<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Inferential models of mental workload with defeasible argumentation and non-monotonic fuzzy reasoning: a comparative study</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Lucas Rizzo</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Luca Longo</string-name>
          <email>luca.longo@dit.ie</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>The ADAPT global centre of excellence for digital content and media innovation School of Computing, Dublin Institute of Technology</institution>
          ,
          <addr-line>Dublin</addr-line>
          ,
          <country country="IE">Ireland</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Inferences through knowledge driven approaches have been researched extensively in the eld of Arti cial Intelligence. Among such approaches argumentation theory has recently shown appealing properties for inference under uncertainty and con icting evidence. Nonetheless, there is a lack of studies which examine its inferential capacity over other quantitative theories of reasoning under uncertainty with realworld knowledge-bases. This study is focused on a comparison between argumentation theory and non-monotonic fuzzy reasoning when applied to modeling the construct of human mental workload (MWL). Di erent argument-based and non-monotonic fuzzy reasoning models, aimed at inferring the MWL imposed by a selection of learning tasks, in a third-level context, have been designed. These models are built upon knowledgebases that contain uncertain and con icting evidence provided by human experts. An analysis of the convergent and face validity of such models has been performed. Results suggest a superior inferential capacity of argument-based models over fuzzy reasoning-based models.</p>
      </abstract>
      <kwd-group>
        <kwd>Argumentation Theory</kwd>
        <kwd>Non-monotonic Reasoning</kwd>
        <kwd>Fuzzy Logics</kwd>
        <kwd>Mental workload</kwd>
        <kwd>Defeasible Reasoning</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        Uncertainty is inevitable in many real-world domains. Several theories in the
eld of Arti cial Intelligence (AI) have been studied for dealing with
quantitative reasoning under uncertainty, such as Probability calculus and its variations:
Possibility Theory and Imprecise Probabilities, Dempster-Shafer Theory,
Argumentation Theory and Multi-valued Logics like Fuzzy Logics. More speci cally,
Fuzzy Reasoning [
        <xref ref-type="bibr" rid="ref29">29</xref>
        ] and computational Argumentation Theory (AT) [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] have
been extensively used in practical domains such as medicine, pharmaceutical
industry and engineering [
        <xref ref-type="bibr" rid="ref12 ref14 ref18">14, 12, 18</xref>
        ]. On one hand, AT allows the construction
of computational models for the implementation of defeasible reasoning, or
reasoning when a conclusion can be withdrawn in the light of new evidence. On
the other hand, Fuzzy Reasoning allows the creation of models that can include
a robust representation of linguistic information and can produce rational
inferences when this is incomplete, inconsistent or ambiguous. While some works
have proposed fuzzy argumentation frameworks [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], building upon the two elds,
there is a lack of research devoted to the analysis of the inferential capacity of AT
in the context of quantitative reasoning under uncertainty. Thus, an empirical
investigation is proposed here whereby the inferential capacity of AT and
nonmonotonic fuzzy reasoning is compared. To achieve this goal, three knowledge
bases, built with the aid of an expert in the eld of Mental Workload (MWL),
are considered. In this study, the inferential capacity is quanti ed in terms of the
validity of the mental workload indexes produced by constructed models. The
speci c research question under investigation is: to what extent can defeasible
reasoning, implemented via argumentation theory, allow the construction of models
with a superior inferential capacity when compared to models implemented with
non-monotonic fuzzy reasoning?
      </p>
      <p>The rest of the paper continues with section 2 presenting related work on
fuzzy reasoning, AT and with a short description of the construct of MWL.
The design of a comparative experiment and methodologies for the development
of argument-based and fuzzy-reasoning based models are detailed in section 3.
Section 4 introduces the results followed by a discussion. Section 5 concludes the
research by highlighting its contribution and proposing future work.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Related work</title>
      <p>
        Reasoning and explanation under incomplete and uncertain knowledge have been
investigated for several decades in AI. On one hand, classical propositional logic
has demonstrated to be inadequate, due to its monotonicity property, for dealing
with real-world argumentative activities often involving inconsistent and con
icting information [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ]. On the other hand, defeasible reasoning has emerged as a
good alternative for non-monotonic activities [
        <xref ref-type="bibr" rid="ref15 ref5">5, 15</xref>
        ]. In monotonic reasoning,
the knowledge base may only grow with new facts in a monotonic fashion and
a previous conclusion cannot be retracted. Instead, reasoning is non-monotonic
when a conclusion can be retracted in the light of new evidence. It relies on the
idea that a claim can be derived from premises partially speci ed, but in the
case of an exception arising the conclusion can be withdrawn [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ].
2.1
      </p>
      <sec id="sec-2-1">
        <title>Non-monotonic fuzzy reasoning</title>
        <p>
          Fuzzy reasoning, as proposed by [
          <xref ref-type="bibr" rid="ref29">29</xref>
          ], is built upon the concept of membership
functions. This is a particular function that assigns to each proposition or
linguistic term a grade of membership in the range [
          <xref ref-type="bibr" rid="ref1">0, 1</xref>
          ] 2 R. Fuzzy sets are formed
by fuzzy propositions and have similar notions to classical set theory such as
inclusion, union and intersection. A fuzzy control system is a control system based
on fuzzy reasoning. It is usually formed by a set of inputs de ned as a fuzzy
set, a rule set and a defuzzi cation module [
          <xref ref-type="bibr" rid="ref22">22</xref>
          ]. This module is responsible for
returning the fuzzy information into the original domain of the problem and
producing a nal inference. Some works have suggested di erent extensions of
such systems that incorporate a non-monotonic layer for reasoning under
uncertainty and with con icting information. Unfortunately, these are sporadic and
not backed up by empirical research. For example, in [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ], con icting rules have
their conclusions aggregated by an averaging function; in [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ] a rule base
compression method is proposed for the reduction of non-monotonic rules; and in
[
          <xref ref-type="bibr" rid="ref27">27</xref>
          ], a third approach can be found. Here, as proposed in [
          <xref ref-type="bibr" rid="ref27">27</xref>
          ], Possibility Theory
[
          <xref ref-type="bibr" rid="ref8">8</xref>
          ] is included into the fuzzy reasoning system to handle con icting instructions.
In Possibility Theory, di erently from traditional fuzzy systems, truth values
can be represented by possibility and necessity . The rst indicates the extent
to which data fail to refute its truth while the second indicates the extent to
which data supports its truth. Both are values between [
          <xref ref-type="bibr" rid="ref1">0, 1</xref>
          ] 2 R. This theory is
employed in this study for the development of a non-monotonic fuzzy reasoning
system, being detailed in section 3, useful for comparison purposes.
2.2
        </p>
      </sec>
      <sec id="sec-2-2">
        <title>Argumentation theory</title>
        <p>
          Classical argumentation, from its roots within philosophy and psychology, deals
with the study of how arguments or assertions are de ned, discussed and solved
in case of divergent opinions. In AI, argumentation refers to that body of
literature that focuses on techniques for constructing computational models of
arguments. Such models have become increasingly important for
operationalising non-monotonic reasoning [
          <xref ref-type="bibr" rid="ref1 ref5">5, 1</xref>
          ]. Example of application areas include dialogue
and negotiation [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ], knowledge representation [
          <xref ref-type="bibr" rid="ref25">25</xref>
          ] and decision-making in
healthcare [
          <xref ref-type="bibr" rid="ref12 ref16 ref17">12, 17, 16</xref>
          ]. Argumentation systems are usually formed by several parts.
These can range from the de nition of the internal structure of arguments and
the resolution of the con icts between arguments to possible resolution
strategies for reaching justi able conclusions. A good summary of these components
and their role was presented in [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ] and depicted in gure 1. Such structure has
been already adopted in previous studies [
          <xref ref-type="bibr" rid="ref26">26</xref>
          ] and has helped with the internal
organisation of novel argument-based systems. Unfortunately, one of the main
issues surrounding argumentation theory is the lack of studies devoted to the
examination of its impact on the quality of the inferences produced by reasoning
models built upon it. This research is an attempt to investigate this issue and
the aforementioned multi-layer structure ( gure 1) is adopted.
2.3
        </p>
      </sec>
      <sec id="sec-2-3">
        <title>Mental workload</title>
        <p>
          Mental workload (MWL) can be intuitively described as the amount of cognitive
activity exerted to accomplish a speci c task under a nite period of time [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ].
There are di erent classes of methods that have been proposed for measuring
MWL [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ]: self-reporting, primary task performance and physiological methods.
In this work the class of self-reporting measures is adopted. This class relies on
the analysis of the subjective feedback provided by humans interacting with an
underlying system or on a certain cognitive task. Among well known methods,
the NASA-Task Load Index (NASA-TLX) has been largely employed in the last
2) con icts of arguments
        </p>
        <p>Translation of
knowledge-base
into interactive
defeasible arguments</p>
        <p>Elicitation of
knowledge-base and
resolution of
inconsistencies
3) evaluation of con icts</p>
        <p>Final
inference</p>
        <p>4) dialectical
status of arguments</p>
        <p>
          5) accrual of
acceptable arguments
few decades [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ]. It is a combination of six factors believed to in uence mental
workload: mental, temporal and physical demand, stress, e ort and performance.
Each factor is quanti ed with a subjective judgement coupled with a weight w
computed via a paired comparison procedure. The questionnaire designed for the
quanti cation of each factor can be found in [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ]. Eventually, the nal MWL score
is computed as a weighted average, considering the subjective rating associated
to each attribute di (for the 6 dimensions) and the correspondent weights wi:
TLXMWL = Pi6=1 di wi 115 . Several criteria have been proposed and widely
used in psychology for the validation of measures of mental workload [
          <xref ref-type="bibr" rid="ref21">21</xref>
          ] such
as: reliability, validity, sensitivity and diagnosticity among others. This paper
focuses particularly on validity and in details on two forms:
        </p>
        <p>
          face validity { it determines the extent to which a measure of MWL appears
e ective in terms of its stated aims (measuring mental workload);
convergent validity { it refers to the extent to which di erent MWL measures
that should be theoretically related, are in fact related [
          <xref ref-type="bibr" rid="ref28">28</xref>
          ].
