Research article Special Issues

Disaster decision-making with a mixing regret philosophy DDAS method in Fermatean fuzzy number

  • Received: 22 August 2022 Revised: 09 November 2022 Accepted: 10 November 2022 Published: 29 November 2022
  • MSC : 03B52, 03E72

  • In this paper, the use of the Fermatean fuzzy number (FFN) in a significant research problem of disaster decision-making by defining operational laws and score function is demonstrated. Generally, decision control authorities need to brand suitable and sensible disaster decisions in the direct conceivable period as unfitting decisions may consequence in enormous financial dead and thoughtful communal costs. To certify that a disaster comeback can be made, professionally, we propose a new disaster decision-making (DDM) technique by the Fermatean fuzzy Schweizer-Sklar environment. First, the Fermatean fuzzy Schweizer-Sklar operators are employed by decision-makers to rapidly analyze their indefinite and vague assessment information on disaster choices. Then, the DDM technique based on the FFN is planned to identify highly devastating disaster choices and the best available choices. Finally, the proposed regret philosophy DDM technique is shown functional to choose the ideal retort explanation for a communal fitness disaster in Pakistan. The dominance and realism of the intended technique are further defensible through a relative study with additional DDM systems.

    Citation: Aliya Fahmi, Rehan Ahmed, Muhammad Aslam, Thabet Abdeljawad, Aziz Khan. Disaster decision-making with a mixing regret philosophy DDAS method in Fermatean fuzzy number[J]. AIMS Mathematics, 2023, 8(2): 3860-3884. doi: 10.3934/math.2023192

    Related Papers:

    [1] Ilyasse Lamrani, Imad El Harraki, M. A. Aziz-Alaoui, Fatima-Zahrae El Alaoui . Feedback stabilization for prey predator general model with diffusion via multiplicative controls. AIMS Mathematics, 2023, 8(1): 2360-2385. doi: 10.3934/math.2023122
    [2] Shanshan Yu, Jiang Liu, Xiaojie Lin . Multiple positive periodic solutions of a Gause-type predator-prey model with Allee effect and functional responses. AIMS Mathematics, 2020, 5(6): 6135-6148. doi: 10.3934/math.2020394
    [3] Heping Jiang . Complex dynamics induced by harvesting rate and delay in a diffusive Leslie-Gower predator-prey model. AIMS Mathematics, 2023, 8(9): 20718-20730. doi: 10.3934/math.20231056
    [4] Binfeng Xie, Na Zhang . Influence of fear effect on a Holling type III prey-predator system with the prey refuge. AIMS Mathematics, 2022, 7(2): 1811-1830. doi: 10.3934/math.2022104
    [5] Jagdev Singh, Behzad Ghanbari, Ved Prakash Dubey, Devendra Kumar, Kottakkaran Sooppy Nisar . Fractional dynamics and computational analysis of food chain model with disease in intermediate predator. AIMS Mathematics, 2024, 9(7): 17089-17121. doi: 10.3934/math.2024830
    [6] Chuanfu Chai, Yuanfu Shao, Yaping Wang . Analysis of a Holling-type IV stochastic prey-predator system with anti-predatory behavior and Lévy noise. AIMS Mathematics, 2023, 8(9): 21033-21054. doi: 10.3934/math.20231071
    [7] Anel Esquivel-Navarrete, Jorge Sanchez-Ortiz, Gabriel Catalan-Angeles, Martin P. Arciga-Alejandre . Tritrophic fractional model with Holling III functional response. AIMS Mathematics, 2024, 9(6): 15937-15948. doi: 10.3934/math.2024771
    [8] Mianjian Ruan, Chang Li, Xianyi Li . Codimension two 1:1 strong resonance bifurcation in a discrete predator-prey model with Holling Ⅳ functional response. AIMS Mathematics, 2022, 7(2): 3150-3168. doi: 10.3934/math.2022174
    [9] Chengchong Lu, Xinxin Liu, Zhicheng Li . The dynamics and harvesting strategies of a predator-prey system with Allee effect on prey. AIMS Mathematics, 2023, 8(12): 28897-28925. doi: 10.3934/math.20231481
    [10] Chuangliang Qin, Jinji Du, Yuanxian Hui . Dynamical behavior of a stochastic predator-prey model with Holling-type III functional response and infectious predator. AIMS Mathematics, 2022, 7(5): 7403-7418. doi: 10.3934/math.2022413
  • In this paper, the use of the Fermatean fuzzy number (FFN) in a significant research problem of disaster decision-making by defining operational laws and score function is demonstrated. Generally, decision control authorities need to brand suitable and sensible disaster decisions in the direct conceivable period as unfitting decisions may consequence in enormous financial dead and thoughtful communal costs. To certify that a disaster comeback can be made, professionally, we propose a new disaster decision-making (DDM) technique by the Fermatean fuzzy Schweizer-Sklar environment. First, the Fermatean fuzzy Schweizer-Sklar operators are employed by decision-makers to rapidly analyze their indefinite and vague assessment information on disaster choices. Then, the DDM technique based on the FFN is planned to identify highly devastating disaster choices and the best available choices. Finally, the proposed regret philosophy DDM technique is shown functional to choose the ideal retort explanation for a communal fitness disaster in Pakistan. The dominance and realism of the intended technique are further defensible through a relative study with additional DDM systems.



    MS-algebras were considered by T. S. Blyth and J. C. Varlet[15] as a common properties of de Morgan algebras and Stone algebras. T. S. Blyth and J. C. Varlet[16] described the lattice Λ(MS) of all subclasses of the class MS of all MS-algebras by identities.

    A. Badawy, D. Guffovˊa and M. Haviar[10] introduced and characterized the class of principal MS-algebras and the class of decomposable MS-algebras by means of principal MS-triples and decomposable MS-triples, respectively. They obtained a one-to-one correspondence between principal MS-algebras (decomposable MS-algebras) and principal MS-triples (decomposable MS-triples). Moreover, they proved that the class of principal MS-algebras is a subclass of the class of decomposable MS-algebras.

    A. Badawy[6] established the relationship between de Morgan filters and congruences of a decomposable MS-algebra. A. Badawy[3] introduced the notion of dL-filters of a principal MS-algebra and characterized certain congruences in terms of dL-filters. Recently, A. Badawy, M. Haviar and M. Ploˇsˇcica[11] introduced and described the notions of congruence pairs and perfect extensions of principal MS-algebras. They characterized the lattice of congruences of a principal MS-algebra in terms of congruence pairs. In 2021, S. El-Assar and A. Badawy[19] characterized permutability of congruences and strong extensions of decomposable MS-algebras by means of congruence pairs.

    We review in Section 2 many basic concepts and results that we are using throughout this article. We give an example (Example 2.1) to determine the principsl MS-triple (L,D(L),φL) assosiated with a certain principal MS-algebra L. In Section 3, we give equivalent conditions for a pair of congruence (θ1,θ2)Con(L)×Conlat(D(L)) to become an MS-congruence pair of a principal MS-algebra L, where θ1 is a congruence on a de Morgan algebra L and θ2 is a lattice congruence on the lattice D(L). Also, we characterize the lattice of all MS- congruence pairs which are induced by the Boolean elements of a principal MS-algebra. In Section 4, we discuss many properties of the congruence relation Ψ which defined on a principal MS-algebra L by

    (a,b)Ψa=ba=b.

    We prove that Ψ permutes with each congruence relation θ on L. Also, we characterize 2-permutability of congruences (briefly permutability) by means of MS-congruence pairs. We illustrate Examples 3.1 and 4.1 to clarify Theorems 3.1 and 4.4, respectively. Also, Example 4.2 introduces certain principal MS-algebra L, which has not 2-permutable congruences as well as D(L) has not also 2-permutable congruences. In Section 5, A characterization of n-permutability of congruences of a principal MS-algebra is given, which is a generalization of the characterization of 2-permutability of congruences of such algebras.

    In this section, we recall some specific definitions and remarkable results which are discussed in previous articles [10,14,15,16,17,19].

    Definition 2.1. [16] A de Morgan algebra is an algebra (L;,,,0,1) of type (2, 2, 1, 0, 0), where (L;,,0,1) is a bounded distributive lattice and the unary operation satisfying:

    (1)¯¯a=a,(2)¯(ab)=¯a¯b,(3)¯1=0.

    Definition 2.2. [15] A Stone algebra is an algebra (L;,,,0,1) of type (2,2,1,0,0), where (L;,,0,1) is a bounded distributive lattice and the unary operation satisfying:

    (1)(ab)=ab,(2)aa=1,(3)1=0.

    Definition 2.3. [15] An MS-algebra is an algebra (L;,,,0,1) of type (2, 2, 1, 0, 0), where (L;,,0,1) is a bounded distributive lattice and a unary operation satisfying:

    (1)aa,(2)(xy)=xy,(3)1=0.

    The class MS of all MS-algebras is equational. A de Morgan algebra is an MS-algebra satisfying the identity, a=a. The class S of a Stone algebra is a subclass of MS satisfying aa=0.

    The basic properties of MS-algebras which were shown in[15] are given in the following theorem.

    Theorem 2.1. Let a,b be any two elements of an MS-algebra L. Then

    (1) 0=0 and 1=1,

    (2) abba,

    (3) a=a,

    (4) a=a,

    (5) (ab)=ab,

    (6) (ab)=ab,

    (7) (ab)=ab.

    An element a of an MS-algebra L is called a closed element of L if a=a and an element dL is called a dense element of L if d=0.

    Theorem 2.2. Let L be an MS-algebra. Then

    (1) the set L={aL:a=a} of all closed elements of L is a de Morgan subalgebra of L, see [17],

    (2) the set D(L)={aL:a=0} of all dense elements of L is a principal filter of L, see [10].

    Definition 2.4. [10] An MS-algebra (L;,,,0,1) is called a principal MS-algebra if it satisfies the following conditions:

    (1) the filter D(L) is principal, that is, there exists an element dLL such that D(L)=[dL),

    (2) a=a(adL), for all aL.

    A principal MS-algebra L is a principal Stone algebra if xx=1, for all xL.

    Definition 2.5. [8] A principal MS-triple is (M,D,φ), where

    (1) M is a de Morgan algebra,

    (2) D is a bounded distributive lattice,

    (3) φ is a (0,1)-lattice homomorphism from M into D.

    Lemma 2.1. [10] Let L be a principal MS-algebra. Define a map φL:L[dL) by the following rule

    φL(a)=adL,for  all  aL.

    Then φL is a (0,1)-lattice homomorphism.

    Example 2.1. Consider the MS-algebra L in Figure 1.

    Figure 1.  L is a principal MS-algebra.

    It is clear that L is a principal MS-algebra with the smallest dense element z. Then the principal triple (L,D(L)=[z),φL) which associated with L is given in Figure 2.

    Figure 2.  (L,D(L),φL) is a principal MS-triple.

    Definition 2.6. [22] An equivalence relation θ on a lattice L is called a lattice congruence if (a,b)θ and (c,d)θ imply (ac,bd)θ and (ac,bd)θ.

    Definition 2.7. An equivalence relation θ on an MS-algebra L is called a congruence on L if

    (1) θ is a lattice congruence,

    (2) (a,b)θ implies (a,b)θ.

    We use Conlat(L) for the lattice of all lattice congruences of a lattice (L;,) and Con(L) for the lattice of all congruences of an MS-algebra (L;,,,0,1).

    Definition 2.8. Let L be a lattice and θConlat(L). Then we define the principal congruence generated by (a,b) which denoted by θ(a,b) as follows:

    θ(a,b)={θConlat(L):(a,b)θ}.

    If L is an MS-algebra and θCon(L), then

    θ(a,b)={θCon(L):(a,b)θ}.

    Let L be an MS-algebra. Then (θL,θD(L))Con(L)×Conlat(D(L)), where θL and θD(L) are the restrictions of θCon(L) to L and D(L), respectively. It is clear that θL is a congruence relation on a de Morgan algebra L and θD(L) is a lattice congruence on a lattice D(L).

    The symbols L and L will be used for the universal congruence L×L and the equality congruence on L, respectively.

    The concept of MS-congruence pairs is given as follows:

    Definition 2.9. [11] Let L be a principal MS-algebra with a smallest dense element dL. A pair of congruences (θ1,θ2)Con(L)×Conlat(D(L)) will be called an MS-congruence pairs if

    (a,b)θ1  implies  (adL,bdL)θ2.

    A characterization of congruences on a principal MS-algebra via MS-congruence pairs is given in the following theorem.

    Theorem 2.3. [11] Let L be a principal MS-algebra with the smallest dense element dL. For every congruence θ on L, the restrictions of θ to L and D(L) determine the MS-congruence pair (θL,θD(L)).

    Conversely, every MS-congruence pair (θ1,θ2) uniquely determines a congruence θ on L satisfying θL=θ1 and θD(L)=θ2. Such congruence can be defined by the rule

    (x,y)θ  if  and  only  if  (x,y)θ1  and  (xdL,ydL)θ2.

    Throughout this paper, dL denotes to the smallest dense element of a principal MS-algebra L.

    For extra information of MS-algebras, principal MS-algebras and decomposable MS-algebras, we refer the reader to[1,2,3,4,5,6,7,8,9,12,13,14,15,16,17,18,20,21,22,23,24].

    In this section, we characterize MS-congruence pairs of a principal MS-algebra and a principal Stone algebra. Also, we describe the lattice of all MS-congruence pairs which induced by the Boolean elements of a principal MS-algebra, in fact such lattice forms a Boolean algebra on it is own.

    Lemma 3.1. Let L be a principal MS-algebra and (θ1,θ2) be an MS-congruence pair. Then

    (a,b)θ1  and  (x,y)θ2  imply  (ax,by)θ2.

    Proof. Let (a,b)θ1 and (x,y)θ2. Then (adL,bdL)θ2 (by Definition 2.9) and (x,y)θ2 imply that (axdL,bydL)θ2. Therefore (ax,by)θ2 as x,ydL.

    Now, we give an important characterization of MS-congruence pairs of a principal MS-algebra.

    Theorem 3.1. Let L be a principal MS-algebra with the smallest dense element dL. Then the following statements are equivalent:

    (1) (θ1,θ2) is an MS-congruence pair of L,

    (2) ConφL(L)θ2, where

    ConφL(θ1)={(φL(a),φL(b)):(a,b)θ1}  and  φL(a)=adL,aL.

    Proof. (12) Let (θ1,θ2) be an MS-congruence pair of L and (x,y)ConφL(θ1). Then (x,y)=(φL(a),φL(b))=(adL,bdL), where (a,b)θ1. Since (a,b)θ1, then (adL,bdL)θ2, by (1). Thus (x,y)θ2. So ConφL(θ1)θ2.

    (21) Let Con(θ1)θ2. We prove that (θ1,θ2) is an MS-congruence pair of L. Let (a,b)θ1. Then by (2), (adL,bdL)=(φL(a),φL(b))θ2.

    A characterization of congruence pairs of a principal Stone algebra is given in the following.

    Theorem 3.2. Let L be a principal Stone algebra. Let (θ1,θ2)Con(L)×Conlat(D(L)). Then the following statements are equivalent:

    (1) (θ1,θ2) is an MS-congruence pair of L,

    (2) ConφL(θ1)θ2,

    (3) (a,1)θ1 and ua,uD(L) imply (u,1)θ2.

    Proof. In Theorem 3.1, we proved that (1) and (2) are equivalent.

    (23) Let ConφL(θ1)θ2. Let (a,1)θ1 and ua,uD(L). Then (φL(a),φL(1))θ2 by (2). Thus (adL,1)θ2.

    Now (adL,1)θ2 and (u,u)θ2,ua,uD(L) imply (audL,1u)θ2. Thus (u,1)θ2 as ua,dL.

    (31) Since L is a Stone algebra then L is a Boolean subalgebra of L and hence aa=1 for each aL. Suppose (3) holds and (a,b)θ1. Then (b,b)θ1 implies (ab,bb)=(ab,1)θ1 and (aa,ba)=(ba,1)θ1. Therefore (β,1)θ1, where β=(ab)(ab). It is clear that βL and βa=βb=ab. Since ββdLD(L) and (β,1)θ1 then (βdL,1)θ2 by (3). Thus (adL,adL)(1,βdL)θ2 implies (adL,(aβ)dL)=(adL,(ab)dL)θ2. Similarly, we can get (bdL,(bβ)dL)=(bdL,(ab)dL)θ2. Then (bdL,bdL)θ2.

    Example 3.1. Consider the principal MS-algebra L in Example 2.1 (Figure 1). The lattices Con(L) and A(L) of all congruences of L and all MS-congruence pairs of L are given in Figure 3, respectively.

    Figure 3.  The congruence lattices Con(L) and A(L).

    Where,

    L={(x,x):xL},α={{0,c,a},{x,y,z},{b,d,1}},β={{0,c,a},{x,b,y,d,z,1}},γ={{0,x,b},{c,y,d},{a,z,1}},δ={{0},{c},{a},{x,b},{y,d},{z,1}},L=L×L.

    And

    A(L)={(L,D(L)),(αL,αD(L)),(βL,βD(L)),(γL,γD(L)),(δL,δD(L)),(L,D(L))}={(L,D(L)),({{0,c,a},{b,d,1}},D(L)),({{0,c,a},{b,d,1}},D(L)),({{a,1},{c,d},{0,b}},D(L)),(L,D(L)),(L,D(L))}.

    It is clear that Con(L) isomorphic to A(L) under the isomorphism θ(θL,θD(L)).

    A subset I of a lattice L with 0 is called an ideal of L if

    (1)0I,(2)abI,a,bI,(3)I is an down-set, that is, ifxy,yIandxL,thenxI.

    A principal ideal of L generated by aL is defined by

    (a]={xL:xa}.

    A subset F of a lattice L with 1 is called a filter of L if

    (1)1F,(2)abF,a,bF,(3)F is an up-set, that is, ifxy,yFandxL,thenxF.

    A principal filter of L generated by aL is defined by

    [a)={xL:xa}.

    Definition 3.1. Let θ be a lattice congruence on a bounded lattice L. Then we have the following important subsets

    (i) The Kernel of θ (Kerθ) is the set {xL:(x,0)θ}, which is an ideal of L,

    (ii) The Cokernel of θ (Cokerθ) is the set {xL:(x,1)θ}, which is a filter of L.

    Definition 3.2. [7] An element c of an MS-algebra L is called a Boolean element of L if cc=1.

    It is ready seen that the set B(L)={c:cc=1} of all Boolean elements of L forms a Boolean subalgebra of L.

    Lemma 3.2. Let c be a Boolean element of a principal MS-algebra L. Then

    (1) θ(0,c) is a principal congruence relation on L with Kerθ(0,c)=(c], where

    (a,b)θ(0,c)ac=bc,

    (2) θ(φL(c),1) is a principal congruence relation on D(L) with Cokerθ(φL(c),1)=[φL(c)), where

    (x,y)θ(φL(c),1)x(cdL)=y(cdL).

    Proof.

    (1) It is easy to check that θ(0,c) is a principal congruence relation on L with Kerθ(0,c)=(c].

    (2) It is easy to show that θ(φL(c),1) is an equivalence relation on D(L). Let (x,y),(m,n)θ(φL(c),1). Thus x(cdL)=y(cdL) and m(cdL)=n(cdL). Then, we get (xm,yn)θ(φL(c),1) and (xm,yn)θ(φL(c),1). Therefore θ(φL(c),1) is a principal congruence on the lattice D(L). Also, we have

    Coker(θ(φL(c),1))={xD(L):(x,1)θ(φL(c),1)}={xD(L):x(cdL)=1(cdL)}={xD(L):x(cdL)=cdL}={xD(L):xcdL}=[cdL)=[φL(c)).

    Now, we observe that every Boolean element c of a principal MS-algebra L associated with the MS-congruence pair of the form (θ(0,c),θ(φL(c),1)).

    Theorem 3.3. Let L be a principal MS-algebra and cL. Then c is a Boolean element of L if and only if (θ(0,c),θ(φL(c),1)) is an MS-congruence pair of L.

    Proof. Let c be a Boolean element of L. We proved that θ(0,c) and θ(φL(c),1) are MS-congruence on L and lattice congruence on D(L), respectively (Lemma 3.2). To show that (θ(0,c),θ(φL(c),1)) is an MS-congruence pair, let (x,y)θ(0,c). Then

    (x,y)θ(0,c)xc=yc(xc)dL=(yc)dL(xdL)(cdL)=(ydL)(cdL)(xdL,ydL)θ(φL(c),1).

    Conversely, let (θ(0,c),θ(φL(c),1)) be an MS-congruence pair. Since (0,c)θ(0,c) then cc = 0c=0. Now, cc=(cc)=1. Therefore c is a Boolean element.

    The basic properties of principal congruence relations θ(0,a) and θ(φL(a),1),aB(L) are given in the following:

    Lemma 3.3. Let a,b be Boolean elements of a principal MS-algebra L. Then

    (1) ab if and only if θ(0,a)θ(0,b),

    (2) a=b if and only if θ(0,a)=θ(0,b),

    (3) θ(0,0)=L and θ(0,1)=L,

    (4) θ(0,a)θ(0,b)=θ(0,ab),

    (5) θ(0,a)θ(0,b)=θ(0,ab).

    Lemma 3.4. Let L be a principal MS-algebra. Then for every a,bB(L), we have

    (1) ab implies θ(φL(a),1)θ(φL(b),1),

    (2) θ(φL(a),1)θ(φL(b),1)=θ(φL(ab),1),

    (3) θ(φL(a),1)θ(φL(b),1)=θ(φL(ab),1),

    (4) θ(φL(0),1)=D(L) and θ(φL(1),1)=D(L).

    Proof.

    (1) Let ab. Then ab. Let (x,y)θ(φL(a),1) then x(adL)=y(adL). Now

    x(bdL)=x((ab)dL)=x{(adL)(bdL)}=x(adL)(bdL)=y(adL)(bdL)=y{(ab)dL}=y(bdL).

    Then (x,y)θ(φL(b),1). Therefore θ(φL(a),1)θ(φL(b),1).

    (2) Since a,bab then by (1), we have

    θ(φL(a),1),θ(φL(b),1)θ(φL(ab),1).

    Then θ(φL(ab),1) is an upper bound of θ(φL(a),1) and θ(φL(b),1). Let θ(φL(c),1) be an upper bound of θ(φL(a),1) and θ(φL(b),1).

    Then θ(φL(a),1),θ(φL(b),1)θ(φL(c),1) implies φL(c)φL(a), φL(b). Thus φL(c)φL(ab)=φL(ab) and hence θ(φL(ab),1)θ(φL(c),1). Therefore θ(φL(ab),1) is the least upper bound of θ(φL(a),1) and θ(φL(b),1).

    (3) Since aba,b then by (1) θ(φL(ab),1)θ(φL(a),1),θ(φL(b),1). Then θ(φL(ab),1) is a lower bound of θ(φL(a),1) and θ(φL(b),1). Let θ(φL(c),1) be a lower bound of θ(φL(a),1) and θ(φL(b),1). Then θ(φL(c),1)θ(φL(a),1),θ(φL(b),1) implies φL(a),φL(b)φL(c). Thus φL(ab)=φL(a)φL(b)φL(c) and hence θ(φL(c),1)θ(φ(ab),1). Therefore θ(φL(ab),1) is the greatest lower bound of θ(φL(a),1) and θ(φL(b),1).

    (4) Since dL,1θ(dL,1), then θ(dL,1)=D(L)×D(L)=D(L). Also, let (x,y)θ(φL(1),1) then x(1dL)=y(1dL). It follows, x=y and hence θ(φL(1),1)=D(L).

    Theorem 3.4. Let L be a principal MS-algebra. Consider the subsets H and G of Con(L) and Con(D(L)), respectively as follows:

    H={θ(0,a):aB(L)},G={θ(φL(a),1):aB(L)}.

    Then we have

    (1) (H;,,,L,L) is a Boolean algebra, where (θ(0,a))=θ(a,0),

    (2) (G;,,,D(L),DL) is a Boolean algebra, where (θ(φL(a),1))=θ(φL(a),1).

    Proof.

    (1) Since θ(0,0)=L and θ(0,1)=L. Then L,LH. Let θ(0,a),θ(0,b)H. Then we get

    θ(0,a)θ(0,b)=θ(0,ab),

    and

    θ(0,a)θ(0,b)=θ(0,ab).

    Therefore H is a bounded lattice. Since B(L) is a Boolean algebra, then aB(L) for all aB(L). Thus θ(0,a)H. Then we have

    θ(0,a)[θ(0,a)]=θ(0,a)θ(0,a)=θ(0,aa)=θ(0,1)=L,

    and

    θ(0,a)[(0,a)]=θ(0,a)θ(0,a)=θ(φL(0,aa)=θ(0,0)=L.

    Therefore (H;,,,L,L) is a Boolean algebra.

    (2) We have D(L)=θ(φL(1),1)G and D(L)=θ(φL(0),1)=D(L)G. Let θ(φL(a),1),θ(φL(b),1)G. Then we get

    θ(φL(a),1)θ(φL(b),1)=θ(φL(ab),1),

    and

    θ(φL(a),1)θ(φL(b),1)=θ(φL(ab),1).

    Therefore G is a bounded lattice. Since B(L) is a Boolean algebra, then aB(L) for all aB(L). Thus θ(φL(a),1)G. Then we have

    θ(φL(a),1)[θ(φL(a),1)]=θ(φL(a),1)θ(φL(a),1)=θ(φL(aa),1)=θ(φL(0),1)=D(L),

    and

    θ(φL(a),1)[θ(φL(a),1)]=θ(φL(a),1)θ(φL(a),1)=θ(φL(aa),1)=θ(φL(1),1)=D(L).

    Therefore (G;,,,DL,DL) is a Boolean algebra.

    Let L be a principal MS-algebra. Let A(L) be the lattice of all MS-congruence pairs of L. We consider a subset A(L) of A(L) as follows:

    A(L)={(θ(0,a),θ(φL(a),1)):aB(L)}.

    From the above results, we observe that the set A(L) of all MS-congruence pairs induced by the Boolean elements of a principal MS-algebra forms bounded sublattice of the lattice A(L). Moreover A(L) is a Boolean algebra on its own.

    Theorem 3.5. Let L be a principal MS-algebra. Then (A(L);,,,0A(L),1A(L)) is a Boolean algebra, where

    (θ(0,a),θ(φL(a),1))(θ(0,b),θ(φL(b),1))=(θ(0,ab),θ(φL(ab),1)),(θ(0,a),θ(φL(a),1)(θ(0,b),θ(φL(b),1))=(θ(0,ab),θ(φL(ab),1)),[(θ(0,a),θ(φL(a),1))]=(θ(0,a),θ(φL(a),1)),1A(L)=(L,D(L)),0A(L)=(L,D(L)).

    Example 3.2. Consider the principal MS-algebra L in Example 2.1. The lattices B(L) and A(L) of all Boolean elements of L and all MS-congruence pairs of L of the form (θ(0,a),θ(φL(a),1)),aB(L) are given in the following Figure 4, respectively. It is clear that B(L) and A(L) are isomorphic Boolean algebras under the isomorphism a(θ(0,a),θ(az,1)). Also, A(L) is a bounded sublattice of A(L).

    Figure 4.  The lattices B(L) and A(L).

    In this section, we characterize the notion of 2-permutability of congruences of a principal MS-algebra by means of MS-congruence pairs.

    Let L be an algebra. We say the congruences θ,ΦCon(L) are 2-permutable if θΦ=Φθ, that is, (x,a)θ and (a,y)Φ, x,y,aL imply (x,b)Φ and (b,y)θ for some bL. We call the algebra L has 2-permutable congruences (briefly permutable) if every pair of congruences of L permute.

    Lemma 4.1. A principal MS-algebra L has 2-permutable congruences if and only if every pair of principle congruences of L permute.

    Proof. Assume that every pair of principal congruences on L permute. Let θ and Φ be arbitrary congruences on L and (a,b)(θΦ),a,bL. Then (a,t)θ and (t,b)Φ for some tL. Then (a,t)θ(a,t) and (t,b)θ(t,b) imply that (a,b)θ(a,t)θ(t,b). Thus (a,b)θ(t,b)θ(a,t). Since θ(a,t)θ and θ(t,b)Φ, then (a,b)(Φθ). Therefore θ and Φ permute. The second implication is obvious.

    Define a relation Ψ on a principal MS-algebra L as follows:

    (a,b)Ψa=ba=b.

    Theorem 4.1. Let L be a principal MS-algebra with the smallest dense element dL. Then

    (1) Ψ is a congruence relation on L with KerΨ={0} and CokerΨ=D(L),

    (2) Ψ is closed congruence on L, that is, (x,x)Ψ,xL,

    (3) max [x]Ψ=x,xL, where [x]Ψ={yL:y=x} is the congruence class of x modulo Ψ.

    Proof.

    (1) One can check that Ψ is a congruence relation on L. Now, we have

    KerΨ={aL:(a,0)Ψ}={aL:a=1}={0},

    and

    CokerΨ={zL:(z,1)Ψ}={zL:z=1}=D(L)=[dL).

    (2) Since x=x then x[x]Ψ. Thus (x,x)Ψ.

    (3) Let y[x]Ψ. Then yy=x and x[x]Ψ. Thus x is the greatest member of the congruence class [x]Ψ.

    Theorem 4.2. Let L be a principal MS-algebra. Then

    (1) L/Ψ is a de Morgan algebra,

    (2) L/Ψ and L are isomorphic de Morgan algebras.

    Proof.

    (1) It is ready seen that (L/Ψ;,,{0},D(L)) is a bounded distributive lattice, where L/Ψ={[a]Ψ:aL} is the set of all congruence classes module Ψ and

    [a]Ψ[b]Ψ=[ab]Ψ,[a]Ψ[b]Ψ=[ab]Ψ.

    Define on L/Ψ by ([a]Ψ)=[a]Ψ,aL. We have

    ([0]Ψ)=[1]Ψ,([a]Ψ)=[a]Ψ=[a]Ψ,([a]Ψ[b]Ψ)=([a]Ψ)([b]Ψ).

    Then L/Ψ is a de Morgan algebra.

    (2) Define g:LL/Ψ by

    g(a)=[a]Ψ,aL.

    Let a,bL and a=b. Then a=b implies [a]Ψ=[b]Ψ. It follows that g is well defined map of L into L/Ψ. Let a,bL, we get

    g(ab)=[ab]Ψ=[a]Ψ[b]Ψ=g(a)g(b),
    g(ab)=[ab]Ψ=[a]Ψ[b]Ψ=g(a)g(b),

    and

    g(a)=[a]Ψ=([a]Ψ)=(g(a)).

    Let [a]Ψ=[b]Ψ. Then a=b implies a=b. Therefore g is an injective map. Let [a]ΨL/Ψ. Then [x]Ψ=[x]Ψ=g(x). Then g is a surjective map. This deduce that g is an isomorphism of de Morgan algebras.

    Now, we observe that Ψ satisfies the following property,

    Ψθ=θΨ  forall  θCon(L).

    Theorem 4.3. Let L be a principal MS-algebra. Then Ψ permutes with each congruence of L.

    Proof. We prove that Ψθ=θΨ for all θCon(L). Let (a,b)Ψθ. Then (a,z)Ψ and (z,b)θ for some zL. It follows that a=z and (z,b)θ. Now

    (z,b)θ(z,b)θand(adL,adL)θ(a(adL),b(adL))θ(a,b(adL))θ         as  a=a(adL)

    Since [b(adL)]=b, then (b(adL),b)Ψ. Therefore (a,b(adL))θ and (b(adL),b)Ψ. imply (a,b)θΨ. Then Ψθ=θΨ,θCon(L).

    Lemma 4.2. Let L be a principal MS-algebra. Then

    (1) L permutes with every congruence on L,

    (2) L permutes with every congruence on L.

    Proof.

    (1) Let (a,b)θL. Then (a,t)θ and (t,b)L for some tL. Thus (a,t)θ and t=b. Then (a,a)L and (a,b)θ imply (a,b)Lθ. Therefore θL=Lθ.

    (2) It is obvious.

    In the following theorem, we characterize 2-permutability of congruences of a principal MS-algebra L using MS-congruence pairs.

    Theorem 4.4. Let L be a principal MS-algebra. Then the following conditions are equivalent:

    (1) L has 2-permutable congruences.

    (2) L and D(L) have 2-permutable congruences.

    Proof. To prove the conditions (1) and (2) are equivalent, we show that the two congruences θ,ΦCon(L) are 2-permutable if and only if their restrictions θL,ΦL and θD(L),ΦD(L) have 2-permutable congruences on L and D(L), respectively. Firstly, suppose that θ,Φ have 2-permutable congruences on L. Let (x,z)θLΦL. Then there exist yL such that (x,y)θL and (y,z)ΦL. Then we have (x,y)θ and (y,z)Φ. Since θ,Φ are 2-permutable, then there exists aL such that (x,a)Φ and (a,y)θ. We get (x,a)=(x,a)ΦL and (a,z)θL. Therefore θL,ΦL are 2-permutable. Also, to prove that θD(L),ΦD(L) are 2-permutable, let (x,z)θD(L)ΦD(L). Then there exist yD(L) such that (x,y)θD(L) and (y,z)ΦD(L). Then we have (x,y)θ and (y,z)Φ. Since θ,Φ are 2-permutable, there exists aL such that

    (x,a)Φand(a,z)θ(x,adL)=(xdL,adL)Φand(adL,zdL)θ(x,adL)Φand(adL,z)θ,(x,adL)ΦD(L)and(adL,z)θD(L),asx,adL,zD(L)(x,z)ΦD(L)θD(L).

    Thus θD(L),ΦD(L) have 2-permutable congruences on D(L).

    Conversely, let θ,ΦCon(L). Assume that θL,ΦL and θD(L),ΦD(L), have 2-permutable congruences on L and D(L), respectively. Let (x,z)θΦ. Suppose that x,y,zL with (x,y)θ and (y,z)Φ. Then, by using Theorem 2.3, we get the following statements.

    (x,y),(y,z)ΦL,(xdL,ydL),(ydL,zdL)ΦD(L).

    Since θL,ΦL have 2-permutable congruences on L, there exists an element aL such that

    (x,a)ΦL  and  (a,z)θL.

    Since θD(L),ΦD(L) have 2-permutable congruences on D(L), there exists eD(L) such that (xdL,e)ΦDL and (e,zdL)θDL). It follows that (x,a)Φ,(a,z)θ and (xdL,e)Φ,(e,zdL)θ. Since L is a principal MS-algebra we have

    x=x(xdL)  and  z=z(zdL).

    Since θ,Φ are compatible with the operation, then (x,a)Φ and (xdL,e)Φ imply (x,ae)=(x(xdL),ae)Φ. Also (a,z)θ and (e,zdL)θ imply (ae,z)=(ae,z(zdL))θ. Consequently, we deduce that (x,ae)Φ and (ae,z)θ,aeL. Then (x,z)Φθ, and hence θ,Φ are 2-permutable.

    Now, we construct two examples to clarify the above theorem.

    Example 4.1. Consider the principal MS-algebra L in Example 2.1 (Figure 1). From Table 1, we show that L has 2-permutable congruences. Also, Tables 2 and 3 show that LandD(L) have 2-permutable congruences, respectively. Where αL=βL and δL=L.

    Table 1.  (Con(L);).
    L α β γ δ L
    L L α β γ δ L
    α α α β L β L
    β β β β L β L
    γ γ L L γ L L
    δ δ β β L δ L
    L L L L L L L

     | Show Table
    DownLoad: CSV
    Table 2.  (Con(L);).
    L αL γL L
    L L αL γL L
    αL αL αL L L
    γL γL L γL L
    L L L L L

     | Show Table
    DownLoad: CSV
    Table 3.  (Con(D(L));).
    D(L) D(L)
    D(L) D(L) D(L)
    D(L) D(L) D(L)

     | Show Table
    DownLoad: CSV

    In the following example, we give a principal MS-algebra L which has not 2-permutable congruences as well as D(L) has not also 2-permutable congruences.

    Example 4.2. Consider the principal MS-algebra L in Figure 5.

    Figure 5.  L is a principal MS-algebra with D(L)=[z).

    It is clear that D(L)={z,z1,1} and L={0,c,a,b,d,1}. Consider θ,ΦCon(L) as follows:

    θ=L{{x1,b},{y1,d},{z1,1}},Φ=L{{x,x1},{y,y1},{z,z1}}.

    We observe that θΦΦθ as (z,1)Φθ but (z,1)θΦ.

    Then L has not 2-permutable congruences and D(L) has not 2-permutable congruences as θD(L)ΦD(L)ΦD(L)θD(L).

    We generalize the concept of 2-permutability to the concept of n-permutability of congruences of principal MS-algebras.

    Definition 5.1. A principal MS-algebra L is said to have n-permutable congrunces if every two congruences θ,Φ of L are n-permutable, that is,

    θΦθ...=ΦθΦ...(n  times).

    At first, we need the following two lemmas.

    Lemma 5.1. Let L be a principal MS- algebra with the smallest dense element dL. Let θ,Φ be two congruences on L. Then we have

    (i) (θΦθ...)L=θLΦL...(n times),

    (ii) (θΦθ...)D(L)=θD(L)ΦD(L)...(n times).

    Proof.

    (i) Recall that θL,ΦL are the restrictions of θ,Φ on L, respectively. Let a,bL and (a,b)(θLΦL...). Then there exist c1,c2,...,cn1L such that

    (a,c1)θL,(c1,c2)ΦL,...,(cn1,b)Ψ,whereΨ={θL,ifnodd,ΦL,ifneven.

    Then

    (a,c1)θ,(c1,c2)Φ,...,(cn1,b)Ψ,whereΨ={θ,ifnodd,Φ,ifneven.

    Then (a,b)(θΦθ...) and hence (a,b)(θΦθ...)L. Therefore

    θLΦLθL...(θΦθ...)L.

    Conversely, let a,bL such that (a,b)(θΦθ...)L. Then (a,b)(θΦθ...). Then there exist c1,c2,...,cn1L such that

    (a,c1)θL,(c1,c2)ΦL,...,(cn1,b)Ψ,whereΨ={θL,ifnodd,ΦL,ifneven.

    Then we get

    (a,c1)θ,(c1,c2)Φ,...,(cn1,b)Ψ,whereΨ={θ,ifnodd,Φ,ifneven.

    Since c1,c2,...,cn1L, we have

    (a,c1)θL,(c1,c2)ΦL,...,(cn1,b)Ψ,whereΨ={θL,ifnodd,ΦL,ifneven.

    Therefore

    (a,b)(θLΦLθL...)

    and hence

    (θΦθ...)LθLΦLθL...(ntimes).

    Then we get

    (θΦθ...)L=θLΦLθL...(ntimes).

    (ii) Take x,yD(L), let (x,y)(θD(L)ΦD(L)ΦD(L)θD(L)...). Then (x,y)(θΦθ...) and hence (a,b)(θΦθ...)D(L). Then (θΦθ...)(θΦθ...)D(L).

    Conversely, let (x,y)(θΦθ...)D(L), then (x,y)(θΦ...). There exist d1,d2,...dn1L, such that

    (x,d1)θ,(d1,d2)Φ,...,(dn1,y)ψ,whereψ={θ,ifnodd,Φ,ifneven.

    Since x,ydL, we get,

    (x,d1)=(xdL,d1dL)θD(L),(d1dL,d2dL)ΦD(L),...,(dn1,bdL1)=(dn1,y)ψ,whereψ={θD(L),ifnodd,ΦD(L),ifneven.

    Hence (x,y)(θD(L)ΦD(L)θD(L)...). Then the required equality is proved.

    Lemma 5.2. Let θ and Φ be congruences on a principal MS-algebra L. Let ψ denoted to the relation θΦθ...(n times). Then (a,b)ψ and (c,d)ψ imply (ac,bd)ψ.

    Proof. Let (a,b)ψ and (c,d)ψ. Then there exist a1,a2,...,an1,c1,c2,...,cn1L such that

    (a,a1)θ,(a1,a2)Φ,...,(an1,b)Ψ,whereΨ={θ,ifnodd,Φ,ifneven.

    And

    (c,c1)θ,(c1,c2)Φ,...,(cn1,d)Ψ,whereΨ={θ,ifnodd,Φ,ifneven.

    Since θ,Φ are congruence on L then we get,

    (ac,a1c1)θ,(a1c1,a2c2)Φ,...,(an1cn1,bd)Ψ,whereΨ={θ,ifnodd,Φ,ifneven.

    Thus (ac,bd)ψ.

    Now, a characterization of n-permutability of principal MS-algebras is given.

    Theorem 5.1. Two congruences θ,Φ on a principal MS-algebra L are n-permutable if and only if their restrictions θL,ΦL and θD(L),ΦD(L) with respect to L and D(L) respectively are n-permutable.

    Proof. Let L has n-permutable congruences. Let θ,Φ be any two congruences on L. Then by (i) and (ii) of Lemma 5.1, respectively, we have

    θLΦLθL...=(θΦθ...)L=(ΦθΦ...)L=ΦLθLΦL...,

    and

    θD(L)ΦD(L)θD(L)...=(θΦθ...)D(L)=(ΦθΦ...)D(L)=ΦD(L)θD(L)ΦD(L)....

    Therefore L and D(L) have n-permutable congruences.

    Conversely, let L and D(L) have n-permutable congruences. If (a,b)(θΦθ...), using Theorem 2.3, we get

    (a,b)(θΦθ...)L,

    and

    (adL,bdL)(θΦθ...)DL.

    By lemma 5.1, we get

    (a,b)(θLΦLθL...),

    and

    (adL,bdL)(θD(L)ΦD(L)ΦD(L)...).

    Since θL,ΦL and θD(L),ΦD(L) are n-permutable on L,D(L), respectively, we have

    (a,b)(ΦLθLΦL...),

    and

    (adLbdL)(ΦD(L)θD(L)ΦD(L)...).

    It follows that, (a,b)(ΦθΦ...) and (adL,bdL)(ΦθΦ...). Since L is a principal MS-algebra, then a=a(adL) and b=b(bdL). By Lemma 5.2, we get

    (a(adL),b)=(a,b)(ΦθΦ...).

    Thus (θΦθ...)(ΦθΦ...). Similarly we can show that (ΦθΦ...)(θΦθ...). Then L has n-permutable congruences.

    With the aid of the technique of MS-congruence pairs, many properties were investigated for principal MS-algebras, deal with a characterization of congruence pairs of a principal MS-algebra (a Stone algebra), a description of the lattice A(L) of all MS-congruence pairs of L via Boolean elements of L, characterizations of 2-permutability and n-permutability of congruences of a principal MS-algebra. This work leads us in the future to study many aspects of principal MS-algebras and related structures, for instance, it can be applied to triple construction of principal MS-algebra, affine and locally complete of principal MS-algebras.

    The authors declare they have not used Artificial Intelligence (AI) tools in the creation of this article.

    The authors declare no conflict of interest.



    [1] Q. Ding, Y. M. Wang, M. Goh, An extended TODIM approach for group emergency decision making based on bidirectional projection with hesitant triangular fuzzy sets, Comput. Ind. Eng., 151 (2021), 106959. https://doi.org/10.1016/j.cie.2020.106959 doi: 10.1016/j.cie.2020.106959
    [2] B. Batool, S. S. Abosuliman, S. Abdullah, S. Ashraf, EDAS method for decision support modeling under the Pythagorean probabilistic hesitant fuzzy aggregation information, J. Amb. Intell. Hum. Comput., 2021. https://doi.org/10.1007/s12652-021-03181-1 doi: 10.1007/s12652-021-03181-1
    [3] L. X. Hou, L. X. Mao, H. C. Liu, L. Zhang, Decades on emergency decision-making: A bibliometric analysis and literature review, Complex Intell. Syst., 7 (2021), 2819–2832. https://doi.org/10.1007/s40747-021-00451-5 doi: 10.1007/s40747-021-00451-5
    [4] A. O. Almagrabi, S. Abdullah, M. Shams, Y. D. Al-Otaibi, S. Ashraf, A new approach to q-linear Diophantine fuzzy emergency decision support system for COVID19, J. Amb. Intell. Hum. Comput., 2022. https://doi.org/10.1007/s12652-021-03281-y doi: 10.1007/s12652-021-03281-y
    [5] Y. Rong, Y. Liu, Z. Pei, A novel multiple attribute decision-making approach for evaluation of emergency management schemes under picture fuzzy environment, Int. J. Mach. Learn. Cyb., 2021. https://doi.org/10.1007/s13042-021-01280-1 doi: 10.1007/s13042-021-01280-1
    [6] H. Li, J. Y. Guo, M. Yazdi, A. Nedjati, K. A. Adesina, Supportive emergency decision-making model towards sustainable development with fuzzy expert system, Neural Comput. Appl., 33 (2021), 15619–15637. https://doi.org/10.1007/s00521-021-06183-4 doi: 10.1007/s00521-021-06183-4
    [7] W. Xue, Z. Xu, X. Mi, Z. Ren, Dynamic reference point method with probabilistic linguistic information based on the regret theory for public health emergency decision-making, Econ. Res.-Ekon. Istraz., 2021. https://doi.org/10.1080/1331677X.2021.1875254 doi: 10.1080/1331677X.2021.1875254
    [8] X. Sha, C. C. Yin, Z. Xu, S. Zhang, Probabilistic hesitant fuzzy TOPSIS emergency decision-making method based on the cumulative prospect theory, J. Intell. Fuzzy Syst., 40 (2021), 4367–4383. https://doi.org/10.3233/JIFS-201119 doi: 10.3233/JIFS-201119
    [9] Y. Sun, J. Mi, J. Chen, W. Liu, A new fuzzy multi-attribute group decision-making method with generalized maximal consistent block and its application in emergency management, Knowl. Based Syst., 215 (2021), 106594. https://doi.org/10.1016/j.knosys.2020.106594 doi: 10.1016/j.knosys.2020.106594
    [10] X. D. Liu, J. Wu, S. T. Zhang, Z. W. Wang, H. Garg, Extended cumulative residual entropy for emergency group decision-making under probabilistic hesitant fuzzy environment, Int. J. Fuzzy Syst., 2021. https://doi.org/10.1007/s40815-021-01122-w doi: 10.1007/s40815-021-01122-w
    [11] J. Zhan, B. Sun, X. Zhang, PF-TOPSIS method based on CPFRS models: An application to unconventional emergency events, Comput. Ind. Eng., 139 (2020), 106192. https://doi.org/10.1016/j.cie.2019.106192 doi: 10.1016/j.cie.2019.106192
    [12] X. F. Ding, H. C. Liu, H. Shi, A dynamic approach for emergency decision making based on prospect theory with interval-valued Pythagorean fuzzy linguistic variables, Comput. Ind. Eng., 131 (2019), 57–65. https://doi.org/10.1016/j.cie.2019.03.037 doi: 10.1016/j.cie.2019.03.037
    [13] X. Xu, L. Wang, X. Chen, B. Liu, Large group emergency decision-making method with linguistic risk appetites based on criteria mining, Knowl. Based Syst., 182 (2019), 104849. https://doi.org/10.1016/j.knosys.2019.07.020 doi: 10.1016/j.knosys.2019.07.020
    [14] X. F. Ding, H. C. Liu, An extended prospect theory-VIKOR approach for emergency decision making with 2-dimension uncertain linguistic information, Soft Comput., 23 (2019), 12139–12150. https://doi.org/10.1007/s00500-019-04092-2 doi: 10.1007/s00500-019-04092-2
    [15] X. F. Ding, H. C. Liu, A new approach for emergency decision-making based on zero-sum game with Pythagorean fuzzy uncertain linguistic variables, Int. J. Intell. Syst., 34 (2019), 1667–1684. https://doi.org/10.1002/int.22113 doi: 10.1002/int.22113
    [16] F. Herrera, L. Martínez, A 2-tuple fuzzy linguistic representation model for computing with words, IEEE T. Fuzzy Syst., 8 (2000), 746–752. https://doi.org/10.1109/91.890332 doi: 10.1109/91.890332
    [17] H. C. Liu, P. Li, J. X. You, Y. Z. Chen, A novel approach for FMEA: Combination of interval 2-tuple linguistic variables and grey relational analysis, Qual. Reliab. Eng. Int., 31 (2015), 761–772. https://doi.org/10.1002/qre.1633 doi: 10.1002/qre.1633
    [18] H. C. Liu, J. X. You, X. Y. You, Evaluating the risk of healthcare failure modes using interval 2-tuple hybrid weighted distance measure, Comput. Ind. Eng., 78 (2014), 249–258. https://doi.org/10.1016/j.cie.2014.07.018 doi: 10.1016/j.cie.2014.07.018
    [19] Y. Zhang, G. Wei, Y. Guo, C. Wei, TODIM method based on cumulative prospect theory for multiple attribute group decision-making under 2-tuple linguistic Pythagorean fuzzy environment, Int. J. Intell. Syst., 36 (2021), 2548–2571. https://doi.org/10.1002/int.22393 doi: 10.1002/int.22393
    [20] A. Labella, B. Dutta, L. Martínez, An optimal Best-Worst prioritization method under a 2-tuple linguistic environment in decision making, Comput. Ind. Eng., 155 (2021), 107141. https://doi.org/10.1016/j.cie.2021.107141 doi: 10.1016/j.cie.2021.107141
    [21] Z. Wang, R. M. Rodríguez, Y. M. Wang, L. Martínez, A two-stage minimum adjustment consensus model for large scale decision making based on reliability modeled by two-dimension 2-tuple linguistic information, Comput. Ind. Eng., 151 (2021), 106973. https://doi.org/10.1016/j.cie.2020.106973 doi: 10.1016/j.cie.2020.106973
    [22] W. Wang, G. Tian, T. Zhang, N. H. Jabarullah, F. Li, A. M. Fathollahi-Fard, et al., Scheme selection of design for disassembly (DFD) based on sustainability: A novel hybrid of interval 2-tuple linguistic intuitionistic fuzzy numbers and regret theory, J. Clean. Prod., 281 (2021), 124724. https://doi.org/10.1016/j.jclepro.2020.124724 doi: 10.1016/j.jclepro.2020.124724
    [23] S. Faizi, W. Sałabun, S. Nawaz, A. U. Rehman, J. Wątróbski, Best-Worst method and Hamacher aggregation operations for intuitionistic 2-tuple linguistic sets, Expert Syst. Appl., 181 (2021), 115088. https://doi.org/10.1016/j.eswa.2021.115088 doi: 10.1016/j.eswa.2021.115088
    [24] H. Zhang, C. C. Li, Y. Liu, Y. Dong, Modeling personalized individual semantics and consensus in comparative linguistic expression preference relations with self-confidence: An optimization-based approach, IEEE T. Fuzzy Syst., 29 (2021), 627–640. https://doi.org/10.1109/TFUZZ.2019.2957259 doi: 10.1109/TFUZZ.2019.2957259
    [25] E. Herrera-Viedma, I. Palomares, C. C. Li, F. J. Cabrerizo, Y. Dong, F. Chiclana, et al., Revisiting fuzzy and linguistic decision making: Scenarios and challenges for making wiser decisions in a better way, IEEE T. Syst. Man. Cyb. Syst., 51 (2021), 191–208. https://doi.org/10.1109/TSMC.2020.3043016 doi: 10.1109/TSMC.2020.3043016
    [26] H. Liang, C. Li, Y. Dong, F. Herrera, Linguistic opinions dynamics based on personalized individual semantics, IEEE T., Fuzzy Syst., 29 (2020), 2453–2466. https://doi.org/10.1109/TFUZZ.2020.2999742 doi: 10.1109/TFUZZ.2020.2999742
    [27] S. Abdullah, O. Barukab, M. Qiyas, M. Arif, S. A. Khan, Analysis of decision support system based on 2-tuple spherical fuzzy linguistic aggregation information, Appl. Sci., 10 (2020), 276. https://doi.org/10.3390/app10010276 doi: 10.3390/app10010276
    [28] S. Ashraf, S. Abdullah, M. Aslam, M. Qiyas, M. A. Kutbi, Spherical fuzzy sets and its representation of spherical fuzzy t-norms and t-conorms, J. Intell. Fuzzy Syst., 36 (2019), 6089–6102. https://doi.org/10.3233/JIFS-181941 doi: 10.3233/JIFS-181941
    [29] P. Liu, Z. Ali, T. Mahmood, Novel complex t-spherical fuzzy 2-tuple linguistic Muirhead mean aggregation operators and their application to multi-attribute decision-making, Int. J. Comput. Intell. Syst., 14 (2021), 295–331. https://doi.org/10.2991/ijcis.d.201207.003 doi: 10.2991/ijcis.d.201207.003
    [30] L. Wang, Y. M. Wang, L. Martínez, A group decision method based on prospect theory for emergency situations, Inf. Sci., 2017,418–419. https://doi.org/10.1016/j.ins.2017.07.037 doi: 10.1016/j.ins.2017.07.037
    [31] B. Sun, W. Ma, An approach to evaluation of emergency plans for unconventional emergency events based on soft fuzzy rough set, Kybernetes, 45 (2016), 461–473. https://doi.org/10.1108/K-03-2014-0055 doi: 10.1108/K-03-2014-0055
    [32] M. Nassereddine, A. Azar, A. Rajabzadeh, A. Afsar, Decision making application in collaborative emergency response: A new PROMETHEE preference function, Int. J. Disast. Risk Re., 38 (2019), 101221. https://doi.org/10.1016/j.ijdrr.2019.101221 doi: 10.1016/j.ijdrr.2019.101221
    [33] L. Wang, R. M. Rodríguez, Y. M. Wang, A dynamic multi-attribute group emergency decision making method considering experts' hesitation, Int. J. Comput. Intell. Syst., 11 (2018), 163–182. https://doi.org/10.2991/ijcis.11.1.13 doi: 10.2991/ijcis.11.1.13
    [34] G. Loomes, R. Sugden, Regret theory: An alternative theory of rational choice under uncertainty, Econ. J., 92 (1982), 805–824. https://doi.org/10.2307/2232669 doi: 10.2307/2232669
    [35] J. Zhu, B. Shuai, G. Li, K. S. Chin, R. Wang, Failure mode and effect analysis using regret theory and PROMETHEE under linguistic neutrosophic context, J. Loss Prevent. Proc., 64 (2020), 104048. https://doi.org/10.1016/j.jlp.2020.104048 doi: 10.1016/j.jlp.2020.104048
    [36] L. Wang, Y. P. Hu, H. C. Liu, H. Shi, A linguistic risk prioritization approach for failure mode and effects analysis: A case study of medical product development, Qual. Reliab. Eng. Int., 35 (2019), 1735–1752. https://doi.org/10.1002/qre.2472 doi: 10.1002/qre.2472
    [37] K. W. Shen, X. K. Wang, D. Qiao, J. Q. Wang, Extended Z-MABAC method based on regret theory and directed distance for regional circular economy development program selection with Z-information, IEEE T. Fuzzy Syst., 28 (2020), 1851–1863. https://doi.org/10.1109/TFUZZ.2019.2923948 doi: 10.1109/TFUZZ.2019.2923948
    [38] M. K. Ghorabaee, E. K. Zavadskas, L. Olfat, Z. Turskis, Multicriteria inventory classification using a new method of evaluation based on distance from average solution (EDAS), Informatica, 26 (2015), 435–451. https://doi.org/10.15388/Informatica.2015.57 doi: 10.15388/Informatica.2015.57
    [39] Y. J. Ping, R. Liu, W. Lin, H. C. Liu, A new integrated approach for engineering characteristic prioritization in quality function deployment, Adv. Eng. Inform., 45 (2020), 101099. https://doi.org/10.1016/j.aei.2020.101099 doi: 10.1016/j.aei.2020.101099
    [40] R. Liu, X. Mou, H. C. Liu, New model for occupational health and safety risk assessment based on combination weighting and uncertain linguistic information, ⅡSE T. Occup. Erg. Hum., 8 (2021), 175–186. https://doi.org/10.1080/24725838.2021.1875519 doi: 10.1080/24725838.2021.1875519
    [41] D. Vukasović, D. Gligović, S. Terzić, Z. Stević, P. Macura, A novel fuzzy MCDM model for inventory management in order to increase business efficiency, Technol.Econ. Dev. Econ., 27 (2021), 386–401. https://doi.org/10.3846/tede.2021.14427 doi: 10.3846/tede.2021.14427
    [42] D. Panchal, P. Chatterjee, D. Pamucar, M. Yazdani, A novel fuzzy-based structured framework for sustainable operation and environmental friendly production in coal-fired power industry, Int. J. Intell. Syst., 2021. https://doi.org/10.1002/int.22507 doi: 10.1002/int.22507
    [43] B. Karatop, B. Taşkan, E. Adar, C. Kubat, Decision analysis related to the renewable energy investments in Turkey based on a fuzzy AHP-EDAS-fuzzy FMEA approach, Comput. Ind. Eng., 151 (2021), 106958. https://doi.org/10.1016/j.cie.2020.106958 doi: 10.1016/j.cie.2020.106958
    [44] L. X. Mao, R. Liu, X. Mou, H. C. Liu, New approach for quality function deployment using linguistic Z-numbers and EDAS method, Informatica, 32 (2021), 565–582. https://doi.org/10.15388/21-INFOR455 doi: 10.15388/21-INFOR455
    [45] L. Yu, K. K. Lai, A distance-based group decision-making methodology for multi-person multi-criteria emergency decision support, Decis. Support Syst., 51 (2011), 307–315. https://doi.org/10.1016/j.dss.2010.11.024 doi: 10.1016/j.dss.2010.11.024
    [46] Y. Ju, A. Wang, Emergency alternative evaluation under group decision makers: A method of incorporating DS/AHP with extended TOPSIS, Expert Syst. Appl., 39 (2012), 1315–1323. https://doi.org/10.1016/j.eswa.2011.08.012 doi: 10.1016/j.eswa.2011.08.012
    [47] Y. Ju, A. Wang, T. You, Emergency alternative evaluation and selection based on ANP, DEMATEL, and TL-TOPSIS, Nat. Hazards, 75 (2015), 347–379. https://doi.org/10.1007/s11069-014-1077-8 doi: 10.1007/s11069-014-1077-8
    [48] Y. Feng, Q. Zhang, Multi-attribute group decision making of internet public opinion emergency with interval intuitionistic fuzzy number, Int. J. Adv. Eng. Manag. Sci., 2 (2016), 43–48.
    [49] Y. Liu, Z. P. Fan, Y. Zhang, Risk decision analysis in emergency response: A method based on cumulative prospect theory, Comput. Oper. Res., 42 (2014), 75–82. https://doi.org/10.1016/j.cor.2012.08.008 doi: 10.1016/j.cor.2012.08.008
    [50] X. Xu, B. Pan, Y. Yang, Large-group risk dynamic emergency decision method based on the dual influence of preference transfer and risk preference, Soft Comput., 22 (2018), 7479–7490. https://doi.org/10.1007/s00500-018-3387-3 doi: 10.1007/s00500-018-3387-3
    [51] L. Wang, Z. X. Zhang, Y. M. Wang, A prospect theory-based interval dynamic reference point method for emergency decision making, Expert Syst, Appl., 42 (2015), 9379–9388. https://doi.org/10.1016/j.eswa.2015.07.056 doi: 10.1016/j.eswa.2015.07.056
    [52] Z. X. Zhang, L. Wang, Y. M. Wang, An emergency decision making method based on prospect theory for different emergency situations, Int. J. Disast. Risk Sci., 9 (2018), 407–420. https://doi.org/10.1007/s13753-018-0173-x doi: 10.1007/s13753-018-0173-x
    [53] X. Peng, H. Garg, Algorithms for interval-valued fuzzy soft sets in emergency decision making based on WDBA and CODAS with new information measure, Comput. Ind. Eng., 119 (2018), 439–452. https://doi.org/10.1016/j.cie.2018.04.001 doi: 10.1016/j.cie.2018.04.001
    [54] S. Ashraf, S. Abdullah, Emergency decision support modeling for COVID-19 based on spherical fuzzy information, Int. J. Intell. Syst., 35 (2020), 1601–1645. https://doi.org/10.1002/int.22262 doi: 10.1002/int.22262
    [55] X. F. Ding, L. Zhang, H. C. Liu, Emergency decision making with extended axiomatic design approach under picture fuzzy environment, Expert Syst., 37 (2020), e12482. https://doi.org/10.1111/exsy.12482 doi: 10.1111/exsy.12482
    [56] A. Tversky, D. Kahneman, Advances in prospect theory: Cumulative representation of uncertainty, J. Risk Uncertain., 5 (1992), 297–323. https://doi.org/10.1007/BF00122574 doi: 10.1007/BF00122574
    [57] J. Quiggin, Regret theory with general choice sets, J. Risk Uncertain., 8 (1994), 153–165. https://doi.org/10.1007/BF01065370 doi: 10.1007/BF01065370
    [58] J. Chai, S. Xian, S. Lu, Z-uncertain probabilistic linguistic variables and its application in emergency decision making for treatment of COVID-19 patients, Int. J. Intell. Syst., 36 (2021), 362–402. https://doi.org/10.1002/int.22303 doi: 10.1002/int.22303
    [59] H. Li, M. Yazdi, Advanced decision-making methods and applications in system safety and reliability problems, Springer, 2022.
    [60] Y. Mohammad, Linguistic methods under fuzzy information in system safety and reliability analysis, Springer, 2022.
    [61] Y. Mohammad, Acquiring and sharing tacit knowledge in failure diagnosis analysis using intuitionistic and pythagorean assessments, J. Fail. Anal. Prev., 19 (2019), 369–386. https://doi.org/10.1007/s11668-019-00599-w doi: 10.1007/s11668-019-00599-w
    [62] M. Akram, G. Ali, J. C. R. Alcantud, A. Riaz, Group decision-making with Fermatean fuzzy soft expert knowledge, Artif. Intell. Rev., 2022, 1–41. https://doi.org/10.1007/s10462-021-10119-8 doi: 10.1007/s10462-021-10119-8
    [63] M. Akram, U. Amjad, J. C. R. Alcantud, G. Santos-García, Complex Fermatean fuzzy N-soft sets: A new hybrid model with applications, J. Amb. Intell. Hum. Comput., 2022, 1–34. https://doi.org/10.1007/s12652-021-03629-4 doi: 10.1007/s12652-021-03629-4
    [64] G. Shahzadi, A. Luqman, M. M. Ali Al-Shamiri, The extended MOORA method based on Fermatean fuzzy information, Math. Probl. Eng., 2022. https://doi.org/10.1155/2022/7595872
    [65] M. Akram, S. M. U. Shah, M. M. A. Al-Shamiri, S. A. Edalatpanah, Extended DEA method for solving multi-objective transportation problem with Fermatean fuzzy sets, AIMS Math., 8 (2023), 924–961. https://doi.org/10.3934/math.2023045 doi: 10.3934/math.2023045
    [66] M. Akram, G. Muhammad, T. Allahviranloo, G. Ali, A solving method for two-dimensional homogeneous system of fuzzy fractional differential equations, AIMS Math., 8 (2023), 228–263. https://doi.org/10.3934/math.2023011 doi: 10.3934/math.2023011
    [67] M. Akram, Z. Niaz, 2-Tuple linguistic Fermatean fuzzy decision-making method based on COCOSO with CRITIC for drip irrigation system analysis, J. Comput. Cogn. Eng., 2022. https://doi.org/10.47852/bonviewJCCE2202356 doi: 10.47852/bonviewJCCE2202356
    [68] M. Akram, G. Ali, J. C. R. Alcantud, A. Riaz, Group decision-making with Fermatean fuzzy soft expert knowledge, Artif. Intell. Rev., 2022, 1–41. https://doi.org/10.1007/s10462-021-10119-8 doi: 10.1007/s10462-021-10119-8
    [69] M. Akram, U. Amjad, J. C. R. Alcantud, G. Santos-García, Complex Fermatean fuzzy N-soft sets: A new hybrid model with applications, J. Amb. Intell. Hum. Comput., (2022), 1–34. https://doi.org/10.1007/s12652-021-03629-4 doi: 10.1007/s12652-021-03629-4
    [70] J. C. R. Alcantud, G. Santos-García, M. Akram, OWA aggregation operators and multi-agent decisions with N-soft sets, Expert Syst. Appl., 203 (2022), 117430. https://doi.org/10.1016/j.eswa.2022.117430 doi: 10.1016/j.eswa.2022.117430
  • Reader Comments
  • © 2023 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(1608) PDF downloads(90) Cited by(2)

Figures and Tables

Figures(6)  /  Tables(19)

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog