<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Some properties of Janssen's Fuzzy Argumentation Frameworks</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Jiachao Wu</string-name>
          <email>wujiachao1981@hotmail.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Nir Oren</string-name>
          <email>n.oren@abdn.ac.uk</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Dept. of Computing Science, University of Aberdeen</institution>
          ,
          <addr-line>Aberdeen, UK AB243UE</addr-line>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Dept. of Mathematics, Shandong Normal University</institution>
          ,
          <addr-line>Jinan, China 250014</addr-line>
        </aff>
      </contrib-group>
      <fpage>30</fpage>
      <lpage>37</lpage>
      <abstract>
        <p>The majority of approaches to abstract argumentation with fuzziness yield some number as part of the computation process, which is then compared to some threshold in order to determine which arguments should appear in an extension. However, identifying such a threshold is difficult, and a more natural approach therefore involves representing the extension as a fuzzy set of arguments. Such an approach was taken by Janssen's fuzzy argumentation frameworks, and in this paper we examine this framework, clarifying some of its definitions and adding some auxiliary notions which make the system more understandable and simplify the computation of extensions. Finally, we consider a specialization of the system by instantiating it with the G¨odel t-norm min, and demonstrate that Janssen's framework is different from some fuzzy systems, such as the one proposed by de Costa Pereira et al.</p>
      </abstract>
      <kwd-group>
        <kwd>Argumentation Framework</kwd>
        <kwd>fuzzy arguments</kwd>
        <kwd>relabeling</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>Introduction</p>
      <p>Janssen’s fuzzy argumentation frameworks
Janssen’s framework (hereafter referred to as JAF) is based on Dung’s argumentation framework (AF). The
latter consists of a tuple (Args, Atts), where Args is a set of arguments, and Atts is a set of attacks.</p>
      <p>To define a JAF, the truth values of arguments and attacks are drawn from a complete lattice L, with a partial
order ≥L, greatest element 1 and smallest element 0, together with a negation operator ¬, and ∧, a t-norm on
L. Given these basic definitions, the implication operator ! can be defined either as the residual of the t-norm,
or through a combination of the negation and t-conorm.</p>
      <p>JAFs utilise fuzzy sets, defined through a function A : Args → L, determining membership level of each
argument A ∈ Args. We then refer to a crisp set as a set S = {A, . . .}, and refer to its associated fuzzy set
A(S). Here, S′ = {A ∈ S : A(A) ̸= 0} is the support of this fuzzy set. A fuzzy point is a fuzzy set with the
support being a single element A, generally denoted as (A, a).</p>
      <p>JAFs can be defined by associating an element of L with each attack in an AF.</p>
      <p>Definition 1 (Definition 3 in [Jan08]). A JAF is a tuple (Args, !), where Args is a crisp set of arguments and
! : Args × Args → L is a fuzzy relation over Args.</p>
      <p>! is extended to represent the degrees to which fuzzy sets of arguments attack each other as follows.</p>
      <p>For B an argument, and A, B fuzzy sets of arguments the degree to which A attacks B is defined as
and the degree to which B attacks A is defined as</p>
    </sec>
    <sec id="sec-2">
      <title>Furthermore, the degree to which A attacks B is given as</title>
      <p>It is not difficult to prove that
Proposition 1. A ! B = supB∈Args{B(B) ∧ (A ! B)} = supA∈Args{A(A) ∧ A ! B} = supA,B∈Args{A(A) ∧
B(B) ∧ (A ! B)}.</p>
      <p>Definition 2 (Definition 4 in [Jan08]). Let (Args, !) be a JAF. Then</p>
    </sec>
    <sec id="sec-3">
      <title>A fuzzy set E over Args is x-conflict-free, x ∈ L, iff A fuzzy set E over Args is y-admissible, if it defends itself well enough against all attacks, i.e., A y-preferred extension, y ∈ L, is maximal (w.r.t set inclusion over fuzzy sets) y-admissible extension. A z-stable extension, z ∈ L, is a fuzzy set E , that sufficiently attacks all external arguments, i.e.</title>
      <p>While Janssen does not define complete or grounded extensions, this definition was still — to our knowledge
— the first to define extensions in the form of fuzzy sets. However, much of his terminology, such as sufficient
attack, defends, and so on is somewhat unclear, and we investigate these definitions in more detail below.</p>
      <p>First, we consider what external arguments — as found in the definition of z-stable extensions — mean. In
general, external elements of a fuzzy set A are those fuzzy points (B, b) — where B is an element of the language,
and b a member of the truth lattice — which are not in the fuzzy set. However, within the definition of the
z-stable extension, no reference is made to the element b. Therefore, it appears as if the external elements are
in fact crisp elements of the support set of the fuzzy set. In order to avoid this mathematical misunderstanding,
we therefore introduce the notion of a z-sufficient attack as follows.
Definition 3. Let (Args, !) be a JAF. For each fuzzy set A ⊂ Args and each crisp argument A ∈ Args, we
say that A z-sufficiently attacks A, if</p>
      <p>¬A(A) ! (A ! A) ≥L z.</p>
      <p>With this definition in hand, we can express the z-stable extension as follows: A is a z-stable extension, if it
z-sufficiently attacks each crisp argument in Args.</p>
      <p>Another important notion is that of defence, which we obtain from the definition of y-admissible extensions.
Definition 4. Let A and C be fuzzy sets of arguments. We say that A y-defends C, if for each argument
B ∈ Args,</p>
      <p>((B ! C) ! (A ! B)) ≥L y.</p>
      <p>Then the y-admissible extensions are those fuzzy sets of arguments which y-defend themselves.</p>
      <p>We now turn our attention to how the extensions within the JAF are computed. From Proposition 1, we can
obtain the following property.</p>
      <p>Theorem 1. E is x-conflict-free in a JAF, if for any arguments A, B ∈ Args,</p>
      <p>¬(E (A) ∧ E (B) ∧ (A ! B)) ≥ x.</p>
      <p>Note that — according to this theorem — there is no relationship between the notions of x-conflict-freeness
and z-sufficient attacks. Importantly, the former concept is not required to compute the y-admissible or z-stable
extensions, which require only y-defence and z-sufficient attacks to be characterised.</p>
      <p>Theorem 2. E is y-admissible in JAF, if it y-defends itself, i.e., for each argument A ∈ Args,
A is a z-stable extension, if it z-sufficiently attacks each crisp argument in Args, i.e., for all A ∈ Args,
((A ! E ) ! (E ! A)) ≥L y.</p>
      <p>¬A(A) ! (A ! A) ≥L z.</p>
      <p>As in standard argumentation approaches, y-preferred extensions are maximal y-admissible extensions, and
can therefore be computed after the latter are obtained. Critically however — and unlike in standard abstract
argumentation — the lack of requirement on (x-)conflict-freeness means that Args itself is the unique y-preferred
extension if it is y-admissible. The same argument can be applied to the z-stable extension.
Example 1. Let’s consider the FAF({A},{((A,A),1)}). It is not difficult to check that the fuzzy set {(A,1)} is
y-admissible, y-preferred and z-stable, for all y, z ∈ [0, 1], but not x-conflict-free, for x &gt; 0.</p>
      <p>It is possible to add a requirement for x-conflict-freeness to the above definitions. However, characterising
the extension in cases where x ̸= y or x ̸= z for the y-preferred and z-stable extensions respectively requires two
values (x, y or x, z) to be considered, making analysis complex. We therefore leave such considerations for future
work.</p>
      <p>While compact, the formulae of Theorems 1 and 2 are still difficult to analyse as the operators within them
(∧, ¬, !) have multiple definitions within the literature. To examine the properties of JAFs in more detail
requires us to restrict these operators, and in the next section we do this by considering the G¨odel t-norm, the
residual implication operator, and a simple negation operator.
3</p>
      <p>A special case of JAFs
In this part, we specialize JAFs with the following.</p>
      <p>• Args is a finite set.
• The G¨odel t-norm ∧ = min.
• ¬a = 1 − a.
• The truth lattice L = [0, 1], with the natural order ≤L=≤ on [0,1].
• The residual implication, i.e. if a &gt; b ∈ [0, 1], then a ! b = b; otherwise a ! b = 1.</p>
      <p>Then the equation in Proposition 1 will be</p>
      <p>A ! B =</p>
      <p>Reversing the process, we have if there exists A in Args, such that
then A z-sufficiently attacks B.</p>
      <p>Replacing z by 1, we have A 1-sufficiently attacks B iff ∃A ∈ Args s.t.</p>
      <p>A(B) + min{A(A), A ! B} ≥ 1.</p>
      <p>In Equation (2), supA∈Args min{A(A), A ! B} is the degree A ! B. Therefore, if we wish to determine
whether A z-sufficiently attacks B, we only need to compare three values — z, 1 − A(B) and A ! B. For
1-sufficient attacks, only two values must be compared, 1 − A(B) and A ! B.</p>
      <p>This does however leave an open question, namely if A(B) = 1, i.e., B is a crisp element of A, then it is always
the case that A (counter-intuitively) z-sufficiently attacks B. Understanding the reasons for this is left for future
work.
(1)
(2)
Theorem 4. A fuzzy set A y-defends another fuzzy set C, iff for any B, C ∈ Args, there is some A ∈ Args,
such that</p>
      <p>Equation (3) demonstrates that in order to determine whether A y-defends C or not, one must compare the
values of y, B ! C and A ! B, ∀B ∈ Args. Particularly, the following property holds, which shows the essence
of JAF’s defence.</p>
      <p>Proposition 2. A 1-defends C if and only if B ! C is no stronger than A ! B, i.e., ∀B ∈ Args,
(B ! C) ≤ (A ! B).</p>
      <p>A useful case is that both A and C are fuzzy points, i.e. A = (A, a) and C = (C, c).</p>
      <p>Corollary 1. (A, a) y-defends (C, c) if and only if, for any B in Args,
Particularly, (A, a) 1-defends (C, c) if and only if, for any B in Args,
min{y, min{B ! C, c}} ≤ min{A ! B, a}.</p>
      <p>min{B ! C, c} ≤ min{A ! B, a}.</p>
      <p>Example 2. Given a FAF ({A, B, C}, {((A, B), 0.9), ((B, C), 0.4)}).1 Then (A, 0.8) 1-defends (C, 0.7). But
(A, 0) doesn’t 1-defend (C, 0.4), instead (A, 0) only 0-defends (C, 0.4).</p>
      <p>This corollary also shows that the fuzzy defends can be calculated point by point.</p>
      <p>Corollary 2. A fuzzy set A of arguments y-defends C iff (A, A(A)) y-defends (C, C(C)).</p>
      <p>Particularly, A 1-defends C iff (A, A(A)) 1-defends (C, C(C)).
3.3</p>
      <p>x-Conflict-free extensions
Theorem 5. A fuzzy set E in Args is x-conflict-free, iff for any A, B in Args, one of E (A), E (B) or A ! B is
no more than 1 − x.</p>
      <p>Proof. E is x-conflict-free iff</p>
      <p>E ! E =</p>
      <p>Then for any A, B ∈ Args, min{E (A), E (B), A ! B} ≤ 1 − x, i.e., one of E (A), E (B), A ! B is no more than
1 − x.</p>
      <p>Corollary 3. The fuzzy set E ⊂ Args is 1-conflict-free iff for any A, B ∈ Args, at least one of the following
holds: E (A) = 0, E (B) = 0 or A ! B=0, i.e., either A does not attack B, or A or B is not a member of the
fuzzy set.</p>
      <p>1The degrees of all the attacks not mentioned are 0. And similar for the following.
3.4</p>
      <p>y-admissible extensions
By Theorem 4, we immediately get:
Theorem 6. A fuzzy set E ⊂ Args is y-admissible if and only if for any B, C ∈ Args, there is some A ∈ Args,
such that</p>
      <p>min{y, min{B ! C, E (C)}} ≤ min{A ! B, E (A)}.</p>
      <p>Corollary 4. A fuzzy set E is 1-admissible iff ∀B, C ∈ Args, ∃A ∈ Args, s.t.
min{E (A), A ! B}.
min{E (C), B
! C} ≤</p>
      <p>If A is a 1-admissible extension and A ⊂ B, B may not be a 1-extension, as per the following example.
Example 3. Given a JAF ({A, B, C}, {((A, B), 0.4), ((B, C), 0.9)}). Then E = {(A, 1), (B, 0.7), (C, 0.7)} is not
1-admissible, because min{E (C), B ! C} = 0.7 &gt; min{E (A), A ! B} = 0.4.. But from Corollary 4, the empty
set {(A, 0), (B, 0), (C, 0)} is always 1-admissible.
3.5</p>
      <p>z-stable extensions
The following property can be directly obtained from Theorem 3.</p>
      <p>Theorem 7. A fuzzy set E is z-stable iff for any external argument B ∈ Args, there exists A ∈ Args, such that
Corollary 5. E is 1-stable iff for any argument B ∈ Args, there exists A ∈ Args, such that
min{z, 1 − E (B)} ≤ min{E (A), A ! B}.</p>
      <p>E (B) + min{E (A), A ! B} ≥ 1.</p>
      <p>Note, in JAF 1-stable may not be 1-admissible, thus not 1-preferred. The following is a counter example.
Example 4. Given a JAF ({A, B, C}, {((A, B), 0.4), ((B, C), 0.9)}). Then E = {(A, 1), (B, 0.7), (C, 0.7)} is
1-stable, but not 1-admissible.</p>
      <p>Similarly, we can conclude that z-stable extensions may not be z-admissible.
4</p>
      <p>Relation to relabelings in [Per11]
In [Per11], a fuzzy argumentation framework with fuzzy arguments and crisp attacks (as opposed to Janssen’s
crisp arguments with fuzzy attacks) was introduced. Within this system, given some initial fuzzy values for
arguments, new values were computed according to a rewinding procedure by computing the fixed point for the
following function.</p>
      <p>1 1
αt+1(A) = 2 αt(A) + 2 min{A(A), 1 − B : (Bm,Aa)x∈Atts αt(B)},
In the above, A(A) is the original value of the argument A and α0(A) = A(A), for all A ∈ Args.</p>
      <p>The sequence αt(A), ∀A ∈ Args, was shown to converge, with the limit denoted by α(A). This α(A) was
considered to be the relabelled value of A.</p>
      <p>Given this approach, we ask whether, if α is considered as a fuzzy set of arguments, it yields the same semantics
as JAF. However, even if JAFs are extended to permit fuzzy arguments with crisp attacks2, then the following
counterexample shows that the two semantics differ.</p>
      <p>Example 5. Given a fuzzy AF ({(A, 0.1), (B, 0.8), (C, 1)}, {((A, B), 1), ((B, C), 1)}). α =
({(A, 0.1), (B, 0.8), (C, 0.2)} is the relabeling result of [Per11]. And Corollary 1 shows that, (A, 0.1) y-defends
(C, 0.2) only for y ≤ 0.1.</p>
      <p>Now if the belief degree of A drops to 0, the framework becomes ({(A, 0), (B, 0.8), (C, 1)},
{((A, B), 1), ((B, C), 1)}) and α = ({(A, 0), (B, 0.8), (C, 0.2)} is the relabeling. In this case,
{(A, 0), (B, 0.8), (C, 0.2)} is not y-admissible, for any y &gt; 0. However, it is meaningless to say a fuzzy
set is 0-admissible, because Theorem 4 shows every fuzzy set is 0-admissible.</p>
      <p>2such an extension is easy to instantiate by restricting the fuzzy subsets to the set of original arguments, and by treating the
crisp attacks as a special case of fuzzy attacks.</p>
      <p>In general, the relabelling approach of [Per11] will not result in y-admissible extensions, and will therefore not
be y-preferred.</p>
      <p>There is therefore a significant difference in the way the two approaches select arguments to be within an
extension, and characterising these differences further forms a portion of our ongoing work.
5</p>
      <p>Conclusion
In this work we analysed Janssen’s fuzzy argumentation frameworks in detail. We began by reexamining the
Janssen’s definition, and described z-sufficient attack and y-defence based on how extensions are computed within
JAFs. We then considered a special case of JAFs and described how the semantics of such a system can be
efficiently computed. Finally, we demonstrated — by means of a simple example — the fact that JAFs cannot be
used to encode the relabellings used by [Per11], and that further enhancements to JAFs are therefore required.
We are at present investigating how the strengths of Janssen’s approach to fuzzy argumentation can be combined
with the benefits of the work described in [Per11].
5.0.1</p>
      <p>Acknowledgements
This research is supported by the Excellent Young Scholars Research Fund of Shandong Normal University and
the National Natural Funds 61170038 and 61472231.
[Bis10]
[Per11]</p>
      <p>C. De Costa Pereira, A. Tettamanzi and S. Villata. Changing one’s mind: Erase or rewind? Possibilistic
belief revision with fuzzy argumentation based on trust. In: 22nd International Joint Conference
Artificial Intelligence, 164–171, 2011.
[Don14] P. Dondio. Multi-Valued and Probabilistic Argumentation Frameworks. Computational Models of</p>
      <p>Argument: Proceedings of COMMA, 142–156, 2014.
[Dun95] P.M. Dung. On the acceptability of arguments and its fundamental role in nonmonotonic reasoning,
logic programming and n-person games. Artificial Intelligence, 77:321–357, 1995.
[Dun11] P. Dunne, A. Hunter, P McBurney, S. Parsons and M. Wooldridge. Weighted argument systems: Basic
definitions, algorithms, and complexity results. Artificial Intelligence, 175:457–486, 2011.
[Gab15] D. Gabbay and O. Rodrigues. Equilibrium States in Numerical Argumentation Networks. Logica</p>
      <p>Universalis, 9(4):411–473, 2015.
[Gra12] C. Gratie and A. Florea. Fuzzy Labeling for Argumentation Frameworks, Argumentation in
Multi</p>
      <p>Agent Systems. Lecture Notes in Computer Science, 754:1–8, 2012.
[Hun13] A. Hunter. A probabilistic approach to modelling uncertain logical arguments. International Journal
of Approximate Reasoning, 54:47-C81, 2013.
[Jan08] J. Janssen, M. De Cock and D. Vermeir. Fuzzy Argumentation Frameworks. In: Proceedings of the 12th
Conference on Information Processing and Management of Uncertainty in Knowledge-Based Systems,
513–520, 2008.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [Amg02]
          <string-name>
            <given-names>L.</given-names>
            <surname>Amgoud</surname>
          </string-name>
          , and
          <string-name>
            <given-names>C.</given-names>
            <surname>Cayrol</surname>
          </string-name>
          .
          <article-title>Inferring from inconsistency in preference-based argumentation frameworks</article-title>
          .
          <source>Journal of Automated Reasoning</source>
          ,
          <volume>29</volume>
          :
          <fpage>125</fpage>
          -
          <lpage>169</lpage>
          ,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <string-name>
            <given-names>S.</given-names>
            <surname>Bistarelli</surname>
          </string-name>
          and
          <string-name>
            <given-names>F.</given-names>
            <surname>Santini</surname>
          </string-name>
          .
          <article-title>A common computational framework for semiring-based argumentation systems</article-title>
          . In H. Coelho,
          <string-name>
            <given-names>R.</given-names>
            <surname>Studer</surname>
          </string-name>
          and M. Wooldridge, eds.,
          <source>ECAI, Frontiers in Artificial Intelligence and Applications</source>
          ,
          <volume>215</volume>
          :
          <fpage>131</fpage>
          -
          <lpage>136</lpage>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [Cos12]
          <string-name>
            <given-names>S.</given-names>
            <surname>Coste-Marquis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Konieczny</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Marquis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Ouali</surname>
          </string-name>
          .
          <article-title>Weighted Attacks in Argumentation Frameworks</article-title>
          .
          <source>Proceedings of the Thirteenth International Conference on Principles of Knowledge Representation and Reasoning</source>
          ,
          <volume>593</volume>
          -
          <fpage>597</fpage>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [Kac10]
          <string-name>
            <given-names>S.</given-names>
            <surname>Kaci</surname>
          </string-name>
          and
          <string-name>
            <given-names>C.</given-names>
            <surname>Labreuche</surname>
          </string-name>
          .
          <article-title>Argumentation Framework with Fuzzy Preference Relations</article-title>
          . E. Hullermeier,
          <string-name>
            <given-names>R.</given-names>
            <surname>Kruse</surname>
          </string-name>
          and
          <string-name>
            <given-names>F.</given-names>
            <surname>Hoffmann</surname>
          </string-name>
          (Eds.):
          <source>IPMU</source>
          <year>2010</year>
          , LNAI
          <volume>6178</volume>
          :
          <fpage>554</fpage>
          -
          <lpage>C563</lpage>
          ,
          <year>2010</year>
          . Springer-Verlag Berlin Heidelberg
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [Li12]
          <string-name>
            <given-names>H.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Oren</surname>
          </string-name>
          and
          <string-name>
            <given-names>T.</given-names>
            <surname>Norman</surname>
          </string-name>
          .
          <article-title>Probabilistic argumentation frameworks</article-title>
          . In:S. Modgil,
          <string-name>
            <given-names>N.</given-names>
            <surname>Oren</surname>
          </string-name>
          ,
          <string-name>
            <surname>F.</surname>
          </string-name>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <string-name>
            <surname>Toni(eds.) TAFA</surname>
          </string-name>
          <year>2011</year>
          . LNCS,
          <volume>7132</volume>
          :
          <fpage>1C</fpage>
          -
          <lpage>16</lpage>
          , Springer Heidelberg,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [Mar08]
          <string-name>
            <given-names>D.</given-names>
            <surname>Martinez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Garcia</surname>
          </string-name>
          and
          <string-name>
            <surname>G. Simari.</surname>
          </string-name>
          <article-title>An abstract argumentation framework with varied-strength attacks</article-title>
          .
          <source>Proceedings of the Eleventh International Conference on Principles of Knowledge Representation and Reasoning</source>
          ,
          <volume>135</volume>
          -
          <fpage>143</fpage>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [Tam14]
          <string-name>
            <given-names>N.</given-names>
            <surname>Tamani</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Croitoru</surname>
          </string-name>
          .
          <article-title>Fuzzy Argumentation System for Decision Support</article-title>
          .
          <source>IPMU</source>
          <year>2014</year>
          ,
          <string-name>
            <surname>Part</surname>
            <given-names>I</given-names>
          </string-name>
          , CCIS
          <volume>442</volume>
          :
          <fpage>77</fpage>
          -
          <lpage>86</lpage>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>