Next Article in Journal
Fuzzy Logic-Based Autonomous Lane Changing Strategy for Intelligent Internet of Vehicles: A Trajectory Planning Approach
Previous Article in Journal
Proposal of a Cost-Effective and Adaptive Customized Driver Inattention Detection Model Using Time Series Analysis and Computer Vision
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Selection of AI Architecture for Autonomous Vehicles Using Complex Intuitionistic Fuzzy Rough Decision Making

1
Department of Mathematics and Statistics, International Islamic University, Islamabad 44000, Pakistan
2
Department of Mathematics, University of Kotli Azad Jammu & Kashmir, Kotli 11100, Pakistan
3
Department of Humanities and Basic Sciences, MCS Campus, National University of Sciences & Technology, Islamabad 44000, Pakistan
*
Authors to whom correspondence should be addressed.
World Electr. Veh. J. 2024, 15(9), 402; https://doi.org/10.3390/wevj15090402
Submission received: 3 July 2024 / Revised: 22 August 2024 / Accepted: 26 August 2024 / Published: 3 September 2024

Abstract

:
The advancement of artificial intelligence (AI) has become a crucial element in autonomous cars. A well-designed AI architecture will be necessary to attain the full potential of autonomous vehicles and will significantly accelerate the development and deployment of autonomous cars in the transportation sector. Promising autonomous cars for innovating modern transportation systems are anticipated to address many long-standing transporting challenges related to congestion, safety, parking, and energy conservation. Choosing the optimal AI architecture for autonomous vehicles is a multi-attribute decision-making (MADM) dilemma, as it requires making a complicated decision while considering a number of attributes, and these attributes can have two-dimensional uncertainty as well as indiscernibility. Thus, in this framework, we developed a novel mathematical framework “complex intuitionistic fuzzy rough set” for tackling both two-dimensional uncertainties and indiscernibility. We also developed the elementary operations of the deduced complex intuitionistic fuzzy rough set. Moreover, we developed complex intuitionistic fuzzy rough (weighted averaging, ordered weighted averaging, weighted geometric, and ordered weighted geometric) aggregation operators. Afterward, we developed a method of MADM by employing the devised operators and investigated the case study “Selection of optimal AI architecture for autonomous vehicles” to reveal the practicability of the devised method of MADM. Finally, to reveal the dominance and supremacy of our proposed work, a benchmark dilemma was used for comparison with various prevailing techniques.

1. Introduction

For a multitude of reasons, the design of artificial intelligence (AI) systems for autonomous vehicles is critical. With the potential to transform transportation and make it safer, more effective, and environmentally friendly, autonomous vehicles represent a revolutionary technical development. These vehicles’ ability to sense their surroundings, make judgments, and maneuver through the intricate and dynamic real-world environment is largely dependent on the design of the AI system. To reduce the chance of accidents, the AI architecture in autonomous vehicles has to be built with redundancy and fail-safes. An autonomous vehicle’s AI system needs to be reliable and capable of handling unexpected situations because a mistake might have serious repercussions. To guarantee the safety of both passengers and other road users, safety-critical capabilities such as object identification, collision avoidance, and emergency braking must be incorporated into the AI architecture. Scalability and flexibility are also crucial factors to take into account. To enable the ongoing development of the AI system as it learns from fresh data and experiences, the architecture should provide over-the-air upgrades. Since autonomous technology is anticipated to be incorporated into a wide range of vehicles, including personal automobiles, commercial trucks, and even drones, this flexibility also extends to diverse vehicle platforms. AI may be deployed more easily in a variety of applications with the help of a flexible architecture.
The multi-attribute decision-making (MADM) technique is one of the most valuable and dominant techniques for evaluating awkward and unreliable information in genuine life dilemmas. MADM plays an important role in real-life decision-making (DM) situations; it gives the best options and results for different alternatives under certain attributes that need to be evaluated when making a decision. When evaluating alternatives, sometimes it can be challenging to express the evaluation value of an attribute as a real number. To address this difficulty, Zadeh [1] initiated the mathematical framework known as fuzzy set (FS) theory as an extension of crisp set theory. Pawlak [2] developed the mathematical framework known as the rough set (RS) theory as a means of addressing ambiguity and uncertainty in knowledge representation and data processing. It offers a method for dealing with uncertain or insufficient data without depending on conventional probability theory or fuzzy logic. RS structures consist of upper and lower approximations. It separates a universe of items into sets with varying degrees of indiscernibility, where indiscernibility is the inability to tell one object from another based on the available information. This theory was first put out in 1982. Later, as a fuzzy expansion of RSs, Dubois and Prade [3] suggested the idea of fuzzy RSs (FRSs) by substituting fuzzy relations for binary relations. Using the idea of truth grade from fuzzy logic in the RS framework, an FRS offers a more potent framework. Later on, Cornelis et al. [4] introduced the notion of intuitionistic FRSs (IFRSs) by combining the concepts of intuitionistic fuzzy sets (IFSs) and RSs.

1.1. Motivation and Contribution

An autonomous car relies heavily on AI architecture to perceive the environment, make decisions, and control the car. Selecting an AI structure for autonomous vehicles is a complex system that involves integrating various techniques, algorithms, and systems. Over the years, we have seen companies debating over which AI architecture should be used. There are a lot of high-level overviews of the key components in an autonomous vehicle AI architecture, such as types of sensors, perception and object detection, localization and high-definition mapping, DM and motion-planning frameworks, control systems and machine learning approaches, safety and ethical considerations, scalability, and flexibility. A detailed discussion of these key components is provided as follows:
  • Data fusion, perception, and object detection: These refer to combining the data from multiple sensors (vision system, lidar system (light detection and ranging), radar system (detection of objects and their speed, even in poor visibility), and ultrasonic sensor for short-range object detection) to produce a more accurate and reliable representation of the vehicle’s surrounding. The AI architecture should be able to use these sensors’ data efficiently and develop a fusion algorithm to improve perception and DM. By combining the information from these multiple sensors, autonomous vehicles can create an exceptionally flexible and redundant cognitive framework, thereby reducing the potential risk associated with wrong decisions in critical DM scenarios. In real-time, the AI structures need to be able to detect and accurately identify different objects, such as pedestrians, road hurdles, speed breakers, other cars, lane markings and traffic signs, and other static elements in the environment. For this, sophisticated computer vision and deep learning algorithms are needed.
  • Localization and mapping: The localization system in the vehicles uses a combination of a global positioning system (GPS) and inertial measurement units (IMUs) for precise positioning. Autonomous vehicles often use high-definition (HD) maps that provide detailed information about the road network, pedestrians, road hurdles, speed breakers, lane markings, and traffic signs in the environment. These maps are combined with real-time sensor data to build a comprehensive understanding of the vehicle’s surroundings. The AI architecture should be able to accurately localize the car within its environment and maintain a detailed map of the environment, including static and dynamic elements, to support efficient navigation and DM.
The below figure, Figure 1, represents the data fusion algorithm of autonomous vehicles.
  • Decision-making and motion-planning framework: The DM system is the brain of autonomous vehicles. It uses the information from the perception, localization, and mapping systems to plan the vehicle’s trajectory and make decisions about when to accelerate, brake, or change lanes. This system relies on advanced algorithms to navigate the vehicle safely and efficiently.
  • Control system and machine learning approach: The AI DM system interconnects with the vehicle control system, which translates the high-level decisions into precise commands that control the vehicle’s steering, acceleration, and brakes. Machine learning is the backbone of autonomous vehicles; the perception and DM modules, including deep neural networks, rely on advanced machine learning techniques to improve their performance and adapt to new situations.
The below figure, Figure 2, represents the AI architecture of an autonomous vehicle.
  • Safety, reliability, and scalability: The AI architecture must be designed with safety and ethical principles in mind, ensuring that autonomous vehicle actions and decisions prioritize the safety of pedestrians and other road users. AI systems develop rigorous testing and validation processes, including simulation and real-world trials, and they ensure that robust fail-safe mechanisms are in place to handle unexpected situations.
The selection of the best AI architecture for autonomous vehicles involves a holistic approach that prioritizes safety, performance, and adaptability. By focusing on these key components, developers can create more dynamic and efficient autonomous systems. Despite a considerable amount of research efforts, there are still challenging issues in AI structures for autonomous car perception, object detection, localization and high-definition mapping, DM, and motion-planning frameworks. Many AI methods have been applied to improve the AI structures of autonomous cars and help them make human-like decisions in different situations, such as following other cars, steering, and path planning. However, such applications are inherently limited by the data’s availability, quality, complexity, and uncertainty. If the data collected from different sensors of autonomous vehicles contain extra fuzzy information along with roughness, then there is no tool that can handle that type of information. Then, the information collected from these sensors can be noisy, incomplete, and affected by different environmental factors. Moreover, from the literature review, we observed that the FS, FRS, and IFRS theories are restricted by their limitations and conditions. For decision makers, an IFRS is the best tool for handling truth-grade (TG) and false-grade (FG) information in the form of lower and upper approximations, but IFRSs cannot handle the additional fuzzy information (second dimension) in the form of lower and upper approximations. Similarly, other existing theories cannot model the information that contains additional fuzzy information. Therefore, this era requires the development of a new mathematical framework that can handle second-dimension (additional fuzzy information or complex fuzzy information) TG and FG information in the form of lower and upper information. Motivated by this research gap, in this article, we developed the concept of complex IFRSs (CIFRSs), and then, based on this newly defined relation, we devised a new novel mathematical framework called a CIFRS that can not only handle the TG and FG in its structure, but can also tackle two-dimensional uncertainties and indiscernibility. Moreover, we developed elementary operations such as the complement, union, intersection, and algebraic operations (sum, product) of the deduced CIFRSs. For comparing the two complex intuitionistic fuzzy rough numbers (CIFRNs), we developed the accuracy and score function. As aggregation is a fundamental mathematical tool to convert the overall information into a single value, based on this observation, we developed complex intuitionistic fuzzy rough (CIFR) weighted averaging (CIFRWA), CIFR ordered weighted averaging (CIFROWA), CIFR weighted geometric (CIFRWG), and CIFR ordered weighted geometric aggregation operators (AOs), and investigated their properties in detail. According to the application point of view, we used the MADM technique based on CIFR information for the selection of optimal AI architecture for autonomous vehicles.

1.2. Aims and Objectives

This study aimed to develop a new framework, “CIFRSs”, to overcome the existing problems in the theory of IFRS for the selection of the finest AI architecture for autonomous cars by using CIFR AOs to effectively combine and evaluate various performance metrics and criteria. The specific objectives were as follows:
  • To define and develop the theory of CIFRSs.
  • To define and develop different operators, such as the average AOs and geometric AOs, in the framework of CIFRSs.
  • To apply a newly defined framework to assess multiple AI architectures based on a wide range of performance indicators, and utilize the AOs to combine diverse evaluation criteria into a single, meaningful value.
  • To select a suitable MADM method based on the problem characteristics and data availability.
  • To develop an MADM algorithm for aggregation and evaluation to handle large datasets and complex AI architectures.
  • To examine the comparative study of the proposed methods with the present notions to show the supremacy and efficiency of the established work.
By achieving these objectives, this research will contribute to the development of a systematic and reliable approach for the selection of optimal AI architectures, leading to the improved performance and safety of autonomous vehicles.

1.3. Study Framework

The remaining article is designed as follows. In Section 2, we review the background study and notion of IFSs, complex FSs (CFSs), FRSs, and IFRSs and discuss their related operations. In Section 3, we demonstrate the definition of a complex intuitionistic fuzzy relation, which will help us further demonstrate the definition of a CIFRS. Section 3 is focused on the basic operating rules for CIFRNs. In Section 4, we develop several new AOs based on CIFRSs and discuss their properties using basic operations. Section 5 is based on an MADM algorithm and an application for delivered work to show the reliability and functioning of the developed notions. Section 6 is about the comparative study, and some conclusions for further research are given in Section 7.

2. Background of the Study

Security and data privacy are two very important issues. Large volumes of data are gathered by autonomous vehicles concerning their environment, occupants, and internal processes. Strong security features are required in the architecture to guard against cyberattacks and unwanted access to these data. To increase public confidence in autonomous vehicles, privacy protection for its users is crucial. Another important component is interoperability. Autonomous vehicles need to connect with infrastructure, other vehicles, and traffic control systems to function. By providing standardized protocols and interfaces for communication, the AI architecture should be created to support a more organized and effective transportation environment. Ma et al. [5] devised various applications of AI in the creation of autonomous vehicles. For autonomous vehicles, Khayyam et al. [6] used AI and the IoT. Pereira et al. [7] originated architecture for autonomous vehicles. Kurzidem et al. [8] discussed a methodology to examine architectures in autonomous vehicles. The challenges, opportunities, and applications of intelligent automation and autonomous vehicles were examined by Bathla et al. [9]. Zong et al. [10] devised an architecture design for an autonomous vehicle. By employing blockchain and AI, Bendiab et al. [11] discussed the challenges and solutions to the security of autonomous vehicles.
In crisp set theory, there are only two possibilities in the form of yes or no, or (0) or (1), for each element from the universe of discourse, but FSs include the TG and have more possibilities from a unit closed interval. With time, many researchers have given their ideas in different fields of life using the FS theory framework. Esogbue et al. [12] demonstrated the application of the FS theory to the optimal flood control problem arising in water resource systems. Guiffrida and Nagi [13] developed FS theory applications in production management research. Driankoy and Saffiotti [14] created various techniques based on fuzzy logic for autonomous vehicles. Wang et al. [15] investigated the lateral control of autonomous vehicles by employing fuzzy logic. Awad et al. [16] developed a model by employing fuzzy logic for the path tracking of autonomous vehicles. FSs ignore FG characteristics and instead address uncertainty through TGs. This restriction falls short of capturing all the uncertainty that exists in real-world situations. To overcome this limitation, an IFS was developed by Atanassov [17] that includes FGs in addition to TGs, and their sum should be in the unit closed interval. This allows for a more thorough depiction of uncertainty in DM and the modeling of uncertain information. Later on, different valuable applications in IFSs have been explored by researchers in different fields. Dengfeng et al. [18] proposed new similarity measures of IFSs and their application to pattern recognition. De et al. [19] developed an application of IFSs in medical diagnoses. Garg and Rani [20] introduced novel distance measures for IFSs based on various triangle centers of isosceles triangular fuzzy numbers and their applications. Xu [21] introduced IF AOs and Xu and Yager [22] proposed some geometric AOs based on IFSs. Jia and Wang [23] introduced Choquet integral-based IF arithmetic AOs in multi-criteria DM. An extended MAIRCA method for coronavirus vaccine selection in the age of COVID-19 based on IFSs was proposed by Ecer [24]. Even though FSs and IFSs are very useful and dominant, they do have some limitations because they do not cover the two-dimensional information in a single set. Later on, Ramot et al. [25] derived the major idea of CFSs, which contain the TGs in the form of complex numbers and cover the two-dimensional information in a single set. The complex fuzzy (CF) function contains two main terms, the phase term and the amplitude term, whose range is in the complex plane’s unit circle. Tamir et al. [26] also invented the notion of CFSs in the cartesian structure, where TGs have real and unreal parts that are placed in the complex plane’s unit square. A few operations for CFSs were developed by Zhang et al. [27]. Hu et al. [28] devised distances of CFSs and the continuity of their operations. Rehman [29] investigated probability AOs under the setting of CFSs. Cornelis et al. [4] introduced the notion of intuitionistic FRSs (IFRSs) by combining the concepts of IFSs and RSs. To examine intuitionistic fuzzy rough (IFR) approximation operators, Zhou and Wu [30] constructed a generic framework that used both constructive and axiomatic techniques. Also, Zhou and Wu [31] developed the idea of rough IFSs and IFRSs, and demonstrated their logical study in detail. The idea of an IF relation was defined by Bustince and Burillo [32]. By using the IF relation and the idea of two universes, Zhang et al. [33] examined the general framework of IFRSs. By using topology, Yun and Lee [34] defined and examined some properties of the IFR approximation operator and IF relations. Zhang [35] proposed the generalized IFR approximation operators based on IF coverings by combining the theories of RSs and IFSs. Yahya et al. [36] developed a novel approach to the IFR frank AO-based and evolution-based distance from the average solution (EDAS) method for MADM. Chinram et al. [37] examined the EDAS method for MADM based on IFR AOs. Ahmmad et al. [38] utilized the IFR Aczel–Alsina average AOs and their applications in medical diagnoses. Mahmood et al. [39] examined confidence level AOs based on IFRSs with an application in medical diagnoses. Mahmood et al. [40] derived the analysis and prioritization of the factors of the robotic industry with the assistance of the EDAS technique based on IFR Yager AOs.

Preliminaries

In this sequel, we recalled some basic notions linked to IFSs, CFSs, FRSs, and IFRSs. Also, their related operations and properties are discussed.
Definition 1
[17]. Let U be a universal set; IFS on set U is given as
= š * , Μ š * , N š * | š * U ,
in which  Μ : U [ 0 , 1 ]  represents the TG and  N : U [ 0 , 1 ]  represents the FG of  š * U  to the set   such that 0 Μ š * + N š * 1 . For easiness, the IF number (IFN) is symbolized by  = Μ , N .
Definition 2
[17]. For two IFNs, 1 = M 1 , N 1   a n d   2 = M 2 , N 2 , the following are true:
  • 1 2 = max Μ 1 š * , M 2 š * , min N 1 š * , N 2 š * ;
  • 1 2 = min Μ 1 š * , M 2 š * , max N 1 š * , N 2 š * ;
  • 1 c = N 1 , M 1 , where 1 c represents the complement of 1 ;
  • 1 2 = Μ 1 + N 2 Μ 1 N 2 , Μ 1 N 2 ;
  • 1 2 = Μ 1 N 2 , Μ 1 + N 2 Μ 1 N 2 ;
  • λ 1 = 1 1 Μ 1 λ , N 1 λ ;
  • 1 λ = N 1 λ , 1 1 Μ 1 λ .
Definition 3
[26]. Let  U  be a universal set; CFS   on set  U  is given as
= š * , Μ š * | š * U = š * , φ š * + ι Ƅ š * | š * U
in which  Μ š *  represents the complex TG and  φ , Ƅ 0 , 1 ,   ι = 1 .  For easiness, the CFN is symbolized by  = φ + ι Ƅ .
Definition 4
[26,29]. For two CFNs, 1 = φ 1 + ι Ƅ 1   a n d   2 = φ 2 + ι Ƅ 2 , the following are true:
  • 1 2 = max φ 1 , φ 2 + ι max Ƅ 1 , Ƅ 2 ;
  • 1 2 = min φ 2 , φ 2 + ι min Ƅ 1 , Ƅ 2 ;
  • 1 c = 1 φ 1 + ι ( 1 Ƅ 1 ) , where 1 c represents the complement of 1 ;
  • 1 2 = φ 1 + φ 2 φ 1 φ 2 + ι Ƅ 1 + Ƅ 2 Ƅ 1 Ƅ 2 ;
  • 1 2 = φ 1 φ 2 + ι Ƅ 1 Ƅ 2 ;
  • λ 1 = 1 1 φ 1 λ + ι 1 1 Ƅ 1 λ ;
  • 1 λ = φ 1 λ + ι Ƅ 1 λ .
Definition 5
[3]. Let  U ,   R e *  be a fuzzy approximation space and let set  A  be the FS in  U . Then, the upper and lower approximation of  A  w.r.t.  U ,   R e *  is denoted and defined by
R e * ¯ A = š * , Μ R e * ¯ š * | š * U R e * _ A = š * , Μ R e * _ š * | š * U
where
Μ R e * ¯ š * = ɬ * U e š * , ɬ * φ A ɬ * Μ R e * _ š * = ɬ * U 1 e š * , ɬ * φ A ɬ *
Then, the pair  R e * A = R e * ¯ A ,   R e * _ A  is called the FRS.
Definition 6
[37]. Let  U  be a nonempty and finite universe of discourse and  R e *  be an IF relation on  U ;  then, we can say that  U ,   R e *  defines the IF approximation space. Then, for a set  A = ɬ * ,   φ A ɬ * , L A ɬ * | ɬ * U I F S U ,  we can denote and define the upper and lower approximation of  A  w.r.t.  U ,   R e *  as
R e * ¯ A = š * , Μ R e * ¯ š * , N R e * ¯ š * | š * U R e * _ A = š * , Μ R e * _ š * , N R e * _ š * | š * U
where
Μ R e * ¯ š * = ɬ * U a š * , ɬ * φ A ɬ * Μ R e * _ š * = ɬ * U a š * , ɬ * φ A ɬ * N R e * ¯ š * = ɬ * U b š * , ɬ * L A ɬ * N R e * _ š * = ɬ * U b š * , ɬ * L A ɬ *
where  0 M R e * ¯ + N R e * ¯ 1 , and  0 M R e * _ + N R e * _ 1 . R e * ¯ A  and  R e * _ A  are IFSs. Then, the pair  R e * A = R e * ¯ A , R e * _ A = š * , < Μ R e * ¯ š * , N R e * ¯ š * > , < Μ R e * _ š * , N R e * _ š * > š * U  is called an IFRS with respect to  U , R e * . For simplicity, we will say that  R e * A = R e * ¯ A , R e * _ A = < Μ R e * ¯ š * , N R e * ¯ š * > , < Μ R e * _ š * , N R e * _ š * >  represents the IFRN.
Definition 7
[37]. For two IFRNs,  R e * A = R e * ¯ A ,   R e * _ A  and  R e * B = R e * ¯ B ,   R e * _ B , the following are true:
  • R e * A R e * B = R e * ¯ A R e * ¯ B , R e * _ A R e * _ B ;
  • R e * A R e * B = R e * ¯ A R e * ¯ B , R e * _ A R e * _ B ;
  • R e * A c = R e * ¯ A c , R e * _ A c , where R e * ¯ A c   a n d   R e * _ A c represent the complement of the IF rough approximation operators R e * ¯ A   a n d   R e * _ A ;
  • R e * A R e * B = R e * ¯ A R e * ¯ B , R e * _ A R e * _ B ;
  • R e * A R e * B = R e * ¯ A R e * ¯ B , R e * _ A R e * _ B ;
  • λ R e * A = λ R e * ¯ A , λ R e * _ A ;
  • R e * A λ = R e * ¯ A λ , R e * _ A λ .

3. Complex Intuitionistic Fuzzy Rough Set

In this section, we demonstrate the definition of complex intuitionistic fuzzy (CIF) relations that will help us further demonstrate the definition of a CIFRS. In the overall discussion throughout the article, U represents the universal set and R e * represents the CIF relation.
Definition 8.
Assume that  U  is the universal set; then, any CIF subset  R e *  of  U × U  is called a CIF relation and is given by  R e * = š ,   ɬ ,   W š ,   ɬ , Ɲ š ,   ɬ | W š ,   ɬ = e š ,   ɬ + ι f š ,   ɬ ,   Ɲ š ,   ɬ = g š ,   ɬ + ι h š ,   ɬ   . Here,  W š ,   ɬ  and  Ɲ š ,   ɬ  are respectively called the TG and FG, and  W š ,   ɬ : U × U 0 ,   1 + ι 0 ,   1  and  Ɲ š ,   ɬ : U × U 0 ,   1 + ι 0 ,   1  satisfy  0 e š ,   ɬ + g š ,   ɬ 1  and  0 f š ,   ɬ + h š ,   ɬ 1 .
Definition 9.
Let  U  be a nonempty and finite universe of discourse and  R e *  be a CIF relation on  U ;   then, we can say that  U ,   R e *  defines the CIF approximation space. Then, for a set  A = ɬ * ,   φ A ɬ * + ι Ƅ ɬ * , L A ɬ * + ι A ɬ * | ɬ * U C I F S U ,  we can define the upper and lower approximation of  A  w.r.t.  U ,   R e * , denoted by
R e * ¯ A = š * , Μ R e * ¯ š * , N R e * ¯ š * | š * U R e * _ A = š * , Μ R e * _ š * , N R e * _ š * | š * U
where
Μ R e * ¯ š * = ɬ * U e š * , ɬ * φ A ɬ * + ι ɬ * U f š * , ɬ * Ƅ A ɬ * = φ R e * ¯ + ι Ƅ R e * ¯ Μ R e * _ š * = ɬ * U e š * , ɬ * φ A ɬ * + ι ɬ * U f š * , ɬ * Ƅ A ɬ * = φ R e * _ + ι Ƅ R e * _ N R e * ¯ š * = ɬ * U g š * , ɬ * L A ɬ * + ι ɬ * U h š * , ɬ * A ɬ * = L R e * ¯ + ι R e * ¯ N R e * _ š * = ɬ * U g š * , ɬ * L A ɬ * + ι ɬ * U h š * , ɬ * A ɬ * = L R e * _ + ι R e * _
where  φ R e * ¯ + L R e * ¯ 1 , 0 φ R e * _ + L R e * _ 1 , 0 Ƅ R e * ¯ + R e * ¯ 1  and  0 Ƅ R e * _ + R e * _ 1 As  R e * ¯ A  and  R e * _ A  are CIFRSs, then the pair
R e * A = R e * ¯ A , R e * _ A = š * , < Μ R e * ¯ š * , N R e * ¯ š * > , < Μ R e * _ š * , N R e * _ š * > š * U  
is called the CIFRS with respect to  U ,   R e * . For simplicity, we will say that  R e * A = R e * ¯ A ,   R e * _ A = < Μ R e * ¯ š * , N R e * ¯ š * > , < Μ R e * _ š * , N R e * _ š * > = φ R e * ¯ + ι Ƅ R e * ¯ , L R e * ¯ + ι R e * ¯ , φ R e * _ + ι Ƅ R e * _ , L R e * _ + ι R e * _  represents the CIFRN.
Remark 1.
A CIFRS is signified by a TG  M R e * = φ A ɬ * + ι Ƅ ɬ *  and FG  N R e * = L A ɬ * + ι A ɬ * . If we remove the imaginary parts from both the TG and FG, then the CIFRS will convert into an IFRS. Also, if we remove the FG, then the IFRS will convert into an FRS. This shows that the CIFRS is a modification of the FRS.
Example 1.
Let  U = š 1 * ,   š 2 * ,   š 3 * ,   š 4 *  be a universal set; CIFR is defined in Table 1 as follows:
Now, we assume that A = š 1 * , 0.2 + ι 0.5 , 0.4 + ι 0.3 , š 2 * , 0.3 + ι 0.4 , 0.4 + ι 0.3 , š 3 * , 0.4 + ι 0.7 , 0.3 + ι 0.2 , š 4 * , 0.5 + ι 0.6 , 0.3 + ι 0.2 is a CIFS over U .
R e * ¯ A = š * , Μ R e * ¯ š * , N R e * ¯ š * | š * U R e * _ A = š * , Μ R e * _ š * , N R e * _ š * | š * U
Now, to find R e * ¯ A and R e * _ A , we have
Μ R e * ¯ š 1 * = ɬ * U e š * , ɬ * φ A ɬ * + ι ɬ * U f š * , ɬ * Ƅ A ɬ * = 0.3 0.2 0.6 0.3 0.3 0.4 0.2 0.5 + ι 0.4 0.5 0.4 0.4 0.4 0.7 0.6 0.6 = 0.6 + ι 0.7
N R e * ¯ š 1 * = ɬ * U g š * , ɬ * L A ɬ * + ι ɬ * U h š * , ɬ * A ɬ * = 0.5 0.4 0.3 0.4 0.2 0.3 0.5 0.3 + ι 0.2 0.3 0.5 0.3 0.3 0.2 0.3 0.2 = 0.2 + ι 0.2
In the same way, we can obtain the other values:
Μ R e * ¯ š 2 * = 0.7 + ι 0.8 , Μ R e * ¯ š 3 * = 0.6 + ι 0.7 , Μ R e * ¯ š 4 * = 0.7 + ι 0.7 , N R e * ¯ š 2 * = 0.2 + ι 0.1 , N R e * ¯ š 3 * = 0.3 + ι 0.2 , N R e * ¯ š 4 * = 0.2 + ι 0.2
Similarly,
Μ R e * _ š 1 * = 0.2 + ι 0.4 , Μ R e * _ š 2 * = 0.2 + ι 0.2 , Μ R e * _ š 3 * = 0.2 + ι 0.3 , Μ R e * _ š 4 * = 0.2 + ι 0.4 , N R e * _ š 1 * = 0.5 + ι 0.5 , N R e * _ š 2 * = 0.7 + ι 0.6 , N R e * _ š 3 * = 0.6 + ι 0.7 , N R e * _ š 4 * = 0.5 + ι 0.6
Then, the upper complex intuitionistic fuzzy approximation is
R e * ¯ A = š * 1 , 0.6 + ι 0.7 , 0.2 + ι 0.2 ,   š * 2 , 0.7 + ι 0.8 , 0.2 + ι 0.1 ,   š * 3 , 0.6 + ι 0.7 , 0.3 + ι 0.2 ,   š * 4 , 0.7 + ι 0.7 , 0.3 + ι 0.2
And the lower complex intuitionistic fuzzy approximation is
R e * _ A = š * 1 , 0.2 + ι 0.4 , 0.5 + ι 0.5 ,   š * 2 , 0.2 + ι 0.2 , 0.7 + ι 0.6 ,   š * 3 , 0.2 + ι 0.3 , 0.6 + ι 0.7 ,   š * 4 , 0.2 + ι 0.4 , 0.5 + ι 0.6
Hence, it is seen that R e * ¯ A ,   R e * _ A is a CIFRS.

Basic Operations and Properties of Complex Intuitionistic Fuzzy Rough Set

Definition 10.
Let  R e * A = R e * ¯ A ,   R e * _ A  and  R e * B = R e * ¯ B ,   R e * _ B  be two CIFRNs; then,
  • Complement
    R e * A c = R e * ¯ A c , R e * _ A c   R e * ¯ A c = š * , N R e * ¯ š * , Μ R e * ¯ š * | š * U R e * _ A c = š * , N R e * _ š * , Μ R e * _ š * | š * U
  • Union
    R e * A R e * B = R e * ¯ A R e * ¯ B , R e * _ A R e * _ B   R e * ¯ A R e * ¯ B = š * , max φ R e * ¯ A , φ R e * ¯ B + ι max Ƅ R e * ¯ A , Ƅ R e * ¯ B   , min L R e * ¯ A , L R e * ¯ B + ι min R e * ¯ A + R e * ¯ B   R e * _ A R e * _ B = š * , max φ R e * _ A , φ R e * _ B + ι max Ƅ R e * _ A , Ƅ R e * _ B   , min L R e * _ A , L R e * _ B + ι min R e * _ A + R e * _ B  
  • Intersection:
    R e * A R e * B = R e * ¯ A R e * ¯ B ,   R e * _ A   R e * _ B R e * ¯ A R e * ¯ B = š * , min φ R e * ¯ A , φ R e * ¯ B + ι min Ƅ R e * ¯ A , Ƅ R e * ¯ B   , max L R e * ¯ A , L R e * ¯ B + ι max R e * ¯ A + R e * ¯ B   R e * _ A R e * _ B = š * , min φ R e * _ A , φ R e * _ B + ι min Ƅ R e * _ A , Ƅ R e * _ B   , max L R e * _ A , L R e * _ B + ι max R e * _ A , R e * _ B  
Definition 11.
Let  R e * A = R e * ¯ A ,   R e * _ A  and  R e * B = R e * ¯ B ,   R e * _ B  be two CIFRNs; then,
  • Algebraic sum:
    R e * A R e * B = R e * ¯ A R e * ¯ B , R e * _ A R e * _ B   R e * ¯ A R e * ¯ B = x , φ R e * ¯ A + φ R e * ¯ B φ R e * ¯ A . φ R e * ¯ B ,   Ƅ R e * ¯ A + Ƅ R e * ¯ B Ƅ R e * ¯ A . Ƅ R e * ¯ B , L R e * ¯ A . L R e * ¯ B , R e * ¯ A . R e * ¯ B R e * _ A   R e * _ B = x , φ R e * _ A + φ R e * _ B φ R e * _ A . φ R e * _ B ,   Ƅ R e * _ A + Ƅ R e * _ B   Ƅ R e * _ A . Ƅ R e * _ B , L R e * _ A . L R e * _ B , R e * _ A . R e * _ B
  • Algebraic product:
    R e * A R e * B = R e * ¯ A R e * ¯ B ,   R e * _ A   R e * _ B   R e * ¯ A R e * ¯ B = x , φ R e * ¯ A . φ R e * ¯ B ,   Ƅ R e * ¯ A . Ƅ R e * ¯ B , L R e * ¯ A + L R e * ¯ B L R e * ¯ A . L R e * ¯ B , R e * ¯ A + R e * ¯ B R e * ¯ A . R e * ¯ B R e * _ A   R e * _ B = x , φ R e * _ A . φ R e * _ B ,   Ƅ R e * _ A . Ƅ R e * _ B , L R e * _ A + L R e * _ B L R e * _ A . L R e * _ B , R e * _ A + R e * _ B R e * _ A . R e * _ B
Next, we defined some other operations on CIFRNs.
Definition 12.
Let  R e * A = R e * ¯ A ,   R e * _ A  for a CIFRS and  λ > 0 ; then,
1.
 
λ R e * A = λ R e * ¯ A , λ R e * _ A λ R e * ¯ A = x , 1 1 φ R e * ¯ A λ , 1 1 Ƅ R e * ¯ A λ , L R e * ¯ A λ , R e * ¯ A λ λ R e * _ A = x , 1 1 φ R e * _ A λ , 1 1 Ƅ R e * _ A λ , L R e * _ A λ , R e * _ A λ
2.
 
R e * A λ = R e * ¯ A λ , R e * _ A λ R e * ¯ A λ = x , φ R e * ¯ A λ , Ƅ R e * ¯ A λ , 1 1 L R e * ¯ A λ , 1 1 R e * ¯ A λ R e * _ A λ = x , φ R e * _ A λ , Ƅ R e * _ A λ , 1 1 L R e * _ A λ , 1 1 R e * _ A λ
Definition 13.
The score function for the CIFRN  R e * A = R e * ¯ A ,   R e * _ A = φ R e * ¯ + ι Ƅ R e * ¯ , L R e * ¯ + ι R e * ¯ , φ R e * _ + ι Ƅ R e * _ , L R e * _ + ι R e * _  is given as
S F R e * A = 1 8 4 + φ R e * ¯ + Ƅ R e * ¯ + φ R e * _ + Ƅ R e * _ L R e * ¯ R e * ¯ L R e * _ R e * _ ,   S F R e * A 0 , 1 .  
The accuracy function for the CIFRN is given as
A F R e * A = 1 8 φ R e * ¯ + Ƅ R e * ¯ + φ R e * _ + Ƅ R e * _ + L R e * ¯ + R e * ¯ + L R e * _ + R e * _ ,   A F R e * A 0 , 1 .

4. Aggregation Operators Based on CIFRSs

In this section, we develop several new AOs based on CIFRSs and discuss their properties using basic operations.
Definition 14.
Let  R e * A t = R e * ¯ A t ,   R e * _ A t ( t = 1 , 2 , 3 , s )  be a collection of CIFRNs and  = 1 ,   2 , 3   .   .   . , s T  be the weight vector (WV) with  t 0 ,   1   s u c h   t h a t   t = 1 s t = 1 ; then, a CIFRWA operator is defined as
C I F R W A R e * A 1 , R e * A 2 , .   .   . , R e * A s = t = 1 s t R e * ¯ A t , t = 1 s t   R e * _ A t = 1 R e * ¯ A 1 2 R e * ¯ A 2 .   .   .   .   . s R e * ¯ A s , 1 R e * _ A 1 2 R e * _ A 2 .   .   .   .   . s R e * _ A s  
Based on the above definition, the results for the CIFRWA operator are as follows.
Theorem 1.
By employing the above equation, we obtain the CIFRNs and
C I F R W A R e * A 1 , R e * A 2 , .   .   . , R e * A s = t = 1 s t R e * ¯ A t , t = 1 s t   R e * _ A t = 1 t = 1 s 1 φ R e * ¯ A t t + i 1 t = 1 s 1 Ƅ R e * ¯ A t t , t = 1 s L R e * ¯ A t t + i t = 1 s R e * ¯ A t t   , 1 t = 1 s 1 φ R e * _ A t t + i 1 t = 1 s 1 Ƅ R e * _ A t t , t = 1 s L R e * _ A t t + i t = 1 s R e * _ A t t  
Proof. 
We proved the above equation by using a well-known method of mathematical induction (MI), assuming that, for s = 2 , we have
R e * A 1 = 1 R e * ¯ A 1 , 1   R e * _ A 1 = 1 1 φ R e * ¯ A 1 1 + i 1 1 Ƅ R e * ¯ A 1 1 , L R e * ¯ A 1 1 + i R e * ¯ A 1 1   , 1 1 φ R e * _ A 1 1 + i 1 1 Ƅ R e * _ A 1 1 , L R e * _ A 1 1 + i R e * _ A 1 1  
R e * A 2 = 2 R e * ¯ A 2 , 2   R e * _ A 2 = 1 1 φ R e * ¯ A 2 2 + i 1 1 Ƅ R e * ¯ A 2 2 , L R e * ¯ A 2 2 + i R e * ¯ A 2 2   , 1 1 φ R e * _ A 2 2 + i 1 1 Ƅ R e * _ A 2 2 , L R e * _ A 2 2 + i R e * _ A 2 2  
C I F R W A R e * A 1 , R e * A 2 = 1 R e * ¯ A 1 2 R e * ¯ A 2 , 1   R e * _ A 1 2   R e * _ A 2 = 1 1 φ R e * ¯ A 1 1 + i 1 1 Ƅ R e * ¯ A 1 1 , L R e * ¯ A 1 1 + i R e * ¯ A 1 1   , 1 1 φ R e * _ A 1 1 + i 1 1 Ƅ R e * _ A 1 1 , L R e * _ A 1 1 + i R e * _ A 1 1  
1 1 φ R e * ¯ A 2 2 + i 1 1 Ƅ R e * ¯ A 2 2 , L R e * ¯ A 2 2 + i R e * ¯ A 2 2   , 1 1 φ R e * _ A 2 2 + i 1 1 Ƅ R e * _ A 2 2 , L R e * _ A 2 2 + i R e * _ A 2 2  
= 1 1 φ R e * ¯ A 1 1 1 φ R e * ¯ A 2 2 + i 1 1 Ƅ R e * ¯ A 1 1 1 Ƅ R e * ¯ A 2 2 , L R e * ¯ A 1 1 L R e * ¯ A 2 2 + i R e * ¯ A 1 1 R e * ¯ A 2 2 , 1 1 φ R e * _ A 1 1 1 φ R e * _ A 2 2 + i 1 1 Ƅ R e * _ A 1 1 1 Ƅ R e * _ A 2 2 , L R e * _ A 1 1 L R e * _ A 2 2 + i R e * _ A 1 1 R e * _ A 2 2
= 1 t = 1 2 1 φ R e * ¯ A t t + i 1 t = 1 2 1 Ƅ R e * ¯ A t t , t = 1 2 L R e * ¯ A t t + i t = 1 2 R e * ¯ A t t   , 1 t = 1 2 1 φ R e * _ A t t + i 1 t = 1 2 1 Ƅ R e * _ A t t , t = 1 2 L R e * _ A t t + i t = 1 2 R e * _ A t t  
Next, suppose that it is true for s = .
C I F R W A R e * A 1 , R e * A 2 , .   .   . , R e * A = t = 1 t R e * ¯ A t , t = 1 t   R e * _ A t = 1 t = 1 1 φ R e * ¯ A t t + i 1 t = 1 1 Ƅ R e * ¯ A t t , t = 1 L R e * ¯ A t t + i t = 1 R e * ¯ A t t   , 1 t = 1 1 φ R e * _ A t t + i 1 t = 1 1 Ƅ R e * _ A t t , t = 1 L R e * _ A t t + i t = 1 R e * _ A t t  
Now, we have to show that it is true for s = + 1 ; we have
C I F R W A R e * A 1 , R e * A 2 , . . . , R e * A , R e * A + 1 = t = 1 + 1 t R e * ¯ A t , t = 1 + 1 t R e * _ A t = 1 t = 1 1 φ R e * ¯ A t t + i 1 t = 1 1 Ƅ R e * ¯ A t t , t = 1 L R e * ¯ A t t + i t = 1 R e * ¯ A t t   , 1 t = 1 1 φ R e * _ A t t + i 1 t = 1 1 Ƅ R e * _ A t t , t = 1 L R e * _ A t t + i t = 1 R e * _ A t t   1 1 φ R e * ¯ A + 1 + 1 + i 1 1 Ƅ R e * ¯ A + 1 + 1 , L R e * ¯ A + 1 + 1 + i R e * ¯ A + 1 + 1   , 1 1 φ R e * _ A + 1 + 1 + i 1 1 Ƅ R e * _ A + 1 + 1 , L R e * _ A + 1 + 1 + i R e * _ A + 1 + 1   = 1 t = 1 1 φ R e * ¯ A t t + 1 1 φ R e * ¯ A + 1 + 1 1 t = 1 1 φ R e * ¯ A t t 1 1 φ R e * ¯ A + 1 + 1 + ι 1 t = 1 1 Ƅ R e * ¯ A t t + 1 1 Ƅ R e * ¯ A + 1 + 1 1 t = 1 1 Ƅ R e * ¯ A t t 1 1 Ƅ R e * ¯ A + 1 + 1 , t = 1 L R e * ¯ A t t L R e * ¯ A + 1 + 1 + i t = 1 R e * ¯ A t t R e * ¯ A + 1 + 1   , 1 t = 1 1 φ R e * _ A t t + 1 1 φ R e * _ A + 1 + 1 1 t = 1 1 φ R e * _ A t t 1 1 φ R e * _ A + 1 + 1 + i 1 t = 1 1 Ƅ R e * _ A t t + 1 1 Ƅ R e * _ A + 1 + 1 1 t = 1 1 Ƅ R e * _ A t t 1 1 Ƅ R e * _ A + 1 + 1   , t = 1 L R e * _ A t t L R e * _ A + 1 + 1 + i t = 1 R e * _ A t t R e * _ A + 1 + 1 = 1 t = 1 1 φ R e * ¯ A t t 1 φ R e * ¯ A + 1 + 1 + i 1 t = 1 1 Ƅ R e * ¯ A t t 1 Ƅ R e * ¯ A + 1 + 1 , t = 1 + 1 L R e * ¯ A t t + i t = 1 + 1 R e * ¯ A t t   , 1 t = 1 1 φ R e * _ A t t 1 φ R e * _ A + 1 + 1 + i 1 t = 1 1 Ƅ R e * _ A t t 1 Ƅ R e * _ A + 1 + 1 , t = 1 + 1 L R e * _ A t t + i t = 1 + 1 R e * _ A t t   = 1 t = 1 + 1 1 φ R e * ¯ A t t + i 1 t = 1 + 1 1 Ƅ R e * ¯ A t t , t = 1 + 1 L R e * ¯ A t t + i t = 1 + 1 R e * ¯ A t t   , 1 t = 1 + 1 1 φ R e * _ A t t + i 1 t = 1 + 1 1 Ƅ R e * _ A t t , t = 1 + 1 L R e * _ A t t + i t = 1 + 1 R e * _ A t t  
This shows that it holds true for s = + 1 . Hence, it will hold true for all s 0 .
From the above theorem, R e * ¯ A t   a n d   R e * _ A t are CIFRNs. So, by Definitions 4 and 5, t = 1 s t R e * ¯ A t   a n d   t = 1 s t   R e * _ A t are also CIFRNs. Therefore, the CIFRWA is also a CIFRN.
Theorem 2
(idempotency property). Let  R e * A t = R e * ¯ A t ,   R e * _ A t ( t = 1 , 2 , 3 , s )  be a collection of CIFRNs with WV  = 1 ,   2 ,   .   .   . , s T t 0 ,   1 ,   a n d   t = 1 s t = 1 . If  R e * A t = R e * A     ( t = 1 , 2 , 3 , s ) , where  R e * A = R e * ¯ A ,   R e * _ A , then
C I F R W A R e * A 1 , R e * A 2 , . . . , R e * A s = R e * A
Proof. 
Let us assume that R e * A t = R e * A ( t = 1 , 2 , 3 , s ) ; then,
C I F R W A R e * A 1 , R e * A 2 , . . . , R e * A s = t = 1 s t R e * ¯ A t , t = 1 s t R e * _ A t = 1 t = 1 s 1 φ R e * ¯ A t t + i 1 t = 1 s 1 Ƅ R e * ¯ A t t , t = 1 s L R e * ¯ A t t + i t = 1 s R e * ¯ A t t   , 1 t = 1 s 1 φ R e * _ A t t + i 1 t = 1 s 1 Ƅ R e * _ A t t , t = 1 s L R e * _ A t t + i t = 1 s R e * _ A t t  
For all t , R e * A t = R e * A . Therefore,
= 1 1 φ R e * ¯ A t = 1 s t + i 1 1 Ƅ R e * ¯ A t = 1 s t , L R e * ¯ A t = 1 s t + i R e * ¯ A t = 1 s t   , 1 1 φ R e * _ A t = 1 s t + i 1 1 Ƅ R e * _ A t = 1 s t , L R e * _ A t = 1 s t + i R e * _ A t = 1 s t   = 1 1 φ R e * ¯ A + i 1 1 Ƅ R e * ¯ A , L R e * ¯ A + i R e * ¯ A   , 1 1 φ R e * _ A + i 1 1 Ƅ R e * _ A , L R e * _ A + i R e * _ A   = φ R e * ¯ A + i Ƅ R e * ¯ A , L R e * ¯ A + i R e * ¯ A , φ R e * _ A + i Ƅ R e * _ A , L R e * _ A + i R e * _ A = R e * A
Theorem 3
(monotonicity property). Let
R e * A t = R e * ¯ A t , R e * _ A t = φ R e * ¯ A t + i Ƅ R e * ¯ A t , L R e * ¯ A t + i R e * ¯ A t , φ R e * _ A t + i Ƅ R e * _ A t , L R e * _ A t + i R e * _ A t   a n d R e * B t = R e * ¯ B t , R e * _ B t = φ R e * ¯ B t + i Ƅ R e * ¯ B t , L R e * ¯ B t + i R e * ¯ B t , φ R e * _ B t + i Ƅ R e * _ B t , L R e * _ B t + i R e * _ B t t = 1 , 2 , . . . , s
be a collection of two CIFRSs, and  = 1 , 2 , . . . , s T  be the WV with  t 0 , 1   a n d   t = 1 s t = 1 . If  R e * ¯ A t R e * ¯ B t , R e * _ A t R e * _ B t , then
C I F R W A R e * A 1 , R e * A 2 , . . . , R e * A s C I F R W A R e * B 1 , R e * B 2 , . . . , R e * B s
Proof. 
Assume φ R e * ¯ A t φ R e * ¯ B t ,   Ƅ R e * ¯ A t Ƅ R e * ¯ B t , L R e * ¯ A t L R e * ¯ B t , R e * ¯ A t R e * ¯ A t and φ R e * _ A t φ R e * _ B t ,   Ƅ R e * _ A t Ƅ R e * _ B t , L R e * _ A t L R e * _ B t , R e * _ A t R e * _ A t for all t = 1 , 2 , . . . , s ; then,
1 Ƅ R e * ¯ A t 1 Ƅ R e * ¯ B t
Then,
t = 1 s 1 φ R e * ¯ A t t t = 1 s 1 φ R e * ¯ B t t 1 t = 1 s 1 φ R e * ¯ A t t 1 t = 1 s 1 φ R e * ¯ B t t
Similarly,
1 t = 1 s 1 Ƅ R e * ¯ A t t 1 t = 1 s 1 Ƅ R e * ¯ B t t
Next,
L R e * ¯ A t L R e * ¯ B t t = 1 s L R e * ¯ A t t t = 1 s L R e * ¯ B t t   a n d t = 1 s R e * ¯ A t t t = 1 s R e * ¯ B t t
Similarly,
1 t = 1 s 1 φ R e * _ A t t 1 t = 1 s 1 φ R e * _ B t t , 1 t = 1 s 1 Ƅ R e * _ A t t 1 t = 1 s 1 Ƅ R e * _ B t t , t = 1 s L R e * _ A t t t = 1 s L R e * _ B t t a n d t = 1 s R e * _ A t t t = 1 s R e * _ B t t
Hence,
C I F R W A R e * A 1 , R e * A 2 , . . . , R e * A s C I F R W A R e * B 1 , R e * B 2 , . . . , R e * B s .
Theorem 4
(boundedness property). Let  R e * A t = R e * A t + , R e * A t ( t = 1 , 2 , 3 , s )  be a collection of CIFRNs where  R e * A t + = min t R e * ¯ A t , max t R e * _ A t  and  R e * A t = max t R e * ¯ A t , min t R e * _ A t ;   then,
R e * A t C I F R W A R e * A 1 , R e * A 2 , . . . , R e * A s R e * A t +
Proof. 
As R e * ¯ A t + = max t φ R e * ¯ A t + ι max t Ƅ R e * ¯ A t , min t L R e * ¯ A t + ι min t R e * ¯ A t , max t φ R e * _ A t + ι max t Ƅ R e * _ A t , min t L R e * _ A t + ι min t R e * _ A t and R e * ¯ A t = min t φ R e * ¯ A t + ι min t Ƅ R e * ¯ A t , max t L R e * ¯ A t + ι max t R e * ¯ A t , min t φ R e * _ A t + ι min t Ƅ R e * _ A t , max t L R e * _ A t + ι max t R e * _ A t
Since, for all t = 1 , 2 , 3 s , we have
min t φ R e * _ A t φ R e * _ A t max t φ R e * _ A t 1 min t φ R e * _ A t 1 φ R e * _ A t 1 max t φ R e * _ A t t = 1 s 1 min t φ R e * _ A t t t = 1 s 1 φ R e * _ A t t t = 1 s 1 max t φ R e * _ A t t 1 min t φ R e * _ A t 1 φ R e * _ A t t 1 max t φ R e * _ A t 1 1 min t φ R e * _ A t 1 t = 1 s 1 φ R e * _ A t t 1 1 max t φ R e * _ A t
Hence,
min t φ R e * _ A t 1 t = 1 s 1 φ R e * _ A t t max t φ R e * _ A t
Similarly,
min t Ƅ R e * _ A t 1 t = 1 s 1 Ƅ R e * _ A t t max t Ƅ R e * _ A t
Next, for every t = 1 , 2 , 3 s , we have
min t L R e * _ A t L R e * _ A t max t L R e * _ A t t = 1 s min t L R e * _ A t t t = 1 s L R e * _ A t t t = 1 s max t L R e * _ A t t
This implies that
min t L R e * _ A t t = 1 s L R e * _ A t t max t L R e * _ A t
Similarly,
min t R e * _ A t t = 1 s R e * _ A t t max t R e * _ A t
Similarly, we can show that
min t φ R e * ¯ A t 1 t = 1 s 1 φ R e * ¯ A t t max t φ R e * ¯ A t
min t Ƅ R e * ¯ A t 1 t = 1 s 1 Ƅ R e * ¯ A t t max t Ƅ R e * ¯ A t
min t L R e * ¯ A t t = 1 s L R e * ¯ A t t max t L R e * ¯ A t
min t R e * ¯ A t t = 1 s R e * ¯ A t t max t R e * ¯ A t
From Equations (18)–(25), we have
R e * A t C I F R W A R e * A 1 , R e * A 2 , . . . , R e * A s R e * A t +
Definition 15.
Let  R e * A t = R e * ¯ A t ,   R e * _ A t ( t = 1 , 2 , 3 , s )  be a collection of CIFRNs, and  = 1 ,   2 ,   .   .   . , s T  be the WV with  t 0 ,   1   a n d   t = 1 s t = 1 .  Then, a CIFROWA operator is determined as
C I F R O W A R e * A 1 , R e * A 2 , . . . , R e * A s = t = 1 s t R e * ¯ A t , t = 1 s t R e * _ A t = 1 t = 1 s 1 φ R e * ¯ A t t + i 1 t = 1 s 1 Ƅ R e * ¯ A t t , t = 1 s L R e * ¯ A t t + i t = 1 s R e * ¯ A t t   , 1 t = 1 s 1 φ R e * _ A t t + i 1 t = 1 s 1 Ƅ R e * _ A t t , t = 1 s L R e * _ A t t + i t = 1 s R e * _ A t t    
where  1 , 2 , 3 , . . . , s  is a permutation of  1 , 2 , . . . , s  such that  R e * A t 1 R e * A t t .
Similar to Theorems 1–4, CIFROWA also satisfies the properties of idempotency, monotonicity, and boundedness.
Definition 16.
Let  R e * A t = R e * ¯ A t ,   R e * _ A t ( t = 1 , 2 , 3 , s )  be a collection of CIFRNs and  = 1 ,   2 , 3   .   .   . , s T    be the weight vector (WV) with  t 0 ,   1   s u c h   t h a t   t = 1 s t = 1 ; then, a CIFRWG operator is defined as
C I F R W G R e * A 1 , R e * A 2 , . . . , R e * A s = t = 1 s t R e * ¯ A t t , t = 1 s t R e * _ A t t = 1 R e * ¯ A 1 2 R e * ¯ A 2 . . . . . s R e * ¯ A s , ( 1 R e * _ A 1 2 R e * _ A 2 . . . . . s R e * _ A s )  
Based on the above definition, the results for the CIFRWG operator are as follows:
Theorem 5.
By employing the above equation, we obtain the CIFRNs and
C I F R W G R e * A 1 , R e * A 2 , . . . , R e * A s = t = 1 s t R e * ¯ A t t , t = 1 s t R e * _ A t t = t = 1 s φ R e * ¯ A t t + i t = 1 s Ƅ R e * ¯ A t t , 1 t = 1 s 1 L R e * ¯ A t t + i 1 t = 1 s 1 R e * ¯ A t t   , t = 1 s φ R e * _ A t t + i t = 1 s Ƅ R e * _ A t t , 1 t = 1 s 1 L R e * _ A t t + i 1 t = 1 s 1 R e * _ A t t    
Proof. 
Similar to Theorem 1. □
Theorem 6
(idempotency property). Let  R e * A t = R e * ¯ A t ,   R e * _ A t ( t = 1 , 2 , 3 , s )  be a collection of CIFRNs with WV  = 1 ,   2 ,   .   .   . , s T ,  t 0 ,   1 ,   a n d   t = 1 s t = 1 . If  R e * A t = R e * A     ( t = 1 , 2 , 3 , s ) , where  R e * A = R e * ¯ A ,   R e * _ A ,  then
C I F R W G R e * A 1 , R e * A 2 , . . . , R e * A s = R e * A
Theorem 7
(monotonicity property). Let 
R e * A t = R e * ¯ A t , R e * _ A t = φ R e * ¯ A t + i Ƅ R e * ¯ A t , L R e * ¯ A t + i R e * ¯ A t , φ R e * _ A t + i Ƅ R e * _ A t , L R e * _ A t + i R e * _ A t   a n d R e * B t = R e * ¯ B t , R e * _ B t = φ R e * ¯ B t + i Ƅ R e * ¯ B t , L R e * ¯ B t + i R e * ¯ B t φ R e * _ B t + i Ƅ R e * _ B t , L R e * _ B t + i R e * _ B t t = 1 , 2 , . . . , s
be a collection of two CIFRSs, and  = 1 , 2 , . . . , s T  be the WV with  t 0 , 1   a n d   t = 1 s t = 1 . If  R e * ¯ A t R e * ¯ B t , R e * _ A t R e * _ B t , then
C I F R W G R e * A 1 , R e * A 2 , . . . , R e * A s C I F R W G R e * B 1 , R e * B 2 , . . . , R e * B s  
Theorem 8
(boundedness property). Let  R e * A t = R e * A t + , R e * A t ( t = 1 , 2 , 3 , s )  be a collection of CIFRNs where  R e * A t + = min t R e * ¯ A t , max t R e * _ A t  and  R e * A t = max t R e * ¯ A t , min t R e * _ A t ; then,
R e * A t C I F R W G R e * A 1 , R e * A 2 , . . . , R e * A s R e * A t +
Definition 17.
Let  R e * A t = R e * ¯ A t ,   R e * _ A t ( t = 1 , 2 , 3 , s )  be a collection of CIFRNs, and  = 1 ,   2 ,   .   .   . , s T  be the WV with  t 0 ,   1   a n d   t = 1 s t = 1 .  Then, a complex intuitionistic fuzzy rough ordered weighted geometric (CIFROWG) operator is determined as
C I F R O W G R e * A 1 , R e * A 2 , , R e * A s = t = 1 s t R e * ¯ A t , t = 1 s t R e * _ A t = t = 1 s φ R e * ¯ A t t + i t = 1 s Ƅ R e * ¯ A t t , 1 t = 1 s 1 L R e * ¯ A t t + i 1 t = 1 s 1 R e * ¯ A t t   , t = 1 s φ R e * _ A t t + i t = 1 s Ƅ R e * _ A t t , 1 t = 1 s 1 L R e * _ A t t + i 1 t = 1 s 1 R e * _ A t t    
where  1 ,   2 ,   3 , .   .   .   , s  is a permutation of  1 ,   2 ,   .   .   . ,   s  such that  R e * A t 1 R e * A t     t .
Similar to Theorems 1–4, CIFROWA also satisfies the properties of idempotency, monotonicity, and boundedness.

5. A Method of MADM in the Setting of CIFR Information

In the following section, we demonstrate an MADM technique using the AOs in the structure of CIFRNs.
Assume that there are alternatives and ϸ attributes. Let Ă Ҩ Ҩ = 1 , 2 ,   .   .   . , ,   ɱ ɱ = 1 , 2 , .   .   . , ϸ , and Ϣ = Ϣ 1 ,   Ϣ 2 ,   .   .   . , Ϣ ϸ T be the WV of attributes with Ϣ ϸ 0 ,   1     ϸ and   ɱ = 1 ϸ Ϣ ɱ = 1 . The decision maker or expert will identify the evaluated values of the considered alternatives based on the interpreted attributes. These values will be in the structure of CIFRNs, i.e., M = Ҩ ɱ × ϸ = M ¯ Ҩ ɱ , N ¯ Ҩ ɱ , M _ Ҩ ɱ , N _ Ҩ ɱ × ϸ = φ ¯ Ҩ ɱ + i L ¯ Ҩ ɱ , Ƅ ¯ Ҩ ɱ + i ¯ Ҩ ɱ , φ _ Ҩ ɱ + i L _ Ҩ ɱ , Ƅ _ Ҩ ɱ + i _ Ҩ ɱ × ϸ , which will be used to construct a CIFR decision matrix. To tackle this MADM dilemma, we interpreted the underlying algorithm.

5.1. Algorithm

We demonstrated the algorithm to solve MADM problems in the structure of CIFRSs by employing CIFRWA and CIFRWG operators.
Step 1: The attributes may come in two types in each MADM process, a benefit type and a cost type. Thus, there is a requirement for normalization, and for that, the formula below is given.
Ҩ ɱ = φ ¯ Ҩ ɱ + i L ¯ Ҩ ɱ , Ƅ ¯ Ҩ ɱ + i ¯ Ҩ ɱ , φ _ Ҩ ɱ + i L _ Ҩ ɱ , Ƅ _ Ҩ ɱ + i _ Ҩ ɱ for   benefit   type   of   attribute 1 φ ¯ Ҩ ɱ + i 1 L ¯ Ҩ ɱ , 1 Ƅ ¯ Ҩ ɱ + i 1 ¯ Ҩ ɱ , 1 φ _ Ҩ ɱ + i 1 L _ Ҩ ɱ , 1 Ƅ _ Ҩ ɱ + i 1 _ Ҩ ɱ for   cost   type   of   attribute
Step 2: By employing the
C I F R W A R e * A 1 , R e * A 2 , , R e * A s = t = 1 s t R e * ¯ A t , t = 1 s t   R e * _ A t = 1 t = 1 s 1 φ R e * ¯ A t t + i 1 t = 1 s 1 Ƅ R e * ¯ A t t , t = 1 s L R e * ¯ A t t + i t = 1 s R e * ¯ A t t   , 1 t = 1 s 1 φ R e * _ A t t + i 1 t = 1 s 1 Ƅ R e * _ A t t , t = 1 s L R e * _ A t t + i t = 1 s R e * _ A t t    
and
C I F R W G R e * A 1 , R e * A 2 , , R e * A s = t = 1 s t R e * ¯ A t t , t = 1 s t R e * _ A t t = t = 1 s φ R e * ¯ A t t + i t = 1 s Ƅ R e * ¯ A t t , 1 t = 1 s 1 L R e * ¯ A t t + i 1 t = 1 s 1 R e * ¯ A t t   , t = 1 s φ R e * _ A t t + i t = 1 s Ƅ R e * _ A t t , 1 t = 1 s 1 L R e * _ A t t + i 1 t = 1 s 1 R e * _ A t t
operators to the supposed decision information provided in matrix M , all the aggregated values of alternatives Ă Ҩ , Ҩ = 1 , 2   .   .   . , can be derived.
Step 3: The score values of the aggregated outcomes were investigated by
S F R e * A = 1 8 4 + φ R e * ¯ + Ƅ R e * ¯ + φ R e * _ + Ƅ R e * _ L R e * ¯ R e * ¯ L R e * _ R e * _ , S F R e * A 0 , 1
Step 4: In this step, the alternatives were ranked by employing the score values and achieving the optimal alternative.
Step 5: End.

5.2. Case Study

Choosing the optimal AI architecture for autonomous vehicles is essential for a vehicle manufacturing company that specializes in these vehicles. The company’s main goal is to develop cutting-edge autonomous vehicles that put superior performance, safety, and efficiency first. Four potential AI architectures and four crucial attributes were determined to help achieve these goals and direct the DM process.
Alternatives (AI architectures)
Ă 1 : Recurrent neural networks (RNNs): The potential for processing sequential data is provided by RNNs, which is necessary for making accurate trajectory predictions and motion planning in autonomous vehicles.
Ă 2 : Convolutional neural networks (CNNs): CNNs are well known for their ability to analyze images and identify objects, which is in line with the need for the visual input from cameras and other sensors in autonomous vehicles to be accurately interpreted.
Ă 3 : Graph neural networks (GNNs): In order to simulate complicated road networks and comprehend the spatial interactions between items on the road—a crucial aspect of autonomous systems—GNNs are made to operate with graph-structured data.
Ă 4 : Hybrid neural networks (HNNs): By combining many neural network designs, HNNs might possibly offer a comprehensive solution for a range of autonomous driving issues. However, the implementation’s complexity needs to be weighed against the goals of the business.
Attributes
1 : Accuracy: This is a critical component. Accurate and dependable decision-making abilities of the chosen AI architecture are necessary to guarantee the enhanced performance and safety of autonomous vehicles in a variety of driving conditions.
2 : Computational efficiency: The demands of production revolve around computational efficiency. In order to facilitate prompt answers on the road and improve the overall efficiency of autonomous car manufacturing, the AI architecture must handle data effectively.
3 : Robustness: This is a crucial need. To ensure the safety of passengers and other road users, autonomous vehicles must exhibit a dependable performance in inclement weather, limited visibility, and the presence of unforeseen road obstructions.
4 : Scalability: Being scalable is essential to production. To ensure the scalability of autonomous vehicle manufacturing, the AI architecture must be able to adapt to and handle increasing complexity, facilitate future upgrades, and accommodate a variety of vehicle kinds and configurations.
Further, for each attribute, the considered weights were ( 0.3 ,   0.1 ,   0.2 ,   0.4 ) . Based on these attributes, the company assessed each AI architecture and gave each alternative an assessment score in the framework of a CIFRS to create a CIFR decision matrix, which is revealed in Table 2.
Through the steps below, this MADM was tackled.
Step 1: The data given in Table 2 are of the benefit type, so there was no need to normalize it.
Step 2: Using the CIFRWA operators, the determined aggregated outcome of each alternative was
Ă 1 = 0.585 + i 0.460 , 0.238 + i 0.441 , 0.628 + i 0.262 , 0.209 + i 0.475 Ă 2 = 0.568 + i 0.415 , 0.297 + i 0.278 , 0.777 + i 0.545 , 0.173 + i 0.242 Ă 3 = 0.675 + i 0.524 , 0.239 + i 0.242 , 0.275 + i 0.681 , 0.454 + i 0.252 Ă 4 = 0.653 + i 0.213 , 0.218 + i 0.252 , 0.633 + i 0.444 , 0.265 + i 0.438
Step 3: The obtained score values of S F Ă Ҩ Ҩ = 1 ,   2 ,   3 ,   4 of the CIFRNs Ă Ҩ Ҩ = 1 ,   2 ,   3 ,   4 were
S F Ă 1 = 0.571 , S F Ă 2 = 0.664 , S F Ă 3 = 0.621 , S F Ă 4 = 0.596
Step 4: The values Ă Ҩ Ҩ = 1 ,   2 ,   3 ,   4 were ranked with the following score values S F Ă Ҩ Ҩ = 1 ,   2 ,   3 ,   4 of the overall CIFRNs:
Ă 2 > Ă 3 > Ă 4 > Ă 1 .
From the ranking, it was observed that Ă 2 , or the “convolutional neural network”, was the optimal AI architecture for autonomous vehicles.
Step 5: End.
If we used the CIFRWG operator, then the results of the above problem were as follows:
Step 1: The data given in Table 2 are of the benefit type, so there was no need to normalize it.
Step 2: Using the CIFRWA operators, the determined aggregated outcome of each alternative was
Ă 1 = 0.513 + i 0.375 , 0.298 + i 0.543 , 0.527 + i 0.255 , 0.291 + i 0.618 Ă 2 = 0.506 + i 0.302 , 0.332 + i 0.295 , 0.593 + i 0.488 , 0.319 + i 0.253 Ă 3 = 0.603 + i 0.459 , 0.255 + i 0.404 , 0.247 + i 0.631 , 0.483 + i 0.283 Ă 4 = 0.543 + i 0.163 , 0.296 + i 0.365 , 0.534 + i 0.325 , 0.386 + i 0.477
Step 3: The obtained score values of S F Ă Ҩ Ҩ = 1 ,   2 ,   3 ,   4 of the CIFRNs Ă Ҩ Ҩ = 1 ,   2 ,   3 ,   4 were
S F Ă 1 = 0.490 , S F Ă 2 = 0.586 , S F Ă 3 = 0.565 , S F Ă 4 = 0.505
Step 4: The values Ă Ҩ Ҩ = 1 ,   2 ,   3 ,   4 were ranked with the following score values S F Ă Ҩ Ҩ = 1 ,   2 ,   3 ,   4 of the overall CIFRNs:
Ă 2 > Ă 3 > Ă 4 > Ă 1 .
From the ranking, it was observed that Ă 2 , or the “convolutional neural network”, was the optimal AI architecture for autonomous vehicles.
Step 5: End.

6. Comparison Analysis

This part presents a comparative study to show the validity, superiority, and effectiveness of our suggested methodologies and proposed work. This is because making comparisons is essential for comprehending the importance and effectiveness of any newly created work. We were unable to differentiate between the good and the terrible without a comparison. As a result, the goal of this study was to compare and investigate the decision-making mechanisms of existing models with our proposed work. In this approach, we used some previously published ideas from the theories of FRSs, IFSs, and IFRSs. Following a discussion of a few established theories, we compared them to our new proposed work.
IF AOs by Xu. [21] and geometric AOs based on IFSs by Xu and Yager [22].
IFR AOs for MCDM by Chinram et al. [37].
IFR Frank AOs for MCDM by Yahya et al. [36].
Aczel–Alsina average AOs based on IFRSs by Ahmmad et al. [38].
Confidence level AOs based on IFRSs by Mahmood et al. [39].
Yager AOs based on IFRSs by Mahmood et al. [40].
Next, we employed the already published work that was considered and the interpreted theory to aggregate and solve the information revealed in Table 2, which is in the framework of the CIFRS. The score values and the ranking order after tackling that information are provided in Table 3.
Table 3 reveals that only our anticipated theory solved the information presented in Table 2 (i.e., CIFR information), and none of the current work was able to aggregate and cope with this information because of the certain limitations that every existing theory contains. For instance, Xu [21] and Xu and Yager [22] devised AOs within IFSs, which merely aggregated the information containing TGs and FGs, but were not able to aggregate information containing roughness or additional fuzzy information. Chinram et al. [37], Yahya et al. [36], Ahmmad et al. [38], Mahmood et al. [39], and Mahmood et al. [40] developed various AOs in the framework of IFRSs that could aggregate information containing the roughness and TGs and FGs, and could also aggregate information in the structure of FSs, IFSs, and RSs, but could not aggregate information that contains additional fuzzy information (second dimension). Further, there is no such AO or MADM technique that can aggregate and solve information that contains additional fuzzy information in TGs and FGs along with roughness. This implies that our work is more dominant and valuable than the existing theories. Furthermore, the anticipated theory can reduce the structure of FSs, RSs, IFSs, and IFRSs. In Figure 3, we present a graphical representation of the data given in Table 3, which contained different alternatives in the shape of distinct colors, showing the ranking results.

Theoretical and Practical Implications

Selecting the finest AI architecture for autonomous cars is necessary for a vehicle manufacturing company that specializes in these vehicles. Autonomous cars operate in highly dynamic and uncertain environments. The data collected by sensors are often noisy, incomplete, and subject to varying environmental conditions. CIFRSs provide a valuable framework for addressing these challenges. CIFRSs can be a valuable tool in this context for several reasons. They can help to integrate the data from multiple sensors, with each sensor having its own uncertainties, into a unified representation. This can enhance the car’s perception of its surroundings. CIFRSs can improve the accuracy of object classification, whether they are cars, obstacles, or pedestrians, by considering the inherent ambiguity in sensor data. CIFRSs can support DM modules in autonomous cars, such as sensor data fusion, object classification, path planning, fault detection and diagnoses, obstacles, avoidance, risk assessments, and emergency braking. The application of CIFRSs in selecting the finest architecture for autonomous vehicles has significant practical implications. CIFRSs use both complex TGs and FGs in the form of LA and UA and enhances vehicle safety by improving the accuracy of perception and DM. In case of accidents, a strong understanding of uncertainty through CIFRSs can help to reduce or mitigate liability. Therefore, CIFRSs are a valuable tool for researchers to use in the development of new AI technologies and algorithms for the finest AI architecture.

7. Conclusions

Selecting the best AI architecture for autonomous cars is an MADM problem, as it involves making a complex choice while considering several factors, some of which may have two-dimensional ambiguity and/or indiscernibility. CIFRSs have the ability to consider both complex TGs and FGs in the form of LA and UA. Therefore, in this article, we first provided a unique mathematical framework for dealing with two-dimensional uncertainties and indiscernibility: the “CIFRS”. The elementary operations, such as a union, intersection, complement addition, multiplication, etc., of the anticipated CIFRS are also provided. After that, we developed certain AOs in the environment of CIFRSs, such as CIFRWA, CIFROWA, CIFRWG, and CIFOWG operators. Then, using the developed operators, we anticipated a technique of MADM in the context of CIFRSs and examined the case study “Selection of optimal AI architecture for autonomous vehicles” to determine whether the developed method of MADM was workable. We juxtaposed our original hypothesis with a few contemporary hypotheses in order to illustrate the superiority and domination.

7.1. Limitations

We noticed that the theory of CIFR information is very dominant and valuable. CIFRSs combine the concepts of CIFSs and RSs to handle the uncertainty, vagueness, and indiscernibility in data. Despite their utility, there are several limitations associated with CIFRSs. This is because, in various situations, they do not work effectively, for example, if a person gives information in the form of complex Pythagorean fuzzy sets, complex picture fuzzy sets, or bipolar complex fuzzy sets.

7.2. Advantages

The proposed AI architecture for autonomous vehicles, using an MADM technique with CIFR aggregation operators, offers numerous advantages over the existing architectures, including an enhanced decision-making exactness, optimal architecture selection, flexibility, the enhanced handling of complex decision variables, robustness in real-life situations, and the complete integration of multiple attributes. These benefits make the anticipated architecture better suited to the vibrant and uncertain atmospheres in which autonomous vehicles operate, potentially leading to much safer and efficient autonomous driving systems across the world.

7.3. Future Work

Our objective for the future is to expand this theory into the framework of bipolar complex fuzzy sets [41,42,43], graph theory [44,45,46], and picture fuzzy sets [47,48].

Author Contributions

Conceptualization, T.M. and U.u.R.; Methodology, T.M., A.I., K.H., M.A. and U.u.R.; Validation, T.M., A.I., K.H., M.A. and U.u.R.; Investigation, T.M., A.I., K.H., M.A. and U.u.R.; Resources, T.M., K.H. and M.A.; Writing—original draft, A.I.; Visualization, U.u.R.; Supervision, T.M.; Project administration, M.A.; Funding acquisition, K.H. All authors have read and agreed to the published version of the manuscript.

Funding

This paper is supported by the NRPU-HEC Pakistan Project Number 14662 and the joint project PSF(PSF-NSFC/JSEP/ENG/AJKUKAJK/01)-NSFC(12211540710).

Data Availability Statement

The data will be available from the corresponding author upon reasonable request.

Conflicts of Interest

With regards to the publication of this manuscript, the authors declare that they have no conflicts of interest.

References

  1. Zadeh, L.A. Fuzzy sets. Inf. Control 1965, 8, 338–353. [Google Scholar] [CrossRef]
  2. Pawlak, Z. Rough sets. Int. J. Comput. Inf. Sci. 1982, 11, 341–356. [Google Scholar] [CrossRef]
  3. Dubois, D.; Prade, H. Rough fuzzy sets and fuzzy rough sets. Int. J. Gen. Syst. 1990, 17, 191–209. [Google Scholar] [CrossRef]
  4. Cornelis, C.; De Cock, M.; Kerre, E.E. Intuitionistic fuzzy rough sets: At the crossroads of imperfect knowledge. Expert Syst. 2003, 20, 260–270. [Google Scholar] [CrossRef]
  5. Ma, Y.; Wang, Z.; Yang, H.; Yang, L. Artificial intelligence applications in the development of autonomous vehicles: A survey. IEEE/CAA J. Autom. Sin. 2020, 7, 315–329. [Google Scholar] [CrossRef]
  6. Khayyam, H.; Javadi, B.; Jalili, M.; Jazar, R.N. Artificial intelligence and internet of things for autonomous vehicles. In Nonlinear Approaches in Engineering Applications: Automotive Applications of Engineering Problems; Springer: Berlin/Heidelberg, Germany, 2020; pp. 39–68. [Google Scholar]
  7. Pereira, J.L.; Rossetti, R.J. An integrated architecture for autonomous vehicles simulation. In Proceedings of the 27th Annual ACM Symposium on Applied Computing, Trento, Italy, 26–30 March 2012; pp. 286–292. [Google Scholar]
  8. Kurzidem, I.; Saad, A.; Schleiss, P. A systematic approach to analyzing perception architectures in autonomous vehicles. In Proceedings of the Model-Based Safety and Assessment: 7th International Symposium 2020, IMBSA 2020, Lisbon, Portugal, 14–16 September 2020; Proceedings 7. pp. 149–162. [Google Scholar]
  9. Bathla, G.; Bhadane, K.; Singh, R.K.; Kumar, R.; Aluvalu, R.; Krishnamurthi, R.; Kumar, A.; Thakur, R.N.; Basheer, S. Autonomous vehicles and intelligent automation: Applications, challenges, and opportunities. Mob. Inf. Syst. 2022, 2022, 7632892. [Google Scholar] [CrossRef]
  10. Zong, W.; Zhang, C.; Wang, Z.; Zhu, J.; Chen, Q. Architecture design and implementation of an autonomous vehicle. IEEE Access 2018, 6, 21956–21970. [Google Scholar] [CrossRef]
  11. Bendiab, G.; Hameurlaine, A.; Germanos, G.; Kolokotronis, N.; Shiaeles, S. Autonomous vehicles security: Challenges and solutions using blockchain and artificial intelligence. IEEE Trans. Intell. Transp. Syst. 2023, 24, 3614–3617. [Google Scholar] [CrossRef]
  12. Esogbue, A.O.; Theologidu, M.; Guo, K. On the application of fuzzy sets theory to the optimal flood control problem arising in water resources systems. Fuzzy Sets Syst. 1992, 48, 155–172. [Google Scholar] [CrossRef]
  13. Guiffrida, A.L.; Nagi, R. Fuzzy set theory applications in production management research: A literature survey. J. Intell. Manuf. 1998, 9, 39–56. [Google Scholar] [CrossRef]
  14. Driankov, D.; Saffiotti, A. (Eds.) Fuzzy Logic Techniques for Autonomous Vehicle Navigation; Physica: Berlin/Heidelberg, Germany, 2013; Volume 61. [Google Scholar]
  15. Wang, X.; Fu, M.; Ma, H.; Yang, Y. Lateral control of autonomous vehicles based on fuzzy logic. Control Eng. Pract. 2015, 34, 1–17. [Google Scholar] [CrossRef]
  16. Awad, N.; Lasheen, A.; Elnaggar, M.; Kamel, A. Model predictive control with fuzzy logic switching for path tracking of autonomous vehicles. ISA Trans. 2022, 129, 193–205. [Google Scholar] [CrossRef]
  17. Atanassov, K.T.; Stoeva, S. Intuitionistic fuzzy sets. Fuzzy Sets Syst. 1986, 20, 87–96. [Google Scholar] [CrossRef]
  18. Dengfeng, L.; Chuntian, C. New similarity measures of intuitionistic fuzzy sets and application to pattern recognitions. Pattern Recognit. Lett. 2002, 23, 221–225. [Google Scholar] [CrossRef]
  19. De, S.K.; Biswas, R.; Roy, A.R. An application of intuitionistic fuzzy sets in medical diagnosis. Fuzzy Sets Syst. 2001, 117, 209–213. [Google Scholar] [CrossRef]
  20. Garg, H.; Rani, D. Novel distance measures for intuitionistic fuzzy sets based on various triangle centers of isosceles triangular fuzzy numbers and their applications. Expert Syst. Appl. 2022, 191, 116228. [Google Scholar] [CrossRef]
  21. Xu, Z. Intuitionistic fuzzy aggregation operators. IEEE Trans. Fuzzy Syst. 2007, 15, 1179–1187. [Google Scholar]
  22. Xu, Z.; Yager, R.R. Some geometric aggregation operators based on intuitionistic fuzzy sets. Int. J. Gen. Syst. 2006, 35, 417–433. [Google Scholar] [CrossRef]
  23. Jia, X.; Wang, Y. Choquet integral-based intuitionistic fuzzy arithmetic aggregation operators in multi-criteria decision-making. Expert Syst. Appl. 2022, 191, 116242. [Google Scholar] [CrossRef]
  24. Ecer, F. An extended MAIRCA method using intuitionistic fuzzy sets for coronavirus vaccine selection in the age of COVID-19. Neural Comput. Appl. 2022, 34, 5603–5623. [Google Scholar] [CrossRef]
  25. Ramot, D.; Milo, R.; Friedman, M.; Kandel, A. Complex fuzzy sets. IEEE Trans. Fuzzy Syst. 2002, 10, 171–186. [Google Scholar] [CrossRef]
  26. Tamir, D.E.; Jin, L.; Kandel, A. A new interpretation of complex membership grade. Int. J. Intell. Syst. 2011, 26, 285–312. [Google Scholar] [CrossRef]
  27. Zhang, G.; Dillon, T.S.; Cai, K.Y.; Ma, J.; Lu, J. Operation properties and δ-equalities of complex fuzzy sets. Int. J. Approx. Reason. 2009, 50, 1227–1249. [Google Scholar] [CrossRef]
  28. Hu, B.; Bi, L.; Dai, S.; Li, S. Distances of complex fuzzy sets and continuity of complex fuzzy operations. J. Intell. Fuzzy Syst. 2018, 35, 2247–2255. [Google Scholar] [CrossRef]
  29. ur Rehman, U. Selection of Database Management System by Using Multi-Attribute Decision-Making Approach Based on Probability Complex Fuzzy Aggregation Operators. J. Innov. Res. Math. Comput. Sci. 2023, 2, 1–16. [Google Scholar]
  30. Zhou, L.; Wu, W.Z. On generalized intuitionistic fuzzy rough approximation operators. Inf. Sci. 2008, 178, 2448–2465. [Google Scholar] [CrossRef]
  31. Zhou, L.; Wu, W.Z. Characterization of rough set approximations in Atanassov intuitionistic fuzzy set theory. Comput. Math. Appl. 2011, 62, 282–296. [Google Scholar] [CrossRef]
  32. Bustince, H.; Burillo, P. Structures on intuitionistic fuzzy relations. Fuzzy Sets Syst. 1996, 78, 293–303. [Google Scholar] [CrossRef]
  33. Zhang, X.; Zhou, B.; Li, P. A general frame for intuitionistic fuzzy rough sets. Inf. Sci. 2012, 216, 34–49. [Google Scholar] [CrossRef]
  34. Yun, S.M.; Lee, S.J. Intuitionistic fuzzy rough approximation operators. Int. J. Fuzzy Log. Intell. Syst. 2015, 15, 208–215. [Google Scholar] [CrossRef]
  35. Zhang, Z. Generalized intuitionistic fuzzy rough sets based on intuitionistic fuzzy coverings. Inf. Sci. 2012, 198, 186–206. [Google Scholar] [CrossRef]
  36. Yahya, M.; Naeem, M.; Abdullah, S.; Qiyas, M.; Aamir, M. A novel approach on the intuitionistic fuzzy rough frank aggregation operator-based EDAS method for multicriteria group decision-making. Complexity 2021, 2021, 5534381. [Google Scholar] [CrossRef]
  37. Chinram, R.; Hussain, A.; Mahmood, T.; Ali, M.I. EDAS method for multi-criteria group decision making based on intuitionistic fuzzy rough aggregation operators. IEEE Access 2021, 9, 10199–10216. [Google Scholar] [CrossRef]
  38. Ahmmad, J.; Mahmood, T.; Mehmood, N.; Urawong, K.; Chinram, R. Intuitionistic Fuzzy Rough Aczel-Alsina Average Aggregation Operators and Their Applications in Medical Diagnoses. Symmetry 2022, 14, 2537. [Google Scholar] [CrossRef]
  39. Mahmood, T.; Ahmmad, J.; Ali, Z.; Yang, M.S. Confidence Level Aggregation Operators Based on Intuitionistic Fuzzy Rough Sets With Application in Medical Diagnosis. IEEE Access 2023, 11, 8674–8688. [Google Scholar] [CrossRef]
  40. Mahmood, T.; Ahmmad, J.; ur Rehman, U.; Khan, M.B. Analysis and Prioritization of the Factors of the Robotic Industry with the Assistance of EDAS Technique Based on Intuitionistic Fuzzy Rough Yager Aggregation Operators. IEEE Access 2023, 11, 50462–50479. [Google Scholar] [CrossRef]
  41. Mahmood, T.; Ur Rehman, U. A novel approach towards bipolar complex fuzzy sets and their applications in generalized similarity measures. Int. J. Intell. Syst. 2022, 37, 535–567. [Google Scholar] [CrossRef]
  42. Gwak, J.; Garg, H.; Jan, N. Hybrid integrated decision-making algorithm for clustering analysis based on a bipolar complex fuzzy and soft sets. Alex. Eng. J. 2023, 67, 473–487. [Google Scholar] [CrossRef]
  43. Gwak, J.; Garg, H.; Jan, N.; Akram, B. A new approach to investigate the effects of artificial neural networks based on bipolar complex spherical fuzzy information. Complex Intell. Syst. 2023, 9, 4591–4614. [Google Scholar] [CrossRef]
  44. Akram, M.; Sarwar, M.; Dudek, W.A. Graphs for the Analysis of Bipolar Fuzzy Information; Springer: Berlin, Germany, 2021; Volume 401, p. 452. [Google Scholar]
  45. Akram, M.; Akmal, R. Application of bipolar fuzzy sets in graph structures. Appl. Comput. Intell. Soft Comput. 2016, 2016, 5859080. [Google Scholar] [CrossRef]
  46. Akram, M. Bipolar fuzzy graphs. Inf. Sci. 2011, 24, 5548–5564. [Google Scholar] [CrossRef]
  47. Ozer, O. Hamacher Prioritized Aggregation Operators Based on Complex Picture Fuzzy Sets and Their Applications in Decision-Making Problems. J. Innov. Res. Math. Comput. Sci. 2022, 1, 33–54. [Google Scholar]
  48. Khan, Q.; Jabeen, K. Schweizer-Sklar Aggregation Operators with Unknown Weight for Picture Fuzzy Information. J. Innov. Res. Math. Comput. Sci. 2022, 1, 83–106. [Google Scholar]
Figure 1. Data fusion algorithm.
Figure 1. Data fusion algorithm.
Wevj 15 00402 g001
Figure 2. Basic 4 pillars of AI architecture for autonomous vehicle.
Figure 2. Basic 4 pillars of AI architecture for autonomous vehicle.
Wevj 15 00402 g002
Figure 3. Comparison between proposed work and work established by Xu [21], Xu and Yager [22], Chinram et al. [37], Yahya et al. [36], Ahmmad et al. [38] and Mehmood et al. [39,40].
Figure 3. Comparison between proposed work and work established by Xu [21], Xu and Yager [22], Chinram et al. [37], Yahya et al. [36], Ahmmad et al. [38] and Mehmood et al. [39,40].
Wevj 15 00402 g003
Table 1. CIFR.
Table 1. CIFR.
R e * š 1 * š 2 * š 3 * š 4 *
š 1 * 0.3 + ι 0.4 , 0.5 + ι 0.2 0.6 + ι 0.4 ,   ( 0.3 + ι 0.5 ) 0.3 + ι 0.4 ,   ( 0.2 + ι 0.3 ) 0.2 + ι 0.6 ,   ( 0.5 + ι 0.3 )
š 2 * 0.4 + ι 0.2 ,   ( 0.5 + ι 0.6 ) 0.2 + ι 0.3 ,   ( 0.7 + ι 0.2 ) 0.5 + ι 0.6 ,   ( 0.5 + ι 0.4 ) 0.7 + ι 0.8 ,   ( 0.2 + ι 0.1 )
š 3 * 0.6 + ι 0.3 ,   ( 0.3 + ι 0.7 ) 0.3 + ι 0.4 ,   ( 0.5 + ι 0.4 ) 0.4 + ι 0.3 ,   ( 0.3 + ι 0.6 ) 0.3 + ι 0.4 ,   ( 0.6 + ι 0.3 )
š 4 * 0.7 + ι 0.4 ,   ( 0.2 + ι 0.6 ) 0.5 + ι 0.7 ,   ( 0.4 + ι 0.2 ) 0.5 + ι 0.6 ,   ( 0.4 + ι 0.3 ) 0.5 + ι 0.6 ,   ( 0.5 + ι 0.3 )
Table 2. Complex intuitionistic fuzzy rough numbers.
Table 2. Complex intuitionistic fuzzy rough numbers.
1 2 3 4
Ă 1 0.3 + ι 0.7 , 0.5 + ι 0.2 , 0.4 + ι 0.3 , 0.4 + ι 0.2 0.4 + ι 0.5 , 0.3 + ι 0.4 , 0.7 + ι 0.3 , 0.1 + ι 0.5 0.7 + ι 0.2 , 0.1 + ι 0.6 , 0.3 + ι 0.3 , 0.5 + ι 0.6 0.7 + ι 0.3 , 0.2 + ι 0.7 , 0.8 + ι 0.2 , 0.1 + ι 0.8
Ă 2 0.4 + ι 0.1 , 0.5 + ι 0.3 , 0.8 + ι 0.4 , 0.1 + ι 0.3 0.2 + ι 0.3 , 0.3 + ι 0.4 , 0.4 + ι 0.3 , 0.5 + ι 0.4 0.6 + ι 0.4 , 0.3 + ι 0.4 , 0.2 + ι 0.8 , 0.7 + ι 0.2 0.7 + ι 0.6 , 0.2 + ι 0.2 , 0.9 + ι 0.5 , 0.1 + ι 0.2
Ă 3 0.6 + ι 0.3 , 0.2 + ι 0.7 , 0.3 + ι 0.5 , 0.4 + ι 0.3 0.2 + ι 0.4 , 0.3 + ι 0.5 , 0.4 + ι 0.4 , 0.5 + ι 0.6 0.6 + ι 0.4 , 0.4 + ι 0.2 , 0.1 + ι 0.7 , 0.3 + ι 0.2 0.8 + ι 0.7 , 0.2 + ι 0.1 , 0.3 + ι 0.8 , 0.6 + ι 0.2
Ă 4 0.8 + ι 0.3 , 0.1 + ι 0.6 , 0.4 + ι 0.7 , 0.6 + ι 0.3 0.2 + ι 0.5 , 0.6 + ι 0.3 , 0.2 + ι 0.6 , 0.5 + ι 0.3 0.3 + ι 0.1 , 0.5 + ι 0.4 , 0.6 + ι 0.2 , 0.4 + ι 0.5 0.7 + ι 0.1 , 0.2 + ι 0.1 , 0.8 + ι 0.2 , 0.1 + ι 0.6
Table 3. Comparative study between proposed and existing work.
Table 3. Comparative study between proposed and existing work.
MethodsScore Values of Alternatives
Ă 1   Ă 2   Ă 3   Ă 4
Rankings
Xu [18]
Xu and Yager [19]
Chinram et al. [37]
Yahya et al. [36]
Ahmmad et al. [38]
Mahmood et al. [39]
Mahmood et al. [40]
Interpreted theory0.571, 0.664, 0.621, 0.596 Ă 2 > Ă 3 > Ă 4 > Ă 1
Interpreted theory0.491, 0.586, 0.565, 0.505 Ă 2 > Ă 3 > Ă 4 > Ă 1
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Mahmood, T.; Idrees, A.; Hayat, K.; Ashiq, M.; Rehman, U.u. Selection of AI Architecture for Autonomous Vehicles Using Complex Intuitionistic Fuzzy Rough Decision Making. World Electr. Veh. J. 2024, 15, 402. https://doi.org/10.3390/wevj15090402

AMA Style

Mahmood T, Idrees A, Hayat K, Ashiq M, Rehman Uu. Selection of AI Architecture for Autonomous Vehicles Using Complex Intuitionistic Fuzzy Rough Decision Making. World Electric Vehicle Journal. 2024; 15(9):402. https://doi.org/10.3390/wevj15090402

Chicago/Turabian Style

Mahmood, Tahir, Ahmad Idrees, Khizar Hayat, Muhammad Ashiq, and Ubaid ur Rehman. 2024. "Selection of AI Architecture for Autonomous Vehicles Using Complex Intuitionistic Fuzzy Rough Decision Making" World Electric Vehicle Journal 15, no. 9: 402. https://doi.org/10.3390/wevj15090402

Article Metrics

Back to TopTop