Next Article in Journal / Special Issue
Ordinary Single Valued Neutrosophic Topological Spaces
Previous Article in Journal
Study on the Allocation of a Rescue Base in the Arctic
Previous Article in Special Issue
Generalization of Maximizing Deviation and TOPSIS Method for MADM in Simplified Neutrosophic Hesitant Fuzzy Environment
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A New Type of Single Valued Neutrosophic Covering Rough Set Model

1
School of Electrical and Control Engineering, Shaanxi University of Science and Technology, Xi’an 710021, China
2
School of Arts and Sciences, Shaanxi University of Science and Technology, Xi’an 710021, China
*
Author to whom correspondence should be addressed.
Symmetry 2019, 11(9), 1074; https://doi.org/10.3390/sym11091074
Submission received: 8 July 2019 / Revised: 20 August 2019 / Accepted: 21 August 2019 / Published: 24 August 2019

Abstract

:
Recently, various types of single valued neutrosophic (SVN) rough set models were presented based on the same inclusion relation. However, there is another SVN inclusion relation in SVN sets. In this paper, we propose a new type of SVN covering rough set model based on the new inclusion relation. Furthermore, the graph and matrix representations of the new SVN covering approximation operators are presented. Firstly, the notion of SVN β 2 -covering approximation space is proposed, which is decided by the new inclusion relation. Then, a type of SVN covering rough set model under the SVN β 2 -covering approximation space is presented. Moreover, there is a corresponding SVN relation rough set model based on a SVN relation induced by the SVN β 2 -covering, and two conditions under which the SVN β 2 -covering can induce a symmetric SVN relation are presented. Thirdly, the graph and matrix representations of the new SVN covering rough set model are investigated. Finally, we propose a novel method for decision making (DM) problems in paper defect diagnosis under the new SVN covering rough set model.

1. Introduction

Rough set theory, as a tool to deal with various types of data in data mining, was proposed by Pawlak [1,2] in 1982. Then rough set theory has been extended to generalize rough sets based on other notions such as binary relations [3], neighborhood systems [4], and coverings [5].
Covering-based rough sets [6,7,8,9] were proposed to deal with the type of covering data. In application, they have been applied to knowledge reduction [10,11], decision rule synthesis [12,13], and other fields [14,15]. In theory, covering-based rough set theory has been connected with matroid theory [16,17,18], lattice theory [19,20], and fuzzy set theory [21,22,23]. Zadeh’s fuzzy set theory [24] addresses the problem of how to understand and manipulate imperfect knowledge. It has been used in various applications [25,26,27,28]. Recent investigations have attracted more attention on combining covering-based rough set and fuzzy set theories. There are many fuzzy covering rough set models proposed by researchers, such as Ma [29] and Yang et al. [30].
Smarandache [31] and Wang et al. [32] presented single valued neutrosophic (SVN) sets, which can be regarded as an extension of intuitionistic fuzzy sets [33]. Both neutrosophic sets and rough sets can deal with partial and uncertainty information [34]. Therefore, it is necessary to combine them. Recently, Mondal and Pramanik [35] presented the concept of rough neutrosophic set. Yang et al. [36] presented a SVN rough set model based on SVN relations. Wang and Zhang [37] presented two types of SVN covering rough set models. All these SVN rough set models are presented based on an inclusion relation which is named type-1 inclusion relation and denoted by 1 . The definition of 1 is shown as follows; for any A , B S V N ( U ) ,
A 1 B   iff   T A ( x ) T B ( x )   ,   I B ( x ) I A ( x )   and   F B ( x ) F A ( x )   for   all   x U .
Under the type-1 inclusion relation, for two SVN numbers α = a , b , c and β = d , e , f , we have α 1 β a d , b e and c f . The definition of SVN β -covering approximation space is presented as follows (see the work by the authors of [37]).
Let U be a universe and S V N ( U ) be the SVN power set of U. For a SVN number β = a , b , c , we call C ^ = { C 1 , C 2 , , C m } , with C i S V N ( U ) ( i = 1 , 2 , , m ) , a SVN β -covering of U, if for all x U , C i C ^ exists such that C i ( x ) 1 β . We also call ( U , C ^ ) a SVN β -covering approximation space.
However, there exists another inclusion relation in the work by the authors of [38], which is called type-2 inclusion relation and denoted by 2 . The definition of 2 is introduced as follows; for any A , B S V N ( U ) ,
A 2 B   iff   T A ( x ) T B ( x ) , I A ( x ) I B ( x )   and   F B ( x ) F A ( x )   for   all   x U .
Under the type-2 inclusion relation, for two SVN numbers α = a , b , c and β = d , e , f , we have α 2 β a d , b e and c f .
In the definition of SVN β -covering approximation space, if C i ( x ) 1 β is replaced by C i ( x ) 2 β , there will be a new SVN covering approximation space (we call it a SVN β 2 -covering approximation space in this paper). In Example 1 in this paper, we find the following statements.
(1)
Let β = 0.5 , 0.1 , 0.8 . Then C ^ is a SVN β 2 -covering of U, but it is not a SVN β -covering of U.
(2)
Let β = 0.5 , 0.3 , 0.8 . Then C ^ is a SVN β -covering of U, but it is not a SVN β 2 -covering of U.
That is to say, the SVN β 2 -covering approximation space is a new SVN covering approximation space, which is different from the SVN β -covering approximation space. Since different inclusion relations ( 1 and 2 ) have different union and intersection operations, the SVN β 2 -covering approximation space has different union and intersection operations from the SVN β -covering approximation space. Hence, notions and corresponding SVN covering rough set models of SVN β -covering approximation space do not apply to SVN β 2 -covering approximation space, which is the justification for studying this topic. Therefore, the investigation of the SVN β 2 -covering approximation space and its corresponding SVN covering rough set model is very important. It not only can manage some issues that the SVN β -covering approximation space can not deal with, but also constructs a new type of SVN covering rough set model. This is our motivation of this research.
In this paper, we present some new concepts in SVN β 2 -covering approximation space, as well as their properties. Then the type-2 SVN covering rough set model under the SVN β 2 -covering approximation space is proposed. On the one hand, the graph and matrix representations of the type-2 SVN covering rough set model are investigated respectively. Moreover, some relationships between the type-2 SVN covering rough set model and other SVN rough set models are presented. One the other hand, we present a method to DM problems in paper defect diagnosis, which is an important topic in paper making industries, under the type-2 SVN covering rough set model. Many researchers have studied decision making (DM) problems by rough set models [39,40,41,42]. Hence, the proposed DM method is compared with other methods which are presented by Liu [43], Ye [44], Yang et al. [36], and Wang et al. [37] respectively.
The rest of this paper is organized as follows. Section 2 reviews some fundamental definitions about covering-based rough sets and SVN sets. In Section 3, some concepts and properties in SVN β 2 -covering approximation space are studied. The relationship between the SVN β -covering approximation space and the SVN β 2 -covering approximation space is presented. In Section 4, we present the type-2 SVN covering rough set model. Some relationships between the type-2 SVN covering rough set model and other SVN rough set models are presented. Moreover, a SVN relation can be induced by the SVN β 2 -covering, so a corresponding SVN relation rough set model and two conditions under which the SVN β 2 -covering can induce a symmetric SVN relation are presented. In Section 5, some new graphs and graph operations are presented. Based on this, the graph representation of the type-2 SVN covering approximation operators is shown. In Section 6, some new matrices and matrix operations are also presented, and the matrix representation of the type-2 SVN covering approximation operators is presented. In Section 7, a novel method to paper defect diagnosis is presented under the type-2 SVN covering rough set model. Moreover, the proposed method is compared with other methods. This paper is concluded and further work is indicated in Section 8.

2. Basic Definitions

Suppose U is a nonempty and finite set called universe.
Definition 1.
(Covering [45,46]) Let U be a universe and C be a family of subsets of U. If none of subsets in C is empty and C = U , then C is called a covering of U.
The pair ( U , C ) is called a covering approximation space.
Definition 2.
(SVN set [32]) Let U be a nonempty fixed set. A SVN set A in U is defined as an object of the following form.
A = { x , T A ( x ) , I A ( x ) , F A ( x ) : x U } ,
where T A : U [ 0 , 1 ] is called the degree of truth-membership of the element x U to A, I A : U [ 0 , 1 ] is called the degree of indeterminacy-membership of the element x U to A, F A ( x ) : U [ 0 , 1 ] is called the degree of falsity-membership. They satisfy 0 T A ( x ) + I A ( x ) + F A ( x ) 3 for all x U . The family of all SVN sets in U is denoted by S V N ( U ) . For convenience, a SVN number is represented by α = a , b , c , where a , b , c [ 0 , 1 ] and a + b + c 3 .
For the inclusion relation of neutrosophic sets, there are two different definitions in the literature. An original definition is proposed by Smarandache [31,47], we call it type-1 inclusion relation in this paper, denoted by 1 . For set theory, union and intersection operations are corresponding to inclusion relation. Hence, there are corresponding union and intersection operations defined as follows; for any A , B S V N ( U ) ,
(1)
A 1 B iff T A ( x ) T B ( x ) , I B ( x ) I A ( x ) and F B ( x ) F A ( x ) for all x U ;
(2)
A 1 B = { x , T A ( x ) T B ( x ) , I A ( x ) I B ( x ) , F A ( x ) F B ( x ) : x U } ;
(3)
A 1 B = { x , T A ( x ) T B ( x ) , I A ( x ) I B ( x ) , F A ( x ) F B ( x ) : x U } .
Specially, for two SVN numbers, α = a , b , c and β = d , e , f , α 1 β a d , b e and c f .
Under the type-1 inclusion relation, Wang and Zhang [37] presented the definition of SVN β -covering approximation space.
Definition 3.
[37] Let U be a universe and S V N ( U ) be the SVN power set of U. For a SVN number β = a , b , c , we call C ^ = { C 1 , C 2 , , C m } , with C i S V N ( U ) ( i = 1 , 2 , , m ) , a SVN β-covering of U, if for all x U , C i C ^ exists such that C i ( x ) 1 β . We also call ( U , C ^ ) a SVN β-covering approximation space.
Definition 4.
[37] Let C ^ be a SVN β-covering of U and C ^ = { C 1 , C 2 , , C m } . For any x U , the SVN β-neighborhood N ˜ x β of x induced by C ^ can be defined as
N ˜ x β = 1 { C i C ^ : C i ( x ) 1 β } .
Another one is used in some papers [32,38], we call it type-2 inclusion relation in this paper, denote it by 2 . Hence, the type-2 inclusion relation, corresponding union and intersection operations are shown as follows; for any A , B S V N ( U ) ,
(1)
A 2 B iff T A ( x ) T B ( x ) , I A ( x ) I B ( x ) and F B ( x ) F A ( x ) for all x U ;
(2)
A 2 B = { x , T A ( x ) T B ( x ) , I A ( x ) I B ( x ) , F A ( x ) F B ( x ) : x U } ;
(3)
A 2 B = { x , T A ( x ) T B ( x ) , I A ( x ) I B ( x ) , F A ( x ) F B ( x ) : x U } .
Specially, for two SVN numbers α = a , b , c and β = d , e , f , α 2 β a d , b e and c f .
For the above inclusion relations of neutrosophic sets, the following operations use the same definition in this paper [32,36].
(4)
A = B iff A 1 B and B 1 A , iff A 2 B and B 2 A ;
(5)
A = { x , F A ( x ) , 1 I A ( x ) , T A ( x ) : x U } ;
(6)
A B = { x , T A ( x ) + T B ( x ) T A ( x ) · T B ( x ) , I A ( x ) · I B ( x ) , F A ( x ) · F B ( x ) : x U } .

3. SVN β 2 -Covering Approximation Space

In this section, the definition of SVN β 2 -covering approximation space is presented. There are two basic concepts—SVN β 2 -covering and SVN β 2 -neighborhood—in this new approximation space.
Definition 5.
Let U be a universe and S V N ( U ) be the SVN power set of U. For a SVN number β = a , b , c , we call C ^ = { C 1 , C 2 , , C m } , with C i S V N ( U ) ( i = 1 , 2 , , m ) , a SVN β 2 -covering of U, if for all x U , C i C ^ exists such that C i ( x ) 2 β . We also call ( U , C ^ ) a SVN β 2 -covering approximation space.
In Definition 5, if C i ( x ) 2 β is replaced by C i ( x ) 1 β , then C ^ = { C 1 , C 2 , , C m } is called a SVN β -covering of U in [37]. By the definitions of 1 and 2 , we know if C ^ is a SVN β 2 -covering of U, then C ^ is not necessarily a SVN β -covering. To show the difference between SVN β -covering and SVN β 2 -covering, we use the work presented by the authors of [37] in the following example.
Example 1.
Let U = { x 1 , x 2 , x 3 , x 4 , x 5 } , C ^ = { C 1 , C 2 , C 3 , C 4 } and β = 0.5 , 0.1 , 0.8 . We can see that C ^ is a SVN β 2 -covering of U in Table 1, but it is not a SVN β-covering of U.
Conversely, if C ^ is a SVN β -covering of U, then C ^ is not necessarily a SVN β 2 -covering. In Example 1, suppose β = 0.5 , 0.3 , 0.8 . Then C ^ is a SVN β -covering of U, but it is not a SVN β 2 -covering of U.
By the definition of SVN β -neighborhood, the notion of SVN β 2 -neighborhood is presented in the following definition.
Definition 6.
Let C ^ be a SVN β 2 -covering of U and C ^ = { C 1 , C 2 , , C m } . For any x U , the SVN β 2 -neighborhood N ˜ x β 2 of x induced by C ^ can be defined as
N ˜ x β 2 = 2 { C i C ^ : C i ( x ) 2 β } .
Note that C i ( x ) is a SVN number T C i ( x ) , I C i ( x ) , F C i ( x ) . Hence, C i ( x ) 2 β means T C i ( x ) a , I C i ( x ) b and F C i ( x ) c , where SVN number β = a , b , c .
Remark 1.
Let C ^ be a SVN β 2 -covering of U, β = a , b , c and C ^ = { C 1 , C 2 , , C m } . For any x U ,
N ˜ x β 2 = 2 { C i C ^ : T C i ( x ) a , I C i ( x ) b , F C i ( x ) c } .
Example 2.
Let ( U , C ^ ) be a SVN β 2 -covering approximation space in Example 1 and β = 0.5 , 0.1 , 0.8 . Then
N ˜ x 1 β 2 = C 1 2 C 2 , N ˜ x 2 β 2 = C 1 2 C 2 2 C 4 , N ˜ x 3 β 2 = C 3 2 C 4 , N ˜ x 4 β 2 = C 1 2 C 4 , N ˜ x 5 β 2 = C 2 2 C 3 2 C 4 .
Hence, all SVN β 2 -neighborhoods are shown in Table 2:
According to Definitions 3–6, we know that “Let C ^ be a SVN β 2 -covering of U. If C ^ is also a SVN β -covering of U, then N ˜ x β 2 and N ˜ x β have no inclusion relations ( 1 and 2 ) for all x U . To explain this statement, the following example is presented.
Example 3.
Let U = { x 1 , x 2 , x 3 , x 4 , x 5 } , C ^ = { C 1 , C 2 , C 3 , C 4 } and β = 0.5 , 0.2 , 0.8 , where C ^ is shown in Table 1 of Example 1. By Definitions 3 and 5, we know that C ^ is a SVN β 2 -covering and also a SVN β-covering of U. Then
N ˜ x 1 β 2 = C 1 2 C 2 , N ˜ x 2 β 2 = C 1 2 C 2 , N ˜ x 3 β 2 = C 3 2 C 4 , N ˜ x 4 β 2 = C 4 , N ˜ x 5 β 2 = C 2 2 C 3 . N ˜ x 1 β = C 1 1 C 2 , N ˜ x 2 β = C 2 1 C 4 , N ˜ x 3 β = C 3 , N ˜ x 4 β = C 1 , N ˜ x 5 β = C 4 .
Hence, all SVN β 2 -neighborhoods and SVN β 2 -neighborhoods are shown in Table 3 and Table 4 respectively:
By Table 3 and Table 4, we see that for all x k U ( k = 1 , 2 , 3 , 4 , 5 )
  • N ˜ x k β 2 1 N ˜ x k β is not established, since N ˜ x 2 β 2 1 N ˜ x 2 β .
  • N ˜ x k β 1 N ˜ x k β 2 is not established, since N ˜ x 3 β 1 N ˜ x 3 β 2 .
  • N ˜ x k β 2 2 N ˜ x k β is not established, since N ˜ x 4 β 2 2 N ˜ x 4 β .
  • N ˜ x k β 2 N ˜ x k β 2 is not established, since N ˜ x 5 β 2 N ˜ x 5 β 2 .
Hence, N ˜ x k β 2 and N ˜ x k β have no inclusion relations ( 1 and 2 ) for all x k U .
In a SVN β 2 -covering approximation space ( U , C ^ ) , we present the following properties of the SVN β 2 -neighborhood.
Proposition 1.
Let C ^ be a SVN β 2 -covering of U and C ^ = { C 1 , C 2 , , C m } . Then N ˜ x β 2 ( x ) 2 β for each x U .
Proof. 
For any x U , N ˜ x β 2 ( x ) = ( 2 C i ( x ) 2 β C i ) ( x ) 2 β . □
Proposition 2.
Let C ^ be a SVN β 2 -covering of U and C ^ = { C 1 , C 2 , , C m } . For all x , y , z U , if N ˜ x β 2 ( y ) 2 β , N ˜ y β 2 ( z ) 2 β , then N ˜ x β 2 ( z ) 2 β .
Proof. 
Let I = { 1 , 2 , , m } . Since N ˜ x β 2 ( y ) 2 β , for any i I , if C i ( x ) 2 β , then C i ( y ) 2 β . Since N ˜ y β 2 ( z ) 2 β , for any i I , C i ( z ) 2 β when C i ( y ) 2 β . Then, for any i I , C i ( x ) 2 β implies C i ( z ) 2 β . Therefore, N ˜ x β 2 ( z ) 2 β . □
Proposition 3.
Let C ^ be a SVN β 2 -covering of U and C ^ = { C 1 , C 2 , , C m } . For two SVN numbers β 1 , β 2 , if β 1 2 β 2 2 β , then N ˜ x β 1 2 2 N ˜ x β 2 2 for all x U .
Proof. 
For all x U , since β 1 2 β 2 2 β , { C i C ^ : C i ( x ) 2 β 1 } { C i C ^ : C i ( x ) 2 β 2 } . Hence, N ˜ x β 1 2 = 2 { C i C ^ : C i ( x ) 2 β 1 } 2 2 { C i C ^ : C i ( x ) 2 β 2 } = N ˜ x β 2 2 for all x U . □
Proposition 4.
Let C ^ be a SVN β 2 -covering of U. For any x , y U , N ˜ x β 2 ( y ) 2 β if and only if N ˜ y β 2 2 N ˜ x β 2 .
Proof. 
Suppose the SVN number β = a , b , c .
( ) : Since N ˜ x β 2 ( y ) 2 β , T N ˜ x β 2 ( y ) = T 2 T C i ( x ) a I C i ( x ) b F C i ( x ) c C i ( y ) = T C i ( x ) a I C i ( x ) b F C i ( x ) c T C i ( y ) a , I N ˜ x β 2 ( y ) = I 2 T C i ( x ) a I C i ( x ) b F C i ( x ) b C i ( y ) = T C i ( x ) a I C i ( x ) b F C i ( x ) c I C i ( y ) b ,
and
F N ˜ x β 2 ( y ) = F 2 T C i ( x ) a I C i ( x ) b F C i ( x ) c C i ( y ) = T C i ( x ) a I C i ( x ) b F C i ( x ) c F C i ( y ) c
.
Then,
{ C i C ^ : T C i ( x ) a , I C i ( x ) b , F C i ( x ) c } { C i C ^ : T C i ( y ) a , I C i ( y ) b , F C i ( y ) c } .
Therefore, for each z U ,
T N ˜ x β 2 ( z ) = T C i ( x ) a I C i ( x ) b F C i ( x ) c T C i ( z ) T C i ( y ) a I C i ( y ) b F C i ( y ) c T C i ( z ) = T N ˜ y β 2 ( z ) , I N ˜ x β 2 ( z ) = T C i ( x ) a I C i ( x ) b F C i ( x ) c I C i ( z ) T C i ( y ) a I C i ( y ) b F C i ( y ) c I C i ( z ) = I N ˜ y β 2 ( z ) , F N ˜ x β 2 ( z ) = T C i ( x ) a I C i ( x ) b F C i ( x ) c F C i ( z ) T C i ( y ) a I C i ( y ) b F C i ( y ) c F C i ( z ) = F N ˜ y β 2 ( z ) .
Hence, N ˜ y β 2 2 N ˜ x β 2 .
( ) : For any x , y U , since N ˜ y β 2 2 N ˜ x β 2 ,
T N ˜ x β 2 ( y ) T N ˜ y β 2 ( y ) a , I N ˜ x β 2 ( y ) I N ˜ y β 2 ( y ) b   and   F N ˜ x β 2 ( y ) F N ˜ y β 2 ( y ) c .
Therefore, N ˜ x β 2 ( y ) 2 β . □

4. A Type of SVN Covering Rough Set Model Based on a New Inclusion Relation

In this section, we propose a type of SVN covering rough set model on the basis of the SVN β 2 -neighborhoods, which is decided by a type-2 inclusion relation. Then, we investigate some properties of the new lower and upper SVN covering approximation operators. Finally, some relationships between this model and some other rough set models are presented.

4.1. Characteristics of the New Type of SVN Covering Rough Set Model Based on the New Inclusion Relation

Definition 7.
Let ( U , C ^ ) be a SVN β 2 -covering approximation space. For each A S V N ( U ) , where A = { x , T A ( x ) , I A ( x ) , F A ( x ) : x U } , we define the type-2 SVN covering upper approximation C ˜ 2 ( A ) and lower approximation C 2 ( A ) of A as
C ˜ 2 ( A ) = { x , y U [ T N ˜ x β 2 ( y ) T A ( y ) ] , y U [ I N ˜ x β 2 ( y ) I A ( y ) ] , y U [ F N ˜ x β 2 ( y ) F A ( y ) ] : x U } , C 2 ( A ) = { x , y U [ F N ˜ x β 2 ( y ) T A ( y ) ] , y U [ ( 1 I N ˜ x β 2 ( y ) ) I A ( y ) ] , y U [ T N ˜ x β 2 ( y ) F A ( y ) ] : x U } .
If C ˜ 2 ( A ) C 2 ( A ) , then A is called the type-2 SVN covering rough set.
Example 4.
Let ( U , C ^ ) be a SVN β 2 -covering approximation space in Example 1, β = 0.5 , 0.1 , 0.8 and A = ( 0.6 , 0.3 , 0.5 ) x 1 + ( 0.4 , 0.5 , 0.1 ) x 2 + ( 0.3 , 0.2 , 0.6 ) x 3 + ( 0.5 , 0.3 , 0.4 ) x 4 + ( 0.7 , 0.2 , 0.3 ) x 5 . Then all SVN β 2 -neighborhoods N ˜ x k β 2 ( k = 1 , 2 , 3 , 4 , 5 ) are shown in Table 2 of Example 2. By Definition 7, we have
C ˜ 2 ( A ) = { x 1 , 0.6 , 0.2 , 0.5 , x 2 , 0.4 , 0.2 , 0.6 , x 3 , 0.6 , 0.3 , 0.5 , x 4 , 0.5 , 0.2 , 0.6 , x 5 , 0.6 , 0.3 , 0.5 } , C 2 ( A ) = { x 1 , 0.6 , 0.8 , 0.5 , x 2 , 0.6 , 0.8 , 0.4 , x 3 , 0.4 , 0.7 , 0.5 , x 4 , 0.4 , 0.7 , 0.4 , x 5 , 0.6 , 0.8 , 0.3 } .
Let the SVN universe set be U = { x , 1 , 1 , 0 : x U } and the SVN empty set be = { x , 0 , 0 , 1 : x U } , which are decided by the type-2 inclusion relation 2 . Some basic properties of the type-2 SVN covering upper and lower approximation operators are presented in the following proposition.
Proposition 5.
Let C ^ be a SVN β 2 -covering of U. Then the type-2 SVN covering upper and lower approximation operators in Definition 7 satisfy the following properties for all A , B S V N ( U ) .
(1)
C 2 ( U ) = U , C ˜ 2 ( ) = ;
(2)
C ˜ 2 ( A ) = ( C 2 ( A ) ) , C 2 ( A ) = ( C ˜ 2 ( A ) ) ;
(3)
If A 2 B , then C 2 ( A ) 2 C 2 ( B ) , C ˜ 2 ( A ) 2 C ˜ 2 ( B ) ;
(4)
C 2 ( A 2 B ) = C 2 ( A ) 2 C 2 ( B ) , C ˜ 2 ( A 2 B ) = C ˜ 2 ( A ) 2 C ˜ 2 ( B ) ;
(5)
C 2 ( A 2 B ) 2 C 2 ( A ) 2 C 2 ( B ) , C ˜ 2 ( A 2 B ) 2 C ˜ 2 ( A ) 2 C ˜ 2 ( B ) .
Proof. 
(1)
Since the SVN universe set is U = { x , 1 , 1 , 0 : x U } and the SVN empty set is = { x , 0 , 0 , 1 : x U } ,
C 2 ( U ) = { x , y U [ F N ˜ x β 2 ( y ) T U ( y ) ] , y U [ ( 1 I N ˜ x β 2 ( y ) ) I U ( y ) ] , y U [ T N ˜ x β 2 ( y ) F U ( y ) ] : x U } = { x , 1 , 1 , 0 : x U } = U ,
and
C ˜ 2 ( ) = { x , y U [ T N ˜ x β 2 ( y ) T ( y ) ] , y U [ I N ˜ x β 2 ( y ) I ( y ) ] , y U [ F N ˜ x β 2 ( y ) F ( y ) ] : x U } = { x , 0 , 0 , 1 : x U } = ;
(2)
C ˜ 2 ( A ) = { x , y U [ T N ˜ x β 2 ( y ) T A ( y ) ] , y U [ I N ˜ x β 2 ( y ) I A ( y ) ] , y U [ F N ˜ x β 2 ( y ) F A ( y ) ] : x U } = { x , y U [ T N ˜ x β 2 ( y ) F A ( y ) ] , y U [ I N ˜ x β 2 ( y ) ( 1 I A ( y ) ) ] , y U [ F N ˜ x β 2 ( y ) T A ( y ) ] : x U } = ( C 2 ( A ) ) .
If we replace A by A in this proof, we can also prove C 2 ( A ) = ( C ˜ 2 ( A ) ) .
(3)
Since A 2 B , T A ( x ) T B ( x ) , I A ( x ) I B ( x ) and F B ( x ) F A ( x ) for all x U . Therefore
T C 2 ( A ) ( x ) = y U [ F N ˜ x β 2 ( y ) T A ( y ) ] y U [ F N ˜ x β 2 ( y ) T B ( y ) ] = T C 2 ( B ) ( x ) , I C 2 ( A ) ( x ) = y U [ ( 1 I N ˜ x β 2 ( y ) ) I A ( y ) ] y U [ ( 1 I N ˜ x β 2 ( y ) ) I B ( y ) ] = I C 2 ( B ) ( x ) , F C 2 ( A ) ( x ) = y U [ T N ˜ x β 2 ( y ) F A ( y ) ] y U [ T N ˜ x β 2 ( y ) F B ( y ) ] = F C 2 ( B ) ( x ) .
Hence, C 2 ( A ) 2 C 2 ( B ) . In the same way, there is C ˜ 2 ( A ) 2 C ˜ 2 ( B ) ;
(4)
Since
C 2 ( A 2 B ) = { x , y U [ F N ˜ x β 2 ( y ) T A 2 B ( y ) ] , y U [ ( 1 I N ˜ x β 2 ( y ) ) I A 2 B ( y ) ] , y U [ T N ˜ x β 2 ( y ) F A 2 B ( y ) ] : x U } = { x , y U [ F N ˜ x β 2 ( y ) ( T A ( y ) T B ( y ) ) ] , y U [ ( 1 I N ˜ x β 2 ( y ) ) ( I A ( y ) I B ( y ) ) ] , y U [ T N ˜ x β 2 ( y ) ( F A ( y ) F B ( y ) ) ] : x U } = { x , y U [ ( F N ˜ x β 2 ( y ) T A ( y ) ) ( F N ˜ x β 2 ( y ) T B ( y ) ) ] , y U [ ( ( 1 I N ˜ x β 2 ( y ) ) I A ( y ) ) ( 1 I N ˜ x β 2 ( y ) ) I B ( y ) ) ] , y U [ ( T N ˜ x β 2 ( y ) F A ( y ) ) ( T N ˜ x β 2 ( y ) F B ( y ) ) ] : x U } = C 2 ( A ) 2 C 2 ( B ) .
Similarly, we can obtain C ˜ 2 ( A 2 B ) = C ˜ 2 ( A ) 2 C ˜ 2 ( B ) ;
(5)
Since A 2 ( A 2 B ) , B 2 ( A 2 B ) , ( A 2 B ) 2 A and ( A 2 B ) 2 B ,
C 2 ( A ) 2 C 2 ( A 2 B ) , C 2 ( B ) 2 C 2 ( A 2 B ) , C ˜ 2 ( A 2 B ) 2 C ˜ 2 ( A ) and C ˜ 2 ( A 2 B ) 2 C ˜ 2 ( B ) .
Hence, C 2 ( A 2 B ) 2 C 2 ( A ) 2 C 2 ( B ) , C ˜ 2 ( A 2 B ) 2 C ˜ 2 ( A ) 2 C ˜ 2 ( B ) . □

4.2. Relationships between the New Model and Some Other Rough Set Models

In this subsection, we investigate some relationships between the type-2 SVN covering rough set model and other two SVN rough set models respectively. Among these two SVN rough set models, one is a SVN covering rough set model and the other is a SVN relation rough set model.
Wang and Zhang [37] presented the type-1 SVN covering rough set model under a SVN β -covering approximation space, which is related to the type-1 inclusion relation. We consider whether the type-1 SVN covering approximate operators and the type-2 SVN covering approximate operators presented in Section 4.1 have inclusion relations.
Definition 8.
[37] Let ( U , C ^ ) be a SVN β-covering approximation space. For each A S V N ( U ) , where A = { x , T A ( x ) , I A ( x ) , F A ( x ) : x U } , we define the type-1 SVN covering upper approximation C ˜ ( A ) and lower approximation C ( A ) of A as
C ˜ ( A ) = { x , y U [ T N ˜ x β ( y ) T A ( y ) ] , y U [ I N ˜ x β ( y ) I A ( y ) ] , y U [ F N ˜ x β ( y ) F A ( y ) ] : x U } , C ( A ) = { x , y U [ F N ˜ x β ( y ) T A ( y ) ] , y U [ ( 1 I N ˜ x β ( y ) ) I A ( y ) ] , y U [ T N ˜ x β ( y ) F A ( y ) ] : x U } .
If C ˜ ( A ) C ( A ) , then A is called the type-1 SVN covering rough set.
Let C ^ be a SVN β 2 -covering of U and also be a SVN β -covering of U. By Definitions 7 and 8, we know that the type-1 SVN covering approximate operators ( C ˜ and C ) and the type-2 SVN covering approximate operators ( C ˜ 2 and C 2 ) are related to all SVN β -neighborhoods ( N ˜ x β , for any x U ) and SVN β 2 -neighborhoods ( N ˜ x β 2 , for any x U ), respectively. By Example 3, we know that N ˜ x β 2 and N ˜ x β have no inclusion relations ( 1 and 2 ) for all x U . Hence, the type-1 SVN covering approximate operators and the type-2 SVN covering approximate operators also have no inclusion relations ( 1 and 2 ).
In the work by the authors of [36], a SVN relation R on U is defined as R = { ( x , y ) , T R ( x , y ) , I R ( x , y ) , F R ( x , y ) : ( x , y ) U × U }, where T R : U × U [ 0 , 1 ] , I R : U × U [ 0 , 1 ] and F R : U × U [ 0 , 1 ] . If for any x , y U , T R ( x , y ) = T R ( y , x ) , I R ( x , y ) = I R ( y , x ) and F R ( x , y ) = F R ( y , x ) , then R is called a symmetric SVN relation.
For a SVN β 2 -covering C ^ of U, one can use the SVN β 2 -covering C ^ induce a SVN relation R C ^ on U as
R C ^ = { ( x , y ) , T R C ^ ( x , y ) , I R C ^ ( x , y ) , F R C ^ ( x , y ) : ( x , y ) U × U } ,
where
T R C ^ ( x , y ) = T N ˜ x β 2 ( y ) , I R C ^ ( x , y ) = I N ˜ x β 2 ( y ) , F R C ^ ( x , y ) = F N ˜ x β 2 ( y ) for   any   x , y U .
The following two propositions present two conditions under which R C ^ is a symmetric SVN relation.
Proposition 6.
Let C ^ be a SVN β 2 -covering of U, and R C ^ be the induced SVN relation on U by C ^ . If N ˜ x β 2 ( y ) = N ˜ y β 2 ( x ) for any x , y U , then R C ^ is a symmetric SVN relation.
Proof. 
Since N ˜ x β 2 ( y ) = N ˜ y β 2 ( x ) for any x , y U , T N ˜ x β 2 ( y ) = T N ˜ y β 2 ( x ) , I N ˜ x β 2 ( y ) = I N ˜ y β 2 ( x ) and F N ˜ x β 2 ( y ) = F N ˜ y β 2 ( x ) . Hence, T R C ^ ( x , y ) = T R C ^ ( y , x ) , I R C ^ ( x , y ) = I R C ^ ( y , x ) and F R C ^ ( x , y ) = F R C ^ ( y , x ) , i.e., R C ^ is a symmetric SVN relation. □
Proposition 7.
Let C ^ be a SVN β 2 -covering of U, R C ^ be the induced SVN relation on U by C ^ , and C C ^ . If | C ^ | = 1 and C ( x ) = C ( y ) for any x , y U , then R C ^ is a symmetric SVN relation, where | C ^ | denotes the cardinality of C ^ .
Proof. 
Since | C ^ | = 1 , C is the only one element of C ^ . Since C ( x ) = C ( y ) for any x , y U , N ˜ x β 2 ( y ) = N ˜ y β 2 ( x ) . Hence, T R C ^ ( x , y ) = T R C ^ ( y , x ) , I R C ^ ( x , y ) = I R C ^ ( y , x ) and F R C ^ ( x , y ) = F R C ^ ( y , x ) , i.e., R C ^ is a symmetric SVN relation. □
Then, the type-2 SVN covering rough set model defined in Section 4.1 can be viewed as a SVN relation rough set model.
Definition 9.
Let C ^ be a SVN β 2 -covering of U, and R C ^ be the induced SVN relation on U by C ^ . For any A S V N ( U ) , the upper approximation R ˜ C ^ ( A ) and lower approximation R C ^ ( A ) of A are defined as
R ˜ C ^ ( A ) = { x , y U [ T R C ^ ( x , y ) T A ( y ) ] , y U [ I R C ^ ( x , y ) I A ( y ) ] , y U [ F R C ^ ( x , y ) F A ( y ) ] : x U } , R C ^ ( A ) = { x , y U [ F R C ^ ( x , y ) T A ( y ) ] , y U [ ( 1 I R C ^ ( x , y ) ) I A ( y ) ] , y U [ T R C ^ ( x , y ) F A ( y ) ] : x U } .
Remark 2.
Let C ^ be a SVN β 2 -covering of U, and R C ^ be the induced SVN relation on U by C ^ . Then
R ˜ C ^ ( A ) = C ˜ 2 ( A ) , R C ^ ( A ) = C 2 ( A ) .

5. Graph Representation of the Type-2 SVN Covering Rough Set Model

In this section, the graph representation of the type-2 SVN covering rough set model is presented. Firstly, some new graphs and graph operations are presented. Then, we show the graph representation of the type-2 SVN covering approximation operators defined in Definition 7. The order of elements in U is given.
A graph is a pair G = ( V , E ) consisting of a nonempty set V of vertices and a set E of edges such that E U × U . We shall often write V ( G ) for V and E ( G ) for E, particularly when several graphs are being considered. Two vertices are adjacent if there is an edge with them as ends. A graph G = ( V , E ) is called bipartite if the vertex set V can be divided into two disjoint sets V 1 and V 2 , such that every edge connects a vertex in V 1 to one in V 2 . One often writes G = ( V 1 V 2 , E ) to denote a bipartite graph whose partition has the partite sets V 1 and V 2 . A complete bipartite graph is a simple bipartite graph such that two vertices are adjacent if and only if they are in different partite sets. A weighted graph is a graph with numerical labels on the edges.
Firstly, the graph representation of the SVN β 2 -covering C ^ is defined in the following definition.
Definition 10.
Let C ^ be a SVN β 2 -covering of U with U = { x 1 , x 2 , , x n } and C ^ = { C 1 , C 2 , , C m } . For any A S V N ( U ) , we define a completely weighted bipartite graph G ( A ) = ( U V , E ) , named completely weighted bipartite graph associated with A, where V = { T A , I A , F A } , the weight w ( T A , x k ) = T A ( x k ) , w ( I A , x k ) = I A ( x k ) and w ( F A , x k ) = F A ( x k ) ( k = 1 , 2 , , n ). For the SVN β-covering C ^ , there are m completely weighted bipartite graphs G ( C i ) ( i = 1 , 2 , , m ), and all G ( C i ) are called the graph representation of the SVN β 2 -covering C ^ .
Example 5.
Let ( U , C ^ ) be a SVN β 2 -covering approximation space in Example 1 and β = 0.5 , 0.1 , 0.8 . Then G ( C i ) ( i = 1 , 2 , 3 , 4 ) are the graph representation of the SVN β 2 -covering C ^ . All G ( C i ) ( i = 1 , 2 , 3 , 4 ) are shown in Figure 1 and Figure 2.
An intersection operation about G ( A ) and G ( B ) is presented in the following definition, for any A , B S V N ( U ) .
Definition 11.
Let C ^ be a SVN β 2 -covering of U with U = { x 1 , x 2 , , x n } and C ^ = { C 1 , C 2 , , C m } . For any A , B , D S V N ( U ) , we define a completely weighted bipartite graph G ( D ) = G ( A ) 2 G ( B ) associated with D, where G ( D ) = ( U { T D , I D , F D } , E ) and
w ( T D , x k ) = w ( T A , x k ) w ( T B , x k ) , w ( I D , x k ) = w ( I A , x k ) w ( I A , x k ) and
w ( F D , x k ) = w ( F A , x k ) w ( F B , x k ) ( k = 1 , 2 , , n ) .
Based on Definition 11 and the definition of A 2 B , the relationship between G ( A 2 B ) and G ( A ) 2 G ( B ) can be obtained for any A , B S V N ( U ) .
Lemma 1.
Let C ^ be a SVN β 2 -covering of U. Then G ( A 2 B ) = G ( A ) 2 G ( B ) for any A , B S V N ( U ) .
Proof. 
According to the definition of A 2 B and Definition 11, it is immediate. □
By Definition 6, N ˜ x k β 2 S V N ( U ) for any x k U . Hence, any G ( N ˜ x k β 2 ) is a completely weighted bipartite graph, which can be represented in the following proposition.
Proposition 8.
Let C ^ be a SVN β 2 -covering of U with U = { x 1 , x 2 , , x n } , C ^ = { C 1 , C 2 , , C m } and β = a , b , c . Then
G ( N ˜ x k β 2 ) = 2 { G ( C i ) : w ( T C i , x k ) a , w ( I C i , x k ) b , w ( F C i , x k ) c } .
Proof. 
By Definitions 6 and 11, and Lemma 1, it is immediate. □
Example 6.
Let ( U , C ^ ) be a SVN β 2 -covering approximation space in Example 1 and β = 0.5 , 0.1 , 0.8 . By Proposition 8, we have
G ( N ˜ x 1 β 2 ) = G ( C 1 ) 2 G ( C 2 ) , G ( N ˜ x 2 β 2 ) = G ( C 1 ) 2 G ( C 2 ) 2 G ( C 4 ) , G ( N ˜ x 3 β 2 ) = G ( C 3 ) 2 G ( C 4 ) , G ( N ˜ x 4 β 2 ) = G ( C 1 ) 2 G ( C 4 ) , G ( N ˜ x 5 β 2 ) = G ( C 2 ) 2 G ( C 3 ) 2 G ( C 4 ) .
Then all G ( N ˜ x k β 2 ) are shown in Figure 3, Figure 4, and Figure 5a.
Finally, the type-2 SVN covering upper approximation C ˜ 2 ( A ) and lower approximation C 2 ( A ) of A are represented by graphs.
Theorem 1.
Let C ^ be a SVN β 2 -covering of U with U = { x 1 , x 2 , , x n } . For each A S V N ( U ) , G ( C ˜ 2 ( A ) ) and G ( C 2 ( A ) ) are completely weighted bipartite graphs, where G ( C ˜ 2 ( A ) ) = ( U { T C ˜ 2 ( A ) , I C ˜ 2 ( A ) , F C ˜ 2 ( A ) } , E 1 ) , G ( C 2 ( A ) ) = ( U { T C 2 ( A ) , I C 2 ( A ) , F C 2 ( A ) } , E 2 ) and the weight of any edge is listed as follows.
w ( T C ˜ 2 ( A ) , x k ) = j = 1 n [ w ( T N ˜ x k β 2 , x j ) w ( T A , x j ) ] ( 1 k n ) , w ( I C ˜ 2 ( A ) , x k ) = j = 1 n [ w ( I N ˜ x k β 2 , x j ) w ( I A , x j ) ] ( 1 k n ) , w ( F C ˜ 2 ( A ) , x k ) = j = 1 n [ w ( F N ˜ x k β 2 , x j ) w ( F A , x j ) ] ( 1 k n ) , w ( T C 2 ( A ) , x k ) = j = 1 n [ w ( F N ˜ x k β 2 , x j ) w ( T A , x j ) ] ( 1 k n ) , w ( I C 2 ( A ) , x k ) = j = 1 n [ ( 1 w ( I N ˜ x k β 2 , x j ) ) w ( I A , x j ) ] ( 1 k n ) , w ( F C 2 ( A ) , x k ) = j = 1 n [ w ( T N ˜ x k β 2 , x j ) w ( F A , x j ) ] ( 1 k n ) .
Proof. 
According to Definition 7, we know C ˜ 2 ( A ) S V N ( U ) and C 2 ( A ) S V N ( U ) for any A S V N ( U ) . Hence, G ( C ˜ 2 ( A ) ) and G ( C 2 ( A ) ) are completely weighted bipartite graphs by Definition 10. According to Definitions 7 and 10, G ( C ˜ 2 ( A ) ) = ( U { T C ˜ 2 ( A ) , I C ˜ 2 ( A ) , F C ˜ 2 ( A ) } , E 1 ) , G ( C 2 ( A ) ) = ( U { T C 2 ( A ) , I C 2 ( A ) , F C 2 ( A ) } , E 2 ) and the weight of any edge is shown as follows.
w ( T C ˜ 2 ( A ) , x k ) = T C ˜ 2 ( A ) ( x k ) = j = 1 n [ T N ˜ x k β 2 ( x j ) T A ( x j ) ] = j = 1 n [ w ( T N ˜ x k β 2 , x j ) w ( T A , x j ) ] ( 1 k n ) , w ( I C ˜ 2 ( A ) , x k ) = I C ˜ 2 ( A ) ( x k ) = j = 1 n [ I N ˜ x k β 2 ( x j ) I A ( x j ) ] = j = 1 n [ w ( I N ˜ x k β 2 , x j ) w ( I A , x j ) ] ( 1 k n ) , w ( F C ˜ 2 ( A ) , x k ) = F C ˜ 2 ( A ) ( x k ) = j = 1 n [ F N ˜ x k β 2 ( x j ) F A ( x j ) ] = j = 1 n [ w ( F N ˜ x k β 2 , x j ) w ( F A , x j ) ] ( 1 k n ) , w ( T C 2 ( A ) , x k ) = T C 2 ( A ) ( x k ) = j = 1 n [ F N ˜ x k β 2 ( x j ) T A ( x j ) ] = j = 1 n [ w ( F N ˜ x k β 2 , x j ) w ( T A , x j ) ] ( 1 k n ) , w ( I C 2 ( A ) , x k ) = I C 2 ( A ) ( x k ) = j = 1 n [ ( 1 I N ˜ x k β 2 ( x j ) ) I A ( x j ) ] = j = 1 n [ ( 1 w ( I N ˜ x k β 2 , x j ) ) w ( I A , x j ) ] ( 1 k n ) , w ( F C 2 ( A ) , x k ) = F C 2 ( A ) ( x k ) = j = 1 n [ T N ˜ x k β 2 ( x j ) F A ( x j ) ] = j = 1 n [ w ( T N ˜ x k β 2 , x j ) w ( F A , x j ) ] ( 1 k n ) .
 □
Example 7.
Let ( U , C ^ ) be a SVN β 2 -covering approximation space in Example 1 and β = 0.5 , 0.1 , 0.8 , A = ( 0.6 , 0.3 , 0.5 ) x 1 + ( 0.4 , 0.5 , 0.1 ) x 2 + ( 0.3 , 0.2 , 0.6 ) x 3 + ( 0.5 , 0.3 , 0.4 ) x 4 + ( 0.7 , 0.2 , 0.3 ) x 5 . G ( A ) is shown in Figure 5b. Based on Theorem 1 and all G ( N ˜ x k β 2 ) ( k = 1 , 2 , , 5 ) in Example 6 and G ( C ˜ 2 ( A ) ) and G ( C 2 ( A ) ) are obtained in Figure 6.

6. Matrix Representation of the Type-2 SVN Covering Rough Set Model

In this section, the matrix representation of the type-2 SVN covering rough set model is investigated. Firstly, some new matrices and matrix operations are presented. Then, we show the matrix representation of the type-2 SVN approximation operators defined in Definition 7. The order of elements in U is given.
Two new matrices about a SVN β 2 -covering are presented in the following definition.
Definition 12.
Let C ^ be a SVN β 2 -covering of U with U = { x 1 , x 2 , , x n } and C ^ = { C 1 , C 2 , , C m } . Then M C ^ = ( C j ( x i ) ) n × m is named a matrix representation of C ^ , and M C ^ β 2 = ( s i j ) n × m is called a β 2 -matrix representation of C ^ , where
s i j = 1 , C j ( x i ) 2 β ; 0 , otherwise .
Example 8.
Let ( U , C ^ ) be a SVN β 2 -covering approximation space in Example 1 and β = 0.5 , 0.1 , 0.8 . Then
M C ^ = 0.7 , 0.2 , 0.5 0.6 , 0.2 , 0.4 0.4 , 0.1 , 0.5 0.1 , 0.5 , 0.6 0.5 , 0.3 , 0.2 0.5 , 0.2 , 0.8 0.4 , 0.5 , 0.4 0.6 , 0.1 , 0.7 0.4 , 0.5 , 0.2 0.2 , 0.3 , 0.6 0.5 , 0.2 , 0.4 0.6 , 0.3 , 0.4 0.6 , 0.1 , 0.7 0.4 , 0.5 , 0.7 0.3 , 0.6 , 0.5 0.5 , 0.3 , 0.2 0.3 , 0.2 , 0.6 0.7 , 0.3 , 0.5 0.6 , 0.3 , 0.5 0.8 , 0.1 , 0.2 , M C ^ β 2 = 1 1 0 0 1 1 0 1 0 0 1 1 1 0 0 1 0 1 1 1 .
In order to calculate all N ˜ x β 2 (for any x U ) by matrices, the following operation is presented.
Definition 13.
Let A = ( a i k ) n × m and B = ( b k j + , b k j , b k j ) 1 k m , 1 j l be two matrices. We define D = A B = ( d i j + , d i j , d i j ) 1 i n , 1 j l , where
d i j + , d i j , d i j = k = 1 m [ ( 1 a i k ) b k j + ] , k = 1 m [ ( 1 a i k ) b k j ] , 1 k = 1 m [ ( 1 a i k ) ( 1 b k j ) ] .
Based on Definitions 12 and 13, all N ˜ x β 2 (for any x U ) can be obtained by matrix operations.
Proposition 9.
Let C ^ be a SVN β 2 -covering of U with U = { x 1 , x 2 , , x n } and C ^ = { C 1 , C 2 , , C m } .
Then
M C ^ β 2 M C ^ T = ( N ˜ x i β 2 ( x j ) ) 1 i n , 1 j n ,
where M C ^ T is the transpose of M C ^
Proof. 
Suppose M C ^ T = ( C k ( x j ) ) m × n , M C ^ β 2 = ( s i k ) n × m and M C ^ β 2 M C ^ T = ( d i j + , d i j , d i j ) 1 i n , 1 j n . Since C ^ is a SVN β 2 -covering of U, for each i ( 1 i n ), there exists k ( 1 k m ) such that s i k = 1 .
Then
d i j + , d i j , d i j = k = 1 m [ ( 1 s i k ) T C k ( x j ) ] , k = 1 m [ ( 1 s i k ) I C k ( x j ) ] , 1 k = 1 m [ ( 1 s i k ) ( 1 F C k ( x j ) ) ] = s i k = 1 [ ( 1 s i k ) T C k ( x j ) ] , s i k = 1 [ ( 1 s i k ) I C k ( x j ) ] , 1 s i k = 1 [ ( 1 s i k ) ( 1 F C k ( x j ) ) ] = s i k = 1 T C k ( x j ) , s i k = 1 I C k ( x j ) , 1 s i k = 1 ( 1 F C k ( x j ) ) = C k ( x i ) 2 β T C k ( x j ) , C k ( x i ) 2 β I C k ( x j ) , 1 C k ( x i ) 2 β ( 1 F C k ( x j ) ) = C k ( x i ) 2 β T C k ( x j ) , C k ( x i ) 2 β I C k ( x j ) , C k ( x i ) 2 β ( F C k ( x j ) ) = ( 2 C k ( x i ) 2 β C k ) ( x j ) = N ˜ x i β 2 ( x j ) , 1 i , j n .
Hence, M C ^ β 2 M C ^ T = ( N ˜ x i β 2 ( x j ) ) 1 i n , 1 j n . □
Example 9.
Let ( U , C ^ ) be a SVN β 2 -covering approximation space in Example 1 and β = 0.5 , 0.1 , 0.8 . According to M C ^ β 2 and M C ^ T in Example 8, we have
M C ^ β 2 M C ^ T = 1 1 0 0 1 1 0 1 0 0 1 1 1 0 0 1 0 1 1 1 0.7 , 0.2 , 0.5 0.6 , 0.2 , 0.4 0.4 , 0.1 , 0.5 0.1 , 0.5 , 0.6 0.5 , 0.3 , 0.2 0.5 , 0.2 , 0.8 0.4 , 0.5 , 0.4 0.6 , 0.1 , 0.7 0.4 , 0.5 , 0.2 0.2 , 0.3 , 0.6 0.5 , 0.2 , 0.4 0.6 , 0.3 , 0.4 0.6 , 0.1 , 0.7 0.4 , 0.5 , 0.7 0.3 , 0.6 , 0.5 0.5 , 0.3 , 0.2 0.3 , 0.2 , 0.6 0.7 , 0.3 , 0.5 0.6 , 0.3 , 0.5 0.8 , 0.1 , 0.2 T = 0.6 , 0.2 , 0.5 0.5 , 0.2 , 0.8 0.2 , 0.3 , 0.6 0.4 , 0.1 , 0.7 0.3 , 0.2 , 0.6 0.1 , 0.2 , 0.6 0.5 , 0.1 , 0.8 0.2 , 0.3 , 0.6 0.4 , 0.1 , 0.7 0.3 , 0.1 , 0.6 0.1 , 0.1 , 0.6 0.4 , 0.1 , 0.7 0.5 , 0.2 , 0.4 0.3 , 0.3 , 0.5 0.6 , 0.1 , 0.5 0.1 , 0.2 , 0.6 0.5 , 0.1 , 0.7 0.4 , 0.3 , 0.4 0.5 , 0.1 , 0.7 0.3 , 0.1 , 0.6 0.1 , 0.1 , 0.6 0.4 , 0.1 , 0.8 0.2 , 0.2 , 0.6 0.3 , 0.3 , 0.7 0.6 , 0.1 , 0.5 = ( N x i β 2 ( x j ) ) 1 i 5 , 1 j 5 .
There are two operations in the work by the authors of [37], which can be used to calculate C ˜ 2 ( A ) and C 2 ( A ) (for any A S V N ( U ) ) by matrices.
Definition 14.
[37] Let A = ( c i j + , c i j , c i j ) m × n and B = ( d j + , d j , d j ) n × 1 be two matrices. We define C = A B = ( e i + , e i , e i ) m × 1 and D = A B = ( f i + , f i , f i ) m × 1 , where
e i + , e i , e i = j = 1 n ( c i j + d j + ) , j = 1 n ( c i j d j ) , j = 1 n ( c i j d j ) , f i + , f i , f i = j = 1 n ( c i j d j + ) , j = 1 n [ ( 1 c i j ) d j ] , j = 1 n ( c i j + d j ) .
According to Proposition 9 and Definition 14, the set representations of C ˜ 2 ( A ) and C 2 ( A ) (for any A S V N ( U ) ) can be converted to matrix representations. A = ( a i ) n × 1 with a i = T A ( x i ) , I A ( x i ) , F A ( x i ) is the vector representation of A. C ˜ 2 ( A ) and C 2 ( A ) are also vector representations.
Theorem 2.
Let C ^ be a SVN β 2 -covering of U with U = { x 1 , x 2 , , x n } and C ^ = { C 1 , C 2 , , C m } . Then for any A S V N ( U ) ,
C ˜ 2 ( A ) = ( M C ^ β 2 M C ^ T ) A , C 2 ( A ) = ( M C ^ β 2 M C ^ T ) A .
Proof. 
According to Proposition 9, Definitions 7 and 14, for any x i ( i = 1 , 2 , , n ),
( ( M C ^ β 2 M C ^ T ) A ) ( x i ) = j = 1 n ( T N ˜ x i β 2 ( x j ) T A ( x j ) ) , j = 1 n ( I N ˜ x i β 2 ( x j ) I A ( x j ) ) , j = 1 n ( F N ˜ x i β 2 ( x j ) F A ( x j ) ) = ( C ˜ 2 ( A ) ) ( x i ) ,
and
( ( M C ^ β 2 M C ^ T ) A ) ( x i ) = j = 1 n ( F N ˜ x i β 2 ( x j ) T A ( x j ) ) , j = 1 n [ ( 1 I N ˜ x i β 2 ( x j ) ) I A ( x j ) ] , j = 1 n ( T N ˜ x i β 2 ( x j ) F A ( x j ) ) = ( C 2 ( A ) ) ( x i ) .
Hence, C ˜ 2 ( A ) = ( M C ^ β 2 M C ^ T ) A , C 2 ( A ) = ( M C ^ β 2 M C ^ T ) A . □
Example 10.
Let ( U , C ^ ) be a SVN β 2 -covering approximation space in Example 1, β = 0.5 , 0.1 , 0.8 and A = ( 0.6 , 0.3 , 0.5 ) x 1 + ( 0.4 , 0.5 , 0.1 ) x 2 + ( 0.3 , 0.2 , 0.6 ) x 3 + ( 0.5 , 0.3 , 0.4 ) x 4 + ( 0.7 , 0.2 , 0.3 ) x 5 . Then
C ˜ 2 ( A ) = ( M C ^ β 2 M C ^ T ) A = 0.6 , 0.2 , 0.5 0.5 , 0.2 , 0.8 0.2 , 0.3 , 0.6 0.4 , 0.1 , 0.7 0.3 , 0.2 , 0.6 0.1 , 0.2 , 0.6 0.5 , 0.1 , 0.8 0.2 , 0.3 , 0.6 0.4 , 0.1 , 0.7 0.3 , 0.1 , 0.6 0.1 , 0.1 , 0.6 0.4 , 0.1 , 0.7 0.5 , 0.2 , 0.4 0.3 , 0.3 , 0.5 0.6 , 0.1 , 0.5 0.1 , 0.2 , 0.6 0.5 , 0.1 , 0.7 0.4 , 0.3 , 0.4 0.5 , 0.1 , 0.7 0.3 , 0.1 , 0.6 0.1 , 0.1 , 0.6 0.4 , 0.1 , 0.8 0.2 , 0.2 , 0.6 0.3 , 0.3 , 0.7 0.6 , 0.1 , 0.5 0.6 , 0.3 , 0.5 0.4 , 0.5 , 0.1 0.3 , 0.2 , 0.6 0.5 , 0.3 , 0.4 0.7 , 0.2 , 0.3 = 0.6 , 0.2 , 0.5 0.4 , 0.2 , 0.6 0.6 , 0.3 , 0.5 0.5 , 0.2 , 0.6 0.6 , 0.3 , 0.5 ,
C 2 ( A ) = ( M C ^ β 2 M C ^ T ) A = 0.6 , 0.2 , 0.5 0.5 , 0.2 , 0.8 0.2 , 0.3 , 0.6 0.4 , 0.1 , 0.7 0.3 , 0.2 , 0.6 0.1 , 0.2 , 0.6 0.5 , 0.1 , 0.8 0.2 , 0.3 , 0.6 0.4 , 0.1 , 0.7 0.3 , 0.1 , 0.6 0.1 , 0.1 , 0.6 0.4 , 0.1 , 0.7 0.5 , 0.2 , 0.4 0.3 , 0.3 , 0.5 0.6 , 0.1 , 0.5 0.1 , 0.2 , 0.6 0.5 , 0.1 , 0.7 0.4 , 0.3 , 0.4 0.5 , 0.1 , 0.7 0.3 , 0.1 , 0.6 0.1 , 0.1 , 0.6 0.4 , 0.1 , 0.8 0.2 , 0.2 , 0.6 0.3 , 0.3 , 0.7 0.6 , 0.1 , 0.5 0.6 , 0.3 , 0.5 0.4 , 0.5 , 0.1 0.3 , 0.2 , 0.6 0.5 , 0.3 , 0.4 0.7 , 0.2 , 0.3 = 0.6 , 0.8 , 0.5 0.6 , 0.8 , 0.4 0.4 , 0.7 , 0.5 0.4 , 0.7 , 0.6 0.6 , 0.8 , 0.3 .

7. An Application to DM Problems in Paper Defect Diagnosis

Under the type-2 SVN covering rough set model, we present a novel approach to DM problems in paper defect diagnosis in this section.

7.1. The Problem of DM in Paper Defect Diagnosis

Let U = { x k : k = 1 , 2 , , n } be the set of papers and V = { y i | i = 1 , 2 , , m } be the m main symptoms (for example, spot, steak, and so on) for a paper defect B. Assume that an inspector R evaluate every paper x k ( k = 1 , 2 , , n ).
Assume that the inspector R believes each paper x k U ( k = 1 , 2 , , n ) has a symptom value C i ( i = 1 , 2 , , m ) denoted by C i ( x k ) = T C i ( x k ) , I C i ( x k , F C i ( x k ) , where T C i ( x k ) [ 0 , 1 ] is the degree that inspector R confirms paper x k has symptom y i , I C i ( x k ) [ 0 , 1 ] is the degree that inspector R is not sure paper x k has symptom y i , F C i ( x k ) [ 0 , 1 ] is the degree that inspector R confirms paper x k does not have symptom y i , and T C i ( x k ) + I C i ( x k ) + F C i ( x k ) 3 .
Let β = a , b , c be the critical value. If any paper x k U , there is at least one symptom y i V such that the symptom value C i for the paper x k is not less than β (i.e., C i ( x k ) 2 β ), respectively, then C ^ = { C 1 , C 2 , , C m } is a SVN β 2 -covering of U for some SVN number β .
If d is a possible degree, e is an indeterminacy degree and f is an impossible degree of the paper defect B of every paper x k U that is diagnosed by the inspector R, denoted by A ( x k ) = d , e , f , then the decision maker (the inspector R) for the DM problem needs to know how to evaluate whether the papers x k U have the paper defect B or not.

7.2. The DM Algorithm

In this subsection, we give an approach for the problem of DM with the above characterizations using the type-2 SVN covering rough set model. According to the characterizations of the DM problem in Section 7.1, we construct the SVN decision information system and present the Algorithm 1 of DM under the framework of the type-2 SVN covering rough set model.
Algorithm 1 The DM algorithm under the type-2 SVN covering rough set model
Input: SVN decision information system ( U , C ^ , β , A ).
Output: The score ordering for all alternatives.
  • Step 1: Compute the SVN β 2 -neighborhood N ˜ x β 2 of x induced by C ^ , for all x U according to Definition 6;
  • Step 2: Compute the SVN covering upper approximation C ˜ 2 ( A ) and lower approximation C 2 ( A ) of A, according to Definition 7;
  • Step 3: Compute R ˜ A 2 = C ˜ 2 ( A ) C 2 ( A ) ;
  • Step 4: Compute
    s ( x ) = T R ˜ A 2 ( x ) ( T R ˜ A 2 ( x ) ) 2 + ( I R ˜ A 2 ( x ) ) 2 + ( F R ˜ A 2 ( x ) ) 2 ;
  • Step 5: Rank all the alternatives s ( x ) by using the principle of numerical size and select the paper that is more likely to be sick with the paper defect B.
According to the above process, we can get the DM according to the ranking. In Step 4, S ( x ) is the cosine similarity measure between R ˜ A ( x ) and the ideal solution ( 1 , 0 , 0 ) , which is proposed by Ye [44].

7.3. An Applied Example

Example 11.
Assume that U = { x 1 , x 2 , x 3 , x 4 , x 5 } is a set of papers. According to the paper defects’ symptoms, we write V = { y 1 , y 2 , y 3 , y 4 } to be four main symptoms (spot, steak, crater, and fracture) for a paper defect B. Assume that the inspector R evaluates every paper x k ( k = 1 , 2 , , 5 ) as shown in Table 1.
Let β = 0.5 , 0.1 , 0.8 be the critical value. Then, C ^ = { C 1 , C 2 , C 3 , C 4 } is a SVN β 2 -coverings of U. Assume that the inspector R diagnosed the value A = ( 0.6 , 0.3 , 0.5 ) x 1 + ( 0.4 , 0.5 , 0.1 ) x 2 + ( 0.3 , 0.2 , 0.6 ) x 3 + ( 0.5 , 0.3 , 0.4 ) x 4 + ( 0.7 , 0.2 , 0.3 ) x 5 of the paper defect B of every paper.
Step 1: N ˜ x k β 2 ( k = 1 , 2 , 3 , 4 , 5 ) are shown in Table 2.
Step 2:
C ˜ 2 ( A ) = { x 1 , 0.6 , 0.2 , 0.5 , x 2 , 0.4 , 0.2 , 0.6 , x 3 , 0.6 , 0.3 , 0.5 , x 4 , 0.5 , 0.2 , 0.6 , x 5 , 0.6 , 0.3 , 0.5 } , C 2 ( A ) = { x 1 , 0.6 , 0.8 , 0.5 , x 2 , 0.6 , 0.8 , 0.4 , x 3 , 0.4 , 0.7 , 0.5 , x 4 , 0.4 , 0.7 , 0.4 , x 5 , 0.6 , 0.8 , 0.3 } .
Step 3:
R ˜ A 2 = C ˜ 2 ( A ) C 2 ( A ) = { x 1 , 0.84 , 0.16 , 0.25 , x 2 , 0.76 , 0.16 , 0.24 , x 3 , 0.76 , 0.21 , 0.25 , x 4 , 0.70 , 0.14 , 0.24 , x 5 , 0.84 , 0.24 , 0.15 } .
Step 4: We can obtain s ( x k ) ( k = 1 , 2 , , 5 ) in Table 5.
Step 5: According to the principle of numerical size, we have
x 3 < x 4 < x 2 < x 1 < x 5
.
Therefore, the inspector R diagnoses the paper x 5 as more likely to be sick with the paper defect B.

7.4. A Comparison Analysis

To validate the feasibility of the proposed DM method, a comparative study is conducted with other methods. These methods which were introduced in Liu [43], Ye [44], Yang et al. [36], and Wang et al. [37] are compared with the proposed approach using SVN information system.
Because Table 1 is the same as in the work by the authors of [37] and the counting processes of the methods presented by Liu [43], Ye [44], Yang et al. [36], and Wang et al. [37], are shown in the work by the authors of [37], so we do not show these counting processes in this paper. For Example 11, the results of them are calculated as follows.
  • In Liu’s method, we suppose the weight vector of the criteria is w = ( 0.35 , 0.25 , 0.3 , 0.1 ) and γ = 1 . Hence, we get
    s ( n 1 ) = 0.735 , s ( n 2 ) = 0.706 , s ( n 3 ) = 0.660 , s ( n 4 ) = 0.596 , s ( n 5 ) = 0.734 .
    According to the cosine similarity degrees s ( n k ) ( k = 1 , 2 , , 5 ), we obtain
    x 4 < x 3 < x 2 < x 5 < x 1 .
  • In Ye’s method, we suppose the weight vector of the criteria is w = ( 0.35 , 0.25 , 0.3 , 0.1 ) . Then
    W 1 ( x 1 , A * ) = 0.677 , W 2 ( x 2 , A * ) = 0.608 , W 3 ( x 3 , A * ) = 0.580 , W 4 ( x 4 , A * ) = 0.511 ,
    W 5 ( x 5 , A * ) = 0.666 .
    According to all s ( n x k , n * ) ( k = 1 , 2 , , 5 ), we obtain
    x 4 < x 3 < x 2 < x 5 < x 1 .
  • In Yang’s method, we suppose paper defect B S V N ( V ) and B = ( 0.3 , 0.6 , 0.5 ) y 1 + ( 0.7 , 0.2 , 0.1 ) y 2 + ( 0.6 , 0.4 , 0.3 ) y 3 + ( 0.8 , 0.4 , 0.5 ) y 4 . Let n * = 1 , 0 , 0 . We get
    R ˜ ¯ ( B ) = { x 1 , 0.6 , 0.2 , 0.4 , x 2 , 0.6 , 0.2 , 0.4 , x 3 , 0.6 , 0.3 , 0.4 , x 4 , 0.5 , 0.4 , 0.5 , x 5 , 0.8 , 0.3 , 0.5 } , R ˜ ̲ ( B ) = { x 1 , 0.5 , 0.6 , 0.5 , x 2 , 0.3 , 0.6 , 0.5 , x 3 , 0.3 , 0.5 , 0.5 , x 4 , 0.6 , 0.6 , 0.5 , x 5 , 0.6 , 0.6 , 0.5 } .
    Then,
    s ( n x 1 , n * ) = 0.960 , s ( n x 2 , n * ) = 0.951 , s ( n x 3 , n * ) = 0.945 , s ( n x 4 , n * ) = 0.918 , s ( n x 5 , n * ) = 0.948 .
    According to all s ( n x k , n * ) ( k = 1 , 2 , , 5 ), we obtain
    x 4 < x 3 < x 5 < x 2 < x 1 .
  • In Wang’s method, we do not use β = 0.5 , 0.1 , 0.8 in Example 11, and the reason is explained later. We suppose β = 0.5 , 0.3 , 0.8 in Wang’s method. Then
    C ˜ ( A ) = { x 1 , 0.6 , 0.3 , 0.5 , x 2 , 0.4 , 0.3 , 0.6 , x 3 , 0.6 , 0.5 , 0.5 , x 4 , 0.5 , 0.3 , 0.6 , x 5 , 0.6 , 0.5 , 0.5 } , C ( A ) = { x 1 , 0.6 , 0.5 , 0.5 , x 2 , 0.6 , 0.5 , 0.4 , x 3 , 0.4 , 0.4 , 0.5 , x 4 , 0.4 , 0.5 , 0.4 , x 5 , 0.6 , 0.4 , 0.3 } .
    Hence,
    s ( x 1 ) = 0.945 , s ( x 2 ) = 0.937 , s ( x 3 ) = 0.922 , s ( x 4 ) = 0.909 , s ( x 5 ) = 0.958 .
    According to all s ( x k ) ( k = 1 , 2 , , 5 ), we obtain
    x 4 < x 3 < x 2 < x 1 < x 5 .
All results are shown in Table 6 and Figure 7.
Liu [43] and Ye [44] presented the methods by SVN theory. The method developed by Liu [43] is based on the Hammer SVN number aggregation (HSVNNWA) operator, the ranking order willed be changed by different w and γ . The parameter γ can be regarded as an attitude of the decision maker’s preferences. For Example 11, we set the weight vector of the criteria is w = ( 0.35 , 0.25 , 0.3 , 0.1 ) and γ = 1 , then we obtain x 4 < x 3 < x 2 < x 5 < x 1 . The method developed by Ye [44] is based on the weighted correlation coefficient W k ( x k , A * ) or the weighted cosine similarity measure M k ( x k , A * ) , where A * is the ideal alternative. We can get two ranking orders of x k ( k = 1 , 2 , 3 , 4 , 5 ) by the values of W k ( x k , A * ) and M k ( x k , A * ) , respectively. Then, we find that these two kinds of ranking orders are the same. Hence, we only show W k ( x k , A * ) in this paper. In Table 6 and Figure 7, there are the same ranking results of their methods.
Yang et al. [36] and Wang et al. [37] used different SVN rough set models to make a decision. The method presented by Yang et al. [36] is based on a SVN relation rough set model on two-universes. That is to say, the DM problems with SVN information can be dealt with by Yang’s method when it induces a SVN relation on two-universes. In Example 11, we obtain a SVN relation on two universes from Table 1. The method presented by Wang et al. [37] based on the type-1 SVN covering rough set model. That is to say, the DM problems with SVN information can be dealt with by Wang’s method when it can induce a SVN β -covering. In Example 11, we suppose β = 0.5 , 0.1 , 0.8 . However, C ^ is not a SVN β -covering of U when β = 0.5 , 0.1 , 0.8 . Hence, the method presented by Wang et al. can not be used in Example 11 when β = 0.5 , 0.1 , 0.8 . Let’s re-assume β = 0.5 , 0.3 , 0.8 . Then C ^ is a SVN β -covering of U. Hence, the method presented by Wang et al. can be used in Example 11 when β = 0.5 , 0.3 , 0.8 .
In this paper, we present the type-2 SVN covering rough set model based on SVN β 2 -coverings. Under the type-2 SVN covering rough set model, a novel method for DM problems with SVN information is presented. The contributions of our proposed method are summarized as follows.
(1)
The DM problems with SVN information can be dealt with by our proposed method when it can induce a SVN β 2 -covering. The method presented by Wang et al. [37] can not be used in Example 11 when β = 0.5 , 0.1 , 0.8 . But our proposed method can deal with Example 11 when β = 0.5 , 0.1 , 0.8 . Hence, our proposed method complements Wang’s.
(2)
It is a new viewpoint to use SVN sets and rough sets in paper defect diagnosis.
Using different methods, the obtained results may be different. To achieve the most accurate results, further diagnosis is necessary for combination with other hybrid methods.

8. Conclusions

This paper investigates a new type of SVN covering rough set model, which can be seen as a new bridge linking SVN sets and covering-based rough sets. Comparing the existing literatures [36,37,48,49], the main contributions of this paper are concluded as follows.
(1)
By introducing some definitions and properties in SVN β 2 -covering approximation spaces, we present the type-2 SVN covering rough set model based on the type-2 inclusion relation. The existing literatures [36,37,48,49] used the type-1 inclusion relation to study the combination of SVN sets and rough sets. Hence, this paper presents a new and interesting viewpoint to study the combination of SVN sets and rough sets.
(2)
It would be tedious and complicated to use set representation to calculate the new SVN covering approximation operators. Therefore, the graph and matrix representations of these new SVN covering approximation operators make it possible to calculate them. We are the first to study the equivalent representation of the SVN rough set model by graph theory. By these graph and matrix representations, calculations will become algorithmic and can be easily implemented by computers.
(3)
Paper defect diagnosis is important in paper making industries. We propose a method to paper defect diagnosis under the type-2 SVN covering rough set model. The proposed DM method is compared with other methods which are presented by Liu [43], Ye [44], Yang et al. [36], and Wang et al. [37], respectively.
Further study will be deserved by the following research topics. On the one hand, the type-2 inclusion relation or graph theory can be considered into other SVN rough set models [34,36,48,49] in future research. On the other hand, neutrosophic sets and related algebraic structures [50,51,52,53,54,55] will be connected with the research content of this paper in further research.

Author Contributions

All authors have contributed equally to this paper. The idea of this whole thesis was put forward by X.Z., he also completed the preparatory work of the paper. J.W. analyzed the existing work of the rough sets and SVN sets and wrote the paper.

Funding

This work is supported by the National Natural Science Foundation of China under Grant Nos. 61976130 and 61573240, and the Natural Science Foundation of Education Department of Shaanxi Province, China, under Grant No. 19JK0506.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Pawlak, Z. Rough sets. Int. J. Comput. Inf. Sci. 1982, 11, 341–356. [Google Scholar] [CrossRef]
  2. Pawlak, Z. Rough Sets: Theoretical Aspects of Reasoning About Data; Kluwer Academic Publishers: Boston, MA, USA, 1991. [Google Scholar]
  3. Kondo, M. On the structure of generalized rough sets. Inf. Sci. 2006, 176, 589–600. [Google Scholar] [CrossRef]
  4. Wang, C.; Chen, D.; Wu, C.; Hu, Q. Data compression with homomorphism in covering information systems. Int. J. Approx. Reason. 2011, 52, 519–525. [Google Scholar] [CrossRef] [Green Version]
  5. Wang, S.; Zhu, W.; Zhu, Q.; Min, F. Characteristic matrix of covering and its application to Boolean matrix decomposition. Inf. Sci. 2014, 263, 186–197. [Google Scholar] [CrossRef]
  6. Bartol, W.; Miro, J.; Pioro, K.; Rossello, F. On the coverings by tolerance classes. Inf. Sci. 2004, 166, 193–211. [Google Scholar] [CrossRef]
  7. Bianucci, D.; Cattaneo, G.; Ciucci, D. Entropies and co-entropies of coverings with application to incomplete information systems. Fundam. Inf. 2007, 75, 77–105. [Google Scholar]
  8. Zhu, W. Relationship among basic concepts in covering-based rough sets. Inf. Sci. 2009, 179, 2478–2486. [Google Scholar] [CrossRef]
  9. Zhu, W. Topological approaches to covering rough sets. Inf. Sci. 2007, 177, 1499–1508. [Google Scholar] [CrossRef]
  10. Wang, J.; Zhang, X. Matrix approaches for some issues about minimal and maximal descriptions in covering-based rough sets. Int. J. Approx. Reason. 2019, 104, 126–143. [Google Scholar] [CrossRef]
  11. Yao, Y.; Zhao, Y. Attribute reduction in decision-theoretic rough set models. Inf. Sci. 2008, 178, 3356–3373. [Google Scholar] [CrossRef] [Green Version]
  12. Li, F.; Yin, Y. Approaches to knowledge reduction of covering decision systems based on information theory. Inf. Sci. 2009, 179, 1694–1704. [Google Scholar] [CrossRef]
  13. Wu, W. Attribute reduction based on evidence theory in incomplete decision systems. Inf. Sci. 2008, 178, 1355–1371. [Google Scholar] [CrossRef]
  14. Lang, G.; Li, Q.; Cai, M.; Fujita, H.; Zhang, H. Related families-based methods for updating reducts under dynamic object sets. Knowl. Inf. Syst. 2019, 60, 1081–1104. [Google Scholar] [CrossRef]
  15. Wang, J.; Zhu, W. Applications of bipartite graphs and their adjacency matrices to covering-based rough sets. Fundam. Inf. 2017, 156, 237–254. [Google Scholar] [CrossRef]
  16. Li, X.; Yi, H.; Liu, S. Rough sets and matroids from a lattice-theoretic viewpoint. Inf. Sci. 2016, 342, 37–52. [Google Scholar] [CrossRef]
  17. Wang, J.; Zhang, X. Four operators of rough sets generalized to matroids and a matroidal method for attribute reduction. Symmetry 2018, 10, 418. [Google Scholar] [CrossRef]
  18. Wang, J.; Zhu, W.; Wang, F.; Liu, G. Conditions for coverings to induce matroids. Int. J. Mach. Learn. Cybern. 2014, 5, 947–954. [Google Scholar] [CrossRef]
  19. Chen, J.; Li, J.; Lin, Y.; Lin, G.; Ma, Z. Relations of reduction between covering generalized rough sets and concept lattices. Inf. Sci. 2015, 304, 16–27. [Google Scholar] [CrossRef]
  20. Zhang, X.; Dai, J.; Yu, Y. On the union and intersection operations of rough sets based on various approximation spaces. Inf. Sci. 2015, 292, 214–229. [Google Scholar] [CrossRef]
  21. D’eer, L.; Cornelis, C. A comprehensive study of fuzzy covering-based rough set models: Definitions, properties and interrelationships. Fuzzy Sets Syst. 2018, 336, 1–26. [Google Scholar] [CrossRef]
  22. Wang, J.; Zhang, X. Two types of intuitionistic fuzzy covering rough sets and an application to multiple criteria group decision making. Symmetry 2018, 10, 462. [Google Scholar] [CrossRef]
  23. Zhang, X.; Miao, D.; Liu, C.; Le, M. Constructive methods of rough approximation operators and multigranulation rough sets. Knowl.-Based Syst. 2016, 91, 114–125. [Google Scholar] [CrossRef]
  24. Zadeh, L.A. Fuzzy sets. Inf. Control 1965, 8, 338–353. [Google Scholar] [CrossRef] [Green Version]
  25. Jankowski, J.; Kazienko, P.; Watróbski, J.; Lewandowska, A.; Ziemba, P.; Zioło, M. Fuzzy multi-objective modeling of effectiveness and user experience in online advertising. Expert Syst. Appl. 2016, 65, 315–331. [Google Scholar] [CrossRef]
  26. Boloş, M.I.; Bradea, I.A.; Delcea, C. A fuzzy logic algorithm for optimizing the investment decisions within companies. Symmetry 2019, 11, 186. [Google Scholar] [CrossRef]
  27. Pozna, C.; Minculete, N.; Precup, R.E.; Kóczy, L.T.; Ballagi, Á. Signatures: Definitions, operators and applications to fuzzy modeling. Fuzzy Sets Syst. 2012, 201, 86–104. [Google Scholar] [CrossRef]
  28. Vrkalovic, S.; Lunca, E.C.; Borlea, I.D. Model-free sliding mode and fuzzy controllers for reverse osmosis desalination plants. Int. J. Artif. Intell. 2018, 16, 208–222. [Google Scholar]
  29. Ma, L. Two fuzzy covering rough set models and their generalizations over fuzzy lattices. Fuzzy Sets Syst. 2016, 294, 1–17. [Google Scholar] [CrossRef]
  30. Yang, B.; Hu, B. On some types of fuzzy covering-based rough sets. Fuzzy Sets Syst. 2017, 312, 36–65. [Google Scholar] [CrossRef]
  31. Smarandache, F. Neutrosophy, Neutrosophic Probability, Set, and Logic; American Research Press: Rehoboth, DE, USA, 1998. [Google Scholar]
  32. Wang, H.; Smarandache, F.; Zhang, Y.; Sunderraman, R. Single valued neutrosophic sets. Multispace Multistruct. 2010, 4, 410–413. [Google Scholar]
  33. Atanassov, K. Intuitionistic fuzzy sets. Fuzzy Sets Syst. 1986, 20, 87–96. [Google Scholar] [CrossRef]
  34. Al-Quran, A.; Hassan, N.; Marei, E. A novel approach to neutrosophic soft rough set under uncertainty. Symmetry 2019, 11, 384. [Google Scholar] [CrossRef]
  35. Mondal, K.; Pramanik, S. Rough neutrosophic multi-attribute decision-making based on grey relational analysis. Neutrosophic Sets Syst. 2015, 7, 8–17. [Google Scholar]
  36. Yang, H.; Zhang, C.; Guo, Z.; Liu, Y.; Liao, X. A hybrid model of single valued neutrosophic sets and rough sets: Single valued neutrosophic rough set model. Soft Comput. 2017, 21, 6253–6267. [Google Scholar] [CrossRef]
  37. Wang, J.; Zhang, X. Two types of single valued neutrosophic covering rough sets and an application to decision making. Symmetry 2018, 10, 710. [Google Scholar] [CrossRef]
  38. Borzooei, R.A.; Farahani, H.; Moniri, M. Neutrosophic deductive filters on BL-algebras. J. Intell. Fuzzy Syst. 2014, 26, 2993–3004. [Google Scholar]
  39. Akram, M.; Ali, G.; Alshehri, N.O. A new multi-attribute decision-making method based on m-polar fuzzy soft rough sets. Symmetry 2017, 9, 271. [Google Scholar] [CrossRef]
  40. Zhan, J.; Ali, M.I.; Mehmood, N. On a novel uncertain soft set model: Z-soft fuzzy rough set model and corresponding decision making methods. Appl. Soft Comput. 2017, 56, 446–457. [Google Scholar] [CrossRef]
  41. Zhan, J.; Alcantud, J.C.R. A novel type of soft rough covering and its application to multicriteria group decision making. Artif. Intell. Rev. 2018, 4, 1–30. [Google Scholar] [CrossRef]
  42. Zhang, Z. An approach to decision making based on intuitionistic fuzzy rough sets over two universes. J. Oper. Res. Soc. 2013, 64, 1079–1089. [Google Scholar]
  43. Liu, P. The aggregation operators based on archimedean t-conorm and t-norm for single-valued neutrosophic numbers and their application to decision making. Int. J. Fuzzy Syst. 2016, 18, 849–863. [Google Scholar] [CrossRef]
  44. Ye, J. Multicriteria decision-making method using the correlation coefficient under single-valued neutrosophic environment. Int. J. Gen. Syst. 2013, 42, 386–394. [Google Scholar] [CrossRef]
  45. Pomykala, J.A. Approximation operations in approximation space. Bull. Pol. Acad. Sci. 1987, 35, 653–662. [Google Scholar]
  46. Bonikowski, Z.; Bryniarski, E.; Wybraniec-Skardowska, U. Extensions and intentions in the rough set theory. Inf. Sci. 1998, 107, 149–167. [Google Scholar] [CrossRef]
  47. Smarandache, F. Neutrosophic set—A generalization of the intuitionistic fuzzy set. J. Def. Resour. Manag. 2010, 1, 38–42. [Google Scholar]
  48. Bao, Y.; Yang, H. On single valued neutrosophic refined rough set model and its application. J. Intell. Fuzzy Syst. 2018, 33, 1235–1248. [Google Scholar] [CrossRef]
  49. Guo, Z.; Liu, Y.; Yang, H. A novel rough set model in generalized single valued neutrosophic approximation spaces and its application. Symmetry 2017, 9, 119. [Google Scholar] [CrossRef]
  50. Wu, X.; Zhang, X. The decomposition theorems of AG-neutrosophic extended triplet loops and strong AG-(l, l)-loops. Mathematics 2019, 7, 268. [Google Scholar] [CrossRef]
  51. Zhang, X.; Borzooei, R.A.; Jun, Y. Q-filters of quantum B-algebras and basic implication algebras. Symmetry 2018, 10, 573. [Google Scholar] [CrossRef]
  52. Zhang, X.; Mao, X.; Wu, Y.; Zhai, X. Neutrosophic filters in pseudo-BCI algebras. Int. J. Uncertain. Quantif. 2018, 8, 511–526. [Google Scholar] [CrossRef]
  53. Zhang, X.; Hu, Q.; Smarandache, F.; An, X. On neutrosophic triplet groups: basic properties, NT-subgroups, and some notes. Symmetry 2018, 10, 289. [Google Scholar] [CrossRef]
  54. Ma, Y.; Zhang, X.; Yang, X.; Zhou, X. Generalized neutrosophic extended triplet group. Symmetry 2019, 11, 327. [Google Scholar] [CrossRef]
  55. Zhang, X.; Wang, X.; Smarandache, F.; Jaíyéolá, T.G.; Lian, T. Singular neutrosophic extended triplet groups and generalized groups. Cognit. Syst. Res. 2019, 57, 32–40. [Google Scholar] [CrossRef]
Figure 1. G ( C 1 ) and G ( C 2 ) .
Figure 1. G ( C 1 ) and G ( C 2 ) .
Symmetry 11 01074 g001
Figure 2. G ( C 3 ) and G ( C 4 ) .
Figure 2. G ( C 3 ) and G ( C 4 ) .
Symmetry 11 01074 g002
Figure 3. G ( N ˜ x 1 β 2 ) and G ( N ˜ x 2 β 2 ) .
Figure 3. G ( N ˜ x 1 β 2 ) and G ( N ˜ x 2 β 2 ) .
Symmetry 11 01074 g003
Figure 4. G ( N ˜ x 3 β 2 ) and G ( N ˜ x 4 β 2 ) .
Figure 4. G ( N ˜ x 3 β 2 ) and G ( N ˜ x 4 β 2 ) .
Symmetry 11 01074 g004
Figure 5. G ( N ˜ x 5 β 2 ) and G ( A ) .
Figure 5. G ( N ˜ x 5 β 2 ) and G ( A ) .
Symmetry 11 01074 g005
Figure 6. G ( C ˜ 2 ( A ) ) and G ( C 2 ( A ) ) .
Figure 6. G ( C ˜ 2 ( A ) ) and G ( C 2 ( A ) ) .
Symmetry 11 01074 g006
Figure 7. The chat of different values of patient in utilizing different methods in Example 11.
Figure 7. The chat of different values of patient in utilizing different methods in Example 11.
Symmetry 11 01074 g007
Table 1. The tabular representation of C ^ in [37].
Table 1. The tabular representation of C ^ in [37].
U C 1 C 2 C 3 C 4
x 1 0.7 , 0.2 , 0.5 0.6 , 0.2 , 0.4 0.4 , 0.1 , 0.5 0.1 , 0.5 , 0.6
x 2 0.5 , 0.3 , 0.2 0.5 , 0.2 , 0.8 0.4 , 0.5 , 0.4 0.6 , 0.1 , 0.7
x 3 0.4 , 0.5 , 0.2 0.2 , 0.3 , 0.6 0.5 , 0.2 , 0.4 0.6 , 0.3 , 0.4
x 4 0.6 , 0.1 , 0.7 0.4 , 0.5 , 0.7 0.3 , 0.6 , 0.5 0.5 , 0.3 , 0.2
x 5 0.3 , 0.2 , 0.6 0.7 , 0.3 , 0.5 0.6 , 0.3 , 0.5 0.8 , 0.1 , 0.2
Table 2. The tabular representation of N ˜ x k β 2 ( k = 1 , 2 , 3 , 4 , 5 ).
Table 2. The tabular representation of N ˜ x k β 2 ( k = 1 , 2 , 3 , 4 , 5 ).
N ˜ x k β 2 x 1 x 2 x 3 x 4 x 5
N ˜ x 1 β 2 0.6 , 0.2 , 0.5 0.5 , 0.2 , 0.8 0.2 , 0.3 , 0.6 0.4 , 0.1 , 0.7 0.3 , 0.2 , 0.6
N ˜ x 2 β 2 0.1 , 0.2 , 0.6 0.5 , 0.1 , 0.8 0.2 , 0.3 , 0.6 0.4 , 0.1 , 0.7 0.3 , 0.1 , 0.6
N ˜ x 3 β 2 0.1 , 0.1 , 0.6 0.4 , 0.1 , 0.7 0.5 , 0.2 , 0.4 0.3 , 0.3 , 0.5 0.6 , 0.1 , 0.5
N ˜ x 4 β 2 0.1 , 0.2 , 0.6 0.5 , 0.1 , 0.7 0.4 , 0.3 , 0.4 0.5 , 0.1 , 0.7 0.3 , 0.1 , 0.6
N ˜ x 5 β 2 0.1 , 0.1 , 0.6 0.4 , 0.1 , 0.8 0.2 , 0.2 , 0.6 0.3 , 0.3 , 0.7 0.6 , 0.1 , 0.5
Table 3. The tabular representation of N ˜ x k β 2 ( k = 1 , 2 , 3 , 4 , 5 ).
Table 3. The tabular representation of N ˜ x k β 2 ( k = 1 , 2 , 3 , 4 , 5 ).
N ˜ x k β 2 x 1 x 2 x 3 x 4 x 5
N ˜ x 1 β 2 0.6 , 0.2 , 0.5 0.5 , 0.2 , 0.8 0.2 , 0.3 , 0.6 0.4 , 0.1 , 0.7 0.3 , 0.2 , 0.6
N ˜ x 2 β 2 0.6 , 0.2 , 0.5 0.5 , 0.2 , 0.8 0.2 , 0.3 , 0.6 0.4 , 0.1 , 0.7 0.3 , 0.2 , 0.6
N ˜ x 3 β 2 0.1 , 0.1 , 0.6 0.4 , 0.1 , 0.7 0.5 , 0.2 , 0.4 0.3 , 0.3 , 0.5 0.6 , 0.1 , 0.5
N ˜ x 4 β 2 0.1 , 0.5 , 0.6 0.6 , 0.1 , 0.7 0.6 , 0.3 , 0.4 0.5 , 0.3 , 0.2 0.8 , 0.1 , 0.2
N ˜ x 5 β 2 0.4 , 0.1 , 0.5 0.4 , 0.2 , 0.8 0.2 , 0.2 , 0.6 0.3 , 0.5 , 0.7 0.6 , 0.3 , 0.5
Table 4. The tabular representation of N ˜ x k β ( k = 1 , 2 , 3 , 4 , 5 ).
Table 4. The tabular representation of N ˜ x k β ( k = 1 , 2 , 3 , 4 , 5 ).
N ˜ x k β x 1 x 2 x 3 x 4 x 5
N ˜ x 1 β 0.6 , 0.2 , 0.5 0.5 , 0.3 , 0.8 0.2 , 0.5 , 0.6 0.4 , 0.5 , 0.7 0.3 , 0.3 , 0.6
N ˜ x 2 β 0.1 , 0.5 , 0.6 0.5 , 0.2 , 0.8 0.2 , 0.3 , 0.6 0.4 , 0.5 , 0.7 0.7 , 0.3 , 0.5
N ˜ x 3 β 0.4 , 0.1 , 0.5 0.4 , 0.5 , 0.4 0.5 , 0.2 , 0.4 0.3 , 0.6 , 0.5 0.6 , 0.3 , 0.5
N ˜ x 4 β 0.7 , 0.2 , 0.5 0.5 , 0.3 , 0.2 0.4 , 0.5 , 0.2 0.6 , 0.1 , 0.7 0.3 , 0.2 , 0.6
N ˜ x 5 β 0.1 , 0.5 , 0.6 0.6 , 0.1 , 0.7 0.6 , 0.3 , 0.4 0.5 , 0.3 , 0.2 0.8 , 0.1 , 0.2
Table 5. s ( x k ) ( k = 1 , 2 , , 5 ).
Table 5. s ( x k ) ( k = 1 , 2 , , 5 ).
U x 1 x 2 x 3 x 4 x 5
s ( x k ) 0.943 0.935 0.919 0.929 0.948
Table 6. The results utilizing the different methods of Example 11.
Table 6. The results utilizing the different methods of Example 11.
MethodsThe Final RankingThe Paper Is Most Sick With the Paper Defect B
Liu [43] x 4 < x 3 < x 2 < x 5 < x 1 x 1
Ye [44] x 4 < x 3 < x 2 < x 5 < x 1 x 1
Yang et al. [36] x 4 < x 3 < x 5 < x 2 < x 1 x 1
Wang et al. [37] x 4 < x 3 < x 2 < x 1 < x 5 x 5
This paper x 3 < x 4 < x 2 < x 1 < x 5 x 5

Share and Cite

MDPI and ACS Style

Wang, J.; Zhang, X. A New Type of Single Valued Neutrosophic Covering Rough Set Model. Symmetry 2019, 11, 1074. https://doi.org/10.3390/sym11091074

AMA Style

Wang J, Zhang X. A New Type of Single Valued Neutrosophic Covering Rough Set Model. Symmetry. 2019; 11(9):1074. https://doi.org/10.3390/sym11091074

Chicago/Turabian Style

Wang, Jingqian, and Xiaohong Zhang. 2019. "A New Type of Single Valued Neutrosophic Covering Rough Set Model" Symmetry 11, no. 9: 1074. https://doi.org/10.3390/sym11091074