3
        </p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Design and methodology</title>
      <p>A primary research study was designed and it included a comparison between the
inferential capacity of AT and non-monotonic fuzzy reasoning considering three
knowledge-bases produced within the MWL domain. It is demonstrated how
these knowledge-bases, built by an expert upon the features extracted from the
original NASA-TLX mental workload assessment technique (as per section 2.3),
can be translated into defeasible argument-based models and into non-monotonic
fuzzy reasoning models. Three main parts compose the non-monotonic fuzzy
reasoning models: a fuzzi cation module, an inference engine and a defuzzi cation
module. Argument-based models are de ned as in gure 1 (section 2.2). A
comparison of the inference produced by fuzzy reasoning and AT was made in terms
of their di erences in convergent and face validity. Employed data was
composed by the answers of the NASA-TLX questionnaire from 213 students who
performed di erent learning tasks in third-level classes. The overall design of the
research is summarised in gure 2. Due to space constraints, the full
knowledgebases produced by the expert with the aid of the authors can be seen online1.
1 https://doi.org/10.6084/m9.figshare.6979865.v1
Knowledge-base 1</p>
      <p>Knowledge-base 2
Non-monotonic fuzzy</p>
      <p>reasoning models
1. Fuzzi cation
2. Inference engine
3. Defuzzi cation</p>
      <p>Dataset</p>
      <p>Knowledge-base 3</p>
      <p>Construction of
reasoning models
Argument-based models
1. Structure of arguments
2. Con icts of arguments
3. Evaluation of con icts
4. Dialectical status
5. Accrual of arguments</p>
      <p>Fuzzy Argument-based
models inferences models inferences</p>
      <p>Validity
comparison</p>
      <sec id="sec-3-1">
        <title>Non-monotonic fuzzy reasoning models</title>
        <p>Fuzzi cation module The knowledge-bases of the interviewed expert can be
represented by rules of the form \IF ... THEN ...". The antecedent (before
THEN) is a set of premises associated to a number of workload attributes, while
the consequent (after THEN) is associated to a possible MWL level. Examples:
- Rule 1: IF low mental demand THEN underload
- Rule 2: IF low effort THEN tting load</p>
        <p>
          Each MWL level (consequent of a rule) was described by a number of FMFs
in di erent ways ( gure 3). According to the domain expert's knowledge two
options were designed: from [0, 100] having 4 membership functions associated to
it and from [
          <xref ref-type="bibr" rid="ref20">0, 20</xref>
          ] having 5 membership functions. Fuzzy membership functions
(FMF) were also de ned for all linguistic variables present in the
knowledgebase such as low mental demand and low effort. Figure 4 show some examples
of FMFs designed following the expert's opinion. Their inputs were normalised
according to their possible minimum and maximum values to follow the same
universe adopted for the MWL levels.
Inference engine Once the knowledge-base of the expert is fully translated
into rules within the fuzzi cation module, fuzzy inferences can be performed.
Unfortunately, a high amount of contradicting information is provided by the
expert in the knowledge-bases which needs to be rstly solved. For example, the
expert expressed the following contradiction in natural language: `If high e ort
then mental demand cannot be low'. This information indicates that if effort
is high then any rule whose antecedent contains \low mental demand" is being
refuted and should be re-evaluated in order to change or not its truth value. An
example is given by the following rule:
        </p>
        <p>
          - Exception 1: high effort refutes Rule 1
Exceptions can be tackled by Possibility Theory, as implemented in [
          <xref ref-type="bibr" rid="ref27">27</xref>
          ] for fuzzy
reasoning with rule based systems. In this case truth values are represented by
possibility (Pos) and necessity (Nec) as de ned in Section 3.1. Both are values
between [
          <xref ref-type="bibr" rid="ref1">0, 1</xref>
          ] 2 R. Possibility of a proposition can also be seen as the upper
bound of the respective necessity (Pos Nec). In this study, necessity represents
the membership grade of a proposition and possibility is always 1 for all
propositions. Under these circumstances, the e ect on the necessity of a proposition
A by a set of propositions Q which refutes A is derivable in [
          <xref ref-type="bibr" rid="ref27">27</xref>
          ] and given by:
N ec(A) = min(N ec(A); :N ec(Q1); : : : ; :N ec(Qn))
(1)
Where :N ec(Q) = 1 N ec(Q). In this study, there is no addition of supporting
information but only attempts to refute information. Thus, equation (1) can deal
with the contradictions in the knowledge-bases. For instance, the truth value of
Rule 1, supposing that it is refuted only by Exception 1, is given by:
- Truth value of Rule 1 = min (Nec(low mental demand), 1 - Nec(high effort))
Nec(low mental demand) is the membership grade of the linguistic variable low
of the attribute mental demand. For instance, if mental demand = 1, then
Nec(low mental demand) = 1, according to the membership function low of
gure 4. Also, for instance, if N ec(high effort) = 0 note that Exception 1 has
no impact on Rule 1 and if Nec(high effort) = 1 the new truth value of Rule 1
is 0. Values between 1 and 0 indicates that Rule 1 is partially refuted. The truth
value of Rule 1 represents the truth value of underload in this particular rule.
        </p>
        <p>
          It is important to highlight that the theory developed in [
          <xref ref-type="bibr" rid="ref27">27</xref>
          ] had in mind
a multi-step forward-chaining reasoning system. In this study, the reasoning is
done in a single step, in the sense that data is imported and all rules are red
at once. However, it is possible to de ne a precedence order of refutations. More
exactly, it is possible to de ne a tree structure in which the consequent of a
refutation is the antecedent of the next refutation. In this way, equation (1) can
be applied from the root or roots to the leaves. This approach is su cient for
knowledge-bases that do not contain cyclic exceptions, but that is not the case
here. For instance suppose the following IF-THEN rules and their refutations:
- Rule 3: IF low temporal demand THEN underload
- Rule 4: IF high frustration THEN overload
- Exception 2: low temporal demand refutes Rule 4
- Exception 3: high frustration refutes Rule 3
In this case it is not clear if exceptions 2 or 3 should be solved rst. Given that
there is no information on the knowledge-bases to decide whether an attribute
(premise of a rule) or an exception is more important, here they are solved
simultaneously. Firstly, the truth value of all rules are stored before solving any
cyclic exceptions. For instance, the truth values of Rule 3 and 4 are:
- Temp1 = Nec(Rule 3) = Nec(low temporal demand)
- Temp2 = Nec(Rule 4) = Nec(high frustration)
- Truth value Rule 3 = min (Nec(low temporal demand), 1 - Temp2))
- Truth value Rule 4 = min (Nec(high frustration), 1 - Temp1))
Having a mechanism to solve con icts, fuzzy operators can be applied on
antecedents of IF-THEN rules and for the aggregation of the consequents (MWL
levels) across the rules. Three known operators are selected for investigation:
Zadeh, Product and Lukasiewicz. Table 1 lists the t-norms and t-conorms (fuzzy
AND and fuzzy OR) respectively for each operator. Antecedents might employ
OR or/and AND, while consequents (MWL levels) are aggregated only by the
OR operator. For instance, the truth value of underload in a context where only
Rule 1 and Rule 3 infer underload is \Nec(Rule 1) OR Nec(Rule 3)".
Defuzzi cation module The output of the inference engine is a graphic
representation of the aggregation of consequents (MWL levels), as depicted in gure
5 with an example. Several methods can be used for calculating a single
defuzzied scalar. Two are selected here: mean of max and centroid. The rst returns
the average of all elements (here MWL levels) with maximal membership grade.
The second returns the coordinates (x, y) of the center of gravity of the
geometric shape formed by the aggregation of the membership functions associated to
each MWL level. The defuzzi ed scalar is represented then by the x coordinate
of the centroid. Finally, a set of models is constructed with di erent fuzzy logic
operators and defuzzi cation techniques, as listed in table 2.
Fig. 5: An example of the defuzzi cation process whereby an aggregation of 5
membership functions associated to 5 MWL level. The nal truth values in this example are:
underload = 1, tting lower = 0.83, tting load = 1, tting upper = 1 and overload =
0. The coordinates of the centroid are (6.89, 0.39) and the mean of max is 7.12.
The de nition of argument based-models follows the 5 layer modelling approach
proposed in [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ] and depicted on gure 1 (section 2.2).
        </p>
      </sec>
      <sec id="sec-3-2">
        <title>Layer 1 - De nition of the structure of arguments The rst step focuses</title>
        <p>on the construction of forecast arguments as it follows:</p>
        <p>F orecast argument : premises ! conclusion
This structure is composed by a set of premises built upon the features
considered in the NASA-TLX mental workload assessment instrument and a
conclusion (MWL level) derivable by applying an inference rule !. The categories
2 https://doi.org/10.6084/m9.figshare.6979865.v1
associated to these conclusions are the same as the ones described in section
3.1. However, since no notion of gradualism is considered here, they are strictly
bounded in well de ned ranges (example, low mental demand in one
knowledgebase is de ned in the range [0; 33) 2 R). An example of a forecast argument is
given below (it matches Rule 1 of section 3.1):</p>
        <p>ARG 1: low mental demand ! underload</p>
      </sec>
      <sec id="sec-3-3">
        <title>Layer 2 - De nition of the con icts of arguments In order to evaluate</title>
        <p>
          inconsistencies and invalid arguments, mitigating arguments [
          <xref ref-type="bibr" rid="ref19">19</xref>
          ] are de ned.
These are formed by a set of premises and an undercutting inference ) to an
argument B (forecast or mitigating):
        </p>
        <p>
          M itigating argument : premises ) B
Both forecast and mitigating arguments follow a similar notion of defeasible rules,
as de ned in [
          <xref ref-type="bibr" rid="ref23">23</xref>
          ]. Informally, if their premises hold then presumably their
conclusions also hold. In addition, mitigating arguments can be of di erent types.
In this research, the notion of undercutting attack is employed for the resolution
of con icts. It de nes an exception, where the application of the knowledge
carried in some argument is no longer allowed. Contradictions, such as in section
3.1, represent the information necessary for the construction of undercutting
attacks. For example, the corresponding mitigating argument that can be
constructed from Exception 1 (section 3.1) through an undercutting attack is:
        </p>
        <p>UA1: high effort ) ARG 1
All the designed arguments and attacks can now be seen as an argumentation
framework (AF), as depicted in gure 6.</p>
      </sec>
      <sec id="sec-3-4">
        <title>Layer 3 - Evaluation of the con icts of arguments At this stage an AF</title>
        <p>
          can be elicited with data. Forecast and mitigating arguments can be activated
or discarded, based on whether their premises evaluate true or false. Attacks
between activated arguments are considered valid, while the others are discarded.
Contrarily to fuzzy systems, there is no partial refutation, so a successful attack
always refutes its target. From the activated forecast/mitigating arguments and
valid attacks, a sub-argumentation framework emerges (sub-AF), as in gure 7
(this is equivalent to the Abstract Argumentation proposed by Dung [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ]).
Layer 4 - De nition of the dialectical status of arguments Given a
sub-AF acceptability semantics [
          <xref ref-type="bibr" rid="ref7 ref9">7, 9</xref>
          ] are applied in order to accept or reject
its arguments. Each record of the dataset instantiates a di erent sub-AF, thus
semantics have to applied for each di erent case. These are aimed at evaluating
which arguments are defeated. An argument A is defeated by B if there is a
valid attack from A to B [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ]. Not only that, but it is also necessary to evaluate if
the defeaters are defeated themselves. A set of non defeated arguments is called
extension (con ict free set of arguments). Extensions are in turn used in the
5th layer of the diagram of gure 1, to produce a nal inference. The internal
structure of arguments is not considered in this layer, that is why the de nition
of sub-AF here is equivalent to the notion of abstract argumentation framework
(AAF) as proposed by Dung [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ]. An AAF is a pair &lt; Arg; attacks &gt; where: Arg
is a nite set of abstract arguments, attacks Arg Arg is binary relation over
Arg. Given sets X; Y Arg, X attacks Y if and only if there exists x 2 X and
y 2 Y such that (x; y) 2 attacks. A set X Arg of argument is:
- admissible i X does not attack itself and X attacks every set of arguments
        </p>
        <p>Y such that Y attacks X;
- complete i X is admissible and X contains all arguments it defends, where</p>
        <p>X defends x if and only if X attacks all attackers of x;
- grounded i X is minimally complete (with respect to );
- preferred i X is maximally admissible (with respect to )</p>
      </sec>
      <sec id="sec-3-5">
        <title>Layer 5 - Accrual of acceptable arguments Eventually, in the last step of</title>
        <p>
          the reasoning process, a nal inference has to be produced for practical purposes.
In case multiple extensions are computed, one extension might be preferred over
the others. In this study, the cardinality of an extension (number of accepted
arguments) is used as a mechanism for the quanti cation of its credibility.
Intuitively, a larger con ict-free extension of arguments might be seen as more
credible than smaller extensions. In case some of the computed extensions have the
same highest cardinality, these are all brought forward in the reasoning process.
After the selection of the larger extension/s, a single scalar is produced through
the accrual of its/their arguments. This is de ned by the set of accepted forecast
arguments within an extension (those that support a MWL level). Mitigating
arguments already had their role by contributing to the resolution of con icting
information (layer 4) and thus are not considered in this layer. For each
forecast argument, a nal scalar is generated for its representation. This scalar is
essentially a linear relationship from the range of the argument's premise to the
range of the argument's conclusion. For instance, if argument ARG 1 is
activated by the lowest value of the mental demand range, then its nal scalar will
be the correspondent lowest value in its conclusion's range. The overall MWL
level brought forward by an extension is computed by aggregating the scalars of
its forecast arguments. This aggregation can be done in di erent ways, for
instance considering measures of central tendency. Here, the average is considered.
Table 3 summarises the design of the argument-based models.
A number of third-level classes have been delivered to students at Dublin
Institute of Technology. After each class, students had to ll in the questionnaire
associated to the NASA-TLX instrument (as described in section 2.3). Students
were from 23 di erent countries (age 21-74, mean 30.9, std= 7.67). Four di
erent topics of the module `research methods' were delivered in di erent semesters
during the academic terms 2015-2017, as per table 4. Three di erent delivery
methods were used: 1) traditional direct instruction, using slides projected to a
white board; 2) multimedia video of content (same as in 1) projected to a white
board; 3) constructivist collaborative activity added to 2. Summary statistics
can be found in table 4. Beside completing the NASA-TLX questionnaire,
participants were required to ll in another scale providing an indication of their
experienced mental workload ( gure 8). This was designed as a baseline and as
a form of ground truth. It is believe that only the person executing the task can
provide a precise account of the mental workload experienced [
          <xref ref-type="bibr" rid="ref20">20</xref>
          ].
        </p>
        <p>In details, in order to evaluate the inferential capacity of the models (built
in tables 2 and 3) two forms of the validity of their inferences (scalar values)
were adopted. As suggested in section 2.3, these are convergent validity and face
validity. The former has been assessed through an analysis of the correlation of
the inferences, produced by designed models, and the scores produced by the
Nasa-Task Load Index. The latter has been assessed through an investigation
of the error of designed models against the mental workload scores reported
by students, using the scale of gure 8. Table 5 summarises these two forms of
validity and the statistical test associated to them.
The answers of the NASA-TLX questionnaire were used to elicit the designed
non-monotonic fuzzy reasoning and argument-based models (tables 2, 3).</p>
        <p>Convergent validity Figure 9 depicts the Spearman correlation coe cients
of the inferences of the designed models and the NASA-TLX indexes. This
statis3 MSE = n1 Pin=1 Yi</p>
        <p>2</p>
        <p>Xi , where Y is the vector of inferences made by designed
models and X the vector of self-reported values.
tical test was used because the assumptions behind the Pearson correlation were
not met. Moderate to high correlation (coe cients: 0.50-0.76) were generally
observed. This indicates that, the assumption of the theoretical relationship
between the NASA-TLX measure, known to fairly model the construct of mental
workload, and the designed models in fact exists. As a consequence, it can be
said that the non-monotonic fuzzy reasoning models and the argument-based
models are fairly modelling mental workload in the designed experiment,
regardless of the operators used to aggregate premises of fuzzy rules (Zadeh, Product,
Lukasiewicz) or the semantics used in layer 4 (grounded/preferred).</p>
        <p>Face validity Figure 10 depicts the mean squared errors of the inferences
(scalar values) of each designed model. As it is easy to observe, argument-based
models had a lower error when compared to the baseline instrument
(NASATLX). The average of MSEs associated to fuzzy reasoning models (F1-18) was
407:75 while the average of MSEs of argument-based models (A1-6) was 229:83.
Additionally, among the fuzzy reasoning models, the di erence in the scores of
those employing the centroid as defuzzi cation method (labelled with an
upper dot) appear to be better than the ones employing the mean of max. As for
argument-based models, there is only a slight di erence across knowledge-bases
and no signi cant di erence among semantics (grounded/preferred). It is
important to highlight that knowledge-base KB3 is certainly richer than KB1 and
KB2, as it carries more interacting pieces of knowledge ( gure 6). Despite this
higher richness, the mean squared error did not decrease signi cantly when
compared to KB1 and KB2 both for the fuzzy reasoning or argument-based models.
However, when comparing the mean squared error of the fuzzy reasoning models
against the ones of the argument-based models, it can be stated that the
latter have a better inferential capacity over the former for the speci c tasks and
dataset employed. This statement holds regardless of the fuzzy operators
employed in the fuzzy engines (fuzzy reasoning models); the semantics adopted in
the con ict resolution layer (argument-based models); and the knowledge-bases
considered.
Argumentation, overall, had a better face validity and was superior in
approximating the target (self-reported mental workload reported by students)
than non-monotonic fuzzy reasoning. An analysis of the convergent validity of
the models showed that their inferences can be considered valid. They are
positively and moderately correlated to the well known (NASA-TLX), thus likely
modelling mental workload too. A negative or null correlation would have
implied the invalidity of the models since they would have probably modelled
another construct. With a good convergent validity, the ndings from the analysis
of the face validity can be considered more reliable. This analysis indicated a
better inferential capacity of the argument-based models over the fuzzy
reasoning models for the selected tasks and data, despite the internal con guration
and underlying knowledge-base employed. Argument-based models consistently
showed a signi cantly lower mean squared error (di erence between self-reported
MWL and the inferences by designed models) over fuzzy reasoning models, in
addition to a slight improvement also against the baseline instrument
(NASATLX). This demonstrates the potential of argumentation as a modelling tool for
knowledge-bases characterised by uncertainty, partiality and con ictual info.
5</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Conclusion and future work</title>
      <p>
        This study presented a comparison between non-monotonic fuzzy reasoning and
non-nonotonic (defeasible) argumentation using three di erent knowledge-bases
coded from an expert in the domain of mental workload. A primary research has
been conducted including the construction of computational models using these
two non-monotonic reasoning approaches to represent the construct of mental
workload and to allow its assessment (inference). Such models were elicited with
data provided by the NASA-Task Load Index questionnaire that was lled in by
students who performed a set of learning tasks in a third-level context. The
output of these models was a single scalar representing a level of mental workload
that was used for comparison purposes. The selected metrics for evaluation of
the inferential capacity of constructed models were convergent and face validity.
Findings indicated how both the models built with the non-monotonic fuzzy
reasoning mechanism and defeasible argumentation had a good convergent validity
with the NASA-TLX, con rming mental workload was actually the construct
being modelled. However, the argument-based models had a signi cantly
better face validity over the non-monotonic fuzzy reasoning models for the selected
tasks and data. The novelty of this research lies in the quanti cation of the
impact of argumentation through a novel empirical research in a real-world context
employing primary data gathered from humans. Future work will concentrate on
replicating this experiment by considering additional knowledge-bases and by
extending the comparison of argumentation with other reasoning approaches such
as expert systems. Moreover, the creation of inference models adopting fuzzy
reasoning and argumentation such as in [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] is envisioned.
      </p>
    </sec>
    <sec id="sec-5">
      <title>Acknowledgments</title>
      <p>Lucas Middeldorf Rizzo would like to thank CNPq (Conselho Nacional de
Desenvolvimento Cient co e Tecnologico) for his Science Without Borders scholarship,
proc n. 232822/2014-0.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Bench-Capon</surname>
            ,
            <given-names>T.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dunne</surname>
            ,
            <given-names>P.E.</given-names>
          </string-name>
          :
          <article-title>Argumentation in arti cial intelligence</article-title>
          .
          <source>Arti cial intelligence</source>
          <volume>171</volume>
          (
          <fpage>10</fpage>
          -
          <lpage>15</lpage>
          ),
          <volume>619</volume>
          {
          <fpage>641</fpage>
          (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Bryant</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Krause</surname>
            ,
            <given-names>P.:</given-names>
          </string-name>
          <article-title>A review of current defeasible reasoning implementations</article-title>
          .
          <source>The Knowledge Engineering Review</source>
          <volume>23</volume>
          (
          <issue>3</issue>
          ),
          <volume>227</volume>
          {
          <fpage>260</fpage>
          (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Cain</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>A review of the mental workload literature</article-title>
          .
          <source>Tech. rep., Defence research and development Toronto (Canada)</source>
          (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Castro</surname>
            ,
            <given-names>J.L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Trillas</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zurita</surname>
            ,
            <given-names>J.M.</given-names>
          </string-name>
          :
          <article-title>Non-monotonic fuzzy reasoning</article-title>
          .
          <source>Fuzzy Sets and Systems</source>
          <volume>94</volume>
          (
          <issue>2</issue>
          ),
          <volume>217</volume>
          {
          <fpage>225</fpage>
          (
          <year>1998</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5. Chesn~evar,
          <string-name>
            <given-names>C.I.</given-names>
            ,
            <surname>Maguitman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.G.</given-names>
            ,
            <surname>Loui</surname>
          </string-name>
          ,
          <string-name>
            <surname>R.P.</surname>
          </string-name>
          :
          <article-title>Logical models of argument</article-title>
          .
          <source>ACM Computing Surveys (CSUR) 32(4)</source>
          ,
          <volume>337</volume>
          {
          <fpage>383</fpage>
          (
          <year>2000</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Dondio</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Propagating degrees of truth on an argumentation framework: an abstract account of fuzzy argumentation</article-title>
          .
          <source>In: Proceedings of the Symposium on Applied Computing</source>
          . pp.
          <volume>995</volume>
          {
          <fpage>1002</fpage>
          .
          <string-name>
            <surname>ACM</surname>
          </string-name>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Dondio</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Ranking semantics based on subgraphs analysis</article-title>
          .
          <source>In: Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems</source>
          . pp.
          <volume>1132</volume>
          {
          <fpage>1140</fpage>
          . AAMAS '18,
          <string-name>
            <surname>International</surname>
            <given-names>Foundation</given-names>
          </string-name>
          <source>for Autonomous Agents and Multiagent Systems</source>
          , Richland,
          <string-name>
            <surname>SC</surname>
          </string-name>
          (
          <year>2018</year>
          ), http://dl.acm.org/citation.cfm?id=
          <volume>3237383</volume>
          .
          <fpage>3237864</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Dubois</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Prade</surname>
          </string-name>
          , H.:
          <article-title>Possibility theory: qualitative and quantitative aspects</article-title>
          .
          <source>In: Quanti ed representation of uncertainty and imprecision</source>
          , pp.
          <volume>169</volume>
          {
          <issue>226</issue>
          (
          <year>1998</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Dung</surname>
            ,
            <given-names>P.M.</given-names>
          </string-name>
          :
          <article-title>On the acceptability of arguments and its fundamental role in nonmonotonic reasoning, logic programming and n-person games</article-title>
          .
          <source>Arti cial intelligence</source>
          <volume>77</volume>
          (
          <issue>2</issue>
          ),
          <volume>321</volume>
          {
          <fpage>358</fpage>
          (
          <year>1995</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Eggemeier</surname>
            ,
            <given-names>F.T.</given-names>
          </string-name>
          :
          <article-title>Properties of workload assessment techniques</article-title>
          .
          <source>Advances in Psychology 52</source>
          ,
          <issue>41</issue>
          {
          <fpage>62</fpage>
          (
          <year>1988</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Gegov</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gobalakrishnan</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sanders</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Rule base compression in fuzzy systems by ltration of non-monotonic rules</article-title>
          .
          <source>Journal of Intelligent &amp; Fuzzy Systems</source>
          <volume>27</volume>
          (
          <issue>4</issue>
          ),
          <year>2029</year>
          {
          <year>2043</year>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Glasspool</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fox</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Oettinger</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Smith-Spark</surname>
            ,
            <given-names>J.:</given-names>
          </string-name>
          <article-title>Argumentation in decision support for medical care planning for patients and clinicians</article-title>
          .
          <source>In: AAAI Spring Symposium: Argumentation for Consumers of Healthcare</source>
          . pp.
          <volume>58</volume>
          {
          <issue>63</issue>
          (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Hart</surname>
            ,
            <given-names>S.G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Staveland</surname>
            ,
            <given-names>L.E.</given-names>
          </string-name>
          :
          <article-title>Development of NASA-TLX (Task Load Index): Results of Empirical and Theoretical Research</article-title>
          . Advances in Psychology 52(C),
          <volume>139</volume>
          {
          <fpage>183</fpage>
          (
          <year>1988</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Longo</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Argumentation for knowledge representation, con ict resolution, defeasible inference and its integration with machine learning</article-title>
          .
          <source>In: Machine Learning for Health Informatics</source>
          , pp.
          <volume>183</volume>
          {
          <fpage>208</fpage>
          . Springer (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Longo</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dondio</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Defeasible reasoning and argument-based systems in medical elds: An informal overview</article-title>
          .
          <source>In: Computer-Based Medical Systems (CBMS)</source>
          ,
          <year>2014</year>
          IEEE 27th International Symposium on. pp.
          <volume>376</volume>
          {
          <fpage>381</fpage>
          .
          <string-name>
            <surname>IEEE</surname>
          </string-name>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Longo</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hederman</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Argumentation Theory for Decision Support in HealthCare: A Comparison with Machine Learning</article-title>
          , pp.
          <volume>168</volume>
          {
          <fpage>180</fpage>
          . Springer, Cham (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Longo</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kane</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hederman</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Argumentation theory in health care</article-title>
          .
          <source>In: Computer-Based Medical Systems (CBMS)</source>
          ,
          <year>2012</year>
          25th International Symposium on. pp.
          <volume>1</volume>
          {
          <issue>6</issue>
          .
          <string-name>
            <surname>IEEE</surname>
          </string-name>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Mardani</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jusoh</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zavadskas</surname>
            ,
            <given-names>E.K.</given-names>
          </string-name>
          :
          <article-title>Fuzzy multiple criteria decision-making techniques and applications{two decades review from 1994 to 2014</article-title>
          .
          <source>Expert Systems with Applications</source>
          <volume>42</volume>
          (
          <issue>8</issue>
          ),
          <volume>4126</volume>
          {
          <fpage>4148</fpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Matt</surname>
            ,
            <given-names>P.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Morgem</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Toni</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Combining statistics and arguments to compute trust</article-title>
          .
          <source>In: 9th International Conference on Autonomous Agents and Multiagent Systems</source>
          , Toronto, Canada. vol.
          <volume>1</volume>
          , pp.
          <volume>209</volume>
          {
          <fpage>216</fpage>
          .
          <string-name>
            <surname>ACM</surname>
          </string-name>
          (May
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Moustafa</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Luz</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Longo</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Assessment of mental workload: a comparison of machine learning methods and subjective assessment techniques</article-title>
          .
          <source>In: Int. Symposium on Human Mental Workload: Models and Applications</source>
          . pp.
          <volume>30</volume>
          {
          <issue>50</issue>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <given-names>O</given-names>
            <surname>'Donnell</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            ,
            <surname>Eggemeier</surname>
          </string-name>
          ,
          <string-name>
            <surname>F.</surname>
          </string-name>
          :
          <article-title>Workload assessment methodology</article-title>
          .
          <source>Handbook of Perception and Human Performance</source>
          . Volume
          <volume>2</volume>
          .
          <string-name>
            <given-names>Cognitive</given-names>
            <surname>Processes</surname>
          </string-name>
          and
          <string-name>
            <given-names>Performance. KR</given-names>
            <surname>Bo</surname>
          </string-name>
          , L. Kaufman and JP Thomas. John Wiley and Sons, Inc (
          <year>1986</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Passino</surname>
            ,
            <given-names>K.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yurkovich</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Reinfrank</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Fuzzy control</article-title>
          , vol.
          <volume>20</volume>
          .
          <string-name>
            <surname>Citeseer</surname>
          </string-name>
          (
          <year>1998</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Prakken</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          :
          <article-title>An abstract framework for argumentation with structured arguments</article-title>
          .
          <source>Argument and Computation</source>
          <volume>1</volume>
          (
          <issue>2</issue>
          ),
          <volume>93</volume>
          {
          <fpage>124</fpage>
          (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Reiter</surname>
            ,
            <given-names>R.:</given-names>
          </string-name>
          <article-title>A logic for default reasoning</article-title>
          .
          <source>Arti cial intelligence</source>
          <volume>13</volume>
          (1
          <issue>-2</issue>
          ),
          <volume>81</volume>
          {
          <fpage>132</fpage>
          (
          <year>1980</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Rizzo</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Longo</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Representing and inferring mental workload via defeasible reasoning: a comparison with the nasa task load index and the workload pro le</article-title>
          .
          <source>In: 1st Workshop on Advances In Argumentation In Arti cial Intelligence</source>
          . pp.
          <volume>126</volume>
          {
          <issue>140</issue>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Rizzo</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Majnaric</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dondio</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Longo</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>An investigation of argumentation theory for the prediction of survival in elderly using biomarkers</article-title>
          .
          <source>In: IFIP International Conference on Arti cial Intelligence Applications and Innovations</source>
          . pp.
          <volume>385</volume>
          {
          <fpage>397</fpage>
          . Springer (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <surname>Siler</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Buckley</surname>
            ,
            <given-names>J.J.:</given-names>
          </string-name>
          <article-title>Fuzzy expert systems and fuzzy reasoning</article-title>
          . John Wiley &amp; Sons (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <surname>Tsang</surname>
            ,
            <given-names>P.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Velazquez</surname>
            ,
            <given-names>V.L.</given-names>
          </string-name>
          :
          <article-title>Diagnosticity and multidimensional subjective workload ratings</article-title>
          .
          <source>Ergonomics</source>
          <volume>39</volume>
          (
          <issue>3</issue>
          ),
          <volume>358</volume>
          {
          <fpage>381</fpage>
          (
          <year>1996</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          29.
          <string-name>
            <surname>Zadeh</surname>
            ,
            <given-names>L.A.</given-names>
          </string-name>
          , et al.:
          <article-title>Fuzzy sets</article-title>
          .
          <source>Information and control 8</source>
          (
          <issue>3</issue>
          ),
          <volume>338</volume>
          {
          <fpage>353</fpage>
          (
          <year>1965</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>