<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Universal Direct Analytic Models for the Minimum of Triangular Fuzzy Numbers</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Yuriy Kon</string-name>
          <email>nina.kondratenko@grad.moore.sc.edu</email>
          <email>y_kondrat2002@yahoo.com</email>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Darla Moore School of Business, University of South Carolina</institution>
          ,
          <addr-line>Columbia, SC 29208</addr-line>
          ,
          <country country="US">USA</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Department of Intelligent Information Systems Petro Mohyla Black Sea State University</institution>
          ,
          <addr-line>68-th Desantnykiv str. 10, 54003, Mykolaiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>This paper reveals the analytic models for the results of fuzzy arithmetic operations, in particular, minimum of fuzzy sets. Special attention is paid to the synthesis of the universal direct models for minimum of triangular fuzzy numbers with different relations between their parameters. Furthermore, we present the components of the universal library of the resulting direct models for various combinations of the triangular fuzzy numbers masks. Modeling results confirm the efficiency of the proposed soft computing models for real-time fuzzy information processing.</p>
      </abstract>
      <kwd-group>
        <kwd>fuzzy number</kwd>
        <kwd>minimum</kwd>
        <kwd>direct model</kwd>
        <kwd>library</kwd>
        <kwd>real time</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>
        The development of the efficient methods for big data analysis and dynamic
information processing in the real-time is one of the most important tasks of the signal
processing, as well as control and decision making in uncertainty [
        <xref ref-type="bibr" rid="ref1 ref2 ref3">1,2,3</xref>
        ]. The big
volume of data and high speed of its appearance requires using special mathematical
approaches developed in the theory of artificial intelligence and computational
optimization [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. In some cases, the complexity of mathematical formalization of
processes and systems in the conditions of uncertainty, it is necessary to advance and develop
new mathematical methods and approaches [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. One of these approaches, flexible to
solving real-world problem, is a theory of fuzzy sets and fuzzy logic, initially
developed and published by professor Lotfi Zadeh [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] in 1965. Since the introduction of the
theory of fuzzy sets, there has been significant attention, in particular, in terms of its
practical applications of mathematical methods in all fields of science and technology.
The scientists around the world are aware of the fundamental theoretical
developments in the theory of fuzzy sets and fuzzy logic [
        <xref ref-type="bibr" rid="ref10 ref7 ref8 ref9">7-10</xref>
        ].
      </p>
      <p>
        The fuzzy set A that is specified on the basis of the universal set E , is called [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]
%
the set of pairs (x,μ A (x)) , where x ∈ E , μ A (x) ∈ [
        <xref ref-type="bibr" rid="ref1">0,1</xref>
        ] . Fuzzy sets and fuzzy logic
% %
allow solving different tasks in uncertain conditions in the field of decision-making
and complex systems control in economics, management, engineering and logistics
[
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], in particular, in marine transportation [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ], investment [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], finances [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] and
other fields. Special attention is paid to data analysis using fuzzy mathematics and soft
computing [
        <xref ref-type="bibr" rid="ref13 ref14 ref4">4,13,14</xref>
        ].
      </p>
      <p>
        In many cases, developing the solution to the problems require fulfilling diverse
fuzzy arithmetic operations, such as addition, subtraction, multiplication division,
minimum and maximum calculations [
        <xref ref-type="bibr" rid="ref14 ref15 ref16">14,15,16</xref>
        ].
2
      </p>
    </sec>
    <sec id="sec-2">
      <title>Related Works and Problem Statement</title>
      <p>
        Inverse models of resulting membership functions (MFs) for different arithmetic
operations with fuzzy numbers based on using α -cuts do not always provide high
performance of computing operations and often lead to complications in solving control
problems in real time [
        <xref ref-type="bibr" rid="ref17 ref18 ref2 ref7">2,7,17,18</xref>
        ]. Thus, the development of universal direct analytic
models, that allow formalizing fuzzy arithmetic operations to improve their operating
speed and accuracy, is an important direction in the fuzzy information processing and
data analysis [
        <xref ref-type="bibr" rid="ref19 ref20">19,20</xref>
        ]. Scholarly attention to the fuzzy set method in the past decade
resulted in publications analyzing the synthesis of inverse and direct analytic models
for resulting fuzzy sets of such fuzzy arithmetic operations as fuzzy addition (+ )
(- )
[
        <xref ref-type="bibr" rid="ref13 ref14 ref19 ref20">13,14,19,20</xref>
        ], fuzzy subtraction
[
        <xref ref-type="bibr" rid="ref13 ref14 ref21">13,14,21</xref>
        ], fuzzy
multiplication
(⋅)
[
        <xref ref-type="bibr" rid="ref13 ref14 ref15 ref16">13,14,15,16</xref>
        ] and fuzzy division (:) [
        <xref ref-type="bibr" rid="ref13 ref14">13,14</xref>
        ].
      </p>
      <p>
        The analytic approach, proposed in [
        <xref ref-type="bibr" rid="ref13 ref15 ref19">13,15,19</xref>
        ], allows to form the universal
resulting MFs for fuzzy arithmetic operations with triangular and bell-shape fuzzy numbers
based only on the initial parameters of the abovementioned fuzzy numbers, for
example, based on the parameters a1, a0 , a2 , b1, b0 , b2 for the triangular fuzzy numbers [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ]
A = ( a1, a0 , a2 ) and B = (b1, b0 , b2 ) . Using direct models [
        <xref ref-type="bibr" rid="ref13 ref15 ref19 ref20 ref21">13,15,19-21</xref>
        ] for
corre% %
sponding arithmetic operation (* ∈) {+( ) ,- ( )⋅ , ( ) , (:)} makes it possible to calculate
the value of the resulting MFs in real-time for any output value x of the resulting
MF’s support:
x ∈ supp ( A(* ) B ) ,
% %
where (* ) is one of the arithmetic operations from the set {(+ ) , (- ) ,⋅( ) , (:)} .
      </p>
      <p>
        One of the most difficult fuzzy arithmetic operations in terms of its mathematical
formalization is an operation of minimum of the fuzzy numbers (FNs-minimum).
Using Max-Min or Min-Max convolutions for the FNs-minimum realization [
        <xref ref-type="bibr" rid="ref13 ref14">13,14</xref>
        ]
at times leads to increased complexity and reduced processing speed or to the
violation of the convexity and normality properties in the resulting fuzzy sets. Kauffman
and Gupta in [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] considered the geometrical approach based on the α -cuts for the
calculation of the FNs-minimum for fuzzy numbers with different shapes of MFs.
      </p>
      <p>
        Computational algorithms for the operations of FNs-minimum on the basis of α
cuts [
        <xref ref-type="bibr" rid="ref13 ref14 ref21">13,14,21</xref>
        ] have high computational complexity, as it is performed in turn for all
α -levels with the step of discreteness Δα , which value significantly affects the
accuracy and operating speed of the computational processes [
        <xref ref-type="bibr" rid="ref15 ref20">15,20</xref>
        ]. Therefore, α
Bα = [b1(α ), b2 (α )] , α ∈ [
        <xref ref-type="bibr" rid="ref1">0,1</xref>
        ] .
cuts of the fuzzy set A ∈ R (Fig. 1) is ordinary subset
%
Aα = {x μ A (x) ≥ α }, α ∈[
        <xref ref-type="bibr" rid="ref1">0,1</xref>
        ] , that contains elements x ∈ R whose degree of
mem%
bership to a set A is not less than α . The subsets Aα та Bα that determine the
ap%
propriate α -cuts of fuzzy sets A, B ∈ R can be written as Aα = [a1(α ), a2 (α )] ,
% %
      </p>
      <p>
        The shape of the MFs of fuzzy numbers and the relationship between their
parameters have significant impact on the synthesis of the direct models of resulting MFs for
fuzzy arithmetic operations. Some individual cases require the need to create the
special set or the special library of the direct models of resulting MFs depending on
different factors (i.e., for triangular fuzzy numbers, on the relationship between
parameters a1, a0 , a2 , b1, b0 , b2 ). These special libraries of direct models for resulting MFs are
presented in [
        <xref ref-type="bibr" rid="ref19 ref20 ref21">19-21</xref>
        ] for arithmetic operation addition [
        <xref ref-type="bibr" rid="ref19 ref20">19,20</xref>
        ] and subtraction [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ]
with different kinds of asymmetrical fuzzy numbers. The usage of these special
libraries allows researchers to increase the computational properties of fuzzy arithmetic
operations with abovementioned asymmetrical fuzzy numbers.
      </p>
      <p>The aim of this work is to provide the synthesis of the universal analytical models
of resulting MFs for the FNs-minimum and create a library of direct models for
triangular fuzzy numbers (TrFNs) with different combinations of their parameters (Fig. 1)
in order to increase operating speed and to reduce the volume, complexity and
accuracy of fuzzy information processing.
3</p>
    </sec>
    <sec id="sec-3">
      <title>Synthesis of Analytic Models for Minimum of Fuzzy Numbers</title>
      <p>The TrFNs A = ( a1, a0 , a2 ) and B = (b1, b0 , b2 ) have MFs μ A ( x ) and μ B ( x) with
% % % %
parameters μ A ( a1 ) = μ A ( a2 ) = μ B (b1 ) = μ B (b2 ) = 0, μ A ( a0 ) = μ B (b0 ) = 1.
% % % % % %
1
0.5
α
µ A(x)
%</p>
      <p>
        A = (a1, a0 , a2 )
%
a1
a1(α )
The inverse Aα , Bα and direct μ A ( x ) , μ B ( x) models of the TrFNs A, B ∈ R
% % % %
are determined [
        <xref ref-type="bibr" rid="ref13 ref14 ref15 ref19 ref20 ref21">13-15,19-21</xref>
        ] by the corresponding dependencies (1)-(4):
 0,∀( x ≤ a1 ) U ( x ≥ a2 ) 
 
μ A ( x) =  Fleft ( x, a1, a0 ),∀( a1 &lt; x ≤ a0 ) =  ( x - a1 ) / (
a0%  
Fright ( x, a0 , a2 ),∀( a0 &lt; x &lt; a2 ) (a2 - x) /
(a2 0,∀( x ≤ b1 ) U ( x ≥ b2 ) 
 
μ B ( x) =  Fleft ( x,b1,b0 ),∀(b &lt; x ≤ b0 ) =  ( x - b1 ) /
(b0%  1 
Fright ( x,b0 ,b2 ),∀(b0 &lt; x &lt; b2 ) (b2 - x) /
(b2
      </p>
      <p>Bα = b1 (α ) , b2 (α ) = b1 +α (b0 - b1 ) , b2- α (-b2
b0 ) ,
Aα = a1 (α ) , a2 (α ) = a1 +α ( a0 - a1 ) , a2- α (-a2
a0 ) ,
Fleft ( x, a1, a0 ) I Fleft ( x,b1,b0 ) : A, B ∈ R
% %
and right branches of TrFNs</p>
      <p>
        The operation of the FNs-minimum (C = A( ∧) B) based on α -cuts [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] can be
% % %
written as
      </p>
      <p>Cα = Aα ( ∧) Bα = [a1(α ), a2 (α )](∧)[b1(α ), b2 (α )] =
= [a1(α ) ∧ b1(α ), a2 (α ) ∧ b2 (α )] = [c1(α ), c2 (α )].</p>
      <p>We further describe in detail the proposed approach to the synthesis of the analytic
FNs-minimum models for TrFNs.</p>
      <p>Let us analyze primarily the separate intersections of the left branches of TrFNs
Fright ( x, a0 , a2 ) I Fright ( x,b0 ,b2 ) : A, B ∈ R .</p>
      <p>% %
If left branch Fleft ( x, a1, a0 ) of TrFN A has an intersection point with left branch
%
Fleft ( x,b1,b0 ) of TrFN B , then we can write a1 (α ) = b1 (α ) = c1 (α ) . Taking into
%
account that a1 (α ) = a1 +α (a0 - a1 ) and b1 (α ) = b1 +α (b0 - b1 ) we can form the
equation a1 +α (a0 - a1 =) b+1 α (b0- b1 ) and, after simple transformations, it is
possible to find a parameter α which corresponds to the intersection point (6)
α = (b - a1 ) / (a0- - a1 + b0
1
b1 ) .</p>
      <p>
        This value (8) α , if α ∈[
        <xref ref-type="bibr" rid="ref1">0,1</xref>
        ] , corresponds to the vertical coordinate α * (Fig. 2)
of the intersection point (6) with correct conditions μ A ( x) ∈[
        <xref ref-type="bibr" rid="ref1">0,1</xref>
        ] and μ B ( x) ∈[
        <xref ref-type="bibr" rid="ref1">0,1</xref>
        ] :
% %
0,∀( x ≤ a1 ) U ( x ≥ a2 )
a1∀), (&lt;a1 ≤x a0 ) ,
a0∀), (&lt;a0 &lt;x a2 )
0,∀( x ≤ b1 ) U ( x ≥ b2 )
b1∀), (&lt;b1 ≤x b0 ) .
b0∀), (&lt;b0 &lt;x b2 )
(1)
(2)
(3)
(4)
(5)
(6)
(7)
(8)
α * = μ A% ( x* ) = μ B% ( x* ) = μC% ( x* ) , where x* is a horizontal coordinate of the
intersection point (6). In this case, a1 (α * ) = b1 (α * ) = c1 (α * ) , and we can present the
intersection point (6) by two coordinates (a1 (α * ),α * ) or ( x*,μ A% ( x* )) , where
x* = a1 (α * ), μ A% ( x* ) = α * , taking into account the interconnections between inverse
and direct models of TrFNs. Using direct model (2) we can find
μ A% ( x* ) = ( x* - a1 ) / (
a0a1 )
(9)
and substituting x* = a1 (α * ), μ A% ( x* ) = α * we can obtain the coordinate a1 (α * ) :
a1 (α * ) = a1 +α * (a0 - a1 =) a+1 (ba10 - - aa1-1)( a+b0-0 ab11 ∈) min ( a1, b1 ), min ( a0 ,b0 ) . (10)
Thus, the coordinates (a1 (α * ) ,α * ) of the intersection (6) can be calculated using
the parameters (a1, a0 , b1, b0 ) of the TrFNs ( A, B ) and the universal models (10) and
% %
(8).
      </p>
      <p>Let us analyze the right branches of the fuzzy numbers A and B in a similar
fash% %
ion. If the right branch Fright ( x, a0, a2 ) of TrFN A% has an intersection (7) with the
right branch Fright ( x,b0 ,b2 ) of TrFN B , then we can write a2 (α ) = b2 (α ) = c2 (α ) .</p>
      <p>%</p>
      <p>Taking into account that a2 (α ) = a2 - α (a2- a0 ) and b2 (α ) = b2 - α (b2- b0 ) , it is
possible to form the equation a2 - α (a2- a=0) - b2 α- (b2 b0 ) and, after simple
transformations, we can find a parameter α which corresponds to the intersection (7)
(11)
(12)
α = (b2 - a2 ) / (b2- - b0 +a2
a0 ) .</p>
      <p>
        This value of (11) α , if α ∈ [
        <xref ref-type="bibr" rid="ref1">0,1</xref>
        ] , corresponds to the vertical coordinate α ** (Fig.
2) of the intersection point (7) with conditions that μ A% ( x ) ∈[
        <xref ref-type="bibr" rid="ref1">0,1</xref>
        ] and μ B% ( x ) ∈[
        <xref ref-type="bibr" rid="ref1">0,1</xref>
        ] :
α ** = μ A% ( x** ) = μ B% ( x** ) = μC% ( x** ) , where x* is a horizontal coordinate of the
intersection point (7). In this case a2 (α ** ) = b2 (α ** ) = c2 (α ** ) , and we can present
the intersection (7) by two coordinates (a2 (α ** ),α ** ) or ( x**,μ A% ( x** )) , where
x** = a1 (α ** ) , μ A% ( x** ) = α ** . Using the direct models (2) we can find
μ A% ( x** ) = ( a2 - x** ) / ( a2- a0 )
and substituting x* = a1 (α * ), μ A% ( x* ) = α * we can obtain the coordinate a2 (α ** ) :
a2 (α ** ) = a2 - α **
(a2a=0) -a2
(b2 - a2 )(a2- ∈a0 )
b2 - b0- +a2 a0
min ( a0 ,b0 ), min (a2 ,b2 ) . (13)
      </p>
      <p>Thus, the coordinates (a2 (α ** ) ,α ** ) of the intersection (7) can be calculated using
the parameters (a0 , a2 , b0 , b2 ) of the TrFNs ( A, B ) and the universal models (13)
% %
and (11).</p>
      <p>Using the vertical coordinates α * (8) and α ** (11) of the intersections (6) and (7),
we can synthesize the resulting inverse (14) and direct (15) models of the minimum of
TrFNs A = ( a1, a0 , a2 ) , B = (b1, b0 , b2 ) for conditions a1 &lt; b1, a0 &gt; b0 , a2 &lt; b2 :
% %
Cα = Aα ( ∧) Bα = [a1(α ) ∧ b1(α ), a2 (α ) ∧ b2 (α )] = [c1(α ), c2 (α )] =
= ba11((αα )),,∀∀αα αα ∈∈α0,*α,1*, b2 (α ),∀α α ∈ α **,1 =</p>
      <p>a2 (α ),∀α α ∈ 0,α ** 
a1 +α ( a0 - a1 )∀, α α∈ 0,α *  a2 - α
(a2= b1 +α (b0 - b1 )∀, α α∈ α *,1 , b2 - α (b2- b0∀), α ∈α
a0∀), α ∈α
0,α ** </p>
      <p>
α **,1 
(14)
where c1 (0) = a1 ; c2 (0) = a2 ; c1 (1) = c2 (1) = b0 .</p>
      <p>
0,∀( x ≤ a1) U ( x ≥ a2 )

Fleft ( x,a1,a0 ),∀(a1 &lt; x ≤ a1 (α * ))

μC ( x) = Fleft ( x,b1,b0 ),∀(a1 (α * ) &lt; x ≤ b0 )
% 
Fright ( x,b0,b2 ),∀(b0 &lt; x &lt; a2 (α ** ))

0,∀( x ≤ a1) U ( x ≥ a2 )

( x - a1) / (a-0 a∀1), (&lt;a1 ≤x a1 (α * ))

= ( x - b1) / (b-0 b∀1), (a1 (α&lt;* ) ≤x b0 ) . (15)</p>
      <p>(b2 - x) / (b-2 b∀0), (&lt;b0 &lt;x a2 (α ** ))
Fright ( x,a0,a2 ),∀(a2 (α ** ) &lt; x &lt; a2 ) (a2 - x) / (a-2 a∀0), (a2 (α *&lt;* ) &lt;x a2 )

4</p>
    </sec>
    <sec id="sec-4">
      <title>The Library of Resulting Direct Models for FNs-Minimum</title>
      <p>The inverse Cα (14) and the direct μ C ( x ) (15) models for the FNs-minimum are
%
validated only for TrFNs A = ( a1, a0 , a2 ) and B = (b1, b0 , b2 ) under the following
% %
conditions: a1 &lt; b1, a0 &gt; b0, a2 &lt; b2 . At the same time a lot of real input values for
fuzzy processing can be presented as TrFNs with different relations between
parameters: a1 b1, a0 b0 , a2 b2 ,  ∈{(&lt;) , (=) , (&gt;)} . Therefore, for each special case it is
necessary to develop a separate analytic model of resulting fuzzy set for
implementation of “FNs-minimum” if the TrFNs ( A, B )</p>
      <p>% %
parameters (a1, b1; a0 , b0 ; a2 , b2 ) .</p>
      <p>In this section the authors aim to develop a library of inverse and direct analytic
models of the resulting fuzzy sets C for realization of the “minimum” as arithmetic
%
operation with TrFNs A and B and various combinations of the relations  .</p>
      <p>
        % %
Following [
        <xref ref-type="bibr" rid="ref19 ref20 ref21">19-21</xref>
        ] we can determine a mask
have different relations  between
Mask ( A, B ) = {d , g, p}
% %
(16)
for any pair of the TrFNs A and B , where indicators d , g and p are defined as
% %
d = 0, if a1 &gt; b1 ; g = 0, if a0 &gt; b0 ; p = 0, if a2 &gt; b2 .
      </p>
      <p>1, if a1 &lt; b1 1, if a0 &lt; b0 1, if a2 &lt; b2</p>
      <p>The Mask (16) is a the basis for forming a 8-component’s library (Table 1) of the
resulting mathematical models {M1...M8} for FNs-minimum with all possible
combinations of TrFNs ( A, B ) and different relations  . The library of the developed
% %
direct μ C ( x ) models {M1, M 2,..., M8} is represented in the Table 2.
%
a0∀), (a&lt;0 &lt;x a2 (α ** ))

Fleft (x,a1,a0),∀(a1 &lt; x ≤ a1(α*))

M3 Fleft (x,b1,b0),∀(a1(α*) &lt; x ≤b0)


(x- a1)/(a0- a1∀), (&lt;a1 ≤x a1(α*))

(x- b1) /(b0- b1∀), (a1(α&lt;*) ≤x b0)

0,∀(x ≤ a1)U(x ≥ a2)</p>
      <p>0,∀(x ≤ a1)U(x ≥ a2)
Fright (x,b0,b2),∀(b0 &lt; x &lt; a2(α**)) (b2 - x) /(b2- b0∀), (&lt;b0 &lt;x a2 (α**))
Fright (x,a0,a2),∀(a2(α**) &lt; x &lt; a2) (a2 - x)/(a2- a0∀), (a2 (α*&lt;*) &lt;x a2)

M4 
M5 
0,∀(x ≤ a1)U(x ≥ b2)

Fleft (x,a1,a0),∀(a1 &lt; x ≤ a1(α*)) (x- a1)/(a0- a1∀), (&lt;a1 ≤x a1(α*))

Fleft (x,b1,b0),∀(a1(α*) &lt; x ≤ b0) (x- b1)/ (b0- b1∀), (a1(α&lt;*) ≤x b0)

0,∀(x ≤ a1)U(x ≥ b2)

Fright (x,b0,b2),∀(b0 &lt; x &lt; b2)
0,∀(x ≤b1)U(x ≥ a2)

(b2 - x) /(b2- b0∀), (&lt;b0 &lt;x b2)
0,∀(x ≤ b1)U(x ≥ a2)

Fright (x,a0,a2),∀(a0 &lt; x &lt; a2)
0,∀(x ≤b1)U(x ≥b2)

Fleft (x,b1,b0),∀(b1 &lt; x ≤ a1(α*))

M6 Fleft (x,a1,a0),∀(a1(α*) &lt; x ≤ a0)

Fleft (x,b1,b0),∀(b1 &lt; x ≤ a1(α*)) (x- b1) /(b0- b1∀), (&lt;b1 ≤x a1(α*))

Fleft (x,a1,a0),∀(a1(α*) &lt; x ≤ a0) (x- a1)/(a0- a1∀), (a1(α&lt;*) ≤x a0)

Fright (x,a0,a2),∀(a0 &lt; x &lt; a2(α**)) (a2 - x)/(a2- a0∀), (a&lt;0 &lt;x a2 (α**))
Fright (x,b0,b2),∀(a2(α**) &lt; x &lt;b2) (b2 - x) /(b2- b0∀), (a2 (α*&lt;*) &lt;x b2)

(a2 - x)/(a2- a0∀), (a&lt;0 &lt;x a2)
0,∀(x ≤ b1)U(x ≥ b2)

(x- b1) /(b0- b1∀), (&lt;b1 ≤x a1(α*))

(x- a1)/(a0- a1∀), (a1(α&lt;*) ≤x a0)
0,∀(x ≤ a1)U(x ≥ a2)

Fleft (x,b1,b0),∀(b1 &lt; x ≤b0)
0,∀(x ≤ b1)U(x ≥ a2)

(x- b1) /(b0- b1∀), (&lt;b1 ≤x b0)

M7 Fright (x,b0,b2),∀(b0 &lt; x &lt; a2(α**)) (b2 - x) /(b2- b0∀), (&lt;b0 &lt;x a2 (α**))
 
Fright (x,a0,a2),∀(a2(α**) &lt; x &lt; a2) (a2 - x)/(a2- a0∀), (a2 (α*&lt;*) &lt;x a2)
0,∀(x ≤ b1)U(x ≥ b2)


M8 Fleft (x,b1,b0),∀(b1 &lt; x ≤ b0)

Fright (x,b0,b2),∀(b0 &lt; x &lt; b2)
0,∀(x ≤ b1)U(x ≥ b2)

(x- b1)/ (b0- b1∀), (&lt;b1 ≤x b0)

(b2 - x) /(b2- b0∀), (&lt;b0 &lt;x b2)</p>
    </sec>
    <sec id="sec-5">
      <title>Modeling Results</title>
      <p>Let’s consider an example with realisation of the arithmetic operation “minimum” for
the pair ( A, B ) of TrFNs: A = (3,10,17) , B = (5, 7, 24) . In this case, we have:
% % % %
a1 = 3; b1 = 5; a0 = 10; b0 = 7; a2 = 17; b2 = 24 . Using (16) we can automatically
determine (a) the corresponding Mask ( A, B ) = {d , g, p} = {1, 0,1} for the conditions
% %
a1 &lt; b1; a0 &gt; b0 ; a2 &lt; b2 and (b) the corresponding model M3 from the library of
models {M1, M 2,..., M8} (Table 1).</p>
      <p>Let’s calculate the coordinates (a1 (α * ),α * ) and (a2 (α ** ),α ** ) for intersection
points (6) and (7) of the fuzzy numbers ( A, B ) according to (10), (8), (13) and (11):
% %
a1 (α * ) = 3 + (5 - 3)(1 0- 3) = 5.8; α * = 5 - 3 = 0.4 ;</p>
      <p>10 - 3- +7 5 1-0- +3 7 5
a2 (α ** ) = 17 - ( 24 - 17)(1 7- 10)= 12.1; α **= 24 - 17 = 0.7 .</p>
      <p>24 - 7- 1+7 10 2-4- 7+ 17 10
Then (for recognized M3) we can choose the corresponding direct model μC ( x )
%
from the library (Table 2). We further present the resulting inverse Cα = Aα (∧) Bα
and direct μC ( x ) models (Fig.2) for C = A(∧) B :
% % % %

0,∀( x ≤ a1 ) U ( x ≥ a2 )

Fleft ( x, a1, a0 ),∀( a1 &lt; x ≤ a1 (α * ))

μC ( x) = Fleft ( x,b1,b0 ),∀( a1 (α * ) &lt; x ≤ b0 )
% 
Fright ( x,b0 ,b2 ),∀(b0 &lt; x &lt; a2 (α ** ))
Fright ( x, a0 , a2 ),∀( a2 (α ** ) &lt; x &lt; a2 )

0,∀( x ≤ 3) U ( x ≥ 17)

( x - 3) / 7∀, (3&lt; x≤ 5.8)

= ( x - 5) / 2∀, (5.8&lt; x≤ 7)

(24 - x ) / 17∀, (7&lt; x&lt; 12.1)

(17 - x) / 7∀, (12.1&lt; x&lt; 17)</p>
    </sec>
    <sec id="sec-6">
      <title>The Application of the FNs-Minimum Library</title>
      <p>The implementation of the developed library of direct analytic models (Table 2) for
calculation of the resulting MFs μ C ( x ) , according to given TrFNs with various
rela%
tionships between parameters a1, a0 , a2 , b1, b0 , b2 of MFs, allows researchers to use
one-step-automation-mode for arithmetic operation “FNs-minimum” C = A ( ∧ ) B.
% % %
We further consider some examples of the developed analytic models library
application (Table 2) for solving real-life decision-making problems under uncertainty.</p>
      <p>1
0.5
0
µC (x)</p>
      <p>C = A( Λ) B
% % %</p>
      <p>A = (3,10,17)
%
α ** = µC (x**) = 0.7</p>
      <p>%
α * = µC (x*) = 0.4</p>
      <p>%
B = (5, 7, 24)
%
20</p>
      <p>Capacitive Vehicle Routing Problem with Fuzzy Demands at Nodes
The trucks or bunkering tankers provide corresponding cargo transportation and
unloading operations for various nodes served and located in different destinations, for
example, (a) in the cities – for the trucks; (b) in the marine ports and open sea points –
for bunkering tankers. Taking into account the limited capacity of the transporting
unit (i.e., truck or tanker), we need to solve capacitive vehicle routing problem
(CVRP). The efficiency of the preliminary vehicle routes planning can be evaluated
by its ability to serve all nodes’ orders with maximum possible quantity of unloaded
cargo and minimum length of the total vehicle routes.</p>
      <p>
        Transport logistic practice shows that very often the information about cargo
demands of served nodes are uncertain. These demands can be modeled by TrFNs
[
        <xref ref-type="bibr" rid="ref11 ref22 ref9">9,11,22</xref>
        ]. For example, such uncertain demands as (a) “approximately a0 ” or (b)
“value between a1 and a2 “can be modelled by TrFNs A1 and A2 represented in
% %
Fig.1. The CVRP with fuzzy demands A%j = (a1 j , a0 j , a2 j ) at nodes j ∈{1, 2,..., r} is
considered in [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], where a0 j is the value of MF of TrFN Aj with μ (a0 j ) = 1; a1 j and
%
a2 j are the lowest and highest possible values of demand, respectively, μ (a1 j ) = 0 ,
with fuzzy demands one-by-one taking into account the current fuzzy value of
remaining cargo at the vehicle D j = ( d1 j , d0 j , d2 j ) and fuzzy demand of the next
%
node-candidate A%j+1 .
cess, otherwise, the vehicle should return to the deport D0 if the value of its
remainThe decision about including the node-candidate S6 with fuzzy demand A6 can be
%
made by analyzing the resulting MFs A6 (∧) D5 for the arithmetic operation
FNs% %
minimum with TrFNs A%6 and D%5 . Calculating the distance Dist65 ( A%6 (∧) D%5 , A%6 )
between the resulting TrFN A6 (∧) D5 and TrFN A6 (fuzzy demand at node S6 ) with
% % %
application of one of the well-known methods for measuring distance between two
fuzzy numbers (Hausdorff-, Euclid-, Hemming-distance, etc.) [
        <xref ref-type="bibr" rid="ref23 ref24 ref25">23,24,25</xref>
        ], we can
include the node S6 to the Route 2 in the condition if
      </p>
      <p>Dist65 ( A%6 ( ∧) D5 , A%6 ) ≤ Δdes ,
%
where Δdes is a desired value of the deviation between abovementioned TrFNs
A6 (∧) D5 and A6 .
% % %</p>
      <p>The diverse cases represented in Fig. 5 – Fig. 7 depend on the relationship between
the parameters a16 , a06 , a26 of TrFN A%6 and the parameters d15 , d05 , d25 of TrFN
D5 . In particular, in the occasions when condition Dist65 ( A%6 (∧) D5 , A%6 ) = 0 the
% %
node S6 will be included in the Route 2 planning (Fig.5a, Fig. 6a). The inclusion of</p>
      <p>Therefore, the decision maker will include any node-candidate S j+1 to the
corresponding Route in the planning process if the condition</p>
      <p>
        Fig. 6. The node S6 is included in Route 2: (a) Dist56 = 0 ; (b) Dist56 &lt; Δdes
Dist j+1, j ( A%j+1 (∧) D% j , A%j+1 ) ≤ Δdes
(18)
is fulfilled. The desired value Δdes can be preliminary determined using simulation
approach based on the generation of random sequences [
        <xref ref-type="bibr" rid="ref26 ref27">26,27</xref>
        ] for modelling fuzzy
and crisp demands at nodes [
        <xref ref-type="bibr" rid="ref28">28</xref>
        ].
(d) comparison of the resulting FNs-minimum with TrFN S%ans ;
(e) conclusion of the desired score outcome.
7
      </p>
    </sec>
    <sec id="sec-7">
      <title>Conclusions</title>
      <p>
        The minimum of fuzzy sets is a very important fuzzy arithmetic operation, which
requires a lot of time for its realization. The implementation of the developed direct
analytic models’ library (Table 2) allows using one step automation mode for
operation “FNs-minimum” C = A(∧)B . Modeling results confirm the efficiency of
pro% % %
posed universal analytic models for different applications. In some cases, such direct
analytic models μC ( x) = μ A(∧)B ( x) provide an efficient solution to the fuzzy
pro% % %
cessing in evaluation, control and decision-making processes, in particular, for the
financial analysis [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ], automatic evaluation of the student’s knowledge [
        <xref ref-type="bibr" rid="ref29">29</xref>
        ], group
anonymity [
        <xref ref-type="bibr" rid="ref30">30</xref>
        ], and model design process [
        <xref ref-type="bibr" rid="ref31 ref32">31,32</xref>
        ], soft computing based on
reconfigurable technology [
        <xref ref-type="bibr" rid="ref33">33</xref>
        ], analysis of the big data during testing of computer systems
and their components [
        <xref ref-type="bibr" rid="ref34 ref35">34,35</xref>
        ], optimization in transport logistics [
        <xref ref-type="bibr" rid="ref11 ref22 ref36 ref9">9,11,22,36</xref>
        ],
redesigning social inquiry [
        <xref ref-type="bibr" rid="ref37 ref38">37,38</xref>
        ], partner selection [
        <xref ref-type="bibr" rid="ref39">39</xref>
        ], fuzzy-algorithmic reliability
analysis of complex systems in economics, management and engineering [
        <xref ref-type="bibr" rid="ref26 ref40 ref41 ref42 ref43">26,40-43</xref>
        ]
and others.
      </p>
    </sec>
    <sec id="sec-8">
      <title>Acknowledgment</title>
      <p>Authors cordially thank the Fulbright Program (USA) and US host institutions
Cleveland State University and University of South Carolina for possibility to conduct
research and study in USA.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Simon</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Design and rule base reduction of a fuzzy filter for the estimation of motor currents</article-title>
          .
          <source>International Journal of Approximate Reasoning</source>
          <volume>25</volume>
          ,
          <fpage>145</fpage>
          -
          <lpage>167</lpage>
          (
          <year>2000</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Kondratenko</surname>
            ,
            <given-names>Y.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Al Zubi</surname>
            ,
            <given-names>E.Y.M.:</given-names>
          </string-name>
          <article-title>The Optimisation Approach for Increasing Efficiency of Digital Fuzzy Controllers</article-title>
          .
          <source>In: Annals of DAAAM for</source>
          <year>2009</year>
          &amp;
          <article-title>Proceeding of the 20th Int</article-title>
          .
          <source>DAAAM Symp. "Intelligent Manufacturing and Automation"</source>
          , pp.
          <fpage>1589</fpage>
          -
          <lpage>1591</lpage>
          . Published by DAAAM International, Vienna (
          <year>2009</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Encheva</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kondratenko</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Solesvik</surname>
            ,
            <given-names>M.Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tumin</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Decision Support Systems in Logistics</article-title>
          .
          <source>In: AIP Conference Proc.,</source>
          vol.
          <volume>1060</volume>
          , pp.
          <fpage>254</fpage>
          -
          <lpage>256</lpage>
          (
          <year>2008</year>
          ) DOI:
          <fpage>10</fpage>
          .1063/1.3037065.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Kacprzyk</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zadrozny</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>De Tré</surname>
          </string-name>
          , G.:
          <article-title>Fuzziness in database management systems: Half a century of developments and future prospects</article-title>
          .
          <source>Fuzzy Sets and Systems</source>
          <volume>281</volume>
          ,
          <fpage>300</fpage>
          -
          <lpage>307</lpage>
          (
          <year>2015</year>
          ) DOI:
          <fpage>10</fpage>
          .1016/j.fss.
          <year>2015</year>
          .
          <volume>06</volume>
          .011.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Gil-Aluja</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          : Investment in Uncertainty. Kluwer Academic Publishers, Dordrecht, Boston, London (
          <year>1999</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Zadeh</surname>
            ,
            <given-names>L.A.: Fuzzy</given-names>
          </string-name>
          <string-name>
            <surname>Sets</surname>
          </string-name>
          .
          <source>Information &amp; Control</source>
          <volume>8</volume>
          ,
          <fpage>338</fpage>
          -
          <lpage>353</lpage>
          (
          <year>1965</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Yager</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Filev</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Essential of Fuzzy Modeling and Control</article-title>
          . Wiley, New York (
          <year>1994</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Jamshidi</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kreinovitch</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kacprzyk</surname>
            ,
            <given-names>J</given-names>
          </string-name>
          . (Eds)
          <article-title>: Advance Trends in Soft Computing</article-title>
          .
          <source>In: Proceedings of WCSC</source>
          <year>2013</year>
          , STUDFUZZ 312. Springer, San Antonio (
          <year>2013</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Werners</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kondratenko</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          :
          <article-title>Alternative Fuzzy Approaches for Efficiently Solving the Capacitated Vehicle Routing Problem in Conditions of Uncertain Demands. Complex Systems: Solutions and Challenges in Economics, Management and Engineering</article-title>
          . In: BergerVachon,
          <string-name>
            <surname>C.</surname>
          </string-name>
          et al. (eds.)
          <article-title>Studies in Systems, Decision and Control</article-title>
          , vol.
          <volume>125</volume>
          , pp.
          <fpage>521</fpage>
          -
          <lpage>543</lpage>
          . Springer, Heidelberg (
          <year>2018</year>
          ) DOI:
          <fpage>10</fpage>
          .1007/978-3-
          <fpage>319</fpage>
          -69989-9_
          <fpage>31</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Merigo</surname>
            ,
            <given-names>J.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gil-Lafuente</surname>
            ,
            <given-names>A.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yager</surname>
            ,
            <given-names>R.R.:</given-names>
          </string-name>
          <article-title>An overview of fuzzy research with bibliometric indicators</article-title>
          .
          <source>Applied Soft Computing</source>
          <volume>27</volume>
          ,
          <fpage>420</fpage>
          -
          <lpage>433</lpage>
          (
          <year>2015</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Solesvik</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kondratenko</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kondratenko</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sidenko</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kharchenko</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Boyarchuk</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Fuzzy decision support systems in marine practice</article-title>
          .
          <source>In: IEEE Intern. Conf. on Fuzzy Systems (FUZZ-IEEE)</source>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          . IEEE (
          <year>2017</year>
          ) DOI:
          <fpage>10</fpage>
          .1109/FUZZ-IEEE.
          <year>2017</year>
          .
          <volume>8015471</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Gil-Lafuente</surname>
            ,
            <given-names>A.M.:</given-names>
          </string-name>
          <article-title>Fuzzy Logic in Financial Analysis</article-title>
          .
          <source>Studies in Fuzziness and Soft Computing 175</source>
          . Springer, Berlin (
          <year>2005</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Kaufmann</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gupta</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Introduction to Fuzzy Arithmetic: Theory and Applications</article-title>
          . Van Nostrand Reinhold Company, New York (
          <year>1985</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Piegat</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <source>Fuzzy Modeling and Control</source>
          . Springer, Heidelberg (
          <year>2001</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Kondratenko</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kondratenko</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Soft Computing Algorithm for Arithmetic Multiplication of Fuzzy Sets Based on Universal Analytic Models</article-title>
          . In: Ermolayev,
          <string-name>
            <surname>V.</surname>
          </string-name>
          et al. (eds) Information and Communication Technologies in Education, Research, and
          <string-name>
            <surname>Industrial Application. ICTERI</surname>
          </string-name>
          <year>2014</year>
          .
          <source>Communications in Computer and Information Science</source>
          , vol.
          <volume>469</volume>
          , pp.
          <fpage>49</fpage>
          -
          <lpage>77</lpage>
          . Springer, Cham (
          <year>2014</year>
          ) DOI:
          <fpage>10</fpage>
          .1007/978-3-
          <fpage>319</fpage>
          -13206-
          <issue>8</issue>
          _
          <fpage>3</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Gao</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhang</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          :
          <article-title>Multiplication Operation on Fuzzy Numbers</article-title>
          .
          <source>Journal of Software</source>
          <volume>4</volume>
          (
          <issue>4</issue>
          ), http://ojs.academypublisher.com/index.php/jsw/article/download/0404331338/1061 (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Kondratenko</surname>
            ,
            <given-names>Y.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Klymenko</surname>
            ,
            <given-names>L.P.</given-names>
          </string-name>
          , Al Zu'bi, E.Y.M.:
          <article-title>Structural optimization of fuzzy systems' rules base and aggregation models</article-title>
          .
          <source>Kybernetes</source>
          <volume>42</volume>
          (
          <issue>5</issue>
          ),
          <fpage>831</fpage>
          -
          <lpage>843</lpage>
          (
          <year>2013</year>
          ) DOI:
          <fpage>10</fpage>
          .1108/K-03
          <string-name>
            <surname>-</surname>
          </string-name>
          2013-0053.
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Pasieka</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Grzesik</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Kuźma</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          :
          <article-title>Simulation modeling of fuzzy logic controller for aircraft engines</article-title>
          .
          <source>International Journal of Computing</source>
          <volume>16</volume>
          (
          <issue>1</issue>
          ),
          <fpage>27</fpage>
          -
          <lpage>33</lpage>
          (
          <year>2017</year>
          ) Retrieved from http://computingonline.net/computing/article/view/868.
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Kondratenko</surname>
            ,
            <given-names>Y.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kondratenko</surname>
          </string-name>
          , N.Y.:
          <article-title>Reduced library of the soft computing analytic models for arithmetic operations with asymmetrical fuzzy numbers</article-title>
          . In: Casey,
          <string-name>
            <surname>A</surname>
          </string-name>
          . (ed.)
          <article-title>Soft Computing: Developments, Methods and Applications</article-title>
          . Series: Computer Science, technology and applications, pp.
          <fpage>1</fpage>
          -
          <lpage>38</lpage>
          . Nova Science Publishers, New York (
          <year>2016</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Kondratenko</surname>
            ,
            <given-names>Y.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kondratenko</surname>
          </string-name>
          , N.Y.:
          <article-title>Soft Computing Analytic Models for Increasing Efficiency of Fuzzy Information Processing in Decision Support Systems</article-title>
          . In: Hudson,
          <string-name>
            <surname>R</surname>
          </string-name>
          . (ed.)
          <article-title>Chapter in book: Decision Making: Processes, Behavioral Influences and Role in Business Management</article-title>
          , pp.
          <fpage>41</fpage>
          -
          <lpage>78</lpage>
          . Nova Science Publishers, New York (
          <year>2015</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Kondratenko</surname>
            ,
            <given-names>Y.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kondratenko</surname>
          </string-name>
          , N.Y.:
          <article-title>Synthesis of Analytic Models for Subtraction of Fuzzy Numbers with Various Membership Function's Shapes</article-title>
          . In:
          <string-name>
            <surname>Gil-Lafuente</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          et al. (eds.) Applied Mathematics and
          <string-name>
            <surname>Computational Intelligence. FIM</surname>
          </string-name>
          <year>2015</year>
          .
          <article-title>AISC</article-title>
          , vol.
          <volume>730</volume>
          , pp.
          <fpage>87</fpage>
          -
          <lpage>100</lpage>
          . Springer, Cham (
          <year>2018</year>
          ) DOI:
          <fpage>10</fpage>
          .1007/978-3-
          <fpage>319</fpage>
          -75792-
          <issue>6</issue>
          _
          <fpage>8</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Kondratenko</surname>
            ,
            <given-names>G.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kondratenko</surname>
            ,
            <given-names>Y.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Romanov</surname>
            ,
            <given-names>D.O.</given-names>
          </string-name>
          :
          <article-title>Fuzzy Models for Capacitative Vehicle Routing Problem in Uncertainty</article-title>
          .
          <source>In: Proc. 17th International DAAAM Symposium "Intelligent Manufacturing and Automation: Focus on Mechatronics &amp; Robotics"</source>
          , pp.
          <fpage>205</fpage>
          -
          <lpage>206</lpage>
          (
          <year>2006</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Bertoluzza</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Corral</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Salas</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>On a new class of distance between fuzzy numbers</article-title>
          .
          <source>Mathware &amp; Soft Computing</source>
          <volume>2</volume>
          ,
          <fpage>71</fpage>
          -
          <lpage>84</lpage>
          (
          <year>1995</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Abbasbandy</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Asady</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Ranking of fuzzy numbers by sign distance</article-title>
          .
          <source>Information Sciences</source>
          <volume>176</volume>
          (
          <issue>16</issue>
          ),
          <fpage>2405</fpage>
          -
          <lpage>2416</lpage>
          (
          <year>2007</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Tran</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Duckstein</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Comparison of fuzzy numbers using a fuzzy distance measure</article-title>
          .
          <source>Fuzzy sets and Systems</source>
          <volume>130</volume>
          ,
          <fpage>331</fpage>
          -
          <lpage>341</lpage>
          (
          <year>2002</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Atamanyuk</surname>
            ,
            <given-names>I.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kondratenko</surname>
            ,
            <given-names>Y.P.</given-names>
          </string-name>
          :
          <article-title>Computer's Analysis Method and Reliability Assessment of Fault-Tolerance Operation of Information Systems</article-title>
          . In: Batsakis,
          <string-name>
            <surname>S.</surname>
          </string-name>
          et al. (eds.) ICT in Education, Research and Industrial Applications: Integration, Harmonization and
          <string-name>
            <given-names>Knowledge</given-names>
            <surname>Transfer</surname>
          </string-name>
          .
          <source>Proceedings of the 11th International Conference ICTERI-2015, CEUR-WS</source>
          , vol.
          <volume>1356</volume>
          , pp.
          <fpage>507</fpage>
          -
          <lpage>522</lpage>
          (
          <year>2015</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <surname>Atamanyuk</surname>
            ,
            <given-names>I.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kondratenko</surname>
          </string-name>
          , V.Y.,
          <string-name>
            <surname>Kozlov</surname>
            ,
            <given-names>O.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kondratenko</surname>
            ,
            <given-names>Y.P.</given-names>
          </string-name>
          :
          <article-title>The Algorithm of Optimal Polynomial Extrapolation of Random Processes</article-title>
          . In: Engemann,
          <string-name>
            <given-names>K.J.</given-names>
            ,
            <surname>GilLafuente</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.M.</given-names>
            ,
            <surname>Merigo</surname>
          </string-name>
          ,
          <string-name>
            <surname>J.L</surname>
          </string-name>
          . (eds.) Modeling and Simulation in Engineering,
          <source>Economics and Management. Lecture Notes in Business Information Processing</source>
          , vol.
          <volume>115</volume>
          , pp.
          <fpage>78</fpage>
          -
          <lpage>87</lpage>
          . Springer, Berlin (
          <year>2012</year>
          ) DOI:
          <fpage>10</fpage>
          .1007/978-3-
          <fpage>642</fpage>
          -30433-
          <issue>0</issue>
          _
          <fpage>9</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <surname>Teodorovic</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pavkovich</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          :
          <article-title>The fuzzy set theory approach to the vehicle routing problem when demand at nodes is uncertain</article-title>
          .
          <source>Fuzzy Sets and Systems</source>
          <volume>82</volume>
          ,
          <fpage>307</fpage>
          -
          <lpage>317</lpage>
          (
          <year>1996</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          29.
          <string-name>
            <surname>Shahbazova</surname>
            ,
            <given-names>S.N.</given-names>
          </string-name>
          :
          <article-title>Application of Fuzzy Sets for Control of Student Knowledge</article-title>
          . An
          <source>International Journal Applied and Computational Mathematics</source>
          <volume>10</volume>
          (
          <issue>1</issue>
          ),
          <fpage>195</fpage>
          -
          <lpage>208</lpage>
          (
          <year>2011</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          30.
          <string-name>
            <surname>Chertov</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tavrov</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Memetic algorithm for solving the task of providing group anonymity</article-title>
          . In: Jamshidi,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Kreinovich</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            ,
            <surname>Kacprzyk</surname>
          </string-name>
          ,
          <string-name>
            <surname>J</surname>
          </string-name>
          . (eds.)
          <article-title>Advance Trends in Soft Computing</article-title>
          .
          <source>Studies in Fuzziness and Soft Computing</source>
          , vol.
          <volume>312</volume>
          , pp.
          <fpage>281</fpage>
          -
          <lpage>292</lpage>
          . Springer, Cham (
          <year>2014</year>
          ) DOI:
          <fpage>10</fpage>
          .1007/978-3-
          <fpage>319</fpage>
          -03674-8_
          <fpage>27</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          31.
          <string-name>
            <surname>Trunov</surname>
            ,
            <given-names>A.N.:</given-names>
          </string-name>
          <article-title>An adequacy criterion in evaluating the effectiveness of a model design process</article-title>
          .
          <source>Eastern-European Journal of Enterprise Technologies</source>
          <volume>1</volume>
          ,
          <issue>4</issue>
          (
          <issue>73</issue>
          ),
          <fpage>36</fpage>
          -
          <lpage>41</lpage>
          (
          <year>2015</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          32.
          <string-name>
            <surname>Gomolka</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dudek-Dyduch</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kondratenko</surname>
            ,
            <given-names>Y.P.</given-names>
          </string-name>
          :
          <article-title>From homogeneous network to neural nets with fractional derivative mechanism</article-title>
          . In: Rutkowski,
          <string-name>
            <surname>L.</surname>
          </string-name>
          et al. (eds.)
          <source>International Conference on Artificial Intelligence and Soft Computing</source>
          , ICAISC-2017
          <string-name>
            <surname />
            , Part
            <given-names>I</given-names>
          </string-name>
          , pp.
          <fpage>52</fpage>
          -
          <lpage>63</lpage>
          . Springer, Cham (
          <year>2017</year>
          ) DOI:
          <fpage>10</fpage>
          .1007/978-3-
          <fpage>319</fpage>
          -59063-
          <issue>9</issue>
          _
          <fpage>5</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          33.
          <string-name>
            <surname>Palagin</surname>
            ,
            <given-names>A.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Opanasenko</surname>
            ,
            <given-names>V.N.</given-names>
          </string-name>
          :
          <source>Reconfigurable Computing Technology. Cybernetics and Systems Analysis</source>
          <volume>43</volume>
          (
          <issue>5</issue>
          ),
          <fpage>675</fpage>
          -
          <lpage>686</lpage>
          (
          <year>2007</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          34.
          <string-name>
            <surname>Drozd</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Drozd</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Models, methods and means as resources for solving challenges in co-design and testing of computer systems and their components</article-title>
          .
          <source>In: Proc. 9th Intern. Conf. on Digital Technologies</source>
          , pp.
          <fpage>225</fpage>
          -
          <lpage>230</lpage>
          (
          <year>2013</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          35.
          <string-name>
            <surname>Bodyansky</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vynokurova</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pliss</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mulesa</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Multilayer Wavelet-Neuro-Fuzzy Systems in Dynamic Data Mining Tasks</article-title>
          . In: Casey,
          <string-name>
            <surname>A</surname>
          </string-name>
          . (ed.)
          <article-title>Soft Computing: Developments, Methods and Applications</article-title>
          . Series: Computer science,
          <source>technology and applications</source>
          , pp.
          <fpage>69</fpage>
          -
          <lpage>146</lpage>
          . Nova Science Publishers, NY (
          <year>2016</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          36.
          <string-name>
            <surname>Kondratenko</surname>
            ,
            <given-names>Y.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Encheva</surname>
            ,
            <given-names>S.B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sidenko</surname>
            ,
            <given-names>E.V.</given-names>
          </string-name>
          :
          <article-title>Synthesis of Inelligent Decision Support Systems for Transport Logistic</article-title>
          .
          <source>In: Proc. 6th IEEE Intern. Conf. on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications</source>
          , vol.
          <volume>2</volume>
          , pp.
          <fpage>642</fpage>
          -
          <lpage>646</lpage>
          (
          <year>2011</year>
          ) DOI:
          <fpage>10</fpage>
          .1109/IDAACS.
          <year>2011</year>
          .
          <volume>6072847</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          37.
          <string-name>
            <surname>Ragin</surname>
            ,
            <given-names>C.C.</given-names>
          </string-name>
          :
          <article-title>Redesigning Social Inquiry: Fuzzy Sets and Beyond</article-title>
          . The University of Chicago Press, Chicago, London (
          <year>2008</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          38.
          <string-name>
            <surname>Ragin</surname>
            ,
            <given-names>C.C.</given-names>
          </string-name>
          :
          <string-name>
            <surname>Fuzzy-Set Social Science</surname>
          </string-name>
          . The University of Chicago Press, Chicago, London (
          <year>2000</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          39.
          <string-name>
            <surname>Solesvik</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Partner selection in green innovation projects</article-title>
          . In:
          <string-name>
            <surname>Berger-Vachon</surname>
            <given-names>C.</given-names>
          </string-name>
          , et al. (Eds.):
          <article-title>Complex Systems: Solutions and Challenges in Economics, Management and Engineering</article-title>
          . Series:
          <article-title>Studies in Systems, Decision and Control</article-title>
          , vol.
          <volume>125</volume>
          , Springer, Cham, pp.
          <fpage>471</fpage>
          -
          <lpage>480</lpage>
          (
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref40">
        <mixed-citation>
          40.
          <string-name>
            <surname>Tkachenko</surname>
            ,
            <given-names>A.N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Brovinskaya</surname>
            ,
            <given-names>N.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kondratenko</surname>
            ,
            <given-names>Y.P.</given-names>
          </string-name>
          :
          <article-title>Evolutionary adaptation of control processes in robots operating in non-stationary environments</article-title>
          .
          <source>Mechanism and Machine Theory</source>
          <volume>18</volume>
          (
          <issue>4</issue>
          ),
          <fpage>275</fpage>
          -
          <lpage>278</lpage>
          (
          <year>1983</year>
          ) DOI:
          <fpage>10</fpage>
          .1016/
          <fpage>0094</fpage>
          -
          <lpage>114X</lpage>
          (
          <issue>83</issue>
          )
          <fpage>90118</fpage>
          -
          <lpage>0</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref41">
        <mixed-citation>
          41.
          <string-name>
            <surname>Rotshtein</surname>
            ,
            <given-names>A.P.</given-names>
          </string-name>
          :
          <article-title>Fuzzy-algorithmic reliability analysis of complex systems</article-title>
          .
          <source>Cybernetics and Systems Analysis</source>
          <volume>47</volume>
          (
          <issue>6</issue>
          ),
          <fpage>919</fpage>
          -
          <lpage>931</lpage>
          (
          <year>2011</year>
          ) DOI:
          <fpage>10</fpage>
          .1007/s10559-011-9371-x.
        </mixed-citation>
      </ref>
      <ref id="ref42">
        <mixed-citation>
          42.
          <string-name>
            <surname>Kondratenko</surname>
            ,
            <given-names>Y.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kozlov</surname>
            ,
            <given-names>O.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gerasin</surname>
            ,
            <given-names>O.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zaporozhets</surname>
            ,
            <given-names>Y.M.</given-names>
          </string-name>
          :
          <article-title>Synthesis and research of neuro-fuzzy observer of clamping force for mobile robot automatic control system</article-title>
          .
          <source>In: IEEE First International Conference on Data Stream Mining &amp; Processing (DSMP)</source>
          , pp.
          <fpage>90</fpage>
          -
          <lpage>95</lpage>
          . IEEE (
          <year>2016</year>
          ) DOI:
          <fpage>10</fpage>
          .1109/DSMP.
          <year>2016</year>
          .
          <volume>7583514</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref43">
        <mixed-citation>
          43.
          <string-name>
            <surname>Bykovyy</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pigovsky</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sachenko</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Banasik</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Fuzzy inference system for vulnerability risk estimation of perimeter security</article-title>
          .
          <source>Proceedings of the 5th IEEE International Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications</source>
          , IDAACS'
          <year>2009</year>
          , pp.
          <fpage>380</fpage>
          -
          <lpage>384</lpage>
          (
          <year>2009</year>
          ).
          <source>DOI 10</source>
          .1109/IDAACS.
          <year>2009</year>
          .5342956
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>