Professional Documents
Culture Documents
IFS1712
IFS1712
DOI:10.3233/IFS-151712
IOS Press
PY
CO
Abstract. In practice, some special LR fuzzy numbers, like the triangular fuzzy number, the Gaussian fuzzy number and the
Cauchy fuzzy number, are widely used in many areas to deal with various vague information. With regard to these special LR
fuzzy numbers, called regular LR fuzzy numbers in this paper, an operational law is proposed for fuzzy arithmetic, providing a
novel approach to analytically and exactly calculating the inverse credibility distribution of some specific arithmetical operations
based on the credibility measure. As an application of the operational law, an equivalent form of the expected value operator as
well as a theorem for computing the expected value of strictly monotone functions is suggested. Finally, we utilize the operational
law to construct a solution framework of fuzzy programming with parameters of regular LR fuzzy numbers, and such type of fuzzy
OR
programming problems can be handled by the operational law as the classic deterministic programming without any particular
solving techniques.
Keywords: LR fuzzy number, regular LR fuzzy number, fuzzy arithmetic, operational law, expected value, fuzzy programming
TH
cal relationships with vague information (e.g., demand, α. Further, all fuzzy numbers in the arithmetic proce-
time, distance, etc.). To model the imprecision in these dure are treated as independent fuzzy numbers although
problems, the fuzzy set theory introduced by Zadeh [31] most of them are not when based on the extension
can be employed, in which different types of fuzzy num- principle or the interval method. To tackle this prob-
bers and the corresponding fuzzy arithmetic on them are lem, some researchers defined requisite constraints or
necessary in the modeling process. proposed some novel approaches (see, e.g., [16, 25]).
In 1975, Zadeh [32] presented the extension prin- Since the arithmetic based on above approaches
ciple for fuzzy basic operations involving addition, are difficult to evaluate and computationally expen-
subtraction, multiplication, division and so on. Since sive, some approximation methods were introduced. For
implementing the Zadeh’s extension principle is equal instance, Dubois and Prade [4] extended usual alge-
to addressing a nonlinear programming, Kaufmann and braic operations on real numbers to fuzzy numbers,
Gupta [14] alternatively initialized an interval method and suggested a standard approximation to fuzzy arith-
for triangular and trapezoidal fuzzy numbers based on metic with efficient computation. Nevertheless, they
reminded that frequent uses of the standard approxi-
∗ Corresponding author. Ke Wang, School of Management,
mation for multiplication may lead to wrong results.
Shanghai University, Shanghai 200444, China. Tel.: +86 21 661 Consequently Giachetti and Young [8] discussed the
37696 804; Fax: +86 21 66134284; E-mail: ke@shu.edu.cn. error of the standard approximation, and developed a
1064-1246/16/$35.00 © 2016 – IOS Press and the authors. All rights reserved
72 J. Zhou et al. / Fuzzy arithmetic on LR fuzzy numbers with applications to fuzzy programming
new approximation for triangular and trapezoidal fuzzy the operational law is presented based on the inverse
numbers to reduce the error. In [9], they next proposed credibility distribution, which allows fuzzy arithmetic
a form using six parameters to define fuzzy numbers, to be calculated exactly instead of approximation or
and provided the method for performing fuzzy arith- simulation. Based on the proposed operational law, we
metic with better accuracy and similar computational give an equivalent definition and a simpler proof of lin-
speed with the standard approximation. Guerra and Ste- earity for the expected value operator of regular LR
fanini [10] used piecewise monotonic interpolations to fuzzy numbers. Finally, a fuzzy programming model
approximate and represent a fuzzy number, and derived with an expected objective and chance constraints is
a procedure to control the absolute error associated with formulated. We show that this model can be trans-
the arithmetic operations on fuzzy numbers. Besides, ferred to an equivalent crisp programming model by the
some other methods and applications were also investi- operational law, and then solved with the aid of some
gated recently. For instance, Chutia et al. [3] developed well-developed optimization software packages.
PY
a generalised method to find the membership function The rest of this paper is organized as follows. In
for functions of triangular fuzzy numbers. Eslamipoor Section 2, the concept of LR fuzzy number is reviewed.
et al. [7] and Haji et al. [11] proposed different meth- In Section 3, we discuss the credibility distribution of
ods to rank fuzzy numbers by using distance method. LR fuzzy numbers based on the credibility measure,
Furthermore, based on the fuzzy arithmetic and a kind define the regular fuzzy number as well as the regular
CO
of ranking method called Mehar’s method [15], Hatami LR fuzzy number, and prove the equivalent relationship
and Kazemipoor [12] solved the fully fuzzy linear pro- between them. In Section 4, a novel operational law for
gramminginwhichalltheparametersaswellasvariables regular LR fuzzy numbers is put forward. In Section 5,
were represented by fuzzy numbers. Madhuri et al. [23] an equivalent form of the expected value operator for
defined a new arithmetic operations of linguistic trape- LR fuzzy numbers is presented. In Section 6, the oper-
zoidal fuzzy numbers for risk analysis. ational law is used to construct a solution framework
OR
The LR fuzzy number initialized by Dubois and of fuzzy programming, and then we illustrate it by an
Prade [4], especially the triangular fuzzy numbers as example about the purchasing planning problem.
its special case, is a commonly used type of fuzzy num-
bers in various problems over the past few decades.
An LR fuzzy number can be represented by its mean 2. LR fuzzy numbers
value (most likely value), left and right spreads (lower
TH
and upper bounds), and shape functions. As to the Dubois and Prade [4] initialized the well-known LR
fuzzy arithmetic on LR fuzzy numbers, Wang and type of representation for fuzzy numbers, where L and
Kuo [28] proposed an alternative operation of fuzzy R respectively denote the left and right shape functions
arithmetic on LR fuzzy numbers by three parame- which can be defined as follows.
ters, and developed a new learning algorithm of a
AU
fully fuzzified neural network based on the proposed Definition 1. (Dubois and Prade [4]) A shape function L
approximation method. Sorini and Stefanini [27] sug- (or R) is a decreasing function from + → [0, 1] such
gested a parametrization for LR fuzzy numbers, and that
the parametric representations could be used to model
(1) L(0) = 1;
the shapes of the membership functions and obtain
(2) L(x) < 1, ∀x > 0;
operators for the fuzzy arithmetic operations. Chou [2]
(3) L(x) > 0, ∀x < 1;
presented an inverse function arithmetic principle on tri-
(4) L(1) = 0 [or L(x) > 0, ∀x and L(+∞) = 0].
angular fuzzy numbers, which could easily interpret the
multiplication operation with the membership functions Example 2.1. Different functions can be chosen for
of fuzzy numbers. L(x) (or R(x)). For instance, as mentioned by Dubois
In this paper, we focus on a specific type of LR and Prade [6], L(x) = max{0, 1 − xp } with p > 0;
fuzzy numbers involving the triangular fuzzy num- L(x) = e−x ; and L(x) = 1/(1 + x2 ).
ber, the Gaussian fuzzy number, and the Cauchy fuzzy
number as special cases, called regular LR fuzzy num- Definition 2. (Dubois and Prade [6]) A fuzzy number
bers. First, we discuss the credibility distributions of ξ is of LR-type if there exist shape functions L (for
regular LR fuzzy numbers and give the equivalent con- left) and R (for right), and scalers α > 0, β > 0 with
ditions for a regular LR fuzzy number. Subsequently, membership function
J. Zhou et al. / Fuzzy arithmetic on LR fuzzy numbers with applications to fuzzy programming 73
Fig. 1. The membership function of (4, 2, 3)LR in Example 2.2. Fig. 2. The membership function of a triangular fuzzy number.
PY
⎧
⎪
⎪
m−x
if x ≤ m
⎨L α ,
μξ (x) =
⎪
⎪
⎩R x−m , if x ≥ m
β
CO
where the real number m is called the mean value or
peak of ξ, and α and β are called the left and right
spreads, respectively. Symbolically, ξ is denoted by
(m, α, β)LR .
Fig. 3. The membership function of a Gaussian fuzzy number.
OR
⎪
⎨
μ(x) = x/2 − 1, if 2 < x ≤ 4 (1)
⎪
⎪ Fig. 4. The membership function of a Cauchy fuzzy number.
⎪
⎪
⎩e(4−x)/3 , if x > 4.
which can be denoted as (b, b − a, c − b)LR , where the
Example 2.3. If L(x) and R(x) are both linear functions shape functions L and R are
on the domains {x|0 < L(x) < 1} and {x|0 < R(x) <
L(x) = R(x) = max{0, 1 − x}.
1}, the corresponding LR fuzzy number is a triangular
fuzzy number. A triangular fuzzy number ξ determined Example 2.4. A fuzzy number ξ is called a Gaussian
by the triplet (a, b, c) of real numbers with a < b < c fuzzy number if it has a membership function (see
has a membership function (see Fig. 2) Fig. 3)
⎧x − a
μ(x) = e−(
x−a 2
⎪
⎪ , if a ≤ x ≤ b b ) , x ∈ , b > 0, (3)
⎪
⎪b − a
⎪
⎨
μ(x) = c − x , if b < x ≤ c (2) which can be denoted as (a, b, b)LR , where the shape
⎪
⎪ functions L and R are
⎪
⎪ c−b
⎪
⎩
L(x) = R(x) = e−x .
2
0, otherwise,
74 J. Zhou et al. / Fuzzy arithmetic on LR fuzzy numbers with applications to fuzzy programming
Example 2.5. A fuzzy number ξ is called a Cauchy number (3, 3, 3)LR with the following membership
fuzzy number if it has a membership function (see function (see Fig. 5)
Fig. 4) ⎧
⎪
⎪ 0.2, if 0 < x < 1
1 ⎪
⎪
μ(x) = , x ∈ , q > 0, (4) ⎪
⎪
2 ⎪
⎪
1+ x−p ⎪
⎪ 0.5, if 1 ≤ x < 2
q ⎪
⎪
⎪
⎪
⎪
⎪ if 2 ≤ x < 3
which can be denoted as (p, q, q)LR , where the shape ⎪
⎪
0.8,
⎪
⎨
functions L and R are
μ(x) = −x/2 + 5/2, if 3 ≤ x < 4 (5)
⎪
⎪
L(x) = R(x) = 1/(1 + x2 ). ⎪
⎪
⎪
⎪ if 4 ≤ x < 5
⎪
⎪ 0.5,
Example 2.6. Generally speaking, the shape function L ⎪
⎪
PY
⎪
⎪
(or R) defined in Definition 1 may be not continuous or ⎪
⎪−x/2 + 3, if 5 ≤ x < 6
⎪
⎪
strictly decreasing on the open interval {x|0 < L(x) < ⎪
⎪
⎪
⎩
1}. For instance, suppose that the shape functions L(x) 0, otherwise.
and R(x) are as follows,
⎧
CO
⎪
⎪ 1, if x = 0
⎪
⎪ 3. Regular fuzzy numbers
⎪
⎪
⎪
⎪ 0.8, if 0 < x ≤ 1/3
⎪
⎪
⎪
⎨ This section first compares the credibility measure
L(x) = 0.5, if 1/3 < x ≤ 2/3 with the possibility measure and the necessity mea-
⎪
⎪ sure. Subsequently, we define the regular credibility
⎪
⎪
⎪
⎪ distribution, the regular fuzzy number, and the inverse
OR
⎪
⎪ 0.2, if 2/3 < x < 1
⎪
⎪ credibility distribution, respectively, on the basis of the
⎪
⎩
0, otherwise credibility distribution. Finally, equivalent conditions
for regular fuzzy numbers are proved.
and
⎧
⎪
⎪−3x/2 + 1, if 0 ≤ x < 1/3
⎪ 3.1. Credibility measure
TH
⎪
⎪
⎪
⎪
⎪
⎨0.5, if 1/3 ≤ x < 2/3 Suppose that ξ is a fuzzy number with the mem-
R(x) = bership function μ, and r is a real number. The
⎪
⎪
⎪
⎪−3x/2 + 3/2, if 2/3 ≤ x < 1 possibility [33] and the necessity [34] of a fuzzy event
⎪
⎪
⎪
⎪ ξ ≤ r are expressed as follows,
AU
⎩0, otherwise,
Pos{ξ ≤ r} = sup μ(x), Nec{ξ ≤ r} = 1 − sup μ(x).
which are noncontinuous and non-strictly decreasing, x≤r x>r
respectively. Letting the mean value, the left and right
However, it is not suitable to use the possibility
spreads m = α = β = 3, then we obtain an LR fuzzy
measure or necessity measure merely to measure a
fuzzy event in a decision-making system because of
the absence of the self-duality. To overcome this defi-
ciency, the credibility measure was proposed in [20] as
follows,
1
Cr{ξ ≤ r} = (Pos{ξ ≤ r} + Nec{ξ ≤ r}).
2
Liu and Liu [20] have also proved that the credibility
measure is increasing and self-dual, and
1
Cr{ξ ≤ r} = sup μ(x) + 1 − sup μ(x) . (6)
Fig. 5. The membership function of (3, 3, 3)LR in Example 2.6. 2 x≤r x>r
J. Zhou et al. / Fuzzy arithmetic on LR fuzzy numbers with applications to fuzzy programming 75
PY
tion for fuzzy variables as follows.
Example 3.1. On the basis of (1), (6) and (7), the cred-
TH
(x − 2)/4, if 2 < x ≤ 4
(x) =
⎪
⎪
⎪
⎪ 1 (4−x)/3
⎪
⎩1 − 2 e
⎪ , if x > 4,
Fig. 8. The credibility distribution of a Gaussian fuzzy number ξ ∼
N(a, b).
which has been depicted in Fig. 6.
Example 3.2. A triangular fuzzy number with the mem- denoted by T(a, b, c), where a < b < c are real num-
bership function in (2) has the credibility distribution bers.
(see Fig. 7)
⎧ Example 3.3. A Gaussian fuzzy number with the mem-
⎪
⎪ 0, if x ≤ a bership function in (3) has the credibility distribution
⎪
⎪
⎪
⎪ (see Fig. 8)
⎪
⎪
⎨(x − a)/2(b − a), if a < x ≤ b ⎧
(x) = ⎪ 1 −( x−a )2
⎪
(8) ⎪
⎨2e b , if x ≤ a
⎪
⎪ (x + c − 2b)/2(c − b), if b < x ≤ c
⎪
⎪ (x) = (9)
⎪
⎪ ⎪
⎪
⎪
⎩1, ⎩1 − 1 e−( x−a b )2
, if x > a
if x > c 2
76 J. Zhou et al. / Fuzzy arithmetic on LR fuzzy numbers with applications to fuzzy programming
Fig. 9. The credibility distribution of a Cauchy fuzzy number ξ ∼ Fig. 10. The credibility distribution of the LR fuzzy number in
C(p, q). Example 2.6.
PY
denoted by N(a, b), where a and b > 0 are real
numbers. ous and strictly increasing functions. In order to study
this special type of LR fuzzy numbers conveniently,
Example 3.4. A Cauchy fuzzy number with the mem- some new concepts are suggested as follows.
CO
bership function in (4) has the credibility distribution
(see Fig. 9) Definition 4. (Regular Credibility Distribution) A cred-
⎧ ibility distribution is said to be regular if it is a
⎪ 1 continuous and strictly increasing function with respect
⎪
⎪ , if x ≤ q
⎪
⎪ 2
to x at which 0 < (x) < 1, and
⎪
⎨ 2 + 2 x−p
q
(x) = (10)
⎪
⎪ lim (x) = 0, lim (x) = 1.
OR
⎪ 1
⎪
⎪ 1− , if x > q x→−∞ x→+∞
⎪
⎩ 2
2 + 2 x−p q
Definition 5. (Regular Fuzzy Number) A fuzzy num-
denoted by C(p, q), where p and q > 0 are real numbers. ber is said to be regular if its credibility distribution is
regular.
Example 3.5. The LR fuzzy number in Example 2.6
TH
⎪
⎪
⎪
⎪ 0.1, if 0 < x < 1 credibility distribution.
⎪
⎪
⎪
⎪ As to the regular fuzzy numbers, the concept of the
⎪
⎪ if 1 ≤ x < 2
⎪
⎪ 0.25, inverse credibility distribution is developed, which will
⎪
⎪
⎪
⎪ play a significant part in the subsequent content.
⎪
⎨0.4, if 2 ≤ x < 3
(x) = Definition 6. (Inverse Credibility Distribution) Let ξ be
⎪
⎪
⎪
⎪ x/4 − 1/4, if 3 ≤ x < 4 a fuzzy number with a regular credibility distribution
⎪
⎪
⎪
⎪ . Then the inverse function −1 is called the inverse
⎪
⎪ if 4 ≤ x < 5
⎪
⎪ 0.75, credibility distribution of ξ.
⎪
⎪
⎪
⎪ Note that the inverse credibility distribution −1 is
⎪
⎪ x/4 − 1/2, if 5 ≤ x < 6
⎪
⎪ well defined on the open interval (0, 1). If required, we
⎪
⎪
⎪
⎩ may extend the domain via
1, if x ≥ 6.
−1 (0) = lim −1 (α), −1 (1) = lim −1 (α).
From Examples 3.1∼3.4, it can be seen that the credi- α↓0 α↑1
bility distributions of the LR fuzzy number in Example
2.2, the triangular fuzzy number, the Gaussian fuzzy Example 3.6. The inverse credibility distribution of a
number, and the Cauchy fuzzy number are all continu- triangular fuzzy number ξ ∼ T(a, b, c) is (see Fig. 11)
J. Zhou et al. / Fuzzy arithmetic on LR fuzzy numbers with applications to fuzzy programming 77
PY
For our purpose, we first propose the following
⎧ definition.
⎨(2b − 2a)α + a, if α < 0.5
−1 (α) = (11) Definition 7. (Regular LR Fuzzy Number) A fuzzy
⎩
(2c − 2b)α + 2b − c, if α ≥ 0.5. number is said to be a regular LR fuzzy number if it is an
CO
LR fuzzy number with a regular credibility distribution.
Example 3.7. The inverse credibility distribution of a Next, equivalent conditions for regular fuzzy num-
Gaussian fuzzy number ξ ∼ N(a, b) is (see Fig. 12) bers as well as regular LR fuzzy numbers can be given
⎧ √ via the following theorems.
⎪
⎨a − b − ln(2α), if α ≤ 0.5
−1 Theorem 1. (Equivalent Condition I) A fuzzy number
(α) = (12)
⎪
⎩ √ is a regular fuzzy number if and only if any one of the
OR
Proof. It is easy to verify that parts (ii) and (iii) are true
according to the definition of regular fuzzy number.
AU
⎧
if μ(x) < 1 for any x ∈ (−∞, +∞), we have ⎪is continuous and stictly incresing,
⎪
⎪
⎪
⎪
⎪
⎪
(x0 ) = 1
sup μ(x) + 1 − sup μ(x) ⎪
⎪ if g(0) < x < m
2 ⎪
⎪
x≤x0 x>x0
⎪
⎪
⎪
⎪
⎨= 1, if x = m
< 1
2 1 + 1 − sup μ(x) μ(x)
x>x0 ⎪
⎪
⎪
⎪ is continuous and stictly decresing,
≤ ⎪
2 (1 + 1 − 0) =1
1
⎪
⎪
⎪
⎪
⎪
⎪ if m < x < g(1)
holds for any x0 ∈ (−∞, +∞), which is contrary to ⎪
⎪
⎪
⎪
that limx0 →+∞ (x0 ) = 1. ⎩
Next, we can verify that there is at most one point = 0, otherwise.
with membership 1 in (−∞, +∞). Otherwise, if there
PY
exist two points x1 < x2 with μ(x1 ) = μ(x2 ) = 1, then It is clear that μ(x) can be represented in the LR-type
for any x0 ∈ (x1 , x2 ), we have with shape functions L(x) and R(x), where L(x) and
R(x) are continuous and strictly decreasing on {x|0 <
(x0 ) = 1
2 sup μ(x) + 1 − sup μ(x) L(x) < 1} and {x|0 < R(x) < 1}. Therefore, ξ is an LR
x≤x0 x>x0
CO
fuzzy number.
= 21 (1 + 1 − 1) = 21 , Furthermore, since the credibility distribution of ξ is
regular, ξ is a regular LR fuzzy number.
which is contrary to the assumption that (x) is strictly
According to Theorem 1, the concepts of regular
increasing on {x|0 < (x) < 1}.
fuzzy number and regular LR fuzzy number are com-
Therefore, there is only one point with membership
pletely identical. In other words, any regular fuzzy
1. Denote it by m. That is, μ(m) = 1.
numbers can be represented as an LR fuzzy number
OR
x≤x0
LR fuzzy number and its shape functions L and R are
= 1
2 sup μ(x). continuous and strictly decreasing on the open intervals
x≤x0
{x|0 < L(x) < 1} and {x|0 < R(x) < 1}, respectively.
Since (x) is continuous and strictly increasing
on {x|0 < (x) < 1}, thus μ(x) is continuous and Proof. On the one hand, if a fuzzy number ξ is a reg-
AU
strictly increasing on {x|g(0) < x < m}, where g(0) = ular LR fuzzy number, following from the proof of
limα↓0 −1 (α). Theorem 1, it is known that the membership func-
Similarly, for x0 > m, we have tion of ξ can be represented in the LR-type with shape
functions L(x) and R(x), where L(x) and R(x) are con-
(x0 ) = 1
2 sup μ(x) + 1 − sup μ(x) tinuous and strictly decreasing on {x|0 < L(x) < 1}
x≤x0 x>x0
and {x|0 < R(x) < 1}, respectively.
On the other hand, if a fuzzy number ξ is an LR
= 1
2 μ(m) + 1 − sup μ(x) fuzzy number with continuous and strictly decreas-
x>x0
ing shape functions L and R on {x|0 < L(x) < 1} and
=1− 1
2 sup μ(x). {x|0 < R(x) < 1}, then its credibility distribution is
x>x0
regular, which can be verified in three cases as follows.
Since (x) is continuous and strictly increasing on Assume that the membership function of ξ is
{x|0 < (x) < 1}, we have μ(x) is continuous and
strictly decreasing on {x|m < x < g(1)}, where g(1) = ⎧
⎪ m−x
⎨L a , if x ≤ m, a > 0
limα↑1 −1 (α).
In summary, for the membership function μ(x) of ξ, μ(x) =
⎪
⎩ x−m
we have R b , if x ≥ m, b > 0
J. Zhou et al. / Fuzzy arithmetic on LR fuzzy numbers with applications to fuzzy programming 79
where L(x) and R(x) are both continuous and decreas- bR−1 (0)), i.e., {x|0 < (x) < 1}. Therefore, the credi-
ing functions on + and strictly decreasing on the bility distribution of ξ is regular, and consequently, ξ is
open intervals {x|0 < L(x) < 1} and {x|0 < R(x) < a regular LR fuzzy number.
1}. Denote L−1 (0) = limα↓0 L−1 (α) and R−1 (0) = So far, equivalent conditions for regular fuzzy num-
limα↓0 R−1 (α). bers as well as regular LR fuzzy numbers have been
Firstly, if x1 < x2 ≤ m, according to (6) and (7), we proposed. It is shown that all regular fuzzy numbers
have can be represented as regular LR fuzzy numbers with
1 continuous and strictly decreasing shape functions. In
(x1 ) = sup μ(x) + 1 − sup μ(x) the following three sections of this paper (i.e., Sections
2 x≤x1 x>x1
4∼6), we will focus on the fuzzy arithmetic on reg-
1 ular LR fuzzy numbers (i.e., regular fuzzy numbers)
= μ(x1 )
2 and its applications. For the sake of clearness and easy
PY
1 m − x1 understanding, we prefer to adopt the former phrase,
= L i.e, regular LR fuzzy number.
2 a
and
CO
1 4. Operational law
(x2 ) = sup μ(x) + 1 − sup μ(x)
2 x≤x2 x>x2
1 This section gives the operational law for calculating
= μ(x2 ) the credibility distribution of strictly monotone func-
2
tion of independent regular LR fuzzy numbers. The
1 m − x2 notions of independence of fuzzy numbers and strictly
= L .
2 a monotone function are recalled first.
OR
and
Definition 8. (Liu and Gao [22]) The fuzzy variables
(x1 ) < (x2 ), ∀m − aL−1 (0) < x1 < x2 ≤ m. ξ1 , ξ2 , · · · , ξn are said to be independent if
Secondly, if m ≤ x1 < x2 , similarly, we have
Cr{ξi ∈ Bi , i = 1, 2, · · · , n} = min Cr{ξi ∈ Bi }
AU
1≤i≤n
(x1 ) ≤ (x2 ), ∀m ≤ x1 < x2
(x1 ) < (x2 ), ∀m ≤ x1 < x2 < m + bR−1 (0). Theorem 3. (Liu and Gao [22]) The fuzzy variables
ξ1 , ξ2 , · · · , ξn are independent if and only if
Finally, if x1 < m < x2 , we have
n
1 m − x1 1 1 Cr {ξi ∈ Bi } = max Cr {ξi ∈ Bi }
(x1 ) = L < L(0) = 1≤i≤n
2 a 2 2 i=1
PY
decreasing with respect to ξ2 . Besides, denote
Example 4.1. The following are strictly monotone G(α) = f (−1 −1
1 (α), 2 (1 − α)) (14)
functions,
where −1 −1
1 and 2 are the inverse credibility distri-
f (x1 , x2 ) = x1 − x2 , butions of ξ1 and ξ2 , respectively. Based on (13) and
CO
f (x1 , x2 ) = x1 /x2 , x1 , x2 > 0. (14), we always have
{ξ ≤ G(α)} ≡ {f (ξ1 , ξ2 ) ≤ f (−1 −1
1 (α), 2 (1 − α))}.
Example 4.2. If f (x1 , x2 , · · · , xn ) ≤ f (y1 , y2 , · · · ,
(15)
yn ) whenever xi ≤ yi for all i, and f (x1 , x2 , · · · , xn ) <
On the one hand, since f is a strictly monotone func-
f (y1 , y2 , · · · , yn ) whenever xi < yi for all i, the func-
tion, from Definition 9, we can deduce that
tion is said to be strictly increasing functions. The
ξ1 ≤ −1 −1
OR
(16)
yn ) whenever xi ≤ yi for all i, and f (x1 , x2 , · · · , xn ) >
⊆ {f (ξ1 , ξ2 ) ≤ f (−1 −1
1 (α), 2 (1 − α))}.
f (y1 , y2 , · · · , yn ) whenever xi < yi for all i, the func-
tion is said to be strictly decreasing functions. The Then it follows from (15) and (16) that
following are strictly decreasing functions,
{ξ ≤ G(α)} ⊇ {ξ1 ≤ −1 −1
1 (α)} ∩ {ξ2 ≥ 2 (1 − α)}.
AU
On the other hand, since f is strictly increasing with The above proof is also applicable the general cases.
respect to ξ1 and strictly decreasing with respect to ξ2 , Here we only consider the case of m = 1, n = 2 for
we can deduce that simplicity.
f (ξ1 , ξ2 ) ≤ f (−1 −1
1 (α), 2 (1 − α)) Remark 2. If the function f (x1 , x2 , · · · , xn ) is
strictly increasing with respect to x1 , x2 , · · · , xn , then
⇒ ξ1 ≤ −1
1 (α) or ξ2 ≥ −1
2 (1 − α) ξ = f (ξ1 , ξ2 , · · · , ξn ) is a regular LR fuzzy num-
which implies that ber with inverse credibility distribution −1 (α) =
f (−1 −1 −1
1 (α), 2 (α), · · · , n (α)).
{f (ξ1 , ξ2 ) ≤ f (−1 −1
1 (α), 2 (1 − α))}
(20) Remark 3. If the function f (x1 , x2 , · · · , xn ) is strictly
⊆ {ξ1 ≤ −1 −1
1 (α)} ∪ {ξ2 ≥ 2 (1 − α)}. decreasing with respect to x1 , x2 , · · · , xn , then ξ =
PY
Then it follows from (15) and (20) that f (ξ1 , ξ2 , · · · , ξn ) is a regular LR fuzzy number with
inverse credibility distribution −1 (α) = f (−1 1 (1 −
{ξ ≤ G(α)} ⊆ {ξ1 ≤ −1 −1
1 (α)} ∪ {ξ2 ≥ 2 (1 − α)}. −1 −1
α), 2 (1 − α), · · · , n (1 − α)).
(21)
Since the credibility measure Cr is an increasing set Example 4.4. Let ξ1 and ξ2 be independent regular LR
CO
function, we have fuzzy numbers with credibility distributions 1 and 2 ,
Cr{ξ ≤ G(α)} respectively. Since the function f (x1 , x2 ) = ax1 − bx2
(22) is strictly increasing with respect to x1 and strictly
≤ Cr {ξ1 ≤ −1
1 (α)} ∪ {ξ2 ≥ −1
2 (1 − α)} . decreasing with respect to x2 for any constants a > 0
and b > 0, it follows from Theorem 4 that aξ1 − bξ2 is
By using Theorem 3 and the independence of ξ1 and ξ2 , a regular LR fuzzy number, and its inverse credibility
we get distribution is
OR
Cr {ξ1 ≤ −1 (α)} ∪ {ξ 2 ≥ −1
(1 − α)} −1 (α) = a−1 −1
1 (α) − b2 (1 − α).
1 2
Providing that ξ1 ∼ N(3, 2) and ξ2 ∼ N(5, 3) are two
= Cr{ξ1 ≤ −1 −1
1 (α)} ∨ Cr{ξ2 ≥ 2 (1 − α)}
(23)
Gaussian fuzzy numbers, and the parameters a = 2 and
= α ∨ α = α. b = 1, the inverse credibility distribution of 2ξ1 − ξ2 is
TH
PY
= (2α + 1)/(5 − 2α). (25) +∞ 0
E[ξ] = Cr{ξ ≥ x}dx − Cr{ξ ≤ x}dx
0 −∞
+∞ 0
5. Expected value
= (1 − (x))dx − (x)dx
CO
0 −∞
In this section, we first give an equivalent form of
1 (0)
the expected value for regular LR fuzzy numbers using = −1
(α)dα + −1 (α)dα
the inverse credibility distribution, and then present a (0) 0
theorem for calculating the expected value of strictly 1
monotone functions based on the equivalent form and = −1 (α)dα.
the proposed operational law. 0
OR
the credibility distribution as follows. of the expected value of a regular LR fuzzy number.
Definition 10. (Liu and Liu [20]) Let ξ be a fuzzy Example 5.1. The expected value of a triangular fuzzy
variable. Then the expected value of ξ is defined by number ξ ∼ T(a, b, c) can be calculated according to
(11) and (26) as
+∞ 0
AU
PY
as follows.
according to (25) in Example 4.5.
Theorem 6. (Expected Value of Strictly Monotone Liu and Liu [21] have shown that the expected value
Functions) Let ξ1 , ξ2 , · · · , ξn be independent regu- operator defined in (26) has the linearity for indepen-
lar LR fuzzy numbers with credibility distributions dent fuzzy numbers. However, the proof is somewhat
CO
1 , 2 , · · · , n , respectively. If the function f (x1 , complicated. Here, we show that the same conclusion
x2 , · · · , xn ) is strictly increasing with respect to for regular LR fuzzy numbers can be obtained through a
x1 , x2 , · · · , xm and strictly decreasing with respect to relatively simple derivation on the basis of Theorems 5
xm+1 , xm+2 , · · · , xn , then the expected value of fuzzy and 6.
number ξ = f (ξ1 , · · · , ξm , ξm+1 , · · · , ξn ) is
1 Theorem 7. (Linearity of Expected Value Operator) Let
f (−1 −1 ξ and η be independent regular LR fuzzy numbers with
OR
and η are and , respectively. If a ≥ 0 and b ≥ 0, it
Example 5.3. Let ξ be a nonnegative regular LR fuzzy follows from Theorems 5 and 6 that
number with credibility distribution . Since f (x) = x2 1
is a strictly increasing function on [0, +∞), it follows E[aξ + bη] = a−1 (α) + b−1 (α) dα
AU
0
from Theorem 4 that the square ξ 2 is a regular LR
1 1
fuzzy number with the inverse credibility distribution −1
(−1 (α))2 . Then its expected value is =a (α)dα + b −1 (α)dα
0 0
1
E[ξ 2 ] = (−1 (α))2 dα. = aE[ξ] + bE[η].
0
Similarly, if a ≤ 0 and b ≥ 0, we have
Providing that ξ ∼ T(1, 2, 3) is a triangular fuzzy num-
1
ber, the inverse credibility distribution of ξ is −1 (α) =
E[aξ + bη] = a−1 (1 − α) + b−1 (α) dα
1 + 2α by means of (11). Hence the expected value of 0
ξ 2 is
1 1
1 =a −1 (α)dα + b −1 (α)dα
E[ξ 2 ] = (1 + 2α)2 dα = 13/3. 0 0
0
= aE[ξ] + bE[η].
Example 5.4. Let ξ1 and ξ2 be independent positive
regular LR fuzzy numbers with credibility distributions For simplicity, we only prove the above two cases. It
1 and 2 , respectively. Since f (x1 , x2 ) = x1 /x2 is a is easy to deduce that the other two cases (i.e., a ≥
strictly monotone function for x1 , x2 > 0, the quotient 0 and b ≤ 0; a ≤ 0 and b ≤ 0 ) can be also verified
84 J. Zhou et al. / Fuzzy arithmetic on LR fuzzy numbers with applications to fuzzy programming
similarly. That is, for any real numbers a and b, the Definition 11. A vector x is called a feasible solution
equality E[aξ + bη] = aE[ξ] + bE[η] holds. to the fuzzy programming model (27) if
Cr{gj (x, ξ) ≤ 0} ≥ αj
PY
work of fuzzy chance-constrained programming was
presented by Liu and Iwamura [19]. As a fuzzy ver- 6.2. Crisp equivalent model
sion of the chance-constrained programming in [1],
in this section, we present a fuzzy chance-constrained For the fuzzy programming model (27), if the fuzzy
programming model integrating the expected objective vector ξ consists of regular LR fuzzy numbers, a crisp
CO
with some chance constraints, and then show that the equivalent form can be obtained by using the following
model can be converted to a crisp equivalent mathemat- theorems.
ical model by using the proposed operational law.
Theorem 8. Assume that the objective function f (x, ξ1 ,
ξ2 , · · · , ξn ) is strictly increasing with respect to ξ1 , ξ2 ,
6.1. Fuzzy chance-constrained programming · · · , ξm and strictly decreasing with respect to ξm+1 ,
ξm+2 , · · · , ξn . If ξ1 , ξ2 , · · · , ξn are independent regular
OR
Assume that x is a decision vector, ξ = (ξ1 , ξ2 , · · · , LR fuzzy numbers, then the expected objective function
ξn ) is an n-dimensional fuzzy vector, f (x, ξ) is the E[f (x, ξ1 , ξ2 , · · · , ξn )] in model (27) equals to
objective function, and gj (x, ξ) is the constraint func- 1
tion for j = 1, 2, · · · , p. Since the objective function f (x, −1 −1
1 (α), · · · , m (α),
f (x, ξ) is also a fuzzy variable, it cannot be minimized 0
TH
Then we have a set of chance constraints as follows, Proof. It follows from Theorem 4 that the inverse cred-
ibility distribution of f (x, ξ1 , ξ2 , · · · , ξn ) is
Cr{gj (x, ξ) ≤ 0} ≥ αj , j = 1, 2, · · · , p. −1 (x, α) = f (x, −1 −1
1 (α), · · · , m (α),
gj (x, −1 −1
1 (α), · · · , kj (α),
ming and classical programming except for an integral.
Thus we may solve such type of fuzzy optimization
−1 −1
kj +1 (1 − α), · · · , n (1 − α)) ≤ 0 problems within the framework of classic deter-
ministic optimization requiring no particular solving
where −1i is the inverse credibility distribution of ξi techniques.
for i = 1, 2, · · · , n.
6.3. Numerical example
Proof. It follows from the operational law in The-
orem 4 that the inverse credibility distribution of In the following, a purchasing planning problem is
gj (x, ξ1 , ξ2 , · · · , ξn ) is given to illustrate the solution framework of fuzzy pro-
gramming via the proposed fuzzy arithmetic operations.
−1 (x, α) = gj (x, −1 −1
j (α), · · · , kj (α), Consider a company which plans to purchase some
PY
−1 −1 machines to build a new plant. This plant is to sup-
kj +1 (1 − α), · · · , n (1 − α)).
ply three types of components for its downstream
On the other hand, it is obvious that (28) holds if and plant in this company. Each type of component is pro-
only if −1 (x, α) ≤ 0. duced by different machines, and thus three types of
machines should be purchased. Denote by xi the num-
CO
Theorem 10. Assume that f (x, ξ1 , ξ2 , · · · , ξn ) is ber of the i-th type of machine purchased for i = 1, 2, 3,
strictly increasing with respect to ξ1 , ξ2 , · · · , ξm and respectively.
strictly decreasing with respect to ξm+1 , ξm+2 , · · · , ξn , The price of the i-th type of machine is ai , and the
and gj (x, ξ1 , ξ2 , · · · , ξn ) is strictly increasing with total capital available for this procurement plan is a.
respect to ξ1 , ξ2 , · · · , ξkj and strictly decreasing with Then we have a constraint on the capital budgeting as
respect to ξkj +1 , ξkj +2 , · · · , ξn for j = 1, 2, · · · , p.
a1 x1 + a2 x2 + a3 x3 ≤ a.
OR
0
⎪
⎪
the total available space. Then we have the following
⎪
⎪ −1 −1
⎪ m+1 (1 − α), · · · , n (1 − α))dα.
constraint,
⎪
⎪
⎪
⎪
⎪
⎨ b1 x1 + b2 x2 + b3 x3 ≤ b.
subject to :
⎪
⎪ The production capacity of the i-th type of machine
⎪ gj (x, −1 −1
1 (αj ), · · · , kj (αj ),
AU
⎪
⎪
⎪
⎪ is ηi , and the demand of the i-th type of component
⎪
⎪
⎪
⎪ produced by the i-th type of machine from the down-
⎪
⎪ −1 −1
kj +1 (1 − αj ), · · · , n (1 − αj )) ≤ 0,
⎪
⎪ stream plant is ξi , i = 1, 2, 3. Since the demand should
⎪
⎩ be fulfilled, that is, shortage is not allowed, we have
j = 1, 2, · · · , p
ηi xi ≥ ξi , i = 1, 2, 3. In practice, the production capac-
(29)
ity ηi and the future demand ξi are usually uncertain.
where −1 i is the inverse credibility distribution of ξi Here we suppose that they are fuzzy variables. In this
for i = 1, 2, · · · , n.
case, ηi xi ≥ ξi does not define a crisp constraint. If the
Proof. It follows from Theorems 8 and 9 immediately. manager sets αi as the confidence level to be achieved
of meeting the demands of the i-th type of component,
As a result, based upon Theorem 10, if the objective then we have the following chance constraints,
function f (x, ξ) and the constraint functions gj (x, ξ), Cr{ηi xi ≥ ξi } ≥ αi , i = 1, 2, 3.
j = 1, 2, . . . , p, are strictly monotone and ξ consists of
independent regular LR fuzzy numbers, we can con- Assume that the profit produced by per i-th type of
vert the fuzzy programming model (27) to the crisp machine is τi for i = 1, 2, 3. Then the total profit is
model (29). From the mathematical viewpoint, there is τ1 x1 + τ2 x2 + τ3 x3 . The profits τi , i = 1, 2, 3, are allo-
no difference between the crisp mathematical program- cated by the company according to the sales of its final
86 J. Zhou et al. / Fuzzy arithmetic on LR fuzzy numbers with applications to fuzzy programming
products, which are usually affected by season, com- which can be easily solved by classical numerical meth-
petitors and other factors. Consequently, the profits are ods or intelligent algorithms.
assumed as fuzzy variables in this paper, and the objec- For example, according to model (31) and the data
tive is to maximize the expected value of the total profit, listed in Table 1, we obtain the following linear integer
i.e., programming model,
⎧
E[τ1 x1 + τ2 x2 + τ3 x3 ]. ⎪
⎪ max 4.25x1 + 6.25x2 + 4.5x3
⎪
⎪
⎪
⎪
In the end, we have the following integer program- ⎪
⎪ subject to :
⎪
⎪
ming model for this purchasing planning problem, ⎪
⎪ 5x1 + 6x2 + 4x3 − 600 ≤ 0
⎪
⎪
⎧ ⎪
⎪
⎪ max E[τ1 x1 + τ2 x2 + τ3 x3 ] ⎨ 7x1 + 6x2 + 8x3 − 800 ≤ 0
⎪
⎪
⎪
⎪ (32)
⎪
⎪ ⎪
⎪ 204.8990 − 17.1283x1 ≤ 0
PY
⎪ subject to : ⎪
⎪
⎪ ⎪
⎪
⎪
⎪ ⎪
⎪ 186.1237 − 25.2138x2 ≤ 0
⎪
⎨ a1 x1 + a2 x2 + a3 x3 ≤ a ⎪
⎪
⎪
⎪
(30) ⎪
⎪ 207.3485 − 21.1711x3 ≤ 0
⎪ b1 x 1 + b 2 x 2 + b 3 x 3 ≤ b ⎪
⎪
⎪
⎪ ⎪
⎩
⎪
⎪ xi are positive integers, i = 1, 2, 3.
⎪
⎪
⎪
CO
⎪
⎪ Cr{ηi xi ≥ ξi } ≥ αi , i = 1, 2, 3
⎪
⎪ By using LINGO, the optimal total profit is obtained as
⎪
⎩
xi are positive integers, i = 1, 2, 3. 627.5, and the optimal solution is
Providing that ξi , ηi and τi are independent regular (x1∗ , x2∗ , x3∗ ) = (12, 62, 42).
LR fuzzy numbers with credibility distribution ϒi , i
and i , respectively, i = 1, 2, 3, then we can convert Obviously, model (30) with parameters listed in
OR
model (30) to the following deterministic form accord- Table 1 is hard to be solved by traditional approaches but
ing to Theorem 10, fuzzy simulation (which has been suggested in [17]),
⎧ 1 1 since three types of fuzzy numbers, i.e., Gaussian fuzzy
⎪
⎪ −1
+ −1
numbers, Cauchy fuzzy numbers, and triangular fuzzy
⎪
⎪ max x 1 1 (α)dα x 2 2 (α)dα
⎪
⎪ 0 0 numbers, simultaneously appear in the same model,
⎪
⎪ 1
⎪
⎪ which makes it more complicated. However, as shown
−1
TH
⎪
⎪ + x3 3 (α)dα
⎪
⎪ in models (31) and (32), it can be transformed to a deter-
⎪
⎪
0
⎨ subject to : ministic form and then be easily solved by classical
methods following from the proposed solution frame-
⎪
⎪ a 1 x1 + a 2 x2 + a 3 x3 ≤ a
⎪
⎪ work of fuzzy programming with parameters of regular
⎪
⎪ b1 x 1 + b 2 x 2 + b 3 x 3 ≤ b
⎪
⎪ LR fuzzy numbers.
AU
⎪
⎪
⎪
⎪
⎪
⎪ ϒi−1 (αi ) − xi i−1 (1 − αi ) ≤ 0, i = 1, 2, 3
⎪
⎪
⎩
xi are positive integers, i = 1, 2, 3, 7. Conclusion
(31)
In this paper, we mainly concentrated on the fuzzy
Table 1 arithmetic on regular LR fuzzy numbers. The major
Parameter values of the purchasing planning problem results of this study include the following aspects: 1)
Parameter Value Parameter Value the notion of regular LR fuzzy number was defined, and
η1 N(20, 3) a1 5 it is proved that a fuzzy number is a regular LR fuzzy
η2 N(30, 5) a2 6 number if and only if it is a regular fuzzy number. In
η3 N(25, 4) a3 4 other words, it has a continuous and strictly increas-
ξ1 C(200, 4) b1 7
ξ2 C(180, 5) b2 6 ing credibility distribution; 2) an operational law for
ξ3 C(210, 6) b3 8 independent regular LR fuzzy numbers was proposed
τ1 T(3, 4, 6) α1 0.8 for fuzzy arithmetic; 3) an equivalent definition of the
τ2 T(5, 6, 8) α2 0.8 expected value operator and a theorem for calculat-
τ3 T(2, 5, 6) α3 0.8
ing the expected value of strictly monotone functions
a 600 b 800
were represented; 4) a solution framework of fuzzy
J. Zhou et al. / Fuzzy arithmetic on LR fuzzy numbers with applications to fuzzy programming 87
programming was constructed based on the proposed [16] G.J. Klir, Fuzzy arithmetic with requisite constraints, Fuzzy Sets
operational law. and Systems 91(2) (1997), 165–175.
[17] B. Liu, Theory and Practice of Uncertain Programming,
Springer, 2002.
[18] B. Liu, Uncertainty Theory, Springer, 2004.
Acknowledgments [19] B. Liu and K. Iwamura, Chance-constrained programming
with fuzzy parameters, Fuzzy Sets and Systems 94(2) (1998),
227–237.
This work was supported in part by a grant from the [20] B. Liu and Y. Liu, Expected value of fuzzy variable and fuzzy
Ministry of Education Funded Project for Humanities expected value models, IEEE Transactions on Fuzzy Systems
and Social Sciences Research (No. 14YJC630124). 10(4) (2002), 445–450.
[21] B. Liu and Y. Liu, Expected value operator of random fuzzy
variable and random fuzzy expected value models, Interna-
tional Journal of Uncertainty, Fuzziness & Knowledge-Based
References Systems 11(2) (2003), 195–215.
PY
[22] Y. Liu and J. Gao, The independence of fuzzy variables in
[1] A. Charnes and W.W. Cooper, Management Models and Indus- credibility theory and its applications, International Journal of
trial Applications of Linear Programming, Wiley, 1961. Uncertainty, Fuzziness & Knowledge-Based Systems 15(Supp
[2] C.C. Chou, The canonical representation of multiplication oper- 2) (2007), 1–20.
ation on triangular fuzzy numbers, Computers & Mathematics [23] K.U. Madhuri, S.S. Babu and N.R. Shankar, Fuzzy risk analysis
with Applications 45(10) (2003), 1601–1610. based on the novel fuzzy ranking with new arithmetic operations
CO
[3] R. Chutia, S. Mahanta and D. Datta, Arithmetic of triangular of linguistic fuzzy numbers, Journal of Intelligent and Fuzzy
fuzzy variable from credibility theory, International Journal of Systems 26(5) (2014), 2391–2401.
Energy, Information and Communications 2(3) (2011), 9–20. [24] S. Nahmias, Fuzzy variables, Fuzzy Sets and Systems 1(2)
[4] D. Dubois and P. Prade, Operations on fuzzy numbers, Interna- (1978), 97–110.
tional Journal of Systems Science 9(6) (1978), 613–626. [25] B. Pushpa and R. Vasuki, Estimation of confidence level ‘h’ in
[5] D. Dubois and P. Prade, The mean value of a fuzzy number, fuzzy linear regression analysis using shape preserving opera-
Fuzzy Sets and Systems 24(3) (1987), 279–300. tions, International Journal of Computer Applications 68(17)
[6] D. Dubois and P. Prade, Possibility Theory, Plenum Press, 1988. (2013), 19–25.
OR
[7] R. Eslamipoor, M.J. Haji and A. Sepehriar, Proposing a revised [26] R. Saneeifard, Ranking LR fuzzy numbers with weighted
method for ranking fuzzy numbers, Journal of Intelligent and averaging based on levels, International Journal of Industrial
Fuzzy Systems 25(2) (2013), 373–378. Mathematics 1(2) (2009), 163–173.
[8] R.E. Giachetti and R.E. Young, Analysis of the error in the [27] L. Sorini and L. Stefanini, Some parametric forms for LR fuzzy
standard approximation used for multiplication of triangular numbers and LR fuzzy arithmetic, In 9th International Confer-
and trapezoidal fuzzy numbers and the development of a new ence on Intelligent Systems Design and Applications, Pisa, Italy,
approximation, Fuzzy Sets and Systems 91(1) (1997), 1–13. 2009, pp. 312–317.
TH
[9] R.E. Giachetti and R.E. Young, A parametric representation of [28] H.F. Wang and C.Y. Kuo, Three-parameter fuzzy arithmetic
fuzzy numbers and their arithmetic operators, Fuzzy Sets and approximation of LR fuzzy numbers for fuzzy neural networks,
Systems 91(2) (1997), 185–202. International Journal of Uncertainty, Fuzziness & Knowledge-
[10] M.L. Guerra and L. Stefanini, Approximate fuzzy arithmetic Based Systems 14(2) (2006), 211–233.
operations using monotonic interpolations, Fuzzy Sets and Sys- [29] R. Yager, A procedure for ordering fuzzy subsets of the unit
tems 150(1) (2005), 5–33. interval, Information Sciences 24(2) (1981), 143–161.
AU
[11] M.J. Haji, H.K. Zare, R. Eslamipoor and A. Sepehriar, A devel- [30] R. Yager, On the specificity of a possibility distribution, Fuzzy
oped distance method for ranking generalized fuzzy numbers, Sets and Systems 50(3) (1992), 279–292.
Neural Computing and Applications 25(3-4) (2014), 727–731. [31] L.A. Zadeh, Fuzzy sets, Information and Control 8(3) (1965),
[12] A. Hatami and H. Kazemipoor, Solving fully fuzzy linear pro- 338–353.
gramming with symmetric trapezoidal fuzzy numbers using [32] L.A. Zadeh, The concept of a linguistic variable and its appli-
Mehar’s method, Journal of Mathematical and Computational cation to approximate reasoning-I, Information Sciences 8(3)
Science 4(2) (2014), 463–470. (1975), 199–249.
[13] S. Heilpern, The expected value of a fuzzy number, Fuzzy Sets [33] L.A. Zadeh, Fuzzy sets as a basis for a theory of possibility,
and Systems 47(1) (1992), 81–86. Fuzzy Sets and Systems 1(1) (1978), 3–28.
[14] A. Kaufmann and M.M. Gupta, Fuzzy Mathematical Models in [34] L.A. Zadeh, A theory of approximate reasoning, in: Mathemati-
Engineering and Management Science, Plenum Press, 1988. cal Frontiers of the Social and Policy Sciences, Westview Press,
[15] J. Kaur and A. Kumar, Mehar’s method for solving fully 1979, pp. 69–129.
fuzzy linear programming problems with LR fuzzy parameters, [35] H.J. Zimmermann, Fuzzy Set Theory and Its Applications,
Applied Mathematical Modelling 37(12) (2013), 7142–7153. Kluwer, 1991.