Loading [MathJax]/extensions/TeX/boldsymbol.js
Review

Human Fas ligand extracellular domain: current status of biochemical characterization, engineered-derivatives production, and medical applications

  • Received: 12 August 2022 Revised: 20 September 2022 Accepted: 20 September 2022 Published: 26 September 2022
  • Human Fas ligand extracellular domain (hFasLECD) is a soluble protein agent with significant relevance to medicine because of the immunologically essential functions of parental membrane-bound Fas ligand (CD95L, CD178) in the human body. This paper aimed to overview the current status of the studies focused on hFasLECD, ranging from its fundamental molecular properties and biological activity to its potential as a novel, practical cell death-inducing therapeutics or a diseases biomarker. The main part of this review was divided into four sections, the background of biological functions of human Fas ligand, the fundamental biochemical characteristics of hFasLECD, the production of engineered hFasLECD derivatives, and the potential of hFasLECD for medical applications. The translation of hFasLECD into an established agent in medicine is in progress, based on the clinical use-oriented research works in the relevant fields of basic science and engineering.

    Citation: Michiro Muraki. Human Fas ligand extracellular domain: current status of biochemical characterization, engineered-derivatives production, and medical applications[J]. AIMS Medical Science, 2022, 9(4): 467-485. doi: 10.3934/medsci.2022025

    Related Papers:

    [1] Shexiang Hai, Liang He . The steepest descent method for fuzzy optimization problems under granular differentiability. AIMS Mathematics, 2025, 10(4): 10163-10186. doi: 10.3934/math.2025463
    [2] Jun Hu, Jie Wu, Mengzhe Wang . Research on VIKOR group decision making using WOWA operator based on interval Pythagorean triangular fuzzy numbers. AIMS Mathematics, 2023, 8(11): 26237-26259. doi: 10.3934/math.20231338
    [3] Fazal Dayan, Nauman Ahmed, Muhammad Rafiq, Ali Akgül, Ali Raza, Muhammad Ozair Ahmad, Fahd Jarad . Construction and numerical analysis of a fuzzy non-standard computational method for the solution of an SEIQR model of COVID-19 dynamics. AIMS Mathematics, 2022, 7(5): 8449-8470. doi: 10.3934/math.2022471
    [4] M Junaid Basha, S Nandhini . A fuzzy based solution to multiple objective LPP. AIMS Mathematics, 2023, 8(4): 7714-7730. doi: 10.3934/math.2023387
    [5] Sumbal Ahsan, Rashid Nawaz, Muhammad Akbar, Saleem Abdullah, Kottakkaran Sooppy Nisar, Velusamy Vijayakumar . Numerical solution of system of fuzzy fractional order Volterra integro-differential equation using optimal homotopy asymptotic method. AIMS Mathematics, 2022, 7(7): 13169-13191. doi: 10.3934/math.2022726
    [6] Nasser Aedh Alreshidi, Muhammad Rahim, Fazli Amin, Abdulaziz Alenazi . Trapezoidal type-2 Pythagorean fuzzy TODIM approach for sensible decision-making with unknown weights in the presence of hesitancy. AIMS Mathematics, 2023, 8(12): 30462-30486. doi: 10.3934/math.20231556
    [7] B. El-Sobky, M. F. Zidan . A trust-region based an active-set interior-point algorithm for fuzzy continuous Static Games. AIMS Mathematics, 2023, 8(6): 13706-13724. doi: 10.3934/math.2023696
    [8] Guocheng Zhu, Zhining Wang, Xiaopeng Yang . On the minimal solution for max-product fuzzy relation inequalities. AIMS Mathematics, 2024, 9(11): 30667-30685. doi: 10.3934/math.20241481
    [9] Frank Rogers . Fuzzy gradient descent for the linear fuzzy real number system. AIMS Mathematics, 2019, 4(4): 1078-1086. doi: 10.3934/math.2019.4.1078
    [10] Misbah Rasheed, ElSayed Tag-Eldin, Nivin A. Ghamry, Muntazim Abbas Hashmi, Muhammad Kamran, Umber Rana . Decision-making algorithm based on Pythagorean fuzzy environment with probabilistic hesitant fuzzy set and Choquet integral. AIMS Mathematics, 2023, 8(5): 12422-12455. doi: 10.3934/math.2023624
  • Human Fas ligand extracellular domain (hFasLECD) is a soluble protein agent with significant relevance to medicine because of the immunologically essential functions of parental membrane-bound Fas ligand (CD95L, CD178) in the human body. This paper aimed to overview the current status of the studies focused on hFasLECD, ranging from its fundamental molecular properties and biological activity to its potential as a novel, practical cell death-inducing therapeutics or a diseases biomarker. The main part of this review was divided into four sections, the background of biological functions of human Fas ligand, the fundamental biochemical characteristics of hFasLECD, the production of engineered hFasLECD derivatives, and the potential of hFasLECD for medical applications. The translation of hFasLECD into an established agent in medicine is in progress, based on the clinical use-oriented research works in the relevant fields of basic science and engineering.


    Abbreviations

    hFasL:

    Human Fas ligand; 

    hFasLECD:

    Extracellular domain of hFasL; 

    NK:

    Natural killer; 

    sFasL:

    Soluble hFasL; 

    scFv:

    Single chain variable fragment; 

    T:

    Thymus-derived; 

    TNF:

    Tumor necrosis factor

    Most science and engineering problems are governed by differential equations. Due to the complexity of the problems in real practice, often, numerical methods are adopted to study the field variables. Generally, the numerical methods convert the governing differential equations into algebraic equations. Systems of nonlinear equations are among the algebraic equations which commonly occur in mathematical models. Furthermore, the presence of uncertainty makes the system challenging to solve. As uncertainties play a vital role, it cannot be avoided, and the system needs to be investigated with uncertainty. As such, here we have considered fuzzy numbers as uncertainty.

    The concept of fuzzy set theory, fuzzy numbers and their computation through fuzzy arithmetic operations were initially introduced in Dubois and Prade [1], Nahmias [2] and Zadeh [3]. As nonlinear systems of equations are common in mathematical in many engineering and science problems, the uncertain analysis of the same is essential. The uncertainties that are caused due to experimental errors, lack of knowledge and partial information of system parameters are taken as fuzzy. Hence, incorporation of these uncertainties in a system of nonlinear equations produces a fuzzy system of nonlinear equations in Jafari and Yu [4]. In this regard, many researchers presented different approaches to solve fuzzy equations. A few of the relevant research works are discussed here. In [5,6], Buckley and Qu presented an analytical approach to solve fuzzy linear and quadratic equations. In Buckley and Qu [5], the authors discussed the necessary and sufficient condition for linear and quadratic equations to have a solution, when the parameter is either real and complex. Furthermore, Buckley and Qu [6] introduced a new solution based on unified extension.

    From analytical approaches, it is seen that when a fuzzy equation and/or fuzzy system of equations undergoes complicated boundary conditions and computational complexity, the numerical methods make it easier to handle. In this context, Abbasbandy and Asady [7], Abbasbandy and Ezzati [8] used Newton's method to investigate fuzzy nonlinear equations. In [9], Shokri introduced an idea of midpoint in Newton's method and then applied it to study the fuzzy nonlinear equation. Further, a fuzzy system of equations can be classified as only fuzzy and fully fuzzy system depending on the usage of fuzziness. In [10], Jafari et al. used an iterative approach to solve a fully fuzzy nonlinear system. In [11], Kajani et al. studied a dual fuzzy nonlinear system of equations, and an iterative algorithm was adapted to find the solution of the system.

    There are various types of fuzzy numbers that can be taken as uncertainty. One of the fuzzy numbers is the triangular fuzzy number (TFN), which is often used by researchers. We have also considered TFN for our present research work. Using TFN, Gani and Assarudeen [12] modeled a linear programming problem to deduce the fuzzy objective value as well as the fuzzy optimal solution. It is also noted that the linear programming problem is a special case of linear systems. Now, with the TFN environment, a general framework of a nonlinear system of equations can be developed. As such, here we have considered an n×n system of nonlinear equations with fuzzy environment for our investigation. In [13], Sherbrooke and Patrikalakis solved a nonlinear system of polynomial equations, and Garlof and Smit [14] obtained the solution of a polynomial equation, a recursive subdivision expressed on Bernstein's basis. Yazdi et al. [15] modeled risk assessments of different industrial and social systems with uncertainties. [16] provides many linguistic methods and case studies, demonstrating their applicability, which will enable readers to implement them in their own risk analysis process.

    The above literature review reveals that the system is more challenging to understand and solve using gradient based techniques. Therefore, direct search algorithms can be implemented for easy understanding and solving of the same. In light of this, optimization techniques based on direct search approach can be introduced to obtain the solution of fuzzy systems. One of the ideas to proceed with an optimization technique for solving a system of nonlinear equations is to transform the system into an unconstrained minimization problem, as in Deb [17] and Nayak [18]. Moreover, many researchers presented various optimization techniques for the same. Luo et al. [19] suggested a hybrid technique for solving a system of nonlinear equations that combines a chaotic optimization algorithm with the quasi-Newton method. The concept behind this approach is to look for an initial estimate that will reach the convergent areas of the quasi-Newton method. Besides this, the computation cost may rise owing to the quasi-Newton approach, demanding the development of a new methodology. Recently, Ansorena [20] considered an optimization problem regarding the work strategy at the gate of the Barcelona container port. Authors provided a technique for solving fully fuzzy linear programming (FFLP) problems using the ranking function. In Jafarian and Jafari [21], a basic stability technique is used to modify the two-step method (TSM). Bibi et al. in [22] devised an approach for solving convex quadratic programming problems with limited variables. In Nayak and Chakraverty [23], the researchers took a fuzzy system of linear equations and then gave a united solution using a limit approach of fuzzy arithmetic. As the fuzzy set is the union of intervals with various α-cuts, in [24], Nayak and Pooja gave an optimization technique to solve an interval nonlinear system with the bounded parameter. A stochastic process is another way to handle uncertainty. In this regard, Yazdi [25] considered a stochastic game theory approach to solving a system safety and reliability decision-making problems under uncertainty. Hence, many direct search techniques have been used to solve the nonlinear systems of equations that can be managed for fuzzy nonlinear systems of equations.

    In addition to the solution techniques, convergence analysis of the same is essential to study. The convergence analysis guarantees the occurrence of an optimal solution. In Hough et al. [26] and Lewi [27], authors provided a pattern search convergence for the mentioned optimization problem. The general theory of pattern search is extended to a local convergence of multidimensional search algorithms in Torczo [28]. In [29], Lewis and Torczon established global convergence of a pattern search technique.

    As such, we shall extend the Inner Outer Direct Search (IODS) method [24] in a fuzzy environment. The search processes are inspired by the Hooke Jeeves pattern search method in Kirgat and Surde [30]. The proposed fuzzy IODS algorithm is used to solve fuzzy nonlinear systems of equations for both only fuzzy and fully fuzzy cases. Fuzzy IODS transforms a fuzzy system of nonlinear equations into an unconstrained multivariable optimization problem. It breaks the problem into a two-step calculation, that is, inner computation and outer computations. The obtained solutions through these two steps are assembled, and using regularity principle the final solution is obtained. Further, we have established the local convergence behavior of the fuzzy IODS algorithm in the neighborhood of the local minimizer x. Using two example problems, the analytical, numerical and graphical convergences of the obtained solutions are depicted for validation of the proposed algorithm. Finally, the nature of the uncertain solutions is discussed in various cases. The potential real-world application of this algorithm is found in modeling risk assessment problems, control systems, structural engineering problems and fluid mechanics.

    This paper is structured in the following manner. Section 2 includes the preliminaries of fuzzy numbers and arithmetic operations using fuzzy numbers. Section 3 describes the classification of a fuzzy nonlinear system of equations and its different cases. Section 4 presents the Inner-Outer Direct Search method in fuzzy environment and fuzzy IODS algorithm. In Section 5, we have analyzed the local convergence of the fuzzy IODS algorithm. Then, in Section 6, three example problems are demonstrated through the fuzzy IODS algorithm, and the solutions are reported. Through convergence analysis, it is observed that the proposed fuzzy IODS method converges and guarantees the solution.

    This section includes the fundamentals of fuzzy numbers and their arithmetic (Zimmermann [31]).

    A fuzzy number ˜A is a convex normalized piecewise continuous fuzzy set ˜A on the real line R with the membership function

    μ˜A(x):R[0,1],xR. (1)

    One of the fuzzy numbers, a triangular fuzzy number (TFN), is written as

    ˜A=[a1,a2,a3], (2)

    where a1, a2 and a3 are the left, center and right values of the TFN ˜A, and a1a2a3.

    Two TFNs are said to be equal if the left endpoint, center and right endpoints for both the TFNs are the same, respectively.

    For example, if we take two TFNs, viz. ˜A=[a1,a2,a3] and ˜B=[b1,b2,b3], then they are said to be equal if a1=b1, a2=b2, and a3=b3. The width of the TFN ˜A is defined as w=a3a1.

    To compute TFNs, one may use the traditional arithmetic in Nayak [32] operations given below. ˜A=[a1,a2,a3] may be transformed into an interval by using αcut as follows:

    ˜A=[a1,a2,a3]=[a1+(a2a1)α,a3(a3a2)α],whereα[0,1].

    Suppose that ˜A=[A_(α),¯A(α)] and ˜B=[B_(α),¯B(α)] are two fuzzy numbers. Then, we have the following.

    Addition:

    ˜A+˜B=[A_(α)+B_(α),¯A(α)+¯B(α)].

    Subtraction:

    ˜A˜B=[A_(α)¯B(α),¯A(α)B_(α)].

    Multiplication:

    ˜AטB=[min{A_(α)×B_(α),A_(α)ׯB(α),¯A(α)×B_(α),¯A(α)ׯB(α)},max{A_(α)×B_(α),A_(α)ׯB(α),¯A(α)×B_(α),¯A(α)ׯB(α)}].

    Division:

    ˜A÷˜B=[min{A_(α)÷B_(α),A_(α)÷¯B(α),¯A(α)÷B_(α),¯A(α)÷¯B(α)},max{A_(α)÷B_(α),A_(α)÷¯B(α),¯A(α)÷B_(α),¯A(α)÷¯B(α)}],
    whereB_(α)0and¯B(α)0.

    A TFN is a union of intervals, that is, for each membership value α[0,1], one gets an interval, and the union of all these intervals gives the same TFN. Hence, we may conclude that during computation, the operation takes place pointwise. Therefore, one needs to construct a function using the variable α and then compute the TFNs (Chakraborty and Guh [33]). In the next section, we will study how to solve a fuzzy system of nonlinear equations using the mentioned arithmetic operations.

    In the following, we may rewrite the definition of a TFN.

    A fuzzy number ˜A=[xL,xN,xR] is said to be a TFN if the membership values are defined as

    μA(x)={fL,xLxxNfR,xNxxR0,otherwise, (3)

    where fL is the left monotonically non-decreasing function, and fR is the right monotonically non-increasing function. These functions can be represented as fL=xxLxNxL and fR=xRxxRxN.

    For the computational utility, an arbitrary TFN ˜A=[xL,xN,xR] can be transformed to a two-variable form through the following steps.

    Step 1: TFN to interval form,

    Step 2: Interval to crisp form.

    Using α-cuts the TFN can be written as

    ˜A=[xL,xN,xR][ξL,ξR], (4)

    where

    ξL=xL+α(xNxL)andξR=xR+α(xNxR);α[0,1].

    The crisp representation of TFN ˜A becomes

    ξLβ(ξLξR),β[0,1]. (5)

    The above representation may be used in the following system of equations to study a fuzzy system of equations.

    Consider a system of equations in matrix form

    ˜M˜x=˜b, (6)

    where ˜M is a coefficient matrix, ˜b is the right-side vector, and ˜x is the unknown vector that needs to be quantified. The compact form of the same is defined as

    ˜M=[˜aij],i,j=1,2,n,˜b=[˜b1,˜b2,,˜bn]T,and˜x=[˜x1,˜x2,˜xn]T. (7)

    Here, the entries ˜aij and ˜bj are the TFNs.

    Consider a system of equations having n variables, that is,

    ˜Mn×n˜Xn×1=˜bn×1, (8)

    where

    ˜Mn×n=[˜a11˜a12˜a1n˜a21˜a22˜a2n˜an1˜an2˜ann],˜Xn×n=[˜x1˜x2˜xn],and˜bn×n=[˜b1˜b2˜bn]. (9)

    The expanded forms of TFNs ˜aij and ˜bj are

    ˜aij=[aLij,aNij,aRij]and˜bj=[bLj,bNj,bRj];i,j=1,2,,n.

    Now, the fully fuzzy system of the equations can be defined as

    [[˜aL11,˜aN11,˜aR11][˜aL12,˜aN12,˜aR12][˜aL1n,˜aN1n,˜aR1n][˜aL21,˜aN21,˜aR21][˜aL22,˜aN22,˜aR22][˜aL1n,˜aN1n,˜aR1n][˜aLn1,˜aNn1,˜aR11][˜aLn2,˜aNn2,˜aRn2][˜aLnn,˜aNnn,˜aRnn]][˜x1˜x2˜xn]=[[˜bL1,˜bN1,˜bR1][˜bL2,˜bN2,˜bR2][˜bLn,˜bNn,˜bRn]]. (10)

    Case 1. In Eq (10), the entries of the coefficient matrix are TFNs. The entry ˜aij is defined as [aLij,aNij,aRij], and the right-side vector is bj (crisp in nature).

    The matrix representation of the Case 1 type of fuzzy system of nonlinear equations may be

    [[˜aL11,˜aN11,˜aR11][˜aL12,˜aN12,˜aR12][˜aL1n,˜aN1n,˜aR1n][˜aL21,˜aN21,˜aR21][˜aL22,˜aN22,˜aR22][˜aL1n,˜aN1n,˜aR1n][˜aLn1,˜aNn1,˜aR11][˜aLn2,˜aNn2,˜aRn2][˜aLnn,˜aNnn,˜aRnn]][˜x1˜x2˜xn]=[b1b2bn]. (11)

    Case 2. In Eq (10), the right-side vector is ˜bj TFNs. The right-side vector of ˜bj is defined as [bLj,bNj,bRj]. The coefficient of the left side ˜aij is crisp in nature.

    The matrix representation of the Case 2 type of fuzzy system of nonlinear equations may be

    [a11a12a1na21a22a2nan1an2ann][˜x1˜x2˜xn]=[[˜bL1,˜bN1,˜bR1][˜bL2,˜bN2,˜bR2][˜bLn,˜bNn,˜bRn]]. (12)

    Case 3. In Eq (10), the entries of the coefficient matrix and the right-side vector are TFNs.

    The matrix representation of the Case 3 type of fuzzy system of nonlinear equations may be

    [[˜aL11,˜aN11,˜aR11][˜aL12,˜aN12,˜aR12][˜aL1n,˜aN1n,˜aR1n][˜aL21,˜aN21,˜aR21][˜aL22,˜aN22,˜aR22][˜aL1n,˜aN1n,˜aR1n][˜aLn1,˜aNn1,˜aR11][˜aLn2,˜aNn2,˜aRn2][˜aLnn,˜aNnn,˜aRnn]][˜x1˜x2˜xn]=[[˜bL1,˜bN1,˜bR1][˜bL2,˜bN2,˜bR2][˜bLn,˜bNn,˜bRn]]. (13)

    The above cases will be discussed and solved through example problems in the coming sections. The next section deals with the Inner Outer Direct Search (IODS) optimization technique and its extension in the fuzzy environment.

    The basic idea of the IODS optimization technique is to convert the system of equations to an unconstrained optimization problem. Then, the same can be solved through a direct search method. In a fuzzy environment, the extensions are done with the involved fuzzy numbers. In addition to the system of nonlinear equations, here we are dealing with a fuzzy system of nonlinear equations. As a result, we get a fuzzy unconstrained optimization problem which needs to be investigated through the direct search approach. Moreover, we need to minimize the fuzzy unconstrained optimization problem. The search process in IODS algorithm executes in two steps, viz., exploratory search and pattern search. However, with the inclusion of epistemic uncertainties, inner and outer calculations need to be performed [24].

    For the sake of understanding, we have considered a system of two nonlinear equations, where the right-hand side values are TFN.

    Fk(x1,x2)=[bLk,bNk,bRk]. (14)

    Equation (14) can be transformed into the interval parametric form

    Fk(x1,x2)=[ξLk,ξRk], (15)

    where ξLk=bLk+αk(bNkbLk) and ξRk=bRkαk(bRkbNk). Here, k=1,2, and 0αk1.

    In the above two nonlinear equations, the solution derives x1 and x2 in terms of α and β. Then, the desired solution can be achieved by substituting the values of the parameters α and β. The maximum and minimum are taken as the upper and lower bounds of the solution. This method can be extended to more variables by taking an equal number of parameters as unknown variables. The search to get the minimum vector is controlled by seven different computations: (ⅰ) left outer computation, (ⅱ) right outer computation, (ⅲ) center outer computation, (ⅳ) inner computation for a=0 and β=0, (ⅴ) inner computation for a=0 and β=1, (ⅵ) inner computation for a=1 and β=0 and (ⅶ) inner computation for a=1 and β=1. The procedure consists of two types of searches, viz., exploratory move and pattern search, inspired by the well-known Hooke-Jeeves pattern search optimization technique [17].

    Using Eq (9), the left-hand side outer computation can be depicted through the following matrix:

    [aL11aL12aL1naL21aL22aL2naLn1aLn2aLnn][x1x2xn]=[bL1bL2bLn]. (16)

    Using Eq (9), the right-hand side outer computation can be depicted through the following matrix:

    [aR11aR12aR1naR21aR22aR2naRn1aRn2aRnn][x1x2xn]=[bR1bR2bRn]. (17)

    Similarly, using the value of α=1 in Eq (9), the center outer computation can be shown in the following matrix:

    [aN11aN12aN1naN21aN22aN2naNn1aNn2aNnn][x1x2xn]=[bN1bN2bNn]. (18)

    The left outer, right outer, center outer and inner computation are performed through the Inner Outer Search algorithm given below.

    Step 1: Convert fuzzy system of nonlinear equations to fuzzy unconstrained multivariable optimization problem.
    Formulate inner and outer unconstrained multivariable optimization problem.
    Formulate center (α-cut is unity) unconstrained multivariable optimization problem.
    Step 2: Introduce two parameters α,β{0,1} and consider it with initial values. There will be four different unconstrained multivariable optimization problems.
    There will be a total of seven unconstrained multivariable optimization problems which need to be solved using the following steps.
    Step 3: Choose an initial point x(0), variable increments Δi, a step reduction factor λ>1 and a convergence parameter ϵ.
    Using Steps 1 and 2, we get the objective function F(x), x=(x1,x2,,xn)T.
    Step 4: Exploratory search
    Step 4.1: Calculate F=F(xi),F+=F(xi+Δi), and F=F(xiΔi).
    Step 4.2: Find Fmin=min(F,F+,F) and set xi resembles to Fmin.
    Step 4.3: Is i=N (Number of independent variables)? If no, set i=i+1 and go to Step 4.1.
    Else, x is the result and go to Step 4.4.
    Step 4.4: If xxc, xc is the current x value, then success. Else, failure.
    Step 5: Pattern search
    Step 5.1: Choose a starting point x(0), variable increment Δi(i=1,2,,N), a step reduction factor λ>1, and a termination parameter ϵ.
    Set k=0.
    Step 5.2: Perform an exploratory move using x(k) as the base point. Consider x to be the result of the exploratory move. If the exploratory move is successful, set x(k+1)=x and proceed to Step 5.4.
    Else, go to Step 5.3.
    Step 5.3: Is Δ<ϵ? If yes, Terminate.
    Else, set Δi=Δiλ for i=1,2,,N and go to Step 5.2.
    Step 5.4: Set k=k+1 and perform the pattern search.
    The new point becomes
            x(k+1)p=x(k)+(x(k)x(k1)).
    Step 5.5: Perform another exploratory move with x(k+1)p as the best point. Let the result be x(k+1)p.
    Step 5.6: Is F(x(k+1))<F(x(k))?
    If yes, go to Step 5.4.
    Else go to Step 5.3.
    Step 6: Assemble all the solutions and sort it by using regularity principle.

     | Show Table
    DownLoad: CSV

    In this above algorithm, one needs to solve seven unconstrained optimization problems. Out of these, three are solved by outer computations, viz., left, center and right unconstrained optimization problems. The other four are investigated by inner computation when initial conditions are incorporated with the values α,β={0,1}. The solution vector for the same is written as α,βxk. Here, k is the number of variables (k=1,2,3,,n).

    To understand the practical utility of the fuzzy IODS algorithm, we discuss its convergence analysis in the next section.

    We have considered TFNs to analyze the convergence of the fuzzy IODS algorithm.

    Definition 5.1. For a fuzzy iterative method with TFN, the field variables converge if the obtained TFNs possess both center and width convergence.

    The center convergence occurs if the membership value of the TFN is unity, and the width convergence occurs when the membership value is zero.

    To analyze the convergence of the proposed algorithm, we need to discuss the convergence analysis of the IODS algorithm. Hence, using Definition 5.1, we present the center convergence and then width convergence.

    Theorem 1. [34] Let x be a crisp vector, and F(x) is Lipschitz continuous on an open neighborhood Ω of L(x0) with Lipschitz constant T. Then, there exist δ,τ>0 such that the following holds.

    If xk gives an unsuccessful iteration and Δk<δ, then

    F(xk)τΔk. (19)

    Hypothesis 1. Suppose Pk represents an exploratory search, where the objective is to minimize. Then, it can be written as Pk=[c1kcpkk]. Here, Pk is bounded in norm, that is, T>0 such that cik<T for i=1,2,,pk. Thus, τ0 such that for any arbitrary step sk satisfies

    skτ0Δk, (20)

    where sk=PkΔk.

    Hypothesis 2. It is ensured that N such that Δk is monotonically nonincreasing kN. Further, it can be noted that we are not allowing increase in Δk after some iteration N, that is, Δk stays the same or decreases.

    Here, our main aim is to study the behavior of pattern search in the neighborhood of an isolated local minimizer, say x [35]. Next, the same will be used for analyzing the behavior of F in the neighborhood of x.

    Hypothesis 3. It can be assumed that F is twice continuously differentiable on an open ball B(x,η) of x with radius η, F(x)=0, and that the second-order sufficiency condition 2F(x)>0 holds at x.

    As the objective is to minimize the objective function, we assume 2F(x) is positive definite xB(x,η). Let ρmin and ρmax be the lower and upper bounds of the open ball B(x,η), respectively, on the singular values of 2F(x) on B(x,η).

    Theorem 2. Using the Hypotheses 1–3, we get η,τ1>0, and the following holds.

    If there is an unsuccessful iteration at vector xk, Δk<η, and xkx<η, then

    xkxτ1Δk. (21)

    Proof. Suppose F(x) is a continuous and differentiable function, and then using the mean value theorem [36], we may write

    2F(ζ)=f(xk)f(x)xkx. (22)

    Equation (22) can be rewritten as

    F(xk)F(x)=2F(ζ)(xkx), (23)

    for some ζ that is a line segment placed between xk and x.

    Since F(x)=0 by Hypothesis 2, we get

    F(xk)=2F(ζ)(xkx)ρminxkx, (24)

    where ρmin is the lower bound of the open ball B(x,η).

    From Theorem 1 and Δk<η<δ,

    ρminxkxF(xk)τΔk, (25)

    where τ1=τ/ρmin.

    This proves that the set of iterations converges to x.

    Theorem 3. If xk,ykB(x,η) and F(xk)F(yk), then using the Lipchitz condition [37], it is observed that

    xkxρykx. (26)

    Proof. Suppose, xk,ykB(x,η) and F(xk)F(yk). With Taylor's theorem with F(x)=0, it follows that

    F(xk)=12(xkx)T2F(ζ)(xkx), (27)
    F(yk)=12(ykx)T2F(ξ)(ykx), (28)

    where ζ[x,xk] and ξ[x,yk].

    Using the given condition F(xk)F(yk) with Eqs (27) and (28), we can write

    0F(yk)F(xk)=12(ykx)T2F(ξ)(ykx)12(xkx)T2F(ζ)(xkx).

    Therefore,

    0ρmaxykx2ρminxkx2.

    Theorem 4. There exist δ>0, ϵ>0 and τ2>0 for which the following holds.

    For kN, if xk is an iterate for which Δk<δ and xkx<ϵ, then nk,

    xnxη. (29)

    Proof. From the above theorem and hypothesis, there exists an ϵ>0, and we take min{δ,τ,Δk}>ϵ. We consider the proof by induction. Take xk+1=xk+(xkxk1). Then, it can be written as xk+1=xk+sk.

    By Hypothesis 1, we have sk<τ0Δk, that is,

    xk+1xk=sk<τ0Δk. (30)

    Applying the triangle inequality in Eq (30), it is observed that

    xk+1xxk+1xk+xkx<τ0Δk+ϵ<η. (31)

    From Theorem 3 and Eq (31), it is concluded that xk+1B(x,η). As such,

    xk+1xρxkxρϵ<η.

    Now, assume k+1m,

    xmxη. (32)

    Then,

    xm+1xxm+1xm+xmx. (33)

    From Hypothesis 2, one can guarantee that ΔmΔk for mk. Hence, by the algorithm and hypothesis,

    xm+1xmτ0Δmτ0Δk.

    Using the induction hypothesis, xmB(x,η). Since, F(xm)F(xk), we assume that xkx<ϵ, and one can get

    xmxρxkxρϵ.

    Thus,

    xm+1x<τ0Δk+ρϵ<η.

    Now suppose that m+1n,

    xnxη. (34)

    Then,

    xn+1xxn+1xn+xnx. (35)

    By Hypothesis 2, we guarantee that ΔnΔmΔk for nmk. So, xn+1xnτ0Δnτ0Δmτ0Δk.

    By the induction hypothesis, xnB(x,η). Since F(xn)F(xm), we assume that xkx<ϵ1 and xmxϵ2, and then we have

    xmxρxkxρϵ1,
    xnxρxmxρϵ2.

    Thus,

    xn+1xxn+1xn+xnx,
    xn+1x<τ0Δk+ρϵ2<η. (36)

    Hypothesis 4. If the set L(x0) is compact [38], then liminfkΔk=0.

    Proof. Using the theorems [28,39] and mentioned Hypotheses 1–3, we obtain the above local convergence of pattern search.

    Theorem 5. Suppose that, given a pattern search algorithm satisfying the given hypothesis, there exists a limit point x of the sequence of iterates produced by an algorithm that is a local minimizer.

    There exist τ2>0 and K such that for all kK,

    xkxτ2Δn(k), (37)

    where n(k) is the final unsuccessful iterate. Therefore, we have limkxk=x.

    Proof. By Hypothesis 2, consider the iteration after which we stop allowing Δk to increase. Since x is the limit point of {xk} and limkxk=x, there exists an iterate xk+1, k+1N,

    Δk+1<min{η,δ},
    xk+1x<min{η,ϵ},

    where η,δ and ϵ are introduced in the previous hypothesis and Theorems. We have

    xkxη.

    By Theorem 4, we know, mk+1, and using Theorem 2, we get

    xmxτ2Δm.

    Similarly, from Theorem 4, we know that

    xnxη,nm+1.

    By Theorem 2, we have

    xnxτ2Δn,

    for all unsuccessful iterates xn with nm+1.

    We can proceed with the iteration value of K being the subsequent iteration m+1 at which we have an unsuccessful iteration. For kK and Theorem 2,

    xkxc4Δk=c4Δn(k).

    Here, k=n(k).

    Simultaneously, iteration is successful for kK, and we have F(xk)<F(xn(k)). By Theorem 4,

    xkxρxn(k)xρc4Δn(k). (38)

    Hence, we conclude that by hypothesis Δk0, and it shows that limkxk=x.

    This completes the convergence proofs of IODS algorithm when the membership value is one. In other words, the above theorems ensure the center convergence of fuzzy IODS algorithm for TFNs. The second part of the convergence of fuzzy IODS is the width convergence that is discussed in the following theorem.

    Theorem 6. Suppose {xn} and {yn} are two convergent sequences for left and right values of the TFN, respectively, such that limnxna and limnynb. Suppose, ηn and ξ are the widths of the TFNs which are defined as ηn=|xnyn| and ξ=|ab|. Then, limnηnξ.

    Proof. Given limnxna and limnynb,

    let there exist ϵ>0 and integers N1 and N2 such that

    d(xn,a)<ϵ2forn1>N1andd(yn,b)<ϵ2forn2>N2.

    Then, we need to prove that |d(xnyn,ab)|<ϵ.

    Using the triangle inequality,

    d(xn,yn)d(xn,a)+d(yn,b)+d(a,b). (39)

    Equation (39) gives

    d(xn,yn)d(a,b)d(xn,a)+d(yn,b)=ϵ2+ϵ2=ϵ. (40)

    Similarly,

    d(a,b)d(xn,a)+d(yn,b)+d(xn,yn). (41)

    Equation (41) can be represented as

    d(a,b)d(xn,yn)d(xn,a)+d(yn,b)=ϵ2+ϵ2=ϵ. (42)

    From Eqs (40) and (42) we get

    |d(xn,yn)d(a,b)|d(xna)+d(ynb)<ϵn>max{N1,N2}. (43)

    This proves

    |d(xn,yn)d(a,b)|ϵ. (44)

    Scalability refers to the ability of an algorithm to handle a system of linear and/or nonlinear problem sizes while maintaining convergence rate and computational efficiency. As per the scalability, it is found that the performance of the algorithm gets affected by the size and nature of the system of equations in terms of time of the computations as well as the complexity.

    In this section, we have considered three example problems and investigated the same case-by-case using the fuzzy IODS algorithm.

    Example 1. Take a fuzzy system of nonlinear equations

    ˜a11x21+˜a12x2=˜χ1,
    ˜a21x1+˜a22x22=˜χ2, (45)

    where, ˜a11=[0.4,1,1.4], ˜a12=[0.6,1,1.6], ˜a21=[0.7,1,1.5], ˜a22=[0.5,1,1.7], ˜χ1=[2.5,5.3,7.5] and ˜χ2=[3.2,6.7,8.6]. Assume the initial approximation x(0)=(1,1)T, step size Δ=(0.5,0.5)T, and ϵ=104. Here, the tolerance value is ϵ. It is noted that the iterations are terminated if the step size become less than the tolerance value.

    The first step is to construct the outer system and then convert the Eq (45) into a fuzzy unconstrained minimization problem. The transformed fuzzy unconstrained minimization problem is formulated as

    F(x)=(˜a11x21+˜a12x2˜χ1)2+(˜a21x1+˜a22x22˜χ2)2. (46)

    Applying the IODS algorithm, the desired solution is obtained after 13 iterations using MATLAB [40]. The solution vectors after 13 iterations (˜x1,˜x2)T are shown in Tables 16 and Figures 16, respectively. The width of the solution TFNs are computed with the help of outer solutions. The width of a TFN is defined as the interval length of the TFN at membership value zero. In the following, the solutions are presented case by case. Case 1 represents the fuzzy system of nonlinear equations where only coefficient matrix is fuzzy. Case 2 possesses only right-side vector fuzzy. In Case 3 both the coefficient matrix and right-side vector are fuzzy. The aim of discussing three cases is to get a complete idea of propagation of fuzzy uncertainties in only fuzzy and fully fuzzy systems of nonlinear equations.

    Table 1.  Solution for component ˜x1 of Example 1.
    Iteration xL1 xC1 xR1 0,0x1 0,1x1 1,0x1 1,1x1 MAX MIN Width
    1 1 1 1 1 1 1 1 1 1 0
    2 1.5 2.5 3 1.5 2 1.5 1.5 3 1.5 1.5
    3 1.5 1.75 3 1.75 1.75 1.75 1.5 3 1.5 1.5
    4 1.5 1.75 3 1.75 1.875 1.75 1.375 3 1.375 1.625
    5 1.4375 1.75 3 1.75 1.875 1.75 1.3125 3 1.3125 1.6875
    6 1.375 1.75 2.9688 1.7188 1.9062 1.75 1.3438 2.9688 1.3438 1.625
    7 1.375 1.75 2.9531 1.7188 1.8906 1.75 1.3281 2.9531 1.3281 1.625
    8 1.375 1.7578 2.9453 1.7344 1.8984 1.75 1.3281 2.9453 1.3281 1.6172
    9 1.3789 1.7539 2.9453 1.7305 1.8945 1.75 1.3281 2.9453 1.3281 1.6172
    10 1.377 1.7539 2.9453 1.7324 1.8945 1.75 1.3262 2.9453 1.3262 1.6191
    11 1.3779 1.7539 2.9463 1.7344 1.8945 1.75 1.3262 2.9463 1.3262 1.6201
    12 1.3774 1.7539 2.9463 1.7339 1.895 1.75 1.3257 2.9463 1.3257 1.6206
    13 1.3782 1.7537 2.9465 1.7339 1.8948 1.75 1.3259 2.9465 1.3259 1.6206
    End Point 1.3781 1.7539 2.9465 1.7338 1.8949 1.75 1.326 2.9465 1.326 1.6205

     | Show Table
    DownLoad: CSV
    Table 2.  Solution for component ˜x2 of Example.
    Iteration xL2 xC2 xR2 0,0x2 0,1x2 1,0x2 1,1x2 MAX MIN Width
    1 1 1 1 1 1 1 1 1 1 0
    2 1.5 2 3 4 2 1.5 1.5 4 1.5 2.5
    3 1.5 2.25 3 4 2 2.25 1.5 4 1.5 2.5
    4 1.625 2.25 3 4 2 2.25 1.75 4 1.625 2.375
    5 1.625 2.25 3 4.0625 2 2.25 1.75 4.0625 1.625 2.4375
    6 1.6562 2.2188 3.0312 4.0625 2 2.2188 1.75 4.0625 1.6562 2.4063
    7 1.6562 2.2188 3.0469 4.0625 2 2.2188 1.75 4.0625 1.6562 2.4063
    8 1.6484 2.2188 3.0469 4.0547 2 2.2266 1.75 4.0547 1.6484 2.4063
    9 1.6523 2.2227 3.0469 4.0547 2 2.2266 1.75 4.0547 1.6523 2.4024
    10 1.6504 2.2246 3.0469 4.0527 2 2.2246 1.75 4.0527 1.6504 2.4023
    11 1.6514 2.2236 3.0459 4.0518 2 2.2246 1.75 4.0518 1.6514 2.4004
    12 1.6509 2.2241 3.0454 4.0518 2 2.2251 1.75 4.0518 1.6509 2.4009
    13 1.6509 2.2241 3.0454 4.052 2 2.2249 1.75 4.052 1.6509 2.4011
    End Point 1.6509 2.224 3.0454 4.052 2 2.2249 1.75 4.052 1.6509 2.4011

     | Show Table
    DownLoad: CSV
    Table 3.  Solution for component ˜x1 of Example 1.
    Iteration xL1 xC1 xR1 0,0x1 0,1x1 1,0x1 1,1x1 MAX MIN Width
    1 1 1 1 1 1 1 1 1 1 0
    2 1.5 2.5 2.5 1.5 0.5 1.5 2.5 2.5 0.5 2
    3 0.75 1.75 2.25 0.75 0.25 1.25 2.5 2.5 0.25 2.25
    4 0.875 1.75 2.25 0.875 0.75 1 2.5 2.5 0.75 1.75
    5 0.9375 1.75 2.25 0.9375 0.75 1 2.5 2.5 0.75 1.75
    6 1.0312 1.75 2.25 1.0312 0.75 1 2.5312 2.5312 0.75 1.7812
    7 1 1.75 2.2344 1 0.75 0.9844 2.5469 2.5469 0.75 1.7969
    8 1.0156 1.7578 2.2344 1.0156 0.7422 0.9844 2.5508 2.5508 0.7422 1.8086
    9 1.0078 1.7539 2.2305 1.0078 0.7422 0.9844 2.5508 2.5508 0.7422 1.8086
    10 1.0098 1.7539 2.2305 1.0098 0.7402 0.9922 2.5498 2.5498 0.7402 1.8096
    11 1.0098 1.7539 2.2305 1.0098 0.7412 0.9922 2.5498 2.5498 0.7412 1.8086
    12 1.0093 1.7539 2.231 1.0093 0.7407 0.9917 2.5498 2.5498 0.7407 1.8091
    13 1.01 1.7537 2.231 1.01 0.741 0.9924 2.5498 2.5498 0.741 1.8088
    End Point 1.0099 1.7539 2.2307 1.0099 0.7408 0.9924 2.5498 2.5498 0.7408 1.809

     | Show Table
    DownLoad: CSV
    Table 4.  Solution for component ˜x2 of Example 1.
    Iteration xL2 xC2 xR2 0,0x2 0,1x2 1,0x2 1,1x2 MAX MIN Width
    1 1 1 1 1 1 1 1 1 1 0
    2 1 2 2.5 1 0.5 1.5 2.5 2.5 0.5 2
    3 1 2.25 2.5 1.5 0.5 1.5 2.75 2.75 0.5 2.25
    4 1.5 2.25 2.5 1.5 0.375 1.625 2.75 2.75 0.375 2.375
    5 1.5 2.25 2.5 1.5 0.375 1.625 2.75 2.75 0.375 2.375
    6 1.5 2.2188 2.5312 1.4688 0.4062 1.625 2.75 2.75 0.4062 2.3438
    7 1.4688 2.2188 2.5156 1.4844 0.4062 1.5938 2.75 2.75 0.4062 2.3438
    8 1.4844 2.2188 2.5234 1.4766 0.3984 1.5938 2.75 2.75 0.3984 2.3516
    9 1.4766 2.2227 2.5234 1.4805 0.3984 1.5938 2.75 2.75 0.3984 2.3516
    10 1.4805 2.2246 2.5234 1.4805 0.3984 1.5879 2.75 2.75 0.3984 2.3516
    11 1.4805 2.2236 2.5234 1.4805 0.3994 1.5898 2.75 2.75 0.3994 2.3506
    12 1.4805 2.2241 2.5234 1.4805 0.3989 1.5898 2.75 2.75 0.3989 2.3511
    13 1.4805 2.2241 2.5237 1.48 0.3989 1.5894 2.75 2.75 0.3989 2.3511
    End Point 1.48 2.224 2.5238 1.48 0.3989 1.5894 2.7501 2.7501 0.3989 2.3512

     | Show Table
    DownLoad: CSV
    Table 5.  Solution for component ˜x1 of Example 1.
    Iteration xL1 xC1 xR1 0,0x1 0,1x1 1,0x1 1,1x1 MAX MIN Width
    1 1 1 1 1 1 1 1 1 1 0
    2 1.5 1.5 2.5 1.5 0.5 1.5 2.5 2.5 0.5 2
    3 1.75 1.75 1.75 2.5 0.5 1.25 1.75 2.5 0.5 2
    4 1.75 1.75 1.75 2.625 0.75 1.125 1.75 2.625 0.75 1.875
    5 1.75 1.8125 1.8125 2.625 0.8125 1 1.75 2.625 0.8125 1.8125
    6 1.75 1.7812 1.8438 2.6562 0.8125 1.0625 1.75 2.6562 0.8125 1.8437
    7 1.75 1.7969 1.8125 2.6719 0.7969 1.0625 1.75 2.6719 0.7969 1.875
    8 1.7578 1.7969 1.8125 2.5859 0.7969 1.0391 1.7578 2.5859 0.7969 1.789
    9 1.7539 1.793 1.8164 2.582 0.7969 1.0391 1.7539 2.582 0.7969 1.7851
    10 1.7539 1.7949 1.8164 2.582 0.7969 1.0391 1.7539 2.582 0.7969 1.7851
    11 1.7539 1.7959 1.8184 2.582 0.7959 1.0361 1.7539 2.582 0.7959 1.7861
    12 1.7539 1.7959 1.8184 2.5815 0.7959 1.0356 1.7539 2.5815 0.7959 1.7856
    13 1.7537 1.7966 1.8181 2.5815 0.7959 1.0359 1.7537 2.5815 0.7959 1.7856
    End Point 1.7539 1.7965 1.818 2.5806 0.7957 1.0359 1.7539 2.5806 0.7957 1.7849

     | Show Table
    DownLoad: CSV
    Table 6.  Solution for component ˜x2 of Example 1.
    Iteration xL2 xC2 xR2 0,0x2 0,1x2 1,0x2 1,1x2 MAX MIN Width
    1 1 1 1 1 1 1 1 1 1 0
    2 2 2 2 1.5 0.5 1.5 2 2 0.5 1.5
    3 2 2 2.25 0.75 0.25 1.5 2.25 2.25 0.25 2
    4 1.875 2 2.25 0.75 0.25 1.5 2.25 2.25 0.25 2
    5 1.875 1.9375 2.25 0.75 0.3125 1.5625 2.25 2.25 0.3125 1.9375
    6 1.875 1.9375 2.2188 0.7188 0.2812 1.5312 2.2188 2.2188 0.2812 1.9376
    7 1.8594 1.9688 2.2188 0.7031 0.2812 1.5312 2.2188 2.2188 0.2812 1.9376
    8 1.8672 1.9688 2.2188 0.8359 0.2812 1.5469 2.2188 2.2188 0.2812 1.9376
    9 1.8633 1.9648 2.2227 0.8438 0.2812 1.5469 2.2227 2.2227 0.2812 1.9415
    10 1.8652 1.9648 2.2246 0.8438 0.2812 1.5469 2.2246 2.2246 0.2812 1.9434
    11 1.8643 1.9629 2.2236 0.8438 0.2803 1.543 2.2236 2.2236 0.2803 1.9433
    12 1.8638 1.9634 2.2241 0.8442 0.2798 1.543 2.2241 2.2241 0.2798 1.9443
    13 1.8638 1.9634 2.2241 0.8442 0.2798 1.543 2.2241 2.2241 0.2798 1.9443
    End Point 1.8638 1.9634 2.224 0.8455 0.2798 1.5427 2.224 2.224 0.2798 1.9442

     | Show Table
    DownLoad: CSV
    Figure 1.  TFN solution of ˜x1 and ˜x2 in Case 1 of Example 1.
    Figure 2.  Uncertain width of TFN solution components ˜x1 and ˜x2 in Case 1 of Example 1.
    Figure 3.  TFN solution of ˜x1 and ˜x2 in Case 2 of Example 1.
    Figure 4.  Uncertain width of TFN solution components ˜x1 and ˜x2 in Case 2 of Example 1.
    Figure 5.  TFN solution of ˜x1 and ˜x2 in Case 3 of Example 1.
    Figure 6.  Uncertain width-wise solution of ˜x1 and ˜x2 in Case 3 of Example 1.

    Case 1. Here, the left-hand side is taken as fuzzy, that is, the coefficient matrix is considered as fuzzy. As such, the following coefficients are assumed for the investigation: ˜a11=[0.4,1,1.4], ˜a12=[0.6,1,1.6], ˜a21=[0.7,1,1.5], ˜a22=[0.5,1,1.7], ˜χ1=5.3 and ˜χ2=6.7. Applying the proposed fuzzy IODS algorithm, iteration-wise the inner and outer solutions are listed in Tables 1 and 2. In Table 1, the first component of the solution set ˜x1 is included. In Table 2, the second component of the solution set ˜x2 is depicted. There are four inner and three outer solutions. It is noticed that the algorithm converges with the given tolerance condition at 13 iterations.

    In Table 1, MIN is calculated as min{xL1,xC1,xR1,0,0x1,0,1x1,1,0x1,1,1x1}, and MAX is evaluated as max{xL1,xC1,xR1,0,0x1,0,1x1,1,0x1,1,1x1}. The width is defined as the difference between MAX and MIN, that is, MAXMIN.

    In Table 2, MIN is calculated as min{xL2,xC2,xR2,0,0x2,0,1x2,1,0x2,1,1x2}, and MAX is evaluated as max{xL2,xC2,xR2,0,0x2,0,1x2,1,0x2,1,1x2}. From Tables 1 and 2, numerically it is observed that the center solution and the width of the solution TFNs converge at 13 iterations subject to the given tolerance value. The obtaned TFN solution vector components of Example 1, Case 1 are shown in Figure 1. Based on the width of the solution iteration wise the solution components are depicted in Figure 2. From Figure 2, graphically it is seen that at 13 iterations the width of solution TFNs converges subject to the tolerance value.

    Case 2. Here, the right-hand side is taken as fuzzy, that is, the right-side vector is considered as fuzzy. As such, the following vectors are assumed for the investigation: ˜aij=[aLij,aNij,aRij] are crisp, (i,j=1,2), ˜χ1=[2.5,5.3,7.5], and ˜χ2=[3.2,6.7,8.6]. Applying the proposed fuzzy IODS algorithm, iteration-wise the inner and outer solutions are listed in Tables 3 and 4. In Table 3, the first component of the solution set ˜x1 is included. In Table 4, the second component of the solution set ˜x2 is depicted. There are four inner and three outer solutions. It is noticed that the algorithm converges with the given tolerance condition at 13 iterations.

    In Table 3, MIN is calculated as min{xL1,xC1,xR1,0,0x1,0,1x1,1,0x1,1,1x1}, and MAX is evaluated as max{xL1,xC1,xR1,0,0x1,0,1x1,1,0x1,1,1x1}. The width is defined as the difference between MAX and MIN, that is, MAXMIN.

    In Table 4, MIN is calculated as min{xL2,xC2,xR2,0,0x2,0,1x2,1,0x2,1,1x2}, and MAX is evaluated as max{xL2,xC2,xR2,0,0x2,0,1x2,1,0x2,1,1x2}. From Tables 3 and 4, numerically it is observed that the center solution and the width of the solution TFNs converge at 13 iterations subject to the given tolerance value. The obtaned TFN solution vector components of Example 1, Case 2 are shown in Figure 3.

    Based on the width of the solution iteration wise the solution components are depicted in Figure 4. From Figure 4, graphically it is seen that at 13 iterations the width of solution TFNs converges subject to the tolerance value.

    Case 3. Here, both the left-hand and right-hand sides are taken as fuzzy, that is, the coefficient matrix and right-side vector are considered fuzzy. As such, the following coefficients matrix and right-side vector are assumed for the investigation: ˜a11=[0.4,1,1.4], ˜a12=[0.6,1,1.6], ˜a21=[0.7,1,1.5], ˜a22=[0.5,1,1.7], ˜χ1=[2.5,5.3,7.5] and ˜χ2=[3.2,6.7,8.6]. Applying the proposed fuzzy IODS algorithm, iteration wise the inner and outer solutions are listed in Tables 5 and 6. In Table 5, the first component of the solution set ˜x1 is included. In Table 6, the second component of the solution set ˜x2 is depicted. There are four inner and three outer solutions. It is noticed that the algorithm converges with the given tolerance condition at 13 iterations.

    In Table 5, MIN is calculated as min{xL1,xC1,xR1,0,0x1,0,1x1,1,0x1,1,1x1}, and MAX is evaluated as max{xL1,xC1,xR1,0,0x1,0,1x1,1,0x1,1,1x1}. The width is defined as the difference between MAX and MIN, that is, MAXMIN.

    In Table 4, MIN is calculated as min{xL2,xC2,xR2,0,0x2,0,1x2,1,0x2,1,1x2}, and MAX is evaluated as max{xL2,xC2,xR2,0,0x2,0,1x2,1,0x2,1,1x2}. From Tables 5 and 6, numerically it is observed that the center solution and the width of the solution TFNs converge at 13 iterations subject to the given tolerance value. The obtaned TFN solution vector components of Example 1, Case 3 are shown in Figure 5.

    Based on the width of the solution iteration-wise, the solution components are depicted in Figure 6. From Figure 6, graphically it is seen that at 13 iterations the width of solution TFNs converges subject to the tolerance value.

    Example 2. Here, we have considered the following example to apply the fuzzy IODS algorithm.

    Consider a fuzzy system of nonlinear equations,

    ˜a11x21+˜a12x22+˜a13x3=˜χ1,
    ˜a21x21+˜a22x2+˜a23x23=˜χ2,
    ˜a31x1+˜a32x22+˜a33x23=˜χ3, (47)

    where ˜a11=[0.5,1,1.5], ˜a12=[0.2,1,1.2], ˜a13=[0.3,1,1.3], ˜a21=[0.4,1,1.6], ˜a22=[0.6,1,1.4], ˜a23=[0.7,1,1.7], ˜a31=[0.8,1,1.4], ˜a32=[0.7,1,1.7], ˜a33=[0.5,1,1.8], ˜χ1=[4,7,11], ˜χ2=[6,9,14] and ˜χ3=[8,12,17].Assume the initial approximation x0=(1,1,1)T, step size Δ=(0.5,0.5,0.5)T, and ϵ=104. Here, the tolerance value is ϵ. It is noted that the iterations are terminated if the step size become less than the tolerance value.

    The first step is to construct the outer system and then convert the Eq (47) into a fuzzy unconstrained minimalization problem. The transformed fuzzy unconstrained minimization problem is formulated as

    F(x)=(˜a11x21+˜a12x22+˜a13x3˜χ1)2+(˜a21x21+˜a22x2+˜a23x23˜χ2)2+(˜a31x1+˜a32x22+˜a33x23˜χ3)2. (48)

    Applying the IODS algorithm, the desired solution is obtained after 13 iterations using MATLAB [40]. The solution vectors after 13 iterations (˜x1,˜x2,˜x3)T are shown in Tables 715 and Figures 712, respectively. The width of the solution TFNs is computed with the help of outer solutions. The width of a TFN is defined as the interval length of the TFN at membership value zero. In the following, the solutions are presented case by case. Case 1 represents the fuzzy system of nonlinear equations where only the coefficient matrix is fuzzy. Case 2 has only the right-side vector fuzzy. In Case 3 both the coefficient matrix and right-side vector are fuzzy. The aim of discussing three cases is to get a complete idea of propagation of fuzzy uncertainties in only fuzzy and fully fuzzy systems of nonlinear equations.

    Table 7.  Solution for component ˜x1 of Example 2.
    Iteration xL1 xC1 xR1 0,0x1 0,1x1 1,0x1 1,1x1 MAX MIN Width
    1 1 1 1 1 1 1 1 1 1 0
    2 1.5 2.5 2.5 2.5 2 1.5 1.5 2.5 1.5 1
    3 0.25 1 2.75 1.75 1.5 1.25 1.25 2.75 0.25 2.5
    4 0.25 0.875 2.875 1.625 1.625 1.25 1.25 2.875 0.25 2.625
    5 0.25 0.875 2.875 1.5625 1.5625 1.1875 1.25 2.875 0.25 2.625
    6 0.2812 0.875 2.9375 1.5625 1.5625 1.1875 1.25 2.9375 0.2812 2.6563
    7 0.2656 0.8906 2.9375 1.5781 1.5781 1.1875 1.2344 2.9375 0.2656 2.6719
    8 0.2969 0.8438 2.9375 1.5703 1.5703 1.1875 1.2344 2.9375 0.2969 2.6406
    9 0.2969 0.8555 2.9375 1.5664 1.5703 1.1836 1.2344 2.9375 0.2969 2.6406
    10 0.3047 0.8594 2.9355 1.5703 1.5703 1.1914 1.2344 2.9355 0.3047 2.6308
    11 0.3057 0.8594 2.9326 1.5703 1.5713 1.1895 1.2354 2.9326 0.3057 2.6269
    12 0.3042 0.8564 2.9331 1.5698 1.5713 1.1899 1.2354 2.9331 0.3042 2.6289
    13 0.3042 0.8564 2.9333 1.5698 1.5713 1.1892 1.2354 2.9333 0.3042 2.6291
    End Point 0.3032 0.8561 2.9333 1.5697 1.5712 1.1903 1.2352 2.9333 0.3032 2.6301

     | Show Table
    DownLoad: CSV
    Table 8.  Solution for component ˜x2 of Example 2.
    Iteration xL2 xC2 xR2 0,0x2 0,1x2 1,0x2 1,1x2 MAX MIN Width
    1 1 1 1 1 1 1 1 1 1 0
    2 1.5 1.5 2.5 2 2 1.5 1.5 2.5 1.5 1
    3 1.75 2 2.75 2.5 2.5 2.25 2 2.75 1.75 1
    4 1.75 2 3.125 2.5 2.5 2.25 2 3.125 1.75 1.375
    5 1.75 2.125 3.125 2.5625 2.5625 2.25 2 3.125 1.75 1.375
    6 1.75 2.125 3.1562 2.5312 2.5312 2.25 2 3.1562 1.75 1.4062
    7 1.75 2.1094 3.1719 2.5312 2.5312 2.25 2 3.1719 1.75 1.4219
    8 1.7266 2.1094 3.1719 2.5391 2.5391 2.25 1.9844 3.1719 1.7266 1.4453
    9 1.7305 2.1094 3.1719 2.5391 2.5352 2.25 1.9844 3.1719 1.7305 1.4414
    10 1.7285 2.1094 3.1738 2.5352 2.5352 2.2559 1.9844 3.1738 1.7285 1.4453
    11 1.7266 2.1094 3.1729 2.5352 2.5352 2.2588 1.9844 3.1729 1.7266 1.4463
    12 1.728 2.1104 3.1719 2.5356 2.5352 2.2588 1.9849 3.1719 1.728 1.4439
    13 1.7275 2.1104 3.1719 2.5359 2.5352 2.259 1.9851 3.1719 1.7275 1.4444
    End Point 1.7278 2.1105 3.1719 2.5358 2.5355 2.2583 1.9852 3.1719 1.7278 1.4441

     | Show Table
    DownLoad: CSV
    Table 9.  Solution for component ˜x3 of Example 2.
    Iteration xL3 xC3 xR3 0,0x3 0,1x3 1,0x3 1,1x3 MAX MIN Width
    1 1 1 1 1 1 1 1 1 1 0
    2 1.5 2 2.5 1.5 2 1.5 1.5 2.5 1.5 1
    3 1.75 2.75 2.75 2 2 2 1.5 2.75 1.5 1.25
    4 1.75 2.375 2.75 2 2 2 1.5 2.75 1.5 1.25
    5 1.75 2.375 2.625 2 2 2 1.5 2.625 1.5 1.125
    6 1.75 2.2812 2.6562 2 2 2.0625 1.5 2.6562 1.5 1.1562
    7 1.75 2.2812 2.6562 2 2 2.0625 1.5781 2.6562 1.5781 1.0781
    8 1.7891 2.2812 2.6484 2 2 2.0625 1.5859 2.6484 1.5859 1.0625
    9 1.7812 2.2812 2.6484 2 2 2.0625 1.5859 2.6484 1.5859 1.0625
    10 1.7812 2.2812 2.6465 2 2 2.0488 1.5859 2.6465 1.5859 1.0606
    11 1.7832 2.2842 2.6465 2 1.998 2.0469 1.5752 2.6465 1.5752 1.0713
    12 1.7832 2.2852 2.646 2 1.998 2.0469 1.5752 2.646 1.5752 1.0708
    13 1.7837 2.2852 2.646 2 1.998 2.0476 1.5752 2.646 1.5752 1.0708
    End Point 1.7837 2.285 2.6461 2.0001 1.998 2.0485 1.5756 2.6461 1.5756 1.0705

     | Show Table
    DownLoad: CSV
    Table 10.  Solution for component ˜x1 of Example 2.
    Iteration xL1 xC1 xR1 0,0x1 0,1x1 1,0x1 1,1x1 MAX MIN Width
    1 1 1 1 1 1 1 1 1 1 0
    2 1.5 2.5 2.5 1.5 2.5 1.5 1.5 2.5 1.5 1
    3 0 0.25 1.25 0.75 1.25 0 0.25 1.25 0 1.25
    4 0.125 0.25 1.375 0.5 0.75 0.375 0.5 1.375 0.125 1.25
    5 0.25 0.25 1.4375 0.375 0.8125 0.4375 0.5625 1.4375 0.25 1.1875
    6 0.2812 0.2812 1.4375 0.3125 0.8438 0.4375 0.5312 1.4375 0.2812 1.1563
    7 0.2656 0.3125 1.3594 0.3125 0.7656 0.4531 0.2031 1.3594 0.2031 1.1563
    8 0.2969 0.3047 1.3828 0.1016 0.7656 0.4453 0.2266 1.3828 0.1016 1.2812
    9 0.2969 0.3281 1.3867 0.1055 0.7656 0.4492 0.2305 1.3867 0.1055 1.2812
    10 0.3047 0.3223 1.3848 0.1035 0.7695 0.4492 0.4883 1.3848 0.1035 1.2813
    11 0.3057 0.3232 1.3848 0.1025 0.7793 0.4531 0.4854 1.3848 0.1025 1.2823
    12 0.3042 0.3223 1.3843 0.1064 0.7798 0.4531 0.4634 1.3843 0.1064 1.2779
    13 0.3042 0.3225 1.3843 0.1064 0.78 0.4529 0.4636 1.3843 0.1064 1.2779
    End Point 0.3032 0.3226 1.3846 0.1064 0.78 0.4526 0.4637 1.3846 0.1064 1.2782

     | Show Table
    DownLoad: CSV
    Table 11.  Solution for component ˜x2 of Example 2.
    Iteration xL2 xC2 xR2 0,0x2 0,1x2 1,0x2 1,1x2 MAX MIN Width
    1 1 1 1 1 1 1 1 1 1 0
    2 1.5 1.5 2.5 1.5 1.5 1.5 1.5 2.5 1.5 1
    3 1.5 2 2.25 2 2 1.5 1.25 2.25 1.25 1
    4 1.5 2 2.375 1.875 2.375 1.25 2.25 2.375 1.25 1.125
    5 1.4375 2.125 2.375 1.9375 2.4375 1.4375 2.25 2.4375 1.4375 1
    6 1.4375 2.125 2.4375 1.9375 2.4375 2.5 2.3125 2.5 1.4375 1.0625
    7 1.4531 2.1094 2.4531 1.9375 2.5156 2.4844 2.4062 2.5156 1.4531 1.0625
    8 1.4453 2.1094 2.4453 2.1406 2.5156 2.4766 2.3984 2.5156 1.4453 1.0703
    9 1.4492 2.1094 2.4453 2.1445 2.5156 2.4766 2.3945 2.5156 1.4492 1.0664
    10 1.4512 2.1094 2.4434 2.1406 2.5098 2.4766 2.4473 2.5098 1.4512 1.0586
    11 1.4512 2.1094 2.4453 2.1406 2.5068 2.4766 2.4502 2.5068 1.4512 1.0556
    12 1.4507 2.1104 2.4453 2.1396 2.5068 2.4766 2.457 2.5068 1.4507 1.0561
    13 1.4507 2.1104 2.4451 2.1396 2.5068 2.4768 2.457 2.5068 1.4507 1.0561
    End Point 1.4507 2.1105 2.4449 2.1396 2.5068 2.4767 2.4572 2.5068 1.4507 1.0561

     | Show Table
    DownLoad: CSV
    Table 12.  Solution for component ˜x3 of Example 2.
    Iteration xL3 xC3 xR3 0,0x3 0,1x3 1,0x3 1,1x3 MAX MIN Width
    1 1 1 1 1 1 1 1 1 1 0
    2 1.5 2 2.5 1.5 2 1.5 1.5 2.5 1.5 1
    3 2.25 2.75 3.25 2.25 3 2.25 2 3.25 2 1.25
    4 2.25 2.75 3.125 2.625 2.875 2.25 2.75 3.125 2.25 0.875
    5 2.25 2.625 3.125 2.5625 2.875 2.125 2.75 3.125 2.125 1
    6 2.25 2.6562 3.0938 2.5625 2.9062 3.0312 2.75 3.0938 2.25 0.8438
    7 2.2344 2.6562 3.1094 2.5625 2.9688 3.0469 2.8438 3.1094 2.2344 0.875
    8 2.2344 2.6484 3.1016 2.7578 2.9688 3.0469 2.8438 3.1016 2.2344 0.8672
    9 2.2266 2.6484 3.1055 2.7617 2.957 3.0469 2.8477 3.1055 2.2266 0.8789
    10 2.2266 2.6465 3.1055 2.7637 2.959 3.0469 2.8926 3.1055 2.2266 0.8789
    11 2.2266 2.6465 3.1045 2.7637 2.9551 3.0508 2.8906 3.1045 2.2266 0.8779
    12 2.2271 2.646 3.1045 2.7642 2.9551 3.0508 2.897 3.1045 2.2271 0.8774
    13 2.2271 2.646 3.1045 2.7642 2.9551 3.0505 2.897 3.1045 2.2271 0.8774
    End Point 2.2272 2.6461 3.1045 2.7642 2.9551 3.0505 2.8969 3.1045 2.2272 0.8773

     | Show Table
    DownLoad: CSV
    Table 13.  Solution for component ˜x1 of Example 2.
    Iteration xL1 xC1 xR1 0,0x1 0,1x1 1,0x1 1,1x1 MAX MIN Width
    1 1 1 1 1 1 1 1 1 1 0
    2 2.5 2.5 2.5 1.5 3.5 1.5 2 3.5 1.5 2
    3 0.25 1.25 2 1.25 2.75 1.5 2 2.75 0.25 2.5
    4 0.25 1.5 2.125 1.125 2.375 1.5 2.125 2.375 0.25 2.125
    5 0.25 1.5 2.0625 1.125 2.3125 1.5 2.125 2.3125 0.25 2.0625
    6 0.2812 1.5 2.0625 1.1562 2.2812 1.5 2.0625 2.2812 0.2812 2
    7 0.2656 1.5 2.0625 1.1406 2.3281 1.5 2.0625 2.3281 0.2656 2.0625
    8 0.2969 1.5 2.0625 1.1406 2.3203 1.5078 2.0625 2.3203 0.2969 2.0234
    9 0.2969 1.5 2.0742 1.1406 2.3242 1.5078 2.0625 2.3242 0.2969 2.0273
    10 0.3047 1.5059 2.0723 1.1406 2.3242 1.5098 2.0625 2.3242 0.3047 2.0195
    11 0.3057 1.5039 2.0781 1.1416 2.3252 1.5078 2.0625 2.3252 0.3057 2.0195
    12 0.3042 1.5049 2.0781 1.1411 2.3237 1.5073 2.0625 2.3237 0.3042 2.0195
    13 0.3042 1.5049 2.0779 1.1411 2.324 1.5081 2.0625 2.324 0.3042 2.0198
    End Point 0.3032 1.5045 2.0776 1.141 2.324 1.5071 2.0625 2.324 0.3032 2.0208

     | Show Table
    DownLoad: CSV
    Table 14.  Solution for component ˜x2 of Example 2.
    Iteration xL2 xC2 xR2 0,0x2 0,1x2 1,0x2 1,1x2 MAX MIN Width
    1 1 1 1 1 1 1 1 1 1 0
    2 1.5 1.5 2.5 1.5 2.5 1.5 1.5 2.5 1.5 1
    3 2 2 2.5 1.25 3.25 2 1.5 3.25 1.25 2
    4 2 2.125 2.5 1.375 3.25 1.625 1.125 3.25 1.125 2.125
    5 2 2.125 2.5 1.375 3.25 1.625 1.0625 3.25 1.0625 2.1875
    6 2 2.125 2.5 1.4062 3.2188 1.625 2.3438 3.2188 1.4062 1.8126
    7 2 2.1094 2.5 1.4219 3.2188 1.625 2.3438 3.2188 1.4219 1.7969
    8 2.0156 2.1094 2.4922 1.4141 3.2188 1.7344 2.3438 3.2188 1.4141 1.8047
    9 2.0156 2.1094 2.4883 1.4219 3.2188 1.7305 2.3438 3.2188 1.4219 1.7969
    10 2.0117 2.1094 2.4941 1.4219 3.2188 1.7363 2.3438 3.2188 1.4219 1.7969
    11 2.0137 2.1094 2.4932 1.4219 3.2188 1.7383 2.3516 3.2188 1.4219 1.7969
    12 2.0132 2.1104 2.4941 1.4248 3.2197 1.7427 2.3516 3.2197 1.4248 1.7949
    13 2.0132 2.1104 2.4941 1.4248 3.2195 1.7424 2.3516 3.2195 1.4248 1.7947
    End Point 2.0129 2.1105 2.494 1.4249 3.2195 1.7455 2.3523 3.2195 1.4249 1.7946

     | Show Table
    DownLoad: CSV
    Table 15.  Solution for component ˜x3 of Example 2.
    Iteration xL3 xC3 xR3 0,0x3 0,1x3 1,0x3 1,1x3 MAX MIN Width
    1 1 1 1 1 1 1 1 1 1 0
    2 1.5 2 2 1.5 1.5 1.5 1.5 2 1.5 0.5
    3 2 2.25 2.75 1 2 1.5 1.5 2.75 1 1.75
    4 2 2 2.75 1 2.125 1.5 0.375 2.75 0.375 2.375
    5 2 2.125 2.625 0.9375 2.1875 1.5 0.3125 2.625 0.3125 2.3125
    6 2 2.125 2.6562 0.9375 2.2188 1.5 0.8438 2.6562 0.8438 1.8124
    7 2 2.125 2.6562 0.9375 2.1875 1.5 0.8438 2.6562 0.8438 1.8124
    8 2 2.1094 2.6484 0.9375 2.1875 1.3984 0.8438 2.6484 0.8438 1.8046
    9 2 2.1094 2.6484 0.9336 2.1875 1.3984 0.8438 2.6484 0.8438 1.8046
    10 1.9941 2.1094 2.6465 0.9336 2.1855 1.3867 0.8438 2.6465 0.8438 1.8027
    11 1.9922 2.1084 2.6465 0.9336 2.1855 1.3877 0.8389 2.6465 0.8389 1.8076
    12 1.9917 2.1084 2.646 0.9316 2.1855 1.3828 0.8389 2.646 0.8389 1.8071
    13 1.9915 2.1086 2.646 0.9316 2.1858 1.3821 0.8389 2.646 0.8389 1.8071
    End Point 1.9918 2.1089 2.6461 0.9316 2.1858 1.3771 0.8384 2.6461 0.8384 1.8077

     | Show Table
    DownLoad: CSV
    Figure 7.  TFN solution of ˜x1,˜x2 and ˜x3 in Case 1 of Example 2.
    Figure 8.  Uncertain width-wise solution of ˜x1, ˜x2 and ˜x3 in Case 1 of Example 2.
    Figure 9.  TFN solution of ˜x1,˜x2 and ˜x3 in Case 2 of Example 2.
    Figure 10.  Uncertain width-wise solution of ˜x1, ˜x2 and ˜x3 Case 2 of Example 2.
    Figure 11.  TFN solution of ˜x1,˜x2 and ˜x3 in Case 3 of Example 2.
    Figure 12.  Uncertain solution of ˜x1, ˜x2 and ˜x3 Case 3 of Example 2.

    Case 1. Here, the left-hand side is taken as fuzzy, that is, the coefficient matrix is considered as fuzzy. As such, the following coefficients are assumed for the investigation:˜a11=[0.5,1,1.5], ˜a12=[0.2,1,1.2], ˜a13=[0.3,1,1.3], ˜a21=[0.4,1,1.6], ˜a22=[0.6,1,1.4], ˜a23=[0.7,1,1.7], ˜a31=[0.8,1,1.4], ˜a32=[0.7,1,1.7], ˜a33=[0.5,1,1.8], ˜χ1=7, ˜χ2=9 and ˜χ3=12. Applying the proposed fuzzy IODS algorithm, iteration-wise the inner and outer solutions are listed in Tables 79. In Table 7, the first component of the solution set ˜x1 is included. In Table 8, the second component of the solution set ˜x2 is depicted. In Table 9, the third component of the solution set ˜x3 is represented. There are four inner and three outer solutions. It is noticed that the algorithm converges with the given tolerance condition at 13 iterations.

    In Table 7, MIN is calculated as min{xL1,xC1,xR1,0,0x1,0,1x1,1,0x1,1,1x1}, and MAX is evaluated as max{xL1,xC1,xR1,0,0x1,0,1x1,1,0x1,1,1x1}. Width is defined as the difference between MAX and MIN, that is, MAXMIN.

    In Table 8, MIN is calculated as min{xL2,xC2,xR2,0,0x2,0,1x2,1,0x2,1,1x2}, and MAX is evaluated as max{xL2,xC2,xR2,0,0x2,0,1x2,1,0x2,1,1x2}. Width is defined as the difference between MAX and MIN, that is, MAXMIN.

    In Table 9, MIN is calculated as min{xL3,xC3,xR3,0,0x3,0,1x3,1,0x3,1,1x3}, and MAX is evaluated as max{xL3,xC3,xR3,0,0x3,0,1x3,1,0x3,1,1x3}. From Tables 79, numerically it is observed that the center solution and the width of the solution TFNs converge at 13 iterations subject to the given tolerance value. The obtaned TFN solution vector components of Example 2, Case 1 are shown in Figure 7.

    Based on the width of the solution iteration-wise the solution components are depicted in Figure 8. From Figure 8, graphically it is seen that at 13 iterations the width of solution TFNs converges subject to the tolerance value.

    Case 2. Here, the right-hand side is taken as fuzzy, that is, the right-side vector is considered as fuzzy. As such, the following vectors are assumed for the investigation: ˜aij=[aLij,aNij,aRij] are crisp, (i,j=1,2,3), ˜χ1=[4,7,11], ˜χ2=[6,9,14] and ˜χ3=[8,12,17]. Applying proposed fuzzy IODS algorithm, iteration-wise the inner and outer solutions are listed in Tables 1012. In Table 10, the first component of the solution set ˜x1 is included. In Table 11, the second component of the solution set ˜x2 is depicted. In Table 12, the third component of the solution set ˜x3 is represented. There are four inner and three outer solutions. It is noticed that the algorithm converges with the given tolerance condition at 13 iterations.

    In Table 10, MIN is calculated as min{xL1,xC1,xR1,0,0x1,0,1x1,1,0x1,1,1x1}, and MAX is evaluated as max{xL1,xC1,xR1,0,0x1,0,1x1,1,0x1,1,1x1}. The width is defined as the difference between MAX and MIN, that is, MAXMIN.

    In Table 11, MIN is calculated as min{xL2,xC2,xR2,0,0x2,0,1x2,1,0x2,1,1x2}, and MAX is evaluated as max{xL2,xC2,xR2,0,0x2,0,1x2,1,0x2,1,1x2}. The width is defined as the difference between MAX and MIN, that is, MAXMIN.

    In Table 12, MIN is calculated as min{xL3,xC3,xR3,0,0x3,0,1x3,1,0x3,1,1x3}, and MAX is evaluated as max{xL3,xC3,xR3,0,0x3,0,1x3,1,0x3,1,1x3}. From Tables 1012, numerically it is observed that the center solution and the width of the solution TFNs converge at 13 iterations subject to the given tolerance value.

    The obtaned TFN solution vector components of Example 2, Case 2 are shown in Figure 9.

    Based on the width of the solution iteration-wise, the solution components are depicted in Figure 10. From Figure 10, graphically it is seen that at 13 iterations the width of solution TFNs converges subject to the tolerance value.

    Case 3. Here, the both left-hand and right-hand sides are taken as fuzzy, that is, the coefficient matrix and right-side vector are considered as fuzzy. As such, the following coefficients matrix and right-side vector are assumed for the investigation: ˜a11=[0.5,1,1.5], ˜a12=[0.2,1,1.2], ˜a13=[0.3,1,1.3], ˜a21=[0.4,1,1.6], ˜a22=[0.6,1,1.4], ˜a23=[0.7,1,1.7], ˜a31=[0.8,1,1.4], ˜a32=[0.7,1,1.7], ˜a33=[0.5,1,1.8], ˜χ1=[4,7,11], ˜χ2=[6,9,14] and ˜χ3=[8,12,17]. Applying the proposed fuzzy IODS algorithm, iteration-wise, the inner and outer solutions are listed in Tables 1315. In Table 13, the first component of the solution set ˜x1 is included. In Table 14, the second component of the solution set ˜x2 is depicted. In Table 15, the third component of the solution set ˜x3 is represented. There are four inner and three outer solutions. It is noticed that the algorithm converges with the given tolerance condition at 13 iterations.

    In Table 13, MIN is calculated as min{xL1,xC1,xR1,0,0x1,0,1x1,1,0x1,1,1x1}, and MAX is evaluated as max{xL1,xC1,xR1,0,0x1,0,1x1,1,0x1,1,1x1}. The width is defined as the difference between MAX and MIN, that is, MAXMIN.

    In Table 14, MIN is calculated as min{xL2,xC2,xR2,0,0x2,0,1x2,1,0x2,1,1x2}, and MAX is evaluated as max{xL2,xC2,xR2,0,0x2,0,1x2,1,0x2,1,1x2}. The width is defined as the difference between MAX and MIN, that is, MAXMIN.

    In Table 15, MIN is calculated as min{xL3,xC3,xR3,0,0x3,0,1x3,1,0x3,1,1x3}, and MAX is evaluated as max{xL3,xC3,xR3,0,0x3,0,1x3,1,0x3,1,1x3}. From Tables 1315, numerically it is observed that the center solution and the width of the solution TFNs converge at 13 iterations subject to the given tolerance value.

    The obtaned TFN solution vector components of Example 2, Case 3 are shown in Figure 11.

    Based on the width of the solution iteration-wise, the solution components are depicted in Figure 12. From Figure 12, graphically it is seen that at 13 iterations the width of solution TFNs converges subject to the tolerance value.

    Example 3. Take a fuzzy system of nonlinear equations

    ˜a11x21+˜a12x2=10.9+0.1α,11.10.1α,
    ˜a21x1+˜a22x22=6.9+0.1α,7.10.1α. (49)

    Assume the initial approximation x(0)=(1,1)T, step size Δ=(0.5,0.5)T and ϵ=103. Here, the tolerance value is ϵ. It is noted that the iterations are terminated if the step size become less than the tolerance value. The first step is to construct the outer system and then convert the Eq (49) into a fuzzy unconstrained minimization problem. The transformed fuzzy unconstrained minimization problem is formulated as

    F(x)=(x21+x2[10.9+0.1α,11.10.1α])2+(x1+x22[6.9+0.1α,7.10.1α])2. (50)

    Applying the IODS algorithm, the desired solution is obtained after 9 iterations using MATLAB [40]. The solution vector after 9 iterations (using tolerance value ϵ) (˜x1,˜x2)T with different α-cuts are shown in Figures 13 and 14. The width of a TFN is defined as the interval length of the TFN at membership value zero. For the comparison of the present method and other existing methods, in Case 2, only the right-side vector is fuzzy. The aim of discussing Case 2 with other methods is to provide a better solution about suitability of different types of fuzzy inputs.

    Figure 13.  TFN solution of ˜x1 for Example 3.
    Figure 14.  TFN solution of ˜x2 for Example 3.

    Here, we have taken the right-side vector as fuzzy. By applying the current algorithm, the TFN solutions of ˜x1=[2.9869,3,3.0136] and ˜x2=[1.9765,2,2.0214] are graphically represented in Figures 13 and 14. Further, to the effectiveness of the proposed algorithm, the obtained TFN solutions are compared with the well-known Vertex Method, Krawczyk Method, Nayak and Chakraverty [41] and Nayak and Pooja [24], and the same is presented in Table 16.

    Table 16.  Comparison of solutions of ˜x1 and ˜x2 of Example 3 with the existing method [24].
    Solution Vertex Method Krawczyk method Nayak and Chakraverty [24] Nayak and Pooja [41] Fuzzy IODS
    ˜x1 [2.9782,3.0217] [2.744592,3.255408] [2.9782,3.0217] [2.9160,3.0137] [2.9882,3.01367]
    ˜x2 [1.9693,2.0302] [1.603804,2.396196] [1.9693,2.0302] [1.8555,2.0215] [1.9765,2.0214]

     | Show Table
    DownLoad: CSV

    Finally, the fuzzy IODS algorithm stands out as an effective and useful method for solving a fuzzy system of nonlinear equations. Its computational capabilities make it an effective tool for dealing with real-world problems where uncertainty and ambiguity exist.

    Next, considering the width of the solutions with respect to the different combinations of input uncertainties, the sensitiveness of the systems can be analyzed. In this case, the input parameters which give high width solution are more sensitive, whereas the input parameters which give less width solution are less sensitive.

    In this work, the IODS optimization approach was extended in fuzzy environment to solve the fuzzy system of nonlinear equations. As such, the fuzzy IODS optimization algorithm was developed. To study the efficacy of the algorithm, convergence analysis was performed. The developed algorithm was demonstrated with three example problems of system of nonlinear equations in fuzzy environment. The system of nonlinear equations was divided into three cases, viz., only fuzzy (only coefficient matrix is fuzzy and only right-side vector is fuzzy) and fully fuzzy system of nonlinear equations. Then, by using MATLAB code, the same was solved through the proposed algorithm, and the fuzzy solutions were reported. For each case, both numerical and graphical convergences were shown. Further, iteration-wise solutions were included. From the current work, the following observations are drawn.

    1) The proposed algorithm is easy to use, and only seven sub-problems are needed to investigate, irrespective of the size of the system.

    2) For a linear system of equations, the proposed method guarantees an optimal solution.

    3) Fuzzy IODS is a derivative free method which reduces the computational complexities and time cost.

    4) The fuzzy IODS as compared to many other methods has effectively handled an uncertain system, and it provides an efficient solution.

    5) Using the proposed fuzzy IODS method, we can solve both only and fully fuzzy systems of equations, which shall be beneficial to handle real-life engineering and science problems.

    There are some shortcomings of the present algorithm: As the number of variables and the complexity of the fuzzy system increase, it may be challenging to handle the algorithm in terms of extensible and computational efficiency. Furthermore, for highly nonlinear system, the present algorithm prematurely converges.

    An overall study of the proposed method suggests the fuzzy IODS algorithm may be extended to handle more complex uncertain systems, higher dimensional environment, eigenvalue problems, systems with constraints, etc. by updating the search approach. Finally, it can be applicable to quantify the uncertainties in many science and engineering problems, such as risk assessment problems, structural engineering problems, fluid mechanics, etc.

    The authors declare they have not used Artificial Intelligence (AI) tools in the creation of this article.

    Authors would like to thank VIT-AP University, Amaravati for providing financial support to this research work.

    The authors declare no conflicts of interest regarding the publication of this paper.


    Acknowledgments



    This research was privately conducted after the expiration of the contract period with the National Institute of Advanced Industrial Science and Technology, Japan. The author appreciates technical support from the National Diet Library (Online Search and Request Service) for retrieving some of the reference papers and Ms. Keiko Muraki's secretarial assistance.

    Conflict of interest



    The author declares that he has no conflict of interest.

    [1] Takahashi T, Tanaka M, Inazawa J, et al. (1994) Human Fas Ligand: gene structure, chromosomal location and species specificity. Int Immunol 6: 1567-1574. https://doi.org/10.1093/intimm/6.10.1567
    [2] Fairley S, Lowy-Gallego E, Perry E, et al. (2020) The international genome sample resource (IGSR) collection of open human genomic variation resources. Nucleic Acids Res 48: D941-D947. https://doi.org/10.1093/nar/gkz836
    [3] Alderson MR, Tough TW, Davis-Smith T, et al. (1995) Fas ligand mediates activation-induced cell death in human T lymphocytes. J Exp Med 181: 71-77. https://doi.org/10.1084/jem.181.1.71
    [4] Nagata S (1999) Fas ligand-induced apoptosis. Annu Rev Genet 33: 29-55. https://doi.org/10.1146/annurev.genet.33.1.29
    [5] Green DR, Ferguson TA (2001) The role of Fas ligand in immune privilege. Nat Rev Mol Cell Biol 2: 917-924. https://doi.org/10.1038/35103104
    [6] Risso V, Lafont E, Le Gallo M (2022) Therapeutic approaches targeting CD95L/CD95 signaling in cancer and autoimmune diseases. Cell Death Dis 13: 248. https://doi.org/10.1038/s41419-022-04688-x
    [7] Herrero R, Kajikawa O, Matute-Bello G, et al. (2011) The biological activity of FasL in human and mouse lungs is determined by the structure of its stalk region. J Clin Invest 121: 1174-1190. https://doi.org/10.1172/JCI43004
    [8] Suda T, Hashimoto H, Tanaka M, et al. (1997) Membrane Fas ligand kills human peripheral blood T lymphocytes, and soluble Fas ligand blocks the killing. J Exp Med 186: 2045-2050. https://doi.org/10.1084/jem.186.12.2045
    [9] Malleter M, Tauzin S, Bessede A, et al. (2013) CD95L cell surface cleavage triggers a prometastatic signaling pathway in triple-negative breast cancer. Cancer Res 73: 6711-6721. https://doi.org/10.1158/0008-5472.CAN-13-1794
    [10] Jeong D, Kim HS, Kim HY, et al. (2021) Soluble Fas ligand drives autoantibody-induced arthritis by binding to DR5/TRAIL-R2. eLife 10: e48840. https://doi.org/10.7554/eLife.48840
    [11] Tiffiney EA, Coombes JL, Legembre P, et al. (2022) Cleaved CD95L perturbs in vitro macrophages responses to Toxoplasma gondii. Microbes Infect 24: 104952. https://doi.org/10.1016/j.micinf.2022.104952
    [12] Liu W, Ramagopal U, Cheng H, et al. (2016) Crystal structure of the complex of human FasL and its decoy receptor DcR3. Structure 24: 2016-2023. https://doi.org/10.1016/j.str.2016.09.009
    [13] Muraki M (2018) Development of expression systems for the production of recombinant human Fas ligand extracellular domain derivatives using Pichia pastoris and preparation of the conjugates by site-specific chemical modifications: A review. AIMS Bioengineer 5: 39-62. https://doi.org/10.3934/bioeng.2018.1.39
    [14] Muraki M (2014) Disulfide-bridged proteins with potential for medical applications: therapeutic relevance, sample preparations and structure-function relationships. Integr Mol Med 1: 38-56. https://doi.org/10.15761/IMM.1000109
    [15] Gasteiger E, Hoogland C, Gattiker A, et al. (2005) Protein identification and analysis tools on ExPASy server. The Proteomics Protocols Handbook.Humana Press 571-607. https://doi.org/10.1385/1-59259-890-0:571
    [16] Schneider P, Bodmer JL, Holler N, et al. (1997) Characterization of Fas (Apo-1, CD95)-Fas ligand interaction. J Biol Chem 272: 18827-18833. https://doi.org/10.1074/jbc.272.30.18827
    [17] Muraki M (2006) Secretory expression of synthetic human Fas ligand extracellular domain gene in Pichia pastoris: influences of tag addition and N-glycosylation site deletion, and development of a purification method. Prot Expr Purif 50: 137-146. https://doi.org/10.1016/j.pep.2006.08.006
    [18] Muraki M (2008) Improved secretion of human Fas ligand extracellular domain by N-terminal part truncation in Pichia pastoris and preparation of the N-linked carbohydrate chain trimmed derivative. Prot Expr Purif 60: 205-213. https://doi.org/10.1016/j.pep.2008.03.027
    [19] Holler N, Tardivel A, Kovacsovics-Bankowski M, et al. (2003) Two adjacent Trimeric Fas ligands are required for Fas signaling and formation of a death-inducing signaling complex. Mol Cell Biol 23: 1428-1440. https://doi.org/10.1128/MCB.23.4.1428-1440.2003
    [20] Shiraishi T, Suzuyama K, Okamoto H, et al. (2004) Increased cytotoxicity of soluble Fas ligand by fusing isoleucine zipper motif. Biochem Biophys Res Commun 322: 197-202. https://doi.org/10.1016/j.bbrc.2004.07.098
    [21] Eisele G, Roth P, Hasenbach K, et al. (2011) APO010, a synthetic hexameric CD95 ligand, induces human glioma cell death in vitro and in vivo. Neuro Oncol 13: 155-164. https://doi.org/10.1093/neuonc/noq176
    [22] Verbrugge I, Wissink EHJ, Rooswinkel RW, et al. (2009) Combining radiotherapy with APO010 in cancer treatment. Clin Cancer Res 15: 2031-2038. https://doi.org/10.1158/1078-0432.CCR-08-2125
    [23] Jandu H, Nielsen A, Brunner N, et al. (2020) Characterization of resistance to a recombinant hexameric Fas-ligand (APO010) in human cancer cell lines. Exp Hematol 87: 33-41. https://doi.org/10.1016/j.exphem.2020.06.005
    [24] Tanaka M, Suda T, Yatomi T, et al. (1997) Lethal effect of recombinant human Fas ligand in mice pretreated with Propionibacterium acnes. J Immunol 158: 2303-2309.
    [25] Orbach A, Rachmilewitz J, Shani N, et al. (2010) CD40-FasL and CTLA-4-FasL fusion proteins induce apoptosis in malignant cell lines by dual signaling. Am J Pathol 177: 3159-3168. https://doi.org/10.2353/ajpath.2010.100301
    [26] Muraki M (2014) Improved production of recombinant human Fas ligand extracellular domain in Pichia pastoris: yield enhancement using disposable culture-bag and its application to site-specific chemical modifications. BMC Biotechnol 14: 19. https://doi.org/10.1186/1472-6750-14-19
    [27] Muraki M (2016) Preparation of a functional fluorescent human Fas ligand extracellular domain derivative using a three-dimensional structure guided site-specific fluorochrome conjugation. SpringerPlus 5: 997. https://doi.org/10.1186/s40064-016-2673-8
    [28] Muraki M, Hirota K (2017) Site-specific chemical conjugation of human Fas ligand extracellular domain using trans-cyclooctene-methyltetrazine reactions. BMC Biotechnol 17: 56. https://doi.org/10.1186/s12896-017-0381-2
    [29] Muraki M, Hirota K (2019) Site-specific biotin-group conjugate of human Fas ligand extracellular domain: preparation and characterization of cell-death-inducing activity. Curr Top Pep Prot Res 20: 17-24.
    [30] Berger RML, Weck JM, Kempe SM, et al. (2021) Nanoscale FasL organization on DNA origami to decipher apoptosis signal activation in cells. Small 17: 2101678. https://doi.org/10.1002/smll.202101678
    [31] Koshkina N, Yang Y, Kleinerman E (2020) The Fas/FasL signaling pathway: its role in the metastasic process and as a target for treating osteosarcoma lung metastases. Adv Exp Med Biol 1258: 177-187. https://doi.org/10.1007/978-3-030-43085-6_12
    [32] Muraki M (2020) Sensitization to cell death induced by soluble Fas ligand and agonistic antibodies with exogenous agents: A review. AIMS Med Sci 7: 122-203. https://doi.org/10.3934/medsci.2020011
    [33] He Y, van Bommel PE, Samplonius DF, et al. (2017) A versatile pretargeting approach for tumor-selective delivery and activation of TNF superfamily members. Sci Rep 7: 13301. https://doi.org/10.1038/s41598-017-13530-w
    [34] Zhao H, Woodward KB, Shirwan H, et al. (2013) Posttransplantation systemic immunomodulation with SA-FasL-engineered donor splenocytes has robust efficacy in preventing cardiac allograft rejection in mice. Transplant Proc 45: 1805-1807. https://doi.org/10.1016/j.transproceed.2013.01.049
    [35] Skoumal M, Woodward KB, Zhao H, et al. (2019) Localized immune tolerance from FasL-functionalized PLG scaffolds. Biomaterials 192: 271-281. https://doi.org/10.1016/j.biomaterials.2018.11.015
    [36] Nair PM, Flores H, Gogineni A, et al. (2015) Enhancing the antitumor efficacy of a cell-surface death ligand by covalent membrane display. Proc Natl Acad Sci U S A 112: 5679-5684. https://doi.org/10.1073/pnas.1418962112
    [37] Gregory-Ksander M, Marshak-Rothstein A (2021) The FasLane to ocular pathology-metalloproteinase cleavage of membrane-bound FasL determines FasL function. J Leukoc Biol 110: 965-977. https://doi.org/10.1002/JLB.3RI1220-834R
    [38] Rogge M, Yin XT, Godfrey L, et al. (2015) Therapeutic use of soluble Fas ligand ameliorates acute and recurrent herpetic stromal keratitis in mice. Invest Ophthalmol Vis Sci 56: 6377-6386. https://doi.org/10.1167/iovs.15-16588
    [39] Muraki M (2022) Soluble Fas ligand, soluble Fas receptor, and decoy receptor 3 as disease biomarkers for clinical applications: A review. AIMS Med Sci 9: 98-267. https://doi.org/10.3934/medsci.2022009
    [40] Benmebarek MR, Karches CH, Cadilha BL, et al. (2019) Killing mechanisms of chimeric antigen receptor (CAR) T cells. Int J Mol Sci 20: 1283. https://doi.org/10.3390/ijms20061283
    [41] Khawar MB, Sun H (2021) CAR-NK cells: from natural basis to design for kill. Front Immunol 12: 707542. https://doi.org/10.3389/fimmu.2021.707542
    [42] Pang Z, Wang Z, Li F, et al. (2022) Current progress of CAR-NK therapy in cancer treatment. Cancers 14: 4318. https://doi.org/10.3390/cancers14174318
    [43] Wallach-Dayan SB, Petukhov D, Ahdut-HaCohen R, et al. (2021) sFasL-the key to a riddle: Immune responses in aging lung and disease. Int J Mol Sci 22: 2177. https://doi.org/10.3390/ijms22042177
  • This article has been cited by:

    1. Sudipta Priyadarshini, Sukanta Nayak, A new hybrid approach to study heat and mass transfer in porous medium influenced by imprecisely defined parameters, 2023, 51, 2214157X, 103619, 10.1016/j.csite.2023.103619
    2. Sudipta Priyadarshini, Sukanta Nayak, Effects of imprecisely defined parameters on heat and mass transfer in a vertical annular porous cylinder, 2023, 149, 07351933, 107097, 10.1016/j.icheatmasstransfer.2023.107097
    3. Paresh Kumar Panigrahi, Sukanta Nayak, 2024, Chapter 12, 978-981-97-6971-1, 259, 10.1007/978-981-97-6972-8_12
    4. Manish Kumar, Kanchan Rajwar, Kusum Deep, Analysis of Marine Predators Algorithm using BIAS toolbox and Generalized Signature Test, 2024, 95, 11100168, 38, 10.1016/j.aej.2024.03.060
  • Reader Comments
  • © 2022 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(2328) PDF downloads(301) Cited by(0)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog