Next Article in Journal
An Efficient Algorithm for the Separable Nonlinear Least Squares Problem
Next Article in Special Issue
Design of an Optimized Fuzzy Classifier for the Diagnosis of Blood Pressure with a New Computational Method for Expert Rule Optimization
Previous Article in Journal
A Genetic Algorithm Using Triplet Nucleotide Encoding and DNA Reproduction Operations for Unconstrained Optimization Problems
Previous Article in Special Issue
An Easily Understandable Grey Wolf Optimizer and Its Application to Fuzzy Controller Tuning
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

New Methodology to Approximate Type-Reduction Based on a Continuous Root-Finding Karnik Mendel Algorithm

by
Emanuel Ontiveros-Robles
,
Patricia Melin
and
Oscar Castillo
*
Tijuana Institute of Technology, 22414 Tijuana, Mexico
*
Author to whom correspondence should be addressed.
Algorithms 2017, 10(3), 77; https://doi.org/10.3390/a10030077
Submission received: 30 May 2017 / Revised: 29 June 2017 / Accepted: 1 July 2017 / Published: 5 July 2017
(This article belongs to the Special Issue Extensions to Type-1 Fuzzy Logic: Theory, Algorithms and Applications)

Abstract

:
Interval Type-2 fuzzy systems allow the possibility of considering uncertainty in models based on fuzzy systems, and enable an increase of robustness in solutions to applications, but also increase the complexity of the fuzzy system design. Several attempts have been previously proposed to reduce the computational cost of the type-reduction stage, as this process requires a lot of computing time because it is basically a numerical approximation based on sampling, and the computational cost is proportional to the number of samples, but also the error is inversely proportional to the number of samples. Several works have focused on reducing the computational cost of type-reduction by developing strategies to reduce the number of operations. The first type-reduction method was proposed by Karnik and Mendel (KM), and then was followed by its enhanced version called EKM. Then continuous versions were called CKM and CEKM, and there were variations of this and also other types of variations that eliminate the type-reduction process reducing the computational cost to a Type-1 defuzzification, such as the Nie-Tan versions and similar enhancements. In this work we analyzed and proposed a variant of CEKM by viewing this process as solving a root-finding problem, in this way taking advantage of existing numerical methods to solve the type-reduction problem, the main objective being eliminating the type-reduction process and also providing a continuous solution of the defuzzification.

1. Introduction

Nowadays, Type-1 and Type-2 fuzzy logic have demonstrated many advantages with respect to classical modeling methods, for example, their robustness, and design without a plant mathematical model. These advantages allow a relatively easy implementation in specific applications, for example, [1,2] provide a review of control applications, [3] is an overview of pattern recognition and classification, [4,5,6] details hardware implementations of fuzzy systems, image processing [7], and many other applications as mentioned in [8]. However, the implementation of these algorithms usually requires a higher computational cost with respect to their classical counter parts.
The computational cost of Interval Type-2 fuzzy logic was increased with respect to Type-1 fuzzy logic, of course achieving better results, but at the expense of having a higher computational cost. The implementation of Interval Type-2 fuzzy inference systems (FISs) requires around double the computational cost than Type-1 fuzzy inference systems, but could be even higher because the complexity of the centroid calculation increases in IT2 FISs, and the process to obtain the centroid of IT2 FIS is called type-reduction [9].
The original type-reduction method was proposed by Karnik and Mendel in [10] and was called the Karnik-Mendel Algorithm (KM), and based on this method many variations have emerged, like the Enhanced Karnik-Mendel (EKM) [11], Continuous Karnik-Mendel (CKM), and Continuous Enhanced Karnik-Mendel (CEKM). These variations of the KM type reductions were proposed in order to reduce the type-reduction computational cost; and this is because in an IT2 FIS the process that requires the highest computational cost is in fact the type reduction.
The goal of decreasing the type-reduction computational cost have been considered by several researchers, for example, in [12] the need for sorting is eliminated, in [13] a linear approximation of KM type reduction was realized, in [14] a polynomial regression for type reduction is realized, [15] introduces the Nie-Tan type reduction as an alternative to reduce the computational cost of this process by eliminating the type-reduction process, and [16] provides an study of several type-reduction alternatives focused on computational cost reduction.
The contribution of the present work is a proposed new CEKM type-reduction approximation and also providing a methodology for its implementation. This method is based on CEKM as root-finding problem, which was proposed by Liu and Mendel in [17]. This method for type reduction is based on two proposed equations that allow approximation of the output points through numerical methods, like Newton Raphson [18]. The objective is to provide a solution of type-reduction/defuzzification problem that eliminates the iterations and sampling requirements. In addition, we compare this approximation method with respect to the classical type-reductions approaches and propose in which context is recommendable to use our approach.
The organization of the present work is as follows: Section 2 introduces the concepts of Interval Type-2 fuzzy inference systems, then Section 3 is focused on the type-reduction process, Section 4 presents the fundamentals of the proposed approximation of type reduction, Section 5 introduces the proposed methodology to realize the type-reduction approximation, Section 6 and Section 7 outline two applications of our proposed methodology and their corresponding results, and finally Section 8 contains the conclusion and future work.

2. Interval Type 2 Fuzzy Inference Systems

Type-1 fuzzy logic was proposed as a vagueness model of human language [19], by considering continuous membership degrees between 0 and 1 related with concepts or attributes in order to make decisions. Now, the emergence of Interval Type-2 fuzzy logic provides not only a vagueness model but also an uncertainty model [20,21], in this way increasing the systems’ robustness and improving their performance.
Interval Type-2 fuzzy membership functions are defined by two Type-1 membership functions, called upper membership function and lower membership function, and the area between these membership functions is called the footprint of uncertainty. A graphical illustration of these concepts can be appreciated in Figure 1 and it is mathematically defined in Equation (1).
A ˜ = { ( ( x , u ) , 1 ) | x X ,   u J x [ 0 ,   1 ] }
The implementation of Interval Type-2 fuzzy logic concepts require also to extend the special T-norm and S-norm operations to the join and meet operations [22], and the fuzzy inference system is modified as illustrated in Figure 2.
The main difference resides in the defuzzification; this process is very interesting because in Type-1 fuzzy inference systems it is realized by the centroid method, but in an IT2 FIS the process for defuzzification is realized by a new process called type-reduction. This process is significantly more complex than defuzzification and is explained in Section 3.

3. Type-Reduction Algorithms

Currently, there exist different algorithms in order to obtain the centroid of the IT2 MFs [9], and the most-used type-reduction methods are inspired in the Karnik Mendel algorithm. This algorithm is summarized in Table 1.
The main goal of this algorithm is to find the critical points that define the combination of upper and lower membership functions, and these points are called the switch points.

4. Continuous Karnik-Mendel Algorithm as a Root-Finding Problem

In [17] a CKM that extends the KM type-reduction algorithm in a continuous form, as shown Equations (2) and (3), is presented.
Z ^ l = a ξ z μ ¯ ( z ) d z + ξ b z μ _ ( z ) d z a ξ μ ¯ ( z ) d z + ξ b μ _ ( z ) d z
Z ^ u = a ξ z μ _ ( z ) d z + ξ b z μ ¯ ( z ) d z a ξ μ _ ( z ) d z + ξ b μ ¯ ( z ) d z
Starting with Equations (2) and (3) is possible to express the type-reduction process as a root-finding problem [18]. In this regard, Liu and Mendel proposed Equations (4) and (5).
φ ( ξ ) = x 0 ξ ( ξ x ) μ ¯ ( x ) d x + ξ x f ( ξ x ) μ _ ( x ) d x
ψ ( ξ ) = x 0 ξ ( ξ x ) μ ¯ ( x ) d x + ξ x f ( ξ x ) μ _ ( x ) d x
Thanks to this proposal it is possible to use root-finding numerical methods, for example Newton-Raphson, and now the problem can be expressed as follows (Equations (6) and (7)).
ξ l + 1 = ξ l φ ( ξ l ) φ ( ξ l )
ξ r + 1 = ξ r ψ ( ξ r ) ψ ( ξ r )
However, the mathematical development for obtaining an analytical solution still represents a challenge for the implementation. This is because in real applications, the upper and lower membership functions for type-reduction are composed functions, which results on an inference system with many factors that add complexity to the functions.

5. Proposed CEKM Approximation and Methodology

In order to reduce the type-reduction computational cost, we propose a methodology for type-reduction approximation. First, we propose that the first iteration of the Newton Raphson method, expressed in Equations (6) and (7), is a good enough type-reduction approximation and this can be expressed in Equations (8) and (9).
ξ l ξ l 0 φ ( ξ l 0 ) φ ( ξ l 0 )
ξ r ξ r 0 ψ ( ξ r 0 ) ψ ( ξ r 0 )
where ξ l 0 and ξ r 0 respectively are based on the EKM initialization explained by Liu et al. in [23], and these are expressed in Equation (10).
ξ l 0 = ( x f x o ) 2.4   + x 0 ξ r 0 = ( x f x o ) 1.7   + x 0
This type-reduction approximation proposed in Equations (14) and (15) shows several advantages with respect to classical type reduction, such as KM or EKM, and some examples of these advantages is that the approximation does not require discretization, and this is because it is an analytical solution, another advantage is that it is easy to implement in limited platforms, for example, in hardware applications.
However, this approximation is not possible without a mathematical definition of the φ ( ξ ) and ψ ( ξ ) functions, and these functions are defined by intervals. The mathematical approach for the φ ( ξ ) and ψ ( ξ ) functions is very complex because they depend on the composition operation for all consequent membership functions and rule-firing forces.
In order to outline a methodology, a mathematical development is presented that allows describing Equations (4) and (5) by using intervals.
Considering Equations (11) and (12) based on the concept of integration by parts
φ ( ξ ) = ( ξ x ) x 0 ξ μ ¯ ( x ) d x + x 0 ξ ( μ ¯ ( x ) d x ) d x + ( ξ x ) ξ x f μ _ ( x ) d x + ξ x f ( μ _ ( x ) d x ) d x
ψ ( ξ ) = ( ξ n x ) x 0 ξ μ _ ( x ) d x + x 0 ξ ( μ _ ( x ) d x ) d x + ( ξ x ) ξ x f μ ¯ ( x ) d x + ξ x f ( μ _ ( x ) d x ) d x
To simplify, we propose the A and V upper and lower functions that compose the φ ( ξ ) and ψ ( ξ ) functions expressed in Equations (11) and (12). The functions A and V are expressed in Equation (13).
A ¯ = ( ξ x ) μ ¯ ( x ) d x   ,   V ¯ =   ( μ ¯ ( x ) d x ) d x A _ = ( ξ x ) μ _ ( x ) d x   ,   V _ =   ( μ _ ( x ) d x ) d x
Now, based on the A and V functions, Equation (14) express the φ ( ξ ) and ψ ( ξ ) functions.
φ( ξ l )= i=1 b ¯ l 1 A ¯ | x 0 i x f i + A ¯ | x b ¯ l ξ l + i=1 b ¯ l 1 V ¯ | x 0 i x f i + V ¯ | x i b ¯ l ξ l + A _ | ξ l x f b _ l + i= b _ l +1 n A _ | x 0 i x f i + V _ | ξ l x f b l _ + i=1 n _ V _ | x 0 i x f i ψ( ξ r )= i=1 b _ r 1 A _ | x 0 i x f i + A _ | x b _ r ξ r + i=1 b _ r 1 V _ | x 0 i x f i + V _ | x i b _ r ξ r + A ¯ | ξ r x f b ¯ r + i= b _ r +1 n A ¯ | x 0 i x f i + V ¯ | ξ r x f b ¯ r + i=1 n ¯ V ¯ | x 0 i x f i
where ξ l and ξ r are the initial switch points, computed with Equation (10), and is necessary to identify the intervals where there points are located, and these are denoted in Equation (14) as b ¯ l , b _ l , b _ r , and b ¯ r .
Now, based on Equation (14), we propose a methodology to obtain the functions by intervals and finally be able to use Equations (8) and (9) to obtain the analytical CEKM approximation. This methodology is summarized in Table 2.
Following this proposed methodology, the final results are two equations in function of the firing force and the initial centroids, remembering that these initial centroids are static and are computed by the CEKM criteria.
The resultant equations are non-iterative and do not depend on sampling, and this is the reason of the computational cost reduction.
• Implementation restrictions.
The approximate CEKM implementation success depends on the mathematical approach to Equations (11) and (12), remembering that in an FIS, these equations will be dynamic by the variation of the system inputs.
To obtain Equations (11) and (12) it is necessary before to obtain the fuzzy set B, expressed in Equation (15), and this fuzzy set is the result of the composition operation. This means the implication of each rule-firing force with their respective output fuzzy set (Equation (16)), and the aggregation of all implications (Equation (16)).
B r ( θ r , x ) = θ r μ g ( x )
where θ r represents the rule firing force, μ g ( x ) represents the membership degree with respect to the corresponding output fuzzy set, and the implication is realized by the T-norm operation.
B ( θ r , x ) = i r ( B i ( θ i , x ) )
On the other hand, the aggregation is realized by the S-Norm operation.
The selection of the operations for implication and aggregation is very important; the most-used composition is the Mamdani implication, Max as the S-Norm, and Min as the T-Norm.
We propose to use the probor-prod composition, and this is because it is necessary to mathematically define these operations.
Figure 3 shows four different composition operations and their corresponding centroids. This Type-1 MF used for this example has three Triangular MFs. The centroids of these composition alternatives are a slightly different; however, the restriction on the proposed methodology is the use of the Probor-Prod composition, because this composition is mathematically more approachable.

6. Water Level Control in a Tank

The water level control in a tank, illustrated in Figure 4, is a classical benchmark control problem and has been considered as a study case to improve the performance of FLC controllers and to compare FLC T1 and FLC T2, and other works with this plant can be found in [24,25].
The main formulation of this plant is expressed in Equation (17).
h ( t ) = h ( 0 ) + 0 t 1 A ( q i n ( t ) q o u t ( t ) ) d t = 0 t 1 A ( q i n ( t ) a 2 g h ( t ) ) d t
The output fuzzy set contains five MFs that are distributed without intersections as illustrated in Figure 5.
• Step 1
Define the partial knowledge of the system; and this can be expressed in Equations (18)–(22).
M F 1 = θ 1 t r i m f ( z , [ 1.05 , 0.9 , 0.75 ] ) = { x + 1.05 0.15   ,   1.05 < x < 0.9 0.85 x 0.15 ,   0.9 < x < 0.75
M F 2 = θ 2 t r i m f ( z , [ 0.65 , 0.5 , 0.35 ] ) = { x + 0.65 0.15   ,   0.65 < x < 0.5 0.35 x 0.15 ,   0.5 < x < 0.35
M F 3 = θ 3 t r i m f ( z , [ 0.15 , 0 , 0.15 ] ) = { x + 0.15 0.15   ,   0.15 < x < 0 0.15 x 0.15 ,   0 < x < 0.15
M F 4 = θ 4 t r i m f ( z , [ 0.15 , 0.3 , 0.45 ] ) = { x 0.15 0.15   ,   0.15 < x < 0.3 0.45 x 0.15 ,   0.3 < x < 0.45
M F 5 = θ 5 t r i m f ( z , [ 0.8 , 0.9 , 1 ] ) = { x 0.75 0.15   ,   0.75 < x < 0.9 1.05 x 0.15 ,   0.9 < x < 1.05
• Step 2
Table 3 defines the intervals of the partial knowledge and their functions. In this case, the number of intervals is double the number of MFs because these are composed functions.
• Step 3
In this case study, step 3 is not necessary because the MFs do not have intersections.
• Step 4
Table 4 and Table 5 report the integrals of the upper and lower MFs.
• Step 5
Equation (23) expresses ξ l 0 and ξ r 0 and b l and b u
ξ l 0 = 2 2.4 1   ξ r 0 = 2 1.7 1   ξ l 0 = 0.1666   ξ r 0 = 0.176
b l is in an empty interval between 4 and 5, and b u is the 7th interval.
• Step 6
Table 6 and Table 7 contain the necessary elements to build the final equation for type reduction.
• Step 7
Using Table 3, Table 4, Table 5, Table 6 and Table 7 we applied Equations (13) and (14) to obtain Equations (24) and (25).
φ( ξ )= ( ξ 0 +0.9 ) θ 1 ( 0.05 ) 2 0.1 A ¯ 1 + ( ξ 0 +0.9 ) θ 1 ( 0.05 ) 2 0.1 A ¯ 2 + ( ξ 0 +0.5 ) θ 2 ( 0.05 ) 2 0.1 A ¯ 3          + ( ξ 0 +0.5 ) θ 2 ( 0.05 ) 2 0.1 A ¯ 4 + ( ξ 0 +0 ) θ 3 ( 0.15 ) 2 0.3 A _ 5 + ( ξ 0 +0 ) θ 3 ( 0.15 ) 2 0.3 A _ 6         + ( ξ 0 0.3 ) θ 4 ( 0.15 ) 2 0.3 A _ 7 + ( ξ 0 0.3 ) θ 4 ( 0.15 ) 2 0.3 A _ 8 + ( ξ 0 0.9 ) θ 5 ( 0.15 ) 2 0.3 A _ 9         + ( ξ 0 0.9 ) θ 5 ( 0.15 ) 2 0.3 A _ 10
ψ( ξ )= ( ξ 0 +0.9 ) θ _ 1 ( 0.05 ) 2 0.1 A _ 1 + ( ξ 0 +0.9 ) θ _ 1 ( 0.05 ) 2 0.1 A _ 2 + ( ξ 0 +0.5 ) θ _ 2 ( 0.05 ) 2 0.1 A _ 3         + ( ξ 0 +0.5 ) θ _ 2 ( 0.05 ) 2 0.1 A _ 4 + ( ξ 0 +0 ) θ _ 3 ( 0.05 ) 2 0.1 A _ 5 + ( ξ 0 +0 ) θ _ 3 ( 0.05 ) 2 0.1 A _ 6         + ( ξ 0 0.3 ) θ ¯ 4 ( 0.15 ) 2 0.3 θ 4 ( ξ 0 0.3 ) ( ξ 0 0.15 ) 2 0.3 A ¯ b l + ( ξ 0 0.3 ) θ ¯ 4 ( 0.15 ) 2 0.3 A ¯ 8         + ( ξ 0 0.9 ) θ ¯ 5 ( 0.15 ) 2 0.3 A ¯ 9 + ( ξ 0 0.9 ) θ ¯ 5 ( 0.15 ) 2 0.3 A ¯ 10
And after derivation we obtain Equations (26) and (27).
φ ( ξ ) = ( 2 θ ¯ 1 + 2 θ ¯ 2 ) ( 0.15 ) 2 0.3 + ( 2 θ _ 3 + 2 θ _ 4 + 2 θ _ 5 ) ( 0.05 ) 2 0.1
ψ ( ξ ) = ( 2 θ _ 1 + 2 θ _ 2 + 2 θ _ 3 ) ( 0.05 ) 2 0.1 +         ( θ 4 0.3 ) ( ( ξ 0 0.15 ) 2 + 2 ( ξ 0 0.3 ) ( ξ 0 0.15 ) )           + ( 2 θ 4 + 2 θ ¯ 5 ) ( 0.15 ) 2 0.3
• Experiments.
In order to evaluate the proposed approximate CEKM type reductions, in this section, the proposed method is compared based on their computational cost, reliability with respect to the original method contrasted with other alternatives to reduce computational cost, and the control performance with respect to KM type reduction.
• Control surface comparison and execution time
The control surface represents the behavior of a controller, and is because of this reason that it is a very useful way to compare the proposed type-reduction approximation with respect to a classical type reduction, and Figure 6 illustrates both control surfaces.
In Table 8, four type-reduction methods are compared by the absolute average errors with respect to a KM type reduction with ten thousand samples. The type-reduction methods that are compared are the KM, EKM, NT and the proposed approximate CEKM.
The experiments are realized by changing the number of samples of the type-reduction methods to observe their behavior in execution time and error, but remembering that the approximate CEKM type reduction is not iterative and does not requires sampling.
Figure 7 and Figure 8 illustrate the results reported 100 in Table 8, and as we can observe, the proposed approximate CEKM has the largest error (although note high), but is considerably faster.
• Performance comparison
On the other hand, we evaluate the performance of the KM algorithm with ten thousand samples.
Table 9, reports the results of the control performance and execution time in a simulation, and this performance is reported with the IAE, ITAE and RMSE control metrics.
In these experiments we can observe that the IT2 FLC with EKM TR obtains better performance results with respect to the same controller with approximated CEKM TR, however, the proposed alternative reduces the execution time of the IT2 FLC by 60%, which is good for real world problems.

7. Edge Detection

As another case study we are presenting image edge detection with IT2 fuzzy systems. Edge detection is a recent area of application with great results for IT2 fuzzy logic, and for example the works in [26,27,28].
The IT2 FIS can be used to find if a pixel is or not an edge, and is necessary to consider the pixel’s neighborhood as shown in Figure 9.
This is because the pixel’s gradient is obtained as shown in Equation (28), this strategy, using the gradients is used for example in [6] and produces a good result.
D 1 = | I 2 I 8 | D 2 = | I 4 I 6 | D 3 = | I 3 I 7 | D 4 = | I 1 I 9 |
The gradients are approximated in this case as the differences in absolute values and these are the inputs to the IT2 FIS, the values are from 0 to 255, and the fuzzy sets can be found in Figure 10.
The MFs distribution for the fuzzy sets are the same for each input, and are parameterized as proposed in [6] allowing adaptation to different contexts.
The proposed fuzzy sets are formed by two type-2 fuzzy membership functions as is shown in Figure 11.
As can be observed, the output fuzzy set is a composed function.
• Step 1
Equations (29) and (30) define the partial knowledge of the system.
μ ¯ B ( z ) = { 2 θ ¯ N ( 127 z ) ,   0 < z < 127 2 θ ¯ E ( z 127 ) ,   127 < z < 255 0 ,   o t h e r w i s e
μ _ B ( z ) = { 2 θ _ N ( 117 z ) ,   0 < z < 117 2 θ _ E ( z 117 ) ,   137 < z < 255 0 ,   o t h e r w i s e
• Step 2
Defines the output membership functions intervals, and these domains are reported in Table 10.
• Step 3
In this case, study, step 3 is not necessary because the MFs do not have intersections.
• Step 4
Table 11 and Table 12 show the integral of each interval for the output MFs.
• Step 5
Equation (31) expresses ξ l 0   and   ξ r 0 and b l and b u
ξ l 0 = 255 2.4   ξ r 0 = 255 1.7   ,   ξ l 0 = 106.25 ξ r 0 = 150
• Step 6
Table 13 and Table 14 contain the elements A and V of upper and lower partial knowledge intervals.
• Step 7
Using Table 10, Table 11, Table 12, Table 13 and Table 14 we propose the functions φ ( ξ ) and ψ ( ξ ) , and these functions are expressed in Equations (32) and (33).
φ( ξ )= ( ξ 0 ) θ ¯ N ( 127 ) 2 A ¯ b l + θ ¯ N ( ξ 0 127 ) 3 3 θ ¯ N ( 127 ) 3 3 V ¯ b l θ _ N ( 117 ξ 0 ) 3 3 V _ b l     ( ξ 0 255 ) θ _ E ( 137 ) 2 +( ξ 0 137 ) θ _ E ( 20 ) 2 A _ 2 + θ _ E ( 137 ) 3 3 θ _ E ( 20 ) 3 3 V _ 2
ψ( ξ )= ( ξ 0 ) θ _ N ( 117 ) 2 A _ 1 θ _ N ( 117 ) 3 3 V _ 1 ( ξ 0 137 ) θ _ E ( 20 ) 2 A _ b l + θ _ E ( ξ 0 117 ) 3 3 θ _ E ( 20 ) 3 3 V _ b l     + ( ξ 0 255 ) θ ¯ E ( 128 ) 2 A ¯ b r + θ ¯ E ( 128 ) 3 3 θ ¯ E ( ξ 0 127 ) 3 3 V ¯ b r
And Equations (34) and (35) express the derivatives of these functions.
( φ ( ξ ) ) ξ = θ ¯ N ( 127 ) 2 + θ ¯ N ( ξ 0 127 ) 2 + θ _ N ( 117 ξ 0 ) 2 - θ _ E ( 137 ) 2 + θ _ E ( 20 ) 2
( ψ ( ξ ) ) ξ = θ _ N ( 117 ) 2 + θ _ E ( 20 ) 2 + θ _ E ( ξ 0 117 ) 2 + θ ¯ E ( 128 ) 2 θ ¯ E ( ξ 0 127 ) 2
Finally, we can define the approximate system outputs, and these equations are functions of the firing forces, and this eliminates the need to discretize and realize an iterative type reduction.
• Experiments
To evaluate the approximate CEKM Type Reduction, it is proposed to realize the edge detection based on the image illustrated in Figure 12, where the original image can be found and the corresponding obtained edges.
It is proposed to add Gaussian noise to the original image to test the performance of IT2 FLC in noisy environments, which in this case is a Gaussian noise with a variance of 0.1, and the illustration of these image plus noise can be appreciated in Figure 13.
Table 15 reports the results obtained by the edge detection of the image illustrated in Figure 13, the results are presented with a widely accepted performance metric known as Figure of Merit of Pratt (FOM) [29], and are compared with respect to the classical KM type reduction with ten thousand samples.
The FOM of both edge detectors is very similar, the percentage of equal pixels is 93.93%, however, the main results are in the execution time, with a reduction of 45% in the execution time and a competitive performance, and in this form the approximate CEKM Type Reduction shows an improvement with respect to EKM Type Reduction.
In order to compare the proposed approximate type reduction with respect to other improved type-reduction algorithms, these algorithms are also considered as alternatives to reduce the execution time of the process. The results are reported on Table 16. Figure 14 and Figure 15 illustrate, in a graphical way, the results reported on Table 16.

8. Conclusions

As a conclusion we have evaluated the proposed approximate CEKM type-reduction method with respect to the classical type-reduction algorithms and we can summarize the advantages and disadvantages in Table 17.
The proposed approximation is faster than other approximations, such as the NT Method. This is because it provides a continuous approximation of the output, which means that it not only eliminates the type-reduction process, but also reduces the defuzzification method to a polynomial, and on the other hand presents slightly higher error with respect to the theoretical model and other approximations. Based on the presented comparison we can state that the proposed algorithm is not recommended for:
  • Applications where the error is a critical requirement.
  • Applications that require adapting the IT2 FIS online.
We recommend the implementation of this approximate CEKM type-reduction algorithm in:
  • Applications that require a high processing rate.
  • Image processing applications that need calculation in real problems.
  • Hardware implemented applications.
  • Applications that execute the IT2 FIS as sub process.
Some examples of applications where the proposed approximation recommended is the use of fuzzy systems to make the parameters to be adaptive for a metaheuristic algorithm to optimize systems or mathematical functions [30,31,32,33,34]. This is because if, for example, the optimization takes one month, with the proposed approximation we can realize the same task in about two weeks, allowing to accelerate achieving the results of the research.

Acknowledgments

We would like to express our gratitude to CONACYT, Tijuana Institute of Technology for the facilities and resources granted for the development of this research.

Author Contributions

Oscar Castillo and Patricia Melin contributed to the discussion and analysis of the results; Emanuel Ontiveros-Robles proposed the approximation and methodology exposed in the present work, contributed to the simulations and wrote the paper.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Castillo, O.; Melin, P. A review on the design and optimization of interval type-2 fuzzy controllers. Appl. Soft Comput. 2012, 12, 1267–1278. [Google Scholar] [CrossRef]
  2. Castillo, O.; Melin, P. A review on interval type-2 fuzzy logic applications in intelligent control. Inf. Sci. 2014, 279, 615–631. [Google Scholar] [CrossRef]
  3. Melin, P.; Castillo, O. A review on the applications of type-2 fuzzy logic in classification and pattern recognition. Expert Syst. Appl. 2013, 40, 5413–5423. [Google Scholar] [CrossRef]
  4. Sepúlveda, R.; Montiel, O.; Castillo, O.; Melin, P. Embedding a high speed interval type-2 fuzzy controller for a real plant into an FPGA. Appl. Soft Comput. 2012, 12, 988–998. [Google Scholar] [CrossRef]
  5. Maldonado, Y.; Castillo, O.; Melin, P. A multi-objective optimization of type-2 fuzzy control speed in FPGAs. Appl. Soft Comput. 2014, 24, 1164–1174. [Google Scholar] [CrossRef]
  6. Ontiveros-Robles, E.; Vázquez, J.G.; Castro, J.R.; Castillo, O. A FPGA-Based Hardware Architecture Approach for Real-Time Fuzzy Edge Detection. In Nature-Inspired Design of Hybrid Intelligent Systems; Melin, P., Castillo, O., Kacprzyk, J., Eds.; Springer: Berlin/Heidelberg, Germany, 2017; pp. 519–540. [Google Scholar]
  7. Melin, P. Image Processing and Pattern Recognition with Interval Type-2 Fuzzy Inference Systems. In Frontiers of Higher Order Fuzzy Sets; Sadeghian, A., Tahayori, H., Eds.; Springer: New York, NY, USA, 2015; pp. 217–228. [Google Scholar]
  8. Castillo, O.; Melin, P. Interval Type-2 Fuzzy Logic Applications. In Human-Centric Information Processing through Granular Modelling; Bargiela, A., Pedrycz, W., Eds.; Springer: Berlin/Heidelberg, Germany, 2009; pp. 203–231. [Google Scholar]
  9. Torshizi, A.D.; Zarandi, M.H.F.; Zakeri, H. On type-reduction of type-2 fuzzy sets: A review. Appl. Soft Comput. 2015, 27, 614–627. [Google Scholar] [CrossRef]
  10. Karnik, N.N.; Mendel, J.M. Type-2 fuzzy logic systems: type-reduction. In Proceedings of the 1998 IEEE International Conference on Systems, Man, and Cybernetics, San Diego, CA, USA, 11–14 October 1998; Volume 2, pp. 2046–2051. [Google Scholar]
  11. Wu, D.; Mendel, J.M. Enhanced Karnik-Mendel Algorithms for Interval Type-2 Fuzzy Sets and Systems. In Proceedings of the Annual Meeting of the North American Fuzzy Information Processing Society, San Diego, CA, USA, 24–27 June 2007; pp. 184–189. [Google Scholar]
  12. Khanesar, M.A.; Jalalian, A.; Kaynak, O.; Gao, H. Improving the Speed of Center of Set Type-Reduction in Interval Type-2 Fuzzy Systems by Eliminating the Need for Sorting. IEEE Trans. Fuzzy Syst. 2016. [Google Scholar] [CrossRef]
  13. Salaken, S.M.; Khosravi, A.; Nahavandi, S.; Wu, D. Linear approximation of Karnik-Mendel type reduction algorithm. In Proceedings of the IEEE International Conference on Fuzzy Systems, Istanbul, Turkey, 2–5 August 2015; pp. 1–6. [Google Scholar]
  14. Salaken, S.M.; Khosravi, A.; Nahavandi, S.; Wu, D. Switch point finding using polynomial regression for fuzzy type reduction algorithms. In Proceedings of the IEEE International Conference on Fuzzy Systems, Istanbul, Turkey, 2–5 August 2015; pp. 1–6. [Google Scholar]
  15. Nie, M.; Tan, W.W. Towards an efficient type-reduction method for interval type-2 fuzzy logic systems. In Proceedings of the IEEE International Conference on Fuzzy Systems (IEEE World Congress on Computational Intelligence), Hong Kong, China, 1–6 June 2008; pp. 1425–1432. [Google Scholar]
  16. Wu, D. An overview of alternative type-reduction approaches for reducing the computational cost of interval type-2 fuzzy logic controllers. In Proceedings of the IEEE International Conference on Fuzzy Systems, Brisbane, Australia, 10–15 June 2012; pp. 1–8. [Google Scholar]
  17. Mendel, J.M.; Liu, X. Simplified Interval Type-2 Fuzzy Logic Systems. IEEE Trans. Fuzzy Syst. 2013, 21, 1056–1069. [Google Scholar] [CrossRef]
  18. Liu, X.; Mendel, J.M. Connect Karnik-Mendel Algorithms to Root-Finding for Computing the Centroid of an Interval Type-2 Fuzzy Set. IEEE Trans. Fuzzy Syst. 2011, 19, 652–665. [Google Scholar]
  19. Zadeh, L.A. Fuzzy logic = computing with words. IEEE Trans. Fuzzy Syst. 1996, 4, 103–111. [Google Scholar] [CrossRef]
  20. Mendel, J.M.; John, R.I.B. Type-2 fuzzy sets made simple. IEEE Trans. Fuzzy Syst. 2002, 10, 117–127. [Google Scholar] [CrossRef]
  21. Mendel, J.M.; John, R.I.; Liu, F. Interval Type-2 Fuzzy Logic Systems Made Simple. IEEE Trans. Fuzzy Syst. 2006, 14, 808–821. [Google Scholar] [CrossRef]
  22. Karnik, N.N.; Mendel, J.M. Introduction to type-2 fuzzy logic systems. In Proceedings of the IEEE International Conference on Fuzzy Systems Proceedings. IEEE World Congress on Computational Intelligence (Cat. No.98CH36228), Anchorage, AK, USA, 4–9 May 1998; Volume 2, pp. 915–920. [Google Scholar]
  23. Liu, X.; Mendel, J.M.; Wu, D. Study on enhanced Karnik–Mendel algorithms: Initialization explanations and computation improvements. Inf. Sci. 2012, 184, 75–91. [Google Scholar] [CrossRef]
  24. Amador-Angulo, L.; Castillo, O. Optimization of the Type-1 and Type-2 fuzzy controller design for the water tank using the Bee Colony Optimization. In Proceedings of the IEEE Conference on Norbert Wiener in the 21st Century, Boston, MA, USA, 24–26 June 2014; pp. 1–8. [Google Scholar]
  25. Olivas, E.L.; Castillo, O.; Valdez, F.; Soria, J. Ant colony optimization for membership function design for a water tank fuzzy logic controller. In Proceedings of the IEEE Workshop on Hybrid Intelligent Models and Applications, Singapore, 16–19 April 2013; pp. 27–34. [Google Scholar]
  26. Mendoza, O.; Melin, P.; Licea, G. A New Method for Edge Detection in Image Processing Using Interval Type-2 Fuzzy Logic. In Proceedings of the IEEE International Conference on Granular Computing, Fremont, CA, USA, 2–4 November 2007; p. 151. [Google Scholar]
  27. Gonzalez, C.I.; Castro, J.R.; Mendoza, O.; Rodríguez-Díaz, A.; Melin, P.; Castillo, O. Edge detection method based on Interval type-2 fuzzy systems for color images. In Proceedings of the Annual Conference of the North American Fuzzy Information Processing Society (NAFIPS) held jointly with the 5th World Conference on Soft Computing (WConSC), Redmond, WA, USA, 17–19 August 2015; pp. 1–6. [Google Scholar]
  28. Melin, P.; Mendoza, O.; Castillo, O. An improved method for edge detection based on interval type-2 fuzzy logic. Expert Syst. Appl. 2010, 37, 8527–8535. [Google Scholar] [CrossRef]
  29. Perez-Ornelas, F.; Mendoza, O.; Melin, P.; Castro, J.R. Interval type-2 fuzzy logic for image edge detection quality evaluation. In Proceedings of the Annual Meeting of the North American Fuzzy Information Processing Society, Berkeley, CA, USA, 6–8 August 2012; pp. 1–6. [Google Scholar]
  30. Amador-Angulo, L.; Castillo, O. A new fuzzy bee colony optimization with dynamic adaptation of parameters using interval type-2 fuzzy logic for tuning fuzzy controllers. Soft Comput. 2016, 1–24. [Google Scholar] [CrossRef]
  31. Bernal, E.; Castillo, O.; Soria, J. Imperialist Competitive Algorithm with Dynamic Parameter Adaptation Applied to the Optimization of Mathematical Functions. In Nature-Inspired Design of Hybrid Intelligent Systems; Melin, P., Castillo, O., Kacprzyk, J., Eds.; Springer: Berlin/Heidelberg, Germany, 2017; pp. 329–341. [Google Scholar]
  32. Olivas, F.; Castillo, O. Particle Swarm Optimization with Dynamic Parameter Adaptation Using Fuzzy Logic for Benchmark Mathematical Functions. In Recent Advances on Hybrid Intelligent Systems; Castillo, O., Melin, P., Kacprzyk, J., Eds.; Springer: Berlin/Heidelberg, Germany, 2013; pp. 247–258. [Google Scholar]
  33. Ochoa, P.; Castillo, O.; Soria, J. Differential Evolution Using Fuzzy Logic and a Comparative Study with Other Metaheuristics. In Nature-Inspired Design of Hybrid Intelligent Systems; Melin, P., Castillo, O., Kacprzyk, J., Eds.; Springer: Berlin/Heidelberg, Germany, 2017; pp. 257–268. [Google Scholar]
  34. Peraza, C.; Valdez, F.; Castillo, O. An Adaptive Fuzzy Control Based on Harmony Search and Its Application to Optimization. In Nature-Inspired Design of Hybrid Intelligent Systems; Melin, P., Castillo, O., Kacprzyk, J., Eds.; Springer: Berlin/Heidelberg, Germany, 2017; pp. 269–283. [Google Scholar]
Figure 1. Interval Type-2 Membership Function.
Figure 1. Interval Type-2 Membership Function.
Algorithms 10 00077 g001
Figure 2. Type-1 and Interval Type-2 Mamdani Fuzzy Inference Systems.
Figure 2. Type-1 and Interval Type-2 Mamdani Fuzzy Inference Systems.
Algorithms 10 00077 g002
Figure 3. Different types of composition operators.
Figure 3. Different types of composition operators.
Algorithms 10 00077 g003aAlgorithms 10 00077 g003b
Figure 4. Water level tank control.
Figure 4. Water level tank control.
Algorithms 10 00077 g004
Figure 5. Output membership fuctions.
Figure 5. Output membership fuctions.
Algorithms 10 00077 g005
Figure 6. IT2 FLC control surfaces.
Figure 6. IT2 FLC control surfaces.
Algorithms 10 00077 g006
Figure 7. Execution time comparison of the type-reduction algorithms.
Figure 7. Execution time comparison of the type-reduction algorithms.
Algorithms 10 00077 g007
Figure 8. Average error comparison of the type-reduction algorithms.
Figure 8. Average error comparison of the type-reduction algorithms.
Algorithms 10 00077 g008
Figure 9. Neighborhood of a particular pixel.
Figure 9. Neighborhood of a particular pixel.
Algorithms 10 00077 g009
Figure 10. Fuzzy sets of the gradients.
Figure 10. Fuzzy sets of the gradients.
Algorithms 10 00077 g010
Figure 11. Output Fuzzy set.
Figure 11. Output Fuzzy set.
Algorithms 10 00077 g011
Figure 12. Test image and their edges detected.
Figure 12. Test image and their edges detected.
Algorithms 10 00077 g012
Figure 13. Test image plus noise.
Figure 13. Test image plus noise.
Algorithms 10 00077 g013
Figure 14. Execution time comparison for different type-reduction methods.
Figure 14. Execution time comparison for different type-reduction methods.
Algorithms 10 00077 g014
Figure 15. FOM comparison for different type-reduction methods.
Figure 15. FOM comparison for different type-reduction methods.
Algorithms 10 00077 g015
Table 1. Karnik Mendel algorithm.
Table 1. Karnik Mendel algorithm.
StepLeft PointRight Point
1Sort x i by increasing orderSort x i by increasing order
2Initialize w i as:
w i = w i ¯ + w i _ 2
Initialize w i as:
w i = w i _ + w i ¯ 2
3Compute:
y = i = 1 N x i w i i = 1 N w i
Compute:
y = i = 1 N x i w i i = 1 N w i
4Find the switch point k where
x k < y < x k + 1
Find the switch point k where
x k < y < x k + 1
5Set
w i = { w i ¯   ,   i k w i _   ,   i > k
Set
w i = { w i _   ,   i k w i ¯   ,   i > k
6Compute:
y = i = 1 N x i w i i = 1 N w i
Compute:
y = i = 1 N x i w i i = 1 N w i
7If y = = y then stop, set y l = y and L = k , if not go to step 8.If y = = y then stop, set y r = y and R = k if not go to step 8.
8Set y = y and go to step 3.Set y = y and go to step 3.
Table 2. Proposed methodology.
Table 2. Proposed methodology.
StepAction
1Define rules partial knowledge of the system.
B r = ( θ ¯ r × µ ¯ r ( z ) , θ _ r × µ _ r ( z ) )
2Determinate the interval of each partial knowledge
Z r = ( [ Z ¯ i r , Z ¯ f r ] , [ Z _ i r , Z _ f r ] )

* Note: Considerate some interval can be composed.
3Compute the intersection of the intervals obtained in step 2.
Z r Z r = ( [ Z ¯ i r , Z ¯ f r ] [ Z ¯ i r , Z ¯ f r ] , [ Z _ i r , Z _ f r ] [ Z _ i r , Z _ f r ] )

The interceptions are determinate as the combination of the number of consequent membership functions.
* Note: Several interceptions can contain empty domains.
4Realize the integration of each interval, evaluating the defined integral the results are obtained in firing force’s function.
5Found elements A and V.
6Found ξ l 0 and ξ r 0 and b l and b u .
7Compute Equations (8) and (9).
Table 3. Output MF intervals.
Table 3. Output MF intervals.
Upper MFsLower MFs
IntervalPartial KnowledgeIntervalPartial Knowledge
1.05 < x < 0.9 θ ¯ 1 x + 1.05 0.15 0.95 < x < 0.9 θ _ 1 x + 0.95 0.05
0.9 < x < 0.75 θ ¯ 1 0.75 x 0.15 0.9 < x < 0.85 θ _ 1 0.85 x 0.05
0.65 < x < 0.5 θ ¯ 2 x + 0.65 0.15 0.55 < x < 0.5 θ _ 2 x + 0.55 0.05
0.5 < x < 0.35 θ ¯ 2 0.35 x 0.15 0.5 < x < 0.45 θ _ 2 0.45 x 0.05
0.15 < x < 0 θ ¯ 3 x + 0.15 0.15 0.05 < x < 0 θ _ 3 x + 0.05 0.05
0 < x < 0.15 θ ¯ 3 0.1 x 0.15 0 < x < 0.05 θ _ 3 0.05 x 0.05
0.15 < x < 0.3 θ ¯ 4 x 0.15 0.15 0.25 < x < 0.3 θ _ 4 x 0.25 0.05
0.3 < x < 0.45 θ ¯ 4 0.45 x 0.15 0.3 < x < 0.35 θ _ 4 0.35 x 0.05
0.75 < x < 0.9 θ ¯ 5 x 0.75 0.15 0.85 < x < 0.9 θ _ 5 x 0.85 0.05
0.9 < x < 1.05 θ ¯ 5 1.05 x 0.15 0.9 < x < 0.95 θ _ 5 0.95 x 0.05
Table 4. Upper MF integrals.
Table 4. Upper MF integrals.
IIntervalPartial KnowledgeFirst IntegralSecond Integral
1 1.05 < x < 0.9 θ ¯ 1 x + 0.15 0.15 θ ¯ 1 ( x + 0.15 ) 2 0.3 θ ¯ 1 ( x + 0.15 ) 3 0.9
2 0.9 < x < 0.75 θ ¯ 1 0.75 x 0.15 θ ¯ 1 ( 0.75 x ) 2 0.3 θ ¯ 1 ( 0.75 x ) 3 0.9
3 0.65 < x < 0.5 θ ¯ 2 x + 0.65 0.15 θ ¯ 2 ( x + 0.65 ) 2 0.3 θ ¯ 2 ( x + 0.65 ) 3 0.9
4 0.5 < x < 0.35 θ ¯ 2 0.35 x 0.15 θ ¯ 2 ( 0.35 x ) 2 0.3 θ ¯ 2 ( 0.35 x ) 3 0.9
5 0.15 < x < 0 θ ¯ 3 x + 0.15 0.15 θ ¯ 3 ( x + 0.15 ) 2 0.3 θ ¯ 3 ( x + 0.15 ) 3 0.9
6 0 < x < 0.15 θ ¯ 3 0.1 x 0.15 θ ¯ 3 ( 0.1 x ) 2 0.3 θ ¯ 3 ( 0.1 x ) 3 0.9
7 0.15 < x < 0.3 θ ¯ 4 x 0.15 0.15 θ ¯ 4 ( x 0.15 ) 2 0.3 θ ¯ 4 ( x 0.15 ) 3 0.9
8 0.3 < x < 0.45 θ ¯ 4 0.45 x 0.15 θ ¯ 4 ( 0.45 x ) 2 0.3 θ ¯ 4 ( 0.45 x ) 3 0.9
9 0.75 < x < 0.9 θ ¯ 5 x 0.75 0.15 θ ¯ 5 ( x 0.75 ) 2 0.3 θ ¯ 5 ( x 0.75 ) 3 0.9
10 0.9 < x < 1.05 θ ¯ 5 1.05 x 0.15 θ ¯ 5 ( 1.05 x ) 2 0.3 θ ¯ 5 ( 1.05 x ) 3 0.9
Table 5. Lower MF integrals.
Table 5. Lower MF integrals.
IIntervalPartial knowledgeFirst IntegralSecond Integral
1 0.95 < x < 0.9 θ _ 1 x + 0.95 0.05 θ _ 1 ( x + 0.95 ) 2 0.1 θ _ 1 ( x + 0.95 ) 3 0.3
2 0.9 < x < 0.85 θ _ 1 0.85 x 0.05 θ _ 1 ( 0.85 x ) 2 0.1 θ _ 1 ( 0.85 x ) 3 0.3
3 0.55 < x < 0.5 θ _ 2 x + 0.55 0.05 θ _ 2 ( x + 0.55 ) 2 0.1 θ _ 2 ( x + 0.55 ) 3 0.3
4 0.5 < x < 0.45 θ _ 2 0.45 x 0.05 θ _ 2 ( 0.45 x ) 2 0.1 θ _ 2 ( 0.45 x ) 3 0.3
5 0.05 < x < 0 θ _ 3 x + 0.05 0.05 θ _ 3 ( x + 0.05 ) 2 0.1 θ _ 3 ( x + 0.05 ) 3 0.3
6 0 < x < 0.05 θ _ 3 0.05 x 0.05 θ _ 3 ( 0.05 x ) 2 0.1 θ _ 3 ( 0.05 x ) 3 0.3
7 0.25 < x < 0.3 θ _ 4 x 0.25 0.05 θ _ 4 ( x 0.25 ) 2 0.1 θ _ 4 ( x 0.25 ) 3 0.3
8 0.3 < x < 0.35 θ _ 4 0.35 x 0.05 θ _ 4 ( 0.35 x ) 2 0.1 θ _ 4 ( 0.35 x ) 3 0.3
9 0.85 < x < 0.9 θ _ 5 x 0.85 0.05 θ _ 5 ( x 0.85 ) 2 0.1 θ _ 5 ( x 0.85 ) 3 0.3
10 0.9 < x < 0.95 θ _ 5 0.95 x 0.05 θ _ 5 ( 0.95 x ) 2 0.1 θ _ 5 ( 0.95 x ) 3 0.3
Table 6. A ¯ and V ¯ .
Table 6. A ¯ and V ¯ .
IInterval A ¯ V ¯
1 1.05 < x < 0.9 ( ξ 0 + 0.9 ) θ ¯ 1 ( 0.15 ) 2 0.3 θ ¯ 1 ( 0.15 ) 3 0.9
2 0.9 < x < 0.75 ( ξ 0 + 0.9 ) θ ¯ 1 ( 0.15 ) 2 0.3 θ ¯ 1 ( 0.15 ) 3 0.9
3 0.65 < x < 0.5 ( ξ 0 + 0.5 ) θ ¯ 2 ( 0.15 ) 2 0.3 θ ¯ 2 ( 0.15 ) 3 0.9
4 0.5 < x < 0.35 ( ξ 0 + 0.5 ) θ ¯ 2 ( 0.15 ) 2 0.3 θ ¯ 2 ( 0.15 ) 3 0.9
5 0.15 < x < 0 ( ξ 0 + 0 ) θ ¯ 3 ( 0.15 ) 2 0.3 θ ¯ 3 ( 0.15 ) 3 0.9
6 0 < x < 0.15 ( ξ 0 + 0 ) θ ¯ 3 ( 0.15 ) 2 0.3 θ ¯ 3 ( 0.15 ) 3 0.9
7 0.15 < x < 0.3 ( ξ 0 0.3 ) θ ¯ 4 ( 0.15 ) 2 0.3 θ ¯ 4 ( 0.15 ) 3 0.9
8 0.3 < x < 0.45 ( ξ 0 0.3 ) θ ¯ 4 ( 0.15 ) 2 0.3 θ ¯ 4 ( 0.15 ) 3 0.9
9 0.75 < x < 0.9 ( ξ 0 0.9 ) θ ¯ 5 ( 0.15 ) 2 0.3 θ ¯ 5 ( 0.15 ) 3 0.9
10 0.9 < x < 1.05 ( ξ 0 0.9 ) θ ¯ 5 ( 0.15 ) 2 0.3 θ ¯ 5 ( 0.15 ) 3 0.9
Table 7. A _ and V _ .
Table 7. A _ and V _ .
IInterval A _ V _
1 0.95 < x < 0.9 ( ξ 0 + 0.5 ) θ _ 1 ( 0.05 ) 2 0.1 θ _ 1 ( 0.05 ) 3 0.3
2 0.9 < x < 0.85 ( ξ 0 + 0.5 ) θ _ 1 ( 0.05 ) 2 0.1 θ _ 1 ( 0.05 ) 3 0.3
3 0.55 < x < 0.5 ( ξ 0 + 0.5 ) θ _ 2 ( 0.05 ) 2 0.1 θ _ 2 ( 0.05 ) 3 0.3
4 0.5 < x < 0.45 ( ξ 0 + 0.5 ) θ _ 2 ( 0.05 ) 2 0.1 θ _ 2 ( 0.05 ) 3 0.3
5 0.05 < x < 0 ( ξ 0 + 0 ) θ _ 3 ( 0.05 ) 2 0.1 θ _ 3 ( 0.05 ) 3 0.3
6 0 < x < 0.05 ( ξ 0 + 0 ) θ _ 3 ( 0.05 ) 2 0.1 θ _ 3 ( 0.05 ) 3 0.3
7 0.25 < x < 0.3 ( ξ 0 0.3 ) θ _ 4 ( 0.05 ) 2 0.1 θ _ 4 ( 0.05 ) 3 0.3
8 0.3 < x < 0.35 ( ξ 0 0.3 ) θ _ 4 ( 0.05 ) 2 0.1 θ _ 4 ( 0.05 ) 3 0.3
9 0.85 < x < 0.9 ( ξ 0 0.9 ) θ _ 5 ( 0.05 ) 2 0.1 θ _ 5 ( 0.05 ) 3 0.3
10 0.9 < x < 0.95 ( ξ 0 0.9 ) θ _ 5 ( 0.05 ) 2 0.1 θ _ 5 ( 0.05 ) 3 0.3
Table 8. Type reduction comparison.
Table 8. Type reduction comparison.
Samples KMEKMNTApproximate CEKM
TimeE. AverageTimeE. AverageTimeE. AverageTimeE. Average
300.02950.01230.02990.01230.0280.02790.01130.0381
400.03040.00450.02980.00450.02790.02610.01130.0381
500.03010.0020.03020.0020.02790.02770.01130.0381
600.03010.00250.03070.00250.02730.02710.01130.0381
700.03040.00210.03770.00210.0270.02760.01130.0381
800.030.00110.03060.00110.03170.02730.01130.0381
900.03050.00070.03070.00070.02690.02740.01130.0381
1000.03650.00110.03050.00110.0270.02770.01130.0381
Table 9. Performance comparison.
Table 9. Performance comparison.
KM Type ReductionApproximate CEKM Type Reduction
Algorithms 10 00077 i001 Algorithms 10 00077 i002
ISE1.9451ISE1.9691
IAE2.9357IAE3.2730
ITAE7.7548ITAE11.6868
Time0.0322 sTime0.0129 s
Table 10. Output intervals.
Table 10. Output intervals.
Upper MFsLower MFs
IntervalPartial KnowledgeIntervalPartial Knowledge
1 0 < z < 127 2 θ ¯ N ( 127 z ) 0 < z < 117 2 θ _ N ( 117 z )
2 127 < z < 255 2 θ ¯ E ( z 127 ) 137 < z < 255 2 θ _ E ( z 117 )
Table 11. A ¯ and V ¯ .
Table 11. A ¯ and V ¯ .
Upper MFs
IntervalPartial Knowledge A ¯ V ¯
1 0 < z < 127 2 θ ¯ N ( 127 z ) ( ξ 0 z ) θ ¯ N ( z 127 ) 2 θ ¯ N ( z 127 ) 3 3
2 127 < z < 255 2 θ ¯ E ( z 127 ) ( ξ 0 z ) θ ¯ E ( z 127 ) 2 θ ¯ E ( z 127 ) 3 3
Table 12. A _ and V _ .
Table 12. A _ and V _ .
Lower MFs
IntervalPartial Knowledge A _ V _
1 0 < z < 117 2 θ _ N ( 117 z ) ( ξ 0 z ) θ _ N ( 117 z ) 2 θ _ N ( 117 z ) 3 3
2 137 < z < 255 2 θ _ E ( z 117 ) ( ξ 0 z ) θ _ E ( z 117 ) 2 θ _ E ( z 117 ) 3 3
Table 13. A ¯ and V ¯ .
Table 13. A ¯ and V ¯ .
Upper MFs
IntervalPartial Knowledge A ¯ V ¯
1 0 < z < 127 2 θ ¯ N ( 127 z ) ( ξ 0 ) θ ¯ N ( 127 ) 2 θ ¯ N ( 127 ) 3 3
2 127 < z < 255 2 θ ¯ E ( z 127 ) ( ξ 0 127 ) θ ¯ E ( 127 ) 2 θ ¯ E ( 127 ) 3 3
Table 14. A _ and V _ .
Table 14. A _ and V _ .
Lower MFs
IntervalPartial KnowledgeFirst IntegralSecond Integral
1 0 < z < 117 2 θ _ N ( 117 z ) ( ξ 0 ) θ _ N ( 117 ) 2 θ _ N ( 117 ) 2 3
2 137 < z < 255 2 θ _ E ( z 117 ) ( ξ 0 255 ) θ _ E ( 137 ) 2 ( ξ 0 137 ) θ _ E ( 20 ) 2 θ _ E ( 137 ) 3 3 θ _ E ( 20 ) 3 3
Table 15. Edge detection comparison with respect to classical KM type reduction.
Table 15. Edge detection comparison with respect to classical KM type reduction.
KM Type ReductionApproximate CEKM Type Reduction
Algorithms 10 00077 i003 Algorithms 10 00077 i004
FOM0.8269FOM0.8290
Time22.9257Time12.6712
Table 16. Edge detection comparison by variating the type-reduction method.
Table 16. Edge detection comparison by variating the type-reduction method.
Samples KMEKMNTApproximate CEKM
TimeE. AverageTimeE. AverageTimeE. AverageTimeE. Average
3019.67970.833120.21140.838917.73940.833512.13480.8272
4019.78030.836620.29520.819518.15750.81812.13480.8272
5019.82040.831920.20710.829118.04730.832312.13480.8272
6019.70110.829920.24350.832718.0810.814912.13480.8272
7020.21530.82920.35310.810918.25790.833412.13480.8272
8020.00180.80520.52940.817818.21210.830412.13480.8272
9019.94270.8320.62220.824818.19860.834712.13480.8272
10020.23760.81120.68820.834618.34650.80712.13480.8272
Table 17. Advantages and Disadvantages of the Approximate CEKM method.
Table 17. Advantages and Disadvantages of the Approximate CEKM method.
CriteriaKM, CEKM, NTApproximate CEKM
ErrorCan obtain lowers errorsHave inherent errors
Iterations numberDepends the problemNon iterative
Samples numberError decreasing by increment the samples numberDo not requires sampling
Execution timeIncrease by increment the samples numberConstant and significantly lower with respect to KM
Hardware implementationHardest to implementIdeal for hardware implementation
Mathematical developmentDoes not require additional mathematical developmentRequires a methodology to be able to implement it
AdaptationDo not requires additional mathematical developmentRequires to realize the methodology again to each variation

Share and Cite

MDPI and ACS Style

Ontiveros-Robles, E.; Melin, P.; Castillo, O. New Methodology to Approximate Type-Reduction Based on a Continuous Root-Finding Karnik Mendel Algorithm. Algorithms 2017, 10, 77. https://doi.org/10.3390/a10030077

AMA Style

Ontiveros-Robles E, Melin P, Castillo O. New Methodology to Approximate Type-Reduction Based on a Continuous Root-Finding Karnik Mendel Algorithm. Algorithms. 2017; 10(3):77. https://doi.org/10.3390/a10030077

Chicago/Turabian Style

Ontiveros-Robles, Emanuel, Patricia Melin, and Oscar Castillo. 2017. "New Methodology to Approximate Type-Reduction Based on a Continuous Root-Finding Karnik Mendel Algorithm" Algorithms 10, no. 3: 77. https://doi.org/10.3390/a10030077

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop