose objects are 2-functors from D to CAT, whose 1-cells are natural transformations, and whose 2-cells are modifications, then the F-weighted limit of G: D −→ H is a representing object for [D, CAT] (F, H(-, G)). A great advantage of a 2-categorical point-of-view and of the more general versions of limits it allows is that paths are opened to simple algebraic constructions over categories which may not be available if the scope is restricted to ordinary categories. Eklund and Gahler [5] defined a fuzzy filter to be an element M of LLx s.t. (1) M(α− ) = α (α is the constant mapping of X into L with value α) (2) f, g in LX and f ≤ g imply M(f) ≤ M(g) (3) ∀f, g in LX , M(f ∧ g) ≥ M(f) ∧ M(g) where X is a set and M is a meet semilattice. They then define the covariant set functor FL related to L, which they call the fuzzy filter functor, to be the functor which assigns each set X to the set of all (L-) fuzzy filters on X. When L is {0, 1}, they call FL the proper filter functor. As noted in [1], they show that the proper filter functor becomes a monad in certain cases, as does the fuzzy filter functor, and they point out that Eilenberg-Moore objects can be defined for the proper filter functor as monad, but they do not carry this further to FL as monad. But, again as discussed in [1], a great deal more can be done. In fact, it is proved in [1] that the fuzzy filter functor is (isomorphic to) a 2-functor FS : Dsimp −→ idl, where Dsimp is the category with one object (*) whose morphisms (from * to *) comprise the simplicial category of finite ordinals and order-preserving maps (see [2] or [4]) and idl is the 2-category whose 1-cells (morphisms) are order-ideals (relations compatible with the orders on the domain and on the codomain) and whose 2-cells are inclusions. Given this, Eilenberg-Moore objects for the fuzzy filter functor emerge naturally as they do for any other 2-functor from Dsimp to any 2-category. Furthermore, it is known that Eilenberg-Moore objects are constructible from products, inserters, and equifiers (see [4], p. 44). Since Eilenberg-Moore objects are constructible from the fuzzy filter functor, it must be the case that a relation exists between the fuzzy filter functor and the more elementary constructs products, inserters, and equifiers. This means that the fuzzy filter functor can be broken down into a set of simpler functors (details and references may be found in [1]). This paper carries these results and ideas a bit further. We describe, first of all, exactly what these constructs (products, inserters, and equifiers) which underlie the fuzzy functor would look like. Second, we show that certain already known properties of the fuzzy filter functor have very simple 16 2-categorical analogues. Thus, for instance, the fact the fuzzy filter monad is a submonad of the crisp filter monad ([5], Prop. 7.14, p.135) has an interesting simple expression when expressed in 2-categorical terms. We also explore the implications of this 2-categorical view for fuzzy topology. Perhaps most importantly, this paper takes a number of finite limit types, including products, inserters, equifiers, inverters, and lax limits, and describes how requirements for their existence “constrain” the set (lattice, semilattice, ...) over which the fuzzy filters are taken and how they constrain the nature of the fuzzy filters themselves. Consider, for instance, the inserter. If I is the inserter object and A is any object, then for any pair of 1-cells a, b : A -> I, there must exist a 2-cell (the “inserted” 2-cell) θ : i • a => i • b (see, e.g., [4], p. 38). Now consider the enriched monad D of finitely generated up sets over Pos as described in [6] (see esp. p. 262). The internal hom-functor over its (strict) algebras is given by the equalizer Hom((B, ≤), (A, ≤)) = all order-preserving maps in AB ordered pointwise which equalizes AB − > A(DB) and AB − > DA(DB) − > A(DB) . If we now “generalize” this equalizer to be an inserter, we must restrict further the set of maps in Hom((B, ≤), (A, ≤)) to ensure that the inserted 2-cells actually exist. Such restrictions and conditions have interesting implications for the nature of Eilenberg-Moore objects over fuzzy filters and for fuzzy topologies. SOME USEFUL BACKGROUND MONADS Given a category C, a monad consists of an endofunctor T along with two natural transformations η: idC −→ T and µ : T2 −→ T s.t. µ(A) • Tη(A) = idTA = µ(A) • η(TA) and µ(A) • Tµ(A) = µ(A) • µ(TA). In a 2-category C, a monad may be defined as an object X along with an endo-1-cell S and two 2-cells, a unit 2-cell η: 1 −→ S and a multiplication 2-cell µ: SS −→ S [7]. LIMITS Generally speaking, one takes limits over functors whose domains are small categories (I, J, ...) and whose codomains are locally small categories (C). The so-called abstract definition of a limit is the definition in terms of representations. For a functor G: I −→ C, an object L in C is a limit for G iff there is a representation C(X, L) ∼ = [I, C](∆X, G), i.e., for every natural transformation from the diagonal functor to G there is a representing morphism from X to the limit object in C for every object X in C. This description converts readily to the “concrete” description in terms of cones. Note that for ordinary categories the natural isomorphism from C(X, L) (the covariant hom-functor) to [I, C](∆X, G), two functors from C to Set, is straightforward. Now consider the definition of a limit in a 2-category. We shall define such a limit, for reasons that will soon be apparent, as follows: a (2-categorical) limit L for a 2-functor G: I −→ C is given by the representation C(X, L) ∼ = [Iop , Cat](!, (∆X, G)) (here ! is the terminal 2-category - see [8]). There are two important aspects of this definition for our purposes. First, both sides of the isomorphism are categories (by assumption), so we must take account of 2-cells as well as morphisms (1-cells). Second, we expand the right side to include !; this doesn’t accomplish anything in particular here but will prove useful when we turn to weighted limits below. As far as 2-cells are concerned, the universal property requires that there be an invertible 2-cell which takes each Gu (Gi −→ G j ) • τi (X −→ Gi ) to τ j (X −→ G j ). For full generality, we need somewhat more from our notion of a limit. Suppose we replace the terminal 2-category (!) in our definition above by a (any) 2-functor from I to Cat (known as an “index” or “weight”). Now, since (∆X, G) is also a functor from I to Cat (by composition of G and 17 the hom-functor), a weighted cone over G with vertex X is given by a 2-natural transformation from F to (∆X, G). Where an ordinary limit, then, requires only a single morphism to connect X with each vertex of G (each G(-) in the diagram below), a weighted limit requires a set of morphisms (in fact, since these are 2-categories, a category of morphisms) from X to each Gi . ← X −→ f j ↓ fk ↓ G( j) −→ G(k) u : j −→ k G(u) FUZZY FILTERS AS MONADS There are two fundamental objectives served by the construction of monads in a (2-) category C. One is the derivation of Eilenberg-Moore objects or algebras from the monads, and the other is the construction of a (2-) category of the monads themselves through which functors into C may be factored. Suppose we begin with rel, the 2-category whose objects are sets, whose 1-cells (morphisms) are binary relations, and whose 2-cells (morphisms of morphisms) are inclusions. We ask what sorts of objects in rel (i.e., which sets), if any, are monadic, that is, which objects X may be equipped with an associative multiplication χ (more specifically, an endo-1-cell x and a 2-cell χ such that χ takes xx to x and is associative), and with a unit 2-cell χ‘ from X (i.e., the 1-cell idx ) to x (note that we follow here, for the most part, the presentation in [9]). Monads in rel, then, are just pre-ordered sets <X, ≤>, the pre-ordering providing the obvious multiplication and unit. These pre-ordered sets can be seen to be the objects of a 2-category with morphisms (called M-modules by Koslowski in [9]) <X, ≤> −→ <Y,< − > those relations r for which (≤r) ⊆ r ⊆ (r<-). In other words, if there is an arrow x −→ x’ in X and r: x’ −→ y then also r: x −→ y and the same mutatis mutandis for r, y, and y’. Such relations are called order-ideals, and, along with inclusions as 2-cells, they comprise the category of monads in rel called idl in [9]. We know also ([5], p. 135) that the fuzzy filter functor generates monads in (the ordinary category) set, i.e., that the set of all fuzzy filters on a set X is a monad in set. However, in a 2-categorical sense, the set of all fuzzy filters on a set X may also be thought of as a monad in idl, since such monads are simply closure operators (see [9], p. 198). It is this role which leads to the construction of EilenbergMoore objects for the fuzzy filter functor and hence to pie limits as described above. References 1. J. M. Barone, “Fuzzy Weighted Limits,” Proc. JCIS 2003, Cary, North Carolina, September, 2003, 80-83. 2. R. Street, “Limits Indexed by Category-Valued 2-Functors,” J. Pure Appl. Algebra 8, 1976, 149-181. 3. G. Bird et. al., “Flexible Limits for 2-Categories,” J. Pure Appl. Algebra 61, 1989, 1-27. 4. J. Power and E. Robinson, “A characterization of pie limits,” Math. Proc. Camb. Phil. Soc. 110, 1991, 33-47. 5. P. Eklund and W. Gahler, “Fuzzy Filter Functions and Convergence,” in S. Rodabaugh et. al. (eds.), Applications of Category Theory to Fuzzy Subsets, Dordrecht, Kluwer Academic Publishers, 1992, 109-136. 6. J. Adamek, F. Lawvere, and J. Rosicky, “Continuous Categories Revisited,” Theory and Application of Categories 11, 2003, 252-282. 7. R. Street, “The Formal Theory of Monads,” J. Pure Appl. Algebra 2, 1972, 149-168. 18 8. V. Sassone and P. Sobocinski, “Deriving Bisimulation Congruences using 2-categories,” Nordic Journal of Computing. 9. J. Koslowski, “Monads and Interpolads in Bicategories,” Theory and Applications of Categories 3, 1997, 182-212. 19 On a natural fuzzification of Boolean logic R AYMOND B ISDORFF Faculty of Law, Economics and Finance University of Luxembourg 1511 Luxembourg, G.D. Luxembourg E-mail: ❜✐s❞♦r❢❢❅❝✉✳❧✉ 1 Introduction In this communication we propose two logically sound fuzzification and defuzzification techniques for implementing a credibility calculus on a set of propositional expressions. Both rely on a credibility evaluation domain using the rational interval [−1, 1] where the sign carries a split truth/falseness denotation. The first technique implements the classic min and max operators where as the second technique implements Bochvar-like operators. Main interest in the communication is given to the concept of natural fuzzification of a propositional calculus. A formal definition is proposed and the demonstration that both fuzzification techniques indeed verify this definition is provided. 2 2.1 Logical fuzzification and polarization: an adjoint pair Introducing logical fuzziness Let P be a set of constants or ground propositions. Let ¬, ∨ and ∧ denote respectively the contradiction, disjunction and conjunction operators. The set E of all well formulated finite expressions will be generated inductively from the following grammar: ∀p ∈ P : p ∈ E, ∀x, y ∈ E : ¬x | (x) | x ∨ y | x ∧ y ∈ E. (1) (2) The unary contradiction operator ¬ has a higher precedence in the interpretation of a formula, but we generally use brackets to control the application range of a given operator and thus to make all formulas have unambiguous semantics. We suppose in the sequel that all other operators such as implication, equivalence, xor etc are derived with the help of these three basic operators: contradiction, conjunction and disjunction. With these well formulated propositional expressions we associate a rational credibility evaluation r : E → [−1, 1] where ∀x, y ∈ E, rx = 1 means x is certainly true, rx = −1 means that x is certainly false and rx > ry (resp. rx < ry ) means that propositional expression x is more (resp. less) credible than propositional expression y. Such a credibility domain is called L , and we denote E L = {(x, rx ) | 20 x ∈ E, rx ∈ [−1, 1]} a given set of such more or less credible propositional expressions, also called for short L -expressions. We implement the contradiction operator on L -expressions by simply changing the sign of the associated credibility evaluation, i.e. ∀(x, rx ) ∈ E L : ¬(r, rx ) = (¬x, −rx ). (3) The sign exchange thus implements an antitone bijection on the rational interval [−1, 1] where the zero value appears as contradiction fix-point. In classical bi-valued logic, it is usual to work syntactically only on the truth point of view of the logic, the untruth or falseness point of view being redundant through the coercion to the excluded middle. For instance, writing ”(a, b) ∈ R” implicitly means assuming that this proposition is actually true and its contradiction false, otherwise we would write ”(a, b) 6∈ R”. We will also rely syntactically on such an implicit truthfulness point of view and always denote the truthfulness possibly induced from the underlying credibility calculus through a truth projection operator1 µ, acting as a positive domain and range restriction on the credibility operator r. Figure 1: Split Truth/Falseness Semantics Let (x, rx ) ∈ E L be an L -expression: ( (x, rx ) if rx ≥ r¬x , µ(x, rx ) = (¬x, r¬x ) otherwise. (4) Truthfulness of a given expression x is thus only defined in case the expression’s credibility rx exceeds the credibility r¬x of its contradiction ¬x, otherwise the logical point of view is switched to ¬x, i.e the contradicted version of the expression (see Figure 1). As rx ≥ r¬x ⇔ rx ≥ 0 it follows from Equation 4 that the sign (+ or −) of rx immediately carries the truth functional semantics of L -expressions, in the sense that an L -expression (x, rx ) such that rx ≥ 0 may be called more or less true (L -true for short) and an expression (x, rx ) such that rx ≤ 0 may be called more or less false (L -false for short). 1 In fuzzy set theory, the µ operator generally denotes a fuzzy membership function. We here choose the same µ symbol on purpose as our main L -valued formulas mostly concern L -valued characteristic functions. 21 Only 0-valued expressions appear to be both L -true and L -false, therefore they are called L − undetermined 2 . To be able to compute the credibility evaluation associated with any L -expression, we still need to implement L -valued versions of the conjunction and disjunction operators. The classic min and max operators may be used: ∀(x, rx ), (y, ry ) ∈ E L : (x, rx ) ∨ (y, ry ) = (x ∨ y, max(rx , ry )) (x, rx ) ∧ (y, ry ) = (x ∧ y, min(rx , ry )) (5) (6) The operator triple < −, min, max > implements on the rational interval [−1, 1] an ordinal credibility calculus, denoted for short Lo , that gives a first example of what we shall call a natural fuzzification of propositional calculus. To appreciate usefulness of our split truth/falseness semantics, let us look at what happens in the Lo -valued framework with the truthfulness of certain classical tautologies or antilogies. For instance, truthfulness of the tautology (x ∨ ¬x) is always given, as max( rx , −rx ) ) ≥ 0 in any case. Tautological Lo -valued propositions thus appear as being Lo -true in any case. Therefore we call them Lo -tautologies. On the other hand, truthfulness of the antilogy (x ∧ ¬x) is only defined when min(rx , r¬x ) = 0. More or less “untruthfulness” of such an expression is however always given. Therefore, we call such propositions Lo -antilogies. Finally, let us investigate an implicative Lo -tautology such as the modus ponens for instance. If we take the classical negative (Kleene-Dienes) definition of the implication, i.e. falseness of the conjunction of r(x) and ¬r(y), we obtain min( rx , max(−rx , ry ) ) ≥ 0 ⇒ ry ≥ 0, i.e. the following Lo -tautology: “ (x, rx ) and (x, rx ) ⇒ (y, ry ) being conjointly Lo -true always implies (y, ry ) being Lo -true “. As a main result of our construction, we recover in this sense all classical tautologies and antilogies as particular limit case if we reduce our Lo -valued credibility calculus to a bi-valued {−1, 1} one. 2.2 On natural logical polarization To explore the formal consequences of our split truth/falseness semantics, we need to formalize the logical defuzzification or polarization we implicitly operate when applying to L -expressions an L -true or L -false denotation. Unfortunately, the standard defuzzification technique, denoted in the fuzzy literature as λ-cuts (see Fodor & Roubens [4]), where λ ∈ [−1, 1] represents the level of credibility rx from which on a given L -expression is considered to be true, is not generally consistent with our split truth/falseness semantics (see Bisdorff [2]). 2 “. . . I have long felt that it is a serious defect in existing logic that it takes no heed of the limit between two realms. I do not say that the Principle of Excluded Middle is downright false; but I do say that in every field of thought whatsoever there is an intermediate ground between positive assertion and negative assertion which is just as Real as they. . . . “(C. S. Peirce, Letter from February 29, 1909 to William James) 22 What we need is an extended three-valued cut operator (see Bisdorff & Roubens [1]). Let E L be a set of L -expressions and let L 3 denote the restriction of L to the three credibility values {−1, 0, 1}. 3 π : E L → E L represents a logical polarization operator defined as follows: ∀(x, rx ) ∈ E L :  ⇔ rx > 0  (x, 1) (x, −1) ⇔ rx < 0 π(x, rx ) =  (x, 0) ⇔ rx = 0 That π operator indeed implements our split truth/falseness semantics may be summarized by stating the following categorical equation. µ ◦ π = π ◦ µ. (7) and a credibility calculus L verifying Equation 7 is called natural. For instance, we may show that Lo implements a such natural credibility calculus. For this we must proof that the π operation gives a natural transformation of Lo -valued expressions. Following the general inductive construction of E L it is sufficient to show naturality of Lo for each of the basic logical operators. Lo -valued contradiction: for any (x, rx ) ∈ E Lo , if rx > 0 , µ(π(x, rx )) = µ(x, 1) = (x, 1) = π(µ(x, rx )); if rx < 0 , µ(π(x, rx )) = µ(x, −1) = (¬x, 1) = π(¬x, −rx ) = π(µ(x, rx )); and if rx = 0 , µ(π(x, rx )) = µ(x, 0) = (x, 1) == π(x, rx ) = π(µ(x, rx )). Lo -valued disjubction: for any (x, rx ), (y, ry ) ∈ E Lo , if rx > 0 or ry > 0, µ(π(x ∨ y, max(rx , ry ))) = µ(x ∨ y, 1) = (x ∨ y, 1) = π(x ∨ y, max(rx , ry )) = π(µ(x ∨ y, max(rx , ry ))); if rx < 0 and ry < 0, µ(π(x ∨ y, max(rx , ry ))) = µ(x ∨ y, −1) = (¬(x ∨ y), 1) = π(¬(x ∨ y), min(−rx , −ry )) = π(µ(x ∨ y, max(rx , ry ))). Finally, Lo -valued conjunction: for any (x, rx ), (y, ry ) ∈ E Lo , if rx > 0 and ry > 0, µ(π(x∧y, min(rx , ry ))) = µ(x ∧ y, 1) = (x ∧ y, 1) = π(x ∧ y, min(rx , ry )) = π(µ(x ∧ y, min(rx , ry ))); if rx < 0 or ry < 0, µ(π(x ∧ y, min(rx , ry ))) = µ(x ∧ y, −1) = (¬(x ∧ y), 1) = π(¬(x ∧ y), max(−rx , −ry )) = π(µ(x ∧ y, min(rx , ry ))). This completes the demonstration. The Lo credibility calculus is however not the only possible natural credibility calculus we may define on E. 3 A Bochvar-like fuzzification of propositional expressions A second example is given by a multiplicative fuzzification of the classic three-valued Bochvar logic. We shall denote Lb such a credibility calculus where the operator triple is denoted < −, g, f >. We keep the traditional sign exchange as Lb -valued contradiction. The multiplicative conjunction operator f on a set E L of L -expressions is defined as follows:  | rx × ry | if (rx > 0) ∧ ry > 0), ∀x, y ∈ E : rx∧y = rx f ry = − | rx × ry | otherwise. In Figure 2, we may notice that the f-operator, when restricted to a {−1, 1}-valued domain, is isomorphic to the classic Boolean conjunction operator. Similarly, we define the multiplicative disjunction operator g as follows: 23 1 0.8 0.6 0.4 0.2 0 -0.2 -0.4 -0.6 1 -0.8 0 -1 0.8 0.5 0.2 -0.4 -0.1 -1 -0.7 -1 Figure 2: Graphical representation of the multiplicative conjunctive operator 1 0.8 0.6 0.4 0.2 0 -0.2 -0.4 -0.6 1 -0.8 0 -1 0.8 0.5 0.2 -0.4 -0.1 -1 -0.7 -1 Figure 3: Graphical representation of the multiplicative disjunctive operator ∀x, y ∈ P : rx∨y = rx g ry =  − | rx × ry | if (rx < 0) ∧ (ry < 0), | rx × ry | otherwise. Again, we may notice in Figure 3 that we recover in the limit, when restricted to only −1, 1-valued expressions, the classic Boolean disjunction operator. First, we may verify that the De Morgan duality properties are verified in Lb . Indeed, we easily see that: ∀(x, rx ), (y, ry ) ∈ E Lb : rx∧y = r(¬(¬x ∨ ¬y) ) . Indeed, if rx , ry > 0, rx f ry = rx × ry . At the same time, r¬x g r¬y = (r¬x × r¬y ) = −(rx × ry ). On the contrary, if rx , ry < 0, rx f ry = −(rx × ry ), then r¬x g r¬y ) = (r¬x × r¬y ) = (−rx × −r(y ) = rx × ry . If either rx > 0 and ry < 0 or vice versa, the duality relation is equally verified. It is most interesting to notice that in the case where both Lb -expressions are Lb -true, respectively Lb -false, both operators f and g give the same Lb -credibility. The operators diverge in their result only when contradictory Lb -truth assessments are to be combined. The conjunctive operator aligns the Lb -false part where as the disjunctive operator sustains the Lb -true part of the pair of propositions. 24 We may furthermore notice that the negational fix-point, the zero value, figures as logical “black hole” as is usual in the three-valued Bochvar logic, absorbing all possible logical determinism through any of both binary operators. ∀(x, rx ) ∈ E Lb : rx f 0 = rx g 0 = 0. Lb Let us denote E/−1;1 the equivalence classes of all certainly true or false Lb -expressions. The Lb gives a classic Boolean algebra. restriction of the Lb credibility calculus to E/−1:1 It is remarkable however, that such a priori obvious properties as impotency of conjunction and disjunction, are only satisfied in this limit Boolean case. Indeed in general, the natural logical consequence of combining more and more fuzzy propositions will sooner or later necessarily end up with a completely undetermined proposition. The same is true when combining conjunctively or disjunctively a number of times the same fuzzy proposition. Indeed, ∀(x, rx ), (y, ry ) ∈ E Lb such that rx 6= 0 we have: | rx | > | rx f ry |, | rx | > | rx g ry | . We recover here a similar situation as in classic error propagation. The more we operate with imprecise numbers, we more we increase the imprecision of the out-coming result, and this imprecision is essentially related to the imprecision of the initial inputs. Finally, to validate now the naturality property of the Lb calculus, we must show that the curly operators g and f verify Equation 7. In order to do so, it is again sufficient to show that for any (x, rx ), (y, ry ) ∈ E Lb and both the curly operators we have: µ(π(x ∨ y, rx g ry )) = π(µ(x ∨ y, rx g ry )), µ(π(x ∧ y, rx f ry )) = π(µ(x ∧ y, rx f ry )). Indeed, for any (x, rx ), (y, ry ) ∈ E Lo , if rx > 0 or ry > 0, µ(π(x ∨ y, rx g ry ))) = µ(x ∨ y, 1) = (x ∨ y, 1) = π(x ∨ y, rx g ry ) = π(µ(x ∨ y, rx g ry ); if rx < 0 and ry < 0, µ(π(x ∨ y, rx g ry )) = µ(x ∨ y, −1) = (¬(x ∨ y), 1) = π(¬(x ∨ y), rx f ry ) = π(µ(x ∨ y, rx g ry )). And for any (x, rx ), (y, ry ) ∈ E Lo , if rx > 0 and ry > 0, µ(π(x ∧y, rx f ry )) = µ(x ∧y, 1) = (x ∧y, 1) = π(x ∧ y, rx f ry ) = π(µ(x ∧ y, rx f ry ); if rx < 0 or ry < 0, µ(π(x ∧ y, rx f ry )) = µ(x ∧ y, −1) = (¬(x ∧ y), 1) = π(¬(x ∧ y), rx g ry ) = π(µ(x ∧ y, rx f ry )). This concludes the demonstration that Lb does indeed implements a natural credibility calculus. 4 Moving on In order to situate now the whole family of natural credibility calculus one may define on propositional expressions, let us explore two directions for further investigations. Following the general properties of the Lo calculus, we may want to consider the t-norm concept as potential generalization. Unfortunately, the split truth/falseness semantics is not quite compatible 25 with the formal properties of a t-norm. Indeed, let us recall that a t-norm T defined on the interval [−1; 1] should verify the following four axioms: T (1, rx ) = rx , ∀rx ∈ [−1; 1] T (rx , ry ) = T (ry , rx ), ∀rx , ry ∈ [−1; 1] T (rx , ry ) ≤ T (ru , rv ) if −1 ≤ rx ≤ ru ≤ 1, −1 ≤ ry ≤ rv ≤ 1 T (rx , T (ry , rz )) = T (T (rx , ry ), rz ), ∀rx , ry , rz ∈ [−1; 1]. (8) (9) (10) (11) It is easily verified that the multiplicative conjunctive operator f verifies three of these axioms, i.e. all except the third one. This is not astonishing, as this axiom is not so “naturally” a logical axiom but rather a geometrical axiom underlying the “triangularity” heritage of the t-norm concept. What axiom could advantageously replace the “triangular” t-norm condition in order to make fit conceptually the t-norm to a natural credibility calculus on the rational interval [−1, 1] ? A possibility might be the following: | T (rx , ry ) |≤| T (ru , rv ) | if 0 ≤| rx |≤| ru |≤ 1, 0 ≤| ry |≤| rv |≤ 1. In some sense we would recover the triangular axiom in some absolute terms. But this idea has still to be further explored. Finally, more following the semiotical intuitions of C.S. Peirce, we may interpret the classic ordinal Lo credibility calculus and the above introduced Bochvar-like Lb credibility calculus as some limit constructions of a same semiotical foundation of logical fuzziness. Indeed, the Lo calculus to be applicable in a practical setting supposes a same closed universal semiotical reference for all ground propositions p ∈ P as is usual in a mathematical logic context for instance, where as the multiplicative model apparently supposes shared semiotical references for all determined parts and disjoint semiotical references for the logically undetermined parts of each proposition p ∈ P as is usual for instance in repetitive physical measures with error propagation. These general considerations leave open the case where each ground expression p ∈ P is completely supported by a different semiotical reference. In this last case we would get as third limit case some kind of aggregational logic (see Bisdorff [3]) as implemented by the concordance principle in the multicriteria approach to preference aggregation for instance. References [1] Bisdorff, R. and Roubens, M. (1996), On defining fuzzy kernels from L -valued simple graphs, in: Proceedings Information Processing and Management of Uncertainty, IPMU’96, Granada, 593–599. [2] Bisdorff, R. (2000), Logical foundation of fuzzy preferential systems with application to the Electre decision aid methods, Computers & Operations Research 27 673–687. [3] Bisdorff, R. (2002), Logical Foundation of Multicriteria Preference Aggregation. Essay in Aiding Decisions with Multiple Criteria, D. Bouyssou et al. (editors), Kluwer Academic Publishers, pp. 379-403. [4] Fodor, J. and Roubens, M., Fuzzy preference modelling and multi-criteria decision support. Kluwer Academic Publishers (1994) 26 A review of construction and representation results for fuzzy weak orders U LRICH B ODENHOFER1 , B ERNARD D E BAETS2 , JÁNOS C. F ODOR3 1 Software Competence Center Hagenberg 4232 Hagenberg, Austria E-Mail: ❯❧r✐❝❤✳❇♦❞❡♥❤♦❢❡r❅s❝❝❤✳❛t 2 Dept. of Applied Mathematics, Biometrics, and Process Control Ghent University 9000 Gent, Belgium E-Mail: ❇❡r♥❛r❞✳❉❡❇❛❡ts❅❯●❡♥t✳❜❡ 3 Dept. of Biomathematics and Informatics Szent István University 1078 Budapest, Hungary E-Mail: ❥❢♦❞♦r❅✉♥✐✈❡t✳❤✉ Weak orders, i.e. reflexive, transitive, and complete binary relations, are among the most fundamental concepts in preference modeling. It is well-known that weak orders are nothing else but linear orders of equivalence classes, where the corresponding equivalence relation is the symmetric kernel of the weak order. If the underlying set of alternatives X is finite, a weak order can be represented by a single score function [2]. In analogy to the crisp case, fuzzy weak orders are fundamental concepts in fuzzy preference modeling [3, 4, 5]. Given a non-empty set of alternatives X, a fuzzy relation R : X 2 → [0, 1] is a fuzzy weak order if it fulfills the following three axioms for all x, y, z ∈ X (where T is a left-continuous t-norm): R(x, x) = 1 (reflexivity)  T R(x, y), R(y, z) ≤ R(x, z) (T -transitivity) R(x, y) = 1 or R(y, x) = 1 (strong completeness) In this contribution, we give an overview of construction and representation results for fuzzy weak orders. This includes both known results and new insights: (i) Every fuzzy weak order can be represented as a union of a crisp linear order and a fuzzy equivalence relation—which is a full analogue to the crisp case [1]. Based on this discovery, we are able to construct fuzzy weak orders from pseudo-metrics if the t-norm T is continuous Archimedean [1]. (ii) For the case that X is finite, we give a necessary and sufficient condition that a fuzzy weak order is determined only by the degrees to which two consecutive equivalence classes are related to each other. (iii) Every fuzzy weak order can be represented by score functions [6], but not necessarily by a single one, not even if X is finite [3]. A necessary and sufficient condition for the representability by a single score function is given. 27 (iv) Fuzzy weak orders can be represented by an embedding to the fuzzy power set F (X) equipped with the fuzzy inclusion induced by the t-norm T [1]. All these reviews and new results are demonstrated by means of detailed examples. Acknowledgements Ulrich Bodenhofer gratefully acknowledges support by the Austrian Government, the State of Upper Austria, and the Johannes Kepler University Linz in the framework of the Kplus Competence Center Program. Bernard De Baets and János Fodor gratefully acknowledge partial support by the Bilateral Scientific and Technological Cooperation Flanders-Hungary BIL00/51 (B-08/2000). References [1] U. Bodenhofer. Representations and constructions of similarity-based fuzzy orderings. Fuzzy Sets and Systems, 137(1):113–136, 2003. [2] G. Cantor. Beiträge zur Begründung der transfiniten Mengenlehre. Math. Ann., 46:481–512, 1895. [3] B. De Baets, J. Fodor, and E. E. Kerre. Gödel representable fuzzy weak orders. Internat. J. Uncertain. Fuzziness Knowledge-Based Systems, 7(2):135–154, 1999. [4] J. Fodor and M. Roubens. Fuzzy Preference Modelling and Multicriteria Decision Support. Kluwer Academic Publishers, Dordrecht, 1994. [5] S. Ovchinnikov. An introduction to fuzzy relations. In D. Dubois and H. Prade, editors, Fundamentals of Fuzzy Sets, volume 7 of The Handbooks of Fuzzy Sets, pages 233–259. Kluwer Academic Publishers, Boston, 2000. [6] L. Valverde. On the structure of F-indistinguishability operators. Fuzzy Sets and Systems, 17(3):313–328, 1985. 28 A bridge between fuzzy set theory and coherent conditional probabilities (II) G IULIANELLA C OLETTI Dip. Matematica e Informatica University of Perugia 06123 Perugia, Italy E-mail: ❝♦❧❡tt✐❅❞✐♣♠❛t✳✉♥✐♣❣✳✐t In this talk (strictly linked with that by Romano Scozzafava with the same title) we start from our approach to fuzzy set theory in terms of conditional events and coherent conditional probabilities, showing also how the concept of possibility function naturally arises in this context. Coherent conditional probability is looked on as a general non-additive “uncertainty” measure ψ(·) = P(E| ·) of the conditioning events. In particular, we show that ψ can be interpreted as a possibility measure, giving a relevant characterization: ψ is a possibility if and only if it is a capacity. Moreover, we give also a characterization of the measure ψ as an (antimonotone) information measure. Any coherent extension of a membership function is between these two extreme cases, but the converse is not true. So we discuss also a characterization of coherence of such extensions in terms of a suitable weighted mean of conditional probabilities. We recall from the previous talk (with the same title) the following basic notions. Let ϕ be any property related to a random quantity X : notice that a property, even if expressed by a statement, does not single–out an event, since the latter needs to be expressed by a nonambiguous proposition that can be either true or false. Consider now the event Eϕ = “You claim ϕ ” and a coherent conditional probability P(Eϕ |Ax ), looked on as a real function µEϕ (x) = P(Eϕ |Ax ) defined on CX , the range of X. Then a fuzzy subset Eϕ∗ of CX is the pair Eϕ∗ = {Eϕ , µEϕ }, with µEϕ (x) = P(Eϕ |Ax ) for every x ∈ CX . So a coherent conditional probability P(Eϕ |Ax ) is a measure of how much You, given the event Ax = {X = x}, are willing to claim the property ϕ , and it plays the role of the membership function of the fuzzy subset Eϕ∗ . We recall that we have been able not only to define fuzzy subsets, but also to introduce in a very natural way the basic continuous T-norms and the relevant dual T-conorms, bound to the former by coherence. On the other hand, if we consider the weakest T -norm ( min(x, y) if max(x, y) = 1 , To (x, y) = 0 otherwise we can prove that the choice of p = P(Eϕ ∧ Eψ |Ax ∧ Ay ) agreeing with To is not coherent. 29 The three coherent choices discussed in the previous talk correspond to the particular values λ = 0, λ = 1, λ = ∞, respectively, of the fundamental (archimedean) Frank t-norms Tλ and t-conorms Sλ (see [6]), with λ ∈ [0, ∞], that is (for λ different from the above three values)     (λx − 1)(λy − 1) (λ1−x − 1)(λ1−y − 1) Tλ (x, y) = logλ 1 + , Sλ (x, y) = 1 − logλ 1 + . λ−1 λ−1 In our framework (where, given a t-norm singling-out the value P(Eϕ ∧ Eψ |Ax ∧ Ay ) of the conjunction, then the corresponding choice of the t-conorm, which determines the value of the disjunction P(Eϕ ∨ Eψ |Ax ∧ Ay ) , is uniquely driven by the coherence of the relevant conditional probability) we are able to capture also Frank t-norms and t-conorms (for any λ ∈ [0, ∞]), archimedean or not. In our setting it is completely natural to consider fuzzy measures, taking as starting point a membership function, regarded as a pointwise distribution. This requires in fact only to extend a coherent conditional probability assessment on the family {Eϕ |Ax } to the larger family of events {Eϕ |A}, with A element of the algebra A spanned by events {Ax }. Intuitively, P(Eϕ |A) is the probability that “You claim ϕ” in the hypothesis that the value of the variable X belongs to A. The results that follow are mainly taken from [3] and [4]. Let us introduce the following (“natural”) definitions: (D1) Let E be an arbitrary event and P any coherent conditional probability on the family G = {E} × {Ax }x∈CX , admitting P(E|Ω) = 1 as (coherent) extension. A distribution of possibility on CX is the real function π defined by π(x) = P(E|Ax ). Actually, along the same lines we can as well introduce any general distribution ψ, to be called just uncertainty measure. (D2) Under the same conditions of (D1), a distribution of uncertainty measure on CX is the real function ψ defined by ψ(x) = P(E|Ax ). When CX is finite, since every extension of P(E| · ) must satisfy the axioms of a conditional probability, condition P(E|Ω) = 1 gives P(E|Ω) = ∑ P(Ax |Ω)P(E|Ax ) x∈Cx and ∑ P(Ax |Ω) = 1 . x∈Cx Then 1 = P(E|Ω) ≤ maxP(E|Ax ) ; therefore P(E|Ax ) = 1 for at least one event Ax . x∈Cx On the other hand, we notice that in our framework (where null probabilities for possible conditioning events are allowed) it does not necessarily follow that P(E|Ax ) = 1 for every x; in fact we may well have P(E|Ay ) = 0 (or else equal to any other number between 0 and 1) for some y ∈ CX . Obviously, the constraint P(E|Ax ) = 1 for some x is not necessary when the cardinality of CX is infinite. From now on, given an arbitrary event E, let C be a family of conditional events {E|Hi }i∈I , where card(I) is arbitrary and events Hi ’s are a partition of Ω , P(E| · ) an arbitrary (coherent) conditional / probability on C , H the algebra spanned by the Hi ’s, and H o = H \ {0}. Here we list some of the main results: 30 (A) Any coherent extension of P to C ′ = {E|H : H ∈ H o } is such that, for every H, K ∈ H , with / H ∧ K = 0, (1) min{P(E|H), P(E|K)} ≤ P(E|H ∨ K) ≤ max{P(E|H), P(E|K)} . It follows that any coherent extension of P to C ′ = {E|H : H ∈ H o } is such that, for every H, K ∈ H , with H ∧ K = 0/ , P(E|H ∨ K) ≤ P(E|H) + P(E|K). On the other hand / (B) Any real function f defined on H such that, if H ∧ K = 0, min{ f (H), f (K)} ≤ f (H ∨ K) ≤ max{ f (H), f (K)} , is a capacity if and only if, for every H, K ∈ H , f (H ∨ K) = max{ f (H), f (K)} . So the function f (H) = P(E|H), with P a coherent conditional probability, in general is not a capacity. The question now is: are there coherent conditional probabilities P(E| · ) monotone with respect to ⊆ ? We reached a positive answer by means of the following result (given in [5]), which represents the main tool to introduce possibility measures in our context referring to coherent conditional probabilities. (C) Let f : C → [0, 1] be any function such that (2) f (E|Hi ) = 0 if E ∧ Hi = 0/ and f (E|Hi ) = 1 if Hi ⊆ E holds. Then any P extending f on K = {E} × H o and such that (3) P(E|H ∨ K) = max{P(E|H), P(E|K)} , for every H, K ∈ H o is a coherent conditional probability. (D3) Let H be an algebra of subsets of CX and E an arbitrary event. If P is any coherent conditional probability on K = {E} × H o , with P(E|Ω) = 1 and such that P(E|H ∨ K) = max{P(E|H), P(E|K)} , for every H, K ∈ H o , then a possibility measure on H is the real function Π defined by Π(H) = P(E|H) for H ∈ H o and / = 0. Π(0) In our context, (C) assures that any possibility measure can be obtained as coherent extension (unique, in the finite case) of a possibility distribution. Vice versa, given any possibility measure Π on an algebra H , there exists an event E and a coherent conditional probability P on K = {E} × H o / = 0) coincides with Π. agreeing with Π, i.e. whose extension to {E} × H (putting P(E|0) So an immediate consequence of (B) and (C) is that any coherent P extending f on K = {E} × H o is a capacity if and only if it is a possibility. 31 Going back to our interpretation of a membership function µ(x) through a suitable coherent conditional probability (a measure of how much You, given the event Ax , are willing to claim the relevant property ϕ ), and putting Ho = {x ∈ CX : µ(x) = 0} , H1 = {x ∈ CX : µ(x) = 1} , the conditional probability P(E|H c ), with H = Ho ∨ H1 , is a measure of how much You are willing to claim property ϕ if the only fact you know is that x ∈ H c . On the other hand, every membership function can be regarded as a possibility distribution. If A is an algebra of subsets of CX , the ensuing possibility measure can be interpreted in the following way: it is a sort of “global” membership (relative to each finite A ∈ A ) which takes, among all the possible choices for its value on A , i.e. among all possible extensions satisfying (2), the maximum of the membership in A. Moreover, we can regard every possibility measure Π as a decreasing function of the elements of the zero-layer set {0, 1, 2, . . . , k} associated to the class {Pα } of unconditional probabilities that are used to represent a coherent conditional probability in our main characterization theorem (see [2], p.81). In conclusion, the coherent extensions of a conditional probability P(E|Ax ) that satisfy (3) give rise to different zero-layers for the atoms Ax corresponding to different P(E|Ax ), so that such a coherent conditional probability P(E| · ) can be suitably associated to a measure of your “disbelief” in the events A ∈ A . Then some of the usual arguments may appear counterintuitive: in fact, the “global” membership should possibly decrease when the information is not concentrated on a given x, but is “spread” over a larger set (for example, considering the statement “Mary is young”, you may be willing, if you know that Mary’s age is x = 39, to put µ(x) = .2, while if you know that her age is y = 26, you may be willing to put µ(y) = .9 ; on the other hand, knowing that her age is between 26 and 39, the corresponding possibility is still .9). So our results may suggest to take as such global measure a function which is not a capacity, yet satisfying the weaker conditions under (A). With the aim of studying information measures in the framework of coherent conditional probabilities, we gave also the following definition, which parallels, in a sense, those (D1) and (D2) for uncertainty (including possibility) measures. (D4) Let F be an arbitrary event and P any coherent conditional probability on the family G = {F} × {Ax }x∈CX , admitting P(F|Ω) = 0 as (coherent) extension. We define pointwise information measure on CX the real function ψ defined by ψ(x) = P(F|Ax ). When CX is finite, since every extension of P(F| · ) must satisfy the axioms of a conditional probability, considering the condition P(F|Ω) = 0, we necessarily have P(F|Ω) = ∑ P(Ax |Ω)P(F|Ax ) x∈Cx and ∑ P(Ax |Ω) = 1 . x∈Cx Then 0 = P(F|Ω) ≥ minP(F|Ax ), so P(F|Ax ) = 0 for at least one event Ax . x∈Cx On the other hand, we notice that in our framework it does not necessarily follow that P(F|Ax ) = 0 for every x; in fact we may well have P(F|Ay ) = 1 (or to any other number between 0 and 1) for some 32 y ∈ CX . Obviously, the constraint P(F|Ax ) = 0 for some x is not necessary when the cardinality of CX is infinite. Under the same conditions mentioned before (A), we get an immediate consequence of (A) itself: / (B1) Any real function f defined on H such that, if H ∧ K = 0, min{ f (H), f (K)} ≤ f (H ∨ K) ≤ max{ f (H), f (K)} , is antimonotone with respect to ⊆ if and only if, for every H, K ∈ H , f (H ∨ K) = min{ f (H), f (K)} . The following result proves the existence of coherent conditional probabilities P(F| · ) antimonotone with respect to ⊆ . It represents also the main tool to introduce information measures in our context referring to coherent conditional probabilities. (C1) Let f : C → [0, 1] be any function such that f (F|Hi ) = 0 if F ∧ Hi = 0/ and f (F|Hi ) = 1 if Hi ⊆ F holds . Then any P extending f on K = {F} × H o and such that P(F|H ∨ K) = min{P(F|H), P(F|K)} , for every H, K ∈ H o , is a coherent conditional probability. In the case that the assessment P(F|Hi ) admits P(F|Ω) = 0 as coherent extension, we obtain as well a coherent extension by requiring both P(F|Ω) = 0 and choosing “min” as combination rule to make the extension of P. Are the two extreme cases – P(E|Ax ) extended to the disjunction of conditioning events by taking the maximum (possibility measure, monotone) – P(E|Ax ) extended to the disjunction of conditioning events taking the minimum (antimonotone measure) the most natural ways to extend membership functions? We recall that coherence implies min{P(E|H), P(E|K)} ≤ P(E|H ∨ K) ≤ max{P(E|H), P(E|K)} but the converse is NOT true. So, in general, a value between the two extremes is not necessarily a coherent choice for the conditional probability P(E|H ∨ K) (which can be looked on as a sort of “global” membership ...). Coherent choices have been characterized in [1]: they are weighted means of P(E|H) and P(E|K) (weights equal to zero or one are allowed). More generally, this result can be stated with reference to the disjunction of any finite number of conditioning events. 33 References [1] S. Ceccacci, C. Morici, and T. Paneni, “Conditional probability as a function of the conditioning event: characterization of coherent enlargements”, Proc. WUPES 2003, Hejnice, pp. 35–45. [2] G. Coletti and R. Scozzafava, Probabilistic Logic in a Coherent Setting, Dordrecht, Kluwer, 2002. [3] G. Coletti and R. Scozzafava, “Coherent conditional probability as a measure of uncertainty of the relevant conditioning events”. In: Lecture Notes in Computers Science LNAI 2711 (ECSQARU2003, Aalborg), 2003, pp. 407–418. [4] G. Coletti and R. Scozzafava, “Coherent conditional probability as a measure of information of the relevant conditioning events”. In: Lecture Notes in Computers Science LNCS 2810 (IDA-2003, Berlin), 2003, pp. 123–133. [5] G. Coletti and R. Scozzafava, “Conditional probability, fuzzy sets and possibility: a unifying view”, Fuzzy Sets and Systems, 2004, to appear. [6] M.J. Frank, “On the simultaneous associativity of F(x, y) and x + y − F(x, y)”, Aequationes Math., 19: 194–226, 1979. 34 Stable commutative copulas in pairwise comparison models B ERNARD D E BAETS1 , H ANS D E M EYER2 1 Dept. of Applied Mathematics, Biometrics, and Process Control Ghent University 9000 Gent, Belgium E-Mail: ❇❡r♥❛r❞✳❉❡❇❛❡ts❅❯●❡♥t✳❜❡ 2 Dept. of Applied Mathematics and Computer Science Ghent University 9000 Gent, Belgium E-Mail: ❍❛♥s✳❉❡▼❡②❡r❅❯●❡♥t✳❜❡ The purpose of this lecture is twofold. Firstly, we revise the class of stable copulas [7], i.e. the class of copulas that coincide with their survival copula [11]. Secondly, we describe two comparison models, a deterministic one and a stochastic one, in which stable commutative copulas play a simplifying role. We propose a method for constructing copulas which largely generalizes the ordinal sum construction method. The method is based on a grid structure and the use of what we have called foreground and background copulas [2]. It can be applied in particular to construct commutative copulas and stable commutative copulas. Requiring associativity as well leads to the usual ordinal sum construction of t-norms, which for the purpose of constructing stable copulas reduces to the well-known ‘symmetric’ ordinal sums of Frank t-norms [7]. In the deterministic model, objects are represented by feature vectors that indicate presence or absence of certain properties. A typical way of comparing objects is by means of cardinality-based similarity measures operating on the corresponding feature vectors [4]. The generalization to fuzzy feature vectors requires the choice of an appropriate model of fuzzy intersection along with fuzzification rules for other set-theoretic operations [1]. For more than two decades now, t-norms have become the standard model for that purpose, and their use is hardly questioned. However, here we show the power of stable commutative copulas. Indeed, TL -transitivity and TP -transitivity of the cardinalitybased similarity measures are preserved in the fuzzification process when using a stable commutative copula as model for fuzzy set intersection [9]. Links with Bell-type inequalities for copulas and tnorms will be discussed as well [8, 10]. The second comparison model deals with random variables. For a random vector (X1 , X2 , . . . , Xn ), its components are compared pairwisely by considering the ‘winning probabilities’ of one over the other. More specifically, a probabilistic relation Q is defined: Q(Xi , X j ) = P (Xi > X j ) + 1/2 P (Xi = X j ). This relation indeed satisfies Q(Xi , X j ) + Q(X j , Xi ) = 1. Moreover, its computation requires only the knowledge of the bivariate marginal distributions, which are in turn uniquely determined from the univariate marginal distributions and the copula that binds them. We consider the case where all pairs of variables are coupled by a same commutative copula C. One of the key issues in comparison models is the transitivity exhibited by the model. For probabilistic relations, we have previously developed the rich framework of cycle-transitivity [6]. Remarkably, the transitivity of the probabilistic relation expressing the winning probabilities can be classified within this framework, and the corresponding upper bound function only depends on the commutative copula C considered [5]. In case C is stable, 35 this upper bound function is given by U(α, β, γ) = β + C(1 − β, γ) = γ + C(β, 1 − γ). In particular, F (β, γ). In the specific case of independent when C = TλF is a Frank t-norm, then U(α, β, γ) = S1/λ random variables, i.e. C = TP , we recover the previously studied dice model [6] characterized by U(α, β, γ) = β + γ − βγ, i.e. dice-transitivity. References [1] B. De Baets and H. De Meyer, Transitivity-preserving fuzzification schemes for cardinality-based similarity measures, European J. Oper. Res., to appear. [2] B. De Baets and H. De Meyer, Copulas and the pairwise probabilistic comparison of ordered lists, Proc. Tenth Internat. Conference on Information Processing and Management of Uncertainty in Knowledge-based Systems (Perugia, Italy), 2004, submitted. [3] B. De Baets, H. De Meyer, B. De Schuymer and S. Jenei, Cyclic evaluation of transitivity of reciprocal relations, Social Choice and Welfare, to appear. [4] B. De Baets, H. De Meyer and H. Naessens, A class of rational cardinality-based similarity measures, J. Comput. Appl. Math. 132 (2001), 51–69. [5] H. De Meyer, B. De Baets and B. De Schuymer, Transitive comparison of independent and dependent random variables, in: Principles of Fuzzy Preference Modelling and Decision Making (B. De Baets and J. Fodor, eds.), Academia Press, 2003, pp. 249–265. [6] B. De Schuymer, H. De Meyer, B. De Baets and S. Jenei, On the cycle-transitivity of the dice model, Theory and Decision 54 (2003), 264–285. [7] E.P. Klement, R. Mesiar and E. Pap, Invariant copulas, Kybernetika 38 (2002), 275–285. [8] S. Janssens, B. De Baets and H. De Meyer, Meta-theorems on fuzzy set cardinalities, in: Principles of Fuzzy Preference Modelling and Decision Making (B. De Baets and J. Fodor, eds.), Academia Press, 2003, pp. 27–42. [9] S. Janssens, B. De Baets and H. De Meyer, Some meta-theorems on fuzzy cardinalities and their application, Proc. Third EUSFLAT Conference (Zittau, Germany), 2003, pp. 318–321. [10] S. Janssens, B. De Baets and H. De Meyer, Bell-type inequalities for commutative quasi-copulas, Fuzzy Sets and Systems, submitted. [11] R. Nelsen, An Introduction to Copulas, Lecture Notes in Statistics 139, Springer-Verlag, New York, 1998. 36 Vague ordered fields: towards an axiomatic theory of vague real line M USTAFA D EMIRCI Department of Mathematics Faculty of Sciences and Arts Akdeniz University 07058 Antalya, Turkey E-mail: ❞❡♠✐r❝✐❅❛❦❞❡♥✐③✳❡❞✉✳tr The notion of fuzzy function based on many-valued equivalence relations (many-valued similarity relations (equalities) [17, 18, 19], fuzzy equivalence relations [4, 6, 7, 21, 22, 26], similarity relations [1, 2, 3, 15, 28], indistinguishability operators [27], etc.) has been introduced by several authors, and applied to category theory [5], approximate reasoning and fuzzy control theory [8, 10, 15, 22]. The author of this talk [8, 9, 10] later proposed other versions of this kind of fuzzy function, known as strong fuzzy function and perfect fuzzy function, which have more desirable and powerful representation properties than the others. Many-valued equivalence relation-based fuzzy orderings have been studied by Höhle-Blanchard [16] and Bodenhofer [1, 2, 3] w.r.t. different special integral, commutative cqm-lattices. Later on, these fuzzy orderings are generalized on the basis of a fixed and a general integral, commutative cqm-lattice M = (L, ≤, ∗) under the name M-vague orderings [13, 14]. For a given nonempty set X and an M-equivalence relation E on it, an M-vague ordering on X is a special L-fuzzy relation on X satisfying some further properties by means of E. Strong (perfect) fuzzy functions [8, 9, 10] form the elementary tools of vague algebra [9, 11, 12] and vague lattices [13, 14]. In contrast to fuzzy algebra [23] and fuzzy lattices [25], vague algebra and vague lattices basically involve vaguely defined binary operations (M-vague binary operations [9, 11, 12]) and vaguely defined ordering relations (M-vague orderings), where the integral, commutative cqm-lattice M = (L, ≤, ∗) [10, 20] denotes the many-valued logical basis of these studies. A vague binary operation ◦˜ on X can be roughly described as a special L-fuzzy relation (more precisely, a special strong fuzzy function) from X × X to X with some reasonable properties formulated in terms of E [9, 11, 12]. Strong (perfect) fuzzy functions propose a new approach to the fuzzy setting of numerous different branches of mathematics. Vague algebra and vague lattices are only two important cases of such an approach. The development of a sound theory of real line equipped with M-vague orderings, M-vague addition operations and M-vague multiplication operations [9, 12], which will be called vague real line, lies at the heart of future studies in the theory of many-valued equivalence relation-based fuzzy functions. It is well-known that basic axioms of the real line in the classical sense have been derived starting from an abstract ordered field in the classical sense. For this reason, in an analogue manner to the real line in the classical case, it is natural to start from a vague ordered field for the establishment of an axiomatic theory of vague real line. Vague ordered fields and the transition from vague ordered fields to the vague real line will be the main subjects of this presentation. The outline of this talk can be expressed as follows. After a brief introduction of strong (perfect) fuzzy functions and vague algebraic notions, we will define many-valued equivalence relation-based strict fuzzy orderings, which will be an essential tool of the vague ordered fields, and establish the connection between these kinds of strict fuzzy orderings and M-vague orderings. Then we will introduce vague ordered fields, and touch on the problem of the derivation of the basic axioms of vague real line 37 starting from vague ordered fields. All necessary fundamental axioms of vague real line, which have not yet been revealed in their entirity, are crucial problems in developing a sound theory for vague real line. The aim of this talk can be summarized as the introduction of vague real line and the invitation of the researchers to this new and bachelor field. Acknowledgement This presentation is supported by Turkish Academy of Sciences in the framework of the Young Scientist Award Program (MD/TÜBA-GEBİP/2002-1-8). References [1] U. Bodenhofer, A Similarity-Based Generalization of Fuzzy Orderings Preserving the Classical Axioms, Int. J. Uncertainty, Fuzziness and Knowledge-Based Systems 8 (3) (2000) 593-610. [2] U. Bodenhofer, Similarity-Based Fuzzy Orderings: A Comprehensive Overview, Proc. EUROFUSE Workshop on Preference Modelling and Applications, Granada, Spain, 2001, pp. 21-27. [3] U. Bodenhofer, Representations and Constructions of Similarity-Based Fuzzy Orderings, Fuzzy Sets and Systems 137 (2003), 113-136. [4] D. Boixader, J. Jacas and J. Recasens, Fuzzy Equivalence Relations: Advanced Material, in: D. Dubois and H. Prade (Eds.), Fundamentals of Fuzzy Sets, The handbooks of fuzzy sets series, Vol. 7, Kluwer Academic Publishers, Boston, 2000, pp. 261-290. [5] U. Cerruti, U. Höhle, An Approach to Uncertainty Using Algebras Over a Monoidal Closed Category, Suppl. Rend. Circ. Matem. Palermo Ser. II 12 (1986), 47-63. [6] B. De Baets and R. Mesiar, Pseudo-Metrics and T -Equivalences, J. Fuzzy Math. 5 (1997), 471-481. [7] B. De Baets and R. Mesiar, Metrics and T -Equalities, J. Math. Anal. Appl. 267 (2002), 531-547. [8] M. Demirci, Fuzzy Functions and Their Applications, J. Math. Anal. Appl. 252 (2000) 495-517. [9] M. Demirci, Fundamentals of M-Vague Algebra and M-Vague Arithmetic Operations, Int. J. Uncertainty, Fuzziness and Knowledge-Based Systems 10 (1) (2002) 25-75. [10] M. Demirci, Foundations of Fuzzy Functions and Vague Algebra Based on Many-Valued Equivalence Relations, Part I: Fuzzy Functions and Their Applications, Int. J. General Systems 32 (2) (2003) 123-155. [11] M. Demirci, Foundations of Fuzzy Functions and Vague Algebra Based on Many-Valued Equivalence Relations, Part II: Vague Algebraic Notions, Int. J. General Systems 32 (2) (2003) 157175. [12] M. Demirci, Foundations of Fuzzy Functions and Vague Algebra Based on Many-Valued Equivalence Relations, Part III: Constructions of Vague Algebraic Notions and Vague Arithmetic Operations, Int. J. General Systems 32 (2) (2003) 177-201. 38 [13] M. Demirci, Theory of Vague Lattices Based on Many-Valued Equivalence Relations-I: Vague Orderings, Vague Lattices and Their Representations, Fuzzy Sets and Systems (Submitted). [14] M. Demirci, Theory of Vague Lattices Based on Many-Valued Equivalence Relations-II: Complete Vague Lattices and Their Representations, Fuzzy Sets and Systems (Submitted). [15] P. Hájek, Metamathematics of Fuzzy Logic, Kluwer Academic Publishers, Dordrecht, Boston, London, 1998. [16] U. Höhle and N. Blanchard, Partial Ordering in L-Underdeterminate Sets, Inform. Sci. 35 (1985), 133-144. [17] U. Höhle, Quotients with Respect to Similarity Relations, Fuzzy Sets and Systems 27 (1988) 31-44. [18] U. Höhle, Many-Valued Equalities, Singletons and Fuzzy Partitions, Soft Computing 2 (1998) 134-140. [19] U. Höhle, Classification of Subsheaves over GL-Algebra, Logic Colloquium’98, Lecture Notes in Logic 13, Springer-Verlag, 1998. [20] U. Höhle and A.P. Šostak, Axiomatic Foundations of Fixed-Basis Fuzzy Topology, in: U. Höhle and S. E. Rodabaugh (Eds.), Mathematics of Fuzzy Sets: Logic, Topology and Measure Theory, The hand books of fuzzy sets series, Vol.3, Kluwer Academic Publishers, Boston, Dordrecht, 1999, pp. 123-273. [21] F. Klawonn and J. L. Castro, Similarity in Fuzzy Reasoning, Mathware and Soft Computing 2 (1995) 197-2281. [22] F. Klawonn, Fuzzy Points, Fuzzy Relations and Fuzzy Functions, in: V. Novâk and I. Perfilieva (Eds.), Discovering World with Fuzzy Logic, Physica-Verlag, Heidelberg, 2000, pp. 431-453. [23] J. N. Mordeson and D.S. Malik, Fuzzy Commutative Algebra, World Scientific Publishing Co. Pte. Ltd, Singapore, 1998. [24] A. Rosenfeld, Fuzzy Groups, J. Math. Anal. Appl. 35 (1971) 512-517. [25] A. Tepavčevič and G. Trajkovski, L-fuzzy Lattices: An Introduction, Fuzzy Sets and Systems 123 (2001) 209-216. [26] H. Thiele and N. Schmechel, The Mutual Defineability of Fuzzy Equivalence Relations and Fuzzy Partitions, Proc. Inter. Joint Conference of the Fourth IEEE International Conference on Fuzzy Systems and the Second International Fuzzy Engineering Symposium, Yokohama, Japan, 1995, pp. 1383-1390. [27] E. Trillas and L. Valverde, An Inquiry on Indistinguishability Operators, in: H. Skala et al. (Eds.), Aspects of Vagueness, Reidel, Dordrecht, 1984, pp. 231-256. [28] L. A. Zadeh, Similarity Relations and Fuzzy Orderings, Inform. Sci. 3 (1971) 177-200. 