• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Liu Wen, Mi Jusheng, Sun Yan. Axiomatic Characterization of New Hesitant Fuzzy Rough Approximation Operators[J]. Journal of Computer Research and Development, 2021, 58(9): 2062-2070. DOI: 10.7544/issn1000-1239.2021.20200517
Citation: Liu Wen, Mi Jusheng, Sun Yan. Axiomatic Characterization of New Hesitant Fuzzy Rough Approximation Operators[J]. Journal of Computer Research and Development, 2021, 58(9): 2062-2070. DOI: 10.7544/issn1000-1239.2021.20200517

Axiomatic Characterization of New Hesitant Fuzzy Rough Approximation Operators

Funds: This work was supported by the National Natural Science Foundation of China (62076088, 61502144), the Natural Science Foundation of Hebei Province (F2018205196, F2019205295), the Natural Science Foundation of Higher Education Institutions of Hebei Province (BJ2019014), the Postdoctoral Advanced Programs of Hebei Province (B2016003013), and the Training Funds for 333 Talents Project in Hebei Province (A2017002112).
More Information
  • Published Date: August 31, 2021
  • In order to reveal the deeper essential characteristics of hesitant fuzzy rough approximation operators and further study the relationship between hesitant fuzzy rough approximation spaces and hesitant fuzzy topological spaces, it is of great significance to study the axiomatic characterizations of hesitant fuzzy rough approximation operators. In most of the existing results, the axioms used to describe hesitant fuzzy approximation operators contain multiple axioms. Since the axiomatic characterization of approximation operator is a key method in the research of the mathematical structure of rough set theory, it is a fundamental problem in axiomatic method to find the minimum set of abstract axioms. In view of the above problems, this paper focuses on the study of characterization by using single axiom. The number of axioms in the axiom set is simplified to unique axiom for the first time, and a new axiom description is proposed. First of all, the axiomatic characterizations of classical hesitant fuzzy rough approximation operators are given. Then, we study the problem of the axiomatization of hesitant fuzzy rough approximation operators generated by serial, reflexive, symmetric, transitive and equivalent hesitant fuzzy relations, respectively. Finally, it is proved that the hesitant fuzzy rough approximation space can induce a hesitant fuzzy topological space.
  • Related Articles

    [1]Zhou Quan, Chen Minhui, Wei Kaijun, Zheng Yulong. Traceable Attribute-Based Signature for SM9-Based Support Policy Hidden[J]. Journal of Computer Research and Development, 2025, 62(4): 1065-1074. DOI: 10.7544/issn1000-1239.202330744
    [2]Liu Yongzhi, Qin Guiyun, Liu Pengtao, Hu Chengyu, Guo Shanqing. Provably Secure Public Key Authenticated Encryption with Keyword Search Based on SGX[J]. Journal of Computer Research and Development, 2023, 60(12): 2709-2724. DOI: 10.7544/issn1000-1239.202220478
    [3]An Haoyang, He Debiao, Bao Zijian, Peng Cong, Luo Min. Ring Signature Based on the SM9 Digital Signature And Its Application in Blockchain Privacy Protection[J]. Journal of Computer Research and Development, 2023, 60(11): 2545-2554. DOI: 10.7544/issn1000-1239.202330265
    [4]Li Jiguo, Zhu Liufu, Liu Chengdong, Lu Yang, Han Jinguang, Wang Huaqun, Zhang Yichen. Provably Secure Traceable Attribute-Based Sanitizable Signature Scheme in the Standard Model[J]. Journal of Computer Research and Development, 2021, 58(10): 2253-2264. DOI: 10.7544/issn1000-1239.2021.20210669
    [5]Fu Wei, Wu Xiaoping, Ye Qing, Xiao Nong, Lu Xicheng. A Multiple Replica Possession Proving Scheme Based on Public Key Partition[J]. Journal of Computer Research and Development, 2015, 52(7): 1672-1681. DOI: 10.7544/issn1000-1239.2015.20140353
    [6]Ma Chunguang, Wang Jiuru, Wu Peng, Zhang Hua. M-IBE Based Key Management Protocol for Heterogeneous Sensor Networks[J]. Journal of Computer Research and Development, 2013, 50(10): 2109-2116.
    [7]Long Yu, Xu Xian, Chen Kefei. Two Identity Based Threshold Cryptosystem with Reduced Trust in PKG[J]. Journal of Computer Research and Development, 2012, 49(5): 932-938.
    [8]Ren Yongjun, Wang Jiandong, Xu Dazhuan, Zhuang Yi, Wang Jian. Key Agreement Protocol for Wireless Sensor Networks Using Self-Certified Public Key System[J]. Journal of Computer Research and Development, 2012, 49(2): 304-311.
    [9]Chen Shaozhen, Wang Wenqiang, Peng Shujuan. Efficient AttributeBased Ring Signature Schemes[J]. Journal of Computer Research and Development, 2010, 47(12).
    [10]Chen Huiyan, Wang Lianqiang, Lü Shuwang. A Study of Key Problems of HFE Cryptosystem[J]. Journal of Computer Research and Development, 2007, 44(7): 1205-1210.

Catalog

    Article views (388) PDF downloads (152) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return