Spherical fuzzy soft expert set(SFSES)theory blends the perks of spherical fuzzy sets and group decision-making into a unified approach.It allows solutions to highly complicated uncertainties and ambiguities under the...Spherical fuzzy soft expert set(SFSES)theory blends the perks of spherical fuzzy sets and group decision-making into a unified approach.It allows solutions to highly complicated uncertainties and ambiguities under the unbiased supervision and group decision-making of multiple experts.However,SFSES theory has some deficiencies such as the inability to interpret and portray the bipolarity of decision-parameters.This work highlights and overcomes these limitations by introducing the novel spherical fuzzy bipolar soft expert sets(SFBSESs)as a powerful hybridization of spherical fuzzy set theory with bipolar soft expert sets(BSESs).Followed by the development of certain set-theoretic operations and properties of the proposed model,important problems,including the selection of non-powered dam(NPD)sites for hydropower conversion are discussed and solved under the proposed approach.These problems mainly focus on the need for an efficient tool capable of considering the bipolarity of parameters,complicated ambiguities,and multiple opinions.Supporting the new approach by a detailed comparative analysis,it is concluded that the proposed model is more comprehensive and reliable for multi-attribute group decisionmaking(MAGDM)than the previous tools,particularly considering the bipolarity of parameters under SFSES environment.展开更多
The probabilistic hesitant fuzzy multi-attribute group decision-making method introduces probability and hesitation into decision-making problems at the same time,which can improve the reliability and accuracy of deci...The probabilistic hesitant fuzzy multi-attribute group decision-making method introduces probability and hesitation into decision-making problems at the same time,which can improve the reliability and accuracy of decision-making results,and has become a research hotspots in recent years.However,there are still many problems,such as overly complex calculations and difficulty in obtaining probability data.Based on these,the paper proposes a multi-attribute group decision-making model based on probability hesitant fuzzy soft sets.Firstly,the definition of probabilistic hesitant fuzzy soft set is given.Then,based on soft set theory and probabilistic hesitant fuzzy set,the similarity measure of probabilistic hesitant fuzzy soft set is proposed,and the two measures are further combined.Finally,it is applied to the construction of multi-attribute group decision-making model,and the effectiveness and rationality of the model are verified by an example.The example shows that the new similarity calculation formula and algorithm model in this paper have higher accuracy,and the calculation process is more simple,it provides a feasible method for multi-attribute group decision making problems.展开更多
The model of grey multi-attribute group decision-making (MAGDM) is studied, in which the attribute values are grey numbers. Based on the generalized dominance-based rough set approach (G-DR- SA), a synthetic secur...The model of grey multi-attribute group decision-making (MAGDM) is studied, in which the attribute values are grey numbers. Based on the generalized dominance-based rough set approach (G-DR- SA), a synthetic security evaluation method is presented. With-the grey MAGDM security evaluation model as its foundation, the extension of technique for order performance by similarity to ideal solution (TOPSIS) integrates the evaluation of each decision-maker (DM) into a group's consensus and obtains the expected evaluation results of information system. Via the quality of sorting (QoS) of G-DRSA, the inherent information hidden in data is uncovered, and the security attribute weight and DMs' weight are rationally obtained. Taking the computer networks in a certain university as objects, the example illustrates that this method can effectively remove the bottleneck of the grey MAGDM model and has practical significance in the synthetic security evaluation.展开更多
Security assessment can help understand the security conditions of an information system and yield results highly conducive to the solution of security problems in it. Taking the computer networks in a certain univers...Security assessment can help understand the security conditions of an information system and yield results highly conducive to the solution of security problems in it. Taking the computer networks in a certain university as samples, this paper, with the information system security assessment model as its foundation, proposes a multi-attribute group decision-making (MAGDM) security assessment method based on a variable consistency dominance-based rough set approach (VC-DRSA). This assessment method combines VC-DRSA with the analytic hierarchy process (AHP), uncovers the inherent information hidden in data via the quality of sorting (QoS), and makes a synthetic security assessment of the information system after determining the security attribute weight. The sample findings show that this method can effectively remove the bottleneck of MAGDM, thus assuming practical significance in information system security assessment.展开更多
In order to understand the security conditions of the incomplete interval-valued information system (IllS) and acquire the corresponding solution of security problems, this paper proposes a multi-attribute group dec...In order to understand the security conditions of the incomplete interval-valued information system (IllS) and acquire the corresponding solution of security problems, this paper proposes a multi-attribute group decision- making (MAGDM) security assessment method based on the technique for order performance by similarity to ideal solution (TOPSIS). For IllS with preference information, combining with dominance-based rough set approach (DRSA), the effect of incomplete interval-valued information on decision results is discussed. For the imprecise judgment matrices, the security attribute weight can be obtained using Gibbs sampling. A numerical example shows that the proposed method can acquire some valuable knowledge hidden in the incomplete interval-valued information. The effectiveness of the proposed method in the synthetic security assessment for IIIS is verified.展开更多
基金Funding Statement:The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work through the LargeGroup Research Project underGrant Number(R.G.P.2/181/44).
文摘Spherical fuzzy soft expert set(SFSES)theory blends the perks of spherical fuzzy sets and group decision-making into a unified approach.It allows solutions to highly complicated uncertainties and ambiguities under the unbiased supervision and group decision-making of multiple experts.However,SFSES theory has some deficiencies such as the inability to interpret and portray the bipolarity of decision-parameters.This work highlights and overcomes these limitations by introducing the novel spherical fuzzy bipolar soft expert sets(SFBSESs)as a powerful hybridization of spherical fuzzy set theory with bipolar soft expert sets(BSESs).Followed by the development of certain set-theoretic operations and properties of the proposed model,important problems,including the selection of non-powered dam(NPD)sites for hydropower conversion are discussed and solved under the proposed approach.These problems mainly focus on the need for an efficient tool capable of considering the bipolarity of parameters,complicated ambiguities,and multiple opinions.Supporting the new approach by a detailed comparative analysis,it is concluded that the proposed model is more comprehensive and reliable for multi-attribute group decisionmaking(MAGDM)than the previous tools,particularly considering the bipolarity of parameters under SFSES environment.
基金Supported by 2023 Henan Provincial Department of Science and Technology Key R&D and Promotion Special Project(Soft Science Research)(232400411049)Henan Province Science and Technology Research and Development Plan Joint Fund(Industry)Project(225101610054)。
文摘The probabilistic hesitant fuzzy multi-attribute group decision-making method introduces probability and hesitation into decision-making problems at the same time,which can improve the reliability and accuracy of decision-making results,and has become a research hotspots in recent years.However,there are still many problems,such as overly complex calculations and difficulty in obtaining probability data.Based on these,the paper proposes a multi-attribute group decision-making model based on probability hesitant fuzzy soft sets.Firstly,the definition of probabilistic hesitant fuzzy soft set is given.Then,based on soft set theory and probabilistic hesitant fuzzy set,the similarity measure of probabilistic hesitant fuzzy soft set is proposed,and the two measures are further combined.Finally,it is applied to the construction of multi-attribute group decision-making model,and the effectiveness and rationality of the model are verified by an example.The example shows that the new similarity calculation formula and algorithm model in this paper have higher accuracy,and the calculation process is more simple,it provides a feasible method for multi-attribute group decision making problems.
文摘The model of grey multi-attribute group decision-making (MAGDM) is studied, in which the attribute values are grey numbers. Based on the generalized dominance-based rough set approach (G-DR- SA), a synthetic security evaluation method is presented. With-the grey MAGDM security evaluation model as its foundation, the extension of technique for order performance by similarity to ideal solution (TOPSIS) integrates the evaluation of each decision-maker (DM) into a group's consensus and obtains the expected evaluation results of information system. Via the quality of sorting (QoS) of G-DRSA, the inherent information hidden in data is uncovered, and the security attribute weight and DMs' weight are rationally obtained. Taking the computer networks in a certain university as objects, the example illustrates that this method can effectively remove the bottleneck of the grey MAGDM model and has practical significance in the synthetic security evaluation.
基金Supported by the High Technology Research and Development Programme of China (No. 2007AA01Z473)
文摘Security assessment can help understand the security conditions of an information system and yield results highly conducive to the solution of security problems in it. Taking the computer networks in a certain university as samples, this paper, with the information system security assessment model as its foundation, proposes a multi-attribute group decision-making (MAGDM) security assessment method based on a variable consistency dominance-based rough set approach (VC-DRSA). This assessment method combines VC-DRSA with the analytic hierarchy process (AHP), uncovers the inherent information hidden in data via the quality of sorting (QoS), and makes a synthetic security assessment of the information system after determining the security attribute weight. The sample findings show that this method can effectively remove the bottleneck of MAGDM, thus assuming practical significance in information system security assessment.
基金Supported by the National Natural Science Foundation of China(No.60605019)
文摘In order to understand the security conditions of the incomplete interval-valued information system (IllS) and acquire the corresponding solution of security problems, this paper proposes a multi-attribute group decision- making (MAGDM) security assessment method based on the technique for order performance by similarity to ideal solution (TOPSIS). For IllS with preference information, combining with dominance-based rough set approach (DRSA), the effect of incomplete interval-valued information on decision results is discussed. For the imprecise judgment matrices, the security attribute weight can be obtained using Gibbs sampling. A numerical example shows that the proposed method can acquire some valuable knowledge hidden in the incomplete interval-valued information. The effectiveness of the proposed method in the synthetic security assessment for IIIS is verified.