Review

Type I CRISPR-Cas-mediated microbial gene editing and regulation

  • There are six major types of CRISPR-Cas systems that provide adaptive immunity in bacteria and archaea against invasive genetic elements. The discovery of CRISPR-Cas systems has revolutionized the field of genetics in many organisms. In the past few years, exploitations of the most abundant class 1 type I CRISPR-Cas systems have revealed their great potential and distinct advantages to achieve gene editing and regulation in diverse microorganisms in spite of their complicated structures. The widespread and diversified type I CRISPR-Cas systems are becoming increasingly attractive for the development of new biotechnological tools, especially in genetically recalcitrant microbial strains. In this review article, we comprehensively summarize recent advancements in microbial gene editing and regulation by utilizing type I CRISPR-Cas systems. Importantly, to expand the microbial host range of type I CRISPR-Cas-based applications, these structurally complicated systems have been improved as transferable gene-editing tools with efficient delivery methods for stable expression of CRISPR-Cas elements, as well as convenient gene-regulation tools with the prevention of DNA cleavage by obviating deletion or mutation of the Cas3 nuclease. We envision that type I CRISPR-Cas systems will largely expand the biotechnological toolbox for microbes with medical, environmental and industrial importance.

    Citation: Zeling Xu, Shuzhen Chen, Weiyan Wu, Yongqi Wen, Huiluo Cao. Type I CRISPR-Cas-mediated microbial gene editing and regulation[J]. AIMS Microbiology, 2023, 9(4): 780-800. doi: 10.3934/microbiol.2023040

    Related Papers:

    [1] Muhammad Akram, Adeel Farooq, Maria Shabir, Mohammed M. Ali Al-Shamiri, Mohammed M. Khalaf . Group decision-making analysis with complex spherical fuzzy N-soft sets. Mathematical Biosciences and Engineering, 2022, 19(5): 4991-5030. doi: 10.3934/mbe.2022234
    [2] Muhammad Akram, G. Muhiuddin, Gustavo Santos-García . An enhanced VIKOR method for multi-criteria group decision-making with complex Fermatean fuzzy sets. Mathematical Biosciences and Engineering, 2022, 19(7): 7201-7231. doi: 10.3934/mbe.2022340
    [3] Lu-Ting Xia, Chun-Heng Ho, Xing-Min Lin . Evaluation of the elderly health examination app based on the comprehensive evaluation method of AHP-fuzzy theory. Mathematical Biosciences and Engineering, 2021, 18(4): 4731-4742. doi: 10.3934/mbe.2021240
    [4] Muhammad Akram, Saba Siddique, Majed G. Alharbi . Clustering algorithm with strength of connectedness for m-polar fuzzy network models. Mathematical Biosciences and Engineering, 2022, 19(1): 420-455. doi: 10.3934/mbe.2022021
    [5] Wei Liu, Yi Huang, Yue Sun, Changlong Yu . Research on design elements of household medical products for rhinitis based on AHP. Mathematical Biosciences and Engineering, 2023, 20(5): 9003-9017. doi: 10.3934/mbe.2023395
    [6] Paula Mercurio, Di Liu . Identifying transition states of chemical kinetic systems using network embedding techniques. Mathematical Biosciences and Engineering, 2021, 18(1): 868-887. doi: 10.3934/mbe.2021046
    [7] Fankang Bu, Jun He, Haorun Li, Qiang Fu . Interval-valued intuitionistic fuzzy MADM method based on TOPSIS and grey correlation analysis. Mathematical Biosciences and Engineering, 2020, 17(5): 5584-5603. doi: 10.3934/mbe.2020300
    [8] Ayesha Khan, Muhammad Akram, Uzma Ahmad, Mohammed M. Ali Al-Shamiri . A new multi-objective optimization ratio analysis plus full multiplication form method for the selection of an appropriate mining method based on 2-tuple spherical fuzzy linguistic sets. Mathematical Biosciences and Engineering, 2023, 20(1): 456-488. doi: 10.3934/mbe.2023021
    [9] Nian Zhang, Xue Yuan, Jin Liu, Guiwu Wei . Stochastic multiple attribute decision making with Pythagorean hesitant fuzzy set based on regret theory. Mathematical Biosciences and Engineering, 2023, 20(7): 12562-12578. doi: 10.3934/mbe.2023559
    [10] Minghe Liu, Ye Tao, Zhongbo Wang, Wenhua Cui, Tianwei Shi . Research on Simultaneous localization and mapping Algorithm based on Lidar and IMU. Mathematical Biosciences and Engineering, 2023, 20(5): 8954-8974. doi: 10.3934/mbe.2023393
  • There are six major types of CRISPR-Cas systems that provide adaptive immunity in bacteria and archaea against invasive genetic elements. The discovery of CRISPR-Cas systems has revolutionized the field of genetics in many organisms. In the past few years, exploitations of the most abundant class 1 type I CRISPR-Cas systems have revealed their great potential and distinct advantages to achieve gene editing and regulation in diverse microorganisms in spite of their complicated structures. The widespread and diversified type I CRISPR-Cas systems are becoming increasingly attractive for the development of new biotechnological tools, especially in genetically recalcitrant microbial strains. In this review article, we comprehensively summarize recent advancements in microbial gene editing and regulation by utilizing type I CRISPR-Cas systems. Importantly, to expand the microbial host range of type I CRISPR-Cas-based applications, these structurally complicated systems have been improved as transferable gene-editing tools with efficient delivery methods for stable expression of CRISPR-Cas elements, as well as convenient gene-regulation tools with the prevention of DNA cleavage by obviating deletion or mutation of the Cas3 nuclease. We envision that type I CRISPR-Cas systems will largely expand the biotechnological toolbox for microbes with medical, environmental and industrial importance.



    The noticeable accomplishment of any research study is its ability to be put to use in real-world situations by incorporating all cutting-edge ideas into contemporary applications. Therefore, all categories of decision-making are considered to be hot and trendy research areas for researchers. These decision-making techniques are designed to facilitate people from different professions making critical decisions. In this regard, a number of multi-criteria decision-making (MCDM) and multi-criteria group decision-making (MCGDM) techniques have been created for choosing the best option out of several options in this ambiguous and uncertain environment.

    To account for uncertain propositions and measurements, Zadeh's fuzzy sets [1] came forward as a ground-breaking model whose structure was able to express uncertainty with the help of the unit interval [0, 1]. To rank the alternatives according to their possession of various attributes or features, Fatimah et al. [2] incorporated N-grading to crisp soft set theory [3], hence inaugurating N-soft set (NSS) theory. Its semantical content has been investigated recently [4]. Particularly, two possible interpretations of the grades are applicable, namely, rates (the interpretation presumed so far) and values of truth (which hints at connections with multi-valued logic, much like fuzzy set theory owes to fuzzy logic). Also recently, aggregation and multi-agent decisions with NSSs have been first achieved with the aid of ordered weighted averaging operators [5].

    In order to add a touch of fuzziness to crisp soft set theory, Maji et al. [6,7] put forward fuzzy soft set theory. Valuation fuzzy soft sets [8] enhanced their model with an applicable variation that was tested with real estate data. Sayed et al. [9] worked on decision-making soft pre-rough sets. Likewise, Akram et al. [10] incorporated fuzziness into N-soft grading and proposed fuzzy N-soft set (FNSS) theory. The attractiveness of the NSS model can be demonstrated by the emergence of further hybrid models, to name but a few: hesitant FNSS [11], N-soft rough sets [12] and NSSs approach to rough sets [13], multi-fuzzy NSS [14], complex FNSS [15] and picture FNSS [16].

    Let us now throw some light on the remarkable success of various MCDM and MCGDM techniques. Many methodologies have been developed in order to break the shackles of decision making hurdles with crisp values [17,18,19,20]. In the context of ambiguous information, the first step was taken by Bellman and Zadeh [21] who recommended different versions of fuzzy decision making techniques. To make adequate these approaches for the needs of vague and uncertain human nature, which is often expressed by N-grading, many fuzzy MCGDM techniques have been developed [22,23,24,25]. They quickly became popular for their multiple applications. Among these techniques, the PROMETHEE technique has proven to be a most appropriate decision making method, either to choose the best alternative or to order the alternatives (subject to the required conditions and circumstances). PROMETHEE (an acronym for preference ranking organization method for enrichment of evaluations) was introduced by Brans and Vincke [19]. It works on the principle of pairwise comparison of the alternatives with respect to their conflicting criteria. Partial and complete rankings of the alternatives deduced by the PROMETHEE I and PROMETHEE II strategies, respectively. The background of the PROMETHEE method was expanded by Goumas and Lygerou [26], who adapted it to a fuzzy scenario. Lolli et al. [27] and Chen et al. [28] also worked to develop the PROMETHEE-based decision-making techniques within the fuzzy context. Krishankumar et al. [29] came up with an intuitionistic fuzzy PROMETHEE method to tackle the belongingness and non-belongingness of data with the help of linguistic values. Further, Wu et al. [30] and Sun et al. [31] developed more decision-making techniques to evaluate uncertain data properly. Ziemba [32] introduced a new MCDM technique by suggesting the NEAT F-PROMETHEE strategy, where trapezoidal fuzzy numbers [33] are used to extract the conclusion. These methods have a variety of applications. For example, Abdullah et al. [34] and Brans et al. [35] applied both PROMETHEE I and II for ranking suppliers and project ranking, respectively. Zhao et al. [36] reevaluated PROMETHEE II for enhancing proficiency in emergency response. Ozsahin et al. [37] used the fuzzy PROMETHEE technique in the evaluation of a nuclear medicine imaging device. Behzadian et al. [38] have performed a profound examination of various frameworks and applications of the PROMETHEE method. Govindan et al. [39] used a PROMETHEE-based strategy in supply chain management to achieve appropriate green supplier ordering. Evaluation of solid state detectors in medical imaging with fuzzy PROMETHEE was achieved by Ozsahin et al. [40]. Maisaini et al. [41] evaluate lung cancer treatment techniques by using a fuzzy PROMETHEE approach. Gul et al. [42] employed a fuzzy logic based PROMETHEE method for material selection problems. The PROMETHEE II technique has been used in an emergency department for the management of hospital resources [43]. Molla et al. [44] extended the PROMETHEE technique with Pythagorean fuzzy sets for medical diagnosis problems. A fuzzy AHP-PROMETHEE II approach for evaluation of solar power plant location alternatives in Turkey was deployed by Samanlioglu and Ayag [45].

    To summarize, various MCGDM techniques have been developed to bring ease in the decision making process, either to opt for a most preferable alternative or to order all the alternatives (e.g., from most to least preferable). Particularly, the various PROMETHEE methods have a distinctive importance for their exceptional performance in decision making processes, and also for their notable ability to completely rank the set of alternatives.

    Therefore, the following factors embolden us to propose a novel MCGDM technique, within this remarkable family, that we call FNS PROMETHEE, because it operates in FNSS environment:

    ● Undoubtedly, Zadeh's fuzzy sets [1] achieved a breakthrough in dealing with the ambiguity and uncertainty present in everyday life. However, when one is restricted to giving the alternatives predetermined ratings, other notions are required.

    ● Fuzzy soft sets [6] already incorporate fuzziness with a parameterized family of the alternatives, but they still lack the ability of capturing N-grading.

    ● The FNS PROMETHEE technique not only handles the uncertainty of attributes, but it also provides the ease of ranking the alternatives according to the family of the attributes.

    The proposed methodology, FNS PROMETHEE, is based on the principle of comparison between any pair of alternatives by calculating the deviation of the alternatives by formulating score degrees, defining a suitable preference function, computing multiple criteria preference indexes and the outgoing and incoming flows of the alternatives. The following are the key contributions of this article:

    ● A step-by-step procedure of the FNS PROMETHEE technique, along with the flow chart, is included. It that deals with fuzziness of the attributes and helps us to assign N-ordered grading to the alternatives.

    ● Prior to the procedure of the FNS PROMETHEE technique, an AHP technique is used for normalization of weights that helps us to get more refined results and apply the techniques on the numerical example of the selection of best robot butler.

    ● The FNS PROMETHEE technique is compared with fuzzy ELECTRE [24], and the outcome of the same best alternative from both of the techniques proved it's rationality and credibility.

    The remainder2 includes the procedure of AHP technique [20]. Section 2 comprises the methodology of the FNS PROMETHEE technique. Section 3 incorporates the application of selection of best robot butler using FNS PROMETHEE. Section 4 includes the comparative analysis and discussion of FNS PROMETHEE (using various criteria preference functions) with FNS PROMETHEE (using usual criteria preference function) and FNS PROMETHEE technique with fuzzy ELECTRE [24]. Section 5 concludes this paper.

    In this section, the paradigms of fuzzy set theory and the N-grading principle are integrated within the PROMETHEE technique to propose new outranking techniques. First, we review a basic definition:

    Definition 2.1. [10] Let GN={0,1,2,,N1} be a set of N ordered grades, where N>1 is a natural number. A triplet (Γ,A,N) is said to be a fuzzy N-soft set on U, where F(U) consists of the set of all fuzzy sets on U, and A is a set of attributes, if Γ:A2F(U)×GN satisfies the condition for each aA and uF(U), and there exists a unique rGN such that (u,r)F(a).

    The FNS PROMETHEE technique that stems from this combination is based on the principle of incoming and outgoing flows of the alternatives with the selection of the generalized preference function according to the nature and type of the criteria. The step-by-step algorithm of the FNS PROMETHEE technique can be expressed by the following actions:

    1. Construction of independent decision matrices by each expert:

    FNS PROMETHEE, an MCGDM technique, is concerned with a group of decision making experts who after examining the alternatives on the basis of the criteria allocate membership degrees and ordered grades to the alternatives under the FNS environment. Therefore, we consider a set of 'q' experts, E={et},t=1,2,,q, who thoroughly analyze a set of 'r' alternatives, A={al},l=1,2,,r, with respect to the 'p' criteria under consideration as C={cs},s=1,2,,p. After a careful survey of the alternatives, each tth expert, from the panel of experts, assigns the independent membership degrees to the lth alternative with respect to the sth criterion in the form of fuzzy N-soft values (FNSV) as (dls,μls). These grades and membership degrees are represented in the form of the FNS decision matrix as follows:

    c1c2cpΓt=a1a2ar(d11,bt11d12,bt12d1p,bt1pd21,bt21d22,bt22d2p,bt2pdr1,btr1dr2,btr2drp,btrp).

    2. Construction of aggregated fuzzy N-soft decision matrix:

    In practical situations, the appointed experts do not necessarily have equal importance in the decision making process (because every expert has his/her own expertise, relationship with the issue under decision, et cetera). Therefore, the individual independent decisions of each expert, in the forms of grades and membership degrees, must be accumulated to form a combined decision having the impacts of each decision made by a single expert. A fuzzy N-soft averaging (FNSA) operator is used to merge the decisions of all the experts in a single persuasive decision as follows:

    Υls=FNSA((d(1)ls,d(2)ls,,d(q)ls),(β(1)ls,β(2)ls,,β(q)ls)) (2.1)
    =(max(d(1)ls,d(2)ls,,d(q)ls),β(1)ls+β(2)ls++β(q)lsq) (2.2)
    =(dls,μls). (2.3)

    3. Construct the score matrix:

    The score degrees of the aggregated values of the aggregated decision matrix are evaluated to estimate the deviation of an alternative with respect to the other one. The score degree is always calculated to determine the supremacy of an alternative over the others. By using the score degree, a score matrix S=[˜sls]r×p, the score degree of the aggregated membership degree and the aggregated ordering is calculated by using Eq (2.4) as follows:

    ˜s=dlsN1+μls. (2.4)

    4. Calculation of the deviation of the alternatives with respect to the score degrees:

    The main principle of the PROMETHEE method is to evaluate the pairwise deviation of the alternatives with respect to the difference between their score degrees. Therefore, to calculate the deviation between the alternatives hl and hm with respect to the criteria ck, we use Eq (2.5):

    Dk(hl,hm)=˜sk(hl)˜sk(hm),l,m=1,2,,r. (2.5)

    5. Define the suitable preference function for the alternatives:

    Since every alternative has its own worth and value, the decision making process depends upon the nature and type of the criteria of that alternative. To maintain the eminence of each alternative, decision makers define a suitable preference function for each alternative according to the nature of the criteria. The value of preference function ξk(hl,hm) varies from 0 to 1. The preference function with value exactly 1 indicates the strong preference of an alternative, while the preference function with value 0 is indifferent for the decision makers to the alternative.

    6. Evaluation of criteria weights:

    In this step, the subjective weights of the criteria are determined using the preferences of the decision-making panel. For this purpose, Saaty's AHP technique [20] is applied to determine the normalized weights of criteria.

    7. Determination of the multiple criteria preference index:

    In the FNS PROMETHEE method, we calculate the incoming and outgoing flows of the alternatives, for which purpose we evaluate the multiple criteria preference index based on the preference function defined by the decision makers according to the nature of the criteria and the criteria weights calculated by utilizing the AHP technique [20]. The multiple criteria preference index put forward the outranking relation among the alternatives, based on which an outranking graph is made to estimate the superiority and inferiority of an alternative over the other. The multiple criteria preference index can be calculated by using Eq (2.6), as follows:

    τ(hl,hm)=pk=1v(k)ξk(hl,hm)pk=1v(k),lm,l,m=1,2,,r. (2.6)

    Since the criteria weights calculated by the AHP technique are normalized, pk=1v(k)=1. Therefore, Eq (2.6) reduces to Eq (2.7) as follows:

    τ(hl,hm)=pk=1v(k)ξk(hl,hm),lm,l,m=1,2,,r. (2.7)

    This preference index indicates the potential of the preference of the decision makers of an alternative over another with respect to all alternatives. This preference index has values that lie between 0 and 1, such that

    τ(hl,hm)1 indicates the strong preference of alternative hl over hm with respect to all criteria. It shows the supremacy of hl over hm.

    τ(hl,hm)0 indicates the weak preference of alternative hl over hm with respect to all criteria. It shows the inferiority of hl to hm.

    8. Deduce the partial and complete preference ranking:

    Now, the preference ranking of the alternatives is obtained by utilizing the multiple criteria preference index. The preference raking of the alternatives shows the dominance and subjugation of an alternative over the other with respect to the all criteria. The partial outranking is obtained by using the PROMETHEE I technique, and the complete outranking is obtained by using the PROMETHEE II technique. The working principles of PROMETHEE I and PROMETHEE II techniques are explained as follows:

    The partial outranking flow of the alternatives (PROMETHEE I):

    This technique surrounds with the outgoing and incoming flows of the alternatives that decide the supremacy or inferiority of an alternative compared to others. The outgoing flow of the alternatives is calculated by using Eq (2.8) as follows:

    Ω+(hl)=1r1hlHτ(hl,hm),lm,l,m=1,2,,r. (2.8)

    The outgoing flow is also known as leaving flow or positive flow and measures the dominant behavior of an alternative over all other alternatives. It is actually the average of all outgoing arcs drawn from hl as shown in Figure 1.

    Figure 1.  Outgoing arcs from hl.

    On the other hand, the incoming flow of the alternatives is calculated by using Eq (2.9) as follows:

    Ω(hl)=1r1hmHτ(hm,hl),lm,l,m=1,2,,r. (2.9)

    This incoming flow is also known as negative flow and measures the submissive behavior of an alternative compared to all other alternatives. It is actually the average of all incoming arcs towards hl as shown in Figure 2.

    Figure 2.  Incoming arcs towards hl.

    The alternative with larger outgoing flow and smaller incoming flow is the preferable one or dominant over all other alternatives. The preferences of the alternatives based on the outgoing and incoming flows can be computed by using Eqs (2.10) and (2.11):

    hlF+hm,δ+(hl)>δ+(hm)hl,hmH;hlG+hm,δ+(hl)=δ+(hm)hl,hmH. (2.10)
    hlFhm,δ(hl)<δ(hm)hl,hmH;hlGhm,δ(hl)=δ(hm)hl,hmA. (2.11)

    The intersection of these preference rankings facilitates us with the partial outranking (˜F,˜G,˜K) of PROMETHEE I by using Eq (2.12):

    hl˜Fhm,ifhlF+hmandhlFhm,oraiP+ajandhlGhm,orhlG+hmandhlFhm;hl˜Ghm,iffhlG+hmandhlGhm;hl˜Khm,otherwise. (2.12)

    In Eq (2.12), hl˜Fhm indicates that hl outranks hm, and hl˜Ghm indicates that hl is indifferent to hm, that is, both the alternatives are at the same position while hl˜Khm indicates that hl is incomparable with hm. Therefore, PROMETHEE I gives us the partial outranking, as some of the alternatives remain incomparable.

    The complete outranking flow of the alternatives (PROMETHEE II):

    In order to get the complete outranking of the alternatives with respect to the incoming and outgoing flows, PROMETHEE II comes up with spectacular features for providing us the complete outranking of the alternatives. The net outranking of the alternatives is formulated with the help of Eq (2.13):

    δ(hl)=δ+(hl)δ(hl). (2.13)

    Eq (2.13) shows the difference between outgoing and incoming flows of the alternatives that provides us the complete outranking (P,I) in PROMETHEE II of the alternatives with the help of Eq (2.14):

    hlFhm,iffδ(hl)>δ(hm);hlGhm,iffδ(hl)=δ(hm). (2.14)

    In Eq (2.14), hlFhm indicates that hl outranks hm, and hlGhm indicates that hl and hm both are at the same position and indifferent to each other. Hence, the alternative with greatest outranking flow is considered as the most suitable choice. In this way, PROMETHEE II works out with the complete outranking of the alternatives and plays a requisite role in the multi-criteria decision making process.

    This detailed step-by-step procedure of FNS PROMETHEE is summarized in a flowchart, as shown in Figure 3.

    Figure 3.  Pictorial representation of proposed method.

    The choice of preference function for each criterion of alternatives is a difficult task. Brans et al. [19,35] specified the general preference function according to the nature and type of the criteria. These preference functions cover most of the aspects of the nature of the criteria. The definitions of these preference functions are as follows:

    Definition 2.2. The usual criterion preference function (Type I) is defined as

    η(x)={0,x0;1,x>0,

    where x is the difference between any two alternatives. This preference function does not possess any parameter and under this function a criterion can be used in its usual way.

    Definition 2.3. The usual Quasi-criterion preference function (Type II) is defined as

    η(x)={0,xt;1,x>t,

    where t is the indifference threshold value between any two alternatives. The two alternatives remain the same unless their difference does not exceed value of t. If their difference gets larger than value of t, a strict preference relation is developed.

    Definition 2.4. The criterion with linear preference function (Type III) is defined as :

    η(x)={xp,xp;1,x>p,

    where p[0,1] is the preference threshold assigned by the decision maker, where the preference of the decision maker increases linearly with x until the difference of alternatives is lower than p. When x is greater than p, a strict preference of an alternative is obtained with respect to that criterion.

    Definition 2.5. The level criterion preference function (Type IV) is defined as :

    η(x)={0,xl;1/2,l<xl+m;1,x>l+m,

    where l and m represent the priority and indifference thresholds, respectively, given by the decision maker, and can be selected from interval [0, 1]. In such functions, two alternatives behave similarly only if the difference between two alternatives lies in the interval [-l, l].

    Definition 2.6. The criterion with linear preference having indifference area (Type V) is defined as :

    η(x)={0,xv;(xv)/u,v<xv+w;1,x>v+w,

    where v and w represent threshold values that lie in [0, 1]. Under such functions, two alternatives have entirely same behavior unless their deviation does not exceed value of u. The preference increases linearly as long as the deviation equals to u + v, and after that value, a strict preference is achieved.

    Definition 2.7. The preference function for the Gaussian criteria (Type VI) is defined as

    η(x)={0,x0;1ex2/2θ2,x>0;

    where the value of θ[0,1] is assigned by decision maker and represents the distance between the origin and the point of inflexion.

    This section is summed up with the application of the remarkable MCGDM technique, FNS PROMETHEE, that facilitates us in making the best suitable decisions in the FNS environment according to the terms and conditions. This section is entailed with two real life applications of decision making techniques. The first one is related to the field of artificial intelligence, that is, selection of the best robot butler for household chores. The second one is concerned with the medical field, that is, the selection of the most suitable emergency unit in a hospital for the treatment of the patients who come in critical condition.

    This subsection provides a detailed explanation of the problem statement to describe the background. Unquestionably, artificial intelligence has gained remarkable popularity by inventing different devices that have made our life much easier and quicker. The miracles of artificial intelligence are revered by several researchers, and their remarkable achievements in most branches of science, medical, media, engineering, industry or mechanics are acknowledged. Everything that has been made possible from the development of smart Android phones and to the Astrobee robot (which was sent to the space station; see https://www.nasa.gov/astrobee), is a blessing of artificial intelligence. Now, scientists are interested in inventing robot butlers that can do all household chores more smoothly, quickly and efficiently and can save some time for a man in his busy routine. Many scientists have created humanoid robots with the help of artificial intelligence, such as a 6-foot 3-inch radio-controlled robot that could do some ironing at its inventor Peter Holland's home in Hertfordshire. Engineer Boris Grishin built a robot secretary capable of answering the phone, waking up the family in the morning, controlling the temperature, and turning on and off the lights, Toshiba introduced a prototype housekeeping robot called ApriAttenda that can open the door of a fridge and picking a bottle. The robot's designers want to employ these tremendous machines in a variety of ways. (https://www.huffpost.com).

    Consider a scenario where a robotics company wants to introduce a robot butler in the market that fulfils the needs of people and can share the burden of household chores with them. To provide its customers the best service, suppose the company has five alternatives (robots) Φ={φ1,φ2,φ3,φ4,φ5} to be selected and a panel of experts ζ={ς1,ς2,ς3,ς4} who have expertise in various fields to analyze all the aspects of these selected alternatives. The panel of experts consists of the following professionals:

    ● Information technology (IT) expert (ς1):

    An information technology expert will monitor and manage computer hardware, software and networks within the machinery of the alternatives. The IT specialist will maintain and improve the technical system of the robot to ensure implementation, monitoring, and maintenance of IT systems installed in the selected robots. He will keep track of the system functionality.

    ● Logistics expert (ς2):

    The logistics expert will be responsible for the life cycle of the products, including preparation, shipping and receiving. He will develop reports showing transportation costs on this precise project and moves, support the maintenance of logistics policies, administer, maintain inventory control program systems and work within the logistical department of the company that hires him.

    ● Coding expert (ς3):

    Code is the main instructions or programm installed in any system to run it. A coding expert will analyze the alternatives based on the software programming installed in them, as an expert in the development of computer technology. A coding expert will perform the following tasks: system conception, design, system development, writing code, testing, debugging, implementation and maintenance.

    ● Roboticist (ς4):

    Roboticists are generally involved in the design, programming, construction, and testing of robots. They can work on any stage of development, from creating software to building hardware and troubleshooting the finished product. Robotics engineers spend the majority of their time designing the plans and processes needed to not only build robots, but to have them work effectively. Some robotics engineers also design the machines that actually assemble the robots.

    The above mentioned experts make the decision after a thorough analysis of the considered criteria ξ={η1,η2,η3,η4} that are displayed in Figure 5 and explained as follows:

    Figure 4.  A robot butler.
    Figure 5.  Criteria of robot.

    ● Adaptive to the environment (η1):

    As robots operate in the real world experiencing a range of different environments and tasks, it is essential for the robot to have the ability to adapt to its surroundings to work efficiently in changing conditions and circumstances by allowing adaptation to internal, as well as external factors.

    ● Fast learner (η2):

    Robots should not only work with the pre-defined programming but also be able to learn things with time. Robots can perform efficiently in all the tasks and hurdles for which they are already programmed, but humanoid robots mast have this unique feature of humans, as they must be fast learners of different new things and tasks.

    ● Biometric technology (η3):

    Robots must be equipped with biometric technology that enables them to differentiate between family members, strangers, physical spaces and household items. This feature is very essential for the robot so that it would recognize any stranger coming into the house, place the household items in their specific place and also detect the temperature of the other people.

    ● Prepared for emergency (η4):

    Robots must be prepared for emergency situations as they must sense that something is going wrong and not in the usual way, such as having a fire in a house, robbers robbing the house, gas leakage, water leakage or water overflow. They must avoid harmful situations to people, property and themselves.

    This subsection describes the complete solution of the described decision-making problem. As our proposed MCGDM methodology, FNS PROMETHEE is a pre-eminent tool for the selection of the best robot butler to be launched in the market by a certain company. The main principle of this technique is the comparison between any pair of alternatives based on the incoming and outgoing flows of the alternatives. This methodology comprises the deviations of the alternatives with respect to the score degree, general preference function, multi criteria preference function, and partial and complete rankings of the alternatives. The initial evaluations considered in this specific numerical example are the sample data. The detailed step-by-step procedure of the FNS PROMETHEE technique for the selection of the best robot butler is as follows:

    1). Each expert in the designated panel of experts, after thorough analysis of the alternatives based on the considered criteria, assigns the grades and membership degrees, in the form of fuzzy N-soft values (FNSV), to the alternatives separately. These individual assessments are arranged in Tables 14, respectively.

    Table 1.  F6SDM of the information technology expert (ς1).
    ς1 η1 η2 η3 η4
    φ1 (5,0.96) (2,0.29) (4,0.65) (4,0.73)
    φ2 (4,0.75) (5,0.87) (4,0.79) (5,0.82)
    φ3 (3,0.53) (4,0.59) (5,0.91) (3,0.46)
    φ4 (3,0.56) (2,0.31) (3,0.58) (2,0.27)
    φ5 (4,0.76) (1,0.15) (3,0.69) (3,0.52)

     | Show Table
    DownLoad: CSV
    Table 2.  F6SDM of logistics expert (ς2).
    ς1 η1 η2 η3 η4
    φ1 (3,0.57) (4,0.73) (3,0.47) (3,0.49)
    φ2 (5,0.95) (5,0.84) (4,0.77) (4,0.68)
    φ3 (4,0.51) (3,0.55) (4,0.66) (5,0.94)
    φ4 (2,0.28) (2,0.37) (3,0.58) (3,0.53)
    φ5 (4,0.78) (3,0.59) (3,0.59) (1,0.11)

     | Show Table
    DownLoad: CSV
    Table 3.  F6SDM of coding expert (ς3).
    ς1 η1 η2 η3 η4
    φ1 (2,0.27) (3,0.48) (2,0.38) (3,0.56)
    φ2 (4,0.76) (5,0.97) (4,0.79) (3,0.59)
    φ3 (3,0.46) (3,0.57) (4,0.69) (3,0.44)
    φ4 (3,0.55) (2,0.27) (1,0.07) (2,0.35)
    φ5 (3,0.57) (4,0.77) (3,0.55) (1,0.17)

     | Show Table
    DownLoad: CSV
    Table 4.  F6SDM of the roboticist (ς4).
    ς1 η1 η2 η3 η4
    φ1 (3,0.48) (4,0.74) (2,0.22) (3,0.44)
    φ2 (5,0.88) (5,0.83) (4,0.73) (5,0.98)
    φ3 (4,0.71) (3,0.58) (4,0.66) (5,0.96)
    φ4 (2,0.39) (3,0.54) (2,0.27) (2,0.33)
    φ5 (3,0.59) (2,0.38) (4,0.75) (1,0.14)

     | Show Table
    DownLoad: CSV

    2). This discrete assessment from each decision maker is assembled in one matrix that has the collective effect of the decisions of the experts by using the mFNSA operator, given in Eqs (2.2) and (2.3), represented as AF6SDM in Table 5.

    Table 5.  Aggregated F6SDM.
    ς1 η1 η2 η3 η4
    φ1 (5,0.57) (4,0.56) (4,0.43) (4,0.56)
    φ2 (5,0.84) (5,0.88) (4,0.77) (5,0.77)
    φ3 (4,0.55) (4,0.57) (5,0.73) (5,0.70)
    φ4 (3,0.45) (3,0.37) (3,0.38) (3,0.37)
    φ5 (4,0.68) (4,0.47) (4,0.65) (3,0.24)

     | Show Table
    DownLoad: CSV

    3). Calculate the score degrees of the aggregated values in the aggregated decision matrix by using Eq (2.4) to construct a score matrix, displayed in Table (6), that will be used to calculate deviations of the alternatives.

    Table 6.  Score matrix.
    η1 η2 η3 η4
    φ1 1.57 1.36 1.23 1.36
    φ2 1.84 1.88 1.57 1.77
    φ3 1.35 1.37 1.73 1.70
    φ4 1.05 0.97 0.98 0.97
    φ5 1.48 1.27 1.45 0.84

     | Show Table
    DownLoad: CSV

    4). Calculate the deviations of the alternatives with respect to the score degree by using Eq (2.5), which shows the difference between the score degrees of any pair of alternatives. These deviations of the alternatives are arranged in Table 7.

    Table 7.  Deviations of the alternatives with respect to the criteria.
    Alternatives η1 η2 η3 η4 Alternatives η1 η2 η3 η4
    φ1φ2 0.27 0.52 0.34 0.41 φ1φ3 0.22 0.01 0.50 0.34
    φ1φ4 0.52 0.39 0.25 0.39 φ1φ5 0.09 0.09 0.22 0.52
    φ2φ1 0.27 0.52 0.34 0.41 φ2φ3 0.49 0.51 0.16 0.07
    φ2φ4 0.79 0.91 0.59 0.80 φ2φ5 0.36 0.61 1.57 0.93
    φ3φ1 0.22 0.01 0.50 0.34 φ3φ2 0.49 0.51 0.16 0.07
    φ3φ4 0.30 0.40 0.75 0.73 φ3φ5 0.13 0.1 0.28 0.86
    φ4φ1 0.52 0.39 0.25 0.39 φ4φ2 0.79 0.91 0.59 0.80
    φ4φ3 0.30 0.40 0.75 0.73 φ4φ5 0.43 0.3 0.47 0.13
    φ5φ1 0.09 0.09 0.22 0.52 φ5φ2 0.36 0.61 0.12 0.93
    φ5φ3 0.13 0.1 0.28 0.86 φ5φ4 0.43 0.3 0.47 0.13

     | Show Table
    DownLoad: CSV

    5). To maintain the eminence of each alternative, define a suitable preference function among the six types of preference functions formulated by Brans [19,35] on the basis of indifference and preference thresholds. Here, we have considered preference functions of Types I–III for the sake of simplicity and to deal with preferences and indifference between the alternatives. The types of criteria are specified by the generalized preference functions given in Table 8.

    Table 8.  Types of criteria and preference functions.
    Criteria Max or Min Type of criteria Parameters
    φ1 Max I nill
    φ2 Max II k=0.01
    φ3 Max III q=0.1
    φ4 Max I nill

     | Show Table
    DownLoad: CSV

    6). In this step, the weights of the criteria are calculated by using the AHP technique. The comparison table is displayed in Table 9 based on the Saaty preference scale. The comparative scale, assigned by the experts to the attributes, depends on the comparative importance of the attributes over one another according to their nature and the circumstances under which those attributes are being considered. In this specific example of selection of best robot butler, the initial evaluations are being taken as test data.

    Table 9.  Comparison table for the criteria.
    B η1 η2 η3 η4
    η1 1 0.143 0.20 0.143
    η2 7 1 3 1
    η3 5 0.333 1 0.333
    η4 7 1 3 1

     | Show Table
    DownLoad: CSV

    After multiplication of comparison table of criteria and criteria weights, the Bϱ matrix is shown in Eq (3.1):

    BV=(0.1951.6260.6731.626). (3.1)

    The maximum eigenvalue is calculated as follows:

    λmax=14×[0.1950.049+1.6260.394+0.6730.165+1.6260.394] (3.2)
    =4.078. (3.3)

    The consistency index is calculated as S=0.026. The consistency index near zero shows that the comparative values are consistent. After evaluating the consistency index, we calculate the consistency ratio by dividing the consistency index by the random index. Here, we have considered n=4 and T=0.90. The consistency ratio is calculated as Y=0.0289. As 0.0289<0.10, it is acceptable. The normalized weights are displayed in Table 10. The obtained weight vector is shown in Table 11.

    Table 10.  Normalized weights.
    Bnorm η1 η2 η3 η4
    η1 0.05 0.058 0.028 0.058
    η2 0.35 0.404 0.417 0.404
    η3 0.25 0.135 0.139 0.135
    η4 0.35 0.404 0.417 0.404

     | Show Table
    DownLoad: CSV
    Table 11.  Criteria weights (ϱ).
    ϱ
    w1 0.049
    w2 0.394
    w3 0.165
    w4 0.394

     | Show Table
    DownLoad: CSV

    7). The preference degrees of every pair of alternatives with respect to each of the criteria are calculated by using generalized criteria preference function by Brans [19,35], as displayed in Table 12.

    Table 12.  Generalized criteria preference function.
    Alternatives η1 η2 η3 η4 Alternatives η1 η2 η3 η4
    φ1φ2 0 0 3.4 0 φ1φ3 1 0 5 0
    φ1φ4 1 1 1 1 φ1φ5 1 1 2.2 1
    φ2φ1 1 1 1 1 φ2φ3 1 1 1.6 1
    φ2φ4 1 1 1 1 φ2φ5 1 1 1 1
    φ3φ1 0 0 1 1 φ3φ2 0 0 1 0
    φ3φ4 1 1 1 1 φ3φ5 0 1 1 1
    φ4φ1 0 0 2.5 0 φ4φ2 0 0 5.9 0
    φ4φ3 0 0 7.5 0 φ4φ5 0 0 4.7 1
    φ5φ1 0 0 1 0 φ5φ2 0 0 1.2 0
    φ5φ3 1 0 2.8 0 φ5φ4 1 1 1 0

     | Show Table
    DownLoad: CSV

    8). Based on the preference function and the criteria weights calculated by AHP technique 11, determine the multi-criteria preference index by using Eq (2.7), indicating the potential of the preference of experts of an alternative over another. The multi-criteria preference index is shown in Table 13.

    Table 13.  Multi-criteria preference indexes.
    φ1 φ2 φ3 φ4 φ5
    φ1 0.561 0.776 1.002 0.474
    φ2 1.002 0.573 1.002 1.002
    φ3 0.559 0.165 1.002 0.953
    φ4 0.413 0.974 1.238 0.382
    φ5 0.165 0.198 0.413 0.608

     | Show Table
    DownLoad: CSV

    9). The next step is to deduce the partial and complete outranking of the alternatives. The partial outranking of the alternatives is estimated with FNS PROMETHEE I and by the formulation of outgoing and incoming flows of the alternatives by using Eqs (2.8) and (2.9), respectively. The outgoing and incoming flows of an alternative with respect to another alternative are deduced by Eqs (2.10) and (2.11), respectively, and displayed in Table 14. The intersection of these flows facilitates the partial outranking of the alternatives, which can be estimated by Eq (2.12) as follows:

    Table 14.  Positive and negative flows of the alternatives (PROMETHEE I).
    Alternatives Outgoing flow(Υ+) Ingoing flow(Υ)
    φ1 0.035 0.328
    φ2 0.895 0.392
    φ3 0.670 0.463
    φ4 0.751 0.904
    φ5 0.041 0.512

     | Show Table
    DownLoad: CSV

    φ1ˆPφ4, φ2ˆPφ1, φ2ˆPφ3, φ2ˆPφ4, φ2ˆPφ5, φ3ˆPφ1, φ3ˆPφ4, φ3ˆPφ5, φ5ˆPφ4.

    However, φ1 and φ5 are incomparable. This partial relation of PROMETHEE I is shown in Figure 6.

    Figure 6.  Partial outranking of the alternatives.

    10). For the complete outranking of the alternatives with FNS PROMETHEE II, the net outranking of the alternatives is formulated by Eq (2.13). Now, by using Eq (2.14), we can get the complete outranking of the alternatives, as shown in Table 15.

    Table 15.  Net outranking flow of the alternatives (PROMETHE II).
    Alternatives Net flow(Υ)
    φ1 0.294
    φ2 1.287
    φ3 1.133
    φ4 1.655
    φ5 0.471

     | Show Table
    DownLoad: CSV

    11). After performing all the calculations, we evaluate the net flows of the alternatives in Table 15, which shows that greater the net flows more suitable an alternative is, according to which the ordering of the alternatives is as follows:

    φ2>φ3>φ1>φ5>φ4. Here, Table 15 seems to show that φ2 has the highest net flow (most favorable), and φ4 has least value of net flow (least preferable).

    In this section, a comparative study of the proposed technique with the existing approaches is carried out to manifest the authenticity and accuracy of the proposed technique. Further, this section includes a thorough discussion to highlight the dominance of the proposed approaches.

    In this subsection, we perform the fuzzy ELECTRE technique [24] on the application of the selection of the beset robot butler to be launched in the market to compare this technique with our proposed MCGDM technique, FNS PROMETHEE. For the sake of convenience, we have considered a fuzzy ELECTRE environment, and after performing the calculations, we will come to know that the same best alternative is selected under both techniques. Now, the steps of the fuzzy ELECTRE technique [24] are as follows:

    1). First of all, the aggregated fuzzy importance weights for each criteria are calculated, as shown in Table 16.

    Table 16.  Normalized aggregated fuzzy importance weights.
    Criteria wj1 wj2 wj3
    η1 0.12 0.06 0.18
    η2 0.34 0.42 0.29
    η3 0.2 0.1 0.24
    η4 0.34 0.42 0.29

     | Show Table
    DownLoad: CSV

    2). After analyzing all the criteria for each alternative, all the experts (ς1,ς2,ς3,ς4) assigned fuzzy weights to the considered alternatives, and the decision matrix is presented in Table 17.

    Table 17.  Decision matrix.
    Criteria η1 η2 η3 η4
    φ1 0.57 0.56 0.43 0.56
    φ2 0.84 0.88 0.77 0.77
    φ3 0.55 0.57 0.73 0.70
    φ4 0.45 0.37 0.38 0.37
    φ5 0.68 0.47 0.65 0.24

     | Show Table
    DownLoad: CSV

    3). Construct a normalized decision matrix, as shown in Table 18, after applying the normalization on the decision matrix.

    Table 18.  Normalized decision matrix.
    Criteria η1 η2 η3 η4
    φ1 0.4 0.42 0.31 0.44
    φ2 0.59 0.66 0.56 0.61
    φ3 0.39 0.43 0.53 0.55
    φ4 0.32 0.28 0.28 0.29
    φ5 0.42 0.35 0.47 0.19

     | Show Table
    DownLoad: CSV

    4). The weighted normalized decision matrix shown in Table 19 is formed by multiplying the normalized decision matrix with the aggregated fuzzy importance weights.

    Table 19.  Weighted normalized decision matrix.
    Alternatives η1 η2 η3 η4 Alternatives η1 η2 η3 η4
    V1 V2
    φ1 0.05 0.14 0.06 0.15 φ1 0.02 0.18 0.03 0.06
    φ2 0.07 0.22 0.11 0.21 φ2 0.04 0.28 0.01 0.26
    φ3 0.05 0.15 0.11 0.19 φ3 0.02 0.18 0.05 0.23
    φ4 0.04 0.10 0.06 0.10 φ4 0.02 0.12 0.03 0.12
    φ5 0.07 0.12 0.09 0.06 φ5 0.03 0.15 0.05 0.08
    V3
    φ1 0.07 0.12 0.07 0.13
    φ2 0.11 0.19 0.13 0.18
    φ3 0.07 0.13 0.13 0.16
    φ4 0.06 0.08 0.07 0.08
    φ5 0.09 0.1 0.11 0.06

     | Show Table
    DownLoad: CSV

    5). The concordance and discordance indices are calculated for each of the criteria (wj1,wj2,wj3). The concordance indices are calculated to check the levels of superiority of the alternatives over the others. The concordance set (CS) and concordance index (CI) with respect to the criteria wj1, wj2 and wj3 are shown in Tables 20, 21 and 22, respectively.

    Table 20.  Concordance index with respect to wj1.
    CS CI CS CI CS CI
    C(φ1,φ2) nill 0 C(φ2,φ1) 1,2,3,4 1 C(φ3,φ1) 1,2,3,4 1
    C(φ1,φ3) 1 0.12 C(φ2,φ3) 1,2,3,4 1 C(φ3,φ2) 3 0.2
    C(φ1,φ4) 1,2,3,4 1 C(φ2,φ4) 1,2,3,4 1 C(φ3,φ4) 1,2,3,4 1
    C(φ1,φ5) 2,4 0.68 C(a2,a5) 1,2,3,4 1 C(a3,a5) 2,3,4 0.88
    C(φ4,φ1) 3 0.2 C(φ5,φ1) 1,3 0.32
    C(φ4,φ2) nill 0 C(φ5,φ2) 1 0.12
    C(φ4,φ3) nill 0 C(φ5,φ3) 1 0.12
    C(φ4,φ5) nill 0 C(φ5,φ4) 1,2,3 0.66

     | Show Table
    DownLoad: CSV
    Table 21.  Concordance index with respect to wj2.
    CS CI CS CI CS CI
    C(φ1,φ2) 3 0.1 C(φ2,φ1) 1,2,4 0.9 C(φ3,φ1) 1,2,3,4 1
    C(φ1,φ3) 1,2 0.48 C(φ2,φ3) 1,2,4 0.9 C(φ3,φ2) 3 0.1
    C(φ1,φ4) 1,2,3 0.58 C(φ2,φ4) 1,2,4 0.9 C(φ3,φ4) 1,2,3,4 1
    C(φ1,φ5) 2 0.42 C(φ2,φ5) 1,2,4 0.9 C(φ3,φ5) 1,2,3 0.58
    C(φ4,φ1) 1,3,4 0.58 C(φ5,φ1) 1,3,4 0.58
    C(φ4,φ2) 3 0.1 C(φ5,φ2) 3 0.1
    C(φ4,φ3) 1 0.12 C(φ5,φ3) 1,3 0.16
    C(φ4,φ5) 4 0.42 C(φ5,φ4) 1,2,3 0.58

     | Show Table
    DownLoad: CSV
    Table 22.  Concordance index with respect to wj3.
    CS CI CS CI CS CI
    C(φ1,φ2) nill 0 C(φ2,φ1) 1,2,3,4 1 C(φ3,φ1) 1,2,3,4 1
    C(φ1,φ3) 1 0.18 C(φ2,φ3) 1,2,3,4 1 C(φ3,φ2) nill 0
    C(φ1,φ4) 1,2,3,4 1 C(φ2,φ4) 1,2,3,4 1 C(φ3,φ4) 1,2,3,4 1
    C(φ1,φ5) 2,4 0.58 C(φ2,φ5) 1,2,3,4 1 C(φ3,φ5) 2,3,4 0.82
    C(φ4,φ1) 3 0.24 C(φ5,φ1) 1,3 0.42
    C(φ4,φ2) nill 0 C(φ5,φ2) nill 0
    C(φ4,φ3) nill 0 C(φ5,φ3) 1 0.18
    C(φ4,φ5) 4 0.29 C(φ5,φ4) 1,2,3 0.71

     | Show Table
    DownLoad: CSV

    6). The discordance index (DI) is used to determine of the level of inferiority of an alternative compared to another according to the selected criteria. Therefore, the fuzzy DI is formulated to check the level of inferiority. The discordance set (DS) and discordance index (DI) with respect to the criteria wj1, wj2 and wj3 are shown in Tables 23, 24 and 25, respectively.

    Table 23.  Discordance index with respect to wj1.
    DS DI DS DI DS DI
    D(φ1,φ2) 1,2,3,4 1 D(φ2,φ1) nill 0 D(φ3,φ1) nill 0
    D(φ1,φ3) 2,3,4 0.9 D(φ2,φ3) nill 0 D(φ3,φ2) 1,2,4 1
    D(φ1,φ4) nill 0 D(φ2,φ4) nill 0 D(φ3,φ4) nill 0
    D(φ1,φ5) 1,3 0.3 D(φ2,φ5) nill 0 D(φ3,φ5) 1 0.1
    D(φ4,φ1) 1,2,4 0.9 D(φ5,φ1) 2,4 0.7
    D(φ4,φ2) 1,2,3,4 1 D(φ5,φ2) 2,3,4 0.9
    D(φ4,φ3) 1,2,3,4 1 D(φ5,φ3) 2,3,4 0.9
    D(φ4,φ5) 1,2,3,4 1 D(φ5,φ4) 4 0.3

     | Show Table
    DownLoad: CSV
    Table 24.  Discordance index with respect to wj2.
    DS DI DS DI DS DI
    D(φ1,φ2) 1,2,4 0.9 D(φ2,φ1) 3 0.1 D(φ3,φ1) nill 0
    D(φ1,φ3) 3,4 1 D(φ2,φ3) 3 0.2 D(φ3,φ2) 1,2,4 0.8
    D(φ1,φ4) 4 0.5 D(φ2,φ4) 3 0.1 D(φ3,φ4) nill 0
    D(φ1,φ5) 1,3,4 0.6 D(φ2,φ5) 3 0.1 D(φ3,φ5) 1 0.01
    D(φ4,φ1) 2 0.5 D(φ5,φ1) 2 0.4
    D(φ4,φ2) 1,2,4 0.9 D(φ5,φ2) 1,2,4 0.9
    D(φ4,φ3) 2,3,4 1 D(φ5,φ3) 2,4 0.9
    D(φ4,φ5) 1,2,3 0.6 D(φ5,φ4) 4 0.4

     | Show Table
    DownLoad: CSV
    Table 25.  Discordance index with respect to wj3.
    DS DI DS DI DS DI
    D(φ1,φ2) 1,2,3,4 1 D(φ2,φ1) nill 0 D(φ3,φ1) nill 0
    D(φ1,φ3) 2,3,4 0.9 D(φ2,φ3) nill 0 D(φ3,φ2) 1,2,3,4 1
    D(φ1,φ4) nill 0 D(φ2,φ4) nill 0 D(φ3,φ4) nill 0
    D(φ1,φ5) 1,3 0.4 D(φ2,φ5) nill 0 D(φ3,φ5) 1 0.2
    D(φ4,φ1) 1,2,4 0.9 D(φ5,φ1) 2,4 0.6
    D(φ4,φ2) 1,2,3,4 1 D(φ5,φ2) 1,2,3,4 1
    D(φ4,φ3) 1,2,3,4 1 D(φ5,φ3) 2,3,4 0.8
    D(φ4,φ5) 1,2,3 0.8 D(φ5,φ4) 4 0.2

     | Show Table
    DownLoad: CSV

    7). The final concordance and discordance indices are computed, where the larger values of CI and smaller values of DI indicate the strong and preferable relation among the alternatives. The final CI and DI values are displayed in Tables 26 and 27.

    Table 26.  Final concordance index.
    C(φ1,φ2) 0 C(φ2,φ1) 1 C(φ3,φ1) 1
    C(φ1,φ3) 0.2 C(φ2,φ3) 1 C(φ3,φ2) 0
    C(φ1,φ4) 0.83 C(φ2,φ4) 1 C(φ3,φ4) 1
    C(φ1,φ5) 0.55 C(φ2,φ5) 1 C(φ3,φ5) 0.42
    C(φ4,φ1) 0.2 C(φ5,φ1) 0.4
    C(φ4,φ2) 0 C(φ5,φ2) 0
    C(φ4,φ3) 0 C(φ5,φ3) 0.003
    C(φ4,φ5) 0 C(φ5,φ4) 0.27

     | Show Table
    DownLoad: CSV
    Table 27.  Final discordance index.
    D(φ1,φ2) 1 D(φ2,φ1) 0 D(φ3,φ1) 0
    D(φ1,φ3) 1 D(φ2,φ3) 0 D(φ3,φ2) 0.9
    D(φ1,φ4) 0 D(φ2,φ4) 0 D(φ3,φ4) 0
    D(φ1,φ5) 0.4 D(φ2,φ5) 0 D(φ3,φ5) 0.1
    D(φ4,φ1) 0.8 D(φ5,φ1) 0.6
    D(φ4,φ2) 1 D(φ5,φ2) 1
    D(φ4,φ3) 1 D(φ5,φ3) 0.9
    D(φ4,φ5) 0.8 D(φ5,φ4) 0.3

     | Show Table
    DownLoad: CSV

    8). The average concordance index is 0.44, and the average discordance index is 0.49. The alternative φ2 has the concordance greater than the average concordance and the discordance lesser than the average discordance index. Therefore, alternative φ2 is selected as the best robot butler to be launched in the market.

    9). The comparison between the proposed FNS PROMETHEE technique and the fuzzy ELECTRE I [24] shows us the selection of same best alternative. The comparison is shown in Table 28.

    Table 28.  Comparative Analysis.
    Methods Outranking relation Best alternative
    FNS PROMETHEE (proposed) φ2>φ3>φ1>φ5>φ4 φ2
    Fuzzy ELECTRE [24] None φ2

     | Show Table
    DownLoad: CSV

    Table 28 shows that the same best robot butler (φ2) is chosen for the household chores by applying both of the techniques on the same example. {Thus, the results of this comparison are consistent with our proposed technique and verify its competency.

    Both the FNS PROMETHEE technique and fuzzy ELECTRE method fall in the category of outranking approaches, but the proposed technique performs more brilliantly owing to the operational and theoretical backgrounds of the PROMETHEE methods. Moreover, the proposed techniques prevails due to the tendency of establishing the ranking list from the most favorable to least favorable one with respect to their net flows, while the other existing outranking techniques may lose this feature due to incomparability. The proposed variants of the PROMETHEE method have the edge to incorporate the grading in addition to inexact information due to the prevalent structure of FNSS. Oppositely, the fuzzy ELECTRE approach lacks representation of the grading information. Thus, the proposed technique, working on the background of soft and fuzzy set theory, is more compatible and adaptable to manipulate decision-making problems.

    This subsection is dedicated to a precise discussion on the advantages and drawbacks of the proposed strategies.

    ● The most visible achievement is the extension of the applicability of a remarkable MCGDM technique, namely, PROMETHEE, to a novel knowledge structure. It had already been extended to fuzzy data. Here, we have adapted PROMETHEE so that we can apply its spirit even in the case of fuzzy N-soft data. With this further extension, one can incorporate the vagueness of the human expressions that are often put across through an N-grading of the parameterized family of alternatives.

    ● In agreement with this road map, the FNS PROMETHEE technique focuses mainly on the incoming and outgoing flows of the alternatives based on their deviations, by constructing the score degree and multi-criteria preference index.

    ● FNS PROMETHEE I gives a partial outranking of the alternatives, while FNS PROMETHEE II produces a complete out ranking of the alternatives. Both outrankings of the alternatives can be shown by the corresponding outranking graphs.

    ● Despite all these distinctions, the proposed techniques is still inept in accommodating multi-polar information due to the inherent structure of FNSS.

    Multiple MCGDM techniques have revolutionized the operational approach to decision-making. Even though human nature is intrinsically imprecise, various approaches to uncertainty are compatible to interpret the fuzziness of real life scenarios. Further, the grading approach of the FNSS, relatable to the trendy opinion expression of the modern world, makes it highly adaptable and suitable to carry the imprecision as well as the grading of the particular object within the specified range. This model is designed by merging the many-valued logics with fuzzy expressions to deal with parametric families associated with attributes by dint of both "ratings" and "values of truth".

    The core aim of this article is to employ the well suited structure of FNSS to address a real life problem to look for a more appropriate decision. Noticing the impressive decision-making aptitude of the PROMETHEE technique, we have produced, applied and discussed a novel FNS PROMETHEE approach. We have given a detailed step-by-step description of the proposed methodology, and a comprehensive flowchart has been included to convey the concise summary of this strategy. Then, a specific example concerning the selection of the best robotic butler and a comparative study have been presented to manifest its competency with strong arguments.

    The proposed strategy allows the expression of a parameterized family of the alternatives (in terms of the attributes) with nice characteristics (fuzziness plus graded expressions). The main advantages of the FNS PROMETHEE technique is its ability to deal with uncertainty and N-ordered grading at the same time, where fuzzy sets or fuzzy soft sets used to fail, and these circumstances occur in many practical field, like science and management, departments of information and technology, business administration, artificial intelligence, computational mathematics, and industrial management. Despite the numerous benefits of the proposed technique, the aptitude of the proposed technique is limited to dealing with only one aspect (single pole) of the information. Another drawback of this study is its malfunctioning in dealing with periodic information. Thus, to overcome these limitations, we are planing to extend the family of PROMETHEE techniques in different domains with the grading feature of N-SS, including m-polar FNSS and complex m-polar FNSS.

    Acknowledgments

    The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work through General Research Project under grant number (R.G.P.2/48/43). Alcantud is grateful to the Junta de Castilla y León and the European Regional Development Fund (Grant CLU-2019-03) for the financial support to the Research Unit of Excellence "Economic Management for Sustainability" (GECOS).


    Acknowledgments



    This work was supported by the National Natural Science Foundation of China (No. 32100020 and 32370188), the Guangdong Basic and Applied Basic Research Foundation (No. 2022A1515010194 and 2023A1515012775) and the Guangzhou Basic and Applied Basic Research Foundation (No. 202201010613)

    Conflict of interest



    The authors declare no conflict of interest.

    Author contributions



    Z. X. conceptualized the review topic, and S. C., W. W. and Y. W. performed the literature search. S. C. drafted the manuscript, and Z. X. and H. C. revised the manuscript. All authors read and approved the final manuscript.

    [1] Chandrasegaran S, Carroll D (2016) Origins of programmable nucleases for genome engineering. J Mol Biol 428: 963-989. https://doi.org/10.1016/j.jmb.2015.10.014
    [2] Fagerlund RD, Staals RHJ, Fineran PC (2015) The Cpf1 CRISPR-Cas protein expands genome-editing tools. Genome Biol 16: 251. https://doi.org/10.1186/s13059-015-0824-9
    [3] Sternberg SH, Doudna JA (2015) Expanding the biologist's toolkit with CRISPR-Cas9. Mol Cell 58: 568-574. https://doi.org/10.1016/j.molcel.2015.02.032
    [4] Barrangou R, Doudna JA (2016) Applications of CRISPR technologies in research and beyond. Nat Biotechnol 34: 933-941. https://doi.org/10.1038/nbt.3659
    [5] Zheng Y, Li J, Wang B, et al. (2020) Endogenous type I CRISPR-Cas: From foreign DNA defense to prokaryotic engineering. Front Bioeng Biotechnol 8: 62. https://doi.org/10.3389/fbioe.2020.00062
    [6] Marraffini LA, Sontheimer EJ (2008) CRISPR interference limits horizontal gene transfer in Staphylococci by targeting DNA. Science 322: 1843-1845. https://doi:10.1126/science.1165771
    [7] Barrangou R, Fremaux C, Deveau H, et al. (2007) CRISPR provides acquired resistance against viruses in prokaryotes. Science 315: 1709-1712. https://doi:10.1126/science.1138140
    [8] Nussenzweig PM, Marraffini LA (2020) Molecular mechanisms of CRISPR-Cas immunity in bacteria. Annu Rev Genet 54: 93-120. https://doi.org/10.1146/annurev-genet-022120-112523
    [9] Amitai G, Sorek R (2016) CRISPR-Cas adaptation: insights into the mechanism of action. Nat Rev Microbiol 14: 67-76. https://doi.org/10.1038/nrmicro.2015.14
    [10] Carte J, Wang R, Li H, et al. (2008) Cas6 is an endoribonuclease that generates guide RNAs for invader defense in prokaryotes. Genes Dev 22: 3489-3496. https://doi.org/10.1101/gad.1742908
    [11] Deltcheva E, Chylinski K, Sharma CM, et al. (2011) CRISPR RNA maturation by trans-encoded small RNA and host factor RNase III. Nature 471: 602-607. https://doi:10.1038/nature09886
    [12] Jore MM, Lundgren M, van Duijn E, et al. (2011) Structural basis for CRISPR RNA-guided DNA recognition by Cascade. Nat Struct Mol Bio 18: 529-536. https://doi.org/10.1038/nsmb.2019
    [13] Leenay RT, Beisel CL (2017) Deciphering, communicating, and engineering the CRISPR PAM. J Mol Biol 429: 177-191. https://doi.org/10.1016/j.jmb.2016.11.024
    [14] van der Oost J, Jore MM, Westra ER, et al. (2009) CRISPR-based adaptive and heritable immunity in prokaryotes. Trends Biochem Sci 34: 401-407. https://doi.org/10.1016/j.tibs.2009.05.002
    [15] Gasiunas G, Barrangou R, Horvath P, et al. (2012) Cas9-crRNA ribonucleoprotein complex mediates specific DNA cleavage for adaptive immunity in bacteria. Proc Natl Acad Sci U S A 109: E2579-E2586. https://doi.org/10.1073/pnas.1208507109
    [16] Westra ER, van Erp PBG, Künne T, et al. (2012) CRISPR immunity relies on the consecutive binding and degradation of negatively supercoiled invader dna by Cascade and Cas3. Mol Cell 46: 595-605. https://doi.org/10.1016/j.molcel.2012.03.018
    [17] Makarova KS, Wolf YI, Iranzo J, et al. (2020) Evolutionary classification of CRISPR-Cas systems: a burst of class 2 and derived variants. Nat Rev Microbiol 18: 67-83. https://doi.org/10.1038/s41579-019-0299-x
    [18] Makarova KS, Aravind L, Wolf YI, et al. (2011) Unification of Cas protein families and a simple scenario for the origin and evolution of CRISPR-Cas systems. Biol Direct 6: 38. https://doi.org/10.1186/1745-6150-6-38
    [19] Makarova KS, Wolf YI, Alkhnbashi OS, et al. (2015) An updated evolutionary classification of CRISPR-Cas systems. Nat Rev Microbiol 13: 722-736. https://doi.org/10.1038/nrmicro3569
    [20] Makarova KS, Wolf YI, Koonin EV (2018) Classification and nomenclature of CRISPR-Cas systems: Where from here?. CRISPR J 1: 325-336. https://doi.org/10.1089/crispr.2018.0033
    [21] Koonin EV, Makarova KS, Zhang F (2017) Diversity, classification and evolution of CRISPR-Cas systems. Curr Opin Microbiol 37: 67-78. https://doi.org/10.1016/j.mib.2017.05.008
    [22] Liu Z, Dong H, Cui Y, et al. (2020) Application of different types of CRISPR/Cas-based systems in bacteria. Microb Cell Factories 19: 172. https://doi.org/10.1186/s12934-020-01431-z
    [23] Wang Y, Huang C, Zhao W (2022) Recent advances of the biological and biomedical applications of CRISPR/Cas systems. Mol Biol Rep 49: 7087-7100. https://doi.org/10.1007/s11033-022-07519-6
    [24] Mustafa MI, Makhawi AM (2021) SHERLOCK and DETECTR: CRISPR-Cas Systems as potential rapid diagnostic tools for emerging infectious diseases. J Clin Microbiol 59: e00745-00720. https://doi.org/10.1128/jcm.00745-20
    [25] Hidalgo-Cantabrana C, Barrangou R (2020) Characterization and applications of Type I CRISPR-Cas systems. Biochem Soc Trans 48: 15-23. https://doi.org/10.1042/BST20190119
    [26] Huo Y, Nam KH, Ding F, et al. (2014) Structures of CRISPR Cas3 offer mechanistic insights into Cascade-activated DNA unwinding and degradation. Nat Struct Mol Biol 21: 771-777. https://doi.org/10.1038/nsmb.2875
    [27] Brouns SJJ, Jore MM, Lundgren M, et al. (2008) Small CRISPR RNAs guide antiviral defense in prokaryotes. Science 321: 960-964. https://doi:10.1126/science.1159689
    [28] Sinkunas T, Gasiunas G, Fremaux C, et al. (2011) Cas3 is a single-stranded DNA nuclease and ATP-dependent helicase in the CRISPR/Cas immune system. EMBO J 30: 1335-1342. https://doi.org/10.1038/emboj.2011.41
    [29] Bhatia S, Pooja, Yadav SK (2023) CRISPR-Cas for genome editing: Classification, mechanism, designing and applications. Int J Biol Macromol 238: 124054. https://doi.org/10.1016/j.ijbiomac.2023.124054
    [30] Li H (2015) Structural principles of CRISPR RNA processing. Structure 23: 13-20. https://doi.org/10.1016/j.str.2014.09.006
    [31] Wang R, Preamplume G, Terns MP, et al. (2011) Interaction of the Cas6 Riboendonuclease with CRISPR RNAs: recognition and cleavage. Structure 19: 257-264. https://doi.org/10.1016/j.str.2010.11.014
    [32] Xiao Y, Luo M, Dolan AE, et al. (2018) Structure basis for RNA-guided DNA degradation by Cascade and Cas3. Science 361: eaat0839. https://doi:10.1126/science.aat0839
    [33] Xiao Y, Luo M, Hayes RP, et al. (2017) Structure basis for directional r-loop formation and substrate handover mechanisms in type I CRISPR-Cas system. Cell 170: 48-60.e11. https://doi.org/10.1016/j.cell.2017.06.012
    [34] Semenova E, Jore MM, Datsenko KA, et al. (2011) Interference by clustered regularly interspaced short palindromic repeat (CRISPR) RNA is governed by a seed sequence. Proc Natl Acad Sci U.S.A 108: 10098-10103. https://doi.org/10.1073/pnas.1104144108
    [35] Almendros C, Nobrega FL, McKenzie RE, et al. (2019) Cas4-Cas1 fusions drive efficient PAM selection and control CRISPR adaptation. Nucleic Acids Res 47: 5223-5230. https://doi.org/10.1093/nar/gkz217
    [36] Shangguan Q, Graham S, Sundaramoorthy R, et al. (2022) Structure and mechanism of the type I-G CRISPR effector. Nucleic Acids Res 50: 11214-11228. https://doi.org/10.1093/nar/gkac925
    [37] Peters JE, Makarova KS, Shmakov S, et al. (2017) Recruitment of CRISPR-Cas systems by Tn7-like transposons. Proc Natl Acad Sci U.S.A 114: E7358-E7366. https://doi.org/10.1073/pnas.1709035114
    [38] Faure G, Shmakov SA, Yan WX, et al. (2019) CRISPR-Cas in mobile genetic elements: counter-defence and beyond. Nat Rev Microbiol 17: 513-525. https://doi.org/10.1038/s41579-019-0204-7
    [39] Hsieh SC, Peters JE (2023) Discovery and characterization of novel type I-D CRISPR-guided transposons identified among diverse Tn7-like elements in cyanobacteria. Nucleic Acids Res 51: 765-782. https://doi.org/10.1093/nar/gkac1216
    [40] Li Y, Peng N (2019) Endogenous CRISPR-Cas system-based genome editing and antimicrobials: review and prospects. Front Microbiol 10: 2471. https://doi.org/10.3389/fmicb.2019.02471
    [41] Cameron P, Coons MM, Klompe SE, et al. (2019) Harnessing type I CRISPR-Cas systems for genome engineering in human cells. Nat Biotechnol 37: 1471-1477. https://doi.org/10.1038/s41587-019-0310-0
    [42] Osakabe K, Wada N, Miyaji T, et al. (2020) Genome editing in plants using CRISPR type I-D nuclease. Commun Biol 3: 648. https://doi.org/10.1038/s42003-020-01366-6
    [43] Tan R, Krueger RK, Gramelspacher MJ, et al. (2022) Cas11 enables genome engineering in human cells with compact CRISPR-Cas3 systems. Mol Cell 82: 852-867. https://doi.org/10.1016/j.molcel.2021.12.032
    [44] Yoshimi K, Mashimo T (2022) Genome editing technology and applications with the type I CRISPR system. Gene and Genome Editing 3-4: 100013. https://doi.org/10.1016/j.ggedit.2022.100013
    [45] Osakabe K, Wada N, Murakami E, et al. (2021) Genome editing in mammalian cells using the CRISPR type I-D nuclease. Nucleic Acids Res 49: 6347-6363. https://doi.org/10.1093/nar/gkab348
    [46] Xu Z, Li Y, Li M, et al. (2021) Harnessing the type I CRISPR-Cas systems for genome editing in prokaryotes. Environ Microbiol 23: 542-558. https://doi.org/10.1111/1462-2920.15116
    [47] Hidalgo-Cantabrana C, Goh YJ, Barrangou, R (2019) Characterization and repurposing of type I and Type II CRISPR-Cas systems in bacteria. J Mol Biol 431: 21-33. https://doi.org/10.1016/j.jmb.2018.09.013
    [48] Hidalgo-Cantabrana C, Crawley AB, Sanchez B, et al. (2017) Characterization and exploitation of CRISPR Loci in Bifidobacterium longum. Front Microbiol 8: 1851. https://doi.org/10.3389/fmicb.2017.01851
    [49] Hidalgo-Cantabrana C, Goh YJ, Pan M, et al. (2019) Genome editing using the endogenous type I CRISPR-Cas system in Lactobacillus crispatus. Proc Natl Acad Sci U S A 116: 15774-15783. https://doi.org/10.1073/pnas.1905421116
    [50] Xu Z, Li Y, Yan A (2020) Repurposing the native type I-F CRISPR-Cas system in Pseudomonas aeruginosa for genome editing. STAR Protocols 1: 100039. https://doi.org/10.1016/j.xpro.2020.100039
    [51] Li Y, Pan S, Zhang Y, et al. (2016) Harnessing type I and type III CRISPR-Cas systems for genome editing. Nucleic Acids Res 44: e34. https://doi.org/10.1093/nar/gkv1044
    [52] Atmadjaja AN, Holby V, Harding AJ, et al. (2019) CRISPR-Cas, a highly effective tool for genome editing in Clostridium saccharoperbutylacetonicum N1-4(HMT). FEMS Microbiol Lett 366: fnz059. https://doi.org/10.1093/femsle/fnz059
    [53] Baker PL, Orf GS, Kevershan K, et al. (2019) Using the endogenous CRISPR-Cas system of Heliobacterium modesticaldum to delete the photochemical reaction center core subunit gene. Appl Environ Microbiol 85: e01644-01619. https://doi.org/10.1128/AEM.01644-19
    [54] Papoutsakis ET (2008) Engineering solventogenic clostridia. Curr Opin Biotechnol 19: 420-429. https://doi.org/10.1016/j.copbio.2008.08.003
    [55] McAllister KN, Sorg JA (2019) CRISPR Genome editing systems in the genus Clostridium: a timely advancement. J Bacteriol 201: e00219-00219. https://doi.org/10.1128/jb.00219-19
    [56] Pyne ME, Bruder MR, Moo-Young M, et al. (2016) Harnessing heterologous and endogenous CRISPR-Cas machineries for efficient markerless genome editing in Clostridium. Sci Rep 6: 25666. https://doi.org/10.1038/srep25666
    [57] Johnson DT, Taconi KA (2007) The glycerin glut: Options for the value-added conversion of crude glycerol resulting from biodiesel production. Environmental Progress 26: 338-348. https://doi.org/10.1002/ep.10225
    [58] Tian L, Conway PM, Cervenka ND, et al. (2019) Metabolic engineering of Clostridium thermocellum for n-butanol production from cellulose. Biotechnol Biofuels 12: 186. https://doi.org/10.1186/s13068-019-1524-6
    [59] Oka K, Osaki T, Hanawa T, et al. (2018) Establishment of an endogenous Clostridium difficile rat infection model and evaluation of the effects of Clostridium butyricum MIYAIRI 588 probiotic strain. Front Microbiol 9: 1264. https://doi.org/10.3389/fmicb.2018.01264
    [60] Hagihara M, Yamashita R, Matsumoto A, et al. (2019) The impact of probiotic Clostridium butyricum MIYAIRI 588 on murine gut metabolic alterations. J Infect Chemother 25: 571-577. https://doi.org/10.1016/j.jiac.2019.02.008
    [61] Walker JE, Lanahan AA, Zheng T, et al. (2020) Development of both type I-B and type II CRISPR/Cas genome editing systems in the cellulolytic bacterium Clostridium thermocellum. Metab Eng Commun 10: e00116. https://doi.org/10.1016/j.mec.2019.e00116
    [62] Zhou X, Wang X, Luo H, et al. (2021) Exploiting heterologous and endogenous CRISPR-Cas systems for genome editing in the probiotic Clostridium butyricum. Biotechnol Bioeng 118: 2448-2459. https://doi.org/10.1002/bit.27753
    [63] Zhang J, Zong W, Hong W, et al. (2018) Exploiting endogenous CRISPR-Cas system for multiplex genome editing in Clostridium tyrobutyricum and engineer the strain for high-level butanol production. Metab Eng 47: 49-59. https://doi.org/10.1016/j.ymben.2018.03.007
    [64] Maikova A, Kreis V, Boutserin A, et al. (2019) Using an endogenous CRISPR-Cas System for genome editing in the human pathogen Clostridium difficile. Appl Environ Microbiol 85: e01416-01419. https://doi.org/10.1128/AEM.01416-19
    [65] Dai K, Fu H, Guo X, et al. (2022) Exploiting the Type I-B CRISPR genome editing system in Thermoanaerobacterium aotearoense SCUT27 and engineering the strain for enhanced ethanol production. Appl Environ Microbiol 88: e00751-00722. https://doi.org/10.1128/aem.00751-22
    [66] Du K, Gong L, Li M, et al. (2022) Reprogramming the endogenous type I CRISPR-Cas system for simultaneous gene regulation and editing in Haloarcula hispanica. mLife 1: 40-50. https://doi.org/10.1002/mlf2.12010
    [67] Cheng F, Gong L, Zhao D, et al. (2017) Harnessing the native type I-B CRISPR-Cas for genome editing in a polyploid archaeon. J Genet Genomics 44: 541-548. https://doi.org/10.1016/j.jgg.2017.09.010
    [68] Joshi JB, Arul L, Ramalingam J, et al. (2020) Advances in the Xoo-rice pathosystem interaction and its exploitation in disease management. J Biosci 45: 112. https://doi.org/10.1007/s12038–020-00085-8
    [69] Liu Q, Wang S, Long J, et al. (2021) Functional identification of the Xanthomonas oryzae pv. oryzae Type I-C CRISPR-Cas system and its potential in gene editing application. Front Microbiol 12: 686715. https://doi.org/10.3389/fmicb.2021.686715
    [70] Jiang D, Zhang D, Li S, et al. (2022) Highly efficient genome editing in Xanthomonas oryzae pv. oryzae through repurposing the endogenous type I-C CRISPR-Cas system. Mol Plant Pathol 23: 583-594. https://doi.org/10.1111/mpp.13178
    [71] Makarova KS, Wolf YI, Koonin EV (2013) The basic building blocks and evolution of CRISPR-Cas systems. Biochem Soc Trans 41: 1392-1400. https://doi.org/10.1042/BST20130038
    [72] McBride TM, Cameron SC, Fineran PC, et al. (2023) The biology and type I/III hybrid nature of type I-D CRISPR-Cas systems. Biochem J 480: 471-488. https://doi.org/10.1042/BCJ20220073
    [73] Manav MC, Van LB, Lin J, et al. (2020) Structural basis for inhibition of an archaeal CRISPR-Cas type I-D large subunit by an anti-CRISPR protein. Nat Commun 11: 5993. https://doi.org/10.1038/s41467-020-19847-x
    [74] Bost J, Recalde A, Waßmer B, et al. (2023) Application of the endogenous CRISPR-Cas type I-D system for genetic engineering in the thermoacidophilic archaeon Sulfolobus acidocaldarius. Front Microbiol 14. https://doi.org/10.3389/fmicb.2023.1254891
    [75] Wei S, Morrison M, Yu Z (2013) Bacterial census of poultry intestinal microbiome. Poult Sci 92: 671-683. https://doi.org/10.3382/ps.2012-02822
    [76] Ravel J, Gajer P, Abdo Z, et al. (2011) Vaginal microbiome of reproductive-age women. Proc Natl Acad Sci U S A 108: 4680-4687. https://doi.org/10.1073/pnas.1002611107
    [77] Vercoe RB, Chang JT, Dy RL, et al. (2013) Cytotoxic chromosomal targeting by CRISPR/Cas systems can reshape bacterial genomes and expel or remodel pathogenicity islands. PLoS Genet 9: e1003454. https://doi.org/10.1371/journal.pgen.1003454
    [78] Hampton HG, McNeil MB, Paterson TJ, et al. (2016) CRISPR-Cas gene-editing reveals RsmA and RsmC act through FlhDC to repress the SdhE flavinylation factor and control motility and prodigiosin production in Serratia. Microbiology 162: 1047-1058. https://doi.org/10.1099/mic.0.000283
    [79] Xu Z, Li M, Li Y, et al. (2019) Native CRISPR-Cas-Mediated genome editing enables dissecting and sensitizing clinical multidrug-resistant P. aeruginosa. Cell Rep 29: 1707-1717.e1703. https://doi.org/10.1016/j.celrep.2019.10.006
    [80] Zheng Y, Han J, Wang B, et al. (2019) Characterization and repurposing of the endogenous Type I-F CRISPR-Cas system of Zymomonas mobilis for genome engineering. Nucleic Acids Res 47: 11461-11475. https://doi.org/10.1093/nar/gkz940
    [81] Hao Y, Wang Q, Li J, et al. (2022) Double nicking by RNA-directed Cascade-nCas3 for high-efficiency large-scale genome engineering. Open Biol 12: 210241. https://doi.org/10.1098/rsob.210241
    [82] Pan M, Morovic W, Hidalgo-Cantabrana C, et al. (2022) Genomic and epigenetic landscapes drive CRISPR-based genome editing in Bifidobacterium. Proc Natl Acad Sci U S A 119: e2205068119. https://doi.org/10.1073/pnas.2205068119
    [83] Marino ND, Zhang JY, Borges AL, et al. (2018) Discovery of widespread type I and type V CRISPR-Cas inhibitors. Science 362: 240-242. https://doi: 10.1126/science.aau5174
    [84] Csörgő B, León LM, Chau-Ly IJ, et al. (2020) A compact Cascade-Cas3 system for targeted genome engineering. Nat Methods 17: 1183-1190. https://doi.org/10.1038/s41592-020-00980-w
    [85] Xu Z, Li Y, Cao H, et al. (2021) A transferrable and integrative type I-F Cascade for heterologous genome editing and transcription modulation. Nucleic Acids Res 49: e94. https://doi.org/10.1093/nar/gkab521
    [86] Klompe SE, Vo PLH, Halpin-Healy TS, et al. (2019) Transposon-encoded CRISPR–Cas systems direct RNA-guided DNA integration. Nature 571: 219-225. https://doi.org/10.1038/s41586-019-1323-z
    [87] Halpin-Healy TS, Klompe SE, Sternberg SH, et al. (2020) Structural basis of DNA targeting by a transposon-encoded CRISPR-Cas system. Nature 577: 271-274. https://doi.org/10.1038/s41586-019-1849-0
    [88] Vo PLH, Ronda C, Klompe SE, et al. (2021) CRISPR RNA-guided integrases for high-efficiency, multiplexed bacterial genome engineering. Nat Biotechnol 39: 480-489. https://doi.org/10.1038/s41587-020-00745-y
    [89] Roberts A, Nethery MA, Barrangou R (2022) Functional characterization of diverse type I-F CRISPR-associated transposons. Nucleic Acids Res 50: 11670-11681. https://doi.org/10.1093/nar/gkac985
    [90] Rubin BE, Diamond S, Cress BF, et al. (2022) Species- and site-specific genome editing in complex bacterial communities. Nat Microbiol 7: 34-47. https://doi.org/10.1038/s41564-021-01014-7
    [91] Shangguan Q, White MF (2023) Repurposing the atypical type I-G CRISPR system for bacterial genome engineering. Microbiology 169. https://doi.org/10.1099/mic.0.001373
    [92] Qi LS, Larson MH, Gilbert LA, et al. (2013) Repurposing CRISPR as an rna-guided platform for sequence-specific control of gene expression. Cell 152: 1173-1183. https://doi.org/10.1016/j.cell.2013.02.022
    [93] Bikard D, Jiang W, Samai P, et al. (2013) Programmable repression and activation of bacterial gene expression using an engineered CRISPR-Cas system. Nucleic Acids Res 41: 7429-7437. https://doi.org/10.1093/nar/gkt520
    [94] Wang J, Teng Y, Zhang R, et al. (2021) Engineering a PAM-flexible SpdCas9 variant as a universal gene repressor. Nat Commun 12: 6916. https://doi.org/10.1038/s41467-021-27290-9
    [95] Luo ML, Mullis AS, Leenay RT, et al. (2015) Repurposing endogenous type I CRISPR-Cas systems for programmable gene repression. Nucleic Acids Res 43: 674-681. https://doi.org/10.1093/nar/gku971
    [96] Rath D, Amlinger L, Hoekzema M, et al. (2015) Efficient programmable gene silencing by Cascade. Nucleic Acids Res 43: 237-246. https://doi.org/10.1093/nar/gku1257
    [97] Chang Y, Su T, Qi Q, et al. (2016) Easy regulation of metabolic flux in Escherichia coli using an endogenous type I-E CRISPR-Cas system. Microb Cell Factories 15: 195. https://doi.org/10.1186/s12934-016-0594-4
    [98] Tarasava K, Liu R, Garst A, et al. (2018) Combinatorial pathway engineering using type I-E CRISPR interference. Biotechnol Bioeng 115: 1878-1883. https://doi.org/10.1002/bit.26589
    [99] Qin Z, Yang Y, Yu S, et al. (2021) Repurposing the endogenous type I-E CRISPR/Cas system for gene repression in Gluconobacter oxydans WSH-003. ACS Synth Biol 10: 84-93. https://pubs.acs.org/doi/10.1021/acssynbio.0c00456
    [100] Stachler AE, Schwarz TS, Schreiber S, et al. (2020) CRISPRi as an efficient tool for gene repression in archaea. Methods 172: 76-85. https://doi.org/10.1016/j.ymeth.2019.05.023
    [101] Maier LK, Stachler AE, Saunders SJ, et al. (2015) An active immune defense with a minimal crispr (clustered regularly interspaced short palindromic repeats) RNA and without the Cas6 protein. J Biol Chem 290: 4192-4201. https://doi.org/10.1074/jbc.M114.617506
    [102] Stachler AE, Marchfelder A (2016) Gene repression in haloarchaea using the CRISPR (clustered regularly interspaced short palindromic repeats)-Cas I-B system. J Biol Chem 291: 15226-15242. https://doi.org/10.1074/jbc.M116.724062
    [103] Chen Y, Cheng M, Song H, et al. (2022) Type I-F CRISPR-PAIR platform for multi-mode regulation to boost extracellular electron transfer in Shewanella oneidensis. iScience 25. https://doi:10.1016/j.isci.2022.104491
    [104] Marino ND, Pinilla-Redondo R, Csörgő B, et al. (2020) Anti-CRISPR protein applications: natural brakes for CRISPR-Cas technologies. Nat Methods 17: 471-479. https://doi.org/10.1038/s41592-020-0771-6
    [105] Davidson AR, Lu WT, Stanley SY, et al. (2020) Anti-CRISPRs: Protein inhibitors of CRISPR-Cas systems. Annu Rev Biochem 89: 309-332. https://doi.org/10.1146/annurev-biochem-011420-111224
    [106] Pawluk A, Shah M, Mejdani M, et al. (2017) Disabling a Type I-E CRISPR-Cas nuclease with a bacteriophage-encoded anti-crispr protein. mBio 8: 01751-01717. https://doi.org/10.1128/mbio.01751-18
    [107] Ren J, Wang H, Yang L, et al. (2022) Structural and mechanistic insights into the inhibition of type I-F CRISPR-Cas system by anti-CRISPR protein AcrIF23. J Biol Chem 298. https://doi.org/10.1016/j.jbc.2022.102124
    [108] Rollins MF, Chowdhury S, Carter J, et al. (2019) Structure reveals a mechanism of crispr-rna-guided nuclease recruitment and anti-crispr viral mimicry. Mol Cell 74: 132-142. https://doi.org/10.1016/j.molcel.2019.02.001
    [109] Chen S, Cao H, Xu Z, et al. (2023) A type I-F CRISPRi system unveils the novel role of CzcR in modulating multidrug resistance of Pseudomonas aeruginosa. Microbiol Spectr 11: e0112323. https://doi.org/10.1128/spectrum.01123-23
    [110] Li M, Gong L, Cheng F, et al. (2021) Toxin-antitoxin RNA pairs safeguard CRISPR-Cas systems. Science 372: eabe5601. https://doi:10.1126/science.abe5601
    [111] Cooper LA, Stringer AM, Wade JT (2018) Determining the specificity of cascade binding, interference, and primed adaptation in vivo in the Escherichia coli type I-E CRISPR-Cas system. mBio 9: 02100-02117. https://doi.org/10.1128/mbio.02100-18
  • This article has been cited by:

    1. Muhammad Akram, Rabia Bibi, Multi-criteria group decision-making based on an integrated PROMETHEE approach with 2-tuple linguistic Fermatean fuzzy sets, 2023, 2364-4966, 10.1007/s41066-022-00359-6
    2. Tatiane Roldão Bastos, André Andrade Longaray, Catia Maria dos Santos Machado, Leonardo Ensslin, Sandra Rolim Ensslin, Ademar Dutra, Fuzzy-MACBETH Hybrid Method: Mathematical Treatment of a Qualitative Scale Using the Fuzzy Theory, 2023, 16, 1875-6883, 10.1007/s44196-023-00195-9
    3. Yuqi Zang, Yue Sun, Yating Wen, Junling Miao, Fractional Orthotriple Fuzzy Dombi Power Partitioned Muirhead Mean Operators and Their Application for Evaluating the Government Information Disclosure on Public Health Emergencies, 2023, 11, 2079-8954, 451, 10.3390/systems11090451
    4. Muhammad Akram, Maheen Sultan, Arooj Adeel, Mohammed M. Ali Al-Shamiri, Pythagorean fuzzy N-Soft PROMETHEE approach: A new framework for group decision making, 2023, 8, 2473-6988, 17354, 10.3934/math.2023887
    5. Jafar Torkzadeh, Sadegh Niroomand, Sundas Shahzadi, Tofigh Allahviranloo, Mohammadreza Shahriari, An interval-valued Pythagorean fuzzy group AHP-PROMETHEE approach for organizational behavior assessment and ranking in higher education of Iran considering environmental criteria, 2023, 1432-7643, 10.1007/s00500-023-09432-x
    6. Huy-Anh Bui, Xuan-Thuan Nguyen, A novel multicriteria decision-making process for selecting spot welding robot with removal effects of criteria techniques, 2024, 18, 1955-2513, 1033, 10.1007/s12008-023-01650-9
    7. Muhammad Akram, Maheen Sultan, Muhammet Deveci, An integrated multi-polar fuzzy N-soft preference ranking organization method for enrichment of evaluations of the digitization of global economy, 2024, 57, 1573-7462, 10.1007/s10462-023-10693-z
    8. Jakub Więckowski, Wojciech Sałabun, Version [1.1] - [MakeDecision: Online system for the graphical design of decision-making models in crisp and fuzzy environments], 2025, 30, 23527110, 102084, 10.1016/j.softx.2025.102084
  • Reader Comments
  • © 2023 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(2508) PDF downloads(150) Cited by(4)

Figures and Tables

Figures(4)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog