Next Article in Journal / Special Issue
Novel Distance Measures of q-Rung Orthopair Fuzzy Sets and Their Applications
Previous Article in Journal
Towards Modelling Mechanical Shaking Using Potential Energy Surfaces: A Toy Model Analysis
Previous Article in Special Issue
Selection of a Green Contractor for the Implementation of a Solar Power Plant Project
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Nonlinear Programming Approach to Solving Interval-Valued Intuitionistic Hesitant Noncooperative Fuzzy Matrix Games

by
Shuvasree Karmakar
and
Mijanur Rahaman Seikh
*,†
Department of Mathematics, Kazi Nazrul University, Asansol 713340, India
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Symmetry 2024, 16(5), 573; https://doi.org/10.3390/sym16050573
Submission received: 14 April 2024 / Revised: 27 April 2024 / Accepted: 29 April 2024 / Published: 7 May 2024
(This article belongs to the Special Issue Recent Developments on Fuzzy Sets Extensions)

Abstract

:
Initially, fuzzy sets and intuitionistic fuzzy sets were used to address real-world problems with imprecise data. Eventually, the notion of the hesitant fuzzy set was formulated to handle decision makers’ reluctance to accept asymmetric information. However, in certain scenarios, asymmetric information is gathered in terms of a possible range of acceptance and nonacceptance by players rather than specific values. Furthermore, decision makers exhibit some hesitancy regarding this information. In such a situation, all the aforementioned expansions of fuzzy sets are unable to accurately represent the scenario. The purpose of this article is to present asymmetric information situations in which the range of choices takes into account the hesitancy of players in accepting or not accepting information. To illustrate these problems, we develop matrix games that consider the payoffs of interval-valued intuitionistic hesitant fuzzy elements (IIHFEs). Dealing with these types of fuzzy programming problems requires a significant amount of effort. To solve these matrix games, we formulate two interval-valued intuitionistic hesitant fuzzy programming problems. Preserving the hesitant nature of the payoffs to determine the optimal strategies, these two problems are transformed into two nonlinear programming problems. This transformation involves using mathematical operations for IIHFEs. Here, we construct a novel aggregation operator of IIHFEs, viz., min-max operators of IIHFEs. This operator is suitable for applying the developed methodology. The cogency and applicability of the proposed methodology are verified through a numerical example based on the situation of conflict between hackers and defenders to prevent damage to cybersecurity. To validate the superiority of the proposed model along with the computed results, we provide comparisons with the existing models.

1. Introduction

Neumann and Morgenstern [1] introduced a mathematical tool that can conceive a conflicting situation that arises in reality. This mathematical tool is termed game theory. It deals with mathematical models of strategic interaction between two players. However, due to the ambiguity of decision makers and inadequate information, it becomes difficult to formulate real game situations. To capture this inadequate information, Dubois and Prade [2] used the notion of fuzzy sets in game theory. Several researchers [3,4] addressed and extended this topic through their own opinions.
In 1986, Atanassov [5] brought a little change in the mode of description of a fuzzy set by introducing it in the literature as an intuitionistic fuzzy (I-fuzzy) set. I-fuzzy sets are described by the degree of membership and nonmembership values such that the sum of these values must be bound by 1. Li [6] addressed matrix games with I-fuzzy payoffs by rendering a nonlinear programming approach. Li [7] analyzed management problems in the context of game theory using I-fuzzy sets. Xia [8] implemented Archimedean triangular norms and triangular conorms for solving matrix games with payoffs of interval-valued I-fuzzy numbers. Brikaa et al. [9] explored an indeterminacy approach for solving zero-sum matrix games having intuitionistic fuzzy goals. Verma and Kumar [10] developed the Ambika method to deal with matrix games in an intuitionistic fuzzy scenario. Verma and Aggarwal [11] developed a generalized method to solve matrix games with payoffs of linguistic intuitionistic fuzzy sets. Dong and Wan [12] developed a solution methodology for solving matrix games with type-2 interval-valued intuitionistic fuzzy payoffs and applied it to energy vehicle industry development. Moreover, in the recent past, numerous researchers explored their views to develop matrix games under several fuzzy environments, such as type-2 fuzzy [13], q-rung orthopair fuzzy [14], and neutrosophic [15,16,17,18] environments.
It was observed that the I-fuzzy set was not always sufficient to portray all types of inadequacies in the supplied information. So, aiming to consider hesitation among decision makers, Torra [19] introduced the notion of a hesitant fuzzy set (HFS). The belongingness of elements in such an HFS is assigned by a set of possible membership degrees, which lie in the interval [0, 1]. Later, Xia and Xu [20] presented an HFS as the envelope of Atanassov’s I-fuzzy set. Xu and Xia [21] developed distance, similarity, and correlation measures for HFSs. Zeng et al. [22] applied the notion of interval-valued hesitant fuzzy sets (IVHFSs) to group decision making. In the recent past, Jana and Roy [23] explored the linguistic Pythagorean hesitant fuzzy matrix game and applied it to multicriteria decision making. Utilizing the lexicographic approach, Seikh et al. [24] designed the solution methodology of a matrix game with hesitant fuzzy payoffs. Yang and Song [25] rendered the solution procedure for matrix games with triangular dual hesitant fuzzy payoffs. Naqvi et al. [26] developed matrix games with payoffs represented by interval-valued hesitant fuzzy linguistic sets.
In 2013, Zhang [27] introduced the notion of IIHFSs, aiming to model a sufficient mathematical tool. It permits hesitancy in terms of both membership and nonmembership degrees. He introduced a series of aggregation operators for IIHFSs and used them to develop group decision-making problems. Broumi and Smarandache [28] proposed some operators for IIHFSs along with their properties. Joshi and Kumar [29] designed multicriteria group decision making in an interval-valued intuitionistic hesitant fuzzy (IIHF) environment by defining the Choquet integral operator. Yuan et al. [30] also studied group decision-making problems in the IIHF environment with a confidence level. Later, Joshi and Kumar [31] explored the entropy of IIHFEs to make the solution to group decision-making problems. Naryanmoorthy et al. [32] developed the VIKOR method in the IIHF environment for ranking the prescribed alternatives in industrial robot selection. De et al. [33] extended the TOPSIS method to solve multiattribute decision-making problems with probabilistic IIHF decisions. Du et al. [34] rendered a data-driven group decision-making method under the IIHF environment. Bhaumik et al. [35] discussed a bimatrix game problem with hesitant interval-valued intuitionistic linguistic payoffs in the light of the prisoner’s dilemmatic approach and applied it to portray the human trafficking problem. Apart from these, the notion of IIHFSs is used in different directions of decision-making theory by several authors [36,37,38].
As IIHFS is a significant extension of the fuzzy set in the literature by its character, it is, therefore, very reasonable and relevant to use IIHFS in game theory. In the literature, it is found that Bhaumik and Roy [39] developed matrix games with IIHFEs for solving management problems. In that discussion, two interval-valued intuitionistic hesitant fuzzy programming models were derived. Later, they followed the usual method for solving the interval-valued linear programming problem. However, the objective functions of the derived problems were in the form of some intervals, which are part of an IIHFE. However, the mathematical operations on IIHFEs do not follow the operational rule of classical intervals. Rather, if we follow the existing operational rule of IIHFEs, the aforementioned bi-objective programming problems should be transformed into two nonlinear programming problems. So, there is a major drawback in the approach of Bhaumik and Roy [39]. This paper aims to obviate such drawbacks and proposes a new methodology for solving matrix games in the IIHF environment.
Although there exist different aggregation operators for IIHFEs, for convenient calculation, we define a novel aggregation operator, viz., the min-max enclosure operator. Then we derive two interval-valued intuitionistic hesitant fuzzy programming problems for solving the proposed game. These are converted into two nonlinear programming models by following a few steps. Finally, to obtain the optimal solutions, the nonlinear programming problems are solved by using Wolfram MATHEMATICA 9.0 software.
The contributions of this paper are listed here:
  • A novel aggregation operator is introduced in this study, which is referred to as the min-max enclosure operator. This operator is specifically designed for the aggregation of IIHF information. One of the advantages of the proposed operator is its simplicity, which makes it easy to implement and use. Additionally, the operator has the capability to preserve the characteristics of IIHFEs, ensuring that the important features of the information are not lost during the aggregation process.
  • A nonlinear programming approach is delineated in this paper to handle interval-valued intuitionistic hesitant fuzzy programming problems to solve IIHF matrix games. In order to achieve the best possible outcomes, these problems are converted into two distinct crisp nonlinear programming problems.
  • Like in classical game theory, it is established that the gain floor of the winning player is less than or equal to the loss ceiling of the defeated player.
  • The proposed methodology is illustrated through the problem of cybercrime. The superiority of the proposed method is checked and verified by analyzing a comparative study with two existing models.
The rest of this article is delineated as follows: Some basic definitions associated with IIHFEs along with mathematical operations are recalled in Section 2. In Section 3, a novel aggregation operator for IIHFEs, viz., the min-max enclosure operator, is defined. In Section 4, a matrix game with payoffs of IIHFEs is amplified. A practical example of the conflict between hackers and defenders to stop cybercrime is demonstrated in Section 5. A comparison analysis along with a discussion of results is briefed in Section 6. Finally, the conclusion is drawn in Section 7.

2. Preliminaries

In this section, some primary definitions related to IIHFEs are recalled, which helps us to develop the succeeding discussions.
Definition 1
(IIFS ([40])). A set I ˜ can be defined as an IIFS on a universe of discourse Υ if I ˜ is defined as I ˜ = { x , ( [ m l , m u ] , [ n l , n u ] ) | x Υ . Here, [ m l , m u ] [ 0 , 1 ] and [ n l , n u ] [ 0 , 1 ] , and also, m u + n u 1 .
Definition 2
((HFS [19])). A set E ˜ can be defined as an HFS on a universe of discourse Υ in terms of a function. The function gives few possible values when applied on the universal set Υ. Xia and Xu [20] symbolized an HFS as E ˜ = { k , ϱ ˜ ( k ) | k Υ } where each ϱ ˜ ( k ) takes some values from the closed interval [ 0 , 1 ] . These ϱ ˜ ( k ) values are termed as hesitant fuzzy elements (HFEs).
Definition 3
((IVHFS [41])). An interval-valued hesitant fuzzy set (IVHFS) E ˜ on Υ is defined symbolically as E ˜ = { k , ϱ ˜ ( k ) | k Υ } , where ϱ ˜ ( k ) represents some set of intervals in [ 0 , 1 ] , i.e., ϱ ˜ ( k ) = [ ϱ l , ϱ u ] ϱ ˜ ( k ) [ ϱ l , ϱ u ] . The intervals ϱ ˜ ( k ) are termed as interval-valued hesitant fuzzy elements (IVHFEs), where ϱ l stands for the lower limit and ϱ u stands for the upper limit of the interval [ ϱ l , ϱ u ] .
Definition 4
((IIHFS [39])). An interval-valued intuitionistic hesitant fuzzy set (IIHFS) E ˜ on Υ is defined symbolically as E ˜ = { k , ϱ ˜ ( k ) | k Υ } , where ϱ ˜ ( k ) = ϱ ˜ μ ( k ) ; ϱ ˜ ν ( k ) = Δ [ ϱ μ l , ϱ μ u ] ; Δ [ ϱ ν l , ϱ ν u ] represents the set of intervals in terms of degree of membership and nonmembership values. Each ϱ ˜ ( k ) = ϱ ˜ μ ( k ) ; ϱ ˜ ν ( k ) is termed as the interval-valued intuitionistic hesitant fuzzy elements (IIHFEs). The interval [ ϱ μ l , ϱ μ u ] takes the value from [ 0 , 1 ] for the membership degree, whereas the interval [ ϱ ν l , ϱ ν u ] takes the value from [ 0 , 1 ] for the nonmembership degree of the IIHFE ϱ ˜ ( k ) , and Δ denotes the union of all intervals.
Definition 5
((Mathematical operations on IIHFEs [39])). Let ϱ ˜ , ϱ ˜ 1 , a n d ϱ ˜ 2 be three IIHFEs, having the form ϱ ˜ = Δ [ ϱ μ l , ϱ μ u ] ; Δ [ ϱ ν l , ϱ ν u ] ,   ϱ ˜ 1 = Δ [ ϱ 1 μ l , ϱ 1 μ u ] ; Δ [ ϱ 1 ν l , ϱ 1 ν u ] , and ϱ ˜ 2 = Δ [ ϱ 2 μ l , ϱ 2 μ u ] ; Δ [ ϱ 2 ν l , ϱ 2 ν u ] . Then the mathematical operations on IIHFEs are performed as
  • ϱ ˜ 1 ϱ ˜ 2 = Δ [ ϱ 1 μ l + ϱ 2 μ l ϱ 1 μ l ϱ 2 μ l , ϱ 1 μ u + ϱ 2 μ u ϱ 1 μ u ϱ 2 μ u ] ; Δ [ ϱ 1 ν l ϱ 2 ν l , ϱ 1 ν u ϱ 2 ν u ] ,
  • τ ϱ ˜ = Δ [ 1 ( 1 ϱ μ l ) τ , 1 ( 1 ϱ μ u ) τ ] ; Δ [ ( ϱ ν l ) τ , ( ϱ ν u ) τ ] , for any positive scalar τ .
Definition 6
((Extension principle of IIHFEs [39])). Let Ω be the collection of m numbers of IIHFEs, i.e., Ω = { ϱ p ˜ : p = 1 , 2 , , m } , and ϝ be considered as a function on Ω , such that ϝ: [ 0 , 1 ] m [ 0 , 1 ] , then ϝ must satisfies the equality ϝ ( Ω ) = ϱ p ˜ Δ [ ϱ p μ l , ϱ p μ u ] ; Δ [ ϱ p ν l , ϱ p ν u ]  {ϝ ( ϱ p ˜ ) }.
Definition 7 (Score function and accuracy function of IIHFEs).
Let ϱ ˜ = Δ [ ϱ μ l , ϱ μ u ] ; Δ [ ϱ ν l , ϱ ν u ] be an IIHFE. Then the score function and accuracy function of IIHFE ϱ ˜ are defined as follows:
S c ( ϱ ˜ ) = | 1 2 [ ( min ϱ μ l + max ϱ μ u ) ( min ϱ ν l + max ϱ ν u ) ] | A c ( ϱ ˜ ) = 1 2 [ ( min ϱ μ l + max ϱ μ u ) + ( min ϱ ν l + max ϱ ν u ) ] .
For example, consider an IIHFE, ϱ ˜ = [ 0.55 , 0.60 ] , [ 0.55 , 0.70 ] ; [ 0.50 , 0.60 ] , [ 0.45 , 0.60 ] , then the score function and accuracy function of ϱ ˜ are calculated as S c ( ϱ ˜ ) = | 1 2 [ ( 0.55 + 0.70 ) ( 0.45 + 0.60 ) ] | = 0.1 and A c ( ϱ ˜ ) = 1 2 [ ( 0.55 + 0.70 ) + ( 0.45 + 0.60 ) ] = 1.15 .
It is worth noting that if the lower element and the upper element of the intervals of IIHFE take the same value, then the accuracy function and the score function of an IIHFE transforms into the same value of an intuitionistic fuzzy number. Furthermore, the accuracy function and score function of that intuitionistic fuzzy number are the same, as shown by Xu [42].
Definition 8 (Ranking of IIHFEs).
Let ϱ a ˜   a n d   ϱ b ˜ be two IIHFEs. Then, based on Definition 7, we may define the ranking of the IIHFEs as
(i) 
If S c ( ϱ a ˜ ) > S c ( ϱ b ˜ ) , then ϱ a ˜ > I I H F ϱ b ˜ .
(ii) 
If S c ( ϱ a ˜ ) < S c ( ϱ b ˜ ) , then ϱ a ˜ < I I H F ϱ b ˜ .
(iii) 
If S c ( ϱ a ˜ ) = S c ( ϱ b ˜ ) , then
(a) 
If A c ( ϱ a ˜ ) < A c ( ϱ b ˜ ) , then ϱ a ˜ < I I H F ϱ b ˜ .
(b) 
If A c ( ϱ a ˜ ) > A c ( ϱ b ˜ ) , then ϱ a ˜ > I I H F ϱ b ˜ .
(c) 
If A c ( ϱ a ˜ ) = A c ( ϱ b ˜ ) , then ϱ a ˜ = I I H F ϱ b ˜ .
Here, ‘ > I I H F ’, ‘ < I I H F ’, and ‘ = I I H F ’ are used in the sense of the usual ‘greater than’, ‘less than’, and ‘equal to’ in an IIHF environment.
Let us take two examples here to show the ranking of IIHFEs:
(i)
Consider two IIFHEs, ϱ 1 ˜ = [ 0.55 , 0.60 ] , [ 0.55 , 0.70 ] ; [ 0.50 , 0.60 ] , [ 0.45 , 0.60 ] and ϱ 2 ˜ = [ 0.65 , 0.70 ] ; [ 0.35 , 0.45 ] , [ 0.35 , 0.50 ] . Then S c ( ϱ 1 ˜ ) = 0.1 , and S c ( ϱ 2 ˜ ) = 0.25 , which concludes that ϱ 2 ˜ > I I H F ϱ 1 ˜ .
(ii)
Suppose ϱ 3 ˜ = [ 0.30 , 0.40 ] , [ 0.30 , 0.45 ] ; [ 0.05 , 0.15 ] , [ 0.05 , 0.10 ] , and ϱ 4 ˜ = [ 0.30 , 0.35 ] ; [ 0.30 , 0.40 ] , [ 0.05 , 0.08 ] , [ 0.06 , 0.10 ] . Then S c ( ϱ 3 ˜ ) = 0.275 , and S c ( ϱ 4 ˜ ) = 0.275 , which S c ( ϱ 3 ˜ ) = S c ( ϱ 4 ˜ ) . So, in this case, we cannot assign the ranking based on the score function, and we have to calculate the accuracy function of these two IIHFEs. Now A c ( ϱ 3 ˜ ) = 0.475 and A c ( ϱ 4 ˜ ) = 0.425 , which concludes ϱ 2 ˜ = I I H F ϱ 1 ˜ .
In various decision-making problems, often we need to aggregate the information. There are plenty of aggregation operators for IIHFEs available in the literature. To preserve the hesitant character, the following section introduces a novel aggregation operator for IIHFEs.

3. New Aggregation Operator

In order to aggregate the IIHFEs here, we define a new aggregation operator of IIHFEs. The new aggregation operator is set up based on the notion of the extension principle of IIHFEs and the mathematical operations on IIHFEs, depicted in Definitions 5 and 6, respectively. This novel aggregation operator is termed as an interval-valued intuitionistic hesitant fuzzy weighted min-max enclosure aggregation operator (IIHFWMEAO), or min-max enclosure aggregation operator in short.
Definition 9 (Min-max enclosure of IIHFEs).
Let us consider an IIHFE ϱ ˜ = [ ϱ 1 μ l , ϱ 1 μ u ] ,   [ ϱ 2 μ l , ϱ 2 μ u ] , , [ ϱ m μ l , ϱ m μ u ] ; [ ϱ 1 ν l , ϱ 1 ν u ] , [ ϱ 2 ν l , ϱ 2 ν u ] , , [ ϱ n ν l , ϱ n ν u ] . It is worth noting that m and n are two integers that may or may not exert the same values. Let us construct an IIHFE ϱ ˜ E as ϱ ˜ E = min 1 p m ϱ p μ l , max 1 p m ϱ p μ u ;   min 1 q n ϱ q ν l , max 1 q n ϱ q ν u , where min 1 p m ϱ p μ l ϱ p μ l ϱ p μ u max 1 p m ϱ p μ u , p , and min 1 q m ϱ q ν l ϱ q ν l ϱ q ν u max 1 q m ϱ q ν u , q . This ϱ ˜ E is termed as the min-max enclosure of the IIHFE ϱ ˜ .
Based on Definition 9, we can define the min-max enclosure operator of IIHFEs.
Definition 10 (Min-max enclosure operator).
Suppose ϱ ˜ , ϱ 1 ˜ , ϱ 2 ˜ Ω are three IIHFEs having the forms ϱ ˜ = Δ [ ϱ μ l , ϱ μ u ] ; Δ [ ϱ ν l , ϱ ν u ] , ϱ 1 ˜ = Δ [ ϱ 1 μ l , ϱ 1 μ u ] ; Δ [ ϱ 1 ν l , ϱ 1 ν u ] , and ϱ 2 ˜ = Δ [ ϱ 2 μ l , ϱ 2 μ u ] ; Δ [ ϱ 2 ν l , ϱ 2 ν u ] . Then the min-max enclosure operators of IIHFEs are defined as follows:
Min-max enclosure sum:
ϱ 1 ˜ + ϱ 2 ˜ = 1 1 min ϱ 1 μ l 1 min ϱ 2 μ l , 1 1 max ϱ 1 μ u 1 max ϱ 2 μ u ; min ϱ 1 ν l min ϱ 2 ν l , max ϱ 1 ν u max ϱ 2 ν u .
Min-max enclosure product:
ϱ 1 ˜ × ϱ 2 ˜ = min ϱ 1 μ l min ϱ 2 μ l , max ϱ 1 μ u max ϱ 2 μ u ; 1 1 min ϱ 1 ν l 1 min ϱ 2 ν l , 1 1 max ϱ 1 ν u 1 max ϱ 2 ν u .
Min-max enclosure scalar product: For any scalar δ > 0 ,
δ ϱ ˜ = 1 1 min ϱ μ l δ , 1 1 max ϱ μ u δ ; min ϱ ν l δ , max ϱ ν u δ .
Min-max enclosure index: For any scalar δ > 0 ,
( ϱ ˜ ) δ = min ϱ μ l δ , max ϱ μ u δ ; 1 1 min ϱ ν l δ , 1 1 max ϱ 1 ν u δ .
Let us take two IIHFEs ϱ 1 ˜ = [ 0.60 , 0.70 ] ; [ 0.30 , 0.40 ] , [ 0.35 , 0.50 ] , ϱ 2 ˜ = [ 0.40 , 0.50 ] , [ 0.45 , 0.50 ] ; [ 0.25 , 0.30 ] , [ 0.35 , 0.40 ] and a scalar δ = 0.8 . Hence, the min-max enclosure sum, min-max enclosure product, min-max enclosure scalar product, and min-max enclosure index of these two IIHFEs are calculated as follows:
ϱ 1 ˜ + ϱ 2 ˜ = [ 0.60 , 0.70 ] ; [ 0.30 , 0.40 ] , [ 0.35 , 0.50 ] + [ 0.40 , 0.50 ] , [ 0.45 , 0.50 ] ; [ 0.25 , 0.30 ] , [ 0.35 , 0.40 ] = [ 0.76 , 0.85 ] ; [ 0.07 , 0.20 ] ϱ 1 ˜ × ϱ 2 ˜ = [ 0.60 , 0.70 ] ; [ 0.30 , 0.40 ] , [ 0.35 , 0.50 ] × [ 0.40 , 0.50 ] , [ 0.45 , 0.50 ] ; [ 0.25 , 0.30 ] , [ 0.35 , 0.40 ] = [ 0.25 , 0.35 ] ; [ 0.47 , 0.70 ] 0.8 ϱ 1 ˜ = 0.8 [ 0.60 , 0.70 ] ; [ 0.30 , 0.40 ] , [ 0.35 , 0.50 ] = [ 0.52 , 0.62 ] ; [ 0.38 , 0.57 ] ( ϱ 1 ˜ ) 0.8 = ( [ 0.60 , 0.70 ] ; [ 0.30 , 0.40 ] , [ 0.35 , 0.50 ] ) 0.8 = [ 0.66 , 0.75 ] ; [ 0.25 , 0.43 ]
Definition 11 (Min-max enclosure aggregation operator).
Let ϱ 1 ˜ , ϱ 2 ˜ , ϱ m ˜ Ω be a collection of m number of IIHFEs and ω = ( ω 1 , ω 2 , , ω m ) be the set of weight vectors, such that each ω p is associated with each ϱ p ˜ ( t = 1 , 2 , , m ) with p = 1 m ω p = 1 . Hence, interval-valued intuitionistic hesitant fuzzy weighted min-max enclosure aggregation operator (IIHFWMEAO) is defined as a mapping from Ω m to Ω , such that
I I H F W M E A O ( ϱ 1 ˜ , ϱ 2 ˜ , , ϱ m ˜ ) = p = 1 m ω p ϱ p ˜ .
Theorem 1.
Let ϱ p ˜ ( p = 1 , 2 , , m ) be a collection of m number of IIHFEs and ω = ( ω 1 , ω 2 , , ω m ) be the set of weight vectors. Suppose each ω p is associated with each ϱ p ˜ for p = 1 , 2 , , m , with p = 1 m ω p = 1 . Then the aggregation operator IIHFWMEAO is calculated as
I I H F W M E A O ( ϱ 1 ˜ , ϱ 2 ˜ , , ϱ m ˜ ) = p = 1 m ω p ϱ p ˜ = 1 p = 1 m ( 1 ϱ ̲ p μ l ) ω p , 1 p = 1 m ( 1 ϱ ¯ p μ u ) ω p ; p = 1 m ( ϱ ̲ p ν l ) , p = 1 m ( ϱ ¯ p ν u )
where ϱ ̲ p μ l = min ϱ p μ l , ϱ ¯ p μ u = max ϱ p μ u , ϱ ̲ p ν l = min ϱ p ν l and ϱ ¯ p ν u = max ϱ p ν u .
Proof. 
Let ϱ 1 ˜ , ϱ 2 ˜ Ω be two IIHFEs. ω 1 and ω 2 are the assigned weights associated with these two IIHFEs, respectively. Then by Definition 10,
ω 1 ϱ 1 ˜ + ω 2 ϱ 2 ˜ = ω 1 Δ [ ϱ 1 μ l , ϱ 1 μ u ] ; Δ [ ϱ 1 ν l , ϱ 1 ν u ] + ω 2 Δ [ ϱ 2 μ l , ϱ 2 μ u ] ; Δ [ ϱ 2 ν l , ϱ 2 ν u ] = 1 1 min ϱ 1 μ l ω 1 , 1 1 max ϱ 1 μ u ω 1 ; min ϱ 1 ν l ω 1 , max ϱ 1 ν u ω 1 + 1 1 min ϱ 2 μ l ω 2 , 1 1 max ϱ 2 μ u ω 2 ; min ϱ 2 ν l ω 2 , max ϱ 2 ν u ω 2 = 1 1 min ϱ 1 μ l ω 1 1 min ϱ 2 μ l ω 2 , 1 1 max ϱ 1 μ u ω 1 1 max ϱ 2 μ u ω 2 ; min ϱ 1 ν l ω 1 min ϱ 2 ν l ω 2 , max ϱ 1 ν u ω 1 max ϱ 2 ν u ω 2
which shows that the statement assigned in Equation (1) holds for p = 2 .
We now assume that the statement holds for p = t (let t be a natural number less than m), i.e.,
p = 1 t ω p ϱ p ˜ = 1 p = 1 t 1 min ϱ p μ l ω p , 1 p = 1 t 1 max ϱ p μ u ω p ; p = 1 t min ϱ p ν l ω p , p = 1 t max ϱ p ν u ω p
Now, for p = t + 1 ,
p = 1 t + 1 ω p ϱ p ˜ = p = 1 t ω p ϱ p ˜ + ω t + 1 ϱ t + 1 ˜ = 1 p = 1 t 1 min ϱ p μ l ω p , 1 p = 1 t 1 max ϱ p μ u ω p ; p = 1 t min ϱ p ν l ω p , p = 1 t max ϱ p ν u ω p + 1 1 min ϱ ( t + 1 ) μ l ω t + 1 , 1 1 max ϱ ( t + 1 ) μ u ω t + 1 ; min ϱ ( t + 1 ) ν l ω t + 1 , max ϱ ( t + 1 ) ν u ω t + 1 = 1 p = 1 t + 1 1 min ϱ p μ l ω p , 1 p = 1 t + 1 1 max ϱ p μ u ω p ; p = 1 t + 1 min ϱ p ν l ω p , p = 1 t + 1 max ϱ p ν u ω p
Thus, we conclude that the statement holds for all natural numbers m, using the principle of mathematical induction. Consequently, we have
p = 1 m ω p ϱ p ˜ = 1 p = 1 m ( 1 ϱ ̲ p μ l ) ω p , 1 p = 1 m ( 1 ϱ ¯ p μ l ) ω p ; p = 1 m ( ϱ ̲ p ν l ) , p = 1 m ( ϱ ¯ p ν u )
where ϱ ̲ p μ l = min ϱ p μ l , ϱ ¯ p μ u = max ϱ p μ u , ϱ ̲ p ν l = min ϱ p ν l , and ϱ ¯ p ν u = max ϱ p ν u , which completes the proof. □
Consider three IIHFEs ϱ 1 ˜ = [ 0.65 , 0.70 ] ; [ 0.35 , 0.45 ] , [ 0.35 , 0.50 ] , ϱ 2 ˜ = [ 0.40 , 0.50 ] , [ 0.42 , 0.55 ] ; [ 0.25 , 0.30 ] , [ 0.20 , 0.40 ] , and ϱ 3 ˜ = [ 0.35 , 0.40 ] , [ 0.35 , 0.50 ] ; [ 0.50 , 0.60 ] , [ 0.45 , 0.60 ] . Furthermore, we assign three weights ω 1 = 0.4 , ω 2 = 0.2 , and ω 3 = 0.4 corresponding to ϱ 1 ˜ , ϱ 1 ˜ , and ϱ 1 ˜ , respectively. Hence, these three IIHFEs can be aggregated as
ϱ ˜ = ω 1 ϱ 1 ˜ + ω 2 ϱ 2 ˜ + ω 3 ϱ 3 ˜ = 0.4 [ 0.65 , 0.70 ] ; [ 0.35 , 0.45 ] , [ 0.35 , 0.50 ] + 0.2 [ 0.40 , 0.50 ] , [ 0.42 , 0.55 ] ; [ 0.25 , 0.30 ] , [ 0.20 , 0.40 ] + 0.4 [ 0.35 , 0.40 ] , [ 0.35 , 0.50 ] ; [ 0.50 , 0.60 ] , [ 0.45 , 0.60 ] = [ 0.5006 , 0.6009 ] ; [ 0.3460 , 0.5144 ]
Let us suppose that P ˜ , Q ˜ , and R ˜ are three sets of IIHFEs. Furthermore, ϱ a p ˜ P ˜ , ϱ b p ˜ Q ˜ , ϱ p ˜ R ˜ for ( p = 1 , 2 , , m ) . It can be easily verified that the proposed aggregation operator satisfies the following properties:
(i) 
Monotonicity: If ϱ a p ˜ I I H F ϱ b p ˜ , for p = 1 , 2 , , m , then p = 1 m ω p ϱ a p ˜ I I H F p = 1 m ω p ϱ b p ˜ .
(ii) 
Idempotency:  p = 1 m ω p ϱ a p ˜ = I I H F ϱ p ˜ , i f ϱ a p ˜ = I I H F ϱ p ˜ for p = 1 , 2 , , m .
(iii) 
Boundedness:  min 1 p m ϱ p ˜ I I H F p = 1 m ω p ϱ p ˜ I I H F max 1 p m ϱ p ˜ .
In light of Definition 7, we may define a new score function and an accuracy function of the aggregated IIHFEs as follows.
Definition 12.
The score function and accuracy function based on the min-max enclosure operator of the aggregated IIHFEs are defined as
S c I I H F W M E A O p = 1 m ω p ϱ p ˜ = 1 2 2 p = 1 m ( 1 ϱ ̲ p μ l ) ω p + p = 1 m ( 1 ϱ ¯ p μ l ) ω p p = 1 m ( ϱ ̲ p ν l ) + p = 1 m ( ϱ ¯ p ν u )
A c I I H F W M E A O p = 1 m ω p ϱ p ˜ = 1 2 2 p = 1 m ( 1 ϱ ̲ p μ l ) ω p + p = 1 m ( 1 ϱ ¯ p μ l ) ω p + p = 1 m ( ϱ ̲ p ν l ) + p = 1 m ( ϱ ¯ p ν u ) .

4. Matrix Games with IIHFE Payoffs

Suppose two players, viz., X A and X B , are involved in a matrix game. Let us assume that the pure strategies for Player X A are denoted by S I = { α p | p = 1 , 2 , , m } . S I I = { β q | q = 1 , 2 , , n } represents the same for Player X B . Furthermore, assume two sets Y and Z with the representations
Y = { y = ( y 1 , y 2 , y m ) T m + | p = 1 m y p = 1 } and Z = { z = ( z 1 , z 2 , . . . z n ) T n + | q = 1 n z q = 1 } .
Here, Y and Z are considered as the set of mixed strategies for Players X A and X B . m + represents the m-dimensional Euclidean space, while n + denotes n-dimensional Euclidean space. It is customary to assume that Player X A is the maximizing player and Player X B is the minimizing player. In this game, if Player X A chooses pure strategy α p ( S I ) to maximize their gain and simultaneously, Player X B takes β q ( S I I ) as their pure strategy to minimize their loss, then the outcome of the game will be α p , β q = ϱ p q ˜ , the p q t h entry of the payoff matrix Γ ˜ . The payoff matrix Γ ˜ is considered as the outcome of Player X A . ϱ p q ˜ gathers asymmetric information in a possible range of players’ hesitancy in terms of their acceptance and nonacceptance. Hence, ϱ p q ˜ is in the form of an IIHFE, where ϱ p q ˜ = Δ ϱ p q μ l , ϱ p q μ u ; Δ ϱ p q ν l , ϱ p q ν u . Consequently, the payoff matrix can be symbolized as
Γ ˜ = ϱ p q ˜ m × n = Δ ϱ p q μ l , ϱ p q μ u ; Δ ϱ p q ν l , ϱ p q ν u m × n .
Thus, we can express the game with IIHFE payoffs as H ˜ = Y , Z , Γ ˜ .
If Player X A takes y and Player X B takes z as their mixed strategies, then the expected payoff of the maximizing player will be
E ˜ ( y , z ) = y T Γ ˜ z = p = 1 m q = 1 n y p Δ ϱ p q μ l , ϱ p q μ u ; Δ ϱ p q ν l , ϱ p q ν u z q .
Using Theorem 1, the aggregated expected payoff can be obtained as
E ˜ ( y , z ) = 1 p = 1 m q = 1 n 1 ϱ ̲ p q μ l y p z q , 1 p = 1 m q = 1 n 1 ϱ ¯ p q μ u y p z q ; p = 1 m q = 1 n ϱ ̲ p q ν l y p z q , p = 1 m q = 1 n ϱ ¯ p q ν u y p z q .
Motivated by the work of Li [6], we may conceptualize the solution of the matrix game with payoffs of IIHFEs as follows.
Definition 13.
Suppose η ˜ ^ and ζ ˜ ^ are two IIHFEs. If there are some y ^ Y and z ^ Z such that for any other y Y and z Z they satisfy the requirements y ^ T Γ ˜ z I I H F η ˜ ^ and y T Γ ˜ z ^ I I H F ζ ˜ ^ , then ( y ^ , z ^ , η ˜ ^ , ζ ˜ ^ ) is said to be the reasonable solution of the matrix game H ˜ with payoffs of IIHFEs.
Here, y ^ , and z ^ are termed as the reasonable strategies for Player X A and Player X B , respectively, whereas η ˜ ^ and ζ ˜ ^ are said to be the reasonable values of the players.
Definition 14.
Let us consider two sets, V A and V B , as the collection of all reasonable solutions of Player X A and Player X B , respectively. Suppose η ˜ * and ζ ˜ * are two IIHFEs such that η ˜ * V A and ζ ˜ * V B . If there exist no such η ˜ ^ a n d ζ ˜ ^ satisfying η ˜ ^ I I H F η ˜ * and ζ ˜ ^ I I H F ζ ˜ * , then the set ( y * , z * , η ˜ * , ζ ˜ * ) is called the optimal solution of the matrix game H ˜ .
The strategy y * is called the maximin strategy for Player X A , and similarly, z * is termed as the minimax strategy for Player X B . Furthermore, these η ˜ * and ζ ˜ * are called the values of the game for Players X A and X B , respectively.
Let Player X B choose a pure strategy β q and Player X A pick up the mixed strategy y Y , then Player X A ’s expected payoff reduces to
E ˜ q = 1 p = 1 m 1 ϱ ̲ p q μ l y p , 1 p = 1 m 1 ϱ ¯ p q μ u y p ; p = 1 m ϱ ̲ p q ν l y p , p = 1 m ϱ ¯ p q ν u y p .
The minimum of E ˜ q is calculated as
Φ ˜ = ϕ μ l , ϕ μ u + ; ϕ ν l , ϕ ν u + = min q 1 p = 1 m 1 ϱ ̲ p q μ l y p , 1 p = 1 m 1 ϱ ¯ p q μ u y p ; max q p = 1 m ϱ ̲ p q ν l y p , p = 1 m ϱ ¯ p q ν u y p .
From the aforementioned expression, it is seen that Φ ˜ is a function of y . Now Player X A should opt y * Y to maximize this Φ ˜ , i.e., to obtain
Φ ˜ * = Φ ˜ ( y * ) = ϕ μ * l , ϕ μ * u + ; ϕ ν * l , ϕ ν * u + = max y Y min q 1 p = 1 m 1 ϱ ̲ p q μ l y p , 1 p = 1 m 1 ϱ ¯ p q μ u y p ; min y Y max q p = 1 m ϱ ̲ p q ν l y p , p = 1 m ϱ ¯ p q ν u y p .
By the knowledge of the definition of IIHFE (4) and its mathematical operations (5), we can say that Φ ˜ * is an IIHFE. Such y * is termed as the maximin strategy for Player X A and Φ ˜ * is said to be the gain floor for Player X A .
Similarly, if Player X A takes pure strategy α p and Player X B chooses z Z as a mixed strategy, then Player X B ’s expected payoff is transformed into
E ˜ p = 1 q = 1 n 1 ϱ ̲ p q μ l z q , 1 q = 1 n 1 ϱ ¯ p q μ u z q ; q = 1 n ϱ ̲ p q ν l z q , q = 1 n ϱ ¯ p q ν u z q .
The maximum of E ˜ p is calculated as
Ψ ˜ = ψ μ l , ψ μ u + ; ψ ν l , ψ ν u + = max p 1 q = 1 n 1 ϱ ̲ p q μ l z q , 1 q = 1 n 1 ϱ ¯ p q μ u z q ; min p q = 1 n ϱ ̲ p q ν l z q , q = 1 n ϱ ¯ p q ν u z q .
Obviously, the function Ψ ˜ depends only on z . In this scenario, Player X B should choose z * Z to minimize this Ψ ˜ , i.e., to obtain
Ψ ˜ * = Ψ ˜ ( z * ) = ψ μ * l , ψ μ * u + ; ψ ν * l , ψ ν * u + = min z Z max p 1 q = 1 n 1 ϱ ̲ p q μ l z q , 1 q = 1 n 1 ϱ ¯ p q μ u z q ; max z Z min p q = 1 n ϱ ̲ p q ν l z q , q = 1 n ϱ ¯ p q ν u z q .
Clearly, Ψ ˜ * is an IIHFE. This z * is termed as the minimax strategy for Player X B , and Ψ ˜ * is said to be the loss ceiling for Player X B .
Theorem 2.
If Φ ˜ * is the gain of Player X A and Ψ ˜ * is the loss of Player X B , then Φ ˜ * I I H F Ψ ˜ * .
Proof. 
It is obvious that max q p = 1 m y p ln 1 ϱ ̲ p q μ l p = 1 m y p ln 1 ϱ ̲ p q μ l .
This implies
max q p = 1 m y p ln 1 ϱ ̲ p q μ l q = 1 n p = 1 m y p ln 1 ϱ ̲ p q μ l z q [ a s , z q 0 q , q = 1 n z q = 1 ] i.e. , max q p = 1 m y p ln 1 ϱ ̲ p q μ l p = 1 m q = 1 n y p z q ln 1 ϱ ̲ p q μ l .
Furthermore, we have q = 1 n z q ln 1 ϱ ̲ p q μ l min p q = 1 n z q ln 1 ϱ ̲ p q μ l .
This implies
p = 1 m q = 1 n z q ln 1 ϱ ̲ p q μ l y p min p q = 1 n z q ln 1 ϱ ̲ p q μ l [ a s , y p 0 p , p = 1 m y p = 1 ] i.e. , p = 1 m q = 1 n y p z q ln 1 ϱ ̲ p q μ l min p q = 1 n z q ln 1 ϱ ̲ p q μ l .
Combining Equations (8) and (9), we have
max q p = 1 m y p ln 1 ϱ ̲ p q μ l p = 1 m q = 1 n y p z q ln 1 ϱ ̲ p q μ l min p q = 1 n z q ln 1 ϱ ̲ p q μ l i.e. , max q p = 1 m y p ln 1 ϱ ̲ p q μ l min p q = 1 n z q ln 1 ϱ ̲ p q μ l i.e. , max q p = 1 m 1 ϱ ̲ p q μ l y p min p q = 1 n 1 ϱ ̲ p q μ l z q Hence , min y Y max q p = 1 m 1 ϱ ̲ p q μ l y p max z Z min p q = 1 n 1 ϱ ̲ p q μ l z q . Thus , max y Y min q 1 p = 1 m 1 ϱ ̲ p q μ l y p min z Z max p 1 q = 1 n 1 ϱ ̲ p q μ l z q .
Similarly, we can show that
max y Y min q 1 p = 1 m 1 ϱ ¯ p q μ u y p min z Z max p 1 q = 1 n 1 ϱ ¯ p q μ u z q . Again , max q p = 1 m y p ln ϱ ̲ p q ν l p = 1 m y p ln ϱ ̲ p q ν l
implies
max q p = 1 m y p ln ϱ ̲ p q ν l q = 1 n p = 1 m y p ln ϱ ̲ p q ν l z q [ a s , z q 0 q , q = 1 n z q = 1 ] i.e. , max q p = 1 m y p ln ϱ ̲ p q ν l p = 1 m q = 1 n y p z q ln ϱ ̲ p q ν l . Furthermore , q = 1 n z q ln ϱ ̲ p q ν l min p q = 1 n z q ln ϱ ̲ p q ν l
implies
p = 1 m q = 1 n z q ln ϱ ̲ p q ν l y p min p q = 1 n z q ln ϱ ̲ p q ν l [ a s , y p 0 p , p = 1 m y p = 1 ] i.e. , p = 1 m q = 1 n y p z q ln ϱ ̲ p q ν l min p q = 1 n z q ln ϱ ̲ p q ν l .
Combining Equations (12) and (13), we have
max q p = 1 m y p ln ϱ ̲ p q ν l p = 1 m q = 1 n y p z q ln ϱ ̲ p q ν l min p q = 1 n z q ln ϱ ̲ p q ν l i.e. , max q p = 1 m y p ln ϱ ̲ p q ν l min p q = 1 n z q ln ϱ ̲ p q ν l i.e. , max q p = 1 m ϱ ̲ p q ν l y p min p q = 1 n ϱ ̲ p q ν l z q . Hence , min z Z max q p = 1 m ϱ ̲ p q ν l y p max z Z min p q = 1 n ϱ ̲ p q ν l z q .
By an similar argument, we show the following:
min z Z max q p = 1 m ϱ ¯ p q ν u y p max z Z min p q = 1 n ϱ ¯ p q ν u z q
Thus, from Equations (10), (11), (14), and (15), we may write
{ 1 2 max y Y min q 1 p = 1 m 1 ϱ ̲ p q μ l y p + max y Y min q 1 p = 1 m 1 ϱ ¯ p q μ u y p 1 2 min y Y max q p = 1 m ϱ ̲ p q ν l y p + min y Y max q p = 1 m ϱ ¯ p q ν u y p } { 1 2 min z Z max p 1 q = 1 n 1 ϱ ̲ p q μ l z q + min z Z max p 1 q = 1 n 1 ϱ ¯ p q μ u z q 1 2 max z Z min p q = 1 n ϱ ̲ p q ν l z q + max z Z min p q = 1 n ϱ ¯ p q ν u z q } .
This relation implies S c I I H F W M E A O ( Φ ˜ * ) S c I I H F W M E A O ( Ψ ˜ * ) (by Definition 12). Thus, by the ranking property of IIHFEs, we have Φ ˜ * I I H F Ψ ˜ * , which completes the theorem. □
Now, according to Equation (5) and Definitions 13 and 14, to obtain the maximin strategy y * and the gain floor Φ ˜ * , we have to solve the following bi-objective interval-valued intuitionistic hesitant fuzzy programming model (BOIIHFPM):
max ϕ μ l , ϕ μ u + , min ϕ ν l , ϕ ν u + subject to 1 p = 1 m 1 ϱ ̲ p q μ l y p , 1 p = 1 m 1 ϱ ¯ p q μ u y p I I H F ϕ μ l , ϕ μ u + ( q = 1 , 2 , , n ) p = 1 m ϱ ̲ p q ν l y p , p = 1 m ϱ ¯ p q ν l y p I I H F ϕ ν l , ϕ ν u + ( q = 1 , 2 , , n ) 0 ϕ μ l , ϕ μ u + , ϕ ν l , ϕ ν u + 1 p = 1 m y p = 1 , y p 0 ( p = 1 , 2 , , m ) .
Again, according to Equation (7) and Definitions 13 and 14, to calculate the minimax strategy z * and the loss ceiling Ψ ˜ * for Player X B , we have to solve the following BOIIHFPM:
min ψ μ l , ψ μ u + , max ψ ν l , ψ ν u + subject to 1 q = 1 n 1 ϱ ̲ p q μ l z q , 1 q = 1 n 1 ϱ ¯ p q μ u z q I I H F ψ μ l , ψ μ u + ( p = 1 , 2 , , m ) q = 1 n ϱ ̲ p q ν l z q , q = 1 n ϱ ¯ p q ν u z q I I H F ψ ν l , ψ ν u + ( p = 1 , 2 , , m ) 0 ψ μ l , ψ μ u + , ψ ν l , ψ ν u + 1 q = 1 n z q = 1 , z q 0 ( q = 1 , 2 , , n ) .
It is not a facile task to evaluate the optimal solutions of the BOIIHFPMs, as depicted in Problems (16) and (17). Thus, we have to find a way out so that it becomes easier to calculate the expected result of the problem. Keeping all these in mind, we extend the methodology proposed by Li [6] for intuitionistic payoffs in hesitant fuzzy scenarios.
For 0 ϕ μ l , ϕ μ u + 1 , it is clear that ( max { [ ϕ μ l , ϕ μ u + ] } ) is equivalent to ( min { [ 1 ϕ μ u + , 1 ϕ μ l ] } ) . Thus, by the weighted average method, the objective function of Problem (16) transforms into ( min { τ [ 1 ϕ μ u + , 1 ϕ μ l ] + ( 1 τ ) [ ϕ ν l , ϕ ν u + ] } ) . As each interval assigned here is some IIHFE, this addition must follow the rule of addition of IIHFEs (as defined by Chen and Xu [41]). Hence, the objective function will be
min 1 ϕ μ u + τ ϕ ν l 1 τ , 1 ϕ μ l τ ϕ ν u + 1 τ
where τ is a weight, which takes values from [ 0 , 1 ] . This τ stands for the perception parameters of the player’s choice, which is completely assigned by the players.
Again, [ 1 p = 1 m ( 1 ϱ ̲ p q μ l ) y p , 1 p = 1 m ( 1 ϱ ¯ p q μ u ) y p ] I I H F [ ϕ μ l , ϕ μ u + ] implies [ p = 1 m ( 1 ϱ ¯ p q μ u ) y p , p = 1 m ( 1 ϱ ̲ p q μ l ) y p ] I I H F [ 1 ϕ μ u + , 1 ϕ μ l ] for q = 1 , 2 , , n , as 0 1 p = 1 m ( 1 ϱ ̲ p q μ l ) y p , 1 p = 1 m ( 1 ϱ ¯ p q μ u ) y p , ϕ μ l , ϕ μ u + 1 . Furthermore, we have [ p = 1 m ( ϱ ̲ p q ν l ) y p , p = 1 m ( ϱ ¯ p q ν u ) y p ] I I H F [ ϕ ν l , ϕ ν u + ] for q = 1 , 2 , , n . Thus, utilizing the weights, we can aggregate the constraints of Problem (16) as
τ p = 1 m 1 ϱ ¯ p q μ u y p , p = 1 m 1 ϱ ̲ p q μ l y p + ( 1 τ ) p = 1 m ϱ ̲ p q ν l y p , p = 1 m ϱ ¯ p q ν u y p I I H F τ 1 ϕ μ u + , 1 ϕ μ l + ( 1 τ ) ϕ ν l , ϕ ν u + , q = 1 , 2 , , n .
Upon calculation, this gives
1 p = 1 m 1 ϱ ¯ p q μ u τ y p 1 p = 1 m ϱ ̲ p q ν l y p 1 τ , 1 p = 1 m 1 ϱ ̲ p q μ l τ y p 1 p = 1 m ϱ ¯ p q ν u y p 1 τ 1 ϕ μ u + τ ϕ ν l 1 τ , 1 ϕ μ l τ ϕ ν u + 1 τ , q = 1 , 2 , , n .
From this, we can say that
1 p = 1 m 1 ϱ ¯ p q μ u τ y p 1 p = 1 m ϱ ̲ p q ν l y p 1 τ 1 ϕ μ u + τ ϕ ν l 1 τ ( q = 1 , 2 , , n ) 1 p = 1 m 1 ϱ ̲ p q μ l τ y p 1 p = 1 m ϱ ¯ p q ν u y p 1 τ 1 ϕ μ l τ ϕ ν u + 1 τ ( q = 1 , 2 , , n ) 0 ϕ μ l , ϕ μ u + , ϕ ν l , ϕ ν u + 1 p = 1 m y p = 1 , y p 0 ( p = 1 , 2 , , m ) .
Combining the objective function (18) with the constraint (19), Problem (16) may be transformed into the following interval-valued mathematical programming problem:
min 1 ϕ μ u + τ ϕ ν l 1 τ , 1 ϕ μ l τ ϕ ν u + 1 τ subject to 1 p = 1 m 1 ϱ ¯ p q μ u τ y p 1 p = 1 m ϱ ̲ p q ν l y p 1 τ 1 ϕ μ u + τ ϕ ν l 1 τ ( q = 1 , 2 , , n ) 1 p = 1 m 1 ϱ ̲ p q μ l τ y p 1 p = 1 m ϱ ¯ p q ν u y p 1 τ 1 ϕ μ l τ ϕ ν u + 1 τ ( q = 1 , 2 , , n ) 0 ϕ μ l , ϕ μ u + , ϕ ν l , ϕ ν u + 1 p = 1 m y p = 1 , y p 0 ( p = 1 , 2 , , m ) .
Let us take 1 ( ϕ μ u + ) τ ( ϕ ν l ) 1 τ = ϕ l and 1 ( ϕ μ l ) τ ( ϕ ν u + ) 1 τ = ϕ u . Clearly, ϕ l , ϕ u 0 . Then, rewriting Problem (20), we have
min ϕ l , ϕ u subject to 1 p = 1 m 1 ϱ ¯ p q μ u τ y p 1 p = 1 m ϱ ̲ p q ν l y p 1 τ ϕ l ( q = 1 , 2 , , n ) 1 p = 1 m 1 ϱ ̲ p q μ l τ y p 1 p = 1 m ϱ ¯ p q ν u y p 1 τ ϕ u ( q = 1 , 2 , , n ) 0 ϕ l , ϕ u 1 p = 1 m y p = 1 , y p 0 ( p = 1 , 2 , , m ) .
Clearly, Problem (21) is a nonlinear programming problem having an interval objective function. According to Ishibuchi and Tanaka [43], the objective function of the aforementioned problem can be resolved as
min ϕ u , min ϕ l + ϕ u 2 .
For the sake of the computation of Problem (22), we make use of the following lemma.
Lemma 1
([6]). Assume that D is the set of constraints, and d 1 , d 2 D . Then the following equalities are valid:
min d 1 + d 2 D { d 1 + d 2 } = min d 1 D { d 1 } + min d 2 D { d 2 }
a n d ,   max d 1 + d 2 D { d 1 + d 2 } = max d 1 D { d 1 } + max d 2 D { d 2 } .
Using Equation (23) of Lemma 1, we may say that the objective function (22) is equivalent to the following:
min ϕ u , min ϕ l 2 + min ϕ u 2
which is equivalent to
min ϕ l , min ϕ u .
Thus, utilizing the objective function (26), Problem (21) can be rewritten as
min ϕ l , min ϕ u subject to 1 p = 1 m 1 ϱ ¯ p q μ u τ y p 1 p = 1 m ϱ ̲ p q ν l y p 1 τ ϕ l ( q = 1 , 2 , , n ) 1 p = 1 m 1 ϱ ̲ p q μ l τ y p 1 p = 1 m ϱ ¯ p q ν u y p 1 τ ϕ u ( q = 1 , 2 , , n ) 0 ϕ l , ϕ u 1 p = 1 m y p = 1 , y p 0 ( p = 1 , 2 , , m ) .
Motivated by the work of Li [6], we can aggregate this problem as follows:
min ϕ l + ϕ u 2 subject to 1 2 [ 1 p = 1 m 1 ϱ ¯ p q μ u τ y p 1 p = 1 m ϱ ̲ p q ν l y p 1 τ + 1 p = 1 m 1 ϱ ̲ p q μ l τ y p 1 p = 1 m ϱ ¯ p q ν u y p 1 τ ] ϕ l + ϕ u 2 ( q = 1 , 2 , , n ) 0 ϕ l , ϕ u 1 p = 1 m y p = 1 , y p 0 ( p = 1 , 2 , , m ) .
Substituting ϕ in place of ϕ l + ϕ u 2 in Problem (28), we obtain
min ϕ subject to 1 2 [ 2 p = 1 m 1 ϱ ¯ p q μ u τ y p 1 p = 1 m ϱ ̲ p q ν l y p 1 τ p = 1 m 1 ϱ ̲ p q μ l τ y p 1 p = 1 m ϱ ¯ p q ν u y p 1 τ ] ϕ ( q = 1 , 2 , , n ) 0 ϕ 1 p = 1 m y p = 1 , y p 0 ( p = 1 , 2 , , m ) .
Now, by solving the NLPP (29), we find out the maximin strategy y * and the crisp equivalent ϕ * of Φ ˜ * for the maximizing Player X A .
Next, we consider the BOIIHFPM (17). As 0 ψ μ l , ψ μ u + 1 , so we may say that ( min { [ ψ μ l , ψ μ u + ] } ) is equivalent to ( max { [ 1 ψ μ u + , 1 ψ μ l ] } ) . Hence by the weighted average method, the objective function of the fuzzy programming problem (17) can be transformed into
max 1 ψ μ u + τ ψ ν l 1 τ , 1 ψ μ l τ ψ ν u + 1 τ
Again, [ 1 q = 1 n ( 1 ϱ ̲ p q μ l ) z q , 1 q = 1 n ( 1 ϱ ¯ p q μ u ) z q ] I I H F [ ψ μ l , ψ μ u + ] implies [ q = 1 n ( 1 ϱ ¯ p q μ u ) z q , q = 1 n ( 1 ϱ ̲ p q μ l ) z q ] I I H F [ 1 ψ μ u + , 1 ψ μ l ] for p = 1 , 2 , , m , as 0 1 q = 1 n ( 1 ϱ ̲ p q μ l ) z q , 1 q = 1 n ( 1 ϱ ¯ p q μ u ) z q , ψ μ l , ψ μ u + 1 . Furthermore, here we have [ q = 1 n ( ϱ ̲ p q ν l ) z q , q = 1 n ( ϱ ¯ p q ν u ) z q ] I I H F [ ψ ν l , ψ ν u + ] for p = 1 , 2 , , m . Thus, utilizing the weights, we can aggregate the constraints of Problem (17) as
τ q = 1 n 1 ϱ ¯ p q μ u z q , q = 1 n 1 ϱ ̲ p q μ l z q + ( 1 τ ) q = 1 n ϱ ̲ p q ν l z q , q = 1 n ϱ ¯ p q ν u z q I I H F τ 1 ψ μ u + , 1 ψ μ l + ( 1 τ ) ψ ν l , ψ ν u + , p = 1 , 2 , , m .
After simplification, we have
1 q = 1 n 1 ϱ ¯ p q μ u τ z q 1 q = 1 n ϱ ̲ p q ν l z q 1 τ , 1 q = 1 n 1 ϱ ̲ p q μ l τ z q 1 q = 1 n ϱ ¯ p q ν u z q 1 τ 1 ψ μ u + τ ψ ν l 1 τ , 1 ψ μ l τ ψ ν u + 1 τ , p = 1 , 2 , , m .
From this, we can say
1 q = 1 n 1 ϱ ¯ p q μ u τ z q 1 q = 1 n ϱ ̲ p q ν l z q 1 τ 1 ψ μ u + τ ψ ν l 1 τ ( p = 1 , 2 , , m ) 1 q = 1 n 1 ϱ ̲ p q μ l τ z q 1 q = 1 n ϱ ¯ p q ν u z q 1 τ 1 ψ μ l τ ψ ν u + 1 τ ( p = 1 , 2 , , m ) 0 ψ μ l , ψ μ u + , ψ ν l , ψ ν u + 1 q = 1 n z q = 1 , z q 0 ( q = 1 , 2 , , n ) .
Thus, combining the objective function, depicted in Equation (30), with the constraints given in (31), Problem (17) can be transformed into Problem (32) as
max 1 ψ μ u + τ ψ ν l 1 τ , 1 ψ μ l τ ψ ν u + 1 τ subject to 1 q = 1 n 1 ϱ ¯ p q μ u τ z q 1 q = 1 n ϱ ̲ p q ν l z q 1 τ 1 ψ μ u + τ ψ ν l 1 τ ( p = 1 , 2 , , m ) 1 q = 1 n 1 ϱ ̲ p q μ l τ z q 1 q = 1 n ϱ ¯ p q ν u z q 1 τ 1 ψ μ l τ ψ ν u + 1 τ ( p = 1 , 2 , , m ) 0 ψ μ l , ψ μ u + , ψ ν l , ψ ν u + 1 q = 1 n z q = 1 , z q 0 ( q = 1 , 2 , , n ) .
Let us denote 1 ( ψ μ u + ) τ ( ψ ν l ) 1 τ as ψ l and 1 ( ψ μ l ) τ ( ψ ν u + ) 1 τ as ψ u , respectively. It is clear that 0 ψ l , ψ u 1 . Thus, rewriting Problem (32), we have
max ψ l , ψ u subject to 1 q = 1 n 1 ϱ ¯ p q μ u τ z q 1 q = 1 n ϱ ̲ p q ν l z q 1 τ ψ l ( p = 1 , 2 , , m ) 1 q = 1 n 1 ϱ ̲ p q μ l τ z q 1 q = 1 n ϱ ¯ p q ν u z q 1 τ ψ u ( p = 1 , 2 , , m ) 0 ψ l , ψ u 1 q = 1 n z q = 1 , z q 0 ( q = 1 , 2 , , n ) .
Problem (33) is a nonlinear programming problem having an interval-valued objective function. By a similar argument of the maximization Problem (21), the objective function of (33) can be written as
max ψ l , max ψ l + ψ u 2 .
Utilizing Equation (24) of Lemma 1, the objective function (34) can be rewritten as
max ψ l , max ψ l 2 + max ψ u 2
which is also equivalent to
max ψ l , max ψ u .
Thus, utilizing the objective function (36), Problem (33) can be rewritten as
max ψ l , max ψ u subject to 1 q = 1 n 1 ϱ ¯ p q μ u τ z q 1 q = 1 n ϱ ̲ p q ν l z q 1 τ ψ l ( p = 1 , 2 , , m ) 1 q = 1 n 1 ϱ ̲ p q μ l τ z q 1 q = 1 n ϱ ¯ p q ν u z q 1 τ ψ u ( p = 1 , 2 , , m ) 0 ψ l , ψ u 1 q = 1 n z q = 1 , z q 0 ( q = 1 , 2 , , n ) .
This is also a bi-objective programming problem, which can be aggregated as
max ψ l + ψ u 2 subject to 1 2 [ 1 q = 1 n 1 ϱ ¯ p q μ u τ z q 1 q = 1 n ϱ ̲ p q ν l z q 1 τ + 1 q = 1 n 1 ϱ ̲ p q μ l τ z q 1 q = 1 n ϱ ¯ p q ν u z q 1 τ ] ψ l + ψ u 2 ( p = 1 , 2 , , m ) 0 ψ l , ψ u 1 q = 1 n z q = 1 , z q 0 ( q = 1 , 2 , , n ) .
Taking ψ in place of ψ l + ψ u 2 in Problem (38), we obtain
max ψ subject to 1 2 [ 2 q = 1 n 1 ϱ ¯ p q μ u τ z q 1 q = 1 n ϱ ̲ p q ν l z q 1 τ q = 1 n 1 ϱ ̲ p q μ l τ z q 1 q = 1 n ϱ ¯ p q ν u z q 1 τ ] ψ ( p = 1 , 2 , , m ) 0 ψ 1 q = 1 n z q = 1 , z q 0 ( q = 1 , 2 , , n ) .
Solving Problem (39), we can derive the minimax strategy z * and the crisp equivalent ψ * of Ψ ˜ * for the minimizing Player X B . .
These solutions ( y * , ϕ * ) and ( z * , ψ * ) are called the optimal solutions of the NLPPs (29) and (39), respectively.
In order to make the solution of the matrix games with payoffs of IIHFEs, we converted the BOIIHFPMs into two NLPPs, utilizing the mathematical operations of IIHFEs. Here an inevitable question arises as to the acceptability of the optimal values, obtained by solving these two NLPPs for the proposed problem. The following theorem is stated to answer such a query.
Theorem 3.
( y * , Φ ˜ * ) and ( z * , Ψ ˜ * ) are the noninferior solutions of the interval-valued intuitionistic hesitant fuzzy programming problems (16) and (17), respectively, for 0 τ 1 , if ( y * , ϕ * ) and ( z * , ψ * ) are the optimal solutions of the NLPPs (29) and (39), respectively, where Φ ˜ * = [ ϕ μ * l , ϕ μ * u + ] ; [ ϕ ν * l , ϕ ν * u + ] and Ψ ˜ * = [ ψ μ * l , ψ μ * u + ] ; [ ψ ν * l , ψ ν * u + ] , satisfying the following relations:
ϕ * = 1 2 [ 2 ( ϕ μ * u + ) τ ( ϕ ν * l ) 1 τ ( ϕ μ * l ) τ ( ϕ ν * u + ) 1 τ ] , a n d ψ * = 1 2 [ 2 ( ψ μ * u + ) τ ( ψ ν * l ) 1 τ ( ψ μ * l ) τ ( ψ ν * u + ) 1 τ ] .
Proof. 
Let us assume that ( y * , Φ ˜ * ) (16). Then there must exist a feasible solution ( y ^ , Φ ˜ ^ ) , where y ^ Y and Φ ˜ ^ = [ ϕ ^ μ l , ϕ ^ μ u + ] ; [ ϕ ^ ν l , ϕ ^ ν u + ] , such that
1 p = 1 m 1 ϱ ̲ p q μ l y ^ p ϕ ^ μ l ; 1 p = 1 m 1 ϱ ¯ p q μ u y ^ p ϕ ^ μ u + , ( q = 1 , 2 , , n ) p = 1 m ϱ ̲ p q ν l y ^ p ϕ ^ ν l ; p = 1 m ϱ ¯ p q ν u y ^ p ϕ ^ ν u + , ( q = 1 , 2 , , n ) 0 ϕ ^ μ l , ϕ ^ μ u + , ϕ ^ ν l , ϕ ^ ν u + 1 p = 1 m y ^ p = 1 , y ^ p 0 ( p = 1 , 2 , , m ) .
Furthermore,
ϕ ^ μ l ϕ μ * l , ϕ ^ μ u + ϕ μ * u + , ϕ ^ ν l ϕ ν * l , ϕ ^ ν u + ϕ ν * u + .
As 0 τ 1 , so from Problem (40), it is derived that
1 2 2 p = 1 m 1 ϱ ¯ p q μ u τ y ^ p 1 p = 1 m ϱ ̲ p q ν l y ^ p 1 τ p = 1 m 1 ϱ ̲ p q μ l τ y ^ p 1 p = 1 m ϱ ¯ p q ν u y ^ p 1 τ 1 2 2 ϕ ^ μ u + τ ϕ ^ ν l 1 τ ϕ ^ μ l τ ϕ ^ ν u + 1 τ , ( q = 1 , 2 , , n ) 0 ϕ ^ μ l , ϕ ^ μ u + , ϕ ^ ν l , ϕ ^ ν u + 1 p = 1 m y ^ p = 1 , y ^ p 0 ( p = 1 , 2 , , m ) .
and
1 2 2 ϕ μ * u + τ ϕ ν * l 1 τ ϕ μ * l τ ϕ ν * u + 1 τ < 1 2 2 ϕ ^ μ u + τ ϕ ^ ν l 1 τ ϕ ^ μ l τ ϕ ^ ν u + 1 τ .
Let us take ϕ ^ = 1 2 [ 2 ( ϕ ^ μ u + ) τ ( ϕ ^ ν l ) 1 τ ( ϕ ^ μ l ) τ ( ϕ ^ ν u + ) 1 τ ] . Thus, Problem (42) can be written as
1 2 2 p = 1 m 1 ϱ ¯ p q μ u τ y ^ p 1 p = 1 m ϱ ̲ p q ν l y ^ p 1 τ p = 1 m 1 ϱ ̲ p q μ l τ y ^ p 1 p = 1 m ϱ ¯ p q ν u y ^ p 1 τ ϕ ^ , ( q = 1 , 2 , , n ) 0 ϕ ^ μ l , ϕ ^ μ u + , ϕ ^ ν l , ϕ ^ ν u + 1 p = 1 m y ^ p = 1 , y ^ p 0 ( p = 1 , 2 , , m ) .
Now, Problem (40) shows that ( y ^ , ϕ ^ ) is a feasible solution of Problem (29). Furthermore, from Equation (41), we have ϕ ^ < ϕ * , which makes a contradiction to the fact that ( y * , ϕ * ) is the optimal solution of (29). Thus, our assumption was wrong and thereafter, we may conclude that if ( y * , ϕ * ) is the optimal solution of the NLPP (29), then ( y * , Φ ˜ * ) is the noninferior solution of the interval-valued hesitant fuzzy programming problem (16) for 0 τ 1 .
Similarly, assume that ( z * , Ψ ˜ * ) is not a noninferior solution of the BOIIHFPM (17). Then there exists a feasible solution ( z ^ , Ψ ˜ ^ ) , where z ^ Z and Ψ ˜ ^ = [ ψ ^ μ l , ψ ^ μ u + ] ; [ ψ ^ ν l , ψ ^ ν u + ] , such that
1 q = 1 n 1 ϱ ̲ p q μ l z ^ q ψ ^ μ l ; 1 q = 1 n 1 ϱ ¯ p q μ u z ^ q ψ ^ μ u + , ( p = 1 , 2 , , m ) q = 1 n ϱ ̲ p q ν l z ^ q ψ ^ ν l ; q = 1 n ϱ ¯ p q ν u z ^ q ψ ^ ν u + , ( p = 1 , 2 , , m ) 0 ψ ^ μ l , ψ ^ μ u + , ψ ^ ν l , ψ ^ ν u + 1 q = 1 n z ^ q = 1 , z ^ q 0 ( q = 1 , 2 , , n ) .
Furthermore,
ψ ^ μ l ϕ μ * l , ψ ^ μ u + ϕ μ * u + , ψ ^ ν l ϕ ν * l , ψ ^ ν u + ϕ ν * u + .
Since 0 τ 1 , from Problem (45), it is therefore derived that
1 2 2 q = 1 n 1 ϱ ¯ p q μ u τ z ^ q 1 q = 1 n ϱ ̲ p q ν l z ^ q 1 τ q = 1 n 1 ϱ ̲ p q μ l τ z ^ q 1 q = 1 n ϱ ¯ p q ν u z ^ q 1 τ 1 2 2 ψ ^ μ u + τ ψ ^ ν l 1 τ ψ ^ μ l τ ψ ^ ν u + 1 τ , ( p = 1 , 2 , , m ) 0 ψ ^ μ l , ψ ^ μ u + , ψ ^ ν l , ψ ^ ν u + 1 q = 1 n z ^ q = 1 , z ^ q 0 ( q = 1 , 2 , , n ) .
and
1 2 2 ψ μ * u + τ ψ ν * l 1 τ ψ μ * l τ ψ ν * u + 1 τ > 1 2 2 ψ ^ μ u + τ ψ ^ ν l 1 τ ψ ^ μ l τ ψ ^ ν u + 1 τ .
Let us take ψ ^ = 1 2 [ 2 ( ψ ^ μ u + ) τ ( ψ ^ ν l ) 1 τ ( ψ ^ μ l ) τ ( ψ ^ ν u + ) 1 τ ] . Thus, Problem (47) can be written as
1 2 2 q = 1 n 1 ϱ ¯ p q μ u τ z ^ q 1 q = 1 n ϱ ̲ p q ν l z ^ q 1 τ q = 1 n 1 ϱ ̲ p q μ l τ z ^ q 1 q = 1 n ϱ ¯ p q ν u z ^ q 1 τ ψ ^ , ( p = 1 , 2 , , m ) 0 ψ ^ μ l , ψ ^ μ u + , ψ ^ ν l , ψ ^ ν u + 1 q = 1 n z ^ q = 1 , z ^ q 0 ( q = 1 , 2 , , n ) .
Hence, we can infer that ( z ^ , ψ ^ ) is a feasible solution of Problem (39). Furthermore, from Equation (46), we have ψ ^ < ψ * , which contradicts the fact that ( z * , ψ * ) is the optimal solution of Problem (39). Thus, our assumption is wrong, and hence, we may conclude that if ( z * , ψ * ) is the optimal solution of the NLPP (39), then ( z * , Ψ ˜ * ) is the noninferior solution of the interval-valued hesitant fuzzy programming problem (17) for 0 τ 1 .
Now, we can summarize the rendered methodology for solving matrix games with payoffs of IIHFEs in the form of a solution algorithm in the subsequent subsection.

Algorithm

Step 1:
Consider a matrix game Γ ˜ whose payoffs are taken as IIHFEs, say, ϱ ˜ p q , where p = 1 , 2 , , m and q = 1 , 2 , , n .
Step 2:
To solve the game, we have to derive two BOIIHFPMs, as depicted in Problems (16) and (17).
Step 3:
To handle the situation, the fuzzy programming problems are converted into two nonlinear programming Problems (29) and (39), respectively, by using the mathematical operations of IIHFEs.
Step 4:
To obtain the optimal strategies y * for Player X A and z * for Player X B , the NLPPs (29) and (39) are solved using WOLFRAM MATHEMATICA 9.0 software.
Step 5:
Utilizing the optimal strategies y * and z * in Equation (4), we can find the aggregated expected payoff of Player X A .
To justify the proposed methodology we present the subsequent section.

5. Numerical Application

In reality, decision makers (DMs) have to rely on different sources of information. In most cases, DMs collect secondary data. So, DMs have to face several ambiguities about the accuracy of the information. In addition, occasionally DMs are provided with various asymmetric information in terms of some possible intervals. An IIHFE is the appropriate tool to assess these types of data sets. To validate the proposed methodology, this section discusses a real-life problem.

Application to Preventing Cybercrime

Nowadays, fraudulent email, theft of financial and corporate data, cyber-extortion, etc., are familiar words to everyone. These all are included in cybercrime. Cybercrime represents criminal activities that always target a networked device to hack information. In most cases, it is carried out by some well-managed organizations. They use highly advanced technologies to damage the network. According to the report of the NCRB [44], in the first half of the year 2020 only, almost 4.83 million cyber-attacks were reported globally. That means the number stands at 18 per minute. In India alone, the report of cybercrime in 2020 is nine times of the total from 2013. So, it has become a heightened threat to the safety of the citizen’s life. Figure 1 depicts the state-wise reported number of cybercrimes in the last three years in India.
Here, both the hackers and the defenders act intelligently and anticipate every move of the opponent. We can portray such a relationship of the hackers and the defenders in the context of the theory of matrix games. Suppose the defenders are chosen as Player X A and the hackers are chosen as Player X B . The aim of the defenders, i.e., Player X A , is to maximize the protection of all kinds of networked devices. For that they take two strategies:
α 1 :
Installing a powerful firewall.
α 2 :
Using updated software.
Meanwhile, the hackers, or Player X B , use the following strategies:
β 1 :
Breaking the security password.
β 2 :
Sending suspicious links.
Suppose the crime control branch makes an annual report on cybercrime. For that, they recruit three persons (DMs) to gather asymmetric information. Studying the recent cases, the DMs assess their decisions (here, the payoff matrices) against the activities of the players (here, the defenders and the hackers). Since all of the activities are controlled by the human mind, the decisions are imprecise. So, capturing the hesitancy of the hackers’ and the defenders’ minds in terms of the degree of acceptance and rejection of a decision, we portray the matrix game under an IIHF environment. The payoff matrices assessed by three DMs are listed in Table 1, Table 2 and Table 3.
We can signify the decisions as follows. Suppose Player X A chooses strategy α 1 and Player X B chooses strategy β 1 . Then according to the second DM, the initiative to prevent cybercrime is effective with a belief of 70–80% and with a disbelief of 50–60%. Here, the whole process is controlled by the human mind. So some circumstantial conditions may bring changes in the effectiveness of the strategies. Depending upon the situation, the second DM states that the strategies might be effective with a belief of 75–95% and disbelief of 50–70%. Therefore, the decision of the second DM can be assessed in the form of an IIHFE as d 11 2 ˜ = [ 0.70 , 0.80 ] , [ 0.75 , 0.95 ] ; [ 0.50 , 0.60 ] , [ 0.50 , 0.70 ] . Actually, d 11 2 ˜ measures the damage prevention in terms of uncertainty. We can describe the other payoffs in a similar manner.
Suppose, the weights of the DMs are assigned as 0.3 , 0.4 , and 0.3 , respectively. Thus, the aggregated payoff matrix M ˜ with IIHFE entries can be written as
β 1 β 2   M ˜ = α 1 α 2 ϱ 11 ˜ ϱ 12 ˜ ϱ 21 ˜ ϱ 22 ˜ .
where ϱ p q ˜ is aggregated as ϱ p q ˜ = 0.3 d p q 1 ˜ + 0.4 d p q 2 ˜ + 0.3 d p q 3 ˜ , p = 1 , 2 ; q = 1 , 2 .
Applying the aggregation rule as defined in Definition 11, we can obtain each ϱ p q ˜ as an IIHFE. The expressions of ϱ p q ˜ ( p = 1 , 2 ; q = 1 , 2 ) are given in Table 4.
Now, our objective is to find the optimal strategies for both players, as well as the expected aggregated payoff of Player X A .
According to Problems (29) and (39), we construct Problems (50) and (51) to find the optimal strategies.
min ϕ s.t. 1 2 2 0 . 0998 y 1 0 . 5146 y 2 τ 1 0 . 5145 y 1 0 . 4431 y 2 1 τ 0 . 3142 y 1 0 . 6846 y 2 τ 1 0 . 6846 y 1 0 . 6069 y 2 1 τ ϕ 1 2 2 0 . 2253 y 1 0 . 2641 y 2 τ 1 0 . 4745 y 1 0 . 3342 y 2 1 τ 0 . 5392 y 1 0 . 3843 y 2 τ 1 0 . 7309 y 1 0 . 4573 y 2 1 τ ϕ 0 ϕ 1 y 1 + y 2 = 1 , y p 0 ( p = 1 , 2 )
and
max ψ s.t. 1 2 2 0 . 0998 z 1 0 . 2253 z 2 τ 1 0 . 5145 z 1 0 . 4745 z 2 1 τ 0 . 3142 z 1 0 . 5392 z 2 τ 1 0 . 6846 z 1 0 . 7309 z 2 1 τ ψ 1 2 2 0 . 5146 z 1 0 . 2641 z 2 τ 1 0 . 4431 z 1 0 . 3342 z 2 1 τ 0 . 6846 z 1 0 . 3843 z 2 τ 1 0 . 6069 z 1 0 . 4573 z 2 1 τ ψ 0 ψ 1 z 1 + z 2 = 1 , z q 0 ( q = 1 , 2 ) .
Here, τ is considered as the perception parameter of the players’ choice. We solve NLPPs (50) and (51) using MATHEMATICA 9.0 software and obtain optimal strategies y * , z * , the crisp equivalents of ϕ * , and ψ * for different values of the perception parameters. Furthermore, substituting the values of y * , z * , ϕ * , ψ * in Equation (4), the aggregated expected payoff E ˜ s ( y , z ) for Player X A is obtained.
The results obtained for different values of the perception parameter τ [ 0 , 1 ] are listed in Table 5.
The changes of score values of the expected payoffs for different values of the perception parameter τ for Player X A are depicted in Figure 2.
From Table 5 and Figure 2, the following comments are listed:
  • Table 5 shows that for τ = 0.8 , we obtain the optimal strategies for the players as y * = ( 0.4518 , 0.5482 ) and z * = ( 0.0096 , 0.9904 ) . Furthermore, Player X A ’s aggregated expected payoff is obtained as [ 0.5518 , 0.7542 ] ; [ 0.3920 , 0.5659 ] . In other words, we may say that if Player X A ’s, i.e., the defenders’, control strategies are α 1 with a probability of 0.4518 and α 2 with a probability of 0.5482 while Player X B ’s, i.e., the hackers’, governing strategies are β 1 with a probability of 0.0096 and β 2 with a probability of 0.9904, and also, Player X A is very much optimistic toward the information, then the DMs come to an inference that the damage will be reduced with a surety from 55.18 % to 75.42 % and with a disbelief from 39.20 % to 56.59 % .
  • Table 5 shows that ϕ * ψ * for all the values of the perception parameter τ . This symbolizes that the crisp equivalent of the amount of gain of Player X A does not exceed the crisp equivalent amount of loss of Player X B .
  • Actually, the perception parameter captures the behavior of the players. From Table 5, we can see the crisp equivalent gain of Player X A and the crisp equivalent loss of Player X B both are gradually increased with the increment of the perception parameter chosen by the players. That indicates the gain value of Player X A is maximum when he/she is optimistic enough.
  • The score values of expected payoff for Player X A are increased for τ [ 0 , 0.5 ] and are decreased for τ [ 0.5 , 1 ] . This indicates that we can achieve the expected payoff for Player X A at the maximum level when the players are neutral in nature. This shows the importance of the role of the perception parameter in our proposed model.
  • From Table 5, it is observed that the optimal strategies of the players change significantly with the changes in the perception parameter τ . Both of the players use pure strategies only when the perception parameter τ lies in the interval [ 0 , 0.6 ] . Otherwise, the players use mixed strategies with some probabilities. For example, when τ = 0.8 , Player X A uses strategies α 1 and α 2 with probabilities 0.4518 and 0.5482, respectively, while Player X B uses strategies β 1 and β 2 with probabilities 0.0096 and 0.9904, respectively. Therefore, the players have the freedom to change their strategies with the changes in τ to optimize their expected payoffs.

6. Comparative Analysis and Discussion

Section 6.1 and Section 6.2 justify the superiority of the rendered model in comparison with the presented methods of Bhaumik and Roy [39] and Xue et al. [45].

6.1. Comparison with Bhaumik and Roy [39]

In 2019, Bhaumik and Roy [39] introduced a special form of IIHFE in the literature along with a new aggregation operator. Aiming to consider the hesitancy of the players in terms of both their acceptance and rejection of the possible range of asymmetric information, they applied the notion of IIHFEs in matrix games. To make the solution to this problem, Bhaumik and Roy derived two interval-valued intuitionistic hesitant fuzzy programming models as follows:
max Δ V μ l , V μ u ; Δ V ν l , V ν u subject to p = 1 m Δ ϱ p q μ l , ϱ p q μ u ; Δ ϱ p q ν l , ϱ p q ν u y p I I H F Δ V μ l , V μ u ; Δ V ν l , V ν u p = 1 m y p = 1 ; y p 0 for p = 1 , 2 , , m .
and
min Δ W μ l , W μ u ; Δ W ν l , W ν u subject to q = 1 n Δ ϱ p q μ l , ϱ p q μ u ; Δ ϱ p q ν l , ϱ p q ν u z q I I H F Δ W μ l , W μ u ; Δ W ν l , W ν u q = 1 n z q = 1 ; z q 0 for q = 1 , 2 , , n .
where Δ [ V μ l , V μ u ] ; Δ [ V ν l , V ν u ] = V ˜ and Δ [ W μ l , W μ u ] ; Δ [ W ν l , W ν u ] = W ˜ are Player X A ’s gain floor and Player X B ’s loss ceiling, respectively.
Taking the defined ranking approach (assigned by Bhaumik and Roy [39]), these two problems are converted into the following linear programming models:
max 1 2 V ̲ μ l + V ¯ μ u V ̲ ν l + V ¯ ν u subject to p = 1 m ϱ ̲ p q μ l , ϱ ¯ p q μ u y p V ̲ μ l , V ¯ μ u ; p = 1 m ϱ ̲ p q ν l , ϱ ¯ p q ν u y p V ̲ ν l , V ¯ ν u V ̲ μ l V ¯ μ u ; V ̲ ν l V ¯ ν u ; 0 V ¯ μ u + V ¯ ν u 1 p = 1 m y p = 1 ; y p 0 for p = 1 , 2 , , m .
and
max 1 2 W ̲ μ l + W ¯ μ u W ̲ ν l + W ¯ ν u subject to q = 1 n ϱ ̲ p q μ l , ϱ ¯ p q μ u z q W ̲ μ l , W ¯ μ u ; q = 1 n ϱ ̲ p q ν l , ϱ ¯ p q ν u z q W ̲ ν l , W ¯ ν u W ̲ μ l W ¯ μ u ; W ̲ ν l W ¯ ν u ; 0 W ¯ μ u + W ¯ ν u 1 q = 1 n z q = 1 ; z q 0 for q = 1 , 2 , , n .
where [ V ̲ μ l , V ¯ μ u ] ; [ V ̲ ν l , V ¯ ν u ] , [ W ̲ μ l , W ¯ μ u ] ; [ W ̲ ν l , W ¯ ν u ] , and [ ϱ ̲ p q μ l , ϱ ¯ p q μ u ] ; [ ϱ ̲ p q ν l , ϱ ¯ p q ν u ] are the aggregated form of the preassigned gain floor, loss ceiling, and payoffs, respectively.
Now, for the matrix M ˜ , the LP problems according to Problems (54) and (55) are constructed as
max 1 2 V ̲ μ l + V ¯ μ u V ̲ ν l + V ¯ ν u subject to 0.3142 y 1 + 0.6846 y 2 V ̲ μ l ; 0.5392 y 1 + 0.3843 y 2 V ̲ μ l 0.0998 y 1 + 0.5146 y 2 V ¯ μ u ; 0.2253 y 1 + 0.2641 y 2 V ¯ μ u 0.5145 y 1 + 0.4431 y 2 V ̲ ν l ; 0.4745 y 1 + 0.3342 y 2 V ̲ ν l 0.6846 y 1 + 0.6069 y 2 V ¯ ν l ; 0.7309 y 1 + 0.4573 y 2 V ¯ ν l V ̲ μ l V ¯ μ u ; V ̲ ν l V ¯ ν u ; 0 V ¯ μ u + V ¯ ν u 1 y 1 + y 2 = 1 ; y p 0 for p = 1 , 2 .
and
max 1 2 W ̲ μ l + W ¯ μ u W ̲ ν l + W ¯ ν u subject to 0.3142 z 1 + 0.5392 z 2 W ̲ μ l ; 0.6846 z 1 + 0.3843 z 2 W ̲ μ l 0.0998 z 1 + 0.2253 z 2 W ¯ μ u ; 0.5146 z 1 + 0.2641 z 2 W ¯ μ u 0.5145 z 1 + 0.4745 z 2 W ̲ ν l ; 0.4431 z 1 + 0.3342 z 2 W ̲ ν l 0.6846 z 1 + 0.7309 z 2 W ¯ ν l ; 0.6069 y 1 + 0.4573 y 2 W ¯ ν l W ̲ μ l W ¯ μ u ; W ̲ ν l W ¯ ν u ; 0 W ¯ μ u + W ¯ ν u 1 z 1 + z 2 = 1 ; z q 0 for q = 1 , 2 .
The computational results, obtained by solving Problems (56) and (57), are listed in Table 6.
Analyzing the computed results portrayed in Table 5 and Table 6, the following observations are made:
(i)
In our proposed method, the perception parameter plays a significant role. Table 5 shows that Player X A ’s gain-floor, Player X B ’s loss ceiling, and Player X A s expected payoff are changed with the changes in the perception parameter τ . It is observed that when the players are optimistic toward the information, i.e., when τ lies in [ 0.5 , 1 ] , players have better gain values. Hence, the players have the option to choose different parameter values to obtain better gains. However, in Bhaumik and Roy’s [39] methodology, there is no such parameter that can improve the gain of the player.
(ii)
In classical game theory, there is a most celebrated result that the gain floor of the winning player never exceeds the loss ceiling of the defeated player. In Theorem 2, we showed that this endures also in the IIHF environment. However, if we solve the same problem by Bhaumik and Roy’s [39] approach, we have S c ( V ˜ * ) > S c ( W ˜ * ) . Table 6 shows that the gain floor V ˜ * is greater than the loss ceiling W ˜ * , which contradicts the statement of Theorem 2.
(iii)
Comparing Table 5 and Table 6, we have S c ( E ˜ b ) < S c ( E ˜ s ) . This implies E ˜ b < I I H F E ˜ s for all values of τ , the perception parameter. This implies that our proposed methodology gives better results as compared to Bhaumik and Roy’s [39] approach.
(iv)
Furthermore, it is worth noting that we need to preserve the hesitant character of IIHFEs. However, to preserve the character, if we apply mathematical operations for IIHFEs in the interval-valued intuitionistic hesitant fuzzy programming models, it yields two NLPP models instead of LP models. This phenomenon raises an essential question on the validation of Bhaumik and Roy’s [39] approach.
So, considering all these aspects, we can claim that our proposed model is superior to the existing model.

6.2. Comparison with Xue et al. [45]

This subsection provides a comparison with the celebrated methodology of matrix games discussed by Xue et al. [45]. Xue et al. [45] used hesitant fuzzy elements as the payoffs of a matrix game. To make a comparison, we promote the hesitant fuzzy payoffs assessed by Xue et al. [45] into suitable interval-valued hesitant fuzzy payoffs. The newly promoted payoff matrix H ˜ * is assigned in Table 7.
Now, to solve this matrix game, here, we use Problems (29) and (39). Problems (29) and (39) are two NLPPs that contain both membership and nonmembership values (i.e., the acceptance and nonacceptance of the players toward the information) of the aggregated payoffs. However, the payoffs described in Table 7 only contain the membership values. So, we switch off all nonmembership functions in Problems (29) and (39). Next, to reach the optimal values, we have to solve NLPPs (58) and (59).
min ϕ subject to 1 2 2 0 . 68 y 1 0 . 28 y 2 0 . 46 y 3 0 . 18 y 4 0 . 83 y 1 0 . 55 y 2 0 . 64 y 3 0 . 52 y 4 ϕ 1 2 2 0 . 18 y 1 0 . 68 y 2 0 . 18 y 3 0 . 05 y 4 0 . 44 y 1 0 . 83 y 2 0 . 33 y 3 0 . 22 y 4 ϕ 1 2 2 0 . 38 y 1 0 . 38 y 2 0 . 68 y 3 0 . 08 y 4 0 . 52 y 1 0 . 64 y 2 0 . 95 y 3 0 . 23 y 4 ϕ 1 2 2 0 . 38 y 1 0 . 47 y 2 0 . 37 y 3 0 . 55 y 4 0 . 65 y 1 0 . 62 y 2 0 . 65 y 3 0 . 72 y 4 ϕ
and
max ψ subject to 1 2 2 0 . 68 y 1 0 . 18 y 2 0 . 38 y 3 0 . 38 y 4 0 . 83 y 1 0 . 44 y 2 0 . 52 y 3 0 . 65 y 4 ψ 1 2 2 0 . 28 y 1 0 . 68 y 2 0 . 38 y 3 0 . 47 y 4 0 . 55 y 1 0 . 83 y 2 0 . 64 y 3 0 . 62 y 4 ψ 1 2 2 0 . 46 y 1 0 . 18 y 2 0 . 68 y 3 0 . 37 y 4 0 . 64 y 1 0 . 33 y 2 0 . 95 y 3 0 . 65 y 4 ψ 1 2 2 0 . 18 y 1 0 . 05 y 2 0 . 08 y 3 0 . 55 y 4 0 . 52 y 1 0 . 22 y 2 0 . 23 y 3 0 . 72 y 4 ψ
By solving Problems (58) and (59), we obtain the optimal strategies for Players X A and X B along with their game values. In Table 8, we list both the results obtained by the proposed method and Xue et al.’s [45] method.
The following observations are recorded:
(i)
Table 8 shows that we can obtain better optimal values for both players if we choose our rendered model. Thus, it is clear that the proposed model is superior to the model explored by Xue et al. [45].
(ii)
Using the optimal strategies y * and z * for Players X A and X B , respectively, if we calculate the expected payoff for Player X A , we have E * = [ 0.3718 , 0.6063 ] . The score function of this expected payoff is S c ( E * ) = 0.4891 , which gives a better value than the existing one [45].
(iii)
Moreover, Xue et al. [45] considered only the hesitancy of decision makers to portray the matrix game problem. However, occasionally in practical problems, DMs fail to judge the asymmetric information scenario properly. As a result, they cannot assign any precise value. Consequently, they have to choose some interval values to assign the payoffs. In that sense, delineating a matrix game problem in an intuitionistic interval-valued hesitant fuzzy environment is more realistic in the literature.

7. Conclusions

In reality, occasionally we fail to gather accurate information about an event, and we have to rely on a possible range of information. Consequently, decision makers have some hesitancy about the asymmetric information. To deal with such a situation, we actualize a matrix game problem with interval-valued intuitionistic hesitant fuzzy entries. To solve this, we derive two bi-objective interval-valued intuitionistic hesitant fuzzy programming models. It is difficult to handle such programming models traditionally. To establish the model, we define a new aggregation operator, viz., the min-max enclosure aggregation operator, for IIHFEs. Based on this operator, the ranking order of the IIHFEs is assigned. To obtain the optimal values, two interval-valued intuitionistic hesitant fuzzy programming problems are derived, which are converted into two nonlinear programming models with the perception parameters of the players.
In classical game theory, there is a most celebrated result that the gain floor of the maximizing player is always less than or equal to the loss ceiling of the minimizing player. In our discussion, we showed that this result is also valid in the IIHF environment. Here, we have explained that the perception parameter of the players plays an important role in this model. Depending on this parameter, the value of the game and the expected payoff of the conquering player are changed. To solve this problem, we have to change the fuzzy programming problem to a nonlinear programming problem. However, we were able to show that the solution obtained from the BOIIHFPMs is a noninferior solution to the solution obtained from the derived NLPPs. With a valid comparison, we showed that our executed model is superior to the existing methodologies proposed by Bhaumik and Roy [39] and Xue et al. [45].
To check the cogency of the proposed methodology, we presented an imprecise and asymmetric information scenario of hackers and of the defenders attempting to prevent cybercrime. Here, it is observed that both the gain of the winning player and the loss of the defeated player increase with the increment of the perception parameter of the player.
Besides several advantages, the proposed methodology has some limitations. One of the major limitations is that we failed to calculate the gains and losses of the players in terms of IIHFEs. Another limitation is that we generated the solution procedure by presuming the existence of a solution for matrix games in the IIHF environment. However, we cannot establish any theorems about it. Therefore, further investigation is needed in the future, which can be considered a future study of the rendered methodology.
This methodology can be applied to various decision-making problems in an IIHF environment. Moreover, in various conflicting situations, portraying the situation in terms of a possible range of acceptance and nonacceptance by the players, along with the degree of hesitancy of the players towards the information, such as various management issues, war science, psychological issues, etc., can be resolved by our proposed methodology.

Author Contributions

Conceptualization, S.K. and M.R.S.; methodology, S.K. and M.R.S.; software, S.K.; validation, S.K.; formal analysis, S.K.; investigation, M.R.S.; resources, S.K. and M.R.S.; data curation, S.K. and M.R.S.; writing—original draft preparation, S.K. and M.R.S.; writing—review and editing, M.R.S.; supervision, M.R.S. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

Data are contained within the article.

Acknowledgments

The authors would like to acknowledge the anonymous reviewers whose invaluable comments and suggestions helped to improve the article.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Neumann, J.V.; Morgenstern, O. Theory of Games and Economic Behaviour; Princeton University Press: Princeton, NJ, USA, 1947. [Google Scholar]
  2. Dubois, D.; Prade, H. Fuzzy Sets and Systems: Theory and Applications; Academic Press: New York, NY, USA, 1980. [Google Scholar]
  3. Mi, X.; Liao, H.; Zeng, X.J.; Xu, Z. The two-person and zero-sum matrix game with probabilistic linguistic information. Inf. Sci. 2021, 570, 487–499. [Google Scholar] [CrossRef]
  4. Chandra, S.; Aggarwal, A. On solving matrix games with pay-offs of triangular fuzzy numbers: Certain observations and generalizations. Eur. J. Oper. Res. 2015, 246, 575–581. [Google Scholar] [CrossRef]
  5. Atanassov, K.T. Intuitionistic fuzzy sets. Fuzzy Sets Syst. 1986, 20, 87–96. [Google Scholar] [CrossRef]
  6. Li, D.F. Mathematical-programming approach to matrix games with payoffs represented by Atanassov’s interval-valued intuitionistic fuzzy sets. IEEE Trans. Fuzzy Syst. 2010, 18, 1112–1128. [Google Scholar] [CrossRef]
  7. Li, D.F. Decision and Game Theory in Management with Intuitionistic Fuzzy Sets; Springer: Berlin, Germany, 2014. [Google Scholar]
  8. Xia, M. Interval-valued intuitionistic fuzzy matrix games based on archimedean t-conorm and t-norm. Int. J. Gen. Syst. 2018, 47, 278–293. [Google Scholar] [CrossRef]
  9. Brikaa, M.G.; Zheng, Z.; Ammar, E.S. Resolving indeterminacy approach to solve multi-criteria zero-sum matrix games with intuitionistic fuzzy goals. Mathematics 2020, 8, 305. [Google Scholar] [CrossRef]
  10. Verma, T.; Kumar, A. Ambika methods for solving matrix games with Atanassov’s intuitionistic fuzzy pay-offs. IEEE Trans. Fuzzy Syst. 2018, 26, 270–283. [Google Scholar] [CrossRef]
  11. Verma, R.; Aggarwal, A. Matrix games with linguistic intuitionistic fuzzy payoffs: Basic results and solution methods. Artif. Intell. Rev. 2021, 54, 5127–5162. [Google Scholar] [CrossRef]
  12. Dong, J.Y.; Wan, S.P. Type-2 interval-valued intuitionistic fuzzy matrix game and application to energy vehicle industry development. Expert Syst. Appl. 2024, 249, 123398. [Google Scholar] [CrossRef]
  13. Seikh, M.R.; Karmakar, S.; Castillo, O. A novel defuzzification approach of type-2 fuzzy variable to solving matrix games: An application to plastic ban problem. Iran. J. Fuzzy Syst. 2021, 18, 155–172. [Google Scholar]
  14. Yang, Y.D.; Ding, X.F. A q rung orthopair fuzzy non cooperative game method for competitive strategy group decision making problems based on a hybrid dynamic experts’ weight deter-mining model. Complex Intell. Syst. 2021, 7, 3077–3092. [Google Scholar] [CrossRef]
  15. Bigdeli, H.; Mousazadeh, M. Analytical Hierarchy Process in modeling and solving matrix games in neutrosophic environment and its application in military problems. Mil. Sci. Tactics 2023, 19, 5–33. [Google Scholar]
  16. Seikh, M.R.; Dutta, S. Solution of matrix games with payoffs of single-valued trape-zoidal neutrosophic numbers. Soft Comput. 2022, 26, 921–936. [Google Scholar] [CrossRef]
  17. Seikh, M.R.; Dutta, S. Interval neutrosophic matrix game-based approach to counter cybersecurity issue. Granul. Comput. 2023, 8, 271–292. [Google Scholar] [CrossRef]
  18. Khalil, A.M.; Cao, D.; Azzam, A.; Smarandache, F.; Alharbi, W.R. Combination of the single-valued neutrosophic fuzzy set and the soft set with applications in decision-making. Symmetry 2020, 12, 1361. [Google Scholar] [CrossRef]
  19. Torra, V. Hesitant fuzzy sets. Int. J. Intell. Syst. 2010, 25, 529–539. [Google Scholar] [CrossRef]
  20. Xia, M.; Xu, Z.S. Hesitant fuzzy information aggregation in decision making. Int. J. Approx. Reason. 2011, 52, 395–407. [Google Scholar] [CrossRef]
  21. Xu, Z.S.; Xia, M. Distance and similarity measures for hesitant fuzzy sets. Inform. Sci. 2011, 181, 2128–2138. [Google Scholar] [CrossRef]
  22. Zeng, W.; Li, D.; Yin, Q. Weighted interval-valued hesitant fuzzy sets and its application in group decision making. Int. J. Fuzzy Syst. 2019, 21, 421–432. [Google Scholar] [CrossRef]
  23. Jana, J.; Roy, S.K. Linguistic Pythagorean hesitant fuzzy matrix game and its application in multi-criteria decision making. Appl. Intell. 2023, 53, 1–22. [Google Scholar] [CrossRef]
  24. Seikh, M.R.; Karmakar, S.; Xia, M. Solving matrix games with hesitant fuzzy pay-offs. Iran. J. Fuzzy Syst. 2020, 17, 25–40. [Google Scholar]
  25. Yang, Z.; Song, Y. Matrix game with payoffs represented by triangular dual hesitant fuzzy numbers. Int. J. Comput. Commun. Control 2020, 15, 3854. [Google Scholar] [CrossRef]
  26. Naqvi, D.R.; Sachdev, G.; Ahmad, I. Matrix games involving interval-valued hesitant fuzzy linguistic sets and its application to electric vehicles. J. Intell. Fuzzy Syst. 2023, 44, 5085–5105. [Google Scholar] [CrossRef]
  27. Zhang, Z. Interval-valued intuitionistic hesitant fuzzy aggregation operators and their application in group decision-making. J. Appl. Math. 2013, 2013, 670285. [Google Scholar] [CrossRef]
  28. Broumi, S.; Smarandache, F. New operations over interval-valued intuitionistic hesi-tant fuzzy set. Math. Stat. 2014, 2, 62–71. [Google Scholar] [CrossRef]
  29. Joshi, D.K.; Kumar, S. Interval-valued intuitionistic hesitant fuzzy choquet integral based TOPSIS method for multi-criteria group decision making. Eur. J. Oper. Res. 2016, 248, 183–191. [Google Scholar] [CrossRef]
  30. Yuan, J.; Li, C.; Xu, F.; Sun, B.; Li, W. A group decision making approach in inter-val-valued intuitionistic fuzzy environment with confidence levels. J. Intell. Fuzzy Syst. 2016, 31, 1909–1919. [Google Scholar] [CrossRef]
  31. Joshi, D.K.; Kumar, S. Entropy of interval-valued intuitionistic hesitant fuzzy set and its application to group decision making problems. Granul. Comput. 2018, 3, 367–381. [Google Scholar] [CrossRef]
  32. Narayanamoorthy, S.; Geetha, S.; Rakkiyappan, R.; Joo, Y.H. Interval-valued intuitionistic hesitant fuzzy entropy based VIKOR method for industrial robots selection. Expert Syst. Appl. 2019, 121, 28–37. [Google Scholar] [CrossRef]
  33. De, A.; Das, S.; Kar, S. Multiple attribute decision making based on probabilistic inter-val-valued intuitionistic hesitant fuzzy set and extended TOPSIS method. J. Intell. Fuzzy Syst. 2019, 37, 5229–5248. [Google Scholar] [CrossRef]
  34. Du, K.; Fan, R.; Wang, Y.; Wang, D.; Qian, R.; Zhu, B. A data-driven group emergency decision-making method based on interval-valued intuitionistic hesitant fuzzy sets and its application in COVID-19 pandemic. Appl. Soft Comput. 2023, 139, 110213. [Google Scholar] [CrossRef]
  35. Bhaumik, A.; Roy, S.K.; Weber, G.W. Hesitant interval-valued intuitionistic fuzzy-linguistic term set approach in prisoners’ dilemma game theory using TOPSIS: A case study on hu-man-trafficking. Cent. Eur. J. Oper. Res. 2020, 28, 797–816. [Google Scholar] [CrossRef]
  36. Zhai, Y.; Xu, Z.; Liao, H. Measures of probabilistic interval-valued intuitionistic hesitant fuzzy sets and the application in reducing excessive medical examination. IEEE Trans. Fuzzy Syst. 2018, 26, 1651–1670. [Google Scholar] [CrossRef]
  37. Zhang, L.; Tang, J.; Meng, F. An approach to decision making with interval-valued in-tuitionistic hesitant fuzzy information based on the 2-additive shapley function. Informatica 2018, 29, 157–185. [Google Scholar] [CrossRef]
  38. Zhang, G.; Zhou, S.; Xia, X.; Yuksel, S.; Bas, H.; Dincer, H. Strategic mapping of youth unemployment with interval valued intuitionistic hesitant fuzzy DEMATEL based on 2-tuple linguistic values. IEEE Access 2020, 8, 25706–25721. [Google Scholar] [CrossRef]
  39. Bhaumik, A.; Roy, S.K. Intuitionistic interval-valued hesitant fuzzy matrix games with a new aggregation operator for solving management problem. Granul. Comput. 2021, 6, 359–375. [Google Scholar] [CrossRef]
  40. Xu, Z.; Gou, X. An overview of interval-valued intuitionistic fuzzy information aggrega-tions and applications. Granul. Comput. 2017, 2, 13–39. [Google Scholar] [CrossRef]
  41. Chen, N.; Xu, Z.S. Properties of interval-valued hesitant fuzzy sets. J. Telligent Fuzzy Syst. 2014, 27, 143–158. [Google Scholar] [CrossRef]
  42. Xu, Z.S. Intuitionistic fuzzy aggregation operator. IEEE Trans. Fuzzy Syst. 2007, 15, 1179–1187. [Google Scholar]
  43. Ishibuchi, H.; Tanaka, H. Multiobjective programming in optimization of the interval objective function. Eur. J. Oper. Res. 1990, 48, 219–225. [Google Scholar] [CrossRef]
  44. National Crime Records Bureau. 2020. Available online: https://ncrb.gov.in/en/Crime-in-India-2020 (accessed on 27 June 2023).
  45. Xue, W.; Xu, Z.; Zeng, X.J. Solving matrix games based on Ambika method with hesitant fuzzy information and its application in the counter-terrorism issue. Appl. Intell. 2021, 51, 1227–1243. [Google Scholar] [CrossRef]
Figure 1. State-wise reported number of cybercrimes in last three years.
Figure 1. State-wise reported number of cybercrimes in last three years.
Symmetry 16 00573 g001
Figure 2. Change of expected payoffs with respect to the perception parameter τ .
Figure 2. Change of expected payoffs with respect to the perception parameter τ .
Symmetry 16 00573 g002
Table 1. Payoff matrix assigned by DM 1.
Table 1. Payoff matrix assigned by DM 1.
Strategies β 1 β 2
α 1 d 11 1 ˜ = [ 0.70 , 0.80 ] , [ 0.75 , 0.90 ] , [ 0.70 , 0.85 ] ; [ 0.50 , 0.60 ] , [ 0.50 , 0.65 ] d 12 1 ˜ = [ 0.65 , 0.80 ] , [ 0.65 , 0.85 ] ; [ 0.70 , 0.85 ]
α 2 d 21 1 ˜ = [ 0.35 , 0.40 ] , [ 0.35 , 0.50 ] , [ 0.30 , 0.40 ] ; [ 0.50 , 0.60 ] , [ 0.45 , 0.60 ] d 22 1 ˜ = [ 0.65 , 0.70 ] ; [ 0.35 , 0.45 ] , [ 0.35 , 0.50 ]
Table 2. Payoff matrix assigned by DM 2.
Table 2. Payoff matrix assigned by DM 2.
Strategies β 1 β 2
α 1 d 11 2 ˜ = [ 0.70 , 0.80 ] , [ 0.75 , 0.95 ] ; [ 0.50 , 0.60 ] , [ 0.50 , 0.70 ] d 12 2 ˜ = [ 0.65 , 0.70 ] , [ 0.60 , 0.75 ] ; [ 0.60 , 0.65 ] , [ 0.50 , 0.65 ]
α 2 d 21 2 ˜ = [ 0.30 , 0.50 ] ; [ 0.40 , 0.55 ] d 22 2 ˜ = [ 0.60 , 0.70 ] , [ 0.65 , 0.75 ] ; [ 0.35 , 0.40 ]
Table 3. Payoff matrix assigned by DM 3.
Table 3. Payoff matrix assigned by DM 3.
Strategies β 1 β 2
α 1 d 11 3 ˜ = [ 0.65 , 0.75 ] ; [ 0.55 , 0.70 ] d 12 3 ˜ = [ 0.52 , 0.60 ] , [ 0.50 , 0.60 ] ; [ 0.35 , 0.40 ] , [ 0.30 , 0.45 ]
α 2 d 21 3 ˜ = [ 0.35 , 0.45 ] ; [ 0.50 , 0.65 ] , [ 0.50 , 0.70 ] d 22 3 ˜ = [ 0.60 , 0.75 ] , [ 0.60 , 0.70 ] , [ 0.65 , 0.75 ] ; [ 0.30 , 0.50 ]
Table 4. Aggregated value of the decisions.
Table 4. Aggregated value of the decisions.
ϱ pq ˜
(p = 1, 2; q = 1, 2)
Aggregated IIHFEs
ϱ 11 ˜ 〈[0.6858,0.7861], [0.7079,0.8771], [0.7025,0.8263], [0.7234,0.9002], [0.6858,0.8038],
[0.7079,0.8873]; [0.5145,0.6284], [0.5145,0.6684], [0.5145,0.6437], [0.5145,0.6846]〉
ϱ 12 ˜ 〈[0.4608,0.7358], [0.6104,0.7358], [0.5941,0.7544], [0.5891,0.7544], [0.4608,0.7576],
[0.6104,0.7576], [0.5941,0.7747], [0.5941,0.7747]; [0.5365,0.6089], [0.5123,0.7309],
[0.4969,0.6089], [0.4745,0.7309]〉
ϱ 21 ˜ 〈[0.3304,0.4565], [0.3304,0.4854], [0.3154,0.4565]; [0.4573,0.5936], [0.4573,0.6069],
[0.4431,0.5936], [0.4431,0.6069]〉
ϱ 22 ˜ 〈[0.6157,0.7160], [0.6157,0.7000], [0.6309,0.7160], [0.6356,0.7359], [0.6356,0.7211],
[0.6500,0.7359]; [0.3342,0.4437], [0.3342,0.4573]〉
Table 5. Result table.
Table 5. Result table.
τ y * ϕ * z * ψ * E ˜ s ( y , z ) S c ( E ˜ s )
0(0,1)0.5063(1,0)0.5063 [ 0.3154 , 0.4854 ] ; [ 0.4431 , 0.6069 ] 0.2492
0.2(0,1)0.5250(1,0)0.5250 [ 0.3154 , 0.4854 ] ; [ 0.4431 , 0.6069 ] 0.2492
0.4(0,1)0.5337(0,1)0.5337 [ 0.6157 , 0.7359 ] ; [ 0.3342 , 0.4573 ] 0.5601
0.6(0,1)0.5883(0,1)0.5883 [ 0.6157 , 0.7359 ] ; [ 0.3342 , 0.4573 ] 0.5601
0.8(0.4518,0.5482)0.6301(0.0096,0.9904)0.6339 [ 0.5518 , 0.7542 ] ; [ 0.3920 , 0.5659 ] 0.3481
1(0.4898,0.5102)0.6510(0.1336,0.8664)0.6682 [ 0.4315 , 0.5861 ] ; [ 0.5314 , 0.6536 ] 0.1494
Table 6. Results obtained by Bhaumik and Roy’s [39] method.
Table 6. Results obtained by Bhaumik and Roy’s [39] method.
y * V ˜ * S c ( V ˜ * ) z * W ˜ * S c ( W ˜ * ) E ˜ b ( y , z ) S c ( E ˜ b )
(0,1) [ 0.2641 , 0.2850 ] ; [ 0.4431 , 0.6069 ] 0.5009(0.2949,0.7051) [ 0.4728 , 0.4830 ] ; [ 0.3663 , 0.5014 ] 0.0881 [ 0.2529 , 0.3446 ] ; [ 0.3706 , 0.3751 ] 0.1482
Table 7. Payoff matrix H ˜ * in tabular form.
Table 7. Payoff matrix H ˜ * in tabular form.
Strategy ρ 1 ρ 2 ρ 3 ρ 4
ρ 1 [ 0.17 , 0.22 ] , [ 0.28 , 0.32 ] [ 0.56 , 0.62 ] , [ 0.68 , 0.72 ] , [ 0.75 , 0.82 ] [ 0.48 , 0.52 ] , [ 0.56 , 0.62 ] [ 0.35 , 0.43 ] , [ 0.56 , 0.62 ]
ρ 2 [ 0.45 , 0.55 ] , [ 0.65 , 0.72 ] [ 0.17 , 0.22 ] , [ 0.28 , 0.32 ] [ 0.36 , 0.42 ] , [ 0.56 , 0.62 ] [ 0.38 , 0.44 ] , [ 0.47 , 0.53 ]
ρ 3 [ 0.36 , 0.42 ] , [ 0.48 , 0.54 ] [ 0.67 , 0.72 ] , [ 0.75 , 0.82 ] [ 0.05 , 0.12 ] , [ 0.15 , 0.22 ] , [ 0.27 , 0.32 ] [ 0.35 , 0.43 ] , [ 0.54 , 0.63 ]
ρ 4 [ 0.48 , 0.52 ] , [ 0.56 , 0.62 ] , [ 0.75 , 0.82 ] [ 0.78 , 0.82 ] , [ 0.85 , 0.95 ] [ 0.77 , 0.82 ] , [ 0.85 , 0.92 ] [ 0.28 , 0.32 ] , [ 0.35 , 0.45 ]
Table 8. Comparative results of proposed method and Xue et al.’s [45] method.
Table 8. Comparative results of proposed method and Xue et al.’s [45] method.
OutcomesProposed MethodXue et al.’s [45] Method
y * ( 0.3147 , 0.5946 , 0.0907 , 0 ) ( 0.5 , 0.5 , 0 , 0 )
z * ( 0.4442 , 0.2498 , 0.3060 , 0 ) ( 0.1243 , 0 , 0.1014 , 0.7743 )
ϕ * 0.48900.1455
ψ * 0.97780.9354
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Karmakar, S.; Seikh, M.R. A Nonlinear Programming Approach to Solving Interval-Valued Intuitionistic Hesitant Noncooperative Fuzzy Matrix Games. Symmetry 2024, 16, 573. https://doi.org/10.3390/sym16050573

AMA Style

Karmakar S, Seikh MR. A Nonlinear Programming Approach to Solving Interval-Valued Intuitionistic Hesitant Noncooperative Fuzzy Matrix Games. Symmetry. 2024; 16(5):573. https://doi.org/10.3390/sym16050573

Chicago/Turabian Style

Karmakar, Shuvasree, and Mijanur Rahaman Seikh. 2024. "A Nonlinear Programming Approach to Solving Interval-Valued Intuitionistic Hesitant Noncooperative Fuzzy Matrix Games" Symmetry 16, no. 5: 573. https://doi.org/10.3390/sym16050573

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop