Computer Science ›› 2019, Vol. 46 ›› Issue (1): 131-137.doi: 10.11896/j.issn.1002-137X.2019.01.020

• CCDM2018 • Previous Articles     Next Articles

Approach for Knowledge Reasoning Based on Hesitate Fuzzy Credibility

ZHENG Hong-liang, HOU Xue-hui, SONG Xiao-ying, PANG Kuo, ZOU Li   

  1. (School of Computer and Information Technology,Liaoning Normal University,Dalian,Liaoning 116081,China)
  • Received:2018-05-04 Online:2019-01-15 Published:2019-02-25

Abstract: In order to solve the problem of inaccurate estimation of credibility in uncertainty reasoning,hesitant fuzzy set was introduced into the reasoning of uncertainty in this paper.The concept of hesitant fuzzy credibility was given in this article.On the basis of the knowledge representation based on credibility,the method of knowledge representation of hesitant fuzzy credibility is defined.In order to solve the problem of missing information in the process of reasoning by experts,an information complement method for solving the average value was proposed.A single rule and multiple rules of parallel relationship of the hesitant fuzzy credibility were constructed,and the specific steps of knowledge representation and uncertainty reasoning based on the hesitant fuzzy credibility was given.Finally,an example was given to illustrate the effectiveness and feasibility of the proposed method.

Key words: Credibility, Hesitant fuzzy credibility element, Hesitant fuzzy set, Knowledge representation, Uncertainty reasoning

CLC Number: 

  • TP181
[1]谢季坚,刘承平.模糊数学方法及其应用(第4版)[M].武汉:华中科技大学出版社,2013.<br /> [2]刘星成,汤庸.专家系统原理与编程[M].北京:机械工业出版社,2000.<br /> [3]SHORTILIFFE E H.Computer-based medical consultation: MYCIN[M].New York:American Elsevier Publishing,1976.<br /> [4]HAO Q,LU T.Context modeling and reasoning based on certainty factor[C]//Proceedings of 2009 Second Asia-Pacific Conference on Computational Intelligence and Industrial Applications.Wuhan,China:IEEE,2009:38-41.<br /> [5]WU M K.The truth-value estimation in fuzzy reasoning[J].Chinese Journal of Computers,1993,16(2):158-161.(in Chinese)<br /> 吴茂康.关于Fuzzy推理式的可信度估计[J].计算机学报,1993,16(2):158-161.<br /> [6]CHEN Y X,YIN Y.Two kinds of reasoning with credibility[J].Fuzzy Systems and Mathematics,2005,19(3):6-13.(in Chinese)<br /> 陈仪香,尹艳.两种含可信度的推理[J].模糊系统与数学,2005,19(3):6-13.<br /> [7]XIONG C Q,OUYANG Y,MEI Q.Argumentation Model Based on Certainty-Factor and Algorithms of Argument Evaluation[J].Journal of Software,2014,25(6):1225-1238.(in Chinese)<br /> 熊才权,欧阳勇,梅清.基于可信度的辩论模型及争议评价算法[J].软件学报,2014,25(6):1225-1238.<br /> [8]ZOU L,ZHANG Y X,LIU X.Linguistic-Valued approximate reasoning with lattice ordered linguistic-valued credibility[J].International Journal of Computational Intelligence Systems,2015,8(1):53-61.<br /> [9]ZADEH L A.The concept of a linguistic variable and its applications to approximate reasoning-Part I[J].Information Science,1975,8(3):199-249.<br /> FAN J P,XUE K,WU M Q.Cross evaluation method based on intuitionistic fuzzy entropy.Computer Science,2018,45(2):280-286.(in Chinese)<br /> 范建平,薛坤,吴美琴.基于直觉模糊熵的交叉评价方法.计算机科学,2018,45(2):280-286.<br /> [11]YAGER R R,ABBASOV A M.Pythagorean membership grades in multicriteria decision making.IEEE Transaction on Fuzzy Systems,2014,22(4):958-965.<br /> [12]TORRA V,NARUKAWA Y.On hesitant fuzzy sets and decision[C]//IEEE International Conference on Fuzzy Systems.IEEE,2009:1378-1382.<br /> [13]TORRA V.Hesitant fuzzy sets[J].International Journal of Intelligent Systems,2010,25(6):529-539.<br /> [14]ZHANG Z.Deriving the priority weights from incomplete hesitant fuzzy preference relations based on multiplicative consistency[J].Applied Soft Computing,2016,46:37-59.<br /> [15]PUSHPINDER S.Distance and similarity measures for multiple-attribute decision making with dual hesitant fuzzy sets [J].Computational & Applied Mathematics,2015,36(1):1-6.<br /> [16]RODR′IGUEZ R M,MART′INEZ L,HERRERA F.Hesitant Fuzzy Linguistic Term Sets for Decision Making[J].IEEE Transactions on Fuzzy Systems,2012,20(1):109-119.<br /> [17]GUO S,JIN F F,CHEN H Y.Hesitant fuzzy Einstein geometric aggregation operators and their application[J].Computer Engineering and Applications,2015,51(17):53-58.(in Chinese)<br /> 郭甦,金飞飞,陈华友.犹豫模糊Einstein几何算子及应用[J].计算机工程与应用,2015,51(17):53-58.<br /> [18]LIU W F,HE X.Pythagorean Hesitant Fuzzy Set[J].Fuzzy Systems and Mathematics,2016,30(4):107-115.(in Chinese)<br /> 刘卫锋,何霞.毕达哥拉斯犹豫模糊集[J].模糊系统与数学,2016,30(4):107-115.<br /> [19]XU Z S,ZHANG X L.Hesitant fuzzy multi-attribute decision making based on TOPSIS with incomplete weight information[J].Knowledge-Based Systems,2013,52(6):53-64.<br /> [20]LIAO H C,XU Z S,ZENG X J.Distance and similarity measures for hesitant fuzzy linguistic term sets and their application in multi-criteria decision making[J].Information Sciences,2014,271(3):125-142.<br /> [21]BIAN S H.Research and application of uncertainty reasoning in expert system[D].Anhui:Anhui University,2010.(in Chinese)<br /> 卞世晖.专家系统中不确定性推理的研究与应用[D].安徽:安徽大学,2010.<br /> [22]XIA M M,XU Z S,CHEN N.Some hesitant fuzzy aggregation operators with their application in group decision making [J].Group Decis Negot,2013,234(10):259-279.<br /> [23]TORRA V.Hesitant fuzzy sets[J].International Journal of Intelligent Systems,2010,25(6):529-539.
[1] WANG Jie, LI Xiao-nan, LI Guan-yu. Adaptive Attention-based Knowledge Graph Completion [J]. Computer Science, 2022, 49(7): 204-211.
[2] WANG Yu-fei, CHEN Wen. Tri-training Algorithm Based on DECORATE Ensemble Learning and Credibility Assessment [J]. Computer Science, 2022, 49(6): 127-133.
[3] HANG Ting-ting, FENG Jun, LU Jia-min. Knowledge Graph Construction Techniques:Taxonomy,Survey and Future Directions [J]. Computer Science, 2021, 48(2): 175-189.
[4] XUE Zhan-ao, SUN Bing-xin, HOU Hao-dong, JING Meng-meng. Optimal Granulation Selection Method Based on Multi-granulation Rough Intuitionistic Hesitant Fuzzy Sets [J]. Computer Science, 2021, 48(10): 98-106.
[5] ZHANG Yu, LU Yi-hong, HUANG De-cai. Weighted Hesitant Fuzzy Clustering Based on Density Peaks [J]. Computer Science, 2021, 48(1): 145-151.
[6] CHEN Yu-jin, XU Ji-hui, SHI Jia-hui, LIU Yu. Three-way Decision Models Based on Intuitionistic Hesitant Fuzzy Sets and Its Applications [J]. Computer Science, 2020, 47(8): 144-150.
[7] GUO Cong-rui, WANG Jun and FENG Yi-ming. Research on Method of Credibility Evaluation of System Simulation [J]. Computer Science, 2020, 47(6A): 567-571.
[8] GAO Qing-Ji, WANG Wen-bo, HOU Shi-hao and XING Zhi-wei. Traffic Strategy in Dense Crowd Environments Based on Expandable Path [J]. Computer Science, 2020, 47(6A): 34-39.
[9] YANG Xiao-jun, XU Zhong-fu, ZHANG Xing, SUN Dan-hui. Overview and Difficulties Analysis on Credibility Assessment of Simulation Models [J]. Computer Science, 2019, 46(6A): 23-29.
[10] GAO Peng, LIU Yun-jiang, GAO Wei-ting, LI Man, CHEN Juan. Double Thresholds DMM Cooperative Spectrum Sensing Algorithm Based on Credibility [J]. Computer Science, 2018, 45(9): 166-170.
[11] FENG Lei, JI Jun-zhong, WU Chen-sheng. New Method for Ranking Scientific Publications with Creditworthiness Mechanism [J]. Computer Science, 2018, 45(11A): 132-137.
[12] LIU De-hao and WANG Qian. Uncertainty Reasoning Based on Related Planar Cloud and Application in Prediction [J]. Computer Science, 2016, 43(Z6): 99-102.
[13] CHEN Hui and MA Ya-ping. Uncertain Extension of Description Logic SROIQ(D) for Uncertain Knowledge Representation [J]. Computer Science, 2016, 43(Z11): 88-92.
[14] WU Wei-min, CHEN Dong-xin, LAI Wen-xin and SU Qing. Research and Implementation of EFI OS Loader Security Reinforcement Technology [J]. Computer Science, 2016, 43(9): 188-191.
[15] MENG Hua, YUAN Ya-yan, CHU Jie-lei and WANG Hong-jun. Topological Characterization of AGM Belief Contraction Operator [J]. Computer Science, 2016, 43(9): 87-90.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!