
In this paper, the problem on finite-/fixed-time synchronization (FFTS) is investigated for a class of diffusive Hopfield neural networks with leakage and discrete delays. Some new and useful criteria independent on time delays but dependent on the diffusion coefficients are established to guarantee the FFTS for the addressed network model under a unified framework. In sharp contrast to the existed results which can only finite-timely or fixed-timely synchronize the systems with both diffusion effects and leakage delays, the theoretical results of this paper are more general and practical. Finally, a numerical example is presented to show the effectiveness of the proposed control methods.
Citation: Minglei Fang, Jinzhi Liu, Wei Wang. Finite-/fixed-time synchronization of leakage and discrete delayed Hopfield neural networks with diffusion effects[J]. Electronic Research Archive, 2023, 31(7): 4088-4101. doi: 10.3934/era.2023208
[1] | Yang Chen, Jinxia Wu, Jie Lan . Study on reasonable initialization enhanced Karnik-Mendel algorithms for centroid type-reduction of interval type-2 fuzzy logic systems. AIMS Mathematics, 2020, 5(6): 6149-6168. doi: 10.3934/math.2020395 |
[2] | Yang Chen, Jiaxiu Yang, Chenxi Li . Design of reasonable initialization weighted enhanced Karnik-Mendel algorithms for centroid type-reduction of interval type-2 fuzzy logic systems. AIMS Mathematics, 2022, 7(6): 9846-9870. doi: 10.3934/math.2022549 |
[3] | Yang Chen, Chenxi Li . Study on sensible beginning divided-search enhanced Karnik-Mendel algorithms for centroid type-reduction of general type-2 fuzzy logic systems. AIMS Mathematics, 2024, 9(5): 11851-11876. doi: 10.3934/math.2024580 |
[4] | Mengmeng Wang, Xiangzhi Kong . Multi-attribute group decision making algorithm based on (p, q)-rung interval-valued orthopair fuzzy set and weight optimization model. AIMS Mathematics, 2023, 8(10): 23997-24024. doi: 10.3934/math.20231224 |
[5] | Wenyi Zeng, Rong Ma, Deqing Li, Qian Yin, Zeshui Xu, Ahmed Mostafa Khalil . Novel operations of weighted hesitant fuzzy sets and their group decision making application. AIMS Mathematics, 2022, 7(8): 14117-14138. doi: 10.3934/math.2022778 |
[6] | Murugan Palanikumar, Nasreen Kausar, Harish Garg, Shams Forruque Ahmed, Cuauhtemoc Samaniego . Robot sensors process based on generalized Fermatean normal different aggregation operators framework. AIMS Mathematics, 2023, 8(7): 16252-16277. doi: 10.3934/math.2023832 |
[7] | Rana Muhammad Zulqarnain, Xiao Long Xin, Muhammad Saeed . Extension of TOPSIS method under intuitionistic fuzzy hypersoft environment based on correlation coefficient and aggregation operators to solve decision making problem. AIMS Mathematics, 2021, 6(3): 2732-2755. doi: 10.3934/math.2021167 |
[8] | Miaoxia Chen, Abdul Samad Shibghatullah, Kasthuri Subramaniam, Xiaopeng Yang . Weighted minimax programming subject to the max-min fuzzy relation inequalities. AIMS Mathematics, 2024, 9(6): 13624-13641. doi: 10.3934/math.2024665 |
[9] | Kanjanaporn Tansri, Pattrawut Chansangiam . Gradient-descent iterative algorithm for solving exact and weighted least-squares solutions of rectangular linear systems. AIMS Mathematics, 2023, 8(5): 11781-11798. doi: 10.3934/math.2023596 |
[10] | Jun Hu, Jie Wu, Mengzhe Wang . Research on VIKOR group decision making using WOWA operator based on interval Pythagorean triangular fuzzy numbers. AIMS Mathematics, 2023, 8(11): 26237-26259. doi: 10.3934/math.20231338 |
In this paper, the problem on finite-/fixed-time synchronization (FFTS) is investigated for a class of diffusive Hopfield neural networks with leakage and discrete delays. Some new and useful criteria independent on time delays but dependent on the diffusion coefficients are established to guarantee the FFTS for the addressed network model under a unified framework. In sharp contrast to the existed results which can only finite-timely or fixed-timely synchronize the systems with both diffusion effects and leakage delays, the theoretical results of this paper are more general and practical. Finally, a numerical example is presented to show the effectiveness of the proposed control methods.
The computationally relative simple interval type-2 fuzzy sets (IT2 FSs) are currently the most commonly used T2 FSs. Therefore, interval type-2 fuzzy logic systems (IT2 FLSs [1,2,57]) based on IT2 FSs have superior ability to cope with uncertainties environments like power systems [3], permanent magnetic drive [4,5,6], intelligent controllers [7], medical systems [8], pattern recognition systems [9], database and information systems [10] and so on. The footprint of uncertainty (FOU) of an IT2 FS [11] make it own more design degrees of freedom compared with a T1 FS. Generally speaking, a T2 FLS (see Figure 1) is composed of fuzzifier, rules, inference, type-reducer and defuzzifier. Among which, the block of type-reduction plays the central role of transforming the T2 to the T1 FS. Finally the defuzzification changes the T1 FS to the crisp output.
In the past decades, many types of type-reduction (TR) were proposed gradually. Among which, the most famous one is the Karnik-Mendel (KM) algorithms [13]. This type of algorithms has the advantages of preserving the uncertainties flow between the upper and lower membership functions (MFs) of T2 FLSs. Then the continuous KM (CKM) algorithms [14] were put forward, in addition, the monotoncity and super convergence property of them were proved. For the sake of improving the calculation efficiency, Wu and Mendel proposed the enhanced KM (EKM) algorithms [15]. Extensive simulation experiments show that the EKM algorithms can save two iterations on average compared with the KM algorithms. Then Liu et al. gave the theoretical explanations for the initialization of EKM algorithms and extended the EKM algorithms to three different forms of weighted-based EKM (WEKM) algorithms [16,17] to calculate the more accurate centroids of type-2 fuzzy sets.
However, the iterative natures of KM types of algorithms make the applications of corresponding IT2 FLSs more challenge. Therefore, other types of noniterative algorithms [18] are proposed gradually, and they are Nagar-Bardini (NB) algorithms [19], Nie-Tan (NT) algorithms [20], Begian-Melek-Mendel (BMM) algorithms [21,22] and so on. Among which, IT2 FLSs based on the NB algorithms are proved to have superior performances to respond to the affect of uncertainties in systems’ parameters to the IT2 FLSs according to other algorithms like EKM, BMM, Greenfield-Chiclana Collapsing Defuzzifier (GCCD [24]) and Wu-Mendel Uncertainty Bound (UB [24]). Moreover, Nie-Tan (NT) algorithms have the simple closed form. Recent studies prove that the continuous NT (CNT) algorithms [20] to be accurate algorithms to calculate the centroid of IT2 FSs. In addition, BMM algorithms [18] are proved to be more generalized forms of NB and NT algorithms. All these works have laid theoretical foundations for studying the TR of T2 FLSs.
In order to obtain more accurate centroid TR of IT2 FLSs, this paper extends the NB, NT, and BMM algorithms to the corresponding WNB, WNT, and WBMM algorithms according to the Newton-Cotes quadrature formulas. The rest of this paper is organized as follows. Section 2 introduces the background of IT2 FLSs. Section 3 provides the Newton-Cotes formulas, the weighted-based noniterative algorithms, and how to adopt them to perform the centroid TR of IT2 FLSs. Section 4 gives four computer simulation examples to illustrate the performances of weighted-based noniterative algorithms. Finally Section 5 is the conclusions and expectations.
Definition 1. A T2 FS
˜A={(x,u),μ˜A(x,u)|∀x∈X,∀u∈[0,1]} | (1) |
where the primary variable
˜A=∫x∈X∫u∈[0,1]μ˜A(x,u)/(x,u) | (2) |
Definition 2. The secondary MF of
μ˜A(x=x′,u)≡μ˜A(x′)=∫∀u∈[0,1]fx′(u)/u. | (3) |
Definition 3. The two dimensional support of
FOU(˜A)=∪x∈XJx={(x,u)∈X×[0,1]|μ˜A(x,u)>0} | (4) |
The upper and lower bounds of
UMF(˜A)=¯μ˜A(x)=¯FOU(˜A),LMF(˜A)=μ_˜A(x)=FOU(˜A)_. | (5) |
Because the secondary membership grades of IT2 FSs are all uniformly equal to 1, i.e.,
˜A=∫∀x∈Xμ˜A(x)/x=∫∀x∈X˜A(x)/x | (6) |
Here
Definition 4. An embedded T1 FS
Ae={(x,u(x)|∀x∈X,u∈Jx}. | (7) |
Definition 5. An IT2 FS can be considered as the union of all its embedded T2 FSs
˜A=m∑j=1˜Aje | (8) |
where
From the aspect of inference structure, IT2 FLSs can usually be divided into two categories: Mamdani type [3,6,12,18,25] and Takagi-Sugeno-Kang type [4,25,26,27]. Without loss of generality, here we consider a Mamdani IT2 FLS with
˜Rs:Ifx1is˜Fs1and⋯andxnis˜Fsn, thenyis ˜Gs(s=1,2,⋯,M) | (9) |
in which
For simplicity, here we use the singleton fuzzifier, i.e., the input measurements are modeled as crisp sets (type-0 FSs). As
Fs:{Fs(x′)≡[f_s(x′),¯fs(x′)],f_s(x′)≡Tni=1μ_˜Fsi(x′i),¯fs(x′)≡Tni=1¯μ˜Fsi(x′i) | (10) |
where
As for the centroid TR, we combine the firing interval of each rule with its consequent IT2 FS to obtain the fired-rule output FS
˜Bs:{FOU(˜Bs)=[μ_˜Bs(y|x′),¯μ˜Bs(y|x′)],μ_˜Bs(y|x′)=f_s(x′)∗μ_˜Gs(y),¯μ˜Bs(y|x′)=¯fs(x′)∗¯μ˜Gs(y) | (11) |
where
Then the output IT2 FS
˜B:{FOU(˜B)=[μ_˜B(y|x′),¯μ˜B(y|x′)],μ_˜B(y|x′)=μ_˜B1(y|x′)∨μ_˜B2(y|x′)∨⋯∨μ_˜BM(y|x′),¯μ˜B(y|x′)=¯μ˜B1(y|x′)∨¯μ˜B2(y|x′)∨⋯∨¯μ˜BM(y|x′) | (12) |
where
Finally the type-reduced set
YC(x′)=1/[l˜B(x′),r˜B(x′)] | (13) |
where the two end points
Before introducing the weighted-based noniterative algorithms, we first give the preliminary knowledge: Newton-Cotes quadrature formulas [16,30].
Generally speaking, the numerical integration is an approach that approximates the definite integral
Definition 6. (Quadrature formula [16,17,46,47]) Let the discrete points satisfy that
Q(f)=N∑i=0wif(xi)=w0f(x0)+⋯+wNf(xN) | (14) |
then Eq (14) is referred to as the numerical integration or quadrature formula, where
Next, the composite trapezoidal rule, composite Simpson rule, and composite Simpson 3/8 rule to adopted to approximate
Theorem 1. (Composite trapezoidal rule [16,17,46,47]) Let
∫baf(x)dx=h2[f(a)+f(b)+2N−1∑i=1f(xi)]+ET(f,h) | (15) |
Suppose that
Theorem 2. (Composite Simpson rule [16,17,46,47]) Let
∫baf(x)dx=h3[f(a)+f(b)+2N−1∑i=1f(x2i)+4N−1∑i=0f(x2i+1)]+ES(f,h) | (16) |
Suppose that
Theorem 3. (Composite Simpson 3/8 rule [16,17,46,47]) Let
∫baf(x)dx=3h8[f(a)+f(b)+N∑i=12f(x3i)+N∑i=13f(x3i−2)+N∑i=13f(x3i−1)]+ESC(f,h) | (17) |
Suppose that
Here all the integrals are measured in the Lebesgue sense.
IT2 FLSs based on the closed form of Nagar-Bardini (NB) algorithms [19,46,47] can make distinctly improvement on coping with uncertainties. For the centroid output IT2 FS
l˜B=N∑i=1yiμ_˜B(yi)N∑i=1μ_˜B(yi), and r˜B=N∑i=1yi¯μ˜B(yi)N∑i=1¯μ˜B(yi). | (18) |
Then the defuzzified output can be obtained as:
yNB=l˜B+r˜B2. | (19) |
Similar to the continuous KM types of algorithms [13,14,15,16,17,31], the continuous NB (CNB) algorithms can be adopted for studying the theoretical property of centroid TR and defuzzification of IT2 FLSs.
Let
l˜B=∫bayμ_˜B(y)dy∫baμ_˜B(y)dy, and r˜B=∫bay¯μ˜B(y)dy∫ba¯μ˜B(y)dy. | (20) |
Here the output centroid two end points can be computed without iterations. Furthermore, the output is a linear combination of the output of two T1 FLSs: one constructed from the LMFs, and the other constructed from the UMFs.
In this section, we propose a type of weighted NB (WNB) algorithms, i.e.,
l˜B=N∑i=1wiyiμ_˜B(yi)N∑i=1wiμ_˜B(yi), and r˜B=N∑i=1wiyi¯μ˜B(yi)N∑i=1wi¯μ˜B(yi). | (21) |
WNB algorithms can be considered as the numerical implementation of CNB algorithms. Comparing Eqs (18) and (20), it is found that the CNB and NB algorithms are very similar, i.e., the sum operations in the discrete version are transformed into the definite integral operations in the continuous version, i.e., the sum operations for the sampling points
According to the quadrature formula (see Eq (14)), the corresponding weights
Algorithms | Integration rule | Weights |
NB, NT, BMM | ______________ | |
TWNB, TWNT, TWBMM | Composite Trapezoidal rule | |
SWNB, SWNT, SWBMM | Composite Simpson rule | |
S3/8WNB, S3/8WNT, S3/8WBMM | Composite Simpson 3/8 rule |
The closed form of discrete Nie-Tan (NT) algorithms can compute the centroid output of
yNT=N∑i=1yi[μ_˜B(yi)+¯μ˜B(yi)]N∑i=1[μ_˜B(yi)+¯μ˜B(yi)]. | (22) |
Most recent studies prove the continuous NT (CNT) algorithms [20] to be an accurate method for computing the centroids of IT2 FSs, i.e.,
yCNT=∫bay[μ_˜B(y)+¯μ˜B(y)]dy∫ba[μ_˜B(y)+¯μ˜B(y)]dy. | (23) |
This section proposes a type of weighted NT (WNT) algorithms, i.e.,
yWNT=N∑i=1wiyi[μ_˜B(yi)+¯μ˜B(yi)]N∑i=1wi[μ_˜B(yi)+¯μ˜B(yi)]. | (24) |
WNT algorithms can be viewed as the numerical implementation of CNT algorithms. The sum operations in the discrete NT algorithms are transformed into the definite integral operations in the continuous NT (CNT) algorithms, i.e., the sum operations for the sampling points
Begian-Melek-Mendel (BMM) algorithms can also obtain the output of IT2 FLSs directly, i.e.,
yBMM=αN∑i=1yiμ_˜B(yi)N∑i=1μ_˜B(yi)+βN∑i=1yi¯μ˜B(yi)N∑i=1¯μ˜B(yi) | (25) |
where
IT2 FLSs based on BMM algorithms [13,21,22] are superior to T1 FLSs counterparts on both robustness and stability. In addition, the BMM algorithms are more generalized form of NB and NT algorithms. Observing the Eqs (19) and (25), it can be found that BMM and NB algorithms are exactly the same while
yNT=N∑i=1μ_˜B(yi)N∑i=1[μ_˜B(yi)+¯μ˜B(yi)]×N∑i=1yiμ_˜B(yi)N∑i=1μ_˜B(yi)+N∑i=1¯μ˜B(yi)N∑i=1[μ_˜B(yi)+¯μ˜B(yi)]×N∑i=1yi¯μ˜B(yi)N∑i=1¯μ˜B(yi) =αNTN∑i=1yiμ_˜B(yi)N∑i=1μ_˜B(yi)+βNTN∑i=1yi¯μ˜B(yi)N∑i=1¯μ˜B(yi) | (26) |
in which
αNT=N∑i=1μ_˜B(yi)N∑i=1[μ_˜B(yi)+¯μ˜B(yi)], and βNT=N∑i=1¯μ˜B(yi)N∑i=1[μ_˜B(yi)+¯μ˜B(yi)]. | (27) |
Comparing the Eqs (25) and (26), it can be found that, as
Continuous BMM (CBMM) algorithms can also be used for studying the theoretical properties of TR of IT2 FLSs, i.e.,
yCBMM=α∫bayμ_˜B(y)dy∫baμ_˜B(y)dy+β∫bay¯μ˜B(y)dy∫ba¯μ˜B(y)dy. | (28) |
Based on the quadrature formula, this section gives a type of weighted BMM (WBMM) algorithms, i.e.,
yWBMM=αN∑i=1wiyiμ_˜B(yi)N∑i=1wiμ_˜B(yi)+βN∑i=1wiyi¯μ˜B(yi)N∑i=1wi¯μ˜B(yi). | (29) |
Here WBMM algorithms can be considered as the numerical implementation of CBMM algorithms. Comparing Eqs (25) and (28), it is found that the CBMM and BMM algorithms are very similar, i.e., the sum operations in the discrete version are transformed into the definite integral operations in the continuous version, i.e., the sum operations for the sampling points
For the above three types of weighed-based noniterative algorithms (see Table 1), suppose that the primary variable be the letter
Next we can make conclusions about assigning weights for three types of weighted-based noniterative algorithms as:
1) Substitute
2) The coefficients
3) In Tables 1–3, for the TWNB, TWNT, TWBMM, and SWNB, SWNT, SWBMM algorithms, the weights are assigned as
Num | Expression |
1 | |
2 | |
3 | |
4 |
Num | Approach | ||
CNB | CNT | CBMM | |
1 | 4.3050 | 4.3208 | 4.3041 |
2 | 3.7774 | 3.7141 | 3.7747 |
3 | 4.3702 | 4.3953 | 4.3690 |
4 | 5.0000 | 5.0000 | 5.0000 |
4) In Tables 1–3, for the SWNB, SWNT, and SWBMM, and S3/8WNB, S3/8WNT, and S3/8WBMM algorithms, the number of sampling
Finally the inner relations between weighted-based noniterative algorithms and continuous noniterative algorithms for performing the centroid TR of IT2 FLSs can be made as:
1) Weighted-based noniterative algorithms calculate the type-reduced set
2) As the number of sampling increases, weighted-based noniterative algorithms may obtain more accurate computational results.
3) Weighted-based noniterative algorithms perform the numerical calculations according to the sum operation, whereas the continuous noniterative algorithms perform the calculations symbolically by means of the integral operations. On the whole, weighted-based noniterative algorithms can be viewed as the numerical implementation of continuous noniterative algorithms according to the numerical integration approaches.
Four computer simulation examples are provided in this section. Here we suppose that the centroid output IT2 FS [16,18,29,32] has been obtained by merging or weighting fuzzy rules under the guidance the inference before the TR and defuzzification. For the first example, the FOU is bounded by the piece-wise linear functions. For the second example, the FOU is bounded by both the piece-wise linear functions and Gaussian functions. For the third example, the FOU is bounded by the Gaussian functions. For the last example, the FOU is defined as the symmetric Gaussian primary MF with uncertainty derivations. Then Figure 2 and Table 2 show the defined FOUs for four examples. In examples 1, 3 and 4, here we choose the primary variable
Firstly, the CNB, CNT, and CBMM algorithms are considered the benchmarks to compute the centroid defuzzified values for four examples. And they are provided in Table 3. Here the adjustable coefficient
Next, we study the performances of proposed three types of weighted-based noniteraitve algorithms, respectively. Here the number of sampling is chosen as
Next, let’s quantitatively measure the calculation accuracies of proposed weighted-based noniterative algorithms. For the number of sampling
Algorithm | NB | TWNB | SWNB | S3/8WNB |
Example 1 | 0.000029 | 0.000029 | 0.000572 | 0.000067 |
Example 2 | 0.038400 | 0.001690 | 0.001450 | 0.001390 |
Example 3 | 0.009800 | 0.000094 | 0.000122 | 0.001908 |
Example 4 | 0.000110 | 0.000110 | 0.000110 | 0.000731 |
Total average | 0.016110 | 0.000640 | 0.000750 | 0.001370 |
Algorithm | NT | TWNT | SWNT | S3/8WNT |
Example 1 | 0.000043 | 0.000043 | 0.000519 | 0.00096 |
Example 2 | 0.067610 | 0.002170 | 0.002430 | 0.002280 |
Example 3 | 0.013730 | 0.000050 | 0.000050 | 0.002770 |
Example 4 | 0.000028 | 0.000028 | 0.000028 | 0.000458 |
Total average | 0.027140 | 0.000760 | 0.001010 | 0.001870 |
Algorithm | BMM | TWBMM | SWBMM | S3/8WBMM |
Example 1 | 0.000028 | 0.000028 | 0.000576 | 0.000056 |
Example 2 | 0.039650 | 0.001590 | 0.001320 | 0.001290 |
Example 3 | 0.009598 | 0.000096 | 0.000125 | 0.001866 |
Example 4 | 0.000112 | 0.000112 | 0.000112 | 0.000738 |
Total average | 0.016460 | 0.000610 | 0.000710 | 0.001320 |
Then we study the specific computation times of weighted-based noniterative algorithms for better applications. The number of sampling is still chosen as
Considering the Figures 3–8, Tables 4–6, and Figures 9–11 comprehensively, the following conclusions can be obtained:
1) In these four examples, the absolute errors of three types of weighted-based noniterative algorithms all converge as the number of sampling increases. In example 1, NB, TWNB, NT, TWNT, and BMM, TWBMM algorithms can obtain the smallest absolute errors and errors amplitudes of variation, while SNB, SNT, and SBMM algorithms get the largest absolute errors and errors amplitude of variation. In both examples 2 and 3, the proposed weighted-based noniterative can obtain the values of absolute errors and errors amplitudes of variation that are obviously less than their corresponding original noniterative algorithms. In the last example, the first three types of weighted-based noniterative algorithms can get almost the same absolute errors and errors amplitudes of variation, while the last type of weighted-based noniterative algorithms obtain the larger ones.
2) For the NB algorithms, the largest average of relative error is 3.84%. While the largest average of relative error of proposed WNB algorithms is only 0.169%. For the NT algorithms, the largest average of relative error is 6.761%. The largest average of relative error of proposed WNT algorithms is only 0.243%. For the BMM algorithms, the largest average of relative error is 3.965%. The largest average of relative error of proposed WBMM algorithms is only 0.159%.
3) The total mean of average of relative error of NB algorithms is 1.611%. While the largest total mean of average of relative error of proposed WNB algorithms is only 0.137%. The total mean of average of relative error of NT algorithms is 2.714%. While the largest total mean of average of relative error of proposed WNT algorithms is only 0.187%. The total mean of average of relative error of BMM algorithms is 1.646%. While the largest total mean of average of relative error of proposed WBMM algorithms is only 0.132%.
4) In general, see Figures 9–11, the computational speeds of original noniteraive algorithms are faster than their corresponding weighted-based noniterative algorithms. However, the computational speeds first two types on weighted-based noniterative algorithms are almost completely the same. As the number of sampling is fixed, the size relation of computation times is as: S3/8WNoiteraive > SWNoiteraive > TWNoniterative > Noniterative. It may just because the weights of proposed weighted-based noniterative algorithms are more complex than the noniterative algorithms. In other words, the convergence speeds of proposed weighted-based noniteraive algorithms are faster than the original noniterative algorithms.
5) From the above analysis, it can be found that, by choosing the proposed weighted-based noniteraive algorithms appropriately, which can improve both the calculation accuracies and convergence speeds.
The proposed weighted-based noniteraive algorithms can be used to investigate the TR and defuzzification of IT2 FLSs. If only the computational accuracy were considered, the proposed three types of weighted-based noniteraive algorithms outperformed the original noniteraive algorithms, in which the second type of weighed-based noniteraive algorithms were the best. Moreover, the computation time of proposed weighted-based noniteraive algorithms were not much different from the original noniteraive algorithms. Considering the above analysis comprehensively, we advise to use the second or third types of weighted-based noniterative algorithms for the TR and defuzzification of IT2 FLSs with the combination of linear functions and nonlinear functions as in examples 1 and 4, and adopt the first or second types of weighted-based noniteraive algorithms for the TR and defuzzification of IT2 FLSs with the combination of linear and nonlinear functions and nonlinear functions as in examples 2 and 3.
Finally, it is important to point out that, we only focus on the experimental performances of weighted-based noniteraive algorithms. It can be obtained from the simulation examples that, compare with the noniteraive algorithms, the proposed weighted-based noniteraive algorithms can improve the computational accuracies. However, if the requirements of computational accuracy were not high, the weighted-based noniteraive algorithms can not show their advantages, as the simplest noniteraive algorithms could attain well results.
This paper compares the operations between three types of discrete noniterative algorithms with their corresponding continuous versions. According to the Newton-Cotes quadrature formulas in the numerical integration technique, three types of noniterative algorithms are extended to the weighted-based noniterative algorithms. The continuous noniterative algorithms are considered as the benchmarks for performing the centroid TR and defuzzification of IT2 FLSs. Four simulation examples illustrate and analyze the computational accuracies and computation times of the proposed algorithms. Compared with the original noniterative algorithms, the proposed weighted-based noniteraive algorithms can obtain both higher calculation accuracies and faster convergence speeds.
In the future work, we will concentrate on designing the centroid TR of T2 FLSs [13,14,15,16,17,18,19,20,21,22,23,24,29,31,33,56] with weighted-based reasonable initialization enhanced Karnik-Mendel algorithms, the center-of-sets TR [12,13,34,45,46,47,48,49] of T2 FLSs, and seeking for global optimization algorithms [3,4,5,6,25,26,27,35,36,37,38,39,40,41,42,43,44,52,53] for designing and applying IT2 or GT2 FLSs in real world problems like forecasting, control [50,51,54,55] and so on.
The paper is supported by the National Natural Science Foundation of China (No. 61973146, No. 61773188, No. 61903167, No. 61803189), the Liaoning Province Natural Science Foundation Guidance Project (No. 20180550056), and Talent Fund Project of Liaoning University of Technology (No. xr2020002). The author is very thankful to Professor Jerry Mendel, who has given the author some important advices.
The authors declare that they have no conflict of interest.
[1] |
J. J. Hopfield, Neural networks and physical systems with emergent collective computational abilities, Proc. Natl. Acad. Sci. USA, 79 (1982), 2554–2558. https://doi.org/10.1073/pnas.79.8.2554 doi: 10.1073/pnas.79.8.2554
![]() |
[2] |
J. J. Hopfield, Neurons with graded response have collective computational properties like those of two-state neurons, Proc. Natl. Acad. Sci. USA, 81 (1984), 3088–3092. https://doi.org/10.1073/pnas.81.10.3088 doi: 10.1073/pnas.81.10.3088
![]() |
[3] |
N. M. Nasrabadi, W. Li, Object recognition by a Hopfield neural network, IEEE Trans. Syst. Man Cybern., 21 (1991), 1523–1535. https://doi.org/10.1109/21.135694 doi: 10.1109/21.135694
![]() |
[4] |
G. Pajares, A Hopfield neural network for image change detection, IEEE Trans. Neural Networks, 17 (2006), 1250–1264. https://doi.org/10.1109/TNN.2006.875978 doi: 10.1109/TNN.2006.875978
![]() |
[5] |
U. P. Wen, K. M. Lan, H. S. Shih, A review of Hopfield neural networks for solving mathematical programming problems, Eur. J. Oper. Res., 198 (2009), 675–687. https://doi.org/10.1016/j.ejor.2008.11.002 doi: 10.1016/j.ejor.2008.11.002
![]() |
[6] |
H. Zhang, Z. Wang, D. Liu, A comprehensive review of stability analysis of continuous-time recurrent neural networks, IEEE Trans. Neural Networks Learn. Syst., 25 (2014), 1229–1262. https://doi.org/10.1109/TNNLS.2014.2317880 doi: 10.1109/TNNLS.2014.2317880
![]() |
[7] |
H. Lin, C. Wang, F. Yu, J. Sun, S. Du, Z. Deng, et al., A review of chaotic systems based on memristive Hopfield neural networks, Mathematics, 11 (2023), 1369. https://doi.org/10.3390/math11061369 doi: 10.3390/math11061369
![]() |
[8] |
H. Lin, C. Wang, Y. Sun, T. Wang, Generating n-scroll chaotic attractors from a memristor-based magnetized Hopfield neural network, IEEE Trans. Circuits Syst. II Express Briefs, 70 (2022), 311–315. https://doi.org/10.1109/TCSII.2022.3212394 doi: 10.1109/TCSII.2022.3212394
![]() |
[9] |
J. Bélair, S. A. Campbell, P. van den Driessche, Frustration, stability, and delay-induced oscillations in a neural network model, SIAM J. Appl. Math., 56 (1996), 245–255. https://doi.org/10.1137/S0036139994274526 doi: 10.1137/S0036139994274526
![]() |
[10] |
H. Zhao, L. Wang, C. Ma, Hopf bifurcation and stability analysis on discrete-time Hopfield neural network with delay, Nonlinear Anal. Real World Appl., 9 (2008), 103–113. https://doi.org/10.1016/j.nonrwa.2006.09.005 doi: 10.1016/j.nonrwa.2006.09.005
![]() |
[11] | K. Gopalsamy, Leakage delays in BAM, J. Math. Anal. Appl., 325 (2007), 1117–1132. https://doi.org/10.1016/j.jmaa.2006.02.039 |
[12] |
X. Li, J. Cao, Delay-dependent stability of neural networks of neutral type with time delay in the leakage term, Nonlinearity, 23 (2010), 1709. https://doi.org/10.1088/0951-7715/23/7/010 doi: 10.1088/0951-7715/23/7/010
![]() |
[13] |
R. Sakthivel, P. Vadivel, K. Mathiyalagan, A. Arunkumar, M. Sivachitra, Design of state estimator for bidirectional associative memory neural networks with leakage delays, Inf. Sci., 296 (2015), 263–274. https://doi.org/10.1016/j.ins.2014.10.063 doi: 10.1016/j.ins.2014.10.063
![]() |
[14] |
L. Duan, H. Wei, L. Huang, Finite-time synchronization of delayed fuzzy cellular neural networks with discontinuous activations, Fuzzy Sets Syst., 361 (2019), 56–70. https://doi.org/10.1016/j.fss.2018.04.017 doi: 10.1016/j.fss.2018.04.017
![]() |
[15] |
C. Xu, L. Chen, Effect of leakage delay on the almost periodic solutions of fuzzy cellular neural networks, J. Exp. Theor. Artif. Intell., 30 (2018), 993–1011. https://doi.org/10.1080/0952813X.2018.1509895 doi: 10.1080/0952813X.2018.1509895
![]() |
[16] |
C. Aouiti, F. Miaadi, Pullback attractor for neutral Hopfield neural networks with time delay in the leakage term and mixed time delays, Neural Comput. Appl., 31 (2019), 4113–4122. https://doi.org/10.1007/s00521-017-3314-z doi: 10.1007/s00521-017-3314-z
![]() |
[17] |
C. Hu, H. Jiang, Z. Teng, Impulsive control and synchronization for delayed neural networks with reaction-diffusion terms, IEEE Trans. Neural Networks, 21 (2010), 67–81. https://doi.org/10.1109/TNN.2009.2034318 doi: 10.1109/TNN.2009.2034318
![]() |
[18] |
X. Hu, L. Wang, C. Zhang, X. Wan, Y. He, Fixed-time stabilization of discontinuous spatiotemporal neural networks with time-varying coefficients via aperiodically switching control, Sci. China Inf. Sci., 631 (2023), 241–255. https://doi.org/10.1007/s11432-022-3633-9 doi: 10.1007/s11432-022-3633-9
![]() |
[19] |
L. Shanmugam, P. Mani, R. Rajan, Y. H. Joo, Adaptive synchronization of reaction-diffusion neural networks and its application to secure communication, IEEE Trans. Cybern., 50 (2018), 911–922. https://doi.org/10.1109/TCYB.2018.2877410 doi: 10.1109/TCYB.2018.2877410
![]() |
[20] |
C. Zhou, C. Wang, W. Yao, H. Lin, Observer-based synchronization of memristive neural networks under DoS attacks and actuator saturation and its application to image encryption, Appl. Math. Comput., 425 (2022), 127080. https://doi.org/10.1016/j.amc.2022.127080 doi: 10.1016/j.amc.2022.127080
![]() |
[21] |
L. Wang, H. He, Z. Zeng, Global synchronization of fuzzy memristive neural networks with discrete and distributed delays, IEEE Trans. Fuzzy Syst., 28 (2020), 2022–2034. https://doi.org/10.1109/TFUZZ.2019.2930032 doi: 10.1109/TFUZZ.2019.2930032
![]() |
[22] |
S. G. Nersesov, W. M. Perruquetti, Finite-time stabilization of nonlinear impulsive dynamical systems, Nonlinear Anal. Hybrid Syst., 2 (2008), 832–845. https://doi.org/10.1016/j.nahs.2007.12.001 doi: 10.1016/j.nahs.2007.12.001
![]() |
[23] |
S. Wang, Z. Guo, S. Wen, T. Huang, S. Gong, Finite/fixed-time synchronization of delayed memristive reaction-diffusion neural networks, Neurocomputing, 375 (2020), 1–8. https://doi.org/10.1016/j.neucom.2019.06.092 doi: 10.1016/j.neucom.2019.06.092
![]() |
[24] |
X. Yang, X. Li, P. Duan, Finite-time lag synchronization for uncertain complex networks involving impulsive disturbances, Neural Comput. Appl., 34 (2022), 5097–5106. https://doi.org/10.1007/s00521-021-05987-8 doi: 10.1007/s00521-021-05987-8
![]() |
[25] |
C. Zhou, C. Wang, Y. Sun, W. Yao, H. Lin, Cluster output synchronization for memristive neural networks, Inf. Sci., 589 (2022), 459–477. https://doi.org/10.1016/j.ins.2021.12.084 \newpage doi: 10.1016/j.ins.2021.12.084
![]() |
[26] |
L. Duan, J. Liu, C. Huang, Z. Wang, Finite-/fixed-time anti-synchronization of neural networks with leakage delays under discontinuous disturbances, Chaos Solitons Fractals, 155 (2022), 111639. https://doi.org/10.1016/j.chaos.2021.111639 doi: 10.1016/j.chaos.2021.111639
![]() |
[27] |
L. Duan, M. Shi, C. Huang, X. Fang, Synchronization in finite-/fixed-time of delayed diffusive complex-valued neural networks with discontinuous activations, Chaos Solitons Fractals, 142 (2021), 110386. https://doi.org/10.1016/j.chaos.2020.110386 doi: 10.1016/j.chaos.2020.110386
![]() |
[28] |
R. Sakthivel, N. Aravinth, C. Aouiti, K. Arumugam, Finite-time synchronization of hierarchical hybrid coupled neural networks with mismatched quantization, Neural Comput. Appl., 33 (2021), 16881–16897. https://doi.org/10.1007/s00521-021-06049-9 doi: 10.1007/s00521-021-06049-9
![]() |
[29] |
Y. Fan, X. Huang, Y. Li, J. Xia, G. Chen, Aperiodically intermittent control for quasi-synchronization of delayed memristive neural networks: an interval matrix and matrix measure combined method, IEEE Trans. Syst. Man Cybern. Syst., 49 (2018), 2254–2265. https://doi.org/10.1109/TSMC.2018.2850157 doi: 10.1109/TSMC.2018.2850157
![]() |
[30] |
L. Wang, Z. Zeng, M. Ge, A disturbance rejection framework for finite-time and fixed-time stabilization of delayed memristive neural networks, IEEE Trans. Syst. Man Cybern. Syst., 51 (2021), 905–915. https://doi.org/10.1109/TSMC.2018.2888867 doi: 10.1109/TSMC.2018.2888867
![]() |
[31] |
X. Liu, D. W. C. Ho, Q. Song, J. Cao, Finite-/fixed-time robust stabilization of switched discontinuous systems with disturbances, Nonlinear Dyn., 90 (2017), 2057–2068. https://doi.org/10.1007/s11071-017-3782-9 doi: 10.1007/s11071-017-3782-9
![]() |
[32] | L. C. Evans, Partial Differential Equations, Providence, RI, USA: American Mathematical Society, 1998. |
[33] |
Z. Chen, X. Fu, D. Zhao, Anti-periodic mild attractor of delayed hopfield neural networks systems with reaction-diffusion terms, Neurocomputing, 99 (2013), 372–380. https://doi.org/10.1016/j.neucom.2012.07.022 doi: 10.1016/j.neucom.2012.07.022
![]() |
[34] | G. Hardy, J. Littlewood, G. Pólya, Inequalities, Cambridge University Press, Cambridge, 1988. |
1. | Chuang Liu, Jinxia Wu, Weidong Yang, Robust H∞ output feedback finite-time control for interval type-2 fuzzy systems with actuator saturation, 2022, 7, 2473-6988, 4614, 10.3934/math.2022257 | |
2. | Xiaoyu Peng, Xiaodong Pan, Interval type-2 fuzzy systems on the basis of vague partitions and their approximation properties, 2024, 43, 2238-3603, 10.1007/s40314-024-02629-2 |
Algorithms | Integration rule | Weights |
NB, NT, BMM | ______________ | |
TWNB, TWNT, TWBMM | Composite Trapezoidal rule | |
SWNB, SWNT, SWBMM | Composite Simpson rule | |
S3/8WNB, S3/8WNT, S3/8WBMM | Composite Simpson 3/8 rule |
Num | Expression |
1 | |
2 | |
3 | |
4 |
Num | Approach | ||
CNB | CNT | CBMM | |
1 | 4.3050 | 4.3208 | 4.3041 |
2 | 3.7774 | 3.7141 | 3.7747 |
3 | 4.3702 | 4.3953 | 4.3690 |
4 | 5.0000 | 5.0000 | 5.0000 |
Algorithm | NB | TWNB | SWNB | S3/8WNB |
Example 1 | 0.000029 | 0.000029 | 0.000572 | 0.000067 |
Example 2 | 0.038400 | 0.001690 | 0.001450 | 0.001390 |
Example 3 | 0.009800 | 0.000094 | 0.000122 | 0.001908 |
Example 4 | 0.000110 | 0.000110 | 0.000110 | 0.000731 |
Total average | 0.016110 | 0.000640 | 0.000750 | 0.001370 |
Algorithm | NT | TWNT | SWNT | S3/8WNT |
Example 1 | 0.000043 | 0.000043 | 0.000519 | 0.00096 |
Example 2 | 0.067610 | 0.002170 | 0.002430 | 0.002280 |
Example 3 | 0.013730 | 0.000050 | 0.000050 | 0.002770 |
Example 4 | 0.000028 | 0.000028 | 0.000028 | 0.000458 |
Total average | 0.027140 | 0.000760 | 0.001010 | 0.001870 |
Algorithm | BMM | TWBMM | SWBMM | S3/8WBMM |
Example 1 | 0.000028 | 0.000028 | 0.000576 | 0.000056 |
Example 2 | 0.039650 | 0.001590 | 0.001320 | 0.001290 |
Example 3 | 0.009598 | 0.000096 | 0.000125 | 0.001866 |
Example 4 | 0.000112 | 0.000112 | 0.000112 | 0.000738 |
Total average | 0.016460 | 0.000610 | 0.000710 | 0.001320 |
Algorithms | Integration rule | Weights |
NB, NT, BMM | ______________ | |
TWNB, TWNT, TWBMM | Composite Trapezoidal rule | |
SWNB, SWNT, SWBMM | Composite Simpson rule | |
S3/8WNB, S3/8WNT, S3/8WBMM | Composite Simpson 3/8 rule |
Num | Expression |
1 | |
2 | |
3 | |
4 |
Num | Approach | ||
CNB | CNT | CBMM | |
1 | 4.3050 | 4.3208 | 4.3041 |
2 | 3.7774 | 3.7141 | 3.7747 |
3 | 4.3702 | 4.3953 | 4.3690 |
4 | 5.0000 | 5.0000 | 5.0000 |
Algorithm | NB | TWNB | SWNB | S3/8WNB |
Example 1 | 0.000029 | 0.000029 | 0.000572 | 0.000067 |
Example 2 | 0.038400 | 0.001690 | 0.001450 | 0.001390 |
Example 3 | 0.009800 | 0.000094 | 0.000122 | 0.001908 |
Example 4 | 0.000110 | 0.000110 | 0.000110 | 0.000731 |
Total average | 0.016110 | 0.000640 | 0.000750 | 0.001370 |
Algorithm | NT | TWNT | SWNT | S3/8WNT |
Example 1 | 0.000043 | 0.000043 | 0.000519 | 0.00096 |
Example 2 | 0.067610 | 0.002170 | 0.002430 | 0.002280 |
Example 3 | 0.013730 | 0.000050 | 0.000050 | 0.002770 |
Example 4 | 0.000028 | 0.000028 | 0.000028 | 0.000458 |
Total average | 0.027140 | 0.000760 | 0.001010 | 0.001870 |
Algorithm | BMM | TWBMM | SWBMM | S3/8WBMM |
Example 1 | 0.000028 | 0.000028 | 0.000576 | 0.000056 |
Example 2 | 0.039650 | 0.001590 | 0.001320 | 0.001290 |
Example 3 | 0.009598 | 0.000096 | 0.000125 | 0.001866 |
Example 4 | 0.000112 | 0.000112 | 0.000112 | 0.000738 |
Total average | 0.016460 | 0.000610 | 0.000710 | 0.001320 |