You are on page 1of 27

Hindawi

Complexity
Volume 2021, Article ID 6634991, 27 pages
https://doi.org/10.1155/2021/6634991

Research Article
Development of TOPSIS Technique under Pythagorean Fuzzy
Hypersoft Environment Based on Correlation Coefficient and Its
Application towards the Selection of Antivirus Mask in
COVID-19 Pandemic

Rana Muhammad Zulqarnain ,1 Imran Siddique,2 Fahd Jarad ,3,4 Rifaqat Ali,5
and Thabet Abdeljawad 6,7
1
Department of Mathematics, University of Management and Technology Lahore, Sialkot Campus, Lahore, China
2
Department of Mathematics, School of Science, University of Management and Technology, Lahore, Pakistan
3
Department of Mathematics, Cankaya University, Etimesgut, Ankara, Turkey
4
Department of Medical Research, China Medical University Hospital, China Medical University, Taichung, Taiwan
5
Department of Mathematics, College of Science and Arts, King Khalid University, Muhayil, 61413 Abha, Saudi Arabia
6
Department of Mathematics and General Sciences, Prince Sultan University, Riyadh, Saudi Arabia
7
Department of Computer Science and Information Engineering, Asia University, Taichung, Taiwan

Correspondence should be addressed to Fahd Jarad; fahd@cankaya.edu.tr and Thabet Abdeljawad; tabdeljawad@psu.edu.sa

Received 29 December 2020; Revised 24 January 2021; Accepted 9 February 2021; Published 17 March 2021

Academic Editor: Ahmed Mostafa Khalil

Copyright © 2021 Rana Muhammad Zulqarnain et al. This is an open access article distributed under the Creative Commons
Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is
properly cited.
The correlation coefficient between two variables plays an important role in statistics. Also, the accuracy of relevance assessment
depends on information from a set of discourses. The data collected from numerous statistical studies are full of exceptions. The
Pythagorean fuzzy hypersoft set (PFHSS) is a parameterized family that deals with the subattributes of the parameters and an appropriate
extension of the Pythagorean fuzzy soft set. It is also the generalization of the intuitionistic fuzzy hypersoft set (IFHSS), which is used to
accurately assess insufficiency, anxiety, and uncertainties in decision-making. The PFHSS can accommodate more uncertainties
compared to the IFHSS, and it is the most substantial methodology to describe fuzzy information in the decision-making process. The
core objective of the this study is to develop the notion and features of the correlation coefficient and the weighted correlation coefficient
for PFHSS and to introduce the aggregation operators such as Pythagorean fuzzy hypersoft weighted average (PFHSWA) and Py-
thagorean fuzzy hypersoft weighted geometric (PFHSWG) operators under the PFHSS scenario. A prioritization technique for order
preference by similarity to the ideal solution (TOPSIS) under PFHSS based on correlation coefficients and weighted correlation
coefficients is presented. Through the developed methodology, a technique for solving multiattribute group decision-making
(MAGDM) problem is planned. Also, the importance of the developed methodology and its application in indicating multipurpose
antivirus mask throughout the COVID-19 pandemic period is presented. A brief comparative analysis is described with the advantages,
effectiveness, and flexibility of numerous existing studies that demonstrate the effectiveness of the proposed method.

1. Introduction in real-life scenarios, collective facts and figures always


comprises incorrect and imprecise information. Correlation
Decision-making (DM) is one of the most interesting issues plays the main role in statistics as well as engineering.
these days to choose an appropriate alternative for any Through correlation analysis, the joint relationship of two
particular purpose. Initially, it is assumed that information variables can be found and used to evaluate the in-
regarding possible choices is collected in crisp numbers, but terdependence of two variables. Other than this,
2 Complexity

probabilistic strategies have been applied to so many Yang [13] proposed division and subtraction operators,
practical engineering issues, but there are many limitations. investigated their properties based on PFSs, and developed
For example, the probability of the process is dependent on a ranking method based on developed operators to solve
a lot of information, which may be haphazard. However, MAGDM problems. Garg [14] introduced the logarithmic
large complex structures have numerous incomprehensible operational laws with several weighted averaging and
uncertainties, and it is usually difficult to obtain accurate weighted geometric operators based on PFSs. Gao et al. [15]
probability events. Therefore, due to incomprehensive established several Pythagorean fuzzy interaction operators
quantitative information, consequences beneath probability by using arithmetic and geometric operations and proposed
theory do not provide useful information for experts. Be- some decision-making approaches to solve MADM prob-
sides, in practical applications, there are no adequate data to lems. Peng and Yuan [16] presented the Pythagorean fuzzy
correctly process renowned statistical data. Due to the point operators and established decision-making ap-
abovementioned barriers, consequences based on proba- proaches to solve MADM problems based on developed
bility theory are not obtainable to experts at all time. So, operators. Ma and Xu [17] improved the score and accuracy
probabilistic methods are usually insufficient to resolve functions for PFNs and developed novel averaging and
specified procured uncertainties in the data. Quite a lot of geometric operators based on PFS information.
investigators in the world have projected and advised dif- All the above approaches are widely applied in many
ferent methods to solve such difficulties that contain areas and fields. However, these theories have limitations
vagueness. Zadeh proposed the idea of fuzzy sets (FSs) [1] to due to their incompetence with the parameterization tool.
solve complex problems that contain uncertainness as well as To overcome this kind of complexity, Molodtsov [18]
ambiguity. In some cases, we must check membership as proposed a general mathematical parameterization tool
a nonmembership value in the representation of objects that soft set (SS), which is used to deal with uncertain, am-
cannot be handled by FS. To overcome this concern, Ata- biguous, and indeterminate components, in which certain
nassov proposed the concept of intuitionistic fuzzy sets specific parameters of the object are evaluated. Maji et al.
(IFSs) [2]. Based on this, theories, such as cubic IFS [3], [19] extended the concept of SS, proposed some opera-
interval-valued IFS [4], and linguistic interval-valued IFS tions with their several properties, and used the estab-
[5], have been developed and used by investigators. lished concepts for decision-making [20]. Maji et al. [21]
Ultimately, based on the above theories, experts ob- planned the idea of fuzzy soft sets (FSSs) by combining FSs
served that the sum of their membership and non-mem- and SSs. In addition, they projected an intuitionistic fuzzy
bership cannot exceed one. Atanassov’s IFS only deals with soft set (IFSS) with fundamental operations along with
insufficient data due to membership and nonmembership properties [22]. Garg and Arora [23] extended the gen-
values, while IFS cannot deal with inappropriate and vague eralized version of the IFSS with weighted averaging and
information. Thus, the above work is used to visualize our geometric aggregation operators and built a decision-
surroundings of linear inequality between the degree of making technique to resolve complications beneath an
membership (MD) and the degree of nonmembership intuitionistic fuzzy environment. Garg [24] developed
(NMD). However, if the decision-maker goes steady with some improved score functions to analyze the ranking of
object MD � 0.8 and NDM � 0.5, then 0.8 + 0.5≰1. Clearly, the normal intuitionistic and interval-valued intuition-
we can see that it cannot be handled by the abovementioned istic sets and established new methodologies to solve
IFS theories. To overcome the abovementioned limitations, multiattribute decision-making (MADM) problems. The
Yager [6, 7] extended the IFS to Pythagorean fuzzy sets idea of entropy measure and TOPSIS based on correlation
(PFSs) by modifying the condition T + J ≤ 1 to coefficient (CC) has been developed by using complex q-
T2 + J2 ≤ 1. Zhang and Xu [8] defined some operational rung orthopair fuzzy information and used the established
laws and extended the TOPSIS technique to solve MCDM strategies for decision-making [25]. Garg and Arora [26]
problems under PFS environment. Wei and Lu [9] presented developed aggregate operators by using dual hesitant
several Pythagorean fuzzy power aggregation operators with fuzzy soft numbers and utilized the proposed operators to
their properties and proposed the decision-making ap- solve multicriteria decision-making (MCDM) problems.
proaches to solve MADM problems based on developed To measure the relationship among dual hesitant fuzzy
operators. Wang and Li [10] proposed the Pythagorean fuzzy soft set, Arora and Garg [27] introduced the CC and
interaction operational laws and power Bonferroni mean developed a decision-making approach under the pre-
operators. Then, they discussed some specific cases of sented environment to solve the MCDM approach, and
established operators and considered their properties. they also used the proposed methodology for decision-
Zhang [11] established a novel decision-making tech- making, medical diagnoses, and pattern recognition. They
nique based on Pythagorean fuzzy numbers (PFNs) to solve also developed operational laws and presented some
multiple criteria group decision-making (MCGDM) prob- prioritized aggregation operators under linguistic IFS
lems. He also developed the accuracy function for the environment [28] and extended the Maclaurin symmetric
ranking of PFNs and similarity measures under a PFS en- mean (MSM) operators to IFSSs based on Archimedean T-
vironment with some desirable properties. Garg [12] ex- conorm and T-norm [29]. Garg and Arora introduced the
tended the weighted aggregation operators to PFSs and correlation measures on IFSSs and constructed the
developed several operators and presented a decision- TOPSIS technique on developed correlation measures
making approach based on developed operators. Peng and [30].
Complexity 3

In this era, the assumptions and application scenarios of during the COVID-19 pandemic, it is our responsibility to
SSs and the abovementioned different research extensions use good and effective antivirus masks to reduce the
are developing rapidly. Peng et al. competently solved the COVID-19 effects. Thus, for different groups of people,
abovementioned complications [31] and proposed a novel logically picking out and using masks are of key importance.
idea of Pythagorean fuzzy soft sets (PFSSs) by combining the The best mask does not mean the most expensive mask. For
two existing theories PFS and SS with some basic operations the majority of people, it is not necessary to use identical
with ideal characteristics. Athira et al. [32] developed an masks like those used by frontline medical examination staff.
entropy measure based on PFSS information. They also The use of a gas mask not only depends on masks but also
proposed the Hamming distance and Euclidean distance of depends on the human face. Besides, in serious pandemic
PFSSs and used them for decision-making [33]. As far as the scenarios and shortage of gas masks, the choice of mask
author knows, there are few studies on the theory of PFSSs. could also be associated with components like reusability
Therefore, it is a better way to keep PFSSs flexible than IFSSs along with the quality of raw materials. Thus, the majority of
or FSSs. Naeem et al. [34] established some operations with people, in serious pandemic scenarios, consider multiple
their desirable properties and extended the TOPSIS and components while choosing masks to enhance the re-
VIKOR techniques to develop the affluence of linguistic apportionment of medical resources. But, with the ex-
variables based on PFSS information. They also rendered an traordinary information of the people as well as the
application on the consequence of stock exchange in- uncertainty of the increase in COVID-19, the difficulty
vestment by utilizing the developed techniques. Riaz et al. increases. The majority of people are unable to choose a good
[35] established the TOPSIS technique for m-polar PFSSs antivirus mask; mostly people prefer the cheapest antivirus
and presented an example to solve MCGDM problems mask. Yang et al. [57] and Shahzadi and Akram [58] used the
within a considered hybrid structure. They also introduced spherical normal fuzzy sets and formation fuzzy soft Yager
similarity measures for PFSSs [36]. Hwang and Yoon [37] ordered weighted average and geometric operators for the
developed TOPSIS to solve decision-making problems. By selection of effective gas masks during the COVID-19
using the TOPSIS method, we can easily obtain the mini- pandemic.
mum distance from a positive ideal solution which supports In this study, the TOPSIS technique was extended to
electing the finest alternative. After the TOPSIS method was PFHSS information, and the mechanism was based on the
developed, many researchers used the TOPSIS method for assumption of PFHSNs. To measure the degree of de-
decision-making and extended this method to fuzzy and pendence on PHFSS, we proposed CC and WCC on PFHSSs
intuitionistic fuzzy environments [38–51]. and studied some properties of the developed CC. To ac-
Smarandache [52] extended the concept of SS to curately achieve the goal, the given TOPSIS technique can be
hypersoft sets (HSSs) by replacing the one-parameter extended to solve the MAGDM problem. In this research,
function f with a multiparameter (subattribute) function our main goal is to introduce the CC and WCC based on the
described on the Cartesian product of n attributes. The PHFSS information and develop the TOPSIS method of
established HSS is more flexible than SS and more suitable PFHSSs based on the proposed CC. In order to solve the
for the decision-making environments. He also launched MAGDM problem based on the extended TOPSIS method,
advanced extensions of HSSs, including crisp HSS, fuzzy an algorithm was developed, and the effectiveness of the
HSS, and intuitionistic fuzzy HSS. Nowadays, HSS theory proposed technique was verified by a numerical example.
and its extensions have been rising unexpectedly. Several Given correlation measures for PFHSSs have been consid-
investigators went through progressed distinctive operators ered for paired PFHSSs, which will be used to calculate the
along with characteristics based on HSS and its extensions interrelationship between elements and the scope of de-
[53–55]. Zulqarnain et al. [56] extended the notion of pendence. Since the existing IFS and IFSS, PFS, PFSS, and
IFHSSs and developed some aggregation operators and IFHSS are special cases of PFHSS, the measures that have
TOPSIS technique based on CC under the IFHSS scenario. been formulated are more general than the existing mea-
They also established a decision-making technique by uti- sures. The correlation coefficient retains the linear re-
lizing the proposed TOPSIS technique to resolve the MADM lationship between considered elements. To find the general
problem. Thus, the above work is considered to examine the closeness coefficient by the TOPSIS method, generally, the
environment of linear inequality between the degree of researchers used the similarity measure and distance. But, in
membership (MD) and the degree of nonmembership our developed TOPSIS technique, the closeness coefficient
(NMD) of attributes and subattributes of the considered can be calculated by using the correlation coefficient.
parameters. However, if the decision-maker stabilizes when The rest of this article is organized as follows. In Section
the target MD � 0.7 and NDM � 0.6, then 0.7 + 0.6 ≰ 1. 2, we recollect some basic definitions, such as SS, HSS,
Obviously, we can see that it cannot be handled by the IFHSS, and PFHSS, which will be used to construct the
abovementioned theories. To overcome the above limita- structure of this article. In Section 3, we proposed the in-
tions, we prolonged the IFHSS to PFHSS by modifying the formational energies and correlation measures for PFHSSs
2
condition TF(d) � (δ) + JF(d)
� (δ) ≤ 1 to (TF(d) � (δ)) + and used the established terminologies to develop CC and
2
(JF(d) � (δ)) ≤ 1. WCC and their properties. Some aggregation operators are
It is true that everyone is eager to purchase the smartest also introduced such as Pythagorean fuzzy hypersoft
mask for the present terrible virus, but distinct groups of weighted average (PFHSWA) and Pythagorean fuzzy
people must have different essential desires. Particularly hypersoft weighted geometric (PFHSWG) operators. An
4 Complexity

extended TOPSIS technique based on CC in the PFHSS for each i, j ∈ {1,··· 2, 3, . . . , n}, and i ≠ j. Assume K1 × K2 ×
environment is proposed, and an algorithm is developed K3 × · · · × Kn � A � 􏼈d1h × d2k × · · · × dnl 􏼉 be a collection of
based on the proposed TOPSIS method to solve the multiattributes, where 1 ≤ h ≤ α, 1 ≤ k ≤ β, and 1 ≤ l ≤ c and α,
MAGDM problem, and a numerical description is given in ··· and c ∈ N. Then, the pair (F, K1 × K2 × K3 × · · · × Kn �
β,
Section 4. Also, we use some existing techniques to propose A) is said to be HSS over U and its mapping is defined as
comparative studies between our proposed methods. Sim- ···
ilarly, the advantages, naivety, flexibility, and effectiveness of F: K1 × K2 × K3 × · · · × Kn � A ⟶ P(U). (3)
planned algorithms are introduced. We have a brief dis-
cussion and comparative analysis of the proposed methods It is also defined as
··· ···
and existing techniques in Section 5. � F ··· (d):
(F, A) � 􏼚d, � d � ∈ A, F ··· (d)
� ∈ P(U)􏼛. (4)
A A
2. Preliminaries
In this section, we recollect some basic definitions that help Definition 4 (see [52]). Let U be a universe of discourse,
build the structure of the article such as soft set, hypersoft P(U) be a power set of U, and k � 􏼈k1 , k2 , k3 , . . . , kn 􏼉
set, fuzzy hypersoft set, IFHSS, and PFHSS. (n ≥ 1) be a set of attributes, and set Ki be a set of corre-
sponding subattributes of ki , respectively, with Ki ∩ Kj � φ
Definition 1 (see [18]). Let U be the universal set and E be
the set of attributes concerning U. Let P(U) be the power for n ≥ 1 for each i, j ∈ {1, 2, 3, . . . , n}, and i ≠ j. Assume K1 ×
···
set of U and A ⊆ E. A pair (F, A) is called a soft set over U, K2 × K3 × · · · × Kn � A � 􏼈d1h × d2k × · · · × dnl } be a collec-
and its mapping is given as tion of subattributes, where 1 ≤ h ≤ α, 1 ≤ k ≤ β, and 1 ≤ l ≤ c,
F: A ⟶ P(U). (1) and α, β, and c ∈ N and F U be a collection of all fuzzy subsets
···
over U. Then, the pair (F, K1 × K2 × K3 × · · · × Kn � A) is
It is also defined as said to be FHSS over U and its mapping is defined as
(F, A) � {F(e) ∈ P(U): e ∈ ϵ, F(e) � ∅, if e ∉ A}. ···
F: K1 × K2 × K3 × · · · × Kn � A ⟶ F U . (5)
(2)
It is also defined as
Maji et al. [21] explored the theory of FS and SS and
··· ···
planned a more generalized version to handle the un- � F ··· (d)
(F, A) � 􏼚􏼒d, � 􏼓: d � ∈ F U ∈ [0, 1]􏼛.
� ∈ A, F ··· (d)
A A
certainty compared with the existing FS and SS along with its
unique features. This is generally known as a fuzzy soft set, (6)
which is a combination of FS and SS.

Definition 2 (see [21]). Let F(U) be a collection of all fuzzy Example 1. Consider the universe of discourse U � 􏼈δ1 , δ2 􏼉
subsets over U and E be a set of attributes. Let A ⊆ E, then and L � 􏼈ℓ1 � Teaching methdology, ℓ2 � Subjects, ℓ3 �
a pair (F, A) is called FSS over U, where F is a mapping Classes} be a collection of attributes with their corre-
such as F: A ⟶ F(U). sponding subattribute values given as teaching method-
ology � L1 � 􏼈d11 � project base, d12 � class discussion},
Definition 3 (see [52]). Let U be a universe of discourse, subjects � L2 � 􏼈d21 � Mathematics, d22 � Computer
P(U) be a power set of U, k � 􏼈k1 , k2 , k3 , . . . , kn 􏼉 (n ≥ 1) be Science Science, d23 � Statistics}, and
··· classes �
a set of attributes, and set Ki be a set of corresponding L3 � 􏼈d31 � Masters, d32 � Doctorol􏼉. Let A � L1 × L2 × L3
subattributes of ki , respectively, with Ki ∩ Kj � φ for n ≥ 1 be a set of attributes:

···
A � L1 × L2 × L3 � 􏼈d11 , d12 􏼉 × 􏼈d21 , d22 , d23 􏼉 × 􏼈d31 , d32 􏼉

⎪ d11 , d21 , d31 􏼁, d11 , d21 , d32 􏼁, d11 , d22 , d31 􏼁, d11 , d22 , d32 􏼁, d11 , d23 , d31 􏼁, d11 , d23 , d32 􏼁, ⎫

⎨ ⎪

�⎪ ⎪ (7)
⎩ ⎭
d12 , d21 , d31 􏼁, d12 , d21 , d32 􏼁, d12 , d22 , d31 􏼁, d12 , d22 , d32 􏼁, d12 , d23 , d31 􏼁, d12 , d23 , d32 􏼁,
···
� ,d
A � 􏽮d � � � � � � � � � � �
1 2 , d3 , d4 , d5 , d6 , d7 , d8 , d9 , d10 , d11 , d12 􏽯.
Complexity 5

Then, the FHSS over U is given as follows:



⎪ 􏼐d � , δ , 0.7􏼁, δ , 0.5􏼁􏼑, 􏼐d
� , δ , 0.6􏼁, δ , 0.3􏼁􏼑, 􏼐d � , δ , 0.8􏼁, δ , 0.3􏼁􏼑, 􏼐d
� , δ , 0.2􏼁, δ , 0.8􏼁􏼑, ⎪


⎪ 1 1 2 2 1 2 3 1 2 4 1 2 ⎪
··· ⎪
⎨ ⎪

(F, A) � ⎪ 􏼐d� , δ , 0.4􏼁, δ , 0.3􏼁􏼑, 􏼐d
� , δ , 0.2􏼁, δ , 0.5􏼁􏼑, 􏼐d
� , δ , 0.6􏼁, δ , 0.9􏼁􏼑, 􏼐d
� , δ , 0.2􏼁, δ , 0.8􏼁􏼑, . (8)
⎪ 5 1 2 6 1 2 7 1 2 8 1 2 ⎪

⎪ ⎪

⎩ 􏼐d
� , δ , 0.4􏼁, δ , 0.7􏼁􏼑, 􏼐d
� , δ , 0.1􏼁, δ , 0.7􏼁􏼑, 􏼐d� , δ , 0.4􏼁, δ , 0.6􏼁􏼑, 􏼐d� , δ , 0.2􏼁, δ , 0.7􏼁􏼑 ⎪

9 1 2 10 1 2 11 1 2 12 1 2

Definition 5. (see [52]). Let U be a universe of discourse, (δ): δ ∈ U}, in which TF(d) � (δ) and JF(d)� (δ) represent the
P(U) be a power set of U, and k � 􏼈k1 , k2 , k3 , . . . , kn 􏼉 (n ≥ 1) membership and nonmembership values of the attributes
be a set of attributes, and set Ki be a set of corresponding such as TF(d) � (δ), JF(d)
� (δ) ∈∈ [0, 1], and 0 ≤ TF(d)� (δ)+
subattributes of ki , respectively, with Ki ∩ Kj � φ for n ≥ 1 for JF(d)� (δ) ≤ 1.
each i, j ∈ {1, 2, 3, . . . , n}, and i ≠ j. Assume K1 × K2 × K3 × Simply an intuitionistic fuzzy hypersoft number
··· (IFHSN) can be expressed as F � 􏽮( TF(d) � (δ), JF(d)
� (δ))􏽯,
· · · × Kn � A � 􏼈d1h × d2k × · · · × dnl 􏼉 be a collection of where 0 ≤ TF(d) � (δ) + JF(d)
� (δ) ≤ 1.
subattributes, where 1 ≤ h ≤ α, 1 ≤ k ≤ β, and 1 ≤ l ≤ c, and α, β,
and c ∈ N and IFSU be a collection of all intuitionistic fuzzy
Example 2. Consider the universe of discourse U � 􏼈δ1 , δ2 􏼉
subsets over U. Then, the pair (F, K1 × K2 × K3 × · · · × Kn � and L � 􏼈ℓ1 � Teaching methdology, ℓ2 � Subjects, ℓ3 �
···
A) is said to be IFHSS over U, and its mapping is defined as Classes} be a collection of attributes with their corre-
··· sponding attribute values given as teaching methodology �
F: K1 × K2 × K3 × · · · × Kn � A ⟶ IFSU . (9) L1 � 􏼈d11 � project base, d12 � class discussion􏼉, subjects �
···
� F ··· (d)):
� d � ∈ A, F ···
··· L2 � 􏼈d21 � Mathematics, d22 � Computer Science, d23 �
It is also defined as (F, A) � 􏼚(d, A A Statistics}, and··· classes � L3 � 􏼈d31 � Masters, d32 �
� ∈ IFSU ∈ [0, 1]􏼛, where F ··· (d)
(d) � � 􏽮δ, T � (δ), J � Doctorol}. Let A � L1 × L2 × L3 be a set of attributes:
A F(d) F(d)

···
A � L1 × L2 × L3 � 􏼈d11 , d12 􏼉 × 􏼈d21 , d22 , d23 􏼉 × 􏼈d31 , d32 􏼉
d , d , d 􏼁, d11 , d21 , d32 􏼁, d11 , d22 , d31 􏼁, d11 , d22 , d32 􏼁, d11 , d23 , d31 􏼁, d11 , d23 , d32 􏼁,
� 􏼨 11 21 31 􏼩 (10)
d12 , d21 , d31 􏼁, d12 , d21 , d32 􏼁, d12 , d22 , d31 􏼁, d12 , d22 , d32 􏼁, d12 , d23 , d31 􏼁, d12 , d23 , d32 􏼁,
···
� ,d
A � 􏽮d � � � � � � � � � � �
1 2 , d3 , d4 , d5 , d6 , d7 , d8 , d9 , d10 , d11 , d12 􏽯.

Then, the IFHSS over U is given as follows:


⎧ � , δ , (0.6, 0.3)􏼁, δ , (0.3, 0.5)􏼁􏼑, 􏼐d
􏼐d � , δ , (0.2, 0.7)􏼁, δ , (0.1, 0.5)􏼁􏼑, 􏼐d � , δ , (0.2, 0.8)􏼁, δ , (0.3, 0.4)􏼁􏼑, ⎪ ⎫

⎪ 1 1 2 2 1 2 3 1 2 ⎪


⎪ ⎪

···


⎨ 􏼐d4 , δ1 , (0.2, 0.5)􏼁, δ2 , (0.1, 0.6)􏼁􏼑, 􏼐d5 , δ1 , (0.4, 0.3)􏼁, δ2 , (0.3, 0.5)􏼁􏼑, 􏼐d6 , δ1 , (0.2, 0.4)􏼁, δ2 , (0.1, 0.5)􏼁􏼑, ⎪
� � � ⎪

(F, A) � ⎪ .

⎪ � , δ , (0.2, 0.6)􏼁, δ , (0.4, 0.2)􏼁􏼑, 􏼐d
􏼐d � , δ , (0.2, 0.5)􏼁, δ , (0.3, 0.1)􏼁􏼑, 􏼐d � , δ , (0.4, 0.2)􏼁, δ , (0.3, 0.5)􏼁􏼑, ⎪ ⎪


⎪ 7 1 2 8 1 2 9 1 2 ⎪

⎪ ⎪

⎩ � , δ , (0.1, 0.4)􏼁, δ , (0.7, 0.2)􏼁􏼑, 􏼐d
􏼐d � , δ , (0.4, 0.5)􏼁, δ , (0.2, 0.5)􏼁􏼑, 􏼐d � , δ , (0.1, 0.2)􏼁, δ , (0.2, 0.7)􏼁􏼑 ⎪ ⎭
10 1 2 11 1 2 5 1 2

(11)

The abovementioned IFHSS cannot deal with the situ- ki , respectively, with Ki ∩ Kj � φ for n ≥ 1 for each
ation when the sum of MD and NMD of subattributes
i, j ∈ {1, 2, 3, . . . , n} and i ≠ j. Assume K1 × K2 × K3 × · · · ×
exceeds one, so to handle such situations in this paper, we ···
introduce the general notion of PFHSS with its character- Kn � A � 􏼈d1h × d2k × · · · × dnl 􏼉 be a collection of sub-
istics by modifying the condition MD + NMD ≤ 1 to attributes, where 1 ≤ h ≤ α, 1 ≤ k ≤ β, and 1 ≤ l ≤ c, and α, β, and
MD2 + NMD2 ≤ 1. c ∈ N, and PFSU be a collection of all Pythagorean fuzzy subsets
···
over U. Then, the pair (F, K1 × K2 × K3 × · · · × Kn � A) is
Definition 6. Let U be a universe of discourse, P(U) be said to be PFHSS over U and its mapping is defined as
a power set of U, k � 􏼈k1 , k2 , k3 , . . . , kn 􏼉 (n ≥ 1) be a set of ···
F: K1 × K2 × K3 × · · · × Kn � A ⟶ PFSU . (12)
attributes, and set Ki be a set of corresponding subattributes of
6 Complexity

···
It is also defined as (F, A) � Example 3. Consider the universe of discourse U � 􏼈δ1 , δ2 􏼉
···
� F ··· (d)):
􏼚(d, � d � ∈ A, F ··· (d)
� ∈ PFSU ∈ [0, 1]􏼛, where and L � 􏼈ℓ1 � Teaching methdology, ℓ2 � Subjects, ℓ3 �
A A Classes} be a collection of attributes with their corre-
� � 􏽮δ, T � (δ), J � (δ): δ ∈ U􏽯,
F ··· (d) in which sponding attribute values given as teaching methodology �
A F(d) F(d)
TF(d)� (δ) and JF(d) � (δ) represent the membership and L1 � 􏼈d11 � project base, d12 � class discussion􏼉, subjects �
nonmembership values of the attributes such as TF(d) � (δ),
L2 � 􏼈d21 � Mathematics, d22 � Computer Science, d23 �
2 2 Statistics}, and
··· classes � L3 � 􏼈d31 � Masters, d32 �
JF(d)� (δ) ∈∈[0, 1], and 0 ≤ (T �
F(d) (δ)) + (J �
F(d) (δ)) ≤ 1. Doctorol}. Let A � L1 × L2 × L3 be a set of attributes:
Simply, a Pythagorean fuzzy hypersoft number (PFHSN)
can be expressed as F � 􏽮(TF(d) � (δ), JF(d)
� (δ))􏽯, where
2 2
0 ≤ (TF(d) � (δ)) + (JF(d) � (δ)) ≤ 1.

···
A � L1 × L2 × L3 � 􏼈d11 , d12 􏼉 × 􏼈d21 , d22 , d23 􏼉 × 􏼈d31 , d32 􏼉


⎧ ⎪
⎨ d11 , d21 , d31 􏼁, d11 , d21 , d32 􏼁, d11 , d22 , d31 􏼁, d11 , d22 , d32 􏼁, d11 , d23 , d31 􏼁, d11 , d23 , d32 􏼁, ⎫

�⎪ (13)
⎩ d , d , d 􏼁, d , d , d 􏼁, d , d , d 􏼁, d , d , d 􏼁, d , d , d 􏼁, d , d , d 􏼁, ⎪ ⎭
12 21 31 12 21 32 12 22 31 12 22 32 12 23 31 12 23 32

···
� ,d
A � 􏽮d � � � � � � � � � � �
1 2 , d3 , d4 , d5 , d6 , d7 , d8 , d9 , d10 , d11 , d12 􏽯.

Then, the PFHSS over U is given as follows:


⎪ � , δ , (0.6, 0.3)􏼁,
􏼐d � , δ , (0.2, 0.7)􏼁, δ , (0.1, 0.5)􏼁􏼑, 􏼐d
δ2 , (0.3, 0.5)􏼁􏼑, 􏼐d � , δ , (0.2, 0.8)􏼁, δ , (0.3, 0.7)􏼁􏼑, ⎪ ⎫

⎪ 1 1 2 1 2 3 1 2 ⎪


⎪ ⎪


⎪ ⎪

⎪ ⎪

⎪ � , δ , (0.6, 0.5)􏼁,
d δ2 , (0.5, 0.6)􏼁􏼑, 􏼐d5 , δ1 , (0.7, 0.3)􏼁, δ2 , (0.4, 0.8)􏼁􏼑, 􏼐d6 , δ1 , (0.5, 0.4)􏼁, δ2 , (0.6, 0.5)􏼁􏼑, ⎪
� � ⎪
··· ⎨ 􏼐 4 1
⎪ ⎪

(F, A) � ⎪ ⎪ .

⎪ � � � ⎪

⎪ ⎪
⎪ 􏼐d7 , δ1 , (0.6, 0.5)􏼁,


δ2 , (0.5, 0.6)􏼁􏼑, 􏼐d5 , δ1 , (0.7, 0.3)􏼁, δ2 , (0.4, 0.8)􏼁􏼑, 􏼐d6 , δ1 , (0.5, 0.4)􏼁, δ2 , (0.6, 0.5)􏼁􏼑, ⎪⎪


⎪ ⎪


⎪ ⎪

⎩ � � � ⎭
􏼐d10 , δ1 , (0.7, 0.4)􏼁, δ2 , (0.7, 0.2)􏼁􏼑, 􏼐d11 , δ1 , (0.4, 0.5)􏼁, δ2 , (0.5, 0.3)􏼁􏼑, 􏼐d12 , δ1 , (0.5, 0.7)􏼁, δ2 , (0.4, 0.7)􏼁􏼑
(14)

Remark 1. problems, it is essential to rank them. For this, the scoring


function of Jd�ij is defined as follows:
2 2
(1) If both (TF(d) � (δ)) + (JF(d) � (δ)) ≤ 1 and
TF(d)� (δ) + J �
F(d) (δ) ≤ 1hold, then PFHSS was re- S􏼒Jd�ij 􏼓 � T2F � 􏼁
d
− J2F � 􏼁,
d
S􏼒Jd�ij 􏼓 ∈ [−1, 1].
ij ij
duced to IFHSS [56].
2 2
(15)
(2) If (TF(d)� (δ)) + (JF(d) � (δ)) ≤ 1 and each param-
eter of the set of attributes consists of no sub- However, in some cases, the scoring function cannot
attribute, then PFHSS was reduced to PFSS [31]. compare the two PFHSNs. such as Jd�11 � 〈0.4, 0.7〉 and
(3) If both (TF(d) 2
� (δ)) + (JF(d)
2
� (δ)) ≤ 1 and Jd�12 � 〈0.5568, 0.8〉, and it is impossible to know which is
TF(d)� (δ) + JF(d)
� (δ) ≤ 1 hold and a set of attributes greater because S(Jd�11 ) � 0.33 � S(Jd�12 ). For this, an ac-
contains only one parameter with no subattributes, curacy function is defined as follows:
then PFHSS was reduced to IFSS [22].
H􏼒Jd�ij 􏼓 � T2F � 􏼁 + J2F � 􏼁, H􏼒Jd�ij 􏼓 ∈ [0, 1]. (16)
For simplicity, we will express F (d � ) � 􏼈(T F(d �) d ij d ij
δi j j
(δi ), JF(d�j )(δi ))|δi ∈ U􏼉 as Jd�ij � TF(d�ij ), andJF(d�ij ) is Thus, to compare two PFHSNs Jd�ij and Td�ij , the ranking
called PFHSN. In the process of applying PFHSNs in actual and comparison laws are defined as follows:
Complexity 7

(1) If S(Jd�ij ) > S(Td�ij ), then Jd�ij > Td�ij . be two PFHSSs defined over a universe of···discourse U.···Then,
(2) If S(Jd�ij ) � S(Td�ij ), then the following holds: their correlation measure between (F, A) and (G, B) can
be described as follows:
(i) If H(Jd�ij ) > H(Td�ij ), then Jd�ij > Td�ij . ··· ···
(ii) If H(Jd�ij ) � H(Td�ij ), then Jd�ij � Td�ij . CPFHSS ((F, A), (G, B))
m n 2 2
3. Correlation Coefficient for Pythagorean � 􏽘 􏽘􏼠􏼒TF(dk ) δi 􏼁􏼓 ∗ 􏼒TG(d�k ) δi 􏼁􏼓
(18)
Fuzzy Hypersoft Set k�1 i�1
2 2
In this section, the concept of correlation coefficient and + 􏼒JF(d�k ) δi 􏼁􏼓 ∗ 􏼒JG(d�k ) δi 􏼁􏼓 􏼡.
weighted correlation coefficient and some aggregation op-
erators on PFHSS have been proposed with some basic
properties. ···
··· Theorem 1. Let (F, A) � 􏽮(δi , TF(d�k )(δi ), JF(d�k )(δi ))|
···
Definition 7. Let (F, A) � 􏽮(δi , TF(d�k )(δi ), JF(d�k )(δi ))| δi ∈ U} and (G, B) � 􏽮(δi , TG(d�k )(δi ), JG(d�k )(δi ))|δi ∈ U􏽯
···
δi ∈ U} and (G, B) � 􏽮(δi , TG(d�k )(δi ), JG(d�k )(δi ))|δi ∈ U􏽯 ··· ···
be two CPFHSSsS and CIFHSS ((F, A), (G, B)) be a correlation
be two PFHSSs defined over a universe of discourse U. Then, between them, then the following properties hold:
··· ···
their informational energies of (F, A) and (G, B) can be ··· ··· ···
(1) CPFHSS ((F, A), (F, A)) � ςPFHSS (F, A).
described as follows: ··· ··· ···
m n
(2) CPFHSS ((G, B), (G, B)) � ςPFHSS (G, B).
··· 4 4
ζ PFHSS (F, A) � 􏽘 􏽘􏼠􏼒TF(d�k ) δi 􏼁􏼓 + 􏼒JF(d�k ) δi 􏼁􏼓 􏼡,
k�1 i�1
··· m n 4 4
Proof. The proof is trivial.
ζ PFHSS (G, B) � 􏽘 􏽘􏼠􏼒TG(d�k ) δi 􏼁􏼓 + 􏼒JG(d�k ) δi 􏼁􏼓 􏼡.
···
k�1 i�1
Definition 9. Let (F, A) � 􏽮(δi , TF(d�k )(δi ), JF(d�k )(δi ))|
(17) ···
δi ∈ U} and (G, B) � 􏽮(δi , TG(d�k )(δi ), JG(d�k )(δi ))|δi ∈ U􏽯
··· be two PFHSSs, then correlation coefficient between them is
Definition 8. Let ··· (F, A) � 􏽮(δi , TF(d�k )(δi ), JF(d�k )(δi ))| ··· ···
δi ∈ U} and (G, B) � 􏽮(δi , TG(d�k )(δi ), JG(d�k )(δi ))|δi ∈ U􏽯 given as δPFHSS ((F, A), (G, B)) and is expressed as follows:

··· ···
··· CPFHSS ((F, A), (G, B))
···
δPFHSS ((F, A), (G, B)) � 􏽱�����������···
􏽱���������� ···

ςPFHSS (F, A) ∗ ςPFHSS (G, B)

2 2 2 2
􏽐m
···
n
k�1 􏽐i�1 􏼠􏼒TF(dk ) δi 􏼁􏼓 ∗ 􏼒TG(d
� ) δ i 􏼁􏼓 + 􏼒JF(d� ) δ i 􏼁􏼓 ∗ 􏼒JG(d
� ) δ i 􏼁􏼓 􏼡
··· k k k
δPFHSS ((F, A), (G, B)) � 􏽳 ������������������������������������� 􏽳 ������������������������������������ �.
4 4 4 4
􏽐m n
k�1 􏽐i�1 􏼠􏼒TF(dk ) δ i 􏼁􏼓 + 􏼒JF(d
m n
� ) δ i 􏼁􏼓 􏼡 􏽐k�1 􏽐i�1 􏼠􏼒TG(d
k
� ) δi 􏼁􏼓 + 􏼒JG(d
k
� ) δ i 􏼁􏼓 􏼡
k

(19)

··· ··· ···


Theorem 2. Let (F, A) � 􏽮(δi , TF(d�k )(δi ), JF(d�k )(δi ))| (3) If (F, A) � (G, B), that is, ∀i, k, TF(d�k )
···
δi ∈ U} and (G, B) � 􏽮(δi , TG(d�k )(δi ), JG(d�k )(δi ))|δi ∈ U􏽯 (δi ) � TG(d�k )(δi ), and JF(d�k )(δi ) � JG(d�k )(δi ), then
··· ···
be two PFHSSs, then CC between them satisfies the following δPFHSS ((F, A), (G, B)) � 1.
properties:
··· ··· ··· ···
(1) 0 ≤ δPFHSS ((F, A), (G, B)) ≤ 1. Proof. 1. δPFHSS ((F, A), (G, B)) ≥ 0 is trivial, and here, we
··· ··· ··· ···
··· ···
(2) δPFHSS ((F, A), (G, B)) � δPFHSS ((G, B), (F, A)). only need to prove that δPFHSS ((F, A), (G, B)) ≤ 1.
8 Complexity

From Equation (18), we have

··· ··· m n 2 2 2 2
CPFHSS ((F, A), (G, B)) � 􏽘 􏽘􏼠􏼒TF(d�k ) δi 􏼁􏼓 ∗ 􏼒TG(d�k ) δi 􏼁􏼓 + 􏼒JF(d�k ) δi 􏼁􏼓 ∗ 􏼒JG(d�k ) δi 􏼁􏼓 􏼡
k�1 i�1
m 2 2 2 2
� 􏽘 􏼠􏼒TF(d�k ) δ1 􏼁􏼓 ∗ 􏼒TG(d�k ) δ1 􏼁􏼓 + 􏼒JF(d�k ) δ1 􏼁􏼓 ∗ 􏼒JG(d�k ) δ1 􏼁􏼓 􏼡
k�1
m 2 2 2 2
+ 􏽘 􏼠􏼒TF(d�k ) δ2 􏼁􏼓 ∗ 􏼒TG(d�k ) δ2 􏼁􏼓 + 􏼒JF(d�k ) δ2 􏼁􏼓 ∗ 􏼒JG(d�k ) δ2 􏼁􏼓 􏼡
k�1

+

+
m 2 2 2 2
· 􏽘 􏼠􏼒TF(d�k ) δn 􏼁􏼓 ∗ 􏼒TG(d�k ) δn 􏼁􏼓 + 􏼒JF(d�k ) δn 􏼁􏼓 ∗ 􏼒JG(d�k ) δn 􏼁􏼓 􏼡
k�1
2 2 2 2




⎪ 􏼒TF(d�1 ) δ1 􏼁􏼓 ∗ 􏼒TG(d�1 ) δ1 􏼁􏼓 + 􏼒JF(d�1 ) δ1 􏼁􏼓 ∗ 􏼒JG(d�1 ) δ1 􏼁􏼓 + ⎪ ⎫




⎪ 2 ⎪

··· ··· ⎪
⎨ 2 2 2 ⎪

CPFHSS ((F, A), (G, B)) � ⎪ 􏼒 T � δ
F (d2 ) 1 􏼁 􏼓 ∗ 􏼒 T � δ
G(d2 ) 1 􏼁 􏼓 + 􏼒 J � δ
F(d2 ) 1 􏼁􏼓 ∗ 􏼒 J � δ
G(d2 ) 1 􏼁 􏼓 +
⎪ ⎪


⎪ ⋮ ⎪


⎪ 2 2 2 2 ⎪

⎩ 􏼒 T � δ 􏼁 􏼓 ∗ 􏼒 T � δ 􏼁 􏼓 + 􏼒J � δ 􏼁 􏼓 ∗ 􏼒J � δ 􏼁 􏼓 ⎪
⎪ ⎭
F(dm ) 1 G(dm ) 1 F(dm ) 1 G(dm ) 1
2 2 2 2


⎪ 􏼒TF(d�1 ) δ2 􏼁􏼓 ∗ 􏼒TG(d�1 ) δ2 􏼁􏼓 + 􏼒JF(d�1 ) δ2 􏼁􏼓 ∗ 􏼒JG(d�1 ) δ2 􏼁􏼓 + ⎪ ⎫


⎪ ⎪


⎪ 2 ⎪


⎨ 2 2 2 ⎪

+⎪ 􏼒 T δ
� ) 2
F(d 􏼁 􏼓 ∗ 􏼒 TG ( δ
� ) 2
d 􏼁 􏼓 + 􏼒 J F( δ
� ) 2
d 􏼁 􏼓 ∗ 􏼒 J G( δ
� ) 2
d 􏼁 􏼓 +

2 2 2 2 ⎪


⎪ ⋮ ⎪


⎪ 2 2 2 2 ⎪

⎩ 􏼒T � δ 􏼁􏼓 ∗ 􏼒T � δ 􏼁􏼓 + 􏼒J � δ 􏼁􏼓 ∗ 􏼒J � δ 􏼁􏼓 ⎪
⎪ ⎭
F(dm ) 2 G(dm ) 2 F(dm ) 2 G(dm ) 2

+

+
2 2 2 2




⎪ 􏼒TF(d�1 ) δn 􏼁􏼓 ∗ 􏼒TG(d�1 ) δn 􏼁􏼓 + 􏼒JF(d�1 ) δn 􏼁􏼓 ∗ 􏼒JG(d�1 ) δn 􏼁􏼓 + ⎪ ⎫




⎪ 2 ⎪


⎨ 2 2 2 ⎪

·⎪ 􏼒 T � ) n
F(d δ 􏼁􏼓 ∗ 􏼒 TG ( δ
� ) n
d 􏼁 􏼓 + 􏼒 J F( δ
� ) n
d 􏼁 􏼓 ∗ 􏼒 J G( δ
� ) n
d 􏼁 􏼓 +

2 2 2 2 ⎪


⎪ ⋮ ⎪


⎪ 2 2 2 2 ⎪

⎩ 􏼒T � δ 􏼁 􏼓 ∗ 􏼒 T � δ 􏼁 􏼓 + 􏼒 J � δ 􏼁 􏼓 ∗ 􏼒 J � δ 􏼁 􏼓 ⎪
⎪ ⎭
F(dm ) n G(dm ) n F(dm ) n G(dm ) n
m 2 2 2 2
� 􏽘 􏼠 􏼒TF(d� ) δ1 􏼁􏼓 ∗ 􏼒TG(d� ) δ1 􏼁􏼓 + 􏼒TF(d� ) δ2 􏼁􏼓 ∗ 􏼒TG(d� ) δ2 􏼁􏼓
k k k k
k�1

2 2
+ . . . + 􏼒TF(d�k ) δn 􏼁􏼓 ∗ 􏼒TG(d�k ) δn 􏼁􏼓 )

m 2 2 2 2
+ 􏽘 􏼠 􏼒JF(d� ) δ1 􏼁􏼓 ∗ 􏼒JG(d� ) δ1 􏼁􏼓 + 􏼒JF(d� ) δ2 􏼁􏼓 ∗ 􏼒JG(d� ) δ2 􏼁􏼓
k k k k
k�1

2 2
+ · · · + 􏼒JF(d�k ) δn 􏼁􏼓 ∗ 􏼒JG(d�k ) δn 􏼁􏼓 􏼡.

(20)
Complexity 9

Using Cauchy–Schwarz inequality, (α1 β1 + α2 β2 + · · · +


αn βn )2 ≤ (α21 + α22 + · · · + α2n ) · (β21 + β22 + · · · + β2n ), where
(α1 + α2 + · · · + αn ) and (β1 + β2 + · · · + βn ) ∈∈Rn .

··· ···
CPFHSS ((F, A), (G, B))2
m 4 4 4 4 4 4
≤ 􏽘 􏼨 􏼠􏼒TF(d�k ) δ1 􏼁􏼓 + 􏼒TF(d�k ) δ2 􏼁􏼓 + · · · + 􏼒TF(d�k ) δn 􏼁􏼓 􏼡 + 􏼠􏼒JF(d�k ) δ1 􏼁􏼓 + 􏼒JF(d�k ) δ2 􏼁􏼓 + · · · + 􏼒JF(d�k ) δn 􏼁􏼓 􏼡 􏼩
k�1

m 4 4 4 4 4 4
× 􏽘 􏼨 􏼠􏼒TG(d�k ) δ1 􏼁􏼓 + 􏼒TG(d�k ) δ2 􏼁􏼓 + · · · + 􏼒TG(d�k ) δn 􏼁􏼓 􏼡 + 􏼠􏼒JG(d�k ) δ1 􏼁􏼓 + 􏼒JG(d�k ) δ2 􏼁􏼓 + · · · + 􏼒JG(d�k ) δn 􏼁􏼓 􏼡 􏼩
k�1

··· ···
CPFHSS ((F, A), (G, B))2
m n 4 4 m n 4 4
≤ 􏽘 􏽘􏼠􏼒TF(d�k ) δi 􏼁􏼓 + 􏼒JF(d�k ) δi 􏼁􏼓 􏼡 × 􏽘 􏽘􏼠􏼒TG(d�k ) δi 􏼁􏼓 + 􏼒JG(d�k ) δi 􏼁􏼓 􏼡
k�1 i�1 k�1 i�1

··· ··· ··· ···


· CPFHSS ((F, A), (G, B))2 ≤ ςPFHSS (F, A) × ςPFHSS (G, B).
(21)

··· ··· ···


Therefore, CPFHSS ((F, A), (G, B))2 ≤ ςPFHSS (F, A)× Proof. 2. The proof is obvious.
···
ςPFHSS (G, B). Hence, by using Definition 9, we have δPFHSS
··· ··· ··· ···
((F, A), (G, B)) ≤ 1. So, 0 ≤ δPFHSS ((F, A), (G, B)) ≤ 1. Proof. 3. From Equation (19), we have

2 2 2 2

···
􏽐m n
k�1 􏽐i�1 􏼠􏼒TF(d
� ) δi 􏼁􏼓 ∗ 􏼒TG(d
� ) δ i 􏼁􏼓 + 􏼒JF(d
� ) δ i 􏼁􏼓 ∗ 􏼒JG(d
� ) δ i 􏼁􏼓 􏼡
··· k k k k
δPFHSS ((F, A), (G, B)) � 􏽳������������������������������������� 􏽳�������������������������������������.
4 4 4 4
􏽐m n
k�1 􏽐i�1 􏼠􏼒TF(d
� ) δ i 􏼁􏼓 + 􏼒JF(d
k
m n
� ) δ i 􏼁􏼓 􏼡 􏽐k�1 􏽐i�1 􏼠􏼒TG(d
k
� ) δi 􏼁􏼓 + 􏼒JG(d
k
� ) δ i 􏼁􏼓 􏼡
k

(22)

As we know that TF(dk )(δi ) � TG(d�k )(δi ) and


JF(d�k )(δi ) � JG(d�k )(δi ) ∀ i, k, we get

4 4

···
􏽐m n
k�1 􏽐i�1 􏼠􏼒TF(d
� ) δi 􏼁􏼓 + 􏼒JF(d
� ) δ i 􏼁􏼓 􏼡
··· k k
δPFHSS ((F, A), (G, B)) � 􏽳������������������������������������� 􏽳�������������������������������������
4 4 4 4
􏽐m n
k�1 􏽐i�1 􏼠􏼒TF(d
� ) δ i 􏼁􏼓 + 􏼒JF(d
k
m n
� ) δi 􏼁􏼓 􏼡 􏽐k�1 􏽐i�1 􏼠􏼒TG(d
k
� ) δ i 􏼁 􏼓 + 􏼒 JG ( d
k
� ) δ i 􏼁􏼓 􏼡
k

··· ···
δPFHSS ((F, A), (G, B)) � 1.
(23)

Thus, the required result is proved.


10 Complexity

···
Definition 10. Let (F, A) � 􏽮(δi , TF(d�k )(δi ), JF(d�k )(δi ))| be two PFHSSs. Then, their correlation coefficient is given as
··· ··· ···
δi ∈ U} and (G, B) � 􏽮(δi , TG(d�k )(δi ), JG(d�k )(δi ))|δi ∈ U􏽯 δPFHSS ((F, A), (G, B)) and is defined as follows:

··· ···
··· ··· CPFHSS ((F, A), (G, B))
δ1PFHSS ((F, A), (G, B)) � ··· ···
max􏼚ςPFHSS (F, A), ςPFHSS (G, B)􏼛

2 2 2 2
(24)
···
􏽐m n
k�1 􏽐i�1 􏼠􏼒TF(d
� ) δi 􏼁􏼓 ∗ 􏼒TG(d
� ) δi 􏼁􏼓 + 􏼒JF(d
� ) δi 􏼁􏼓 ∗ 􏼒JG(d
� ) δ i 􏼁􏼓 􏼡
··· k k k k
δ1PFHSS ((F, A), (G, B)) � 4 4 4 4
.
max􏼨􏽐m n
k�1 􏽐i�1 􏼠􏼒TF(d
� ) δi 􏼁􏼓 + 􏼒JF(d
k
m n
� ) δi 􏼁􏼓 􏼡, 􏽐k�1 􏽐i�1 􏼠􏼒TG(d
k
� ) δi 􏼁􏼓 + 􏼒JG(d
k
� ) δ i 􏼁 􏼓 􏼡􏼩
k

···
Theorem 3. Let (F, A) � 􏽮(δi , TF(d�k )(δi ), JF(d�k )(δi ))| maker adjusts different weights for each alternative in the
···
δi ∈ U} and (G, B) � 􏽮(δi , TG(d�k )(δi ), JG(d�k )(δi ))|δi ∈ U􏽯 universe of discourse, the decision may be different. Con-
sequently, it is particularly significant to plan the weight
be two PFHSSs. Then, the CC between them satisfies the T
before decision-making. Let Ω � 􏼈Ω1 , Ω2 , Ω3 , . . . , Ωm 􏼉 be
following properties: m
a weight vector for experts such as Ωk > 0, 􏽐k�1 Ωk � 1, and
··· ··· T
(1) 0 ≤ δ1PFHSS ((F, A), (G, B)) ≤ 1. c � 􏼈c1 , c2 , c3 , . . . , cn 􏼉 be a weight vector for parameters
n
··· ··· ··· ··· such as ci > 0, 􏽐i�1 ci � 1. In the following, we develop the
(2) δ1PFHSS ((F, A), (G, B)) � δ1PFHSS ((G, B), (F, A)). WCC between PFHSS by extending Definitions 9 and 10.
··· ···
(3) If (F, A) � (G, B), that is, ∀ i, k, TF(d�k ) (δi ) �
···
TG(d�k )(δi ) and JF(d�k )(δi ) � JG(d�k )(δi ), then Definition 11. Let (F, A) � 􏽮(δi , TF(d�k )(δi ), JF(d�k )(δi ))|
··· ··· ···
δ1PFHSS ((F, A), (G, B)) � 1. δi ∈ U} and (G, B) � 􏽮(δi , TG(d�k )(δi ), JG(d�k )(δi ))|δi ∈ U􏽯
be two PFHSSs. Then, their weighted correlation coefficient
··· ···
Proof. It is similar to Theorem 2. is given as δWPFHSS ((F, A), (G, B)) and is defined as
In this era, it is very necessary to consider the weights of follows:
PFHSS in practical applications. Whenever the decision-

··· ···
··· ··· CWPFHSS ((F, A), (G, B))
δWPFHSS ((F, A), (G, B)) � 􏽱������������···
� 􏽱������������
···
ςWPFHSS (F, A) ∗ ςWPFHSS (G, B)

2 2 2 2

···
􏽐m n
k�1 Ωk 􏼠􏽐i�1 ci 􏼠􏼒TF(d
� ) δi 􏼁􏼓 ∗ 􏼒TG(d
� ) δ i 􏼁􏼓 + 􏼒JF(d
� ) δ i 􏼁􏼓 ∗ 􏼒JG(d
� ) δi 􏼁􏼓 􏼡􏼡
··· k k k k
δWPFHSS ((F, A), (G, B)) � 􏽳������������������������������������������� � 􏽳��������������������������������������������.
4 4 4 4
􏽐m n
k�1 Ωk 􏼠􏽐i�1 ci 􏼠􏼒TF(d
� ) δ i 􏼁􏼓 + 􏼒JF(d
k
m n
� ) δ i 􏼁􏼓 􏼡􏼡 􏽐k�1 Ωk 􏼠􏽐i�1 ci 􏼠􏼒TG(d
k
� ) δ i 􏼁􏼓 + 􏼒JG(d
k
� ) δ i 􏼁􏼓 􏼡􏼡
k

(25)
Complexity 11

···
··· ···
Definition 12. Let (F, A) � 􏽮(δi , TF(d�k )(δi ), JF(d�k )(δi ))| is given as δ1WPFHSS ((F, A), (G, B)) and is defined as
···
δi ∈ U} and (G, B) � 􏽮(δi , TG(d�k )(δi ), JG(d�k )(δi ))|δi ∈ U􏽯 follows:
be two PFHSSs. Then, their weighted correlation coefficient

··· ···
··· ··· CWPFHSS ((F, A), (G, B))
δ1WPFHSS ((F, A), (G, B)) � ··· ···
max􏼚ςWPFHSS (F, A), ςWPFHSS (G, B)􏼛

2 2 2 2

···
􏽐m n
k�1 Ωk 􏼠􏽐i�1 ci 􏼠􏼒TF(d
� ) δi 􏼁􏼓 ∗ 􏼒TG(d
� ) δi 􏼁􏼓 + 􏼒JF(d
� ) δi 􏼁􏼓 ∗ 􏼒JG(d
� ) δ i 􏼁 􏼓 􏼡􏼡
··· k k k k
δ1WPFHSS ((F, A), (G, B)) � 4 4 4 4
.
max􏼨􏽐m n
k�1 Ωk 􏼠􏽐i�1 ci 􏼠􏼒TF(d
� ) δi 􏼁􏼓 + 􏼒JF(d
k
m
_ k 􏼠􏽐 m
� ) δi 􏼁􏼓 􏼡􏼡, 􏽐k�1 ω
k
n
k�1 Ωk 􏼠􏽐i�1 ci 􏼠􏼒TG(d
� ) δ i 􏼁􏼓 + 􏼒JG(d
k
� ) δ i 􏼁 􏼓 􏼡 􏼡􏼡 􏼩
k

(26)

··· ··· ···


If we consider Ω � {(1/m), (1/m),. . ., (1/m)} and c ··· ((F, A), (G, B)) � δWPFHSS ((G, B),
(2) δWPFHSS
··· ···
� {(1/n), (1/n),. . ., (1/n)}, then δWPFHSS ((F, A), (G, B)) (F, A)).
··· ···
··· ··· (3) If (F, A) � (G, B), that is, ∀ i, k,
and δ1WPFHSS ((F, A), (G, B)) are reduced to
··· ··· ··· ··· TF(d�k )(δi ) � TG(d�k )(δi ), and JF(d�k )(δi ) �
δWPFHSS ((F, A), (G, B)) and δ1WPFHSS ((F, A), (G, B)), ··· ···
respectively. JG(d�k )(δi ), then δWPFHSS ((F, A), (G, B)) � 1.
···
Theorem 4. Let (F, A) � 􏽮(δi , TF(d�k )(δi ), JF(d�k )(δi ))| ··· ···
··· Proof. The inequality δWPFHSS ((F, A), (G, B)) ≥ 0 is trivial,
δi ∈ U} and (G, B) � 􏽮(δi , TG(d�k )(δi ), JG(d�k )(δi ))|δi ∈ U􏽯 and here, we only need to prove that
··· ···
be two PFHSSs. Then, the CC between them satisfies the δWPFHSS ((F, A), (G, B)) ≤ 1.
following properties: As we know,
··· ···
(1) 0 ≤ δWPFHSS ((F, A), (G, B)) ≤ 1.

··· ··· m n 2 2 2 2
⎝􏽘 c 􏼠􏼒T � δ 􏼁􏼓 ∗ 􏼒T � δ 􏼁􏼓 + 􏼒J � δ 􏼁􏼓 ∗ 􏼒J � δ 􏼁􏼓 􏼡⎞
CWPFSS ((F, A), (G, B)) � 􏽘 Ωk ⎛ ⎠
i F(dk ) i G(dk ) i F(dk ) i G(dk ) i
k�1 i�1
m 2 2 2 2
� 􏽘 Ωk 􏼠c1 􏼠􏼒TF(d�k ) δ1 􏼁􏼓 ∗ 􏼒TG(d�k ) δ1 􏼁􏼓 + 􏼒JF(d�k ) δ1 􏼁􏼓 ∗ 􏼒JG(d�k ) δ1 􏼁􏼓 􏼡􏼡
k�1
m 2 2 2 2
+ 􏽘 Ωk 􏼠c2 􏼠􏼒TF(d�k ) δ2 􏼁􏼓 ∗ 􏼒TG(d�k ) δ2 􏼁􏼓 + 􏼒JF(d�k ) δ2 􏼁􏼓 ∗ 􏼒JG(d�k ) δ2 􏼁􏼓 􏼡􏼡
k�1
+

+
m 2 2 2 2
􏽘 Ωk 􏼠cn 􏼠􏼒TF(d�k ) δn 􏼁􏼓 ∗ 􏼒TG(d�k ) δn 􏼁􏼓 + 􏼒JF(d�k ) δn 􏼁􏼓 ∗ 􏼒JG(d�k ) δn 􏼁􏼓 􏼡􏼡
k�1
2 2 2 2

⎪ ⎪



⎪ Ω1 􏼠 c 1 􏼠 􏼒 T �
F(d1 ) δ 1 􏼁 􏼓 ∗ 􏼒 T �
G(d1 ) δ 1 􏼁 􏼓 + 􏼒 J �
F(d1 ) δ 1 􏼁􏼓 ∗ 􏼒 J �
G(d1 ) δ 1 􏼁 􏼓 􏼡􏼡+ ⎪⎪


⎪ ⎪


⎪ ⎪


⎪ 2 2 2 2 ⎪

⎪Ω c
⎪ T δ ∗ T δ + J δ ∗ J δ ⎪


⎨ 2 1􏼠 􏼠 􏼒 �
F(d2 ) 1 􏼁 􏼓 􏼒 �
G(d2 ) 1 􏼁 􏼓 􏼒 �
F(d2 ) 1 􏼁􏼓 􏼒 �
G(d2 ) 1 􏼁 􏼓 􏼡 􏼡+ ⎪

�⎪ ⎪

⎪ ⋮ ⎪


⎪ ⎪


⎪ + ⎪


⎪ ⎪


⎪ 2 2 2 2 ⎪

⎪ ⎪
⎩ Ωm 􏼠c1 􏼠􏼒TF(d�m ) δ1 􏼁􏼓 ∗ 􏼒TG(d�m ) δ1 􏼁􏼓 + 􏼒JF(d�m ) δ1 􏼁􏼓 ∗ 􏼒JG(d�m ) δ1 􏼁􏼓 􏼡􏼡 ⎪
⎪ ⎭
12 Complexity


⎧ 2 2 2 2 ⎪




⎪ Ω 1 􏼠 c 2 􏼠 􏼒 T �
F(d1 ) δ 2 􏼁 􏼓 ∗ 􏼒 T �
G(d1 ) δ 2 􏼁 􏼓 + 􏼒 J �
F(d1 ) δ 2 􏼁 􏼓 ∗ 􏼒 J �
G(d1 ) δ 2 􏼁 􏼓 􏼡􏼡+ ⎪⎪



⎪ ⎪


⎪ ⎪


⎪ ⎪


⎪ 2 2 2 2 ⎪


⎪ Ω 􏼠 c 􏼠 􏼒 T δ 􏼁 􏼓 ∗ 􏼒 T δ 􏼁 􏼓 + 􏼒 J δ 􏼁 􏼓 ∗ 􏼒 J δ 􏼁 􏼓 􏼡 􏼡+ ⎪


⎪ 2 2 F �
( 2)
d 2 G �
( 2)
d 2 F �
( 2)
d 2 G �
( 2)
d 2 ⎪


⎨ ⎪

+⎪ ⎪

⎪ ⋮ ⎪


⎪ ⎪


⎪ ⎪


⎪ + ⎪


⎪ ⎪


⎪ ⎪


⎪ 2 2 2 2 ⎪


⎪ ⎪

⎩ Ωm 􏼠c2 􏼠􏼒TF(d�m ) δ2 􏼁􏼓 ∗ 􏼒TG(d�m ) δ2 􏼁􏼓 + 􏼒JF(d�m ) δ2 􏼁􏼓 ∗ 􏼒JG(d�m ) δ2 􏼁􏼓 􏼡􏼡 ⎪
⎪ ⎭


⎧ 2 2 2 2 ⎪

⎪ ⎪

⎪ Ω 1 􏼠 c n 􏼠 􏼒 TF ( � ) δn 􏼁􏼓 ∗ 􏼒TG(d � ) δn 􏼁􏼓 + 􏼒JF(d � ) δn 􏼁􏼓 ∗ 􏼒JG(d � ) δn 􏼁􏼓 􏼡􏼡+ ⎪ ⎪

⎪ d 1 1 1 1 ⎪


⎪ ⎪


⎪ ⎪


⎪ 2 2 2 2



⎪ ⎪

⎪ Ω
⎪ 2 n 􏼠 c 􏼠 􏼒 T �
F(d2 ) nδ 􏼁 􏼓 ∗ 􏼒 T �
G(d2 ) nδ 􏼁 􏼓 + 􏼒 J �
F(d2 ) nδ 􏼁 􏼓 ∗ 􏼒 J �
G(d2 ) n δ 􏼁 􏼓 􏼡 􏼡+ ⎪


⎪ ⎪

⎨ ⎬

⎪ ⋮ ⎪


⎪ ⎪


⎪ ⎪


⎪ ⎪


⎪ + ⎪


⎪ ⎪


⎪ ⎪


⎪ 2 2 2 2 ⎪


⎪ Ω 􏼠 c 􏼠 􏼒 T δ 􏼁 􏼓 ∗ 􏼒 T δ 􏼁 􏼓 + 􏼒 J δ 􏼁 􏼓 ∗ 􏼒 J δ 􏼁 􏼓 􏼡 􏼡 ⎪

⎩ m n F(d� ) n
m G(d� ) n
m F(d� ) n
m G(d � ) n
m


⎧ √�� 2 √�� 2 √�� 2 √�� 2 ⎪




⎪ Ω1 􏼠 c1 􏼒TF(d�1 ) δ1 􏼁􏼓 ∗ c1 􏼒TG(d�1 ) δ1 􏼁􏼓 + c1 􏼒JF(d�1 ) δ1 􏼁􏼓 ∗ c1 􏼒JG(d�1 ) δ1 􏼁􏼓 􏼡+ ⎪ ⎪



⎪ ⎪


⎪ ⎪


⎪ ⎪


⎪ √ �� 2 √�� 2 √ �� 2 √�� 2 ⎪


⎪ Ω 􏼠 c 􏼒 T δ 􏼁 􏼓 ∗ c 􏼒 T δ 􏼁 􏼓 + c 􏼒 J δ 􏼁 􏼓 ∗ c 􏼒 J δ 􏼁 􏼓 􏼡+ ⎪


⎪ 2 1 �
F(d2 ) 1 1 �
G(d2 ) 1 1 �
F(d2 ) 1 1 �
G(d2 ) 1 ⎪


⎨ ⎪

�⎪ ⎪

⎪ ⋮ ⎪


⎪ ⎪


⎪ ⎪


⎪ + ⎪


⎪ ⎪


⎪ ⎪



⎪ √ �� 2 √�� 2 √ �� 2 √�� 2 ⎪⎪

⎪ Ωm 􏼠 c1 􏼒TF(d� ) δ1 􏼁􏼓 ∗ c1 􏼒TG(d� ) δ1 􏼁􏼓 + c1 􏼒JF(d� ) δ1 􏼁􏼓 ∗ c1 􏼒JG(d� ) δ1 􏼁􏼓 􏼡 ⎪

⎩ ⎪

m m m m


⎪ √�� 2 √�� 2 √�� 2 √�� 2 ⎪




⎪ Ω 1 􏼠 c 2 􏼒 T �
F(d1 ) δ 2 􏼁 􏼓 ∗ c 2 􏼒 T �
G(d1 ) δ 2 􏼁 􏼓 + c 2 􏼒 J �
F(d1 ) δ 2 􏼁 􏼓 ∗ c 2 􏼒 J �
G(d1 ) δ 2 􏼁 􏼓 􏼡+ ⎪




⎪ ⎪


⎪ ⎪


⎪ ⎪


⎪ √ �� 2 √ �� 2 √ �� 2 √ �� 2 ⎪


⎪ Ω 􏼠 c 􏼒 T δ 􏼁 􏼓 ∗ c 􏼒 T δ 􏼁 􏼓 + c 􏼒 J δ 􏼁 􏼓 ∗ c 􏼒 J δ 􏼁 􏼓 􏼡+ ⎪


⎪ 2 2 F �
( 2)
d 2 2 G �
( 2)
d 2 2 F �
( 2)
d 2 2 G �
( 2)
d 2 ⎪


⎨ ⎪

+⎪ ⎪

⎪ ⋮ ⎪


⎪ ⎪


⎪ ⎪


⎪ + ⎪


⎪ ⎪


⎪ ⎪


⎪ 2 2 2 2 ⎪


⎪ √ �� √ �� √ �� √ �� ⎪

⎩ Ωm 􏼠 c2 􏼒TF(d�m ) δ2 􏼁􏼓 ∗ c2 􏼒TG(d�m ) δ2 􏼁􏼓 + c2 􏼒JF(d�m ) δ2 􏼁􏼓 ∗ c2 􏼒JG(d�m ) δ2 􏼁􏼓 􏼡 ⎪
⎪ ⎭
Complexity 13

+

+


⎧ √�� 2 √�� 2 √�� 2 √�� 2 ⎪




⎪ Ω 1 􏼠 c n 􏼒 T F �
( 1)
d δ n 􏼁 􏼓 ∗ c n 􏼒 TG �
( 1)
d δ n 􏼁􏼓 + c n 􏼒 J F �
( 1)
d δ n 􏼁 􏼓 ∗ c n 􏼒 J G �
( 1)
d δ n 􏼁 􏼓 􏼡+ ⎪




⎪ ⎪


⎪ ⎪


⎪ ⎪


⎪ √ �� 2 √�� 2 √ �� 2 √�� 2 ⎪


⎪ Ω 􏼠 c 􏼒 T δ 􏼁 􏼓 ∗ c 􏼒 T δ 􏼁􏼓 + c 􏼒 J δ 􏼁 􏼓 ∗ c 􏼒 J δ 􏼁 􏼓 􏼡+ ⎪

⎪ 2
⎪ n �
F(d2 ) n n �
G(d2 ) n n �
F(d2 ) n n �
G(d2 ) n ⎪

⎨ ⎬

⎪ ⋮ ⎪


⎪ ⎪


⎪ ⎪


⎪ ⎪


⎪ + ⎪


⎪ ⎪


⎪ 2 2 2 2 ⎪

⎪ √ �� √ �� √ �� √ �� ⎪
⎪ Ωm 􏼠 cn 􏼒TF(d�m ) δn 􏼁􏼓 ∗ cn 􏼒TG(d�m ) δn 􏼁􏼓 + cn 􏼒JF(d�m ) δn 􏼁􏼓 ∗ cn 􏼒JG(d�m ) δn 􏼁􏼓 􏼡 ⎪

⎩ ⎪

⎧ 􏽰��� √��
⎪ 2 􏽰�� � √�� 2 􏽰��� √�� 2 􏽰�� � √�� 2 ⎪




⎪ 􏼠 Ω1 c1 􏼒TF(d�1 ) δ1 􏼁􏼓 ∗ Ω1 c1 􏼒TG(d�1 ) δ1 􏼁􏼓 + Ω1 c1 􏼒JF(d�1 ) δ1 􏼁􏼓 ∗ Ω1 c1 􏼒JG(d�1 ) δ1 􏼁􏼓 􏼡+ ⎪ ⎪



⎪ ⎪


⎪ ⎪


⎪ ⎪


⎪ 􏽰 ��� √ �� 2 􏽰��� √�� 2 􏽰��� √�� 2 􏽰��� √�� 2 ⎪



⎪ 􏼠 Ω2 c1 􏼒TF(d�2 ) δ1 􏼁􏼓 ∗ Ω2 c1 􏼒TG(d�2 ) δ1 􏼁􏼓 + Ω2 c1 􏼒JF(d�2 ) δ1 􏼁􏼓 ∗ Ω2 c1 􏼒JG(d�2 ) δ1 􏼁􏼓 􏼡+ ⎪ ⎪


⎨ ⎪

�⎪ ⎪

⎪ ⋮ ⎪


⎪ ⎪


⎪ ⎪


⎪ + ⎪


⎪ ⎪


⎪ ⎪


⎪ 􏽰 ��� √ �� 2 􏽰 ��� √ �� 2 􏽰 ��� √ �� 2 􏽰 ��� √ �� 2 ⎪


⎪ 􏼠 Ω c 􏼒 T δ 􏼁 􏼓 ∗ Ω c 􏼒 T δ 􏼁 􏼓 + Ω c 􏼒 J δ 􏼁 􏼓 ∗ Ω c 􏼒 J δ 􏼁 􏼓 􏼡 ⎪

⎩ m 1 � ) 1
F(d m m 1 G( � ) 1
d m m 1 F( � ) 1
d m m 1 G( � ) 1
d m ⎭


⎧ 􏽰��� √�� 2 􏽰�� � √�� 2 􏽰��� √�� 2 􏽰�� � √�� 2 ⎪




⎪ 􏼠 Ω1 c2 􏼒TF(d�1 ) δ2 􏼁􏼓 ∗ Ω1 c2 􏼒TG(d�1 ) δ2 􏼁􏼓 + Ω1 c2 􏼒JF(d�1 ) δ2 􏼁􏼓 ∗ Ω1 c2 􏼒JG(d�1 ) δ2 􏼁􏼓 􏼡+ ⎪ ⎪



⎪ ⎪


⎪ ⎪


⎪ ⎪


⎪ 􏽰 ��� √ �� 2 􏽰�� � √ �� 2 􏽰 ��
� √ �� 2 􏽰 ��� √ �� 2 ⎪



⎪ 􏼠 Ω 2 c 2 T δ
􏼒 F(d�2 ) 2 􏼁􏼓 ∗ Ω 2 c 2 T δ
􏼒 G(d�2 ) 2 􏼁􏼓 + Ω 2 c 2 J δ
􏼒 F(d�2 ) 2 􏼁􏼓 ∗ Ω 2 c 2 􏼒 G(d�2 ) 2 􏼁􏼓 􏼡+ ⎪
J δ ⎪


⎨ ⎪

+⎪ ⎪

⎪ ⋮ ⎪


⎪ ⎪


⎪ ⎪


⎪ + ⎪


⎪ ⎪


⎪ ⎪


⎪ 􏽰 ��� √�� 2 􏽰 ��� √�� 2 􏽰 ��� √�� 2 􏽰 ��� √�� 2 ⎪


⎪ 􏼠 Ω c 􏼒 T δ 􏼁 􏼓 ∗ Ω c 􏼒 T δ 􏼁 􏼓 + Ω c 􏼒 J δ 􏼁 􏼓 ∗ Ω c 􏼒 J δ 􏼁 􏼓 􏼡 ⎪

⎩ m 2 �
F(dm ) 2 m 2 �
G(dm ) 2 m 2 �
F (dm ) 2 m 2 �
G(dm ) 2 ⎭

+

+

⎧ 􏽰��� √�� 2 􏽰��
� √�� 2 􏽰��� √�� 2 􏽰��
� √�� 2 ⎪




⎪ 􏼠 Ω1 cn 􏼒TF(d�1 ) δn 􏼁􏼓 ∗ Ω1 cn 􏼒TG(d�1 ) δn 􏼁􏼓 + Ω1 cn 􏼒JF(d�1 ) δn 􏼁􏼓 ∗ Ω1 cn 􏼒JG(d�1 ) δn 􏼁􏼓 􏼡+ ⎪ ⎪



⎪ ⎪


⎪ ⎪


⎪ ⎪


⎪ 􏽰��� √ �� 2 􏽰��
� √ �� 2 􏽰 ��
� √ �� 2 􏽰��
� √ �� 2 ⎪


⎪ 􏼠 Ω c 􏼒 T δ 􏼁 􏼓 ∗ Ω c 􏼒 T δ 􏼁􏼓 + Ω c 􏼒 J δ 􏼁 􏼓 ∗ Ω c 􏼒 J δ 􏼁 􏼓 􏼡+ ⎪


⎪ 2 n �
F(d2 ) n 2 n �
G(d2 ) n 2 n �
F(d2 ) n 2 n �
G(d2 ) n ⎪


⎨ ⎪

⎪ ⎪ .

⎪ ⋮ ⎪


⎪ ⎪


⎪ ⎪


⎪ + ⎪


⎪ ⎪


⎪ ⎪



⎪ 􏽰 ��� 2 􏽰��� √�� 2 􏽰 ��� √ �� 2 􏽰��� √�� 2 ⎪


⎪ √�� ⎪
⎩ 􏼠 Ωm cn 􏼒TF(d�m ) δn 􏼁􏼓 ∗ Ωm cn 􏼒TG(d�m ) δn 􏼁􏼓 + Ωm cn 􏼒JF(d�m ) δn 􏼁􏼓 ∗ Ωm cn 􏼒JG(d�m ) δn 􏼁􏼓 􏼡 ⎪
⎪ ⎭

(27)
14 Complexity

By using Cauchy–Schwarz inequality, we get

··· ···
CWPFHSS ((F, A), (G, B))2
4 4 4 4


⎪ ⎪

⎪ ⎪ ⎫

⎫ ⎪



⎪ ⎨ Ω1 c1 􏼠􏼒TF(d�1 ) δ1 􏼁􏼓 + 􏼒JF(d�1 ) δ1 􏼁􏼓 􏼡 + Ω2 c1 􏼠􏼒TF(d�2 ) δ1 􏼁􏼓 + 􏼒JF(d�2 ) δ1 􏼁􏼓 􏼡 + · · · + ⎪
⎪ ⎬ ⎪ ⎪



⎪ ⎪ 4 4 ⎪ +⎪⎪


⎪ ⎪
⎪ ⎪
⎪ ⎪


⎪ ⎩ Ω c
m 1 􏼠 􏼒 T �
F(dm ) 1 δ 􏼁 􏼓 + 􏼒 J �
F(dm ) 1 δ 􏼁 􏼓 􏼡 ⎭ ⎪


⎪ ⎪


⎪ ⎪


⎪ 4 4 4 4 ⎪


⎪ ⎪

⎪ Ω1 c2 􏼠􏼒TF d� δ2 􏼁􏼓 + 􏼒JF d� δ2 􏼁􏼓 􏼡 + Ω2 c2 􏼠􏼒TF d� δ2 􏼁􏼓 + 􏼒JF d� δ2 􏼁􏼓 􏼡 + · · · + ⎪ ⎪
⎫ ⎪


⎪ ⎪
⎨ ( ) ( ) ( ) ( ) ⎪
⎬ ⎪


⎪ 1 1 2 2 ⎪


⎨⎪ 4 4 ⎪ + ⎪

≤⎪⎩⎪
⎪ ⎪

Ωm cm 􏼠􏼒TF(d�m ) δ2 􏼁􏼓 + 􏼒JF(d�m ) δ2 􏼁􏼓 􏼡 ⎭ ⎪

⎪ ⎪


⎪ ⎪


⎪ ⋮ ⎪


⎪ ⎪


⎪ + ⎪


⎪ ⎪


⎪ 4 4 4 4 ⎪


⎪ ⎪

⎪ Ω c 􏼠 􏼒 T δ 􏼁 􏼓 + 􏼒 J δ 􏼁 􏼓 􏼡 + Ω c 􏼠 􏼒 T δ 􏼁 􏼓 + 􏼒 J δ 􏼁 􏼓 􏼡 + · · · + ⎪

⎪ ⎪


⎪ ⎪
⎨ 1 n F �
( 1)
d n F �
( 1)
d n 2 n F �
( 2)
d n F �
( 2)
d n ⎪
⎬ ⎪⎪

⎪ ⎪


⎪ ⎪ 4 4 ⎪ ⎪

⎪ ⎪
⎪ ⎪
⎪ ⎪

⎩ ⎩ Ωm cn 􏼠􏼒TF(d�m ) δn 􏼁􏼓 + 􏼒JF(d�m ) δn 􏼁􏼓 􏼡 ⎭ ⎪⎭

4 4 4 4

⎧ ⎪
⎧ ⎪






⎨ Ω1 c1 􏼠􏼒TG(d�1 ) δ1 􏼁􏼓 + 􏼒JG(d�1 ) δ1 􏼁􏼓 􏼡 + Ω2 c1 􏼠􏼒TG(d�2 ) δ1 􏼁􏼓 + 􏼒JG(d�2 ) δ1 􏼁􏼓 􏼡 + · · · + ⎫ ⎪

⎬ ⎪
⎪ ⎪


⎪ ⎪


⎪ ⎪ 4 4 ⎪ + ⎪
⎪ (28)

⎪ ⎪
⎪ ⎪
⎪ ⎪


⎪ ⎩ Ωm c1 􏼠􏼒TG(d�m ) δ1 􏼁􏼓 + 􏼒JG(d�m ) δ1 􏼁􏼓 􏼡 ⎭ ⎪


⎪ ⎪


⎪ ⎪


⎪ 4 4 4 4 ⎪


⎪ ⎪

⎪ ⎪

⎪ ⎪

⎪⎨
⎪ Ω
⎪ 1 2c 􏼠 􏼒 TG(d δ
� ) 2 􏼁􏼓 + 􏼒 J G( δ
� ) 2
d 􏼁􏼓 􏼡 + Ω2 c 2 􏼠􏼒 T G( δ
� ) 2
d 􏼁 􏼓 + 􏼒 J G( δ
� ) 2
d 􏼁 􏼓 􏼡 + · · · + ⎪
⎬ ⎪


⎪ 1 1 2 2 ⎪


⎨⎪ 4 4 ⎪ + ⎪

· ⎪⎪⎪ ⎪

⎩ Ωm cm 􏼠􏼒TG(d�m ) δ2 􏼁􏼓 + 􏼒JG(d�m ) δ2 􏼁􏼓 􏼡 ⎭ ⎪

⎪ ⎪


⎪ ⎪


⎪ ⋮ ⎪


⎪ ⎪


⎪ + ⎪


⎪ ⎪


⎪ 4 4 4 4 ⎪


⎪ ⎪

⎪ Ω c 􏼠 􏼒 T δ 􏼁 􏼓 + 􏼒 J δ 􏼁 􏼓 􏼡 + Ω c 􏼠 􏼒 T δ 􏼁􏼓 + 􏼒 J δ 􏼁 􏼓 􏼡 + · · · + ⎪

⎪ ⎪


⎪ ⎪
⎨ 1 n �
G(d1 ) n �
G(d1 ) n 2 n �
G(d2 ) n �
G(d2 ) n ⎪
⎬ ⎪


⎪ ⎪


⎪ ⎪ 4 4 ⎪ ⎪

⎪ ⎪
⎪ ⎪
⎪ ⎪

⎩ ⎩ Ωm cn 􏼠􏼒TG(d�m ) δn 􏼁􏼓 + 􏼒JG(d�m ) δn 􏼁􏼓 􏼡 ⎭ ⎪⎭
··· ···
CWPFHSS ((F, A), (G, B))2
m n 4 4 m n 4 4
⎝ 􏽘 c 􏼠 􏼒 T � δ 􏼁 􏼓 + 􏼒 J � δ 􏼁 􏼓 􏼡⎞
≤ 􏽘 Ωk ⎛ ⎠×􏽘Ω ⎛
⎝ ⎠
� ) δi 􏼁􏼓 􏼡⎞
i F(dk ) i F(dk ) i k 􏽘 ci 􏼠􏼒TG(d
� ) δ i 􏼁􏼓 + 􏼒JG(d
k k
k�1 i�1 k�1 i�1
··· ··· ··· ···
CWPFHSS ((F, A), (G, B))2 ≤ ςWPFSS (F, A) ∗ ςWPFSS (G, B).

··· ···
Therefore, CWPFHSS ((F, A),
􏽱������������������������ (G, B)) ≤ Proof. 2. The proof is obvious.
··· ··· ···
ςWPFSS (F, A) ∗ ςWPFSS (G, B); hence, 0 ≤ δWPFSS ((F, A),
···
Proof. 3. From Equation (25), we have
(G, B)) ≤ 1.

2 2 2 2

···
􏽐m n
k�1 Ωk 􏼠􏽐i�1 ci 􏼠􏼒TF(d
� ) δi 􏼁􏼓 ∗ 􏼒TG(d
� ) δi 􏼁􏼓 + 􏼒JF(d
� ) δi 􏼁􏼓 ∗ 􏼒JG(d
� ) δ i 􏼁 􏼓 􏼡􏼡
··· k k k k
δWPFHSS ((F, A), (G, B)) � 􏽳�������������������������������������������� 􏽳��������������������������������������������.
4 4 4 4
􏽐m n
k�1 Ωk 􏼠􏽐i�1 ci 􏼠􏼒TF(d
� ) δi 􏼁􏼓 + 􏼒JF(d
k
m n
� ) δi 􏼁􏼓 􏼡􏼡 􏽐k�1 Ωk 􏼠􏽐i�1 ci 􏼠􏼒TG(d
k
� ) δi 􏼁􏼓 + 􏼒JG(d
k
� ) δ i 􏼁 􏼓 􏼡􏼡
k

(29)
Complexity 15

As we know that TF(dk )(δi ) � TG(d�k )(δi ) and


JF(d�k )(δi ) � JG(d�k )(δi ) ∀ i, k, we get

4 4

···
􏽐m n
k�1 Ωk 􏼠􏽐i�1 ci 􏼠􏼒TF(d
� ) δi 􏼁􏼓 + 􏼒JF(d
� ) δ i 􏼁􏼓 􏼡􏼡
··· k k
δWPFHSS ((F, A), (G, B)) � 􏽳��������������������������������������������􏽳��������������������������������������������
4 4 4 4
􏽐m n
k�1 Ωk 􏼠􏽐i�1 ci 􏼠􏼒TF(d
� ) δi 􏼁􏼓 + 􏼒JF(d
k
m n
� ) δ i 􏼁􏼓 􏼡􏼡 􏽐k�1 Ωk 􏼠􏽐i�1 ci 􏼠􏼒TF(d
k
� ) δi 􏼁􏼓 + 􏼒JF(d
k
� ) δ i 􏼁􏼓 􏼡􏼡
k

··· ···
δWPFHSS ((F, A), (G, B)) � 1.
(30)

Thus, the required result is proved. Some averaging and geometric aggregation operators for
PFHSSs have been defined based on the above laws for the
Definition 13. Let Jd�k � (Td�k , Jd�k ), Jd�11 � (Td�11 , Jd�11 ), collection of PFHSNs.
and Jd�12 � (Td�12 , Jd�12 ) be three PFHSNs and α be a positive
real number; by algebraic norms, we have Definition 14. Let Jd�ij � (Td�ij , Jd�ij ) be a PFHSN, Ωi and cj
􏽱������������������� be the weight vector for expert’s and subattributes of the
(1) Jd�11 ⊕ Jd�12 � 􏼜 T2d� + T2d� − T2d� T2d� , Jd�11 Jd�12 􏼝. considered parameters, respectively, with given conditions
11 12 11 12
􏽱������������������ Ωi > 0, 􏽐ni�1 Ωi � 1, cj > 0, and 􏽐mj�1 cj � 1. Then, PFHSWA
(2) Jd�11 ⊗ Jd�12 � 􏼜Td�11 Td�12 , J2d� + J2d� − J2d� J2d� 􏼝. operator is defined as PFHSWA: Δn ⟶ Δ, which is defined
􏽲�������������α 11 12 11 12
as follows:
(3) αJd�k � 􏼪 1 − 􏼒1 − T2d� 􏼓 , Jαd� 􏼫.
k k
􏽲�������������α
(4) Jαd� � 􏼪Tαd� , 1 − 􏼒1 − J2d� 􏼓 􏼫.
k k k

PFHSWA 􏼐Jd�11 , Jd�12 , . . . , Jd�nm 􏼑 � ⊕m n


j�1 cj 􏼒⊕i�1 Ωi Jd
� 􏼓
ij
􏽶������������������������
􏽴 cj cj
m n Ωi m n Ωi (31)
�􏼪 1 − 􏽙 ⎝
⎛􏽙 􏼒1 − T2� 􏼓 ⎠
dij
⎞ , 􏽙⎝
⎛􏽙 􏼒 J � 􏼓 ⎠
dij
⎞ 􏼫,
j�1 i�1 j�1 i�1

where Ωi and cj are the weight vector for experts and no subattributes, then the PFHSWA operator was
subattributes of the parameters, respectively, with given reduced to the IFSWA operator [59].
conditions Ωi > 0, 􏽐ni�1 Ωi � 1, cj > 0, and 􏽐m
j�1 cj � 1.

Remark 2. Definition 15. Let Jd�ij � (Td�ij , Jd�ij ) be a PFHSN, and Ωi


and cj be the weight vector for experts and subattributes of
(1) If both T2d� + J2d� ≤ 1 and Td�ij + Jd�ij ≤ 1 hold, then considered parameters, respectively, with given conditions
ij ij
the PFHSWA operator was reduced to the IFHSWA Ωi > 0, 􏽐ni�1 Ωi � 1, cj > 0, and 􏽐mj�1 cj � 1, then PFHSWG
operator [56]. operator is defined as PFHSWG: Δn ⟶ Δ, which is defined
as follows:
(2) If both T2d� + J2d� ≤ 1 and Td�ij + Jd�ij ≤ 1 hold and
ij ij
a set of attributes contains only one parameter with

cj
Ω
PFHSWG􏼐Jd�11 , Jd�12 , . . . , Jd�nm 􏼑 � ⊗ m n
j�1 􏼒 ⊗ i�1 Jd
i
� 􏼓
nm
􏽶��������������������������
cj 􏽴 cj (32)
m n Ωi m n Ωi
PFHSWG􏼐Jd�11 , Jd�12 , . . . , Jd�nm 􏼑 � 􏼪􏽙 ⎝
⎛􏽙 􏼒 T � 􏼓 ⎠
⎞ , ⎛􏽙 􏼒1 − J2� 􏼓 ⎠
1 − 􏽙⎝ ⎞ 􏼫,
dij dij
j�1 i�1 j�1 i�1
16 Complexity

where Ωi and cj are the weight vector for experts and comparable measures. The TOPSIS technique with corre-
subattributes of the given parameters, respectively, with lation coefficients is superior for locating closeness co-
given conditions Ωi > 0, 􏽐ni�1 Ωi � 1, cj > 0, and 􏽐m
j�1 cj � 1. efficients instead of distance as well as similarity measures
because the correlation measure retains the linear re-
Remark 3. lationship between the factors considered. By utilizing the
developed CC, a TOPSIS method is presented to select the
(1) If both T2d� + J2d� ≤ 1 and Td�ij + Jd�ij ≤ 1 hold, then most suitable option.
ij ij

the PFHSWG operator was reduced to the IFHSWG


operator [56]. 4.1. Proposed Decision-Making Approach. Assume a set of
(2) If both T2d� + J2d� ≤ 1 and Td�ij + Jd�ij ≤ 1 hold and “s” alternatives such as Q � 􏼈Q1 , Q2 , Q3 , . . . , Qs 􏼉 for assess-
ij ij
a set of attributes contains only one parameter with ment under the team of experts X � 􏼈X1 , X2 , X3 , . . . , Xn 􏼉
no subattributes, then the PFHSWG operator was with weights Ω � (Ω1 , Ω1 , . . . , Ωn )T and Ωi > 0, 􏽐ni�1 Ωi � 1.
reduced to the IFSWG operator [59]. Let L � 􏼈d1 , d2 , . . . , dm 􏼉 be a set of attributes and
J′ � 􏽮(d1ρ × d2ρ × · · · × dmρ ), for all ρ ∈ {1, 2, . . . , t} 􏽯, be
4. TOPSIS Approach on PFHSS for MAGDM a collection of their corresponding subattributes, with
Problem Based on the Correlation Coefficient weights c � (c1ρ , c2ρ , c3ρ , . . . , cmρ )T such as cρ > 0,
In this section, we are going to develop a methodology for 􏽐tρ�1 cρ � 1. The elements in the collection of subattributes
solving decision-making issues through continuing the are multivalued; for the sake of convenience, the elements of
TOPSIS method for PFHSS information based on correla- J′ can be expressed as J′ � 􏽮d � : z∈ {1, 2, . . . , k}􏽯. The team
z
tion coefficients. Hwang and Yoon [37] developed the of experts 􏼈Xi : i � 1, 2, . . . , n􏼉 evaluate the alternatives
TOPSIS method and used it to promote the order of eval- 􏽮Q(z) : z � 1, 2, . . . , s􏽯 based on the desired subattributes of
uation components of positive and negative ideal solutions � : z � 1, 2, . . . , k􏽯 given in the
for decision-making issues. By utilizing the TOPSIS method, the considered parameters 􏽮d z
we will be able to discover the best possible choices which form of PFHSNs such as (J(z) (z)
� )n×z � (Td
d
(z)
� , Jd
� )n×z, where
ij ij ij
have the smallest and largest distances to PIS and NIS,
respectively. The TOPSIS technique ensures that the cor- 0 ≤ T(z)
d
(z)
� , Jd
� ≤ 1, and (T(z)
� )
d
2
+ (J(z)
� )
d
2
≤ 1 for all i, j.
ij ij ij ij
relation measure can be used to distinguish positive ideals
from negative ideals by choosing rankings. Generally, in- Step 1. Construct a matrix for each alternative
vestigators are using the TOPSIS method to find closeness 􏽮Q(z) : z � 1, 2, . . . , s􏽯 in the form of PFHSNs by using
coefficients along with distinctive distance forms as well as subattributes of the given attributes such as follows:


d �
d . . . .. �
d
1 2 z

(z) (z) (z) (z)


⎜ 􏼒Td� , Jd� 􏼓 􏼒Td� , Jd� 􏼓 · · · 􏼒T(z) (z)
� , Jd� 􏼓⎞⎟


⎜ 11 11 12 12 d 1z 1z ⎟

X1 ⎜

⎜ ⎟




⎜ ⎟




⎜ (z) ⎟


X2 ⎜
⎜ 􏼒T(z) (z) (z) (z) (z)
⎜ � , Jd� 􏼓 􏼒T d
� , Jd� 􏼓 · · · 􏼒Td� , Jd� 􏼓 ⎟


⎟ (33)
(z) ⎜


d 21 21 22 22 2z 2z ⎟

􏼐Q , J′ 􏼑n×δ � ⎜




⎟ .
⋮ ⎜⎜ ⎟




⎜ ⎟


⎜ ⋮ ⋮ ⋮ ⋮ ⎟



⎜ ⎟

Xn ⎜








(z) (z) (z) (z) (z) (z)
􏼒Td� , Jd� 􏼓 􏼒Td� , Jd� 􏼓 · · · 􏼒Td� , Jd� 􏼓
n1 n1 n2 n2 nz nz

Step 2. Normalize the collective information decision ma- Step 3. Construct the weighted decision matrix for each
(z) (z)
trix by converting the rating value of the cost-type pa- alternative Q � (Jd�ij )n×z, where
rameters into benefit-type parameters with the help of 􏽳������������������
(z) Ωi c j Ωi cj
normalization formula: Jd�ij � cj Ωi J(z)
� � ⎝ 1 − 􏼠􏼒1 − T2� 􏼓 􏼡 , 􏼠􏼒J� 􏼓 􏼡 ⎞

dij

d ij
dij




⎪ Jc � 􏼒J(z) (z)
� , Td
� 􏼓; cost − type parameter,
(z) (z)
� 􏼒Td�ij , Jd�ij 􏼓,
⎨ d�ij d ij ij
hij � ⎪

⎪ (35)
⎩ J� � 􏼒T(z) (z)
� , Jd
� 􏼓; benefit − type parameter.
dij d ij ij
where Ωi and cj are the weights for the ith expert and jth
(34) subattribute, respectively.
Complexity 17

Step 4. Find the indices hij � argmaxz 􏽮θ(z) ij 􏽯 and gij 􏼁 gij 􏼁
gij � argminz 􏽮θ(z) 􏽯 for each expert X and subattribute �
d L− � 􏼒T−d�ij , J−d�ij 􏼓 � 􏼠Td� , Jd� 􏼡. (37)
ij i j n×z ij ij

from CC matrices and determine the PIA and NIA based on


indices as follows:
hij 􏼁 hij 􏼁 Step 5. Compute the CC between each alternative of
L+ � 􏼒T+d�ij , J+d�ij 􏼓 � 􏼠Td� , Jd� 􏼡, (36) (z)
weighted decision matrices Q and PIA L+ as follows:
n×z ij ij

(z)
CPFHSS 􏼒Q , L+ 􏼓
(z) (z) +
p � δPFHSS 􏼒Q , L 􏼓 � 􏽱������������������
ςPFHSS Q(z) ∗ ςPFHSS L+

+ + (z) (z)
(38)
􏽐m n
j�1 􏽐i�1 􏼒Td
� ∗ Td
ij
� + Jd
ij
� ∗ Jd
ij
� 􏼓
ij
� 􏽳��������������������������􏽳��������������������������.
(z) 2 + (z) 2+
2 2
􏽐m n
j�1 􏽐i�1 􏼠􏼒Td
� 􏼓 + 􏼒 Jd
ij
m n
� 􏼓 􏼡 􏽐j�1 􏽐i�1 􏼠􏼒Td
ij
� 􏼓 + 􏼒Jd
ij
� 􏼓 􏼡
ij

Step 6. Compute the CC between each alternative of the


(z)
weighted decision matrix Q and NIA L− as follows:

(z)
CPFHSS 􏼒Q , L− 􏼓
(z)
q(z) −
� δPFHSS 􏼒Q , L 􏼓 � 􏽱������������������
(z)
ςPFHSS Q ∗ ςPFHSS L−

− − (z) (z)
(39)
􏽐m n
j�1 􏽐i�1 􏼒Td
� ∗ Td
ij
� + Jd
ij
� ∗ Jd
ij
� 􏼓
ij
� 􏽳��������������������������􏽳�������������������������.
(z) 2 − (z) 2−
2 2
􏽐m n
j�1 􏽐i�1 􏼠􏼒Td
� 􏼓 + 􏼒 Jd
ij
m n
� 􏼓 􏼡 􏽐j�1 􏽐i�1 􏼠􏼒Td
ij
� 􏼓 + 􏼒 Jd
ij
� 􏼓 􏼡
ij

Step 7. The closeness coefficient for each alternative can be we investigated the numerical example of choosing an an-
found as follows: tivirus mask in the global serious situation of the COVID-19
(z) disease. Everybody in the world has quite a lot of trouble in
K 􏼒Q , L − 􏼓 acquiring an excellent as well as multipurpose antivirus mask
(z)
R � , (40) to prevent themselves from contracting COVID-19. In this
(z) (z)
K􏼒Q , L+ 􏼓 + K􏼒Q , L− 􏼓 risky COVID-19 situation, the overall demand for antivirus
masks seems to have exaggerated. Due to increased demand, it
where is really difficult to find suitable gas masks in the market. The
(z) increase in demand has also caused second-class gas masks to
K􏼒Q , L− 􏼓 � 1 − q(z) ,
come into the market. Raza et al. [60] discussed the complex
(41)
(z) transmission of the epidemic problems by utilizing the
K􏼒Q , L+ 􏼓 � 1 − p(z) .
nonlinear fractional-order Ebola virus mathematical model.
They developed the fractional-order Ebola virus transmission
Step 8. Choose the alternative with a maximum value of model for the treatment and control to reduce its effect on
closeness coefficient. a population that plays an important role in public health.
Ahmed et al. [61] introduced some models for the COVID-19
that can address important questions about global health care
Step 9. Analyze the ranking of the alternatives. and suggest important notes. Yang et al. [57] and Shahzadi
The flow chart of the proposed method can be seen in and Akram [58] used the spherical normal fuzzy sets and
Figure 1. formation fuzzy soft Yager ordered weighted average and
geometric operators for the selection of effective gas masks
4.2. Selection of an Effective Mask Based on the Proposed during the COVID-19 pandemic. The major inspiration of the
TOPSIS Technique. To show the importance as well as the current application is to pick out multipurpose gas masks
usefulness of the proposed model based on the PFHSS data, according to the TOPSIS technique for PFHSS to reduce the
18 Complexity

Input

Define the alternatives Appoint a team of experts Choose the set of attributes

Choose the sub attributes for each


parameter

Construction of decision matrices for alternatives according to experts


evaluation in form of PFHSNs in accordance with their sub attributes

Yes Identify the cost- No


type subattributes

Converts rating value of its into benefit-type


sub attributes by using normalization rule

Developed weighted decision matrix for each alternative by utilizing


PFHSWA operator or PFHSWG operator

To determine PIA and NIA Compute the correlation coefficient among weighted
compute the indices decision matrix and PIA and NIA, respectively

Ranking order of Choose the alternative with maxi- Compute the closeness
alternatives mum value of close coefficient coefficient

Figure 1: Flow chart of TOPSIS method under PFHSS Scenario.

spreading of coronavirus. The team of four experts X � 􏼈X1 , ℓ3 � quality} be a collection of attributes, and their corre-
X2 , X3 , X4 } having weights (0.2, 0.3, 0.4, 0.1)T evaluated the sponding subattributes are given as antistatic properties � ℓ1 �
rating of the different types of antivirus masks Q � 􏼈Q1 � 􏼈d11 � limited performance of protective clothingagainst the
KN95, Q2 � disposable medical mask, Q3 � surgical mask, Q4 flame spread d12 �Protection against infectious bacteria}, efficie
� home− made cloth mask}. The team of experts decides the ncy � ℓ2 � 􏼈d21 � Good breathability, d22 � Good filtering res
criteria (attributes) for the selection of antivirus mask as ults}, and quality � ℓ3 � 􏼈d31 � leakage ratio, d32 � reusability}.
follows: let L � 􏼈ℓ1 � anti − static properties, ℓ2 � efficiency, Let J′ � ℓ1 × ℓ2 × ℓ3 be a set of subattributes:

J′ � ℓ1 × ℓ2 × ℓ3 � 􏼈d11 , d12 􏼉 × 􏼈d21 , d22 􏼉 × 􏼈d31 , d32 􏼉


d , d , d 􏼁, d11 , d21 , d32 􏼁, d11 , d22 , d31 􏼁, d11 , d22 , d32 􏼁, (42)
� 􏼨 11 21 31 􏼩.
d12 , d21 , d31 􏼁, d12 , d21 , d32 􏼁, d12 , d22 , d31 􏼁, d12 , d22 , d32 􏼁

Let J′ � 􏽮d � ,d
� � � � � � � (1) Step 1. Develop the decision matrices for each al-
1 2 , d3 , d4 , d5 , d6 , d7 , d8 􏽯 be a set of all multi-
subattributes with weights (0.12, 0.18, 0.1, 0.15, 0.05, 0.22, ternative under defined multi-subattributes
0.08, 0.1)T . Each expert will evaluate the ratings of antivirus according to each decision-makers rating in terms of
masks in the form of PFHSNs for each subattribute of the PFHSNs.
considered parameters. The developed method to find the (2) Step 2. All criteria are of benefit types, so no need to
best alternative is as follows (Tables 1–4): normalize them.
Complexity 19

Table 1: Decision matrix for alternative Q(1) .


Q(1) �
d �
d �
d �
d �
d �
d �
d �
d
1 2 3 4 5 6 7 8

X1 (0.3, 0.8) (0.7, 0.3) (0.6, 0.7) (0.5, 0.4) (0.2, 0.4) (0.4, 0.6) (0.5, 0.8) (0.9, 0.3)
X2 (0.6, 0.7) (0.4, 0.6) (0.3, 0.4) (0.9, 0.2) (0.3, 0.8) (0.2, 0.4) (0.7, 0.5) (0.4, 0.5)
X3 (0.7, 0.3) (0.2, 0.5) (0.1, 0.6) (0.3, 0.4) (0.4, 0.6) (0.8, 0.4) (0.6, 0.7) (0.2, 0.5)
X4 (0.8, 0.4) (0.2, 0.9) (0.2, 0.4) (0.4, 0.6) (0.6, 0.5) (0.5, 0.6) (0.4, 0.5) (0.8, 0.3)

Table 2: Decision matrix for alternative Q(2) .


Q(2) �
d �
d �
d �
d �
d �
d �
d �
d
1 2 3 4 5 6 7 8

X1 (0.7, 0.6) (0.3, 0.4) (0.6, 0.5) (0.3, 0.9) (0.5, 0.4) (0.4, 0.6) (0.7, 0.5) (0.4, 0.8)
X2 (0.8, 0.5) (0.7, 0.4) (0.9, 0.2) (0.7, 0.4) (0.4, 0.5) (0.9, 0.3) (0.2, 0.7) (0.3, 0.8)
X3 (0.3, 0.7) (0.4, 0.5) (0.4, 0.8) (0.3, 0.4) (0.6, 0.7) (0.3, 0.4) (0.9, 0.2) (0.7, 0.2)
X4 (0.5, 0.4) (0.7, 0.6) (0.9, 0.3) (0.8, 0.5) (0.9, 0.2) (0.2, 0.4) (0.4, 0.6) (0.6, 0.5)

Table 3: Decision matrix for alternative Q(3) .


Q(3) �
d �
d �
d �
d �
d �
d �
d �
d
1 2 3 4 5 6 7 8

X1 (0.5, 0.7) (0.8, 0.5) (0.7, 0.4) (0.4, 0.3) (0.4, 0.9) (0.2, 0.4) (0.8, 0.4) (0.7, 0.5)
X2 (0.8, 0.5) (0.7, 0.4) (0.8, 0.5) (0.5, 0.2) (0.5, 0.7) (0.7, 0.5) (0.7, 0.6) (0.6, 0.4)
X3 (0.6, 0.8) (0.4, 0.5) (0.6, 0.5) (0.6, 0.4) (0.7, 0.5) (0.8, 0.4) (0.5, 0.8) (0.4, 0.5)
X4 (0.5, 0.7) (0.9, 0.3) (0.3, 0.5) (0.5, 0.7) (0.3, 0.5) (0.8, 0.5) (0.7, 0.5) (0.2, 0.5)

Table 4: Decision matrix for alternative Q(4) .


Q(4) �
d �
d �
d �
d �
d �
d �
d �
d
1 2 3 4 5 6 7 8

X1 (0.5, 0.7) (0.8, 0.5) (0.7, 0.4) (0.4, 0.3) (0.4, 0.9) (0.2, 0.4) (0.8, 0.4) (0.7, 0.5)
X2 (0.8, 0.5) (0.7, 0.4) (0.8, 0.5) (0.5, 0.2) (0.5, 0.7) (0.7, 0.5) (0.7, 0.6) (0.6, 0.4)
X3 (0.5, 0.4) (0.4, 0.8) (0.5, 0.6) (0.3, 0.4) (0.7, 0.6) (0.7, 0.5) (0.4, 0.9) (0.5, 0.2)
X4 (0.4, 0.7) (0.1, 0.3) (0.7, 0.5) (0.5, 0.8) (0.3, 0.5) (0.8, 0.3) (0.3, 0.5) (0.2, 0.5)

(3) Step 3. Construct the weighted decision matrix for (4) Step 4. Determine the PIA and NIA based on indices
(z) (z)
each alternative Q � (Lij )n×z by using Equation by using Equations (36) and (37):
(35) given in Tables 5–8.

(0.6867, 0.9915) (0.5691, 0. 9576) (0.6791, 0. 9762) (0.6694, 0.9848) (0.8241, 0.9840) (0.5021, 0.9778) (0.8073, 0.9889) (0.6791, 0.9762)



⎢ ⎤⎥⎥⎥


⎢ ⎥⎥⎥


⎢ (0.7200, 0. 9872) (0.6109, 0.9517) (0.7068, 0.9529) (0.7781, 0. 9301) (0.9070, 0.9821) (0.6509, 0.9553) (0.8033, 0.9915) (0.7068, 0.9933) ⎥⎥⎥⎥


⎢ ⎥⎥⎥
L+ � ⎢




⎥⎥⎥,
⎢ ⎥




⎢ (0.7443, 0.9438) (0.6422, 0. 9513) (0.7270, 0.9798) (0.7386, 0.9465) (0.8527, 0.9683) (0.4959, 0.9225) (0.7749, 0.9498) (0.7819, 0.9727) ⎥⎥⎥⎥⎥

⎢ ⎥⎥⎥

⎣ ⎦
(0.6328, 0. 9891) (0.4402, 0.9908) (0.6829, 0.9909) (0.5644, 0.9821) (0.8457, 0.9974) (0.4321, 0.9800) (0.7648, 0.9945) (0.6339, 0.9880)
(0.7559, 0.9835) (0.6572, 0.9754) (0.7920, 0.9862) (0.7048, 0.9645) (0.9028, 0.9909) (0.5987, 0.9699) (0.8491, 0.9854) (0.7920, 0.9862)



⎢ ⎥⎥⎥⎤


⎢ ⎥⎥⎥


⎢ (0.7599, 0.9754) (0.7038, 0.9728) (0.9085, 0.9333) (0.9009, 0.9301) (0.9070, 0.9897) (0.4661, 0.9236) (0.9089, 0.9621) (0.8671, 0.9645) ⎥⎥⎥⎥⎥


⎢ ⎥⎥⎥
− ⎢

L �⎢ ⎥⎥⎥.






⎢ (0.8678, 0.9257) (0.7379, 0.9513) (0.9083, 0.9529) (0.8376, 0.9465) (0.9190, 0.9898) (0.6897, 0.9408) (0.8509, 0.9781) (0.9083, 0.9377) ⎥⎥⎥⎥⎥


⎢ ⎥⎥⎥
⎣ ⎦
(0.7229, 0.9891) (0.5034, 0.9786) (0.7408, 0.9949) (0.6667, 0.9821) (0.9995, 0.9919) (0.6575, 0.9506) (0.7866, 0.9872) (0.7631, 0.9840)
(43)

(z) (z)
(5) Step 5. Compute the CC between Q and PIA L+ by (6) Step 6. Compute the CC between Q and NIA L−
using Equation (38), given p(1) � 0.99915, p(2) by using Equation (39), given q(1) � 0.99742, q(2)
� 0.99811, p(3) � 0.99746, and p(4) � 0.99787. � 0.99806, q(3) � 0.99870, and q(4) � 0.99870.
20

(1)
Table 5: Weighted decision matrix for Q .
Q(1) �
d �
d �
d �
d �
d �
d �
d �
d
1 2 3 4 5 6 7 8

X1 (0.7354, 0.9835) (0.5691, 0.9576) (0.6791, 0.9762) (0.6694, 0.9848) (0.8551, 0.9909) (0.5021, 0.9778) (0.8491, 0.9854) (0.6791, 0.9762)
X2 (0.7200, 0.9872) (0.7038, 0.9728) (0.7955, 0.9729) (0.9009, 0.9301) (0.8407, 0.9761) (0.5476, 0.9413) (0.8033, 0.9835) (0.8227, 0.9794)
X3 (0.7443, 0.9438) (0.6422, 0.9513) (0.7270, 0.9798) (0.7386, 0.9465) (0.9190, 0.9898) (0.4959, 0.9225) (0.8213, 0.9622) (0.7819, 0.9727)
X4 (0.6328, 0.9891) (0.5034, 0.9786) (0.6829, 0.9909) (0.6377, 0.9863) (0.8457, 0.9965) (0.4784, 0.9888) (0.7866, 0.9945) (0.6339, 0.9880)
Complexity
Complexity

(2)
Table 6: Weighted decision matrix for Q .
Q(2) �
d �
d �
d �
d �
d �
d �
d �
d
1 2 3 4 5 6 7 8

X1 (0.6867, 0.9878) (0.6178, 0.9676) (0.7920, 0.9862) (0.6694, 0.9794) (0.9028, 0.9909) (0.5987, 0.9778) (0.8073, 0.9889) (0.7920, 0.9862)
X2 (0.7599, 0.9754) (0.6109, 0.9517) (0.7068, 0.9529) (0.9009, 0.9301) (0.9070, 0.9897) (0.4661, 0.9236) (0.8033, 0.9915) (0.7068, 0.9933)
X3 (0.7849, 0.9513) (0.7379, 0.9513) (0.7819, 0.9911) (0.7386, 0.9465) (0.8842, 0.9762) (0.6415, 0.9225) (0.7749, 0.9498) (0.9083, 0.9377)
X4 (0.7229, 0.9891) (0.4402, 0.9908) (0.6829, 0.9880) (0.5644, 0.9821) (0.9995, 0.9919) (0.4321, 0.9800) (0.7866, 0.9959) (0.7631, 0.9931)
21
22

(3)
Table 7: Weighted decision matrix for Q .
Q(3) �
d �
d �
d �
d �
d �
d �
d �
d
1 2 3 4 5 6 7 8

X1 (0.7559, 0.9835) (0.6178, 0.9754) (0.7920, 0.9862) (0.6694, 0.9729) (0.8551, 0.9909) (0.5987, 0.9699) (0.8073, 0.9854) (0.7652, 0.9862)
X2 (0.7599, 0.9754) (0.6109, 0.9517) (0.7068, 0.9529) (0.9009, 0.9301) (0.9070, 0.9893) (0.4661, 0.9236) (0.8033, 0.9915) (0.7068, 0.9933)
X3 (0.8678, 0.9257) (0.6955, 0.9362) (0.9083, 0.9529) (0.7386, 0.9465) (0.8527, 0.9683) (0.6897, 0.9408) (0.8509, 0.9781) (0.8886, 0.9529)
X4 (0.7229, 0.9891) (0.5034, 0.9786) (0.7408, 0.9949) (0.6049, 0.9863) (0.8457, 0.9974) (0.6195, 0.9919) (0.7866, 0.9872) (0.7631, 0.9840)
Complexity
Complexity

(4)
Table 8: Weighted decision matrix Q .
Q(4) �
d �
d �
d �
d �
d �
d �
d �
d
1 2 3 4 5 6 7 8

X1 (0.6867, 0.9915) (0.6572, 0.9754) (0.7311, 0.9818) (0.7048, 0.9645) (0.8241, 0.9840) (0.5021, 0.9605) (0.8073, 0.9854) (0.7311, 0.9818)
X2 (0.7599, 0.9754) (0.6109, 0.9517) (0.9085, 0.9333) (0.7781, 0.9301) (0.9070, 0.9821) (0.6509, 0.9553) (0.9089, 0.9621) (0.8671, 0.9645)
X3 (0.8678, 0.9438) (0.7379, 0.9513) (0.8886, 0.9377) (0.8376, 0.9465) (0.8527, 0.9683) (0.6415, 0.9225) (0.8927, 0.9622) (0.8446, 0.9727)
X4 (0.7229, 0.9891) (0.4402, 0.9786) (0.7152, 0.9931) (0.6667, 0.9821) (0.8457, 0.9965) (0.6575, 0.9506) (0.7648, 0.9945) (0.6829, 0.9931)
23
24

Table 9: Comparative analysis between some existing techniques and the proposed approach.
Set Truthiness Falsity Attributes Subattributes Advantages
Zadeh [1] FS ✓ × ✓ × Deals uncertainty by using fuzzy interval
Zhang et al. [62] IFS ✓ ✓ ✓ × Deals uncertainty by using MD and NMD
Yager [7] PFS ✓ ✓ ✓ × Deals more uncertainty by using MD and NMD compared to IFS
Maji et al. [21] FSS ✓ × ✓ × Deals uncertainty by using fuzzy interval with their parameterization
Maji et al. [22] IFSS ✓ ✓ ✓ × Deals more uncertainty by using MD and NMD with their parameterization
Peng et al. [31] PFSS ✓ ✓ ✓ × Deals more uncertainty comparative to IFSS
Zulqarnain et al. [56] IFHSS ✓ ✓ ✓ ✓ Deals uncertainty of multi-subattributes by using MD and NMD
Proposed approach PFHSS ✓ ✓ ✓ ✓ Deals more uncertainty compared to IFHSS
Complexity
Complexity 25

(7) Step 7. Compute the closeness coefficient by using considered parameters cannot exceed one. When the sum of
Equation (40), R(1) � 0.75219, R(2) � 0.50653, R(3) MD and NMD of subattributes exceeds one such as
TF(d)� (δ) + JF(d)
� (δ) ≥ 1, then IFHSS cannot accommodate
� 0.33854, and R(4) � 0.37901.
the situation. To overcome the above limitations, we ex-
(8) Step 8. Choose the alternative with maximum tended the IFHSS to PFHSS by modifying the condition
closeness coefficient R(1) � 0.75219, so Q(1) is the TF(d)� (δ) + JF(d)
� (δ) ≤ 1 to (TF(d)
2
� (δ)) + (JF(d)
2
� (δ)) ≤ 1.
best alternative. Instead, the method we developed is an advanced technique
(9) Step 9. Analyzing the ranking of the alternatives, we that can handle alternatives with multiple subattribute in-
can see R(1) > R(2) > R(4) > R(3) , so the ranking formation listed in Table 9. On the contrary, the established
of the alternatives is Q(1) > Q(2) > Q(4) > Q(3) . method in this research deals with the uncertainty by using
the MD and NMD of the subattributes of alternatives.
5. Discussion and Comparative Analysis Therefore, the developed technique is more competent
compared to the existing methodologies and surely provides
In the following sections, we will discuss the effectiveness, better outcomes for decision-makers during the decision-
naivety, flexibility, and advantages of the proposed method making process.
and algorithms. We also organized a brief comparison of the
following: the recommended method and available methods.
6. Conclusion
The notion of PFHSS is used to solve the problem that
5.1. Superiority of the Proposed Method. Through this re-
contains insufficient information, ambiguity, and in-
search and comparative analysis, we have concluded that the
consistency by considering the degree of membership and
results of this method are more universal than that of the
nonmembership of the subattributes of considered at-
existing techniques. However, in the decision-making
tributes. Among them, we developed the CC and WCC for
process, compared with the existing decision-making
PFHSS and demonstrated their desirable characteristics.
methods, it contains more information to deal with the
Similarly, based on the developed correlation, an extended
uncertainty of the data. Besides, many hybrid structures of
TOPSIS method is introduced by considering the attribute
FSs have become special cases of PFHSSs, and some suitable
set with its corresponding subattributes and decision-
conditions have been added. Among them, the information
makers. To find PIA and NIA, we developed correlation
related to the object can be expressed more accurately and
indices. The closeness coefficients have been developed
empirically, so it is a convenient tool to combine inaccurate
based on the established TOPSIS technique to calculate
and uncertain information in the decision-making process.
the ranking of alternatives. Also, PFHSWA and PFHSWG
Therefore, our proposed method is effective, flexible, simple,
operators defined and introduced a decision-making
and superior to other hybrid structures of fuzzy sets.
approach based on the developed TOPSIS method. By
using the proposed TOPSIS method, a numerical illus-
5.2. Comparative Analysis. By using the technique of Zadeh tration to solve the MAGDM problem has been described.
[1], we can process the MD of the attributes, but this method In addition, a comparative analysis was carried out to
cannot deal with the NMD and subattributes of the con- verify the effectiveness and demonstration of the pre-
sidered parameters. Zhang et al. [62] dealt with uncertainty sented method. Finally, based on the obtained results, it
by using MD and NMD, but these theories also has some can be concluded that the proposed technique shows
limitations such as when the sum of MD and NMD exceeds higher stability and practicality for decision-makers in the
1, then these theories cannot handle the situation. To decision-making process. Future research will concen-
overcome such difficulties, Yager [7] developed the PFS, but trate on presenting ideas to decision-making complica-
PFS cannot deal with the parametric values of the alter- tions to several operators in the PFHSS environment.
natives. Maji et al. [21] established the FSS to handle the Several other structures, such as topological structures,
parameterization of the alternatives. The FSS has no in- algebraic structures, and ordered structures, can be de-
formation about the NMD of the alternative’s attributes, and veloped and investigated under considered environment.
it deals only with the MD of the attributes. On the contrary, This research article has pragmatic boundaries and can be
our presented PFHSS handles the uncertainty by utilizing immensely helpful in real-life dimensions, including
the MD and NMD. Maji et al. [22] proposed the IFSS to medical profession, pattern recognition, and economics.
accommodate the uncertainty by using MD and NMD of the We are sure this article will open new vistas for re-
attributes with their parameterization. The IFSS is unable to searchers in this field.
solve these problems, where the sum of MD and NMD
exceeds one. Peng et al. [31] developed the PFSS to handle Data Availability
the uncertainty competently compared to IFSS. When at-
tributes have their corresponding subattributes, then all the No data were used to support this study.
abovementioned theories fail to handle the situation. Zul-
qarnain et al. [56] presented the TOPSIS technique under Conflicts of Interest
the IFHSS environment to deal with uncertain problems by
using MD and NMD in which the sum of subattributes of the The authors declare that they have no conflicts of interest.
26 Complexity

Acknowledgments [17] Z. Ma and Z. Xu, “Symmetric Pythagorean fuzzy weighted


geometric/averaging operators and their application in
The author Rifaqat Ali would like to express his gratitude to multicriteria decision-making problems,” International
Deanship of Scientific Research at King Khalid University, Journal of Intelligent Systems, vol. 31, pp. 1–22, 2016.
Saudi Arabia, for providing funding under the research [18] D. Molodtsov, “Soft set theory-First results,” Computers &
grant number R.G.P. 2/71/41. Mathematics with Applications, vol. 37, no. 4-5, pp. 19–31,
1999.
[19] P. K. Maji, R. Biswas, and A. R. Roy, “Soft set theory,”
References Computers & Mathematics with Applications, vol. 45, no. 4-5,
pp. 555–562, 2003.
[1] L. A. Zadeh, “Fuzzy sets,” Information and Control, vol. 8, [20] P. K. Maji, A. R. Roy, and R. Biswas, “An application of soft
no. 3, pp. 338–353, 1965. sets in A decision making problem,” Computers & Mathe-
[2] K. T. Atanassov, “Intuitionistic fuzzy sets,” Fuzzy Sets and matics with Applications, vol. 44, no. 8-9, pp. 1077–1083, 2002.
Systems, vol. 20, no. 1, pp. 87–96, 1986. [21] P. K. Maji, R. Biswas, and A. R. Roy, “Fuzzy soft sets,” Journal
[3] H. Garg and G. Kaur, “Cubic intuitionistic fuzzy sets and its of Fuzzy Mathematics, vol. 9, pp. 589–602, 2001.
fundamental properties,” Journal of Multiple-Valued Logic & [22] P. K. Maji, R. Biswas, and A. Roy, “Intuitionistic fuzzy soft
Soft Computing, vol. 33, pp. 507–537, 2019. sets,” Journal of Fuzzy Mathematics, vol. 9, pp. 677–692, 2001.
[4] K. Atanassov and G. Gargov, “Interval valued intuitionistic [23] H. Garg and R. Arora, “Generalized and group-based gen-
fuzzy sets,” Fuzzy Sets and Systems, vol. 31, no. 3, pp. 343–349, eralized intuitionistic fuzzy soft sets with applications in
1989. decision-making,” Applied Intelligence, vol. 48, no. 2,
[5] H. Garg and K. Kumar, “Linguistic interval-valued Atanassov pp. 343–356, 2018.
intuitionistic fuzzy sets and their applications to group de- [24] H. Garg, “New ranking method for normal intuitionistic sets
cision making problems,” IEEE Transactions on Fuzzy Sys- under crisp, interval environments and its applications to
tems, vol. 27, no. 12, pp. 2302–2311, 2019. multiple attribute decision making process,” Complex & In-
[6] R. R. Yager, “Pythagorean fuzzy subsets,” in Procedings Joint telligent Systems, vol. 6, no. 3, pp. 559–571, 2020.
IFSA World Congress and NAFIPS Annual Meeting, pp. 57–61, [25] T. Mahmood and Z. Ali, “Entropy measure and TOPSIS
Edmonton, Canada, June 2013. method based on correlation coefficient using complex q-rung
[7] R. R. Yager, “Pythagorean membership grades in multicriteria orthopair fuzzy information and its application to multi-at-
decision making,” IEEE Transactions on Fuzzy Systems, tribute decision making,” Soft Computing, vol. 11, pp. 1–27,
vol. 22, no. 4, pp. 958–965, 2014. 2020.
[8] X. Zhang and Z. Xu, “Extension of TOPSIS to multiple criteria [26] H. Garg and R. Arora, “Maclaurin symmetric mean aggre-
decision making with Pythagorean fuzzy sets,” International gation operators based on t-norm operations for the dual
Journal of Intelligent Systems, vol. 29, no. 12, pp. 1061–1078, hesitant fuzzy soft set,” Journal of Ambient Intelligence and
2014. Humanized Computing, vol. 11, no. 1, pp. 375–410, 2020.
[9] G. Wei and M. Lu, “Pythagorean fuzzy power aggregation [27] R. Arora and H. Garg, “A robust correlation coefficient
operators in multiple attribute decision making,” In- measure of dual hesitant fuzzy soft sets and their application
ternational Journal of Intelligent Systems, vol. 33, no. 1, in decision making,” Engineering Applications of Artificial
pp. 169–186, 2018. Intelligence, vol. 72, pp. 80–92, 2018.
[10] L. Wang and N. Li, “Pythagorean fuzzy interaction power [28] R. Arora and H. Garg, “Group decision-making method based
Bonferroni mean aggregation operators in multiple attribute on prioritized linguistic intuitionistic fuzzy aggregation op-
decision making,” International Journal of Intelligent Systems, erators and its fundamental properties,” Journal of Compu-
vol. 35, no. 1, pp. 150–183, 2020. tational and Applied Mathematics, vol. 38, no. 2, pp. 1–36,
[11] X. Zhang, “A novel approach based on similarity measure for 2019.
Pythagorean fuzzy multiple criteria group decision making,” [29] H. Garg and R. Arora, “Generalized maclaurin symmetric
International Journal of Intelligent Systems, vol. 31, no. 6, mean aggregation operators based on Archimedean t-norm of
pp. 593–611, 2016. the intuitionistic fuzzy soft set information,” Artifcial In-
[12] H. Garg, “A new generalized Pythagorean fuzzy information telligence Review, pp. 1–41, Springer Verlag, Berlin, Germany,
aggregation using Einstein operations and its application to 2020.
decision making,” International Journal of Intelligent Systems, [30] H. Garg and R. AroraArora, “TOPSIS method based on
vol. 31, no. 9, pp. 886–920, 2016. correlation coefficient for solving decision-making problems
[13] X. Peng and Y. Yang, “Some results for Pythagorean fuzzy with intuitionistic fuzzy soft set information,” AIMS Math-
sets,” International Journal of Intelligent Systems, vol. 30, ematics, vol. 5, no. 4, pp. 2944–2966, 2020.
no. 11, pp. 1133–1160, 2015. [31] X. Peng, Y. Yang, and J. Song, “Pythagorean fuzzy soft set and
[14] H. Garg, “New logarithmic operational laws and their ag- its application,” Computer Engineering, vol. 41, pp. 224–229,
gregation operators for Pythagorean fuzzy set and their ap- 2015.
plications,” International Journal of Intelligent Systems, [32] T. M. Athira, S. J. John, and H. Garg, “A novel entropy
vol. 34, no. 1, p. 82, 2019. measure of Pythagorean fuzzy soft sets,” AIMS Mathematics,
[15] H. Gao, M. Lu, G. Wei, and Y. Wei, “Some novel Pythagorean vol. 5, no. 2, pp. 1050–1061, 2020.
fuzzy interaction aggregation operators in multiple attribute [33] T. M. Athira, S. J. John, and H. Garg, “Entropy and distance
decision making,” Fundamenta Informaticae, vol. 159, no. 4, measures of Pythagorean fuzzy soft sets and their applica-
pp. 385–428, 2018. tions,” Journal of Intelligent & Fuzzy Systems, vol. 37, no. 3,
[16] X. Peng and H. Yuan, “Fundamental properties of Pythag- pp. 4071–4084, 2019.
orean fuzzy aggregation operators,” Fundamenta Informati- [34] K. Naeem, M. Riaz, X. Peng, and D. Afzal, “Pythagorean fuzzy
cae, vol. 147, no. 4, pp. 415–446, 2016. soft MCGDM methods based on TOPSIS, VIKOR and
Complexity 27

aggregation operators,” Journal of Intelligent & Fuzzy Systems, method,” International Journal of Scientific & Technology
vol. 37, no. 5, pp. 6937–6957, 2019. Research, vol. 6, no. 10, pp. 126–132, 2017.
[35] M. Riaz, K. Naeem, and D. Afzal, “Pythagorean m-polar fuzzy [52] F. Smarandache, “Extension of soft set to hypersoft set, and
soft sets with TOPSIS method for MCGDM,” Punjab Uni- then to plithogenic hypersoft set,” Neutrosophic Sets and
versity Journal of Mathematics, vol. 52, no. 3, pp. 21–46, 2020a. Systems, vol. 22, pp. 168–170, 2018.
[36] M. Riaz, N. Khalid, and D. Afzal, “A similarity measure under [53] S. Rana, M. Qayyum, M. Saeed, and F. Smarandache, “Pli-
pythagorean fuzzy soft environment with applications,” thogenic fuzzy whole hypersoft set: construction of operators
Computational and Applied Mathematics, vol. 39, no. 4, and their application in frequency matrix multi attribute
pp. 1–17, 2020b. decision making Technique,” Neutrosophic Sets and Systems,
[37] C. L. Hwang and K. Yoon, Multiple Attribute Decision Making vol. 28, pp. 34–50, 2019.
Methods and Applications A State-Of-The-Art Survey, [54] R. M. Zulqarnain, X. L. Xin, M. Saqlain, and F. Smarandache,
Springer-Verlag Berlin Heidelberg, Berlin, Germany, 1981. “Generalized aggregate operators on neutrosophic hypersoft
[38] M. Zulqarnain, F. Dayan, and M. Saeed, “TOPSIS analysis for set,” Neutrosophic Sets and Systems, vol. 36, pp. 271–281, 2020.
the prediction of diabetes based on general characteristics of [55] S. Alkhazaleh, “Plithogenic Soft Set,” Neutrosophic Sets and
humans,” International Journal of Pharmaceutical Sciences Systems, vol. 33, pp. 256–274, 2020.
and Research, vol. 9, no. 7, pp. 2932–2939, 2018. [56] R. M. Zulqarnain, X. L. Xin, and M. Saeed, “Extension of
[39] A. Sarkar, “A TOPSIS method to evaluate the technologies,” TOPSIS method under intuitionistic fuzzy hypersoft envi-
International Journal of Quality & Reliability Management, ronment based on correlation coefficient and aggregation
operators to solve decision making problem,” AIMS Mathe-
vol. 31, no. 1, pp. 2–13, 2013.
matics, vol. 6, no. 3, pp. 2732–2755, 2020.
[40] R. M. Zulqarnain, S. Abdal, A. Maalik et al., “Application of
[57] Z. Yang, X. Li, H. Garg, and M. Qi, “Decision support al-
TOPSIS method in decision making via soft set,” Biomedical
gorithm for selecting an antivirus mask over COVID-19
Journal of Scientific & Technical Research, vol. 24, no. 3,
pandemic under spherical normal fuzzy environment,” In-
pp. 18208–18215, 2020.
ternational Journal of Environmental Research and Public
[41] R. M. Zulqarnain, S. Abdal, B. Ali et al., “Selection of medical
Health, vol. 17, no. 10, p. 3407, 2020.
clinic for disease diagnosis by using TOPSIS method,” In- [58] G. Shahzadi and M. Akram, “Group decision-making for the
ternational Journal of Pharmaceutical Sciences Review and selection of an antivirus mask under fermatean fuzzy soft
Research, vol. 61, no. 1, pp. 22–27, 2020. information,” Journal of Intelligent & Fuzzy Systems, vol. 40,
[42] C.-T. Chen, “Extensions of the TOPSIS for group decision- no. 1, p. 1401, 2021.
making under fuzzy environment,” Fuzzy Sets and Systems, [59] R. Arora and H. Garg, “Robust aggregation operators for
vol. 114, no. 1, pp. 1–9, 2000. multi-criteria decision-making with intuitionistic fuzzy soft
[43] R. M. Zulqarnain, X. L. Xin, M. Saeed, N. Ahmad, F. Dayan, set environment,” Scientia Iranica, vol. 25, no. 2, pp. 931–942,
and B. Ahmad, “Recruitment of medical staff in health de- 2018.
partment by using TOPSIS method,” International Journal of [60] A. Raza, M. Farman, A. Akgül, M. S. Iqbal, and A. Ahmad,
Pharmaceutical Sciences Review and Research, vol. 62, no. 1, “Simulation and numerical solution of fractional order Ebola
pp. 1–7, 2020. virus model with novel technique,” AIMS Bioengineering,
[44] R. M. Zulqarnain, M. Saeed, N. Ahmad, F. Dayan, and vol. 7, no. 4, pp. 194–207, 2020.
B. Ahmad, “Application of TOPSIS method for decision [61] A. Ahmed, B. Salam, B. Salam, M. Mohammad, A. AkgülH,
making,” International Journal of Scientific Research in and S. Khoshnaw, “Analysis coronavirus disease (COVID-19)
Mathematical and Statistical Sciences, vol. 7, no. 2, pp. 76–81, model using numerical approaches and logistic model,” Aims
2020. Bioengineering, vol. 7, no. 3, pp. 130–146, 2020.
[45] L. Dymova, P. Sevastjanov, and A. Tikhonenko, “An approach [62] H. M. Zhang, Z. S. Xu, and Q. Chen, “On clustering approach
to generalization of fuzzy TOPSIS method,” Information to intuitionistic fuzzy sets,” Control Decision, vol. 22,
Sciences, vol. 238, pp. 149–162, 2013. pp. 882–888, 2007.
[46] M. Zulqarnain and F. Dayan, “Choose best criteria for de-
cision making via fuzzy topsis method,” Mathematics and
Computer Science, vol. 2, no. 6, pp. 113–119, 2017.
[47] R. M. Zulqarnain, M. Saeed, B. Ali et al., “Generalized fuzzy
TOPSIS to solve multi-criteria decision-making problems,”
Journal of New Theory, vol. 32, pp. 40–50, 2020.
[48] A. Y. Yayla, A. Yildiz, and O. Ahmet, “Fuzzy TOPSIS method
in supplier selection and application in the garment industry,”
Fibres and Textiles in Eastern Europe, vol. 93, no. 4, pp. 20–23,
2012.
[49] R. M. Zulqarnain, X. L. Xin, M. Saeed, F. Smarandache, and
N. Ahmad, “Generalized neutrosophic TOPSIS to solve multi-
criteria decision-making problems,” Neutrosophic Sets and
Systems, vol. 38, pp. 276–292, 2020.
[50] A. Biswas and S. Kumar, An Integrated TOPSIS Approach to
MADM with Interval-Valued Intuitionistic Fuzzy Settings,
Advanced Computational and Communication Paradigms,
Springer, Berlin, Germany, 2018.
[51] M. Zulqarnain and F. Dayan, “Selection of best alternative for
an automotive company by intuitionistic fuzzy TOPSIS

You might also like