Professional Documents
Culture Documents
Research Article
Multi-Attribute Decision-Support System Based on
Aggregations of Interval-Valued Complex Neutrosophic
Hypersoft Set
Atiqe Ur Rahman ,1 Muhammad Saeed ,1 Muhammad Arshad ,1 and Salwa El-Morsy 2,3
1
Department of Mathematics, University of Management and Technology, Lahore 54000, Pakistan
2
Basic Science Department, Nile Higher Institute for Engineering and Technology, Mansoura 35511, Egypt
3
Department of Mathematics, College of Science and Arts, Qassim University, Al-Badaya, 51452, Saudi Arabia
Received 12 September 2021; Revised 3 November 2021; Accepted 21 November 2021; Published 25 December 2021
Copyright © 2021 Atiqe Ur Rahman et al. This is an open access article distributed under the Creative Commons Attribution
License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is
properly cited.
Hypersoft set is an emerging field of study that is meant to address the insufficiency and the limitation of existing soft-set-like
models regarding the consideration and the entitlement of multi-argument approximate function. This type of function maps the
multi-subparametric tuples to the power set of the universe. It focuses on the partitioning of each attribute into its attribute-valued
set that is missing in existing soft-set-like structures. This study aims to introduce novel concepts of complex intuitionistic fuzzy
set and complex neutrosophic set under the hypersoft set environment with interval-valued settings. Two novel structures, that is,
interval-valued complex intuitionistic hypersoft set (IV-CIFHS-set) and interval-valued complex neutrosophic hypersoft set (IV-
CNHS-set), are developed via employing theoretic, axiomatic, graphical, and algorithmic approaches. After conceptual char-
acterization of essential elementary notions of these structures, decision-support systems are presented with the proposal of
algorithms to assist the decision-making process. The proposed algorithms are validated with the help of real-world applications.
A comprehensive inter-cum-intra comparison of proposed structures is discussed with the existing relevant models, and their
generalization is elaborated under certain evaluating features.
[4] characterized soft sets (S.Sets) as a new mathematical optimal selection of a mobile with the help of suitable
parameterized model. In S.Sets, every parameter in a set of parameters in the case of soft set and suitable sub-
parameters maps to power set of the universe of discourse parametric values in the case of hypersoft set). It has
while defining single-argument approximate function. The made the decision-making process more flexible and
researchers [5–11] studied the basic properties, elementary reliable. Also, it not only fulfills the requirements of
set theoretic operations, relations, and functions of S.Sets existing soft set-like literature for multi-argument
with illustrative numerical examples. To hybridize the approximate functions but also supports the deci-
characteristics of F.Sets, IF.Sets, and N.Sets with S.Sets, fuzzy sion-makers to make decisions with the deep
soft sets (FS.Sets) [12, 13], intuitionistic fuzzy soft sets inspection.
(IFS.Sets) [14, 15], and neutrosophic soft sets (NS.Sets) [16] (4) Although the models IV-CNSS [36] and IV-CFSS
were conceptualized. Although there are many researchers [37, 41] have been developed to tackle the scenarios
who contributed a lot towards the expansion and extension with periodic and interval type data under soft set-
of these hybridized structures with the interval-valued set- environment, these are inadequate to deal sub-
ting, the contributions of researchers [17–21] are more attribute values in the form of disjoint sets as a
prominent relevant to these models. They not only discussed collective domain of multi-argument approximate
the fundamentals of interval-valued fuzzy soft-set-like function.
models but also employed certain techniques for their ap-
(5) Inspiring from the above literature in general and
plications in different situations.
from [36, 37, 41] in specific, this study aims to
In certain real-world scenarios, the classification of at-
characterize novel structures of IV-CIFHS-set and
tributes into subattributive values in the form of sets is
IV-CNHS-set that not only generalize the existing
necessary. The existing concept of S.Sets is not sufficient and
relevant models but also address their limitations.
incompatible with such scenarios so Smarandache [22]
introduced the concept of hypersoft sets (HS.Sets) to address
the insufficiency of S.Sets and to cope with the situations
with multi-argument approximate function. The rudiments 1.2. Main Contributions. The following are the possible
and elementary axioms of HS.Sets have been discussed in objectives of this study:
[23] and elaborated with numerical examples. Rahman et al. (1) The existing relevant models, that is, [34–42], are
[24–30] investigated the hybridized properties of HS.Sets made adequate with the entitlement of multi-argu-
under the environments of complex set, convexity and ment approximate function through development of
concavity, parameterization, and bijection. They employed IV-CIFHS-set and IV-CNHS-set
decision-making algorithmic approaches to solve real-world (2) The scenarios where parameters are further parti-
problems. Saeed et al. [31–33] developed the theories of tioned into subparametric values in the form of sets
neutrosophic hypersoft mappings and complex multi-fuzzy are tackled by using IV-CIFHS-set and IV-CNHS-set
hypersoft sets with applications in decision-making and
clinical diagnosis. (3) Some essential rudiments, that is, properties, ele-
mentary laws, and set theoretic operations of IV-
CIFHS-set and IV-CNHS-set, are characterized
1.1. Research Gap and Motivation. The following points (4) Two algorithms based on IV-CIFHS-set and IV-
depict the need and motivation behind the proposed study: CNHS-set are proposed to deal with daily-life de-
cision-making problems having periodic and inter-
(1) Many researchers discussed the hybridized struc-
val type data/information
tures of a complex set with fuzzy set, intuitionistic
fuzzy set, and neutrosophic set under soft set en- (5) The proposed study is compared with some existing
vironments. The literature review of the most rele- relevant models by considering some important
vant models [34–42] is presented in Table 1. evaluating indicators so that the advantageous aspect
of the proposed study may be depicted
(2) It is vivid that these structures consider only one set
of parameters and use the single-argument ap- (6) The generalization and particular cases of proposed
proximate function. They depict some kind of in- models are discussed with the pictorial depiction
sufficiency to tackle the scenarios (recruitment (7) The advantages and future directions of the proposed
process, product selection, medical diagnosis, etc.) study are presented
where further classification of parameters into their
subparametric values in the form of disjoint sets is
necessary for deep learning and observation in de- 1.3. Paper Organization. The organization of the remaining
cision-support systems. paper is given in Figure 2.
(3) Along these lines, another construction requests its
place in writing for tending to such obstacle, so the 1.4. Notations and Abbreviations. Some abbreviations and
hypersoft set is conceptualized to handle such sit- notations are used throughout the paper. Their full names
uations (Figure 1 depicts the vivid comparison of soft are given in Table 2 to facilitate the readers for proper
set model and hypersoft set model. It presents the understanding of the concept.
Applied Computational Intelligence and Soft Computing 3
ROM {4, 8} H
A U
(Cartesian product)
• RAM (GB) Battery Power {3400, 4000}
• ROM (GB)
Approximate function Appropriate Selection
• Battery Power (mAh) Five kind of Mobiles
F: A ----> P (U) of Mobile
• Camera (pixel) Camera Pixel {8, 16}
Five kinds
of Mobiles
Multi-argument
Most appropriate Approximate Function
Selection of Mobile
F: H -----> P (U)
is a fuzzy set over Z. Here, ωE1 is the approximate function Ψ: A ⟶ CInt (Z),
of ΩE1 , where ωE1 (δ) is a fuzzy set known as δ-element of (8)
ΩE1 . If ωE1 (δ) � ∅, then (δ, ωE1 (δ)) ∉ ΩE1 . Ψ(a) � ∅ if a ∉ A,
Definition 5 (see [42]). A complex fuzzy soft set ξ E1 over Z is is a complex intuitionistic fuzzy approximate function of ξ A
given by and Ψ(a) � 〈ΨT (a), ΨF (a)〉.
ΨT (a) � pT eiθT and ΨF (a) � pF eiθF are complex-valued
ξ E1 � δ, χ E1 (δ): δ ∈ E1 , χ E1 (δ) ∈ C(Z), (6) M-function and complex-valued NM-function of ξ A , re-
spectively, and all are lying within unit circle in the complex
where χ E1 : E1 ⟶ C(Z), where χE1 (δ) � ∅ for δ ∉ E1 is the plane such that pT , pF ∈ [0, 1] with
complex fuzzy approximate function of ξ E1 , where χ E1 (δ) is 0 ≤ pT + pF ≤ 1(or 0 ≤ |pT + pF | ≤ 1) and θT , θF ∈ (0, 2π].
called δ-member of ξ E1 for all δ ∈ E1 . Set operations of The value Ψ(a) is called a-member of ξ A � (Ψ, A)∀a ∈ A.
complex fuzzy set and complex fuzzy soft set have been
described in [42, 47], respectively.
Definition 7 (see [40]). Let E be a set of attributes with A⊆E.
Definition 6 (see [39]). Let E be a set of attributes with A⊆E. Then complex neutrosophic soft set ξ A � (Ψ, A) over Z is
Then complex intuitionistic fuzzy soft set ξ A � (Ψ, A) over defined as follows:
Z is defined as follows:
ξ A � (a, Ψ(a)): a ∈ A, Ψ(a) ∈ CNeu (U), (9)
ξ A � (a, Ψ(a)): a ∈ A, Ψ(a) ∈ CInt (Z), (7)
where where
Applied Computational Intelligence and Soft Computing 5
is an interval-valued
← complex
→ fuzzy ← approximate function
→ of
is a complex neutrosophic approximate function of ξ A and ←
←
⎪
⎧
⎪
⎪ ([0.4, 0.5], [0.3, 0.4])ei([0.3,0.5],[0.3,0.4])π ([0.1, 0.7], [0.2, 0.2])ei([0.3,0.5],[0.1,0.3])π ⎫
⎪
⎪
⎪
⎪
⎪ , ⎪
⎪
⎪
⎪ t1 t2 ⎪
⎪
⎨ ⎬
ΛM e1 � ⎪ ⎪ ,
⎪
⎪ ⎪
⎪
⎪
⎪ ([0.3, 0.3], [0.3, 0.5])ei([0.1,0.8],[0.1,0.1])π ([0.3, 0.4], [0.2, 0.5])ei([0.2,0.6],[0.2,0.3])π ⎪
⎪
⎪
⎪ , ⎪
⎪
⎩ ⎭
t3 t4
⎪
⎧
⎪
⎪ ([0.3, 0.6], [0.2, 0.3])ei([0.1,0.7],[0.1,0.2])π ([0.3, 0.4], [0.1, 0.2])ei([0.2,0.6],[0.1,0.3])π ⎫
⎪
⎪
⎪
⎪
⎪ , ⎪
⎪
⎪
⎪ t1 t2 ⎪
⎪
⎨ ⎬
ΛM e2 � ⎪ ⎪ ,
⎪
⎪ ⎪
⎪
⎪
⎪ ([0.2, 0.5], [0.3, 0.4])ei([0.1,0.5],[0.3,0.4])π ([0.4, 0.5], [0.1, 0.4])ei([0.2,0.5],[0.2,0.3])π ⎪
⎪
⎪
⎪ , ⎪
⎪
⎩ ⎭
t3 t4
⎧
⎪
⎪
⎪ ([0.4, 0.5], [0.2, 0.3])ei([0.2,0.6],[0.1,0.2])π ([0.1, 0.8], [0.1, 0.1])ei([0.2,0.3],[0.2,0.5])π ⎫
⎪
⎪
⎪
⎪
⎪ , ⎪
⎪
⎪
⎪ t1 t2 ⎪
⎪
⎨ ⎬
ΛM e3 � ⎪ ⎪ ,
⎪
⎪ ⎪
⎪
⎪
⎪ ([0.1, 0.4], [0.1, 0.2])ei([0.2,0.5],[0.3,0.4])π ([0.2, 0.6], [0.1, 0.3])ei([0.1,0.5],[0.3,0.4])π ⎪
⎪
⎪
⎪ , ⎪
⎪
⎩ ⎭
t3 t4
⎧
⎪
⎪
⎪ ([0.2, 0.3], [0.3, 0.6])ei([0.1,0.7],[0.2,0.2])π ([0.2, 0.4], [0.2, 0.3])ei([0.1,0.5],[0.2,0.4])π ⎫
⎪
⎪
⎪
⎪
⎪ , ⎪
⎪
⎪
⎪ t1 t 2 ⎪
⎪
⎨ ⎬
ΛM e4 � ⎪ ⎪ ,
⎪
⎪ ⎪
⎪
⎪
⎪ ([0.4, 0.5], [0.3, 0.4])ei([0.1,0.4],[0.4,0.5])π ([0.4, 0.5], [0.2, 0.4])ei([0.2,0.5],[0.1,0.3])π ⎪
⎪
⎪
⎪ , ⎪
⎪
⎩ ⎭
t3 t4
(17)
⎧
⎪
⎪
⎪ ([0.1, 0.2], [0.4, 0.5])ei([0.4,0.5],[0.1,0.3])π ([0.2, 0.2], [0.2, 0.7])ei([0.1,0.4],[0.3,0.5])π ⎫
⎪
⎪
⎪
⎪
⎪ , ⎪
⎪
⎪
⎪ t1 t 2 ⎪
⎪
⎨ ⎬
ΛM e5 � ⎪ ⎪ ,
⎪
⎪ ⎪
⎪
⎪
⎪ ([0.2, 0.6], [0.1, 0.3])ei([0.1,0.2],[0.2,0.3])π ([0.3, 0.5], [0.2, 0.3])ei([0.3,0.4],[0.2,0.3])π ⎪
⎪
⎪
⎪ , ⎪
⎪
⎩ ⎭
t3 t4
⎪
⎧
⎪
⎪ ([0.4, 0.5], [0.1, 0.4])ei([0.2,0.3],[0.3,0.6])π ([0.1, 0.3], [0.4, 0.4])ei([0.2,0.5],[0.2,0.3])π ⎫ ⎪
⎪
⎪
⎪
⎪ , ⎪
⎪
⎪
⎪ t1 t 2 ⎪
⎪
⎨ ⎬
ΛM e6 � ⎪ ⎪ ,
⎪
⎪ ⎪
⎪
⎪
⎪ ([0.2, 0.7], [0.1, 0.2])e i([0.1,0.8],[0.1,0.1])π
([0.2, 0.5], [0.2, 0.5])e i([0.1,0.6],[0.2,0.3])π ⎪
⎪
⎪
⎪ , ⎪
⎪
⎩ ⎭
t3 t4
⎪
⎧
⎪
⎪ ([0.2, 0.4], [0.1, 0.2])ei([0.2,0.3],[0.1,0.6])π ([0.1, 0.3], [0.3, 0.5])ei([0.2,0.3],[0.2,0.6])π ⎫ ⎪
⎪
⎪
⎪
⎪ , ⎪
⎪
⎪
⎪ t1 t 2 ⎪
⎪
⎨ ⎬
ΛM e7 � ⎪ ⎪ ,
⎪
⎪ ⎪
⎪
⎪
⎪ ([0.1, 0.5], [0.3, 0.4])e i([0.1,0.6],[0.2,0.3])π
([0.4, 0.5], [0.3, 0.4])e i([0.2,0.5],[0.1,0.2])π ⎪
⎪
⎪
⎪ , ⎪
⎪
⎩ ⎭
t3 t4
⎧
⎪
⎪
⎪ ([0.3, 0.3], [0.1, 0.4])ei([0.4,0.5],[0.3,0.4])π ([0.2, 0.3], [0.2, 0.6])ei([0.3,0.6],[0.1,0.3])π ⎫ ⎪
⎪
⎪
⎪
⎪ , ⎪
⎪
⎪
⎪ t1 t 2 ⎪
⎪
⎨ ⎬
ΛM e8 � ⎪ ⎪ ,
⎪
⎪ ⎪
i([0.4,0.5],[0.3,0.4])π ⎪
⎪
⎪ ([0.1, 0.2], [0.4, 0.5])e i([0.3,0.5],[0.3,0.4])π
([0.2, 0.5], [0.1, 0.4])e ⎪
⎪
⎪
⎪ , ⎪
⎪
⎩ ⎭
t3 t4
Applied Computational Intelligence and Soft Computing 7
⎪
⎧
⎪ ⎪
⎧ ([0.4, 0.5], [0.3, 0.4])ei([0.3,0.5],[0.3,0.4])π ([0.1, 0.7], [0.2, 0.2])ei([0.3,0.5],[0.1,0.3])π ⎫ ⎪ ⎪
⎫
⎪
⎪ ⎪
⎪ ⎪ ⎪
⎪
⎪
⎪ ⎜
⎛
⎜
⎜ ⎪
⎪ , ,⎪⎪
⎪ ⎟
⎞
⎟
⎟
⎪
⎪
⎪
⎪
⎪ ⎜
⎜
⎜ ⎪
⎪ t1 t 2 ⎪
⎪ ⎟
⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜
⎜ ⎪
⎨ ⎪
⎬ ⎟
⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜
⎜ e , ⎟
⎟
⎟ , ⎪
⎪
⎪
⎪ ⎜
⎜
⎜ 1 ⎪ ⎪ ⎟
⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜ ⎪
⎪ ⎪
⎪ ⎟
⎟ ⎪
⎪
⎪ ⎜ ⎪ ⎪ ⎟
⎪
⎪
⎪
⎜
⎜
⎝ ⎪ ⎪
⎪ ([0.3, 0.3], [0.3, 0.5])e i([0.1,0.8],[0.1,0.1])π
([0.3, 0.4], [0.2, 0.5])e i([0.2,0.6],[0.2,0.3])π ⎪
⎪
⎪ ⎠ ⎪
⎟
⎟ ⎪
⎪
⎪
⎪
⎪ ⎪
⎩ , ⎪
⎭ ⎪
⎪
⎪
⎪ t3 t4 ⎪
⎪
⎪
⎪ ⎪
⎪
⎪
⎪ ⎪
⎪
⎪
⎪ ⎪
⎪
⎪
⎪ ⎪
⎪
⎪
⎪ ⎪
⎧
⎪ ([0.3, 0.6], [0.2, 0.3])e i([0.1,0.7],[0.1,0.2])π
([0.3, 0.4], [0.1, 0.2])e i([0.2,0.6],[0.1,0.3])π
⎪
⎫
⎪ ⎪
⎪
⎪
⎪ ⎜
⎛ ⎪
⎪ , ⎪
⎪ ⎟
⎞ ⎪
⎪
⎪
⎪ ⎜
⎜
⎜ ⎪
⎪ t t ⎪
⎪ ⎟
⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜ ⎪
⎪ 1 2 ⎪
⎪ ⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜
⎜ ⎨ ⎬ ⎟
⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜
⎜ e , ⎟
⎟
⎟ , ⎪
⎪
⎪
⎪ ⎜
⎜
⎜ 2 ⎪
⎪ ⎪
⎪ ⎟
⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜
⎜ ⎪
⎪ ⎪
⎪ ⎟
⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜
⎝ ⎪
⎪ i([0.1,0.5],[0.3,0.4])π i([0.2,0.5],[0.2,0.3])π ⎪
⎪ ⎟
⎟
⎠ ⎪
⎪
⎪
⎪ ⎪
⎪ ([0.2, 0.5], [0.3, 0.4])e ([0.4, 0.5], [0.1, 0.4])e ⎪
⎪ ⎪
⎪
⎪
⎪ ⎩ , ⎭ ⎪
⎪
⎪
⎪ t t ⎪
⎪
⎪
⎪ 3 4 ⎪
⎪
⎪
⎪ ⎪
⎪
⎪
⎪ ⎪
⎪
⎪
⎪ i([0.2,0.6],[0.1,0.2])π i([0.2,0.3],[0.2,0.5])π ⎪
⎪
⎪
⎪ ⎪
⎧
⎪ ([0.4, 0.5], [0.2, 0.3])e ([0.1, 0.8], [0.1, 0.1])e ⎪
⎫
⎪ ⎪
⎪
⎪
⎪ ⎜
⎛ ⎪
⎪ , ⎪
⎪ ⎟
⎞ ⎪
⎪
⎪
⎪ ⎜
⎜
⎜ ⎪
⎪ t1 t2 ⎪
⎪ ⎟
⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜
⎜ ⎪
⎪ ⎪
⎪ ⎟
⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜
⎜ ⎨ ⎬ ⎟
⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜ e , ⎟
⎟ , ⎪
⎪
⎪
⎪ ⎜
⎜
⎜ 3 ⎪
⎪ ⎪
⎪ ⎟
⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜
⎜ ⎪
⎪ ⎪
⎪ ⎟
⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜
⎝ ⎪ ⎪ ([0.1, 0.4], [0.1, 0.2])e i([0.2,0.5],[0.3,0.4])π
([0.2, 0.6], [0.1, 0.3])e i([0.1,0.5],[0.3,0.4])π ⎪
⎪ ⎠ ⎪
⎟
⎟ ⎪
⎪
⎪ ⎪
⎪ ⎪
⎪ ⎪
⎪
⎪
⎪ ⎩ , ⎭ ⎪
⎪
⎪
⎪ t 3 t4 ⎪
⎪
⎪
⎪ ⎪
⎪
⎪
⎪ ⎪
⎪
⎪
⎪ ⎪
⎪
⎪
⎪ i([0.1,0.7],[0.2,0.2])π i([0.1,0.5],[0.2,0.4])π ⎪
⎪
⎪
⎪ ⎪
⎧
⎪ ([0.2, 0.3], [0.3, 0.6])e ([0.2, 0.4], [0.2, 0.3])e ⎪
⎫
⎪ ⎪
⎪
⎪
⎪ ⎜
⎛ ⎪
⎪ , , ⎪
⎪ ⎟
⎞ ⎪
⎪
⎪
⎪ ⎜
⎜
⎜ ⎪
⎪ t t ⎪
⎪ ⎟
⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜
⎜ ⎪
⎪ 1 2 ⎪
⎪ ⎟
⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜
⎜ ⎨ ⎬ ⎟
⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜
⎜ e , ⎟
⎟
⎟ , ⎪
⎪
⎪
⎪ ⎜
⎜ 4 ⎪
⎪ ⎪
⎪ ⎟
⎟ ⎪
⎪
⎪⎜
⎪ ⎜
⎜ ⎪
⎪ ⎪
⎪ ⎟
⎟
⎟ ⎪
⎪
⎪ ⎜
⎜
⎝ ⎪ i([0.1,0.4],[0.4,0.5])π i([0.2,0.5],[0.1,0.3])π ⎪⎟ ⎟
⎠ ⎪
⎪
⎪ ⎪ ([0.4, 0.5], ([0.3, 0.4]))e ([0.4, 0.5], [0.2, 0.4])e ⎪ ⎪
⎪
⎪
⎪
⎪
⎩ , ⎪ ⎪
⎪
⎭ ⎪
⎪
⎪
⎪ t3 t4 ⎪
⎪
⎪
⎨ ⎪
⎬
ΩM �⎪ ⎪ . (18)
⎪
⎪ ⎪
⎪
⎪
⎪ ⎪
⎧ ([0.1, 0.2], [0.4, 0.5])e i([0.4,0.5],[0.1,0.3])π
([0.2, 0.2], [0.2, 0.7])e i(([0.1,0.4]),[0.3,0.5])π
⎪
⎫ ⎪
⎪
⎪
⎪ ⎪
⎪ ⎪
⎪⎟ ⎪
⎪
⎪⎜
⎪ ⎛
⎜ ⎪
⎪ , ,⎪⎪ ⎞
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜
⎜ ⎪
⎪ t1 t2 ⎪
⎪ ⎟
⎟
⎟ ⎪
⎪
⎪
⎪⎜⎜
⎜
⎜ ⎪
⎨ ⎪
⎬⎟⎟
⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜ e , ⎟
⎟ , ⎪
⎪
⎪
⎪ ⎜
⎜
⎜ 5 ⎪ ⎪ ⎟
⎟
⎟ ⎪
⎪
⎪⎜
⎪ ⎜ ⎪
⎪ ⎪
⎪ ⎟
⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜
⎜ ⎪
⎪ i([0.1,0.2],[0.2,0.3])π i([0.3,0.4],[0.2,0.3])π ⎪
⎪ ⎟
⎟ ⎪
⎪
⎪
⎪ ⎝ ⎪
⎪ ([0.2, 0.6], [0.1, 0.3])e ([0.3, 0.5], [0.2, 0.3])e ⎪
⎪ ⎠ ⎪
⎪
⎪
⎪ ⎪
⎩ , ⎪
⎭ ⎪
⎪
⎪
⎪ t t ⎪
⎪
⎪
⎪ 3 4 ⎪
⎪
⎪
⎪ ⎪
⎪
⎪
⎪ ⎪
⎪
⎪
⎪ ⎪
⎪
⎪
⎪ ⎪
⎧
⎪ ([0.4, 0.5], t[0.1, 0.4])e i([0.2,0.3],[0.3,0.6)π
([0.1, 0.3], t[0.4, 0.4])e i([0.2,0.5],t[0.2,0.3])π
⎪
⎫
⎪ ⎪
⎪
⎪
⎪ ⎜ ⎪
⎪ , , ⎪
⎪ ⎟
⎞ ⎪
⎪
⎪
⎪ ⎛
⎜
⎜ ⎪ ⎪ ⎟
⎟ ⎪
⎪
⎪⎜
⎪ ⎜
⎜ ⎪
⎪ t 1 t 2 ⎪
⎪ ⎟
⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜
⎜ ⎪
⎨ ⎪
⎬ ⎟
⎟
⎟ ⎪
⎪
⎪
⎪⎜⎜
⎜ e , ⎟
⎟
⎟ , ⎪
⎪
⎪
⎪ ⎜
⎜
⎜ 6 ⎪
⎪ ⎪
⎪ ⎟
⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜
⎜ ⎪ ⎪
⎪ ⎪
⎪⎟⎟⎪
⎟
⎟ ⎪
⎪⎜
⎪ ⎜
⎝ ⎪ i([0.1,0.8],[0.1,0.1])π i([0.1,0.6],t[0.2,0.3])π ⎪
⎪ ⎟
⎠ ⎪
⎪
⎪
⎪ ⎪ ([0.2, 0.7], t[0.1, 0.2])e ([0.2, 0.5], t[0.2, 0.5])e ⎪ ⎪
⎪
⎪
⎪
⎪
⎩ , ⎭ ⎪
⎪ ⎪
⎪
⎪
⎪
⎪ t3 t4 ⎪
⎪
⎪
⎪ ⎪
⎪
⎪
⎪ ⎪
⎪
⎪
⎪ ⎪
⎪
⎪
⎪ ⎪
⎧ i([0.2,0.3],[0.1,0.6])π i([0.2,0.3],[0.2,0.6])π
⎪
⎫ ⎪
⎪
⎪
⎪ ⎪
⎪ ([0.2, 0.4], [0.1, 0.2])e ([0.1, 0.3], [0.3, 0.5])e ⎪
⎪ ⎪
⎪
⎪
⎪ ⎜
⎛
⎜ ⎪
⎪ , ,⎪ ⎪ ⎟
⎞
⎟ ⎪
⎪
⎪ ⎜
⎪ ⎜
⎜ ⎪
⎪ t t ⎪
⎪ ⎟
⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜ ⎪
⎨
1 2 ⎪
⎬ ⎟
⎟
⎟ ⎪
⎪
⎪
⎪ ⎜⎜
⎜
⎜ ⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜ e7 , ⎪ ⎪ ⎟
⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜
⎜ ⎪
⎪ ⎪
⎪ ⎟
⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜
⎜ ⎪
⎪ i([0.1,0.6],[0.2,0.3])π i([0.2,0.5],[0.1,0.2])π ⎪⎟ ⎪ ⎟
⎟ ⎪
⎪
⎪
⎪ ⎝ ⎪
⎪ ([0.1, 0.5], [0.3, 0.4])e ([0.4, 0.5], [0.3, 0.4])e ⎪
⎪ ⎠ ⎪
⎪
⎪
⎪ ⎪
⎩ , ⎪
⎭ ⎪
⎪
⎪
⎪ t t ⎪
⎪
⎪
⎪ 3 4 ⎪
⎪
⎪
⎪ ⎪
⎪
⎪
⎪ ⎪
⎪
⎪
⎪ ⎪
⎪
⎪
⎪ ⎪
⎧ ([0.3, 0.3], [0.1, 0.4])e i([0.4,0.5],[0.3,0.4])π
([0.2, 0.3], [0.2, 0.6])e i([0.3,0.6],[0.1,0.3])π
⎪
⎫ ⎪
⎪
⎪
⎪ ⎛ ⎪
⎪ ⎪
⎪ ⎪
⎪
⎪
⎪ ⎜
⎜
⎜ ⎪
⎪ , , ⎪
⎪ ⎟
⎞
⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜ ⎪
⎪ t t ⎪
⎪ ⎟ ⎪
⎟
⎟ ⎪
⎪ ⎜
⎪ ⎜ ⎨
⎜ ⎪ 1 2 ⎪
⎬ ⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜
⎜ ⎟
⎟
⎟ ⎪
⎪
⎪
⎪ ⎜⎜
⎜ e ,
8 ⎪ ⎪ ⎟
⎟
⎟ ⎪
⎪
⎪
⎪ ⎜ ⎪
⎜
⎜ ⎪ ⎪⎟
⎪ ⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜ ⎪
⎪ i([0.3,0.5],[0.3,0.4])π i([0.4,0.5],[0.3,0.4])π ⎪
⎪ ⎟
⎟
⎟ ⎪
⎪
⎪ ⎜
⎪ ⎝ ⎪ ⎪ ([0.1, 0.2], [0.4, 0.5])e ([0.2, 0.5], [0.1, 0.4])e ⎪
⎪ ⎠ ⎪
⎪
⎪
⎪ ⎪
⎩ , ⎭ ⎪
⎪ ⎪
⎩ t3 t4 ⎭
8 Applied Computational Intelligence and Soft Computing
Definition 13. Let ΩM1 � (Λ1 , M1 ) and ΩM2 � (Λ2 , M2 ) be Definition 16. For two IV-CIFHS-sets (Λ1 , M1 ) and
two IV-CIFHS-sets over the same universe. The set ΩM1 � (Λ2 , M2 ) over the same universe Z, the following definitions
(Λ1 , M1 ) is a subset of ΩM2 � (Λ2 , M2 ), if hold:
(i) M1 ⊆M2 (i) An IV-CIFHS-set (Λ1 , M1 ) is a homogeneous IV-
← ⌣ ← ⌣
⌣
(ii) ∀x ∈→ M1 , Λ1→
⌣
(x)⊆Λ2 (x)
⌣
implies Λ1 (x)⊆Λ2 CIFHS-set, symbolized by (Λ1 , M1 )Hom if Λ1 (x) is
⌣
⌣ ⌣ ⌣
(x), Λ 1 (x)⊆ Λ 2 (x), that is, homogeneous CIF-set ∀x ∈ M1
←
← ⌣ ← ⌣ → ⌣ → ⌣ ⌣ (ii) An IV-CIFHS-set (Λ1 , M1 ) is a completely ho-
c M1 (x) ≤ c M
← →2 (x ), c (x
→1 ⌣
M ) ≤ c M 2
(x ), θ M1 (x) ≤
⌣ ⌣ mogeneous IV-CIFHS-set, symbolized by
θ M2 (x), and θ M1 (x) ≤ θ M2 (x), ⌣
(Λ1 , M1 )CHom if Λ1 (x) is homogeneous with
where amplitude and P-terms of each Λi , i � 1, 2 are ⌣
Λ1 (y)∀x, y ∈ M1
given below:
← ⌣
←
⌣ ← ⌣ (iii) An IV-CIFHS-set (Λ1 , M1 ) is a completely ho-
θ M1 (x))
(c M1 (x), ← for Λ ⌣
← ⌣ ⌣ ←1 (x
⌣
) mogeneous IV-CIFHS-set with (Λ2 , M2 ) if Λ1 (x) is
θ M1 (x))
(c M1 (x), ← for Λ ⌣ ⌣
← ⌣ ⌣ ← 1 ⌣)
(x a homogeneous with Λ2 (x)∀(x) ∈ M1 M2
θ M2 (x))
(c M2 (x), ← for Λ
←2 (x )
← ⌣ ⌣ ⌣
(c M2 (x), θ M2 (x)) for Λ2 (x)
3.1. Set Operations and Laws on IV-CIFHS-Set. In this sec-
Definition 14. Two IV-CIFHS-sets ΩM1 � (Λ1 , M1 ) and tion, some basic set theoretic operations and laws are dis-
ΩM2 � (Λ2 , M2 ) over the same universe are equal if cussed on IV-CIFHS-set.
(i) (Λ1 , M1 )⊆(Λ2 , M2 ) Definition 17. The complement of IV-CIFHS-set (Λ, M),
(ii) (Λ2 , M2 )⊆(Λ1 , M1 ) denoted by (Λ, M)c , is given by
⌣ ⌣ ⌣ ⌣
(Λ, M)c � x, (Λ(x))c : x∈ M, (Λ(x))c ∈ CIV (Z),
Definition 15. Let (Λ, M) be an IV-CIFHS-set over Z. Then (19)
⌣
(i) It is a null IV-CIFHS-set, symbolized by (Λ, M)Φ if where the M-function (Λ(x))c has the A-term given by
⌣ ← ⌣ c ← ⌣ → ⌣ → ⌣
for all values of x ∈ M, the A-term of the M-function (c M (x)) � 1 −←c M (x)( c M (x←))c � 1 − c M (x) and
→ P-term
← ⌣ → ⌣ ⌣ c ⌣ ⌣
is given by c M (x) �← c M (x) � →0, ⌣whereas the given→ by (θ M (x)) � 2π − θ M (x) and ( θ M (x))c �
⌣ ⌣
P-terms of is given by θ M (x) � θ M (x) � 0π 2π − θ M (x).
(ii) It is an absolute IV-CIFHS-set, symbolized by
⌣
(Λ, M)Δ ; if for all values of x ∈ M, the A-terms of Proposition 1. Let (Λ, M) be an IV-CIFHS-set over Z. Then
← ⌣ → ⌣
the M-function is given by c M (x) � c M (x) � 1, ((Λ, M)c )c � (Λ, M).
whereas
← → the⌣ P-terms is given by ⌣
⌣ Proof. As Λ(x) ∈ CIV (Z), so in terms of its A- and P-terms,
θ M (x) � θ M (x) � 2π.
(Λ, M) can be expressed as follows:
← ⌣
→ ⌣
→ ⌣
(Λ, M) � x, c M (x)eiθ M (x) , c M (x)ei θ G (x) : x ∈ M.
⌣ ← ⌣ ⌣
(20)
Now
Applied Computational Intelligence and Soft Computing 9
⎧
⎪ c
→ ⌣ c ⎪
⎫
⎨ ⌣ c i θ D (x) ⎞ ⎬
c ←
⌣
c ⌣ ⎜
⎛ ⎜
⌣ ⎛ ← ⌣ i θ M (x) → ⎟ ⎟ ⌣
(Λ, M) (x) � ⎪⎝x, ⎝ c M (x) e , c M (x) e ⎠⎞⎠: x ∈ M⎪,
⎩ ⎭
⎪
⎧ c
→ ⌣ ⎪
⎫
c
⎨⎜ ← c
← ⌣
→ c i2π− θ D (x) ⎬
c ⌣
(Λ, M) (x) � ⎪⎝
⌣ ⎜
⎛ x, ⎝ ⌣
⎛1 − c (x) e i 2π− θ M (x ) ⌣
, 1 − c M (x) e ⎞⎟
⎟
⎠ ⎠ ⌣
⎞: x ∈ M⎪,
M
⎩ ⎭
⎪
⎧ c
→ ⌣ ⎪
⎫
c
⎪
⎧ → ⌣ ⎪
⎫
⎨⎜⌣ ⎜ ←
← ⌣
i2π−2π− θ M (x) → ⌣ i2π−2π− θ G (x) ⎬
c c ⎛
⎝ ⎛
⎝ ⌣
(Λ, M) � ⎪ x, 1 − 1 − c M (x)e , 1 − 1 − c M (x)e ⎟
⎞
⎠⎞⎟ ⌣
⎠: x ∈ M⎪,
⎩ ⎭
← ⌣
→
c c ⌣ ← ⌣ i θ M (x) → ⌣ i θ G (x⌣) ⌣
(Λ, M) � x, c M (x)e , c M (x)e : x∈ M.
From equations (20) and (21), we have Definition 18. For two IV-CIFHS-set (Λ1 , M1 ) and
((Λ, M)c )c � (Λ, M). □ (Λ2 , M2 ), the intersection (Λ1 , M1 ) (Λ2 , M2 ) over the
same universe Z is the IV-CIFHS-set (Λ3 , M3 ), where
⌣
Proposition 2. Let (Λ, M) be an IV-CIFHS-set over Z. Then M3 � M1 ∐M2 , and for all x ∈ M3 ,
(i) ((Λ, M)Φ )c � (Λ, M)Δ
(ii) ((Λ, M)Δ )c � (Λ, M)Φ
←
⎪
⎧
⎪ ← ⌣ ⌣
⎪
⎪ c M1 (x)ei θ M1 (x) , � ∈ M1 M 2 ,
if x
⎪
⎪
← ⌣ ⎪
⎨ ← ⌣
← ⌣ i θ M (x
Λ3 (x) � ⎪ c M2 (x )e 2 ) , � ∈ M2 M 1 ,
if x
⎪
⎪
⎪
⎪ ← ⌣ ←
⎪
⎪ ← ⌣ ← ⌣
⌣
i min θ M1 (x), θ M2 (x)
⎩ min c M (x ), c M (x ) e , � ∈ M1 M2 ,
if x
1 2
→ ⌣ (22)
⎪
⎧
⎪ → ⌣ i θ M (x ) ⌣
⎪
⎪ c M (x )e 1 , if x∈ M1 M2 ,
⎪
⎪ 1
⎪
⎪ →
→ ⌣ ⎨→ ⌣ i θ M (x⌣
) ⌣
Λ 3 (x) � ⎪ c M (x )e 2 , if x∈ M2 M1 ,
⎪
⎪ 2
⎪
⎪ → ⌣ → ⌣
⎪
⎪ i min θ M1 (x), θ M2 (x)
⎪
⎩ min→ ⌣ → ⌣ ⌣
c M1 (x), c M2 (x)e if x∈ M1 M2 .
Definition 19. For two IV-CIFHS-set (Λ1 , M1 ) and Definition 20. The union (Λ1 , M1 )∐(Λ2 , M2 ) of two IV-
(Λ2 , M2 ), the difference is defined as follows: CIFHS-set (Λ1 , M1 ) and (Λ2 , M2 ) over the same universe Z
c is the IV-CIFHS-set (Λ3 , M3 ), where M3 � M1 ∐M2 , and
Λ1 , M1 ∖ Λ2 , M2 � Λ1 , M1 Λ2 , M2 . (23) ⌣
for all x ∈ M3 ,
10 Applied Computational Intelligence and Soft Computing
←
⎪
⎧
⎪ ← ⌣ ⌣
⌣
⎪
⎪ c M1 (x)eiθ M1 (x) , if (x) ∈ M1 \M2 ,
⎪
⎪
← ⌣ ⎪
⎨← ←
⌣
⌣ iθ M (x ⌣
Λ3 (x) � ⎪ c M2 (x )e 2 ) , if (x) ∈ M2 \M1 ,
⎪
⎪
⎪
⎪ ← ←
⎪
⎪ ← ⌣ ← ⌣
⌣ ⌣
i max θ M1 (x), θ M2 (x) ⌣
⎩ max c M (x ), c M2 (x)e , if (x) ∈ M1 M2 ,
1
→ ⌣ (24)
⎧
⎪
⎪ → ⌣ i θ M (x ) ⌣
⎪
⎪ c M (x )e 1 , if x∈ M1 M2 ,
⎪
⎪ 1
⎪
→ ⌣ ⎪ ⎨ → ⌣
Λ 3 (x) � ⎪ →
c M2 (x)ei θ M2 (x) ,
⌣ ⌣
if x∈ M2 M1 ,
⎪
⎪
⎪
⎪ → ⌣ → ⌣
⎪
⎪ i max θ M1 (x), θ M2 (x)
⎪
⎩ → ⌣ → ⌣ ⌣
max c M1 (x) c M2 (x)e , if x∈ M1 M2 .
Proposition 3. Let (Λ, M) be an IV-CIFHS-set over Z. Then In Table 3, η1χD (x) and η2χD (x) are M-function and NM-
the following results hold true: function of χD , respectively, with interval-valued intui-
(i) (Λ, M)∐(Λ, M)Φ � (Λ, M) tionistic fuzzy values. If αij � (η1χ (x⌣ ) (]i ), η2χ (x⌣ ) (]i )), for
D j D j
Definition 21. Let ξ D ∈ ⊎IVCIFHS . Assume that Definition 24. Let ξ D ∈ Civcifhss (Z) and ‖ξ D ‖ ∈ ‖Civcifhss
Z � ]1 , ]2 , . . . , ]m and E � L1 , L2 , . . . , Ln with L1 � (Z)‖. Then IV-CIFHS-aggregation operator is defined as
e11 , e12 , . . . , e1n , L2 � e21 , e22 , . . . , e2n , . . . , Ln � en1 , follows:
⌣ ⌣
en2 , . . . , enn } and D � L1 × L2 × · · · × Ln � x1 , x2 , . . . , xn ,
⌣ �� ��
⌣ ⌣ ⌣
ξ D � Aivcifhss ��ξ D ��, ξ D , (28)
. . . , xnn � xr }, each xi is n-tuple element of D and
|D| � r � nn ; the representation of ξ D can be seen in Table 3. where
Applied Computational Intelligence and Soft Computing 11
�� ��
Aivcifhss : ��Civcifhss (Z)�� × Civcifhss (Z) ⟶ F(Z), (29) α11
⎡⎢⎢⎢ ⎤⎥
⎢⎢⎢ α ⎥⎥⎥⎥⎥
⎢ 21 ⎥ ⎥⎥⎥,
where ξ D is called the aggregate fuzzy set of IV-CIFHS- αi1 m×1 � ⎢⎢⎢⎢ (33)
⎢⎢⎢ ⋮ ⎥⎥⎥⎥
set ξ D . ⎣ ⎦
Its M-function is given as follows: αm1
η: Z ⟶ [0, 1], (30) which is called the aggregate matrix of ξ D over Z.
ξD
⊳ Start
⊳ Input Stage:
———–1. Consider Z as the universe of discourse
———–2. Consider E as a set of n parameters
———–3. Classify n parameters into disjoint parametric-valued sets L1 , L2 , L3 , . . . , Ln
⊳ Construction Stage:
———–4. D � L1 × L2 × L3 × · · · × Ln
———–5. Construct IV-CIFHS-set ξ D over Z in accordance with Definition 12
⊳ Computation Stage:
———–6. Compute ‖ξ D ‖ for A-term and P-term separately by using Definition 22
———–7. Compute ξ D for A-term and P-term separately with the help of Definition 24
———–8. Compute η(]) by using Definition 24
⊳ Output Stage: ξD
———–9. Find the best option by the max modulus of η(]) with the help of Definition 25
⊳ End ξD
⎪
⎧
⎪
⎪ ([0.4, 0.5], [0.3, 0.4])ei([0.1,0.4],[0.3,0.5])π ([0.2, 0.3], [0.2, 0.6])ei([0.2,0.3],[0.3,0.5])π ⎫ ⎪
⎪
⎪
⎪
⎪ , ⎪
⎪
⎪
⎪ s 1 s 2 ⎪
⎪
⎨ ⎬
χD δ1 � ⎪ ⎪ ,
⎪
⎪ ⎪
⎪
i([0.1,0.4],[0.1,0.2])π ⎪
⎪
⎪ i([0.3,0.4],[0.1,0.3])π
⎪
⎪ ([0.1, 0.4], [0.4, 0.5])e
⎪
⎩ ,
([0.4, 0.5], [0.2, 0.4])e ⎪
⎪
⎭
s3 s4
⎧
⎪
⎪
⎪ ([0.1, 0.2], [0.2, 0.7])ei([0.2,0.4],[0.3,0.5])π ([0.1, 0.6], [0.2, 0.3])ei([0.4,0.5],[0.2,0.3])π ⎫ ⎪
⎪
⎪
⎪
⎪ , ⎪
⎪
⎪
⎪ s 1 s 2 ⎪
⎪
⎨ ⎬
χD δ2 � ⎪ ⎪ .
⎪
⎪ ⎪
⎪
⎪
⎪ i([0.2,0.2],[0.1,0.5])π i([0.1,0.3],[0.3,0.6])π ⎪
⎪
⎪ ([0.2, 0.3], [0.1, 0.6])e
⎪
⎩ ,
([0.2, 0.4], [0.3, 0.4])e ⎪
⎪
⎭
s3 s4
(34)
⎪
⎧
⎪ ([0.2, 0.3], [0.2, 0.5])ei([0.1,0.4],[0.4,0.5])π ([0.2, 0.4], [0.1, 0.3])ei([0.3,0.6],[0.2,0.3])π ⎫ ⎪
⎪
⎪
⎪
⎪ , ,⎪
⎪
⎪
⎪
⎪ s 1 s 2 ⎪
⎪
⎨ ⎬
χD δ3 � ⎪ ⎪ ,
⎪
⎪ ⎪
i([0.2,0.5],[0.2,0.4])π ⎪
⎪
⎪ ([0.2, 0.4], [0.1, 0.3])e i([0.2,0.5],[0.1,0.2])π
([0.3, 0.3], [0.2, 0.6])e ⎪
⎪
⎪
⎪ , ⎪
⎪
⎩ ⎭
s3 s4
⎧
⎪
⎪
⎪ ([0.3, 0.5], [0.3, 0.4])ei([0.4,0.5],[0.3,0.4])π ([0.1, 0.3], [0.3, 0.5])ei([0.4,0.4],[0.3,0.5])π ⎪ ⎪
⎫
⎪
⎪
⎪ , ⎪
⎪
⎪
⎪ s 1 s 2 ⎪
⎪
⎨ ⎬
χD δ4 � ⎪ ⎪ ,
⎪
⎪ ⎪
i([0.3,0.5],[0.2,0.3])π ⎪
⎪
⎪ ([0.1, 0.4], [0.3, 0.5])e i([0.3,0.5],[0.1,0.2])π
([0.4, 0.5], [0.2, 0.4])e ⎪
⎪
⎪
⎪ , ⎪
⎪
⎩ ⎭
s3 s4
⎪
⎧
⎪
⎪ ⎪
⎧
⎪
⎪ ([0.4, 0.5], [0.3, 0.4])ei([0.1,0.4],[0.3,0.5])π ([0.2, 0.3], [0.2, 0.6])ei([0.2,0.3],[0.3,0.5])π ⎫ ⎪
⎪
⎪
⎪
⎫
⎪
⎪
⎪
⎪ ⎜
⎛
⎜ ⎪
⎪ , , ⎪
⎪ ⎟
⎞
⎟ ⎪
⎪
⎪⎜
⎪ ⎜
⎜ ⎪
⎪ s s ⎪
⎪ ⎟
⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜
⎜ ⎪
⎨
1 2 ⎪
⎬ ⎟
⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜
⎜ ⎟
⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜
⎜ δ 1 , ⎪ ⎪ ⎟
⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜ ⎪
⎪ ⎪
⎪ ⎟
⎟ ⎪
⎪
⎪ ⎜
⎜ ⎪ ⎪ ⎟
⎟ ⎪
⎪⎜
⎪
⎪
⎜
⎝ ⎪ ⎪
⎪ ([0.1, 0.4], [0.4, 0.5])e i([0.3,0.4],[0.1,0.3])π
([0.4, 0.5], [0.2, 0.4])e i([0.1,0.4],[0.1,0.2])π ⎪
⎪
⎪ ⎠⎪
⎟
⎟ ⎪
⎪
⎪
⎪ ⎪
⎩ , ⎪
⎭ ⎪
⎪
⎪
⎪ s s ⎪
⎪
⎪
⎪ 3 4 ⎪
⎪
⎪
⎪ ⎪
⎪
⎪
⎪ ⎪
⎪
⎪
⎪ ⎪
⎪
⎪
⎪ ⎪
⎧ ([0.1, 0.2], [0.2, 0.7])e i([0.2,0.4],[0.3,0.5])π
([0.1, 0.6], [0.2, 0.3])e i([0.4,0.5],[0.2,0.3])π
⎪
⎫ ⎪
⎪
⎪
⎪ ⎪
⎪ ⎪
⎪ ⎪
⎪
⎪
⎪ ⎛
⎜
⎜ ⎪
⎪ , ⎪
⎪ ⎞
⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜
⎜ ⎪
⎪ s 1 s 2 ⎪
⎪ ⎟
⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜
⎜ ⎪
⎨ ⎪
⎬ ⎟
⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜
⎜ ⎟
⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜ δ 2 , ⎪ ⎪ ⎟
⎟ ⎪
⎪
⎪⎜
⎪ ⎜ ⎪
⎪ ⎪
⎪ ⎟
⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜
⎜ ⎪
⎪ i([0.2,0.2],[0.1,0.5])π i([0.1,0.3],[0.3,0.6])π ⎪
⎪ ⎟
⎟
⎟ ⎪
⎪
⎪
⎪ ⎝ ⎪ ⎪ ([0.2, 0.3], [0.1, 0.6])e ([0.2, 0.4], [0.3, 0.4])e ⎪
⎪ ⎠ ⎪
⎪
⎪
⎪ ⎪
⎩ , ⎪
⎭ ⎪
⎪
⎪
⎪ s s ⎪
⎪
⎪
⎨ 3 4 ⎪
⎬
ξD � ⎪
⎪ ⎪.
⎪
(35)
⎪
⎪ i([0.1,0.4],[0.4,0.5])π i([0.3,0.6],[0.2,0.3])π ⎪
⎪
⎪
⎪ ⎪
⎧
⎪ ([0.2, 0.3], [0.2, 0.5])e ([0.2, 0.4], [0.1, 0.3])e ⎪
⎫
⎪ ⎪
⎪
⎪
⎪ ⎜
⎛
⎜ ⎪
⎪ , ⎪
⎪ ⎟
⎞
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜ ⎪
⎪ s s ⎪
⎪ ⎟
⎟ ⎪
⎪
⎪
⎪⎜⎜
⎜ ⎨ ⎪
⎪ 1 2 ⎪
⎪ ⎟⎪
⎟ ⎪
⎪
⎪ ⎜
⎜ ⎬ ⎟
⎟
⎟ ⎪
⎪
⎪
⎪⎜⎜
⎜ δ3 , ⎪ ⎟
⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜
⎜ ⎪ ⎪
⎪ ⎟
⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜ ⎪
⎪ ⎪
⎪ ⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎝ ⎪
⎪ ([0.2, 0.4], [0.1, 0.3])e i([0.2,0.5],[0.1,0.2])π
([0.3, 0.3], [0.2, 0.6])e i([0.2,0.5],[0.2,0.4])π ⎪
⎪ ⎟
⎟
⎠ ⎪
⎪
⎪
⎪ ⎪
⎪ , ⎪
⎪ ⎪
⎪
⎪
⎪ ⎩ ⎭ ⎪
⎪
⎪
⎪ s3 s4 ⎪
⎪
⎪
⎪ ⎪
⎪
⎪
⎪ ⎪
⎪
⎪
⎪ ⎪
⎪
⎪
⎪ i([0.4,0.5],[0.3,0.4])π i([0.4,0.4],[0.3,0.5])π ⎪
⎪
⎪
⎪ ⎪
⎧
⎪ ([0.3, 0.5], [0.3, 0.4])e ([0.1, 0.3], [0.3, 0.5])e ⎪
⎫
⎪ ⎪
⎪
⎪
⎪ ⎜
⎛
⎜ ⎪
⎪ , ⎪
⎪ ⎟
⎞
⎟ ⎪
⎪
⎪⎜
⎪ ⎜ ⎪
⎪ s s ⎪⎟
⎪ ⎟ ⎪
⎪
⎪ ⎜
⎜ ⎪
⎪ 1 2 ⎪
⎪ ⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜
⎜ ⎨ ⎬ ⎟⎪
⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜
⎜ δ 4, ⎪
⎟
⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜
⎜ ⎪ ⎪
⎪ ⎟
⎟
⎟ ⎪
⎪
⎪
⎪⎜⎜
⎜ ⎪ ⎪
⎪ ⎪
⎪⎟⎟⎪
⎟ ⎪
⎪
⎪ ⎝ ⎪ ([0.1, 0.4], [0.3, 0.5])e i([0.3,0.5],[0.1,0.2])π
([0.4, 0.5], [0.2, 0.4])e i([0.3,0.5],[0.2,0.3])π ⎪
⎪ ⎠ ⎪
⎪
⎪
⎪ ⎪
⎪ , ⎪
⎪ ⎪
⎪
⎩ ⎩ ⎭ ⎭
s3 s4
⎪
⎧ ([0.275, 0.425], [0.275, 0.475]) ([0.150, 0.375], [0.200, 0.500]) ⎪
⎫
⎪
⎪ , ⎪
⎪
⎪
⎪ δ1 δ2 ⎪
⎪
�� �� ⎪
⎨ ⎪
⎬
��ξ D ��(Amplitude Term) � ,
⎪
⎪ ⎪
⎪
⎪
⎪ ⎪
⎪
⎪ ([0.225, 0.350], [0.150, 0.425]), ([0.225, 0.425], [0.275, 0.450])
⎪
⎩
⎪
⎪
⎭
δ3 δ4
(36)
⎪
⎧ ([0.175, 0.375], [0.200, 0.375]) ([0.225, 0.350], [0.225, 0.475]) ⎪
⎫
⎪
⎪ , ⎪
⎪
⎪
⎪ δ1 δ2 ⎪
⎪
�� �� ⎪
⎨ ⎪
⎬
��ξ D ��(Phase Term) � .
⎪
⎪ ⎪
⎪
⎪
⎪ ⎪
⎪
⎪
⎪ ([0.200, 0.500], [0.225, 0.350]) ([0.350, 0.475], [0.225, 0.350]) ⎪
⎪
⎩ , ⎭
δ3 δ4
Step 3. The set ξ D can be determined as follows:
14 Applied Computational Intelligence and Soft Computing
where
m11 � [0.4, 0.5], [0.3, 0.4], m12 � [0.1, 0.2], [0.2, 0.7], m13 � [0.2, 0.3], [0.2, 0.5], m14 � [0.3, 0.5], [0.3, 0.4],
m21 � [0.2, 0.3], [0.2, 0.6], m22 � [0.1, 0.6], [0.2, 0.3], m23 � [0.2, 0.4], [0.1, 0.3], m24 � [0.1, 0.3], [0.3, 0.5],
m31 � [0.1, 0.4], [0.4, 0.5], m32 � [0.2, 0.3], [0.1, 0.6], m33 � [0.2, 0.4], [0.1, 0.3], m34 � [0.1, 0.4], [0.3, 0.5],
m41 � [0.4, 0.5], [0.2, 0.4], m42 � [0.2, 0.4], [0.3, 0.4], m43 � [0.3, 0.3], [0.2, 0.6], m44 � [0.4, 0.5], [0.2, 0.4]
(38)
0.2 0.0 0.1 0.2 0.150 0.020000
⎢
⎡ ⎤⎥⎥⎥⎡ ⎢ ⎥⎥⎤⎥ ⎢ ⎡ ⎥⎥⎤⎥
⎢
⎢
⎢
⎢ ⎥⎥⎥⎢ ⎢
⎢
⎢ ⎥⎥⎥ ⎢ ⎢
⎢
⎢ ⎥⎥
⎢
⎢
1⎢
⎢
⎢ 0.1 0.4 0.3 0.0 ⎥⎥⎥⎢ ⎢
⎢
⎢ 0.175 ⎥⎥⎥⎥ ⎢ ⎢
⎢
⎢
⎢ 0.036250 ⎥⎥⎥⎥⎥
⎢ ⎥
⎥⎥⎥⎢ ⎢ ⎥⎥⎥ ⎢ ⎥⎥⎥
� ⎢
⎢
⎢ ⎥⎥⎥⎢ ⎢
⎢
⎢ ⎥⎥⎥ � ⎢
⎢
⎢
⎢ ⎥⎥⎥.
4⎢
⎢
⎢
⎢ 0.0 0.2 0.3 0.1 ⎥
⎥ ⎢
⎢
⎢ 0.200 ⎥
⎥
⎥
⎢
⎢
⎢
⎢ 0.027500 ⎥⎥⎥
⎢
⎢ ⎥ ⎢
⎥⎥⎥⎢ ⎥ ⎢
⎥⎥⎥ ⎢ ⎥⎥⎥
⎢
⎢
⎣ ⎦⎢
⎢
⎣ ⎦ ⎢
⎢
⎣ ⎥⎦
0.3 0.1 0.1 0.3 0.150 0.031875
ξ D (PhaseTerm) �
[0.1, 0.4], [0.3, 0.5] [0.2, 0.4], [0.3, 0.5] [0.1, 0.4], [0.4, 0.5] [0.4, 0.5], [0.3, 0.4] [0.175, 0.375], [0.200, 0.375]
⎢
⎡
⎢
⎢ ⎤⎥⎥⎥⎢⎢⎡⎢ ⎥⎥⎤⎥
⎢
⎢
⎢ ⎥⎥⎥⎢⎢⎢ ⎥⎥⎥
⎢ [0.2, 0.3], [0.3, 0.5] [0.4, 0.5], [0.2, 0.3] [0.3, 0.6], [0.2, 0.3] [0.4, 0.4], [0.3, 0.5] ⎥⎥⎥⎥⎥⎢⎢⎢⎢⎢ [0.225, 0.350], [0.225, 0.475] ⎥⎥⎥⎥⎥
⎢
1⎢
⎢
⎢
⎢
⎢ ⎥⎥⎥⎢⎢⎢ ⎥⎥⎥
4⎢
⎢
⎢
⎢
⎢
⎥⎥⎥⎢⎢⎢
[0.3, 0.4], [0.1, 0.3] [0.2, 0.2], [0.1, 0.5] [0.2, 0.5], [0.1, 0.2] [0.3, 0.5], [0.1, 0.2] ⎥⎥⎥⎢⎢⎢ [0.200, 0.500], [0.225, 0.350] ⎥⎥⎥⎥⎥
⎥ ⎢
⎥⎥
⎢
⎢
⎢
⎢
⎣ ⎥ ⎢
⎥⎦⎢⎣ ⎥⎥⎦
[0.1, 0.4], [0.1, 0.2] [0.1, 0.3], [0.3, 0.6] [0.2, 0.5], [0.2, 0.4] [0.3, 0.5], [0.2, 0.3] [0.350, 0.475], [0.225, 0.350]
where
Example 3. Consider M � e1 , e2 , e3 , . . . , e8 with IV-
Λ: M ⟶ CIV (Z),
(41) CNHS-sets ΛM (e1 ), ΛM (e2 ), . . . , ΛM (e8 ) that are defined as
Λ λ � ∅ if λ ∉ M, follows:
⎪
⎧
⎪
⎪ ([0.1, 0.2], [0.1, 0.4], [0.2, 0.3])ei([0.1,0.2],[0.3,0.4],[0.3,0.3])π ([0.1, 0.3], [0.2, 0.4], [0.2, 0.2])ei([0.1,0.2][0.3,0.4],[0.1,0.3])π ⎫ ⎪
⎪
⎪
⎪
⎪ , ⎪
⎪
⎪
⎪ t1 t 2 ⎪
⎪
⎨ ⎬
ΛM e1 � ⎪ ⎪ ,
⎪
⎪ ⎪
i([0.2,0.2],[0.2,0.4],[0.2,0.3])π ⎪
⎪
⎪ ([0.1, 0.2], [0.3, 0.3], [0.3, 0.4])e i([0.1,0.1],[0.4,0.5],[0.3,0.3])π
([0.1, 0.2], [0.3, 0.4], [0.2, 0.3])e ⎪
⎪
⎪
⎪ , ⎪
⎪
⎩ ⎭
t3 t4
⎪
⎧
⎪
⎪ ([0.2, 0.3], [0.3, 0.3], [0.1, 0.3])ei([0.1,0.2],[0.1,0.5],[0.1,0.2])π ([0.3, 0.4], [0.3, 0.4], [0.1, 0.1])ei([0.1,0.2],[0.2,0.4],[0.2,0.3])π ⎫ ⎪
⎪
⎪
⎪
⎪ , ⎪
⎪
⎪
⎪ t 1 t 2 ⎪
⎪
⎨ ⎬
ΛM e2 � ⎪ ⎪ ,
⎪
⎪ ⎪
i([0.1,0.3],[0.2,0.2],[0.2,0.3])π ⎪
⎪
⎪ ([0.2, 0.3], [0.2, 0.4], [0.2, 0.3])e i([0.1,0.2],[0.1,0.4],[0.3,0.3])π
([0.1, 0.1], [0.4, 0.4], [0.3, 0.4])e ⎪
⎪
⎪
⎪ , ⎪
⎪
⎩ ⎭
t3 t4
⎪
⎧
⎪
⎪ ([0.1, 0.3], [0.2, 0.4], [0.2, 0.2])ei([0.1,0.2],[0.2,0.3],[0.3,0.4])π ([0.1, 0.3], [0.1, 0.2], [0.3, 0.4])ei([0.1,0.2],[0.2,0.3],[0.2,0.4])π ⎫ ⎪
⎪
⎪
⎪
⎪ , ⎪
⎪
⎪
⎪ t1 t2 ⎪
⎪
⎨ ⎬
ΛM e3 � ⎪ ⎪ ,
⎪
⎪ ⎪
i([0.2,0.3],[0.1,0.2],[0.3,0.4])π ⎪
⎪
⎪ ([0.1, 0.1], [0.1, 0.4], [0.1, 0.2])e i([0.1,0.2],[0.2,0.4],[0.3,0.3])π
([0.1, 0.3], [0.2, 0.3], [0.1, 0.3])e ⎪
⎪
⎪
⎪ , ⎪
⎪
⎩ ⎭
t3 t4
⎪
⎧
⎪
⎪ ([0.1, 0.2], [0.2, 0.3], [0.1, 0.4])ei([0.1,0.2],[0.1,0.3],[0.2,0.2])π ([0.1, 0.3], [0.2, 0.4], [0.1, 0.2])ei([0.1,0.2],[0.1,0.3],[0.2,0.4])π ⎫ ⎪
⎪
⎪
⎪
⎪ , ⎪
⎪
⎪
⎪ t1 t2 ⎪
⎪
⎨ ⎬
ΛM e4 � ⎪ ⎪ ,
⎪
⎪ ⎪
i([0.1,0.3],[0.2,0.2],[0.1,0.3])π ⎪
⎪
⎪ ([0.4, 0.4], [0.1, 0.2], [0.1, 0.1])e i([0.1,0.2],[0.1,0.4],[0.2,0.3])π
([0.1, 0.1], [0.2, 0.3], [0.2, 0.4])e ⎪
⎪
⎪
⎪ , ⎪
⎪
⎩ ⎭
t3 t4
⎪
⎧
⎪
⎪ ([0.1, 0.2], [0.4, 0.5], [0.2, 0.2])ei([0.1,0.3],[0.2,0.3],[0.1,0.3])π ([0.1, 0.2], [0.2, 0.2], [0.2, 0.5])ei([0.1,0.1],[0.1,0.4],[0.3,0.4])π ⎫ ⎪
⎪
⎪
⎪
⎪ , ⎪
⎪
⎪
⎪ t1 t2 ⎪
⎪
⎨ ⎬
ΛM e5 � ⎪ ⎪ ,
⎪
⎪ ⎪
i([0.1,0.2],[0.3,0.4],[0.1,0.3])π ⎪
⎪
⎪ ([0.1, 0.2], [0.2, 0.6], [0.1, 0.1])e i([0.1,0.1],[0.1,0.2],[0.2,0.3])π
([0.1, 0.3], [0.3, 0.4], [0.1, 0.2])e ⎪
⎪
⎪
⎪ , ⎪
⎪
⎩ ⎭
t3 t4
16 Applied Computational Intelligence and Soft Computing
⋮ ⋮ ⋮ ⋱ ⋮
⎪
⎧
⎪ ([0.2, 0.2], [0.3, 0.4], [0.1, 0.2])ei([0.1,0.2],[0.2,0.3],[0.3,0.4])π ([0.1, 0.1], [0.1, 0.3], [0.4, 0.4])ei([0.1,0.1],[0.2,0.5],[0.2,0.3])π ⎫ ⎪
⎪
⎪ , ,⎪
⎪
⎪
⎪
⎨ t1 t2 ⎪
⎬
ΛM e6 � ⎪ ⎪,
⎪
⎪ i([0.1,0.2],[0.1,0.6],[0.1,0.1])π i([0.1,0.2],[0.1,0.6],[0.1,0.1])π ⎪
⎪
⎪
⎪ ([0.1, 0.2], [0.2, 0.4], [0.1, 0.3])e ([0.1, 0.1], [0.2, 0.5], [0.2, 0.3])e ⎪
⎪
⎩ , ⎭
t3 t4
⎪
⎧
⎪ ([0.1, 0.2], [0.2, 0.4], [0.1, 0.3])ei([0.1,0,1],[0.2,0.3],[0.1,0.5])π ([0.1, 0.2], [0.1, 0.3], [0.3, 0.4])ei([0.1,0.2],[0.2,0.2],[0.2,0.5])π ⎫ ⎪
⎪
⎪
⎪ , ⎪
⎪
⎪
⎨ t1 t 2
⎪
⎬
ΛM e7 � ⎪ ⎪ ,
⎪
⎪ i([0.1,0.2],[0.1,0.3],[0.2,0.4])π i([0.1,0.1],[0.2,0.5],[0.1,0.2])π ⎪
⎪
⎪
⎪ ([0.1, 0.2], [0.1, 0.3], [0.3, 0.4])e ([0.1, 0.2], [0.4, 0.5], [0.1, 0.2])e ⎪
⎪
⎩ , ⎭
t3 t4
(42)
⎪
⎧
⎪ ([0.1, 0.2], [0.3, 0.3], [0.1, 0.4])ei([0.1.0.2],[0.4,0.5],[0.1,0.2])π ([0.1, 0.2], [0.2, 0.3], [0.2, 0.4])ei([0.1,0.2],[0.1,0.2],[0.1,0.3])π ⎫ ⎪
⎪
⎪
⎪ , ⎪
⎪
⎪
⎨ t 1 t2
⎪
⎬
ΛM e8 � ⎪ ⎪ .
⎪
⎪ i([0.1,0.2],[0.1,0.3],[0.3,0.4])π i([0.1,0.3],[0.4,0.5],[0.1,0.1])π ⎪
⎪
⎪
⎪ ([0.1, 0.1][0.1, 0.2], [0.4, 0.5])e ([0.1, 0.2], [0.2, 0.3], [0.1, 0.4])e ⎪
⎪
⎩ , ⎭
t3 t4
(43)
ΩW �
⎪
⎧
⎪
⎪ ⎪
⎧
⎪
⎪ ([0.1, 0.2], [0.1, 0.4], [0.2, 0.3])ei([0.1,0.2],[0.3,0.4],[0.3,0.3])π ([0.1, 0.3], [0.2, 0.4], [0.2, 0.2])ei([0.1,0.2][0.3,0.4],[0.1,0.3])π ⎫ ⎪
⎪
⎪
⎪
⎫
⎪
⎪
⎪
⎪ ⎜
⎛
⎜
⎜ ⎪
⎪ , ⎪
⎪ ⎟
⎞
⎟
⎟ ⎪
⎪
⎪
⎪⎜⎜
⎜ ⎪
⎪ t t ⎪
⎪ ⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜ ⎪
⎨
1 2 ⎪
⎬ ⎟
⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜
⎜ ⎟
⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜
⎜ e 1 , ⎪ ⎪ ⎟
⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜
⎜ ⎪
⎪ ⎪
⎪ ⎟
⎟
⎟ ⎪
⎪
⎪⎜
⎪ ⎜ ⎪
⎪ i([0.1,0.1],[0.4,0.5],[0.3,0.3])π i([0.2,0.2],[0.2,0.4],[0.2,0.3])π ⎪
⎪ ⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎝ ⎪ ⎪ ([0.1, 0.2], [0.3, 0.3], [0.3, 0.4])e ([0.1, 0.2], [0.3, 0.4], [0.2, 0.3])e ⎪
⎪ ⎟
⎠ ⎪
⎪
⎪
⎪ ⎪
⎩ , ⎪
⎭ ⎪
⎪
⎪
⎪ t t ⎪
⎪
⎪
⎪ 3 4 ⎪
⎪
⎪
⎪ ⎪
⎪
⎪
⎪ ⎪
⎪
⎪
⎪ ⎪
⎪
⎪
⎪ ⎪
⎧
⎪ ([0.2, 0.3], [0.3, 0.3], [0.1, 0.3])e i([0.1,0.2],[0.1,0.5],[0.1,0.2])π
([0.3, 0.4], [0.3, 0.4], [0.1, 0.1])e i([0.1,0.2],[0.2,0.4],[0.2,0.3])π ⎫⎪
⎪ ⎪
⎪
⎪
⎪ ⎜
⎛ ⎪
⎪ , ⎪
⎪ ⎟ ⎪
⎪
⎪⎜
⎪ ⎜ ⎪ ⎪ ⎞
⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜ ⎪
⎪ t 1 t 2 ⎪
⎪ ⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜ ⎪
⎨ ⎪
⎬ ⎟
⎟ ⎪
⎪⎜
⎪
⎜
⎜e , ⎟⎪
⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜
⎜ ⎪ 2 ⎪ ⎪ ⎟
⎟⎪
⎟ ⎪
⎪
⎪⎜⎜ ⎪ ⎪
⎪ ⎟
⎟ ⎪
⎪
⎪ ⎜ ⎪ ⎪
⎪
⎪
⎪ ⎝ ⎪
⎜ ⎪
⎪ ([0.2, 0.3], [0.2, 0.4], [0.2, 0.3])ei([0.1,0.2],[0.1,0.4],[0.3,0.3])π ([0.1, 0.1], [0.4, 0.4], [0.3, 0.4])ei([0.1,0.3],[0.2,0.2],[0.2,0.3])π ⎪ ⎪
⎪ ⎠⎪
⎟
⎟ ⎪
⎪
⎪
⎪
⎪ ⎪
⎩ , ⎪
⎭ ⎪
⎪
⎪
⎪ t t ⎪
⎪
⎪
⎪
3 4 ⎪
⎪
⎪
⎪ ⎪
⎪
⎪
⎪ ⎪
⎪
⎪
⎪ i([0.1,0.2],[0.2,0.3],[0.3,0.4])π i([0.1,0.2],[0.2,0.3],[0.2,0.4])π ⎪
⎪
⎪
⎪ ⎪
⎧
⎪ ([0.1, 0.3], [0.2, 0.4], [0.2, 0.2])e ([0.1, 0.3], [0.1, 0.2], [0.3, 0.4])e ⎪
⎫
⎪ ⎪
⎪
⎪
⎪ ⎜
⎛ ⎪
⎪ , ⎪
⎪ ⎟
⎞ ⎪
⎪
⎪
⎪ ⎜
⎜
⎜ ⎪
⎪ t t ⎪
⎪ ⎟
⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜
⎜ ⎪
⎪ 1 2 ⎪
⎪ ⎟
⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜ ⎨ ⎬ ⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜
⎜ e , ⎟
⎟
⎟ ⎪
⎪
⎪⎜
⎪ ⎜
⎜ ⎪ 3 ⎪
⎪ ⎪
⎪ ⎟
⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜
⎜ ⎪ i([0.2,0.3],[0.1,0.2],[0.3,0.4])π ⎪
⎪ ⎟
⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎝ ⎪
⎪ ([0.1, 0.1], [0.1, 0.4], [0.1, 0.2])e i([0.1,0.2],[0.2,0.4],[0.3,0.3])π
([0.1, 0.3], [0.2, 0.3], [0.1, 0.3])e ⎪
⎪ ⎟
⎠ ⎪
⎪
⎪
⎪ ⎪
⎪ , ⎪
⎪ ⎪
⎪
⎪
⎪ ⎩ ⎭ ⎪
⎪
⎪
⎪ t 3 t 4 ⎪
⎪
⎪
⎪ ⎪
⎪
⎪
⎪ ⎪
⎪
⎪
⎪ ⎪
⎪
⎪
⎪ ⎪
⎧ i([0.1,0.2],[0.1,0.3],[0.2,0.2])π i([0.1,0.2],[0.1,0.3],[0.2,0.4])π ⎫⎪ ⎪
⎪
⎪
⎪ ⎪
⎪ ([0.1, 0.2], [0.2, 0.3], [0.1, 0.4])e ([0.1, 0.3], [0.2, 0.4], [0.1, 0.2])e ⎪
⎪ ⎪
⎪
⎪
⎪ ⎜
⎛
⎜
⎜ ⎪
⎪ , ⎪
⎪ ⎟
⎞
⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜ ⎪
⎪ t t ⎪⎟
⎪ ⎟ ⎪
⎪
⎪⎜
⎪ ⎜
⎜ ⎪
⎨
1 2 ⎪
⎬⎟⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜ ⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜
⎜ e 4 , ⎪ ⎪ ⎟
⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜
⎜ ⎪
⎪ ⎪
⎪ ⎟
⎟
⎟ ⎪
⎪
⎪
⎪⎜⎜
⎜ ⎪
⎪ i([0.1,0.2],[0.1,0.4],[0.2,0.3])π i([0.1,0.3],[0.2,0.2],[0.1,0.3])π ⎪
⎪ ⎟
⎟
⎟ ⎪
⎪
⎪
⎪ ⎝ ⎪
⎪ ([0.4, 0.4], [0.1, 0.2], [0.1, 0.1])e ([0.1, 0.1], [0.2, 0.3], [0.2, 0.4])e ⎪
⎪ ⎠ ⎪
⎪
⎪
⎪ ⎪
⎩ , ⎪
⎭ ⎪
⎪
⎪
⎪ t3 t4 ⎪
⎪
⎪
⎨ ⎪
⎬
⎪ ⎪ . (44)
⎪
⎪ ⎪
⎪
⎪
⎪ ⎪
⎧
⎪ ([0.1, 0.2], [0.4, 0.5], [0.2, 0.2])e i([0.1,0.3],[0.2,0.3],[0.1,0.3])π
([0.1, 0.2], [0.2, 0.2], [0.2, 0.5])e i([0.1,0.1],[0.1,0.4],[0.3,0.4])π ⎫⎪
⎪ ⎪
⎪
⎪
⎪ ⎜
⎛ ⎪
⎪ , ⎪
⎪ ⎟
⎞ ⎪
⎪
⎪
⎪ ⎜
⎜
⎜ ⎪
⎪ ⎪
⎪ ⎟
⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜ ⎪ t1 t2 ⎪ ⎟
⎟ ⎪
⎪⎜
⎪ ⎜ ⎨
⎜ ⎪ ⎪
⎬ ⎟⎪
⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜
⎜ e5 , ⎪ ⎟
⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜
⎜ ⎪ ⎪
⎪ ⎟
⎟
⎟ ⎪
⎪
⎪⎜
⎪ ⎜
⎜ ⎪
⎪ ⎪
⎪ ⎟
⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜
⎝ ⎪
⎪ ([0.1, 0.2], [0.2, 0.6], [0.1, 0.1])e i([0.1,0.1],[0.1,0.2],[0.2,0.3])π
([0.1, 0.3], [0.3, 0.4], [0.1, 0.2])e i([0.1,0.2],[0.3,0.4],[0.1,0.3])π ⎪
⎪ ⎟
⎟
⎠ ⎪
⎪
⎪
⎪ ⎪
⎪ ⎪
⎪ ⎪
⎪
⎪
⎪ ⎩ , ⎭ ⎪
⎪
⎪
⎪ t 3 t 4 ⎪
⎪
⎪
⎪ ⎪
⎪
⎪
⎪ ⎪
⎪
⎪
⎪ ⎪
⎪
⎪
⎪ i([0.1,0.2],[0.2,0.3],[0.3,0.4])π i([0.1,0.1],[0.2,0.5],[0.2,0.3])π ⎫ ⎪
⎪
⎪
⎪ ⎪
⎧
⎪ ([0.2, 0.2], [0.3, 0.4], [0.1, 0.2])e ([0.1, 0.1], [0.1, 0.3], [0.4, 0.4])e ⎪
⎪ ⎪
⎪
⎪⎛
⎪ ⎜
⎜ ⎪
⎪ , , ⎪
⎪ ⎟
⎞
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜ ⎪
⎪ t t ⎪
⎪ ⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜
⎜ ⎪
⎪ 1 2 ⎪
⎪ ⎟
⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜
⎜ ⎨ ⎬⎟⎟
⎟ ⎪
⎪
⎪
⎪⎜⎜
⎜ e ,
6 ⎪
⎟
⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜
⎜ ⎪ ⎪
⎪ ⎟
⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜ ⎪
⎪ ⎪
⎪ ⎟
⎟ ⎪
⎪
⎪⎜
⎪ ⎜ ⎪
⎝ ⎪ ([0.1, 0.2], [0.2, 0.4], [0.1, 0.3])e i([0.1,0.2],[0.1,0.6],[0.1,0.1])π
([0.1, 0.1], [0.2, 0.5], [0.2, 0.3])e i([0.1,0.2],[0.1,0.6],[0.1,0.1])π ⎪
⎪ ⎟
⎟
⎠ ⎪
⎪
⎪
⎪ ⎪
⎪ , ⎪
⎪ ⎪
⎪
⎪
⎪ ⎩ ⎭ ⎪
⎪
⎪
⎪ t3 t4 ⎪
⎪
⎪
⎪ ⎪
⎪
⎪
⎪ ⎪
⎪
⎪
⎪ ⎪
⎪
⎪
⎪ ⎪ ([0.1, 0.2], [0.2, 0.4], [0.1, 0.3])e
⎧ i([0.1,0,1],[0.2,0.3],[0.1,0.5])π i([0.1,0.2],[0.2,0.2],[0.2,0.5])π ⎪ ⎪
⎫ ⎪
⎪
⎪ ⎪
⎪ ([0.1, 0.2], [0.1, 0.3], [0.3, 0.4])e ⎪
⎪ ⎪
⎪
⎪
⎪ ⎜
⎛
⎜
⎜ ⎪
⎪ , ⎪
⎪ ⎟
⎞
⎟
⎟ ⎪
⎪
⎪
⎪⎜⎜
⎜ ⎪ ⎪
⎪ t t ⎪
⎪ ⎟⎪
⎟ ⎪
⎪
⎪ ⎜ 1 2 ⎪ ⎟
⎟ ⎪
⎪
⎪ ⎜
⎜ ⎨ ⎬ ⎟⎪
⎟ ⎪
⎪
⎪⎜
⎪ ⎜
⎜
⎜ e 7 , ⎪ ⎪
⎟
⎟
⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜
⎜ ⎪
⎪ ⎪
⎪ ⎟
⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜ ⎪
⎪ i([0.1,0.2],[0.1,0.3],[0.2,0.4])π i([0.1,0.1],[0.2,0.5],[0.1,0.2])π ⎪
⎪ ⎟
⎟ ⎪
⎪
⎪
⎪ ⎜ ⎪
⎝ ⎪ ([0.1, 0.2], [0.1, 0.3], [0.3, 0.4])e ([0.1, 0.2], [0.4, 0.5], [0.1, 0.2])e ⎪
⎪ ⎟
⎠ ⎪
⎪
⎪
⎪ ⎪
⎩ , ⎭ ⎪
⎪ ⎪
⎪
⎪ t t ⎪
⎪
⎪
⎪ 3 4 ⎪
⎪
⎪
⎪ ⎪
⎪
⎪
⎪ ⎪
⎪
⎪
⎪ ⎪
⎪
⎪
⎪ ⎪
⎧
⎪ ([0.1, 0.2], [0.2, 0.4], [0.1, 0.3])e i([0.1,0,1],[0.2,0.3],[0.1,0.5])π
([0.1, 0.2], [0.1, 0.3], [0.3, 0.4])e i([0.1,0.2],[0.2,0.2],[0.2,0.5])π ⎫⎪
⎪ ⎪
⎪
⎪
⎪ ⎜
⎛ ⎪
⎪ , ⎪
⎪ ⎟
⎞ ⎪
⎪
⎪⎜
⎪ ⎜ ⎪
⎪ ⎪
⎪⎟⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜
⎜ ⎪
⎪ t 1 t 2 ⎪ ⎟
⎟ ⎪
⎪
⎪
⎪⎜⎜
⎜ ⎨ ⎪
⎬ ⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜ e , ⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜
⎜ 8 ⎪ ⎪ ⎟
⎟⎪
⎟ ⎪
⎪
⎪⎜⎜
⎜ ⎪
⎪ ⎪
⎪ ⎟
⎟ ⎪
⎪
⎪ ⎜
⎜ ⎪
⎪ i([0.1,0.2],[0.1,0.3],[0.2,0.4])π i([0.1,0.1],[0.2,0.5],[0.1,0.2])π ⎪
⎪ ⎟
⎟ ⎪
⎪
⎪ ⎝ ⎪
⎪ ([0.1, 0.2], [0.1, 0.3], [0.3, 0.4])e ([0.1, 0.2], [0.4, 0.5], [0.1, 0.2])e ⎪
⎪ ⎠ ⎪
⎪
⎪
⎪ ⎪
⎩ , ⎪
⎭ ⎪
⎪
⎩ t3 t4 ⎭
18 Applied Computational Intelligence and Soft Computing
Definition 28. Let ΩM1 � (Λ1 , M1 ) and ΩM2 � (Λ2 , M2 ) be Definition 31. For two IV-CNHS-sets (Λ1 , M1 ) and
two IV-CNHS-set over the same Z. The set ΩM1 � (Λ1 , M1 ) (Λ2 , M2 ) over the same universe Z, the following definitions
is said to be the subset of ΩM2 � (Λ2 , M2 ), if hold:
(i) M1 ⊆M2 (i) A IV-CNHS-set (Λ1 , M1 ) is a homogeneous IV-
← ⌣ ←
⌣
(ii) ∀x ∈→ M1 , Λ1→
⌣
(x)⊆Λ2 (x)
⌣
implies Λ1 (x)⊆Λ2 CNHS-set, represented by (Λ1 , M1 )Hom if and only
⌣ ⌣
⌣ ⌣ ⌣
(x), Λ 1 (x)⊆ Λ 2 (x), that is, if Λ1 (x) is a homogeneous IV-CNHS-set ∀x ∈ M1
← ⌣ ← (ii) A IV-CNHS-set (Λ1 , M1 ) is a completely homo-
c M1 (x) ≤ c M2 ← ←
⌣ → ⌣ → ⌣ ⌣ ⌣ geneous IV-CNHS-set, represented by
(x
→ ), c⌣M1 (x→) ≤ c⌣M2 (x), θ M1 (x) ≤ θ M2 (x) and ⌣
(Λ1 , M1 )CHom if and only if Λ1 (x) is a homoge-
θ M1 (x) ≤ θ M2 (x), ⌣
neous with Λ1 (y) ∀x, y ∈ M1
where A- and P-terms of each Λi , i � 1, 2 are given
below: (iii) A IV-CNHS-set (Λ1 , M1 ) is a completely homo-
← ⌣
←
⌣ ← ⌣ geneous IV-CNHS-set with (Λ2 , M2 ) if and only if
(c M1 (x), θ→ ⌣
M1 (x)) for Λ←1 (x) Λ1 (x) is a homogeneous with
→ ⌣ ⌣ ⌣ ⌣ ⌣
θ M1 (x)) for Λ
( c M1 (x), → ←1 (x ) Λ2 (x)∀x ∈ M1 M2
→ ⌣ ⌣ ⌣
θ M2 (x)) for Λ
( c M2 (x), → ← ⌣)
2 (x
→ ⌣ ⌣
( c M2 (x), θ M2 (x)) for Λ2 (x)
4.1. Set Theoretic Operations and Laws on IV-CNHS-Set.
Definition 29. Two IV-CNHS-set ΩM1 � (Λ1 , M1 ) and Some basic set operations and laws are discussed on IV-
ΩM2 � (Λ2 , M2 ) over the same Z, are said to be equal if CNHS-set in this section.
(i) (Λ1 , M1 )⊆(Λ2 , M2 ) Definition 32. The complement of IV-CNHS-set (Λ, M),
(ii) (Λ2 , M2 )⊆(Λ1 , M1 ) denoted by (Λ, M)c , is stated as follows:
⌣ ⌣ ⌣ ⌣
(Λ, M)c � x, (Λ(x))c : x∈ M, (Λ(x))c ∈ CIV (Z),
Definition 30. Let (Λ, M) be a IV-CNHS-set over Z. Then (45)
⌣ c
(i) (Λ, M) is called a null IV-CNHS-set, presented by where the A- and P-terms of the M-function (Λ(x)) are
⌣ ← ⌣ ← ⌣ → ⌣ c →
(Λ, M)Φ ; if for all values of x ∈ M, the A-term of the given by (c M (x))c � 1 −←c M (x) and ( c M
←((x))) � 1− c M
← ⌣ → ⌣ ⌣ ⌣ c ⌣
M-function←is given → by c M (x) � c M (x) � 0 and →) ⌣ and → (θ
(x M (x)) � 2π − θ M (x) and
⌣ ⌣ ⌣
P-term by θ M (x) � θ M (x) � 0π ( θ M (x))c � 2π − θ M (x), respectively.
(ii) (Λ, M) is called an absolute IV-CNHS-set, repre-
⌣
sented by (Λ, M)Δ ; if ∀x ∈ M, the A-term of the Proposition 6. Let (Λ, M) be a IV-CNHS-set over Z. Then
M-function is given by →
← ⌣ → ⌣
c M (x) � c M (x) � 1 ((Λ, M)c )c � (Λ, M).
←
⌣ ⌣
whereas P-term by θ M (x) � θ M (x) � 2π ⌣
Proof. Since Λ(x) ∈ CIV (Z), therefore, in terms of its A-
and P-terms, (Λ, M) can be written as follows:
← ⌣
→ ⌣
→ ⌣
(Λ, M) � x, c M (x)ei θ M (x) , c M (x)ei θ D (x) : x ∈ M.
⌣ ← ⌣ ⌣
(46)
Now,
Applied Computational Intelligence and Soft Computing 19
⎧
⎪ c
→ ⌣ c ⎪
⎫
⎨ ⌣ c i θ D (x) ⎞ ⎬
c ←
⌣
c ⌣ ⎜
⎛ ⎜
⌣ ⎛ ← ⌣ i θ M (x) → ⎟ ⎟ ⌣
(Λ, M) (x) � ⎪⎝x, ⎝ c M (x) e , c M (x) e ⎠⎞⎠: x ∈ M ⎪,
⎩ ⎭
⎪
⎧ c
→ ⌣ ⎪
⎫
c
⎨⎜ ← c
← ⌣
→ c i2π− θ D (x) ⎬
c ⌣
(Λ, M) (x) � ⎪⎝
⌣ ⎜
⎛x, ⎝ ⌣
⎛1 − c (x) ei 2π− θ M (x ) ⌣
, 1 − c M (x) e ⎞⎟
⎟
⎠ ⎠ ⌣
⎞: x ∈ M⎪,
M
⎩ ⎭
⎪
⎧ c
→ ⌣ ⎪
⎫
c
⎪
⎧ → ⌣ ⎪
⎫
⎨⎜⌣ ⎜ ←
← ⌣
i2π−2π− θ M (x) → ⌣ i2π−2π− θ D (x) ⎬
c c ⎛
⎝ ⎛
⎝ ⌣
(Λ, M) � ⎪ x, 1 − 1 − c M (x)e , 1 − 1 − c M (x)e ⎟
⎞
⎠⎞⎟ ⌣
⎠: x ∈ M⎪,
⎩ ⎭
← ⌣
→ ⌣
c c ⌣ ← ⌣ → ⌣ θ D (x) ⌣
(Λ, M) � x, c M (x)eiθ M (x) , c M (x)ei : x∈ M.
From equations (46) and (47), we have Definition 33. For two IV-CNHS-set (Λ1 , M1 ) and
((Λ, M)c )c � (Λ, M). □ (Λ2 , M2 ), the intersection (Λ1 , M1 ) (Λ2 , M2 ) over the
same universe Z is the IV-CNHS-set (Λ3 , M3 ), where
⌣
Proposition 7. Let (Λ, M) be a IV-CNHS-set over Z. Then M3 � M1 ∐M2 , and for all x ∈ M3 ,
(i) ((Λ, M)Φ )c � (Λ, M)Δ
(ii) ((Λ, M)Δ )c � (Λ, M)Φ
←
⎪
⎧
⎪ ← ⌣ ⌣
⌣
⎪
⎪ c M1 (x)ei θ M1 (x) , if x∈ M1 \M2 ,
⎪
⎪
← ⌣ ⎪
⎨ ← ⌣
← ⌣ i θ M (x ⌣
Λ3 (x) � ⎪ c M2 (x )e 2 ) , if x∈ M2 M1 ,
⎪
⎪
⎪
⎪ ← ⌣ ←
⎪
⎪ ← ⌣ ← ⌣
⌣
i min θ M1 (x),θ M2 (x) ⌣
⎩ min c M (x ), c M (x ) e , if x∈ M1 M2 ,
1 2
→ ⌣ (48)
⎪
⎧
⎪ → ⌣ i θ M (x ) ⌣
⎪
⎪ c M (x )e 1 , if x∈ M1 \M2 ,
⎪
⎪ 1
⎪
→ ⌣ ⎪ ⎨ → ⌣
Λ 3 (x) � ⎪ →
c M2 (x)ei θ M2 (x) ,
⌣ ⌣
if x∈ M2 M1 ,
⎪
⎪
⎪
⎪ → ⌣ → ⌣
⎪
⎪ i min θ M1 (x), θ M2 (x)
⎪
⎩ min→ ⌣ → ⌣ ⌣
c M1 (x), c M2 (x)e , if x∈ M1 M2 .
Definition 34. The difference between two IV-CNHS-set Definition 35. For two IV-CNHS-set (Λ1 , M1 ) and
(Λ1 , M1 ) and (Λ2 , M2 ) is defined as follows: (Λ2 , M2 ), the union (Λ1 , M1 )∐(Λ2 , M2 ) over the same
c universe Z is the IV-CNHS-set (Λ3 , M3 ), where
Λ1 , M1 ∖ Λ2 , M2 � Λ1 , M1 Λ2 , M2 . (49) ⌣
M3 � M1 ∐M2 , and for all x ∈ M3 ,
20 Applied Computational Intelligence and Soft Computing
←
⎪
⎧
⎪ ← ⌣ ⌣
⌣
⎪
⎪ c M1 (x)eiθ M1 (x) , if x∈ M1 M2 ,
⎪
⎪
← ⌣ ⎪
⎨← ←
⌣
⌣ iθ M (x ⌣
Λ3 (x) � ⎪ c M2 (x )e 2 ) , if x∈ M2 M1 ,
⎪
⎪
⎪
⎪ ← ←
⎪
⎪ ← ⌣ ← ⌣
⌣ ⌣
i max θ M1 (x), θ M2 (x) ⌣
⎩ max c M (x ), c M2 (x)e , if x∈ M1 M2 ,
1
→ ⌣ (50)
⎧
⎪
⎪ → ⌣ i θ M (x ) ⌣
⎪
⎪ c M (x )e 1 , if x∈ M1 M2 ,
⎪
⎪ 1
⎪
→ ⌣ ⎪ ⎨ → ⌣
Λ 3 (x) � ⎪ →
c M2 (x)ei θ M2 (x) ,
⌣ ⌣
if x∈ M2 M1 ,
⎪
⎪
⎪
⎪ → ⌣ → ⌣
⎪
⎪ i max θ M1 (x), θ M2 (x)
⎪
⎩ → ⌣ → ⌣ ⌣
max c M1 (x), c M2 (x)e , if x∈ M1 M2 .
⌣
⌣ ⌣ ⌣
χ (x )
1 2 3 D (53)
Note: Propositions 3–5 are also valid for SV-NHS-sets. η‖ξD ‖ (x), η‖ξD ‖ (x), η‖ξD ‖ (x) � ,
|Z|
4.2. Aggregation of Interval-Valued Complex Neutrosophic respectively. These have interval-valued neutrosophic values.
Hypersoft Set. In this part of the paper, aggregation oper- Note that ‖Civcnhss (Z)‖ is the collection of all cardinal sets of
ations and their decisive system for IV-CNHS-set are IV-CNHS-sets and ‖Civcnhss (Z)‖⊆IVN(D).
established that results an aggregate fuzzy set from a CNHS-
set and its cardinal set and has fuzzy-like nature. The terms Definition 38. Let ξ D ∈ Civcnhss (Z) and ‖ξ D ‖ ∈ ‖Civcnhss
D, E, ξ D and ⊎ are in accordance with Definition 27. (Z)‖. Consider E as in Definition 27; the tabular repre-
IVCNHS
sentation of ‖ξ D ‖ can be seen in Table 6.
⌣ ⌣ ⌣
Definition 36. Let ξ D ∈ ⊎IVCNHS . Assume that If α1j � (η1‖ξD ‖ (xj ), η2‖ξD ‖ (xj ), η3‖ξD ‖ (xj )), for j � Nr1 .
Z � ]1 , ]2 , . . . , ]m and E � L1 , L2 , . . . , Ln with L1 � then the cardinal set ‖ξ D ‖ is represented by the following
e11 , e12 , . . . , e1n , L2 � e21 , e22 , . . . , e2n , . . . , Ln � matrix:
⌣ ⌣
en1 , en2 , . . . , enn and D � L1 × L2 × · · · × Ln � x1 , x2 , αij 1×r � α11 α12 · · · α1r , (54)
⌣ ⌣ ⌣ ⌣
. . . , xn , . . . , xnn � xr }, each xi is n-tuple element of D and
|D| � r � nn ; the representation of ξ D can be seen in Table 5. which is called the cardinal matrix of ‖ξ D ‖.
In Table 5, η1χD (x) , η2χD (x) , and η2χD (x) are M-function, ID-
function, and NM-function of χ D , respectively, with inter- Definition 39. Let ξ D ∈ Civcnhss (Z) and ‖ξ D ‖ ∈ ‖Civcnhss
val-valued neutrosophic values. If αij � (η1χ (x⌣ ) (]i ), (Z)‖. Then IV-CNHS-aggregation operator is defined as
D j
(52)
Definition 40. Let ξ D ∈ Civcnhss (Z) and ξ D be its aggregate
where η1‖ξD ‖ , η2‖ξD ‖ , η3‖ξD ‖ : D ⟶ [0, 1] are M-function, ID- fuzzy set. Assume that Z � ]1 , ]2 , . . . , ]m , then ξ D can be
function, and NM-function of ‖ξ D ‖ with presented as follows:
Applied Computational Intelligence and Soft Computing 21
ξD ⋮ η which is called the aggregate matrix of ξ D over Z.
⎢
⎡
⎢
⎢ ξD
⎤⎥⎥⎥
⎢
⎢
⎢ ⎥⎥⎥
⎢
⎢
⎢ ⋮
...... ......⎥⎥⎥
⎢
⎢
⎢ ⎥⎥⎥
⎢ ⎥ 4.3. Applications of Interval-Valued Complex Neutrosophic
⎢
⎢
⎢
⎢
⎢ ]1 ⋮ η ]1 ⎥⎥⎥⎥⎥
⎢
⎢ ξD ⎥⎥⎥ Hypersoft Set. Now considering the definitions stated in
⎢
⎢
⎢ ⎥⎥⎥. (59)
⎢
⎢ Subsection 4.2, an algorithm is presented in this segment of
⎢
⎢
⎢ ]2 ⋮ η ]2 ⎥⎥⎥⎥⎥ the paper to assist the decision-support system, and the
⎢
⎢
⎢ ξD ⎥
⎥⎥⎥
⎢
⎢
⎢ ⎥⎥⎥
⎢
⎢ presented algorithm will be validated with the help of an
⎢
⎢
⎢ ⋮ ⋮ ⋮ ⎥⎥⎥
⎢
⎢
⎢ ⎥⎥⎥ example from a daily-life scenario.
⎣ ⎦
]m ⋮ η ]m Now, Algorithm 2 is explained with the help of the
ξD following example.
If αi1 � η(]i ) for i � Nm
1 , then ξ D is represented by the
ξD
following matrix: Example 4. Considering the problem statement stated in
Example 2, we construct IV-CNHS-sets ψ D (δ1 ), ψ D (δ2 ) and
α11 ψ D (δ3 ), ψ D (δ4 ) that are defined as follows:
⎢
⎡
⎢
⎢ ⎤⎥⎥⎥
⎢
⎢
⎢ α21 ⎥⎥⎥
αi1 m×1 � ⎢
⎢ ⎥⎥⎥, (60)
⎢
⎢
⎢ ⎥⎥⎥
⎢ ⎥⎥⎦
⎣ ⋮
⎢
⎢
αm1
⎪
⎧
⎪ ([0.4, 0.5], [0.1, 0.2], [0.1, 0.2])ei([0.1,0.2],[0.1,0.4],[0.3,0.3])π ([0.1, 0.1], [0.2, 0.3], [0.3, 0.4])ei([0.1,0.3],[0.2,0.3],[0.3,0.3])π ⎫ ⎪
⎪
⎪
⎪ , ⎪
⎪
⎪
⎪ s s ⎪
⎪
⎨ 1 2 ⎬
ψD δ1 � ⎪ ⎪ ,
⎪
⎪ ⎪
i([0.1,0.2],[0.1,0.4],[0.1,0.2])π ⎪
⎪
⎪ ([0.1, 0.2], [0.1, 0.4], [0.2, 0.2])e i([0.3,0.4],[0.3,0.4],[0.1,0.2])π
([0.1, 0.2], [0.4, 0.5], [0.2, 0.2])e ⎪
⎪
⎪
⎩ , ⎪
⎭
s3 s4
i([0.1,0.2],[0.2,0.4][0.2,0.2])π i([0.1,0.2],[0.4,0.5],[0.2,0.2])π
⎪
⎧
⎪ ([0.1, 0.2], [0.3, 0.5], [0.2, 0.2])e ([0.1, 0.2], [0.1, 0.5], [0.1, 0.2])e ⎪
⎫
⎪
⎪
⎪ , ⎪
⎪
⎪
⎪ s s ⎪
⎪
⎨ 1 2 ⎬
ψD δ2 � ⎪ ⎪ ,
⎪
⎪ ⎪
i([0.2,0.3],[0.1,0.3],[0.3,0.3])π ⎪
⎪ i([0.3,0.4],[0.2,0.3],[0.1,0.2])π ⎪
⎪ ([0.1, 0.1], [0.2, 0.3], [0.1, 0.5])e
⎪
⎩ ,
([0.1, 0.2], [0.2, 0.4], [0.3, 0.3])e ⎪
⎪
⎭
s3 s4
i((0.1,0.2),[0.1,0.4],[0.2,0.3])π i([0.2,0.3],[0.3,0.4],[0.2,0.2])π
⎪
⎧
⎪ ([0.3, 0.4], [0.2, 0.3], [0.1, 0.2])e ([0.1, 0.2], [0.2, 0.3], [0.1, 0.3])e ⎪
⎫
⎪
⎪
⎪ , ⎪
⎪
⎪
⎪ s s ⎪
⎪
⎨ 1 2 ⎬
ψD δ3 � ⎪ ⎪ ,
⎪
⎪ ⎪
i([0.1,0.2],[0.2,0.5],[0.2,0.2])π ⎪
⎪ i([0.3,0.3],[0.2,0.3],[0.1,0.2])π ⎪
⎪ ([0.1, 0.2], [0.2, 0.4], [0.1, 0.3])e
⎪
⎩ ,
([0.1, 0.2], [0.3, 0.3], [0.2, 0.3])e ⎪
⎪
⎭
s3 s4
i([0.1,0.2],[0.4,0.5],[0.2,0.2])π i([0.1,0.2],[0.1,0.4],[0.2,0.3])π
⎪
⎧
⎪ ([0.1, 0.3], [0.3, 0.4], [0.1, 0.2])e ([0.4, 0.5], [0.1, 0.3], [0.1, 0.1])e ⎪
⎫
⎪
⎪
⎪ , ⎪
⎪
⎪
⎪ s s ⎪
⎪
⎨ 1 2 ⎬
ψD δ4 � ⎪ ⎪ .
⎪
⎪ ⎪
i([0.1,0.2],[0.2,0.4],[0.2,0.3])π ⎪
⎪
⎪ ([0.1, 0.1], [0.1, 0.4], [0.1, 0.2])e i([0.2,0.3],[0.3,0.3],[0.3,0.3])π
([0.1, 0.2], [0.4, 0.5], [0.2, 0.2])e ⎪
⎪
⎪
⎩ , ⎪
⎭
s3 s4
(61)
22 Applied Computational Intelligence and Soft Computing
⊳ Start
⊳ Input Stage:
———–1. Consider Z as the universe of discourse
———–2. Consider E as a set of n parameters
———–3. Classify n parameters into disjoint parametric-valued sets L1 , L2 , L3 , . . . , Ln
⊳ Construction Stage:
———–4. D � L1 × L2 × L3 × · · · × Ln
———–5. Construct IV-CNHS-set χD over Z, in accordance with Definition 27
⊳ Computation Stage:
———–6. Compute ‖ξ D ‖ for A-term and P-term separately by using Definition 37
———–7. Compute ξ D for A-term and P-term separately with the help of Definition 39
———–8. Compute η (]) by using Definition 39
⊳ Output Stage: ξD
———–9. Find the best option by the max modulus of η (]) with the help of Definition 40
⊳ End ξD
χD �
⎪
⎧
⎪
⎪ ⎪
⎧
⎪
⎪ ([0.4, 0.5], [0.1, 0.2], [0.1, 0.2])ei([0.1,0.2],[0.1,0.4],[0.3,0.3])π ([0.1, 0.1], [0.2, 0.3], [0.3, 0.4])ei([0.1,0.3],[0.2,0.3],[0.3,0.3])π ⎫ ⎪
⎪
⎪
⎪
⎫
⎪
⎪
⎪
⎪ ⎜
⎛
⎜ ⎪
⎪ , ⎪
⎪ ⎟
⎞
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜
⎜ ⎪
⎪ s s ⎪
⎪ ⎟
⎟
⎟ ⎪
⎪
⎪⎜
⎪ ⎜ ⎪ ⎨
1 2 ⎪
⎬⎟⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜
⎜ ⎟
⎟ ⎪
⎪
⎪⎜
⎪ ⎜ δ1 , ⎪ ⎟
⎟
⎟ ⎪
⎪
⎪ ⎜
⎜ ⎪ ⎪
⎪ ⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜
⎜ ⎪
⎪ ⎪
⎪ ⎟
⎟
⎟ ⎪
⎪
⎪ ⎜
⎜
⎝ ⎪ ⎪ i([0.3,0.4],[0.3,0.4],[0.1,0.2])π i([0.1,0.2],[0.1,0.4],[0.1,0.2])π ⎪
⎪ ⎟
⎟
⎠ ⎪
⎪
⎪
⎪ ⎪
⎪ ([0.1, 0.2], [0.1, 0.4], [0.2, 0.2])e ([0.1, 0.2], [0.4, 0.5], [0.2, 0.2])e ⎪
⎪ ⎪
⎪
⎪
⎪ ⎩ , ⎭ ⎪
⎪
⎪
⎪ s s ⎪
⎪
⎪
⎪
3 4 ⎪
⎪
⎪
⎪ ⎪
⎪
⎪
⎪ ⎪
⎪
⎪
⎪ i([0.1,0.2],[0.2,0.4],[0.2,0.2])π i([0.1,0.2],[0.4,0.5],[0.2,0.2])π ⎪
⎪
⎪
⎪ ⎪
⎧
⎪ ([0.1, 0.2], [0.3, 0.5], [0.2, 0.2])e ([0.1, 0.2], [0.1, 0.5], [0.1, 0.2])e ⎪
⎫
⎪ ⎪
⎪
⎪
⎪ ⎛
⎜ ⎪
⎪ , ⎪
⎪ ⎞
⎟ ⎪
⎪
⎪⎜
⎪ ⎜
⎜ ⎪
⎪ s1 s2 ⎪
⎪ ⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜ ⎪
⎪ ⎪
⎪ ⎟
⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜
⎜ ⎨ ⎬⎟⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜ δ , ⎟
⎟ ⎪
⎪
⎪ ⎜
⎜ 2 ⎪ ⎪ ⎟
⎟ ⎪
⎪
⎪⎜
⎪
⎜
⎜ ⎪
⎪
⎪
⎪
⎪
⎪ ⎟⎪
⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜
⎝ ⎪ ⎪ i([0.3,0.4],[0.2,0.3],[0.1,0.2])π i([0.2,0.3],[0.1,0.3],[0.3,0.3])π ⎪
⎪ ⎟
⎠⎪
⎟ ⎪
⎪ ⎪ ([0.1, 0.1], [0.2, 0.3], [0.1, 0.5])e ([0.1, 0.2], [0.2, 0.4], [0.3, 0.3])e ⎪ ⎪
⎪
⎪
⎪
⎪
⎩ , ⎭ ⎪
⎪ ⎪
⎪
⎪
⎪ s3 s 4 ⎪
⎪
⎨ ⎬
⎪ ⎪ .
⎪ ⎪
⎪
⎪ i([0.1,0.2],[0.1,0.4],[0.2,0.3])π i([0.2,0.3],[0.3,0.4],[0.2,0.2])π ⎪ ⎪ ⎪
⎪
⎪
⎪
⎪
⎧
⎪ ([0.3, 0.4], [0.2, 0.3], [0.1, 0.2])e
⎪ ([0.1, 0.2], [0.2, 0.3], [0.1, 0.3])e ⎪ ⎪
⎫
⎪ ⎪
⎪
⎪
⎪ ⎜
⎛
⎜
⎜ ⎪
⎪ , ⎪
⎪ ⎟
⎞
⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜
⎜ ⎪
⎪ s1 s2 ⎪
⎪ ⎟
⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜ ⎪
⎨ ⎪
⎬⎟⎟ ⎪
⎪
⎪
⎪ ⎜
⎜
⎜ ⎟
⎟
⎟ ⎪
⎪
⎪⎜
⎪ ⎜
⎜ δ ,
3 ⎪ ⎪ ⎟
⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜
⎜ ⎪
⎪ ⎪
⎪ ⎟
⎟
⎟ ⎪
⎪
⎪ ⎜
⎜ ⎪ ⎪ ⎟
⎟ ⎪
⎪
⎪ ⎜
⎪⎝ ⎪ ⎪
⎪ ([0.1, 0.2], [0.2, 0.4], [0.1, 0.3])e i([0.3,0.3],[0.2,0.3],[0.1,0.2])π
([0.1, 0.2], [0.3, 0.3], [0.2, 0.3])e i([0.1,0.2],[0.2,0.5],[0.2,0.2])π
⎪⎠ ⎪
⎪
⎪ ⎟ ⎪
⎪
⎪
⎪
⎪
⎪
⎩ , ⎭ ⎪
⎪ ⎪
⎪
⎪
⎪ s3 s 4 ⎪
⎪
⎪
⎪ ⎪
⎪
⎪
⎪ ⎪
⎪
⎪
⎪ ⎪
⎪
⎪
⎪ i([0.1,0.2],[0.4,0.5],[0.2,0.2])π i([0.1,0.2],[0.1,0.4],[0.2,0.3])π ⎪
⎪
⎪
⎪ ⎪
⎧
⎪ ([0.1, 0.3], [0.3, 0.4], [0.1, 0.2])e ([0.4, 0.5], [0.1, 0.3], [0.1, 0.1])e ⎪
⎫
⎪ ⎪
⎪
⎪
⎪ ⎜
⎛
⎜ ⎪
⎪ , ⎪
⎪ ⎟
⎞
⎟ ⎪
⎪
⎪
⎪⎜⎜
⎜ ⎪
⎪ s s ⎪
⎪ ⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜ ⎪
⎪ 1 2 ⎪
⎪ ⎟
⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜ ⎨ ⎬ ⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜
⎜ δ , ⎟
⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎜
⎜ 4 ⎪
⎪ ⎪
⎪ ⎟
⎟
⎟ ⎪
⎪
⎪⎜
⎪ ⎜
⎜ ⎪
⎪ ⎪
⎪ ⎟
⎟
⎟ ⎪
⎪
⎪
⎪ ⎜
⎝ ⎪
⎪ ([0.1, 0.1], [0.1, 0.4], [0.1, 0.2])e i([0.2,0.3],[0.3,0.3],[0.3,0.3])π
([0.1, 0.2], [0.4, 0.5], [0.2, 0.2])e i([0.1,0.2],[0.2,0.4],[0.2,0.3])π ⎪
⎪ ⎟
⎠ ⎪
⎪
⎪ ⎪
⎪ ⎪
⎪ ⎪
⎪
⎩ ⎩ , ⎭ ⎪ ⎭
s3 s4
(62)
‖χ D ‖(Amplitude Term) �
⎪
⎧
⎪ ([0.175, 0.250], [0.200, 0.350], [0.200, 0.250]) ([0.100, 0.175], [0.200, 0.425], [0.175, 0.300]) ⎪
⎫
⎪
⎪
⎪ , ⎪
⎪
⎪
⎪ δ1 δ2 ⎪
⎪
⎨ ⎬
⎪ ⎪ . (63)
⎪
⎪ ⎪
⎪
⎪
⎪ ([0.150, 0.250], [0.225, 0.325], [0.125, 0.275]) ([0.175, 0.275], [0.225, 0.400], [0.125, 0.175]) ⎪
⎪
⎪
⎩ , ⎪
⎭
δ3 δ4
‖χ D ‖(Phase Term) �
⎪
⎧
⎪ ([0.150, 0.275], [0.175, 0.375], [0.200, 0.250]) ([0.175, 0.275], [0.225, 0.375], [0.200, 0.225]) ⎪
⎫
⎪
⎪
⎪ , ⎪
⎪
⎪
⎪ δ1 δ2 ⎪
⎪
⎨ ⎬
⎪ ⎪ . (64)
⎪
⎪ ⎪
⎪
⎪
⎪ ([0.175, 0.250], [0.200, 0.400], [0.175, 0.225]) ([0.125, 0.225], [0.250, 0.425], [0.225, 0.275]) ⎪
⎪
⎪
⎩ , ⎪
⎭
δ3 δ4
Step 3: the set χ D can be determined as follows: χ D (Apmlitude Term) �
[0.4, 0.5], [0.1, 0.2], [0.1, 0.2] [0.1, 0.2], [0.3, 0.5], [0.2, 0.2] [0.3, 0.4], [0.2, 0.3], [0.1, 0.2] [0.1, 0.3], [0.3, 0.4], [0.1, 0.2]
⎡⎢⎢⎢ ⎤⎥⎥⎥
⎢⎢⎢ ⎥
⎢⎢⎢ [0.1, 0.1], [0.2, 0.3], [0.3, 0.4] [0.1, 0.2], [0.1, 0.5], [0.1, 0.2] [0.1, 0.2], [0.2, 0.3], [0.1, 0.3] [0.4, 0.5], [0.1, 0.3], [0.1, 0.1] ⎥⎥⎥⎥⎥
1 ⎢⎢⎢ ⎥⎥⎥
⎢⎢⎢ ⎥⎥
4 ⎢⎢ [0.1, 0.2], [0.1, 0.4], [0.2, 0.2] [0.1, 0.1], [0.2, 0.3], [0.1, 0.5] [0.1, 0.2], [0.2, 0.4], [0.1, 0.3] [0.1, 0.1], [0.1, 0.4], [0.1, 0.2] ⎥⎥⎥⎥⎥
⎢
⎢⎢⎢ ⎥⎥⎥
⎢⎣ ⎥⎦
[0.1, 0.2], [0.4, 0.5], [0.2, 0.2] [0.1, 0.2], [0.2, 0.4], [0.3, 0.3] [0.1, 0.2], [0.3, 0.3], [0.2, 0.3] [0.1, 0.2], [0.4, 0.5], [0.2, 0.2]
χD (Phase Term) �
24 Applied Computational Intelligence and Soft Computing
[0.1, 0.2], [0.1, 0.4], [0.3, 0.3] [0.1, 0.2], [0.2, 0.4], [0.2, 0.2] [0.1, 0.2], [0.1, 0.4], [0.2, 0.3] [0.1, 0.2], [0.4, 0.5], [0.2, 0.2]
⎢
⎡
⎢
⎢ ⎤⎥⎥⎥
⎢
⎢
⎢ ⎥⎥⎥
⎢
⎢
⎢ [0.1, 0.3], [0.2, 0.3], [0.3, 0.3] [0.1, 0.2], [0.4, 0.5], [0.2, 0.2] [0.2, 0.3], [0.3, 0.4], [0.2, 0.2] [0.1, 0.2], [0.1, 0.4], [0.2, 0.3] ⎥⎥⎥
1⎢
⎢ ⎥⎥⎥
⎢
⎢ ⎥⎥⎥
4⎢
⎢
⎢
⎢
⎢ [0.3, 0.4], [0.3, 0.4], [0.1, 0.2] [0.3, 0.4], [0.2, 0.3], [0.1, 0.2] [0.3, 0.3], [0.2, 0.3], [0.1, 0.2] [0.2, 0.3], [0.3, 0.3], [0.3, 0.3]
⎥⎥⎥
⎥⎥⎥
⎢
⎢
⎢
⎢
⎣ ⎥⎥⎦
[0.1, 0.2], [0.1, 0.4], [0.1, 0.2] [0.2, 0.3], [0.1, 0.3], [0.3, 0.3] [0.1, 0.2], [0.2, 0.5], [0.2, 0.2] [0.1, 0.2], [0.2, 0.4], [0.2, 0.3]
Consider the modulus value of max(η)� max proposed structure with the above relevant existing struc-
ξD tures in Table 7 and 8.
0.08562297237/s1 , 0.08312368641/s2 , 0.0812493106/s3 ,
0.0793734965/s4 }� 0.08562297237/s1 . This means that s1 6. Discussion
may be recommended for suitable investment.
In this section, we show that our proposed structure IV-
CNHS-set is a more generalized and flexible structure as
5. Comparison Analysis
compared to existing relevant models in the sense that
In literature, various decision-making algorithmic ap- the existing relevant models [24, 34, 36–42] are its
proaches have already been discussed by [24, 34, 36–42] that particular cases by omitting one or more features among
are based on hybridized structures of complex set with fuzzy MD (membership degree), NMG (nonmembership de-
set, intuitionistic fuzzy set, and neutrosophic set under soft gree), ID (indeterminacy degree), SAAF (single argu-
set environments. Decision-making is badly affected due to ment approximate function), MAAF (multiargument
the omission of some features with a key role. For example, approximate function), PND (periodic nature of data),
in stock-exchange share market-based scenario, it is in- and IVD (interval-valued data). Figure 3 presents the
sufficient to consider “current trend of company perfor- pictorial version of this generalization of our proposed
mance,” “particular company’s stock price for last one year,” structure.
and “home country inflation rate” as only attributes because
these indicators may have different values, so it is much
6.1. Merits of Proposed Study. In this subsection, some merits
appropriate to further classify these parameters into their
of the proposed study are highlighted, which are given
disjoint attributive sets as we have done in Example 3.22. The
below:
above-mentioned existing decision-making models are in-
sufficient either for interval-valued data or for multi-argu- (i) The introduced approach took the significance of
ment approximate function, but in the proposed model, the the idea of IV-CIFHS-set and IV-CNHS-set to deal
inadequacies of these models have been addressed. The with current decision-making issues. The presented
consideration of multi-argument approximate function will idea enables the researchers to deal with the real-
make the decision-making process more reliable and world scenario where the periodicity of data in the
trustworthy. We present a comparison analysis of our form of intervals is involved; along these lines, this
Applied Computational Intelligence and Soft Computing 25
IV-CNHS-set
FS-set S-set
association has tremendous potential in the genuine (4) Two decision-making algorithms are proposed that
depiction inside the space of computational are based on aggregation operators of IV-CIFHS-set
incursions. and IV-CNHS-set. These are explained with the help
(ii) As the proposed structure emphasizes on an in- of daily-life problems.
depth study of attributes (i.e., further partitioning of (5) The proposed structures along with their decision-
attributes) rather than focusing on attributes support systems are compared with some existing
merely, therefore, it makes the decision-making relevant literature.
process better, flexible, and more reliable. (6) Authors have carved out a conceptual framework for
(iii) It covers the characteristics and properties of the a generalized model, that is, IV-CNHS-set to deal
existing relevant structures, that is, IV-CFHS-set, with decision-making real-life problems by consid-
CFHS-set, CIFHS-set, CNHS-set, IV-CFSS-set, IV- ering hypothetical data. The authors are committed
CIFSS-set, IV-CNSS-set, CFSS-set, CIFSS-set, to discussing some case studies based on IV-CNHS-
CNSS-set, and so on, so it is not unreasonable to call set by using real data.
it the generalized form of all these structures. (7) Furthermore, it may also be extended to develop
The advantage of the proposed study can easily be judged hybridized structures with expert sets, possibility
from Tables 7–9. The comparison is evaluated on the basis of fuzzy-set-like models, and fuzzy-set-like parame-
two different aspects as follows: terized family and introduce algebraic structures.
[6] K. V. Babitha and J. J. Sunil, “Soft set relations and functions,” set theory,” Neutrosophic Sets and Systems, vol. 41, pp. 1–14,
Computers & Mathematics with Applications, vol. 60, no. 7, 2021.
pp. 1840–1849, 2010. [27] A. U. Rahman, M. Saeed, and S. Zahid, “Application in de-
[7] K. V. Babitha and J. J. Sunil, “Transitive closures and orderings cision making based on fuzzy parameterized hypersoft set
on soft sets,” Computers & Mathematics with Applications, theory,” Asia Mathematika, vol. 5, no. 1, pp. 19–27, 2021.
vol. 62, no. 5, pp. 2235–2239, 2011. [28] A. U. Rahman, M. Saeed, and A. Hafeez, “Theory of bijective
[8] F. Li, “Notes on soft set operations,” ARPN Journal of systems hypersoft set with application in decision making,” Punjab
and softwares, vol. 20, pp. 205–208, 2011. University Journal of Mathematics, vol. 53, no. 7, pp. 511–526,
[9] P. K. Maji, R. Biswas, and A. R. Roy, “Soft set theory,” 2021.
Computers & Mathematics with Applications, vol. 45, no. 4-5, [29] A. Ur Rahman, M. Saeed, S. Alodhaibi, and H. Abd El-Wahed
pp. 555–562, 2003. Khalifa, “Decision making algorithmic approaches based on
[10] D. Pei and D. Miao, “From soft set to information system,” parameterization of neutrosophic set under hypersoft set
IEEE, vol. 2, pp. 617–621, 2005. environment with fuzzy, intuitionistic fuzzy and neutrosophic
[11] A. Sezgin and A. O. Atagün, “On operations of soft sets,” settings,” Computer Modeling in Engineering & Sciences,
Computers & Mathematics with Applications, vol. 61, no. 5, vol. 128, no. 2, pp. 743–777, 2021.
pp. 1457–1467, 2011. [30] A. U. Rahman, M. Saeed, F. Smarandache, A. Khalid,
[12] N. Çaman, S. Enginolu, and F. Çitak, “Fuzzy soft set theory M. R. Ahmad, and S. Ayaz, “Decision-making application
and its applications,” Iranian Journal of Fuzzy System, vol. 8, based on aggregations of complex fuzzy hypersoft set and
no. 3, pp. 137–147, 2011. development of interval-valued complex fuzzy hypersoft
[13] P. K. Maji, R. Biswas, and A. R. Roy, “Fuzzy soft sets,” Journal set,” Neutrosophic Sets and Systems, vol. 46, pp. 300–317,
of Fuzzy Mathematics, vol. 9, no. 3, pp. 589–602, 2001. 2021.
[14] N. Karataş, N. Man, and S. Karataş, “Intuitionistic fuzzy soft [31] M. Saeed, M. Ahsan, M. H. Saeed, A. Mehmood, and
set theory and its decision making,” Journal of Intelligent & T. Abdeljawad, “An application of neutrosophic hypersoft
Fuzzy Systems, vol. 24, no. 4, pp. 829–836, 2013. mapping to diagnose hepatitis and propose appropriate
[15] P. K. Maji, R. Biswas, and A. R. Roy, “Intuitionistic fuzzy soft treatment,” IEEE Access, vol. 9, pp. 70455–70471, 2021.
sets,” Journal of Fuzzy Mathematics, vol. 9, no. 3, pp. 677–692, [32] M. Saeed, M. Ahsan, and T. Abdeljawad, “A development of
2001. complex multi-fuzzy hypersoft set with application in MCDM
[16] P. K. Maji, “Neutrosophic soft set,” Annals of Fuzzy Math- based on entropy and similarity measure,” IEEE Access, vol. 9,
ematics and Informatics, vol. 5, no. 1, pp. 2287–2623, 2013. pp. 60026–60042, 2021.
[17] S. Broumi, I. Deli, and F. Smarandache, “Neutrosophic Pa- [33] M. Saeed, M. Ahsan, A. Ur Rahman, M. H. Saeed, and
rametrized Soft Set Theory and its Decision Making,” Inter- A. Mehmood, “An application of neutrosophic hypersoft
national Frontier Science Letters, vol. 1, pp. 1–10, 2014. mapping to diagnose brain tumor and propose appropriate
[18] B. Chetia and P. Das, “An application of interval-valued fuzzy treatment,” Journal of Intelligent & Fuzzy Systems, vol. 41,
soft Sets in Medical Diagnosis,” International Journal of no. 1, pp. 1677–1699, 2021.
Contemporary Mathematical Sciences, vol. 5, no. 38, [34] Z. Ali, T. Mahmood, M. Aslam, and R. Chinram, “Another
pp. 1887–1894, 2010. view of complex intuitionistic fuzzy soft sets based on pri-
[19] I. Deli, “Interval-valued neutrosophic soft sets and its decision oritized aggregation operators and their applications to
making,” International Journal of Machine Learning and multiattribute decision making,” Mathematics, vol. 9, no. 16,
Cybernetics, vol. 8, no. 2, pp. 665–676, 2017. p. 1922, 2021.
[20] Y. Jiang, Y. Tang, Q. Chen, H. Liu, and J. Tang, “Interval- [35] A. Al-Quran and N. Hassan, “The complex neutrosophic soft
valued intuitionistic fuzzy soft sets and their properties,” expert set and its application in decision making,” Journal of
Computers & Mathematics with Applications, vol. 60, no. 3, Intelligent & Fuzzy Systems, vol. 34, no. 1, pp. 569–582, 2018.
pp. 906–918, 2010. [36] F. Al-Sharqi, A. Al-Quran, and S. Broumi, “Interval-valued
[21] A. Khalid and M. Abbas, “Distance measures and operations complex neutrosophic soft set and its applications in decision-
in intuitionistic and interval-valued intuitionistic fuzzy soft making,” Neutrosophic Sets and Systems, vol. 40, pp. 149–168,
set theory,” International Journal of Fuzzy Systems, vol. 17, 2021.
no. 3, pp. 490–497, 2015. [37] J.-P. Fan, R. Cheng, and M.-Q. Wu, “Extended EDAS methods
[22] F. Smarandache, “Extension of soft set of hypersoft set, and for multi-criteria group decision-making based on IV-
then to plithogenic hypersoft set,” Neutrosophic Sets and CFSWAA and IV-CFSWGA operators with interval-valued
Systems, vol. 22, pp. 168–170, 2018. complex fuzzy soft information,” IEEE Access, vol. 7,
[23] M. Saeed, A. U. Rahman, M. Ahsan, and F. Smarandache, “An pp. 105546–105561, 2019.
inclusive study on fundamentals of hypersoft set,” in Theory [38] M. Khan, “Representation of intuitionistic fuzzy soft set using
and Application of Hypersoft Set, pp. 1–23, Pons Publication complex number,” Journal of Applied Mathematics & Infor-
House, Brussel, Belgium, 2021. matics, vol. 35, no. 3, pp. 331–347, 2017.
[24] A. U. Rahman, M. Saeed, F. Smarandache, and M. R. Ahmad, [39] T. Kumar and R. K. Bajaj, “On complex intuitionistic fuzzy
“Development of hybrids of hypersoft set with complex fuzzy soft sets with distance measures and entropies,” Journal of
set, complex intuitionistic fuzzy set and complex neu- Mathematics, vol. 2014, pp. 1–12, 2014.
trosophic set,” Neutrosophic Sets and Systems, vol. 38, [40] F. Smarandache, S. Broumi, A. Bakali, M. Talea, M. Ali, and
pp. 335–354, 2020. G. Selvachandran, “Complex neutrosophic soft set,” in Pro-
[25] A. U. Rahman, M. Saeed, and F. Smarandache, “Convex and ceedings of the 2017 FUZZ-IEEE Conference on Fuzzy Systems,
concave hypersoft sets with some properties,” Neutrosophic Naples, Italy, July 2017.
Sets and Systems, vol. 38, pp. 497–508, 2020. [41] G. Selvachandran and P. K. Singh, “Interval-valued complex
[26] A. U. Rahman, M. Saeed, and A. Dhital, “Decision making fuzzy soft set and its application,” International Journal for
application based on neutrosophic parameterized hypersoft Uncertainty Quantification, vol. 8, no. 2, pp. 101–117, 2018.
28 Applied Computational Intelligence and Soft Computing