Processing math: 58%
Research article

Convexity and inequalities related to extended beta and confluent hypergeometric functions

  • Received: 17 July 2019 Accepted: 05 September 2019 Published: 23 September 2019
  • MSC : Primary 33B15; Secondary 26D15, 33B99

  • In the paper, the authors establish the logarithmic convexity and some inequalities for the extended beta function and, by using these inequalities for the extended beta function, find the logarithmic convexity and the monotonicity for the extended confluent hypergeometric function.

    Citation: Feng Qi, Kottakkaran Sooppy Nisar, Gauhar Rahman. Convexity and inequalities related to extended beta and confluent hypergeometric functions[J]. AIMS Mathematics, 2019, 4(5): 1499-1507. doi: 10.3934/math.2019.5.1499

    Related Papers:

    [1] Norman Maswanganyi, Edmore Ranganai, Caston Sigauke . Long-term peak electricity demand forecasting in South Africa: A quantile regression averaging approach. AIMS Energy, 2019, 7(6): 857-882. doi: 10.3934/energy.2019.6.857
    [2] Dimitrios Saligkaras, Vasileios E. Papageorgiou . On the detection of patterns in electricity prices across European countries: An unsupervised machine learning approach. AIMS Energy, 2022, 10(6): 1146-1164. doi: 10.3934/energy.2022054
    [3] Kashif Raza Abbasi, Khadim Hussain, Jaffar Abbas, Festus Fatai Adedoyin, Pervez Ahmed Shaikh, Hazrat Yousaf, Faqeer Muhammad . Analyzing the role of industrial sector's electricity consumption, prices, and GDP: A modified empirical evidence from Pakistan. AIMS Energy, 2021, 9(1): 29-49. doi: 10.3934/energy.2021003
    [4] Abdulrahman Th. Mohammad, Amer Ibrahim Ismael . An equivalent photovoltaic solar system to solve the problems of electricity in Iraqi houses. AIMS Energy, 2019, 7(5): 660-670. doi: 10.3934/energy.2019.5.660
    [5] Yan Li, Yaheng Su, Qixin Zhao, Bala Wuda, Kaibo Qu, Lei Tang . An electricity price optimization model considering time-of-use and active distribution network efficiency improvements. AIMS Energy, 2025, 13(1): 13-34. doi: 10.3934/energy.2025002
    [6] Sameer Thakare, Neeraj Dhanraj Bokde, Andrés E. Feijóo-Lorenzo . Forecasting different dimensions of liquidity in the intraday electricity markets: A review. AIMS Energy, 2023, 11(5): 918-959. doi: 10.3934/energy.2023044
    [7] Chrish Kavuma, Diego Sandoval, Hakizimana Khan Jean de Dieu . Analysis of power generating plants and substations for increased Uganda's electricity grid access. AIMS Energy, 2021, 9(1): 178-192. doi: 10.3934/energy.2021010
    [8] Alemayehu T. Eneyaw, Demiss A. Amibe . Annual performance of photovoltaic-thermal system under actual operating condition of Dire Dawa in Ethiopia. AIMS Energy, 2019, 7(5): 539-556. doi: 10.3934/energy.2019.5.539
    [9] Ghafi Kondi Akara, Benoit Hingray, Adama Diawara, Arona Diedhiou . Effect of weather on monthly electricity consumption in three coastal cities in West Africa. AIMS Energy, 2021, 9(3): 446-464. doi: 10.3934/energy.2021022
    [10] Emrah Gulay . Forecasting the total electricity production in South Africa: Comparative analysis to improve the predictive modelling accuracy. AIMS Energy, 2019, 7(1): 88-110. doi: 10.3934/energy.2019.1.88
  • In the paper, the authors establish the logarithmic convexity and some inequalities for the extended beta function and, by using these inequalities for the extended beta function, find the logarithmic convexity and the monotonicity for the extended confluent hypergeometric function.


    Interval T2 (IT2) FLSs [1,2,3] have been applied to many fields with higher uncertainties and nonlinear characteristics. Despite this, since the alpha-plane (or z-slice) representation theory [4,5,6,7] of GT2 FSs was put forward by a few different research groups, much of the academic attention has shifted from IT2 fuzzy logic to GT2 fuzzy logic. As the computational complexity has been decreased significantly, they are increasingly being applied to in fields like border detection [8,9], fuzzy logic control [10,11], permanent magnetic drive [12,13,14,15], and so forth. As the secondary membership grades of GT2 FSs exist between zero and one, so that, they may be considered as more advanced order parameter models compared with IT2 FSs. Because the design degrees of freedom increase, GT2 FLSs have more of an ability to cope with issues arising from uncertainties in contrast to IT2 FLSs.

    GT2 FLSs [7] are made up of five blocks: Fuzzifier, rules, inference, TR, and defuzzification. TR is the kernel block, which plays the role of transforming the GT2 FS to the type-1 (T1) FS. The block of defuzzification maps the T1 FS to the crisp output. The most popular enhanced Karnik-Mendel (EKM [16,17,18,19,20,21,22,23]) TR algorithms have the advantage of keeping the uncertainty flows between the lower membership functions (LMFs) and upper MFs (UMFs). Despite so, this kind of algorithm is still computationally intensive. Liu gave the initialization interpretations [18] for the EKM algorithms, then the sensible beginning (SB, or say reasonable initialization) EKM (SBEKM) algorithms [24] can be generated. Based on these studies, this paper further divides the search space [25] of SBEKM algorithms, and then proposes the sensible beginning divided-search EKM (SBDEKM) algorithms for performing the centroid TR for GT2 FLSs.

    The remainder is organized as follows: Section 2 provides the background knowledge of GT2 FLSs. The SBDEKM algorithms are proposed to complete the centroid TR and defuzzification of GT2 FLSs in Section 3. Section 4 provides computer simulations to show the performance of the SBDEKM algorithms compared with the EKM algorithms and SBEKM algorithms. Finally, Section 5 gives the conclusions and expectations.

    In general, we may categorize the GT2 FLSs into two types from the aspect of inference: Mamdani [7,26,27] and Takagi-Sugeno-Kang [12,29,30]. In this paper, without loss of generality, consider a GT2 FLS with n inputs x1X1,xnXn and one output ˜B, among which, the sth is given as:

    Rs: if x1 is ˜Fs1 and x2 is ˜Fs2 and  and xn is ˜Fsn, then y is ˜Gs (1)

    in which ˜Fsi(i=1,,n;s=1,,M) is the antecedent, and ˜Gs(s=1,2,,M) is the consequent.

    For the sake of simplifying the expressions, here the singleton fuzzifier xi=xi is used, only one vertical slice (secondary membership) ˜Fsi(xi) of antecedent ˜Fsi is activated, and the alpha-cut decomposition can be represented as:

    ˜Fsi(xi)=supα[0,1]α/[csi,α(xi),dsi,α(xi)]. (2)

    For each rule, the firing interval at the corresponding alpha-level is:

    Fα:{Fsα(x)[f_sα(x),¯fsα(x)]f_sα(x)Tpi=1csi,α(xi)¯fsα(x)Tpi=1csi,α(xi), (3)

    where p denotes the number of antecedents, and T represents the minimum or product t-norm.

    Let ˜Gsα be the alpha-plane of consequent ˜Gs under the corresponding alpha-level, i.e.,

    ˜Gsα=yY˜Gsα(y)/y=yY[gsL,α(y),gsR,α(y)]/y. (4)

    In the following, we merge the firing interval of each rule with the related rule consequent alpha-plane ˜Gsα to get the firing rule alpha-plane ˜Bsα, i.e.,

    ˜Bsα:{FOU(˜Bsα)=[f_˜Bsα(y|x),¯f˜Bsα(y|x)]f_˜Bsα(y|x)=f_sα(x)gsL,α(y)¯f˜Bsα(y|x)=¯fsα(x)gsR,α(y). (5)

    Aggregating all the ˜Bsα to get the output alpha-plane ˜Bα, i.e.,

    ˜Bα:{FOU(˜Bα)=[f_˜Bα(y|x),¯f˜Bα(y|x)]f_˜Bα(y|x)=f_˜B1α(y|x)f_˜BMα(y|x)¯f˜Bα(y|x)=¯f˜B1α(y|x)¯f˜BMα(y|x). (6)

    Calculating the centroid of ˜Bα at the corresponding alpha-level to obtain the type-reduced set l˜Bα=ξl˜Bα, i.e.,

    YC,α(x)=C˜Bα(x)=α/[l˜Bα(x),r˜Bα(x)], (7)

    in which r˜Bα(x) and l˜Bα(x) can be computed by many different kinds of TR algorithms [16,17,18,19,20,21,27,28] as:

    l˜Bα(x)=minf˜Bα(yi)[f_˜Bα(yi),¯f˜Bα(yi)]ni=1yifR˜Bα(yi)ni=1fR˜Bα(yi), (8)
    r˜Bα(x)=maxf˜Bα(yi)[f_˜Bα(yi),¯f˜Bα(yi)]ni=1yifR˜Bα(yi)ni=1fR˜Bα(yi), (9)

    where n is the number of sampling points, and the specific IT2 FS R˜Bα=α/˜Bα.

    Aggregating all the YC,α to obtain the final T1 type-reduced set YC, i.e.,

    YC=supα[0,1]α/YC,α(x). (10)

    Suppose that the number of alpha-planes is m, that is to say, alpha is decomposed into α1,α2,,αm, and then the output should:

    y(x)=mi=1αi[(l˜Bαi(x)+r˜Bαi(x))/2]/mi=1αi. (11)

    First of all, we provide the sensible beginning (or say reasonable initialization) EKM algorithms [18,24,31,32] for finishing the centroid TR and defuzzification of GT2 FLSs. According to the inference, let the output of the GT2 FLSs be ˜B, whose primary variable is discretized into c=y1<<yn=d, then l˜Bα and r˜Bα under the alpha-level can be computed by a continuous version of the KM algorithms:

    l˜Bα=minη[c,d]Fl˜Bα(η)=minη[c,d]ηcy¯fR˜Bα(y)dy+dηyf_R˜Bα(y)dyηc¯fR˜Bα(y)dy+dηf_R˜Bα(y)dy, (12)
    r˜Bα=maxη[c,d]Fr˜Bα(η)=maxη[c,d]ηcyf_R˜Bα(y)dy+dηy¯fR˜Bα(y)dyηcf_R˜Bα(y)dy+dη¯fR˜Bα(y)dy. (13)

    For computing the two end points, Tables 1 and 2 give the computation steps for CKM and CEKM algorithms. According to the representations Fl˜Bα in (12) and Fr˜Bα in (13), i.e.,

    ηl˜Bα=Fl˜Bα(η)=η, (14)
    ηr˜Bα=Fr˜Bα(η)=η. (15)
    Table 1.  CKM algorithms [7,16,17,18,31,32] for computing the centroid.
    Step For l˜Bα, l˜Bα=minθ(y)[f_R˜Bα(y),¯fR˜Bα(y)]dcyθ(y)dydcθ(y)dy
    1 Let θ(y)=[¯fR˜Bα(y)+f_R˜Bα(y)]/2, and calculate η=ccyθ(y)dydcθ(y)dy.
    2 Let θ(y)¯fR˜Bα(y) when yη, and θ(y)f_R˜Bα(y) when y>η, and calculate ηl˜Bα=dcyθ(y)dydcθ(y)dy.
    3 Check whether |ηηl˜Bα|ε, if so, pause and let l˜Bα=ηl˜Bα, if it were not true,
    go to Step 4.
    4 Let η=ηl˜Bα and go to the second step.
    Step For r˜Bα, r˜Bα=maxθ(y)[f_R˜Bα(y),¯fR˜Bα(y)]dcyθ(y)dydcθ(y)dy
    1 Let θ(y)=[¯fR˜Bα(y)+f_R˜Bα(y)]/2, and calculate η=dcyθ(y)dydcθ(y)dy.
    2 Let θ(y)=f_R˜Bα(y) when yη, and θ(y)=¯fR˜Bα(y) when y>η, and calculate ηr˜Bα=dcyθ(y)dydcθ(y)dy.
    3 Check whether |ηηr˜Bα|ε, if so, stop and let r˜Bα=ηr˜Bα, if it were not true,
    go to the next step.
    4 Let η=ηr˜Bα and go to Step 2.

     | Show Table
    DownLoad: CSV
    Table 2.  CEKM algorithms [7,16,17,18,31,32] for computing the centroid.
    Step For l˜Bα
    1 Let a=(dc)/2.4+c, and calculate α=acy¯fR˜Bα(y)dy+dayf_R˜Bα(y)dy,
    β=ac¯fR˜Bα(y)dy+daf_R˜Bα(y)dy, a=α/β.
    2 Check if |aa|ε, if so, stop and let a=l˜Bα, if it were not true, return to the fourth step.
    3 Calculate s=sign(aa), α=α+smax(a,a)min(a,a)y[¯fR˜Bα(y)f_R˜Bα(y)]dy,
    β=β+smax(a,a)min(a,a)[¯fR˜Bα(y)f_R˜Bα(y)]dy, a=α/β.
    4 Let a=a,a=a,α=α,β=β and go to the Step 2.
    Step For r˜Bα
    1 Let a=(dc)/1.7+c, and compute α=acyf_R˜Bα(y)dy+day¯fR˜Bα(y)dy,
    β=acf_R˜Bα(y)dy+da¯fR˜Bα(y)dy, a=α/β.
    2 Check if |aa|ε, if so, stop and let a=r˜Bα, if it were not true, return to the fourth step.
    3 Calculate s=sign(aa), α=αsmax(a,a)min(a,a)y[¯fR˜Bα(y)f_R˜Bα(y)]dy,
    β=βsmax(a,a)min(a,a)[¯fR˜Bα(y)f_R˜Bα(y)]dy, a=α/β.
    4 Let a=a,a=a,α=α,and β=β and go to the Step 2.

     | Show Table
    DownLoad: CSV

    When l˜Bα=ηl˜Bα, and r˜Bα=ηr˜Bα, the iteration finishes, and we have that,

    l˜Bα=Fl˜Bα(l˜Bα), and r˜Bα=Fr˜Bα(r˜Bα). (16)

    For initializing the algorithms, as y[c,d], let f_R˜Bα(y)=¯fR˜Bα(y)θ(y), so that, θ(y)=[¯fR˜Bα(y)+f_R˜Bα(y)]/2. Then Eqs (12) and (13) turn out to be the same.

    r˜Bα=l˜Bα=dcyθ(y)dydcθ(y)dy=dcy[¯fR˜Bα(y)+f_R˜Bα(y)]/2dydc[¯fR˜Bα(y)+f_R˜Bα(y)]/2dy. (17)

    The initialization of the CKM algorithms may be represented as η(1), that is to say,

    η(1)=dcyθ(y)dydcθ(y)dy. (18)

    Tables 3 and 4 give the computation steps for the discrete KM, and discrete EKM algorithms, respectively. Here the discrete representation of η(1) can be written as:

    k(1)={k|ykni=1yi[¯fR˜Bα(yi)+f_R˜Bα(yi)]ni=1[¯fR˜Bα(yi)+f_R˜Bα(yi)]<yk+1,1kn1}. (19)
    Table 3.  KM algorithms [7,16,17,18,31,32] for computing the centroid.
    Step l˜Bα=minθi[f_R˜Bα(yi),¯fR˜Bα(yi)]ni=1yiθini=1θi
    1 Let θ(i)=[f_R˜Bα(yi)+¯fR˜Bα(yi)]/2, and compute a=(ni=1yiθi)/(ni=1θi).
    2 Seek for k(1kn1), satisfying yka<yk+1.
    3 Let θi=¯fR˜Bα(yi) as ik, and θi=f_R˜Bα(yi) as i>k,
    and compute l˜Bα(k)=(ni=1yiθi)/(ni=1θi).
    4 Check if l˜Bα(k)=a, if so, pause and let l˜Bα(k)=l˜Bα, and k=L, if it does not satisfy, return to the next step.
    5 Let a=l˜Bα(k) and go to the second step.
    Step r˜Bα=maxθi[f_R˜Bα(yi),¯fR˜Bα(yi)]ni=1yiθini=1θi
    1 Let θ(i)=[f_R˜Bα(yi)+¯fR˜Bα(yi)]/2, and compute a=(ni=1yiθi)/(ni=1θi).
    2 Seek for k(1kn1), satisfying yka<yk+1.
    3 Let θi=f_R˜Bα(yi) as ik, and θi=¯fR˜Bα(yi) as i>k,
    and compute r˜Bα(k)=(ni=1yiθi)/(ni=1θi).
    4 Check if r˜Bα(k)=a, if so, pause and let r˜Bα(k)=r˜Bα, and k=R, if it is not true, return to the next step.
    5 Let a=r˜Bα(k) and go to the second step.

     | Show Table
    DownLoad: CSV
    Table 4.  EKM algorithms [7,16,17,18,31,32] for computing the centroid.
    Step For l˜Bα
    1 Let k=[n/2.4] and calculate
    α=ki=1yi¯fR˜Bα(yi)+ni=k+1yif_R˜Bα(yi), β=ki=1¯fR˜Bα(yi)+ni=k+1f_R˜Bα(yi), a=α/β.
    2 Seek for k(1k<n1), satisfying yka<yk+1.
    3 Check if k=k, if so, stop and let a=l˜Bα, k=L, if it is not true, return to
    the next step.
    4 Compute s=sign(kk), α=α+smax(k,k)i=min(k,k)+1yi[¯fR˜Bα(yi)f_R˜Bα(yi)],
    β=β+smax(k,k)i=min(k,k)+1[¯fR˜Bα(yi)f_R˜Bα(yi)], a=α/β.
    5 Let a=a,α=α,β=β,and k=k and go to Step 2.
    Step For r˜Bα
    1 Let k=[n/1.7] and calculate
    α=ki=1yif_R˜Bα(yi)+ni=k+1yi¯fR˜Bα(yi), β=ki=1f_R˜Bα(yi)+ni=k+1¯fR˜Bα(yi), a=α/β.
    2 Seek for k(1k<n1), satisfying yka<yk+1.
    3 Check if k=k, if so, stop and let a=r˜Bα, k=R, if it is not true, go to
    the next step.
    4 Calculate s=sign(kk), α=αsmax(k,k)i=min(k,k)+1yi[¯fR˜Bα(yi)f_R˜Bα(yi)],
    β=βsmax(k,k)i=min(k,k)+1[¯fR˜Bα(yi)f_R˜Bα(yi)], a=α/β.
    5 Let a=a,α=α,β=β,and k=k and go to Step 2.

     | Show Table
    DownLoad: CSV

    Suppose that,

    ρ=dc¯fR˜Bα(y)dyccf_R˜Bα(y)dy. (20)

    For y[c,d], as ¯fR˜Bα(y)f_R˜Bα(y), therefore, ρ1. Let both ¯fR˜Bα(y) and f_R˜Bα(y) be constants, that is to say, ¯fR˜Bα(y)=ρN>0, so that,

    Fl˜Bα(η)=ηcy¯fR˜Bα(y)dy+dηyf_R˜Bα(y)dyηc¯fR˜Bα(y)dy+dηf_R˜Bα(y)dy=ρ(η2c2)+(d2η2)2[ρ(ηc)+(dη)]. (21)

    Find the derivative of Fl˜Bα(η) to η, that is to say,

    Fl˜Bα(η)=(ρ1)[ρ(ηc)2(dη)2]2[ρ(ηc)+(dη)]2. (22)

    Let Fl˜Bα(η)=0, so that,

    (dη)2(ηc)2=ρdηηc=ρ. (23)

    Therefore,

    ηl˜Bα=c+dc1+ρ. (24)

    As η[a,ηl˜Bα), Fl˜Bα(η)<0; and as η(ηl˜Bα,b], Fl˜Bα(η)>0. So ηl˜Bα is the minimum value of Fl˜Bα(η).

    In a similar manner, let us seek the maximum value of Fr˜Bα(η), i.e.,

    Fr˜Bα(η)=ηcyf_R˜Bα(y)dy+dηy¯fR˜Bα(y)dyηcf_R˜Bα(y)dy+dη¯fR˜Bα(y)dy=(η2c2)+ρ(d2η2)2[(ηc)+ρ(dη)]. (25)

    Find the derivative of Fr˜Bα(η) to η, that is to say,

    Fr˜Bα(η)=(ρ1)[(ηa)2ρ(bη)2]2[(ηa)+ρ(bη)]2. (26)

    Let Fr˜Bα(η)=0, so that,

    (dη)2(ηc)2=1ρdηηc=1/ρ. (27)

    Therefore, the solution of above equation can be written as:

    ηr˜Bα=c+dc1+1/ρ. (28)

    As η[c,ηr˜Bα), Fr˜Bα(η)>0; and as η(ηr˜Bα,d], Fr˜Bα(η)<0. Therefore, ηr˜Bα is the minimum value of Fr˜Bα(η).

    Considering the Eqs (24) and (28) comprehensively, the sensible beginning method for η may be represented as η(2), i.e.,

    η(2)={c+dc1+ρ for l˜Bα,c+dc1+1/ρ for r˜Bα. (29)

    Comparing the initializations of discrete EKM and CEKM algorithms, we can get the discrete.

    form of Eq (29) as:

    k(2)={[n/(1+ρ)] for l˜Bα,[n/(1+1/ρ)] for r˜Bα. (30)

    in which ρ=ni=1¯fR˜Bα(y)/ni=1¯fR˜Bα(y)ni=1f_R˜Bα(y)ni=1f_R˜Bα(y).

    Interestingly, as ρ=2, 1+ρ=1+22.4, and 1+1/ρ=1+1/21.7, so the Eq (30) turns out to be the initialization of the EKM algorithms.

    Meanwhile, for the SBEKM algorithms, ρ should be determined according to the corresponding experiments. Then the computation steps of the SBEKM and SBCEKM algorithms are given in Tables 5 and 6, respectively.

    Table 5.  SBEKM algorithms [16,17,18,31,32] for computing the centroid.
    Step For l˜Bα
    1 Let k=[n/(1+ρ)] and compute
    α=ki=1yi¯fR˜Bα(yi)+ni=k+1yif_R˜Bα(yi), β=ki=1¯fR˜Bα(yi)+ni=k+1f_R˜Bα(yi), a=α/β.
    2 Seek for k(1k<n1), satisfying yka<yk+1.
    3 Check if k=k, if so, stop and let a=l˜Bα, k=L, if not, go to the next step.
    4 Compute s=sign(kk), α=α+smax(k,k)i=min(k,k)+1yi[¯fR˜Bα(yi)f_R˜Bα(yi)],
    β=β+smax(k,k)i=min(k,k)+1[¯fR˜Bα(yi)f_R˜Bα(yi)], a=α/β.
    5 Let r˜Bα and go to Step 2.
    Step For Δ=1:1:100
    1 Let k=[n/(1+1/ρ)] and compute
    α=ki=1yif_R˜Bα(yi)+ni=k+1yi¯fR˜Bα(yi), β=ki=1f_R˜Bα(yi)+ni=k+1¯fR˜Bα(yi), a=α/β.
    2 Seek for k(1k<n1), satisfying yka<yk+1.
    3 Check if k=k, if so, stop and let a=r˜Bα, k=R, if not, go to the next step.
    4 Calculate s=sign(kk), α=αsmax(k,k)i=min(k,k)+1yi[¯fR˜Bα(yi)f_R˜Bα(yi)],
    β=βsmax(k,k)i=min(k,k)+1[¯fR˜Bα(yi)f_R˜Bα(yi)], a=α/β.
    5 Let a=a,α=α,β=β,and k=k and go to Step 2.

     | Show Table
    DownLoad: CSV
    Table 6.  SBCEKM algorithms [16,17,18,31,32] for computing the centroid.
    Step For l˜Bα
    1 Let ρ=(dc¯fR˜Bα(y)dy)/(dcf_R˜Bα(y)dy), a=c+(dc)/(ρ+1),
    and compute α=acy¯fR˜Bα(y)dy+dayf_R˜Bα(y)dy,
    β=ac¯fR˜Bα(y)dy+daf_R˜Bα(y)dy, a=α/β.
    2 Check if |aa|ε, if so, stop and let a=l˜Bα, if not, go to the fourth step.
    3 Calculate s=sign(aa), α=α+smax(a,a)min(a,a)y[¯fR˜Bα(y)f_R˜Bα(y)]dy,
    β=β+smax(a,a)min(a,a)[¯fR˜Bα(y)f_R˜Bα(y)]dy, a=α/β.
    4 Let a=a,a=a,α=α,β=β and go to the Step 2.
    Step For r˜Bα
    1 Let ρ=(dc¯fR˜Bα(y)dy)/(dcf_R˜Bα(y)dy), a=c+(dc)/(1/ρ+1),
    and compute α=acyf_R˜Bα(y)dy+day¯fR˜Bα(y)dy,
    β=acf_R˜Bα(y)dy+da¯fR˜Bα(y)dy, a=α/β.
    2 Check if |aa|ε, if so, stop and let a=r˜Bα, if not, go to the fourth step.
    3 Compute s=sign(aa), α=αsmax(a,a)min(a,a)y[¯fR˜Bα(y)f_R˜Bα(y)]dy,
    β=βsmax(a,a)min(a,a)[¯fR˜Bα(y)f_R˜Bα(y)]dy, a=α/β.
    4 Let a=a,a=a,α=α,β=β and go to the Step 2.

     | Show Table
    DownLoad: CSV

    In order to give the proposed SBDEKM algorithms, we divide the searching space for SBEKM algorithms. Wang et al. proposed the divided-search EKM (DEKM) algorithms [20] for calculating the centroids of IT2 FSs. Here we first extend it for completing the centroid TR for GT2 FLSs. For computing l˜Bα, the initialization of the DEKM algorithms is:

    k=round(n/2.4). (31)

    The initialization of the SBDEKM algorithms is:

    k=round[n/(1+ρ)]. (32)

    Next, we introduce how to divide the searching points for the SBDEKM (or DEKM) algorithms. Here, they are given as: round(k/2), k(or round[(k+n)/2)]).The analysis process is as follows:

    At the corresponding alpha-level, for l˜Bα, initialize k and find k. Comparing the values of the current l˜Bα=α/β, yk, and yk+1. There may be three major situations:

    Major situation 1: If l˜Bα<yk, judge the relations between l˜Bα and yround(k/2), for which there are three minor situations: i) l˜Bα<yround(k/2), ii) yround(k/2)l˜Bα<yround(k/2)+1, and iii) yround(k/2)+1l˜Bα.

    In i): Search down from round(k/2)1 to 1, seek the k which satisfies ykα/βyk+1.

    In ii): L=round(k/2).

    In iii): Search up from round(k/2)+1 to k1, find the k which satisfies ykα/βyk+1.

    Major situation 2: If ykl˜Bα<yk+1, L=k.

    Major situation 3: If yk+1l˜Bα, then judge the relations between l˜Bα and yround[(k+n)/2]. There may be three minor situations: i)l˜Bα<yround[(k+n)/2], ii)yround[(k+n)/2]l˜Bα<yround[(k+n)/2]+1, and iii)yround[(k+n)/2]+1l˜Bα.

    In i): Search down from round[(k+n)/2] to 1, seek the k which satisfies ykα/βyk+1.

    In ii): L=round[(k+n)/2].

    In iii): Search up from L=round[(k+n)/2]+1 to n1, find the k which satisfies ykα/βyk+1.

    For r˜Bα, initialize k and find k. Comparing the values of the current r˜Bα=α/β, yk, and yk+1. There maybe three major situations:

    Major situation 1: If r˜Bα<yk, judge the relations between r˜Bα and yround(k/2), for which there are three minor situations: i) r˜Bα<yround(k/2), ii) yround(k/2)r˜Bα<yround(k/2)+1, and iii) yround(k/2)+1r˜Bα.

    In i): Search down from round(k/2)1 to 1, seek for the k which satisfies ykα/βyk+1.

    In ii): R=round(k/2).

    In iii): Search up from round(k/2)+1 to k1, find the k which satisfies ykα/βyk+1.

    Major situation 2: If ykr˜Bα<yk+1, R=k.

    Major situation 3: If yk+1r˜Bα, then judge the relations between r˜Bα and yround[(k+n)/2]. There may be three minor situations: i)r˜Bα<yround[(k+n)/2], ii)yround[(k+n)/2]r˜Bα<yround[(k+n)/2]+1, and iii)yround[(k+n)/2]+1r˜Bα.

    In i): Search down from round[(k+n)/2] to 1, seek for the k which satisfies ykα/βyk+1.

    In ii): R=round[(k+n)/2].

    In iii): Search up from R=round[(k+n)/2]+1 to n1, find the k which satisfies ykα/βyk+1.

    Finally, we provide the computation steps for the SBDEKM algorithms.

    For l˜Bα,

    Step 1. Set k=[n/(1+ρ)].

    Step 2. Compute α=ki=1yi¯f˜Bα(yi)+ni=k+1yif_˜Bα(yi), and β=ki=1¯f˜Bα(yi)+ni=k+1f_˜Bα(yi).

    Step 3. If α/β<yk and α/β<yround(k/2), then search down from round(k/2)1 to 1, seek the k which satisfies ykα/βyk+1, and go to Step 10.

    Step 4. If yround(k/2)α/β<yround(k/2)+1, then l˜Bα=α/β, L=k, and go to Step 10.

    Step 5. If yround(k/2)α/β<yk, then search down from round(k/2)+1 to k1, find the k which satisfies ykα/βyk+1, and go to Step 10.

    Step 6. If ykα/β<yk+1, then l˜Bα=α/β, L=k, and go to Step 10.

    Step 7. If yk+1α/β<yround[(k+n)/2], then search down from round[(k+n)/2]1 to k+1, find the k which satisfies ykα/βyk+1, and go to Step 10.

    Step 8. If yround[(k+n)/2]α/β<yround[(k+n)/2]+1, let l˜Bα=α/β, L=round[(k+n)/2], and go to Step 10.

    Step 9. If yk+1α/β and yround[(k+n)/2]+1α/β, then search up from round[(k+n)/2]+1 to n1, seek for the k which meets ykα/βyk+1, and go to Step 10.

    Step 10. Calculate s=sign(kk),

    α=α+smax(k,k)i=min(k,k)+1yi[¯f˜Bα(yi)f_˜Bα(yi)], and β=β+smax(k,k)i=min(k,k)+1[¯f˜Bα(yi)f_˜Bα(yi)].

    Step 11. Update k=k.

    Step 12. Search down from k to 1, seek the k which satisfies ykα/βyk+1.

    Step 13. While kk.

    Step 14. Update α=αki=k+1yi[¯f˜Bα(yi)f_˜Bα(yi)], β=βki=k+1[¯f˜Bα(yi)f_˜Bα(yi)], and k=k.

    Step 15. Search down from k to 1, seek the k which satisfies ykα/βyk+1.

    Step 16. End while.

    Step 17. Let l˜B=α/β, L=k.

    For r˜Bα:

    Step 1. Set k=[n/(1+1/ρ)].

    Step 2. Compute α=ki=1yif_˜Bα(yi)+ni=k+1yi¯f˜Bα(yi), and β=ki=1f_˜Bα(yi)+ni=k+1¯f˜Bα(yi).

    Step 3. If α/β<yk and α/β<yround(k/2), then search down from round(k/2)1 to 1, seek for the k which satisfies ykα/βyk+1, and go to Step 10.

    Step 4. If yround(k/2)+1α/β<yk, then search up from round(k/2)+1 to k1, find the k which meets ykα/βyk+1, and go to Step 10.

    Step 5. If yround(k/2)α/β<yround(k/2)+1, let r˜Bα=α/β, R=k, and go to Step 10.

    Step 6. If yk+1α/β and yround[(k+n)/2]+1α/β, then search up from round[(k+n)/2]+1 to n1, seek for the k which satisfies ykα/βyk+1, and go to Step 10.

    Step 7. If yk+1α/β<yround[(k+n)/2], then search down from round[(k+n)/2]1 to k+1, find the k which satisfies ykα/βyk+1, and go to Step 10.

    Step 8. If yround[(k+n)/2]α/β<yround[(k+n)/2]+1, let r˜Bα=α/β, R=round[(k+n)/2], and go to Step 10.

    Step 9. If ykα/β<yk+1, then r˜Bα=α/β, R=k, and go to Step 10.

    Step 10. Calculate s=sign(kk),

    α=αsmax(k,k)i=min(k,k)+1yi[¯f˜Bα(yi)f_˜Bα(yi)], and β=βsmax(k,k)i=min(k,k)+1[¯f˜Bα(yi)f_˜Bα(yi)].

    Step 11. Update k=k.

    Step 12. Search up from k to n1, seek the k which satisfies ykα/βyk+1.

    Step 13. While kk.

    Step 14. Update α=αki=k+1yi[¯f˜Bα(yi)f_˜Bα(yi)], β=βki=k+1[¯f˜Bα(yi)f_˜Bα(yi)], and k=k.

    Step 15. Search up from k to n1, seek the k which satisfies ykα/βyk+1.

    Step 16. End while.

    Step 17. Let r˜Bα=α/β, R=k.

    Here we give four simulation examples. According to the fuzzy inference, by combining the firing fuzzy rule, let the output GT2 FS be known in advance.

    In example one, the footprint of uncertainty (FOU) of primary membership function (MF) is composed of piecewise linear functions [17,18,33,34,35], while the secondary MF (or say vertical slice) is selected as the trapezoidal MF. In example two, for the primary MF, FOU is composed of Gaussian functions and linear functions [36,37,38,39,40,41], while the vertical slice is selected as the trapezoidal MF. In example three, for the primary MF, whose FOU is completely composed of Gaussian functions [17,18,33,34,35], while the secondary MF is selected as the triangle MF. In instance four, for the primary MF, FOU is selected as the Gaussian T2 MF which has uncertain standard deviations [36,37,38,39,40,41], while the secondary MF is selected as the triangle MF.

    In computer simulation experiments, the alpha is equally decomposed into: 0,1/Δ,,1, where Δ represents the number of effective values. Here we let Δ be varied from one to a hundred with a step size of 1. First Table 7 and Figure 1 provide the defined FOUs for the four examples.

    Table 7.  Representation of FOUs [18,34,35,36].
    Num Representation
    1 f_˜B1(y)=max{[y16, 1y37y6, y(4, 7]0, else],[y36, y[3,5] 8y9, y(5, 8]0, else]},
    ¯f˜B1(y)=max{[y12, 1y37y4, y(3,7]0, else],[y25, y[2,6]162y5, 6 < y80, else]}.
    2 f_˜B2(y)={0.6(y+5)19,5y2.60.4(14y)19,2.6<y14,
    ¯f˜B2(y)={exp[12(y25)2],y[- 5, 7.185]exp[12(y91.75)2],y(7.185,14].
    3 f_˜B3(y)=max{0.5exp[(y3)22],0.4exp[(y6)22]},
    ¯f˜B3(y)=max{exp[0.5(y3)24],0.8exp[0.5(y6)24]}.
    4 f_˜B4(y)=exp[12(y30.25)2],
    ¯f˜B4(y)=exp[12(y31.75)2].

     | Show Table
    DownLoad: CSV
    Figure 1.  Graphs for FOUs; (a) instance one; (b) instance two; (c) instance three, and (d) instance four.

    Let the primary variable be y[0,10] in Examples 1, 3 and 4. Suppose that the primary variable is y[5, 14] in instance two. Moreover, the Table 8 and Figure 2 provide the vertical slices of four instances.

    Table 8.  Representations of secondary membership functions for four examples [18,27,28,29].
    Num Representation
    1 L(y)=f_(y)+0.6w[¯f(y)f_(y)],
    R(y)=¯f(y)35(1w)[¯f(y)f_(y)],
    and w is 0
    2 Just as in example one
    3 Apex=f_(y)+w[¯f(y)f_(y)], and w=0.5
    4 Just as in example three, and w=0.75

     | Show Table
    DownLoad: CSV
    Figure 2.  Graphs of secondaryMFs; (a) instance one; (b) instance two; (c) instance three, and (d) instance four.

    Because the computations of l˜Bα and r˜Bα are quite similar, only the l˜Bα is calculated in four simulations. Here the SBCEKM algorithms are considered as a benchmark. As the number of effective alpha-planes Δ=100, let the error accuracy ε=106, then the left centroid type-reduced sets calculated by the benchmark are given in Figure 3.

    Figure 3.  The left centroid type-reduced sets computed by the SBCEKM algorithms; (a) instance one; (b) instance two; (c) instance three, and (d) instance four.

    Then the left centroid type-reduced sets computed by the EKM algorithms, SBEKM algorithms and proposed SBDEKM algorithms are provided in Figure 4.

    Figure 4.  The left type-reduced sets computed by EKM, SBEKM, and SBDEKM algorithms; (a) instance one; (b) instance two; (c) instance three, and (d) instance four.

    Furthermore, for comparing the performances of these three algorithms, the defined graphs for the absolute errors of type-reduced sets between the benchmark SBCEKM, EKM algorithms, SBEKM algorithms and the proposed SBDEKM algorithms are provided in Figure 5, in which the independent variable is the grade of type-reduced MF.

    Figure 5.  Absolute errors of left type-reduced sets between the SBCEKM, EKM algorithms, SBEKM algorithms and SBDEKM algorithms; (a) Example 1; (b) Example 2; (c) Example 3, and (d) Example 4.

    In order to measure the calculational accuracies of the EKM, SBEKM, and SBDEKM algorithms quantitatively, we define the means of relative absolute errors as:|CEKMi,SBEKMi,SBDEKMiCSBCEKMi|/|CSBCEKMi|(i=1,2,,4), where CSBCEKMi is the benchmark results of SBCEKM algorithms. Table 9 provides the means of absolute errors of the EKM, SBDEKM, and SBDEKM algorithms, where the results in this table are divided by 104.

    Table 9.  Means of relative absolute errors of the EKM, SBEKM, and SBDEKM algorithms (/104).
    Algorithms EKM SBEKM SBDEKM
    Example 1 0.00058 0.00054 0.00052
    Example 2 0.41340 0.68047 0.68162
    Example 3 0.11373 0.11440 0.11451
    Example 4 0.00612 0.01134 0.00685
    Total average 0.13346 0.20169 0.20088

     | Show Table
    DownLoad: CSV

    Observing Figures 4, 5 and Table 9, we can make the following conclusions:

    For the absolute errors of type-reduced sets between the benchmark SBCEKM algorithms and the EKM, SBEKM, and SBDEKM algorithms, the results of all of them converge to certain values. In example one, the SBDEKM algorithms obtain the smallest value. In other three examples and for the total average, the EKM algorithms get the smallest value. However, as the results in Table 9 should be divided by 104, the differences between these results are very small (see the Figure 3), and so these three kinds of discrete algorithms can get almost the same computational accuracies. If more attention was paid to computational accuracy, we should use the SBWEKM algorithms.

    Next, the more important computational times for these three types of algorithms are researched for potential applications. Here the unrepeatable computational times rely on the computer hardware and software environments. The simulation platform consists of a dual core CPU desktop and MATLAB 2013a. In the test, as the number of samples of primary variable is selected as n=50:5000 with a stepsize of 50. The specific unrepeatable calculation times for four instances are given in Figure 6.

    Figure 6.  Computation times comparions for EKM, SBEKM and SBDEKM algorithms; (a) instance one; (b) instance two; (c) instance three, and (d) instance four.

    Generally speaking, the computational times of the three types of algorithms vary linearly in correspondence with the number of samples. Therefore, the linear regression model t=g+hn can be selected here for simulation, where t represents the calculation time, and g and h are two coefficients. Finally, Table 10 provides the regression coefficients. The calculational time variance rate is given as:

    (maxi=1,,4{ti}mini=1,,4{ti})/maxi=1,,4{ti}. (33)
    Table 10.  Regression coefficients of three types of algorithms.
    Coefficient/104(g,h) EKM SBEKM SBDEKM
    Example 1 0.0524 -1.4608 0.0682 13.8054 0.0330 11.5248
    Example 2 0.0531 -0.7299 0.0645 12.8895 0.0337 9.7175
    Example 3 0.0329 7.1359 0.0382 15.7954 0.0303 11.1144
    Example 4 0.0412 7.0540 0.0581 4.4558 0.0290 12.8824

     | Show Table
    DownLoad: CSV

    Observing Figure 6 and Table 10, it is clear that the computational times of proposed SBDEKM algorithms are much less than the EKM and SBEKM algorithms. The SBDEKM algorithms should be considered as the first, and the other two types of algorithms should be viewed as the second. As the start of the SBEKM algorithms is more complicated than the EKM algorithms, the computational times of EKM algorithms are better than SBEKM algorithms. In a word, the relation between the times of three kinds of algorithms is:

    SBDEKM < EKM < SBDEKM. Moreover, the computational time difference rate for these four instances is between 17.68%~71.16%.

    On the basis of the above analysis, it is reasonable to see that the initialization and searching spaces have an effect on completing the centroid TR. Therefore, we should adopt the SBDEKM algorithms for studying the TR. If we only consider the computational accuracies, these three types of algorithms almost have the same performances. However, if we consider both the calculational accuracies and times comprehensively, it is suggested that one uses the SBDEKM algorithms for performing the centroid TR with piece-wise defined primary MF and trapezoidal secondary MF as in instance 1, Gaussian and linear primary MFs and trapezoidal vertical slice as in Example 2, Gaussian primary MF and triangular secondary MF as in Example 3, and uncertain derivation primary MF and triangular secondary MF as in Example 4.

    This paper explains the sensible beginning and divides the searching space for EKM algorithms, and then the SBDEKM algorithms are put forward to complete the centroid TR. Compared with both the EKM and SBEKM algorithms, the SBDEKM algorithms can significantly improve the efficiencies of computations.

    Next, we will study the SBWEKM algorithms for finishing the TR of IT2 and GT2 FLSs. Both the computational accuracy and efficiency should be enhanced. Furthermore, the center-of-sets (COS) TR [42,43] of IT2 FLSs and GT2 FLSs should continue to be investigated, and designing and applying T2 FLSs optimized with the hybrid application of different kinds of optimization algorithms [9,10,40,41,42,43,44,45,46,47,48,49] will be further focused on.

    The authors declare that they have not used Artificial Intelligence (AI) tools in the creation of this article.

    The paper is supported by the National Natural Science Foundation of China (61973146, 61773188), and the Education Department of Liaoning Province (LJKQZ2021143).

    The author is thankful to the Professor Mendel, who has provided some important advices.

    The authors declare that they have no conflict of interest.



    [1] R. P. Agarwal, N. Elezović, and J. Pečarić, On some inequalities for beta and gamma functions via some classical inequalities, J. Inequal. Appl., 2005 (2005), 593-613.
    [2] P. Agarwal, M. Jleli, and F. Qi, Extended Weyl fractional integrals and their inequalities, ArXiv: 1705.03131, 2017. Available from: https://arxiv.org/abs/1705.03131.
    [3] P. Agarwal, F. Qi, M. Chand, et al. Certain integrals involving the generalized hypergeometric function and the Laguerre polynomials, J. Comput. Appl. Math., 313 (2017), 307-317. doi: 10.1016/j.cam.2016.09.034
    [4] M. Biernacki and J. Krzyż, On the monotonity of certain functionals in the theory of analytic functions, Ann. Univ. Mariae Curie-Skłodowska. Sect. A, 9 (1955), 135-147.
    [5] S. I. Butt, J. Pečarić, and A. U. Rehman, Exponential convexity of Petrović and related functional, J. Inequal. Appl., 2011 (2011), 89.
    [6] M. A. Chaudhry, A. Qadir, M. Rafique, et al. Extension of Euler's beta function, J. Comput. Appl. Math., 78 (1997), 19-32. doi: 10.1016/S0377-0427(96)00102-1
    [7] M. A. Chaudhry, A. Qadir, H. M. Srivastava, et al. Extended hypergeometric and confluent hypergeometric functions, Appl. Math. Comput., 159 (2004), 589-602.
    [8] S. S. Dragomir, R. P. Agarwal and N. S. Barnett, Inequalities for Beta and Gamma functions via some classical and new integral inequalities, J. Inequal. Appl., 5 (2000), 103-165.
    [9] D. Karp and S. M. Sitnik, Log-convexity and log-concavity of hypergeometric-like functions, J. Math. Anal. Appl., 364 (2010), 384-394. doi: 10.1016/j.jmaa.2009.10.057
    [10] P. Kumar, S. P. Singh and S. S. Dragomir, Some inequalities involving beta and gamma functions, Nonlinear Anal. Forum, 6 (2001), 143-150.
    [11] K. S. Miller and S. G. Samko, A note on the complete monotonicity of the generalized MittagLeffler function, Real Analysis Exchange, 23 (1997), 753-756.
    [12] S. R. Mondal, Inequalities of extended beta and extended hypergeometric functions, J. Inequal. Appl., 2017 (2017), 10.
    [13] K. S. Nisar and F. Qi, On solutions of fractional kinetic equations involving the generalized kBessel function, Note di Matematica, 37 (2018), 11-20.
    [14] K. S. Nisar, F. Qi, G. Rahman, et al. Some inequalities involving the extended gamma function and the Kummer confluent hypergeometric k-function, J. Inequal. Appl., 2018 (2018), 135.
    [15] H. Pollard, The completely monotonic character of the Mittag-Leffler function Ea(-x), B. Am. Math. Soc., 54 (1948), 1115-1116.
    [16] F. Qi, Limit formulas for ratios between derivatives of the gamma and digamma functions at their singularities, Filomat, 27 (2013), 601-604. doi: 10.2298/FIL1304601Q
    [17] F. Qi and R. P. Agarwal, On complete monotonicity for several classes of functions related to ratios of gamma functions, J. Inequal. Appl., 2019 (2019), 36.
    [18] F. Qi, A. Akkurt and H. Yildirim, Catalan numbers, k-gamma and k-beta functions, and parametric integrals, J. Comput. Anal. Appl., 25 (2018), 1036-1042.
    [19] F. Qi, R. Bhukya and V. Akavaram, Inequalities of the Grünbaum type for completely monotonic functions, Adv. Appl. Math. Sci., 17 (2018), 331-339.
    [20] F. Qi, R. Bhukya and V. Akavaram, Some inequalities of the Turán type for confluent hypergeometric functions of the second kind, Stud. Univ. Babeş-Bolyai Math., 64 (2019), 63-70. doi: 10.24193/subbmath.2019.1.06
    [21] F. Qi, L. H. Cui and S. L. Xu, Some inequalities constructed by Tchebysheff's integral inequality, Math. Inequal. Appl., 2 (1999), 517-528.
    [22] F. Qi and W. H. Li, A logarithmically completely monotonic function involving the ratio of gamma functions, J. Appl. Anal. Comput., 5 (2015), 626-634.
    [23] F. Qi and W. H. Li, Integral representations and properties of some functions involving the logarithmic function, Filomat, 30 (2016), 1659-1674. doi: 10.2298/FIL1607659Q
    [24] F. Qi and A. Q. Liu, Completely monotonic degrees for a difference between the logarithmic and psi functions, J. Comput. Appl. Math., 361 (2019), 366-371. doi: 10.1016/j.cam.2019.05.001
    [25] F. Qi and K. S. Nisar, Some integral transforms of the generalized k-Mittag-Leffler function, Publ. Inst. Math. (Beograd) (N.S.), 104 (2019), in press.
    [26] F. Qi, G. Rahman and K. S. Nisar, Convexity and inequalities related to extended beta and confluent hypergeometric functions, HAL archives, 2018. Available from:https://hal.archives-ouvertes.fr/hal-01703900.
    [27] S. L. Qiu, X. Y. Ma and Y. M. Chu, Sharp Landen transformation inequalities for hypergeometric functions, with applications, J. Math. Anal. Appl., 474 (2019), 1306-1337. doi: 10.1016/j.jmaa.2019.02.018
    [28] E. D. Rainville, Special Functions, Macmillan, New York, 1960.
    [29] W. Rudin, Real and Complex Analysis, Third edition, McGraw-Hill Book Co., New York, 1987.
    [30] M. Shadab, S. Jabee and J. Choi, An extension of beta function and its application, Far East Journal of Mathematical Sciences (FJMS), 103 (2018), 235-251. doi: 10.17654/MS103010235
    [31] J. F. Tian and M. H. Ha, Properties of generalized sharp Hölder's inequalities, J. Math. Inequal., 11 (2017), 511-525.
    [32] M. K. Wang, H. H. Chu and Y. M. Chu, Precise bounds for the weighted Hölder mean of the complete p-elliptic integrals, J. Math. Anal. Appl., 480 (2019), 123388.
    [33] M.-K. Wang, Y.-M. Chu and Y.-P. Jiang, Ramanujan's cubic transformation inequalities for zerobalanced hypergeometric functions, Rocky MT J. Math., 46 (2016), 679-691. doi: 10.1216/RMJ-2016-46-2-679
    [34] M.-K. Wang, Y. M. Chu and W. Zhang, Monotonicity and inequalities involving zero-balanced hypergeometric function, Math. Inequal. Appl., 22 (2019), 601-617.
    [35] M. K. Wang, Y. M. Chu and W. Zhang, Precise estimates for the solution of Ramanujan's generalized modular equation, Ramanujan J., 49 (2019), 653-668. doi: 10.1007/s11139-018-0130-8
    [36] Z. H. Yang, W. M. Qian, Y. M. Chu, et al. On rational bounds for the gamma function, J. Inequal. Appl., 2017 (2017), 210.
  • This article has been cited by:

    1. Muhumuza Ezra Rubanda, Livingstone Senyonga, Mohammed Ngoma, Muyiwa S. Adaramola, Energy market integration: Harmonizing tariff recourse policies in East Africa, 2023, 84, 09571787, 101653, 10.1016/j.jup.2023.101653
    2. Dilshod Hudayberganov, Farxod Abdullaev, Tukhtabek Rakhimov, Maksuda Aminova, Sarvar Norboyev, I. Abdullayev, V. Kukhar, E. Akhmetshin, D. Bekjanov, A. Carballo-Penela, Possibilities of organizing smart markets in the region, 2023, 449, 2267-1242, 04001, 10.1051/e3sconf/202344904001
    3. Fazıl GÖKGÖZ, Öykü YÜCEL, Measuring The Long-Term Impact of Wind, Run-of-River, Solar Renewable Energy Alternatives on Market Clearing Prices, 2024, 09601481, 122292, 10.1016/j.renene.2024.122292
  • Reader Comments
  • © 2019 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(4941) PDF downloads(426) Cited by(5)

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog