Abstract
The concept of fuzzy number intuitionistic fuzzy sets (FNIFSs) is designed to effectively depict uncertain information in decision making problems which fundamental characteristic of the FNIFS is that the values of its membership function and non-membership function are depicted with triangular fuzzy numbers (TFNs). The dual Hamy mean (DHM) operator gets good performance in the process of information aggregation due to its ability to capturing the interrelationships among aggregated values. In this paper, we used the dual Hamy mean (DHM) operator and dual weighted Hamy mean (WDHM) operator with fuzzy number intuitionistic fuzzy numbers (FNIFNs) to propose the fuzzy number intuitionistic fuzzy dual Hamy mean (FNIFDHM) operator and fuzzy number intuitionistic fuzzy weighted dual Hamy mean (FNIFWDHM) operator. Then the MADM methods are proposed along with these operators. In the end, we utilize an applicable example for computer network security evaluation to prove the proposed methods.
Keywords
Introduction
Zadeh [1] designed the fuzzy set (FS) and opened the door to a new field of fuzzy theory in 1965. As a very useful and effective tool, it is applicable to various fields [2]. It could be founded the footprint and research results from the engineering science and technology to the social and human sciences. To extend Zadeh’s classical fuzzy set, the intuitionistic fuzzy set (IFS), which takes into account the membership degree, the non-membership degree and the hesitancy degree [3] at the same time, was developed and studied by Atanassov [4, 5] in 1986 and 1989. Since its appearance, IFSs and their extension have been successfully applied by the more and more researchers into the various domains for solving the decision-making issues [6–12]. Based on the normalized score matrix, Xu and Hu [13] proposed an entropy-based procedure to derive attribute weights. Liu, Liu and Chen [14] presented some novel intuitionistic fuzzy operators by extending the BM operator on the basis of the Dombi operations [15] and designed some MAGDM methods. Bao, Xie, Long and Wei [16] proposes the method based on prospect theory and the evidential reasoning approach, which aiming at analyzing MADM issues in which the attributes values are IFNs and the attributes weights is unknown. Li and Wang [17] investigated MADM problems through using IFSs, which the interval fractional programming model is used based on the TOPSIS methodology for solving such problems. Gan and Luo [18] defined the hybrid algorithms based on DEMATEL and IFSs to examine the cause-effect relationships among factors. Xu [19] investigated the MADM problems, in which attribute weights is incomplete and the attribute values are depicted in intuitionistic fuzzy numbers (IFNs). Chen [20] examined a comparative study of score functions in MCDM based on IFSs. Chen [21] proposed a useful model of relating optimism and pessimism to MCDM in the context of IFSs based on the unipolar bivariate model. Chen [22] defined a useful study for relating anchor dependency and accuracy functions to MADM problems in the context of IFSs. Chen [23] designed a prioritized aggregation operator-based approach to handling MCDA issues in which there exists a prioritization relationship over evaluative criteria. Wan and Li [24] built a new intuitionistic fuzzy programming model to solve heterogeneous multiattribute GDM problems with intuitionistic fuzzy truth degrees in which there are four types of attribute values such as IFSs, trapezoidal fuzzy numbers, intervals, and real numbers. Chen [25] proposed an extended TOPSIS method with an inclusion comparison method for addressing MAGDM problems in the framework of interval-valued IFSs. He, He and Huang [26] integrated the power averaging operators with IFSs and defined several intuitionistic fuzzy power interaction aggregation operators. Li and Ren [27] defined an effective model for solving MADM problems in which the attribute values were depicted with IF sets based on the TOPSIS, which took into the amount and the reliability of an IF set. Gupta, Arora and Tiwari [28] extended the fuzzy entropy [29] to IFSs with axiomatic justification and proposed importance of parameter alpha. Bao, Xie, Long and Wei [16] put forward a decision method depending on the prospect theory and the evidential reasoning method under IFSs. Zeng, Llopis-Albert and Zhang [30] introduced the weighted intuitionistic fuzzy IOWA weighted average (WIFIOWAWA) operator. Krishankumar, Ravichandran and Saeid [31] developed IFSP (intuitionistic fuzzy set based PROMETHEE) which was a novel ranking method. In order to make aggregate use of the advantages of both Schweizer-Sklar T-norm and T-conorm (SSTT) and Maclaurin symmetric mean (MSM), Wang and Liu [32] extended SSTT to IFNs and defined Schweizer-Sklar operational rules of IFNs. Gou, Xu and Lei [33] pointed out a novel exponential operational law about IFNs and offered a method which was utilized to aggregate intuitionistic fuzzy information. Lu and Wei [34] designed the TODIM method for performance appraisal on social-integration-based rural reconstruction under IVIFSs. Wu, Wei, Wu and Wei [35] proposed some interval-valued intuitionistic fuzzy Dombi Heronian mean operators for evaluating the ecological value of forest ecological tourism demonstration areas. Wan and Dong [36] designed a novel interval-valued intuitionistic fuzzy mathematical programming model for hybrid MCGDM considering alternative comparisons with hesitancy degrees, which the subjective preference relations between alternatives were expressed by each DM were formulated as the IVIFSs, IFSs, trapezoidal fuzzy numbers (TrFNs), linguistic variables, intervals and real numbers. Wu, Wang and Gao [37] designed the algorithms for competiveness evaluation of tourist destination with some interval-valued intuitionistic fuzzy Hamy mean operators. Zeng, Chen and Fan [38] defined the new MADM method based on the nonlinear programming (NLP) algorithms and the TOPSIS method and interval-valued intuitionistic fuzzy values (IVIFVs). Furthermore, to combine the intuitionistic fuzzy sets (IFSs) and the triangular fuzzy sets (TFSs), Liu and Yuan [39] proposed the fuzzy number intuitionistic fuzzy sets (FNIFSs) which fundamental feature of the FNIFSs is that the membership degree and non-membership degree are represented as triangular fuzzy numbers (TFNs) rather than exact values. Li, Niu and Zhang [40] defined some similarity measure and fuzzy entropy of FNIFSs. Wei, Lin, Zhao and Wang [41] proposed some MADM issues based on the induced choquet integral with FNIFSs and defined some aggregation operators. Wang [42] defined some geometric aggregation operators under FNIFSs. Verma [43] developed some generalized Bonferroni mean operator called generalized fuzzy number intuitionistic fuzzy weighted Bonferroni mean (GFNIFWBM) operator for aggregating the FNIFSs. Wang [44] proposed some operational laws of FNIFSs and developed some new arithmetic aggregation operators. Wang and Wang [45] designed the fuzzy number intuitionistic fuzzy Hamacher correlated geometric (FNIFHCG) operator for performance evaluation of communication network. Wang and Yu [46] defined the fuzzy number intuitionistic fuzzy Hamacher correlated average (FNIFHCA) operator for estimating the rural landscape design schemes. Chen and Wang [47] developed the induced fuzzy number intuitionistic fuzzy Hamacher OWA (IFNIFHOWA) operator for performance evaluation of projects loaned by international financial organizations. Lu [48] developed the induced fuzzy number intuitionistic fuzzy Hamacher correlated geometric (IFNIFHCG) operator for assessing the international competitiveness of financial system. Fan [49] defined the fuzzy number intuitionistic fuzzy Hamacher power weighted geometric (FNIFHPWG) operator for assessing the knowledge innovation ability of new ventures based on knowledge management. Zhao, Li and Zhang [50] proposed the fuzzy number intuitionistic fuzzy Hamacher power weighted average (FNIFHPWA) operator for evaluating the software quality.
However, all above the aggregation operators and methods can’t pay attention to the relationship between arguments being aggregated. To overcome this shortcoming, the main aim of such paper is to combine the FNIFSs with dual Hamy mean (DHM) [51–53] operator to propose some new aggregation operators with FNIFSs.
In order to do so, the rest of this paper is designed as follows. In the next section, we shall introduce the concept of FNIFSs and dual Hamy operators. In Section 3, we shall propose some DHM operators with FNIFSs: the fuzzy number intuitionistic fuzzy DHM (FNIFDHM) operator and the fuzzy number intuitionistic fuzzy weighted DHM (FNIFWDHM) operator. In Section 4, we shall present a numerical example for computer network security evaluation in order to illustrate the method proposed in this paper. Section 5 concludes the paper with some remarks.
Preliminaries
Fuzzy number intuitionistic fuzzy set
Liu and Yuan [39] designed the concept of FNIFS.
For convenience, let
Based on the score function S and the accuracy function H, an order relation between two FNIFN is introduced as follows:
(1) if
The FNIFDHM operator
In such section, based on DHM and FNIFNs, the fuzzy number intuitionistic fuzzy dual Hamy mean (FNIFDHM) operator is defined.
Thus,
Thereafter,
Therefore,
Hence, (6) is kept.
Then we will give some properties of FNIFDHM operator.
In actual MADM, it’s important to consider attribute weights. This section design the fuzzy number intuitionistic fuzzy weighted dual Hamy mean (FNIFWDHM) operator.
Thus,
Therefore,
Thereafter,
Furthermore,
Hence, (16) is kept.
Then we will give some properties of FNIFWDHM operator.
Numerical example
The network has become an essential information infrastructure of our country, and has confronted with frequent network attacks. In terms of response to the threat of net-work attacks, enterprise and security operators have deployed large number of network security devices, such as IDS, firewall. However, most of these network security devices are used separately in their own administrative domains, and suffer from a lack of information sharing. At the national and global levels, we come into the situation of lacking the global control of large-scale network security situation. Therefore, based on the current network security infrastructures and technologies, constructing a large-scale network security situation analysis system has now become an urgent necessity, especially on net-work security situation control, analysis and forecast. The evaluating problem of the computer network security is a classical MADM problem [55–60]. Thus, in this section we shall present a numerical example to evaluate computer network systems with FNIFNs in order to illustrate the method proposed in this paper. There is a panel with five possible computer network systems A i (i = 1, 2, 3, 4, 5) to select. The experts select four attributes to evaluate the five possible computer network systems: ➀G1 is the tactics factor; ➁G2 is the technology and economy factors; ➂G3 is the logistics factor; ➃G4 is the strategy factor. The five possible computer network systems A i (i = 1, 2, 3, 4, 5) are to be evaluated using the FNIFNs by the decision maker under the above four attributes (whose weighting vector ω = (0.1, 0.2, 0.2, 0.5).)
In the following, we utilize the approach developed to evaluate the computer network systems.
FNIFN decision matrix (R)
FNIFN decision matrix (R)
The aggregating results of the computer network systems by the FNIFWDHM operator
The score functions of the computer network systems
Ordering of the computer network systems
In order to show the effects on the ranking results by changing parameters of k in the FNIFWDHM operators, all the results are shown in Table 5.
Ranking results for different operational parameters of the FNIFWDHM operator
Ranking results for different operational parameters of the FNIFWDHM operator
Then, we compare our proposed method with other existing methods including FNIFWA [33] operator and FNIFWG [35] operator. The comparative results are shown in Table 6.
Ordering of the computer network systems
Ordering of the computer network systems
From above, Compare the values of our proposed FNIFWDHM operators with FNIFWA and FNIFWG operators, the results in ranking of alternatives are slightly different and the best alternatives are same. However, the existing aggregation operators, such as FNIFWA and FNIFWG operators, do not consider the information about the relationship between arguments being aggregated, and thus cannot eliminate the influence of unfair arguments on decision result. Our proposed FNIFWDHM operator consider the information about the relationship between arguments being aggregated.
In this paper, we investigate the MADM problems with FNIFNs. Then, we utilize the Hamy mean (HM) operator, weighted Hamy mean (WHM) operator, dual Hamy mean (DHM) operator and dual weighted Hamy mean (WDHM) operator to develop some Hamy mean aggregation operators with FNIFNs: fuzzy number intuitionistic fuzzy Hamy mean (FNIFHM) operator, fuzzy number intuitionistic fuzzy weighted Hamy mean (FNIFWHM) operator, fuzzy number intuitionistic fuzzy dual Hamy mean (FNIFDHM) operator, fuzzy number intuitionistic fuzzy weighted dual Hamy mean (FNIFWDHM) operator. The prominent characteristic of these proposed operators are studied. Then, we have utilized these operators to develop some approaches to solve the MADM problems with FNIFNs. Finally, a practical example for evaluate the computer network systems is given to verify the developed approach and to demonstrate its practicality and effectiveness. In the future, the application of the proposed aggregating operators of FNIFNs needs to be explored in the uncertain and incomplete decision making [61–70], risk uncertain analysis [71–73] and many other research fields under uncertain settings [74–83].
Footnotes
Acknowledgments
This work is supported by the Collaborative innovation project of “Integration of Moss, digital intelligence” funded by the innovation fund of University production, learning and research of the science and technology development center of the Ministry of Education.
