Processing math: 55%
Research article Special Issues

Improved successive approximation control for formation flying at libration points of solar-earth system


  • In deep space exploration, the libration points (especially L2 point) of solar-earth system is a re-search hotspot in recent years. Space station and telescope can be arranged at this point, and it does not need too much kinetic energy. Therefore, it is of great significance to arrange flight formation on the libration point of solar-earth for scientific research. However, the flight keeping control technology of flight formation on the solar-earth libration points (also called Lagrange points) is one of the key problems to be solved urgently. Based on the nonlinear dynamic model of formation flying, the improved successive approximation algorithm is used to achieve formation keeping con-trol. Compared with the control algorithm based on orbital elements, this control algorithm has the advantages of high control accuracy and short control time in formation keeping control of solar-earth libration points. The disadvantage is that the calculation is complicated. But, with the devel-opment of computer technology, the computational load is gradually increasing, and there will be more extensive application value in the future. Finally, the error and control simulations of the formation flying of the spacecraft with the libration points of the solar-earth system are carried out for two days. The simulation results show that the method can quickly achieve the requirements of high-precision control.

    Citation: Zhenqi He, Lu Yao. Improved successive approximation control for formation flying at libration points of solar-earth system[J]. Mathematical Biosciences and Engineering, 2021, 18(4): 4084-4100. doi: 10.3934/mbe.2021205

    Related Papers:

    [1] Muhammad Akram, Usman Ali, Gustavo Santos-García, Zohra Niaz . 2-tuple linguistic Fermatean fuzzy MAGDM based on the WASPAS method for selection of solid waste disposal location. Mathematical Biosciences and Engineering, 2023, 20(2): 3811-3837. doi: 10.3934/mbe.2023179
    [2] Sumera Naz, Muhammad Akram, Mohammed M. Ali Al-Shamiri, Mohammed M. Khalaf, Gohar Yousaf . A new MAGDM method with 2-tuple linguistic bipolar fuzzy Heronian mean operators. Mathematical Biosciences and Engineering, 2022, 19(4): 3843-3878. doi: 10.3934/mbe.2022177
    [3] Muhammad Akram, Ayesha Khan, Uzma Ahmad, José Carlos R. Alcantud, Mohammed M. Ali Al-Shamiri . A new group decision-making framework based on 2-tuple linguistic complex q-rung picture fuzzy sets. Mathematical Biosciences and Engineering, 2022, 19(11): 11281-11323. doi: 10.3934/mbe.2022526
    [4] Jimmy Ming-Tai Wu, Jerry Chun-Wei Lin, Philippe Fournier-Viger, Youcef Djenouri, Chun-Hao Chen, Zhongcui Li . The density-based clustering method for privacy-preserving data mining. Mathematical Biosciences and Engineering, 2019, 16(3): 1718-1728. doi: 10.3934/mbe.2019082
    [5] Tinghua Wang, Huiying Zhou, Hanming Liu . Multi-label feature selection based on HSIC and sparrow search algorithm. Mathematical Biosciences and Engineering, 2023, 20(8): 14201-14221. doi: 10.3934/mbe.2023635
    [6] Han Wu, Junwu Wang, Sen Liu, Tingyou Yang . Research on decision-making of emergency plan for waterlogging disaster in subway station project based on linguistic intuitionistic fuzzy set and TOPSIS. Mathematical Biosciences and Engineering, 2020, 17(5): 4825-4851. doi: 10.3934/mbe.2020263
    [7] Muhammad Akram, G. Muhiuddin, Gustavo Santos-García . An enhanced VIKOR method for multi-criteria group decision-making with complex Fermatean fuzzy sets. Mathematical Biosciences and Engineering, 2022, 19(7): 7201-7231. doi: 10.3934/mbe.2022340
    [8] Nian Zhang, Xue Yuan, Jin Liu, Guiwu Wei . Stochastic multiple attribute decision making with Pythagorean hesitant fuzzy set based on regret theory. Mathematical Biosciences and Engineering, 2023, 20(7): 12562-12578. doi: 10.3934/mbe.2023559
    [9] Yugui Jiang, Qifang Luo, Yuanfei Wei, Laith Abualigah, Yongquan Zhou . An efficient binary Gradient-based optimizer for feature selection. Mathematical Biosciences and Engineering, 2021, 18(4): 3813-3854. doi: 10.3934/mbe.2021192
    [10] Hong Qi, Guanglei Zhang, Heming Jia, Zhikai Xing . A hybrid equilibrium optimizer algorithm for multi-level image segmentation. Mathematical Biosciences and Engineering, 2021, 18(4): 4648-4678. doi: 10.3934/mbe.2021236
  • In deep space exploration, the libration points (especially L2 point) of solar-earth system is a re-search hotspot in recent years. Space station and telescope can be arranged at this point, and it does not need too much kinetic energy. Therefore, it is of great significance to arrange flight formation on the libration point of solar-earth for scientific research. However, the flight keeping control technology of flight formation on the solar-earth libration points (also called Lagrange points) is one of the key problems to be solved urgently. Based on the nonlinear dynamic model of formation flying, the improved successive approximation algorithm is used to achieve formation keeping con-trol. Compared with the control algorithm based on orbital elements, this control algorithm has the advantages of high control accuracy and short control time in formation keeping control of solar-earth libration points. The disadvantage is that the calculation is complicated. But, with the devel-opment of computer technology, the computational load is gradually increasing, and there will be more extensive application value in the future. Finally, the error and control simulations of the formation flying of the spacecraft with the libration points of the solar-earth system are carried out for two days. The simulation results show that the method can quickly achieve the requirements of high-precision control.



    In the first subsection of this section, we present introductory concepts related to the mining method selection problem. Further, we present a literature review. In the next subsections, we summarize the motivations, contributions and structure of the article.

    Mining method selection (MMS) has been considered as one of the most problematic and critical tasks in mining engineering. The ultimate objectives of MMS are to maximize the profits of organizations and to recover the mineral resources. The MMS should be appropriate so that the companies can provide a safe environment to the miners facing the minimum problems between the feasible alternatives. The selection of the most suitable mining method is considered as a complicated task because it involves the consideration of various factors, including social technical, economical, and historical. The most appropriate mining method is the one which is technically suitable for the ore geometry as well as the ground conditions, while also proving to be a low cost task. The selection of appropriate mining methods is very important for the economic benefits of a country. The selection of an inadequate mining method may cause serious issues, such as serious waste of resources, low production capacity, low efficiency and high production costs. MMS becomes quite important when an ore body has been prospected [1]. MMS includes certain factors like economical, technical, political and environmental factors [2]. Moreover, the selection of a suitable mining method is a great challenge because it involves various factors which include uncertainty and fuzziness [3]. MMS consists of three stages [4]: 1) preliminary screening; 2) techno-economic analysis; and 3) comprehensive comparison. MMS has proved to be an interesting research topic for researchers. Some fuzzy based approaches for MMS can be seen in [5]. MMS can be considered as a complicated engineering problem. Different mining methods are available such as, integrated methods of medium-length hole cross-cut and subsequent filling mining, the in-pulse mining non-pillar contact sectional filling mining method, underground mining, room and pillar mining, etc. Thus, the selection of mining methods directly influences the economy of a country. In this study, we have considered a case study [6] of the Kaiyang phosphate mine which is located in Jinzhong Town, Guiyang City, Guizhou Province, China, to select the appropriate mining method for the Kaiyang phosphate mine. In this case study, five mining methods {M1,M2,M3,M4,M5} are evaluated on the basis of five criteria; i.e., technical feasibility, economic benefits, management complexity, security status and environmental benefits. The description of the under consideration mining methods is summarized in Table 1.

    Table 1.  Mining methods.
    Symbols Mining methods
    M1 In-pulse mining non-pillar contact sectional filling mining method
    M2 Integrated method of room and pillar type joint out mine medium
    -length hole cross-cut and subsequent filling mining
    M3 Integrated method of medium-length hole cross-cut and subsequent
    filling mining
    M4 Integrated method of medium- length hole cross-cut and subsequent
    filling mining in an intra-pulse roadway
    M5 Integrated method of medium-length hole cross-cut with piecewise
    continuous mining and subsequent filling mining

     | Show Table
    DownLoad: CSV

    In recent years, many researchers have paid great attention to MMS based on fuzzy decision-making approaches.

    Zadeh [7] established fuzzy set (FS) theory a powerful model for proving and dealing with ambiguity in data through membership functions. FSs were drastically applied in Multi-criteria decision-making (MCDM) so that one can recover from the drawbacks and limitations of classical techniques. Later, Atanassov [8] proposed an extended version of FSs, called the intuitionistic fuzzy set (IFS), to overcome the shortcomings of FS theory. Furthermore, Yager [9,10] extended the theory of IFSs and proposed a broader structure called the Pythagorean fuzzy set (PyFS), which is denser and more powerful than IFSs. PyFSs are defined to relax the limitation of orthopair belonging degrees to the weaker supposition that μ2(x)+ν2(x)1 have to keep all through. Cuong and Kreinovich [11] proposed a generalization of the above concept, called picture fuzzy set (PFS), which consists of three membership degrees (MDs), that is, a positive MD (PMD) (μ), neutral MD (NMD) (ν) and negative MD (NeMD) (η)(μ+ν+η1). G¨undo˘gdu and Kahraman [12] and Mahmood et al. [13] proposed spherical fuzzy sets (SFSs) with the condition μ2+ν2+η21 on three membership degrees. SFSs are considered as the new extension of PFSs and PyFSs. In decision-making (DM) problems, experts like to present their evaluations qualitatively. For example, experts wants to express their opinions through linguistic terms (LTs) such as "good", "bad", "excellent", etc. To represent data in LTs, Zadeh [14] pointed out the difference between numerical data and linguistic data. He established the concept of linguistic variables; which help to express human opinions effectively. After that, Zhang [15] proposed the concept of a linguistic IFS (LIFS), where both the PMD and NeMD are represented by LTs. Lin et al. [16] introduced the concept of a linguistic PyFS (LPyFS). Jin et al. [17] proposed linguistic SF aggregation operators (AOs). Herrera and Martínez [18,19] proposed the idea of a 2-tuple linguistic representation model (2TLRM) to better represent judgment and evaluation information in multi-attribute group decision-making (MAGDM) problems. Liu et al. [20] provided a solution to DM problems by utilizing different AOs. Further material can be studied from [21,22,23,24,25]. The 2TLRM is a valuable concept for processing data in linguistic DM problems, and researchers have paid great attention to it. Deng et al. [26,27] introduced the 2-tuple linguistic (2TL) Pythagorean fuzzy Hamy mean and Heronian mean AOs. Wei [28] proposed the 2-tuple intuitionistic fuzzy linguistic AOs. Abdullah et al. [29] studied 2-tuple spherical fuzzy linguistic (2TSFL) AOs. For the development and progress of a society, mineral resources are of great significance for mankind [30].

    In the past, researchers have presented a variety of MAGDM methods and applied them to solve different problems. Brauers and Zavadskas [31] put forward the idea of a new method, called the multi-objective optimization ratio analysis (MOORA) method by providing its application in the field of economy. After the emergence of the MOORA method, an ordinary MOORA plus full multiplication form (MULTIMOORA) method was originated by Brauers and Zavadskas. In a study conducted by Brauers and Zavadskas [32], a fuzzy version of the MULTIMOORA method was established. Researchers conducted a survey on the MULTIMOORA method, and studied its history, development and applications [33]. In another study, Domínguez et al. [34] presented the intuitionistic fuzzy (IF) MOORA method to figure out the problem of supplier selection. Researchers studied and presented various extensions of the MULTIMOORA method, and they are available in [35,36]. In a study conducted by Garg and Rani [37], an IF MULTIMOORA was presented for the selection of solid waste management techniques. Some more extensions of the MULTIMOORA method and their applications can be studied from [38,39,40,41,42]. Sarkar and Biswas [43] introduced a Pythagorean fuzzy MULTIMOORA method. Baleˇzentis and Baleˇzentis [44] established the 2-tuple MULTIMOORA method and studied its application for supplier selection. G¨undo˘gdu [45] presented a spherical fuzzy extension of the MULTIMOORA method. Researchers proposed MULTIMOORA methods in different environments and presented their utilizations in different fields [46,47,48]. Recently, Akram et al. [49] introduced an extension of the MULTIMOORA method based on 2TLPyFSs. Wang and Triantaphyllou [50] presented a validity test for DM problems.

    Karadogan et al. [51] presented an application of FS theory in MMS. Different methods of MMS through the analytic hierarchy process can be seen in [52,53,54]. Moreover, researchers have focued on MMS based on the Nicholas technique [55], an optimization model of unascertained measurement [56], fuzzy mathematics and catastrophe theory [57]. For further MMS techniques, one may refer to [58]. Yao et al. [59] presented a mining method of Kaiyang phosphorite and Wu et al. [60] also studied the Kaiyang phosphorite mine. Liang et al. [6] established a method for the selection of appropriate mining methods based on the linguistic MULTIMOORA method. Therefore, motivated by the above discussion, we were inclined to design the MULTIMOORA method while considering the 2TSFL framework, and to discuss its application in MMS. Table 2 presents an overview of FSs and their related extensions. The present study explores the theory of the MULTIMOORA method to broaden the DM methodologies for the remarkable notion of 2-tuple spherical fuzzy linguistic set (2TSFLS). The existing models of FSs such as IFSs and PyFSs, are competent in many aspects but their deficiencies paved the way for a new model, called the SFS model. The superior structure of SFSs enables the decision makers to represent their judgements without any loss of information. Moreover, the LTs have the excellent capability to address the evaluations presented by the decision makers in terms of phrases or sentences which are then converted in the form of 2TL terms (2TLTs). The notion of 2TSFL sets (2TSFLSs) is highly efficient in representing the data in terms of 2TSFL numbers (2TSFLNs). The MULTIMOORA method serves as a potent and powerful method to find the most appropriate alternative during the DM process. Furthermore, this method is based on three approaches namely, the ratio analysis (RA) approach, reference point (RP) approach and full multiplicative form (FMF) approach. The results obtained from these three approaches are considered in the final ranking of alternatives. From existing studies, we observed that there is no work available in the literature on the 2TSFL-MULTIMOORA method. Therefore, we aimed to build a MULTIMOORA method based on 2TSFLSs to deal with MAGDM problems.

    Table 2.  Fuzzy sets and their related extensions.
    Fuzzy sets and their extensions Positive membership degree Negative membership degree Neutral membership degree 2TL information
    FS × × ×
    IFS × ×
    PyFS × ×
    PFS ×
    SFS ×
    LIFS × ×
    LPyFS × ×
    2TLIFS ×
    2TLPyFS ×
    2TSFLS

     | Show Table
    DownLoad: CSV

    Now we state some features of the proposed study are different from previous studies. First, the MULTIMOORA method has been introduced in various environments within the framework of FS theory as discussed in the literature review. But this method has not yet been studied for 2TSFLSs. For example, the 2TLPyF-MULTIMOORA method is able to demonstrate the evaluation information in terms of only two MDs which may lead to inaccurate results due to the loss of information. Therefore, we were inclined to study this method under the competent theory of 2TSFLSs. Second, we provided a comprehensive approach by establishing the proposed method to tackle DM problems. Therefore, we applied the presented technique to an actual case study which has not been studied for 2TSFLSs, which makes our work different from the existing studies.

    This paper describes an excellent MAGDM approach, namely, the 2TSFL-MULTIMOORA method, which consists of three approaches, and utilizes the dominance theory to reach the final result. Moreover, the proposed method consists of 2TL evaluations that benefit the experts' to make evaluations through LTs. We defended the proposed technique through a case study for the selection of a mining method for a phosphate mine. The overall motivation for this paper is summarized as follows:

    ● The SFS is a broader structure of existing FS theories, and it is a more generalized tool, having the ability to accommodate and manage considerably larger amounts of data than FS and its related extensions. An SFS consists of three MDs and it allows the experts to express their perspectives more clearly. Therefore, these salient features of SFSs motivate us to utilize it in our work.

    ● MAGDM problems are becoming more challenging for the experts with the passage of time. Sometimes it becomes quite challenging for the decision makers to give their judgements and preferences in numerical terms. LTs provide a broad range to the experts to represent their evaluation information qualitatively. Moreover, the 2TLTS overcomes the deficiencies of the classical LTS. In the 2TL model, the values are represented by a pair of elements, i.e., by (si,α), where si stands for the LT and α is the numerical value called its symbolic translation (ST). The above-mentioned properties of 2TLTSs motivate us to avail the notion of a 2TLTS.

    ● The 2TSFLS is the generalization of the SFS and the 2TLTS. The 2TSFLS combines the characteristics of the SFS and 2TLTS. The 2TSFLS expresses the MDs in the form of 2-tuples and enlarges the space to represent data accurately.

    ● The MULTIMOORA method is quite comprehensive and stable. It consists of three approaches, namely, the RA approach, RP approach and FMF approach and on their basis the alternatives were evaluated.

    Now, we state the contributions of this paper.

    ● We introduce a new normalized Hamming distance measure for the 2TSFLSs. In addition, we develop a new score and accuracy function to rank the 2TSFLSs.

    ● We present a MULTIMOORA method for the 2TSFLSs to cope with the challenges in MAGDM problems. From previous studies, we observed that there is a need to construct the MULTIMOORA method within the 2TSFL environment. Therefore, we decided to establish a MULTIMOORA method for the 2TSFLSs.

    ● We summarize the steps of the proposed strategy in a flowchart. The provided flowchart clarifies the procedure and makes each and every step of the presented method understandable.

    ● We demonstrate the applicability of the established method through a case study. We study the application of the proposed methodology in the engineering area. The provided case study is related to the selection of suitable mining methods.

    ● We describe a validity test to exhibit the effectiveness of the proposed methodology.

    ● We reveal the authenticity and superiority of the established approach by a comparative study.

    The rest of the paper is summarized as follows: In Section 2, we review some basics related to the 2TLTS, SFS and 2TSFLS. In Section 3, we discuss an extended MULTIMOORA method based on the 2TSFLS along with a fully developed flowchart to better demonstrate the technique of the proposed method. In Section 4, we apply the proposed method to an application related to the selection of a suitable mining method for a Kaiyang phosphate mine, along with a validity test and a comparison analysis. Section 5 discusses some implications of the study. Finally, in Section 6, we present our conclusions, implications of the study, limitations and future research.

    This section briefly recalls some fundamental notions, including the LTS, 2TLTS, SFS and 2TSFLS, which are important to comprehend the next sections.

    Definition 2.1. [18,19] Consider an LTS t={tk:k=0,1,2,,Θ} having odd cardinality, and where tk is the semantic of an LT corresponding to a linguistic variable. Consider the following example of an LTS t as:

    t={t0=veryimportant,t1=important,t2=mediumimportant,t3=lessimportant,t4=noimportant}.

    An LTS should satisfy the following conditions:

    ● It should be ordered: tk>tl, k>l.

    ● The max operator should be defined: max(tk,tl)=tk kl.

    ● The min operator should be defined: min(tk,tl)=tk kl.

    ● The negative operator should be defined: Neg(tk)=tl such that l=Θk.

    The 2TLRM represents the linguistic assessments in terms of a 2-tuple (tk,μk). Here, tk is the semantic from the LTS t and μk indicates the value of symbolic translation, where μk[0.5,0.5).

    Definition 2.2. [18,19] Suppose that the result achieved after applying an aggregation on the indices of semantics in an LTS t is λ, where λ[0,Θ],; also, Θ+1 is the cardinality of t. Further, suppose k=round(λ) and μ=λk are the two values with k[0,Θ] and μ[0.5,0.5),; then, μ is called symbolic translation.

    Definition 2.3. [18,19] Consider the LTS t={tk:k=0,1,2,,Θ} and λ[0,Θ]. A function Λ:[0,Θ]t×[0.5,0.5) which is utilized to transform λ into a 2-tuple (2T), is defined as follows:

    Λ(λ)={tk,k=round(λ)μ=λk,μ[0.5,0.5).

    Definition 2.4. [18,19] Consider the LTS t={tk:k=0,1,2,,Θ} and a 2-tuple (tk,μk). A function Λ1:t×[0.5,0.5)[0,Θ] which is utilized to transform a 2T to its nearest numerical value λ[0,Θ] is defined as follows:

    Λ1(tk,μ)=k+μ=λ.

    Definition 2.5. [12,13] On a universe H, an SFS ξ can be defined as:

    ξ={(z,α(z),β(z),γ(z)):zH}, (2.1)

    where α,β,γ:H[0,1] denotes the PMD, NMD and NeMD, respectively, of the element z in ξ satisfying the constraint (α(z))2+(β(z))2+(γ(z))21. For simplicity, the triplet (α,β,γ) is called the SF number (SFN). The degree of refusal membership of an SFN is given by the formula (1(α(z))2+(β(z))2+(γ(z))2)12, zH.

    Definition 2.6. [29] Consider a 2TSFLS L in K as

    L={(z,(tα(z),tβ(z),tγ(z))):zK}, (2.2)

    where tα(z), tβ(z) and tγ(z) denotes the PMD, NMD and NeMD of the number z to the linguistic variable L having the restrictions tα(z),tβ(z),tγ(z)L, and 3(α(z))2+(β(z))2+(γ(z))2(Θ+1)2. For simplicity, we call L=((tα(z),A),(tβ(z),B),(tγ(z),C)) 2TSFLN with A,B,C[0.5,0.5) and 3(Λ1(tα2(z),A))+(Λ1(tβ2(z),B))+(Λ1(tγ2(z),C))(Θ+1)2.

    Definition 2.7. [29] Suppose that the results achieved after applying an aggregation on the indices of semantics in an LTS t are a,b,c, where a,b,c[0,Θ], also, Θ is the cardinality of t. Further, suppose α=round(a),β=round(b),γ=round(c), are the three values and A=aα,B=bβ,C=cγ with A,B,C[0.5,0.5), then, A,B,C are called ST.

    Definition 2.8. [29] Consider the LTS t={tk:k=0,1,2,,Θ} and a,b,c[0,Θ]. A function Λ:[0,Θ]t×[0.5,0.5) which is utilized to transform a,b,c into a 2T is defined as follows:

    Λ(a)={tα,α=round(a)A=aα,A[0.5,0.5),
    Λ(b)={tβ,β=round(b)B=bβ,B[0.5,0.5),
    Λ(c)={tγ,γ=round(c)C=cγ,C[0.5,0.5),

    where round(.) indicates the usual round operation.

    Definition 2.9. [29] Consider the LTS t={tk:k=0,1,2,,Θ} and a 2TSFLS L as

    L={(z,(tα(z),tβ(z),tγ(z))):zK},

    then there exists a function Λ1:t×[0.5,0.5)[0,Θ], that restores each 2TSFLN to its equivalent numerical value a,b,c[0,Θ], where

    Λ1(tα,A)=α+A=a,Λ1(tβ,B)=β+B=b,Λ1(tγ,C)=γ+C=c.

    This section introduces the process of the new 2TSFL-MULTIMOORA established on the basis of the classical MULTIMOORA method. In the first subsection, we define the normalized Hamming distance and a new scoring function. In the next subsection we describe the 2TSFL-MULTIMOORA method. The proposed 2TSFL-MULTIMOORA method has three methods: 1) the RA method, 2) RP method and 3) FMF method. The first five steps are the same for all three methods. In addition, we present a flowchart to demonstrate the steps of the proposed method graphically.

    Definition 3.1. Consider two 2TSFLNs L1=((tα1,A1),(tβ1,B1),(tγ1,C1)) and L2=((tα2,A2),(tβ2,B2),(tγ2,C2)). The normalized Hamming distance is defined as:

    d(L1,L2)={Λ(12(|(Λ1(tα1,A1)Θ)2(Λ1(tα2,A2)Θ)2|+|(Λ1(tβ1,B1)Θ)2(Λ1(tβ2,B2)Θ)2|+|(Λ1(tγ1,C1)Θ)2(Λ1(tγ2,C2)Θ)2|))}. (3.1)

    Definition 3.2. Consider the 2TSFLN L=((tα,A),(tβ,B),(tγ,C)). The score function S of L is defined as

    S(L)=Λ{13(Θ2+(Λ1(tα,A)Θ)2(Λ1(tβ,B)Θ)2(Λ1(tγ,C)Θ)2)}, (3.2)

    and its accuracy function A is defined as

    A(L)=Λ{13(Θ2+(Λ1(tα,A)Θ)2+(Λ1(tβ,B)Θ)2+(Λ1(tγ,C)Θ)2)}. (3.3)

    An MAGDM problem can be represented as a judgement matrix whose elements represent the judgement values of the alternatives corresponding to each attribute within the 2TSFL environment. Let ~Al={~Al1,~Al2,,~Alm} be a family of m alternatives with a collection of n attributes ~AT={~AT1,~AT2,,~ATn}. Consider a set of l experts' Ex={Ex1,Ex2,,Exl}. Assume that ˜W=(˜W1,˜W2,,˜Wn)T and ˜W=(˜W1,˜W2,,˜Wl)T are the weights of attributes and the weights of decision makers, respectively. Moreover, it satisfies ˜Wj[0,1], nj=1˜Wj=1, ˜Wl[0,1] and lk=1˜Wl=1. The steps of the proposed MULTIMOORA method with 2TSFLNs are elaborated as follows:

    Step 1. Construction of LTs: In the first step, the experts' construct the LTs to judge the alternatives which are summarized in Table 3.

    Table 3.  LTs and their semantics.
    LTs Semantics
    Extremely inferior (EI) t0
    Very inferior (VI) t1
    Inferior (I) t2
    Slightly inferior (SI) t3
    Medium (M) t4
    Slightly superior (SS) t5
    Superior (S) t6
    Very superior (VS) t7
    Extremely superior (ES) t8

     | Show Table
    DownLoad: CSV

    Step 2. Construction of individual judgement matrices: Each of the experts set up an individual judgement matrix and present the judgement to analyze the alternatives on the grounds of attributes in the form of 2TSFLNs.

    Step 3. Normalization of individual matrices: Usually, the attributes are of two kinds, i.e., the benefit type and cost type. In this step, each individual judgement matrix is normalized by utilizing the following fact:

    ((ta,A),(tb,B),(tc,C))={((ta,A),(tb,B),(tc,C)),forbenefittypeattribute;((tc,C),(tb,B),(ta,A)),forcosttypeattribute.

    Step 4. Construction of combined judgement matrix: The normalized judgement matrices are combined and a combined judgement matrix is constructed by utilizing the 2TSFL weighted averaging (2TSFLWA) operator [29] as given in Eq (3.4).

    2TSFLWA(~Al1,~Al2,,~All)={Λ(Θ(1lk=1(1(Λ1(tα2k,Ak)Θ2))˜Wk)12),Λ(Θlk=1(Λ1(tβk,Bk)Θ)˜Wk),Λ(Θlk=1(Λ1(tγk,Ck)Θ)˜Wk)}. (3.4)

    The judgements of alternatives ~Ali(i=1,2,,m) corresponding to each attribute Cj(j=1,2,,n) are represented in terms of 2TSFLNs as Cj(~Ali)=Lij=((tαij,Aij),(tβij,Bij),(ˆlγij,Cij)). The combined judgement matrix D=Cj(~Ali)m×n is presented as follows:

    D=Cj(~Ali)m×n=[L11L12L1nL21L22L2nLm1Lm2Lmn]. (3.5)

    Step 5. Construction of weighted combined judgement matrix: The weighted combined 2TSFL judgement matrix of the alternatives corresponding to each attribute is constructed in this step by utilizing the attribute weights ˜Wj(j=1,2,,n) and Eq (3.6).

    ˜WD=D˜W={Λ(Θ(1(1(Λ1(tα2k,Ak)Θ2))˜Wk)12),Λ(Θ(Λ1(tβk,Bk)Θ)˜Wk),Λ(Θ(Λ1(tγk,Ck)Θ)˜Wk)}. (3.6)

    The weighted combined 2TSFL judgement matrix D=Cj(~Ali˜W)m×n can be defined as:

    D=Cj(~Ali˜W)m×n=[L11˜WL12˜WL1n˜WL21˜WL22˜WL2n˜WLm1˜WLm2˜WLmn˜W]. (3.7)

    First approach: RA approach

    Step 6. Calculation of Y+i values: In the first step of the approach, the Y+i values are calculated by utilizing the 2-tuple spherical fuzzy linguistic averaging operator as follows:

    2TSFLA(~Al1,~Al2,,~Aln)={Λ(Θ(1nj=1(1(Λ1(tα2j,Aj)Θ2)))12),Λ(Θnj=1(Λ1(tβj,Bj)Θ)),Λ(Θnj=1(Λ1(tγj,Cj)Θ))}. (3.8)

    Step 7. Calculation of score values: The scores of Y+i values are computed by using Eq (3.9).

    y+i=Score(Y+i)=Λ{13(Θ2+(Λ1(tα,A)Θ)2(Λ1(tβ,B)Θ)2(Λ1(tγ,C)Θ)2)}. (3.9)

    After the determination of scores, the alternatives are arranged in descending order based on Eq (3.9). The alternative possessing the highest score is regarded as the best one.

    Second approach: RP approach

    Step 6*. Calculation of scores of the weighted combined 2TSFL judgement matrix: The scores of the weighted combined 2TSFL judgement matrix determined in Step 6 are computed by using Eq (3.9).

    Step 7*. Determination of RPs. In this step, the RPs are determined by utilizing the Eq (3.10).

    xj={Cj,maxi(Score(Cj(~Ali˜W))):j=1,2,,n}. (3.10)

    Step 8*. Computation of alternatives distance from reference points: In this step, the distance of each value of the alternative from the RPs is calculated by using Eq (3.11).

    d(~Alij,xij)={Λ(12(|(Λ1(tα~Alij,A~Alij)Θ)2(Λ1(tαxij,Axij)Θ)2|+|(Λ1(tβ~Alij,B~Alij)Θ)2(Λ1(tβxij,Bxij)Θ)2|+|(Λ1(tγ~Alij,C~Alij)Θ)2(Λ1(tγxij,Cxij)Θ)2|))}. (3.11)
    Figure 1.  Flowchart of 2TSFL-MULTIMOORA method.

    Step 9*. Computation of maximum distance: Find the maxd(~Alij,xij) of the alternatives and assign an order to each alternative accordingly minimaxjd(~Alij,xij). In other words, the alternatives are ranked on the basis of variation from the RPs and the alternative possessing the minimum variation (distance) from the RPs is regarded as the best one.

    Third approach: The FMF approach

    Step 6**. Determination of Ai values: The Ai values based on the 2TSFL geometric (2TSFLG) operator [29] given in Eq (3.12) are computed.

    Ai={Λ(Θnj=1(Λ1(tαj,Aj)Θ)),Λ(Θ(1nj=1(1(Λ1(tβ2j,Bj)Θ2)))12),Λ(Θ(1nj=1(1(Λ1(tγ2j,Cj)Θ2)))12)}. (3.12)

    Step 7**. Calculation of score values: The scores of the Ai values using Eq (3.9) are calculated.

    Step 8**. Finding the feasible alternative: In the last step, the alternatives are ranked on the grounds of the scores as determined in Step 7** and the alternative possessing the highest score is regarded to be the most feasible one.

    The final selection of the best alternative is made on the idea of dominance theory in which the alternative possessing the highest number of appearances is regarded as the most feasible one.

    In this section, we applied the proposed 2TSFL-MULTIMOORA method to a case study which is related to the selection of the mining method for the Kaiyang phosphate mine. In the first subsection, we describe the application of the established approach to a case study. In the second subsection, we provided a validity test and the last subsection presents a comparative analysis.

    Mining is considered a source of employment for the public, and it is very important to contribute to local and regional communities. It plays a very important role in stimulating economic growth. Mining produces a team of trained workers and small businesses that can initiate the small businesses and serve communities. In this subsection, we have considered a case study [6] of the Kaiyang phosphate mine which is located in Jinzhong Town, Guiyang City, Guizhou Province, China. Maluping, Qincaichong, Yongshaba and Shabatu are the four sections of mine area. The phosphate reserve consists of 1.08 billion tons and the ore body is 2880 m in strike having a thickness of 4.5–8.2 m with an inclination angle of 20o45o. In this case, it is important to adopt a proper cut-and-fill stoping technique by using phosphogypsum and yellow phosphorus slag as filling materials. The data presented in the judgement matrices has been taken from [6]. The Kaiyang phosphate deposits are presented in Figure 2. Regarding choosing an appropriate mining method, there were five mining methods available {M1,M2,M3,M4,M5} [59] as presented in Table 1. Three experts {Ex1,Ex2,Ex3} were invited to select the mining method on the basis of five attributes {TF,ECB,MC,SS,EVB} which are displayed in Figure 3. MC is the cost type attribute and TF,ECB,SS,EVB are the benefit type attributes. It was assumed that all three experts' have equal weight. The experts assigned the weight vector ˜W={0.28,0.13,0.10,0.26,0.23} to the attributes. We utilized the Microsoft Excel software for numerical computations.

    Figure 2.  Kaiyang phosphate deposit.
    Figure 3.  Attributes and their descriptions.

    The steps of the 2TSFL-MULTIMOORA method are summarized as follows:

    Step 1. Table 3 represents the LTs along with their semantics provided by the experts.

    Step 2. Tables 46 represents the LTs for the individual judgement matrices in the form of the 2TSFLNs assigned to each alternative on the basis of attributes.

    Table 4.  Judgment matrices of Ex1.
    Decision maker Alternatives TF ECB MC
    Ex1 M1 ((t5,0),(t1,0),(t1,0)) ((t4,0),(t2,0),(t2,0)) ((t3,0),(t4,0),(t3,0))
    M2 ((t5,0),(t3,0),(t2,0)) ((t3,0),(t5,0),(t3,0)) ((t4,0),(t3,0),(t2,0))
    M3 ((t5,0),(t1,0),(t1,0)) ((t3,0),(t2,0),(t4,0)) ((t3,0),(t5,0),(t3,0))
    M4 ((t5,0),(t1,0),(t2,0)) ((t5,0),(t3,0),(t1,0)) ((t2,0),(t2,0),(t1,0))
    M5 ((t4,0),(t2,0),(t3,0)) ((t2,0),(t4,0),(t2,0)) ((t4,0),(t6,0),(t2,0))
    Decision maker Alternatives SS EVB
    Ex1 M1 ((t5,0),(t1,0),(t1,0)) ((t5,0),(t2,0),(t1,0))
    M2 ((t4,0),(t3,0),(t2,0)) ((t4,0),(t3,0),(t2,0))
    M3 ((t3,0),(t4,0),(t2,0)) ((t3,0),(t4,0),(t4,0))
    M4 ((t5,0),(t4,0),(t1,0)) ((t4,0),(t6,0),(t3,0))
    M5 ((t2,0),(t5,0),(t1,0)) ((t4,0),(t6,0),(t5,0))

     | Show Table
    DownLoad: CSV
    Table 5.  Judgment matrices of Ex2.
    Decision maker Alternatives TF ECB MC
    Ex2 M1 ((t5,0),(t4,0),(t1,0)) ((t5,0),(t2,0),(t4,0)) ((t2,0),(t4,0),(t2,0))
    M2 ((t4,0),(t4,0),(t3,0)) ((t5,0),(t2,0),(t1,0)) ((t4,0),(t3,0),(t4,0))
    M3 ((t4,0),(t5,0),(t2,0)) ((t4,0),(t3,0),(t3,0)) ((t4,0),(t6,0),(t4,0))
    M4 ((t5,0),(t5,0),(t4,0)) ((t5,0),(t5,0),(t1,0)) ((t3,0),(t3,0),(t2,0))
    M5 ((t2,0),(t3,0),(t4,0)) ((t3,0),(t6,0),(t3,0)) ((t3,0),(t5,0),(t2,0))
    Decision maker Alternatives SS EVB
    Ex2 M1 ((t5,0),(t4,0),(t2,0)) ((t5,0),(t1,0),(t3,0))
    M2 ((t4,0),(t4,0),(t5,0)) ((t4,0),(t6,0),(t3,0))
    M3 ((t3,0),(t6,0),(t2,0)) ((t3,0),(t4,0),(t1,0))
    M4 ((t4,0),(t3,0),(t2,0)) ((t4,0),(t5,0),(t4,0))
    M5 ((t3,0),(t4,0),(t2,0)) ((t3,0),(t6,0),(t2,0))

     | Show Table
    DownLoad: CSV
    Table 6.  Judgment matrices of Ex3.
    Decision maker Alternatives TF ECB MC
    Ex3 M1 ((t5,0),(t4,0),(t3,0)) ((t5,0),(t3,0),(t2,0)) ((t2,0),(t4,0),(t3,0))
    M2 ((t5,0),(t2,0),(t1,0)) ((t4,0),(t3,0),(t2,0)) ((t3,0),(t4,0),(t3,0))
    M3 ((t5,0),(t2,0),(t3,0)) ((t4,0),(t5,0),(t2,0)) ((t3,0),(t5,0),(t5,0))
    M4 ((t4,0),(t2,0),(t2,0)) ((t5,0),(t2,0),(t1,0)) ((t2,0),(t1,0),(t3,0))
    M5 ((t2,0),(t4,0),(t2,0)) ((t3,0),(t4,0),(t1,0)) ((t4,0),(t5,0),(t3,0))
    Decision maker Alternatives SS EVB
    Ex3 M1 ((t5,0),(t4,0),(t1,0)) ((t5,0),(t2,0),(t2,0))
    M2 ((t4,0),(t4,0),(t1,0)) ((t3,0),(t5,0),(t4,0))
    M3 ((t3,0),(t5,0),(t4,0)) ((t4,0),(t2,0),(t3,0))
    M4 ((t4,0),(t5,0),(t5,0)) ((t2,0),(t3,0),(t5,0))
    M5 ((t3,0),(t4,0),(t5,0)) ((t3,0),(t5,0),(t5,0))

     | Show Table
    DownLoad: CSV

    Step 3. Tables 79 summarizes the normalized decision matrices in the form of 2TSFLNs.

    Table 7.  Normalized judgment matrices of Ex1.
    Decision maker Alternatives TF ECB MC
    Ex1 M1 ((t5,0),(t1,0),(t1,0)) ((t4,0),(t2,0),(t2,0)) ((t3,0),(t4,0),(t3,0))
    M2 ((t5,0),(t3,0),(t2,0)) ((t3,0),(t5,0),(t3,0)) ((t2,0),(t3,0),(t4,0))
    M3 ((t5,0),(t1,0),(t1,0)) ((t3,0),(t2,0),(t4,0)) ((t3,0),(t5,0),(t3,0))
    M4 ((t5,0),(t1,0),(t2,0)) ((t5,0),(t3,0),(t1,0)) ((t1,0),(t2,0),(t2,0))
    M5 ((t4,0),(t2,0),(t3,0)) ((t2,0),(t4,0),(t2,0)) ((t2,0),(t6,0),(t4,0))
    Decision maker Alternatives SS EVB
    Ex1 M1 ((t5,0),(t1,0),(t1,0)) ((t5,0),(t2,0),(t1,0))
    M2 ((t4,0),(t3,0),(t2,0)) ((t4,0),(t3,0),(t2,0))
    M3 ((t3,0),(t4,0),(t2,0)) ((t3,0),(t4,0),(t4,0))
    M4 ((t5,0),(t4,0),(t1,0)) ((t4,0),(t6,0),(t3,0))
    M5 ((t2,0),(t5,0),(t1,0)) ((t4,0),(t6,0),(t5,0))

     | Show Table
    DownLoad: CSV
    Table 8.  Normalized judgment matrices of Ex2.
    Decision maker Alternatives TF ECB MC
    Ex2 M1 ((t5,0),(t4,0),(t1,0)) ((t5,0),(t2,0),(t4,0)) ((t2,0),(t4,0),(t2,0))
    M2 ((t4,0),(t4,0),(t3,0)) ((t5,0),(t2,0),(t1,0)) ((t4,0),(t3,0),(t4,0))
    M3 ((t4,0),(t5,0),(t2,0)) ((t4,0),(t3,0),(t3,0)) ((t4,0),(t6,0),(t4,0))
    M4 ((t5,0),(t5,0),(t4,0)) ((t5,0),(t5,0),(t1,0)) ((t2,0),(t3,0),(t3,0))
    M5 ((t2,0),(t3,0),(t4,0)) ((t3,0),(t6,0),(t3,0)) ((t2,0),(t5,0),(t3,0))
    Decision maker Alternatives SS EVB
    Ex2 M1 ((t5,0),(t4,0),(t2,0)) ((t5,0),(t1,0),(t3,0))
    M2 ((t4,0),(t4,0),(t5,0)) ((t4,0),(t6,0),(t3,0))
    M3 ((t2,0),(t6,0),(t3,0)) ((t3,0),(t4,0),(t1,0))
    M4 ((t4,0),(t3,0),(t2,0)) ((t4,0),(t5,0),(t4,0))
    M5 ((t3,0),(t4,0),(t2,0)) ((t3,0),(t6,0),(t2,0))

     | Show Table
    DownLoad: CSV
    Table 9.  Normalized judgment matrices of Ex3.
    Decision maker Alternatives TF ECB MC
    Ex3 M1 ((t5,0),(t4,0),(t3,0)) ((t5,0),(t3,0),(t2,0)) ((t3,0),(t4,0),(t2,0))
    M2 ((t5,0),(t2,0),(t1,0)) ((t4,0),(t3,0),(t2,0)) ((t3,0),(t4,0),(t3,0))
    M3 ((t5,0),(t2,0),(t3,0)) ((t4,0),(t5,0),(t2,0)) ((t5,0),(t5,0),(t3,0))
    M4 ((t4,0),(t2,0),(t2,0)) ((t5,0),(t2,0),(t1,0)) ((t3,0),(t1,0),(t2,0))
    M5 ((t2,0),(t4,0),(t2,0)) ((t3,0),(t4,0),(t1,0)) ((t3,0),(t5,0),(t4,0))
    Decision maker Alternatives SS EVB
    Ex3 M1 ((t5,0),(t4,0),(t1,0)) ((t5,0),(t2,0),(t2,0))
    M2 ((t4,0),(t4,0),(t1,0)) ((t3,0),(t5,0),(t4,0))
    M3 ((t3,0),(t5,0),(t4,0)) ((t4,0),(t2,0),(t3,0))
    M4 ((t5,0),(t5,0),(t4,0)) ((t2,0),(t3,0),(t5,0))
    M5 ((t3,0),(t4,0),(t5,0)) ((t3,0),(t5,0),(t5,0))

     | Show Table
    DownLoad: CSV

    Step 4. Table 10 presents the collective judgement matrix that was obtained by applying the 2TSFLWA operator (Eq (3.4)).

    Table 10.  Combined judgment matrices.
    Alternatives TF ECB MC
    M1 ((t5,0.0194),(t3,0.4509),(t1,0.5328)) ((t5,0.3067),(t2,0.3183),(t3,0.4509)) ((t3,0.2959),(t4,0.0278),(t2,0.3183))
    M2 ((t5,0.3067),(t3,0.0859),(t2,0.1557)) ((t4,0.1212),(t3,0.1368),(t2,0.1557)) ((t3,0.1309),(t3,0.3313),(t4,0.337))
    M3 ((t5,0.3067),(t2,0.1829),(t2,0.1557)) ((t4,0.3054),(t3,0.1368),(t3,0.0859)) ((t4,0.1212),(t5,0.3351),(t3,0.3313))
    M4 ((t5,0.3067),(t2,0.1829),(t3,0.4509)) ((t5,0.0194),(t3,0.1368),(t1,0.021)) ((t2,0.1711),(t2,0.1557),(t2,0.3183))
    M5 ((t5,0.1323),(t3,0.0859),(t3,0.0859)) ((t3,0.2959),(t5,0.3955),(t2,0.1557)) ((t2,0.1309),(t5,0.3351),(t4,0.337))
    Alternatives SS EVB
    M1 ((t5,0.0194),(t3,0.4509),(t1,0.2834)) ((t5,0.0194),(t2,0.3867),(t2,0.1557))
    M2 ((t4,0.0173),(t4,0.663),(t2,0.1829)) ((t4,0.3054),(t5,0.4925),(t3,0.0859))
    M3 ((t3,0.0139),(t5,0.0437),(t3,0.4509)) ((t3,0.367),(t3,0.2043),(t2,0.3183))
    M4 ((t4,0.3646),(t4,0.0571),(t3,0.1829)) ((t3,0.4904),(t5,0.4925),(t4,0.0571))
    M5 ((t3,0.2959),(t4,0.3356),(t2,0.1829)) ((t3,0.367),(t6,0.3341),(t4,0.2873))

     | Show Table
    DownLoad: CSV

    Step 5. Table 11 shows the weighted combined 2TSFL judgement matrix by using the attributes weights ˜Wj(j=1,2,,n) and Eq (3.6).

    Table 11.  Weighted combined judgment matrices.
    Alternatives TF ECB MC
    M1 ((t3,0.1345),(t6,0.1922),(t5,0.0244)) ((t2,0.1519),(t7,0.1898),(t7,0.1052)) ((t1,0.1215),(t7,0.4694),(t7,0.068))
    M2 ((t3,0.3297),(t6,0.0296),(t5,0.3047)) ((t2,0.4141),(t7,0.0832),(t7,0.3893)) ((t1,0.0272),(t7,0.329),(t7,0.3989))
    M3 ((t3,0.3297),(t6,0.439),(t5,0.3047)) ((t1,0.4018),(t7,0.0832),(t7,0.0157)) ((t1,0.3941),(t8,0.3176),(t7,0.329))
    M4 ((t3,0.3297),(t6,0.439),(t60.1922,)) ((t2,0.0119),(t7,0.0832),(t6,0.1216)) ((t1,0.3016),(t7,0.0918),(t7,0.068))
    M5 ((t2,0.4451),(t6,0.0296),(t6,0.0296)) ((t1,0.0007),(t7,0.4456),(t7,0.3893)) ((t1,0.0272),(t8,0.3176),(t7,0.3989))
    Alternatives SS EVB
    M1 ((t3,0.2322),(t6,0.0578),(t5,0.0288)) ((t3,0.3873),(t6,0.4645),(t6,0.2915))
    M2 ((t2,0.1373),(t7,0.4704),(t6,0.2926)) ((t2,0.1465),(t7,0.0111),(t6,0.3418))
    M3 ((t2,0.4352),(t7,0.0636),(t6,0.0578)) ((t2,0.3247),(t6,0.4818),(t6,0.0168))
    M4 ((t2,0.3701),(t7,0.3442),(t6,0.2926)) ((t2,0.2582),(t7,0.0111),(t7,0.2014))
    M5 ((t2,0.4097),(t7,0.1779),(t6,0.2926)) ((t2,0.3247),(t7,0.3898),(t7,0.2949))

     | Show Table
    DownLoad: CSV

    First approach: RA approach

    Step 6. Table 12 gives the Y+i values based on the 2TSFLA operator (Eq (3.8)). Step 7. Table 12 summarizes the scores of Y+i values and their ranking orders which are computed by applying Eq (3.9).

    Table 12.  Alternatives ranking based on RA approach.
    Alternatives Y+i values Scores Ranking
    M1 ((t5,0.2074),(t2,0.3725),(t2,0.3201)) (t5,0.3730) 1
    M2 ((t4,0.0936),(t3,0.4984),(t2,0.2928)) (t5,0.3816) 3
    M3 ((t4,0.1465),(t3,0.3825),(t2,0.3808)) (t5,0.3825) 4
    M4 ((t4,0.2411),(t3,0.1001),(t2,0.3805)) (t5,0.3797) 2
    M5 ((t3,0.0394),(t4,0.2450),(t3,0.2446)) (t5,0.3907) 5

     | Show Table
    DownLoad: CSV

    Second approach: RP approach

    Step 6*. Table 13 shows the scores of the weighted combined 2TSFL judgement matrix. Step 7*. Table 14 displays the RPs that were obtained by applying Eq (3.10). Step 8*. Table 15 summarizes the distance matrix which is computed by using Eq (3.11). Step 9*. Table 15 presents the maximum distance, maxd(~Alij,xij) of each alternative and its ranking based on minimaxjd(~Alij,xij).

    Table 13.  Score values of weighted combined matrix.
    Alternatives TF ECB MC SS EVB
    M1 (t5,0.4096) (t5,0.4325) (t5,0.4408) (t5,0.4108) (t5,0.4131)
    M2 (t5,0.4137) (t5,0.433) (t5,0.4422) (t5,0.4212) (t5,0.4299)
    M3 (t5,0.4106) (t5,0.4365) (t5,0.4441) (t5,0.4281) (t5,0.4239)
    M4 (t5,0.4137) (t5,0.4286) (t5,0.4363) (t5,0.4215) (t5,0.4336)
    M5 (t5,0.421) (t5,0.4369) (t5,0.4452) (t5,0.4249) (t5,0.4361)

     | Show Table
    DownLoad: CSV
    Table 14.  RPs.
    RPs TF ECB
    xj ((t3,0.1345),(t6,0.1922),(t5,0.0244)) ((t2,0.0119),(t7,0.0832),(t6,0.1216))
    RPs MC SS
    xj ((t1,0.3016),(t7,0.0918),(t7,0.0680)) ((t3,0.2322),(t6,0.0578),(t5,0.0288))
    RPs EVB
    xj ((t3,0.3873),(t6,0.4645),(t6,0.2915))

     | Show Table
    DownLoad: CSV
    Table 15.  Distance matrix.
    Alternatives d(TF,x1) d(ECB,x2) d(MC,x3) d(SS,x4) d(EVB,x5) Maximum distance Ranking
    M1 0 0.1125 0.0653 0 0 0.1125 1
    M2 0.0554 0.0599 0.0886 0.1428 0.2307 0.2307 2
    M3 0.0568 0.1073 0.129 0.2375 0.1485 0.2375 3
    M4 0.1005 0 0 0.1476 0.2808 0.2808 4
    M5 0.1564 0.1128 0.1264 0.1935 0.3153 0.3153 5

     | Show Table
    DownLoad: CSV

    Third approach: FMF approach

    Step 6**. Table 16 shows the Ai values which are calculated on the basis of the 2TSFLG operator (Eq (3.12)). Step 7**. Table 16 represents the scores of the Ai values which are determined by utilizing Eq (3.9). Step 8**. Table 16 presents the ordering of alternatives in descending order.

    Table 16.  Alternatives ranking by utilizing the FMF approach.
    Alternatives Ai values Scores Ranking
    M1 ((t0,0.0082),(t8,0.0156),(t8,0.0418)) (t5,0.45341) 1
    M2 ((t0,0.0042),(t8,0.0046),(t8,0.0188)) (t5,0.45373) 3
    M3 ((t0,0.0033),(t8,0.0026),(t8,0.0162)) (t5,0.45377) 4
    M4 ((t0,0.0037),(t8,0.0081),(t8,0.0235)) (t5,0.45635) 2
    M5 ((t0,0.0007),(t8,0.0007),(t8,0.0116)) (t5,0.45383) 5

     | Show Table
    DownLoad: CSV

    The final ranking of the alternatives is summarized in Tables 17 and 18. Figure 4 indicates the ranking positions of alternatives based on the RA approach. It is easy to see that the ranking position of Alternative M1 is first. The ranking positions of the remaining alternatives can be observed in a similar way. In a similar fashion, we can observe the ordering of alternatives from Figures 5 and 6 based on the RP approach and FMF approach, respectively. Figure 7 graphically displays the ranking positions of the five mining methods.

    Table 17.  Alternatives final ranking from dominance theory.
    Alternatives RS approach RP approach FMF approach Final ranking
    M1 1 1 1 1
    M2 3 2 3 3
    M3 4 3 4 4
    M4 2 4 2 2
    M5 5 5 5 5

     | Show Table
    DownLoad: CSV
    Table 18.  Final ranking and alternatives positions based on dominance theory.
    Approaches Ranking order Best alternative Worst alternative
    RA approach M1>M4>M2>M3>M5 M1 M5
    RP approach M1>M2>M3>M4>M5 M1 M5
    FMF approach M1>M4>M2>M3>M5 M1 M5
    Final ranking M1>M4>M2>M3>M5 M1 M5

     | Show Table
    DownLoad: CSV
    Figure 4.  Ranking positions of mining methods using RA approach.
    Figure 5.  Ranking positions of mining methods using RP approach.
    Figure 6.  Ranking positions of mining methods using FMF approach.
    Figure 7.  Ranking positions of mining methods.

    In this subsection, we describe the application of a testing criteria [50] to our presented method to demonstrate its effectiveness. The criteria is given as follows:

    1) Test criterion 1. An effective MAGDM method should remain unchanged in terms of replacing the judgement values of a non-optimal alternative with a worst alternative without changing the importance of each criteria.

    2) Test criterion 2. An effective MAGDM method should satisfy the transitive property.

    3) Test criterion 3. The alternatives ranking should remain unaltered in terms of dividing the MAGDM problem into smaller sub-problems. That is, by applying the same method to smaller sub-problems, the alternatives ranking should remain the same.

    Now, we will describe the test for the validity of the presented MAGDM technique, which was conducted by applying the above-mentioned criteria.

    Validity test by Test criterion 1. If we change the judgement values of a non-optimal alternative M2 with the worst alternative M2 in the matrices presented by the experts; these values for the worst alternative M2 are summarized in Table 19. The ranking orders along with the final ordering of the alternatives after applying the proposed method, are given in Table 20. It is easy to see that the optimal alternative is M1, which is the same as that of the original ranking. Hence, our proposed method holds the test criterion 1.

    Table 19.  Judgement values for the alternative M2.
    Decision makers Alternative TF ECB MC
    Ex1 M2 ((t5,0),(t3,0),(t2,0)) ((t3,0),(t5,0),(t3,0)) ((t2,0),(t3,0),(t4,0))
    Ex2 M2 ((t4,0),(t4,0),(t3,0)) ((t5,0),(t2,0),(t1,0)) ((t4,0),(t3,0),(t4,0))
    Ex3 M2 ((t5,0),(t2,0),(t1,0)) ((t4,0),(t3,0),(t2,0)) ((t3,0),(t4,0),(t3,0))
    Decision maker Alternative SS EVB
    Ex1 M2 ((t4,0),(t3,0),(t2,0)) ((t4,0),(t3,0),(t2,0))
    Ex2 M2 ((t4,0),(t4,0),(t5,0)) ((t4,0),(t6,0),(t3,0))
    Ex3 M2 ((t4,0),(t4,0),(t1,0)) ((t3,0),(t5,0),(t4,0))

     | Show Table
    DownLoad: CSV
    Table 20.  Final ranking based on test criterion 1.
    Approaches Ranking order
    RA approach M1>M4>M2>M3>M5
    RP approach M1>M2>M3>M4>M5
    FMF approach M1>M4>M2>M3>M5
    Final ranking M1>M4>M2>M3>M5

     | Show Table
    DownLoad: CSV

    Validity test by Test criterions 2 and 3. Now to validate the test criterions 2 and 3, we split the problem into smaller sub-problems, i.e., {M1,M2,M3}, {M2,M3,M4}, {M3,M4,M5} and {M4,M5,M1}. After applying the established method on these sub-problems, we get the ranking order as M1>M2>M3, M4>M2>M3, M4>M3>M5 and M1>M4>M5. The overall ranking order of alternatives was M1>M4>M2>M3>M5, which is the same as that of the original ranking. Hence, the proposed method is validated under test criterions 2 and 3.

    In this section, we compared the ranking results of the proposed method with the existing AOs and MAGDM methods available in the literature. The main calculation steps are summarized as follows:

    ● We computed the results of the presented application from the literature defined in [17]. First, we utilized the spherical fuzzy linguistic ordered weighted averaging (SFLOWA) operator to combine the individual judgement matrices. Further, we utilized the spherical fuzzy linguistic weighted averaging (SFLWA) operator. The combined values along with the scores and ranks of alternatives are shown in Table 21. From Table 21, the ranking order of alternatives can be observed as M1>M4>M2>M3>M5.

    Table 21.  Combined values based on SFLWA operator [17].
    Alternatives Combined values Scores Ranks
    M1 (t4.7926,t2.3725,t1.6799) t5.1159 1
    M2 (t4.0963,t3.4984,t2.2928) t4.5929 3
    M3 (t3.8535,t3.3826,t2.3808) t4.5365 4
    M4 (t4.2411,t3.1001,t2.3805) t4.7156 2
    M5 (t2.9606,t4.245,t2.7554) t3.9645 5

     | Show Table
    DownLoad: CSV

    ● We calculated the results of the presented application from the literature defined in [17]. First, we utilized the spherical fuzzy linguistic ordered weighted geometric (SFLOWG) operator to combine the individual judgement matrices. Further, we utilized the spherical fuzzy linguistic weighted geometric (SFLWG) operator. The combined values along with the scores and ranks of alternatives are shown in Table 22. It can be easily observed from Table 22 that the ranking order of alternatives was M1>M2>M4>M3>M5.

    Table 22.  Combined values based on SFLWG operator [17].
    Alternatives Combined values Scores Ranks
    M1 (t4.6675,t3.048,t2.0785) t4.9049 1
    M2 (t3.9649,t3.8964,t2.92) t4.321 2
    M3 (t3.6776,t4.2433,t2.8214) t4.1456 4
    M4 (t3.8636,t3.9741,t3.1641) t4.208 3
    M5 (t2.7895,t4.6922,t3.4815) t3.5423 5

     | Show Table
    DownLoad: CSV

    ● We calculated the results of the application presented in Section 4 by using the 2TLPyF-MULTIMOORA method [49]. We computed the ranking results by neglecting the NMD and considered the PMD and NeMD. The decision matrices obtained by ignoring the NMD are presented in Tables 2325. First, we estimated the results by utilizing the three approaches namely: the RA approach, RP approach and FMF approach. Then, we applied dominance theory for the final ranking of the alternatives. The ranking results of the alternatives are summarized in Table 26.

    Table 23.  Judgment matrices of Ex1.
    Decision maker Alternatives TF ECB MC SS EVB
    Ex1 M1 ((t5,0),(t1,0)) ((t4,0),(t2,0)) ((t3,0),(t3,0)) ((t5,0),(t1,0)) ((t5,0),(t1,0))
    M2 ((t5,0),(t2,0)) ((t3,0),(t3,0)) ((t4,0),(t2,0)) ((t4,0),(t2,0)) ((t4,0),(t2,0))
    M3 ((t5,0),(t1,0)) ((t3,0),(t4,0)) ((t3,0),(t3,0)) ((t3,0),(t2,0)) ((t3,0),(t4,0))
    M4 ((t5,0),(t2,0)) ((t5,0),(t1,0)) ((t2,0),(t1,0)) ((t5,0),(t1,0)) ((t4,0),(t3,0))
    M5 ((t4,0),(t3,0)) ((t2,0),(t2,0)) ((t4,0),(t2,0)) ((t2,0),(t1,0)) ((t4,0),(t5,0))

     | Show Table
    DownLoad: CSV
    Table 24.  Judgment matrices of Ex2.
    Decision maker Alternatives TF ECB MC SS EVB
    Ex2 M1 ((t5,0),(t1,0)) ((t5,0),(t4,0)) ((t2,0),(t2,0)) ((t5,0),(t2,0)) ((t5,0),(t3,0))
    M2 ((t4,0),(t3,0)) ((t5,0),(t1,0)) ((t4,0),(t4,0)) ((t4,0),(t5,0)) ((t4,0),(t3,0))
    M3 ((t4,0),(t2,0)) ((t4,0),(t3,0)) ((t4,0),(t4,0)) ((t3,0),(t2,0)) ((t3,0),(t1,0))
    M4 ((t5,0),(t4,0)) ((t5,0),(t1,0)) ((t3,0),(t2,0)) ((t4,0),(t2,0)) ((t4,0),(t4,0))
    M5 ((t2,0),(t4,0)) ((t3,0),(t3,0)) ((t3,0),(t2,0)) ((t3,0),(t2,0)) ((t3,0),(t2,0))

     | Show Table
    DownLoad: CSV
    Table 25.  Judgment matrices of Ex3.
    Decision maker Alternatives TF ECB MC SS EVB
    Ex3 M1 ((t5,0),(t3,0)) ((t5,0),(t2,0)) ((t2,0),(t3,0)) ((t5,0),(t1,0)) ((t5,0),(t2,0))
    M2 ((t5,0),(t1,0)) ((t4,0),(t2,0)) ((t3,0),(t3,0)) ((t4,0),(t1,0)) ((t3,0),(t4,0))
    M3 ((t5,0),(t3,0)) ((t4,0),(t2,0)) ((t3,0),(t5,0)) ((t3,0),(t4,0)) ((t4,0),(t3,0))
    M4 ((t4,0),(t2,0)) ((t5,0),(t1,0)) ((t2,0),(t3,0)) ((t4,0),(t5,0)) ((t2,0),(t5,0))
    M5 ((t2,0),(t2,0)) ((t3,0),(t1,0)) ((t4,0),(t3,0)) ((t3,0),(t5,0)) ((t3,0),(t5,0))

     | Show Table
    DownLoad: CSV
    Table 26.  Final ranking and alternatives positions obtained by using the 2TLPyF-MULTIMOORA method.
    Approaches Ranking order
    RA approach M1>M4>M2>M3>M5
    RP approach M1>M2>M3>M5>M4
    FMF approach M1>M4>M2>M3>M5
    Final ranking M1>M4>M2>M3>M5

     | Show Table
    DownLoad: CSV

    ● Now we estimate the results by using the SF-MULTIMOORA method [45]. To do this we first transform the LTs into fuzzy values as defined in Table 27. The results estimated by using the SF-MULTIMOORA method are listed in Table 28.

    Table 27.  LTs and fuzzy numbers.
    LTs Semantics Fuzzy values
    Extremely inferior (EI) t0 0.0
    Very inferior (VI) t1 0.1
    Inferior (I) t2 0.2
    Slightly inferior (SI) t3 0.3
    Medium (M) t4 0.4
    Slightly superior (SS) t5 0.5
    Superior (S) t6 0.6
    Very superior (VS) t7 0.7
    Extremely superior (ES) t8 0.8

     | Show Table
    DownLoad: CSV
    Table 28.  Final ranking and alternatives positions obtained by using the SF-MULTIMOORA method.
    Approaches Ranking order
    RA approach M5>M2>M3>M4>M1
    RP approach M4>M3>M2>M5>M1
    FMF approach M5>M3>M2>M4>M1
    Final ranking M5>M3>M2>M4>M1

     | Show Table
    DownLoad: CSV

    The ranking positions of the five mining methods along with the optimal alternative obtained by utilizing the proposed 2TSFL-MULTIMOORA method and the existing AOs, are summarized in Table 29. The ranking positions of the alternatives are summarized in Figure 8. From the above comparison, we noticed that the ranking positions of the five mining methods obtained by using SFLWA are consistent with the ranking positions of our proposed method. But, the ranking positions of the alternatives are different in the case of the SFLWG operator. However, their optimal alternative is the same. When we computed the results by using the 2TLPyF-MULTIMOORA method, we observed that the ranking positions of the alternatives are consistent with our proposed method. In some situations, it might be possible that we would obtain different results by utilizing the 2TLPyF-MULTIMOORA method owing to the absence of an NMD. The ranking results obtained by using the SF-MULTIMOORA method are quite different from our proposed results. This is due to the fact that this method is unable to deal with the 2TL information. On the other hand, our established method is capable of dealing with the 2TSFL information. Now we state the highlights of the developed 2TSFL-MULTIMOORA method given as follows:

    Table 29.  Comparative study.
    Methods Ranking position Optimal alternative
    2TSFL-MULTIMOORA method (proposed) M1>M4>M2>M3>M5 M1
    SFLWA operator [17] M1>M4>M2>M3>M5 M1
    SFLWG operator [17] M1>M2>M4>M3>M5 M1
    2TLPyF-MULTIMOORA method [49] M1>M4>M2>M3>M5 M1
    SF-MULTIMOORA method [45] M5>M3>M2>M4>M1 M5

     | Show Table
    DownLoad: CSV
    Figure 8.  Comparison with existing studies.

    1) The MULTIMOORA method has some remarkable features. This method consists of three different approaches including, the RA analysis approach, the RP approach and the FMF approach. As it integrates the three aforesaid approaches, it is more reliable for ranking the alternatives.

    2) The proposed 2TSFL-MULTIMOORA method has the ability to express the experts' evaluations qualitatively, i.e., in terms of 2TL values. It provides the freedom for the expert to express their opinions about alternatives in terms of three 2TL degrees (PMD, NMD and NeMD). Hence, the developed 2TSFL-MULTIMOORA method is more robust, reliable, simple and stable as compared to the existing approaches.

    In this section, we discuss the managerial implications in the first subsection. In the second subsection, we highlight some practical implications of this study.

    Given the above results, the proposed model has managerial implications in terms of enhancing the selection of the best alternative in MMS. First, the established methods implemented in the 2TSFL environment allow experts to express their opinions and evaluations by using LTs. Therefore, the proposed strategy effectively addresses the practical MAGDM problem under the conditions the of 2TSFLSs. Thereafter, the established method was shown to provide a flexible way to gather information on real-world LTs. Second, the MULTIMOORA approach has proven properties such as timely DM as well as an ease of understanding and implementation. It combines three methods, and the results obtained from all three methods were used to determine the final location of the alternatives. In addition, the method also has the ability to synthesize expert evaluations. Therefore, the developed method provides a systematic, comprehensive and efficient evaluation of the alternatives in the MAGDM problem. All in all, experts can implement the established methods to select the most suitable alternatives, as shown in the considered case studies.

    This study proposes a 2TSFLS-based extension of the MULTIMOORA technique. Some practical implications of the studies described are as follows:

    ● In this paper, we have discussed a case study that selects the most suitable mining method from a set of available mining methods based on certain criteria. Furthermore, we have applied an extended MULTIMOORA method for this purpose within the framework of 2TSFLSs. In this case, we successfully achieved our goal by utilizing the proposed method to select an appropriate mining method. Therefore, the proposed method is easy to understand and can practically solve the MAGDM problem. The proposed method not only exhibits 3D data in terms of SFNs, but also accommodates the salient features of 2TLTSs.

    ● We proposed a normalized Hamming distance measure for 2TSFLSs. Furthermore, we developed a novel score and accuracy function to rank 2TSFLNs.

    ● We conducted a comparative study of the proposed method to test the effectiveness and superiority of the developed method. In addition, we performed a validity test to judge the significance of this study.

    ● It can be easily seen that the most suitable mining method using the proposed method is the same as determined in [6].

    In this section, we first present the concluding remarks of this study. Further we highlight the limitations and future directions.

    MMS has been considered as an essential task in mining engineering and the most suitable mining method holds great importance in mining projects. In accordance with the important characteristics of MMS, this proposed 2TSFL-MULTIMOORA method has been applied to provide the optimal solutions of an MMS problem as well as those in other MAGDM domains. As an extension of the PFS, SFSs are considered as an excellent model to present uncertain and ambiguous information. Furthermore, 2TSFLSs consist of three MDs (PMD, NMD, NeMD), which are represented by 2-tuples. The experts' evaluations may often contain some uncertainty and vagueness while facing complicated evaluation surroundings. Thus, we utilized 2TSFLNs to express the evaluation proposed by the decision makers. Moreover, there are different evaluation parameters, including those related to the environment, economy, etc., that may have interactions with each other. Hence, 2TLSFWA operators have been utilized to demonstrate their inter-relations. After that, a case study to select the most feasible mining method (Kaiyang phosphate mine) using the proposed 2TSFL-MULTIMOORA method has been presented. We also described a validity test for the established technique that was used to justify the authenticity of our method. We provided a comparative study to reveal the authenticity of the developed method.

    The limitations of the proposed research are summarized as follows:

    ● It is able to manage the 2TL information when the sum of squares of three DMs is less than Θ+1. This method is unable to handle information when the sum of squares of three MDs exceeds from Θ+1.

    ● In some situations, it becomes difficult to manage data due to unclear information. More precisely, some results are valid only for particular situations.

    ● The quantitative measurements become complicated due to the presence of uncertainty and ambiguity in the structure of fuzzy alternatives.

    Our future research goals are listed as below.

    ● The spaces of 2TL information can be broadened by considering the data under the condition of TSFSs (T1).

    ● The MULTIMOORA method can be generalized for 2TL TSFSs and its applications can be studied in various other fields other than MMS.

    ● Future research may contain a variety of evaluation data on the aggregation of the 2TSFLNs utilizing various AOs such as the Hamy mean, Einstein, Heronian mean, Hamacher operators, etc.

    ● 2TL information can be further processed under many hybrid theories, such as, hesitant FSs, hesitant IFSs, hesitant PFSs, and hesitant PyFSs.

    The fourth author extends his appreciation to the Deanship of Scientific Research at King Khalid University for funding this work through the General Research Project under grant number (R.G.P.2/48/43).

    The authors declare no conflict of interest.



    [1] S. Carletta, M. Pontani, P. Teofilatto, Dynamics of three-dimensional capture or-bits from libration region analysis, Acta Astronaut., 165 (2019), 331-343. doi: 10.1016/j.actaastro.2019.09.019
    [2] G. Pinzari, Perihelion Librations in the Secular Three-Body Problem, J. Nonlinear Sci., 30 (2020), 1771-1808. doi: 10.1007/s00332-020-09624-x
    [3] S. Wu, Design of interactive digital media course teaching information query system, Inf. Syst. e-Business Manage., 18 (2020), 793-807. doi: 10.1007/s10257-018-00397-1
    [4] J. Duan, Z. Wang, Orbit determination of CE-4's relay satellite in Earth-Moon L2 libration point orbit, Adv. Space Res., 64 (2019), 2345-2355. doi: 10.1016/j.asr.2019.08.012
    [5] N. Hong, C. T. del Busto, Collaboration, Scaffolding and Successive Approximations: A Developmental Science Approach to Training in Clinical Psychology, Train. Educ. Prof. Psychol., 14 (2020), 228-234.
    [6] H. Peng, J. Zhao, Z. Wu, W. Zhong, Optimal periodic controller for formation flying on libration point orbits, Acta Astronaut., 69 (2020), 537-550.
    [7] H. Peng, X. Jiang, B. Chen, Optimal nonlinear feedback control of spacecraft ren-dezvous with finite low thrust between libration orbits, Nonlinear Dyn., 76 (2014), 1611-1632. doi: 10.1007/s11071-013-1233-9
    [8] Y. Jiang, Equilibrium points and orbits around asteroid with the full gravitational potential caused by the 3D irregular shape. Astrodynamics, 14 (2018), 361-373.
    [9] H. Peng, X. Jiang, Nonlinear Receding Horizon Guidance for Spacecraft Formation Re-configuration on Libration Point Orbits using a Symplectic Numerical Method, ISA Trans., 60 (2016), 38-52. doi: 10.1016/j.isatra.2015.10.015
    [10] R. Chai, A. Tsourdos, A. Savvaris, S. Chai, Y. Xia, C. P. Chen, Six-DOF Spacecraft Optimal Trajectory Planning and Real-Time Attitude Control: A Deep Neural Network-Based Approach, IEEE Trans. Neural Networks Learn. Syst., 31 (2020), 5005-5013. doi: 10.1109/TNNLS.2019.2955400
    [11] R. Chai, A. Tsourdos, A. Savvaris, S. Chai, Y. Xia, Trajectory planning for hyper-sonic reentry vehicle satisfying deterministic and probabilistic constraints, Acta Astronaut., 177 (2020), 30-38. doi: 10.1016/j.actaastro.2020.06.051
    [12] W. Zhao, T. Shi, L. Wang, Fault Diagnosis and Prognosis of Bearing Based on Hidden Markov Model with Multi-Features, Appl. Math. Nonlinear Sci., 5 (2020), 71-84. doi: 10.2478/amns.2020.1.00008
    [13] K. Zhang, Z. He, M. Lv, Study on maintaining formations during satellite formation flying based on SDRE and LQR, Open Phys., 15 (2017), 394-399. doi: 10.1515/phys-2017-0043
    [14] Y. Zhao, Analysis of Trade Effect in Post-Tpp Era: Based on Gravity Model and Gtap Model, Appl. Math. Nonlinear Sci., 5 (2020), 61-70. doi: 10.2478/amns.2020.1.00007
    [15] L. Li, Y. Wang, X. Li, Tourists Forecast Lanzhou Based on the Baolan High-Speed Railway by the Arima Model, Appl. Math. Nonlinear Sci., 5 (2020), 55-60. doi: 10.2478/amns.2020.1.00006
    [16] T. Li, W. Yang, Solution to Chance Constrained Programming Problem in Swap Trailer Transport Organisation based on Improved Simulated Annealing Algorithm, Appl. Math. Nonlinear Sci., 5 (2020), 47-54. doi: 10.2478/amns.2020.1.00005
    [17] Y. Wang, G. Zhang, Z. Shi, Finite-time active disturbance rejection control for marine diesel engine, Appl. Math. Nonlinear Sci., 5 (2020), 35-46.
    [18] P. Zhou, Q. Fan, J. Zhu, Empirical Analysis on Environmental Regulation Performance Measurement in Manufacturing Industry: A Case Study of Chongqing, China, Appl. Math. Nonlinear Sci., 5 (2020), 25-34.
    [19] R. A. de Assis, R. Pazim, M. C. Malavazi, A Mathematical Model to describe the herd behaviour considering group defense, Appl. Math. Nonlinear Sci., 5 (2020), 11-24. doi: 10.2478/amns.2020.1.00002
    [20] T. Xie, R. Liu, Z. Wei, Improvement of the Fast Clustering Algorithm Improved by K-Means in the Big Data, Appl. Math. Nonlinear Sci., 5 (2020), 1-10.
    [21] B. Shanmukha, V. Venkatesha, Some Results on Generalized Sasakian Space Forms, Appl. Math. Nonlinear Sci., 5 (2020), 85-92.
    [22] M. El-Borhamy, N. Mosalam, On the existence of periodic solution and the transition to chaos of Rayleigh-Duffing equation with application of gyro dynamic, Appl. Math. Nonlinear Sci., 5 (2020), 93-108. doi: 10.2478/amns.2020.1.00010
    [23] H. Günerhan, E. Çelik, Analytical and approximate solutions of Fractional Partial Dif-ferential-Algebraic Equations, Appl. Math. Nonlinear Sci., 5 (2020), 109-120.
    [24] T. Li, L. Qiao, Y. Ding, Factors Influencing the Cooperative Relationship between Enterprises in the Supply Chain of China's Marine Engineering Equipment Manufacturing Industry-An study based on GRNN-DEMATEL method, Appl. Math. Nonlinear Sci., 5 (2020), 121-138.
  • This article has been cited by:

    1. Muhammad Akram, Ayesha Khan, Anam Luqman, Tapan Senapati, Dragan Pamucar, An extended MARCOS method for MCGDM under 2-tuple linguistic q-rung picture fuzzy environment, 2023, 120, 09521976, 105892, 10.1016/j.engappai.2023.105892
    2. Ghous Ali, Adeel Farooq, Mohammed M. Ali Al-Shamiri, Novel multiple criteria decision-making analysis under m-polar fuzzy aggregation operators with application, 2022, 20, 1551-0018, 3566, 10.3934/mbe.2023166
    3. Musavarah Sarwar, Improved assessment model for health-care waste management based on dual 2-tuple linguistic rough number clouds, 2023, 123, 09521976, 106255, 10.1016/j.engappai.2023.106255
    4. Zeinab Jahanbani, Majid Ataee-pour, Ali Mortazavi, Application of Z-numbers theory to study the influencing criteria in underground mining method selection, 2024, 88, 03014207, 104471, 10.1016/j.resourpol.2023.104471
    5. Junwei Li, Mengmeng Lian, Yong Jin, Miaomiao Xia, Huaibin Hou, Research on probabilistic language multi-attribute group decision-making method based on correlation coefficient and improved entropy, 2024, 46, 10641246, 9465, 10.3233/JIFS-235593
    6. Xuemei An, An interactive data-driven multiple-attribute decision-making technique via interval-valued intuitionistic fuzzy sets for teaching quality evaluation in higher education, 2024, 28, 13272314, 581, 10.3233/KES-230456
    7. Ting-Yu Chen, Multiple criteria decision analytic methods in management with T-spherical fuzzy information, 2023, 56, 0269-2821, 14087, 10.1007/s10462-023-10461-z
    8. Ayesha Khan, Uzma Ahmad, Sundas Shahzadi, A new decision analysis based on 2-tuple linguistic q-rung picture fuzzy ITARA–VIKOR method, 2023, 1432-7643, 10.1007/s00500-023-08263-0
    9. Ayesha Khan, Uzma Ahmad, Multi-criteria group decision-making based on 2-tuple linguistic q-rung picture fuzzy sets, 2024, 9, 2364-4966, 10.1007/s41066-023-00441-7
    10. Ling Weng, Jian Lin, Zhangxu Lin, Zeshui Xu, A normal cloud model-based decision making method under multi-granular probabilistic linguistic environment for evaluating of wetland ecosystem services, 2023, 225, 09574174, 120202, 10.1016/j.eswa.2023.120202
    11. Zeinab Jahanbani, Ali Mortazavi, Majid Ataee-pour, A Causal Analysis of the Influential Criteria in Underground Mining Method Selection, 2024, 57, 0723-2632, 8581, 10.1007/s00603-024-03864-z
    12. Uzma Ahmad, Ayesha Khan, Sundas Shhazadi, Extended ELECTRE I method for decision-making based on 2-tuple linguistic q-rung picture fuzzy sets, 2024, 1432-7643, 10.1007/s00500-023-09544-4
  • Reader Comments
  • © 2021 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(2461) PDF downloads(62) Cited by(2)

Figures and Tables

Figures(6)  /  Tables(1)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog