Next Article in Journal
On Some Generalizations of Integral Inequalities in n Independent Variables and Their Applications
Next Article in Special Issue
Hybrid Fuzzy K-Medoids and Cat and Mouse-Based Optimizer for Markov Weighted Fuzzy Time Series
Previous Article in Journal
Application of Nature-Inspired Algorithms to Computed Tomography with Incomplete Data
Previous Article in Special Issue
A Weak Tripled Contraction for Solving a Fuzzy Global Optimization Problem in Fuzzy Metric Spaces
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Complex Intuitionistic Fuzzy Aczel-Alsina Aggregation Operators and Their Application in Multi-Attribute Decision-Making

1
Department of Mathematics and Statistics, International Islamic University Islamabad, Islamabad 44000, Pakistan
2
Department of Mathematics and Computer Science, Faculty of Science, Chulalongkorn University, Bangkok 10330, Thailand
3
Division of Computational Science, Faculty of Science, Prince of Songkla University, Hat Yai, Songkhla 90110, Thailand
*
Author to whom correspondence should be addressed.
Symmetry 2022, 14(11), 2255; https://doi.org/10.3390/sym14112255
Submission received: 3 October 2022 / Revised: 12 October 2022 / Accepted: 16 October 2022 / Published: 27 October 2022
(This article belongs to the Special Issue Fuzzy Relation Equations: Trends and Applications)

Abstract

:
To handle complex, risk-illustrating, and asymmetric information, the theory discussed in this analysis is much more suitable for evaluating the above dilemmas. To manage ambiguity and inconsistency in real-life problems, the principle of Aczel–Alsina (AA) t-norm and t-conorm was initiated in 1980. These norms are massively modified and different from prevailing norms due to parameter p , where 0 < p < + . The major contribution of this analysis is to analyze the AA operational laws (addition, multiplication, score value, accuracy value) under the complex intuitionistic fuzzy (CIF) settings. Furthermore, we initiated the principle of CIFAA weighted averaging (CIFAAWA), CIFAA ordered weighted averaging (CIFAAOWA), CIFAA hybrid averaging (CIFAAHA), CIFAA weighted geometric (CIFAAWG), CIFAA ordered weighted geometric (CIFAAOWG), CIFAA hybrid geometric (CIFAAHG), as well as their beneficial results. Additionally, to consider the elaborated works, a multi-attribute decision-making (MADM) technique was explored to investigate the supremacy and feasibility of the developed works. The main influence of this manuscript is how to choose the best decision under the availability of asymmetric types of information given by different experts. Finally, we performed the sensitivity analysis and graphically show the presented work with the help of several examples.

1. Introduction

The MADM technique has attained a lot of attention from different intellectuals due to its beneficial ability to investigate the best decisions out of a group, and several individuals have employed it in the region of problematic dilemmas. Some cases are very difficult if an expert employs fuzzy numbers instead of the crisp number. For this, the principle of the fuzzy set (FS) [1] was initiated by increasing the range of crips set in the unit interval. Keeping the benefits of the FS, numerous people have utilized it in the region of different circumstances. For illustration, see studies on ordered aggregation operators [2], the idea of immediate probabilities [3], decision-making modeling based on immediate probabilities [4], ordered weighted aggregation (OWA) operators for FSs [5], OWA operators of different criteria with mixed uncertain satisfaction [6], super migrative based on aggregation function [7], deviation under aggregation mapping [8], generalized ordered modular averaging operators [9], OWA operators in the weighted averaging and their application in decision-making [10], analysis of fuzzy research under biometric indicators [11], and on averaging operators for intuitionistic fuzzy sets [12]. The fundamental theory of FS has gotten massive attention from the side of very well-known academics. However, there may be a rule in the decision-making processes whereby the decision-maker may be of truth grade (TG) and falsity grade (FG) for the attribute values, then the FS fails to tackle this case. To survive this challenge, Atanassov [13] diagnosed an intuitionistic FS (IFS). IFS has been developed with two different mappings in the shape of TG and FG, which hold the following axiom: that is, the total of two mappings is controlled to the unit interval. To fill this gap in the research, several people have employed it in the region of bipolar soft sets [14], discussing the quality of the image by using measures [15], Aczel-Alsina aggregation operators [16], decision-making frameworks for determining the large-scale rooftop [17], different sorts of measures under right angle triangle [18], analysis of weight-based hybrid approach [19], three-ways decision-making techniques [20], uncertain database measures under belief function [21], how to determine the average of knowledge under IFSs [22], time-series approaches by using the IFSs [23], and AHP techniques based on IFSs and their application [24].
The above-referred studies uncovering those various decision-making strategies have been created under IFS and interval-valued IFS speculations. In any case, it is dissected that these hypotheses can manage only one-dimensional decision-making issues. Nonetheless, some truly overwhelming issues incorporate two-dimensional information, that is, data identified with the traits and periodicity of the boundaries worried about the issue. To depict such two-dimensional data utilizing these hypotheses, the chief should think about at least two FSs/IFSs, which might expand the execution time and the number of calculations required while tackling the issue. Thus, to depict occasional data in the judgment esteems, the fundamentals of complex FS (CFS) were diagnosed by Ramot et al. [25]. CFS covers only the TG in the shape of these sorts of structures, which is deepened on the real part and imaginary part, whose values belong to the unit interval. Additionally, many operational laws and their inequalities based on CFS were diagnosed by Zhang et al. [26], the principle of complex fuzzy logic was elaborated by Ramot et al. [27], neuro-fuzzy systems were initiated by Chen et al. [28], and Liu et al. [29] investigated the cross-entropy measures for CFSs. The fundamental theory of CFS has gotten massive attention from the side of very well-known academics. However, there may be a rule in the decision-making processes whereby the decision-maker may be TG and FG for the attribute values, and the CFS fails to tackle this case. To survive this challenge, Alkouri and Salleh [30] diagnosed the complex IFS (CIFS). IFS has developed with two different mappings in the shape of TG and FG in the shape of complex numbers, which hold the following axiom: that is, the total of the real part (also for the imaginary part) of the two mappings is controlled to the unit interval. To fill the gap in the research works, several people have employed it in the region of aggregation operators [31], generalized geometric aggregation operators [32], robust averaging/geometric aggregation operators [33], generalized complex intuitionistic fuzzy aggregation operators [34], and prioritized aggregation operators for complex intuitionistic fuzzy soft sets [35]. To investigate the addition and multiplication of any two fuzzy numbers, one needs to use t-norm and t-conorm, because using crisp addition and multiplication exceed the value of fuzzy numbers from the unit interval. The concept of the triangular norm was initiated by Menger [36] in 1942. Further, Garg and Rani [37] developed the distance measures to fill the gap in the research work. Xia et al. [38] initiated the probabilistic t-norm and t-conorm. Liu [39] explored the Hamacher t-norm and t-conorm. Deschrijver et al. [40] elaborated the Lukasiewicz t-norm and t-conorm. Klement and Mesiar [41] presented the idea of the t-norm.
The main theory of Aczel–Alsina t-norm and t-conorm based on classical information was derived by Aczel and Alsina [42], which is a very dominant and valuable idea used for evaluating awkward and unreliable information in genuine life problems. The principle of the Aczel–Alsina t-norm and t-conorm is that they are massively modified when compared to the prevailing t-norms (Hamacher). The mathematical approach of diagnosed information and related operators is very closely connected with the theory of symmetry. Considering the above examination, we understand that decision-making issues are getting progressively more perplexing generally. To have the option to pick the unrivaled alternative(s) for the MADM issues and impart the questionable information in an undeniably more worthwhile way is an important problem. Moreover, it is important to oversee how to consider the association between input disputes. The major contribution of this analysis is illustrated below.
  • To analyze the AA operational laws (addition, multiplication, score value, accuracy value) under the CIF settings.
  • To initiate the principle of CIFAAWA, CIFAAOWA, CIFAAHA, CIFAAWG, CIFAAOWG, CIFAAHG, and their beneficial results.
  • To consider the elaborated works, a MADM technique was explored to investigate the supremacy and feasibility of the developed works.
  • To demonstrate the sensitivity analysis and graphically show the presented works with the help of several examples, where the main theme of this analysis is also described in the form of Figure 1.
The major key of this analysis is elaborated as follows: in Section 2, we revise several prevailing principles such as CPFSs, SSs, Aczel–Alsina t-norm and t-conorm, and their algebraic laws. In Section 3, we analyze the AA operational laws (addition, multiplication, score value, accuracy value) under the CIF settings and their use results. In Section 4, we initiate the principle of CIFAAWA, CIFAAOWA, CIFAAHA, CIFAAWG, CIFAAOWG, CIFAAHG, and their beneficial results. In Section 5, we consider the elaborated works, and an MADM technique is explored to investigate the supremacy and feasibility of the developed works. Finally, we demonstrate the sensitivity analysis and graphically show the presented works with the help of several examples. The conclusion of this script is deliberated in Section 6.

2. Preliminaries

This theory aims to revise several prevailing principles such as CPFSs, Aczel–Alsina t-norm and t-conorm, SSs, and their algebraic laws. The object X U ˜ statess the universal sets.
Definition 1.
[30] A CIFS C = is invented by:
C = = { ( C = = ( χ E ˜ ) , N C = = ( χ E ˜ ) ) : χ E ˜ X U ˜ }  
where  C = = ( χ E ˜ ) = R = = ( χ E ˜ ) e i 2 π ( I = = ( χ E ˜ ) ) and N C = = ( χ E ˜ ) = N R = = ( χ E ˜ ) e i 2 π ( N I = = ( χ E ˜ ) ) , stated the TD and FD with 0 R = = ( χ E ˜ ) + N R = = ( χ E ˜ ) 1 and 0 I = = ( χ E ˜ ) + N I = = ( χ E ˜ ) 1 . The expression C = = ( χ E ˜ ) = R = = ( χ E ˜ ) e i 2 π ( I = = ( χ E ˜ ) ) = ( 1 ( R = = ( χ E ˜ ) + N R = = ( χ E ˜ ) ) ) e i 2 π ( 1 ( I = = ( χ E ˜ ) + N I = = ( χ E ˜ ) ) ) is called neutral grade. The complex intuitionistic fuzzy number (CIFN) is invented by: C j = = ( R j = = e i 2 π ( I j = = ) , N R j = = e i 2 π ( N I j = = ) ) , j = 1 , 2 , , n .
Definition 2.
[30] By considering any two CIFNs C j = = ( R j = = e i 2 π ( I j = = ) , N R j = = e i 2 π ( N I j = = ) ) , j = 1 , 2 , then
C 1 = C 2 = = ( R 1 = = + R 2 = = R 1 = = R 2 = = e i 2 π ( I 1 = = + I 2 = = I 1 = = I 2 = = ) , ( N R 1 = = N R 2 = = ) e i 2 π ( N I 1 = = N I 2 = = ) )
C 1 = C 2 = = ( ( R 1 = = R 2 = = ) e i 2 π ( I 1 = = I 2 = = ) , N R 1 = = + N R 2 = = N R 1 = = N R 2 = = e i 2 π ( N I 1 = = + N I 2 = = N I 1 = = N I 2 = = ) )
ψ S = C 1 = = ( ( 1 ( 1 R 1 = = ) ψ S = ) e i 2 π ( 1 ( 1 I 1 = = ) ψ S = ) , N R 1 = = ψ S = e i 2 π ( N I 1 = = ψ S = ) )
C 1 = ψ S = = ( R 1 = = ψ S = e i 2 π ( I 1 = = ψ S = ) , ( 1 ( 1 N R 1 = = ) ψ S = ) e i 2 π ( 1 ( 1 N I 1 = = ) ψ S = ) )
Definition 3.
[30] By considering any CIFNs C j = = ( R j = = e i 2 π ( I j = = ) , N R j = = e i 2 π ( N I j = = ) ) , j = 1 , then the score value (SV) and accuracy value (AV) are given by:
S S V = ( C 1 = ) = 1 2 ( R 1 = = + I 1 = = N R 1 = = N I 1 = = ) , S S V = ( C 1 = ) [ 1 , 1 ]  
A V = ( C 1 = ) = 1 2 ( R 1 = = + I 1 = = _ + N R 1 = = + N I 1 = = ) , A V = ( C 1 = ) [ 0 , 1 ]
Definition 4.
[30] By considering any CIFNs C j = = ( R j = = e i 2 π ( I j = = ) , N R j = = e i 2 π ( N I j = = ) ) , j = 1 , 2 , then
  • When S S V = ( C 1 = ) > S S V = ( C 2 = ) C 1 = > C 2 = ;
  • When S S V = ( C 1 = ) < S S V = ( C 2 = ) C 1 = < C 2 = ;
  • When S S V = ( C 1 = ) = S S V = ( C 2 = ) ;
    (i)
    When A V = ( C 1 = ) > A V = ( C 2 = ) C 1 = > C 2 = ;
    (ii)
    When A V = ( C 1 = ) < A V = ( C 2 = ) C 1 = < C 2 = ;
    (iii)
    When A V = ( C 1 = ) = A V = ( C 2 = ) C 1 = = C 2 = .
Definition 5.
[16] Suppose T T N = : [ 0 , 1 ] × [ 0 , 1 ] [ 0 , 1 ] , this states a TN if
  • T T N = ( χ E ˜ , χ E ˜ ) = T T N = ( χ E ˜ , χ E ˜ ) , χ E ˜ , χ E ˜ [ 0 , 1 ] ;
  • T T N = ( χ E ˜ , χ E ˜ ) T T N = ( χ E ˜ , χ E ˜ ) , if χ E ˜ χ E ˜ ;
  • T T N = ( χ E ˜ , T T N = ( χ E ˜ , χ E ˜ ) ) = T T N = ( T T N = ( χ E ˜ , χ E ˜ ) , χ E ˜ ) ;
  • T T N = ( χ E ˜ , 1 ) = χ E ˜ ;
Definition 6.
[16] Suppose S T N = : [ 0 , 1 ] × [ 0 , 1 ] [ 0 , 1 ] , this states a TCN if
  • S T N = ( χ E ˜ , χ E ˜ ) = S T N = ( χ E ˜ , χ E ˜ ) , χ E ˜ , χ E ˜ [ 0 , 1 ] ;
  • S T N = ( χ E ˜ , χ E ˜ ) S T N = ( χ E ˜ , χ E ˜ ) , if χ E ˜ χ E ˜ ;
  • S T N = ( χ E ˜ , S T N = ( χ E ˜ , χ E ˜ ) ) = S T N = ( S T N = ( χ E ˜ , χ E ˜ ) , χ E ˜ ) ;
  • S T N = ( χ E ˜ , 0 ) = χ E ˜ ;
Definition 7.
[16] Suppose ( T T N = A ψ ) ψ [ 0 , ] , then the Aczel–Alsina TN is given by:
T T N = A ψ ( χ E ˜ , χ E ˜ ) = { T T N = ( χ E ˜ , χ E ˜ ) i f   ψ = 0 m i n ( χ E ˜ , χ E ˜ ) i f   ψ = e ( ( l o g χ E ˜ ) ψ + ( l o g χ E ˜ ) ψ ) 1 ψ o t h e r w i s e
Definition 8.
[16] Suppose ( S T N = A ψ ) ψ [ 0 , ] , then the Aczel–Alsina TCN is given by:
S T N = A ψ ( χ E ˜ , χ E ˜ ) = { S T N = ( χ E ˜ , χ E ˜ ) i f   ψ = 0 m a x ( χ E ˜ , χ E ˜ ) i f   ψ = 1 e ( ( log ( 1 χ E ˜ ) ) ψ + ( log ( 1 χ E ˜ ) ) ψ ) 1 ψ o t h e r w i s e

3. Aczel–Alsina Operational Laws for CIFSs

The major contribution of this section is to analyze the AA operational laws (addition, multiplication, score value, accuracy value) under the CIF settings and their related results.
Definition 9.
By considering any two CIFNs C j = = ( R j = = e i 2 π ( I j = = ) , N R j = = e i 2 π ( N I j = = ) ) , j = 1 , 2 , then by using the Aczel–Alsina TN and TCN, we elaborated:
C 1 = C 2 = = ( S T N = A ψ ( R 1 = = , R 2 = = ) e i 2 π ( S T N = A ψ ( I 1 = = , I 2 = = ) ) , T T N = A ψ ( N R 1 = = , N R 2 = = ) e i 2 π ( T T N = A ψ ( N I 1 = = , N I 2 = = ) ) )
C 1 = C 2 = = ( T T N = A ψ ( R 1 = = , R 2 = = ) e i 2 π ( T T N = A ψ ( I 1 = = , I 2 = = ) ) , S T N = A ψ ( N R 1 = = , N R 2 = = ) e i 2 π ( S T N = A ψ ( N I 1 = = , N I 2 = = ) ) )
Definition 10.
By considering any two CIFNs C j = = ( R j = = e i 2 π ( I j = = ) , N R j = = e i 2 π ( N I j = = ) ) , j = 1 , 2 , then
C 1 = C 2 = = ( ( 1 e ( ( log ( 1 R 1 = = ) ) ψ + ( log ( 1 R 2 = = ) ) ψ ) 1 ψ ) e i 2 π ( 1 e ( ( log ( 1 R 1 = = ) ) ψ + ( log ( 1 R 2 = = ) ) ψ ) 1 ψ ) , ( e ( ( log ( N R 1 = = ) ) ψ + ( log ( N R 2 = = ) ) ψ ) 1 ψ ) e i 2 π ( e ( ( log ( N I 1 = = ) ) ψ + ( log ( N I 2 = = ) ) ψ ) 1 ψ ) )
C 1 = C 2 = = ( ( e ( ( log ( R 1 = = ) ) ψ + ( log ( R 2 = = ) ) ψ ) 1 ψ ) e i 2 π ( e ( ( log ( I 1 = = ) ) ψ + ( log ( I 2 = = ) ) ψ ) 1 ψ ) , ( 1 e ( ( log ( 1 N R 1 = = ) ) ψ + ( log ( 1 N R 2 = = ) ) ψ ) 1 ψ ) e i 2 π ( 1 e ( ( log ( 1 N R 1 = = ) ) ψ + ( log ( 1 N R 2 = = ) ) ψ ) 1 ψ ) )
θ S = C 1 = = ( ( 1 e ( θ S = ( log ( 1 R 1 = = ) ) ψ ) 1 ψ ) e i 2 π ( 1 e ( θ S = ( log ( 1 I 1 = = ) ) ψ ) 1 ψ ) , ( e ( θ S = ( log ( N R 1 = = ) ) ψ ) 1 ψ ) e i 2 π ( e ( θ S = ( log ( N I 1 = = ) ) ψ ) 1 ψ ) )  
C 1 = θ S = = ( ( e ( θ S = ( log ( R 1 = = ) ) ψ ) 1 ψ ) e i 2 π ( e ( θ S = ( log ( I 1 = = ) ) ψ ) 1 ψ ) , ( 1 e ( θ S = ( log ( 1 N R 1 = = ) ) ψ ) 1 ψ ) e i 2 π ( 1 e ( θ S = ( log ( 1 N I 1 = = ) ) ψ ) 1 ψ ) )
Theorem 1.
By considering any two CIFNs C j = = ( R j = = e i 2 π ( I j = = ) , N R j = = e i 2 π ( N I j = = ) ) , j = 1 , 2 , then
  • C 1 = C 2 = = C 2 = C 1 = ;
  • C 1 = C 2 = = C 2 = C 1 = ;
  • θ S = ( C 1 = C 2 = ) = θ S = C 1 = θ S = C 2 = ;
  • ( θ S 1 = + θ S 1 = ) C 1 = = θ S 1 = C 1 = θ S 2 = C 1 = ;
  • ( C 1 = C 2 = ) θ S = = C 1 = θ S = C 2 = θ S = ;
  • C 1 = θ S 1 = C 1 = θ S 1 = = C 1 = θ S 1 = + θ S 2 = .
The proof of Theorem 1 is given in Appendix A.

4. Complex Intuitionistic Fuzzy Aczel–Alsina Aggregation Operators

The major contribution of this analysis is to analyze some operators by using the AA operational laws under the CIF settings to initiate the principle of CIFAAWA, CIFAAOWA, CIFAAHA, CIFAAWG, CIFAAOWG, CIFAAHG, and their beneficial results.
Definition 11.
By considering any group of CIFNs C j = = ( R j = = e i 2 π ( I j = = ) , N R j = = e i 2 π ( N I j = = ) ) , j = 1 , 2 , , n , then the CIFAAWA operator is given by:
C I F A A W A ( C 1 = , C 2 = , , C n = ) = W 1 = C 1 = W 2 = C 2 = W n = C n = = j = 1 n ( W j = C j = )
where  W = = ( W = 1 , W = 2 , , W = n ) T , with a rule  j = 1 n W = j = 1 .
Theorem 2.
By considering any group of CIFNs C j = = ( R j = = e i 2 π ( I j = = ) , N R j = = e i 2 π ( N I j = = ) ) , j = 1 , 2 , , n , then by using Equation (16), we elaborated
C I F A A W A ( C 1 = , C 2 = , , C n = ) = ( ( 1 e ( j = 1 n W j = ( log ( 1 R j = = ) ) ψ ) 1 ψ ) e i 2 π ( 1 e ( j = 1 n W j = ( log ( 1 I j = = ) ) ψ ) 1 ψ ) , ( e ( j = 1 n W j = ( log ( N R j = = ) ) ψ ) 1 ψ ) e i 2 π ( e ( j = 1 n W j = ( log ( N I j = = ) ) ψ ) 1 ψ ) )
The proof of Theorem 2 is given in Appendix B.
Additionally, the propositions of idempotency, boundedness, and monotonicity are also employed here.
Proposition 1.
By considering any group of CIFNs C j = = ( R j = = e i 2 π ( I j = = ) , N R j = = e i 2 π ( N I j = = ) ) , j = 1 , 2 , , n , If C j = = = , then
C I F A A W A ( C 1 = , C 2 = , , C n = ) = =
The proof of Proposition 1 is given in Appendix C.
Proposition 2.
By considering any group of CIFNs C j = = ( R j = = e i 2 π ( I j = = ) , N R j = = e i 2 π ( N I j = = ) ) , j = 1 , 2 , , n , If = = ( min j R j = = e i 2 π ( min j I j = = ) , max j N R j = = e i 2 π ( max j N I j = = ) ) and = + = ( max j R j = = e i 2 π ( max j I j = = ) , min j N R j = = e i 2 π ( min j N I j = = ) ) , then
= C I F A A W A ( C 1 = , C 2 = , , C n = ) = +
The proof of Proposition 2 is given in Appendix D.
Proposition 3.
By considering any group of CIFNs C j = = ( R j = = e i 2 π ( I j = = ) , N R j = = e i 2 π ( N I j = = ) ) , j = 1 , 2 , , n , If C j = C j = = ( R j = = e i 2 π ( I j = = ) , N R j = = e i 2 π ( N I j = = ) ) , then
C I F A A W A ( C 1 = , C 2 = , , C n = ) C I F A A W A ( C 1 = , C 2 = , , C n = )
Proof. 
Omitted. □
Definition 12.
By considering any group of CIFNs C j = = ( R j = = e i 2 π ( I j = = ) , N R j = = e i 2 π ( N I j = = ) ) , j = 1 , 2 , , n , then the CIFAAOWA operator is given by:
C I F A A O W A ( C 1 = , C 2 = , , C n = ) = W 1 = C φ ( 1 ) = W 2 = C φ ( 2 ) = W n = C φ ( n ) = = j = 1 n ( W j = C φ ( j ) = )
where  W = = ( W = 1 , W = 2 , , W = n ) T , with a rule  j = 1 n W = j = 1 , with parameter  φ ( 1 ) , φ ( 2 ) , , φ ( n ) based on  C φ ( j ) = C φ ( j 1 ) = .
Theorem 2.
By considering any group of CIFNs C j = = ( R j = = e i 2 π ( I j = = ) , N R j = = e i 2 π ( N I j = = ) ) , j = 1 , 2 , , n , then by using Equation (21), we elaborated
C I F A A O W A ( C 1 = , C 2 = , , C n = ) = ( ( 1 e ( j = 1 n W j = ( log ( 1 R φ ( j ) = = ) ) ψ ) 1 ψ ) e i 2 π ( 1 e ( j = 1 n W j = ( log ( 1 I φ ( j ) = = ) ) ψ ) 1 ψ ) , ( e ( j = 1 n W j = ( log ( N R φ ( j ) = = ) ) ψ ) 1 ψ ) e i 2 π ( e ( j = 1 n W j = ( log ( N I φ ( j ) = = ) ) ψ ) 1 ψ ) )
Proof. 
Omitted. □
Additionally, the propositions of idempotency, boundedness, and monotonicity are also employed here.
Proposition 4.
By considering any group of CIFNs C j = = ( R j = = e i 2 π ( I j = = ) , N R j = = e i 2 π ( N I j = = ) ) , j = 1 , 2 , , n , If C j = = = , then
C I F A A O W A ( C 1 = , C 2 = , , C n = ) = =
Proof. 
Omitted. □
Proposition 5.
By considering any group of CIFNs C j = = ( R j = = e i 2 π ( I j = = ) , N R j = = e i 2 π ( N I j = = ) ) , j = 1 , 2 , , n , If = = ( min j R j = = e i 2 π ( min j I j = = ) , max j N R j = = e i 2 π ( max j N I j = = ) ) and = + = ( max j R j = = e i 2 π ( max j I j = = ) , min j N R j = = e i 2 π ( min j N I j = = ) ) , then
= C I F A A O W A ( C 1 = , C 2 = , , C n = ) = +
Proof :
Omitted. □
Proposition 6.
By considering any group of CIFNs C j = = ( R j = = e i 2 π ( I j = = ) , N R j = = e i 2 π ( N I j = = ) ) , j = 1 , 2 , , n , if C j = C j = = ( R j = = e i 2 π ( I j = = ) , N R j = = e i 2 π ( N I j = = ) ) , then
C I F A A O W A ( C 1 = , C 2 = , , C n = ) C I F A A O W A ( C 1 = , C 2 = , , C n = )
Proof. 
Omitted. □
Definition 13.
By considering any group of CIFNs C j = = ( R j = = e i 2 π ( I j = = ) , N R j = = e i 2 π ( N I j = = ) ) , j = 1 , 2 , , n , then the CIFAAHA operator is given by:
C I F A A H A ( C 1 = , C 2 = , , C n = ) = W 1 = ˙ C φ ( 1 ) = W 2 = ˙ C φ ( 2 ) = W n = ˙ C φ ( n ) = = j = 1 n ( W j = ˙ C φ ( j ) = )
where  W = = ( W = 1 , W = 2 , , W = n ) T , with a rule  j = 1 n W = j = 1 , with parameter  φ ( 1 ) , φ ( 2 ) , , φ ( n ) based on  ˙ C φ ( j ) = ˙ C φ ( j 1 ) = . Additionally,  ˙ C φ ( j ) = = n W j = ˙ C φ ( j ) = with j = 1 n W = j = 1 .
Theorem 3.
By considering any group of CIFNs C j = = ( R j = = e i 2 π ( I j = = ) , N R j = = e i 2 π ( N I j = = ) ) , j = 1 , 2 , , n , then by using Equation (26), we elaborated
C I F A A H A ( C 1 = , C 2 = , , C n = ) = ( ( 1 e ( j = 1 n W j = ( log ( 1 ˙ R φ ( j ) = = ) ) ψ ) 1 ψ ) e i 2 π ( 1 e ( j = 1 n W j = ( log ( 1 ˙ I φ ( j ) = = ) ) ψ ) 1 ψ ) , ( e ( j = 1 n W j = ( log ( N ˙ R φ ( j ) = = ) ) ψ ) 1 ψ ) e i 2 π ( e ( j = 1 n W j = ( log ( N ˙ I φ ( j ) = = ) ) ψ ) 1 ψ ) )
Proof. 
Omitted. □
Additionally, the propositions of idempotency, boundedness, and monotonicity are also employed here.
Proposition 7.
By considering any group of CIFNs C j = = ( R j = = e i 2 π ( I j = = ) , N R j = = e i 2 π ( N I j = = ) ) , j = 1 , 2 , , n , If C j = = = , then
C I F A A H A ( C 1 = , C 2 = , , C n = ) = =
Proof. 
Omitted. □
Proposition 8.
By considering any group of CIFNs C j = = ( R j = = e i 2 π ( I j = = ) , N R j = = e i 2 π ( N I j = = ) ) , j = 1 , 2 , , n , If = = ( min j R j = = e i 2 π ( min j I j = = ) , max j N R j = = e i 2 π ( max j N I j = = ) ) and = + = ( max j R j = = e i 2 π ( max j I j = = ) , min j N R j = = e i 2 π ( min j N I j = = ) ) , then
= C I F A A H A ( C 1 = , C 2 = , , C n = ) = +
Proof. 
Omitted. □
Proposition 9.
By considering any group of CIFNs C j = = ( R j = = e i 2 π ( I j = = ) , N R j = = e i 2 π ( N I j = = ) ) , j = 1 , 2 , , n , If C j = C j = = ( R j = = e i 2 π ( I j = = ) , N R j = = e i 2 π ( N I j = = ) ) , then
C I F A A H A ( C 1 = , C 2 = , , C n = ) C I F A A H A ( C 1 = , C 2 = , , C n = )
Proof: 
Omitted. □
Definition 14.
By considering any group of CIFNs C j = = ( R j = = e i 2 π ( I j = = ) , N R j = = e i 2 π ( N I j = = ) ) , j = 1 , 2 , , n , then the CIFAAWG operator is given by:
C I F A A W G ( C 1 = , C 2 = , , C n = ) = C 1 = W 1 = C 2 = W 2 = C n = W n = = j = 1 n ( C j = W j = )
where  W = = ( W = 1 , W = 2 , , W = n ) T , with a rule  j = 1 n W = j = 1 .
Theorem 4.
By considering any group of CIFNs C j = = ( R j = = e i 2 π ( I j = = ) , N R j = = e i 2 π ( N I j = = ) ) , j = 1 , 2 , , n , then by using Equation (31), we elaborated
C I F A A W G ( C 1 = , C 2 = , , C n = ) = ( ( e ( j = 1 n ( log ( R j = = ) ) ψ W j = ) 1 ψ ) e i 2 π ( e ( j = 1 n ( log ( I j = = ) ) ψ W j = ) 1 ψ ) , ( 1 e ( j = 1 n ( log ( 1 N R j = = ) ) ψ W j = ) 1 ψ ) e i 2 π ( 1 e ( j = 1 n ( log ( 1 N I j = = ) ) ψ W j = ) 1 ψ ) )
Definition 15.
By considering any group of CIFNs C j = = ( R j = = e i 2 π ( I j = = ) , N R j = = e i 2 π ( N I j = = ) ) , j = 1 , 2 , , n , then the CIFAAOWG operator is given by:
C I F A A O W G ( C 1 = , C 2 = , , C n = ) = C φ ( 1 ) = W 1 = C φ ( 2 ) = W 2 = C φ ( n ) = W n = = j = 1 n ( C φ ( j ) = W j = )
where  W = = ( W = 1 , W = 2 , , W = n ) T , with a rule  j = 1 n W = j = 1 , with parameter  φ ( 1 ) , φ ( 2 ) , , φ ( n ) based on  C φ ( j ) = C φ ( j 1 ) = .
Theorem 5.
By considering any group of CIFNs C j = = ( R j = = e i 2 π ( I j = = ) , N R j = = e i 2 π ( N I j = = ) ) , j = 1 , 2 , , n , then by using Equation (33), we elaborated
C I F A A O W G ( C 1 = , C 2 = , , C n = ) = ( ( e ( j = 1 n ( log ( R φ ( j ) = = ) ) ψ W j = ) 1 ψ ) e i 2 π ( e ( j = 1 n ( log ( I φ ( j ) = = ) ) ψ W j = ) 1 ψ ) , ( 1 e ( j = 1 n ( log ( 1 N R φ ( j ) = = ) ) ψ W j = ) 1 ψ ) e i 2 π ( 1 e ( j = 1 n ( log ( 1 N I φ ( j ) = = ) ) ψ W j = ) 1 ψ ) )
Proof. 
Omitted. □
Additionally, the propositions of idempotency, boundedness, and monotonicity are also employed here.
Proposition 10.
By considering any group of CIFNs C j = = ( R j = = e i 2 π ( I j = = ) , N R j = = e i 2 π ( N I j = = ) ) , j = 1 , 2 , , n , If C j = = = , then
C I F A A O W G ( C 1 = , C 2 = , , C n = ) = =
Proof. 
Omitted. □
Proposition 11.
By considering any group of CIFNs C j = = ( R j = = e i 2 π ( I j = = ) , N R j = = e i 2 π ( N I j = = ) ) , j = 1 , 2 , , n , If = = ( min j R j = = e i 2 π ( min j I j = = ) , max j N R j = = e i 2 π ( max j N I j = = ) ) and = + = ( max j R j = = e i 2 π ( max j I j = = ) , min j N R j = = e i 2 π ( min j N I j = = ) ) , then
= C I F A A O W G ( C 1 = , C 2 = , , C n = ) = +
Proof. 
Omitted. □
Proposition 12.
By considering any group of CIFNs C j = = ( R j = = e i 2 π ( I j = = ) , N R j = = e i 2 π ( N I j = = ) ) , j = 1 , 2 , , n , If C j = C j = = ( R j = = e i 2 π ( I j = = ) , N R j = = e i 2 π ( N I j = = ) ) , then
C I F A A O W G ( C 1 = , C 2 = , , C n = ) C I F A A O W G ( C 1 = , C 2 = , , C n = )
Proof. 
Omitted. □
Definition 16.
By considering any group of CIFNs C j = = ( R j = = e i 2 π ( I j = = ) , N R j = = e i 2 π ( N I j = = ) ) , j = 1 , 2 , , n , then the CIFAAHG operator is given by:
C I F A A H G ( C 1 = , C 2 = , , C n = ) = ˙ C φ ( 1 ) = W 1 = ˙ C φ ( 2 ) = W 2 = ˙ C φ ( n ) = W n = = j = 1 n ( ˙ C φ ( j ) = W j = )
where  W = = ( W = 1 , W = 2 , , W = n ) T , with a rule  j = 1 n W = j = 1 , with parameter  φ ( 1 ) , φ ( 2 ) , , φ ( n ) based on  ˙ C φ ( j ) = ˙ C φ ( j 1 ) = . Additionally, ˙ C φ ( j ) = = n W j = ˙ C φ ( j ) = with j = 1 n W = j = 1 .
Theorem 6.
By considering any group of CIFNs C j = = ( R j = = e i 2 π ( I j = = ) , N R j = = e i 2 π ( N I j = = ) ) , j = 1 , 2 , , n , then by using Equation (38), we elaborated
C I F A A H G ( C 1 = , C 2 = , , C n = ) = ( ( e ( j = 1 n ( log ( ˙ R φ ( j ) = = ) ) ψ W j = ) 1 ψ ) e i 2 π ( e ( j = 1 n ( log ( ˙ I φ ( j ) = = ) ) ψ W j = ) 1 ψ ) , ( 1 e ( j = 1 n ( log ( 1 N ˙ R φ ( j ) = = ) ) ψ W j = ) 1 ψ ) e i 2 π ( 1 e ( j = 1 n ( log ( 1 N ˙ I φ ( j ) = = ) ) ψ W j = ) 1 ψ ) )
Proof. 
Omitted. □
Additionally, the propositions of idempotency, boundedness, and monotonicity are also employed here.
Proposition 13.
By considering any group of CIFNs C j = = ( R j = = e i 2 π ( I j = = ) , N R j = = e i 2 π ( N I j = = ) ) , j = 1 , 2 , , n , If C j = = = , then
C I F A A H G ( C 1 = , C 2 = , , C n = ) = =
Proof. 
Omitted. □
Proposition 14.
By considering any group of CIFNs C j = = ( R j = = e i 2 π ( I j = = ) , N R j = = e i 2 π ( N I j = = ) ) , j = 1 , 2 , , n , If = = ( min j R j = = e i 2 π ( min j I j = = ) , max j N R j = = e i 2 π ( max j N I j = = ) ) and = + = ( max j R j = = e i 2 π ( max j I j = = ) , min j N R j = = e i 2 π ( min j N I j = = ) ) , then
= C I F A A H G ( C 1 = , C 2 = , , C n = ) = +
Proof. 
Omitted. □
Proposition 15.
By considering any group of CIFNs C j = = ( R j = = e i 2 π ( I j = = ) , N R j = = e i 2 π ( N I j = = ) ) , j = 1 , 2 , , n , If C j = C j = = ( R j = = e i 2 π ( I j = = ) , N R j = = e i 2 π ( N I j = = ) ) , then
C I F A A H G ( C 1 = , C 2 = , , C n = ) C I F A A H G ( C 1 = , C 2 = , , C n = )
Proof. 
Omitted. □

5. MADM Procedures under Investigated Operators

The major contribution of this analysis is to choose the MADM technique under CIFS for determining the beneficial optimal from the family of complex intuitionistic fuzzy information. Several intellectuals have utilized the assumption of CIFS in the region of individual situations. To investigate the beneficial optimal, we elaborated a decision-making process; for this, we considered the group alternatives and their attributes in the shape of C = = { C 1 = , C 2 = , , C m = } , C = = { C 1 = , C 2 = , , C n = } with weight vector W = = ( W = 1 , W = 2 , , W = n ) T , with a rule  j = 1 n W = j = 1 . For this, we suppose that C j k = = ( R j k = = e i 2 π ( I j k = = ) , N R j k = = e i 2 π ( N I j k = = ) ) , j , k = 1 , 2 , , n , m . Where C = = ( χ E ˜ ) = R = = ( χ E ˜ ) e i 2 π ( I = = ( χ E ˜ ) ) and N C = = ( χ E ˜ ) = N R = = ( χ E ˜ ) e i 2 π ( N I = = ( χ E ˜ ) ) , then the TD and FD with 0 R = = ( χ E ˜ ) + N R = = ( χ E ˜ ) 1 and 0 I = = ( χ E ˜ ) + N I = = ( χ E ˜ ) 1 . From the above theory, we are able to determine the beneficial optimal, and we can construct the decision-making technique.
  • Decision-Making Technique
For investigating the beneficial optimal, we constructed the decision-making algorithm in the shape of the following stages:
Stage 1: Under the different sort of CIFNs which cover cost sort and benefit sorts in the shape of a matrix.
Stage 2: If the matrix covers the cost sort of data, then by using the below theory, we scandalized the matrix such that
D = { ( R j k = = e i 2 π ( I j k = = ) , N R j k = = e i 2 π ( N I j k = = ) ) f o r   b e n e f i t   s o r t   o f   d a t a ( N R j k = = e i 2 π ( N I j k = = ) , R j k = = e i 2 π ( I j k = = ) ) f o r   c o s t   s o r t   o f   d a t a
If the matrix covers the benefits sort of data, then leave them.
Stage 3: Under Equation (17) (CIFAAWA) and Equation (32) (CIFAAWG), we accomplished the matrix to analyze the CIFN.
Stage 4: Under Equation (6) (if Equation (6) failed, then we use Equation (7)), we investigated the SV of the CIFNs.
Stage 5: From the SV, we explored the ranking technique of the SVs to elaborate on the beneficial optimal.
B.
Illustrated Example
The major finding of this analysis was to analyze the elaborated operators in the circumstances of the MADM procedure. For this, we discuss some practical data to determine the feasibility and possibility of the presented works.
C.
Explanation of the Problem
Considering the extending competition of globalization and fast mechanical overhauls, worldwide markets are compelling organizations to supply the best-quality goods and organizations. This must be cultivated through the cooperation of suitable representatives. Worker’s choice is a cycle choice of individuals who have the essential capabilities to play out specific work in a best case scenario. It picks the data idea of workers and plays out a critical job in staffing the board. Developing competition in overall business sectors empowers associations with more prominent accentuation on the enrollment cycle. Huge issues such as changes in affiliations, society, work, governance, and commercializing impact affect the determination of faculty. A few organizations settle on the essential choice to choose the best job hunter, utilizing thorough and costly ID techniques. Since various individual characteristics considered for workers’ decisions show irregularity and imprecision, thusly, the CIFS speculation is a helpful medium to give a design that incorporates uncertain choices in the worker’s decision technique.
Allow us to contemplate a creation organization that intends on enlisting an advertising administrator for an empty post [43]. In the wake of pre-screening, five candidates C j = , j = 1 , 2 , 3 , 4 , 5 have been assigned for additional assessment. You need to choose depending on the accompanying four credits: C 1 = : Oral introduction ability; C 2 = : History; C 3 = : Overall inclination; C 4 = : self-assurance. The weight vectors for attribute values are illustrated as followed: 0.4 , 0.3 , 0.2 , 0.1 . The five experts C j = , j = 1 , 2 , 3 , 4 , 5 are to manage ambiguity under complex intuitionistic fuzzy data by using decision-making procedures. The data provided by experts are illustrated in the shape of Table 1.
D.
Method under CIFAAWA and CIFAAWG Operators
On the path to determine the most beneficial person from the group of persons (five candidates) by using the MADM technique under CIFAAWA and CIFAAWG operators., for investigating the beneficial optimal, we constructed the decision-making algorithm in the shape of the following stages:
Stage 1: Under the different sort of CIFNs which cover cost sort and benefit sorts in the shape of a matrix (Table 1).
Stage 2: If the matrix covers the cost sort of data, then by using the below theory, we scandalized the matrix, such that
D = { ( R j k = = e i 2 π ( I j k = = ) , N R j k = = e i 2 π ( N I j k = = ) ) f o r   b e n e f i t   s o r t   o f   d a t a ( N R j k = = e i 2 π ( N I j k = = ) , R j k = = e i 2 π ( I j k = = ) ) f o r   c o s t   s o r t   o f   d a t a
If the matrix covers the benefits sort of data, then leave them. The data in Table 1 cover all the beneficial sorts of data, so they do not need to be standardized.
Stage 3: Under Equation (17) (CIFAAWA) and Equation (32) (CIFAAWG), we accomplished the matrix to analyze the CIFN, which is illustrated in the shape of Table 2.
Stage 4: Under Equation (6) (if Equation (6) failed, then we use Equation (7)), we investigated the SV of the CIFNs illustrated in the shape of Table 3.
Stage 5: From the SV, we explored the ranking technique of the SVs to elaborate on the beneficial optimal illustrated in the shape of Table 4.
Under the different sorts of operators, we have gotten the same beneficial optimal C 5 = . Additionally, we enhanced the quality of the research works under distinct sorts with the help of some massive examples. The data provided by experts are illustrated in the shape of Table 5.
E.
Method under CIFAAWA and CIFAAWG Operators
On the path to determine the beneficial person from the group of persons (five candidates) by using the MADM technique under CIFAAWA and CIFAAWG operators, for investigating the beneficial optimal, we constructed the decision-making algorithm in the shape of the following stages:
Stage 1: Under the different sort of CIFNs, which cover cost sort and benefit sorts in the shape of a matrix (Table 5).
Stage 2: If the matrix covers the cost sort of data, then by using the below theory, we scandalized the matrix, such that
D = { ( R j k = = e i 2 π ( I j k = = ) , N R j k = = e i 2 π ( N I j k = = ) ) f o r   b e n e f i t   s o r t   o f   d a t a ( N R j k = = e i 2 π ( N I j k = = ) , R j k = = e i 2 π ( I j k = = ) ) f o r   c o s t   s o r t   o f   d a t a
If the matrix covers the benefits sort of data, then leave them. The data in Table 5 cover all the beneficial sorts of data, so they do not need to be standardized.
Stage 3: Under Equation (17) (CIFAAWA) and Equation (32) (CIFAAWG), we accomplished the matrix to analyze the CIFN, which is illustrated in the shape of Table 6.
Stage 4: Under Equation (6) (if Equation (6) failed, then we use Equation (7)), we investigated the SV of the CIFNs illustrated in the shape of Table 7.
Stage 5: From the SV, we explored the ranking technique of the SVs to elaborate the beneficial optimal illustrated in the shape of Table 8.
Under the different sorts of operators, we have gotten the same beneficial optimal C 5 = .
F.
Influence of Parameter
The major aim of this study was to check the fluency of the parameter ψ , to investigate the consistency of the elaborated works. For this, the data in Table 1 were considered for determining the fluency of the parameter, stated in Table 9 under both CIFAAWA and CIFAAWG operators.
Under the different sorts of operators, we have gotten the same beneficial optimal C 5 = by using the distinct values of the parameter. For this, the data in Table 5 were considered for determining the fluency of the parameter, stated in Table 10 under both CIFAAWA and CIFAAWG operators.
Under the different sorts of operators, we have gotten the same sort of beneficial optimal C 5 = by using the distinct values of the parameter.
G.
Sensitive Analysis
The main contribution of this analysis is to choose some prevailing operators under different types of ideas, for illustration, aggregation operators [43], geometric aggregation operators [44], information aggregation operators [45], Einstein geometric aggregation operators [46], Hamacher aggregation operators [47], Dombi aggregation operators [48] under the IFSs, aggregation operators [31], and geometric aggregation operators based on CIFSs. Under the above analysis, we employed the resultant values for the data in Table 1, illustrated in Table 11.
Under the different sorts of operators, we have gotten the same sort of beneficial optimal C 5 = . Under the above analysis, we employed the resultant values for the data in Table 5, illustrated in Table 12.
Under the different sorts of operators, we have gotten the same sort of beneficial optimal C 5 = . Therefore, we have discussed all the possibilities under the different types of circumstances. The beneficial optimal is the same, which is C 5 = . From the above discussion, we conclude that our presented works are massive dominant, and consistent as compared to prevailing works.

6. Conclusions

The mathematical and theoretical representation of the CIF set is very powerful and reliable to manage awkward and vague information because the grades contained in the CIF set are computed in the shape of a complex number, which can easily manage two-dimensional information in the shape of a single set. The impacts of the derived analysis are listed below:
  • Firstly, we derived valuable AA operational laws under the presence of CIF information.
  • Secondly, we discovered the idea of aggregation operators based on AA operations for the CIF set then developed the ideas of CIFAAWA, CIFAAOWA, CIFAAHA, CIFAAWG, CIFAAOWG, CIFAAHG and their beneficial results.
  • Thirdly, we illustrated a MADM technique for derived operators and justified it with the help of some suitable examples.
  • Finally, we compared the derived work with some existing results to enhance the worth and capability of the pioneered operators.
The theory of AA aggregation operators based on the CIF set is a very effective and dominant idea, which can be used for aggregating the collection of information into a single set. The proposed theory can easily resolve many real-life problems, for instance, artificial intelligence in education, in healthcare, in business, in manufacturing, roads, machine learning, game theory, computer science, and many more.
In the upcoming times, we will modify our principles in this analysis based on CIFSs for complex q-rung orthopair fuzzy sets [49,50], complex spherical fuzzy sets [51,52], T-spherical fuzzy sets [53], correlation measures [54], Einstein aggregation operators [55], algebraic aggregation operators [56], logarithmic aggregation operators [57], entropy measures [58], linear Diophantine fuzzy sets [59,60], spherical Diophantine fuzzy sets [61,62], and m-polar fuzzy sets to further fill the gap of the research works.

Author Contributions

Conceptualization, Z.A.; Data curation, R.C.; Funding acquisition, S.B. and R.C.; Investigation, T.M. and Z.A.; Methodology, Z.A.; Project administration, T.M.; Resources, Z.A. and S.B.; Software, R.C.; Supervision, T.M.; Writing original draft, Z.A. All authors contributed equally and significantly in writing this article. All authors have read and agreed to the published version of the manuscript.

Funding

This research was supported by National Science, Research and Innovation Fund (NSRF) and Prince of Songkla University (Grant No. SCI6601275S).

Data Availability Statement

The data used to support the findings of this study can be used by anyone without prior permission of the authors by just citing this article.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

Proof. 
Under Equations (12)–(15), we prove that the above points, such that
  • Suppose C 1 = C 2 = , then
    C 1 = C 2 = = ( ( 1 e ( ( log ( 1 R 1 = = ) ) ψ + ( log ( 1 R 2 = = ) ) ψ ) 1 ψ ) e i 2 π ( 1 e ( ( log ( 1 R 1 = = ) ) ψ + ( log ( 1 R 2 = = ) ) ψ ) 1 ψ ) , ( e ( ( log ( N R 1 = = ) ) ψ + ( log ( N R 2 = = ) ) ψ ) 1 ψ ) e i 2 π ( e ( ( log ( N I 1 = = ) ) ψ + ( log ( N I 2 = = ) ) ψ ) 1 ψ ) ) = ( ( 1 e ( ( log ( 1 R 2 = = ) ) ψ + ( log ( 1 R 1 = = ) ) ψ ) 1 ψ ) e i 2 π ( 1 e ( ( log ( 1 R 2 = = ) ) ψ + ( log ( 1 R 1 = = ) ) ψ ) 1 ψ ) , ( e ( ( log ( N R 2 = = ) ) ψ + ( log ( N R 1 = = ) ) ψ ) 1 ψ ) e i 2 π ( e ( ( log ( N I 2 = = ) ) ψ + ( log ( N I 1 = = ) ) ψ ) 1 ψ ) ) = C 2 = C 1 = .
    Hence, we investigated C 1 = C 2 = = C 2 = C 1 = .
  • Omitted.
  • Suppose θ S = ( C 1 = C 2 = ) , then
    θ S = ( C 1 = C 2 = ) = θ S = ( ( 1 e ( ( log ( 1 R 1 = = ) ) ψ + ( log ( 1 R 2 = = ) ) ψ ) 1 ψ ) e i 2 π ( 1 e ( ( log ( 1 R 1 = = ) ) ψ + ( log ( 1 R 2 = = ) ) ψ ) 1 ψ ) , ( e ( ( log ( N R 1 = = ) ) ψ + ( log ( N R 2 = = ) ) ψ ) 1 ψ ) e i 2 π ( e ( ( log ( N I 1 = = ) ) ψ + ( log ( N I 2 = = ) ) ψ ) 1 ψ ) ) = ( ( 1 e ( θ S = ( log ( 1 R 1 = = ) ) ψ + ( log ( 1 R 2 = = ) ) ψ ) 1 ψ ) e i 2 π ( 1 e ( θ S = ( log ( 1 R 1 = = ) ) ψ + ( log ( 1 R 2 = = ) ) ψ ) 1 ψ ) , ( e ( θ S = ( log ( N R 1 = = ) ) ψ + ( log ( N R 2 = = ) ) ψ ) 1 ψ ) e i 2 π ( e ( θ S = ( log ( N I 1 = = ) ) ψ + ( log ( N I 2 = = ) ) ψ ) 1 ψ ) ) = ( ( 1 e ( θ S = ( log ( 1 R 1 = = ) ) ψ ) 1 ψ ) e i 2 π ( 1 e ( θ S = ( log ( 1 I 1 = = ) ) ψ ) 1 ψ ) , ( e ( θ S = ( log ( N R 1 = = ) ) ψ ) 1 ψ ) e i 2 π ( e ( θ S = ( log ( N I 1 = = ) ) ψ ) 1 ψ ) ) ( ( 1 e ( θ S = ( log ( 1 R 2 = = ) ) ψ ) 1 ψ ) e i 2 π ( 1 e ( θ S = ( log ( 1 I 2 = = ) ) ψ ) 1 ψ ) , ( e ( θ S = ( log ( N R 2 = = ) ) ψ ) 1 ψ ) e i 2 π ( e ( θ S = ( log ( N I 2 = = ) ) ψ ) 1 ψ ) ) = θ S = C 1 = θ S = C 2 = .
    Hence, θ S = ( C 1 = C 2 = ) = θ S = C 1 = θ S = C 2 = .
  • Omitted.
  • Suppose ( C 1 = C 2 = ) θ S = , then
    ( C 1 = C 2 = ) θ S = = ( ( e ( ( log ( R 1 = = ) ) ψ + ( log ( R 2 = = ) ) ψ ) 1 ψ ) e i 2 π ( e ( ( log ( I 1 = = ) ) ψ + ( log ( I 2 = = ) ) ψ ) 1 ψ ) , ( 1 e ( ( log ( 1 N R 1 = = ) ) ψ + ( log ( 1 N R 2 = = ) ) ψ ) 1 ψ ) e i 2 π ( 1 e ( ( log ( 1 N R 1 = = ) ) ψ + ( log ( 1 N R 2 = = ) ) ψ ) 1 ψ ) ) θ S = = ( ( e ( θ S = ( log ( R 1 = = ) ) ψ + ( log ( R 2 = = ) ) ψ ) 1 ψ ) e i 2 π ( e ( θ S = ( log ( I 1 = = ) ) ψ + ( log ( I 2 = = ) ) ψ ) 1 ψ ) , ( 1 e ( θ S = ( log ( 1 N R 1 = = ) ) ψ + ( log ( 1 N R 2 = = ) ) ψ ) 1 ψ ) e i 2 π ( 1 e ( θ S = ( log ( 1 N R 1 = = ) ) ψ + ( log ( 1 N R 2 = = ) ) ψ ) 1 ψ ) ) = ( ( e ( θ S = ( log ( R 1 = = ) ) ψ ) 1 ψ ) e i 2 π ( e ( θ S = ( log ( I 1 = = ) ) ψ ) 1 ψ ) , ( 1 e ( θ S = ( log ( 1 N R 1 = = ) ) ψ ) 1 ψ ) e i 2 π ( 1 e ( θ S = ( log ( 1 N I 1 = = ) ) ψ ) 1 ψ ) ) ( ( e ( θ S = ( log ( R 2 = = ) ) ψ ) 1 ψ ) e i 2 π ( e ( θ S = ( log ( I 2 = = ) ) ψ ) 1 ψ ) , ( 1 e ( θ S = ( log ( 1 N R 2 = = ) ) ψ ) 1 ψ ) e i 2 π ( 1 e ( θ S = ( log ( 1 N I 2 = = ) ) ψ ) 1 ψ ) ) = C 1 = θ S = C 2 = θ S =
    Hence, ( C 1 = C 2 = ) θ S = = C 1 = θ S = C 2 = θ S = .
  • Omitted. □

Appendix B

Proof. 
Based on the initiated laws and mathematical induction, we prove Equation (17); first we have a check for n = 2 , then
W 1 = C 1 = = ( ( 1 e ( W 1 = ( log ( 1 R 1 = = ) ) ψ ) 1 ψ ) e i 2 π ( 1 e ( W 1 = ( log ( 1 I 1 = = ) ) ψ ) 1 ψ ) , ( e ( W 1 = ( log ( N R 1 = = ) ) ψ ) 1 ψ ) e i 2 π ( e ( W 1 = ( log ( N I 1 = = ) ) ψ ) 1 ψ ) )
and
W 2 = C 2 = = ( ( 1 e ( W 2 = ( log ( 1 R 2 = = ) ) ψ ) 1 ψ ) e i 2 π ( 1 e ( W 2 = ( log ( 1 I 2 = = ) ) ψ ) 1 ψ ) , ( e ( W 2 = ( log ( N R 2 = = ) ) ψ ) 1 ψ ) e i 2 π ( e ( W 2 = ( log ( N I 2 = = ) ) ψ ) 1 ψ ) )
then
C I F A A W A ( C 1 = , C 2 = ) = W 1 = C 1 = W 2 = C 2 = = ( ( 1 e ( W 1 = ( log ( 1 R 1 = = ) ) ψ ) 1 ψ ) e i 2 π ( 1 e ( W 1 = ( log ( 1 I 1 = = ) ) ψ ) 1 ψ ) , ( e ( W 1 = ( log ( N R 1 = = ) ) ψ ) 1 ψ ) e i 2 π ( e ( W 1 = ( log ( N I 1 = = ) ) ψ ) 1 ψ ) ) ( ( 1 e ( W 2 = ( log ( 1 R 2 = = ) ) ψ ) 1 ψ ) e i 2 π ( 1 e ( W 2 = ( log ( 1 I 2 = = ) ) ψ ) 1 ψ ) , ( e ( W 2 = ( log ( N R 2 = = ) ) ψ ) 1 ψ ) e i 2 π ( e ( W 2 = ( log ( N I 2 = = ) ) ψ ) 1 ψ ) ) ( ( 1 e ( j = 1 2 W j = ( log ( 1 R j = = ) ) ψ ) 1 ψ ) e i 2 π ( 1 e ( j = 1 2 W j = ( log ( 1 I j = = ) ) ψ ) 1 ψ ) , ( e ( j = 1 2 W j = ( log ( N R j = = ) ) ψ ) 1 ψ ) e i 2 π ( e ( j = 1 2 W j = ( log ( N I j = = ) ) ψ ) 1 ψ ) )
Further, we suggest that if Equation (17) is okay for n = k , then
C I F A A W A ( C 1 = , C 2 = , , C k = ) = ( ( 1 e ( j = 1 k W j = ( log ( 1 R j = = ) ) ψ ) 1 ψ ) e i 2 π ( 1 e ( j = 1 k W j = ( log ( 1 I j = = ) ) ψ ) 1 ψ ) , ( e ( j = 1 k W j = ( log ( N R j = = ) ) ψ ) 1 ψ ) e i 2 π ( e ( j = 1 k W j = ( log ( N I j = = ) ) ψ ) 1 ψ ) )
Then, we will prove that Equation (17) is also held for n = k + 1 , we have
C I F A A W A ( C 1 = , C 2 = , , C k + 1 = ) = j = 1 k + 1 ( W j = C j = ) = j = 1 k ( W j = C j = ) W k + 1 = C k + 1 = = ( ( 1 e ( j = 1 k W j = ( log ( 1 R j = = ) ) ψ ) 1 ψ ) e i 2 π ( 1 e ( j = 1 k W j = ( log ( 1 I j = = ) ) ψ ) 1 ψ ) , ( e ( j = 1 k W j = ( log ( N R j = = ) ) ψ ) 1 ψ ) e i 2 π ( e ( j = 1 k W j = ( log ( N I j = = ) ) ψ ) 1 ψ ) ) ( ( 1 e ( W k + 1 = ( log ( 1 R k + 1 = = ) ) ψ ) 1 ψ ) e i 2 π ( 1 e ( W k + 1 = ( log ( 1 I k + 1 = = ) ) ψ ) 1 ψ ) , ( e ( W k + 1 = ( log ( N R k + 1 = = ) ) ψ ) 1 ψ ) e i 2 π ( e ( W k + 1 = ( log ( N I k + 1 = = ) ) ψ ) 1 ψ ) ) = ( ( 1 e ( j = 1 k + 1 W j = ( log ( 1 R j = = ) ) ψ ) 1 ψ ) e i 2 π ( 1 e ( j = 1 k + 1 W j = ( log ( 1 I j = = ) ) ψ ) 1 ψ ) , ( e ( j = 1 k + 1 W j = ( log ( N R j = = ) ) ψ ) 1 ψ ) e i 2 π ( e ( j = 1 k + 1 W j = ( log ( N I j = = ) ) ψ ) 1 ψ ) )
Hence, the result is investigated correctly. □

Appendix C

Proof. 
Suppose C j = = = = ( R = = e i 2 π ( I = = ) , N R = = e i 2 π ( N I = = ) ) , then
C I F A A W A ( C 1 = , C 2 = , , C n = ) = ( ( 1 e ( j = 1 n W j = ( log ( 1 R j = = ) ) ψ ) 1 ψ ) e i 2 π ( 1 e ( j = 1 n W j = ( log ( 1 I j = = ) ) ψ ) 1 ψ ) , ( e ( j = 1 n W j = ( log ( N R j = = ) ) ψ ) 1 ψ ) e i 2 π ( e ( j = 1 n W j = ( log ( N I j = = ) ) ψ ) 1 ψ ) ) = ( ( 1 e ( ( log ( 1 R = = ) ) ψ ) 1 ψ ) e i 2 π ( 1 e ( ( log ( 1 I = = ) ) ψ ) 1 ψ ) , ( e ( ( log ( N R = = ) ) ψ ) 1 ψ ) e i 2 π ( e ( ( log ( N I = = ) ) ψ ) 1 ψ ) ) = ( ( 1 e log ( 1 R = = ) ) e i 2 π ( 1 e log ( 1 I = = ) ) , ( e log ( N R = = ) ) e i 2 π ( e log ( N I = = ) ) ) = ( R = = e i 2 π ( I = = ) , N R = = e i 2 π ( N I = = ) ) .

Appendix D

Proof. 
Suppose C j = = ( R j = = e i 2 π ( I j = = ) , N R j = = e i 2 π ( N I j = = ) ) , j = 1 , 2 , , n , If = = ( min j R j = = e i 2 π ( min j I j = = ) , max j N R j = = e i 2 π ( max j N I j = = ) ) and = + = ( max j R j = = e i 2 π ( max j I j = = ) , min j N R j = = e i 2 π ( min j N I j = = ) ) , by using inequality, we have
1 e ( j = 1 n W j = ( log ( 1 R j = = ) ) ψ ) 1 ψ 1 e ( j = 1 n W j = ( log ( 1 R j = = ) ) ψ ) 1 ψ 1 e ( j = 1 n W j = ( log ( 1 R j = = + ) ) ψ ) 1 ψ
1 e ( j = 1 n W j = ( log ( 1 I j = = ) ) ψ ) 1 ψ 1 e ( j = 1 n W j = ( log ( 1 I j = = ) ) ψ ) 1 ψ 1 e ( j = 1 n W j = ( log ( 1 I j = = + ) ) ψ ) 1 ψ
e ( j = 1 n W j = ( log ( R j = = ) ) ψ ) 1 ψ e ( j = 1 n W j = ( log ( R j = = ) ) ψ ) 1 ψ e ( j = 1 n W j = ( log ( R j = = + ) ) ψ ) 1 ψ
e ( j = 1 n W j = ( log ( I j = = ) ) ψ ) 1 ψ e ( j = 1 n W j = ( log ( I j = = ) ) ψ ) 1 ψ e ( j = 1 n W j = ( log ( I j = = + ) ) ψ ) 1 ψ
Therefore, we obtained
= C I F A A W A ( C 1 = , C 2 = , , C n = ) = + .

References

  1. Zadeh, L.A. Fuzzy sets. Inf. Control 1965, 8, 338–353. [Google Scholar] [CrossRef] [Green Version]
  2. Yager, R.R. On ordered weighted averaging aggregation operators in multicriteria decision-making. IEEE Trans. Syst. Man Cybern. 1988, 18, 183–190. [Google Scholar] [CrossRef]
  3. Yager, R.R.; Engemann, K.J.; Filev, D.P. On the concept of immediate probabilities. Int. J. Intel. Syst. 1995, 10, 373–397. [Google Scholar] [CrossRef]
  4. Engemann, K.J.; Filev, D.P.; Yager, R.R. Modeling decision-making using immediate probabilities. Int. J. Gen. Syst. 1996, 24, 281–294. [Google Scholar] [CrossRef]
  5. Yager, R.R. Including importance’s in OWA aggregations using fuzzy systems modeling. IEEE Trans. Fuzzy Syst. 1998, 6, 286–294. [Google Scholar] [CrossRef]
  6. Yager, R.R. OWA aggregation of multi-criteria with mixed uncertain satisfactions. Inf. Sci. 2017, 417, 88–95. [Google Scholar] [CrossRef]
  7. Durante, F.; Ricci, R.G. Supermigrativity of aggregation functions. Fuzzy Sets Syst. 2018, 335, 55–66. [Google Scholar] [CrossRef]
  8. Decký, M.; Mesiar, R.; Stupňanová, A. Deviation-based aggregation functions. Fuzzy Sets Syst. 2018, 332, 29–36. [Google Scholar] [CrossRef]
  9. Liu, J.; Chen, H.; Xu, Q.; Zhou, L.; Tao, Z. Generalized ordered modular averaging operator and its application to group decision making. Fuzzy Sets Syst. 2016, 299, 1–25. [Google Scholar] [CrossRef]
  10. Merigó, J.M. OWA operators in the weighted average and their application in decision making. Control Cybern. 2012, 41, 605–643. [Google Scholar]
  11. Merigó, J.M.; Gil-Lafuente, A.M.; Yager, R.R. An overview of fuzzy research with bibliometric indicators. Appl. Soft Comput. 2015, 27, 420–433. [Google Scholar] [CrossRef]
  12. Beliakov, G.; Bustince, H.; Goswami, D.P.; Mukherjee, U.K.; Pal, N.R. On averaging operators for Atanassov’s intuitionistic fuzzy sets. Inf. Sci. 2011, 181, 1116–1124. [Google Scholar] [CrossRef]
  13. Atanassov, K. Intuitionistic fuzzy sets. Fuzzy Sets Syst. 1986, 20, 87–96. [Google Scholar] [CrossRef]
  14. Mahmood, T. A Novel Approach towards Bipolar Soft Sets and Their Applications. J. Math. 2020, 2020, 4690808. [Google Scholar] [CrossRef]
  15. Hassaballah, M.; Ghareeb, A. A framework for objective image quality measures based on intuitionistic fuzzy sets. Appl. Soft Comput. 2017, 57, 48–59. [Google Scholar] [CrossRef]
  16. Senapati, T.; Chen, G.; Yager, R.R. Aczel–Alsina aggregation operators and their application to intuitionistic fuzzy multiple attribute decision making. Int. J. Intel. Syst. 2022, 37, 1529–1551. [Google Scholar] [CrossRef]
  17. Gao, J.; Guo, F.; Ma, Z.; Huang, X. Multi-criteria decision-making framework for large-scale rooftop photovoltaic project site selection based on intuitionistic fuzzy sets. Appl. Soft Comput. 2021, 102, 107098–107122. [Google Scholar] [CrossRef]
  18. Garg, H.; Rani, D. Novel similarity measure based on the transformed right-angled triangles between intuitionistic fuzzy sets and its applications. Cogn. Comput. 2021, 13, 447–465. [Google Scholar] [CrossRef]
  19. Liu, S.; Yu, W.; Chan, F.T.; Niu, B. A variable weight-based hybrid approach for multi-attribute group decision making under interval-valued intuitionistic fuzzy sets. Int. J. Intel. Syst. 2021, 36, 1015–1052. [Google Scholar] [CrossRef]
  20. Yang, J.; Yao, Y. A three-way decision-based construction of shadowed sets from Atanassov intuitionistic fuzzy sets. Inf. Sci. 2021, 577, 1–21. [Google Scholar] [CrossRef]
  21. Xue, Y.; Deng, Y.; Garg, H. Uncertain database retrieval with measure–Based belief function attribute values under intuitionistic fuzzy set. Inf. Sci. 2021, 546, 436–447. [Google Scholar] [CrossRef]
  22. Szmidt, E.; Kacprzyk, J.; Bujnowski, P. How to measure the amount of knowledge conveyed by Atanassov’s intuitionistic fuzzy sets. Inf. Sci. 2014, 257, 276–285. [Google Scholar] [CrossRef]
  23. Bas, E.; Yolcu, U.; Egrioglu, E. Intuitionistic fuzzy time series functions approach for time series forecasting. Granul. Comput. 2021, 6, 619–629. [Google Scholar] [CrossRef] [Green Version]
  24. Wang, Z.J. A representable uninorm-based intuitionistic fuzzy analytic hierarchy process. IEEE Trans. Fuzzy Syst. 2019, 28, 2555–2569. [Google Scholar] [CrossRef]
  25. Ramot, D.; Milo, R.; Friedman, M.; Kandel, A. Complex fuzzy sets. IEEE Trans. Fuzzy Syst. 2002, 10, 171–186. [Google Scholar] [CrossRef]
  26. Zhang, G.; Dillon, T.S.; Cai, K.Y.; Ma, J.; Lu, J. Operation properties and δ-equalities of complex fuzzy sets. Int. J. Approx. Reason. 2009, 50, 1227–1249. [Google Scholar] [CrossRef] [Green Version]
  27. Ramot, D.; Friedman, M.; Langholz, G.; Kandel, A. Complex fuzzy logic. IEEE Trans. Fuzzy Syst. 2003, 11, 450–461. [Google Scholar] [CrossRef]
  28. Chen, Z.; Aghakhani, S.; Man, J.; Dick, S. ANCFIS: A neurofuzzy architecture employing complex fuzzy sets. IEEE Trans. Fuzzy Syst. 2010, 19, 305–322. [Google Scholar] [CrossRef]
  29. Liu, P.; Ali, Z.; Mahmood, T. The distance measures and cross-entropy based on complex fuzzy sets and their application in decision making. J. Intel. Fuzzy Syst. 2020, 39, 3351–3374. [Google Scholar] [CrossRef]
  30. Alkouri, A.M.D.J.S.; Salleh, A.R. Complex intuitionistic fuzzy sets. AIP Conf. Proc. Am. Inst. Phys. 2012, 1482, 464–470. [Google Scholar]
  31. Garg, H.; Rani, D. Novel aggregation operators and ranking method for complex intuitionistic fuzzy sets and their applications to decision-making process. Artif. Intel. Rev. 2020, 53, 3595–3620. [Google Scholar] [CrossRef]
  32. Garg, H.; Rani, D. Generalized geometric aggregation operators based on t-norm operations for complex intuitionistic fuzzy sets and their application to decision-making. Cogn. Comput. 2020, 12, 679–698. [Google Scholar] [CrossRef]
  33. Garg, H.; Rani, D. Robust averaging–geometric aggregation operators for complex intuitionistic fuzzy sets and their applications to MCDM process. Arab. J. Sci. Engine 2020, 45, 2017–2033. [Google Scholar] [CrossRef]
  34. Garg, H.; Rani, D. Some generalized complex intuitionistic fuzzy aggregation operators and their application to multicriteria decision-making process. Arab. J. Sci. Engine 2019, 44, 2679–2698. [Google Scholar] [CrossRef]
  35. Ali, Z.; Mahmood, T.; Aslam, M.; Chinram, R. Another View of Complex Intuitionistic Fuzzy Soft Sets Based on Prioritized Aggregation Operators and Their Applications to Multiattribute Decision Making. Mathematics 2021, 9, 1922. [Google Scholar] [CrossRef]
  36. Menger, K. Statistical metrics. Proc. Natl. Acad. Sci. USA 1942, 28, 535–561. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  37. Garg, H.; Rani, D. Novel distance measures for intuitionistic fuzzy sets based on various triangle centers of isosceles triangular fuzzy numbers and their applications. Expert Syst. Appl. 2022, 191, 116228. [Google Scholar]
  38. Xia, M.; Xu, Z.; Zhu, B. Some issues on intuitionistic fuzzy aggregation operators based on Archimedean t-conorm and t-norm. Knowl.-Based Syst. 2012, 31, 78–88. [Google Scholar] [CrossRef]
  39. Liu, P. Some Hamacher aggregation operators based on the interval-valued intuitionistic fuzzy numbers and their application to group decision making. IEEE Trans. Fuzzy Syst. 2013, 22, 83–97. [Google Scholar] [CrossRef]
  40. Deschrijver, G.; Cornelis, C.; Kerre, E.E. On the representation of intuitionistic fuzzy t-norms and t-conorms. IEEE Trans. Fuzzy Syst. 2004, 12, 45–61. [Google Scholar] [CrossRef]
  41. Klement, E.P.; Mesiar, R. Triangular norms. Tatra Mt. Math. Publ. 1997, 13, 169–193. [Google Scholar]
  42. Aczél, J.; Alsina, C. Characterizations of some classes of quasilinear functions with applications to triangular norms and to synthesizing judgements. Aequ. Math. 1982, 25, 313–315. [Google Scholar] [CrossRef]
  43. Xu, Z. Intuitionistic fuzzy aggregation operators. IEEE Trans. Fuzzy Syst. 2007, 15, 1179–1187. [Google Scholar]
  44. Xu, Z.; Yager, R.R. Some geometric aggregation operators based on intuitionistic fuzzy sets. Int. J. Gen. Syst. 2006, 35, 417–433. [Google Scholar] [CrossRef]
  45. Wang, W.; Liu, X. Intuitionistic fuzzy information aggregation using Einstein operations. IEEE Trans. Fuzzy Syst. 2012, 20, 923–938. [Google Scholar] [CrossRef]
  46. Wang, W.; Liu, X. Intuitionistic fuzzy geometric aggregation operators based on Einstein operations. Int. J. Intel. Syst. 2011, 26, 1049–1075. [Google Scholar] [CrossRef]
  47. Huang, J.Y. Intuitionistic fuzzy Hamacher aggregation operators and their application to multiple attribute decision making. J. Intel. Fuzzy Syst. 2014, 27, 505–513. [Google Scholar] [CrossRef]
  48. Seikh, M.R.; Mandal, U. Intuitionistic fuzzy Dombi aggregation operators and their application to multiple attribute decision-making. Granul. Comput. 2021, 6, 473–488. [Google Scholar] [CrossRef]
  49. Liu, P.; Ali, Z.; Mahmood, T. A method to multi-attribute group decision-making problem with complex q-rung orthopair linguistic information based on Heronian mean operators. Int. J. Comput. Intel. Syst. 2021, 12, 1465–1496. [Google Scholar] [CrossRef] [Green Version]
  50. Ali, Z.; Mahmood, T. Maclaurin symmetric mean operators and their applications in the environment of complex q-rung orthopair fuzzy sets. Comput. Appl. Math. 2020, 39, 1–27. [Google Scholar] [CrossRef]
  51. Ali, Z.; Mahmood, T.; Yang, M.S. TOPSIS method based on complex spherical fuzzy sets with Bonferroni mean operators. Mathematics 2020, 8, 1739. [Google Scholar] [CrossRef]
  52. Ali, Z.; Mahmood, T.; Yang, M.S. Complex T-spherical fuzzy aggregation operators with application to multi-attribute decision making. Symmetry 2020, 12, 1311. [Google Scholar] [CrossRef]
  53. Mahmood, T.; Ullah, K.; Khan, Q.; Jan, N. An approach toward decision-making and medical diagnosis problems using the concept of spherical fuzzy sets. Neural Comput. Appl. 2019, 31, 7041–7053. [Google Scholar] [CrossRef]
  54. Ullah, K.; Garg, H.; Mahmood, T.; Jan, N.; Ali, Z. Correlation coefficients for T-spherical fuzzy sets and their applications in clustering and multi-attribute decision making. Soft Comput. 2020, 24, 1647–1659. [Google Scholar] [CrossRef]
  55. Munir, M.; Kalsoom, H.; Ullah, K.; Mahmood, T.; Chu, Y.M. T-spherical fuzzy Einstein hybrid aggregation operators and their applications in multi-attribute decision making problems. Symmetry 2020, 12, 365. [Google Scholar] [CrossRef]
  56. Ashraf, S.; Abdullah, S.; Aslam, M.; Qiyas, M.; Kutbi, M.A. Spherical fuzzy sets and its representation of spherical fuzzy t-norms and t-conorms. J. Intel. Fuzzy Syst. 2019, 36, 6089–6102. [Google Scholar] [CrossRef]
  57. Jin, Y.; Ashraf, S.; Abdullah, S. Spherical fuzzy logarithmic aggregation operators based on entropy and their application in decision support systems. Entropy 2019, 21, 628. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  58. Tang, Y.M.; Zhang, L.; Bao, G.Q.; Ren, F.J.; Pedrycz, W. (2104-6628) Symmetric implicational algorithm derived from intuitionistic fuzzy entropy. Iran. J. Fuzzy Syst. 2022, 19, 27–44. [Google Scholar]
  59. Riaz, M.; Hashmi, M.R. Linear Diophantine fuzzy set and its applications towards multi-attribute decision-making problems. J. Intel. Fuzzy Syst. 2019, 37, 5417–5439. [Google Scholar] [CrossRef]
  60. Riaz, M.; Hashmi, M.R.; Kalsoom, H.; Pamucar, D.; Chu, Y.M. Linear Diophantine fuzzy soft rough sets for the selection of sustainable material handling equipment. Symmetry 2020, 12, 1215. [Google Scholar] [CrossRef]
  61. Riaz, M.; Hashmi, M.R.; Pamucar, D.; Chu, Y.M. Spherical linear Diophantine fuzzy sets with modeling uncertainties in MCDM. Comput. Model Engine Sci. 2021, 126, 1125–1164. [Google Scholar] [CrossRef]
  62. Riaz, M.; Farid, H.M.A.; Aslam, M.; Pamucar, D.; Bozanić, D. Novel approach for third-party reverse logistic provider selection process under linear diophantine fuzzy prioritized aggregation operators. Symmetry 2021, 13, 1152. [Google Scholar] [CrossRef]
Figure 1. The main theme of the proposed analysis is given above.
Figure 1. The main theme of the proposed analysis is given above.
Symmetry 14 02255 g001
Table 1. The complex intuitionistic fuzzy information.
Table 1. The complex intuitionistic fuzzy information.
Alternatives/Attributes C 1 = C 2 =
C 1 = ( 0.5 e i 2 π ( 0.4 ) , 0.3 e i 2 π ( 0.4 ) ) ( 0.51 e i 2 π ( 0.41 ) , 0.31 e i 2 π ( 0.41 ) )
C 2 = ( 0.4 e i 2 π ( 0.1 ) , 0.1 e i 2 π ( 0.1 ) ) ( 0.41 e i 2 π ( 0.11 ) , 0.11 e i 2 π ( 0.11 ) )
C 3 = ( 0.5 e i 2 π ( 0.2 ) , 0.4 e i 2 π ( 0.3 ) ) ( 0.51 e i 2 π ( 0.21 ) , 0.41 e i 2 π ( 0.31 ) )
C 4 = ( 0.3 e i 2 π ( 0.5 ) , 0.1 e i 2 π ( 0.2 ) ) ( 0.31 e i 2 π ( 0.51 ) , 0.11 e i 2 π ( 0.21 ) )
C 5 = ( 0.5 e i 2 π ( 0.5 ) , 0.1 e i 2 π ( 0.3 ) ) ( 0.51 e i 2 π ( 0.51 ) , 0.11 e i 2 π ( 0.31 ) )
Alternatives/Attributes C 3 = C 4 =
C 1 = ( 0.52 e i 2 π ( 0.42 ) , 0.32 e i 2 π ( 0.42 ) ) ( 0.53 e i 2 π ( 0.43 ) , 0.33 e i 2 π ( 0.43 ) )
C 2 = ( 0.42 e i 2 π ( 0.12 ) , 0.12 e i 2 π ( 0.12 ) ) ( 0.43 e i 2 π ( 0.13 ) , 0.13 e i 2 π ( 0.13 ) )
C 3 = ( 0.52 e i 2 π ( 0.22 ) , 0.42 e i 2 π ( 0.32 ) ) ( 0.53 e i 2 π ( 0.23 ) , 0.43 e i 2 π ( 0.33 ) )
C 4 = ( 0.32 e i 2 π ( 0.52 ) , 0.12 e i 2 π ( 0.22 ) ) ( 0.33 e i 2 π ( 0.53 ) , 0.13 e i 2 π ( 0.23 ) )
C 5 = ( 0.52 e i 2 π ( 0.52 ) , 0.12 e i 2 π ( 0.32 ) ) ( 0.53 e i 2 π ( 0.53 ) , 0.13 e i 2 π ( 0.33 ) )
Table 2. The aggregated operators for ψ = 1 .
Table 2. The aggregated operators for ψ = 1 .
AlternativesCIFAAWA OperatorCIFAAWG Operator
C 1 = ( 0.2665 e i 2 π ( 0.2048 ) , 0.6012 e i 2 π ( 0.6789 ) ) ( 0.7464 e i 2 π ( 0.6789 ) , 0.1489 e i 2 π ( 0.2048 ) )
C 2 = ( 0.2048 e i 2 π ( 0.0494 ) , 0.3828 e i 2 π ( 0.3828 ) ) ( 0.6789 e i 2 π ( 0.3828 ) , 0.0494 e i 2 π ( 0.0494 ) )
C 3 = ( 0.2665 e i 2 π ( 0.0973 ) , 0.6789 e i 2 π ( 0.6012 ) ) ( 0.7464 e i 2 π ( 0.5075 ) , 0.2048 e i 2 π ( 0.1489 ) )
C 4 = ( 0.1489 e i 2 π ( 0.2665 ) , 0.3828 e i 2 π ( 0.5075 ) ) ( 0.6012 e i 2 π ( 0.7464 ) , 0.0494 e i 2 π ( 0.0973 ) )
C 5 = ( 0.2665 e i 2 π ( 0.2665 ) , 0.3828 e i 2 π ( 0.3828 ) ) ( 0.7464 e i 2 π ( 0.7464 ) , 0.0494 e i 2 π ( 0.0494 ) )
Table 3. The Score values.
Table 3. The Score values.
AlternativesCIFAAWA OperatorCIFAAWG Operator
C 1 = −0.40440.5358
C 2 = −0.25570.4814
C 3 = −0.45810.4501
C 4 = −0.23750.6004
C 5 = −0.11630.697
Table 4. The ranking values.
Table 4. The ranking values.
CIFAAWA Operator C 5 = > C 4 = > C 1 = > C 2 = > C 3 =
CIFAAWG Operator C 5 = > C 4 = > C 2 = > C 1 = > C 3 =
Table 5. The intuitionistic fuzzy information.
Table 5. The intuitionistic fuzzy information.
Alternatives/Attributes C 1 = C 2 = C 3 = C 4 =
C 1 = ( 0.5 , 0.3 ) ( 0.51 , 0.31 ) ( 0.52 , 0.32 ) ( 0.53 , 0.33 )
C 2 = ( 0.4 , 0.1 ) ( 0.41 , 0.11 ) ( 0.42 , 0.12 ) ( 0.43 , 0.13 )
C 3 = ( 0.5 , 0.4 ) ( 0.51 , 0.41 ) ( 0.52 , 0.42 ) ( 0.53 , 0.43 )
C 4 = ( 0.3 , 0.1 ) ( 0.31 , 0.11 ) ( 0.32 , 0.12 ) ( 0.33 , 0.13 )
C 5 = ( 0.5 , 0.1 ) ( 0.51 , 0.11 ) ( 0.52 , 0.12 ) ( 0.53 , 0.13 )
Table 6. The aggregated operators for ψ = 1 .
Table 6. The aggregated operators for ψ = 1 .
AlternativesCIFAAWA OperatorCIFAAWG Operator
C 1 = ( 0.2665 , 0.6012 ) ( 0.7464 , 0.1489 )
C 2 = ( 0.2048 , 0.3828 ) ( 0.6789 , 0.0494 )
C 3 = ( 0.2665 , 0.6789 ) ( 0.7464 , 0.2048 )
C 4 = ( 0.1489 , 0.3828 ) ( 0.6012 , 0.0494 )
C 5 = ( 0.2665 , 0.3828 ) ( 0.7464 , 0.0494 )
Table 7. The Score values.
Table 7. The Score values.
AlternativesCIFAAWA OperatorCIFAAWG Operator
C 1 = −0.16740.2988
C 2 = −0.0890.3147
C 3 = −0.20620.2708
C 4 = −0.11690.2759
C 5 = −0.05810.3485
Table 8. The ranking values.
Table 8. The ranking values.
CIFAAWA Operator C 5 = > C 2 = > C 1 = > C 4 = > C 3 =
CIFAAWG Operator C 5 = > C 2 = > C 1 = > C 4 = > C 3 =
Table 9. The fluency for the different values of parameter ψ by using the data in Table 1.
Table 9. The fluency for the different values of parameter ψ by using the data in Table 1.
ParameterOperatorScore ValuesRanking Values
ψ = 1 CIFAAWA Operator 0.4044 , 0.2557 , 0.4581 , 0.2375 , 0.1163 C 5 = > C 4 = > C 1 = > C 2 = > C 3 =
CIFAAWG Operator 0.5358 , 0.4814 , 0.4501 , 0.6004 , 0.697 C 5 = > C 4 = > C 2 = > C 1 = > C 3 =
ψ = 5 CIFAAWA Operator 0.4036 , 0.2538 , 0.4572 , 0.2362 , 0.1147 C 5 = > C 4 = > C 1 = > C 2 = > C 3 =
CIFAAWG Operator 0.535 , 0.4797 , 0.4492 , 0.5993 , 0.6957 C 5 = > C 4 = > C 2 = > C 1 = > C 3 =
ψ = 11 CIFAAWA Operator 0.4024 , 0.2512 , 0.4559 , 0.2343 , 0.1126 C 5 = > C 4 = > C 1 = > C 2 = > C 3 =
CIFAAWG Operator 0.5338 , 0.4773 , 0.4479 , 0.5976 , 0.6938 C 5 = > C 4 = > C 2 = > C 1 = > C 3 =
ψ = 51 CIFAAWA Operator 0.3957 , 0.2409 , 0.449 , 0.2253 , 0.1024   C 5 = > C 4 = > C 1 = > C 2 = > C 3 =
CIFAAWG Operator 0.5275 , 0.4684 , 0.4409 , 0.5906 , 0.687 C 5 = > C 4 = > C 2 = > C 1 = > C 3 =
ψ = 101 CIFAAWA Operator 0.3913 , 0.2363 , 0.445 , 0.2202 , 0.0967 C 5 = > C 4 = > C 1 = > C 2 = > C 3 =
CIFAAWG Operator 0.5236 , 0.4652 , 0.4366 , 0.5875 , 0.6846 C 5 = > C 4 = > C 2 = > C 1 = > C 3 =
Table 10. The fluency for the different values of parameter ψ by using the data in Table 5.
Table 10. The fluency for the different values of parameter ψ by using the data in Table 5.
ParameterOperatorScore ValuesRanking Values
ψ = 1 CIFAAWA Operator 0.1674 , 0.089 , 0.2062 , 0.1169 , 0.0581 C 5 = > C 2 = > C 1 = > C 4 = > C 3 =
CIFAAWG Operator 0.2988 , 0.3147 , 0.2708 , 0.2759 , 0.3485 C 5 = > C 2 = > C 1 = > C 4 = > C 3 =
ψ = 5 CIFAAWA Operator 0.1669 , 0.0882 , 0.2058 , 0.1161 , 0.0574 C 5 = > C 2 = > C 1 = > C 4 = > C 3 =
CIFAAWG Operator 0.2984 , 0.3141 , 0.2704 , 0.2752 , 0.3479 C 5 = > C 2 = > C 1 = > C 4 = > C 3 =
ψ = 11 CIFAAWA Operator 0.1663 , 0.0871 , 0.2052 , 0.115 , 0.0563 C 5 = > C 2 = > C 1 = > C 4 = > C 3 =
CIFAAWG Operator 0.2978 , 0.3131 , 0.2698 , 0.2742 , 0.3469 C 5 = > C 2 = > C 1 = > C 4 = > C 3 =
ψ = 51 CIFAAWA Operator 0.1629 , 0.0821 , 0.202 , 0.1099 , 0.0512 C 5 = > C 2 = > C 1 = > C 4 = > C 3 =
CIFAAWG Operator 0.2946 , 0.3096 , 0.2668 , 0.2705 , 0.3435 C 5 = > C 2 = > C 1 = > C 4 = > C 3 =
ψ = 101 CIFAAWA Operator 0.1605 , 0.0794 , 0.1997 , 0.1074 , 0.0483 C 5 = > C 2 = > C 1 = > C 4 = > C 3 =
CIFAAWG Operator 0.2928 , 0.3083 , 0.2648 , 0.269 , 0.3423 C 5 = > C 2 = > C 1 = > C 4 = > C 3 =
Table 11. The sensitivity analysis by using the data in Table 1.
Table 11. The sensitivity analysis by using the data in Table 1.
MethodsScore ValuesRanking Values
Xu [43] × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × ×
Xu and Yager [44] × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × ×
Wang and Liu [45] × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × ×
Wang and Liu [46] × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × ×
Huang [47] × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × ×
Seikh and Mandal [48] × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × ×
Garg and Rani [31] 0.5349 , 0.4805 , 0.4502 , 0.6003 , 0.688 C 5 = > C 4 = > C 2 = > C 1 = > C 3 =
Garg and Rani [32] 0.4257 , 0.3713 , 0.3400 , 0.5003 , 0.586 C 5 = > C 4 = > C 2 = > C 1 = > C 3 =
CIFAAWA operator 0.4044 , 0.2557 , 0.4581 , 0.2375 , 0.1163 C 5 = > C 4 = > C 1 = > C 2 = > C 3 =
CIFAAWG operator 0.5358 , 0.4814 , 0.4501 , 0.6004 , 0.697 C 5 = > C 4 = > C 2 = > C 1 = > C 3 =
Table 12. The sensitivity analysis by using the data in Table 5.
Table 12. The sensitivity analysis by using the data in Table 5.
MethodsScore ValuesRanking Values
Xu [43] 0.1877 , 0.2036 , 0.1607 , 0.1648 , 0.2374 C 5 = > C 2 = > C 1 = > C 4 = > C 3 =
Xu and Yager [44] 0.2946 , 0.3096 , 0.2668 , 0.2705 , 0.3435 C 5 = > C 2 = > C 1 = > C 4 = > C 3 =
Wang and Liu [45] 0.1563 , 0.078 , 0.2051 ,   0.1158 , 0.0570 C 5 = > C 2 = > C 1 = > C 4 = > C 3 =
Wang and Liu [46] 0.5944 , 0.6102 , 0.5703 , 0.5704 , 0.6441 C 5 = > C 2 = > C 1 = > C 4 = > C 3 =
Huang [47] 0.3957 , 0.4097 , 0.3679 , 0.3716 , 0.4446 C 5 = > C 2 = > C 1 = > C 4 = > C 3 =
Seikh and Mandal [48] 0.6955 , 0.7113 , 0.6714 , 0.6715 , 0.7452 C 5 = > C 2 = > C 1 = > C 4 = > C 3 =
Garg and Rani [31] 0.2977 , 0.3136 , 0.2707 , 0.2748 , 0.3474 C 5 = > C 2 = > C 1 = > C 4 = > C 3 =
Garg and Rani [32] 0.1899 , 0.2058 , 0.1619 , 0.1669 , 0.2396 C 5 = > C 2 = > C 1 = > C 4 = > C 3 =
CIFAAWA operator 0.1674 , 0.089 , 0.2062 ,   0.1169 , 0.0581 C 5 = > C 2 = > C 1 = > C 4 = > C 3 =
CIFAAWG operator 0.2988 , 0.3147 , 0.2708 , 0.2759 , 0.3485 C 5 = > C 2 = > C 1 = > C 4 = > C 3 =
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Mahmood, T.; Ali, Z.; Baupradist, S.; Chinram, R. Complex Intuitionistic Fuzzy Aczel-Alsina Aggregation Operators and Their Application in Multi-Attribute Decision-Making. Symmetry 2022, 14, 2255. https://doi.org/10.3390/sym14112255

AMA Style

Mahmood T, Ali Z, Baupradist S, Chinram R. Complex Intuitionistic Fuzzy Aczel-Alsina Aggregation Operators and Their Application in Multi-Attribute Decision-Making. Symmetry. 2022; 14(11):2255. https://doi.org/10.3390/sym14112255

Chicago/Turabian Style

Mahmood, Tahir, Zeeshan Ali, Samruam Baupradist, and Ronnason Chinram. 2022. "Complex Intuitionistic Fuzzy Aczel-Alsina Aggregation Operators and Their Application in Multi-Attribute Decision-Making" Symmetry 14, no. 11: 2255. https://doi.org/10.3390/sym14112255

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop