Next Article in Journal
A Model in Which Well-Orderings of the Reals First Appear at a Given Projective Level, Part III—The Case of Second-Order PA
Previous Article in Journal
Mathematical Modeling of Structure and Dynamics of Concentrated Tornado-like Vortices: A Review
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Identification and Classification of Multi-Attribute Decision-Making Based on Complex Intuitionistic Fuzzy Frank Aggregation Operators

1
School of Mathematics and Statistics, Hanshan Normal University, Chaozhou 521041, China
2
Department of Mathematics & Statistics, International Islamic University Islamabad, Islamabad 44000, Pakistan
3
Department of Mathematics, University of Kotli, Kotli 11100, Pakistan
*
Authors to whom correspondence should be addressed.
Mathematics 2023, 11(15), 3292; https://doi.org/10.3390/math11153292
Submission received: 7 May 2023 / Revised: 22 June 2023 / Accepted: 27 June 2023 / Published: 26 July 2023
(This article belongs to the Section Fuzzy Sets, Systems and Decision Making)

Abstract

:
Invented by Frank in 1979, Frank’s t-norm and t-conorm operations possess improved modifications and can be applied more generally than the existing algebraic t-norm and t-conorm. The major objective of this article is to determine Frank’s operational laws based on complex intuitionistic fuzzy (CIF) information. Moreover, we examine the Frank aggregation operators (averaging and geometric) based on CIF set theory and Frank operational laws, such as the CIF Frank weighted averaging (CIFFWA) operator, CIF Frank ordered weighted averaging (CIFFOWA) operator, CIF Frank hybrid averaging (CIFFHA) operator, CIF Frank weighted geometric (CIFFWG) operator, CIF Frank ordered weighted geometric (CIFFOWG) operator and CIF Frank hybrid geometric (CIFFHG) operator. Some dominant and feasible properties of the invented techniques are also stated. Additionally, to evaluate the problem of osteoporosis in human bodies based on their causes and risk factors, we illustrate an application of the multi-attribute decision-making (MADM) technique with consideration of the invented methods to show the supremacy and validity of the derived techniques. Finally, we aim to compare the proposed scenarios with some valid existing or prevailing techniques to increase the value of the presented approaches.

1. Introduction

Multi-attribute decision-making (MADM) [1,2] is a type of procedure used for determining the most optimal solution with the help of a decision-making procedure from a finite collection of alternatives. In the last few years, investigations of companies have been conducted by many scholars. In a genuine decision-making tool [3], a common dilemma is how to represent the criteria terms feasibly and effectively. Further, due to uncertainty in real life, for every expert, it can be challenging to determine the best solution considering the availability of classical information [4,5]. For this, to determine the best optimal solution based on a fuzzy set instead of classical information, in 1965, Zadeh [6] evaluated the main theory of fuzzy information (FI). FI depends on the value of the supporting function, and the final or resultant value is included in [0, 1]. Further, to improve the worth of FI, certain theories are available regarding the shape: a process based on the MADM technique for FI was pioneered by Jain [7]; Akram et al. [8,9] diagnosed a mathematical structure that is different from FI, called fuzzy N-soft sets and hesitant fuzzy N-soft sets; Ohlan and Ohlan [10] evaluated the problem of bibliometrics under the consideration of FI; Abdullah et al. [11] mixed the theory of fractions and FI; and recently, Mahmood [12] evaluated the main concept of bipolar soft sets. But certain scholars have demonstrated that the theory of FI is incomplete. To remove these deficiencies, Atanassov [13,14] diagnosed intuitionistic FI (IFI), where IFI contained two supporting functions, called positive and negative grades. The condition of IFI stated that the sum of both values of the IFI is necessarily contained in the unit interval. Moreover, an extended MAIRCA technique based on IFI was diagnosed by Ecer [15]; a technique to analyze the quality of software in different fields based on IFI was developed by Thao and Chou [16]; a pattern recognition and decision-making evaluation based on IFI was presented by Gohain et al. [17]; an analysis of three-way decision-making using IFI was evaluated by Yang et al. [18]; and distance measures based on IFI were diagnosed by Garg and Rani [19].
A brief explanation of existing FI and IFI is available, and it is clear that the prevailing information has received a lot of attention from different individuals, but it is also clear that the prevailing FI can handle only one dimension of information at a time. When conducting research, experts in most fields typically work with two-dimensional information; however, when we consider the example of medical research, biometrics and facial recognition can dynamically change data over time. Thus, to address information challenges in various fields of research, the theory of complex FI (CFI) was pioneered by Ramot et al. [20] which fixes the imaginary term, or one more extra term, in the supporting grade and constructs the terms in the order of the polar coordinates. Based on the following work, we identified that the theory of CFI has a lot of applications in different fields, for instance, entropy measures [21], neighborhood operators [22], complex fuzzy logic [23,24], operation properties [25], complex fuzzy neuro structure [26], distance measures and continuity [27], complex fuzzy N-soft sets [28], and complex fuzzy soft sets [29]. Further, it was observed that the theory of CFI ignores the grade of anti-support, which results in a loss of information during the decision-making procedure. To remove these deficiencies, Alkouri and Salleh [30] diagnosed a complex IFI (CIFI), where CIFI contained two supporting functions, called positive and negative grades, in the order of complex values. The conditions of CIFI state that the sum of both values of the CIFI is necessarily contained in the unit interval (for both real and imaginary parts). Moreover, Ali et al. [31] proposed another form of complex intuitionistic fuzzy soft set. Garg and Rani [32,33] evaluated the information measures and correlation coefficient measures for CIFI. Jan et al. [34] investigated cyber-security and cybercrime with consideration of CIF relations. After a long assessment, we noticed that every expert faced the following queries:
  • How can we collect data for osteoporosis problems?
  • How can we aggregate the arranged information?
  • How can we find the most optimal solution?
The proposed techniques are very suitable and reliable for addressing the above three problems. In many real-world situations, it is challenging to detect the most severe type of osteoporosis in human beings. Therefore, this paper aims to collect information on five different types of osteoporosis and evaluates them with the help of the proposed theory in the presence of some hypothetical or artificial information. The main theory of Frank’s t-norm and t-conorm was evaluated by Frank [35]. Further, Seikh and Mandel [36] utilized Frank aggregation operators based on IFI. But to date, no studies have applied the theory of Frank aggregation operators to CIFS. The main hypotheses of this work are stated below:
  • The theory of averaging, geometry, Frank averaging, and Frank geometric aggregation operators for FS are special cases of the proposed theory.
  • The theory of averaging, geometry, Frank averaging, and Frank geometric aggregation operators for IFS are special cases of the proposed theory.
  • The theory of averaging, geometry, Frank averaging, and Frank geometric aggregation operators for CFS are special cases of the proposed theory.
  • The theory of averaging, geometry, Frank averaging, and Frank geometric aggregation operators for CIFS are special cases of the proposed theory.
Considering the advantages of the proposed structure, it is clear that Frank aggregation operators are more reliable and more dominant compared with other notable aggregation operators because they possess improved modifications and can be applied more generally. Further, in this study, we explain the importance of complex-valued functions. For this, we provide an example to show the importance of the phase word. For example, consider a case where XYZ Company wishes to install biometric-based attendance devices (BBADs) at every one of its workplaces spread out across the nation. To achieve this, the corporation contacts an expert who provides information on (i) BBAD models and (ii) BBAD production dates. The business wants to choose the best BBAD model and manufacturing date at the same time. Since the issue at hand is two-dimensional, conventional IFS theory cannot be used to represent both dimensions at once. Utilizing CIFS theory is the most effective technique to express all of the knowledge offered by the expert. The phase terms and amplitude terms in CIFS may be used to inform the company’s decision on the BBAD model. The major influences of this theory are listed below:
  • We derive Frank’s operational laws based on CIF information.
  • We examine the CIFFWA operator, CIFFOWA operator, CIFFHA operator, CIFFWG operator, CIFFOWG operator, and CIFFHG operator. Some dominant and feasible properties of the invented techniques are also stated.
  • To evaluate the problem of osteoporosis in human bodies based on their causes and risk factors, we illustrate an application of the MADM technique with consideration of the invented methods to show the supremacy and validity of the derived techniques.
  • We compare the proposed scenarios with some valid existing or prevailing techniques to increase the worth of the presented approaches.
This manuscript is organized as follows: In Section 2, information on the CIF set and its algebraic laws with Frank’s t-norm and t-conorm is revised. In Section 3, we diagnose certain Frank’s operational laws under the availability of CIF information. Furthermore, using the evaluated operational laws, we pioneer the theory of CIFFWA, CIFFOWA, CIFFHA, CIFFWG, CIFFOWG, and CIFFHG operators, and describe their beneficial and valuable results with certain useful properties. In Section 4, we aim to evaluate the most severe type of osteoporosis based on its symptoms, causes, and risk factors using diagnostic approaches. In Section 5, to enhance the worth of the evaluated operators, we compare the diagnostic result with certain prevailing results and illustrate their geometrical representation with the help of MATLAB. Our final remarks and concluding information are provided in Section 6.

