Loading [MathJax]/jax/output/SVG/jax.js
Research article

Finite-/fixed-time synchronization of leakage and discrete delayed Hopfield neural networks with diffusion effects

  • Received: 03 March 2023 Revised: 06 May 2023 Accepted: 08 May 2023 Published: 26 May 2023
  • In this paper, the problem on finite-/fixed-time synchronization (FFTS) is investigated for a class of diffusive Hopfield neural networks with leakage and discrete delays. Some new and useful criteria independent on time delays but dependent on the diffusion coefficients are established to guarantee the FFTS for the addressed network model under a unified framework. In sharp contrast to the existed results which can only finite-timely or fixed-timely synchronize the systems with both diffusion effects and leakage delays, the theoretical results of this paper are more general and practical. Finally, a numerical example is presented to show the effectiveness of the proposed control methods.

    Citation: Minglei Fang, Jinzhi Liu, Wei Wang. Finite-/fixed-time synchronization of leakage and discrete delayed Hopfield neural networks with diffusion effects[J]. Electronic Research Archive, 2023, 31(7): 4088-4101. doi: 10.3934/era.2023208

    Related Papers:

    [1] Yang Chen, Jinxia Wu, Jie Lan . Study on reasonable initialization enhanced Karnik-Mendel algorithms for centroid type-reduction of interval type-2 fuzzy logic systems. AIMS Mathematics, 2020, 5(6): 6149-6168. doi: 10.3934/math.2020395
    [2] Yang Chen, Jiaxiu Yang, Chenxi Li . Design of reasonable initialization weighted enhanced Karnik-Mendel algorithms for centroid type-reduction of interval type-2 fuzzy logic systems. AIMS Mathematics, 2022, 7(6): 9846-9870. doi: 10.3934/math.2022549
    [3] Yang Chen, Chenxi Li . Study on sensible beginning divided-search enhanced Karnik-Mendel algorithms for centroid type-reduction of general type-2 fuzzy logic systems. AIMS Mathematics, 2024, 9(5): 11851-11876. doi: 10.3934/math.2024580
    [4] Mengmeng Wang, Xiangzhi Kong . Multi-attribute group decision making algorithm based on (p, q)-rung interval-valued orthopair fuzzy set and weight optimization model. AIMS Mathematics, 2023, 8(10): 23997-24024. doi: 10.3934/math.20231224
    [5] Wenyi Zeng, Rong Ma, Deqing Li, Qian Yin, Zeshui Xu, Ahmed Mostafa Khalil . Novel operations of weighted hesitant fuzzy sets and their group decision making application. AIMS Mathematics, 2022, 7(8): 14117-14138. doi: 10.3934/math.2022778
    [6] Murugan Palanikumar, Nasreen Kausar, Harish Garg, Shams Forruque Ahmed, Cuauhtemoc Samaniego . Robot sensors process based on generalized Fermatean normal different aggregation operators framework. AIMS Mathematics, 2023, 8(7): 16252-16277. doi: 10.3934/math.2023832
    [7] Rana Muhammad Zulqarnain, Xiao Long Xin, Muhammad Saeed . Extension of TOPSIS method under intuitionistic fuzzy hypersoft environment based on correlation coefficient and aggregation operators to solve decision making problem. AIMS Mathematics, 2021, 6(3): 2732-2755. doi: 10.3934/math.2021167
    [8] Miaoxia Chen, Abdul Samad Shibghatullah, Kasthuri Subramaniam, Xiaopeng Yang . Weighted minimax programming subject to the max-min fuzzy relation inequalities. AIMS Mathematics, 2024, 9(6): 13624-13641. doi: 10.3934/math.2024665
    [9] Kanjanaporn Tansri, Pattrawut Chansangiam . Gradient-descent iterative algorithm for solving exact and weighted least-squares solutions of rectangular linear systems. AIMS Mathematics, 2023, 8(5): 11781-11798. doi: 10.3934/math.2023596
    [10] Jun Hu, Jie Wu, Mengzhe Wang . Research on VIKOR group decision making using WOWA operator based on interval Pythagorean triangular fuzzy numbers. AIMS Mathematics, 2023, 8(11): 26237-26259. doi: 10.3934/math.20231338
  • In this paper, the problem on finite-/fixed-time synchronization (FFTS) is investigated for a class of diffusive Hopfield neural networks with leakage and discrete delays. Some new and useful criteria independent on time delays but dependent on the diffusion coefficients are established to guarantee the FFTS for the addressed network model under a unified framework. In sharp contrast to the existed results which can only finite-timely or fixed-timely synchronize the systems with both diffusion effects and leakage delays, the theoretical results of this paper are more general and practical. Finally, a numerical example is presented to show the effectiveness of the proposed control methods.



    The computationally relative simple interval type-2 fuzzy sets (IT2 FSs) are currently the most commonly used T2 FSs. Therefore, interval type-2 fuzzy logic systems (IT2 FLSs [1,2,57]) based on IT2 FSs have superior ability to cope with uncertainties environments like power systems [3], permanent magnetic drive [4,5,6], intelligent controllers [7], medical systems [8], pattern recognition systems [9], database and information systems [10] and so on. The footprint of uncertainty (FOU) of an IT2 FS [11] make it own more design degrees of freedom compared with a T1 FS. Generally speaking, a T2 FLS (see Figure 1) is composed of fuzzifier, rules, inference, type-reducer and defuzzifier. Among which, the block of type-reduction plays the central role of transforming the T2 to the T1 FS. Finally the defuzzification changes the T1 FS to the crisp output.

    Figure 1.  A T2 FLS [12].

    In the past decades, many types of type-reduction (TR) were proposed gradually. Among which, the most famous one is the Karnik-Mendel (KM) algorithms [13]. This type of algorithms has the advantages of preserving the uncertainties flow between the upper and lower membership functions (MFs) of T2 FLSs. Then the continuous KM (CKM) algorithms [14] were put forward, in addition, the monotoncity and super convergence property of them were proved. For the sake of improving the calculation efficiency, Wu and Mendel proposed the enhanced KM (EKM) algorithms [15]. Extensive simulation experiments show that the EKM algorithms can save two iterations on average compared with the KM algorithms. Then Liu et al. gave the theoretical explanations for the initialization of EKM algorithms and extended the EKM algorithms to three different forms of weighted-based EKM (WEKM) algorithms [16,17] to calculate the more accurate centroids of type-2 fuzzy sets.

    However, the iterative natures of KM types of algorithms make the applications of corresponding IT2 FLSs more challenge. Therefore, other types of noniterative algorithms [18] are proposed gradually, and they are Nagar-Bardini (NB) algorithms [19], Nie-Tan (NT) algorithms [20], Begian-Melek-Mendel (BMM) algorithms [21,22] and so on. Among which, IT2 FLSs based on the NB algorithms are proved to have superior performances to respond to the affect of uncertainties in systems’ parameters to the IT2 FLSs according to other algorithms like EKM, BMM, Greenfield-Chiclana Collapsing Defuzzifier (GCCD [24]) and Wu-Mendel Uncertainty Bound (UB [24]). Moreover, Nie-Tan (NT) algorithms have the simple closed form. Recent studies prove that the continuous NT (CNT) algorithms [20] to be accurate algorithms to calculate the centroid of IT2 FSs. In addition, BMM algorithms [18] are proved to be more generalized forms of NB and NT algorithms. All these works have laid theoretical foundations for studying the TR of T2 FLSs.

    In order to obtain more accurate centroid TR of IT2 FLSs, this paper extends the NB, NT, and BMM algorithms to the corresponding WNB, WNT, and WBMM algorithms according to the Newton-Cotes quadrature formulas. The rest of this paper is organized as follows. Section 2 introduces the background of IT2 FLSs. Section 3 provides the Newton-Cotes formulas, the weighted-based noniterative algorithms, and how to adopt them to perform the centroid TR of IT2 FLSs. Section 4 gives four computer simulation examples to illustrate the performances of weighted-based noniterative algorithms. Finally Section 5 is the conclusions and expectations.

    Definition 1. A T2 FS ˜A can be characterized by its T2 MF μ˜A(x,u), i.e.,

    ˜A={(x,u),μ˜A(x,u)|xX,u[0,1]} (1)

    where the primary variable xX, the secondary variable u[0,1], here Eq (1) is called as the point-value expression, whose compact form is as:

    ˜A=xXu[0,1]μ˜A(x,u)/(x,u) (2)

    Definition 2. The secondary MF of ˜A is a vertical slice of μ˜A(x,u), i.e.,

    μ˜A(x=x,u)μ˜A(x)=u[0,1]fx(u)/u. (3)

    Definition 3. The two dimensional support of μ˜A(x,u) is referred to as the footprint of uncertainty (FOU) of ˜A, i.e.,

    FOU(˜A)=xXJx={(x,u)X×[0,1]|μ˜A(x,u)>0} (4)

    The upper and lower bounds of FOU(˜A) are called as the upper MF (UMF) and lower MF (LMF), respectively, i.e.,

    UMF(˜A)=¯μ˜A(x)=¯FOU(˜A),LMF(˜A)=μ_˜A(x)=FOU(˜A)_. (5)

    Because the secondary membership grades of IT2 FSs are all uniformly equal to 1, i.e., fx(u)1, every IT2 FS can be completely described by its UMF and LMF. Then the vertical slices representation of ˜A can be as:

    ˜A=xXμ˜A(x)/x=xX˜A(x)/x (6)

    Here μ˜A(x) can be denoted as ˜A(x) for simplicity.

    Definition 4. An embedded T1 FS Ae depends on μ˜A(x,u), i.e.,

    Ae={(x,u(x)|xX,uJx}. (7)

    Definition 5. An IT2 FS can be considered as the union of all its embedded T2 FSs ˜Aje, i.e.,

    ˜A=mj=1˜Aje (8)

    where m denotes the number of embedded T2 FSs, ˜Aje=1/Aje, and Eq (8) is referred to as the wavy slices representation [28] of ˜A.

    From the aspect of inference structure, IT2 FLSs can usually be divided into two categories: Mamdani type [3,6,12,18,25] and Takagi-Sugeno-Kang type [4,25,26,27]. Without loss of generality, here we consider a Mamdani IT2 FLS with n inputs x1X1,xnXn and one output yY. The IT2 FLS can be characterized by M fuzzy rules, where the sth fuzzy rule is of the form:

    ˜Rs:Ifx1is˜Fs1andandxnis˜Fsnthenyis ˜Gs(s=1,2,,M) (9)

    in which ˜Fsi(i=1,,n;s=1,,M) is the antecedent IT2 FS, and ˜Gs(s=1,,M) is the consequent IT2 FS.

    For simplicity, here we use the singleton fuzzifier, i.e., the input measurements are modeled as crisp sets (type-0 FSs). As x=x, the firing interval of each fuzzy rule is computed as:

    Fs:{Fs(x)[f_s(x),¯fs(x)],f_s(x)Tni=1μ_˜Fsi(xi),¯fs(x)Tni=1¯μ˜Fsi(xi) (10)

    where T denotes the minimum or product t-norm, and f_s(x) and ¯fs(x) are the left and right end points of the firing interval, respectively.

    As for the centroid TR, we combine the firing interval of each rule with its consequent IT2 FS to obtain the fired-rule output FS ˜Bl(which can be described by its FOU):

    ˜Bs:{FOU(˜Bs)=[μ_˜Bs(y|x),¯μ˜Bs(y|x)],μ_˜Bs(y|x)=f_s(x)μ_˜Gs(y),¯μ˜Bs(y|x)=¯fs(x)¯μ˜Gs(y) (11)

    where represents the minimum or product t-norm.

    Then the output IT2 FS ˜B can be obtained by agammaegating all the fired-rule output FSs as :

    ˜B:{FOU(˜B)=[μ_˜B(y|x),¯μ˜B(y|x)],μ_˜B(y|x)=μ_˜B1(y|x)μ_˜B2(y|x)μ_˜BM(y|x),¯μ˜B(y|x)=¯μ˜B1(y|x)¯μ˜B2(y|x)¯μ˜BM(y|x) (12)

    where denotes the maximum operation.

    Finally the type-reduced set YC(x) can be obtained by computing the centroid of ˜B, i.e.,

    YC(x)=1/[l˜B(x),r˜B(x)] (13)

    where the two end points l˜B(x) and r˜B(x) can be calculated by different types of TR algorithms [13,14,15,16,17,18,19,20,21,22,23,24,29].

    Before introducing the weighted-based noniterative algorithms, we first give the preliminary knowledge: Newton-Cotes quadrature formulas [16,30].

    Generally speaking, the numerical integration is an approach that approximates the definite integral baf(x)dx according to the functional value f(xi) on some certain discrete points. Therefore, the calculation of definite integral can be ascribed to computing functional values.

    Definition 6. (Quadrature formula [16,17,46,47]) Let the discrete points satisfy that a=x0<x1<x2<<xN=b, and the definite integral baf(x)dx=Q(f)+E(f)with the property:

    Q(f)=Ni=0wif(xi)=w0f(x0)++wNf(xN) (14)

    then Eq (14) is referred to as the numerical integration or quadrature formula, where E(f) is called as the remainder or truncation error of integration, {wi}Ni=0 is called as the weight coefficient, and {xi}Ni=0 is the integration node.

    Next, the composite trapezoidal rule, composite Simpson rule, and composite Simpson 3/8 rule to adopted to approximate f(x) as the straight line, quadratic polynomial function, and cubic polynomial function, respectively.

    Theorem 1. (Composite trapezoidal rule [16,17,46,47]) Let y=f(x) be a function defined on [a,b]. Divide the interval [a,b] into N subintervals {xi=1,xi}Ni=1 with the equidistance h=baN, where the equidistance node is as xi=x0+ih(i=0,1,,N), then the numerical approximation of definite integral with the composite trapezoidal rule is as

    baf(x)dx=h2[f(a)+f(b)+2N1i=1f(xi)]+ET(f,h) (15)

    Suppose that f be second order continuous differentiable on [a,b], then the remainder ET(f,h)=(ba)f(ζ)12h2, where ζ(a,b).

    Theorem 2. (Composite Simpson rule [16,17,46,47]) Let y=f(x) be a function defined on [a,b]. Divide the interval [a,b] into 2N subintervals {xi=1,xi}2Ni=1 with the equidistance h=ba2N, where the equidistance node is as xi=x0+ih(i=0,1,,2N), then the numerical approximation of definite integral with the composite Simpson rule is as

    baf(x)dx=h3[f(a)+f(b)+2N1i=1f(x2i)+4N1i=0f(x2i+1)]+ES(f,h) (16)

    Suppose that f be fourth order continuous differentiable on [a,b], then the remainder ES(f,h)=(ba)f(4)(ζ)180h4, where ζ(a,b).

    Theorem 3. (Composite Simpson 3/8 rule [16,17,46,47]) Let y=f(x) be a function defined on [a,b]. Divide the interval [a,b] into 3N subintervals {xi=1,xi}3Ni=1 with the equidistance h=ba3N, where the equidistance node is as xi=x0+ih(i=0,1,,3N), then the numerical approximation of definite integral with the composite Simpson 3/8 rule is as

    baf(x)dx=3h8[f(a)+f(b)+Ni=12f(x3i)+Ni=13f(x3i2)+Ni=13f(x3i1)]+ESC(f,h) (17)

    Suppose that f be fourth order continuous differentiable on [a,b], then the remainder ESC(f,h)=(ba)f(4)(ζ)80h4, where ζ(a,b).

    Here all the integrals are measured in the Lebesgue sense.

    IT2 FLSs based on the closed form of Nagar-Bardini (NB) algorithms [19,46,47] can make distinctly improvement on coping with uncertainties. For the centroid output IT2 FS ˜B, suppose that the primary variable y be equally discretized into N points, i.e., y1<y2<<yN, then the left and right centroid interval can be computed as:

    l˜B=Ni=1yiμ_˜B(yi)Ni=1μ_˜B(yi), and r˜B=Ni=1yi¯μ˜B(yi)Ni=1¯μ˜B(yi). (18)

    Then the defuzzified output can be obtained as:

    yNB=l˜B+r˜B2. (19)

    Similar to the continuous KM types of algorithms [13,14,15,16,17,31], the continuous NB (CNB) algorithms can be adopted for studying the theoretical property of centroid TR and defuzzification of IT2 FLSs.

    Let a=y1<y2<<yN=b, where a and b are the left and right end point of y, respectively, then the CNB algorithms calculate the centroids as:

    l˜B=bayμ_˜B(y)dybaμ_˜B(y)dy, and r˜B=bay¯μ˜B(y)dyba¯μ˜B(y)dy. (20)

    Here the output centroid two end points can be computed without iterations. Furthermore, the output is a linear combination of the output of two T1 FLSs: one constructed from the LMFs, and the other constructed from the UMFs.

    In this section, we propose a type of weighted NB (WNB) algorithms, i.e.,

    l˜B=Ni=1wiyiμ_˜B(yi)Ni=1wiμ_˜B(yi), and r˜B=Ni=1wiyi¯μ˜B(yi)Ni=1wi¯μ˜B(yi). (21)

    WNB algorithms can be considered as the numerical implementation of CNB algorithms. Comparing Eqs (18) and (20), it is found that the CNB and NB algorithms are very similar, i.e., the sum operations in the discrete version are transformed into the definite integral operations in the continuous version, i.e., the sum operations for the sampling points yi play the role of integrating for the integrand.

    According to the quadrature formula (see Eq (14)), the corresponding weights wi for every MF of sampling points yi can be assigned appropriately, then the more accurate computational results may be obtained. Actually, many types of weights assignment method can be used. However, this paper only considers the numerical integration methods based on the Composite trapezoidal rule, Composite Simpson rule, and Composite Simpson 3/8 rule in Newton-Cotes quadrature formulas. And the corresponding WNB algorithms are referred to as the TWNB, SWNB, and S3/8WNB algorithms, respectively. Table 1 provides the weights assignment approach for the three types of weighted-based noniterative algorithms.

    Table 1.  Weights assignment for the weighted-based noniterative algorithms.
    Algorithms Integration rule Weights
    NB, NT, BMM ______________ wi=1(i=1,,N)
    TWNB, TWNT, TWBMM Composite Trapezoidal rule wi={1/2,i=1,N,1,i1,N.
    SWNB, SWNT, SWBMM Composite Simpson rule wi={1/2,i=1,N,1,i=1mod(2),i1,N,2,i=0mod(2),iN.
    S3/8WNB, S3/8WNT, S3/8WBMM Composite Simpson 3/8 rule wi={1/3,i=1,N,2/3,i=1mod(3),i1,N,1,i=2mod(3),iN,1,i=0mod(2),iN.

     | Show Table
    DownLoad: CSV

    The closed form of discrete Nie-Tan (NT) algorithms can compute the centroid output of ˜B straightly as:

    yNT=Ni=1yi[μ_˜B(yi)+¯μ˜B(yi)]Ni=1[μ_˜B(yi)+¯μ˜B(yi)]. (22)

    Most recent studies prove the continuous NT (CNT) algorithms [20] to be an accurate method for computing the centroids of IT2 FSs, i.e.,

    yCNT=bay[μ_˜B(y)+¯μ˜B(y)]dyba[μ_˜B(y)+¯μ˜B(y)]dy. (23)

    This section proposes a type of weighted NT (WNT) algorithms, i.e.,

    yWNT=Ni=1wiyi[μ_˜B(yi)+¯μ˜B(yi)]Ni=1wi[μ_˜B(yi)+¯μ˜B(yi)]. (24)

    WNT algorithms can be viewed as the numerical implementation of CNT algorithms. The sum operations in the discrete NT algorithms are transformed into the definite integral operations in the continuous NT (CNT) algorithms, i.e., the sum operations for the sampling points yi act as integrating for the integrand. Therefore, we can assign weights for every MF of sampling points yi to try to obtain more accurate computational results. Here the corresponding WNT algorithms are referred to as the TWNT, SWNT, and S3/8WNT algorithms, respectively.

    Begian-Melek-Mendel (BMM) algorithms can also obtain the output of IT2 FLSs directly, i.e.,

    yBMM=αNi=1yiμ_˜B(yi)Ni=1μ_˜B(yi)+βNi=1yi¯μ˜B(yi)Ni=1¯μ˜B(yi) (25)

    where α and β are two adjustable coefficients.

    IT2 FLSs based on BMM algorithms [13,21,22] are superior to T1 FLSs counterparts on both robustness and stability. In addition, the BMM algorithms are more generalized form of NB and NT algorithms. Observing the Eqs (19) and (25), it can be found that BMM and NB algorithms are exactly the same while α=αNB=12, and β=βNB=12. For the NT algorithms, the Eq (22) can be simply transformed to:

    yNT=Ni=1μ_˜B(yi)Ni=1[μ_˜B(yi)+¯μ˜B(yi)]×Ni=1yiμ_˜B(yi)Ni=1μ_˜B(yi)+Ni=1¯μ˜B(yi)Ni=1[μ_˜B(yi)+¯μ˜B(yi)]×Ni=1yi¯μ˜B(yi)Ni=1¯μ˜B(yi) =αNTNi=1yiμ_˜B(yi)Ni=1μ_˜B(yi)+βNTNi=1yi¯μ˜B(yi)Ni=1¯μ˜B(yi) (26)

    in which

    αNT=Ni=1μ_˜B(yi)Ni=1[μ_˜B(yi)+¯μ˜B(yi)], and βNT=Ni=1¯μ˜B(yi)Ni=1[μ_˜B(yi)+¯μ˜B(yi)]. (27)

    Comparing the Eqs (25) and (26), it can be found that, as α=αNT and β=βNT, BMM and NT algorithms become the same.

    Continuous BMM (CBMM) algorithms can also be used for studying the theoretical properties of TR of IT2 FLSs, i.e.,

    yCBMM=αbayμ_˜B(y)dybaμ_˜B(y)dy+βbay¯μ˜B(y)dyba¯μ˜B(y)dy. (28)

    Based on the quadrature formula, this section gives a type of weighted BMM (WBMM) algorithms, i.e.,

    yWBMM=αNi=1wiyiμ_˜B(yi)Ni=1wiμ_˜B(yi)+βNi=1wiyi¯μ˜B(yi)Ni=1wi¯μ˜B(yi). (29)

    Here WBMM algorithms can be considered as the numerical implementation of CBMM algorithms. Comparing Eqs (25) and (28), it is found that the CBMM and BMM algorithms are very similar, i.e., the sum operations in the discrete version are transformed into the definite integral operations in the continuous version, i.e., the sum operations for the sampling points yi play the role of integrating for the integrand. This paper considers the numerical integration methods based on the Composite trapezoidal rule, Composite Simpson rule, and Composite Simpson 3/8 rule in Newton-Cotes quadrature formulas. And the corresponding WBMM algorithms are referred to as the TWBMM, SWBMM, and S3/8WBMM algorithms, respectively.

    For the above three types of weighed-based noniterative algorithms (see Table 1), suppose that the primary variable be the letter x, and x is uniformly sampled on[a,b], i.e., xi=a+i1N1(ba), i=1,,N, and mod represents the modular arithmetic.

    Next we can make conclusions about assigning weights for three types of weighted-based noniterative algorithms as:

    1) Substitute xi(i=0,1,,N), x0=a, xN=b in Eq (15), xi(i=0,1,,2N), x0=a, x2N=b in Eq (16), and xi(i=0,1,,3N), x0=a, x3N=b in Eq (17) all by xi(i=1,,N), x1=a, xN=b.

    2) The coefficients h/2h/33h/8 in Eqs (15)-(17) can be cancelled straightly by the quotient of two definite integrals.

    3) In Tables 13, for the TWNB, TWNT, TWBMM, and SWNB, SWNT, SWBMM algorithms, the weights are assigned as 1/2 of the right of Eqs (15) and (16); while for the S3/8WNB, S3/8WNT, and S3/8WBMM algorithms, the weighted are assigned as 1/3 of the right of Eq (17).

    Table 2.  MF expressions for FOUs.
    Num Expression
    1 μ_˜A1(x)=max{[x16, 1x47x6, 4<x70, otherwise],[x36, 3x58x9, 5<x80, otherwise]},
    ¯μ˜A1(x)=max{[x12, 1x37x4, 3<x70, otherwise],[x25, 2x6162x5, 6<x80, otherwise]}
    2 μ_˜A2(x)={0.6(x+5)19,5x2.60.4(14x)19,2.6<x14, ¯μ˜A2(x)={exp[12(x25],5x7.185exp[12(x91.75],7.185<x14
    3 μ_˜A3(x)=max{0.5exp[(x3)22],0.4exp[(x6)22]},
    ¯μ˜A3(x)=max{exp[0.5(x3)24],0.8exp[0.5(x6)24]},
    4 μ_˜A4(x)=exp[12(x30.25)2], ¯μ˜A4(x)=exp[12(x31.75)2],

     | Show Table
    DownLoad: CSV
    Table 3.  Defuzzified values obtained by three types of continuous noniterative algorithms.
    Num Approach
    CNB CNT CBMM
    1 4.3050 4.3208 4.3041
    2 3.7774 3.7141 3.7747
    3 4.3702 4.3953 4.3690
    4 5.0000 5.0000 5.0000

     | Show Table
    DownLoad: CSV

    4) In Tables 13, for the SWNB, SWNT, and SWBMM, and S3/8WNB, S3/8WNT, and S3/8WBMM algorithms, the number of sampling N is not only restricted to N=2n+1 and N=3n+1(as the requirements of N=1mod(2)and N=1mod(3) in Eqs (16) and (17), where n is an integer).

    Finally the inner relations between weighted-based noniterative algorithms and continuous noniterative algorithms for performing the centroid TR of IT2 FLSs can be made as:

    1) Weighted-based noniterative algorithms calculate the type-reduced set YWNontierative based on the linear combinations of functional values on sampling points. While the benchmark continuous noniterative algorithms compute according to the integral operations. In theory, the solutions of weighted-based noniterative algorithms will approach to the continuous noniterative algorithms as the number of sampling N.

    2) As the number of sampling increases, weighted-based noniterative algorithms may obtain more accurate computational results.

    3) Weighted-based noniterative algorithms perform the numerical calculations according to the sum operation, whereas the continuous noniterative algorithms perform the calculations symbolically by means of the integral operations. On the whole, weighted-based noniterative algorithms can be viewed as the numerical implementation of continuous noniterative algorithms according to the numerical integration approaches.

    Four computer simulation examples are provided in this section. Here we suppose that the centroid output IT2 FS [16,18,29,32] has been obtained by merging or weighting fuzzy rules under the guidance the inference before the TR and defuzzification. For the first example, the FOU is bounded by the piece-wise linear functions. For the second example, the FOU is bounded by both the piece-wise linear functions and Gaussian functions. For the third example, the FOU is bounded by the Gaussian functions. For the last example, the FOU is defined as the symmetric Gaussian primary MF with uncertainty derivations. Then Figure 2 and Table 2 show the defined FOUs for four examples. In examples 1, 3 and 4, here we choose the primary variable x[0,10] for tests. In example 2, the primary variable is selected as x[5,15] for test.

    Figure 2.  Graphs of FOUs, (a) example 1; (b) example 2; (c) example 3; and (d) example 4.

    Firstly, the CNB, CNT, and CBMM algorithms are considered the benchmarks to compute the centroid defuzzified values for four examples. And they are provided in Table 3. Here the adjustable coefficient α for CBMM algorithms is chosen as the average of 1000 random numbers distributed on [0, 1], and the other adjustable coefficient is defined asβ=1α.

    Next, we study the performances of proposed three types of weighted-based noniteraitve algorithms, respectively. Here the number of sampling is chosen as N=50:50:4000 for tests, then the graphs of centroid defuzzified values computed by weighted-based noniterative algorithms are shown in Figures 35, respectively. Furthermore, the functional graphs of absolute errors between the continuous noniteraive algorithms and weighted-based noniteraive algorithms are shown in Figures 68.

    Figure 3.  Defuzzified values computed by the WNB algorithms, (a) example 1; (b) example 2; (c) example 3; and (d) example 4.
    Figure 4.  Defuzzified values computed by the WNT algorithms, (a) example 1; (b) example 2; (c) example 3; and (d) example 4.
    Figure 5.  Defuzzified values computed by the WBMM algorithms, (a) example 1; (b) example 2; (c) example 3; and (d) example 4.
    Figure 6.  Absolute errors of defuzzified values between the CNB and WNB algorithms, (a) example 1; (b) example 2; (c) example 3; and (d) example 4.
    Figure 7.  Absolute errors of defuzzified values between the CNT and WNT algorithms, (a) example 1; (b) example 2; (c) example 3; and (d) example 4.
    Figure 8.  Absolute errors of defuzzified values between the CBMM and WBMM algorithms, (a) example 1; (b) example 2; (c) example 3; and (d) example 4.

    Next, let’s quantitatively measure the calculation accuracies of proposed weighted-based noniterative algorithms. For the number of sampling N=50:50:4000, we compute the defined average relative errors |yWNoniteriveiyCNoniterativei|/|yCNoniterativei|(i=1,,4). Then Tables 46 provide the values of average of relative errors with respect to N, in which the last line represents the total averages for four examples.

    Table 4.  Averages of relative errors for (|yWNBiyCNBi|/|yCNBi|(i=1,,4).
    Algorithm NB TWNB SWNB S3/8WNB
    Example 1 0.000029 0.000029 0.000572 0.000067
    Example 2 0.038400 0.001690 0.001450 0.001390
    Example 3 0.009800 0.000094 0.000122 0.001908
    Example 4 0.000110 0.000110 0.000110 0.000731
    Total average 0.016110 0.000640 0.000750 0.001370

     | Show Table
    DownLoad: CSV
    Table 5.  Averages of relative errors for |yWNTiyCNTi|/|yCNTi|(i=1,,4).
    Algorithm NT TWNT SWNT S3/8WNT
    Example 1 0.000043 0.000043 0.000519 0.00096
    Example 2 0.067610 0.002170 0.002430 0.002280
    Example 3 0.013730 0.000050 0.000050 0.002770
    Example 4 0.000028 0.000028 0.000028 0.000458
    Total average 0.027140 0.000760 0.001010 0.001870

     | Show Table
    DownLoad: CSV
    Table 6.  Averages of relative errors for |yWBMMiyCBMMi|/|yCBMMi|(i=1,,4).
    Algorithm BMM TWBMM SWBMM S3/8WBMM
    Example 1 0.000028 0.000028 0.000576 0.000056
    Example 2 0.039650 0.001590 0.001320 0.001290
    Example 3 0.009598 0.000096 0.000125 0.001866
    Example 4 0.000112 0.000112 0.000112 0.000738
    Total average 0.016460 0.000610 0.000710 0.001320

     | Show Table
    DownLoad: CSV

    Then we study the specific computation times of weighted-based noniterative algorithms for better applications. The number of sampling is still chosen as N=50:50:4000. Here the unrepeatable computation times depend on the hardware and software environments. The simulations are performed by a dual-core CPU dell desktop with E5300@2.60GHz and 2.00 GB memory. The programs are operated by Matlab 2013a on Windows XP. Figures 911 provide the comparisons of computation times of weighted-based noniteraitve algorithms for these four examples.

    Figure 9.  Comparsions of computation times for WNB algorithms, (a) example 1; (b) example 2; (c) example 3; and (d) example 4.
    Figure 10.  Comparsions of computation times for WNT algorithms, (a) example 1; (b) example 2; (c) example 3; and (d) example 4.
    Figure 11.  Comparsions of computation times for WBMM algorithms, (a) example 1; (b) example 2; (c) example 3; and (d) example 4.

    Considering the Figures 38, Tables 46, and Figures 911 comprehensively, the following conclusions can be obtained:

    1) In these four examples, the absolute errors of three types of weighted-based noniterative algorithms all converge as the number of sampling increases. In example 1, NB, TWNB, NT, TWNT, and BMM, TWBMM algorithms can obtain the smallest absolute errors and errors amplitudes of variation, while SNB, SNT, and SBMM algorithms get the largest absolute errors and errors amplitude of variation. In both examples 2 and 3, the proposed weighted-based noniterative can obtain the values of absolute errors and errors amplitudes of variation that are obviously less than their corresponding original noniterative algorithms. In the last example, the first three types of weighted-based noniterative algorithms can get almost the same absolute errors and errors amplitudes of variation, while the last type of weighted-based noniterative algorithms obtain the larger ones.

    2) For the NB algorithms, the largest average of relative error is 3.84%. While the largest average of relative error of proposed WNB algorithms is only 0.169%. For the NT algorithms, the largest average of relative error is 6.761%. The largest average of relative error of proposed WNT algorithms is only 0.243%. For the BMM algorithms, the largest average of relative error is 3.965%. The largest average of relative error of proposed WBMM algorithms is only 0.159%.

    3) The total mean of average of relative error of NB algorithms is 1.611%. While the largest total mean of average of relative error of proposed WNB algorithms is only 0.137%. The total mean of average of relative error of NT algorithms is 2.714%. While the largest total mean of average of relative error of proposed WNT algorithms is only 0.187%. The total mean of average of relative error of BMM algorithms is 1.646%. While the largest total mean of average of relative error of proposed WBMM algorithms is only 0.132%.

    4) In general, see Figures 911, the computational speeds of original noniteraive algorithms are faster than their corresponding weighted-based noniterative algorithms. However, the computational speeds first two types on weighted-based noniterative algorithms are almost completely the same. As the number of sampling is fixed, the size relation of computation times is as: S3/8WNoiteraive > SWNoiteraive > TWNoniterative > Noniterative. It may just because the weights of proposed weighted-based noniterative algorithms are more complex than the noniterative algorithms. In other words, the convergence speeds of proposed weighted-based noniteraive algorithms are faster than the original noniterative algorithms.

    5) From the above analysis, it can be found that, by choosing the proposed weighted-based noniteraive algorithms appropriately, which can improve both the calculation accuracies and convergence speeds.

    The proposed weighted-based noniteraive algorithms can be used to investigate the TR and defuzzification of IT2 FLSs. If only the computational accuracy were considered, the proposed three types of weighted-based noniteraive algorithms outperformed the original noniteraive algorithms, in which the second type of weighed-based noniteraive algorithms were the best. Moreover, the computation time of proposed weighted-based noniteraive algorithms were not much different from the original noniteraive algorithms. Considering the above analysis comprehensively, we advise to use the second or third types of weighted-based noniterative algorithms for the TR and defuzzification of IT2 FLSs with the combination of linear functions and nonlinear functions as in examples 1 and 4, and adopt the first or second types of weighted-based noniteraive algorithms for the TR and defuzzification of IT2 FLSs with the combination of linear and nonlinear functions and nonlinear functions as in examples 2 and 3.

    Finally, it is important to point out that, we only focus on the experimental performances of weighted-based noniteraive algorithms. It can be obtained from the simulation examples that, compare with the noniteraive algorithms, the proposed weighted-based noniteraive algorithms can improve the computational accuracies. However, if the requirements of computational accuracy were not high, the weighted-based noniteraive algorithms can not show their advantages, as the simplest noniteraive algorithms could attain well results.

    This paper compares the operations between three types of discrete noniterative algorithms with their corresponding continuous versions. According to the Newton-Cotes quadrature formulas in the numerical integration technique, three types of noniterative algorithms are extended to the weighted-based noniterative algorithms. The continuous noniterative algorithms are considered as the benchmarks for performing the centroid TR and defuzzification of IT2 FLSs. Four simulation examples illustrate and analyze the computational accuracies and computation times of the proposed algorithms. Compared with the original noniterative algorithms, the proposed weighted-based noniteraive algorithms can obtain both higher calculation accuracies and faster convergence speeds.

    In the future work, we will concentrate on designing the centroid TR of T2 FLSs [13,14,15,16,17,18,19,20,21,22,23,24,29,31,33,56] with weighted-based reasonable initialization enhanced Karnik-Mendel algorithms, the center-of-sets TR [12,13,34,45,46,47,48,49] of T2 FLSs, and seeking for global optimization algorithms [3,4,5,6,25,26,27,35,36,37,38,39,40,41,42,43,44,52,53] for designing and applying IT2 or GT2 FLSs in real world problems like forecasting, control [50,51,54,55] and so on.

    The paper is supported by the National Natural Science Foundation of China (No. 61973146, No. 61773188, No. 61903167, No. 61803189), the Liaoning Province Natural Science Foundation Guidance Project (No. 20180550056), and Talent Fund Project of Liaoning University of Technology (No. xr2020002). The author is very thankful to Professor Jerry Mendel, who has given the author some important advices.

    The authors declare that they have no conflict of interest.



    [1] J. J. Hopfield, Neural networks and physical systems with emergent collective computational abilities, Proc. Natl. Acad. Sci. USA, 79 (1982), 2554–2558. https://doi.org/10.1073/pnas.79.8.2554 doi: 10.1073/pnas.79.8.2554
    [2] J. J. Hopfield, Neurons with graded response have collective computational properties like those of two-state neurons, Proc. Natl. Acad. Sci. USA, 81 (1984), 3088–3092. https://doi.org/10.1073/pnas.81.10.3088 doi: 10.1073/pnas.81.10.3088
    [3] N. M. Nasrabadi, W. Li, Object recognition by a Hopfield neural network, IEEE Trans. Syst. Man Cybern., 21 (1991), 1523–1535. https://doi.org/10.1109/21.135694 doi: 10.1109/21.135694
    [4] G. Pajares, A Hopfield neural network for image change detection, IEEE Trans. Neural Networks, 17 (2006), 1250–1264. https://doi.org/10.1109/TNN.2006.875978 doi: 10.1109/TNN.2006.875978
    [5] U. P. Wen, K. M. Lan, H. S. Shih, A review of Hopfield neural networks for solving mathematical programming problems, Eur. J. Oper. Res., 198 (2009), 675–687. https://doi.org/10.1016/j.ejor.2008.11.002 doi: 10.1016/j.ejor.2008.11.002
    [6] H. Zhang, Z. Wang, D. Liu, A comprehensive review of stability analysis of continuous-time recurrent neural networks, IEEE Trans. Neural Networks Learn. Syst., 25 (2014), 1229–1262. https://doi.org/10.1109/TNNLS.2014.2317880 doi: 10.1109/TNNLS.2014.2317880
    [7] H. Lin, C. Wang, F. Yu, J. Sun, S. Du, Z. Deng, et al., A review of chaotic systems based on memristive Hopfield neural networks, Mathematics, 11 (2023), 1369. https://doi.org/10.3390/math11061369 doi: 10.3390/math11061369
    [8] H. Lin, C. Wang, Y. Sun, T. Wang, Generating n-scroll chaotic attractors from a memristor-based magnetized Hopfield neural network, IEEE Trans. Circuits Syst. II Express Briefs, 70 (2022), 311–315. https://doi.org/10.1109/TCSII.2022.3212394 doi: 10.1109/TCSII.2022.3212394
    [9] J. Bélair, S. A. Campbell, P. van den Driessche, Frustration, stability, and delay-induced oscillations in a neural network model, SIAM J. Appl. Math., 56 (1996), 245–255. https://doi.org/10.1137/S0036139994274526 doi: 10.1137/S0036139994274526
    [10] H. Zhao, L. Wang, C. Ma, Hopf bifurcation and stability analysis on discrete-time Hopfield neural network with delay, Nonlinear Anal. Real World Appl., 9 (2008), 103–113. https://doi.org/10.1016/j.nonrwa.2006.09.005 doi: 10.1016/j.nonrwa.2006.09.005
    [11] K. Gopalsamy, Leakage delays in BAM, J. Math. Anal. Appl., 325 (2007), 1117–1132. https://doi.org/10.1016/j.jmaa.2006.02.039
    [12] X. Li, J. Cao, Delay-dependent stability of neural networks of neutral type with time delay in the leakage term, Nonlinearity, 23 (2010), 1709. https://doi.org/10.1088/0951-7715/23/7/010 doi: 10.1088/0951-7715/23/7/010
    [13] R. Sakthivel, P. Vadivel, K. Mathiyalagan, A. Arunkumar, M. Sivachitra, Design of state estimator for bidirectional associative memory neural networks with leakage delays, Inf. Sci., 296 (2015), 263–274. https://doi.org/10.1016/j.ins.2014.10.063 doi: 10.1016/j.ins.2014.10.063
    [14] L. Duan, H. Wei, L. Huang, Finite-time synchronization of delayed fuzzy cellular neural networks with discontinuous activations, Fuzzy Sets Syst., 361 (2019), 56–70. https://doi.org/10.1016/j.fss.2018.04.017 doi: 10.1016/j.fss.2018.04.017
    [15] C. Xu, L. Chen, Effect of leakage delay on the almost periodic solutions of fuzzy cellular neural networks, J. Exp. Theor. Artif. Intell., 30 (2018), 993–1011. https://doi.org/10.1080/0952813X.2018.1509895 doi: 10.1080/0952813X.2018.1509895
    [16] C. Aouiti, F. Miaadi, Pullback attractor for neutral Hopfield neural networks with time delay in the leakage term and mixed time delays, Neural Comput. Appl., 31 (2019), 4113–4122. https://doi.org/10.1007/s00521-017-3314-z doi: 10.1007/s00521-017-3314-z
    [17] C. Hu, H. Jiang, Z. Teng, Impulsive control and synchronization for delayed neural networks with reaction-diffusion terms, IEEE Trans. Neural Networks, 21 (2010), 67–81. https://doi.org/10.1109/TNN.2009.2034318 doi: 10.1109/TNN.2009.2034318
    [18] X. Hu, L. Wang, C. Zhang, X. Wan, Y. He, Fixed-time stabilization of discontinuous spatiotemporal neural networks with time-varying coefficients via aperiodically switching control, Sci. China Inf. Sci., 631 (2023), 241–255. https://doi.org/10.1007/s11432-022-3633-9 doi: 10.1007/s11432-022-3633-9
    [19] L. Shanmugam, P. Mani, R. Rajan, Y. H. Joo, Adaptive synchronization of reaction-diffusion neural networks and its application to secure communication, IEEE Trans. Cybern., 50 (2018), 911–922. https://doi.org/10.1109/TCYB.2018.2877410 doi: 10.1109/TCYB.2018.2877410
    [20] C. Zhou, C. Wang, W. Yao, H. Lin, Observer-based synchronization of memristive neural networks under DoS attacks and actuator saturation and its application to image encryption, Appl. Math. Comput., 425 (2022), 127080. https://doi.org/10.1016/j.amc.2022.127080 doi: 10.1016/j.amc.2022.127080
    [21] L. Wang, H. He, Z. Zeng, Global synchronization of fuzzy memristive neural networks with discrete and distributed delays, IEEE Trans. Fuzzy Syst., 28 (2020), 2022–2034. https://doi.org/10.1109/TFUZZ.2019.2930032 doi: 10.1109/TFUZZ.2019.2930032
    [22] S. G. Nersesov, W. M. Perruquetti, Finite-time stabilization of nonlinear impulsive dynamical systems, Nonlinear Anal. Hybrid Syst., 2 (2008), 832–845. https://doi.org/10.1016/j.nahs.2007.12.001 doi: 10.1016/j.nahs.2007.12.001
    [23] S. Wang, Z. Guo, S. Wen, T. Huang, S. Gong, Finite/fixed-time synchronization of delayed memristive reaction-diffusion neural networks, Neurocomputing, 375 (2020), 1–8. https://doi.org/10.1016/j.neucom.2019.06.092 doi: 10.1016/j.neucom.2019.06.092
    [24] X. Yang, X. Li, P. Duan, Finite-time lag synchronization for uncertain complex networks involving impulsive disturbances, Neural Comput. Appl., 34 (2022), 5097–5106. https://doi.org/10.1007/s00521-021-05987-8 doi: 10.1007/s00521-021-05987-8
    [25] C. Zhou, C. Wang, Y. Sun, W. Yao, H. Lin, Cluster output synchronization for memristive neural networks, Inf. Sci., 589 (2022), 459–477. https://doi.org/10.1016/j.ins.2021.12.084 \newpage doi: 10.1016/j.ins.2021.12.084
    [26] L. Duan, J. Liu, C. Huang, Z. Wang, Finite-/fixed-time anti-synchronization of neural networks with leakage delays under discontinuous disturbances, Chaos Solitons Fractals, 155 (2022), 111639. https://doi.org/10.1016/j.chaos.2021.111639 doi: 10.1016/j.chaos.2021.111639
    [27] L. Duan, M. Shi, C. Huang, X. Fang, Synchronization in finite-/fixed-time of delayed diffusive complex-valued neural networks with discontinuous activations, Chaos Solitons Fractals, 142 (2021), 110386. https://doi.org/10.1016/j.chaos.2020.110386 doi: 10.1016/j.chaos.2020.110386
    [28] R. Sakthivel, N. Aravinth, C. Aouiti, K. Arumugam, Finite-time synchronization of hierarchical hybrid coupled neural networks with mismatched quantization, Neural Comput. Appl., 33 (2021), 16881–16897. https://doi.org/10.1007/s00521-021-06049-9 doi: 10.1007/s00521-021-06049-9
    [29] Y. Fan, X. Huang, Y. Li, J. Xia, G. Chen, Aperiodically intermittent control for quasi-synchronization of delayed memristive neural networks: an interval matrix and matrix measure combined method, IEEE Trans. Syst. Man Cybern. Syst., 49 (2018), 2254–2265. https://doi.org/10.1109/TSMC.2018.2850157 doi: 10.1109/TSMC.2018.2850157
    [30] L. Wang, Z. Zeng, M. Ge, A disturbance rejection framework for finite-time and fixed-time stabilization of delayed memristive neural networks, IEEE Trans. Syst. Man Cybern. Syst., 51 (2021), 905–915. https://doi.org/10.1109/TSMC.2018.2888867 doi: 10.1109/TSMC.2018.2888867
    [31] X. Liu, D. W. C. Ho, Q. Song, J. Cao, Finite-/fixed-time robust stabilization of switched discontinuous systems with disturbances, Nonlinear Dyn., 90 (2017), 2057–2068. https://doi.org/10.1007/s11071-017-3782-9 doi: 10.1007/s11071-017-3782-9
    [32] L. C. Evans, Partial Differential Equations, Providence, RI, USA: American Mathematical Society, 1998.
    [33] Z. Chen, X. Fu, D. Zhao, Anti-periodic mild attractor of delayed hopfield neural networks systems with reaction-diffusion terms, Neurocomputing, 99 (2013), 372–380. https://doi.org/10.1016/j.neucom.2012.07.022 doi: 10.1016/j.neucom.2012.07.022
    [34] G. Hardy, J. Littlewood, G. Pólya, Inequalities, Cambridge University Press, Cambridge, 1988.
  • This article has been cited by:

    1. Chuang Liu, Jinxia Wu, Weidong Yang, Robust H output feedback finite-time control for interval type-2 fuzzy systems with actuator saturation, 2022, 7, 2473-6988, 4614, 10.3934/math.2022257
    2. Xiaoyu Peng, Xiaodong Pan, Interval type-2 fuzzy systems on the basis of vague partitions and their approximation properties, 2024, 43, 2238-3603, 10.1007/s40314-024-02629-2
  • Reader Comments
  • © 2023 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(1545) PDF downloads(78) Cited by(4)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog