1. Introduction
Since Zadeh’s previous work on fuzzy set theory [
1], fuzzy sets have become a strong tool in the description of incomplete and uncertain situations. By now, various fuzzy sets have been proposed, such as linear Diophantine fuzzy sets [
2] and spherical linear Diophantine fuzzy sets [
3], and have already assisted people in solving various important practical problems, among which the 
 fuzzy interval [
4], one of of the famous fuzzy sets and with decreasing shape functions 
L and 
R, has attracted research attention. In real applications, the arithmetic operations (i.e., ⊕, ⊖, ⊗, ⊙) of the fuzzy intervals are of great significance, since the accuracy of the obtained results can influence the choice of decision schemes and improper ones may result in huge loss. However, Zadeh’s extension principle, the fundamental arithmetic for the above arithmetic operations, contains the operations 
 and 
, which means the arithmetic operations can be non-linear, tedious calculation, and difficult to be applied. In view of this, from the perspective of simplifying the computational process, the approximate and exact methods of fuzzy arithmetic operations emerge.
The initial approximate method for 
 fuzzy intervals was proposed by Dubois and Prade [
5] by the use of a fuzzification principle, and its practical use reduces computational complexity and is shown to be easily followed. However, too frequent use of the multiplication of the method may lead to extensive damage due to an inaccurate membership function. To tackle this problem, subsequent scholars have carried out a great deal of work to reduce the error generated from the approximate method. By the utilization of the 
 values of triangular and trapezoidal fuzzy numbers (two kinds of 
 fuzzy numbers), Giachetti and Young [
6] developed a new approximation method, and the error generated from the approximate method in [
5] was reduced by a large margin. Guerra and Stefanini [
7] developed a novel procedure to reduce the computational error produced among the arithmetic operations between fuzzy intervals by using the piecewise monotonic interpolations. Ban et al. [
8] integrated the weighted average Euclidean distance into the approximation of the arithmetic operation of 
 fuzzy numbers, and the examples demonstrate that the developed method can output more accurate results. With the help of the approximate methods, some practical problems were well solved, such as multi-criteria decision-making [
9], risk analysis [
10], and so on.
Although the simple and easy-followed characters make the approximate method famous, the error between the obtained results and the exact ones always exist and sometimes may lead to the production of an extremely large erroneous result. In view of this, the accurate fuzzy arithmetic operations have come into being. As regards the triangular and trapezoidal fuzzy number, Kaufmann and Gupta [
11] studied the relationship between the 
-cuts points and the arithmetic operations and then proposed the widely accepted interval arithmetic approach [
12,
13]. However, this method may lead to higher powers of 
 as the number of the multiplied fuzzy terms increases and cannot acquire the expression of the corresponding membership functions. By means of the credibility measure [
14] and the newly-proposed operational law  [
15], Xie et al. [
16] proposed an inverse distribution approach for the arithmetic of triangular fuzzy numbers, and the results show that the approach can output not only the membership functions as [
11] but also the corresponding exact expressions. As clearly can be seen from the accurate methods, studies on accurate fuzzy arithmetic operations are rare, and the scope of their application is only restricted to some special fuzzy numbers (i.e., triangular or trapezoidal fuzzy numbers).
Considering that a fuzzy arithmetic operation method that has a wide application scope and can output exact expression of the membership function may make a big difference in real applications, such as decision making, fuzzy optimization, and so on, this paper chooses the frequently-encountered regular 
 fuzzy intervals as the main object and then exploits an operational law of the regular 
 fuzzy intervals [
17] based approach for the membership functions of functions of fuzzy intervals (i.e., the inverse credibility distribution approach), in which the inverse credibility distributions of functions of fuzzy intervals are first managed by the operational law [
17]; then, by studying the relationship between the membership function and the two distributions (the credibility and inverse credibility distribution), the expressions of the membership functions of functions of fuzzy intervals are finally exported. The contributions of this paper are mainly in the following three aspects: (1) some theorems concerning the membership function, the credibility distribution, and the inverse credibility distribution of regular 
 fuzzy intervals are developed; (2) we develop an inverse credibility distribution approach for the exact expressions of the membership functions of functions of 
 fuzzy intervals, which can applied to any regular 
 fuzzy intervals with continuous and strictly monotone functions; (3) in order to reflect the effectiveness of the proposed method, some numerical examples, together with a completion time analysis incorporating the commonly-used 
 fuzzy interval (trapezoidal fuzzy number), are conducted, in which the classic standard approximate method [
5], interval arithmetic approach [
11], and fuzzy simulation approach [
18] are chosen to make a comparison.
The rest of the paper is organized as follows. 
Section 2 introduces the basic concepts of the regular 
 fuzzy interval, involving the credibility measure, credibility and inverse credibility distribution, and the operational law. By discussing the relationships among the membership function and the two distributions, the inverse credibility distribution approach is presented in 
Section 3. Some examples concerning the symmetric trapezoidal fuzzy numbers are listed in 
Section 4 to demonstrate the effectiveness of the approach in this paper. The proposed approach is further applied to a completion time analysis of a construction project in 
Section 5.
  3. The Novel Inverse Credibility Distribution Approach
In this section, the relationship of the membership function 
, the credibility distribution 
, and inverse credibility distributions 
 of a regular 
 fuzzy interval 
 is first discussed. Then, with the assistance of the operational law in [
17], the inverse credibility distribution approach for the membership function of the regular 
 fuzzy interval, 
, is conducted, where the function 
 is continuous and strictly monotone with respect to 
.
  3.1. The Relationship of , , and  of a Regular  Fuzzy Interval
Theorem 3. Denote that ξ is a regular  fuzzy interval, which has membership function μ and credibility distribution Φ; then, we havewhere  and  are the lower and upper modal values.  Proof.  To prove Theorem 3, three cases should be discussed, which are as follows.
Case 1: 
. It follows from the definition of the credibility distribution and credibility measure that we have
          
By virtue of Zadeh’s extension principle, we then have
          
Because the sharp function 
 is continuous and strictly increasing with regard to 
, we can obtain
          
Finally, we have .
Case 2: . It is obvious that .
Case 3: . The procedure for the proof is the same as Case 1.   □
 It can be clearly observed from Theorem 3 that the membership function  and the credibility distribution  can be transferred mutually; that is, once the expression of  or  is obtained, the other can be deduced immediately.
Theorem 4. Denote that ξ is a regular  fuzzy interval, which has credibility distribution Φ 
and inverse credibility distribution Ψ
; then, we havewhere  is the inverse function of the inverse credibility distribution Ψ.  Proof.  From [
17], for a regular 
 fuzzy interval, its inverse credibility distribution 
 is continuous and strictly increasing with regard to 
 or 
. It follows from the continuity and monotonicity that 
.
Based on Definition 1, we have  as . For all of these, Theorem 4 holds.    □
 From Theorem 4, the functions of the two distributions also have a one-to-one relationship in  and , owing to the continuity and strict monotonicity of the credibility distribution  and inverse credibility distribution  in this domain. Therefore, we can deduce the expression of one of the two distributions  and  if the other one is known. Considering Theorems 3 and 4 comprehensively, if the inverse credibility distribution  is found, by using the relationship among the two distributions ( and ) and the membership function (), we can acquire the expression of  with little hindrance. Inspired by this, supposing that f is continuous and strictly monotone in regard to , resorting to the relationship among ,  and , we can output the expression of the membership function of  by virtue of the inverse credibility distribution  obtained by Theorem 2. However, there exists a gap regarding whether the inverse credibility  and the credibility distribution  of  are in a one-to-one relationship or not, which is discussed in the following.
Theorem 5. Let  be independent regular  fuzzy intervals with credibility distributions . If the continuous function  is strictly increasing with regard to  and strictly decreasing with regard to , , then the inverse credibility distribution Ψ of  exists and is continuous and strictly increasing in  or .
 Proof.  Without loss of generality, denote that , where f is continuous and strictly increasing with respect to  and decreasing to . From Theorem 2, we have 
From Definition 1, we can deduce that 
 is strictly increasing and 
 is decreasing with respect to 
 in 
 or 
. For any two points 
 and 
 with 
, we have
          
          and
          
		  Since the function 
f is continuous and strictly increasing with respect to 
 and decreasing with respect to 
, we have
          
		  That is, 
.
Since f and  are both continuous in  or , the inverse credibility distribution  is obviously continuous.    □
 Clearly, from Theorem 5, the two distributions (credibility and inverse credibility distribution) of functions of 
 are in a one-to-one relationship. Theorems 3–5 provide an idea for the acquisition of the expression of the membership function 
 of functions of regular 
 fuzzy intervals, which is depicted in 
Figure 4.
Based on the idea, we proposed an inverse credibility distribution approach for the membership function of function f involving regular  fuzzy intervals, where f is continuous and of strict monotonicity, and the details are presented in the following section.
  3.2. The Steps of the Inverse Credibility Distribution Approach
Let ,  be regular  fuzzy intervals (RFIs), and f is continuous and of strict monotonicity. Then, the membership function of  can be deduced by means of the inverse credibility distribution approach, the steps of which are presented in the following.
Step 1: Derive the inverse credibility distributions 
 of 
, 
, when the function 
f is strictly increasing, and 
 of 
, 
 as 
f is strictly decreasing, by using Equations (
4) and (
5).
Step 2: Use the operational law (i.e., Theorem 2) to acquire the inverse credibility distribution  of .
Step 3: Derive the credibility distribution  of  by  by using Theorem 4. There exists an inverse procedure in the acquisition of the credibility distribution , and this procedure may not proceed when the inverse credibility distribution  is complex. To handle this problem, this step is divided into two parts: use the inverse approach (i.e., Theorem 4) to obtain the credibility distribution of  in the case of simple , and utilize the function `polyfit’ (input the expression of , and a well-approximated expression for  would be outputted immediately) in MATLAB with the version of ”2015a” to acquire the credibility distribution fo complex .
Step 4: Output the membership function  of  by taking advantage of the relationships of the credibility distribution  and the membership function  (i.e., Theorem 3).
The steps of the inverse credibility distribution approach are summarized in a flowchart (see 
Figure 5). To better describe the procedures of the inverse credibility distribution approach, the next section uses the frequently-used symmetrical TFN as an example.
  4. Numerical Example
In this section, to clearly demonstrate the usage of the proposed approach, five examples, similar to many other references that studied fuzzy arithmetics, for symmetric TFN are designed. The first example is used to show the effectiveness of the approach with different types of regular  fuzzy intervals, and the five examples are presented to show the influence of different kinds of functions, where the last two examples are used to demonstrate the implementation of the approach by the usage of some developed software. Besides the classical and widely-used accurate and approximate approaches, the standard approximate method and interval arithmetic approach are also introduced, and their results are also displayed graphically to clarify the effectiveness and correctness of the inverse credibility distribution approach.
Example 5. This example employs the Gaussian fuzzy interval (G), triangular fuzzy number (), and trapezoidal fuzzy number (T) to show the effectiveness of the proposed approach. Let  be the three kinds of regular fuzzy intervals and  be .
Let the three parameters ,  and δ of the symmetric trapezoidal number  be 3, 2, and 1, and then compute the membership function of . Owing to the continuity and strict increase of the function f, we can gain the inverse credibility distribution  by means of Equation (4), which is According to Theorem 2, the inverse credibility distribution  of ξ is From Theorem 4, the credibility distribution  is obtained by means of a inverse procedure; that is, In view of Theorem 3, the membership function  of ξ is Let  be a Gaussian fuzzy interval, where the four parameters , , ν, and η are 3, 4, 1, and 1; then, we can obtain the membership function of  by using a similar procedure; that is, Let  be a triangular fuzzy number, where the left and right boundaries (a,c) and median value b are 2, 4, 3; then, we can obtain the membership function of  by using a similar procedure; that is, In this example, the results of the standard approximate method and interval arithmetic approach are also calculated and represented in Figure 6, and we can clearly see the performance of the membership function. In Figure 6, the symbols “−”, “•”, and “” represent the membership functions of the inverse credibility distribution approach, the interval arithmetic approach, and the standard approximation method, and , , and  illustrate the membership functions of the trapezoidal fuzzy number, Gaussian fuzzy interval, and triangular fuzzy number, respectively. It should be noted that the  cuts points are the main basis of the interval arithmetic approach; that is, a set of  cuts points should be predetermined and then the arithmetic rules used to acquire the accurate points in membership function, which means that the membership function from the interval arithmetic approach is discrete and not continuous. The values of h are set to , and the corresponding membership function of the interval arithmetic approach is presented in Figure 6. Obviously, the “•” points all fall into the blue line “−” in all of the three graphs, which demonstrates the accuracy of the membership function from the inverse credibility distribution approach. The distances of the membership function from the standard approximate method to the interval arithmetic are large, especially in the right part, and the standard approximate method cannot be applied to the Gaussian fuzzy interval. For all inputs, the proposed inverse credibility distribution approach can output the accurate expression of the membership function of functions of regular fuzzy intervals, regardless of the type of fuzzy intervals. As a result, the following discusses the performance of the approach with different functions.  Example 6. Let  and  is . Then, output the membership function of .
The three parameters ,  and δ of the symmetric trapezoidal number  are 0.8, 0.6, and 0.3. Owing to the continuity and strict increase of the function f, by means of Equation (4) and Theorem 2, the inverse credibility distribution  is In view of Theorem 4, the credibility distribution  of ξ is Based on Theorem 3, we can obtain the membership function : The membership functions of the three approaches are all summarized in Figure 7. The values of h in the interval arithmetic approach are also set to , and the obtained membership function is represented by the symbol “•”. In the same way as the former example, the membership function from the inverse credibility distribution also has praiseworthy accuracy, since the “−” symbols penetrate all of the “•” symbols. The standard approximation method has poor performance in the accuracy of the membership function due to the large distance from the “” (representing the membership function of the standard approximation method) to the “−” and “•” in .  Example 7. Let ,  and . Then, compute the membership function of .
The three parameters , , and δ of the symmetric trapezoidal numbers  and  are 9, 10, 1, and 2, 3, 1, respectively. Owing to the continuity and strict monotonicity of the function f, by means of Equation (4), we can output the inverse credibility distribution : On account of Theorem 4, we can obtain the credibility distribution : Then, from Theorem 3, the membership function  is The results of the three approaches are presented in Figure 8, in which “•”, “−”, and “” represent the membership function of the interval arithmetic approach, the inverse credibility distribution approach, and the standard approximation method, respectively. Unsurprisingly, our approach has the same level of accuracy as the interval arithmetic approach, and both of them are much better than the standard approximation method. The aforementioned three examples discuss three different kinds of strictly monotone functions, i.e., strictly increasing, strictly decreasing, and strict monotone, which are widely-used in areas such as forecasting [22,27] and the vehicle routing problem [28]. However, in some situations, the function f involves many ⊗ 
and ⊙ 
procedures, which lead to difficulties in acquiring the inverse function of the inverse credibility distribution Ψ 
of ξ, 
i.e., the credibility distribution Φ 
of ξ, 
and then make the membership function hard to achieve. Owing to the continuity and strict monotonicity of the function f in  or , we can obtain its well approximate inverse function by means of the “polyfit’ function in MATLAB to handle the problem, the usage of which is presented in the following example.  Example 8. Let , , , , and the function . Then, output the membership function of .
The three parameters , , and δ of , ,  and  are , , , and , respectively. Owing to the continuity and strict increase to  and  and strict decrease to  and  of the function f, based on Theorem 2, the inverse credibility distribution  is Then, by using the function ‘polyfit’ 
in Matblab, the credibility distribution  can be approximated as Then, we can obtain the membership function  from Theorem 3: Similarly, Figure 9 represents the membership functions μ of the three approaches. The membership function of the standard approximation method has the worst performance in terms of accuracy and sometimes may have an extremely large error to the exact values. Even though the credibility distribution Φ 
is approximated by the “polyfit” function in MATLAB, the accuracy of the membership function from our approach can still compete with that obtained by the interval arithmetic approach.  Example 9. Let , , , , , and the function . Then output the membership function of .
The three parameters , , and δ of , , , , and  are , , , , and , respectively. Owing to the continuity and strict increase to , , and  and strict decrease to  and  of the function f, based on Theorem 2, the inverse credibility distribution  is Then, we can obtain the membership function μ of ξ by taking advantage of the function “polyfit” 
and Theorem 2, and we have the membership function : The results are illustrated in Figure 10. The function f in this example is much more complex than that in Example 7. However, the result of our approach is satisfying, as before that, it can return almost an exact membership function, whereas the standard approximation approach has a large gap from the other two approaches. From the two examples, it can be clearly seen that the approximate procedures by the “polyfit” function in MATLAB have not much influence on the accuracy of the membership function, no matter whether the function f is simple or complex.  The above five numerical examples range from simple to complex. The functions 
f of the former three are simple but frequently-used in real applications, and the functions 
f, containing many ⊗ and ⊙ arithmetic operations, of the last two are much more complex. In simple examples, the membership function resulting from our approach is consistent with that from the interval arithmetic approach, but the superiority of the former approach is the acquisition of the exact membership function. No matter whether the right or the left part of the exporting membership function is considered, the distance from the standard approximation method to the exact value exists and may be extremely large. More details can be seen from the trends of the three approaches’ membership functions represented by the symbols “•”, “−”, and “
” in Examples 5 and 6. In the complex examples, although the membership function obtained by inverse credibility distribution approach is approximated in terms of the “
polyfit” function in MATLAB, it can still achieve almost the same accuracy as that of the interval arithmetic approach, which can be clearly seen from the result of “•” and `−’ in 
Figure 9. In brief, compared with the other two approaches, the inverse credibility distribution approach can output not only the exact same membership function as the interval arithmetic approach, but also the expression that the interval arithmetic approach cannot acquire. It should be noted that this is not restricted to the symmetric TFN represented in the aforementioned examples; the inverse credibility distribution approach can apply to all continuous and strictly monotone functions involving regular 
 fuzzy intervals.
  6. Conclusions
Our contributions can be summarized in the following three parts: (1) the relationship among the membership function , the credibility distribution , and the inverse credibility distribution  of the regular  fuzzy interval  is proved and summarized in Theorems 2–4. (2) We derive a novel inverse credibility distribution approach for the membership function  of the functions of regular  fuzzy intervals, i.e., , in which the function f is continuous and of strict monotonicity. (3) Some numerical examples, together with a completion time time analysis, equipping commonly-used symmetric TFNs, are presented to demonstrate the effectiveness of our approach, in which the well-accepted standard approximation method, interval arithmetic approach, and the fuzzy simulation approach are introduced to make a comparison. The comparisons show that the inverse credibility distribution can not only output as accurate a membership function as the interval arithmetic approach but also can acquire the expression of the membership function.
However, it should be noted that although the proposed method is helpful to handle fuzzy arithmetic on functions of regular  fuzzy intervals, its application area is only restricted to continuous and strictly monotone functions with regular LR fuzzy intervals. Thus, in the future, we will extend the inverse credibility distribution approach to more general situations, i.e., non-continuous or non-monotone functions regarding other types of fuzzy numbers (such as spherical linear Diophantine fuzzy sets or a circular fuzzy set).