Bounds on the Value of Fuzzy Solution to Fuzzy Programming Problem

The paper is concerned with finding the refined bounds on the value of fuzzy solution to fuzzy programming prob- lem. In this paper we first present the definitions which are the sum of pairs expected value (SPEV), the expected value of the reference scenario (EVRS)and the expectation of pairs expected value (EPEV), and obtain the value of fuzzy solution (VFS) defined by difference between the re- course problem solution and the expected value of reference solution. In addition, several numerical examples are also given in order to explain the definitions specifically. Finally, the properties concerning the concepts are studied, which result in refined bounds on the value of fuzzy solution.

[1]  Claus-Peter Schnorr,et al.  Efficient signature generation by smart cards , 2004, Journal of Cryptology.

[2]  Moni Naor,et al.  Zaps and their applications , 2000, Proceedings 41st Annual Symposium on Foundations of Computer Science.

[3]  Oded Goldreich,et al.  Foundations of Cryptography: List of Figures , 2001 .

[4]  Ivan Damgård,et al.  Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols , 1994, CRYPTO.

[5]  Oded Goldreich Foundations of Cryptography: Index , 2001 .

[6]  Baoding Liu,et al.  Toward Fuzzy Optimization without Mathematical Ambiguity , 2002, Fuzzy Optim. Decis. Mak..

[7]  Etienne Kerre,et al.  Possibility theory: an integral theoretic approach , 1992 .

[8]  Baoding Liu,et al.  A survey of credibility theory , 2006, Fuzzy Optim. Decis. Mak..

[9]  Salil P. Vadhan,et al.  Derandomization in Cryptography , 2003, SIAM J. Comput..

[10]  Melissa Chase,et al.  On Signatures of Knowledge , 2006, CRYPTO.

[11]  Peter Kall,et al.  Stochastic Linear Programming , 1975 .

[12]  Amit Sahai,et al.  Honest-verifier statistical zero-knowledge equals general statistical zero-knowledge , 1998, STOC '98.

[13]  Yankui Liu,et al.  Fuzzy two-stage mathematical programming problems , 2003, Proceedings of the 2003 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.03EX693).

[14]  Adi Shamir,et al.  Witness indistinguishable and witness hiding protocols , 1990, STOC '90.

[15]  Baoding Liu Uncertainty Theory: An Introduction to its Axiomatic Foundations , 2004 .

[16]  Peter Kall,et al.  Stochastic Programming , 1995 .

[17]  Salil P. Vadhan An Unconditional Study of Computational Zero Knowledge , 2004, FOCS.