39 MV-algebras and semirings A NTONIO D I N OLA , B RUNELLA G ERLA Soft Computing Laboratory Dept. Mathematics and Informatics University of Salerno 84081 Baronissi (SA), Italy E-mail: {❛❞✐♥♦❧❛|❜❣❡r❧❛}❅✉♥✐s❛✳✐t Semirings are algebraic structures with two associative binary operations, where one distributes over the other, introduced by Vandiver [10] in 1934. In more recent times semirings have been deeply studied, especially in relation with applications ([5]). For example semirings have been used to model formal languages and automata theory (see [4]), to deal with scheduling problems ([3]) and semirings over real numbers ((max, +)-semirings) are the basis for the idempotent analysis [7]. In this work, we establish a relationship between semirings and many-valued logics. Many-valued logic has been proposed to model phenomena in which uncertainty and vagueness are involved. One of the more general classes of many-valued logics is the Basic logic defined in [6] as the logic of continuous t-norms. Special cases of Basic logics are Łukasiewicz, Godel and Product logic. In particular Łukasiewicz logic has been deeply investigated, together with its algebraic counterpart, MV-algebras, introduced by Chang in [1] to prove completeness theorem of Łukasiewicz logic. MV-algebras have nice algebraic properties and can be considered as intervals of lattice-ordered groups (see [2]). Łukasiewicz disjunction and conjunction are interpreted by the operations ⊕ and ⊙ of the MV-algebra [0, 1] given by x ⊕ y = min{1, x + y}, x ⊙ y = max{0, x + y − 1}. In spite of satisfying theoretical results regarding Łukasiewicz logic, all the attempts to use it as an instrument to deal with uncertainty phenomena, for example in the fuzzy context, had to deal with one of its main characteristic: conjunction and disjunction do not distribute one with respect to the other. In this paper we stress that operations ⊙ and ⊕ in any MV-algebra A both come from the same operation in the lattice ordered group associated with A. In order to model the notion of conjunction and disjunction one have instead to consider a lattice operation ∧ (or dually, ∨) together with the MV-algebraic operation ⊕ (or dually ⊙). An example of how this representation can be useful to model fuzzy phenomena will be given in the field of automata. Indeed in [4], semirings have been proposed to give a generalization of automata, the so called K-Σ- automata. More recently, automata with values in semirings over the natural numbers or the real numbers sets have been deeply investigated both to finding results on nondeterminism or infinite behavior of finite automata, and in the context of formal power series (see [8], [9]). We shall give a description of automata having values in BL-algebras and MV-algebras. 40 References [1] C.C. Chang, Algebraic analysis of many-valued logics. Trans. Amer. Math. Soc., 88:467490,1958. [2] R. Cignoli, I.M.L. D’Ottaviano, D. Mundici. Algebraic foundations of many-valued reasoning, volume 7 of Trends in Logic. Kluwer, Dordrecht, 2000. [3] R. Cuninghame-Green. Minimax algebra. Lecture Notes in Economics and Mathematical Systems, no 166. Springer-Verlag, 1979. [4] S. Eilenberg, Automata, Languages, and Machines, Academic Press, 1974. [5] J. S. Golan. The theory of semirings with applications in mathematics and theoretical computer science, Longman Scientific and Technical, 1992. [6] P. Hájek. Metamathematics of Fuzzy Logic, Kluwer, Dordrecht, 1998. [7] V.N. Kolokoltsov, V.P. Maslov. em Idempotent analysis and its applications, volume 401 of Mathematics and its Applications. Kluwer, 1997. [8] D. Krob. Some automata-theoretic aspects of min-max-plus semirings, In Idempotency, J. Gunawardena Ed., Cambridge University Press, 70-79, 1998. [9] I. Simon. Recognizable sets with multiplicities in the tropical semiring. In M.P.Chytil et al., eds, Lect. Notes in Computer Science, 324:107-120, 1988. [10] H.S. Vandiver. Note on a simple type of algebra in which cancellation law of addition does not hold. Bull. Amer. Math. Soc., 40:914-920, 1934. 41 On different ways of ordering conjoint evaluations D IDIER D UBOIS , H ENRI P RADE IRIT Université Paul Sabatier 31062, Toulouse, cedex 4, France E-mail: {❞✉❜♦✐s|♣r❛❞❡}❅✐r✐t✳❢r Introduction Operations for combining [0,1]–valued fuzzy set membership functions pointwisely, such as triangular norms or co-norms, uni-norms, null-norms, etc, have been extensively studied. Such operations indeed provide two services by returning a real number as a result of the combination of the membership degrees: i) a numerical degree of conjoint membership is assessed ; ii) one can take advantage of the linear order of the real numbers for comparing the degrees. However, in many practical problems (such as multiple criteria analysis, flexible constraints satisfaction problems), the scale [0,1] is too rich for being used, and more qualitative scales having a finite number of levels have to be preferred. But, the internal operations that can be defined on the latter scales (e.g., Godo and Sierra, 1988; Mas et al., 1999; Fodor, 2000) have a limited discriminating power since they take values on a finite range. In order to escape the dilemma of using either too expressive a scale which would enable an accurate discrimination between the degrees, or a more appropriate scale leading to too many ties, we investigate another route in this preliminary note. We are no longer looking for global evaluations which then can be compared, but we are rather handling the comparison of vectors of the membership degrees directly (following ideas already outlined in (Dubois and Prade, 2001)) by introducing refinements of Pareto ordering. Let L = {α0 = 0 < α1 < …< αL = 1} be a finite scale. Vectors of a given size N (α1, …, α , … , αN) made of values in L, can be partially ordered by Pareto ordering, denoted by <P. Let us, for instance, consider the case N = 2. We have (α0, α0) <P (α0, α1) <P (α1, α1) <P … <P (αL-1, αL) <P (αL, αL). For notational simplicity we shall write (i, j) < (i’, j’), in place of (αi, αj) <P (αi’, αj’). We assume symmetry, thus pairs (i, j) and (j, i) are equivalent, and by convention when we write (i, j) it is assumed that i ”j. More generally, we have (i, j) < (k, l) as soon as i ”k and j < l, or i < k and j ”l. The only undetermined cases are such that i < k and j > l. k Motivating example Once Pareto ordering is applied, what remains to specify is the ordering between pairs (i, j) and (k, l) such that i > k and j < l (Moura-Pires and Prade, 2000). The situation for the case N = 2, with L = {α0 = 0 < α1 < α2 < α3 = 1}, is pictured in Fig. 1. 42 Fig. 1. Refinements of Pareto ordering The pending decisions are indicated in dotted lines. Such a refinement of <P will be denoted by <r (refined ordering). For instance, as pictured in Fig. 1, (1, 3) <P (2, 3) and (2, 2) <P (2, 3), while (2, 2) is <P-incomparable to (1, 3) and to (0, 3). Moreover, when specifying a refinement <r, one should obey the transitivity requirement. For instance, it is impossible to enforce (1, 3) <r (2, 2) and (2, 2) <r (0, 3) in the same time. One may also choose to complete the Pareto ordering by enforcing equalities, e.g. (1, 1) =r (0, 2). It can be checked that there are 12 different “linearizations” of <P without ties for N = 2 and L = 3. Here are four examples (the added decisions are indicated in bold): (0, 0) <r (0, 1) <r (0, 2) <r (0, 3) <r (1, 1) <r (1, 2) <r (1, 3) <r (2, 2) <r (2, 3) <r (3, 3) (0, 0) <r (0, 1) <r (1, 1) <r (0, 2) <r (1, 2) <r (2, 2) <r (0, 3) <r (1, 3) <r (2, 3) <r (3, 3) (0, 0) <r (0, 1) <r (0, 2) <r (1, 1) <r (0, 3) <r (1, 2) <r (1, 3) <r (2, 2) <r (2, 3) <r (3, 3) (0, 0) <r (0, 1) <r (1, 1) <r (0, 2) <r (1, 2) <r (0, 3) <r (1, 3) <r (2, 2) <r (2, 3) <r (3, 3). The two first orderings are just the lexi-min and the lexi-max ordering respectively. In case L is an interval scale, the third ordering above would correspond to the one that would be given by an arithmetic mean refined by minimum, while the last ordering seems to be less simple to interpret. Note that the number of levels that are thus obtained amounts to 10 elements (from (0, 0) to (3, 3)), while L has 4 levels only. Conversely, one may also consider the possibility of a coarsening (<c) of the Pareto ordering, if some pairs, ordered by <P, are found as equally good, e. g., ∀i,j (0, i) =c (0, j), or ∀i,j (i, k) =c (j, k) for some k. We can thus express a form of absorption-like property for some levels. Thus, other combination schemes can be recovered, by both completing and coarsening the Pareto ordering, including the minimum: (0, 0) =c (0, 1) =c (0, 2) =c (0, 3) <r (1, 1) =c (1, 2) =c (1, 3) <r (2, 2) =c (2, 3) <P (3, 3). General framework The above example has shown that it is possible to specify a variety of ranking modes that are sufficiently discriminating, but still remaining in a qualitative setting. Generally 43 speaking, the problem is how to efficiently describe any Pareto-compatible ranking using a small number of conditions on the relative positioning of a few tuples and to study the characteristic properties of such rankings. Lexi-f and other refinements A natural idea is to start with an operation f from L×…×L to L, defined by an aggregation structure (f1, f2, f3, …, fk, …) where f1 is the identity and fk is defined on Lk has k arguments, and to use a refinement principle. One may for instance apply the lexi-f, a generalization of the lexi-min or the lexi-max, defined for any globally increasing f (f strictlty increases when all its arguments strictly increase), defined in the following way (Dubois, Prade, 2001). Let us consider two N-vectors of evaluations I = (i1, … , iN) and J = (j1, … , jN). Then I >lexi-f J ⇔ f(M(I) – M(J)) > f(M(J) – M(I)) where M(I) is the multi-set of evaluations αik associated with I, and thus identical evaluations are discarded before applying f. This means that in the above example with a 4-level scale, f(L×L) = {f2(0, 0), f2(1, 1), f2(2, 2), f2(3, 3)}. Thus, we cannot represent in this way an ordering such that (1, 1) < (0, 3) < (2, 2) for instance (as it is the case for the two last examples of linear orderings of the previous section), since f2(0, 3)∈ f(L×L) and the lexi-f cannot provide any refinement for the considered pairs. It shows that any complete pre-order cannot be generated has a lexi-f ordering for some qualitative aggregation structure f. An open question is how to characterize the descriptive power of the lexi-f? Are there other meaningful refinement principles based on a N-ary operation closed on L? We might think of using a transposition of Lorenz dominance defined for real-valued vectors by u <Lorenz v ⇔ L(u) <P L(v) where L(u) = (u1, u1 + u2, …, u1 + … + uN), assuming u1 •X2 •«•XN. Taking L(u) = (u1, f(u1, u2), …, f(u1, …, uN)) enables the non-trivial refinement of Pareto ordering for suitable choices of f. Possible requirements Indeed the above example indicates that there exists a large set of worth investigating refinements which can be specified without using an aggregation structure f. Obviously, it raises the question of how requirements on the ordering between the vectors can be expressed in the general case, i.e., for N larger than 2, or when L has more than 4 levels. What would be natural in order to moderate the combinatorics for defining a complete relation <r in the general case is to introduce various requirements on the ordering. We already mentioned the symmetry condition (the comparison of two vectors should not depend on the way the components of the vectors are displayed). Other possible natural requirements that may be thought of are the following ones: - A weak form of preferential independence holds, namely: (αi, αj) <r (αi’, αj’) ⇒ (αI, αi, αJ, αj, αK) <r (αI, αi', αJ, αj’, αK) (PI) where I, J, K are subsets of exponents and α stands for the vector of α ’s where k ∈ I. Note that this requirement is still in the spirit of the lexi-f. This leads using Pareto ordering to I k (αi, αj) <r (αi’, αj’), αI ”P αI’, αJ ”P αJ’, αK ”P αK’ ⇒ (αI, αi, αJ, αj, αK) <r (αI’, αi’, αJ’, αj’, α ) K’ Thus, we will have (1, 1) < r (0, 2) ⇒ (1, 1, 1) <r (0, 1, 2) <P (0, 2, 2). - However, the use of this principle can be seriously questioned as suggested by the following example. Assume (0, 3) <r (1, 2). Then (0, 3, 4, 5) < (1, 2, 4, 5) applying PI. But it may be the case that (3, 4) >r (2, 5) and (0, 5) >r (1, 4), which would rather lead to state (0, 3, 4, 5) >r (1, 2, 4, 5), at least if we assume the other natural cumulative principle and we use symmetry: αI <r αI’, αJ <r αJ’ ⇒ (αI, αJ) <r (αI’, αJ’) (C) But this new principle itself cannot lead to a safe extension of <r, as shown by the following example. Assume (0, 3) <r (1, 2), (3, 6) <r (4, 5), (2, 4) <r (3, 3), (1, 5) <r (0, 6). (C) applied to 44 the two first relations entail (0, 3, 3, 6) <r (1, 2, 4, 5), while the last two lead to (0, 3, 3, 6) >r (1, 2, 4, 5)! - Other examples of generic principles are “translation” rules. Namely, (αI, αi , αJ, αj, αK) <r (αI’, αi’, αJ’, αj’, αK’) ⇒ (αI, αi+x , αJ, αj+x, αK) <r (αI’, αi’+x, αJ’, αj’+x, αK’) for x> 0, and i+x, j+x, i'+x, j’+x less than L. A similar condition can be used changing + x into − x. - Lastly, one may also use a “transference” principle of the form (i, i) < (i − 1, i + 1) for any i •RUPRUHJHQHUDOO\WKDW LM  L− 1, j + 1) (we may also think of the converse principle). This latter condition applied to the case of a 5-level scale, for instance, considerably reduces the number of remaining questions to answer in order to define a complete ordering. Namely we have, applying Pareto ordering together with the latter condition, (0, 0) < (0, 1) < (1, 1) < (0, 2) < (1, 2) < (0, 3)? (2, 2) < (1, 3) < (0, 4)? (2, 3) < (1, 4)? (3, 3) < (2, 4) < (3, 4) < (4, 4), where the question marks stand for undetermined relations. We would even have only one indetermination, (0, 3)? (2, 2), if we add the previous translation constraints (i, j) < (i', j’) ⇒ (i, j + 1) < (i', j’ +1) and (i + 1, j) < (i' + 1, j’) with i + 1 < j and i' + 1 < j’. Note that the transference principle is in the spirit of Pigou-Dalton transferring in social choice, which enables Pareto ordering on vectors of real numbers u = (u1, …, uN) to be extended by stating (..., ui, …, uj, …) < (..., ui − ε, …, uj + ε, …) where 0 ”ε ”Xi − uj. It is known that this refinement is equivalent to Lorenz dominance. See (Spanjaard, 2003) for details and references. Note that in our framework, the counterpart of this idea is written (αi, αj) < (αi−1, αj+1) where ∀k, αk∈ L, since neither αj + ε nor αj + αk make sense. Using conditions on the rank of the elements of the scale As it can be seen, the refinements of Pareto ordering raise problems, and anyway do not lead to a complete ordering generally. A more efficient way for getting complete orderings is to define them through conditions and operations on the indices numbering the elements of the scale. Namely f(i, j) < f(i’, j’) ⇒ (αi, αj) <r (αi’, αj’) If f is associative, it is simple to extend the definition to N-vectors. This is compatible with Pareto ordering if f is non-decreasing, i.e. (αi, αj) <P (αi’, αj’) ⇒ f(i, j) < f(i’, j’) In case f(i, j) = f(i’, j’) it might be further refined by another condition. For example, (0, 0) <r (0, 1) <r (0, 2) <r (1, 1) <r (0, 3) <r (1, 2) <r (1, 3) <r (2, 2) <r (2, 3) <r (3, 3) is generated by f(i, j) = i +j refined by min(i, j) < min(i’, j’) if i + j = i’ + j’. Note that this ordering violates the transference property. However, generally speaking, it is not clear that any complete pre-ordering refining Pareto ordering can be specified in such a way using integer-valued arithmetic operations. Conclusion This informal discussion is not intended to bring any new substantial result. Still it is a preliminary attempt at understanding how to characterize complete pre-order structures capable of modeling different behaviors for comparing qualitative evaluation profiles. References D. Dubois, H. Prade. Refining aggregation operations in finite ordinal scales. Proc. Inter. Conf. in Fuzzy Logic and Technology (EUSFLAT 01), Leicester, UK, Sept. 5-7, 2001, 175-178. J. Fodor Smooth associative operations on finite ordinal scales. IEEE Trans. Fuzzy Systems, 8, 791-795, 2000. 45 L. Godo, C. Sierra A new approach to connective generation in the framework of expert systems using fuzzy logic. Proc. 18th Inter. Symp. Multiple-Valued Logic, Palma, 157-162, 1988. M. Mas, G. Mayor, J. Torrens t—operators and uninorms on a finite totally ordered set. Int. J. Intelligent Systems, 14, 909-922, 1999. J. Moura-Pires, H. Prade. Specifying fuzzy constraints interactions without using aggregation operators. Proc. 9th IEEE Int. Conf. on Fuzzy Systems (FUZZ-IEEE’00), San Antonio (Texas), May 7-10, 2000, 228-233. O. Spanjaard, Exploitation de préférences non-classiques dans les problèmes combinatoires: modèles et algorithmes pour les graphes. Thèse de Doctorat en Informatique, Université Paris IX Dauphine, 16 déc. 2003. 46 A definition of subjective possibility D IDIER D UBOIS1 , H ENRI P RADE1 , P HILIPPE S METS2 1 IRIT Université Paul Sabatier 31062, Toulouse, cedex 4, France E-Mail: {❞✉❜♦✐s|♣r❛❞❡}❅✐r✐t✳❢r 2 IRIDIA Université Libre de Bruxelles 1050 Bruxelles, Belgium E-Mail: ♣s♠❡ts❅✉❧❜✳❛❝✳❜❡ Quantitative possibility theory (QPT) was proposed as an approach to the representation of quantified uncertainty (Zadeh, 1978; Dubois and Prade 1988, 2000). In order to sustain this claim, operational semantics could be instrumental. In the subjectivist context, quantitative possibility theory somehow competes with probability theory in its personalistic or Bayesian views and with the Transferable Belief Model (TBM) (Smets and Kennes 1994; Smets 1998), both of which also intend to represent degrees of belief. We use the term ‘subjectivist’ to mean that we consider the concepts of beliefs (how much we believe) and betting behaviors (how much would we pay to enter into a game) without regard to the possible random nature and repeatability of the events. An operational definition, and the assessment methods that can be derived from it, provides a meaning to the value .7 encountered in statements like ‘my degree of belief is .7’. Bayesians claim that any state of incomplete knowledge of an agent can be modeled by a single probability distribution on the appropriate referential, and that degrees of belief coincide with probabilities that can be revealed by a betting experiment in which the agent provides betting odds under an exchangeable bet assumption. A similar setting exists for imprecise probabilities (Walley, 1991), relaxing the assumption of exchangeable bets, and more recently for the TBM as well (Smets, 1997), introducing several betting frames corresponding to various partitions of the referential. In that sense, numerical values encountered in these three theories are well defined. QPT seems to be a theory worth exploring as well, and rejecting it because of the current lack of convincing semantics would be unfortunate. The recent revival, by De Cooman and colleagues (1999), of a form of subjectivist QPT due to Giles (1982), and the development of possibilistic networks based on incomplete statistical data (Borgelt and Kruse, 2003) suggests on the contrary that it is fruitful to investigate various operational semantics for possibility theory. This is due to several reasons: first possibility theory is a special case of most existing non-additive uncertainty theories, be they numerical or not. Hence progress in one of these theories usually has impact in possibility theory. Another major reason is that possibility theory is very simple, certainly the simplest competitor for probability theory, for instance when using fuzzy numbers in fuzzy optimization problems. The aim of this paper is to propose subjectivist semantics for numerical possibility theory. 47 Such subjectivist semantics differs from the upper and lower probabilistic setting proposed by Giles and followers, without questioning its merit. Instead of making the bets nonexchangeable, we assume that the exchangeable betting rates only imperfectly reflect an agent’s beliefs. For long, it had been realized that possibility functions are mathematically identical to consonant plausibility functions (Shafer, 1976) so using the semantics of the TBM for producing a semantics for quantitative epistemic possibility theory is an obvious approach, even if not explored in depth so far. Consider what beliefs held by an agent on what is the actual value of a variable ranging on a set ŸFalled the frame of discernment. It is assumed that such beliefs can be represented by a belief function. A belief function can be mathematically defined from a finite random set that has a very specific interpretation. The so-called basic belief mass assigned to each set is understood as the weight given to the fact that all the agent may know is that the value of the variable of interest lies somewhere in that set. A plausibility function evaluates to what extent events are consistent with the available evidence. When the sets with positive mass are nested, the plausibility function is called a possibility measure, and can be characterized, just like probability, by an assignment of weights to singletons, called a possibility distribution. The agent’s beliefs cannot be directly assessed. All that can be known is the value of the `pignistic' probabilities the agent would use to bet on the frame Ÿ 6PHWV   7KH pignistic probability induced by a mass function is built by defining a uniform probability on each set of positive mass, and performing the convex mixture of these probabilities according to the mass function. In terms of game theory it corresponds to the Shapley value of a game; in terms of upper and lower probabilities it is the centre of gravity of the set of probabilities dominating the belief function. The pignistic probability is what is obtained by means of the random simulation of a fuzzy number, picking a cut at random followed by a random choice of an element in the cut, as studied by Chanas and Nowakowski (1988), among others. The knowledge of the values of the probability p allocated to the elements of Ω is not sufficient to construct a unique underlying belief function whose pignistic transform is p. Many belief functions induce the same probability distribution. For instance, uniform betting rates on Ω either correspond to complete ignorance on the values of the variable, or to the knowledge that the variable is random and uniformly distributed. So all that is known about the mass function that represents the agent's beliefs is that it belongs to the ones that induce the supplied probability. Under this scheme, we do not question the exchangeability of bets, as done by Walley, Giles and others. What we question is the assumption of a one-to-one correspondence between betting rates produced by the agent, and the actual beliefs entertained by the agent. Betting rates do not tell if the uncertainty of the agent results from the perceived randomness of the phenomenon under study or from a simple lack of information about it. The belief functions whose pignistic transform is p are called isopignistic belief functions and form the set IP(p). Since several mass functions lead to the same betting rates, one has to select one that most plausibly reflects the actual state of belief of the agent. A cautious approach is to obey a `least commitment principle' that states that one should never 48 presuppose more beliefs than justified. Then, one should select the ‘least committed’ element in the family of mass functions compatible with the pignistic probability function prescribed by the obtained betting rates. The first main result of this paper is that the least committed belief function, among the ones which share the same pignistic transform, is consonant, that is, the corresponding plausibility function is a possibility function. This possibility function is the unique one in the set of plausibility functions having this prescribed pignistic probability, because the pignistic transformation is a bijection between possibilities and probabilities. So this possibility function corresponds to the least committed mass function whose transform is equal to the probability supplied by the agent. This result is formalized on the basis of a measure of non-commitment of a belief function, namely the average of the cardinalities of its focal elements weighted by the mass function. Let m be a mass function from 2 to [0, 1], and let I(m) = ™A⊆Ω m(A)card(A) be its imprecision measure estimating the extent to which it is non-committal. Let p be the probability distribution obtained by eliciting an agent’s betting rates on the frame Ÿ ,W LV assumed that the actual belief of the agent is modeled by a mass function on ŸVXFKWKDWS  Pig(m) is the pignistic transform of m, that is : p(w) = ™A: w ∈A m(A)/ card(A) (1) This is an extension of Laplace indifference principle, according to which equally possible outcomes have equal probability. It is a weighted form thereof. It is suggested that the least debatable representation of an agent’s belief is the mass function m* which maximizes I(m) under the constraint (1) induced by betting rates. Theorem 1: The mass function m* which maximizes I(m) under the constraint Pig(m) = p is consonant. It defines a unique possibility distribution π defined by π(w) = ™u ∈ min(p(w), p(u)), w ∈ Ÿ  It is the converse of the pignistic transform of a possibility distribution, the converse of the transformation used by Chanas and Nowakovski. This probability/possibility transform was already proposed without formal justification by Dubois and Prade (1983). This result was already announced by the authors in (Dubois et al. 2001), but its proof is still unpublished. It contrasts with a similar result by Smets (2000) that uses a notion of information index based on the commonality function. Moreover, Smets (2000) suggested that the least specific isopignistic belief function −1 according to the commonality ordering (based on Q(A) = ™A⊆E m(E) ) is also Pig (Pig(m)). This ordering is less intuitive than the specialization ordering and the inclusion of Bel-Pl intervals. However, there is indeed a unique minimally Q-informative belief function in IP(p), and it is precisely the one found by maximizing I(m). But the commonality ordering turns to be more natural than one could think at first glance, since, in order to show the above result expressed by Theorem 2 below, we first prove that, for ensuring comparability in the 49 sense of the Q-informativeness ordering between a consonant belief function and a belief function, it is enough to rely on singletons: Lemma : Consider a belief function with mass function m and a possibility distribution π with respective commonality functions Q and Qπ.. Then Qπ(A) ≥ Q(A), ∀A ⊆ Ω if and only if π(ω) ≥ Pl({ω}), ∀ω ∈ Ω. Theorem 2: The unique consonant mass function in IP(p) (induced by the possibility distribution defined by (2)), is minimally Q-informative. These results provide a first reply to objections raised by Bayesian subjectivists against the use of fuzzy numbers and numerical possibility theory in decision-making and uncertainty modeling tasks. Interestingly, this approach does not refute the Bayesian operational setting; it only questions the interpretation of betting rates as full-fledged degrees of belief. References C. Borgelt R. Kruse (2003) Learning graphical possibilistioc models from data. IEEE trans. On Fuzzy Systems, 11, 159-171. Chanas S. and Nowakowski M. (1988). Single value simulation of fuzzy variable, Fuzzy Sets and Systems, 25, 43-57. De Cooman G., Aeyels D. (1999). Supremum-preserving upper probabilities. Inform. Sciences, 118, 173 –212. Dubois D. and Prade H. (1983) Unfair coins and necessity measures: towards a possibilistic interpretation of histograms. Fuzzy Sets and Systems, 10, 15-20. Dubois D. and Prade H. (1988). Possibility Theory, Plenum Press, New York. Dubois D., Nguyen H. T., Prade H. (2000) Possibility theory, probability and fuzzy sets: misunderstandings, bridges and gaps. In: Fundamentals of Fuzzy Sets, (Dubois, D. Prade,H., Eds.), Kluwer , Boston, Mass., The Handbooks of Fuzzy Sets Series, 343-438. Dubois D. and Prade H. Smets P. (2001) New semantics for quantitative possibility theory. Proc. of the 6th.European Conference on Symbolic and Quantitative Approaches to Reasoning and Uncertainty (ECSQARU 2001, Toulouse, France). LNAI 2143, Springer-Verlag, 410-421. Giles R. (1982). Foundations for a theory of possibility, Fuzzy Information and Decision Processes (Gupta M.M. and Sanchez E., eds.), North-Holland, 183-195. Shafer G. (1976). A Mathematical Theory of Evidence, Princeton University Press, Princeton. Smets P. (1990). Constructing the pignistic probability function in a context of uncertainty, Uncertainty in Artificial Intelligence 5 (Henrion M. et al., Eds.), North-Holland, Amsterdam, 29-39. Smets P. and Kennes R. (1994). The transferable belief model, Artificial Intelligence, 66, 191-234. Smets P. (1997). The normative representation of quantified beliefs by belief functions. Artificial Intelligence, 92, 229-242. Smets P. (1998) The transferable belief model for quantified belief representation. Handbook of Defeasible Reasoning and Uncertainty Management Systems, vol.1. (D.M. Gabbay, P. Smets, eds) Kluwer, Dordrecht, The Netherlands, 267-301. Smets, P. (2000) Quantified possibility theory seen as an hypercautious transferable belief model. Proc. Rencontres Francophones sur les Logiques Floues et ses Applications. (LFA 2000, La Rochelle, France), Cepadues, Editions, Toulouse, France, 343-353. Walley P. (1991). Statistical Reasoning with Imprecise Probabilities, Chapman and Hall. Zadeh L. A. (1978). Fuzzy sets as a basis for a theory of possibility, Fuzzy Sets and Systems, 1, 3-28. 50 Partially ordered monads and powerset Kleene algebras PATRIK E KLUND1 , W ERNER G ÄHLER2 1 Department of Computing Science Umeå University 90187 Umeå, Sweden E-Mail: ♣❡❦❧✉♥❞❅❝s✳✉♠✉✳s❡ 2 Scheibenbergstr. 37 12685 Berlin, Germany E-Mail: ❣❛❡❤❧❡r❅r③✳✉♥✐✲♣♦ts❞❛♠✳❞❡ Composing various powerset functors with the term monad gives rise to the concept of generalised terms. The goal is to extend traditional term unification with unification involving powersets of terms. This enables a study of substitutions and unifiers within Kleisli categories related to particular monads. As constructions of monads involve complicated calculations with natural transformations, proofs are supported by a graphical approach that provides a useful tool for handling various conditions, such as those for distributive laws. Monads equipped with order structures extends suitably to so called partially ordered monads. We will show how these partially ordered monads, together with their subconstructions, contribute to providing a generalised notion of powerset Kleene algebras. This generalisation builds upon more general powerset functor setting far beyond just strings (Kleene, 1956) and relations (Tarski, 1941) References [1] P. Eklund, W. Gähler, Fuzzy filter functors and convergence, Applications of category theory to fuzzy subsets. (S. E. Rodabaugh, et al ed.), Theory and Decision Library B, Kluwer, 1992, 109-136. [2] P. Eklund, W. Gähler, Completions and Compactifications by Means of Monads, in: Fuzzy Logic; State of Art, Kluwer, Dortrecht/Boston/London 1993, pp 39-56. [3] P. Eklund, M.A. Galán, M. Ojeda-Aciego, A. Valverde, Set functors and generalised terms, Proc. 8th Information Processing and Management of Uncertainty in Knowledge-Based Systems Conference (IPMU 2000), 1595-1599. [4] P. Eklund, M.A. Galán, J. Medina, M. Ojeda-Aciego, A. Valverde, Composing submonads, Proc. 31st IEEE Int. Symposium on Multiple-Valued Logic (ISMVL 2001), May 22-24, 2001, Warsaw, Poland, 367-372. [5] P. Eklund, M. A. Galán, J. Medina, M. Ojeda Aciego, A. Valverde, A categorical approach to unification of generalised terms, Electronic Notes in Theoretical Computer Science 66 No 5 (2002). URL: http://www.elsevier.nl/locate/entcs /volume66.html. 51 [6] W. Gähler, General Topology – The monadic case, examples, applications, Acta Math. Hungar. 88 (2000), 279-290. [7] W. Gähler, P. Eklund, Extension structures and compactifications, In: Categorical Methods in Algebra and Topology (CatMAT 2000), 181–205. [8] S. C. Kleene, Representation of events in nerve nets and finite automata, In: Automata Studies (Eds. C. E. Shannon, J. McCarthy), Princeton University Press, 1956, 3-41. [9] D. E. Rydeheard, R. M. Burstall, A categorical unification algorithm, Proc. Summer Workshop on Category Theory and Computer Programming, 1985, LNCS 240, Springer-Verlag, 1986, 493-505. [10] A. Tarski, On the calculus of relations, J. Symbolic Logic 6 (1941), 65-106. 52 Structured lattices and ground categories of L-sets A NNA F RASCELLA , C OSIMO G UIDO Dept. of Mathematics University of Lecce 73100 Lecce, Italy E-mail: ❝♦s✐♠♦✳❣✉✐❞♦❅✉♥✐❧❡✳✐t It is quite well known since [4] in the contest of fuzzy mathematics that in many disciplines and especially in fuzzy topology it is very useful to set up the classes of objects and of morphisms to deal with (e.g. the working category, dubbed “ground category”) as well as to associate to each morphism between two objects suitable operators, in both directions,(namely powerset operators) between the lattices of “canonical subobjects”(namely powersets) of the considered objects. Among papers mainly devoted to this topic we quote [2, 3, 5, 6] : the ground categories constructed in [5, 6], either in the fixed-basis or in the variable-basis context, contain only objects associated to (crisp) sets; the objects of the ground categories considered in [2, 3] are arbitrary L-sets (L a suitable, fixed complete lattice). Though not explicitly listed among the elements of the ground categories, powersets associated to objects and powerset operators associated to morphisms (i.e. powerset functors, as they are defined in [2]) are fundamental in most applications of this sort of set theory based on ground categories; for instance, in fuzzy topology, which in any case lies between classical topology and pointless topology, topologies are (M)-subsets of some ground object and (special) morphisms are maps satisfying properties expressed in terms of the powerset operators. In [5, 6] one can find a detailed and motivated justification for extending powersets and powerset operators from the traditional case of classical set theory to a more general context, including, as a first step, the Zadeh powerset operators. These operators are also the fundamental tool for the construction of powerset operators in [2, 3] and so they will be in this new approach. Here an original idea of [1] is extended and developed so as to allow the construction of powerset operators to be applied in more general situation, including those considered in [2, 3] and a special case of variable-basis fuzzy set theory extended to arbitrary L-sets. The fundamental aspect of the construction presented here is a sort of localization of the process leading to the definition of forward and backward powerset operators both of which can be obtained in the same way, by using the corresponding Zadeh operators. This process could be further extended by considering fuzzy sets as lattice-bundles so as to extend and include the general case of Rodabaugh’s variable-basis fuzzy set theories. References [1] C. De Mitri and C. Guido, G-fuzzy topological spaces and subspaces, Rend. Circolo Matem. Palermo Suppl. 29 (1992) 363-383 53 [2] C. De Mitri and C. Guido, Some remarks on fuzzy powerset operators, Fuzzy Sets and System 126 (2002) 241-251. [3] C. Guido, The subspace problem in the traditional point-set context of fuzzy topology, Quaestiones Mathematicae 20 (3) (1997) 351-372. [4] U. Höhle and S. E. Rodabaugh,eds, Mathematics of Fuzzy Sets: Logic, Topology, and Measure Theory, The Handbooks of Fuzzy Sets Series, Vol 3 (1999), Kluwer Academic Publishers(Dordrecht). [5] S. E. Rodabaugh, Powerset operator foundations for poslat fuzzy set theories and topologies in [4], 91-116. [6] S. E. Rodabaugh Powerset operator based foundation for point-set lattice- theoretic (poslat) fuzzy-set theories and topologies, Quaestiones Mathematicae 20(3) (1997), 463-530. 54 Fuzzy relation equations and fuzzy control — some old and some new ideas S IEGFRIED G OTTWALD Institute for Logic and Philosophy of Science Leipzig University 04107 Leipzig,Germany E-mail: ❣♦tt✇❛❧❞❅✉♥✐✲❧❡✐♣③✐❣✳❞❡ In fuzzy control, it is a well known approach to transfer, with reference to the compositional rule of inference, a list of linguistic control rules of the form IF α is Ai , THEN β is Bi , i = 1, . . . , n into a system of fuzzy relation equations Ai ◦ R = Bi , 1 ≤ i ≤ n, for a fuzzy relation R which has to be determined as a solution of this system of relation equations. The presentation shall have its focus on methodological considerations, will remind some approaches toward solvability considerations for such systems as well as toward approximate solutions like [4, 3], and extend them slightly with reference to some recent results explained e.g. in the papers [1, 2, 5]. But we will also give an embedding of this methodology to treat fuzzy control problems into a wider perspective of handling an interpolation problem in an approximative way. And we shall go on to look at some open problems from a rather general point of view. References [1] S. Gottwald, Generalised solvability behaviour for systems of fuzzy equations, in: V. Novák, I. Perfilieva (Eds.), Discovering the World with Fuzzy Logic, Advances in Soft Computing, Physica-Verlag: Heidelberg, 2000, 401–430. [2] S. Gottwald, V. Novák, I. Perfilieva, Fuzzy control and t-norm-based fuzzy logic. Some recent results, in: Proc. 9th Internat. Conf. IPMU’2002, ESIA – Universit’e de Savoie, Annecy, 2002, 1087–1094. [3] G. Klir, B. Yuan, Approximate solutions of systems of fuzzy relation equations, in: FUZZ-IEEE ’94. Proc. 3rd Internat. Conf. Fuzzy Systems, Orlando FL, 1994, 1452–1457. [4] F. Klawonn, Fuzzy points, fuzzy relations and fuzzy functions, in: V. Novák, I. Perfilieva (Eds.), Discovering the World with Fuzzy Logic, Advances in Soft Computing, Physica-Verlag: Heidelberg, 2000, 431–453. [5] I. Perfilieva, S. Gottwald, Fuzzy function as a solution to a system of fuzzy relation equations, Internat. J. General Systems, 32 (2003) 361–372. 55 Capacities on lattices M ICHEL G RABISCH Université Paris I Panthéon-Sorbonne 75015 Paris, France E-mail: ▼✐❝❤❡❧✳●r❛❜✐s❝❤❅❧✐♣✻✳❢r 1 Introduction Capacities [3] have been introduced by Choquet, and rediscovered by Sugeno [13] under the name of fuzzy measures. On a mathematical point of view, these are monotonic set functions µ : P (N) −→ [0, 1] over some set N (assumed to be finite in this paper), or otherwise said, isotone mappings from the Boolean lattice (2N , ⊆) to the linear lattice ([0, 1], ≤), preserving top and bottom. Usual tools used in capacity theory are the Möbius transform [11], the Choquet integral, and interaction index [5]. Recently, Grabisch and Labreuche have proposed the concept of bi-capacities [7, 6], which generalizes capacities for bipolar scales in a context of decision making. Mathematically speaking, these / being increasare functions v : Q (N) −→ [−1, 1], where Q (N) := {(A, B) ∈ 2N × 2N | A ∩ B = 0}, ing in first coordinate and decreasing in second one. More abstractly, a bi-capacity is an isotone mapping from the lattice (3N , ⊑) to the linear lattice ([−1, 1], ≤) preserving top and bottom, where (A, B) ⊑ (C, D) iff A ⊆ C and B ⊇ D. Usual tools of capacity theory mentionned above have all been generalized to bi-capacities. Taking this as a starting point, one may define capacities as isotone mappings from some lattice L to ([−1, 1], ≤), preserving top and bottom. This can be interpreted in decision making and even larger domains such as knowledge discovery [10]. The aim of the paper is to show how to generalize usual tools of capacity theory to this general setting, using the less possible restrictions on the lattice L. For the Choquet integral, we refer the reader to [9]. We will make a particular mention of belief functions (see a pioneering work by Barthélemy defining belief functions on lattices [1]), and refer the reader to [8] for the case of possibility measures. 2 Capacities on lattices (for a reference on lattices, see [2]) Let (L, ≤) be a finite lower locally distributive lattice, we denote as usual ∨, ∧, ⊤, ⊥ supremum, infimum, top and bottom. Any such lattice can be represented uniquely by its ∨-irreducible elements in an irredundant decomposition [4]. An element i ∈ L is a ∨-irreducible element if i 6= ⊥ and it has only one predecessor. Let us call J (L) the set of all ∨-irreducible elements of L. For any x ∈ L, we denote by η∗ (x) its unique irredundant decomposition in join-irreducible elements. For x, y ∈ L, we say that x covers y (or y is a predecessor of x), denoted x ≻ y, if there is no z ∈ L, z 6= x, y such that x ≤ z ≤ y. 56 Let v : L −→ R be a real-valued function on L. v is a capacity if v is isotone. Bottom and top have to be preserved if one replaces R by any closed interval. 3 Möbius transform The first fundamental concept in capacity theory is the Möbius transform. Following the general definition of Rota [11] (see also [2, p. 102]), we have already a definition for the general case. For any function f on (L, ≤), the Möbius transform of f is the function m : L −→ R solution of the equation: f (x) = ∑ m(y). y≤x The expression of m is obtained through the Möbius function µ by: m(x) = ∑ µ(y, x) f (y) y≤x where µ is defined inductively by   1, − ∑x≤t<y µ(x,t), µ(x, y) =  0, 4 if x = y if x < y otherwise. Derivative of functions on lattices Let (L, ≤) be a finite lower locally distributive lattice, and f : L −→ R a real-valued function on it. Definition 1. Let i ∈ J (L). The derivative of f w.r.t. i at point x ∈ L is given by: ∆i f (x) := f (x ∨ i) − f (x). Note that ∆i f (x) = 0 if i ≤ x. We say that the derivative ∆i f (x) is Boolean if [x, x ∨ i] is the Boolean lattice 21 , otherwise said x ∨ i ≻ x. Using the irredundant decomposition, the derivative w.r.t any element y can be defined. Definition 2. Let x, y ∈ L, and y = ∨nk=1 ik be the irredundant decomposition of y into join-irreducible elements. Then the derivative of f w.r.t y at point x is given by: ∆y f (x) = ∆i1 (∆i2 (· · · ∆in f (x) · · · )). The derivative is Boolean if [x, x ∨ y] is the Boolean lattice 2n . The derivative is 0 if for some k, ik ≤ x. We express the derivative in terms of the Möbius transform of f . Theorem 3. Let x, y ∈ L, such that ∆y f (x) is Boolean. Then ∆y f (x) = ∑ z∈[y,x∨y] 57 m(z). 5 Shapley value and interaction index We need some additional structure on L at this point. We consider finite lower locally distributive lattices L1 , . . . , Ln , with top and bottom of Li denoted ⊤i , ⊥i , i = 1, . . . , n, and L is the product lattice L := L1 × · · · × Ln with the product order. A vertex of L is an element x = (x1 , . . . , xn ) of L where xi is either ⊤i or ⊥i , for i = 1, . . . , n. We denote Γ(L) the set of vertices of L. Note that if L is a Boolean lattice, then L = Γ(L). We begin by defining the importance index as the interaction index w.r.t. a single join-irreducible element. Definition 4. Let i = (⊥1 , . . . , ⊥ j−1 , i0 , ⊥ j+1 , . . . , ⊥n ) be a join-irreducible element of L. The interaction w.r.t. i of v is any function of the form ∑ I(i) := α1h(x) ∆i v(x), (1) j−1 x∈Γ(∏k=1 Lk )×{i0 }×Γ(∏nk= j+1 Lk ) where i0 is the (unique) predecessor of i0 in L j , h(x) is the number of components of x equal to ⊤l , l = 1, . . . , n, and α1k ∈ R for any integer k. Observe that the constants α1h(x) do not depend on i. Also, the derivative is Boolean. S Let us generalize Definition 4 to a class of elements of L denoted L̃ and defined as follows: L̃ := J⊆N L̃J , with L̃J := {x ∈ L | ∀k ∈ J, ∃ik ∈ Lk such that ∀i ∈ η∗ (xk ), i ≻ ik , and xk = ⊥k if k ∈ N \ J} In words, it is the set of elements whose coordinates are either bottom or such that the irredundant decomposition covers a unique element. Observe that for the case where Lk is a linear lattice or a Boolean one (i.e. practical cases fo interest), L̃ = L. Definition 5. Let K ⊆ N, and x ∈ L̃K , and denote as above for all k ∈ K, ik the element covered by all i ∈ η∗ (xk ). The interaction w.r.t. x of v is any function of the form ∑ I(x) := |J| αh(y) ∆x v(y) (2) y|yk =⊤k or ⊥k if k6∈K,yk =ik else where J is the set of join-irreducible elements in the decomposition of x. The derivative is Boolean if in addition the Lk ’s are modular (and hence distributive). We have the following general result. Theorem 6. Let K ⊆ N, and assume distributivity holds for every Lk , k ∈ K. The expression of the interaction index for x ∈ L̃K in terms of the Möbius transform is given by: I(x) = ∑ |J|,|K| βk(z) m(z), z∈[x,x̌] with x̌k := (⊤k ) for k 6∈ K, and x̌k = xk else, J is the set of join-irreducible elements in the decomposition of x, and k(z) is the number of coordinates of z not equal to ⊥l , l = 1, . . . , n. Moreover, the real |J|,|K| |J| constants βk(z) are related to the αh(x) ’s by: |J|,|K| βk(z) = n−k(z)  ∑ l=0  n − k(z) |J| α(k(z)−|K|+l) l 58 (3) 6 Belief functions on lattices Let L be a lattice. Following the classical definition, we say that a capacity v : L −→ [0, 1] on L is a belief function iff its Möbius transform is non negative, and v preserves top and bottom. Barthélemy has shown in [1] that this is equivalent to say that v is k-monotone for all k > 2, the definition of k-monotonicity being adapted in the obvious way for our general setting. In fact, most of properties of belief functions are still true when defined on a lattice. We show in the sequel the decomposition of belief functions into simple support functions, which generalizes the classical result of Shafer [12]. For any belief function b on L, we define the corresponding commonality function q by q(x) := ∑y≥x m(y), where m is the Möbius transform of b. Let b1 , b2 be two belief functions on L, m1 , m2 their Möbius transform, and q1 , q2 their commonality functions. The Dempster rule of combination of b1 , b2 , denoted b1 ⊕ b2 is defined in terms of its Möbius transform by m1 ⊕ m2 (x) = ∑ m1 (y1 )m2 (y2 ) y1 ∧y2 =x It is easy to show that the commonality function q1 ⊕ q2 associated to b1 ⊕ b2 is q1 ⊕ q2 (x) = q1 (x)q2 (x). Definition 7. We call simple support function focussed on y, denoted yω , the function of which the Möbius transform satisfies   1 − ω, if x = y m(x) = ω, if x = ⊤   0, otherwise. The decomposition of some belief function b in terms of simple support functions is thus to write b under the form: M b(x) = yωy (x). y∈L It can be shown that the coefficients ωy of this decomposition write ωy = ∏ q(x)−µ(x,y) x≥y where µ(x, y) is the Möbius function. Note that as in the classical case, these coefficients may be strictly greater than 1, hence corresponding simple support functions have negative Möbius transform. References [1] J.P. Barthélemy. Monotone functions on finite lattices: an ordinal approach to capacities, belief and necessity functions. In J. Fodor, B. De Baets, and P. Perny, editors, Preferences and Decisions under Incomplete Knowledge, pages 195–208. Physica Verlag, 2000. [2] G. Birkhoff. Lattice Theory. American Mathematical Society, 3d edition, 1967. [3] G. Choquet. Theory of capacities. Annales de l’Institut Fourier, 5:131–295, 1953. 59 [4] R.P. Dilworth. Lattices with unique irreducible representations. Annals of Mathematics, 41:771–777, 1940. [5] M. Grabisch. k-order additive discrete fuzzy measures and their representation. Fuzzy Sets and Systems, 92:167–189, 1997. [6] M. Grabisch and Ch. Labreuche. Bi-capacities. In Joint Int. Conf. on Soft Computing and Intelligent Systems and 3d Int. Symp. on Advanced Intelligent Systems, Tsukuba, Japan, October 2002. [7] M. Grabisch and Ch. Labreuche. Bi-capacities for decision making on bipolar scales. In EUROFUSE Workshop on Informations Systems, pages 185–190, Varenna, Italy, September 2002. [8] M. Grabisch and Ch. Labreuche. Bi-belief functions and bi-possibility measures. In Proc. of the Int. Fuzzy Systems Association World Congress (IFSA 2003), pages 155–158, Istanbul, Turkey, June 2003. [9] M. Grabisch and Ch. Labreuche. Capacities on lattices and k-ary capacities. In 3d Int, Conf. of the European Soc. for Fuzzy Logic and Technology (EUSFLAT 2003), pages 304–307, Zittau, Germany, September 2003. [10] M. Grabisch and Ch. Labreuche. Interaction between attributes in a general setting for knowledge discovery. In 4th Int. JIM Conf. (Journées de l’Informatique Messine) on Knowledge Discovery and Discrete Mathematics, pages 215–222, Metz, France, September 2003. [11] G.C. Rota. On the foundations of combinatorial theory I. Theory of Möbius functions. Zeitschrift für Wahrscheinlichkeitstheorie und Verwandte Gebiete, 2:340–368, 1964. [12] G. Shafer. A Mathematical Theory of Evidence. Princeton Univ. Press, 1976. [13] M. Sugeno. Theory of fuzzy integrals and its applications. PhD thesis, Tokyo Institute of Technology, 1974. 60 Order-reversing involutions and residuated lattices JAVIER G UTIÉRREZ G ARCÍA Depto. de Matemáticas Universidad del Pais Vasco 48080 Bilbao, Spain E-mail: ♠t♣❣✉❣❛❥❅❧❣✳❡❤✉✳❡s Abstract Given a complete lattice (L, ≤) with an order–reversing involution, we find conditions to exist a residuated binary operation ∗ such that the order–reversing involution is determined by the residuation associated to the binary operation ∗. Particularly, if (L, ≤, ) is a completely distributive lattice with an order–reversing involution ′ we prove that there exists an operation ∗ such that (L, ≤, ∗) is an integral, commutative Frobenius lattice in which α −→ ⊥ = α′ for each α ∈ L if and only if α ≤ β′ whenever α ∧ β. Keywords: Order–reversing involution, po–semigroup, residuation, Heyting algebra. AMS Classification: 18A40, 54A40. 1 Preliminaries W V Let (L, ≤) be a complete lattice with universal bounds ⊥ and ⊤. In particular ∅ = ⊥ and ∅ = ⊤. A unary operation ′ is an order–reversing involution (or a quasi-complementation) if it is an involution (i.e. α′′ = α for all α ∈ L) that inverts the ordering (i.e. α ≤ β implies β′ ≤ α′ ). A po–groupoid (short for partially ordered groupoid) is a poset (L, ≤) with a binary operation ∗ on L which satisfies the isotonicity condition: α ≤ β implies α ∗ γ ≤ β ∗ γ and γ ∗ α ≤ γ ∗ β for all α, β, γ ∈ L. When ∗ is commutative or associative, (L, ≤, ∗) is called a commutative po–groupoid or po–semigroup, respectively. In a po–groupoid (L, ≤, ∗) an element α is called ideal element if α ∗ β ≤ α ∧ β for all α, β ∈ L. An po–groupoid (L, ≤, ∗) is called integral if and only if the universal upper bound ⊤ acts as unit element w.r.t. ∗. In an integral po–groupoid (L, ≤, ∗) all elements are ideal. ∗ Let (L, ≤, ∗) be a po–groupoid and α, β ∈ L. The right–residual α −→r β of β by α is the largest ∗ γ ∈ L (if it exists) such that α ∗ γ ≤ β; the left–residual α −→l β of β by α is the largest γ ∈ L (if ∗ it exists) such that γ ∗ α ≤ β. A residuated lattice is an m–lattice (L, ≤, ∗) in which α −→r β and ∗ ∗ α −→l β always exists for any α, β ∈ L. Obviously, in case (L, ≤, ∗) is commutative, both α −→r β ∗ ∗ and α −→l β coincide. We shall denote them by α −→ β and call it the implication associated to ∗. The existence of residuals implies that the operation ∗ preserves all existing supremss in each argument.  ∗ ∗ A po–groupoid (L, ≤, ∗) in which α −→l ⊥ −→r ⊥ = α for every right-ideal element α and  ∗ ∗ β −→r ⊥ −→l ⊥ = β for every left-ideal element β is a Frobenius po–groupoid (cf. [1, page 61 341]). In particular, if (L, ≤, ∗) is an integral commutative residuated lattice, then it is Frobenius if  ∗ ∗ and only if α −→ ⊥ −→ ⊥ = α for every α ∈ L. A lattice (L, ≤) is said to be a Heyting algebra if (L, ≤, ∧) is a residuated lattice. Obviously, (L, ≤, ∧) is an integral commutative residuated lattice. An element p in a lattice L is called prime if and only if the relation p ≥ α ∧ β always implies p ≥ α or p ≥ β. The set of all prime elements is denoted PRIME L. Dually, an element q in a lattice L is called coprime if and only if the relation q ≤ α ∨ β always implies q ≤ α or q ≤ β. The set of all coprime elements is denoted COPRIME L. 2 Order-reversing involutions and residuated lattices We shall try to answer the following question: Given a lattice with an order–reversing involution (L, ≤, ′ ), does there exist a binary operation ∗ such that the order–reversing involution ′ is determined by the implication ∗ ∗ −→ associated to ∗, i.e. α −→ ⊥ = α′ for each α ∈ L ? In view of the structures considered in the preliminaries, we can reformulate the previous question in a more precise way: Given a lattice with an order–reversing involution (L, ≤, ′ ), does there exist an integral commutative Frobenius lattice (L, ≤, ∗) such that the order–reversing involution ′ is de∗ ∗ termined by the implication −→ associated to ∗, i.e. α −→ ⊥ = α′ for each α ∈ L ? This question has been studied by Esteva and Godo in [2] in the case of bounded chains. The answer to the previous question is obviously NOT in general. In fact, we have the following example: Example Let L = {⊥, α, β, ⊤} where α ∧ β = ⊥, α ∨ β = ⊤, α′ = α and β′ = β. Let assume that there exists an integral, commutative m–lattice (L, ≤, ∗) such that the order–reversing involution ′ is ∗ ∗ determined by the implication −→. Then α ∗ β ≤ α ∧ β = ⊥ and so β ≤ α −→ ⊥ = α′ = α. Consequently we see that in order to have a positive answer the lattice must satisfy some additional condition. Particularly, the existence of such a binary operation requires that the order–reversing involution satisfies the following condition: ∀α, β ∈ L α∧β = ⊥ =⇒ α ≤ β′ Now we can reformulate the previous question: Given a lattice with an order–reversing involution (L, ≤, ′ ) satisfying condition ⋆, does there exist an integral, commutative, Frobenius lattice (L, ≤, ∗) such that the order– ∗ ∗ reversing involution ′ is given by the implication −→, that is, α′ = α −→ ⊥ for all α ∈ L? 62 (⋆) In order to have an answer to this question we shall use the residuation associated to the infimum and consequently from now on we shall assume that (L, ≤) is a Heyting algebra. We have then the following lemmata: Lemma 1. Let (L, ≤, ′ ) be a Heyting algebra with an order–reversing involution ′ . Then condition ⋆ is equivalent to the following condition: ∀α ∈ L ∧ α −→ ⊥ ≤ α′ (⋆⋆) Lemma 2. Let (L, ≤, ′ ) be a Heyting algebra with an order–reversing involution ′ . Then for each α, β ∈ L such that β is coprime we have  ⊤, if α ≤ β′ ; ∧ ′ α −→ β = β′ , if α 6≤ β′ . Consequently ∧ α ∧ α −→ β  ′ ′ =  ⊥, if α ≤ β′ ; ≤γ α ∧ β, if α 6≤ β′ . ⇐⇒ ∧ β ≤ α′ ∨ α −→ γ  Corollary 3. Let (L, ≤, ′ ) be a Heyting algebra with an order–reversing involution ′ . Then for each α, β ∈ L such that α and β are coprime we have ′ ′ ′ ′ ∧ ∧ ∧ ∧ α −→ β′ ∧ β −→ α′ = β ∧ β −→ α′ = α −→ β′ ∧ α. Theorem 4. Let (L, ≤, ′ ) be a complete lattice with an order–reversing involution ′ such that: (i) (L, ≤) is a Heyting algebra and (ii) any element of L is the supremum of all coprime elements below it. Then the following binary operation ∗ defined for each α, β ∈ L by  α ∗ β = ∨ q1 ∧ q2 : q1 , q2 coprime, q1 ≤ α, q2 ≤ β and q1 6≤ q′2 ∗ determines a commutative, residuated lattice structure (L, ≤, ∗). The corresponding residuation −→ is defined for each β, γ ∈ L by  ∗ β −→ γ = ∧ q′ ∨ p : q coprime, p prime, q ≤ β, γ ≤ p . Moreover, if (L, ≤, ′ ) satisfies condition ⋆, then (L, ≤, ∗) is an integral, commutative Frobenius ∗ lattice satisfying α′ = α −→ ⊥ for all α ∈ L. As a consequence on the previous theorem we have the following corollaries which are the announced answers to the stated question: Corollary 5. Let (L, ≤, ′ ) be a Heyting algebra with an order–reversing involution ′ such that any element is the supremum of all coprime elements below it. Then there exists an operation ∗ such that ∗ (L, ≤, ∗) is an integral, commutative Frobenius lattice in which α −→ ⊥ = α′ for each α ∈ L if and only if condition ⋆ is satisfied. If the lattice is continuous, then condition (i) in the theorem is equivalent to distributivity of the lattice (see [4]). Moreover, a lattice is completely distributive if and only if it is continuous and satisfies condition (ii) in the theorem. Consequently, we have the following: 63 Corollary 6. Let (L, ≤, ′ ) be a completely distributive lattice with an order–reversing involution ′ . Then there exists an operation ∗ such that (L, ≤, ∗) is an integral, commutative Frobenius lattice in ∗ which α −→ ⊥ = α′ for each α ∈ L if and only if condition ⋆ is satisfied. Particularly in the case of a bounded chain, condition ⋆ is always satisfied and we have the following: Corollary 7. (Proposition A.4 in [2]) Let (L, ≤, ′ ) be a bounded chain with an order–reversing involution ′ . Then there exists an operation ∗ such that (L, ≤, ∗) is an integral, commutative Frobenius ∗ lattice in which α −→ ⊥ = α′ for each α ∈ L. References [1] G. Birkhoff, Lattice Theory, 3rd (new) ed. Providence, RI: Amer. Math. Soc., 1967. [2] F. Esteva and L. Godo, Monoidal t–norm based logic: towards a logic for left-continuous t–norm, Fuzzy Sets and Systems 124(3) (2001), 271–288. [3] J.C. Fodor, Contrapositive Symmetry of Fuzzy implications Technical Report 1993/1, Eötvös Loránd University, Budapest 1993. [4] G. Gierz, K.H. Hofmann, K. Keimel , J.D. Lawson, M. Mislove and D.S. Scott, A Compendium of Continuous Lattices, Springer, Berlin, 1980. [5] U. Höhle and S.E. Rodabaugh (Eds.), “Mathematics of Fuzzy Sets: Logic, Topology, and Measure Theory," The Handbooks of Fuzzy Sets Series: Vol.3, Kluwer Academic Publishers, Boston, Dordrecht, London, 1999. [6] U. Höhle, Commutative, residuated l-monoids, in U. Höhle and E.P. Klement (Eds.), “Nonclassical Logics and Their Applications to Fuzzy Subsets", pp. 53–106, Kluwer Academic Publishers, Boston, Dordrecht, London, 1995. 64 Fuzzy predicate logic – a survey P ETR H ÁJEK Institute of Computer Science Academy of Sciences 18207 Praha 8, Czech Republic E-mail: ❤❛❥❡❦❅❝s✳❝❛s✳❝③ Mathematical fuzzy logic (or fuzzy logic in the narrow sense) is understood as a kind of many-valued logic with comparative notion of truth and with the real unit interval [0, 1] as the standard set of truth values. We further postulate truth-functionality (existence of truth-functions of connectives) and base the theory of truth functions on the notion of a t-norm as a truth function of conjunction. The basic fuzzy logic BL works with continuous t-norms as truth functions of conjunction and their residua as corresponding truth functions of implication; more generally, the monoidal t-norm based logic MTL works with left-continuous t-norms and their residua. Other generalizations will be mentioned. Part 1 of the talk will be devoted to a very quick survey of propositional logics BL, MTL and stronger logics related to particular t-norms (Łukasiewicz, Gödel, product logic and some others). (For a detailed survey see [8].) Part 2 will describe in some details the predicate logics BL∀ and MTL∀ and other predicate logics built over the propositional logics of Part 1 ([9, 6, 7, 10]). Here again we shall distinguish standard semantics (of [0,1]-fuzzy relational structures) and general semantics (fuzzy relational structures over linearly ordered BL-algebras, MTL-algebras and similar algebras). Tarski style truth definition will be given and completeness of very natural axiom systems with respect to the general semantics will be presented. But several important predicate fuzzy logic are not recursively axiomatizable with respect to their standard semantics; some others are. This will be surveyed and degree of undecidability of most of these logics will be explicitly stated ([12, 13, 1, 2, 3, 4, 19, 17, 18]). Main examples: the set of standard tautologies of the fuzzy predicate logic BL∀ is not arithmetical, whereas the set of standard tautologies of the logic MTL∀ coincides with the set of general tautologies of this logic and therefore is recursively enumerable. When defining the general semantics of BL∀ we cannot restrict ourselves to interpretations over BL-chains that are completely ordered; this would lead again to a non-arithmetical set of tautologies [20]. On the other hand, we can give up linear order of the algebras; one gets a complete axiomatization of this semantics just by deleting one axiom from the corresponding axiomatization based on linearly ordered algebras. Then we refer on corresponding falsity-free (positive) logics and their semantics based on algebras called hoops [7]. Completeness and conservativity results will be presented. Part 3 will deal with mathematics based on fuzzy predicate logic. We go into some details concerning set theory. We describe a Zermelo-Fraenkel-like fuzzy set theory over Basic predicate logic and Cantor-like set theory with full comprehension over Łukasiewicz predicate logic. The latter theory can be shown to contain full Peano arithmetic with its classical logic ([23, 24, 25, 15, 16, 14]). 65 References [1] Baaz M., Leitsch A., Zach R.: Incompleteness of an infinite-valued first-order Gödel logic and of some temporal logics of programs. Computer Science Logic CSL’95, Springer 1996 [2] Baaz M., Veith H.: Quantifier elimination in fuzzy logic. Computer Science Logic CSL’98 Springer 1998, 399-414 [3] Baaz M., Preining N., Zach R.: Characterization of the axiomatizable prenex fragments of firstorder Gödel logics. 3rd Int. Symp. Multiple-valued Logic, IEEE Computer Society Press 2003, 175-180 [4] Baaz M., Ciabattoni A., Fermüller C.: Herbrand’s theorem for prenex Gödel logic and its consequences for theorem proving. In: Proceedings of logic programming and automated reasoning (LPAR’2001) Cuba 2001, Springer-Verlag LNAI 2250, 201-216 [5] Drossos C., Mundici D.: Many-valued points and equality. Synthese 125 (2000), 97-101 [6] Esteva F., Godo L.: Monoidal t-norm based logic: Towards an axiomatization of the logic of left continuous t-norms. Fuzzy Sets and Systems, 124 (2001) 271-288. [7] Esteva F., Godo L. Hájek P., Montagna F.: Hoops and fuzzy logic. J.Logic Computat. 13 (2003) 531-555 [8] Gottwald S., Hájek P.: T-norm based fuzzy logics. In: (Klement and Mesiar, ed.) Triangular Norms. To appear. [9] Hájek P.: Metamathematics of fuzzy logic, Kluwer, 1998. [10] Hájek P.: Mathematical fuzzy logic – state of art 2001. Matemática contemporanea 24 (2003) 71-89 [11] Hájek P.: A true unprovable formula of fuzzy product logic. Submitted. [12] Hájek P.: Fuzzy logic and arithmetical hierarchy III. Studia Logica 68 (2001) 129-142 [13] Hájek P.: Fuzzy logic and arithmetical hierarchy IV. To appear in the proceedings of the conference FOL 75 (Berlin 2003) [14] Hájek P.: Mathematical fuzzy logic and set theory (Extended abstract.) Proceedings of Takeuti Symposium, December 17-19 2003 Kobe (Japan) [15] Hájek, P., Haniková, Z.: A set theory within fuzzy logic, Proc. 31st IEEE ISMVL Warsaw (2001) 319-324 [16] H ÁJEK P., H ANIKOVÁ Z.: A Development of Set Theory in Fuzzy Logic. In: Beyond Two: Theory and Applications of Multiple-Valued Logic (Ed.: Fitting M., Orlowska E.) - Heidelberg, Physica-Verlag 2003, pp. 273-285 [17] Montagna F.: Three complexity problems in quantified fuzzy logic. Studia Logica 68 (2001) 143-152 [18] Montagna F.: On the predicate logics of continuous t-norm BL-algebras. Submitted. 66 [19] Montagna F., Ono H.: Kripke semantics, undecidability and standard completeness for Esteva and Godo’s logic MTL∀. Studia Logica 71 (2002) 183-192 [20] Montagna F., Sachetti L.: Kripke-style semantics for many-valued logics. Math. Log. Quart. 49 (2003) 629-641 [21] Takano M. Strong completeness of lattice-valued logic. Arch. Math. Logic 41 (2002) 497-505 [22] Takeuti, G., Titani S.: Globalization of intuitionistic set theory. Annals Pure Appl Logic 33 (1987), 195-211. [23] Takeuti, G., Titani, S.: Intuitionistic fuzzy logic and intuitionistic fuzzy set theory, J. Symb. Logic 49 (1984) 851-866 [24] Takeuti, G., Titani, S.: Fuzzy logic and fuzzy set theory, Arch. Math. Logic 32 (1992) 1-32 [25] Titani, S.: A lattice-valued set theory, Arch. Math. Logic 38 (1999) 395-421 67 Fuzzy sets and sheaves U LRICH H ÖHLE FB C Mathematik und Naturwissenschaften Bergische Universität 42097 Wuppertal, Germany E-mail: ❯❧r✐❝❤✳❍♦❡❤❧❡❅♠❛t❤✳✉♥✐✲✇✉♣♣❡rt❛❧✳❞❡ It is a remarkable fact that the historic development of fuzzy set theory (cf. [2]) proceeds completely isolated from sheaf theory3 . Also the long lasting debate on categorical foundations of fuzzy set theory (cf. [6]) does not open the horizon for sheaf-theoretic arguments in the formulation of such fundamental notions as membership function, measurement of membership, similarity, fuzzy ordering, fuzzy relational equation, etc. The aim of this paper is to explain that large parts of fuzzy set theory are actually subfields of sheaf theory. We show that fuzzy sets are subsheaves of simple sheaves — so-called sheaves of level cuts, similarity relations are sheaves of ordinary equivalence relations, fuzzy subgroups are subsheaves of subgroups of simple sheaves of groups, and stratified Ω-valued topological spaces are topological space objects in the category of sheaves. Further, intersections, unions, images and inverse images of fuzzy sets, the max − min-composition of fuzzy relations are special categorical constructions in the category of sheaves. Fuzzy power sets are nothing but power sheaves of simple sheaves. Fuzzy relational equations are equations in the Kleisli category associated with the power object monad in the category of sheaves. Moreover, fuzzy theorists are not able to give a proper solution of the quotient problem w.r.t. similarity relations and a proper construction of fuzzy factor groups w.r.t. invariant fuzzy subgroups. In order to overcome these shortcomings some fundamental knowledge from sheaf theory is inevitable. Therefore we begin with some basic facts from sheaf theory including the role of the socalled espace étalé, the concept of Ω-valued sets and the tilde-construction. We recall the construction of the subobject classifier and the identification of subobjects with characteristic morphisms in the category of sheaves, resp. complete Ω-valued sets. The importance of these constructions will appear immediately for every fuzzy set theoretist, when their relationships to standard techniques in fuzzy set theory are explained — e.g. level cut techniques or the interpretation of fuzzy sets by their prototypes. Further, we discuss the set-theoretical operations on fuzzy sets in the light of sheaf theory and quote the important categorical axioms for fuzzy preorderings, similarity relations and fuzzy partial orderings. We solve the quotient problem w.r.t. similarity relations in terms of an exact diagram and show by using only categorical arguments that the symmetrization of (fuzzy) preorders leads always to a (fuzzy) partial ordering on the respective quotient. Further, we describe group objects in the category of sheaves, resp. complete Ω-valued sets and characterize fuzzy subgroups as subgroup objects of simple sheaves of groups. Since we have already solved the quotient problem w.r.t. similarity relations, we are in the position to give a proper construction of fuzzy factor groups which are again of course a part of an exact diagram. Finally, we study higher order constructions and give a detailed description of the formation of union of fuzzy systems 3A historic account on sheaf theory can be found in [3]. 68 of fuzzy sets. After having understood the power object monad in the category of sheaves, resp. complete Ω-valued sets, we recall the axioms of topological space objects, and show that topological space objects on simple sheaves and stratified Ω-valued topological spaces are the same things. We close this talk with two important examples of topological space objects: One is generated by fibrewise topological spaces, while the other one is construced from separated presheaves of ordinary topological spaces. In this context it is interesting to see that there exists an adjoint situation between topological space objects on complete Ω-valued sets and separated presheaves of ordinary topological spaces on Ω. References [1] D. Dubois and H. Prade (eds.), Fundamentals of Fuzzy Sets (Kluwer Academic Publishers, Boston, London, Dordrecht 2000). [2] D. Dubois, W. Ostasiewicz and H. Prade, Fuzzy sets: history and basic notions, in: Fundamentals of Fuzzy Sets (eds. D. Dubois and H. Prade), 21–124 (Kluwer Academic Publishers, Boston, London, Dordrecht 2000). [3] J.W. Gray, Fragments of the history of sheaf theory, in: M.P Fourman, C.J. Mulvey and D.S. Scott, Applications of Sheaves, Lecture Notes in Mathematics 753, 1–79 (Springer-Verlag, Berlin Heidelberg, New York, 1979). [4] U. Höhle and S.E. Rodabaugh (eds.), Mathematics of Fuzzy Sets — Logic, Topology and Measure Theory (Kluwer Academic Publishers, Boston, London, Dordrecht 1999). [5] U. Höhle, Fuzzy Sets and Sheaves (Preprint Wuppertal, November 2003). [6] O. Wyler, Fuzzy logic and categories of fuzzy sets, in: Non-classical Logics and Their Applications to Fuzzy Subsets (eds. U. Höhle and E.P. Klement), 235–268 (Kluwer Academic Publishers, Dordrecht, Boston, London, 1995). 69 Joint distributions on MV-algebras as interactions of fuzzy events M ARTIN K ALINA , O L’GA NÁNÁSIOVÁ Dept. of Mathematics Slovak University of Technology 81368 Bratislava, Slovakia E-mail: {❦❛❧✐♥❛|♦❧❣❛}❅♠❛t❤✳s❦ In recent years many papers have been written generalizing some theorems, known from the Kolmogorovian probability theory, to MV-algebras. To achieve such results, so-called product MValgebras were introduced and, using the product, the joint probability distribution was defined. In this paper we present an approach how to define the joint distributions on MV-algebras which are not necessarily closed under product. First we construct conditional measures on a given MV-algebra. And, using these conditional measures, we define the joint probability distributions. We will work with a semi-simple MV-algebra, M , which is represented by a system of integrable functions defined on a probability space (Ω, S , µ) with their range in [0; 1] and such that 0/ ∈ M and the system M is closed under the operations ∗ and ⊕ defined pointwise by f ∗ (x) = 1 − f (x), ( f ⊕ g)(x) = min{1, f (x) + g(x)} The conditional probability distribution, γ, on the MV-algebra M is an additive normed measure on M , defined as follows ν( f ) = ν(g)γ( f |g) + ν(g∗ )γ( f |g∗ ) with the following conditions holding for γ Z Z where ν( f ) = R f g dµ = 0 ⇒ γ( f |g) = 0 f g∗ dµ = 0 ⇒ γ( f |g∗ ) = 0 f dµ. Now, we will show that such conditional distibutions on M are not given uniquely. Denote T the system of all transformations τ : M −→ [0; 1]Ω such that for each f ∈ M 1. τ( f ) is S -measurable 2. R R f dµ = τ( f ) dµ 3. for any x ∈ Ω there holds f (x) = 0 ⇒ (τ( f ))(x) = 0. Theorem 1. Let τ ∈ T be such that for any g ∈ M τ(g∗ ) = 1 − τ(g) 70 (1) Define for any f , g ∈ M γ( f |g) =    R Rf ·τ(g) dµ τ(g) dµ ν( f )   0 if 0 < ν(g) < 1 if ν(g) = 1 if ν(g) = 0. (2) Then for any g ∈ M such that ν(g) > 0, γ(.|g) is a conditional measure. We will say that event f is independent of g with respect to a conditional measure γ iff ν( f ) = γ( f |g). γ will always denote the conditional measure defined by Formula 2 from Theorem 1. Remark 2. As we will see in the next example, the independence of event f of g does not imply the independence of the event g of f . This nonsymmetric relation of independence allows us to distinguish between a cause and its effects. Similar results concerning the ortho-modular lattices have been achieved also by O. Nánásiová in [4]. Example 3. Let Ω = [0; 1] and µ be Lebesgue measure. Let τ be the transformation given by  R 1   µ(A( f )) RA( f ) f dµ iff f (x) ∈]0.5; 1[ and A( f ) = {x ∈ Ω; f (x) ∈]0.5; 1[} 1 (τ( f ))(x) = µ(B( f )) B( f ) f dµ iff f (x) ∈]0; 0.5[ and B( f ) = {x ∈ Ω; f (x) ∈]0; 0.5[}   f (x) otherwise provided µ(A( f )) 6= 0, µ(B( f )) 6= 0. If e.g. µ(A( f )) = 0, we can put any value to (τ(g))(x) for x ∈ A( f ). Take f (x) = x and g(x) = 21 x.Then we get    0.25 iff x ∈]0; 0.5[ 0.25 iff x ∈]0; 1[ 0.75 iff x ∈]0.5; 1[ (τ(g))(x) = (τ( f ))(x) = x otherwise  x otherwise Now, compute the conditional measure γ( f |g) = γ(g|g) = γ(g| f ) = R1 0 R1 R1 0 0 R1 0 γ( f | f ) = f dµ R1 0 = 0 f dµ g dµ g · τ(g) dµ R1 g dµ 0.25 f · τ( f ) dµ R1 R1 0 0 g · τ( f ) dµ f · τ(g) dµ = R 0.5 0 0.25 = R 0.25 01 x dµ = 0.5 = ν( f ) = 0.25 0.25 R1 0.5x dµ = 0.25 = ν(g) 0.25 0 0.5x dµ + 0.75 0.5 R 0.5 0 R1 x dµ + 0.75 0.5 0.5 0.5x dµ R1 0.5 x dµ = = 5 6= ν(g) = 0.25 16 5 6= ν( f ) = 0.5 8 Hence we get that g is dependent on f and f is also dependent on f . On the other hand, f is independent of g and also g is independent of itself. In the Kolmogorovian probability theory we are not used to the fact that an event is independent of itself. But even this can happen when dealing with MV-algebtras instead of Boolean algebras. Remark 4. Once having defined for any pair f , g of elements of the MV-algebra M the measure γ( f |g), the conditional measure if ν(g) > 0, we can define also the two-dimensional distribution on M × M – the measure (probability) of occurence of this pair f , g. This, in fact represents the interaction of f and g. And the interaction can be different if we change the order. 71 The measure of interaction of a pair f , g ∈ M will be denoted by p( f , g) and defined as p( f , g) = γ( f |g)γ(g|1) (3) Theorem 5 (Basic properties of p). Let p be a measure of interaction on the MV-algebra M and f , g be any elements of M . Then 1. p( f , 1) = p(1, f ) = ν( f ) 2. p( f , g) = p(g, f ) = 0, if R f g dµ = 0 3. p( f , g) ≤ min{ν( f ); ν(g)}, particularly p( f , f ) ≤ ν( f ) 4. the variables of p do not commute, i.e. in general p( f , g) 6= p(g, f ) Example 6. Assume that Ω = [0; 1] and µ is the Lebesgue measure. The transformation τ will be defined by the following  0,    1, (τ( f ))(x) =    if f (x) = 0 if f (x) = 1 R 1 µ(A ( f )) A ( f ) f (x) dµ(x) otherwise, where A ( f ) = {x; 0 < f (x) < 1} Let f (x) = x and g(x) = min{0, x − 0.5}. Then   0, if x = 0 1, if x = 1 (τ( f ))(x) =  0.5 otherwise (τ(g))(x) = Then p(g, f ) = Z 1  0, if x ≤ 0.5 0.25 if x > 0.5 g0.5 dµ = 0.5 0.5 0 p( f , g) = Z 1 p( f , f ) = Z 1 0.5 13 3 = 4 8 32 x0.5dµ = 0 Z 1 (0.5 − x) dµ = x0.25 dµ = 0.5 p(g, g) = Z 1 1 4 (x − 0.5)0.25dµ = 1 32 We add some references where you can find papers with related topics. 72 1 16 References [1] C.C. Chang, Algebraic analysis of many valued logics, Trans. Amer. Math. Soc. 88 (1958), 467– 490. [2] F. Chovanec, States and observables on MV-algebras, Tatra Mountains Math. Publ. 3 (1993), 55–63. [3] M. Jurečková, B. Riečan, Weak law of large numbers for weak observables in MV algebras, Tatra Mountains Math. Publ. 12 (1997), 221–228. [4] O. Nánásiová, Map for simultaneous measurements for a quantum logic, Internat. J. Theoret. Phys 42 (2003), 1889–1902. [5] B. Riečan, On the sum of observables in MV algebras of fuzzy sets, Tatra Mountains Math. Publ. 14 (1998), 225–232. [6] B. Riečan, On the strong law of large numbers for weak observables in MV algebras, Tatra Mountains Math. Publ. 15 (1998), 13–21. [7] B. Riečan, Weak observables in MV algebras, Internat. J. Theoret. Phys. 37 (1998), 183–189. [8] B. Riečan, On the product MV algebras, Tatra Mountains Math. Publ. 16 (1999), 143–149. Acknowledgement This work was supported by Science and Technology Assistance Agency under the contract No. APVT-20-023402, and by the VEGA grant agency, grant numbers 1/0085/03 and 1/0273/03. 73 The concept of independence in the context of similarity relations F RANK K LAWONN Department of Computer Science University of Applied Sciences Braunschweig/Wolfenbuettel 38302 Wolfenbuettel, Germany E-mail: ❢✳❦❧❛✇♦♥♥❅❢❤✲✇♦❧❢❡♥❜✉❡tt❡❧✳❞❡ The success of fuzzy systems in real world applications is based on their capability to model human expert knowledge in an easily understandable way using simple rules incorporating vague concepts represented by fuzzy sets. However, the use of rules in conjunction with vague concepts alone does not guarantee the interpretability of a fuzzy system. There is a number of other aspects that have to be considered. • The shape of the fuzzy sets should be chosen in such a way that they really correspond to real world vague concepts. • The number of rules should be strictly limited, especially the number of rules firing at the same time. • The number of attributes or variables occurring in a single rule should be kept very small. • Finally, the way in which the fuzzy sets are aggregated to determine the firing degree of a rule, implies a certain independence assumption of the underlying vague concepts. Here we will mainly concentrate on the last of these aspects. Understanding fuzzy sets as induced concepts in the context of similarity or equality relations [9, 6, 8, 2, 5, 7, 1] leads to a rigorous and consistent interpretation the vague concepts. Fuzzy sets can no longer be chosen arbitrarily, but have to be in accordance with the underlying similarity relations. A very simple way to define suitable equality relations is based on the concept of scaling [4]. The similarity relations specify how exact values have to be distinguished in a certain range of a domain in order to solve the task for which the fuzzy system is designed. Taking a look at standard fuzzy systems, the underlying similarity relations for the single domains are assumed to be independent, i.e. the similarity of two tuples of values depends only on the similarities of the single values. However, this assumption is only partly satisfied in most real world applications. Here we take a closer look at the notion of independence in the context of similarity relations. It turns out [3] that independence in the context of similarity relations is a non-symmetric concept in contrast to the well known probabilistic independence notion, where for instance P(A|B) = P(A) ⇒ P(B|A) = P(B) holds. 74 References [1] D. Dubois, H. Prade: Similarity-Based Approximate Reasoning. In: J.M. Zurada, R.J. Marks II, C.J. Robinson (eds.): Computational Intelligence Imitating Life. IEEE Press, New York (1994), 69-80 [2] U. Höhle, L.N. Stout: Foundations of Fuzzy Sets. Fuzzy Sets and Systems 40 (1991), 257-296 [3] F. Höppner, F. Klawonn, P. Eklund: Learning Indistinguishability from Data. Soft Computing 6 (2002), 6-13 [4] F. Klawonn: Fuzzy Sets and Vague Environments. Fuzzy Sets and Systems 66 (1994), 207-221 [5] F. Klawonn, R. Kruse: Equality Relations as a Basis for Fuzzy Control. Fuzzy Sets and Systems 54 (1993), 147-156 [6] E.H. Ruspini: On the Semantics of Fuzzy Logic. Intern. Journ. of Approximate Reasoning 5 (1991), 45-88 [7] H. Thiele, N. Schmechel: The Mutual Defineability of Fuzzy Equivalence Relations and Fuzzy Partitions. Proc. Intern. Joint Conference of the Fourth IEEE International Conference on Fuzzy Systems and the Second International Fuzzy Engineering Symposium, Yokohama (1995), 13831390 [8] E. Trillas, L. Valverde: An Inquiry into Indistinguishability Operators. In: H.J. Skala, S. Termini, E. Trillas (eds.): Aspects of Vagueness. Reidel, Dordrecht (1984), 231-256 [9] L.A. Zadeh: Similarity Relations and Fuzzy Orderings. Information Sciences 3 (1971), 177-200 75 Triangular norms as special semigroups E RICH P ETER K LEMENT1 , R ADKO M ESIAR2 , E NDRE PAP3 1 Department of Knowledge-Based Mathematical Systems Johannes Kepler University 4040 Linz, Austria E-Mail: ❡♣✳❦❧❡♠❡♥t❅❥❦✉✳❛t 2 Department of Mathematics and Descriptive Geometry Faculty of Civil Engineering Slovak University of Technology 81368 Bratislava, Slovakia E-Mail: ♠❡s✐❛r❅❝✈t✳st✉❜❛✳s❦ Institute of Information Theory and Automation Czech Academy of Sciences 18207 Prague, Czech Republic 3 Department of Mathematics and Informatics University of Novi Sad 21000 Novi Sad, Serbia and Montenegro E-Mail: ♣❛♣❅✐♠✳♥s✳❛❝✳②✉, ♣❛♣❡❅❡✉♥❡t✳②✉ 1 Introduction Clearly, each triangular norm [15, 26] is a special semigroup operation on the unit interval [0, 1]. To be precise, ([0, 1], T, ≤) is a fully ordered abelian semigroup with neutral element 1. Several results and constructions from the theory of general semigroups [3, 6, 9] have been carried over to t-norms. Well-known examples are [24, 25] and the full characterization of continuous t-norms based on Isemigroups [5, 19, 20]. In this contribution we give a survey on recent advances in this context (for an extensive survey see [17]). 2 Archimedean components To simplify terminology, we shall identify, if T is a triangular norm, the fully ordered semigroup ([0, 1], T, ≤) with the t-norm T since the underlying set and the order are clear in this context. In particular, we shall also speak about subsemigroups of t-norms (which are necessarily fully ordered) without mentioning the order ≤ explicitly. In semigroups (X, ∗) with X ⊆ R, in particular for ([0, 1], T ) where T is a t-norm, we shall write (n) and xT , respectively, or simply x(n) if the semigroup operation is clear, in order to distinguish it from the usual power xn (with respect to the multiplication of real numbers). (n) x∗ 76 Let T be a t-norm and let (X, ∗) be a subsemigroup of T . Then it is evident that (X, ∗) is a fully ordered commutative semigroup where the operation ∗ is bounded from above by the minimum, i.e., x ∗ y ≤ min(x, y) for all x, y ∈ X. If 0 and 1 are contained in X then they are annihilator and neutral element of (X, ∗), respectively. In general, it is not clear whether for each semigroup (X, ∗, ≤), where X ⊆ [0, 1], where the operation ∗ is bounded from above by the minimum and where 1, whenever it is contained in X, acts as neutral element, the operation ∗ can be extended to a triangular norm. However, in the special case when X is a convex subset of [0, 1], i.e., a subinterval of [0, 1], we shall see that such an extension is always possible. In order to show this, we use the following notions going back to [16] and [10]. Note that the name tosab is an acronym for totally ordered semigroup, abelian, bounded by the minimum. Definition 1. Let I be a non-empty subinterval of the closed unit interval [0, 1]. (i) A fully ordered commutative semigroup (I, ∗) where ∗ is bounded from above by the minimum will be called a tosab. (ii) If ([0, 1], ∗) is a tosab then the operation ∗ is called a t-subnorm. When investigating the structure of t-norms, their Archimedean subsemigroups play an important role (compare [6, 14]). Definition 2. Let T be a t-norm. Two elements x, y ∈ [0, 1] are called Archimedean equivalent if there is an n ∈ N such that x(n) ≤ y ≤ x or y(n) ≤ x ≤ y. For each x ∈ [0, 1] the equivalence class Ix containing x is called a T -Archimedean class of T or Archimedean class if T is either irrelevant or clear from context. Clearly, as noted in [7], each Archimedean class is a convex subset of [0, 1]. Obviously, by complete analogy we may define the Archimedean classes of tosabs and, in particular, of t-subnorms. The following result can be found in [14, Proposition 3.2]. Proposition 3. Let T be a t-norm. (i) For all (x, y) ∈ [0, 1]2 we have IT (x,y) = Imin(x,y) . (ii) For each x ∈ [0, 1] the pair (Ix , T |Ix2 ) is a subsemigroup of ([0, 1], T ) (and, hence, a tosab), and it is called an Archimedean component of T . As a consequence, for two t-norms T1 and T2 with the same Archimedean components we have (n) (n) xT1 = xT2 for each x ∈ [0, 1] and n ∈ N. A necessary and sufficient condition for a singleton {x} to be a (trivial) Archimedean class for a tnorm T is that T (y, z) = x holds if and only if min(y, z) = x. As a consequence, {1} is an Archimedean class of each t-norm T . It is easy to see that a triangular norm is Archimedean if and only if its only non-trivial Archimedean class is either [0, 1[ or ]0, 1[. Similarly, a non-trivial tosab is Archimedean if and only if it has only one non-trivial Archimedean class. From [15, Proposition 1.6 and Theorem 2.12] the following characterization of Archimedean components follows immediately. 77 Lemma 4. A fully ordered commutative semigroup (I, ∗) is an Archimedean component of some tnorm T if and only if either I = {1} or I is a convex subset of [0, 1[ such that for all x ∈ I we have (n) lim x∗ = inf I. n−→∞ The following result, whose proof is straightforward, will be helpful for determining the uniqueness of t-norms with given Archimedean components. Lemma 5. Let T be a t-norm and {Ix | x ∈ [0, 1]} the set of Archimedean components. Then the following are equivalent: (i) For each t-norm T̃ with T̃ 6= T there is an element x ∈ [0, 1] such that the Archimedean component (I˜x , T̃ |(I˜x )2 ) of T̃ and the Archimedean component (Ix , T |Ix2 ) of T are different. (ii) For all (x, y) ∈ [0, 1]2 with x ≤ y there is a unique fully ordered commutative semigroup (I{x,y} , ∗), where the operation ∗ is bounded from above by the minimum, such that both (Ix , T |Ix2 ) and (Iy , T |Iy2 ) are subsemigroups of (I{x,y} , ∗). Lemma 6. Assume that Iu equals [a, b[ or ]a, b[ and let (Iu , ∗u ) be an Archimedean component of some t-norm T such that for each x ∈ ]a, b[ there is a y ∈ ]a, b[ with x ∗u y > a and such that the conditional cancellation law holds. Then, putting I = Iu ∪ Ib , the semigroup (I, T |I 2 ) is the ordinal sum of (Iu , ∗u ) and (Ib , T |I 2 ). b Theorem 7. Let T be a t-norm and suppose that each of its non-trivial Archimedean components satisfies the hypotheses of Lemma 6. Then there is no other t-norm T̃ having the same Archimedean components as T . Corollary 8. Let T be a t-norm, suppose that each of its non-trivial Archimedean components is continuous and satisfies the hypotheses of Lemma 6 and, additionally, limzրbx T (y, z) = y if x ∈ [0, 1], y ∈ Ix and bx = sup Ix . Then T is a continuous t-norm, and it is uniquely determined by its Archimedean components.    Example that T is a t-norm whose Archimedean components are 0, 21 , ∗1 with x ∗1 y =  1 9. Assume  x · y, 2 , 1 , ∗2 with x ∗2 y = 21 , and the trivial component ({1}, ∗). Then we get   x · y  2 if (x, y) ∈ 0, 12 ,  2 T (x, y) = 12 if (x, y) ∈ 12 , 1 ,   min(x, y) otherwise, i.e., T necessarily is the ordinal sum of its Archimedean components (see Proposition 13). Note also that Archimedean components play a key role in the characterization of several specific semigroups. For example, in the torsion semigroups introduced in [22] for each x the set {x1 , x2 , . . . , xn , . . . } is finite. Therefore, for a torsion t-norm T and for each x ∈ [0, 1] there is an (n) n ∈ N such that xT is an idempotent element of T . However, this is equivalent to the fact that each Archimedean component (I, ∗) of T is a torsion semigroup which, in addition, satisfies inf I ∈ I. Observe that, for a continuous t-norm T , ([0, 1], T ) is a torsion semigroup if and only if each Archimedean summand of T is nilpotent. A special subclass of torsion t-norms are the so-called n-contractive t(n) norms studied in [1], in which case xT is an idempotent element for each x ∈ [0, 1] (so n-contractive t-norms can be viewed as uniform torsion semigroups). A characterization of n-contractive t-norms 78 by means of their Archimedean components, together with a construction method for n-contractive t-norms, can be found in [18]. Another interesting algebraic property closely linked to Archimedean components is the weak cancellativity investigated in [23]. A semigroup (X, ∗) is said to be weakly cancellative if x∗x = x∗y = y ∗ y implies x = y, which, in the case of a t-norm T , is equivalent with saying that T (x, x) = T (y, y) implies x = y, because of the monotonicity of T . Observe that a continuous t-norm T is weakly cancellative if and only if each Archimedean summand of T is strict. In general, a t-norm T is weakly cancellative if and only each Archimedean component of T is weakly cancellative. Note that a weakly cancellative Archimedean t-norm never has zero divisors, but it is not necessarily cancellative (an example for that is the Krause t-norm [15, Appendix B]). 3 Ordinal sums Ordinal sums of abstract semigroups were introduced by A. H. Clifford in [2] (see also [8, 21]), foreshadowed in [4, 12], yielding a semigroup structure on the union of pairwise disjoint semigroups. We recall this fundamental result for convenience. Theorem 10. Let (A, ) be a linearly ordered set with A 6= 0/ and ((Xα , ∗α ))α∈A a family of semigroups S such that Xα ∩ Xβ = 0/ whenever α 6= β. Put X = α∈A Xα and define the operation ∗ : X 2 −→ X by  2  x ∗α y if (x, y) ∈ Xα , x∗y = x if (x, y) ∈ Xα × Xβ and α ≺ β,   y if (x, y) ∈ Xα × Xβ and β ≺ α. (1) Then (X, ∗) is a semigroup, and it will be called the ordinal sum of the semigroups ((Xα , ∗α ))α∈A . This result can be directly applied (see [25, 26] and Theorem 7.1 in Chapter 1) to construct new triangular norms from a given family of t-norms. The t-norm obtained via this construction will be referred to as an ordinal sum of t-norms: Theorem 11. Let (Tα )α∈A be a family of t-norms and (]aα , bα [)α∈A be a family of non-empty, pairwise disjoint open subintervals of [0, 1]. Then the following function T : [0, 1]2 −→ [0, 1] is a t-norm: T (x, y) = ( aα + (bα − aα ) · Tα min(x, y)  x−aα y−aα bα −aα , bα −aα if (x, y) ∈ [aα , bα [2 , otherwise. (2) Proposition 12. Let (A, ) be a linearly ordered set with A 6= 0/ and ((Xα , ∗α ))α∈A a family of semigroups such that (Xα )α∈A is a partition of the closed unit interval [0, 1]. If the operation ∗ : [0, 1]2 −→ [0, 1] given by (1) is a triangular norm, then we have: (i) Each Xα is a subinterval of [0, 1]. (ii) Each semigroup (Xα , ∗α ) is a fully ordered commutative semigroup where the operation ∗α is bounded from above by the minimum, i.e., we have x ∗α y ≤ min(x, y) for all x, y ∈ Xα . (iii) The order  on A is compatible with the usual order ≤ on [0, 1], i.e., for α, β ∈ A we have α ≺ β if and only if x < y for all x ∈ Xα and y ∈ Xβ . 79 (iv) For all (x, y) ∈ [0, 1]2 we have ( x ∗α y if (x, y) ∈ Xα2 , x∗y = min(x, y) otherwise. (3) Proposition 13. Let ([0, 1], ∗) be the ordinal sum of a family ((Xα , ∗α ))α∈A of semigroups. Then the operation ∗ is a t-norm if and only if each (Xα , ∗α ) is a tosab, if the order  on A is compatible with the usual order ≤ on [0, 1], and if there is an α0 ∈ A such that 1 is the neutral element of ∗α0 . Theorem 14. Let I be a non-empty subinterval of [0, 1]. A semigroup (I, ∗) is a continuous tosab if and only if it is an ordinal sum of idempotent tosabs and continuous Archimedean tosabs with neutral element with possibly one exception if for some summand (Iα0 , ∗α0 ) we have sup Iα0 = sup I ∈ Iα0 ∪ ([0, 1] \ I), in which case (Iα0 , ∗α0 ) need not have a neutral element. Definition 15. A tosab is called ordinally irreducible if it cannot be expressed as an ordinal sum of two or more non-singleton tosabs. Proposition 16. Let T be a t-norm. Then the following are equivalent: (i) T is ordinally irreducible. (ii) For each x ∈ ]0, 1[ there exist y, z ∈ [0, 1] with y < x < z and T (y, z) < y. The following modification of Theorem 11, where the resulting t-norm T will be referred to as an ordinal sum of t-subnorms, was proved in [11]. Theorem 17. Let (Vα )α∈A be a family of t-subnorms and (]aα , bα [)α∈A be a family of non-empty, pairwise disjoint open subintervals of [0, 1]. Further, if bα0 = 1 for some α0 ∈ A then assume that Vα0 is a t-norm, and if bα0 = aβ0 for some α0 , β0 ∈ A then assume either that Vα0 is a t-norm or that Vβ0 has no zero divisors. Then the following function T : [0, 1]2 −→ [0, 1] is a t-norm: (  α α aα + (bα − aα ) ·Vα bx−a if (x, y) ∈ ]aα , bα ]2 , , by−a −a −a α α α α T (x, y) = (4) min(x, y) otherwise. The construction in Theorem 17 is not identical to the one in Theorem 10 (for instance, T |]aα ,bα ]2 is not necessarily a semigroup operation on ]aα , bα ]). However, in Theorem 18 below we shall show that each t-norm T where ([0, 1], T ) is an ordinal sum of semigroups as in Theorem 10 can be rewritten as an ordinal sum of t-subnorms as in Theorem 17. In [16, Theorem 3.1] it was shown that the construction in Theorem 17 is the most general way to obtain a t-norm as an ordinal sum of semigroups. Theorem 18. Let T be a t-norm. Then the following are equivalent: (i) ([0, 1], T ) is an ordinal sum of semigroups. (ii) T is an ordinal sum of t-subnorms. Acknowledgements This work was supported by two European actions (CEEPUS network SK-42 and COST action 274), by Project 42s2 of the Action Austria-Slovakia as well as by grants APVT np. 20-023402, VEGA 1/0273/03 and MNTRS-1866. 80 References [1] A. Ciabattoni, F. Esteva, and L. Godo, T -norm based logics with n-contraction, Neural Network World 5 (2002), 441–453. [2] A. H. Clifford, Naturally totally ordered commutative semigroups, Amer. J. Math. 76 (1954), 631–646. [3] A. H. Clifford and G. B. Preston, The algebraic theory of semigroups, American Mathematical Society, Providence, 1961. [4] A. C. Climescu, Sur l’équation fonctionelle de l’associativité, Bull. École Polytechn. Iassy 1 (1946), 1–16. [5] W. M. Faucett, Compact semigroups irreducibly connected between two idempotents, Proc. Amer. Math. Soc. 6 (1955), 741–747. [6] L. Fuchs, Partially ordered algebraic systems, Pergamon Press, Oxford, 1963. [7] I. W. Hion, Ordered semigroups, Izv. Akad. Nauk SSSR 21 (1957), 209–222, (Russian). [8] K. H. Hofmann and J. D. Lawson, Linearly ordered semigroups: Historic origins and A. H. Clifford’s influence, in Hofmann and Mislove [9], pp. 15–39. [9] K. H. Hofmann and M. W. Mislove (eds.), Semigroup theory and its applications, London Math. Soc. Lecture Notes, vol. 231, Cambridge University Press, Cambridge, 1996. [10] S. Jenei, Structure of left-continuous triangular norms with strong induced negations. (I) Rotation construction, J. Appl. Non-Classical Logics 10 (2000), 83–92. [11] , A note on the ordinal sum theorem and its consequence for the construction of triangular norms, Fuzzy Sets and Systems 126 (2002), 199–205. [12] F. Klein-Barmen, Über gewisse Halbverbände und kommutative Semigruppen II, Math. Z. 48 (1942–43), 715–734. [13] E. P. Klement and R. Mesiar (eds.), Triangular norms and related operators in many-valued logics (in preparation). [14] E. P. Klement, R. Mesiar, and E. Pap, Archimedean components of triangular norms, J. Aust. Math. Soc. (in press, FLLL-TR-0206). [15] [16] [17] , Triangular norms, Kluwer Academic Publishers, Dordrecht, 2000. , Triangular norms as ordinal sums of semigroups in the sense of A. H. Clifford, Semigroup Forum 65 (2002), 71–82. , Semigroups and triangular norms, in Klement and Mesiar [13] (in preparation). [18] A. Mesiarová and J. Mesiarová, n-contractive t-norms, Proceedings Tenth IFSA World Congress 2003, Istanbul, 2003, pp. 69–72. [19] P. S. Mostert and A. L. Shields, On the structure of semi-groups on a compact manifold with boundary, Ann. of Math., II. Ser. 65 (1957), 117–143. [20] A. B. Paalman-de Miranda, Topological semigroups, Matematisch Centrum, Amsterdam, 1964. [21] G. B. Preston, A. H. Clifford: an appreciation of his work on the occasion of his sixty-fifth birthday, Semigroup Forum 7 (1974), 32–57. [22] Š. Schwarz, Contribution to the theory of torsion semigroups, Čehoslovack. Mat. Ž. 3(78) (1953), 7–21, (Russian). [23] , Semigroups satisfying some weakened forms of the cancellation law, Mat.-Fyz. Časopis. Slovensk. Akad. Vied 6 (1956), 149–158, (Slovak). 81 [24] B. Schweizer and A. Sklar, Associative functions and statistical triangle inequalities, Publ. Math. Debrecen 8 (1961), 169–186. [25] , Associative functions and abstract semigroups, Publ. Math. Debrecen 10 (1963), 69–81. [26] , Probabilistic metric spaces, North-Holland, New York, 1983. 82 A characterization and composition of quasi-copulas A NNA KOLESÁROVÁ Dept. of Mathematics Faculty of Chemical and Food Technology Slovak University of Technology 81237 Bratislava, Slovakia E-mail: ❦♦❧❡s❛r♦❅❝✈t✳st✉❜❛✳s❦ 1 Introduction In this contribution the main attention will be paid to two–dimensional quasi–copulas, which are a special type of binary 1–Lipschitz aggregation operators. Quasi–copulas will be characterized as solutions to a certain functional equation. We also show that quasi–copulas and dual quasi–copulas are important for describing the structure of 1–Lipschitz aggregation operators with any neutral element or annihilator in the unit interval. Finally, we will study under which conditions the composition of any two quasi–copulas is again a quasi–copula. The study of these problems was motivated by several papers on fuzzy preference modeling [5, 6], and by papers concerning some problems in fuzzy probability calculus, e.g., [10] and others. Therefore we expect applications of obtained results in these areas. Recall first the definitions and properties of basic notions which are used throughout the paper. Definition 1. Let n ∈ N, n ≥ 2. An n–ary aggregation operator A is a non–decreasing function A : [0, 1]n −→ [0, 1] satisfying the boundary conditions A(0, . . . , 0) = 0 and A(1, . . . , 1) = 1. In this paper we will deal with binary aggregation operators only. Therefore if no confusion can arise, we will use for them the name aggregation operators only. Aggregation operators satisfying the standard Lipschitz condition with constant 1, i.e., satisfying the property |A(x1 , y1 ) − A(x2 , y2 )| ≤ |x1 − x2 | + |y1 − y2 |, for all x1 , x2 , y1 , y2 ∈ [0, 1], will be called 1–Lipschitz aggregation operators. From well–known types of binary aggregation operators, for example, the arithmetic mean M, the product operator Π, Min and Max operators, as well as weighted means, OWA operators, copulas, quasi–copulas, Choquet integral-based aggregation operators, Sugeno intergal–based aggregation operators are 1–Lipschitz aggregation operators. More details on these classes of aggregation operators can be found, e.g., in [2]. Distinguished classes of 1–Lipschitz aggregation operators are the classes of copulas and quasi– copulas. 83 Definition 2. A (two–dimensional) copula C is a function C : [0, 1]2 −→ [0, 1] with the properties: • C(0, x) = C(x, 0) = 0 and C(x, 1) = C(1, x) = x for all x ∈ [0, 1]; • C(x1 , y1 ) + C(x2 , y2 ) ≥ C(x2 , y1 ) + C(x1 , y2 ) for all x1 , x2 , y1 , y2 ∈ [0, 1] such that x1 ≤ x2 and y1 ≤ y2 . Definition 3. [9] A (two–dimensional) quasi–copula Q is a function Q : [0, 1]2 −→ [0, 1] with the properties: • Q(0, x) = Q(x, 0) = 0 and Q(x, 1) = Q(1, x) = x for all x ∈ [0, 1]; • Q is non–decreasing in each of its arguments; • Q satisfies Lipschitz’s condition with constant 1. Copulas are also non–decreasing functions in each variable and 1–Lipschitz. Each copula is evidently a quasi–copula. Due to the 1–Lipschitz property, copulas as well as quasi–copulas are continuous functions on the unit square. Note that the conditions in the first two items of the definition of a quasi–copula mean that quasi– copulas are aggregation operators with zero annihilator and neutral element equal to 1. One of the last two properties is superfluous because for 1–Lipschitz aggregation operators they are equivalent. Therefore quasi–copulas can be equivalently characterized as • 1–Lipschitz aggregation operators with neutral element 1, or as • 1–Lipschitz aggregation operators with zero annihilator. The set of all quasi–copulas will be denoted by Q . The following claim is only a slight modification of a given definition of a quasi–copula. Lemma 4. A function Q : [0, 1]2 −→ [0, 1] is a quasi–copula if and only if it satisfies the following conditions: (i) Q is non–decreasing; (ii) Q is 1–Lipschitz; (iii) Q(0, 1) = Q(1, 0) = 0 and Q(1, 1) = 1. Since an aggregation operator A is always monotone and satisfies the property A(1, 1) = 1, we obtain the following result. Corollary 5. An aggregation operator A is a quasi–copula if and only if it is 1–Lipschitz and A(0, 1) = A(1, 0) = 0. 84 For any Q ∈ Q , the function Q∗ , so–called dual of a quasi–copula Q, is defined by Q∗ : [0, 1]2 −→ [0, 1], Q∗ (x, y) = x + y − Q(x, y). The dual of any quasi–copula is also a non–decreasing and 1–Lipschitz function, but with zero neutral element and annihilator equal to 1. Denote by D the set of all functions f : [0, 1]2 −→ [0, 1] which are non–decreasing, 1–Lipschitz and with zero neutral element (and 1 as neutral element). The set D will be called the set of all dual quasi–copulas. 2 Characterization of quasi–copulas In [12], cf. [16], 1–Lipschitz aggregation operators have been characterized as solutions to a simple functional equation, similar to the Frank functional equation [8], in the following way. Theorem 6. A binary aggregation operator A is 1–Lipschitz if and only if there is a binary aggregation operator B, such that for all x, y ∈ [0, 1] it holds A(x, y) + B(x, y) = x + y . (1) Commutative quasi–copulas can also be characterized as solutions to the following type of a functional equation. Theorem 7. A commutative aggregation operator A is a commutative quasi–copula if and only if there exists an aggregation operator B such that for all x, y ∈ [0, 1] we have A(x, y) + B(1 − x, y) = y. (2) Remark 8. The previous claim without the commutativity condition must be reformulated in the following way: An aggregation operator A is a quasi–copula if and only if there exist aggregation operators B and C such that for each x, y ∈ [0, 1] we have A(x, y) + B(1 − x, y) = y 3 and A(x, y) +C(x, 1 − y) = x. The structure of binary 1–Lipschitz aggregation operators with annihilator or neutral element Quasi–copulas also play an important role in the characterization of 1–Lipschitz aggregation operators with annihilator or neutral element from the unit interval. We first show that each 1–Lipschitz aggregation operator with annihilator a ∈]0, 1[ can be built up from a quasi–copula, dual quasi–copula and the value a. Then we also clarify the structure of 1–Lipschitz aggregation operators with neutral element e ∈]0, 1[. For a given aggregation operator A denote A∗ (x, y) = x+y−A(x, y), (x, y) ∈ [0, 1]2 . Then (A∗ )∗ = A and due to Theorem 6 it holds that the operator A is 1–Lipschitz if and only if A∗ is a 1–Lipschitz aggregation operator. 85 If a 1–Lipschitz aggregation operator A has neutral element eA , then for ∀ x ∈ [0, 1], A∗ (x, eA ) = A∗ (eA , x) = eA , which means that the element eA is the annihilator of the operator A∗ , i.e., eA = aA∗ . Analogously, for the annihilator of A, if it exists, we have aA = eA∗ . The structure of 1–Lipschitz aggregation operators with annihilator Let A be a 1–Lipschitz aggregation operator with annihilator aA ∈ [0, 1]. According to the previous discussions: • if aA = 0 then A is a quasi–copula; • if aA = 1 then A is a dual quasi–copula. • In the case that aA = a ∈ ]0, 1[, define, similarly as in the case of nullnorms [3], the mappings ϕa , ψa by x−a x . (3) ϕa (x) = , , ψa (x) = a 1−a Then the function QA : [0, 1]2 −→ [0, 1],  A(a + (1 − a)x, a + (1 − a)y) − a −1 QA (x, y) = ψa A ψ−1 = a (x), ψa (y) 1−a (4) is a quasi–copula, and the function DA : [0, 1]2 −→ [0, 1]  A(ax, ay) −1 DA (x, y) = ϕa A ϕ−1 = a (x), ϕa (y) a (5) is a dual quasi–copula. Therefore the operator A can be expressed on the squares [0, a]2 and [a, 1]2 , as a transformation of some dual quasi–copula and some quasi–copula, respectively, i.e., A(x, y) = If (x, y) ∈ [0, a[×]a, 1], then  ϕ−1 if (x, y) ∈ [0, a]2 a (DA (ϕa (x), ϕa (y))) −1 ψa (QA (ψa (x), ψa (y))) if (x, y) ∈ [a, 1]2 . a = A(x, a) ≤ A(x, y) ≤ A(a, y) = a, which means that A(x, y) = a, and the same is true for the rest of the unit square ]a, 1] × [0, a[. The structure of 1–Lipschitz aggregation operators with neutral element A similar situation to the previous one is for 1–Lipschitz aggregation operators with neutral element. Let A be a 1–Lipschitz aggregation operator with neutral element eA ∈ [0, 1]. Trivially, • if eA = 1 then A is a quasi–copula; • if eA = 0 then A is a dual quasi–copula. 86 • If eA = e ∈ ]0, 1[, then the function QA : [0, 1]2 −→ [0, 1],  −1 QA (x, y) = ϕe A ϕ−1 e (x), ϕe (y) (6) is a quasi–copula, and the function DA : [0, 1]2 −→ [0, 1],  −1 DA (x, y) = ψe A ψ−1 e (x), ψe (y) (7) is a dual quasi–copula. Therefore  −1 ϕe (QA (ϕe (x), ϕe (y))) if (x, y) ∈ [0, e]2 A(x, y) = 2 ψ−1 e (DA (ψe (x), ψe (y))) if (x, y) ∈ [e, 1] . In the case of uninorms [7] which is similar to this one, the values on the rest parts of the unit square are not determined uniquely, they are between the values of Min and Max operators, in general. In the case of 1–Lipschitz aggregation operators the values at the points (x, y) ∈ [0, e[×]e, 1] ∪ ]e, 1] × [0, e[ are determined uniquely. Indeed, if the operator A is 1–Lipschitz aggregation operator, the same is true for A∗ , and moreover, aA∗ = e. Using the results of the previous part, the values of A∗ at these points are A∗ (x, y) = e, that is, A(x, y) = x + y − e at all points (x, y) ∈ [0, e[×]e, 1] ∪ ]e, 1] × [0, e[. 4 On composition of quasi–copulas For arbitrary binary aggregation operators A, B and F, the function F(A, B) : [0, 1]2 −→ [0, 1] defined by F(A, B)(x, y) = F(A(x, y), B(x, y)), is also a binary aggregation operator and is called a composed aggregation operator. It is easy to verify that F(A, B) really possesses the properties of an aggregation operator. In this section we give a necessary and sufficient condition under which composition of any two quasi–copulas is again a quasi–copula. Preserving the 1–Lipschitz property: It is known, that although all three aggregation operators A, B, F are 1–Lipschitz, the composed aggregation operator F(A, B) need not be of this property. For example, despite the Łukasiewicz t–conorm SL is a 1–Lipschitz aggregation operator, the composed operator SL (SL , SL ) does not possess this property [12]. However, if the outer operator F is a kernel aggregation operator, and A, B are 1–Lipschitz, then F(A, B) is always 1–Lipschitz aggregation operator [4, 12]. Recall that a binary aggregation operator F has the kernel property if for all u1 , u2 , v1 , v2 ∈ [0, 1]2 we have |F(u1 , v1 ) − F(u2 , v2 )| ≤ max (|u1 − u2 |, |v1 − v2 |) . It is clear that each kernel aggregation operator is also 1–Lipschitz. More details on kernel aggregation operators can be found in [13, 14, 15]. It can be shown that the kernel property of an outer operator is also a necessary condition for the 1–Lipschitz property of a composed aggregation operator [16]. Theorem 9. Let F be a binary aggregation operator. Then for any binary 1-Lipschitz aggregation operators A and B the composed aggregation operator F(A, B) is 1-Lipschitz if and only if F is a kernel aggregation operator. 87 As a consequence of this theorem we obtain the sufficient condition for quasi–copulas. Corollary 10. If the outer operator F is kernel, then composition of any two quasi–copulas is a quasi– copula. The 1–Lipschitz property of the composed operator F(Q1 , Q2 ) is preserved by Theorem 9. Observe that due to the property F(0, 0) = 0 the operator F(Q1 , Q2 ) possesses zero as annihilator. However, for quasi–copulas, as a special type of 1–Lipschitz aggregation operators, the kernel property of F on [0, 1]2 can be relaxed, because the points with coordinates (Q1 (x, y), Q2 (x, y)) for any two quasi–copulas Q1 , Q2 and all points (x, y) ∈ [0, 1]2 , never fill in the whole unite square. Lemma 11. Denote K = {(Q1 (x, y), Q2 (x, y)) ; (x, y) ∈ [0, 1]2 , Q1 , Q2 ∈ Q }. Then    u+1 . K = (u, v) ; u ∈ [0, 1], v ∈ max(2u − 1, 0), 2 Because of this property of quasi–copulas we obtain the following claim. Theorem 12. Let F be an aggregation operator. For any quasi–copulas Q1 , Q2 , a composed aggregation operator F(Q1 , Q2 ) is a quasi–copula if and only if the operator F has the kernel property on the set K defined in Lemma 11. Note that for composition of copulas the claim analogous to that one in Corollary 2, is not true. Despite the outer operator is kernel, the composition of two copulas need not be a copula, as we can see in the following example. Example 13. Let F = medk , k ∈ [0, 1], i.e., F(x, y) = med(x, y, k). Set C1 = TL and C2 = TP , where TP is the product t–norm. Then the composed operator is Ak = medk (TL , TP ). The operators C1 and C2 are copulas and each operator F = medk is a kernel aggregation operator on [0, 1]2 . According to Theorem 9, the composed operator Ak is always 1–Lipschitz. For example, for k = 0.5 we obtain the operator   TL (x, y) if TL (x, y) ≥ 0.5 TP (x, y) if TP (x, y) ≤ 0.5 A0.5 (x, y) =  0.5 if TL ≤ 0.5 ≤ TP (x, y). The operator A0.5 is not a copula because it is not 2–monotone. To show this, consider the points x = 23 , x′ = 34 , y = 32 and y′ = 43 . Then we have 2 2 2 3 3 2 4 1 3 3 A0.5 ( , ) + A0.5 ( , ) − A0.5 ( , ) − A0.5 ( , ) = 0.5 + − 0.5 − 0.5 = − < 0, 4 4 3 3 3 4 4 3 9 18 which contradicts the 2–monotonicity of A0.5 . Note that by the previous theorem, all operators Ak , k ∈ [0, 1], are quasi–copulas. The claim follows from the facts that TL and TP are quasi–copulas (each copula is also a quasi–copula) and the outer operator med(x, y, k) is kernel on [0, 1]2 and thus also on the set K. Acknowledgement The support of the grant VEGA 1/0085/03 and action Cost 274 TARSKI is kindly announced. This work was also supported by Science and Technology Assistance Agency under the contract No. APVT–20–023402. 88 References [1] C. Alsina, R.B. Nelsen and B. Schweizer: On the characterization of a class of binary operations on distributions functions. Stat. Probab. Lett. 17 (1993) 85–89. [2] T. Calvo, A. Kolesárová, M. Komorníková and R. Mesiar: Aggregation operators: Properties, Classes and Construction methods. In: Aggregation Operators (T. Calvo, G. Mayor and R. Mesiar, eds.). Physica Verlag, Heidelberg, 2002, pp. 3-104. [3] T. Calvo, B. De Baets, and J.C. Fodor: The functional equations of Alsina and Frank for uninorms and nullnorms. Fuzzy Sets and Systems 120 (2001) 385–394. [4] T. Calvo, R. Mesiar: Stability of aggegation operators. Proceedings EUSFLAT’2001, Leicester, 2001, pp. 475–478. [5] B. De Baets and J.Fodor: Generator triplets of additive fuzzy preference structures. Proc. Sixth Internat. Workshop on Relational Methods in Computer Science, Tilburg, The Netherlands, 2001, pp. 306-315. [6] B. De Baets: T–norms and copulas in fuzzy preference modeling. Proc. Linz Seminar’2003, Linz, 2003, p. 101. [7] J.C. Fodor, R.R. Yager and Rybalov: Structure of uninorms. Int. J. of Uncertainty, Fuzziness and Knowledge–Based Systems 5 (1997) 411–427. [8] M.J. Frank: On the simultaneous associativity of F(x, y) and x + y − F(x, y). Aequationes Math. 19 (1979) 194–226. [9] C. Genest, L. Molina, L. Lallena and C. Sempi: A characterization of quasi–copulas. Journal of Multivariate Analysis 69 (1999) 193–205. [10] S. Janssens, B. De Baets and H. De Meyer: Bell-type inequalities for commutative quasi– copulas. Preprint, 2003. [11] E.P. Klement, R. Mesiar and E. Pap: Triangular Norms, Kluwer Academic Publishers, Dordrecht, 2000. [12] A. Kolesárová and J. Mordelová: 1–Lipschitz and kernel aggregation operators. Proc. AGOP’2001, Oviedo, Spain, 2001, pp. 71–76. [13] A. Kolesárová, J. Mordelová, E. Muel: Kernel aggregation operators and their marginals. Fuzzy Sets and Systems, accepted. [14] A. Kolesárová, J. Mordelová, E. Muel: Construction of kernel aggregation operators from marginal functions. Int. J. of Uncertainty, Fuzziness and Knowledge–Based Systems 10/s (2002) 37–50. [15] A. Kolesárová, J. Mordelová, E. Muel: A review of of binary kernel aggregation operators. Proc. AGOP’2003, Alcalá de Henares, Spain, 2003, pp. 97–102. [16] A. Kolesárová: 1–Lipschitz aggregation operators and quasi–copulas. Kybernetika 39 (2003) 615–629. 89 [17] R. Mesiar: Compensatory operators based on triangular norms. Proc. of EUFIT’95, Aachen. 1995, pp.131–135. [18] R.B. Nelsen: An Introduction to Copulas. Lecture Notes in Statistics 139, Springer Verlag, New York 1999. [19] R.B. Nelsen: Copulas: An introduction to their properties and applications. Preprint, 2003. 90 Modifying L-sets: two views based on level-sets JARI KORTELAINEN Laboratory of Applied Mathematics Lappeenranta University of Technology 53851 Lappeenranta, Finland E-mail: ❥❛r✐✳❦♦rt❡❧❛✐♥❡♥❅❧✉t✳❢✐ In this paper we present two views of modifiers defined by means of level-sets. The author has studied these modifiers earlier and the current paper serves mainly as a survey of this work. The author has studied compositional modifier operators (see e.g. [4, 5, 6, 11]), and especially modifiers which are also interior operators in Alexandroff topologies. In an Alexandroff topology the intersection of every family of open sets is open (see e.g. [1]). L-sets on U ([2]) are generalizations of fuzzy sets ([13]), defined as mappings A : U −→ L, and they are modified by operating its level-sets by means of interior operators in Alexandroff topologies. These generalized operators are called levelset generated modifiers and denoted by F L ([10]). In this case Representation Theorems presented by C. V. Negoita and D. A. Ralescu (see [12] and also [3]) are applicable when representing L-sets by means of level-sets. In this paper we demand that L = (L, ≤, ∧, ∨, ⊗) is a cl-quasi-monoid ([3]), and axioms for L-interior operators and L-topologies are given in [3]. Under certain conditions the level-set generated modifiers are also L-interior operators ([10]). The author has also studied coarsening operators in [7, 8, 9]. Certain coarsening operators, namely natural coarsening operators denoted by C L , can be defined by means of open sets of Alexandroff topologies, and L-sets are modified by omitting those level-sets which are not open. In this case also Representation Theorems are applicable when representing L-sets by means of level-sets. Because under certain conditions the level-set generated modifiers are L-interior operators, the image of this operator is a L-topology, say T 1 . In this case we will show that the image of a natural coarsening operator is also a L-topology, say T 2 , while the natural coarsening operators do not generally need to be L-interior operators (see [9]). We will show that ∀A ∈ LU , C L (A) ⊂ F L (A) and T 1 = T 2 . Still, the category of produced L-topological spaces is isomorphic to the category of crisp Alexandroff spaces. References [1] F. G. Arenas. Alexandroff spaces. Acta Mathematica Universitatis Comenianae, LXVIII:17–25, 1999. [2] J. A. Goguen. L-fuzzy sets. Journal of Mathematical Analysis and Applications, 18:145–174, 1967. [3] U. Höhle and A. P. Šostak. Axiomatic foundations of fixed-basis fuzzy topology. In U. Höhle and S. E. Rodabaugh, editors, Mathematics of Fuzzy Sets: Logic, Topology, and Measure Theory. Kluwer Academic Publishers, Dordrecht, The Netherlands, 1999. 91 [4] J. Kortelainen. On relationship between modified sets, topological spaces and rough sets. Fuzzy Sets and Systems, 61:91–95, 1994. [5] J. Kortelainen. Modifiers connect L-fuzzy sets to topological spaces. Fuzzy Sets and Systems, 89:267–273, 1997. [6] J. Kortelainen. A Topological Approach to Fuzzy Sets. Ph.D. dissertation, Lappeenranta University of Technology, Lappeenranta, Finland, 1999. Acta Universitatis Lappeenrantaensis 90. [7] J. Kortelainen. Natural and complement coarsening operators. In N. Baba, L. C. Jain, and R. J. Howlett, editors, Knowledge-Based Intelligent Information Engineering Systems & Allied Technologies, KES ’01, volume 69 of Frontiers of Artificial Intelligence, pages 700–704. IOS Press, 2001. [8] J. Kortelainen. On coarsenings of L-sets. In Proceedings of Joint 9th IFSA World Congress and 20th NAFIPS International Conference, pages 2951–2954, Vancouver, Canada, 2001. [9] J. Kortelainen. L-topologies and natural coarsening operators. In Proceedings of SCIS & ISIS 2002, Tsukuba, Japan, 2002. paper 25B3-2. [10] J. Kortelainen. Some compositional modifier operators generate L-interior operators. In IFSA 2003: Proceedings of the 10th IFSA World Congress, pages 480–483, İstanbul, Turkey, 2003. [11] J. K. Mattila. On modifier logic. In L. A. Zadeh and J. Kacprzyk, editors, Fuzzy Logic for Management of Uncertainty. John Wiley, New York, 1992. [12] C. V. Negoita and D. A. Ralescu. Representation theorems for fuzzy concepts. In D. Dubois, H. Prade, and R. R. Yager, editors, Readings in Fuzzy Sets for Intelligent Systems. Morgan & Kaufmann Publ, Inc., San Mateo, CA, 1993. [13] L. A. Zadeh. Fuzzy sets. Information and Control, 8:338–353, 1965. 92 Integrals of random fuzzy sets VOLKER K RÄTSCHMER Statistics and Econometrics Faculty of Law and Economics University of Saarland 66041 Saarbrücken, Germany E-mail: ✈✳❦r❛❡ts❝❤♠❡r❅♠①✳✉♥✐✲s❛❛r❧❛♥❞✳❞❡ 1 Introduction Concepts of random fuzzy sets, often also called fuzzy random variables, have been introduced to extend the classical notion of random variables to random experiments with outcomes in form of fuzzy subsets of Rk . The idea behind is to represent outcomes of random experiments in a more adequate way by integrating those inherent aspects of vagueness which are of non-random nature. From a technical point of view it had been turned out that the notion of random fuzzy sets by Puri and Ralescu (cf. [15]) is the most general suggestion which admits also a probobability theory with extensions of the classical limit theorems (cf. [10], [13]). The talk deals with the notion of integrals of random fuzzy sets in the sense of Puri and Ralescu. The aim of the talk is to develop different ways to define integrals and then to investigate their mutual relationships. The seminal paper by Puri and Ralescu has offered the mostly accepted approach. As they defined random fuzzy sets as extended random compact sets they could transfer Aumann’s concept to define integrals for random compact sets, the so called Aumann-integral. A new direction has been initialized by Diamond and Kloeden who introduced the class of L p −metrics on sample spaces consisting of fuzzy subsets of Rk ([4], for extensions see [12]). These metrics yield other concepts of random fuzzy sets as random elements in Banach spaces which makes possible to embed the probability theory with fuzzy observations into the general probability theory in Banach spaces ([9], [14], [11], [13]). The L p −metrics work on subspaces of the sample spaces considered by Puri and Ralescu. Moreover, it has been shown that in most cases the different notions of random fuzzy sets coincide ([10], [13]). Therefore, reasonable alternatives to define integrals might be obtained by adaption of Bochner- and Pettis-integration. Then two problems will be tackled within the talk. If the range of a random fuzzy set is restricted to a sample space where one of the L p −metrics works, when does the Aumann-integral belong to this sample space? Secondly what are the mutual relationships between Aumann- and the adaptions of Bochner- as well as Pettis-integration? Both problems are not investigated systematically in literature. A first attempt concerning the first problem had been offered by the talk "Probability theory in sample spaces of fuzzy subsets” held at the 23rd Linz-Seminar of Fuzzy Sets 2003 (cf.[13]). Answers to the second problem w.r.t. the L2 −metric are given in [9] and [14], a comprehensive account was presented at the 23rd Linz-Seminar (cf. [13]). However these results suffer from quite unsatisfactory conditions of integrability that the random fuzzy sets should fulfil. Moreover, only sufficient conditions are 93 available which ensure that the Aumann-integral of a random fuzzy set belongs to the sample space under consideration. The conditions of integrability will be improved and the sufficient conditions will be completed by necessary ones. As applications of the investigations dominated convergence theorems and strong laws of large numbers as well as central limit theorems will be derived. The obtained versions generalize and improve already known results from literature, especially those that were presented at the 23rd LinzSeminar. 2 Random fuzzy sets Let Kco+ (Rk ) gather all nonvoid convex compact subsets of Rk . We will restrict ourselves to the sample no (Rk ) which consists of all fuzzy subsets of Rk with α−cuts belonging to K + (Rk ). Applying space Fcoc co no (Rk ) a semilinear structure {⊕ , λ⊙ | λ ∈ R}. It Zadeh’s extension principle we can define on Fcoc F F turns out that it is inherited from the Minkowski operations on Kco+ (Rk ) on the α−cuts, that is e ⊕F B] e α ⊕ [B] e α = λ ⊙ [A] eα e α , [λ ⊙F A] e α = [A] [A no (Rk ), λ ∈ R, α ∈]0, 1] (c.f. e.g. [4]). The fuzzy subset of Rk with 1 e Be ∈ Fcoc for all A, {0} as membership function will be denoted by e 0. It is the neutral element w.r.t. ⊕F . Due to a widely used suggestion by Puri and Ralescu ([15]) we can extend the notion of random no (Rk ) in the following way: compact sets to Fcoc no (Rk ) is associated with its α−cut-mappings Each mapping Ye : Ω → Fcoc [Ye ]α : Ω → Kco+ (Rk ), ω 7→ [Ye (ω)]α (α ∈]0, 1]) no (Rk ) a fuzzy random variable over some probability Puri and Ralescu called a mapping Ye : Ω → Fcoc space (Ω, F , P) if all the α−cut-mappings are convex-valued random compact sets over (Ω, F , P). However from the point of view of general probability theory this definition is not convenient since there is not any natural notion of distribution emerging from it. Therefore it is more reasonable to no (Rk )−valued measurable mappings. For this purpose we conceptualize random fuzzy sets as Fcoc no k need a suitable σ−algebra on Fcoc (R ). The suggestion below was introduced the first time in [10]. Since every fuzzy subset of Rk is uniquely determined by it positive rational α−cuts we may k ]0,1]∩Q w.r.t. the no k + no on F deduce a topology τFcoc coc (R ) from the product topology τ pδ∞ on Kco (R ) Hausdorff metric δ∞ , which is separably metrizable. no (Rk ) is defined to be a random fuzzy set if it is Borel-measurable Now a mapping Ye : Ω → Fcoc e is called the distribution of Ye . Since τF no is metrizable, every no . The image measure under Y w.r.t. τFcoc coc no (Rk ) w.r.t. to every metric which induces τ no . Therefore random fuzzy set is a random element in Fcoc Fcoc it is natural to speak of a simple random fuzzy set in the case that a random fuzzy set has only a finite range. In fact the introduced notion of random fuzzy sets is equivalent with the concept of fuzzy random variables by Puri and Ralescu (cf. [10]). Other concepts to define random fuzzy sets are based on the identification of each fuzzy subset no (Rk ) with its support function s : [0, 1] × Sk−1 → R, where Sk−1 denotes the euclidean e from Fcoc A e A unit sphere in Rk . Every support function is measurable w.r.t the product σ−algebra consisting of the Borel subsets of [0, 1] × Sk−1 ([12]). This property is the basis to build the subspaces of fuzzy subsets 94 with integrable support functions. Integrability will be defined w.r.t. λ1 ⊗ λS , the product measure k−1 of the Lebesgue-Borel measure λ1 on [0, 1] and λS , the unit Lebesgue-Borel measure on Sk−1 . k−1 no (Rk ) to consist of fuzzy subsets from F no (Rk ) with support Let for p ∈ [1, ∞[ define the space Fcocp coc k−1 k 1 S no functions being λ ⊗ λ −integrable of order p. Additionally, let Fcoc∞ (R ) be the space of all fuzzy no (Rk ) with support functions being essentially bounded w.r.t. λ1 ⊗ λSk−1 . Indeed subsets from Fcoc no (Rk ) with bounded supports. The restriction of the this space gathers all the fuzzy subsets from Fcoc no semilinear structure {⊕F , λ⊙F | λ ∈ R} to Fcocp (Rk ) is well defined for every p ∈ [1, ∞] (cf. [13]). no k k−1 ) (p ∈ [1, ∞]), which identifies fuzzy By the mapping jFcocp no (Rk ) : Fcocp (R ) → L p ([0, 1] × S no (Rk ) can subsets with the respective equivalence classes of their support functions every space Fcocp k−1 be embedded into the L p −space L p ([0, 1] × Sk−1 ) w.r.t. λ1 ⊗ λS as a positive cone (cf. [13]). no (Rk ), called the Using the L p −norm on L p ([0, 1] × Sk−1 ) one can define a metric ρ p on Fcocp L p −metric. Another custom concept is the so called L p,∞ −metric, which is a completion of the no (Rk ) introduced by Klement, Puri and Ralescu in [8] (cf. [12]). Each pair ρ , d metric on Fcoc∞ p p induces the same topology (cf. [12]), and in the case of p = ∞ both metrics are even identical (cf. [13]). The L p − and L p,∞ −metrics give the opportunity to consider random elements in the subspaces no (Rk ) w.r.t. the respective L − or L Fcocp p p,∞ −metric. Those random elements can be identified, via the k−1 ). It turns out that in embeddings jFcocp no (Rk ) , with random elements in the L p −spaces L p ([0, 1] × S fact all these random elements are random fuzzy sets ([10], [13]). no (Rk ). Then we can state: Proposition 1. Let (Ω, F , P) be a probability space and let Ye : Ω → Fcoc no (Rk )−valued for p ∈ [1, ∞[, then the following statements are equivalent: .1 If Ye is Fcocp (i) Ye is a random fuzzy set over (Ω, F , P). no (Rk ) w.r.t. ρ over (Ω, F , P). (ii) Ye is a random element in Fcocp p no (Rk ) w.r.t. d over (Ω, F , P). (iii) Ye is a random element in Fcocp p no (Rk )−valued, then the following statements are equivalent: .2 If Ye is Fcoc∞ (i) Ye is a random fuzzy set over (Ω, F , P). (ii) Every mapping [Ye ]α : Ω → Kco+ (Rk ), ω 7→ [Ye (ω)]α (α ∈ [0, 1]) is a convex-valued random compact set over (Ω, F , P), where [Ye (ω)]0 denotes the topological closure of the support of Ye (ω). no (Rk ) w.r.t. ρ = d over (Ω, F , P), then it is a random fuzzy .3 If Ye is a random element in Fcoc∞ ∞ ∞ set over (Ω, F , P). The converse is not necessarily true.  3 Integrably bounded random fuzzy sets Since every random fuzzy set can be regarded as an extended convex-valued random compact set, it suggests itself to define integrals for random fuzzy sets by carrying over Aumann’s well accepted 95 no (Rk ) concept (cf. [1]). Related to a random fuzzy set Ye the task is to find a fuzzy subset EeAYe ∈ Fcoc which satisfies [EeAYe ]α = E A [Ye ]α for all α ∈]0, 1]. Since the sets E A [Ye ]α (α ∈]0, 1]) should belong to Kco+ (Rk ), the α−cut mappings [Ye ]α (α ∈]0, 1]) have to be integrably bounded convex-valued random compact sets. A random fuzzy set with integrably bounded α−cut mappings is known as an integrably bounded random fuzzy set (cf. [15]). Indeed the concept of integrably bounded random fuzzy sets is sufficient to find the desired extended Aumann-integral (cf. [15], Theorem 3.1). The Aumann-integral for a simple random fuzzy set Ye with distribution QYe and different outcomes no (Rk ) may be easily calculated as e1 , ..., A em ∈ Fcoc A em ) ⊙F A em ) e1 ) ⊙F A e1 ) ⊕F ... ⊕F (QeYe −1 (A EeAYe = (QYeYe −1 (A Y no is separably metrizable, every integrably bounded random fuzzy set can be approximated Since τFcoc pointwise by a sequence of simple random fuzzy sets. So we can raise the question whether the Aumann-integral of integrably bounded random fuzzy sets can be described as a kind of Bochnerintegral? Is it possible to attain the Aumann-integral of integrably bounded random fuzzy sets as limit points of sequences of Aumann-integrals of simple random fuzzy sets? The answer is affirmative as the following theorem shows. no (Rk ) that induces τ no , let δ be the Hausdorff metric on Theorem 2. Let d be a metric on Fcoc ∞ Fcoc no (Rk ) be a random fuzzy set over some probability space (Ω, F , P). Then Kco+ (Rk ), and let Ye : Ω → Fcoc the following statements are equivalent: .1 Ye is integrably bounded. .2 There exists some A ∈ F , P A = 1, and a sequence (Yen )n of simple random fuzzy sets over (Ω, F , P) such that (i) lim d(Yen (ω), Ye (ω)) = 0 for all ω ∈ A. n−→∞ (ii) sup δ∞ ([Yen ]α , {0}) is P −integrable for every α ∈]0, 1] ∩ Q. n If one of the statements .1, .2 is satisfied, then lim d(EeAYen , EeAYe ) = 0 holds for any sequence (Yen )n of n−→∞ simple random fuzzy sets as in statement .2.  Remark: Theorem 2 is an extension of a classical result from the theory of random compact sets: Debreu suggested a kind of Bochner-integral for convex-valued random compact sets. He has shown that it coincides with the Aumann-integral in the case of integrably bounded convex-valued random compact sets (cf. [3]; see also [7]). The characterization of the integral by statement .2 of Theorem 2 may be regarded as an generalization of Debreu’s concept. Moreover, the extensions of the Aumann- as well as Debreu-integrals coincide.  no (Rk ) w.r.t. the respective L − Considering random fuzzy sets with outcomes in the spaces Fcocp p or L p,∞ −metrics it is interesting to find necessary and sufficient conditions which characterize them as integrably bounded with Aumann-integrals belonging to the respective subspace. The following theorem gives a complete answer to this problem. 96 no (Rk ) denote a random fuzzy set over some probability Theorem 3. Let p ∈ [1, ∞] and let Ye : Ω → Fcocp space (Ω, F , P). no (Rk ) if and only if .1 For p = 1 the random fuzzy set Ye is integrably bounded with EeAYe ∈ Fcoc1 e is P −Pettis-integrable and no (Rk ) ◦ Y either ρ1 (Ye , e 0) or d1 (Ye , e 0) is P −integrable. In this case jFcoc1 A jF no (Rk ) (Ee Ye ) coincides with the Pettis integral of jF no (Rk ) ◦ Ye . coc1 coc1 no (Rk ) if and only .2 For p ∈]1, ∞[ the random fuzzy set Ye is integrably bounded with EeAYe ∈ Fcocp e is P −Pettis-integrable as well as either ρ1 (Ye , e 0) or d1 (Ye , e 0) is P −integrable. In if jFcocp no (Rk ) ◦ Y A e e e this case jF no (Rk ) (E Y ) coincides with the Pettis integral of jF no (Rk ) ◦ Y . cocp cocp no (Rk ) if and only if .3 For p = ∞ the random fuzzy set Ye is integrably bounded with EeAYe ∈ Fcoc∞ e e e e ρ∞ (Y , 0) = d∞ (Y , 0) is P −integrable.  Remark: no (Rk )−valued random fuzzy set Y e over a probability space In [13] it has been shown that some Fcocp no (Rk ) if ρ (Y ee (Ω, F , P) is integrably bounded with EeAYe ∈ Fcocp p , 0) is ( P −integrable of order p : p ∈ [1, ∞[ . P −integrable : p=∞ This result is now improved by Theorem 3. Moreover, the converse direction has been found. 4  Pettis-integrable random fuzzy sets no (Rk )−valued random fuzzy sets are considered as random elements w.r.t. the L −metric ρ If Fcocp p p or the L p,∞ −metric d p , they can be identified, via the standard embedding, with random elements in a real Banach space. So the concepts of Pettis- or Bochner-integrals may be used as alternative ways to define integrals for random fuzzy sets. This section deals with the approach inspired by the Pettis-integration. no (Rk ) denote a random fuzzy set over some probability Definition 4. Let p ∈ [1, ∞] and let Ye : Ω → Fcocp space (Ω, F , P). Then Ye will be defined as P −Pettis-integrable w.r.t. ρ p if it satisfies the following properties no (Rk ) w.r.t. ρ over (Ω, F , P). (i) Ye is a random element in Fcocp p e is P −Pettis-integrable. (ii) jFcocp no (Rk ) ◦ Y no (Rk ) with j ePYe ) being identical with the Pettis-integral (iii) There exists some EePYe ∈ Fcocp no (Rk ) (E Fcocp of jF no (Rk ) ◦ Ye . cocp If Ye is P −Pettis-integrable w.r.t. ρ p , then EePYe will be called the Pettis-integral of Ye . 97  Remark: ePYe is unique if it exists. Since the embedding jFcocp no (Rk ) is injective, the fuzzy subset E  no (Rk )One can derive the following relationship between Aumann- and Pettis-integration of Fcocp valued random fuzzy sets for p ∈ [1, ∞]. no (Rk ) denote a random fuzzy set over some probability Theorem 5. Let p ∈ [1, ∞] and let Ye : Ω → Fcocp space (Ω, F , P). no (Rk ), then Y e is P −Pettis-integrable .1 If p ∈ [1, ∞[, and if Ye is integrably bounded with EeAYe ∈ Fcocp P A e e e e and E Y = E Y . .2 If d∞ (Ye , e 0) = ρ∞ (Ye , e 0) is P −integrable, then Ye is P −Pettis-integrable with EeAYe = EePYe .  Remark: no (Rk )−valued ranAs remarked above after Theorem 3, Theorem 5 improves a former result for Fcocp dom fuzzy sets Ye with ρ p (Ye , e 0) being integrable of order p for p ∈ [1, ∞[. In particular, it also improves no (Rk )−valued random fuzzy sets Y e a result by Näther who has shown the result of Theorem 5 for Fcoc2 with ρ2 (Ye , e 0) being integrable of order 2 (cf. [14]).  5 Bochner-integrable random fuzzy sets Analogously to Pettis-integrability one can develop Bochner-integration of random fuzzy sets. no (Rk ) denote a random fuzzy set over some probability Definition 6. Let p ∈ [1, ∞] and let Ye : Ω → Fcocp space (Ω, F , P). Then Ye will be defined as P −Bochner-integrable w.r.t. ρ p if it satisfies the following properties no (Rk ) w.r.t. ρ over (Ω, F , P). (i) Ye is a separably-valued random element in Fcocp p e is P −Bochner-integrable. (ii) jFcocp no (Rk ) ◦ Y no (Rk ) with j eBYe ) being identical with the Bochner(iii) There exists some EeBYe ∈ Fcocp no (Rk ) (E Fcocp integral of jF no (Rk ) ◦ Ye . cocp If Ye is P −Bochner-integrable w.r.t. ρ p , then EeBYe will be called the Bochner-integral of Ye .  Remarks: eBYe is unique if it exists. 1) Since each embedding jFcocp no (Rk ) is injective, the fuzzy subset E no (Rk )−valued random fuzzy sets are exactly the 2) Observe that for every p ∈ [1, ∞[ the Fcocp no separably-valued random elements in Fcocp (Rk ) w.r.t. ρ p since ρ p is separable. no (Rk ) w.r.t. ρ is integrably bounded 3) For every p ∈ [1, ∞] each simple random element in Fcocp p as well as Bochner-integrable, and EeAYe = EeBYe holds. 98  no (Rk )−valued random It turns out that for p ∈ [1, ∞[ Aumann- and Bochner-integration of Fcocp fuzzy sets are closely related. no (Rk ) denote a random fuzzy set over some probability Theorem 7. Let p ∈ [1, ∞[, and let Ye : Ω → Fcocp space (Ω, F , P). Then the following statements are equivalent: .1 Ye is P −Bochner-integrable. no (Rk ), and j e is P −Bochner-integrable with .2 Ye is integrably bounded with EeAYe ∈ Fcocp no (Rk ) ◦ Y Fcocp jF no (Rk ) (EeAYe ) being identical with the Bochner-integral of jF no (Rk ) ◦ Ye . cocp cocp .3 Either ρ p (Ye , e 0) or d p (Ye , e 0) is P −integrable. no (Rk )−valued random fuzzy sets over (Ω, F , P) .4 There exists some sequence (Yen )n of simple Fcocp which satisfy (i) lim ρ p (Yen (ω), Ye (ω)) = 0 for all ω ∈ Ω n−→∞ (ii) lim Eρ p (Yen , Ye ) = 0 n−→∞ no (Rk ), and If any of the statements .1 - .4 is fulfilled, then Ye is integrably bounded with EeAYe ∈ Fcocp EeAYe = EeBYe as well as lim ρ p (EeAYen , EeAYe ) = 0 n−→∞ no (Rk )−valued random fuzzy sets as in statement .4. whenever (Yen )n is a sequence of simple Fcocp  Remark: no (Rk )− valued Theorem 7 improves a former result in [13] where it has been shown that a Fcocp random fuzzy set Ye satisfies statement .2 of Theorem 7 if ρ p (Ye , e 0) is integrable of order p. In particular also a result by Körner is improved who has proved that statement .2 of Theorem 7 holds for a no (Rk )−valued random fuzzy set Y e with ρ2 (Ye , e 0) being integrable of order 2 (cf. [9]).  Fcoc2 no (Rk )−valued random fuzzy sets the concept of Bochner-integrals are much In the case of Fcoc∞ more restrictive than Aumann-integration. no (Rk ) denote a random fuzzy set over some probability space (Ω, F , P). Theorem 8. Let Ye : Ω → Fcoc∞ Then the following statements are equivalent: .1 Ye is P −Bochner-integrable. no (Rk ), and j e is P −Bochner-integrable with .2 Ye is integrably bounded with EeAYe ∈ Fcoc∞ no (Rk ) ◦ Y Fcoc∞ eAYe ) being identical with the Bochner-integral of jF no (Rk ) ◦ Ye . jFcoc∞ no (Rk ) (E coc∞ no (Rk ) w.r.t. ρ = d .3 Ye is a separably-valued random element in Fcoc∞ ∞ ∞ over (Ω, F , P), and ρ∞ (Ye , e 0) = d∞ (Ye , e 0) is P −integrable. no (Rk )−valued random fuzzy sets over (Ω, F , P) .4 There exists some sequence (Yen )n of simple Fcoc∞ which satisfy 99 (i) lim ρ∞ (Yen (ω), Ye (ω)) = 0 for all ω ∈ Ω n−→∞ (ii) lim Eρ∞ (Yen , Ye ) = 0 n−→∞ no (Rk ), and If any of the statements .1 - .4 is fulfilled, then Ye is integrably bounded with EeAYe ∈ Fcoc∞ EeAYe = EeBYe as well as lim ρ∞ (EeAYen , EeAYe ) = 0 n−→∞ no (Rk )−valued random fuzzy sets as in statement .4. whenever (Yen )n is a sequence of simple Fcoc∞  Every Bochner-integrable random fuzzy set is Pettis-integrable, and the Bochner- coincides with the Pettis-integral. This is a result in accordance with the integration of random elements in Banach spaces. no (Rk ) be a random fuzzy set over some probability Theorem 9. Let p ∈ [1, ∞] and let Ye : Ω → Fcocp space (Ω, F , P). If Ye is P −Bochner-integrable w.r.t. ρ p , then it is also P −Pettis-integrable w.r.t. ρ p with EeBYe = EePYe .  6 Dominated convergence theorems for random fuzzy sets As a quite easy application of the discussion on integrability of random fuzzy sets we can derive several dominated convergence theorems, dependent on the sample space. Theorem 10. Let {Ye , Yen | n ∈ N} be a set of integrably bounded random fuzzy sets over some probability space (Ω, F , P) such that sup δ∞ ([Yen ]α , {0}) is P −integrable for every α ∈]0, 1] ∩ Q. n eAYen , EeAYe ) = 0. no , then lim d(E If lim d(Yen , Ye ) = 0 a.s. holds for any metric d which induces τFcoc n−→∞  n−→∞ no (Rk )−valued random fuzzy sets (p ∈ [1, ∞]), one obtains the following domiDealing with Fcocp nated convergence theorem. no (Rk )−valued random Theorem 11. Let p ∈ [1, ∞] be fixed and let {Ye , Yen | n ∈ N} be a set of Fcocp fuzzy sets over some probability space (Ω, F , P) which satisfy (i) ρ p (Ye , e 0) is P −integrable. (ii) sup ρ p (Yen , e 0) is P −integrable. n .1 If p ∈ [1, ∞[, and if lim ρ p (Yen , Ye ) = 0 a.s., then n−→∞ lim ρ p (EeAYen , EeAYe ) = lim ρ p (EePYen , EePYe ) = lim ρ p (EeBYen , EeBYe ) n−→∞ = n−→∞ n−→∞ lim d p (EeAYen , EeAYe ) = lim d p (EePYen , EePYe ) = lim d p (EeBYen , EeBYe ) n−→∞ n−→∞ = 0 100 n−→∞ .2 If lim ρ∞ (Yen , Ye ) = 0 a.s., then lim d∞ (EeAYen , EeAYe ) = lim ρ∞ (EeAYen , EeAYe ) = 0 n−→∞ n−→∞ n−→∞  Remark: Statement .2 of Theorem 11 is known from [13], whereas statement .2 generalizes and improves already known dominated convergence theorems: • All the previous results are formulated w.r.t. the Aumann-integrals only. no (Rk )−valued random fuzzy sets • The respective theorems in [8] and [11] are restricted to Fcoc∞ e e e e assuming that the mappings d∞ (Yn , 0) and d∞ (Y , 0) are integrable. no (Rk )−valued random • In [13] the results from [8] and [11] have been extended to arbitrary Fcocp fuzzy sets Ye , Yen under the quite unsatisfactory condition that the mappings ρ p (Ye , e 0) and ρ p (Yen , e 0) are integrable of order p for p ∈ [1, ∞[. 7 Strong law of large numbers and central limit theorems for random fuzzy sets no (Rk )−valued integrably bounded random fuzzy sets are closely related with BochnerSince Fcocp integrable random elements in L p ([0, 1] × Sk−1 ) for p ∈ [1, ∞[, we can make use of limit theorems for random elements in real Banach spaces to obtain strong laws of large numbers and central limit theorems for random fuzzy sets. Considering pairwise independent, identically distributed random fuzzy sets, Etemadi’s strong law of large numbers ([5]) may be applied since (L p ([0, 1] × Sk−1 ), k · k p ) is a real separable Banach space for p ∈ [1, ∞[. Theorem 12. Let p ∈ [1, ∞[, and let (Yen )n denote a sequence of pairwise independent, identically no (Rk )−valued random fuzzy sets over some probability space (Ω, F , P). distributed Fcocp If ρ p (Ye1 , e 0) is P −integrable, then lim ρ p ( n1 ⊙F (Ye1 ⊕F ... ⊕F Yen ), EeAYe1 ) = 0 a.s.. n−→∞ no (Rk ) such that lim ρ ( 1 ⊙ (Y e0 ∈ Fcocp e0 ) = e1 ⊕F ... ⊕F Yen ), A Conversely, if there exists some A p n F n−→∞ 0 a.s. holds, then ρ p (Ye1 , e 0) is P −integrable, in particular Ye1 is integrably boundend as well as no (Rk ). e0 ∈ Fcocp  P −Bochner- and P −Pettis-integrable with EeAYe1 = EeBYe1 = EePYe1 = A Remark: no (Rk )−valued random fuzzy sets by Colubi, Lopez-Diaz Theorem 12 completes a result for Fcoc∞ and Gil (cf. [2]).  Hoffmann-Jorgensen and Pisier introduced a classification of Banach spaces, where classical strong laws of large numbers and central limit theorems can be extended immediately. Their investigations led to the concept of types of Banach spaces. The type of a Banach space is directly linked with the validity of certain limit theorems (cf. [6]). Since (L p ([0, 1] × Sk−1 ), k · k p ) is a real separable Banach space of type p in the case of p ∈ [1, 2] and of type 2 if p ∈ [2, ∞[, one can draw on the limit theorems for random elements in these classes of real Banach spaces. 101 no (Rk )−valued random fuzzy Theorem 13. Let p ∈ [1, ∞[ and (Yen )n be a sequence of independent Fcocp sets over some probability space (Ω, F , P) such that (i) ρ p (Yen , e 0) is P −integrable for all n, Eρ p (Yen , EeAYen )q < ∞ for q = p if p ∈ [1, 2] and q = 2 if p ∈ [2, ∞[. nq n=1 ∞ (ii) ∑ Then lim ρ p n−→∞  1 1 ⊙F (Ye1 ⊕F ... ⊕F Yen ), ⊙F (EeAYe1 ⊕F ... ⊕F EeAYen ) = 0 a.s. n n  Theorem 14. Let p ∈ [2, ∞[, and let (Yen )n denote a sequence of independent and identically distributed no (Rk )−valued random fuzzy sets over some probability space (Ω, F , P) such that ρ (Y e e Fcocp p 1 , 0) is P − integrable of order 2. Then there exists a Gaussian element Z in L p ([0, 1] × Sk−1 ) with vanishing Bochner-integral and   n √ covariance operator as jF no (Rk ) ◦ Ye1 such that the sequence √1 ∑ jF no (Rk ) ◦ Yei − n jF no (Rk ) (EeAYe1 ) n cocp i=1 cocp cocp n  converges weakly to Z. Remark: Theorems 13, 14 improve corresponding previous results in [11] (Theorems 5.1, 5.2) and [13] (Theono (Rk )−valued random fuzzy sets are considered with rems 5, 6) where sequences of independent Fcocp ρ p (Yen , e 0) being integrable of order p for all n.  References [1] Aumann, R. J. (1965). Integrals of Set-Valued Functions. J. Math. Anal. Appl. 12, 1-12. [2] Colubi, A., Lopez-Diaz, M., Gil, M. A. (1999). A Generalized strong law of large numbers. Probab. Theory Related Fields 114, 401-417. [3] Debreu, G. (1967). Integration of Correspondences. In Proceedings of the Fifth Berkely Symposium on Mathematical Statistics and Probability, Vol.II, Part I, University of California Press, Berkeley/Los Angeles, pp. 351-372. [4] Diamond, P.,Kloeden, P. (1994). Metric Spaces of Fuzzy Sets, World Scientific, Singapore. [5] Etemadi, N. (1981). An elementary proof of the strong law of large numbers. Z. Wahrsch. Gebiete 55, 119-122. [6] Hoffmann-Jorgensen, J./Pisier, G. (1976). The law of large numbers and the central limit theorem in Banach spaces. Ann. Probab. 4, 587-599. [7] Klein, E.,Thomson, A.C. (1984). Theory of Correspondences, Wiley & Sons, New York. [8] Klement, E.P.,Puri, M.L.,Ralescu, D.A. (1986). Limit theorems for fuzzy random variables. Proc.R.Soc.Lond. A 407, 171-182. 102 [9] Körner, R. (1997). On the variance of fuzzy random variables. Fuzzy Sets and Systems 92, 83-93. [10] Krätschmer, V. (2001). A unified approach to fuzzy random variables. Fuzzy Sets and Systems 123, 1-9. [11] Krätschmer, V. (2002). Limit theorems for fuzzy-random variables. Fuzzy Sets and Systems 126, 253-263. [12] Krätschmer, V. (2002). Some complete metrics on spaces of fuzzy subsets. Fuzzy Sets and Systems 130, 357-365. [13] Krätschmer, V. (2003). Probability theory in fuzzy sample spaces. To appear in Metrika. [14] Näther, W. (2000). On random fuzzy variables of second order and their application to linear statistical inference with fuzzy data. Metrika 51, 201-221. [15] Puri, M.L.,Ralescu, D.A. (1986). Fuzzy Random Variables. J. Math. Anal. Appl. 114, 409-422. 103 Copulas and characterization of T -product possibility measures T OMÁŠ K ROUPA Faculty of Electrical Engineering Czech Technical University 16627 Praha, Czech Republic Institute of Information Theory and Automation Czech Academy of Sciences 18208 Praha 8, Czech Republic E-mail: ❦r♦✉♣❛❅✉t✐❛✳❝❛s✳❝③ 1 Introduction The aim of this contribution is a partial characterization of T -product possibility measures, where T is a t-norm satisfying the Lipschitz property with the constant 1. Any possibility measure can be assigned a set of distribution functions which are dominated by this possibility measure. It will be demonstrated that the set of all joint distribution functions dominated by a T -product possibility measure contains each joint distribution function obtained by an application of a copula C ≤ T to some marginal distribution functions dominated by marginal possibility measures. 2 2.1 Basic Notions Possibility Theory and t-norms See [1] for a thorough theoretical exposition. Let X be a non-empty set and A be a complete Boolean algebra of its subsets: A contains X and it is closed under complementation and arbitrary unions. Consequently, A is closed under arbitrary intersections. A possibility measure Π on X is a set function Π : A → [0, 1] such that for any family (Ai )i∈I of elements of A the condition S Π( i∈I Ai ) = supi∈I Π(Ai ) is satisfied and Π(X) = 1. The last condition means that only normal possibility measures are considered. A possibility distribution π is a mapping π : X → [0, 1] such that Π(A) = supx∈A π(x) for any A ∈ A and π−1 ({a ∈ [0, 1] : a ≤ a′ }) ∈ A for any a′ ∈ [0, 1]. A purely technical requirement is that X always contains an element x such that π(x) = 0. Assume that ΠX×Y is a possibility measure on a Cartesian product X × Y . Then its marginal possibility measure ΠX is uniquely determined by the formula ΠX (A) := ΠX×Y (A ×Y ), A ∈ A . The t-norm T is a commutative, associative and monotone binary operation on [0, 1] with the neutral element 1. Significant examples of (continuous) t-norms are these: the t-norm minimum TM (a, b) = min(a, b), the product t-norm TP (a, b) = ab and the Łukasiewicz’ t-norm TL (a, b) = max(0, a + b − 1). If ΠX , ΠY are possibility measures on X, Y , respectively, and T is a continuous 104 t-norm, then we say that ΠTX×Y : AX ⊗ AY → [0, 1] is a T -product possibility measure on X ×Y , where AX ⊗ AY ⊆ 2X×Y is a product algebra of AX and AY , if ΠTX×Y (A × B) = T (ΠX (A), ΠY (B)), A ∈ AX , B ∈ AY . (1) A notion of the T -product possibility measure was introduced in [1] and it is evidently a more general analog of the product probability measure used in classical probability theory. 2.2 Copulas A copula C is a binary operation on [0, 1] such that 1. for every a, b ∈ [0, 1], C(a, 0) = C(0, b) = 0, and C(a, 1) = a and C(1, b) = b; 2. for every a1 , a2 , b1 , b2 ∈ [0, 1] such that a1 ≤ a2 and b1 ≤ b2 , C(a2 , b2 ) −C(a2 , b1 ) −C(a1 , b2 ) +C(a1 , b1 ) ≥ 0. The t-norms TM , TP , TL are all copulas. Moreover, for every copula C and (a, b) ∈ [0, 1]2 , TL (a, b) ≤ C(a, b) ≤ TM (a, b). (2) Any t-norm T is a copula if and only if T satisfies Lipschitz property with the constant 1 [3]. 3 Characterization of T -product Possibilities Each possibility measure ΠX on X can be assigned a set PΠX of finitely-additive probability measures PX on X dominated by ΠX : n PΠX := PX : PX (A) ≤ ΠX (A), A ∈ AX }. (3) It was proven in [2] that ΠX is even an upper envelope of PΠX , i.e. ΠX (A) = sup PX (A), PX ∈PΠX A ∈ AX . (4) Instead of probability measures, distribution functions can be considered. Let  be the total ordering on X agreeing with the one given by values of the possibility distribution πX , that is x1  x2 iff πX (x1 ) ≤ πX (x2 ). Let then x and x denote the greatest and the lowest element of X in this ordering, respectively. Consequently, the mapping FX : X → [0, 1] defined by FX (x) := PX ({x′ ∈ X : x′  x}), 105 x ∈ X, (5) is a distribution function since FX is non-decreasing and FX (x) = 1, FX (x) = 0. We can define n o ′ ′ FΠX := FX : F(x) ≤ ΠX ({x ∈ X : x  x}), x ∈ X . (6) If FX and FY are distribution functions on X and Y , respectively, and C is a copula, then the mapping C FX×Y (x, y) := C(FX (x), FY (y)), (x, y) ∈ X ×Y, (7) is the joint distribution function of FX and FY on X ×Y . Let us consider a T -product possibility measure ΠTX×Y , where the t-norm T satisfies Lipschitz property with the constant 1. Under this assumption, we can partially characterize the set of joint distribution functions dominated by ΠTX×Y . Proposition 1. Let ΠX , ΠY be possibility measures on X, Y , respectively, ΠTX×Y be a T -product possibility measure, where T is a t-norm satisfying Lipschitz property with the constant 1. Consider the set of copulas CT = {C : C ≤ T }. Then any FX×Y ∈ FΠTX×Y has marginal distribution functions FX ∈ FΠX , FY ∈ FΠY and FΠTX×Y ⊇ [ o n C C FX×Y : FX×Y = C(FX , FY ), C ∈ CT . (8) (FX ,FY )∈FΠX ×FΠY Proof. For the sake of further brevity, let us stipulate that {x′  x} := {x′ ∈ X : x′  x}. Let FX×Y ∈ FΠTX×Y . Then FX (x) = FX×Y (x, y) ≤ ΠTX×Y ({x′  x} ×Y ) = ΠX ({x′  x}), and analogously for FY . Consequently, FX ∈ FΠX and FY ∈ FΠY . Notice that the set CT is always non-empty since T is also a copula and, according to (2), there is always at least one copula which is lower or equal to T . To prove the second part of the proposition, let us consider an arbitrary pair of marginal distribution functions (FX , FY ) ∈ FΠX × FΠY and any copula C ∈ CT . Then for any pair (x, y) ∈ X ×Y , C FX×Y (x, y) = C(FX (x), FY (y)) ≤ T (FX (x), FY (y)) ≤ T (ΠX ({x′ ≤ x}), ΠY ({y′ ≤ y})), C and thus FX×Y ∈ FΠTX×Y . ✷ The previous proposition provides merely a partial characterization of T -product possibility measures: it can be demonstrated that in general case the set of joint distribution functions on the right-hand side of (8) is a proper subset of FΠTX×Y . Nevertheless, a complete characterization is obtained in some special cases as the following example demonstrates. 106 Example 2. If T = TM , then CTM consists of all copulas since TM is the greatest copula. Due to Proposition 1, any FX×Y ∈ FΠTM has marginal distribution functions FX , FY belonging to FΠX and X×Y FΠY , respectively. Sklar’s theorem [4] now implies that there is a copula C such that FX×Y = C(FX , FY ) and FΠTM thus consists of the joint distribution functions obtained by an application of all copulas to X×Y all pairs (FX , FY ) ∈ FΠX × FΠY . Acknowledgements The work on this paper was partially supported by the grant AV ČR A2075302 and by the European project CEEPUS SK-42. The author would like to express his gratitude to Prof. Radko Mesiar for valuable comments and suggestions regarding the presented topic. References [1] de Cooman, G.: Possibility theory I-III. Int. Journal of General Systems (1997) 291–371 [2] de Cooman, G., Aeyels, D.: Supremum preserving upper probabilities. Information Sciences (1999) 173–212 [3] Klement, E.P., Mesiar, R., Pap, E.: Triangular Norms. Kluwer Academic Publishers, Dordrecht (2000) [4] Nelsen, R.: An Introduction to Copulas. Lecture Notes in Statistics. Springer, New York (1999) 107 Semicontinuous L-real valued functions T OMASZ K UBIAK Wydział Matematyki i Informatyki Uniwersytet im. Adama Mickiewicza 61614 Poznań, Poland E-mail: t❦✉❜✐❛❦❅❛♠✉✳❡❞✉✳♣❧ Recall that when X is a topological space, the lower and upper limit functions f∗ and f ∗ of a given f : X → R (or to R) are defined as follows: f∗ (x) = _ ^ { f (U) : U is an open nbhd of x} f ∗ (x) = ^ _ f (U) : U is an open nbhd of x}. and { In this report we study lower and upper limits of L-real valued functions by extending the operators (·)∗ and (·)∗ to the framework of L-topological spaces. The approach we are taking involves scales of L-sets. More specifically, let (L,′ ) be a complete lattice with an order-reversing involution and let X be a set. Each order-preserving family A = {ar : r ∈ Q ∩ R} ⊂ LX is called an extended scale of L, W V and it is called a scale whenever A = 1X and A = 10/ . It is well known that for every x ∈ X and V t ∈ R, the function αx : R → L, defined by αx (t) = r<t ar′ (x), is order-reversing and, when A is a W V scale, then αx (R) = 1 and αx (R) = 0. The function f : X → R(L) (respectively, R(L)), defined by f (x) = [αx ], is said to be genrated by the scale (respectively, extended scale) A . For X an L-topological space and an (extended) scale A , we let A∗ = {ClX ar : r ∈ Q ∩ R} and A ∗ = {IntX ar : r ∈ Q ∩ R}. Then the functions f∗ and f ∗ generated by, respectively, A∗ and A ∗ , are called lower and limit functions of f . When the L-real line R(L) is endowed with the right L-topology RL = {Rt : t ∈ R} ∪ {10/ , 1R(L) } or with the left L-topology LL = {Lt : t ∈ R } ∪ {10/ , 1R(L) }, then members of LSC(X, R(L)) = { f ∈ R(L)X : u ◦ f is open in X for all u ∈ RL } and USC(X, R(L)) = { f ∈ R(L)X : u ◦ f is open in X for all u ∈ LL } are called lower and uper semicontinuous function on X. A detailed study of the operators (·)∗ and (·)∗ will be presented. In particular, one has LSC(X) = { f : f = f∗ } and USC(X) = { f : f = f ∗ }. Also, the concept of an epigraph of an L-real valued function will be defined and the classical relationship between the closedness of the epigraph and 108 lower semicontinuity will be shown to hold for the case of stratified L-topological space. Specifically, when (L,′ ) is a frame, then f ∈ LSC(X, R(L)) if and only if Gf = _ t∈R (Rt ◦ f ) × Lt is open in the product L-topological space X × R(L). For I(L)-valued function, the assignment I(L)X ∋ f 7→ G f ∈ LX×[0,1)(L) will be used to construct the hypergraph functor form the category TOP(I(L)) of I(L)-topological spaces into the category TOP(L) of L-topological spaces, which with L the two-pont chain reduces to the classical hypergraph functor. With L a meet-continuous lattice, the link between that hypergraph functor and the functors ΩL : TOP(L) → TOP(I(L)) and IL : TOP(I(L)) → TOP(L) continues to hold. Semicontinuous L-real valued functions are well-known to play an important role in characterizing some important classes of L-topological spaces, including L-normal and completely L-regular spaces. Some of those results will be restated (and sometimes reproved) in trems of lower and upper limit functions. 109 Topological locally finite MV-algebra and the Riemann Surface PAAVO K UKKURAINEN Lappeenranta University of Technology 53851 Lappeenranta, Finland E-mail: ♣❛❛✈♦✳❦✉❦❦✉r❛✐♥❡♥❅❧✉t✳❢✐ 1 Preliminaries For MV -algebras, we refer to [1], [2] and for bounded commutative BCK-algebras to [3]. In [3] refered to [7], it is showed that an MV - algebra defines a bounded commutative BCK-algebra and conversely. In fact, let · and + be the binary operations and − the unary operation of an MV -algebra. If ⋆ is the operation of a bounded commutative BCK-algebra, then x ⋆ y = x · ȳ. On the other hand, we have x̄ = 1 ⋆ x, x · y = x ⋆ ȳ, x + y = (x̄ ⋆ y)− . The partial ordering ≤ in a bounded commutative BCK-algebra is defined as follows: x ≤ y iff x ⋆ y = 0. By [3], I is an ideal of an MV -algebra iff I is an ideal of a BCK-algebra. For BCK-algebras and ideals of a BCK-algebra and an MV -algebra see [5], [1] and [2]. For the Riemann surfaces we refer to [6]. 2 2.1 Topological locally finite MV -algebra Linear Topology induced by Ideals In [4], it is constructed a topology for an MV -algebra A considered as a bounded commutative BCKalgebra. Let Λ be a directed set i.e. a partially ordered set such that for λ, µ ∈ Λ there is ν ∈ Λ for which λ ≤ ν and µ ≤ ν. Let F = {Iλ | λ ∈ Λ} be a family of ideals of A such that if λ < µ then Iµ ⊂ Iλ . Define a relation ∼ in the following way [5]: x ∼ y mod Iλ iff x ⋆ y ∈ Iλ and y ⋆ x ∈ Iλ , (1) and let U(x, λ) = {y ∈ A | x ∼ y mod Iλ } (2) The neighborhoods U(x, λ) defines a topology in A called the linear topology induced by F. Further, (x, y) → x ⋆ y and x → x̄ are continuous. Therefore, A is a topological MV -algebra. 110 2.2 Locally finite MV -algebras as Topological MV -algebras The following proposition is proved by C.S.Hoo: Proposition 1. [4] The topology on a locally finite MV -algebra is one of the following types: 1. Hausdorff and connected, 2. Hausdorff and totally disconnected, 3. the trivial topology. It is known that a locally finite MV -algebra A is isomorphic to a subset of the unit interval [0,1], [1], with a Lukasiewicz structure. Without loss of generality we suppose that the smallest and the greatest elements of this subset are 0 and 1. We keep A just as this subset and obtain x ⋆ y = x · ȳ = max(0, x + 1 − y − 1) = max(0, x − y). (3) y ⋆ x = y · x̄ = max(0, y + 1 − x − 1) = max(0, y − x). (4) Therefore, if x ≥ y, x ⋆ y = x − y = |x − y| (5) y⋆x = 0 y ≥ x, (6) y ⋆ x = y − x = |y − x| (7) x⋆y = 0 (8) Let I be an ideal of A. By relation ∼ modulo I x ∼ y mod I iff x⋆y ∈ I and y⋆x ∈ I iff |x − y| ∈ I. (9) and so U(x) = {y ∈ A | x ∼ y mod I} = {y ∈ A | |x − y| ∈ I}. (10) Since the only ideals of A are {0} and the whole A [1], we analyse the results of Proposition 1 with the neighborhoods U(x): 1. Let I = {0}. Then x = y and U(x) = {x} for every x ∈ A. In this case every singleton {x} is open and the topology is discrete and so totally disconnected. Conversely, if A is totally disconnected, then for every x ∈ A, the component of x is {x}. Especially, the component of 0 is {0}. Since the component is an ideal [4], I = {0}. It is proved that I = {0} iff A is totally disconnected. 2. Let I = A. The topology is trivial iff U(x) = A for every x ∈ A. 3. Let I = A such that U(x) 6= A for some x ∈ A. Neither A is totally disconnected nor the topology on A is trivial, by Proposition 1, A is Hausdorff and connected. In this case we choose the relative usual topology on A. 111 3 Topological locally finite MV -algebra as the Riemann Surface The theory of the Riemann surface which is used is found from [6]. Let A be a topological locally finite MV -algebra. Consider the case where A is Hausdorff and connected. Proposition 2. Let A be a topological locally finite MV -algebra. If A is Hausdorff and connected, then A × A is a compact Riemann surface which is topologically a torus. Proof. The theory of the Riemann surface which is used is found from [6]. Let S be a Riemann surface which has the complex plane as its universal covering surface D. Assume the covering group G has two generators z → z + 1 and z → z + i (translations). A fundamental domain is now the interior of the square with vertices at 0, 1, 1 + i, i, which is (isomorphic to) the interior of [0, 1] × [0, 1]. In this case the Riemann surface S = D/G (modulo conformal equivalence) is compact. Since the opposite sides of the square 0, 1, 1 + i, i are equivalent under G, topologically S = A × A is a torus. References [1] L.P.Belluce, Semisimple algebras of infinite valued logic and bold fuzzy set theory, Can.J.Math.38 No.6(1986),1356-1379. [2] C.C.Chang, Algebraic analysis of many value logics, Trans.Amer.Math.Soc.88(1958). [3] C.S.Hoo, MV-algebras, ideals and semisimplicity, Math.Japonica 34, No.4(1989),563-583. [4] C.S.Hoo, Topological MV-algebras, Topology and its Applications 81(1997),103-121. [5] K.Iseki and S.Tanaka, An introduction to the theory of BCK-algebra, Math.Japon.23 No.1(1978). [6] O.Lehto, Univalent Functions and Teichmuller Spaces, Springer-Verlag,New York,1987. [7] D.Mundici, MV-algebras and categorially equivalent to bounded commutative BCK-algebra, Math.Japon.31(1986),889-894. 112 Dequantization of mathematics, idempotent semirings and fuzzy sets G RIGORII L ITVINOV Center for continuous mathematical education Independent University of Moscow 121002 Moscow, Russia E-mail: ❣❧✐t✈✐♥♦✈❅♠❛✐❧✳r✉ 1. Introduction. The traditional mathematics over numerical fields can be dequantized as the Planck constant h̄ tends to zero taking pure imaginary values. This dequantization leads to the so-called Idempotent Mathematics based on replacing the usual arithmetic operations by a new set of basic operations (e.g., such as maximum or minimum), that is on the concepts of idempotent semifield and semiring. Typical examples are given by the so-called (max, +) algebra Rmax and (min, +) algebra Rmin . Let R be the field of real numbers. Then Rmax = R ∪ {−∞} with operations x ⊕ y = max{x, y} and x ⊙ y = x + y. Similarly Rmin = R ∪ {+∞} with the operations ⊕ = min, ⊙ = +. The new addition ⊕ is idempotent, i.e., x ⊕ x = x for all elements x. Some problems that are nonlinear in the traditional sense turn out to be linear over a suitable idempotent semiring (idempotent superposition principle [1]). For example, the Hamilton-Jacobi equation (which is an idempotent version of the Schrödinger equation) is linear over Rmin and Rmax . The basic paradigm is expressed in terms of an idempotent correspondence principle [2].This principle is similar to the well-known correspondence principle of N. Bohr in quantum theory (and closely related to it). Actually, there exists a heuristic correspondence between important, interesting and useful constructions and results of the traditional mathematics over fields and analogous constructions and results over idempotent semirings and semifields (i.e., semirings and semifields with idempotent addition). For example, the well-known Legendre transform can be treated as an Rmax version of the traditional Fourier transform (this observation is due to V. P. Maslov). A systematic and consistent application of the idempotent correspondence principle leads to a variety of results, often quite unexpected. As a result, in parallel with the traditional mathematics over rings, its “shadow”, the Idempotent Mathematics, appears. This “shadow” stands approximately in the same relation to the traditional mathematics as classical physics to quantum theory. In many respects Idempotent Mathematics is simpler than the traditional one. However, the transition from traditional concepts and results to their idempotent analogs is often nontrivial. In this talk a brief survey of basic ideas of Idempotent Mathematics is presented. Relations between this theory and the theory of fuzzy sets as well as the possibility theory and some applications (including computer applications) are discussed. Hystorical surveys and the corresponding references can be found in [2]–[5]. 2. Semirings, semifields, and idempotent dequantization. Consider a set S equipped with two algebraic operations: addition ⊕ and multiplication ⊙. It is a semiring if the following conditions are satisfied: • the addition ⊕ and the multiplication ⊙ are associative; • the addition ⊕ is commutative; 113 • the multiplication ⊙ is distributive with respect to the addition ⊕: x ⊙ (y ⊕ z) = (x ⊙ y) ⊕ (x ⊙ z) and (x ⊕ y) ⊙ z = (x ⊙ z) ⊕ (y ⊙ z) for all x, y, z ∈ S. The semiring is commutative if the multiplication ⊙ is commutative. A unity of a semiring S is an element 1 ∈ S such that 1 ⊙ x = x ⊙ 1 = x for all x ∈ S. A zero of a semiring S is an element 0 ∈ S such that 0 6= 1 and 0 ⊕ x = x, 0 ⊙ x = x ⊙ 0 = 0 for all x ∈ S. A semiring S is called an idempotent semiring if x ⊕ x = x for all x ∈ S. A semiring S with neutral elements 0 and 1 is called a semifield if every nonzero element of S is invertible. The following examples are important. Let P be the segment [0, 1] equipped with the operations x ⊕ y = max{x, y} and x ⊙ y = min{x, y}; then P is a commutative idempotent semiring (but not a semifield). The subset B = {0, 1} in M equipped with the same operations is the well-known Boolean algebra which is an idempotent semifield. In this case ⊕ and ⊙ are the usual Boolean operations (disjunction and conjunction). In the general case the semiring addition and multiplication could be treated as generalized logical (Boolean) operations. Let R be the field of real numbers and R+ the semiring of all nonnegative real numbers (with respect to the usual addition and multiplication). The change of variables x 7→ u = h ln x, h > 0, defines a map Φh : R+ −→ S = R ∪ {−∞}. Let the addition and multiplication operations be mapped from R to S by Φh , i.e., let u ⊕h v = h ln(exp(u/h) + exp(v/h)), u ⊙ v = u + v, 0 = −∞ = Φh (0), 1 = 0 = Φh (1). It can easily be checked that u ⊕h v −→ max{u, v} as h −→ 0 and S forms a semiring with respect to addition u ⊕ v = max{u, v} and multiplication u ⊙ v = u + v with zero 0 = −∞ and unit 1 = 0. Denote this semiring by Rmax ; it is idempotent. The semiring Rmax is actually a commutative semifield. This construction is due to V.P. Maslov [1]; now it is known as Maslov’s dequantization. The analogy with quantization is obvious; the parameter h plays the rôle of the Planck constant, so R+ (or R) can be viewed as a “quantum object” and Rmax as the result of its “dequantization”. A similar procedure gives the semiring Rmin = R ∪ {+∞} with the operations ⊕ = min, ⊙ = +; in this case 0 = +∞, 1 = 0. The semirings Rmax and Rmin are isomorphic. Connections with physics and imaginary values of the Planck constant are discussed in [4]. The commutative idempotent semiring R ∪ {−∞} ∪ {+∞} with the operations ⊕ = max, ⊙ = min can be obtained as a result of a “second dequantization” of R (or R+ ). Dozens of interesting examples of nonisomorphic idempotent semirings may be cited as well as a number of standard methods of deriving new semirings from these (see, e.g., [2]–[5]). Idempotent dequantization is a generalization of Maslov’s dequantization. This is a passage from fields to idempotent semifields and semirings in mathematical constructions and results. The idempotent correspondence principle (see Introduction and [2, 4]) often works for this idempotent dequantization. 3. Idempotent Analysis. Let S be an arbitrary semiring with idempotent addition ⊕ (which is always assumed to be commutative), multiplication ⊙, zero 0, and unit 1. The set S is supplied with the standard partial order 4: by definition, a 4 b if and only if a ⊕ b = b. Thus all elements of S are positive: 0 4 a for all a ∈ S. Due to the existence of this order, Idempotent Analysis is closely related to the lattice theory, the theory of vector lattices, and the theory of ordered spaces. Moreover, this partial order allows to simulate a number of basic notions and results of Idempotent Analysis at the purely algebraic level. Calculus deals mainly with functions whose values are numbers. The idempotent analog of a numerical function is a map X −→ S, where X is an arbitrary set and S is an idempotent semiring. Functions with values in S can be added, multiplied by each other, and multiplied by elements of S. 114 The idempotent analog of a linear functional space is a set of S-valued functions that is closed under addition of functions and multiplication of functions by elements of S, or an S-semimodule. Consider, e.g., the S-semimodule B (X, S) of functions X −→ S that are bounded in the sense of the standard order on S. If S = Rmax , then the idempotent analog of integration is defined by the formula I(ϕ) = Z ⊕ X ϕ(x) dx = sup ϕ(x), (1) x∈X where ϕ ∈ B (X, S). Indeed, a Riemann sum of the form ∑ ϕ(xi ) · σi corresponds to the expression L i i ϕ(xi ) ⊙ σi = max{ϕ(xi ) + σi }, which tends to the right-hand side of (1) as σi −→ 0. Of course, i this is a purely heuristic argument. Formula (1) defines the idempotent integral not only for functions taking values in Rmax , but also in the general case when any of bounded (from above) subsets of S has the least upper bound. An idempotent measure on X is defined by mψ (Y ) = sup ψ(x), where ψ ∈ B (X, S). The integral x∈Y with respect to this measure is defined by Iψ (ϕ) = Z ⊕ X ϕ(x) dmψ = Z ⊕ X ϕ(x) ⊙ ψ(x) dx = sup(ϕ(x) ⊙ ψ(x)). (2) x∈X Obviously, if S = Rmin , then the standard order 4 is opposite to the conventional order 6, so in this case equation (2) assumes the form Z ⊕ X ϕ(x) dmψ = Z ⊕ X ϕ(x) ⊙ ψ(x) dx = inf (ϕ(x) ⊙ ψ(x)), x∈X (3) where inf is understood in the sense of the conventional order 6. The functionals I(ϕ) and Iψ (ϕ) are linear over S; their values correspond to limits of Lebesgue (or Riemann) sums. The formula for Iψ (ϕ) defines the idempotent scalar product of the functions ψ and ϕ. Various idempotent functional spaces and an idempotent version of the theory of distributions can be constructed on the basis of the idempotent integration, see, e.g., [1], [3]–[5]. The analogy of idempotent and probability measures leads to spectacular parallels between optimization theory and probability theory. For example, the Chapman–Kolmogorov equation corresponds to the Bellman equation (see, e.g., [6, 5]). Many other idempotent analogs may be cited (in particular, for basic constructions and theorems of functional analysis [4]). 4. The superposition principle and linear problems. Basic equations of quantum theory are linear (the superposition principle). The Hamilton–Jacobi equation, the basic equation of classical mechanics, is nonlinear in the conventional sense. However it is linear over the semirings Rmin and Rmax . Also, different versions of the Bellman equation, the basic equation of optimization theory, are linear over suitable idempotent semirings (V. P. Maslov’s idempotent superposition principle), see [1, 3]. For instance, the finite-dimensional stationary Bellman equation can be written in the form X = H ⊙X ⊕F, where X, H, F are matrices with coefficients in an idempotent semiring S and the unknown matrix X is determined by H and F [7]. In particular, standard problems of dynamic programming and the well-known shortest path problem correspond to the cases S = Rmax and S = Rmin , respectively. In [7], it was shown that main optimization algorithms for finite graphs correspond to standard methods for solving systems of linear equations of this type (i.e., over semirings). Specifically, Bellman’s 115 shortest path algorithm corresponds to a version of Jacobi’s algorithm, Ford’s algorithm corresponds to the Gauss–Seidel iterative scheme, etc. Linearity of the Hamilton–Jacobi equation over Rmin (and Rmax ) is closely related to the (conventional) linearity of the Schrödinger equation, see [4] for details. 5. Correspondence principle for algorithms and their computer implementations. The idempotent correspondence principle is valid for algorithms as well as for their software and hardware implementations [2]. In particular, according to the superposition principle, analogs of linear algebra algorithms are especially important. It is well-known that algorithms of linear algebra are convenient for parallel computations; so their idempotent analogs accept a parallelization. This is a regular way to use parallel computations for many problems including basic optimization problems. It is convenient to use universal algorithms which do not depend on a concrete semiring and its concrete computer model. Software implementations for universal semiring algorithms are based on object-oriented and generic programming; program modules can deal with abstract (and variable) operations and data types, see [2, 8] for details. The most important and standard algorithms have many hardware realizations in the form of technical devices or special processors. These devices often can be used as prototypes for new hardware units generated by substitution of the usual arithmetic operations for its semiring analogs, see [2] for details. Good and efficient technical ideas and decisions can be transposed from prototypes into new hardware units. Thus the correspondence principle generates a regular heuristic method for hardware design. Note that to get a patent it is necessary to present the so-called “invention formula”, that is to indicate a prototype for the suggested device and the difference between these devices. 6. Idempotent interval analysis. An idempotent version of the traditional interval analysis is presented in [9]. Let S be an idempotent semiring equipped with the standard partial order (see the beginning of Section 3). A closed interval in S is a subset of the form x = [x, x] = {x ∈ S|x 4 x 4 x}, where the elements x 4 x are called lower and upper bounds of the interval x. A weak interval extension I(S) of the semiring S is the set of all closed intervals in S endowed with operations ⊕ and ⊙ defined as x ⊕ y = [x ⊕ y, x ⊕ y], x ⊙ y = [x ⊙ y, x ⊙ y]; the set I(S) is a new idempotent semiring with respect to these operations. It is proved that basic problems of idempotent linear algebra are polynomial, whereas in the traditional interval analysis problems of this kind are generally NP-hard. Exact interval solutions for the discrete stationary Bellman equation (this is the matrix equation discussed in Section 4) and for the corresponding optimization problems are constructed and examined. 7. Generalized fuzzy sets. Let Ω be the so-called universe consisting of “elementary events” and S an idempotent semiring. Denote by F (S) the set of functions defined on Ω and taking their values in S; then F (S) is an idempotent semiring with respect to the pointwise addition and multiplication of functions. We shall say that elements of F (S) are generalized fuzzy sets. We have the well known classical definition of fuzzy sets (L.A. Zadeh [10]) if S = P, where P is the segment [0, 1] with the semiring operations ⊕ = max and ⊙ = min, see Section 2. Of course, functions from F (P) taking their values in the Boolean algebra B = {0, 1} ⊂ P correspond to traditional sets from Ω and semiring operations correspond to standard operations for sets. In the general case if S has neutral elements 0 and 1 (and 0 6= 1), then functions from F (S) taking their values in B = {0, 1} ⊂ S can be treated as traditional subsets in Ω. If S is a lattice (i.e. x ⊙ y = inf{x, y} and x ⊕ y = sup{x, y}), then generalized fuzzy sets coincide with L-fuzzy sets in the sense of J.A. Goguen [11]. The set I(S) of intervals is an idempotent semiring (see Section 6), so elements of F (I(S)) can be treated as interval (generalized) fuzzy sets. 116 It is well known that the classical theory of fuzzy sets is a basis for the theory of possibility [12]. Of course, it is possible to develop a similar generalized theory of possibility starting from generalized fuzzy sets. In general the generalized theories are noncommutative; they seem to be more qualitative and less quantitative with respect to the classical theories presented in [10, 12]. We see that Idempotent Analysis and the theory of (generalized) fuzzy sets and possibility have the same objects, i.e. functions taking their values in semirings. However, basic problems and methods could be different for these theories (like for the measure theory and the probability theory). References [1] V. P. Maslov, Méthodes opératorielles, Mir, Moscou, 1987. [2] G.L. Litvinov and V.P. Maslov, Correspondence principle for idempotent calculus and some computer applications, (IHES/M/95/33), Institut des Hautes Etudes Scientifiques, Bures-sur-Yvette 1995, also in: [5], 420–443. E-print math.GM/0101021 (http://arXiv.org). [3] V.N. Kolokoltsov and V. P. Maslov, Idempotent Analysis and Applications, Kluwer Acad. Publ., Dordrecht, 1997. [4] G. L. Litvinov, V. P. Maslov, G. B. Shpiz, Idempotent functional analysis: an algebraic approach, Mathematical Notes, 69, no. 5 (2001), 696–729, E-print math.FA/0009128 (http://arXiv.org). [5] J. Gunawardena (ed.), Idempotency, Publ. of the Newton Institute, Cambridge Univ. Press, Cambridge, 1998. [6] P. Del Moral, A survey of Maslov optimization theory, In [3]. [7] B. A. Carré, An algebra for network routing problems, J. Inst. Math. Appl., 7 (1971), 273–294. [8] G.L. Litvinov and E.V. Maslova, Universal numerical algorithms and their software implementation, Programming and Computer Software, 26, no. 5 (2000), 275–280. E-print math.SC/0102114 (http://arXiv.org). [9] G.L. Litvinov and A.N. Sobolevskii, Idempotent interval analysis and optimization problems, Reliable Computing, 7, no. 5 (2001), 353–377. E-print math.SC/0101080 (http://arXiv.org). [10] L.A. Zadeh, Fuzzy sets, Information and Control, 8 (1965), 338–353. [11] J.A. Goguen, L-fuzzy sets, J. of Math. Anal. Appl., 18, no. 1 (1967), 145–174. [12] L.A. Zadeh, Fuzzy sets as a basis for a theory of possibility, Fuzzy Sets and Systems, 1 (1978), 3–28. 117 De Morgan triplets in the theory of fuzzified normal forms KOEN M AES , B ERNARD D E BAETS Dept. of Applied Mathematics, Biometrics, and Process Control Ghent University 9000 Gent, Belgium E-mail: {❑♦❡♥✳▼❛❡s|❇❡r♥❛r❞✳❉❡❇❛❡ts}❅❯●❡♥t✳❜❡ Abstract The purpose of normal forms is to provide a standard representation or approximation of various kinds of functions. Boolean functions, for instance, have both a disjunctive and conjunctive normal form representation. Interpreting these normal forms in a suitable t-norm-based logic leads to some interval-valued fuzzification of the original Boolean function. We will deal with two mathematical questions: first, in which t-norm-based logic do we actually obtain intervals and second, if so, to what extent does the length of the intervals depend on the original Boolean function. 1 Introduction A Boolean expression is an expression involving variables each of which can take either the value true or false. These variables are combined using Boolean operations such as conjunction (∧), disjunction (∨) and negation (′ ). It is common knowledge that each Boolean function can be represented by a well-formed formula in Boolean propositional logic. Moreover, there are two special forms, the disjunctive and conjunctive normal form, which are of great interest, for each of these forms defines the Boolean function in a unique way. In many cases, crisp models are too ‘poor’ to represent the ‘human way of thinking’. Fuzzy sets provide a widely accepted solution to that end. Typical to fuzzy set theory is the large set of options (logical operations, shapes of membership functions, parameters) that are available to the user. A unique and definite definition of the intersection of two fuzzy sets, for instance, cannot be expected. However, fuzzifying the disjunctive and conjunctive normal form representation of a Boolean expression results in two standard fuzzifications of the original Boolean function. All attention so far has focused on the comparability of these fuzzified normal forms, in particular for binary Boolean functions [1, 3, 11, 12, 13, 14]. We contribute to the existing knowledge on this comparability. Because of their theoretical importance, special attention will be drawn to left-continuous t-norms. Before we start we fix some notations. Let φ be an [0, 1]-automorphism and N the standard negator, then the De Morgan triplets h(TM )φ , (SM )φ , Nφ i, h(TP )φ , (SP )φ , Nφ i, h(TL )φ , (SL )φ , Nφ i, h(TD )φ , (SD )φ , Nφ i and h(T nM )φ , (SnM )φ , Nφ i will be called respectively (M, φ)-, (P, φ)-, (L, φ)-, (D, φ)and (nM, φ)-triplets. In case φ is the identity mapping, we talk about the M-, P-, L-, D- and nM-triplet. 118 2 Fuzzified normal forms of n-ary Boolean functions Consider the Boolean algebra ({0, 1}, ∨, ∧,′ , 0, 1). The disjunctive and conjunctive normal forms of an n-ary Boolean function f are given by _ x1e1 ∧ ... ∧ xnen ^ x11 ∨ ... ∨ xnn , DB ( f )(x1 , ..., xn ) = f (e1 ,...,en )=1 and CB ( f )(x1 , ..., xn ) = f (e1 ,...,en )=0 e′ e′ (1) (2) if e = 0. One can fuzzify expressions (1) and (2) by replacing (∧, ∨,′ ) by a triplet (T, S, N), with N an involutive negation. The corresponding disjunctive and conjunctive fuzzified normal forms are denoted by DF and CF . For each n-ary Boolean function f we obtain two [0, 1]n −→ [0, 1] mappings DF ( f ) and CF ( f ): where xe = x if e = 1 and xe = x′ DF ( f )(x) = S{ f (e) T (xe ) | e ∈ {0, 1}n } , ) (  0 N N n (e ) | e ∈ {0, 1} , (1 − f (e)) S x CF ( f )(x) = T where x ∈ [0, 1]n , 0 = (0, ..., 0) and xe = (x1e1 , ..., xnen ). While DF ≤ CF 4 does not hold for all continuous De Morgan triplets [14, 10], we wonder whether DF ≤ CF is true for the basic continuous De Morgan triplets (M, φ), (P, φ), and (L, φ). Remark that, in case we work with the M-triplet, the inequality DF ≤ CF also follows from [3]. Theorem 1. [10] For any (M, φ)-, (P, φ)- and (L, φ)-triplet it holds that DF ( f ) ≤ CF ( f ), for all n-ary Boolean functions f . Because a full characterization of non-continuous t-norms, in particular left-continuous ones, is still lacking, we restrict ourselves in the non-continuous case to the basic triplets (D, φ) and (nM, φ). We obtain a similar result as for the three prototypical continuous triplets. Theorem 2. [10] For any (D, φ)-, (nM, φ)-triplet it holds that DF ( f ) ≤ CF ( f ), for all n-ary Boolean functions f . 3 Independence of the n-ary Boolean function: a system of functional equations Knowing that DF ≤ CF holds for a triplet (T, S, N), it remains an intriguing problem, from a mathematical point of view, to understand to what extent CF ( f ) − DF ( f ) depends on the n-ary Boolean function f . More specifically, we wonder for which triplets CF ( f )(x) − DF ( f )(x) is only a function of the variable x ∈ [0, 1]n (i.e. independent of the Boolean function f ). In [10], we have already encountered three solutions: the L-triplet, the nM-triplet and all (D, φ)-triplets. 4D F ≤ CF is a shorthand to express that DF ( f )(x) ≤ CF ( f )(x), for every x ∈ [0, 1]n 119 n As shown in the following lemma, although there are 22 different n-ary Boolean functions f , imposing that CF ( f )(x) − DF ( f )(x) must be independent of the Boolean function f , is equivalent to a system of 3 functional equations. Theorem 3. Consider a triplet (T, S, N), with N an involutive negation with fixpoint aN . Then CF ( f )(x) − DF ( f )(x) is independent of the Boolean function f if and only if for all x ∈ [0, aN ]n , x1 ≤ x2 ≤ ... ≤ xn , the following expressions are equal to each other N , xN ) , S(x1 , ..., xn−1 , xnN ) − T (x1N , ..., xn−1 n N ,x ), S(x1 , ..., xn−1 , xn ) − T (x1N , ..., xn−1 n (3) (4) T (S(x1 , ..., xn−1 , xnN ), S(x1 , ..., xn−1 , xn )) , (5) N , x ), T (xN , ..., xN , xN )) . 1 − S(T (x1N , ..., xn−1 n 1 n−1 n (6) When considering a De Morgan triplet hT, S, N i, this system of functional equations reduces to a single functional equation in two dimensions: Theorem 4. Consider a De Morgan triplet hT, S, N i. Then CF ( f )(x) − DF ( f )(x) is independent of the Boolean function f if and only if S(T (xN , y), T (xN , yN )) = T (xN , y) + T (xN , yN ) , for any (x, y) ∈ [0, 1/2]2 , x ≤ y. We have shown that the L-triplet is the only continuous De Morgan triplet for which the difference between both normal forms is independent of the n-ary Boolean function f . Theorem 5. Consider a triplet (T, S, N), with T a left-continuous t-norm, S a right-continuous tconorm and N an involutive negation with fixpoint aN . Suppose that T (x, aN ) and S(x, aN ) are continuous and that (T, S, N) is a De Morgan triplet or N = N . Then CF ( f )(x) − DF ( f )(x) is independent of the Boolean function f if and only if (T, S, N) is the L-triplet. Further, we characterize the De Morgan triplets hT, S, Ni, with T a left-continuous t-norm that fulfills some additional continuity conditions, for which CF ( f )(x) − DF ( f )(x) is only a function of the variable x ∈ [0, 1]n . We obtain a unique De Morgan triplet that is based on a t-norm Tλ , with λ ∈ [0, 1/2[, defined by  0        min(x, y) Tλ (x, y) = x + y − 1        1−λ , if x + y ≤ 1 , , if x + y > 1 ∧ min(x, y) ∈ ]λ, 1 − λ] , , if x + y > 1 ∧ (x + y ≥ 2 − λ ∨ min(x, y) ∈ [0, λ]) , , if x + y ≤ 2 − λ ∧ min(x, y) ∈ ]1 − λ, 1] . Every t-norm in this family can be obtained by applying the rotation construction of Jenei [4, 5, 6, 7] on a suitable ordinal sum [8]. The nilpotent minimum T nM [2] corresponds to λ = 0. 120 Theorem 6. Consider a De Morgan triplet hT, S, Ni based on a left-continuous t-norm T and an involutive negation N with fixpoint aN . Suppose that Ty (x) := T (x, y) is continuous on ]yN , 1] for any y ∈ [0, aN ] and is continuous on [y, 1] for any y ∈ ]aN , 1]. Suppose also that lim T (x, aN ) > 0 . > x→aN Then CF ( f )(x) − DF ( f )(x) is independent of the Boolean function f if and only if N = N and T = Tλ , for some λ ∈ [0, 1/2[. 4 Further research In future work, it would be worthwhile to try once again to get rid of the extra conditions (N = N , (T, S, N) is a De Morgan triplet, ...) in the characterization theorems. Moreover, the new insights in the treated system of functional equations force us to review the inequality DF ≤ CF more closely. It would be preferable to establish a necessary condition on (T, S, N) for DF ≤ CF to hold, when working with n-ary Boolean functions, and which covers all the known suitable triplets (T, S, N). Finally, we are challenged to lay bare all connections between interval-valued preference structures, based on fuzzified normal forms [1], and those based on a pair of generators [9]. References [1] T. Bilgiç, Interval-valued preference structures, European J. of Operational Research 105 (1998), 162–183. [2] J. Fodor, Contrapositive symmetry of fuzzy implications, Fuzzy Sets and Systems 69 (1995), 141–156. [3] M. Gehrke, C. Walker, and E. Walker, Normal forms and truth tables for fuzzy logics, Fuzzy Sets and Systems 138 (2003), 25–51. [4] S. Jenei, Structure of left-continuous triangular norms with strong induced negations. (I) Rotation construction, J. Appl. Non-Classical Logics 10 (2000), 83–92. [5] S. Jenei, Structure of left-continuous triangular norms with strong induced negations. (II) Rotation-annihilation construction, J. Appl. Non-Classical Logics 11 (2001), 351–366. [6] S. Jenei, Structure of left-continuous triangular norms with strong induced negations. (III) Construction and decomposition, Fuzzy Sets and Systems 128 (2002), 197–208. [7] S. Jenei, A characterization theorem on the rotation construction for triangular norms, Fuzzy Sets and Systems 136 (2003), 283–289. [8] E. Klement, R. Mesiar, and E. Pap, Triangular Norms, Trends in Logic, Vol. 8, Kluwer, Dordrecht, 2000. [9] K. Maes and B. De Baets, Extracting strict orders from fuzzy preference relations, Lecture Notes in Computer Science 2715 (2003), 261–268. 121 [10] K. Maes and B. De Baets, Facts and figures on fuzzified normal forms, 2003, submitted. [11] I. Türkşen, Interval-valued fuzzy sets based on normal forms, Fuzzy Sets and Systems 20 (1986), 191–210. [12] I. Türkşen, Fuzzy normal forms, Fuzzy Sets and Systems 69 (1995), 319–346. [13] C. Walker and E. Walker, Inequalities in De Morgan systems I, Proc. IEEE World Congress (Hawai), 2002, pp. 607–609. [14] C. Walker and E. Walker, Inequalities in De Morgan systems II, Proc. IEEE World Congress (Hawai), 2002, pp. 610–615. 122 k-intolerant capacities and Choquet integrals J EAN -L UC M ARICHAL Faculty of Law, Economics and Finance University of Luxembourg 1511 Luxembourg, G.D. Luxembourg E-mail: ♠❛r✐❝❤❛❧❅❝✉✳❧✉ Abstract We define an aggregation function to be (at most) k-intolerant if it is bounded from above by its kth lowest input value. Applying this definition to the discrete Choquet integral and its underlying capacity, we introduce the concept of k-intolerant capacities which, when varying k from 1 to n, cover all the possible capacities on n objects. Just as the concepts of k-additive capacities and p-symmetric capacities have been previously introduced essentially to overcome the problem of computational complexity of capacities, k-intolerant capacities are proposed here for the same purpose but also for dealing with intolerant or tolerant behaviors of aggregation. Keywords: multi-criteria analysis, interacting criteria; capacities; Choquet integral. 1 Introduction In a previous work [7] the author investigated the intolerant behavior of the discrete Choquet integral when used to aggregate interacting criteria. Roughly speaking, the Choquet integral Cv , or equivalently its associated capacity v, has an intolerant behavior if its output (aggregated) value is often close to the lowest of its input values. More precisely, consider the domain [0, 1]n of Cv as a probability space, with uniform distribution, and the mathematical expectation of Cv , which expresses the typical position of Cv within the unit interval. A low expectation then means that the Choquet integral is rather intolerant and behaves nearly like the minimum on average. Similarly, a high expectation means that the Choquet integral is rather tolerant and behaves nearly like the maximum on average. Note that such an analysis is meaningless when criteria are independent since, in that case, the Choquet integral boils down to a weighted arithmetic mean whose expectation is always one half (neither tolerant nor intolerant.) In this paper we pursue this idea by defining k-intolerant Choquet integrals 5 . The case k = 1 corresponds to the unique most intolerant Choquet integral, namely the minimum. The case k = 2 corresponds to the subclass of n-variable Choquet integrals that are bounded from above by their second lowest input values. Those Choquet integrals are more or less intolerant but not as much as the minimum. As an example, the following 3-variable Choquet integral 1 2 1 2 Cv (x1 , x2 , x3 ) = min(x1 , x2 ) + min(x1 , x3 ) 5 Equivalently, we define k-intolerant capacities since there is a one-to-one correspondence between n-variable Choquet integrals and capacities defined on n objects. 123 is clearly 2-intolerant, while being different from the minimum. More generally, denoting by x(1) , . . . , x(n) the order statistics resulting from reordering x1 , . . . , xn in the nondecreasing order, we say that an n-variable Choquet integral Cv , or equivalently its underlying capacity v, is at most k-intolerant if (x ∈ [0, 1]n ) Cv (x) ≤ x(k) (1) ∗ and it is exactly k-intolerant if, in addition, there is x∗ ∈ [0, 1]n such that Cv (x∗ ) > x(k−1) , with convention that x(0) := 0. Interestingly, condition (1) clearly implies that the output value of Cv is zero whenever at least k input values are zeros. We will see in Section 3 that the converse holds true as well. At first glance, defining k-intolerant aggregation functions may appear as a pure mathematical exercise without any real application behind. In fact, in many real-life decision problems, experts or decision-makers are or must be intolerant. This is often the case when, in a given selection problem, we search for most qualified candidates among a wide population of potential alternatives. It is then sensible to reject every candidate which fails at least k criteria. Example 1. Consider a (simplified) problem of selecting candidates applying for a university permanent position and suppose that the evaluation procedure is handled by appointed expert-consultants on the basis of the following academic selection criteria: 1. Scientific value of curriculum vitae, 2. Teaching effectiveness, 3. Ability to supervise staff and work in a team environment, 4. Ability to communicate easily in English, 5. Work experience in the industry, 6. Recommendations by faculty and other individuals. Assume also that one of the rules of the evaluation procedure states that the complete failure of any two of these criteria results in automatic rejection of the applicant. This quite reasonable rule forces the Choquet integral, when used for the aggregation procedure, to be 2-intolerant, thus restricting the class of possible Choquet integrals for such a selection problem. On the other hand, there are real-life situations where it is recommended to be tolerant, especially if the criteria are hard to meet simultaneously and if the potential alternatives are not numerous. To deal with such situations, we introduce k-tolerant aggregation functions and we will say that an nvariable Choquet integral Cv , or equivalently its underlying capacity v, is at most k-tolerant if Cv (x) ≥ x(n−k+1) (x ∈ [0, 1]n ). In that case, the output value of Cv is one whenever at least k input values are ones. Example 2. Consider a family who consults a Real Estate agent to buy a house. The parents propose the following house buying criteria: 124 1. Close to a school, 2. With parks for their children to play in, 3. With safe neighborhood for children to grow up in, 4. At least 100 meters from the closest major road, 5. At a fair distance from the nearest shopping mall, 6. Within reasonable distance of the airport. Feeling that it is likely unrealistic to satisfy all six criteria simultaneously, the parents are ready to accept a house that would fully succeed any five over the six criteria. If a 6-variable Choquet integral is used in this selection problem, it must be 5-tolerant. Considering k-intolerant and k-tolerant capacities can also be viewed as a way to make real applications easier to model from a computational viewpoint. Those “simplified” capacities indeed require less parameters than classical capacities (actually O(nk−1 ) parameters instead of O(2n ); see Section 3). Moreover, when varying k from 1 to n, we clearly recover all the possible capacities on n objects. Notice however that this idea of partitioning capacities into subclasses is not new. Grabisch [3] proposed the k-additive capacities, which gradually cover all the possible capacities starting from additive capacities (k = 1). Later, Miranda et al. [8] introduced the p-symmetric capacities, also covering the possible capacities but starting from symmetric capacities (p = 1). Note also that other approaches to overcome the exponential complexity of capacities have also been previously proposed in the literature: Sugeno λ-measures [10], ⊥-decomposable measures (see e.g. [5]), hierarchically decomposable measures [11], distorted probabilities (see e.g. [9]) to name a few. 2 Basic definitions Let F : [0, 1]n −→ [0, 1] be an aggregation function. By considering the cube [0, 1]n as a probability space with uniform distribution, we can compute the mathematical expectation of F, that is, E(F) := Z [0,1]n F(x) dx. (2) This value gives the average position of F within the interval [0, 1]. When F is internal (i.e., min ≤ F ≤ max) then it is convenient to rescale E(F) within the interval [E(min), E(max)]. This leads to the following normalized and mutually complementary values [1, 7]: E(max) − E(F) E(max) − E(min) E(F) − E(min) orness(F) := E(max) − E(min) andness(F) := (3) (4) Thus defined, the degree of andness (resp. orness) of F represents the degree or intensity (between 0 and 1) to which the average value of F is close to that of “min” (resp. “max”). In some sense, it also reflects the extent to which F behaves like the minimum (resp. the maximum) on average. 125 Define the kth order statistic function OSk : [0, 1]n −→ [0, 1] as (x ∈ [0, 1]n ), OSk (x) = x(k) where x(k) is the kth lowest coordinate of x. It can be proved [7] that E(OSk ) = k n+1 (k ∈ {1, . . . , n}) and hence the set {E(OSk ) | k = 1, . . . , n} partitions the unit interval [0, 1] into n + 1 equal-length subintervals. Now, as mentioned in the introduction, when a function F : [0, 1]n −→ [0, 1] is used to aggregate decision criteria, it is clear that the more E(F) is low, the more F has an intolerant behavior. This suggests the following definition: Definition 3. Let k ∈ {1, . . . , n}. An aggregation function F : [0, 1]n −→ [0, 1] is at most k-intolerant if F ≤ OSk . It is k-intolerant if, in addition, F  OSk−1 , where OS0 := 0 by convention. It follows immediately from this definition that, for any k-intolerant function F, we have E(F) ≤ E(OSk ) and, if F is internal, we have andness(F) ≥ andness(OSk ) and orness(F) ≤ orness(OSk ). Example 4. The product F(x) = ∏i xi , defined on [0, 1]n , is 1-intolerant and we have E(F) = 1/2n . By duality, we can also introduce k-tolerant functions as follows: Definition 5. Let k ∈ {1, . . . , n}. An aggregation function F : [0, 1]n −→ [0, 1] is at most k-tolerant if F ≥ OSn−k+1 . It is k-tolerant if, in addition, F  OSn−k+2 , where OSn+1 := 1 by convention. It is immediate to see that when a function F : [0, 1]n −→ [0, 1] is k-intolerant, its dual F ∗ : [0, 1]n −→ [0, 1], defined by F ∗ (x1 , . . . , xn ) := 1 − F(1 − x1 , . . . , 1 − xn ) (x ∈ [0, 1]n ) (5) is k-tolerant and vice versa. In the next section we investigate the particular case where F is the Choquet integral and we define the concepts of k-intolerant and k-tolerant capacities. 3 Case of Choquet integrals and capacities The use of the Choquet integral has been proposed by many authors as an adequate substitute to the weighted arithmetic mean to aggregate interacting criteria; see e.g. [2, 6]. In the weighted arithmetic mean model, each criterion is given a weight representing the importance of this criterion in the decision. In the Choquet integral model, where criteria can be dependent, a capacity is used to define a weight on each combination of criteria, thus making it possible to model the interaction existing among criteria. Let us first recall the formal definitions of these concepts. Throughout, we will use the notation N := {1, . . . , n} for the set of criteria. 126 Definition 6. A capacity on N is a set function v : 2N −→ [0, 1], that is nondecreasing with respect to set inclusion and such that v(∅) = 0 and v(N) = 1. Definition 7. Let v be a capacity on N. The Choquet integral of x : N −→ R with respect to v is defined by n Cv (x) := ∑ x(i) [v(A(i) ) − v(A(i+1) )], (6) i=1 where (·) indicates a permutation on N such that x(1) ≤ . . . ≤ x(n) . Furthermore A(i) := {(i), . . . , (n)} and A(n+1) := ∅. In this section we apply the ideas of k-intolerance and k-tolerance (cf. Definitions 3 and 5) to the Choquet integral. Since this integral is internal, it can be seen as a function from [0, 1]n to [0, 1]. Let us denote by FN the set of all capacities on N. The following proposition, inspired from [7, S4], gives equivalent conditions for a Choquet integral to be at most k-intolerant. Proposition 8. Let k ∈ {1, . . . , n} and v ∈ FN . Then the following assertions are equivalent: i) ii) iii) iv) v) Cv (x) ≤ x(k) ∀x ∈ [0, 1]n , v(T ) = 0 ∀T ⊆ N such that |T | ≤ n − k, Cv (x) = 0 ∀x ∈ [0, 1]n such that x(k) = 0, Cv (x) is independent of x(k+1) , . . . , x(n) , ∃λ ∈ [0, 1) such that ∀x ∈ [0, 1]n we have x(k) ≤ λ ⇒ Cv (x) ≤ λ, As we can see, some assertions of Proposition 8 are natural and can be interpreted easily. Some others are more surprising and show that the Choquet integral may have an unexpected behavior. First, assertion (ii) enables us to define k-intolerant capacities as follows: Definition 9. Let k ∈ {1, . . . , n}. A capacity v ∈ FN is k-intolerant if v(T ) = 0 for all T ⊆ N such that |T | ≤ n − k and there is T ∗ ⊆ N, with |T ∗ | = n − k + 1, such that v(T ∗ ) 6= 0. Assertion (iii) says that the output value of the Choquet integral is zero whenever at least k input values are zeros. This is actually a straightforward consequence of k-intolerance. Assertion (iv) is more surprising. It says that the output value of the Choquet integral does not take into account the values of x(k+1) , . . . , x(n) . Back to Example 1, only the two lowest scores are taken into account to provide a global evaluation, regardless of the other scores. Assertion (v) is also of interest. By imposing that Cv (x) ≤ λ whenever x(k) ≤ λ for a given threshold λ ∈ [0, 1), we necessarily force Cv to be at most k-intolerant. For instance, consider the problem of evaluating students with respect to different courses and suppose that it is decided that if the lowest k marks obtained by a student are less than 18/20 then his/her global mark must be less than 18/20. In this case, the Choquet integral utilized is at most k-intolerant. Proposition 8 can be easily rewritten for k-tolerance by considering the dual Cv∗ of the Choquet integral Cv as defined in Eq. (5). On this issue, Grabisch et al. [4, S4] showed that the dual Cv∗ of Cv is the Choquet integral Cv∗ defined from the dual capacity v∗ , which is constructed from v by v(T ) = 1 − v(N \ T ) (T ⊆ N). We then have Cv ≥ OSn−k+1 ⇔ 127 Cv∗ ≤ OSk . Proposition 10. Let k ∈ {1, . . . , n} and v ∈ FN . Then the following assertions are equivalent: i) ii) iii) iv) v) Cv (x) ≥ x(n−k+1) ∀x ∈ [0, 1]n , v(T ) = 1 ∀T ⊆ N such that |T | ≥ k, Cv (x) = 1 ∀x ∈ [0, 1]n such that x(n−k+1) = 1, Cv (x) is independent of x(1) , . . . , x(n−k) , ∃λ ∈ (0, 1] such that ∀x ∈ [0, 1]n we have x(n−k+1) ≥ λ ⇒ Cv (x) ≥ λ, Here again, some assertions are of interest. First, assertion (ii) enables us to define k-tolerant capacities as follows: Definition 11. Let k ∈ {1, . . . , n}. A capacity v ∈ FN is k-tolerant if v(T ) = 1 for all T ⊆ N such that |T | ≥ k and there is T ∗ ⊆ N, with |T ∗ | = k − 1, such that v(T ∗ ) 6= 1. Assertion (iii) says that the output value of the Choquet integral is one whenever at least k input values are ones. Assertion (iv) says that the output value of the Choquet integral does not take into account the values of x(1) , . . . , x(n−k) . As an application, consider students who are evaluated according to n homework assignments and assume that the evaluation procedure states that the two lowest homework scores of each student are dropped, which implies that each student can miss two homework assignments without affecting his/her final grade. If a n-variable Choquet integral is used to aggregate the homework scores, it should not take x(1) and x(2) into consideration and hence it is at most (n − 2)tolerant. 4 Conclusion In this paper, which can be considered as the sequel of [7], we have proposed the concepts of kintolerant and k-tolerant Choquet integrals and capacities. Besides the obvious computational advantage of these concepts (comparable to that of k-additive and p-symmetric capacities), they can be easily interpreted in practical decision problems where the decision makers must be intolerant or tolerant. In an extended version of this paper, we also introduce axiomatically intolerance and tolerance indices which measure the degree to which the Choquet integral is k-intolerant and k-tolerant. These indices, when varying k from 1 to n − 1, make it possible to identify and measure the intolerant or tolerant character of the decision maker. References [1] J. J. Dujmović. Weighted conjunctive and disjunctive means and their application in system evaluation. Univ. Beograd. Publ. Elektrotehn. Fak. Ser. Mat. Fiz., (461-497):147–158, 1974. [2] M. Grabisch. The application of fuzzy integrals in multicriteria decision making. European J. Oper. Res., 89(3):445–456, 1996. [3] M. Grabisch. k-order additive discrete fuzzy measures and their representation. Fuzzy Sets and Systems, 92(2):167–189, 1997. 128 [4] M. Grabisch, T. Murofushi, and M. Sugeno. Fuzzy measure of fuzzy events defined by fuzzy integrals. Fuzzy Sets and Systems, 50(3):293–313, 1992. [5] M. Grabisch, H. T. Nguyen, and E. A. Walker. Fundamentals of uncertainty calculi with applications to fuzzy inference, volume 30 of Theory and Decision Library. Series B: Mathematical and Statistical Methods. Kluwer Academic Publishers, Dordrecht, 1995. [6] J.-L. Marichal. An axiomatic approach of the discrete Choquet integral as a tool to aggregate interacting criteria. IEEE Trans. Fuzzy Syst., 8(6):800–807, 2000. [7] J.-L. Marichal. Tolerant or intolerant character of interacting criteria in aggregation by the Choquet integral. European J. Oper. Res., in press. [8] P. Miranda, M. Grabisch, and P. Gil. p-symmetric fuzzy measures. Internat. J. Uncertain. Fuzziness Knowledge-Based Systems, 10(Suppl. December 2002):105–123, 2002. [9] Y. Narukawa, V. Torra, and T. Gakuen. Fuzzy measure and probability distributions: distorted probabilities. IEEE Trans. Fuzzy Syst., submitted. [10] M. Sugeno. Theory of fuzzy integrals and its applications. PhD thesis, Tokyo Institute of Technology, Tokyo, 1974. [11] V. Torra. On hierarchically s-decomposable fuzzy measures. Internat. J. Intelligent Systems, 14(9):923–934, 1999. 129 Choquet measures, Shapley values, and inconsistent pairwise comparison matrices: an extension of Saaty’s A.H.P. R ICARDO A. M ARQUES P EREIRA , S ILVIA B ORTOT Dipartimento di Informatica e Studi Aziendali Università di Trento 38100 Trento, Italy E-mail: ♠♣❅❝s✳✉♥✐t♥✳✐t|s❜♦rt♦t❅❡❝♦♥♦♠✐❛✳✉♥✐t♥✳✐t The Analytic Hierarchy Process (AHP), developed by Thomas L. Saaty [6] [7] [8] [9], is a well-known multicriteria aggregation model. It is based on pairwise comparison matrices at two fundamental levels: the lower level encodes pairwise comparison matrices between alternatives (one such matrix for each criterion) and the higher level encodes a single pairwise comparison matrix between criteria. In its most general form, the higher level of the AHP can be structured hierarchically, with several layers of criteria, but in this paper we focus on the single layer case, with a single matrix of pairwise comparisons between criteria. Pairwise comparison matrices are typically inconsistent. However, the AHP extracts from each pairwise comparison matrix a vector of importance weights (also called priorities) given by the principal eigenvector or, alternatively, by the geometric mean vector. In both cases the priority vectors have positive components normalized to unit sum. In this paper we consider only the geometric mean method, because its structural properties are more suited for our study. Once the priority vectors are obtained, the AHP uses the priority vector at the higher level to aggregate (by means of a weighted average) the lower level priority vectors. In this paper we propose an extension of Saaty’s AHP based on Choquet measures. In our model, inconsistency is explicitly used in the aggregation process in order to attenuate the importance values of those criteria that (on average) are more inconsistent with the others. Accordingly, our model emphasizes the importance values of those criteria that (on average) are more consistent with the remaining ones. Consider a finite set of interacting criteria N = {1, 2, . . . , n}. A Choquet measure [2] on the set N is a set function µ : P (N) −→ [0, 1] satisfying / = 0, µ(N) = 1 (i) µ(0) (ii) S ⊆ T ⊆ N ⇒ µ(S) ≤ µ(T ). Given a Choquet measure µ we can define the Choquet integral [2] [3] [4] of a vector x = (x1 , . . . , xn ) ∈ [0, 1]n with respect to µ as n Cµ (x) = ∑ [µ(A(i) ) − µ(A(i+1) )] x(i) (1) i=1 where (·) indicates a permutation on N such that x(1) ≤ x(2) ≤ . . . ≤ x(n) . Also A(i) = {(i), . . . , (n)} and / A(n+1) = 0. 130 Notice that the Choquet integral with respect to an additive measure µ reduces to a weighted arithmetic mean, whose weights wi are given by the µ(i) values, µ(A(i) ) = µ((i)) + µ((i + 1)) + . . . + µ((n)) n n n i=1 i=1 i=1 Cµ (x) = ∑ [µ(A(i) ) − µ(A(i+1) )] x(i) = ∑ µ((i))x(i) = ∑ wi xi . (2) The importance index or Shapley value [5] [10] of criterion i ∈ N with respect to µ is defined as n (n − 1 − t)!t! [µ(T ∪ i) − µ(T )] , ∑ n! T ⊆N\i ∑ φµ (i) = 1 . φµ (i) = (3) i=1 It amounts to a weighted average of the marginal contribution of element i with respect to all coalitions T ⊆ N \ i and it can be interpreted as an effective importance weight. Consider now a positive reciprocal n × n matrix A = [ai j ], ai j > 0 a ji = 1/ai j i, j = 1, . . . , n (4) All pairwise comparison matrices in Saaty’s AHP are of this form. However, our model regards only the single pairwise comparison matrix between criteria at the higher level of the AHP. This is because that matrix is the one that controls the aggregation process: in Saaty’s AHP, the aggregation is performed through a weighted average whose weights are the components of the higher level priority vector. In general, the positive reciprocal matrix A above is inconsistent, where consistency means ai j = aik ak j for all i, j, k = 1, . . . , n. However, we can associate to the matrix A a consistent matrix à = [ãi j ] in the following way, ãi j = wi /w j wi = ui /Σnj=1 u j i, j = 1, . . . , n (5) where ui is the geometric mean of the elements of the row i, q ui = n Πnj=1 ai j i, j = 1, . . . , n (6) and the weights wi > 0 are normalized Σnj=1 wi = 1. The positive reciprocal matrix à is in fact consistent, since ãi j = wi /w j = (wi /wk )(wk /w j ) = ãik ãk j i, j, k = 1, . . . , n . (7) q q Moreover, ũi = n Πnj=1 ãi j = wi / n Πnj=1 w j and thus w̃i = ũi /Σnj=1 ũ j = wi , which means that the consistent matrix associated to à is again à itself. Given an element ai j of the matrix A we define the neighbourhood U(ai j ) as the set of the elements of the row i and the column j of A, U(ai j ) = {aik , al j | k, l = 1, . . . , n} . (8) We say that ai j is locally consistent if, on average, it is consistent with the elements in its neighbourhood, p i, j = 1, . . . , n . (9) ai j = ãi j = n Πnk=1 aik ak j We now define the scaling function f : (0, ∞) → (0, 1) as f (x) = 2/(x + x−1 ), for x > 0, whose graph is shown below. 131 1 0.8 0.6 0.4 0.2 2 4 6 8 Notice that the scaling function f has a single critical point at x = 1, where it reaches the maximum value f (1) = 1. Moreover, the scaling function f has the important property f (x) = f (x−1 ), for all x > 0. By means of the scaling function f , we can associate a positive symmetric n × n matrix V = [vi j ] to the matrix A = [ai j ] in the following way, vi j = f (ai j /ãi j ) i, j = 1, . . . , n (10) We have vi j ∈ (0, 1] vi j = v ji i, j = 1, . . . , n . (11) The fact that the n × n matrix V = [vi j ] is symmetric is due to the reciprocity of the positive matrix A plus the fact that f (x) = f (x−1 ), for x > 0, since v ji = f (a ji /ã ji ) = f (ãi j /ai j ) = f (ai j /ãi j ) = vi j i, j = 1, . . . , n . (12) Notice that vi j = 1 if and only if ai j = ãi j , otherwise 0 < vi j < 1: the more ai j /ãi j differs from 1 the more vi j gets closer to 0. Therefore we can consider the matrix V = [vi j ] as a measure of local consistency. Moreover, we note that our matrix V = [vi j ] can be regarded as a [0, 1]-scaled version of the so-called totally inconsistent matrix associated with the original pairwise comparison matrix A = [ai j ], see [1]. Given a general (typically inconsistent) positive reciprocal n × n matrix A = [ai j ], one can define a 2additive Choquet measure µ : 2N −→ [0, 1] in the following way: making use of the Möbius transform m of the measure µ, we define m(i) = wi /N for each singlet {i} and m(i j) = −wi (1 − vi j )w j /N for each doublet {i, j}, with null higher order terms. Then, we define the value of the 2-additive measure µ on a coalition S as the sum of the singlets and doublets contained in the coalition S, as given by the Möbius transform m, µ(S) = ∑ wi /N + ∑ (−wi (1 − vi j )w j )/N (13) {i}⊆S {i, j}⊆S where the normalization factor N is the sum of all singlets and doublets in the set N, N = ∑ {i}⊆N wi + ∑ −wi (1 − vi j )w j = 1 − {i, j}⊆N 1 n wi (1 − vi j )w j 2 i,∑ j=1 n n 1 1 1 = (1 + ∑ wi vi j w j ) = (1 + ∑ wi vi ) = (1 + v) 2 2 2 i, j=1 i=1 (14) where vi = ∑nj=1 vi j w j and v = ∑ni=1 wi vi denote weighted averages of local consistency values, with wi < vi ≤ 1 for i = 1, . . . , n and ∑ni=1 w2i < v ≤ 1. In particular, we have µ(i) = wi /N i, j = 1, . . . , n 132 µ(i j) = (wi + w j − wi (1 − vi j )w j )/N . (15) The graph interpretation of this definition, in which singlets correspond to nodes and doublets correspond to edges between nodes, is that the value of the 2-additive measure µ on a coalition S is the sum of the nodes and edges contained in the subgraph associated with the coalition S. / = 0 and µ(N) = 1, and is monotonic and subThe measure µ satisfies the boundary conditions µ(0) additive. The (strict) monotonicity of the measure is guaranteed by the fact that the positive value wi associated to each node of the graph dominates (in absolute value) the sum of the negative values −wi (1 − vi j )w j associated to the n − 1 edges connecting that node with the other nodes in the graph, n wi − ∑ wi (1 − vi j )w j = wi − wi (1 − vi ) = wi vi > w2i > 0 i = 1, . . . , n . (16) j=1 Notice that this model is an extension of Saaty’s AHP: if the matrix A is consistent then the Choquet measure µ is additive and the Choquet integral coincides with a weighted arithmetic mean whose weights are wi as in Saaty’s AHP. The Shapley values φi , i = 1, . . . , n associated with the measure µ defined above are given by φi = ϕi n Σ j=1 ϕ j i = 1, . . . , n (17) where the unnormalized values ϕi > 0, i = 1, . . . , n are given by ϕi = wi − 1 2 n 1 ∑ wi (1 − vi j )w j = 2 wi (1 + vi ) i = 1, . . . , n (18) j=1 which means that Σnj=1 ϕ j = 21 (1 + v) = N . In our multicriteria aggregation model the Shapley values encode the effective importance weights of the various criteria. When the matrix A is consistent, we have vi j = 1 for all i, j = 1, . . . , n and equation (18) implies that the Shapley values are φi = wi . In general, the fact that A is inconsistent changes the original distribution of weights, attenuating the importance values of those criteria that on average are more inconsistent with the others and emphasizing those criteria that on average are more consistent with the others. In fact, if we compute the second order Taylor expansion of the Shapley values φi = wi (1+vi )/(1+v), i = 1, . . . , n, around the consistency condition we get 1 1 φi ≈ wi (1 + (vi − v)(1 + (1 − v))) 2 2 i = 1, . . . , n (19) Notice that the second order approximation of the Shapley values is still normalized to unit sum, since ∑ni=1 wi (vi − v) = 0. Moreover, the Taylor expansion above shows clearly that, in the small inconsistency approximation, the Shapley value φi increases if vi > v and decreases if vi < v. In other words, the Shapley value increases (decreases) if the single consistency measure vi is greater (smaller) than the overall consistency measure v, in a compensatory mechanism typical of weighted averaging schemes. Finally, we note that the definition of the scaling function can easily be extended in order to accommodate a free parameter β ≥ 0. We define the parametrized scaling function f : (0, ∞) → (0, 1) as fβ (x) = 2/(xβ + x−β ), for x > 0. Clearly, fβ=0 = 1. The graphs of the scaling function fβ for β = 2, 4 and β = 12 , 14 are shown below. 133 beta=2 beta=4 1 0.8 0.6 0.4 0.2 1 0.8 0.6 0.4 0.2 2 4 6 8 2 beta=0.5 4 6 8 beta=0.25 1 0.8 0.6 0.4 0.2 1 0.8 0.6 0.4 0.2 2 4 6 8 2 4 6 8 As before, the scaling function fβ has a single critical point at x = 1, where it reaches the maximum value fβ (1) = 1. Moreover, the scaling function fβ has the important property fβ (x) = fβ (x−1 ), for all x > 0. The scaling function fβ has two different asymptotic behaviours close to the origin in relation with the parameter ranges 0 < β < 1 (vertical asymptote at the origin) and β > 1 (horizontal asymptote at the origin), as can be easily derived from the expressions below, fβ (x) = 2xβ 1 + x2β fβ′ (x) = 2βxβ−1 (1 − x2β ) (1 + x2β )2 x>0. (20) Moreover, it is straightforward to show that the consistency measure provided by the scaling function becomes stricter for increasing values of β. In other words, as β increases, all the local consistency measures vi j (β) decrease, with the exception of those associated with exact consistency vi j = 1. Accordingly, the inconsistency effects in the context of our model can be attenuated or emphasized, relatively to the original case β = 1, by means of appropriate choices of the parameter β: higher values of the parameter lead to stronger inconsistency effects. References [1] J. Barzilai, Consistency measures for pairwise comparison matrices, Journal of Multi-Criteria Decision Analysis 7 (3) (1998) 123-132. [2] G. Choquet, Theory of capacities, Annales de l’Institut Fourier 5 (1953) 131-295. [3] M. Grabisch, Fuzzy integral in multicriteria decision making, Fuzzy Sets and Systems 69 (1995) 279-298. [4] M. Grabisch, The application of fuzzy integrals in multicriteria decision making, European Journal of Operational Research 89 (1996) 445-456. [5] M. Grabisch and M. Roubens, An axiomatic approach to the concept of interaction among players in cooperative games, Int. J. of Game Theory 28 (1999) 547-565. 134 [6] T.L. Saaty, A Scaling Method for Priorities in Hierarchical Structures, Journal of Mathematical Psychology 15 (1977) 234-281. [7] T.L. Saaty, Axiomatic foundation of the analytic hierarchy process, Management Science 32 (7) (1986) 841-855. [8] T.L. Saaty, Multicriteria Decision Making: The Analytic Hierarchy Process, RWS Publications, Pittsburgh PA, 1988. Original version published by McGraw-Hill, 1980. [9] T.L. Saaty and L.G. Vargas, Prediction, Projection and Forecasting, Kluwer Academic Publishers, Norwell MA, 1991. [10] L.S.. Shapley, A value for n-person games, in: H.W. Kuhn and A.W. Tucker (eds.) Contributions to the Theory of Games, vol. II, Annals of Mathematics Studies, Princeton University Press NJ (1953) 307-317. 135 Construction of compositional modifiers generated by n-ary functions J ORMA K. M ATTILA Laboratory of Applied Mathematics Lappeenranta University of Technology 53851 Lappeenranta, Finland E-mail: ❏♦r♠❛✳▼❛tt✐❧❛❅❧✉t✳❢✐ 1 Introduction We consider an idea, how to generate modifiers by n-placed functions defined on [0, 1]n . The subject matter of modifiers are fuzzy sets, i.e. membership functions defined on interval I = [0, 1]. We give the definition of modifiers and the case, how n-placed generator functions fit together with this definition. We consider some few properties of modifiers. Some examples of generator functions and modifiers generated by them are given. The examples illustrate how graded modifier systems can be created. The place number n of a generator function can take effect to the strength of a modifier. It is also possible to keep the place number n constant and use numbers 1 or 0 in some places of the variables of the function. The concept of ’modifier’ appears in many ways in the scope of fuzzy logic. For example, Prof. L. A. Zadeh used this term already in the early theory of fuzzy logic. The author has studied modifiers and their logics from modal logical point of view and created some logical systems for modifiers basing on relational Kripke structures of graded modalities (see e.g. Mattila [9]). Kortelainen’s [3] concept modified sets is one example about the use of this term. In the linguistic view, a modifier can be an adjective, or an adverb, or a phase or clause acting as an adjective or adverb. In every case, the basic principle is the same: the modifier adds information to another element in the sentence (Frances Peck, ’Terms of use’, University of Ottawa). Also some fuzzy logic blocs altering the behavior of PID controllers are called modifiers, too. The author has considered modifiers and modifier logics in several situations (see e.g. J. K. Mattila [6, 7, 8]). Some considerations about modifiers generated by t-norms and t-conorms are done in [8]. After this work Dr. József Dombi suggested the author to study modifiers generated by n-placed functions in the way to use some t-norms and t-conorms generalized for several variables. Some results from these studies are [10] and [11]. We refer to Kortelainen’s concept modified sets. His operators are set functions modifying at first hand ordinary sets. We concentrate here upon modifiers generated by n-placed functions, n = 2, 3, . . . . Entities M considered here are so-called compositional modifiers because the result of modifying a fuzzy set µ by a modifier M is the composition of M and µ, M ◦ µ. The aim is to consider modifiers as operators for modifying fuzzy sets. One important example is to use especially t-norms and t-conorms and their generalizations for more than two-placed cases as basic tools. (This case is considered in [10].) 136 2 Basic Concepts We choose the range of fuzzy sets (i.e. membership functions) to be the unit interval I = [0, 1], as usually. Thus the set of all fuzzy sets of a non-empty set X is the set I X (including the usual power-set 2X (i.e. the set of all characteristic functions of the usual subsets of X) as a special case). It is also a well-known fact that I and I X are partially ordered sets. In fact, they are also completely distributed complete lattices and Brouwerian lattices (see e.g. Lowen [5]). These modifiers we consider here are compositional, because when we apply a modifier to a fuzzy set we form a composition of two functions. Definition 1. (Modifier). We say that a mapping M : I X −→ I X is (i) a substantiating modifier if for any fuzzy set µ ∈ I X , ∀x ∈ X, M(µ(x)) ≤ µ(x), (1) (ii) a weakening modifier if for any µ ∈ I X , ∀x ∈ X, µ(x) ≤ M(µ(x)), (2) (iii) an identity modifier if for any µ ∈ I X , ∀x ∈ X, M(µ(x)) = µ(x). (3) Identity modifiers are identity mappings on I X . They are sometimes needed as links between substantiating and weakening modifiers in some logical structures of modifiers. A given modifier we can associate with the dual modifier according to the following Definition 2. (Dual Modifier). Let M and M ∗ be modifiers. We say that M ∗ is the dual modifier associated with M, if for any fuzzy set µ ∈ I X , ∀x ∈ X, M ∗ (µ(x)) = n(M(n(µ(x)))), (4) where n is a strong negation. Proposition 3. If M is a substantiating modifier then its dual M ∗ is a weakening modifier and vice versa. Proof. (See also [10]) Suppose µ ∈ I X , and M is a substantiating modifier. Thus ∀x ∈ X, M(µ(x)) ≤ µ(x). We have to show that ∀x ∈ X, µ(x) = M ∗ (µ(x)). Let n be a strong negation function. Thus ∀x ∈ X, M ∗ ((x)) = n(M(n(µ(x)))). Clearly M(n(µ(x))) ≤ n(µ(x)) by Def.1. From this it follows by the properties of membership functions that ∀x ∈ X, n(M(n(µ(x)))) ≥ n(n(µ(x))) = µ(x), i.e. M ∗ (µ(x)) ≥ µ(x). Conversely, the result follows in the similar way.  137 (5) The condition ∀x ∈ X, M ∗ (µ(x)) = n(M(n(µ(x)))) (6) in the previous proof says that the operators M, M ∗ , and n satisfy DeMorganńs law. Thus dual pairs of modifiers with strong negation form classes called DeMorgan triples of operators ([1]). Originally, DeMorgan triples used to consist of a t-norm, corresponding t-conorm, and negation. We denote α-level set of a fuzzy set µ, as usually, µα = {x ∈ X | µ(x) ≥ α, α ∈ I} Thus the α-level set of M(µ) is (M ◦ µ)α = {x ∈ X | M(µ(x)) ≥ α, α ∈ I}. (7) It is easy to see that modifiers have following properties. Suppose M is a substantiating modifier. Then we have M(0X ) = 0X , ∗ M (1X ) = 1X , ∗ ∗ (M ) (µ(x)) = M(µ(x)), (8) (9) (10) where 0X and 1X are the constant functions 0X (x) = 0 and 1X (x) = 1 for all x ∈ X. 3 The idea of generating modifiers using n-ary functions The simplest idea using n-ary functions for generating modifiers for fuzzy sets is to replace every variable with the membership function of a fuzzy set to be modified. To illustrate the idea, we proceed in the following way. We put the same argument x in every place in the n-tuple of arguments in the function f . Thus we have the generating formulas for substantiating, weakening and identity modifiers. A substantiating modifier is generated by any function f , such that ∀ x ∈ I, f (x, x, . . . , x) ≤ x. (11) A weakening modifier is generated by any function f , such that ∀ x ∈ I, f (x, x, . . . , x) ≥ x. (12) An identity operator is generated by any function f , such that ∀ x ∈ I, f (x, x, . . . , x) = x. (13) According to the formulas (11), (12), and (13), we prove some results concerning modifiers generated by those n-ary functions. For this task, suppose that a modifier M is generated by a function f (x1 , x2 , . . . , xn ), xi ∈ I (i = 1, . . . , n), such that M(µ) = M ◦ µ = f (µ, µ, . . . , µ), where µ is any fuzzy set. The function f is (at least piecewise) continuous on the interval I. 138 (14) Proposition 4. Let f : I n −→ I be an n-ary function, then f generates a substantiating modifier F(µ(x)) = (F ◦ µ)(x) = f (µ(x), µ(x), . . . , µ(x)) (15) if for all t1 ,t2 , . . . ,tn ∈ [0, 1] the condition f (t1 ,t2 , . . . ,tn ) ≤ min(t1 ,t2 , . . . ,tn ) (16) holds. Proof. Suppose the formula (16) holds and denote min(t1 ,t2 , . . . ,tn ) = tmin . Especially, if ti = a for all ti ∈ I then tmin = a, and thus f (a, . . . , a) ≤ a for any a ∈ I by (16). Let µ be any fuzzy set and x0 ∈ X arbitrarily chosen. Thus f (µ(x0 ), µ(x0 ), . . . , µ(x0 )) ≤ µ(x0 ). Because x0 is arbitrarily chosen from X, the same holds for other x’s, too. Thus we have f (µ(x), µ(x), . . . , µ(x)) = F(µ(x)) ≤ µ(x) for any x ∈ X. Thus the formula (15) holds, and f generates a substantiating modifier F by means of Def.1.  Proposition 5. Let f : I n −→ I be an n-ary function, then f generates a weakening modifier H(µ(x)) = (H ◦ µ)(x) = f (µ(x), µ(x), . . . , µ(x)) (17) if for all t1 ,t2 , . . . ,tn ∈ [0, 1] the condition f (t1 ,t2 , . . . ,tn ) ≥ max(t1 ,t2 , . . . ,tn ) (18) holds. Proof. Suppose the formula (18) holds. From this it follows that for all a ∈ I, a by (14). Let µ be any fuzzy set, and x0 ∈ X is arbitrarily chosen. Thus H(a) = f (a, . . . , a) ≥ H(µ(x0 )) = f (µ(x0 ), . . . , µ(x0 )) ≥ µ(x0 ). Because x0 is an arbitray element of X, the formula ∀ x ∈ X, H(µ(x), . . . , µ(x)) ≥ µ(x) holds. Thus the formula (17) holds, and f generates a weakening modifier.  Proposition 6. Let f : I n −→ I be an n-ary function, then f generates an identity modifier F0 (µ(x)) = (F0 ◦ µ) = f (µ(x), µ(x), . . . , µ(x)) (19) if for all t1 ,t2 , . . . ,tn ∈ [0, 1] the condition min(t1 ,t2 , . . . ,tn ) ≤ f (t1 ,t2 , . . . ,tn ) ≤ max(t1 ,t2 , . . . ,tn ) holds. 139 (20) Proof. Suppose the formula (20) holds. From this it follows that for all a ∈ I, min(a, . . . , a) ≤ f (a, . . . , a) ≤ max(a, . . . , a). This is equivalent to a ≤ f (a, . . . , a) ≤ a which is equivalent to f (a, . . . , a) = a. Let µ be any fuzzy set and x0 ∈ X is arbitrarily chosen. Thus we have F0 (µ(x0 )) = f (µ(x0 ), . . . , µ(x0 )) = µ(x0 ). Because x0 is arbitrarily chosen from X, this means that the formula ∀ x ∈ X, F0 (µ(x)) f (µ(x), . . . , µ(x)) = µ(x). Thus the formula (19) holds, and f generates an identity modifier.  We see that the Definition1 and the Propositions 4, 5 and 6 correspond to each others. According to the Propositions 4, 5, and 6, we can use the formulas (16), (18), and (20) as the conditions for n-ary functions generating modifiers. We can have the inverse results of the Propositions 4, 5, and 6. For this we need the following lemma. Lemma 7. Let f : I n −→ I be a (at least piecewise) continuous n-ary function. (a) If f generates a substantiating modifier then this implies the formula (16). (b) If f generates a weakening modifier then this implies the formula (18). (c) If f generates an identity modifier then this implies the formula (20). Proof. (a) Let us give the counter-hypothesis: f (t1 , . . . ,tn ) > min(t1 , . . . ,tn ). From this it follows that f generates either an identity modifier by Proposition 6 or a weakening modifier by Proposition 5. This contradicts the supposition that f generates a substantiating modifier. Thus the counterhypothesis is not correct. The cases (b) and (c) can be proved in similar ways. . After collecting the results from Propositions 4, 5, 6, and Lemma 7 we have proved the following Theorem 8. Let f : I n −→ I be (at least piecewise) continuous n-ary function. f generates a modifier F ◦ µ which is (a) substantiating iff f (t1 , . . . ,tn ) ≤ min(t1 , . . . ,tn ), (b) weakening iff f (t1 , . . . ,tn ) ≥ max(t1 , . . . ,tn ), (c) an identity modifier iff min(t1 , . . . ,tn ) ≤ f (t1 , . . . ,tn ) ≤ max(t1 , . . . ,tn ), where the compositions are calculated by means of (14. Using Theorem 8 we can prove the following Theorem 9. Let f : I n −→ I be a function generating a substantiating modifier F. Then the function fco : I n −→ I : fco (x1 , . . . , xn ) = 1 − f (1 − x1 , . . . , 1 − xn ) generates a weakening modifier being the dual of F. 140 Proof. It follows from the supposition, that f generates a substantiating modifier, that f (x1 , . . . , xn ) ≤ min(x1 , . . . , xn ), and ∀ x ∈ X, F(µ(x) = f (µ(x), . . . , µ(x)) ≤ µ(x) by Theorem 8. This is equivalent to 1 − F(µ(x)) ≥ 1 − µ(x). Replace µ(x) by 1 − µ(x), then we have 1 − F(1 − µ(x)) ≥ 1 − (1 − µ(x)). On the other hand, 1 − F(1 − µ(x)) = 1 − f (1 − µ(x), . . . , 1 − µ(x)). Thus 1 − f (1 − µ(x), . . . , 1 − µ(x)) ≥ 1 − (1 − µ(x)). Thus the conclusion is that the function fco (x1 , . . . , xn ) = 1 − f (1 − x1 , . . . , 1 − xn ) generates a weakening modifier by Theorem 8. Clearly this modifier is the dual of F.  Example 10. The formula n f (x1 , x2 , . . . , xn ) = ∏ xi , i=1 ∀i, xi ∈ [0, 1], (21) generates a substantiating modifier Fn−1 (µ(x)) = (µ(x))n , ∀x ∈ X, (22) because it clearly satisfies the condition (16), i.e. f (x1 , x2 , . . . , xn ) ≤ min(x1 , x2 , . . . , xn ). The bigger n is the more substantiating modifier we have. Thus we can have a graded system of modifiers. Especially, if n = 1, we have the identity modifier F0 = µ, that have no substantiating effect. Example 11. The formula n f (x1 , x2 , . . . , xn ) = 1 − ∏(1 − xi ), i=1 ∀i, xi ∈ [0, 1], (23) generates a weakening modifier Hn−1 (µ(x)) = 1 − (1 − µ(x))n , ∀x ∈ X (24) because it clearly satisfies the condition (18). To see this, let a delivery of values from the interval [0, 1] be such that xk , 1 ≤ k ≤ n, has the greatest value. In this situation we can write max(x1 , x2 , . . . , xn ) = xk . Thus we have 1 − xk ≥ 1 − xi , 1 ≤ i ≤ n, and this implies n (1 − xk )n ≥ ∏(1 − xi ) i=1 which implies n 1 − ∏(1 − xi ≥ 1 − (1 − xk )n . i=1 From this it clearly follows that 1 − (1 − xk )n ≥ 1 − (1 − xk ) = xk = max(x1 , x2 , . . . , xn ) by the suppoaition of the delivery of values. The special case n = 1 gives the idetity modifier H0 (µ(x)) = µ(x)∀x ∈ X, as it should be. 141 Example 12. In addition to the special cases of previous examples, consider some generators for identity modifier. The formula 1 f (x1 , x2 , . . . , xn ) = (x1 + x2 + . . . + xn ), n (25) generates identity modifier, because (18) holds clearly. Another way for generating identity modifier is to use the function n f (x1 , x2 , . . . , xn ) = ∑ λi xi , (26) i=1 where ∑ni=1 λi = 1. It is easy to show that this function satisfies the condition (18). Also max(x1 , x2 , . . . , xn ) and min(x1 , x2 , . . . , xn ) generate identity modifiers, because the operators max and min do not have any modifying effect. According to Def.2, the dual of a modifier F is defined by the condition F ∗ (x) = n(F(n(x))) (27) where n is a strong negation function. This also means that if F is substantiating then F ∗ is weakening, and if H is weakening then H ∗ is substantiating, by Proposition 3. Example 13. The modifiers given in Examples 10 and 11 are duals of each others when ∀x ∈ X, n(µ(x)) = 1 − µ(x). The modifiers (22) and (24) are basing on extensions of the t-norm algebraic product and the t-conorm algebraic sum, respectively. 4 Some Concluding Remarks One purpose for studying modifiers is to create some concrete tools for manipulating fuzzy numbers so that we can have arithmetic operations to be easily used. However, these operations should be in accordance with the original definition where extension principle is used. Also the study of logical systems of modifiers is very interesting. From this study we can draw connections to topological properties of fuzzy systems (see e.g. Kortelainen’s paper [3] and his other papers, too). According to the substance itself, n-ary functions being extensions of some Archimedean t-norms and t-conorms are very interesting for generators of modifiers, as we already had a short view in the form of Examples 10 – 13 above. It is well known that Archimedean t-norms and corresponding t-conorms have modifying effects (see e.g. Mattila [8]). References [1] J. Dombi, A general class of fuzzy operators, the DeMorgan class of fuzzy operators and fuzziness measures induced by fuzzy operators, Fuzzy Sets and Systems,8, 1982 [2] J. Kortelainen, On algebraic approach to modifiers in fuzzy sets, in: Lowen, Roubens (eds.) Computer, Management & Systems Science, Proceedings of IFSA 91, Brussels, Belgium 1991 142 [3] J. Kortelainen, On relationship between modified sets, topological spaces and rough sets, Fuzzy Sets and Systems 61, 91 - 95, North-Holland, 1994 [4] G. Lakoff, Hedges: A study in meaning criteria and the logic of fuzzy concepts, The Journal of Philosophical Logic, 2, 1973 [5] R. Lowen, Fuzzy Set Theory. Basic Concepts, Techniques and Bibliography, Kluwer Academic Publishers, 1996 [6] J. K. Mattila, Modeling fuzziness by Kripke structures, in: T. Terano, M. Sugeno, M. Mukaidono, K. Shigemasu (eds.), Fuzzy Engineering toward Human Friendly Systems, Vol. 2, Proc. of IFES ’91, Nov. 13 - 15, 1991, Yokohama, Japan [7] J. K. Mattila, On modifier logic, in: L. A. Zadeh, J. Kacprzyk (eds.), Fuzzy Logic for Management of Uncertainty, John Wiley & Sons, Inc., New York, 1992 [8] J. K. Mattila, Reasoning with graded chains of t-norms and t-conorms, in: Proceedings of the Conference 3rd International Conference on Fuzzy Logic, Neural Nets and Soft Computing (IIZUKA ’94), August 1-7, 1994, Fukuoka, Japan [9] J. K. Mattila, Modifier Logics Based on Graded Modalities, Journal of Advanced Computational Intelligence and Intelligent Informatics, Vol. 7 No. 2, 2003 [10] J. K. Mattila, Modifiers Based on Some t-norms in Fuzzy Logic, Soft Computing, to appear [11] J. K. Mattila, On Logic of Some t-norms Based Modifiers, in: Proceedings of the 10th IFSA World Congress, June 29 - July 2, 2003, Istanbul, TURKEY [12] J. K. Mattila, On modifiers based on n-placed functions, in: Proceedings of Third Conference of European Society for Fuzzy Logic and Technology, September 10 - 12, 2003, Zittau, Germany, p. 235 - 238. 143 Ordinal sorting in the presence of interacting points of view: TOMASO PATRICK M EYER1 , M ARC ROUBENS2 1 Complex Enterprise Systems Institute Faculty of Law, Economics and Finance University of Luxembourg 1511 Luxembourg, G.D. Luxembourg E-Mail: ♣❛tr✐❝❦✳♠❡②❡r❅✐♥t❡r♥❡t✳❧✉ 2 MATHRO Faculté Polytechnique of Mons 7000 Mons, Belgium E-Mail: ♠✳r♦✉❜❡♥s❅✉❧❣✳❛❝✳❜❡ 1 Introduction This paper presents an ordered sorting procedure based on the Choquet integral as a discriminant function. It uses information provided by the Decision Maker (DM) in terms of a set of prototypes (alternatives well-known to the DM). The capacities of the Choquet integral are assessed through the solving of a linear program or a quadratic program. An interpretation of the results is provided by means of importance and interaction indexes of the points of view. We analyze a sorting procedure for ordinal data in a very general case, where the points of view can have interactions. Its name, T OMASO stands for Tool for Ordinal MultiAttribute Sorting and Ordering. The first version of this method has been described in [7] and [9]. Later, in [6] the authors present further evolutions to the first ideas, and describe a software which is directly inspired from the sorting procedure. Three important features differentiate this procedure from other multiple criteria sorting methods. First of all, the possibility to treat purely ordinal data. Secondly, the use of a Choquet integral [1] as a discriminant function. And finally, the way the capacities ("weights") of the aggregator are learnt from a reference set of alternatives called prototypes. These three key features allow to treat a quite large set of problems. In particular, the learning feature of the method is interesting as it allows to ask the Decision Maker (DM) a minimal set of technical details. In order to allow a more effective and objective analysis of the problem, we think that it is useful to have a permanent interaction with the DM. But this questioning should mainly be restricted to his expertise domain and not to technical parameters of the method. The use of the prototypes fits to this philosophy. The method works in two steps. First of all, the ordinal data is transformed into partial net scores, where each alternative is compared to all the other ones for each point of view. Then, the Choquet integral is used to aggregate these partial net scores. As already mentioned earlier, the capacities of the aggregator are learnt from the reference set of prototypes. Here, two options appear: either the prototypes don’t violate the axioms ([11]) for the use of a Choquet integral as a discriminant function, or the structure of the prototypes does not allow its use as an aggregator. In the first case, 144 the capacities are learnt by solving a linear constraints satisfaction problem. This procedure is briefly recalled in section 3.1. In the second case, the capacities are learnt by trying to be as close as possible to the original sorting imposed by the prototypes. This part is described in section 3.2. This paper is organized as follows. First of all, general concepts are introduced in section 2. Then, in section 3.1 we recall the first ideas of T OMASO already published in [6]. In section 3.2 we present how to work in case the classical way fails. Finally, in 4 we draw some conclusions, and discuss further improvements. 2 Preliminary considerations Let A be a set of q potential alternatives which are to be assigned to disjoint ordered classes. Let F = {g1 , . . . , gn } be a set of points of view. For each index of point of view j ∈ J = {1, . . . , n}, the alternatives are evaluated according to a s j -point ordinal performance scale represented by a totally ordered set j X j := {g1 ≺ j . . . ≺ j gsj j }. Therefore, an alternative x ∈ A can be identified with its corresponding profile n (x1 , . . . , xn ) ∈ ∏ X j =: X, j=1 where for any j ∈ J , x j is the partial evaluation of x on point of view j. m . Let us consider a partition of X := Πnj=1 X j into m nonempty increasingly ordered classes {Clt }t=1 This means that for any r, s ∈ {1, . . . , m}, with r > s, the elements of Clr are considered as better than the elements of Cls . The sorting problem we are dealing with consists in partitioning assigning the m . alternatives of A to the classes {Clt }t=1 In Roubens [9] it is justified how an n-place Choquet integral as a discriminant function and normalised scores as criteria function can be used to solve this problem. Hereafter we present the sorting procedure derived from this particular case. 3 The T OMASO method The T OMASO method (Technique for Ordinal Multiattribute Sorting and Ordering) is mainly based on two techniques (which can lead to the same results under certain conditions). The original method has first been described in [9]. In the following Subsection, we present its basics. In Subsection 3.2 we show how it is possible to deal with a larger set of problems. 3.1 The classical way The different stages of the original T OMASO are listed below: 1. Modification of the criteria evaluations into normalised scores; 2. Use of a Choquet integral as a discriminant function; 145 3. Assessment of fuzzy measures by questionning the satisfaction problem; DM and by solving a linear constraint 4. Calculation of the borders of the classes and assignment of the alternatives to the classes; 5. Analysis of the results (interaction, importance, leave one out, visualisation). In this Section we roughly present these different elements. First of all, concerning the scales on the points of view, two natural approaches can be considered: either the score of each alternative is built on the basis of all the alternatives in A or this score is constructed in a context-free manner, that is, independently of the other alternatives. The decision maker must be aware that the final results may significantly differ according to the considered approach. Therefore, a prior analysis of the problem is recommended to choose the scores appropriately. In the first approach, one possible way to build the scores is to consider comparisons of the alternatives on each of the points of view. We consider S j (x), the jth partial net score of alternative x ∈ A along point of view j ∈ J , as the number of times that x is preferred to any other alternative of A minus the number of times that any other alternative of A is preferred to x for point of view j. We furthermore normalize these scores so that they range in the unit interval, i.e., SNj (x) := S j (x) + (q − 1) ∈ [0, 1] 2(q − 1) (j ∈ J, where q = |A|. Clearly, this normalized score is not a utility, and should not be considered as such. Indeed, observing an extreme value (close to 0 or 1) means that x is rather “atypical” compared to the other alternatives along point of view j. Thus, the resulting evaluations strongly depend on the alternatives which have been chosen to build A. Consider now the second approach, that is, where the score of each alternative does not depend on the other alternatives in A. In this case, we suggest the decision maker provides the score functions as utility functions. Alternatively, we can approximate these utility functions by the following linear formula: ord j (x) − 1 ∈ [0, 1] ( j ∈ J ), SNj (x) := sj −1 j where ord j : A → {1, . . . , s j } is a mapping defined by ord j (x) = r if and only if x j = gr . In this latter case, SNj does not necessarily represent a real utility and probably does not correspond to the utility the decision maker has in mind. We therefore continue to call it a score. We now come to the crucial part of the aggregation of the normalised partial net scores of a given alternative x by means of a Choquet integral [1]. The advantage of this aggregator is mainly that it allows to deal with interacting (depending) points of view. According to the general definition of the Choquet integral, we have: Cv (SN (x)) := n ∑ S(Nj) (x)[v(A( j) ) − v(A( j+1) )] j=1 / = 0 and where v is a fuzzy measure on J ; that is a monotone set function v : 2J → [0, 1] fulfilling v(0) v(J ) = 1. The parentheses used for indexes stand for a permutation on J such that N N S(1) (x) ≤ . . . ≤ S(n) (x), 146 and for any j ∈ J , A( j) represents the subset {( j), . . . , (n)}. The characterisation of the Choquet integral by Marichal ( [4], [5]) clearly justifies the way the partial scores are aggregated. The next step of this method is to assess the fuzzy measures in order to classify the alternatives of A. One can easily understand that it is impossible to ask the DM to give values for the 2n − 2 free parameters of the fuzzy measure v. Practically, the assessment of the fuzzy measures is done by asking the DM to provide a set of prototypes P ⊆ A and their assignments to the given classes; that is m where P := P ∩ Cl for t ∈ {1, . . . , m}. The values of a partition of P into prototypic classes {Pt }t=1 t t the fuzzy measure are then derived from this information as described hereafter. We would like the Choquet integral to strictly separate the classes Clt . Therefore, the following necessary condition is imposed Cv (SN (x)) − Cv (SN (x′ )) ≥ ε (1) for each ordered pair (x, x′ ) ∈ Pt × Pt−1 and each t ∈ {2, . . . , m}, where ε is a given strictly positive thershold. Due to the increasing monotonicity of the Choquet integral, the number of separation constraints 1 can be reduced significantly. Thus, it is enough to consider border elements of the classes. To formalise this concept, we first define a dominance relation D (partial order) on X by xDy iff x j  j y j , for all j ∈ J . As upper border of the prototypic class Pt we use the set of non-dominated alternatives of Pt defined by NDt := {x ∈ Pt s.t. 6 ∃x′ ∈ Pt \ {x} : x′ Dx}. Similarly, the lower border of the prototypic class is given by the set of non-dominating alternatives of Pt which is defined by Ndt := {x ∈ Pt s.t. 6 ∃x′ ∈ Pt \ {x} : xDx′ }. The separation conditions restricted to the prototypes of the subsets NDt ∪ Ndt , t ∈ {1, . . . , m} put together with the monotonicity constraints on the fuzzy measure, form a linear program [7] whose unknowns are the capacities v(S), S ⊂ J and where ε is a non-negative variable to be maximised in order to deliver well separated classes. We use the principle of parsimony for the resolution of this problem. If there exists a k-additive fuzzy measure v∗ ([3]), k being kept as low as possible, then we determine the boundaries of the classes as follows: • lower boundary of Clt : z(t) := minx∈Ndt Cv∗ (SN (x)); • upper boundary of Clt : Z(t) := maxx∈NDt Cv∗ (SN (x)). At this point, any alternative x ∈ A can be classified in the following way: • x is assigned to class Clt if zt ≤ Cv∗ (SN (x)) ≤ Zt ; • x is assigned to class Clt ∪Clt−1 if Zt−1 < Cv∗ (SN (x)) < zt . 147 A final step of the classical T OMASO method concerns the evaluation of the results and the interpretation of the behavior of the Choquet integral. The meaning of the values v(T ) is not clear to the DM . They don’t immediatly indicate the global importance of the points of view, nor their degree of interaction. It is possible to derive some indexes from the fuzzy measure which are helpful to interpret its behavior. Among them, the T OMASO method proposes to have a closer look at the importance indexes [10] and the interaction indexes [8]. 3.2 An alternate way It may happen that the linear program described in Subsection 3.1 has no solution. This occurs when the prototypic elements violate the axioms that are imposed to produce a discriminant function of Choquet type ([5] [11]), in particular the triple cancellation axiom. In such a case, and in order to present a solution to the DM, we suggest to find a fuzzy measure by solving the following quadratic program min ∑ [Cv (SN (x)) − y(x)]2 , x∈∪t∈{1,...,m} {NDt ∪NDt } where the unkowns are • the capacities v(S) which determine the fuzzy measure; • some global evaluations y(x) for each x ∈ ∪t∈{1,...,m} {NDt ∪ Ndt }. The capacities v(S) are constrained by the monotonicity conditions (as previously shown in Section 3.1). The global evaluations y(x) must verify the classification imposed by the DM. In other words, for every ordered pair (x, x′ ) ∈ Ndt × NDt−1 , t ∈ {2, . . . , m} the condition y(x) − y(x′ ) ≥ ε′ , ε′ > 0 must be satisfied. Intuitively, for a given alternative x ∈ A, its Choquet integral Cv (SN (x)) should be as close as possible to the global evaluation y(x), without being constrained by monotonicity conditions which might violate the triple cancellation axiom for example. On the other hand, the evaluation y(x) is constrained by the conditions derived from the original classification given by the DM on the prototypes. Unlike the method described in Section 3.1, in this case, ε′ plays the role of a parameter, which needs to be fixed by the DM. As previously, we use the principle of parsimony when searching for a solution (keep k as low as possible; at worst k equals the number of points of view). A correct choice of ε′ remains one of the main challenges of our future research. It is clear that ε′ has to be chosen in ]0, 1/n[. As in the classical method, the next step is to determine the structure of the classes. We determine an assignment for every alternative of X in terms of intervals of contiguous classes on the basis of the information provided by the Choquet integrals related to the prototypes of P ⊆ A. First of all, let us suppose that SN (x− ) := (0, . . . , 0) is classified to the worst class, Cl1 and that SN (x+ ) := (1, . . . , 1) is classified to the best class, Clm . To each assignment I(x) correspond a lower class label l(x) and an upper class label l(x), l, l ∈ J . We say that the alternative x ∈ X is precisely assigned to Cll(x) if for the assignment I(x) we have l(x) = l(x) =: l(x). Else, the alternative x is said to be ambiguously assigned to the interval of labels 148 I(x) = [l(x), l(x)]. The degree of the assignment corresponds to the number of contiguous classes contained in I(x), d(x) = l(x) − l(x) + 1. The assignments are done according to the procedure described hereafter. Starting from the prototypes x ∈ P, their Choquet integrals Cv (SN (x)) and their original classification label Cl(x) (according to the DM’s choice), we define for every u ∈ [0, 1], m(u) = max x∈P:Cv (SN (x))≤u M(u) = min Cl(x), and x∈P:Cv (SN (x))≥u Cl(x). m (resp. M) is a right (resp. left) continuous stepwise function of argument u with values belonging to the discrete finite set J . We now define for each u ∈ [0, 1] an interval of contiguous classes I(u) = [l(u), l(u)] where l(u) = min{m(u), M(u)} l(u) = max{m(u), M(u)}. Obviously l(u) ≤ l(u) and due to monotonicity of m and M we have: l(u) ≤ l(v), l(u) ≤ l(v), ∀u, v ∈ [0, 1] with u ≤ v. The interval [0, 1] is partitioned into (closed, semi-open or open) intervals Is , s = 1, . . . , S, and each of those intervals of [0, 1] receives an assignment of the type [l(s), l(s)] (or semi-open or open) in such a way that: if u, v ∈ [0, 1], u ≤ v and if u is assigned to Ir := [l(r), l(r)] and v is assigned to Ir′ := [l(r′ ), l(r′ )] then l(r) ≤ l(r′ ) and l(r) ≤ l(r′ ). Moreover if u = Cv (SN (x)), x ∈ P then l(u) ≤ Cl(x) ≤ l(u). This means that each prototype is correctly classified, possibly with ambiguity if d(x) ≥ 1. The assignment of a prototype a to the intervals of classes leads now to two scenarios: • a is assigned to a single class (d(a) = 1) which corresponds to the original class decided by the DM • a is assigned to an interval of classes and the original class decided by the DM belongs to this interval. The quality of a model (classifier) depends on different ratios. A good model has the following natural properties: • a simple model according to parsimony (low k); • a high number of precise assignments of the elements of P; • a low number of ambiguous assignments of the elements of P (and the lower the degree of the assignment, the better the model) For a given ε′ , the DM has to select a model (k) which seems the best compromise to him in terms of the previously described assignments. The simplest additive model (k = 1) can in certain situations be this ideal compromise between simplicity and quality. But in more complex problems, k has to be increased in order to obtain a satisfying number of precisely assigned prototypes. 149 3.3 Behavioral analysis of aggregation Now that we have a sorting model for assigning alternatives to classes (based on the linear program or the quadratic program), an important question arises: How can we interpret the behavior of the Choquet integral or that of its associated fuzzy measure? Of course the meaning of the values v(T ) is not always clear for the DM. These values do not give immediately the global importance of the points of view, nor the degree of interaction among them. In fact, from a given fuzzy measure, it is possible to derive some indexes or parameters that will enable us to interpret the behavior of the fuzzy measure. These indexes constitute a kind of id card of the fuzzy measure. The T OMASO method presently allows to analyse both the importance of points of view (Shapley indexes [10]), and their interactions ([8]). 3.4 Interpretation of the behaviour of the fuzzy measure In this Section we briefly show the main advantage to use a Choquet integral rather than the weighted sum as a discriminant function. We therefore take the simple case of two points of view, which can be represented in a plane. Figure 4 presents 5 possible ranges of values for the weights v and the corresponding structures of the limits of the classes. One can see that the main difference between the classical weighted sum and the Choquet integral is the greater flexibility of the borders of the classes. The Choquet integral creates piecewise linear borders, which allows to build more precise classes. The different possibilities are summarised by the following list: • I: v(1) + v(2) < v(12): synergy • II: v(1) + v(2) > v(12): redundancy • III: v(1) + v(2) = v(12) = 1: additivity • IV: v(1) = v(2) = 0: limit case; maximal synergy • V: v(1) = v(2) = 1: limit case; maximal redundancy 2 2 Cl1 2 Cl1 Cl1 Cl2 Cl2 Cl2 1 I 2 Cl2 1 II III 1 2 Cl1 Cl1 Cl2 IV 1 V 1 Figure 4: Interpretation of the discriminant functions 150 In [2] the authors give an interpretation to the first two cases. In case of synergy, although the importance of a single criterion for the decision is rather low, the importance of the pair is large. The criteria are said to be complementary. In case of redundance, or negative synergy, the union of criteria does not bring much, and the importance of the pair might be roughly the same as the importance of a single criterion. The limit case (IV) occurs for maximal synergy. In that case, the Choquet integral corresponds to the aggregation by the min function. Maximal redundancy occurs for case (V), where the Choquet integral is the max function. In case the number of points of view is larger than two, it becomes quite hard to represent the problem. Nevertheless, the previous short example helps to understand how the borders of the classes are built in such more general examples. 3.5 The software T OMASO In this short part of the paper we briefly present the key-characteristics of the software T OMASO . It can be downloaded on http://patrickmeyer.tripod.com. It is an implementation of the algorithms which were presented previously. Its name stands for “Tool for Ordinal MultiAttribute Sorting and Ordering”. It is written in Visual Basic and uses two external solvers: a free linear program solver (lp_solve 3.0, ftp://ftp.ics.ele.tue.nl/pub/lp_solve/, released under the LGPL license), and a non free quadratic program solver (bpmpd, free trial version at http://www.sztaki.hu/ meszaros/bpmpd/). It is still under development and many improvements are added on a regular basis. The general steps of the software are outlined hereafter: • Loading of the ordinal data; • Choice of a scoring method according to the problem’s specificities and calculation of the normalised partial net scores; • Definition of the prototypes by the DM; • Search for a fuzzy measure (either by the linear program, or the quadratic program) • Analysis of the results (classes, Shapley indexes, interaction indexes, accuracies, . . .) A detailed description of the software can be obtained from the author. 4 Concluding remarks We have presented a procedure for ordinal sorting in the presence of interacting points of view. It has already been applied to real life cases (in particular to a noise annoyance problem) quite successfully. Future work will concern the simplification of the software in order to make it even more user-friendly. Furthermore, the automatic determination of ε′ will also be one of our main concerns. The implementation of other indexes (veto, favour, . . .) is also planned. 151 References [1] G. Choquet, Theory of capacities, Annales de l’Institut Fourier, 5, (1953) 131-295. [2] M. Grabisch, M. Roubens, Application of the Choquet Integral in Multicriteria Decision Making, In: M. Grabisch, T. Murofushi, M. Sugeno (eds.): Fuzzy Measures and Integrals, Physica Verlag, Heidelberg, (2000) 348-374. [3] M. Grabisch, k-order additive discrete fuzzy measure and their representation, Fuzzy Sets and Systems, 92, (1997) 167-189. [4] J.-L. Marichal, Aggregation operators for multicriteria decision aid, Ph.D. thesis, Institute of Mathematics, University of Liège, Liège, Belgium, (1998). [5] J-L. Marichal, An axiomatic approach of the discrete Choquet integral as a tool to aggregate interacting criteria, IEEE Transactions on Fuzzy Systems, 8, (2000) 800-807. [6] J.-L. Marichal, P. Meyer and M. Roubens, Sorting multiattribute alternatives: The TOMASO method, International Journal of Computers & Operations Research, 2003, in press. [7] J-L. Marichal, M. Roubens, On a sorting procedure in the presence of qualitative interacting points of view. In: J. Chojean, J. Leski (eds.):Fuzzy Sets and their Applications. Silesian University Press, Gliwice, (2001) 217-230. [8] T. Murofushi, S. Soneda, Techniques for reading fuzzy measures (III): interaction index, 9th Fuzzy Sytem Symposium, Sapporo, Japan, (1993) 693-696. In Japanese. [9] M. Roubens, Ordinal multiattribute sorting and ordering in the presence of interacting points of view. In: D. Bouyssou, E. Jacquet-Lagrèze, P. Perny, R. Slowinsky, D. Vanderpooten and P. Vincke (eds.): Aiding Decisions with Multiple Criteria: Essays in Honour of Bernard Roy. Kluwer Academic Publishers, Dordrecht, (2001) 229-246. [10] L.S. Shapley, A value for n-person games. In: H.W. Kuhn, A.W. Tucker (eds.): Contributions to the Theory of Games, Vol. II, Annals of Mathematics Studies, 28, Princeton University Press, Princeton, NJ, (1953) 307-317. [11] P. Wakker, Additive Representations of Preferences: A new Foundation of Decision Analysis, Kluwer Academic Publishers, Dordrecht, Boston, London, (1989). 152 Regular measures on tribes of fuzzy sets M IRKO NAVARA1 , PAVEL P TÁK2 1 Center for Machine Perception, Department of Cybernetics Faculty of Electrical Engineering Czech Technical University 16627 Praha, Czech Republic E-Mail: ♥❛✈❛r❛❅❝♠♣✳❢❡❧❦✳❝✈✉t✳❝③ 2 Department of Mathematics Faculty of Electrical Engineering Czech Technical University 16627 Praha, Czech Republic E-Mail: ♣t❛❦❅♠❛t❤✳❢❡❧❞✳❝✈✉t✳❝③ Abstract The classical measure and probability theory is based on the notion of σ-algebra of subsets of a set. Butnariu and Klement [3] generalized it to fuzzy sets by considering collections of fuzzy sets called T -tribes (where T denotes a fixed triangular norm). Their concept of T -measure is fundamental in the fuzzification of classical measure theory. However, it has been successfully applied elsewhere, too (e.g., in finding solutions of games with fuzzy coalitions, see [4]). Here we summarize results about characterization of measures on tribes. Unlike preceding papers, we put emphasis on regular measures which were introduced in [21]. We argue that this notion could be considered as a promising alternative to the original notion of Butnariu and Klement. 1 Introduction The notion of “fuzzy measure theory” is used in different meanings (see [10] and the overview in [23]). Here we try to define real-valued measures on collections of fuzzy sets. Thus, we want to fuzzify the domain but not the range of a measure. When the generalized notions are restricted to systems of crisp sets, we expect them to coincide with the classical ones. A certain work in this direction was initiated by Butnariu and Klement [3, 4, 11]. They introduced T -tribes of fuzzy sets with T -measures as a natural generalization of a measure space. They made the first steps towards a characterization of monotone real-valued T -measures for a Frank triangular norm T . This project has been completed by Mesiar and Navara in [16]. Detailed summaries of this approach, together with a thorough analysis of Jordan decomposition, Lyapunov theorem, etc., may be found in [5, 6]. Later on, Barbieri and H. Weber and independently Navara found two generalizations, one for vector-valued T -measures with respect to Frank t-norms (in particular for non-monotone ones) [2], the other for monotone real-valued T -measures with respect to general strict t-norms [20]. A common generalization of these two results was proved by Barbieri, Navara, and H. Weber in[1]— a characterization of non-monotone (even vector-valued) T -measures with respect to an arbitrary strict t-norm. 153 All these results assumed a special structure of the tribes. Recently in [7] it was found that these assumptions are satisfied for many, but not all strict t-norms. The measure-theoretical consequences of this fact, as well as a new approach to proofs of all preceding results, form the subject of the paper [21]; here we summarize its main conclusions. Unless specified otherwise, we use the terminology and notation of [12]. 2 Tribes The notion of tribe was suggested by Butnariu and Klement [3, 4] as a fuzzification of a σ-algebra. In order to define measures on fuzzy subsets of some set, we need the underlying collections of measurable fuzzy sets (tribes) to be closed under fuzzy operations corresponding to those used in a σ-algebra. In particular, we need a fuzzy complement and a fuzzy union or a fuzzy intersection. Assumption 1. Throughout this paper we assume that a fuzzy complement, f ′ , of a fuzzy set f is obtained by the pointwise application of a (strong) fuzzy negation, i.e., an involutive decreasing bijection ′ : [0, 1] −→ [0, 1]. A fuzzy intersection, resp. a fuzzy union, is obtained by a pointwise application of a t-norm T , resp. the t-conorm S dual to T with respect to ′ . (We use the same symbols for fuzzy operations on truth values from [0, 1] and operations on fuzzy sets induced by them.) The symbol ≤ denotes the usual ordering of fuzzy sets as real-valued functions (fuzzy inclusion), and fn ր f (resp. fn ց f ) stands for the pointwise convergence of an increasing (resp. decreasing) sequence of functions ( fn )n∈N . Definition 2. Let X be a non-empty set. A tribe on X is a pentuple (T , T, ′ , 0, ≤), where T ⊆ [0, 1]X , T is a t-norm, ′ is a fuzzy negation, 0 is the constant zero function on X, ≤ is the fuzzy inclusion, and the following conditions are satisfied: (T1) 0∈T, (T2) f ∈ T =⇒ f ′ ∈ T , (T3) f , g ∈ T =⇒ T ( f , g) ∈ T , (T4) ( fn )n∈N ∈ T N , fn ր f =⇒ f ∈ T . We refer to X as the domain of the tribe (T , T, ′ , 0, ≤). By T -tribe operations we mean the following operations: nulary 0, unary ′ , binary T , and the limit of increasing sequences. Assumption 3. From now on, we shall consider only tribes with the standard negation a′ = 1 − a. Remark 4. The latter assumption is not much restrictive, because every tribe is isomorphic to a tribe in which ′ is the standard negation. (All preceding papers—including [3, 4]—admitted only the standard negation in the definition of a tribe. In this aspect, our definition is more general.) Using a multiplicative generator, also any strict t-norm may be considered equivalent to the product t-norm. However, this does not mean that any tribe is isomorphic to a tribe with the product t-norm and the standard negation. The problem is that the multiplicative generator does not have to preserve the standard negation. Thus only one of the operations—the t-norm or the fuzzy negation—can be standardized using an isomorphism of tribes. 154 We have already fixed the standard fuzzy negation ′ . Also 0 and ≤ have their stable meaning. On the other hand, the choice of the t-norm T is crucial and we shall always need to specify it. When there is no risk of confusion, we shall speak briefly of a tribe (T , T ) (as in [1]), resp. of a T -tribe T . (The latter is the original terminology of [3, 4]. The full notation (T , T, ′ , 0, ≤) was used in [23].) We also speak of a T -tribe when we need to refer to the t-norm T , but not to the tribe itself. Condition (T2) allows us to use duality, hence every T -tribe contains the constant function 1 and it is closed under the t-conorm S dual to T and under limits of decreasing sequences. Thus every T -tribe is closed also under the application of t-norm T to infinite sequences: (T3+) ( fn )n∈N ∈ T N =⇒ T fn ∈ T , n∈N because T n∈N fn is the limit of the decreasing sequence (T kn=1 fn )k∈N . In the original definition of a T tribe by Butnariu and Klement [3, 4], conditions (T3), (T4) were replaced by (T3+). In this aspect, our definition is slightly less general. However, this difference is not essential. In fact, in many important cases the two definitions coincide. In particular, all results found in the literature were obtained for tribes which satisfy also our definition. We shall see that the definition presented here is quite natural and advantageous for introducing measures on tribes. Let T be a t-norm and (T , T ) be a tribe on X. The elements of T ∩ {0, 1}X are called Boolean elements. Let A be a σ-algebra of subsets of a set X. Let S be the corresponding collection of characteristic functions, S = {χA | A ∈ A } , and T = { f ∈ [0, 1]X | f is A -measurable} . For any t-norm T , (S , T ) is a tribe called the Boolean tribe induced by A . For any measurable t-norm T , (T , T ), is a tribe called the full tribe induced by A . (Full tribes were first studied in [3], where they were called generated tribes. Here we use the terminology from [22].) 3 Measures on tribes In [3, 4], Butnariu and Klement introduced T -measures as a natural generalization of σ-additive measures on σ-algebras. Here we call them only measures because the t-norm T is specified with the tribe. By R+ we denote the set of all non-negative reals. Definition 5. Let (T , T, ′ , 0, ≤) be a tribe. A functional µ : T −→ R+ is called a measure if it satisfies the following axioms: (M1) µ(0) = 0 , (M2) f , g ∈ T =⇒ µ(T ( f , g)) + µ(S( f , g)) = µ( f ) + µ(g) , (M3) ( fn )n∈N ∈ T N , fn ր f =⇒ lim µ( fn ) = µ( f ) . n∈N 155 Remark 6. Condition (T4) ensures that f ∈ T in (M3). In the original definition of a T -measure [3], (T4) was not required and (M3) was replaced by a weaker condition which applies only to sequences whose limits are in T : (M3–) f ∈ T , ( fn )n∈N ∈ T N , fn ր f =⇒ lim µ( fn ) = µ( f ) . n∈N Although using a more general condition (M3–), all previous papers on this topic dealt with special cases of tribes satisfying (T4) and measures satisfying (M3). Condition (M3) is the left continuity of the measure. In fact, in a Boolean tribe it implies also the right continuity. However, this is not generally true for tribes. Therefore the following more specific notion has been introduced in [21]: Definition 7. A measure µ on a tribe (T , T ) is called regular if it satisfies (M1), (M2), and (M3+) ( fn )n∈N ∈ T N , ( fn ր f or fn ց f ) =⇒ lim µ( fn ) = µ( f ) . n∈N Proposition 8. Let T be a t-norm and (T , T, ′ , 0, ≤) be a tribe satisfying the law of contradiction, i.e., T ( f , f ′ ) = 0 for all f ∈ T . Then every measure on (T , T, ′ , 0, ≤) is regular. In particular, every measure on a Boolean tribe or on a TL -tribe (where TL is the Łukasiewicz t-norm) is regular. For a tribe (T , T ) on X, we define Ť = {A ⊆ X | χA ∈ T } . It is a σ-algebra of subsets of X. A measure µ on (T , T ) induces a measure µ̌ on Ť (introduced in [3]) µ̌(A) = µ(χA ) . 4 Frank and nearly Frank t-norms Frank t-norms TλF , λ ∈ [0, ∞], were defined in [9] by    (λx −1)(λy −1)  log 1 +  λ λ−1   F Tλ (x, y) := min(x, y)  x·y    max(x + y − 1, 0) if λ ∈ ]0, ∞[ \ {1} , if λ = 0 , if λ = 1 , if λ = ∞ . (The t-norms TM = T0F , TP = T1F , TL = T∞F are the minimum, the product, and the Łukasiewicz t-norm, respectively.) Frank t-norms TλF are strict iff λ ∈ ]0, ∞[. They play a special role in the characterization of measures due to the following property [9]: Theorem 9. Let T be a Frank t-norm and S its dual t-conorm. Then ∀a, b ∈ [0, 1] : T (a, b) + S(a, b) = a + b . Conversely, if a continuous Archimedean t-norm T and its dual S satisfy (1), then they are Frank. 156 (1) Let us recall the definition of nearly Frank t-norms [20]. We say that an increasing bijection h : [0, 1] −→ [0, 1] commutes with the standard negation if ∀a ∈ [0, 1] : h(a′ ) = h(a)′ . (Then h is called a negation preserving automorphism [20].) Definition 10. A t-norm T is called nearly Frank if there is an increasing bijection h : [0, 1] −→ [0, 1] which commutes with the standard negation and a Frank t-norm T ∗ satisfying T ∗ (a, b) = h(T (h−1 (a), h−1 (b))) (2) for all a, b ∈ [0, 1]. Proposition 11 (see [20]). If T is a nearly Frank t-norm different from TM , then the bijection h and the Frank t-norm T ∗ satisfying (2) are unique. The question of how to recognize whether or not a given t-norm is nearly Frank has been solved in [15]. 5 Characterization of regular measures Measures on T -tribes, where T is a nearly Frank t-norm, were characterized in [16]. For regular measures, we obtain the following consequence: Theorem 12. Let T be a strict nearly Frank t-norm with h satisfying (2) and (T , T ) be a tribe. Then regular measures on (T , T ) are exactly all functionals of the form µ( f ) = Z f ∈T , h ◦ f dν , (3) where ν = µ̌ is a measure on Ť . For Frank t-norms, h = id and we obtain the following: Corollary 13. Let TλF , λ ∈ ]0, ∞[, be a strict Frank t-norm and (T , TλF ) be a tribe. Then also (T , TL ) is a tribe and regular measures on (T , TλF ) are exactly (regular) measures on (T , TL ). They are of the form Z µ( f ) = f dν , f ∈T , (4) where ν = µ̌ is a measure on Ť . Following [20], a regular measure µ of the form (3) is called a (generalized) integral measure. The particular form (4) obtained for Frank t-norms is called a linear integral measure. It coincides with measures on σ-complete MV-algebras studied in [8, 22]. If the t-norm T is not nearly Frank, the characterization of measures is different. For the special case of a full tribe, it follows from [1]: 157 Theorem 14. Let T be a strict t-norm which is not nearly Frank. Then there is no non-zero regular measure on any full T -tribe. To analyze tribes which are not full, we introduce several notions. Let (T , T ) be a tribe on X and Y be a non-empty subset of X. Let TY = { f ↾Y | f ∈ T } ⊆ [0, 1]Y . Then (TY , T ) is a tribe on Y called the restriction of (T , T ) to Y . Suppose, moreover, that Y ∈ Ť and µ is a measure on (T , T ). Then µY : TY −→ R+ defined by µY ( f ↾Y ) = µ( f · χY ) (5) is a measure on (TY , T ) called the restriction of µ to Y . Remark 15. In fact, the restriction µY of a measure µ may be understood as a measure conditioned by a (crisp) event Y . A probabilistic interpretation is straightforward. Nevertheless, attempts to introduce conditional probability which is conditioned by fuzzy events lead to difficulties even in the special case of TL -tribes (see [22]). Let (T , T ) be a tribe. For f ∈ T , we denote the following subsets: U f = f −1 (1) , F f = f −1 (]0, 1[) , supp f = U f ∪ F f = f −1 (]0, 1]) (the support of f ). They all belong to Ť . Proposition 16. Let (T , T ) be a tribe and let µ be a measure on (T , T ). Then µ( f ) = µ(χU f ) + µ( f · χF f ) = µ̌(U f ) + µF f ( f ↾ F f ) . (6) / then f is Boolean and µ( f ) = µ̌(U f ). It only remains to determine the summand If F f = 0, / We have its characterization if the restriction (TF f , T ) is a full tribe. As we µF f ( f ↾ F f ) for F f 6= 0. shall see, this is often the case (not only for strict nearly Frank t-norms). Even if (TF f , T ) is not a full tribe, we can characterize regular measures [21]. For this, we define It is a σ-ideal in the σ-algebra Ť . ∆T = {F f | f ∈ T } . Theorem 17. Let T be a strict t-norm which is not nearly Frank and (T , T ) be a tribe. Then regular measures on (T , T ) are exactly all functionals of the form (4), where ν = µ̌ is a measure on Ť such that ν ↾ ∆T = 0. Remark 18. In Theorem 17, ν(F f ) = µ̌(F f ) = 0. Then (4) may be written in many equivalent forms: µ( f ) = Z f dν = ν(supp f ) = ν(U f ) and also as (3), where h : [0, 1] −→ [0, 1] is any increasing bijection. According to the above results, any regular measure on a tribe is fully determined by a measure on a σ-algebra. This characterization allows us to use many results derived in the classical measure theory. On the other hand, the context of full tribes is more general and extension to fuzzy subsets brings new phenomena. 158 6 Characterization of general measures Now we shall generalize the results from the preceding section to measures which need not be regular (we assume only left continuity in (M3)). A new type of measure occurs: Proposition 19. Let T be a t-norm and (T , T ) be a tribe. The functional µ on T defined by µ( f ) = µ̌(supp f ) is a measure on (T , T ) called a support measure. The characterization from [20] may be reformulated as follows: Theorem 20. Let T be a strict nearly Frank t-norm and let (T , T ) be a tribe on X. Every measure µ on (T , T ) is a linear combination of an integral measure and a support measure. As in Remark 18, a measure on a Boolean element may be considered an integral measure as well as a support measure. Therefore the decomposition to an integral measure and a support measure in Theorem 20 is not unique. The coefficients of the linear combination need not be non-negative: Example 21. Let TλF , λ ∈ ]0, ∞[ be a strict Frank t-norm. Then each measure µ on ([0, 1], TλF ) (the full TλF -tribe with a singleton domain) is of the form ( p + q a if a > 0, µ(a) = 0 if a = 0, where p ≥ 0 and p + q ≥ 0. The measure µ is • regular iff p = 0, • monotone iff q ≥ 0. E.g., if we take p = 1, q = −1, we obtain ( 1−a µ(a) = 0 if a > 0, if a = 0. This is a measure which is not monotone. As in the case of regular measures, we use Proposition 16. It is helpful if the restriction (TF f , T ) is full. In fact, the proof of Theorem 20 is based on Proposition 19, the characterization of regular measures from Theorem 12, and the following: Lemma 22. Let T be a strict nearly Frank t-norm and let (T , T ) be a tribe on X. If there is an f ∈ T such that F f = X, then the restriction (T , T ) is a full tribe. Recently in [7] Lemma 22 was generalized to many other strict t-norms which are called sufficient because they give rise to sufficient (or functionally complete) sets of fuzzy logical connectives (see [7] for details about this notion). In particular, sufficient t-norms include all t-norms from the Aczél– Alsina and Mizumoto eighth and tenth families (see [12, 13] for the definitions and [7] for further examples). 159 Theorem 23. Let T be a strict sufficient t-norm which is not nearly Frank and let (T , T ) be a tribe. Every measure µ on (T , T ) is a support measure. The question whether Lemma 22 remains valid for all strict t-norms has been open for many years. It is related to problems published, e.g., in [14, 16, 17, 18]. Counterexamples were found recently in [7]; the Hamacher product is one of them. For t-norms which are not sufficient, a characterization of measures on tribes is known only in special cases when it leads again to support measures. Problem 24. Is there a strict t-norm T which is not nearly Frank, a tribe (T , T ) and a measure µ on (T , T ) which is not a support measure? For regular measures, the characterization is known for all strict t-norms. Acknowledgements The first author gratefully acknowledges the support of the Czech Ministry of Education under Research Programme MSM 212300013 “Decision Making and Control in Manufacturing" and CEEPUS network SK-042. The second author was supported by grant 201/02/1540 of the Grant Agency of the Czech Republic. References [1] G. Barbieri, M. Navara, and H. Weber. Characterization of T -measures. Soft Computing 8:44Ű50, 2003. [2] G. Barbieri and H. Weber. A representation theorem and a Lyapunov theorem for Ts -measures: The solution of two problems of Butnariu and Klement. J. Math. Anal. Appl., 244:408–424, 2000. [3] D. Butnariu and E. P. Klement. Triangular norm-based measures and their Markov kernel representation. J. Math. Anal. Appl., 162:111–143, 1991. [4] D. Butnariu and E. P. Klement. Triangular Norm-Based Measures and Games with Fuzzy Coalitions. Kluwer Academic Publishers, Dordrecht, 1993. [5] D. Butnariu and E. P. Klement. Triangular norm-based measures: Properties and integral representations. In M. Grabisch, T. Murofushi, and M. Sugeno, editors, Fuzzy Measures and Integrals. Theory and Applications, Physica-Verlag, Heidelberg, pages 233–246, 2000. [6] D. Butnariu and E. P. Klement. Triangular norm-based measures. In E. Pap, editor, Handbook of Measure Theory. Elsevier Science, Amsterdam, chapter 23, pages 947–1010, 2002. [7] D. Butnariu, E. P. Klement, R. Mesiar and M. Navara. Sufficient triangular norms in manyvalued logics with standard negation. Submitted. [8] R. Cignoli, I. M. L. D’Ottaviano and D. Mundici. Algebraic Foundations of Many-Valued Reasoning. Kluwer Academic Publishers, Dordrecht, 1999. 160 [9] M. J. Frank. On the simultaneous associativity of F(x, y) and x + y − F(x, y). Aequationes Math., 19:194–226, 1979. [10] U. Höhle and S. Weber. Uncertainty measures, realizations and entropies. In J. Goutaias, R.P.S. Mahler, and H.T. Nguyen, editors, Random Sets: Theory and Applications, Springer, Heidelberg, pages 259–295, 1997. [11] E. P. Klement. Construction of fuzzy σ-algebras using triangular norms. J. Math. Anal. Appl., 85:543–565, 1982. [12] E. P. Klement, R. Mesiar, and E. Pap. Triangular Norms. Kluwer Academic Publishers, Dordrecht, 2000. [13] R. Lowen. Fuzzy Set Theory. Basic Concepts, Techniques and Bibliography. Kluwer Academic Publishers, Dordrecht, 1996. [14] R. Mesiar. On the structure of Ts -tribes. Tatra Mt. Math. Publ., 3:167–172, 1993. [15] R. Mesiar. Nearly Frank t-norms. Tatra Mt. Math. Publ., 16:127–134, 1999. [16] R. Mesiar and M. Navara. Ts -tribes and Ts -measures. J. Math. Anal. Appl., 201:91–102, 1996. [17] R. Mesiar and V. Novák. Open problems from the 2nd International Conference on Fuzzy Sets Theory and Its Applications. Fuzzy Sets and Systems, 81:185–190, 1996. [18] M. Navara. A characterization of triangular norm based tribes. Tatra Mt. Math. Publ., 3:161– 166, 1993. [19] M. Navara. Nearly frank t-norms and the characterization of T -measures. In D. Butnariu and E. P. Klement, editors, Proceedings of the 19th Linz Seminar on Fuzzy Set Theory, pages 9–16, Linz, 1998. [20] M. Navara. Characterization of measures based on strict triangular norms. J. Math. Anal. Appl., 236:370–383, 1999. [21] M. Navara. T-norms and measures of fuzzy sets. InE. P. Klement and R. Mesiar, editors, Triangular Norms and Related Operators, to appear. [22] B. Riečan and D. Mundici. Probability on MV-algebras. In E. Pap, editor, Handbook of Measure Theory. Elsevier Science, Amsterdam, chapter 21, pages 869–910, 2002. [23] S. Weber and E. P. Klement. Fundamentals of a generalized measure theory, In U. Höhle et al., editors, Mathematics of Fuzzy Sets. Logic, Topology, and Measure Theory, Kluwer Academic Publishers, Dordrecht, pages 633–651, 1999. 161 The logic and algebra of fuzzy IF-THEN rules V ILÉM N OVÁK Institute for Research and Applications of Fuzzy Modelling University of Ostrava 70103 Ostrava, Czech Republic E-mail: ❱✐❧❡♠✳◆♦✈❛❦❅♦s✉✳❝③ This paper is an (incomplete) overview of the existing approaches to interpretation of fuzzy IF-THEN rules and derivation of a conclusion on the basis of them. We will focus especially on two principal interpretations of linguistic description. The first one is called relational. The main idea is to find a good approximation of some function known only roughly. Therefore, it is divided into imprecise “parts” using fuzzy relations constructed from fuzzy sets with continuous membership functions of more or less arbitrary shape. Each such membership function is assigned some name to be able to get better orientation in the rules, but without real linguistic meaning. Formally, these are sets of fuzzy IF-THEN rules assigned one of two kinds of normal forms: the disjunctive or conjunctive normal form (see [10]). The resulting fuzzy relation then depends on the choice of the underlying algebra of truth values. Most interpretations of fuzzy IF-THEN rules found in the literature stick on this interpretation. Then derivation of a conclusion on the basis of them is done on the level of semantics rather than on the level of syntax. However, there are also logical interpretations, e.g. those presented in [6, 9] and elsewhere. An important case which, at the same time, belongs to logical interpretation is presented in [9, 7]. Its main goal is to use genuine linguistic expressions interpreted in a way which mimics human understanding to them. The fuzzy IF-THEN rules, which are then interpreted as linguistically characterised logical implications, form special axioms of some formal theory. There are several other kinds of interpretations which in various degrees can be ranked to the relational one (cf. [5]). In the paper, we will discuss and compare these interpretations from several points of view. References [1] Da Ruan and E. E. Kerre (Eds.): Fuzzy If-Then Rules in Computational Intelligence: Theory and Applications. Kluwer Academic Publishers, Boston 2000. [2] Dubois D. and Prade H. (1990b). Fuzzy sets in approximate reasoning — Part 1: Inference with possibility distributions. Fuzzy Sets and Systems, 40, 143–202. [3] Dubois D., Lang J. and Prade H. (1991). Fuzzy sets in approximate reasoning — Part 2: Inference with possibility distributions. Fuzzy Sets and Systems, 40, 203–244. [4] Dubois D. and Prade H. (1992), Gradual inference rules in approximate reasoning. Information Sciences, 61(1–2),103–122. 162 [5] Dubois D. and Prade H. (1992), The Semantics of Fuzzy “IF...THEN...” Rules. In: Novák, V., Ramík, J., Mareš, M., Černý, M., Nekola, J. (eds.), Fuzzy Approach to Reasoning and Decision–Making. Kluwer, Dordrecht 1992, Academia, Praha 1992. [6] Hájek, P. (1998), Metamathematics of fuzzy logic. Kluwer, Dordrecht. [7] Novák, V. (2003), Approximation Abilities of Perception-based Logical Deduction. Proc. Third Conf. EUSFLAT 2003, University of Applied Sciences at Zittau/Goerlitz, Germany, 630–635. [8] Novák, V. (2003), Fuzzy logic deduction with words applied to ancient sea level estimation. In: Demicco, R. and Klir, G.J. (Eds), Fuzzy logic in geology. Academic Press, Amsterdam, 301–336. [9] Novák, V., Perfilieva I., Močkoř, J. (1999), Mathematical Principles of Fuzzy Logic. Kluwer, Boston/Dordrecht. [10] Perfilieva, I. (2001), Normal Forms for Fuzzy Logic Functions and Their Approximation Ability. Fuzzy Sets and Systems 124, 371–384. 163 Solvability and approximate solvability of a system of fuzzy relation equations from functional point of view I RINA P ERFILIEVA Institute for Research and Applications of Fuzzy Modelling University of Ostrava 70103 Ostrava, Czech Republic E-mail: ■r✐♥❛✳P❡r❢✐❧✐❡✈❛❅♦s✉✳❝③ Abstract: The paper summarized the last author’s results concerning the problem of solvability and approximate solvability of a system of fuzzy relation equations. A number of new criteria of the so called Mamdani relation to be a solution to the system is suggested. At the same time those criteria are sufficient conditions of a solvability of the system in general. A new, easy to check criterion of a solvability of the system with special fuzzy parameters is found. With the notion of a fuzzy function as a mapping between universes of fuzzy sets we threw a new light on the problem of solvability and approximate solvability. In this setting, precise and approximate solutions to a system of fuzzy relation equations are considered as the interpolating and approximating fuzzy functions with respect to the given data. Different approximating spaces and different criteria of approximation have been introduced. We have proved that the widely known fuzzy relations introduced by E. Sanchez and E. H. Mamdani are the best approximations in the respective spaces and under the respective criteria. Keywords: system of fuzzy relation equations, solvability of a fuzzy relation equation system, fuzzy equivalence, fuzzy point, fuzzy function 1 Introduction Systems of fuzzy relation equations are connected with applications like fuzzy control, identification of fuzzy systems, prediction of fuzzy systems, decision-making, etc. Such systems arise in the process of formalization of fuzzy IF–THEN rules, which well recommend themselves as an approximating instrument for continuous dependencies. In this correspondence, the problem of solvability of a system of fuzzy relation equations relates to a problem of verification of correctness of the chosen formalization of fuzzy IF–THEN rules. In the proposed overview, we will consider the problem of solvability of a system of fuzzy relation equations in the following aspects: • criteria of general solvability, i.e. necessary and sufficient and only necessary or only sufficient [4, 10, 16, 18, 19]; • simple criteria of solvability in special cases where original data are fuzzy sets which constitute fuzzy partitions of respective universes [10, 15]; • solvability and interpolation of fuzzy functions [17, 16]; 164 • criteria of solvability in the case of finite universes; • approximate solvability in different approximating spaces and with respect to different criteria [17, 16]; • approximate solvability and approximation of fuzzy functions [13, 16, 17, 20]; • approximate solvability in special metric spaces induced by t-norm. For this publication we have chosen only new results recently established by the author. 1.1 Basic algebra of logic operations We choose a BL-algebra (BL stands for basic fuzzy logic) as a basic algebra of operations. In a certain sense, the BL-algebra generalizes boolean one and occurs when the conjunction is split in two different operations: a pure lattice operation and the other monoidal one (called multiplication) which a pseudo-inverse. The following definition summarizes definitions originally introduced in [9]. Definition 1. A BL-algebra is an algebra L = hL, ∨, ∧, ∗, →, 0, 1i (1) with four binary operations and two constants such that (i) (L, ∨, ∧, 0, 1) is a lattice with 0 and 1 as the least and greatest elements w.r.t. the lattice ordering, (ii) (L, ∗, 1) is a commutative semigroup with unit 1, such that the multiplication ∗ is associative, commutative and 1 ∗ x = x for all x ∈ L, (iii) ∗ and → form an adjoint pair, i.e. z ≤ (x → y) iff x ∗ z ≤ y for all x, y, z ∈ L, (iv) and moreover, for all x, y ∈ L x ∗(x → y) = x ∧ y, (x → y) ∨ (y → x) = 1. The well known examples of BL-algebra are Gødel, Łukasiewicz and product algebras. Another binary operation ↔ of L can be defined by: x ↔ y = (x → y) ∧ (y → x). The following properties will be used in the sequel: x≤y x↔y=1 iff (x → y) = 1, iff x = y. Note that, in particular, if L = [0, 1] then ∗ is a t-norm. From now and until the end of this paper, we fix some complete BL-algebra L with a support L. 165 1.2 Fuzzy sets and fuzzy relations We accept here a mathematical definition of a fuzzy set. Let X be a non-empty set. Then a fuzzy set or better, a fuzzy subset of X is identified with a function A : X −→ L. This function is known as a membership function of fuzzy set A. The set of all fuzzy subsets of X is denoted by F (X), so that we can write F (X) = {A : X −→ L} = LX . For two fuzzy sets A, B ∈ F (X) we let A=B iff (∀x)A(x) = B(x) and A ≤ B iff (∀x)A(x) ≤ B(x). A fuzzy set A ∈ F (X) is called normal if A(x0 ) = 1 holds for some x0 ∈ X. The algebra of operations over fuzzy subsets of X is introduced as the induced BL-algebra on LX . This means that each operation from L is the operation on LX taken pointwise. For example, the ∗-operation between fuzzy sets A and B is defined by (A ∗ B)(x) = A(x) ∗ B(x). The operations over fuzzy subsets fulfill the same properties as the corresponding operations in the respective BL-algebra. Let X and Y be two universes, not necessary different. A (binary) fuzzy relation on X × Y is a fuzzy subset of this set, i.e. a function R : X × Y −→ L. The set of all fuzzy relations on X × Y is denoted by F (X × Y). An n-ary fuzzy relation can be introduced analogously. If R ∈ F (X × Y) and S ∈ F (Y × Z) then the fuzzy relation T on X × Z T (x, z) = _ y∈Y R(x, y) ∗ S(y, z) is called a composition (or sup −∗-composition) of R and S and denoted by T = R ◦ S. In particular, if A is a unary fuzzy relation on X or a fuzzy subset of X then sup −∗-composition between A and R ∈ F (X × Y) is defined by B(y) = _ x∈X A(x) ∗ R(x, y), so that B = A ◦ R and B ∈ F (Y). 1.3 Fuzzy equivalence and fuzzy points Fuzzy equivalence is a special fuzzy relation on a universe X which, analogously as the classical equivalence fulfills the properties of reflexivity, symmetry and transitivity, but with the generalized meaning. Namely, we say that E : X × X −→ L is a fuzzy equivalence on X if E(x, x) = 1, E(x, y) = E(y, x), E(x, y) ∗ E(y, z) ≤ E(x, z) 166 holds true for all x, y, z ∈ X. Suppose that some fuzzy equivalence E on X is given. Then we may fix one argument x = x0 and consider the function A(x) = E(x0 , x) which determines a normal fuzzy subset of X. We say that the fuzzy subset of this type is a fuzzy point of X with respect to x0 and fuzzy equivalence E. It is not difficult to show that each normal fuzzy subset A of X, such that A(x0 ) = 1, can be considered as a fuzzy point with respect to x0 and special fuzzy equivalence E given by E(x, y) = A(x) ↔ A(y). The situation is more difficult if we have a collection of normal fuzzy subsets of X. The following theorem has been proved in [11]. Theorem 2. Let Ai , i ∈ I, be a family of normal fuzzy subsets of X, such that there exist xi ∈ X which make true the following: Ai (xi ) = 1. Then the following two statements are equivalent • there exists a fuzzy equivalence E on X, such that all fuzzy sets Ai are fuzzy points with respect to xi and E, i.e. Ai (x) = E(xi , x) (2) • for all i, j ∈ I _ x∈X (Ai (x) ∗ A j (x)) ≤ ^ (Ai (y) ↔ A j (y)) (3) y∈X holds. Remark 3. From the proof of this theorem it follows that • if (3) is true then each fuzzy set Ai from the above given family is a fuzzy point with respect to xi and fuzzy equivalence Ê given by Ê(x, y) = ^ i∈I (Ai (x) ↔ Ai (y)). (4) • if each fuzzy set Ai from the above given family is a fuzzy point with respect to xi and some fuzzy equivalence E then it is a fuzzy point with respect to xi and fuzzy equivalence Ê. The following lemma can be proved as a corollary of Theorem 2. Lemma 4. Let Ai , i ∈ I, be a family of normal fuzzy subsets of X, such that there exist xi ∈ X which make true the following: Ai (xi ) = 1. Moreover, let inequality (3) hold true. Then inequality (3) turns to the equality _ (Ai (x) ∗ A j (x)) = x∈X ^ (Ai (y) ↔ A j (y)) y∈X =Ê(xi , x j ) (5) where i, j ∈ I and Ê(x, y) is given by (4). Corollary 5. Let the conditions of Lemma 4 be fulfilled. Then inequality (3) turns to the equality _ x∈X (Ai (x) ∗ A j (x)) = ^ (Ai (y) ↔ A j (y)) = y∈X = E(xi , x j ) (6) where i, j ∈ I and E(x, y) is any fuzzy equivalence which makes all fuzzy subsets Ai to be fuzzy points with respect to it and xi . 167 1.4 System of fuzzy relation equations Let X and Y be two universes, not necessary different. A system of fuzzy relation equations Ai ◦ R = Bi , 1 ≤ i ≤ n, (7) where Ai ∈ F (X), Bi ∈ F (Y) and R ∈ F (X × Y) and ‘◦’ is the sup-*-composition, is considered with respect to unknown fuzzy relation R. Since in general, solution of (7) may not exist, the investigation of necessary and sufficient, or also of only sufficient conditions for solvability becomes necessary. This problem has been widely studied in the literature, and some nice theoretical results have been obtained. Let us point out some of them: [19], [18], [4] with necessary and sufficient conditions, [5], [10] with sufficient conditions. All of these results have practical importance only in the case when universes of discourse X and Y are finite. If these universes are infinite, then the complexity of verification of these conditions is comparable with the direct checking of solvability. Therefore, the problem of discovering easy to check solvability conditions or criteria is still actual. This paper is a contribution to this topic. We recall basic facts concerning solvability of system (7) of fuzzy relation equations Ai ◦ R = Bi , 1 ≤ i ≤ n, where Ai ∈ F (X), Bi ∈ F (Y) and R ∈ F (X × Y). • If system (7) with respect to unknown fuzzy relation R is solvable then relation R̂(x, y) = n ^ (Ai (x) → Bi (y)) (8) i=1 is the greatest solution to (7) (see [19]). • Let fuzzy sets Ai ∈ F (X) and Bi ∈ F (Y), 1 ≤ i ≤ n, be normal. Then fuzzy relation Ř(x, y) = n _ i=1 (Ai (x) ∗ Bi (y)) (9) is a solution to (7) if and only if for all i, j = 1, . . . , n _ (Ai (x) ∗ A j (x)) ≤ x∈X ^ (Bi (y) ↔ B j (y)) (10) y∈Y holds (see [10]). It is worth notice that fuzzy relation Ř is known in literature as Mamdani relation. 2 Sufficient conditions of solvability As mentioned above, a system of fuzzy relation equations arises on the way of formalization of a set of fuzzy IF–THEN rules. In fact, a fuzzy relation R which solves the system of fuzzy relation equations in the form (7) describes a certain dependence between variables x ∈ X and y ∈ Y. If the variable x is 168 furthermore specified by some value expressed by a fuzzy set A ∈ F (X) then the respective (fuzzy) value of variable y can be computed by taking the sup-*-composition B = A ◦ R. (11) This procedure is used as an interpretation of so the called Generalized Modus Ponens inference rule in the fuzzy logic in broader sense. Keeping in mind the computation of sup-*-composition (11), in which R is replaced by a solution to system (7), we may argue that fuzzy relation Ř requires less computations that fuzzy relation R̂. Therefore, the conditions which guarantee that Ř is a solution to (7) are more important than conditions of general solvability. On the other hand, these conditions are sufficient with respect to general solvability of (7). Therefore, we focus in this section on conditions ensuring that Ř is a solution to (7). Of course, the inequality (10) is the first representative of such conditions. The next theorem proved in [1], presents the equivalence between (10) and another inequality, which can be used as the second condition of this type. Theorem 6. The inequality (10) is equivalent with Ř ≤ R̂. (12) The following corollary immediately follows from Theorem 6 and Klawonn’s condition of solvability. Corollary 7. Let fuzzy sets Ai ∈ F (X) and Bi ∈ F (Y), 1 ≤ i ≤ n, be normal. Then the fuzzy relation Ř in (9) is a solution to (7) if and only if Ř ≤ R̂. Remark 8. If the fuzzy relation Ř is a solution to (7) then the system (7) is solvable. Therefore, the condition (12) is a sufficient condition for the solvability of the system (7), provided that fuzzy sets Ai ∈ F (X) and Bi ∈ F (Y) are normal. Let us investigate a special situation when fuzzy sets Ai ∈ F (X) and Bi ∈ F (Y) are fuzzy points with respect to fuzzy equivalences E on X and F on Y. The following nice (and easy to check) criterion of solvability of (7) by fuzzy relation Ř summarizes almost all the facts discussed above. Theorem 9. Let fuzzy sets Ai ∈ F (X) and Bi ∈ F (Y), 1 ≤ i ≤ n, be normal, so that there exist xi ∈ X and yi ∈ Y which make true the following: Ai (xi ) = 1, Bi (yi ) = 1. Further, let fuzzy equivalence E on X and fuzzy equivalence F on Y exist so that all the fuzzy sets Ai are fuzzy points with respect to xi and E, and all the fuzzy sets Bi are fuzzy points with respect to yi and F, i.e. (∀x)Ai (x) = E(xi , x) (13) (∀y)Bi (y) = F(yi , y). (14) and Then the fuzzy relation Ř in (9) is a solution to (7) if and only if (∀i)(∀ j)Ai (x j ) ≤ Bi (y j ). (15) We can again remark that condition (15) and the assumptions of Theorem 9 give easy to check sufficient condition of solvability of system (7). 169 3 One useful necessary condition of solvability Necessary conditions are very useful in verifying the solvability in general. When they are not fulfilled, the system cannot be solvable. We will suggest hear one condition which has easy to understand interpretation. Theorem 10. If the system (7) is solvable then for arbitrary i, j ∈ {1, . . . , n} ^ (Ai (x) ↔ A j (x)) ≤ x∈X ^ (Bi (y) ↔ B j (y)). (16) y∈Y The interpretation of the condition (16) is such that the sets Ai , A j cannot be closer than their respective counterparts Bi and B j . 4 A new criterion of solvability In this section we prove even more: the condition (15) is the necessary and sufficient condition for the solvability of system (7) provided that (13) is fulfilled. Theorem 11. Let the conditions of Theorem 9 be fulfilled. Then (15) is the necessary and sufficient condition of the general solvability of system (7). 5 Fuzzy function. Interpolation of a fuzzy function We will introduce the problem of solvability of fuzzy relation equations in a new framework as the problem of interpolation and approximation of a fuzzy function. Our idea is to introduce a fuzzy function as a mapping between two universes F (X) and F (Y) of fuzzy sets, so that it maps uniquely a fuzzy “point” from one universe to the respective fuzzy “point” from the other universe. Trying to be as much as possible close to the classical case we give the following definition (see also Perfilieva & Gottwald [17]). Definition 12. Let F (X), F (Y) be the classes of all fuzzy subsets on the universes of discourse X and Y. A mapping f from F (X) into F (Y) is called a fuzzy function if for any fuzzy subsets A, A′ ∈ F (X) and for fuzzy subsets B, B′ ∈ F (Y) which are f -related with A, A′ , respectively, A = A′ ⇒ B = B′ . (17) holds true. Example 13. Any fuzzy relation R ∈ F (X × Y) determines via sup-*-composition a fuzzy function, defined as the mapping fR from F (X) to F (Y) which is described by fR (A)(y) = (A ◦ R)(y) = _ (A(x) ∗ R(x, y)). x∈X In this example, the fuzzy set fR (A) = A ◦ R is the value of fuzzy function fR determined by R in the “fuzzy point” determined by A. 170 Remark 14. As mentioned in Introduction, there is another approach to the notion of a fuzzy function shared by the authors [9, 10]. According to their approach, a fuzzy function is a special kind of a fuzzy relation — which “respects” two given similarities on the universes of discourse. The “fuzzy” constituent in their definitions refers to the uniqueness property, so that they define what may be called a “blurred” mapping. Moreover, they clearly distinguish between partial and total fuzzy function. Contrary to the definitions cited above, we stress that a fuzzy function is a (ordinary) mapping between two universes of fuzzy sets, so that it maps uniquely a fuzzy “point” from one universe to the respective fuzzy “point” from the other universe. In our opinion, it is not necessary to indicate in the general definition of a function whether it is partially defined or not. It is reasonable to stress this characteristics when we speak, for example about the problem of interpolation. (Below, we formulate this problem and discuss methods of its solution.) However, in general we suppose that a fuzzy function is defined on the whole universe F (X). The definition of a (fuzzy) function, in general, does not provide us with a constructive way of its representation (except for finite F (X)). Therefore, the problem of representation of a function is of a primary importance. By this we mean, that having a function as a mapping, we want to find a formula which represents this mapping. However, in practice we know a mapping (between infinite or large universes) only partially, as a finite set of couples and therefore, the problem of representation may be solved also partially. There are two possible approaches to obtain a formulation of, say, partial representation problem: one leads to the interpolation and the other one — to the approximation of a function. We give formulations of both problems in fuzzy setting and then discuss the specificity of these problems in the case when fuzzy function is determined by a fuzzy relation. Definition 15. Let a list of original data consisting of ordered pairs of fuzzy sets (Ai , Bi ) where Ai ∈ F (X), Bi ∈ F (Y), i = 1, . . . , n, be given. A fuzzy function f defined on F (X) interpolates these data if f (Ai ) = Bi , i = 1, . . . , n. (18) We will also call f an interpolating fuzzy function. Very often, the above defined interpolation problem appears in the literature as a problem of finding a fuzzy relation partially described by a list of fuzzy IF–THEN rules IF x is Ai THEN y is Bi , i = 1, . . . , n, where Ai ∈ F (X), Bi ∈ F (Y). The natural requirement for such a fuzzy relation is that it should “agree” with the original data. This means in our terminology that the required fuzzy relation determines the fuzzy function which interpolates the given data (the details are below in Lemma 16). As an important remark, we point out that interpolation of a fuzzy function may not exist; if it exists, it need not be unique. In the latter case, this is the reason why the interpolation problem in classical mathematics is solved in a predetermined class of (interpolating) functions, for example in the class of polynomials. We consider a solution to the fuzzy interpolation problem in the class of fuzzy functions represented by fuzzy relations. It is easy to see that there is a close relation between the existence of an interpolation function and the solvability of the respective system of fuzzy relation equations. Lemma 16. Let ordered pairs of fuzzy sets (Ai , Bi ) be given where Ai ∈ F (X), Bi ∈ F (Y), i = 1, . . . , n. A fuzzy relation R determines an interpolating fuzzy function with respect to the given data (Ai , Bi ), i = 1, . . . , n, if and only if R is a solution of the corresponding system (7) of relation equations. 171 Proof. Obvious. As a consequence of this statement, we can assert that not every fuzzy function can be determined by the respective fuzzy relation. This is due to the fact that not every system of fuzzy relation equations is solvable. 6 Approximation of a fuzzy function. Approximate solutions to a system of fuzzy relation equations and their approximation quality The problem of approximation of a partially given fuzzy function arises when we want to complete partially given mapping, but we do not insist on a precise agreement with the given data. The other reason to consider approximation is that the interpolation problem may not be solvable in the chosen class of interpolating functions. For example, if interpolating fuzzy functions are those which are determined by fuzzy relations then the interpolation problem is equivalent to the existence of a solution to system (7). Because the latter may not be solvable, this implies that there exist fuzzy data (Ai , Bi ), i = 1, . . . , n, which cannot be “joined” by any fuzzy relation. In this situation we may weaken the interpolation problem and consider the problem of approximation. We start with a rough formulation of this problem and then, after explanation of details, give a precise formulation. Given fuzzy data (Ai , Bi ) where Ai ∈ F (X), Bi ∈ F (Y), i = 1, . . . , n, find a fuzzy function, determined by a fuzzy relation which gives an approximate solution to system (7). By this formulation, we reduce the problem of finding of an approximating fuzzy function to the problem of finding an approximate solution to system (7). The latter will be the core of our investigation in the rest of this paper. However, it requires further specification. Two things have to be specified: an approximating space and a quality of approximation. Below we will introduce three different approximating spaces and different qualities of approximation in them. 1. The widest approximating space consists of all fuzzy relations on X × Y R = {R | R ∈ F (X × Y)}. (19) However, we will not deal with this space in this paper, because it is too wide to find an optimal approximation in it. We will consider two other, more restrictive approximation spaces which are subspaces of R (Perfilieva & Gottwald [17]). Unlike R , they are determined by parameters Ai , Bi of system (7). 2. The space of lower approximations Rl = {R ∈ F (X × Y) | Ai ◦ R ≤ Bi , 1 ≤ i ≤ n} (20) consists of those relations which make compositions lower than the intended right hand sides. 3. The space of upper approximations Ru = {R ∈ F (X × Y) | Ai ◦ R ≥ Bi , 1 ≤ i ≤ n}. (21) consists of those relations which make compositions greater than the intended right hand sides. 172 An evaluation of a quality of approximation in R stems from a comparison of the intended values Bi and those ones determined by the composition R ∈ R and Ai , i.e. from a value (Gottwald [6]) δ(R) = n ^ ^ i=1 y∈Y (Bi (y) ↔ (Ai ◦ R)(y)). (22) Being equipped with the evaluation δ(R) of a quality of approximation we may compare two different approximate solutions, saying that R′ ∈ R is better than R′′ ∈ R if and only if its solution degree is higher; formally R′ ≤δ R′′ iff δ(R′′ ) ≤ δ(R′ ). (23) The same index δ(R) may serve as a quality of approximation in two other spaces Rl and Ru . It is easy to see that with help of δ(R) we have introduced a preorder ≤δ (i.e. reflexive and transitive binary relation) on each of the approximation spaces R , Rl and Ru . Though a quality of approximation in Rl and Ru may be estimated by δ(R), we will also use another, non-numeric estimation according to the following preorders ≤l on Rl R′ ≤l R′′ iff R′ , R′′ ∈ Rl and Ai ◦ R′′ ≤ Ai ◦ R′ , 1 ≤ i ≤ n, (24) R′ ≤u R′′ iff R′ , R′′ ∈ Ru and Ai ◦ R′ ≤ Ai ◦ R′′ , 1 ≤ i ≤ n. (25) and ≤u on Ru Let us remark that in the literature on fuzzy relation equations, the preorder ≤l has been implicitly used in Wu [20] and later on in Klir & Yuan [13] for estimation of approximation quality in Rl . 7 Optimal approximations In a certain sense, any element from an approximating space can be taken as an approximate solution so that the respective quality of approximation can be computed. However, we would prefer to have an approximate solution with the best possible quality of approximation. This leads us to the following definitions (cf. Perfilieva & Gottwald [17]). Definition 17. A fuzzy relation Ropt is a best approximate solution to system (7) in the approximation space R (Rl or Ru ) with respect to the quality δ(R) if δ(Ropt ) = sup δ(R) (26) R∈R (δ(Ropt ) = sup δ(R) or R∈Rl δ(Ropt ) = sup δ(R)). (27) R∈Ru In the approximation spaces Rl and Ru , we may also define best approximation with respect to preorders ≤l and ≤u . Definition 18. • Rlopt ∈ Rl is a best approximate solution to system (7) w.r.t. ≤l if there is no fuzzy relation R ∈ Rl such that R ≤l Rlopt and Ai ◦ R 6= Ai ◦ Rlopt for at least one i ∈ {1, . . . , n}. 173 • Ruopt ∈ Ru is a best approximate solution to system (7) w.r.t. ≤u if there is no fuzzy relation R ∈ Ru such that R ≤u Ruopt and Ai ◦ R 6= Ai ◦ Ruopt for at least one i ∈ {1, . . . , n}. As we will see later, a best approximate solution to system (7) in the approximating space Rl w.r.t. ≤l maximizes forms Ai ◦ R, i = 1, . . . , n (see Theorem 21), and a best approximate solution to system (7) in the approximating space Ru w.r.t. ≤u minimizes forms Ai ◦ R, i = 1, . . . , n (see Theorem 27). As a consequence of this, a best approximate solution to system (7) in Rl or Ru with respect to above introduced approximation qualities if it exists, may not be unique. In Subsection 10 we will see where it may happen. Therefore, in those particular cases we will take into consideration additional characteristics of approximate solutions. Our next goal is to show that pseudo-solutions R̂ and Ř are the best approximate solutions to system (7) in the spaces Rl , Ru with respect to the introduced preorders. For the pseudo-solution R̂, an optimality in the approximation space Rl and a preorder similar to (24), has been proved in [20, 13]. Below, we will prove a more rigid result. 8 Optimality of pseudo-solution R̂ We will show that R̂ is a best approximate solution to system (7) in the approximation space Rl with respect to both preorders ≤l and ≤δ(R) . Moreover, R̂ is the greatest element in this space with respect to the ordinary ordering ≤ between fuzzy sets. Lemma 19. If the system (7) is unsolvable then the fuzzy relation R̂ is the greatest element in the approximation space Rl w.r.t. the ordinary ordering ≤. 8.1 Optimality of R̂ with respect to the preorder ≤l In the theorem given below, we prove the first of the best approximation results about R̂ in Rl with respect to ≤l . Theorem 20. Let the system (7) be unsolvable. Then the fuzzy relation R̂(x, y) = n ^ i=1 (Ai (x) → Bi (y)) is a best approximate solution to system (7) in the space Rl under the preorder ≤l (cf. (24)). The following simple theorem shows even more. If the original system (7) is unsolvable then the first solvable system (when decreasing the right hand sides of (7)) is the system with Bi replaced by Ai ◦ R̂. Theorem 21. Let system (7) be unsolvable and fuzzy sets Ci ∈ F (Y) fulfill the inequalities Ci ≤ Bi , i = 1, . . . , n. Then if the system is solvable then where B̂i = Ai ◦ R̂. Ai ◦ R = Ci , Ci ≤ B̂i , i = 1, . . . , n. i = 1, . . . , n, 174 8.2 Optimality of R̂ with respect to the preorder ≤δ The theorem below contains the second of the best approximation results about R̂ in Rl with respect to ≤δ . Theorem 22. Let system (7) be unsolvable. Then the fuzzy relation R̂(x, y) = n ^ i=1 (Ai (x) → Bi (y)) is a best approximate solution to system (7) in Rl with respect to the approximation quality δ(R) (cf. (22)). 9 Optimality of pseudo-solution Ř The relation Ř given by (9) is not an optimal approximate solution to system (7) in the space Ru either with respect to the preorder ≤u or with respect to the quality δ(R). This result has been proved in [17]. However, we will obtain the optimality of Ř in both cases for special systems of fuzzy relation equations, such that they are solvable if and only if when they are Ř-solvable. 9.1 Solvability and Ř-solvability We put restrictions on fuzzy sets A1 , . . . , An ∈ F (X) assuming that they are normal and form a semipartition of X. For this, we recall the definition of a semi-partition (see [3]). Definition 23. Normal fuzzy sets A1 , . . . , An ∈ F (X) form a semi-partition of X if (∀i)(∀ j) _ x∈X (Ai (x) ∗ A j (x)) ≤ ^ ! (Ai (x) ↔ A j (x)) . x∈X (28) Throughout this section we will suppose that fuzzy sets A1 , . . . , An ∈ F (X) in system (7) are normal and form a semi-partition of X. Definition 24. We say that system (7) of fuzzy relation equations is Ř-solvable if its pseudo-solution Ř given by (9) is a solution to this system. We also denote B̌i (y) = (Ai ◦ Ř)(y), 1 ≤ i ≤ n. (29) Although solvability and Ř-solvability of system (7) are not in general equivalent, this is true under the accepted assumption about semi-partitioning of X. The theorem given below proves this fact. Theorem 25. Let fuzzy sets A1 , . . . , An ∈ F (X) be normal and form a semi-partition of X. Then system (7) is solvable if and only if it is Ř-solvable. 175 9.2 Optimality of Ř with respect to the preorder ≤u For systems of fuzzy relation equations whose parameters Ai , 1 ≤ i ≤ n, form a semi-partition of X, we will prove the optimality of Ř in Ru with respect to the preorder ≤u , and with respect to ≤δ in the next subsection. Theorem 26. Let system (7) be unsolvable and fuzzy sets Ai , 1 ≤ i ≤ n, be normal and form a semipartition of X. Then the fuzzy relation Ř(x, y) = n _ (Ai (x) ∗ Bi (y)) i=1 is a best approximate solution to system (7) in the space Ru with respect to the preorder ≤u (cf. (25)). The following theorem shows that if the original system (7) is unsolvable then the first solvable system (when increasing the right hand sides of (7)) is the system with Bi replaced by B̌i . Theorem 27. Let the conditions of Theorem 26 be fulfilled and fuzzy sets Ci ∈ F (Y) be such that Ci ≥ Bi , i = 1, . . . , n. Then if the system Ai ◦ R = Ci , i = 1, . . . , n. is solvable then Ci ≥ B̌i , i = 1, . . . , n, where B̌i = Ai ◦ Ř. 9.3 Optimality of Ř with respect to the preorder ≤δ As the last result of this section, we will prove that Ř(x, y) is an optimal solution to system (7) with respect to ≤δ too. Theorem 28. Let the conditions of Theorem 26 be satisfied. Then fuzzy relation Ř(x, y) is a best approximate solution to system (7) in Ru with respect to the approximation quality δ(R). 10 Optimality of other pseudo-solutions Though we introduced various approximation spaces, only two representatives, i.e. R̂ and Ř have been considered as their members. We have introduced in [8] another candidate for optimal approximation — the iterated relation ˇ y) = _ (A (x) ∗ B̂ (y)) = _ (A (x) ∗ _ (A (x) ∗ ^ (A (x) → B (y)))). R̂(x, j j i i i i n n n i=1 i=1 x∈X j=1 As before, we use the notation B̂i (y)) = (Ai ◦ R̂)(y) = _ x∈X (Ai (x) ∗ 176 n ^ j=1 (A j (x) → B j (y))). The idea lying in the construction of R̂ˇ is to replace Bi s in the relation Ř by Ai ◦ R̂ (which are smaller) and by this, create a new relation which is smaller than Ř. Actually, R̂ˇ ≤ Ř and, as shown in [8], Ai ◦ R̂ ≤ Ai ◦ R̂ˇ ≤ Ai ◦ Ř. Therefore, the optimality of R̂ˇ is expected, and this is proved in the theorem below. Theorem 29. Let system (7) be not solvable and suppose that the system Ai ◦ R = B̂i (30) is Ř-solvable. Then the iterated relation R̂ˇ is a best approximate solution to (7) in Rl with respect to the preorder ≤l as well as with respect to the quality δ(R). Remark 30. • It follows from Theorem 29 that there are at least two best approximate solutions to (7) in Rl , both with respect to the preorder ≤l as well as to the quality δ(R). The non-uniqueness of a best approximation is a consequence of the fact that the solvability of (7) is not equivalent to the existence of exactly one solution. Let us explain this claim in more details. Our optimality criteria have been chosen in such a way that they measure a deviation from the original right-hand side of system (7). Therefore, if some approximate solution R̃ is optimal then any other fuzzy relation which solves (7) with the same right-hand side as R̃ does, is optimal as well. • If we want to distinguish various best approximations more subtly, we should specify fuzzy relations (solutions) according to their additional properties. For example, the approximate solution R̂ is the greatest element in Rl (with respect to the ordinary ordering), and this distinguishes it among other (best) approximate solutions. • We conlucde from Theorems 22, 28, 29 that δ(R) can be taken as a universal measure of approximation quality in the approximation spaces Rl and Ru . 11 Optimality under the stronger criterion Let us summarize the above used methodology for construction of approximate solutions to system (7). We replaced the right-hand sides of equations in (7) by those which guarantee the solvability and took the guaranteed solution as the approximate one. Then we have noticed that the guaranteed solutions composed with the fixed left-hand sides of equations in (7) produced either lower or upper approximations of the given right-hand sides. This observation led us to the introduction of two approximating spaces consisting of those fuzzy relations which, when composed with the fixed lefthand sides, produce various lower or upper approximations of the given right-hand sides. In each approximating space the respective guaranteed solution was among the best approximate solutions to system (7). In this section, we will extend the approximating space by fuzzy relations which, when composed with fuzzy sets greater than the given left-hand sides of equations in (7), produce smaller right-hand 177 sides than the given ones. We will show that in such extended space the known fuzzy relation R̂ is again among the best approximate solutions with respect to the below introduced preorder ≤γ . Suppose as before that system (7) is not solvable and introduce the approximating space Rlr = {R ∈ F (X × Y) | Di ◦ R = Ci , 1 ≤ i ≤ n, for some D1 , . . . , Dn ∈ F (X),C1 , . . . ,Cn ∈ F (Y) such that Ai ≤ Di ,Ci ≤ Bi } (31) and the following quality of approximation γ(R) = n ^ i=1 ^ (Bi (y) ↔ (Ai ◦ R)(y))∧ y∈Y ∧ ^ (Ai (x) ↔ x∈X ^ y∈Y ! (R(x, y) → Bi (y))) . (32) The second term in (32) arises from the expression in (??) which gives the maximal solution to (7) with respect to unknown Ai . We can compare different relations saying that R′ ∈ Rlr is better than R′′ ∈ Rlr if and only if its γ-quality γ(R′ ) is higher. Formally: R′ ≤γ R′′ iff γ(R′′ ) ≤ γ(R′ ). (33) Moreover, we can define an optimal approximation as follows. Definition 31. A fuzzy relation Ropt is a best approximate solution to system (7) in the approximation space Rlr with respect to the quality γ(R) if γ(Ropt ) = sup γ(R). (34) R∈Rlr The following theorem shows that the relation R̂ is again a best one with respect to the quality γ(R). Theorem 32. Let system (7) be not solvable. Then the set Rlr is non-empty and fuzzy relation R̂ is a best approximate solution in the set Rlr with respect to the quality γ(R). Corollary 33. The fuzzy relation R̂ is the largest approximate solution in Rlr with respect to the ordinal ordering ≤. 12 Concluding remarks Most of the known results about solvability of systems of fuzzy relation equations have practical importance only in the case when universes of discourse X and Y are finite. In case when these universes are infinite, the complexity of verifying theoretical conditions is comparable with a direct checking of a solvability. Therefore, the problem of discovering easy to check conditions or criteria is still actual. This paper is (among others) a contribution to this topic. 178 A number of new criteria of the so called Mamdani relation to be a solution to the system is suggested. At the same time, these criteria are sufficient conditions for solvability of the system in general. A new, easy to check criterion of a solvability of the system with special fuzzy parameters is found. With the notion of a fuzzy function as a mapping between universes of fuzzy sets we threw a new light on the problem of solvability and approximate solvability. In this setting, precise and approximate solutions to a system of fuzzy relation equations are considered as the interpolating and approximating fuzzy functions with respect to the given data. We concentrated on a problem of approximate solvability of a system of fuzzy relation equations. Different approximating spaces and different criteria of approximation have been introduced. We have proved that the widely known fuzzy relations introduced by E. Sanchez and E. H. Mamdani are the best approximations in the respective spaces and under the respective criteria. References [1] De Baets B., A note on Mamdani controllers, in: Proc. 2nd Int. Workshop on Fuzzy Logic and Intel. Techn. in Nuclear Science, FLINS 1996, World Scientific Publ., Singapore, 22–28, 1996. [2] De Baets B., Analytical Solution Methods for Fuzzy Relation Equations, Fundamentals of Fuzzy Sets, The Handbooks of Fuzzy Sets Series (D. Dubois and H. Prade, eds.), 1, Kluwer Academic Publishers, 2000, 291-340. [3] B. De Baets, R. Mesiar, T-partitions, Fuzzy Sets Systems, 97 (1998) 211–223. [4] Gavalec M., Solvability and Unique Solvability of max-min Fuzzy Equations, Fuzzy Sets Systems, 124, 385–394, 2001. [5] Gottwald S., Fuzzy Sets and Fuzzy Logic. The Foundations of Application – from a Mathematical Point of View. Vieweg: Braunschweig/Wiesbaden and Teknea. Toulouse, 1993. [6] S. Gottwald, Generalised solvability behaviour for systems of fuzzy equations, in: V. Novák, I. Perfilieva (Eds.), Discovering the World with Fuzzy Logic, Advances in Soft Computing, Physica-Verlag: Heidelberg, 2000, 401–430. [7] Gottwald S., V. Novak, I. Perfilieva(2002) : Fuzzy control and pseudo-solutions of fuzzy relation equations. Proc. East-West Fuzzy Colloquium 2002, 10th Zittau Fuzzy Coll., Sept., 4-6, Germ., 12-18. [8] S. Gottwald, V. Novák, I. Perfilieva, Fuzzy control and t-norm-based fuzzy logic. Some recent results, in: Proc. 9th Internat. Conf. IPMU’2002, ESIA – Universit’e de Savoie, Annecy, 2002, 1087–1094. [9] Hájek P., Metamathematics of fuzzy logic, Kluwer, Dordrecht, 1998. [10] Klawonn F., Fuzzy points, fuzzy relations and fuzzy functions, in: Discovering the World with Fuzzy Logic, (V. Novák, I. Perfilieva eds.) Advances in Soft Computing, Physica-Verlag: Heidelberg, 431–453, 2000. [11] Kruse R., Gebhart J., Klawonn F., Fuzzy-Systeme, B.E. Teubner, Stuttgart, 1993. 179 [12] Mamdani A., Assilian S., An experiment in linguistic synthesis with a fuzzy logic controller, Internat. J. Man-Machine Studies, 7, 1–13, 1975. [13] G. Klir, B. Yuan, Fuzzy Sets and Fuzzy Logic, Theory and Applications, Prentice Hall: Upper Saddle River, 1995. [14] Novák, V., Perfilieva, I., Močkoř, J., Mathematical Principles of Fuzzy Logic. Kluwer Acad. Publ., Boston, 1999. [15] Perfilieva I., Solvability of a System of Fuzzy Relation Equations: Easy to Check Conditions, Neural Network World, 13(5), 571–580. [16] Perfilieva I., Fuzzy Function As an Approximate Solution to a System Of Fuzzy Relation Equations, Fuzzy Sets Systems, to appear. [17] Perfilieva I., S. Gottwald(2003): Fuzzy function as a solution to a system of fuzzy relation equations, Int. J. of General Systems, 2003, Vol.32 (4), 361– 372. [18] Perfilieva I., Tonis A., Compatibility of systems of fuzzy relation equations, Internat. J. General Systems, 29, 511–528, 2000. [19] Sanchez E., Resolution of composite fuzzy relation equations, Information and Control, 30, 38– 48, 1976. [20] W. Wu, Fuzzy reasoning and fuzzy relation equations, Fuzzy Sets Systems, 20 (1986) 67–78. 180 Point-set lattice-theoretic (poslat) topology: a (partly) categorical perspective S TEPHEN E. RODABAUGH Department of Mathematics and Statistics Youngstown State University Youngstown, OH 44555-3609, USA E-mail: r♦❞❛❜❛✉❣❅❛s✳②s✉✳❡❞✉ Point-set lattice-theoretic (or poslat) topology refers to that sort of topology for which a space, roughly speaking, is determined from a (carrier) set X, a lattice L of some sort, and an associated topology— either a family of L-valued mappings on X or an operator on the powerset of all L-valued mappings, and for which there are appropriate continuous morphisms. Such topology is also called lattice-valued, many-valued, fuzzy, etc. For the last 35 years, poslat topology has been intensely developed, aided in significant measure by the International Seminar on Fuzzy Set Theory, also known as the Linz Seminar. It is our purpose to outline certain aspects of this poslat topology from a (partly) categorical point of view with the general goal of identifying some categories which serve as relevant frameworks for poslat topology, relevant in the sense that these categories are topological and contain important examples. This goal is pursued by doing the following: sampling well-known lattice-theoretic and ground categories and overlying fixed-basis and variable-basis categories for poslat topology; discussing their relationships to point-free categories for topology, Wang’s category for lattice-valued topology, and Vicker’s category for topological systems arising from domains in computer science; indicating in what sense these categories are topological; sketching functorial relationships between these categories; and inventoring some important examples of objects and morphisms for poslat topology. 1 1.1 Preliminaries Lattice-theoretic conditions The most general lattice structure we will consider is that of a complete quasi-monoidal lattice (cqml) as defined in [61]: a complete lattice equipped with a binary operation, called a tensor product, which is isotone in both arguments and has the top element as an idempotent. See [23] for stronger versions of this definition. Many examples of cqml’s are catalogued in [23, 64]. 1.2 Lattice-theoretic categories The category Cqml [23, 61] comprises the class of all cqml’s, together with the class of all mappings between cqml’s which preserve tensor products, arbitrary joins, and top elements. The dual category Cqmlop is denoted Loqml and is called the category of localic quasi-monoidal lattices. Most of the 181 lattice-theoretic categories of interest in poslat topology are isomorphic to subcategories of Cqml or Loqml, including [61] SFrm (semiframes), its dual SLoc (semilocales), Frm (frames), Loc (locales), Dmrg (complete deMorgan algebras), its dual Dmrgop , Hut (Hutton algebras), and its dual FuzLat, as well as various categories in which the tensor is not the binary meet. 1.3 Ground categories and powerset operators 1.3.1 Fixed-basis grounds and powerset operators For the case when the cqml L is fixed, the ground category is Set, with the associated Zadeh powerset operators fL→ , fL← between LX and LY for a ground morphism f : X → Y [10, 46, 59, 60]. Many properties and characterizations are known for these Zadeh operators, including that fL→ ⊣ fL← . 1.3.2 Variable-basis grounds and powerset operators For the case when the cqml L may vary, a subcategory C of Loqml—within which L varies—is fixed and the ground category is Set × C, with ground morphisms of the form ( f , φ) : (X, L) → (Y, M) with f : X → Y in Set and φop : L ← M in Cop ⊂ Cqml, and with the associated powerset operators ( f , φ)→ , ( f , φ)← are between LX and MY [10, 54, 55, 56, 59, 60] Theorem. ( f , φ)→ ⊣ ( f , φ)← if and only if φop preserves arbitrary meets. The consequent holds if: φ ∈ Dmrgop (L, M); φop is a backward Zadeh operator; i.e. ∃ N ∈ |CQML| , ∃ g ∈ Set (W, Z) , φop = g← N;φ is any of the examples constructed in 7.1.7.2 of [61] or 9.9(2(b), 3) of [62]; or φ is an isomorphism in Loqml. 1.4 Adjoint Functor Theorem Let f : L → M, g : L ← M be isotone maps between preordered sets. Then f ⊣ g provided [∀a ∈ L, a ≤ g ( f (a))] and [∀b ∈ M, f (g (b)) ≤ b], or equivalently, [∀a ∈ L, b ∈ M, a ≤ g (b) ⇔ f (a) ≤ b]. If f ⊣ g, then we write g = f ⊢ and f = g⊣ . Theorem (Adjoint Functor Theorem [26]). Let f : L → M [g : L ← M] be a function such that L W V W [M] has arbitrary [ ] and f [g] preserves arbitrary [M, respectively]. Then f [g] is isotone, V W ∃ ! f ⊢ : L ← M [g⊣ : L → M], and f ⊢ [g⊣ ] preserves all [ ] existing in M [L]. 2 2.1 Categories For Poslat Topological Structures Some Fixed-Basis Categories Fixed-basis categories are fixed with respect to the underlying cqml L, but varying with respect to the underlying ground object (or set). Fixing L in Cqml, the well-known category L-Top [2, 11, 23, 61] has ground category Set, with the topology being a crisp subset of the L-powerset closed under (binary) tensor products and arbitrary 182 W and containing the top L-subset; and the well-known category L-FTop [15, 31, 71, 22, 40, 23] has ground category Set, with the topology being an L-subset of the L-powerset which assigns as degree of openness to tensor products the least degree of the tensorands, to arbitrary joins the least degree of the disjuncts, and to the top L-subset the top element of L. See the analysis of important subcategories in [23], often using underlying L with richer structure or with additional conditions on the topology (such as in [42]). 2.2 Some Point-Free Categories The category Loc may be considered to have ground Setop . Each locale may be regarded as the (sober) topology of some L-topological space; and if L turns out to be 2 in that statement, the locale is called spatial [55, 56, 57, 58]. More generally, we may replace Loc with Loqml or C ֒→ Loqml; restated, each subcategory of Loqml can be viewed as a point-free category of topological structures. Fixing C a subcategory of Loqml, the category C-HTop [25, 55, 61] has ground category C, with the topology being a crisp subset of some L in C that is closed under the tensor and arbitrary joins and containing the top element; the famous definition originally given in [25] used C = FuzLat as the ground category. Further, the category C-HFTop has ground category C, with the topology being an L-subset of some L in C which has properties analogous to those of the topologies in L-FTop. It is our contention that every point-free approach is essentially a variable-basis approach (see below). We have listed these separately from the variable-basis approaches since, with the exception of C-HFTop, their origins were independent of, and prior to, variable-basis topology. 2.3 Some Variable-Basis Categories The underlying set is free to change in fixed-basis topology while the lattice-theoretic base is fixed; and the underlying set is fixed in point-free topology (as a singleton—see below) while the lattice-theoretic base is free to change. In variable-basis topology, both the underlying set and the lattice-theoretic base are free to change. Fixing C a subcategory of Loqml, the category C-Top [5, 6, 7, 10, 52, 53, 55, 56, 61] has ground category Set × C, objects being of the form (X, L, τ), with (X, τ) ∈ |L-Top|, and morphisms being of the form ( f , φ) : (X, L, τ) → (Y, M, σ), with τ ⊃ (( f , φ)← )→ (σ) . Further, the category C-FTop [61] has ground category Set × C, objects being of the form (X, L, T ), with (X, T ) ∈ |L-FTop|, and morphisms being of the form ( f , φ) : (X, L, T ) → (Y, M, S ), with T ◦ ( f , φ)← ≥ φop ◦ S on MY . 2.4 Category Of Topological Systems Topological systems [75] stem from placing domain theory of computer science into a topological setting [68, 69, 70]. The central idea in topological systems is that of a satisfaction or modeling relation. We initially view topological systems as categorically having Set × Loc as ground. The category TopSys [75] has objects of the form (X, A, |=), with (X, A) ∈ |Set × Loc| and |= ⊂ X × A satisfying: 1. ∀x ∈ X, ∀S ⊂ A, x |= W S ⇔ ∃ a ∈ A, x |= a. 2. ∀x ∈ X, ∀ finite S ⊂ A, x |= V S ⇔ ∀a ∈ A, x |= a. 183 And morphisms are of the form ( f , φ) : (X, A, |=) → (Y, M, |=), where ∀x ∈ X, ∀ b ∈ B, f (x) |= b ⇔ x |= φop (b). (The same symbol is used for both the domain and codomain satisfaction relations.) Clearly, TopSys is a variable-basis approach. But we have separately listed this approach for two reasons: the notion of topological system arose independently of, and subsequent to, variablebasis topology; and the categorical behavior of topological systems is strikingly different than that of variable-basis topology (see below). 2.5 Category Of Wang Topological Spaces From [76, 77, 78] comes a schemum of categories not having an obvious ground category. Let C ֒→ Dmrgop (the original definition requires C = FuzLat). Given L, M ∈ |C|, a set mapping ′ φ : L → M is an order homomorphism if φ preserves arbitrary and∀b ∈ M, φ⊢ (b′ ) = φ⊢ (b) (i.e. φ⊢ ∈ Dmrg). The category C-WTop has objects of the form  X,τ → LX , τ , where X ∈ |Set|, L ∈ |C|, and (X, τ) ∈ |L-Top|, and morphisms of the form φ : L → MY , σ , where φ : LX → MY is an order homomorphism and τ ⊃ φ⊢ (σ). W As will be seen below, the Wang approach is essentially a point-free approach and is isomorphic to a subcategory of singleton spaces in C-Top. 3 Topological Categories For Poslat Topological Structures 3.1 Definition Of Topological Categories The definition of “A is topological w.r.t. category X and functor V ” comes from [1]; see commentary on this definition in [61]. These variations are also useful: 1. A is small topological w.r.t. category X and functor V if the indexing class for V -structured sources is always a set. 2. A is quasi-topological w.r.t. category X and functor V if the unique existence of the lifted morphism in the definition of initiality is replaced by existence. 3. A is c.e.m. topological w.r.t. category X and functor V if the V -structured source is collectionwise extremally monomorphic in the language of [49] or a mono-extremal source in the language of [1]. 4. A is essentially topological [small toplogical, quasi-topological, c.e.m. topological] w.r.t. category X and functor V if “unique initial V -lift” is replaced by the condition that initial V -lifts of the same V -structured source are isomorphic in the appropriate definitions above. 3.2 Examples Of Topological Categories In the following statements, the functor V is the forgetful functor, such a functor being obvious once the ground category is specified (using the word “over”). 184 Theorem [23, 61]. If L ∈ |Cqml|, then L-Top and L-FTop are topological over Set; if C ֒→ Loqml, then C-Top and C-FTop are topological over Set × C; and if C ֒→ Loqml, then C, C-HTop, CHFTop are topological over Set × C w.r.t. the forgetful functor of the previous theorem as modified by the embeddings given below of these categories into C-Top, C-Top, and C-FTop, respectively (so that Loc is topological in this way over Set × Loc). 3.3 Special Case Of Topological Systems In view of the motivation of topological systems and their relationship to variable-basis spaces given later, the behavior of TopSys is rather surprising. Theorem. TopSys is not topological over Set × Loc in any sense or with any modifier as defined above—V -structured sources comprising only one morphism need not even have lifts; TopSys is essentially small topological over Set—each small V -structured source has a initial lift that is unique up to isomorphism; and SobTopSys is essentially c.e.m. topological and essentially quasi-topological over Loc. Conjecture. TopSys is neither topological over Set nor over Loc. 3.4 Special Case Of Wang Topological Spaces Let C ֒→ Dmrgop . The problem with C-WTop is the lack so far of a well-defined ground category. It is therefore not known in what sense (if any) C-WTop is topological. 4 Relationships Between Categories For Poslat Topological Structures 4.1 Adjoint Pairs Between Top And L-Top The relationships between Top and L-Top may be classified as concrete or nonconcrete. 4.1.1 Concrete Adjunctions Between Top And L-Top Many of the concrete adjoint relationships between Top and L-Top can be unified by the concept of indexed families of mappings between the traditional and L-based fibres [48]. Fix X ∈ |Set| and L ∈ |SFrm|, and let TXL be the fibre of all traditional topologies on X and τXL be the fibre of all L-topologies on X. A pair of isotone maps FXL : TX → τXL , GXL : TX ← τXL is said to be an (L)fibre pair (of maps) and this fibre-pair is covariant [contravariant] if GXL ⊣ FXL [FXL ⊣ GXL ]. An indexed family {FXL , GXL }X ∈ |Set| of such maps is said to be an covariant [contravariant] indexed family of (L-)fibre pairs, and the following conditions can be considered: 1. Such a family joint-covariantly [joint-contravariantly] generated if ∀ X ∈ |Set| , ∃ a generator gXL : 2℘(X) ← LX [ fXL : 2℘(X) → LX ] 185 such that ∀T ∈ TX , ∀τ ∈ τXL , FXL (T) = h hhg← XL (↓(T))ii FXL (T) = hhg← XL (↓(T))ii , , GXL (τ) = ** [ gXL (u) u∈τ GXL (τ) = DDn[ ++ oEEi ← U : U ∈ fXL (τ) 2. A jointly-covariantly [jointly-contravariantly] generated family {FXL , GXL }X ∈ |Set| is joint-covariantly [joint-contravariantly] natural if ∀ X,Y ∈ |Set|, the diagram commutes: gXL ◦ fL← = ( f ← )→ ◦ gY L [ fXL ◦ ( f ← )→ = fL← ◦ fY L ] 3. An indexed family {FXL , GXL }X ∈ |Set| of fibre-pairs is separately generated if ∀ X ∈ |Set| , ∃ generators fXL : ℘(X) → LX , gXL : ℘(X) ← LX such that ∀T ∈ TX , ∀τ ∈ τXL , → (T)ii , FXL (T) = hh fXL GXL (τ) = hhg→ XL (τ)ii 4. A separately generated family {FXL , GXL }X ∈ |Set| of fibre-pairs is separately natural if these diagrams commute: fXL ◦ f ← = fL← ◦ fY L , gXL ◦ fL← = f ← ◦ gY L Examples. The characteristic and Martin Gχ , Mχ fibre maps [47, 61] comprise a joint-contravariantly natural family of fibre-pairs as well as a separately natural, contravariant family of fibre-maps; the Kubiak-Lowen ωL , ιL fibre maps [42, 34] comprise a joint-covariantly natural family of fibre-pairs; and the level fibre maps Fα , Sα [43, 51, 55, 61] comprise a joint-covariantly natural family of fibrepairs (α prime). Theorem. Let L ∈ |SFrm|, let {FXL , GXL }X ∈ |Set| be an indexed family of L-fibre pairs, and let the bi-level mappings F : Top → L-Top, G : Top ← L-Top be defined as follows: F (X, T) = (X, FXL (T)) , F (f) = f G (X, τ) = (X, GXL (τ)) , G( f ) = f 1. If {FXL , GXL }X ∈ |Set| is joint-covariantly natural, then F is a concrete functor, G is a concrete functor, and F ⊣ G. 2. If {FXL , GXL }X ∈ |Set| is joint-contravariantly natural, then F is a concrete functor, G is a concrete functor, and G ⊣ F. 3. If {FXL , GXL }X ∈ |Set| is separately natural covariant [contravariant], then F is a concrete functor, G is a concrete functor, and F ⊣ G [G ⊣ F]. Corollary. The examples and the theorem imply the Mχ ⊣ Gχ , ωL ⊣ ιL , Fα ⊣ Sα (α prime) adjunctions between Top and L-Top. 186 4.1.2 Non-Concrete Adjunctions Between Top And L-Top Examples of non-concrete adjunctions include the hypergraph functor [67, 43, 51, 9] and the adjunction based on it (assuming L a spatial frame) in [17, 18], as well as the adjunction based on the L-2 and 2-L soberification functors [62]. The role of the hypergraph functor in fuzzy addition and fuzzy multiplication can be seen in the references of [63], and the role of the soberification adjunction in building alternative fuzzy real lines and unit intervals can be seen in Sections 2 and 8 of [62].. 4.2 Embedding Of Fixed-Basis And Crisp Variable-Basis Into Fuzzy Variable-Basis Given L ∈ |C|, L-Top embeds into C-Top and L-FTop embeds into C-FTop by simply choosing φ = idL . The adjunction between C-Top and C-FTop (Section 6 of [61]) induces from an “indexed family of fibre pairs” which are an extension of the characteristic-Martin fibre pairs referenced above. V In this more general setting, given (X, L, τ) and (X, L, T ), Gχ (τ) = T ≥ χτ T and Mχ (T ) = coker(T ) . 4.3 Singleton Embeddings Of Point-Free And Wang Into Variable-Basis The embeddings of Loc, C ֒→ Loqml, C-HTop into C-Top and the embedding of C-HTop into CFTop are given in [54, 55, 61] and are all singleton functors making each point-free category isomorphic to a subcategory of singleton spaces.     To illustrate, Loc embeds into Loc-Top via A 7→ 1, A, A1 , [φ : A → B] 7→ (id, φ) : 1, A, A1 → 1, B, B1 . Letting S : Loc → Loc-Top be the embedding just described and Loc-Topsk be the full subcategory of stratified singleton spaces, S ⊣ Ω|Loc-Topsk ⊣ S, where Ω (X, L, τ) = τ and Ω ( f , φ) = [( f , φ)← ]op . It follows that S is an isomorphism onto Loc-Topsk and we should regard Loc as a special case of variable-basis point-set lattice-theoretic topology, namely Loc is a special case of singleton variablebasis topology or variable-basis topology of singleton spaces. From this point of view, point-free topology is not a generalization of topology, but rather the special and important case of singleton space topology which focuses on the lattice-theoretics of poslat topology. The case of C-WTop (with C ֒→ Dmrgop ) requires only a slight modification of the singleton functor embedding C-HTop into C-Top:   X 1 LX , τ → 7 1, L , τ , i    h  op   X 1   φ : LX , τ → MY , σ 7→ id, φ⊢ : 1, L , τ → 1, MY , σ1 This embedding means that the Wang approach is isomorphic to a subcategory of singleton spaces, despite the set exponent in Wang objects being non-singleton. Essentially, the Wang morphisms do not recognize these non-singleton sets and treats them as if they are singletons. Restated, the Wang approach is essentially point-free. For categories of the form C-WTop, it would seem that the mixed syntax, lack of a clearly defined ground category, and seeming lack of being a topological category are issues and questions that need resolution for this popular approach. 187 4.4 Embeddings Of Fixed-Basis Into Topological Systems [4] For many L ∈ |Frm|, there are simple embeddings of L-Top into TopSys. Fix L ∈ |Frm| such that L has a prime element α, and let (X, τ) ∈ |L-Top|. Note (X, τ) ∈ |Set × Loc|. Define |=τ,α on (X, τ) by putting ∀x ∈ X, u ∈ τ, x |=τ,α u ⇔ u (x) > α. Further, given f : (X, τ) → (Y, σ) ∈ L-Top, define the ground morphism ( f , ( fL← )op ) : (X, τ) → (Y, σ) in Set × Loc. Then Fα (X, τ) = (X, τ, |=τ,α ) , Fα ( f ) = ( f , ( fL← )op ) defines Fα as a functor from L-Top to TopSys which is an embedding. This generalizes the spatialization embedding of Top into TopSys of [75]. 4.5 Embedding Of Topological Systems Into Variable-Basis [4] The relationship between TopSys and Loc-Top is induced by another variety of maps between posets of structures. Let (X, A, |=) ∈ |TopSys| be given, put F (|=) = τ|=  ≡ u ∈ AX : (∀x ∈ X) (x |= u (x)) or (∀x ∈ X) (u (x) = ⊥)  F (X, A, |=) = X, A, τ|= , F ( f , φ) = ( f , φ). Then F : TopSys → Loc-Top is a functorial embedding. We note TopSys is isomorphic to a proper subcategory of Loc-Top since the latter is topological over Set × Loc and TopSys is not topological over Set × Loc and the forgetful functor from TopSys to Set × Loc factors through F and the forgetful functor from Loc-Top to Set × Loc. Given that each of Loc and Top embed into TopSys—the former [latter] by the localification [spatialization] functor of [75], we can now answer a long-standing question whether Loc-Top is the smallest supercategory, up to embedding, of Loc and Top: the answer is no, namely, Loc and Top embed properly into TopSys and TopSys embeds properly into Loc-Top. Finally, the fact that TopSys is not topological means that only in Loc-Top can the initial and final lifts of forgetful functor structured sources from TopSys be constructed. 5 Examples Of Objects And Morphisms For Poslat Topological Structures It is not sufficient to have topological categories. Such categories must also exhibit important examples of objects and morphisms justifying the study of such categories and the approaches to topology they represent. From [4, 8, 17, 18, 19, 23, 24, 30, 33, 34, 35, 36, 37, 38, 39, 44, 45, 50, 51, 55, 58, 59, 61, 62, 63, 64] and their bibliographies an inventory of many important examples can be constructed. Here is a sample of significant objects in poslat topology: 1. R(L) and I(L), for L a deMorgan quasi-monoidal lattice (which includes distributive and nondistributive deMorgan algebras). 2. R and I equipped with the dual L-topologies induced from R(L) and I(L) (L as above). 188 3. R∗ (L) and I∗ (L), the alternative L-fuzzy real line and L-fuzzy unit interval, formed by the L-2 soberification functor acting on R and I for any complete quasi-monoidal lattice (which includes all complete lattices)—and indeed each complete lattice A generates a canonical L-sober space LPT (A). 4. The space of probability measures on the Borel sets of a separable metric space, which gives a stratified, non-generated I-topological space. 5. Traditional limit spaces generate for each complete Heyting algebra a class of L-topological spaces. 6. I-rigid topological spaces constructed using τ-smooth Borel probability measures on ordinary spaces and Radon measures on ordinary compact Hausdorff spaces, constructions allowing Boolean negation to extend continuously to Łukasiewicz negation. 7. Each ordinary T1 space X with at most finitely many components generates an L-topological space X (L) for L ∈ |Hut| with ⊥ meet-irreducible such that if L = 2, X (L) is L-homeomorphic to Gχ (X), and if X = R or I, X (L) is L-homeomorphic to R (L) or I (L). 8. Variable-basis spaces generated from specific topological systems. Here is a sample of significant morphisms in poslat topology: 9. Fuzzy addition and fuzzy multiplication in R (L). 10. Fuzzy translation and fuzzy scaling (especially in light of the behavior of the inverse mappings of these maps) 11. Fuzzy addition as uniformly continuous 12. Units of adjunctions having universal lifting and extension properties, such as the L-continuous and variable-basis morphisms generated by compactification reflectors from any non-(Chang) compact space such as the canonical R(L), R∗ (L), (0, 1)(L), (0, 1)∗ (L), etc, catalogued above. 13. Extensions of important continuous maps. 14. The rich inventory of variable-basis morphisms between fuzzy real lines, between induced spaces, between soberifications, all with different underlying bases. Acknowledgements Dedicated to Prof. W. J. Kotzé upon his retirement from Rhodes University. Appreciation is expressed to Prof. Ritchey, Chair, Department of Mathematics and Statistics of Youngstown State University, for his support. References [1] J. Adámek, H. Herrlich, G. E. Strecker, Abstract And Concrete Categories: The Joy Of Cats, Wiley Interscience Pure and Applied Mathematics, John Wiley & Sons (Brisbane/Chicester/New York/Singapore/Toronto), 1990. 189 [2] C. L. Chang, Fuzzy topology, J. Math. Anal. Appl. 24(1968), 182–190. [3] C. De Mitri, C. Guido, Some remarks on fuzzy powerset operators, Fuzzy Sets and Systems 126(2002), 241–251. [4] J. Denniston, S. E. Rodabaugh, Relationships between topological systems and variable-basis topological spaces, in progress. [5] P. Eklund, Category theoretic properties of fuzzy topological spaces, Fuzzy Sets and Systems 13(1984), 303–310. [6] P. Eklund, A comparison of lattice-theoretic approaches to fuzzy topology, Fuzzy Sets and Systems 19(1986), 81–87. [7] P. Eklund, Categorical fuzzy topology, Doctoral Dissertation, (1986), Åbo Akademi (Turku, Finland). [8] T. E. Gantner, R. C. Steinlage, R. H. Warren, Compactness in fuzzy topological spaces, J. Math. Anal. Appl. 62(1978), 547–562. [9] G. Gerla, Representations of fuzzy topologies, Fuzzy Sets and Systems 11(1980), 103–113. [10] J. A. Goguen, L-fuzzy sets, J. Math. Anal. Appl. 18 (1967), 145–167. [11] J. A. Goguen, The fuzzy Tychonoff Theorem, J. Math. Anal. Appl. 43(1973), 734–742. [12] C. Guido, The subspace problem in the traditional point-set context of fuzzy topology, in [27], 351–372 . [13] C. Guido, Powerset operators based approach to fuzzy topologies on fuzzy sets, Chapter 15 in[66], pp. 401–413. [14] J. Gutiérrez García, M. A. de Prada Vicente, A. P. Šostak, A unified approach to the concept of fuzzy L-uniform space, Chapter 3 in [66], pp. 81–114. [15] U. Höhle, Uppersemicontinuous fuzzy sets and applications, J. Math. Anal. Appl. 78(1980), 659–673. [16] U. Höhle, Limit structures and many valued topology, J. Math. Anal. Appl. 251(2000), 549–556. [17] U. Höhle, Many Valued Topology And Its Applications, (Boston/Dordrecht/London), 2001. Kluwer Academic Publishers [18] U. Höhle, A note on the hypergraph functor, Fuzzy Sets and Systems 131(2002), 353–356. [19] U. Höhle, Many valued topologies and Borel probability measures, Chapter 4 in [66], pp. 115–135. [20] U. Höhle, S. E. Rodabaugh, eds, Mathematics Of Fuzzy Sets: Logic, Topology, And Measure Theory, The Handbooks of Fuzzy Sets Series, Volume 3(1999), Kluwer Academic Publishers (Boston/Dordrecht/London). [21] U. Höhle, S. E. Rodabaugh, Appendix to Chapter 6: weakening the requirement that L be a complete chain, in [66], pp. 189–197. [22] U. Höhle, A. P. Šostak, A general theory of fuzzy topological spaces, Fuzzy Sets and Systems 73(1995), 131–149. [23] U. Höhle, A. Šostak, Axiomatic foundations of fixed-basis fuzzy topology, Chapter 3 in [4], 123–272. [24] B. Hutton, Normality in fuzzy topological spaces, J. Math. Anal. Appl. 50(1975), 74–79. [25] B. Hutton, Products of fuzzy topological spaces, Topology Appl. 11(1980), 59–67. [26] P. T. Johnstone, Stone Spaces, Cambridge University Press (Cambridge), 1982. [27] W. Kotzé, ed., Special Issue, Quaestiones Mathematicae 20(3)(1997). [28] W. J. Kotzé, Lifting of sobriety concepts with particular reference to (L, M)-topological spaces, Chapter 16 in [66], pp. 415–426. 190 [29] W. Kotzé, T. Kubiak, Fuzzy topologies of Scott continuous functions and their relation to the hypergraph functor, Quastiones Mathematicae 15(1992), 175–187. [30] W. Kotzé, T. Kubiak, Inserting L-fuzzy real-valued functions, Math. Japon. 164(1993), 5–11. [31] T. Kubiak, On Fuzzy Topologies, Doctoral Dissertation, Adam Mickiewicz University (Poznan, Poland), 1985. [32] T. Kubiak, Extending continuous L-real functions, Math. Japon. 31(1986), 875–887. [33] T. Kubiak, L-fuzzy normal spaces and Tietze extension theorem, J. Math. Anal. Appl. 125(1987), 141–153. [34] T. Kubiak, The topological modification of the L-fuzzy unit interval, Chapter 11 in [65], 275–305. [35] T. Kubiak, A strengthening of the Katětov-Tong insertion theorem, Comment. Math. Univ. Carolinae 34(1993), 357–362. [36] T. Kubiak, On L-Tychonoff spaces, Fuzzy Sets and Systems 73(1995), 25–53. [37] T. Kubiak, The fuzzy Brouwer fixed-point theorem, J. Math. Anal. Appl. 222(1998), 62–66. [38] T. Kubiak, Separation Axioms: Extensions of Mappings and Embedding of Spaces, Chapter 6 in [20], 433–479. [39] T. Kubiak, Fuzzy reals: topological results surveyed, Brouwer fixed point theorem, open questions, Chapter 3 in [66], pp. 137–151. [40] T. Kubiak, A. P. Šostak, Lower set-valued fuzzy topologies, in [27], 423-429. [41] Liu Ying-Ming and Luo Mao-Kang, Fuzzy Topology, 1997 (Chinese), 1998 (English), World Scientific Publishing (Singapore). [42] R. Lowen, Fuzzy topological spaces and fuzzy compactness, J. Math. Anal. Appl. 56(1976), 621–633. [43] R. L. Lowen, A comparison of different compactness notions in fuzzy topological spaces, J. Math. Anal. Appl. 64(1978), 446–454. [44] R. Lowen, On the existence of natural fuzzy topologies on spaces of probability measures, Math. Nachr. 115(1984), 33–57. [45] R. Lowen, The order aspect of the fuzzy real line, Manuscripta Math. 49(1985), 293–309. [46] E. G. Manes, Algebraic Theories, Springer Verlag (Berlin/Heidelberg/New York), 1976. [47] H. W. Martin, Weakly induced fuzzy topological spaces, J. Math. Anal. Appl. 78(1980), 634–639. [48] C. Ostheimer, S. E. Rodabaugh, Concrete categorial adjunctions induced from families of fibre maps, in progress. [49] A. Pultr, S. E. Rodabaugh, Lattice-valued frames, functor categories, and classes of sober spaces, Chapter 6 in [66], pp. 153–187. [50] A. Pultr, S. E. Rodabaugh, Examples for different sobrieties in fixed-basis topology, Chapter 17 in [66], pp. 427–440. [51] S. E. Rodabaugh, The Hausdorff separation axiom for fuzzy topological spaces, Topology and its Applications 11(1980), 319–334. [52] S. E. Rodabaugh, A categorical accommodation of various notions of fuzzy topology: preliminary report, in E. P. Klement, ed, Proceedings of the Third International Seminar on Fuzzy Set Theory 3(1981), 119– 152, Johannes Kepler Universitätsdirektion, Linz (Austria). [53] S. E. Rodabaugh, A categorical accommodation of various notions of fuzzy topology, Fuzzy Sets and Systems 9(1983), 241–265. 191 [54] S. E. Rodabaugh, A point set lattice-theoretic framework T which contains LOC as a subcategory of singleton spaces and in which there are general classes of Stone representation and compactification theorems, first draft February 1986 / second draft April 1987, Youngstown State University Central Printing Office (Youngstown, Ohio). [55] S. E. Rodabaugh, Point-set lattice-theoretic topology, Fuzzy Sets and Systems 40(1991), 297–345. [56] S. E. Rodabaugh, Categorical frameworks for Stone representation theorems, Chapter 7 in [65], 178-231. [57] S. E. Rodabaugh, Necessity of Chang-Goguen topologies, Rendiconti Circolo Matematico Palermo Suppl., Serie II 29(1992), 299-314. [58] S. E. Rodabaugh, Applications of localic separation axioms, compactness axioms, representations, and compactifications to poslat topological spaces, Fuzzy Sets and Systems 73(1995), 55–87. [59] S. E. Rodabaugh, Powerset operator based foundation for point-set lattice-theoretic (poslat) fuzzy set theories and topologies, in [27], 463–530. [60] S. E. Rodabaugh, Powerset operator foundations for poslat fuzzy set theories and topologies, Chapter 2 in [4], 91–116. [61] S. E. Rodabaugh, Categorical foundations of variable-basis fuzzy topology, Chapter 4 in [4], 273–388. [62] S. E. Rodabaugh, Separation axioms: representation theorems, compactness, and compactifications, Chapter 7 in [4], 481–552. [63] S. E. Rodabaugh, Fuzzy real lines and dual real lines as poslat topological, uniform, and metric ordered semirings with unity, Chapter 10 in [4], pp. 607–632. [64] S. E. Rodabaugh, Axiomatic foundations for uniform operator quasi-uniformities, Chapter 7 in [66], pp. 199–233. [65] S. E. Rodabaugh, E. P. Klement, U. Höhle, eds, Application Of Category Theory To Fuzzy Sets, Theory and Decision Library—Series B: Mathematical and Statistical Methods 14(1992), Kluwer Academic Publishers (Boston/Dordrecht/London). [66] S. E. Rodabaugh, E. P. Klement, eds, Topological And Algebraic Structures In Fuzzy Sets: A Handbook of Recent Developments in the Mathematics of Fuzzy Sets, Trends in Logic 20(2003), Kluwer Academic Publishers (Boston/Dordrecht/London). [67] E. S. Santos, Topology versus fuzzy topology, preprint, Youngstown State University (1977). [68] D. S. Scott, C. Strachey, Towards a mathematical semantics for computer languages, in J. Fox, ed, Proceedings of the Symposium on Computers and Automata, Polytechnic Institute of Brooklyn Press (New York, 1971), 19–46; and Technical Monograph PRG-6, Programming Research Group, University of Oxford (1971). [69] M. Smyth, Powerdomains and predicate transformers: a topological view, in J. Diaz, ed, Automata, Languages, and Programming, Lectures Notes in Computer Science 154(1983), 662–675, Springer Verlag (Berlin/Heidelberg/New York). [70] M. Smyth, Quasi-uniformities: reconciling domains with metric spaces, M. Main, et al, eds, Mathematical Foundations of Programming Language Semantics, Lectures notes in Computer Science 288(1988), 236– 253, Springer Verlag (Berlin/Heidelberg.New York). [71] A. P. Šostak, On a fuzzy topological structure, Suppl. Rend. Circ. Matem. Palermo, sr. II, 11(1985), 89103. [72] A. Šostak, Towards the concept of a fuzzy category, Acta Univ. Latviensis (ser. Math.) 562(1991), 85–94. [73] A. Šostak, Fuzzy categories related to algebra and topology, Tatra Mount. Math. Publ. 16(1999), 159– 186. 192 [74] A. P. Šostak, On some fuzzy categories related to the category L-Top of L-topological spaces, Chapter 12 in [66], pp. 337–372. [75] S. Vickers, Topology Via Logic, Cambridge Tracts in Theoretical Computer Science 5(1989), reprinted 1990, paperback 1996, Cambridge University Press (Cambridge/Melbourne/New York). [76] G. Wang, Order-homomorphism on fuzzes, Fuzzy Sets and Systems 12(1984), 281–288. [77] G. Wang, Theory Of L-Fuzzy Topological Spaces, in Chinese, Shaanxi Normal University Press (Xi’an, 1988). [78] G. Wang, Theory Of Topological Molecular Lattices, in Chinese, Shaanxi Normal University Press (Xi’an, 1990). [79] L. A. Zadeh, Fuzzy sets, Information and Control 8(1965), 338–353. 193 A bridge between fuzzy set theory and coherent conditional probabilities (I) ROMANO S COZZAFAVA Dip. Metodi e Modelli Matematici Univ. “La Sapienza” 00161 Roma, Italy E-mail: r♦♠s❝♦③③❅❞♠♠♠✳✉♥✐r♦♠❛✶✳✐t In this talk (strictly linked with that by Giulianella Coletti with the same title) we expound our interpretation of fuzzy set theory (both from a semantic and a syntactic point of view) in terms of conditional events and coherent conditional probabilities. During past years, many papers have been devoted to support the negative view maintaining that probability is inadequate to capture what is usually treated by fuzzy theory. In our approach we emphasize the role of conditioning (in a proper framework, i.e. de Finetti’s coherence) to get rid of many controversial aspects. Moreover, we introduce suitable operations between fuzzy subsets, looked on as corresponding operations between conditional events endowed with the relevant conditional probability. Let us start from the intuitive idea of fuzzy subset: where does it come from and what is its “operational” meaning? We will refer to the state of information (at a given moment) of a real (or fictitious) person (for instance, a “randomly” chosen one) that will be denoted by “You”. If X is a (not necessarily numerical) random quantity with range CX , let Ax , for any x ∈ CX , be the event {X = x}. The family {Ax }x∈Cx is obviously a partition of the certain event Ω = CX . Now, let ϕ be any property related to the random quantity X : from a pragmatic point of view, it is natural to think that You have some information about possible values of X, which allows You to refer to a suitable membership function of the fuzzy subset of “elements of CX with the property ϕ”. For example, if X is a numerical quantity, for You the membership function may be put equal to 1 for values of X less than a given x1 , while it is put equal to 0 for values greater than x2 ; then it is taken as decreasing from 1 to 0 in the interval from x1 to x2 : this choice of the membership function implies that, for You, elements of CX less than x1 have the property ϕ, while those greater than x2 do not. So the real problem is that You are uncertain on having or not the property ϕ those elements of CX between x1 and x2 . Then the interest is in fact directed toward conditional events such as E|Ax , where x ranges over the interval from x1 to x2 , with E ={You claim the property ϕ}, Ax ={the value of X is x}. It follows that You may assign a subjective probability P(E|Ax ) equal, e.g., to 0.2 without any need to assign a degree of belief of 0.8 to the event E under the assumption Acx (i.e., the value of X is not x), since an additivity rule with respect to the conditioning events does not hold. In other words, it seems sensible to identify the values of the membership function with suitable conditional probabilities. In particular, putting 194 Ho ={the value of X is greater than x2 }, H1 ={the value of X is less than x1 }, we may assume that E and Ho are incompatible and that H1 implies E, so that, by the properties of a conditional probability, P(E|Ho ) = 0 and P(E|H1 ) = 1. Notice that the conditional probability P(E|Ax ) has been directly introduced as a function on the set of conditional events (and without assuming any given algebraic structure). Is that possible? In the usual (Kolmorogovian) approach to conditional probability the answer is NO, since the introduction of P(E|Ax ) would require the consideration (and the assessment) of P(E ∧ Ax ) and P(Ax ) (assuming positivity of the latter). But this is a not a simple task: in fact in this context the only sensible procedure is to assign directly P(E|Ax ) . For example, to assign the (conditional) probability that You claim “Mary is young” knowing her age x, but not that of “the probability that Mary has the age x” (not to mention that, for different choices of the random quantity X , the corresponding probability can be zero). The probabilistic approach adopted here differs radically from the usual theory based on a measuretheoretic framework, which assumes that a unique probability measure is defined on an algebra (or σ-algebra) of events constituting the so-called sample space Ω. Directing attention to events as subsets of the sample space (and to algebras of events) may be unsuitable for many real world situations, which make instead very significant both giving events a more general meaning and not assuming any specific structure for the set where probability is assessed. Probability is seen as a measure of belief in a given proposition. Notice that a proposition – which can be either true or false – must not be looked on as an assertion: so, even if beliefs may come from various sources, they can be treated in the same way, since the relevant events (including possibly statistical data) need always to be considered (going back to a terminology due to Koopman) as being contemplated (or, similarly, assumed) and not asserted propositions. This aspect is very crucial, since in our approach an essential role is played by conditioning: in fact the very concept of conditional probability is deeper than the usual restrictive view emphasizing P(E|H) only as a probability for each given H (looked on as a given fact). Regarding instead also the conditioning event H as a “variable”, we get something which is not just a probability (notice that H also – like E – plays the role of an uncertain event whose truth value is not necessarily given and known). Our probabilistic framework is that based on the concept of conditional event and on the ensuing concept of coherent conditional probability. Our concept of conditional events differs from those adopted by many others in the relevant literature. Actually, in [1] we showed that, if we do not assign the same “third value” t(E|H) = u (undetermined) to all conditional events, but make it suitably depend on E|H, it turns out that this function t(E|H) can be taken as a general conditional uncertainty measure (and conditional probability corresponds to a particular choice of the relevant operations between conditional events). Then a conditional probability P(E|H) can be – through coherence – directly introduced and it is not defined as the ratio of the (unconditional) probabilities P(E ∧ H) and P(H), assuming positivity of the latter. This allows to deal with conditioning events of zero probability, avoiding to resort, as in the classic approach, to the Radon-Nikodym framework, which (rather than make conditional probability just depend on the given conditioning event) requires the knowledge of the whole conditioning distribution, a situation which is clearly unsound and contradicts the “inferential” meaning of a conditional event. 195 Finally, among the peculiarities of the concept of coherent conditional probability versus the usual one, we underline the possibility for P(E|H) of assuming the extreme values 0 and 1 also for situations which are different, respectively, from the trivial ones E ∧ H = 0/ and H ⊆ E ; moreover, we emphasize the “natural” looking at the conditional event E|H as “a whole”, and not separately at the two events E and H. A complete account of probabilistic logic in a coherent setting is in the book [2]. We just mention that a coherent conditional probability can be characterized by suitably representing it by means of a class {Pα } of unconditional probabilities giving rise to the so-called zero-layers (for details, see [2], p.81). In particular, given a family C of conditional events {Ei |Hi }i∈I , where card(I) is arbitrary and the events Hi ’s are a partition of Ω, we recall the following two corollaries of the aforementioned characterization theorem: (A) Any function f : C → [0, 1] such that f (Ei |Hi ) = 0 if Ei ∧ Hi = 0/ and f (Ei |Hi ) = 1 if Hi ⊆ Ei is a coherent conditional probability. (B) If P(·|·) is a coherent conditional probability such that P(E|Hi ) ∈ {0, 1}, then the following two statements are equivalent (i) P(·|·) is the only coherent assessment on C ; (ii) it is Hi ∧ E = 0/ for every Hi ∈ Ho and Hi ⊆ E for every Hi ∈ H1 , where Hr = {Hi : P(E|Hi ) = r} , r = 0, 1 . The results that follow are taken from [3]. Let ϕ be any property related to the random quantity X : notice that a property, even if expressed by a statement, does not single–out an event, since the latter needs to be expressed by a nonambiguous proposition that can be either true or false. Consider now the event Eϕ = “You claim ϕ ” and a coherent conditional probability P(Eϕ |Ax ), looked on as a real function µEϕ (x) = P(Eϕ |Ax ) defined on CX . Since the events Ax are incompatible, then – by (A) – every µEϕ (x) with values in [0, 1] is a coherent conditional probability. So we can define a fuzzy subset in this way: Given a random quantity X with range CX and a related property ϕ, a fuzzy subset Eϕ∗ of CX is the pair Eϕ∗ = {Eϕ , µEϕ }, with µEϕ (x) = P(Eϕ |Ax ) for every x ∈ CX . So a coherent conditional probability P(Eϕ |Ax ) is a measure of how much You, given the event Ax = {X = x}, are willing to claim the property ϕ , and it plays the role of the membership function of the fuzzy subset Eϕ∗ . Notice also that (as already remarked above) the significance of the conditional event Eϕ |Ax is reinforced by looking on it as “a whole”, avoiding a separate consideration of the two propositions Eϕ and Ax . Obviously, a fuzzy subset Eϕ∗ is a crisp set when there is only a coherent assessment µEϕ (x) = P(Eϕ |Ax ) with range {0, 1}. Then, by property (B) above, a fuzzy subset Eϕ∗ is a crisp set when the property ϕ is such that, for every x ∈ CX , either Eϕ ∧ Ax = 0/ or Ax ⊆ Eϕ . 196 Given two fuzzy subsets Eϕ∗ , Eψ∗ , corresponding to the random quantities X and Y (possibly X = Y ), assume that, for every x ∈ CX and y ∈ CY , both the following equalities hold (1) P(Eϕ |Ax ∧ Ay ) = P(Eϕ |Ax ) , P(Eψ |Ax ∧ Ay ) = P(Eψ |Ay ) , with Ay = {Y = y}. The definitions of the binary operations of union and intersection and that of complementation are as follows: Given two fuzzy subsets (respectively, of CX and CY ) Eϕ∗ and Eψ∗ , put Eϕ∗ ∪ Eψ∗ = {Eϕ∨ψ , µEϕ∨ψ } , Eϕ∗ ∩ Eψ∗ = {Eϕ∧ψ , µEϕ∧ψ } , (Eϕ∗ )′ = {E¬ϕ , µE¬ϕ } , where (by a fairly improper notation) ϕ ∨ ψ , ϕ ∧ ψ denote, respectively, the properties “ϕ or ψ ” , “ϕ and ψ ” , and Eϕ∨ψ = Eϕ ∨ Eψ , Eϕ∧ψ = Eϕ ∧ Eψ , while µEϕ∨ψ and µEϕ∧ψ are defined on CXY = CX ×CY by putting µEϕ∨ψ (x, y) = P(Eϕ ∨ Eψ |Ax ∧ Ay ) , µEϕ∧ψ (x, y) = P(Eϕ ∧ Eψ |Ax ∧ Ay ) . The conditional event (Eϕ ∨ Eψ )|(Ax ∧ Ay ) is true iff Ax ∧ Ay and Eϕ ∨ Eψ are both true: and the latter event is true, by definition of disjunction, when at least one of the two events is true, that is when “You claim ϕ” or when “You claim ψ”. On the other hand, Eϕ∨ψ is true when “You claim ϕ or ψ”, and this requires to put Eϕ∨ψ = Eϕ ∨ Eψ . Similar considerations apply to the events Eϕ∧ψ and Eϕ ∧ Eψ . Notice also the following relation: E¬ϕ 6= (Eϕ )c , where (Eϕ )c denotes the contrary of the event Eϕ (while the equality holds only for a crisp set); for example, the propositions “You claim not young” and “You do not claim young” are logically independent. Then, while Eϕ ∨ (Eϕ )c = CX , we have instead Eϕ ∨ E¬ϕ ⊆ CX . We could also introduce the tautological property T = ϕ ∨ ¬ϕ (for any ϕ ), which satisfies (trivially) the relation ET ⊆ Ω , and the void property V = ϕ ∧ ¬ϕ (for any ϕ ), which satisfies the relation EV 6= 0/ . Therefore, if we consider the union of a fuzzy subset and its complement Eϕ∗ ∪ (Eϕ∗ )′ = {Eϕ∨¬ϕ , µEϕ∨¬ϕ } we obtain in general a fuzzy subset of (the universe) CX . On the other hand, it is easy to check that the complement of a crisp set is also a crisp set: in fact, from Eϕ ∧ Ax = 0/ it follows Ax ⊆ (Eϕ )c = E¬ϕ , and from Ax ⊆ Eϕ it follows (Eϕ )c ∧ Ax = 0/ , that is E¬ϕ ∧ Ax = 0/ . Consider now two fuzzy subsets Eϕ∗ and Eψ∗ : the rules of conditional probability give, taking into account (1), (2) P(Eϕ ∨ Eψ |Ax ∧ Ay ) = P(Eϕ |Ax ) + P(Eψ |Ay ) − P(Eϕ ∧ Eψ |Ax ∧ Ay ) . Therefore, to evaluate P(Eϕ ∨ Eψ |Ax ∧ Ay ) it is necessary (and sufficient) to know also the value of the conditional probability p = P(Eϕ ∧ Eψ |Ax ∧ Ay ), and vice versa. By resorting to the theorem characterizing coherent conditional probability assessments, it is not difficult to prove that the only constraint for the value of p is max{P(Eϕ |Ax ) + P(Eψ |Ay ) − 1 , 0} ≤ p ≤ min{P(Eϕ |Ax ), P(Eψ |Ay )} . Three possible choices for the value of the conditional probability p give rise to different wellknown (see, e.g., [4]) t-norms and t-conorms : 197 (a) give p the maximum possible value, that is p = min{P(Eϕ |Ax ), P(Eψ |Ay )} ; then in this case we necessarily obtain, by (2), that P(Eϕ ∨ Eψ |Ax ∧ Ay ) = max{P(Eϕ |Ax ), P(Eψ |Ay )}. This assignment corresponds to the choice of the so-called TM and SM as T -norm and T -conorm. (b) give p the minimum value, that is max{P(Eϕ |Ax ) + P(Eψ |Ay ) − 1 , 0} , i.e. the Łukasiewicz T-norm. In this case we necessarily obtain, again by (2), that P(Eϕ ∨ Eψ |Ax ∧ Ay ) = min{P(Eϕ |Ax ) + P(Eψ |Ay ) , 1} i.e. the Łukasiewicz T-conorm. (c) give p the value P(Eϕ |Ax )P(Eψ |Ay ) , that is assume that Eϕ is stochastically independent of Eψ given Ax ∧ Ay . In this case we necessarily obtain P(Eϕ ∨ Eψ |Ax ∧ Ay ) = P(Eϕ |Ax ) + P(Eψ |Ay ) − P(Eϕ |Ax )P(Eψ |Ay ) , i.e. the so-called probabilistic sum SP and product TP . References [1] G. Coletti and R. Scozzafava, “From conditional events to conditional measures: a new axiomatic approach”. Annals of Mathematics and Artificial Intelligence, 32: 373–392, 2001. [2] G. Coletti and R. Scozzafava, Probabilistic Logic in a Coherent Setting, Dordrecht, Kluwer, 2002. [3] G. Coletti and R. Scozzafava, “Conditional probability, fuzzy sets and possibility: a unifying view”, Fuzzy Sets and Systems, to appear. [4] E. P. Klement, R. Mesiar, E. Pap, Triangular Norms, Dordrecht, Kluwer, 2000. 198 Fuzzy group in a natural interpretation M AMORU S HIMODA Shimonoseki City University Shimonoseki 751-8510, Japan E-mail: ♠❛♠♦r✉✲s❅s❤✐♠♦♥♦s❡❦✐✲❝✉✳❛❝✳❥♣ We present a natural interpretation of fuzzy groups in a cumulative Heyting valued model for intuitionistic set thoery. With the interpretation we can deduce the essential part of the definitions of fuzzy groups in the literature. In the natural interpretation fuzzy sets and fuzzy relations are interpreted as sets and relations in the model. Membership functions are related to fuzzy sets by using the canonical embedding from the class of all crisp sets into the model, which assigns each crisp set to its check set. We can deduce most of the standard equations or inequalities of definitions or properties on the basic concepts of fuzzy sets or fuzzy relations ([3]). Fuzzy mappings are interpreted as mappings in the same model, and we can obtain a characterization of fuzzy mappings with membership functions, which is different from all known definitions. The meaning of the extension princilple by Zadeh is made clear with the interpretation of fuzzy mappings ([5]). We can also consider notions such as operations of fuzzy subsets of different universes, fuzzy relations and mappings between fuzzy subsets ([2]). Moreover fuzzy equivalence relations and corresponding fuzzy partitions can be naturally considered with the interpretation ([4]). Therefore, as far as fuzzy sets, fuzzy relations, etc. are considered as extensions of crisp sets, relations etc., this interpretation seems to be most natural. In the following we first recall briefly some properties on the canonical embedding and fuzzy mappings, then we consider fuzzy subgroups of a crisp group and present a characterization of fuzzy subgroup with membership functions, which is almost the same as the defining equations in the literature. Our interpretation has its origin from [1], where the interpretation is applied only to elements of a group. Let H be a complete Heyting algebra and V H be the cumulative H-valued model. The Heyting value kϕk is defined for every sentence ϕ of V H . For u, v ∈ V H , u and v are similar iff ku = vk = 1. For every crisp set x in V , x̌ ∈ V H is defined recursively by: D(x̌) = {y̌; y ∈ x}, E x̌ = 1, x̌ : y̌ 7−→ 1. We call x̌ the check set of x. The check set of a pair (resp. an ordered pair or a cartesian product) of crisp sets is exactly identical with the pair (resp. the ordered pair or the cartesian product) of the check sets of the crisp sets. Proposition 1. Suppose ϕ(a1 , · · · , an ) is a bounded formula of V H and x1 , · · · , xn ∈ V . Then ϕ(x1 , · · · , xn ) holds ¬ϕ(x1 , · · · , xn ) holds iff iff kϕ(x̌1 , · · · , x̌n )k = 1, and kϕ(x̌1 , · · · , x̌n )k = 0. 199 Basic operations such as intersection, union, and complement of sets, composition and inverse of relations (and mappings) are naturally defined in the model. Every set A in V H is called an H-fuzzy set, and for a crisp set X every subset in V H of the check set X̌ is called an H-fuzzy subset of X. The mapping µA : X −→H; x 7−→ k x̌∈ A k is called the membership function of A on X. There is a natural correspondence between H-fuzzy subsets of X and mappings from X to H, which preserves order and basic set operations. An H-fuzzy subset R of X × Y is called an H-fuzzy relation from X to Y . An H-fuzzy mapping from X to Y is a mapping from X̌ to Y̌ in V H . Lemma 2. Let ϕ : X −→ Y be a crisp mapping between crisp sets. Then the check set ϕ̌ is an H-fuzzy mapping from X to Y , and ϕ̌(x̌) is similar to the check set of ϕ(x) for every x ∈ X. In the model various algebras such as groups, rings etc. can be considered. Here a crisp group means a crisp set which is a group with suitable operations. Then the canonical embedding preserves the group structre as following. Proposition 3. For every set G, G is a crisp group iff Ǧ is a group in V H . The check sets of the operations (multiplication, inverse, and unit) on G become the corresponding operations on the check set Ǧ by Proposition 1 and Lemma 2. Since the axioms of group are bounded, Proposition 1 is used in the proof. For a crisp group G, a set K in V H is called an H-fuzzy subgroup of G if kK is a subgroup of Ǧk = 1. Obviously an H-fuzzy subgroup of G is an H-fuzzy subset of G. Theorem 4. Let G be a crisp group with the unit e, K be an H-fuzzy subset of Ǧ, and µK be the membership function of K on G. Then K is an H-fuzzy subgroup of G iff it satisfies the following three conditions: (1) µK (x) ∧ µK (y) ≤ µK (xy) (∀x, y ∈ X), (2) µK (x) ≤ µK (x−1 ) (∀x ∈ X), (3) µK (e) = 1. In general, a subgroup K of a group G is normal iff xy ∈ K implies yx ∈ K for every x, y ∈ G. Then in the theorem K is a normal subgroup of Ǧ in V H iff it additionally satisfies the following condition: (4) µK (xy) = µK (yx) (∀x, y ∈ X). Theorem 5. Let G be a crisp group with the unit e and µ be a crisp mapping from G to H. Suppose µ satisfies the following three conditions: (1) µ(x) ∧ µ(y) ≤ µ(xy) (∀x, y ∈ X), (2) µ(x) ≤ µ(x−1 ) (∀x ∈ X), (3) µ(e) = 1. Then there is an H-fuzzy subgroup K of G such that µ = µK , where µK is the membership function of K on G. 200 In the theorem if µ also satisfies the following condition: (4) µ(xy) = µ(yx) (∀x, y ∈ X), then the H-fuzzy subgroup K becomes normal. References [1] H. Kodera, [0,1]-valued sheaf model of an intuitionistic set theory and fuzzy groups, Bulletin of Aichi Univ. of Education, 44 (Natural Science), 9-23, 1995. [2] M. Shimoda, A natural interpretation of fuzzy set theory, in: M.J. Smith, W.A. Gruver, L.O. Hall (Eds.), Proceedings of Joint 9th IFSA World Congress and 20th NAFIPS International Conference, 493-498, 2001. [3] M. Shimoda, A natural interpretation of fuzzy sets and fuzzy relations, Fuzzy Sets and Systems, 128(2), 135-147, 2002. [4] M. Shimoda, Fuzzy equivalence in a natural interpretation, in: T. Bilgic and B.D. Baets (Eds.), IFSA 2003: Proceedings of the 10th IFSA World Congress, 23-26, 2003. [5] M. Shimoda, A natural interpretation of fuzzy mappings, Fuzzy Sets and Systems, 138(1), 67-82, 2003. 201 On many-valued topologies on L-powersets of many-valued sets A LEXANDER Š OSTAK University of Latvia 1586 Rı̄ga, Latvia E-mail: s♦st❛❦s❅❧❛t♥❡t✳❧✈ Let M = (M, ≤, ∧, ∨, ∗) be a GL-monoid with universal upper and lower bounds 1 and 0 resp. and let 7→ : E × E −→ E be the corresponding residuation. Following U. Höhle [1] by a (global) M-valued equality on a set X we call a mapping E : X × X −→ M such that: 1. E(x, x) = 1 ∀x ∈ X; 2. E(x, y) = E(y, x) ∀x, y ∈ X; 3. E(x, y) ∗ E(y, z)) ≤ E(x, z) ∀x, y, z ∈ X. An M-valued equality E is called separated if E(x, y) = 1 implies x = y. In case E satisfies at least the first two of these conditions, it will be called an M-valued similarity relation. A many-valued, or an M-valued set is a pair (X, E) where X is a set and E is an M-valued equality on it. Let SET(M) denote the category whose objects are M-valued sets and whose morphisms are mappings f : (X, EX ) −→ (Y, EY ) s.t. EX (x, x′ ) ≤ EY ( f (x), f (x′ )) for all x, x′ ∈ X (cf [1]), and let SET(Ms ) denote its full subcategory consisting of separated M-valued sets. In some cases we restrict the set of values which E can accept by a complete submonoid K ⊂ M. The corresponding full subcategory of SET(M) is denoted by SET(M, K). Further, let L be a complete sublattice of M. An L-subset A of (X, E) is called extensional if A(x) ∗ E(x, x′ ) ≤ A(x′ ) for all x, x′ ∈ X. Let LX (resp. L(X,E) ) denote the family of all (resp. all extensional) L-subsets of X. Given L-subsets A, B of X we define the degree of similarity as follows:  ^ _ E (A, B) = I (A, B) ∧ I (B, A) where I (A, B) := A(x)7→ (E(x, x′ ) ∗ B(x′ )) . x x′ Proposition 1. The mapping E : LX × LX −→ M thus defined is an M-valued similarity relation on LX and its restriction to L(X,E) is an M-valued equality. Note that if E is crisp and L = M = K, then E is the natural equality relation on LX considered in [3, p. 157]. On the other hand for any M-valued equality E the induced M-valued equality E when restricted to L(X,E) also coincides with the natural equality. Given a morphism f : (X, EX ) −→ (Y, EY ) in SET(M) let f −→ : LX −→ LY be the corresponding (forward) L-powerset operator (see e.g. [5]). Proposition 2. If f : (X, EX ) −→ (Y, EY ) is a morphism in SET(M) and L is completely distributive, then EX (A, B) ≤ EY f −→ (A), f −→ (B) ∀A, B ∈ LX . 202 Proposition 3. If f : (X, EX ) −→ (Y, EY ) is a morphism in SET(M, K) and C, D ∈ L(X,E) , then EY (C, D) ≤ EX (C ◦ f , D ◦ f ). Proposition 4. Let f : (X, EX ) −→ (Y, EY ) be a morphism in SET(M, K) and L be completely distributive. Then for any extensional L-sets A, B ∈ L(X,E) it holds f → (A) ∗ E (A, B) ≤ f → (B). Let L-SET(M, K) denote the category whose objects are quadruples (X, E, LX , E ) where (X, E) ∈ O ⌊(SET(M, K)), LX is the L-powerset of X and E is the similarity relation on LX induced by E and whose morphisms are pairs ( f , f → ) where f : (X, EX ) −→ (Y, EY ) is a morphism in SET(M, K) and f → : (LX , EX ) −→ (LY , EY ) is the corresponding powerset operator. Further, let EL-SET(M, K) be the full subcategory of L-SET(M, K) whose objects are of the form (X, E, L(X,E) , E ). Theorem 5. By assigning to an M-valued set (X, E) the quadruple ΦL (X, E) := (X, E, LX , E ) and assigning to a morphism f : (X, EX ) −→ (Y, EY ) the pair ΦL ( f ) := ( f , f → ) we define a functor ΦL : SET(M, K) −→ L − SET(M, K). Besides, if A, B ∈ L(X,E) , then ΦL ( f )(A) ∗ E (A, B) ≤ ΦL ( f )(B). The forgetful functor ΨL : L − SET(M, K) −→ SET(M, K) defined by ΨL (X, E, LX ) = (X, E) on objects and ΨL ( f , f → ) = f on morphisms is obviously left inverse of ΦL . Recall that an M-valued topology on the L-powerset LX or an (L, M)-topology on a set X for short is a mapping T : LX −→ M such that 1. T (0X ) = T (1X ) = 1; 2. T (U ∧V ) ≥ T (U) ∧ T (V ) ∀U,V ∈ LX ; W 3. T ( i∈I (Ui ) ≥ V i∈I T (Ui ) ∀{Ui | i ∈ I} ⊂ LX . A mapping f : (X, TX ) −→ (Y, TY ) is called continuous if TX (V ◦ f ) ≥ TY (V ) ∀V ∈ LY . Theory of M-valued L-topologies in case when E is crisp (and mostly when M = L) was developed in [3], [2], [4], and in other works. Since in our case the ground categories L − SET(M, K) and EL − SET(M, K) are defined on the basis of many-valued sets (X, E), our pricipal interest concerns extensional topologies, that is topologies such that T (U) ∗ E (U,V ) ≤ T (V ) ∀U,V ∈ LX (resp.U,V ∈ L(X,E) ). Sometimes we restrict the codomain of T by a complete sublattice N of M. [Lattices of (L, N)-topologies] Let (X, E) be an object of SET(M, K) and let TKM (L, N, X) denote the family of all (L, N)-topologies on it. Let T1  T2 iff T1 (A) ≤ T2 (A) for all A ∈ LX . Then TKM (L, N, X) endowed with relation  becomes a complete lattice, its upper bound and lower bounds are respectively the discrete and indiscrete (L, N)-topologies Tdis and Tind Further, since intersection of a family of extensional (L, N)-topologies is extensional, the family ETKM (L, N, X) of all extensional (L, N)-topologies on (X, E) is a complete sublattice of TKM (L, N, X). [Generation of (L, N)-topologies] Given (X, E) ∈ O ⌊(SET(M, K)) and a mapping S : LX −→ N let TS (resp. ETS ) denote the family of all (resp. all extensional) (L, N)-topologies on (X, E) such that 203 for all A ∈ LX . The infimum TS of TS belongs to TS and hence is the minimal element of this family; S is called a subbase of the (L, N)-topology TS . Respectively, the infimum TES of ETS is the minimal element of this family; in this case S is called a subbase of the extensional (L, N)-topology TES . S (A) ≤ T (A) We define categories L-TOPN (M, K), L-ETOPN (M, K), EL-TOPN (M, K) and EL-ETOPN (M, K) as follows: 1. Objects of L-TOPN (M, K) are pairs (X , T ) where X = (X, E, LX , E ) is an object of L-SET(M, K) and T : LX −→ N is an (L, N)-topology on it. 2. Objects of EL-TOPN (M, K) are pairs (X , T ) where X = (X, E, LX , E ) is an object of ELSET(M, K) and T : L(X,E) −→ N is an (L, N)-topology on it. 3. Objects of L-ETOPN (M, K) are pairs (X , T ) where X = (X, E, LX , E ) is an object of L-SET(M, K) and T : LX −→ N is an extensional (L, N)-topology on it. X 4. Objects of EL-ETOPN (M, K) are pairs (X , T ) where X = (X, E, L( ,E) , E ) is an object of ELSET(M, K) and T : LX −→ N is an extensional (L, N)-topology on it. As morphisms between (X , TX ) and (Y , TY ) in all these categories we take those morphisms ( f , f → ) : X −→ Y which are continuous with respect to the corresponding (L, N)-topologies. Example (1) The category 2-TOP2 (2s , 2) is the category of ordinary topological spaces. (2)The category L-TOPL (Ls ,2) is the category L-FTOP studied in [3]; (3) The category EL-TOPL (Ms , 2) is isomorphic to the category EL-ETOPL (Ms ,2) and in case M = L it is the category EL-FTOP introduced in [3]. (4) The category L-TOP2 (Ms ,2) is isomorphic to the category L-TOP of Chang-Goguen L-topological spaces. Proposition 6. Let (X1 , T1 ) := (X1 , E1 , LX1 , T1 ) and (X2 , T2 ) := (X2 , E2 , LX2 , T2 ) be objects of L-TOPN (M, K) and ( f , f → ) : X1 −→ X2 be a morphism in L-SET(M, K). Further, let S : LX2 −→ N be a subbase for T2 . Then the following are equivalent: 1. ( f , f → ) : (X1 , T1 ) −→ (X2 , T2 ) is continuous; 2. S (B) ≤ T1 (B ◦ f ) for every B ∈ LX2 . Proposition 7. Let ( f , f → ) : X1 −→ X2 be a morphism in L-SET(M, K) and let T1 be an extensional (L, N)-topology on X1 . Then the mapping R : L(X2 ,E2 ) −→ N defined by R (B) := T1 (B ◦ f ) for all B ∈ L(X2 ,E2 ) is an extensional (L, N)-topology on X2 , E2 , L(X2 ,E2 ) , E2 ). Theorem 8. (a) Category L-TOPN (M, K) is topological over the ground category L-SET(M, K) with respect to the forgetful functor F : L-TOPN (M, K) −→ L-SET(M, K). (b) Category EL-TOPN (M, K) is topological over the ground category EL-SET(M, K) with respect to the forgetful functor F : EL-TOPN (M, K) −→ EL-SET(M, K). Theorem 9. (a) L-ETOPN (M, K) is a coreflective subcategory of the category L-TOP(M, K). (b) EL-ETOPN (M, K) is a coreflective subcategory of the category EL-TOP(M, K) 204 References [1] U. Höhle, M-valued sets and sheaves over integral commutative cl-monoids, In: Appl. of Category Theory to Fuzzy Subsets S.E. Rodabaugh, E.P. Klement and U. Höhle eds., Kluwer, Dodrecht, Boston, 1992, pp. 33 - 72. [2] U.Höhle, Many Valued Topology and its Applications, Kluwer Acad. Publ., Boston, Dordrecht, London, 2001. [3] U. Höhle, A. Šostak, Axiomatics of fixed-basis fuzzy topologies, In: Mathematics of Fuzzy Sets: Logic, Topology and Measure Theory , U. Höhle, S.E. Rodabaugh eds. - Handbook Series, vol.3, Chapter 3, pp. 123 - 271. Kluwer Acad. Publ., Dordrecht, Boston. - 1999. [4] T. Kubiak, A.Šostak, A fuzzification of the category of M-valued L-topological spaces, Applied General Topology, (to appear). [5] S.E. Rodabaugh, Powerset operator foundations for poslat fuzzy set theories and topologies In: Mathematics of Fuzzy Sets: Logic, Topology and Measure Theory , U. Höhle, S.E. Rodabaugh eds. - Handbook Series, vol.3. Chapter 2, pp. 91 - 116, Kluwer Acad. Publ., Dordrecht, Boston. - 1999. 205 A categorical fabric for fuzzy predicate logic L AWRENCE N EFF S TOUT Department of Mathematics and Computer Science Illinois Wesleyan University Bloomington, IL 61702-2900, USA E-mail: ▲st♦✉t❅✐✇✉✳❡❞✉ Much of the existing work on categorical foundations for Fuzzy sets deals with a single category of fuzzy sets with values in a particular lattice with sufficient a dditional properties to capture the connectives used in fuzzy propositional logic. Goguen’s early characterization of fuzzy set categories [1], my work relating fuzzy set categories to topoi and quasitopoi [10, 11, 12, 13] (particularly using the Higgs [2] approach to sheaves on a complete Heyting algebra and the fuzzy powerset of Pultr [9] as starting point2), Höhle’s work on structures based on MV algebras, and further consideration of monoidal structures and weak classification of subobjects of various kinds [4, 5, 3] all fix the lattice in which the fuzzy sets are to have their truth values. The categories we have looked at all allow for a certain amount of internalization of the higher order logic of fuzzy sets with values in a particular complete lattice ordered semigroup– including both quantification and powerobject formation paralleling, though somewhat more difficult because of non-uniqueness concerns– paralleling the theory in topoi. At the Linz seminar in 2000 I presented some preliminary work on properties of the lattice change functors between categories of fuzzy sets using the Goguen definition and the predicate logic structure given by unbalanced subobjects and a second monoidal structure arising from a t-norm as in [12]. Through participation in the Linz seminar I have become aware of Rodabaugh’s work in fuzzy topology in which a much larger category is considered in fuzzy topologies with values in many different lattices are all objects in a single category and constructions are allowed to change lattice to solve topological problems. That suggested to me that it might be valuable to look at a single kind of structure incorporating categorical viewpoints on the propositional and predicate logic of fuzzy sets over many different lattices. Bart Jacobs’s work on the use of fibrations as a framework for categorical logic [6] suggested to me that looking at a double fibration (over both Sets and Closg might combine the structures in categories of fuzzy sets into one rich structure. This paper takes a different approach, making a structure out of several closely linked categories rather than putting all of the objects into a single category. This paper presents an approach to predicate logic in a fuzzy setting using a categorical fabric. This structure has two dimensions woven together: one dimension connects the predicates of different types (where types are taken from the “warp” category, often Sets for us) but with a fixed propositional logic given by a complete lattice; the other dimension connects predicates of a single type with variation of the lattice for propositional logic, making a category of lattices of possible truth values into the “weft” of our fabric. If we restrict our attention to fuzzy predicate logic over Sets with values in a particular lattice L for each set S we get a category PL (S ) (typically a partial order) of predicates about S. These categories of predicates are connected to each other using trios of functors: for any function f : S −→ T there 206 are functors f ∗ : PL (T ) −→ PL (S), ∃ f : PL (S) −→ PL (T ) and ∀ f : PL (S) −→ PL (T ) with ∃ f −| f ∗−| ∀ f . Furthermore, a pullback square in Sets f S −→ T h ↓ pull ↓ g k U −→ V gives rise to the Beck conditions ∃h f ∗ = k∗ ∃g and ∀h f ∗ = k∗ ∀g as in the internal logic of topoi. This representation of predicate logic has its roots in the early work of Lawvere in [7, 8]. The truth functional nature of fuzzy sets shows up in our ability to recapture the lattice of truth values L from the structures on the terminal ⊤ (a one element set) and then use the fact that the terminal is a generator in Sets to recover PL (S) as a colimit of the diagram consisting of the functors paq∗ : PL (S) −→ PL (⊤) for all of the functions paq : ⊤ −→ S. If we restrict our attention to a particular set S and look at how variation in the propositional logic affects predicates we again get from a suitable function of lattices λ : L −→ L′ a trio of functors λ↑ , λ◦ , λ↓ . In the cases of fuzzy sets with values in the lattices these have the following effects: λ◦ : PL (S) −→ PL′ (S) takes α : S −→ L to λ ◦ α : S −→ L′ λ↑ : PL′ (S) −→ PL (S) takes β : S −→ L′ to s 7→ λ↓ : PL′ (S) −→ PL (S) takes β : S −→ L′ to s 7→ _ ^ {l ∈ L|λ(l) ≤ β(s)} {l ∈ L|λ(l) ≥ β(s)} With these definitions λ↑ is the smallest left inverse for λ◦ and λ↓ is the largest left inverse. In particW V ular, if λ preserves then λ↑−| λ◦ ; if λ preserves then λ◦−| λ↓ . If we think of all of the categories PL (S) as objects in a category where the arrows are functors between them, then the assignment of PL (S) to a set S with functors f ∗ assigned to functions f : S −→ T gives a contravariant functor for each lattice L. All of the functors λ↓ , λ◦ , and λ↑ then give natural transformations. Naturality of any of these with the covariant functors using ∃ f or ∀ f will require that λ have further preservation properties or that the relevant lattices be completely distributive. References [1] Joseph A. Goguen, Jr. L-fuzzy sets. Journal of Mathematical Analysis and its Appllications, 18:145–174, 1967. [2] D. Higgs. A category approach to boolean-valued set theory. unpublished manuscript, Waterloo, 1973. [3] Ulrich Höhle. Fuzzy real numbers as dedekind cuts with respect to a multiple-valued logic. Fuzzy Sets and Systems, 24:263–278, 1987. [4] Ulrich Höhle. M-valued sets and sheaves over integral, commutative cl-monoids. In U. Höhle S.E. Rodabaugh, E.P. Klement, editor, Applications of Category Theory to Fuzzy Subsets. Kluwer, 1992. 207 [5] Ulrich Höhle and Lawrence Neff Stout. Foundations of fuzzy sets. Fuzzy Sets and Systems, 40(2):257–296, 1991. [6] Bart Jacobs. Categorical logic and the foundations of type theory, volume 141 of Studies in logic and the foundations of mathematics. Elsevier Science, Amsterdam, New York, 1999. [7] F.William Lawvere. Equality in hyperdoctrines and comprehension schema as an adjoint functor. In Applications of Categorical Algebra, number 17 in Proceedings ofSymposia in Pure Mathematics, pages 1–14. American Mathematical Society, 1970. [8] F.William Lawvere. Quantifiers and sheaves. In Actes du Congrès International des Mathématiciens (Nice, 1970), volume 1, pages 329–334, Paris, 1971. Gauthier-Villars. [9] Aleš Pultr. Closed categories and L-fuzzy sets. In Vortrage zur Automaten und Algorithmentheorie. Technische Universität Dresden, 1975. [10] Lawrence N. Stout. Topoi and categories of fuzzy sets. Fuzzy Sets and Systems, 12:169–184, 1984. [11] Lawrence N. Stout. Fuzzy set and topos theory. In Proceedings of the Second IFSA Congress, Tokyo, 1987. IFSA. [12] Lawrence N. Stout. The logic of unbalanced subobjects in a category with two closed structures. In U. Höhle S.E. Rodabaugh, E.P. Klement, editor, Applications of Category Theory to Fuzzy Subsets. Kluwer, 1991. [13] Lawrence N. Stout. Fuzzy sets with values in a quantale or projectale. In Ulrich Höhle and Erich Peter Klement, editors, Non-classical Logics and their Applications to Fuzzy Subsets, pages 219–234. Kluwer Academic Publishers, Dordrecht, Boston, London, 1995. 208 Residuum-based approximate reasoning with distance-based uninorms M ÁRTA TAKÁCS Budapest Polytechnic 1081 Budapest, Hungary E-mail: ♠❛rt❛❅✈ts✳s✉✳❛❝✳②✉✱ t❛❦❛❝s✳♠❛rt❛❅♥✐❦✳❜♠❢✳❤✉ In fuzzy control system the system state is described by a fuzzy rule base system, and the relationship between fuzzy rule base system, system output and system input is modeled by compositional rule of inference. The first successful practical applications of fuzzy sets were realized by means of the Mamdani inference [12], but the Mamdani’s approach is not fully coherent with the paradigm of approximate reasoning [1, 11]. In the fuzzy rule based control theory and usually in the approximate reasoning the covering over of fuzzy rule base input and rule premise of a rule determine the importance of that fuzzy rule and the rule output, too. The practical realization of that notion usually depends on the application. A very thorough overview of mathematical background of that principle can be found in [4, 7]. The Mamdani type controller is based on Generalized Modus Ponens (GMP) inference rule, and the rule output is given with a fuzzy set, which is derived from rule consequence, as a cut of them. This cut is the generalized degree of firing level of the rule, considering actual rule base input, and usually it is the supremum of the minimum of the rule premise and rule input (calculating with their membership functions, of course). In fact the uninorms [5] offer new possibilities in fuzzy approximate reasoning, because the low level of covering over of rule premise and rule input has measurable influence on rule output as well. In some applications the meaning of that novel approach, has practical importance. The modified Mamdani’s approach , with similarity measures between rule premises and rule input, does not rely on the compositional rule inference any more, but still satisfies the basic conditions supposed for the approximate reasoning for a fuzzy rule base system [14]. The using of distance based operators in fuzzy logic control theory (FLC) was described in [13]. From mathematical point of view, and having results from [3], we can introduce residuum-based inference mechanism ([9]) using distance-based uninorms. The distance-based operators can be expressed by means of the min and max operators. The modification of the distance based operators from [10] is related to the boundary condition for the neutral element e. The maximum distance minimum operator with respect to e ∈]0, 1] is defined by   max(x, y) if y > 2e − x, min(x, y) if y < 2e − x, maxmin = e  min(x, y) if y = 2e − x. The minimum distance minimum operator with respect to e ∈ [0, 1[ is defined by   min(x, y) if y > 2e − x, max(x, y) if y < 2e − x, minmin = e  min(x, y) if y = 2e − x. 209 The maximum distance maximum operator with respect to e ∈]0, 1] is defined by   max(x, y) if y > 2e − x, max maxe = min(x, y) if y < 2e − x,  max(x, y) if y = 2e − x. The minimum distance maximum operator with respect to e ∈ [0, 1[ is defined by   min(x, y) if y > 2e − x, max(x, y) if y < 2e − x, minmin = e  max(x, y) if y = 2e − x. The distance-based operators have the following properties • maxmin and maxmax are uninorms, e e • the dual operator of the uninorm maxmin is maxmax e 1−e , and • the dual operator of the uninorm maxmax is maxmin e 1−e . In [3] and [2] there were studied two important classes of uninorms: the class of left-continuous and the class of right-continuos ones. We can find there also the properties of the conjunctive leftcontinuous idempotent uninorm with neutral element e ∈]0, 1] , and of the disjunctive right-continuous idempotent uninorm with neutral element e ∈ [0, 1[ with a super-involutive decreasing unary operator g. Based on [3] and [2], we conclude: Operator maxmin 0.5 is a conjunctive left-continuous idempotent uninorm with neutral element e ∈]0, 1] with the super-involutive decreasing unary operator g(x) = 2e − x = 1 − x. Operator minmax 0.5 is a disjunctive right-continuous idempotent uninorm with neutral element e ∈]0, 1] with the sub-involutive decreasing unary operator g(x) = 2e − x = 1 − x. The paper [3] contain general theoretical results related the residual implicators of uninorms, based on residual implicators of t-norms and t-conorms. Residual operator RU , considering a uninorm U can be represented in the following form for all (x, y) ∈ [0, 1]2 RU (x, y) = sup{z ∈ [0, 1] | U(x, z) ≤ y}. Uninorms with neutral elements e = 0 and e = 1 are t-norms and t-conorms, respectively, and related residual operators are investigated in [3, 5, 6, 8, 9]. If we consider a uninorm U with neutral element e ∈]0, 1[ , then the binary operator RU is an implicator if and only if (∀z ∈]e, 1[)(U(0, z) = 0) . The residual implicator RU of uninorm U is denoted by ImpU . According to Theorem 8. in [3] min we introduce implicator of the distance based operator maxmin 0.5 . Operator max0.5 is a conjunctive left-continuous idempotent uninorm with the unary operator g(x) = 1 − x, and its residual implicator Impmaxmin is given by 0.5  max(1 − x, y) if x ≤ y, (1) Impmaxmin = 0.5 min(1 − x, y) elsewhere. In the theory of approximate reasoning introduced by Zadeh in 1979, the knowledge of system behavior and system control can be stated in the form of if-then rules. In Mamdani-based sources it was suggested to represent an if x is A then y is B 210 rule simply as a connection (for example as a t-norm, T (A, B), specially min) between the so called rule premise: x is A and rule consequence: y is B. Let x be from universe X, y from universe Y , and let x and y be linguistic variables. Normal fuzzy set A on X ⊂ R finite universe is characterized by its membership function µA : X −→ [0, 1], and normal fuzzy set B on universe Y ⊂ R is characterized by its membership function µB : Y −→ [0, 1]. The Generalized Modus Ponens reflects the real influences of the implication or connection choice on the inference mechanisms in fuzzy systems. Usually the general rule consequence B′i (y) for ith rule from a rule system, for rule base input A′ (x) is obtained by ′ Bi (y) = sup(T (A′ (x), Imp(Ai (x), Bi (y))). (2) x∈X The FLC rule base output is constructed as a crisp value calculated with a defuzzification model, from rule base output ′ ′ ′ ′ ′ ′ Bout (y) = S(Bn , S(Bn−1 , S(. . . , S(B1 , B2 , B1 )))). ′ Rule base output is an aggregation of all rule consequences Bi (y) from the rule base (i = 1, 2, . . . , n). As aggregation operator, t-conorms are usually used. Although the minimum plays an exceptional role in fuzzy control theory, there are situations requiring new models. In system control one would intuitively expect: to make the powerful coincidence between fuzzy sets stronger, and the weak coincidence even weaker. The distance-based operators group satisfy these properties. The papers [13, 14] contain the basics of approximate reasoning with distance-based operators using Degree of Coincidence (Doc) in the inference mechanism. Let we consider residuum-based approximate reasoning and inference mechanism for special class of distance based operators. Hence, and because of the results from (2), we can consider the general rule consequence for ith rule from a rule system as ′ ′ Bi (y) = sup(maxmin 0.5 (A (x), Impmaxmin (Ai (x), Bi (y))), 0.5 x∈X or using (1) ′ Bi (y) = sup x∈X  ′ maxmin 0.5 (A (x), max(1 − Ai (x), Bi (y)) if Ai (x) ≤ Bi (y), ′ maxmin 0.5 (A (x), min(1 − Ai (x), Bi (y)) elsewhere. (3) The crisp rule base output is constructed also with a defuzzyfication model, from rule base output ′ Bout by (3). As aggregation operator for rule consequences in this case, dual operator maxmax 0.5 of the min max0.5 can be used. Taken into account Proposition 13 from [3], it can be conclude, that conjunctive left-continuous idempotent uninorm maxmin 0.5 and its implicator Impmaxmin satisfy the inequality 0.5 ′ maxmin 0.5 (A (x), Impmaxmin (Ai (x), Bi (y)) ≤ Bi (y) 0.5 if A′ (x) = Ai (x) for all x ∈ X. 1 Acknowledgement This work was supported by the Hungarian Research Foundation, OTKA T 043177. 211 References [1] B. De Baets (1996) A note on Mamdani controllers, Intelligent Systems and Soft Comupting for Nuclear Science and Industry, D. Ruan, E. Kerre. Eds., Singapur: World Scientific, pp., 22-28. [2] B. De Baets (1999) Idempotent uninorms, Oper. Res. 118, pp. 631-642. [3] B. De Baets, J. Fodor (1999) Residual operators of uninorms, Soft Computing 3, 89-100. [4] D. Driankov, H. Hellendron, M. Reinfrank (1996) An Introduction to Fuzzy Control, SpringerVerlag, Berlin-Heidelberg-NewYork. [5] J. Fodor, B. De Baets, T. Calvo (2003), Structure of uninorms with given continuous underlying t-norms and t-conorms, 24th Linz Seminar on Fuzzy Sets. [6] J. Fodor, M. Roubens (1994) Fuzzy Preference Modelling and Multicriteria Decision Support, Kluwer Academic Publishers. [7] R. Fullér (1998) Fuzzy reasoning and fuzzy optimization, TUCS General Publication, Turku, Finnland. [8] E. P. Klement, R. Mesiar, E. Pap (1996) On the relationship of associative compensatory operators to triangular norms and conorms, Uncertainty, Fuzziness and Knowledge-Based Systems 4, 129-144. [9] E. P. Klement, R. Mesiar, E. Pap (2000) Triangular Norms, Kluwer Academic Publishers. [10] I. Rudas, O. Kaynak (1998) New Types of Generalized Operations Computational Intelligence, Soft Computing and Fuzzy-Neuro Integration with Applications, Springer NATO ASI Series. Series F, Computer and Systems Sciences, Vol. 192. (O. Kaynak, L. A. Zadeh, B. Turksen,I. .J. Rudas editors), pp. 128-156. [11] B. Moser, M. Navara, Fuzzy controllers with conditionally firing rules, IEEE Transactions on fuzzy systems, vol. 10, No. 3, pp. 340-348 [12] E. H. Mamdani, S. Assilian (1975), An experiment in linguistic syntesis with a fuzzy logic controller, Intern. J. Man-Machine Stud. 7., pp. 1-13. [13] M. Tákács (2003), Similarity measures in approximate reasoning and in fuzzy logic control theory, in Proceedings of the ICCC 2003 Conference, Siofok, Hungary, 2003, August. [14] M. Tákács (2003a), Approximate reasoning with Distance-based Operators and degrees of coincidence, in Principles of Fuzzy Preference Modelling and Decision Making, edited by Bernard de Baets, János Fodor, Academia Press Gent, 2003 212 Fuzzy deductive and inductive systems with similarity based unification P ETER VOJTÁŠ Institute of Informatics P. J. Safárik University 04154 Košice, Slovak Republic E-mail: ✈♦❥t❛s❅✉♣❥s✳s❦ We will present mathematical results on deductive and inductive aspects of different rule based systems of fuzzy logic motivated by computer science applications and related to fuzzy logic programming (FLP), fuzzy databases, fuzzy inductive logic programming (FILP) and fuzzy similarity based unification. We refer on results obtained with several coauthors. Our results are mainly generalizations of older results of many other researchers in the direction of extending them to a wider class of operators. In the talk we will try to put them into a suitable historical perspective (which we cannot list completely here in this extended abstract). We split our presentation to results on rule based systems and to results on fuzzy similarity based unification. In the classical logic the implication H ← B is equivalent to the clause H ∨ ¬B. This is no more true in fuzzy logic in general. So, it is natural to study two types of rule systems – those where rules are implications and those where rules are clauses ([2]). Implication rule systems without negation. We will study an FLP system based on the fuzzy modus ponens for weighted formulas (B, b), (H ← B, r) (H,CI (b, r)) where I is the truth function of the implication ←, and CI is the residual conjunctor (not necessary a t-norm). The FLP computation can be based on the backward use of this rule, namely, starting with query ? − H, having the rule (H ← B, r) we proceed with query ? −CI (B, r), and having the fact (B, b) we finish with the computed answer CI (b, r). The notion of a correct answer is based on satisfaction of truth functional fuzzy logic in narrow sense ([4]). To model the aggregation of partial results, bodies of our rules have the form @(B1 , . . . , ...Bn ). We prove ([10]) a Pavelka-like completeness results for implication rule based FLP systems without negation under condition that all CI ’s and aggregations @ in body are left continuous. We show ([6]) that FLP are equivalent to a variant of generalized annotated programs GAP under following transformations: FLP (H ← @(B1 , . . . , Bn ), r) transform to GAP H : CI (@(x1 , . . . , xn ), r) ← B1 : x1 & . . . &Bn : xn where CI (@(x1 , . . . , xn ), r) is here considered as an head annotation term and GAP H : f (x1 , . . . , xn ) ← B1 : x1 & . . . &Bn : xn transform to FLP (H ← @ f (B1 , . . . , Bn ), 1) 213 where @ f is a body aggregation induced by the head annotation term f . We study a fuzzy relational algebra based on this FLP and discuss join evaluation strategies for finding best, top-k, threshold and ε-best answer based on an upper residuation operator. A model of fuzzy inductive logic programming ([11]) is based on a multiple use of classical ILP system learning the annotation term of the transformed GAP program for a graded classification example. A comparison with classification trees on a small example will be given. A problem of learning with qualitative condition will be formulated. Our acquaintance is that FLP systems are more suitable for deductive (database) applications and GAP systems are more suitable for inductive tasks. Equivalence between FLP and GAP yields a system with unified deductive and inductive part. Informally, we can say, that what is in FLP hidden in the aggregation operator of the body, this is in the GAP represented by the annotation term of the head of the rule. We will discuss connections of FLP, and more directly of GAP, to Bayesian networks, where the probability production operator corresponds to the head annotation term. Fuzzy resolution for clausal rule systems. We study operators f∨ for which the fuzzy resolution rule with weighted clauses (γ ∨ α, x), (β ∨ ¬α, y) (γ ∨ β, f∨ (x, y)) is sound and compare it to results in the deMorgan logic with involutive negation ([1,5]), approximate reasoning, possibilistic logic and different forms of residuation and fuzzy operators. Having D the truth function of the disjunction and RD the corresponding residual, for the operator f∨ (x, y) = inf (D(RD (a, x), RD (1 − a, y))) a∈[0,1] we prove the soundness result ([9]). Similarity based unification. Based on the presented model of FLP ([7]), a similarity based unification approach is constructed by adding axioms of fuzzy equality to a fuzzy logic program. Connections to several max-min similarity based systems ([3], [8]]) are discussed. Several models of generating fuzzy similarities are presented (e.g. from the geometry of the sample space, from fuzzy sets of linguistic expressions, ...). From a point of view of flexible querying systems, we consider the object-attribute model. We distinguish, whether the data type of the attribute value is an element of the attribute domain from the case when the data type is a subset of the domain. In the case when a fuzzy set acts as an attribute value of data type being an element of the domain, we discuss several possibilities of defining the degree of unification (e.g. degree of fuzzy equality of fuzzy sets, measure theoretic and metric space approach, generalization of the probability of the equality of two random variables, ...). We will illustrate our approach on several small illustrative examples. Several problems will be formulated. References [1] D. Butnariu, E. P. Klement, S. Zafrany: On triangular norm-based propositional fuzzy logics, Fuzzy Sets and Systems 69 (1995), 241–295. 214 [2] D. Dubois, J. Lang, H. Prade: Fuzzy sets in approximate reasoning. Part 2: Logical approaches, Fuzzy Sets and Systems 40 (1991) 203–244 [3] F. Formato, G. Gerla, M. I. Sessa: Similarity based unification, Fund. Inform. 41 (2000) 393–414 [4] P. Hájek: Metamathematics of fuzzy logic, Kluwer, Dodrecht, (1999) [5] E. P. Klement, M. Navara: A survey of different triangular norm-based propositional logics, Fuzzy Sets and Systems 101 (1999) 241–251 [6] S. Krajči, R. Lencses, P. Vojtáš: A comparison of fuzzy and annotated logic programming, To appear in Fuzzy Sets and Systems 2004 [7] J. Medina, M. Ojeda-Aciego, P. Vojtáš: Similarity based unification: a multiadjoint approach, To appear in Fuzzy Sets and Systems 2004 [8] M. I. Sessa: Approximate reasoning by similarity-based SLD resolution, Theoret. Comp. Sci. 275 (2002) 389–426 [9] D. Smutná-Hliněná, P. Vojtáš: Graded many-valued resolution with aggregation, To appear in Fuzzy Sets and Systems 2004 [10] P. Vojtáš: Fuzzy logic programming, Fuzzy Sets and Systems 124 (2001) 361–370 [11] P. Vojtáš, T. Horváth, S. Krajči, R. Lencses: An ILP model for a monotone graded classification problem, To appear in Kybernetika 2004 215 216 Fuzzy Logic Laboratorium Linz-Hagenberg Dept. of Knowledge-Based Mathematical Systems Johannes Kepler Universität Software Competence Center Hagenberg Hauptstrasse 99 A-4232 Hagenberg, Austria A-4040 Linz, Austria Tel.: +43 732 2468 9194 Tel.: +43 7236 3343 800 Fax: +43 732 2468 1351 Fax: +43 7236 3343 888 E-Mail: info@flll.jku.at WWW: http://www.flll.jku.at/ E-Mail: sekr@scch.at WWW: http://www.scch.at/