Next Article in Journal
Modeling a Carbon-Efficient Road–Rail Intermodal Routing Problem with Soft Time Windows in a Time-Dependent and Fuzzy Environment by Chance-Constrained Programming
Previous Article in Journal
Urban Networks in the Yangtze River Delta from the Perspective of Transaction Linkages in Manufacturing Industries: Characteristics, Determinants, and Strategies for Intercity Integration Development
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Novel Pythagorean Fuzzy Set–Based Risk-Ranking Method for Handling Human Cognitive Information in Risk-Assessment Problems

1
Department of Management Sciences, R.O.C. Military Academy, Kaohsiung 830, Taiwan
2
Graduate Institute of Technology Management, National Chung Hsing University, Taichung 402, Taiwan
*
Author to whom correspondence should be addressed.
Systems 2023, 11(8), 402; https://doi.org/10.3390/systems11080402
Submission received: 4 July 2023 / Revised: 1 August 2023 / Accepted: 2 August 2023 / Published: 3 August 2023

Abstract

:
With the rapid evolution of the information age and the development of artificial intelligence, processing human cognitive information has become increasingly important. The risk-priority-number (RPN) approach is a natural language-processing method and is the most widely used risk-evaluation tool. However, the typical RPN approach cannot effectively process the various forms of human cognitive information or hesitant information provided by experts in risk assessments. In addition, it cannot process the relative-weight consideration of risk-assessment factors. In order to fully grasp the various forms of human cognitive information provided by experts during risk assessment, this paper proposes a novel Pythagorean fuzzy set–based (PFS) risk-ranking method. This method integrates the PFS and the combined compromise-solution (CoCoSo) method to handle human cognitive information in risk-assessment problems. In the numerical case study, this paper used a healthcare waste-hazards risk-assessment case to verify the validity and rationality of the proposed method for handling risk-assessment issues. The calculation results of the healthcare waste-hazards risk-assessment case are compared with the typical RPN approach, intuitionistic fuzzy set (IFS) method, PFS method, and the CoCoSo method. The numerical simulation verification results prove that the proposed method can comprehensively grasp various forms of cognitive information from experts and consider the relative weight of risk-assessment factors, providing more accurate and reasonable risk-assessment results.

1. Introduction

With the rapid development of artificial intelligence, information processing has become more complex and diversified in meeting the actual needs of decision-making evaluations. Natural language processing is an important part of artificial intelligence. How human cognition information is processed will affect the evaluation results of multi-criteria decision-analysis (MCDA) problems. Risk analysis is the first step in identifying a potential accident scenario [1]. The failure modes and effects analysis (FMEA) method, which originated in the US military in the 1960s, is a preventive risk-assessment tool widely used for qualitative assessment in MCDA. The risk-priority number (RPN) approach in FMEA is mainly used for ranking possible risk-failure items. The RPN approach is a natural language-processing method which uses the product of the three risk-assessment factors—severity (S), occurrence (O), and detection (D)—to calculate the RPN value. The risk factors S, O, and D use a semantic term set of 1 to 10 to represent the level of risk. Many scholars have combined FMEA and different algorithms to deal with issues related to risk assessment in different industries. For example, Chang et al. [2] combined the hesitant fuzzy linguistic-term sets and the ordered weighted geometric operator to process the risk-assessment problems of extreme low-k dielectric integration. Aydin et al. [3] combined the best-worst method and the picture fuzzy set–based approach to solving the risk-assessment problems of the oil and gas industry. Huang et al. [4] combined interactive multi-criteria decision-making and the probabilistic linguistic term-sets method to process the risk-assessment problems of enterprise architecture and information systems. To this day, many scholars have extended the application of the FMEA method to solve decision-related issues in many different industries, such as aircraft maintenance and repair [5], zero-carbon measures [6], the self-service electric car [7], high temperature superconducting devices [8], clean energy development [9], the lead-acid battery [10], and risk analysis of submarine pipelines [11]. Although the typical RPN approach is simple to calculate and widely used in different fields, it cannot effectively deal with fuzzy information (FI), intuitionistic FI, and Pythagorean FI, which are types of human cognitive information.
To grasp uncertain information in daily life, Atanassov [12] first introduced the concepts of intuitionistic fuzzy sets (IFSs). The characterized IFSs use membership grade (MG) and non-membership grade (NMG) to describe fuzzy phenomena in daily life, limiting the sum of MG and NMG to less than or equal to 1. As an extension of the original fuzzy set and IFS, the Pythagorean fuzzy set (PFS) can provide a larger solution space and better deal with uncertain information and FI when solving practical MCDA problems. Meanwhile, the characterized PFSs use the MG and the NMG to describe fuzzy phenomena in daily life, limiting the square sum of MG and NMG to less than or equal to 1. To this day, PFSs have been widely used in many different industries and fields, such as cotton fabric selection [13], security threats of computers [14], childhood cancer risk assessment [15], lean manufacturing [16], internet finance service [17], and sustainable supplier evaluation problems [18].
The key point of MCDA problems lies in the way multiple criteria are evaluated. Many scholars use different research methods to solve complex MCDA problems, such as the combined compromise solution (CoCoSo) method [19], simple weighted sum product (simple WISP) method [20], soft analytic network process method [21], neutrosophic set method [22], analytical hierarchy-process (AHP) method [23], the Serbian term ‘VlseKriterijumska Optimizacija I Kompromisno Resenje’ (VIKOR) method [24], multiobjective optimization by ratio analysis plus the full multiplicative form (MULTIMOORA) method [25], and so on. The relative weight consideration of risk-assessment factors is the main key to influencing the risk-ranking results of the basic elements of risk failure. However, the typical RPN method ignores the weight considerations between different risk-assessment factors, resulting in incorrect evaluation results. In order to effectively handle the weight considerations between different risk-assessment factors of MCDA problems, Yazdani et al. [19] first proposed the concept of the CoCoSo method, which uses the arithmetic weighted sum, the geometric weighted sum, and three different appraisal score strategies for ranking possible alternatives. Bouraima et al. [26] combined the interval rough number, stepwise weight assessment ratio analysis, and the CoCoSo method to perform the sustainable transportation assessment of railway systems in West Africa. Extending the concept of the CoCoSo method, Zafaranlouei et al. [27] combined the base-criterion method and the fuzzy Z-numbers method to solve the problem of sustainable waste management. Chang [28] combined the CoCoSo method, subjective-objective weights consideration, and the 2-tuple linguistic representation method to handle supplier-selection issues. To this day, the CoCoSo method has been extended to handle MCDA problems in different domains, such as railway transportation systems [26], doctor selection [29], risk assessment of gas pipeline construction [30], third-party reverse logistics [31], and the application of unmanned aerial vehicles in traffic management [32].
When risk-assessment operations are performed, cognitive information provided by experts is sometimes hesitant. However, the conventional risk-evaluation approach cannot handle hesitant cognitive information. To effectively overcome the limitation of the conventional risk-evaluation approach—such as the inability to handle FI, intuitionistic FI, and Pythagorean FI of human cognitive information, ignoring the relative-weight considerations between evaluation criteria, and the inability to process hesitant information from experts—this paper introduced a novel PFS-based risk-ranking method to handle human cognitive information in MCDA problems. The proposed PFS-based risk-ranking method uses the PFS method to simultaneously process complete information, FI, intuitionistic FI, and Pythagorean FI. For the risk-assessment factor consideration, the proposed PFS-based risk-ranking method uses the CoCoSo approach to consider the relative weight between risk-assessment factors. In processing hesitant information, the maximum operator, average operator, and minimum operator of the hesitation-interval value are used to calculate the risk-failure item ranking of different operators.
The remainder of this paper is structured as follows. In Section 2, we briefly review and introduce the basic concepts and operation rules related to IFSs, PFSs, and the CoCoSo method. Section 3 discusses the PFS-based risk-ranking approach for handling human cognitive information in risk-assessment problems. In Section 4, a practical healthcare waste-hazards risk-ranking example is used to illustrate the calculation process of the proposed risk-ranking method based on PFS and verify the effectiveness and correctness of the proposed method. Section 5 summarizes the conclusions and provides suggestions for future research.

2. Preliminary

This section briefly reviews the related definition, basic concepts, and algorithms of IFSs, PFSs, and the CoCoSo method.

2.1. Intuitionistic Fuzzy Sets and Pythagorean Fuzzy Sets

Atanassov [12] first introduced IFSs, which use the MG and the NMG to describe fuzzy phenomena in the real world. In IFSs, the numerical sum of the restricted MG and the NMG must be less than or equal to 1. To overcome the limitation of IFSs, Yager [33] proposed PFSs to deal with human cognitive information more realistically and flexibly. In the PFSs, the sum of the squares of MG and NMG must be less than or equal to 1. The related definitions and operation of IFSs and the PFSs are briefly introduced as follows:
Definition 1
[34]. If the U is the domain of discourse, IFS I in U is represented by the following equation:
I = < u , μ I u , υ I u > u U
where μ I u : U 0 ,   1 , υ I u : U 0 ,   1 , and 0 μ I u + υ I u 1 must be held. μ I u and υ I u indicate the MG and the NMG of the element u U , respectively. The degree of hesitation π I u is defined as π I u = 1 μ I u υ I u , π I u 0 , 1 . When π I u = 0 , IFS I degenerates into the original fuzzy set.
Definition 2
[35]. Let A = μ 1 , υ 1 and B = μ 2 , υ 2 be two intuitionistic fuzzy numbers (IFNs); then, the operations laws of IFNs are defined as follows:
A B = μ 1 + μ 2 μ 1 μ 2 ,   υ 1 υ 2
A B = μ 1 μ 2 , υ 1 + υ 2 υ 1 υ 2
Definition 3
[36]. Let A i = μ A i , υ A i be a collection of the IFN ( i = 1 , 2 , , n ), and w = w 1 , w 2 , , w n T the weights vector of A i , w i 0 , 1 , and i = 1 n w i = 1 . Then, the intuitionistic fuzzy weighted arithmetic averaging (IFWAA) operator is expressed as the formula below:
I F W A A A i = 1 i = 1 n 1 μ i w i , i = 1 n ν i w i  
The score function S A i of the IFN A i = μ A i , υ A i is expressed as the formula below:
S A i = μ A i υ A i
Definition 4
[37,38]. If U is the domain of discourse, PFS P in U is represented by the following equation:
P = < u ,   μ P   u ,   υ P u > u U
where μ P u : U 0 ,   1 , υ P u : U 0 ,   1 , and 0 μ P x 2 + υ P x 2 1 must be held. μ P u and υ P u indicate the MG and the NMG of the element u U , respectively. The degree of hesitation π P u is defined as π P u = 1 μ P u 2 υ P u 2 , π P u 0 , 1 .
In order to ensure a simple algorithm, the real number pair P = μ P , υ P in the PFS is used, called the Pythagorean fuzzy number (PFN). PFN P i = μ P i , υ P i satisfies 0 μ P i 1 , 0 υ P i 1 , and 0 μ P i 2 + υ P i 2 1 . It must be noted that the original fuzzy sets and IFSs are only a special case of PFS.
Definition 5
[35]. Let C = μ 1 , υ 1 and D = μ 2 , υ 2 be two PFNs; then, the operation laws of PFNs are defined as follows:
C D = μ 1 2 + μ 2 2 μ 1 2 μ 2 2 ,   υ 1 υ 2
C D = μ 1 μ 2 , υ 1 2 + υ 2 2 υ 1 2 υ 2 2  
λ C = 1 1 μ 1 2 λ ,   ν 1 λ ,   λ > 0
C λ =   μ 1 λ , 1 1 ν 1 2 λ   ,   λ > 0
Definition 6
[39]. Let C i = μ C i , υ C i be a collection of the PFN ( i = 1 , 2 , , n ), and w = w 1 , w 2 , , w n T the weights vector of C i , w i 0 , 1 , and i = 1 n w i = 1 . Then, the Pythagorean fuzzy weighted arithmetic averaging (PFWAA) operator is expressed as the formula below:
P F W A A C i = i = 1 n w i μ C i 2 , 1 i = 1 n w i 1 υ C i 2
Definition 7
[38,39]. The score function S C i and the accuracy function G C i of PFN C i = μ C i , υ C i is expressed as the formula below:
S C i = μ C i 2 ν C i 2 ,   S C i 1 ,   1
G C i = μ C i 2 + ν C i 2 ,   G C i 0 ,   1
If C 1 and C 2 are any of the two PFNs:
1.
If S C 1 > S C 2 , then C 1 > C 2 .
2.
If S C 1 < S C 2 , then C 1 < C 2 .
3.
If S C 1 = S C 2 , then
(a)
If G C 1 > G C 2 , then C 1 > C 2 .
(b)
If G C 1 < G C 2 , then C 1 < C 2 .
(c)
If G C 1 = G C 2 , then C 1 = C 2 .

2.2. CoCoSo Method

Yazdani et al. [19] first proposed the concept of the CoCoSo method to process MCDA problems. The basic principle of the CoCoSo method involves ranking potentially multiple alternatives using a combination of arithmetic weighting, geometric weighting, and three different aggregation strategies.
The detailed calculation steps and algorithm of the CoCoSo approach are expressed as follows [28,40]:
  • Step 1. Construct an initial evaluation matrix ( x i j ).
x i j is the evaluation information of alternative i and criterion j.
x i j = x 11 x 12 x 1 n x 21 x 22 x 2 n x m 1 x m 2 x m n ,   i = 1 ,   2 ,   ,   m ,   j = 1 ,   2 ,   ,   n
  • Step 2. Calculate the normalized evaluation matrix ( y i j ).
y i j = x i j m i n i x i j m a x i x i j m i n i x i j ;   for   the   performance   criterion
y i j = m a x i x i j x i j m a x i x i j m i n i x i j ;   for   the   cost   criterion
  • Step 3. Calculate the arithmetic weighted sum of the comparability sequence ( S i ) and the geometric weighted sum of the comparability sequence ( P i ).
S i = j = 1 n w j y i j ;   i = 1 ,   2 ,   ,   m ;
P i = j = 1 n ( y i j ) w j ;   i = 1 ,   2 ,   ,   m .
  • Step 4. Use the three appraisal score strategies to calculate the relative weight of alternatives.
R i a = P i + S i i = 1 m P i + S i
R i b = S i m i n i S i + P i m i n i P i
R i c = ξ S i + 1 ξ P i ξ · m a x i S i + ( 1 ξ ) · m a x i P i ,   0 ξ 1 .
The ξ value is decided by the decision-maker, usually set to ξ = 0.5 .
  • Step 5. Determine the final ranking of possible alternatives.
The comprehensive evaluation importance index ( R i ) values are considered to determine the final ranking of possible alternatives. Higher R i values represent the higher performance of the possible alternative.
R i = R i a · R i b · R i b 3 + 1 3 R i a + R i b + R i b

3. Proposed Novel Pythagorean Fuzzy Set–Based Risk-Ranking Method

Accurate risk assessment results use limited resources to prevent the occurrence of possible malfunctioning projects, ensuring that the product or system achieves the expected function. Risk-assessment problems are considered multi-expert and MCDA problems. The processing method of human cognitive information is a key problem in risk assessment, influencing the risk-ranking results. Due to its simple calculation, the RPN approach is the most widely used risk-assessment method. However, it can only handle complete information from experts and cannot handle FI, intuitionistic FI, and Pythagorean FI provided by experts. In addition, the RPN approach cannot handle hesitant information from experts and process the relative weight between possible evaluation criteria. These gaps can lead to incorrect risk-ranking results. To ensure correct and effective processing of risk ranking problems, this paper integrates PFSs and the CoCoSo method in handling human cognitive information. PFSs can process human cognitive information from a wide range of MCDA problems, unlike IFSs and typical fuzzy sets. The proposed novel PFS-based risk-ranking method uses the CoCoSo method to consider the relative weight of possible evaluation criteria. In dealing with hesitant information provided by experts, the proposed method uses the maximum operator, average operator, and minimum operator of the hesitation-interval value to perform calculations of different operators.
The proposed novel PFS-based risk-ranking method calculation has 7 steps; the flowchart is presented in Figure 1.
  • Step 1. Determine the composition of the risk-evaluation team and confirm all possible failure items.
According to the expertise and experience of the experts, form a cross-disciplinary risk-evaluation team in which team members can discuss all possible failure items together.
  • Step 2. Determine the risk levels of the three risk factors (S, O, and D) for each failed item.
Each expert determines the risk levels of the three risk factors (S, O, and D) for each failed item based on their past experience. The conversion between the risk levels, linguistic terms, and the PFN is shown in Table 1.
For example, in Table 1, an expert determines the risk level of the risk factors (S, O, and D) as s1, for which the corresponding linguistic term is extremely very low (EVL). Then the corresponding PFN is (0.05, 1.00).
  • Step 3. Convert hesitant information provided by the experts.
To deal with the hesitation information that experts provide, use the maximum operator, average operator, and minimum operator of the hesitation-interval value to replace the original hesitant information.
  • Step 4. Aggregate all information from different experts.
Use Equation (11) to aggregate all information from different experts.
  • Step 5. Defuzzify and normalize the Pythagorean FI.
Use Equation (12) to defuzzify the initial PFS decision matrix. Then, use Equations (15) and (16) to normalize the PFS decision matrix.
  • Step 6. Calculate the R i a , R i b , R i c , and the R i values of different operators.
Based on the maximum operator, average operator, and minimum operator, use Equations (19)–(22) to calculate the R i a , R i b , R i c , and the R i values for the different operators, respectively.
  • Step 7. Determine the risk-ranking results of all possible failure items and provide a decision-making reference.
The R i values from large to small indicate the results of the risk ranking of all possible failure projects. This risk-ranking result provides a reference for decision-making.
Figure 1. The flowchart of the proposed novel PFS-based risk-ranking method.
Figure 1. The flowchart of the proposed novel PFS-based risk-ranking method.
Systems 11 00402 g001

4. Numerical Case Study

4.1. Case Description

This study uses the healthcare waste-hazards risk-assessment case (adapted from [41]) to illustrate the processing procedure of the proposed novel PFS-based risk-ranking approach and to verify the validity and rationality of the proposed approach for handling the risk-assessment issues. The healthcare waste-hazards risk-assessment case includes 15 types of medical waste from Sultan Qaboos University Hospital in Oman. The healthcare waste-hazards risk-assessment team comprises three experts (P1, P2, and P3). Each expert, based on Table 1 and their experience, determines the risk levels (s1, s2 to s10) of the three risk factors (S, O, and D) for each failed item (see Table 2).

4.2. Solution of Typical RPN Method

The key advantage of the RPN method lies in its simple computation. Hence, it is currently the most widely applied risk-evaluation tool in different fields. The typical RPN approach takes the product of three possible risk factors—S, O, and D—as the basis for risk ranking all possible failure items.
Because the typical RPN method [42] cannot handle the hesitant information provided by Expert 2, this study used only the average risk level provided by Expert 1 and Expert 3 to calculate the aggregated S, O, and D values. Based on Table 2, the RPN value was calculated using the product of the three possible risk factors and then sorting all potential failure items, as shown in Table 3.

4.3. Solution of Typical IFS Method

Atanassov [12] introduced the IFS method, which uses MG and NMG to handle information problems of individuals expressing cognitive information. However, in this study, the typical IFS method could not handle the hesitant information provided by Expert 2. Based on Table 2, Equation (4) was used to aggregate information on the S, O, and D values provided by Expert 1 and Expert 3. Then, Equation (5) was used to calculate the S A i value and the ranking results for each failure item. The results are shown in Table 4.

4.4. Solution of Typical PFS Method

The typical PFS method [33] uses MG, NMG, and hesitation degree to handle information problems of individuals expressing cognition information. The typical PFS method can handle comprehensive information considerations more than the fuzzy set and IFS methods. This method is closer to the human cognitive information expression mode. However, in this study, the PFS method could not handle the hesitant information provided by Expert 2. Based on Table 2, Equation (11) was used to aggregate information in the S, O, and D values provided by Expert 1 and Expert 3. Then, Equations (12) and (13) were employed to calculate the S C i value, G C i value, and the ranking results for each failure item. The results are shown in Table 5.

4.5. Solution of the Typical CoCoSo Method

Yazdani et al. [19] first proposed the CoCoSo method, which combines the different weight-calculation methods to solve the MCDA problem in different domains. However, in this study, the CoCoSo approach could not handle the hesitant information provided by Expert 2. Based on Table 2, Equation (11) was used to aggregate the MG information on the S, O, and D values provided by Expert 1 and Expert 3. The results are presented in Table 5.
Based on Table 5, the original S, O, and D values were normalized using Equations (15) and (16). Then, Equations (17) and (18) were used to compute the S i and the P i values based on the normalized S, O, and D values. The results are presented in Table 6.
Based on Table 6, Equations (19)–(22) were used to calculate the R i a , R i b , R i c , and the R i values and the ranking results for each possible failure item, as expressed in Table 7.

4.6. Solution of the Proposed Novel Pythagorean Fuzzy Set–Based Risk-Ranking Method

In risk assessment problems, how human cognitive information is processed will directly affect the possible risk-ranking results of risk-failure projects. Therefore, this study integrated the PFSs and the CoCoSo method to handle human cognitive information in MCDA problems. In dealing with the hesitant cognitive information proposed by experts, this method uses the maximum operator, average operator, and minimum operator of the hesitant cognitive information to calculate the corresponding PFS information. Based on Table 2, Equation (11) was used to aggregate all expert-provided (Expert 1, Expert 2, and Expert 3) information in the S, O, and D values. Then, Equation (12) was used to defuzzify the Pythagorean FI.
Based on the defuzzified Pythagorean FI provided by all experts, Equations (15) and (16) were used to normalize the original S, O, and D values. The results are presented in Table 8. Then, Equations (17) and (18) were used to compute the S i and the P i values, as shown in Table 8.
Based on Table 8, Equations (19)–(22) were used to calculate the R i a , R i b , R i c , and R i values of different operators. Then, the R i values from large to small were ranked, which are the ranking results for each failure item. The results are presented in Table 9.

4.7. Analysis and Discussion of Calculation Results

To verify the validity and rationality of the proposed PFS-based risk-ranking approach, this paper used the healthcare waste-hazards risk-assessment case to test and verify the results of different algorithm approaches. The five different calculation methods used in this study included the typical RPN method [42], the typical IFS method [12], the typical PFS method [33], the CoCoSo method [19], and the proposed PFS-based risk-ranking method. Noteworthily, the same data (Table 2) were used among the different calculation methods. The results of risk-ranking after their respective calculations are shown in Table 10. The main differences in the different calculation methods considering information patterns and the relative weights of risk-assessment factors are shown in Table 11.
According to the evaluation results in Table 10 and Table 11, the proposed novel PFS-based risk-ranking method has several advantages. First, the information-pattern processing: Both the typical RPN and the CoCoSo methods can handle only information patterns of complete information and cannot handle those of FI, intuitionistic FI, and the Pythagorean FI. On the other hand, the IFS method can process information patterns of complete information, FI, and intuitionistic FI. However, it cannot handle the information patterns of the Pythagorean FI. Both the typical PFS method and the proposed PFS-based risk-ranking approach can simultaneously handle information patterns of complete information, FI, intuitionistic FI, and Pythagorean FI. Therefore, the evaluation results indicate that the proposed PFS-based risk-ranking approach can more fully and accurately express human cognitive information in the real world.
The second advantage of the proposed novel PFS-based risk-ranking method is the hesitant cognitive-information processing. The typical RPN, typical IFS, typical PFS, and the CoCoSo calculation methods cannot process hesitant cognitive information provided by experts, which may result in biased evaluation results. On the other hand, the proposed novel Pythagorean fuzzy set–based risk-ranking method uses the maximum operator, average operator, and minimum operator to handle hesitant cognitive information provided by experts and can fully grasp all evaluation information.
The third advantage of the proposed novel PFS-based risk-ranking method lies in its capability of considering the relative weights of risk-assessment factors. The RPN, IFS, and PFS calculation methods do not consider the relative weights of risk-assessment factors, which may cause biased evaluation results. Both the CoCoSo approach and the proposed novel PFS-based risk-ranking method use the three different appraisal-score strategies to calculate the relative weight of risk-assessment factors, showing the difference in the importance of risk-assessment factors.

5. Conclusions

How human cognitive information is processed is a key issue in risk assessment. With the advent of artificial intelligence, processing human cognitive information has become more important because it will directly affect the results of decision-making evaluations. Because the typical RPN method is relatively simpler to calculate than other risk-assessment methods, it is currently the most widely used risk-assessment tool. However, the typical RPN method is also accompanied by many limitations, such as the inability to handle FI, intuitionistic FI, and Pythagorean FI of human cognition. Further, the RPN method cannot process the relative weights between evaluation criteria, which may lead to biased evaluation results.
Therefore, to strengthen the ability of risk assessments, this paper integrates the PFSs and the CoCoSo method to process the risk-ranking problems of potential failure items. PFSs provide a wider solution space than the original fuzzy set and IFSs and can comprehensively deal with all kinds of uncertain information in real life. The CoCoSo method can consider different weight-calculation approaches to handle the relative weights between different risk-assessment factors. In dealing with hesitation information provided by experts, the maximum operator, average operator, and minimum operator are applied to compute the risk-ranking results of all possible failure projects. This risk-ranking result provides a reference for decision-making.
The proposed novel Pythagorean fuzzy set–based risk-ranking method contains the following advantages:
(1)
The proposed method can simultaneously process complete information, FI, intuitionistic FI, and Pythagorean FI.
(2)
The proposed method can handle hesitant cognitive information.
(3)
The proposed method takes into account the relative weights of risk-assessment factors.
Although the proposed novel Pythagorean fuzzy set-based risk-ranking method can effectively handle human cognitive information in risk-assessment problems, however, the proposed method still has the limitation that it cannot handle the incomplete information provided by experts. Future research directions can expand upon the discussion of how to deal with the incomplete information provided by experts. Subsequent researchers can extend the proposed method to deal with decision-making issues in different fields, such as green energy planning, investment selection, performance evaluation, reliability evaluation, and supplier selection. They can also use different algorithms to calculate the subjective and objective weights between evaluation criteria and explore the influence of different combinations of subjective and objective weights on the evaluation results.

Author Contributions

Conceptualization, Z.-S.L. and K.-H.C.; methodology, Z.-S.L. and K.-H.C.; validation, Z.-S.L. and K.-H.C.; data curation, Z.-S.L. and K.-H.C.; writing—original draft preparation, Z.-S.L. and K.-H.C.; writing—review and editing, Z.-S.L. and K.-H.C.; funding acquisition, K.-H.C. All authors have read and agreed to the published version of the manuscript.

Funding

The authors would like to thank the National Science and Technology Council, Taiwan, for financially supporting this research under Contract No. NSTC 111-2221-E-145-003 and NSTC 112-2221-E-145-003.

Data Availability Statement

The data presented in this study are available on request from the corresponding author.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Markowski, A.S.; Siuta, D. Fuzzy logic approach for identifying representative accident scenarios. J. Loss Prev. Process Ind. 2018, 56, 414–423. [Google Scholar] [CrossRef]
  2. Chang, K.H.; Wen, T.C.; Chung, H.Y. Soft failure mode and effects analysis using the OWG operator and hesitant fuzzy linguistic term sets. J. Intell. Fuzzy Syst. 2018, 34, 2625–2639. [Google Scholar] [CrossRef]
  3. Aydin, N.; Seker, S.; Sen, C. A new risk assessment framework for safety in oil and gas industry: Application of FMEA and BWM based picture fuzzy MABAC. J. Pet. Sci. Eng. 2022, 219, 111059. [Google Scholar] [CrossRef]
  4. Huang, J.; Liu, H.C.; Duan, C.Y.; Song, M.S. An improved reliability model for FMEA using probabilistic linguistic term sets and TODIM method. Ann. Oper. Res. 2022, 312, 235–258. [Google Scholar] [CrossRef]
  5. Anes, V.; Morgado, T.; Abreu, A.; Calado, J.; Reis, L. Updating the FMEA approach with mitigation assessment capabilities—A case study of aircraft maintenance repairs. Appl. Sci. 2022, 12, 11407. [Google Scholar] [CrossRef]
  6. Mondal, A.; Roy, S.K.; Zhan, J.M. A reliability-based consensus model and regret theory-based selection process for linguistic hesitant-Z multi-attribute group decision making. Expert Syst. Appl. 2023, 228, 120431. [Google Scholar] [CrossRef]
  7. Zhang, D.A.F.; Li, Y.L.; Li, Y.Q.; Shen, Z.F. Service failure risk assessment and service improvement of self-service electric vehicle. Sustainability 2022, 14, 3723. [Google Scholar] [CrossRef]
  8. Telikapalli, S.; Stright, J.; Cheetham, P.; Kim, C.H.; Pamidi, S. Failure mode effects and analysis of superconducting power distribution and related cryogenic components for all-electric ship. IEEE Trans. Appl. Supercond. 2023, 33, 5400506. [Google Scholar] [CrossRef]
  9. Ghoushchi, S.J.; Garg, H.; Bonab, S.R.; Rahimi, A. An integrated SWARA-CODAS decision-making algorithm with spherical fuzzy information for clean energy barriers evaluation. Expert Syst. Appl. 2023, 223, 119884. [Google Scholar] [CrossRef]
  10. Sun, J.J.; Liu, Y.M.; Xu, J.C.; Wang, N.; Zhu, F. A probabilistic uncertain linguistic FMEA model based on the extended ORESTE and regret theory. Comput. Ind. Eng. 2023, 180, 109251. [Google Scholar] [CrossRef]
  11. Yu, Y.; Yang, J.; Wu, S.B. A novel FMEA approach for submarine pipeline risk analysis based on IVIFRN and ExpTODIM-PROMETHEE-II. Appl. Soft. Comput. 2023, 136, 110065. [Google Scholar] [CrossRef]
  12. Atanassov, K.T. Intuitionistic fuzzy sets. Fuzzy Sets Syst. 1986, 20, 87–96. [Google Scholar] [CrossRef]
  13. Ye, J.; Chen, T.Y. Development of the ELECTRE method under Pythagorean fuzzy sets based on existing correlation coefficients for cotton fabric selection. J. Nat. Fibers 2023, 20, 2201486. [Google Scholar] [CrossRef]
  14. Garg, H.; Kahraman, C.; Ali, Z.; Mahmood, T. Interaction hamy mean operators for complex pythagorean fuzzy information and their applications to security threats in computers. J. Intell. Fuzzy Syst. 2023, 44, 4459–4479. [Google Scholar] [CrossRef]
  15. Habib, S.; Akram, M.; Al-Shamiri, M.M.A. Comparative analysis of Pythagorean MCDM methods for the risk assessment of childhood cancer. CMES Comp. Model. Eng. Sci. 2023, 135, 2585–2615. [Google Scholar] [CrossRef]
  16. Soltani, M.; Aouag, H.; Anass, C.; Mouss, M.D. Development of an advanced application process of Lean Manufacturing approach based on a new integrated MCDM method under Pythagorean fuzzy environment. J. Clean Prod. 2023, 386, 135731. [Google Scholar] [CrossRef]
  17. Khalil, S.M.; Sharqi, M.S. Some applications in decision-making using cosine maps and the relevance of the Pythagorean fuzzy. Eng. Appl. Artif. Intell. 2023, 122, 106089. [Google Scholar] [CrossRef]
  18. Hua, Z.; Jing, X.C. A generalized Shapley index-based interval-valued Pythagorean fuzzy PROMETHEE method for group decision-making. Soft Comput. 2023, 27, 6629–6652. [Google Scholar] [CrossRef]
  19. Yazdani, M.; Zarate, P.; Zavadskas, E.K.; Turskis, Z. A combined compromise solution (CoCoSo) method for multi-criteria decision-making problems. Manag. Decis. 2019, 57, 2501–2519. [Google Scholar] [CrossRef]
  20. Stanujkic, D.; Popovic, G.; Karabasevic, D.; Meidute-Kavaliauskiene, I.; Ulutas, A. An integrated simple weighted sum product method-WISP. IEEE Trans. Eng. Manage. 2023, 7, 5. [Google Scholar] [CrossRef]
  21. Chung, H.Y.; Chang, K.H. A novel type of flexible soft analytic network process to solve the multiple-attribute decision-making problem. Int. J. Ind. Eng. Theory Appl. Pract. 2023, 30, 536–556. [Google Scholar]
  22. Smarandache, F. A Unifying Field in Logics. Neutrosophy: Neutrosophic Probability, Set and Logic; American Research Press: Rehoboth, DE, USA, 1999. [Google Scholar]
  23. Saaty, T.L. The Analytic Hierarchy Process; McGraw-Hill: New York, NY, USA, 1980. [Google Scholar]
  24. Opricovic, S. Multi-Criteria Optimization of Civil Engineering Systems; Faculty of Civil Engineering: Belgrade, Serbia, 1998. [Google Scholar]
  25. Brauers, W.K.M.; Zavadskas, E.K. Project management by MULTIMOORA as an instrument for transition economies. Technol. Econ. Dev. Econ. 2010, 16, 5–24. [Google Scholar] [CrossRef] [Green Version]
  26. Bouraima, M.B.; Qiu, Y.J.; Stevic, Z.; Simic, V. Assessment of alternative railway systems for sustainable transportation using an integrated IRN SWARA and IRN CoCoSo model. Socio Econ. Plan. Sci. 2023, 86, 101475. [Google Scholar] [CrossRef]
  27. Zafaranlouei, N.; Ghoushchi, S.J.; Haseli, G. Assessment of sustainable waste management alternatives using the extensions of the base criterion method and combined compromise solution based on the fuzzy Z-numbers. Environ. Sci. Pollut. Res. 2023, 32, 62121–62136. [Google Scholar] [CrossRef] [PubMed]
  28. Chang, K.H. Integrating subjective-objective weights consideration and a combined compromise solution method for handling supplier selection issues. Systems 2023, 11, 74. [Google Scholar] [CrossRef]
  29. Chen, J.Y.; Li, X.H. Doctors ranking through heterogeneous information: The new score functions considering patients’ emotional intensity. Expert Syst. Appl. 2023, 219, 119620. [Google Scholar] [CrossRef]
  30. Chen, Q.Y.; Liu, H.C.; Wang, J.H.; Shi, H. New model for occupational health and safety risk assessment based on Fermatean fuzzy linguistic sets and CoCoSo approach. Appl. Soft. Comput. 2022, 126, 109262. [Google Scholar] [CrossRef]
  31. Mishra, A.R.; Rani, P.; Saha, A.; Pamucar, D.; Hezam, I.M. A q-rung orthopair fuzzy combined compromise solution approach for selecting sustainable third-party reverse logistics provider. Manag. Decis. 2023, 61, 1816–1853. [Google Scholar] [CrossRef]
  32. Pamucar, D.; Gokasar, I.; Torkayesh, A.E.; Deveci, M.; Martinez, L.; Wu, Q. Prioritization of unmanned aerial vehicles in transportation systems using the integrated stratified fuzzy rough decision-making approach with the hamacher operator. Inf. Sci. 2023, 622, 374–404. [Google Scholar] [CrossRef]
  33. Yager, R.R. Pythagorean membership grades in multicriteria decision making. IEEE Trans. Fuzzy Syst. 2014, 22, 958–965. [Google Scholar] [CrossRef]
  34. Chang, K.H.; Chung, H.Y.; Wang, C.N.; Lai, Y.D.; Wu, C.H. A new hybrid Fermatean fuzzy set and entropy method for risk assessment. Axioms 2023, 12, 58. [Google Scholar] [CrossRef]
  35. Karasan, A.; Ilbahar, E.; Kahraman, C. A novel Pythagorean fuzzy AHP and its application to landfill site selection problem. Soft Comput. 2019, 23, 10953–10968. [Google Scholar] [CrossRef]
  36. Liu, S.; Yu, W.; Liu, L.; Hu, Y.A. Variable weights theory and its application to multi-attribute group decision making with intuitionistic fuzzy numbers on determining decision maker’s weights. PLoS ONE 2019, 14, e0212636. [Google Scholar] [CrossRef]
  37. Ertemel, A.V.; Menekse, A.; Akdag, H.C. Smartphone addiction assessment using Pythagorean fuzzy CRITIC-TOPSIS. Sustainability 2023, 15, 3955. [Google Scholar] [CrossRef]
  38. Zhang, D.L.; Wang, G.J. Geometric score function of Pythagorean fuzzy numbers determined by the reliable information region and its application to group decision-making. Eng. Appl. Artif. Intell. 2023, 121, 105973. [Google Scholar] [CrossRef]
  39. Kumar, K.; Chen, S.M. Group decision making based on entropy measure of Pythagorean fuzzy sets and Pythagorean fuzzy weighted arithmetic mean aggregation operator of Pythagorean fuzzy numbers. Inf. Sci. 2023, 624, 361–377. [Google Scholar] [CrossRef]
  40. Zhu, Y.M.; Zeng, S.Z.; Lin, Z.S.; Ullah, K. Comprehensive evaluation and spatial-temporal differences analysis of China’s inter-provincial doing business environment based on Entropy-CoCoSo method. Front. Environ. Sci. 2023, 10, 1088064. [Google Scholar] [CrossRef]
  41. ALMashaqbeh, S.; ALKhamisi, Y.N. Healthcare waste hazards assessment using EWGM-FMEA: Case study in Oman. Cogent Eng. 2023, 10, 2185951. [Google Scholar] [CrossRef]
  42. Ciani, L.; Guidi, G.; Patrizi, G. A critical comparison of alternative risk priority numbers in failure modes, effects, and criticality analysis. IEEE Access 2019, 7, 92398–92409. [Google Scholar] [CrossRef]
Table 1. Linguistic terms of the PFN.
Table 1. Linguistic terms of the PFN.
LevelsLinguistic TermsPFN
s1Extremely very low (EVL)(0.05, 1.00)
s2Extremely low (EL)(0.15, 0.95)
s3Very low (VL)(0.25, 0.85)
s4Low (L)(0.35, 0.75)
s5Medium (M)(0.45, 0.65)
s6Medium high (MH)(0.55, 0.55)
s7High (H)(0.65, 0.45)
s8Very high (VH)(0.75, 0.35)
s9Extremely high (EH)(0.85, 0.25)
s10Extremely very high (EVH)(0.95, 0.15)
Table 2. The risk level of each failure item risk factor S, O, and D.
Table 2. The risk level of each failure item risk factor S, O, and D.
ItemMajor Risks and Hazards Items in Medical Waste ManagementExpertsSOD
1Wrong garbage classificationP1s4s9s3
P2s5s10s2
P3s5s9s3
2Does not contain polluting wasteP1s6s5s5
P2s6s4s5
P3s6s4s5
3Failure to use personal protective equipment when handling infectious wasteP1s6s7s8
P2s7s7s9
P3s7s8s8
4Clutter and lack of safety cabinetsP1s5s4s6
P2s5s5s4
P3s6s5s5
5Incorrect disposal of chemical wasteP1s7s4s5
P2s8s3–s4s5–s6
P3s7s5s4
6Incorrect storage method of chemical raw materialsP1s5s6s6
P2s4–s5s6–s7s5–s6
P3s4s6s5
7No timely management mechanism for chemical spillsP1s6s4s7
P2s6–s7s3s7–s8
P3s7s3s7
8Reloading of syringesP1s8s3s7
P2s9s4s7
P3s9s3s6
9Accidents cause bags to overflow and leakP1s6s5s4
P2s5s5s3
P3s5s4s3
10Water pipe is rustedP1s4s4s2
P2s4s3s1
P3s4s4s1
11Contaminated water from immunocompromised patientsP1s9s4s2
P2s9s3s4
P3s10s3s3
12Exposure to patients’ blood and body fluids causes an occupational hazard for healthcare workerP1s9s7s7
P2s9s7s6
P3s9s6s5
13Autoclave leaksP1s8s5s7
P2s8s6s6
P3s8s7s6
14The temperature of the incinerator does not meet the requirementsP1s5s5s9
P2s5s5-s6s10
P3s6s4s9
15Sharps box overfill practiceP1s5s4s6
P2s5s4s7
P3s5s3s6
Table 3. The RPN value of all potential failure items.
Table 3. The RPN value of all potential failure items.
IDSODRPNRanking
14.593121.50011
264.55135.00010
36.57.58390.0001
45.54.55.5136.1259
574.54.5141.7508
64.565.5148.5007
76.53.57159.2506
88.536.5165.7505
95.54.53.586.62513
10441.524.00015
119.53.52.583.12514
1296.56351.0002
13866.5312.0003
145.54.59222.7504
1553.56105.00012
Table 4. The S A i value for each failure item.
Table 4. The S A i value for each failure item.
IDSODIFWAA Value
S A i
Value
Ranking
1(0.402, 0.598)(0.850, 0.150)(0.250, 0.750)(0.593, 0.407)0.1877
2(0.550, 0.450)(0.402, 0.598)(0.450, 0.550)(0.471, 0.529)−0.05811
3(0.603, 0.397)(0.704, 0.296)(0.750, 0.250)(0.692, 0.308)0.3832
4(0.503, 0.497)(0.402, 0.598)(0.503, 0.497)(0.471, 0.529)−0.05811
5(0.650, 0.350)(0.402, 0.598)(0.402, 0.598)(0.500, 0.500)0.0009
6(0.402, 0.598)(0.550, 0.450)(0.503, 0.497)(0.488, 0.512)−0.02310
7(0.603, 0.397)(0.302, 0.698)(0.650, 0.350)(0.541, 0.459)0.0818
8(0.806, 0.194)(0.250, 0.750)(0.603, 0.397)(0.614, 0.386)0.2276
9(0.503, 0.497)(0.402, 0.598)(0.302, 0.698)(0.408, 0.592)−0.18414
10(0.350, 0.650)(0.350, 0.650)(0.101, 0.899)(0.276, 0.724)−0.44815
11(0.913, 0.087)(0.302, 0.698)(0.202, 0.798)(0.636, 0.364)0.2725
12(0.850, 0.150)(0.603, 0.397)(0.561, 0.439)(0.703, 0.297)0.4071
13(0.750, 0.250)(0.561, 0.439)(0.603, 0.397)(0.648, 0.352)0.2963
14(0.503, 0.497)(0.402, 0.598)(0.850, 0.150)(0.645, 0.355)0.2914
15(0.450, 0.550)(0.302, 0.698)(0.550, 0.450)(0.443, 0.557)−0.11413
Table 5. The S C i value, G C i value, and the ranking results for each failure item.
Table 5. The S C i value, G C i value, and the ranking results for each failure item.
IDSODPFWAA Value S C i Value G C i Value Ranking
1(0.403, 0.702)(0.850, 0.250)(0.250, 0.850)(0.562, 0.653)−0.1100.7427
2(0.550, 0.550)(0.403, 0.702)(0.450, 0.650)(0.472, 0.637)−0.1830.62811
3(0.602, 0.502)(0.702, 0.403)(0.750, 0.350)(0.687, 0.423)0.2930.6521
4(0.502, 0.602)(0.403, 0.702)(0.502, 0.602)(0.472, 0.637)−0.1830.62811
5(0.650, 0.450)(0.403, 0.702)(0.403, 0.702)(0.499, 0.629)−0.1470.6458
6(0.403, 0.702)(0.550, 0.550)(0.502, 0.602)(0.489, 0.621)−0.1470.6259
7(0.602, 0.502)(0.304, 0.802)(0.650, 0.450)(0.541, 0.605)−0.0730.6586
8(0.802, 0.304)(0.250, 0.850)(0.602, 0.502)(0.597, 0.597)0.0000.7125
9(0.502, 0.602)(0.403, 0.702)(0.304, 0.802)(0.411, 0.707)−0.3300.66814
10(0.350, 0.750)(0.350, 0.750)(0.112, 0.975)(0.293, 0.832)−0.6060.77815
11(0.901, 0.206)(0.304, 0.802)(0.206, 0.901)(0.562, 0.707)−0.1830.81510
12(0.850, 0.250)(0.602, 0.502)(0.559, 0.559)(0.683, 0.457)0.2570.6752
13(0.750, 0.350)(0.559, 0.559)(0.602, 0.502)(0.642, 0.479)0.1830.6423
14(0.502, 0.602)(0.403, 0.702)(0.850, 0.250)(0.616, 0.553)0.0730.6854
15(0.450, 0.650)(0.304, 0.802)(0.550, 0.550)(0.446, 0.675)−0.2570.65513
Table 6. The S i and the P i values of each failure item.
Table 6. The S i and the P i values of each failure item.
IDSOD S i Value P i Value
10.0961.0000.1870.4281.408
20.3630.2550.4580.3591.469
30.4570.7530.8650.6921.825
40.2770.2550.5290.3541.452
50.5440.2550.3950.3981.514
60.0960.5000.5290.3751.429
70.4570.0900.7290.4251.469
80.8190.0000.6640.4941.254
90.2770.2550.2610.2641.334
100.0000.1670.0000.0560.382
111.0000.0900.1280.4061.354
120.9070.5870.6060.7001.838
130.7250.5150.6640.6351.784
140.2770.2551.0000.5111.585
150.1810.0900.5940.2881.286
Table 7. The R i value and the ranking results for each failure item.
Table 7. The R i value and the ranking results for each failure item.
ID R i a R i b R i c R i Ranking
10.06611.3910.7234.8777
20.06610.3060.7204.48511
30.09117.2320.9927.2622
40.06510.1720.7124.42812
50.06911.1320.7534.8188
60.06510.4990.7114.54410
70.06811.5090.7464.9456
80.06312.1840.6895.1205
90.0588.2510.6303.64814
100.0162.0000.1720.90515
110.06310.8560.6934.6529
120.09117.4141.0007.3361
130.08716.1020.9536.8163
140.07513.3440.8265.6894
150.0578.5620.6203.75013
Table 8. Normalizing the defuzzified Pythagorean FI.
Table 8. Normalizing the defuzzified Pythagorean FI.
IDOperatorSOD S i Value P i Value
1 0.1251.0000.1330.419 1.394
2 0.3750.1670.4360.326 1.408
3 0.5000.6670.8700.679 1.818
4 0.2500.2220.4360.303 1.383
5Maximum operator0.6250.1670.4360.4091.500
Average operator0.6250.1390.4150.393 1.469
Minimum operator0.6250.1110.3930.3761.434
6Maximum operator0.1250.5000.5230.3831.456
Average operator0.0940.4720.5010.356 1.406
Minimum operator0.0620.4440.4800.3291.347
7Maximum operator0.5000.0000.7400.4131.177
Average operator0.4690.0000.7180.396 1.160
Minimum operator0.4380.0000.6970.3781.141
8 0.8750.0000.6530.509 1.265
9 0.2500.2220.2200.231 1.275
10 0.0000.0560.0000.019 0.265
11 1.0000.0000.1760.392 1.082
12 0.9380.5560.5670.687 1.822
13 0.7500.4440.6100.601 1.747
14Maximum operator0.2500.2781.0000.5091.583
Averaging operator0.2500.2501.0000.500 1.567
Minimum operator0.2500.2221.0000.4911.550
15 0.1880.0560.6100.284 1.249
Table 9. The ranking results of different operators using the proposed method.
Table 9. The ranking results of different operators using the proposed method.
IDMaximum OperatorAveraging OperatorMinimum Operator
R i a R i b R i c R i Ranking R i a R i b R i c R i Ranking R i a R i b R i c R i Ranking
10.06827.9130.72310.68070.06927.9130.72310.68360.06927.9130.72310.6866
20.06522.9260.6918.905110.06622.9260.6918.907110.06622.9260.6918.91010
30.09443.5300.99516.47020.09543.5300.99516.47320.09543.5300.99516.4782
40.06321.5820.6728.412120.06421.5820.6728.414120.06421.5820.6728.41712
50.07227.7770.76110.68660.07126.7680.74210.31370.06925.7460.7229.9327
60.06926.1690.73310.08990.06724.5280.7029.480100.06422.8530.6688.85411
70.06026.7690.63410.15980.05925.7480.6209.78980.05824.7260.6059.4179
80.06732.2880.70712.17150.06732.2880.70712.17450.06832.2880.70712.1775
90.05717.2740.6006.814140.05717.2740.6006.817140.05717.2740.6006.81914
100.0112.0000.1130.842150.0112.0000.1130.842150.0112.0000.1130.84215
110.05525.2650.5889.573100.05625.2650.5889.57690.05625.2650.5889.5788
120.09443.9601.00016.62510.09543.9601.00016.62910.09643.9601.00016.6331
130.08839.0810.93614.84730.08939.0810.93614.85130.09039.0810.93614.8543
140.07933.4820.83412.76540.07832.9230.82412.56040.07832.3590.81312.3544
150.05820.0750.6117.806130.05820.0750.6117.808130.05920.0750.6117.81013
Table 10. The possible failure items ranking results using different algorithm approaches.
Table 10. The possible failure items ranking results using different algorithm approaches.
IDTypical RPN Method [42]Typical IFS Method [12]Typical PFS Method [33]Typical CoCoSo Method [19]Proposed Method
Maximum OperatorAveraging OperatorMinimum Operator
RPN ValueRanking S A i Value Ranking S C i Value G C i Value Ranking R i Value Ranking R i Value Ranking R i Value Ranking R i ValueRanking
1121.500110.187 7−0.110 0.742 74.877710.680710.683610.6866
2135.00010−0.058 11−0.183 0.628 114.485118.905118.907118.91010
3390.00010.383 20.293 0.652 17.262216.470216.473216.4782
4136.1259−0.058 11−0.183 0.628 114.428128.412128.414128.41712
5141.75080.000 9−0.147 0.645 84.818810.686610.31379.9327
6148.5007−0.023 10−0.147 0.625 94.5441010.08999.480108.85411
7159.25060.081 8−0.073 0.658 64.945610.15989.78989.4179
8165.75050.227 60.000 0.712 55.120512.171512.174512.1775
986.62513−0.184 14−0.330 0.668 143.648146.814146.817146.81914
1024.00015−0.448 15−0.606 0.778 150.905150.842150.842150.84215
1183.125140.272 5−0.183 0.815 104.65299.573109.57699.5788
12351.00020.407 10.257 0.675 27.336116.625116.629116.6331
13312.00030.296 30.183 0.642 36.816314.847314.851314.8543
14222.75040.291 40.073 0.685 45.689412.765412.560412.3544
15105.00012−0.114 13−0.257 0.655 133.750137.806137.808137.81013
Table 11. The main differences in different calculation methods considering information pattern.
Table 11. The main differences in different calculation methods considering information pattern.
Calculation MethodsThe Information Pattern that Can Be ProcessedConsideration of Hesitant Cognitive InformationConsideration of Relative Weights of Risk Assessment Factors
Complete InformationFIIntuitionistic FIPythagorean FI
Typical RPN method [42]YesNoNoNoNoNo
Typical IFS method [12]YesYesYesNoNoNo
Typical PFS method [33]YesYesYesYesNoNo
CoCoSo method [19]YesNoNoNoNoYes
Proposed methodYesYesYesYesYesYes
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Li, Z.-S.; Chang, K.-H. A Novel Pythagorean Fuzzy Set–Based Risk-Ranking Method for Handling Human Cognitive Information in Risk-Assessment Problems. Systems 2023, 11, 402. https://doi.org/10.3390/systems11080402

AMA Style

Li Z-S, Chang K-H. A Novel Pythagorean Fuzzy Set–Based Risk-Ranking Method for Handling Human Cognitive Information in Risk-Assessment Problems. Systems. 2023; 11(8):402. https://doi.org/10.3390/systems11080402

Chicago/Turabian Style

Li, Zong-Sian, and Kuei-Hu Chang. 2023. "A Novel Pythagorean Fuzzy Set–Based Risk-Ranking Method for Handling Human Cognitive Information in Risk-Assessment Problems" Systems 11, no. 8: 402. https://doi.org/10.3390/systems11080402

APA Style

Li, Z. -S., & Chang, K. -H. (2023). A Novel Pythagorean Fuzzy Set–Based Risk-Ranking Method for Handling Human Cognitive Information in Risk-Assessment Problems. Systems, 11(8), 402. https://doi.org/10.3390/systems11080402

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop