Article Search
닫기

Original Article

Split Viewer

International Journal of Fuzzy Logic and Intelligent Systems 2024; 24(4): 360-377

Published online December 25, 2024

https://doi.org/10.5391/IJFIS.2024.24.4.360

© The Korean Institute of Intelligent Systems

Enhancing Complex Relationships between Interval-Valued Intuitionistic Fuzzy Graphs and Concept Lattice Exploration

Misbah Rasheed1, Muntazim Abbas Hashmi1, Muhammad Kamran2, Aamir Hussain Khan2, Lakhdar Ragoub3, Mohammad Mahtab Alam4, and Umber Rana1

1Institute of Mathematics, Khwaja Fareed University of Engineering & Information Technology,Rahim Yar Khan, Pakistan
2Department of Mathematics, Thal University Bhakkar, Pakistan
3Mathematics Department, Prince Mugrin University, Al Madinah, Saudi Arabia
4Department of Basic Medical Sciences, College of Applied Medical Science, King Khalid University, Abha, Saudi Arabia

Correspondence to :
Lakhdar Ragoub (l.ragoub@upm.edu.sa)

Received: January 31, 2024; Revised: June 10, 2024; Accepted: September 30, 2024

This is an Open Access article distributed under the terms of the Creative Commons Attribution Non-Commercial License (http://creativecommons.org/licenses/by-nc/3.0/) which permits unrestricted noncommercial use, distribution, and reproduction in any medium, provided the original work is properly cited.

The recent development of a two-way structure for fuzzy concept lattices, based on intuitionistic fuzzy sets, aims to characterize the ambiguity and vagueness in specific data sets by accounting for acceptance, opposition, and uncertainty. This paper leverages the graphical properties of interval-valued intuitionistic fuzzy sets (IVIFSs) to address the issue of partial ignorance in a two-way fuzzy framework. It demonstrates how an IVIFS-based environment reflects hidden patterns in concept lattices, such as formal concepts. We propose a novel strategy for generating interval-valued formal concepts by integrating the properties of concept lattices, interval-valued intuitionistic fuzzy graphs, and IVIFSs. Additionally, we introduce a method to enhance specific patterns using interval-valued intuitionistic fuzzy formal principles, defined via (α, β)-cut for their respective truth (α-cut) and falsity (β-cut) membership values. Examples are provided to illustrate the proposed approaches, demonstrating their practical applicability and effectiveness.

Keywords: Intuitionistic fuzzy set, Lattice features, Fuzzy graph, Decision-making

The introduction is divided into two main sections: interval-valued intuitionistic fuzzy (IVIF) graph representations [1] and alpha-beta decomposition. In the mathematical field of lattice theory, every pair of elements in a substantially ordered set has a unique upper and lower bound [2]. Lattice theory has significant applications in domains such as artificial intelligence, computer science, and decision-making, demonstrating considerable potential for the grid idea. Intuitionistic fuzzy (IF) graphs, an extension of fuzzy graphs, form the foundation of the IVIF graphs [35]. IVIF graphs incorporate interval-valued intuitionistic fuzzy sets (IVIFSs), which represent membership degrees (MD) and non-membership degrees (NMD) using intervals rather than single values [6, 7]. This approach effectively captures uncertainty and ambiguity in data representation. The alpha-beta decomposition technique divides a lattice into two distinct components: the alpha component and the beta component. The alpha component consists of elements with a single immediate successor, representing the lower portion of the lattice. These elements are directly connected to the minimal element of the lattice. Conversely, the beta component comprises elements with a single immediate predecessor, representing the upper portion of the lattice and including those directly associated with the maximal element [8].

The alpha-beta decomposition systematically organizes the lattice structure, making it particularly useful for concept analysis, knowledge representation, and decision-support systems. By integrating the alpha-beta decomposition with intuitionistic fuzzy graph representation in C language, researchers can visualize and analyze uncertain lattice systems more effectively, reducing statistical uncertainty, improving intuition, and enhancing fuzzy logic capabilities [9, 10]. This combined approach provides a deeper understanding of lattice structures and broadens their applications. In mathematical terms, a lattice is a discrete group of elements in n-dimensional Euclidean space (ℜn) that repeats periodically. It can be visualized as an infinite grid or mesh, with points in the lattice represented as integer linear combinations of linearly independent basis vectors. Lattices are used in many mathematical fields, including algebra, wide variety theory, geometry, and physics.

Lattice structures exhibit several key properties:

Periodicity: If the lattice contains a point P, it also contains any point Q obtained by adding or subtracting a linear combination of basis vectors from P. In other words, the lattice oscillates back and forth.

Invariance under translation: Any point derived from translating P by a lattice vector is also within the lattice if a point P is in it, indicating the absence of a preferred origin.

Symmetry: Lattices often display symmetry with respect to rotations, assessments, or other transformations.

Fuzzy lattices [11] extend classical lattice theory to simplify inaccurate or misleading statistics. In fuzzy lattices, every element is a fuzzy set, with interactions governed by MD rather than strict ordering. This makes connectional representation more flexible, accommodating uncertain and imprecise information. Lattice operations are generalized to accommodate fuzzy degrees, with the join operation yielding the least upper bound and the meet operation yielding the greatest lower bound. In set theory, “decomposition” is defined as dividing a set into exhaustive and mutually exclusive subsets [12]. Fuzzy decomposition divides fuzzy sets into overlapping subgroups (often called additives or divisions) that reflect distinct qualities or functions. With MD 0–1, furnished sets provide factor departments with more options and nuance. Fuzzy decomposition enables the division of items into multiple subgroups instead of crisp units.

Alpha-beta fuzzy decomposition splits a complex fuzzy set into two components: beta (β) and alpha (α). The alpha component, which is critical to fuzzy sets, represents elements with high confidence or comfort in the set, often associated with stronger membership. In contrast, the beta component, a non-critical element of fuzzy sets, represents elements with lower confidence or weaker membership. This decomposition facilitates pattern recognition, fuzzy logic management, and decision-making.

Formal concept analysis (FCA) was first introduced by Wille [13] as a method for analyzing binary data matrices using principles from applied modern algebra. The information matrix ( ) represents the relationships ( ) between objects ( ) and a chosen attribute set ( ). FCA employs mathematical techniques to uncover hidden patterns, referred to as formal concepts, within the data matrix [14, 15]. These discovered concepts, when organized within the concept lattice, can facilitate various information processing tasks across domains [16, 17]. Fuzzy logic has been incorporated into FCA [18] to handle datasets containing fuzzy attributes [19]. Using an interval-valued fuzzy context [20, 21] and graphical visualization techniques [22, 23], this approach allows for the representation of bipolarity [24, 25] in heterogeneous data. When datasets exhibit similar ambiguous qualities, composition methods can establish links between attributes. Alternatively, analysis can be conducted using set-based approximations or different possibility analysis frameworks [26, 27]. To address attribute ambiguity and uncertainty, recent research employs two-way fuzzy spaces, a two-way decision framework, and their associated partial ordering [2831]. These models can also be applied through differential equations and have found utility in ensuring the sustainability of supply chain management [3234]. Given the critical role of the supply chain in business operations, the integration of fuzzy logic into differential equations provides a novel method for managing uncertainties, with applications extending to data analysis [3537].

This study developed a framework to better understand two-way formal concepts and their hierarchical representation within the concept lattice. The framework enables a thorough examination of deficiencies in attributes related to truth membership functions (TMFs), falsehood membership functions (FMFs), and indeterminacy membership degrees (IMDs) [38, 39]. Previous research found that single-valued fuzzy membership methods were inadequate for addressing issues of partial ignorance, inconsistent representations, and unpredictability in datasets. Various approaches have been proposed to address these challenges, including interval-valued fuzzy formal concept analysis, interval-valued fuzzy graphs for concept lattice representation, and interval-valued fuzzy lattices [29, 40, 41]. However, despite these advancements, accurately capturing uncertainty in data remains a limitation. For example, in a dataset where 40 out of 100 voters support a petition, 30 oppose it, and 20 are undecided, IVIFSs struggle to adequately represent this distribution of uncertainty. Significant research has focused on exploring the properties of IVIFSs and their networks, as well as their potential applications in knowledge processing. One notable method for addressing partial ignorance in knowledge representation involves the separate use of interval-valued TMFs and FMFs to capture uncertainty more effectively.

According to Djouadi and Prade [42], using interval-valued fuzzy sets alone is insufficient to fully capture the partial uncertainty inherent in the provided fuzzy characteristics. To address this limitation, we propose employing interval-valued fuzzy sets as a key approach. These sets include the interval-valued TMF [℧LI(xi), ℧UI(xi)] and the interval-valued FMF [ΩLI(xi),ΩUI(xi)] which coexist within intuitionistic fuzzy sets I in a three-way decision space. These functions are defined over the domain of objects . Recent applications of these features span various fields, including relational databases, graph modeling [34], multi-decision-making processes [43], and FCA. Interval-valued fuzzy properties, which account for partial ignorance in data, provide valuable insights for deeper investigations. Examples include IVIF graphs, logic, and two-way fuzzy concept lattices [44, 45] By leveraging interval-valued fuzzy properties, significant hidden patterns in data can be identified and represented in formats that balance specificity and generality, enhancing comprehension. However, when users select specific core concepts at their desired granularity for truth and falsity membership values, the computational cost increases. Examples of computationally intensive approaches include bipolar fuzzy contexts, two-way fuzzy contexts, fuzzy concept lattices, formal concepts [4648], interval-valued contexts, and triarchic reductions of formal contexts. To mitigate this issue, we propose an alternative strategy: identifying key conceptual themes through (α, β)-cuts, which independently define the TMF (α-cut) and FMF (β-cut). The goal of reduced interval-valued intuitionistic concept generation is to streamline decision-making and minimize computational overhead.

Existing methods using fuzzy sets, particularly IVIFSs, have been applied to address data ambiguity. However, they often fail to produce models that accurately represent the intricate relationships within complex datasets. This study seeks to demonstrate how IVIF graphs can enhance the accuracy and clarity of hidden pattern detection in complex datasets by introducing interval-valued intuitive properties in conceptual networks. By combining fuzzy sets and graphs with (α, β)-cuts for distinct truth and falsehood values, our proposed method offers a more nuanced understanding and representation of data patterns. These advancements over existing approaches are validated through practical examples, highlighting their benefits and potential for improved decision-making in fields such as data mining and knowledge discovery. To achieve these objectives, the research focuses on the following:

  • · Proposing an approach based on the characteristics of IVIFSs to efficiently express partial uncertainty in data with fuzzy attributes.

  • · Demonstrating how hidden patterns can be identified within an IVIF framework using the properties of fuzzy graphs and lattices.

  • · Introducing (α, β)-cuts as a method to analyze the iIVIF environment, specifically targeting truth (α-cut) and uncertainty (β-cut) values, with an example illustrating the approach.

  • · Using correlation techniques and operator results to empirically evaluate the proposed method.

In this section, we present the features of interval-valued fuzzy sets and their graphical sequence diagrams, which form the foundation for IVIFFCs. Using the proposed method, we construct and analyze bipolar gap-valued concepts, enabling a comprehensive examination of interval-valued fuzzy data.

4.1 IVIF Graph

Definition 4.1. Let xi be an element of the set , representing a collection of factors or objects. In this context, I within can be characterized using an interval-valued TMF denoted as ℧I (ξ) and an interval-valued FMF denoted as ΩI (ξ). For each specific point xi in , the values ℧I (ξ) and ΩI (ξ) are subsets of the interval [0, 1]. The representation of IVIFSs is as follows:

I={§,[I(§)L',I(§)I'],[ΩI(§)L',ΩI(§)I']:§X},

where ℧I(§), ΩI(§) ⊆ [0, 1].

Definition 4.2. Let I3 represent the intersection of two interval-valued fuzzy sets, I1 and I2, within a universal set . The TMF and FMF of I3 are computed as follows:

I3(§)L'=min [I1(§)L',I2(§)L'],I3(§)I'=min [I1(§)I',I2(§)I'],ΩI3(§)L'=max [ΩI1(§)L',ΩI2(§)L'],ΩI3(§)I'=max [ΩI1(§)I',ΩI2(§)I'],

This operation identifies the infimum of any two given bipolar IVIFFCs.

Definition 4.3. Let I3 represent the union of two interval-valued fuzzy sets I1 and I2, within a given universal set ,. The TMF and FMF of I3 are computed as follows:

I3(§)L'=max [I1(§)L',I2(§)L'],I3(§)I'=max [I1(§)I',I2(§)I'],ΩI3(§)L'=min [ΩI1(§)L',ΩI2(§)L'],ΩI3(§)I'=min [ΩI1(§)I',ΩI2(§)I'],§X.

This operation identifies the supremum of any two given bipolar IVIFFCs.

Definition 4.4. Let G = (⋎,E) be an IVIF graph where the vertices (⋎) are described by an interval-valued TMF[ΞL',ΞI'] and an interval-valued FMF[ΩΞL',ΩΞI'], such as

{(Ξ),Ω(Ξ)[0,1]2}Ξ.

Similarly, edges (E) can be characterized by IVIF relationships

{(E(×),ΩE(×))[0,1]2},

for all ⋎ × ⋎ ∈ E such that

EL'(ΞΞ)min [EL'(Ξ),EL'(Ξ)],EI'(ΞΞ)min [EI'(Ξ),EI'(Ξ)],ΩEL'(ΞΞ)max [ΩEL'(Ξ),ΩEL'(Ξ)],ΩEI'(Ξ,Ξ)max [ΩEI'(Ξ),ΩEI'(Ξ)].

The IVIF graph is complete if and only if

EL'(ΞΞ)=min [EL'(Ξ),EL'(Ξ)],EI'(ΞΞ)=min [EI'(Ξ),EI'(Ξ)],ΩEL'(ΞΞ)=max [ΩEL'(Ξ),ΩEL'(Ξ)],ΩEI'(ΞΞ)=max [ΩEI'(Ξ),ΩEI'(Ξ)].

Here, (℧EΞ), ΩE)) = (0, 0) ∀(vi, vi) ∈ (⋎ × ⋎/E).

The following section introduces a technique that examines the latent pattern within the IVIF context by leveraging the characteristics of the concept lattice across various granulations, as well as a technique that generates IVIF concepts using the previously defined IVIFSs and accounting for its concept lattice, partial sorting principle, and graph.

4.2 Suggested Process for Developing IVIF Concepts

We propose a method to identify formal concepts in IVIF data, leveraging intuitionistic logic, IVIF graphs, interval-valued lattices, and Galois connections. Assume an IVIF context , where , and˜={(§,),[˜(§,)L',˜(§,)I'],[Ω˜(§,)L',Ω˜(§,)I']},

Using this context, the concept of an IVIF can be defined as follows:

Definition 4.5. Suppose an IVIFS of attributesB={,[B()L',B()I'],[ΩB()L',ΩB()I']:[0,1]2:N}.

Be represented by an interval-valued TMF[B()L',B()I'] and an interval-valued FMF[B()L',B()I'], independently. The exterior component set for a chosen IVIF attribute set is determined as follows:

A={§,[A(§)L',A(§)I'],[ΩA(§)L',ΩA(§)I']:[0,1]2:§X}.

These components are distinguished by their respective interval-valued TMF[B()L',B()I'] and interval-valued FMF[A()L',A()I'], separately.

Formal concepts are defined as IVIFSs for objects and attributes, denoted as (A, B), which exhibit closure under a Galois connection: A = B and B = A. This relationship identifies objects with a maximum interval-valued TMF and a minimum FMF, integrating information from a shared set of attributes. A component-wise approach simplifies this integration within the interval-valued fuzzy space [0, 1]2. The method ensures that no additional objects or attributes can increase the IVIF membership values (IVIFMVs) of the identified sets. To exclusively identify the set of IVIFSs (A,B) as formal concepts, A is regarded as the ’extent’ and B as the ’intent’. These formal concepts can be represented through complete lattices and as nodes in IVIF graphs. The following algorithm outlines the process:

  • Step 1: Consider an IVIF context, denoted as , where , and ℜ̃ represents the IVIF relationship.

    [˜(§,)L',˜(§,)I'],[Ω˜(§,)L',Ω˜(§,)I'].

  • Step 2: To uncover hidden patterns in the IVIF environment K, identify all subsets of attributes that satisfy the IVIF conditions 2m, characterized by a TMF of [1, 1] and an FMF of [0, 0].

  • Step 3: Adjust the membership values for generating IVIF concepts based on user preferences. The selected membership values ensure maximal alignment with the chosen subsets S, where ⋌ is less than or equal to 2m.

  • Step 4: Identify the covered items for each subset (S) by applying the lower operator (↓), denoted as BS=AS.

  • Step 5: Compute the TMF for the resulting set of objects:

    ASL'=minBSL'[μL'˜(§,)],ASI'=minBSI'[μI'˜(§,)],ΩASL'=maxΩBSI'[μΩL'˜(§,)],ΩASI'=maxΩBSI'[μΩI'˜(§,)].

    Here, ℜ̃ denotes the IVIF relationship between the attribute sets. The computed membership value represents the highest degree of membership necessary to satisfy the constraint and identify the minimal desired property.

  • Step 6: Determine the covering attribute set for the object set to reveal latent patterns using the upper operator (↑) of the Galois connection on the assembled object sets, denoted as AS=BS.

  • Step 7: Calculate the membership score for the attributes covering the object set

    BSL'=minASL'[μL'˜(§,)],BSI'=minASI'[μI'˜(§,)],ΩBSL'=maxΩASL'[μΩL'˜(§,)],ΩBSI'=maxΩASI'[μΩI'˜(§,)].

  • Step 8: Define the formal fuzzy concept as the pair (AS,BS).

  • Step 9: Construct the IVIF concept lattice to represent the hierarchical relationships among the concepts.

  • Step 10: Apply the proposed strategy using the identified object sets, as demonstrated in Algorithm 1.

Complexity: The pseudocode for the proposed algorithm generates IVIF concepts in a context with ‘n’ objects, ‘m’ attributes, and an IVIF relation ℜ̃. The time complexity for Step 1 is 2m, while identifying covering objects (defined by TMF and FMF) requires 2m * n operations. Therefore, the overall time complexity is O(2m * 2m * n).

Example 4.1. Consider a company that aims to allocate funds to the following entities:

  • 1. A car manufacturer §1

  • 2. A food company §2.

  • 3. The computer company §3

  • 4. A company specializing in the production of arms §4

The decision-making process is guided by the following criteria ( ):

  • 1. Risk analysis ⋎1

  • 2. Growth analysis ⋎2

  • 3. Environmental impact analysis ⋎3.

The determination parameter can be identified through TMF and FMF independently. The organization has the ability to gather data utilizing these two-way decision defined and present them in a tabular matrix structure. In this structure, the enumerated organization can be viewed as a set of entities, denoted as = (§1 = car company, §2 = food company, §3 = computer company, and §4 = arms company), while the decision parameters can be seen as a set of features, denoted as = (⋎1 = risk analysis, ⋎2 = growth analysis, ⋎3 = environmental impact analysis). Let’s assume that the impact of decision attribute risk analysis, denoted as ⋎1, on the making of a car company is 0.43 in terms of total market value (TMV) and 0.34 in terms of fair market value (FMV). This relationship can be expressed as ℜ̃; (§1,⋎1) = (0.43, 0.34) using interval type-2 fuzzy sets in the tabular matrix, as illustrated in Table 1. As, for the establishment of other companies represented by objects (§2, §3, §4), the corresponding decision parameters are detailed in Tables 2, 3, and 4, respectively. The company is now interested in uncovering concealed patterns within the IVIF context, as presented in Table 5. Analyzing investment preferences based on specified decision parameters stands as a significant challenge for the company. To address this concern, the company seeks patterns, specifically formal concepts derived from the data presented in Table 5, utilizing the given attribute set. To meet this requirement, Algorithm 1 is proposed. This algorithm facilitates the generation of IVIF concepts from the context illustrated in Table 5. , where , and ℜ̃ represents IVIF relationship among them i.e.,

[(˜(§,)L',˜(§,)I'),(Ω˜(§,)L',Ω˜(§,)I')];˜(§1,1)=[(0.43,0.56),(0.34,0.43)],˜(§1,2)=[(0.43,0.65),(0.21,0.43)],˜(§1,3)=[(0.78,0.90),(0.43,0.56)],˜(§2,1)=[(0.65,0.78),(0.21,0.34)],˜(§2,2)=[(0.65,0.78),(0.21,0.34)],˜(§2,3)=[(0.34,0.65),(0.87,0.90)],˜(§3,1)=[(0.34,0.65),(0.34,0.43)],˜(§3,2)=[(0.56,0.65),(0.34,0.43)],˜(§3,3)=[(0.45,0.56),(0.78,0.90)],˜(§4,1)=[(0.78,0.87),(0.12,0.21)],˜(§4,2)=[(0.65,0.78),(0.12,0.34)],˜(§4,3)=[(0.65,0.78),(0.87,0.90)].

The following describe each of the produced subsets of attributes displayed in Table 5.

From Step 3 in Algorithm 1, determine the value of the acceptance membership = ([1, 1], [0, 0]) for each subsets.

  • 1. The subsequent intuitionistic fuzzy set can serve as a representation for this.

    {[(0.00,0.00),(1.00,1.00)]/1,[(0.00,0.00),(1.00,1.00)]/2,[(0.00,0.00),(1.00,1.00)]/3},

  • 2. {[(1.00, 1.00), (0.00, 0.00)]/1},

  • 3. {[ (1.00, 1.00), (0.00, 0.00) ] /2},

  • 4. {[(1.00, 1.00), (0.00, 0.00)] /3},

  • 5. {[(1.00, 1.00), (0.00, 0.00)]⋎1, [(1.00, 1.00), (0.00, 0.00)]⋎2},

  • 6. {[(1.00, 1.00), (0.00, 0.00)]⋎2, [(1.00, 1.00), (0.00, 0.00)]⋎3},

  • 7. {[(1.00, 1.00), (0.00, 0.00)]⋎1, [(1.00, 1.00), (0.00, 0.00)]⋎3},

  • 8. {[(1.00, 1.00), (0.00, 0.00)]⋎1, [(1.00, 1.00), (0.00, 0.00)]⋎2, }.

  • 9. {[(1.00, 1.00), (0.00, 0.00)]⋎3}.

    Step 2: Let’s select the initial subset of characteristics.

    {[(0.00,0.00),(1.00,1.00)]/1,[(0.00,0.00),(1.00,1.00)]/2,[(0.00,0.00),(1.00,1.00)]/3}.

    Next, use the to determine its covered object set, down operator (↓) as given below:

    {[(0.00,0.00),(1.00,1.00)]/1,[(0.00,0.00),(1.00,1.00)]/2,[(0.00,0.00),(1.00,1.00)]/3}={[(0.78,0.90),(0.43,0.56)]/§1,[(0.65,0.78),(0.87,0.90)]/§2,[(0.56,0.65),(0.78,0.90)]/§3,[(0.78,0.87),(0.87,0.90)]/§4}.

Apply the UP (upper) operator (↑) on this assembled set of objects to identify the additional covering attribute set. {[(0.78, 0.90), (0.43, 0.56)]/§1, [(0.65, 0.78), (0.87, 0.90)]/§2, (0.56, 0.65), (0.78, 0.90)]/§3, [(0.78, 0.87), (0.87, 0.90)]/§4} = {[(0.34, 0.56), (0.34, 0.43)]/1, [(0.43, 0.65), (0.34, 0.43)]/2, [(0.34, 0.56), (0.87, 0.90)]/3}. It encompasses the subsequent IVIF principles

  • 1. Extent: {[(0.78, 0.90), (0.43, 0.56)]/§1, [(0.65, 0.78), (0.87, 0.90)]/§2, [(0.56, 0.65), (0.78, 0.90)]/§3, [(0.78, 0.87), (0.87, 0.90)]/§4}.

    Intent: {[(0.34, 0.56), (0.34, 0.43)]/1, [(0.43, 0.65), (0.34, 0.43)]/2, [(0.34, 0.56), (0.87, 0.90)]/3}.

    Step 3: Likewise, employing alternative subsets presented in Step 1 allows for the creation of additional IVIF concepts.

  • 2. Extent: {[(0.43, 0.56), (0.34, 0.43)]/§1, [(0.65, 0.78), (0.21, 0.34)]/§2,[(0.34, 0.65), (0.34, 0.43)]/§3, [(0.78, 0.87), (0.12, 0.21)]/§4}.

    Intent: {[(1.00, 1.00), (0.00, 0.00)]/1, [(0.43, 0.65), (0.34, 0.43)]/2, [(0.34, 0.56), (0.87, 0.90)]/3}.

  • 3. Extent: {[(0.43, 0.56), (0.21, 0.43)]/§1, [(0.65, 0.78), (0.21, 0.34)]/§2, [(0.56, 0.65), (0.34, 0.43)]/§3, [(0.65, 0.78), (0.12, 0.34)]/§4}.

    Intent: {[(1.00, 1.00), (0.00, 0.00)]/2, [(0.43, 0.56), (0.34, 0.43)]/1, [(0.34, 0.56), (0.87, 0.90)]/3}.

  • 4. Extent: {[(0.78, 0.90), (0.43, 0.56)]/§1, [(0.34, 0.56), (0.87, 0.90)]/§2, [(0.34, 0.65), (0.78, 0.90)]/§3, [(0.65, 0.78), (0.87, 0.90)]/§4}.

    Intent: {[(1.00, 1.00), (0.00, 0.00)]/3, [(0.34, 0.56), (0.34, 0.43)]/1, [(0.34, 0.56), (0.87, 0.90)]/3}.

  • 5. Extent: {[(0.43, 0.56), (0.34, 0.43)]/§1, [(0.65, 0.78), (0.21, 0.34)]/§2, [(0.34, 0.65), (0.34, 0.43)]/§3, [(0.65, 0.78), (0.12, 0.34)]/§4}.

    Intent: {[(1.00, 1.00), (0.00, 0.00)]/1, [(1.00, 1.00), (0.00, 0.00)]/2, [(0.34, 0.56), (0.87, 0.90)]/3}.

  • 6. Extent: {[(0.43, 0.65), (0.43, 0.56)]/§1, [(0.34, 0.56), (0.87, 0.90)]/§2, [(0.43, 0.56), (0.78, 0.90)]/§3, [(0.65, 0.78), (0.87, 0.90)]/§4}.

    Intent: {[(0.34, 0.56), (0.34, 0.43)]/1, [(1.00, 1.00), (0.00, 0.00)]/2, [(1.00, 1.00), (0.00, 0.00)]/3}.

  • 7. Extent: {[(0.43, 0.56), (0.43, 0.56)]/§1, [(0.34, 0.56), (0.87, 0.90)]/§2, [(0.34, 0.65), (0.78, 0.90)]/§3, [(0.65, 0.78), (0.87, 0.90)]/§4}.

    Intent: {[(1.00, 1.00), (0.00, 0.00)]/1, [(0.43, 0.65), (0.34, 0.43)]/2, [(1.00, 1.00), (0.00, 0.00)]/3}.

  • 8. Extent: {[(0.43, 0.56), (0.43, 0.56)]/§1, [(0.34, 0.56), (0.87, 0.90)]/§2, [(0.34, 0.65), (0.78, 0.90)]/§3, [(0.65, 0.78), (0.87, 0.90)]/§4}.

    Intent: {[(1.00, 1.00), (0.00, 0.00)]/1, [(1.00, 1.00), (0.00, 0.00)]/2, [(1.00, 1.00), (0.00, 0.00)]/3}.

  • The suggestion number 1 indicates that the company is inclined to favor investments guided by the attribute [(0.43, 0.65), (0.3, 0.4)]/2, specifically in terms of growth analysis. This is evident through its maximum TMV at (0.43, 0.65) and minimum FMV at (0.34, 0.43), showcasing superior performance calculated to alternative attributes.

  • The suggestion number 2 signifies that the object [(0.78, 0.87), (0.12, 0.21)]/§4 attains the maximum TMV at (0.78, 0.87) and the minimum FMV at (0.12, 0.21) compared to other objects in terms of embracing quality ⋎1 (i.e., risk analysis). Similarly, the analysis can be extended to other objects, yielding the sequence §4, §2, §3, §1 for the company’s investment order based on risk analysis (⋎1). This analytical conclusion from the suggested approach agrees rather well with the predictions.

  • · The suggestion number 3 signifies that the entity [(0.65, 0.78), (0.12, 0.34)]/§4 attains maximum TMV with coordinates (0.65, 0.78) and minimum FMV with coordinates (0.12, 0.34) in comparison to other entities for the acceptance of attribute ⋎2 (i.e., growth analysis). Likewise, a similar analysis can be conducted for other entities, resulting in the sequence §4, §2, §3, §1 for investing money in companies based on growth analysis (⋎2). This analysis, derived from the proposed method, aligns well with the data.

  • · The suggestion number 4 signifies that the object [(0.78, 0.90), (0.43, 0.56))]/§1 attains maximum TMV at (0.78, 0.90) and minimum FMV at (0.43, 0.56) when compared to other objects for the assessment of attribute ⋎3 (i.e., environmental impact analysis). Similarly, an evaluation of other objects yields the sequence §1, §4, §2, §3 for investment prioritization based on environmental impact analysis (⋎3). This analysis, resulting from the proposed methodology, aligns well with expectations.

  • · The suggestion number 5 signifies that the object [(0.65, 0.78), (0.12, 0.34)]/§4 exhibits the highest TMV at (0.65, 0.78) and the lowest FMV at (0.12, 0.34) in comparison to other objects, concerning the acceptance of attributes ⋎1 and ⋎2 (i.e., risk and growth analysis). Similarly, one can analyze other objects, resulting in the following investment order: §4, §2, §3, §1 for the company, based on the analysis of risk and growth (⋎1,⋎2). This analytical approach, as derived from the proposed method, aligns well with the overall agreement.

  • · The suggestion number 6 signifies that the object [(0.65, 0.78), (0.87, 0.90)]/§4 exhibits the highest TMV at (0.65, 0.78) and the lowest FMV at (0.87, 0.90) compared to other objects for the acceptance of attributes ⋎2 and ⋎3 (specifically, growth and environmental impact analysis). Likewise, a similar analysis can be applied to other objects, establishing the sequence §4, §1, §2, §3 for investment decisions based on growth and environmental impact analysis. This analysis, stemming from the proposed method, aligns well with expectations.

  • · The suggestion number 7 implies that the object [(0.65, 0.78), (0.87, 0.90)]/§4 exhibits the highest TMV at (0.65, 0.78) and the lowest FMV at (0.87, 0.90) compared to other objects, specifically concerning the acceptance of attributes ⋎1 and ⋎3 (i.e., risk and environmental impact analysis). In a similar vein, an examination of other objects establishes the sequence §4, §1, §2, §3 for company investment decisions based on risk and environmental impact analysis. The outcomes of this analysis, derived from the proposed method, align well with each other.

  • · The suggestion number 8 is centered on the acceptance of attributes ⋎1, ⋎2, ⋎3 the object [(0.65, 0.78), (0.87, 0.90)]/§4 has TMV (0.65, 0.78) and minimal FMV (0.87, 0.90) When contrasted with other items, a similar approach can be applied to assess additional objects, resulting in the sequence §4, §1, §2, §3 for investing money in the company based on individual attributes. The analysis produced through the suggested method aligns well with expectations.

The lattice derived from the aforementioned concepts, known as the IVIF concept lattice, is illustrated in Figure 2. This representation conveys the following information. The analysis obtained from the suggested approach closely mirrors the correlation method and aggregation operator, but with a more in-depth examination. Achieving this involves the proposed method generating concepts exponentially through slight variations in membership values. Consequently, identifying key concepts based on user-specified parameters becomes a challenging endeavor in this scenario. To address this issue, an alternative approach is suggested in Algorithm 2 for the dissection of the interval-valued neutrosophic context at a granulation defined by the user as (α, β). The following section provides an illustration of the decomposition of the IVIF context.

4.3 A New Approach for the (α, β)-Decomposition of the IF Context

The proposed approach presented in Algorithm 1 yields a considerable number of IVIF concepts, characterized by minimal variation in TMF and FMF. This abundance of concepts may hinder knowledge processing tasks, particularly when users seek essential concepts tailored to specific requirements within a defined granularity. Granular computing, a mathematical tool, offers a means to refine expansive contexts into smaller information granules. The chosen level of granulation facilitates efficient processing of large contexts by modularizing complex problems into well-defined subproblems at minimal computational cost. Recently, the principles of granular computing have found application in formal contexts, formal fuzzy contexts, interval-valued contexts, bipolar fuzzy contexts, two-polar fuzzy contexts, and multi-scaled concept lattices, aiding in the identification of crucial concepts at user-defined granulation levels. This paper focuses on decomposing an IVIF context by considering its TMV and FMV separately, utilizing a user-defined (α, β)-cut.

  • Step 1: Let’s consider an IF context denoted as , where , and ℜ̃ signifies the IF relationship among them.

    (˜(§,),Ω˜(§,)).

  • Step 2: Now, specify the granulation parameters for TMV and FMV, denoted as (α, β).

  • Step 3: The provided IF context can be broken down at the selected granularity (α, β) using TMV and FMV separately, as outlined below:

    If and only if the Transaction Message Validator (TMV) is part of the identical decomposed context:

    Kα={˜(§,)μ˜(§,)α}.

    In this context, let § denote an object and ⋎ an attribute. Express them as the maximum acceptance of the TMV, specifically as 1.00 for the selected α-cut, or alternatively, as 0.00. The FMV is part of the identical decomposed context if:

    KβΩ={Ω˜(§,)μΩ˜(§,)β}.

    In this context, where § represents an object and ⋎ signifies an attribute, they are expressed as the maximum acceptance of the FMV. Specifically, denoted as 0.00 for the selected β-cut, otherwise marked as 1.00. Therefore, a binary context has been established for Kα,β through a defined granulation for the TMV and FMV.

  • Step 4: The equality provided below pertains to the decomposed contexts, denoted as Kα,β, within a user-defined granulation.

    K=α,βKα,β,α,β.

    In this context, α represents a specified granulation on TMV, and β pertains to a defined granulation as well.

  • Step 5: The disintegrated context also adheres to the subset conditions, namely, Kα1, β12, β2 when α1α2, β1β2. This implies that the quantity of concepts and the dimensions of the IF concept lattice can be regulated by employing the specified granulation for the TMV and FMV.

  • Step 6: The method described above can be applied to determine both lower and upper limits for the TMV and FMV in the context of the provided IVIF relations.

  • Step 7: At the end, formulate the decomposed “IF” context for tasks related to knowledge processing. The pseudocode illustrating this proposed algorithm is presented in Table 7.

Complexity:Algorithm 2 presents the pseudocode outlining the decomposition process for a provided intuitionistic fuzzy context. Here, let the count of objects (| |) be denoted as n, and the count of attributes (| |) as m within the specified IVIF context. The suggested approach decomposes the context using a user-defined (α, β)-cut, with a time complexity of O(m3) or O(n2) in the case of a IVIF context. For the decomposition of IVIFSs, the cut is specified individually for both the lower and upper bounds associated with the given attribute O(m) or object set O(n). Consequently, the overall time complexity of the suggested approach amounts to O(n *m3) or O(n2 *m). This methodology effectively minimizes the computational burden for handling the provided IVIF context in comparison to the approach detailed in Table 5. The following section provides a demonstration of both proposed methods through an illustrative example.

In the following paragraphs, we illustrate both the proposed algorithms with an example. The first algorithm presents hierarchical order visualization in addition to IVIF concept demonstrations. The second approach, on the other hand, presents an assortment of these ideas at a customized (α, β)-cut, which refines the knowledge. To illustrate these methods and conduct a comparative analysis of the results obtained, we employ an example.

5.1 IVIF Concept Lattice

In recent times, the exploration of the three-way decision space and its approximation has significantly influenced the trajectory of knowledge processing tasks, particularly in the in-depth examination of partial ordering, concept lattice, and their applications across various research domains. A key focal point for researchers engaged in knowledge processing tasks is the generation of formal concepts from a provided IVIF context. This paper makes a concerted effort to scrutinize data utilizing IVIF attributes, leveraging the characteristics of IVIFSs, the IVIF graph, and its associated concept lattice. The aim is to offer a more precise visualization of partial ignorance, inconsistency, and incompleteness within a given dataset compared to alternative approaches. To realize this objective, the paper introduces a method outlined in Table 5 for identifying all IVIF concepts within a given context.

5.2 The (α, β)-Decomposition of IVIF Context

Lately, granular computing has attracted a lot of interest from scholars who want to learn more about the two-way decision environment. This method is a technique for contextual processing that considers the problem’s structure, functioning, and closeness. Numerous formal fuzzy contexts, such as formal fuzzy ideas, fuzzy concept lattice, interval-valued fuzzy information, bipolar fuzzy information, two-polar fuzzy information, and multi-scaled concept lattice, have been added to its list of uses. These characteristics are utilized to pinpoint fundamental ideas at user-specified granularities. This work focuses on breaking down the IF context through the use of granular computing features to accurately identify important patterns hidden within the given IVIF context. Algorithm 2 presents a strategy to accomplish this goal. A single-valued intuitionistic fuzzy (SVIF) environment is modified in order to compare the analysis produced by the suggested method with the intended methodology in order to demonstrate the suggested way. Below is an example of it.

Example 5.1. Let’s consider an SVIF context for examining the allocation of funds among companies = ( §1 =automobile company, §2 =food company, §3 =computer company, and §4 =defense company ) based on a single-valued TMF and single-valued FMF using the decision parameters = (⋎1 = risk analysis, ⋎2 = growth analysis, ⋎3 = environmental impact analysis). The formal representation of this dataset in the context of IF context properties is illustrated in Table 6.

The challenge facing the company lies in uncovering concealed patterns within the provided SVIF context presented in Table 6, with the objective of investing funds in the establishment of new ventures. To realize this objective, capital is allocated to companies exhibiting a maximum single-valued TMV exceeding 0.56 and a minimal single-valued FMV close to 0.00 based on the specified decision parameters. Assuming the company adopts a two-polar granulation (0.65, 0.12) to assess investment preferences, the context outlined in Table 6 can be disentangled through the proposed method detailed in Algorithm 2 for the defined (0.65, 0.12)-cut, as outlined below:

  • 1. ℧ℜ̃(§1, ⋎1)< 0.65, Ωℜ̃(§1, ⋎1)> 0.12.

    Therefore, the decomposition establishes a non-acceptance region within the interval (0, 1).

  • 2. ℧ℜ̃(§1, ⋎2)< 0.65, Ωℜ̃(§1, ⋎2)> 0.12.

    Therefore, the decomposition establishes a non-acceptance region within the interval (0, 1).

  • 3. ℧ℜ̃(§1, ⋎3)< 0.65, Ωℜ̃(§1, ⋎3)> 0.12.

    Therefore, the decomposition offers a non-acceptance region within the interval (0, 1).

  • 4. ℧ℜ̃(§2, ⋎1)< 0.65, Ωℜ̃(§2, ⋎1)> 0.12.

    Therefore, the decomposition establishes a non-acceptance region within the interval (0, 1).

  • 5. ℧ℜ̃(§2, ⋎2)< 0.65, Ωℜ̃(§2, ⋎2)> 0.12.

    Therefore, the decomposition establishes a non-acceptance region within the interval (0, 1).

  • 6. ℧ℜ̃(§2, ⋎3)< 0.65, Ωℜ̃(§2, ⋎3)> 0.12.

    Therefore, the decomposition establishes a non-acceptance region within the interval (0, 1).

  • 7. ℧ℜ̃(§3, ⋎1)< 0.65, Ωℜ̃(§3, ⋎1)> 0.12.

    Therefore, the decomposition establishes a non-acceptance region within the interval (0, 1).

  • 8. ℧ℜ̃(§3, ⋎2)< 0.65, Ωℜ̃(§3, ⋎2)> 0.12.

    Therefore, the decomposition offers a non-acceptance region within the interval (0, 1).

  • 9. ℧ℜ̃(§3, ⋎3)< 0.65, Ωℜ̃(§3, ⋎3)> 0.12.

    Therefore, the decomposition establishes a non-acceptance region within the interval (0, 1).

  • 10. ℧ℜ̃(§4, ⋎1)> 0.65, Ωℜ̃(§4, ⋎1)< 0.12.

    Therefore, the decomposition establishes an acceptance region, denoted as (1, 0), for both the TMV and FMV.

  • 11. ℧ℜ̃(§4, ⋎2)< 0.65, Ωℜ̃(§4, ⋎2)> 0.12.

    Therefore, the decomposition establishes a non-acceptance region within the interval (0, 1).

  • 12. ℧ℜ̃(§4, ⋎3)< 0.65, Ωℜ̃(§4, ⋎3)> 0.12.

    Therefore, the decomposition establishes a non-acceptance region within the interval (0, 1).

The decomposition computed above is presented in Table 7 in the form of a contextualized framework for processing knowledge. In this representation, (1, 0) and (0, 1) signify acceptance and non-acceptance values, respectively, for the specified decision parameters. Let’s consider the granulation with two poles at (0.65, 0.12). Under these conditions, the optimal choice is limited to object §4, specifically an arms company. Therefore, investing money in an arms company emerges as a highly favorable option.

The analysis resulting from the suggested approach bears similarity to the hybrid vector similarity method and a three-way fuzzy concept lattice. However, the proposed method achieves this by requiring computational time of O(m3) or O(n2). Consequently, it offers a more customizable granulation, allowing users to refine knowledge according to their specific requirements. To illustrate, if a user wishes to assess preferences based on a (0.65, 0.21)-cut for the context presented in Table 7, the newly decomposed context will be displayed as depicted in Table 8.

  • 1. ℧ℜ̃(§1, ⋎1)< 0.65, Ωℜ̃(§1, ⋎1)> 0.21.

    Therefore, non-acceptance zone (0, 1) is provided by the decomposition.

  • 2. ℧ℜ̃(§1, ⋎2)< 0.65, Ωℜ̃(§1, ⋎2)> 0.21.

    Therefore, non-acceptance zone (0, 1) is provided by the decomposition.

  • 3. ℧ℜ̃(§1, ⋎3)< 0.65, Ωℜ̃(§1, ⋎3)> 0.21.

    Therefore, non-acceptance zone (0, 1) is provided by the decomposition.

  • 4. ℧ℜ̃(§2, ⋎1)> 0.65, Ωℜ̃(§2, ⋎1)< 0.21.

    Acceptance region (1, 0)∀ the TMV and FMV is thus provided by the decomposition.

    ˜(§2,2)>0.65,Ω˜(§2,2)<0.21.

    Acceptance region (1, 0)∀ the TMV and FMV is thus provided by the decomposition.

  • 5. ℧ℜ̃(§2, ⋎3)< 0.65, Ωℜ̃(§2, ⋎3)> 0.21.

    Therefore, non-acceptance zone (0, 1) is provided by the decomposition.

  • 6. ℧ℜ̃(§3, ⋎1)< 0.65, Ωℜ̃(§3, ⋎1)> 0.21.

    Therefore, non-acceptance zone (0, 1) is provided by the decomposition.

  • 7. ℧ℜ̃(§3, ⋎2)< 0.65, Ωℜ̃(§3, ⋎2)> 0.21.

    Therefore, non-acceptance zone (0, 1) is provided by the decomposition.

  • 8. ℧ℜ̃(§3, ⋎3)< 0.65, Ωℜ̃(§3, ⋎3)> 0.21.

    Therefore, non-acceptance zone (0, 1) is provided by the decomposition.

  • 9. ℧ℜ̃(§4, ⋎1)> 0.65, Ωℜ̃(§4, ⋎1)< 0.21.

    Acceptance region (1, 0)∀ the TMV and FMV is thus provided by the decomposition.

  • 10. ℧ℜ̃(§4, ⋎2)> 0.65, Ωℜ̃(§4, ⋎2)< 0.21.

    Acceptance region (1, 0)∀ the TMV and FMV is thus provided by the decomposition.

  • 11. ℧ℜ̃(§4, ⋎3)< 0.65, Ωℜ̃(§4, ⋎3)> 0.21.

    Therefore, non-acceptance zone (0, 1) is provided by the decomposition.

The disassembled context reveals that selecting object §4 (arms company) and §2 (food company) can be determined using a (0.65, 0.21)-cut. Consequently, investing money in the arms and food companies would be the most preferable choice. This analysis aligns with both the vector similarity method and the three-way concept lattice. The application of the proposed method to the IVIF context is illustrated below: Table 5 serves as an illustration of the IVIF context decomposition utilizing the proposed method, as depicted in Algorithm 2. The issue pertaining to Table 5 lies in the company’s objective to identify crucial patterns for investment based on specified decision parameters. In a broader sense, to uncover these patterns, the company requires a maximal interval-valued TMV range of [0.65, 0.78], along with a minimal interval-valued FMV range of [0.12, 0.21], to validate the acceptance of the ideal conditions. The decomposed context, guided by this selected granulation, is presented in Table 9.

  • 1. ℧ℜ̃(§1, ⋎1)< (0.65, 0.78), Ωℜ̃(§1, ⋎1)> (0.12, 0.21).

    Therefore, non-acceptance zone (0, 1) is provided by the decomposition.

  • 2. ℧ℜ̃(§1, ⋎2)< (0.65, 0.78), Ωℜ̃(§1, ⋎2)> (0.12, 0.21).

    Therefore, non-acceptance zone (0, 1) is provided by the decomposition.

  • 3. ℧ℜ̃(§1, ⋎3)> (0.65, 0.78), Ωℜ̃(§1, ⋎3)> (0.12, 0.21).

    Acceptance region (1, 1)∀ the TMV and FMV is thus provided by the decomposition.

    ˜(§2,1)>(0.65,0.78),Ω˜(§2,1)>(0.12,0.21).

    Acceptance region (1, 1)∀ the TMV and FMV is thus provided by the decomposition.

  • 4. ℧ℜ̃(§2, ⋎2)> 0.65, Ωℜ̃(§2, ⋎2)> (0.12, 0.21).

    Acceptance region (1, 1)∀ the TMV and FMV is thus provided by the decomposition.

  • 5. ℧ℜ̃(§2, ⋎3)< (0.65, 0.78), Ωℜ̃(§2, ⋎3)> (0.12, 0.21).

    Therefore, non-acceptance zone (0, 1) is provided by the decomposition.

  • 6. ℧ℜ̃(§3, ⋎1)< (0.65, 0.78), Ωℜ̃(§3, ⋎1)> (0.12, 0.21).

    Therefore, non-acceptance zone (0, 1) is provided by the decomposition.

  • 7. ℧ℜ̃(§3, ⋎2)< (0.65, 0.78), Ωℜ̃(§3, ⋎2)> (0.12, 0.21).

    Therefore, non-acceptance zone (0, 1) is provided by the decomposition.

  • 8. ℧ℜ̃(§3, ⋎3)< (0.65, 0.78), Ωℜ̃(§3, ⋎3)> (0.12, 0.21).

    Therefore, non-acceptance zone (0, 1) is provided by the decomposition.

  • 9. ℧ℜ̃(§4, ⋎1)> (0.65, 0.78), Ωℜ̃(§4, ⋎1)< (0.12, 0.21).

    Therefore, for any TMV and FMV, the decomposition yields an acceptability region of (1, 0).

  • 10. ℧ℜ̃(§4, ⋎2)> (0.65, 0.78), Ωℜ̃(§4, ⋎2)> (0.12, 0.21).

    As a result, the breakdown offers an acceptance region (1, 1) the TMV and FMV.

  • 11. ℧ℜ̃(§4, ⋎3)> (0.65, 0.78), Ωℜ̃(§4, ⋎3)> (0.12, 0.21).

    Recognition region (1, 1) is thus provided by the decomposition for all TMV and FMV.

Table 9 illustrates that the object §4 exhibits a threshold measure value of 1 for each attribute, while object §2 attains the maximum TMV for two specific attributes, namely ⋎1 and ⋎2. Consequently, the arms company (i.e., §4) emerges as the primary preference for investment, followed by the food company (i.e., §2) as the secondary option. These findings align well with the correlation method, aggregation operator, and the associated concept lattice depicted in Figure 1. Moreover, for a more detailed analysis of preferences, the company can explore variations in granulation, aiming for increased refinement within either O(n*m3) or O(n2 *m) computational time. The methods proposed in this paper are anticipated to be highly beneficial for researchers engaged in the realm of interval-valued multi-decision-making processes. Anticipates scholars studying interval-valued multi-decision-making processes will find great benefit from the techniques this paper offers.

The analysis and processing of large amounts of technological data are integral to modern decision-making. To address this need, we have developed techniques and tools designed to compute accurate information and enhance efficiency. Utilizing graph and lattice methods to condense large datasets into single values is resource-intensive. However, the concept lattice in fuzzy sets, integrated with interval-valued fuzzy sets, provides a powerful framework for scenarios where each item has a range of possible values defined by MD and NMD. The lattice function differs in two key aspects: periodicity and symmetry at the origin. Consequently, current concept lattice rules have been adapted to the IVIF network environment. The advantages and contributions of these techniques can be summarized as follows:

  • · We introduced the term lattice environment of an IVIF network and established its fundamental properties. This foundational step enabled the creation of a comprehensive framework for analyzing and assessing IVIF contexts.

  • · This study thoroughly examines the primary features of IVIF contexts, including the technical intricacies of their scoring systems, precise computations, and the formulation of ordering principles tailored specifically for IVIF contexts using concept lattices. This detailed evaluation provides a robust foundation for understanding the core concepts and methodologies underpinning IVIF environments.

  • · We developed mathematical methods optimized for processing complex value data. These operators facilitate the identification of numerous optimal values, each with distinct characteristics, ensuring robust computational efficiency.

  • · Our approach is meticulously designed to exploit the unique attributes of IVIF contexts in conjunction with concept lattices, enabling intelligent and efficient decisionmaking processes that effectively address the complexities of interval-valued data.

  • · The methodology focuses on uncovering IVIF concepts and decomposing intuitionistic fuzzy contexts based on user-defined (α, β)–cuts for truth (α-cut) and falsity (β-cut) membership values. The results of these methods align closely with those established correlation and aggregation techniques

  • · Concept lattices hold significant potential for extending the applicability of IVIF contexts to various industries and domains, including healthcare, robotics, information retrieval systems, intelligent systems, artificial intelligence, ecological science, and logistics management. While this study does not address the interdependencies between these applications, future research will explore these relationships to further enhance the utility of IVIF-based methodologies.

Table. 1.

Table 1.1) involves IVIF relationship shown in Figure 1.

123
§1L'0.430.430.78
§1I'0.560.650.90
Ω§1L'0.430.210.43
Ω§1I'0.430.430.56

Table. 2.

Table 2. IVIF relation for §2, shown in Figure 1.

123
§1L'0.650.650.34
§1I'0.780.780.65
Ω§1L'0.210.210.87
Ω§1I'0.340.340.90

Table. 3.

Table 3. An IVIF relations for §3.

123
§3L'0.340.560.43
§3I'0.650.650.56
Ω§3L'0.340.340.78
Ω§3I'0.430.430.90

Table. 4.

Table 4. An IVIF relationship by §4.

123
§4L'0.780.650.65
§4I'0.870.780.78
Ω§4L'0.120.120.87
Ω§4I'0.210.340.90

Table. 5.

Table 5. IVIF representation for Tables 1 to 4.

123
§1[(0.43, 0.56), (0.34, 0.43)][(0.43, 0.65), (0.21, 0.43)][(0.78, 0.90), (0.43, 0.56)]
§2[(0.65, 0.78), (0.21, 0.34)][(0.65, 0.78), (0.21, 0.34)][(0.34, 0.65), (0.87, 0.90)]
§3[(0.34, 0.65), (0.34, 0.43)][(0.56, 0.65), (0.34, 0.43)][(0.45, 0.56), (0.78, 0.90)]
§4[(0.78, 0.87), (0.12, 0.21)][(0.65, 0.78), (0.12, 0.34)][(0.65, 0.78), (0.87, 0.90)]

Table. 6.

Table 6. A three-way fuzzy context representation using intuitionistic fuzzy sets.

123
§1(0.43, 0.34)(0.43, 0.34)(0.21, 0.56)
§2(0.65, 0.21)(0.65, 0.21)(0.56, 0.21)
§3(0.34, 0.34)(0.56, 0.34)(0.56, 0.21)
§4(0.78, 0.12)(0.65, 0.21)(0.43, 0.21)

Table. 7.

Table 7. A decomposition shown in Table 6.

123
§1(0, 1)(0, 1)(0, 1)
§2(0, 1)(0, 1)(0, 1)
§3(0, 1)(0, 1)(0, 1)
§4(1, 0)(0, 1)(0, 1)

Table. 8.

Table 8. An analysis of the background presented in Table 6.

123
§1(0, 1)(0, 1)(0, 1)
§2(1, 0)(1, 0)(0, 1)
§3(0, 1)(0, 1)(0, 1)
§4(1, 0)(1, 0)(0, 1)

Table. 9.

Table 9. Context breakdown of Table 6 (0.12, 0.21).

123
§1(0, 1)(0, 1)(1, 1)
§2(1, 1)(1, 1)(0, 1)
§3(0, 1)(0, 1)(0, 1)
§4(1, 0)(1, 1)(1, 1)

Table. 10.

Algorithm 1. Proposed algorithm to develop the IVIF concept.

Input:An IVIF envirnment , whereas , and ℜ̃ express IVIF relation.
Output:Set of IVIFFCs
Extent:{§,[A(§)L',A(§)I'],[ΩA(§)L',ΩA(§)I']},
Intent:{,[B(yj)L',B()I'],[ΩB(yj)L',ΩB()I']}, where ⋎ ≤ n and ⋌ ≤ m.
1Determine the subsets S of given IV IF attribues 2m.
2for ⋌ = 1 to 2m.
3 Determine the value of the acceptance membership = ([1.00, 1.00], [0.00, 0.00]) for each subsets
4 Use the scrolling operator to locate the encompassing object set ():{,[BSL'(),BSI'()],[ΩBSL'(),ΩBSI'()]}.
5 The down operator (↓) provides the following object set: {§,[A(§)L',A(§)I'],[ΩA(§)L',ΩA(§)I']}
6 The calculation of the membership value for the acquired set of objects can be determined in the following manner:ASL'=minBSL'[μL'˜(§,)],ASI'=minBSL'[μI'˜(§,)],ΩASL'=maxΩBSL'[μΩL'˜(§,)],ΩASI'=maxΩBSI'[μΩI'˜(§,)].
7 Determine the attribute set that covers the specified object set using the upper operator, denoted as ↑ (UP). {§,[A(§)L',A(§)I'],[ΩA(§)L',ΩA(§)I']}.
8 Now, calculate the membership value for the obtained attribute set using the following procedure:BSL'=maxASL'[μL'˜(§,)],BSI'=minASI'[μI'˜(§,)],ΩBSL'=maxΩASL'[μΩL'˜(§,)],ΩBSI'=maxΩASI'[μΩI'˜(§,)].
9 The formal concepts (AS, BS) are derived from the selected subset.
10end for
11In a similar way, more concepts can be developed with the other subsets.
12Build the IVIF concept lattice.

Table. 11.

Algorithm 2. Suggested algorithm for breaking down the IF environment into α and β.

Input:An IF environment where , and (ℝ̃ = (℧ℜ̃(§, ⋎), Ωℜ̃(§, ⋎))
Output:The set of decomposed environment Kα, β
1Let us assume an IF environment .
2Define the granulation for the TMV and FMV i.e., (α, β).
3Now the decomposed the given environment Kα, β as follows:
4if {℧ℜ̃(§, ⋎)|μ℧ℜ̃(§,⋎)α}then represent 1.00 at the place of TMV,else 0.00 at the place of TMV.
5ifℜ̃(§, ⋎)|μΩℜ̃(§,⋎)β}then represent 0.00 at the place of FMV,else 1.00 at the place of FMV.
6The decomposed environment follows the equality:K = ∪α, βKα, β.
7The decomposed binary environment write for the user-defined granulation.
8Derive the knowledge from the decomposed environment Kα, β.

  1. Guan, H, Khan, WA, Saleem, S, Arif, W, Shafi, J, and Khan, A (). Some connectivity parameters of interval-valued intuitionistic fuzzy graphs with applications. Axioms. 12, 2023. article no 1120
  2. Gratzer, GA (2011). Lattice Theory: Foundation. Basel, Switzerland: Birkhauser https://doi.org/10.1007/978-3-0348-0018-1
    CrossRef
  3. Yu, J, and Deng, X (2024). The graph model under intuitionistic fuzzy preference considering consensus and attitudes. IEEE Transactions on Fuzzy Systems. 32, 3914-3927. https://doi.org/10.1109/TFUZZ.2024.3385769
    CrossRef
  4. Bozhenyuk, A, Belyakov, S, Kacprzyk, J, and Knyazeva, M (2020). The method of finding the base set of intuitionistic fuzzy graph. Intelligent and Fuzzy Techniques: Smart and Innovative Solutions. Cham, Switzerland: Springer, pp. 18-25 https://doi.org/10.1007/978-3-030-51156-2_3
  5. Shao, Z, Kosari, S, Rashmanlou, H, and Shoaib, M (). New concepts in intuitionistic fuzzy graph with application in water supplier systems. Mathematics. 8, 2020. article no 1241
  6. Yang, Y, Li, H, Zhang, Z, and Liu, X (2020). Interval-valued intuitionistic fuzzy analytic network process. Information Sciences. 526, 102-118. https://doi.org/10.1016/j.ins.2020.03.077
    CrossRef
  7. Dong, JY, and Wan, SP (). Interval-valued intuitionistic fuzzy best-worst method with additive consistency. Expert Systems with Applications. 236, 2024. article no 121213
  8. Jokela, J (). Ideals, bands and direct sum decompositions in mixed lattice vector spaces. Positivity. 27, 2023. article no 32
  9. Yao, X, Ding, F, and Luo, C (2022). Time series prediction based on high-order intuitionistic fuzzy cognitive maps with variational mode decomposition. Soft Computing. 26, 189-201. https://doi.org/10.1007/s00500-021-06455-0
    CrossRef
  10. Singh, PK (2018). Interval-valued neutrosophic graph representation of concept lattice and its (α, β, γ)-decomposition. Arabian Journal for Science and Engineering. 43, 723-740. https://doi.org/10.1007/s13369-017-2718-5
    CrossRef
  11. Ajmal, N, and Thomas, KV (1994). Fuzzy lattices. Information Sciences. 79, 271-291. https://doi.org/10.1016/0020-0255(94)90124-4
    CrossRef
  12. Kaplansky, I (2020). Set Theory and Metric Spaces. Providence, RI: American Mathematical Society
  13. Pak, CH, Kim, JH, and Jong, MG (2021). Describing hierarchy of concept lattice by using matrix. Information Sciences. 542, 58-70. https://doi.org/10.1016/j.ins.2020.05.020
    CrossRef
  14. Tamburri, DA (). Design principles for the General Data Protection Regulation (GDPR): a formal concept analysis and its evaluation. Information Systems. 91, 2020. article no 101469
  15. Rupp, V, and von Grafenstein, M (). Clarifying “personal data” and the role of anonymisation in data protection law including and excluding data from the scope of the GDPR (more clearly) through refining the concept of data protection. Computer Law & Security Review. 52, 2024. article no 105932
  16. Yao, Y (2020). Three-way granular computing, rough sets, and formal concept analysis. International Journal of Approximate Reasoning. 116, 106-125. https://doi.org/10.1016/j.ijar.2019.11.002
    CrossRef
  17. Birjali, M, Kasri, M, and Beni-Hssane, A (). A comprehensive survey on sentiment analysis: approaches, challenges and trends. Knowledge-Based Systems. 226, 2021. article no 107134
  18. Zhi, H, and Li, Y (). Attribute granulation in fuzzy formal contexts based on L-fuzzy concepts. International Journal of Approximate Reasoning. 159, 2023. article no 108947
  19. Zadeh, LA (1965). Fuzzy sets. Information and Control. 8, 338-353. https://doi.org/10.1016/S0019-9958(65)90241-X
    CrossRef
  20. Burusco, A, and Fuentes-Gonzalez, R (2001). Study of the interval-valued contexts. Fuzzy Sets and Systems. 121, 439-452. https://doi.org/10.1016/S0165-0114(00)00059-2
    CrossRef
  21. Zhang, X, and Liang, R (). Interval-valued general residuated lattice-ordered groupoids and expanded triangle algebras. Axioms. 12, 2022. article no 42
  22. Kaburlasos, VG (). Lattice computing: a mathematical modelling paradigm for cyber-physical system applications. Mathematics. 10, 2022. article no 271
  23. Kaburlasos, VG, Lytridis, C, Bazinas, C, Chatzistamatis, S, Sotiropoulou, K, Najoua, A, Youssfi, M, and Bouattane, O . Head pose estimation using lattice computing techniques., Proceedings of 2020 International Conference on Software, Telecommunications and Computer Networks (SoftCOM), 2020, Split, Croatia, Array, pp.1-5. https://doi.org/10.23919/SoftCOM50211.2020.9238315
  24. Zhang, S, Zhang, P, and Zhang, M (2019). Fuzzy emergency model and robust emergency strategy of supply chain system under random supply disruptions. Complexity, 2019. article no 3092514
  25. Singh, PK (2020). Bipolar δ-equal complex fuzzy concept lattice with its application. Neural Computing and Applications. 32, 2405-2422. https://doi.org/10.1007/s00521-018-3936-9
    CrossRef
  26. Kamran, M, Abdalla, MEM, Nadeem, M, Uzair, A, Farman, M, Ragoub, L, and Cangul, IN (). A systematic formulation into neutrosophic Z methodologies for symmetrical and asymmetrical transportation problem challenges. Symmetry. 16, 2024. article no 615
  27. Ashraf, S, Khan, A, Kamran, M, and Pandit, MK (2023). Evaluating the quality of medical services using intuitionistic hesitant fuzzy Aczel–Alsina aggregation information. Scientific Programming, 2023. article no 7235996
  28. Zhang, Q, Xia, D, Liu, K, and Wang, G (2020). A general model of decision-theoretic three-way approximations of fuzzy sets based on a heuristic algorithm. Information Sciences. 507, 522-539. https://doi.org/10.1016/j.ins.2018.10.051
    CrossRef
  29. Zhang, S, Hou, Y, Zhang, S, and Zhang, M (2017). Fuzzy control model and simulation for nonlinear supply chain system with lead times. Complexity, 2017. article no 2017634
  30. Ge, J, and Zhang, S (2020). Adaptive inventory control based on fuzzy neural network under uncertain environment. Complexity, 2020. article no 6190936
  31. Salamat, N, Kamran, M, Ashraf, S, Abdulla, MEM, Ismail, R, and Al-Shamiri, MM (2024). Complex decision modeling framework with fairly operators and quaternion numbers under intuitionistic fuzzy rough context. CMES-Computer Modeling in Engineering & Sciences. 139, 1893-1932. https://doi.org/10.32604/cmes.2023.044697
    CrossRef
  32. Zhang, N, Qi, W, Pang, G, Cheng, J, and Shi, K (). Observer-based sliding mode control for fuzzy stochastic switching systems with deception attacks. Applied Mathematics and Computation. 427, 2022. article no 127153
  33. Sun, Q, Ren, J, and Zhao, F (). Sliding mode control of discrete-time interval type-2 fuzzy Markov jump systems with the preview target signal. Applied Mathematics and Computation. 435, 2022. article no 127479
  34. Duan, ZX, Liang, JL, and Xiang, ZR (2022). H control for continuous-discrete systems in T-S fuzzy model with finite frequency specifications. Discrete and Continuous Dynamical Systems - Series S. 15, 3155-3172. https://doi.org/10.3934/dcdss.2022064
    CrossRef
  35. Sarwar, M, and Li, T (2019). Fuzzy fixed point results and applications to ordinary fuzzy differential equations in complex valued metric spaces. Hacettepe Journal of Mathematics and Statistics. 48, 1712-1728. https://doi.org/10.15672/HJMS.2018.633
  36. Xia, Y, Wang, J, Meng, B, and Chen, X (). Further results on fuzzy sampled-data stabilization of chaotic nonlinear systems. Applied Mathematics and Computation. 379, 2020. article no 125225
  37. Gao, M, Zhang, L, Qi, W, Cao, J, Cheng, J, Kao, Y, Wei, Y, and Yan, X (). SMC for semi-Markov jump TS fuzzy systems with time delay. Applied Mathematics and Computation. 374, 2020. article no 125001
  38. Yang, S, Lu, Y, Jia, X, and Li, W (2020). Constructing three-way concept lattice based on the composite of classical lattices. International Journal of Approximate Reasoning. 121, 174-186. https://doi.org/10.1016/j.ijar.2020.03.007
    CrossRef
  39. Zhao, X, and Miao, D (2022). Isomorphic relationship between L-three-way concept lattices. Cognitive Computation. 14, 1997-2019. https://doi.org/10.1007/s12559-021-09902-0
    CrossRef
  40. Ranitovic, MG, and Petojevic, A (2014). Lattice representations of interval-valued fuzzy sets. Fuzzy Sets and Systems. 236, 50-57. https://doi.org/10.1016/j.fss.2013.07.006
    CrossRef
  41. Zhang, S, Zhang, C, Zhang, S, and Zhang, M (2018). Discrete switched model and fuzzy robust control of dynamic supply chain network. Complexity, 2018. article no 3495096
  42. Djouadi, Y, and Prade, H (2009). Interval-valued fuzzy formal concept analysis. Foundations of Intelligent Systems. Heidelberg, Germany: Springer, pp. 592-601 https://doi.org/10.1007/978-3-642-04125-9_62
    CrossRef
  43. Kamran, M, Ashraf, S, and Hameed, MS (2023). A promising approach with confidence level aggregation operators based on single-valued neutrosophic rough sets. Soft Computing. https://doi.org/10.1007/s00500-023-09272-9
    CrossRef
  44. Singh, PK (2017). Three-way fuzzy concept lattice representation using neutrosophic set. International Journal of Machine Learning and Cybernetics. 8, 69-79. https://doi.org/10.1007/s13042-016-0585-0
    CrossRef
  45. Razzaque, A, Masmali, I, Latif, L, Shuaib, U, Razaq, A, Alhamzi, G, and Noor, S (). On t-intuitionistic fuzzy graphs: a comprehensive analysis and application in poverty reduction. Scientific Reports. 13, 2023. article no 17027
  46. Mao, H (2017). Representing attribute reduction and concepts in concept lattice using graphs. Soft Computing. 21, 7293-7311. https://doi.org/10.1007/s00500-016-2441-2
    CrossRef
  47. Zhang, S, and Zhang, M (2020). Mitigation of bullwhip effect in closed-loop supply chain based on fuzzy robust control approach. Complexity, 2020. article no 1085870
  48. Singh, PK, and Gani, A (2015). Fuzzy concept lattice reduction using Shannon entropy and Huffman coding. Journal of Applied Non-Classical Logics. 25, 101-119. https://doi.org/10.1080/11663081.2015.1039857
    CrossRef

Misbah Rasheed is a Ph.D. scholar at the Institute of Mathematics, Khwaja Fareed University of Engineering and Information Technology, Rahim Yar Khan, Pakistan. She specialized in computational mathematics during her master’s studies. Her research focuses on fuzzy logic, decision-making, and graph-based approaches.

Muntazim Abbas Hashmi is an assistant Professor of Mathematics at the Institute of Mathematics, Khwaja Fareed University of Engineering and Information Technology, Rahim Yar Khan 64200, Pakistan. His research interests include mathematical models and differential equations, cryptography, steganography, watermarking, statistical models and simulation, Monte Carlo methods, fuzzy hypothesis testing, Bayesian hypothesis testing, estimation theory, information theory, credibility theory, uncertainty theory, distribution theory, data analysis (environmental, agricultural, and medical), system analysis (environmental water pollution), computer technologies, mathematical statistics, and computational mathematics.

Muhammad Kamran is a lecturer in Mathematics at Thal University, Bhakkar, Pakistan. His research interests include fuzzy logic, decision-making, uncertainty theory, fuzzy hypothesis testing, system analysis, computer technologies, mathematical statistics, computational mathematics, and graph theory.

Aamir Hussain Khan is a visiting lecturer in Mathematics at Thal University, Bhakkar, Pakistan. His research focuses on fuzzy logic, numerical methods, and graph theory.

Lakhdar Ragoub is a professor in the Mathematics Department at Prince Mugrin University, Al Madinah, Saudi Arabia. His research interests include mathematical statistics and computational mathematics.

Mohammad Mahtab Alam is a Professor with the Department of Basic Medical Sciences, College of Applied Medical Science, King Khalid University, Abha, Saudi Arabia. His research focuses on computational mathematics and its applications.

Umber Rana is an assistant professor of Mathematics at the Institute of Mathematics, Khwaja Fareed University of Engineering and Information Technology, Rahim Yar Khan, Pakistan. Her research interests include mathematical models and differential equations, cryptography, steganography, watermarking, statistical models and simulation, Monte Carlo methods, fuzzy hypothesis testing, Bayesian hypothesis testing, estimation theory, information theory, credibility theory, uncertainty theory, distribution theory, data analysis (environmental, agricultural, and medical), system analysis (environmental water pollution), computer technologies, mathematical statistics, and computational mathematics.

Article

Original Article

International Journal of Fuzzy Logic and Intelligent Systems 2024; 24(4): 360-377

Published online December 25, 2024 https://doi.org/10.5391/IJFIS.2024.24.4.360

Copyright © The Korean Institute of Intelligent Systems.

Enhancing Complex Relationships between Interval-Valued Intuitionistic Fuzzy Graphs and Concept Lattice Exploration

Misbah Rasheed1, Muntazim Abbas Hashmi1, Muhammad Kamran2, Aamir Hussain Khan2, Lakhdar Ragoub3, Mohammad Mahtab Alam4, and Umber Rana1

1Institute of Mathematics, Khwaja Fareed University of Engineering & Information Technology,Rahim Yar Khan, Pakistan
2Department of Mathematics, Thal University Bhakkar, Pakistan
3Mathematics Department, Prince Mugrin University, Al Madinah, Saudi Arabia
4Department of Basic Medical Sciences, College of Applied Medical Science, King Khalid University, Abha, Saudi Arabia

Correspondence to:Lakhdar Ragoub (l.ragoub@upm.edu.sa)

Received: January 31, 2024; Revised: June 10, 2024; Accepted: September 30, 2024

This is an Open Access article distributed under the terms of the Creative Commons Attribution Non-Commercial License (http://creativecommons.org/licenses/by-nc/3.0/) which permits unrestricted noncommercial use, distribution, and reproduction in any medium, provided the original work is properly cited.

Abstract

The recent development of a two-way structure for fuzzy concept lattices, based on intuitionistic fuzzy sets, aims to characterize the ambiguity and vagueness in specific data sets by accounting for acceptance, opposition, and uncertainty. This paper leverages the graphical properties of interval-valued intuitionistic fuzzy sets (IVIFSs) to address the issue of partial ignorance in a two-way fuzzy framework. It demonstrates how an IVIFS-based environment reflects hidden patterns in concept lattices, such as formal concepts. We propose a novel strategy for generating interval-valued formal concepts by integrating the properties of concept lattices, interval-valued intuitionistic fuzzy graphs, and IVIFSs. Additionally, we introduce a method to enhance specific patterns using interval-valued intuitionistic fuzzy formal principles, defined via (α, β)-cut for their respective truth (α-cut) and falsity (β-cut) membership values. Examples are provided to illustrate the proposed approaches, demonstrating their practical applicability and effectiveness.

Keywords: Intuitionistic fuzzy set, Lattice features, Fuzzy graph, Decision-making

1. Introduction

The introduction is divided into two main sections: interval-valued intuitionistic fuzzy (IVIF) graph representations [1] and alpha-beta decomposition. In the mathematical field of lattice theory, every pair of elements in a substantially ordered set has a unique upper and lower bound [2]. Lattice theory has significant applications in domains such as artificial intelligence, computer science, and decision-making, demonstrating considerable potential for the grid idea. Intuitionistic fuzzy (IF) graphs, an extension of fuzzy graphs, form the foundation of the IVIF graphs [35]. IVIF graphs incorporate interval-valued intuitionistic fuzzy sets (IVIFSs), which represent membership degrees (MD) and non-membership degrees (NMD) using intervals rather than single values [6, 7]. This approach effectively captures uncertainty and ambiguity in data representation. The alpha-beta decomposition technique divides a lattice into two distinct components: the alpha component and the beta component. The alpha component consists of elements with a single immediate successor, representing the lower portion of the lattice. These elements are directly connected to the minimal element of the lattice. Conversely, the beta component comprises elements with a single immediate predecessor, representing the upper portion of the lattice and including those directly associated with the maximal element [8].

The alpha-beta decomposition systematically organizes the lattice structure, making it particularly useful for concept analysis, knowledge representation, and decision-support systems. By integrating the alpha-beta decomposition with intuitionistic fuzzy graph representation in C language, researchers can visualize and analyze uncertain lattice systems more effectively, reducing statistical uncertainty, improving intuition, and enhancing fuzzy logic capabilities [9, 10]. This combined approach provides a deeper understanding of lattice structures and broadens their applications. In mathematical terms, a lattice is a discrete group of elements in n-dimensional Euclidean space (ℜn) that repeats periodically. It can be visualized as an infinite grid or mesh, with points in the lattice represented as integer linear combinations of linearly independent basis vectors. Lattices are used in many mathematical fields, including algebra, wide variety theory, geometry, and physics.

Lattice structures exhibit several key properties:

Periodicity: If the lattice contains a point P, it also contains any point Q obtained by adding or subtracting a linear combination of basis vectors from P. In other words, the lattice oscillates back and forth.

Invariance under translation: Any point derived from translating P by a lattice vector is also within the lattice if a point P is in it, indicating the absence of a preferred origin.

Symmetry: Lattices often display symmetry with respect to rotations, assessments, or other transformations.

Fuzzy lattices [11] extend classical lattice theory to simplify inaccurate or misleading statistics. In fuzzy lattices, every element is a fuzzy set, with interactions governed by MD rather than strict ordering. This makes connectional representation more flexible, accommodating uncertain and imprecise information. Lattice operations are generalized to accommodate fuzzy degrees, with the join operation yielding the least upper bound and the meet operation yielding the greatest lower bound. In set theory, “decomposition” is defined as dividing a set into exhaustive and mutually exclusive subsets [12]. Fuzzy decomposition divides fuzzy sets into overlapping subgroups (often called additives or divisions) that reflect distinct qualities or functions. With MD 0–1, furnished sets provide factor departments with more options and nuance. Fuzzy decomposition enables the division of items into multiple subgroups instead of crisp units.

Alpha-beta fuzzy decomposition splits a complex fuzzy set into two components: beta (β) and alpha (α). The alpha component, which is critical to fuzzy sets, represents elements with high confidence or comfort in the set, often associated with stronger membership. In contrast, the beta component, a non-critical element of fuzzy sets, represents elements with lower confidence or weaker membership. This decomposition facilitates pattern recognition, fuzzy logic management, and decision-making.

2. Literature Review

Formal concept analysis (FCA) was first introduced by Wille [13] as a method for analyzing binary data matrices using principles from applied modern algebra. The information matrix ( ) represents the relationships ( ) between objects ( ) and a chosen attribute set ( ). FCA employs mathematical techniques to uncover hidden patterns, referred to as formal concepts, within the data matrix [14, 15]. These discovered concepts, when organized within the concept lattice, can facilitate various information processing tasks across domains [16, 17]. Fuzzy logic has been incorporated into FCA [18] to handle datasets containing fuzzy attributes [19]. Using an interval-valued fuzzy context [20, 21] and graphical visualization techniques [22, 23], this approach allows for the representation of bipolarity [24, 25] in heterogeneous data. When datasets exhibit similar ambiguous qualities, composition methods can establish links between attributes. Alternatively, analysis can be conducted using set-based approximations or different possibility analysis frameworks [26, 27]. To address attribute ambiguity and uncertainty, recent research employs two-way fuzzy spaces, a two-way decision framework, and their associated partial ordering [2831]. These models can also be applied through differential equations and have found utility in ensuring the sustainability of supply chain management [3234]. Given the critical role of the supply chain in business operations, the integration of fuzzy logic into differential equations provides a novel method for managing uncertainties, with applications extending to data analysis [3537].

This study developed a framework to better understand two-way formal concepts and their hierarchical representation within the concept lattice. The framework enables a thorough examination of deficiencies in attributes related to truth membership functions (TMFs), falsehood membership functions (FMFs), and indeterminacy membership degrees (IMDs) [38, 39]. Previous research found that single-valued fuzzy membership methods were inadequate for addressing issues of partial ignorance, inconsistent representations, and unpredictability in datasets. Various approaches have been proposed to address these challenges, including interval-valued fuzzy formal concept analysis, interval-valued fuzzy graphs for concept lattice representation, and interval-valued fuzzy lattices [29, 40, 41]. However, despite these advancements, accurately capturing uncertainty in data remains a limitation. For example, in a dataset where 40 out of 100 voters support a petition, 30 oppose it, and 20 are undecided, IVIFSs struggle to adequately represent this distribution of uncertainty. Significant research has focused on exploring the properties of IVIFSs and their networks, as well as their potential applications in knowledge processing. One notable method for addressing partial ignorance in knowledge representation involves the separate use of interval-valued TMFs and FMFs to capture uncertainty more effectively.

According to Djouadi and Prade [42], using interval-valued fuzzy sets alone is insufficient to fully capture the partial uncertainty inherent in the provided fuzzy characteristics. To address this limitation, we propose employing interval-valued fuzzy sets as a key approach. These sets include the interval-valued TMF [℧LI(xi), ℧UI(xi)] and the interval-valued FMF [ΩLI(xi),ΩUI(xi)] which coexist within intuitionistic fuzzy sets I in a three-way decision space. These functions are defined over the domain of objects . Recent applications of these features span various fields, including relational databases, graph modeling [34], multi-decision-making processes [43], and FCA. Interval-valued fuzzy properties, which account for partial ignorance in data, provide valuable insights for deeper investigations. Examples include IVIF graphs, logic, and two-way fuzzy concept lattices [44, 45] By leveraging interval-valued fuzzy properties, significant hidden patterns in data can be identified and represented in formats that balance specificity and generality, enhancing comprehension. However, when users select specific core concepts at their desired granularity for truth and falsity membership values, the computational cost increases. Examples of computationally intensive approaches include bipolar fuzzy contexts, two-way fuzzy contexts, fuzzy concept lattices, formal concepts [4648], interval-valued contexts, and triarchic reductions of formal contexts. To mitigate this issue, we propose an alternative strategy: identifying key conceptual themes through (α, β)-cuts, which independently define the TMF (α-cut) and FMF (β-cut). The goal of reduced interval-valued intuitionistic concept generation is to streamline decision-making and minimize computational overhead.

3. Problem Statement

Existing methods using fuzzy sets, particularly IVIFSs, have been applied to address data ambiguity. However, they often fail to produce models that accurately represent the intricate relationships within complex datasets. This study seeks to demonstrate how IVIF graphs can enhance the accuracy and clarity of hidden pattern detection in complex datasets by introducing interval-valued intuitive properties in conceptual networks. By combining fuzzy sets and graphs with (α, β)-cuts for distinct truth and falsehood values, our proposed method offers a more nuanced understanding and representation of data patterns. These advancements over existing approaches are validated through practical examples, highlighting their benefits and potential for improved decision-making in fields such as data mining and knowledge discovery. To achieve these objectives, the research focuses on the following:

  • · Proposing an approach based on the characteristics of IVIFSs to efficiently express partial uncertainty in data with fuzzy attributes.

  • · Demonstrating how hidden patterns can be identified within an IVIF framework using the properties of fuzzy graphs and lattices.

  • · Introducing (α, β)-cuts as a method to analyze the iIVIF environment, specifically targeting truth (α-cut) and uncertainty (β-cut) values, with an example illustrating the approach.

  • · Using correlation techniques and operator results to empirically evaluate the proposed method.

4. Proposed Method

In this section, we present the features of interval-valued fuzzy sets and their graphical sequence diagrams, which form the foundation for IVIFFCs. Using the proposed method, we construct and analyze bipolar gap-valued concepts, enabling a comprehensive examination of interval-valued fuzzy data.

4.1 IVIF Graph

Definition 4.1. Let xi be an element of the set , representing a collection of factors or objects. In this context, I within can be characterized using an interval-valued TMF denoted as ℧I (ξ) and an interval-valued FMF denoted as ΩI (ξ). For each specific point xi in , the values ℧I (ξ) and ΩI (ξ) are subsets of the interval [0, 1]. The representation of IVIFSs is as follows:

I={§,[I(§)L',I(§)I'],[ΩI(§)L',ΩI(§)I']:§X},

where ℧I(§), ΩI(§) ⊆ [0, 1].

Definition 4.2. Let I3 represent the intersection of two interval-valued fuzzy sets, I1 and I2, within a universal set . The TMF and FMF of I3 are computed as follows:

I3(§)L'=min [I1(§)L',I2(§)L'],I3(§)I'=min [I1(§)I',I2(§)I'],ΩI3(§)L'=max [ΩI1(§)L',ΩI2(§)L'],ΩI3(§)I'=max [ΩI1(§)I',ΩI2(§)I'],

This operation identifies the infimum of any two given bipolar IVIFFCs.

Definition 4.3. Let I3 represent the union of two interval-valued fuzzy sets I1 and I2, within a given universal set ,. The TMF and FMF of I3 are computed as follows:

I3(§)L'=max [I1(§)L',I2(§)L'],I3(§)I'=max [I1(§)I',I2(§)I'],ΩI3(§)L'=min [ΩI1(§)L',ΩI2(§)L'],ΩI3(§)I'=min [ΩI1(§)I',ΩI2(§)I'],§X.

This operation identifies the supremum of any two given bipolar IVIFFCs.

Definition 4.4. Let G = (⋎,E) be an IVIF graph where the vertices (⋎) are described by an interval-valued TMF[ΞL',ΞI'] and an interval-valued FMF[ΩΞL',ΩΞI'], such as

{(Ξ),Ω(Ξ)[0,1]2}Ξ.

Similarly, edges (E) can be characterized by IVIF relationships

{(E(×),ΩE(×))[0,1]2},

for all ⋎ × ⋎ ∈ E such that

EL'(ΞΞ)min [EL'(Ξ),EL'(Ξ)],EI'(ΞΞ)min [EI'(Ξ),EI'(Ξ)],ΩEL'(ΞΞ)max [ΩEL'(Ξ),ΩEL'(Ξ)],ΩEI'(Ξ,Ξ)max [ΩEI'(Ξ),ΩEI'(Ξ)].

The IVIF graph is complete if and only if

EL'(ΞΞ)=min [EL'(Ξ),EL'(Ξ)],EI'(ΞΞ)=min [EI'(Ξ),EI'(Ξ)],ΩEL'(ΞΞ)=max [ΩEL'(Ξ),ΩEL'(Ξ)],ΩEI'(ΞΞ)=max [ΩEI'(Ξ),ΩEI'(Ξ)].

Here, (℧EΞ), ΩE)) = (0, 0) ∀(vi, vi) ∈ (⋎ × ⋎/E).

The following section introduces a technique that examines the latent pattern within the IVIF context by leveraging the characteristics of the concept lattice across various granulations, as well as a technique that generates IVIF concepts using the previously defined IVIFSs and accounting for its concept lattice, partial sorting principle, and graph.

4.2 Suggested Process for Developing IVIF Concepts

We propose a method to identify formal concepts in IVIF data, leveraging intuitionistic logic, IVIF graphs, interval-valued lattices, and Galois connections. Assume an IVIF context , where , and˜={(§,),[˜(§,)L',˜(§,)I'],[Ω˜(§,)L',Ω˜(§,)I']},

Using this context, the concept of an IVIF can be defined as follows:

Definition 4.5. Suppose an IVIFS of attributesB={,[B()L',B()I'],[ΩB()L',ΩB()I']:[0,1]2:N}.

Be represented by an interval-valued TMF[B()L',B()I'] and an interval-valued FMF[B()L',B()I'], independently. The exterior component set for a chosen IVIF attribute set is determined as follows:

A={§,[A(§)L',A(§)I'],[ΩA(§)L',ΩA(§)I']:[0,1]2:§X}.

These components are distinguished by their respective interval-valued TMF[B()L',B()I'] and interval-valued FMF[A()L',A()I'], separately.

Formal concepts are defined as IVIFSs for objects and attributes, denoted as (A, B), which exhibit closure under a Galois connection: A = B and B = A. This relationship identifies objects with a maximum interval-valued TMF and a minimum FMF, integrating information from a shared set of attributes. A component-wise approach simplifies this integration within the interval-valued fuzzy space [0, 1]2. The method ensures that no additional objects or attributes can increase the IVIF membership values (IVIFMVs) of the identified sets. To exclusively identify the set of IVIFSs (A,B) as formal concepts, A is regarded as the ’extent’ and B as the ’intent’. These formal concepts can be represented through complete lattices and as nodes in IVIF graphs. The following algorithm outlines the process:

  • Step 1: Consider an IVIF context, denoted as , where , and ℜ̃ represents the IVIF relationship.

    [˜(§,)L',˜(§,)I'],[Ω˜(§,)L',Ω˜(§,)I'].

  • Step 2: To uncover hidden patterns in the IVIF environment K, identify all subsets of attributes that satisfy the IVIF conditions 2m, characterized by a TMF of [1, 1] and an FMF of [0, 0].

  • Step 3: Adjust the membership values for generating IVIF concepts based on user preferences. The selected membership values ensure maximal alignment with the chosen subsets S, where ⋌ is less than or equal to 2m.

  • Step 4: Identify the covered items for each subset (S) by applying the lower operator (↓), denoted as BS=AS.

  • Step 5: Compute the TMF for the resulting set of objects:

    ASL'=minBSL'[μL'˜(§,)],ASI'=minBSI'[μI'˜(§,)],ΩASL'=maxΩBSI'[μΩL'˜(§,)],ΩASI'=maxΩBSI'[μΩI'˜(§,)].

    Here, ℜ̃ denotes the IVIF relationship between the attribute sets. The computed membership value represents the highest degree of membership necessary to satisfy the constraint and identify the minimal desired property.

  • Step 6: Determine the covering attribute set for the object set to reveal latent patterns using the upper operator (↑) of the Galois connection on the assembled object sets, denoted as AS=BS.

  • Step 7: Calculate the membership score for the attributes covering the object set

    BSL'=minASL'[μL'˜(§,)],BSI'=minASI'[μI'˜(§,)],ΩBSL'=maxΩASL'[μΩL'˜(§,)],ΩBSI'=maxΩASI'[μΩI'˜(§,)].

  • Step 8: Define the formal fuzzy concept as the pair (AS,BS).

  • Step 9: Construct the IVIF concept lattice to represent the hierarchical relationships among the concepts.

  • Step 10: Apply the proposed strategy using the identified object sets, as demonstrated in Algorithm 1.

Complexity: The pseudocode for the proposed algorithm generates IVIF concepts in a context with ‘n’ objects, ‘m’ attributes, and an IVIF relation ℜ̃. The time complexity for Step 1 is 2m, while identifying covering objects (defined by TMF and FMF) requires 2m * n operations. Therefore, the overall time complexity is O(2m * 2m * n).

Example 4.1. Consider a company that aims to allocate funds to the following entities:

  • 1. A car manufacturer §1

  • 2. A food company §2.

  • 3. The computer company §3

  • 4. A company specializing in the production of arms §4

The decision-making process is guided by the following criteria ( ):

  • 1. Risk analysis ⋎1

  • 2. Growth analysis ⋎2

  • 3. Environmental impact analysis ⋎3.

The determination parameter can be identified through TMF and FMF independently. The organization has the ability to gather data utilizing these two-way decision defined and present them in a tabular matrix structure. In this structure, the enumerated organization can be viewed as a set of entities, denoted as = (§1 = car company, §2 = food company, §3 = computer company, and §4 = arms company), while the decision parameters can be seen as a set of features, denoted as = (⋎1 = risk analysis, ⋎2 = growth analysis, ⋎3 = environmental impact analysis). Let’s assume that the impact of decision attribute risk analysis, denoted as ⋎1, on the making of a car company is 0.43 in terms of total market value (TMV) and 0.34 in terms of fair market value (FMV). This relationship can be expressed as ℜ̃; (§1,⋎1) = (0.43, 0.34) using interval type-2 fuzzy sets in the tabular matrix, as illustrated in Table 1. As, for the establishment of other companies represented by objects (§2, §3, §4), the corresponding decision parameters are detailed in Tables 2, 3, and 4, respectively. The company is now interested in uncovering concealed patterns within the IVIF context, as presented in Table 5. Analyzing investment preferences based on specified decision parameters stands as a significant challenge for the company. To address this concern, the company seeks patterns, specifically formal concepts derived from the data presented in Table 5, utilizing the given attribute set. To meet this requirement, Algorithm 1 is proposed. This algorithm facilitates the generation of IVIF concepts from the context illustrated in Table 5. , where , and ℜ̃ represents IVIF relationship among them i.e.,

[(˜(§,)L',˜(§,)I'),(Ω˜(§,)L',Ω˜(§,)I')];˜(§1,1)=[(0.43,0.56),(0.34,0.43)],˜(§1,2)=[(0.43,0.65),(0.21,0.43)],˜(§1,3)=[(0.78,0.90),(0.43,0.56)],˜(§2,1)=[(0.65,0.78),(0.21,0.34)],˜(§2,2)=[(0.65,0.78),(0.21,0.34)],˜(§2,3)=[(0.34,0.65),(0.87,0.90)],˜(§3,1)=[(0.34,0.65),(0.34,0.43)],˜(§3,2)=[(0.56,0.65),(0.34,0.43)],˜(§3,3)=[(0.45,0.56),(0.78,0.90)],˜(§4,1)=[(0.78,0.87),(0.12,0.21)],˜(§4,2)=[(0.65,0.78),(0.12,0.34)],˜(§4,3)=[(0.65,0.78),(0.87,0.90)].

The following describe each of the produced subsets of attributes displayed in Table 5.

From Step 3 in Algorithm 1, determine the value of the acceptance membership = ([1, 1], [0, 0]) for each subsets.

  • 1. The subsequent intuitionistic fuzzy set can serve as a representation for this.

    {[(0.00,0.00),(1.00,1.00)]/1,[(0.00,0.00),(1.00,1.00)]/2,[(0.00,0.00),(1.00,1.00)]/3},

  • 2. {[(1.00, 1.00), (0.00, 0.00)]/1},

  • 3. {[ (1.00, 1.00), (0.00, 0.00) ] /2},

  • 4. {[(1.00, 1.00), (0.00, 0.00)] /3},

  • 5. {[(1.00, 1.00), (0.00, 0.00)]⋎1, [(1.00, 1.00), (0.00, 0.00)]⋎2},

  • 6. {[(1.00, 1.00), (0.00, 0.00)]⋎2, [(1.00, 1.00), (0.00, 0.00)]⋎3},

  • 7. {[(1.00, 1.00), (0.00, 0.00)]⋎1, [(1.00, 1.00), (0.00, 0.00)]⋎3},

  • 8. {[(1.00, 1.00), (0.00, 0.00)]⋎1, [(1.00, 1.00), (0.00, 0.00)]⋎2, }.

  • 9. {[(1.00, 1.00), (0.00, 0.00)]⋎3}.

    Step 2: Let’s select the initial subset of characteristics.

    {[(0.00,0.00),(1.00,1.00)]/1,[(0.00,0.00),(1.00,1.00)]/2,[(0.00,0.00),(1.00,1.00)]/3}.

    Next, use the to determine its covered object set, down operator (↓) as given below:

    {[(0.00,0.00),(1.00,1.00)]/1,[(0.00,0.00),(1.00,1.00)]/2,[(0.00,0.00),(1.00,1.00)]/3}={[(0.78,0.90),(0.43,0.56)]/§1,[(0.65,0.78),(0.87,0.90)]/§2,[(0.56,0.65),(0.78,0.90)]/§3,[(0.78,0.87),(0.87,0.90)]/§4}.

Apply the UP (upper) operator (↑) on this assembled set of objects to identify the additional covering attribute set. {[(0.78, 0.90), (0.43, 0.56)]/§1, [(0.65, 0.78), (0.87, 0.90)]/§2, (0.56, 0.65), (0.78, 0.90)]/§3, [(0.78, 0.87), (0.87, 0.90)]/§4} = {[(0.34, 0.56), (0.34, 0.43)]/1, [(0.43, 0.65), (0.34, 0.43)]/2, [(0.34, 0.56), (0.87, 0.90)]/3}. It encompasses the subsequent IVIF principles

  • 1. Extent: {[(0.78, 0.90), (0.43, 0.56)]/§1, [(0.65, 0.78), (0.87, 0.90)]/§2, [(0.56, 0.65), (0.78, 0.90)]/§3, [(0.78, 0.87), (0.87, 0.90)]/§4}.

    Intent: {[(0.34, 0.56), (0.34, 0.43)]/1, [(0.43, 0.65), (0.34, 0.43)]/2, [(0.34, 0.56), (0.87, 0.90)]/3}.

    Step 3: Likewise, employing alternative subsets presented in Step 1 allows for the creation of additional IVIF concepts.

  • 2. Extent: {[(0.43, 0.56), (0.34, 0.43)]/§1, [(0.65, 0.78), (0.21, 0.34)]/§2,[(0.34, 0.65), (0.34, 0.43)]/§3, [(0.78, 0.87), (0.12, 0.21)]/§4}.

    Intent: {[(1.00, 1.00), (0.00, 0.00)]/1, [(0.43, 0.65), (0.34, 0.43)]/2, [(0.34, 0.56), (0.87, 0.90)]/3}.

  • 3. Extent: {[(0.43, 0.56), (0.21, 0.43)]/§1, [(0.65, 0.78), (0.21, 0.34)]/§2, [(0.56, 0.65), (0.34, 0.43)]/§3, [(0.65, 0.78), (0.12, 0.34)]/§4}.

    Intent: {[(1.00, 1.00), (0.00, 0.00)]/2, [(0.43, 0.56), (0.34, 0.43)]/1, [(0.34, 0.56), (0.87, 0.90)]/3}.

  • 4. Extent: {[(0.78, 0.90), (0.43, 0.56)]/§1, [(0.34, 0.56), (0.87, 0.90)]/§2, [(0.34, 0.65), (0.78, 0.90)]/§3, [(0.65, 0.78), (0.87, 0.90)]/§4}.

    Intent: {[(1.00, 1.00), (0.00, 0.00)]/3, [(0.34, 0.56), (0.34, 0.43)]/1, [(0.34, 0.56), (0.87, 0.90)]/3}.

  • 5. Extent: {[(0.43, 0.56), (0.34, 0.43)]/§1, [(0.65, 0.78), (0.21, 0.34)]/§2, [(0.34, 0.65), (0.34, 0.43)]/§3, [(0.65, 0.78), (0.12, 0.34)]/§4}.

    Intent: {[(1.00, 1.00), (0.00, 0.00)]/1, [(1.00, 1.00), (0.00, 0.00)]/2, [(0.34, 0.56), (0.87, 0.90)]/3}.

  • 6. Extent: {[(0.43, 0.65), (0.43, 0.56)]/§1, [(0.34, 0.56), (0.87, 0.90)]/§2, [(0.43, 0.56), (0.78, 0.90)]/§3, [(0.65, 0.78), (0.87, 0.90)]/§4}.

    Intent: {[(0.34, 0.56), (0.34, 0.43)]/1, [(1.00, 1.00), (0.00, 0.00)]/2, [(1.00, 1.00), (0.00, 0.00)]/3}.

  • 7. Extent: {[(0.43, 0.56), (0.43, 0.56)]/§1, [(0.34, 0.56), (0.87, 0.90)]/§2, [(0.34, 0.65), (0.78, 0.90)]/§3, [(0.65, 0.78), (0.87, 0.90)]/§4}.

    Intent: {[(1.00, 1.00), (0.00, 0.00)]/1, [(0.43, 0.65), (0.34, 0.43)]/2, [(1.00, 1.00), (0.00, 0.00)]/3}.

  • 8. Extent: {[(0.43, 0.56), (0.43, 0.56)]/§1, [(0.34, 0.56), (0.87, 0.90)]/§2, [(0.34, 0.65), (0.78, 0.90)]/§3, [(0.65, 0.78), (0.87, 0.90)]/§4}.

    Intent: {[(1.00, 1.00), (0.00, 0.00)]/1, [(1.00, 1.00), (0.00, 0.00)]/2, [(1.00, 1.00), (0.00, 0.00)]/3}.

  • The suggestion number 1 indicates that the company is inclined to favor investments guided by the attribute [(0.43, 0.65), (0.3, 0.4)]/2, specifically in terms of growth analysis. This is evident through its maximum TMV at (0.43, 0.65) and minimum FMV at (0.34, 0.43), showcasing superior performance calculated to alternative attributes.

  • The suggestion number 2 signifies that the object [(0.78, 0.87), (0.12, 0.21)]/§4 attains the maximum TMV at (0.78, 0.87) and the minimum FMV at (0.12, 0.21) compared to other objects in terms of embracing quality ⋎1 (i.e., risk analysis). Similarly, the analysis can be extended to other objects, yielding the sequence §4, §2, §3, §1 for the company’s investment order based on risk analysis (⋎1). This analytical conclusion from the suggested approach agrees rather well with the predictions.

  • · The suggestion number 3 signifies that the entity [(0.65, 0.78), (0.12, 0.34)]/§4 attains maximum TMV with coordinates (0.65, 0.78) and minimum FMV with coordinates (0.12, 0.34) in comparison to other entities for the acceptance of attribute ⋎2 (i.e., growth analysis). Likewise, a similar analysis can be conducted for other entities, resulting in the sequence §4, §2, §3, §1 for investing money in companies based on growth analysis (⋎2). This analysis, derived from the proposed method, aligns well with the data.

  • · The suggestion number 4 signifies that the object [(0.78, 0.90), (0.43, 0.56))]/§1 attains maximum TMV at (0.78, 0.90) and minimum FMV at (0.43, 0.56) when compared to other objects for the assessment of attribute ⋎3 (i.e., environmental impact analysis). Similarly, an evaluation of other objects yields the sequence §1, §4, §2, §3 for investment prioritization based on environmental impact analysis (⋎3). This analysis, resulting from the proposed methodology, aligns well with expectations.

  • · The suggestion number 5 signifies that the object [(0.65, 0.78), (0.12, 0.34)]/§4 exhibits the highest TMV at (0.65, 0.78) and the lowest FMV at (0.12, 0.34) in comparison to other objects, concerning the acceptance of attributes ⋎1 and ⋎2 (i.e., risk and growth analysis). Similarly, one can analyze other objects, resulting in the following investment order: §4, §2, §3, §1 for the company, based on the analysis of risk and growth (⋎1,⋎2). This analytical approach, as derived from the proposed method, aligns well with the overall agreement.

  • · The suggestion number 6 signifies that the object [(0.65, 0.78), (0.87, 0.90)]/§4 exhibits the highest TMV at (0.65, 0.78) and the lowest FMV at (0.87, 0.90) compared to other objects for the acceptance of attributes ⋎2 and ⋎3 (specifically, growth and environmental impact analysis). Likewise, a similar analysis can be applied to other objects, establishing the sequence §4, §1, §2, §3 for investment decisions based on growth and environmental impact analysis. This analysis, stemming from the proposed method, aligns well with expectations.

  • · The suggestion number 7 implies that the object [(0.65, 0.78), (0.87, 0.90)]/§4 exhibits the highest TMV at (0.65, 0.78) and the lowest FMV at (0.87, 0.90) compared to other objects, specifically concerning the acceptance of attributes ⋎1 and ⋎3 (i.e., risk and environmental impact analysis). In a similar vein, an examination of other objects establishes the sequence §4, §1, §2, §3 for company investment decisions based on risk and environmental impact analysis. The outcomes of this analysis, derived from the proposed method, align well with each other.

  • · The suggestion number 8 is centered on the acceptance of attributes ⋎1, ⋎2, ⋎3 the object [(0.65, 0.78), (0.87, 0.90)]/§4 has TMV (0.65, 0.78) and minimal FMV (0.87, 0.90) When contrasted with other items, a similar approach can be applied to assess additional objects, resulting in the sequence §4, §1, §2, §3 for investing money in the company based on individual attributes. The analysis produced through the suggested method aligns well with expectations.

The lattice derived from the aforementioned concepts, known as the IVIF concept lattice, is illustrated in Figure 2. This representation conveys the following information. The analysis obtained from the suggested approach closely mirrors the correlation method and aggregation operator, but with a more in-depth examination. Achieving this involves the proposed method generating concepts exponentially through slight variations in membership values. Consequently, identifying key concepts based on user-specified parameters becomes a challenging endeavor in this scenario. To address this issue, an alternative approach is suggested in Algorithm 2 for the dissection of the interval-valued neutrosophic context at a granulation defined by the user as (α, β). The following section provides an illustration of the decomposition of the IVIF context.

4.3 A New Approach for the (α, β)-Decomposition of the IF Context

The proposed approach presented in Algorithm 1 yields a considerable number of IVIF concepts, characterized by minimal variation in TMF and FMF. This abundance of concepts may hinder knowledge processing tasks, particularly when users seek essential concepts tailored to specific requirements within a defined granularity. Granular computing, a mathematical tool, offers a means to refine expansive contexts into smaller information granules. The chosen level of granulation facilitates efficient processing of large contexts by modularizing complex problems into well-defined subproblems at minimal computational cost. Recently, the principles of granular computing have found application in formal contexts, formal fuzzy contexts, interval-valued contexts, bipolar fuzzy contexts, two-polar fuzzy contexts, and multi-scaled concept lattices, aiding in the identification of crucial concepts at user-defined granulation levels. This paper focuses on decomposing an IVIF context by considering its TMV and FMV separately, utilizing a user-defined (α, β)-cut.

  • Step 1: Let’s consider an IF context denoted as , where , and ℜ̃ signifies the IF relationship among them.

    (˜(§,),Ω˜(§,)).

  • Step 2: Now, specify the granulation parameters for TMV and FMV, denoted as (α, β).

  • Step 3: The provided IF context can be broken down at the selected granularity (α, β) using TMV and FMV separately, as outlined below:

    If and only if the Transaction Message Validator (TMV) is part of the identical decomposed context:

    Kα={˜(§,)μ˜(§,)α}.

    In this context, let § denote an object and ⋎ an attribute. Express them as the maximum acceptance of the TMV, specifically as 1.00 for the selected α-cut, or alternatively, as 0.00. The FMV is part of the identical decomposed context if:

    KβΩ={Ω˜(§,)μΩ˜(§,)β}.

    In this context, where § represents an object and ⋎ signifies an attribute, they are expressed as the maximum acceptance of the FMV. Specifically, denoted as 0.00 for the selected β-cut, otherwise marked as 1.00. Therefore, a binary context has been established for Kα,β through a defined granulation for the TMV and FMV.

  • Step 4: The equality provided below pertains to the decomposed contexts, denoted as Kα,β, within a user-defined granulation.

    K=α,βKα,β,α,β.

    In this context, α represents a specified granulation on TMV, and β pertains to a defined granulation as well.

  • Step 5: The disintegrated context also adheres to the subset conditions, namely, Kα1, β12, β2 when α1α2, β1β2. This implies that the quantity of concepts and the dimensions of the IF concept lattice can be regulated by employing the specified granulation for the TMV and FMV.

  • Step 6: The method described above can be applied to determine both lower and upper limits for the TMV and FMV in the context of the provided IVIF relations.

  • Step 7: At the end, formulate the decomposed “IF” context for tasks related to knowledge processing. The pseudocode illustrating this proposed algorithm is presented in Table 7.

Complexity:Algorithm 2 presents the pseudocode outlining the decomposition process for a provided intuitionistic fuzzy context. Here, let the count of objects (| |) be denoted as n, and the count of attributes (| |) as m within the specified IVIF context. The suggested approach decomposes the context using a user-defined (α, β)-cut, with a time complexity of O(m3) or O(n2) in the case of a IVIF context. For the decomposition of IVIFSs, the cut is specified individually for both the lower and upper bounds associated with the given attribute O(m) or object set O(n). Consequently, the overall time complexity of the suggested approach amounts to O(n *m3) or O(n2 *m). This methodology effectively minimizes the computational burden for handling the provided IVIF context in comparison to the approach detailed in Table 5. The following section provides a demonstration of both proposed methods through an illustrative example.

5. Illustration

In the following paragraphs, we illustrate both the proposed algorithms with an example. The first algorithm presents hierarchical order visualization in addition to IVIF concept demonstrations. The second approach, on the other hand, presents an assortment of these ideas at a customized (α, β)-cut, which refines the knowledge. To illustrate these methods and conduct a comparative analysis of the results obtained, we employ an example.

5.1 IVIF Concept Lattice

In recent times, the exploration of the three-way decision space and its approximation has significantly influenced the trajectory of knowledge processing tasks, particularly in the in-depth examination of partial ordering, concept lattice, and their applications across various research domains. A key focal point for researchers engaged in knowledge processing tasks is the generation of formal concepts from a provided IVIF context. This paper makes a concerted effort to scrutinize data utilizing IVIF attributes, leveraging the characteristics of IVIFSs, the IVIF graph, and its associated concept lattice. The aim is to offer a more precise visualization of partial ignorance, inconsistency, and incompleteness within a given dataset compared to alternative approaches. To realize this objective, the paper introduces a method outlined in Table 5 for identifying all IVIF concepts within a given context.

5.2 The (α, β)-Decomposition of IVIF Context

Lately, granular computing has attracted a lot of interest from scholars who want to learn more about the two-way decision environment. This method is a technique for contextual processing that considers the problem’s structure, functioning, and closeness. Numerous formal fuzzy contexts, such as formal fuzzy ideas, fuzzy concept lattice, interval-valued fuzzy information, bipolar fuzzy information, two-polar fuzzy information, and multi-scaled concept lattice, have been added to its list of uses. These characteristics are utilized to pinpoint fundamental ideas at user-specified granularities. This work focuses on breaking down the IF context through the use of granular computing features to accurately identify important patterns hidden within the given IVIF context. Algorithm 2 presents a strategy to accomplish this goal. A single-valued intuitionistic fuzzy (SVIF) environment is modified in order to compare the analysis produced by the suggested method with the intended methodology in order to demonstrate the suggested way. Below is an example of it.

Example 5.1. Let’s consider an SVIF context for examining the allocation of funds among companies = ( §1 =automobile company, §2 =food company, §3 =computer company, and §4 =defense company ) based on a single-valued TMF and single-valued FMF using the decision parameters = (⋎1 = risk analysis, ⋎2 = growth analysis, ⋎3 = environmental impact analysis). The formal representation of this dataset in the context of IF context properties is illustrated in Table 6.

The challenge facing the company lies in uncovering concealed patterns within the provided SVIF context presented in Table 6, with the objective of investing funds in the establishment of new ventures. To realize this objective, capital is allocated to companies exhibiting a maximum single-valued TMV exceeding 0.56 and a minimal single-valued FMV close to 0.00 based on the specified decision parameters. Assuming the company adopts a two-polar granulation (0.65, 0.12) to assess investment preferences, the context outlined in Table 6 can be disentangled through the proposed method detailed in Algorithm 2 for the defined (0.65, 0.12)-cut, as outlined below:

  • 1. ℧ℜ̃(§1, ⋎1)< 0.65, Ωℜ̃(§1, ⋎1)> 0.12.

    Therefore, the decomposition establishes a non-acceptance region within the interval (0, 1).

  • 2. ℧ℜ̃(§1, ⋎2)< 0.65, Ωℜ̃(§1, ⋎2)> 0.12.

    Therefore, the decomposition establishes a non-acceptance region within the interval (0, 1).

  • 3. ℧ℜ̃(§1, ⋎3)< 0.65, Ωℜ̃(§1, ⋎3)> 0.12.

    Therefore, the decomposition offers a non-acceptance region within the interval (0, 1).

  • 4. ℧ℜ̃(§2, ⋎1)< 0.65, Ωℜ̃(§2, ⋎1)> 0.12.

    Therefore, the decomposition establishes a non-acceptance region within the interval (0, 1).

  • 5. ℧ℜ̃(§2, ⋎2)< 0.65, Ωℜ̃(§2, ⋎2)> 0.12.

    Therefore, the decomposition establishes a non-acceptance region within the interval (0, 1).

  • 6. ℧ℜ̃(§2, ⋎3)< 0.65, Ωℜ̃(§2, ⋎3)> 0.12.

    Therefore, the decomposition establishes a non-acceptance region within the interval (0, 1).

  • 7. ℧ℜ̃(§3, ⋎1)< 0.65, Ωℜ̃(§3, ⋎1)> 0.12.

    Therefore, the decomposition establishes a non-acceptance region within the interval (0, 1).

  • 8. ℧ℜ̃(§3, ⋎2)< 0.65, Ωℜ̃(§3, ⋎2)> 0.12.

    Therefore, the decomposition offers a non-acceptance region within the interval (0, 1).

  • 9. ℧ℜ̃(§3, ⋎3)< 0.65, Ωℜ̃(§3, ⋎3)> 0.12.

    Therefore, the decomposition establishes a non-acceptance region within the interval (0, 1).

  • 10. ℧ℜ̃(§4, ⋎1)> 0.65, Ωℜ̃(§4, ⋎1)< 0.12.

    Therefore, the decomposition establishes an acceptance region, denoted as (1, 0), for both the TMV and FMV.

  • 11. ℧ℜ̃(§4, ⋎2)< 0.65, Ωℜ̃(§4, ⋎2)> 0.12.

    Therefore, the decomposition establishes a non-acceptance region within the interval (0, 1).

  • 12. ℧ℜ̃(§4, ⋎3)< 0.65, Ωℜ̃(§4, ⋎3)> 0.12.

    Therefore, the decomposition establishes a non-acceptance region within the interval (0, 1).

The decomposition computed above is presented in Table 7 in the form of a contextualized framework for processing knowledge. In this representation, (1, 0) and (0, 1) signify acceptance and non-acceptance values, respectively, for the specified decision parameters. Let’s consider the granulation with two poles at (0.65, 0.12). Under these conditions, the optimal choice is limited to object §4, specifically an arms company. Therefore, investing money in an arms company emerges as a highly favorable option.

The analysis resulting from the suggested approach bears similarity to the hybrid vector similarity method and a three-way fuzzy concept lattice. However, the proposed method achieves this by requiring computational time of O(m3) or O(n2). Consequently, it offers a more customizable granulation, allowing users to refine knowledge according to their specific requirements. To illustrate, if a user wishes to assess preferences based on a (0.65, 0.21)-cut for the context presented in Table 7, the newly decomposed context will be displayed as depicted in Table 8.

  • 1. ℧ℜ̃(§1, ⋎1)< 0.65, Ωℜ̃(§1, ⋎1)> 0.21.

    Therefore, non-acceptance zone (0, 1) is provided by the decomposition.

  • 2. ℧ℜ̃(§1, ⋎2)< 0.65, Ωℜ̃(§1, ⋎2)> 0.21.

    Therefore, non-acceptance zone (0, 1) is provided by the decomposition.

  • 3. ℧ℜ̃(§1, ⋎3)< 0.65, Ωℜ̃(§1, ⋎3)> 0.21.

    Therefore, non-acceptance zone (0, 1) is provided by the decomposition.

  • 4. ℧ℜ̃(§2, ⋎1)> 0.65, Ωℜ̃(§2, ⋎1)< 0.21.

    Acceptance region (1, 0)∀ the TMV and FMV is thus provided by the decomposition.

    ˜(§2,2)>0.65,Ω˜(§2,2)<0.21.

    Acceptance region (1, 0)∀ the TMV and FMV is thus provided by the decomposition.

  • 5. ℧ℜ̃(§2, ⋎3)< 0.65, Ωℜ̃(§2, ⋎3)> 0.21.

    Therefore, non-acceptance zone (0, 1) is provided by the decomposition.

  • 6. ℧ℜ̃(§3, ⋎1)< 0.65, Ωℜ̃(§3, ⋎1)> 0.21.

    Therefore, non-acceptance zone (0, 1) is provided by the decomposition.

  • 7. ℧ℜ̃(§3, ⋎2)< 0.65, Ωℜ̃(§3, ⋎2)> 0.21.

    Therefore, non-acceptance zone (0, 1) is provided by the decomposition.

  • 8. ℧ℜ̃(§3, ⋎3)< 0.65, Ωℜ̃(§3, ⋎3)> 0.21.

    Therefore, non-acceptance zone (0, 1) is provided by the decomposition.

  • 9. ℧ℜ̃(§4, ⋎1)> 0.65, Ωℜ̃(§4, ⋎1)< 0.21.

    Acceptance region (1, 0)∀ the TMV and FMV is thus provided by the decomposition.

  • 10. ℧ℜ̃(§4, ⋎2)> 0.65, Ωℜ̃(§4, ⋎2)< 0.21.

    Acceptance region (1, 0)∀ the TMV and FMV is thus provided by the decomposition.

  • 11. ℧ℜ̃(§4, ⋎3)< 0.65, Ωℜ̃(§4, ⋎3)> 0.21.

    Therefore, non-acceptance zone (0, 1) is provided by the decomposition.

The disassembled context reveals that selecting object §4 (arms company) and §2 (food company) can be determined using a (0.65, 0.21)-cut. Consequently, investing money in the arms and food companies would be the most preferable choice. This analysis aligns with both the vector similarity method and the three-way concept lattice. The application of the proposed method to the IVIF context is illustrated below: Table 5 serves as an illustration of the IVIF context decomposition utilizing the proposed method, as depicted in Algorithm 2. The issue pertaining to Table 5 lies in the company’s objective to identify crucial patterns for investment based on specified decision parameters. In a broader sense, to uncover these patterns, the company requires a maximal interval-valued TMV range of [0.65, 0.78], along with a minimal interval-valued FMV range of [0.12, 0.21], to validate the acceptance of the ideal conditions. The decomposed context, guided by this selected granulation, is presented in Table 9.

  • 1. ℧ℜ̃(§1, ⋎1)< (0.65, 0.78), Ωℜ̃(§1, ⋎1)> (0.12, 0.21).

    Therefore, non-acceptance zone (0, 1) is provided by the decomposition.

  • 2. ℧ℜ̃(§1, ⋎2)< (0.65, 0.78), Ωℜ̃(§1, ⋎2)> (0.12, 0.21).

    Therefore, non-acceptance zone (0, 1) is provided by the decomposition.

  • 3. ℧ℜ̃(§1, ⋎3)> (0.65, 0.78), Ωℜ̃(§1, ⋎3)> (0.12, 0.21).

    Acceptance region (1, 1)∀ the TMV and FMV is thus provided by the decomposition.

    ˜(§2,1)>(0.65,0.78),Ω˜(§2,1)>(0.12,0.21).

    Acceptance region (1, 1)∀ the TMV and FMV is thus provided by the decomposition.

  • 4. ℧ℜ̃(§2, ⋎2)> 0.65, Ωℜ̃(§2, ⋎2)> (0.12, 0.21).

    Acceptance region (1, 1)∀ the TMV and FMV is thus provided by the decomposition.

  • 5. ℧ℜ̃(§2, ⋎3)< (0.65, 0.78), Ωℜ̃(§2, ⋎3)> (0.12, 0.21).

    Therefore, non-acceptance zone (0, 1) is provided by the decomposition.

  • 6. ℧ℜ̃(§3, ⋎1)< (0.65, 0.78), Ωℜ̃(§3, ⋎1)> (0.12, 0.21).

    Therefore, non-acceptance zone (0, 1) is provided by the decomposition.

  • 7. ℧ℜ̃(§3, ⋎2)< (0.65, 0.78), Ωℜ̃(§3, ⋎2)> (0.12, 0.21).

    Therefore, non-acceptance zone (0, 1) is provided by the decomposition.

  • 8. ℧ℜ̃(§3, ⋎3)< (0.65, 0.78), Ωℜ̃(§3, ⋎3)> (0.12, 0.21).

    Therefore, non-acceptance zone (0, 1) is provided by the decomposition.

  • 9. ℧ℜ̃(§4, ⋎1)> (0.65, 0.78), Ωℜ̃(§4, ⋎1)< (0.12, 0.21).

    Therefore, for any TMV and FMV, the decomposition yields an acceptability region of (1, 0).

  • 10. ℧ℜ̃(§4, ⋎2)> (0.65, 0.78), Ωℜ̃(§4, ⋎2)> (0.12, 0.21).

    As a result, the breakdown offers an acceptance region (1, 1) the TMV and FMV.

  • 11. ℧ℜ̃(§4, ⋎3)> (0.65, 0.78), Ωℜ̃(§4, ⋎3)> (0.12, 0.21).

    Recognition region (1, 1) is thus provided by the decomposition for all TMV and FMV.

Table 9 illustrates that the object §4 exhibits a threshold measure value of 1 for each attribute, while object §2 attains the maximum TMV for two specific attributes, namely ⋎1 and ⋎2. Consequently, the arms company (i.e., §4) emerges as the primary preference for investment, followed by the food company (i.e., §2) as the secondary option. These findings align well with the correlation method, aggregation operator, and the associated concept lattice depicted in Figure 1. Moreover, for a more detailed analysis of preferences, the company can explore variations in granulation, aiming for increased refinement within either O(n*m3) or O(n2 *m) computational time. The methods proposed in this paper are anticipated to be highly beneficial for researchers engaged in the realm of interval-valued multi-decision-making processes. Anticipates scholars studying interval-valued multi-decision-making processes will find great benefit from the techniques this paper offers.

6. Conclusion

The analysis and processing of large amounts of technological data are integral to modern decision-making. To address this need, we have developed techniques and tools designed to compute accurate information and enhance efficiency. Utilizing graph and lattice methods to condense large datasets into single values is resource-intensive. However, the concept lattice in fuzzy sets, integrated with interval-valued fuzzy sets, provides a powerful framework for scenarios where each item has a range of possible values defined by MD and NMD. The lattice function differs in two key aspects: periodicity and symmetry at the origin. Consequently, current concept lattice rules have been adapted to the IVIF network environment. The advantages and contributions of these techniques can be summarized as follows:

  • · We introduced the term lattice environment of an IVIF network and established its fundamental properties. This foundational step enabled the creation of a comprehensive framework for analyzing and assessing IVIF contexts.

  • · This study thoroughly examines the primary features of IVIF contexts, including the technical intricacies of their scoring systems, precise computations, and the formulation of ordering principles tailored specifically for IVIF contexts using concept lattices. This detailed evaluation provides a robust foundation for understanding the core concepts and methodologies underpinning IVIF environments.

  • · We developed mathematical methods optimized for processing complex value data. These operators facilitate the identification of numerous optimal values, each with distinct characteristics, ensuring robust computational efficiency.

  • · Our approach is meticulously designed to exploit the unique attributes of IVIF contexts in conjunction with concept lattices, enabling intelligent and efficient decisionmaking processes that effectively address the complexities of interval-valued data.

  • · The methodology focuses on uncovering IVIF concepts and decomposing intuitionistic fuzzy contexts based on user-defined (α, β)–cuts for truth (α-cut) and falsity (β-cut) membership values. The results of these methods align closely with those established correlation and aggregation techniques

  • · Concept lattices hold significant potential for extending the applicability of IVIF contexts to various industries and domains, including healthcare, robotics, information retrieval systems, intelligent systems, artificial intelligence, ecological science, and logistics management. While this study does not address the interdependencies between these applications, future research will explore these relationships to further enhance the utility of IVIF-based methodologies.

Conflict of Interest

No potential conflict of interest relevant to this article was reported.

Fig 1.

Figure 1.

IVIF relationship network.

The International Journal of Fuzzy Logic and Intelligent Systems 2024; 24: 360-377https://doi.org/10.5391/IJFIS.2024.24.4.360

Fig 2.

Figure 2.

IVIF concept lattice.

The International Journal of Fuzzy Logic and Intelligent Systems 2024; 24: 360-377https://doi.org/10.5391/IJFIS.2024.24.4.360

Table 1 .1) involves IVIF relationship shown in Figure 1.

123
§1L'0.430.430.78
§1I'0.560.650.90
Ω§1L'0.430.210.43
Ω§1I'0.430.430.56

Table 2 . IVIF relation for §2, shown in Figure 1.

123
§1L'0.650.650.34
§1I'0.780.780.65
Ω§1L'0.210.210.87
Ω§1I'0.340.340.90

Table 3 . An IVIF relations for §3.

123
§3L'0.340.560.43
§3I'0.650.650.56
Ω§3L'0.340.340.78
Ω§3I'0.430.430.90

Table 4 . An IVIF relationship by §4.

123
§4L'0.780.650.65
§4I'0.870.780.78
Ω§4L'0.120.120.87
Ω§4I'0.210.340.90

Table 5 . IVIF representation for Tables 1 to 4.

123
§1[(0.43, 0.56), (0.34, 0.43)][(0.43, 0.65), (0.21, 0.43)][(0.78, 0.90), (0.43, 0.56)]
§2[(0.65, 0.78), (0.21, 0.34)][(0.65, 0.78), (0.21, 0.34)][(0.34, 0.65), (0.87, 0.90)]
§3[(0.34, 0.65), (0.34, 0.43)][(0.56, 0.65), (0.34, 0.43)][(0.45, 0.56), (0.78, 0.90)]
§4[(0.78, 0.87), (0.12, 0.21)][(0.65, 0.78), (0.12, 0.34)][(0.65, 0.78), (0.87, 0.90)]

Table 6 . A three-way fuzzy context representation using intuitionistic fuzzy sets.

123
§1(0.43, 0.34)(0.43, 0.34)(0.21, 0.56)
§2(0.65, 0.21)(0.65, 0.21)(0.56, 0.21)
§3(0.34, 0.34)(0.56, 0.34)(0.56, 0.21)
§4(0.78, 0.12)(0.65, 0.21)(0.43, 0.21)

Table 7 . A decomposition shown in Table 6.

123
§1(0, 1)(0, 1)(0, 1)
§2(0, 1)(0, 1)(0, 1)
§3(0, 1)(0, 1)(0, 1)
§4(1, 0)(0, 1)(0, 1)

Table 8 . An analysis of the background presented in Table 6.

123
§1(0, 1)(0, 1)(0, 1)
§2(1, 0)(1, 0)(0, 1)
§3(0, 1)(0, 1)(0, 1)
§4(1, 0)(1, 0)(0, 1)

Table 9 . Context breakdown of Table 6 (0.12, 0.21).

123
§1(0, 1)(0, 1)(1, 1)
§2(1, 1)(1, 1)(0, 1)
§3(0, 1)(0, 1)(0, 1)
§4(1, 0)(1, 1)(1, 1)

Algorithm 1. Proposed algorithm to develop the IVIF concept.

Input:An IVIF envirnment , whereas , and ℜ̃ express IVIF relation.
Output:Set of IVIFFCs
Extent:{§,[A(§)L',A(§)I'],[ΩA(§)L',ΩA(§)I']},
Intent:{,[B(yj)L',B()I'],[ΩB(yj)L',ΩB()I']}, where ⋎ ≤ n and ⋌ ≤ m.
1Determine the subsets S of given IV IF attribues 2m.
2for ⋌ = 1 to 2m.
3 Determine the value of the acceptance membership = ([1.00, 1.00], [0.00, 0.00]) for each subsets
4 Use the scrolling operator to locate the encompassing object set ():{,[BSL'(),BSI'()],[ΩBSL'(),ΩBSI'()]}.
5 The down operator (↓) provides the following object set: {§,[A(§)L',A(§)I'],[ΩA(§)L',ΩA(§)I']}
6 The calculation of the membership value for the acquired set of objects can be determined in the following manner:ASL'=minBSL'[μL'˜(§,)],ASI'=minBSL'[μI'˜(§,)],ΩASL'=maxΩBSL'[μΩL'˜(§,)],ΩASI'=maxΩBSI'[μΩI'˜(§,)].
7 Determine the attribute set that covers the specified object set using the upper operator, denoted as ↑ (UP). {§,[A(§)L',A(§)I'],[ΩA(§)L',ΩA(§)I']}.
8 Now, calculate the membership value for the obtained attribute set using the following procedure:BSL'=maxASL'[μL'˜(§,)],BSI'=minASI'[μI'˜(§,)],ΩBSL'=maxΩASL'[μΩL'˜(§,)],ΩBSI'=maxΩASI'[μΩI'˜(§,)].
9 The formal concepts (AS, BS) are derived from the selected subset.
10end for
11In a similar way, more concepts can be developed with the other subsets.
12Build the IVIF concept lattice.

Algorithm 2. Suggested algorithm for breaking down the IF environment into α and β.

Input:An IF environment where , and (ℝ̃ = (℧ℜ̃(§, ⋎), Ωℜ̃(§, ⋎))
Output:The set of decomposed environment Kα, β
1Let us assume an IF environment .
2Define the granulation for the TMV and FMV i.e., (α, β).
3Now the decomposed the given environment Kα, β as follows:
4if {℧ℜ̃(§, ⋎)|μ℧ℜ̃(§,⋎)α}then represent 1.00 at the place of TMV,else 0.00 at the place of TMV.
5ifℜ̃(§, ⋎)|μΩℜ̃(§,⋎)β}then represent 0.00 at the place of FMV,else 1.00 at the place of FMV.
6The decomposed environment follows the equality:K = ∪α, βKα, β.
7The decomposed binary environment write for the user-defined granulation.
8Derive the knowledge from the decomposed environment Kα, β.

References

  1. Guan, H, Khan, WA, Saleem, S, Arif, W, Shafi, J, and Khan, A (). Some connectivity parameters of interval-valued intuitionistic fuzzy graphs with applications. Axioms. 12, 2023. article no 1120
  2. Gratzer, GA (2011). Lattice Theory: Foundation. Basel, Switzerland: Birkhauser https://doi.org/10.1007/978-3-0348-0018-1
    CrossRef
  3. Yu, J, and Deng, X (2024). The graph model under intuitionistic fuzzy preference considering consensus and attitudes. IEEE Transactions on Fuzzy Systems. 32, 3914-3927. https://doi.org/10.1109/TFUZZ.2024.3385769
    CrossRef
  4. Bozhenyuk, A, Belyakov, S, Kacprzyk, J, and Knyazeva, M (2020). The method of finding the base set of intuitionistic fuzzy graph. Intelligent and Fuzzy Techniques: Smart and Innovative Solutions. Cham, Switzerland: Springer, pp. 18-25 https://doi.org/10.1007/978-3-030-51156-2_3
  5. Shao, Z, Kosari, S, Rashmanlou, H, and Shoaib, M (). New concepts in intuitionistic fuzzy graph with application in water supplier systems. Mathematics. 8, 2020. article no 1241
  6. Yang, Y, Li, H, Zhang, Z, and Liu, X (2020). Interval-valued intuitionistic fuzzy analytic network process. Information Sciences. 526, 102-118. https://doi.org/10.1016/j.ins.2020.03.077
    CrossRef
  7. Dong, JY, and Wan, SP (). Interval-valued intuitionistic fuzzy best-worst method with additive consistency. Expert Systems with Applications. 236, 2024. article no 121213
  8. Jokela, J (). Ideals, bands and direct sum decompositions in mixed lattice vector spaces. Positivity. 27, 2023. article no 32
  9. Yao, X, Ding, F, and Luo, C (2022). Time series prediction based on high-order intuitionistic fuzzy cognitive maps with variational mode decomposition. Soft Computing. 26, 189-201. https://doi.org/10.1007/s00500-021-06455-0
    CrossRef
  10. Singh, PK (2018). Interval-valued neutrosophic graph representation of concept lattice and its (α, β, γ)-decomposition. Arabian Journal for Science and Engineering. 43, 723-740. https://doi.org/10.1007/s13369-017-2718-5
    CrossRef
  11. Ajmal, N, and Thomas, KV (1994). Fuzzy lattices. Information Sciences. 79, 271-291. https://doi.org/10.1016/0020-0255(94)90124-4
    CrossRef
  12. Kaplansky, I (2020). Set Theory and Metric Spaces. Providence, RI: American Mathematical Society
  13. Pak, CH, Kim, JH, and Jong, MG (2021). Describing hierarchy of concept lattice by using matrix. Information Sciences. 542, 58-70. https://doi.org/10.1016/j.ins.2020.05.020
    CrossRef
  14. Tamburri, DA (). Design principles for the General Data Protection Regulation (GDPR): a formal concept analysis and its evaluation. Information Systems. 91, 2020. article no 101469
  15. Rupp, V, and von Grafenstein, M (). Clarifying “personal data” and the role of anonymisation in data protection law including and excluding data from the scope of the GDPR (more clearly) through refining the concept of data protection. Computer Law & Security Review. 52, 2024. article no 105932
  16. Yao, Y (2020). Three-way granular computing, rough sets, and formal concept analysis. International Journal of Approximate Reasoning. 116, 106-125. https://doi.org/10.1016/j.ijar.2019.11.002
    CrossRef
  17. Birjali, M, Kasri, M, and Beni-Hssane, A (). A comprehensive survey on sentiment analysis: approaches, challenges and trends. Knowledge-Based Systems. 226, 2021. article no 107134
  18. Zhi, H, and Li, Y (). Attribute granulation in fuzzy formal contexts based on L-fuzzy concepts. International Journal of Approximate Reasoning. 159, 2023. article no 108947
  19. Zadeh, LA (1965). Fuzzy sets. Information and Control. 8, 338-353. https://doi.org/10.1016/S0019-9958(65)90241-X
    CrossRef
  20. Burusco, A, and Fuentes-Gonzalez, R (2001). Study of the interval-valued contexts. Fuzzy Sets and Systems. 121, 439-452. https://doi.org/10.1016/S0165-0114(00)00059-2
    CrossRef
  21. Zhang, X, and Liang, R (). Interval-valued general residuated lattice-ordered groupoids and expanded triangle algebras. Axioms. 12, 2022. article no 42
  22. Kaburlasos, VG (). Lattice computing: a mathematical modelling paradigm for cyber-physical system applications. Mathematics. 10, 2022. article no 271
  23. Kaburlasos, VG, Lytridis, C, Bazinas, C, Chatzistamatis, S, Sotiropoulou, K, Najoua, A, Youssfi, M, and Bouattane, O . Head pose estimation using lattice computing techniques., Proceedings of 2020 International Conference on Software, Telecommunications and Computer Networks (SoftCOM), 2020, Split, Croatia, Array, pp.1-5. https://doi.org/10.23919/SoftCOM50211.2020.9238315
  24. Zhang, S, Zhang, P, and Zhang, M (2019). Fuzzy emergency model and robust emergency strategy of supply chain system under random supply disruptions. Complexity, 2019. article no 3092514
  25. Singh, PK (2020). Bipolar δ-equal complex fuzzy concept lattice with its application. Neural Computing and Applications. 32, 2405-2422. https://doi.org/10.1007/s00521-018-3936-9
    CrossRef
  26. Kamran, M, Abdalla, MEM, Nadeem, M, Uzair, A, Farman, M, Ragoub, L, and Cangul, IN (). A systematic formulation into neutrosophic Z methodologies for symmetrical and asymmetrical transportation problem challenges. Symmetry. 16, 2024. article no 615
  27. Ashraf, S, Khan, A, Kamran, M, and Pandit, MK (2023). Evaluating the quality of medical services using intuitionistic hesitant fuzzy Aczel–Alsina aggregation information. Scientific Programming, 2023. article no 7235996
  28. Zhang, Q, Xia, D, Liu, K, and Wang, G (2020). A general model of decision-theoretic three-way approximations of fuzzy sets based on a heuristic algorithm. Information Sciences. 507, 522-539. https://doi.org/10.1016/j.ins.2018.10.051
    CrossRef
  29. Zhang, S, Hou, Y, Zhang, S, and Zhang, M (2017). Fuzzy control model and simulation for nonlinear supply chain system with lead times. Complexity, 2017. article no 2017634
  30. Ge, J, and Zhang, S (2020). Adaptive inventory control based on fuzzy neural network under uncertain environment. Complexity, 2020. article no 6190936
  31. Salamat, N, Kamran, M, Ashraf, S, Abdulla, MEM, Ismail, R, and Al-Shamiri, MM (2024). Complex decision modeling framework with fairly operators and quaternion numbers under intuitionistic fuzzy rough context. CMES-Computer Modeling in Engineering & Sciences. 139, 1893-1932. https://doi.org/10.32604/cmes.2023.044697
    CrossRef
  32. Zhang, N, Qi, W, Pang, G, Cheng, J, and Shi, K (). Observer-based sliding mode control for fuzzy stochastic switching systems with deception attacks. Applied Mathematics and Computation. 427, 2022. article no 127153
  33. Sun, Q, Ren, J, and Zhao, F (). Sliding mode control of discrete-time interval type-2 fuzzy Markov jump systems with the preview target signal. Applied Mathematics and Computation. 435, 2022. article no 127479
  34. Duan, ZX, Liang, JL, and Xiang, ZR (2022). H control for continuous-discrete systems in T-S fuzzy model with finite frequency specifications. Discrete and Continuous Dynamical Systems - Series S. 15, 3155-3172. https://doi.org/10.3934/dcdss.2022064
    CrossRef
  35. Sarwar, M, and Li, T (2019). Fuzzy fixed point results and applications to ordinary fuzzy differential equations in complex valued metric spaces. Hacettepe Journal of Mathematics and Statistics. 48, 1712-1728. https://doi.org/10.15672/HJMS.2018.633
  36. Xia, Y, Wang, J, Meng, B, and Chen, X (). Further results on fuzzy sampled-data stabilization of chaotic nonlinear systems. Applied Mathematics and Computation. 379, 2020. article no 125225
  37. Gao, M, Zhang, L, Qi, W, Cao, J, Cheng, J, Kao, Y, Wei, Y, and Yan, X (). SMC for semi-Markov jump TS fuzzy systems with time delay. Applied Mathematics and Computation. 374, 2020. article no 125001
  38. Yang, S, Lu, Y, Jia, X, and Li, W (2020). Constructing three-way concept lattice based on the composite of classical lattices. International Journal of Approximate Reasoning. 121, 174-186. https://doi.org/10.1016/j.ijar.2020.03.007
    CrossRef
  39. Zhao, X, and Miao, D (2022). Isomorphic relationship between L-three-way concept lattices. Cognitive Computation. 14, 1997-2019. https://doi.org/10.1007/s12559-021-09902-0
    CrossRef
  40. Ranitovic, MG, and Petojevic, A (2014). Lattice representations of interval-valued fuzzy sets. Fuzzy Sets and Systems. 236, 50-57. https://doi.org/10.1016/j.fss.2013.07.006
    CrossRef
  41. Zhang, S, Zhang, C, Zhang, S, and Zhang, M (2018). Discrete switched model and fuzzy robust control of dynamic supply chain network. Complexity, 2018. article no 3495096
  42. Djouadi, Y, and Prade, H (2009). Interval-valued fuzzy formal concept analysis. Foundations of Intelligent Systems. Heidelberg, Germany: Springer, pp. 592-601 https://doi.org/10.1007/978-3-642-04125-9_62
    CrossRef
  43. Kamran, M, Ashraf, S, and Hameed, MS (2023). A promising approach with confidence level aggregation operators based on single-valued neutrosophic rough sets. Soft Computing. https://doi.org/10.1007/s00500-023-09272-9
    CrossRef
  44. Singh, PK (2017). Three-way fuzzy concept lattice representation using neutrosophic set. International Journal of Machine Learning and Cybernetics. 8, 69-79. https://doi.org/10.1007/s13042-016-0585-0
    CrossRef
  45. Razzaque, A, Masmali, I, Latif, L, Shuaib, U, Razaq, A, Alhamzi, G, and Noor, S (). On t-intuitionistic fuzzy graphs: a comprehensive analysis and application in poverty reduction. Scientific Reports. 13, 2023. article no 17027
  46. Mao, H (2017). Representing attribute reduction and concepts in concept lattice using graphs. Soft Computing. 21, 7293-7311. https://doi.org/10.1007/s00500-016-2441-2
    CrossRef
  47. Zhang, S, and Zhang, M (2020). Mitigation of bullwhip effect in closed-loop supply chain based on fuzzy robust control approach. Complexity, 2020. article no 1085870
  48. Singh, PK, and Gani, A (2015). Fuzzy concept lattice reduction using Shannon entropy and Huffman coding. Journal of Applied Non-Classical Logics. 25, 101-119. https://doi.org/10.1080/11663081.2015.1039857
    CrossRef

Share this article on :

Related articles in IJFIS