General type-2 (GT2) fuzzy logic systems (FLSs) become a popular research topic for the past few years. Usually the Karnik–Mendel algorithms are the most prevalent approach to complete the type-reduction. Nonetheless, the iterative quality of these types of computational intensive algorithms might impede applying them. For the improved types of algorithms, some noniterative algorithms can enhance the calculation efficiencies greatly, while it is still an open problem for comparing the relation between the discrete TR algorithms and corresponding continuous TR algorithms. First, the sum and integral operations in discrete and continuous noniterative algorithms are compared. Then, three kinds of noniterative algorithms originate from the type-reduction of interval type-2 FLSs are extended to complete the centroid type-reduction of general T2 FLSs. Four computer simulations prove that while changing the number of samples suitably, the calculational results of discrete types of algorithms may accurately gain on the related continuous types of algorithms, and the calculational times of discrete types of algorithms are obviously less than the continuous types of algorithms, this may offer the possible meaning for designing and applying T2 FLSs.
Hinweise
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Introduction
As is known to all, the computational complexities of general T2 FLSs [1] are much higher than IT2 FLSs. Recently, as the alpha-planes representations of GT2 fuzzy sets (FSs [2‐6]) were put forward by few study groups, the calculated amount of GT2 FLSs can be significantly decreased. As the secondary membership grades of interval T2 FSs are equal to one, they can only measure the uncertainty of membership function (MF) in a unified manner. For GT2 FSs, whose secondary membership grades lie between zero and one, therefore, they can measure the uncertainty of MF in a non-uniform way. In other words, GT2 FSs may be considered as more advanced uncertainty models than IT2 FSs. As the design degrees of freedom increase, general T2 FLSs [7‐11] have the latent capacity to overmatch IT2 FLSs on dealing with more complex uncertainty environments.
In general, T2 FLSs are made up of five blocks as: fuzzifier, fuzzy rules, fuzzy inference, TR and defuzzification. Among which, the type-reduction acts as translating the type-2 FS to the type-1 FS. Then, the module of defuzzification transforms the T1 FS to a output. The centroid type-reduction [12‐14] is the most prevalent study method. In the early days, the iterative Karnik–Mendel (KM) algorithms [15] were opened up to perform the TR of interval T2 FLSs. Then, the continuous type of Karnik–Mendel (CKM) algorithms [16, 17] were put forward; moreover, the monotone property and super-convergence nature of them were also proved. Usually, it requires two to six iteration steps for each KM algorithm. For the sake of improving the computational cost, many other iterative algorithms are put forward gradually, they are enhanced Karnik–Mendel (EKM) algorithms [18], weighted based EKM algorithms [5, 19], enhanced opposite direction searching (EODS) algorithms [20‐22] and so on. The other kinds of noniterative algorithms which achieve the output of systems directly were also put forward, they are Uncertainty Boundary (UB) algorithms [23], Coupland and John algorithms [24], Nagar and Bardini algorithms [13, 25], Nie and Tan algorithms [26, 27], Begian and Melek and Mendel algorithms [28, 29] and so forth. Interval T2 FLSs on account of NB algorithms have excellent shows over the impact of uncertainty [30‐32]. Most recent theoretical researches about calculating the centroids of IT2 FSs show that the continuous type of NT algorithms are actually an accurate TR method. Furthermore, interval T2 FLSs on the basis of Begian–Melek–Mendel algorithms have advantages on both stability and robustness compared with the T1 FLSs. All these jobs have established foundations for investigating the noniterative algorithms for completing the centroid TR for general T2 FLSs.
Anzeige
The paper analyzes the sum and integral operations in the corresponding discrete and continuous algorithms. In addition, the Nagar and Bardini (NB) and Nie and Tan (NT) algorithms are demonstrated to be two specific circumstances of Begian–Melek–Mendel algorithms. For the GT2 FLSs on the basis of the alpha-planes expression of GT2 FSs, we provide the inference, type-reduction and defuzzification according to these three types of noniterative algorithms. Then, four simulation experiments are adopted to illustrate that while increasing the sampled number of primary variable, the computational results of discrete type of noniterative algorithms may accurately gain on the corresponding continuous type of noniterative algorithms.
The rest of the paper is arranged as the following. The next section provides the background knowledge of GT2 FLSs. Then, the third section gives the three kinds of noniterative NB, NT and BMM algorithms, and how to expand them three to complete the type-reduction of GT2 FLSs. According to the simulation instances, the fourth section illustrates and analyzes the computation results. Finally, the last section is the conclusion.
GT2 FLSs
From the viewpoint of inference [1, 33, 34], general T2 FLSs can be categorized into both the Mamdani type [9, 12, 35] and Takagi and Sugeno and Kang type [8, 36‐38]. Take into account a Mamdani general T2 FLS which has m inputs \(x_{1} \in X_{1} ,x_{2} \in X_{2} , \cdots x_{m} \in X_{m}\), and a single output \(y \in Y\), and the system is described by M rules, in which the sth rule can be as
in which \(\tilde{E}_{i}^{s} (i = 1, \ldots ,n;\;s = 1,2, \ldots ,M)\) represents the antecedent GT2 fuzzy set, and \(\tilde{H}^{s} (s = 1,2, \ldots ,M)\) denotes the consequent GT2 fuzzy set.
For the sake of simplifying the expressions, singleton fuzzifier is used, i.e., when \(x_{i} = x^{\prime}_{i}\), let the vertical slice (secondary MF) \(\tilde{E}_{i}^{s} (x^{\prime}_{i} )\) of \(\tilde{E}_{i}^{s}\) be activated, then the \(\alpha\)-cut decomposition should be
To get the firing rule \(\alpha\)-plane \(\tilde{A}_{\alpha }^{s}\), for each rule, combing the fired interval with its relevant consequent \(\alpha\)-plane, that is to say,
in which \(\vee\) represents the maximum operation.
Then, the \(Y_{C,\alpha } (x^{\prime})\) at the corresponding \(\alpha\)-level should be acquired by obtaining the centroid of \(\tilde{B}_{\alpha }\), that is to say,
in which the \(l_{{\tilde{A}_{\alpha } }} (x^{\prime})\) and \(r_{{\tilde{A}_{\alpha } }} (x^{\prime})\) may be computed by different types of TR algorithms [5, 6, 12‐27] as
In practical computations, let the number of effective \(\alpha\)-planes be p, that is to say, the value of \(\alpha\) is usually equally decomposed into \(\alpha = \alpha_{1} ,\alpha_{2} , \ldots ,\alpha_{p}\), thus, the crisp output of GT2 FLSs [39‐42] should be
Three types of discrete noniterative algorithms are provided here for investigating the centroid type-reduction for GT2 FLSs.
Nagar–Bardini noniterative algorithms
The closed form of NB algorithms [25] based IT2 FLSs were shown to own distinguish advantages to cope with far-ranging of uncertainty. According to the inference, let the output be the GT2 fuzzy set \(\tilde{A}\). Let the \(\tilde{A}\) be evenly discretized to \(n\) points, then the \(l_{{\tilde{A}_{\alpha } }}\) and \(r_{{\tilde{A}_{\alpha } }}\) can be calculated as
Then, the type-reduced sets and defuzzified ouputs can be obtained in terms of Eqs. (10) and (11). Here, both the discrete NB algorithms and continuous NB algorithms calculate the output as the linear combination of 2 special type-1 FLSs: one relies the upper MFs, while the other depends on the lower MFs.
Nie–Tan noniterative algorithms
The discrete NT algorithms compute the defuzzified output of GT2 FS at the corresponding \(\alpha\)-level as
Most recent studies show that the CNT algorithms [26] are in reality an accurate TR approach. Here, the statements and explanations are provided as follows.
Theorem 1
[17]. The random sampling methods (algorithms) should obtain the precise centroid type-reduction of GT2 FLSs as the sampled number is infinity.
Proof.
According to the inference [43], suppose that \(R_{{\tilde{A}_{\alpha } }}\) be the output interval type-2 FS (under \(\alpha\)-level). Furthermore, along the y-axis, let the vertical slices number be m, and along the u-axis, l denotes the horizontal slices number, therefore, the embedded T1 fuzzy sets number is \(l^{m}\).
Let \(\overline{\mu }_{{R_{{\tilde{A}_{\alpha } }} }} (y)\), and \(\underline{\mu }_{{R_{{\tilde{A}_{\alpha } }} }} (y)\) be the upper bound and lower bound of FOU for \(R_{{\tilde{A}_{\alpha } }}\). Here, select M embedded type-1 fuzzy sets randomly for \(R_{{\tilde{A}_{\alpha } }}\), and suppose that \(\mu_{i} (y)\;(i = 1,2, \ldots ,M)\) be the ith embedded FS. Aggregating all M embedded fuzzy sets, therefore,
As \(u_{i} (y_{j} )\) is a random number on \([\underline{u}_{i} (y_{j} ),\overline{u}_{i} (y_{j} )]\), therefore, the right side of Eq. (19) can be rewritten as
For Eq. (20), it is sampled randomly as \(M \to \infty\) for the left, and the right is the aggregation. Attention that \(l/M\) is only a constant, therefore, it has nothing relations to the calculations of the centroid.
As for the continuous type interval type-2 FS \(R_{{\tilde{A}_{\alpha } }}\), just replace the \(\sum\nolimits_{j = 1}^{m} {}\) and \(\sum\nolimits_{k = 1}^{l} {}\) with the \(\int_{{y_{\min } }}^{{y_{\max } }} {}\) and \(\int_{{\underline{u} (y)}}^{{\overline{u}(y)}} {}\) will work. Therefore,
For the interval type-2 FS \(R_{{\tilde{A}_{\alpha } }}\), choose M embedded FSs. Suppose that \(\mu_{i} (y)\) be the membership function for the ith embedded fuzzy set. Due to \(y_{j}\) is a vertical slice randomly selected, therefore, \(\mu_{i} (y)\) could be expressed as: \(u_{i} (y_{j} ) = \underline{u} (y_{j} ) + \varphi_{i} [\overline{u} (y_{j} ) - \underline{u} (y_{j} )]\), in which the random number \(\varphi_{i}\) is equally distributed on the interval [0, 1]. Therefore,
According to Eq. (27) and theorem 1, \(u^{ * } (y) = [\underline{u} (y) + \overline{u}(y)]/2\) will be the membership function of representative embedded FS. Furthermore, this will be used to compute an accurate centroid of \(R_{{\tilde{A}_{\alpha } }}\). When \(R_{{\tilde{A}_{\alpha } }}\) is the continuous type, simply substitute the \(\sum\nolimits_{i = 1}^{M} {}\) by the \(\int_{{y_{\min } }}^{{y_{\max } }} {}\) for the proofs. Therefore, the continuous NT algorithms are actually equal to the exhaustive type-reduction algorithms, and this can be extended to perform the accurate type-reduction.
Begian–Melek–Mendel noniterative algorithms
The discrete BMM algorithms compute the output straightly, and the output of GT2 FS can be obtained as
In fact, the discrete BMM algorithms [14, 28, 29] can be considered as the more general form of discrete NB algorithms and NT algorithms. Then, the explanations are given as follows. Observe Eqs. (12), (13) and (29), it should be found that the NB algorithms and BMM algorithms are completely the same when \(a = a_{NB} = \frac{1}{2}\), and \(b = b_{NB} = \frac{1}{2}\). As for the NT algorithms, transforming Eq. (16) to
Observing Eqs. (29) and (31), as \(a = a_{NT}\) and \(b = b_{NT}\), we obtain that the NT algorithms and BMM algorithms will be the same.
Finally, the inner connections between the discrete and continuous algorithms for completing the centroid TR of GT2 FLSs should be as:
(1)
The discrete noniterative algorithms compute the centroids by means of the sum operation for the sampled points \(y_{i} (i = 1, \ldots ,n)\). In addition, the continuous noniterative algorithms compute in terms of the integral. In theory, the computational results of discrete noniterative algorithms can gain on the continuous noniterative algorithms while the number of samples approaches infinity.
(2)
For the discrete noniterative algorithms, the more precise calculation effects can be acquired by adding the number of samples.
(3)
Three discrete types of noniterative algorithms complete the numerical computations by means of the sum operation, while the continuous types of algorithms complete the calculations based on the integral.
Simulations
Four cases are given here. Suppose that the footprint of uncertainties (FOUs) and the related vertical slices (or secondary membership functions) of output GT2 FS be known according to the inference engine of GT2 FLSs. Here, four commonly used GT2 FSs are selected for studying. In case 1, the FOU is made up of the piecewise defined linear functions [2, 3, 5, 6, 19], while the related secondary MF is selected as the trapezoidal type membership function. In the second case, the FOU is made up of the linear functions and Gaussian functions [13‐16, 26‐29, 33], and the corresponding secondary membership functions is still selected as the trapezoidal type membership function. In case 3, the FOU is composed of the Gaussian type functions [2, 3, 5, 6, 19], while the corresponding secondary membership function is selected as the triangular type membership function. In the last case, the FOU is only a Gaussian primary membership function with uncertain standard deviations [13‐16, 26‐29, 33], and the corresponding secondary membership functions is the triangular type membership function. In experiments, the \(\alpha\) is equally divided into values as: \(\alpha = 0,1/\Delta , \cdots ,1\). Here, we let \(\Delta\) vary from one to a hundred with a step size of one. Figure 1 and Table 1 give the FOUs of all cases. In addition, Fig. 2 and Table 2 provide the related secondary membership functions.
Table 1
Membership function expressions for FOUs
Num
Expressions
1
\(\underline{u}_{{\tilde{A}_{1} }} (x) = \max \left\{ {\left[ \begin{gathered} \frac{x - 1}{6}, \, x \in [1,4] \hfill \\ \frac{7 - x}{6}, \, x \in (4,7] \hfill \\ 0,{\text{ or else}} \hfill \\ \end{gathered} \right],\left[ \begin{gathered} \frac{x - 3}{6}, \, x \in [3,5] \hfill \\ \frac{8 - x}{9}, \, x \in (5,8] \hfill \\ 0,{\text{ or else}} \hfill \\ \end{gathered} \right]} \right\}\)
Consider the continuous noniterative algorithms as benchmark to calculate both the type-reduced sets for \(\Delta = 100\), and the defuzzified outputs for \(\Delta\)(Delta) ranging from one to a hundred with the step size of 1, and they are shown by Figs. 3 and 4, respectively. For the CBMM algorithms, here we choose the average of results of 20 random experiments for the adjustable coefficient a of CBMM algorithms, and another coefficient \(b = 1 - a\).
×
×
Then, the computational accuracies between continuous noniterative algorithms and sampling-based noniterative algorithms in relation with the number of samples are studied. Here, the number of samples are chosen as 20, 50, 100, 200 and 2000 (only in last three examples).
Here, the absolute errors between three kinds of continuous noniterative algorithms and sampling-based discrete noniterative algorithms for calculating type-reduced sets and defuzzified outputs are provided in Figs. 5, 6, 7, 8, 9, 10.
×
×
×
×
×
×
Next, the quantitative studies for the mean of absolute errors are performed. Then, Tables 3, 4, 5 provide the means of absolute errors for type-reduced sets between the continuous noniterative algorithms and sampling-based discrete noniterative algorithms. Furthermore, the means of absolute errors for centroid defuzzified values are given in Tables 6, 7, 8.
Table 3
Average of absolute errors of type-reduced sets between continuous NB algorithms and sampling-based NB algorithms
Num
Approach
NB20
NB50
NB100
NB200
NB2000
NB8000
NB19000
1
0.0009
0.0001
0
0
–
–
–
2
0.0501
0.0204
0.0101
0.0050
0.0005
0.0001
0
3
0.0173
0.0073
0.0037
0.0018
0.0002
0
–
4
0
0
0
0
0
–
–
Bold represents the smallest value of time
Table 4
Average of absolute errors of type-reduced sets between continuous NT algorithms and sampling-based NT algorithms
Num
Approach
NT20
NT50
NT100
NT200
NT2000
NT8000
NT19000
1
0.0008
0.0001
0
0
–
–
–
2
0.0819
0.0334
0.0165
0.0082
0.0008
0.0002
0
3
0.0199
0.0084
0.0042
0.0021
0.0002
0.0001
0
4
0
0
0
0
0
–
–
Bold represents the smallest value of time
Table 5
Average of absolute errors of type-reduced sets between continuous BMM algorithms and sampling-based BMM algorithms
Num
Method
BMM20
BMM50
BMM100
BMM200
BMM2000
BMM8000
BMM19,000
1
0.0009
0.0001
0
0
–
–
–
2
0.0469
0.0191
0.0095
0.0047
0.0005
0.0001
0
3
0.0172
0.0073
0.0036
0.0018
0.0002
0
–
4
0
0
0
0
0
–
–
Bold represents the smallest value of time
Table 6
Average of absolute errors of defuzzified outputs between continuous NB algorithms and sampling-based NB algorithms
Num
Approach
NB20
NB50
NB100
NB200
NB2000
NB8000
NB19000
1
0.0009
0.0001
0
0
–
–
–
2
0.0482
0.0196
0.0097
0.0048
0.0005
0.0001
0
3
0.0173
0.0073
0.0037
0.0018
0.0002
0
–
4
0
0
0
0
0
–
–
Bold represents the smallest value of time
Table 7
Average of absolute errors for defuzzified outputs between continuous NT algorithms and sampling-based NT algorithms
Num
Approach
NT20
NT50
NT100
NT200
NT2000
NT8000
NT19000
1
0.0008
0.0001
0
0
–
–
–
2
0.0768
0.0313
0.0155
0.0077
0.0008
0.0002
0
3
0.0186
0.0078
0.0039
0.0020
0.0002
0.0001
0
4
0
0
0
0
0
–
–
Bold represents the smallest value of time
Table 8
Average of absolute errors of defuzzified outputs between continuous BMM algorithms and sampling-based BMM algorithms
Num
Method
BMM20
BMM 50
BMM 100
BMM 200
BMM 2000
BMM 8000
BMM 19,000
1
0.0010
0.0001
0
0
–
–
–
2
0.0451
0.0184
0.0091
0.0045
0.0005
0.0001
0
3
0.0172
0.0073
0.0036
0.0018
0.0002
0
–
4
0
0
0
0
0
–
–
Bold represents the smallest value of time
Next, we investigate the unrepeatable calculation times for the continuous noniterative algorithms and their corresponding sampling-based discrete noniterative algorithms. Computer programs are completed with the software of Matlab 2013a. Here, we use the hardware platform as a double core CPU dell desktop.
Then, Tables 9, 10, 11, 12, 13, 14 provide the total computation times of noniterative algorithms for calculating the type-reduced sets and defuzzified values, respectively, where the time unit is the second(s). See from Figs. 5, 6, 7, 8, 9, 10 and Tables 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, the conclusions can be made as:
(1)
For calculating both the centroid type-reduced sets and defuzzified values, as the number of samples increases, the results of sampling-based noniterative algorithms will all be more and more close to their corresponding continuous type of noniterative algorithms.
(2)
In both examples 1 and 4, as the number of sampling is 100, the computational results of discrete type of noniterative algorithms will be the same as their related continuous type of noniterative algorithms (see Figs. 5a–10a, and Figs. 5d–10d); while for the middle two cases, the number of samples must be added to 19,000 to let the computational results of discrete type of noniterative algorithms be the same as their related continuous type of noniterative algorithms (see Figs. 5b–10b, and Figs. 5c–10c).
(3)
While calculating average of absolute errors for type-reduced sets and defuzzified values, the discrete type of noniterative algorithms could better gain on their related continuous type of noniterative algorithms as the samples is chosen as 19,000 (see Tables 3, 4, 5, 6, 7, 8).
(4)
For calculating the type-reduced sets and defuzzified values, the specific computational times of discrete noniterative algorithms are less than their corresponding continuous counterparts. Among them, the discrete type of noniterative algorithms which have the maximum number of samples take the longest computation times. Despite so, for the discrete type of noniterative algorithms which have the maximum number of samples, they only have about 0.6244%, 0.5208%, 0.7708%, and 0.6617%, 0.5635%, 0.6875% of their continuous counterparts, respectively (see Tables 9, 10, 11, 12, 13, 14).
(5)
According to the items (1)–(4), it is obviously that the proposed sampling-based noniterative algorithms could be outstanding approximation approaches for their related continuous counterparts. Furthermore, the efficiencies of formers are distinctly higher than the continuous counterparts.
Table 9
Calculational times comparisons of the continuous NB and sampling-based NB algorithms for calculating type-reduced sets
Num
Approach
CNB
NB20
NB50
NB100
NB200
NB2000
NB8000
NB19000
1
2.1082
0.0020
0.0021
0.0022
0.0022
–
–
–
2
4.2118
0.0020
0.0020
0.0020
0.0021
0.0048
0.0122
0.0263
3
6.4697
0.0020
0.0020
0.0021
0.0023
0.0047
0.0122
–
4
6.1196
0.0021
0.0022
0.0021
0.0022
0.0052
–
–
Bold represents the smallest value of time
Table 10
Calculational times comparisons of the continuous NT and sampling-based NT algorithms for computing type-reduced sets
Num
Approach
CNT
NT20
NT50
NT100
NT200
NT2000
NT8000
NT19000
1
2.1566
0.0014
0.0014
0.0014
0.0016
–
–
–
2
4.2617
0.0016
0.0013
0.0013
0.0016
0.0036
0.0101
0.0225
3
6.5545
0.0013
0.0013
0.0014
0.0016
0.0037
0.0111
–
4
6.1673
0.0013
0.0013
0.0013
0.0015
0.0041
–
–
Bold represents the smallest value of time
Table 11
Calculational times of the continuous BMM and sampling-based BMM algorithms for centroid type-reduced sets
Num
Approach
CBMM
BMM20
BMM 50
BMM 100
BMM 200
BMM 2000
BMM 8000
BMM 19,000
1
2.1007
0.0020
0.0019
0.0020
0.0021
–
–
–
2
4.2813
0.0019
0.0019
0.0020
0.0021
0.0051
0.0124
0.0330
3
6.4177
0.0019
0.0019
0.0021
0.0021
0.0048
0.0120
–
4
6.1271
0.0020
0.0019
0.0020
0.0021
0.0056
–
–
Bold represents the smallest value of time
Table 12
Computational times comparisons of the CNB and sampling-based NB algorithms for computing defuzzified values
Num
Approach
CNB
NB20
NB50
NB100
NB200
NB2000
NB8000
NB19000
1
103.5734
0.1035
0.1054
0.1102
0.1178
–
–
–
2
210.5994
0.1015
0.1069
0.1136
0.1174
0.2606
0.6674
1.3936
3
320.0638
0.1003
0.1074
0.1111
0.1168
0.2382
0.6500
–
4
304.9396
0.1014
0.1029
0.1091
0.1158
0.2531
–
–
Bold represents the smallest value of time
Table 13
Computational times comparisons of the continuous NT and sampling-based NT algorithms for calculating defuzzified values
Num
Approach
CNT
NT20
NT50
NT100
NT200
NT2000
NT8000
NT19000
1
102.6065
0.0688
0.0715
0.0743
0.0785
–
–
–
2
209.0786
0.0692
0.0706
0.0746
0.0786
0.2171
0.5367
1.1781
3
323.5862
0.0691
0.0711
0.0748
0.0799
0.2013
0.5367
1.1813
4
313.8482
0.0688
0.0726
0.0752
0.0781
0.2212
–
–
Bold represents the smallest value of time
Table 14
Computational times comparisons of the continuous BMM and sampling-based BMM algorithms for calculating defuzzified values
Num
Approach
CBMM
BMM20
BMM 50
BMM 100
BMM 200
BMM 2000
BMM 8000
BMM 19,000
1
103.9631
0.1019
0.1041
0.1072
0.1141
–
–
–
2
214.4556
0.1002
0.1038
0.1076
0.1121
0.2764
0.6408
1.4744
3
364.6653
0.1020
0.1043
0.1072
0.1144
0.2490
0.7329
-–
4
310.9498
0.1024
0.1035
0.1088
0.1185
0.2621
–
–
Bold represents the smallest value of time
Conclusions and expectations
The paper compares the sum operation and integral operations in discrete and continuous algorithms on the foundation of type-2 fuzzy logic theory. As for four types of general T2 fuzzy sets with different kinds of FOUs and secondary MFs, the continuous noniterative algorithms are selected as the criterion to calculate the type-reduced sets and centroid defuzzified outputs. Simulation instances are given to show the shows of proposed sampling-based discrete noniterative type of algorithms. As the number of samples is selected suitably, the proposed sampling-based noniterative type of algorithms can approach to the corresponding continuous counterparts exactly. In addition, the efficiencies of formers are significantly higher.
In the next, the author will investigate the initialization, searching space and stopping conditions of iterative algorithms for completing the center-of-sets (COS) type-reduction [2, 6, 13‐15, 19‐29, 33, 44‐46] of T2 FLSs. Furthermore, design and application of IT2 FLSs and GT2 FLSs on the basis of swarm intelligence algorithms [8, 9, 11, 35, 37, 38, 47‐52] will be investigated. Future studies will be focused on the theory [39‐42, 53‐56] of type-2 FLSs and their related algorithms.
Acknowledgements
The paper is sponsored by the National Natural Science Foundation of China (No. 61973146, and No. 61773188), the Youth Fund of Education Department of Liaoning Province (No. LJKQZ2021143), the Doctoral Start-up Foundation of Liaoning Province (No. 2021-BS-258), and the Talent Fund Project of Liaoning University of Technology (No. xr2020002). The author is very grateful for the editors of this Journal.
Declarations
Conflict of interest
No conflict exists. The authors declare that they have no conflict of interest.
Open AccessThis article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.