Next Article in Journal
Regression of the Rician Noise Level in 3D Magnetic Resonance Images from the Distribution of the First Significant Digit
Previous Article in Journal
A Hybrid DEMATEL and Bayesian Best–Worst Method Approach for Inland Port Development Evaluation
Previous Article in Special Issue
n-K-Increasing Aggregation Functions
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Developing Constrained Interval Operators for Fuzzy Logic with Interval Values

by
Jocivania Pinheiro
1,*,
Regivan H. N. Santiago
2,*,
Benjamin Bedregal
2 and
Flaulles Bergamaschi
3
1
Departamento de Ciências Naturais, Matemática e Estatística, Universidade Federal Rural do Semi-Árido, Mossoró 59625-900, Brazil
2
Departamento de Informática e Matemática Aplicada, Universidade Federal do Rio Grande do Norte, Natal 59072-970, Brazil
3
Departamento de Ciências Exatas e Tecnológicas, Universidade Estadual do Sudoeste da Bahia (UESB), Vitória da Conquista 45083-900, Brazil
*
Authors to whom correspondence should be addressed.
Axioms 2023, 12(12), 1115; https://doi.org/10.3390/axioms12121115
Submission received: 10 October 2023 / Revised: 23 November 2023 / Accepted: 7 December 2023 / Published: 13 December 2023

Abstract

:
A well-known problem in the interval analysis literature is the overestimation and loss of information. In this article, we define new interval operators, called constrained interval operators, that preserve information and mitigate overestimation. These operators are investigated in terms of correction, algebraic properties, and orders. It is shown that a large part of the properties studied is preserved by this operator, while others remain preserved with the condition of continuity, as is the case of the exchange principle. In addition, a comparative study is carried out between this operator g ¨ and the best interval representation: g ^ . Although g ¨ g ^ and g ¨ do not preserve the Moore correction, we do not have a loss of relevant information since everything that is lost is irrelevant, mitigating the overestimation.

1. Introduction

Fuzzy logic is very successful in dealing with uncertainties related to fuzzy rules; however, this success does not extend to when referring to input–outputs, since they are assumed to be exact, i.e., values in [ 0 , 1 ] . In cases in which the fuzzification of inputs derives from choices made by experts and they are unsure about the value to use in to system, fuzzy logic is not always suitable. Another case lies in the situation in which the input data have impreciseness. In order to overcome this structure, interval-valued fuzzy logic has been suggested. This interval logic is a particular case of interval type-2 fuzzy logic [1,2,3,4,5,6].
Interval-valued fuzzy logic has been applied in a wide variety of domains; for example, Melin and Castillo [7] used it in the context of plant control; Figueroa et al. [8] used it for non-autonomous robots in the context of a robot football game; Lynch et al. [9] built an interval control system for large marine diesel engines; Chourasia et al. [10] developed a new method for assessing fetal health status based on interval type-2 fuzzy logic through fetal phonocardiography; Nguyen et al. [11] used the wavelet feature in an interval type-2 fuzzy logic system (IT2FLS) to reduce the computation burden and time of IT2FLS; Leow et al. [12] developed a hybrid of generalized adaptive resonance theory (GART) and an interval type-2 fuzzy logic system algorithm; among many others [5,6].
On the other hand, another field of great importance for this work, interval analysis, was developed in order to limit rounding errors and deal with inaccuracies. This field was first presented by Warmus [13], Sunaga [14], and Moore [15]. However, it can be said that interval mathematics and analysis began with the appearance of R. E. Moore’s book, Interval Analysis, in 1966 [16]. Moore’s arithmetic is accepted as the standard approach and is called standard interval arithmetic (SIA). Interval analysis has been applied in several areas, like electrical power systems [17], mechanical engineering [18], chemical engineering [19], artificial intelligence [20], multi-agent systems [21], and geophysics [22].
In interval analysis, there are two most important criteria, namely correctness (accuracy) and optimality [23,24]. The first criterion establishes that the result of an interval computation must always contain the value of the respective real function (see [24] (Theorem 3.1)). Although correctness is a desirable property, not every interval method is correct. Santiago et al. [25,26] and Bedregal and Santiago [27] investigate the notion of correctness for interval functions and its impact on some interval topological viewpoints. They call correctness interval representations since interval entities (algorithms and intervals) are seen as entities that represent exact entities (functions and numbers). An interval function, F, is said to represent a real function, f, whenever it satisfies the following property: x [ a , b ] f ( x ) F ( [ a , b ] ) and F ( [ a , a ] ) = f ( a ) . The second criterion establishes that the resulting interval of a computation should not be greater than necessary, which is captured by the notion of canonical interval representation.
In order to solve the algebraic incompatibility between the real arithmetic and Moore arithmetic, Lodwick [28,29] defined a new interpretation for intervals called constraint intervals. With this new approach, Lodwick proposed an alternative to Moore arithmetic on intervals in order to have X X = [ 0 , 0 ] , X ÷ X = [ 1 , 1 ] if 0 X and the distributive property. This new arithmetic, called constrained interval arithmetic (CIA), is an extension of Moore’s interval arithmetic, in the sense that they coincide in the case where there is no variable dependence and are distinct when there are dependencies. In this case, the CIA presents a smaller width interval, thus improving the overestimation of Moore’s arithmetic [30]. Actually, CIA has been used to solve several mathematical problems, such as in [30,31,32].
In order to solve, or mitigate, the problems related to overestimation and loss of information when working with intervals, in this article, we present a new approach to fuzzy logic with interval values, in which interval operators preserve some of the main algebraic properties, the overestimation problem is mitigated, and there is no loss of information. These operators were defined by using the constrained intervals introduced by Lodwick [28]. In what follows, it is described how this study was performed and also the contributions that were studied or compared with this new approach.
The new operators, called constrained interval operators, in the proposed new approach to interval-valued fuzzy logic are very close to Moore’s correctness. In fact, they satisfy a new correction, which was called here constraint interval correctness, which is as efficient as Moore’s correction, in the sense of not losing information; however, they are less demanding and, in turn, work with less irrelevant information. The main properties of this operator have been verified about two orders, namely Kulisch–Miranker and Moore order. It has been found that this new approach guarantees the extension of many algebraic properties and that its fuzzy operators are extended to their respective constrained interval operators when considering the order of Kulisch–Miranker as in [27,33].
This paper is organized as follows: Section 2 recalls some definitions and concepts used throughout the text in order to provide a self-contained document. Section 3 proposes a new way of making interval-valued fuzzy logic in which the operators are called constrained interval operators. The last chapters includes the conclusions and bibliography.

2. Preliminaries

In this section, we present the concepts and results that we will use in this work.

2.1. Fuzzy Connectives

Classical conjunctions, negations, and implications are generalized to fuzzy logic by the operators t-norms, fuzzy negations, and fuzzy implications, respectively, and these are among the most important operators in fuzzy logic. The definitions are provided below:
Definition 1 
([34]). A binary function T: [ 0 , 1 ] 2 [ 0 , 1 ] is said to be a triangular norm (t-norm for short) if it is increasing, symmetric, associative, and satisfies the boundary condition T ( x , 1 ) = x for all x [ 0 , 1 ] .
In the following, we recall the notion of fuzzy negation.
Definition 2. 
A unary function N: [ 0 , 1 ] [ 0 , 1 ] is called fuzzy negation if the following conditions are satisfied:
(N1)
N ( 0 ) = 1 and N ( 1 ) = 0 ;
(N2)
N ( x ) N ( y ) whenever y x .
It is called strong if it satisfies N ( N ( x ) ) = x for all x [ 0 , 1 ] .
Example 1. 
Here are two special examples of fuzzy negation:
N ( x ) = 1 , i f x = 0 0 , i f x > 0
and
N ( x ) = 0 , i f x = 1 1 , i f x < 1 .
The first is known as less fuzzy negation, N , since N N , and the second is known as greater fuzzy negation, N , since N N , for every fuzzy negation N.
Fuzzy implication generalizes the usual material implication. In what follows, we present the definition and some of its properties.
Definition 3. 
A binary function I : [ 0 , 1 ] 2 [ 0 , 1 ] is called fuzzy implication if it satisfies the following conditions for all x , y , z [ 0 , 1 ] :
(I1)
If x y , then I ( y , z ) I ( x , z ) for all z [ 0 , 1 ] ;
(I2)
If y z , then I ( x , y ) I ( x , z ) for all x [ 0 , 1 ] ;
(I3)
I ( 0 , y ) = 1 for all y [ 0 , 1 ] ;
(I4)
I ( x , 1 ) = 1 for all x [ 0 , 1 ] ;
(I5)
I ( 1 , 0 ) = 0 .
We will denote the set of all fuzzy implications by FI .
We present below some important properties of some fuzzy implications that will be used in this work (see [35,36,37]). To perform this, consider a fuzzy implication I, x , y , z [ 0 , 1 ] :
(IP)
The identity property: I ( x , x ) = 1 ;
(NP)
The left neutrality property: I ( 1 , y ) = y ;
(OP)
The order property: I ( x , y ) = 1 iff x y ;
(EP)
The exchange principle: I ( x , I ( y , z ) ) = I ( y , I ( x , z ) ) ;
(CP)
Contraposition law with respect to N: I ( x , y ) = I ( N ( y ) , N ( x ) ) ;
(LCP)
Left contraposition law with respect to N: I ( N ( x ) , y ) = I ( N ( y ) , x ) ;
(RCP)
Right contraposition law with respect to N: I ( x , N ( y ) ) = I ( y , N ( x ) ) .
We will use the notation C P ( N ) to represent that I satisfies the contraposition property in relation to fuzzy negation N. Similarly, we will use L C P ( N ) and R C P ( N ) for the left and right contraposition properties, respectively.

2.2. Interval Operators and Moore’s Correctness

We will denote by U ( [ 0 , 1 ] ) the set of all intervals closed in [ 0 , 1 ] ; that is, U ( [ 0 , 1 ] ) = { [ x , y ] 0 x y 1 } . We will further denote X = [ x ̲ , x ¯ ] for all X U ( [ 0 , 1 ] ) . Let U ( [ 0 , 1 ] ) , be a bounded poset [ 0 , 0 ] as the bottom element and [ 1 , 1 ] as the top element.
Definition 4 
([38]). A fuzzy negation N : U ( [ 0 , 1 ] ) U ( [ 0 , 1 ] ) on U ( [ 0 , 1 ] ) , , called interval fuzzy negation, is decreasing and satisfies N ( [ 0 , 0 ] ) = [ 1 , 1 ] and N ( [ 1 , 1 ] ) = [ 0 , 0 ] . If N ( N ( X ) ) = X , X U ( [ 0 , 1 ] ) ; then, N is called strong interval fuzzy negation.
Definition 5 
([38]). A function T : U ( [ 0 , 1 ] ) 2 U ( [ 0 , 1 ] ) is an interval triangular norm (it-norm) on U ( [ 0 , 1 ] ) , if it is commutative, associative, increasing, and satisfies T ( X , [ 1 , 1 ] ) = X for all X U ( [ 0 , 1 ] ) .
Definition 6. 
A fuzzy implication I : U ( [ 0 , 1 ] ) 2 U ( [ 0 , 1 ] ) on U ( [ 0 , 1 ] ) , , called interval fuzzy implication, satisfies the following conditions, A 1 , A 2 , A 3 U ( [ 0 , 1 ] ) :
(II1)
If A 1 A 2 then I ( A 2 , A 3 ) I ( A 1 , A 3 ) ;
(II2)
If A 2 A 3 then I ( A 1 , A 2 ) I ( A 1 , A 3 ) ;
(II3)
I ( [ 0 , 0 ] , A 2 ) = [ 1 , 1 ] ;
(II4)
I ( A 1 , [ 1 , 1 ] ) = [ 1 , 1 ] ;
(II5)
I ( [ 1 , 1 ] , [ 0 , 0 ] ) = [ 0 , 0 ] .
We present below some important properties of some interval fuzzy implications that will be verified in this work.
Definition 7. 
An interval fuzzy implication I on U ( [ 0 , 1 ] ) , is said to satisfy, A 1 , A 2 , A 3 U ( [ 0 , 1 ] ) :
(i) 
The interval identity property if
I ( A 1 , A 1 ) = 1 ;   (I-IP)
(ii) 
The interval left neutrality property if
I ( 1 , A 2 ) = A 2 ;   (I-NP)
(iii) 
The interval order property if
I ( A 1 , A 2 ) = 1 iff A 1 A 2 ;   (I-OP)
(iv) 
The interval exchange principle if
I ( A 1 , I ( A 2 , A 3 ) ) = I ( A 2 , I ( A 1 , A 3 ) ) .    (I-EP)
Definition 8 
([36]). Let I be an interval fuzzy implication and N be an interval fuzzy negation on U ( [ 0 , 1 ] ) , . I is said to satisfy, A 1 , A 2 U ( [ 0 , 1 ] ) :
(i) 
Interval contraposition law with respect to N if
I ( A 1 , A 2 ) = I ( N ( A 2 ) , N ( A 1 ) ) ;   (I-CP)
(ii) 
Interval left contraposition law with respect to N if
I ( N ( A 1 ) , A 2 ) = I ( N ( A 2 ) , A 1 ) ;   (I-LCP)
(iii) 
Interval right contraposition law with respect to N if
I ( A 1 , N ( A 2 ) ) = I ( A 2 , N ( A 1 ) ) .   (I-RCP)
In interval mathematics, there are two important criteria called correctness (accuracy) and optimality [23,24]. They were formalized by Santiago et al. in [26] and called interval representation and best interval representation:
Definition 9 
([39]). An interval operation F : U ( [ 0 , 1 ] ) n U ( [ 0 , 1 ] ) is Moore-correct or interval representation with respect to a function f : [ 0 , 1 ] n [ 0 , 1 ] whenever, for all ( A 1 , , A n ) U ( [ 0 , 1 ] ) n and a i A i , f ( a 1 , , a n ) F ( A 1 , , A n ) . In addition, F is the best interval representation with respect to function f, denoted by f ^ , if F ( A 1 , , A n ) is the last interval containing the set { f ( a 1 , , a n ) a i A i } for all A i U ( [ 0 , 1 ] ) and i { 1 , , n } , i.e.,
f ^ ( A 1 , , A n ) = inf { f ( a 1 , , a n ) a i A i } , sup { f ( a 1 , , a n ) a i A i } .

2.3. Constrained Interval Arithmetic

One of the problems with Moore’s arithmetic is that the equalities A A = [ 0 , 0 ] and A ÷ A = [ 1 , 1 ] are not always valid. Then, in 1999, Lodwick [28] proposed a new way of interpreting intervals, called constraint intervals, in which the previously mentioned problems were solved for all A U ( [ 0 , 1 ] ) such that 0 A . In what follows, we will provide a slight change in the definition and notation given by Lodwick:
Definition 10. 
Given an interval A = [ a ̲ , a ¯ ] U ( [ 0 , 1 ] ) a constrained interval associated to A is the function f A : [ 0 , 1 ] [ 0 , 1 ] such that, for 0 λ a 1 ,
f A ( λ a ) = ( 1 λ a ) a ̲ + λ a a ¯ = a ̲ + λ a ω a ,
where ω a = a ¯ a ̲ (the width of A).
Remark 1. 
Given A U ( [ 0 , 1 ] ) , for each a A there exists λ a [ 0 , 1 ] such that a = f A ( λ a ) ; that is, each a A is the image of λ a by the increasing convex constrained function f A .
The resulting arithmetic, called constrained interval arithmetic (CIA), is defined as follows:
f A 1 ( λ a 1 ) f A 2 ( λ a 2 ) ,
for λ a 1 , λ a 2 [ 0 , 1 ] and { + , , × , ÷ } , where the resulting interval is:
A 1 A 2 = min 0 λ a 1 , λ a 2 1 { f A 1 ( λ a 1 ) f A 2 ( λ a 2 ) } , max 0 λ a 1 , λ a 2 1 { f A 1 ( λ a 1 ) f A 2 ( λ a 2 ) } .
For this arithmetic, the desirable properties apply; that is, A A = [ 0 , 0 ] , A ÷ A = [ 1 , 1 ] and the distributive property A 1 × ( A 2 + A 3 ) = ( A 1 × A 2 ) + ( A 1 × A 3 ) . Note that Moore’s interval arithmetic is extended by this new arithmetic since, when there is no dependence, they coincide, and when there is dependence, they are distinct. We can conclude that CIA arithmetic improves the overestimation of Moore’s arithmetic since it presents a smaller width interval.
Example 2. 
Given the intervals A 1 = [ 1 , 2 ] and A 2 = [ 1 , 1 ] , we will calculate the expression A 1 + A 2 A 1 using the two arithmetics—Moore and CIA—and see the improvement in interval overestimation in CIA arithmetic. First, using Moore’s arithmetic, we obtain A 1 + A 2 A 1 = ( [ 1 , 2 ] + [ 1 , 1 ] ) [ 1 , 2 ] = [ 0 , 3 ] [ 1 , 2 ] = [ 2 , 2 ] . Now, using CIA arithmetic, f A 1 ( λ a 1 ) = 1 + λ a 1 and f A 2 ( λ a 2 ) = 1 + 2 λ a 2 ; then, ( f A 1 ( λ a 1 ) + f A 2 ( λ a 2 ) ) f A 1 ( λ a 1 ) = f A 2 ( λ a 2 ) and therefore A 1 + A 2 A 1 = A 2 = [ 1 , 1 ] .

3. Constraint Interval Fuzzy Operators

In this section, following the same approach as Lodwick [28], we introduce the constrained interval operators, in which the two lambdas, including λ 1 and λ 2 , are considered when there is no dependence. The constrained interval operators were investigated in terms of correction, algebraic properties, and orders. In addition, a comparative study was carried out between these operators and an operator well known in the literature.
Definition 11. 
Let A = [ a ̲ , a ¯ ] U ( [ 0 , 1 ] ) in any interval. Then,
(i) 
A function F A : [ 0 , 1 ] [ 0 , 1 ] such that
inf 0 λ a 1 F A ( λ a ) = a ̲
and
sup 0 λ a 1 F A ( λ a ) = a ¯ ,
will be called a constraint function associated to A.
(ii) 
Associated to the interval A, we define the increasing convex constraint function f A : [ 0 , 1 ] [ 0 , 1 ] by means
f A ( λ a ) = ( 1 λ a ) a ̲ + λ a a ¯ , 0 λ a 1 ,
or, equivalently,
f A ( λ a ) = a ̲ + λ a ( a ¯ a ̲ ) , 0 λ a 1 .
(iii) 
Associated to the interval A, we define the decreasing convex constraint function f A : [ 0 , 1 ] [ 0 , 1 ] by means
f A ( λ a ) = λ a a ̲ + ( 1 λ a ) a ¯ , 0 λ a 1 ,
or, equivalently,
f A ( λ a ) = a ¯ + λ a ( a ̲ a ¯ ) , 0 λ a 1 .
Observe that the same interval can be determined by different constraint functions. However, each interval is associated with a single increasing convex constraint function and two different intervals determine two different increasing convex constraint functions (i.e., there is a bijection between the space of intervals and the space of increasing (decreasing) convex constrained functions).
Remark 2. 
Given A U ( [ 0 , 1 ] ) , for each a A , there exists λ a [ 0 , 1 ] such that a = f A ( λ a ) ; that is, each a A is the image of λ a by the function f A .
An analogous development can be carried out using the decreasing convex constraint functions. However, in this article, we will use increasing convex constraint functions.
Definition 12. 
The operator g ¨ : U ( [ 0 , 1 ] ) n U ( [ 0 , 1 ] ) , called the constraint interval operator, associated with the function g: [ 0 , 1 ] n [ 0 , 1 ] is defined by, for all intervals A 1 , , A n ,
1.
If A j A k for any j k , then g ¨ ( A 1 , , A n ) is
inf 0 λ a i 1 { g ( f A 1 ( λ a 1 ) , , f A n ( λ a n ) ) } , sup 0 λ a i 1 { g ( f A 1 ( λ a 1 ) , , f A n ( λ a n ) ) } ;
2.
If A j 1 = = A j k = A for k n and for some j i { 1 , , n } with j r j s if r s , then g ¨ ( A 1 , , A , , A , , A n ) is
[ inf 0 λ a i , λ a 1 { g ( f A 1 ( λ a 1 ) , , f A j 1 ( λ a ) , , f A j k ( λ a ) , , f A n ( λ a n ) ) } , sup 0 λ a i , λ a 1 { g ( f A 1 ( λ a 1 ) , , f A j 1 ( λ a ) , , f A j k ( λ a ) , , f A n ( λ a n ) ) } ] .
We denote g ¨ ( A 1 , , A n ) ̲ and g ¨ ( A 1 , , A n ) ¯ as the endpoints
inf 0 λ a i 1 { g ( f A 1 ( λ a 1 ) , , f A n ( λ a n ) ) }
and
sup 0 λ a i 1 { g ( f A 1 ( λ a 1 ) , , f A n ( λ a n ) ) } ,
respectively.
It can be easily noticed that when there is no dependence on the input intervals, we have a different parameter for each interval; that is, different intervals are traversed at different levels ( λ a i , for i { 1 , 2 , , n } ). In the case of dependency, we have a single parameter for equal intervals, so they are traversed at the same level ( λ a ). Therefore, the resulting interval has less irrelevant information, and pieces of information are not lost; see Remark 6.
Example 3. 
1.
Let N: [ 0 , 1 ] [ 0 , 1 ] be the standard fuzzy negation; that is, N ( x ) = 1 x , so, A U ( [ 0 , 1 ] ) ,
N ¨ ( A ) = inf 0 λ a 1 { N ( f A ( λ a ) ) } , sup 0 λ a 1 { N ( f A ( λ a ) ) } = [ 1 a ¯ , 1 a ̲ ] .
2.
Let T: [ 0 , 1 ] 2 [ 0 , 1 ] be the minimum t-norm; that is, T ( x , y ) = m i n ( x , y ) , so, A 1 , A 2 U ( [ 0 , 1 ] ) ,
T ¨ ( A 1 , A 2 ) = inf 0 λ a i 1 { min ( f A 1 ( λ a 1 ) , f A 2 ( λ a 2 ) ) } , sup 0 λ a i 1 { min ( f A 1 ( λ a 1 ) , f A 2 ( λ a 2 ) ) } = [ min ( a 1 ̲ , a 2 ̲ ) , min ( a 1 ¯ , a 2 ¯ ) ] ,
since f A 1 and f A 2 are increasing.
3.
Consider the aggregation function g: [ 0 , 1 ] n [ 0 , 1 ] given by g ( x 1 , , x n ) = x 1 + + x n n . For all A 1 , , A n U ( [ 0 , 1 ] ) , since a i ̲ = f A i ( 0 ) f A i ( λ a i ) for all λ a i [ 0 , 1 ] , we have
a 1 ̲ + + a n ̲ n f A 1 ( λ a 1 ) + + f A n ( λ a n ) n
for all λ a i [ 0 , 1 ] and i { 1 , , n } . So,
a 1 ̲ + + a n ̲ n = inf 0 λ a i 1 f A 1 ( λ a 1 ) + + f A n ( λ a n ) n .
and, analogously,
a 1 ¯ + + a n ¯ n = sup 0 λ a i 1 f A 1 ( λ a 1 ) + + f A n ( λ a n ) n .
Therefore,
g ¨ ( A 1 , , A n ) = a 1 ̲ + + a n ̲ n , a 1 ¯ + + a n ¯ n .
The following proposition ensures that a constrained interval operator g ¨ coincides with its best representation g ^ whenever g is increasing.
Proposition 1. 
Let g : [ 0 , 1 ] n [ 0 , 1 ] be an increasing function. Then, A 1 , A 2 , , A n U ( [ 0 , 1 ] ) ,
g ¨ ( A 1 , A 2 , , A n ) = g ( a 1 ̲ , a 2 ̲ , , a n ̲ ) , g ( a 1 ¯ , a 2 ¯ , , a n ¯ ) .
Proof. 
Given any A 1 , A 2 , , A n U ( [ 0 , 1 ] ) , since the function f A i is increasing for all i { 1 , 2 , n } , we have a i ̲ = f A i ( 0 ) f A i ( λ a i ) , λ a i [ 0 , 1 ] . So, g ( a 1 ̲ , a 2 ̲ , , a n ̲ ) g ( f A 1 ( λ a 1 ) , f A 2 ( λ a 2 ) , , f A n ( λ a n ) ) for all λ a i [ 0 , 1 ] with i { 1 , 2 , , n } . Therefore,
g ( a 1 ̲ , a 2 ̲ , , a n ̲ ) = inf 0 λ a i 1 { g ( f A 1 ( λ a 1 ) , f A 2 ( λ a 2 ) , , f A n ( λ a n ) ) } .
Analogously,
g ( a 1 ¯ , a 2 ¯ , , a n ¯ ) = sup 0 λ a i 1 { g ( f A 1 ( λ a 1 ) , f A 2 ( λ a 2 ) , , f A n ( λ a n ) ) } .
Thus, g ¨ ( A 1 , A 2 , A n ) = g ( a 1 ̲ , a 2 ̲ , , a n ̲ ) , g ( a 1 ¯ , a 2 ¯ , , a n ¯ ) . □
Remark 3. 
An analogous result can be obtained if g is decreasing. In this case, we would have g ¨ ( A 1 , A 2 , , A n ) = g ( a 1 ¯ , a 2 ¯ , , a n ¯ ) , g ( a 1 ̲ , a 2 ̲ , , a n ̲ ) for all A 1 , A 2 , , A n U ( [ 0 , 1 ] ) .
Remark 4. 
We can conclude from the previous results that, if g is monotone, g ¨ is correct (Moore’s correctness) and coincides with the best interval representation of g; that is, g ¨ = g ^ (see Equation (1)).
Therefore, given an increasing function g, we have that g ¨ ( A 1 , A 2 ) = g ^ ( A 1 , A 2 ) , A 1 , A 2 U ( [ 0 , 1 ] ) . However, some fuzzy logical operators like implications are neither increasing nor decreasing, in which case we have situations like:
Example 4. 
Consider the Łukasiewicz implication I L K ( x , y ) = min ( 1 , 1 x + y ) and A U ( [ 0 , 1 ] ) as non-degenerate. Then, since I L K f A ( λ a ) , f A ( λ a ) = min ( 1 , 1 f A ( λ a ) + f A ( λ a ) ) = 1,
I ¨ L K ( A , A ) = inf 0 λ a 1 { I L K f A ( λ a ) , f A ( λ a ) } , sup 0 λ a 1 { I L K f A ( λ a ) , f A ( λ a ) } = [ 1 , 1 ]
and I L K ( a ¯ , a ̲ ) = min ( 1 , 1 a ¯ + a ̲ ) = a ̲ < a ¯ 1 a ¯ + a ̲ < 1 , in which case we have that I ¨ L K is not correct, since I L K ( a ¯ , a ̲ ) I ¨ L K ( A , A ) . However, the fuzzy implications satisfy the property presented in the following proposition:
Proposition 2. 
Let I be a fuzzy implication. Then, I ¨ ( A 1 , A 2 ) I ^ ( A 1 , A 2 ) for all A 1 , A 2 U ( [ 0 , 1 ] ) .
Proof. 
By Definition 12, for all A U ( [ 0 , 1 ] ) ,
I ¨ ( A , A ) = inf 0 λ a 1 { I f A ( λ a ) , f A ( λ a ) } , sup 0 λ a 1 { I f A ( λ a ) , f A ( λ a ) } .
So, since
{ I ( f A ( λ a ) , f A ( λ a ) ) λ a [ 0 , 1 ] } { I ( f A ( λ a ) , f A ( λ a ˜ ) ) λ a , λ a ˜ [ 0 , 1 ] } ,
we have, by Equation (1), I ¨ ( A , A ) I ^ ( A , A ) . Now, given any A 1 , A 2 U ( [ 0 , 1 ] ) with A 1 A 2 , we have that
I ¨ ( A 1 , A 2 ) = inf 0 λ a i 1 { I f A 1 ( λ a 1 ) , f A 2 ( λ a 2 ) } , sup 0 λ a i 1 { I f A 1 ( λ a 1 ) , f A 2 ( λ a 2 ) } = inf { I ( a 1 , a 2 ) a i A i } , sup { I ( a 1 , a 2 ) a i A i } = I ^ ( A 1 , A 2 ) .
Therefore, I ¨ ( A 1 , A 2 ) I ^ ( A 1 , A 2 ) , A 1 , A 2 U ( [ 0 , 1 ] ) . □
Remark 5. 
Considering any fuzzy implication I, given A 1 , A 2 U ( [ 0 , 1 ] ) with A 1 A 2 , we have that I ¨ ( A 1 , A 2 ) = I ^ ( A 1 , A 2 ) . So, by [40] (Theorem 6.2), I ¨ ( A 1 , A 2 ) = I ^ ( A 1 , A 2 ) = I ( a 1 ¯ , a 2 ̲ ) , I ( a 1 ̲ , a 2 ¯ ) .
Example 5. 
Consider the Fodor implication I F D ( x , y ) = 1 , i f x y max ( 1 x , y ) , i f x > y . For A 1 = 1 2 , 3 4 and A 2 = 0 , 1 4 , we have that f A 1 ( λ a 1 ) = 1 2 + 1 4 λ a 1 and f A 2 ( λ a 2 ) = 1 4 λ a 2 . Then, since f A 1 ( λ a 1 ) f A 2 ( λ a 2 ) for all λ a 1 , λ a 2 [ 0 , 1 ] ,
I F D f A 1 ( λ a 1 ) , f A 2 ( λ a 2 ) = max 1 2 1 4 λ a 1 , 1 4 λ a 2 = 1 2 1 4 λ a 1 ,
for all λ a 1 , λ a 2 [ 0 , 1 ] . So,
I ¨ F D ( A 1 , A 2 ) = inf 0 λ a i 1 { I F D f A 1 ( λ a 1 ) , f A 2 ( λ a 2 ) } , sup 0 λ a i 1 { I F D f A 1 ( λ a 1 ) , f A 2 ( λ a 2 ) } = 1 4 , 1 2 .
Therefore,
I ¨ F D ( A 1 , A 2 ) = I ^ F D ( A 1 , A 2 ) ,
since I F D ( a 1 ¯ , a 2 ̲ ) = I F D ( 3 4 , 0 ) = 1 4 and I F D ( a 1 ̲ , a 2 ¯ ) = I F D ( 1 2 , 1 4 ) = 1 2 . Now, for A 1 = A 2 = A = 0 , 1 4 , we have f A ( λ a ) = 1 4 λ a , so
I ¨ F D ( A , A ) = inf 0 λ a 1 { I F D f A ( λ a ) , f A ( λ a ) } , sup 0 λ a 1 { I F D f A ( λ a ) , f A ( λ a ) } = 1 , 1 ,
since I F D f A ( λ a ) , f A ( λ a ) = I F D 1 4 λ a , 1 4 λ a = 1 . Therefore, I ¨ F D ( A , A ) I ^ F D ( A , A ) = 3 4 , 1 . Note that I ¨ F D is not correct since I F D ( 1 4 , 0 ) = 3 4 I ¨ F D ( A , A ) . However, in this case, elements of type I F D ( 1 4 , 0 ) , with x y , are not relevant (they are irrelevant); see Remark 6.
We can conclude, then, that this new way of defining interval operators does not always coincide with the best representation. Also, it does not necessarily satisfy Moore’s correctness (see Example 4). However, this does not cause harm; see the following remark:
Example 6. 
(Moore and constraint interval correctness.) It is possible to observe that the loss of the usual correctness (Moore’s correctness) occurs only when we have variable dependence. However, this loss will not cause problems since every element of an interval operates with itself and this operation is contained in the resulting interval, i.e., the correctness with respect to a fixed element is maintained. So, everything “thrown away” is irrelevant. In other words, if the interval A represents a certain number a, we have that
g ( a 1 , , a , , a , , a n ) g ¨ ( A 1 , , A , , A , , A n ) ,
then, something like g ( a 1 , , a , , a ˜ , , a n ) with a , a ˜ A , and a a ˜ , is not relevant, since we are only interested in operations with the element in which A represents; that is, operations with the element a. This kind of correctness is called here constraint interval correctness.
The following proposition shows that important properties such as symmetry, (IP), and (NP) are preserved by the constrained interval operators.
Proposition 3. 
Let g : [ 0 , 1 ] 2 [ 0 , 1 ] be a function. Then,
(i) 
If g is symmetric, then g ¨ is also symmetric;
(ii) 
If g satisfies identity property (IP), then g ¨ satisfies (I-IP);
(iii) 
If g satisfies left neutrality property (NP), then g ¨ satisfies (I-NP).
Proof. 
Indeed,
(i)
By the symmetry of g, we have
g ¨ ( A 1 , A 2 ) = inf 0 λ a i 1 { g f A 1 ( λ a 1 ) , f A 2 ( λ a 2 ) } , sup 0 λ a i 1 { g f A 1 ( λ a 1 ) , f A 2 ( λ a 2 ) } = inf 0 λ a i 1 { g f A 2 ( λ a 2 ) , f A 1 ( λ a 1 ) } , sup 0 λ a i 1 { g f A 2 ( λ a 2 ) , f A 1 ( λ a 1 ) } = g ¨ ( A 2 , A 1 ) ,
for any A 1 , A 2 U ( [ 0 , 1 ] ) .
(ii)
For any A U ( [ 0 , 1 ] ) ,
g ¨ ( A , A ) = inf 0 λ a 1 { g f A ( λ a ) , f A ( λ a ) } , sup 0 λ a 1 { g f A ( λ a ) , f A ( λ a ) } = inf 0 λ a 1 { 1 } , sup 0 λ a 1 { 1 } = [ 1 , 1 ] ,
since g satisfies (IP).
(iii)
For any A U ( [ 0 , 1 ] ) ,
g ¨ ( [ 1 , 1 ] , A ) = inf 0 λ a 1 { g 1 , f A ( λ a ) } , sup 0 λ a 1 { g 1 , f A ( λ a ) } = inf 0 λ a 1 { f A ( λ a ) } , sup 0 λ a 1 { f A ( λ a ) } = A ,
since g satisfies (NP). □
Proposition 4. 
There is function g : [ 0 , 1 ] 2 [ 0 , 1 ] in which the exchange principle (EP) is satisfied but g ¨ does not satisfy (I-EP).
Proof. 
Consider the Łukasiewicz implication I ( x , y ) = min ( 1 , 1 x + y ) and the intervals A 1 = [ 0 , 1 ] and A 2 = 0 , 1 2 . From Table 1.4. in [36], I satisfies (EP). Now, since I f A 2 ( λ a 2 ) , f A 1 ( λ a 1 ) = min 1 , 1 λ a 2 2 + λ a 1 , we have
I ¨ ( A 2 , A 1 ) = inf 0 λ a i 1 { I f A 2 ( λ a 2 ) , f A 1 ( λ a 1 ) } , sup 0 λ a i 1 { I f A 2 ( λ a 2 ) , f A 1 ( λ a 1 ) } = inf 0 λ a i 1 min 1 , 1 λ a 2 2 + λ a 1 , sup 0 λ a i 1 min 1 , 1 λ a 2 2 + λ a 1 = 1 2 , 1 .
So, f I ¨ ( A 2 , A 1 ) ( λ a 21 ) = 1 2 + λ a 21 2 and, for all λ a 1 , λ a 21 ,
I f A 1 ( λ a 1 ) , f I ¨ ( A 2 , A 1 ) ( λ a 21 ) = min 1 , 1 λ a 1 + 1 2 + λ a 21 2 = min 1 , 3 2 λ a 1 + λ a 21 2 .
Therefore,
I ¨ ( A 1 , I ¨ ( A 2 , A 1 ) ) = inf 0 λ a i 1 { I f A 1 ( λ a 1 ) , f I ¨ ( A 2 , A 1 ) ( λ a 21 ) } , sup 0 λ a i 1 { I f A 1 ( λ a 1 ) , f I ¨ ( A 2 , A 1 ) ( λ a 21 ) } = 1 2 , 1 .
On the other hand,
I ¨ ( A 1 , A 1 ) = inf 0 λ a 1 1 { I f A 1 ( λ a 1 ) , f A 1 ( λ a 1 ) } , sup 0 λ a 1 1 { I f A 1 ( λ a 1 ) , f A 1 ( λ a 1 ) } = inf 0 λ a 1 1 min 1 , 1 λ a 1 + λ a 1 , sup 0 λ a 1 1 min 1 , 1 λ a 1 + λ a 1 = 1 , 1 .
And, since f I ¨ ( A 1 , A 1 ) ( λ a 11 ) = 1 for all λ a 11 [ 0 , 1 ] ,
I ¨ ( A 2 , I ¨ ( A 1 , A 1 ) ) = inf 0 λ a i 1 { I f A 1 ( λ a 2 ) , f I ¨ ( A 1 , A 1 ) ( λ a 11 ) } , sup 0 λ a i 1 { I f A 2 ( λ a 2 ) , f I ¨ ( A 1 , A 1 ) ( λ a 11 ) } = inf 0 λ a i 1 min 1 , 1 λ a 2 2 + 1 , sup 0 λ a i 1 min 1 , 1 λ a 2 2 + 1 = 1 , 1 .
Therefore, I ¨ ( A 1 , I ¨ ( A 2 , A 1 ) ) I ¨ ( A 2 , I ¨ ( A 1 , A 1 ) ) . □
However, Proposition 5 guarantees that (EP) is preserved by the operator g ¨ when g is continuous.
Lemma 1. 
Let g: [ 0 , 1 ] 2 [ 0 , 1 ] be a function. Then,
{ g ( f A 1 ( λ a 1 ) , g ( f A 2 ( λ a 2 ) , f A 3 ( λ a 3 ) ) ) λ a i [ 0 , 1 ] } g f A 1 ( λ a 1 ) , f g ¨ ( A 2 , A 3 ) ( λ g 23 ) λ a 1 , λ g 23 [ 0 , 1 ] ,
A 1 , A 2 , A 3 U ( [ 0 , 1 ] ) . In addition, if g is continuous, then equality holds.
Proof. 
Given y { g ( f A 1 ( λ a 1 ) , g ( f A 2 ( λ a 2 ) , f A 3 ( λ a 3 ) ) ) λ a i [ 0 , 1 ] } , there are λ a 1 ˜ , λ a 2 ˜ , λ a 3 ˜ [ 0 , 1 ] such that y = g ( f A 1 ( λ a 1 ˜ ) , g ( f A 2 ( λ a 2 ˜ ) , f A 3 ( λ a 3 ˜ ) ) ) . As g ( f A 2 ( λ a 2 ˜ ) , f A 3 ( λ a 3 ˜ ) ) g ¨ ( A 2 , A 3 ) , then, by Remark 2, there exists λ g ˜ 23 [ 0 , 1 ] such that f g ¨ ( A 2 , A 3 ) ( λ g ˜ 23 ) = g ( f A 2 ( λ a 2 ˜ ) , f A 3 ( λ a 3 ˜ ) ) . We conclude that
y = g ( f A 1 ( λ a 1 ˜ ) , f g ¨ ( A 2 , A 3 ) ( λ g ˜ 23 ) ) { g f A 1 ( λ a 1 ) , f g ¨ ( A 2 , A 3 ) ( λ g 23 ) λ a 1 , λ g 23 [ 0 , 1 ] }
Therefore,
{ g ( f A 1 ( λ a 1 ) , g ( f A 2 ( λ a 2 ) , f A 3 ( λ a 3 ) ) ) λ a i [ 0 , 1 ] } g f A 1 ( λ a 1 ) , f g ¨ ( A 2 , A 3 ) ( λ g 23 ) λ a 1 , λ g 23 [ 0 , 1 ] .
In addition, if g is continuous, then, given
y { g f A 1 ( λ a 1 ) , f g ¨ ( A 2 , A 3 ) ( λ g 23 ) λ a 1 , λ g 23 [ 0 , 1 ] }
we have y = g ( f A 1 ( λ a 1 ˜ ) , f g ¨ ( A 2 , A 3 ) ( λ g ˜ 23 ) ) for some λ a 1 ˜ , λ g ˜ 23 [ 0 , 1 ] . Since f g ¨ ( A 2 , A 3 ) ( λ g ˜ 23 ) g ¨ ( A 2 , A 3 ) , then, by the continuity of g, there are λ a 2 ˜ , λ a 3 ˜ [ 0 , 1 ] such that f g ¨ ( A 2 , A 3 ) ( λ g ˜ 23 ) = g ( f A 2 ( λ a 2 ˜ ) , f A 3 ( λ a 3 ˜ ) ) . We conclude that
y = g ( f A 1 ( λ a 1 ˜ ) , g ( f A 2 ( λ a 2 ˜ ) , f A 3 ( λ a 3 ˜ ) ) ) { g ( f A 1 ( λ a 1 ) , g ( f A 2 ( λ a 2 ) , f A 3 ( λ a 3 ) ) ) λ a i [ 0 , 1 ] } .
So,
{ g f A 1 ( λ a 1 ) , f g ¨ ( A 2 , A 3 ) ( λ g 23 ) λ a 1 , λ g 23 [ 0 , 1 ] } g f A 1 ( λ a 1 ) , g f A 2 ( λ a 2 ) , f A 3 ( λ a 3 ) λ a i [ 0 , 1 ] .
Thus,
{ g f A 1 ( λ a 1 ) , g f A 2 ( λ a 2 ) , f A 3 ( λ a 3 ) λ a i [ 0 , 1 ] } = g f A 1 ( λ a 1 ) , f g ¨ ( A 2 , A 3 ) ( λ g 23 ) λ a 1 , λ g 23 [ 0 , 1 ] .
Therefore, the equality holds when g is continuous. □
Remark 7. 
Analogous to the previous lemma, we have that
{ g g f A 1 ( λ a 1 ) , f A 2 ( λ a 2 ) , f A 3 ( λ a 3 ) λ a i [ 0 , 1 ] } g f g ¨ ( A 1 , A 2 ) ( λ g 12 ) , f A 3 ( λ a 3 ) λ g 12 , λ a 3 [ 0 , 1 ] .
And, if g is continuous, then the equality holds.
Proposition 5. 
Let g : [ 0 , 1 ] 2 [ 0 , 1 ] be a continuous function. Then:
(i)
If g is associative, then g ¨ is also associative;
(ii)
If g satisfies the exchange principle (EP), then g ¨ satisfies (I-EP).
Proof. 
Indeed,
(i)
For all A 1 , A 2 , A 3 U ( [ 0 , 1 ] ) ,
g ¨ ( A 1 , g ¨ ( A 2 , A 3 ) ) = [ inf 0 λ a 1 , λ g 23 1 { g f A 1 ( λ a 1 ) , f g ¨ ( A 2 , A 3 ) ( λ g 23 ) } , sup 0 λ a 1 , λ g 23 1 { g f A 1 ( λ a 1 ) , f g ¨ ( A 2 , A 3 ) ( λ g 23 ) } ] .
So, by Lemma 1,
g ¨ ( A 1 , g ¨ ( A 2 , A 3 ) ) = [ inf 0 λ a i 1 { g ( f A 1 ( λ a 1 ) , g ( f A 2 ( λ a 2 ) , f A 3 ( λ a 3 ) ) ) } , sup 0 λ a i 1 { g ( f A 1 ( λ a 1 ) , g ( f A 2 ( λ a 2 ) , f A 3 ( λ a 3 ) ) ) } ] .
Now, since g is associative, we have that
g ¨ ( A 1 , g ¨ ( A 2 , A 3 ) ) = [ inf 0 λ a i 1 { g ( g ( f A 1 ( λ a 1 ) , f A 2 ( λ a 2 ) ) , f A 3 ( λ a 3 ) ) } , sup 0 λ a i 1 { g ( g ( f A 1 ( λ a 1 ) , f A 2 ( λ a 2 ) ) , f A 3 ( λ a 3 ) ) } ] .
So, by Remark 7,
g ¨ ( A 1 , g ¨ ( A 2 , A 3 ) ) = [ inf 0 λ g 12 , λ a 3 1 { g f g ¨ ( A 1 , A 2 ) ( λ g 12 ) , f A 3 ( λ a 3 ) } , sup 0 λ g 12 , λ a 3 1 { g f g ¨ ( A 1 , A 2 ) ( λ g 12 ) , f A 3 ( λ a 3 ) } ] = g ¨ ( g ¨ ( A 1 , A 2 ) , A 3 ) .
Therefore, g ¨ is associative.
(ii)
For all A 1 , A 2 , A 3 U ( [ 0 , 1 ] ) ,
g ¨ ( A 1 , g ¨ ( A 2 , A 3 ) ) = [ inf 0 λ a 1 , λ g 23 1 { g f A 1 ( λ a 1 ) , f g ¨ ( A 2 , A 3 ) ( λ g 23 ) } , sup 0 λ a 1 , λ g 23 1 { g f A 1 ( λ a 1 ) , f g ¨ ( A 2 , A 3 ) ( λ g 23 ) } ] .
So, by Lemma 1,
g ¨ ( A 1 , g ¨ ( A 2 , A 3 ) ) = [ inf 0 λ a i 1 { g ( f A 1 ( λ a 1 ) , g ( f A 2 ( λ a 2 ) , f A 3 ( λ a 3 ) ) ) } , sup 0 λ a i 1 { g ( f A 1 ( λ a 1 ) , g ( f A 2 ( λ a 2 ) , f A 3 ( λ a 3 ) ) ) } ] .
Therefore, since g satisfies (EP),
g ¨ ( A 1 , g ¨ ( A 2 , A 3 ) ) = [ inf 0 λ a i 1 { g ( f A 2 ( λ a 2 ) , g ( f A 1 ( λ a 1 ) , f A 3 ( λ a 3 ) ) ) } , sup 0 λ a i 1 { g ( f A 2 ( λ a 2 ) , g ( f A 1 ( λ a 1 ) , f A 3 ( λ a 3 ) ) ) } ] .
So, again by Lemma 1,
g ¨ ( A 1 , g ¨ ( A 2 , A 3 ) ) = [ inf 0 λ a 2 , λ g 13 1 { g f A 2 ( λ a 2 ) , f g ¨ ( A 1 , A 3 ) ( λ g 13 ) } , sup 0 λ a 2 , λ g 13 1 { g f A 2 ( λ a 2 ) , f g ¨ ( A 1 , A 3 ) ( λ g 13 ) } ] = g ¨ ( A 2 , g ¨ ( A 1 , A 3 ) ) .
Therefore, g ¨ satisfies (I-EP). □
The binary operator g does not need to be continuous in order for its extension to preserve associativity; it suffices that g is increasing (or decreasing). See the following proposition:
Proposition 6. 
Let g : [ 0 , 1 ] 2 [ 0 , 1 ] be an increasing function. Then, g is associative if and only if g ¨ is also associative.
Proof. 
As g is increasing, using Proposition 1, for all A i , A j U ( [ 0 , 1 ] ) ,
g ¨ ( A i , A j ) = [ g ( a i ̲ , a j ̲ ) , g ( a i ¯ , a j ¯ ) ] .
So, for all A 1 , A 2 , A 3 U ( [ 0 , 1 ] ) ,
g ¨ ( A 1 , g ¨ ( A 2 , A 3 ) ) = g a 1 ̲ , g ¨ ( A 2 , A 3 ) ̲ , g a 1 ¯ , g ¨ ( A 2 , A 3 ) ¯ = g a 1 ̲ , g ( a 2 ̲ , a 3 ̲ ) , g a 1 ¯ , g ( a 2 ¯ , a 3 ¯ ) .
Analogously, using Proposition 1, for all A 1 , A 2 , A 3 U ( [ 0 , 1 ] ) ,
g ¨ ( g ¨ ( A 1 , A 2 ) , A 3 ) = g g ¨ ( A 1 , A 2 ) ̲ , a 3 ̲ , g g ¨ ( A 1 , A 2 ) ¯ , a 3 ¯ = g g ( a 1 ̲ , a 2 ̲ ) , a 3 ̲ , g g ( a 1 ¯ , a 2 ¯ ) , a 3 ¯ .
So, since g is associative, we conclude that, for all A 1 , A 2 , A 3 U ( [ 0 , 1 ] ) ,
g ¨ ( A 1 , g ¨ ( A 2 , A 3 ) ) = g ¨ ( g ¨ ( A 1 , A 2 ) , A 3 ) .
Conversely, for each z [ 0 , 1 ] , z = f [ z , z ] ( λ z ) for all λ z [ 0 , 1 ] ; then,
inf 0 λ x , λ y 1 { g ( f [ x , x ] ( λ x ) , f [ y , y ] ( λ y ) ) } = g ( x , y ) = sup 0 λ x , λ y 1 { g ( f [ x , x ] ( λ x ) , f [ y , y ] ( λ y ) ) }
and, therefore, g ¨ ( [ x , x ] , [ y , y ] ) = [ g ( x , y ) , g ( x , y ) ] . Following a similar reasoning, we have that
g ¨ ( [ x , x ] , g ¨ ( [ y , y ] , [ z , z ] ) ) = [ g ( x , g ( y , z ) ) , g ( x , g ( y , z ) ) ]
and
g ¨ ( g ¨ ( [ x , x ] , [ y , y ] ) , [ z , z ] ) = [ g ( g ( x , y ) , z ) , g ( g ( x , y ) , z ) ] .
So, g ( x , g ( y , z ) ) = g ( g ( x , y ) , z ) , since g ¨ is associative. □
Section 3.1 and Section 3.2 show that the logical connectives studied are extended to their respective intervals logical connectives in relation to the order K M , but the same does not occur with Moore’s order ⊴.

3.1. Properties of Some Interval Fuzzy Connectives with Respect to Order K M

This section will show that, considering the order of Kulisch–Miranker (see definition below), fuzzy connectives, negation, t-norms, and fuzzy implications are extended to their respective intervals logical connectives, and their main properties are maintained.
Definition 13. 
The Kulisch–Miranker order is defined, for all A 1 , A 2 U ( [ 0 , 1 ] ) , by:
A 1 K M A 2 a 1 ̲ a 2 ̲ and a 1 ¯ a 2 ¯ .
The following proposition shows the connection that exists between the Kulisch–Miranker order and the functional counterpart of the intervals.
Proposition 7. 
Given A 1 , A 2 U ( [ 0 , 1 ] ) , the following are equivalent:
(i) 
A 1 K M A 2 ;
(ii) 
f A 1 ( λ ) f A 2 ( λ ) for all λ [ 0 , 1 ] ;
(iii) 
f A 1 ( λ ) f A 2 ( λ ) for all λ [ 0 , 1 ] .
Proof. 
( i ) ( i i ) Indeed, let A 1 K M A 2 for some A 1 , A 2 U ( [ 0 , 1 ] ) ; then, a 1 ̲ a 2 ̲ and a 1 ¯ a 2 ¯ . So, since λ [ 0 , 1 ] , we have ( 1 λ ) a 1 ̲ ( 1 λ ) a 2 ̲ and λ a 1 ¯ λ a 2 ¯ for all λ [ 0 , 1 ] . Thus, ( 1 λ ) a 1 ̲ + λ a 1 ¯ ( 1 λ ) a 2 ̲ + λ a 2 ¯ for all λ [ 0 , 1 ] , i.e., f A 1 ( λ ) f A 2 ( λ ) for all λ [ 0 , 1 ] . Conversely, let f A 1 ( λ ) f A 2 ( λ ) for all λ [ 0 , 1 ] ; then, in particular, for λ = 0 and λ = 1 , we obtain a 1 ̲ a 2 ̲ and a 1 ¯ a 2 ¯ , respectively. So, A 1 K M A 2 .
( i i ) ( i i i ) Straightforward, once f A ( λ ) = f A ( 1 λ ) . □
Proposition 8. 
There is binary operator g that satisfies (OP), whereas g ¨ does not satisfy (I-OP) with respect to K M .
Proof. 
Take A 1 , A 2 U ( [ 0 , 1 ] ) such that A 1 K M A 2 with a 1 ̲ a 2 ̲ < a 1 ¯ . So, since g satisfies (OP),
g ( f A 1 ( 1 ) , f A 2 ( 0 ) ) = g ( a 1 ¯ , a 2 ̲ ) 1 .
So, g ¨ ( A 1 , A 2 ) [ 1 , 1 ] since g ( f A 1 ( 1 ) , f A 2 ( 0 ) ) g ¨ ( A 1 , A 2 ) . □
The following result shows that the restricted operators preserve the fuzzy implications with respect to the order of Kulisch–Miranker.
Proposition 9. 
Let I be a fuzzy implication. Then, I ¨ is an interval fuzzy implication with respect to K M .
Proof. 
Indeed, (II1) a for A 1 K M A 1 , trivially I ¨ ( A 1 , C ) K M I ¨ ( A 1 , C ) , C U ( [ 0 , 1 ] ) . On the other hand, if A 1 K M A 2 with A 1 A 2 , then a 1 ̲ a 2 ̲ and a 1 ¯ a 2 ¯ , with a 1 ̲ a 2 ̲ or a 1 ¯ a 2 ¯ ; so, given any C U ( [ 0 , 1 ] ) , I ( a 2 ̲ , c ¯ ) I ( a 1 ̲ , c ¯ ) and I ( a 2 ¯ , c ̲ ) I ( a 1 ¯ , c ̲ ) , since I satisfies (I1). So, I ¨ ( A 2 , C ) ¯ I ¨ ( A 1 , C ) ¯ and I ¨ ( A 2 , C ) ̲ I ¨ ( A 1 , C ) ̲ , respectively, since, by Remark 5, I ¨ ( A i , A j ) = I ( a i ¯ , a j ̲ ) , I ( a i ̲ , a j ¯ ) . Therefore, I ¨ ( A 2 , C ) K M I ¨ ( A 1 , C ) . The proof of (II2) is analogous. (II3) Since I satisfies (I3), I ( 0 , f A 2 ( λ a 2 ) ) = 1 , λ a 2 [ 0 , 1 ] , so
I ¨ ( [ 0 , 0 ] , A 2 ) = inf 0 λ a 2 1 { I ( 0 , f A 2 ( λ a 2 ) ) } , sup 0 λ a 2 1 { I ( 0 , f A 2 ( λ a 2 ) ) } = [ 1 , 1 ] .
(II4) Since I satisfies (I4), then I ( f A 1 ( λ a 1 ) , 1 ) = 1 , λ a 1 [ 0 , 1 ] . So,
I ¨ ( A 1 , [ 1 , 1 ] ) = inf 0 λ a 1 1 { I ( f A 1 ( λ a 1 ) , 1 ) } , sup 0 λ a 1 1 { I ( f A 1 ( λ a 1 ) , 1 ) } = [ 1 , 1 ] .
(II5) Since I satisfies (I5), I ( 1 , 0 ) = 0 . So, I ¨ ( [ 1 , 1 ] , [ 0 , 0 ] ) = [ 0 , 0 ] . Therefore, I ¨ is an interval fuzzy implication. □
Considering the order Kulisch–Miranker, the following result shows that the restricted operators preserve the fuzzy negations.
Proposition 10. 
Let N : [ 0 , 1 ] [ 0 , 1 ] be a fuzzy negation. Then, N ¨ is an interval fuzzy negation with respect to K M .
Proof. 
Indeed,
N ¨ ( [ 0 , 0 ] ) = [ inf 0 λ 1 { N ( f [ 0 , 0 ] ( λ ) ) } , sup 0 λ 1 { N ( f [ 0 , 0 ] ( λ ) ) } ] = [ inf 0 λ 1 { N ( 0 ) } , sup 0 λ 1 { N ( 0 ) } ] = [ 1 , 1 ]
and
N ¨ ( [ 1 , 1 ] ) = [ inf 0 λ 1 { N ( f [ 1 , 1 ] ( λ ) ) } , sup 0 λ 1 { N ( f [ 1 , 1 ] ( λ ) ) } ] = [ inf 0 λ 1 { N ( 1 ) } , sup 0 λ 1 { N ( 1 ) } ] = [ 0 , 0 ] .
Now, given A 1 , A 2 U ( [ 0 , 1 ] ) such that A 1 K M A 2 , we have that a 1 ̲ a 2 ̲ and a 1 ¯ a 2 ¯ . So, N ( a 2 ¯ ) N ( a 1 ¯ ) and N ( a 2 ̲ ) N ( a 1 ̲ ) , since N is antitonic. By Remark 3, N ¨ ( A 2 ) ̲ N ¨ ( A 1 ) ̲ and N ¨ ( A 2 ) ¯ N ¨ ( A 1 ) ¯ . Therefore, N ¨ ( A 2 ) K M N ¨ ( A 1 ) . We conclude that N ¨ is an interval fuzzy negation with respect to K M . □
Proposition 11. 
Let N : [ 0 , 1 ] [ 0 , 1 ] be a fuzzy negation. N is strong if and only if, N ¨ is a strong interval fuzzy negation.
Proof. 
Indeed, by Remark 3, N ¨ ( A ) = [ N ( a ¯ ) , N ( a ̲ ) ] , A U ( [ 0 , 1 ] ) . So, since N is strong, for all A 1 U ( [ 0 , 1 ] ) ,
N ¨ ( N ¨ ( A 1 ) ) = [ N ( N ¨ ( A 1 ) ¯ ) , N ( N ¨ ( A 1 ) ̲ ) ] = [ N ( N ( a 1 ̲ ) ) , N ( N ( a 1 ¯ ) ) ] = N s t r o n g [ a 1 ̲ , a 1 ¯ ] = A 1 .
Conversely, for each x [ 0 , 1 ] , x = f [ x , x ] ( λ x ) for all λ x [ 0 , 1 ] , so
inf 0 λ x 1 { N ( f [ x , x ] ( λ x ) ) } = N ( x ) = sup 0 λ x 1 { N ( f [ x , x ] ( λ x ) ) }
and then N ¨ ( [ x , x ] ) = [ N ( x ) , N ( x ) ] . Following a similar reasoning, we have N ¨ ( N ¨ ( [ x , x ] ) ) = [ N ( N ( x ) ) , N ( N ( x ) ) ] and, since N ¨ is strong, we have that N ( N ( x ) ) = x . □
Considering any fuzzy continuous negation, the following proposition guarantees that contrapositive properties are preserved for this negation.
Proposition 12. 
Let N be a continuous fuzzy negation and I be a fuzzy implication. Then,
(i)
I satisfies (CP) with respect to N iff I ¨ satisfies (I-CP) with respect to N ¨ ;
(ii)
I satisfies (LCP) with respect to N iff I ¨ satisfies (I-LCP) with respect to N ¨ ;
(iii)
I satisfies (RCP) with respect to N iff I ¨ satisfies (I-RCP) with respect to N ¨ .
Proof. 
(i) For all A 1 , A 2 U ( [ 0 , 1 ] ) ,
I ( f N ¨ ( A 2 ) ( λ N 2 ) , f N ¨ ( A 1 ) ( λ N 1 ) ) λ N i [ 0 , 1 ] = I ( f A 1 ( λ a 1 ) , f A 2 ( λ a 2 ) ) λ a i [ 0 , 1 ] .
In fact, ( ) given y I ( f N ¨ ( A 2 ) ( λ N 2 ) , f N ¨ ( A 1 ) ( λ N 1 ) ) λ N i [ 0 , 1 ] , there are λ ˜ N 1 , λ ˜ N 2 [ 0 , 1 ] such that y = I ( f N ¨ ( A 2 ) ( λ ˜ N 2 ) , f N ¨ ( A 1 ) ( λ ˜ N 1 ) ) . By Remark 3, N ¨ ( A i ) = [ N ( a i ¯ ) , N ( a i ̲ ) ] for i { 1 , 2 } , so, since N is continuous and f N ¨ ( A i ) ( λ ˜ N i ) N ¨ ( A i ) , there exists λ ˙ a i [ 0 , 1 ] such that f N ¨ ( A i ) ( λ ˜ N i ) = N ( f A i ( λ ˙ a i ) ) for i { 1 , 2 } . Thus, y = I ( N ( f A 2 ( λ ˙ a 2 ) ) , N ( f A 1 ( λ ˙ a 1 ) ) ) = I ( f A 1 ( λ ˙ a 1 ) , f A 2 ( λ ˙ a 2 ) ) , since I satisfies (CP) with respect to N. So, y I ( f A 1 ( λ a 1 ) , f A 2 ( λ a 2 ) ) λ a i [ 0 , 1 ] . Now, ( ) given y I ( f A 1 ( λ a 1 ) , f A 2 ( λ a 2 ) ) λ a i [ 0 , 1 ] , there exists λ ˜ a 1 , λ ˜ a 2 [ 0 , 1 ] such that y = I ( f A 1 ( λ ˜ a 1 ) , f A 2 ( λ ˜ a 2 ) ) . Since I satisfies (CP) with respect to N, y = I ( N ( f A 2 ( λ ˜ a 2 ) ) , N ( f A 1 ( λ ˜ a 1 ) ) ) . So, since N ( f A i ( λ ˜ a i ) ) N ¨ ( A i ) , there exists λ ˙ N i [ 0 , 1 ] such that f N ¨ ( A i ) ( λ ˙ N i ) = N ( f A i ( λ ˜ a i ) ) for i { 1 , 2 } . Therefore, y = I ( f N ¨ ( A 2 ) ( λ ˙ N 2 ) , f N ¨ ( A 1 ) ( λ ˙ N 1 ) ) I ( f N ¨ ( A 2 ) ( λ N 2 ) , f N ¨ ( A 1 ) ( λ N 1 ) ) λ N i [ 0 , 1 ] . We conclude by Equation (3) that I ¨ ( N ¨ ( A 2 ) , N ¨ ( A 1 ) ) = I ¨ ( A 1 , A 2 ) . Conversely, for each z [ 0 , 1 ] , we have that z = f [ z , z ] ( λ z ) for all λ z [ 0 , 1 ] and N ¨ ( [ z , z ] ) = [ N ( z ) , N ( z ) ] . Then, for all x , y [ 0 , 1 ] , we have
I ( f [ x , x ] ( λ x ) , f [ y , y ] ( λ y ) ) = I ( x , y ) ,
and
I ( f N ¨ ( [ y , y ] ) ( λ N ¨ y ) , f N ¨ ( [ x , x ] ) ( λ N ¨ x ) ) = I ( f [ N ( y ) , N ( y ) ] ( λ N ¨ y ) , f [ N ( x ) , N ( x ) ] ( λ N ¨ x ) ) = I ( N ( y ) , N ( x ) ) ;
so, since I ¨ ( N ¨ ( [ y , y ] ) , N ¨ ( [ x , x ] ) ) = I ¨ ( [ x , x ] , [ y , y ] ) ,
[ I ( N ( y ) , N ( x ) ) , I ( N ( y ) , N ( x ) ) ] = [ I ( x , y ) , I ( x , y ) ] ,
so I ( N ( y ) , N ( x ) ) = I ( x , y ) .
(ii) For all A 1 , A 2 U ( [ 0 , 1 ] ) ,
I ( f N ¨ ( A 2 ) ( λ N 2 ) , f A 1 ( λ a 1 ) ) λ N 2 , λ a 1 [ 0 , 1 ] = ( ) I ( f N ¨ ( A 1 ) ( λ N 1 ) , f A 2 ( λ a 2 ) ) λ N 1 , λ a 2 [ 0 , 1 ] .
In fact, for ( ) , given y I ( f N ¨ ( A 2 ) ( λ N 2 ) , f A 1 ( λ a 1 ) ) λ N 2 , λ a 1 [ 0 , 1 ] , there are λ ˜ N 2 , λ ˜ a 1 [ 0 , 1 ] such that y = I ( f N ¨ ( A 2 ) ( λ ˜ N 2 ) , f A 1 ( λ ˜ a 1 ) ) . By Remark 3, N ¨ ( A 2 ) = [ N ( a 2 ¯ ) , N ( a 2 ̲ ) ] ; so, since N is continuous and f N ¨ ( A 2 ) ( λ ˜ N 2 ) N ¨ ( A 2 ) , there exists λ ˙ a 2 [ 0 , 1 ] such that f N ¨ ( A 2 ) ( λ ˜ N 2 ) = N ( f A 2 ( λ ˙ a 2 ) ) . Thus, y = I ( N ( f A 2 ( λ ˙ a 2 ) ) , f A 1 ( λ ˜ a 1 ) ) = I ( N ( f A 1 ( λ ˜ a 1 ) ) , f A 2 ( λ ˙ a 2 ) ) , since I satisfies (LCP) with respect to N. Now, since N ( f A 1 ( λ ˜ a 1 ) ) N ¨ ( A 1 ) , there exists λ ˙ N 1 [ 0 , 1 ] such that N ( f A 1 ( λ ˜ a 1 ) ) = f N ¨ ( A 1 ) ( λ ˙ N 1 ) ; so, y = I ( f N ¨ ( A 1 ) ( λ ˙ N 1 ) , f A 2 ( λ ˙ a 2 ) ) I ( f N ¨ ( A 1 ) ( λ N 1 ) , f A 2 ( λ a 2 ) ) λ N 1 , λ a 2 [ 0 , 1 ] . The opposite direction, ( ) , follows analogously. Conversely, since, for each z [ 0 , 1 ] , z = f [ z , z ] ( λ z ) for all λ z [ 0 , 1 ] and N ¨ ( [ z , z ] ) = [ N ( z ) , N ( z ) ] , then, for all x , y [ 0 , 1 ] , we have
I ( f N ¨ ( [ x , x ] ) ( λ N ¨ x ) , f [ y , y ] ( λ y ) ) = I ( f [ N ( x ) , N ( x ) ] ( λ N ¨ x ) , f [ y , y ] ( λ y ) ) = I ( N ( x ) , y ) ,
and
I ( f N ¨ ( [ y , y ] ) ( λ N ¨ y ) , f [ x , x ] ( λ x ) ) = I ( f [ N ( y ) , N ( y ) ] ( λ N ¨ y ) , f [ x , x ] ( λ x ) ) = I ( N ( y ) , x ) ;
so, since I ¨ ( N ¨ ( [ y , y ] ) , [ x , x ] ) = I ¨ ( N ¨ ( [ x , x ] ) , [ y , y ] ) ,
[ I ( N ( y ) , x ) , I ( N ( y ) , x ) ] = [ I ( N ( x ) , y ) , I ( N ( x ) , y ) ] ,
so I ( N ( y ) , x ) = I ( N ( x ) , y ) .
(iii) It follows similarly to the previous item. □
The t-norm is also preserved by the constrained interval operators; see the proposition below:
Proposition 13. 
Let T be a t-norm. Then, T ¨ is an interval t-norm with respect to K M .
Proof. 
The symmetry and associativity are straightforward from Propositions 3 ( i ) and 6, respectively. Now, to show that T ¨ is increasing, consider A 1 , A 2 U ( [ 0 , 1 ] ) such that A 1 K M A 2 ; then, a 1 ̲ a 2 ̲ and a 1 ¯ a 2 ¯ . So, for all C U ( [ 0 , 1 ] ) , by the monotonicity of the t-norm, T ( a 1 ̲ , c ̲ ) T ( a 2 ̲ , c ̲ ) and T ( a 1 ¯ , c ¯ ) T ( a 2 ¯ , c ¯ ) . So, by Proposition 1, we have that T ¨ ( A 1 , C ) ̲ T ¨ ( A 2 , C ) ̲ and T ¨ ( A 1 , C ) ¯ T ¨ ( A 2 , C ) ¯ , respectively. Therefore, T ¨ ( A 1 , C ) K M T ¨ ( A 2 , C ) . From symmetry, T ¨ ( C , A 1 ) K M T ¨ ( C , A 2 ) whenever A 1 K M A 2 . Finally, by the boundary condition of T, T ( f A 1 ( λ a 1 ) , 1 ) = f A ( λ a 1 ) for all λ a [ 0 , 1 ] , so T ¨ ( A 1 , [ 1 , 1 ] ) = A 1 . □
The following section will provide a study with respect to Moore order similar to the one performed with respect to the Kulisch–Miranker order, analyzing their similarities and differences.

3.2. Properties of Constraint Interval Fuzzy Connectives with Respect to Order

This section addresses the main properties of the constrained interval fuzzy operators with respect to the order of Moore [16], defined below.
Definition 14. 
Moore order is defined by
A 1 A 2 A 1 = A 2 o r a 1 ¯ a 2 ̲ ,
A 1 , A 2 U ( [ 0 , 1 ] ) .
Proposition 14. 
Given A 1 , A 2 U ( [ 0 , 1 ] ) , the following are equivalent:
(i)
A 1 A 2 ;
(ii)
A 1 = A 2 or f A 1 ( λ a 1 ) f A 2 ( λ a 2 ) for all λ a 1 , λ a 2 [ 0 , 1 ] ;
(iii)
A 1 = A 2 or f A 1 ( λ a 1 ) f A 2 ( λ a 2 ) for all λ a 1 , λ a 2 [ 0 , 1 ] .
Proof. 
(i) ⇔ (ii) Indeed, given A 1 , A 2 U ( [ 0 , 1 ] ) such that A 1 A 2 , then A 1 = A 2 or a 1 ¯ a 2 ̲ . So, it is enough to check the case where a 1 ¯ a 2 ̲ , since the other follows straight. Therefore, since f A 1 ( λ a 1 ) a 1 ¯ and a 2 ̲ f A 2 ( λ a 2 ) for all λ a 1 , λ a 2 [ 0 , 1 ] , then f A 1 ( λ a 1 ) f A 2 ( λ a 2 ) for all λ a 1 , λ a 2 [ 0 , 1 ] . Conversely, if A 1 = A 2 , then, by definition, A 1 A 2 . Now, if f A 1 ( λ a 1 ) f A 2 ( λ a 2 ) for all λ a 1 , λ a 2 [ 0 , 1 ] , then, in particular, a 1 ¯ = f A 1 ( 1 ) f A 2 ( λ a 2 ) for all λ a 2 [ 0 , 1 ] , so a 1 ¯ f A 2 ( 0 ) = a 2 ̲ ; thus, A 1 A 2 .
(ii) ⇔ (iii) Straightforward, once f A ( λ a ) = f A ( 1 λ a ) . □
The following proposition ensures that the order property is preserved by its constrained interval operator.
Proposition 15. 
Let g be a binary function on [ 0 , 1 ] . If g satisfies (OP), then g ¨ satisfies (I-OP) with respect to ⊴.
Proof. 
Given A 1 , A 2 U ( [ 0 , 1 ] ) such that A 1 A 2 , we have A 1 = A 2 or f A 1 ( λ a 1 ) f A 2 ( λ a 2 ) for all λ a 1 , λ a 2 [ 0 , 1 ] . If A 1 = A 2 = A , then f A 1 ( λ ) = f A 2 ( λ ) = f A ( λ ) for all λ [ 0 , 1 ] . So, by Definition 12, g ¨ ( A , A ) = [ 1 , 1 ] since g satisfies (OP). Now, if f A 1 ( λ a 1 ) f A 2 ( λ a 2 ) for all λ a 1 , λ a 2 [ 0 , 1 ] , then g ( f A 1 ( λ a 1 ) , f A 2 ( λ a 2 ) ) = 1 for all λ a 1 , λ a 2 [ 0 , 1 ] since g satisfies (OP). Therefore, g ¨ ( A 1 , A 2 ) = [ 1 , 1 ] . Conversely, let A 1 , A 2 U ( [ 0 , 1 ] ) such that g ¨ ( A 1 , A 2 ) = [ 1 , 1 ] ; thus,
inf 0 λ a 1 , λ a 2 1 { g ( f A 1 ( λ a 1 ) , f A 2 ( λ a 2 ) ) } = sup 0 λ a 1 , λ a 2 1 { g ( f A 1 ( λ a 1 ) , f A 2 ( λ a 2 ) ) } = 1 .
So, g ( f A 1 ( λ a 1 ) , f A 2 ( λ a 2 ) ) = 1 for all λ a 1 , λ a 2 [ 0 , 1 ] ; therefore, f A 1 ( λ a 1 ) f A 2 ( λ a 2 ) for all λ a 1 , λ a 2 [ 0 , 1 ] since g satisfies (OP). By Proposition 14, we conclude that A 1 A 2 . □
Unlike Proposition 9, considering Moore’s order, the fuzzy implications are not preserved by constrained interval operators; see the following proposition:
Proposition 16. 
There are fuzzy implications I such that I ¨ is not an interval fuzzy implication with respect to ⊴.
Proof. 
Consider the Łukasiewicz implication I L K and the intervals A 1 = 1 2 , 1 2 , A 2 = 1 2 , 1 and A 3 = 0 , 1 2 in U ( [ 0 , 1 ] ) . In this case, A 1 A 2 since a 1 ¯ = a 2 ̲ ; however, I ¨ ( A 2 , A 3 ) I ¨ ( A 1 , A 3 ) . Indeed, by Remark 5, I ¨ ( A i , A j ) = I ^ ( A i , A j ) = I ( a i ¯ , a j ̲ ) , I ( a i ̲ , a j ¯ ) whenever A i A j with i j , so I ( a 1 ¯ , a 3 ̲ ) = I ( 1 2 , 0 ) = 1 2 , I ( a 1 ̲ , a 3 ¯ ) = I ( 1 2 , 1 2 ) = 1 , I ( a 2 ¯ , a 3 ̲ ) = I ( 1 , 0 ) = 0 , and I ( a 2 ̲ , a 3 ¯ ) = I ( 1 2 , 1 2 ) = 1 . Therefore,
I ¨ ( A 2 , A 3 ) = 0 , 1 1 2 , 1 = I ¨ ( A 1 , A 3 )
and
I ¨ ( A 2 , A 3 ) ¯ = 1 1 2 = I ¨ ( A 1 , A 3 ) ̲ .
So, I ¨ ( A 2 , A 3 ) I ¨ ( A 1 , A 3 ) , i.e., I ¨ does not satisfy (II1). □
The following proposition shows that, analogous to Proposition 10 with respect to the order of Kulisch–Miranker, the fuzzy negations are also extended to their respective constrained interval operator with respect to Moore’s order.
Proposition 17. 
Let N : [ 0 , 1 ] [ 0 , 1 ] be a fuzzy negation. Then, N ¨ is an interval fuzzy negation with respect to ⊴.
Proof. 
Indeed, analogous to Proposition 10, N ¨ ( [ 0 , 0 ] ) = [ 1 , 1 ] and N ¨ ( [ 1 , 1 ] ) = [ 0 , 0 ] . Now, consider A 1 A 2 for some A 1 , A 2 U ( [ 0 , 1 ] ) . Then, A 1 = A 2 or f A 1 ( λ a 1 ) f A 2 ( λ a 2 ) for all λ a 1 , λ a 2 [ 0 , 1 ] . The first case is trivial. Now, if f A ( λ a 1 ) f A 2 ( λ a 2 ) for all λ a 1 , λ a 2 [ 0 , 1 ] , then N ( f A 2 ( λ a 2 ) ) N ( f A ( λ a 1 ) ) for all λ a 1 , λ a 2 [ 0 , 1 ] since N is decreasing. So, in particular, N ( a 2 ̲ ) N ( a 1 ¯ ) , i.e.,
sup 0 λ a 2 1 { N ( f A 2 ( λ a 2 ) ) } inf 0 λ a 1 1 { N ( f A ( λ a 1 ) ) } .
Therefore, by Definition 14, N ¨ ( A 2 ) N ¨ ( A 1 ) . □
Proposition 18. 
Let N : [ 0 , 1 ] [ 0 , 1 ] be a fuzzy negation. N is strong if and only if N ¨ is a strong interval fuzzy negation.
Proof. 
Analogous to Proposition 11. □
The contrapositive properties are again preserved for any fuzzy negation.
Proposition 19. 
Let N be a fuzzy negation and I be a fuzzy implication. Then,
(i)
I satisfies (CP) with respect to N iff I ¨ satisfies (I-CP) with respect to N ¨ ;
(ii)
I satisfies (LCP) with respect to N iff I ¨ satisfies (I-LCP) with respect to N ¨ ;
(iii)
I satisfies (RCP) with respect to N iff I ¨ satisfies (I-RCP) with respect to N ¨ .
Proof. 
The proof follows analogous to Proposition 12. □
Unlike Proposition 13, t-norms are not preserved by the constrained interval operator considering the order ⊴.
Proposition 20. 
There are t-norms T such that T ¨ is not an interval t-norm with respect to ⊴.
Proof. 
Consider a t-norm T such that T ( x , y ) < T ( x , z ) whenever x 0 and y < z . Take A 1 and A 2 in U ( [ 0 , 1 ] ) as not degenerate such that a 1 ¯ = a 2 ̲ 0 ; in this case, A 1 A 2 . Thus, for all C U ( [ 0 , 1 ] ) that are not degenerate, we have that T ( a 2 ̲ , c ̲ ) < T ( a 1 ¯ , c ¯ ) since c ̲ < c ¯ . So,
T ¨ ( A 1 , C ) ¯ T ¨ ( A 2 , C ) ̲ ,
since, by Proposition 1, T ¨ ( A i , C ) = [ T ( a i ̲ , c ̲ ) , T ( a i ¯ , c ¯ ) ] . And, also, since A 1 is not degenerate, then a 1 ̲ < a 2 ̲ , so T ( a 1 ̲ , c ̲ ) < T ( a 2 ̲ , c ̲ ) . Thus,
T ¨ ( A 1 , C ) T ¨ ( A 2 , C ) .
We conclude, by Equations (5) and (6), that T ¨ ( A 1 , C ) T ¨ ( A 2 , C ) . Therefore, T ¨ is not increasing. □
It is easy to find in the literature examples of t-norms such that T ( x , y ) < T ( x , z ) whenever x 0 and y < z ; for example, the product t-norm, T P ( x , y ) = x y . Conversely, the t-norm T L K ( x , y ) = max ( 0 , x + y 1 ) (Łukasiewicz’s t-norm) does not satisfy this condition, since if y < z and x + z < 1 , then x + y 1 < x + z 1 < 0 , so T L K ( x , y ) = T L K ( x , z ) = 0 .

4. Final Remarks

A well-known problem in interval analysis is that, when there are variable dependencies, the resulting width of the interval is overestimated. This overestimation occurs because each of the two occurrences of one variable is treated as an independent variable.
In order to solve the problem of overestimation, using a reasoning similar to Lodwick’s [28], we have defined the constrained interval fuzzy operators by using the constrained intervals. By Definition 12, we can see that, when there are two or more occurrences of the same interval, it is traversed at the same level. With this, it is possible to state that there is no loss of information; see Remark 6. In view of what was presented, a new notion of correction, called constrained interval correctness, was suggested, in which it is as effective as Moore’s correction and less demanding.
The main objective of this paper is to introduce this new approach to interval-valued fuzzy logic, in which it is possible to soften the problem of overestimation when there are dependencies of variables, and in such a way so that the information of interval connectives is maintained.
In addition, the operators were investigated in terms of correction, algebraic properties, and orders. Furthermore, the authors also proposed a comparative study between the constrained interval operators g ¨ and the best interval representation g ^ , in which it was shown that g ¨ g ^ . Thus, it is possible to conclude that the operator g ¨ improves the overestimation problem and, of the properties studied, it only did not satisfy the order property in relation to Kulisch–Miranker order.

Author Contributions

Writing—original draft preparation, J.P., R.H.N.S. and B.B.; writing—review and editing, F.B. All authors have read and agreed to the published version of the manuscript.

Funding

Supported by CNPq (233950/2014-1, 307781/2016-0, 301618/2019-4), FAPERGS (17/2551-0000872-3, 19/2551-0001279-9, 19/2551-0001660) and the Spanish Ministry of Science and Technology (PC093-094TFIPDL, TIN2016-81731-REDT, TIN2016-77356-P (AEI/FEDER, UE)).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Publicly available datasets were analyzed in this study. This data can be found here: [https://repositorio.ufrn.br/jspui/bitstream/123456789/28082/1/Onalgebrasinterval_Pinheiro_2019.pdf].

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Zadeh, L. The concept of a linguistic variable and its application to approximate reasoning—I. Inf. Sci. 1975, 8, 199–249. [Google Scholar] [CrossRef]
  2. Liang, Q.; Mendel, J.M. Interval type-2 fuzzy logic systems: Theory and design. IEEE Trans. Fuzzy Syst. 2000, 8, 535–550. [Google Scholar] [CrossRef]
  3. Bustince, H.; Fernandez, J.; Hagras, H.; Herrera, F.; Pagola, M.; Barrenechea, E. Interval type-2 fuzzy sets are generalization of interval-valued fuzzy sets: Toward a wider view on their relationship. IEEE Trans. Fuzzy Syst. 2015, 23, 1876–1882. [Google Scholar]
  4. Castillo, O.; Amador-Angulo, L.; Castro, J.R.; Garcia-Valdez, M. A comparative study of type-1 fuzzy logic systems, interval type-2 fuzzy logic systems and generalized type-2 fuzzy logic systems in control problems. Inf. Sci. 2016, 354, 1086. [Google Scholar] [CrossRef]
  5. Song, X.; Wu, C.; Song, S. Adaptive interval type-2 fuzzy fixed-time control for nonlinear MIMO fast-slow coupled systems with user-defined tracking performance. Fuzzy Sets Syst. 2023, 472, 108694. [Google Scholar] [CrossRef]
  6. Dilli, R.; Reiser, R.; Yamin, A.; Santos, H.; Lucca, G. Uncertainty handling with type-2 interval-valued fuzzy logic in IoT resource classification. In Proceedings of the International Conference on Advanced Information Networking and Applications, Juiz de Fora, Brazil, 29–31 March 2023; Springer International Publishing: Berlin/Heidelberg, Germany, 2023; pp. 86–98. [Google Scholar]
  7. Cervantes, L.; Castillo, O.; Melin, P. Intelligent control of nonlinear dynamic plants using a hierarchical modular approach and type-2 fuzzy logic. In Proceedings of the Mexican International Conference on Artificial Intelligence, Puebla, Mexico, 26 November–4 December 2011; Springer: Berlin/Heidelberg, Germany, 2011; pp. 1–12. [Google Scholar]
  8. Figueroa, J.; Posada, J.; Soriano, J.; Melgarejo, M.; Rojas, S. A type-2 fuzzy controller for tracking mobile objects in the context of robotic soccer games. In Proceedings of the 14th IEEE International Conference on Fuzzy Systems, FUZZ’05, Reno, NE, USA, 22–25 May 2005; IEEE: Piscataway, NJ, USA, 2005; pp. 359–364. [Google Scholar]
  9. Lynch, C.; Hagras, H.; Callaghan, V. Embedded type-2 FLC for real-time speed control of marine and traction diesel engines. In Proceedings of the 14th IEEE International Conference on Fuzzy Systems, FUZZ’05, Reno, NE, USA, 22–25 May 2005; IEEE: Piscataway, NJ, USA, 2005; pp. 347–352. [Google Scholar]
  10. Chourasia, V.S.; Tiwari, A.K.; Gangopadhyay, R. Interval type-2 fuzzy logic based antenatal care system using phonocardiography. Appl. Soft Comput. 2014, 14, 489–497. [Google Scholar] [CrossRef]
  11. Nguyen, T.; Khosravi, A.; Creighton, D.; Nahavandi, S. Medical data classification using interval type-2 fuzzy logic system and wavelets. Appl. Soft Comput. 2015, 30, 812–822. [Google Scholar] [CrossRef]
  12. Leow, S.Y.; Wong, S.Y.; Yap, K.S.; Yap, H.J. A hybrid algorithm of interval type-2 fuzzy logic system and generalized adaptive resonance theory for medical data classification. Intell. Decis. Technol. 2019, 13, 81–89. [Google Scholar] [CrossRef]
  13. Warmus, M. Calculus of approximations. Bull. L’academie Pol. Sci. 1956, 4, 253–257. [Google Scholar]
  14. Sunaga, T. Theory of interval algebra and its application to numerical analysis. RAAG Mem. 1958, 2, 209. [Google Scholar] [CrossRef]
  15. Moore, R.E. Automatic Error Analysis in Digital Computation; Technical Report LMSD84821; Lockheed Missiles and Space Co.: Sunnyvale, CA, USA, 1959. [Google Scholar]
  16. Moore, R.E. Interval Analysis; Prentice-Hall: Englewood Cliffs, NJ, USA, 1966; Volume 4. [Google Scholar]
  17. Barboza, L.V.; Dimuro, G.P.; Reiser, R.H. Towards interval analysis of the load uncertainty in power electric systems. In Proceedings of the 2004 International Conference on Probabilistic Methods Applied to Power Systems, Ames, IA, USA, 12–16 September 2004; IEEE: Piscataway, NJ, USA; pp. 538–544. [Google Scholar]
  18. Muhanna, R.L.; Zhang, H.; Mullen, R.L. Interval finite elements as a basis for generalized models of uncertainty in engineering mechanics. Reliab. Comput. 2007, 13, 173–194. [Google Scholar] [CrossRef]
  19. Stadtherr, M.A.; Xu, G.; Burgos-Solorzano, G.I.; Haynes, W.D. Reliable computation of phase stability and equilibrium using interval methods. Int. J. Reliab. Saf. 2007, 1, 465–488. [Google Scholar] [CrossRef]
  20. Hu, C.; Kearfott, R.B.; De Korvin, A.; Kreinovich, V. Knowledge Processing with Interval and Soft Computing; Springer: Berlin/Heidelberg, Germany, 2008. [Google Scholar]
  21. Dimuro, G.P.; Costa, A.C. Interval-based Markov decision processes for regulating interactions between two agents in multi-agent systems. In International Workshop on Applied Parallel Computing; Springer: Berlin/Heidelberg, Germany, 2004; pp. 102–111. [Google Scholar]
  22. de Aguiar, M.S.; Dimuro, G.P.; da Rocha Costa, A.C. ICTM: An interval tessellation-based model for reliable topographic segmentation. Numer. Algorithms 2004, 37, 3–11. [Google Scholar] [CrossRef]
  23. Hickey, T.; Ju, Q.; Van Emden, M.H. Interval arithmetic: From principles to implementation. J. ACM 2001, 48, 1038–1068. [Google Scholar] [CrossRef]
  24. Moore, R.E. Methods and Applications of Interval Analysis; Studies in Applied Mathematics; SIAM: Philadelphia, PA, USA, 1979; Volume 2. [Google Scholar]
  25. Santiago, R.H.N.; Bedregal, B.R.C.; Acióly, B.M. Interval representations. Trends Comput. Appl. Math. 2004, 5, 317–326. [Google Scholar] [CrossRef]
  26. Santiago, R.H.N.; Bedregal, B.R.C.; Acióly, B.M. Formal aspects of correctness and optimality of interval computations. Form. Asp. Comput. 2006, 18, 231–243. [Google Scholar] [CrossRef]
  27. Bedregal, B.R.C.; Santiago, R.H.N. Some continuity notions for interval functions and representation. Comput. Appl. Math. 2013, 32, 435–446. [Google Scholar] [CrossRef]
  28. Lodwick, W.A. Constrained Interval Arithmetic; CCM Report; University of Colorado: Denver, CO, USA, 1999. [Google Scholar]
  29. Bede, B.; Mizukoshim, M.T.; Kreinovich, V.; Lodwick, W. Why Constraint Interval Arithmetic Techniques Work Well: A Theorem Explains Empirical Success. Uncertain. Constraints Decis. Mak. 2023, 484, 313–322. [Google Scholar]
  30. Campos, J.R.; Assunção, E.; Silva, G.N.; Lodwick, W.A.; Leal, U.A.S. A necessary and sufficient condition for the stability of interval difference equation via interval lyapunov equation. Soft Comput. 2022, 26, 5043–5056. [Google Scholar] [CrossRef]
  31. Campos, J.R.; Assunção, E.; Silva, G.N.; Lodwick, W.A.; Teixeira, M.C.M. Discrete-time interval optimal control problem. Int. J. Control 2019, 92, 1778–1784. [Google Scholar] [CrossRef]
  32. Mizukoshi, M.T.; Wa, W.A.L. The interval eigenvalue problem using constraint interval analysis with an application to linear differential equations. Fuzzy Sets Syst. 2021, 419, 141–157. [Google Scholar] [CrossRef]
  33. Dimuro, G.P.; Bedregal, B.R.C.; Santiago, R.H.N.; Reiser, R.H.S. Interval additive generators of interval t-norms and interval t-conorms. Inf. Sci. 2011, 181, 3898–3916. [Google Scholar] [CrossRef]
  34. Baczyński, M.; Jayaram, B. (S,N)-and R-implications: A state-of-the-art survey. Fuzzy Sets Syst. 2008, 159, 1836–1859. [Google Scholar] [CrossRef]
  35. Smets, P.; Magrez, P. Implication in fuzzy logic. Int. J. Approx. Reason. 1987, 1, 327–347. [Google Scholar] [CrossRef]
  36. Baczyński, M.; Jayaram, B. Fuzzy Implications. In Studies in Fuzziness and Soft Computing; Springer: Berlin/Heidelberg, Germany, 2008; Volume 231. [Google Scholar]
  37. Pinheiro, J.; Santos, H.S.; Dimuro, G.P.; Bedregal, B.R.C.; Santiago, R.H.N.; Fernández, J.; Bustince, H. On fuzzy implications derived from general overlap functions and their relation to other classes. Axioms 2023, 12, 17. [Google Scholar] [CrossRef]
  38. Deschrijver, G. Additive and multiplicative generators in interval-valued fuzzy set theory. IEEE Trans. Fuzzy Syst. 2007, 15, 222–237. [Google Scholar] [CrossRef]
  39. Bedregal, B.R.C.; Santiago, R.H.N. Interval representations, Łukasiewicz implicators and Smets-Magrez axioms. Inf. Sci. 2013, 221, 192–200. [Google Scholar] [CrossRef]
  40. Bedregal, B.C.; Takahashi, A. Interval valued versions of t-conorms, fuzzy negations and fuzzy implications. In Proceedings of the 2006 IEEE International Conference on Fuzzy Systems, Vancouver, BC, Canada, 16–21 July 2006; IEEE: Piscataway, NJ, USA, 2006; pp. 1981–1987. [Google Scholar]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Pinheiro, J.; Santiago, R.H.N.; Bedregal, B.; Bergamaschi, F. Developing Constrained Interval Operators for Fuzzy Logic with Interval Values. Axioms 2023, 12, 1115. https://doi.org/10.3390/axioms12121115

AMA Style

Pinheiro J, Santiago RHN, Bedregal B, Bergamaschi F. Developing Constrained Interval Operators for Fuzzy Logic with Interval Values. Axioms. 2023; 12(12):1115. https://doi.org/10.3390/axioms12121115

Chicago/Turabian Style

Pinheiro, Jocivania, Regivan H. N. Santiago, Benjamin Bedregal, and Flaulles Bergamaschi. 2023. "Developing Constrained Interval Operators for Fuzzy Logic with Interval Values" Axioms 12, no. 12: 1115. https://doi.org/10.3390/axioms12121115

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop