Fuzzy Logic Applications in Computer Science and Mathematics
Fuzzy Logic Applications in Computer Science and Mathematics
in Computer Science
and Mathematics
Scrivener Publishing
100 Cummings Center, Suite 541J
Beverly, MA 01915-6106
This book series involves different computational methods incorporated within the system
with the help of analytics reasoning and Sense-making in big data, which is centered in the
cloud and IoT-enabled environments. The series seeks volumes that are empirical studies,
theoretical and numerical analysis, and novel research findings. The series encourages
cross-fertilization of highlighting research and knowledge of data analytics, machine learning,
data science, and IoT sustainable developments. .
Publishers at Scrivener
Martin Scrivener ([email protected])
Phillip Carmical ([email protected])
Fuzzy Logic Applications
in Computer Science
and Mathematics
Edited by
Rahul Kar
Dac-Nhuong Le
Gunjan Mukherjee
Biswadip Basu Mallik
and
Ashok Kumar Shaw
This edition first published 2023 by John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, USA
and Scrivener Publishing LLC, 100 Cummings Center, Suite 541J, Beverly, MA 01915, USA
© 2023 Scrivener Publishing LLC
For more information about Scrivener publications please visit www.scrivenerpublishing.com.
All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or
transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or other-
wise, except as permitted by law. Advice on how to obtain permission to reuse material from this title
is available at http://www.wiley.com/go/permissions.
For details of our global editorial offices, customer services, and more information about Wiley prod-
ucts visit us at www.wiley.com.
ISBN 978-1-394-17453-9
Set in size of 11pt and Minion Pro by Manila Typesetting Company, Makati, Philippines
10 9 8 7 6 5 4 3 2 1
Contents
Preface xiii
1 Decision Making Using Fuzzy Logic Using Multicriteria 1
Panem Charanarur, Srinivasa Rao Gundu and J.Vijaylaxmi
1.1 Introduction 2
1.2 Fuzzy Logic 5
1.3 Decision Making 6
1.4 Literature Review 7
1.5 Conclusion 10
Acknowledgment 11
References 11
2 Application of Fuzzy Logic in the Context of Risk
Management 13
Sudipta Adhikary and Kaushik Banerjee
2.1 Introduction 13
2.2 Objectives of Risk Management 14
2.3 Improved Risk Estimation 15
2.3.1 Point-Wise Calculations on a Curve 15
2.3.2 Estimation of a Curve 15
2.3.3 Accuracy in Quantification is Raised 16
2.3.4 The Problems with the Basic Quantification
Approach 16
2.4 Threat at Quantification Matrix 17
2.4.1 Qualitative Matrix 17
2.4.2 Errors in Scaling 17
2.4.3 Band Width at Various Scales 17
2.5 Fundamental Definitions 18
2.5.1 Positioning Statement 18
2.5.2 Risk Under the Level of Tolerance 19
v
vi Contents
xiii
xiv Preface
The material of this book was developed and arranged so that read-
ers can easily grasp the fundamental concepts of the subject and gradu-
ally move to more advanced levels through functional assessments of the
matter in both broad and analytical ways. The target readership includes
researchers, professionals, and students willing to pursue their career fur-
ther in the field of computation in the fuzzy domain.
We express our sincere thanks with ample acknowledgment to all our
colleagues, friends, and students for their invaluable suggestions and feed-
back in the development of this book, including the provision of more
important and relevant information. We must offer our heartfelt gratitude
to our family members, for without their support and endurance, this book
would have been an impossible task. Lastly, we are very much grateful to
the editors at Scrivener and Wiley.
We wish every reader an insightful, perceptional, and informative jour-
ney into this book, the world of fuzzy logic systems, and its application
paradigm.
The Editors
Rahul Kar, Dac-Nhuong Le, Gunjan Mukherjee,
Biswadip Basu Mallik and Ashok Kumar Shaw
July 2023
1
Decision Making Using Fuzzy
Logic Using Multicriteria
Panem Charanarur1, Srinivasa Rao Gundu2* and J.Vijaylaxmi3
Abstract
Fuzzy set theory and multicriteria decision making were initially introduced
in the early 1970s. As a consequence, a wide variety of innovative solutions
have been tried and confirmed through the use of fuzzy multicriteria decision
making. The following section provides a quick overview of fuzzy multicriteria
decision-making categories, as well as some of their earliest and most recent uses.
Uncertainty and ambiguity are synonyms for the adjective “fuzzy.” Since there are
numerous instances in real life when we are not able to discern whether a given
condition is true or untrue, the flexibility that fuzzy logic gives is quite helpful
when making decisions. There will always be some degree of inaccuracy and
unpredictability to every circumstance. The development of fuzzy set theory and
the rise of decision making are closely linked. It was necessary to highlight the
groundbreaking applications of fuzzy multicriteria decision making (MCDM) in
order to encourage more research in this field. Many real-world Malaysian cases
are used to demonstrate the broad range of applications that may be pulled from
the various approaches described in this study. Some cutting-edge intelligent
methods to MCDM are intended to help spread the news about fuzzy MCDM.
Keywords: Fuzzy, fuzzy set, multicriteria decision making (MCDM), decision
theory, logical thinking
Rahul Kar, Dac-Nhuong Le, Gunjan Mukherjee and Biswadip Basu Mallik and Ashok Kumar Shaw (eds.)
Fuzzy Logic Applications in Computer Science and Mathematics, (1–12) © 2023 Scrivener Publishing LLC
1
2 Fuzzy Logic Applications in Computer Science and Mathematics
1.1 Introduction
Determining what to do is an NP-complete issue, and it has applications in
a wide range of domains. There were a lot of researchers that looked into
the subject in the mid-20th century. Through his work on the lens model,
Brunswick pioneered the use of mathematical or statistical models to cap-
ture individual variances in decision-making procedures in 1947, paving
the way for future research.
It is possible to analyze many different decision-making circumstances
using policy capture, according to the researchers. Sequences of judgment
stimuli that have been produced using controlled signals are shown to par-
ticipants in order to capture and model the participants’ subsequent judg-
ments, according to this approach. Changing environmental signals in a
systematic way addresses interactions with the environment, whereas the
deployment of expert decision-making systems addresses interactions with
extraneous validity. Brehmer and Brehmer followed up on their research
into this method by conducting an analysis into the amount to which indi-
viduals utilize various decision policies and the extent to which they are
aware of the processes they apply when making judgments.
In today’s fast-paced climate, enterprises, industries, and the govern-
ment all require competent, rational decision-making, and they all need it
urgently. It is needed that it must be chosen between one or more options
while making a decision. In the framework of cognitive brain processes, it
is possible to come up with a wide range of options for making a choice.
A final choice is reached at the end of every decision-making process.
Decisions may be made in terms of action or opinion depending on the
outcome. Long-term or short-term planning, working at the highest or
lowest levels of management, having the ability to make sound decisions
is a need. Using the advanced decision-making tools offered by Decision
Theory [1], the Decision Maker can make better choices when confronted
with tough choices.
The following is an example of a wide definition of Decision Theory:
One must pick the action that is most likely to achieve one’s objectives, as
established by the decision maker, from among the numerous possibilities
when provided with a list of options. Before making a decision, a person
who wants to choose the best possible course of action must evaluate all of
the potential consequences and outcomes associated with each option. The
selection problem is subjected to logical and quantitative investigation.
To better comprehend or prescribe actions to strengthen the coherence
between various alternatives offered by the scenario and the aims and value
Decision Making Using Fuzzy Logic Using Multicriteria 3
systems of the agents participating in the decision process, there are a vari-
ety of ways for modeling decision scenarios. Building a relational or func-
tional model is the basis for mathematical decision analysis [2].
Many different methodologies have been used to study the decision-
making process of humans. Experts recommend that while evaluating a
person’s options, they take into account their psychological needs, pref-
erences, and desired values. From a cognitive standpoint, it is essential to
perceive decision-making as a continuous process that is linked to one’s
immediate environment. It is necessary to examine the logic and rational-
ity of decision-making and the consistency of the choice that results from
it from a normative perspective to understand the process. Another way
to look about it is as a process that leads to the discovery of an appropri-
ate solution to a problem that has been addressed. There are two kinds of
assumptions that may influence a decision: explicit and implicit [3]. An
emotional or intellectual choice may also lead to a decision.
Logical thinking is required for technical decision-making in which
experts draw on their expertise to make well-informed judgments about
the present situation. A study employing natural techniques found that
professionals rely more on intuitive Decision Making than organized
approaches when faced with tighter deadlines, higher stakes, or more
uncertainty. A recognition-primed decision approach is used in order to
fit a collection of indicators into the expert’s competence and swiftly arrive
at an acceptable plan of action [4]. There have been several recent efforts
that have formalized the incorporation of uncertainty into decision mak-
ing. Several studies have underlined the importance of human judgment
and the inherent flaws in decision making as essential components in
the assessment of human performance. Psychologists have been working
on mathematical and computer models for many years to better under-
stand how humans make choices. They may be used to a broad variety
of tasks and circumstances in a wide range of organizations and settings.
AI research has concentrated on how intelligent beings interact with their
environment and make decisions, rather than how they think.
Scientists study how individuals interact with their environment and
try to mimic their decision-making processes in order to learn more about
these people. Most of the time, public policy is at issue in these kinds of
operations. All of the decision making problems often include the concept
of ambiguity or vagueness. Many psychologists turn to probability theory
for help when presented with this problem. When using probabilistic mod-
els instead of statistical models, there are two key limitations: It should be
highlighted that certain natural sources of uncertainty may not exist in a
form that can be explained by a universally agreed probability model [5].
4 Fuzzy Logic Applications in Computer Science and Mathematics
the community voted on fuzzy logic as the best option. During the devel-
opment of the country’s first subway system, fuzzy logic controllers were
employed, which opened in Tokyo in 1987. Most intelligent products on
the market today use fuzzy logic-based technology. Fuzzy sets and fuzzy
logic have been proven to be useful tools in the fields of management and
decision sciences, as well as engineering [11].
Various classification strategies have been described by, differ-
ent authors, and others. An example of a categorizing approach is the
Analytical Hierarchy Process (AHP), which may be used to find the
optimum solution for a given issue. Using AHP reduces the time needed
to identify the best alternative and speeds up the decision-making pro-
cess, according to study results. Every feature has the potential to either
improve or reduce utility monotonically overtime, according to TOPSIS
methodology. Consequently, it is clear that there is an optimal solution
for both the good and bad aspects of this circumstance. Final ranking
is established by the proximity of these options to one another, which
is arranged alphabetically by their closeness to one another. And also
authors employed an aggregation technique to combine preferences in
one of the most innovative models yet produced for merging decision
makers’ preferences [12]. Fuzzy goal programming approaches were uti-
lized to overcome this problem. They discovered that they had a posi-
tive impact. Methods like described by may also utilize the phrase “grey
interval numbers,” in which the input variables are referred to as “grey
numbers.” Many researchers have studied MADM. MADM has also been
the subject of many studies.
i) To get their comments on the weights of the qualities, and ii) offer
their thoughts on the options for specific attributes, I asked them to do
so. There are several uses for MADM, and this problem is critical to the
future of the technology. There are many factors to consider while making
a choice, including both qualitative and quantitative features, which are
frequently based on incorrect data and human judgment. Because of this,
fuzzy MADM seems to be an effective tool for coping with these decision-
making issues. Judgments made by leaders in most circumstances are
vague and consequently cannot serve as exact numerical values in most
cases. The usage of triangular fuzzy numbers has been used to quantify
uncertainty in supplier selection situations. Step-by-step instructions for
creating an analogy like the one displayed above utilizing the multi
attribute decision making procedure are described below.
Start
Step 1: Identifying the options
Step 2: Determining C
Step 3: Assembling a group to make key decisions
Step 4: Making decisions on one’s own
1.5 Conclusion
Microsoft, Amazon, and Google are leading the way in low-cost cloud
computing technologies. Because of security concerns, it is a key roadblock
to widespread usage of cloud computing. A cloud’s infrastructure security
is very important. There have been several investigations on the safety of
cloud infrastructure, but there are still some unanswered questions and
new difficulties to contend with. The current cloud architecture raises a
number of security issues, which are detailed in this article. Infrastructure-
related challenges affecting cloud computing’s business model were exam-
ined in the study. The literature-based solutions to security concerns at
different levels were also examined in this research. In order to help in their
Decision Making Using Fuzzy Logic Using Multicriteria 11
Acknowledgment
We, the authors of this book chapter, would like to express our thanks to
the late Mr. Panem Nadipi Chennaih for the support and development of
this book chapter, it is dedicated to him.
References
1. Mishra, R., A fuzzy approach for multi criteria decision making in web
recommendation system for e-commerce. 2013 Eleventh International
Conference on ICT and Knowledge Engineering, pp. 1–4, 2013.
2. Yusuf, H. and Panoutsos, G., Multi-criteria decision making using fuzzy logic
and ATOVIC with application to manufacturing. 2020 IEEE International
Conference on Fuzzy Systems (FUZZ-IEEE), pp. 1–7, 2020.
3. Morente-Molinera, J.A., Wang, Y., Gong, Z.-W., Morfeq, A., Al-Hmouz, R.,
Herrera-Viedma, E., Reducing criteria values in multi-criteria group deci-
sion making methods using hierarchical clustering methods and fuzzy ontol-
ogies. IEEE Trans. Fuzzy Syst., 30, 6, pp. 1585–1598, 2021.
4. Zimmermann, H.J. and Sebastian, H.J., Application of fuzzy logic to engi-
neering design and configuration problems-a survey. Proceedings of IEEE 5th
International Fuzzy Systems, vol. 2, p. 1120, 1996.
5. Yeh, C.-H. and Deng, H., An algorithm for fuzzy multi-criteria decision
making. 1997 IEEE International Conference on Intelligent Processing Systems
(Cat. No.97TH8335), vol. 2, pp. 1564–1568, 1997.
6. Darestani, S.A., Tadi, A.M., Mirzaei, S., Evaluation of projects risks for dairy
industry using best-worst multi-criteria decision-making. 2020 IEEE 7th
International Conference on Industrial Engineering and Applications (ICIEA),
pp. 1110–1115, 2020.
7. Khan, S.A. and Rehman, S., On the use of unified and-or fuzzy aggrega-
tion operator for multi-criteria decision making in wind farm design pro-
cess using wind turbines in 500 kW–750 kW range. 2012 IEEE International
Conference on Fuzzy Systems, pp. 1–6, 2012.
8. Diana, A. and Solichin, A., Decision support system with fuzzy multi-
attribute decision making (FMADM) and simple additive weighting (SAW)
12 Fuzzy Logic Applications in Computer Science and Mathematics
Abstract
There have been numerous successful applications of industrial risk analysis to
power, nuclear, petroleum, and chemical sites since the end of World War II. Every
one of us will encounter situations in the course of a typical day where we will
instinctively try to avoid taking measures to lessen or manage potential danger.
The objective of a risk calculation is to identify and quantify the potential dangers
associated with a certain situation or event. Assessing the potential for harm and
identifying the specific elements that pose the greatest threat is the primary goal
of risk management. The goal of this risk assessment procedure is to quantify risks
and select suitable controls. In this research, we apply fuzzy logic to the problem
for creating a fuzzy model that may be used to better handle the uncertainties that
crop up at every stage of the risk calculation procedure.
Keywords: Risk management, fuzzy logic, fuzzy model, risk calculation, matrix
2.1 Introduction
Very often, we confronted with a variety of situations that prompt us to
think in terms of eliminating or at least mitigating risk.
Rahul Kar, Dac-Nhuong Le, Gunjan Mukherjee and Biswadip Basu Mallik and Ashok Kumar Shaw (eds.)
Fuzzy Logic Applications in Computer Science and Mathematics, (13–28) © 2023 Scrivener Publishing LLC
13
14 Fuzzy Logic Applications in Computer Science and Mathematics
Start
System definition
Hazard identification
Analysis of
options for Risk assessment
further risk
minimization
No Risk
accepted?
Yes
Safety
the risk most efficiently. The risk assessment matrix is a useful instrument
for making qualitative evaluations of potential dangers. The concept of risk
as the potential for undesirable outcomes in the event of a given accident
scenario, along with the frequency with which such outcomes occur, is the
foundation of the risk matrix.
Likelihood/year
0.1
0.01
0.001
$1 $1,000 $10,000 $1,000,000
Consequences
Almost
Certain 5 6 7 8 9
> 1 : 1y
Likely
1 : 1y
4 5 6 7 8
Likelihood
Possible
1 : 5y
3 4 5 6 7
Unlikely
1 : 10y
2 3 4 5 6
Rare
< 1 : 30y
1 2 3 4 5
Consequence
- Extreme
- High
- Moderate
- Low
risks that are potentially orders of magnitude apart in scale are treated the
same. Thus, a $50,000 annual risk ($1,000,000 × 1/20th of a year) and a $50
annual risk ($250,000 × 1/5th of a year) may both be classified as a level 3
risk (Figure 2.3).
Intolerably
high risk
Tolerable
risk
Broadly
accepted
risk
Young Old
0.6 Old
0.4 Young
40 50 70 Age
Fuzzy
Knowledge
Base
Consequency
(Severity) Catastrophic Critical Marginal Negligible
Probability
I II III IV
(Likelihood)
0.5
0
–5 –4.5 –4 –3.5 –3 –2.5 –2 –1.5 –1 –0.5 0
input variable “LIKELIHOOD”
0.5
0
4 4.2 4.4 4.6 4.8 5 5.2 5.4 5.6 5.8 6
input variable “SEVERITY”
0.5
0
0 10 20 30 40 50 60 70 80 90 100
input variable “RISK”
Parameter Range
Range for
test value-2
52 46
128 134
39 32
141 148
17
163
MOM Defuzzification
Figure 2.11 Test for safety of fuzzy model by using centroid, bisector and MOM
defuzzification.
2.8 Conclusion
This study provided evidence that fuzzy logic theory may be used for
decision-making tool While conventional risk matrices are easy to use,
they can produce wildly varying outcomes. The use of qualitative risk fac-
tors is an inherently subjective aspect of the risk matrix approach. On the
flip side, there is a contradiction between the numerical interpretation of
risk characteristics using crisp intervals and the natural gradual transition
between intervals. This paper demonstrates that the fuzzy logic is very
much fruitful when it is used to traditional risk matrix for finding out risk.
Bibliography
Duffus, J. and Worth, H., Risk assesment & risk management, in: The Science of
Chemical Safety Essential Toxicology #6, IUPAC, Scotland, 2001.
Matthew, T., Advanced Risk Assessment, Riskcentral, 2013.
Fuzzy Logic for Risk Assessment 27
Abstract
We discuss about the construction and application of an economical system
employing through the fuzzy logic for observing and controlling of greenhouse
from remote location. This system was designed to monitor and operate the green-
house remotely. In order to monitor and manage the ambient temperature, water
content in soil, relative moisture content, and lighting, an Arduino Mega board is
introduced. This will be used as an integral part of the control system. An ‘Arduino
Ethernet Shield’ was used so that the device could maintain contact with the web-
site. As a result, it was feasible to set up an area-based(local) network in order
to observe and regulate the mentioned variables of greenhouse through an auto-
mated mode or a manual fashion. Without using a mathematical model of the
plant, it was also possible to demonstrate that fuzzy logic is an excellent method
for controlling nonlinear systems. Through our research, we were able to make the
most efficient use of available resources while developing the device(greenhouse).
Keywords: Fuzzy control, green house, web monitoring, fuzzy logic, Arduino
3.1 Introduction
The required administration for creation a greenhouse provides two sig-
nificant obstacles. It starts with worthful use of the land and followed by
most economical uses of available power and water. As a result, the usage
Rahul Kar, Dac-Nhuong Le, Gunjan Mukherjee and Biswadip Basu Mallik and Ashok Kumar Shaw (eds.)
Fuzzy Logic Applications in Computer Science and Mathematics, (29–40) © 2023 Scrivener Publishing LLC
29
30 Fuzzy Logic Applications in Computer Science and Mathematics
Disturbances
Relative
Temperature Humidity
Greenhouse
+5VDC
Conductors
Analog Pin
R2
R1 (Soil)
VDD VDD
5k Pin1
Arduino Pin2
DATA
Digital DHT 11
I/O Pin
Pin4
(a)
GND
(b)
START
Fuzzification
(Determining Membership
Values)
Defuzzification
(Control Actions)
END
3.3.1 Fuzzification
There were found to be 10 fuzzy sets for defining levels that were associated
with the input variables. The triangular shapes were chosen to represent
membership functions because of their ability to affect the degree of mem-
bership, which can range from 0 to 1. Temperature and relative moisture
content for the concerned fuzzy set are shown in Figure 3.5, which is a rep-
resentation of the triangle function. A procedure is carried out according
to the criteria that the user sets on the website in order to guarantee that
the membership range is between 0 and 1.
Membership Grades
0.5
0
(a)
0.5
0
(b)
Web Interface
Automatic Manual
End
(Figure 3.6), facts are displayed using HTML in order to generate a web
page based on readings. The HTML code that was appended was derived
from the sample code, and it was necessary in order to accomplish the
requirements of the prototype (Figure 3.7).
(a) (b)
3.5 Results
Obtained findings explored that the relative moisture content rises to a
value of 54%, which falls within the parameters that have been established.
The amount of time that was required for the variables to stabilize was 4
minutes.
Figure 3.9 illustrates how the system may maintain a constant tempera-
ture while simultaneously lowering the relative moisture content to 54%,
60
55
Humidity (%)
50
Relative
45
40
35
30
0 Minutes 4
(a)
50
Temperature (°C)
40
30
20
10
0
0 Minutes 4
(b)
Figure 3.9 Ranges are defined at set points (a), humidity, (b) temperature.
36 Fuzzy Logic Applications in Computer Science and Mathematics
placing it within the parameters of the range that can be controlled by the
set points (Figure 3.10). Ten minutes were allotted for the stabilization
process.
Through the adaptation of this, the efficacy of irrigation system could be
tested. The length of each irrigation was 5 seconds, and there was a gap of
5 minutes between each irrigation. In all, nine irrigations were performed.
This variation ranged from 30% to 100%. On the other hand, after the
ninth irrigation, an average moisture level that remained constant at 93%
was measured, which confirmed that the system was operating as intended
(Figure 3.11.)
80
Humidity (%)
70
Relative
60
50
40
30
0 Minutes 10
(a)
40
Temperature (°C)
30
20
10
0
0 Minutes 10
(b)
Figure 3.10 Distinct range of the set points: (a) humidity, (b) temperature.
100
90
80
70
Soil Moisture
60
50
40
30
20
10
0
0 Minutes 5
Figure 3.11 Set points in the defined range (a) humidity, (b) temperature.
Fuzzy Logic for Greenhouse Environment 37
3.6 Conclusion
The findings have been illustrated the enhancements that are possible to
attain in terms of greenhouse temperature management via the use of a
fuzzy controller in conjunction with particle swarm optimization. It has
also been suggested that SD cards could be used in order to expand the
amount of storage space available on the prototype.
Bibliography
Azaza, M., Tanougast, C., Fabrizio, E., Mami, A., Smart greenhouse fuzzy log-
ic-based control system enhanced with wireless data monitoring. ISA Trans.,
61, 297–307, 2016. [CrossRef] [PubMed].
Castañeda, A. and Castaño, V.M., Smart frost control in greenhouses by neu-
ral networks models. Comput. Electron. Agric., 137, 102–114, 2017.
[CrossRef].
Cruz, E. and Hahn, F.F., Remote monitoring of greenhouse, in: Proceedings of the
American Society of Agricultural and Biological Engineers Annual International
Meeting, New Orleans, LA, USA, pp. 3554–3561, July 26–29, 2015.
Coates, J., Chipperfield, A., Clough, G., Wearable multimodal skin sensing for the
diabetic foot. Electronics, 5, 45, 2016. [CrossRef].
Groener, B., Knopp, N., Korgan, K., Perry, R., Romero, J., Smith, K., Stainback,
A., Strzelczyk, A., Henriques, J., Preliminary Design of a low-cost green-
house with open source control systems. Proc. Eng., 107, 470–479, 2015.
[CrossRef].
Iliev, O.L., Sazdov, P., Zakeri, A., A fuzzy logic-based controller for integrated
control of protected cultivation. Manage. Environ. Qual., 25, 75–85, 2014.
[CrossRef].
Jiang, J.A., Wang, C.H., Liao, M.S., Zheng, X.Y., Liu, J.H., Chuang, C.L., Hung,
C.L., Chen, C.P., A wireless sensor network-based monitoring system with
dynamic convergecast tree algorithm for precision cultivation management
in orchid greenhouses. Precis. Agric., 17, 766–785, 2016. [CrossRef].
Li, S.J., Li, M.Y., Wang, X.D., Design of greenhouse environment controller based
on fuzzy adaptive algorithm, in: Proceedings of the 27th Chinese Control and
Decision Conference, Qingdao, China, pp. 2644–2647, May 23–25, 2015.
Li, J. and Chong, S., An energy conservative wireless sensor networks approach for
precision agriculture. Electronics, 2, 387–399, 2013. [CrossRef].
Márquez, M., Ramos, J., Cerecero, L., Lafont, F., Balmat, J., Esparza, J., Temperature
control in a MISO greenhouse by inverting its fuzzy model. Comput. Electron.
Agric., 124, 168–174, 2016. [CrossRef].
38 Fuzzy Logic Applications in Computer Science and Mathematics
Maher, A., Kamel, E., Enrico, F., Atif, I., Abdelkader, M., An intelligent system for
the climate control and energy savings in agricultural greenhouses. Energ.
Effic., 9, 1241–1255, 2016. [CrossRef].
Montoya, A., Guzmán, J., Rodríguez, F., Sánchez, J., A hybrid-controlled approach
for maintaining nocturnal greenhouse temperature: Simulation study.
Comput. Electron. Agric., 123, 116–124, 2016. [CrossRef].
Milik, A., Bajer, L., Krejcar, O., Design and realization of low-cost control for
greenhouse environment with remote control. IFAC-PapersOnLine, 48, 368–
373, 2015. [CrossRef].
Mesas, F., Verdú, D., Meroño, J., Sánchez, M., García, A., Open-source hardware
to monitor environmental parameters in precision agriculture. Biosyst. Eng.,
137, 73–83, 2015. [CrossRef].
Nikolidakis, S., Kandris, D., Vergados, D., Douligeris, C., Energy efficient auto-
mated control of irrigation in agriculture by using wireless sensor networks.
Comput. Electron. Agric., 113, 154–163, 2015. [CrossRef].
Nicolosi, G., Volpe, R., Messineo, A., An innovative adaptive control system to
regulate microclimatic conditions in a greenhouse. Energies, 10, 722, 2017.
[CrossRef].
Outanoute, M., Lachhab, A., Ed-Dahhak, A., Selmani, A., Guerbaoui, M.,
Bouchikhi, B., A neural network dynamic model for temperature and rel-
ative moisture content control under greenhouse, in: Proceedings of the 3rd
International Workshop on RFID and Adaptive Wireless Sensor Networks,
Agadir, Morocco, pp. 6–11, May 13–15, 2015.
Revathi, S. and Sivakumaran, N., Fuzzy based temperature control of greenhouse.
IFAC-PapersOnLine, 49, 549–554, 2016. [CrossRef].
Rivera, J., Raygoza, J., Ortega, S., Figueroa, A., Begovich, O., FPGA-based startup
for AC electric drives: Application to a greenhouse ventilation system.
Comput. Ind., 74, 173–185, 2015. [CrossRef].
Song, Y., Wang, J., Zhang, X., Greenhouse environment parameters optimization
and wireless monitoring based on maximize profit margin. Sens. Lett., 14,
1129–1137, 2016. [CrossRef].
Srbinovska, M., Gavrovski, C., Dimcev, V., Krkoleva, A., Borozan, V., Environmental
parameters monitoring in precision agriculture using wireless sensor net-
works. J. Clean. Prod., 88, 297–307, 2015.
Verma, H., Jain, M., Goel, K., Vikram, A., Verma, G., Smart home system based
on internet of things, in: Proceedings of the 3rd International Conference on
Computing for Sustainable Global Development, New Delhi, India, pp. 2073–
2075, March 16–18, 2016.
Van Beveren, P., Bontsema, J., Van Straten, G., Van Henten, E., Optimal control of
greenhouse climate using minimal energy and grower defined bounds. Appl.
Energy, 159, 509–519, 2015. [CrossRef].
Fuzzy Logic for Greenhouse Environment 39
Wang, S.W. and Zhang, C.L., Study on farmland irrigation remote monitoring
system based on Zig Bee, in: Proceedings of the International Conference
on Computer and Computational Sciences, Noida, UP, India, pp. 193–197,
January 27–29, 2015.
Wang, J.-M., Yang, M.-T., Chen, P.-L., Design and implementation of an intelligent
windowsill system using smart handheld device and fuzzy microcontroller.
Sensors, 17, 830, 2017. [CrossRef] [PubMed].
4
Fuzzy Logics and Marketing Decisions
Mohammed Majeed *
Abstract
The goal of this chapter is to highlight areas of marketing that requires fuzzy logic
and how fuzzy logic affect marketing decisions. Fuzzy logic uses anthropologi-
cal knowledge and decision to assist acceptable perceptive in order to influence
a conclusion. The areas FL can be applied to marketing includes: communication
and advertising, customer service and satisfaction, customer segmentation, CRM,
pricing, evaluation of a product, uncertainty in the development of new products,
decision making, consumer nation identity (CNI), and quality of service. If the
problem of building a details and explanatory method for taking marketing deci-
sions based on fuzzy logic approaches is solved in this chapter, it will be impossible
to make an operative marketing decision based on a well-knowledgeable choice.
4.1 Introduction
The World Wide Web and other forms of information technologies are
becoming increasingly prevalent. As a result, the popularity of mobile
(web) sites continues to rise year after year. Since its inception in the mid-
60s of the 20th century, fuzzy logic has grown in popularity as one of the
most widely utilized artificial intelligence [18, 22] in theory and practice.
If you’re interested in learning more about fuzzy logic, you can check out
this page on investopedia for more information on the subject [5, 9]. Fuzzy
logic can be summarized as an appeal to one’s instincts. It’s all about trust-
ing your gut instincts and making the proper choice. Using fuzzy logic
Rahul Kar, Dac-Nhuong Le, Gunjan Mukherjee and Biswadip Basu Mallik and Ashok Kumar Shaw (eds.)
Fuzzy Logic Applications in Computer Science and Mathematics, (41–50) © 2023 Scrivener Publishing LLC
41
42 Fuzzy Logic Applications in Computer Science and Mathematics
4.2 Literature
4.2.1 Fuzzy Logic (FL)
According to Zadeh [32], “fuzzy sets” (fuzzy logic’s essential concept) were
first proposed in 1965. To describe the human mind, it was used. According
to fuzzy logic, logical assertions are valued according to their degree of truth-
fulness [8]. For fuzzy logic, it is important to consider the utility of impreci-
sion as well as the relevance of accuracy [16]. There are numerous advantages
to using a wide range of artificial intelligence approaches in combination
with each other, including as genetic algorithms, microbial fodder, fuzzy
logic, and neural networks [20]. Fuzzy logic has been utilized successfully
in energy and resource control [9, 10, 17]. It considers a number of factors,
and the combined weight of those factors determines the degree of influence.
Fuzzy Logics and Marketing Decisions 43
When it comes to time series forecasting, fuzzy logic is an excellent choice [1,
16] for building a marketing channel evaluation model.
as electric cars, public transportation, and trains, for example) [15, 29].
Qualitative and quantitative characteristics are frequently seen in data.
Additionally, non-numeric qualities need to be taken into account. Class
descriptions can be improved by the addition of linguistic phrases, such as
“comfortable,” “medium comfortable,” and “luxurious.” These numbers are
not really clear. It is feasible to cope with these ambiguous consumer data
by using fuzzy logic, fuzzy categorization, and compensating fuzzy logic. It
is feasible to treat each customer individually with fuzzy logic [21].
4.2.2.4 CRM
Data mining can benefit from the fuzzy model. Using direct marketing,
this example examines whether to visit the consumer in person, write him
a letter, or not to touch him in any way all [15]. Six input variables, each
with three or four qualities, three rule boxes, and a single output variable,
each with three attributes, are used to solve the problem [13].
4.2.2.5 Pricing
Studies on how attitudes and culture influence customer purchasing deci-
sions are becoming more common as marketing research expands [30] as
are studies that use fuzzy logic and look for behavioral reactions of cus-
tomers. Improved accuracy in the indorsed value points and a better client
involvement can be achieved by using fuzzy logic [12]. Because it reduces
expenses, fuzzy logic has a wide range of applications. This tolerance is
exploited to produce tractability, resilience, and a low solution cost in fuzzy
logic [13]. When using the fuzzy price system to make pricing decisions for
each of a company’s products in a market, all of the competitor’s pricing
changes and their product mix are used as input to the algorithm [14].
shop will be by adopting it. Therefore, with fuzzy logic, buyers can be self-
assured that a manufactured goods is chosen according to all their favor-
ites and necessities [13].
4.3 Conclusion
Fuzzy logic is a bridge between mathematics and human thought and
action. Fuzzy logic and its applications in management and marketing
research are discussed in this chapter. Intelligence and information can
be successfully stored in an enterprise-wide data warehouse using the
Fuzzy Logics and Marketing Decisions 47
References
1. Abdoli, M. and Sheykhesmaeli, S., Identification of factors influencing the
evaluation of marketing channels. Second National Conference on Marketing
Research, Tehran, 2015, (in Persian).
2. Al Ganideh, S.F., Consumer ethnocentrism in the Jordanian market: The
impact of socio-psychological variables on consumer ethnocentric tenden-
cies. J. Bus. Retail Manage. Res., 5, 1, 11–20, 2010.
48 Fuzzy Logic Applications in Computer Science and Mathematics
3. Al Ganideh, S.F., El Refae, G., Aljanaideh, M., Can fuzzy logic predict con-
sumer ethnocentric tendencies? An empirical analysis in Jordan. J. Phys. Sci.
Appl., 1, 5, 100–106, 2011.
4. Al Ganideh, S.F. and Aljanaideh, M., Using fuzzy logic to analyze marketing
data: The impact of socio-psychological variables on the national identity of
Jordanians. Transnatl. Corp. Rev., 5, 2, 104–114, 2013, http://dx.doi.org/10.1
080/19186444.2013.11668682.
5. Andrew, L., Fuzzy logic – A call for more intuitive decision making, 2020,
https://www.andrewperry.com/.
6. Bandaru, S., Gaur, A., Deb, K., Khare, V., Chougule, R., Bandyopadhyay, P.,
Development, analysis and applications of a quantitative methodology for
assessing customer satisfaction using evolutionary optimization. Appl. Soft
Comput. J., 30, 265–278, 2015.
7. Bashiri, A., Mirhosseini-Alizamini, S.M., Mehdi Nasrabadi, M., Application
of fuzzy logic for advertising marketing campaigns. Control Optim. Appl.
Math. (COAM), 5, 2, (25–37), 2021.
8. Bezděk, V., Using fuzzy logic in business. Proc. – Soc. Behav. Sci., SIM 2013/
12th Int. Symposium Management., 124, 371–380, 2014, 1877-0428.
9. Bravo Hidalgo, D., Climatización solar de edificaciones. Cent. Azúcar, 42,
72–82, 2015.
10. Bravo Hidalgo, D. and León González, J.L., Divulgación de la investigación
científica en el Siglo XXI. Rev. Universidad y Sociedad, 10, 88–97, 2018.
11. Davila, T., An empirical study on the drivers of management control systems’
design in new product development. Account. Organ. Soc., 25, 383–409,
2000.
12. Dairo, A. and Szucs, K., Fuzzy expert pricing systems and optimization
techniques in marketing science, in: Fuzzy Expert Pricing Systems and
Optimization Techniques, Fuzzy Systems and Data Mining, VI, pp. 255–260,
2020.
13. Dostal, P. and Lin, C., Business applications of fuzzy logic, in: The Oxford
Handbook of Computational Economics and Finance, Chen, S.-H., Kaboudan,
M., Du, Y.-R. (Eds.), 2018.
14. Enache, I.C., Fuzzy logic marketing models for sustainable development.
Bull. Transilv. Univ. Bras., Ser. V: Econ. Sci., 8, 57, 267–274, 2015.
15. Guo, L.-X., Lin, C.-C., Huang, P.-F., Jhou, S.-Y., Chen, S.-C., Tsai, F.-S., Fuzzy
logic analysis for key factors for customer loyalty in e-shopping environ-
ment. Front. Psychol., 12, 742699, 2021.
16. Halabi, D. and Shaout, A., Website tenders evaluation using fuzzy logic.
Int. J. Inf. Syst. Serv. Sect., 11, 32–50, 2019, https://doi.org/10.4018/
IJISSS.2019040103.
17. Hidalgo, D.B. and Guerra, Y.P., Eficiencia energética en la climatización de
edificaciones. Rev. Publ., 3, 218–238, 2016.
Fuzzy Logics and Marketing Decisions 49
18. Hernández, A.B. and Hidalgo, D.B., Fuzzy logic in business, management
and accounting. Open J. Bus. Manage., 8, 2524–2544, 2020, https://doi.
org/10.4236/ojbm.2020.86157.
19. Krishna, P.R. and De, S.K., A fuzzy approach to build an intelligent data
warehouse. J. Intell. Fuzzy Syst., 11, 23–32, 2001.
20. Kunsch, P.L. and Vander Straeten, M., The cost of a nuclear-fuel repository:
A criterion valuation by means of fuzzy logic, in: Evaluation and Decision
Models with Multiple Criteria: Case Studies, p. 311, Springer, Berlin, 2015,
https://doi.org/10.1007/978-3-662-46816-6_11.
21. Meier, A. and Werro, N., A fuzzy classification model for online customers.
Informatica, 31, 175–182, 2007.
22. Ouahli, J. and Cherkaoui, A., Team performance assessment within fuzzy
logic, 2019.
23. Phau, I. and Chan, K.W., Targeting East Asian markets: A comparative study
on national identity. J. Targeting Meas. Anal. Mark., 12, 2, 157–172, 2003,
http://dx.doi.org/10.1057/palgrave.jt.5740105.
24. Rahmatin, N., Santoso, I., Indriani, C., Rahayu, S., Widyaningtyas, S.,
Integration of the fuzzy failure mode and effect analysis (Fuzzy FMEA) and
the Analytical Network Process (ANP) in marketing risk analysis and miti-
gation. Int. J. Technol., 4, 809–818, 2018.
25. Stakhanov, D.V., Tselykh, A.N., Tselykh, L.A., Sergeev, N.E., On the issue of
adaptation of expert systems for decision support of applied management
tasks, SFU Bulletin. Technical Sciences, Technological Institute of the Southern
Federal University in Taganrog, Taganrog, 9, 159, 2014.
26. Stakhanov, D., Grishchenko, O., Fedortsova, S., Making management deci-
sions in the business environment based on fuzzy logic methods. Proceedings
of the VIII International Scientific and Practical Conference ‘Current problems
of social and labour relations’ (ISPC-CPSLR 2020), Advances in Social Science,
Education and Humanities Research, vol. 527, pp. 647–652, 2021.
27. Thelen, S.T. and Honeycutt, Jr. E. D., Assessing identity in Russia between
generations using the national identity scale. J. Int. Mark., 12, 2, 58–81, 2004,
http://dx.doi.org/10.1509/jimk.12.2.58.32900.
28. Ulfah, M., Trenggonowati, D.L., Ekawati, R., Ramadhania, S., The proposed
improvements to minimize potential failures using lean six sigma and multi
attribute failure mode analysis approaches. IOP Publishing. Broad Exposure
to Science and Technology 2019 (BEST2019). IOP Conf. Ser.: Mater. Sci. Eng.,
673, 012082, 2019.
29. Vom Berg, B.W., Valdés, A.R., Memari, A., Barakat, N., Gómez, J.M.,
Customer segmentation based on compensatory fuzzy logic within a sus-
tainability CRM for intermodal mobility, in: Studies in Computational
Intelligence, pp. 415–429, 2014.
30. Xia, X., Wang, Z., Gao, Y., Estimation of nonstatistical uncertainty using
fuzzy-set theory. Meas. Sci. Technol., 11, 4, 430–435, 2000.
50 Fuzzy Logic Applications in Computer Science and Mathematics
31. Yeh, C.H. and Kuo, Y.-L., Evaluating passenger services of Asia-Pacific inter-
national airports. Transp. Res. E, 39, 1, 35–48, 2003.
32. Zadeh, L.A., Fuzzy sets. Inform. Control, 8, 338–353, 1965.
33. Liu, C. H., A group decision-making method with fuzzy set theory and
genetic algorithms in quality function deployment. Qual. Quant. 44, 1175–
1189, 2010.
5
A Method for Ranking Fuzzy Numbers
Based on Their Value, Ambiguity,
Fuzziness, and Vagueness
Sunayana Saikia* and Rituparna Chutia
Abstract
Real-world issues are seen to involve uncertainty quite frequently. To prevent this
uncertainty, some parameters, like fuzzy numbers, can be taken into account. As
a result, ranking fuzzy numbers is crucial to bringing clarity to ambiguous situa-
tions in real life. We developed a novel fuzzy number ranking algorithm based on
value, ambiguity, fuzziness, and vagueness in this study. It is discovered that the
suggested ranking method has a high degree of discrimination and can rank fuzzy
numbers that cannot be distinguished by other recent and established methods.
Additionally, there are some numerical examples that show strong discrimination
power in comparison to current approaches. The suggested method also seems to
outperform in every scenario. Furthermore, the proposed strategy is applied in
this work to a university/college’s assistant professor recruitment procedure for a
certain field.
Keywords: Trapezoidal fuzzy numbers (TrFNs), ranking trapezoidal fuzzy
numbers, value, ambiguity, fuzziness, vagueness
5.1 Introduction
Generally, generalised intervals are used to represent fuzzy numbers. As a
result, fuzzy numbers cannot be ordered in the same way that real num-
bers can. As a result, at various times, multiple approaches for ranking
fuzzy numbers have been offered. Furthermore, the ordering of ambiguous
Rahul Kar, Dac-Nhuong Le, Gunjan Mukherjee and Biswadip Basu Mallik and Ashok Kumar Shaw (eds.)
Fuzzy Logic Applications in Computer Science and Mathematics, (51–98) © 2023 Scrivener Publishing LLC
51
52 Fuzzy Logic Applications in Computer Science and Mathematics
numbers has been thoroughly investigated. There are several research arti-
cles in the literature that describe various ways for ranking fuzzy numbers.
To summarise, there is no commonly accepted mechanism for ranking
fuzzy numbers. Existing approaches have been shown to provide results
that are sometimes counter-intuitive. Furthermore, some of these tactics
are nondiscriminatory and contradictory.
Here, a few of the ranking systems are carefully investigated. In 1976,
“[32], [33] provided the first unconventional approaches to the require-
ment of ordering fuzzy quantities using a maximising set”. “A variety of
fuzzy number ranking algorithms are analysed and compared by [8]”.
With the help of maximising set, [27] created a well-known ranking
strategy. [45],[46] “also proposed some suitable conditions to establish
the rationality validation of a fuzzy number ranking approach”. [11]
adopted the maximisation and minimization set strategy, but this rank-
ing method has certain drawbacks. As a result, “[7] suggested a new way
to address the constraints of methods based on maximising and mini-
mising sets”. To solve these restrictions, “[17] proposed a new ranking
approach based on the area between the centroid point and the origin”.
“[7] discovered certain flaws in [17] technique and suggested a new
ranking method for generalised fuzzy numbers to address them”. When
ranking fuzzy numbers, [47] “discovered that [17] ranking method was
flawed in a variety of scenarios”. [47] also developed an improved rank-
ing algorithm. [48] presented a new ranking approach for generalised
fuzzy numbers to address the restrictions of the centroid point formula.
Furthermore, [34], [36], [16] “presented a ranking approach for fuzzy
quantities based on the left integral values through an index of opti-
mism, and [50] enhanced this method”. [13] “proposed a new technique
based on the areas of the positive side, the areas of the negative side, and
the heights of generalised fuzzy numbers”. Unfortunately, when there
is compensation of areas, [12] and [13] fail. [14] “introduced a rank-
ing algorithm for generalised fuzzy numbers with varied left and right
heights”. [44] “introduced a new idea for ranking fuzzy numbers by con-
sidering the area at different decision levels”. Under some circumstances,
however, [14], [39], and [44] fail to identify trapezoidal and triangular
fuzzy numbers. [41] “developed a new ranking algorithm for exponen-
tial trapezoidal fuzzy numbers based on variance and also employing
the mellin transform of the fuzzy numbers”. [18] “suggested a modified
epsilon-deviation degree approach based on the ill-defined magnitude
‘value’ and the ambiguity of the fuzzy set”. [20] “also developed a new
notion of parametric form of fuzzy numbers with defuzzifiers at differ-
ent heights, as well as the concept of decision levels”. [10] “developed
A Method for Ranking Fuzzy Numbers 53
[20] and [18] for their discovery that the fuzzy quantities “value” and “ambi-
guity” have a substantial impact on ordering fuzzy numbers. Furthermore,
[2] discovered that the quantities “fuzziness” and “vagueness” of fuzzy
numbers have a substantial influence on fuzzy number ranking. As a result,
fuzzy numbers are ordered based on these quantities. This paper presents a
novel defuzzification procedure that ranks fuzzy numbers according to the
notions of “value,” “ambiguity,” “fuzziness,” and “vagueness.” Furthermore,
the inclusion-exclusion functions θ1 and θ2 combine value, ambigu-
ity, fuzziness, and vagueness. This aspect of the suggested methodology
demonstrates a high level of discrimination and may effectively rank fuzzy
numbers that are difficult to separate using other methods.
The ensuing sections make up the remaining portions of this paper. The
content is introduced in Section 5.2 with a many delineations of fuzzy fig-
ures and other terms that are applicable. The ranking approach suggested
in section 5.3 makes advantage of ill-defined amounts values, inscruta-
bility, fuzziness and vagueness of the fuzzy figures. Also some important
theorems has been proved. The suggested system’s rationality confirma-
tion has been demonstrated in section 5.4. Numerical exemplifications
are handed in Section 5.5, pressing the suggested system’s bettered perfor-
mance. Also, using the suggested system, section 5.6 has carried out a fuzzy
threat analysis for fiscal investment. The findings and important factors of
the suggested approach are stressed in section 5.7.
5.2 Preliminaries
5.2.1 Definitions and Concepts
A quick overview of some fundamental terms and ideas connected to the
current discussion is provided in this section.
Definition 5.2.1. [44] “A fuzzy number µ = (µ1, µ2, µ3, µ4) is a fuzzy subset
of the real line R such that fµ : R −→ [0, 1] which satisfies the following
properties:
Definition 5.2.2. [51] “A fuzzy number µ = (µ1, µ2, µ3, µ4) is described as
any fuzzy subset of the real line R with membership function defined as
(k 1 , k 2 , k 3 , k 4 ) k 0
k (5.1)
(k 4 , k 3 , k 2 , k 1 ) k 0
Definition 5.2.3. [51] “A trapezoidal fuzzy number µ = (µ1, µ2, µ3, µ4) is
described as any fuzzy subset of the real line R with membership function
defined as
x 1
, if 1 x 2 ,
2 1
1, if 2 x 3 ,
f x (5.2)
4 x
, if 3 x 4 ,
4 3
0, otherwise,
g µL ( y ) = µ1 + y( µ 2 − µ1 ) (5.3)
and
g µR ( y ) = µ 4 − y( µ 4 − µ3 ) (5.4)
respectively.”
56 Fuzzy Logic Applications in Computer Science and Mathematics
Definition 5.2.4. [49] “Assume that µ = (µ1, µ2, µ3, µ4) and ν = (ν1, ν2, ν3, ν4)
are two TrFNs where µi, νi, i = 1, 2, 3, 4 are real values. The arithmetic oper-
ation for these TrFNs are defined as follows:
(1) Addition: µ ⊕ ν = (µ1, µ2, µ3, µ4) ⊕ (ν1, ν2, ν3, ν4) = (µ1 + ν1,
µ2 + ν2, µ3 + ν3, µ4 + ν4),
(2) Subtraction: µ 0 ν = (µ1, µ2, µ3, µ4) 0 (ν1, ν2, ν3, ν4) = (µ1 − ν4,
µ2 − ν3, µ3 − ν2, µ4 − ν1),
(3) Multiplication: µ ⊗ ν = (µ1, µ2, µ3, µ4) ⊗ (ν1, ν2, ν3, ν4) =
(µ1 × ν1, µ2 × ν2, µ3 × ν3, µ4 × ν4),
(4) Division: µ 0 ν = (µ1, µ2, µ3, µ4) 0 (ν1, ν2, ν3, ν4) = (µ1 ÷ ν4,
µ2 ÷ ν3, µ3 ÷ ν2, µ4 ÷ ν1),
(5) Scalar multiplication:
(k 1 , k 2 , k 3 , k 4 ) k 0
k
(k 4 , k 3 , k 2 , k 1 ) k 0.
where µi for i = 1, 2, 3, 4 are any real numbers and ν1, ν2, ν3, ν4
are any non zero positive real numbers.”
Let the following membership function for the arbitrary fuzzy number
µ = (µ1, µ2, µ3, µ4), which is defined on the real line R.
f L (x ), if 1 x 2,
1, if 2 x 3,
f (x ) R
(5.5)
f (x ), if 3 x 4 ,
0, otherwise,
V(µ ) = ∫ 0 s( y )( g µL ( y ) + g µR ( y )) dy
1
(5.6)
1
A( ) 0 s( y ) g R ( y ) g L ( y ) dy (5.7)
1
1
F( ) 2
0 s( y ) g R ( y ) g L ( y ) dy 1 s( y ) g L ( y ) g R ( y ) dy (5.8)
2
1
1
T( ) 2
0 s( y ) g L ( y ) g R ( y ) dy 1 s( y ) g L ( y ) g R ( y ) dy (5.9)
2
In particular, for a TrFN µ = (µ1, µ2, µ3, µ4) with the member-
ship function defined in Eq. 5.5 with the inverse functions defined as
58 Fuzzy Logic Applications in Computer Science and Mathematics
1 1
V( ) 0 s( y ) g L ( y ) g R ( y ) dy ( 1 2 2 2 3 4 ) (5.10)
6
1 1
A( ) 0 s( y ) g R ( y ) g L ( y ) dy ( 4 2 3 2 2 1 ) (5.11)
6
1
1 1
F( ) 2
0 s( y ) g R ( y ) g L ( y ) dy 1 s( y ) g L ( y ) g R ( y ) dy ( 4 3 2 1 )
2 4
(5.12)
1
1
T( ) 2
0 s( y ) g L ( y ) g R ( y ) dy 1 s( y ) g L ( y ) g R ( y ) dy ( 1 2 3 4 )
2
(5.13)
R( µ ,θ1 ,θ 2 ) = V ( µ ) + θ1 { A( µ ) + F ( µ )} + θ 2T ( µ ) (5.14)
1 2 0, if V( ) V( ),
1 1, 2 0, if V( ) V( ) and A( ) A( ) or F( ) F( ) and t 0 0,
where
1 1, 2 0, if V( ) V( ) and A( ) A( ) or F( ) F( ) and t 0 0,
1 0, 2 1 if V( ) V( ), A( ) A( ) and F( ) F( ).
A Method for Ranking Fuzzy Numbers 59
Consider the fuzzy numbers µ and ν, then the following decisions can
be made
For the ranking index R, the ordering of the fuzzy numbers µ and ν is
µ ≾ ν if and only if µ ≺ ν or µ ∼ ν, and the ordering µ ≿ ν follows if and
only if µ > ν or µ ∼ ν.
Following, a few significant and crucial theorems are addressed, which
will assist to further develop a few characteristics of the recommended
technique.
Theorem 5.3.1. If there are two TrFNs µ = (µ1, µ2, µ3, µ4) and ν = (ν1, ν2, ν3,
ν4) in R, then V(µ + ν) = V(µ) + V(ν).
Proof. Let µ = (µ1, µ2, µ3, µ4) and ν = (ν1, ν2, ν3, ν4) be two TrFNs, then by
arithmetic of TrFNs µ + ν = (µ1 + ν1, µ2 + ν2, µ3 + ν3, µ4 + ν4). As such,
1
V( ) 0 s( y ) g L ( y ) g R ( y ) dy
1
V( ) 0 s( y ) g L ( y ) g L ( y ) g R ( y ) g R ( y ) dy
1 1
0 s( y ) g L ( y ) g R ( y ) dy 0 s( y ) g L ( y ) g R ( y ) dy
Remark 5.3.1. Let us consider two arbitrary fuzzy numbers be µ and ν and
the inverse functions of f µL ( x ), f µR ( x ), fνL ( x ) and fνR ( x ) are denoted as
g µL ( y ), g µR ( y ), g νL ( y ) and g νR ( y ) respectively. Then
g L ( y) g L ( y ) g L ( y ) and g L ( y ) g L ( y ) g R ( y ),
g R ( y) g R ( y ) g R ( y ) and g R ( y ) g R ( y ) g L ( y ).
60 Fuzzy Logic Applications in Computer Science and Mathematics
Theorem 5.3.2. If there are two TrFNs µ = (µ1, µ2, µ3, µ4), ν = (ν1, ν2, ν3, ν4)
in R. Then A(µ +ν) = A(µ) + A(ν).
Proof. Let µ = (µ1, µ2, µ3, µ4) and ν = (ν1, ν2, ν3, ν4) be two TrFNs, then by the
arithmetic of TrFNs µ + ν = (µ1 + ν1, µ2 + ν2, µ3 + ν3, µ4 + ν4). As such,
1
A( ) 0 s( y ) g R ( y ) g L ( y ) dy
Theorem 5.3.3. If µ = (µ1, µ2, µ3, µ4), ν = (ν1, ν2, ν3, ν4) be two TrFNs, then
F(µ + ν) = F(µ) + F(ν).
Proof. Let µ = (µ1, µ2, µ3, µ4) and ν = (ν1, ν2, ν3, ν4) be two TrFNs, then by the
arithmetic of TrFNs µ + ν = (µ1 + ν1, µ2 + ν2, µ3 + ν3, µ4 + ν4). As such,
1
1
F( ) 2
0 s(y ) g R (y ) g L (y ) dy 1 s(y ) g L (y ) g R (y ) dy
2
Theorem 5.3.4. If there are two TrFNs µ = (µ1, µ2, µ3, µ4), ν = (ν1, ν2, ν3, ν4)
in R, then T(µ + ν) = T(µ) + T(ν).
Proof. If µ = (µ1, µ2, µ3, µ4) and ν = (ν1, ν2, ν3, ν4) be two TrFNs, then by the
arithmetic of IT2FNs µ + ν = (µ1 + ν1, µ2 + ν2, µ3 + ν3, µ4 + ν4). As such,
1
1
T( ) 2
0 s(y ) g L (y ) g R (y ) dy 1 s(y ) g L (y ) g R (y ) dy
2
Remark 5.3.2. Let µ = (µ1, µ2, µ3, µ4) be an TrFN and g µL ( y ) and g µR ( y )
are the inverse functions of f µL ( y ) and f µR ( y ) respectively. Let k be a real
number, then
Theorem 5.3.5. Let µ = (µ1, µ2, µ3, µ4) be an TrFN. Then V(kµ) = kV(µ),
A(kµ) = kA(µ), F(kµ) = kF(µ) and T(kµ) = kT(µ) for k > 0 and V(kµ) =
kV(µ), A(kµ) = −kA(µ), F(kµ) = −kF(µ) and T(kµ) = kT(µ) for k < 0.
62 Fuzzy Logic Applications in Computer Science and Mathematics
Proof. Let µ = (µ1, µ2, µ3, µ4) be an TrFN and k ∈ R, then by the arithmetic
of TrFNs,
(k 1 , k 2 , k 3 , k 4 ) k 0
k
(k 4 , k 3 , k 2 , k 1 ) k 0
Let µ = (µ1, µ2, µ3, µ4) be an TrFN and k > 0, then by the arithmetic of
TrFNs, kµ = (kµ1, kµ2, kµ3, kµ4).
Hence using the Eq. 5.10, it follows that
1
V(k ) 0 s( y ) g kL ( y ) g kR ( y ) dy
1
V(k ) 0 s( y ) kg L ( y ) kg R ( y ) dy
1
k ( 0 s( y ) g L ( y ) g R ( y ) d y )
kV( )
1
A(k ) 0 s( y ) g kR ( y ) g kL ( y ) dy
1
A(k ) 0 s( y ) kg R ( y ) kg L ( y ) dy
1
k ( 0 s( y ) g R ( y ) g L ( y ) d y )
kA( )
A Method for Ranking Fuzzy Numbers 63
1
1
F(k ) 2
0 s( y ) g kR ( y ) g kL ( y ) dy 1 s( y ) g kL ( y ) g kR ( y ) dy
2
1
1
F(k ) 2
0 s( y ) kg R ( y ) kg L ( y ) dy 1 s( y ) kg L ( y ) kg R ( y ) dy
2
1
1
F(k ) k( s( y ) g R ( y ) g L ( y ) dy
2
0 1 s( y ) g L ( y ) g R ( y ) dy )
2
F(k ) kF( )
1
1
T(k ) 2
0 s( y ) g kL ( y ) g kR ( y ) dy 1 s( y ) g kL ( y ) g kR ( y ) dy
2
1
1
T(k ) 2
0 s( y ) kg L ( y ) kg R ( y ) dy 1 s( y ) kg L ( y ) kg R ( y ) dy
2
1
1
T(k ) k( s( y ) g L ( y ) g R ( y ) dy
2
0 1 s( y ) g L ( y ) g R ( y ) dy )
2
T(k ) kT( )
Again, let µ = (µ1, µ2, µ3, µ4) be an TrFN and k < 0, then by the arithmetic
of TrFNs, kµ = (kµ4, kµ3, kµ2, kµ1).
64 Fuzzy Logic Applications in Computer Science and Mathematics
1
V(k ) 0 s( y ) g kL ( y ) g kR ( y ) dy
1
A(k ) 0 s( y ) kg L ( y ) kg R ( y ) dy
1
k ( 0 s( y ) g L ( y ) g R ( y ) d y )
kA( )
1
1
F(k ) 2
0 s( y ) g kR ( y ) g kL ( y ) dy 1 s( y ) g kL ( y ) g kR ( y ) dy
2
1
1
F(k ) 2
0 s( y ) kg L ( y ) kg R ( y ) dy 1 s( y ) kg R ( y ) kg L ( y ) dy
2
1
1
F(k ) k( 02 s( y ) g R ( y ) g L ( y ) dy 1 s( y ) g L ( y ) g R ( y ) dy )
2
F(k ) kF( )
A Method for Ranking Fuzzy Numbers 65
1
1
T(k ) 2
0 s( y ) g kL ( y ) g kR ( y ) dy 1 s( y ) g kL ( y ) g kR ( y ) dy
2
1
1
T(k ) 2
0 s( y ) kg R ( y ) kg L ( y ) dy 1 s( y ) kg R ( y ) kg L ( y ) dy
2
1
1
T(k ) k( 02 s( y ) g L ( y ) g R ( y ) dy 1 s( y ) g L ( y ) g R ( y ) dy )
2
T(k ) kT( )
Theorem 5.3.6. The relations ≻ and ∼ will meet the following axioms for
order relations if µ, ν, ρ ∈ X are three arbitrary fuzzy numbers:
(1) Reflexivity: µ ≿ ν,
(2) Antisymmetricity: if µ ≿ ν and ν ≿ µ both are true if and
only if µ ∼ ν,
(3) Laws of trichotomy: µ ≻ ν or ν ≿ µ
(4) µ = ν if and only if µ ∼ ν.
Proof.
Now from Eqs. 5.15, 5.16 get that, ±[A(µ) + F(µ)] > ±[A(ρ) + F(ρ)]. This
results in the inequity V(µ) ± [A(µ) + F(µ)] > V(ρ) ± [A(ρ) + F(ρ)]. Thus,
R(µ, ±1, 0) > R(ρ, ±1, 0). The outcome is µ ≻ ρ.
Suppose that, µ ≿ ν and ν ≿ ρ happen for R(µ, 0, 1) ≥ R(ν, 0, 1) and
R(ν, 0, 1) ≥ R(ρ, 0, 1). Following that, V(µ) = V(ν) and V(ν) = V(ρ).
Then for θ1 = 0 and θ2 = 1,
T( µ ) ≥ T(ν ) (5.17)
T( ) T( ) (5.18)
Now from Eqs. 5.21, 5.22 get that, T(µ) ≥ T(ρ). As a result, there is ineq-
uity V(µ) + T(µ) ≥ V(ρ) + T(ρ). Thus, R(µ, 0, 1) ≥ R(ρ, 0, 1). Thus, the
outcome is µ ≿ ρ.
Proof. Let, µ ≻ ν and ν ≻ ρ occur for R(µ, 0, 0) > R(ν, 0, 0) and R(ν, 0, 0) >
R(ρ, 0, 0). Then, V(µ) ≠ V(ν) and V(ν) ≠ V(ρ), resulting in V(µ) > V(ν) and
A Method for Ranking Fuzzy Numbers 67
V(ν) > V(ρ). As a result, V(µ) > V(ρ). Eventually, R(µ, 0, 0) > R(ρ, 0, 0). As
a consequence, the result is µ ≻ ρ.
Again let, µ ≻ ν and ν ≻ ρ occur for R(µ, ±1, 0) > R(ν, ±1, 0) and R(ν, ±1,
0) > R(ρ, ±1, 0). Then, V(µ) = V(ν) and V(ν) = V(ρ).
Then for θ1 = ±1 and θ2 = 0,
Now, take it from Eqs. 5.19, 5.20 get that, ±[A(µ) + F(µ)] > ±[A(ρ) +
F(ρ)]. As a result, there is inequity V(µ) ± [A(µ) + F(µ)] > V(ρ) ± [A(ρ) +
F(ρ)]. Therefore, R(µ, ±1, 0) > R(ρ, ±1, 0). The outcome is µ ≻ ρ.
Let, µ ≻ ν and ν ≻ ρ occur for R(µ, 0, 1) > R(ν, 0, 1) and R(ν, 0, 1) >
R(ρ, 0, 1) respectively. Consequently, V(µ) = V(ν) and V(ν) = V(ρ).
Then for θ1 = 0 and θ2 = 1,
T( ) T( ) (5.22)
Now from Eqs. 5.21, 5.22 get that, T(µ) > T(ρ). This result in the ineq-
uity V(µ) + T(µ) > V(ρ) + T(ρ). Therefore, R(µ, 0, 1) > R(ρ, 0, 1). The out-
come is µ ≿ ρ.
Proof. Given two arbitrary fuzzy numbers be µ = (µ1, µ2, µ3, µ4) and ν = (ν1, ν2,
ν3, ν4), then it is follows from the Theorems 5.3.1, 5.3.2, 5.3.3 and 5.3.4 get that,
Thus, the result follows as, R(µ + ν, θ1, θ2) is equal to V(µ + ν) +
θ1{A(µ + ν) + F(µ + ν)} + θ2T(µ + ν). This leads to V(µ) + V(ν) + θ1{A(µ) +
A(ν) + F(µ) + F(ν)} + θ2{T(µ) + T(ν)}. The following equation holds true:
V(µ) + θ1{A(µ) + F(µ)} + θ2T(µ) + V(ν) + θ1{A(ν) + F(ν)} + θ2T(ν). Hence,
the result is R(A, θ1, θ2) + R(B, θ1, θ2).
Proposition 5.4.5. If X and X/ are the two sets, which contain the fuzzy
numbers where V, A, F, and T may be used, and (µ, ν) ∈ (X ∪ X1)2, then
µ ≻ ν by V, A, F and T on X if and only if µ ≻ ν by V, A, F on X1.
Proof. Claim: θ1 and θ2 have the same value when ordering µ and ν, and
they are invariant when ordering µ + ρ and ν + ρ. The proof of the claim
as: Let θ1 = 0 and θ2 = 0 in ordering µ and ν. Due to this, V(µ) ≠ V(ν), and
trivially V(µ + ρ) ≠ V(ν + ρ). Consequently, θ1 = 0 and θ2 = 0 in ordering
µ + ρ and ν + ρ. Let θ1 = ±1 and θ2 = 0 in ordering µ and ν. In light of the fact
that, V(µ) = V(ν), it follows that V(µ + ρ) = V(ν + ρ). Hence, θ1 = ±1 and
θ2 = 0 in ordering µ + ρ and ν + ρ. Again, let θ1 = 0 and θ2 = 1 in ordering
µ and ν. Hence, V(µ) = V(ν), A(µ) = A(ν) and F(µ) = F(ν), then trivially
V(µ + ρ) = V(ν + ρ), A(µ + ρ) = A(ν + ρ) and F(µ + ρ) = F(ν + ρ). As a result,
in the ordering of µ + ρ and ν + ρ, θ1 = 0 and θ2 = 1. Hence, the assertion.
Given that µ ≿ ν, there are three possible outcomes: i) R(µ, 0, 0) ≥
R(ν, 0, 0), ii) R(µ, ±1, 0) ≥ R(ν, ±1, 0) and iii) R(µ, 0, 1) ≥ R(ν, 0, 1).
Case 2: if R(µ, ±1, 0) ≥ R(ν, ±1, 0). Inequality R(µ, ±1, 0) + R(ρ, ±1, 0) ≥
R(ν, ±1, 0) + R(ρ, ±1, 0) results from this. The inequality R(µ + ρ, ±1, 0) ≥
R(ν + ρ, ±1, 0) now holds according to Theorem 5.3.9. Consequently, the
outcome is µ + ρ ≿ ν + ρ.
Proof. If µ + ρ ≻ ν + ρ by R, then R(µ + ρ, θ1, θ2) > R(ν + ρ, θ1, θ2). Theorem
5.3.7 states that R(µ, θ1, θ2) + R(ρ, θ1, θ2) > R(ν, θ1, θ2) + R(ρ, θ1, θ2). Therefore,
R(µ, θ1, θ2) > R(ν, θ1, θ2), which comes just after that µ ≻ ν.
Proof. Let, µ ≿ ν, then R(µ, θ1, θ2). This results in V(µ) + θ1[A(µ) +F(µ)] +
θ2T(µ) ≥ V(ν) + θ1[A(ν) + F(ν)] + θ2T(ν). The fact that for k > 0, k{V(µ) +
θ1[A(µ) + F(µ)] + θ2T(µ)} ≥ k{V(ν) + θ1[A(ν) + F(ν)] + θ2T(ν)} is true at
this time. Now, using the Theorem 5.3.5, the inequality {V(kµ) + θ1[A(kµ)
+ F(kµ)] + θ2T(kµ)} ≥ {V(kν) + θ1[A(kν) + F(kν)] + θ2T(kν)} holds. The
inequality resulting from this is R(kµ, θ1, θ2) ≥ R(kν, θ1, θ2). As a result, the
outcome is kµ ≿ kν.
The following situations arise if we assume that k = −m < 0 for k < 0.
Case 2: Let µ ≿ ν and V(µ) = V(ν) and t0 ≥ 0, which follows that θ1 = −1,
θ2 = 0. As a result, V(−mµ) = V(−mν) and then R(µ, −1, 0) ≥ R(ν, −1,
0). This leads to the inequality −[A(µ)+F(µ)] ≥ −[A(ν)+F(ν)]. Then
m[A(µ)+F(µ)] ≤ m[A(ν)+F(ν)]. Now, t0 ≥ 0, then −t0 ≤ 0 and θ1 = 1, θ2 =
0; hence, it follows that 5.3.5[A(−mµ)+F(−mµ)] ≤ [A(−mν)+F(−mν)].
This leads to the inequality that V(−mµ) + [A(−mµ) + F(−mµ)] ≤ V(−mν)
+ [A(−mν) + F(−mν)]. Then, it is true that R(−mµ, 1, 0) ≤ R(−mν, 1, 0).
This leads to −mµ = −mν. Hence the result.
Case 4: Let µ ≿ ν and V(µ) = V(ν), A(µ) = A(ν) and F(µ) = F(ν), which fol-
lows that θ1 = 0, θ2 = 1. As a result, V(−µ) = V(−ν) and R(µ, 0, 1) ≥ R(ν, 0, 1).
This leads to the inequality T(µ) ≥ T(ν). Thus, it is obvious that −mT(µ) ≤
−mT(ν). Now from Theorem 5.3.5, the inequality T(−mµ) ≤ T(−mν) holds,
which leads to V(−mµ) + T(−mµ) ≤ V(−mν) + T(−mν). Thus, R(−mµ, 0, 1)
≤ R(−mν, 0, 1). This leads to −mµ = −mν.
Proposition 5.4.11. Assume that X is a universal set and that Q is any cho-
sen finite subset of X. Also {µ, ν} ∈ Q2 and k ∈ R, where kµ, kν ∈ Q. Then
kµ ≻ kν follows if µ ≻ ν, for k > 0.
Case 2: If R(µ, ±1, 0) ≥ R(ν, ±1, 0). Inequality R(µ, ±1, 0)+R(−ρ, ±1, 0) ≥
R(ν, ±1, 0)+R(−ρ, ±1, 0) results as a result of this. The inequality R(µ − ρ, ±1,
0) ≥ R(ν − ρ, ±1, 0) is still valid in light of the Theorem 5.3.7. Consequently,
the outcome is µ − ρ ≿ ν − ρ.
Proof. Given that, µ ≿ ν then there are three situations that can happen:
i) R(µ, 0, 0) ≥ R(ν, 0, 0), ii) R(µ, ±1, 0) ≥ R(ν, ±1, 0) and iii) R(µ, 0, 1) ≥
A Method for Ranking Fuzzy Numbers 73
R(ν, 0, 1). Again, ρ ≿ ξ then there are three situations that can happen:
i) R(ρ, 0, 0) ≥ R(ξ, 0, 0), ii) R(ρ, ±1, 0) ≥ R(ξ, ±1, 0) and iii) R(ρ, 0, 1) ≥
R(ξ, 0, 1). Combining all the situations 3 cases arise:
Case 2: Let, µ ≿ ν and ρ ≿ ξ hold, which followed by R(µ, ±1, 0) ≥ R(ν, ±1,
0) and R(ρ, ±1, 0) ≥ R(ξ, ±1, 0) respectively. Now, the inequalities V(µ) =
V(ν) and V(ρ) = V(ξ) hold. Then for θ1 = ±1 and θ2 = 0,
Now from Eqs. 5.23, 5.24 get that, ±[A(µ) +F(µ)] +±[A(ρ) +F(ρ)] >
±[A(ν) +F(ν)] +±[A(ξ) +F(ξ)]. This leads to the inequality V(µ) ± [A(µ) +
F(µ)] + V(ρ) ± [A(ρ) + F(ρ)] > V(ν) ± [µ(ν) + F(ν)] + V(ξ) ± [A(ξ) + F(ξ)].
Thus, R(µ + ρ, ±1, 0) > R(ν + ξ, ±1, 0). Hence, the result µ + ρ ≻ ν + ξ.
T( ) T( ) (5.25)
T( ) T( ) (5.26)
Now from Eqs. 5.25, 5.26 get that, T(µ) + T(ρ) ≥ T(ν) + T(ξ). This results
in the inequity {V(µ) + T(µ)} + {V(ρ) + T(ρ)} ≥ {V(ν) + T(ν)} + {V(ξ) +
T(ξ)}. Thus, R(µ, 0, 1) + R(ρ, 0, 1) ≥ R(ν, 0, 1) + R(ξ, 0, 1). Hence, the result
µ + ρ ≿ ν + ξ.
74 Fuzzy Logic Applications in Computer Science and Mathematics
Proof. Given that, µ ≻ ν, in light of this, three cases come into play, these
are: i) R(µ, 0, 0) > R(ν, 0, 0), ii) R(µ, ±1, 0) > R(ν, ±1, 0) and iii) R(µ, 0, 1)
> R(ν, 0, 1). Once more, given that ρ ≻ ξ, then there are three cases that
come up: i) R(ρ, 0, 0) > R(ξ, 0, 0), ii) R(ρ, ±1, 0) > R(ξ, ±1, 0) and iii) R(ρ,
0, 1) > R(ξ, 0, 1). The following three cases are revealed when all the cases
are combined:
Case 1: Let, µ ≻ ν and ρ ≻ ξ occur for R(µ, 0, 0) > R(ν, 0, 0) and R(ρ, 0, 0)
> R(ξ, 0, 0) respectively. It follows that V(µ) ≠ V(ν) and V(ρ) ≠ V(ξ). This
means that V(µ) > V(ν) and V(ρ) > V(ξ). Thus, V(µ) + V(ρ) > V(ν) + V(ξ).
Finally, it is evident that R(µ + ρ, 0, 0) > R(ν + ξ, 0, 0). The outcome is µ +
ρ ≻ ν + ξ.
Case 2: Let, µ ≻ ν and ρ ≻ ξ occur for R(µ, ±1, 0) > R(ν, ±1, 0) and R(ρ, ±1,
0) > R(ξ, ±1, 0), which follows that V(µ) = V(ν) and V(ρ) = V(ξ).
Then for θ1 = ±1 and θ2 = 0,
Now from Eqs. 5.27, 5.28 get that, ±[A(µ) + F(µ)] + ±[A(ρ) + F(ρ)] >
±[A(ν) + F(ν)] + ±[A(ξ) + F(ξ)]. This results in the inequity V(µ) ± [A(µ) +
F(µ)] + V(ρ) ± [A(ρ) + F(ρ)] > V(ν) ± [A(ν) + F(ν)] + V(ξ) ± [A(ξ) + F(ξ)].
Thus, R(µ + ρ, ±1, 0) > R(ν + ξ, ±1, 0). Hence, the result µ + ρ ≻ ν + ξ.
Case 3: Let, µ ≻ ν and ρ ≻ ξ occur for R(µ, 0, 1) > R(ν, 0, 1) and R(ρ, 0, 1) >
R(ξ, 0, 1), which follows that V(µ) = V(ν) and V(ρ) = V(ξ).
Then for θ1 = 0 and θ2 = 1,
T( ) T( ) (5.29)
A Method for Ranking Fuzzy Numbers 75
T( ) T( ) (5.30)
Now from Eqs. 5.29, 5.30 get that, T(µ) + T(ρ) > T(ν) + T(ξ). This leads
to the inequality {V(µ) + T(µ)} + {V(ρ) + T(ρ)} > {V(ν) + T(ν)} + {V(ξ) +
T(ξ)}. Thus, R(µ, 0, 1) + R(ρ, 0, 1) > R(ν, 0, 1) + R(ξ, 0, 1). Hence, the result
µ + ρ ≻ ν + ξ.
Proof. The evidence is exactly the same as the proof for Property 5.4.16.
Example 5.5.1. Consider Two symmetric fuzzy numbers from [18], with
the same cores but different spreads, µ = (0.3, 0.6, 0.6, 0.9) and ν = (0.5,
0.6, 0.6, 0.7), are shown in Fig. 5.1. In comparison to ν, spreads for µ are
larger. As a result, the case is V(µ) < V(ν). As a result, the numerical data
in Table 5.1 show that µ < ν. The proposed method, as well as those by [17],
[15], [48], [13], [12], [6], [39], [20] and [9] give similar result. However, the
approaches of [15], [48], [41], [39], [39] rank the fuzzy numbers or images
of the fuzzy numbers inconsistently. Table 5.1 displays the outcomes of
various strategies.
76 Fuzzy Logic Applications in Computer Science and Mathematics
µ
1.0
0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1.0
Figure 5.1 Fuzzy numbers μ and ν are represented graphically in Example 5.5.1.
Example 5.5.2. Two symmetric fuzzy numbers from [18], with the same
cores but different spreads, µ = (0.3, 0.6, 0.6, 0.9) and ν = (0.5, 0.6, 0.6,
0.7), are shown in Fig. 5.2. In comparison to ν, spreads for µ are larger. As
a result, it is clear that V(µ) = V(ν), and that under the given case A(μ) ≠
A(ν). As a result, Table 5.2 numerical data demonstrate that µ < ν. The pro-
posed method yields equivalent results to those of [12]’s, [39]’s, [9]’s and
[20]’s techniques. Other methods, which are unable to differentiate these
fuzzy numbers are [17], [15], [48], [13], and [6]. Other methods that rank
fuzzy numbers or images of fuzzy numbers inconsistently include [12],
[41], [39], [20], [49], and [9]. Table 5.2 displays the outcomes of various
methods.
µ
1.0
0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1.0
Example 5.5.3. Consider the two typical fuzzy numbers µ = (4.0, 6.0,
9.0, 10.0) and ν = (2.0, 7.0, 8.0, 12.0), which are depicted in Fig. 5.3. They
have distinct cores and spreads. Furthermore, the spread of ν is wider
than the spread of µ. Therefore, it is clear that given the current situation,
µ ν
1.0
0 1.0 2.0 3.0 4.0 5.0 6.0 7.0 8.0 9.0 10.0 11.0 12.0 13.0
V(µ) = V(ν), A(µ) = A(ν), and F(µ) ≠ F(ν). The information in Table 5.3
thus proves that µ >- ν. The outcomes of the proposed method are com-
parable to those found in [17], [13], and [12]. The fuzzy numbers cannot
be ranked using [6]’s and [9]’s, respectively. Other approaches, including
[15]’s, [48]’s, [41]’s, [39]’s, [49]’s, and [20]’s are inconsistent in how they
rank the fuzzy numbers or the pictures of the fuzzy numbers. Table 5.3
presents the findings of several techniques.
Example 5.5.4. As illustrated in Fig. 5.4, two arbitrary normal fuzzy num-
bers with separate spreads and cores are µ = (1.0, 2.0, 5.0, 9.0) and ν = (−1.0,
3.0, 6.0, 7.0). In light of this, it is evident that V(µ) = V(ν), A(µ) = A(ν), F(µ)
= F(ν), and T(µ) ≠ (ν). The numerical information in Table 5.4 thus shows
that µ >- ν. The suggested approach produces results that are comparable
to those found in the works of [17], [15], [15], [12], [6], [6], [39], and [49].
Other methods, such as those by [14], [9], and [22], order the fuzzy num-
bers in an inconsistent manner. Furthermore, the fuzzy number images are
inconsistently interpreted by [15], [48], [41], and [39]. Table 5.4 shows the
outcomes of different approaches.
µ ν
1.0
–1.0 0.0 1.0 2.0 3.0 4.0 5.0 6.0 7.0 8.0 9.0 10.0
Table 5.4 Rank the fuzzy numbers in Example 5.5.4 in order. (Continued)
Example 5.5.5. As illustrated in Fig. 5.5, the three arbitrary normal fuzzy
numbers µ = (−1.0, −1.0, −1.0, −1.0), ν = (0.1, 0.2, 0.2, 0.6), and ρ = (0.25,
0.275, 0.275, 0.3) have separate cores and spreads. Thus, it can be observed
that in the situation, V(µ) < V(ν) < V(ρ). Table 5.5’s demonstrates that
µ < ν < ρ. The suggested method yields results that are comparable to those
µ ν ρ
1.0
–1.0 –0.9 –0.8 –0.7 –0.6 –0.5 –0.4 –0.3 –0.2 –0.1 0.0 0.1 0.2 0.3 0.4 0.5 0.6 0.7
Figure 5.5 Fuzzy numbers µ, ν, and ρ are graphically represented in Example 5.5.5.
82 Fuzzy Logic Applications in Computer Science and Mathematics
Table 5.5 Rank the fuzzy numbers in Example 5.5.5 in order. (Continued)
of [12], [6], [39], [9], and [20]. These fuzzy numbers are ranked as ν < ρ
in other systems, such as the [17]’s and [15]’s, which do not rank the fuzzy
number C. Additionally, the fuzzy numbers are ranked as ν ≻ ρ and the
fuzzy number C is not ranked by [48], [41] and [49]. On the other hand,
[13] rank these fuzzily defined numbers as µ < ν < ρ. Furthermore, the
fuzzy number images are inconsistently interpreted by [15], [48], [41], and
[39]. Table 5.5 shows the outcomes of different approaches.
Example 5.5.6. As illustrated in Fig. 5.6, the three arbitrary normal fuzzy
numbers µ = (5.0, 6.0, 6.0, 7.0), ν = (5.9, 6.0, 6.0, 7.0), and ρ = (6.0, 6.0, 6.0,
7.0) have the same core but different spreads. As a result, it can be seen that
under the given circumstance, V(µ) < V(ν) < V(ρ). Table 5.6 numerical
data therefore demonstrates that µ < ν < ρ. The recommended method, as
well as those by [48], [12], [6], [41], [39], [13], [49], [9] and [20] give simi-
lar result. Other techniques, like those employed by [15] and [17], arrange
the fuzzy numbers as µ < ν and are unable to rank the fuzzy number C.
Additionally, [41], [48] and [15] give the inconsistent result to the images
of the fuzzy numbers. Table 5.6 displays the results of various methods.
ν
1.0
ρ
µ
Figure 5.6 Fuzzy numbers µ, ν, and ρ are graphically represented in Example 5.5.6.
A Method for Ranking Fuzzy Numbers 85
Table 5.6 Rank the fuzzy numbers in Example 5.5.6 in order. (Continued)
Methods µ ν ρ Result −µ −ν −ρ Result
[49]
optimistic α = 1.0 0.0199 0.1519 0.5787 µ≺ν ≺ρ 0.5787 0.0117 0.0100 −µ ≻ −ν ≻ −ρ
moderate α = 0.5 0.0532 11.3937 36.854 µ≺ν ≺ρ 18.7936 0.0878 0.0271 −µ ≻ −ν ≻ −ρ
pessimistic α = 0.0 1.7282 85.3932 99.5437 µ≺ν ≺ρ 50.2718 6.5825 1.7282 −µ ≻ −ν ≻ −ρ
[20]
optimistic α = 0.9 1.1400 1.1442 1.1447 µ≺ν ≺ρ -1.1400 -1.1442 -1.1447 −µ ≻ −ν ≻ −ρ
moderate α = 0.5 4.5000 4.5750 4.5833 µ≺ν ≺ρ -4.5000 -4.5750 -4.5833 −µ ≻ −ν ≻ −ρ
pessimistic α = 0.1 5.9400 6.0858 6.1020 µ≺ν ≺ρ -5.9400 -6.0858 -6.1020 −µ ≻ −ν ≻ −ρ
Proposed method 6.0000 6.1500 6.1667 µ≺ν ≺ρ -6.0000 -6.1500 -6.1667 −µ ≻ −ν ≻ −ρ
A Method for Ranking Fuzzy Numbers 87
Example 5.5.7. Let µ = (0.4, 0.5, 1.0), ν = (0.4, 0.7, 1.0), and ρ = (0.4, 0.9,
0.9, 1.0) are three randomly generated normal fuzzy numbers, which have
the same spreads but a different core, as shown in Fig. 5.7. As a result, it
is clear that under the current situation, V(µ), V(ν), and V(ρ). As a result,
the numerical data in Table 5.7 show that µ < ν < ρ. The suggested method,
along with those by [17], [15], [13], [20], [48], [12], [6], [39], [49] and [9]
give similar result. Other approaches, such as [43]’s unable to differentiate
these fuzzy numbers. Further, [48] give an inconsistent result to the images
of the fuzzy numbers. The results of several approaches are displayed in
Table 5.7.
5.6 Application
Fuzzy risk analysis Take into account the following n alternatives, Ai,
where 1 ≤ i ≤ n. The p criterion Cik, 1 ≤ k ≤ p, may be used to evaluate
each alternative. The alternative Ai is assessed using two parameters, the
likelihood of failure (Rik ) and the magnitude of the loss (w
ik ) in terms of
1 ≤ k ≤ p and 1 ≤ i ≤ n, respectively. The framework for risk analysis in an
uncertain world.
Step 1. For each alternative Ai, take into account the likelihood of failure
( Rik ) and magnitude of loss (w
ik ), which are linguistic expressions with the
values 1 ≤ k ≤ p and 1 ≤ i ≤ n, where n is the number of alternatives and p
is the number of criteria in each option.
ν
1.0
µ ρ
0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1.0 1.1
Figure 5.7 Fuzzy numbers µ, ν and ρ are graphically represented in Example 5.5.7.
88 Fuzzy Logic Applications in Computer Science and Mathematics
Table 5.7 Rank the fuzzy numbers in Example 5.5.7 in order. (Continued)
Step 2. Using the fuzzy weighted mean technique, determine the overall
risk Ri of the alternative options Ai by integrating the Rik and w
ik of each
citation Cik. The total risk, denoted by Ri, is given as,
n
Rik Wik
R k 1
n
(ri1 , ri 2 , ri 3 , ri 4 ) (5.31)
k 1 Wik
Step 3. Then rank these fuzzy numbers Ri’s by the proposed ranking method.
from Table 5.8. The words allocated in terms of language are shown in
Table 5.9 and explained.
4. Real easte: Real estate is a type of real property. It’s not the same as
personal property. Real estate refers to land and anything endearingly
connected to it, whether created by nature or by man. Real estate can be
divided into five basic categories: residential, commercial, industrial, raw
land, and special use.
5. Long Term Bond: The Treasury’s longest maturity bond issue is known
as long term bonds. It can also be used to regular bond markets in order to
incorporate an issuer’s longest-term bond. A bond with a one-year matu-
rity is far more predictable and consequently less dangerous than one with
a 20-year maturity. Long-term bond treasury and other corporate long
bonds require a concentration on investing for long-term income, which
comes with its own set of risks and benefits.
Therefore, the total risk are
4
Rik Wik
R k 1
4
Wik
k 1
L L M M M M VL M
L M M VL
(0.1293, 0.2523, 0.7579, 1.3246)
4
Rik Wik
R k 1
4
Wik
k 1
VH H VL VL L L H H
VH VH L H
(0.6420, 0.7559, 0.9855, 1.1312)
A Method for Ranking Fuzzy Numbers 93
4
Rik Wik
R k 1
4
Wik
k 1
L VL L VL L VL VL VL
VL VL VL VL
(0.0046, 0.0400, 0.2900, 1.3300)
4
Rik Wik
R k 1
4
Wik
k 1
VL VL VL VL VL VL L L
VL VL VL L
(0.0043, 0.0373, 0.2325, 0.9657)
4
Rik Wik
R k 1
4
Wik
k 1
L L VL L M M VH VH
L VL M VH
(0.4971, 0.6336, 0.9113, 1.1473)
Now, we get that, the five fuzzy numbers for the five investment avenues
as shown in Table 5.10. Further, it is observed that, the suggested technique
ranks the investment options in the following order: R2 > R5 > R1 > R3 > R4,
which results in the inequality A2 > A5 > A1 > A3 > A4. It is seen that, the
investment avenue A2: Stock market has the highest risk and the investment
avenue A4: Real estate has the lowest risk among all the investment avenues.
5.7 Conclusions
Most current ranking methods, according to the evaluations, failed to rate
some of the equivocal figures. As a consequence, a new ranking system
based on fuzzy numbers’ value, ambiguity, fuzziness, and vagueness has
been proposed. Two new quantities, θ1 and θ2, are included in the suggested
method. As a result, the proposed approach is used to express and prove a
number of important theorems. Then all the characteristics of Wang and
Kerre were studied and shown in detail using theorems. To highlight the
benefits of the suggested technique, a comparison study was also con-
ducted. Studies also demonstrate that the methods previously described
failed to consistently rank the fuzzy number images, whereas the methods
put forth are successful in doing so. A real-world risk analysis application
based on investment avenue selection must also be addressed. The invest-
ment avenue A2: Stock market has the most risk, while the investment ave-
nue A4:Real esate has the lowest risk to invest someone’s money, according
to this discussion.
References
1. Abbasbandy, S. and Hajjari, T., A new approach for ranking of trapezoidal
fuzzy numbers. Comput. Math. Appl., 57, 3, 413–419, 2009.
2. Ahmad, N., Jacob, K., Mamat, M., Amir Hamzah, N.S., Solving a system of
fuzzy polynomials by ranking method. Far East J. Appl. Math., 43, 7–20, 01
2010.
3. Allahviranloo, T., Abbasbandy, S., Saneifard, R., A method for ranking of
fuzzy numbers using new weighted distance. Math. Comput. Appl., 16, 2,
359–369, 2011.
4. Allahviranloo, T. and Saneifard, R., Defuzzification method for ranking
fuzzy numbers based on center of gravity. Iran. J. Fuzzy Syst., 9, 57–67, 12
2012.
5. Arya, A. and Yadav, S.P., A new approach to rank the decision making units
in presence of infeasibility in intuitionistic fuzzy environment. Iran. J. Fuzzy
Syst., 17, 2, 183–199, 2020.
A Method for Ranking Fuzzy Numbers 95
6. Asady, B., The revised method of ranking L-R fuzzy number based on devia-
tion degree. Expert Syst. Appl., 37, 7, 5056–5060, 2010.
7. Asady, B. and Zendehnam, A., Ranking fuzzy numbers by distance minimi-
zation. Appl. Math. Modell., 31, 11, 2589–2598, 2007.
8. Bortolan, G. and Degani, R., A review of some methods for ranking fuzzy
subsets. Fuzzy Sets Syst., 15, 1, 1–19, 1985.
9. Botsa, D., Rao, P., Boddu, V., Ranking parametric form of fuzzy numbers by
defuzzification based on centroids value and ambiguity. J. Intell. Fuzzy Syst.,
41, 1–15, 05 2021.
10. Chen, C.-C. and Tang, H.-C., Ranking nonnormal p-norm trapezoidal fuzzy
numbers with integral value. Comput. Math. Appl., 56, 9, 2340–2346, 2008.
11. Chen, S.M., New methods for subjective mental workload assessment and
fuzzy risk analysis. Cybern. Syst., 27, 5, 449–472, 1996.
12. Chen, S.-M. and Chen, J.-H., Fuzzy risk analysis based on ranking general-
ized fuzzy numbers with different heights and different spreads. Expert Syst.
Appl., 36, 3, Part 2, 6833–6842, 2009.
13. Chen, S.-M. and Sanguansat, K., Analyzing fuzzy risk based on a new fuzzy
ranking method between generalized fuzzy numbers. Expert Syst. Appl., 38,
3, 2163–2171, 2011.
14. Chen, Z., Huang, G., Chakma, A., Hybrid fuzzy-stochastic modeling
approach for assessing environmental risks at contaminated groundwater
systems. J. Environ. Eng., 129, 1, 79–88, 2003.
15. Cheng, C.-H., A new approach for ranking fuzzy numbers by distance
method. Fuzzy Sets Syst., 95, 3, 307–317, 1998.
16. Choobineh, F. and Li, H., An index for ordering fuzzy numbers. Fuzzy Sets
Syst., 54, 3, 287–294, 1993.
17. Chu, T.-C. and Tsao, C.-T., Ranking fuzzy numbers with an area between the
centroid point and original point. Comput. Math. Appl., 43, 1–2, 111–117,
2002.
18. Chutia, R., Ranking of fuzzy numbers by using value and angle in the epsi-
lon-deviation degree method. Appl. Soft Comput., 60, 706–721, 2017.
19. Chutia, R., Ranking of z-numbers based on value and ambiguity at levels of
decision making. Int. J. Intell. Syst., 36, 1, 313–331, 2021.
20. Chutia, R. and Chutia, B., A new method of ranking parametric form of
fuzzy numbers using value and ambiguity. Appl. Soft Comput., 52, 1154–
1168, 2017.
21. Chutia, R., Gogoi, M.K., Firozja, M.A., Smarandache, F., Ordering single-
valued neutrosophic numbers based on flexibility parameters and its reason-
able properties. Int. J. Intell. Syst., 36, 4, 1831–1850, 2021.
22. Chutia, R., Gogoi, R., Datta, D., Ranking p-norm generalised fuzzy numbers
with different left height and right height using integral values. Math. Sci., 9,
1, 1–9, 2015.
23. Chutia, R. and Saikia, S., Ranking intuitionistic fuzzy numbers at levels of
decision-making and its application. Expert Syst., 35, 5, e12292, 2018.
96 Fuzzy Logic Applications in Computer Science and Mathematics
24. Chutia, R. and Saikia, S., Ranking of interval type-2 fuzzy numbers using
value and ambiguity, in: 2020 International Conference on Computational
Performance Evaluation (ComPE), pp. 305–310, 2020.
25. Darehmiraki, M., A novel parametric ranking method for intuitionistic fuzzy
numbers. Iran. J. Fuzzy Syst., 16, 1, 129–143, 2019.
26. Delgado, M., Vila, M., Voxman, W., On a canonical representation of fuzzy
numbers. Fuzzy Sets Syst., 93, 1, 125–135, 1998.
27. Dubois, D. and Prade, H., Fuzzy sets and systems: Theory and applications,
Academic Press, Inc., Orlando, FL, USA, 1980.
28. Ezzati, R., Allahviranloo, T., Khezerloo, S., Khezerloo, M., An approach for
ranking of fuzzy numbers. Expert Syst. Appl., 39, 690–695, 01 2012.
29. Ezzati, R., Enayati, R., Mottaghi, A., Saneifard, R., A new method for ranking
fuzzy numbers without concerning of real numbers. TWMS J. Pure Appl.
Math., 2, 256–270, 01, 2011.
30. Ezzati, R., Khezerloo, S., Ziari, S., Application of parametric form for ranking
of fuzzy numbers. Iran. J. Fuzzy Syst., 12, 59–74, 02 2015.
31. Ezzati, R. and Saneifard, R., A new approach for ranking of fuzzy numbers
with continuous weighted quasi-arithmetic means. Math. Sci. Q. J., 4, 143–
158, 06, 2010.
32. Jain, R., Decisionmaking in the presence of fuzzy variables. IEEE Trans. Syst.
Man Cybern., SMC-6, 10, 698–703, Oct 1976.
33. Jain, R., A procedure for multiple-aspect decision making using fuzzy sets.
Int. J. Syst. Sci., 8, 1, 1–7, 1977.
34. Kim, K. and Park, K.S., Ranking fuzzy numbers with index of optimism.
Fuzzy Sets Syst., 35, 2, 143–150, 1990.
35. Kumar, A., Singh, P., Kaur, A., Kaur, P., A new approach for ranking nonnor-
mal p-norm trapezoidal fuzzy numbers. Comput. Math. Appl., 61, 4, 881–
887, 2011.
36. Liou, T.-S. and Wang, M.-J.J., Ranking fuzzy numbers with integral value.
Fuzzy Sets Syst., 50, 3, 247–255, 1992.
37. Liu, P., Chen, S.-M., Wang, Y., Multiattribute group decision making based
on intuitionistic fuzzy partitioned maclaurin symmetric mean operators. Inf.
Sci., 512, 830–854, 2020.
38. Liu, P. and Wang, P., Multiple attribute group decision making method based
on intuitionistic fuzzy einstein interactive operations. Int. J. Fuzzy Syst., 22,
790–809, 02, 2020.
39. Nasseri, S., Zadeh, M., Kardoost, M., Behmanesh, E., Ranking fuzzy quanti-
ties based on the angle of the reference functions. Appl. Math. Modell., 37, 22,
9230–9241, 2013.
40. Nayagam, V.L.G., Jeevaraj, S., Dhanasekaran, P., An improved ranking
method for comparing trapezoidal intuitionistic fuzzy numbers and its
applications to multicriteria decision making. Neural Comput. Appl., 30, 2,
671–682, 2018.
A Method for Ranking Fuzzy Numbers 97
Abstract
Nowadays, clearance of competitive examinations is the major challenge faced
by many educators. The method of selecting toppers, based on the rank or grade
or percentage of marks in an examination, is the task involved in such competi-
tive examination. This paper aims at bringing out an analysis on determining the
salient factors involved in getting through TNSET in mathematics using the con-
cept of rough topology.
6.1 Introduction
Selection of relevant candidates in any field based on their knowledge,
aptitude, skill, and other factors is made through suitable assessment. The
assessment conducted lists out the marks or grades. The required num-
ber of candidates are chosen from the prepared list and given the credit of
clearing the exam. This procedure of selecting the candidates is referred as
competitive exams.
Rahul Kar, Dac-Nhuong Le, Gunjan Mukherjee and Biswadip Basu Mallik and Ashok Kumar Shaw (eds.)
Fuzzy Logic Applications in Computer Science and Mathematics, (99–106) © 2023 Scrivener Publishing LLC
99
100 Fuzzy Logic Applications in Computer Science and Mathematics
6.2.7 Basis
The collection of the universal set, null set together with the lower approx-
imation and the boundary region are the basis.
6.2.9 Core
The rough topology and the basis set removing each attribute are framed.
The attributes, which corresponds to different basis corresponding to the
basis of the target set, are collectively known as the core.
102 Fuzzy Logic Applications in Computer Science and Mathematics
6.3 Algorithm
The step-by-step procedure to be carried out in this analysis is as follows:
Step 1: the set of condition and decision attributes are defined with
respect to the analysis to be made.
Step 2: the data related to the attributes are collected and represented
as an information table. The attributes are represented by column and
the objects corresponding to the attributes are represented by rows.
Step 3: the universal set U and the subset X of U are framed.
Step 4: lower approximation, upper approximation, boundary region
are found.
Step 5: rough topology and basis are identified.
Step 6: the abovementioned two steps are repeated removing each
attribute one by one.
Step 7: identifying the attributes for which the basis are different is
done.
Step 8: the core set is framed using the results of step 6.
Q1) Whether the candidate has prepared for the examination personally?
Q2) Whether the candidate has adopted group study in the preparation of
the examination?
Q3) Has the candidate learnt through any private coaching centers?
Q4) Is the candidate preparing for CSIR NET exam too? It is the country
level competitive examination, whereas TNSET is the state level examina-
tion conducted by Tamil Nadu State Government.
Q5) Has the candidate has prepared for the exam going through the entire
syllabus of TNSET?
Q6) Has the candidate involved in revision and practice on a regular basis?
Q7) Is the candidate employed?
Q8) Has the candidate faced stress while preparing for the examination?
TNSET Attributes Evacuation by Rough Topology 103
6.6 Conclusion
Rough set topology has attracted researchers in bringing out solution to
decision making problems. In this chapter, various aspects involved in
clearing TNSET in mathematics are discussed. Using the method of rough
topology, the predominant attributes required for clearing the examina-
tion is identified. This work helps as a source for the aspirants of TNSET
to know the important factors that should be followed to get through the
examination.
References
1. Yao, Y. and Zhao, Y., Attribute reduction in decision- theoretic rough set
models. Inf. Sci., 178, 3356–3373, 2008.
2. Nasiri, J.N. and Mashinchi, M., Rough set and data analysis in decision
tables. J. Uncertain Syst., 3, 232–240, 2009.
3. Lellis Thivagar, M., Richard, C., Paul, N.R., Mathemcatical innovations of a
modern topology in medical events. J. Inf. Sci., 2, 33–36, 2012.
TNSET Attributes Evacuation by Rough Topology 105
Abstract
In this chapter, a new fuzzy method named as interval type-2 fuzzy inference sys-
tems (IT2FIS) is proposed along with Fractional order PID (FOPID) controller
to control tie-bar power error and frequency error of power system containing
multi area. Two area system containing conventional as well as non-conventional
sources like solar-thermal and wind-hydroelectric systems are studied in this
chapter. Type-2-fuzzy parameters are trained by Levenberg–Marquardt algorithm
(LMA). A comparison is done for the responses of the systems when controlled by
PID-type-2-fuzzy combined controller and FOPID-type-2-fuzzy combined con-
troller. PID parameters (Kp, Ki, Kd) are optimized using metaheuristic Chaotic
Atomic Search Optimization (CASO) algorithm. Simulation results are analysed
though the obtained parameters such as settling time, overshoot and undershoot
when the system is controlled by both the complex controllers with and without
disturbances and the same is compared with the results obtained using conven-
tional PID controller. The mathematical formulations along with the simulation
results are illustrated using MATLAB to prove the efficacy of the proposed con-
troller design methodology for hybrid multi-area power system using type-2 fuzzy
FOPID controller.
Keywords: Automatic generation control (AGC), chaotic atomic search
optimization (CASO), fractional order controller, Levenberg–Marquardt
algorithm, power system optimization, type-2 fuzzy inference systems
Rahul Kar, Dac-Nhuong Le, Gunjan Mukherjee and Biswadip Basu Mallik and Ashok Kumar Shaw (eds.)
Fuzzy Logic Applications in Computer Science and Mathematics, (107–124) © 2023 Scrivener Publishing LLC
107
108 Fuzzy Logic Applications in Computer Science and Mathematics
7.1 Introduction
Nowadays interconnected power system becomes popular due to heavy
demand of the load [1]. The main prominent drawback [2] of this intercon-
nected power system is the mismatching of tie line power and frequency
between the inter connected systems. This problem can be minimized
or even solved with the help of Load Frequency Control (LFC) [3] or
Automatic Generation Control (AGC) [4, 5]. Many controllers [6, 7] are
already being used to control Load frequency, but being proved inefficient.
Normal PI controller [8] is simple but frequency deviation is very wide to
tolerate. In conventional PI controller, controlling gain is constant, so it is
failed to provide the constant frequency and power to the load in different
conditions. So, self-tuning gain controller [9] is required to provide the
optimum performance in wide range of operation. Fuzzy [10, 11] has a
power to choose different values of controlling gain as per the frequency
deviation between inter connected systems [12]. Type-1 fuzzy [10, 11] is
a knowledge base controller where membership functions are static and
controlling action is done as per the rule base. Type-2-fuzzy system [13,
14] is a kind of fuzzy system where grading to membership function is
provided and can be used along with conventional PID and FOPID con-
trollers. Fractional order PID controller are more suitable to control any
system than the conventional PID controller due to its much number of
degrees of freedom [15]. Moreover, renewable resources like wind, solar,
ocean thermal, etc. produce high fluctuations in generation of electric
power and also give frequency error [16]. In order to reduce the mismatch-
ing of tie line power and frequency between the interconnected systems
load frequency controller is in demand particularly in the connected sys-
tem with renewable sources. In this chapter the advantages of the type-2
fuzzy theory along with the conventional PID and FOPID controllers are
utilized to control the network for optimum functioning. In the literature,
there are many nature inspired metaheuristic algorithms to optimize the
controller parameters like PSO [17], CSA [18], BFA [19]. But due to fast
converging behaviors of Chaotic Atomic Search Optimization (CASO)
[20] it is being utilized to get the optimum values of controller parameters
to control the hybrid multi-area power system.
ACE2 1
∆F2
TYPE 2 FUZZY CONTROLLER 1
∆u R2
∆r KPS β2 ++ ACE2
+
+
1 + S TPS
1
++
1 + S TWT
(Wind Power Plant)
Figure 7.1 Block diagram of the hybrid two area interconnected power system [21].
Y (S) KI
GPID K p SK d (7.1)
E(S) S
Where, Y(S) is the output of the PID controller and E(S) is the error
signal generated. Type-2-Fuzzy aided ACE output signal is fed to the con-
troller for the controlling operation. For getting the optimum result, three
(Kp, Kd and Ki) parameters of the PID controller needs to be tuned. The
parameters are tuned by CASO algorithm.
Kp
Kd S
YF (S) KI
GFOPID K p S Kd (7.2)
EF (S) S
Kp
Kd Sµ
are two different approaches for FLC design: type-1 FLCs (T1FLCs) and
type-2 FLCs (T2FLCs). Fuzzy logic was invented by Zadeh [30]. Fuzzy
Controlling action has an ability to handle uncertainties and imprecisions.
Using some statistical data related to system activity, it works. Any inter-
mediate state of input can be successfully handled by using Fuzzy logic
controller (FLCs). Hence, the FLC has established as a powerful technique
for various applications [31]. A Type-1 fuzzy controller deals with ordinary
fuzzy sets (OFSs) to interference system. But, type-2 Fuzzy controller has
a membership grade which itself is a fuzzy. So, Type-2 fuzzy Controller
is known as Fuzzy-Fuzzy set, whereas crisp type memberships [32] are
belonged to Type-1 fuzzy set.
Type-2 fuzzy system also contains two different membership functions
called Primary and Secondary Membership Functions (PMF & SMF).
PMF is a subset in [0,1] which determines a membership grade of type-2
and SMF is basically a probability of occurrence of PMF. Mathematically,
type-2 fuzzy set can be denoted as U that is characterized by a type-2
membership function U (a,u), where a ∈ X and u ∈ Ga ⊆ [0, 1].
U (a, u)
U , Ga [0, 1] (7.4)
a X u Ga (a, u)
[32] is identified by the shaded region of Figure 7.4a. The complete block
diagram representing the whole IT2FLC is represented in Figure 7.5.
IT2FLC consists of i) a type-2 fuzzifier that converts all real-life val-
ues into crisp values, ii) rule base that is used to process the fuzzifying
operations, iii) type reducer and iv) de-fuzzifier. Real life parameters like
Area Control Error (ACE) along with its derivatives go into the fuzzifier
first. Fuzzy sets are formed that is processed with the help of rule base of
the type-2 fuzzy sets. Then outputs in terms of type-2 fuzzy sets are pro-
cessed by the type-reducer performing centroid calculation. Type reduced
sets can be represented as LTR = [L1,Lr], L1 and Lr are the two end points of
type reduced fuzzy sets. In last stage, de-fuzzifier unit de-fuzzify the type-1
fuzzy sets to give crisp outputs [33]. The rule base that is used in this fuzzy
controller for Load Frequency Control is given as follows:
(a)
1
_
µū(x) Ga
µū(x)
0
X
(b) (c)
1 1
0 _ 0 _
µū(x) µū(x) 1 u µū(x) µū(x) 1 u
Figure 7.4 Illustration of (a) type-2 fuzzy membership function (b) triangular secondary
membership function (c) interval secondary membership function.
OUTPUT
PROCESSING Crisp
RULES
Output
Crisp DEFUZZIFIER
Input
FUZZIFIER
TYPE-REDUCER
INFERENCE
Type-2 Input Type-2 Output
Fuzzy Sets Fuzzy Sets
0 ( , L1 )
(L1 ACE)
p[ ACE] ( L1 , L1 ) (7.5)
2L1
1 (L1 , )
1
E (error )2 (7.6)
2
Start
Error evaluation
Et
µ = µ/β ωt = ωt+1
0<β<10
ωt = ωt+1 Compute the Jacobian matrix
T m=m+1
ωt+1 = ωt – (Jt Jt + µI)–1JtTe
m≤5 m>5
Et+1 ≤ Emax
End
Step 1: Initialize the control parameters (Kp, Kd and Ki for PID and µ, λ
additionally for FOPID) along with population size (F) and maximum
Iteration number (T).
Step 2: Set iteration T = 0 and calculate the fitness value for the mth particle.
d
Step 3: Compute Fmm using the equation Fmn rand n Fmn
nk
Step 4: Find the constrain force Vmd ( dbest m
d )
Step 5: Take the accelerating factor using
13 7
1
2 2 Hmn Hmn d
n
d
m
2 best m
d d d
p m 1 e T rand j Qe T
T j k
nj m , n 2 nj
xk
xk 1 mod(rx k (1 x k ) (4 r)sin( ,1)); r (1, 4)
4
Table 7.2 Performance analysis of two area hybrid system using IT2FLC based
PID and IT2FLC FOPID controllers without disturbances.
Two area test system
Functions Parameters PID IT2FLC-PID IT2FLC-FOPID
Δf1(Hz) OS 0.0098 0.0007962 0.0009518
US -0.0185 -0.008381 -0.008390
ST 32.17 15.61 20.56
Δf2(Hz) OS 0.00512 0.0006668 0.0007523
US -0.015 -0.006460 -0.006403
ST 31.19 13.77 20.12
ΔPtie(puMW) OS 0.00188 0.00056 0.0007111
US -0.00689 -0.004936 -0.005139
ST 30.47 14.08 20.83
×10–3
Frequency Error (puHz)
0 10 20 30 40 50 60 70 0 10 20 30 40 50 60 70
Time (s) Time (s)
×10–3
Tie-Bar Power Error (puMw)
2 (c)
0
–2 ×10–4
5
–4 0
–5 : IT2FLC-FOPID
–6 : IT2FLC-PID
16 18 20 22 : PID
–8
0 10 20 30 40 50 60 70
Time (s)
Figure 7.7 Two area hybrid system controlled by PID, IT2FLC based PID and IT2FLC
based FOPID controllers. (a) Frequency error in 1st area, (b) Frequency error in 2nd area,
(c) Tie-bar power error between two areas.
The detail parameters are scripted in Table 7.2 where it has been found that
type-2 fuzzy can control the errors of the power system in a very efficient
way. According to the overshoot (OS) condition, the combination of type-2
fuzzy and PID shows better responses compared to FOPID for Δf1(IT2FLC-
PID: 0.0007962Hz, IT2FLC-FOPID: 0.0009518 Hz), Δf2(IT2FLC-PID:
0.0006668 Hz, IT2FLC-FOPID: 0.0007523 Hz) and for ΔPtie (IT2FLC-
PID: 0.00056puMW, IT2FLC-FOPID: 0.0007111puMW). Similar effect
has been seen in Undershoot (US) (IT2FLC-PID: 0.0007962puMW,
IT2FLC-FOPID: 0.0009518puMW) for Δf1 and for ΔPtie (IT2FLC-PID:
-0.004936 Hz, IT2FLC-FOPID: -0.005139 Hz) but IT2FLC-FOPID gives
better response of US for Δf2 only. (IT2FLC-PID: -0.006460 Hz, IT2FLC-
FOPID: -0.006403 Hz). From the view of the Settling time (ST) IT2FLC-
FOPID produces better result as it gets back the error exactly to zero after
few seconds after (Δf1: 20.56 Hz, Δf2: 20.12 Hz, ΔPtie: 20.83puMW) but
IT2FLC-PID produces a minimum constant error that is very close to zero
with a faster settlement (Δf1: 15.61 Hz, Δf2: 13.77 Hz, ΔPtie: 14.08puMW).
Both the IT2FLC-PID and IT2FLC-FOPID controllers produce satisfac-
tory controlling operations in the power system network than the result
obtained with only PID controller.
CASO gives optimized values for different controllers used in the simu-
lation. Table 7.3 shows the optimized parameters for both PID and FOPID
controller without disturbances.
Type2 Fuzzy Contr for Hyb Mult Area Power Sys 119
0.02
Frequency Error (puHz)
0 10 20 30 40 50 60 70 0 10 20 30 40 50 60 70
Time (s) Time (s)
×10–3
5
Tie-Bar Power Error (puMw)
(c)
0
–5
: IT2FLC-FOPID
: IT2FLC-PID
: PID
–10
0 10 20 30 40 50 60 70
Time (s)
Figure 7.8 Two area hybrid system controlled by PID, IT2FLC based PID and IT2FLC
based FOPID controllers with disturbance (a) Frequency error in 1st Area, (b) Frequency
error in 2nd area, (c) Tie-bar power error between two areas.
obtained without disturbances. Similar effect has been observed for other
parameters of the system: US for Δf1 = -0.0191 Hz, Δf2 = -0.0149 Hz,
ΔPtie = -0.00742 puMW and ST for Δf1 = 34.45s, Δf2 = 33.81s, ΔPtie =
Table 7.4 Performance results of 2 area hybrid system using IT2FLC based PID
and FOPID controllers with sinusoidal disturbances.
Two area test system (with sinusoidal disturbances)
Functions Parameters PID IT2FLC-PID IT2FLC-FOPID
Δf1(Hz) OS 0.0176 0.00538 0.0077
US -0.0282 -0.0191 -0.0197
ST -- 34.45 34.47
Δf2(Hz) OS 0.0093 0.00425 0.0049
US -0.0218 -0.0149 -0.0158
ST -- 33.81 33.82
ΔPtie(puMW) OS 0.0046 0.00211 0.00223
US -0.0089 -0.00742 -0.00736
ST -- 34.08 34.09
Type2 Fuzzy Contr for Hyb Mult Area Power Sys 121
34.08s. Settling time has been delayed in this case due to the presence of
disturbances in the system, though can easily be nullified. Type-2 Fuzzy
based FOPID also produces the stable responses for all cases: OS for Δf1 =
0.0077 Hz, Δf2 = 0.0049 Hz, ΔPtie = 0.00223 puMW, US for Δf1 = -0.0197
Hz, Δf2 = -0.0158 Hz, ΔPtie = -0.00736 puMW, STs are Δf1 = 34.47s, Δf2 =
33.82s, ΔPtie = 34.09s.
7.7 Conclusion
This chapter provides an analysis of the application of Type-2 Fuzzy
controller in the field of inter-connected hybrid power system network.
Initially this type of power system network was controlled by only PID
controller. From the results obtained as can be shown from Figure 7.8, it
is observed that a significant level of oscillations in the response graph
though there are no applied disturbances. With the artful introduction of
Type-2 Fuzzy logic in association with PID controller, the oscillations are
drastically reduced making the system more stabilized. IT2FLC-FOPID
also performs efficiently in different conditions and outperforms the oper-
ation of IT2FLC-PID in certain cases as tabulated in Table 7.2. The simi-
lar controller works suitably for the system with injected disturbances in
it and making the system stable in respect to the desired parameters as
has been depicted in Table 7.4. The application of Type-2 Fuzzy controller
along with the PID/FOPID, thus can be successfully applied in the field of
hybrid multi area power system.
Appendix
• For Thermal Power Plant [19]:
Tg 0 08s Tt 0 3s Kr 0 3 Tr 10s KT 0 33
• For Solar Power Unit [21]:
a 900 b 18 c 50 d 50
• For Hydro-Electric Power Plant [10]:
TRH 48 7s TR 5s TGH 0 513s Tw 1s KT 0 99
• For Wind Power Unit [22]:
ωT = 0.5
• For Other Parameters [10]:
Hz 2.4Hz puMW
K PSi 120 , TPSi 20s, R1 R 2 , 1 2 0.425
puMW pu Hz
122 Fuzzy Logic Applications in Computer Science and Mathematics
References
1. Kristov, L., The bottom-up (R)evolution of the electric power system: The
pathway to the integrated-decentralized system. IEEE Power Energy Mag.,
17, 2, 42–49, March-April 2019.
2. Xu, S., Xue, Y., Chang, L., Review of power system support functions for
inverter-based distributed energy resources-standards, control algorithms,
and trends. IEEE Open J. Power Electron., 2, 88–105, 2021.
3. Shakibjoo, A.D., Moradzadeh, M., Din, S.U., Mohammadzadeh, A., Mosavi,
A.H., Vandevelde, L., Optimized type-2 fuzzy frequency control for multi-
area power systems. IEEE Access, 10, 6989–7002, 2022.
4. Panda, A.M., Automatic generation control of multi area interconnected
power system considering non-linearity due to governor dead band. Arch.
Control Sci., 7, 3-4, 285–99, 1998.
5. Hidalgo, D., Castillo, O., Melin, P., Type-l and type-2 fuzzy inference systems
as integration methods in modular neural networks for multimodal biome-
try and its optimization with genetic algorithms. J. Inf. Sci., 179, 13, 2123–45,
2009, [June].
6. Zribi, AI-Rashed, M., Alrifai, M., Adaptive decentralized load frequency
control of multi-area power systems. Int. J. Electr. Power Energy Syst., 27, 8,
575–83, 2005.
7. Gayadhar, P., Sidhartha, P., Ardil, C., Hybrid neuro fuzzy approach for auto-
matic generation control of two-area interconnected power system. Int. J.
Comput. Intell., 5, 1, 80–4, 2009.
8. Sahu, Kumar, R., Panda, S., Chandra Sekhar, G.T., A novel hybrid PSO-PS
optimized fuzzy PI controller for AGC in multi area interconnected power
systems. Int. J. Electr. Power Energy Syst., 64, 880–893, 2015.
9. Rodríguez-Abreo, O. et al., Self-tuning neural network PID with dynamic
response control. IEEE Access, 9, 65206–65215, 2021.
10. Arya, Y., New optimized fuzzy FOPI-FOPD controller for automatic genera-
tion control of electric power systems, 356, 11, 5611–5629, 2019.
11. Sudha, K.R. and Santhi, R.V., Robust decentralized load frequency control
of interconnected power system with generation rate constraint using type-2
fuzzy approach. Int. J. Electr. Power Energy Syst., 33, 3, 699–707, March 2011.
12. Kocaarslan, et al., Application of fuzzy reasoning to load? Frequency control
in two area power system. 1999 European Control Conference.
13. Shakibjoo, A.D. et al., Load frequency control for multi-area power systems:
A new type-2 fuzzy approach based on Levenberg–Marquardt algorithm.
ISA, 121, 40–52, 2021, Published by Elsevier.
14. Venkatraman, E., Velusami, S., Mohamed Thameem Ansari, M., Ganapathy,
S., Design of type- II fuzzy logic load frequency controller for two area ther-
mal reheat power systems. 2012 International Conference on Computing,
Electronics and Electrical Technologies (ICCEET), pp. 180–185, 2012.
Type2 Fuzzy Contr for Hyb Mult Area Power Sys 123
15. Nayak, Ranjan, J., Shaw, B., Sahu, B.K., Implementation of hybrid SSA–SA
based three-degree-of-freedom fractional-order PID controller for AGC
of a two-area power system integrated with small hydro plants. IET Gener.
Transm. Distrib., 14, 13, 2430–2440, 2020.
16. Jurasz, J. et al., A review on the complementarity of renewable energy
sources: Concept, metrics, application and future research directions. Sol.
Energy, 195, 703–724, 2020.
17. Sanki, P. and Basu, M., New approach in two-area interconnected AGC
including various renewable energy sources using PSO. Turk. J. Elec. Eng.
Comp. Sci., 26, 3, 1491–1504, 2018.
18. Chaine, S. and Tripathy, M., Performance of CSA optimized controllers
of DFIGs and AGC to improve frequency regulation of a wind integrated
hydrothermal power system. Alexandria Eng. J., 58, 2, 579–590, 2019.
19. Hakimuddin, N., Nasiruddin, I., Bhatti, T.S., Generation-based automatic
generation control with multisources power system using bacterial foraging
algorithm. Eng. Rep., 2, e12191, 2020.
20. Biswas, S., Roy, P.K., Chatterjee, K., Development of MADB of P-I controller
using LMI technique in a renewable energy based AGC system and study its
application in a deregulated environment including energy storage device.
Optim. Control Appl. Methods, 44, 1–26, 2021.
21. Biswas, S., Roy, P.K., Chatterjee, K., Renewable energy-based multi-source
system under deregulated environment using COKHA algorithm. IETE J.
Res., 1–19, 2021.
22. Bhongade, S., Tyagi, B., Gupta, H.O., Multi-area automatic generation con-
trol scheme including renewable energy sources, TELKOMNIKA Indonesian
Journal of Electrical Engineering (IJEE), 12, 7, 5052-5070, 2014.
23. Panwar, A. and Chahar, S., Automatic load frequency control of three area
power system using artificial intelligence, IEEE, 2016, 978-1-5090-3411-6/16
$31.00.
24. Gozde, H., Cengiz Taplamacioglu, M., Kocaarslan, I., Comparative perfor-
mance analysis of Artificial Bee Colony algorithm in automatic generation
control for interconnected reheat thermal power system. Int. J. Electr. Power
Energy Syst., 42, 1, 167–178, 2012.
25. Podlubny, I., Fractional-order systems and PI/sup/spl lambda//D/sup/spl
mu//-controllers. IEEE Trans. Automat. Control, 44, 1, 208–214, 1999.
26. Biswas, A., Das, S., Abraham, A., Dasgupta, S., Design of fractional-order
PIλ Dμ controllers with an improved differential evolution. Eng. Appl. Artif.
Intell., 22, 343–50, 2009.
27. Zamani, M., Karimi-Ghartemani, M., Sadati, N., Parniani, M., Design of
fractional order PID controller for an AVR using particle swarm optimiza-
tion. Control Eng. Pract., 17, 1380–7, 2009.
28. Monje, C.A., Vinagre, B.M., Calderon, A.J., Feliu, V., Chen, Y.Q., On frac-
tional PI controllers: Some tuning rules for robustness to plant uncertainties.
Nonlinear Dyn., 38, 369–81, 2004.
124 Fuzzy Logic Applications in Computer Science and Mathematics
29. Barbosa, R.S., Tenreiro Machado, J.A., Ferreira, I.M., Tuning of PID con-
trollers based on Bode’s ideal transfer function. Nonlinear Dyn., 38, 305–21,
2004.
30. Zadeh, L.A., The concept of a linguistic variable and its application to approx-
imate reasoning-I. Inf. Sci., 8, 199–249, 1975.
31. Hagras, H., Type-2 FLCs: A new generation of fuzzy controllers. IEEE
Comput. Intell. Mag., 2, 1, 30–43, 2007.
32. Sudha, K.R. and Vijaya Santhi, R., Robust decentralized load frequency con-
trol of interconnected power system with Generation Rate Constraint using
type2fuzzy approach. Int. J. Electr. Power Energy Syst., 33, 3, 699–707, March
2011.
33. Mendel, J.M., Uncertain rule-based fuzzy logic: Introduction and new direc-
tions, Prentice Hall, USA, 2000.
34. Dokht Shakibjoo, A., Moradzadeh, M., Moussavi, S.Z. et al., Load frequency
control for multi-area power systems: A new type-2 fuzzy approach based on
Levenberg–Marquardt algorithm. ISA Trans., 121, 40–52, 2021, https://doi.
org/10.1016/j.isatra.2021.03.044.
35. Wilamowski, Bogdan, M., David Irwin, J. (Eds.), Intelligent systems, CRC
Press, Boca Raton, 2018.
8
Alzheimer’s Detection and
Classification Using Fine-Tuned
Convolutional Neural Network
Anooja Ali1*, Sarvamangala D. R.2, Meenakshi Sundaram A.1 and Rashmi C.2
1
School of Computer Science and Engineering, REVA University, Bengaluru, India
2
School of Computing and Information Technology, REVA University,
Bengaluru, India
Abstract
Alzheimer’s disease (AD) is a neurocognitive disorder and it evolves into the
death of nerve cells. After the age of 60, the risk of developing the illness dou-
bles every five years, with estimates that by 2050, the number will have risen to
135 million. Brain structural image with magnetic resonance imaging (MRI)
has been extensively utilized to recognize AD as it can detect morphometric
variations and cerebral congenital malformations. Convolutional neural net-
works (CNNs) are extensively used for image receptions and analysis because
of their capacity to handle enormous amounts of unstructured data and retrieve
significant characteristics automatically. A new approach involving pretrained
CNN model, VGG16 with fine tuning has been proposed for automatic detec-
tion and classification of brain MRI images for AD. The results show that the
performance of the proposed modeling terms of accuracy, f1-score, recall and
precision is above 90%.
8.1 Introduction
The human brain is a sophisticated organ with millions of neurons that
communicate data via electrical and chemical impulses. Alzheimer’s
Rahul Kar, Dac-Nhuong Le, Gunjan Mukherjee and Biswadip Basu Mallik and Ashok Kumar Shaw (eds.)
Fuzzy Logic Applications in Computer Science and Mathematics, (125–142) © 2023 Scrivener Publishing LLC
125
126 Fuzzy Logic Applications in Computer Science and Mathematics
disease (AD) involves brain tissue deterioration and may progress to nerve
cell dying, resulting in memory loss and interruptions in basic human func-
tions. AD initially affects hippocampus region of brain, and later spread to
cerebral cortex. Hippocampus is the portion of the brain that is in com-
mand of episodic and visual memory. It also serves as a conduit between
body and minds. The loss of cells and damage to synapses and neuron will
occurs when the hippocampus shrinks. As a result, neurons can no longer
connect through synapses. In AD, an abnormal level of beta–amyloid pro-
tein cause cell damage, thereby damaging the neurons and thereby causing
brain atrophy in the final stage.
Normal brain and AD brain with changes in cerebral cortex and hippo-
campus have been depicted in Figures 8.1 and 8.2, respectively.
AD consist of three phases, preclinical, mild cognitive, and dementia.
Preclinical has unnoticeable change with high risk of AD, mild cogni-
tive has mere symptoms and interference in daily routines. Presently, AD
affects around 46.8 million people globally. By the year 2050, it is expected
that the number of Alzheimer’s sufferers would have risen to 300 mil-
lion and nearly 60% of dementia cases are due to AD [1]. If AD can be
Cerebral cortex
Healthy neurons
Normal brain Hippocampus
Shrinkage of
cerebral cortex Enlarged ventricles
detected earlier, then medication or therapy can avoid brain cell damage.
An early investigation can control the rate of progression of AD. Loss of
memory, anxiety, and speech problems, problems in reading, and writing
are involved in AD. All of these make AD patients nervous and hostile. In
dementia, the levels of AD are visible in patient. The four stages of demen-
tia include moderate dementia, mild dementia, very mild dementia, and
no dementia. The different stages of dementia are depicted in Figure 8.3.
Early researchers found that the social environment, particularly social
interactions, can have an impact on behavior and mental health of humans.
Researchers examined the link between loneliness and the chance of fall-
ing into AD, and it is found that lonely people had a greater risk of having
the disease than others. Dementia develops social isolation of patients [2].
When people begin to have difficulties in remembering things, it is recom-
mended that they seek medical care for a diagnosis and potential therapy.
For early-stage identification, many methodologies, such as biomark-
ers, brain imaging, cerebrospinal examinations, and so on, were used.
Diagnostic biomarkers and tests based on amyloid give inadequate insight
on disease process and unable to detect patients with the illness before con-
siderable amyloid-beta deposition in the brain occurs. Examining genetic
code or deoxyribonucleic acid (DNA) has the benefit of revealing a variety
of human disorders [3]. Uncovering and medicament of AD by DNA anal-
ysis techniques like genome sequencing and nucleotide conglomerations in
wet lab research is often time consuming. Genome sequencing approaches
with support vector machines (SVM) were inaccurate in detecting cancer
due to the predominance of wrong positives.
Figure 8.3 (a) Nondemented. (b) Moderately demented. (c) Mild demented. (d) Very
mild demented.
128 Fuzzy Logic Applications in Computer Science and Mathematics
heart, breast, abdomen, bone, and others for tissue, organ, and substruc-
ture segmentation, cancer detection, and classification. The DL-based
CNN model, facilitates computer-aided affirmation on the morphological
aspect of brain and/or hippocampus inclined on the textural specifications.
Multiple CNN with segmentation algorithm is a recursive Otsu thresh-
olding procedure is used to segment an MRI brain image and to detect
the level of brain degradation. The consideration was Alexnet architecture
with Dropout and Batch Normalization. The overall system performed
well, but the accuracy of few individual CNN went below 80% [14]. CNN
frameworks (toolkits) make deep learning approaches more efficient.
Researchers have suggested a variety of CNN architectures depending on
the task at hand [15].
The most promising field for detecting Alzheimer’s disease is brain
imaging. Imaging is a well-established technology in drug development,
and it’s becoming more used in clinical trials as an informative criterion,
a safety indicator, and an evaluation measure. Functional, structural, and
molecular imagings are the major technologies in AD detection. MRI anal-
ysis can insight the long-term structural alterations induced by the dis-
ease along with the disease’s development stages [16]. When compared to
CT scans, MRI allows for a better view of the brain’s structural parts. By
detecting typical signatures of brain structure and function changes, imag-
ing provides positive evidence for clinical assessment of AD patients.
Fully
Connected
Convolution
Pooling Output
Input
8.3 Methodology
The proposed methodology for classification of dementia is illustrated in
Figure 8.5.
No Dementia
Moderate
VGG16
Mild Dementia
Very Mild
8.3.1 Dataset
The dataset was taken from kaggle. The dataset consisted of train and test
directories. The train directory consisted of 5,121 images of which 2,560
images were nondemented, 1,792 images were very mild demented, 717
images were mild demented and 52 images were moderate demented. The
test directory consisted of 1,279 images of which 640 images were non-
demented, 448 images were very mild demented, 179 images were mild
demented and 12 images were moderate demented.
8.3.2 Pre-Processing
The images were pre-processed by histogram-based intensity standard-
ization. This was to address the variabilities in intensities of the pixels.
Moreover, the intensity values were also brought in the range of 0 to 255.
Since the number of training samples was limited, data augmentation was
performed to increase the training samples. The images were randomly
rotated in the range of 0 degree to 30 degree and were also randomly
flipped horizontally. Variations to brightness was done by +10% to −10%
and the images were zoomed in and out in the range of +1 to −1%. To
make the training set more robust to noise, random jitter was added to
the images. As the training and test images were imbalanced, synthetic
minority over-sampling technique (SMOTE) was applied. SMOTE is a
balanced statistical strategy for expanding overall number of examples
in the dataset. It creates new instances using the current minority cases
provided as input. It seeks to balance the class distribution by recreating
minority class cases at random.
A pretrained model was used, as it had already learnt the basic features
of the image. It was fine-tuned on AD data set. For fine tuning the model,
the last layer of VGGNet16 was replaced by a fully connected layer hav-
ing four neurons with softmax as the activation function. The optimizer
used was adam with learning rate of 0.1. L2 regularizer with dropout of 0.5
was used to overcome over fitting. The model was trained for 1000 epochs
with a batch size of 32. The performance of the model was evaluated using
accuracy, precision, recall, f1-score, and AUC. Visual modeling for perfor-
mance just in time is another central instructional approach for effective
mobile learning. This instructional strategy often involves reducing extra-
neous cognitive load on the spot, providing worked examples right before
performing a critical task, and visualizing learning object in three dimen-
sional presentations.
The initial implementation was done without SMOTE. Due to imbal-
anced data set, the performance of the model was not very efficient. The
model arrived at an overall accuracy of 0.57. The other performances mea-
sures obtained are depicted in Table 8.2.
SMOTE was applied to the dataset to overcome imbalance. The obtained
images were used to train and test the ADNet. ADNet have efficient fea-
ture reuse capabilities of Resnet and Densenet. Application of SMOTE
enhanced the performance of the model, as the model had learnt on a
Model acc
train
0.9 val
0.8
0.7
acc
0.6
0.5
0.4
0 20 40 60 80 100
Epochs
Model auc
1.00
0.95
0.90
0.85
auc
0.80
0.75
0.70
train
val
0.65
0 20 40 60 80 100
Epochs
Model loss
1.4 train
val
1.2
1.0
loss
0.8
0.6
0.4
0.2
0 20 40 60 80 100
Epochs
Figure 8.6 Training and validation accuracy, AUC and loss for 100 epochs.
Detect and Classify Alzheimer’s Using CNN 137
balanced dataset. The ADNet model was able achieve an accuracy of over
90%. The training and validation accuracy, and AUC loss obtained are
above 90%, and loss decreased with increase in the number of epochs. The
same is illustrated in Figure 8.6. The intensity of feature reuse is automati-
cally taught and data-adaptive.
600
NonDemented 636 0 0 3
500
300
MildDemented 13 0 592 57
200
100
ModerateDemented 14 1 44 565
0
NonDemented VeryMildDemented MildDemented ModerateDemented
Prediction
8.5 Conclusion
The research has been motivated by the wide success of CNN algorithms
to solve the classification of AD. The detection of various types of AD has
been treated as four class classification challenge. A popular CNN model
VGG16 is used to solve the challenge. Transfer learning with fine tuning
model is used to build the model.
A brief overview of AD, different types of AD, and CNN is provided.
The results reported in the chapter reveals that the CNN model ADNet
can properly handle classification of AD. The performance of the proposed
ADNet in terms of various performance metrics of accuracy, AUC score,
recall, precision and f1-score has been shown. All the performance metrics
are nearly around 90%, which denotes the efficiency of the proposed model.
The research can be taken in a number of different areas. To improve the
quality of outcomes and resource efficiency, variants and hybrids of CNN
models can be designed. CNN models can also be utilized to solve a num-
ber of unsolved medical image processing tasks.
References
1. Zhan, L., Zhou, J., Wang, Y., Jin, Y., Jahanshad, N., Prasad, G., Nir, T.M.,
Leonardo, C.D., Ye, J., Thompson, P.M., Comparison of nine tractography
algorithms for detecting abnormal structural brain networks in Alzheimer’s
disease. Front. Aging Neurosci., 7, Apr, 1–19, 2015, https://doi.org/10.3389/
fnagi.2015.00048.
2. Rashmi, C. and Kodabagi, M.M., A review on overlapping community detec-
tion methodologies. International Conference on Smart Technologies For
Smart Nation (SmartTechCon), pp. 1296–1300, 2017, https://ieeexplore.ieee.
org/document/8358576.
3. Ali, A., Viswanath, R., Patil, S.S., Venugopal, K.R., A review of aligners for
protein protein interaction networks. RTEICT 2017 - 2nd IEEE International
Conference on Recent Trends in Electronics, Information and Communication
Technology, Proceedings, 2018-Janua, pp. 1651–1655, 2017, https://doi.
org/10.1109/RTEICT.2017.8256879.
Detect and Classify Alzheimer’s Using CNN 139
17. Wang, Y., Sun, Y., Luo, Y., Peng, D., Li, X., Biomarkers for the clinical diagno-
sis of Alzheimer’ s disease: Metabolomics analysis of brain tissue and blood.
Front. Pharmocol., 12, July, 1–14, 2021.
18. Kametani, F. and Hasegawa, M., Reconsideration of amyloid hypothesis and
tau hypothesis in Alzheimer’s disease. Front. Neurosci., 12, January, 2018,
https://doi.org/10.3389/fnins.2018.00025.
19. Ali, A., Hulipalled, V.R., Patil, S.S., Abdulkader, R., Alignment of protein
interaction networks and disease prediction: A survey. Int. J. Adv. Trends
Comput. Sci. Eng., 8, 4, 2019, https://doi.org/10.30534/ijatcse/2019/42842019.
20. Khan, P., Kader, M.F., Islam, S.M.R., Rahman, A.B., Kamal, M.S., Toha, M.U.,
Kwak, K.S., Machine learning and deep learning approaches for brain dis-
ease diagnosis: Principles and recent advances. IEEE Access, 9, 37622–37655,
2021, https://doi.org/10.1109/ACCESS.2021.3062484.
21. Petersen, R.C., Aisen, P.S., Beckett, L.A., Donohue, M.C., Gamst, A.C.,
Harvey, D.J., Jack, C.R., Jagust, W.J., Shaw, L.M., Toga, A.W., Trojanowski,
J.Q., Weiner, M.W., Alzheimer’s disease neuroimaging initiative (ADNI):
Clinical characterization. Neurology, 74, 3, 201–209, 2010.
22. Eke, C.S., Jammeh, E., Li, X., Carroll, C., Pearson, S., Ifeachor, E., Early detec-
tion of Alzheimer’ s disease with blood plasma proteins using support vector
machines. IEEE J. Biomed. Health Inform., 25, 1, 218–226, January 2021.
23. Deng, J., Dong, W., Socher, R., Li, L., Li, K., Fei-fei, L., ImageNet: A large-
scale hierarchical image database. IEEE Conference on Computer Vision and
Pattern Recognition, 2009, pp. 248–255, 2009, https://ieeexplore.ieee.org/
document/5206848.
24. LeCun, Y., Botou, L., Bengio, Y., Haffner, P., Gradient based learning applied
to document recognition. Proc. IEEE, 1998, http://yann.lecun.com/exdb/
publis/pdf/lecun-98.pdf.
25. Krizhevsky, A. and Hinton, G.E., ImageNet classification with deep convolu-
tional neural networks. Adv. Neural Inf. Process. Syst., 25, 1–9, 2012.
26. He, K. and Sun, J., Deep residual learning for image recognition. IEEE
Conference on Computer Vision and Pattern Recognition, 2016, https://doi.
org/10.1109/CVPR.2016.90.
27. Sarraf, S. and Tofighi, G., Classification of Alzheimer’ s disease struc-
tural MRI data by deep learning convolutional neural networks. CoRR,
Vol:abs/1607.06583. 1–14, 2016.
28. Guan, Z., Ritesh, K., Yi Ren, F., A comprehensive study of Alzheimer’ s dis-
ease. Proc. Mach. Learn. Res., 1–16, 2019.
29. Fong, J.X., Shapiai, M.I., Tiew, Y.Y., Batool, U., Fauzi, H., Bypassing MRI
pre-processing in Alzheimer’ s disease diagnosis using deep learning detec-
tion network. 16th IEEE International Colloquium on Signal Processing & Its
Applications (CSPA 2020), CSPA, pp. 28–29, 2020.
Detect and Classify Alzheimer’s Using CNN 141
30. Marcus, D.S., Fotenos, A.F., Csernansky, J.G., Morris, J.C., Buckner, R.L.,
Open access series of imaging studies (OASIS): Longitudinal MRI data in
nondemented and demented older adults. J. Cogn. Neurosci., i, 12, 2677–
2684, 2010, https://doi.org/10.1162/jocn.2009.21407.Open.
31. Sarvamangala, D.R. and Kulkarni, R.V., Convolutional neural networks
in medical image understanding: A survey. Evol. Intell., 15, 1, 1–22, 2022,
https://doi.org/10.1007/s12065-020-00540-3.
32. Thirumagal, E. and Saruladha, K., Design of FCSE-GAN for dissection of
brain tumour in MRI. International Conference on Smart Technologies in
Computing, Electrical and Electronics (ICSTCEE), pp. 1–6, 2020.
9
Design of Fuzzy Logic-Based
Smart Cars Using Scilab
Josiga S.*, Maheswari R. and Subbulakshmi T.
Abstract
Fuzzy logic could be implemented to build smart cars that have the ability to
reduce human intervention while driving which helps in taking precise and
immediate decisions. A Fuzzy Inference System (FIS) is programmed using the
software ‘Scilab’ to work in varying geographic regions, road and atmospheric
conditions. To ensure unhinged functioning of the smart car, the inputs to the FIS
such as atmospheric conditions, external factors, traffic signal, obstacle distance,
and obstacle position must be calculated in a proper way. The fuzzy inputs are
obtained, and a rule base is created using Scilab to create the FIS that can provide
the speed and direction of the vehicle as the outputs of FIS. The objective of this
chapter is to advocate a novel approach to design a FIS to control the speed and
direction of a vehicle. The implementation of FIS based smart cars result in lesser
accidents and faster response system for the world.
Keywords: Fuzzy logic, smart car, scilab, fuzzy inference system, fuzzy rules
9.1 Introduction
Smart cars are vehicles that are capable of secure driving without the
intervention of the driver. Automation of driving was intiated on different
levels covering manually operated vehicles to completely automated vehi-
cles. Society of automotive engineers have a classification system with six
levels ranging from complete driver supervision to no driver supervision.
143
144 Fuzzy Logic Applications in Computer Science and Mathematics
Companies are surveying the best level of automation for the vehicle.
Automatic braking system is a quintessential part in a smart car that plays
an integral role in reducing accidents. The survey indicates that the smart
cars practice safe and economic methods of driving about 20% more than
humans. Autonomous cars [1] are developed differently for each region
based on the data collected in that region. Smart cars are in the developing
and testing stage in all the countries. A major proportion of smart cars are
electricity operated rather than being fuel operated. As emission of gases
from vehicles play a large role in air pollution, the proposed change can
bring about a noticeable decrease in air pollution.
Fuzzy logic was introduced in 1965 to deal with the problem of vague-
ness and ambiguity in data that requires accurate results which can be
provided only through numerical data. Fuzzy logic focusses on the inter-
mediate values which are partially true or partially false values rather than
the usual absolute values [18]. Fuzzy logic converts the uncertainty in a
problem into a precise quantity. Fuzzy logic balances the impreciseness in
the system by designing to operate within a window of uncertain condi-
tions. Fuzzy logic is primarily used in two situations [13]. First is when the
problem is of high complexity and is difficult to understand and second is
when the problem requires a tentative but fast solution [17]. We can infer
a general solution from a precise input by ignoring accuracy and uncer-
tainty. Fuzzy input can be obtained from real life experiments or through
surveys and research. The fuzzy rule base is a set of rules framed based on
the IF…THEN conditions [6]. The other rules are inferred from the given
set of rules [10]. Both the framed rules and the inferred rules are integrated
to provide the fuzzy output. The fuzzy input is fuzzified and classified into
an appropriate range of membership functions [11].
In this book chapter we use fuzzy logic application to manage the uncer-
tainty in operating smart cars. The evolution of the automotive technology
proves beneficial to people in various ways. Smart cars are safer, comfort-
able and in overall provides an enjoyable experience. Smart cars have a
variety of cameras and sensors to track and gain knowledge of the external
environment and drive the vehicle accordingly [15]. The sensors could be
used to gain input from the environment [2]. Accidents due to the driver’s
fault [16] is the most common cause of accidents in countries all over the
world [5, 7]. Automatic forward and reverse parking of vehicles were also
made automatic with the help of fuzzy logic [3, 8]. A fuzzy control system
is proven to be sure to reduce the chance of accidents to a greater extent
as the number of blunders are reduced to a great extent [10, 12]. Reduced
number of accidents also improves the economy as a huge sum of money is
spent on accidents. Smart cars also helps people save a lot of precious time
Design of Fuzzy Logic-Based Smart Cars Using Scilab 145
60000
50000
40000
30000
20000
10000
0
1965–1975 1975–1985 1985–1995 1995–2005 2005–2015 2015–Present
instead of wasting it on driving. Smart cars help the physically and visually
challenged to use cars in ease without the assistance of other people. Smart
cars also will reduce the traffic congestion [4] as the vehicles coordinate
with one another and reduce the crowding of vehicles [14]. We design a
FIS which provides the required output with the inputs which could be
fetched from the sensors. Speed and direction are the fuzzy outputs gen-
erated based on the given inputs. Fuzzy rule base is designed based on
the gathered data and real time data which provides a working solution to
operating smart cars.
The development of technology faces many barriers like social, eco-
nomic and environmental ones. A new paradigm is to be created to intro-
duce the concept of smart cars. The field of work is to be expanded to meet
the growing demand of the population. The interest of many researchers
has increased in the automation of the automobile industry. Due to their
advantages, smart cars have been researched in different parts of the world.
In the recent years, the use of fuzzy logic has been increasing. Fuzzy logic
is incorporated in several new technologies to design and enhance their
ability. The graph in Figure 9.1 shows the increase in use of fuzzy logic over
the years.
passenger seat. The third type is a combination of the passenger seat and
active suspensions. Vibrations in the passenger seat due to road bump
input are recorded for the three types of control systems [12].
9.3.1 Fuzzification
Fuzzification is the process of converting organized numerical quan-
tity into a vague and ambiguous quantity based on a given set of rules.
The input block consists of five inputs like atmospheric conditions, exter-
nal factors, traffic conditions, obstacle distance and the obstacle position.
The input data is collected from various sources that record these type of
data in real life. Atmospheric conditions include wind speed, rain, sun,
and other factors. External factors include lighting of the place, road con-
ditions, and other factors. Traffic conditions include the amount of vehicles
in a specific place at a specific time, obstacle distance include the distance
between the obstacle and our vehicle, obstacle position specifies the direc-
tion of the obstacle with respect to our vehicle. The input data are collected
and preprocessed using appropriate methods and are classified into vari-
ous membership functions as shown in Figure 9.3.
Figure 9.4 Membership functions for the input variable atmospheric conditions.
152 Fuzzy Logic Applications in Computer Science and Mathematics
membership functions North, North East, South, South East, West, North
West, East and South West as shown in Table 9.5.
9.3.5 Defuzzification
The data are then defuzzified using, the most common method for defuzzi-
fication, the centroid method. Defuzzification is the conversion of the
1
VG
0 G
0 10 20 30 40 50 60 70 80 90 100 PG
B
factors
VB
1
R
Y
0
G
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
traffic
mu(atm_conditions)
1
VH
obs_dist H
0
M
0 5 10 15 20 25 30 35 40 45 50
L
obs_dist
VL
mu(obs_position)
Figure 9.6 Plot of the five input membership functions using Scilab.
when the input values are provided in the code, the desired fuzzy output
is obtained in the Scilab console. The fuzzy output for n input values can
be calculated using the evalfls () function by passing it inside a for loop for
n times. By using this method, the output for any number of input values
can be obtained.
1 VH
H
0.8 M
L
mu(speed)
0.6
VL
0.4
0.2
0 10 20 30 40 50 60 70 80 90 100 120
speed
1 N
NE
0.8 E
mu(direction)
SE
0.6
S
0.4 SW
W
0.2 NW
0
Figure 9.7 Plot of the two output membership functions using Scilab.
simulated results. Also other input and output factors required for the
functioning of a smart car can be added in this implementation.
References
1. Sokri, M.N., Mahamad, A.K., Saon, S., Yamaguchi, S., Ahmadon, M.A.,
Autonomous car parking system using fuzzy logic. IEEE International
Conference on Consumer Electronics (ICCE), 2021.
2. Mahmud, K. and Tao, L., Vehicle speed control through fuzzy logic. IEEE
Global High Tech Congress on Electronics, 2013.
3. Liu, Z., Wang, Y., Lu, T.-F., Car-like mobile robot reverse parking using fuzzy
logic control approach. First International Conference on Robot, Vision and
Signal Processing, 2011.
4. Krause, B. and Pozybill, M., Fuzzy logic data analysis of environmental data
for traffic control. Proceedings of 6th International Fuzzy Systems Conference,
2002.
158 Fuzzy Logic Applications in Computer Science and Mathematics
5. Mamat, M. and Ghani, N.M., Fuzzy logic controller on automated car brak-
ing system. IEEE International Conference on Control and Automation, 2009.
6. Viegas, M.A.A. and da Costa Jr., C.T., Fuzzy logic controllers for charging/
discharging management of battery electric vehicles in a smart grid. J. Control
Autom. Electr. Syst., 2021.
7. Riid, A., Pahhomov, D., Rustern, E., Car navigation and collision avoidance
system with fuzzy logic. IEEE International Conference on Fuzzy Systems,
2004.
8. Wang, Z.-J., Zhang, J.-W., Huang, Y.-L., Zhang, H., Mehr, A.S., Application
of fuzzy logic for autonomous bay parking of automobiles. Int. J. Autom.
Comput., 2011.
9. Sachan, S. and Mortka, M.Z., Fuzzy logic triggered charging infrastruc-
tures for electric vehicles. IEEE First International Conference on Smart
Technologies for Power, Energy and Control (STPEC), 2020.
10. Van, N.D. and Kim, G.-W., Fuzzy logic and deep steering control based rec-
ommendation system for self-driving car. 18th International Conference on
Control, Automation and Systems, 2018.
11. Xiong, Q., Chen, Z., Zeng, X., Guo, J., Development of membership
degree functions of the car-following models based on fuzzy logic. Second
International Conference on Intelligent Computation Technology and
Automation, 2009.
12. Yagiz, N., Sakman, L.E., Guclu, R., Different control applications on a vehicle
using fuzzy logic control. Sadhana, 2008.
13. Bernardo, D., Hagras, H., Tsang, E., A genetic type-2 fuzzy logic based sys-
tem for the generation of summarised linguistic predictive models for financial
applications, Springer-Verlag Berlin Heidelberg, Germany, 2013.
14. Cheng, S.-T., Li, J.-P., Horng, G.-J., Wang, K.-C., The adaptive road routing
recommendation for traffic congestion avoidance in smart city. Wirel. Pers.
Commun., 2014.
15. von Altrock, C., Krause, B., Zimmennann, H.-J., Advanced fuzzy logic con-
trol technologies in automotive applications. IEEE International Conference
on Fuzzy Systems, 1992.
16. Le, D.-N., An efficient driver behavioral pattern analysis based on fuzzy log-
ical feature selection and classification in big data analysis. J. Intell. Fuzzy
Syst., 2021.
17. Kar, R. and Shaw, A.K., Analysis of digital competencies of 21st century
teachers of mathematics education by pentagonal fuzzy number and some of
its arithmetic operations. J. Educ. Learn. Math. Res., 2021.
18. Mukherjee, G., Motion detection and estimation in fused video by using
optical flow technique with fuzzy application. Int. J. Adv. Res. Comput. Sci.,
2010.
10
Financial Planning and Decision Making
for Students Using Fuzzy Logic
G. Surya Deepan1* and T. Subbulakshmi2
1
Electrical and Electronics Engineering Student, Vellore Institute of Technology,
Chennai, Tamil Nadu, India
2
School of Computer Science and Engineering, Vellore Institute of Technology,
Chennai, Tamil Nadu, India
Abstract
Fuzzy logic has lot of applications in daily life, which includes financial plan-
ning as well. Common applications like stock market, investment decision
making is implemented using fuzzy logic concepts. The focus of this research
is to take buying decisions for a product using fuzzy logic. The data collection
is done from students. The qualitative and quantitative data such as income
and necessity which are collected from the students are used as inputs. Fuzzy
inference system (FIS) takes the inputs and processes further to produce the
required decisions based on the intelligent rules. The output of FIS helps the
student to take a decision towards deciding the worthiness of the product.
The buying decisions are made effective with the use of FIS since the buying
options are completely analysed. The results enable the student to decide the
worth of the product toward buying based on intelligent output from fuzzy
logic.
10.1 Introduction
Planning is the most essential element in a person’s everyday life. In
finance, planning is everything. Planning makes people well prepared
for their future. One can describe planning as the process of reducing
159
160 Fuzzy Logic Applications in Computer Science and Mathematics
60000
50000
40000
30000
20000
10000
0
1965 - 1975 1975 - 1985 1885 - 1995 1995 - 2005 2005 - 2015 2015 - Present
Figure 10.1 Trend analysis of fuzzy logic papers in the past decades.
Student Financial Planning Using Fuzzy Logic 161
the field of finance. This potential is due to the unpredictable and imprecise
nature of the subject, i.e., “finance.” In this paper, we are going to see just
one application of fuzzy logic in the field of finance.
The main objective of this paper is to discuss the importance of financial
planning for a student. In this research, we are using fuzzy logic to solve the
impreciseness in the planning process. Financial stress has a large impact
on students’ daily lives. This stress also causes them to fail in academic
performance. We are introducing our methodology to reduce this stress.
Our methodology is designed to eliminate the impreciseness in the process
of planning. This research will make it possible for everyone to plan their
monthly expenditures.
In this research, we are using the help of an open-source software named
“Scilab”. Scilab is a famous open-source software which is mainly used to
test algorithms and carry out numerical computations. One of the greatest
advantages in Scilab is the feature called “sciFLT,” where FLT stands for
fuzzy logic toolbox. This feature allows the user to solve the fuzzy logic
problem with ease. This feature is the main reason for us to opt the Scilab
platform for the implementation of our paper. Since Scilab is an open-
source software, after the completion of program, it can be published as
a demo tool box, which can be later used by upcoming scholars for their
profit.
Membership Function:
Input:
Fuzzification. 1. Product Cost
1. Cost of the product
Fuzzification is done with 2. Necessity
2. Necessity
fuzzy operators. 3. Cost Percentage
3. Quality
4. Quality
Deffuzzification:
Rule Base: Rule Aggregation:
Deffuzzification is done
IF…THEN. Fuzzy Output.
by centriod method.
Output:
Essentiality.
In this paper, the data are collected from first year college students.
Around 120 of them participated. The inputs will be the data collected
from these students. The students have to answer these questions in both
qualitative and quantitative order. The input will be classified as the mem-
bership functions. These membership functions are processed by the help
of the fuzzy rules. Finally, defuzzification takes place. The defuzzified value
is seen as the output that will give the essentiality of the item of purchase.
10.3.1 Input
As mentioned, the input will be taken from students of first years. The
questions will be regarding several things, such as their monthly allowance,
their spending spree, the essentiality of various items in their perspective
and so on. The data will be gathered both in qualitative and quantitative
means. These data will be our input. These inputs are named as Quality,
Necessity, Income.
10.3.2 Fuzzification
Fuzzification can be defined as the process of conversion of a crisp set to a
fuzzy set with the help of the information we know. Now, in this research,
Student Financial Planning Using Fuzzy Logic 165
we are converting the data collected from the students (crisp set) into a
fuzzified sets with the help of fuzzy operators. The fuzzified sets are then
categorized into membership functions.
• Necessity,
• Cost percentage,
• Quality.
VL
L
M
0.5 H
VH
0
0 5 10 15 20 25 30 35 40 45 50 55 60 65 70 75 80 85 90 95 100
Percentage
L
M
0.5 H
VH
0
0 0.5 1 1.5 2 2.5 3 3.5 4 4.5 5 5.5 6 6.5 7 7.5 8 8.5 9 9.5 10 10.5 11
Quality
1 VL
L
M
0.5 H
VH
0
0 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 1.8 2 2.2 2.4 2.6 2.8 3 3.2 3.4 3.6 3.8 4 4.2 4.4 4.6 4.8 5
Necessity_Level
10.3.3.1 Necessity
This membership function actually represents the necessity of the items
which are being purchased. In other words, this function answers the ques-
tion “whether the item purchased is worth the cost?” The money spend
by a student goes into many things, such as food, clothing, rent, Internet,
entertainment. This section is also consisting five sets of levels ranging
from Most Necessary to Least Necessary. The Items purchased are catego-
rized into these five levels based on the data collected from the first years.
The five levels are stated in Figure 10.4, which is given below.
is 50% then the cost of the purchased item is half of the total resource of the
month. This function has five categories which denotes the ranges of the
percentage. The levels of cost percentage are given in Figure 10.5.
10.3.3.3 Quality
Every product has a different quality. The quality of a product has a great
impact on its worthiness. Nowadays, students tend to care less about the
quality of a product. This is mainly because of lack of awareness. Students
do not know how low-quality products destroy their finances. And in this
paper, we are not going to leave out such an important part of finance. We
are going to segregate this membership function into five different catego-
ries, and they are explained in Figure 10.6.
Rule 1:
If the cost–percentage is very high (VH), quality is high (H), necessity level
is medium (M), then the essentiality is medium (M).
Rule 2:
If the cost–percentage is high (H), quality is very high (VH), necessity level
is low (L), then the essentiality is low (L).
0.7
0.6
mu(Plan)
0.5
0.4
0.3
0.2
0.1
–0.1
0 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 1.8 2 2.2 2.4 2.6 2.8 3 3.2 3.4 3.6 3.8 4 4.2 4.4 4.6 4.8 5
Plan
10.3.6 Defuzzification
Defuzzification can be defined as the process of conversion of fuzzy sets to
crisp set. After the initial crisp set has been implemented using fuzzy rules,
quantifiable values will be gained. There are many methods of defuzzifica-
tion. The method that this research will be making use of is the “centroid”
method or also known as “centre gravity” method for defuzzification.
This method is the most popular method used for defuzzification. In this
method, we will be making use of center of gravity of fuzzy set and returns
the value in crisp set.
References
1. Khashei, M., Rezvan, M.T., Hamadani, A.Z., Bijari, M., A bi-level neural-based
fuzzy classification approach for credit scoring problems. Complexity, 18, 6,
46–57, 2013.
2. Jana, B. and Mohanty, S.N., An intuitionistic fuzzy logic models for multi-
criteria decision making under uncertainty. J. Inst. Eng. (India): Ser. C, 98, 2,
197–201, 2017.
3. Yeo, J.L., JosephNg, P.S., Alezabi, K.A., Eaw, H.C., Phan, K.Y., Time sched-
uling and finance management. IEEE 2020 IEEE Student Conference on
Research and Development (SCOReD), Batu Pahat, Johor, Malaysia, 2020.9.27-
2020.9.29, University Student Survival Kit., pp. 1–6, 2020.
4. Ammar, S., Duncombe, W., Hou, Y., Wright, R., Evaluating city financial
management using fuzzy rule—Based systems. Public Budg. Finance, 21, 4,
70–90, 2001.
5. James, J., Hadley Leavell, W., Maniam, B., Financial planning, managers, and
college students. Manage. Finance, 28, 7, 35–42, 2002.
6. Sekiguchi, T. and Yu, L., Fuzzy inference-based manager evaluation of ven-
ture enterprises in investment decision making. 1999 IEEE International
Fuzzy Systems Conference Proceedings, Seoul Korea, August 22-25, 1999,
1999.
7. Grothe, W.L. and Cotellessa, R.F., Strategies to finance your higher educa-
tion: Strategies include cost reduction and academic planning, but the most
important involves identifying, evaluating, and selecting financial aid. IEEE
Potentials, 1, Spring, 12–14, 1982.
8. Samartkit, P. and Pullteap, S., A design of decision making-assisted software
using fuzzy logic technique: A case study of solar cell investment project.
Electr. Eng., 231–223, 2019.
9. Vella, V. and Ng, W.L., A dynamic fuzzy money management approach for
controlling the intraday risk-adjusted performance of AI trading algorithms.
Intell. Syst. Account. Finance Manage., 22, 2, 153–178, 2015.
10. Norasibah, A., Ramli, N., Hashim, A., Hashim, E., Zulkifli, N., The
income-expenditure-saving analyses of the university students. Int. J.
Psychosoc. Rehabilitation., 24, 7375–7383, 2020.
11. Ghosh, S., Boob, A.S., Nikhil, N., Vysyaraju, N.R., Kumar, A., A fuzzy
logic system to analyze a student’s lifestyle. IEEE 2017 Ninth International
Conference on Advanced Computational Intelligence (ICACI), Doha, Qatar
(2017.2.4-2017.2.6), pp. 231–236, 2017.
12. Madi, E.N. and Tap, A.O. Md, On fuzzy financial planning model. IEEE
2010 2nd IEEE International Conference on Information Management and
Engineering, Chengdu, China (2010.04.16-2010.04.18), pp. 254–258, 2010.
Student Financial Planning Using Fuzzy Logic 171
13. Tarasyev, A.A., Agarkov, G.A., Ospina Acosta, C.A., Koksharov, V.A., Fuzzy
logic and optimization of educational paths. IFAC-PapersOnLine, 51, 2, 511–
516, 2018.
14. Sanchez-Roger, Oliver-Alfonso, Sanchís-Pedregosa, Fuzzy logic and its uses
in finance: A systematic review exploring its potential to deal with banking
crises. Mathematics, 7, 11, 1091, 2019.
11
A Novel Fuzzy Logic (FL) Algorithm for
Automatic Detection of Oral Cancer
M. Praveena Kiruba bai1* and G. Arumugam2†
Abstract
A diagnosis system for biomedical applications is presented. Oral cancer is a com-
mon cancer that affects the people worldwide. A mathematical framework named
Adaptive Neuro Fuzzy Inference System (ANFIS) algorithm implemented focuses
primarily on the classification of oral cancer. The source oral images acquainted
are denoised for noise removal and enhanced for processing the images. The
enhanced images are transformed and classified using ANFIS classifier. The pro-
posed ANFIS model demonstrated enhanced performance metrics with 93% clas-
sification accuracy.
11.1 Introduction
System modeling implemented using traditional mathematical techniques
is not well adapted for dealing with uncertain systems. A fuzzy inference
system, on the other hand, may mimic the qualitative features of reason-
ing processes and human knowledge without using exact quantitative
assessments. There are no established techniques for incorporating human
expertise into the rule set and database of a fuzzy inference system. Image
173
174 Fuzzy Logic Applications in Computer Science and Mathematics
the grey level intensity of each pixel. The primary goal of picture enhance-
ment is to raise the caliber of images.
Layer:
0 1 2 3 4 5
A1
X0
A2
B1
X0
B2
from the source oral picture as input in the classification mode. The output
is classified as cancerous and non-cancerous images.
11.7 Conclusion
A mathematical model, ANFIS classifier is implemented to diagnose the
oral cancer MRI images. The images are taken from open access data set.
The images are preprocessed and enhanced for image clarity. The proposed
method is analyzed using the performance metrics namely sensitivity,
specificity and accuracy. The classifier achieved 92.1% of sensitivity, 93.8%
of specificity, and 94.2% accuracy than other classifiers.
Bibliography
Sharma, M. and Mukharjee, S., Artificial neural network fuzzy inference system
(ANFIS) for brain tumor detection. Computer Vision and Pattern Recognition,
arXiv:1212.0059, December 2012.
178 Fuzzy Logic Applications in Computer Science and Mathematics
Abstract
Abroad jobs are the dream of all kind of people over a century. After getting their
jobs they may face practical problems. Few people give priority to work at abroad
due to their financial crisis or lead a luxury life. This article is a survey about the
merits and demerits faced by Indian workers abroad to decide to survey. The deci-
sion is concluded through rough topology.
12.1 Introduction
Indian workers have been migrating to abroad over 100 years. For certain
reasons they may be migrated to abroad like to improve their financial sta-
tus, thirsty to work at abroad, to get exposure in the world, etc., In need of
this, their priority to work at abroad is in high frequency. Indians choose to
work abroad for four main reasons. They have the impression that they can
increase their savings. They think the western world has a decent lifestyle.
They think that working abroad will make them famous in front of their
kin.
179
180 Fuzzy Logic Applications in Computer Science and Mathematics
However, there are other issues that Indian migrants confront at various
phases, which are made worse and more difficult by corruption, middle-
men, and scammers. Also they can feel like an outsider and face difficulties
while handling emergency situation at abroad.
Currently, 32 million NRIS and OCIS live outside of India. The larg-
est annual migration rate in the world is 2.5 million Indians who move
abroad each year. Here are a few succinct highlights of the main issues
Indian employees face:
12.2.7 Basis
The collection of the universal set, null set together with the lower approx-
imation and the boundary region is the basis.
12.2.9 Core
The rough topology and the basis set removing each attribute are framed.
The attributes which correspond to different basis corresponding to the
basis of the target set, are collectively known as the core.
12.3 Algorithm
The algorithm for this analysis consists of eight stages is as follows.
The set of condition and judgment attributes are determined in stage
1. At stage 2, to perform the analysis a table of information is created by
gathering the data pertaining to the qualities. The items that correspond to
the characteristics are represented by rows, whereas the attributes them-
selves are represented by columns. Followed by stage 2, the universal set U
and the subset X of U are framed in stage 3. Hence, lower approximation,
upper approximation, and boundary region are found at stage 4. In stage 5,
rough topology and basis are identified. Stages 4 and 5 are repeated remov-
ing each attribute one by one in stage 6. At stage 7, which of the basis are
different is identified. Finally, at stage 8, the core set is framed using the
results of stage 6.
Table 12.1 Statistical data received from applicants who stayed abroad from
2010 onward.
Object S1 S2 S3 S4 S5 S6 S7 S8 S9 S10 S11 S12 D
N1 0 0 1 1 1 0 1 1 1 1 1 0 1
N2 0 1 1 1 1 0 1 1 1 1 1 0 1
N3 0 0 1 0 1 0 1 1 1 1 1 0 1
N4 0 0 1 1 1 1 1 1 1 1 1 0 1
N5 0 0 1 1 1 0 1 1 1 1 1 0 1
N6 0 0 1 1 1 0 1 1 1 1 1 0 1
N7 0 0 1 1 1 0 0 1 1 1 1 0 1
N8 0 0 1 1 1 0 1 0 1 1 1 0 1
N9 0 0 1 1 1 0 1 1 1 0 1 0 1
N10 0 0 1 1 1 0 1 1 1 1 1 1 1
Decision on Difficulties to NRI via Rough Top 185
12.6 Conclusion
Rough topology has attracted researchers in bringing out solution to deci-
sion making problems. In this paper, various aspects involved to work at
186 Fuzzy Logic Applications in Computer Science and Mathematics
abroad is comfort or not are discussed. Using the method of rough topol-
ogy, the predominant attributes required for comfort at Indian workers at
abroad is identified.
References
1. Yao, Y. and Zhao, Y., Attribute reduction in decision-theoretic rough set
models. Inf. Sci., 178, 3356–3373, 2008.
2. Nasiri, J.N. and Mashinchi, M., Rough set and data analysis in decision
tables. J. Uncertain Syst., 3, 232–240, 2009.
3. Lellis Thivagar, M., Richard, C., Paul, N.R., Mathemcatical innovations of a
modern topology in medical events. J. Inf. Sci., 2, 33–36, 2012.
4. Yan, T. and Han, C., A normal approach of rough conditional entropy-based
attribute selection for incomplete decision system. Math. Probl. Eng., 2014,
1–15, 2014.
5. Zhang, Q., Xie, Q., Wang, G., A survey on rough set theory and its applica-
tions. CAAI Trans. Intell. Technol., 1, 323–333, 2016.
6. Paul, N.R., Rough topology based decision making in medical diagnosis. Int.
J. Math. Trends Technol., 18, 40–43, 2016.
7. Gomathi, G., Narmada Devi, R., Praba, B., “Nx locally compactness in fuzzy
rough topological spacession making in medical diagnosis. D Appl. Math.,
109, 302–310, 2016.
8. Chaturveri, P., Daniel, A.K., Khusboo, K., Concept of rough set theory
and its applications in decision making processes. Int. J. Adv. Res. Comput.
Commun. Eng., 6, 43–46, 2017.
9. Kanchana, M. and Rekha, S., Decision making using rough topology and
indiscernibility for corna virus diagnosis. Int. J. Sci. Res. Sci. Eng. Technol., 7,
31–33, 2020.
10. Gomathi, G., Narmada Devi, R., Sophia Ponmalar, D., A study on properties
of fuzzy rough topological spaces. Int. J. Adv. Res. Manage. Architecture Tech.
Eng., 7, 13–17, 2021.
13
Case Study on Fuzzy Logic: Fuzzy
Logic-Based PID Controller to
Tune the DC Motor Speed
Devendra Kumar Somwanshi *
Abstract
The cost of DC motor is much higher than induction motor, but DC motors has
fantastic speed control attributes, and due to this attributes, it is highly utilized in
the industry. Many researches have done to control or to tune the DC motor speed.
To better control or tune the DC motor speed researches were started from the
basic PID controller. Then, many combinations were used with the PID control-
lers to tune better. In combinations, fuzzy logic controllers, fractional order fuzzy
tuning, gravitational search algorithms, genetic algorithm, micro controller-based
PID controllers, and many other methods were developed.
More than 50 papers are reviewed in several areas, such as to tune the DC
motor speed, controller design, and fuzzy-based tuning of boundaries to examine
and figure out current difficulties and extent of work.
In this chapter, the fuzzy PID controller is designed and analyzed to tune the
DC motor speed on the LabVIEW. The whole designing process is elaborated in
which all the steps are included that how fuzzy PID controller design, how the
fuzzificaion is done for the parameter values on the basis of membership func-
tions. The fuzzy inference system is developed on the basis of fuzzy-associated
memory table and rule base system. The values of FIS are defuzzified with the help
of defuzzification methods to find the values of gain parameters of PID controller.
After design, the analysis is done with respect to the output parameters, i.e., set-
tling time, rise time, and maximum overshoot. The results of the proposed system
is compared to the previous researcher’s outputs. After the comparison, it is found
that damping ratio, rise time, settling time, and peak time are improved from 10%
to 50%. From the results, it can undoubtedly be concluded that fuzzy PID can give
Email: [email protected]
Rahul Kar, Dac-Nhuong Le, Gunjan Mukherjee and Biswadip Basu Mallik and Ashok Kumar Shaw (eds.)
Fuzzy Logic Applications in Computer Science and Mathematics, (187–212) © 2023 Scrivener Publishing LLC
187
188 Fuzzy Logic Applications in Computer Science and Mathematics
the significantly better boundaries then different controllers, like PID controllers
and fuzzy controller.
13.1 Introduction
Because of magnificent speed control attributes, DC Motor has been
broadly utilized in the available motors in the business. Several techniques
are used to control the speed of DC Motor in which PID controller is
mostly used with combination of different AI techniques such as Fuzzy
Logic, Neural Network, Genetic Algorithm, Micro controller based tuning,
etc. [2, 5–7].
The most generally utilized strategy of speed control of DC Motor is
PID Controller in view of the Fuzzy Method. The show of PID Controller
was connected with the setting of boundaries, for example the Proportion
(P) in addition to the Integration (I) in addition to the Derivation (D). The
reason for Tuning to demonstrate the way that settings for Controllers can
be gotten from data of the cycle to be controlled as displayed in Figure 13.1.
The best part of tuning of PID controller based on Fuzzy logic is that
the Fuzzy Controller was nonlinear and versatile in nature giving power-
ful execution under boundary varieties and burden aggravation impact.
Tuning of the PID Controller boundary is finished with the different tuning
strategies like ANT Algorithm, Swarm Optimization, Genetic Algorithm,
Gravitational Search Algorithm and so forth. Plan of Fuzzy PID Controller
Proportional
Gain
+
1 I 1 + 1
s +
e Integral Integrator u
Gain
D du/dt
Derivative Derivative
Gain
13.1.1 DC Motor
An electric Motor is a device which works on electrical energy and cre-
ate mechanical energy on the communication of attractive fields and flow
conveying transmitters. By a generator the converse course of switching
mechanical energy over completely to deliver electrical energy is achieved.
Figure 13.2 shows the opposite course of changing mechanical energy over
completely to create electrical energy is achieved by a generator.
Ra La Ia
θ Jm
Va Eb Tm
Bm
[3] Speed/ PID Controller kp=3, ki=5, kd=1 Soft computing Voltage signal Voltage rating=12v Steady state error
terminal –Fuzzy from DAQ Current obtained minimum
voltage Logic based cards range rating=1.5amp ±6rmp & overshoot
2.4v-12v Rated RPM=1500 obtained 0% due to
Ra=8.8Ω integral action
[26] Speed/ Adaptive PID kP = 1, ki=5 , kd =1 Dynamic SMC Load torque of Not specified Chattering problem is
armature Controller Performance Controller 0.3nm reduced with the
current parameter = 0.034 help of this technique
Learning parameter
=1
[18] Speed/field PID kP = 136.4, ki = 1287 Genetic Output of TF= 0.01/0.05s2 + Transfer Function is
current Controller/ kd = 3.62 Algorithm/ FFPID 0.06s + 0.1001 reduced in 2nd order,
Fuzzy GA parameters:- Ziegler steady state error
Controller Population size=20 Nichols reduced up to 0.014%
Generation= 62 method with disturbances.
Cross over
fraction=0.8
(Continued)
DC Motor Performance Optimization 193
[23] Power cycle PID Controller Flash memory=8kb AT mega 8A O/p of the driver Voltage rating=12v The technique helps to
on-off ratio/ ISP Micro circuit Current maintain stability of
speed EEPROM=512B Controller rating=1.5amp the system
23GPI/O based
[15] Speed/ PI-like Fuzzy Error and change of Buck convertor/ O/p voltage Voltage rating=24v Overshoot=2.05% & rise
Counting Controller error Genetic from buck Current = 2.1amp time 20ms reduced.
pulse from Algorithm convertor Rated RPM=4000 Also worked for higher
encoder ratings Motor
[25] Speed/ PID Controller Initial value of GSA Gravitational 3rd order transfer Reduced settling
armature Go=100 Search function time0.00000458sec,
current/ Total iteration=200 Algorithm R= 5ohm rise time
field current N= 100 L= 0.025 Hennery 0.000000257sed and
overshoot 0.0002%
than ZN method.
[12] Speed/ Fuzzy Input parameter of Neuro-Fuzzy Error and error Power= 200w Reduced the settling
terminal Controller error and change method change ratio Current=3.5amp time about 10% with
voltage/ in error= +100 to calculated by Rated RPM=3000 disturbances of load.
varying -100 comparator
load
(Continued)
194 Fuzzy Logic Applications in Computer Science and Mathematics
[10] Speed/ PID Floating point input 16 bit Micro From Micro Second order Sampling time obtained
armature Controller/ parameters of Controller Controller transfer in 10ms for Fuzzy
current Fuzzy Algorithm for based/ bits function control
Controller Micro Controller floating
point
format
[11] Speed/ PID Controller kP = 19.88 ,ki = 0.1376 ANFIS From shunt field TF= Settling time reduced
armature kd = 0.5578 technique Voltage=230v up to 0.5 sec and
resistance Rated RPM=1500 maximum overshoot
and Current ratings= 8a is zero for third order
inductance Transfer Function
DC Motor Performance Optimization 195
Error êt = Rt – Ut (13.1)
Knowledge Base
e(t)
Output
Fuzzification Decision-making Defuzzification
Input
Interface Unit Interface
de(t)
Start
Select Parameters
Meet
specification
Desired Speed
End
NA
0.6
NB
CERO
0.4
0.2
0
–10 –8 –6 –4 –2 0 2 4 6 8 10
Range
5 Zero −6 to 10
In Table 13.2, all membership functions range defined for input variable,
error five membership functions designed in the range of 0–10 interval in
which negative big is 0 to 10, negative large is −6 to 4, positive big is −10 to
4, positive large −2 to 4, zero is −6 to 10.
Further, two membership functions are defined for the input variable
change in error between 0 and 100. Figure 13.6 shows the membership
function, and Table 13.3 shows the membership values.
In Table 13.3, all membership functions range defined for input variable
change in error two membership functions designed in the range of 0 to
100 interval in which negative big is 0 to 60, negative large is 30 to 100.
Seven Membership Functions with seven linguistic terms designed for
output variable for speed. Figure 13.7 shows the membership function. The
interval for membership functions used 0 to 30.
DC Motor Performance Optimization 199
0.6
0.4
0.2
0
0 10 20 30 40 50 60 70 80 90 100
Range
STR
0.6
AM
AP
0.4
MD
MP
0.2
0
0 2 4 6 8 10 12 14 16 18 20 22 24 26 28 30
Range
In Table 13.4, all membership functions range defined for input variable
error seven membership functions are designed in the range of 0 to 20
interval in which negative big is 0 to 10, negative large is 0 to 6, negative
medium is 10 to 20, positive big is 10 to 26, positive large 16 to 30, zero is
6 to 20.
200 Fuzzy Logic Applications in Computer Science and Mathematics
đêt VERY
LOW HIGH VERYLOW MEDIUM
t HIGH
ê
LOW FAST SLOW VERY FAST SLOW FAST
VERY VERY
HIGH SLOW MEDIUM SLOW
SLOW SLOW
VERY VERY
MEDIUM VERY FAST MEDIUM FAST
LOW FAST
VERY VERY VERY VERY
SLOW SLOW
HIGH SLOW SLOW SLOW
MEDIUM FAST FAST FAST FAST FAST
To tune the variable kp, ki, kd, values are received by the output of rule base
defuzzification system.
Two input variables are taken for rules design as Error êt and Change
in Error đêt and one output variable which is actual speed ut. All rules
designed between three variables for consequent results.
• Use the fuzzy logic controller from the control & simulation
block,
• Selecting the signal input and output,
• Defining the membership function for all variables,
• Design rules for all individual membership functions,
• Give path to fuzzy controller,
• Simulate the program.
9.64E-6 J
G
3.3 R
0.00464 L
(
no Error
proptional 1
integral Integrator
Gain Summation 2
Summation 1 + Transfer Function Waveform Chart 2
Step Signal S + =
+ H(s)
k
derivative
G Derivative 2
k s
1
(
Summation 3 Transfer Function 2
+ = 1
– Summation 4 H(s)
MISO
+ =
–
( Derivative
Halt Simulation
1 Halt?
s
Path
• Fuzzy proportional
• Fuzzy integral
• Fuzzy derivative
• Fuzzy PID
r PID y
Plant
+ Controller
–
d/dt dKp dKi dKd
Fuzzy Controller
Fuzzy Block
Fuzzy rules
e(t) kp
Fuzzification Inference Defuzzification ki
Ce(t) kd
In the FAM Table, each rule is designed between the input and output
variables directly and in a simple way. It’s a tabular way to express Fuzzy
Logic rules.
All rules for proportional control, integral control and derivative con-
trol are design by using FAM table. Table 13.5 shows the FAM table of
FPID controller.
(0.028)
TF
(4.47296 E 8s 2 3.18204 E 5S 0.0078994)
Start
Desired
Parameters
Obtain
No
END
Figure 13.14 shows the response of proposed FPID controller. Table 13.6
shows the response of the proposed FPID controller.
9.64E-6 J
G
3.3 R
0.00464 L
Path
(
no Error
proptional 1
integral Integrator
Gain Summation 2
Summation 1 + Transfer Function Waveform Chart 2
Step Signal S + =
+ H(s)
k
derivative
G Derivative 2
k s
1
(
Summation 3 Transfer Function 2
+ = 1
– Summation 4 H(s)
MISO
+ =
–
( Derivative
Halt Simulation
1 Halt?
s
Transfer Function 3
H(s)
output value
Summation 5 ( 1.23
+ = 1 MISO
–
6 output value 2
+ = 1.23
–
( Derivative 3
MISO
1 s
output value 3
1.23
MISO
file path 1
Path
file path 2
Path
file path 3
Path
1.6
1.4
Step input
1.2
1 PID Response
Amplitude
0.8
FUZZY
0.6 Response
0.4 Fuzzy-PID
Response
0.2
0
Time (ms) 1 6 11 16 21 26 31 36 41 46 51 56 61 66 71 76 81 86 91 96
[9] 50000 Controlled kp = 2.3 0.7 0.45 kP = 0.6 6.5 0 Rise time reduced
Object ki = 3.0 ki = 0.5 to 0.7s from
(S 3 80S 2 15000S)
kd = 1.24 kd = 0.001 6.5s, settling
time obtained in
0.45s.rise time
reduced by 89%.
[16] 2 DSP Based kp = 24 0.4 0.31 kp = 20 0.13 0.22 Rise time decreases
DC ki= 3.0 ki = 1.35 by 67.5%,
S 2 3S 1
Motor kd = 2.3 kd = 3.5 settling time
increases by
40.91%.
[24] 5 Nonlinear kp = 2.9 0.9 0.72 kp= 4.82 0.2 10 Rise time increases
System ki = 3.1 ki = 3.5 to 77% but
s3 4.5s 2 5.5s 15
kd = 3.1 kd = 3.82 settling time
improved by
86.11%
DC Motor Performance Optimization 209
References
1. Rubaai, A., Castrom Sitiriche, M.J., Ofoli, A.R., DSP-based laboratory imple-
mentation of hybrid fuzzy-PID controller using genetic optimization for
high-performance motor drives. IEEE Trans. Ind. Appl., 44, 6, 1977–1986,
IEEE, 2008.
2. Arulmozhiyal, R., Design and implementation of fuzzy PID controller for
BLDC motor using FPGA. 2012 IEEE International Conference on Power
Electronics, Drives and Energy Systems (PEDES), Bengaluru, IEEE, pp. 1–6,
2012.
3. Gowthwan, E., Surya, M., Cominos, P., Munro, PID controllers: Recent tun-
ing methods and design to specification. Control Theory Appl., 149, 1, 46–53,
2013.
4. Abhinav, R. and Sheel, S., An adaptive, robust control of DC motor using
fuzzy-PID controller. 2006 IEEE International Conference on Power
Electronics, Drives and Energy Systems (PEDES), IEEE, pp. 1–5, 2006.
5. Wu, H. and Su, W., PID controllers: Design and tuning methods. Industrial
Electronics and Applications (ICIEA), 2014 IEEE 9th Conference on, IEEE, pp.
808–813, 2014.
6. Kanojiya, R.G. and Meshram, P.M., Tuning of PID controller using Ziegler-
Nichols method for speed control of DC motor. IEEE-International
Conference on Advances in Engineering, Science and Management (ICAESM
-2012), Nagapattinam, Tamil Nadu, IEEE, pp. 117–122, 2012.
7. vas, P. and Bulale, M.J.E., Design and implementation of fuzzy based PID
controller. Industrial Technology, IEEE ICIT ‘02. 2007 IEEE International
Conference on, vol. 1, IEEE, pp. 220–225, 2007.
8. Ali, F.H. and Mahmood, H.M., LabVIEW FPGA implementation of PID con-
troller for DC motor speed control. 1st International Conference on Energy,
Power and Control (EPC-IQ), IEEE, pp. 1–6, 2010.
9. Kan, W.X. and Liang, S.Z., Design and research based fuzzy-PID parame-
ters self-tuning controller with MATLAB. Advanced Computer Theory and
Engineering, 2008. ICACTE ‘08. International Conference on, IEEE, pp. 996–
999, 2008.
10. Cesar, M. and Abdelrahman, A., Speed control of DC motor using fuzzy
logic controller. 2008 International Conference on Communication, Control,
Computing and Electronics Engineering (ICCCCEE), Khartoum, IEEE, pp.
1–8, 2008.
11. Chen, G.S., Particle swarm optimization for PID controllers with robust test-
ing. International Conference on Machine Learning and Cybernetics, Hong
Kong, IEEE, pp. 956–961, 2007.
12. Huang, Y. and Yasunobu, S., Design of neuro-fuzzy controller. 9th
International Symposium on Communications and Information Technology,
Icheon, IEEE, pp. 808–813, 2009.
210 Fuzzy Logic Applications in Computer Science and Mathematics
13. Kamal, M.M., Mathew, L., Chatterji, S., Speed control of brushless DC
motor using genetic algorithm. 2014 Students Conference on Engineering and
Systems, Allahabad, IEEE, pp. 1–5, 2014.
14. Ming, Z.X. and Liu, L.S., Simulation study of fuzzy-PID controller for DC
motor based on DSP. 2012 International Conference on Industrial Control and
Electronics Engineering, IEEE, pp. 3401–3405, 2012.
15. Kadwane, S.G. and Gupta, S., Real time based PI-fuzzy controller for DC
servomotor. 2006 International Conference on Power Electronic, Drives and
Energy Systems, New Delhi, pp. 1–4, 2006.
16. Yongjuan, Z. and Yutitan, P., The design and simulation of hybrid fuzzy-
PID controller. Information Technology and Applications (IFITA), 2010
International Forum on, vol. 3, IEEE, pp. 95–98, 2010.
17. Rey, J.P. and Dalvi, M.M., A numerical-based fuzzy-PID controller applied
to a DC drive. Industrial Electronics, Symposium Proceedings, ISIE ‘, IEEE
International Symposium on, IEEE, pp. 429–434, 2009.
18. Surya Kalawati, M. and Mitra, R., Comparative analysis of robustness of
optimally offline tuned PID controller and fuzzy supervised PID controller.
Engineering and Computational Sciences (RAECS), 2014 Recent Advances in,
pp. 1–6, 2014.
19. Salim, J.O., Fuzzy based pid controller for speed control of dc motor using
labview. WSEAS Transactions on Systems and Control, 10, 154–159, 2015.
20. Kumar, S. and Kumar, V., Speed control DC motor using fractional fuzzy
based PID controller. 2012 IEEE International Conference on Engineering and
Technology (ICETECH), Coimbatore, IEEE, pp. 1–6, 2012.
21. Mehra, V. and Kala, V., Design and simulation of FOPID composite param-
eters controller with MATLAB. Computer Design and Applications (ICCDA),
2010 International Conference on, vol. 4, IEEE, pp. V4–308-V4-311, 2010.
22. Ahmadi, A. and Kumari, S.U., Optimal fuzzy-PID controller. Power Signals
Control and Computations (EPSCICON), International Conference on, IEEE,
pp. 1–6, 2012.
23. Vikhe, P.S. and Dhanasekara, R., Improvement of speed control performance
in BLDC motor using PID controller. International Conference on Advanced
Communication Control and Computing Technologies (ICACCCT), IEEE, pp.
380–384, 2018.
24. Haung, Y. and Chen, Design fuzzy-PID controllers with robust testing.
Machine Learning and Cybernetics, 2007 International Conference on, vol. 2,
pp. 956–961, 2007.
25. Duman, S., Reddy, B.A., Charan, K.R., Design of fuzzy PI+D and fuzzy PID
controllers using GSA algorithm. 2009 Second International Conference on
Emerging Trends in Engineering & Technology, IEEE, pp. 957–961, 2009.
26. Elsrogy, W.M., Fkirin, M.A., Hassan, M.A.M., Speed control of DC motor
using PID controller based on artificial intelligence techniques. 2013
International Conference on Control, Decision and Information Technologies
(CODIT), IEEE, pp. 196–201, 2013.
DC Motor Performance Optimization 211
27. Rahmani, R., Mahmodian, M.S., Mekhilef, S., Shojaei, A.A., Fuzzy logic con-
troller optimized by particle swarm optimization for DC motor speed con-
trol. 2012 IEEE Student Conference on Research and Development (SCORD),
Pulau Pinang, IEEE, pp. 109–113, 2012.
28. Salim, J.O. and Naveen, Speed control of DC motor using fuzzy logic based
on LabView, International Journal of Scientific and Research Publications
(IJSRP), 3, 6, 1–5, June 2013.
29. Omar, A. and Khedr, M.S., Particle swarm optimization of fuzzy supervisory
controller for nonlinear position control system. Computer Engineering &
Systems (ICCES), 2013 8th International Conference on, IEEE, pp. 138–145,
2013.
30. Payakkawan, P., Klomkarn, K., Sooraksa, P., Dual-line PID controller based
on PSO for speed control of DC motors. 9th International Symposium on
Communications and Information Technology, IEEE, pp. 134–139, 2009.
31. Somwanshi, D., Bundele, M., Kumar, G., Parashar, G., Comparison of fuzzy-
PID and PID controller for speed control of DC motor using LabVIEW. Proc.
Comput. Sci., 152, 252–260, 2019.
14
Application of Intuitionistic Fuzzy
Network Using Efficient Domination
A. Meenakshi1, J. Senbagamalar1* and A. Kannan2
1
Department of Mathematics, Vel Tech Rangarajan Dr. Sagunthala R&D Institute
of Science and Technology, Chennai, Tamil Nadu, India
2
Department of Mathematics, Vel Tech Multi Tech Dr. Rangarajan Dr. Sakunthala
Engineering College, Chennai, Tamil Nadu, India
Abstract
The most secured computational technique is to find the secret information
using encryption and decryption defined in this paper. Mathematical modeling
of Iintuitionistic network is defined and constructed to elude the burgeoning
intruder. The studies of efficient domination of intuitionistic graph is initiated and
this domination parameter plays a nuance technique to decrypt the framed net-
work. The algorithm is framed to encrypt and decrypt the given secret number.
14.1 Introduction
A network is a group of peoples (a set of nodes) interact with each oth-
ers, sharing their knowledge and information (link is a relation which
represents sharing the information) so as to develop their professional
skills or social contacts. It imparts the good relationship among to develop
their business skills and it plays a vital role when starting the new busi-
ness. Labeling is a tool of numbering the persons (nodes) and the relations
(links) between any two members. It helps to identify the set of significant
Rahul Kar, Dac-Nhuong Le, Gunjan Mukherjee and Biswadip Basu Mallik and Ashok Kumar Shaw (eds.)
Fuzzy Logic Applications in Computer Science and Mathematics, (213–232) © 2023 Scrivener Publishing LLC
213
214 Fuzzy Logic Applications in Computer Science and Mathematics
persons who plays a vital role in the given network. Developed a com-
binatorial technique involve with domination, intuitionistic graphs with
encryption and decryption concepts.
Although the policy is very illuminating and informative, we feel that
this traditional approach needs to be supplemented with basic mathemat-
ical and a framework that displays cryptology as a fully-fledged part of
computational technique. On the other hand, something that has been
done and accomplished in recent decades, although this study is in the
subject of cryptology, we occasionally find stenographic purposes in addi-
tion to cryptographic ones, as can be seen in the traditional parts. Each in
this research, we refer to a secret in as much as a concealment system in
which the existence of the message is concealed from the enemy and more
commonly, in the sense that the message is concealed by cipher, but its
existence is known, not hidden from the enemy or attacker.
Domination plays a vital role in decision making, monitoring, mini-
mize the cost of network etc.., Let ‘O’ denote the set of monitoring mem-
bers (a set of nodes) of the given network. Every member in the given
network except the monitoring members should be the neighbor of at least
one monitoring member of the given network. The minimum number of
monitoring members of this network is domination number of the given
network. Every member in the given network except the monitoring mem-
bers should be a neighbor of exactly one monitoring member of the given
network. The minimum number of monitoring members of this network
is efficient domination number of the given network.
L.A. Zadeh proposed a mathematical framework to characterize the
phenomenon of uncertainty in real-world situations in 1965 [18]. The idea
of fuzzy graphs and various fuzzy analogues of graph theory ideas with
connectedness were first presented by Rosenfeld [14]. Ore [13] and Berge
started researching graphs’ domination sets. Paired domination studies
begun by Teresa et al. [17]. Efficient domination was initiated by Biggs [2],
V.R. Kulli [5], begun the study of split domination of graph and also he [6]
wrote the theory of domination in graphs. The independent domination
number was first used in graphs by Cockayne [3]. Equitable domination
was introduced by Swaminathan and Dharmalingam [16]. Paired equitable
domination was introduced and studied by A. Meenakshi [7] and it contin-
ued by in inflated graph and its complement of a graph [8, 9]. Intuitionistic
fuzzy relations and Intuitionistic fuzzy graphs (IFGS) were developed by
K.T. Atanassov [1]. IFG was defined by M.G. Karunambigai et al. [4] which
is a special case of IFGS defined by A.Shannon and Atanassov of [15]. The
terms “order,” “degree,” and “size” of IFG were defined by A. Nagoor Gani
Intuitionistic Fuzzy Network Using Efficient Domination 215
Definition 14.2.3 An arc (u-v) is said to be strong arc if its degree of edge
membership value is is equal to strength of connectedness between u and v.
d1(0.2, 0.4)
a1(0.25, 0.15)
d2(0.4, 0.62)
a3(0.4, 0.25)
d4(0.5, 0.4)
The vertex and edge degree membership values of the IFG in Figure 14.1
is given in Table 14.1. Every edge in the IFG in Figure 14.1 is strong, the
only efficient dominating set is T = {a,d} since every vertex in V-T is dom-
inated by exactly one vertex and this dominating set is unique.
Encryption and Decryption is the technique used to identify or break
the secret key or secret information present in the network. In this paper
we present the new nuance combinatorial technique of encryption and
decryption of single valued IFG using efficient domination.
Second SVN sub network is SN2 whose center is o2 and its neighbors are
NV2
o21 , o22 ,..., 02l2 . First subdivision value NV2 ≡ R2(mod r). Set V2 and
r
D2 = Dv2/V2 (where D is the numerical value 1 followed by the number of 0’s
digits of integral part of V2) partitioned into sum of l2 values say d21 , d22 ,..., d2l2
and assign these values are minimum value of either o2 or o21 , o22 ,..., o2l2 degree
of truth membership value. Repeat the process till to frame the sub network
SNr. IFN sub networks 2 and r are shown in Figures 14.3 and 14.4.
By the definition of SVNN, the degree of membership values of the
edges o1o11 , o1o12 ,..., o1o1l1 are (min{o1(t1),o11(t11)}, max{o1(f1),o11(f11)})
(min{o1(t1),o12(t12)}, max{o1(f1),o12(f12)}),…,( min{o1(t1 ), o1l1 (t1l1 )} , max{o1{ f1}, o1l1 { f1l1 }}
max{o1{ f1}, o1l1 { f1l1 }} ) respectively.
By the definition of IFN, the degree of membership values of the
edges o2o21 , o2o22 ,..., o2o2l2 are (min{o2(t2),o21(t21)}, max{o2(f2),o21(f21)})
(min{o2(t2),o22(t22)}, max{o2(f2),o22(f22)}),…,( min{o2 (t 2 ), o2l1 (t 2l2 )} , max{o2 ( f 2 ), o2l1 ( f 2l2
max{o2 ( f 2 ), o2l1 ( f 2l2 }}) respectively. Repeat the process till to frame the sub net-
work SNr and by the definition of IFN, the rest of the edge’s degree mem-
bership values will be defined.
o11(t11, f11)
o1l1(t1l1, f1l1)
o12(t12, f12)
o1(t1, f1)
o13(t13, f13)
o14(t14, f14)
o15(t15, f15)
o21(t21, f21)
o2l2(t2l2, f2l2)
o22(t22, f22)
o2(t2, f2)
o23(t23, f23)
o24(t24, f24)
o25(t25, f25)
or1(tr1, fr1)
orlr(trlr , frlr )
or2(tr2, fr2)
or3(tr3, fr3)
or(tr, fr)
or4(tr4, fr4)
or5(tr5, fr5)
o1(t1, f1)
o13(t13, f13)
o14(t14, f14)
o15(t15, f15) 2nd sub network
o21(t21, f21)
o2l2(t2l2, f2l2)
rth sub network o22(t22, f22)
orlr(trlr , frlr )
or1(tr1, fr1)
o2(t2, f2)
or(tr, fr)
or3(tr3, fr3) o24(t24, f24)
o25(t25, f25)
or4(tr4, fr4)
or5(tr5, fr5)
3rd sub network
o1l1(t1l1, f1l1)
o11(t11, f11)
o12(t12, f12)
o1(t1, f1)
o13(t13, f13)
or2(tr2, fr2)
or4(tr4, fr4)
or5(tr5, fr5)
4th subnetwork
o12(t12, f12)
o1(t1, f1)
o13(t13, f13)
o15(t15, f15)
o14(t14, f14)
orlr(trlr , frlr )
or1(tr1, fr1)
o23(t23, f23)
or2(tr2, fr2)
or(tr, fr)
or3(tr3, fr3) o24(t24, f24)
o25(t25, f25)
or4(tr4, fr4)
or5(tr5, fr5)
3rd sub network
Step 2: V1 Dv1 d1 j1
j1 1
224 Fuzzy Logic Applications in Computer Science and Mathematics
l2 lr
V2 Dv 2 d1 j2 ,…, Vr Dvr d1 jr
j2 1 jr 1
r
Step 3: NV r Vi
i 1
End
14.5 Illustration
The secret number is NV = 10810
o11(0.1, 0.33)
o16(0.1, 0.25)
assign these values are minimum value of either o2 or o21, o22, …, o26 truth
degree membership value. IFN sub network 2 is shown in Figure 14.9.
By the definition of IFN, the degree of membership values of the edges
o2o21 , o2o22 ,..., o2o2l2 are (min{o2(t2),o21(t21)}, max{o2(f2),o21(f21)}) (min
{o2(t2),o22(t22)}, max{o2(f2),o22(f22)}),…,(min{o2(t2),o26(t26)}, max{o2(f2),
o26(f26)}) respectively.
Third subnetwork is SN3 whose center is O3 and its neighbors are o31, o32,
o33, o34, o35. Third subdivision value NV3 = 1502 ≡ 2(mod r). Set D3 = Dv3/V3 =
1000/300.4 = 0.3004 (where Dv3 is the numerical value 1 followed by the num-
ber of 0’s of integral part of V3 ) is partitioned into sum of 5 values say d31, d32,
…, d35 and assign these values are minimum value of either o3 or o31, o32, …, o35
true degree membership value. IFN sub network 3 is shown in Figure 14.10.
Fourth subnetwork is SN4 whose center is o4 and its neighbors are o41, o42,
o43, o44, o45. Fourth subdivision value NV4 = 1503 ≡ 3(mod r). Set D4 = Dv4/
Intuitionistic Fuzzy Network Using Efficient Domination 227
o25(0.1, 0.26)
o34(0.05, 0.25)
o33(0.05, 0.3)
o44(0.05, 0.25)
o43(0.05, 0.3)
o55(0.05, 0.25)
o52(0.1, 0.4) o52(0.05, 0.15)
Fifth subnetwork is SN5 whose center is o5 and its neighbors are o51, o52,
o53, o54, o55. Fourth subdivision value NV5 = 1804 ≡ 4(mod r). Set D5 = Dv5/
V5 = 1000/360.8 = 0.3608 (where Dv5 is the numerical value 1 followed by
the number of 0’s of integral part of V5 ) is partitioned into sum of 6 values
say d41, d42, …, d45 and assign these values are minimum value of either o5
or o51, o52, o53, o54, o55, truth degree membership value. IFN sub network 5
is shown in Figure 14.12.
o11(0.1,0.33)
o16(0.1,0.25)
o1(0.2,0.3)
o15(0.1,0.33)
o12(0.1,0.35)
o14(0.1,0.25) o13(0.1,0.32)
o26(0.1002,0.15) o21(0.1,0.36)
o56(0.0608,0.22) o51(0.05,0.36)
o22(0.1,0.35)
o2(0.2,0.3)
o55(0.05,0.25) o5(0.1,0.4) o52(0.05,0.15) o25(0.1,0.26)
o24(0.1,0.25) o23(0.1,0.3)
o54(0.05,0.2) o53(0.05,0.35)
o35(0.504,0.25) o31(0.1,0.36)
o41(0.1,0.36)
o45(0.0506,0.2)
o3(0.1,0.4)
o4(0.2,0.4) o42(0.05,0.15)
o32(0.05,0.35)
o43(0.05,0.3) o34(0.05,0.25)
o44(0.05,0.25) o33(0.05,00.3)
5
d1 2 1000(0.3004) 300.4 ,
j2 1
Intuitionistic Fuzzy Network Using Efficient Domination 231
5
V4 Dv 4 d1 j2 1000(0.3006) 300.6 ,
j2 1
6
V5 Dv 5 d1 j2 1000(0.3608) 360.8
j2 1
5
Step 3: NV r Vi 5(2162) 10810 .
i 1
14.6 Conclusion
The secret key is to find the efficient dominating set of IFN. Repetition of
assigning the dij values and maximum number of edges presented in the
constructed IFN then it becomes more complicated. Moreover, according
to the construction of IFN, the efficient dominating set of the constructed
network is unique and also it is strong.
References
1. Atanassov, K.T., Intutionistic fuzzy set theory and applications, Physica, New
York, 1999.
2. Biggs, N., Perfect codes in graphs. J. Comb. Theory Ser. B, 15, 289–296, 1973.
3. Cockayne, E.J. and Hedetniemi, S.T., Towards a theory of domination in
graph. Networks, 7, 247–261, 1977.
4. Karunambigai, M.G., Parvathi, R., Bhuvaneswari, R., Constant intuitionistic
fuzzy graphs. NIFS, 17, 37–47, 2011.
5. Kulli, V.R. and Janakiram, B., The split domination number of a graph. Graph
Theory Notes of New York, New York Academy of Sciences XXXXII, pp.
16–19, 1997.
6. Kulli, V.R., Theory of domination in graphs, Vishwa International Publications,
University of Michigan, Michigan, 2012.
7. Meenakshi, A. and Baskar Babujee, J., Paired equitable domination in graphs.
Int. J. Pure Appl. Math., 109, 7, 75–81, 2016.
8. Meenakshi, A., Paired equitable domination in inflated graph. Int. J. Innov.
Technol. Exploring Eng., 8, 7, 1117–1120, 2019.
9. Meenakshi, A., Equitable domination in inflated graphs and its comple-
ments. AIP Conf. Proc., 2277, 100006, 2020, 100006-1-8.
232 Fuzzy Logic Applications in Computer Science and Mathematics
10. Meenakshi, A., Equitable domination in inflated graphs and its comple-
ments. AIP Conf. Proc., 2277, 100006, 2020, 100006-1-8.
11. Nagoor Gani, A. and Anupriya, S., Split domination in intuitionistic fuzzy
graph. Adv. Comput. Math. Appl., 2, 2, 2–8, 2012.
12. Nagoor Gani, A. and Shajitha Begum, S., Degree, order and size in intuition-
istic fuzzy graphs. Int. J. Algorithms Comput. Math., 3, 3, 11–16, 2010.
13. Ore, O., Theory of graphs. Americal Mathematical Society Colloquium
Publications, vol. 38, Providence, RI, 1962.
14. Rosenfeld, A., Fuzzy graphs, in: Fuzzy Sets and Their Applications, L.A.
Zadeh, K.S. Fu, M. Shimura (Eds.), Academic, New York, 1975.
15. Shannon, A. and Atanassov, K., On a generalization of intutionistic fuzzy
graphs. NIFS, 12, 1, 24–29, 2006.
16. Swaminathan, V. and Dharmalingam, K.M., Degree equitable domination on
graphs. Kragujev. J. Math., 35, 1, 191–197, 2011.
17. Haynes, T.W. and Slater, P.J., Paired domination in graphs. Networks, 32,
199–206, 1998.
18. Zadeh, L.A., Fuzzy sets. Inf. Control, 8, 338–353, 1965.
15
Analysis of Parameters Related to
Malaria with Comparative Study
on Fuzzy Cognitive Maps and
Neutrosophic Cognitive Maps
Regan Murugesan1*, Sathish Kumar Kumaravel1, Kala Raja Mohan1,
Narmada Devi Rathinam1 and Suresh Rasappan2
1
Department of Mathematics, Vel Tech Rangarajan Dr. Sagunthala R&D Institute
of Science and Technology, Avadi, Chennai, Tamil Nadu, India
2
Mathematics Section, College of Technology and Information Sciences,
University of Technology and Applied Sciences - Ibri, Ibri, Sultanate of Oman
Abstract
In this paper, a comparative study is made on different parameters which are
related to malaria disease, such as fever, headaches, nausea etc., by using FCM
and NCM methods and conclusion are derived to predict the spread of disease.
As a result of this study, the parameters involved in the spread of these diseases
are identified, and the prevention parameters are concluded. The major benefits
of this comparative study are to identify the parameters which are inconclusive,
applying the concept of fuzzy and neutrosophic cognitive maps.
Keywords: Fuzzy matrix, fuzzy cognitive map, neutrosophic cognitive map,
malaria
15.1 Introduction
Malaria is a disease caused by the transmission of parasites. This trans-
mission is done by the mosquitoes which results in illness of humans. The
infected mosquitoes transmit the parasite known as plasmodium. A high
Rahul Kar, Dac-Nhuong Le, Gunjan Mukherjee and Biswadip Basu Mallik and Ashok Kumar Shaw (eds.)
Fuzzy Logic Applications in Computer Science and Mathematics, (233–248) © 2023 Scrivener Publishing LLC
233
234 Fuzzy Logic Applications in Computer Science and Mathematics
• M1 - Travelling Area
• M2 - Lack of Insect repellent
• M3 - Fever
• M4 - Use mosquito net
• M5 - Living near to stagnant water site
• M6 - Shivering
• M7 - Less possibility of malaria
• M8 - sweating
• M9 - Possibility of malaria
• M10 - Prevention for malaria
• M11 - Chest pain
• M12 - Use fully covered clothes
M1
M3
M2
M4
M9
M10
M5
M6
M8
M12
M7 M11
Case 1
Consider M2 in on state. Let us take,
T1 = [0 1 0 0 0 0 0 0 0 0 0 0]
Analysis of Malaria with Study on FCM and NCM 237
The effect of T1 on E,
T1 E [1 0 1 0 0 0 0 0 1 0 0 0]
[1 1 1 0 0 0 0 0 1 0 0 0]
T2
T2 E [2 1 2 0 2 0 0 1 2 0 0 0]
[11 1 1 0 1 0 0 1 1 0 0 0]
T3
T3 E [3 1 3 0 2 1 0 1 3 0 1 0]
[1 1 1 0 1 1 0 1 1 0 1 0]
T4
T4 E [3 1 4 0 2 1 0 3 5 0 1 0]
[1 1 1 0 1 1 0 1 1 0 1 0]
T5
T4 T5
Case 2
The parameter M7, less possibility is considered as ON state. Let
T1 [0 0 0 0 0 0 1 0 0 0 0 0]
T1 E [0 0 0 1 0 0 0 0 0 1 0 1]
[0 0 0 1 0 0 1 0 0 1 0 1]
T2
T2 E [0 0 0 2 0 0 2 0 0 3 0 2]
[0 0 0 1 0 0 1 0 0 1 0 1]
T3
T2 T3
238 Fuzzy Logic Applications in Computer Science and Mathematics
While taking M7 as ON state, the iteration process brings that when vio-
lating the preventive measures of disease can cause high risk of malaria
which implies that a person should use mosquito net and fully covered
clothes.
Case 3
Considering M12 is ON state. i.e., the parameter, using of fully covered
clothes like a major factor.
Let T1 [0 0 0 0 0 0 0 0 0 0 0 1]
T1 E [0 0 0 0 0 0 1 0 0 1 0 0]
[0 0 0 0 0 0 1 0 0 1 0 1]
T2
T2 E [0 0 0 2 0 0 1 0 0 2 0 2]
[0 0 0 1 0 0 1 0 0 1 0 1]
T3
T3 E [0 0 0 2 0 0 2 0 0 3 0 2]
[0 0 0 1 0 0 1 0 0 1 0 1]
T4
T3 T4
On the calculating process, this brings the result that when we use fully
covered clothes then the chances of getting malaria is less. Also, if the pre-
vention for malaria is followed then there will be a less possibility of getting
affected by malaria.
Analysis of Malaria with Study on FCM and NCM 239
Case 4
By choosing M10 as ON state and rest of the parameters as OFF state, the
following iteration process is furnished.
Let T1 [0 0 0 0 0 0 0 0 0 1 0 0]
T1 E [0 0 0 1 0 0 0 0 0 0 0 1]
[0 0 0 1 0 0 0 0 0 1 0 1]
T2
T2 E [0 0 0 1 0 0 2 0 0 2 0 1]
[0 0 0 1 0 0 1 0 0 10 1]
T3
T3 E [0 0 0 2 0 0 2 0 0 3 0 2]
[0 0 0 1 0 0 1 0 0 1 0 1]
T4
T3 T4
Case 5
Consider M9 parameter as ON state. i.e., possibility of malaria.
Let T1 [0 0 0 0 0 0 0 0 1 0 0 0]
T1 E [1 1 0 0 1 0 0 0 0 0 0 1]
[1 1 0 0 1 0 0 0 1 0 0 0]
T2
T2 E [2 1 3 0 1 0 0 0 3 0 1 0]
[1 1 1 0 1 0 0 0 1 0 1 0]
T3
T3 E [2 1 3 0 2 0 0 2 4 0 1 0]
[1 1 1 0 1 0 0 1 1 0 1 0]
T4
T4 E [3 1 3 0 2 1 0 2 4 0 1 0]
[1 1 1 0 1 1 0 1 1 0 1 0]
T5
T4 E [3 1 4 0 2 1 0 3 5 0 1 0]
[1 1 1 0 1 1 0 1 1 0 1 0]
T6
T5 T6
In this case, the iteration process arises the result that except the param-
eters M4 [use mosquito net], M7 [less possibility of malaria], M10 [preven-
tion for malaria], and M12 [use fully covered clothes] all the others are
possibility of malaria.
between the nodes), if the relationship between the nodes had majority
of respondents, at the same time the respondents which are uncertain or
indeterminate then it is denoted by I. The number zero is assigned, when
there is no relationship between the parameters based on expert’s opinion.
In the neutrosophic graph, for the indeterminate case the edges between
the nodes are drawn by the dotted lines. The corresponding neutrosophic
cognitive maps for the parameters are given below in Figure 15.2.
M1
M3 M2
M4
M9
M10
M5
M6
M8
M12
M7 M11
Case 1
Let us take M2 in ON state side. i.e., lack of insect repellent.
Let us take
U1 [0 1 0 0 0 0 0 0 0 0 0 0]
U1 E [I 0 1 0 0 0 0 0 I 0 0 0]
[I 1 1 0 0 0 0 0 I 0 0 0]
U2
U2 E [I I 2 I I 1 0 1 I 0 0 I I 2 I 0 0 0]
[I 1 1 0 1 0 0 I I 0 0 0]
U3
U3 E [2 I I 2 I 2 2 I 0 1 I I 0 I I 2 I 1 0 I 0]
[I 1 1 0 1 I 0 I 1 0 I 0]
U4
U4 E [3I I 2 2 I 0 2 I 0 3I 1 I 3I 2 0 I 0]
[I 1 1 0 1 I 0 I 1 0 I 0]
U5
U4 U5
Analysis of Malaria with Study on FCM and NCM 243
Case 2
Consider M7 [less possibility of malaria] is ON state.
U1 [0 0 0 0 0 0 1 0 0 0 0 0]
U1 E [0 0 0 1 0 0 0 0 0 0 1 0 I]
[0 0 0 1 0 0 1 0 0 1 0 I]
U2
U2 E [0 0 0 2 0 0 2 0 0 2 I 0 1 I]
[0 0 0 1 0 0 1 0 0 1 0 1]
U3
U3 E [0 0 0 2 0 0 2 0 0 3 0 1 I]
[0 0 0 1 0 0 1 0 0 1 0 1]
U4
U3 U4
Case 3
Taking M12 as a positive state. i.e., use fully covered clothes as on state.
Then let
U1 [0 0 0 0 0 0 0 0 0 0 0 1]
U1 E [0 0 0 0 0 0 0 0 0 1 0 0]
[0 0 0 0 0 0 0 0 0 1 0 1]
U2
U2 E [0 0 0 1 0 0 1 0 0 1 0 1]
[0 0 0 1 0 0 1 0 0 1 0 1]
U3
U3 E [0 0 0 2 0 0 2 0 0 3 0 1 I]
[0 0 0 1 0 0 1 0 0 1 0 1]
U4
U3 U4
Case 4
By choosing M10 in on state.
Let U1 [0 0 0 0 0 0 0 0 0 1 0 0]
U1 E [0 0 0 1 0 0 1 0 0 0 0 1]
[0 0 0 1 0 0 1 0 0 1 0 1]
U2
U2 E [0 0 0 2 0 0 2 0 0 3 0 1 I]
[0 0 0 1 0 0 1 0 0 1 0 1]
U3
U2 U3
Analysis of Malaria with Study on FCM and NCM 245
Case 5
Taking 9th factor in on state. i.e., Possibility of diseases is on state.
U1 [0 0 0 0 0 0 0 0 1 0 0 0]
U1 E [I I 0 0 1 0 0 0 0 0 0 0]
[I I 0 0 1 0 0 0 1 0 0 0]
U2
U2 E [I 2 I I 2 I 1 0 2 0 0 I I 3I 2 1 0 I 0]
[I I 1 0 1 0 0 I 1 0 I 0]
U3
U3 E [I 2 I I 2II 1 0 2 0 0 I I 3I 2 1 0 I 0]
[I I 1 0 1 0 0 I 1 0 I 0]
U4
[I 2 I I 2 I 1 0 2 0 0 I I 3I 2 1 0 I 0]
[I I 1 0 1 I 0 I 1 0 I 0]
U5
U5 E [I 2 2I I 3I 1 0 2 I 0 3I 4 I 2 1 0 I 0]
[II I 1 0 1 I 0 I 1 0 I 0]
U6
U5 U6
M3 and M5 are major factor for the malaria possibility. Here we see some
indeterminate case which means uncertainty factors related to malaria.
With respect to the parameters of Malaria from the above iteration process
on FCM and NCM are briefly furnished with the comparative remarks in
the below Table 15.1.
246 Fuzzy Logic Applications in Computer Science and Mathematics
15.6 Conclusion
In this chapter, comparative study is made on different parameters of the
malaria, which are analyzed by FCM and NCM methods. This study helps
to identify the factors with uncertainty data having high possibilities. Based
on the comparison of parameters via FCM and NCM, we concluded that
positivity of malaria and host respond all the other are indeterminate case.
References
1. Kandasamy, W.V. and Smarandache, F., Fuzzy cognitive maps and neutro-
sophic cognitive maps. Book Review by Milan Mares: Kybernetika, 40, 1, 151,
2004.
2. Papageorgiou, E.I., and Salmeron, J.L., A review of fuzzy cognitive maps
research during the last decade. IEEE Trans. Fuzzy Syst., 21, 1, 66–79, 2012.
3. Uzoka, F.M.E., Akinnuwesi, B.A., Amoo, T., Debele, F., Fashoto, G., Nwafor-
Okoli, C., An expert system for malaria diagnosis using the fuzzy cognitive
map engine, in: 2018 IST-Africa Week Conference (IST-Africa), 2018, May,
IEEE, pp. 1–13.
4. Habib, S. and Akram, M., Medical decision support systems based on fuzzy
cognitive maps. Int. J. Biomath., 12, 06, 1950069, 2019.
5. Sutton, R.T., Pincock, D., Baumgart, D.C., Sadowski, D.C., Fedorak, R.N.,
Kroeker, K.I., An overview of clinical decision support systems: Benefits,
risks, and strategies for success. NPJ Digit. Med., 3, 1, 1–10, 2020.
6. Hoyos, W., Aguilar, J., Toro, M., Dengue models based on machine learn-
ing techniques: A systematic literature review. Artif. Intel. Med., 119, 102157,
2021.
7. Shakil, M.T.A., Ubaid, S., Sohail, S.S., Alam, M.A., A neutrosophic cognitive
map based approach to explore the health deterioration factors. Neutrosophic
Sets Syst., 41, 198, 2021.
8. Hoyos, W., Aguilar, J., Toro, M., A clinical decision-support system for den-
gue based on fuzzy cognitive maps. Health Care Manage. Sci., 25, 4, 666–81,
2022.
9. Douali, N., Papageorgiou, E.I., De Roo, J., Cools, H., Jaulent, M.C., Clinical
decision support system based on fuzzy cognitive maps. J. Comput. Sci. Syst.
Biol., 8, 2, 112, 2015 Mar 1.
16
Applications of Fuzzy Cognitive Maps
and Neutrosophic Cognitive Maps
on Analysis of Dengue Fever
Sathish Kumar Kumaravel1*, Regan Murugesan1, Nagadevi Bala Nagaram1,
Suresh Rasappan2 and G. Yamini1
Abstract
In this chapter, a comparative study on dengue is made on different parameters.
The parameters involved in dengue and spread of this disease are identified, and
the prevention parameters are concluded. The major benefits of this comparative
study are to identify the parameters which are inconclusive, applying the concept
of FCM and NCM are applied to bring out the result.
16.1 Introduction
The bite of a mosquito which carries infected Aedes species remains the
cause of spreading dengue viruses. These mosquitoes also spread few other
viruses like chikungunya, zika, etc. Nearly 50% of the population around
the world lives with the risk of getting affected by dengue. Almost 400 mil-
lion people gets infected with the disease every year. Around 40,000 people
lose their life by this dangerous disease [1–3].
Rahul Kar, Dac-Nhuong Le, Gunjan Mukherjee and Biswadip Basu Mallik and Ashok Kumar Shaw (eds.)
Fuzzy Logic Applications in Computer Science and Mathematics, (249–266) © 2023 Scrivener Publishing LLC
249
250 Fuzzy Logic Applications in Computer Science and Mathematics
One of the four viruses dengue, virus 1, 2, 3, 4, remains the reason for
the spread of the disease. Because of this, there is chance of getting affected
by the disease nearly four time for each human being in their life. For this
year (2022) 8278 peoples were affected by dengue in India and only one
death in Puduchery. In those 2,485 cases of dengue in Tamilnadu. Between
January and May, more than two lakhs’ people have been tested for dengue
in the state [4–6]. Those people who were infected were treated at different
hospitals following the standard protocol.
Once the mosquito is bitten a person with the virus, then it affects
the body which shows the symptoms up to 7 days from the beginning.
Symptoms can range from mild infection to severe infection. The diseases
with severe symptoms involve the dengue hemorrhagic fever and dengue
shock syndrome, also muscle pain, headache, vomiting, etc., are the few
more symptoms of the dengue disease [7]. These usually require hospi-
talization. As a preventive measure to avoid the bite of mosquito, insect
repellent, cleaning stagnant areas, using mosquito net for bed, door and
windows can be done, seek early consultation when signs and symptoms of
dengue occur, wear light-colored clothes, etc. Treatment can be positively
done if the diagnosis takes place before the patient gets developed with
DSS or DHF.
Dengue vaccine: For children with an age group from 9 to 16, a new
vaccine for dengue has been approved for usage. The vaccine is laboratory-
confirmed and tested with previously infected persons. It is being used at
the areas at which the virus is endemic. Those areas include some of the
territories of the U.S, and the states associated with it. The vaccine is not
allowed for usage at the areas where dengue is not that much affected and
also for the travellers who visits the U.S.
The most serious obstacle that develops by the disease is plasma leak-
age. This remains the symptom of severe stage of dengue. The fluid like
component from blood vessels gets leaked into the tissues surrounding it.
This process is known as plasma leakage. In some severe infected dengue
patients, the fever begins to disappear.
In this chapter, a comparative study is made on the different parame-
ters related to the disease dengue, such as travelling area, low antibody,
vomiting, high fever, etc. The parameters are analyzed by taking any one
as ON state by the concept FCM. Simultaneously those parameters are
analyzed through the NCM as like FCM by considering the same state
as ON state.
Applications of FCM and NCM on Analysis of Dengue 251
The aim of this chapter is to analyze the disease dengue through com-
parison between FCM and NCM among the parameters related to dengue.
The following is the outline of the contents of this chapter. In section 16.2,
parameters respect to dengue is presented. In the rest of the chapter, the
comparative study is presented. In section 16.3 the fuzzy cognitive maps,
and its matrix form is discussed. Section 16.4 describes the neutrosophic
cognitive maps and its matrix form. Finally, in section 16.5, the compari-
son of results from the FCM and NCM are discussed.
D1
D3
D7
D10
D8
D2
D4
D6 D5
D12
D11
D9
Case 1
Let us take D12 is ON state. Then
A1 [0 0 0 0 0 0 0 0 0 0 0 1]
A1 E [0 0 0 1 0 1 0 0 0 0 1 0]
[0 0 0 1 0 1 0 0 0 0 1 1]
A2
A2 E [0 0 0 1 0 1 0 0 0 1 1 2]
[0 0 0 1 0 1 0 0 0 1 1 1]
A3
A3 E [0 0 0 1 0 1 0 0 0 1 1 3]
[0 0 0 1 0 1 0 0 0 1 1 1]
A4
A3 A4
When we are taking less possibility of dengue in the state of ON, it gives
that we need to use fully covered clothes and mosquito repellent. Headache
and vomiting also have a low possibility level of effect.
254 Fuzzy Logic Applications in Computer Science and Mathematics
Case 2
Considering Muscle pain (M9) as ON state.
Let A1 [0 0 0 0 0 0 0 0 1 0 0 0]
A1 E [0 0 1 0 0 0 0 0 0 0 0 0]
[0 0 1 0 0 0 0 0 1 0 0 0]
A2
A2 E [1 0 1 0 0 0 0 1 1 0 0 0]
[1 0 1 0 0 0 0 1 1 0 0 0]
A3
A3 E [1 1 3 0 0 0 1 1 1 0 0 0]
[1 1 1 0 0 0 1 1 1 0 0 0]
A4
A4 E [1 1 3 0 0 0 1 2 2 0 0 0]
[1 1 1 0 0 0 1 1 1 0 0 0]
A5
A4 A5
Case 3
By choosing (A6) wear fully covered clothes in ON state. Let
A1 [0 0 0 0 0 1 0 0 0 0 0 0]
A1 E [0 0 0 0 0 0 0 0 0 0 0 1]
[0 0 0 0 0 1 0 0 0 0 0 1]
A2
A2 E [0 0 1 0 1 0 0 0 0 0 1 1]
[0 0 1 0 1 0 0 0 0 0 1 1]
A3
A3 E [0 0 0 1 0 1 0 0 0 1 1 2]
[0 0 0 1 0 1 0 0 0 1 1 1]
A4
A4 E [0 0 0 1 0 1 0 0 0 1 1 1]
[0 0 0 1 0 1 0 0 0 1 1 1]
A5
A4 A5
Case 4
Let us take D7 (vomiting) as ON state. Then
A1 [0 0 0 1 0 0 0 0 0 0 0 0]
A1 E [0 0 0 0 0 0 0 0 0 1 0 0]
[0 0 0 1 0 0 0 0 0 1 0 0]
A2
A2 E [0 0 0 0 0 0 0 0 0 1 0 1]
[0 0 0 1 0 0 0 0 0 1 0 1]
A3
A3 E [0 0 0 1 0 1 0 0 0 1 1 1]
[0 0 0 1 0 1 0 0 0 1 1 1]
A4
A4 E [0 0 0 1 0 1 0 0 0 1 1 1]
[0 0 0 1 0 1 0 0 0 1 1 1]
A5
A4 A5
Case 5
Let D1 is ON state. Then
A1 [1 0 0 0 0 0 0 0 0 0 0 0]
A1 E [0 0 1 0 0 0 1 0 0 0 0 0]
[1 0 1 0 0 0 1 0 0 0 0 0]
A2
A2 E [1 0 1 0 1 0 1 2 0 0 0 0]
[1 0 1 0 1 0 1 1 0 0 0 0]
A3
A3 E [2 1 2 0 1 0 2 2 1 0 0 0]
[1 1 1 0 1 0 1 1 1 0 0 0]
A4
A4 E [2 1 3 0 1 0 2 2 2 0 0 0]
[1 1 1 0 1 0 1 1 1 0 0 0]
A5
A4 A5
Except preventive measures all the others are having connection with D1.
D1
D3
D7
D10
D8
D2
D4
D5
D6
D11
D12
D9
Case 1
Taking in D12 ON state, i.e., the factor less possibility of dengue is on state.
Let B1 [0 0 0 0 0 0 0 0 0 0 0 1]
B1 E [0 0 0 0 0 1 0 0 0 0 1 0]
[0 0 0 0 0 1 0 0 0 0 1 1]
B2
B2 E [0 0 0 0 0 1 0 0 0 0 1 2]
[0 0 0 0 0 1 0 0 0 0 1 1]
B3
B2 B3
Using fully covered dresses and insect repellent are less possibility of
dengue.
260 Fuzzy Logic Applications in Computer Science and Mathematics
Case 2
By choosing muscle pain (D9) is ON state. Let
B1 [0 0 0 0 0 0 0 0 1 0 0 0]
B1 E [0 0 I 0 0 0 0 0 0 0 0 0]
[0 0 I 0 0 0 0 0 1 0 0 0]
B2
B2 E [I 0 I 0 0 0 I I 2 0 0 0 0]
[I 0 I 0 0 0 I I 1 0 0 0]
B3
B3 E [I 0 2I I 2 I 0 I2 I I2 I I 0 0 0]
[I 0 I I I 0 I I 1 0 0 0]
B4
B4 E [I I 0 2 I 0 I 0 I 2 2 I I I I 0 0 0]
[I 0 I I I 0 I I 1 0 0 0]
B5
B4 B5
Muscle pain did not cause any serious risk because it may occur due to
weakness, older age, etc.
Applications of FCM and NCM on Analysis of Dengue 261
Case 3
Choosing (D6) fully covered clothes usage as on state.
Let B1 [0 0 0 0 0 1 0 0 0 0 0 0]
B1 E [0 0 0 0 0 0 0 0 0 0 0 1]
[0 0 0 0 0 1 0 0 0 0 0 1]
B2
B2 E [0 0 0 0 0 1 0 0 0 0 1 1]
[0 0 0 0 0 1 0 0 0 0 1 1]
B3
B3 E [0 0 0 0 0 1 0 0 0 0 1 2]
[0 0 0 0 0 1 0 0 0 0 1 1]
B3 B4
B3 B4
Case 4
By taking B4 as on state. Then we can take,
B1 [0 0 0 1 0 0 0 0 0 0 0]
B1 E [0 0 0 0 0 0 0 0 0 1 0 0]
[0 0 0 1 0 0 0 0 0 1 0 0]
B2
B2 E [0 0 I 0 0 0 0 0 0 1 0 0]
[0 0 I 1 0 0 0 0 0 1 0 0]
B3
B3 E [I 0 I 0 0 0 I I2 0 1 0 0]
[I 0 I 1 0 0 I I2 0 1 0 0]
B4
B4 E [I I2 2I I2 I 0 I2 I 2I2 1 0 0]
[I I I 1 I 0 I I I 1 0 0]
B5
B5 E [I I 2 I2 I2 2I I2 I 0 I2 2I 2I2 2I 1 0 0]
[I I I 1 I 0 I I I 1 0 0]
B6
B5 B6
Case 5
By choosing travelling area as on state, let
B1 [1 0 0 0 0 0 0 0 0 0 0 0]
B1 E [0 0 1 0 0 0 I 0 0 0 0 0]
[0 0 1 0 0 0 I 0 0 0 0 0]
B2
B2 E [1 0 1 0 I 0 I 1 I I2 I I2 0 0 0]
[1 0 1 0 I 0 1 I I 0 0 0]
B3
B3 E [I 2 I 2 I2 1 I I2 0 0 1 I 2I I 0 0 0]
[1 I 1 I 0 0 1 I I 0 0 0]
B4
B4 E [I 2 I 2 I2 1 I I2 0 0 1 I 2I 2I I 0 0]
[1 I 1 I 0 0 1 I I I 0 0]
B5
B5 E [I 2I2 I2 1 2I I 0 0 1 I I I I 0 0]
[1 I 1 I 0 0 1 I I I 0 0]
B6
B5 B6
maps are evaluated and it is used for the iteration process. The comparison
is made between the both FCM and NCM, by considering any one state as
state commonly. From which, the results obtained as given below.
In first case, by taking D12 as on state, the result obtained that D4 and D10
as OFF state in NCM while it is ON in FCM. Next case show that possibil-
ity of diseases is indeterminate state. For, third case same as first case 4th
and 10th parameters in OFF state. Now, for D4 headache is ON state. Due
to our travelling history, we get a possibility of dengue and host respond
all the other are in indeterminate case. The parameters of Dengue from the
above iteration process on FCM and NCM are briefly explained with the
comparative remarks in the below Table 16.1.
Table 16.1 Comparison results of FCM and NCM on dengue.
On Comparison
state FCM iteration NCM iteration remarks
D12 A3 = A4; B2 = B3; Differs in state
[0 0 0 1 0 1 0 0 0 1 1 1] [0 0 0 0 0 1 0 0 0 0 1 1] 4 and 10
D9 A4 = A5; B4 = B5; The possibility
[1 1 1 0 0 0 1 1 1 0 0 0] [1 0 1 1 1 0 1 1 1 0 0 0] of disease is
very low
D6 A4 = A5; B3 = B4; Off states are
[0 0 0 1 0 1 0 0 0 1 1 1] [0 0 0 0 0 1 0 0 0 0 1 1] 4 and 10
D4 A4 = A5; B5 = B6; Here
[0 0 0 1 0 1 0 0 0 1 1 1] [1 1 1 1 1 0 1 1 1 1 0 0] possibility
of headache
is vomiting
only
D1 A4 = A5; B5 = B6; Most
[1 1 1 0 1 0 1 1 1 0 0 0] [1 1 1 1 0 0 1 1 1 1 0 0] possibility
of is 3rd
and 7th
states.
16.6 Conclusion
In this chapter, comparative study is made on different parameters of the
dengue, which are analysis by FCM and NCM methods. Based on the cal-
culation process on FCM and NCM separately by considering different
parameter as ON state, we concluded that positivity of dengue and host
Applications of FCM and NCM on Analysis of Dengue 265
respond all the other are indeterminate case. The obtained results on dif-
ferent cases of FCM and NCM are analyzed by comparative study.
References
1. Fernández, E., Smieja, M., Walter, S.D., Loeb, M., A predictive model to dif-
ferentiate dengue from other febrile illness. BMC Infect. Dis., 16, 1, 1–7, 2016.
2. Gambhir, S., Malik, S.K., Kumar, Y., PSO-ANN based diagnostic model for
the early detection of dengue disease. New Horiz. Transl. Med., 4, 1–4, 1–8,
2017.
3. Qsim, M., Ashfaq, U.A., Yousaf, M.Z., Masoud, M.S., Rasul, I., Noor, N.,
Hussain, A., Genetically modified Aedes aegypti to control dengue: A review.
Crit. Rev.™ Eukaryot. Gene Expr., 27, 4, 331–340, 2017.
4. Caicedo-Borrero, D.M., Tovar, J.R., Méndez, A., Parra, B., Bonelo, A., Celis,
J., Osorio, L., Development and performance of dengue diagnostic clinical
algorithms in Colombia. Am. J. Trop. Med. Hyg., 102, 6, 1226, 2020.
5. Wong, P.F., Wong, L.P., AbuBakar, S., Diagnosis of severe dengue: Challenges,
needs and opportunities. J. Infect. Public Health, 13, 2, 193–198, 2020.
6. Sutton, R.T., Pincock, D., Baumgart, D.C., Sadowski, D.C., Fedorak, R.N.,
Kroeker, K.I., An overview of clinical decision support systems: Benefits,
risks, and strategies for success. NPJ Digit. Med., 3, 1, 1–10, 2020.
7. Hoyos, W., Aguilar, J., Toro, M., Dengue models based on machine learning
techniques: A systematic literature review. Artif. Intell. Med., 119, 102157,
2021.
17
A Comprehensive Review and
Analysis of the Plethora of Branches
of Medical Science and Bioinformatics
Based on Fuzzy Logic
Partha Sarker1 and Siddhartha Roy2*
1
Department of Computer Science, The University of Burdwan, West Bengal, India
2
Department of Computer Science, The Heritage College (Affiliated to University of
Calcutta), Kolkata, India
Abstract
This chapter represents comprehensive and analytical views of the latest research
work on bioinformatics and various branches of medical science using fuzzy set
theory. Fuzzy set theory is felicitous for developing based on knowledge systems
in various fields of medicine for example drug discovery, finding diseases, the best
way of medical treatments, and obtaining real-time information based on the data
provided by the patients. It is very difficult to achieve efficient and effective med-
ical work without expert system-based fuzzy logic (ESFL). This chapter reviews
the application of the ESFL in medical sciences in general and will consider the
ways of in-depth analysis of the applied fuzzy logic and implementation process
in those fields.
17.1 Introduction
In fuzzy mathematics, the fuzzy concept is a multi-valued formed with
truth values between 0 and 1 both inclusive. In 1956 at the University of
Berkeley, California, Professor Lotfi Ahmad Zadeh, in his paper which was
Rahul Kar, Dac-Nhuong Le, Gunjan Mukherjee and Biswadip Basu Mallik and Ashok Kumar Shaw (eds.)
Fuzzy Logic Applications in Computer Science and Mathematics, (267–278) © 2023 Scrivener Publishing LLC
267
268 Fuzzy Logic Applications in Computer Science and Mathematics
Yes (1.0)
Is it raining Boolean
today? logic
No (0.0)
Heavy (0.9)
Medium (0.5)
Is it raining Fuzzy
today? Low (0.25) logic
Knowledge
Base
artificial intelligence has been employed augmented with the fuzzy system.
Handling uncertain situations and finding errors in disease diagnosis is
very vital as it can be helpful to medical practitioners to diagnose a patient.
Due to the lack of sufficient information, the fuzzy method was developed
as the most effective method to handle diagnosis uncertainty. In applied
fuzzy logic, the diagnosis of a disease can be defined in terms of the degree
of membership. In classical logic, the sickness can only be circumscribed
with a true (1) and false (0), in a fuzzy system; the sickness can be drawn
as a sketch with partial truth values. The following figure (Figure 17.3)
depicts the Fuzzy process to diagnose the disease using a flowchart.
After introductory section we discuss previous work in section 17.2.
Section 17.3 presents the deployment of fuzzy logic and fuzzy system in
the area of medical and bioinformatics. A review of some previous work,
methods, and findings is made a discussable talk in Section 17.4. Finally,
this paper ends with some concluding remarks and scope.
Start
Stop
Figure 17.3 Flow diagram of the fuzzy process to diagnosis the disease.
Fuzzy Logic in Medical Science & Bioinformatics 271
previously adopting fuzzy logic, in this case, plays a very crucial role.
Using neuro fuzzy optimization techniques, various kinds of protein
motifs can be extracted [8, 9]. Analyzing diabetic neuropathy and detec-
tion of early diabetic retinopathy can be implemented using fuzzy logic.
It has enormous applications and uses in various medical areas, such as
determining appropriate lithium dosage. A fuzzy system is used to pre-
dict brain diseases for medical image processing. A fuzzy system is also
used to take the decision to improve radiation therapy and predict pros-
tate cancer, lung cancer, and breast cancer. Discriminating benign with
malignant cells and estimating drug discovery are extensively used by
fuzzy systems.
called a biochip, gene chip, or DNA chip [14]. A genetic network process
is used to increase the efficiency of fuzzy logic-based gene expression [15].
A fuzzy rule-based classifier is used to extract feature selection and catego-
rize amino acid sequences [16].
17.5 Conclusion
Recent advancements in soft computing techniques, fuzzy logic make suc-
cessful applications in health care. In this paper, we discuss the effective-
ness of the fuzzy set theory in detecting the diagnosis of disease, and its
utilization in the field of bioinformatics, and medical science. To achieve
the target, we have searched various scientific journals from the years 2000
to 2021. All the research journals are based on published years, methodol-
ogy used in various kinds of diseases, outcomes, and finally the influence
of the fuzzy logic that is deployed to identify disease. The most important
medical areas we have studied were related to heart daises Ebola, diabetes,
and cholera, respectively, using various fuzzy logic set methods. It has been
observed that more than 90% of fuzzy system has a positive impact on
disease analysis. Our future work will focus on fuzzy artificial neural net-
works to establish an intelligent system to detect and identify diseases more
accurately. Future steps are to develop an intelligent fuzzy expert system to
diagnose patient disease more accurately and would estimate parameters,
such as specificity and sensitivity.
274 Fuzzy Logic Applications in Computer Science and Mathematics
Table 17.1 Review of various diseases using the fuzzy system. (Continued)
SL. no. Symptom Research objective Procedure Performance/uses Conclusion
3 Brain To make detection k-means clustering, By this algorithm brain, The number of MRI plates
Tumor of a brain tumor a fuzzy-based tumors (for the is limited. A large
in the MRI plate approach is used to human only) in MRI number of MRI plates
by improving the locate the tumor in plates can be located are required for proper
segmentation the MRI of the brain with segmentation segmentation.
process. [19]. based
4 Parkinson To detect Parkinson’s The proposed With this fuzzy The c-means clustering
disease disease a fuzzy- algorithm, the approach a higher approach is higher
based algorithmic C-means-based accuracy rate of 96% than another one. So
system was fuzzy inference to 97%. this diagnosis is very
made from the system was used to dependent on only one
biomedical make detection of fuzzy-based approach
measurement of Parkinson’s disease to get higher accuracy.
voice signals. [20].
5 COVID To detect early A smart fuzzy inference It gives a rate of 90% More countries should be
19 symptoms of system was proposed accuracy from 11 incorporated mobile
Covid 19 disease to detect covid 19 countries app-based service
based on the disease [21]. systems should be
symptoms with incorporated in the
the help of a fuzzy future.
algorithm.
(Continued)
276 Fuzzy Logic Applications in Computer Science and Mathematics
Table 17.1 Review of various diseases using the fuzzy system. (Continued)
SL. no. Symptom Research objective Procedure Performance/uses Conclusion
6 Diabetes To diagnose Mamdani’s fuzzy This approach has given No. of patients’ data
Disease diabetes disease inference system 96% accuracy to the set is very small (In
a fuzzy inference (MFIS) was used to 50 patients. the future huge no.
approach was diagnose diabetic of patients should
implemented disease [22]. participate in this
survey), and Web-based
and mobile-based apps
should be incorporated.
7 Dental To detect dental Hybrid Fuzzy inference Hybrid FIS gave an After comparing between
Disease disease fuzzy systems (FIS) accuracy rate of 82% two approaches the
logic and an and Evolutionary and the Evolutionary Evolutionary algorithm
evolutionary algorithms are used algorithm gave an is more accurate than
algorithm were to detect dental accuracy rate of 70%. then the other, only 100
used. diseases [23]. patients were used for
this survey.
Fuzzy Logic in Medical Science & Bioinformatics 277
References
1. Sadegh-Zadeh, K., Fuzzy health, illness, and disease. J. Med. Philos., 25, 5,
605–638:612, 2000.
2. Lancaster, S., A fuzzy logic controller for the application of skin pressure,
Creighton University, 2004.
3. Mahfouf, M., Abbod, M.F., Linkens, D.A., A survey of fuzzy logic monitoring
and control utilization in medicine, Department of Automatic Control and
System Engineering, University of Sheffield, Sheffield, England, 2000.
4. Yue, H., Yue, G., Yi, G., Application study in decision support with fuzzy
cognitive map. Int. J. Comput., 1, 140–144, 2007.
5. Faran, B., Saleem Khan, M., Noor, Y., Imran, M., Design model of fuzzy
logic medical diagnosis control system. Int. J. Comput. Sci. Eng. (IJCSE), 3, 5,
2093–2108, 2011.
6. Schuster, A., Adamson, K., Bell, D.A., Fuzzy decision support system in the
domain of coronary heart disease risk assessment. Fuzzy Log. Med., 177–204,
2002.
7. Allahverdi, N., Design of fuzzy expert systems and its applications in some
medical areas. Int. J. Appl. Math. Elec. Comput., 2, 1, 1–8, 2014.
8. Angela, T. and Nieto, J.J., Fuzzy logic in medicine and bioinformatics. J.
Biomed. Biotechnol., 2006, 1–7, 2006.
9. Chang, B.C. and Halgamuge, S.K., Protein motif extraction with neuro-fuzzy
optimization. Bioinformatics, 18, 8, 1084–1090, 2002.
10. Xu, D. et al., Applications of fuzzy logic in bioinformatics. Series on Advances
in Bioinformatics and Computational Biology, vol. 9, pp. 196–221.
11. Torres, A. and Nieto, J.J., The fuzzy polynucleotide space: Basic properties.
Bioinformatics, 19, 5, 587–592, 2003.
12. Tomida, S., Hanai, T., Honda, H., Kobayashi, T., Analysis of expression pro-
file using fuzzy adaptive resonance theory. Bioinformatics, 8, 8, 1073–1083,
2002.
13. Cordón, O., Gomide, F., Herrera, F., Hoffmann, F., Magdalena, L., Ten years
of genetic fuzzy systems: Current framework and new trends. Fuzzy Sets
Syst., 41, 1, 5–31, 2004.
14. Belacel, N., Čuperlović-Culf, M., Laflamme, M., Ouellette, R., Fuzzy J-Means
and VNS methods for clustering genes from microarray data. Bioinformatics,
20, 11, 1690–1701, 2004.
15. Ressom, H., Reynolds, R., Varghese, R.S., Increasing the efficiency of fuzzy
logic-based gene expression data analysis. Physiol. Genomics, 13, 2, 107–117,
2003.
16. Bandyopadhyay, S., An efficient technique for superfamily classification of
amino acid sequences: Feature extraction, fuzzy clustering and prototype
selection. Fuzzy Sets, 152, 1, 5–16, 2005.
278 Fuzzy Logic Applications in Computer Science and Mathematics
17. Padmavathi, K., Meenakshi, K., Swaraja, K., Rajani, A., KafiulIslam, Md,
Detection of cardiac arrhythmia using fuzzy logic. Inf. Med. Unlocked, 17,
1–7, 2019.
18. Oluwagbemi, O., Oluwagbemi, F., Abimbola, O., Ebinformatics, Ebola fuzzy
informatics systems on the diagnosis, prediction and recommendation of
appropriate treatments for Ebola. 12–37, 2016.
19. Neha, M., Yogesh Kumar, M., Shruti, M., Divya, M., Detection of brain tumor
in MRI image through fuzzy. Intech-Open Sci., 4, 47–62, 2018.
20. Atanu, C. and Bhaskar, M., Detection of Parkinson’s disease using fuzzy
inference system, in: Intelligent Systems Technologies and Applications, vol. 1,
pp. 79–90, 2015.
21. Shatnawi, M., Anas, S., Zakaria Al, S., Ghaith, H., Symptoms-based fuzzy-
logic approach for COVID-19 diagnosis. Int. J. Adv. Comput. Sci. Appl.
(IJACSA), 12, 4, 444–452, 2021.
22. Niswati, Z., Mustika, F.A., Paramita, A., Fuzzy logic implementation for
diagnosis of diabetes mellitus disease at Puskesmas in East Jakarta, WMA-
Mathcomtech 2018 IOP Conf. Series. J. Phys.: Conf. Ser., 2018.
23. Andi, M., Abdul, K., Wayan, F., Ramdhani, F., PriyoAnggodo, Y., Dental
disease detection using hybrid fuzzylogic and evolution strategies. J.
Telecommun. Electron. Comput. Eng., 10, 1–8, 2018.
Index
ACE (area control error), 113, 114 Car-like mobile robot, 146
Acceleration, 146 CASO (Chaotic Atomic Search
Accuracy in quantification is raised, 16 Optimization) algorithm, 107,
Activation functions, 129, 132–133 108, 110, 111, 116, 118, 119
Adaptive networks: architecture, 176 Centroid points, for fuzzy numbers,
classification of images, 176 53
Adjacent matrix, 235, 241, 246, 252, Chaotic Atomic Search Optimization
258, 263 (CASO) algorithm, 107, 108,
ADNET, 125–138 110, 111, 116, 118, 119
AGC (automatic generation control), College, 162, 164
108, 116 Commodity market, 90, 91, 93
Aggregation, 149, 153 Communication via remote
Ambiguity (A), of fuzzy number, connections and a web server,
defined, 57 33–34
ranking method, 53, 54, 77, 79, 80 Comparative study, 233, 234, 247,
designed method, 56, 58, 60, 249–251, 264–265
61–62, 64, 66, 67–68 Competitive examination, 102
reasonable properties, 68–75 Compounding, 90
Analysis, 160, 162–163 Conditional attribute, 100, 182
ANFIS, 191, 194 Confusion matrix, 137–138
Area control error (ACE), 113, 114 Conventional PID, 108
Artificial intelligence, 268, 270 Convolutional neural networks
AUC, 135–138 (CNN), 125–134
Automatic braking system, 144 Core, 101, 102, 183
Automatic generation control (AGC), Cost, 164–168
108, 116 Crisp logic, 269
Autonomous bay parking, 148 Cryptology, 214
279
280 Index