2021
DOI: 10.1155/2021/9996281
|View full text |Cite|
|
Sign up to set email alerts
|

Evidence Theory in Picture Fuzzy Set Environment

Abstract: Picture fuzzy set is the most widely used tool to handle the uncertainty with the account of three membership degrees, namely, positive, negative, and neutral such that their sum is bound up to 1. It is the generalization of the existing intuitionistic fuzzy and fuzzy sets. This paper studies the interval probability problems of the picture fuzzy sets and their belief structure. The belief function is a vital tool to represent the uncertain information in a more effective manner. On the other hand, the Dempste… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 33 publications
0
5
0
Order By: Relevance
“…By using the TN and TCN in the shape of equations ( 9) and (10), then equations (19) to (22) are changed to equations (2) to (5), which invented the algebraic operational laws. Additionally, if we chose the TN and TCN in the shape of equations ( 11) and (12), then equations (19) to (22) are changed to equations (23) to (26), which invented the Einstein operational laws.…”
Section: Operational Laws For Cpfss Under the Different Tn And Tcnsmentioning
confidence: 99%
See 2 more Smart Citations
“…By using the TN and TCN in the shape of equations ( 9) and (10), then equations (19) to (22) are changed to equations (2) to (5), which invented the algebraic operational laws. Additionally, if we chose the TN and TCN in the shape of equations ( 11) and (12), then equations (19) to (22) are changed to equations (23) to (26), which invented the Einstein operational laws.…”
Section: Operational Laws For Cpfss Under the Different Tn And Tcnsmentioning
confidence: 99%
“…For the value of 􏽣 δ SC � 1, equations ( 27) to ( 30) are changed to equations (2) to ( 5) and if we choose the value of 􏽣 δ SC � 2, equations ( 27) to (30) are changed to equations (23) to (26). When we chose the TN and TCN in the shape of equations ( 13) and ( 14), then equations (19) to (22) are changed to equations ( 31) to (34), which invented the Frank operational laws.…”
Section: Operational Laws For Cpfss Under the Different Tn And Tcnsmentioning
confidence: 99%
See 1 more Smart Citation
“…ese vulnerabilities can be presented by utilizing of T2FSs. e likelihood of a T2-fuzzy system can be calculated as a stipend of the likelihood of a Type 1 system [26,27]. A T1FS's enrollment grade is a new number in the range [0, 1].…”
Section: Type-2 Fuzzymentioning
confidence: 99%
“…Tis article has been retracted by Hindawi following an investigation undertaken by the publisher [1]. Tis investigation has uncovered evidence of one or more of the following indicators of systematic manipulation of the publication process:…”
mentioning
confidence: 99%