Next Article in Journal
Applications of the Symmetric Quantum-Difference Operator for New Subclasses of Meromorphic Functions
Next Article in Special Issue
Fuzzy Soft Sets and Decision Making in Ideal Nutrition
Previous Article in Journal
Construction-Monitoring Analysis of a Symmetrical Rigid Frame Tied Steel Box Arch Bridge in Southwest China Based on Segmental Assembly Technique
Previous Article in Special Issue
Cosine Similarity Measures of (m, n)-Rung Orthopair Fuzzy Sets and Their Applications in Plant Leaf Disease Classification
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Choquet Integral-Based Aczel–Alsina Aggregation Operators for Interval-Valued Intuitionistic Fuzzy Information and Their Application to Human Activity Recognition

1
School of Mathematics, Thapar Institute of Engineering & Technology (Deemed University), Patiala 147004, Punjab, India
2
Institute of Research and Development, Duy Tan University, Da Nang 550000, Vietnam
3
Department of Mathematics, Faculty of Basic and Applied Sciences, Air University, PAF Complex E-9, Islamabad 44000, Pakistan
4
School of Computer Science, Duy Tan University, Da Nang 550000, Vietnam
5
Department of Mathematics, College of Sciences, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh 11671, Saudi Arabia
6
Department of Mathematics, College of Science and Arts, Qassim University, Al-Badaya 51951, Saudi Arabia
7
Department of Operations and Management Research, Faculty of Graduate Studies for Statistical Research, Cairo University, Giza 12613, Egypt
*
Authors to whom correspondence should be addressed.
Symmetry 2023, 15(7), 1438; https://doi.org/10.3390/sym15071438
Submission received: 12 June 2023 / Revised: 5 July 2023 / Accepted: 11 July 2023 / Published: 18 July 2023
(This article belongs to the Special Issue Research on Fuzzy Logic and Mathematics with Applications II)

Abstract

:
Human activity recognition (HAR) is the process of interpreting human activities with the help of electronic devices such as computer and machine version technology. Humans can be explained or clarified as gestures, behavior, and activities that are recorded by sensors. In this manuscript, we concentrate on studying the problem of HAR; for this, we use the proposed theory of Aczel and Alsina, such as Aczel–Alsina (AA) norms, and the derived theory of Choquet, such as the Choquet integral in the presence of Atanassov interval-valued intuitionistic fuzzy (AIVIF) set theory for evaluating the novel concept of AIVIF Choquet integral AA averaging (AIVIFC-IAAA), AIVIF Choquet integral AA ordered averaging (AIVIFC-IAAOA), AIVIF Choquet integral AA hybrid averaging (AIVIFC-IAAHA), AIVIF Choquet integral AA geometric (AIVIFC-IAAG), AIVIF Choquet integral AA ordered geometric (AIVIFC-IAAOG), and AIVIF Choquet integral AA hybrid geometric (AIVIFC-IAAHG) operators. Many essential characteristics of the presented techniques are shown, and we also identify their properties with some results. Additionally, we take advantage of the above techniques to produce a technique to evaluate the HAR multiattribute decision-making complications. We derive a functional model for HAR problems to justify the evaluated approaches and to demonstrate their supremacy and practicality. Finally, we conduct a comparison between the proposed and prevailing techniques for the legitimacy of the invented methodologies.

1. Introduction

Human activity recognition (HAR) [1] is a diverse and universal field of investigation and attention that engages the classification and identification of human activities in the presence of information arranged from different sources, such as computers, the Internet, cameras, sensors, and wearable devices [2,3]. The main theme of HAR is to detect and find human actions, activities, or behaviors in order to know and employ human actions in various contexts directly or automatically. Mostly, it involves working in pattern recognition procedures and machine learning to evaluate and explore the information arranged from sensors or other sources. The arranged information will be given in the shape of motion, orientation, acceleration, audio, video, or physiological signals [4,5]. The practical applications of HAR are diverse and many and can be discovered in various fields, for instance, healthcare, sports and fitness, human–computer interactions, surveillance and security, and ambient-assisted living. Overall, HAR plays a valuable and essential role in considering human performance, qualifying context-conscious systems, and smoothing relevance that needs automated interpretation and reaction to social activities [6,7].
A decision-making technique [8] or procedure signifies a logical approach or technique used to find data, address decisions, and talk about decisions in many complicated situations. In practical applications, managing the symmetry or asymmetry that exists among several sources of information is the main objective of decision-making procedures. There are various decision-making procedures, each with its benefits and advantages, for instance, rational decision making; strength, weakness, opportunities, and threats (SWOT) analysis; cost-benefit analysis; the decision matrix; Pareto analysis; and the Delphi technique [9,10]. These techniques have been utilized by different scholars in various fields in the presence of classical information. But, during the decision-making procedure, we lose a lot of information because of classical information due to limited opinions, such as zero or one. To improve the range of classical set theory, the major concept of fuzzy set (FS) was addressed by Zadeh [11]. The numerical form of the truth grade in FS is given by Γ I : X 0 , 1 , where Γ I ν 0 , 1 , ν X . FS theory and classical set theory have the same structure but different features because the range of FS theory is wider compared to crisp set theory. FS theory also has many limitations and restrictions because, in some cases, the experts are faced with two types of information, such as truth and falsity, supporting and opposing, and membership and non-membership. For FS theory, it is not possible to evaluate such a kind of problem; therefore, Atanassov [12] explained the novel concept of intuitionistic FS (IFS) that allows for the show of uncertainty and hesitation in various decision-making techniques. Derived by Atanassov in 1983, IFS aims to depict not only the truth grade but also the falsity of information and neutrality or hesitation between these two data types. In traditional FS, an element can represent the grade of truth between unit intervals. In IFS, however, an element is explained by two types of data called the truth grade “ Γ I ν ” and the falsity grade “ Λ I ν ”, with 0 Γ I ν + Λ I ν 1 . In many research articles, FS theory has been employed in the form of combination, modification, and utilization, such as a tribute to Zadeh’s extension principle [13], an extension principle of Zadeh’s and fuzzy numbers [14], fuzzy superior Mandelbrot sets [15], continuous fuzzy differential equations [16], Cauchy fuzzy differential equations [17], numerical solutions of fuzzy differential and integral equations [18,19], the analysis of the stability of fuzzy differential equations [20], and the analysis and classification of the rise and fall of fuzzy fidelity in Europe [21].
IFS has a lot of applications in the shape of modification, utilization, and combination with other information; for instance, Atanassov [22] invented the interval-valued IFS (IVIFS), Ejegwa and Agbetayo [23] exposed the similarity and distance measures, Tripathi et al. [24] evaluated the divergence measures, Sharma et al. [25] presented the analytical hierarchical process, Rani and Garg [26] derived the trigonometric operators, Hezam et al. [27] examined the MAIRCA techniques, Gong and Wang [28] evaluated different types of inequalities, Jana and Pal [29] presented the decision-making problems, Garg et al. [30] derived the Schweizer–Sklar prioritized operators, Mahmood et al. [31] exposed the power aggregation operators, and finally, Shi et al. [32] examined the Aczel–Alsina power operators.
A lot of scholars have been working on fuzzy set theory, and many of them have utilized different types of operators, techniques, and measures based on fuzzy set theory and its extensions. Additionally, the Choquet integral (CI) operator is one of them, and it was invented by Choquet [33] in 1954. Choquet integral operators have been utilized in fuzzy set theory; for instance, Meyer and Roubens [34] derived Choquet operators based on fuzzy numbers. Moreover, Tan and Chen [35] evaluated CI operators for IFS theory, where the weighted CI operators for IFS theory were exposed by Xu [36]. All these techniques were derived based on algebraic norms. Here, we also talk about the modified version of algebraic norms, such as the Aczel–Alsina norms, which were derived by Aczel and Alsina [37] in 1982. Further, the Aczel–Alsina norms have received a lot of attention from different scholars; for example, Senapati et al. [38] evaluated the Aczel–Alsina averaging operators for IFS theory. Senapati et al. [39] also examined the Aczel–Alsina geometric operators for IFS theory. Ahmad et al. [40] derived the Aczel–Alsina operators for intuitionistic fuzzy rough set theory. Furthermore, Xu [41] exposed the averaging operators for AIFSs, Xu and Yager [42] derived the geometric operators for AIFSs, and Wang et al. [43] presented the aggregation operators for AIVIFSs. Wang and Liu [44] exposed the geometric operators for AIVIFSs. Garg et al. [45] derived the CI operators for AIVIFSs, Meng et al. [46] proposed the geometric CI operators for AIVIFSs, Senapati et al. [47] evaluated the Aczel–Alsina operators for AIVIFSs, and Senapati et al. [48] exposed the Aczel–Alsina geometric operators for AIVIFSs. From the brief analysis above, we noticed that every operator has its own merits, but they have some limitations as well. For instance, the existing operational laws are restricted in nature, and also consider the feature that all the interacting features are independent of each other.
In this paper, we utilize the concept of AIVIFS to model the uncertainties of information and the generalized operational laws based on Aczel–Alsina to determine the membership and nonmembership degrees of AIVIFNs. Also, we state the generalized aggregation operators based on these laws and hence state an MADM algorithm to solve the decision-making problems. The applicability of the proposed algorithm is demonstrated through a numerical example.
The proposed operational laws based on Aczel–Alsina norms are considered as the generalization of several existing laws. In the current study, we considered the AIVIFNs to represent the uncertainties in the data, while the Choquet integral-based Aczel–Alsina norms were used to define their basic operational laws. The Aczel–Alsina explored the theory of triangular norms in the form of Aczel–Alsina triangular norms. Aczel–Alsina triangular norms are robust tools utilized to overcome the loss of information during the aggregation of information. The major advantage of defining these operational laws is that it generalizes the algebraic and Einstein t-norm operations. Another advantage of the proposed method is the utilization of the Choquet integral (CI) to consider an inter-relationship between the attribute information. This CI considers the fuzzy measures during the measurement using ordered position. Finally, based on these proposed laws, we summarized the various generalized aggregation operators, namely, weighted averaging or geometric. The theory of Aczel–Alsina Choquet integral operators has many benefits compared to existing operators because the averaging operators, geometric operators, Choquet integral operators, averaging Aczel–Alsina operators, and geometric Aczel–Alsina operators are the special cases of the proposed theory. Also, the proposed Aczel–Alsina averaging and geometric aggregation operators based on FSs, IFSs, interval-valued FSs, and interval-valued IFSs are the special cases of the derived theory. In addition to this, the derived Aczel–Alsina Choquet integral-based aggregation operators under the existing theories are also considered as a special case.
In a nutshell, the main objectives of this work are listed below:
(1)
To define some weighted operators using Choquet integral Aczel–Alsina norm operations;
(2)
To investigate the basic fundamental features of the proposed operators;
(3)
To develop an MADM algorithm based on the stated operators to address the decision-making problems;
(4)
To illustrate the stated algorithm, using a numerical example related to HAR problems to demonstrate its supremacy and practicality;
(5)
To conduct a comparison between the proposed and prevailing techniques for the legitimacy of the invented methodologies.
The rest of the manuscript is summarized as follows: In Section 2, we recall the idea of fuzzy measure (FM), the Choquet integral (CI), Aczel–Alsina norms and their special cases, AIVIFS, and their operational laws. In Section 3, we derive the AIVIFC-IAAA, AIVIFC-IAAOA, AIVIFC-IAAHA, AIVIFC-IAAG, AIVIFC-IAAOG, and AIVIFC-IAAHG operators. Many essential characteristics of the presented techniques are shown, and we also identify their properties with some results. In Section 4, we take advantage of the above techniques to produce a technique to evaluate the HAR-MADM complications. In Section 5, we derive a functional model for HAR problems to justify the evaluated approaches and to demonstrate their supremacy and practicality. In Section 6, we conduct a comparison between the proposed and prevailing techniques for the legitimacy of the invented methodologies. Some final and concluding remarks are stated in Section 7.

