Next Article in Journal
Global Stabilization of a Reaction Wheel Pendulum: A Discrete-Inverse Optimal Formulation Approach via A Control Lyapunov Function
Next Article in Special Issue
A Distinctive Symmetric Analyzation of Improving Air Quality Using Multi-Criteria Decision Making Method under Uncertainty Conditions
Previous Article in Journal
Detecting Optimal Leak Locations Using Homotopy Analysis Method for Isothermal Hydrogen-Natural Gas Mixture in an Inclined Pipeline
Previous Article in Special Issue
On Application Oriented Fuzzy Numbers for Imprecise Investment Recommendations
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Hesitant Fuzzy Sets Based Symmetrical Model of Decision-Making for Estimating the Durability of Web Application

1
Department of Computer Science, Dr. Shakuntala Misra National Rehabilitation University, Lucknow 226017, Uttar Pradesh, India
2
Computer Engineering Department, College of Computer and Information Systems, Umm Al-Qura University, Makkah 21955, Saudi Arabia
3
Department of Information Technology, Babasaheb Bhimrao Ambedkar University, Lucknow 226025, Uttar Pradesh, India
4
Department of Computer Application, Shri Ramswaroop Memorial University, Lucknow-Deva Road, Barabanki 225003, Uttar Pradesh, India
*
Author to whom correspondence should be addressed.
Symmetry 2020, 12(11), 1770; https://doi.org/10.3390/sym12111770
Submission received: 24 September 2020 / Revised: 16 October 2020 / Accepted: 21 October 2020 / Published: 26 October 2020

Abstract

:
The development of web applications essentially relies on users’ demands who expect highly efficacious but cost effective software services. Managing time and cost so as to develop web applications that cater to the users’ need is a challenge for developers at present. Moreover, low-cost maintenance can only be achieved by enhancing the durability of the web applications. Identifying characteristics of durability is a complex task because the different experts have different opinions regarding the significance of characteristics that determine durability quotient of the web applications. As established by the best practices undertaken in this context, some experts consider quality to be the most important factor for determining durability. Therefore, the present study enlists multi-criteria decision-based symmetrical technique to address the multi-vector option availability for the apt selection of the characteristics for durability. Furthermore, it has also been identified that a numerical assessment of web applications’ durability can affect the service life and low-cost management in web applications. In this context, to achieve high durability and longevity in web applications, this paper attempts to illustrate and perform a numerical evaluation of durability characteristics. By understanding the various characteristics and their significance towards durability, the paper finds that the hesitant fuzzy-based symmetrical technique of the Analytic Hierarchy Process (AHP) and Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) is an effective methodology for evaluating web applications’ durability. For evaluating the quality of the results and establishing their sensitivity, the authors have assessed the outcomes on six different projects of the University. Additionally, results assessed and discussed in this paper would be a conclusive reference for the developers in their attempts to develop highly durable and manageable web applications.

1. Introduction

The exponential increase in the use of web applications can be witnessed in almost every field today. However, the ubiquitous use of web applications has also jeopardized the security of users’ information. Constant threats of cyber assaults and instances of data theft have become a major concern for the web application developers and the security practitioners. Nowadays, it is easy to build and use the web application, but difficult to maintain its security [1]. Step-by-step evolution of web application is a time consuming process that demands high cost and complex architecture. Hence, web application designers need to produce highly effective as well as durable web applications. Durability of the web applications is now deemed as the foremost priority and has become a major challenge for the developers.
The present day designers are focusing more on the meticulous evaluation of reliability (a sub-factor of durability) so as to strengthen the durability quotient of the web applications [1,2]. Producing durable web applications is not a one-day concept; it is a long term procedure that involves design phase characteristics to application-level abilities. A critical survey for software management, done in this league, cites that 73% of the companies are updating their digital infrastructures by 2020 [2]. Cisco’s Global Cloud Index has also discussed this issue with specific reference to the time period from 2013 to 2018 [3]. The survey states that the methodology of Software as a Service (SaaS) is going to provide and apply cloud-based work procedures by the next 5 years. Furthermore, the survey tells that revising and upgrading the life span of web applications has become the core focus of the organizations in 2020 [4]. Hence, it is evident that the users are demanding durable as well as efficient web applications. Web application’s durability as a concept for development was first introduced in 2013 [5]. As propositioned in the stated study, durability of web applications is a path to achieve and provide long-lasting as well as user centric web applications in service. Hence, web application’s life is a crucial element in web application development and after deployment also.
R. Kumar’s study on the concept of durability suggests that the durability of web applications has some significant characteristics or characteristics like trustworthiness, dependability, human-trust, and usability [6]. But integrating web application and durability concept in one plot gives an additional service life to web applications. In the context of the proposed study, the authors have undertaken a quantitative assessment of durability of web applications based on the characteristics that determine durability. It is also proved that quality and durability characteristics effectively contribute to implementing a web application durability assessment [7]. However, evaluation, which is compiled by using more than one decisions makers is more effective; therefore, the durability of a web application can be more effectively achieved through the Multiple Criteria Decision Making (MCDM) methodology [8,9].
There are several MCDM approaches for solving decision-related problems [9]. For the proposed article, the authors have applied the Hesitant fuzzy-based Analytic Hierarchy Process (AHP) and Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) [7,8]. Both AHP and TOPSIS are popular MCDM approaches for finding precise solutions among various alternatives and attributes. The nature of attributes involved in estimation of durability of web application requires a hierarchy based MCDM method, which is AHP. Furthermore for determining the best alternative among several others, TOPSIS proves to be a good MCDM method. Various researchers have used this hybrid approach for decision making related problems [9,10]. However, AHP is the most widely adopted and deployed MCDM technique and is known to produce more accurate results [11]. The hierarchy model for estimation is applied in AHP, and the networked model is applied in Analytic Network Process (ANP) for estimation in decision making. Moreover, both techniques acquire pair-wise comparison matrix data and rank the alternatives for result testing. AHP gives the complimentary advantage through which every attribute of the discussed hierarchy is independent in itself and the same is applied in alternatives. On the contrary, as is evident in real time scenarios, the characteristics and alternatives are mutually dependent on each other [12].
The MCDM technique of hesitant fuzzy AHP-TOPSIS was adopted by Bijoyeta Roy et al. for web application project selection [13]. This technique helped in selecting the best available options, priority-wise, from the host of project decisions and alternative ranks. Madjit Tavana et al. also adopted hesitant fuzzy AHP-TOPSIS for estimating a single characteristic such as community for the willingness of e-governance [14]. Baozhu Li et al. estimated the computer security characteristics by the hesitant fuzzy AHP technique [15]. Thus, a perusal of previous literature studies in this context establishes the accuracy of the hesitant fuzzy-based symmetrical AHP-TOPSIS technique for critical criteria estimation. To obtain a more conclusive analysis in our study, we have also undertaken the estimation of durability characteristics by employing hesitant fuzzy AHP-TOPSIS. The main impacts of this research work are as:
  • Estimate web application durability that will deliver rules and strategies for development of durable web application.
  • Hesitant fuzzy sets based AHP-TOPSIS technique is adopted to evaluate the durability of web application. Hesitant fuzzy sets based AHP technique and hesitant fuzzy sets based TOPSIS technique are well known and popular during solving multi-criteria decision making related problems and provide precise and efficient results.
  • The set of characteristics of durability used in this research work to assess durability of web application through unified approach of hesitant fuzzy based AHP and TOPSIS is unique.
  • Six different versions of an institutional web application are taken as alternatives to evaluate the real time impact and validate the results.
  • This study’s empirical initiative aims at providing insights about determining how formal and well-proven durability characteristics are followed throughout the development life cycle of web application.
The rest of the work is divided into the following segments: Section 2 discusses Materials and Methods and includes durability characteristics of web application and hesitant fuzzy sets based AHP-TOPSIS methodology; Section 3 provides numerical analysis and results, sensitivity analysis, and contains comparison through different methods; and Section 4 gives the conclusion of this research work.

2. Materials and Methods

2.1. Durability of Web Application

Durability of the web application improves the quality of web applications effectively [16]. In fact, the quality of web application has always been dependent on its durability, i.e., a durable web application is considered to be a highly effective and useful web application. However, achieving the best quality standards and ensuring optimum durability of the web application is not a one step process and requires periodic initiatives. Managing durability is a task of maintaining reusability of web application from time to time [17].
The service life for a software or web application is always a key characteristic of its functionality and quality. Despite this, as observed by experts, durability is still not the core concern during the development phases of the web applications as the focus is on optimizing the usability of the web applications. This creates a gap between durability and functionality of the web applications, and further decreases the service life of the web applications. Every customer needs a web application with long service life, and a gap in durability factor in development shelves the longevity of the web applications [5,6]. Moreover, the service life of any web application directly portrays the durability of its design and architecture.
The concept of relating maintenance and durability has been discussed by Khan et al. [8]. According to Cusick, serviceability of a web application is related to its durability, and the serviceability of web application can be enhanced further if the durability has been achieved to the desired level [18]. Durable web application is defined as user’s satisfaction and their demands fulfillment as well as its longevity during its use [5,7]. Thus, it is evident that instead of a normal web application, a durable web application is not only effective but also an attractive investment for the users. A web application’s durability is connected to longevity, and the web application’s progress is involved with its durability directly or indirectly and vice-versa.
Assuring web application’s durability requires a judicious selection of the attributes that determine durability. Some characteristics of durability have the ability and potential to effectively maintain and manage the web application. Many researchers believe that longevity is the same as durability in web application design [4,5,6,7,8,9]. Durability is an integral feature in security, defense, educational, and banking sector web applications. There are various characteristics and sub-characteristics of durability that significantly affect the quality of web application. We have identified these characteristics through a literature review of almost seven research papers [6,7,8,9,18,19,20]. These researches indicate that the chosen characteristics affect the durability of any software and web application, directly or indirectly [6,7,8,9,20]. Some of the key characteristics in this context are: Dependability [5,6], trustworthiness [6,7], human trust [5,7], usability [6,8], confidentiality [5,8], consumer integrity [8,9], reliability [5,9], maintainability [18], accountability [18,19], survivability [8,20], availability [18], accessibility [19], and user satisfaction [20]. The relationship between these characteristics has been shown in Figure 1.
Figure 1 shows that the quality of the web application can be enhanced by applying the durability factor in the development phase. In Figure 1, six alternatives have been taken for choosing the best alternative between two web applications. The two alternatives are real time web applications. One of these is the entrance exam based web application, and the second one is an online quiz competition based web application. Three different alternatives for both the web applications have been taken into this research for estimation of durability of web application.
Furthermore, in order to enhance the durability of a web application, it is important to identify and estimate the various sub-characteristics or characteristics of durability by an effective computational methodology. Assessment of durability factors include numerical categorization and evaluation of various quality characteristics that contribute towards web application’s service life. Characteristics of web application durability are defined as:
  • Dependability: The system is said to be dependable if a computer works as expected and the user is confident at the same time about its working. Describing the significance of this factor in durability is an effective way to construct web application. A web application’s durability factor is also inherited by dependability. It inherits the service life and working process of web application. On the other hand, by underlining the definition of dependability factor, it is clearly illustrated that the software service life span is important for user’s expectations. Hence, in these terms, the web application’s durability will be stronger with the help of dependable software. There are many dependability characteristics but web application durability affects only a few of them which are mentioned in Figure 1.
  • Trustworthiness: According to the defining terms of this factor, if web application can prevent, tackle and survive the condition of attacks, failure, and other harmful situations, then it will possess trustworthiness. Trustworthiness ensures that the software will perform as expected. There are many trustworthiness characteristics but web application durability affects only a few of them which are mentioned in Figure 1.
  • Human Trust: Trust in human to human operations is one of the most significant characteristics for long serviceability in web applications. In web application terms, human trust is identified as the consumer’s trust in the developer. The characteristics that strengthen each other are web application durability and human trust. There are many human trust characteristics but web application durability affects only a few of them which are mentioned in Figure 1.
  • Usability: If a web application interface is simple or easy to use, then it automatically means that is usable. Accessibility, availability, survivability, maintainability, and ultimately satisfaction are the five main enhancements that make for a usable web application, as per the end-users’ experience. Further, the characteristics that strengthen each other are web application durability and usability. There are many usability characteristics but web application durability affects only a few of them which are mentioned in Figure 1.
The tree of web application that has been shown in Figure 1 is further classified into two levels. One or more characteristics of the higher level are affected by the characteristics at another level. However, the effect of the characteristics is not always same for every level. For instance, dependability, human trust, and trustworthiness are impacted by reliability but the impact is not the same for all of them. The impacts of the same characteristics are differentiated with the help of a tree of characteristics among the other characteristics at a higher level. For achieving the longevity of the web applications during the development process, the practitioners need to understand and assess the web application’s durability. Web application durability is affected by the nine characteristics at level 2 which are defined below:
  • Confidentiality: It is an ability to manage and provide data only to the authorized users.
  • Consumer Integrity: Integrity is an ability of application that prevents and manages the originality of information within the web application.
  • Reliability: It is an ability that shows the performance consistency of application in a controlled condition for a specified time period.
  • Maintainability: Is the ability that defines rearrangements and patching in web applications for a specified course of work.
  • Accountability: Accountability assures the role and amenableness of every node or entity of users in web application.
  • Survivability: Is the ability of web application to fulfill its desired objective, whether it is in an attack situation or failure.
  • Availability: It assures the presence of information 24 × 7 in a web application for its authorized users.
  • Accessibility: Is the ability of web applications to control user information rights within the web application environment.
  • User Satisfaction: It assures customer satisfaction and demands in a web application by timely upgradation.
In a nutshell, these characteristics play a vital role in estimating web application’s durability, hence weightage of these characteristics in estimation of durability need to be known. Although it is a very critical process to identify, prioritize, and estimate characteristics, without it, the practitioners cannot achieve the target of a profitable and successful web application product. Moreover, web application durability plays a vital role in the optimization of maintenance issues. Essentially, understanding durability of web application is an ambiguous process due to its vast characteristics and area. Hence, experts’ opinions need to be collated for deciding on the most conversant attributes. Different experts might have varying views and to mitigate the uncertainties caused by multiple opinions, the present study has used the hesitant fuzzy methodology [6,7,8].

2.2. Methodology

Several real-world problems are sorted by MCDM solutions instead of classic real-time solutions. Durability of web applications perfectly suits this category. AHP is preferred over the other MCDM techniques because the computed solutions derived from AHP are precise and effective [7]. Sometimes during the process of decision making, the experts may need more specific values for reference. Such a scenario affects the calculated results even more strongly. To address this concern in the present analysis, the authors have used a hybrid technique associating hesitant fuzzy with the AHP technique for prioritizing. Furthermore, TOPSIS methodology has been used for testing the obtained results of web application’s durability. Moreover, the hesitant fuzzy technique is adopted by this paper to get more effective and precise results. If we look beyond the various available techniques of MCDM, TOPSIS methodology is the only one which gives an ideal solution path and effective results for testing [8]. To provide conclusive and ideal solution, TOPSIS methodology considers the positive as well as negative aspects at the same time, and then critically evaluates the numerical assessment.
At the point where the decision makers had to choose undefined value of numbers and numbers that were not involved in the assessment previously, the authors adopted the hesitant fuzzy set approach [6]. Hesitant fuzzy set concept was firstly proposed by Torra and Narukawa [21] and discussed and updated by Rodriguez et al. [22,23] in their further research. Thereafter, hesitant fuzzy sets have been adopted in various research pursuits in the recent years.
Wang et al. proposed a TOPSIS integrated methodology in cloud-based security architecture that produced efficient outcomes [11]. The adopted methodology for this paper has the ability to manage ambiguities and other issues of the AHP-TOPSIS methodology. Moreover, the model also validates its results by evaluating stock selection in paper. Similarly, Beg and Rashid also used the same methodology in their paper [24]. By critically analyzing the real time projects of a hospital, the authors corroborated the reliability of this approach. Moreover in the context of energy solution, Xia and Xu [25] also employed the stated methodology to produce convincing outcomes for their paper.
Hesitant Fuzzy-AHP (HF-AHP) methods have been enlisted in our study to estimate the priority of durability characteristics in web applications, and then by using HF-TOPSIS methodology, we have assessed their testing and effect on alternatives for similar characteristics. A step-by-step description of the methodology in brief is listed below:
Step 1: Hierarchy development of characteristics is the first step for methodology application.
Step 2: Examiners use linguistic terms in Table 1 to produce reliable and helpful evaluation criteria for the decision makers
Step 3: Adoption of fuzzy wrappers [21,22] from Equation (1) is the next step in methodology assessment.
O W A ( a 1 , a 2 , a n ) = j = 1 n W j b j
where OWA is denoted as ordered weighted averaging method, W is for weight of characteristics. Similarly, after applying Equation (1), examiners find the trapezoidal numbers C ˜ = ( a , b , c , d ) through Equations (2)–(5).
a = m i n { a L i ,   a M i , a M i + 1 ,   a M j , a R j } = a L i
d = m a x { a L i ,   a M i , a M i + 1 ,   a M j , a R j } = a R j
b = { a M i , i f   i + 1 = j O W A w 2 ( a m j , a m i + j 2 ) ,   i f   i + j   i s   e v e n O W A w 2 ( a m j ,   a m i + j + 1 2 ) ,   i f   i + j   i s   o d d }
  c = { a M i + 1 , i f i + 1 = j O W A w 2 ( a m j a m j 1 , a m ( i + j ) 2 )   ,   i f   i + j   i s   e v e n O W A w 2 ( a m j , a m j 1 a m ( i + j + 1 ) 2 ) ,   i f   i + j   i s   o d d }
After applying the Equations (3)–(5), the examiners determine the first and second type of weights η. This is a number that lies between [0, 1] and to achieve these numbers, the examiners apply Equations (6) and (7).
1st type weights ( W 1 = ( w 1 1 , w 2 1 , . . w n 1 ) ):
w 1 1 = η 2 ,   w 2 1 = η 2 ( 1 η 2 ) , . w n 1 η 2 ( 1 η 2 ) n 2
2nd type weights ( W 2 = ( w 1 2 , w 2 2 , . . w n 2 ) ) :
w 1 2 = η 1 n 1 ,   w 2 2 = ( 1 η 1 ) η 1 n 1
In the formula η 1 = g ( j 1 ) g 1 s, and η 2 = g ( j 1 ) g 1 the numerical form for highest rank number is g, and lowest and highest rank characteristics are shown by i and j, respectively.
Step 4: After analyzing the whole previous process to fulfill the remaining attributes of comparison matrix, Equations (8) and (9) are used by the examiners. Thereafter, for identifying the comparison matrix, examiners use Equation (10) to defuzzify the matrix.
A ˜ = [ 1 c ˜ 1 n c ˜ n 1 1 ]
c ˜ j i = ( 1 c i j u , 1 c i j m 2 , 1 c i j m 1 , 1 c i j 1 )
μ x = l + 2 m 1 + 2 m 2 + h 6
In the equation above (l,m1,m2,h) represents lower bound, upper middle bound, lower middle bound, and higher bound of the trapezoidal number. Defuzzification step gives precise values. To analyze the Consistency Ratio (CR) of these values, the examiners evaluate the CR by applying Formulas (11) and (12).
C I = γ m a x n n 1
C R = C I R I
where RI is random index defined in Saaty [26]
Step 6: In this step, the examiners evaluate the geometrical mean of the values through Formula (13).
r ˜ i = ( c ˜ i 1 c ˜ i 2 c ˜ i n ) 1 n
Step 7: Examiners assess the most significant criterion in the entire set by applying the formula of:
w ˜ i = r ˜ 1 ( r ˜ 1 r ˜ 2 . r ˜ n ) 1
Step 8: Examiners analyze the defuzzified values by (15).
μ x = l + 2 m 1 + 2 m 2 + h 6
Step 9: Examiners convert the defuzzified values into normalized values or weights by applying the Formula (16).
w ˜ i i j w ˜ j
After obtaining the priority list of durability characteristics through AHP methodology, the effectiveness of the drafted list of selected alternatives is estimated by the TOPSIS method. As a MADM technique, TOPSIS is more conclusive in suggesting the most preferred alternative for use. Lai et al. introduced the concept of TOPSIS methodology to the world and discussed it critically [27]. The present study uses the hesitant fuzzy AHP TOPSIS methodology to analyze and evaluate the web application’s durability [22,27]. TOPSIS approach associates and performs its computation on the distance between two linguistic values like H1s and H2s. The process has been elucidated below:
d ( H 1 s , H 2 s ) = | q * q | + | p * p |
Step 10: As starting process following terms are defined:
  • To define alternatives and criteria in TOPSIS, the following written formulas are applied as ( C = { C 1 ,   C 2 , . . C E } ) and n criteria ( C = { C 1 ,   C 2 , . . C n } )
  • e x Denotes the experts in TOPSIS, similarly, k is used to display numeric count of experts.
  • In TOPSIS methodology, the equation X ˜ l = [ H S i j l ] E × n is used to represent HF matrix.
  • To evaluate the criteria and effect of outcomes, the standards are written for TOPSIS are:
The standard for TOPSIS assessment lies in between very bad to highly good scale,
  • r 1 1 = between medium and good (bt M&G)
  • r 2 1 = at most medium (am M)
  • r 1 2 = at least good (al G)
  • r 2 2 = between very bad and medium (bt VB&M)
For HF matrix, the following formulas are used [6]:
  • e n v F (EGH (btM&G)) = T (0.3300, 0.5000, 0.6700, 0.8300)
  • e n v F (EGH (amM)) = T (0.0000, 0.0000, 0.3500, 0.6700)
  • e n v F (EGH (alG)) = T (0.5000, 0.8500, 1.0000, 1.0000)
  • e n v F (EGH (btVB&M)) = T (0.0000, 0.3000, 0.3700, 0.6700)
Step 11: The associated combined matrix is created by applying the following (18) formula:
T p i j = m i n { m i n i = 1 K ( m a x H t i j x ) , m a x i = 1 K ( m i n H t i j x ) } T q i j = m a x { m i n i = 1 K ( m a x H t i j x ) , m a x i = 1 K ( m i n H t i j x ) }
Step 12: αb in TOPSIS evaluation shows the effective factor where most effective factor is indicated by Aj, and αc illustrates the cost related preferences. Additionally, for cost related preferences, the lowest effective alternatives demand high accuracy. To describe and assess cost as well as effective characteristics, the following equations are employed:
V ˜ p j + = m a x i = 1 K ( m a x i ( m i n H S i j x ) ) j α b   and   m i n i = 1 K ( m i n i ( m i n H S i j x ) ) j α c
V ˜ q j + = m a x i = 1 K ( m a x i ( m i n H S i j x ) ) j α b   and   m i n i = 1 K ( m i n i ( m i n H S i j x ) ) j α c
V ˜ p j = m a x i = 1 K ( m a x i ( m i n H S i j x ) ) j α c   and   m i n i = 1 K ( m i n i ( m i n H S i j x ) ) j α b
V ˜ q j = m a x i = 1 K ( m a x i ( m i n H S i j x ) ) j α c   and   m i n i = 1 K ( m i n i ( m i n H S i j x ) ) j α b
Step 13: Examiners analyze the +ve and -ve idea aspects of TOPSIS by applying following Formulas (22) and (23),
D + = [ d ( x 11 , V ˜ 1 + ) + d ( x 12 , V ˜ 2 + ) + + d ( x 1 n , V ˜ n + ) d ( x 21 , V ˜ 1 + ) + d ( x 22 , V ˜ 2 + ) + + d ( x 21 , V ˜ n + ) d ( x m 1 , V ˜ 1 + ) + d ( x m 2 , V ˜ 1 + ) + + d ( x m n , V ˜ n + ) ]
D = [ d ( x 11 , V ˜ 1 ) + d ( x 12 , V ˜ 2 ) + + d ( x 1 n , V ˜ n ) d ( x 21 , V ˜ 1 ) + d ( x 22 , V ˜ 2 ) + + d ( x 21 , V ˜ n ) d ( x m 1 , V ˜ 1 ) + d ( x m 2 , V ˜ 1 ) + + d ( x m n , V ˜ n ) ]
Step 14: Examiners construct and evaluate the closeness for analyzed positive and negative aspects by (24),
C S ( A i ) = D i + D i + + D i , i = 1 , 2 , . m
where
D i + = j = 1 n d ( x i j , V j + )   and   D i = j = 1 n d ( x i j , V j )
Step 15: To conclude the process, the ranks are assigned and the tabular form of alternatives are based on their effectiveness evaluation.
A thoroughly detailed and analyzed numerical assessment of web application’s durability has been performed in further sections of this paper.

3. Data Analysis and Results

Durability is a vast and complex topic that demands numerical assessment for its effective implementation. Maintenance is the key concept for durable web applications. The current demand in web application development needs a strategic design which can meet the users’ satisfaction while ensuring low maintenance cost and high service life. Despite the efforts undertaken in this regard, a lot needs to be done to optimize durability of web applications. Several researchers are working on web application development with long service life and other characteristics [28]. In this league, the present study assessed the various aspects of durability in web application development by using HF-AHP-TOPSIS technique. Numerical assessment of the same has been detailed below:
As a first step, the authors identified and created a hierarchical format of various durability characteristics for web application longevity (Figure 1). For evaluating the durability of web application, four characteristics at level-1 namely dependability, trustworthiness, human trust and usability are indicated as C1, C2, and C3, respectively. With respect to durability estimation of web application at level-2: The characteristics of dependability are confidentiality, reliability, maintainability, accountability and accessibility and are indicated as C11, C12, C13, C14, and C15, respectively. The characteristics of trustworthiness are maintainability, accountability, survivability, availability and accessibility and are indicated as C21, C22, C23, C24, and C25, respectively. The characteristics of human trust are confidentiality, consumer integrity, reliability, maintainability and user satisfaction and are represented as C31, C32, C33, C34, and C35, respectively. The characteristics of usability are maintainability, survivability, availability, accessibility and user satisfaction and are indicated as C41, C42, C43, C44, and C45, respectively. Then, to estimate the numerical assessment of these characteristics, the study garnered the opinions (with the help of virtual environment) of 110 experts who were from academics and industry. These experts had varying degrees of experience in the field of web application security; ranging from 2 to 10 years. Thereafter, the authors estimated the durability of web application by applying Equations (1)–(26).
With the help of Equations (1)–(9) and Table 1, authors transformed the linguistic values into numeric values and then hesitant fuzzy based crisp numerical values and created pair-wise comparison matrixes. With the help of Equations (10)–(16), the authors transformed the pair-wise comparison matrixes into combined values through defuzzification processes and also the consistency ratio has been calculated. The calculated values of trapezoidal fuzzy number, defuzzification values and finalized values of the weights at level 1 and level 2 are shown in Table 2.
Table 2 depicts that the level 2 of the hierarchy shows various characteristics that affect its greater level characteristics but their effect for every single factor is different from others. In this type of situation, the authors grouped the characteristics for effective results. Evaluation of alternatives to test the obtained results is shown in following Table 3 and Table 4.
This portion of the section provides a realistic assessment of evaluated results on highly sensitive web applications of the University. Further, to analyze the hesitant fuzzy TOPSIS methodology, the authors selected 6 different web application projects of BBA University (India) [6,8] that are represented by AV1, AV2, AV3, AV4, AV5, and AV6 for assessment. With the help of the Equation (17) and step 10, authors took the inputs on the technical data of six projects of the University. Table 5 below illustrates the results in a combinative manner. Table 6 and Table 7 portray the normalized and weighted normalized values of alternatives in perspective of durability characteristics with the help of the Equations (18)–(24). According to Table 6, maintainability (with the weight 0.1795) has the highest weightage in estimation of durability of web application. While, as per Table 3, trustworthiness with the weight of 0.5242, has the highest priority among level 1 characteristics. This suggests that while designing a durable web application, developer should focus on trustworthiness and maintainability. This will lead to a more durable web application. Lastly, satisfaction degrees of different alternatives are estimated with the help of Equations (25) and (26), as shown in Table 8 and Figure 2.
To describe and portray the satisfaction degrees of the alternatives, g i is evaluated in above table. The above table illustrates the effectiveness of alternatives by numeric values. As evident, the effect of durability characteristics prioritization is in good standard by alternative assessment results. Authors strongly believe and recommend that the numeric assessment and outcome is satisfactory, and in good condition, for the BBA University projects. Moreover, the prioritized table and ranking for durability in web application is also effective. Results described in the table show that the second alternative has the highest effect than all the others.

3.1. Robustness Assessment

To check the robustness of the evaluated results in this proposed article, authors conducted a robustness analysis or sensitivity analysis. Robustness, in any type of numerical assessment, is an important feature in establishing the reliability of the results and validating them for further reference. It is always beneficial to evaluate the quality of computed results for deriving at a corroborative analysis. Calculated weights are used by the authors to conduct the sensitivity analysis. In the proposed study, the authors chose 6 alternatives to perform web application durability estimation. Thus, for conducting the sensitivity analysis also, the authors selected the same 6 alternatives. A well-established robustness assessment is portrayed in the Table 9 and Figure 3.
The assessed results for robustness analysis conclude that alternative 2 is the most effective factor application for web application durability. In the context of robustness assessment, the primary first row of table represents real computed results. By implementing robustness analysis standards on weights for characteristics, we found that all the factor have the same higher effect as in the real assessment. Results also provide information that numeric outcomes are sensitive towards weighs of characteristics.

3.2. Comparison with Other Pair-Wise Techniques

Comparing the results obtained from different methods gives an ideal understanding about the variation of numerical assessment in various techniques. We compared the hesitant fuzzy AHP-TOPSIS technique with the other four techniques of MCDM including Fuzzy AHP-TOPSIS, Fuzzy ANP-TOPSIS, Classical AHP-TOPSIS, and Classical ANP-TOPSIS for gauging the effectiveness of the proposed technique [7,8,9,10]. Although hybrid methods such as Fuzzy AHP-TOPSIS and Fuzzy ANP TOPSIS give good results, but in the current case of characteristics of web application durability, hesitant fuzzy AHP TOPSIS proves to be the accurate one [11,12,13,14,15]. The results obtained through the comparison were not so varied and different from each other but the accuracy of results differed from each other. The hesitant fuzzy AHP-TOPSIS technique has an advantage of assigning hesitant fuzzy set valuation in assigning values to characteristics. The calculated results are tabulated in the Table 10 and Figure 4.
It is shown by the Table 10 and Figure 4 that results assessed by hesitant fuzzy AHP TOPSIS methodology are more accurate than the other four techniques because of the additional facility of hesitant fuzzy set theory in the methodology. Thus, the adopted approach in this study has higher potential and gives better results.
Several research endeavors define durability in software and web applications and different perspectives on durability concept in software and web applications have been forwarded by different researchers [5,6,16]. However, authors of this study did not find a research analysis that discussed the quantitative assessment of web application’s durability.

4. Conclusions

Providing a durable and user-friendly web application with low-cost maintenance is an ideal web application development process that every developer and expert expects. Low-cost maintenance and management web application process can only be accomplished by durability enhancement [5,19,28]. Managing and accessing the durability of web applications in the development phase is an important prerequisite towards realizing optimum durability. It is evidently shown by previous incidents that the main reason behind web application failures is the less focus on durability. The present study propositions that low-cost maintenance and long service life of web applications requires durability focused development procedure.
The contributions of this study can be capsuled as:
  • Maintaining the durability of web applications gives cost-related enhancements and provides low-cost investment in web application management.
  • The findings of the proposed work will facilitate the developers’ task who can refer to the results and employ the stated methodology for enhancing the durability of web application instead of focusing on its application-level characteristics.
  • The assessment section of this paper portrays that trustworthiness is the most important priority factor for durability enhancement in web applications. Therefore, it is automatically proven that focusing on trustworthiness can give high durability in web applications.
Durability enhancement of the web application development process demands greater and immediate focus of the practitioners. Estimating web application’s durability in its development process was the core objective of the proposed study. For accomplishing the stated objective, we used the MCDM methodology to assess various design level characteristics of durability. Moreover, as a recommendation, the paper also emphasizes upon adopting durability management from the development phase of the web application for high longevity. The proposed methodology and processes were applied on the web applications of BBA University. The research also proposes a new idea of managing the durability of web applications through Hesitant-fuzzy-AHP based methodology. Different studies and surveys cite that nearly 75% of the cost is spent on web application management in businesses [18,19,28]. Thus, enhancement in the durability of web applications will give low-cost management of web applications and bring forth lucrative returns for the organizations. Yet another future endeavor in this research premise, as shown in the study, can be to enlist soft computing artificial intelligence for enhancing and evaluating web application’s durability.

Author Contributions

Conceptualization, K.S. and F.A.A. and R.K.S.; methodology, F.A.A.; software, K.S., F.A.A. and R.K.S.; validation, R.K.S. and R.K.; formal analysis, F.A.A.; investigation, F.A.A.; resources, F.A.A.; data curation, K.S. and R.K.S.; writing—original draft preparation, K.S. and R.K.S.; writing—review and editing, F.A.A. and R.K.; visualization, K.S.; supervision, R.K.S.; project administration, F.A.A.; funding acquisition, F.A.A. All authors have read and agreed to the published version of the manuscript.

Funding

The project has been funded by King Abdul-Aziz City for Science and Technology (KACST), Kingdom of Saudi Arabia.

Acknowledgments

The work is funded by grant number 12-INF2970-10 from the National Science, Technology and Innovation Plan (MAARIFAH), the King Abdul-Aziz City for Science and Technology (KACST), Kingdom of Saudi Arabia. We thank the Science and Technology Unit at Um Al-Qura University for their continued logistics support.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Tekinerdogan, B.; Sozer, H.; Aksit, M. Software architecture reliability analysis using failure scenarios. J. Syst. Softw. 2008, 81, 558–575. [Google Scholar] [CrossRef] [Green Version]
  2. FCW Workshop. Durable Cost Savings in Government IT. 2016. Available online: https://fcw.com/articles/2016/04/22/cost-savings-oped.aspx (accessed on 20 October 2018).
  3. Thomas, B. Cisco Global Cloud Index 2015–2020. Available online: https://www.cisco.com/c/dam/m/en_us/service-provider/ciscoknowledgenetwork/files/622_11_15-16-Cisco_GCI_CKN_2015-2020_AMER_EMEAR_NOV2016.pdf (accessed on 10 August 2020).
  4. Lambert, S. SaaS Industry Market Report: Key Global Trends & Growth Forecasts. Finances Online. 2018. Available online: https://financesonline.com/2018-saas-industry-market-report-key-global-trends-growth-forecasts/ (accessed on 4 September 2018).
  5. Sommardahl, B. Durable Software. Awkward Coder Learning to Behave in Public 5–8. 2013. Available online: https://www.durable-north-america.com/service/duraprint-software.html (accessed on 24 August 2020).
  6. Kumar, R.; Khan, A.I.; Abushark, Y.B.; Alam, M.M.; Agrawal, A.; Khan, R.A. A Knowledge Based Integrated System of Hesitant Fuzzy Set, AHP and TOPSIS for Evaluating Security-Durability of Web Applications. IEEE Access 2020, 8, 48870–48885. [Google Scholar] [CrossRef]
  7. Chong, C.Y.; Lee, S.P.; Ling, T.C. Prioritizing and fulfilling quality attributes for virtual lab development through application of fuzzy analytic hierarchy process and software development guidelines. Malays. J. Comput. Sci. 2014, 27, 1–19. [Google Scholar]
  8. Khan, S.A.; Alenezi, M.; Agrawal, A.; Kumar, R.; Khan, R.A. Evaluating Performance of Software Durability through an Integrated Fuzzy-Based Symmetrical Method of ANP and TOPSIS. Symmetry 2020, 12, 493. [Google Scholar] [CrossRef] [Green Version]
  9. Agrawal, A.; Zarour, M.; Alenezi, M.; Kumar, R.; Khan, R.A. Security durability assessment through Fuzzy Analytic Hierarchy process. PeerJ Comput. Sci. 2019, 5, e2115. [Google Scholar] [CrossRef] [Green Version]
  10. Cevik-Onar, S.; Oztaysi, B.; Kahraman, C. Strategic decision selection using hesitant fuzzy TOPSIS and interval type-2 fuzzy AHP: A case study. Int. J. Comput. Intell. Syst. 2014, 7, 1002–1021. [Google Scholar] [CrossRef] [Green Version]
  11. Wang, C.N.; Thanh, N.V.; Su, C.C. The Study of a Multicriteria Decision Making Model for Wave Power Plant Location Selection in Vietnam. Processes 2019, 7, 650. [Google Scholar] [CrossRef] [Green Version]
  12. Kahraman, C. (Ed.) Fuzzy Multi-Criteria Decision Making: Theory and Applications with Recent Developments; Springer Science & Business Media: Berlin, Germany, 2008; Volume 16. [Google Scholar]
  13. Roy, B.; Misra, S.K. An Integrated Fuzzy ANP and TOPSIS Methodology for Software Selection under MCDM Perspective. Int. J. Innov. Res. Comput. Commun. Eng. 2018, 6, 492–501. [Google Scholar]
  14. Tavana, M.; Zandi, F.; Katehakis, M.N. A hybrid fuzzy group ANP–TOPSIS framework for assessment of e-government readiness from a CiRM perspective. Inf. Manag. 2013, 50, 383–397. [Google Scholar] [CrossRef]
  15. Li, B.Z.; Bi, R. The Application of Fuzzy-ANP in Evaluation Index System of Computer Security. Key Eng. Mater. 2010, 439–440, 754–759. [Google Scholar] [CrossRef]
  16. Kumar, R.; Khan, S.A.; Agrawal, A.; Khan, R.A. Measuring the security attributes through fuzzy analytic hierarchy process: Durability perspective. ICIC Express Lett. 2018, 12, 615–620. [Google Scholar]
  17. Hahn, W.J.; Seaman, S.L.; Bikel, R. Making decisions with multiple attributes: A case in sustainability planning. Graziadio Bus. Rev. 2012, 15, 365–381. [Google Scholar]
  18. Cusick, J.J. Durable Ideas in Software Engineering: Concepts, Methods and Approaches from My Virtual Toolbox; Bentham Science Publishers: Sharjah, UAE, 2013; Available online: https://www.amazon.com/Durable-Ideas-Software-Engineering-Approaches-ebook/dp/B00E7TCBEI (accessed on 16 August 2020).
  19. Ensmenger, N. When good software goes bad: The surprising durability of an ephemeral technology. In Proceedings of the MICE Mistakes, Ignorance, Contingency and Error in Science and Technology, Munich, Germany, 2–4 October 2014; pp. 1–16. [Google Scholar]
  20. Kelty, C.; Erickson, S. The Durability of Software; Meson Press: Lüneburg, Germany, 2015; Volume 1, pp. 1–13. [Google Scholar]
  21. Torra, V.; Narukawa, Y. On hesitant fuzzy sets and decision. In Proceedings of the 2009 IEEE International Conference on Fuzzy Systems, Jeju Island, Korea, 20–24 August 2009; IEEE: Piscataway, NJ, USA, 2009; pp. 1378–1382. [Google Scholar]
  22. Rodriguez, R.M.; Martinez, L.; Herrera, F. Hesitant fuzzy linguistic term sets for decision making. IEEE Trans. Fuzzy Syst. 2011, 20, 109–119. [Google Scholar] [CrossRef]
  23. Rodriguez, R.M.; Martinez, L.; Torra, V.; Xu, Z.S.; Herrera, F. Hesitant fuzzy sets: State of the art and future directions. Int. J. Intell. Syst. 2014, 29, 495–524. [Google Scholar] [CrossRef]
  24. Beg, I.; Rashid, T. Multi-criteria trapezoidal valued intuitionistic fuzzy decision making with Choquet integral based TOPSIS. Opsearch 2014, 51, 98–129. [Google Scholar] [CrossRef] [Green Version]
  25. Xia, M.; Xu, Z. Hesitant fuzzy information aggregation in decision making. Int. J. Approx. Reason. 2011, 52, 395–407. [Google Scholar] [CrossRef] [Green Version]
  26. Saaty, T.L. The Analytic Network Process. In Encyclopedia of Operations Research and Management Science; Springer: Berlin/Heidelberg, Germany, 2001. [Google Scholar] [CrossRef]
  27. Hwang, C.L.; Lai, Y.J.; Liu, T.Y. A new approach for multiple objective decision making. Comput. Oper. Res. 1993, 20, 889–899. [Google Scholar] [CrossRef]
  28. Feenstra, R.C.; Knittel, C.R. Re-assessing the U.S. quality adjustment to computer prices: The role of durability and changing software. In Working Paper Series-Department of Economics; NBER: Cambridge, MA, USA, 2004; pp. 2–50. [Google Scholar]
Figure 1. Durability characteristics of web application.
Figure 1. Durability characteristics of web application.
Symmetry 12 01770 g001
Figure 2. Graphical representation of satisfaction degree.
Figure 2. Graphical representation of satisfaction degree.
Symmetry 12 01770 g002
Figure 3. Graphical representation of sensitivity analysis.
Figure 3. Graphical representation of sensitivity analysis.
Symmetry 12 01770 g003
Figure 4. Graphical representation of comparison.
Figure 4. Graphical representation of comparison.
Symmetry 12 01770 g004
Table 1. Scale for Hesitant Fuzzy-Analytic Hierarchy Process (HF-AHP) technique.
Table 1. Scale for Hesitant Fuzzy-Analytic Hierarchy Process (HF-AHP) technique.
RankLinguistic TermAbbreviationTriangular Hesitant Fuzzy Number
10Absolutely High ImportanceAHI(7.0000, 9.0000, 9.0000)
9Very High ImportanceVHI(5.0000, 7.0000, 9.0000)
8Essentially High ImportanceESHI(3.0000, 5.0000, 7.0000)
7Weakly High ImportanceWHI(1.0000, 3.0000, 5.0000)
6Equally High ImportanceEHI(1.0000, 1.0000, 3. 0000)
5Exactly EqualEE(1.0000, 1. 0000, 1.0000)
4Equally Low ImportanceELI(0.3300, 1.0000, 1.0000)
3Weakly Low ImportantWLI(0.2000, 0.3300, 1.0000)
2Essentially Low ImportanceESLI(0.1400, 0.2000, 0.3300)
1Very Low ImportanceVLI(0.1100, 0.1400, 0.2000)
0Absolutely Low ImportanceALI(0.1100, 0.1100, 0.1400)
Table 2. Global weights through the hierarchy.
Table 2. Global weights through the hierarchy.
Characteristics of Level 1Local WeightsCharacteristics of Level 2Local WeightsGlobal WeightsDefuzzified WeightsNormalized Weights
C10.03000, 0.08000, 0.09000, 0.15000C110.07600, 0.21800, 0.45500, 1.031000.00228, 0.01744, 0.04095, 0.154650.045620.051725
C120.03500, 0.09700, 0.19800, 0.513000.00105, 0.00776, 0.01782, 0.076950.021530.024408
C130.05900, 0.20800, 0.34800, 1.263000.00177, 0.01664, 0.03132, 0.189450.047860.054263
C140.03500, 0.09700, 0.19800, 0.513000.00105, 0.00776, 0.01782, 0.076950.021530.024408
C150.03100, 0.07800, 0.12100, 0.390000.00093, 0.00624, 0.01089, 0.058500.015620.017705
C20.11000, 0.28000, 0.33000, 0.51000C210.03500, 0.09700, 0.19800, 0.513000.00385, 0.02716, 0.06534, 0.261630.075080.085130
C220.03300, 0.12900, 0.21200, 0.781000.00363, 0.03612, 0.06996, 0.398310.102350.116051
C230.03100, 0.07800, 0.12100, 0.390000.00341, 0.02184, 0.03993, 0.198900.054310.061578
C240.03500, 0.09070, 0.19080, 0.513000.00385, 0.02540, 0.06296, 0.261600.073700.083566
C250.02200, 0.07300, 0.11300, 0.503000.00242, 0.02044, 0.03729, 0.256530.062400.070755
C30.07000, 0.12000, 0.13000, 0.25000C310.07600, 0.21800, 0.45500, 1.031000.00532, 0.02616, 0.05915, 0.257750.072280.081957
C320.03500, 0.09700, 0.19800, 0.513000.00245, 0.01164, 0.02574, 0.128250.034240.038827
C330.07600, 0.21800, 0.45050, 1.031000.00532, 0.02616, 0.05857, 0.257750.072090.081736
C340.03100, 0.07800, 0.12100, 0.390000.00217, 0.00936, 0.01573, 0.097500.024980.028318
C350.03500, 0.09700, 0.19800, 0.513000.00245, 0.01164, 0.02574, 0.128250.034240.038827
C40.04000, 0.04000, 0.05000, 0.11000C410.03100, 0.07800, 0.12100, 0.390000.00124, 0.00312, 0.00605, 0.042900.010410.011807
C420.03500, 0.09700, 0.19800, 0.513000.00140, 0.00388, 0.00990, 0.056430.014230.016137
C430.12000, 0.26000, 0.58000, 1.430000.00480, 0.01040, 0.02900, 0.157300.040150.045525
C440.06000, 0.12000, 0.40000, 0.600000.00240, 0.00480, 0.02000, 0.066000.0196670.022299
C450.12000, 0.25000, 0.57000, 1.420000.00480, 0.01000, 0.02850, 0.156200.0396670.044977
Table 3. Dependent weights of level 1 attributes.
Table 3. Dependent weights of level 1 attributes.
S. No.Characteristics of Level 1Global WeightsDefuzzified WeightsNormalized Weights
1Dependability0.03000, 0.08000, 0.09000, 0.150000.0866666670.148148148C1
2Trustworthiness0.11000, 0.28000, 0.33000, 0.510000.3066666670.524216524C2
3Human Trust0.07000, 0.12000, 0.13000, 0.250000.1366666670.233618234C3
4Usability0.04000, 0.04000, 0.05000, 0.110000.0550000000.094017094C4
Table 4. Dependent weights of level 2 attributes.
Table 4. Dependent weights of level 2 attributes.
S. No.Characteristics of Level 2Global WeightsDefuzzified WeightsNormalized Weights
1Confidentiality 0.00760, 0.04360, 0.10010, 0.412400.1179000.133682C11+C31
2Consumer Integrity 0.00245, 0.01164, 0.02574, 0.128250.0342430.038827C32
3Reliability 0.00637, 0.03392, 0.076385, 0.33470.0936130.106145C12+C33
4Maintainability0.00903, 0.05628, 0.11844, 0.591480.1583250.179519C13+C21+C34+C41
5Accountability0.00468, 0.04388, 0.08778, 0.475260.1238770.140459C14+C22
6Survivability0.00481, 0.02572, 0.04983, 0.255330.0685400.077715C23+C42
7Availability0.00865, 0.035796, 0.091964, 0.418930.1138500.129090C24+C43
8Accessibility0.00575, 0.03148, 0.06818, 0.381030.0976830.110759C15+C25+C44
9User Satisfaction0.00725, 0.02164, 0.05424, 0.284450.0739100.083804C35+C45
Table 5. Subjective cognition results of evaluators in linguistic terms.
Table 5. Subjective cognition results of evaluators in linguistic terms.
Durability Characteristics/AlternativesAV1AV2AV3AV4AV5AV6
Confidentiality 1.1800, 2.8200, 4.8200, 6.45002.0900, 3.7300, 5.7300, 6.45002.8200, 4.6400, 6.6400, 8.72001.5500, 3.1800, 5.1800, 6.72001.4500, 3.1800, 5.1800, 7.72002.4500, 4.2700, 6.2700, 8.6200
Consumer Integrity 0.8200, 2.2700, 4.2700, 6.65002.9100, 4.6400, 6.0000, 6.45001.4500, 3.0000, 4.9100, 5.45001.1800, 2.8200, 4.8200, 6.45002.0900, 3.7300, 5.7300, 6.45002.0900, 3.7300, 5.7300, 6.4500
Reliability 2.4500, 4.2700, 6.2700, 8.65003.1800, 5.1800, 7.1000, 8.65001.4500, 3.0700, 4.9100, 5.65000.8200, 2.2700, 4.2700, 6.65003.0000, 4.8200, 6.8200, 7.65003.0000, 4.8200, 6.8200, 7.6500
Maintainability1.1800, 2.8200, 4.8200, 6.45002.4500, 4.4500, 6.4500, 7.65000.9100, 2.4500, 4.4500, 5.65002.4500, 4.2700, 6.2700, 8.65003.9100, 5.9100, 7.8200, 8.65003.9100, 5.9100, 7.8200, 8.6500
Accountability0.8200, 2.2700, 4.2700, 6.65003.0000, 4.8200, 6.8200, 7.65002.9100, 4.6400, 6.0000, 6.45001.4500, 3.0000, 4.9100, 5.45001.1800, 2.8200, 4.8200, 6.45002.0900, 3.7300, 5.7300, 6.4500
Survivability2.4500, 4.2700, 6.2700, 8.65003.9100, 5.9100, 7.8200, 8.65003.1800, 5.1800, 7.1000, 8.65001.4500, 3.0700, 4.9100, 5.65000.8200, 2.2700, 4.2700, 6.65003.0000, 4.8200, 6.8200, 7.6500
Availability5.3600, 6.3600, 7.1200, 8.51003.7300, 5.7300, 7.5500, 8.6500 2.4500, 4.4500, 6.4500, 7.65000.9100, 2.4500, 4.4500, 5.65002.4500, 4.2700, 6.2700, 8.65003.9100, 5.9100, 7.8200, 8.6500
Accessibility5.1200, 7.1400, 7.7200, 8.59003.1500, 5.1500, 6.9100, 7.8400 2.8200, 4.6400, 6.6400, 7.84001.5500, 3.1800, 5.1800, 6.54001.4500, 3.1800, 5.1800, 6.25002.4500, 4.2700, 6.2700, 8.2600
User Satisfaction2.9100, 4.6400, 6.0000, 6.45001.4500, 3.0000, 4.9100, 5.45001.1800, 2.8200, 4.8200, 6.45000.9100, 2.4500, 4.4500, 5.65002.4500, 4.2700, 6.2700, 8.65003.9100, 5.9100, 7.8200, 8.6500
Table 6. The normalized fuzzy-decision matrix.
Table 6. The normalized fuzzy-decision matrix.
Durability Characteristics/AlternativesAV1AV2AV3AV4AV5AV6
Confidentiality 0.2940, 0.4840, 0.5630, 0.74200.4830, 0.6199, 0.7030, 0.83900.3250, 0.4680, 0.5550, 0.63700.6040, 0.8120, 0.8580, 0.96900.6390, 0.8160, 0.5890, 0.96700.6200, 0.8720, 0.9360, 0.9890
Consumer Integrity 0.2490, 0.4130, 0.5320, 0.74100.3250, 0.4680, 0.5550, 0.63700.5540, 0.8040, 0.8800, 0.95800.6110, 0.7720, 0.8560, 0.94500.3800, 0.5740, 0.7220, 0.08200.6120, 0.8500, 0.9170, 0.9680
Reliability 0.3460, 0.5530, 0.6640, 0.81700.2750, 0.4560, 0.5330, 0.73300.3340, 0.5240, 0.6180, 0.78000.03980, 0.1000, 0.1920, 0.38400.5500, 0.5500, 0.5500, 0.55000.4520, 0.6680, 0.7610, 0.8980
Maintainability0.4370, 0.6360, 0.7360, 0.85800.3340, 0.5240, 0.6180, 0.78000.2940, 0.4840, 0.5630, 0.74200.4830, 0.6199, 0.7030, 0.83900.3460, 0.5530, 0.6640, 0.81700.2750, 0.4560, 0.5330, 0.7330
Accountability0.6390, 0.8160, 0.5890, 0.96700.2310, 0.3810, 0.5480, 0.73620.4830, 0.6199, 0.7030, 0.83900.3460, 0.5530, 0.6640, 0.81700.4370, 0.6360, 0.7360, 0.85800.3340, 0.5240, 0.6180, 0.7800
Survivability0.6110, 0.7720, 0.8560, 0.94500.3800, 0.5740, 0.7220, 0.08200.3250, 0.4680, 0.5550, 0.63700.6040, 0.8120, 0.8580, 0.96900.6390, 0.8160, 0.5890, 0.96700.2310, 0.3810, 0.5480, 0.7362
Availability0.5590, 0.5590, 0.5590, 0.55900.4230, 0.6490, 0.7640, 0.88000.2040, 0.3220, 0.4370, 0.54700.5540, 0.8040, 0.8800, 0.95800.6110, 0.7720, 0.8560, 0.94500.3800, 0.5740, 0.7220, 0.0820
Accessibility0.0350, 0.0350, 0.0350, 0.03500.3460, 0.5530, 0.6640, 0.81700.4370, 0.6360, 0.7360, 0.85800.3340, 0.5240, 0.6180, 0.78000.03980, 0.1000, 0.1920, 0.38400.5500, 0.5500, 0.5500, 0.5500
User Satisfaction0.2940, 0.4840, 0.5630, 0.74200.4830, 0.6199, 0.7030, 0.83900.3460, 0.5530, 0.6640, 0.81700.5540, 0.8040, 0.8800, 0.95800.6110, 0.7720, 0.8560, 0.94500.3800, 0.5740, 0.7220, 0.0820
Table 7. The weighted normalized fuzzy-decision matrix.
Table 7. The weighted normalized fuzzy-decision matrix.
Durability Characteristics/AlternativesAV1AV2AV3AV4AV5AV6
Confidentiality 0.0570, 0.0850, 0.1080, 0.13100.0555, 0.0870, 0.1040, 0.12200.0428, 0.0590, 0.0640, 0.06800.0344, 0.0570, 0.0820, 0.11000.0470, 0.0740, 0.0920, 0.11200.0434, 0.0510, 0.0660, 0.0690
Consumer Integrity 0.0371, 0.0616, 0.0790, 0.11000.0320, 0.0530, 0.0720, 0.09800.0080, 0.0120, 0.0160, 0.02100.1150, 0.1670, 0.1830, 0.19900.1420, 0.1790, 0.1980, 0.21900.0120, 0.0180, 0.0210, 0.0240
Reliability 0.0630, 0.0979, 0.1140, 0.13100.0610, 0.0870, 0.1010, 0.12000.0087, 0.0135, 0.0170, 0.02100.0774, 0.1180, 0.1440, 0.17300.0320, 0.0530, 0.0720, 0.09800.0080, 0.0120, 0.0160, 0.0210
Maintainability0.0120, 0.0180, 0.0210, 0.02400.1250, 0.1690, 0.1850, 0.20100.1480, 0.1891, 0.2060, 0.22400.0630, 0.0979, 0.1140, 0.13100.0610, 0.0870, 0.1010, 0.12000.0190, 0.0325, 0.0380, 0.0510
Accountability0.0080, 0.0120, 0.0160, 0.02100.1150, 0.1670, 0.1830, 0.19900.1420, 0.1790, 0.1980, 0.21900.0120, 0.0180, 0.0210, 0.02400.1250, 0.1690, 0.1850, 0.20100.1480, 0.1891, 0.2060, 0.2240
Survivability0.0854, 0.0930, 0.0930, 0.09860.0371, 0.0616, 0.0790, 0.11000.0320, 0.0530, 0.0720, 0.09800.0080, 0.0120, 0.0160, 0.02100.1150, 0.1670, 0.1830, 0.19900.1420, 0.1790, 0.1980, 0.2190
Availability0.0890, 0.0960, 0.0960, 0.10300.0630, 0.0979, 0.1140, 0.13100.0610, 0.0870, 0.1010, 0.12000.0087, 0.0135, 0.0170, 0.02100.0774, 0.1180, 0.1440, 0.17300.1330, 0.1680, 0.1840, 0.2080
Accessibility0.0010, 0.0060, 0.0060, 0.01300.0516, 0.0820, 0.0990, 0.12200.0580, 0.0850, 0.0950, 0.11800.0230, 0.0370, 0.0430, 0.05500.0090, 0.0230, 0.0450, 0.05900.0870, 0.0940, 0.0940, 0.1010
User Satisfaction0.0320, 0.0530, 0.0720, 0.09800.0080, 0.0120, 0.0160, 0.02100.1150, 0.1670, 0.1830, 0.19900.0630, 0.0979, 0.1140, 0.13100.0610, 0.0870, 0.1010, 0.12000.0190, 0.0325, 0.0380, 0.0510
Table 8. Closeness coefficients to the aspired level among the different alternatives.
Table 8. Closeness coefficients to the aspired level among the different alternatives.
Alternativesd+id−i g i
Version 1AV10.161540.079650.31254
Version 2AV20.242640.121320.32854
Version 3AV30.245250.075240.21126
Version 4AV40.455480.168540.27854
Version 5AV50.487450.181230.27325
Version 6AV60.158740.065650.28352
Table 9. Sensitivity analysis.
Table 9. Sensitivity analysis.
AlternativesOriginal WeightsConfidentialityConsumer IntegrityReliabilityMaintainabilityAccountabilitySurvivabilityAvailabilityAccessibilityUser Satisfaction
Version 1AV10.312540.357350.398690.346740.307780.312260.314570.314750.349670.32354
Version 2AV20.328540.369840.403870.359630.332540.315450.307490.317690.358590.32658
Version 3AV30.211260.258570.287470.243640.202420.212560.217490.216320.245670.25687
Version 4AV40.278540.316950.345650.301940.248230.283250.292670.286540.345240.28547
Version 5AV50.273250.318560.348870.302740.271250.272560.272670.272670.315480.25648
Version 6AV60.283520.328590.355620.365470.269450.285740.294570.286590.356870.27584
Table 10. Comparison through classical AHP-TOPSIS technique.
Table 10. Comparison through classical AHP-TOPSIS technique.
AlternativesHesitant Fuzzy AHP-TOPSISFuzzy AHP-TOPSISFuzzy ANP-TOPSISClassical AHP-TOPSISClassical ANP-TOPSIS
Version 1AV10.312540.310020.307120.296720.31235
Version 2AV20.328540.320030.332230.309440.31534
Version 3AV30.211260.210020.202480.197140.21362
Version 4AV40.278540.270040.248120.260570.28244
Version 5AV50.273250.270060.270230.312140.27457
Version 6AV60.283520.280010.269580.281250.28555
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Sahu, K.; Alzahrani, F.A.; Srivastava, R.K.; Kumar, R. Hesitant Fuzzy Sets Based Symmetrical Model of Decision-Making for Estimating the Durability of Web Application. Symmetry 2020, 12, 1770. https://doi.org/10.3390/sym12111770

AMA Style

Sahu K, Alzahrani FA, Srivastava RK, Kumar R. Hesitant Fuzzy Sets Based Symmetrical Model of Decision-Making for Estimating the Durability of Web Application. Symmetry. 2020; 12(11):1770. https://doi.org/10.3390/sym12111770

Chicago/Turabian Style

Sahu, Kavita, Fahad A. Alzahrani, R. K. Srivastava, and Rajeev Kumar. 2020. "Hesitant Fuzzy Sets Based Symmetrical Model of Decision-Making for Estimating the Durability of Web Application" Symmetry 12, no. 11: 1770. https://doi.org/10.3390/sym12111770

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop