<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Linguistic Logics with Hedges</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author role="corresp">
							<persName><forename type="first">Van-Hung</forename><surname>Le</surname></persName>
							<email>levanhung@humg.edu.vn</email>
							<affiliation key="aff0">
								<orgName type="department">Faculty of Information Technology</orgName>
								<orgName type="institution">Hanoi University of Mining and Geology</orgName>
								<address>
									<country key="VN">Vietnam</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Dinh-Khang</forename><surname>Tran</surname></persName>
							<affiliation key="aff1">
								<orgName type="department">School of Information and Communication Technology</orgName>
								<orgName type="institution">Hanoi University of Science and Technology</orgName>
								<address>
									<country key="VN">Vietnam</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Linguistic Logics with Hedges</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">5E6140FB1CDF8F5E6E6E8EDECB29C980</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T16:55+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Human knowledge is commonly expressed linguistically, i.e., truth of vague sentences is given in linguistic terms, and many hedges are often used simultaneously to state different levels of emphasis. In this paper, we propose an axiomatization of mathematical fuzzy logic with many hedges where each hedge does not have any dual one. Then, we present linguistic logics built based on the proposed axiomatization and the one in a previous work in order to make it easier to represent and reason with linguistically-expressed human knowledge.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Extending logical systems of mathematical fuzzy logic (MFL) with hedges is axiomatized by Hájek <ref type="bibr" target="#b0">[1]</ref>, Vychodil <ref type="bibr" target="#b1">[2]</ref>, Esteva et al. <ref type="bibr" target="#b2">[3]</ref>, and Le et al. <ref type="bibr" target="#b3">[4]</ref>. Hedges are called truth-stressing or truth-depressing if they, respectively, strengthen or weaken the meaning of the applied proposition. Intuitively, on a chain of truth values, the truth function of a truth-depressing (resp., truth-stressing) hedge (connective) is a superdiagonal (resp., subdiagonal) non-decreasing function preserving 0 and 1. In <ref type="bibr" target="#b0">[1]</ref><ref type="bibr" target="#b1">[2]</ref><ref type="bibr" target="#b2">[3]</ref>, logical systems of MFL are extended by a truth-stressing hedge and/or a truth-depressing one. However, in the real world, we often use many hedges, e.g., very, rather, and slightly, simultaneously to express different levels of emphasis. Moreover, human knowledge is commonly expressed linguistically, i.e., truth of vague sentences is given in linguistic terms. Therefore, it is possibly worth extending MFL with many truth-stressing and truth-depressing hedges and using a linguistic truth domain (LTD) in order to make it easier to represent and reason with linguistically-expressed human knowledge.</p><p>In this paper, first, we propose a new axiomatization for MFL with many hedges which is simpler, but more general than the one in <ref type="bibr" target="#b3">[4]</ref> since in this axiomatization, hedges are not required to be pairwise dual. Then, we present linguistic logics built based on the two axiomatizations. The linguistic logics use an LTD having values such as true, very true and very slightly false. Thus, domains and codomains of the hedge functions are the LTD. Since Gödel logic (G) and Lukasiewicz logic ( L) are two of the three basic t-norm based ones (the other is product logic (Π)) which have received increasing attention in the last fifteen years, we also define Gödel and Lukasiewicz operations on an LTD. Therefore, we can have particular linguistic logics based on G or L.</p><p>The remainder of the paper is organized as follows. Section 2 gives an overview of the notions and results of MFL. Section 3 presents LTDs, operations of Galgebras and MV-algebras, and truth functions of hedges. Section 4 proposes an axiomatization for many hedges where each hedge does not have any dual one. Section 5 presents linguistic logics built based on the proposed axiomatization and the one in <ref type="bibr" target="#b3">[4]</ref>. Section 5 concludes the paper and outlines our future work.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Preliminaries on Mathematical Fuzzy Logic</head><p>Let L be a propositional logic in a language L, a set of connectives with finite arity. A truth constant r is a special formula whose truth value under every evaluation is r. Formulae are built from variables and truth constants using connectives in L. Each evaluation e of variables by truth values uniquely extends to an evaluation e(ϕ) of all formulae ϕ using truth functions of connectives. A formula ϕ is called an 1-tautology if e(ϕ) = 1 for all evaluations e. Axioms of the logic are taken from 1-tautology formulae. A theory is a set of formulae. An evaluation e is called a model of a theory T if e(ϕ) = 1, ∀ϕ ∈ T . A proof in T is a sequence ϕ 1 , . . . , ϕ n of formulae whose each member is either an axiom of the logic or a member of T or follows from some preceding members of the sequence using the deduction rule(s) of the logic. A formula ϕ is called provable, denoted T L ϕ, if ϕ is the last member of a proof in T . If T = ∅, ϕ is said to be provable in the logic <ref type="bibr" target="#b4">[5,</ref><ref type="bibr" target="#b5">6]</ref>. L is a Rasiowa-implicative logic if there is a binary connective → satisfying reflexivity, weakening, and the following <ref type="bibr" target="#b5">[6]</ref>:</p><formula xml:id="formula_0">(MP) ϕ, ϕ → ψ L ψ (T) ϕ → ψ, ψ → χ L ϕ → χ (sCng) ϕ → ψ, ψ → ϕ L c(χ 1 , . . . χ i , ϕ, . . . , χ n ) → c(χ 1 , . . . χ i , ψ, . . . , χ n ),</formula><p>for each n-ary c ∈ L and each i &lt; n.</p><p>Every finitary Rasiowa-implicative logic L is algebraizable. Its equivalent algebraic semantics, a class of L-algebras, denoted L, is a quasivariety. The algebraic semantics enjoys the following strong completeness <ref type="bibr" target="#b5">[6]</ref>.</p><p>Theorem 1. For every set Γ ∪ {ϕ} of formulae, Γ L ϕ iff for every A ∈ L and every A-model e of Γ , we have e(ϕ) = 1.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Each L-algebra</head><formula xml:id="formula_1">A is endowed with a relation ≤ (called preorder ) by setting, ∀a, b ∈ A, a ≤ b iff a ⇒ b = 1,</formula><p>where ⇒ is the truth function of →. If ≤ is a total order, A is called an L-chain. L is called a semilinear logic iff it is strongly complete w.r.t. the class of L-chains <ref type="bibr" target="#b5">[6]</ref>. Most logical systems called fuzzy logics are a finitary Rasiowa-implicative semilinear logic. They belong to a large class of systems that are axiomatic expansions of MTL satisfying (sCng) for any new connective <ref type="bibr" target="#b5">[6]</ref>. The systems are called core fuzzy logics. Well-known examples are basic logic (BL), G, L, Π <ref type="bibr" target="#b4">[5]</ref>, SBL, NM, MTL, and SMTL <ref type="bibr" target="#b5">[6]</ref>. Definition 1. <ref type="bibr" target="#b5">[6]</ref> Let L be a core fuzzy logic and K a class of L-chains. L has the (finite) strong K-completeness property, (F)SKC, if for every (finite) set of formulae Γ and every formula ϕ, it holds that Γ L ϕ iff e(ϕ) = 1 for every L-algebra A ∈ K and each A-model e of Γ . L has the K-completeness property, KC, when the equivalence is true for Γ = ∅.</p><p>When K is the class of all chains whose support is the unit interval [0, 1] with the usual ordering, the (F)SKC can be called the (finite) strong standard completeness, (F)SSC. Theorem 2. <ref type="bibr" target="#b5">[6]</ref> Let L be a core fuzzy logic and K a class of L-chains. Then, (i) L has the SKC iff every countable L-chain is embeddable into some member of K, and (ii) if the language of L is finite, L has the FSKC iff every countable L-chain is partially embeddable into some member of K, i.e., for every finite partial of a countable L-chain, there is a one-to-one mapping preserving the operations into some member of K.</p><p>The language of BL <ref type="bibr" target="#b4">[5,</ref><ref type="bibr" target="#b5">6]</ref> consists of the primitive connectives &amp;, → and the truth constant 0. Further definable connectives are as follows:</p><formula xml:id="formula_2">ϕ ∧ ψ ≡ ϕ&amp;(ϕ → ψ), ϕ ∨ ψ ≡ ((ϕ → ψ) → ψ) ∧ ((ψ → ϕ) → ϕ), ϕ ↔ ψ ≡ (ϕ → ψ)&amp;(ψ → ϕ),</formula><p>¬ϕ ≡ ϕ → 0, and 1 ≡ ¬0. Axioms of BL <ref type="bibr" target="#b5">[6]</ref> are the following:</p><formula xml:id="formula_3">(BL1) (ϕ → ψ) → ((ψ → χ) → (ϕ → χ)) (BL4) ϕ&amp;(ϕ → ψ) → ψ&amp;(ψ → ϕ) (BL5a) (ϕ&amp;ψ → χ) → (ϕ → (ψ → χ)) (BL5b) (ϕ → (ψ → χ)) → (ϕ&amp;ψ → χ) (BL6) ((ϕ → ψ) → χ) → (((ψ → ϕ) → χ) → χ) (BL7) 0 → ϕ</formula><p>The only deduction rule of BL is modus ponens (MP).</p><p>The axiom system of G (resp., L) is an extension of that of BL by the axiom: (G) ϕ → ϕ&amp;ϕ (resp., ( L) ¬¬ϕ → ϕ). G proves that ϕ&amp;ψ is ϕ ∧ ψ. The following formulae are provable in MTL, BL, G, and L <ref type="bibr" target="#b5">[6]</ref>:</p><formula xml:id="formula_4">(ϕ → ψ) → (¬ψ → ¬ϕ),<label>(1)</label></formula><formula xml:id="formula_5">(ϕ → ψ) ∨ (ψ → ϕ).<label>(2)</label></formula><p>Let * , ⇒, ∩, ∪, − denote truth functions of connectives &amp;, →, ∧, ∨, ¬, respectively. For BL, G and L, the truth functions ∩ and ∪ are min and max, respectively. A residuated lattice is an algebra A, * , ⇒, ∩, ∪, 0, 1 of type 2, 2, 2, 2, 0, 0 such that: (i) A, ∩, ∪, 0, 1 is a lattice with the largest element 1 and least element 0 (w.r.t. the lattice ordering ≤); (ii) A, * , 1 is a commutative semigroup with the unit element 1, i.e., * is commutative, associative, 1 * x = x for all x; (iii) ⇒ is the residuum of * , i.e., for each x, y, z ∈ A holds: x * y ≤ z iff x ≤ y ⇒ z.</p><p>A residuated lattice A, * , ⇒, ∩, ∪, 0, 1 is a BL-algebra iff the following identities hold for all x, y ∈ A: (i) Prelinear : (x ⇒ y) ∪ (y ⇒ x) = 1; and (ii) Divisible: x ∩ y = x * (x ⇒ y). BL-algebras satisfying x * x = x are called Galgebras, while BL-algebras satisfying − − x = x are called MV-algebras. The class of BL-algebras, G-algebras, and MV-algebras are the equivalent algebraic semantics of BL, G, and L, respectively.</p><p>3 Linguistic Truth Domains and Operations</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1">Linguistic Truth Domains</head><p>Let V, H, R, S, T, and F stand for Very, Highly, Rather, Slightly, True, and False, respectively. In hedge algebra (HA) theory <ref type="bibr" target="#b6">[7,</ref><ref type="bibr" target="#b7">8]</ref>, values of the linguistic variable Truth, e.g., VT and VSF, can be regarded as being generated from a set of primary terms G = {F, T } using hedges from a set H = {V, S, . . . } as unary operations. There exists a natural ordering among them, e.g., ST &lt; T. Thus, a term domain of Truth is a partially ordered set (poset) and can be characterised by an HA X = (X , G, H, ≤), where X is a term set, G is a set of primary terms, H is a set of hedges, and ≤ is a semantic order relation (SOR) on X .</p><p>There are natural semantic properties of hedges and terms. Hedges either increase or decrease the meaning of terms, i.e., ∀h ∈ H, ∀x ∈ X , either hx ≥ x or hx ≤ x. It is denoted by h ≥ k if a hedge h modifies terms more than or equal to another hedge k, i.e., ∀x ∈ X , hx ≤ kx ≤ x or x ≤ kx ≤ hx. Since H and X are disjoint, the same notation ≤ can be used for different order relations on H and X without confusion. A hedge has a semantic effect on others. If h strengthens the degree of modification of k, i.e., ∀x ∈ X , hkx ≤ kx ≤ x or x ≤ kx ≤ hkx, then h is positive w.r.t. k. If h weakens the degree of modification of k, i.e., ∀x ∈ X , kx ≤ hkx ≤ x or x ≤ hkx ≤ kx, then h is negative w.r.t. k. An important semantic property of hedges, called semantic heredity, is that hedges change the meaning of a term, but somewhat preserve its original meaning. Thus, if hx ≤ kx, where x ∈ X , then H(hx) ≤ H(kx), where H(u) denotes the set of all terms generated from u by means of hedges, i.e., H(u) = {σu|σ ∈ H * }, where H * is the set of all strings of symbols in H including the empty one.</p><p>For Truth, the primary terms F ≤ T are denoted by c − and c + , respectively. H can be divided into two disjoint subsets H + and H − by</p><formula xml:id="formula_6">H + = {h|hc + &gt; c + } = {h|hc − &lt; c − } and H − = {h|hc + &lt; c + } = {h|hc − &gt; c − }. For example, H = {V, H, R, S} is decomposed into H + = {V, H} and H − = {R, S}.</formula><p>Hedges in each of H + and H − may be comparable. So, H + and H − become posets. Let I / ∈ H be an artificial hedge, called the identity, defined by ∀x ∈ X , Ix = x. I is the least element in each of H + ∪ {I} and H − ∪ {I}. An HA is said to be linear if both H + and H − are linearly ordered. The term domain X of a linear HA is also linearly ordered. In this paper, we restrict ourselves to linear HAs.</p><p>Example 1. The HA X = (X , {c − , c + }, H = {V, H, R, S}, ≤) is a linear HA since in H + , we have H &lt; V , and in H − , we have R &lt; S.</p><p>A linguistic truth domain (LTD) X taken from a linear HA X = (X , {c − , c + }, H, ≤ ) is the linearly ordered set X = X ∪{0, W, 1}, where 0 (AbsolutelyFalse), W (the middle truth value), and 1 (AbsolutelyTrue) are the least, neutral and greatest elements of X, respectively <ref type="bibr" target="#b8">[9]</ref>, and ∀x ∈ {0, W, 1} and ∀h ∈ H, hx = x.</p><p>An extended order relation ≤ e on H ∪ {I} is defined as follows <ref type="bibr" target="#b8">[9]</ref>:</p><formula xml:id="formula_7">∀h, k ∈ H ∪ {I}, h ≤ e k if: (i) h ∈ H − , k ∈ H + ; or (ii) h, k ∈ H + ∪ {I} and h ≤ k; or (iii) h, k ∈ H − ∪ {I} and h ≥ k. It is denoted by h &lt; e k if h ≤ e k and h = k.</formula><p>For the HA in Example 1, we have S &lt; e R &lt; e I &lt; e H &lt; e V .</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2">Gödel Operations</head><p>Gödel t-norm, its residuum, and negation can be defined on an LTD X as:</p><formula xml:id="formula_8">x * y = min(x, y), x ⇒ y = 1 if y ≥ x y otherwise , −x = 1 if x = 0 0 otherwise .</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.3">Lukasiewicz Operations</head><p>To have well-defined operations, we consider only finitely many truth values. An l-limit HA, where l is a positive integer, is a linear HA in which all terms have a length of at most l + 1. An LTD taken from an l -limit HA is finite <ref type="bibr" target="#b8">[9]</ref>. Lukasiewicz t-norm and its residuum can be defined on an LTD</p><formula xml:id="formula_9">X = {v 0 , . . . , v n } with v 0 ≤ v 1 ≤ • • • ≤ v n as follows: v i * v j = v i+j−n if i + j − n &gt; 0 v 0 otherwise , v i ⇒ v j = v n if i ≤ j v n+j−i otherwise .</formula><p>The negation is defined by: given x = σc, where σ ∈ H * and c ∈ {c + , c − }, we have y = −x, if y = σc and {c, c } = {c + , c − }, e.g.,</p><formula xml:id="formula_10">V c + = −V c − , V c − = −V c + .</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.4">Truth Functions of Hedge Connectives</head><p>Definition 2.</p><p>[10] Let X = (X , {c + , c − }, H, ≤) be a linear HA. Truth functions h • : X → X of all hedges h ∈ H ∪ {I} satisfy the following conditions:</p><formula xml:id="formula_11">for all x ∈ {0, W, 1}, h • (x) = x<label>(3)</label></formula><p>for all x ∈ X, I • (x) = x (4)</p><formula xml:id="formula_12">h • (hc + ) = c + (5) if x ≥ y, h • (x) ≥ h • (y) (6) for all k ∈ H ∪ {I} such that h ≤ e k, h • (x) ≥ k • (x)<label>(7)</label></formula><p>By <ref type="bibr" target="#b6">(7)</ref>, given the hedges in Example 1, we have ∀x ∈ X, V</p><formula xml:id="formula_13">• (x) ≤ H • (x) ≤ x ≤ R • (x) ≤ S • (x)</formula><p>. This is in accordance with fuzzy-set-based interpretations of hedges <ref type="bibr" target="#b10">[11]</ref>, which satisfy the semantic entailment <ref type="bibr" target="#b11">[12]</ref>:</p><formula xml:id="formula_14">x is veryA ⇒ x is highlyA ⇒ x is A ⇒ x is rather A ⇒ x is slightlyA,</formula><p>where A is a fuzzy predicate. Truth functions of hedges always exist <ref type="bibr" target="#b8">[9]</ref>.</p><p>Example 2. Consider a 2-limit HA X = (X , {c + , c − }, {V, H, R, S}, ≤). Table <ref type="table">1</ref> gives an example of truth functions of hedges, where the value of a truth function, in the first row, of a value x, in the first column, is in the corresponding cell, e.g.,</p><formula xml:id="formula_15">V • (V Rc + ) = V Sc + .</formula><p>Truth values in the first column are in ascending order.</p><p>Table <ref type="table">1</ref>. Truth functions of hedge connectives</p><formula xml:id="formula_16">V • H • R • S • 0 0 0 0 0 kV c − V V c − V V c − kHc − c − a kHc − V V c − kV c − c − kRc − a c − V c − Hc − Rc − Sc − V Rc − V Hc − RHc − SSc − V Sc − HRc − HHc − SHc − RSc − V Sc − Rc − Hc − c − Sc − V Sc − RRc − RHc − V Rc − HSc − V Sc − SRc − SHc − V Rc − V Sc − V Sc − SSc − SHc − V Rc − V Sc − V Sc − RSc − SHc − HRc − V Sc − V Sc − Sc − c − Rc − V Sc − V Sc − HSc − V Rc − RRc − V Sc − V Sc − V Sc − RRc − SRc − V Sc − V Sc − W W W W W V Sc + V Sc + V Sc + SRc + RRc + HSc + V Sc + V Sc + RRc + V Rc + Sc + V Sc + V Sc + Rc + c + RSc + V Sc + V Sc + HRc + SHc + SSc + V Sc + V Sc + V Rc + SHc + SRc + V Sc + V Sc + V Rc + SHc + RRc + V Sc + HSc + V Rc + RHc + Rc + V Sc + Sc + c + Hc + HRc + V Sc + RSc + SHc + HHc + V Rc + V Sc + SSc + RHc + V Hc + c + Sc + Rc + Hc + V c + kHc + kRc + c + kV c + V V c + a kV c + c + kHc + V V c + V V c + a 1 1 1 1 1</formula><p>a k is any of the hedges, including the identity I.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">An Axiomatization for Many Hedges</head><p>A hedge may modify truth more than another <ref type="bibr" target="#b10">[11,</ref><ref type="bibr" target="#b6">7,</ref><ref type="bibr" target="#b7">8]</ref>. For example, S (resp., V ) modify truth more than R (resp., H ) since ST &lt; RT &lt; T (resp., T &lt; HT &lt; VT ). To ease the presentation, let s 0 , d 0 denote the identity connective, i.e., for all ϕ, ϕ ≡ s 0 ϕ ≡ d 0 ϕ, and their truth functions s • 0 and d • 0 are the identity. Definition 3. Let L be a core fuzzy logic. A logic L p,q s,d , where p, q are positive integers, is an expansion of L with new unary connectives s 1 , ..., s p (for truthstressers) and d 1 , ..., d q (for truth-depressers) by the following additional axioms, for i = 1, ..., p and j = 1, ..., q:</p><formula xml:id="formula_17">(S i ) s i ϕ → s i−1 ϕ (S p+1 ) s p 1 (D j ) d j−1 ϕ → d j ϕ (D q+1 ) ¬d q 0</formula><p>and the following additional deduction rule:</p><formula xml:id="formula_18">(DR h ) from (ϕ → ψ) ∨ χ infer (hϕ → hψ) ∨ χ, for each h ∈ {s 1 , ..., s p , d 1 , ..., d q }.</formula><p>Axiom (S i ) (resp., axiom (D j )) expresses that s i (resp., d j ) modifies truth more than s i−1 (resp., d j−1 ), for i = 2, ..., p (resp., j = 2, ..., q). Lemma 1. The following deductions are valid, for i = 1, ..., p and j = 1, ..., q:</p><formula xml:id="formula_19">L p,q s,d s i ϕ → ϕ (8) L p,q s,d ϕ → d j ϕ<label>(9)</label></formula><p>L p,q s,d ¬s i 0 (10)</p><formula xml:id="formula_20">L p,q s,d s i 1 (11) L p,q s,d d j 1<label>(12)</label></formula><p>L p,q s,d ¬d j 0 (13)</p><formula xml:id="formula_21">ϕ → ψ L p,q s,d s i ϕ → s i ψ (14) ψ L p,q s,d s i ψ (15) ϕ → ψ L p,q s,d d j ϕ → d j ψ (16) d j ϕ, ϕ → ψ L p,q s,d d j ψ<label>(17)</label></formula><formula xml:id="formula_22">s i ϕ, ϕ → ψ L p,q s,d s i ψ<label>(18)</label></formula><formula xml:id="formula_23">s i ϕ, s i (ϕ → ψ) L p,q s,d s i ψ<label>(19)</label></formula><p>Proof. (8) follows from (S i ),...,(S 1 ), and (T). ( <ref type="formula" target="#formula_19">9</ref>) follows from (D 1 ),...,(D j ), and (T). ( <ref type="formula">10</ref>) follows immediately from ( <ref type="formula">8</ref>) taking ϕ = 0. (11) L p,q s,d s p ϕ → s i ϕ (for i &lt; p, by (S p ), ..., (S i+1 ) and (T)),</p><p>L p,q s,d s p 1 → s i 1 (by taking ϕ = 1), L p,q s,d s i 1 (by (S p+1 ) and (MP)). ( <ref type="formula" target="#formula_20">12</ref>) follows immediately from ( <ref type="formula" target="#formula_19">9</ref>) taking ϕ = 1. (13) L p,q s,d d j ϕ → d q ϕ (for j &lt; q, by (D j+1 ), ..., (D q ), and (T)),</p><p>L p,q s,d ¬d q ϕ → ¬d j ϕ (by ( <ref type="formula" target="#formula_4">1</ref>) and (MP)),</p><p>L p,q s,d ¬d q 0 → ¬d j 0 (by taking ϕ = 0), L p,q s,d ¬d j 0 (by (D q+1 ) and (MP)). ( <ref type="formula">14</ref>) follows directly from Rule (DR h ) taking χ = 0, h = s i . (15) follows from (14) taking ϕ = 1 and using <ref type="bibr" target="#b10">(11)</ref>. ( <ref type="formula">16</ref>) follows directly from Rule (DR h ) taking χ = 0, h = d j . (17) follows immediately from ( <ref type="formula">16</ref>) and (MP). (18) follows immediately from ( <ref type="formula">14</ref>) and (MP). (19) follows from ( <ref type="formula">8</ref>), (MP) and (18). Properties ( <ref type="formula">10</ref>)-(13) imply that truth functions of s i and d j preserve 0 and 1. Property (15) is the necessitation deduction rule of Hájek's and Vychodil's axiomatizations <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b1">2]</ref>. Properties (17) and ( <ref type="formula" target="#formula_22">18</ref>) are a stronger version of modus ponens: if ϕ implies ψ, then very (resp., slightly) ϕ implies very (resp., slightly) ψ. Property ( <ref type="formula" target="#formula_23">19</ref>) is a deduction version of the K-like axiom used in the previous axiomatizations of logics with hedges <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b1">2]</ref>. Since ( <ref type="formula">14</ref>) and ( <ref type="formula">16</ref>) express that Property (sCng) is satisfied for s i and d j , L p,q s,d is a finitary Rasiowa-implicative logic, and its equivalent algebraic semantics is the class of L p,q s,d -algebras.</p><formula xml:id="formula_24">Definition 4. An algebra A= A, * , ⇒, ∩, ∪, 0, 1, s • 1 , ..., s • p , d • 1 , ..., d • q of type 2, 2, 2, 2, 0, 0, 1, ..., 1 is an L p,q</formula><p>s,d -algebra if it is an L-algebra expanded by unary operators s • i , d • j : A → A that satisfy, for all x, y, z ∈ A, i = 1, p and j = 1, q,</p><formula xml:id="formula_25">s • i (x) ≤ s • i−1 (x) (20) s • p (1) = 1 (21) d • j (x) ≥ d • j−1 (x) (22) d • q (0) = 0 (23) if (x ⇒ y) ∪ z = 1 then (s • i (x) ⇒ s • i (y)) ∪ z = 1 (24) if (x ⇒ y) ∪ z = 1 then (d • j (x) ⇒ d • j (y)) ∪ z = 1 (<label>25</label></formula><formula xml:id="formula_26">)</formula><p>where s • i and d • j are truth functions of connectives s i and d j , for all i = 1, ..., p and j = 1, ..., q, respectively. By (20), s • i (x) ≤ x, i.e., s • i is subdiagonal, for all i = 1, p. By (22), d • j is superdiagonal, for all j = 1, q. In a chain of truth values, the quasiequations (24) and ( <ref type="formula" target="#formula_25">25</ref>) turn out to be equivalently expressed by: if</p><formula xml:id="formula_27">x ⇒ y = 1, then s • i (x) ⇒ s • i (y) = 1 and d • j (x) ⇒ d • j (y) = 1, respectively, i.e., s • i and d • j are non-decreasing. If A, * , ⇒, ∩, ∪, 0, 1 is an L-chain, and s • i and d • j satisfy (20)-(25), the ex- panded structure A, * , ⇒, ∩, ∪, 0, 1, s • 1 , ..., s • p , d • 1 , ..., d •</formula><p>q is an L p,q s,d -chain. Theorem 3. Let L be a core fuzzy logic, K a class of L-chains, and K p,q s,d the class of the L p,q s,d -chains whose s 1 , ..., s p , d 1 , ..., d q -free reducts are in K. Then: (i) L p,q s,d is a conservative expansion of L; (ii) L p,q s,d is strongly complete w.r.t. the class of all L p,q s,d -chains, i.e., L p,q s,d is semilinear; (iii) L has the FSSC, FSKC, SSC, and SKC iff L p,q s,d has the FSSC, FSKC, SSC, and SKC, respectively. Proof. (i) Let L be the language of L. We show that, for every set</p><formula xml:id="formula_28">Γ ∪ {ϕ} of L-formulae, Γ L p,q s,d ϕ iff Γ L ϕ. Obviously, if Γ L ϕ then Γ L p,q s,d ϕ. If Γ L ϕ,</formula><p>there is an L-chain A and an A-evaluation e such that e is A-model of Γ and e(ϕ) = 1. A can be expanded to an L p,q s,d -chain A' by defining s i (1) = 1; ∀a ∈ A \ {1}, s i (a) = 0; d j (0) = 0; and ∀a ∈ A \ {0}, d j (a) = 1, for all i = 1, p and j = 1, q. Thus, in the expanded language, we have Γ L p,q s,d ϕ. (ii) Since ∨ remains a disjunction in L p,q s,d and ( <ref type="formula" target="#formula_5">2</ref>) is valid in L, L p,q s,d is semilinear. (iii) We prove for the case of the SSC, and the others can be done analogously. Since L p,q s,d is a conservative expansion of L, if L p,q s,d has the SSC, so does L. Assume that L has the SSC. We show that any countable L p,q s,d -chain A can be embedded into a standard L p,q s,d -chain. By Theorem 2, the s 1 , ..., s p , d 1 , ..., d q -free reduct of A can be embedded into a standard L-chain B = [0, 1], * , ⇒, ∩, ∪, 0, 1 by a mapping f . Since A is countable, for each 1 ≤ k ≤ p, we may arrange all points</p><formula xml:id="formula_29">{ f (x), f (s k (x)) |x ∈ A} into a sequence { f (x i ), f (s k (x i )) |x i ∈ A, i = 1, 2, . . . }, where 0 = x 1 &lt; x 2 &lt; . . . and lim i→∞ x i = 1. Let s k : [0, 1] → [0, 1] be the piecewise linear function connecting neighboured points from { f (x i ), f (s k (x i )) }.</formula><p>Similarly, for each 1 ≤ l ≤ q, let d l be the piecewise linear function connecting neighboured points from { f (x i ), f (d l (x i )) }. It can be shown that all s k and d l satisfy (20)-(25). Hence, B expanded by all s k and d l is a standard L p,q s,d -chain into which A is embedded.</p><p>5 Linguistic Logics with Hedges</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.1">Linguistic Logic with Many Hedges</head><p>Let L be a core fuzzy logic. Given a linear HA, we can build a linguistic logic with many hedges based on L and the HA. For instance, given the HA in Example 1, X = (X , {c − , c + }, H = {V, H, R, S}, ≤), a linguistic logic, denoted L lh , is an expansion of L with new unary connectives V, H, R, S by the following axioms:</p><formula xml:id="formula_30">(S lh 1 ) Hϕ → ϕ (D lh 1 ) ϕ → Rϕ (S lh 2 ) V ϕ → Hϕ (D lh 2 ) Rϕ → Sϕ (S lh 3 ) V 1 (D lh 3 ) ¬S0</formula><p>and the following additional deduction rule:</p><formula xml:id="formula_31">(DR lh ) from (ϕ → ψ) ∨ χ infer (hϕ → hψ) ∨ χ, for each h ∈ {V, H, R, S}.</formula><p>The equivalent algebraic semantics of L lh is the class of L lh -algebras, denoted L lh . L lh -algebras utilize a linear linguistic domain X taken from the HA. An L lh -algebra is an L-algebra expanded by unary non-decreasing operators</p><formula xml:id="formula_32">V • , H • , R • , S • : X → X satisfying, for all x ∈ X, H • (x) ≤ x, R • (x) ≥ x, V • (x) ≤ H • (x), S • (x) ≥ R • (x), V • (1) = 1, S • (0) = 0.</formula><p>Theorem 4 (Strong Completeness). For every set Γ ∪ {ϕ} of formulae, Γ L lh ϕ iff for every A ∈ L lh and every A-model e of Γ , e(ϕ) = 1.</p><p>In particular, given the Gödel and Lukasiewicz operations respectively defined in Subsections 3.2 and 3.3 and truth functions of hedges in Example 2, we can have linguistic logics based on G or L with the well-defined operators.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.2">Mathematical Fuzzy logic with Many Dual Hedges</head><p>It can be observed that each hedge can have a dual one, e.g., slightly and rather can be seen as a dual hedge of very and highly, respectively. Thus, there might be axioms expressing dual relations of hedges in addition to axioms expressing their comparative truth modification strength. Definition 5. <ref type="bibr" target="#b3">[4]</ref> Let L be a core fuzzy logic. A logic L 2n s,d , where n is a positive integer, is an expansion of L with new unary connectives s 1 , ..., s n (for truthstressers) and d 1 , ..., d n (for truth-depressers) by the following additional axioms, for i = 1, ..., n:</p><formula xml:id="formula_33">(S dh i ) s i ϕ → s i−1 ϕ (S dh n+1 ) s n 1 (D dh i ) d i−1 ϕ → d i ϕ (SD dh i ) d i ϕ → ¬s i ¬ϕ</formula><p>and the following additional deduction rule:</p><formula xml:id="formula_34">(DR dh ) from (ϕ → ψ) ∨ χ infer (hϕ → hψ) ∨ χ, for h ∈ {s 1 , ..., s n , d 1 , ..., d n }.</formula><p>The logic L 2n s,d is L expanded by 2n hedges, where hedges are divided into pairs of dual ones. Axiom (SD i ) expresses the dual relation between hedges s i and d i and coincides with Axiom (ST2) in Vychodil's axiomatization. For the case of very, slightly, and ϕ = young, it means "slightly young implies not very old ".</p><p>L 2n s,d is also a finitary Rasiowa-implicative logic, and its equivalent algebraic semantics is the class of L 2n s,d -algebras.  s,d has the the FSSC, FSKC, SSC, and SKC, respectively. It can be seen that in a case when there is one truth-stressing (resp., truthdepressing) hedge without a dual one, we just add the axioms expressing its relations to the existing truth-stressing (resp., truth-depressing) hedges according to their comparative truth modification strength.</p><formula xml:id="formula_35">• i (x) ≤ s • i−1 (x), d • i (x) ≥ d • i−1 (x), s • n (1) = 1, d • i (x) ≤ −s • i (−x), if (x ⇒ y) ∪ z = 1 then (s • i (x) ⇒ s • i (y)) ∪ z = 1, if (x ⇒ y) ∪ z = 1 then (d • i (x) ⇒ d • i (y)) ∪ z =</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.3">Linguistic Logic with Many Dual Hedges</head><p>Let L be a core fuzzy logic. Given a linear HA, we can build a linguistic logic with many dual hedges based on L. For example, given the HA in Example 1, X = (X , {c − , c + }, H = {V, H, R, S}, ≤), a linguistic logic, denoted L ldh , is an expansion of L with new unary connectives V, H, R, S by the following axioms: The equivalent algebraic semantics of L ldh is the class of L ldh -algebras, denoted L ldh . L ldh -algebras utilize a linear linguistic domain X taken from the HA. An L ldh -algebra is an L-algebra expanded by unary non-decreasing operators V • , H • , R • , S • : X → X satisfying, for all x ∈ X,</p><formula xml:id="formula_36">H • (x) ≤ x, S • (x) ≥ R • (x), V • (x) ≤ H • (x), S • (x) ≤ −V • (−x), V • (1) = 1, R • (x) ≤ −H • (−x). R • (x) ≥ x,</formula><p>Taking into account that ∀x ∈ X, R • (x) = −H • (−x), S • (x) = −V • (−x), we can see that truth functions of hedges in Example 2 satisfy the above conditions. Theorem 6 (Strong Completeness). For every set Γ ∪ {ϕ} of formulae, Γ L ldh ϕ iff for every A ∈ L ldh and every A-model e of Γ , e(ϕ) = 1.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6">Acknowledgments</head><p>This research is funded by Vietnam National Foundation for Science and Technology Development (NAFOSTED) under grant number 102.04-2013.21.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="7">Conclusion and Future Work</head><p>This paper proposes an axiomatization for mathematical fuzzy logic with many hedges, where each hedge does not have any dual one. Then, based on the proposed axiomatization and the one in a previous work, it proposes linguistic logics for representing and reasoning with linguistically-expressed human knowledge, where truth of vague sentences is given in linguistic terms, and many hedges are often used simultaneously to express different levels of emphasis. For future work, we will study first-order fuzzy logics with hedges.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>(S ldh 1 )</head><label>1</label><figDesc>Hϕ → ϕ (D ldh 2 ) Rϕ → Sϕ (S ldh 2 ) V ϕ → Hϕ (SD ldh 1 ) Rϕ → ¬H¬ϕ (S ldh 3 ) V 1 (SD ldh 2 ) Sϕ → ¬V ¬ϕ (D ldh 1 ) ϕ → Rϕand the following additional deduction rule:(DR ldh ) from (ϕ → ψ) ∨ χ infer (hϕ → hψ) ∨ χ, for each h ∈ {V, H, R, S}.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head></head><label></label><figDesc>Definition 6.<ref type="bibr" target="#b3">[4]</ref> An algebra A= A, * , ⇒, ∩, ∪, 0, 1, s • 1 , ..., s • n , d • 1 , ..., d • n of type 2, 2, 2, 2, 0, 0, 1, ..., 1 is an L 2n s,d -algebra if it is an L-algebra expanded by unary operators s • i , d • i : A → A that satisfy, for all x, y, z ∈ A and i = 1, ..., n, s</figDesc><table /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head></head><label></label><figDesc>1. where s • i and d • i are truth functions of connectives s i and d i , respectively. Theorem 5. [4] Let L be a core fuzzy logic, K a class of L-chains, and K 2n s,d the class of the L 2n s,d -chains whose s 1 , ..., s n , d 1 , ..., d n -free reducts are in K.</figDesc><table><row><cell>Then:</cell></row><row><cell>(i) L 2n s,d is a conservative expansion of L; (ii) L 2n s,d is strongly complete w.r.t. the</cell></row><row><cell>class of all L 2n s,d -chains, i.e., L 2n s,d is semilinear; (iii) L has the FSSC, FSKC,</cell></row><row><cell>SSC, and SKC iff L 2n</cell></row></table></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">On very true</title>
		<author>
			<persName><forename type="first">P</forename><surname>Hájek</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Fuzzy Sets and Syst</title>
		<imprint>
			<biblScope unit="volume">124</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="329" to="333" />
			<date type="published" when="2001">2001</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Truth-depressing hedges and bl-logic</title>
		<author>
			<persName><forename type="first">V</forename><surname>Vychodil</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Fuzzy Sets and Syst</title>
		<imprint>
			<biblScope unit="volume">157</biblScope>
			<biblScope unit="issue">15</biblScope>
			<biblScope unit="page" from="2074" to="2090" />
			<date type="published" when="2006">2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">A logical approach to fuzzy truth hedges</title>
		<author>
			<persName><forename type="first">F</forename><surname>Esteva</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Godo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Noguera</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Inf. Sci</title>
		<imprint>
			<biblScope unit="volume">232</biblScope>
			<biblScope unit="page" from="366" to="385" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Mathematical fuzzy logic with many dual hedges</title>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">H</forename><surname>Le</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">K</forename><surname>Tran</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of SoICT &apos;14</title>
				<meeting>SoICT &apos;14<address><addrLine>Hanoi, Vietnam</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2014">2014</date>
			<biblScope unit="page" from="7" to="13" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<monogr>
		<title level="m" type="main">Metamathematics of Fuzzy Logic</title>
		<author>
			<persName><forename type="first">P</forename><surname>Hájek</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1998">1998</date>
			<publisher>Dordrecht, Kluwer</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Handbook of Mathematical Fuzzy Logic, ser</title>
	</analytic>
	<monogr>
		<title level="j">Studies in Logic, Mathematical Logic and Foundations</title>
		<editor>P. Cintula, P. Hájek, and C. Noguera</editor>
		<imprint>
			<date type="published" when="2011">2011</date>
			<publisher>Coll. Publ</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Hedge algebras: An algebraic approach to structure of sets of linguistic truth values</title>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">H</forename><surname>Nguyen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Wechler</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Fuzzy Sets and Syst</title>
		<imprint>
			<biblScope unit="volume">35</biblScope>
			<biblScope unit="page" from="281" to="293" />
			<date type="published" when="1990">1990</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Extended hedge algebras and their application to fuzzy logic</title>
	</analytic>
	<monogr>
		<title level="j">Fuzzy Sets and Syst</title>
		<imprint>
			<biblScope unit="volume">52</biblScope>
			<biblScope unit="page" from="259" to="281" />
			<date type="published" when="1992">1992</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Fuzzy linguistic logic programming and its applications</title>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">H</forename><surname>Le</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">K</forename><surname>Tran</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Theory and Pract. of Logic Prog</title>
		<imprint>
			<biblScope unit="volume">9</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="309" to="341" />
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Tabulation proof procedures for fuzzy linguistic logic programming</title>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">H</forename><surname>Le</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Liu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Int. J. Approx. Reasoning</title>
		<imprint>
			<biblScope unit="volume">63</biblScope>
			<biblScope unit="page" from="62" to="88" />
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">A fuzzy-set-theoretic interpretation of linguistic hedges</title>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">A</forename><surname>Zadeh</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Cybernetics</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="4" to="34" />
			<date type="published" when="1972">1972</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Hedges: A study in meaning criteria and the logic of fuzzy concepts</title>
		<author>
			<persName><forename type="first">G</forename><surname>Lakoff</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">J. Phil. Logic</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="458" to="508" />
			<date type="published" when="1973">1973</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