2. Preliminaries

In this section, we revise the FM, CI, Aczel–Alsina norms, AIVIFS, and their operational laws, as this information is very valuable and beneficial for us to evaluate the proposed techniques. Furthermore, all the symbols and their meanings that are used in this manuscript are stated in Table 1.
Definition 1.
[33] A function : P X 0 , 1 is called a fuzzy measure if  is justified by the following conditions:
ϕ = 0 , X = 1 , B o u n d a r y   C o n d i t i o n
I f   Ξ ϱ , B P X   a n d   Ξ ϱ B , t h e n   Ξ ϱ B , M o n o t o n i c i t y
where   is a universal set,  P X  is a power set, and  ϕ  represents an empty set.
Definition 2.
[33] Let be a fuzzy measure, and for any  H , J P X , we can define
H J = H + J + λ ( H J )
where  λ  represents the interaction between the parameters. The basis features of   are additive, subadditive, supermodular, and submodular.
Definition 3.
[33] A positive real-valued function R on fixed set  X with a fuzzy measure  . The discrete CI of  R based on  is demonstrated by:
C R = φ = 1 z R φ Ξ ϱ φ Ξ ϱ φ + 1  
Notice that the  . is stated the permutation on  X , such as  R 1 R 2 R z , where  Ξ ϱ φ = φ = 1,2 , , z , Ξ ϱ z + 1 = ϕ .
Definition 4.
[31] A mapping T T N : 0 , 1 × 0 , 1 0 , 1 is called a t-norm if:
  • T T N Ξ , Θ = T T N Θ , Ξ ;
  • T T N Ξ ,   T T N Ξ , Θ = T T N T T N Ξ , Ξ , Θ ;
  • If  Ξ Ξ and  Θ Θ , then  T T N Ξ , Θ T T N Ξ , Θ ;
  • T T N Θ . 1 = Θ .
Definition 5.
[31] A mapping S T C N : 0 , 1 × 0 , 1 0 , 1 is called a t-conorm if:
  • S T C N Ξ ,   Θ = S T C N Θ , Ξ ;
  • S T C N Ξ ,   S T C N Ξ ,   Θ = S T C N S T C N Ξ ,   Ξ , Θ ;
  • If  Ξ Ξ  and  Θ Θ , then  S T C N Ξ ,   Θ S T C N Ξ ,   Θ ;
  • S T C N Θ . 1 = Θ .
Definition 6.
[37] The mathematical and theoretical shape of an Aczel–Alsina t-norm and t-conorm is stated by:
T T N ϖ Ξ ,   Θ = T T N D Ξ ,   Θ ϖ = 0 m i n Ξ ,   Θ ϖ = e l o g Ξ ϖ + l o g Θ ϖ 1 ϖ o t h e r w i s e          
S T C N ϖ Ξ ,   Θ = S T C N D Ξ ,   Θ ϖ = 0 m a x Ξ ,   Θ ϖ = 1 e log 1 Ξ ϖ + log 1 Θ ϖ 1 ϖ o t h e r w i s e        
where  ϖ > 1 ,   T T N D and  S T C N D are represented by the discrete t-norm and t-conorm, such as
T T N D Ξ ,   Θ = Ξ Θ = 1 Θ Ξ = 1 0 o t h e r w i s e  
S T C N D Ξ ,   Θ = Ξ Θ = 0 Θ Ξ = 0 1 o t h e r w i s e  
Notice that  Ξ , Θ 0 , 1 .
Definition 7.
[22] The expression of the AIVIFS I i f is constructed by:
I i f = Γ I ν , Γ I + ν , Λ I ν , Λ I + ν : ν X
The information in the pair  Γ I ν , Γ I + ν , Λ I ν , Λ I + ν  represents the membership and nonmembership degrees with a suitable condition:  0 Γ I + ν + Λ I + ν 1 . Moreover, we construct the neutral/refusal information, such as  η I ν = η I ν , η I + ν = 1 Γ I + ν + Λ I + ν , 1 Γ I ν + Λ I ν .
Finally, the AIVIFV is constructed in the form of
I φ i f = Γ φ I , Γ φ I + , Λ φ I , Λ φ I + , φ = 1,2 , , z
Definition 8.
[22] For any two AIVIFVs, the basic operational laws are stated as
I 1 i f I 2 i f = Γ 1 I + Γ 2 I Γ 1 I Γ 2 I , Γ 1 I + + Γ 2 I + Γ 1 I + Γ 2 I + , Λ 1 I Λ 2 I , Λ 1 I + Λ 2 I +  
I 1 i f I 2 i f = Γ 1 I Γ 2 I , Γ 1 I + Γ 2 I + , Λ 1 I + Λ 2 I Λ 1 I Λ 2 I , Λ 1 I + + Λ 2 I + Λ 1 I + Λ 2 I +  
ζ I φ i f = 1 1 Γ φ I ζ , 1 1 Γ φ I + ζ , Λ φ I ζ , Λ φ I + ζ  
I φ i f ζ = Γ φ I ζ , Γ φ I + ζ , 1 1 Λ φ I ζ , 1 1 Λ φ I + ζ
Using Equations (9)–(12) and using the idea in Equation (3), Garg et al. [45] exposed the following theory:
A I V I F C I I 1 i f , I 2 i f , , I z i f = I 1 i f Ξ ϱ 1 Ξ ϱ 2 I 2 i f Ξ ϱ 2 Ξ ϱ 3 I z i f Ξ ϱ z Ξ ϱ z + 1 = φ = 1 z I φ i f Ξ ϱ φ Ξ ϱ φ + 1 = 1 φ = 1 z 1 Γ φ I Ξ ϱ φ Ξ ϱ φ + 1 , 1 φ = 1 z 1 Γ φ I + Ξ ϱ φ Ξ ϱ φ + 1 , φ = 1 z Λ φ I Ξ ϱ φ Ξ ϱ φ + 1 , φ = 1 z Λ φ I + Ξ ϱ φ Ξ ϱ φ + 1      
Our aim is to construct the CI in consideration of the Aczel–Alsina t-norm and t-conorm instead of the algebraic norms; therefore, for this, we used the proposed work of Senapati et al. [47] for the AIVIFVs. The operational laws are defined as the following:
Definition 9.
For AIVIFVs  I 1 i f = Γ 1 I , Γ 1 I + , Λ 1 I , Λ 1 I +  and  I 2 i f = Γ 2 I , Γ 2 I + , Λ 2 I , Λ 2 I + and ζ > 0 be a real number, then
I 1 i f I 2 i f = 1 e log 1 Γ 1 I ϖ + log 1 Γ 2 I ϖ 1 ϖ , 1 e log 1 Γ 1 I + ϖ + log 1 Γ 2 I + ϖ 1 ϖ , e l o g Λ 1 I ϖ + l o g Λ 2 I ϖ 1 ϖ , e l o g Λ 1 I + ϖ + l o g Λ 2 I + ϖ 1 ϖ      
I 1 i f I 2 i f = e log Γ 1 I ϖ + log Γ 2 I ϖ 1 ϖ , e log Γ 1 I + ϖ + log Γ 2 I + ϖ 1 ϖ , e log 1 Λ 1 I ϖ + log 1 Λ 2 I ϖ 1 ϖ , e log 1 Λ 1 I + ϖ + log 1 Λ 2 I + ϖ 1 ϖ                  
ζ I 1 i f = 1 e ζ log 1 Γ 1 I ϖ 1 ϖ , 1 e ζ log 1 Γ 1 I + ϖ 1 ϖ , e ζ l o g Λ 1 I ϖ 1 ϖ , e ζ l o g Λ 1 I + ϖ 1 ϖ      
I φ i f ζ = e ζ log Γ 1 I ϖ 1 ϖ , e ζ log Γ 1 I + ϖ 1 ϖ , 1 e ζ log 1 Λ 1 I ϖ 1 ϖ , 1 e ζ log 1 Λ 1 I + ϖ 1 ϖ        
Definition 10.
For any AIVIFV  I φ i f = Γ φ I , Γ φ I + , Λ φ I , Λ φ I + , the score and accuracy functions are stated as:
S V I φ i f = 1 2 Γ φ I + Γ φ I + Λ φ I Λ φ I + 1,1    
A V I φ i f = 1 2 Γ φ I + Γ φ I + + Λ φ I + Λ φ I + 0 , 1      
Definition 11.
To compare the two different AIVIFNs  I 1 i f   and  I 2 i f , an order comparison between them is stated below:
(a)
If  S V I 1 i f > S V I 2 i f , then  I 1 i f > I 2 i f ,
(b)
If  S V I 1 i f = S V I 2 i f , and  A V I 1 i f > A V I 2 i f , then  I 1 i f > I 2 i f .

3. Proposed C-IAA Aggregation Operators for AIVIFSs

In this section, we aim to evaluate the theory of AIVIFC-IAAA, AIVIFC-IAAOA, AIVIFC-IAAHA, AIVIFC-IAAG, AIVIFC-IAAOG, and AIVIFC-IAAHG operators. Many essential characteristics of the presented techniques are shown, and we also identify their properties with some results. Throughout this paper, we used the family of AIVIFSs I φ i f = Γ φ I , Γ φ I + , Λ φ I , Λ φ I + , φ = 1,2 , , z .
Definition 12.
For the family of AIVIFSs  I φ i f , an AIVIFC-IAAA operator is demonstrated by:
A I V I F C I A A A I 1 i f , I 2 i f , , I z i f = I 1 i f Ξ ϱ 1 Ξ ϱ 2 I 2 i f Ξ ϱ 2 Ξ ϱ 3 I z i f Ξ ϱ z Ξ ϱ z + 1 = φ = 1 z I φ i f Ξ ϱ φ Ξ ϱ φ + 1 = φ = 1 z I φ i f Ξ ϱ φ Ξ ϱ φ + 1    
Theorem 1.
For the family of AIVIFSs, the aggregated value by the A I V I F C I A A A operator is also AIVIFV and given as
A I V I F C I A A A I 1 i f , I 2 i f , , I z i f = 1 e φ = 1 z Ξ ϱ φ Ξ ϱ φ + 1 log 1 Γ φ I ϖ 1 ϖ , 1 e φ = 1 z Ξ ϱ φ Ξ ϱ φ + 1 log 1 Γ φ I + ϖ 1 ϖ , e φ = 1 z Ξ ϱ φ Ξ ϱ φ + 1 log Λ φ I ϖ 1 ϖ , e φ = 1 z Ξ ϱ φ Ξ ϱ φ + 1 log Λ φ I + ϖ 1 ϖ    
The proof of Theorem 1 is given in Appendix A.
To demonstrate the functioning of the proposed AIVIFC-IAAA operator, we consider four AIVIFNs as
I 1 i f = 0.40 ,   0.41 , 0.30 ,   0.31 ;                 I 2 i f = 0.50 ,   0.51 , 0.10 ,                 0.11
I 3 i f = 0.59 ,   0.60 , 0.39 ,   0.40 ;                     I 4 i f = 0.70 ,   0.71 , 0.20 ,   0.21  
To aggregate these numbers, we utilize Equation (21) and obtain the aggregated number as
A I V I F C I A A A I 1 i f , I 2 i f , I 3 i f , I 4 i f = 0.3386,0.3463 , 0.5035,0.5156 .
Further, the proposed operator  A I V I F C I A A A  satisfies certain properties, which are listed below.
Property 1.
When  I φ i f = I i f = Γ I , Γ I + , Λ I , Λ I + , φ = 1,2 , , z , thus
A I V I F C I A A A I 1 i f , I 2 i f , , I z i f = I i f  
The proof of Property 1 is given in Appendix B.
Property 2.
When  I φ i f I φ i f , φ = 1,2 , , z , then
A I V I F C I A A A I 1 i f , I 2 i f , , I z i f A I V I F C I A A A I 1 i f , I 2 i f , , I z i f    
The proof of Property 2 is given in Appendix C.
Property 3.
When  I φ = min φ Γ φ I , min φ Γ φ I + , max φ Λ φ I , max φ Λ φ I +  and  I φ + = max φ Γ φ I , max φ Γ φ I + , min φ Λ φ I , min φ Λ φ I + , φ = 1,2 , , z , thus
I φ A I V I F C I A A A I 1 i f , I 2 i f , , I z i f I φ +        
The proof of Property 3 is given in Appendix D.
Definition 13.
An AIVIFC-IAAOA operator is demonstrated by:
I V I F C I A A O A I 1 i f , I 2 i f , , I z i f = I o 1 i f Ξ ϱ 1 Ξ ϱ 2 I o 2 i f Ξ ϱ 2 Ξ ϱ 3 I o z i f Ξ ϱ z Ξ ϱ z + 1 = φ = 1 z I o φ i f Ξ ϱ φ Ξ ϱ φ + 1 = φ = 1 z I o φ i f Ξ ϱ φ Ξ ϱ φ + 1
With a dominant condition o φ o φ 1  and with the data in Equation (18), we find their orders.
Theorem 2.
For the family of AIVIFSs, the aggregated value by the  A I V I F C I A A O A  operator is also AIVIFV and given as
A I V I F C I A A O A I 1 i f , I 2 i f , , I z i f = 1 e φ = 1 z Ξ ϱ φ Ξ ϱ φ + 1 log 1 Γ o φ I ϖ 1 ϖ , 1 e φ = 1 z Ξ ϱ φ Ξ ϱ φ + 1 log 1 Γ o φ I + ϖ 1 ϖ , e φ = 1 z Ξ ϱ φ Ξ ϱ φ + 1 log Λ o φ I ϖ 1 ϖ , e φ = 1 z Ξ ϱ φ Ξ ϱ φ + 1 log Λ o φ I + ϖ 1 ϖ    
Proof. 
Similar to the proof of Theorem 1. □
Property 4.
When  I φ i f = I i f = Γ I , Γ I + , Λ I , Λ I + , φ = 1,2 , , z , thus
A I V I F C I A A O A I 1 i f , I 2 i f , , I z i f = I i f      
Proof. 
Similar to the proof of Property 1.□
Property 5.
When  I φ i f I φ i f , φ = 1,2 , , z , then
A I V I F C I A A O A I 1 i f , I 2 i f , , I z i f A I V I F C I A A O A I 1 i f , I 2 i f , , I z i f    
Proof. 
Similar to the proof of Property 2.□
Property 6.
When  I φ = min φ Γ φ I , min φ Γ φ I + , max φ Λ φ I , max φ Λ φ I +  and  I φ + = max φ Γ φ I , max φ Γ φ I + , min φ Λ φ I , min φ Λ φ I + , φ = 1,2 , , z , thus
I φ A I V I F C I A A O A I 1 i f , I 2 i f , , I z i f I φ +      
Proof. 
Similar to the proof of Property 3. □
Definition 14.
An AIVIFC-IAAHA operator is demonstrated by:
A I V I F C I A A H A I 1 i f , I 2 i f , , I z i f = I o 1 Ξ ϱ 1 Ξ ϱ 2 I o 2 Ξ ϱ 2 Ξ ϱ 3 I o z Ξ ϱ z Ξ ϱ z + 1 = φ = 1 z I o φ Ξ ϱ φ Ξ ϱ φ + 1 = φ = 1 z I o φ Ξ ϱ φ Ξ ϱ φ + 1          
With a dominant condition  o φ o φ 1  and with the data in Equation (18), we find their order with  I o φ = z w φ I φ i f , φ = 1,2 , , z , where  w φ  represents the weight vector with the rule  φ = 1 z w φ = 1 .
Theorem 3.
For the family of AIVIFSs, the aggregated value by the A I V I F C I A A H A operator is also AIVIFV and given as
A I V I F C I A A H A I 1 i f , I 2 i f , , I z i f = 1 e φ = 1 z Ξ ϱ φ Ξ ϱ φ + 1 log 1 Γ o φ I ϖ 1 ϖ , 1 e φ = 1 z Ξ ϱ φ Ξ ϱ φ + 1 log 1 Γ o φ I + ϖ 1 ϖ , e φ = 1 z Ξ ϱ φ Ξ ϱ φ + 1 log Λ o φ I ϖ 1 ϖ , e φ = 1 z Ξ ϱ φ Ξ ϱ φ + 1 log Λ o φ I + ϖ 1 ϖ        
Property 7.
When  I φ i f = I i f = Γ I , Γ I + , Λ I , Λ I + , φ = 1,2 , , z , thus
A I V I F C I A A H A I 1 i f , I 2 i f , , I z i f = I i f    
Property 8.
When  I φ i f I φ i f , φ = 1,2 , , z , then
A I V I F C I A A H A I 1 i f , I 2 i f , , I z i f A I V I F C I A A H A I 1 i f , I 2 i f , , I z i f    
Property 9.
When  I φ = min φ Γ φ I , min φ Γ φ I + , max φ Λ φ I , max φ Λ φ I +  and  I φ + = max φ Γ φ I , max φ Γ φ I + , max φ Γ φ I , max φ Γ φ I + , φ = 1,2 , , z , thus
I φ A I V I F C I A A H A I 1 i f , I 2 i f , , I z i f I φ +              
Definition 15.
An AIVIFC-IAAG operator is demonstrated by:
A I V I F C I A A G I 1 i f , I 2 i f , , I z i f                              = I 1 i f Ξ ϱ 1 Ξ ϱ 2 I 2 i f Ξ ϱ 2 Ξ ϱ 3 I z i f Ξ ϱ z Ξ ϱ z + 1                        = φ = 1 z I φ i f Ξ ϱ φ Ξ ϱ φ + 1                        = φ = 1 z I φ i f Ξ ϱ φ Ξ ϱ φ + 1    
Theorem 4.
For the family of AIVIFSs, the aggregated value by the  A I V I F C I A A G  operator is also AIVIFV and given as
A I V I F C I A A G I 1 i f , I 2 i f , , I z i f = e φ = 1 z Ξ ϱ φ Ξ ϱ φ + 1 log Γ φ I ϖ 1 ϖ , e φ = 1 z Ξ ϱ φ Ξ ϱ φ + 1 log Γ φ I + ϖ 1 ϖ , 1 e φ = 1 z Ξ ϱ φ Ξ ϱ φ + 1 log 1 Λ φ I ϖ 1 ϖ , 1 e φ = 1 z Ξ ϱ φ Ξ ϱ φ + 1 log 1 Λ φ I + ϖ 1 ϖ        
The proof of Theorem 4 is given in Appendix E.
To demonstrate the functioning of the proposed AIVIFC-IAAG operator, we consider four AIVIFNs:
I 1 i f = 0.40 ,   0.41 , 0.30 ,   0.31   ;                 I 2 i f = 0.50 ,   0.51 , 0.10 ,             0.11
I 3 i f = 0.59 ,   0.60 , 0.39 ,   0.40   ;   I 4 i f = 0.70 ,   0.71 , 0.20 ,   0.21
To aggregate these numbers, we utilize Equation (36) and obtain the aggregated number
A I V I F C I A A G I 1 i f , I 2 i f , I 3 i f , I 4 i f = 0.7763,0.7823 ,       0.1326,0.1326 .
Further, the proposed operator  A I V I F C I A A G  satisfies certain properties, which are listed below.
Property 10.
When  I φ i f = I i f = Γ I , Γ I + , Λ I , Λ I + , φ = 1,2 , , z , thus
A I V I F C I A A G I 1 i f , I 2 i f , , I z i f = I i f
Property 11.
When  I φ i f I φ i f , φ = 1,2 , , z , then
A I V I F C I A A G I 1 i f , I 2 i f , , I z i f A I V I F C I A A G I 1 i f , I 2 i f , , I z i f        
Property 12.
When  I φ = min φ Γ φ I , min φ Γ φ I + , max φ Λ φ I , max φ Λ φ I +  and  I φ + = max φ Γ φ I , max φ Γ φ I + , min φ Λ φ I , min φ Λ φ I + , φ = 1,2 , , z , thus
I φ A I V I F C I A A G I 1 i f , I 2 i f , , I z i f I φ +      
Definition 16.
An AIVIFC-IAAOA operator is demonstrated by:
A I V I F C I A A O G I 1 i f , I 2 i f , , I z i f = I o 1 i f Ξ ϱ 1 Ξ ϱ 2 I o 2 i f Ξ ϱ 2 Ξ ϱ 3 I o z i f Ξ ϱ z Ξ ϱ z + 1 = φ = 1 z I o φ i f Ξ ϱ φ Ξ ϱ φ + 1 = φ = 1 z I o φ i f Ξ ϱ φ Ξ ϱ φ + 1      
With a dominant condition  o φ o φ 1  and with the data in Equation (18), we find their orders.
Theorem 5.
For the family of AIVIFSs, the aggregated value by the  A I V I F C I A A O G  operator is also AIVIFV and given as
A I V I F C I A A O G I 1 i f , I 2 i f , , I z i f = e φ = 1 z Ξ ϱ φ Ξ ϱ φ + 1 log Γ o φ I ϖ 1 ϖ , e φ = 1 z Ξ ϱ φ Ξ ϱ φ + 1 log Γ o φ I + ϖ 1 ϖ , 1 e φ = 1 z Ξ ϱ φ Ξ ϱ φ + 1 log 1 Λ o φ I ϖ 1 ϖ , 1 e φ = 1 z Ξ ϱ φ Ξ ϱ φ + 1 log 1 Λ o φ I + ϖ 1 ϖ    
Property 13.
When  I φ i f = I i f = Γ I , Γ I + , Λ I , Λ I + , φ = 1,2 , , z , thus
A I V I F C I A A O G I 1 i f , I 2 i f , , I z i f = I i f      
Property 14.
When  I φ i f I φ i f , φ = 1,2 , , z , then
A I V I F C I A A O G I 1 i f , I 2 i f , , I z i f A I V I F C I A A O G I 1 i f , I 2 i f , , I z i f      
Property 15.
When  I φ = min φ Γ φ I , min φ Γ φ I + , max φ Λ φ I , max φ Λ φ I +  and  I φ + = max φ Γ φ I , max φ Γ φ I + , min φ Λ φ I , min φ Λ φ I + , φ = 1,2 , , z , thus
I φ A I V I F C I A A O G I 1 i f , I 2 i f , , I z i f I φ +    
Definition 17.
An AIVIFC-IAAHG operator is demonstrated by:
A I V I F C I A A H G I 1 i f , I 2 i f , , I z i f = I o 1 Ξ ϱ 1 Ξ ϱ 2 I o 2 Ξ ϱ 2 Ξ ϱ 3 I o z Ξ ϱ z Ξ ϱ z + 1 = φ = 1 z I o φ Ξ ϱ φ Ξ ϱ φ + 1 = φ = 1 z I o φ Ξ ϱ φ Ξ ϱ φ + 1            
With a dominant condition  o φ o φ 1  and with the data in Equation (18), we find their order with  I o φ = z w φ I φ i f , φ = 1,2 , , z , where  w φ  represents the weight vector with the rule  φ = 1 z w φ = 1 .
Theorem 6.
For the family of AIVIFSs, the aggregated value by the  A I V I F C I A A H G  operator is also AIVIFV and given as
A I V I F C I A A H G I 1 i f , I 2 i f , , I z i f = e φ = 1 z Ξ ϱ φ Ξ ϱ φ + 1 log Γ o φ I ϖ 1 ϖ , e φ = 1 z Ξ ϱ φ Ξ ϱ φ + 1 log Γ o φ I + ϖ 1 ϖ , 1 e φ = 1 z Ξ ϱ φ Ξ ϱ φ + 1 log 1 Λ o φ I ϖ 1 ϖ , 1 e φ = 1 z Ξ ϱ φ Ξ ϱ φ + 1 log 1 Λ o φ I + ϖ 1 ϖ  
Property 16.
When  I φ i f = I i f = Γ I , Γ I + , Λ I , Λ I + , φ = 1,2 , , z , thus
A I V I F C I A A H G I 1 i f , I 2 i f , , I z i f = I i f    
Property 17.
When  I φ i f I φ i f , φ = 1,2 , , z , then
A I V I F C I A A H G I 1 i f , I 2 i f , , I z i f A I V I F C I A A H G I 1 i f , I 2 i f , , I z i f
Property 18.
When  I φ = min φ Γ φ I , min φ Γ φ I + , max φ Λ φ I , max φ Λ φ I +  and  I φ + = max φ Γ φ I , max φ Γ φ I + , min φ Λ φ I , min φ Λ φ I + , φ = 1,2 , , z , thus
I φ A I V I F C I A A H G I 1 i f , I 2 i f , , I z i f I φ +

4. Proposed MADM Technique

The multi-attribute decision-making (MADM) technique is a procedure or technique, which is especially used, for evaluating the optimal decision in the presence of multiple criteria or attributes. It is used in situations when an expert or decision-maker needs to find the best one among a finite number of alternatives or possibilities.
In MADM, each alternative contains many criteria or attributes, and these attributes can be qualitative or quantitative, which are very important for the procedure of the decision-making technique. Every example of attributes or criteria could contain cost, quality, time, environmental impact, and many others, whereas every MADM procedure contains the following major themes, such as the identification of criteria, the weighting of criteria, the evaluation of alternatives, the aggregation of sources, and finally, the selection of the best decision. Therefore, to evaluate some real-life problems, first, we need to develop the procedure of the MADM technique. For this, we have a collection of alternatives, such as I 1 i f , I 2 i f , , I z i f , where each alternative covers the finite family of attributes or criteria, such as I 1 c r , I 2 c r , , I y c r with w φ , where w φ represents the weight vector with the rule φ = 1 z w φ = 1 . Further, we aim to assign AIVIFN to each attribute in every alternative, where the information in the pair Γ I ν , Γ I + ν , Λ I ν , Λ I + ν represents the membership and non-membership degrees with a suitable condition:  0 Γ I + ν + Λ I + ν 1 . Moreover, we constructed the neutral/refusal information, such as  η I ν = η I ν , η I + ν = 1 Γ I ν + Λ I ν , 1 Γ I + ν + Λ I + ν . Finally, the AIVIFV was constructed in the shape I φ i f = Γ φ I , Γ φ I + , Λ φ I , Λ φ I + , φ = 1,2 , , z . All the information was arranged in the shape of a matrix, and then for evaluating the data in the matrix, we aimed to construct the procedure of the MADM technique; therefore, we have the following procedure:
Step 1: First, we arrange the AIVIFSs in the form of the matrix, but during the collection of information, we will face two types of data, such as benefit and cost types of information. These attributes show the positive and negative features of each alternative. For both kinds of data, we have the following rules, for instance:
Rule 1: (Benefit type of data.) We are not required to normalize the arranged data in the matrix;
Rule 2: (Cost type of data.) We are required to normalize the arranged data in a matrix; for instance,
N = Γ φ I , Γ φ I + , Λ φ I , Λ φ I + f o r   B Λ φ I , Λ φ I + , Γ φ I , Γ φ I + f o r   C
where B and C represent the benefit and cost types of data.
Step 2: After normalization (if necessary), we aggregate the arranged information based on the proposed AIVIFC-IAAA operator and AIVIFC-IAAG operator, such as
A I V I F C I A A A I 1 i f , I 2 i f , , I z i f = 1 e φ = 1 z Ξ ϱ φ Ξ ϱ φ + 1 log 1 Γ φ I ϖ 1 ϖ , 1 e φ = 1 z Ξ ϱ φ Ξ ϱ φ + 1 log 1 Γ φ I + ϖ 1 ϖ , e φ = 1 z Ξ ϱ φ Ξ ϱ φ + 1 log Λ φ I ϖ 1 ϖ , e φ = 1 z Ξ ϱ φ Ξ ϱ φ + 1 log Λ φ I + ϖ 1 ϖ
A I V I F C I A A G I 1 i f , I 2 i f , , I z i f = e φ = 1 z Ξ ϱ φ Ξ ϱ φ + 1 log Γ φ I ϖ 1 ϖ , e φ = 1 z Ξ ϱ φ Ξ ϱ φ + 1 log Γ φ I + ϖ 1 ϖ , 1 e φ = 1 z Ξ ϱ φ Ξ ϱ φ + 1 log 1 Λ φ I ϖ 1 ϖ , 1 e φ = 1 z Ξ ϱ φ Ξ ϱ φ + 1 log 1 Λ φ I + ϖ 1 ϖ
Step 3: After aggregating the normalized data, we evaluate their score values (if the score function has failed, then we will use the accuracy function), which are given in Equations (18) and (19);
Step 4: Finally, we derive the ranking results of each alternative based on their score or accuracy values and try to examine the optimal or best decision.
After the successful implementation of the MADM technique for evaluating the problems, we aimed to choose some real-life applications and tried to resolve them with the help of the proposed four techniques.

5. Numerical Example (Human Activity Recognition)

The HAR technique is used for the identification or classification of human activities based on the analysis of sensor information. There are many kinds of HAR techniques, which are used in the field, varying on the concern, problems, and their requirements. The major theme of this application is to point out the best HAR technique among the five best HAR techniques, which are represented by a family of five alternatives, whose major and brief analyses are stated below:
Rule-based Systems  I 1 i f : To identify certain actions, rule-based systems employ predetermined rules or heuristics. These regulations are frequently founded on professional expertise or industry-specific standards. A rule-based system, for instance, may employ thresholds on accelerometer measurements to identify movements like walking or running.
Machine Learning-based Approaches  I 2 i f : The identification of human behavior makes extensive use of machine learning techniques. These methods use labeled datasets for model training to discover patterns and connections between sensor data and actions. Typical machine learning algorithms include the following:
(1)
Supervised learning;
(2)
Unsupervised learning;
(3)
Deep learning.
Sensor Fusions I 3 i f : To increase the precision of activity detection, sensor fusion combines data from various sensors. The system may record a more complete description of human actions by combining data from many sensors, including accelerometers, gyroscopes, and magnetometers.
Hidden Markov Models (HMMs)  I 4 i f : HMMs are popular probabilistic models for recognizing activities. To estimate the most likely sequence of activities given the observed sensor data, they model the temporal relationships of the activities and employ the Viterbi algorithm or forward–backward algorithm.
Dynamic Time Warping (DTW)  I 5 i f : DTW is a method for aligning two-time series in a nonlinear warping manner and measuring how similar they are. It is ideal for activity detection tasks, as it is frequently utilized for contrasting and identifying temporal patterns in sensor data.
Under the presence of the above five alternatives, we aimed to find the best one based on their features, which were used as attributes or criteria, such as I 1 c r : data collection, I 2 c r : preprocessing and data extraction, I 3 c r : classification and evaluations, and I 4 c r : monitoring and facilitating. Then, the steps of the proposed approach, as shown below, were implemented, to find the best alternative(s).
Step 1: First, we arrange the AIVIFSs in the form of the matrix (see Table 2), but during the collection of information, we will face two types of data, such as benefit and cost types information. These attributes show the positive and negative features of each alternative. For both kinds of data, we have the following rules, for instance:
Rule 1: (Benefit type of data.) We are not required to normalize the arranged data in the matrix;
Rule 2: (Cost type of data.) We are required to normalize the arranged data in a matrix; for instance,
N = Γ φ I , Γ φ I + , Λ φ I , Λ φ I + f o r   B Λ φ I , Λ φ I + , Γ φ I , Γ φ I + f o r   C
where B and C represent the benefit and cost types of data. But we used Rule 1 because we had positive types of criteria.
Table 2. AIVIF decision matrix.
Table 2. AIVIF decision matrix.
I 1 c r I 2 c r I 3 c r I 4 c r
I 1 i f 0.4 , 0.41 , 0.3 , 0.31 0.5 , 0.51 , 0.1 , 0.11 0.59 , 0.6 , 0.39 , 0.4 0.7 , 0.71 , 0.2 , 0.21
I 2 i f 0.4 , 0.41 , 0.2 , 0.21 0.3 , 0.31 , 0.1 , 0.11 0.5 , 0.51 , 0.3 , 0.31 0.1 , 0.11 , 0.2 , 0.21
I 3 i f 0.5 , 0.51 , 0.3 , 0.31 0.4 , 0.41 , 0.3 , 0.31 0.3 , 0.31 , 0.2 , 0.21 0.2 , 0.21 , 0.1 , 0.11
I 4 i f 0.4 , 0.41 , 0.2 , 0.21 0.6 , 0.61 , 0.3 , 0.31 0.5 , 0.51 , 0.4 , 0.41 0.5 , 0.51 , 0.2 , 0.21
I 5 i f 0.1 , 0.11 , 0.2 , 0.21 0.2 , 0.21 , 0.2 , 0.21 0.3 , 0.31 , 0.2 , 0.21 0.6 , 0.61 , 0.1 , 0.11
Step 2: After normalization (if necessary), we aggregate the arranged information based on the proposed AIVIFC-IAAA operator and AIVIFC-IAAG operator (see Table 3);
Step 3: After aggregating the normalized data, we evaluate their score values (if the score function has failed, then we will use the accuracy function), which are given in Equations (18) and (19) (see Table 4);
Step 4: Finally, we derive the ranking results of each alternative based on their score or accuracy values and try to examine the optimal or best decision (see Table 5).
According to the analysis in Table 5, we noticed that all the proposed techniques obtained the same ranking results, where the best decision is I 1 i f (a rule-based system). After the successful evaluation of the problem of HAR with the help of the MADM technique, we further aimed to compare the proposed operators with some existing operators to show the supremacy and validity of the proposed approaches.

6. Comparative Analysis

This section shows the supremacy and validity of the proposed techniques by comparing them with some prevailing methods or techniques. Comparative analysis is the best way to prove the advantages and disadvantages between the proposed and prevailing methods. Therefore, in this section, we aim to compare the proposed techniques with some prevailing methods. For this, we have the following ideas: Wang et al. [43] presented the aggregation operators for AIVIFSs, Wang and Liu [44] exposed the geometric operators for AIVIFSs, Garg et al. [45] derived the CI operators for AIVIFSs, Meng et al. [46] proposed the geometric CI operators for AIVIFSs, Senapati et al. [47] evaluated the Aczel–Alsina operators for AIVIFSs, and Senapati et al. [48] exposed the Aczel–Alsina geometric operators for AIVIFSs. Therefore, to consider the data in Table 2, the comparison is listed in Table 6.
According to the analysis in Table 6, we noticed that all the proposed techniques and some existing techniques obtained the same ranking results, where the best decision is I 1 i f (a rule-based system). From this table, we observe that Wang et al. [43] presented the aggregation operators for AIVIFSs, which can easily evaluate the data in Table 2; the ranking result is stated in the shape I 1 i f > I 4 i f > I 3 i f > I 2 i f > I 5 i f , hence the best decision is I 1 i f . On the other hand, Wang and Liu [44] exposed the geometric operators for AIVIFSs, which can easily evaluate the data in Table 2; the ranking result is stated in the shape: I 1 i f > I 4 i f > I 3 i f > I 2 i f > I 5 i f , hence the best decision is I 1 i f . Garg et al. [45] derived the CI operators for AIVIFSs, which can easily evaluate the data in Table 2; the ranking result is stated in the shape I 1 i f > I 4 i f > I 3 i f > I 2 i f > I 5 i f , hence the best decision is I 1 i f . Meng et al. [46] proposed the geometric CI operators for AIVIFSs, which can easily evaluate the data in Table 2; the ranking result is stated in the shape I 1 i f > I 4 i f > I 3 i f > I 2 i f > I 5 i f , hence the best decision is I 1 i f . Senapati et al. [47] evaluated the Aczel–Alsina operators for AIVIFSs, which can easily evaluate the data in Table 2; the ranking result is stated in the shape I 1 i f > I 4 i f > I 3 i f > I 2 i f > I 5 i f , hence the best decision is I 1 i f . Senapati et al. [48] exposed the Aczel–Alsina geometric operators for AIVIFSs, which can easily evaluate the data in Table 2; the ranking result is stated in the shape I 1 i f > I 4 i f > I 3 i f > I 2 i f > I 5 i f , hence the best decision is I 1 i f . All these existing approaches are based on algebraic norm operations; however, the proposed operators are based on the Choquet integral-based Aczel–Alsina (AA) norms. The Aczel–Alsina explored the theory of triangular norms in the form of Aczel–Alsina triangular norms. Aczel–Alsina triangular norms are robust tools utilized to overcome the loss of information during the aggregation of information. The major advantage of defining these operational laws is that it generalizes the algebraic and Einstein t-norm operations. Another advantage of the proposed method is the utilization of the Choquet integral (CI) to consider an inter-relationship between the attribute information. This CI considers the fuzzy measures during the measurement using ordered position. Therefore, the proposed techniques are more reliable and more general than existing techniques, such as the theory of Wang et al. [43], Wang and Liu [44], Garg et al. [45], Meng et al. [46], Senapati et al. [47], and Senapati et al. [48]. Hence, the proposed technique is superior to existing methodologies.

7. Conclusions

In this paper, we addressed the algorithm related to the decision-making problem using the concept of the aggregation operators under an AIVIFS environment. In this work, the uncertainties present in the information were handled with the help of AIVIFNs, and the Choquet integral-based operators were defined by incorporating the Aczel–Alsina norm operations. The defined operational laws based on Aczel–Alsina norms are considered as the generalization of several existing laws. The key merit of such operational laws is that they generalize the algebraic and Einstein t-norm operations. Also, the Choquet integral was utilized in the study to consider an inter-relationship between the attribute information. This CI considers the fuzzy measures during the measurement using ordered position. Based on these CI and operational laws, we stated some weighted averaging and geometric operators, namely, AIVIFC-IAAA, AIVIFC-IAAG, AIVIFC-IAAOA, AIVIFC-IAAOG, AIVIF AIFC-IAAHA, and AIVIFC-IAAHG operators to aggregate the information of the AIVIFNs. Finally, we addressed the MADM algorithm, and the applicability of the proposed algorithm was demonstrated through a numerical example. A comparative analysis with some of the existing studies shows the feasibility of the proposed algorithm.
In the future, on the one hand, the proposed method has the potential to be extended to several areas, such as classification-based strategy [49], heterogeneous preference information [50], consensus [51], and addressing multicriteria problems in large-scale group decision making [52]. Further, the presented idea has been extended to different extensions of the fuzzy sets, such as the T-spherical fuzzy set, the multiplicative set, the neutrosophic set, etc. On the other hand, we shall extend our approach to analyze different applications related to evidence theory [53,54], support vector machines [55], supply chains [56], and different tools of artificial intelligence, such as optimization or neural networks, etc. [57].

Author Contributions

Conceptualization, T. and H.G.; methodology, T., H.G. and G.N.N.: investigation, T. and H.G.; writing—original draft preparation, T. and H.G.; writing—review and editing, T. and H.G.; supervision, T. and H.G.; project administration, T.A. and H.A.E.-W.K.; funding acquisition, T.A. All authors have read and agreed to the published version of the manuscript.

Funding

Princess Nourah bint Abdulrahman University Researchers Supporting project number (PNURSP2023R404), Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia.

Data Availability Statement

No data were used to support this study.

Acknowledgments

Princess Nourah bint Abdulrahman University Researchers Supporting Project number (PNURSP2023R404), Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

Proof. 
Considering the procedure of mathematical induction, we proved that the data in Equation (21) also hold for all positive integers. For this, we have the following procedure:
Step 1: Let z = 2 , and we have
I 1 i f Ξ ϱ 1 Ξ ϱ 1 + 1 = I 1 i f Ξ ϱ 1 Ξ ϱ 2                                              = 1 e Ξ ϱ 1 Ξ ϱ 2 log 1 Γ 1 I ϖ 1 ϖ , 1 e Ξ ϱ 1 Ξ ϱ 2 log 1 Γ 1 I + ϖ 1 ϖ , e Ξ ϱ 1 Ξ ϱ 2 l o g Λ 1 I ϖ 1 ϖ , e Ξ ϱ 1 Ξ ϱ 2 l o g Λ 1 I + ϖ 1 ϖ
I 2 i f Ξ ϱ 2 Ξ ϱ 2 + 1 = I 2 i f Ξ ϱ 2 Ξ ϱ 3                                              = 1 e Ξ ϱ 2 Ξ ϱ 3 log 1 Γ 2 I ϖ 1 ϖ , 1 e Ξ ϱ 2 Ξ ϱ 3 log 1 Γ 2 I + ϖ 1 ϖ , e Ξ ϱ 2 Ξ ϱ 3 l o g Λ 2 I ϖ 1 ϖ , e Ξ ϱ 2 Ξ ϱ 3 l o g Λ 2 I + ϖ 1 ϖ
Then, we have
A I V I F C I A A A I 1 i f , I 2 i f = I 1 i f Ξ ϱ 1 Ξ ϱ 2 I 2 i f Ξ ϱ 2 Ξ ϱ 3 = 1 e Ξ ϱ 1 Ξ ϱ 2 log 1 Γ 1 I ϖ 1 ϖ , 1 e Ξ ϱ 1 Ξ ϱ 2 log 1 Γ 1 I + ϖ 1 ϖ , e Ξ ϱ 1 Ξ ϱ 2 l o g Λ 1 I ϖ 1 ϖ , e Ξ ϱ 1 Ξ ϱ 2 l o g Λ 1 I + ϖ 1 ϖ 1 e Ξ ϱ 2 Ξ ϱ 3 log 1 Γ 2 I ϖ 1 ϖ , 1 e Ξ ϱ 2 Ξ ϱ 3 log 1 Γ 2 I + ϖ 1 ϖ , e Ξ ϱ 2 Ξ ϱ 3 l o g Λ 2 I ϖ 1 ϖ , e Ξ ϱ 2 Ξ ϱ 3 l o g Λ 2 I + ϖ 1 ϖ = 1 e φ = 1 2 Ξ ϱ φ Ξ ϱ φ + 1 log 1 Γ φ I ϖ 1 ϖ , 1 e φ = 1 2 Ξ ϱ φ Ξ ϱ φ + 1 log 1 Γ φ I + ϖ 1 ϖ , e φ = 1 2 Ξ ϱ φ Ξ ϱ φ + 1 log Λ φ I ϖ 1 ϖ , e φ = 1 2 Ξ ϱ φ Ξ ϱ φ + 1 log Λ φ I ϖ 1 ϖ
Information in Equation (21) is fully suitable for z = 2 . Additionally, we are letting the data in Equation (21) also be suitable for z = q , and then we have
A I V I F C I A A A I 1 i f , I 2 i f , , I q i f = φ = 1 q I φ i f Ξ ϱ φ Ξ ϱ φ + 1                                       = 1 e φ = 1 q Ξ ϱ φ Ξ ϱ φ + 1 log 1 Γ φ I ϖ 1 ϖ , 1 e φ = 1 q Ξ ϱ φ Ξ ϱ φ + 1 log 1 Γ φ I + ϖ 1 ϖ , e φ = 1 q Ξ ϱ φ Ξ ϱ φ + 1 log Λ φ I ϖ 1 ϖ , e φ = 1 q Ξ ϱ φ Ξ ϱ φ + 1 log Λ φ I + ϖ 1 ϖ
Thus, we prove that the data in Equation (21) are also suitable for z = q + 1 , and we have
I V I F C I A A A I 1 i f , I 2 i f , , I q i f , I q + 1 i f                              = φ = 1 q I φ i f Ξ ϱ φ Ξ ϱ φ + 1 I q + 1 i f Ξ ϱ q + 1 Ξ ϱ q + 2 = 1 e φ = 1 q Ξ ϱ φ Ξ ϱ φ + 1 log 1 Γ φ I ϖ 1 ϖ , 1 e φ = 1 q Ξ ϱ φ Ξ ϱ φ + 1 log 1 Γ φ I + ϖ 1 ϖ , e φ = 1 q Ξ ϱ φ Ξ ϱ φ + 1 log Λ φ I ϖ 1 ϖ , e φ = 1 q Ξ ϱ φ Ξ ϱ φ + 1 log Λ φ I + ϖ 1 ϖ 1 e Ξ ϱ q + 1 Ξ ϱ q + 2 log 1 Γ q + 1 I ϖ 1 ϖ , 1 e Ξ ϱ q + 1 Ξ ϱ q + 2 log 1 Γ q + 1 I + ϖ 1 ϖ , e Ξ ϱ q + 1 Ξ ϱ q + 2 l o g Λ q + 1 I ϖ 1 ϖ , e Ξ ϱ q + 1 Ξ ϱ q + 2 l o g Λ q + 1 I + ϖ 1 ϖ = 1 e φ = 1 q + 1 Ξ ϱ φ Ξ ϱ φ + 1 log 1 Γ φ I ϖ 1 ϖ , 1 e φ = 1 q + 1 Ξ ϱ φ Ξ ϱ φ + 1 log 1 Γ φ I + ϖ 1 ϖ , e φ = 1 q + 1 Ξ ϱ φ Ξ ϱ φ + 1 log Λ φ I ϖ 1 ϖ , e φ = 1 q + 1 Ξ ϱ φ Ξ ϱ φ + 1 log Λ φ I + ϖ 1 ϖ
Hence, we evaluated that the data in Equation (21) are suitable for all positive values of z . □

Appendix B

Proof. 
Consider I φ i f = I i f = Γ I , Γ I + , Λ I , Λ I + , φ = 1,2 , , z , and then using the data in Equation (21), we have
A I V I F C I A A A I 1 i f , I 2 i f , , I z i f = 1 e φ = 1 z Ξ ϱ φ Ξ ϱ φ + 1 log 1 Γ φ I ϖ 1 ϖ , 1 e φ = 1 z Ξ ϱ φ Ξ ϱ φ + 1 log 1 Γ φ I + ϖ 1 ϖ , e φ = 1 z Ξ ϱ φ Ξ ϱ φ + 1 log Λ φ I ϖ 1 ϖ , e φ = 1 z Ξ ϱ φ Ξ ϱ φ + 1 log Λ φ I + ϖ 1 ϖ = 1 e φ = 1 z Ξ ϱ Ξ ϱ 1 log 1 Γ I ϖ 1 ϖ , 1 e φ = 1 z Ξ ϱ Ξ ϱ 1 log 1 Γ I + ϖ 1 ϖ , e φ = 1 z Ξ ϱ Ξ ϱ 1 log Λ I ϖ 1 ϖ , e φ = 1 z Ξ ϱ Ξ ϱ 1 log Λ I + ϖ 1 ϖ = 1 e log 1 Γ I ϖ 1 ϖ , 1 e log 1 Γ I + ϖ 1 ϖ , e log Λ I ϖ 1 ϖ , e log Λ I + ϖ 1 ϖ = 1 e log 1 Γ I , 1 e log 1 Γ I + , e log Λ I , e log Λ I + = 1 e log 1 Γ I , 1 e log 1 Γ I + , e log Λ I , e log Λ I + = 1 1 Γ I , 1 1 Γ I + , Λ I , Λ I + = Γ I , Γ I + , Λ I , Λ I + = I i f .
Hence, we successfully proved our required results
A I V I F C I A A A I 1 i f , I 2 i f , , I z i f = I i f .

Appendix C

Proof. 
Suppose I φ i f I φ i f , then we have Γ φ I Γ φ I , Γ φ I + Γ φ I + and Λ φ I Λ φ I , Λ φ I + Λ φ I + ; thus,
Γ φ I Γ φ I 1 Γ φ I 1 Γ φ I log 1 Γ φ I log 1 Γ φ I log 1 Γ φ I ϖ log 1 Γ φ I ϖ φ = 1 z Ξ ϱ φ Ξ ϱ φ + 1 log 1 Γ φ I ϖ            φ = 1 z Ξ ϱ φ Ξ ϱ φ + 1 log 1 Γ φ I ϖ φ = 1 z Ξ ϱ φ Ξ ϱ φ + 1 log 1 Γ φ I ϖ 1 ϖ            φ = 1 z Ξ ϱ φ Ξ ϱ φ + 1 log 1 Γ φ I ϖ 1 ϖ e φ = 1 z Ξ ϱ φ Ξ ϱ φ + 1 log 1 Γ φ I ϖ 1 ϖ e φ = 1 z Ξ ϱ φ Ξ ϱ φ + 1 log 1 Γ φ I ϖ 1 ϖ e φ = 1 z Ξ ϱ φ Ξ ϱ φ + 1 log 1 Γ φ I ϖ 1 ϖ e φ = 1 z Ξ ϱ φ Ξ ϱ φ + 1 log 1 Γ φ I ϖ 1 ϖ 1 e φ = 1 z Ξ ϱ φ Ξ ϱ φ + 1 log 1 Γ φ I ϖ 1 ϖ                1 e φ = 1 z Ξ ϱ φ Ξ ϱ φ + 1 log 1 Γ φ I ϖ 1 ϖ 1 e φ = 1 z Ξ ϱ φ Ξ ϱ φ + 1 log 1 Γ φ I + ϖ 1 ϖ                1 e φ = 1 z Ξ ϱ φ Ξ ϱ φ + 1 log 1 Γ φ I + ϖ 1 ϖ
Furthermore, we evaluated the nonmembership grade, such as
Λ φ I Λ φ I log Λ φ I log Λ φ I Ξ ϱ φ Ξ ϱ φ + 1 log Λ φ I ϖ Ξ ϱ φ Ξ ϱ φ + 1 log Λ φ I ϖ φ = 1 z Ξ ϱ φ Ξ ϱ φ + 1 log Λ φ I ϖ 1 ϖ                φ = 1 z Ξ ϱ φ Ξ ϱ φ + 1 log Λ φ I ϖ 1 ϖ φ = 1 z Ξ ϱ φ Ξ ϱ φ + 1 log Λ φ I ϖ 1 ϖ                φ = 1 z Ξ ϱ φ Ξ ϱ φ + 1 log Λ φ I ϖ 1 ϖ e φ = 1 z Ξ ϱ φ Ξ ϱ φ + 1 log Λ φ I ϖ 1 ϖ e φ = 1 z Ξ ϱ φ Ξ ϱ φ + 1 log Λ φ I ϖ 1 ϖ
Finally, we used the theory in Equations (18) and (19), and we have
A I V I F C I A A A I 1 i f , I 2 i f , , I z i f A I V I F C I A A A I 1 i f , I 2 i f , , I z i f .

Appendix D

Proof. 
We combined the statement of Property 1 and Property 2, such as
A I V I F C I A A A I 1 i f , I 2 i f , , I z i f A I V I F C I A A A I 1 + , I 2 + , , I z + = I φ +
A I V I F C I A A A I 1 i f , I 2 i f , , I z i f A I V I F C I A A A I 1 , I 2 , , I z = I φ
Thus,
I φ A I V I F C I A A A I 1 i f , I 2 i f , , I z i f I φ + .

Appendix E

Proof. 
Considering the procedure of mathematical induction, we proved that the data in Equation (36) also hold for all positive integers. For this, we have the following procedure:
Step 1: Let z = 2 , and we have
I 1 i f Ξ ϱ 1 Ξ ϱ 1 + 1 = I 1 i f Ξ ϱ 1 Ξ ϱ 2                                                     = e Ξ ϱ 1 Ξ ϱ 2 log Γ 1 I ϖ 1 ϖ , e Ξ ϱ 1 Ξ ϱ 2 log Γ 1 I + ϖ 1 ϖ , 1 e Ξ ϱ 1 Ξ ϱ 2 log 1 Λ 1 I ϖ 1 ϖ , 1 e Ξ ϱ 1 Ξ ϱ 2 log 1 Λ 1 I + ϖ 1 ϖ
I 2 i f Ξ ϱ 2 Ξ ϱ 2 + 1 = I 2 i f Ξ ϱ 2 Ξ ϱ 3                                                     = e Ξ ϱ 2 Ξ ϱ 3 log Γ 2 I ϖ 1 ϖ , e Ξ ϱ 2 Ξ ϱ 3 log Γ 2 I + ϖ 1 ϖ , 1 e Ξ ϱ 2 Ξ ϱ 3 log 1 Λ 2 I ϖ 1 ϖ , 1 e Ξ ϱ 2 Ξ ϱ 3 log 1 Λ 2 I + ϖ 1 ϖ
Then, we have
A I V I F C I A A G I 1 i f , I 2 i f = I 1 i f Ξ ϱ 1 Ξ ϱ 2 I 2 i f Ξ ϱ 2 Ξ ϱ 3     = e Ξ ϱ 1 Ξ ϱ 2 log Γ 1 I ϖ 1 ϖ , e Ξ ϱ 1 Ξ ϱ 2 log Γ 1 I + ϖ 1 ϖ , 1 e Ξ ϱ 1 Ξ ϱ 2 log 1 Λ 1 I ϖ 1 ϖ , 1 e Ξ ϱ 1 Ξ ϱ 2 log 1 Λ 1 I + ϖ 1 ϖ e Ξ ϱ 2 Ξ ϱ 3 log Γ 2 I ϖ 1 ϖ , e Ξ ϱ 2 Ξ ϱ 3 log Γ 2 I + ϖ 1 ϖ , 1 e Ξ ϱ 2 Ξ ϱ 3 log 1 Λ 2 I ϖ 1 ϖ , 1 e Ξ ϱ 2 Ξ ϱ 3 log 1 Λ 2 I + ϖ 1 ϖ = e φ = 1 2 Ξ ϱ φ Ξ ϱ φ + 1 log Γ φ I ϖ 1 ϖ , e φ = 1 2 Ξ ϱ φ Ξ ϱ φ + 1 log Γ φ I + ϖ 1 ϖ , 1 e φ = 1 2 Ξ ϱ φ Ξ ϱ φ + 1 log 1 Λ φ I ϖ 1 ϖ , 1 e φ = 1 2 Ξ ϱ φ Ξ ϱ φ + 1 log 1 Λ φ I + ϖ 1 ϖ
Information in Equation (36) is fully suitable for z = 2 . Additionally, we are letting the data in Equation (36) also be suitable for z = q , and then we have
A I V I F C I A A G I 1 i f , I 2 i f , , I q i f = φ = 1 q I φ i f Ξ ϱ φ Ξ ϱ φ + 1                                            = e φ = 1 q Ξ ϱ φ Ξ ϱ φ + 1 log Γ φ I ϖ 1 ϖ , e φ = 1 q Ξ ϱ φ Ξ ϱ φ + 1 log Γ φ I + ϖ 1 ϖ , 1 e φ = 1 q Ξ ϱ φ Ξ ϱ φ + 1 log 1 Λ φ I ϖ 1 ϖ , 1 e φ = 1 a Ξ ϱ φ Ξ ϱ φ + 1 log 1 Λ φ I + ϖ 1 ϖ
Thus, we prove that the data in Equation (36) are also suitable for z = q + 1 , and we have
A I V I F C I A A G I 1 i f , I 2 i f , , I q i f , I q + 1 i f                           = φ = 1 q I φ i f Ξ ϱ φ Ξ ϱ φ + 1 I q + 1 i f Ξ ϱ q + 1 Ξ ϱ q + 2                = e φ = 1 q Ξ ϱ φ Ξ ϱ φ + 1 log Γ φ I ϖ 1 ϖ , e φ = 1 q Ξ ϱ φ Ξ ϱ φ + 1 log Γ φ I + ϖ 1 ϖ , 1 e φ = 1 q Ξ ϱ φ Ξ ϱ φ + 1 log 1 Λ φ I ϖ 1 ϖ , 1 e φ = 1 q Ξ ϱ φ Ξ ϱ φ + 1 log 1 Λ φ I + ϖ 1 ϖ                e Ξ ϱ q + 1 Ξ ϱ q + 2 log Γ q + 1 I ϖ 1 ϖ , e Ξ ϱ q + 1 Ξ ϱ q + 2 log Γ q + 1 I + ϖ 1 ϖ , 1 e Ξ ϱ q + 1 Ξ ϱ q + 2 log 1 Λ q + 1 I ϖ 1 ϖ , 1 e Ξ ϱ q + 1 Ξ ϱ q + 2 log 1 Λ q + 1 I + ϖ 1 ϖ = e φ = 1 q Ξ ϱ φ Ξ ϱ φ + 1 log Γ φ I ϖ 1 ϖ , e φ = 1 q Ξ ϱ φ Ξ ϱ φ + 1 log Γ φ I + ϖ 1 ϖ , 1 e φ = 1 q Ξ ϱ φ Ξ ϱ φ + 1 log 1 Λ φ I ϖ 1 ϖ , 1 e φ = 1 q Ξ ϱ φ Ξ ϱ φ + 1 log 1 Λ φ I + ϖ 1 ϖ
Hence, we evaluated that the data in Equation (36) are suitable for all positive values of z .□

References

  1. Kim, E.; Helal, S.; Cook, D. Human activity recognition and pattern discovery. IEEE Pervasive Comput. 2009, 9, 48–53. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  2. Chen, B.; Meng, F.; Tang, H.; Tong, G. Two-level attention module based on spurious-3d residual networks for human action recognition. Sensors 2023, 23, 1707. [Google Scholar] [CrossRef] [PubMed]
  3. Suh, S.; Rey, V.F.; Lukowicz, P. TASKED: Transformer-based Adversarial learning for human activity recognition using wearable sensors via Self-KnowledgE Distillation. Knowl. Based Syst. 2023, 260, 110143. [Google Scholar] [CrossRef]
  4. Morshed, M.G.; Sultana, T.; Alam, A.; Lee, Y.K. Human Action Recognition: A Taxonomy-Based Survey, Updates, and Opportunities. Sensors 2023, 23, 2182. [Google Scholar] [CrossRef] [PubMed]
  5. Kumar Jain, D.; Liu, X.; Neelakandan, S.; Prakash, M. Modeling of human action recognition using hyperparameter tuned deep learning model. J. Electron. Imaging 2023, 32, 011211. [Google Scholar] [CrossRef]
  6. Chen, Z.; Cai, C.; Zheng, T.; Luo, J.; Xiong, J.; Wang, X. Rf-based human activity recognition using signal adapted convolutional neural network. IEEE Trans. Mob. Comput. 2021, 22, 487–499. [Google Scholar] [CrossRef]
  7. Saleem, G.; Bajwa, U.I.; Raza, R.H. Toward human activity recognition: A survey. Neural Comput. Appl. 2023, 35, 4145–4182. [Google Scholar] [CrossRef]
  8. Merigó, J.M.; Gil-Lafuente, A.M. New decision-making techniques and their application in the selection of financial products. Inf. Sci. 2010, 180, 2085–2094. [Google Scholar] [CrossRef]
  9. Høybye-Mortensen, M. Decision-making tools and their influence on caseworkers’ room for discretion. Br. J. Soc. Work 2015, 45, 600–615. [Google Scholar] [CrossRef]
  10. Maniya, K.; Bhatt, M.G. A selection of material using a novel type decision-making method: Preference selection index method. Mater. Des. 2010, 31, 1785–1789. [Google Scholar] [CrossRef]
  11. Zadeh, L.A. Fuzzy sets. Inf. Control 1965, 8, 338–353. [Google Scholar] [CrossRef] [Green Version]
  12. Atanassov, K. Intuitionistic fuzzy sets. Fuzzy Sets Syst. 1986, 20, 87–96. [Google Scholar] [CrossRef]
  13. Kerre, E.E. A tribute to Zadeh’s extension principle. Sci. Iran. 2011, 18, 593–595. [Google Scholar] [CrossRef]
  14. de Barros, L.C.; Bassanezi, R.C.; Lodwick, W.A.; de Barros, L.C.; Bassanezi, R.C.; Lodwick, W.A. The extension principle of Zadeh and fuzzy numbers. In A First Course in Fuzzy Logic, Fuzzy Dynamical Systems, and Biomathematics: Theory and Applications; Springer: Berlin/Heidelberg, Germany, 2017; pp. 23–41. [Google Scholar]
  15. Mahmood, T.; Ali, Z. Fuzzy superior mandelbrot sets. Soft Comput. 2022, 26, 9011–9020. [Google Scholar] [CrossRef]
  16. Nieto, J.J. The Cauchy problem for continuous fuzzy differential equations. Fuzzy Sets Syst. 1999, 102, 259–262. [Google Scholar] [CrossRef]
  17. Congxin, W.; Shiji, S. Existence theorem to the Cauchy problem of fuzzy differential equations under compactness-type conditions. Inf. Sci. 1998, 108, 123–134. [Google Scholar] [CrossRef]
  18. Ma, M.; Friedman, M.; Kandel, A. Numerical solutions of fuzzy differential equations. Fuzzy Sets Syst. 1999, 105, 133–138. [Google Scholar] [CrossRef]
  19. Friedman, M.; Ma, M.; Kandel, A. Numerical solutions of fuzzy differential and integral equations. Fuzzy Sets Syst. 1999, 106, 35–48. [Google Scholar] [CrossRef]
  20. Song, S.; Wu, C.; Lee, E.S. Asymptotic equilibrium and stability of fuzzy differential equations. Comput. Math. Appl. 2005, 49, 1267–1277. [Google Scholar] [CrossRef] [Green Version]
  21. Voas, D. The rise and fall of fuzzy fidelity in Europe. Eur. Sociol. Rev. 2009, 25, 155–168. [Google Scholar] [CrossRef] [Green Version]
  22. Atanassov, K.T.; Gargov, G. Interval valued intuitionistic fuzzy sets. Fuzzy Sets Syst. 1999, 31, 139–177. [Google Scholar]
  23. Ejegwa, P.A.; Agbetayo, J.M. Similarity-distance decision-making technique and its applications via intuitionistic fuzzy pairs. J. Comput. Cogn. Eng. 2023, 2, 68–74. [Google Scholar] [CrossRef]
  24. Tripathi, D.K.; Nigam, S.K.; Rani, P.; Shah, A.R. New intuitionistic fuzzy parametric divergence measures and score function-based CoCoSo method for decision-making problems. Decis. Mak. Appl. Manag. Eng. 2023, 6, 535–563. [Google Scholar] [CrossRef]
  25. Sharma, K.; Singh, V.P.; Ebrahimnejad, A.; Chakraborty, D. Solving a multi-objective chance constrained hierarchical optimization problem under intuitionistic fuzzy environment with its application. Expert Syst. Appl. 2023, 217, 119595. [Google Scholar] [CrossRef]
  26. Rani, D.; Garg, H. Multiple attributes group decision-making based on trigonometric operators, particle swarm optimization and complex intuitionistic fuzzy values. Artif. Intell. Rev. 2023, 56, 1787–1831. [Google Scholar] [CrossRef]
  27. Hezam, I.M.; Vedala NR, D.; Kumar, B.R.; Mishra, A.R.; Cavallaro, F. Assessment of Biofuel Industry Sustainability Factors Based on the Intuitionistic Fuzzy Symmetry Point of Criterion and Rank-Sum-Based MAIRCA Method. Sustainability 2023, 15, 6749. [Google Scholar] [CrossRef]
  28. Gong, Z.; Wang, F. Operation properties and (α,β)-equalities of complex intuitionistic fuzzy sets. Soft Comput. 2023, 27, 4369–4391. [Google Scholar] [CrossRef]
  29. Jana, C.; Pal, M. Application of bipolar intuitionistic fuzzy soft sets in decision making problem. Int. J. Fuzzy Syst. Appl. 2018, 7, 32–55. [Google Scholar] [CrossRef]
  30. Garg, H.; Ali, Z.; Mahmood, T.; Ali, M.R.; Alburaikan, A. Schweizer-Sklar prioritized aggregation operators for intuitionistic fuzzy information and their application in multi-attribute decision-making. Alex. Eng. J. 2023, 67, 229–240. [Google Scholar] [CrossRef]
  31. Mahmood, T.; Ali, W.; Ali, Z.; Chinram, R. Power aggregation operators and similarity measures based on improved intuitionistic hesitant fuzzy sets and their applications to multiple attribute decision making. Comput. Model. Eng. Sci. 2021, 126, 1165–1187. [Google Scholar] [CrossRef]
  32. Shi, X.; Ali, Z.; Mahmood, T.; Liu, P. Power Aggregation Operators of Interval-Valued Atanassov-Intuitionistic Fuzzy Sets Based on Aczel–Alsina t-Norm and t-Conorm and Their Applications in Decision Making. Int. J. Comput. Intell. Syst. 2023, 16, 43. [Google Scholar] [CrossRef]
  33. Choquet, G. Theory of capacities. Ann. De L’institut Fourier 1954, 5, 131–295. [Google Scholar] [CrossRef] [Green Version]
  34. Meyer, P.; Roubens, M. On the use of the Choquet integral with fuzzy numbers in multiple criteria decision support. Fuzzy Sets Syst. 2006, 157, 927–938. [Google Scholar] [CrossRef] [Green Version]
  35. Tan, C.; Chen, X. Intuitionistic fuzzy Choquet integral operator for multi-criteria decision making. Expert Syst. Appl. 2010, 37, 149–157. [Google Scholar] [CrossRef]
  36. Xu, Z. Choquet integrals of weighted intuitionistic fuzzy information. Inf. Sci. 2010, 180, 726–736. [Google Scholar] [CrossRef]
  37. Aczél, J.; Alsina, C. Characterizations of some classes of quasilinear functions with applications to triangular norms and to synthesizing judgements. Aequationes Math. 1982, 25, 313–315. [Google Scholar] [CrossRef]
  38. Senapati, T.; Chen, G.; Yager, R.R. Aczel–Alsina aggregation operators and their application to intuitionistic fuzzy multiple attribute decision making. Int. J. Intell. Syst. 2022, 37, 1529–1551. [Google Scholar] [CrossRef]
  39. Senapati, T.; Chen, G.; Mesiar, R.; Yager, R.R. Intuitionistic fuzzy geometric aggregation operators in the framework of Aczel-Alsina triangular norms and their application to multiple attribute decision making. Expert Syst. Appl. 2023, 212, 118832. [Google Scholar] [CrossRef]
  40. Ahmmad, J.; Mahmood, T.; Mehmood, N.; Urawong, K.; Chinram, R. Intuitionistic Fuzzy Rough Aczel-Alsina Average Aggregation Operators and Their Applications in Medical Diagnoses. Symmetry 2022, 14, 2537. [Google Scholar] [CrossRef]
  41. Xu, Z. Intuitionistic fuzzy aggregation operators. IEEE Trans. Fuzzy Syst. 2007, 15, 1179–1187. [Google Scholar]
  42. Xu, Z.; Yager, R.R. Some geometric aggregation operators based on intuitionistic fuzzy sets. Int. J. Gen. Syst. 2006, 35, 417–433. [Google Scholar] [CrossRef]
  43. Wang, W.; Liu, X.; Qin, Y. Interval-valued intuitionistic fuzzy aggregation operators. J. Syst. Eng. Electron. 2012, 23, 574–580. [Google Scholar] [CrossRef]
  44. Wang, W.; Liu, X. Some interval-valued intuitionistic fuzzy geometric aggregation operators based on einstein operations. In Proceedings of the 2012 9th International Conference on Fuzzy Systems and Knowledge Discovery, Chongqing, China, 29–31 May 2012; pp. 604–608. [Google Scholar]
  45. Garg, H.; Agarwal, N.; Tripathi, A. Choquet integral-based information aggregation operators under the interval-valued intuitionistic fuzzy set and its applications to decision-making process. Int. J. Uncertain. Quantif. 2017, 7, 249–269. [Google Scholar] [CrossRef]
  46. Meng, F.; Zhang, Q.; Zhan, J. The interval-valued intuitionistic fuzzy geometric choquet aggregation operator based on the generalized banzhaf index and 2-additive measure. Technol. Econ. Dev. Econ. 2015, 21, 186–215. [Google Scholar] [CrossRef] [Green Version]
  47. Senapati, T.; Chen, G.; Mesiar, R.; Yager, R.R. Novel Aczel–Alsina operations-based interval-valued intuitionistic fuzzy aggregation operators and their applications in multiple attribute decision-making process. Int. J. Intell. Syst. 2022, 37, 5059–5081. [Google Scholar] [CrossRef]
  48. Senapati, T.; Mesiar, R.; Simic, V.; Iampan, A.; Chinram, R.; Ali, R. Analysis of interval-valued intuitionistic fuzzy Aczel–Alsina geometric aggregation operators and their application to multiple attribute decision-making. Axioms 2022, 11, 258. [Google Scholar] [CrossRef]
  49. Liu, Y.; Li, Y.; Zhang, Z.; Xu, Y.; Dong, Y. Classification-based strategic weight manipulation in multiple attribute decision making. Expert Syst. Appl. 2022, 197, 116781. [Google Scholar] [CrossRef]
  50. Li, Z.; Zhang, Z.; Yu, W. Consensus reaching for ordinal classification-based group decision making with heterogeneous preference information. J. Oper. Res. Soc. 2023, 1–22. [Google Scholar] [CrossRef]
  51. Li, Z.; Zhang, Z. Threshold-Based Value-Driven Method to Support Consensus Reaching in Multicriteria Group Sorting Problems: A Minimum Adjustment Perspective. IEEE Trans. Comput. Soc. Syst. 2023, 1–14. [Google Scholar] [CrossRef]
  52. Yang, Y.; Gai, T.; Cao, M.; Zhang, Z.; Zhang, H.; Wu, J. Application of group decision making in shipping industry 4.0: Bibliometric Analysis, Trends, and Future Directions. Systems 2023, 11, 69. [Google Scholar] [CrossRef]
  53. Cheng, L.; Yin, F.; Theodoridis, S.; Chatzis, S.; Chang, T. Rethinking Bayesian Learning for Data Analysis: The art of prior and inference in sparsity-aware modeling. IEEE Signal Process. Mag. 2022, 39, 18–52. [Google Scholar] [CrossRef]
  54. Xie, X.; Huang, L.; Marson, S.M.; Wei, G. Emergency response process for sudden rainstorm and flooding: Scenario deduction and Bayesian network analysis using evidence theory and knowledge meta-theory. Nat. Hazards 2023, 117, 3307–3329. [Google Scholar] [CrossRef]
  55. Li, X.; Sun, Y. Stock intelligent investment strategy based on support vector machine parameter optimization algorithm. Neural Comput. Appl. 2020, 32, 1765–1775. [Google Scholar] [CrossRef]
  56. Li, Q.; Lin, H.; Tan, X.; Du, S. H Consensus for Multiagent-Based Supply Chain Systems under Switching Topology and Uncertain Demands. IEEE Trans. Syst. Man Cybern. Syst. 2020, 50, 4905–4918. [Google Scholar] [CrossRef]
  57. Li, X.; Sun, Y. Application of RBF neural network optimal segmentation algorithm in credit rating. Neural Comput. Appl. 2021, 33, 8227–8235. [Google Scholar] [CrossRef]
Table 1. Meaning of different symbols used in this manuscript.
Table 1. Meaning of different symbols used in this manuscript.
SymbolMeaningsSymbolMeanings
Function z Ordered   of   ϕ ,   where   ϕ = 1 , 2 , z
X Universal sets ϖ 1 Scaler
P X Power sets ζ 1 Scaler
C R Choquet integral
Table 3. AIVIF aggregated decision matrix.
Table 3. AIVIF aggregated decision matrix.
AIVIFC-IAAAAIVIFC-IAAG
I 1 i f 0.3386 , 0.3463 , 0.5035 , 0.5156 0.7763 , 0.7823 , 0.1326 , 0.1326
I 2 i f 0.1768 , 0.1821 , 0.4827 , 0.4948 0.4994 , 0.5129 , 0.1038 , 0.1038
I 3 i f 0.1657 , 0.1711 , 0.5249 , 0.4713 0.5748 , 0.5842 , 0.1129 , 0.1129
I 4 i f 0.2692 , 0.2758 , 0.552 , 0.5617 0.7386 , 0.745 , 0.142 , 0.142
I 5 i f 0.2311 , 0.2371 , 0.4376 , 0.451 0.5616 , 0.5728 , 0.0781 , 0.0781
Table 4. AIVIF score matrix.
Table 4. AIVIF score matrix.
AIVIFC-IAAAAIVIFC-IAAG
I 1 i f −0.16710.6467
I 2 i f −0.30930.4023
I 3 i f −0.32980.4666
I 4 i f −0.28440.5998
I 5 i f −0.21020.4891
Table 5. Ranking matrix.
Table 5. Ranking matrix.
MethodsRanking ValuesBest One
AIVIFC-IAAA I 1 i f > I 5 i f > I 4 i f > I 2 i f > I 4 i f I 1 i f (Rule-Based Systems)
AIVIFC-IAAG I 1 i f > I 4 i f > I 5 i f > I 3 i f > I 2 i f I 1 i f (Rule-Based Systems)
Table 6. Comparative analysis of the derived and existing techniques.
Table 6. Comparative analysis of the derived and existing techniques.
ApproachesScore ValuesRanking
I 1 i f I 2 i f I 3 i f I 4 i f I 5 i f
Wang et al. [43]0.34520.17130.1450.24990.0981 I 1 i f > I 4 i f > I 3 i f > I 2 i f > I 5 i f
Wang and Liu [44]0.28040.09360.10020.20050.0239 I 1 i f > I 4 i f > I 3 i f > I 5 i f > I 2 i f
Garg et al. [45]0.37940.1190.14240.19190.1646 I 1 i f > I 4 i f > I 5 i f > I 3 i f > I 2 i f
Meng et al. [46]0.32120.02640.09210.14660.0691 I 1 i f > I 4 i f > I 3 i f > I 5 i f > I 2 i f
Senapati et al. [47]−0.1817−0.2772−0.3138−0.2818−0.3275 I 1 i f > I 2 i f > I 4 i f > I 3 i f > I 5 i f
Senapati et al. [48]0.61770.45570.49330.57980.4107 I 1 i f > I 4 i f > I 3 i f > I 2 i f > I 5 i f
Proposed AIFC-IAAA−0.164−0.3059−0.2923−0.3256−0.2973 I 1 i f > I 3 i f > I 5 i f > I 2 i f > I 4 i f
Proposed AIFC-IAAG0.64240.39550.47280.55230.4465 I 1 i f > I 4 i f > I 3 i f > I 5 i f > I 2 i f
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Garg, H.; Tehreem; Nguyen, G.N.; Alballa, T.; Khalifa, H.A.E.-W. Choquet Integral-Based Aczel–Alsina Aggregation Operators for Interval-Valued Intuitionistic Fuzzy Information and Their Application to Human Activity Recognition. Symmetry 2023, 15, 1438. https://doi.org/10.3390/sym15071438

AMA Style

Garg H, Tehreem, Nguyen GN, Alballa T, Khalifa HAE-W. Choquet Integral-Based Aczel–Alsina Aggregation Operators for Interval-Valued Intuitionistic Fuzzy Information and Their Application to Human Activity Recognition. Symmetry. 2023; 15(7):1438. https://doi.org/10.3390/sym15071438

Chicago/Turabian Style

Garg, Harish, Tehreem, Gia Nhu Nguyen, Tmader Alballa, and Hamiden Abd El-Wahed Khalifa. 2023. "Choquet Integral-Based Aczel–Alsina Aggregation Operators for Interval-Valued Intuitionistic Fuzzy Information and Their Application to Human Activity Recognition" Symmetry 15, no. 7: 1438. https://doi.org/10.3390/sym15071438

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop