Next Article in Journal
A Method of Calculation of Non-Homogeneous, Rotationally Symmetric Circular Plates, Supported on Piles
Previous Article in Journal
Cubic q-Rung Orthopair Hesitant Exponential Similarity Measures for the Initial Diagnosis of Depression Grades
Previous Article in Special Issue
A Novel Decision-Making Method for Selecting Superintendent Based on a Q-Rung Dual Hesitant Fuzzy Power Partitioned Bonferroni Mean Operator
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Bi-Matrix Games with General Intuitionistic Fuzzy Payoffs and Application in Corporate Environmental Behavior

School of Public Policy and Administration, Nanchang University, Nanchang 330031, China
*
Author to whom correspondence should be addressed.
Symmetry 2022, 14(4), 671; https://doi.org/10.3390/sym14040671
Submission received: 3 March 2022 / Revised: 19 March 2022 / Accepted: 22 March 2022 / Published: 24 March 2022

Abstract

:
Uncertainty is common in miscellaneous decision-making problems, including bi-matrix games. The uncertainty of bi-matrix games is caused by the complexity of the game environment and the limitations of players’ cognition rather than the asymmetry of information. Therefore, it is hard for players to precisely give their crisp payoff values. In this paper, a new method considering the acceptance degree that the general intuitionistic fuzzy constraints may be violated is developed to solve general intuitionistic fuzzy bi-matrix games (GIFBMGs). In the method, a new asymmetric general intuitionistic fuzzy number (GIFN) and its cut sets are firstly defined. Then, the order relationship of GIFNs and the definitions of α and β-bi-matrix games are proposed. Afterwards, the constructed general intuitionistic fuzzy quadratic program is converted into an interval bi-objective program on the basis of the order relationship of GIFNs. Furthermore, the interval bi-objective program is converted into a multi-objective quadratic program based on the combination of interval order relationship and the player’s acceptance degree. A goal programming approach is put forward to solve the multi-objective quadratic program. Finally, the validity of the proposed method is verified with a numerical example for corporate environmental behavior (CEB), and some comparative analyses are conducted to show the superiority of the proposed method.

1. Introduction

In recent years, with the rapid development of economy and industrial enterprises, environmental pollution has become more and more serious. Although the Chinese government has placed great emphasis on the issue of environmental pollution and formulated plenty of related policies, environmental pollution incidents have still occurred from time to time and existed for a long time. For example, in 2020, Anhui Xinke Copper Co., Ltd., located in Anhui Province, China, was fined 1.09 million yuan for illegally discharging water pollutants by means of tampering with or falsifying monitoring data to evade supervision. Taizhou Zhengang Dyestuff Chemical Co., Ltd., a subsidiary of Haixiang pharmaceutical, located in Zhejiang Province, China, was fined 1 million yuan for discharging water pollutants by evading supervision. Industrial enterprises can rapidly promote the economic development, but at the same time, they also produce a great deal of pollution in the production process, which is the key factor leading to environmental degradation. Hence, corporate environmental behavior (CEB) has attracted more and more attention from the academic community. He et al. [1] deemed that a useful measure to settle current environmental issues is encouraging corporations to take active environmental behavior. Jiménez-Parra et al. [2] believed that the efforts of enterprises in environmental behavior can not only win a quite good reputation but also ameliorate their production process and emit less pollution. However, due to the high cost of pollution control and the externality of the use of public resources, enterprises will not take the initiative to implement environmental behavior. Therefore, the regulation of the government is very important. To sum up, it is of great significance to study the game between enterprises and government. In the game process, the enterprise is maximizing its own benefits and the government is maximizing social welfare. Therefore, the game between the government and the enterprise can be regarded as a bi-matrix game problem. The bi-matrix game studied in this paper is a two-person non-zero-sum non-cooperative game, which is the basis of asymmetric information game theory. For the information situation, the former is information decentralization, and the latter is information asymmetry.
Recently, many researchers have conducted some in-depth studies on matrix games [3,4,5,6] and bi-matrix games [7,8,9,10,11,12]. In a bi-matrix game, the aims of players are to maximize their profits. The bi-matrix game has been successfully applied in the fields of security [13], tourism management [14,15], and environmental management [16]. As we all know, the payoff values of the classical bi-matrix game are based on the precise information. However, with the increasing complexity of the actual game environment, players are often unable to accurately give their own payoffs in advance. In such a case, it is obviously improper to use the exact information to express players’ payoffs. Therefore, it is very urgent to find a suitable approach to solving this kind of problem. Since Zadeh [17] put forward the fuzzy set theory in 1965, its birth and development provided an effective tool for addressing the above problems. In the actual complex game environment, the use of fuzzy sets can express the players’ payoffs more accurate than crisp values and make the decision results more reliable. Scholars have studied the bi-matrix game in detail based on the probability measure of fuzzy numbers [18], ranking method of fuzzy numbers [19], and the idea of introducing “nature” as a participant [20], respectively.
Since Zadeh’s classical fuzzy set [17] only considered the membership function and omitted the non-membership function, Atanassov [21] put forward the concept of the intuitionistic fuzzy set (IFS) in 1986. IFSs can display players’ preference information from the three aspects of approval, disapproval, and neutrality. Thus, IFSs have stronger ability in depicting uncertain information than Zadeh’s classical fuzzy set, and it is more useful and reasonable to use IFSs to represent the uncertain information of bi-matrix games. At present, there are many investigations on bi-matrix games with IFSs [22,23], triangular intuitionistic fuzzy numbers (TIFNs) [24,25,26], trapezoidal intuitionistic fuzzy numbers (TrIFNs) [27,28,29], and Atanassov’s intuitionistic fuzzy (I-fuzzy) numbers [30,31]. Nan et al. [23] developed a novel method to solve bi-matrix games, in which the goals and payoffs are represented with IFSs and TIFNs, respectively. In order to obtain the equilibrium solution of bi-matrix games, Seikh et al. [25] built an intuitionistic fuzzy non-linear programming model based on the proposed ranking function of TIFNs. Li and Yang [27] constructed a bilinear programming model to solve bi-matrix games by using the developed ranking method of TrIFNs. An et al. [31] put forward a weighted mean-area ranking method of IFNs and constructed a parameterized non-linear programming model for solving intuitionistic fuzzy bi-matrix games (IFBMG). In recent years, various forms of extension has been developed from intuitionistic fuzzy information, such as intuitionistic fuzzy preference relation [32], triangular type-2 intuitionistic fuzzy sets [33], hesitant interval-valued intuitionistic fuzzy-linguistic term sets [34], and intuitionistic interval-valued hesitant fuzzy sets [35]. Moreover, the above-mentioned extensions are expected to be applied to bi-matrix games in the future. In a word, it is necessary to extend the classical game to an intuitionistic fuzzy environment for solving practical decision-making problems. Recently, some scholars have conducted research on environmental management game problems with fuzzy information [36,37,38,39,40]. Thus, this paper aims to study the bi-matrix game with its application in CEB from the perspective of intuitionistic fuzzy information.
All the above-mentioned bi-matrix game methods transformed the intuitionistic fuzzy quadratic program into crisp or parameterized quadratic programming problems by using different ranking functions [25,26,27,28,29,30,31]. Although these methods appear to be valid for solving bi-matrix games, there are still some deficiencies, which are summarized as follows:
  • It is efficacious and suitable to employ cut sets for managing the intuitionistic fuzzy preference, since it can maintain as much information as impossible. Although the existing ranking methods [25,26,27,28,30,31] of IFNs considered the concept of cut sets, the intuitionistic fuzzy preferences are directly converted into real numbers for comparison, which greatly reduces the advantage of considering intuitionistic fuzzy information. Moreover, it does not show the change of the Nash equilibrium value with respect to the cut sets.
  • These methods [25,26,27,28,29,30,31] directly converted the intuitionistic fuzzy quadratic programming model into a crisp quadratic programming model via using different sorting functions. Such conversion would easily give rise to serious distortion of original information and may result in ill-advised outcomes.
  • The existing works [25,26,27,28,29,30,31] on bi-matrix games ignored the player’s acceptance degree of the possible violation of intuitionistic fuzzy constraints. Actually, a few intuitionistic fuzzy constraints may be violated, while the player can still allow such a violation with certain acceptance degrees. Consequently, it is rational and essential to consider players’ acceptance degrees when solving intuitionistic fuzzy quadratic programming.
In order to surmount the aforementioned shortcomings, this paper proposes a new method for solving a bi-matrix game with payoffs of general intuitionistic fuzzy (GIF) numbers (GIFNs), which considers the players’ acceptance degrees that GIF constraints violated. The main contributions and novelties of this study can be summarized as follows:
1.
This paper provides a new way to tackle GIF information, which can preserve the information better. The proposed method can provide more detailed information regarding the Nash equilibrium value and the Nash equilibrium strategy, including the tendency of upper and lower bounds of the interval-type values of the α and β -bi-matrix games and players’ Nash equilibrium strategies at different < α , β > levels.
2.
During the processes of model conversion and solution, this paper not only skillfully combines interval order relation [41] with an interval goal program [42] but also considers the player’s acceptance degree, and these processes are rigorous, meaningful, and reasonable.
3.
Full consideration of a player’s acceptance degree of the possible violation of GIF constraints makes the outcomes of bi-matrix games more in line with the actual situation. By adjusting various acceptance degrees, players can acquire different Nash equilibrium strategies and Nash equilibrium values, which improves the flexibility of players’ strategy choices greatly.
4.
The proposed method can be adopted to solve the bi-matrix game with the special forms of GIFNs (e.g., crisp numbers, intervals, TrFNs, and IFNs). It has a wider range of applications and can be applied to a variety of practical game problems.
The coming parts are organized as follows. In Section 2, some related preliminaries are briefly recalled. In Section 3, a new asymmetric GIFN and its cut sets and the order relation for GIFNs are defined. In Section 4, α and β-bi-matrix games are defined, and a new method considering the player’s acceptance degree for solving GIF bi-matrix games (GIFBMGs) is developed. The effectiveness of the proposed method is illustrated with a CEB strategy choice problem, and the comparison analyses are conducted in Section 5. Section 6 explains the advantages and disadvantages of this paper. At last, Section 7 concludes this paper.

2. Preliminaries

This section mainly reviews some basic concepts of IFNs and its cut sets, order relation for intervals, objective function of intervals, and the classical bi-matrix games.

2.1. IFN and Cut Sets

Definition 1
([43]). An IFN h ˜ is defined as a special IFS on the real number set R , whose membership function μ h ˜ : R [ 0 , 1 ] and non-membership function υ h ˜ : R [ 0 , 1 ] should satisfy the four conditions as follows:
  • There exist at least two real numbers x 0 , x 0 R such that μ h ˜ ( x 0 ) = 1 and υ h ˜ ( x 0 ) = 0 ;
  • μ h ˜ is quasi concave and upper semi-continuous on R ;
  • υ h ˜ is quasi convex and lower semi-continuous on R ;
  • The support sets { x | μ h ˜ ( x ) > 0 , x R } and { x | υ h ˜ ( x ) < 1 , x R } are bounded.
Definition 2
([44]). Let h ˜ be an arbitrary IFN, w h ˜ [ 0 , 1 ] and u h ˜ [ 0 , 1 ] represent the maximum membership degree and the minimum non-membership degree, respectively, where w h ˜ + u h ˜ 1 . a < α , β > -cut set of h ˜ is a crisp subset of R , which is defined as h ˜ < α , β > = { x | μ h ˜ ( x ) α , υ h ˜ ( x ) β } , where 0 α w h ˜ , u h ˜ β 1 , and 0 α + β 1 .
Definition 3
([44]). For 0 α w h ˜ , an α -cut set of an IFN h ˜ is given by: h ˜ α = { x | μ h ˜ ( x ) α } .
Definition 4
([44]). For u h ˜ β 1 , a β -cut set of an IFN h ˜ are given by: h ˜ β = { x | υ h ˜ ( x ) β } .
Theorem 1
([45]). Let h ˜ be an arbitrary IFN. For any ordered pair < α , β > , where α [ 0 , w h ˜ ] , β [ u h ˜ , 1 ] , and 0 α + β 1 , the equality h ˜ < α , β > = h ˜ α h ˜ β is valid.

2.2. Order Relation for Intervals and Interval Objective Function

Definition 5
([41]). Given two intervals m = [ m l , m u ] and n = [ n l , n u ] , respectively. Consider the order relation m I n as a fuzzy set, the membership degree of order relation m I n is given as follows:
f ( m I n ) = 1   if   m u n l 1   if   m l n l m u n u   and   r ( m ) > 0 ( n u m u ) / [ 2 ( r ( n ) r ( m ) ) ]   if   n l m l m u n u   and   r ( n ) > r ( m ) 0.5   if   r ( m ) = r ( n )   and   m l = n l
where the meaning of 1 is a fuzzy value being smaller than one, indicating that m is infirmly not larger than n . r ( m ) = ( m u m l ) / 2 and r ( n ˜ ) = ( n u n l ) / 2 are the radius of the intervals m and n . The symbol “ I ” is an interval edition of the order relation “ ” in R and has the linguistic explication “basically not larger than”.
Definition 6
([41]). Let m = [ m l , m u ] and n = [ n l , n u ] be two intervals. Consider the order relation m I n as a fuzzy set, the membership degree of order relation m I n is given as follows:
f ( m I n ) = 0   if   m u n l 0   if   m l n l m u n u   and   r ( m ) > 0 ( m l n l ) / [ 2 ( r ( n ) r ( m ) ) ]   if   n l m l m u n u   and   r ( n ) > r ( m ) 0.5   if   r ( m ) = r ( n )   and   m l = n l
where 0 means a fuzzy value being larger than zero, implying that m is infirmly not smaller than n . The symbol “ I ” is an interval version of the order relation “ ” in R and has the linguistic statement ‘basically not smaller than’; the symbol “ = I ” can be explicated analogously.
Definition 7
([46]). An acceptable crisp equivalent expression of an interval inequality relation m y I n is given as:
m u y n u   and   f ( m y I n ) λ
in which 0 λ 1 signifies the acceptance degree of the possible violation of interval inequality restraints. In the same way, an acceptable crisp equivalent expression of an interval inequality relation m y I n is given as:
m l y n l   and   f ( m y I n ) λ
Remark 1.
For m y I n , the acceptable crisp equivalent expression is m u y n u with taking into account the acceptance degree of the violation of interval inequality relation m y I n . When the acceptance degree is equal to zero (i.e., λ = 0 ), it indicates that the relation m y I n cannot be violated at all for the player. When the acceptance degree is equal to one (i.e., λ = 1 ), it means that the player fully permits the relation m y I n to be violated. When the acceptance degree is between zero and one (i.e., 0 < λ < 1 ), it signifies that the player agrees to violate the relation m y I n to a certain extent at the range of 0 and 1. The explanation of relation m y I n can be analogous to the interpretation of relation m y I n .
Definition 8
([42]). Given an interval m = [ m l , m u ] = { m | m l m m u , m R } . The model of maximizing interval objective function is described as follows:
max   { m } s .   t .   m Ω
which is equivalent to the following bi-objective programming problem:
max   { m l , m l + m u 2 } s .   t . m Ω
in which Ω is a set of constraints that the interval value variable m should meet based on the actual situation.

2.3. Classical Bi-Matrix Games

Assume that A = { a 1 , a 2 , , a I } and B = { b 1 , b 2 , , b J } are the sets of pure strategies for players P 1 and P 2 , respectively; their payoff matrices are expressed as H = ( h i j ) I × J and K = ( k i j ) I × J . The vectors x = ( x 1 , x 2 , , x I ) T and y = ( y 1 , y 2 , , y J ) T are the players’ mixed strategies, where x i   ( i = 1 , 2 , , I ) and y j   ( j = 1 , 2 , , J ) represent the probabilities for players to choose their pure strategies a i A and b j B , the mark “T” stands for the transpose of a vector. Denote the sets of mixed strategies for players P 1 and P 2 by X = { x | i = 1 I x i = 1 ,   x i 0   ( i = 1 , 2 , , I ) } and Y = { y | j = 1 J y j = 1 ,   y j 0   ( j = 1 , 2 , , J ) } , respectively. Suppose that both players want to maximize their own profits. The expected payoffs of players P 1 and P 2 are E 1 ( x , y , H ) = ω = x T H y = i = 1 I j = 1 J x i h i j y j and E 1 ( x , y , K ) = ν = x T K y = i = 1 I j = 1 J x i k i j y j . Then, a bi-matrix game is expressed as G = { X , Y , H , K } , which is called ( H , K ) for short [47].
Theorem 2
([48]). Let ( H , K ) be any crisp bi-matrix game, ( x , y , ω , ν ) is a Nash equilibrium solution of ( H , K ) if and only if it is a solution of the quadratic programming model as follows:
max { x T ( H + K ) y ω ν } s .   t .   H y ω e I K T x ν e J x T e I = 1 y T e J = 1 x 0 ,   y 0
where e I and e J are unit vector with I and J dimensions, and ω and ν are unrestricted in sign.
If ( x , y , ω , ν ) is a solution of the above model, then the Nash equilibrium value of player P 1 is ω = x T H y , and the Nash equilibrium value of player P 2 is ν = x T K y .

3. New General Intuitionistic Fuzzy Numbers (GIFNs) and Their Order Relation

3.1. A New GIFN

Motivated by [31,49], a new GIFN can be defined as follows:
Definition 9.
A new GIFN h ˜ =   < ( h _ 1 , h 1 l , h 1 r , h ¯ 1 ) , φ 1 l , φ 1 r , w h ˜ ; ( h _ 2 , h 2 l , h 2 r , h ¯ 2 ) , φ 2 l , φ 2 r , u h ˜ > is a special IFS on the real number set R , whose membership function μ h ˜ ( x ) and non-membership function υ h ˜ ( x ) are defined as follows:
μ h ˜ ( x ) = φ 1 l ( x )   if   h _ 1 x < h 1 l w h ˜   if   h 1 l x h 1 r φ 1 r ( x )   if   h 1 r < x h ¯ 1 0   otherwise
and
υ h ˜ ( x ) = φ 2 l ( x )   if   h _ 2 x < h 2 l u h ˜   if   h 2 l x h 2 r φ 2 r ( x )   if   h 2 r < x h ¯ 2 1   otherwise
respectively, as shown in Figure 1.
Where the values w h ˜ and u h ˜ , respectively, represent the maximum membership degree and the minimum non-membership degree such that 0 w h ˜ 1 , 0 u h ˜ 1 , and 0 w h ˜ + u h ˜ 1 ; where h _ 2 h _ 1 h 2 l h 1 l h 1 r h 2 r h ¯ 1 h ¯ 2 . φ 1 l and φ 2 r are non-decreasing and piecewise upper semi-continuous functions; at the same time, φ 1 l : [ h _ 1 , h 1 l ) [ 0 , w h ˜ ] and φ 2 r : ( h 2 r , h ¯ 2 ] [ u h ˜ , 1 ] need to satisfy the conditions: φ 1 l ( h _ 1 ) = 0 , φ 1 l ( h 1 l ) = w h ˜ , φ 2 r ( h 2 r ) = u h ˜ , φ 2 r ( h ¯ 2 ) = 1 ; φ 1 r and φ 2 l are non-increasing and piecewise lower semi-continuous function. Meanwhile, φ 1 r : [ h 1 r , h ¯ 1 ) [ 0 , w h ˜ ] and φ 2 l : ( h _ 2 , h 2 l ] [ u h ˜ , 1 ] must fulfill the following conditions: φ 1 r ( h ¯ 1 ) = 0 , φ 1 r ( h 1 r ) = w h ˜ , φ 2 l ( h 2 l ) = u h ˜ , φ 2 l ( h _ 2 ) = 1 . [ h 1 l , h 1 r ] stands for the mean interval, h _ 1 and h ¯ 1 are known as the lower and upper limits of the new GIFN h ˜ for the membership function. Analogously, [ h 2 l , h 2 r ] , h _ 2 , and h ¯ 2 represent the mean interval and the lower and upper limits of the new GIFN h ˜ for the non-membership function.
If h _ 2 0 and h ¯ 2 > 0 , then h ˜ is positive, as denoted by h ˜ > 0 . Conversely, if h ¯ 2 0 and h _ 2 < 0 , then h ˜ is negative, as denoted by h ˜ < 0 .
Particularly, when w h ˜ = 1 , u h ˜ = 0 ; then, the GIFN h ˜ is reduced to the IFN h ˜ =   < ( h _ 1 , h 1 l , h 1 r , h ¯ 1 ) , φ 1 l , φ 1 r ; ( h _ 2 , h 2 l , h 2 r , h ¯ 2 ) , φ 2 l , φ 2 r > , which was defined in [49].
If φ 1 l ( x ) , φ 1 r ( x ) , φ 2 l ( x ) , and φ 2 r ( x ) are linear functions, when h _ 1 = h _ 2 , h 1 l = h 2 l , h 1 r = h 2 r , and h ¯ 1 = h ¯ 2 , then the GIFN h ˜ degenerates to a TrIFN h ˜ =   < ( h _ 1 , h 1 l , h 1 r , h ¯ 1 ) ; w h ˜ , u h ˜ > introduced in [50]; when h _ 1 = h _ 2 , h 1 l = h 2 l = h 1 r = h 2 r = h 1 , h ¯ 1 = h ¯ 2 , then the GIFN h ˜ degenerates to a TIFN h ˜ =   < ( h _ 1 , h 1 , h ¯ 1 ) ; w h ˜ , u h ˜ > introduced in [45].
Remark 2.
Due to the fact that each player has a different understanding of the same vague concept, the representation forms of membership function and non-membership function are also distinct. For the sake of simplicity, this paper only takes the following quadratic function form of membership function and non-membership function of a GIFN into consideration. Of course, other forms of membership function and non-membership function of GIFNs are still applicable in this paper.
μ h ˜ ( x ) = ( x h _ 1 h 1 l h _ 1 ) 2 w h ˜   if   h _ 1 x < h 1 l w h ˜   if   h 1 l x h 1 r ( h ¯ 1 x h ¯ 1 h 1 r ) 2 w h ˜   if   h 1 r < x h ¯ 1 0   otherwise
and
υ h ˜ ( x ) = ( h 2 l x h 2 l h _ 2 ) 2 + ( x h _ 2 h 2 l h _ 2 ) 2 u h ˜   if   h _ 2 x < h 2 l u h ˜   if   h 2 l x h 2 r ( x h 2 r h ¯ 2 h 2 r ) 2 + ( h ¯ 2 x h ¯ 2 h 2 r ) 2 u h ˜   if   h 2 r < x h ¯ 2 1   otherwise
Definition 10.
Let h ˜ =   < ( h _ 1 , h 1 l , h 1 r , h ¯ 1 ) , φ 1 l , φ 1 r , w h ˜ ; ( h _ 2 , h 2 l , h 2 r , h ¯ 2 ) , φ 2 l , φ 2 r , u h ˜ > and k ˜ =   < ( k _ 1 , k 1 l , k 1 r , k ¯ 1 ) , ψ 1 l , ψ 1 r , w k ˜ ; ( k _ 2 , k 2 l , k 2 r , k ¯ 2 ) , ψ 2 l , ψ 2 r , u k ˜ > be two positive GIFNs, whose forms of membership function and non-membership function are the same as shown in Equations (10) and (11), and γ 0 be a real number. Then, some arithmetical operations between them are defined as follows:
1.
Addition:
h ˜ + k ˜ = < ( h _ 1 + k _ 1 , h 1 l + k 1 l , h 1 r + k 1 r , h ¯ 1 + k ¯ 1 ) , g 1 l , g 1 r , w h ˜ w k ˜ ; ( h _ 2 + k _ 2 , h 2 l + k 2 l , h 2 r + k 2 r , h ¯ 2 + k ¯ 2 ) , g 2 l , g 2 r , u h ˜ u k ˜ >
2.
Subtraction:
h ˜ k ˜ = < ( h _ 1 k ¯ 1 , h 1 l k 1 r , h 1 r k 1 l , h ¯ 1 k _ 1 ) , g 1 l , g 1 r , w h ˜ w k ˜ ; ( h _ 2 k ¯ 2 , h 2 l k 2 r , h 2 r k 2 l , h ¯ 2 k _ 2 ) , g 2 l , g 2 r , u h ˜ u k ˜ >
3.
Multiplication:
h ˜ k ˜ =   < ( h _ 1 k _ 1 , h 1 l k 1 l , h 1 r k 1 r , h ¯ 1 k ¯ 1 ) , ζ 1 l , ζ 1 r , w h ˜ w k ˜ ; ( h _ 2 k _ 2 , h 2 l k 2 l , h 2 r k 2 r , h ¯ 2 k ¯ 2 ) , ζ 2 l , ζ 2 r , u h ˜ u k ˜ >
4.
Scalar multiplication:
γ h ˜ =   < ( γ h _ 1 , γ h 1 l , γ h 1 r , γ h ¯ 1 ) , ξ 1 l , ξ 1 r , w h ˜ ; ( γ h _ 2 , γ h 2 l , γ h 2 r , γ h ¯ 2 ) , ξ 2 l , ξ 2 r , u h ˜ > ,   if   γ > 0 < ( γ h ¯ 1 , γ h 1 r , γ h 1 l , γ h _ 1 ) , ξ 1 l , ξ 1 r , w h ˜ ; ( γ h ¯ 2 , γ h 2 r , γ h 2 l , γ h _ 2 ) , ξ 2 l , ξ 2 r , u h ˜ > ,   if   γ < 0
where g 1 l : [ h _ 1 + k _ 1 , h 1 l + k 1 l ) [ 0 , w h ˜ w k ˜ ] and g 2 r : ( h 2 r + k 2 r , h ¯ 2 + k ¯ 2 ] [ u h ˜ u k ˜ , 1 ] are non-decreasing and piecewise upper semi-continuous functions, which satisfy the conditions: g 1 l ( h _ 1 + k _ 1 ) = 0 , g 1 l ( h 1 l + k 1 l ) = w h ˜ w k ˜ , g 2 r ( h 2 r + k 2 r ) = u h ˜ u k ˜ , g 2 r ( h ¯ 2 + k ¯ 2 ) = 1 ; meanwhile, g 1 r : [ h 1 r + k 1 r ,   h ¯ 1 + k ¯ 1 ) [ 0 , w h ˜ w k ˜ ] and g 2 l : ( h _ 2 + k _ 2 , h 2 l + k 2 l ] [ u h ˜ u k ˜ , 1 ] are non-increasing and piecewise lower semi-continuous functions, which fulfill the following conditions: g 1 r ( h ¯ 1 + k ¯ 1 ) = 0 , g 1 r ( h 1 r + k 1 r ) = w h ˜ w k ˜ , g 2 l ( h 2 l + k 2 l ) = u h ˜ u k ˜ , g 2 l ( h _ 2 + k _ 2 ) = 1 . Similarly, g 1 l , g 1 r , g 2 l , g 2 r , ζ 1 l , ζ 1 r , ζ 2 l , ζ 2 r , ξ 1 l , ξ 1 r , ξ 2 l , ξ 2 r , ξ 1 l , ξ 1 r , ξ 2 l , and ξ 2 r can be explicated in the same way.

3.2. Cut Sets of New GIFNs

Definition 11.
Let h ˜ be a new GIFN defined in Definition 9, a < α , β > -cut set of a GIFN h ˜ is a crisp subset of R , which is defined as h ˜ < α , β > = { x | μ h ˜ ( x ) α , υ h ˜ ( x ) β , x R } , where 0 α w h ˜ , u h ˜ β 1 , and 0 α + β 1 , as indicated in Figure 1.
Definition 12.
Let h ˜ be a new GIFN, a α -cut set of h ˜ can be expressed as a crisp subset of R , denoted by h ˜ α = { x | μ h ˜ ( x ) α , x R } , where α [ 0 , w h ˜ ] . Based on Equation (8), it easily follows that
h ˜ α = [ h α L , h α R ] = [ ( φ 1 l ) 1 ( α ) ,   ( φ 1 r ) 1 ( α ) ]
where ( φ 1 l ) 1 and ( φ 1 r ) 1 are the inverse functions of φ 1 l and φ 1 r , respectively.
Definition 13.
Let h ˜ be a GIFN, and a β -cut set of h ˜ can be expressed as a crisp subset of R , which is denoted by h ˜ β = { x | υ h ˜ ( x ) β , x R } , where β [ u h ˜ , 1 ] . In light of Equation (9), it readily follows that
h ˜ β = [ h β L ,   h β R ] = [ ( φ 2 l ) 1 ( β ) ,   ( φ 2 r ) 1 ( β ) ]
where ( φ 2 l ) 1 and ( φ 2 r ) 1 are the inverse functions of φ 2 l and φ 2 r , respectively.

3.3. Order Relation for New GIFNs

Motivated by Definitions 5–7 and [51], the order relations for new GIFNs are given as follows.
Definition 14.
Let h ˜ and k ˜ be two GIFNs. h ˜ α = [ h α L ,   h α R ] , h ˜ β = [ h β L ,   h β R ] , k ˜ α = [ k α L ,   k α R ] and k ˜ β = [ k β L ,   k β R ] are the α -cut set and β -cut set of h ˜ and k ˜ , respectively. For any given ordered pair < α , β > , where 0 α min { w h ˜ , w k ˜ } , max { u h ˜ , u k ˜ } β 1 , and 0 α + β 1 , it is specified that:
  • h ˜ ˜ k ˜ iff h ˜ α I k ˜ α and h ˜ β I k ˜ β ;
  • h ˜ ˜ k ˜ iff h ˜ α I k ˜ α and h ˜ β I k ˜ β ;
  • h ˜ = ˜ k ˜ iff h ˜ α = I k ˜ α and h ˜ β = I k ˜ β .
where the symbol “ ˜ ” is an GIF version of the order relation “ ” in the real number set and has the linguistic interpretation “basically not larger than”, and the symbols “ ˜ ” and “ = ˜ ” are interpreted analogously.

4. General Intuitionistic Fuzzy Bi-Matrix Games and Solution Method

4.1. General Intuitionistic Fuzzy Bi-Matrix Games (GIFBMG)

Without loss of generality, assume that A = { a 1 , a 2 , , a I } and B = { b 1 , b 2 , , b J } are the sets of pure strategies for players P 1 and P 2 , respectively. I is the number of pure strategy for player P 1 , J is the number of pure strategy for player P 2 . The vectors x = ( x 1 , x 2 , , x I ) T and y = ( y 1 , y 2 , , y J ) T are mixed strategies for players P 1 and P 2 , where x i   ( i = 1 , 2 , , I ) and y j   ( j = 1 , 2 , , J ) are the probabilities for players P 1 and P 2 to choose pure strategies a i A and b j B . Sets of all mixed strategies for players P 1 and P 2 are denoted by X = { x | i = 1 I x i = 1 ,   x i 0   ( i = 1 , 2 , , I ) } and Y = { y | j = 1 J y j = 1 ,   y j 0   ( j = 1 , 2 , , J ) } , respectively. The payoff matrices for players P 1 and P 2 are expressed as H ˜ = ( h ˜ i j ) I × J and K ˜ = ( k ˜ i j ) I × J , whose elements are new GIFNs. In the following, the above GIFBMG is denoted by ( H ˜ ,   K ˜ ) for short. At the situation ( a i ,   b j ) , the payoffs h ˜ i j and k ˜ i j of the two players are expressed as h ˜ i j =   < ( h _ 1 i j , h 1 i j l , h 1 i j r , h ¯ 1 i j ) , φ 1 i j l , φ 1 i j r , w h ˜ i j ; ( h _ 2 i j , h 2 i j l , h 2 i j r , h ¯ 2 i j ) , φ 2 i j l , φ 2 i j r , u h ˜ i j > and k ˜ i j =   < ( k _ 1 i j , k 1 i j l , k 1 i j r , k ¯ 1 i j ) , ψ 1 i j l , ψ 1 i j r , w k ˜ i j ; ( k _ 2 i j , k 2 i j l , k 2 i j r , k ¯ 2 i j ) , ψ 2 i j l , ψ 2 i j r , u k ˜ i j > , where h _ 2 i j h _ 1 i j h 2 i j l , h 1 i j l h 1 i j r h 2 i j r h ¯ 1 i j h ¯ 2 i j , and k _ 2 i j k _ 1 i j k 2 i j l k 1 i j l k 1 i j r k 2 i j r k ¯ 1 i j k ¯ 2 i j .
When player P 1 chooses any mix strategy x X and player P 2 chooses any mix strategy y Y , the expected payoffs of players P 1 and P 2 are defined as E ˜ 1 ( x , y ) = ω ˜ = x T H ˜ y = i = 1 I j = 1 J x i h ˜ i j y j and E ˜ 2 ( x , y ) = ν ˜ = x T K ˜ y = i = 1 I j = 1 J x i k ˜ i j y j , whose α -cut set and β -cut set can be computed respectively as
ω ˜ α = [ i = 1 I j = 1 J x i ( α ) L ( φ 1 i j l ) 1 ( α ) y j ( α ) L ,   i = 1 I j = 1 J x i ( α ) R ( φ 1 i j r ) 1 ( α ) y j ( α ) R ] ,   ω ˜ β = [ i = 1 I j = 1 J x i ( β ) L ( φ 2 i j l ) 1 ( β ) y j ( β ) L ,   i = 1 I j = 1 J x i ( β ) R ( φ 2 i j r ) 1 ( β ) y j ( β ) R ] ,   ν ˜ α = [ i = 1 I j = 1 J x i ( α ) L ( ψ 1 i j l ) 1 ( α ) y j ( α ) L , i = 1 I j = 1 J x i ( α ) R ( ψ 1 i j r ) 1 ( α ) y j ( α ) R ] , ν ˜ β = [ i = 1 I j = 1 J x i ( β ) L ( ψ 2 i j l ) 1 ( β ) y j ( β ) L , i = 1 I j = 1 J x i ( β ) R ( ψ 2 i j r ) 1 ( β ) y j ( β ) R ] .
where 0 α min { w h ˜ i j , w k ˜ i j } , max { u h ˜ i j , u k ˜ i j } β 1 , and 0 α + β 1 .
In the process of strategy selection, players are following the principle of maximizing their own benefits without cooperation. The concept of solutions of bi-matrix games with payoffs of GIFNs are given below.
Definition 15.
(Nash equilibrium solution). Assume that there is a pair ( x ,   y ) X × Y , a mix strategy x X is the Nash equilibrium strategy for player P 1 if there is no x X such that x T H ˜ y ˜ x T H ˜ y . A mix strategy y Y is the Nash equilibrium strategy for player P 2 if there is no y Y such that x T K ˜ y ˜ x T K ˜ y .
Then, ( x ,   y ) is called the Nash equilibrium point of the GIFBMG ( H ˜ ,   K ˜ ) , ω ˜ = x T H ˜ y and ν ˜ = x T K ˜ y are called the Nash equilibrium values of players P 1 and P 2 , ( x ,   y , ω ˜ , ν ˜ ) is called a Nash equilibrium solution of the GIFBMG ( H ˜ ,   K ˜ ) , where the mark “ ˜ ” is an intuitionistic fuzzy version of the order relation “ ” in the real number set and has the linguistic interpretation “basically not smaller than”.
Theorem 3.
Let ( H ˜ ,   K ˜ ) be any GIFBMG. ( x ,   y , ω ˜ , ν ˜ ) is a Nash equilibrium solution of ( H ˜ ,   K ˜ ) if and only if it is a solution of the GIF quadratic programming model as follows:
max { x T ( H ˜ + K ˜ ) y ω ˜ ν ˜ } s .   t .   H ˜ y ˜ ω ˜ e I K ˜ T x ˜ ν ˜ e J x T e I = 1 y T e J = 1 x 0 ,   y 0
where e I is an m-dimensional vector of ones, and e J is an n-dimensional vector of ones. The symbol “ ˜ ” is an intuitionistic fuzzy version of the order relation “ ” in the real number set and has the linguistic interpretation “basically not larger than”.
Proof of Theorem 3.
According to the constraints of the above GIF quadratic programming model, x T H ˜ y ˜ x T ω ˜ e I , y T K ˜ T x ˜ y T ν ˜ e J , x T e I = 1 and y T e J = 1 , then we have x T H ˜ y ˜ ω ˜ and y T K ˜ T x ˜ ν ˜ . Thus, it can be obtained that x T ( H ˜ + K ˜ ) y ω ˜ ν ˜ ˜ 0 . According to Definition 15, the Nash equilibrium solution of the GIFBMG can be obtained by solving the following model:
max { x T H ˜ y + x T K ˜ y } s .   t .   x T e I = 1 y T e J = 1 x 0 ,   y 0
Let ω ˜ = max x X x T H ˜ y and ν ˜ = max y Y x T K ˜ y . The constraints ω ˜ ˜ x T H ˜ y ˜ x T H ˜ y and ν ˜ ˜ x T K ˜ y ˜ x T K ˜ y are correct for all x 0 and   y 0 ; then, it yields that ω ˜ e I ˜ H ˜ y and ν ˜ e J ˜ K ˜ T x . Then, the model can be transformed into the following model:
min { ( ω ˜ x T H ˜ y ) + ( ν ˜ x T K ˜ y ) } s .   t .   H ˜ y ˜ ω ˜ e I K ˜ T x ˜ ν ˜ e J x T e I = 1 y T e J = 1 x 0 ,   y 0 max { ( x T H ˜ y ω ˜ ) + ( x T K ˜ y ν ˜ ) } = { x T ( H ˜ + K ˜ ) y ω ˜ ν ˜ } s .   t .   H ˜ y ˜ ω ˜ e I K ˜ T x ˜ ν ˜ e J x T e I = 1 y T e J = 1 x 0 ,   y 0
Thus, Theorem 3 is proved. □

4.2. α-Bi-Matrix Games and β-Bi-Matrix Games of ( H ˜ , K ˜ )

Inspired by [52], the α -bi-matrix game and β -bi-matrix game of the GIFBMG ( H ˜ ,   K ˜ ) are defined as follows:
Definition 16.
The α -bi-matrix game of the GIFBMG ( H ˜ ,   K ˜ ) is defined as ( H ˜ α ,   K ˜ α ) , where H ˜ α = ( h ˜ i j ( α ) ) I × J and K ˜ α = ( k ˜ i j ( α ) ) I × J , whose elements h ˜ i j ( α ) and k ˜ i j ( α ) are α -cut sets of the GIF payoffs h ˜ i j and k ˜ i j , respectively.
Definition 17.
The β -bi-matrix game of the GIFBMG ( H ˜ ,   K ˜ ) is defined as ( H ˜ β ,   K ˜ β ) , where H ˜ β = ( h ˜ i j ( β ) ) I × J and K ˜ β = ( k ˜ i j ( β ) ) I × J , whose elements h ˜ i j ( β ) and k ˜ i j ( β ) are β -cut sets of the GIF payoffs h ˜ i j and k ˜ i j , respectively.
For any given values h i j ( α ) and k i j ( α ) in the payoff intervals h ˜ i j ( α ) and k ˜ i j ( α ) ( i = 1 , 2 , , I ;   j = 1 , 2 , , J ), the crisp α -bi-matrix game of the α -bi-matrix game ( H ˜ α ,   K ˜ α ) denoted by ( H α , K α ) = ( ( h i j ( α ) ) I × J , ( k i j ( α ) ) I × J ) . For any given values h i j ( β ) and k i j ( β ) in the payoff intervals h ˜ i j ( β ) and k ˜ i j ( β ) ( i = 1 , 2 , , I ;   j = 1 , 2 , , J ), the crisp β -bi-matrix game of the β -bi-matrix game ( H ˜ β ,   K ˜ β ) is denoted by ( H β , K β ) = ( ( h i j ( β ) ) I × J ,   ( k i j ( β ) ) I × J ) .
It is easily seen that the crisp Nash equilibrium values ω α and ν α of players P 1 and P 2 in ( H α , K α ) are closely related to all values h i j ( α ) and k i j ( α ) ; i.e., ω α is a function of the values h i j ( α ) in the payoff intervals h ˜ i j ( α ) , denoted by ω α = ω ( h i j ( α ) ) (or ω ( H α ) ), while ν α is a function of the values k i j ( α ) in the payoff intervals k ˜ i j ( α ) , denoted by ν α = ν ( k i j ( α ) ) (or ν ( K α ) ). Similarly, the Nash equilibrium strategies of players P 1 and P 2 x ( α ) X and y ( α ) X are also functions of the values h i j ( α ) and k i j ( α ) , which are denoted by x ( α ) = x ( h i j ( α ) ) (or x ( H α ) ) and y ( α ) = y ( k i j ( α ) ) (or y ( K α ) ), respectively. The crisp β -bi-matrix game ( H β , K β ) can be analyzed in the same way.
For the α -bi-matrix game ( H ˜ α ,   K ˜ α ) , from a viewpoint of logic, the Nash equilibrium value of ( H ˜ α ,   K ˜ α ) should be a closed interval as well. Notice the fact that ω α and ν α in ( H α ,   K α ) are non-decreasing functions of the values h i j ( α ) and k i j ( α ) . Hence, the upper bound ω α R of player P 1 ’s interval-type value in ( H ˜ α ,   K ˜ α ) and the corresponding Nash equilibrium strategy x α R X are ω α R = ω R ( h i j ( α ) R ) and x α R = x R ( h i j ( α ) R ) , respectively. The upper bound ν α R of player P 2 ’s interval-type value in ( H ˜ α ,   K ˜ α ) and the corresponding Nash equilibrium strategy y α R Y are ν α R = ν R ( k i j ( α ) R ) and y α R = y R ( k i j ( α ) R ) . The lower bounds ω α L , ν α L and their corresponding Nash equilibrium strategies x α L , y α L also can be described in the same way. Similarly, the β -bi-matrix game ( H ˜ β ,   K ˜ β ) can be analyzed in the same way.

4.3. A Novel Method to Solve GIFBMGs

A GIF quadratic programming model in Theorem 3 can be rewritten as follows:
max   { ϕ ˜ = i = 1 I j = 1 J ( h ˜ i j + k ˜ i j ) x i y j ω ˜ ν ˜ } s .   t .   j = 1 J h ˜ i j y j ˜ ω ˜ ( i = 1 , 2 , , I ) i = 1 I k ˜ i j x i ˜ ν ˜ ( j = 1 , 2 , , J ) i = 1 I x i = 1 j = 1 J y j = 1 x i 0 ( i = 1 , 2 , , I )   y j 0 ( j = 1 , 2 , , J )
According to Definition 14 and [52], Equation (21) can be transformed into the following interval bi-objective quadratic programming model:
max   { ϕ ˜ α = i = 1 I j = 1 J ( h ˜ i j ( α ) + k ˜ i j ( α ) ) x i ( α ) y j ( α ) ω ˜ α ν ˜ α } max   { ϕ ˜ β = i = 1 I j = 1 J ( h ˜ i j ( β ) + k ˜ i j ( β ) ) x i ( β ) y j ( β ) ω ˜ β ν ˜ β } s .   t .   { j = 1 J h ˜ i j ( α ) y j ( α ) I ω ˜ α ( i = 1 , 2 , , I ) j = 1 J h ˜ i j ( β ) y j ( β ) I ω ˜ β ( i = 1 , 2 , , I ) i = 1 I k ˜ i j ( α ) x i ( α ) I ν ˜ α ( j = 1 , 2 , , J ) i = 1 I k ˜ i j ( β ) x i ( β ) I ν ˜ β ( j = 1 , 2 , , J ) i = 1 I x i ( α ) = 1 ,   i = 1 I x i ( β ) = 1 j = 1 J y j ( α ) = 1 ,   j = 1 J y j ( β ) = 1 x i ( α ) 0 ,   x i ( β ) 0 ( i = 1 , 2 , , I )   y j ( α ) 0 ,   y j ( β ) 0 ( j = 1 , 2 , , J )
Theorem 4.
Equation (22) is equivalent to the following interval multi-objective quadratic programming model:
max   { ϕ α 1 = i = 1 I j = 1 J ( h i j ( α ) L + k i j ( α ) L ) x i ( α ) L y j ( α ) L ω α L ν α L } max   { ϕ α 2 = 1 2 [ i = 1 I j = 1 J ( h i j ( α ) L + k i j ( α ) L ) x i ( α ) L y j ( α ) L ω α L ν α L + i = 1 I j = 1 J ( h i j ( α ) R + k i j ( α ) R ) x i ( α ) R y j ( α ) R ω α R ν α R ] } max   { ϕ β 1 = i = 1 I j = 1 J ( h i j ( β ) L + k i j ( β ) L ) x i ( β ) L y j ( β ) L ω β L ν β L } max   { ϕ β 2 = 1 2 [ i = 1 I j = 1 J ( h i j ( β ) L + k i j ( β ) L ) x i ( β ) L y j ( β ) L ω β L ν β L + i = 1 I j = 1 J ( h i j ( β ) R + k i j ( β ) R ) x i ( β ) R y j ( β ) R ω β R ν β R ] } s .   t .   { j = 1 J h i j ( α ) R y j ( α ) R ω α R ( i = 1 , 2 , , I ) j = 1 J h i j ( β ) R y j ( β ) R ω β R ( i = 1 , 2 , , I ) ( 1 λ ) j = 1 J h i j ( α ) L y j ( α ) L + λ j = 1 J h i j ( α ) R y j ( α ) R ( 1 λ ) ω α L + λ ω α R ( i = 1 , 2 , , I ) ( 1 λ ) j = 1 J h i j ( β ) L y j ( β ) L + λ j = 1 J h i j ( β ) R y j ( β ) R ( 1 λ ) ω β L + λ ω β R ( i = 1 , 2 , , I ) i = 1 I k i j ( α ) R x i ( α ) R ν α R ( j = 1 , 2 , , J ) i = 1 I k i j ( β ) R x i ( β ) R ν β R ( j = 1 , 2 , , J ) ( 1 λ ) i = 1 I k i j ( α ) L x i ( α ) L + λ i = 1 I k i j ( α ) R x i ( α ) R ( 1 λ ) ν α L + λ ν α R ( j = 1 , 2 , , J ) ( 1 λ ) i = 1 I k i j ( β ) L x i ( β ) L + λ i = 1 I k i j ( β ) R x i ( β ) R ( 1 λ ) ν β L + λ ν β R ( j = 1 , 2 , , J ) i = 1 I x i ( α ) L = 1 ,   i = 1 I x i ( α ) R = 1 ,   i = 1 I x i ( β ) L = 1 ,   i = 1 I x i ( β ) R = 1 j = 1 J y j ( α ) L = 1 ,   j = 1 J y j ( α ) R = 1 ,   j = 1 J y j ( β ) L = 1 ,   j = 1 J y j ( β ) R = 1 x i ( α ) L 0 ,   x i ( α ) R 0 ,   x i ( β ) L 0 ,   x i ( β ) R 0 ( i = 1 , 2 , , I )   y j ( α ) L 0 ,   y j ( α ) R 0 ,   y j ( β ) L 0 ,   y j ( β ) R 0 ( j = 1 , 2 , , J )
Proof of Theorem 4.
By means of Definitions 12 and 13, the cut sets in interval form can be easily computed as below:
ϕ ˜ α = [ ϕ α L , ϕ α R ] = [ i = 1 I j = 1 J ( h i j ( α ) L + k i j ( α ) L ) x i ( α ) L y j ( α ) L ω α L ν α L ,   i = 1 I j = 1 J ( h i j ( α ) R + k i j ( α ) R ) x i ( α ) R y j ( α ) R ω α R ν α R ] , ϕ ˜ β = [ ϕ β L ,   ϕ β R ] = [ i = 1 I j = 1 J ( h i j ( β ) L + k i j ( β ) L ) x i ( β ) L y j ( β ) L ω β L ν β L ,   i = 1 I j = 1 J ( h i j ( β ) R + k i j ( β ) R ) x i ( β ) R y j ( β ) R ω β R ν β R ] , ω ˜ α = [ ω α L ,   ω α R ] ,   ω ˜ β = [ ω β L ,   ω β R ] ,   ν ˜ α = [ ν α L ,   ν α R ] ,   ν ˜ β = [ ν β L ,   ν β R ] , j = 1 J h ˜ i j ( α ) y j ( α ) = [ j = 1 J h i j ( α ) L y j ( α ) L ,   j = 1 J h i j ( α ) R y j ( α ) R ] ,   j = 1 J h ˜ i j ( β ) y j ( β ) = [ j = 1 J h i j ( β ) L y j ( β ) L ,   j = 1 J h i j ( β ) R y j ( β ) R ] , i = 1 I k ˜ i j ( α ) x i ( α ) = [ i = 1 I k i j ( α ) L x i ( α ) L ,   i = 1 I k i j ( α ) R x i ( α ) R ] ,   i = 1 I k ˜ i j ( β ) x i ( β ) = [ i = 1 I k i j ( β ) L x i ( β ) L ,   i = 1 I k i j ( β ) R x i ( β ) R ] .
Then, by applying Definition 8, the objective functions in interval form of Equation (22), max { ϕ ˜ α = [ i = 1 I j = 1 J ( h i j ( α ) L + k i j ( α ) L ) x i ( α ) L y j ( α ) L ω α L ν α L , i = 1 I j = 1 J ( h i j ( α ) R + k i j ( α ) R ) x i ( α ) R y j ( α ) R ω α R ν α R ] } , is equivalent to max { ϕ α 1 = i = 1 I j = 1 J ( h i j ( α ) L + k i j ( α ) L ) x i ( α ) L y j ( α ) L ω α L ν α L } and max { ϕ α 2 = 1 2 ( i = 1 I j = 1 J ( h i j ( α ) L + k i j ( α ) L ) x i ( α ) L y j ( α ) L ω α L ν α L + i = 1 I j = 1 J ( h i j ( α ) R + k i j ( α ) R ) x i ( α ) R y j ( α ) R ω α R ν α R ) } . max { ϕ ˜ β = [ i = 1 I j = 1 J ( h i j ( β ) L + k i j ( β ) L ) x i ( β ) L y j ( β ) L ω β L ν β L , i = 1 I j = 1 J ( h i j ( β ) R + k i j ( β ) R ) x i ( β ) R y j ( β ) R ω β R ν β R ] } is equivalent to max { ϕ ˜ β 1 = i = 1 I j = 1 J ( h i j ( β ) L + k i j ( β ) L ) x i ( β ) L y j ( β ) L ω β L ν β L } and max { ϕ β 2 = 1 2 ( i = 1 I j = 1 J ( h i j ( β ) L + k i j ( β ) L ) x i ( β ) L y j ( β ) L ω β L ν β L + i = 1 I j = 1 J ( h i j ( β ) R + k i j ( β ) R ) x i ( β ) R y j ( β ) R ω β R ν β R ) } .
It is clear that the above equivalent conditions are the four objective functions of Equation (23).
In Equation (22), the first two constraints j = 1 J h ˜ i j ( α ) y j ( α ) I ω ˜ α and j = 1 J h ˜ i j ( β ) y j ( β ) I ω ˜ β are equivalent to [ j = 1 J h i j ( α ) L y j ( α ) L , j = 1 J h i j ( α ) R y j ( α ) R ] I [ ω α L , ω α R ] and [ j = 1 J h i j ( β ) L y j ( β ) L , j = 1 J h i j ( β ) R y j ( β ) R ] I [ ω β L , ω β R ] , the former is equivalent to j = 1 J h i j ( α ) R y j ( α ) R ω α R and φ ( j = 1 J h ˜ i j ( α ) y j ( α ) I ω ˜ α ) λ , and the latter is equivalent to j = 1 J h i j ( β ) R y j ( β ) R ω β R and φ ( j = 1 J h ˜ i j ( β ) y j ( β ) I ω ˜ β ) λ .
Via Definition 6, we can quickly rewrite φ ( j = 1 J h ˜ i j ( α ) y j ( α ) I ω ˜ α ) λ and φ ( j = 1 J h ˜ i j ( β ) y j ( β ) I ω ˜ β ) λ as
j = 1 J h i j ( α ) L y j ( α ) L ω α L ω α R ω α L ( j = 1 J h i j ( α ) R y j ( α ) R j = 1 J h i j ( α ) L y j ( α ) L ) λ
and
j = 1 J h i j ( β ) L y j ( β ) L ω β L ω β R ω β L ( j = 1 J h i j ( β ) R y j ( β ) R j = 1 J h i j ( β ) L y j ( β ) L ) λ
After careful arrangement, Equations (24) and (25) are transformed into the following forms:
( 1 λ ) j = 1 J h i j ( α ) L y j ( α ) L + λ j = 1 J h i j ( α ) R y j ( α ) R ( 1 λ ) ω α L + λ ω α R
and
( 1 λ ) j = 1 J h i j ( β ) L y j ( β ) L + λ j = 1 J h i j ( β ) R y j ( β ) R ( 1 λ ) ω β L + λ ω β R
They are just the third and fourth constraints of Equation (23).
In a similar way, the third and fourth constraints of Equation (22), i = 1 I k ˜ i j ( α ) x i ( α ) I ν ˜ α and i = 1 I k ˜ i j ( β ) x i ( β ) I ν ˜ β , are equivalent to i = 1 I k i j ( α ) R x i ( α ) R ν α R , φ ( i = 1 I k ˜ i j ( α ) x i ( α ) I ν ˜ α ) λ , i = 1 I k i j ( β ) R x i ( β ) R ν β R   , and φ ( i = 1 I k ˜ i j ( β ) x i ( β ) I ν ˜ β ) λ . Then, φ ( i = 1 I k ˜ i j ( α ) x i ( α ) I ν ˜ α ) λ and φ ( i = 1 I k ˜ i j ( β ) x i ( β ) I ν ˜ β ) λ can be rewritten to ( 1 λ ) i = 1 I k i j ( α ) L x i ( α ) L + λ i = 1 I k i j ( α ) R x i ( α ) R ( 1 λ ) ν α L + λ ν α R and ( 1 λ ) i = 1 I k i j ( β ) L x i ( β ) L + λ i = 1 I k i j ( β ) R x i ( β ) R ( 1 λ ) ν β L + λ ν β R , which are just the seventh and eighth constraints of Equation (23). Hence, Theorem 4 is proved. □
Remark 3.
In Equation (23), the parameter λ is used to portray the acceptance degree of possible violation of interval constraints of Equation (22). Since any GIF constraints often can be turned into the interval forms in different ways, the parameter λ also can be seen as the acceptance degree of the possible violation of GIF constraints of Equation (21).
Remark 4.
Due to the intrinsic indeterminacy of GIF constraint, it is not often invariable. Although a few GIF constraints may be violated, the player can still permit such violation with a certain extent. The acceptance degree λ is the proper means to precisely portray such an extent. Thus, it is sagacious and essential to take the player’s acceptance degree of the possible violation of GIF constraints into consideration in the course of solving a GIF quadratic programming problem.
For the purpose of seeking the solution of Equation (23), its equivalent form is shown as follows:
min   { ϕ α 1 = [ i = 1 I j = 1 J ( h i j ( α ) L + k i j ( α ) L ) x i ( α ) L y j ( α ) L ω α L ν α L ] } min   { ϕ α 2 = 1 2 [ i = 1 I j = 1 J ( h i j ( α ) L + k i j ( α ) L ) x i ( α ) L y j ( α ) L ω α L ν α L + i = 1 I j = 1 J ( h i j ( α ) R + k i j ( α ) R ) x i ( α ) R y j ( α ) R ω α R ν α R ] } min   { ϕ β 1 = [ i = 1 I j = 1 J ( h i j ( β ) L + k i j ( β ) L ) x i ( β ) L y j ( β ) L ω β L ν β L ] } min   { ϕ β 2 = 1 2 [ i = 1 I j = 1 J ( h i j ( β ) L + k i j ( β ) L ) x i ( β ) L y j ( β ) L ω β L ν β L + i = 1 I j = 1 J ( h i j ( β ) R + k i j ( β ) R ) x i ( β ) R y j ( β ) R ω β R ν β R ] } s .   t .   { the   constraints   are   the   same   as   those   of   Equation   ( 23 )
According to the meaning of a goal program, a goal programming approach is developed to solve Equation (28) in this research.
The goals of ϕ α 1 , ϕ α 2 , ϕ β 1 , and ϕ β 2 are denoted by τ t   ( t = 1 , 2 , 3 , 4 ) , respectively. The positive deviation variable d t indicates that the decision value exceeds the target value. Conversely, the negative deviation variable d t + reveals that the decision value does not reach the target value. The priority factors Q t ( t = 1 , 2 , 3 , 4 ) are assigned to the four objectives ϕ α 1 , ϕ α 2 , ϕ β 1 , and ϕ β 2 and determined by the player in advance. Suppose that ϕ α 1 is the optimal (or ideal) value of the objective function min { ϕ α 1 } when overlooking the objective functions min { ϕ α 2 } , min { ϕ β 1 } , and min { ϕ β 2 } in Equation (28); then, a familiar technique to obtain the goal τ 1 is to set it at a certain ratio of ϕ α 1 , i.e., τ 1 = θ ϕ α 1 , in which θ is the scale factor, such as θ = 0.8 , θ = 0.9 . Likewise, ϕ α 2 , ϕ β 1 , and ϕ β 2 can be described in the same way, i.e., τ 2 = θ ϕ α 2 , τ 3 = θ ϕ β 1 , and τ 4 = θ ϕ β 2 .
Then, the equivalent form of Equation (28) is shown in Equation (29).
min   { ϕ = Q 1 d 1 + + Q 2 d 2 + + Q 3 d 3 + + Q 4 d 4 + } s .   t .   { [ i = 1 I j = 1 J ( h i j ( α ) L + k i j ( α ) L ) x i ( α ) L y j ( α ) L ω α L ν α L ] + d 1 d 1 + = τ 1 1 2 [ i = 1 I j = 1 J ( h i j ( α ) L + k i j ( α ) L ) x i ( α ) L y j ( α ) L ω α L ν α L + i = 1 I j = 1 J ( h i j ( α ) R + k i j ( α ) R ) x i ( α ) R y j ( α ) R ω α R ν α R ] + d 2 d 2 + = τ 2 [ i = 1 I j = 1 J ( h i j ( β ) L + k i j ( β ) L ) x i ( β ) L y j ( β ) L ω β L ν β L ] + d 3 d 3 + = τ 3 1 2 [ i = 1 I j = 1 J ( h i j ( β ) L + k i j ( β ) L ) x i ( β ) L y j ( β ) L ω β L ν β L + i = 1 I j = 1 J ( h i j ( β ) R + k i j ( β ) R ) x i ( β ) R y j ( β ) R ω β R ν β R ] + d 4 d 4 + = τ 4 other   constraints   are   the   same   as   those   of   Equation   ( 23 )
where ω α L , ω β L , ω α R , ω β R , ν α L , ν β L , ν α R , ν β R , x i ( α ) L , x i ( β ) L , x i ( α ) R , x i ( β ) R , y i ( α ) L , y i ( β ) L , y i ( α ) R , and y i ( β ) R are decision variables; λ [ 0 , 1 ] , α [ 0 , min { w h ˜ i j , w k ˜ i j | i = 1 , 2 , , I ;   j = 1 , 2 , , J } ] , and β [ max { u h ˜ i j , u k ˜ i j | i = 1 , 2 , , I ;   j = 1 , 2 , , J } , 1 ] are parameters, and α + β [ 0 ,   1 ] ; it can be given in advance based on the characteristics and requirements of practical game problems.
For the given parameters λ , α , and β , the Nash equilibrium solution can be obtained by solving Equation (29) with Lingo.11.0 software (developed by Lindo systems in the United States), which is denoted as ( x α L , x α R , x β L , x β R , y α L , y α R , y β L , y β R , ω α L , ω α R , ω β L , ω β R , ν α L , ν α R , ν β L , ν β R ) . ω α R and ω α L are the upper bound and lower bound of player P 1 ’s Nash equilibrium value ω ˜ at the α -level, and the corresponding Nash equilibrium strategies are x α R and x α L , respectively. ν α R and ν α L are the upper bound and lower bound of player P 2 ’s Nash equilibrium value ν ˜ at the α -level, and the corresponding Nash equilibrium strategies are y α R and y α L , respectively. Equally, at the β -level, ω β R and ω β L are the upper bound and lower bound of player P 1 ’s Nash equilibrium value ω ˜ , the corresponding Nash equilibrium strategies are x β R and x β L , ν β R and ν β L are the upper bound and lower bound of player P 2 ’s Nash equilibrium value ν ˜ , and the corresponding Nash equilibrium strategies are y β R and y β L .
Remark 5.
In Equations (23), (28) and (29), different values of the acceptance degree λ represent the different risk favors of the player and the results of the bi-matrix game problem will vary with the change of λ . The player is risk-averse when the parameter 0 λ < 0.5 , the player is risk-like when the parameter 0.5 < λ 1 , and the player is risk-neutral when the parameter λ takes the value of 0.5 .
According to the above detailed discussion in Section 4.3, the steps of solving GIFBMG can be summarized as follows:
Step 1. Determine the players P 1 and P 2 and construct the pure strategy sets A and B .
Step 2. Establish the payoff matrices H ˜ = ( h ˜ i j ) I × J and K ˜ = ( k ˜ i j ) I × J for players P 1 and P 2 , respectively.
Step 3. Compute the cut sets of elements h ˜ i j and k ˜ i j in payoff matrices H ˜ and K ˜ , respectively, in advance.
Step 4. Select the proper ordered pair < α , β > and player’s risk preference λ [ 0 , 1 ] ; then, construct a multi-objective quadratic programming model by employing Equation (28).
Step 5. Acquire the targets τ 1 , τ 2 , τ 3 , and τ 4 to attain for objectives ϕ α 1 , ϕ α 2 , ϕ β 1 , and ϕ β 2 from the player, respectively.
Step 6. Obtain the priority factors Q 1 , Q 2 , Q 3 , and Q 4 given to the four objectives ϕ α 1 , ϕ α 2 , ϕ β 1 , and ϕ β 2 .
Step 7. Build the single objective quadratic programming model through using Equation (29).
Step 8. Adopting Lingo.11.0 software, the cut sets of Nash equilibrium values and corresponding Nash equilibrium strategies can be obtained by solving the single objective quadratic programming model built in Step 7.
Step 9. If the results obtained in Step 8 do not meet the players’ requirements, then adjust the values of < α , β > and λ [ 0 , 1 ] and return to Step 4; otherwise, the solution process ends.

5. Application of Strategy Choice in Corporate Environmental Behavior

5.1. Description of Strategy Choice Problem in Corporate Environmental Behavior

With the rapid development of industry, environmental problems become more and more serious. Many corporations even trade their economic benefits at the expense of environmental benefits. Regarding environmental pollution control issues, the government and the corporation, as the two parties in the game, will adopt corresponding strategies to deal with each other’s strategies based on their own benefits. In other words, the government (corporation) will choose the right strategy to deal with the corporation (government) strategy. The relevant laws and regulations of environmental pollution and high-intensity supervision can increase the social environmental benefits, but it needs to sacrifice part of the economic benefits. If the government relaxes his (her) supervision, it will not only lead to the reduction in environmental utility but also be punished by the superior government, thereby reducing the credibility of the public. If corporation does not take the initiative to implement environmental behavior, not only will their market competitiveness be reduced, their reputation will be damaged, and it will even hinder the high-quality development of the economy. The problem of environmental pollution control can be regarded as a bi-matrix game without cooperation, in which the main government and corporation are regarded as players P 1 and P 2 , respectively. Each player is rational where the government P 1 is to maximize social welfare, and the corporation P 2 is to maximize his own interest. The government has three strategies to choose from, namely, positive supervision ( a 1 ), maintain the status quo ( a 2 ), and negative supervision ( a 3 ), the corporation has three options: positive environmental behavior ( b 1 ), maintain the status quo ( b 2 ), and negative environmental behavior ( b 3 ).
Due to the complexity of the game environment and the uncertainty of available information, players can only give an approximate estimate rather than a deterministic payoff. Hence, it is very sensible to use GIFNs to evaluate the players’ judgment. The payoff matrices H ˜ = ( h ˜ i j ) 3 × 3 and K ˜ = ( k ˜ i j ) 3 × 3 of the government and corporation in various situations are respectively represented as follows, whose elements are expressed by GIFNs.
H ˜ = b 1 b 2 b 3 a 1 a 2 a 3 ( h ˜ 11 h ˜ 21 h ˜ 31 h ˜ 12 h ˜ 22 h ˜ 32 h ˜ 13 h ˜ 23 h ˜ 33 )   and   K ˜ = b 1 b 2 b 3 a 1 a 2 a 3 ( k ˜ 11 k ˜ 21 k ˜ 31 k ˜ 12 k ˜ 22 k ˜ 32 k ˜ 13 k ˜ 23 k ˜ 33 )
where the specific values of h ˜ i j and k ˜ i j are shown in Appendix A.
The element h ˜ 11 =   < ( 185 , 190 , 195 , 200 ) , φ 111 l , φ 111 r , 0.6 ; ( 175 , 187 , 197 , 205 ) , φ 211 l , φ 211 r , 0.2 > in matrix H ˜ stands for the profit of player P 1 (government) at the situation ( a 1 , b 1 ): that is when player P 1 chooses positive supervision ( a 1 ) strategy, and player P 2 (corporation) chooses positive environmental behavior ( b 1 ) strategy. Since player P 1 is not completely sure of the estimated profit, then the satisfaction degree of h ˜ 11 for player P 1 is 0.6, the dissatisfaction degree is 0.2, and the hesitant degree is 0.2. Other elements in the payoff matrix H ˜ and K ˜ can be analogously explained.

5.2. Results Obtained by the Proposed Method

The solution steps are as follows:.
Step 1. Let players P 1 and P 2 be government and corporation, and their pure strategy sets are { a 1 , a 2 , a 3 } and { b 1 , b 2 , b 3 } , respectively.
Step 2. Establish the payoff matrices H ˜ = ( h ˜ i j ) 3 × 3 and K ˜ = ( k ˜ i j ) 3 × 3 for players P 1 and P 2 , respectively.
Step 3. Compute the cut sets of elements h ˜ i j and k ˜ i j in payoff matrices H ˜ and K ˜ , respectively.
Step 4. Let < α , β >   =   < 0.3 , 0.6 > and λ = 0.5 ; then, a multi-objective quadratic programming model can be constructed by employing Equation (28).
Step 5. According to the model constructed in Step 4, the solution ϕ α 1 of the objective program min { ϕ α 1 } overlooking other objectives is ϕ α 1 = 344.1421 . It is not hard to obtain the values of ϕ α 2 , ϕ β 1 , ϕ β 2 , and τ t   ( t = 1 , 2 , 3 , 4 ) , which are depicted as follows: ϕ α 2 = 2.4021 , ϕ β 1 = 316.275 , ϕ β 2 = 0.5557 , τ 1 = 344.1421 θ , τ 2 = 2.4021 θ , τ 3 = 316.275 θ , and τ 4 = 0.5557 θ .
Step 6. In general, presuming the priority factor is Q 1 Q 2 Q 3 Q 4 and set θ = 0.9 , where Q 1 Q 2 means that Q 1 has more priority than Q 2 .
Step 7. A single objective quadratic programming model can be constructed by using Equation (29). Since the formula is too long after substituting the specific value, for the sake of simplicity, it will not be written in detail here.
Step 8. Adopting Lingo.11.0 to solve the mode constructed in Step 7.
The Nash equilibrium strategies and the cut sets of Nash equilibrium values of players P 1 (government) and P 2 (corporation) can be obtained as follows:
ω ˜ α = [ 0 , 346.2119 ] ,   ω ˜ β = [ 0 , 339.6408 ] ,   ω ˜ < α , β > = [ 0 , 339.6408 ] ,   ( x α L ) T = ( 0.6707 , 0.0101 , 0.3192 ) ,   ( x α R ) T = ( 0 , 1 , 0 ) ,   ( x β L ) T = ( 0.8034 , 0 , 0.1966 ) ,   ( x β R ) T = ( 0 , 0.9265 , 0.0735 ) ,   ν ˜ α = [ 17.4914 , 328.883 ] ,   ν ˜ β = [ 0 , 348.7793 ] ,   ν ˜ < α , β > = [ 17.4914 , 328.883 ] ,   ( y α L ) T = ( 0.9533 , 0.0033 , 0.0434 ) ,   ( y α R ) T = ( 0 , 0 , 1 ) ,   ( y β L ) T = ( 0.8562 , 0.1438 , 0 ) ,   ( y β R ) T = ( 0 , 0 , 1 ) .
Step 9. If the results obtained in Step 8 do not meet the players’ requirements, then adjust < α , β > and λ [ 0 , 1 ] and return to Step 4; otherwise, the solution process ends, the players’ Nash equilibrium strategies and Nash equilibrium values are obtained.
When the acceptance degree λ takes different values, the upper and lower bounds of the interval-type values of the α and β -bi-matrix games and players’ Nash equilibrium strategies can be obtained for different values of < α , β > . Taking λ = 0.5 as an example, the Nash equilibrium solution corresponding to the value of < α , β > is obtained, as shown in Table 1.
In addition, when the ordered pair < α , β > takes different values, the Nash equilibrium values of players for various values of acceptance degree λ can be also calculated, which is not listed here. At the same time, since the Nash equilibrium values of players at any < α , β > -level are intervals, in order to display the results more intuitively and better analyze, we use the midpoint of the intervals to depict the Nash equilibrium values of players. That is to say, the Nash equilibrium value of player P 1 at < α , β > -level is represented as ω < α , β > = ( ω < α , β > L + ω < α , β > R ) / 2 , and the Nash equilibrium value of player P 2 at < α , β > -level is represented as ν < α , β > = ( ν < α , β > L + ν < α , β > R ) / 2 . Then, we plot the figure of the Nash equilibrium value ω < α , β > of P 1 corresponding to the acceptance degree λ at different values of < α , β > , which is shown in Figure 2. The graph of the Nash equilibrium value ν < α , β > of P 2 corresponding to the acceptance degree λ at different values of < α , β > is drawn in Figure 3.
Moreover, we can obtain the following attractive observations from Table 1 as well as Figure 2 and Figure 3:
  • It can be found from Table 1 that the upper and lower bounds of the interval-type values of the α and β -bi-matrix games and players’ Nash equilibrium strategies can be obtained for different values of < α , β > . It shows that the players can have more choices in the game process and make the decision-making process more flexible. The cut sets are used to handle the GIF preferences of players in the proposed method, which is an effective means for keeping as much information as possible.
  • Figure 2 and Figure 3 reveal that the Nash equilibrium values of players P 1 and P 2 increase with the increase in acceptance degree when λ [ 0 , 0.1 ] , the Nash equilibrium values of players P 1 and P 2 decline with the increase in acceptance degree when λ [ 0.1 , 1 ] . In the actual decision-making process, the more risk the player prefers, the higher the expected return. In other words, the players are willing to take greater risk in order to obtain higher benefits. Nevertheless, if players blindly pursue high risks too much, their returns will decline when a certain risk threshold is reached. It is easy to see from Figure 2 and Figure 3 that λ = 0.1 is the risk threshold. From the logical point of view, the results obtained in this paper are consistent with the reality and human intuition.
  • Figure 2 and Figure 3 show that the Nash equilibrium values of players reach the maximum at the risk threshold ( λ = 0.1 ). When the risk tolerances of players are less than the risk threshold, the Nash equilibrium values of players are proportional to their own risk preference. When the risk tolerances of players are greater than the risk threshold, the Nash equilibrium values of players are inversely proportional to their own risk preference. If players blindly pursue high risks, their Nash equilibrium values will drop when a certain risk threshold is reached.
In general, Table 1 and Figure 2 and Figure 3 demonstrate that players can obtain diverse Nash equilibrium strategies and upper and lower bounds of the interval-type values of the α and β -bi-matrix games by determining various acceptance degrees in the light of his own risk attitude; that is, the acceptance degree λ is sensitive to the decision result. Moreover, players can adjust the values of < α , β > and λ to acquire their own satisfactory decision results. Since the method developed in this study fully considers the player’s acceptance degree of the possible violation of GIF constraints, it is self-evident that this consideration significantly improves the flexibility of the game process, and the outcomes are more in line with the actual condition.

5.3. Comparative Analysis with Li and Yang’s Method

As stated earlier, when φ 1 l ( x ) , φ 1 r ( x ) , φ 2 l ( x ) , and φ 2 r ( x ) are linear functions and h _ 1 = h _ 2 = h _ , h 1 l = h 2 l = h 1 , h 1 r = h 2 r = h 2 , and h ¯ 1 = h ¯ 2 = h ¯ , a GIFN can be reduced to a TrIFN h ˜ =   < ( h _ , h 1 , h 2 , h ¯ ) , w h ˜ , u h ˜ > introduced in [27]. In order to better verify the effectiveness and superiority of the proposed method, the proposed method is used to solve the commerce retailers’ strategy choice problem mentioned in Li and Yang [27].
The results obtained by [27] are shown in Figure 4 and Figure 5, where the parameters λ 1 [ 0 , 1 ] and λ 2 [ 0 , 1 ] represent the risk preferences of players P 1 and P 2 , respectively. Since the cut sets of Nash equilibrium values of players are intervals, for better analysis, the midpoint of the interval is used to depict the Nash equilibrium values of players with regard to the acceptance degree. Only five values of parameter < α , β > are taken as examples; we plot the figure of the Nash equilibrium values ω < α , β > and ν < α , β > of players P 1 and P 2 with regard to the acceptance degree, respectively, as shown in Figure 6 and Figure 7.
Compared with Li and Yang’s [27] method, we can draw the following conclusions:
  • In Li and Yang’s [27] method, the satisfying Nash equilibrium values of players are only affected by their own parameters λ 1 and λ 2 , and the strategy choice of a player is only affected by the other player’s parameters. However, in this paper, the Nash equilibrium values and corresponding Nash equilibrium strategies of players can be affected by the values of arbitrary < α , β > and acceptance degree λ , which greatly strengthen the flexibility of the decision process.
  • It can be seen from Figure 4 and Figure 5 that the satisfying Nash equilibrium values of players P 1 and P 2 increase with the increase in their own risk preferences. Figure 6 and Figure 7 show that the Nash equilibrium values of players increase with the increase in acceptance degree when λ [ 0 , 0.1 ] , and they decrease with the increase in acceptance degree when λ [ 0.1 , 1 ] . In the actual decision-making process, the more risk the player prefers, the higher the expected payoff. If players blindly pursue high risk too much, their payoffs will decline when a certain risk threshold is reached. It is easy to see from Figure 6 and Figure 7 that λ = 0.1 is the risk threshold. However, Figure 4 and Figure 5 do not reflect the risk threshold.
  • Li and Yang [27] defuzzified the intuitionistic fuzzy preferences directly into real numbers through applying a difference-index based sorting method. Such transformation may bring about the loss of information and irrational outcomes. However, in the proposed method, the cut sets are used to handle the GIF preference, which is a valid and appropriate method for preserving as much information as possible.
To sum up, it is more reasonable to employ the proposed method to solve the practical bi-matrix game problem than the method proposed in [27]. In addition, it can be applied to other bi-matrix game problems in which the payoffs are expressed as various fuzzy numbers.

5.4. Comparative Analysis with the Method of An et al.

When w h ˜ = 1 , u h ˜ = 0 , then the GIFN h ˜ defined in this paper is degenerated to an IFN h ˜ =   < ( h _ 1 , h 1 l , h 1 r , h ¯ 1 ) , φ 1 l , φ 1 r ; ( h _ 2 , h 2 l , h 2 r , h ¯ 2 ) , φ 2 l , φ 2 r > , as mentioned in [31]. Next, the method of An et al. [31] and the method proposed in this paper are employed to solve the adopted strategy choice problem of CEB in Section 5.1 (using IFNs instead of general IFNs), respectively.
An et al. [31] developed a weighted mean-area ranking based non-linear programming approach to solving an intuitionistic fuzzy bi-matrix game. According to Definition 8 and Equation (24) in [31], the parameterized non-linear programming model is constructed as follows:
max   { [ ( 11 / 6 ) ρ + 572 / 3 + 2.5 ρ + 162.5 ] x 1 y 1 + [ ρ + 120 ( 1 / 6 ) ρ + 577 / 3 ] x 1 y 2 + [ ( 5 / 6 ) ρ + 590 / 3 ( 5 / 3 ) ρ + 150 ] x 1 y 3 + [ ( 2 / 3 ) ρ + 162.5 5 ρ + 1045 / 6 ] x 2 y 1 + [ ( 5 / 3 ) ρ + 530 / 3 ( 19 / 6 ) ρ + 857 / 6 ] x 2 y 2 + [ 185 + ( 5 / 2 ) ρ + 325 / 2 ] x 2 y 3 + [ 4 ρ + 751 / 6 ( 1 / 3 ) ρ + 1093 / 6 ] x 3 y 1 + [ ( 19 / 6 ) ρ + 857 / 6 ( 5 / 3 ) ρ + 530 / 3 ] x 3 y 2 + [ ( 4 / 3 ) ρ + 509 / 3 2 ρ + 425 / 3 ] x 3 y 3 S ρ ( ω ˜ ) S ρ ( ν ˜ ) } s . t .   { [ ( 11 / 6 ) ρ + 572 / 3 ] y 1 + ( ρ + 120 ) y 2 + [ ( 5 / 3 ) ρ + 150 ] y 3 S ρ ( ω ˜ ) [ ( 2 / 3 ) ρ + 162.5 ] y 1 + [ ( 5 / 3 ) ρ + 530 / 3 ] y 2 + 185 y 3 S ρ ( ω ˜ ) ( 4 ρ + 751 / 6 ) y 1 + [ ( 19 / 6 ) ρ + 857 / 6 ] y 2 + [ ( 4 / 3 ) ρ + 509 / 3 ] y 3 S ρ ( ω ˜ ) [ ( 5 / 2 ) ρ + 325 / 2 ] x 1 + ( 5 ρ + 1045 / 6 ) x 2 + [ ( 1 / 3 ) ρ + 1093 / 6 ] x 3 S ρ ( ν ˜ ) [ ( 1 / 6 ) ρ + 577 / 3 ] x 1 + [ ( 19 / 6 ) ρ + 857 / 6 ] x 2 + [ ( 5 / 3 ) ρ + 530 / 3 ] x 3 S ρ ( ν ˜ ) [ ( 5 / 6 ) ρ + 590 / 3 ] x 1 + [ ( 5 / 2 ) ρ + 325 / 2 ] x 2 + ( 2 ρ + 425 / 3 ) x 3 S ρ ( ν ˜ ) x 1 + x 2 + x 3 = 1 ,   y 1 + y 2 + y 3 = 1 x 1 ,   x 2 ,   x 3 ,   y 1 ,   y 2 ,   y 3 0
where ρ [ 0 , 1 ] represents the players’ preference about the average area of membership function and non-membership function.
The Pareto optimal strategies and weighted mean areas of Pareto optimal values of players can be obtained by means of solving the above model (i.e., Equation (30)), as depicted in Table 2. Then, we plot the figure of the weighted mean areas of Pareto optimal values of players P 1 and P 2 corresponding to the risk preference ρ , as shown in Figure 8 and Figure 9.
Let the acceptance degree λ = 0.5 ; the results derived by the proposed method are listed in Table 3. In addition, since the Nash equilibrium values of players at < α , β > -level are intervals, for better analysis, the midpoint of the interval is used to depict the Nash equilibrium values of players about the acceptance degree. We plot the figure of the Nash equilibrium values of players P 1 and P 2 corresponding to the acceptance degree at different values of < α , β > , as shown in Figure 10 and Figure 11.
The differences and superiorities of the proposed method over the method of An et al. [31] are summarized as follows:
  • It can be seen from Figure 8 and Figure 9 that the weighted mean areas Pareto optimal values of player P 1 increase with the increase in the parameter ρ , and the weighted mean areas Pareto optimal values of player P 2 decrease with the increase in the parameter ρ . In general, when players have the same risk preference, the trend of the players’ Nash equilibrium value with the change of risk preference should be the same. Figure 10 and Figure 11 demonstrate that the Nash equilibrium values of players P 1 and P 2 increase with the increase in acceptance degree when 0 λ 0.1 , and they decrease with the increase in acceptance degree when 0.1 λ 1 . In the actual decision-making process, the more risk the player prefers, the higher the expected payoff. If players blindly pursue high risk too much, their payoffs will decline when a certain risk threshold is reached. It is easy to see from Figure 10 and Figure 11 that λ = 0.1 is the risk threshold. However, the results obtained by the method of An et al. [31] not only do not reflect the risk threshold, but also, the weighted mean areas of Pareto optimal values of players have a completely opposite trend with the change of risk preference. Thus, from the intuitive and logical point of view, the results obtained by the proposed method are more in accordance with the real-life situation than [31].
  • Intuitively, the decision results in Table 3 are richer than those in Table 2. Additionally, in Table 2, the probability x 2 of player P 1 (government) choosing a pure strategy a 3 (negative supervision) and the probability y 3 of player P 2 (corporation) choosing a pure strategy b 2 (maintain the status quo) do not change with different values of parameter ρ , and the values of x 2 and y 3 are always equal to zero. However, the Nash equilibrium strategy obtained by the proposed method changes with the different acceptance degrees of players, and it is not always zero. By changing the values of λ and < α , β > , different Nash equilibrium strategies and Nash equilibrium values can be obtained, which enables players to have richer choices and make the decision more flexible in the various actual situations. Therefore, the results obtained by the method proposed in this paper are more reasonable than those in [31].
  • In the method of An et al. [31], the intuitionistic fuzzy preferences are directly defuzzified into real numbers by adopting a mean-area ranking method, which makes it easy to create the loss of information and bring about inadvisable outcomes. However, the proposed method of this paper employs the cut set of GIFNs to transform the GIF preference into an interval to address the bi-matrix game problem, which is an effective and suitable technique for holding GIF information longer.
The proposed method takes the player’s acceptance degree that the GIF constraints may be violated into account, which makes the decision results more flexible and realistic. We can obtain different Nash equilibrium solutions by taking different values of acceptance degree. Since the acceptance degree reflects the subjective preference of player on the GIF constraints, it is more reasonable and natural to incorporate the acceptance degree into the process of solving the GIF quadratic program.

6. Discussion

Peng et al. [53] thought that CEB can be regarded as a series of measures taken by corporations to improve social benefits in addition to their own benefits and legal demands. Good environmental behavior can help the corporation win a better reputation and occupy a more favorable position in market competition. However, due to the negative externality of environmental use, corporations are not willing to take the initiative to implement environmental behavior. The government’s strict policies and regulations cannot completely “block” all corporate sewage outlets. Therefore, it is of great significance to study the game between corporation and government, which is conducive to strengthen and promote the environmental management of corporation.
The results of our paper demonstrate that players can determine different acceptances according to their risk attitude, so as to obtain different Nash equilibrium strategies and upper and lower bounds of the interval-type values of α and β bi-matrix games. Moreover, players can adjust the values of parameters to acquire their own satisfactory decision results.

6.1. Advantages

This paper develops a new GIFBMG method considering the player’s acceptance degree of the possible violation of GIF constraints. The advantages of the proposed method are highlighted as follows:
  • This paper provides a novel way to address GIF information that can retain as much information as possible during the game process. The proposed method can offer more detailed information regarding the Nash equilibrium value, including the tendency of a player’s Nash equilibrium value at different < α , β > levels.
  • During the processes of model conversion and solution, this paper not only skillfully combines interval order relation with interval goal program but also considers the player’s acceptance degree. These processes are rigorous, meaningful, and reasonable.
  • Taking full account of the player’s acceptance degree of possible violations of GIF constraints significantly increases the flexibility of the game process and makes the results more realistic.

6.2. Disadvantages

The limitation of the proposed method is that this paper only considers the quadratic function form of the membership and non-membership function of GIFN. In addition, from the mathematical point, the elaboration looks appropriate, but from the decision-maker point of view and with some cognitive limitations, this approach looks a “little complicated”.

7. Conclusions

In 2020, the Wuxi Ecological Environment Bureau of China announced the top ten typical cases of ecological environment violations, among which the waste water discharge case of Jiangsu Pujun protective articles Co., Ltd., located in Jiangsu Province, China, evading supervision is of particular concern. In May 2020, this company illegally discharged the overflow water from the sump to Baiqu port through the rainwater outlet, was fined RMB 400,000, and the facilities causing the illegal discharge of water pollutants were sealed up. It is reported that the city issued a total of 992 administrative punishment decisions, with an administrative punishment amount of 97.923 million yuan. However, the administrative punishment cannot fundamentally solve the problem of environmental pollution.
To cope with such a complex decision-making problem, the proposed method can provide some ideas and directions for CEB. The proposed method fully considers the player’s acceptance degree of a possible violation of GIF constraints. A new method to deal with GIF information is proposed, which overcomes the disadvantage of information loss. Compared with Li and Yang’s method and the method of An et al., the proposed method is more flexible and effective, and this method overcomes the shortcomings of the existing methods [25,26,27,28,29,30,31]. In the game between government and enterprise, the ideal state is that enterprises can actively implement enterprise environmental behavior without government supervision, so as to realize the virtuous cycle of environmental governance.
In the future, we expect that the proposed method can be applied to some related fields such as ecological management and tourism environment management. In addition, it is an interesting direction to extend the proposed method to solve other types of game problems such as matrix game, cooperative games, and evolutionary game.

Author Contributions

Conceptualization, S.L. and G.T.; methodology, S.L.; software, S.L.; formal analysis, S.L. and G.T.; investigation, S.L. and G.T.; writing—original draft preparation, S.L.; writing—review and editing, S.L. and G.T. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Natural Science Foundation of China, grant number 71764016 and the Jiangxi Province Young Marxists Theoretical Research Innovation Project of China, grant number 21QM98.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data utilized in this manuscript are hypothetical and artificial, and one can use these data before prior permission by simply citing this manuscript.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

Payoff values in payoff matrices H ˜ = ( h ˜ i j ) 3 × 3 and K ˜ = ( k ˜ i j ) 3 × 3 h ˜ 11 =   < ( 185 , 190 , 195 , 200 ) , φ 111 l , φ 111 r , 0.6 ; ( 175 , 187 , 197 , 205 ) , φ 211 l , φ 211 r , 0.2 > , h ˜ 12 =   < ( 105 , 119 , 124 , 135 ) , φ 112 l , φ 112 r , 0.8 ; ( 100 , 110 , 130 , 140 ) , φ 212 l , φ 212 r , 0.1 > , h ˜ 13 =   < ( 130 , 140 , 155 , 170 ) , φ 113 l , φ 113 r , 0.7 ; ( 125 , 135 , 165 , 175 ) , φ 213 l , φ 213 r , 0.1 > , h ˜ 21 =   < ( 144 , 155 , 170 , 185 ) , φ 121 l , φ 121 r , 0.7 ; ( 130 , 145 , 180 , 195 ) , φ 221 l , φ 221 r , 0.3 > , h ˜ 22 =   < ( 160 , 170 , 180 , 190 ) , φ 122 l , φ 122 r , 0.6 ; ( 155 , 165 , 185 , 200 ) , φ 222 l , φ 222 r , 0.2 > , h ˜ 23 =   < ( 170 , 180 , 190 , 200 ) , φ 123 l , φ 123 r , 0.8 ; ( 165 , 175 , 195 , 205 ) , φ 223 l , φ 223 r , 0.2 > , h ˜ 31 =   < ( 115 , 125 , 135 , 140 ) , φ 131 l , φ 131 r , 0.8 ; ( 100 , 120 , 137 , 147 ) , φ 231 l , φ 231 r , 0.2 > , h ˜ 32 =   < ( 120 , 135 , 144 , 160 ) , φ 132 l , φ 132 r , 0.6 ; ( 116 , 129 , 150 , 173 ) , φ 232 l , φ 232 r , 0.3 > , h ˜ 33 =   < ( 160 , 165 , 170 , 180 ) , φ 133 l , φ 133 r , 0.6 ; ( 150 , 163 , 175 , 190 ) , φ 233 l , φ 233 r , 0.1 > , k ˜ 11 =   < ( 145 , 160 , 170 , 185 ) , ψ 111 l , ψ 111 r , 0.6 ; ( 135 , 150 , 175 , 190 ) , ψ 211 l , ψ 211 r , 0.2 > , k ˜ 12 =   < ( 175 , 188 , 196 , 210 ) , ψ 112 l , ψ 112 r , 0.8 ; ( 170 , 180 , 204 , 215 ) , ψ 212 l , ψ 212 r , 0.1 > , k ˜ 13 =   < ( 180 , 195 , 200 , 215 ) , ψ 113 l , ψ 113 r , 0.7 ; ( 170 , 190 , 210 , 220 ) , ψ 213 l , ψ 213 r , 0.1 > , k ˜ 21 =   < ( 150 , 160 , 175 , 195 ) , ψ 121 l , ψ 121 r , 0.7 ; ( 140 , 155 , 190 , 210 ) , ψ 221 l , ψ 221 r , 0.3 > , k ˜ 22 =   < ( 120 , 135 , 144 , 160 ) , ψ 122 l , ψ 122 r , 0.6 ; ( 116 , 129 , 150 , 173 ) , ψ 222 l , ψ 222 r , 0.2 > , k ˜ 23 =   < ( 145 , 160 , 170 , 185 ) , ψ 123 l , ψ 123 r , 0.8 ; ( 135 , 150 , 175 , 190 ) , ψ 223 l , ψ 223 r , 0.2 > , k ˜ 31 =   < ( 170 , 175 , 188 , 195 ) , ψ 131 l , ψ 131 r , 0.8 ; ( 165 , 173 , 190 , 200 ) , ψ 231 l , ψ 231 r , 0.2 > , k ˜ 32 =   < ( 160 , 170 , 180 , 190 ) , ψ 132 l , ψ 132 r , 0.6 ; ( 155 , 165 , 185 , 200 ) , ψ 232 l , ψ 232 r , 0.3 > , k ˜ 33 =   < ( 120 , 135 , 144 , 160 ) , ψ 133 l , ψ 133 r , 0.6 ; ( 115 , 130 , 150 , 170 ) , ψ 233 l , ψ 233 r , 0.1 > .

References

  1. He, Z.X.; Shen, W.X.; Li, Q.B.; Xu, S.C.; Zhao, B.; Long, R.Y.; Chen, H. Investigating external and internal pressures on corporate environmental behavior in papermaking enterprises of China. J. Clean. Prod. 2018, 172, 1193–1211. [Google Scholar]
  2. Jiménez-Parra, B.; Alonso-Martínez, D.; Godos-Díez, J.L. The influence of corporate social responsibility on air pollution: Analysis of environmental regulation and eco-innovation effects. Corp. Soc. Responsib. Environ. Manag. 2018, 25, 1363–1375. [Google Scholar]
  3. Xing, Y.; Qiu, D. Solving triangular intuitionistic fuzzy matrix game by applying the accuracy function method. Symmetry 2019, 11, 1258. [Google Scholar]
  4. Brikaa, M.G.; Zheng, Z.; Ammar, E.-S. Fuzzy multi-objective programming approach for constrained matrix games with payoffs of fuzzy rough numbers. Symmetry 2019, 11, 702. [Google Scholar]
  5. Xue, W.T.; Xu, Z.S.; Zeng, X.J. Solving matrix games based on ambika method with hesitant fuzzy information and its application in the counter-terrorism issue. Appl. Intell. 2021, 51, 1227–1243. [Google Scholar]
  6. Yang, J.; Xu, Z.S. Matrix game-based approach for MADM with probabilistic triangular intuitionistic hesitant fuzzy information and its application. Comput. Ind. Eng. 2022, 163, 107787. [Google Scholar]
  7. Zhang, W.; Xing, Y.; Qiu, D. Multi-objective fuzzy bi-matrix game model: A multicriteria non-linear programming approach. Symmetry 2017, 9, 159. [Google Scholar]
  8. An, J.J.; Li, D.F. A linear programming approach to solve constrained bi-matrix games with intuitionistic fuzzy payoffs. Int. J. Fuzzy Syst. 2019, 21, 908–915. [Google Scholar]
  9. Feng, Z.; Tan, C. Credibilistic bimatrix games with loss aversion and triangular fuzzy payoffs. Int. J. Fuzzy Syst. 2020, 22, 1635–1652. [Google Scholar]
  10. Gao, L. An algorithm for finding approximate Nash equilibria in bimatrix games. Soft Comput. 2021, 25, 1181–1191. [Google Scholar]
  11. Bhaumik, A.; Roy, S.K.; Li, D.F. (α,β,γ)-cut set based ranking approach to solving bi-matrix games in neutrosophic environment. Soft Comput. 2021, 25, 2729–2739. [Google Scholar]
  12. Mukhopadhyay, A.; Chakraborty, S. Replicator equations induced by microscopic processes in nonoverlapping population playing bimatrix games. Chaos 2021, 31, 023123. [Google Scholar] [PubMed]
  13. Zhang, L.; Reniers, G.; Qiu, X. Playing chemical plant protection game with distribution-free uncertainties. Reliab. Eng. Syst. Saf. 2019, 191, 105899. [Google Scholar]
  14. Fei, W.; Li, D.F. Bilinear programming approach to solve interval bimatrix games in tourism planning management. Int. J. Fuzzy Syst. 2016, 18, 504–510. [Google Scholar]
  15. Brikaa, M.G.; Ammar, E.S.; Zheng, Z. Solving bi-matrix games in tourism planning management under rough interval approach. Int. J. Math. Sci. Comput. 2019, 5, 44–62. [Google Scholar]
  16. Yang, J.; Xu, Z.S.; Dai, Y.W. Simple noncooperative games with intuitionistic fuzzy information and application in ecological management. Appl. Intell. 2021, 51, 6685–6697. [Google Scholar]
  17. Zadeh, L.A. Fuzzy sets. Inf. Control 1965, 8, 338–353. [Google Scholar]
  18. Maeda, T. Characterization of the equilibrium strategy of the bi-matrix game with fuzzy payoff. J. Math. Anal. Appl. 2000, 251, 885–896. [Google Scholar]
  19. Vijay, V.; Chandra, S.; Bector, C.R. Matrix games with fuzzy goals and fuzzy payoffs. Omega 2005, 33, 425–429. [Google Scholar] [CrossRef]
  20. Larbani, M. Solving bi-matrix games with fuzzy payoffs by introducing nature as a third player. Fuzzy Sets Syst. 2009, 160, 657–666. [Google Scholar]
  21. Atanassov, K.T. Intuitionistic fuzzy sets. Fuzzy Sets Syst. 1986, 20, 87–96. [Google Scholar]
  22. Nayak, P.K.; Pal, M. Intuitionistic fuzzy optimization technique for Nash equilibrium solution of multi-objective bi-matrix games. J. Uncertain Syst. 2011, 5, 271–285. [Google Scholar]
  23. Nan, J.X.; Li, D.F.; An, J.J. Solving bi-matrix games with intuitionistic fuzzy goals and intuitionistic fuzzy payoffs. J. Intell. Fuzzy Syst. 2017, 33, 3723–3732. [Google Scholar]
  24. Seikh, M.R.; Pal, M.; Nayak, P.K. Application of triangular intuitionistic fuzzy numbers in bi-matrix games. Int. J. Pure Appl. Math. 2012, 79, 235–247. [Google Scholar]
  25. Seikh, M.R.; Nayak, P.K.; Pal, M. Solving bi-matrix games with payoffs of triangular intuitionistic fuzzy numbers. Eur. J. Pure Appl. Math. 2015, 8, 153–171. [Google Scholar]
  26. Yang, J.; Li, D.F.; Lai, L.B. Parameterized bilinear programming methodology for solving triangular intuitionistic fuzzy number bimatrix games. J. Intell. Fuzzy Syst. 2016, 31, 115–125. [Google Scholar]
  27. Li, D.F.; Yang, J. A difference-index based ranking bilinear programming approach to solve bi-matrix games with payoffs of trapezoidal intuitionistic fuzzy number. J. Appl. Math. 2013, 2013, 697261. [Google Scholar]
  28. Verma, T.; Kumar, A.; Appadoo, S. Modified difference-index based ranking bilinear programming approach to solving bimatrix games with payoffs of trapezoidal intuitionistic fuzzy numbers. J. Intell. Fuzzy Syst. 2015, 29, 1607–1618. [Google Scholar]
  29. Khan, I.; Mehra, A. A novel equilibrium solution concept for intuitionistic fuzzy bi-matrix games considering proportion mix of possibility and necessity expectations. Granul. Comput. 2020, 5, 461–483. [Google Scholar]
  30. Yang, J.; Fei, W.; Li, D.F. Non-linear programming approach to solve bi-matrix games with payoffs represented by I-fuzzy numbers. Int. J. Fuzzy Syst. 2016, 18, 492–503. [Google Scholar]
  31. An, J.J.; Li, D.F.; Nan, J.X. A mean-area ranking based non-linear programming approach to solve intuitionistic fuzzy bi-matrix games. J. Intell. Fuzzy Syst. 2017, 33, 563–573. [Google Scholar]
  32. Abdul Ghaffar, A.R.; Hasan, M.G.; Ashraf, Z.; Khan, M.F. Fuzzy goal programming with an imprecise intuitionistic fuzzy preference relations. Symmetry 2020, 12, 1548. [Google Scholar]
  33. Roy, S.K.; Bhaumik, A. Intelligent water management: A triangular type-2 intuitionistic fuzzy matrix games approach. Water Resour. Manag. 2018, 32, 949–968. [Google Scholar]
  34. Bhaumik, A.; Roy, S.K.; Weber, G.W. Hesitant interval-valued intuitionistic fuzzy-linguistic term set approach in prisoners’ dilemma game theory using TOPSIS: A case study on human-trafficking. Cent. Eur. J. Oper. Res. 2020, 28, 797–816. [Google Scholar]
  35. Bhaumik, A.; Roy, S.K. Intuitionistic interval-valued hesitant fuzzy matrix games with a new aggregation operator for solving management problem. Granul. Comput. 2021, 6, 359–375. [Google Scholar]
  36. Yue, Q.; Yu, B.; Zhang, L.; Zhang, L.J.; Zhang, J. Two-sided matching for triangular intuitionistic fuzzy numbers in smart environmental protection. IEEE Access 2019, 7, 42426–42435. [Google Scholar]
  37. Yang, J.; Kilgour, D.M. Bi-fuzzy graph cooperative game model and application to profit allocation of ecological exploitation. Int. J. Fuzzy Syst. 2019, 21, 1858–1867. [Google Scholar]
  38. Liu, D.; Ji, X.; Tang, J.; Li, H. A fuzzy cooperative game theoretic approach for multinational water resource spatiotemporal allocation. Eur. J. Oper. Res. 2020, 282, 1025–1037. [Google Scholar]
  39. Nazari, S.; Ahmadi, A.; Kamrani Rad, S.; Ebrahimi, B. Application of non-cooperative dynamic game theory for groundwater conflict resolution. J. Environ. Manag. 2020, 270, 110889. [Google Scholar]
  40. Gu, C.; Wang, X.; Zhao, J.; Ding, R.; He, Q. Evolutionary game dynamics of Moran process with fuzzy payoffs and its application. Appl. Math. Comput. 2020, 378, 125227. [Google Scholar]
  41. Hu, C.Y.; Kearfott, R.B.; Korvin, A.D.; Kreinovich, V. Knowledge Processing with Interval and Soft Computing; Springer: London, UK, 2008; pp. 168–172. [Google Scholar]
  42. Ishibuchi, H.; Tanaka, H. Multiobjective programming in optimization of the interval objective function. Eur. J. Oper. Res. 1990, 48, 219–225. [Google Scholar]
  43. Nehi, H.M. A new ranking method for intuitionistic fuzzy numbers. Int. J. Fuzzy Syst. 2010, 12, 80–86. [Google Scholar]
  44. Atanassov, K.T. Intuitionistic Fuzzy Sets; Springer: Heidelberg, Germany, 1999. [Google Scholar]
  45. Li, D.F. A ratio ranking method of triangular intuitionistic fuzzy numbers and its application to MADM problems. Comput. Math. Appl. 2010, 60, 1557–1570. [Google Scholar]
  46. Inuiguchi, M.; Ramik, J. Possibilistic linear programming: A brief review of fuzzy mathematical programming and a comparison with stochastic programming in portfolio selection. Fuzzy Sets Syst. 2000, 111, 3–28. [Google Scholar]
  47. Owen, G. Game Theory, 2nd ed.; Academic Press: New York, NY, USA, 1982. [Google Scholar]
  48. Mangasarian, O.L.; Stone, H. Two-person nonzero-sum games and quadratic programming. J. Math. Anal. Appl. 1964, 9, 348–355. [Google Scholar]
  49. Li, D.F.; Liu, J.C. A parameterized non-linear programming approach to solve matrix games with payoffs of I-fuzzy numbers. IEEE Trans. Fuzzy Syst. 2015, 23, 885–896. [Google Scholar]
  50. Hajiagha, S.R.; Babalhavaeji, H.; Zavadskas, E.K.; Liao, H. An analysis of trapezoidal intuitionistic fuzzy preference relations based on (α,β)-cuts. Int. J. Fuzzy Syst. 2020, 22, 2735–2746. [Google Scholar]
  51. Nan, J.X.; Li, D.F.; Zhang, M.J. A lexicographic method for matrix games with payoffs of triangular intuitionistic fuzzy numbers. Int. J. Comput. Int. Syst. 2008, 3, 280–289. [Google Scholar]
  52. Li, D.F. An effective methodology for solving matrix games with fuzzy payoffs. IEEE Trans. Cybern. 2013, 43, 610–621. [Google Scholar]
  53. Peng, J.; Song, Y.; Tu, G.P.; Liu, Y.H. A study of the dual-target corporate environmental behavior (DTCEB) of heavily polluting enterprises under different environment regulations: Green innovation vs. pollutant emissions. J. Clean. Prod. 2021, 297, 126602. [Google Scholar]
Figure 1. A new GIFN h ˜ .
Figure 1. A new GIFN h ˜ .
Symmetry 14 00671 g001
Figure 2. Nash equilibrium value of player P 1 corresponding to the acceptance degree.
Figure 2. Nash equilibrium value of player P 1 corresponding to the acceptance degree.
Symmetry 14 00671 g002
Figure 3. Nash equilibrium value of player P 2 corresponding to the acceptance degree.
Figure 3. Nash equilibrium value of player P 2 corresponding to the acceptance degree.
Symmetry 14 00671 g003
Figure 4. Satisfying Nash equilibrium value of player P 1 corresponding to the risk preference λ 1 obtained by [27].
Figure 4. Satisfying Nash equilibrium value of player P 1 corresponding to the risk preference λ 1 obtained by [27].
Symmetry 14 00671 g004
Figure 5. Satisfying Nash equilibrium value of player P 2 corresponding to the risk preference λ 2 obtained by [27].
Figure 5. Satisfying Nash equilibrium value of player P 2 corresponding to the risk preference λ 2 obtained by [27].
Symmetry 14 00671 g005
Figure 6. Nash equilibrium value of player P 1 corresponding to the acceptance degree obtained by this paper.
Figure 6. Nash equilibrium value of player P 1 corresponding to the acceptance degree obtained by this paper.
Symmetry 14 00671 g006
Figure 7. Nash equilibrium value ν < α , β > of player P 2 corresponding to the acceptance degree obtained by this paper.
Figure 7. Nash equilibrium value ν < α , β > of player P 2 corresponding to the acceptance degree obtained by this paper.
Symmetry 14 00671 g007
Figure 8. Weighted meanareas of Pareto optimal value of player P1 corresponding to the risk preference obtained by [31].
Figure 8. Weighted meanareas of Pareto optimal value of player P1 corresponding to the risk preference obtained by [31].
Symmetry 14 00671 g008
Figure 9. Weighted mean areas of Pareto optimal value of player P2 corresponding to the risk preference obtained by [31].
Figure 9. Weighted mean areas of Pareto optimal value of player P2 corresponding to the risk preference obtained by [31].
Symmetry 14 00671 g009
Figure 10. Nash equilibrium value ω < α , β > of player P1 corresponding to the acceptance degree obtained by this paper.
Figure 10. Nash equilibrium value ω < α , β > of player P1 corresponding to the acceptance degree obtained by this paper.
Symmetry 14 00671 g010
Figure 11. Nash equilibrium value ν < α , β > of player P2 corresponding to the acceptance degree obtained by this paper.
Figure 11. Nash equilibrium value ν < α , β > of player P2 corresponding to the acceptance degree obtained by this paper.
Symmetry 14 00671 g011
Table 1. Nash equilibrium solution corresponding to the value of < α , β > ( λ = 0.5 ).
Table 1. Nash equilibrium solution corresponding to the value of < α , β > ( λ = 0.5 ).
< α , β > <0,1><0.1,0.8><0.3,0.6><0.5,0.4><0.6,0.3>
ω ˜ α [0, 347.5309][0, 346.8003][0, 346.2119][16.0880, 329.7892][0, 345.7154]
ω ˜ β [0, 328.9286][0, 339.497][0, 339.6408][0, 338.5919][0, 346.8725]
ω ˜ < α , β > [0, 328.9286][0, 339.497][0, 339.6408][16.0880, 329.7892][0, 345.7154]
( x ( α ) L ) T (0.6328, 0.1381, 0.2291)(0.688, 0.0193, 0.2927)(0.6707, 0.0101, 0.3192)(0.6277, 0.0393, 0.333)(0.5364, 0.1190, 0.3446)
( x ( β ) L ) T (0.815, 0.0603, 0.1247)(0.7409, 0.1309, 0.1281)(0.8034, 0, 0.1966)(0.5475, 0.4525, 0)(0.1853, 0.8147, 0)
( x ( α ) R ) T (0, 1, 0)(0, 1, 0)(0, 1, 0)(0, 1, 0)(0, 1, 0)
( x ( β ) R ) T (0, 0.6981, 0.3019)(0, 1, 0)(0, 0.9265, 0.0735)(0, 1, 0)(0.3004, 0.674, 0.0256)
ν ˜ α [16.2372, 330.1816][17.9850, 329.2688][17.4914, 328.883][0, 344.7673][0, 341.3333]
ν ˜ β [22.9759, 323.0472][17.5476, 331.3088][0, 348.7793][0, 345.0887][14.8145, 326.3595]
ν ˜ < α , β > [22.9759, 323.0472][17.5476, 329.2688][17.4914, 328.883][0, 344.7673][14.8145, 326.3595]
( y ( α ) L ) T (0.8642,0, 0.1358)(0.9142, 0, 0.0858)(0.9533, 0.0033, 0.0434)(0.9802, 0, 0.0198)(0.9922, 0, 0.0078)
( y ( β ) L ) T (1, 0, 0)(0.8554, 0.0796, 0.0650)(0.8562, 0.1438, 0)(0.6509, 0, 0.3491)(0.3148, 0, 0.6852)
( y ( α ) R ) T (0, 0, 1)(0, 0, 1)(0, 0, 1)(0, 0, 1)(0, 0, 1)
( y ( β ) R ) T (0.2143, 0.7857, 0)(0, 0.0421, 0.9579)(0, 0, 1)(0.6091, 0.3777, 0.0132)(1, 0, 0)
Table 2. Results obtained by [31].
Table 2. Results obtained by [31].
ρ Player P1Player P2
x S ρ ( ω ˜ ) y S ρ ( ν ˜ )
0(0.2545, 0.7455, 0)172.5330(0.5541, 0, 0.4459)171.1970
0.1(0.2430, 0.7570, 0)172.5665(0.5542, 0, 0.4458)171.0135
0.2(0.2311, 0.7689, 0)172.6001(0.5544, 0, 0.4456)170.8176
0.3(0.2186, 0.7814, 0)172.6337(0.5545, 0, 0.4455)170.6085
0.4(0.2055, 0.7945, 0)172.6674(0.5547, 0, 0.4453)170.3854
0.5(0.1919, 0.8081, 0)172.7011(0.5548, 0, 0.4452)170.1473
0.6(0.1777, 0.8223, 0)172.7348(0.5550, 0, 0.4450)169.8933
0.7(0.1628, 0.8372, 0)172.7687(0.5551, 0, 0.4449)169.6221
0.8(0.1472, 0.8528, 0)172.8025(0.5553, 0, 0.4447)169.3326
0.9(0.1308, 0.8692, 0)172.8364(0.5554, 0, 0.4446)169.0235
1(0.1136, 0.8864, 0)172.8704(0.5556, 0, 0.4444)168.6932
Table 3. Nash equilibrium solution corresponding to the value of < α , β > ( λ = 0.5 ) .
Table 3. Nash equilibrium solution corresponding to the value of < α , β > ( λ = 0.5 ) .
< α , β > <0,1><0.2,0.7><0.5,0.4><0.7,0.2><1,0>
ω ˜ α [0, 347.5309][17.0311, 329.3182][0, 345.7688][0, 345.4317][0.333, 349.8362]
ω ˜ β [0, 328.9286][0, 328.9568][0, 341.2992][12.5664, 331.7811][0.3145, 346.2709]
ω ˜ < α , β > [0, 328.9286][17.0311, 328.9568][0, 341.2992][12.5664, 331.7811][0.333, 346.2709]
( x ( α ) L ) T (0.6328, 0.1381, 0.2291)(0.6638, 0, 0.3362)(0.5785, 0.104, 0.3175)(0.5680, 0.0962, 0.3359)(0.0004, 0.9993, 0.0003)
( x ( β ) L ) T (0.815, 0.0603, 0.1247)(0.8762, 0, 0.1238)(0.5536, 0.4464, 0)(0.6633, 0.2166, 0.1200)(0, 1, 0)
( x ( α ) R ) T (0, 1, 0)(0, 0.9985, 0.0015)(0, 1, 0)(0, 1, 0)(0.1405, 0.8595, 0)
( x ( β ) R ) T (0, 0.6981, 0.3019)(0, 0.6788, 0.3212)(0, 1, 0)(0, 1, 0)(0.4042, 0.5874, 0.0084)
ν ˜ α [16.2372, 330.1816][0, 345.1106][0, 342.3091][0, 341.4819][24.6158, 309.7413]
ν ˜ β [22.9759, 323.0472][25.8908, 322.2203][0, 345.3942][0, 347.6357][14.3733, 324.5638]
ν ˜ < α , β > [22.9759, 323.0472][25.8908, 322.2203][0, 342.3091][0, 341.4819][24.6158, 309.7413]
( y ( α ) L ) T (0.8642, 0, 0.1358)(0.9229, 0, 0.0771)(0.958, 0, 0.042)(0.9764, 0, 0.0236)(0.0011, 0.0003, 0.9986)
( y ( β ) L ) T (1, 0, 0)(1, 0, 0)(0.3945, 0.378, 0.2274)(0.3621, 0.1666, 0.4713)(0.2805, 0, 0.7195)
( y ( α ) R ) T (0, 0, 1)(0.0013, 0.0046, 0.9941)(0, 0, 1)(0, 0, 1)(0.9993, 0.0007, 0)
( y ( β ) R ) T (0.2143, 0.7857, 0)(0.2086, 0.7914, 0)(1, 0, 0)(0.6091, 0.3777, 0.0132)(1, 0, 0)
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Li, S.; Tu, G. Bi-Matrix Games with General Intuitionistic Fuzzy Payoffs and Application in Corporate Environmental Behavior. Symmetry 2022, 14, 671. https://doi.org/10.3390/sym14040671

AMA Style

Li S, Tu G. Bi-Matrix Games with General Intuitionistic Fuzzy Payoffs and Application in Corporate Environmental Behavior. Symmetry. 2022; 14(4):671. https://doi.org/10.3390/sym14040671

Chicago/Turabian Style

Li, Shuying, and Guoping Tu. 2022. "Bi-Matrix Games with General Intuitionistic Fuzzy Payoffs and Application in Corporate Environmental Behavior" Symmetry 14, no. 4: 671. https://doi.org/10.3390/sym14040671

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop