Research of supplier evaluation approach based on interval-valued intuitionistic fuzzy relations

Author(s):  
First A. Shujun Zhang
2021 ◽  
Vol 11 (16) ◽  
pp. 7668 ◽  
Author(s):  
Abdul Nasir ◽  
Naeem Jan ◽  
Abdu Gumaei ◽  
Sami Ullah Khan ◽  
Fahad R. Albogamy

Technology is rapidly advancing and every aspect of life is being digitalized. Since technology has made life much better and easier, so organizations, such as businesses, industries, companies and educational institutes, etc., are using it. Despite the many benefits of technology, several risks and serious threats, called cyberattacks, are associated with it. The method of neutralizing these cyberattacks is known as cybersecurity. Sometimes, there are uncertainties in recognizing a cyberattack and nullifying its effects using righteous cybersecurity. For that reason, this article introduces interval-valued complex intuitionistic fuzzy relations (IVCIFRs). For the first time in the theory of fuzzy sets, we investigated the relationships among different types of cybersecurity and the sources of cyberattacks. Moreover, the Hasse diagram for the interval-valued complex intuitionistic partial order set and relation is defined. The concepts of the Hasse diagram are used to inspect different cybersecurity techniques and practices. Then, using the properties of Hasse diagrams, the most beneficial technique is identified. Furthermore, the best possible selection of types of cybersecurity is made after putting some restrictions on the selection. Lastly, the advantages of the proposed methods are illuminated through comparison tests.


2020 ◽  
Vol 9 (5) ◽  
pp. 2583-2594
Author(s):  
R. Rajeswari ◽  
S. Ragha ◽  
N. Meenakumari

2021 ◽  
pp. 1-12
Author(s):  
Admi Nazra ◽  
Yudiantri Asdi ◽  
Sisri Wahyuni ◽  
Hafizah Ramadhani ◽  
Zulvera

This paper aims to extend the Interval-valued Intuitionistic Hesitant Fuzzy Set to a Generalized Interval-valued Hesitant Intuitionistic Fuzzy Soft Set (GIVHIFSS). Definition of a GIVHIFSS and some of their operations are defined, and some of their properties are studied. In these GIVHIFSSs, the authors have defined complement, null, and absolute. Soft binary operations like operations union, intersection, a subset are also defined. Here is also verified De Morgan’s laws and the algebraic structure of GIVHIFSSs. Finally, by using the comparison table, a different approach to GIVHIFSS based decision-making is presented.


Sign in / Sign up

Export Citation Format

Share Document