Loading [MathJax]/jax/output/SVG/jax.js
Research article

Cyber security control selection based decision support algorithm under single valued neutrosophic hesitant fuzzy Einstein aggregation information

  • Correction on: AIMS Mathematics 8: 13795-13796.
  • Received: 18 September 2022 Revised: 03 December 2022 Accepted: 12 December 2022 Published: 19 December 2022
  • MSC : 03B52, 03E72

  • The single-valued neutrosophic hesitant fuzzy set (SV-NHFS) is a hybrid structure of the single-valued neutrosophic set and the hesitant fuzzy set that is designed for some incomplete, uncertain, and inconsistent situations in which each element has a few different values designed by the truth membership hesitant function, indeterminacy membership hesitant function, and falsity membership hesitant function. A strategic decision-making technique can help the decision-maker accomplish and analyze the information in an efficient manner. However, in our real lives, uncertainty will play a dominant role during the information collection phase. To handle such uncertainties in the data, we present a decision-making algorithm in the SV-NHFS environment. In this paper, we first presented the basic operational laws for SV-NHF information under Einstein's t-norm and t-conorm. Furthermore, important properties of Einstein operators, including the Einstein sum, product, and scalar multiplication, are done under SV-NHFSs. Then, we proposed a list of novel aggregation operators' names: Single-valued neutrosophic hesitant fuzzy Einstein weighted averaging, weighted geometric, order weighted averaging, and order weighted geometric aggregation operators. Finally, we discuss a multi-attribute decision-making (MADM) algorithm based on the proposed operators to address the problems in the SV-NHF environment. A numerical example is given to illustrate the work and compare the results with the results of the existing studies. Also, the sensitivity analysis and advantages of the stated algorithm are given in the work to verify and strengthen the study.

    Citation: Muhammad Kamran, Shahzaib Ashraf, Nadeem Salamat, Muhammad Naeem, Thongchai Botmart. Cyber security control selection based decision support algorithm under single valued neutrosophic hesitant fuzzy Einstein aggregation information[J]. AIMS Mathematics, 2023, 8(3): 5551-5573. doi: 10.3934/math.2023280

    Related Papers:

    [1] Jia-Bao Liu, Rashad Ismail, Muhammad Kamran, Esmail Hassan Abdullatif Al-Sabri, Shahzaib Ashraf, Ismail Naci Cangul . An optimization strategy with SV-neutrosophic quaternion information and probabilistic hesitant fuzzy rough Einstein aggregation operator. AIMS Mathematics, 2023, 8(9): 20612-20653. doi: 10.3934/math.20231051
    [2] Muhammad Kamran, Shahzaib Ashraf, Nadeem Salamat, Muhammad Naeem, Thongchai Botmart . Correction: Cyber security control selection based decision support algorithm under single valued neutrosophic hesitant fuzzy Einstein aggregation information. AIMS Mathematics, 2023, 8(6): 13795-13796. doi: 10.3934/math.2023705
    [3] Muhammad Kamran, Rashad Ismail, Shahzaib Ashraf, Nadeem Salamat, Seyma Ozon Yildirim, Ismail Naci Cangul . Decision support algorithm under SV-neutrosophic hesitant fuzzy rough information with confidence level aggregation operators. AIMS Mathematics, 2023, 8(5): 11973-12008. doi: 10.3934/math.2023605
    [4] Misbah Rasheed, ElSayed Tag-Eldin, Nivin A. Ghamry, Muntazim Abbas Hashmi, Muhammad Kamran, Umber Rana . Decision-making algorithm based on Pythagorean fuzzy environment with probabilistic hesitant fuzzy set and Choquet integral. AIMS Mathematics, 2023, 8(5): 12422-12455. doi: 10.3934/math.2023624
    [5] Wajid Ali, Tanzeela Shaheen, Iftikhar Ul Haq, Hamza Toor, Faraz Akram, Harish Garg, Md. Zia Uddin, Mohammad Mehedi Hassan . Aczel-Alsina-based aggregation operators for intuitionistic hesitant fuzzy set environment and their application to multiple attribute decision-making process. AIMS Mathematics, 2023, 8(8): 18021-18039. doi: 10.3934/math.2023916
    [6] Rana Muhammad Zulqarnain, Wen Xiu Ma, Imran Siddique, Shahid Hussain Gurmani, Fahd Jarad, Muhammad Irfan Ahamad . Extension of aggregation operators to site selection for solid waste management under neutrosophic hypersoft set. AIMS Mathematics, 2023, 8(2): 4168-4201. doi: 10.3934/math.2023208
    [7] Attaullah, Asghar Khan, Noor Rehman, Fuad S. Al-Duais, Afrah Al-Bossly, Laila A. Al-Essa, Elsayed M Tag-eldin . A novel decision model with Einstein aggregation approach for garbage disposal plant site selection under $ q $-rung orthopair hesitant fuzzy rough information. AIMS Mathematics, 2023, 8(10): 22830-22874. doi: 10.3934/math.20231163
    [8] Jie Ling, Mingwei Lin, Lili Zhang . Medical waste treatment scheme selection based on single-valued neutrosophic numbers. AIMS Mathematics, 2021, 6(10): 10540-10564. doi: 10.3934/math.2021612
    [9] Wenyi Zeng, Rong Ma, Deqing Li, Qian Yin, Zeshui Xu, Ahmed Mostafa Khalil . Novel operations of weighted hesitant fuzzy sets and their group decision making application. AIMS Mathematics, 2022, 7(8): 14117-14138. doi: 10.3934/math.2022778
    [10] Muhammad Naeem, Aziz Khan, Shahzaib Ashraf, Saleem Abdullah, Muhammad Ayaz, Nejib Ghanmi . A novel decision making technique based on spherical hesitant fuzzy Yager aggregation information: application to treat Parkinson's disease. AIMS Mathematics, 2022, 7(2): 1678-1706. doi: 10.3934/math.2022097
  • The single-valued neutrosophic hesitant fuzzy set (SV-NHFS) is a hybrid structure of the single-valued neutrosophic set and the hesitant fuzzy set that is designed for some incomplete, uncertain, and inconsistent situations in which each element has a few different values designed by the truth membership hesitant function, indeterminacy membership hesitant function, and falsity membership hesitant function. A strategic decision-making technique can help the decision-maker accomplish and analyze the information in an efficient manner. However, in our real lives, uncertainty will play a dominant role during the information collection phase. To handle such uncertainties in the data, we present a decision-making algorithm in the SV-NHFS environment. In this paper, we first presented the basic operational laws for SV-NHF information under Einstein's t-norm and t-conorm. Furthermore, important properties of Einstein operators, including the Einstein sum, product, and scalar multiplication, are done under SV-NHFSs. Then, we proposed a list of novel aggregation operators' names: Single-valued neutrosophic hesitant fuzzy Einstein weighted averaging, weighted geometric, order weighted averaging, and order weighted geometric aggregation operators. Finally, we discuss a multi-attribute decision-making (MADM) algorithm based on the proposed operators to address the problems in the SV-NHF environment. A numerical example is given to illustrate the work and compare the results with the results of the existing studies. Also, the sensitivity analysis and advantages of the stated algorithm are given in the work to verify and strengthen the study.



    The idea of "multi-attribute group decision making" (MAGDM) was put forward as a promising and important field of research at the beginning of the 1970s. Since then, a growing number of contributions have been made to theories and models that could be the basis for making decisions that are more methodical and logically sound, employing a variety of criteria. According to one viewpoint, decision-making is a process of problem-solving that ends with the choice of a solution that is thought to be either the best or, at the very least, a reasonable and acceptable alternative among a collection of plausible alternatives. The phrase "multi-criteria decision making" or "MAGDM" refers to a sub field of operations research that focuses on the process of selecting the best option for a given set of criteria by carefully and systematically examining all of the alternatives. By contrasting and comparing all of the options, this is achieved. MAGDM issues and related solutions are regularly encountered in a variety of disciplines, including the social sciences, economics, management, and medicine. Struggling to figure out how to incorporate ambiguous information pieces that have been offered by a broad range of sources in the process of arriving at a judgment or conclusion is one of the most challenging challenges one encounters when meeting complexity that requires MAGDM. When dealing with problems that call for MAGDM, this is one of the biggest difficulties one encounters. Numerous surveys, including those by Bana and Costa [1], demonstrate the field's vigour and the variety of methodologies that have been created. A few years later, Bellman, Zadeh, and Zimmermann introduced fuzzy sets into the field, paving the way for a new family of techniques to solve problems that had previously been inaccessible and unsolvable with conventional MAGDM techniques. There are various variations on the MAGDM theme, depending on the theoretical underpinnings used for the modeling. Since it protects against data theft and destruction, cybersecurity is essential. This includes sensitive data, personally identifiable information (PII), protected health information (PHI), personal data, information relating to intellectual property, and computer networks utilized by the government and industry. Without a cybersecurity programme, your business cannot defend itself against data breach operations, making it an inevitable target for cyber criminals.

    Both inherent risk and residual risk are increasing as a result of improved worldwide connectivity and the use of cloud services like Amazon Web Services to store private and sensitive data. Due to widespread poor cloud service design, highly trained cybercriminals, and widespread inadequate cloud service setup, it is more likely that your company will be the victim of a successful cyberattack or data breach. Business executives cannot exclusively rely on standard cybersecurity tools like firewalls and antivirus software because hackers are growing more cunning and their strategies are becoming more resistant to traditional cyber defenses. To stay well-protected, it's crucial to cover all aspects of cybersecurity. Any level of your organisation has the potential to pose a cyber threat. To educate personnel about typical cyber threats, including social engineering scams, phishing, ransomware attacks (think WannaCry), and other programmes made to steal sensitive data, workplaces must offer cyber security awareness training. Due to the prevalence of data breaches, cybersecurity is essential across all industries, not just those with strict regulations like the health care sector. After a data breach, even small firms run the risk of having their reputations permanently damaged.

    To help you understand the importance of cyber security, we've posted an essay describing the numerous components of cybercrime you might not be aware of. You should be concerned about cybersecurity risks if you aren't already. Cybersecurity is the practise of preventing and responding to attacks on computer systems, networks, hardware, and software. Your sensitive data is at risk from increasingly sophisticated and dynamic cyber attacks, which use cutting-edge methods that combine social engineering and artificial intelligence (AI) to bypass well-established data protection safeguards. The world is getting more and more dependent on technology, and as we create new technologies that will eventually connect to our linked devices via Bluetooth and Wi-Fi, this dependence will only grow. Intelligent cloud security solutions should be used in conjunction with stringent password rules such as multi-factor authentication to limit unauthorised access and protect customer data while adopting new technologies. Information theft is the most expensive and quickly spreading type of cybercrime. mostly as a result of cloud services' role in the growth of identity information vulnerability on the web. It's not the only one, though. Industrial controls, which are susceptible to disruption ordestruction, are used to regulate power grids and other infrastructure. In order to cause strife within a business or government, cyber attacks may also aim to threaten data integrity (destroy or change data), making identity theft their secondary goal. As they gain experience, cybercriminals change the targets they select, the methods by which they influence enterprises, and the manner in which they attack different security systems. Here, we go over numerous security measures and their difficulties.

    A fuzzy set (FS) is a mathematical representation of a group of elements (objects) with fuzzy boundaries that allows for the potential of a progressive change in an element's belongings to a group, from full membership to non membership. This idea is presented in the fuzzy sets (FSs) theory as a way to mathematically express fuzzy concepts that people use to describe how they perceive real systems, their preferences, and goals, among other things. Applying the fuzzy decision theory, choose the best security system that will protect you from hackers. Many challenges exist in security systems that are only hazy when it comes to selecting the best option. When dealing with unstructured scenarios in decision-making situations, classic or crisp methods may not always be the most effective. Zadeh [2] developed FSs in 1965 as a technique to manage such inconsistency.

    In FSs, Zadeh assigns membership grades in the range [0, 1] to a set of components. Since many of the set theoretic components of crisp conditions were given for FSs, Zadeh's work in this area is noteworthy. An improved version of the FS that contains membership and non-membership degrees was the intuitionistic fuzzy set (IFS), which was the subject of Atanassov's [3] research. IFSs have been shown to be useful and frequently used by academics to assess uncertainty and instability in data over the last few decades. To explain the hesitant fuzzy set (HFS) more forcefully than the preceding classical fuzzy set extensions, Torra [5] developed the HFS, which necessitates that the membership have a collection of potential values. In order to handle circumstances where experts are split between several possibilities for an indicator, alternative, element, etc. [6,7], a new model based on HFSs was recently put into place. HFSs are particularly effective at addressing the issues of group decision making when experts hesitate between several potential memberships for an element of a series of decisions [8]. Many extensions to HFS have been implemented to handle more complex environments [34], including the interval-valued hesitated fuzzy set [9,10], the hesitant-triangular fuzzy set [11,12], the hesitant-multiplicative set [13], the hesitant-fuzzy linguistic word set [14], the hesitant-fuzzy uncertain linguistic set [15], the dual HFS [16,17], and the generalized HFS [18]. Several scholars have used aggregation operators to apply the HFS notion to group decision-making settings [19,20,21,22]. The neutrosophic set (NS), a philosophical field and mathematical instrument for understanding the genesis, nature, and range of neutralities, was initially put forth by Smarandache [23]. It examines the origins, character, and scope of neutralities as well as how they interact with other ideational spectrums.

    The NS generalizes the concepts of the classic set [27], fuzzy set, interval-valued fuzzy set, intuitionistic interval-valued fuzzy sets [28], dialetheist set, paradoxist set, and tautological set [29]. A NS is indicated by membership degree β(ϰ), indeterminacy α(ϰ) and non membership degree γ(ϰ), where β(ϰ), α(ϰ) and γ(ϰ) are elements from ]0,1+[. Although NS philosophically generalises the notions of FS, IFS, and all the existing structures, it will be challenging to implement in real-world scientific and engineering situations. This concept is critical in many contexts, such as information fusion, where data from several sensors is integrated. Recently, neutrosophic sets have primarily been used in engineering and other sectors to make decisions. Wang et al. [30] proposed a single-valued neutrosophic set (SV-NS), which can handle inaccurate, indeterminate, and incompatible data challenges. Many other researchers have defined its extensions; for example, see [31]. On the one hand, an SV-NS is a NS that allows us to convey ambiguity, imprecision, incompleteness, and inconsistency in the real world. It would be more suitable to employ uncertain information and an inconsistent information matrix in decision-making [32,33,35]. SV-NSs, on the other hand, can be employed in scientific and technical applications since SV-NS theory is useful in modelling ambiguous, imprecise, and inconsistent data [36,37]. The SV-NS is suitable for collecting imprecise, unclear, and inconsistent information in multi criteria decision-making analysis due to its ability to easily capture the ambiguous character of subjective judgments. Many researchers work on the operators of the NSs, which can be seen as Domi operators [38], Einstein operators [39] and many others. Also, we can see the use of these operators in decision-making [40,41].

    Motivation

    The security categorization is used in the security controls selection process to choose the initial baseline of security controls (i.e., low or moderate) that will adequately safeguard the data and information systems that are housed within the cloud service environment. According to a risk assessment or a security requirement specific to an organization, a cloud service may call for the implementation of alternative or compensating security controls that were not part of the initial baseline, or it may call for the addition of additional security controls or enhancements to address specific organisational needs. In order to accomplish this, the Control Tailoring Workbook (CTW) gives the CSP a list of the FedRAMP security controls applicable to the cloud environment and helps identify the exception scenarios for the service offering. This allows the platform to be pre-qualified before resources are used to develop all of the other necessary FedRAMP documentation requirements. Your security systems and the procedures necessary for the GRC programme are regularly monitored by modern governance, risk, and compliance (GRC) solutions. These duties could include gathering evidence, risk assessment, risk management for vendors, staff training, and gap analysis. By actively protecting your data and assisting you in remaining compliant, you may earn the trust of your clients, business associates, suppliers, and investors. However, there are several GRC tools on the market, each claiming to be the best, making it easy to become perplexed if you are seeking GRC solutions. Therefore, in order to save you time and help you narrow down your search for the best GRC tools, we have chosen the top four. Using the SV-NHF environment, we choose the best option according to our system requirements.

    In this research work, we administered the Einstein aggregation operators (AOs) to the SV-NHFS environment. i.e., the SV-NHFEWA, SV-NHFEOWA, SV-NHFEHWA, SV-NHFEWG, SV-NHFEOWG, and SV-NHFEHWG operators. Idempotency, boundness, and monotonicity are among the properties of the recommended operators that have been established. Such operators take the SV-NS AOs into consideration in hesitant scenarios, which is their main benefit. In the case of hesitant material, the lack of SV-NHFE AOs could lead to a scarcity of hesitant information.

    This study's remaining sections are organised as follows: Briefly explained in Section 1 are some fundamental SV-FSs, HFSs, and SV-NHFS theory concepts. Section 2 provides an explanation of basic notations and ideas. In Sections 3 and 4, respectively, a unique idea of SV-neutrosophic hesitant fuzzy sets (SV-NHFSs) with Einstein aggregation operations is introduced. A collection of algebraic SV-NHF Einstein aggregation operators for aggregating uncertain data is provided in Section 5 for use in making decisions. Section 6 of the manuscript marks its conclusion.

    Let's go over the basics of fuzzy sets, intuitionistic fuzzy sets, hesitant fuzzy sets, and neutrosophic sets in this part. Once they have been approved, these ideas will be implemented later.

    Definition 1. [2] For a fixed set Ξ. A FS in Ξ is presented as

    ={δ,Δ(δ)|δΞ},

    for each δΞ, the membership degree (MD) Δ:ΞΔ specifies the degree to which the element δ, where Δ[0,1] be the unit interval.

    Definition 2. [3] For a fixed set Ξ. An IFS in Ξ is presented as

    ={δ,Δ(δ),(δ)|δΞ},

    Δ(δ) is known as the MD and (δ) is the non MD where (Δ(δ),(δ))[0,1]. Moreover, it is required that 0Δ(δ)+(δ)1, for each δΞ.

    Definition 3. [4] For a fixed set Ξ. A HFS in Ξ is presented as

    ={δ,Δhϰ(δ)|δΞ}

    where Δhϰ(δ) is in the form of set, that's contained some possible values in unit interval, i.e., [0,1] which represent the MD of  δΞ in .

    Definition 4. [23] Suppose Ξ is a fixed set and ΥΞ. A NS ϰ in Ξ is denoted as MD Δϰ(Υ), an indeterminacy Λϰ(Υ) and a non MD ϰ(Υ). Δϰ(Υ), Λϰ(Υ) and ϰ(Υ) are subset of  ]0,1+[ and

    Δϰ(Υ),Λϰ(Υ),ϰ(Υ):Ξ]0,1+[.

    The representation of NS ϰ is mathematically defined as:

    ϰ={Υ,Δϰ(Υ),Λϰ(Υ),ϰ(Υ))|ΥΞ},

    where

    0<Δϰ(Υ)+Λϰ(Υ)+ϰ(Υ)3+.

    Definition 5. [30] Let Ξ be a fixed set and ΥΞ. A SV-NS A in Ξ is defined as MD ΔA(Υ), an indeterminacy ΛA(Υ) and a non MD A(Υ). ΔA(Υ),ΛA(Υ) and A(Υ) are subsets of  [0,1], and

    ΔA(Υ),ΛA(Υ),A(Υ):Ξ[0,1].

    The representation of SV-NS A is mathematically defined as:

    A={Υ,ΔA(Υ),ΛA(Υ),A(Υ))|ΥΞ},

    where

    0<ΔA(Υ)+ΛA(Υ)+A(Υ)3.

    Definition 6. [24,25] Let Ξ be a fixed set. The representation of SV-NHFS is mathematically defined as:

    ={Υ,ΔΞ(Υ),ΛΞ(Υ),Ξ(Υ)|Υ}

    where ΔΞ(Υ),ΛΞ(Υ),Ξ(Υ) are set of some values in [0,1], indicate the hesitant grade of membership, indeterminacy and non membership of the element Υ to the set Ξ.

    Definition 7. [26] For a fixed set Ξ, the SV-NHFS is represented mathematically as follows:

    ={Υ,Δ(Υ),Λ(Υ),(Υ)|ΥΞ},

    where Δ(Υ),Λ(Υ) and (Υ) are sets of some values in [0,1] and denote the MD, indeterminacy and non MD sequentially. It satisfy the following properties:

    ΥΞ:μ(Υ)Δ(Υ),λ(Υ)Λ(Υ),ν(Υ)(Υ)

    and

    ν(Υ)(Υ)with(max(Δ(Υ)))+(min(Λ(Υ)))+(min((Υ)))3,

    and

    (min(Δ(Υ)))+(min(Λ(Υ)))+(max((Υ)))3.

    For simplicity, we will use a pair = (Δ,Λ,) to mean SV-NHFS.

    Definition 8. Let

    ϖ1=(Δϖ1,Λϖ1,ϖ1)

    and

    ϖ2=(Δϖ2,Λϖ2,ϖ2)

    be two SV-NHFNs. Following are the fundamental set theoretic operations:

    ϖ1ϖ2={μ1Δϖ1μ2Δϖ2max(μ1,μ2),ν1Λϖ1ν2Λϖ2min(ν1,ν2),λ1ϖ1λ2ϖ2min(λ1,λ2)};
    ϖ1ϖ2={μ1Δϖ1μ2Δϖ2min(μ1,μ2),ν1Λϖ1ν2Λϖ2max(ν1,ν2),λ1ϖ1λ2ϖ2max(λ1,λ2)};
    ϖc1={ϖ1,Λϖ1,Δϖ1}.

    The application of t-norms in FS theory at the intersection of two FSs is widely recognized. T-conorms are being used to model disjunction or union. These are simple explanations of the conjunction and disjunction in mathematical fuzzy logic syntax, and they are used to combine criteria in MCDM. The Einstein sum (ϵ) and Einstein product (ϵ) are case studies of t-conorms and t-norms, respectively, and are stated in the SV-NHF environment as follows.

    ˜NϵˇS=˜N+ˇS1+˜NˇS;   ˜NϵˇS=˜NˇS1+(1˜N)(1ˇS).

    Based on the above Einstein operations, we give the following new operations on SV-NHF environment.

    Definition 9. Let 1=(υh1,τh1,Υh1) and 2=(υh2,τh2,Υh2) be two SV-NHFEs and, then

    12={Ξ1υh1(l),Ξ2υh2(l)(Ξ1+Ξ21+Ξ1Ξ2),κ1τh1(l),κ2τh2(l)(κ1κ21+(1κ1)(1κ2)),χ1Υh1(l),χ2Υh2(l)(χ1χ21+(1χ1)(1χ2))};
    12={Ξ1υh1(l),Ξ2υh2(l)(Ξ1Ξ21+(1Ξ1)(1Ξ2)),κ1τh1(l),κ2τh2(l)(κ1+κ21+κ1κ2),χ1Υh1(l),χ2Υh2(l)(χ1+χ21+χ1χ2)};
    η1={Ξ1υh1(l)((1+Ξ1)η(1Ξ1)η(1+Ξ1)η+(1Ξ1)η),κ1τh1(l)(2κη1(2κ1)η+(κ1)η),χ1Υh1(l)(2χη1(2χ1)η+(χ1)η)};
    η1={Ξ1υh1(l)2Ξη1(2Ξ1)η+(Ξ1)ηκ1τh1(l)((1+κ1)η(1κ1)η(1+κ1)η+(1κ1)η1(1κ1)η),χ1Υh1(l)((1+χ1)η(1χ1)η(1+χ1)η+(1χ1)η1(1χ1)η)}.

    Within this section, we explained several novel Einstein operators for SV-NHFNs, namely the SV-neutrosophic hesitant-fuzzy Einstein weighted averaging (SV-NHFEWA) operator, the SV-neutrosophic hesitant-fuzzy Einstein ordered weighted averaging (SV-NHFEOWA) operator, the SV-neutrosophic hesitant-fuzzy Einstein weighted geometric (SV-NHFEWG) operator, and the SV-neutrosophic hesitant-fuzzy Einstein ordered weighted geometric (SV-NHFEOWG) operator.

    Definition 10. Let ˆȷ=(υhˆȷ,τhˆȷ,Υhˆȷ) (ˆȷ=1,2,.....,˜ı) be a collection of SV-NHFNs, =(1,2,....,˜ı)T are the weights of ˆȷ[0,1] with ˜ıˆȷ=1ˆȷ=1. Then SV-NHFEWA:SV-HFN˜ı SV-NHFN such that

    SVNHFEWA(1,2,....,˜ı)=1.ε1ε2.ε2ε.....ε˜ı.ε˜ı

    is called the SV-neutrosophic hesitant fuzzy Einstein weighted averaging operator.

    Theorem 1. Let δˆȷ=(υhˆȷ,τhˆȷ,Υhˆȷ) (ˆȷ=1,2,.....,˜ı) be a collection of SV-NHFNs. Then the aggregation result using SV-NHFEWA, we can achieve the following

    SVNHFEWA(δ1,δ2,....,δ˜ı)=(ΞδˆȷυδˆȷΠ˜ıˆȷ=1(1+Ξδˆȷ)ˆȷΠ˜ıˆȷ=1(1Ξδˆȷ)ˆȷΠ˜ıˆȷ=1(1+Ξδˆȷ)ˆȷ+Π˜ıˆȷ=1(1Ξδˆȷ)ˆȷ,κδˆȷτδˆȷ2Π˜ıˆȷ=1(κδˆȷ)ˆȷΠ˜ıˆȷ=1(2κδˆȷ)ˆȷ+Π˜ıˆȷ=1(κδˆȷ)ˆȷ,χδˆȷΥδˆȷ2Π˜ıˆȷ=1(κδˆȷ)ˆȷΠ˜ıˆȷ=1(2χδˆȷ)ˆȷ+Π˜ıˆȷ=1(χδˆȷ)ˆȷ)

    where =(1,2,....,˜ı)T are the weights of δˆȷ with ˆȷ[0,1] with ˜ıˆȷ=1ˆȷ=1.

    Proof. We will demonstrate the theorem by mathematical induction. For ˜ı=2

    SVNHFEWA(δ1,δ2)=1.εδ1ε2.εδ2.

    Since both 1.εδ1 and 2.εδ2 are SV-NHFNs, and also, 1.εδ1ε2.εδ2 is a SV-NHFN.

    1.εδ1=(Ξδ1υδ1(1+Ξδ1)1(1Ξδ1)1(1+Ξδ1)1+(1Ξδ1)1,κδ1τδ12(κδ1)1(2κδ1)1+(κδ1)1,χδ1Υδ12(χδ1)1(2χδ1)1+(χδ1)1).
    2.εδ2=(Ξ2υδ2(1+Ξδ2)2(1Ξδ2)2(1+Ξδ2)2+(1Ξδ2)2,κδ2τδ22(κδ2)2(2κδ2)2+(κδ2)2,χδ2Υδ22(χδ2)2(2χδ2)2+(χδ2)2).

    Then

    SVNHFEWA(δ1,δ2)=1.εδ1ε2.εδ2=(Ξ1υδ1(1+Ξδ1)1(1Ξδ1)1(1+Ξδ1)1+(1Ξδ1)1,κδ1τδ12(κδ1)1(2κδ1)1+(κδ1)1,χδ1Υδ12(κδ1)1(2χδ1)1+(χδ1)1)ε(Ξ2υδ2(1+Ξδ2)2(1Ξδ2)2(1+Ξδ2)2+(1Ξδ2)2,κδ2τδ22(κδ2)2(2κδ2)2+(κδ2)2,χδ2Υδ22(χδ2)2(2χδ2)2+(χδ2)2).
    =(Ξ1υδ1Ξ2υδ2(1+Ξδ1)1(1Ξδ1)1(1+Ξδ1)1+(1Ξδ1)1+(1+Ξδ2)2(1Ξδ2)2(1+Ξδ2)2+(1Ξδ2)21+((1+Ξδ1)1(1Ξδ1)1(1+Ξδ1)1+(1Ξδ1)1).ε((1+Ξδ2)2(1Ξδ2)2(1+Ξδ2)2+(1Ξδ2)2),κδ1τδ1κδ2τδ2(2(κδ1)1(2κδ1)1+(κδ1)1).ε(2(κδ2)2(2κδ2)2+(κδ2)2)1+(12(κδ1)1(2κδ1)1+(κδ1)1).ε(12(κδ2)2(2κδ2)2+(κδ2)2),χδ1Υδ1χδ2τδ2(2(χδ1)1(2χδ1)1+(χδ1)1).ε(2(χδ2)2(2χδ2)2+(χδ2)2)1+(12(χδ1)1(2χδ1)1+(χδ1)1).ε(12(χδ2)2(2χδ2)2+(χδ2)2))=(Ξ1υδ1Ξ2υδ2(1+Ξδ1)1.ε(1+Ξδ2)2(1Ξδ1)1.ε(1Ξδ2)2(1+Ξδ1)1.ε(1+Ξδ2)2+(1Ξδ1)1.ε(1Ξδ2)2,κδ1τδ1κδ2τδ22(κδ1)1(κδ2)2(2κδ1)1.ε(2κδ2)2+(κδ1)1.ε(κδ2)2,χδ1Υδ1χδ2τδ22(χδ1)1(χδ2)2(2χδ1)1.ε(2χδ2)2+(χδ1)1.ε(χδ2)2).

    Thus, the result holds for ˜ı=2. Assume that the results holds for ˜ı=

    SVNHFEWA(δ1,δ2,....,δ)=(ΞˆȷυδˆȷΠˆȷ=1(1+Ξδˆȷ)ˆȷΠˆȷ=1(1Ξδˆȷ)ˆȷΠˆȷ=1(1+Ξδˆȷ)ˆȷ+Πˆȷ=1(1Ξδˆȷ)ˆȷ,κδˆȷτδˆȷ2Πˆȷ=1(κδˆȷ)ˆȷΠˆȷ=1(2κδˆȷ)ˆȷ+Πˆȷ=1(κδˆȷ)ˆȷ,χδˆȷΥδˆȷ2Πˆȷ=1(χδˆȷ)ˆȷΠˆȷ=1(2χδˆȷ)ˆȷ+Πˆȷ=1(χδˆȷ)ˆȷ).

    Now we will prove for ˜ı=+1

    SVNHFEWA(δ1,δ2,....,δ+1)=SVNHFEWA(δ1,δ2,....,δ)ε+1.εδ+1=(ΞˆȷυδˆȷΠˆȷ=1(1+Ξδˆȷ)ˆȷΠˆȷ=1(1Ξδˆȷ)ˆȷΠˆȷ=1(1+Ξδˆȷ)ˆȷ+Πˆȷ=1(1Ξδˆȷ)ˆȷ,κδˆȷτδˆȷ2Πˆȷ=1(κδˆȷ)ˆȷΠˆȷ=1(2κδˆȷ)ˆȷ+Πˆȷ=1(κδˆȷ)ˆȷ,χδˆȷΥδˆȷ2Πˆȷ=1(χδˆȷ)ˆȷΠˆȷ=1(2χδˆȷ)ˆȷ+Πˆȷ=1(χδˆȷ)ˆȷ)ε(Ξ+1υδ+1(1+Ξδ+1)+1(1Ξδ+1)+1(1+Ξδ+1)+1+(1Ξδ+1)+1,κδ+1τδ+12(κδ+1)+1(2κδ+1)+1+(κδ+1)+1,χδ+1Υδ+12(κδ+1)+1(2χδ+1)+1+(χδ+1)+1)=(ΞˆȷυδˆȷΠ+1ˆȷ=1(1+Ξδˆȷ)ˆȷΠ+1ˆȷ=1(1Ξδˆȷ)ˆȷΠ+1ˆȷ=1(1+Ξδˆȷ)ˆȷ+Π+1ˆȷ=1(1Ξδˆȷ)ˆȷ,κδˆȷτδˆȷ2Π+1ˆȷ=1(κδˆȷ)ˆȷΠ+1ˆȷ=1(2κδˆȷ)ˆȷ+Π+1ˆȷ=1(κδˆȷ)ˆȷ,χδˆȷΥδˆȷ2Π+1ˆȷ=1(χδˆȷ)ˆȷΠ+1ˆȷ=1(2χδˆȷ)ˆȷ+Π+1ˆȷ=1(χδˆȷ)ˆȷ).

    Thus

    SVNHFEWA(δ1,δ2,....,δ˜ı)=(ΞˆȷυδˆȷΠ˜ıˆȷ=1(1+Ξδˆȷ)ˆȷΠ˜ıˆȷ=1(1Ξδˆȷ)ˆȷΠ˜ıˆȷ=1(1+Ξδˆȷ)ˆȷ+Π˜ıˆȷ=1(1Ξδˆȷ)ˆȷ,κδˆȷτδˆȷ2Π˜ıˆȷ=1(κδˆȷ)ˆȷΠ˜ıˆȷ=1(2κδˆȷ)ˆȷ+Π˜ıˆȷ=1(κδˆȷ)ˆȷ,χδˆȷΥδˆȷ2Π˜ıˆȷ=1(κδˆȷ)ˆȷΠ˜ıˆȷ=1(2χδˆȷ)ˆȷ+Π˜ıˆȷ=1(χδˆȷ)ˆȷ).

    There are some properties which are fulfilled by the SV-NHFEWA as follows:

    Theorem 2. Suppose δˆȷ=(υhˆȷ,τhˆȷ,Υhˆȷ) (ˆȷ=1,2,.....,˜ı) be a group of SV-NHFNs, =(1,2,....,˜ı)T are the weights of δˆȷ with ˆȷ[0,1] with ˜ıˆȷ=1ˆȷ=1; then we have the following:

    (1) Boundary:

    δSVNHFEWA(δ1,δ2,....,δ˜ı)δ+

    where

    δ=(min1ˆȷ˜ıminΞδˆȷυhˆȷΞδˆȷ,max1ˆȷ˜ımaxκδˆȷτhˆȷκδˆȷ,max1ˆȷ˜ımaxκδˆȷΥhˆȷχδˆȷ);δ+=(max1ˆȷ˜ımaxΞδˆȷυhˆȷΞδˆȷ,min1ˆȷ˜ıminκδˆȷτhˆȷκδˆȷ,min1ˆȷ˜ıminκδˆȷΥhˆȷχδˆȷ).

    (2) Monotonicity: Let δˆȷ=(˙υhˆȷ,˙τhˆȷ,Υhˆȷ) (ˆȷ=1,2,.....,˜ı) be a collection of SV-NHFNs. Then

    SVNHFEWA(δ1,δ2,....,δ˜ı)SVNHFEWA(δ1,δ2,....,δ˜ı).

    Proof. (1) Let f(x)=1x1+x,x[0,1], then f(x)=2(1+x)2<0, so f(x) is a decreasing function. Let max Ξδˆȷ=max1ˆȷ˜ımaxΞδˆȷυhˆȷΞδˆȷ, min Ξδˆȷ=min1ˆȷ˜ıminΞδˆȷκhˆȷΞδˆȷ and min Ξδˆȷ=min1ˆȷ˜ıminΞδˆȷΥhˆȷΞδˆȷ

    min(Ξδˆȷ)(Ξδˆȷ)max(Ξδˆȷ) forall ˆȷ=1,2,.....,˜ıf(max(Ξδˆȷ))(Ξδˆȷ)f(min(Ξδˆȷ))forall ˆȷ=1,2,.....,˜ı1max(Ξδˆȷ)1+max(Ξδˆȷ)1(Ξδˆȷ)1+(Ξδˆȷ)1min(Ξδˆȷ)1+min(Ξδˆȷ).

    Since =(1,2,....,˜ı)T are the weights of δˆȷ with ˆȷ[0,1] with ˜ıˆȷ=1ˆȷ=1, we have

    (1max(Ξδˆȷ)1+max(Ξδˆȷ))ˆȷ(1(Ξδˆȷ)1+(Ξδˆȷ))ˆȷ(1min(Ξδˆȷ)1+min(Ξδˆȷ))ˆȷ;˜ıˆȷ=1(1max(Ξδˆȷ)1+max(Ξδˆȷ))ˆȷ˜ıˆȷ=1(1(Ξδˆȷ)1+(Ξδˆȷ))ˆȷ˜ıˆȷ=1(1min(Ξδˆȷ)1+min(Ξδˆȷ))ˆȷ;(1max(Ξδˆȷ)1+max(Ξδˆȷ))˜ıˆȷ=1ˆȷ˜ıˆȷ=1(1(Ξδˆȷ)1+(Ξδˆȷ))ˆȷ(1min(Ξδˆȷ)1+min(Ξδˆȷ))˜ıˆȷ=1ˆȷ.
    (1max(Ξδˆȷ)1+max(Ξδˆȷ))˜ıˆȷ=1(1(Ξδˆȷ)1+(Ξδˆȷ))ˆȷ(1min(Ξδˆȷ)1+min(Ξδˆȷ));(21+max(Ξδˆȷ))1+˜ıˆȷ=1(1(Ξδˆȷ)1+(Ξδˆȷ)2)ˆȷ(21+min(Ξδˆȷ)2);(1+min(Ξδˆȷ)2)11+˜ıˆȷ=1(1(Ξδˆȷ)1+(Ξδˆȷ))ˆȷ(1+max(Ξδˆȷ)2);(1+min(Ξδˆȷ))21+˜ıˆȷ=1(1(Ξδˆȷ)1+(Ξδˆȷ))ˆȷ(1+max(Ξδˆȷ));min(Ξδˆȷ)21+˜ıˆȷ=1(1(Ξδˆȷ)1+(Ξδˆȷ))ˆȷ1max(Ξδˆȷ);min(Ξδˆȷ)˜ıˆȷ=1(1+(Ξδˆȷ))ˆȷ˜ıˆȷ=1(1(Ξδˆȷ))ˆȷ˜ıˆȷ=1(1+(Ξδˆȷ))ˆȷ+˜ıˆȷ=1(1(Ξδˆȷ))ˆȷmax(Ξδˆȷ).

    Thus,

    minΞδˆȷ˜ıˆȷ=1(1+(Ξδˆȷ))ˆȷ˜ıˆȷ=1(1(Ξδˆȷ))ˆȷ˜ıˆȷ=1(1+(Ξδˆȷ))ˆȷ+˜ıˆȷ=1(1(Ξδˆȷ))ˆȷmaxΞδˆȷ.

    Consider g(y)=2yy,y(0,1],then g(y)=2y2,i.e.,g(y) is a decreasing function on (0,1]. Let max κδˆȷ=max1ˆȷ˜ımaxκδˆȷτhˆȷκδˆȷ, minκδˆȷ = min1ˆȷ˜ıminκδˆȷτhˆȷ,and minκδˆȷ = min1ˆȷ˜ıminκδˆȷΥhˆȷ.

    min(κδˆȷ)(κδˆȷ)max(κδˆȷ) forall ˆȷ=1,2,.....,˜ıg(max(κδˆȷ))g((κδˆȷ))g(min(κδˆȷ)) forall ˆȷ=1,2,.....,˜ı2max(κδˆȷ)max(κδˆȷ)2(κδˆȷ)(κδˆȷ)2min(κδˆȷ)min(κδˆȷ)(2max(κδˆȷ)max(κδˆȷ))ˆȷ(2(κδˆȷ)(κδˆȷ))ˆȷ(2min(κδˆȷ)min(κδˆȷ))ˆȷ˜ıˆȷ=1(2max(κδˆȷ)max(κδˆȷ))ˆȷ˜ıˆȷ=1(2(κδˆȷ)(κδˆȷ)2)ˆȷ˜ıˆȷ=1(2min(κδˆȷ)min(κδˆȷ)2)ˆȷ(2max(κδˆȷ)max(κδˆȷ))˜ıˆȷ=1ˆȷ˜ıˆȷ=1(2(κδˆȷ)(κδˆȷ))ˆȷ(2min(κδˆȷ)min(κδˆȷ))˜ıˆȷ=1ˆȷ(2max(κδˆȷ)max(κδˆȷ))˜ıˆȷ=1(2(κδˆȷ)(κδˆȷ))ˆȷ(2min(κδˆȷ)min(κδˆȷ))2max(κδˆȷ)1+˜ıˆȷ=1(2(κδˆȷ)(κδˆȷ))ˆȷ2min(κδˆȷ)max(κδˆȷ)2211+˜ıˆȷ=1(2(κδˆȷ)2(κδˆȷ)2)ˆȷmin(κδˆȷ)22max(κδˆȷ)21+˜ıˆȷ=1(2(κδˆȷ)(κδˆȷ)2)ˆȷmin(κδˆȷ)max(κδˆȷ)2˜ıˆȷ=1((κδˆȷ))ˆȷ˜ıˆȷ=1(2(κδˆȷ))ˆȷ+˜ıˆȷ=1((κδˆȷ))ˆȷmin(κδˆȷ)maxκδˆȷ2˜ıˆȷ=1(κδˆȷ)ˆȷ˜ıˆȷ=1(2(κδˆȷ))ˆȷ+˜ıˆȷ=1((κδˆȷ))ˆȷminκδˆȷ.

    Let SVNHFEWA(δ1,δ2,....,δ˜ı)=δ(Ξδˆȷ), then Ξδˆȷ.

    Definition 11. Let δˆȷ=(υhˆȷ,τhˆȷ,Υhˆȷ) (ˆȷ=1,2,.....,˜ı) be a collection of SV-NHFNs, =(1,2,....,˜ı)T are the weights of δˆȷ[0,1] with ˜ıˆȷ=1ˆȷ=1. Then SVNHFEWG:SVNHFN˜ıSVNHFN such that

    SVNHFEWA(δ1,δ2,....,δ˜ı)=δ11εδ22ε.....εδ˜ı˜ı.

    is called the SV-neutrosophic hesitant fuzzy Einstein weighted geometric operator.

    Theorem 3. Let δˆȷ=(υhˆȷ,τhˆȷ,Υhˆȷ) (ˆȷ=1,2,.....,˜ı) be a collection of SV-NHFNs. Then the aggregation result using SV-NHFEWG, we can achieve the following

    SVNHFEWG(δ1,δ2,....,δ˜ı)=(ΞδˆȷυδˆȷΠ˜ıˆȷ=1(1+Ξδˆȷ)ˆȷΠ˜ıˆȷ=1(1Ξδˆȷ)ˆȷΠ˜ıˆȷ=1(1+Ξδˆȷ)ˆȷ+Π˜ıˆȷ=1(1Ξδˆȷ)ˆȷ,κδˆȷτδˆȷ2Π˜ıˆȷ=1(κδˆȷ)ˆȷΠ˜ıˆȷ=1(2κδˆȷ)ˆȷ+Π˜ıˆȷ=1(κδˆȷ)ˆȷ,χδˆȷΥδˆȷ2Π˜ıˆȷ=1(χδˆȷ)ˆȷΠ˜ıˆȷ=1(2χδˆȷ)ˆȷ+Π˜ıˆȷ=1(χδˆȷ)ˆȷ)

    where =(1,2,....,˜ı)T are the weights of δˆȷ with ˆȷ[0,1] with ˜ıˆȷ=1ˆȷ=1.

    There are some properties which are fulfilled by the SV-NHFEWG as follows:

    Theorem 4. Let δˆȷ=(υhˆȷ,τhˆȷ,Υhˆȷ) (ˆȷ=1,2,.....,˜ı) be a collection of SV-NHFNs, =(1,2,....,˜ı)T are the weights of δˆȷ with ˆȷ[0,1] with ˜ıˆȷ=1ˆȷ=1; then we have the following:

    (1) Boundary:

    δSVNHFEWG(δ1,δ2,....,δ˜ı)δ+

    where

    δ=(min1ˆȷ˜ıminΞδˆȷυhˆȷΞδˆȷ,max1ˆȷ˜ımaxκδˆȷτhˆȷκδˆȷ,max1ˆȷ˜ımaxκδˆȷΥhˆȷχδˆȷ)δ+=(max1ˆȷ˜ımaxΞδˆȷυhˆȷΞδˆȷ,min1ˆȷ˜ıminκδˆȷτhˆȷκδˆȷ,min1ˆȷ˜ıminκδˆȷΥhˆȷχδˆȷ).

    (2) Monotonicity: Let δˆȷ=(˙υhˆȷ,˙τhˆȷ,Υhˆȷ) (ˆȷ=1,2,.....,˜ı) be a collection of SV-NHFNs. Then

    SVNHFEWG(δ1,δ2,....,δ˜ı)SVNHFEWG(δ1,δ2,....,δ˜ı).

    We developed the following ordered weighted operators based on SV-NHFNs.

    Definition 12. (1) Let δˆȷ=(υhˆȷ,τhˆȷ,Υhˆȷ) (ˆȷ=1,2,.....,˜ı) be a collection of SV-NHFNs, =(1,2,....,˜ı)T are the weights of δˆȷ[0,1] with ˜ıˆȷ=1ˆȷ=1. Then SV-NHFEOWA: SV-NHFN˜ı SV-NHFN such that

    SVNHFEOWA(δ1,δ2,....,δ˜ı)=1.εδρ(1)ε2.εδρ(2)ε.....ε˜ı.εδρ(˜ı)=(Ξδρ(ˆȷ)υδρ(ˆȷ)Π˜ıˆȷ=1(1+Ξδρ(ˆȷ))ˆȷΠ˜ıˆȷ=1(1Ξδρ(ˆȷ))ˆȷΠ˜ıˆȷ=1(1+Ξδρ(ˆȷ))ˆȷ+Π˜ıˆȷ=1(1Ξδρ(ˆȷ))ˆȷ,κδρ(ˆȷ)τδρ(ˆȷ)2Π˜ıˆȷ=1(κδρ(ˆȷ))ˆȷΠ˜ıˆȷ=1(2κδρ(ˆȷ))ˆȷ+Π˜ıˆȷ=1(κδρ(ˆȷ))ˆȷ,χδρ(ˆȷ)Υδρ(ˆȷ)2Π˜ıˆȷ=1(χδρ(ˆȷ))ˆȷΠ˜ıˆȷ=1(2χδρ(ˆȷ))ˆȷ+Π˜ıˆȷ=1(χδρ(ˆȷ))ˆȷ,)

    where δρ(ˆȷ) be the ˆȷth largest in them, is called the SV-neutrosophic hesitant fuzzy Einstein ordered weighted averaging operator.

    (2) Let δˆȷ=(υhˆȷ,τhˆȷ,Υhˆȷ) (ˆȷ=1,2,.....,˜ı) be a collection of SV-NHFNs, =(1,2,....,˜ı)T are the weights of δˆȷ[0,1] with ˜ıˆȷ=1ˆȷ=1. Then SVNHFEOWG:SVNHFN˜ıSVNHFN such that

    SVNHFEOWG(δ1,δ2,....,δ˜ı)=δ1ρ(1)εδ2ρ(2)ε.....εδ˜ıρ(˜ı)=(χδρ(ˆȷ)Υδρ(ˆȷ)2Π˜ıˆȷ=1(χδρ(ˆȷ))ˆȷΠ˜ıˆȷ=1(2χδρ(ˆȷ))ˆȷ+Π˜ıˆȷ=1(χδρ(ˆȷ))ˆȷ,κδρ(ˆȷ)τδρ(ˆȷ)2Π˜ıˆȷ=1(κδρ(ˆȷ))ˆȷΠ˜ıˆȷ=1(2κδρ(ˆȷ))ˆȷ+Π˜ıˆȷ=1(κδρ(ˆȷ))ˆȷ,Ξδρ(ˆȷ)υδρ(ˆȷ)Π˜ıˆȷ=1(1+Ξδρ(ˆȷ))ˆȷΠ˜ıˆȷ=1(1Ξδρ(ˆȷ))ˆȷΠ˜ıˆȷ=1(1+Ξδρ(ˆȷ))ˆȷ+Π˜ıˆȷ=1(1Ξδρ(ˆȷ))ˆȷ,)

    where δρ(ˆȷ) be the ˆȷth largest in them, is called the SV-neutrosophic hesitant fuzzy Einstein ordered weighted geometric operator.

    Here, we designed a system for SV-NHF details information to be incorporated into MAGDM to represent uncertainty.

    Step-1: The collection of data from experts.

    Step-2: Normalize the experts data based on the benefit and cost.

    Step-3: Apply the aggregation Operators as given below The SV-NHFWA operator

    SVNHFEWA(δ1,δ2,....,δ˜ı)=(ΞδˆȷυδˆȷΠ˜ıˆȷ=1(1+Ξδˆȷ)ˆȷΠ˜ıˆȷ=1(1Ξδˆȷ)ˆȷΠ˜ıˆȷ=1(1+Ξδˆȷ)ˆȷ+Π˜ıˆȷ=1(1Ξδˆȷ)ˆȷ,κδˆȷτδˆȷ2Π˜ıˆȷ=1(κδˆȷ)ˆȷΠ˜ıˆȷ=1(2κδˆȷ)ˆȷ+Π˜ıˆȷ=1(κδˆȷ)ˆȷ,χδˆȷΥδˆȷ2Π˜ıˆȷ=1(κδˆȷ)ˆȷΠ˜ıˆȷ=1(2χδˆȷ)ˆȷ+Π˜ıˆȷ=1(χδˆȷ)ˆȷ,)

    and the SV-NHFWG operator

    SVNHFEWG(δ1,δ2,....,δ˜ı)=(Ξδˆȷυδˆȷ2Π˜ıˆȷ=1(Ξδˆȷ)ˆȷΠ˜ıˆȷ=1(2Ξδˆȷ)ˆȷ+Π˜ıˆȷ=1(Ξδˆȷ)ˆȷκδˆȷτδˆȷ2Π˜ıˆȷ=1(κδˆȷ)ˆȷΠ˜ıˆȷ=1(2κδˆȷ)ˆȷ+Π˜ıˆȷ=1(κδˆȷ)ˆȷ,χδˆȷΥδˆȷΠ˜ıˆȷ=1(1+χδˆȷ)ˆȷΠ˜ıˆȷ=1(1χδˆȷ)ˆȷΠ˜ıˆȷ=1(1+χδˆȷ)ˆȷ+Π˜ıˆȷ=1(1χδˆȷ)ˆȷ).

    Step-4: Find the score value based on the score function given below

    s(δ)=(1Mδiνh˙g,(i))(1Nδϱiτhϰ(ϱi))(1SδϱiΥhϰ(αi)).

    Here Mδ,Nδ and Sδ represent the number of the elements in each of the MD, an indeterminacy and non MD respectively.

    Step-5: Rank the alternative based on score values and find the best option.

    In the Figure 1, You can see the flow chart of the algorithm for decision-making.

    Figure 1.  Flow chart for algorithm.

    Cybersecurity is crucial since it guards against theft and destruction of many types of data. This covers delicate information, personally identifiable information (PII), protected health information (PHI), personal data, data pertaining to intellectual property, and information systems used by the government and business.

    Case study: We provide a real-world example of cybersecurity types and challenges. Our aim is to choose the best type of security to handle and protect.

    (1) ˚C1: Internet of things security: In the context of the Internet of Things (IoT), where almost any physical or logical entity or object may be given a unique identifier and the capability to communicate autonomously over a network, "Internet of Things privacy" refers to the special considerations necessary to protect the information of individuals from exposure in the IoT environment. Insecure communications, security mechanisms that were originally developed for desktop computers but are difficult to implement on resource-constrained IoT devices, data leaks from IoT systems, malware risks, cyber attacks, secure networks, and secure data are the most frequent Internet of Things security issues.

    (2) ˚C2: Cloud security: Cloud computing's use of data privacy makes it possible to collect, store, move, and share data over the internet without endangering the privacy of individual users' personal information. Misconfiguration, which is a major contributor to cloud data breaches, unauthorised access, insecure interfaces and APIs, account hijacking, a lack of visibility, external data sharing, malicious insiders, and cyber attacks are a few obstacles.

    (3) ˚C3: Network security: By limiting the introduction or spread of a wide range of potential dangers within a network, network security is a set of technologies that safeguards the usefulness and integrity of a company's infrastructure. Among the challenges are numerous misconfigurations, lax oversight of privileged access, poor tool compatibility, a lack of visibility, and controls that are out of date with infrastructure changes.

    Criteria: δ1 = Control of Hijacking data, δ2 = Lack of visibility, δ3 = Secure networks, and δ4 = Cyber attacks. The given weight vector is = (0.314, 0.355, 0.331)T. Table 1 showing all the collective data of DM.

    Table 1.  Collective data of decision makers.
    ˚C1 ˚C2 ˚C3
    δ1 {(0.25,0.35),(0.31),(0.33,0.59)} {(0.45),(0.84),(0.84,0.96)} {(0.79),(0.66,0.73),(0.7,0.43)}
    δ2 {(0.8,0.1),(0.15,0.2),(0.45,0.28)} {(0.51),(0.37,0.43),(0.7,0.13)} {(0.91,0.61),(0.36,0.24),(0.86,0.24)}
    δ3 {(0.95,0.23),(0.99),(0.28,0.96)} {(0.1),(0.36,0.46),(0.63)} {(0.55,0.65),(0.39),(0.69,0.91)}
    δ4 {(0.4,0.66),(0.55),(0.89)} {(0.71),(0.65,0.15),(0.56,0.95)} {(0.21),(0.32,0.68),(0.92,0.98)}

     | Show Table
    DownLoad: CSV

    = (0.34, 0.35, 0.31)T

    Step 1. Because the attributes are uniform so there are no need to normalized.

    Step 2. By exploiting the proposed SV-NHFWA operator, we achieve the overall preference values δ˜ı of the alternative δ˜ı(˜ı=1,2,3,4). For instance

    SVNHFEWA(δ1,δ2,....,δ˜ı)=(ΞδˆȷυδˆȷΠ˜ıˆȷ=1(1+Ξδˆȷ)ˆȷΠ˜ıˆȷ=1(1Ξδˆȷ)ˆȷΠ˜ıˆȷ=1(1+Ξδˆȷ)ˆȷ+Π˜ıˆȷ=1(1Ξδˆȷ)ˆȷ,κδˆȷτδˆȷ2Π˜ıˆȷ=1(κδˆȷ)ˆȷΠ˜ıˆȷ=1(2κδˆȷ)ˆȷ+Π˜ıˆȷ=1(κδˆȷ)ˆȷ,χδˆȷΥδˆȷ2Π˜ıˆȷ=1(κδˆȷ)ˆȷΠ˜ıˆȷ=1(2χδˆȷ)ˆȷ+Π˜ıˆȷ=1(χδˆȷ)ˆȷ)
    δ1={1.1453,1.1460,0.6460,0.6632,0.6670,0.5877,0.6948,0.6137,0.7770,0.6914,0.8066,0.7196}.

    Similarly for other alternatives

    δ2={1.0897,1.1308,1.1120,1.1555,0.3341,0.2954,0.3521,0.3117,0.3660,0.3244,0.3853,0.3419,0.7233,0.5204,0.4409,0.2987,0.6375,0.4503,0.3787,0.2533}δ3={1.0889,1.0855,1.1467,1.1453,0.6132,0.6579,0.5811,0.6271,0.8142,0.8673}δ4={1.1536,1.1430,0.5817,0.7041,0.3657,0.4574,0.8276,0.8400,0.9449,0.9576}
    s(δ)=(1Mδiνh˙g,(i))(1Nδϱiτhϰ(ϱi))(1SδϱiΥhϰ(αi)).

    Step 3. The score values are obtained as

    s(δ1)=0.2036,s(δ2)=0.3202,s(δ3)=0.2414,s(δ4)=0.2715.

    Step 4.

    s(δ2)>s(δ1)>s(δ3)>s(δ4).

    Therefore

    δ2>δ1>δ3>δ4.

    The best choice is δ2.

    For SV-NHFWG operator

    Here we start from all the collective data of the DM, which is shown in Table 2 as well,

    Table 2.  Collective data of decision makers.
    ˚C1 ˚C2 ˚C3
    δ1 {(0.25,0.35),(0.31),(0.33,0.59)} {(0.45),(0.84),(0.84,0.96)} {(0.79),(0.66,0.73),(0.7,0.43)}
    δ2 {(0.8,0.1),(0.15,0.2),(0.45,0.28)} {(0.51),(0.37,0.43),(0.7,0.13)} {(0.91,0.61),(0.36,0.24),(0.86,0.24)}
    δ3 {(0.95,0.23),(0.99),(0.28,0.96)} {(0.1),(0.36,0.46),(0.63)} {(0.55,0.65),(0.39),(0.69,0.91)}
    δ4 {(0.4,0.66),(0.55),(0.89)} {(0.71),(0.65,0.15),(0.56,0.95)} {(0.21),(0.32,0.68),(0.92,0.98)}

     | Show Table
    DownLoad: CSV

    Step 2. By exploiting the proposed SV-NHFWG operator, we achieve the overall preference values δ˜ı of the alternative δ˜ı(˜ı=1,2,3,4).

    SVNHFEWG(δ1,δ2,....,δ˜ı)=(Ξδˆȷυδˆȷ2Π˜ıˆȷ=1(Ξδˆȷ)ˆȷΠ˜ıˆȷ=1(2Ξδˆȷ)ˆȷ+Π˜ıˆȷ=1(Ξδˆȷ)ˆȷκδˆȷτδˆȷ2Π˜ıˆȷ=1(κδˆȷ)ˆȷΠ˜ıˆȷ=1(2κδˆȷ)ˆȷ+Π˜ıˆȷ=1(κδˆȷ)ˆȷ,χδˆȷΥδˆȷΠ˜ıˆȷ=1(1+χδˆȷ)ˆȷΠ˜ıˆȷ=1(1χδˆȷ)ˆȷΠ˜ıˆȷ=1(1+χδˆȷ)ˆȷ+Π˜ıˆȷ=1(1χδˆȷ)ˆȷ)
    δ1={0.4199,0.5538,0.6460,0.6632,1.3219,1.2874,1.3375,1.3034,1.3607,1.3272,1.3759,1.3428}δ2={0.9132,0.8008,0.3404,0.2506,0.3341,0.2954,0.3521,0.3117,0.3660,0.3244,0.3853,0.3419,1.3397,1.2589,1.2450,1.1600,1.3127,1.2305,1.2164,1.1304}δ3={0.5267,0.5969,1.3692,1.0489,0.6132,0.6579,1.2827,1.3081,1.3782,1.4018}δ4={0.2414,0.5379,0.5817,0.7041,0.3657,0.4574,1.3849,1.3909,1.4350,1.4408}.

    Step 3. The score values are obtained as

    s(δ1)=1.4998,s(δ2)=1.1246,s(δ3)=2.3019,s(δ4)=1.5504.

    Step 4.

    s(δ2)>s(δ1)>s(δ4)>s(δ3).

    Therefore

    δ2>δ1>δ4>δ3.

    The best choice is δ2. The comparison analysis using SV-NP HFWA and SV-NP HFWG are shown in Table 3.

    Table 3.  Comparison of ranking.
    Operators Score Best Alternative
    SV-NP HFWA Sc(δ1)>Sc(δ2)>Sc(δ3)>Sc(δ4) δ1
    SV-NP HFWG Sc(δ1)>Sc(δ3)>Sc(δ2)>Sc(δ4) δ1

     | Show Table
    DownLoad: CSV

    Therefore the best choice is δ1. After applying test Step 1, we came up with the identical best alternative δ1 that we had in our suggested numerical case analysis. Test Steps 2 and 3, We are now testing the validity test Steps 2 and 3 to demonstrate that the proposed approach is reliable and relevant. To this end, we first transformed the MAGDM problem into three smaller sub-problems such as {δ1,δ2,δ3} and {δ2,δ3,δ4}. We now apply our suggested decision-making approach to the smaller problems that have been transformed and have obtained the following ranking of alternatives: δ1> δ3>δ4, δ1> δ2>δ3 and δ2>δ3>δ4 respectively. We find that δ1>δ2>δ3>δ4 is the same as the standard decision-making approach results when assigning a detailed ranking.

    A strong fusion of a SV-NS and HFS called SV-NHFS was developed for situations where each object has a range of potential values that are dictated by MD, indeterminacy, and non MD. A SV-NHFEWA operator, SV-NHFEWG operator, SV-NHFEOWG operator and SV-NHFEOWA operators are all suggested in this article. Additionally, based on the SV-NHFEWA and SV-NHFEWG operators, we suggested novel MADM approach. More information on the advantages of these techniques is provided below.

    (1) First, there are important characteristics of the SV-NHFEWG and SV-NHFEWA operators, including idempotency, commutativity, boundedness, and monotonicity.

    (2) Second, the conversion of the SV-NHFEWA and SV-NHFEWG operators to the earlier AOs for SVNHFSs demonstrates the adaptability of the suggested AOs.

    (3) Third, the results obtained by the SV-NHFEWA and SV-NHFEWG operators are accurate and dependable when compared to other existing techniques for MADM problems in an SV-NHF context, demonstrating their applicability in real-world situations.

    (4) The methods for MAGDM that are suggested in this paper are able to further acknowledge more association between attributes and alternatives, demonstrating that they have a higher accuracy and a larger reference value than the methods currently in use, which are unable to take into account the inter-relationships of attributes in practical applications. This indicates that the methods for MAGDM that are suggested in this paper can recognize even more associations between attributes.

    (5) The proposed aggregation operators are also put to use in practise to look at symmetrical analysis in the choice of a workable cybersecurity control selection technique.

    (6) Future research on personalized individual consistency control consensus problems, consensus reaching with non-cooperative behavior management decision-making problems, and two-sided matching decision-making with multi-granular and incomplete criteria weight information could all benefit from the use of the proposed AOs. The degrees of membership, abstention, and non-membership have no bearing on this examination of the restrictions imposed by proposed AOs. On this side of the intended AOs, a new hybrid structure of interactive and prioritized AOs may be observed being implemented.

    (7) We will examine the conceptual framework of SV-NHFSs for Einstein operations in future work using innovative decision-making approaches like as TOPSIS, VIKOR, TODAM, GRA, and EDAS. We'll also talk about how these techniques are used in domains including analytical thinking, intelligent systems, social sciences, finance, management of human resources, robotics, navigation, horticulture, soft computing, and many others.

    The author (Muhammad Naeem) would like to thank the Deanship of Scientific Research at Umm Al-Qura University for supporting this work by Grant Code: 22UQU4310396DSR41.

    The authors declare no conflict of interest.



    [1] C. A. Bana e Costa, P. Vincke, Multiple criteria decision aid: An overview, Readings in multiple criteria decision aid, Springer, Berlin, Heidelberg, 1990, 3–14.
    [2] L. A. Zadeh, Fuzzy sets, Inf. Control., 8 (1965), 338–353. https://doi.org/10.1016/S0019-9958(65)90241-X doi: 10.1016/S0019-9958(65)90241-X
    [3] K. T. Atanassov, Intuitionistic fuzzy sets, In Intuitionistic fuzzy sets, Physica, Heidelberg, 1999.
    [4] G. Qian, H. Wang, X. Feng, Generalized hesitant fuzzy sets and their application in decision support system, Knowl.-Based Syst., 37 (2013), 357–365. https://doi.org/10.1016/j.knosys.2012.08.019 doi: 10.1016/j.knosys.2012.08.019
    [5] V. Torra, Hesitant fuzzy sets, Int. J. Intell. Syst., 25 (2010), 529–539. https://doi.org/10.1002/int.20418 doi: 10.1002/int.20418
    [6] R. M. Rodriguez, L. Martinez, F. Herrera, Hesitant fuzzy linguistic term sets for decision making, IEEE T. Fuzzy Syst., 20 (2011), 109–119. https://doi.org/10.1109/TFUZZ.2011.2170076 doi: 10.1109/TFUZZ.2011.2170076
    [7] V. Torra, Y. Narukawa, On hesitant fuzzy sets and decision, In 2009 IEEE International Conference on Fuzzy Systems, IEEE, 2009, 1378–1382. https://doi.org/10.1109/FUZZY.2009.5276884
    [8] S. Faizi, T. Rashid, W. Sałabun, S. Zafar, J. Wkatró bski, Decision making with uncertainty using hesitant fuzzy sets, Int. J. Fuzzy Syst., 20 (2018), 93–103. https://doi.org/10.1007/s40815-017-0313-2 doi: 10.1007/s40815-017-0313-2
    [9] N. Chen, Z. Xu, M. Xia, Interval-valued hesitant preference relations and their applications to group decision making, Knowl. Based Syst., 37 (2013), 528–540. https://doi.org/10.1016/j.knosys.2012.09.009 doi: 10.1016/j.knosys.2012.09.009
    [10] G. Wei, X. Zhao, R. Lin, Some hesitant interval-valued fuzzy aggregation operators and their applications to multiple attribute decision making, Knowl. Based Syst., 46 (2013), 43–53. https://doi.org/10.1016/j.knosys.2013.03.004 doi: 10.1016/j.knosys.2013.03.004
    [11] S. Ashraf, S. Abdullah, T. Mahmood, F. Ghani, T. Mahmood, Spherical fuzzy sets and their applications in multi-attribute decision making problems, J. Intell. Fuzzy Syst., 36 (2019), 2829–2844. https://doi.org/10.3233/JIFS-172009 doi: 10.3233/JIFS-172009
    [12] R. R. Yager, Pythagorean membership grades in multicriteria decision making, IEEE T. Fuzzy Syst., 22 (2013), 958–965. https://doi.org/10.1109/TFUZZ.2013.2278989 doi: 10.1109/TFUZZ.2013.2278989
    [13] L. Wang, M. Ni, Z. Yu, L. Zhu, Power geometric operators of hesitant multiplicative fuzzy numbers and their application to multiple attribute group decision making, Math. Probl. Eng., 2014 (2014), 186502. https://doi.org/10.1155/2014/186502 doi: 10.1155/2014/186502
    [14] R. M. Rodríguez, L. Martínez, F. Herrera, Hesitant fuzzy linguistic term sets for decision-making, IEEE T. Fuzzy Syst., 20 (2012), 109–119. https://doi.org/10.1109/TFUZZ.2011.2170076 doi: 10.1109/TFUZZ.2011.2170076
    [15] Z. M. Zhang, C. Wu, Hesitant fuzzy linguistic aggregation operators and their applications to multiple attribute group decision-making, J. Intell. Fuzzy Syst., 26 (2014), 2185–2202. https://doi.org/10.3233/IFS-130893 doi: 10.3233/IFS-130893
    [16] J. Ye, Correlation coefficient of dual hesitant fuzzy sets and its application to multiple attribute decision making, Appl. Math. Model., 38 (2014), 659–666. https://doi.org/10.1016/j.apm.2013.07.010 doi: 10.1016/j.apm.2013.07.010
    [17] B. Zhu, Z. Xu, M. Xia, Dual hesitant fuzzy sets, J. Appl. Math., 2012 (2012). https://doi.org/10.1155/2012/879629 doi: 10.1155/2012/879629
    [18] G. Qian, H. Wang, X. Feng, Generalized hesitant fuzzy sets and their application in decision support system, Knowl.-Based Syst., 37 (2013), 357–365. https://doi.org/10.1016/j.knosys.2012.08.019 doi: 10.1016/j.knosys.2012.08.019
    [19] J. Liu, M. Sun, Generalized power average operator of hesitant fuzzy numbers and its application in multiple attribute decision making, J. Comput. Inform. Syst., 9 (2013), 3051–3058.
    [20] M. Xia, Z. Xu, Hesitant fuzzy information aggregation in decision making, Int. J. Approx. Reason., 52 (2011), 395–407. https://doi.org/10.1016/j.ijar.2010.09.002 doi: 10.1016/j.ijar.2010.09.002
    [21] Z. Xu, X. Zhang, Hesitant fuzzy multi-attribute decision making based on TOPSIS with incomplete weight information, Knowl.-Based Syst., 52 (2013), 53–64. https://doi.org/10.1016/j.knosys.2013.05.011 doi: 10.1016/j.knosys.2013.05.011
    [22] D. Yu, Y. Wu, W. Zhou, Multi-criteria decision making based on Choquet integral under hesitant fuzzy environment, J. Comput. Inform. Syst., 7 (2011), 4506–4513.
    [23] F. Smarandache, A unifying field in logics, Neutrosophy: Neutrosophic probability, set and logic, 2005.
    [24] J. Ye, A multicriteria decision-making method using aggregation operators for simplified neutrosophic sets, J. Intell. Fuzzy Syst., 26 (2014), 2459–2466. https://doi.org/10.3233/IFS-130916 doi: 10.3233/IFS-130916
    [25] J. Ye, Multiple-attribute decision-making method under a single-valued neutrosophic hesitant fuzzy environment, J. Intell. Syst., 24 (2015), 23–36. https://doi.org/10.1515/jisys-2014-0001 doi: 10.1515/jisys-2014-0001
    [26] B. Farhadinia, Neutrosophic hesitant fuzzy set, In Hesitant Fuzzy Set, Springer, Singapore, 2021, 55–62.
    [27] S. Ashraf, S. Abdullah, F. Smarandache, N. U. Amin, Logarithmic hybrid aggregation operators based on single valued neutrosophic sets and their applications in decision support systems, Symmetry, 11 (2019), 364. https://doi.org/10.3390/sym11030364 doi: 10.3390/sym11030364
    [28] D. Ripley, Paraconsistent logic, J. Philos. Logic, 44 (2015), 771–780. https://doi.org/10.1007/s10992-015-9358-6 doi: 10.1007/s10992-015-9358-6
    [29] F. Smarandache, Neutrosophic set–-a generalization of the intuitionistic fuzzy set, J. Def. Resour. Manag., 1 (2010), 107–116. https://doi.org/10.1109/GRC.2006.1635754 doi: 10.1109/GRC.2006.1635754
    [30] H. Wang, F. Smarandache, Y. Zhang, R. Sunderraman, Single valued neutrosophic sets, Infinite Study, 2010.
    [31] H. Kamacı, Linguistic single-valued neutrosophic soft sets with applications in game theory, Int. J. Intell. Syst., 36 (2021), 3917–3960. https://doi.org/10.1002/int.22445 doi: 10.1002/int.22445
    [32] R. P. Tan, W. D. Zhang, Decision-making method based on new entropy and refined single-valued neutrosophic sets and its application in typhoon disaster assessment, Appl. Intell., 51 (2021), 283–307. https://doi.org/10.1007/s10489-020-01706-3 doi: 10.1007/s10489-020-01706-3
    [33] C. Jana, M. Pal, Multi-criteria decision making process based on some single-valued neutrosophic Dombi power aggregation operators, Soft Comput., 25 (2021), 5055–5072. https://doi.org/10.1007/s00500-020-05509-z doi: 10.1007/s00500-020-05509-z
    [34] O. A. Razzaq, M. Fahad, N. A. Khan, Different variants of pandemic and prevention strategies: A prioritizing framework in fuzzy environment, Results Phys., 28 (2021), 104564. https://doi.org/10.1016/j.rinp.2021.104564 doi: 10.1016/j.rinp.2021.104564
    [35] P. Rani, J. Ali, R. Krishankumar, A. R. Mishra, F. Cavallaro, K. S. Ravichandran, An integrated single-valued neutrosophic combined compromise solution methodology for renewable energy resource selection problem, Energies, 14 (2021), 4594. https://doi.org/10.3390/en14154594 doi: 10.3390/en14154594
    [36] S. Ashraf, S. Abdullah, S. Zeng, H. Jin, F. Ghani, Fuzzy decision support modeling for hydrogen power plant selection based on single valued neutrosophic sine trigonometric aggregation operators, Symmetry, 12 (2020), 298. https://doi.org/10.3390/sym12020298 doi: 10.3390/sym12020298
    [37] S. Ashraf, S. Abdullah, Decision support modeling for agriculture land selection based on sine trigonometric single valued neutrosophic information, Int. J. Neutros. Sci., 9 (2020), 60–73.
    [38] H. Kamacı, H. Garg, S. Petchimuthu, Bipolar trapezoidal neutrosophic sets and their Dombi operators with applications in multicriteria decision making, Soft Comput., 25 (2021), 8417–8440. https://doi.org/10.1007/s00500-021-05768-4 doi: 10.1007/s00500-021-05768-4
    [39] H. Kamacı, S. Petchimuthu, E. Akçetin, Dynamic aggregation operators and Einstein operations based on interval-valued picture hesitant fuzzy information and their applications in multi-period decision making, Comput. Appl. Math., 40 (2021), 1–52. https://doi.org/10.1007/s40314-021-01510-w doi: 10.1007/s40314-021-01510-w
    [40] R. M. Zulqarnain, X. L. Xin, M. Saqlain, W. A. Khan, TOPSIS method based on the correlation coefficient of interval-valued intuitionistic fuzzy soft sets and aggregation operators with their application in decision-making, J. Math., 2021 (2021). https://doi.org/10.1155/2021/6656858 doi: 10.1155/2021/6656858
    [41] S. Naz, M. Akram, A. B. Saeid, A. Saadat, Models for MAGDM with dual hesitant q-rung orthopair fuzzy 2-tuple linguistic MSM operators and their application to COVID-19 pandemic, Expert Systems, 39 (2022), e13005. https://doi.org/10.1111/exsy.13005 doi: 10.1111/exsy.13005
  • This article has been cited by:

    1. Muhammad Kamran, Rashad Ismail, Esmail Hassan Abdullatif Al-Sabri, Nadeem Salamat, Muhammad Farman, Shahzaib Ashraf, An Optimization Strategy for MADM Framework with Confidence Level Aggregation Operators under Probabilistic Neutrosophic Hesitant Fuzzy Rough Environment, 2023, 15, 2073-8994, 578, 10.3390/sym15030578
    2. Muhammad Kamran, Rashad Ismail, Shahzaib Ashraf, Nadeem Salamat, Seyma Ozon Yildirim, Ismail Naci Cangul, Decision support algorithm under SV-neutrosophic hesitant fuzzy rough information with confidence level aggregation operators, 2023, 8, 2473-6988, 11973, 10.3934/math.2023605
    3. Misbah Rasheed, ElSayed Tag-Eldin, Nivin A. Ghamry, Muntazim Abbas Hashmi, Muhammad Kamran, Umber Rana, Decision-making algorithm based on Pythagorean fuzzy environment with probabilistic hesitant fuzzy set and Choquet integral, 2023, 8, 2473-6988, 12422, 10.3934/math.2023624
    4. Muhammad Kamran, Shahzaib Ashraf, Nadeem Salamat, Muhammad Naeem, Thongchai Botmart, Correction: Cyber security control selection based decision support algorithm under single valued neutrosophic hesitant fuzzy Einstein aggregation information, 2023, 8, 2473-6988, 13795, 10.3934/math.2023705
    5. Muhammad Kamran, Shahzaib Ashraf, Shahid Kalim Khan, Aamir Hussain Khan, Hedia Zardi, Saba Mehmood, Integrated decision-making framework for hospital development: A single-valued neutrosophic probabilistic hesitant fuzzy approach with innovative aggregation operators, 2024, 34, 0354-0243, 515, 10.2298/YJOR230915034K
    6. Muhammad Kamran, Shahzaib Ashraf, Muhammad Naeem, A promising approach for decision modeling with single-valued neutrosophic probabilistic hesitant fuzzy Dombi operators, 2023, 33, 0354-0243, 549, 10.2298/YJOR230115007S
    7. Yi Zhao, Fangwei Zhang, Bing Han, Jun Ye, Jingyuan Li, A novel parameterized neutrosophic score function and its application in genetic algorithm, 2024, 10, 2376-5992, e2117, 10.7717/peerj-cs.2117
    8. Muhammad Kamran, Shahzaib Ashraf, Muhammad Shazib Hameed, A promising approach with confidence level aggregation operators based on single-valued neutrosophic rough sets, 2023, 1432-7643, 10.1007/s00500-023-09272-9
    9. Esmail Hassan Abdullatif Al-Sabri, Muhammad Rahim, Fazli Amin, Rashad Ismail, Salma Khan, Agaeb Mahal Alanzi, Hamiden Abd El-Wahed Khalifa, Multi-criteria decision-making based on Pythagorean cubic fuzzy Einstein aggregation operators for investment management, 2023, 8, 2473-6988, 16961, 10.3934/math.2023866
    10. Aditya Makwe, Priyesh Kanungo, Sandeep Kautish, Golla Madhu, Abdulaziz S. Almazyad, Guojiang Xiong, Ali Wagdy Mohamed, Cloud service prioritization using a Multi-Criteria Decision-Making technique in a cloud computing environment, 2024, 15, 20904479, 102785, 10.1016/j.asej.2024.102785
    11. Fangui Meng, Aimin Liu, Yan Hu, Da Ren, Yao Liu, Xin Zhang, A Control Method for Path Following of AUVs Considering Multiple Factors Under Ocean Currents, 2024, 12, 2077-1312, 2045, 10.3390/jmse12112045
    12. Harish Garg, A new exponential-logarithm-based single-valued neutrosophic set and their applications, 2024, 238, 09574174, 121854, 10.1016/j.eswa.2023.121854
    13. Muhammad Kamran, Nadeem Salamat, Chiranjibe Jana, Qin Xin, Decision-making technique with neutrosophic Z-rough set approach for sustainable industry evaluation using sine trigonometric operators, 2024, 15684946, 112539, 10.1016/j.asoc.2024.112539
    14. Nadeem Salamat, Muhammad Kamran, Shahzaib Ashraf, Manal Elzain Mohammed Abdulla, Rashad Ismail, Mohammed M. Al-Shamiri, Complex Decision Modeling Framework with Fairly Operators and Quaternion Numbers under Intuitionistic Fuzzy Rough Context, 2024, 139, 1526-1506, 1893, 10.32604/cmes.2023.044697
    15. Muhammad Rahim, Sanaa Ahmed Bajri, Haifa Alqahtani, Somayah Abdualziz Alhabeeb, Hamiden Abd El-Wahed Khalifa, Multi-criteria Group Decision-Making Using Complex p, q-Quasirung Orthopair Fuzzy Sets: Application in the Selection of Renewable Energy Projects for Investments, 2025, 17, 1866-9956, 10.1007/s12559-025-10424-2
  • Reader Comments
  • © 2023 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(1664) PDF downloads(85) Cited by(15)

Figures and Tables

Figures(1)  /  Tables(3)

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog