
For large sparse quasi-complementarity problem (QCP), Wu and Guo [
Citation: Chen-Can Zhou, Qin-Qin Shen, Geng-Chen Yang, Quan Shi. A general modulus-based matrix splitting method for quasi-complementarity problem[J]. AIMS Mathematics, 2022, 7(6): 10994-11014. doi: 10.3934/math.2022614
[1] | Serap Özcan . Some integral inequalities of Hermite-Hadamard type for multiplicatively preinvex functions. AIMS Mathematics, 2020, 5(2): 1505-1518. doi: 10.3934/math.2020103 |
[2] | Muhammad Tariq, Asif Ali Shaikh, Sotiris K. Ntouyas, Jessada Tariboon . Some novel refinements of Hermite-Hadamard and Pachpatte type integral inequalities involving a generalized preinvex function pertaining to Caputo-Fabrizio fractional integral operator. AIMS Mathematics, 2023, 8(11): 25572-25610. doi: 10.3934/math.20231306 |
[3] | Humaira Kalsoom, Muhammad Amer Latif, Muhammad Idrees, Muhammad Arif, Zabidin Salleh . Quantum Hermite-Hadamard type inequalities for generalized strongly preinvex functions. AIMS Mathematics, 2021, 6(12): 13291-13310. doi: 10.3934/math.2021769 |
[4] | Haoliang Fu, Muhammad Shoaib Saleem, Waqas Nazeer, Mamoona Ghafoor, Peigen Li . On Hermite-Hadamard type inequalities for n-polynomial convex stochastic processes. AIMS Mathematics, 2021, 6(6): 6322-6339. doi: 10.3934/math.2021371 |
[5] | Muhammad Tariq, Hijaz Ahmad, Abdul Ghafoor Shaikh, Soubhagya Kumar Sahoo, Khaled Mohamed Khedher, Tuan Nguyen Gia . New fractional integral inequalities for preinvex functions involving Caputo-Fabrizio operator. AIMS Mathematics, 2022, 7(3): 3440-3455. doi: 10.3934/math.2022191 |
[6] | Tekin Toplu, Mahir Kadakal, İmdat İşcan . On n-Polynomial convexity and some related inequalities. AIMS Mathematics, 2020, 5(2): 1304-1318. doi: 10.3934/math.2020089 |
[7] | Sabila Ali, Rana Safdar Ali, Miguel Vivas-Cortez, Shahid Mubeen, Gauhar Rahman, Kottakkaran Sooppy Nisar . Some fractional integral inequalities via h-Godunova-Levin preinvex function. AIMS Mathematics, 2022, 7(8): 13832-13844. doi: 10.3934/math.2022763 |
[8] | Shuang-Shuang Zhou, Saima Rashid, Muhammad Aslam Noor, Khalida Inayat Noor, Farhat Safdar, Yu-Ming Chu . New Hermite-Hadamard type inequalities for exponentially convex functions and applications. AIMS Mathematics, 2020, 5(6): 6874-6901. doi: 10.3934/math.2020441 |
[9] | Muhammad Tariq, Soubhagya Kumar Sahoo, Fahd Jarad, Bibhakar Kodamasingh . Some integral inequalities for generalized preinvex functions with applications. AIMS Mathematics, 2021, 6(12): 13907-13930. doi: 10.3934/math.2021805 |
[10] | M. Emin Özdemir, Saad I. Butt, Bahtiyar Bayraktar, Jamshed Nasir . Several integral inequalities for (α, s,m)-convex functions. AIMS Mathematics, 2020, 5(4): 3906-3921. doi: 10.3934/math.2020253 |
For large sparse quasi-complementarity problem (QCP), Wu and Guo [
Abbreviations | Name |
MADM | Multiple Attributive decision making |
FFN | Fermatean fuzzy number |
DMs | Decision matrixes |
SSTT | Schweizer-Sklar t-norm and t-conorm |
FF | Fermatean fuzzy |
IFS | Intuitionistic fuzzy set |
BT | Blockchain technology |
MCDM | Multiple criteria decision making |
ICT | information communications technology |
FFSSTWA | Fermatean fuzzy Schweizer-Sklar t-norm weighted average |
FFSSTOWA | Fermatean fuzzy Schweizer-Sklar t-norm ordered weighted average |
FFSSTHWA | Fermatean fuzzy Schweizer-Sklar t-norm hybrid weighted average |
FFSSTWG | Fermatean fuzzy Schweizer-Sklar t-norm weighted geometric |
FFSSTOWG | Fermatean fuzzy Schweizer-Sklar t-norm ordered weighted geometric |
FFSSTHWG | Fermatean fuzzy Schweizer-Sklar t-norm hybrid weighted geometric |
AHP | Analytic hierarchy process |
The uncertainty and complexity of decision-making information have an impact on decision-making results. To describe decision-making information more accurately and truly, Zadeh [10] introduced fuzzy set theory. One of the most successful and promising adaptations of the Zadeh notion is the intuitionistic fuzzy set (IFS) [1] theory. Colak et al. [2] exhibited the criteria and sub-criteria for performance assessment of Blockchain Technology (BT) in supply chain management. The weights of main and sub-criteria have been attained through HF-AHP method, and a categorized MCDM problem that comprises of 5 main and 17 sub-criteria has been established and the alternative segments have been analyzed. A decision model for selecting the finest blockchain platform has been exhibited by Farshidi et al. [3]. The stated model has been assessed with three case studies of real problems. Cognitive function methods based on FST and Decision-Making Trail and Evaluating Laboratory (DEMATEL), MCDM methodology has been introduced by Karaşan et al. [4].
For instance, the depositor wishes an agreement to choose the most efficient enterprise according to avert asset risk than secure the highest payback, yet the organization desires in imitation of assessing its automation degree before improving it. Usually, whole its things to do, need conformity and remain evaluated along respect in conformity with several attributes, as are additionally acknowledged as MADM issues yet are entirely frequent between our daily life. MADM is a condition confronted when persons together brand an excellent from the replacements with deference to a usual attribute. MADM difficulties inhabit vital situations in the arena of culture decision making. For sample, the depositor desires to choose the optimum business to avoid venture danger and gain the supreme reappearance, and the innovativeness. MADM problems have conventional countless considerations in the historical few decades. The MCDM techniques are represented in Figure 1.
Lin et al. [5] presented reviewed blockchain-based theories connected with ICT-based technology. Tang et al. [7] presented assessment statistics and the ranking results of public blockchains.
A generic class of intuitionistic and Pythagorean sets is known as q-rung Orthopair fuzzy sets which was suggested by Yager [8]. Orthopair fuzzy subsets are such that the degree of support for membership in the fuzzy set and the degree of support against membership are indicated by pairs of values from the unit interval in the membership grades. We noticed that the q-rung Orthopair fuzzy sets where the qth power of the support for and qth power of the support against are sum together and bonded by one. We observe that when q rises, the range of acceptable Orthopair expands, giving the user greater latitude in expressing their opinion regarding membership grade. The key properties and features of the blockchain were provided by Yaqoob et al. [9]. We go over the top benefits of implementing blockchain technology as well as potential for the healthcare sector. Zhang et al. [11] suggested a cyber security paradigm with human-in-the-loop intelligence based on the limitations and challenges. Zhou et al. [12] presented a new PF-VIKOR method considering the DM's choice for risk, a new way to estimate the distance that is presented in detail, and a difficulty with choosing the best blockchain technology solution.
Senapati et al. [13] developed the Fermatean fuzzy TOPSIS method to address the problem of multiple criteria decision-making. The approach for the MCDM issue considering new operators under the Fermatean fuzzy condition was provided by Senapati et al. [14]. The Fermatean fuzzy weighted product model was presented by Senapati et al. [15] to address the multi-criteria decision-making issue. Type-2 fuzzy sets were presented by Own [16], as well as the relationship between type-2 fuzzy sets and intuitionistic fuzzy sets. Mondal et al. [17] developed the notion of the tangent similarity measure of intuitionistic fuzzy sets.
Deng et al. [18] introduced the matters in the outranking relative secret into three diverse areas by a clustering technique. Wang et al. [19] presented uniqueness of the essential fixings for the regret philosophy of the regret-rejoice function and hesitant fuzzy environments. Deng et al. [20] introduced the renovate the multi-scale assessment data into an interval fuzzy number by applying a linguistic term set. Zhan et al. [21] introduced the Triple interactive executive with hesitant fuzzy data. Gai et al. [22] presented dependable capitals to facilitate the attainment of cluster consensus. An approach based on large-scale group decision making (LSGDM) and online reviews is proposed by Feixia Ji et al. [23] to assess user satisfaction with shared living. Wu et al. [24] presented an optimization model built to minimize the total adjustment cost of reaching consensus by determining the personalized feedback adoption coefficient based on individuals' consensus levels. This method reflects both the subjective assessments of the constant standards and the unique risk perspectives about innovation.
Different variations of the Fermatean fuzzy set were introduced by Akram and other scholars, we summarized these as follows. Akram et al. [25] introduced the Fermatean fuzzy soft expert knowledge. Akram et al. [26] introduction complex Fermatean fuzzy N-soft sets. Akram et al [27] introduced the objective functions that should be maximized. Akram et al. [28] developed a novel MCGDM analysis by fusing soft expert sets with m-polar fuzzy sets, he also looked into their structural characteristics, as well as the subset, complement, intersection, union, and OR and AND operators. Alcantud et al. [29] proposed a novel theory for the aggregation of N-soft sets, initial scores of alternatives, determined by multi-agent, multinary evaluations. Akram et al. [30] presented 2TLCq-RPF aggregation operators, including 2TLCq-RPF weighted averaging/geometric operators, sophisticated aggregation operators based on the Hamacher operator key characteristics of the new operators, and multi-attribute decision making strategy for problems posed in the 2TLCq-RPFS setting. The algebraic and Einstein operations are extended by the Hamacher operation. The technique based on the Combined Compromise Solution (COCOSO) with Criteria Importance was developed by Akram et al. [31] by combining 2-tuple linguistic Fermatean fuzzy (2TLFF) numbers and the Hamacher operation. Issues with multiple attribute group decision-making (MAGDM) in a 2TLFF context can be managed by Criteria Importance Through inter-criteria correlation (CRITIC). Different extensions of the fuzzy set and their interrelationship have been described in Figure 2.
In accordance with the available literature and magnificent structure of innovation, we define the standard criteria to comprehensively grade the blockchain skill beneficiaries' performance concerning the reopen allowance for chief circles. We define the Fermatean fuzzy Schweizer-Sklar Operators, which can inarticulacy and hesitations in verdicts due to deficient postulation and sharing related, to gain the criterion weights with FF statistics. We use the Fermatean fuzzy Schweizer-Sklar Operators, determining the inclusive authority ranking for each pretender, and active the entrants in dropping direction sighted the DM's threat need regarding a blockchain by decisive the reduction subject of the affronted.
The standards and techniques for evaluating blockchain capabilities, phases, crops, and suppliers are briefly evaluated. This establishes the framework for developing the standards for selecting the best blockchain knowledge provider for primary sets of financial organizations to link blockchain expertise throughout the process of cross-border transmittal.
The goals and motivations of this paper are:
(1) To endorse the notion of FFS.
(2) Investigate the structure of FFSSTWA operators.
(3) Suggest an SSTT operation for FF components.
(4) To suggest an innovative technique for MADM founded on the planned operators. Congruently, the offerings of this paper are:
i. We presented an intimate of data aggregation operators by joining the FFS and SST operators founded on SSTT functioning rules.
ii. We provide a universal background of the proposed technique to MADM complications.
iii. Offered process to innovativeness statistics and assessment.
The break of this paper is systematized as follows: Section 2, discussed FFN and operational laws. Section 3 remembrances approximately plain designs and provides the SSTT operational rules established on FFS. Section 4 proposes a series of FFN aggregation operators. Section 5 presents an innovative method to MADM. Section 6 delivers a mathematical example to authenticate the rationality and qualities of the proposed viewpoint. Section 7, we discuss in the conclusion. Finally, interdependency of the different sections of the paper has been exhibited in Figure 9.
We recall some basic concepts of Fuzzy set in this section, to understand the paper. Zadeh introduced the fuzzy set [10]. We recall this as follows.
Definition 2.1. [10] Let us consider that Φ≠H and by a fuzzy set γ={⟨y,ηγ(y)⟩:y∈H},ηγ(y) is a mapping from H to [0,1] characterize membership task of an component y in H.
FFN and operational laws
Fermatean Fuzzy Numbers (FFN) and their operational laws, score and accuracy functions were defined by Senapati et al. [14], we recall it's as follows.
Definition 2.1.1. [14] The fixed setE and the FFN F is defined in F={⟨ςF(y),χF(y)⟩:y∈E}, anywhere ςF(y) and χF(y) characterize the MED and NOMED, and ςF(y)∈[0,1], χF(y)∈[0,1] and 0⩽ςF(y)3+χF(y)3⩽1. The grade of indeterminacy is defined as πF(y)=3√(ςF(y)3+χF(y)3−ςF(y)3χF(y)3). The FFN is indicated as F=⟨ςF,χF⟩.
Operational laws of FFNs are described as follows:
Definition 2.1.2. [14] Let a1={ς1,χ1} and a2={ς2,χ2} be two FFNs, λ>0, then.
a1⊕a2=[3√(ς31+ς32−ς31ς32),χ1χ2]; |
a1⊗a2=[ς1ς2,3√(χ31+χ32−χ31χ32)]; |
λa1=[3√1−(1−ς31)λ,χ,χλ1]; |
aλ1=[ςλ1,3√1−(1−χ31)λ]. |
Definition 2.1.3. [14] Let ϖ={υ,δ},be the FFNs, then the score is ϖ={υ3−δ3}.
Definition 2.1.4. [14] Letϖ={υ,δ},be the FFNs, then the accuracy is ϖ={υ3+δ3}.
The descriptions of Schweizer-Sklar t-norm and t-conorm are offered as follows:
T(f,e)=(fΓ+eΓ−1)1ΓT(x,y)=1−((1−f)Γ+(1−e)Γ−1)1Γ |
where Γ<0,f,e∈[0,1]. Additionally, when Γ→0, we have
T(f,e)=fe and T(f,e)=f+e−fe.
They are the statistical t-norm and statistical t-conorm.
FFN operational laws founded on Schweizer-Sklar Operators
Definition 3.1.1. Let a1=[η1,κ1] and a2=[η2,κ2] be two FFNs based on SST operator and Γ>0, then,
a1⊕a2=[3√1−((1−(η31))Γ+(1−(η32))Γ−1)1Γ,(κΓ1+κΓ2−1)1Γ]; |
a1⊗a2=[(ηΓ1+ηΓ2−1)1Γ,3√1−((1−(η31))Γ+(1−(η32))Γ−1)1Γ]; |
na1=[3√1−(n(1−(η31))Γ+(n−1))1Γ,(nκΓ1+(n−1))1Γ]; |
an1=[(nηΓ1+(n−1))1Γ,3√1−(n(1−(κ31))Γ+(n−1))1Γ]. |
In this section, FFSSTWA, FFSSTOWA, FFSSTHWA, FFSSTWG, FFSSTOWG and FFSSTHWG operators are defined and graphically represented their interrelationship, see Figure 3.
Definition 4.1.1. The collection of FFNs are cj=[η,κ] and the weight vector is e=(e1,e2,...,en)T with ej∈[0,1] and n∑j=1ej=1. Then FFSST(c1,c2,...,cn)=n⊕j=1ejcj
is assumed to be a FFSSTWA operator.
Theorem 4.1.2. The collection of FFNs gj={[η,ϕ]} and the weight vector is χ=(χ1,χ2,...,χn)T with χj∈[0,1] and n∑j=1χj=1. Then it will be a FFSSTWA operator and
FFSSTWA(g1,g2,...,gn)=[3√1−n∏j=1(ρ(1−(η3j))χ+(ρ−1))1χ,(ρn∏j=1ϕχj+(ρ−1))1χ]. |
Proof. By induction on n, we will continue. If n is 1 then
χ1g1=[3√1−1∏j=1(ρ(1−(η31))χ1+(ρ−1))1χ1,(ρ1∏j=1ϕχ11+(ρ−1))1χ1] |
χ2g2=[3√1−2∏j=1(ρ(1−(η32))χ2+(ρ−1))1χ1,(ρ2∏j=1ϕχ22+(ρ−1))1χ2] |
χ1g1⊕χ2g2=[3√1−1∏j=1(ρ(1−(η31))χ1+(ρ−1))1χ1,(ρ1∏j=1ϕχ11+(ρ−1))1χ1]⊕ |
[3√1−2∏j=1(ρ(1−(η32))χ2+(ρ−1))1χ2,(ρ2∏j=1ϕχ22+(ρ−1))1χ2]. |
Let the statement is true for n=k
FFSSTWA(a1,a2,...,an)=[3√1−k∏j=1(ρ(1−(η3j))χ+(ρ−1))1χ,(ρk∏j=1ϕϑj+(ρ−1))1χ]. |
Now for n=k+1
FFSSTWA(a1,a2,...,an)=[3√1−k+1∏j=1(ρ(1−(η3j))χ+(ρ−1))1χ,(ρk+1∏j=1ϕχ1+(ρ−1))1χ]. |
The following theorems' proofs are simple; therefore, we skip them.
Theorem 4.1.3. (Idempotency): If ⌢Y=[κ,ς] for all h=1,2,3,...,m, then
FFSSTWA(Y,Y,Y,...,Y)=Y. |
Theorem 4.1.4. (Commutativity): If (d′1,d′2,...,d′n) is any permutation of (d1,d2,...,dn), then FFSSTWA (d′1,d′2,...,d′n)= FFSSTWA (d1,d2,...,dn).
Theorem 4.1.5. (Boundedness): If Y−=min(d1,d2,...,dn),Y+=max(d1,d2,...,dn), then Y−⩽FFSSTWA(d1,d2,...,dn)⩽Y+.
Definition 4.2.1. The gathering of FFNs are ck=[η,ϕ] and the weight vector is h=(h1,h2,...,hm)T with hk∈[0,1] and m∑k=1hk=1.The
FFSST(c1,c2,...,cm)=m⊕k=1hkck |
is said to be FFSSTOWA operator.
The proof of the following theorems is straightforward, and we omit it.
Theorem 4.2.2. The collection of FFNs are fk={[η,ϕ]} and the weight vector is ϑ=(ϑ1,ϑ2,...,ϑn)T with ϑj∈[0,1] and n∑k=1ϑk=1. Then it will be a FFSSTOWA operator and
FFSSTOWA(f1,f2,...,fn)=[3√1−n∏k=1(ρ(1−(η3k))ϑ+(ρ−1))1ϑ,(ρn∏k=1ϕϑk+(ρ−1))1ϑ]. |
The proof of the following theorems is straightforward, and we omit it.
Theorem 4.2.3. (Idempotency): If ⌢Y=[κ,ς] for all r=1,2,3,...,m, then FFSSTOWA(Y,Y,Y,...,Y)=Y.
Theorem 4.2.4. (Commutativity): If (d′1,d′2,...,d′n) is any permutation of (d1,d2,...,dn), then FFSSTOWA (d′1,d′2,...,d′n)=FFSSTOWA (d1,d2,...,dn)
Theorem 4.2.5. (Boundedness): If Y−=min(e1,e2,...,en),Y+=max(e1,e2,...,en), then Y−⩽FFSSTOWA(e1,e2,...,en)⩽Y+.
Definition 4.3.1. The congregation of FFNs are cj=[η,φ] and the weight vector is g=(g1,g2,...,gn)T with gj∈[0,1] and n∑j=1gj=1. Then FFSST(c1,c2,...,cn)=n⊕j=1gjcj
will be a FFSSTHWA operator.
The proof of the following theorems is straightforward, and we omit it.
Theorem 4.3.2. The gathering of FFNs are gj={[η,ϕ]} and the weight vector is u=(u1,u2,...,un)T with uj∈[0,1] and n∑j=1uj=1. Then it is held FFSSTHWA operator and
FFSSTHWA(g1,g2,...,gn)=[3√1−n∏j=1(ρ(1−(η3j))u+(ρ−1))1ϑ,(ρn∏j=1ϕuj+(ρ−1))1ϑ]. |
Theorem 4.3.3. (Idempotency): If ⌢O=[κ,ς] for all k=1,2,3,...,n, then FFSSTHWA (O,O,O,...,O)=O.
Theorem 4.3.4. (Commutativity): If (e′1,e′2,...,e′m) is any permutation of (e1,e2,...,em), then FFSSTHWA (e′1,e′2,...,e′m)=FFSSTHWA (e1,e2,...,em).
Theorem 4.3.5. (Boundedness): If Y−=min(d1,d2,...,dm),Y+=max(d1,d2,...,dm), then Y−⩽ FFSSTHWA (d1,d2,...,dm)⩽Y+.
Definition 4.4.1. The congregation of FFNs are ck=[η,ϕ] and the weight vector is f=(f1,f2,...,fm)T with fk∈[0,1] and m∑k=1fk=1. Then FFSST(c1,c2,...,cm)=m⊕k=1cfkk
is said FFSSTWG operator.
Theorem 4.4.2. The collection of FFNs are dj={[η,ϕ]} and the weight vector is e=(e1,e2,...,em)T with ej∈[0,1] and m∑j=1ej=1. Then it is held FFSSTWG operator and
FFSSTWG(d1,d2,...,dm)=[(ρm∏j=1ηej+(ρ−1))1e,3√1−m∏j=1(ρ(1−(ϕ31))e+(ρ−1))1e]. |
Proof. By induction on m, we will continue. If m is 1 then
e1d1=[(ρ1∏j=1ηe1+(ρ−1))1e,3√1−1∏j=1(ρ(1−(ϕ31))e+(ρ−1))1e] |
e2d2=[(ρ2∏j=1ηe2+(ρ−1))1e,3√1−2∏j=1(ρ(1−(ϕ32))e+(ρ−1))1e]e1d1⊕e2d2=[(ρ1∏j=1ηe1+(ρ−1))1e,3√1−1∏j=1(ρ(1−(ϕ31))e+(ρ−1))1e]⊕[(ρ2∏j=1ηe2+(ρ−1))1e,3√1−2∏j=1(ρ(1−(ϕ32))e+(ρ−1))1e]. |
Let the statement is true for m=k
FFSSTWG(d1,d2,...,dm)=[(ρk∏j=1ηe1+(ρ−1))1e,3√1−k∏j=1(ρ(1−(ϕ31))e+(ρ−1))1e]. |
Now for m=k+1
FFSSTWG(d1,d2,...,dm)=[(ρk+1∏j=1ηe1+(ρ−1))1e,3√1−k+1∏j=1(ρ(1−(ϕ31))e+(ρ−1))1e]. |
The proof of the following theorems is straightforward, and we omit it.
Theorem 4.4.3 (Idempotency): If ⌢Y=[κ,ς] for all h=1,2,3,...,m, then FFSSTWG(Y,Y,Y,...,Y)=Y.
Theorem 4.4.4. (Commutativity): If (d′1,d′2,...,d′n) is some permutation of (d1,d2,...,dn), then FFSSTWG (d′1,d′2,...,d′n)=FFSSTWG (d1,d2,...,dn)
Theorem 4.4.5. (Boundedness): If Y−=min(d1,d2,...,dn),Y+=max(d1,d2,...,dn), then Y−⩽FFSSTWG(d1,d2,...,dn)⩽Y+.
Definition 4.5.1. The collection of FFNs are cj=[η,κ] and the weight vector is e=(e1,e2,...,en)T with ej∈[0,1] and n∑j=1ej=1. Then FFSST (c1,c2,...,cn)=n⊕j=1cejj is said FFSSTOWG operator.
The proof of the following theorems is straightforward, and we omit it.
Theorem 4.5.2. The gathering of FFNs are dj={[η,ϕ]} and the weight vector is e=(e1,e2,...,em)T with ej∈[0,1] and m∑j=1ej=1. Then it is held FFSSTOWG operator and
FFSSTOWG(d1,d2,...,dm)=[(ρm∏j=1ηe+(ρ−1))1e,3√1−m∏j=1(ρ(1−(ϕ3))e+(ρ−1))1e]. |
Theorem 4.5.3. (Idempotency): If ⌢Y=[κ,ς] for all h=1,2,3,...,n, then FFSSTOWG(Y,Y,Y,...,Y)=Y.
Theorem 4.5.4. (Commutativity): If (R′1,R′2,...,R′n) is any permutation of (R1,R2,...,Rn), then FFSSTOWG (R′1,R′2,...,R′n)=FFSSTOWG (R1,R2,...,Rn).
Theorem 4.5.5. (Boundedness): If Y−=min(L1,L2,...,Ln),Y+=max(L1,L2,...,Ln), then Y−⩽FFSSTOWG(L1,L2,...,Ln)⩽Y+.
Definition 4.6.1. The gathering of FFNs are cj=[η,ϕ] and the weight vector is e=(e1,e2,...,en)T with ej∈[0,1] and n∑j=1ej=1. Then FFSST(c1,c2,...,cn)=n⊗j=1cejj
is said FFSSTHWG operator.
The proof of the following theorems is straightforward, and we omit it.
Theorem 4.6.2. The collection of FFNs are dj={[η,ϕ]} and the weight vector is e=(e1,e2,...,en)T with ej∈[0,1] and n∑j=1ej=1. Then it is held FFSSTHWG operator and
FFSSTHWG(d1,d2,...,dn)=[(ρn∏j=1ηe+(ρ−1))1e,3√1−n∏j=1(ρ(1−(ϕ3))e+(ρ−1))1e]. |
Theorem 4.6.3. (Idempotency): If ⌢Y=[κ,ς] for all h=1,2,3,...,n, then FFSSTHWG(Y,Y,Y,...,Y)=Y.
Theorem 4.6.4. (Commutativity): If (d′1,d′2,...,d′n) is any permutation of (d1,d2,...,dn), then. FFSSTHWG(d′1,d′2,...,d′n)=FFSSTHWG(d1,d2,...,dn).
Theorem 4.6.5. (Boundedness): If Y−=min(d1,d2,...,dn),Y+=max(d1,d2,...,dn), then Y−⩽FFSSTHWG(d1,d2,...,dn)⩽Y+.
In this section we discuss the challenges of creative service collecting for major tiers or fiscal organizations by utilising a novel combination method that joins AHP with SST using FF data. To evaluate the work and the individual aspects of the innovation, a system of hierarchical evaluation criteria will be set up, able to balance strong presentation with obvious risks. The AHP is then applied to the FF scenery to quickly address the DMs' queries regarding the pairwise assessment of the relevant criteria, and to categorise the reliable criterion weights of the innovativeness dealers. The SST scheme is then added to the FF scenario to raise the suppliers' overall quality ratings while seeing the DMs' risk distaste concerning innovation. The position effects will quickly assess both the criteria's impartial values as well as the DMs' individual risk assurance through the blockchain. As a result, the proposed FF-AHP-SST technique address more effectively the problem of innovativeness worker collecting by considering the material topographies of innovativeness as well as the logical and emotional performance of DMs. Further graphically stepwise algorithm of proposed aggregation operators has been represented in Figure 4.
Innovativeness assortment, as a distinguishing MCDM problems, is done by gathering the decision mediums. Let A={A1,A2,...,An} signify sure dormant blockchain ability workers PS={PS1,PS2,...,PSn} denote weighty evaluative criteria transported by frequent specialists DM={DM1,DM2,...,DMn}, and the conforming vigorous of experts is signified by Δ=(Δ1,Δ2,...,Δn)T satisfying the situations n∑j=1Δj=1. Furthermore, the vigorous of the evaluative criteria is characterized by W=(W1,W2,⋯,Wn)T, consultation the ensuing environments: n∑j=1Wj=1. Each constituent in the decision medium means the appropriate aspirant's evaluative valuation on a persuaded principle from the DM.
Case 1.
Step 1: Designate the FF decision matrix.
Step 2: Designate the FFSSTHWA operator and ξ=(ξ1,ξ2,...,ξn).
FFSSTHWA(a1,a2,...,an)=[3√1−n∏j=1(ρ(1−(η31))ξ+(ρ−1))1ξ,(ρn∏j=1ϕξ1+(ρ−1))1ξ]. |
Step 3: Designate the FFSSTHWA operator and ξ=(ξ1,ξ2,...,ξn).
FFSSTHWA(a1,a2,...,an)=[3√1−n∏j=1(ρ(1−(η31))ξ+(ρ−1))1ξ,(ρn∏j=1ϕξ1+(ρ−1))1ξ]. |
Step 4: Find the level.
Case 2.
Step 1: Describe the FF decision matrix.
Step 2: Describe the FFSSTHWG operator and ξ=(ξ1,ξ2,...,ξn).
FFSSTHWG(a1,a2,...,an)=[(ρn∏j=1ηΓ1+(ρ−1))1Γ,3√1−n∏j=1(ρ(1−(ϕ31))Γ+(ρ−1))1Γ]. |
Step 3: Describe the FFSSTHWG operator and ξ=(ξ1,ξ2,...,ξn).
FFSSTHWG(a1,a2,...,an)=[(ρn∏j=1ηΓ1+(ρ−1))1Γ,3√1−n∏j=1(ρ(1−(ϕ31))Γ+(ρ−1))1Γ]. |
Step 4: Find the rank.
TE-FOOD is a community permissioned nourishment traceability system that enables all supply chain participants blockchain-based farm-to-table and customer trace of the food's data. The Food Chain (TE-FOOD's blockchain) is a community permissioned blockchain that lets supply chain performers and patrons uphold chief bulges to disperse traceability data. Customers of TE-FOOD use the flexibility to improve comprehensive perspectives into the stock restraint of food manufacture. TFD is symbolic of TE-ERC FOOD, which is classically abandoned on the wraithlike phase.
The situation, to provide visibility in the food stream shackle by guiding the products through the entire spring chain (farm, computer or abattoir, supplier, shop) and offering clients, supply chain businesses, and management activities with tools to study the history and perfection of food. The TE-FOOD aims to enhance customer confidence and communication, acquire better supply chain data to restore operating effectiveness, abide by spread guidelines, protect their products from counterfeiting, and carry out earlier invention memories.
The TE-Food system consists of diverse arenas:
Understanding tools it includes safety closures, tag stickers, 1D/2D barcodes, RFID ear stickers, and tag labels. Traceability management includes a mobile B2B (Business-to-Business) app, a web app, a dominating system, outer interfaces, and journalistic tools. Skill and client tools include B2C (Business-to-Consumer), new yield legacy mobile apps, web apps, and trade side nutrition ancient numerical signage tools. Solutions offered by national livestock organisations: It includes plans for managing and implementing cattle.
Gears for farm organisation: These tools are based on the category-specific (Inoculation, nourishing, composts, vegetable defence harvests, etc.). A Scam organisation arrangement, nourishment complaint device paraphernalia, and meat excellence graphic examination scheme are some of the equipment used in food care. The plan uses several documentation resources, including paper-based marker labels with QR codes, flexible terminations with QR codes, and malleable credentialing labels with RFID, to categorise the watched bodily fluids (crops, chairs, etc.)
It fulfils many customers' needs for traceability, including movable apps used by B2B and clients to access double documentation capitals and appeal/arrival statistics. For users who do not want to use a mobile app to see the creation history, there is a web app. Exposed border for supply chain businesses that now use practise software to wrest origination's information's-FOOD propositions dualistic implementation representations, distant or official, and IoT API for food industries that permit to organisation statistics conservative from the strategies.
TE-FOOD being focused on food production yields only solutions for the agricultural sector. Only the trackability solution provides multiple B2B (Business-to-Business), B2C (Business-to-Consumer), and B2A (Business-to-Authorities) capabilities, supporting businesses, customers, and institutions.
Customer trust is shaped since they can trace the origin of the food creation while accounting for all the distributions the creation received.
Good trackability and sensors allow for the early isolation of contaminated food production before it spreads to stores, thereby reducing the number of foodborne illnesses.
Controlling entities have realistic perspectives on the food industry that support the application of food care regulations.
One of the TE-FOOD restrictions is the TFD symbolising the relatively slow deal/second (15 TPS) rate of delicate net earnings. Additionally, TE-FOOD must demonstrate an unintentional and direct rivalry with other rival companies like Ambrosius, WABI, MOD, and WTC. Additionally, TE-FOOD has a significant customer base in Vietnam and Republic of Hungary, and it is important to establish contacts in the world-wide market.
The operation and growth of innovativeness are devoted from data building in the data stage. Innovative information building points to recover the organization break even with the complete trade wrapped up and information expertise. Activities can recoup the competence of their operations and organization through information director, planning by automatic and brainy progressed equipment and computer program device and administrations. Further by establishing a work organize checking framework database on all sorts of information, organization plans, to come about the commitment of modern innovativeness organization. In public, it is fundamental to make an automation even for calculation as it is one most essential tool for any organisation in this modern era. In uncertainty, DMs must provide their evaluations for the innovativeness with devotion to set up a right direction; in this way, the estimation movement can be seen as an agent MADM risky. Let a corporation is scheduled to support its four companies to expand their automation structure equally. The corporation will request four experts to make material for assessment of the four companies. PSi(i=1,2,3,4) with reverence to four qualities GBIUi(i=1,2,3,4). As the availability of data and the feasibility of the review, four attributes are ultimately chosen: GBIU1(IT attention degree), GBIU2 (IT reserve attention degree), GBIU3 (IT influence degree), and GBIU4 (amount of speculation for automation). The weight vector of four experts is w=(0.2,0.3,0.4,0.1)T.
Attractive into clarifying the effort of real-world states and the suitability of data, the ultimate decision maker requires DMs to utilize Fermatean fuzzy basics to direct their appraisal data. So, the decision matrices measured by DMs are observable in Tables 1 and 2.
GBIU1 | GBIU2 | GBIU3 | GBIU4 | |
PS1 | [0.11,0.13] | [0.15,0.17] | [0.24,0.28] | [0.11,0.31] |
PS2 | [0.24,0.28] | [0.11,0.13] | [0.24,0.28] | [0.11,0.13] |
PS3 | [0.11,0.13] | [0.5,0.9] | [0.11,0.13] | [0.105,0.109] |
PS4 | [0.5,0.9] | [0.11,0.13] | [0.44,0.55] | [0.11,0.13] |
The FF decision matrix Table 2 is as below.
GBIU1 | GBIU2 | GBIU3 | GBIU4 | |
PS1 | [0.001,0.003] | [0.02,0.03] | [0.0024,0.0028] | [0.3,0.5] |
PS2 | [0.5,0.8] | [0.11,0.13] | [0.3,0.5] | [0.11,0.13] |
PS3 | [0.11,0.13] | [0.3,0.5] | [0.11,0.13] | [0.2,0.7] |
PS4 | [0.3,0.5] | [0.5,0.8] | [0.05,0.08] | [0.01,0.03] |
The assessment originates that the overweight of the four are wholly reported confidential after four cross units. By performing the four steps algorithm, the final ranking fallouts of FFSSTWA operators of Cases 1 and 2 has been denoted in Figures 5 and 6 individually.
Case 1.
Step 1: Define the FF decision matrix. The FF decision matrix Table 1 is as below.
Step 2: Describe the FFSSTWA operator and ξ=(0.23,0.24,0.25,0.28).
FFSSTWA operator Table 3.
GBIU1 | GBIU2 | GBIU3 | GBIU4 | |
PS1 | [0.1341,0.3081] | [0.1022,0.5012] | [0.0329,0.4211] | [0.2211,0.4513] |
PS2 | [0.1223,0.1345] | [0.8721,0.9812] | [0.4801,0.6801] | [0.4512,0.5411] |
PS3 | [0.1856,0.2321] | [0.6021,0.7634] | [0.6192,0.6734] | [0.6013,0.5691] |
PS4 | [0.0131,0.0345] | [0.3336,0.5678] | [0.1913,0.5678] | [0.6181,0.8534] |
Step 3: Designate the FFSSTWA operator and ξ=(0.23,0.24,0.25,0.28).
FFSSTWA operator Table 4.
PS1 | [0.1041,0.3081] |
PS2 | [0.1623,0.1345] |
PS3 | [0.1056,0.2321] |
PS4 | [0.2131,0.0345] |
Step 4: Determine the score values.
Z1=0.0185,Z2=0.4734,Z3=0.2329,Z4=0.4843. |
Case 2
Step 1: The FF decision matrix. The FF decision matrix Table 5 is as below.
GBIU1 | GBIU2 | GBIU3 | GBIU4 | |
PS1 | [0.11,0.13] | [0.05,0.07] | [0.1,0.5] | [0.1,0.6] |
PS2 | [0.24,0.28] | [0.1,0.6] | [0.11,0.13] | [0.11,0.13] |
PS3 | [0.11,0.13] | [0.5,0.9] | [0.1,0.6] | [0.01,0.03] |
PS4 | [0.015,0.018] | [0.11,0.13] | [0.1,0.7] | [0.11,0.13] |
FF decision matrix. The FF decision matrix Table 6 is as below.
GBIU1 | GBIU2 | GBIU3 | GBIU4 | |
PS1 | [0.0201,0.0203] | [0.202,0.203] | [0.1324,0.2528] | [0.0011,0.0051] |
PS2 | [0.0011,0.0051] | [0.1324,0.2528] | [0.3,0.5] | [0.01,0.03] |
PS3 | [0.11,0.13] | [0.0011,0.0051] | [0.11,0.51] | [0.1324,0.2528] |
PS4 | [0.1324,0.2528] | [0.11,0.51] | [0.0011,0.0051] | [0.01,0.03] |
Step 2: Designate the FFSSTWG operator and ξ=(0.23,0.24,0.25,0.28).
FFSSTWG operator Table 7.
GBIU1 | GBIU2 | GBIU3 | GBIU4 | |
PS1 | [0.1041,0.3981] | [0.1122,0.5312] | [0.1329,0.4201] | [0.7811,0.4613] |
PS2 | [0.1003,0.8145] | [0.8721,0.1812] | [0.1801,0.3801] | [0.1512,0.3411] |
PS3 | [0.4856,0.6321] | [0.5021,0.8634] | [0.1192,0.8734] | [0.9013,0.0691] |
PS4 | [0.3131,0.7345] | [0.3006,0.5008] | [0.1093,0.5988] | [0.6091,0.8094] |
Step 3: The FFSSTWG operator and ξ=(0.23,0.24,0.25,0.28).
FFSSTWG operator Table 8.
PS1 | [0.0341,0.3481] |
PS2 | [0.7223,0.4345] |
PS3 | [0.9856,0.3321] |
PS4 | [0.5131,0.1346] |
Step 4: Determine the score value.
Z1=0.0102,Z2=0.4904,Z3=0.2229,Z4=0.7888. |
Sketches are used to compare the optional plan to another plan that is inferior based on IFSs [1] and FFWG statistics [14] to support and conventionally optimistic feasibility. Other strategies are odd applications of our technique strategy, which was developed on FFN to the same description circumstance. Ranking result of the optimal solution of the existing technique has been represented in Figures 7 and 8.
Step 1: IF decision matrix Table 9 in is as below.
GBIU1 | GBIU2 | GBIU3 | GBIU4 | |
PS1 | [0.01,0.03] | [0.2,0.4] | [0.9,0.11] | [0.11,0.33] |
PS2 | [0.12,0.13] | [0.4,0.6] | [0.31,0.33] | [0.112,0.313] |
PS3 | [0.11,0.33] | [0.12,0.13] | [0.2,0.4] | [0.554,0.556] |
PS4 | [0.3004,0.3006] | [0.34,0.36] | [0.12,0.13] | [0.2,0.4] |
Step 2: Describe the IFWA operator and the weight (0.1,0.2,0.3,0.4). In Table 10.
PS1 | [0.4427,0.3145] |
PS2 | [0.4534,0.2756] |
PS3 | [0.2991,0.3653] |
PS4 | [0.2801,0.3843] |
Step 3: The score value is
Z1=0.1121,Z2=0.1498,Z3=0.1971,Z4=0.4121. |
Step 4: Given the ranking Z4>Z3>Z2>Z1 and hence Z4is the best.
Step 1: The FF decision matrix is given in Table 11.
GBIU1 | GBIU2 | GBIU3 | GBIU4 | |
PS1 | [0.21,0.23] | [0.212,0.214] | [0.209,0.211] | [0.002,0.004] |
PS2 | [0.12,0.14] | [0.11,0.13] | [0.3001,0.3003] | [0.1012,0.3013] |
PS3 | [0.11,0.13] | [0.11,0.12] | [0.1,0.4] | [0.553,0.554] |
PS4 | [0.3002,0.3004] | [0.32,0.34] | [0.11,0.13] | [0.2,0.4] |
Step 2: The FFWG operator and the weight vector is(0.1,0.2,0.3,0.4). FFWG operator Table 12.
PS1 | [0.4145,0.1231] |
PS2 | [0.4111,0.1132] |
PS3 | [0.4353,0.8935] |
PS4 | [0.7231,0.3343] |
Step 3: The score function is.
Z1=0.0414,Z2=0.1835,Z3=0.2802,Z4=0.5001. |
Step 4: Find the ranking Z4>Z3>Z2>Z1 and henceZ4is the best.
When there are interrelationships including any various criteria: The varied methods can hold this formal, see Table 13.
Methods | 1 | 2 | 3 | 4 | 5 |
Colak et al. [2] | 0.0253 | 0.2901 | 0.3008 | 0.0621 | 0.3498 |
Farshidi et al. [3] | 0.0909 | 0.4056 | 0.3087 | 0.4085 | 0.0095 |
Karaşan et al [4] | 0.1537 | 0.1881 | −0.8601 | −0.1916 | 0.0483 |
Tang et al. [7] | −0.5243 | 0.3041 | 0.3007 | 0.9721 | 0.6098 |
We highlighted some merits of the suggested approach, as follows.
1) The approach proposed in this paper is related with the group decision-making technique grounded on imitation and FFS proposed in (Senapati et al. 2019), and the ranking result by the mixture of imitation and FFS isη2>η4>η3>η1. It is observed that the best structure found by the process proposed in this study is the similar as that gained by the group decision-making system in (Senapati et al. 2019), that is η2, but the command of each structure is still changed. Since the risk favourites of dissimilar decision-makers are booked into explanation in the aggregation technique used in this paper. The consequence of indecision on decision-making consequences is counted from the viewpoint of decision-makers, so the decision-making consequence is more in streak with the real decision-making condition.
2) It is more sensible and applied to use the technique suggested in this paper to regulate the weight of decision-makers than the lengthy FFS technique used in (Senapati, T and Yager, R. R. (2020)). As The masses of decision-makers resolute through the FFs technique is the similar for dissimilar qualities, and folks using the method outlined in this paper are different for different qualities. In actual decision-making, the different qualities may include changed arenas, and correspondingly decision maker is clearly only decent at some fields but not altogether in all fields. It is more sensible that decision makers have diverse weights under different attributes. In adding, the existing study consequences use resemblance or nearness to control the weight of decision makers, but the resemblance is not essentially high underneath great closeness. Consequently, this paper interminably uses comparison and nearness in the technique of critical the weight of decision makers to enhanced variety filled procedure of decision data, so that the persevering decision creator commonalities are closer to the real weights.
3) The technique suggested in this paper has persistent distinguishability compared to the extended FFS technique in works (Senapati, T., and Yager, R. R. (2020)), which can help us to control the unique ideal explanation for various decision-makers' safety preferences. To the contrary, the extended FFS approach may produce close complete evaluation values for each scheme, weakening the distinguishability of this method and making it challenging to distinguish the schemes.
4) There is a little doubt that the two strategies' focal points and methods differ (Own C-M 2009). In contrast to the strategy suggested by the former, which generates the Fermatean fuzzy number and is used to the MADM problematic with solitary one decision maker, the approach offered in this study is appropriate to the MAGDM problem with FFN whose quality weight information is completely unknown. The prior way only needs the decision maker to assess the favourite relationship between schemes after pairwise judgement, as opposed to the current method, which analyses each scheme in relation to each attribute.
5) The same planned DM approach is used with a smaller MAGDM subject to instruct students in a way that produces the best results. The effective and true MAGDM method allows us to apply the same strategy to a minor unruly and obtain the same outcome as with the MAGDM challenging.
6) The complex alternative evaluation must be comparable to the undecomposed difficulty's unique assessment when the primary MAGDM issue is reduced to a minor issue. To strengthen the alternative, we employ techniques like those utilised in the MAGDM problem on small subjects.
7) The FFSSTWA operator must be satisfied to resonant a proficient and accurate MAGDM approach.
8) We can assume that the position leans are equal based on the outputs of the optional operators and previous laborious procedures. The MCDM method is a complete and innovative solution for commerce with indecision under DM conditions and is dependent on the Schweizer-Sklar aggregation operations. In practical situations, using Schweizer-Sklar norm-dependent aggregate operators in a different ranking value are more flexible and cost-effective.
9) Operations research's branch known as multiple-criteria decision-making openly assesses numerous, contradictory factors when making decisions (as well as in environments including business, government, and medical). Inconsistent criteria are commonly present while analysing possibilities: cost or price is typically one of the fundamental criteria, and a quality measure is frequently another, readily at conflict with the cost. Cost, comfort, safety, and fuel efficiency may be some of the primary factors we take into consideration when buying a car. It is unusual for the economical car to also be the greatest contented and safest one. The goal of portfolio management is to maximize returns while minimizing risks, yet the companies with the highest potential returns often have the most risk.
In this subsection, the proposed method compares with a different method.
1) This method is innovative and good assessment for Schweizer-Sklar t-norm and t-conorm operational comments for FFNS.
2) Further, the presented FFNS method founded on Schweizer-Sklar considers the concordance set beside the different set, but the existing FFS technique does not expressly consider the different set when two choices have the same performance.
3) The proposed aggregation operators are superior to the existing aggregation operators. As FFSSTWA is more informative and more flexible.
4) An extended MCGDM technique for FFNS heightened the sturdiness of the application by inspection the alternative superiority, impartiality and subservience dealings completed other changes, as well as the graphical explanation of weedy and robust outranking relatives that energy elsewhere the construction of preceding replicas.
5) This feature climaxes the superiority of the original FFNS practise completed the former classical.
Different existing techniques, see Table 14.
Methods | Score Function | Ranking | Final Ranking |
MCDM [6] | {η1=0.2014,η2=0.8755,η3=0.5811,η4=0.6711} | {η2>η4>η3>η1} | {η2>η4>η3>η1} |
Pythagorean operators [12] | {η1=0.0213,η2=0.1745,η3=0.0545,η4=0.0893} | {η2>η4>η3>η1} | {η2>η4>η3>η1} |
IFSS [17] | {η1=0.0074,η2=0.1234,η3=0.0611,η4=0.1012} | {η2>η4>η3>η1} | {η2>η4>η3>η1} |
The anxiety is by what means to evaluate the former multi-criteria efficiency mark for a suitable decision scenery because the proposed FFN context, which is an effectiveness or scoring degree-based model for MCDA, selects choice with the maximum helpfulness degree, as compared to the existing replicas, which are concession degree replicas and select a selection that is contiguous to the ideal explanation, see Table 15.
Methods | Score Function | Ranking | Final Ranking |
MCDM on FFSSTWA | {η1=0.0014,η2=0.8105,η3=0.4522,η4=0.6022} | {η2>η4>η3>η1} | {η2>η4>η3>η1} |
MCDM on FFSSTOWA | {η1=0.1012,η2=0.7041,η3=0.4229,η4=0.5612} | {η2>η4>η3>η1} | {η2>η4>η3>η1} |
MCDM on FFSSTHWA | {η1=0.1012,η2=0.2078,η3=0.1502,η4=0.1804} | {η2>η4>η3>η1} | {η2>η4>η3>η1} |
MCDM on FFSSTHWG | {η1=0.0123,η2=0.1829,η3=0.1045,η4=0.1345} | {η2>η4>η3>η1} | {η2>η4>η3>η1} |
In this subsection limitation of FFs based on two sets has been exhibited (see Table 16).
Methods | Score Function | Ranking | Final Ranking |
Mondal et al. [17] | {η1=0.0121,η2=0.1987,η3=0.1333,η4=0.1721} | {η2>η4>η3>η1} | {η2>η4>η3>η1} |
Own C-M [16] | {η1=0.0103,η2=0.1012,η3=0.0234,η4=0.0981} | {η2>η4>η3>η1} | {η2>η4>η3>η1} |
Zhou et al. [12] | {η1=0.0109,η2=0.1981,η3=0.0451,η4=0.1213} | {η2>η4>η3>η1} | {η2>η4>η3>η1} |
The primary aim of this research is to present a unique MADM technique and tie it to a real innovation in information and evaluation issues. To achieve this, we focused primarily on three components: The data face way, the data aggregation technique, and the operational rules in the data aggregation process. Initially, we proposed the concept of FFS, which is a practical and significant data presentation strategy for controlling uncertainty. The proposed FFS has the advantage of giving DMs more autonomy. To provide an additional flexibility to the circumstance, the Schweizer-Sklar t-norm and t-conorm operational defined for FFNS. A series of operators, with the combination FFNS and SSTT operational rules are presented, namely the FFSSTWA operator, FFSSTOWA operator, FFSSTHWA operator, FFSSTWG operator, FFSSTOWG operator, and FFSSTHWG operator, in control to hold the interrelationship during qualities. We worked with the SST operator to collectively assess data with FFNs. The interrelationship between different attributes might be considered using the provided operator. Then, an innovated method to MADM problems based on the suggested operators is pre-summit. The FFSSTWA and FFSSTWG operators are utilised to fix the challenge in the appropriate ways. To conclude, we coupled the method to an innovativeness automation equal appraisal tricky. To demonstrate that the offered operators provide a reducible approach to the MCDM problem, a comparison with several existing operators was made.
In the future, we will offer the proposed techniques to other FFN methods and aggregation operators, such as the Muirhead mean operator and presence worth exploring power average operator. Additionally, our suggested strategy can be related to additional issues including dealer collecting challenges, speculative topics.
Interdependency of the different sections of the paper has been exhibited in Figure 9.
The authors declare no conflict of interest
[1] |
Z. Z. Bai, On the convergence of the multisplitting methods for the linear complementarity problem, SIAM J. Matrix Anal. Appl., 21 (1999), 67–78. https://doi.org/10.1137/S0895479897324032 doi: 10.1137/S0895479897324032
![]() |
[2] |
Z. Z. Bai, Modulus-based matrix splitting iteration methods for linear complementarity problems, Numer. Linear Algebra Appl., 17 (2010), 917–933. https://doi.org/10.1002/nla.680 doi: 10.1002/nla.680
![]() |
[3] |
Z. Z. Bai, A class of two-stage iterative methods for systems of weakly nonlinear equations, Numer. Algor., 14 (1997), 295–319. https://doi.org/10.1023/A:1019125332723 doi: 10.1023/A:1019125332723
![]() |
[4] |
Z. Z. Bai, D. J. Evans, Matrix multisplitting relaxation methods for linear complementarity problems, Int. J. Comput. Math., 63 (1997), 309–326. https://doi.org/10.1080/00207169708804569 doi: 10.1080/00207169708804569
![]() |
[5] |
Z. Z. Bai, D. J. Evans, Matrix multisplitting methods with applications to linear complementarity problems: Parallel asynchronous methods, Int. J. Comput. Math., 79 (2002), 205–232. https://doi.org/10.1080/00207160211927 doi: 10.1080/00207160211927
![]() |
[6] | Z. Z. Bai, J. Y. Pan, Matrix analysis and computations, Philadelphia: SIAM, 2021. |
[7] |
Z. Z. Bai, X. Yang, On HSS-based iteration methods for weakly nonlinear systems, Appl. Numer. Math., 59 (2009), 2923–2936. https://doi.org/10.1016/j.apnum.2009.06.005 doi: 10.1016/j.apnum.2009.06.005
![]() |
[8] |
Z. Z. Bai, L. L. Zhang, Modulus-based synchronous multisplitting iteration methods for linear complementarity problems, Numer. Linear Algebra Appl., 20 (2013), 425–439. https://doi.org/10.1002/nla.1835 doi: 10.1002/nla.1835
![]() |
[9] | A. Berman, R. J. Plemmons, Nonnegative matrices in the mathematical sciences, Philadelphia: SIAM, 1994. |
[10] |
Y. Cao, Q. Shi, S. L. Zhu, A relaxed generalized Newton iteration method for generalized absolute value equations, AIMS Math., 6 (2021), 1258–1275. https://doi.org/10.3934/math.2021078 doi: 10.3934/math.2021078
![]() |
[11] |
Y. Cao, A. Wang, Two-step modulus-based matrix splitting iteration methods for implicit complementarity problems, Numer. Algor., 82 (2019), 1377–1394. https://doi.org/10.1007/s11075-019-00660-7 doi: 10.1007/s11075-019-00660-7
![]() |
[12] | R. W. Cottle, F. Giannessi, J. L. Lions, Variational inequalities and complementarity problems: Theory and applications, Hoboken, New Jersey: John Wiley & Sons, 1980. |
[13] | R. W. Cottle, J. S. Pang, R. E. Stone, The linear complementarity problem, Philadelphia: SIAM, 2009. |
[14] |
J. L. Dong, M. Q. Jiang, A modified modulus method for symmetric positive-definite linear complementarity problems, Numer. Linear Algebra Appl., 16 (2009), 129–143. https://doi.org/10.1002/nla.609 doi: 10.1002/nla.609
![]() |
[15] |
J. L. Dong, J. B. Gao, F. J. Ju, J. H. Shen, Modulus methods for nonnegatively constrained image restoration, SIAM J. Imaging Sci., 9 (2016), 1226–1246. https://doi.org/10.1137/15M1045892 doi: 10.1137/15M1045892
![]() |
[16] |
M. C. Ferris, J. S. Pang, Engineering and economic applications of complementarity problems, SIAM Rev., 39 (1997), 669–713. https://doi.org/10.1137/S0036144595285963 doi: 10.1137/S0036144595285963
![]() |
[17] |
A. Frommer, G. Mayer, Convergence of relaxed parallel multisplitting methods, Linear Algebra Appl., 119 (1989), 141–152. https://doi.org/10.1016/0024-3795(89)90074-8 doi: 10.1016/0024-3795(89)90074-8
![]() |
[18] |
A. Frommer, D. B. Szyld, H-splittings and two-stage iterative methods, Numer. Math., 63 (1992), 345–356. https://doi.org/10.1007/BF01385865 doi: 10.1007/BF01385865
![]() |
[19] |
J. T. Hong, C. L. Li, Modulus-based matrix splitting iteration methods for a class of implicit complementarity problems, Numer. Linear Algebra Appl., 23 (2016), 629–641. https://doi.org/10.1002/nla.2044 doi: 10.1002/nla.2044
![]() |
[20] | J. G. Hu, Estimates of ‖B−1A‖∞ and their applications (in Chinese), Math. Numer. Sin., 3 (1982), 272–282. |
[21] | G. Isac, Complementarity problems, Berlin, Heidelberg: Springer, 1992. https://doi.org/10.1007/BFb0084653 |
[22] |
L. Jia, X. Wang, A generalized two-step modulus-based matrix splitting iteration method for implicit complementarity problems of H+-matrices, Filomat, 33 (2019), 4875–4888. https://doi.org/10.2298/FIL1915875J doi: 10.2298/FIL1915875J
![]() |
[23] |
Y. F. Ke, C. F. Ma, On the convergence analysis of two-step modulus-based matrix splitting iteration method for linear complementarity problems, Appl. Math. Comput., 243 (2014), 413–418. https://doi.org/10.1016/j.amc.2014.05.119 doi: 10.1016/j.amc.2014.05.119
![]() |
[24] |
M. D. Koulisianis, T. S. Papatheodorou, Improving projected successive overrelaxation method for linear complementarity problems, Appl. Numer. Math., 45 (2003), 29–40. https://doi.org/10.1016/S0168-9274(02)00233-7 doi: 10.1016/S0168-9274(02)00233-7
![]() |
[25] |
R. Li, J. F. Yin, Accelerated modulus-based matrix splitting iteration methods for a restricted class of nonlinear complementarity problems, Numer. Algor., 75 (2017), 339–358. https://doi.org/10.1007/s11075-016-0243-3 doi: 10.1007/s11075-016-0243-3
![]() |
[26] |
W. Li, A general modulus-based matrix splitting method for linear complementarity problems of H-matrices, Appl. Math. Lett., 26 (2013), 1159–1164. https://doi.org/10.1016/j.aml.2013.06.015 doi: 10.1016/j.aml.2013.06.015
![]() |
[27] |
F. Mezzadri, E. Galligani, An inexact Newton method for solving complementarity problems in hydrodynamic lubrication, Calcolo, 55 (2018), 1–28. https://doi.org/10.1007/s10092-018-0244-9 doi: 10.1007/s10092-018-0244-9
![]() |
[28] |
M. A. Noor, The quasi-complementarity problem, J. Math. Anal. Appl., 130 (1988), 344–353. https://doi.org/10.1016/0022-247X(88)90310-1 doi: 10.1016/0022-247X(88)90310-1
![]() |
[29] |
J. S. Pang, Inexact Newton methods for the nonlinear complementarity problem, Math. Program., 36 (1986), 54–71. https://doi.org/10.1007/BF02591989 doi: 10.1007/BF02591989
![]() |
[30] |
G. Ramadurai, S. V. Ukkusuri, J. Y. Zhao, J. S. Pang, Linear complementarity formulation for single bottleneck model with heterogeneous commuters, Transport. Res. B Meth., 44 (2010), 193–214. https://doi.org/10.1016/j.trb.2009.07.005 doi: 10.1016/j.trb.2009.07.005
![]() |
[31] |
U. Sch{ä}fer, On the modulus algorithm for the linear complementarity problem, Oper. Res. Lett., 32 (2004), 350–354. https://doi.org/10.1016/j.orl.2003.11.004 doi: 10.1016/j.orl.2003.11.004
![]() |
[32] |
Q. Shi, Q. Q. Shen, T. P. Tang, A class of two-step modulus-based matrix splitting iteration methods for quasi-complementarity problems, Comput. Appl. Math., 39 (2020), 1–23. https://doi.org/10.1007/s40314-019-0984-4 doi: 10.1007/s40314-019-0984-4
![]() |
[33] | R. S. Varga, Matrix iterative analysis, Berlin, Heidelberg: Springer, 2000. |
[34] |
A. Wang, Y. Cao, J. X. Chen, Modified Newton-type iteration methods for generalized absolute value equations, J. Optim. Theory Appl., 181 (2019), 216–230. https://doi.org/10.1007/s10957-018-1439-6 doi: 10.1007/s10957-018-1439-6
![]() |
[35] |
S. L. Wu, P. Guo, Modulus-based matrix splitting algorithms for the quasi-complementarity problems, Appl. Numer. Math., 132 (2018), 127–137. https://doi.org/10.1016/j.apnum.2018.05.017 doi: 10.1016/j.apnum.2018.05.017
![]() |
[36] |
L. L. Zhang, Two-step modulus-based matrix splitting iteration method for linear complementarity problems, Numer. Algor., 57 (2011), 83–99. https://doi.org/10.1007/s11075-010-9416-7 doi: 10.1007/s11075-010-9416-7
![]() |
[37] |
L. L. Zhang, Z. R. Ren, A modified modulus-based multigrid method for linear complementarity problems arising from free boundary problems, Appl. Numer. Math., 164 (2021), 89–100. https://doi.org/10.1016/j.apnum.2020.09.008 doi: 10.1016/j.apnum.2020.09.008
![]() |
[38] |
H. Zheng, L. Liu, A two-step modulus-based matrix splitting iteration method for solving nonlinear complementarity problems of H+-matrices, Comput. Appl. Math., 37 (2018), 5410–5423. https://doi.org/10.1007/s40314-018-0646-y doi: 10.1007/s40314-018-0646-y
![]() |
1. | Yi Yang, Mengqi Jie, Yuhan Zhao, Limei Liu, Junfeng Yang, Jie Chen, The extended weighted t-norms-based linear hybrid aggregation function and its application for aggregating improved basic uncertain linguistic information, 2024, 136, 09521976, 108975, 10.1016/j.engappai.2024.108975 | |
2. | Saeid Jafarzadeh Ghoushchi, Sina Shaffiee Haghshenas, Sahand Vahabzadeh, Giuseppe Guido, Zong Woo Geem, An integrated MCDM approach for enhancing efficiency in connected autonomous vehicles through augmented intelligence and IoT integration, 2024, 23, 25901230, 102626, 10.1016/j.rineng.2024.102626 | |
3. | Lifeng Kang, Yankun Wang, Efficient and accurate personalized product recommendations through frequent item set mining fusion algorithm, 2024, 10, 24058440, e25044, 10.1016/j.heliyon.2024.e25044 | |
4. | Biwei Xu, Lipeng Luo, ExpTODIM-EDAS Framework for Multiple-Attribute Decision-Making Under Z-Number Environment and Applications to Comprehensive Quality Evaluation of Swimmers’ Specific Competencies, 2024, 12, 2169-3536, 165359, 10.1109/ACCESS.2024.3493114 |
GBIU1 | GBIU2 | GBIU3 | GBIU4 | |
PS1 | [0.11,0.13] | [0.15,0.17] | [0.24,0.28] | [0.11,0.31] |
PS2 | [0.24,0.28] | [0.11,0.13] | [0.24,0.28] | [0.11,0.13] |
PS3 | [0.11,0.13] | [0.5,0.9] | [0.11,0.13] | [0.105,0.109] |
PS4 | [0.5,0.9] | [0.11,0.13] | [0.44,0.55] | [0.11,0.13] |
GBIU1 | GBIU2 | GBIU3 | GBIU4 | |
PS1 | [0.001,0.003] | [0.02,0.03] | [0.0024,0.0028] | [0.3,0.5] |
PS2 | [0.5,0.8] | [0.11,0.13] | [0.3,0.5] | [0.11,0.13] |
PS3 | [0.11,0.13] | [0.3,0.5] | [0.11,0.13] | [0.2,0.7] |
PS4 | [0.3,0.5] | [0.5,0.8] | [0.05,0.08] | [0.01,0.03] |
GBIU1 | GBIU2 | GBIU3 | GBIU4 | |
PS1 | [0.1341,0.3081] | [0.1022,0.5012] | [0.0329,0.4211] | [0.2211,0.4513] |
PS2 | [0.1223,0.1345] | [0.8721,0.9812] | [0.4801,0.6801] | [0.4512,0.5411] |
PS3 | [0.1856,0.2321] | [0.6021,0.7634] | [0.6192,0.6734] | [0.6013,0.5691] |
PS4 | [0.0131,0.0345] | [0.3336,0.5678] | [0.1913,0.5678] | [0.6181,0.8534] |
PS1 | [0.1041,0.3081] |
PS2 | [0.1623,0.1345] |
PS3 | [0.1056,0.2321] |
PS4 | [0.2131,0.0345] |
GBIU1 | GBIU2 | GBIU3 | GBIU4 | |
PS1 | [0.11,0.13] | [0.05,0.07] | [0.1,0.5] | [0.1,0.6] |
PS2 | [0.24,0.28] | [0.1,0.6] | [0.11,0.13] | [0.11,0.13] |
PS3 | [0.11,0.13] | [0.5,0.9] | [0.1,0.6] | [0.01,0.03] |
PS4 | [0.015,0.018] | [0.11,0.13] | [0.1,0.7] | [0.11,0.13] |
GBIU1 | GBIU2 | GBIU3 | GBIU4 | |
PS1 | [0.0201,0.0203] | [0.202,0.203] | [0.1324,0.2528] | [0.0011,0.0051] |
PS2 | [0.0011,0.0051] | [0.1324,0.2528] | [0.3,0.5] | [0.01,0.03] |
PS3 | [0.11,0.13] | [0.0011,0.0051] | [0.11,0.51] | [0.1324,0.2528] |
PS4 | [0.1324,0.2528] | [0.11,0.51] | [0.0011,0.0051] | [0.01,0.03] |
GBIU1 | GBIU2 | GBIU3 | GBIU4 | |
PS1 | [0.1041,0.3981] | [0.1122,0.5312] | [0.1329,0.4201] | [0.7811,0.4613] |
PS2 | [0.1003,0.8145] | [0.8721,0.1812] | [0.1801,0.3801] | [0.1512,0.3411] |
PS3 | [0.4856,0.6321] | [0.5021,0.8634] | [0.1192,0.8734] | [0.9013,0.0691] |
PS4 | [0.3131,0.7345] | [0.3006,0.5008] | [0.1093,0.5988] | [0.6091,0.8094] |
PS1 | [0.0341,0.3481] |
PS2 | [0.7223,0.4345] |
PS3 | [0.9856,0.3321] |
PS4 | [0.5131,0.1346] |
GBIU1 | GBIU2 | GBIU3 | GBIU4 | |
PS1 | [0.01,0.03] | [0.2,0.4] | [0.9,0.11] | [0.11,0.33] |
PS2 | [0.12,0.13] | [0.4,0.6] | [0.31,0.33] | [0.112,0.313] |
PS3 | [0.11,0.33] | [0.12,0.13] | [0.2,0.4] | [0.554,0.556] |
PS4 | [0.3004,0.3006] | [0.34,0.36] | [0.12,0.13] | [0.2,0.4] |
PS1 | [0.4427,0.3145] |
PS2 | [0.4534,0.2756] |
PS3 | [0.2991,0.3653] |
PS4 | [0.2801,0.3843] |
GBIU1 | GBIU2 | GBIU3 | GBIU4 | |
PS1 | [0.21,0.23] | [0.212,0.214] | [0.209,0.211] | [0.002,0.004] |
PS2 | [0.12,0.14] | [0.11,0.13] | [0.3001,0.3003] | [0.1012,0.3013] |
PS3 | [0.11,0.13] | [0.11,0.12] | [0.1,0.4] | [0.553,0.554] |
PS4 | [0.3002,0.3004] | [0.32,0.34] | [0.11,0.13] | [0.2,0.4] |
PS1 | [0.4145,0.1231] |
PS2 | [0.4111,0.1132] |
PS3 | [0.4353,0.8935] |
PS4 | [0.7231,0.3343] |
Methods | Score Function | Ranking | Final Ranking |
MCDM [6] | {η1=0.2014,η2=0.8755,η3=0.5811,η4=0.6711} | {η2>η4>η3>η1} | {η2>η4>η3>η1} |
Pythagorean operators [12] | {η1=0.0213,η2=0.1745,η3=0.0545,η4=0.0893} | {η2>η4>η3>η1} | {η2>η4>η3>η1} |
IFSS [17] | {η1=0.0074,η2=0.1234,η3=0.0611,η4=0.1012} | {η2>η4>η3>η1} | {η2>η4>η3>η1} |
Methods | Score Function | Ranking | Final Ranking |
MCDM on FFSSTWA | {η1=0.0014,η2=0.8105,η3=0.4522,η4=0.6022} | {η2>η4>η3>η1} | {η2>η4>η3>η1} |
MCDM on FFSSTOWA | {η1=0.1012,η2=0.7041,η3=0.4229,η4=0.5612} | {η2>η4>η3>η1} | {η2>η4>η3>η1} |
MCDM on FFSSTHWA | {η1=0.1012,η2=0.2078,η3=0.1502,η4=0.1804} | {η2>η4>η3>η1} | {η2>η4>η3>η1} |
MCDM on FFSSTHWG | {η1=0.0123,η2=0.1829,η3=0.1045,η4=0.1345} | {η2>η4>η3>η1} | {η2>η4>η3>η1} |
Methods | Score Function | Ranking | Final Ranking |
Mondal et al. [17] | {η1=0.0121,η2=0.1987,η3=0.1333,η4=0.1721} | {η2>η4>η3>η1} | {η2>η4>η3>η1} |
Own C-M [16] | {η1=0.0103,η2=0.1012,η3=0.0234,η4=0.0981} | {η2>η4>η3>η1} | {η2>η4>η3>η1} |
Zhou et al. [12] | {η1=0.0109,η2=0.1981,η3=0.0451,η4=0.1213} | {η2>η4>η3>η1} | {η2>η4>η3>η1} |
GBIU1 | GBIU2 | GBIU3 | GBIU4 | |
PS1 | [0.11,0.13] | [0.15,0.17] | [0.24,0.28] | [0.11,0.31] |
PS2 | [0.24,0.28] | [0.11,0.13] | [0.24,0.28] | [0.11,0.13] |
PS3 | [0.11,0.13] | [0.5,0.9] | [0.11,0.13] | [0.105,0.109] |
PS4 | [0.5,0.9] | [0.11,0.13] | [0.44,0.55] | [0.11,0.13] |
GBIU1 | GBIU2 | GBIU3 | GBIU4 | |
PS1 | [0.001,0.003] | [0.02,0.03] | [0.0024,0.0028] | [0.3,0.5] |
PS2 | [0.5,0.8] | [0.11,0.13] | [0.3,0.5] | [0.11,0.13] |
PS3 | [0.11,0.13] | [0.3,0.5] | [0.11,0.13] | [0.2,0.7] |
PS4 | [0.3,0.5] | [0.5,0.8] | [0.05,0.08] | [0.01,0.03] |
GBIU1 | GBIU2 | GBIU3 | GBIU4 | |
PS1 | [0.1341,0.3081] | [0.1022,0.5012] | [0.0329,0.4211] | [0.2211,0.4513] |
PS2 | [0.1223,0.1345] | [0.8721,0.9812] | [0.4801,0.6801] | [0.4512,0.5411] |
PS3 | [0.1856,0.2321] | [0.6021,0.7634] | [0.6192,0.6734] | [0.6013,0.5691] |
PS4 | [0.0131,0.0345] | [0.3336,0.5678] | [0.1913,0.5678] | [0.6181,0.8534] |
PS1 | [0.1041,0.3081] |
PS2 | [0.1623,0.1345] |
PS3 | [0.1056,0.2321] |
PS4 | [0.2131,0.0345] |
GBIU1 | GBIU2 | GBIU3 | GBIU4 | |
PS1 | [0.11,0.13] | [0.05,0.07] | [0.1,0.5] | [0.1,0.6] |
PS2 | [0.24,0.28] | [0.1,0.6] | [0.11,0.13] | [0.11,0.13] |
PS3 | [0.11,0.13] | [0.5,0.9] | [0.1,0.6] | [0.01,0.03] |
PS4 | [0.015,0.018] | [0.11,0.13] | [0.1,0.7] | [0.11,0.13] |
GBIU1 | GBIU2 | GBIU3 | GBIU4 | |
PS1 | [0.0201,0.0203] | [0.202,0.203] | [0.1324,0.2528] | [0.0011,0.0051] |
PS2 | [0.0011,0.0051] | [0.1324,0.2528] | [0.3,0.5] | [0.01,0.03] |
PS3 | [0.11,0.13] | [0.0011,0.0051] | [0.11,0.51] | [0.1324,0.2528] |
PS4 | [0.1324,0.2528] | [0.11,0.51] | [0.0011,0.0051] | [0.01,0.03] |
GBIU1 | GBIU2 | GBIU3 | GBIU4 | |
PS1 | [0.1041,0.3981] | [0.1122,0.5312] | [0.1329,0.4201] | [0.7811,0.4613] |
PS2 | [0.1003,0.8145] | [0.8721,0.1812] | [0.1801,0.3801] | [0.1512,0.3411] |
PS3 | [0.4856,0.6321] | [0.5021,0.8634] | [0.1192,0.8734] | [0.9013,0.0691] |
PS4 | [0.3131,0.7345] | [0.3006,0.5008] | [0.1093,0.5988] | [0.6091,0.8094] |
PS1 | [0.0341,0.3481] |
PS2 | [0.7223,0.4345] |
PS3 | [0.9856,0.3321] |
PS4 | [0.5131,0.1346] |
GBIU1 | GBIU2 | GBIU3 | GBIU4 | |
PS1 | [0.01,0.03] | [0.2,0.4] | [0.9,0.11] | [0.11,0.33] |
PS2 | [0.12,0.13] | [0.4,0.6] | [0.31,0.33] | [0.112,0.313] |
PS3 | [0.11,0.33] | [0.12,0.13] | [0.2,0.4] | [0.554,0.556] |
PS4 | [0.3004,0.3006] | [0.34,0.36] | [0.12,0.13] | [0.2,0.4] |
PS1 | [0.4427,0.3145] |
PS2 | [0.4534,0.2756] |
PS3 | [0.2991,0.3653] |
PS4 | [0.2801,0.3843] |
GBIU1 | GBIU2 | GBIU3 | GBIU4 | |
PS1 | [0.21,0.23] | [0.212,0.214] | [0.209,0.211] | [0.002,0.004] |
PS2 | [0.12,0.14] | [0.11,0.13] | [0.3001,0.3003] | [0.1012,0.3013] |
PS3 | [0.11,0.13] | [0.11,0.12] | [0.1,0.4] | [0.553,0.554] |
PS4 | [0.3002,0.3004] | [0.32,0.34] | [0.11,0.13] | [0.2,0.4] |
PS1 | [0.4145,0.1231] |
PS2 | [0.4111,0.1132] |
PS3 | [0.4353,0.8935] |
PS4 | [0.7231,0.3343] |
Methods | 1 | 2 | 3 | 4 | 5 |
Colak et al. [2] | 0.0253 | 0.2901 | 0.3008 | 0.0621 | 0.3498 |
Farshidi et al. [3] | 0.0909 | 0.4056 | 0.3087 | 0.4085 | 0.0095 |
Karaşan et al [4] | 0.1537 | 0.1881 | −0.8601 | −0.1916 | 0.0483 |
Tang et al. [7] | −0.5243 | 0.3041 | 0.3007 | 0.9721 | 0.6098 |
Methods | Score Function | Ranking | Final Ranking |
MCDM [6] | {η1=0.2014,η2=0.8755,η3=0.5811,η4=0.6711} | {η2>η4>η3>η1} | {η2>η4>η3>η1} |
Pythagorean operators [12] | {η1=0.0213,η2=0.1745,η3=0.0545,η4=0.0893} | {η2>η4>η3>η1} | {η2>η4>η3>η1} |
IFSS [17] | {η1=0.0074,η2=0.1234,η3=0.0611,η4=0.1012} | {η2>η4>η3>η1} | {η2>η4>η3>η1} |
Methods | Score Function | Ranking | Final Ranking |
MCDM on FFSSTWA | {η1=0.0014,η2=0.8105,η3=0.4522,η4=0.6022} | {η2>η4>η3>η1} | {η2>η4>η3>η1} |
MCDM on FFSSTOWA | {η1=0.1012,η2=0.7041,η3=0.4229,η4=0.5612} | {η2>η4>η3>η1} | {η2>η4>η3>η1} |
MCDM on FFSSTHWA | {η1=0.1012,η2=0.2078,η3=0.1502,η4=0.1804} | {η2>η4>η3>η1} | {η2>η4>η3>η1} |
MCDM on FFSSTHWG | {η1=0.0123,η2=0.1829,η3=0.1045,η4=0.1345} | {η2>η4>η3>η1} | {η2>η4>η3>η1} |
Methods | Score Function | Ranking | Final Ranking |
Mondal et al. [17] | {η1=0.0121,η2=0.1987,η3=0.1333,η4=0.1721} | {η2>η4>η3>η1} | {η2>η4>η3>η1} |
Own C-M [16] | {η1=0.0103,η2=0.1012,η3=0.0234,η4=0.0981} | {η2>η4>η3>η1} | {η2>η4>η3>η1} |
Zhou et al. [12] | {η1=0.0109,η2=0.1981,η3=0.0451,η4=0.1213} | {η2>η4>η3>η1} | {η2>η4>η3>η1} |