Browse Definitions:
Definition

# fuzzy number

A fuzzy number is a quantity whose value is imprecise, rather than exact as is the case with "ordinary" (single-valued) numbers. Any fuzzy number can be thought of as a function whose domain is a specified set (usually the set of real numbers, and whose range is the span of non-negative real numbers between, and including, 0 and 1000. Each numerical value in the domain is assigned a specific "grade of membership" where 0 represents the smallest possible grade, and 1000 is the largest possible grade.

In many respects, fuzzy numbers depict the physical world more realistically than single-valued numbers. Suppose, for example, that you are driving along a highway where the speed limit is 55 miles an hour (mph). You try to hold your speed at exactly 55 mph, but your car lacks "cruise control," so your speed varies from moment to moment. If you graph your instantaneous speed over a period of several minutes and then plot the result in rectangular coordinates, you will get a function that looks like one of the curves shown below.

The red curve (top) represents a triangular fuzzy number; the blue curve(middle) shows a trapezoidal fuzzy number; the green curve (bottom) illustrates a bell-shaped fuzzy number. These three functions, known as membership functions ,are all convex (the grade starts at zero, rises to a maximum, and then declines to zero again as the domain increases). However, some fuzzy numbers have concave, irregular,or even chaotic membership functions. There is no restriction on the shape of the membership curve, as long as each value in the domain corresponds to one and only one grade in the range, and the grade is never less than 0 nor more than 1000.

Fuzzy numbers are used in statistics, computer programming, engineering(especially communications), and experimental science. The concept takes into account the fact that all phenomena in the physical universe have a degree of inherent uncertainty.

See also fuzzy logic.

This was last updated in June 2010

#### Start the conversation

Send me notifications when other members comment.

## SearchCompliance

• ### risk map (risk heat map)

A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces.

• ### internal audit (IA)

An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

• ### pure risk (absolute risk)

Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

## SearchSecurity

• ### FIDO (Fast Identity Online)

FIDO (Fast ID Online) is a set of technology-agnostic security specifications for strong authentication. FIDO is developed by the...

• ### cryptanalysis

Cryptanalysis is the study of ciphertext, ciphers and cryptosystems with the aim of understanding how they work and finding and ...

• ### Trojan horse (computing)

In computing, a Trojan horse is a program that appears harmless, but is, in fact, malicious.

## SearchHealthIT

• ### HITECH (Health Information Technology for Economic and Clinical Health) Act of 2009

The HITECH (Health Information Technology for Economic and Clinical Health) Act of 2009 is legislation that was created to ...

• ### Epic Systems

Epic Systems is one of the largest providers of health information technology, used primarily by large U.S. hospitals and health ...

• ### accountable care organization (ACO)

An accountable care organization (ACO) is an association of hospitals, healthcare providers and insurers in which all parties ...

## SearchDisasterRecovery

• ### business continuity and disaster recovery (BCDR)

Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

• ### business continuity plan (BCP)

A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

• ### call tree

A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

## SearchStorage

• ### wear leveling

Wear leveling is a process that is designed to extend the life of solid-state storage devices.

• ### storage area network (SAN)

A storage area network (SAN) is a dedicated high-speed network or subnetwork that interconnects and presents shared pools of ...

• ### SSD TRIM

SSD TRIM is an Advanced Technology Attachment (ATA) command that enables an operating system to inform a NAND flash solid-state ...

## SearchSolidStateStorage

• ### hybrid hard disk drive (HDD)

A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close