449
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Closed-Form Mathematical Representations of Interval Type-2 Fuzzy Logic Systems with Application to Inverted Pendulum Stabilization

Pages 269-290 | Received 12 Sep 2019, Accepted 22 Nov 2022, Published online: 21 Dec 2022

Abstract

Interval type-2 fuzzy logic systems (IT2 FLSs) have a wide range of applications due to their ability to handle uncertainties. A drawback of IT2 FLSs is that their different representations generally suffer from high computational complexity. This paper discusses the representation of IT2 FLSs in closed mathematical form. The proposed form provides an easy, computationally efficient method to implement IT2 FLSs. Additionally, the closed-form is preferred in control systems. We also discuss the use of the proposed method in balancing an inverted pendulum on a cart, a common problem in control theory. Simulation results are provided to compare the performance of the proposed closed-form systems against the performance of other IT2 FLSs. The results confirm that the introduced IT2 representations perform closely to their more computationally complex counterparts.

1. Introduction

Type-2 fuzzy sets (T2 FSs) were proposed by Zadeh in 1975 [Citation1] as an extension of type-1 fuzzy sets (T1 FSs) to better handle uncertainties. The main difference between a T2 FS and a T1 FS is that the membership grades are not crisp numbers but are also fuzzy sets (secondary membership functions) [Citation2–4] making the T2 FS a three-dimensional set. The footprint of uncertainty (FOU) of a T2 FS represents the uncertainties in defining its position and shape. When the secondary membership function (MF) is a unit interval for all the points in the primary membership, the set is called an interval type-2 fuzzy set (IT2 FS) [Citation5,Citation6]. An IT2 FS is completely defined by its FOU because no information is contained in the third dimension [Citation5,Citation7].

A fuzzy system that utilizes IT2 FSs in the antecedent or consequent part of its rule base is known as an interval type-2 fuzzy logic system (IT2 FLS) [Citation3,Citation8]. IT2 FLSs have been used in several applications [Citation6,Citation8–15,Citation45–47], and they often outperform type-1 (T1) systems when handling uncertainties. The output of the inference step of an IT2 FLS is an IT2 FS, which requires conversion to a T1 FS before the final crisp output can be calculated. This conversion process is called type-reduction (TR) [Citation16,Citation17]. Originally, TR was performed using computationally intensive Karnik-Mendel (KM) iterative algorithms [Citation18]. Several methods were proposed to reduce the computational cost of KM algorithms (see, for example, [Citation19–22] and references therein). Another approach was to replace the KM algorithm with noniterative alternative architectures. Both categories of methods have demonstrated good performance, and the question of which method (or category of methods) is better, largely depends on the application [Citation23]. The problems of reducing the computational cost and simplifying the implementation of T2 FLSs are still pertinent [Citation24,Citation25].

In this paper, we propose to use closed-form mathematical representations of IT2-FLSs to provide simplified implementation of such systems with reduced computational cost. Accordingly, we introduce two alternative expressions, each of them fully represents an IT2-FLS. Besides the implementation simplicity and the low-computational cost of the proposed inference mechanisms, their closed-form nature makes them good candidates in control applications where stability analysis is required. The two proposed representations are based on approximating two existing noniterative methods, namely, Coupland and John’s geometric centroid (GC) method [Citation30–36] and Nie-Tan (NT) method [Citation37]. In the rest of this article, we introduce an approach to formulate a closed-form mathematical representation for IT2 FLSs based on the GC method. Then, we extend the results to provide another expression based on the NT operator.

The remainder of this paper is organized as follows. In section 2, we provide background and related work information on IT2 FLSs with a detailed review of the GC and NT methods and the involved mathematical formulations. Section 3 introduces the closed-form representations. Sections 4 and 5 discuss the performance of the introduced systems, followed by conclusions in section 6. A summary of the symbols and the abbreviations used in the paper and their meanings is provided in the appendix.

2. Background and Related Work

As mentioned above, the Karnik-Mendel (KM) iterative algorithm is computationally intensive, therefore, several attempts were proposed to reduce its complexity [Citation21,Citation48]. For example, the well-known enhanced KM (EKM) algorithm reduced the number of needed iterations [Citation50]. The iterative algorithm with stopping condition (IASC), and its enhanced version (EIASC) were proposed to further reduce the computational complexity [Citation21]. The EIASC method was reported to be superior to the EKM algorithm but heavily relied on loops [Citation48].

Alternatively, other works proposed to replace the KM algorithm with noniterative architectures. A summary of many alternative approaches to TR and a comparison of their computational cost were discussed in [Citation21,Citation23,Citation48]. John and Coupland’s Geometric-Centroid method was one of the first methods to avoid the iterative type-reduction algorithms [Citation30–36]. Nie-Tan method later provided a much more accurate IT2 defuzzification method [Citation41]. The GC defuzzification provides an approximation to the TR step [Citation38] by finding the center of area (CoA) of the FOU of the output IT2 FS. By contrast, the NT method computes the average T1 FS of the upper and lower bounds of the FOU.

Having an IT2 closed-form fuzzy system can lead to reduced computational complexity. Also, such system is preferred in control design, especially when stability analysis is required [Citation26–28]. The iterative KM algorithms cannot provide such a closed-form for type-2 systems; therefore, alternative approaches must be utilized [Citation29]. And generally, alternative methods do not directly provide a simple closed mathematical form that fully represents an IT2 FLS. An example of this is discussed in [Citation29], where a closed-form inference mechanism was developed for an IT2 Takagi–Sugeno–Kang fuzzy logic controller based on the uncertainty bounds approximation. In this article, we discuss in detail using the GC and the NT approaches to develop closed-form representations of IT2-FLSs.

For a two-input single-output IT2 FLS. The domain of each input is partitioned into W IT2 FSs. A total of M=W2 possible rules are included in the rule base. The kth rule (denoted Rk) is given by (1) Rk: IF x1isF~1i AND x2 is F~2j THEN yisG~ij;(i,j=1,2,,W)(1) where k=(i1)W+j, and k[1,M], [Citation3]. The kth rule can also be referred to as the ijth rule (i.e. knowing k we implicitly know the corresponding values of i and j). The consequents G~ij are, in general, IT2 FSs but can also be T1 fuzzy sets, simple intervals, or numbers. For singleton fuzzification, the firing set (firing level) of Rk is given by (2). (2) Fij(x)=T(μF~1i(x1),μF~2j(x2))=μF~1i(x1)μF~2j(x2)(2) where T(.) and ‘★’ indicate the utilized t-norm operator (commonly, the minimum or product operators are used). It follows that (3) Fij(x)=[μ_F~1i(x1)μ_F~2j(x2),μ¯F~1i(x1)μ¯F~2j(x2)][f_ij,f¯ij](3) where f_ij and f¯ij are, respectively, the lower and upper firing degrees of the kth rule, and μ_F~i(x) and μ¯F~i(x) are the lower and upper membership grades of F~i(x). When the consequent of Rk is a T1 FS, Gk [Citation30], the implied fuzzy set μB~k(y) is given by (4). Up to this step, the upper and lower bounds, μ_B~(y),μ¯B~(y) (alternatively called the upper and lower output MFs (UMF and LMF)) have been reached independently using type-1 operations. (4) μB~k(y)=[μ_B~(y),μ¯B~(y)]=[f_ijμGij(y),f¯ijμGij(y)](4) The next step is to find the overall output IT2 FS by aggregating the implied sets from all the fired rules. Assuming that all the rules are being fired (the non-fired rules can be considered to be fired with zero firing strengths), the output fuzzy set is given by (5). Here, we use ‘⊔’ to represent the utilized aggregation operator. Since we use type-1 operations to find each of the two bounds, it is natural to utilize any of the type-1 aggregation operators (max, sum, or probabilistic or are commonly used with T1 FSs [Citation39]). (5) μB~(y)=k=1MμB~k(y)[k=1M(f_kμGk(y)),k=1M(f¯kμGk(y))](5)

2.1 The Geometric Centroid Method

In the GC method, TR is bypassed by finding the x-coordinate of the center of area (CoA) of the FOU of the output IT2 FS (the area bounded by μ_B~(y)andμ¯B~(y)), an extension approach to using the CoA in the defuzzification of T1 FSs [Citation34]. The two bounds UMF(B~) and LMF(B~) are given by (6) and (7), respectively. (6) μB~(y)=k=1M(f¯kμGk(y))=k=1M(μ¯F~1i(χ1)μ¯F~2j(χ2)μGk(y))(6) (7) μ_B~(y)=k=1M(f_kμGk(y))=k=1M(μ_F~1i(χ1)μ_F~2j(χ2)μGk(y))(7)

Mathematically, the area of the FOU is found by integrating dA with respect to the output variable y (see ). Hence, the CoA can be expressed [Citation40] as the weighted average operation shown in (9). (8) dA=(μ¯B~(y)μ_B~(y)).dy(8) (9) yCrisp=CoA(B~)=ydAdA=y(μ¯B~(y)μ_B~(y))dy(μ¯B~(y)μ_B~(y))dy(9)

Figure 1. FOU of a sample output IT2 FS.

Figure 1. FOU of a sample output IT2 FS.

When the output MFs of the fuzzy systems are T1 sets, EquationEq. (9) can be simplified to (10) y(μ¯B~(y))dyy(μ_B~(y))dy(μ¯B~(y)μ_B~(y))dy=CuAuClAlAuAl(10) where Cu, Cl, Au and Al represent the centers and the areas of the upper and lower MFs of B~(y) [Citation26-28].

The integration process involved in (9) is computationally intensive. The integration process can be replaced by a discretized weighted average operation (discretized in n points) to reduce its complexity, as is done for T1 FLSs [Citation30]. In this case, EquationEq. (9) can be approximated as follows: (11) CoA(B~)i=1nyiμB~(yi)i=1nμB~(yi)(11) Notably, in John and Coupland’s original GC method [Citation30,Citation35], the FOU is first represented using regular polygons, mostly triangles; then, the weighted average of the polygons is calculated to replace the integration process. This process is followed to circumvent the approximation errors associated with numerical integration. Our proposed method is understood to be an approximate method. In the following section, we discuss the approximations involved in reaching the required representation of the IT2 FS, including approximations of the integration process.

2.2 The Nie-Tan Method

The NT operator [Citation37] is another alternative method to TR. It was recently shown [Citation41] that the NT method provides an accurate IT2 defuzzification. The method outputs a T1 FS that is the average of the UMF and LMF of the FOU of the output IT2 FS ‘A~’ whose membership function is given by μ(y)=12(μ¯(y)+μ_(y)). The final system output is then found by computing the center of gravity of A~.

3. Closed-Form Mathematical Representation of IT2 FLSs

In this section we discuss the derivation of the two IT2 FLS closed-form representations. We begin by deriving the GC-based approximation, then we extend the results to derive the NT-based one.

3.1. Derivation of the GC-based Expressions

Equation Equation(11) provides an expression that represents the output of an IT2 FLS using the CoA of the output FOU as an alternative IT2 defuzzification method. As discussed in the background section, the arithmetic steps involved in computing both the upper and lower MFs are mostly independent of each other. Type-1 operations are utilized in reaching both the UMF and LMF. By following the same reasoning, we can use other T1 techniques to further simplify the representation of the IT2 FLS.

When using center-average defuzzification, the shapes of the MFs for the output fuzzy sets have no effect on the final result; therefore, one can use singletons centered at the appropriate positions [Citation42]. In (8) and (9), the sum operator is used for join, product for t-norm, and utilize singleton fuzzy MFs μGk(y)=δ(ybk) for the outputs (Gk), where ‘δ’ is the Dirac delta function used to represent the fuzzy singleton, and bk are the locations of the output MFs (this is equivalent to using center-average defuzzification with bk representing the centers of the output MFs). Substituting into (11), the output is rewritten as (12) ycrispCG=k=1Mbk(μ¯F~1i(x1)μ¯F~2j(x2))k=1Mbk(μ_F~1i(x1)μ_F~2j(x2))k=1Mμ¯F~1i(x1)μ¯F~2j(x2)k=1Mμ_F~1i(x1)μ_F~2j(x2)(12) Note that we use ‘k’ in the notation bk simply as a label for each rule (i.e. we number the rules in the rule-base, and k is this number). Hence, when we are given k, we know the values of the corresponding i and j.

Equation Equation(12) can be represented in a more compact form: (13) ycrispCG=k=1Mbk(μ¯F~1i(x1)μ¯F~2j(x2)μ_F~1i(x1)μ_F~2j(x2))k=1M(μ¯F~1i(x1)μ¯F~2j(x2)μ_F~1i(x1)μ_F~2j(x2))(13) Carefulness is required when designing the fuzzy system so that the denominator of (13) is not equal to zero for any input value. Additionally, if different output singletons are used for the upper and lower bounds, the crisp output of (12) can be rewritten as in (14). This process represents a whole IT2 FLS in a simple closed-form formulation, which can be considered an extension to the T1 closed-form counterparts (as discussed in [Citation42]). (14) ycrispGC=k=1Mb¯k(μ¯F~1i(x1)μ¯F~2j(x2))k=1Mb_k(μ_F~1i(x1)μ_F~2j(x2))k=1M(μ¯F~1i(x1)μ¯F~2j(x2)μ_F~1i(x1)μ_F~2j(x2))(14)

3.2 NT-Based Expression

An alternative closed-form mathematical expression can be obtained by utilizing the NT operator. As mentioned above, the NT operator outputs a T1 FS that is the average of the UMF and LMF of the FOU of the output IT2 FS ‘A~’, as given by EquationEq. (15). The final system output is then found by computing the center of gravity of A~ using (16). (15) μ(y)=12(μ¯(y)+μ_(y))(15) (16) C(A~)=yminymaxμ(y)ydyyminymaxμ(y)dy(16)

Using (15) and following a similar approach to our earlier discussion, another closed-form approximation for the IT2 FLS, given in (17), that is based on the NT method can be reached. (17) ycrispNT=k=1Mbk(μ¯F~1i(x1)μ¯F~2j(x2)+μ_F~1i(x1)μ_F~2j(x2))k=1M(μ¯F~1i(x1)μ¯F~2j(x2)+μ_F~1i(x1)μ_F~2j(x2))(17) If different output singletons are used for the upper and lower bounds, the crisp output of (17) can be rewritten as in (18). (18) ycrispNT=k=1Mb¯k(μ¯F~1i(x1)μ¯F~2j(x2))+k=1Mb_k(μ_F~1i(x1)μ_F~2j(x2))k=1M(μ¯F~1i(x1)μ¯F~2j(x2)+μ_F~1i(x1)μ_F~2j(x2))(18)

This can be generalized (for both CG and NT) to multiple-input systems as follows: (19) ycrisp=k=1M(b¯kn=1Nμ¯F~nin(xn))k=1M(b_kn=1Nμ_F~nin(xn))k=1M(n=1Nμ¯F~nin(xn)n=1Nμ_F~nin(xn))(19) where N is the total number of inputs in the system.

3.3 Selection of Membership Functions

Both Eqs. (13) and (17) represent a whole IT2 FLS in an explicit mathematical expression. EquationEq. (13) gives an approximate closed-form GC based (CFGC) IT2 system, and Equationeq. (17) gives an approximate closed-form NT method (CFNT) based system. In principle, any MF may be used in these expressions. However, piecewise MFs (e.g. triangular and trapezoidal) should be avoided to obtain a ‘true’ and simple mathematical form. The use of such MFs would complicate the expressions because defining these functions mathematically would require the inclusion of operators such as max and min or the utilization of discontinuous functions such as the Heaviside unit step function. Continuous MFs, such as the Gaussian, are used instead. Nevertheless, in the results section, we study the performance of the proposed systems with triangular MFs as well as with Gaussian MFs.

As stated above, any form of MF can be used with the two developed fuzzy mechanisms i.e. CFGC and CFNT, as represented by Eqs. (13) and (17), respectively. However, to ensure a true and simple mathematical representation (i.e. to avoid the complexity of representing discontinuities associated with expressing MFs such as trapezoidal and triangular), we limit the MFs to be Gaussian. (20) μFi(x)=exp(12(xmiσi)2)(20) The IT2 FSs used can be uncertain in means (centers) or uncertain in variances (widths). The UMFs and LMFs are simpler to represent when the utilized IT2 MFs have certain means and uncertain variances [Citation43]. For a given IT2 set, both the UMF and LMF are Gaussian with the same mean and different variances. By contrast, for an IT2 set with uncertain mean, neither the UMF nor the LMF is Gaussian (see for illustration). Therefore, to maintain the mathematical simplicity of the IT2 FLS expression, the UMFs and LMFs must be redefined to avoid using max and min operators. As shown in , curve fitting techniques can be used to approximate both the UMF and LMF with Gaussian equivalents. In the figure, the LMF is exactly described by (21), while the approximate LMF is described by (22). Similar expressions can be written for the UMF. (21) μ_(x)=min(exp(12(x+Δμσ)2),exp(12(xΔμσ)2))(21)

Figure 2. An example of a Gaussian membership function with uncertain mean [μΔμ,μ+Δμ] and fixed standard deviation σ (green shaded area, here μ = 0, Δμ=0.1, and σ = 0.418) and the approximation of its UMF and LMF (black solid lines; the approximate UMF is Gaussian with μ = 0 and σ = 0.4937, the LMF is a scaled-down Gaussian with μ = 0, σ = 0.3651, and a scaling factor of 0.9183).

Figure 2. An example of a Gaussian membership function with uncertain mean ∈[μ−Δμ,μ+Δμ] and fixed standard deviation σ (green shaded area, here μ = 0, Δμ=0.1, and σ = 0.418) and the approximation of its UMF and LMF (black solid lines; the approximate UMF is Gaussian with μ = 0 and σ = 0.4937, the LMF is a scaled-down Gaussian with μ = 0, σ = 0.3651, and a scaling factor of 0.9183).

where σ is the fixed standard deviation of a Gaussian membership function with an uncertain mean [μΔμ,μ+Δμ]. (22) μ_(x)αLexp(12(xσL)2)(22) where αL is the scaling factor for the approximated LMF which can be determined from the FOU, and σL is the standard deviation of the approximated LMF, as illustrated in .

In summary, Eqs. (13) and (17) are introduced to provide two alternative closed-form simple representations of IT2 FLSs, CFGC and CFNT. The main difference between the two equations is that each is based on a different IT2 FLS architecture. The CFGC, as described by EquationEq. (13) is based on the ‘Geometric IT2-FSs’ approach, which was initially introduced by Coupland and John in [Citation33]. Their method approximates the crisp output of the system by computing the GC of the FOU of the output IT2 FS. EquationEq. (13) is a simplified representation of their method. On the other hand, the CFNT, as given by EquationEq. (17) provides an alternative representation based on the NT approach, which was originally introduced by Nie and Tan in [Citation37] and further investigated in [Citation41]. In contrast to the GC method, the NT method computes a T1 FS that is an average of the UMF and LMF of the output IT2 FS. The crisp output is computed as the center of gravity of this T1 set. Therefore, EquationEq. (17) is a simplified representation of the NT method. We also showed how to use approximate Gaussian functions for both the UMF and LMF to simplify the representation when the utilized IT2 MFs have uncertain means.

4. Performance Evaluation of the Closed-form Systems

In this section, we evaluate the performance of the proposed closed-form system by studying the control surfaces resulting from the proposed systems and their corresponding computational complexity. Then an application Example ‘Control of an Inverted Pendulum’ is discussed to show how the proposed closed-form mechanisms can be used to design an IT2 fuzzy logic controller (FLC) in a common control problem.

All the results introduced in this section are based on MATLAB® and Simulink® simulations. The simulations were performed in MATLAB 2017a using a laptop PC with an Intel core i3-7100 CPU @2.40 GHz and 6 GB RAM running Windows 10 Home 64- bit. MATLAB® implementation of the proposed methods is available online in [Citation49].

4.1 Computational Complexity

There are different approaches of measuring the computational complexity of an algorithm, the common ones are (i) counting the arithmetic operations (or alternatively, the number of the floating-point operations) in the algorithm, and (ii) calculating the execution time it takes to run the algorithm on a specific machine [Citation21,Citation23]. The first method is suitable if all algorithms to be compared are similar in form (e.g. iterative, recursive, closed-form, etc.). The second method is more suitable when the different algorithms to be studied are different. As mentioned above, to the best of our knowledge, there are very few closed-form IT2 systems that were previously discussed in literature, specifically, those discussed in [Citation29], which are very similar in the number of operations to the two closed-forms introduced in this article. The main difference is that the work presented in [Citation29] was on Takagi–Sugeno–Kang fuzzy logic controller based on the uncertainty-bounds approximation. Therefore, we rely on execution time for complexity comparison with other algorithms.

First, we compare the proposed closed-form systems with an enhanced KM algorithm. Two aspects are considered: the control surface and the execution time. We selected the enhanced KM iterative algorithm with stop condition (EIASC) [Citation21] because it was recommended for use in practical applications due to its ease of implementation. EIASC was shown [Citation21] to be significantly faster than the original KM and other enhanced KM algorithms, especially for small rule bases.

compares the EIASC algorithm and the CFGC expression (EquationEq. (13)) and the CFNT expression (EquationEq. (17)) in terms of the computation time and the absolute difference statistics of the generated control surfaces. The computational time, in seconds, is the average of 10 runs of each algorithm (after excluding outliers). Each run computes a 441-point control surface (21 × 21 points) of a two-input single-output system. The difference statistics provide the mean and the standard deviation of the absolute difference between the control surface of the controller and that of the reference (EIASC) controller. The table shows that the proposed forms have substantially lower computation times, particularly when Gaussian MFs are used.

4.2. Control Surface

Equations Equation(13) and Equation(17) were used to represent a simple two-input single-output IT2 fuzzy system. The system utilizes three MFs in the domain of each input. illustrates the three MFs utilized in one of the input domains (both are identical). The rule base is shown in , with the corresponding bi values. The three MFs have uncertain means that vary between μi -Δμ and μi + Δμ (μ1 = −1, μ2 = 0, μ3 = 1, Δμ = 1/8, and σ = 0.418). Each UMF and LMF was approximated using Gaussian functions, as described in the previous section, to use Eq.(13) and Eq.(17). The approximate UMFs are as follows (with the same values of μi) with σU = 0.5128. Each LMF is a scaled-down Gaussian with σL = 0.3532 and an amplitude scaling factor of σL = 0.895.

Figure 3. The three membership functions for one of the inputs x1. By limiting the range of the input to values ∈[−1, 1], the left and right membership functions are practically S and Z Gaussian. The three IT2 membership functions are Gaussian with uncertain means. The means are μ1 = −1, μ2 = 0, and μ3 = 1, the uncertainty around the means is Δμ= 1/8, and the standard deviation is σ = 0.418. (Note that the approximate UMFs are Gaussian with σU = 0.5128, and the approximate LMF is a scaled-down Gaussian, with σL = 0.3532 and a scaling factor of σL = 0.895.)

Figure 3. The three membership functions for one of the inputs x1. By limiting the range of the input to values ∈[−1, 1], the left and right membership functions are practically S and Z Gaussian. The three IT2 membership functions are Gaussian with uncertain means. The means are μ1 = −1, μ2 = 0, and μ3 = 1, the uncertainty around the means is Δμ= 1/8, and the standard deviation is σ = 0.418. (Note that the approximate UMFs are Gaussian with σU = 0.5128, and the approximate LMF is a scaled-down Gaussian, with σL = 0.3532 and a scaling factor of σL = 0.895.)

Table 1. Rule base for three membership functions.

Figures show the resulting surfaces of the introduced systems of (13) and (17) with both the exact and approximate forms of the UMFs and LMFs. Input and output gains may be introduced to scale the axes of the control surface as needed. In addition to the results given in , the figures provide insight into the resemblances of the control surfaces of the approximated proposed systems to their counterparts.

Figure 4. Surface using the introduced CFGC representation (EquationEq. (13)) with the approximated Gaussian functions.

Figure 4. Surface using the introduced CFGC representation (EquationEq. (13)(16) C(A~)=∫yminymaxμ∗(y)⋅ydy∫yminymaxμ∗(y)dy(16) ) with the approximated Gaussian functions.

Figure 5. Surface using the introduced CFGC representation (EquationEq. (13)) with the exact representations of the UMF and LMF.

Figure 5. Surface using the introduced CFGC representation (EquationEq. (13)(16) C(A~)=∫yminymaxμ∗(y)⋅ydy∫yminymaxμ∗(y)dy(16) ) with the exact representations of the UMF and LMF.

Figure 6. Surface using the introduced CFTN representation for (EquationEq. (17)) with the approximated Gaussian functions.

Figure 6. Surface using the introduced CFTN representation for (EquationEq. (17)(20) μFi(x)=exp⁡(−12(x−miσi)2)(20) ) with the approximated Gaussian functions.

Figure 7. Surface using the introduced CFTN representation (EquationEq. (17)) with the exact representations of UMF and LMF.

Figure 7. Surface using the introduced CFTN representation (EquationEq. (17)(20) μFi(x)=exp⁡(−12(x−miσi)2)(20) ) with the exact representations of UMF and LMF.

Figure 8. Surface using EIASC with the exact representations of UMF and LMF.

Figure 8. Surface using EIASC with the exact representations of UMF and LMF.

Table 2. Performance comparison of the proposed methods and the EIASC algorithm.

4.3 Application Example: Control of an Inverted Pendulum

In this section, we discuss how the proposed closed-form mechanisms can be used to design an IT2 fuzzy logic controller (FLC) in a common control problem.

Balancing an inverted pendulum is considered a benchmarking problem in control [Citation44]. We utilize the two introduced equations (i.e. (13) and (17)) in a feedback control scheme to balance an inverted pendulum and compare the performance to that of the two reference IT2 methods (i.e. NT and GC). The objective of the control problem is to balance a pendulum with an initial a nonzero angle in the upright position (i.e. r = 0).

An inverted pendulum mounted on a cart is balanced by applying dynamic force f to the cart. The error signal (the angular difference between the upright position and the actual position of the pendulum) and its derivative are commonly used as inputs to the feedback controller utilized in balancing the pendulum. (a,b) show the block diagram of the control system and the system model implemented using Simulink respectively. As mentioned earlier, gains are introduced to scale the universes of discourse for the fuzzy MFs. Here, the values of g1, g2, and gy are 4/π, 0.4/π, and 100, respectively. We use the model described by (23) and (24) for the inverted pendulum system [Citation42]. (23) y¨=(gsin(y)+cos(y)[f¯0.25y˙2sin(y)1.5])/(2316cos2(y))(23) (24) f¯˙=100f¯+100f(24) where f is the applied force in newtons, y is the angular position in radians, and g is the gravity of Earth.

Figure 9. (a) Block-diagram model of inverted pendulum control. (b) System model implemented using Simulink

Figure 9. (a) Block-diagram model of inverted pendulum control. (b) System model implemented using Simulink

5. Results and Discussion

The main objective of the proposed closed-form representation of the interval type-2 fuzzy systems was to provide a more compact, easy, and computationally efficient method to implement IT2 FLS as compared to the traditional representation. The proposed closed-form representation was compared to EIASC algorithm using two performance evaluation methods as explained in the previous section computation complexity, and control surfaces comparison. The EIASC algorithm was chosen since it was reported to be one of the superior algorithms in terms of computation complexity [Citation48] compared to other iterative TR methods.

First, the computation complexity is calculated for the proposed method and other competing algorithms by measuring the execution time it takes to run the algorithm on a specific machine. lists the computation complexity of the proposed methods and EIASC. It is noticed that the computation complexity is reduced by at least 60% when the proposed CFGC algorithm (EquationEq. (13)) with triangular input membership functions is used and a maximum computation complexity reduction of almost 93% when the proposed CFGC algorithm (EquationEq. (13)) with Gaussian input membership functions is used as compared to EIASC. This intensive computation complexity reduction can be explained by the absence of loops or iterations in the proposed method compared to EIASC.

Next, a comparison of the generated control surfaces. Figures through show the control surfaces using the introduced CFGC (Eq.(13)) with the approximated Gaussian functions, the control surfaces for the introduced CFGC (Eq.(13)) with the exact representations of the UMF and LMF, the control surface using the introduced CFNT representation (Eq.(17)) with approximated Gaussian functions, the control surface using the CFNT representation (Eq.(17)) with the exact representations of UMF and LMF, and finally the control surfaces using the EIASC algorithm. illustrates the values for the mean of the absolute difference of the control surfaces, and the standard deviation of the absolute difference of the control surfaces as a quantitative method to measure the resemblance. The Table shows that the control surfaces generated by the proposed CFNT for either triangular or Gaussian input membership functions are closer to the EIASC control surface as compared to the CFGC for the same type of input membership functions. This agrees with what was reported in literature that the NT approach provides a more accurate TR alternative [Citation41]. To summarize the findings, the simulations proved that the proposed closed-form representation significantly reduces the computation complexity for a small difference in the control surfaces.

shows the MATLAB simulation results of controlling this inverted pendulum utilizing the GC method (numerically evaluated) and utilizing the two different realizations of CFGC discussed earlier (i.e. using exact Gaussian MFs and using the approximate forms). shows similar results for the NT method and the CFNT. Figures and show the stabilization of the inverted pendulum from an initial nonzero condition with the inclusion of disturbance forces. all figures prove that the introduced formulas perform very closely to their more complex represented counterparts.

Figure 10. Angular position of an inverted pendulum controlled by the GC method and by the proposed CFGC representation (EquationEq. (13)).

Figure 10. Angular position of an inverted pendulum controlled by the GC method and by the proposed CFGC representation (EquationEq. (13)(16) C(A~)=∫yminymaxμ∗(y)⋅ydy∫yminymaxμ∗(y)dy(16) ).

Figure 11. Angular position of an inverted pendulum controlled by the NT method and by the proposed CENT representation (EquationEq. (17)).

Figure 11. Angular position of an inverted pendulum controlled by the NT method and by the proposed CENT representation (EquationEq. (17)(20) μFi(x)=exp⁡(−12(x−miσi)2)(20) ).

Figure 12. Angular position of an inverted pendulum controlled by the GC method and by the proposed CFGC (EquationEq. (13)) representation under disturbance action.

Figure 12. Angular position of an inverted pendulum controlled by the GC method and by the proposed CFGC (EquationEq. (13)(16) C(A~)=∫yminymaxμ∗(y)⋅ydy∫yminymaxμ∗(y)dy(16) ) representation under disturbance action.

Figure 13. Angular position of the inverted pendulum controlled by the NT method and by the proposed CFNT (EquationEq. (17)) representation under disturbance action.

Figure 13. Angular position of the inverted pendulum controlled by the NT method and by the proposed CFNT (EquationEq. (17)(20) μFi(x)=exp⁡(−12(x−miσi)2)(20) ) representation under disturbance action.

Next, the controller performance using CFGC and CFNT (i.e. using exact Gaussian MFs and using the approximate forms) is compared to performance of KM, enhanced KM (EKM), KM iterative algorithm with stop condition (IASC), and enhanced IASC (EIASC) using several performance indices. The mentioned algorithms were implemented using IT2 toolbox provided in MATLAB 2020b. The calculated values for Integral of absolute error (IAE), Integral time absolute error (ITAE), Integrated time square error (ITSE), and Integral of square error (ISE) for the eight mentioned scenarios are listed in . The results agree with what was proved previously that the introduced formulas perform very closely to their more complex represented counterparts.

Table 3. Controller performance indices the proposed methods.

6. Conclusions

This paper presents explicit closed-form representations for IT2 FLSs that are more compact, easy to implement, and computationally efficient compared to other more complex counterparts. The approach was based on the notion that both the UMF and LMF of the output IT2 FS can be found independently by using the CoA of the FOU as an approximation of the crisp output of an IT2 FLS to obtain a closed-form expression. Then, the same approach was utilized with the NT operator, resulting in a different closed-form mathematical expression.

The manuscript compares the results of the proposed methods (in terms of computational complexity and control performance) to six reference methods, namely Coupland’s Geometric-Centroid method which was one of the first methods to avoid the iterative type-reduction algorithms, Nie-Tan method which provided a much more accurate IT2 defuzzification method, the iterative EIASC method which is considered one of the most efficient iterative type-reduction methods, the original Karnik-Mendel (KM) type-reduction approach, the enhanced-KM (EKM), and the IASC approach. The results proves that the performance of the approximate closed-form representations (both GC and NT) was close to the reference approaches but with two advantages: better computational complexity (because of the non-iterative implementation), and a simpler implementation (single closed-form formulation). In addition, the results shows that the closed-form is also preferable in control systems when stability analysis is required and that the introduced IT2 representations perform closely to their more computationally complex counterparts.

In the future, study could be done to extend the proposed closed-form representation of interval type-2 fuzzy logic systems to general type-2 fuzzy logic systems.

Disclosure statement

No potential conflict of interest was reported by the author(s).

Additional information

Notes on contributors

Sherif M. Abuelenin

Sherif M. Abuelenin, received the B.Sc. degree in electronics and communications from Suez Canal University, Egypt in 1999, the M.Sc. degree in Electrical Engineering from Tuskegee University, AL, USA in 2002, and the Ph.D. degree from Auburn University, AL, USA in 2005. He joined Tuskegee University as an assistant professor of Electrical Engineering in 2005. From 2007 to 2011 he served as an assistant professor in the faculty of Engineering Sciences, Sinai University, Egypt. In 2011, he joined the faculty of engineering, Port-Said University, where he currently is an Associate Professor of Electrical engineering. His research interests include signal processing for communications, computational electromagnetics, vehicular communications, and fuzzy logic systems.

Rabab F. Abdel-Kader

Rabab Farouk Abdel-Kader she received her B.S. from the Electrical Engineering Department Suez Canal University in 1998. She received the Ph.D. degree from the department of Computer Science and Software Engineering at Auburn University, Auburn, AL in 2007 and the MS degree in Electrical Engineering from Tuskegee University with high honors in 2002. Since 2008 she is working as an Assistant Professor in the Electrical Engineering department, Faculty of Engineering, Port-Said University, Egypt. Her main research interests include image processing, parallel computing, and software Engineering.

References

Appendix 1

Table A1. Abbreviations and their meanings.

Table A2. Symbols and their meanings.