A BL-Algebra-Based Method for Fuzzy Screening
Keywords:Type-2 fuzzy sets, BL-algebras, fuzzy screening
A fuzzy screening algorithm was introduced by Yager in 1993. In this paper a new approach based on type-2 fuzzy sets is illustrated to tackle screening problems. The method heavily relies on the properties of a suitable algebraic structure. The two algorithms are applied to the same case study and the results are compared.
Brock G.N., Beavis W.D., Kubatko L.S.: Fuzzy Logic and Related Methods as a Screening Tool for Detecting Gene Regulatory Networks. Information Fusion, 10(3), pp.250-259, 2009
Carlsson C., Fuller R.: On Fuzzy Screening Systems EUFITâ€™95 Conf., Aachen, pp.1261-1264, 1995
Chattopadhyay S., Pratihar D.K., De Sarkar S.C.: Fuzzy-Logic-Based Screening and Prediction of Adult Psychoses: A Novel Approach, IEEE Transactions on Systems, Man, and Cybernetics, Part A, 39(2), pp.381-387, 2009
Di Lascio L, Fischetti E., Gisolfi A.: â€œA Fuzzy Based Method for Environmental Evaluationâ€. Proc. IASK International Conference E-Activity and Leading Technologies, Madrid, pp.17-22, 2008
Di Lascio L., Fischetti E., Gisolfi A., Loia V., Nappi A., â€œLinguistic Resources and Fuzzy Algebraic Computing in Adaptive Hypermedia Systemsâ€, E.Damiani, L.Jain (Eds.), Soft Computing and Software Engineering, pp.274-312, 2004
Di Lascio L., Fischetti E., Gisolfi A., Nappi A.: Type-2 Fuzzy Decision Making by means of a BL-algebra, IEEE Int. Conf. Fuzzy Systems, pp.1-6, 2007
Fischetti, E.: â€œA BL-Algebra on Type-2 Fuzzy Setsâ€, Asian J. of Fuzzy and Applied Mathematics, 1, 1, pp.12-20, 2013
HÃ¡jek P.: â€œBasic fuzzy logic and BL-algebrasâ€ Soft Comput. 2(3), pp.124-128, 1998
Lele C.: â€œAlgorithms and Computations in BL-Algebrasâ€, Int. J. Artificial Life Research, 1, 4, pp.29-47, 2010
Liginlal D., Ram S., Duckstein L.: Fuzzy measure theoretical approach to screening product innovations, IEEE Transactions on Systems, Man, and Cybernetics, Part A, 36(3), pp.577-591, 2006
Malczewski,J.:Fuzzy Screening for Land Suitability Analysis, Geographic Environmental Modelling, 6,1,pp.27-39, 2002
Mendel, J. M., John R.I.: â€œType-2 Fuzzy Sets Made Simpleâ€, IEEE Trans. on Fuzzy Systems, vol. 10, pp. 117-127, 2002.
Ozyer T., Alhajj R., Barker K.: Intrusion detection by integrating boosting genetic fuzzy classifier and data mining criteria for rule pre-screening, Int. J. Approximate Reasoning, 49 (2), pp.451-465, 2008
Paetz J., Schneider G.: A neuro-fuzzy approach to virtual screening in molecular bioinformatics. Fuzzy Sets and Systems, 152(1), pp.67-82, 2005
Pal D., Mandana K.M., Pal S., Sarkar D., Chackraborty C:: Fuzzy expert system approach for coronary artery disease screening using clinical parameters, Knowledge-Based Systems, 36, pp.162-174, 2012
Pham t.d., Tran D.T., Zhou X.: Fuzzy information fusion of classification models for high-throughput image screening of cancer cells in time-lapse microscopy, KES Journal, 11 (4), pp.237-246, 2007
Smimou K., Bhatt S., Dahl D.W.: Fuzzy analytical hierarchy process in new product screening, EUSFLAT Conference, pp.89-92, 2001
Yager R.R.: Fuzzy Screening Systems,in R. Lowen& M. Roubens (eds.) Fuzzy Logic: State of the Art, Kluwer, pp. 251-261, 1993
Wang J., Zhou X., Li F., Bradley P., Chang S., Perrimon N., Wong S.: An image score inference system for RNAi genome wide screening, J. Biomedical Informatics, 42 (1), pp.32-40, 2009
Wang M.L., Wang H.F., Lin C.L.: Ranking fuzzy numbers based on lexicographic screening procedure, Int. J. Informations Technology and Decision Making, 4 (4), pp.663-678, 2005
Wang Y., Chin K.: A linear goal programming priority method for fuzzy analytic hierarchy process and its applications in new product screening, Int. J. Approximate Reasoning, 49 (2), pp.451-465, 2008
Wibowo S., Deng H.: A fuzzy rule-based approach for screening international distribution centres, Computers and Mathematics with Applications, 64 (5), pp.1084-1092, 2012
Wong W.K., Zeng X.H., Au W.M.R., Mok P.Y., Leung S.Y.S.: A fashion mix-and-match expert system for fashion retailers using fuzzy screening approach. Expert Syst. Appl., 36(2), pp.1750-1764, 2009
Zadeh L.A.: â€œFuzzy Setsâ€, Information and Control, 8(3), pp.338-353, 1965
Zadeh L.A., â€œThe Concept of a Linguistic Variable and its Application to Approximate Reasoningâ€, I, II, III. Information Sciences I 8 â€“ II 8 â€“ III 9. pp 199-249 ; pp 301-357; pp 43-80, 1975
How to Cite
- Papers must be submitted on the understanding that they have not been published elsewhere (except in the form of an abstract or as part of a published lecture, review, or thesis) and are not currently under consideration by another journal published by any other publisher.
- It is also the authors responsibility to ensure that the articles emanating from a particular source are submitted with the necessary approval.
- The authors warrant that the paper is original and that he/she is the author of the paper, except for material that is clearly identified as to its original source, with permission notices from the copyright owners where required.
- The authors ensure that all the references carefully and they are accurate in the text as well as in the list of references (and vice versa).
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Attribution-NonCommercial 4.0 International that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
- The journal/publisher is not responsible for subsequent uses of the work. It is the author's responsibility to bring an infringement action if so desired by the author.