Home Interval-valued T-spherical fuzzy extended power aggregation operators and their application in multi-criteria decision-making
Article Open Access

Interval-valued T-spherical fuzzy extended power aggregation operators and their application in multi-criteria decision-making

  • Lu Chen EMAIL logo
Published/Copyright: April 15, 2024
Become an author with De Gruyter Brill

Abstract

As an effective tool to show the fuzziness of qualitative information, the interval-valued T-spherical fuzzy set can utilize three kinds of information, namely, membership, abstinence, and non-membership, to show the opinions of decision-maker. Given this advantage, many interval-valued T-spherical fuzzy multi-criteria decision-making (IVTSF-MCDM) methods have been designed. However, most of the existing IVTSF-MCDM methods have a common limitation that the inability to effectively show the impacts of extreme data. To address this limitation, this study develops a novel MCDM method based on interval-valued T-spherical fuzzy extended power aggregation operator. First, interval-valued T-spherical fuzzy cross-entropy (CE) and interval-valued T-spherical fuzzy symmetrical CE are defined to measure the difference between two interval-valued T-spherical fuzzy numbers, which are used to determine criteria weights in MCDM. Second, interval-valued T-spherical fuzzy extended power average operator and interval-valued T-spherical fuzzy extended power geometric operator are proposed, and their properties are investigated. Moreover, in view of that criteria may be assigned to different weights, this study defines interval-valued T-spherical fuzzy extended power weighted average operator and interval-valued T-spherical fuzzy extended power weighted geometric operator to derive the order of alternatives. Finally, the applicability of the proposed method is validated by the case about investment country selection, while the sensitivity and comparison analyses are also conducted to further prove its advantages and effectiveness.

1 Introduction

Multi-criteria decision-making (MCDM) is an important research field in decision science. Since the evaluation information provided by decision-makers (DMs) is usually ambiguous and uncertain in MCDM, some fuzzy sets have been adopted to express uncertain evaluation information, including fuzzy set intuitionistic fuzzy set, Pythagorean fuzzy set, and q-rung orthopair fuzzy set [1,2,3,4]. In actual situations, DMs’ opinions involve more answers of types: yes, no, abstain, and refusal. Voting is a suitable example of such situation as human voters may be classified into four types: vote for, abstain, vote against, and refusal of the voting. To deal with this situation, Cuong presented the picture fuzzy set [5]. The picture fuzzy set includes three kinds of degrees, namely, the membership degree μ ( 0 μ 1 ) , abstinence degree η ( 0 η 1 ) , and non-membership degree v ( 0 v 1 ) , and the restriction is that the sum of the three degrees must not exceed one, i.e., μ + η + v 1 . Subsequently, inspired by ideas of q-rung orthopair fuzzy set, Mahmood et al. [6] extended picture fuzzy set to define T-spherical fuzzy set (TSFS), which satisfies the condition μ q + η q + v q 1 ( q 1 ) . However, DMs may choose interval numbers to express their opinions since their cognitions of the evaluation object are uncertain. Thus, Ullah et al. [7] proposed interval-valued TSFS (IVTSFS) on the basis of TSFS, in which the membership degree, abstinence degree, and non-membership degree are expressed in form of interval numbers. Obviously, IVTSFS can more intuitively show the perceptions of DMs by comparing with the aforementioned fuzzy sets.

Taking the advantages of IVTSFS, some interval-valued T-spherical fuzzy MCDM (IVTSF-MCDM) methods have been proposed [6,7,8,9,10,11,12,13]. For example, Ullah et al. proposed interval-valued T-spherical fuzzy weighted average (IVTSFWA) operator and interval-valued T-spherical fuzzy weighted geometric (IVTSFWG) operator, and used these aggregation operators to handle MCDM problems [7]. Subsequently, Jin et al. [8] developed some Hamacher aggregation operators in the environment of IVTSFSs, including interval-valued T-spherical fuzzy Hamacher weighted average (IVTSFHWA) and interval-valued T-spherical fuzzy Hamacher weighted geometric (IVTSFHWG) operators, and utilized these operators to design MCDM method. Considering that Dombi t-norm and Dombi t-conorm have more flexibility, Ullah et al. [9] presented the concepts of interval-valued T-spherical fuzzy Dombi weighted average (IVTSFDWA) and interval-valued T-spherical fuzzy Dombi weighted geometric (IVTSFDWG) operators, and applied these operators into MCDM. Inspired by Frank t-norm and Frank t-conorm, Hussain et al. [10] defined interval-valued T-spherical fuzzy Frank aggregation operators, which are used to assess the business proposals. In view of the aforementioned operators that cannot reflect the interrelationships between two criteria in MCDM, Akram et al. [11] extended Bonferroni mean operators to interval-valued T-spherical fuzzy context. In fact, there are some relationships among more than two criteria. Thus, Yang, et al. [12] proposed interval-valued T-spherical fuzzy weighted Muirhead mean (IVTSFWMM) operator and established the decision-making method of digitalization solutions of medical system based on this operator. Although these interval-valued T-spherical fuzzy aggregation operators are from different mathematical perspective, they ignore the impacts of extreme data, such as too high and too low evaluation results, on the final result in MCDM. To address this issue, Xu and Yager [13] proposed the power average (PA) operator and power geometric (PG) operator, which regard extreme data as erroneous or biased information. Thus, PA and PG operators assign smaller weights to extreme data. Some scholars [14,15,16,17,18] have applied PA and PG operators to solve MCDM problems with different fuzzy sets. However, extreme data may be important in some cases. For example, five professors’ assessments about the innovativeness of an article are expressed in form of interval value T-spherical fuzzy numbers (IVTSFNs), where the full professor gives a IVTSFN ([0.1, 0.2], [0.6, 0.6], [0.3, 0.4]), and four assistant professors’ evaluations are ([0.3, 0.5], [0.4, 0.6], [0.2, 0.6]). Although the full professor’ opinion differs from that of assistant professors, his opinion is more important than that of others. It is worth mentioning that full professor’ opinions are regarded as biased information and assigned to a smaller weight when using PA or PG operator. Obviously, PA or PG operator may lead to unreasonable results in some cases. To overcome this shortcoming, Xiong et al. [19] and Xiong et al. [20] introduced the extended power average (EPA) operator and extended power geometric (EPG) operator, respectively, which set an adjustable parameter to reflect the preferences of DMs on extreme data on the basic of PA and PG operators. Obviously, extended power aggregation operators can describe more important information than PA and PG. However, there are few studies on extended power aggregation operators in IVTSF-MCDM problems. Hence, it is valuable to employ EPA and EPG operators to solve IVTSF-MCDM problems.

In IVTSF-MCDM, different criteria usually have different impacts on the decision results. In other words, different criteria should be assigned with different weights. The maximizing deviation approach is very effective in determining criteria weights, which relies on the differences between DMs’ opinions under each criterion [21]. Therefore, how to choose a suitable tool to measure the differences between data is material for the maximizing deviation approach. As an important concept of information theory, cross-entropy (CE) can measure the difference between two probability distributions. In other words, CE can reflect the gap of the data to some extent. Therefore, it is very effective to combine CE with the maximizing deviation approach to determine criteria weights. The CE has been extended to the different fuzzy environment, such as intuitionistic fuzzy CE [22], Pythagorean fuzzy CE [23], q-rung orthopair fuzzy CE [24], picture fuzzy CE [25], and T-spherical fuzzy CE [26]. These existing CEs have been successfully applied into MCDM problems. However, few scholars explore CE under interval-valued T-spherical fuzzy context. Therefore, this article designs interval-valued T-spherical fuzzy CE (IVTSFCE) and interval-valued T-spherical fuzzy symmetric CE (IVTSFSCE) to calculate the differences between two IVTSFNs. Given this characteristic of IVTSFSCE, it can be combined with the maximizing deviation approach to derive criteria weights in IVTSF-MCDM problems, and it provides the necessary support for the proposed MCDM method.

According to the aforementioned analysis, this article intends to propose a novel IVTSF-MCDM method that can reflect the impact of extreme data on the ranking results of alternatives. The motivation for the proposed method can be as follows:

  1. The previous researches of CE [23,24,25,26] cannot deal with interval-valued T-spherical fuzzy information.

  2. Some existing IVTSF-MCDM methods [7,8,9,10,11] cannot consider the influence of extreme data on the order of alternatives, which leads to an unreasonable result.

To address these key issues, a novel MCDM method based on interval-valued T-spherical fuzzy extended power aggregation operators is designed. First, the IVTSFCE and IVTSFSCE are developed and combined with the maximizing deviation approach to derive the weights of criteria. Second, some interval-valued T-spherical fuzzy extended power aggregation operators, such as interval-valued T-spherical fuzzy extended power average (IVTSFEPA), interval-valued T-spherical fuzzy extended power geometric (IVTSFEPG), interval-valued T-spherical fuzzy extended power weighted average (IVTSFEPWA), and interval-valued T-spherical fuzzy extended power weighted geometric (IVTSFEPWG) operators, are proposed to reflect the effect of extreme data. In the end, an example of investment country selection is presented to prove the availability of the proposed method, while the sensitivity and comparative analysis are used to prove the advantages of the proposed method. In a summary, the contributions of this article contain:

  1. The IVTSFCE and IVTSFSCE are developed to measure the differences between two IVTSFNs.

  2. Some interval-valued T-spherical fuzzy extended power aggregation operators, such as IVTSFEPA, IVTSFEPG, IVTSFEPWA and IVTSFEPWG operators, are presented to show the effect of extreme data.

  3. A novel MCDM method is designed using IVTSFCE and interval-valued T-spherical fuzzy extended power aggregation operators.

The framework of this article includes: in Section 2, some basic knowledge about IVTSFS, PA, and PG operators is recalled, while IVTSFCE and IVTSFSCE are defined. In Section 3, some interval-valued T-spherical fuzzy extended power aggregation operators are presented and their properties are investigated. In Section 4, a novel MCDM method is proposed on the basis of IVTSFCE and interval-valued T-spherical fuzzy extended power aggregation operators. Section 5 presents an application of the proposed method into an illustrative case. Additionally, the sensitivity and comparison analyses prove the merit of the proposed method. In Section 6, some conclusions are given.

2 Preliminaries

In this section, the IVTSFS, PA, and PG operators are recalled, and the concepts of IVTSFCE and IVTSFSCE are defined.

2.1 IVTSFS

Definition 1

(Ullah et al. [7]) Let X be a finite set, and the IVTSFS on X is expressed as:

(1) T = { ( [ μ x L , μ x U ] , [ η x L , η x U ] , [ v x L , v x U ] ) | x X } ,

where [ μ x L , μ x U ] , [ η x L , η x U ] , and [ v x L , v x U ] denote the elements x X satisfying the degree of membership, abstinence, and non-membership of the set T, respectively, and meet 0 μ x L μ x U 1 , 0 η x L η x U 1 , 0 v x L v x U 1 and 0 ( μ x U ) q + ( η x U ) q + v x U ) q 1 ( q 1 ) .

For the convenience of expression, we denote ( [ μ x L , μ x U ] , [ η x L , η x U ] , [ v x L , v x U ] ) as α = ( [ μ L , μ U ] , [ η L , η U ] , [ v L , v U ] ) and call α the interval T-spherical fuzzy number (IVTSFN).

Definition 2

(Ullah et al. [7]) Let two IVTSFNs be α 1 = ( [ μ 1 L , μ 1 U ] , [ η 1 L , η 1 U ] , [ v 1 L , v 1 U ] ) and α 2 = ( [ μ 2 L , μ 2 U ] , [ η 2 L , η 2 U ] , [ v 2 L , v 2 U ] ) , λ > 0 , then

  1. α 1 α 2 = ( [ ( ( μ 1 L ) q + ( μ 2 L ) q ( μ 1 L μ 2 L ) q ) 1 / q , ( ( μ 1 U ) q + ( μ 2 U ) q ( μ 1 U μ 2 U ) q ) 1 / q ] , [ η 1 L η 2 L , η 1 U η 2 U ] , [ v 1 L v 2 L , v 1 U v 2 U ] )

  2. α 1 α 2 = ( [ μ 1 L μ 2 L , μ 1 U μ 2 U ] , [ ( ( η 1 L ) q + ( η 2 L ) q ( η 1 L η 2 L ) q ) 1 / q , ( ( η 1 U ) q + ( η 2 U ) q ( η 1 U η 2 U ) q ) 1 / q ] , [ ( ( v 1 L ) q + ( v 2 L ) q ( v 1 L v 2 L ) q ) 1 / q , ( ( v 1 U ) q + ( v 2 U ) q ( v 1 U v 2 U ) q ) 1 / q ] )

  3. λ α 1 = ( [ ( 1 ( 1 ( μ 1 L ) q ) λ ) 1 / q , ( 1 ( 1 ( μ 1 U ) q ) λ ) 1 / q ] , [ ( η 1 L ) λ , ( η 1 U ) λ ] , [ ( v 1 L ) λ , ( v 1 U ) λ ] )

  4. ( α 1 ) λ = ( [ ( μ 1 L ) λ , ( μ 1 U ) λ ] , [ ( 1 ( 1 ( η 1 L ) q ) λ ) 1 / q , ( 1 ( 1 ( η 1 U ) q ) λ ) 1 / q ] , [ ( 1 ( 1 ( v 1 L ) q ) λ ) 1 / q , ( 1 ( 1 ( v 1 U ) q ) λ ) 1 / q ] )

Definition 3

(Ullah et al. [7]) Let an IVTSFN be α = ( [ μ L , μ U ] , [ η L , η U ] , [ v L , v U ] ) , then its score function sc ( α ) is as follows:

(2) sc ( α ) = ( μ L ) q ( 1 ( η L ) q ( v L ) q ) + ( μ U ) q ( 1 ( η U ) q ( v U ) q ) 3 .

According to the score function of IVTSFN, Ullah et al. [7] presented the comparison laws for two IVTSFNs, which is as follows: (1) if sc ( α 1 ) > sc ( α 2 ) , then α 1 > α 2 ; (2) if sc ( α 1 ) = sc ( α 2 ) , then α 1 α 2 .

2.2 Extended power aggregation operators

To depict the effect of extreme data, Xiong et al. [19] and Xiong et al. [20] proposed EPA operator and EPG operator, respectively.

Definition 4

(Xiong et al. [19]; Xiong et al. [20]) Let a set of nonnegative numbers a 1 , a 2 , , a n , then

  1. The EPA operator is defined as:

    (3) EPA ξ ( a 1 , a 2 , , a n ) = k = 1 n ( ξ + t ( a k ) ) a k k = 1 n ( ξ + t ( a k ) ) .

  2. The EPG operator is defined as:

(4) EPG ξ ( a 1 , a 2 , , a n ) = k = 1 n ( a k ) ( ξ + t ( a k ) ) j = 1 n ( ξ + t ( a k ) ) ,

where the parameter ξ ( , 1 n ] [ 0 , + ) , t ( a k ) = l = 1 , l k n Sup ( a k , a l ) , Sup ( a k , a l ) denotes the support of a l for a k and satisfies three conditions: (1) Sup ( a k , a l ) [ 0 , 1 ] ; (2) Sup ( a k , a l ) = Sup ( a l , a k ) ; (3) if | a k a l | | a p a q | , then Sup ( a k , a l ) Sup ( a p , a q ) .

It is worth noting that if DMs consider the extreme values to be error or bias information, the parameter takes ξ [ 0 , + ) . If DMs regard the extreme values as important information, the parameter takes ξ ( , 1 n ] .

2.3 IVTSFCE

To measure the difference between two IVISFNs, this subsection proposes the concept of IVTSFCE.

Definition 5

Let two IVISFNs be α 1 = ( [ μ 1 L , μ 1 U ] , [ η 1 L , η 1 U ] , [ v 1 L , v 1 U ] ) and α 2 = ( [ μ 2 L , μ 2 U ] , [ η 2 L , η 2 U ] , [ v 2 L , v 2 U ] ) , then IVTSFCE is calculated as:

(5) CE ( α 1 , α 2 ) = 1 6 ln 2 μ 1 L ln 2 μ 1 L μ 1 L + μ 2 L + ( 1 μ 1 L ) ln 2 ( 1 μ 1 L ) 2 μ 1 L μ 2 L + μ 1 U ln 2 μ 1 U μ 1 U + μ 2 U + ( 1 μ 1 U ) ln 2 ( 1 μ 1 U ) 2 μ 1 U μ 2 U + η 1 L ln 2 η 1 L η 1 L + η 2 L + ( 1 η 1 L ) ln 2 ( 1 η 1 L ) 2 η 1 L η 2 L + η 1 U ln 2 η 1 U η 1 U + η 2 U + ( 1 η 1 U ) ln 2 ( 1 η 1 U ) 2 η 1 U η 2 U + v 1 L ln 2 v 1 L v 1 L + v 2 L + ( 1 v 1 L ) ln 2 ( 1 v 1 L ) 2 v 1 L v 2 L + v 1 U ln 2 v 1 U v 1 U + v 2 U + ( 1 v 1 U ) ln 2 ( 1 v 1 U ) 2 v 1 U v 2 U .

It is worth noting that CE ( α 1 , α 2 ) does not satisfy symmetry. Thus, this study proposes IVTSFSCE.

Definition 6

Let two IVISFNs be α 1 = ( [ μ 1 L , μ 1 U ] , [ η 1 L , η 1 U ] , [ v 1 L , v 1 U ] ) and α 2 = ( [ μ 2 L , μ 2 U ] , [ η 2 L , η 2 U ] , [ v 2 L , v 2 U ] ) , then IVTSFSCE can be defined as:

(6) DE ( α 1 , α 2 ) = 1 2 ( CE ( α 1 , α 2 ) + CE ( α 2 , α 1 ) ) .

Property 1

Let DE ( α 1 , α 2 ) be the symmetric CE between α 1 and α 2 , then it meets the following properties:

(1) DE ( α 1 , α 2 ) = DE ( α 2 , α 1 ) ;

(2) 0 DE ( α 1 , α 2 ) 1 ;

(3) DE ( α 1 , α 2 ) = 0 if and only if α 1 = α 2 .

Proof

Property (1) is obvious; thus, this article proves properties (2) and (3).

Property (2): It is easy to have

0 μ 1 L ln 2 μ 1 L μ 1 L + μ 2 L + ( 1 μ 1 L ) ln 2 ( 1 μ 1 L ) 2 μ 1 L μ 2 L μ 1 L ln 2 + ( 1 μ 1 L ) ln 2 .

Thus, we can derive

CE ( α 1 , α 2 ) 1 6 ln 2 ( μ 1 L ln 2 + ( 1 μ 1 L ) ln 2 + μ 1 U ln 2 + ( 1 μ 1 U ) ln 2 + η 1 L ln 2 + ( 1 η 1 L ) ln 2 + η 1 U ln 2 + ( 1 η 1 U ) ln 2 + v 1 L ln 2 + ( 1 v 1 L ) ln 2 + v 1 U ln 2 + ( 1 v 1 U ) ln 2 ) = 1 6 ln 2 × 6 ln 2 = 1 .

Furthermore, we can have 0 DE ( α 1 , α 2 ) 1 .

Property (3): Let the function be f ( t ) = ln t . Then, its first-order and second-order derivatives are f ( t ) = 1 / t < 0 and f ( t ) = 1 / t 2 > 0 , respectively, which implies that f ( x ) is a concave function. According to the properties of concave functions, there must exist ln ( λ 1 t 1 + λ 2 t 2 ) λ 1 ln t 1 λ 2 ln t 2 , with λ 1 + λ 2 = 1 and λ 1 , λ 2 ( 0 , 1 ) . Moreover, ln ( λ 1 t 1 + λ 2 t 2 ) = λ 1 ln t 1 λ 2 ln t 2 if and only if t 1 = t 2 .

Assume t 1 = ( μ 1 L + μ 2 L ) / 2 μ 1 L , t 2 = ( 2 μ 1 L μ 2 L ) / ( 2 2 μ 1 L ) , λ 1 = μ 1 L and λ 2 = 1 μ 1 L . Then, we can deduce that μ 1 L ln ( 2 μ 1 L / ( μ 1 L + μ 2 L ) ) + ( 1 μ 1 L ) ln ( 2 ( 1 μ 1 L ) / ( 2 μ 1 L μ 2 L ) ) = 0 if and only if ( μ 1 L + μ 2 L ) / μ 1 L = ( 2 μ 1 L μ 2 L ) / ( 2 2 μ 1 L ) μ 1 L = μ 2 L . Furthermore, we can have DE ( α 1 , α 2 ) = 0 if and only if α 1 = α 2 .□

3 Interval-valued T-spherical fuzzy extended power aggregation operators

Inspired by EPA and EPG operators, this section proposes four interval-valued T-spherical fuzzy extended power aggregation operators, such as IVTSFEPA, IVTSFEPG, IVTSFEPWA, and IVTSFEPWG operators.

3.1 IVTSFEPA and IVTSFEPG operators

Definition 7

Let a set of IVTSFNs be α k = ( [ μ k L , μ k U ] , [ η k L , η k U ] , [ v k L , v k U ] ) ( k = 1 , 2 , , n ) , then

  1. The IVTSFEPA operator is expressed as:

    (7) IVTSFEPA ξ ( α 1 , α 2 , , α n ) = k = 1 n ξ + t ( α k ) k = 1 n ( ξ + t ( α k ) ) α k .

  2. The IVTSFEPG operator is defined as:

(8) IVTSFEPG ξ ( α 1 , α 2 , , α n ) = k = 1 n ( α k ) ξ + t ( α k ) k = 1 n ( ξ + t ( α k ) ) ,

where the parameter ξ ( , 1 n ] [ 0 , + ) , , Sup ( α k , α l ) denotes the support of α l for α k and satisfies three conditions: (1) Sup ( α k , α l ) [ 0 , 1 ] ; (2) Sup ( α k , α l ) = Sup ( α l , α k ) ; (3) if DE ( α k , α l ) DE ( α p , α q ) , then Sup ( α k , α l ) Sup ( α p , α q ) .

According to Definition 7, the support Sup ( α k , α l ) is similar to the similarity between two IVTSFNs. If two IVTSFNs are more similar, their support degree is larger. Thus, this study assumes Sup ( α k , α l ) = 1 DE ( α k , α l ) .

Theorem 1

Let a set of IVTSFNs be α k = ( [ μ k L , μ k U ] , [ η k L , η k U ] , [ v k L , v k U ] ) ( k = 1 , 2 , , n ) , then the results obtained by IVTSFEPA and IVTSFEPG operators are still an IVTSFN. The corresponding calculation results are

(9) IVTSFEPA ξ ( α 1 , α 2 , , α n ) = 1 k = 1 n ( 1 ( μ k L ) q ) ξ + t ( α k ) k = 1 n ( ξ + t ( α k ) ) q , 1 k = 1 n ( 1 ( μ k U ) q ) ξ + t ( α k ) k = 1 n ( ξ + t ( α k ) ) q , k = 1 n ( η k L ) ξ + t ( α k ) k = 1 n ( ξ + t ( α k ) ) , k = 1 n ( η k U ) ξ + t ( α k ) k = 1 n ( ξ + t ( α k ) ) , k = 1 n ( v k L ) ξ + t ( α k ) k = 1 n ( ξ + t ( α k ) ) , k = 1 n ( v k U ) ξ + t ( α k ) k = 1 n ( ξ + t ( α k ) ) ,

(10) IVTSFEPG ξ ( α 1 , α 2 , , α n ) = k = 1 n ( μ i L ) ξ + t ( α k ) k = 1 n ( ξ + t ( α k ) ) , k = 1 n ( μ k U ) ξ + t ( α k ) k = 1 n ( ξ + t ( α k ) ) , 1 k = 1 n ( 1 ( η k L ) q ) ξ + t ( α k ) k = 1 n ( ξ + t ( α k ) ) q , 1 k = 1 n ( 1 ( η k U ) q ) ξ + t ( α k ) k = 1 n ( ξ + t ( α k ) ) q , 1 k = 1 n ( 1 ( v k L ) q ) ξ + t ( α k ) k = 1 n ( ξ + t ( α k ) ) q , 1 k = 1 n ( 1 ( v k U ) q ) ξ + t ( α k ) k = 1 n ( ξ + t ( α k ) ) q .

Proof

According to the operator law of IVTSFE in Definition 2, we have

(11) k = 1 n ( ξ + t ( α k ) ) α k = 1 i = 1 n ( 1 ( μ i L ) q ) ξ + t ( α k ) q , 1 k = 1 n ( 1 ( μ k U ) q ) ξ + t ( α k ) q , k = 1 n ( η k L ) ξ + t ( α k ) , i = 1 n ( η i U ) ξ + t ( α k ) , k = 1 n ( v k L ) ξ + t ( α k ) , i = 1 n ( v i U ) ξ + t ( α k ) .

Based on the first mathematical induction, we obtain

( ξ + t ( α 1 ) ) α 1 = { [ 1 ( 1 ( μ 1 L ) q ) ξ + t ( α 1 ) q , 1 ( 1 ( μ 1 U ) q ) ξ + t ( α 1 ) q ] , [ ( η 1 L ) ξ + t ( α 1 ) , ( η 1 U ) ξ + t ( α 1 ) ] , [ ( v 1 L ) ξ + t ( α 1 ) , ( v 1 U ) ξ + t ( α 1 ) ] }

( ξ + t ( α 2 ) ) α 2 = { [ 1 ( 1 ( μ 2 L ) q ) ξ + t ( α 2 ) q , 1 ( 1 ( μ 2 U ) q ) ξ + t ( α 2 ) q ] , [ ( η 2 L ) ξ + t ( α 2 ) , ( η 2 U ) ξ + t ( α 2 ) ] , [ ( v 2 L ) ξ + t ( α 2 ) , ( v 2 U ) ξ + t ( α 2 ) ] }

Then, we can obtain

k = 1 2 ( ξ + t ( α k ) ) α k = { [ 1 ( 1 ( μ 1 L ) q ) ξ + t ( α 1 ) + 1 ( 1 ( μ 2 L ) q ) ξ + t ( α 2 ) ( 1 ( 1 ( μ 1 L ) q ) ξ + t ( α 1 ) ) × ( 1 ( 1 ( μ 2 L ) q ) ξ + t ( α 2 ) ) q , 1 ( 1 ( μ 1 U ) q ) ξ + t ( α 1 ) + 1 ( 1 ( μ 2 U ) q ) ξ + t ( α 2 ) ( 1 ( 1 ( μ 1 U ) q ) ξ + t ( α 1 ) ) × ( 1 ( 1 ( μ 2 U ) q ) ξ + t ( α 2 ) ) q ] , [ ( η 1 L ) ξ + t ( α 1 ) × ( η 2 L ) ξ + t ( α 1 ) , ( η 1 U ) ξ + t ( α 1 ) × ( η 1 U ) ξ + t ( α 1 ) ] , [ ( v 1 L ) ξ + t ( α 1 ) × ( v 2 L ) ξ + t ( α 1 ) , ( v 1 U ) ξ + t ( α 1 ) × ( v 1 U ) ξ + t ( α 1 ) ] }

= 1 k = 1 2 ( 1 ( μ k L ) q ) ξ + t ( α k ) q , 1 k = 1 2 ( 1 ( μ k U ) q ) ξ + t ( α k ) q , k = 1 2 ( η k L ) ξ + t ( α k ) , k = 1 2 ( η k U ) ξ + t ( α k ) , k = 1 2 ( v k L ) ξ + t ( α k ) , k = 1 2 ( v k U ) ξ + t ( α k ) .

Furthermore, we assume equation (9) holds when n = r , and obtain

k = 1 r ( ξ + t ( α k ) ) α k = 1 i = 1 r ( 1 ( μ i L ) q ) ξ + t ( α k ) q , 1 k = 1 r ( 1 ( μ k U ) q ) ξ + t ( α k ) q , k = 1 r ( η k L ) ξ + t ( α k ) , i = 1 r ( η i U ) ξ + t ( α k ) , k = 1 r ( v k L ) ξ + t ( α k ) , i = 1 r ( v i U ) ξ + t ( α k ) .

Final, when n = r + 1 , we have

k = 1 r ( ξ + t ( α k ) ) α k ( ξ + t ( α r + 1 ) ) α r + 1 = 1 k = 1 r ( 1 ( μ k L ) q ) ξ + t ( α k ) + 1 ( 1 ( μ r + 1 L ) q ) ξ + t ( α r + 1 ) 1 k = 1 r ( 1 ( μ k L ) q ) ξ + t ( α k ) ) × ( 1 ( 1 ( μ r + 1 L ) q ) ξ + t ( α r + 1 ) q ,

1 k = 1 r ( 1 ( μ k U ) q ) ξ + t ( α k ) + 1 ( 1 ( μ r + 1 U ) q ) ξ + t ( α r + 1 ) 1 k = 1 r ( 1 ( μ k U ) q ) ξ + t ( α k ) ) × ( 1 ( 1 ( μ r + 1 U ) q ) ξ + t ( α r + 1 ) q , k = 1 r ( η k L ) ξ + t ( α k ) × ( η r + 1 L ) ξ + t ( α r + 1 ) , k = 1 r ( η k U ) ξ + t ( α k ) × ( η r + 1 U ) ξ + t ( α r + 1 ) , k = 1 r ( v k L ) ξ + t ( α k ) × ( v r + 1 L ) ξ + t ( α r + 1 ) , k = 1 r ( v k U ) ξ + t ( α k ) × ( v r + 1 U ) ξ + t ( α r + 1 )

= 1 k = 1 r + 1 ( 1 ( μ k L ) q ) ξ + t ( α k ) q , 1 k = 1 r + 1 ( 1 ( μ k U ) q ) ξ + t ( α k ) q , k = 1 r + 1 ( η k L ) ξ + t ( α k ) , k = 1 r + 1 ( η k U ) ξ + t ( α k ) , k = 1 r + 1 ( v k L ) ξ + t ( α k ) , k = 1 r + 1 ( v k U ) ξ + t ( α k )

Therefore, equation (11) holds. Furthermore, we can obtain

k = 1 n ξ + t ( α k ) k = 1 n ( ξ + t ( α k ) ) α k = 1 k = 1 n ( 1 ( μ k L ) q ) ξ + t ( α k ) k = 1 n ( ξ + t ( α k ) ) q , 1 k = 1 n ( 1 ( μ k U ) q ) ξ + t ( α k ) k = 1 n ( ξ + t ( α k ) ) q , k = 1 n ( η k L ) ξ + t ( α k ) k = 1 n ( ξ + t ( α k ) ) , k = 1 n ( η k U ) ξ + t ( α k ) k = 1 n ( ξ + t ( α k ) ) , k = 1 n ( v k L ) ξ + t ( α k ) k = 1 n ( ξ + t ( α k ) ) , k = 1 n ( v k U ) ξ + t ( α k ) k = 1 n ( ξ + t ( α k ) ) .

In short, equation (10) holds. Since μ k L μ k U , η k L η k U , and v k L v k U , there must be

1 k = 1 n ( 1 ( μ k L ) q ) ξ + t ( α k ) k = 1 n ( ξ + t ( α k ) ) q 1 k = 1 n ( 1 ( μ k U ) q ) ξ + t ( α k ) k = 1 n ( ξ + t ( α k ) ) q

k = 1 n ( η k L ) ξ + t ( α k ) k = 1 n ( ξ + t ( α k ) ) k = 1 n ( η k U ) ξ + t ( α k ) k = 1 n ( ξ + t ( α k ) )

k = 1 n ( v k L ) ξ + t ( α k ) k = 1 n ( ξ + t ( α k ) ) k = 1 n ( v k U ) ξ + t ( α k ) k = 1 n ( ξ + t ( α k ) )

In addition, we obtain

1 k = 1 n ( 1 ( μ k U ) q ) ξ + t ( α k ) k = 1 n ( ξ + t ( α k ) ) q q + k = 1 n ( η k U ) ξ + t ( α k ) k = 1 n ( ξ + t ( α k ) ) q + k = 1 n ( v k U ) ξ + t ( α k ) k = 1 n ( ξ + t ( α k ) ) q 1 .

Hence, the calculation result of IVTSFEPA operator is still an IVTSFN. The proof for IVTSFEPA operator meeting Theorem 1 is similar to the proof for IVTSFEPG operator meeting Theorem 1, which is omitted in this study.□

Property 2

(Idempotence) Let α 1 , α 2 , , α n be a set of IVTSFNs with α 1 = α 2 = = α n = α , then

(12) IVTSFEPA ξ ( α 1 , α 2 , , α n ) = α ,

(13) IVTSFEPG ξ ( α 1 , α 2 , , α n ) = α .

Property 3

(Boundedness) Let α 1 , α 2 , , α n be a set of IVTSFNs. Then, we have α = ( [ min k μ k L , min k μ k U ] , [ max k η k L , max k η k U ] , [ max k v k L , max k v k U ] ) and α + = ( [ max k μ k L , max k μ k U ] , [ min k η k L , min k η k U ] , [ min k v k L , min k v k U ] ) . There exists

(14) α IVTSFEPA ξ ( α 1 , α 2 , , α n ) α + ,

(15) α IVTSFEPG ξ ( α 1 , α 2 , , α n ) α + .

Property 4

Let α 1 , α 2 , , α n be a set of IVTSFNs, and α 1 , α 2 , , α n be any replacement of α 1 , α 2 , , α n . Then, we have

(16) IVTSFEPA ξ ( α 1 , α 2 , , α n ) = IVTSFEPA ξ ( α 1 , α 2 , , α n ) ,

(17) IVTSFEPG ξ ( α 1 , α 2 , , α n ) = IVTSFEPG ξ ( α 1 , α 2 , , α n ) .

Property 5

(Monotonicity) Let the two sets of IVTSFNs be α 1 , α 2 , , α n and β 1 , β 2 , , β n , respectively, with α k β k ( k = 1 , 2 , , n ) . Then, we have

(18) IVTSFEPA ξ ( α 1 , α 2 , , α n ) IVTSFEPA ξ ( β 1 , β 2 , , β n ) ,

(19) IVTSFEPG ξ ( α 1 , α 2 , , α n ) IVTSFEPG ξ ( β 1 , β 2 , , β n ) .

3.2 IVTSFEPWA and IVTSFEPWG operators

In practice, different IVTSFNs may be assigned to different weights, and the IVTSFEPA and IVTSFEPG operators do not take into account the weights of IVTSFNs. Therefore, this sub-section proposes IVTSFEPWA and IVTSFEPWG operators.

Definition 8

Let a set of IVTSFNs be α 1 , α 2 , , α n , and its weight vector is w = ( w 1 , w 2 , , w n ) T with 0 w k 1 and k = 1 n w k = 1 . Then,

  1. The IVTSFEPWA operator is expressed as:

    (20) IVTSFEPWA ξ ( α 1 , α 2 , , α n ) = k = 1 n w k ( ξ + t ( α k ) ) k = 1 n w k ( ξ + t ( α k ) ) α k = 1 k = 1 n ( 1 ( μ k L ) q ) w k ( ξ + t ( α k ) ) k = 1 n w k ( ξ + t ( α k ) ) q , 1 k = 1 n ( 1 ( μ k U ) q ) w k ( ξ + t ( α k ) ) k = 1 n w k ( ξ + t ( α k ) ) q , k = 1 n ( η k L ) w k ( ξ + t ( α k ) ) k = 1 n w k ( ξ + t ( α k ) ) , k = 1 n ( η k U ) w k ( ξ + t ( α k ) ) k = 1 n w k ( ξ + t ( α k ) ) , k = 1 n ( v k L ) w k ( ξ + t ( α k ) ) k = 1 n w k ( ξ + t ( α k ) ) , k = 1 n ( v k U ) w k ( ξ + t ( α k ) ) k = 1 n w k ( ξ + t ( α k ) ) .

  2. The IVTSFEPWG operator is expressed as:

(21) IVTSFEPWG ξ ( α 1 , α 2 , , α n ) = k = 1 n ( α k ) w k ( ξ + t ( α k ) ) k = 1 n w k ( ξ + t ( α k ) ) = k = 1 n ( μ i L ) w k ( ξ + t ( α k ) ) k = 1 n w k ( ξ + t ( α k ) ) , k = 1 n ( μ k U ) w k ( ξ + t ( α k ) ) k = 1 n w k ( ξ + t ( α k ) ) , 1 k = 1 n ( 1 ( η k L ) q ) w k ( ξ + t ( α k ) ) k = 1 n w k ( ξ + t ( α k ) ) q , 1 k = 1 n ( 1 ( η k U ) q ) w k ( ξ + t ( α k ) ) k = 1 n w k ( ξ + t ( α k ) ) q , 1 k = 1 n ( 1 ( v k L ) q ) w k ( ξ + t ( α k ) ) k = 1 n w k ( ξ + t ( α k ) ) q , 1 k = 1 n ( 1 ( v k U ) q ) w k ( ξ + t ( α k ) ) k = 1 n w k ( ξ + t ( α k ) ) q .

Clearly, IVTSFEPWA and IVTSFEPWG operators still satisfy Theorem 1, as well as properties 2–5. Moreover, if w 1 = w 2 = = w n = 1 / n , then IVTSFEPWA and IVTSFEPWG operators reduce to IVTSFEPA and IVTSFEPG operators, respectively.

4 MCDM model based on interval-valued T-spherical fuzzy extended power aggregation operators and IVTSFCE

This section proposes a novel MCDM model using interval-valued T-spherical fuzzy extended power aggregation operators and IVTSFCE. First, with the aid of maximizing deviation approach and IVTSFCE, the criteria weights are determined. Moreover, IVTSFEPWA and IVTSFEPWG operators are used to obtain comprehensive evaluation results of alternatives. In the end, the ranking of alternative is determined according to their comprehensive evaluation results.

4.1 Problem description

Suppose that an IVTSF-MCDM problem involves m alternatives X = { x i | i = 1 , 2 , , m } and n criteria C = { c j | j = 1 , 2 , , n } . Let M = ( α i j ) m × n be a decision matrix given by DMs, where the IVTSFN α i j = ( [ μ i j L , μ i j U ] , [ η i j L , η i j U ] , [ v i j L , v i j U ] ) represents the evaluation of alternative x i under criterion c j . The decision matrix M can be shown as:

M = ( α i j ) m × n = c 1 c 2 c n x 1 x 2 x m α 11 α 12 α 1 n α 21 α 22 α 2 n α m 1 α m 2 α m n

4.2 Determination of criteria weights by maximizing deviation approach and IVTSFCE

In this sub-section, motivated by the maximizing deviation approach (Farrokhizadeh et al. [21]), we develop a maximizing CE to obtain the criteria weights under interval-valued T-spherical fuzzy environments.

First, the CE between the alternative x i and other alternatives x k ( k = 1 , 2 , , m , k i ) with respect to the criteria c j is calculated as follows:

(22) DE i k = 1 m 1 g = 1 , g i m DE ( α i j , α g j ) ,

where

(23) CE ( α i j , α k j ) = 1 6 ln 2 μ i j L ln 2 μ i j L μ i j L + μ k j L + ( 1 μ i j L ) ln 2 ( 1 μ i j L ) 2 μ i j L μ k j L + μ i j U ln 2 μ i j U μ i j U + μ k j U + ( 1 μ i j U ) ln 2 ( 1 μ i j U ) 2 μ i j U μ k j U + η i j L ln 2 η i j L η i j L + η k j L + ( 1 η i j L ) ln 2 ( 1 η i j L ) 2 η i j L η k j L + η i j U ln 2 η i j U η i j U + η k j U + ( 1 η i j U ) ln 2 ( 1 η i j U ) 2 η i j U η k j U + v i j L ln 2 v i j L v i j L + v k j L + ( 1 v i j L ) ln 2 ( 1 v i j L ) 2 v i j L v k j L + v 1 U ln 2 v i j U v i j U + v k j U + ( 1 v i j U ) ln 2 ( 1 v i j U ) 2 v i j U v k j U .

Next, the overall CE of all alternatives concerning the criteria c j is calculated as follows:

(24) DE j = 1 m 1 i = 1 m g = 1 , g i m DE ( α i j , α g j ) .

The weighted CE function is then constructed as follows:

(25) DE ( w ) = 1 m 1 j = 1 n w j i = 1 m g = 1 , g i m DE ( α i j , α g j ) .

Then, the following optimization model is constructed to compute the optimal weight vector of criteria, as follows:

(26) max 1 m 1 j = 1 n w j i = 1 m g = 1 , g i m DE ( α i j , α g j ) 0 w 1 , w 2 , , w n 1 j = 1 n ( w j ) 2 = 1 .

The Lagrange function is constructed to obtain the solution of the aforementioned model as follows:

(27) L ( w , χ ) = 1 m 1 j = 1 n i = 1 m g = 1 , g i m DE ( α i j , α g j ) w j + χ j = 1 n ( w j ) 2 1 .

The criteria weight vector after solving the Lagrange function is obtained as follows:

(28) w j = i = 1 m g = 1 , g i m DE ( α i j , α g j ) j = 1 n i = 1 m g = 1 , g i m DE ( α i j , α g j ) .

4.3 Aggregation of the evaluation results of alternatives by using interval-valued T-spherical fuzzy extended power aggregation operators

In this sub-section, we adopt IVTSFPWA and IVTSFPWG operators to aggregate the evaluation results of alternatives, aiming at obtaining the comprehensive evaluation results of alternatives. The calculation process is as follows:

  1. Calculate the support degrees of criteria values by the following equation:

    (29) Sup ( α i j , α i j ) = 1 DE ( α i j , α i j ) , i = 1 , 2 , , m ; j , j = 1 , 2 , , n , j j .

  2. Calculate the total support degrees of criteria values by the following equation:

    (30) t ( α i j ) = j = 1 j j n Sup ( α i j , α i j ) , i = 1 , 2 , , m ; j = 1 , 2 , , n .

  3. Calculate the weight information of criteria values by the following equation:

    (31) ω i j = ( ξ + t ( α i j ) ) w j j = 1 n ( ξ + t ( α i j ) ) w j , i = 1 , 2 , , m ; j = 1 , 2 , , n .

  4. Utilize IVTSFPWA and IVTSFPWG operators to aggregate the evaluation results of alternatives, as follows:

    (32) α i A = IVTSFEPWA ξ ( α i 1 , α i 2 , , α i n ) = j = 1 n ω i j α i j = 1 j = 1 n ( 1 ( μ i j L ) q ) ω i j q , 1 j = 1 n ( 1 ( μ i j U ) q ) ω i j q , j = 1 n ( η i j L ) ω i j , j = 1 n ( η i j U ) ω i j , j = 1 n ( v i j L ) ω i j , j = 1 n ( v i j U ) ω i j ,

    (33) α i G = IVTSFEPWG ξ ( α i 1 , α i 2 , , α i n ) = j = 1 n ( α i j ) ω i j = j = 1 n ( μ i j L ) ω i j , j = 1 n ( μ i j U ) ω i j , 1 j = 1 n ( 1 ( η i j L ) q ) ω i j q , 1 j = 1 n ( 1 ( η i j U ) q ) ω i j q , 1 j = 1 n ( 1 ( v i j L ) q ) ω i j q , 1 j = 1 n ( 1 ( v i j U ) q ) ω i j q .

  5. Calculate the score values of α i { α i A , α i G } ( i = 1 , 2 , , m ) . In general, a higher score value of an alternative indicates that its performance is better.

4.4 Process of the proposed IVTSF-MCDM model

According to the former analysis, the procedure of the proposed IVTSF-MCDM model is as follows:

Stage 1. Collect the evaluation results given by DMs.

 Step 1.1: Determine m alternatives { x i | i = 1 , 2 , , m } and n criteria { c j j = 1 , 2 , , n } .

 Step 1.2: Ask DMs to provide their assessments of alternatives under criteria, and adopt IVTSFS to express these assessments; thus, obtain the interval-valued T-spherical fuzzy decision matrix M = ( α i j ) m × n .

Stage 2 . Determine criteria weights by maximizing deviation approach and IVTSFCE.

 Step 2.1: Compute the overall CE of all alternatives under each criterion through equations (22)–(24).

 Step 2.2: Construct optimization model with aid of equations (25) and (26).

 Step 2.3: Calculate the weights of criteria according to equations (27) and (28).

Stage 3. Calculate the comprehensive evaluation results of alternatives using interval-valued T-spherical fuzzy extended power aggregation operators.

 Step 3.1: Calculate the total support degrees of criteria values based on equations (29) and (30).

 Step 3.2: Calculate the weight information of criteria values, see equation (31).

 Step 3.3: Aggregate the criteria values of an alternative to obtain the comprehensive evaluation result of this alternative by utilizing IVTSFEPWA or IVTSFEPWG operator, see equations (32) and (33).

 Step 3.4: Rank the comprehensive evaluation results of alternatives to obtain the order of them by using the ranking method of IVTSFN.

5 Case analysis

5.1 Case description

A multinational corporation intends to invest in four countries, namely, Pakistan (x 1), Iran (x 2), The United Arab Emirates (x 3), and Bangladesh (x 4). Then, the board members of this corporation will assess the economic conditions of the aforementioned four countries, and the corresponding evaluation criteria are as follows:

  1. Comfort zone (c 1), which indicates the economic condition and the degree of social stability of the investee country.

  2. Government regulations (c 2), which represents the stability and rationality of relevant policies and regulations of the investee country.

  3. People’s interest (c 3), which is the degree of fit between the interests of the people of the invested country and the investment project.

  4. Market competition (c 4), which refers to the market competition in the invested country.

5.2 Solving the aforementioned case by the proposed method

In this subsection, the proposed method is employed to select the optimal invest country.

Stage 1. Collect the evaluation results given by DMs.

 Step 1.1–1.2: The board members evaluate four countries according to the aforementioned four evaluation criteria, and the relevant evaluation results are expressed in IVTSFNs. Then, Table 1 shows the assessment results of board members.

Table 1

Decision matrix

c 1 c 2 c 3 c 4
x 1 ([0.3,0.5], [0.4, 0.6], [0.2, 0.6]) ([0.1, 0.5], [0.3, 0.6], [0.4, 0.7]) ([0.2, 0.7], [0.4, 0.4], [0.3, 0.5]) ([0.4, 0.9], [0.5, 0.6], [0.3, 0.4])
x 2 ([0.4, 0.5], [0.2, 0.7], [0.6, 0.7]) ([0.4, 0.7], [0.3, 0.6], [0.5, 0.8]) ([0.4, 0.8], [0.2, 0.4], [0.1, 0.6]) ([0.3, 0.8], [0.4, 0.6], [0.2, 0.2])
x 3 ([0.8, 0.8], [0.1, 0.3], [0.5, 0.6]) ([0.2, 0.7], [0.1, 0.2], [0.4, 0.8]) ([0.7, 0.9], [0.3, 0.3], [0.4, 0.8]) ([0.3, 0.4], [0.4, 0.8], [0.4, 0.4])
x 4 ([0.2, 0.2], [0.5, 0.5], [0.2, 0.6]) ([0.5, 0.7], [0.3, 0.6], [0.3, 0.3]) ([0.2, 0.8], [0.3, 0.4], [0.1, 0.3]) ([0.1, 0.9], [0.3, 0.7], [0.5, 0.6])

Stage 2 . Determine criteria weights by maximizing deviation approach and IVTSFCE.

 Step 2.1: According to equations (22)–(24), the overall CE of all alternatives under each criterion are computed as:

DE 1 = 0.2524 , DE 2 = 0.1726 , DE 3 = 0.1550 , DE 4 = 0.1504

 Step 2.2–2.3: With the aid of equations (25)–(28), the weights of criteria are determined, which are as follows:

w 1 = 0.3456 , w 2 = 0.2363 , w 3 = 0.2122 , w 4 = 0.2059

Stage 3. Calculate the comprehensive evaluation results of alternatives by using interval-valued T-spherical fuzzy extended power aggregation operators.

 Step 3.1: The total support degrees of criteria values are calculated based on equations (29) and (30), which are shown in Table 2.

Table 2

Total support degree

c 1 c 2 c 3 c 4
x 1 2.9360 2.9066 2.9448 2.8885
x 2 2.8556 2.8881 2.8662 2.8288
x 3 2.8188 2.7993 2.8227 2.6898
x 4 2.7799 2.8608 2.8560 2.8079

 Step 3.2: Without losing generality, let ξ = 1 . Then, the weight information of criteria values is derived by using equation (31). The results are shown in Table 3.

Table 3

Weight information of criteria values

c 1 c 2 c 3 c 4
x 1 0.3469 0.2354 0.2135 0.2042
x 2 0.3452 0.2380 0.2125 0.2042
x 3 0.3484 0.2370 0.2141 0.2006
x 4 0.3419 0.2388 0.2141 0.2052

 Step 3.3: Let q = 5 . Then, we utilize IVTSFEPWA or IVTSFEPWG operator to aggregate the evaluation results of alternatives.

If adopting the IVTSFEPWA operator, then we have

α 1 A = ( [ 0.3132 , 0.7343 ] , [ 0.3912 , 0.5503 ] , [ 0.2789 , 0.5509 ] )

α 2 A = ( [ 0.3867 , 0.7231 ] , [ 0.2538 , 0.5805 ] , [ 0.3137 , 0.5414 ] )

α 3 A = ( [ 0.6960 , 0.7926 ] , [ 0.1671 , 0.3318 ] , [ 0.4323 , 0.6298 ] )

α 4 A = ( [ 0.3781 , 0.7686 ] , [ 0.3572 , 0.5335 ] , [ 0.2292 , 0.4383 ] )

If adopting the IVTSFEPWG operator, then we have

α 1 G = ( [ 0.2253 , 0.6057 ] , [ 0.4179 , 0.5766 ] , [ 0.3235 , 0.5990 ] )

α 2 G = ( [ 0.3772 , 0.6589 ] , [ 0.3098 , 0.6265 ] , [ 0.5113 , 0.6938 ] )

α 3 G = ( [ 0.4598 , 0.6917 ] , [ 0.3038 , 0.6002 ] , [ 0.4458 , 0.7165 ] )

α 4 G = ( [ 0.2159 , 0.4942 ] , [ 0.4155 , 0.5837 ] , [ 0.3726 , 0.5363 ] )

 Step 3.4: The score values of α 1 A , α 2 A , α 3 A , α 4 A , α 1 G , α 2 G , α 3 G , α 4 G are calculated by equation (2), respectively, such as sc ( α 1 A ) = 0.0649 , sc ( α 2 A ) = 0.0613 , sc ( α 3 A ) = 0.1471 , sc ( α 4 A ) = 0.0867 , sc ( α 1 G ) = 0.0235 , sc ( α 2 G ) = 0.0332 , sc ( α 3 G ) = 0.0454 , and sc ( α 4 G ) = 0.0089 .

Thus, according to the aforementioned score values, the order of alternatives is x 3 x 4 x 1 x 2 when adopting the IVTSFEPWA operator, whereas the order of alternatives is x 3 x 2 x 1 x 4 when adopting the IVTSFEPWG operator.

Obviously, The United Arab Emirates (x 3) is the best country to invest in when adopting two aggregation operators. However, the order of other countries derived by the IVTSFEPWA operator is inconsistent with that derived by the IVTSFEPWG operator. The reason for this gap is their focus is different. The IVTSFEPWA operator emphasizes the overall level of alternatives, whereas the IVTSFEPWG operator pays attention to the strengths of alternatives in a single criterion.

5.3 Sensitivity analysis

According to the proposed method, different values of parameters ξ and q may cause different score values of alternatives, thus affecting the ranking result of alternatives. Therefore, this sub-section calculates the score values of countries with different values of ξ and q to validate their influence on the sorting results based on the aforementioned case.

The parameter ξ represents DMs’ preferences on extreme data. If the value of ξ is larger than zero, it means extreme data belonging to error or bias information. On the contrary, it implies that extreme data are very important when the value of ξ is smaller than zero. In case of q = 5 , the values of ξ are set from interval [ 13 , 4 ] [ 0 , 9 ] in increments of 1 for sensitivity analysis. Figure 1 shows the effect of different ξ values on the score values of countries.

Figure 1 
                  Score values of countries with the different values of 
                        
                           
                           
                              ξ
                           
                           \xi 
                        
                     : (a) score values of countries derived by the IVTSEFPWA operator under different 
                        
                           
                           
                              ξ
                           
                           \xi 
                        
                      and (b) score values of countries derived by the IVTSFEPWG operator under different 
                        
                           
                           
                              ξ
                           
                           \xi 
                        
                     .
Figure 1

Score values of countries with the different values of ξ : (a) score values of countries derived by the IVTSEFPWA operator under different ξ and (b) score values of countries derived by the IVTSFEPWG operator under different ξ .

As can be seen from Figure 1, when using the IVTSFEPWA operator with different values of ξ , the sorting result of countries is still x 3 x 4 x 1 x 2 . Meanwhile, if employing the IVTSFEPWG operator with different values of ξ , the order of countries is x 3 x 2 x 1 x 4 . Therefore, we can conclude that parameter ξ does not affect the final decision result.

The parameter q reflects the space range of DMs’ beliefs about membership degree, abstinence degree, and non-membership degree. Generally, a larger value of q indicates the larger range of the space of DMs’ beliefs. In case of ξ = 1 , the values of parameter q are set from interval [ 1 , 20 ] in increments of 1 for calculating the score values of countries, which are shown in Figure 2.

Figure 2 
                  Score values of countries with the different values of 
                        
                           
                           
                              q
                           
                           q
                        
                     : (a) score values of countries derived by the IVTSFEPWA operator under different
                        
                           
                           
                              q
                           
                           q
                        
                      and (b) score values of countries derived by the IVTSFEPWG operator under different
                        
                           
                           
                              q
                           
                           q
                        
                     .
Figure 2

Score values of countries with the different values of q : (a) score values of countries derived by the IVTSFEPWA operator under different q and (b) score values of countries derived by the IVTSFEPWG operator under different q .

From Figure 2, it can be observed that

  1. when q [ 1 , 3 ] and using the IVTSFEPWA operator, the sorting result is x 3 x 4 x 2 x 1 ;

  2. when q [ 4 , 20 ] and using the IVTSFEPWA operator, the sorting result is x 3 x 4 x 1 x 2 ;

  3. when q = 1 and using the IVTSFEPWG operator, the sorting result is x 3 x 4 x 1 x 2 ;

  4. when q [ 2 , 20 ] and using the IVTSFEPWG operator, the sorting result is x 3 x 2 x 1 x 4 .

Thus, the change of the value of q will have an impact on the final sorting result, but it will not result in the change of the optimal solution.

5.4 Comparative analysis

To demonstrate the advantages of the proposed method, we compare it the following methods, respectively.

  1. The MCDM method-based IVTSFWA or IVTSFWG operator (namely the integrated operation-based method) [7]. This method adopts IVTSFWA and IVTSFWG operator to obtain the total evaluation result of each alternative. Then, the score values of total evaluation results are calculated to rank alternatives.

  2. The IVTSF-MCDM method based on technique for order performance by similarity to ideal solution (TOPSIS) (namely, IVTSF-TOPSIS) [27]. This method depends on the relative closeness of alternatives to sort alternatives.

  3. The IVTSF-MCDM method based on TODIM (an acronym in Portuguese of interactive and MCDM) (namely, IVTSF-TODIM) (Ju et al. [28]). This method relies on the dominance of an alternative over other alternatives to compute the overall prospect value of this alternative that is used to rank alternatives.

For ensuring the rationality of the comparison, all methods use the evaluation information and criteria weight in the aforementioned case. The comparison details and the ranking of countries obtained by the aforementioned three methods are shown in Table 4 and Figure 3.

Table 4

Results obtained by different methods

Countries The integrated operation-based method IVTSF-TOPSIS IVTSF-TODIM Proposed method
IVTSFWA Rank IVTSFWG Rank Relative closeness Rank Overall prospect value Rank IVTSFEPWA IVTSFEPWG
Score values Score values Rank Rank
x 1 0.1083 4 0.0520 4 0.2222 4 0.0000 4 3 3
x 2 0.1423 3 0.0993 2 0.4897 2 0.0099 3 4 2
x 3 0.3846 1 0.1263 1 0.7148 1 1.0000 1 1 1
x 4 0.1846 2 0.0589 3 0.2704 3 0.2101 2 2 4
Figure 3 
                  Sorting results of different methods.
Figure 3

Sorting results of different methods.

As shown in Table 4 and Figure 3, the optimal country obtained from all methods is x 3, which means the proposed method is valid. Meanwhile, the ranking results of the other countries obtained by the proposed method and other methods are different. The reason for these gaps is as follows:

  1. Both IVTSFWA and IVTSFWG operators simply aggregate the evaluations of alternatives, which ignores the effects of extreme values on the final result. The IVTSFEPWA and IVTSFEPWG operator utilize the parameter ξ to effectively show the impact of extreme values on the ranking of alternatives. Therefore, the calculation results derived by the proposed method are more reasonable than that derived by IVTSFWA and IVTSFWG operators.

  2. The ranking index of IVTSF-TOPSIS and IVTSF-TODIM differs from that of the proposed method. The IVTSF-TOPSIS adopts the relative closeness to rank alternatives, which focus on the utility values of alternatives through reference points. The IVTSF-TODIM employs the overall prospect value to sort alternatives, which depends on the preference, indifference, and incomparability relations among alternatives to determine the priorities of alternatives. However, both IVTSF-TOPSIS and IVTSF-TODIM do not consider too high or too low evaluation results may affect the performances of alternatives. Conversely, the proposed method uses the IVTSFEPWA and IVTSFEPWG operator to overcome this shortcoming of IVTSF-TOPSIS and IVTSF-TODIM. Thus, the proposed method can provide more realistic results by comparing with IVTSF-TOPSIS and IVTSF-TODIM.

According to the aforementioned comparative analysis, we can conclude that the proposed method has a main advantage that the impact of extreme data is effectively considered under interval-valued T-spherical fuzzy environment.

6 Conclusion

In view of most of the existing IVTSF-MCDM methods that neglect the impacts of extreme data, this study presents a novel MCDM method based on interval-valued T-spherical fuzzy extended power aggregation operator. With the aid of EPA and EPG operators, IVTSFEPA, IVTSFEPG, IVTSFEPWA, and IVTSFEPWG operators are defined to rank alternatives for MCDM problems. Moreover, IVTSFCE and IVTSFSCE are proposed to measure the difference between two IVTSFNs and are used to derive the weights of criteria in MCDM. Final, we prove that the proposed method can reflect the effect of too high or too low evaluation results on the ranking of alternatives by comparing with other IVTSF-MCDM methods.

There are several research directions for future studies. The maximizing deviation approach is used to calculate the objective weights of criteria, and it can be combined with subjective weighting methods to derive the importance of criteria in the future. In addition, the DMs’ irrational behaviors also can affect the order of alternatives. Therefore, the IVTSF-MCDM method considering DMs’ irrational behaviors is our next work.

Acknowledgments

The author thank the anonymous reviewers for their advice, which has led to an improvement of this article.

  1. Funding information: The author states no funding invloved.

  2. Author contributions: Lu Chen has performed the data analysis and the validation, and wrote the manuscript.

  3. Conflict of interest: The author has no relevant financial or non-financial interests to disclose.

  4. Data availability statement: No data associated in the manuscript.

References

[1] Zadeh LA. Fuzzy sets. Inf Control. 1965;8(3):338–53.10.1016/S0019-9958(65)90241-XSearch in Google Scholar

[2] Atanassov K. Intuitionistic fuzzy sets. Fuzzy Sets Syst. 1986;20(1):87–96.10.1016/S0165-0114(86)80034-3Search in Google Scholar

[3] Yager RR. Pythagorean membership grades, complex numbers and decision making. Int J Intell Syst. 2013;28(5):436–52.10.1002/int.21584Search in Google Scholar

[4] Yager RR, Alajlan N. Approximate reasoning with generalized orthopair fuzzy sets. Inf Fusion. 2017;3(8):65–73.10.1016/j.inffus.2017.02.005Search in Google Scholar

[5] Cuong BC. Picture fuzzy sets. J Comput Sci Cybern. 2013;30:409–20.Search in Google Scholar

[6] Mahmood T, Ullah K, Khan Q, Jan N. An approach toward decision-making and medical diagnosis problems using the concept of spherical fuzzy sets. Neural Comput Appl. 2019;31(11):7041–53.10.1007/s00521-018-3521-2Search in Google Scholar

[7] Ullah K, Hassan N, Mahmood T, Jan N, Hassan M. Evaluation of investment policy based on multi-attribute decision-making using interval valued T-spherical fuzzy aggregation operators. Symmetry. 2019;11(3):357.10.3390/sym11030357Search in Google Scholar

[8] Jin Y, Kousar Z, Ullah K, Mahmood T, Pehlivan NY, Ali Z. Approach to multi-attribute decision-making methods for performance evaluation process using interval-valued T-spherical fuzzy Hamacher aggregation information. Axioms. 2021;10(3):145.10.3390/axioms10030145Search in Google Scholar

[9] Ullah K, Garg H, Gul Z, Mahmood T, Khan Q, Ali Z. Interval valued T-spherical fuzzy information aggregation based on Dombi t-norm and Dombi t-conorm for multi-attribute decision making problems. Symmetry. 2021;13(6):1053.10.3390/sym13061053Search in Google Scholar

[10] Hussain A, Ullah K, Wang H, Bari M. Assessment of the business proposals using Frank aggregation operators based on interval-valued T-spherical fuzzy information. J Funct Spaces. 2022;28880340:1–24.10.1155/2022/2880340Search in Google Scholar

[11] Akram M, Ullah K, Pamucar D. Performance evaluation of solar energy cells using the interval-valued T-spherical fuzzy Bonferroni mean operators. Energies. 2022;15(1):292.10.3390/en15010292Search in Google Scholar

[12] Yang Z, Zhang T, Garg H, et al. A multi-criteria framework for addressing digitalization solutions of medical system under interval-valued T-spherical fuzzy information. Appl Soft Comput. 2022;130:109635.10.1016/j.asoc.2022.109635Search in Google Scholar

[13] Xu ZS, Yager RR. Power-geometric operators and their use in group decision making. IEEE Trans Fuzzy Syst. 2010;18(1):94–105.10.1109/TFUZZ.2009.2036907Search in Google Scholar

[14] Xu ZS. Approaches to multiple attribute group decision making based on intuitionistic fuzzy power aggregation operators. Knowl Syst. 2011;24(6):749–60.10.1016/j.knosys.2011.01.011Search in Google Scholar

[15] Wei GW, Lu M. Pythagorean fuzzy power aggregation operators in multiple attribute decision making. Int J Intell Syst. 2018;33(1):169–86.10.1002/int.21946Search in Google Scholar

[16] Ju YB, Luo C, Ma J, Wang AH. A novel multiple-attribute group decision-making method based on q-rung orthopair fuzzy generalized power weighted aggregation operators. Int J Intell Syst. 2019;34(9):2077–103.10.1002/int.22132Search in Google Scholar

[17] Liu PD, Khan Q, Mahmood T, Hassan N. T-spherical fuzzy power Muirhead mean operator based on novel operational laws and their application in multi-attribute group decision making. IEEE Access. 2019;7:22613–32.10.1109/ACCESS.2019.2896107Search in Google Scholar

[18] Zhang HY, Wei GW, Chen XD. Spherical fuzzy Dombi power Heronian mean aggregation operators for multiple attribute group decision-making. Comput Appl Math. 2022;41(3):98.10.1007/s40314-022-01785-7Search in Google Scholar

[19] Xiong SH, Chen ZS, Chang JP, Chin KS. On extended power average operators for decision-making: A case study in emergency response plan selection of civil aviation. Computers Ind Eng. 2019;130:258–71.10.1016/j.cie.2019.02.027Search in Google Scholar

[20] Xiong SH, Zhu CY, Chen ZS, Deveci M, Chiclana F, Skibniewski MJ. On extended power geometric operator for proportional hesitant fuzzy linguistic large-scale group decision-making. Inf Sci. 2023;632:637–63.10.1016/j.ins.2023.03.001Search in Google Scholar

[21] Farrokhizadeh E, Seyfi-Shishavan SA, Gündoğdu FK, Donyatalab Y, Kahraman C, Seifi SH. A spherical fuzzy methodology integrating maximizing deviation and TOPSIS methods. Eng Appl Artif Intell. 2021;101:104212.10.1016/j.engappai.2021.104212Search in Google Scholar

[22] Verma R. On intuitionistic fuzzy order-α divergence and entropy measures with MABAC method for multiple attribute group decision-making. J Intell Fuzzy Syst. 2021;40(1):1191–217.10.3233/JIFS-201540Search in Google Scholar

[23] Li LM, Zheng TT, Wu QY. Novel Pythagorean fuzzy entropy and Pythagorean fuzzy cross-entropy measures and their applications. J Intell Fuzzy Syst. 2021;41(6):6527–46.10.3233/JIFS-210365Search in Google Scholar

[24] Verma R. Multiple attribute group decision‐making based on order‐α divergence and entropy measures under q‐rung orthopair fuzzy environment. Int J Intell Syst. 2020;35(4):718–50.10.1002/int.22223Search in Google Scholar

[25] Wei GW. Picture fuzzy cross-entropy for multiple attribute decision making problems. J Bus Econ Manag. 2016;17(4):491–502.10.3846/16111699.2016.1197147Search in Google Scholar

[26] Yang W, Pang YF. T-Spherical fuzzy ORESTE method based on cross-entropy measures and its application in multiple attribute decision-making. Soft Comput. 2022;26(1):10371–87.10.1007/s00500-022-07287-2Search in Google Scholar

[27] Aydoğdu E, Güner E, Aldemir B, Aygün H. Complex spherical fuzzy TOPSIS based on entropy. Expert Syst Appl. 2023;215(1):119331.10.1016/j.eswa.2022.119331Search in Google Scholar

[28] Ju YB, Liang YY, Luo C, Dong PW, Santibanez EDR, Wang AH. T-spherical fuzzy TODIM method for multi-criteria group decision-making problem with incomplete weight information. Soft Comput. 2021;25(4):2981–3001.10.1007/s00500-020-05357-xSearch in Google Scholar

Received: 2024-01-11
Accepted: 2024-02-20
Published Online: 2024-04-15

© 2024 the author(s), published by De Gruyter

This work is licensed under the Creative Commons Attribution 4.0 International License.

Articles in the same Issue

  1. Research Articles
  2. A study on intelligent translation of English sentences by a semantic feature extractor
  3. Detecting surface defects of heritage buildings based on deep learning
  4. Combining bag of visual words-based features with CNN in image classification
  5. Online addiction analysis and identification of students by applying gd-LSTM algorithm to educational behaviour data
  6. Improving multilayer perceptron neural network using two enhanced moth-flame optimizers to forecast iron ore prices
  7. Sentiment analysis model for cryptocurrency tweets using different deep learning techniques
  8. Periodic analysis of scenic spot passenger flow based on combination neural network prediction model
  9. Analysis of short-term wind speed variation, trends and prediction: A case study of Tamil Nadu, India
  10. Cloud computing-based framework for heart disease classification using quantum machine learning approach
  11. Research on teaching quality evaluation of higher vocational architecture majors based on enterprise platform with spherical fuzzy MAGDM
  12. Detection of sickle cell disease using deep neural networks and explainable artificial intelligence
  13. Interval-valued T-spherical fuzzy extended power aggregation operators and their application in multi-criteria decision-making
  14. Characterization of neighborhood operators based on neighborhood relationships
  15. Real-time pose estimation and motion tracking for motion performance using deep learning models
  16. QoS prediction using EMD-BiLSTM for II-IoT-secure communication systems
  17. A novel framework for single-valued neutrosophic MADM and applications to English-blended teaching quality evaluation
  18. An intelligent error correction model for English grammar with hybrid attention mechanism and RNN algorithm
  19. Prediction mechanism of depression tendency among college students under computer intelligent systems
  20. Research on grammatical error correction algorithm in English translation via deep learning
  21. Microblog sentiment analysis method using BTCBMA model in Spark big data environment
  22. Application and research of English composition tangent model based on unsupervised semantic space
  23. 1D-CNN: Classification of normal delivery and cesarean section types using cardiotocography time-series signals
  24. Real-time segmentation of short videos under VR technology in dynamic scenes
  25. Application of emotion recognition technology in psychological counseling for college students
  26. Classical music recommendation algorithm on art market audience expansion under deep learning
  27. A robust segmentation method combined with classification algorithms for field-based diagnosis of maize plant phytosanitary state
  28. Integration effect of artificial intelligence and traditional animation creation technology
  29. Artificial intelligence-driven education evaluation and scoring: Comparative exploration of machine learning algorithms
  30. Intelligent multiple-attributes decision support for classroom teaching quality evaluation in dance aesthetic education based on the GRA and information entropy
  31. A study on the application of multidimensional feature fusion attention mechanism based on sight detection and emotion recognition in online teaching
  32. Blockchain-enabled intelligent toll management system
  33. A multi-weapon detection using ensembled learning
  34. Deep and hand-crafted features based on Weierstrass elliptic function for MRI brain tumor classification
  35. Design of geometric flower pattern for clothing based on deep learning and interactive genetic algorithm
  36. Mathematical media art protection and paper-cut animation design under blockchain technology
  37. Deep reinforcement learning enhances artistic creativity: The case study of program art students integrating computer deep learning
  38. Transition from machine intelligence to knowledge intelligence: A multi-agent simulation approach to technology transfer
  39. Research on the TF–IDF algorithm combined with semantics for automatic extraction of keywords from network news texts
  40. Enhanced Jaya optimization for improving multilayer perceptron neural network in urban air quality prediction
  41. Design of visual symbol-aided system based on wireless network sensor and embedded system
  42. Construction of a mental health risk model for college students with long and short-term memory networks and early warning indicators
  43. Personalized resource recommendation method of student online learning platform based on LSTM and collaborative filtering
  44. Employment management system for universities based on improved decision tree
  45. English grammar intelligent error correction technology based on the n-gram language model
  46. Speech recognition and intelligent translation under multimodal human–computer interaction system
  47. Enhancing data security using Laplacian of Gaussian and Chacha20 encryption algorithm
  48. Construction of GCNN-based intelligent recommendation model for answering teachers in online learning system
  49. Neural network big data fusion in remote sensing image processing technology
  50. Research on the construction and reform path of online and offline mixed English teaching model in the internet era
  51. Real-time semantic segmentation based on BiSeNetV2 for wild road
  52. Online English writing teaching method that enhances teacher–student interaction
  53. Construction of a painting image classification model based on AI stroke feature extraction
  54. Big data analysis technology in regional economic market planning and enterprise market value prediction
  55. Location strategy for logistics distribution centers utilizing improved whale optimization algorithm
  56. Research on agricultural environmental monitoring Internet of Things based on edge computing and deep learning
  57. The application of curriculum recommendation algorithm in the driving mechanism of industry–teaching integration in colleges and universities under the background of education reform
  58. Application of online teaching-based classroom behavior capture and analysis system in student management
  59. Evaluation of online teaching quality in colleges and universities based on digital monitoring technology
  60. Face detection method based on improved YOLO-v4 network and attention mechanism
  61. Study on the current situation and influencing factors of corn import trade in China – based on the trade gravity model
  62. Research on business English grammar detection system based on LSTM model
  63. Multi-source auxiliary information tourist attraction and route recommendation algorithm based on graph attention network
  64. Multi-attribute perceptual fuzzy information decision-making technology in investment risk assessment of green finance Projects
  65. Research on image compression technology based on improved SPIHT compression algorithm for power grid data
  66. Optimal design of linear and nonlinear PID controllers for speed control of an electric vehicle
  67. Traditional landscape painting and art image restoration methods based on structural information guidance
  68. Traceability and analysis method for measurement laboratory testing data based on intelligent Internet of Things and deep belief network
  69. A speech-based convolutional neural network for human body posture classification
  70. The role of the O2O blended teaching model in improving the teaching effectiveness of physical education classes
  71. Genetic algorithm-assisted fuzzy clustering framework to solve resource-constrained project problems
  72. Behavior recognition algorithm based on a dual-stream residual convolutional neural network
  73. Ensemble learning and deep learning-based defect detection in power generation plants
  74. Optimal design of neural network-based fuzzy predictive control model for recommending educational resources in the context of information technology
  75. An artificial intelligence-enabled consumables tracking system for medical laboratories
  76. Utilization of deep learning in ideological and political education
  77. Detection of abnormal tourist behavior in scenic spots based on optimized Gaussian model for background modeling
  78. RGB-to-hyperspectral conversion for accessible melanoma detection: A CNN-based approach
  79. Optimization of the road bump and pothole detection technology using convolutional neural network
  80. Comparative analysis of impact of classification algorithms on security and performance bug reports
  81. Cross-dataset micro-expression identification based on facial ROIs contribution quantification
  82. Demystifying multiple sclerosis diagnosis using interpretable and understandable artificial intelligence
  83. Unifying optimization forces: Harnessing the fine-structure constant in an electromagnetic-gravity optimization framework
  84. E-commerce big data processing based on an improved RBF model
  85. Analysis of youth sports physical health data based on cloud computing and gait awareness
  86. CCLCap-AE-AVSS: Cycle consistency loss based capsule autoencoders for audio–visual speech synthesis
  87. An efficient node selection algorithm in the context of IoT-based vehicular ad hoc network for emergency service
  88. Computer aided diagnoses for detecting the severity of Keratoconus
  89. Improved rapidly exploring random tree using salp swarm algorithm
  90. Network security framework for Internet of medical things applications: A survey
  91. Predicting DoS and DDoS attacks in network security scenarios using a hybrid deep learning model
  92. Enhancing 5G communication in business networks with an innovative secured narrowband IoT framework
  93. Quokka swarm optimization: A new nature-inspired metaheuristic optimization algorithm
  94. Digital forensics architecture for real-time automated evidence collection and centralization: Leveraging security lake and modern data architecture
  95. Image modeling algorithm for environment design based on augmented and virtual reality technologies
  96. Enhancing IoT device security: CNN-SVM hybrid approach for real-time detection of DoS and DDoS attacks
  97. High-resolution image processing and entity recognition algorithm based on artificial intelligence
  98. Review Articles
  99. Transformative insights: Image-based breast cancer detection and severity assessment through advanced AI techniques
  100. Network and cybersecurity applications of defense in adversarial attacks: A state-of-the-art using machine learning and deep learning methods
  101. Applications of integrating artificial intelligence and big data: A comprehensive analysis
  102. A systematic review of symbiotic organisms search algorithm for data clustering and predictive analysis
  103. Modelling Bitcoin networks in terms of anonymity and privacy in the metaverse application within Industry 5.0: Comprehensive taxonomy, unsolved issues and suggested solution
  104. Systematic literature review on intrusion detection systems: Research trends, algorithms, methods, datasets, and limitations
Downloaded on 5.9.2025 from https://www.degruyterbrill.com/document/doi/10.1515/jisys-2024-0039/html
Scroll to top button