2. Preliminary Information

This section discusses the CIF set and its algebraic laws with Frank’s t-norm and t-conorm, where the universal set is shown by X , and the terms m l R 𝓈 e i 2 π ( m l I 𝓈 ) and n l R 𝓈 e i 2 π ( n l I 𝓈 ) represent the truth and falsity grades with real parts m l R ( x ) ,   n l R ( x ) and imaginary parts m l I ( x ) ,   n l I ( x ) .
Definition 1
([30]). Assume  X  as a universal set, and then, the shape of  P 𝓈 , as shown below:
l 𝓈 = { ( m l 𝓈 ( X ) , n l 𝓈 ( X ) ) : x X }  
With a well-known condition,  0 m l R ( x ) + n l R ( x ) 1  and  0 m l I ( x ) + n l I ( x ) 1  represent the CIF information. The mathematical shape  l 𝓈 ( x ) = l R ( x ) e i 2 π ( l I ( x ) ) = ( 1 ( m l R ( x ) + n l R ( x ) ) ) e i 2 π ( 1 ( m l I ( x ) + n l I ( x ) ) )  is shown as refusal information. Furthermore, the theory of the CIF number (CIFN) is represented by:  l 𝓈 = ( m l R 𝓈 e i 2 π ( m l I 𝓈 ) , n l R 𝓈 e i 2 π ( n l I 𝓈 ) ) , 𝓈 = 1 , 2 , , t .
Definition 2
([30]). We recall some algebraic laws based on CIFNs  l 𝓈 = ( m l R 𝓈 e i 2 π ( m l I 𝓈 ) , n l R 𝓈 e i 2 π ( n l I 𝓈 ) ) , 𝓈 = 1 , 2 , such that
l 1 l 2 = ( ( m l R 1 + m l R 2 m l R 1 m l R 2 ) e i 2 π ( m l I 1 + m l I 2 m l I 1 m l I 2 ) , ( n l R 1 n l R 2 ) e i 2 π ( n l I 1 n l I 2 ) )  
l 1 l 2 = ( ( m l R 1 m l R 2 ) e i 2 π ( m l I 1 m l I 2 ) , ( n l R 1 + n l R 2 n l R 1 n l R 2 ) e i 2 π ( n l I 1 + n l I 2 n l I 1 n l I 2 ) )  
ρ ˇ l 𝓈 = ( ( 1 ( 1 m l R 𝓈 ) ρ ˇ ) e i 2 π ( 1 ( 1 m l I 𝓈 ) ρ ˇ ) , n l R 𝓈 ρ ˇ e i 2 π ( n l I 𝓈 ρ ˇ ) )  
l 𝓈 ρ ˇ = ( m l R 𝓈 ρ ˇ e i 2 π ( m l I 𝓈 ρ ˇ ) , ( 1 ( 1 n l R 𝓈 ) ρ ˇ ) e i 2 π ( 1 ( 1 n l I 𝓈 ) ρ ˇ ) )  
where the notations   and   are used for algebraic (also Frank) addition and algebraic (also Frank) multiplications.
Definition 3
([30]). We recall some important ideas based on CIFNs, where  l 𝓈 = ( m l R 𝓈 e i 2 π ( m l I 𝓈 ) , n l R 𝓈 e i 2 π ( n l I 𝓈 ) ) , 𝓈 = 1 , 2 , , t , such that
C s 𝓈 ( l 𝓈 ) = 1 2 ( m l R 𝓈 + m l I 𝓈 n l R 𝓈 n l I 𝓈 ) , C s 𝓈 ( l 𝓈 ) [ 1 , 1 ]  
A a 𝓈 ( l 𝓈 ) = 1 2 ( m l R 𝓈 + m l I 𝓈 + n l R 𝓈 + n l I 𝓈 ) , A a 𝓈 ( l 𝓈 ) [ 0 , 1 ]  
where,  C s 𝓈 ( l 𝓈 )  and  A a 𝓈 ( l 𝓈 )  are represented by the score value and accuracy value.
Definition 4
([30]). We recall some important rules based on CIFNs, where  l 𝓈 = ( m l R 𝓈 e i 2 π ( m l I 𝓈 ) , n l R 𝓈 e i 2 π ( n l I 𝓈 ) ) , 𝓈 = 1 , 2 , , t , such that if  C s 𝓈 ( l 1 ) > C s 𝓈 ( l 2 ) , then  l 1 > l 2 , if  C s 𝓈 ( l 1 ) = C s 𝓈 ( l 2 ) ; if  A a 𝓈 ( l 1 ) > A a 𝓈 ( l 2 ) , then  l 1 > l 2 ; and if  A a 𝓈 ( l 1 ) = A a 𝓈 ( l 2 ) , then  l 1 = l 2 .
Definition 5
([35]). Examples of Frank’s t-norm and t-conorm are illustrated below:
T ( x , y ) = l o g Ξ ( 1 + ( Ξ x 1 ) ( Ξ y 1 ) Ξ 1 )  
S ( x , y ) = 1 l o g Ξ ( 1 + ( Ξ 1 x 1 ) ( Ξ 1 y 1 ) Ξ 1 )  
where  x , y [ 0 , 1 ]  and  Ξ ( 1 , + ) .

3. Frank Aggregation Operators for CIF Information

The objective of this section is to determine Frank’s operational laws based on CIF information. Moreover, we examine the Frank aggregation operators (averaging and geometric) based on CIF set theory and Frank’s operational laws, such as the CIFFWA operator, CIFFOWA operator, CIFFHA operator, CIFFWG operator, CIFFOWG operator, and CIFFHG operator. Some dominant and feasible properties of the invented techniques are also stated.
Definition 6.
We diagnose some Frank laws based on CIFNs, where  l 𝓈 = ( m l R 𝓈 e i 2 π ( m l I 𝓈 ) , n l R 𝓈 e i 2 π ( n l I 𝓈 ) ) , 𝓈 = 1 , 2 , such that
l 1 l 2 = ( 1 l o g Ξ ( 1 + ( Ξ 1 m l R 1 1 ) ( Ξ 1 m l R 2 1 ) Ξ 1 ) e i 2 π ( 1 l o g Ξ ( 1 + ( Ξ 1 m l I 1 1 ) ( Ξ 1 m l I 2 1 ) Ξ 1 ) ) , l o g Ξ ( 1 + ( Ξ n l R 1 1 ) ( Ξ n l R 2 1 ) Ξ 1 ) e i 2 π ( l o g Ξ ( 1 + ( Ξ n l I 1 1 ) ( Ξ n l I 2 1 ) Ξ 1 ) ) )
l 1 l 2 = ( l o g Ξ ( 1 + ( Ξ m l R 1 1 ) ( Ξ m l R 2 1 ) Ξ 1 ) e i 2 π ( l o g Ξ ( 1 + ( Ξ m l I 1 1 ) ( Ξ m l I 2 1 ) Ξ 1 ) ) , 1 l o g Ξ ( 1 + ( Ξ 1 n l R 1 1 ) ( Ξ 1 n l R 2 1 ) Ξ 1 ) e i 2 π ( 1 l o g Ξ ( 1 + ( Ξ 1 n l I 1 1 ) ( Ξ 1 n l I 2 1 ) Ξ 1 ) ) )
ρ ˇ l 1 = ( 1 l o g Ξ ( 1 + ( Ξ 1 m l R 1 1 ) ρ ˇ ( Ξ 1 ) ρ ˇ 1 ) e i 2 π ( 1 l o g Ξ ( 1 + ( Ξ 1 m l I 1 1 ) ρ ˇ ( Ξ 1 ) ρ ˇ 1 ) ) , l o g Ξ ( 1 + ( Ξ n l R 1 1 ) ρ ˇ ( Ξ 1 ) ρ ˇ 1 ) e i 2 π ( l o g Ξ ( 1 + ( Ξ n l I 1 1 ) ρ ˇ ( Ξ 1 ) ρ ˇ 1 ) ) )
l 𝓈 ρ ˇ = ( l o g Ξ ( 1 + ( Ξ m l R 1 1 ) ρ ˇ ( Ξ 1 ) ρ ˇ 1 ) e i 2 π ( l o g Ξ ( 1 + ( Ξ m l I 1 1 ) ρ ˇ ( Ξ 1 ) ρ ˇ 1 ) ) , 1 l o g Ξ ( 1 + ( Ξ 1 n l R 1 1 ) ρ ˇ ( Ξ 1 ) ρ ˇ 1 ) e i 2 π ( 1 l o g Ξ ( 1 + ( Ξ 1 n l I 1 1 ) ρ ˇ ( Ξ 1 ) ρ ˇ 1 ) ) )
Definition 7.
We diagnose the idea of a CIFFWA operator based on CIFNs, where  l 𝓈 = ( m l R 𝓈 e i 2 π ( m l I 𝓈 ) , n l R 𝓈 e i 2 π ( n l I 𝓈 ) ) , 𝓈 = 1 , 2 , , t , such that
C I F F W A ( l 1 , l 2 , , l t ) = μ w 1 l 1 μ w 2 l 2 μ w t l t = 𝓈 = 1 t μ w 𝓈 l 𝓈  
where  𝓈 = 1 t μ w 𝓈 = 1 , μ w 𝓈 [ 0 , 1 ]  represents the weight vector. In particular, if we use the value of  μ w 𝓈 = ( 1 t , 1 t , , 1 t )  in Equation (14), then we obtain
C I F F A ( l 1 , l 2 , , l t ) = 1 t ( l 1 l 2 l t ) = 1 t 𝓈 = 1 t l 𝓈  
which is called the CIF Frank averaging (CIFFA) operator.
Theorem 1.
Verify that the resultant value of Equation (14) is again in the shape of CIFNs, such that
C I F F W A ( l 1 , l 2 , , l t ) = ( 1 l o g Ξ ( 1 + 𝓈 = 1 t ( Ξ 1 m l R 𝓈 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 t μ w 𝓈 1 ) e i 2 π ( 1 l o g Ξ ( 1 + 𝓈 = 1 t ( Ξ 1 m l I 𝓈 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 t μ w 𝓈 1 ) ) , l o g Ξ ( 1 + 𝓈 = 1 t ( Ξ n l R 𝓈 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 t μ w 𝓈 1 ) e i 2 π ( l o g Ξ ( 1 + 𝓈 = 1 t ( Ξ n l I 𝓈 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 t μ w 𝓈 1 ) ) )
Proof of Theorem 1.
The proof of Theorem 1 is given in Appendix A. □
Property 1.
(Idempotency.) When  l 𝓈 = l = ( m l R e i 2 π ( m l I ) , n l R e i 2 π ( n l I ) ) , 𝓈 = 1 , 2 , , t , then
C I F F W A ( l 1 , l 2 , , l k ) = l
Proof of Property 1.
The proof of Property 1 is given in Appendix B. □
Property 2.
(Monotonicity.) When  l 𝓈 l 𝓈 *  where  l 𝓈 = ( m l R 𝓈 e i 2 π ( m l I 𝓈 ) , n l R 𝓈 e i 2 π ( n l I 𝓈 ) )  and  l 𝓈 * = ( m l R 𝓈 * e i 2 π ( m l I 𝓈 * ) , n l R 𝓈 * e i 2 π ( n l I 𝓈 * ) ) , 𝓈 = 1 , 2 , , t , then
C I F F W A ( l 1 , l 2 , , l t ) C I F F W A ( l 1 * , l 2 * , , l t * )  
Proof of Property 2.
The proof of Property 2 is given in Appendix C. □
Property 3.
(Boundedness.) When  l 𝓈 + = ( m a x 𝓈   m l R 𝓈 e i 2 π ( m a x 𝓈   m l I 𝓈 ) , m i n 𝓈   n l R 𝓈 e i 2 π ( m i n 𝓈   n l I 𝓈 ) )  and  l 𝓈 = ( m i n 𝓈   m l R 𝓈 e i 2 π ( m i n 𝓈   m l I 𝓈 ) , m a x 𝓈   n l R 𝓈 e i 2 π ( m a x 𝓈   n l I 𝓈 ) ) , then
l 𝓈 C I F F W A ( l 1 , l 2 , , l t ) l 𝓈 +  
Proof of Property 3.
The proof of Property 3 is given in Appendix D. □
Definition 8.
We diagnose the idea of a CIFFOWA operator based on CIFNs, where  l 𝓈 = ( m l R 𝓈 e i 2 π ( m l I 𝓈 ) , n l R 𝓈 e i 2 π ( n l I 𝓈 ) ) , 𝓈 = 1 , 2 , , t , such that
C I F F O W A ( l 1 , l 2 , , l t ) = μ w 1 l o ( 1 ) μ w 2 l o ( 2 ) μ w t l o ( t ) = 𝓈 = 1 t μ w 𝓈 l o ( 𝓈 )  
where  𝓈 = 1 t μ w 𝓈 = 1 , μ w 𝓈 [ 0 , 1 ]  represents the weight vector with  l o ( 𝓈 ) l o ( 𝓈 1 ) . In particular, if we use the value of  μ w 𝓈 = ( 1 t , 1 t , , 1 t )  in Equation (20), then we obtain:
C I F F O A ( l 1 , l 2 , , l t ) = 1 t ( l o ( 1 ) l o ( 2 ) l o ( t ) ) = 1 t 𝓈 = 1 t l o ( 𝓈 )  
which is called the CIF Frank ordered averaging (CIFFOA) operator.
Theorem 2.
Verify that the resultant value of Equation (20) is again in the shape of CIFNs, such that
C I F F O W A ( l 1 , l 2 , , l t ) = ( 1 l o g Ξ ( 1 + 𝓈 = 1 t ( Ξ 1 m l R o ( 𝓈 ) 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 t μ w 𝓈 1 ) e i 2 π ( 1 l o g Ξ ( 1 + 𝓈 = 1 t ( Ξ 1 m l I o ( 𝓈 ) 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 t μ w 𝓈 1 ) ) , l o g Ξ ( 1 + 𝓈 = 1 t ( Ξ n l R o ( 𝓈 ) 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 t μ w 𝓈 1 ) e i 2 π ( l o g Ξ ( 1 + 𝓈 = 1 t ( Ξ n l I o ( 𝓈 ) 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 t μ w 𝓈 1 ) ) )
Proof. 
The proof of Theorem 2 is similar to the proof of Theorem 1. □
Definition 9.
We diagnose the idea of a CIFFHA operator based on CIFNs, where  l 𝓈 = ( m l R 𝓈 e i 2 π ( m l I 𝓈 ) , n l R 𝓈 e i 2 π ( n l I 𝓈 ) ) , 𝓈 = 1 , 2 , , t , such that
C I F F H A ( l 1 , l 2 , , l t ) = μ w 1 l o ( 1 ) * μ w 2 l o ( 2 ) * μ w t l o ( t ) * = 𝓈 = 1 t μ w 𝓈 l o ( 𝓈 ) *  
where  l o ( 𝓈 ) * = t μ w 𝓈 * l 𝓈  and  𝓈 = 1 t μ w 𝓈 * = 1 , 𝓈 = 1 t μ w 𝓈 = 1 , μ w 𝓈 * , μ w 𝓈 [ 0 , 1 ]  represent the weight vector with  l o ( 𝓈 ) * l o ( 𝓈 1 ) * . In particular, if we use the value of  μ w 𝓈 = ( 1 t , 1 t , , 1 t )  in Equation (23), then we obtain
C I F F H A ( l 1 , l 2 , , l t ) = 1 t ( l o ( 1 ) * l o ( 2 ) * l o ( t ) * ) = 1 t 𝓈 = 1 t l o ( 𝓈 ) *
which is called the CIF Frank hybrid averaging (CIFFHA) operator.
Theorem 3.
Verify that the resultant value of Equation (20) is again in the shape of CIFNs, such that
C I F F H A ( l 1 , l 2 , , l t ) = ( 1 l o g Ξ ( 1 + 𝓈 = 1 t ( Ξ 1 m l R o ( 𝓈 ) * 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 t μ w 𝓈 1 ) e i 2 π ( 1 l o g Ξ ( 1 + 𝓈 = 1 t ( Ξ 1 m l I o ( 𝓈 ) * 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 t μ w 𝓈 1 ) ) , l o g Ξ ( 1 + 𝓈 = 1 t ( Ξ n l R o ( 𝓈 ) * 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 t μ w 𝓈 1 ) e i 2 π ( l o g Ξ ( 1 + 𝓈 = 1 t ( Ξ n l I o ( 𝓈 ) * 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 t μ w 𝓈 1 ) ) )
Proof. 
The proof of Theorem 3 is similar to the proof of Theorem 1. □
Definition 10.
We diagnose the idea of a CIFFWG operator based on CIFNs, where  l 𝓈 = ( m l R 𝓈 e i 2 π ( m l I 𝓈 ) , n l R 𝓈 e i 2 π ( n l I 𝓈 ) ) , 𝓈 = 1 , 2 , , t , such that
C I F F W G ( l 1 , l 2 , , l t ) = l 1 μ w 1 l 2 μ w 2 l t μ w t = 𝓈 = 1 t l 𝓈 μ w 𝓈  
where  𝓈 = 1 t μ w 𝓈 = 1 , μ w 𝓈 [ 0 , 1 ]  represents the weight vector. In particular, if we use the value of  μ w 𝓈 = ( 1 t , 1 t , , 1 t )  in Equation (26), then we obtain
C I F F A ( l 1 , l 2 , , l t ) = ( l 1 l 2 l t ) 1 t = ( 𝓈 = 1 t l 𝓈 ) 1 t  
which is called the CIF Frank geometric (CIFFG) operator.
Theorem 4.
Verify that the resultant value of Equation (26) is again in the shape of CIFNs, such that
C I F F W G ( l 1 , l 2 , , l t ) = ( l o g Ξ ( 1 + 𝓈 = 1 t ( Ξ m l R 𝓈 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 t μ w 𝓈 1 ) e i 2 π ( l o g Ξ ( 1 + 𝓈 = 1 t ( Ξ m l I 𝓈 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 t μ w 𝓈 1 ) ) , 1 l o g Ξ ( 1 + 𝓈 = 1 t ( Ξ 1 n l R 𝓈 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 t μ w 𝓈 1 ) e i 2 π ( 1 l o g Ξ ( 1 + 𝓈 = 1 t ( Ξ 1 n l I 𝓈 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 t μ w 𝓈 1 ) ) )
Proof. 
The proof of Theorem 4 is similar to the proof of Theorem 1. □
Definition 11.
We diagnose the idea of a CIFFOWG operator based on CIFNs, where  l 𝓈 = ( m l R 𝓈 e i 2 π ( m l I 𝓈 ) , n l R 𝓈 e i 2 π ( n l I 𝓈 ) ) , 𝓈 = 1 , 2 , , t , such that
C I F F O W G ( l 1 , l 2 , , l t ) = l o ( 1 ) μ w 1 l o ( 2 ) μ w 2 l o ( t ) μ w t = 𝓈 = 1 t l o ( 𝓈 ) μ w 𝓈  
where  𝓈 = 1 t μ w 𝓈 = 1 , μ w 𝓈 [ 0 , 1 ]  represents the weight vector with  l o ( 𝓈 ) l o ( 𝓈 1 ) . In particular, if we use the value of  μ w 𝓈 = ( 1 t , 1 t , , 1 t )  in Equation (29), then we obtain
C I F F G ( l 1 , l 2 , , l t ) = ( l o ( 1 ) l o ( 2 ) l o ( t ) ) 1 t = ( 𝓈 = 1 t l o ( 𝓈 ) ) 1 t  
which is called the CIF Frank ordered geometric (CIFFOG) operator.
Theorem 5.
Verify that the resultant value of Equation (29) is again in the shape of CIFNs, such that
C I F F O W G ( l 1 , l 2 , , l t ) = ( l o g Ξ ( 1 + 𝓈 = 1 t ( Ξ m l R o ( 𝓈 ) 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 t μ w 𝓈 1 ) e i 2 π ( l o g Ξ ( 1 + 𝓈 = 1 t ( Ξ m l I o ( 𝓈 ) 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 t μ w 𝓈 1 ) ) , 1 l o g Ξ ( 1 + 𝓈 = 1 t ( Ξ 1 n l R o ( 𝓈 ) 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 t μ w 𝓈 1 ) e i 2 π ( 1 l o g Ξ ( 1 + 𝓈 = 1 t ( Ξ 1 n l I o ( 𝓈 ) 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 t μ w 𝓈 1 ) ) )
Proof: 
The proof of Theorem 5 is similar to the proof of Theorem 1. □
Definition 12.
We diagnose the idea of a CIFHG operator based on CIFNs, where  l 𝓈 = ( m l R 𝓈 e i 2 π ( m l I 𝓈 ) , n l R 𝓈 e i 2 π ( n l I 𝓈 ) ) , 𝓈 = 1 , 2 , , t , such that
C I F F H G ( l 1 , l 2 , , l t ) = l * o ( 1 ) μ w 1 l * o ( 2 ) μ w 2 l * o ( t ) μ w t = 𝓈 = 1 t l * o ( 𝓈 ) μ w 𝓈  
where  l o ( 𝓈 ) * = t μ w 𝓈 * l 𝓈  and  𝓈 = 1 t μ w 𝓈 * = 1 , 𝓈 = 1 t μ w 𝓈 = 1 , μ w 𝓈 * , μ w 𝓈 [ 0 , 1 ]  represent the weight vector with  l o ( 𝓈 ) * l o ( 𝓈 1 ) * . In particular, if we use the value of  μ w 𝓈 = ( 1 t , 1 t , , 1 t )  in Equation (32), then we obtain
C I F F H G ( l 1 , l 2 , , l t ) = ( l * o ( 1 ) l * o ( 2 ) l * o ( t ) ) 1 t = ( 𝓈 = 1 t l * o ( 𝓈 ) ) 1 t
which is called the CIF Frank hybrid geometric (CIFFHG) operator.
Theorem 6.
Verify that the resultant value of Equation (32) is again in the shape of CIFNs, such that
C I F F H G ( l 1 , l 2 , , l t ) = ( l o g Ξ ( 1 + 𝓈 = 1 t ( Ξ m l R o ( 𝓈 ) * 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 t μ w 𝓈 1 ) e i 2 π ( l o g Ξ ( 1 + 𝓈 = 1 t ( Ξ m l I o ( 𝓈 ) * 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 t μ w 𝓈 1 ) ) , 1 l o g Ξ ( 1 + 𝓈 = 1 t ( Ξ 1 n l R o ( 𝓈 ) * 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 t μ w 𝓈 1 ) e i 2 π ( 1 l o g Ξ ( 1 + 𝓈 = 1 t ( Ξ 1 n l I o ( 𝓈 ) * 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 t μ w 𝓈 1 ) ) )
Proof: 
The proof of Theorem 6 is similar to the proof of Theorem 1. □

4. MADM Technique Based on Proposed Methods

In this section, we aim to evaluate the problem of bone diseases with consideration of the invented operators.
For this, we use the collection of alternatives l 1 , l 2 , , l m and their criteria l A T 1 , l A T 2 , , l A T n with the weight vector 𝓈 = 1 t μ w 𝓈 = 1 , μ w 𝓈 [ 0 , 1 ] . To obtain this information, we need to construct a matrix by combining the value of CIF information, l 𝓈 = ( m l R 𝓈 e i 2 π ( m l I 𝓈 ) , n l R 𝓈 e i 2 π ( n l I 𝓈 ) ) , 𝓈 = 1 , 2 , , t , with well-known conditions: 0 m l R ( x ) + n l R ( x ) 1 and 0 m l I ( x ) + n l I ( x ) 1 , which represent the CIF information. To formulate the above dilemmas, we organized the stages of the planning procedure in the following order:
  • Stage 1. Usually, we address two types of criteria, benefits and cost types. Therefore, the information or computed matrix is normalized using the following equation:
    N = { ( m l R 𝓈 e i 2 π ( m l I 𝓈 ) , n l R 𝓈 e i 2 π ( n l I 𝓈 ) ) l 𝓈 B ( n l R 𝓈 e i 2 π ( n l I 𝓈 ) , m l R 𝓈 e i 2 π ( m l I 𝓈 ) ) l 𝓈 C
    where B is used to represent the benefit and C is used to represent the cost type.
  • Stage 2. After normalization, we use the theory of CIFFWA and CIFFWG operators to aggregate the information in the decision matrix.
    C I F F W A ( l 1 , l 2 , , l t ) = ( 1 l o g Ξ ( 1 + 𝓈 = 1 t ( Ξ 1 m l R 𝓈 1 ) μ w 𝓈 ) e i 2 π ( 1 l o g Ξ ( 1 + 𝓈 = 1 t ( Ξ 1 m l I 𝓈 1 ) μ w 𝓈 ) ) , l o g Ξ ( 1 + 𝓈 = 1 t ( Ξ n l R 𝓈 1 ) μ w 𝓈 ) e i 2 π ( l o g Ξ ( 1 + 𝓈 = 1 t ( Ξ n l I 𝓈 1 ) μ w 𝓈 ) ) )
    C I F F W G ( l 1 , l 2 , , l t ) = ( l o g Ξ ( 1 + 𝓈 = 1 t ( Ξ m l R 𝓈 1 ) μ w 𝓈 ) e i 2 π ( l o g Ξ ( 1 + 𝓈 = 1 t ( Ξ m l I 𝓈 1 ) μ w 𝓈 ) ) , 1 l o g Ξ ( 1 + 𝓈 = 1 t ( Ξ 1 n l R 𝓈 1 ) μ w 𝓈 ) e i 2 π ( 1 l o g Ξ ( 1 + 𝓈 = 1 t ( Ξ 1 n l I 𝓈 1 ) μ w 𝓈 ) ) )
  • Stage 3. We determine the score value of the obtained accumulated information.
  • Stage 4. Finally, we determine the ordering of the alternatives based on their score values.
To justify the above problem with the help of an example, we use an issue that is faced by old and new generations called osteoporosis disease. We aim to evaluate the most severe type of osteoporosis based on its symptoms, causes, and risk factors using diagnostic approaches.

Analysis of Osteoporosis-Based Causes and Risk Factors

The information in this example is taken from different references [1,2,3,4,5]. There are many different kinds of osteoporosis, each with different causes and characteristics. The main aim of this study is to identify the most severe kind of osteoporosis among the five most serious types based on their features, symptoms, or characteristics, where the five major types of osteoporosis are represented by different families, including:
  • Primary Osteoporosis ( l 1 ): This kind of osteoporosis is the most prevalent and often results from aging naturally. It is also separated into two subtypes:
    (i)
    Postmenopausal osteoporosis.
    (ii)
    Age-related osteoporosis.
  • Secondary Osteoporosis ( l 2 ): This particular form of osteoporosis is brought on by a few underlying illnesses or drugs. Secondary osteoporosis may have several causes, such as:
    (i)
    Hormonal problems.
    (ii)
    Pharmaceuticals.
    (iii)
    Medical conditions.
  • Idiopathic Juvenile Osteoporosis ( l 3 ): There is no known underlying cause for this uncommon kind of osteoporosis, which affects children and teenagers. Significant bone loss and fractures may result from it.
  • Secondary Osteoporosis due to Endocrine Disorders ( l 4 ): This type of osteoporosis is characterized by decreased bone density and an increased risk of fractures, which can be caused by certain endocrine conditions such as hyperparathyroidism or diabetes.
  • Osteoporosis Imperfecta ( l 5 ): Collagen production is impacted by this genetic condition, which is necessary for strong bones. It causes bones to become very brittle and highly fracture-prone.
To identify the most severe of the above-described osteoporosis types, we use the values of criteria, represented by the shapes of the symptoms of osteoporosis: l A T 1 : deformity and mobility l A T 2 : pain; l A T 3 : anxiety and sleeping complications, and l A T 4 : chronic illness. To evaluate the problem discussed above, we use weight vectors of 0.4, 0.3, 0.2, and 0.1. Then, to formulate the above dilemmas, we organize the planning procedure stages into the following order:
  • Stage 1. Usually, we address two types of criteria, benefits and cost types. Therefore, the information or computed matrix is normalized using the following equation:
    N = { ( m l R 𝓈 e i 2 π ( m l I 𝓈 ) , n l R 𝓈 e i 2 π ( n l I 𝓈 ) ) l 𝓈 B ( n l R 𝓈 e i 2 π ( n l I 𝓈 ) , m l R 𝓈 e i 2 π ( m l I 𝓈 ) ) l 𝓈 C
    where B is used to represent the benefit and C is used to represent the cost type. But the information given in Table 1 is based on benefit types, so we cannot normalize it.
    Table 1. The expressed CIF matrix.
    Table 1. The expressed CIF matrix.
    l A T 1 l A T 2
    l 1 ( 0.7 e i 2 π ( 0.6 ) , 0.1 e i 2 π ( 0.2 ) ) ( 0.71 e i 2 π ( 0.61 ) , 0.11 e i 2 π ( 0.21 ) )
    l 2 ( 0.3 e i 2 π ( 0.4 ) , 0.2 e i 2 π ( 0.3 ) ) ( 0.31 e i 2 π ( 0.41 ) , 0.21 e i 2 π ( 0.31 ) )
    l 3 ( 0.4 e i 2 π ( 0.5 ) , 0.2 e i 2 π ( 0.1 ) ) ( 0.41 e i 2 π ( 0.51 ) , 0.21 e i 2 π ( 0.11 ) )
    l 4 ( 0.6 e i 2 π ( 0.5 ) , 0.3 e i 2 π ( 0.3 ) ) ( 0.61 e i 2 π ( 0.51 ) , 0.31 e i 2 π ( 0.31 ) )
    l 5 ( 0.8 e i 2 π ( 0.7 ) , 0.1 e i 2 π ( 0.1 ) ) ( 0.81 e i 2 π ( 0.71 ) , 0.11 e i 2 π ( 0.11 ) )
    l A T 3 l A T 4
    l 1 ( 0.7 e i 2 π ( 0.6 ) , 0.1 e i 2 π ( 0.2 ) ) ( 0.7 e i 2 π ( 0.6 ) , 0.1 e i 2 π ( 0.2 ) )
    l 2 ( 0.32 e i 2 π ( 0.42 ) , 0.22 e i 2 π ( 0.32 ) ) ( 0.33 e i 2 π ( 0.43 ) , 0.23 e i 2 π ( 0.33 ) )
    l 3 ( 0.42 e i 2 π ( 0.52 ) , 0.22 e i 2 π ( 0.12 ) ) ( 0.43 e i 2 π ( 0.53 ) , 0.23 e i 2 π ( 0.13 ) )
    l 4 ( 0.62 e i 2 π ( 0.52 ) , 0.32 e i 2 π ( 0.32 ) ) ( 0.63 e i 2 π ( 0.53 ) , 0.33 e i 2 π ( 0.33 ) )
    l 5 ( 0.82 e i 2 π ( 0.72 ) , 0.12 e i 2 π ( 0.12 ) ) ( 0.83 e i 2 π ( 0.73 ) , 0.13 e i 2 π ( 0.13 ) )
  • Stage 2. After normalization, we used the theory of CIFFWA and CIFFWG operators to aggregate the information in the decision matrix, as shown in Table 2.
    Table 2. The expressed aggregated values.
    Table 2. The expressed aggregated values.
    CIFFWA OperatorCIFFWG Operator
    l 1 ( 0.7101 e i 2 π ( 0.6101 ) , 0.1095 e i 2 π ( 0.2097 ) ) ( 0.7099 e i 2 π ( 0.6099 ) , 0.11004 e i 2 π ( 0.21005 ) )
    l 2 ( 0.31006 e i 2 π ( 0.41007 ) , 0.2097 e i 2 π ( 0.2097 ) ) ( 0.3098 e i 2 π ( 0.4099 ) , 0.21005 e i 2 π ( 0.21005 ) )
    l 3 ( 0.41007 e i 2 π ( 0.51009 ) , 0.2097 e i 2 π ( 0.1095 ) ) ( 0.4099 e i 2 π ( 0.5099 ) , 0.21005 e i 2 π ( 0.11004 ) )
    l 4 ( 0.61011 e i 2 π ( 0.51009 ) , 0.30986 e i 2 π ( 0.30986 ) ) ( 0.60993 e i 2 π ( 0.50992 ) , 0.31006 e i 2 π ( 0.31006 ) )
    l 5 ( 0.81025 e i 2 π ( 0.71016 ) , 0.10958 e i 2 π ( 0.10958 ) ) ( 0.80995 e i 2 π ( 0.70995 ) , 0.11004 e i 2 π ( 0.11004 ) )
  • Stage 3. Moreover, we determine the score value of the obtained accumulated information, as shown in Table 3.
    Table 3. The expressed score values.
    Table 3. The expressed score values.
    CIFFWA OperatorCIFFWG Operator
    l 1 0.50046 0.4999
    l 2 0.15028 0.14983
    l 3 0.3004 0.29986
    l 4 0.25024 0.24987
    l 5 0.65063 0.64991
  • Stage 4. Finally, we find the ordering of the alternatives based on their score values, as shown in Table 4.
    Table 4. The expressed ranking values.
    Table 4. The expressed ranking values.
    MethodsRanking Values
    CIFFWA Operator l 5 l 1 l 3 l 4 l 2
    CIFFWG Operator l 5 l 1 l 3 l 4 l 2
We consider most optimal value to be l 5 , which represents osteoporosis imperfecta. We notice that the diagnostic operators can easily evaluate the CIF types of data. But if we used the theory of intuitionistic fuzzy information instead of CIF information, what would happen? For this, we consider the information in Table 1 without imaginary parts. Then, using imaginary parts, the evaluated information is reviewed. For this, we determine the score value of the obtained accumulated information, as shown in Table 5 (using the information in Table 1 without imaginary parts).
Finally, we identify the ordering of the alternatives based on their score values, as shown in Table 6.
We consider the most optimal value to be l5, which represents osteoporosis imperfecta. We notice that the diagnostic operators evaluated the intuitionistic and CIF types of data very easily.

5. Discussion

Many scholars have proposed different types of operator based on fuzzy sets and their extensions. Upon reviewing the existing techniques, it was noted that the scholars compared their methods with existing techniques to demonstrate the supremacy and validity of their proposed techniques. Therefore, motivated by this information, we compared our diagnostic result with certain prevailing results. To compare the diagnostic operators with some existing operators, we considered the following: the use of aggregation operators (AOs) with consideration of IFI was pioneered by Xu [37]; the use of geometric AOs under the availability of IFI was evaluated by Xu and Yager [38], novel AOs for CIFI were presented by Garg and Rani [39], and generalized geometric AOs for CIFI were explored by Garg and Rani [40]. We also considered the evaluated operators in this manuscript, called CIFFWA and CIFFWG operators. Then, we used the information in Table 2, and the comparative analysis of the diagnostic and existing operators is presented in Table 7.
From the information in Table 7, we determined that the operators defined in Refs. [39,40] are easily evaluated using the information given in Table 2, but noticed that the theory of Garg and Rani [39,40] is special cases in the proposed work because the proposed techniques are more general and reliable than the existing operators of Garg and Rani [39,40]. Furthermore, the theory of Garg and Rani [39,40] was invented based on algebraic norms, which is different from the proposed work, in which values are computed based on Frank norms, where the algebraic norms are special cases of the Frank norms. Additionally, the operators defined based on IFI in Refs. [37,38] failed to evaluate the theory given in Table 2. AOs with consideration of IFI were pioneered by Xu [37], and geometric AOs under the availability of IFI were evaluated by Xu and Yager [38] and have a lot of limitations. However, we try to demonstrate some supremacy of the existing information. For this, we used the information in Table 2 (without imaginary parts), and the comparative analysis of the diagnostic and existing operators is presented in Table 8.
From the information in Table 8, we determined that the operators defined in Refs. [39,40] are easily evaluated using the information given in Table 2 (without imaginary parts), and the operators defined based on IFI in Refs. [37,38] can also be evaluated based on the theory given in Table 2 (without imaginary parts). AOs with consideration of IFI were pioneered by Xu [37], and geometric AOs under the availability of IFI were evaluated by Xu and Yager [38]; we resolved the above information based on their limitations. This means that the diagnostic operators are beneficial and more dominant compared with the existing operators [37,38,39,40].

6. Conclusions

This manuscript aims to combine the major theory of aggregation operators in the presence of Frank’s t-norm and t-conorm with the CIF set theory. Our main study contributions are listed below:
  • We derived Frank’s operational laws based on CIF information.
  • We examined the CIFFWA operator, CIFFOWA operator, CIFFHA operator, CIFFWG operator, CIFFOWG operator, and CIFFHG operator. Some dominant and feasible properties of the invented techniques are also stated.
  • We evaluated the problem of osteoporosis in human bodies based on its causes and risk factors and illustrated an application of the MADM technique with consideration of the invented methods to show the supremacy and validity of the derived techniques.
  • We compared the proposed scenarios with some valid existing or prevailing techniques to increase the value of the presented approaches.

6.1. Limitations

Complex intuitionistic fuzzy set theory is very beneficial and reliable for evaluating awkward and complicated information, but in some real-life situations, CIFS fails when experts are faced with the problem of data sets in triplicate, such as data divided into yes, no, and abstinence categories. In such cases, we require the theory of complex picture fuzzy sets and their extensions.

6.2. Future Directions

In the future, we will review information on the Maclaurin symmetric mean, Dombi operators, the TOPSIS technique, decision-making, and aggregation operators, and try to improve the limitations and barriers of these theories. We aim to apply our results to different fields, such as fuzzy sets and their extensions.

Author Contributions

Conceptualization, K.H.; Methodology, X.Y. and Z.A.; Formal analysis, T.M.; Investigation, Z.A. and K.H.; Resources, X.Y. and T.M.; Writing—original draft, Z.A.; Writing—review & editing, X.Y. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the National Natural Science Foundation of China (12271132, 61877014) and the National Natural Science Foundation of Guangdong Province (2022A1515011460, 2021ZDJS044, QD202211, PNB2103).

Data Availability Statement

The employed data of this study is artificial and imaginary and anyone can employ this data by merely citing this paper before prior permission.

Acknowledgments

We would like to express our appreciation to the editor and the anonymous reviewers for their valuable comments, which have been very helpful in improving the paper.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

Proof of Theorem 1.
Mathematical induction is used in the proof of Equation (16), so, for this, we consider t = 2 , and then,
μ w 1 l 1 = ( 1 log Ξ ( 1 + ( Ξ 1 m l R 1 1 ) μ w 1 ( Ξ 1 ) μ w 1 1 ) e i 2 π ( 1 log Ξ ( 1 + ( Ξ 1 m l I 1 1 ) μ w 1 ( Ξ 1 ) μ w 1 1 ) ) , log Ξ ( 1 + ( Ξ n l R 1 1 ) μ w 1 ( Ξ 1 ) μ w 1 1 ) e i 2 π ( log Ξ ( 1 + ( Ξ n l I 1 1 ) μ w 1 ( Ξ 1 ) μ w 1 1 ) ) )
μ w 2 l 2 = ( 1 log Ξ ( 1 + ( Ξ 1 m l R 2 1 ) μ w 2 ( Ξ 1 ) μ w 2 1 ) e i 2 π ( 1 log Ξ ( 1 + ( Ξ 1 m l I 2 1 ) μ w 2 ( Ξ 1 ) μ w 2 1 ) ) , log Ξ ( 1 + ( Ξ n l R 2 1 ) μ w 2 ( Ξ 1 ) μ w 2 1 ) e i 2 π ( log Ξ ( 1 + ( Ξ n l I 2 1 ) μ w 2 ( Ξ 1 ) μ w 2 1 ) ) )
Then
μ w 1 l 1 μ w 2 l 2 = ( 1 log Ξ ( 1 + ( Ξ 1 m l R 1 1 ) μ w 1 ( Ξ 1 ) μ w 1 1 ) e i 2 π ( 1 log Ξ ( 1 + ( Ξ 1 m l I 1 1 ) μ w 1 ( Ξ 1 ) μ w 1 1 ) ) , log Ξ ( 1 + ( Ξ n l R 1 1 ) μ w 1 ( Ξ 1 ) μ w 1 1 ) e i 2 π ( log Ξ ( 1 + ( Ξ n l I 1 1 ) μ w 1 ( Ξ 1 ) μ w 1 1 ) ) ) ( 1 log Ξ ( 1 + ( Ξ 1 m l R 2 1 ) μ w 2 ( Ξ 1 ) μ w 2 1 ) e i 2 π ( 1 log Ξ ( 1 + ( Ξ 1 m l I 2 1 ) μ w 2 ( Ξ 1 ) μ w 2 1 ) ) , log Ξ ( 1 + ( Ξ n l R 2 1 ) μ w 2 ( Ξ 1 ) μ w 2 1 ) e i 2 π ( log Ξ ( 1 + ( Ξ n l I 2 1 ) μ w 2 ( Ξ 1 ) μ w 2 1 ) ) ) = ( 1 log Ξ ( 1 + 𝓈 = 1 2 ( Ξ 1 m l R 𝓈 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 2 μ w 𝓈 1 ) e i 2 π ( 1 log Ξ ( 1 + 𝓈 = 1 2 ( Ξ 1 m l I 𝓈 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 2 μ w 𝓈 1 ) ) , log Ξ ( 1 + 𝓈 = 1 2 ( Ξ n l R 𝓈 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 2 μ w 𝓈 1 ) e i 2 π ( log Ξ ( 1 + 𝓈 = 1 2 ( Ξ n l I 𝓈 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 2 μ w 𝓈 1 ) ) )
Hence, Equation (16) fulfills the criteria for the value of t = 2 ; further, if we assume that t = k , then
C I F F W A ( l 1 , l 2 , , l k ) = ( 1 log Ξ ( 1 + 𝓈 = 1 k ( Ξ 1 m l R 𝓈 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 k μ w 𝓈 1 ) e i 2 π ( 1 log Ξ ( 1 + 𝓈 = 1 k ( Ξ 1 m l I 𝓈 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 k μ w 𝓈 1 ) ) , log Ξ ( 1 + 𝓈 = 1 k ( Ξ n l R 𝓈 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 k μ w 𝓈 1 ) e i 2 π ( log Ξ ( 1 + 𝓈 = 1 k ( Ξ n l I 𝓈 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 k μ w 𝓈 1 ) ) )
Then, we prove that Equation (16) also fulfills the criteria for the value of t = k + 1 , such that
C I F F W A ( l 1 , l 2 , , l k + 1 ) = μ w 1 l 1 μ w 2 l 2 μ w k l k μ w k + 1 l k + 1 = 𝓈 = 1 k μ w 𝓈 l 𝓈 μ w k + 1 l k + 1
= ( 1 log Ξ ( 1 + 𝓈 = 1 k ( Ξ 1 m l R 𝓈 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 k μ w 𝓈 1 ) e i 2 π ( 1 log Ξ ( 1 + 𝓈 = 1 k ( Ξ 1 m l I 𝓈 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 k μ w 𝓈 1 ) ) , log Ξ ( 1 + 𝓈 = 1 k ( Ξ n l R 𝓈 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 k μ w 𝓈 1 ) e i 2 π ( log Ξ ( 1 + 𝓈 = 1 k ( Ξ n l I 𝓈 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 k μ w 𝓈 1 ) ) ) μ w k + 1 l k + 1
= ( 1 log Ξ ( 1 + 𝓈 = 1 k ( Ξ 1 m l R 𝓈 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 k μ w 𝓈 1 ) e i 2 π ( 1 log Ξ ( 1 + 𝓈 = 1 k ( Ξ 1 m l I 𝓈 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 k μ w 𝓈 1 ) ) , log Ξ ( 1 + 𝓈 = 1 k ( Ξ n l R 𝓈 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 k μ w 𝓈 1 ) e i 2 π ( log Ξ ( 1 + 𝓈 = 1 k ( Ξ n l I 𝓈 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 k μ w 𝓈 1 ) ) ) ( 1 log Ξ ( 1 + ( Ξ 1 m l R k + 1 1 ) μ w k + 1 ( Ξ 1 ) μ w k + 1 1 ) e i 2 π ( 1 log Ξ ( 1 + ( Ξ 1 m l I k + 1 1 ) μ w k + 1 ( Ξ 1 ) μ w k + 1 1 ) ) , log Ξ ( 1 + ( Ξ n l R k + 1 1 ) μ w k + 1 ( Ξ 1 ) μ w k + 1 1 ) e i 2 π ( log Ξ ( 1 + ( Ξ n l I k + 1 1 ) μ w k + 1 ( Ξ 1 ) μ w k + 1 1 ) ) )
= ( 1 log Ξ ( 1 + 𝓈 = 1 k + 1 ( Ξ 1 m l R 𝓈 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 k + 1 μ w 𝓈 1 ) e i 2 π ( 1 log Ξ ( 1 + 𝓈 = 1 k + ! ( Ξ 1 m l I 𝓈 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 k + 1 μ w 𝓈 1 ) ) , log Ξ ( 1 + 𝓈 = 1 k + 1 ( Ξ n l R 𝓈 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 k + 1 μ w 𝓈 1 ) e i 2 π ( log Ξ ( 1 + 𝓈 = 1 k + 1 ( Ξ n l I 𝓈 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 k + ! μ w 𝓈 1 ) ) )
Hence, Equation (16) holds for all possible values of t . □

Appendix B

Proof of Property 1.
Given that l 𝓈 = l = ( m l R e i 2 π ( m l I ) , n l R e i 2 π ( n l I ) ) ,
C I F F W A ( l 1 , l 2 , , l t ) = ( 1 log Ξ ( 1 + 𝓈 = 1 t ( Ξ 1 m l R 𝓈 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 t μ w 𝓈 1 ) e i 2 π ( 1 log Ξ ( 1 + 𝓈 = 1 t ( Ξ 1 m l I 𝓈 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 t μ w 𝓈 1 ) ) , log Ξ ( 1 + 𝓈 = 1 t ( Ξ n l R 𝓈 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 t μ w 𝓈 1 ) e i 2 π ( log Ξ ( 1 + 𝓈 = 1 t ( Ξ n l I 𝓈 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 t μ w 𝓈 1 ) ) )
= ( 1 log Ξ ( 1 + 𝓈 = 1 t ( Ξ 1 m l R 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 t μ w 𝓈 1 ) e i 2 π ( 1 log Ξ ( 1 + 𝓈 = 1 t ( Ξ 1 m l I 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 t μ w 𝓈 1 ) ) , log Ξ ( 1 + 𝓈 = 1 t ( Ξ n l R 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 t μ w 𝓈 1 ) e i 2 π ( log Ξ ( 1 + 𝓈 = 1 t ( Ξ n l I 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 t μ w 𝓈 1 ) ) )
= ( 1 log Ξ ( 1 + ( Ξ 1 m l R 1 ) 𝓈 = 1 t μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 t μ w 𝓈 1 ) e i 2 π ( 1 log Ξ ( 1 + ( Ξ 1 m l I 1 ) 𝓈 = 1 t μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 t μ w 𝓈 1 ) ) , log Ξ ( 1 + ( Ξ n l R 1 ) 𝓈 = 1 t μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 t μ w 𝓈 1 ) e i 2 π ( log Ξ ( 1 + ( Ξ n l I 1 ) 𝓈 = 1 t μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 t μ w 𝓈 1 ) ) )
= ( 1 log Ξ ( 1 + ( Ξ 1 m l R 1 ) 1 ( Ξ 1 ) 1 1 ) e i 2 π ( 1 log Ξ ( 1 + ( Ξ 1 m l I 1 ) 1 ( Ξ 1 ) 1 1 ) ) , log Ξ ( 1 + ( Ξ n l R 1 ) 1 ( Ξ 1 ) 1 1 ) e i 2 π ( log Ξ ( 1 + ( Ξ n l I 1 ) 1 ( Ξ 1 ) 1 1 ) ) )
= ( 1 log Ξ ( 1 + ( Ξ 1 m l R 1 ) 1 ) e i 2 π ( 1 log Ξ ( 1 + ( Ξ 1 m l I 1 ) 1 ) ) , log Ξ ( 1 + ( Ξ n l R 1 ) ) e i 2 π ( log Ξ ( 1 + ( Ξ n l I 1 ) 1 ) ) )
= ( 1 log Ξ Ξ 1 m l R e i 2 π ( 1 log Ξ Ξ 1 m l I ) , log Ξ Ξ n l R e i 2 π ( log Ξ Ξ n l I ) ) = ( m l R e i 2 π ( m l I ) , n l R e i 2 π ( n l I ) ) = l .

Appendix C

Proof of Property 2.
Considering that l 𝓈 l 𝓈 * , this means that m l R 𝓈 m l R 𝓈 * , m l I 𝓈 m l I 𝓈 * and n l R 𝓈 n l R 𝓈 * , n l I 𝓈 n l I 𝓈 * , and then,
1 log Ξ ( 1 + 𝓈 = 1 t ( Ξ 1 m l R 𝓈 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 t μ w 𝓈 1 ) 1 log Ξ ( 1 + 𝓈 = 1 t ( Ξ 1 m l R 𝓈 * 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 t μ w 𝓈 1 )
1 log Ξ ( 1 + 𝓈 = 1 t ( Ξ 1 m l I 𝓈 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 t μ w 𝓈 1 ) 1 log Ξ ( 1 + 𝓈 = 1 t ( Ξ 1 m l I 𝓈 * 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 t μ w 𝓈 1 )
And
log Ξ ( 1 + 𝓈 = 1 t ( Ξ n l R 𝓈 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 t μ w 𝓈 1 ) log Ξ ( 1 + 𝓈 = 1 t ( Ξ n l R 𝓈 * 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 t μ w 𝓈 1 )
log Ξ ( 1 + 𝓈 = 1 t ( Ξ n l I 𝓈 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 t μ w 𝓈 1 ) log Ξ ( 1 + 𝓈 = 1 t ( Ξ n l I 𝓈 * 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 t μ w 𝓈 1 )
Then, by using Equation (6), we obtain:
C s 𝓈 ( C I F F W A ( l 1 , l 2 , , l t ) ) = 1 2 ( 1 log Ξ ( 1 + 𝓈 = 1 t ( Ξ 1 m l R 𝓈 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 t μ w 𝓈 1 ) + 1 log Ξ ( 1 + 𝓈 = 1 t ( Ξ 1 m l I 𝓈 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 t μ w 𝓈 1 ) log Ξ ( 1 + 𝓈 = 1 t ( Ξ n l R 𝓈 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 t μ w 𝓈 1 ) log Ξ ( 1 + 𝓈 = 1 t ( Ξ n l I 𝓈 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 t μ w 𝓈 1 ) ) 1 2 ( 1 log Ξ ( 1 + 𝓈 = 1 t ( Ξ 1 m l R 𝓈 * 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 t μ w 𝓈 1 ) + 1 log Ξ ( 1 + 𝓈 = 1 t ( Ξ 1 m l I 𝓈 * 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 t μ w 𝓈 1 ) log Ξ ( 1 + 𝓈 = 1 t ( Ξ n l R 𝓈 * 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 t μ w 𝓈 1 ) log Ξ ( 1 + 𝓈 = 1 t ( Ξ n l I 𝓈 * 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 t μ w 𝓈 1 ) ) = C s 𝓈 ( C I F F W A ( l 1 * , l 2 * , , l t * ) )
Hence,
C I F F W A ( l 1 , l 2 , , l t ) C I F F W A ( l 1 * , l 2 * , , l t * ) .
If C s 𝓈 ( C I F F W A ( l 1 , l 2 , , l t ) ) = C s 𝓈 ( C I F F W A ( l 1 * , l 2 * , , l t * ) ) , then
A a 𝓈 ( C I F F W A ( l 1 , l 2 , , l t ) ) = 1 2 ( 1 log Ξ ( 1 + 𝓈 = 1 t ( Ξ 1 m l R 𝓈 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 t μ w 𝓈 1 ) + 1 log Ξ ( 1 + 𝓈 = 1 t ( Ξ 1 m l I 𝓈 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 t μ w 𝓈 1 ) + log Ξ ( 1 + 𝓈 = 1 t ( Ξ n l R 𝓈 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 t μ w 𝓈 1 ) + log Ξ ( 1 + 𝓈 = 1 t ( Ξ n l I 𝓈 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 t μ w 𝓈 1 ) ) 1 2 ( 1 log Ξ ( 1 + 𝓈 = 1 t ( Ξ 1 m l R 𝓈 * 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 t μ w 𝓈 1 ) + 1 log Ξ ( 1 + 𝓈 = 1 t ( Ξ 1 m l I 𝓈 * 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 t μ w 𝓈 1 ) + log Ξ ( 1 + 𝓈 = 1 t ( Ξ n l R 𝓈 * 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 t μ w 𝓈 1 ) + log Ξ ( 1 + 𝓈 = 1 t ( Ξ n l I 𝓈 * 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 t μ w 𝓈 1 ) ) = A a 𝓈 ( C I F F W A ( l 1 * , l 2 * , , l t * ) )
Hence,
C I F F W A ( l 1 , l 2 , , l t ) C I F F W A ( l 1 * , l 2 * , , l t * ) .

Appendix D

Proof of Property 3.
Assume that l 𝓈 + = ( max 𝓈   m l R 𝓈 e i 2 π ( max 𝓈   m l I 𝓈 ) , min 𝓈   n l R 𝓈 e i 2 π ( min 𝓈   n l I 𝓈 ) ) and l 𝓈 = ( min 𝓈   m l R 𝓈 e i 2 π ( min 𝓈   m l I 𝓈 ) , max 𝓈   n l R 𝓈 e i 2 π ( max 𝓈   n l I 𝓈 ) ) ; then, min 𝓈   m l R 𝓈 m l R 𝓈 max 𝓈   m l R 𝓈 , min 𝓈   m l I 𝓈 m l I 𝓈 max 𝓈   m l I 𝓈 , min 𝓈   n l R 𝓈 n l R 𝓈 max 𝓈   n l R 𝓈 , min 𝓈   n l I 𝓈 n l I 𝓈 max 𝓈   n l I 𝓈 ; then,
min 𝓈   m l R 𝓈 = 1 log Ξ ( 1 + 𝓈 = 1 t ( Ξ 1 min 𝓈   m l R 𝓈 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 t μ w 𝓈 1 ) 1 log Ξ ( 1 + 𝓈 = 1 t ( Ξ 1 m l R 𝓈 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 t μ w 𝓈 1 ) = m l R 𝓈 1 log Ξ ( 1 + 𝓈 = 1 t ( Ξ 1 max 𝓈   m l R 𝓈 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 t μ w 𝓈 1 ) max 𝓈   m l R 𝓈
min 𝓈   m l I 𝓈 = 1 log Ξ ( 1 + 𝓈 = 1 t ( Ξ 1 min 𝓈   m l I 𝓈 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 t μ w 𝓈 1 ) 1 log Ξ ( 1 + 𝓈 = 1 t ( Ξ 1 m l I 𝓈 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 t μ w 𝓈 1 ) = m l R 𝓈 1 log Ξ ( 1 + 𝓈 = 1 t ( Ξ 1 max 𝓈   m l I 𝓈 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 t μ w 𝓈 1 ) max 𝓈   m l I 𝓈
min 𝓈   n l R 𝓈 = log Ξ ( 1 + 𝓈 = 1 t ( Ξ min 𝓈   n l R 𝓈 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 t μ w 𝓈 1 ) log Ξ ( 1 + 𝓈 = 1 t ( Ξ n l R 𝓈 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 t μ w 𝓈 1 ) = n l R 𝓈 log Ξ ( 1 + 𝓈 = 1 t ( Ξ max 𝓈   n l R 𝓈 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 t μ w 𝓈 1 ) max 𝓈   n l R 𝓈
min 𝓈   n l I 𝓈 = log Ξ ( 1 + 𝓈 = 1 t ( Ξ min 𝓈   n l I 𝓈 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 t μ w 𝓈 1 ) log Ξ ( 1 + 𝓈 = 1 t ( Ξ n l I 𝓈 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 t μ w 𝓈 1 ) = n l I 𝓈 log Ξ ( 1 + 𝓈 = 1 t ( Ξ max 𝓈   n l I 𝓈 1 ) μ w 𝓈 ( Ξ 1 ) 𝓈 = 1 t μ w 𝓈 1 ) max 𝓈   n l I 𝓈
Then by using Equations (6) and (7), we obtain:
C s 𝓈 ( C I F F W A ( l 1 , l 2 , , l t ) ) = 1 2 ( m l R 𝓈 + m l I 𝓈 n l R 𝓈 n l I 𝓈 ) 1 2 ( min 𝓈   m l R 𝓈 + min 𝓈   m l I 𝓈 max 𝓈   n l R 𝓈 max 𝓈   n l I 𝓈 ) = C s 𝓈 ( l 𝓈 )
C s 𝓈 ( C I F F W A ( l 1 , l 2 , , l t ) ) = 1 2 ( m l R 𝓈 + m l I 𝓈 n l R 𝓈 n l I 𝓈 ) 1 2 ( max 𝓈   m l R 𝓈 + max 𝓈   m l I 𝓈 min 𝓈   n l R 𝓈 min 𝓈   n l I 𝓈 ) = C s 𝓈 ( l 𝓈 + )
In both situations, we obtain:
l 𝓈 C I F F W A ( l 1 , l 2 , , l t ) l 𝓈 +
But if C s 𝓈 ( C I F F W A ( l 1 , l 2 , , l t ) ) = C s 𝓈 ( l 𝓈 + ) = C s 𝓈 ( l 𝓈 ) , then
A a 𝓈 ( C I F F W A ( l 1 , l 2 , , l t ) ) = 1 2 ( m l R 𝓈 + m l I 𝓈 n l R 𝓈 n l I 𝓈 ) 1 2 ( min 𝓈   m l R 𝓈 + min 𝓈   m l I 𝓈 max 𝓈   n l R 𝓈 max 𝓈   n l I 𝓈 ) = A a 𝓈 ( l 𝓈 )
A a 𝓈 ( C I F F W A ( l 1 , l 2 , , l t ) ) = 1 2 ( m l R 𝓈 + m l I 𝓈 n l R 𝓈 n l I 𝓈 ) 1 2 ( max 𝓈   m l R 𝓈 + max 𝓈   m l I 𝓈 min 𝓈   n l R 𝓈 min 𝓈   n l I 𝓈 ) = A a 𝓈 ( l 𝓈 + )
In both situations, we obtain:
l 𝓈 C I F F W A ( l 1 , l 2 , , l t ) l 𝓈 + .

References

  1. Edwards, W. The theory of decision making. Psychol. Bull. 1954, 51, 380. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  2. Zanakis, S.H.; Solomon, A.; Wishart, N.; Dublish, S. Multi-attribute decision making: A simulation comparison of select methods. Eur. J. Oper. Res. 1998, 107, 507–529. [Google Scholar] [CrossRef]
  3. Xu, Z. On multi-period multi-attribute decision making. Knowl.-Based Syst. 2008, 21, 164–171. [Google Scholar] [CrossRef]
  4. Bröder, A.; Schiffer, S. Bayesian strategy assessment in multi-attribute decision making. J. Behav. Decis. Mak. 2003, 16, 193–213. [Google Scholar] [CrossRef]
  5. Xu, Z. Multi-person multi-attribute decision making models under intuitionistic fuzzy environment. Fuzzy Optim. Decis. Mak. 2007, 6, 221–236. [Google Scholar] [CrossRef]
  6. Zadeh, L.A. Fuzzy sets. Inf. Control 1965, 8, 338–353. [Google Scholar] [CrossRef] [Green Version]
  7. Jain, R. A procedure for multiple-aspect decision making using fuzzy sets. Int. J. Syst. Sci. 1977, 8, 1–7. [Google Scholar] [CrossRef]
  8. Akram, M.; Adeel, A.; Alcantud, J.C.R. Fuzzy N-soft sets: A novel model with applications. J. Intell. Fuzzy Syst. 2018, 35, 4757–4771. [Google Scholar] [CrossRef]
  9. Akram, M.; Adeel, A.; Alcantud, J.C.R. Hesitant fuzzy N-soft sets: A new model with applications in decision-making. J. Intell. Fuzzy Syst. 2019, 36, 6113–6127. [Google Scholar] [CrossRef]
  10. Ohlan, R.; Ohlan, A. A bibliometric overview and visualization of fuzzy sets and systems between 2000 and 2018. Ser. Libr. 2022, 81, 190–212. [Google Scholar] [CrossRef]
  11. Abdullah, S.; Al-Shomrani, M.M.; Liu, P.; Ahmad, S. A new approach to three-way decisions making based on fractional fuzzy decision-theoretical rough set. Int. J. Intell. Syst. 2022, 37, 2428–2457. [Google Scholar] [CrossRef]
  12. Mahmood, T. A novel approach towards bipolar soft sets and their applications. J. Math. 2020, 2020, 4690808. [Google Scholar] [CrossRef]
  13. Atanassov, K. Intuitionistic fuzzy sets. In Proceedings of the VII ITKR’s Session, Sofia, Bulgaria, 20–23 June 1983. (In Bulgarian). [Google Scholar]
  14. Atanassov, K. Intuitionistic fuzzy sets. Fuzzy Sets Syst. 1986, 20, 87–96. [Google Scholar] [CrossRef]
  15. Ecer, F. An extended MAIRCA method using intuitionistic fuzzy sets for coronavirus vaccine selection in the age of COVID-19. Neural Comput. Appl. 2022, 34, 5603–5623. [Google Scholar] [CrossRef]
  16. Thao, N.X.; Chou, S.Y. Novel similarity measures, entropy of intuitionistic fuzzy sets and their application in software quality evaluation. Soft Comput. 2022, 26, 2009–2020. [Google Scholar] [CrossRef]
  17. Gohain, B.; Chutia, R.; Dutta, P. Distance measure on intuitionistic fuzzy sets and its application in decision-making, pattern recognition, and clustering problems. Int. J. Intell. Syst. 2022, 37, 2458–2501. [Google Scholar] [CrossRef]
  18. Yang, J.; Yao, Y.; Zhang, X. A model of three-way approximation of intuitionistic fuzzy sets. Int. J. Mach. Learn. Cybern. 2022, 13, 163–174. [Google Scholar] [CrossRef]
  19. Garg, H.; Rani, D. Novel distance measures for intuitionistic fuzzy sets based on various triangle centers of isosceles triangular fuzzy numbers and their applications. Expert Syst. Appl. 2022, 191, 116228. [Google Scholar] [CrossRef]
  20. Ramot, D.; Milo, R.; Friedman, M.; Kandel, A. Complex fuzzy sets. IEEE Trans. Fuzzy Syst. 2002, 10, 171–186. [Google Scholar] [CrossRef]
  21. Liu, P.; Ali, Z.; Mahmood, T. The distance measures and cross-entropy based on complex fuzzy sets and their application in decision making. J. Intell. Fuzzy Syst. 2020, 39, 3351–3374. [Google Scholar] [CrossRef]
  22. Mahmood, T.; Ali, Z.; Gumaei, A. Interdependency of complex fuzzy neighborhood operators and derived complex fuzzy coverings. IEEE Access 2021, 9, 73506–73521. [Google Scholar] [CrossRef]
  23. Yazdanbakhsh, O.; Dick, S. A systematic review of complex fuzzy sets and logic. Fuzzy Sets Syst. 2018, 338, 1–22. [Google Scholar] [CrossRef]
  24. Tamir, D.E.; Rishe, N.D.; Kandel, A. Complex fuzzy sets and complex fuzzy logic an overview of theory and applications. In Fifty Years of Fuzzy Logic and Its Applications; Springer: Berlin/Heidelberg, Germany, 2015; pp. 661–681. [Google Scholar]
  25. Zhang, G.; Dillon, T.S.; Cai, K.Y.; Ma, J.; Lu, J. Operation properties and δ-equalities of complex fuzzy sets. Int. J. Approx. Reason. 2009, 50, 1227–1249. [Google Scholar] [CrossRef] [Green Version]
  26. Chen, Z.; Aghakhani, S.; Man, J.; Dick, S. ANCFIS: A neurofuzzy architecture employing complex fuzzy sets. IEEE Trans. Fuzzy Syst. 2010, 19, 305–322. [Google Scholar] [CrossRef]
  27. Hu, B.; Bi, L.; Dai, S.; Li, S. Distances of complex fuzzy sets and continuity of complex fuzzy operations. J. Intell. Fuzzy Syst. 2018, 35, 2247–2255. [Google Scholar] [CrossRef]
  28. Mahmood, T.; Ali, Z. A novel complex fuzzy N-soft sets and their decision-making algorithm. Complex Intell. Syst. 2021, 7, 2255–2280. [Google Scholar] [CrossRef]
  29. Thirunavukarasu, P.; Suresh, R.; Ashokkumar, V. Theory of complex fuzzy soft set and its applications. Int. J. Innov. Res. Sci. Technol. 2017, 3, 13–18. [Google Scholar]
  30. Alkouri, A.M.D.J.S.; Salleh, A.R. Complex intuitionistic fuzzy sets. In AIP Conference Proceedings; American Institute of Physics: College Park, MD, USA, 2012; Volume 1482, pp. 464–470. [Google Scholar]
  31. Ali, Z.; Mahmood, T.; Aslam, M.; Chinram, R. Another view of complex intuitionistic fuzzy soft sets based on prioritized aggregation operators and their applications to multiattribute decision making. Mathematics 2021, 9, 1922. [Google Scholar] [CrossRef]
  32. Garg, H.; Rani, D. Some results on information measures for complex intuitionistic fuzzy sets. Int. J. Intell. Syst. 2019, 34, 2319–2363. [Google Scholar] [CrossRef]
  33. Garg, H.; Rani, D. A robust correlation coefficient measure of complex intuitionistic fuzzy sets and their applications in decision-making. Appl. Intell. 2019, 49, 496–512. [Google Scholar] [CrossRef]
  34. Jan, N.; Nasir, A.; Alhilal, M.S.; Khan, S.U.; Pamucar, D.; Alothaim, A. Investigation of cyber-security and cyber-crimes in oil and gas sectors using the innovative structures of complex intuitionistic fuzzy relations. Entropy 2021, 23, 1112. [Google Scholar] [CrossRef] [PubMed]
  35. Frank, M.J. On the simultaneous associativity of F (x, y) and x+ y− F (x, y). Aequ. Math. 1979, 19, 194–226. [Google Scholar] [CrossRef]
  36. Seikh, M.R.; Mandal, U. Some Picture Fuzzy Aggregation Operators based on Frank t-norm and t-conorm: Application to MADM Process. Informatica 2021, 45, 447–461. [Google Scholar] [CrossRef]
  37. Xu, Z. Intuitionistic fuzzy aggregation operators. IEEE Trans. Fuzzy Syst. 2007, 15, 1179–1187. [Google Scholar]
  38. Xu, Z.; Yager, R.R. Some geometric aggregation operators based on intuitionistic fuzzy sets. Int. J. Gen. Syst. 2006, 35, 417–433. [Google Scholar] [CrossRef]
  39. Garg, H.; Rani, D. Novel aggregation operators and ranking method for complex intuitionistic fuzzy sets and their applications to decision-making process. Artif. Intell. Rev. 2020, 53, 3595–3620. [Google Scholar] [CrossRef]
  40. Garg, H.; Rani, D. Generalized geometric aggregation operators based on t-norm operations for complex intuitionistic fuzzy sets and their application to decision-making. Cogn. Comput. 2020, 12, 679–698. [Google Scholar] [CrossRef]
Table 5. The expressed score values (without imaginary parts).
Table 5. The expressed score values (without imaginary parts).
CIFFWA OperatorCIFFWG Operator
l 1 0.60058 0.5999
l 2 0.1003 0.0998
l 3 0.2003 0.1998
l 4 0.3003 0.2999
l 5 0.7007 0.6999
Table 6. The expressed ranking values (without imaginary parts).
Table 6. The expressed ranking values (without imaginary parts).
MethodsRanking Values
CIFFWA Operator l 5 l 1 l 4 l 3 l 2
CIFFWG Operator l 5 l 1 l 4 l 3 l 2
Table 7. The represented ranking values using the information in Table 2.
Table 7. The represented ranking values using the information in Table 2.
MethodsScore ValuesRanking Values
Xu [37] Not   evaluated   due   to   some   complications Not   evaluated   due   to   some   complications
Xu and Yager [38] Not   evaluated   due   to   some   complications Not   evaluated   due   to   some   complications
Garg and Rani [39] 0.7001 , 0.3006 , 0.6009 , 0.5006 , 0.8013 l 5 l 1 l 3 l 4 l 2
Garg and Rani [40] 0.9997 , 0.2996 , 0.5997 , 0.4997 , 0.9998 l 5 l 1 l 3 l 4 l 2
CIFFWA Operator 0.50046 , 0.15028 , 0.3004 , 0.25024 , 0.65063 l 5 l 1 l 3 l 4 l 2
CIFFWG Operator 0.4999 , 0.14983 , 0.29986 , 0.24987 , 0.64991 l 5 l 1 l 3 l 4 l 2
Table 8. The represented ranking values using the information in Table 2 (without imaginary parts).
Table 8. The represented ranking values using the information in Table 2 (without imaginary parts).
MethodsScore ValuesRanking Values
Xu [37] 0.6006 , 0.1003 , 0.2003 , 0.3003 , 0.7007 l 5 l 1 l 4 l 3 l 2
Xu and Yager [38] 0.5999 , 0.0998 , 0.1998 , 0.2499 , 0.6999 l 5 l 1 l 4 l 3 l 2
Garg and Rani [39] 0.7001 , 0.3006 , 0.6009 , 0.5006 , 0.8013 l 5 l 1 l 3 l 4 l 2
Garg and Rani [40] 0.9997 , 0.2996 , 0.5997 , 0.4997 , 0.9998 l 5 l 1 l 3 l 4 l 2
CIFFWA Operator 0.60058 , 0.1003 , 0.2003 , 0.3003 , 0.7007 l 5 l 1 l 4 l 3 l 2
CIFFWG Operator 0.5999 , 0.0998 , 0.1998 , 0.2999 , 0.6999 l 5 l 1 l 4 l 3 l 2
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Yang, X.; Mahmood, T.; Ali, Z.; Hayat, K. Identification and Classification of Multi-Attribute Decision-Making Based on Complex Intuitionistic Fuzzy Frank Aggregation Operators. Mathematics 2023, 11, 3292. https://doi.org/10.3390/math11153292

AMA Style

Yang X, Mahmood T, Ali Z, Hayat K. Identification and Classification of Multi-Attribute Decision-Making Based on Complex Intuitionistic Fuzzy Frank Aggregation Operators. Mathematics. 2023; 11(15):3292. https://doi.org/10.3390/math11153292

Chicago/Turabian Style

Yang, Xiaopeng, Tahir Mahmood, Zeeshan Ali, and Khizar Hayat. 2023. "Identification and Classification of Multi-Attribute Decision-Making Based on Complex Intuitionistic Fuzzy Frank Aggregation Operators" Mathematics 11, no. 15: 3292. https://doi.org/10.3390/math11153292

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop