Computer Science ›› 2019, Vol. 46 ›› Issue (1): 131-137.doi: 10.11896/j.issn.1002-137X.2019.01.020

• CCDM2018 • Previous Articles     Next Articles

Approach for Knowledge Reasoning Based on Hesitate Fuzzy Credibility

ZHENG Hong-liang, HOU Xue-hui, SONG Xiao-ying, PANG Kuo, ZOU Li   

  1. (School of Computer and Information Technology,Liaoning Normal University,Dalian,Liaoning 116081,China)
  • Received:2018-05-04 Online:2019-01-15 Published:2019-02-25

Abstract: In order to solve the problem of inaccurate estimation of credibility in uncertainty reasoning,hesitant fuzzy set was introduced into the reasoning of uncertainty in this paper.The concept of hesitant fuzzy credibility was given in this article.On the basis of the knowledge representation based on credibility,the method of knowledge representation of hesitant fuzzy credibility is defined.In order to solve the problem of missing information in the process of reasoning by experts,an information complement method for solving the average value was proposed.A single rule and multiple rules of parallel relationship of the hesitant fuzzy credibility were constructed,and the specific steps of knowledge representation and uncertainty reasoning based on the hesitant fuzzy credibility was given.Finally,an example was given to illustrate the effectiveness and feasibility of the proposed method.

Key words: Knowledge representation, Uncertainty reasoning, Credibility, Hesitant fuzzy set, Hesitant fuzzy credibility element

CLC Number: 

  • TP181
[1]谢季坚,刘承平.模糊数学方法及其应用(第4版)[M].武汉:华中科技大学出版社,2013.<br /> [2]刘星成,汤庸.专家系统原理与编程[M].北京:机械工业出版社,2000.<br /> [3]SHORTILIFFE E H.Computer-based medical consultation: MYCIN[M].New York:American Elsevier Publishing,1976.<br /> [4]HAO Q,LU T.Context modeling and reasoning based on certainty factor[C]//Proceedings of 2009 Second Asia-Pacific Conference on Computational Intelligence and Industrial Applications.Wuhan,China:IEEE,2009:38-41.<br /> [5]WU M K.The truth-value estimation in fuzzy reasoning[J].Chinese Journal of Computers,1993,16(2):158-161.(in Chinese)<br /> 吴茂康.关于Fuzzy推理式的可信度估计[J].计算机学报,1993,16(2):158-161.<br /> [6]CHEN Y X,YIN Y.Two kinds of reasoning with credibility[J].Fuzzy Systems and Mathematics,2005,19(3):6-13.(in Chinese)<br /> 陈仪香,尹艳.两种含可信度的推理[J].模糊系统与数学,2005,19(3):6-13.<br /> [7]XIONG C Q,OUYANG Y,MEI Q.Argumentation Model Based on Certainty-Factor and Algorithms of Argument Evaluation[J].Journal of Software,2014,25(6):1225-1238.(in Chinese)<br /> 熊才权,欧阳勇,梅清.基于可信度的辩论模型及争议评价算法[J].软件学报,2014,25(6):1225-1238.<br /> [8]ZOU L,ZHANG Y X,LIU X.Linguistic-Valued approximate reasoning with lattice ordered linguistic-valued credibility[J].International Journal of Computational Intelligence Systems,2015,8(1):53-61.<br /> [9]ZADEH L A.The concept of a linguistic variable and its applications to approximate reasoning-Part I[J].Information Science,1975,8(3):199-249.<br /> FAN J P,XUE K,WU M Q.Cross evaluation method based on intuitionistic fuzzy entropy.Computer Science,2018,45(2):280-286.(in Chinese)<br /> 范建平,薛坤,吴美琴.基于直觉模糊熵的交叉评价方法.计算机科学,2018,45(2):280-286.<br /> [11]YAGER R R,ABBASOV A M.Pythagorean membership grades in multicriteria decision making.IEEE Transaction on Fuzzy Systems,2014,22(4):958-965.<br /> [12]TORRA V,NARUKAWA Y.On hesitant fuzzy sets and decision[C]//IEEE International Conference on Fuzzy Systems.IEEE,2009:1378-1382.<br /> [13]TORRA V.Hesitant fuzzy sets[J].International Journal of Intelligent Systems,2010,25(6):529-539.<br /> [14]ZHANG Z.Deriving the priority weights from incomplete hesitant fuzzy preference relations based on multiplicative consistency[J].Applied Soft Computing,2016,46:37-59.<br /> [15]PUSHPINDER S.Distance and similarity measures for multiple-attribute decision making with dual hesitant fuzzy sets [J].Computational & Applied Mathematics,2015,36(1):1-6.<br /> [16]RODR′IGUEZ R M,MART′INEZ L,HERRERA F.Hesitant Fuzzy Linguistic Term Sets for Decision Making[J].IEEE Transactions on Fuzzy Systems,2012,20(1):109-119.<br /> [17]GUO S,JIN F F,CHEN H Y.Hesitant fuzzy Einstein geometric aggregation operators and their application[J].Computer Engineering and Applications,2015,51(17):53-58.(in Chinese)<br /> 郭甦,金飞飞,陈华友.犹豫模糊Einstein几何算子及应用[J].计算机工程与应用,2015,51(17):53-58.<br /> [18]LIU W F,HE X.Pythagorean Hesitant Fuzzy Set[J].Fuzzy Systems and Mathematics,2016,30(4):107-115.(in Chinese)<br /> 刘卫锋,何霞.毕达哥拉斯犹豫模糊集[J].模糊系统与数学,2016,30(4):107-115.<br /> [19]XU Z S,ZHANG X L.Hesitant fuzzy multi-attribute decision making based on TOPSIS with incomplete weight information[J].Knowledge-Based Systems,2013,52(6):53-64.<br /> [20]LIAO H C,XU Z S,ZENG X J.Distance and similarity measures for hesitant fuzzy linguistic term sets and their application in multi-criteria decision making[J].Information Sciences,2014,271(3):125-142.<br /> [21]BIAN S H.Research and application of uncertainty reasoning in expert system[D].Anhui:Anhui University,2010.(in Chinese)<br /> 卞世晖.专家系统中不确定性推理的研究与应用[D].安徽:安徽大学,2010.<br /> [22]XIA M M,XU Z S,CHEN N.Some hesitant fuzzy aggregation operators with their application in group decision making [J].Group Decis Negot,2013,234(10):259-279.<br /> [23]TORRA V.Hesitant fuzzy sets[J].International Journal of Intelligent Systems,2010,25(6):529-539.
[1] ZHANG Yu, LU Yi-hong, HUANG De-cai. Weighted Hesitant Fuzzy Clustering Based on Density Peaks [J]. Computer Science, 2021, 48(1): 145-151.
[2] CHEN Yu-jin, XU Ji-hui, SHI Jia-hui, LIU Yu. Three-way Decision Models Based on Intuitionistic Hesitant Fuzzy Sets and Its Applications [J]. Computer Science, 2020, 47(8): 144-150.
[3] GAO Qing-Ji, WANG Wen-bo, HOU Shi-hao and XING Zhi-wei. Traffic Strategy in Dense Crowd Environments Based on Expandable Path [J]. Computer Science, 2020, 47(6A): 34-39.
[4] GUO Cong-rui, WANG Jun and FENG Yi-ming. Research on Method of Credibility Evaluation of System Simulation [J]. Computer Science, 2020, 47(6A): 567-571.
[5] YANG Xiao-jun, XU Zhong-fu, ZHANG Xing, SUN Dan-hui. Overview and Difficulties Analysis on Credibility Assessment of Simulation Models [J]. Computer Science, 2019, 46(6A): 23-29.
[6] GAO Peng, LIU Yun-jiang, GAO Wei-ting, LI Man, CHEN Juan. Double Thresholds DMM Cooperative Spectrum Sensing Algorithm Based on Credibility [J]. Computer Science, 2018, 45(9): 166-170.
[7] FENG Lei, JI Jun-zhong, WU Chen-sheng. New Method for Ranking Scientific Publications with Creditworthiness Mechanism [J]. Computer Science, 2018, 45(11A): 132-137.
[8] LIU De-hao and WANG Qian. Uncertainty Reasoning Based on Related Planar Cloud and Application in Prediction [J]. Computer Science, 2016, 43(Z6): 99-102.
[9] CHEN Hui and MA Ya-ping. Uncertain Extension of Description Logic SROIQ(D) for Uncertain Knowledge Representation [J]. Computer Science, 2016, 43(Z11): 88-92.
[10] WU Wei-min, CHEN Dong-xin, LAI Wen-xin and SU Qing. Research and Implementation of EFI OS Loader Security Reinforcement Technology [J]. Computer Science, 2016, 43(9): 188-191.
[11] MENG Hua, YUAN Ya-yan, CHU Jie-lei and WANG Hong-jun. Topological Characterization of AGM Belief Contraction Operator [J]. Computer Science, 2016, 43(9): 87-90.
[12] ZHOU Ru-qi, CHEN Yi-qun and FENG Jia-li. Knowledge Reasoning Method Based on Extended Fuzzy Petri Net [J]. Computer Science, 2016, 43(3): 75-79.
[13] CHENG Kai, CHEN Gang, ZHANG Pin and YIN Cheng-xiang. Review on Methods of Operation Planning [J]. Computer Science, 2016, 43(12): 8-12.
[14] ZHANG Xue-ming, HUANG Zhi-qiu and SUN Yi. Research on Privacy Access Control Based on RBAC [J]. Computer Science, 2016, 43(1): 166-171.
[15] LU Fang-fang and WANG Jie. Improved Method to Process Inconsistent Answer Set Program [J]. Computer Science, 2015, 42(Z6): 542-545.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] . [J]. Computer Science, 2018, 1(1): 1 .
[2] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75 .
[3] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[4] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[5] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[6] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99 .
[7] ZHOU Yan-ping and YE Qiao-lin. L1-norm Distance Based Least Squares Twin Support Vector Machine[J]. Computer Science, 2018, 45(4): 100 -105 .
[8] LIU Bo-yi, TANG Xiang-yan and CHENG Jie-ren. Recognition Method for Corn Borer Based on Templates Matching in Muliple Growth Periods[J]. Computer Science, 2018, 45(4): 106 -111 .
[9] GENG Hai-jun, SHI Xin-gang, WANG Zhi-liang, YIN Xia and YIN Shao-ping. Energy-efficient Intra-domain Routing Algorithm Based on Directed Acyclic Graph[J]. Computer Science, 2018, 45(4): 112 -116 .
[10] CUI Qiong, LI Jian-hua, WANG Hong and NAN Ming-li. Resilience Analysis Model of Networked Command Information System Based on Node Repairability[J]. Computer Science, 2018, 45(4): 117 -121 .