Computational Intelligence - August 2012 - 38

FSs

Words

Encoder

CWW Engine

FSs

Recommendation
Decoder
+ Data

FIGURE 1 Architecture for the Perceptual Computer (Per-C).

applications, whereas others are not. This article explains what
the obstacles are and how they were overcome. The ones that
are application-dependent are explained in the context of three
specific applications: Investment decision making, social judgment making, and distributed decision-making. These applications are explained in more detail in Section III.
Definition 1: The centroid of an IT2 FS Au , C Au , is an interval
of numbers [c l, c r ] , where

/ Ni = 1 x i n (x i)
cl =
min
6n (x ) ! [ n (x ), n (x )]
/ Ni = 1 n (x i)
/ Ni = 1 x i n (x i)
cr =
max
.
6n (x ) ! [ n (x ), n (x )]
/ Ni = 1 n (x i)
i

i

Au

u
A

i

i

Au

Au

c Au = (c l + c r ) /2. X

(1)

II. Application-Independent Challenges
and How They Were Overcome

To operate the Per-C shown in Fig. 1, one needs to be able to
construct the encoder, the CWW engine and the decoder, all
of which pose some application-independent challenges. Next
we will explain these challenges and how they were overcome.
A. Encoder

i

i

c l and c r are computed by the KM [4] or EKM [28] Algorithms. The more uncertainty in Au (i.e., the more area in its
FOU), the wider the centroid. The average centroid (center of
centroid) of Au is defined as

Box 2: Interval Type-2 Fuzzy Sets
u is described by its footAn interval type-2 fuzzy set (IT2 FS) A
u ) (Fig. 2), which can be thought of
print of uncertainty FOU (A
as the blurring of a type-1 membership function (MF). The FOU
is completely described by its two bounding functions, a lower
u ) = n u (x) and an upper
membership function (LMF) LMF (A
A
u ) = nr Au (x) , both of which
membership function (UMF) UMF (A
are type-1 FSs. Consequently, it is possible to use type-1 FS
mathematics to characterize and work with IT2 FSs. For lots
more information about IT2 FSs, see, e.g. [2], [11], [15].

Our first challenge (all challenges are summarized in Table 6) in
implementing the Per-C was how to transform words into IT2
FSs, i.e., the encoding problem. Our solution requires: (1) a
continuous scale for each variable of interest, and (2) a vocabulary of words that covers the entire scale. Our methods are
described for the continuous scale numbered 0-10. One begins
by establishing a vocabulary of application-dependent words
that is large enough so a person will feel linguistically comfortable interacting with the Per-C. This vocabulary must include
subsets of words that feel, to each subject, like they will collecu i , in the
tively cover the scale 0-10. The collection of words, W
u i) , constitutes a
vocabulary and their IT2 FS models, FOU (W
codebook for an application ( A ), that is, Codebook ( A )=
u i, FOU (W
u i)), i = 1, ..., N A} .
{(W
We then randomize the words in the vocabulary and survey a group of subjects to provide end-point data for the
words on the scale. The subjects are asked the following question: On a scale of 0-10, what are the end-points of an interval that
you associate with the word -? Once enough data intervals (e.g.,
30) have been obtained, they can be processed by the Interval
Approach (IA) ([7]; see also Box 3) to obtain an IT2 FS model
for each word.
B. CWW Engine

u
~
A

~
UMF (A)

1
~
FOU (A)
~
LMF (A)
x
FIGURE 2 FOU for an IT2 FS Au .

38

IEEE COMPUTATIONAL INTELLIGENCE MAGAZINE | AUGUST 2012

Next we consider how to construct the CWW engine, which
maps IT2 FSs into IT2 FSs. There are different kinds of CWW
engines, e.g.,
1) The novel weighted average (NWA) [19]. Aggregation of
numerical subcriteria (data, features, decisions, recommendations, judgments, scores, etc.) obtained by using a
weighted average of those numbers is quite common
and widely used. In many situations, however, providing
a single number for either the subcriteria or weights is
problematic (there could be uncertainties about them),
and it is more meaningful to provide uniformly-weighted intervals, non-uniformly-weighted intervals (T1 FSs),



Table of Contents for the Digital Edition of Computational Intelligence - August 2012

Computational Intelligence - August 2012 - Cover1
Computational Intelligence - August 2012 - Cover2
Computational Intelligence - August 2012 - 1
Computational Intelligence - August 2012 - 2
Computational Intelligence - August 2012 - 3
Computational Intelligence - August 2012 - 4
Computational Intelligence - August 2012 - 5
Computational Intelligence - August 2012 - 6
Computational Intelligence - August 2012 - 7
Computational Intelligence - August 2012 - 8
Computational Intelligence - August 2012 - 9
Computational Intelligence - August 2012 - 10
Computational Intelligence - August 2012 - 11
Computational Intelligence - August 2012 - 12
Computational Intelligence - August 2012 - 13
Computational Intelligence - August 2012 - 14
Computational Intelligence - August 2012 - 15
Computational Intelligence - August 2012 - 16
Computational Intelligence - August 2012 - 17
Computational Intelligence - August 2012 - 18
Computational Intelligence - August 2012 - 19
Computational Intelligence - August 2012 - 20
Computational Intelligence - August 2012 - 21
Computational Intelligence - August 2012 - 22
Computational Intelligence - August 2012 - 23
Computational Intelligence - August 2012 - 24
Computational Intelligence - August 2012 - 25
Computational Intelligence - August 2012 - 26
Computational Intelligence - August 2012 - 27
Computational Intelligence - August 2012 - 28
Computational Intelligence - August 2012 - 29
Computational Intelligence - August 2012 - 30
Computational Intelligence - August 2012 - 31
Computational Intelligence - August 2012 - 32
Computational Intelligence - August 2012 - 33
Computational Intelligence - August 2012 - 34
Computational Intelligence - August 2012 - 35
Computational Intelligence - August 2012 - 36
Computational Intelligence - August 2012 - 37
Computational Intelligence - August 2012 - 38
Computational Intelligence - August 2012 - 39
Computational Intelligence - August 2012 - 40
Computational Intelligence - August 2012 - 41
Computational Intelligence - August 2012 - 42
Computational Intelligence - August 2012 - 43
Computational Intelligence - August 2012 - 44
Computational Intelligence - August 2012 - 45
Computational Intelligence - August 2012 - 46
Computational Intelligence - August 2012 - 47
Computational Intelligence - August 2012 - 48
Computational Intelligence - August 2012 - 49
Computational Intelligence - August 2012 - 50
Computational Intelligence - August 2012 - 51
Computational Intelligence - August 2012 - 52
Computational Intelligence - August 2012 - 53
Computational Intelligence - August 2012 - 54
Computational Intelligence - August 2012 - 55
Computational Intelligence - August 2012 - 56
Computational Intelligence - August 2012 - 57
Computational Intelligence - August 2012 - 58
Computational Intelligence - August 2012 - 59
Computational Intelligence - August 2012 - 60
Computational Intelligence - August 2012 - 61
Computational Intelligence - August 2012 - 62
Computational Intelligence - August 2012 - 63
Computational Intelligence - August 2012 - 64
Computational Intelligence - August 2012 - Cover3
Computational Intelligence - August 2012 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202311
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202308
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202305
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202302
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202211
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202208
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202205
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202202
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202111
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202108
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202105
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202102
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202011
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202008
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202005
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202002
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201911
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201908
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201905
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201902
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201811
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201808
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201805
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201802
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter12
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall12
https://www.nxtbookmedia.com