Comparative Semantics of Fuzzy Argumentation under the Łukasiewicz t-Norm ()
1. Introduction
Argumentation has become more and more important as a hot topic in the field of artificial intelligence. A Dung’s AF [1] consists of a set of arguments and an attack relation between them. Given such a graph, its main task is to select arguments that can be accepted by rational agents, more precisely, those that can be accepted together. Such sets are called “extensions”. After more than twenty years, Dung’s AF theory has been applied in many fields, such as the law [2], decision making [3], nonmonotonic reasoning [4].
In order to meet the actual needs, various extensions have been proposed. For example, the support relation [5], joint attack [6] and recursive attack [7] are considered in Dung’s AFs. The arguments and attacks between them are generally partly believed due to the uncertainty in the process of mining them. It may be useful to quantify the uncertainty associated with each argument. In order to capture the uncertainty in AFs, fuzzy AFs came into being, such as [8] [9] [10] [11], in which arguments and attacks are associated with fuzzy degrees or trust degrees to indicate the trust degrees. Fuzzy argumentation system involves the theories of fuzzy sets [12], fuzzy logic [13], control and decision-making [14], etc.
The semantics of fuzzy AFs has been proposed in many works, such as [9] [10] [11]. In the semantic research of fuzzy AFs, the object of screening is usually not the set of arguments, but the fuzzy degree of each argument. Similar to Dung’s theory, in the process of building the semantics of fuzzy AFs, acceptability is the basis for constructing extension-based semantics. [9] introduced x-conflict-free sets, y-admissible sets, y-preferred extensions, and z-stable extensions. [10] proposed the concepts of sufficient attacks and weakening defense based on the Gödel t-norm, and established Gödel semantic system in the form of fuzzy argument sets on this basis. Among the many defense methods, comparative defense [11] is a novel and natural defense method. However, there are relatively few semantic studies based on this defensive style. This paper is an exploration of the semantics of this type. The basis of comparative defense is the strength of the attack (str) from a fuzzy argument to another fuzzy argument. For comparative semantics, conflict-freeness in the semantics requires the str to be 0. If the str of a weak attack is 0, then a nilpotent t-norm is needed to calculate the str. In this paper, we choose the most common nilpotent t-norm—the Łukasiewicz t-norm—to calculate the str, thereby obtaining a special kind of comparative semantics.
In this paper, we conduct an in-depth study on the comparative semantics under the Łukasiewicz t-norm, and discuss some numerical properties of the conflict-free sets, the admissible extensions, the complete extensions, and the stable extensions of the semantics in turn. This paper has two contributions: On the one hand, this work enriches the theory of comparative semantics of fuzzy AFs. On the other hand, this work makes the application of comparative semantics more convenient. For example, in applications, these numerical properties of this semantics can effectively promote the calculation and identification of the extensions, especially the identification of complete extensions in fuzzy AFs without cycles.
The contents will be arranged as follows. Section 2 recalls some necessary basic knowledge: the fuzzy set theory and the fuzzy AFs with comparing acceptability (FAFCA) theory. Section 3 introduces a system of extension-based comparative semantics under the Łukasiewicz t-norm. Section 4 compares our semantics with other semantics. Section 5 summarizes and remarks about the future work.
2. Basic Knowledge
This work characterizes the fuzzy AFs by fuzzy set theory. Hence, let’s recall some useful notions in fuzzy sets [12] and FAFCA theory [11].
2.1. Fuzzy Set Theory
In this paper, the truth values of arguments and attacks are drawn from the unit interval
, with the natural order
.
Let U be a universe set. For any
, its characteristic function
is a mapping from U to
, where
,
Given a universe set U, a fuzzy set is a pair
, where S is a function
. In general,
is short for S.
If the universe of a fuzzy set S is finite, S is commonly represented in the form
.
For any set
, we call S a crisp set.
is the fuzzy form of the set S.
A fuzzy set
is included in another fuzzy set
, denoted by
, if
,
.
A fuzzy set S, whose support is a single element
, is called a fuzzy point and denoted by
.
In fuzzy AFs, an argument together with its fuzzy degree is a pair
. For convenience, we call the pair
a fuzzy argument.
Additionally, if
is the set of all the arguments, a function
, assigning each argument a fuzzy degree, is called a fuzzy set of arguments.
The next two t-norms will be used in this paper.
• The Gödel t-norm:
,
.
• The Łukasiewicz t-norm:
,
.
2.2. FAFCA Theory
This subsection briefly reviews the FAFCA theory [11]. Give a finite argument set
, and the form of the fuzzy AF based on this set is defined as follows:
Definition 1 Given a set of arguments
, a fuzzy AF is a tuple
, where
assigns each argument in
a fuzzy degree, and
assigns a fuzzy degree to each attack over
.
represents the fuzzy degree of the attack between arguments A and B. It is written as
or
for convenience below.
Definition 2 In a fuzzy AF
, for fuzzy arguments
and
, the value
is called the strength of the attack from
to
, denoted by
.
Definition 3 In a fuzzy AF
, given two fuzzy arguments
and
, if
, then we say
tolerably attacks
; otherwise, we say
sufficiently attacks
.
Definition 4 Conflict-freeness: Let
be a fuzzy AF. A fuzzy set
is conflict-free if there are no sufficient attacks between the fuzzy arguments in
.
Acceptability: Let
be a fuzzy set of arguments and
be a fuzzy argument. A is acceptable w.r.t. (or defended by)
, if
,
, s.t.
.
Admissibility: A conflict-free set
is admissible if it defends every fuzzy element in it.
Complete extension: An admissible extension
is a complete extension, if every fuzzy element it defends is in
.
Preferred extension: A preferred extension is a maximal (w.r.t. set inclusion) admissible set.
Grounded extension: The grounded extension is the least complete extension.
Stable extension: A stable extension
is a conflict-free extension, which sufficiently attacks every fuzzy arguments in
, i.e.,
,
sufficiently attacks
.
3. Comparative Semantics of Fuzzy Argumentation under the Łukasiewicz t-Norm
In this section, we introduce comparative semantics of fuzzy argumentation under the Łukasiewicz t-norm. We use the Łukasiewicz t-norm to ignore some weak attacks between the fuzzy arguments. Use the Łukasiewicz t-norm to calculate the str, the calculation formula can be simplified. The reason for choosing the Łukasiewicz t-norm is that the conflict-freeness in comparative semantics requires that the str between fuzzy arguments is 0. Hence, if a rational agent wants to ignore some weak attacks in applications, a nilpotent t-norm can be selected such as the Łukasiewicz t-norm. Otherwise, if any minor attacks should not be ignored, a rational agent can choose other t-norms, such as a Gödel t-norm, a product t-norm, etc. Also, as the most famous nilpotent t-norm, the Łukasiewicz case of fuzzy AF has some special properties. And they will be discussed in this section. First, we redefine the str using the Łukasiewicz t-norm.
Definition 5 Given a fuzzy AF
.
is the attack strength (str) from
to
.
Particularly, we denote the str from a fuzzy set
to a fuzzy argument
as
3.1. Conflict-Freeness
Theorem 1
is conflict-free, if
,
.
Proof.
is conflict-free, if
,
,
which is equivalent to
.
Corollary 1 In a fuzzy AF
, suppose all the attacks are crisp, i.e. their values are either 0 or 1.
is conflict-free, if
,
.
3.2. Acceptability
Theorem 2
defends
, if
, which sufficiently attacks
,
, s.t.
Proof. Since
defends
, we have
,
, s.t.
,
i.e.
If
sufficiently attacks
, i.e.
, then we have
Hence,
i.e.
3.3. Admissibility
Theorem 3 In a fuzzy AF
, a conflict-free set
is admissible, if
,
, s.t.
Proof. (
) Since
is conflict-free,
is admissible. Suppose
, B attacks A, then
,
Hence,
(
) Obvious!
Corollary 2 Given a fuzzy set
in a fuzzy AF
, where
is crisp. Then
is admissible, if
,
, s.t.
3.4. Complete Extension
In a fuzzy AF
, for any
,
is defined as:
The following lemma is obvious.
Lemma 1 In a fuzzy AF
,
is a complete extension,
, if
, then
.
As shown in the following figure, argument
is sufficiently attacked, and there is no argument to defend it, obviously
.

Lemma 2 In a fuzzy AF
,
is a complete extension.
,
, if
,
, then
Proof. Obviously,
is not sufficiently attacked by any fuzzy arguments. It is only necessary to show
(
) is sufficiently attacked by some fuzzy argument
.
Suppose
,
i.e.
, which equals
.
Then
, s.t.
,
i.e.
, then
is sufficiently attacked by
.
Lemma 3 Given a complete extension
,
,
,
, and
, then
.
Proof. Let’s calculate the value
from the values of
and
.
From the definition of defense (or acceptability), we know the fuzzy set
can defend
, if and only if for
sufficiently attacks
,
, s.t.
Thus,
For
, we have
. Therefore, we get
i.e.
.
As a result, we have
Together with
, we have
Combining the above three lemmas together, we have the following proposition.
Theorem 4 Given a complete extension
, for every
, the value
is the minimum of the values calculated by Lemmas 1, 2 and 3.
This Theorem 4 can be applied to check whether a fuzzy set is complete. It also can be applied to calculate the complete extensions in fuzzy AFs without sufficient attack cycles.
3.5. Stable Extension
Theorem 5. In a fuzzy AF
,
is a stable extension, if
,
, and either
, or
, s.t.
Proof. (
) Suppose
is a stable extension. We only need to show the existence of C.
Otherwise,
,
, denote
.
Then
.
is finite. And
will not be sufficiently attacked by
, because
,
Contradiction.
(
) The first condition confirms
is conflict-free, while the second equation assures that
, if
, then
is sufficiently attacked by
, and thus it is sufficiently attacked by
. Ends.
For the preferred and grounded semantics, their digital properties are very complex. We will show them in future work.
4. Comparison with Other Work
The new semantics is consistent with Dung’s semantics in crisp AFs, which has been proven in [11]. In the next subsections, we will compare the comparative semantics under the Łukasiewicz t-norm (CSL) with some related work, including Wu’s Gödel semantics (WGS) [10] and Janssen’s semantics (JS) [9].
4.1. Comparability to Wu’s Gödel Semantics (WGS)
Definition 6 (Definition 3 in [10] ) In a fuzzy AF
, given two fuzzy arguments
and
, as well as
, if
. (1)
then the attack is tolerable, otherwise, it is a sufficient attack.
Definition 7 [Definition 5 and 8 in [10] ]
A fuzzy set of arguments
is conflict-free if all attacks between the fuzzy arguments in
are tolerable.
A conflict-free set of fuzzy arguments
is admissible, if
weakening defends each element in
.
We have the following results:
Theorem 6 In a fuzzy AF
.
is conflict-free in WGS, then
is conflict-free in CSL, but not vice versa.
Proof. By Formula (1),
,
(2)
Obviously, Formula (1)
Formula (2), but not vice versa.
Example 1 Consider a simple fuzzy AF in the next graph.

Here,
is a conflict-free set in CSL, but a conflict set in WGS.
then
is conflict-free in CSL. But
,
then
is conflict in WGS.
The following example shows the two kinds of acceptability are also of difference.
Example 2 In the following graph,
can defend
in WGS, but
can defend
in CSL.

Proof. Since
,
weakening defends
in WGS. And because
so
can defend
in CSL.
4.2. Comparability to Janssen’s Semantics (JS)
A Janssen’s AF can be defined by associating an element of
with each attack in a Dung’s AF.
Definition 8 [Definition 3 in [9] ] A Janssen’s AF is a tuple
, where
is a crisp set of arguments and
is a fuzzy relation over
.
Definition 9 [Definition 4 in [9] ] Let
be a Janssen’s AF,
.
A fuzzy set
over
is x-conflict-free,
.
A fuzzy set
over
is y-admissible, if it defends itself well enough against all attacks, i.e.,
Theorem 7 (Theorem 5 in [15] )
A fuzzy set
in
is X-conflict-free, if
, one of
,
or
is no more than
.
Corollary 3 [Corollary 4 in [15] ]
A fuzzy set
in
is 1-admissible , if
,
, s.t.
(3)
Example 3 Consider the example in the next graph.

Obviously,
is not 1-conflict-free. But
is conflict-free.
We have the following conclusions:
Theorem 8 Let
be a fuzzy AF, if
is 1-conflict-free in JS, then
is conflict-free in CSL.
Proof. The fuzzy set
is 1-conflict-free in JS, if
,
in this case, A and B are obviously conflict-free in CSL. But not vice versa, as in Example 3.
Theorem 9 Let
be a fuzzy AF, if
is 1-conflict-free and 1-admissible in JS, then
is admissible in CSL.
Proof. According to the definition of our admissibility,
attacks
,
attacks
, s.t.
i.e.,
(4)
Obviously, Formula (3)
Formula (4), but not vice versa.
Wu’s Gödel semantics [10] and Janssen’s semantics [9] can be regarded as special cases of comparative semantics under the Łukasiewicz t-norm.
5. Conclusions
Fuzzy AFs enrich the arguments and/or attacks with fuzzy degrees, capturing the uncertainty issued from the partly trusted information in case of incompleteness, ambiguity, vagueness, etc. This paper is a further study of comparative semantics of fuzzy AFs under the Łukasiewicz t-norm. First, we use the Łukasiewicz t-norm to calculate the str between fuzzy arguments. Then, the numerical properties of the conflict-free sets, the admissible extensions, the complete extensions, and the stable extensions are discussed respectively. Finally, we compare some related works. When it comes to clear arguments and clear attacks, the comparative semantics under the Łukasiewicz t-norm is consistent with Dung’s semantics. Moreover, when fuzzy sets are involved, Wu’s Gödel semantics and Janssen’s semantics can be regarded as special cases of this semantics under the Łukasiewicz t-norm.
The research results of this paper theoretically enrich and develop the comparative semantics of fuzzy AFs. In practical application, various extensions can be quickly and effectively judged. For example, Theorem 1 can quickly check whether a fuzzy argument set is a conflict-free set; Theorem 4 can be used to check whether a fuzzy set is a complete extension or not, and can also be used to calculate complete extensions in fuzzy AFs without sufficient attack cycles.
This paper does not study the algorithms of the grounded extension and the preferred extension, which is our future work. In addition, the results of this paper will greatly reduce the effect of semantic calculation of fuzzy AFs with cycles, which needs to be further improved in the future.