Next Article in Journal
Study of the Micro-Vibration Response and Related Vibration Isolation of Complex Traffic Load-Induced Experimental Buildings
Previous Article in Journal
New Results on Differential Subordination and Superordination for Multivalent Functions Involving New Symmetric Operator
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Multi-Attribute Three-Way Decision Approach Based on Ideal Solutions under Interval-Valued Fuzzy Soft Environment

by
Hongwu Qin
1,2,*,
Yanyan Han
2 and
Xiuqin Ma
2
1
Department of Computer Science, Gansu Minzu Normal University, Hezuo 747000, China
2
College of Computer Science and Engineering, Northwest Normal University, Lanzhou 730070, China
*
Author to whom correspondence should be addressed.
Symmetry 2024, 16(10), 1327; https://doi.org/10.3390/sym16101327
Submission received: 4 September 2024 / Revised: 27 September 2024 / Accepted: 1 October 2024 / Published: 8 October 2024
(This article belongs to the Section Computer)

Abstract

:
The interval-valued fuzzy soft set (IVFSS) model, which combines the benefits of the soft set model with the interval-valued fuzzy set (IVFS) model, is a growing and effective mathematical tool for processing hazy data. In detail, this model is characterized by symmetry, which has the lower and upper membership degree. The study of decision-making based on IVFSS has picked up more steam recently. However, existing multi-attribute decision-making (MADM) methods can only sort alternative schemes, but are not able to classify them, which is detrimental to decision-makers’ efficient decision-making. In this paper, we propose a multi-attribute three-way decision-making (MATWDM) algorithm based on ideal solutions for IVFSS. MATWDM is extended to the IVFSS environment by incorporating the concept of the ideal solution, offering a more adaptable and comprehensive approach for addressing uncertain MADM issues. The method not only obtains the ranking results of the alternatives, but also divides them into acceptance domain, rejection domain, and delayed-decision domain, which makes the decision results more reasonable and effective, facilitating decision-makers to make better decisions. We apply the proposed three-way decision algorithm to two practical cases as diverse as mine emergency decision and Homestay selection decision. Additionally, the effectiveness and viability of the suggested method are confirmed by experimental findings.

1. Introduction

Uncertain, hazy, and suspect data from many walks of life have caused confusion and even more harmful effects in numerous fields. The enhancive needs can no longer be fully satisfied by the earlier mathematical tools. Because of this, in 1999, the eminent Russian researcher Molodtsov [1] developed soft set (SS) theory, which differs from other earlier mathematical techniques. Since the theory is unaffected by inadequate parameterization, it is frequently used in a variety of contexts, including decision-making [2,3,4], data mining [5], medical diagnosis [6], and so on. Later, many researchers began to investigate the extended models of the SS, including fuzzy SS [7], Confidence SS [8], intuitionistic fuzzy SS [9], Pythagorean fuzzy SS [10], Interval-valued intuitionistic fuzzy SS [11,12], Fermatean fuzzy soft expert set [13], complex picture fuzzy SS [14], and so on. These expanded models were applied regularly in a variety of contexts, including parameter reduction [15], medical diagnosis [16], generative adversarial networks [14], and decision-making (DM).
One of them that deserves particular notice is the IVFSS model put forth by Yang et al. [17] in 2009. Since we frequently cannot use precise data to explain the ambiguity, it is more acceptable to have interval data to provide an estimated range at that moment; and due to having the lower and upper membership degree, this model is characterized by symmetry. Yang et al. [17] first offered a score-based decision-making approach for IVFSS. Based on the novel idea of level SS, Feng [18] introduced a customizable decision-making algorithm, which is a development and enhancement over Yang et al.’s algorithm. A novel efficient DM algorithm based on IVFSS was proposed by Ma [19]. When making stochastic multi-criteria decisions and emergency decisions, the combined weights for IVFSS [20,21] were taken into account. The realization that some factors are not necessary for making decisions gave rise to the concept of parameter reduction. In [22], a novel Pearson’s Product Moment Coefficient-based parameter reduction approach for IVFSS was provided; and a parameter reduction method by means of Euclidean distance (ED) was introduced in [23].
Three-way decision-making (3WDM), first put out by [24], offers a fresh idea and approach to dealing with risk and uncertainty. The 3WDM technique entails creating three different types of decision rules that result in three-decision outcomes such as acceptance, rejection, and noncommitment [24]. The ability of 3WDM to solve issues in a way that is congruent with human cognition has grown in popularity in recent years. Rough sets have not been a restriction of the 3WDM theory thus far. Fuzzy sets [25], intuitionistic fuzzy sets [26], Pythagorean fuzzy sets [27,28], shadow sets [29], and other contexts have all made extensive use of it. Based on the data-information–knowledge-wisdom hierarchical structure model and the notion of 3WDM, ref. [30] developed a three-way computing framework and provided a three-layer conceptual model suitable for intelligent data analysis [31]. Yao also applied cognitive science to the three branches of DM theory and established the acceptance domain (AD), rejection domain (RD), and boundary domain as three separate cognitive regions in humans [32]. This led many researchers to combine the 3WDM model with conceptual analysis [33], granular computing [34], conflict analysis [35,36,37], multi-attribute decision [38,39], and concept lattice [40,41]. Later, 3WDM was expanded to the dynamic environment, leading to the development of numerous DM techniques, including sequential 3WDM [42,43], multi-class 3WDM [44], multi-granulation 3WDM [45] and multi-scale 3WDM [46]. The 3WDM theory is currently utilized frequently in medical diagnosis [47], image recognition [48], sentiment classification [49] and so on.
However, in the IVFSS environment, few documents focus on 3WDM. Alternatives cannot be classified by the current MADM methods, which is damaging to decision-makers ability to make efficient decisions. Therefore, in this study, we present a MATWDM algorithm that is based on ideal solutions for IVFSS. The study has made the following important contributions:
(1)
MATWDM is extended to IVFSS and based on the ideal solution (IS) provides a more flexible and all-encompassing approach for handling uncertain MADM problems.
(2)
In addition to obtaining the ranking results for the alternatives, the approach also divides them into domains for acceptance, rejection, and postponed decision, which improves the decision results by making them more rational and effective while helping decision-makers make better choices.
(3)
We put the proposed method under consideration in real-world scenarios, which were as diverse as mine emergency decision-making and the Homestay evaluation system.
The rest of this essay is structured as follows. Firstly, we review some fundamental definitions of IVFSS, fuzzy SS, and SS. We also go over the four current techniques’ drawbacks. In Section 3, we present a new MATWDM algorithm that is based on IS for IVFSS. In Section 4, we provide two real cases to demonstrate the viability of our approach. Finally, we wrap up the paper with a summary.

2. Preliminaries and Related Work

In this section, we merely review some fundamental ideas related to SS, fuzzy SS, IVFSS, and the MADM techniques currently in use for IVFSS.

2.1. Basic Concepts

Definition 1 
([1]). Let U be an initial non-empty universe of alternatives, E be a set of attributes in relation to alternatives in U. Let P(U) be the power set of U, and A be a subset of E. A pair (F, A) is called a SS over U, where F is a mapping given by F: E → P(U).
Definition 2 
([7]). Let E be a set of attributes and U be the initial universe set. The set of all fuzzy sets in universe U is denoted as F(U). A pair ( F ˜ , E) is called a fuzzy SS over U, where F ˜  is a mapping given by F ˜ :E→F(U).
Definition 3 
([50]). An IVFS X ^  on an universe U is a mapping such that X ^ : U I n t 0 ,   1 , where I n t 0 , 1  denotes the set of all closed sub-intervals of [0, 1], the set of all IVFSs on U is represented by ψ ˜ U  Let X ^ ψ ˜ U , for every x U , where ψ ˜ U  denotes the set of all IVFSs on U. μ x ^ x  and μ x ^ + x  represent the lower and upper degrees of membership x to X ^ 0 μ x ^ x μ x ^ + x 1  espectively, while   μ X ^ x = μ x ^ x , μ x ^ + x  is regarded as the degree of membership of an element x to X ^ .
Definition 4 
([17]). Let U be an initial universe of alternatives and E be a set of attributes in relation to alternatives in U. A pair ( ω ˜ , E) is referred to an IVFSS over ψ ˜ U , where ω ˜  is a mapping given by ω ˜ : E → ψ ˜ U .

2.2. The Existing MADM Algorithms Based on IVFSS

In this part, we review the four current MADM algorithms (Algorithms 1–4) based on IVFSS and point out the disadvantages of them.
Algorithm 1. WDBA based MADM method for IVFSS [20]
Input:Decision matrix based on IVFSS φ , E .
Step 1: Normalize the input IVFSS matrix.
Step 2: Based on the values of the subjective and objective weights, calculate the total weight.
Step 3: Determine the normalized IVFSS matrix’s scoring matrix.
Step 4: Create the standardized matrix using the mean, average, and corrected deviation matrices.
Step 5: Calculate the ideal and anti-ideal points using standardized matrices.
Step 6: Substitute the weighted EDs and calculate W E D i + and W E D i .
Step 7: Calculating each candidate’s suitability index value.
Step 8: Sort the candidates based on the values of the suitability index.
Output: The ranked objects.
Algorithm 2. CODAS based MADM method for IVFSS [20]
Input:Decision matrix based on IVFSS φ , E .
Step 1: Normalize the input IVFSS matrix.
Step 2: According to the subjective and objective weights, calculate the total weight.
Step 3: Determine the normalized IVFSS matrix’s scoring matrix.
Step 4: Compute the weighted and normalized decision matrix.
Step 5: Get the negative-ideal solution NIS and calculate the ED and the Hamming distance (HD) from the NIS.
Step 6: Create the relative evaluation matrix RA.
Step 7: Determine the evaluation score for every candidate.
Step 8: Arrange the options in decreasing order of assessment RA values.
Output: The ranked objects.
Algorithm 3. Similarity measure based MADM method for IVFSS [20]
Input:Decision matrix based on IVFSS φ , E .
Step 1: Normalize the input IVFSS matrix.
Step 2: Calculate the total weight according to the subjective and objective weights.
Step 3: Determine the similarity measure.
Step 4: Arrange the options in decreasing order of similarity measure values.
Output: The ranked objects.
Algorithm 4. A new efficient MADM method for IVFSS [19]
Input:Decision matrix based on IVFSS φ , E .
Step 1: Obtain the choice value.
Step 2: Determine the total choice value.
Step 3: Sort the candidates according to the total choice values.
Output: The ranked objects.
We give the following example to demonstrate the four above methods and tend to find the disadvantages of them.
Example 1. 
Assuming that we obtain an IVFSS evaluation matrix as shown in Table 1, where U = h 1 , h 2 , h 3 , h 4 , h 5  represents the five alternatives and E = e 1 , e 2 , e 3 , e 4 , e 5  represents the attributes of the alternatives. The weight given by the evaluator based on previous experience or preferences is: w = w 1 , w 2 , w 3 , w 4 , w 5 = 0.35 , 0.15 , 0.15 , 0.15 , 0.2 .
The four above MADM methods for IVFSS are used for addressing the DM issue in Table 1, and the decision results are presented in Table 2.
h1 and h5 are the best and worst options respectively, according to Table 2. It is clear that the four existing methods are only able to rank alternative schemes but are not capable of classifying them. In some real-life applications, we not only want to know the sorting results of the candidates, but also want to know which candidates can be accepted, rejected, or delayed made decision, which is very important for decision-makers. That is, in many practical scenes, when there are too many alternatives, traditional MADM methods can only obtain the ranking results of alternative solutions and find the optimal choice but cannot directly make a decision to put alternatives into AD, RD and delayed-decision domain, which is unfavorable for decision-makers to make decisions. Therefore, in order to solve this pressing problem, we propose the following MATWDM algorithm based on IS under IVFSS environment.

3. A New MATWDM Approach Based on Ideal Solutions under IVFSS

In this part, we first suggest a few fresh definitions. Subsequently, we proposed a MATWDM algorithm based on ideal solutions in the IVFSS environment inspired by the method in [39] and introduce the implementation process of the algorithm through an example.

3.1. The Related Definitions

Definition 5. 
Given two interval-valued fuzzy soft number s ˜ 1 = μ 1 , μ 1 +  and s ˜ 2 = μ 2 , μ 2 + , the distance between them is defined as:
d s ˜ 1 , s ˜ 2 = 1 2 ( | μ 1 μ 2 | p + | μ 1 + μ 2 + | p ) p
When p = 1 , it denotes HD; when p = 2 , it means ED.
Definition 6. 
The distance between two alternatives A1 and A2 is defined as:
D A 1 , A 2 = 1 2 n i = 1 n μ 1 μ 2 | p + μ 1 + μ 2 + | p p
Here, n is the number of attributes. If we consider the weight, this distance can be given as:
D w A 1 , A 2 = 1 2 i = 1 n w i μ 1 μ 2 | p + μ 1 + μ 2 + | p p
Here W = w 1 , w 2 , , w n , w i is the weight of the attribute Ci and i = 1 n w i = 1 . Similarly, when p = 1 , it denotes HD; when p = 2 , it means ED.
Definition 7. 
Note s ˜ P I S i  and  s ˜ N I S i  as the positive and negative IS on the IVFSS, respectively. On the IVFSS, three IS determination methods are proposed as follows.
(1)
Type 1 ideal solution (T1IS): using the endpoint of the value range as the IS scheme.
Positive ideal solution:
S ˜ P I S 1 =   1 , 1 , C   is   a   benefit   attribute 0 , 0 , C   is   a   cos t   attribute
Negative ideal solution:
S ˜ N I S 1 = 0 , 0 , C   is   a   benefit   attribute 1 , 1 , C   is   a   cos t   attribute
(2)
Type 2 ideal solution (T2IS): using the best and worst values as IS.
Positive ideal solution:
S ˜ P I S 2 = max s i ˜ , C   is   a   benefit   attribute min s i ˜ , C   is   a   cos t   attribute ,
Negative ideal solution:
S ˜ N I S 2 = min s i ˜ , C   is   a   benefit   attribute max s i ˜ , C   is   a   cos t   attribute ,
where i 1 ,   2 , , n .
(3)
Type 3 ideal solution (T3IS): Selecting IS through intervals of membership and non-membership.
Positive ideal solution:
S ˜ P I S 3 =   m a x μ i , m a x μ i + , C   is   a   benefit   attribute m i n μ i , m i n μ i + , C   is   a   cos t   attribute ,
Negative ideal solution:
S ˜ N I S 3 =   m i n μ i , m i n μ i + , C   is   a   benefit   attribute m a x μ i , m a x μ i + , C   is   a   cos t   attribute ,
Definition 8. 
The threshold calculation formula is derived from the weighted distance between the IS and the evaluation matrix as follows:
α i = 1 σ D w S ˜ i , S ˜ P I S 1 σ D w S ˜ i , S ˜ P I S + σ D w S ˜ i , S ˜ N I S
β i = σ D w S ˜ i , S ˜ P I S σ D w S ˜ i , S ˜ P I S + 1 σ D w S ˜ i , S ˜ N I S
γ i = D w S ˜ i , S ˜ P I S D w S ˜ i , S ˜ P I S + D w S ˜ i , S ˜ N I S
where the risk avoidance parameter is described by means of σ and σ 0 ,   1 . The decision-makers’ risk tolerance determines the value of σ. A higher σ value may be selected if the decision-makers want findings that are certain or accurate. A smaller σ value can be set if the decision-makers prefer fuzzy or ambiguous results. Therefore, decision-makers are more resistant to hesitant decisions the higher the risk avoidance coefficient.
Determine the action that the decision-maker should take for an object S i according to the relationship between the threshold and conditional probability.
  • (P) If Pr ( C | S i ) α i , and Pr ( C | S i ) γ i , S i P O S ( C )
  • (B) If Pr ( C | S i ) α i , and Pr ( C | S i ) β i , S i B N D ( C )
  • (N) If Pr ( C | S i ) β i , and Pr ( C | S i ) γ i , S i N E G ( C )
Definition 9. 
According to the weighted distance value, the combined score value can be computed as
δ i = D w ( S ˜ i , S ˜ P I S ) D w ( S ˜ i , S ˜ P I S ) + D w ( S ˜ i , S ˜ N I S )
The higher the combined score, the more likely the decision-maker will choose alternative object S i .

3.2. The Proposed Method

Following the definitions above, we provide our algorithm (Algorithm 5) as follows:
Algorithm 5. A MATWDM algorithm based on ideal solutions for IVFSS
Input:Decision matrix based on IVFSS φ , E and the risk avoidance parameter σ.
Step 1: Obtain the three types positive and negative ideal solutions for the input decision matrix.
Step 2: Determine weighted ED (weight HD) between every interval-valued fuzzy soft number and the three types positive and negative ideal solutions for each candidate by Formula (3).
Step 3: Achieve the thresholds for each object based on the above weighted ED (weight HD) by Formulas (10)–(12).
Step 4: Determine which behavior to take for the object (accept, delay decision, reject), according to the relationship between threshold and conditional probability.
Step 5: Compute the combined score value δ i based on the weighted distance value by Formula (13).
Step 6: Sort the candidates based on the combined score value.
Output: The ranked and classified candidates.

3.3. An Example

According to the above algorithm steps, we illustrate the algorithm and its implementation process through the following Example 1.
Example 1. 
In the IVFSS evaluation matrix, U = h 1 , h 2 , , h 12  represents the 12 alternative objects, and E = e 1 , e 2 , e 3 , e 4 , e 5 , e 6  represents the 6 attributes possessed by the objects. Besides, the decision-makers provide different attribute weights w i = w 1 , w 2 , w 3 , w 4 , w 5 , w 6 = 0.12 , 0.18 , 0.3 , 0.16 , 0.14 , 0.1 . Table 3 shows the evaluation matrix in the form of IVFSS.
We apply the suggested approach to resolve the problem of DM in Table 3.
Step 1: Three types of positive and negative ISs are obtained for Table 3, as shown in Table 4.
Step 2: According to Formula (3), calculate the weighted ED (weight HD) between the evaluation value and the three types of ISs for each object, displayed in Table 5 and Table 6.
Step 3: According to Formulas (10), (11), and (12), calculate the thresholds corresponding to different types of ideal solutions under weighted ED (weight HD). In this decision-making problem, assuming that there is no uncertainty preference difference between attributes, the consistent risk avoidance coefficient is σ = 0.45 .
The following is the solution process of threshold values corresponding to different ideal solutions of h 1 under weighted Euclidean distance:
α 1 = ( 1 σ ) D W ( A i , A P I S ) ( 1 σ ) D W ( A i , A P I S ) + σ D W ( A i , A N I S ) = ( 1 0.45 ) × 0.235 ( 1 0.45 ) × 0.235 + 0.45 × 0.795 = 0.266
β 1 = σ D W ( A i , A P I S ) σ D W ( A i , A P I S ) + ( 1 σ ) D W ( A i , A N I S ) = 0.45 × 0.235 0.45 × 0.235 + ( 1 0.45 ) × 0.795 = 0.195
γ 1 = D W ( A i , A P I S ) D W ( A i , A P I S ) + D W ( A i , A N I S ) = 0.235 0.235 + 0.795 = 0.228
α 2 = ( 1 σ ) D W ( A 2 , A P I S ) ( 1 σ ) D W ( A 2 , A P I S ) + σ D W ( A 2 , A N I S ) = ( 1 0.45 ) × 0.166 ( 1 0.45 ) × 0.166 + 0.45 × 0.143 = 0.587
β 2 = σ D W ( A 2 , A P I S ) σ D W ( A 2 , A P I S ) + ( 1 σ ) D W ( A 2 , A N I S ) = 0.45 × 0.166 0.45 × 0.166 + ( 1 0.45 ) × 0.143 = 0.488
γ 2 = D W ( A 2 , A P I S ) D W ( A 2 , A P I S ) + D W ( A 2 , A N I S ) = 0.166 0.166 + 0.143 = 0.538
α 3 = ( 1 σ ) D W ( A 3 , A P I S ) ( 1 σ ) D W ( A 3 , A P I S ) + σ D W ( A 3 , A N I S ) = ( 1 0.45 ) × 0.171 ( 1 0.45 ) × 0.171 + 0.45 × 0.143 = 0.593
β 3 = σ D W ( A 3 , A P I S ) σ D W ( A 3 , A P I S ) + ( 1 σ ) D W ( A 3 , A N I S ) = 0.45 × 0.171 0.45 × 0.171 + ( 1 0.45 ) × 0.143 = 0.494
γ 3 = D W ( A 3 , A P I S ) D W ( A 3 , A P I S ) + D W ( A 3 , A N I S ) = 0.171 0.171 + 0.143 = 0.544
All of thresholds for each object under weighted ED are shown in Table 7:
Similarly, all of thresholds for each object under weighted HD are shown in Table 8:
Step 4: according to the relationship between threshold value under the weighted ED and conditional probability, determine which behavior should be taken for the object (accept, delay decision, reject). Here, it is assumed that alternatives contain consistent conditional probability Pr = 0.3. The classified results are shown in Table 9.
From Table 9, for Type 2 and Type 3 ideal solution, it takes the acceptance action on alternative h 4 , h 7 , h 11 ; it takes the delayed decisions on object h 3 , h 12 ; and object h 1 , h 2 , h 5 , h 6 , h 8 , h 9 , h 10 are put into rejected domain.
If we compare threshold value under the weighted HD and conditional probability, the classified results are shown in Table 10 (here, conditional probability is set as   P r = 0.4 ) .
From Table 10, it can be seen that alternative h 1 , h 2 , h 3 , h 4 , h 5 , h 6 , h 7 , h 8 , h 11 , h 12 in T1IS is in the AD, h 9 belongs to the boundary region, and h 10 is in the RD.
Step 5: According to the Formula (13), based on weighted ED and HD, the combined score value δ i are obtained shown in Table 11 and Table 12.
Step 6: Sort the candidates based on the combined score value shown in Table 13.
The best option, according to Table 13, is h 7 for both the weighted ED and the weighted HD.
By applying our proposed method, we can not only obtain the sorting result of alternative solutions, but also divide alternative solutions into AD, RD, and delayed-decision domain, which is convenient for decision-makers to make decisions.

4. Two Real-Life Applications and Comparative Analysis

In this section, we put the proposed method to use in two actual scenarios, compare it with the existing four approaches and analyze the decision results to verify the feasibility and superiority of our method.

4.1. Case One: Mine Emergency Decision [20]

One of the most dangerous risks in mining accidents is a mine explosion. The mine explosion, which also jeopardizes the safety of mine output, poses a serious threat to the safety of work and life. It is difficult to forecast an explosion disaster down to the last detail and have enough time to make necessary preparations and take emergency measures. In order to prepare for disasters and respond appropriately, emergency response plans and accident simulations are essential. The success and feasibility of the emergency preparations will directly affect how disasters develop and subsequent emergency responses. As a result, it is thought that using simulations to assess and decide on the emergency plans that have been presented is essential for the management of mine accident disasters.
Assume there are five emergency plans U = x 1 , x 2 , x 3 , x 4 , x 5 which are taken into account in the event of a coal mine explosion catastrophe. The expert selects the decision criteria E = e 1 , e 2 , e 3 , e 4 , e 5 , which are the following: noxious gas concentration (denoted as e1), casualty reduction in current events (presented as e2), smoke and dust level (presented as e3), viability of rescue operations (denoted as e4), and facility damage repair (denoted as e5). We can conclude that all criteria are benefit parameters. Assume that the expert’s prior preferences have set the following prior weights:   w = { w 1 , w 2 , w 3 , w 4 , w 5 } = 0.3 , 0.2 , 0.14 , 0.16 , 0.2 . The evaluations of emergency plans resulting from the expert’s questionnaire research and construction of an IVFSS are shown in Table 14 in tabular form.
We apply our method to address the issue of achieving emergency plans for explosion accidents. Firstly, we obtain three types of positive and negative ISs which are given in Table 15.
Table 15 shows that the three viewpoints’ ideal solutions differ from one another, allowing decision-makers to select one of them as the foundation for their choices based on their preferences. Three different ISs are used to address the problem of choosing emergency plans for explosive events in order to demonstrate how the proposed model is to be used, and the outcomes of the decisions are compared. In this coal mine explosion accident problem, assuming that there is no uncertainty preference difference between attributes among decision-makers, the consistent risk avoidance coefficient is σ = 0.3 .
And then we compute the weighted Euclidean (Hamming) distances between the evaluated value and the three types of ISs aiming for achieving the thresholds corresponding to different types of ISs by weighted ED and HD displayed in Table 16 and Table 17, respectively.
Based on the relationship between threshold value under the weighted Euclidean (Hamming) distance and the conditional probability, determine which behavior should be taken for the object (accept, delay-decision, reject). Here, it is assumed that alternatives contain consistent conditional probability P r = 0.46 . The classified results are shown in Table 18.
It is easy to observe from Table 16 and Table 17 that each alternative threshold based on T1IS fluctuates within a small range. It leads to the results that all alternative emergency plans belong to the boundary domain and will not be accepted or rejected based on both weighted ED and weighted HD by T1IS From Table 18. Because the differences between thresholds are so small, poor decision-making may occur as a result. The fundamental cause of this issue is that when [0,0] and [1,1] are chosen as positive and negative ISs, respectively, the evaluation values of each choice are too similar and cannot adequately reflect the range of possibilities. For the other two types of ISs, due to the large range of threshold values, the differences between alternative solutions are also significant. From Table 18, it can be seen that emergency plan h 3 are placed in the AD for both weighted ED and weighted HD under the ideal solution of T2IS and T3IS. This means that among all emergency plans, adopting emergency plan h 3 is the most reliable. Under the weighted ED, emergency plan h 5 are placed in the RD for both ideal solution of T2IS and T3IS, which means that emergency plan h 5 are the least desirable. h 1 , h 2 , h 4 are in the delayed-decision domain, and their decision results can be further distinguished. Under the weighted HD, the emergency plan h 5   is placed in the RD under T3IS, which means that the emergency plan h 5   is the least desirable. Under T2IS, h 1 , h 2 , h 4 , h 5 are all in the delayed-decision domain, which can further distinguish their decision behavior.
Finally, we compute the combined score value δ i based on weighted ED and weighted HD and rank the candidates based on the combined score value shown in Table 19.
From Table 19, it is clear that under the weighted ED and weighted HD, the optimal choices for the three types of ideal solutions are all h 3 , that is, in the mine explosion accident, the emergency plan   h 3 is the optimal choice. In order to verify the feasibility of our method, we also apply the four existing methods as diverse as Algorithms 1 and 2 [20] and Algorithm 4 [19] into this case. We discover this fact that the emergency plan   h 3 is still the optimal choice by the four existing methods, which have the same results with our method.

4.2. Case 2: Homestay Selection Decision

A real-world data set about homestays located in Siming District, Xiamen City, from the website www.agoda.com is obtained. Some college students who are about to graduate are planning a graduation trip to Xiamen. They want to find suitable homestays in Xiamen City. Visitors who have stayed in these candidate homestays evaluate them in six different categories after they check out. Cleanliness level, facilities, location, comfort level, service quality, and cost performance are the six factors listed. There are six different classifications for these occupants. For each category, guests provided an average score for a specific aspect of the homestay. Then, using the scores of each group of occupants in this aspect, we may determine the highest and lowest scores in this aspect to create an interval value. For one homestay, for instance, the highest rating provided by the six types of tenants in the category of “cost performance” is 8.8, while the lowest rating is 7.2. The score interval is then translated into [0.72, 0.88], which are sub-intervals of [0,1]. The homestay’s cost performance is at least 0.72 and reaches a maximum of 0.88 if the IVFSS model is employed to describe. That is, by normalizing the obtained minimum and maximum values as the lower and upper membership degrees of interval valued fuzzy numbers, the IVFSS are obtained. In this case, 19 alternative homestays have been identified. Here, the IVFSS for a real data set of the 19 homestays in Siming District, Xiamen City is following. U = {h1, h2, h3, …, h14, h19}; E is a related set of six parameters, E = {e1, e2, e3, e4, e5, e6} = {“Cost performance”, “Comfort level”, “Service”, “Location”, “Environment and cleanliness”, “Facilities”}. Table 20 below presents the IVFSS (S, E) as a tabular form of the 19 homestays in Siming District, Xiamen City.
Our approach is used to address the issue of choosing suitable homestays for travelers. First, Table 21 shows three categories of positive and negative ideal solutions that we have discovered.
Table 21 shows that the three viewpoints’ ideal solutions differ from one another, allowing decision-makers to select one of them as the foundation for their choices based on their preferences. Then, the weighted EDs between the evaluated value and the three types of ISs are calculated in order to obtain the thresholds corresponding to different types of ideal solutions under weighted ED shown in Table 22.
We can choose the behavior as diverse as acceptance, defer decision, or rejection based on the relationship between the threshold value under the weighted ED and conditional probability, which are illustrated in Table 23.
From Table 23, whether it is the first type, the second type, or the third type, these candidates such as h3, h4, h7, h11, h12 are all in the AD. That is, homestays in Siming District, Xiamen City such as h3, h4, h7, h11, h12 are the best choice for these visitors.
Finally, we compute the combined score value δ i based on weighted ED and rank the candidates shown in Table 24.
Table 24 makes it evident that for the three types of ideal solutions, the homestay h7 is the best option. The four current approaches Algorithms 1–3 [20] and Algorithm 4 [19] are also used for this situation in order to confirm the viability of our method. The homestay h7, is still the best option, as shown by the four other techniques that provide the same outcomes as our method, which illustrate the effectiveness of our method.

4.3. Advantage Analysis

From the above two practical cases, we can discover that our method not only obtains the ranking results of the alternatives, but also divides them into AD, RD, and delayed decision domain, which makes the decision results more reasonable and effective, facilitating decision-makers to make better decisions. However, existing methods as diverse as Algorithms 1–3 [20] and Algorithm 4 [19] only sort the alternatives to find the best choice. In some situations, we not only obtain the optimal alternative, but also intend to discover which candidates are acceptable, which ones demand a firm denial, and which ones should be delayed to making decision. For instance, in Case one, the government department and enterprises responsible for managing mining want to determine which emergency plans are feasible, and which ones should be further studied. For Case two, we find that the homestays such as h 3 , h 4 , h 7 , h 11 , h 12 are the best choices. If we only obtain the optical choice as h 7 by the four existing methods, when the homestay h 7   is fully booked, we will not obtain the solution. By our method, if the homestay h 7   is fully booked, h 3 , h 4 , h 11 , h 12 can also be accepted. As a result, our method outperforms the four existing methods due to classification which are shown in Table 25.

5. Conclusions

Pioneering work on MADM based on IVFSS was made. However, there are still obvious disadvantages in the existing MADM algorithms which only sort alternative schemes, but are not able to classify them, which is detrimental to decision-makers’ efficient DM. In order to address this issue, a MATWDM algorithm based on ideal solutions for IVFSS is given in this paper. In addition to providing the ranking results of the alternatives, the approach also separates them into acceptance, rejection, and postponed decision domains. This helps decision-makers make more effective selections. Applications on two practical cases verify the effectiveness and feasibility of the proposed algorithm.
Our proposed method is not only applicable to the above two real-world examples; it also applies to many applications aiming at multi-attributes decision-making issues. The limitation of this study is only applicable to the model of interval-valued fuzzy soft sets. In the future, we will expand this idea to other fuzzy decision models and consider the possibility of developing a stochastic-fuzzy method for decision-making. On the other hand, these advantages and performances about sorting and classification can be kept on high-dimensional data or a large number of choices, while the complexity on large scale datasets will be increased when the number of candidates and attributes are added. Hence, learning how to reduce the complexity on high-dimensional datasets will be an area of focus in the future work.

Author Contributions

Conceptualization, H.Q. and X.M.; methodology, H.Q. and X.M.; software, Y.H.; writing—original draft preparation, H.Q. and Y.H.; writing—review and editing, X.M. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the National Natural Science Foundation of China, grant numbers 62162055, 12461094, and the Gansu Provincial University Teacher Innovation Foundation, grant number 2024A-006.

Data Availability Statement

Data are contained within the article.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Molodtsov, D. Soft set theory—First results. Comput. Math. Appl. 1999, 37, 19–31. [Google Scholar] [CrossRef]
  2. Kong, Z.; Zhao, J.; Wang, L.; Zhang, J. A new data filling approach based on probability analysis in incomplete soft sets. Expert Syst. Appl. 2021, 184, 115358. [Google Scholar] [CrossRef]
  3. Qin, H.; Fei, Q.; Ma, X.; Chen, W. A new parameter reduction algorithm for soft sets based on chi-square test. Appl. Intell. 2021, 51, 7960–7972. [Google Scholar] [CrossRef]
  4. Ma, X.; Qin, H. Soft set based parameter value reduction for decision making application. IEEE Access 2019, 7, 35499–35511. [Google Scholar] [CrossRef]
  5. Feng, F.; Wang, Q.; Yager, R.R.; Alcantud, J.C.R.; Zhang, L. Maximal association analysis using logical formulas over soft sets. Expert Syst. Appl. 2020, 159, 113557. [Google Scholar] [CrossRef]
  6. Dalkılıç, O.; Demirtaş, N. Algorithms for COVID-19 outbreak using soft set theory: Estimation and application. Soft Comput. 2023, 27, 3203–3211. [Google Scholar] [CrossRef]
  7. Maji, P.K.; Biswas, R.; Roy, A. Fuzzy soft sets. J. Fuzzy Math. 2001, 9, 589–602. [Google Scholar]
  8. Aggarwal, M. Confidence soft sets and applications in supplier selection. Comput. Ind. Eng. 2019, 127, 614–624. [Google Scholar] [CrossRef]
  9. Maji, P.K.; Roy, A.R.; Biswas, R. On intuitionistic fuzzy soft sets. J. Fuzzy Math. 2004, 12, 669–684. [Google Scholar]
  10. Nawaz, H.S.; Akram, M. Granulation of protein–protein interaction networks in Pythagorean fuzzy soft environment. J. Appl. Math. Comput. 2023, 69, 293–320. [Google Scholar] [CrossRef]
  11. Qin, H.; Li, H.; Ma, X.; Gong, Z.; Cheng, Y.; Fei, Q. Data analysis approach for incomplete interval-valued intuitionistic fuzzy soft sets. Symmetry 2020, 12, 1061. [Google Scholar] [CrossRef]
  12. Ma, X.; Qin, H.; Abawajy, J.H. Interval-valued intuitionistic fuzzy soft sets based decision-making and parameter reduction. IEEE Trans. Fuzzy Syst. 2020, 30, 357–369. [Google Scholar] [CrossRef]
  13. Akram, M.; Ali, G.; Alcantud, J.C.R.; Riaz, A. Group decision-making with Fermatean fuzzy soft expert knowledge. Artif. Intell. Rev. 2022, 55, 5349–5389. [Google Scholar] [CrossRef]
  14. Jan, N.; Gwak, J.; Pamucar, D. Mathematical analysis of generative adversarial networks based on complex picture fuzzy soft information. Appl. Soft Comput. 2023, 137, 110088. [Google Scholar] [CrossRef]
  15. Akram, M.; Ali, G.; Alcantud, J.C.; Fatimah, F. Parameter reductions in N-soft sets and their applications in decision-making. Expert Syst. 2021, 38, e12601. [Google Scholar] [CrossRef]
  16. Ghosh, S.K.; Mitra, A.; Ghosh, A. A novel intuitionistic fuzzy soft set entrenched mammogram segmentation under multigranulation approximation for breast cancer detection in early stages. Expert Syst. Appl. 2021, 169, 114329. [Google Scholar] [CrossRef]
  17. Yang, X.; Lin, T.Y.; Yang, J.; Li, Y.; Yu, D. Combination of interval-valued fuzzy set and soft set. Comput. Math. Appl. 2009, 58, 521–527. [Google Scholar] [CrossRef]
  18. Feng, F.; Li, Y.; Leoreanu-Fotea, V. Application of level soft sets in decision making based on interval-valued fuzzy soft sets. Comput. Math. Appl. 2010, 60, 1756–1767. [Google Scholar] [CrossRef]
  19. Ma, X.; Fei, Q.; Qin, H.; Li, H.; Chen, W. A new efficient decision making algorithm based on interval-valued fuzzy soft set. Appl. Intell. 2021, 51, 3226–3240. [Google Scholar] [CrossRef]
  20. Peng, X.; Garg, H. Algorithms for interval-valued fuzzy soft sets in emergency decision making based on WDBA and CODAS with new information measure. Comput. Ind. Eng. 2018, 119, 439–452. [Google Scholar] [CrossRef]
  21. Peng, X.; Yang, Y. Algorithms for interval-valued fuzzy soft sets in stochastic multi-criteria decision making based on regret theory and prospect theory with combined weight. Appl. Soft Comput. 2017, 54, 415–430. [Google Scholar] [CrossRef]
  22. Ma, X.; Qin, H. A new parameter reduction algorithm for interval-valued fuzzy soft sets based on Pearson’s product moment coefficient. Appl. Intell. 2020, 50, 3718–3730. [Google Scholar] [CrossRef]
  23. Qin, H.; Wang, Y.; Ma, X.; Wang, J.; Jiang, C. A Euclidean Distance-based parameter reduction algorithm for interval-valued fuzzy soft sets. Expert Syst. Appl. 2023, 234, 121106. [Google Scholar] [CrossRef]
  24. Yao, Y. Three-way decisions with probabilistic rough sets. Inf. Sci. 2010, 180, 341–353. [Google Scholar] [CrossRef]
  25. Ye, J.; Zhan, J.; Xu, Z. A novel decision-making approach based on three-way decisions in fuzzy information systems. Inf. Sci. 2020, 541, 362–390. [Google Scholar] [CrossRef]
  26. Dai, J.; Chen, T.; Zhang, K. The intuitionistic fuzzy concept-oriented three-way decision model. Inf. Sci. 2023, 619, 52–83. [Google Scholar] [CrossRef]
  27. Ejegwa, P.A.; Wen, S.; Feng, Y.; Zhang, W.; Liu, J. A three-way Pythagorean fuzzy correlation coefficient approach and its applications in deciding some real-life problems. Appl. Intell. 2023, 53, 226–237. [Google Scholar] [CrossRef]
  28. Yi, J.-H.; Liu, Y.; Forrest, J.Y.-L.; Guo, X.-G.; Xu, X.-j. A three-way decision approach with S-shaped utility function under Pythagorean fuzzy information. Expert Syst. Appl. 2022, 210, 118370. [Google Scholar] [CrossRef]
  29. Yang, J.; Yao, Y. A three-way decision based construction of shadowed sets from Atanassov intuitionistic fuzzy sets. Inf. Sci. 2021, 577, 1–21. [Google Scholar] [CrossRef]
  30. Yao, Y. Three-way granular computing, rough sets, and formal concept analysis. Int. J. Approx. Reason. 2020, 116, 106–125. [Google Scholar] [CrossRef]
  31. Yao, Y. Tri-level thinking: Models of three-way decision. Int. J. Mach. Learn. Cybern. 2020, 11, 947–959. [Google Scholar] [CrossRef]
  32. Yao, Y. Three-way decisions and cognitive computing. Cogn. Comput. 2016, 8, 543–554. [Google Scholar] [CrossRef]
  33. Lang, G.; Yao, Y. Formal concept analysis perspectives on three-way conflict analysis. Int. J. Approx. Reason. 2023, 152, 160–182. [Google Scholar] [CrossRef]
  34. Qin, J.; Martínez, L.; Pedrycz, W.; Ma, X.; Liang, Y. An overview of granular computing in decision-making: Extensions, applications, and challenges. Inf. Fusion 2023, 98, 101833. [Google Scholar] [CrossRef]
  35. Du, J.; Liu, S.; Liu, Y.; Yi, J. A novel approach to three-way conflict analysis and resolution with Pythagorean fuzzy information. Inf. Sci. 2022, 584, 65–88. [Google Scholar] [CrossRef]
  36. Hu, M. Modeling relationships in three-way conflict analysis with subsethood measures. Knowl.-Based Syst. 2023, 260, 110131. [Google Scholar] [CrossRef]
  37. Li, T.; Qiao, J.; Ding, W. Three-way conflict analysis and resolution based on q-rung orthopair fuzzy information. Inf. Sci. 2023, 638, 118959. [Google Scholar] [CrossRef]
  38. Jia, F.; Liu, P. A novel three-way decision model under multiple-criteria environment. Inf. Sci. 2019, 471, 29–51. [Google Scholar] [CrossRef]
  39. Jia, F.; Liu, P. Multi-attribute three-way decisions based on ideal solutions under interval-valued intuitionistic fuzzy environment. Int. J. Approx. Reason. 2021, 138, 12–37. [Google Scholar] [CrossRef]
  40. Zhai, Y.; Qi, J.; Li, D.; Zhang, C.; Xu, W. The structure theorem of three-way concept lattice. Int. J. Approx. Reason. 2022, 146, 157–173. [Google Scholar] [CrossRef]
  41. Zhao, X.; Miao, D. Isomorphic relationship between L-three-way concept lattices. Cogn. Comput. 2022, 14, 1997–2019. [Google Scholar] [CrossRef]
  42. Chen, X.; Huang, B.; Wang, T. Optimal scale generation in two-class dominance decision tables with sequential three-way decision. Inf. Sci. 2023, 624, 590–605. [Google Scholar] [CrossRef]
  43. Qian, J.; Hong, C.; Yu, Y.; Liu, C.; Miao, D. Generalized multigranulation sequential three-way decision models for hierarchical classification. Inf. Sci. 2022, 616, 66–87. [Google Scholar] [CrossRef]
  44. Chen, W.; Zhang, Q.; Dai, Y. Sequential multi-class three-way decisions based on cost-sensitive learning. Int. J. Approx. Reason. 2022, 146, 47–61. [Google Scholar] [CrossRef]
  45. Zhang, P.; Li, T.; Luo, C.; Wang, G. AMG-DTRS: Adaptive multi-granulation decision-theoretic rough sets. Int. J. Approx. Reason. 2022, 140, 7–30. [Google Scholar] [CrossRef]
  46. Zhan, J.; Deng, J.; Xu, Z.; Martínez, L. A three-way decision methodology with regret theory via triangular fuzzy numbers in incomplete multi-scale decision information systems. IEEE Trans. Fuzzy Syst. 2023, 31, 2773–2787. [Google Scholar] [CrossRef]
  47. Li, Z.; Zhang, P.; Xie, N.; Zhang, G.; Wen, C.-F. A novel three-way decision method in a hybrid information system with images and its application in medical diagnosis. Eng. Appl. Artif. Intell. 2020, 92, 103651. [Google Scholar] [CrossRef]
  48. Savchenko, A.V. Sequential three-way decisions in multi-category image recognition with deep features based on distance factor. Inf. Sci. 2019, 489, 18–36. [Google Scholar] [CrossRef]
  49. Chen, J.; Chen, Y.; He, Y.; Xu, Y.; Zhao, S.; Zhang, Y. A classified feature representation three-way decision model for sentiment analysis. Appl. Intell. 2022, 52, 7995–8007. [Google Scholar] [CrossRef]
  50. Gorzałczany, M.B. A method of inference in approximate reasoning based on interval-valued fuzzy sets. Fuzzy Sets Syst. 1987, 21, 1–17. [Google Scholar] [CrossRef]
Table 1. An IVFSS evaluation matrix.
Table 1. An IVFSS evaluation matrix.
Ue1e2e3e4e5
h1[0.00,0.1][0.8,1.0][0.8,0.9][0.8,0.9][0.9,0.9]
h2[0.58,0.87][0.51,0.62][0.5,0.6][0.5,0.6][0.6,0.8]
h3[0.61,0.81][0.55,0.65][0.3,0.4][0.4,0.6][0.7,0.8]
h4[0.14,0.15][0.61,0.68][0.2,0.3][0.4,0.5][0.6,0.7]
h5[0.13,0.15][0.43,0.49][0.3,0.4][0.4,0.6][0.4,0.6]
Table 2. DM results by the four existing methods for Table 1.
Table 2. DM results by the four existing methods for Table 1.
AlgorithmsRankingBest Solution
Algorithm 1 [20]h1 > h3 > h2 > h4 > h5h1
Algorithm 2 [20]h1 > h3 > h2 > h4 > h5h1
Algorithm 3 [20]h1 > h3 > h2 > h4 > h5h1
Algorithm 4 [19]h1 > h2 > h3 > h4 > h5h1
Table 3. IVFSS evaluation matrix.
Table 3. IVFSS evaluation matrix.
Ue1e2e3e4e5e6
h1[0.81,0.92][0.62,0.81][0.62,0.87][0.8,0.88][0.75,0.85][0.83,0.89]
h2[0.78,0.83][0.76,0.85][0.79,0.92][0.8,0.92][0.78,0.89][0.78,0.86]
h3[0.75,0.77][0.72,0.78][0.95,0.98][0.85,0.92][0.88,1][0.84,0.89]
h4[0.81,0.92][0.85,0.93][0.84,0.96][0.81,0.94][0.82,0.93][0.78,0.94]
h5[0.69,0.75][0.76,0.86][0.85,0.88][0.82,0.95][0.7,0.81][0.7,0.85]
h6[0.71,0.86][0.67,0.75][0.83,0.92][0.83,0.89][0.79,0.88][0.79,0.85]
h7[0.75,0.79][0.78,0.89][0.95,1][0.77,0.86][0.89,0.92][0.89,0.93]
h8[0.66,0.81][0.79,0.86][0.85,0.98][0.81,0.95][0.58,0.96][0.82,0.96]
h9[0.57,0.76][0.68,0.84][0.67,0.87][0.58,0.83][0.54,0.85][0.86,0.92]
h10[0.51,0.68][0.75,0.89][0.81,0.97][0.5,0.96][0.76,0.89][0.71,0.85]
h11[0.79,0.85][0.81,0.89][0.82,1][0.89,0.92][0.86,0.93][0.79,0.88]
h12[0.67,0.74][0.79,0.86][0.86,0.89][0.84,0.92][0.81,0.99][0.87,0.95]
Table 4. Three types of ideal solutions.
Table 4. Three types of ideal solutions.
e1e2e3e4e5e6
T1ISPIS1[1,1][1,1][1,1][1,1][1,1]
NIS1[0,0][0,0][0,0][0,0][0,0]
T2ISPIS2[0.81,0.92][0.85,0.93][0.95,1][0.89,0.92][0.89,0.92]
NIS2[0.51,0.68][0.62,0.81][0.62,0.87][0.5,0.96][0.54,0.85]
T3ISPIS3[0.81,0.92][0.85,0.93][0.95,1][0.89,0.95][0.89,1]
NIS3[0.51,0.68][0.62,0.75][0.62,0.87][0.5,0.83][0.54,0.81]
Table 5. Weighted ED for Example 1.
Table 5. Weighted ED for Example 1.
UT1IST2IST3IS
DPIS1DNIS1DPIS2DNIS2DPIS3DNIS3
h10.2350.7950.1660.1430.1710.143
h20.1750.8370.0950.1550.1000.160
h30.1550.8800.0770.2090.0750.212
h40.1320.8850.0600.1940.0620.202
h50.1980.8200.1160.1490.1230.156
h60.1940.8240.1080.1600.1140.160
h70.1420.8870.0570.2080.0640.211
h80.1880.8560.1100.1570.1100.166
h90.2810.7570.2000.0680.2040.063
h100.2510.1390.1690.0620.1710.066
h110.1390.8810.0620.1980.0660.203
h120.1650.8570.0890.1760.0880.182
Table 6. Weighted HD for Example 1.
Table 6. Weighted HD for Example 1.
UT1IST2IST3IS
DPIS1DNIS1DPIS2DNIS2DPIS3DNIS3
h10.4600.8880.3610.2920.3740.302
h20.4070.9140.2910.3540.3060.371
h30.3530.9360.2340.4140.2290.422
h40.3430.9390.2050.4120.2130.431
h50.4280.9040.3280.3300.3340.347
h60.4230.9060.3130.3570.3270.352
h70.3420.9400.1890.4280.2110.432
h80.3890.9210.2890.3670.2830.389
h90.5030.8640.4150.2280.4260.223
h100.4510.3490.3590.2060.3650.224
h110.3490.9240.2060.3800.2240.395
h120.3830.9240.2780.3800.2730.395
Table 7. Thresholds under weighted ED for Example 1.
Table 7. Thresholds under weighted ED for Example 1.
UT1IST2IST3IS
α1β1γ1α2β2γ2α3β3γ3
h10.2660.1950.2280.5870.4880.5380.5930.4940.544
h20.2040.1460.1730.4280.3340.3800.4340.3390.385
h30.1770.1260.1500.3110.2320.2700.3030.2250.262
h40.1540.1090.1300.2730.2010.2350.2730.2010.235
h50.2280.1650.1950.4860.3880.4370.4920.3930.442
h60.2230.1610.1910.4520.3560.4030.4660.3690.417
h70.1640.1160.1380.2510.1830.2150.2700.1990.233
h80.2120.1530.1800.4610.3640.4110.4470.3510.398
h90.3120.2330.2710.7820.7060.7460.7970.7250.763
h100.6880.5970.6440.7690.6900.7310.7600.6790.722
h110.1620.1140.1360.2770.2040.2390.2840.2100.245
h120.1900.1360.1610.3830.2930.3360.3700.2820.325
Table 8. Thresholds under weighted HD for Example 1.
Table 8. Thresholds under weighted HD for Example 1.
UT1IST2IST3IS
α1β1γ1α2β2γ2α3β3γ3
h10.388 0.298 0.341 0.602 0.503 0.553 0.602 0.503 0.553
h20.352 0.267 0.308 0.501 0.402 0.451 0.502 0.403 0.452
h30.316 0.236 0.274 0.409 0.316 0.361 0.399 0.308 0.352
h40.308 0.230 0.267 0.378 0.289 0.332 0.377 0.288 0.331
h50.367 0.279 0.322 0.548 0.448 0.498 0.540 0.441 0.490
h60.363 0.276 0.318 0.517 0.418 0.467 0.532 0.432 0.482
h70.308 0.229 0.267 0.350 0.265 0.306 0.375 0.286 0.329
h80.340 0.257 0.297 0.491 0.392 0.441 0.471 0.373 0.421
h90.416 0.323 0.368 0.690 0.599 0.646 0.700 0.610 0.657
h100.612 0.514 0.564 0.681 0.588 0.636 0.666 0.572 0.620
h110.316 0.236 0.274 0.399 0.307 0.352 0.409 0.316 0.361
h120.336 0.253 0.293 0.473 0.375 0.423 0.458 0.361 0.409
Table 9. Behaviors of each alternative object under weighted ED.
Table 9. Behaviors of each alternative object under weighted ED.
POS(C)BND(C)NEG(C)
T1ISh1, h2, h3, h4, h5, h6, h7, h8, h11, h12 h9h10
T2ISh4, h7, h11h3, h12h1, h2, h5, h6, h8, h9, h10
T3ISh4, h7, h11h3, h12h1, h2, h5, h6, h8, h9, h10
Table 10. Behaviors of each alternative object under weighted HD.
Table 10. Behaviors of each alternative object under weighted HD.
POS(C)BND(C)NEG(C)
T1ISh1, h2, h3, h4, h5, h6, h7, h8, h11, h12h9h10
T2ISh4, h7, h11h3, h8, h12h1, h2, h5, h6, h9, h10
T3ISh3, h4, h7h8, h11, h12h1, h2, h5, h6, h9, h10
Table 11. Combined score values under weighted ED.
Table 11. Combined score values under weighted ED.
UT1IST2IST3IS
h10.77170.46230.4561
h20.82670.61980.6149
h30.85040.73010.7379
h40.87000.76490.7645
h50.80540.56330.5580
h60.80950.59670.5834
h70.86200.78510.7673
h80.81960.58860.6024
h90.72910.25370.2370
h100.35610.26860.2785
h110.86370.76140.7548
h120.83870.66360.6755
Table 12. Combined score value under weighted HD.
Table 12. Combined score value under weighted HD.
UT1IST2IST3IS
h10.6587 0.4472 0.4471
h20.6919 0.5490 0.5480
h30.7261 0.6389 0.6480
h40.7327 0.6677 0.6687
h50.6784 0.5020 0.5096
h60.6817 0.5327 0.5183
h70.7334 0.6940 0.6712
h80.7032 0.5593 0.5790
h90.6319 0.3541 0.3434
h100.4363 0.3643 0.3798
h110.7256 0.6483 0.6387
h120.7070 0.5771 0.5914
Table 13. Ranking results of the alternative objects under the two distance measures.
Table 13. Ranking results of the alternative objects under the two distance measures.
RankingBest Alternative
weighted EDT1ISh4 > h11 > h7 > h3 > h12 > h2 > h8 > h6 > h5 > h1 > h9 > h10h4
T2ISh7 > h4 > h11 > h3 > h12 > h2 > h6 > h8 > h5 > h1 > h10 > h9h7
T3ISh7 > h4 > h11 > h3 > h12 > h2 > h8 > h6 > h5 > h1 > h10 > h9h7
weighted Humming distanceT1ISh7 > h4 > h3 > h11 > h12 > h8 > h2 > h6 > h5 > h1 > h9 > h10h7
T2ISh7 > h4 > h3 > h11 > h12 > h8 > h2 > h6 > h5 > h1 > h9 > h10h7
T3ISh7 > h4 > h3 > h11 > h12 > h8 > h2 > h6 > h5 > h1 > h9 > h10h7
Table 14. IVFSS evaluation matrix for Case one [20].
Table 14. IVFSS evaluation matrix for Case one [20].
Ue1e2e3e4e5
h1[0.55,0.65][0.41,0.62][0.2,0.3][0.4,0.6][0.7,0.8]
h2[0.58,0.67][0.51,0.62][0.2,0.3][0.4,0.5][0.6,0.8]
h3[0.61,0.71][0.55,0.65][0.3,0.4][0.5,0.6][0.7,0.8]
h4[0.54,0.65][0.61,0.68][0.2,0.3][0.4,0.5][0.6,0.7]
h5[0.53,0.61][0.43,0.49][0.3,0.4][0.4,0.6][0.4,0.6]
Table 15. Three ideal solutions for Case one.
Table 15. Three ideal solutions for Case one.
e1e2e3e4e5
T1ISPIS1[1,1][1,1][1,1][1,1][1,1]
NIS1[0.0][0.0][0.0][0.0][0.0]
T2ISPIS2[0.61,0.71][0.61,0.68][0.3,0.4][0.5,0.6][0.7,0.8]
NIS2[0.53,0.61][0.41,0.62][0.2,0.3][0.4,0.5][0.4,0.6]
T3ISPIS3[0.61,0.71][0.61,0.68][0.3,0.4][0.5,0.6][0.7,0.8]
NIS3[0.53,0.61][0.41,0.49][0.2,0.3][0.4,0.5][0.4,0.6]
Table 16. Thresholds under weighted ED for Case one.
Table 16. Thresholds under weighted ED for Case one.
UT1IST2IST3IS
α1β1γ1 α1β1γ1 α1
h10.6620.2650.457h10.6620.2650.457h10.662
h20.6620.2650.457h20.6620.2650.457h20.662
h30.6110.2240.402h30.6110.2240.402h30.611
h40.6640.2670.459h40.6640.2670.459h40.664
h50.7060.3070.508h50.7060.3070.508h50.706
Table 17. Thresholds under weighted HD for Case one.
Table 17. Thresholds under weighted HD for Case one.
UT1IST2IST3IS
α1β1γ1 α1β1γ1 α1
h10.679 0.280 0.476 0.698 0.298 0.498 0.679 0.280 0.476
h20.680 0.280 0.476 0.700 0.300 0.500 0.681 0.282 0.478
h30.653 0.257 0.447 0.386 0.104 0.212 0.374 0.099 0.204
h40.681 0.282 0.478 0.709 0.310 0.511 0.690 0.290 0.488
h50.703 0.303 0.504 0.809 0.438 0.645 0.840 0.491 0.693
Table 18. The classified results under weighted Euclidean (Hamming) distance for Case one.
Table 18. The classified results under weighted Euclidean (Hamming) distance for Case one.
Type of ISPOS(C)BND(C)NEG(C)
Weighted EDT1ISh1h2h3h4h5
T2ISh3h1h2h4h5
T3ISh3h1h2h4h5
Weighted HDT1ISh1h2h3h4h5
T2ISh3h1h2h4h5
T3ISh3h1h2h4h5
Table 19. Sorting results of candidate solutions for Case one.
Table 19. Sorting results of candidate solutions for Case one.
MethodsType of ISRankingBest Plan
Our
method
Weighted Euclidean
distance
T1ISh3 > h2> h1 > h4 > h5h3
T2ISh3 > h1> h2 > h4 > h5h3
T3ISh3 > h1> h4 > h2 > h5h3
Weighted Hamming
distance
T1ISh3 > h1> h2 > h4 > h5h3
T2ISh3 > h1> h2 > h4 > h5h3
T3ISh3 > h1> h2 > h4 > h5h3
Existing methodsAlgorithm 1 [20] h3 > h2> h1 > h4 > h5h3
Algorithm 2 [20] h3 > h1> h4 > h2 > h5h3
Algorithm 3 [20] h3 > h2> h1 > h4 > h5h3
Algorithm 4 [19] h3 > h1> h2 = h4 > h5h3
Table 20. The IVFSS for Case Two.
Table 20. The IVFSS for Case Two.
Ue1e2e3e4e5e6
h1[0.72,0.88][0.78,0.89][0.84,0.96][0.79,0.88][0.75,0.85][0.75,0.85]
h2[0.78,0.91][0.88,0.89][0.93,0.97][0.8,0.92][0.78,0.89][0.77,0.86]
h3[0.9,0.93][0.89,0.93][0.95,0.98][0.85,0.92][0.88,0.92][0.84,0.89]
h4[0.85,0.95][0.83,0.95][0.84,0.96][0.81,0.94][0.82,0.93][0.78,0.94]
h5[0.67,1][0.6,1][0.85,1][0.7,1][0.7,1][0.7,1]
h6[0.79,1][0.75,0.88][0.85,1][0.83,1][0.79,0.88][0.75,0.85]
h7[0.89,1][0.85,0.94][0.93,1][0.96,1][0.89,1][0.89,0.97]
h8[0.67,0.96][0.58,0.96][0.92,1][0.5,0.95][0.58,0.96][0.58,0.96]
h9[0.54,0.83][0.58,0.84][0.67,0.94][0.58,0.83][0.54,0.85][0.58,0.83]
h10[0.25,1][0.75,1][0.5,1][0.5,0.96][0.25,1][0.25,0.92]
h11[0.84,0.92][0.86,0.9][0.89,0.99][0.89,0.92][0.86,0.93][0.85,0.89]
h12[0.84,1][0.79,1][0.81,1][0.84,1][0.81,1][0.81,1]
h13[0.38,0.75][0.38,0.75][0.75,0.75][0.5,0.75][0.5,0.75][0.38,0.75]
h14[0.67,0.8][0.83,0.94][0.67,0.85][0.67,0.8][0.67,0.75][0.67,0.8]
h15[0.75,0.88][0.8,0.95][0.81,1][0.74,1][0.72,0.92][0.68,0.88]
h16[0.73,0.93][0.83,0.96][0.79,0.96][0.67,0.93][0.65,0.89][0.65,0.93]
h17[0.75,0.89][0.83,0.91][0.8,0.89][0.73,0.85][0.7,0.83][0.68,0.83]
h18[0.71,0.89][0.86,0.93][0.88,0.96][0.79,0.93][0.75,0.89][0.67,0.88]
h19[0.7,0.92][0.78,0.83][0.8,0.92][0.78,0.92][0.73,0.85][0.65,0.84]
Table 21. Three ideal solutions for Case two.
Table 21. Three ideal solutions for Case two.
e1e2e3e4e5e6
T1ISPIS1[1,1][1,1][1,1][1,1][1,1][1,1]
NIS1[0.0][0.0][0.0][0.0][0.0][0.0]
T2ISPIS2[0.84,1][0.79,1][0.93,1][0.96,1][0.89,1][0.81,1]
NIS2[0.25,1][0.38,0.75][0.5,1][0.5,0.95][0.25,1][0.25,0.92]
T3ISPIS3[0.89,1][0.89,1][0.95,1][0.96,1][0.89,1][0.89,1]
NIS3[0.25,0.75][0.38,0.75][0.5,0.75][0.5,0.83][0.25,0.75][0.25,0.75]
Table 22. Thresholds under weighted ED for Case Two.
Table 22. Thresholds under weighted ED for Case Two.
UT1IST2IST3IS
α1β1γ1α2β2γ2α3β3γ3
h10.2000.1440.1700.2000.1440.1700.2000.1440.170
h20.1570.1110.1320.1570.1110.1320.1570.1110.132
h30.1090.0760.0910.1090.0760.0910.1090.0760.091
h40.1510.1070.1270.1510.1070.1270.1510.1070.127
h50.2230.1610.1900.2230.1610.1900.2230.1610.190
h60.1760.1250.1490.1760.1250.1490.1760.1250.149
h70.0870.0600.0720.0870.0600.0720.0870.0600.072
h80.2690.1980.2320.2690.1980.2320.2690.1980.232
h90.3330.2500.2900.3330.2500.2900.3330.2500.290
h100.3890.2990.3430.3890.2990.3430.3890.2990.343
h110.1260.0880.1050.1260.0880.1050.1260.0880.105
h120.1500.1060.1260.1500.1060.1260.1500.1060.126
h130.4230.3290.3750.4230.3290.3750.4230.3290.375
h140.2840.2100.2450.2840.2100.2450.2840.2100.245
h150.1990.1430.1690.1990.1430.1690.1990.1430.169
h160.2220.1610.1900.2220.1610.1900.2220.1610.190
h170.2250.1630.1920.2250.1630.1920.2250.1630.192
h180.1840.1310.1560.1840.1310.1560.1840.1310.156
h190.2240.1620.1910.2240.1620.1910.2240.1620.191
Table 23. The classified results and the related behaviors for Case two.
Table 23. The classified results and the related behaviors for Case two.
BND(C)NEG(C)POS(C)
Type1h1, h2, h3, h4, h5, h6, h7,
h11, h12, h15, h16, h17, h18, h19
h8, h14h9, h10, h13
Type2h3, h4, h7, h11, h12h1, h2, h6,
h15, h18
h5, h8, h9, h10, h13,
h14, h16, h17, h19
Type3h3, h4, h7, h11, h12h1, h2, h6, h18h5, h8, h9, h10, h13, h14,
h15, h16, h17, h19
Table 24. The sorting results by our methods and existing approaches for Case two.
Table 24. The sorting results by our methods and existing approaches for Case two.
MethodsRanking ResultsBest Choice
Type1h7 > h3 > h11 > h12 > h4 > h2 > h6 > h18 > h15 > h1 > h16 > h5 > h19 > h17 > h8 > h14 > h9 > h10 > h13h7
Type2h7 > h11 > h3 > h12 > > h4 > h2 > h6 > h18 > h1 >h15 > h5 > h19 > h17 > h16 > h14 > h8 > h9 > h13 > h10h7
Type3h7 > h3 > h11 > h12 > h4 > h2 > h6 > h18 > h15 > h1 > h5 > h16 > h19 > h17 > h8 > h14 > h9 > h10 > h13h7
Algorithm 1 [20]h7 > h3 > h11 > h12 > h4 > h2 > h6 > h18 > h15 > h1 > h16 > h5 > h19 > h17 > h8 > h14 > h9 > h10 > h13 h7
Algorithm 2 [20]h7 > h3 > h11 > h12 > h4 > h2 > h6 > h18 > h15 > h1 > h5 > h16 > h19 > h17 > h8 > h14 > h9 > h10 > h13h7
Algorithm 3 [20]h7 > h11 > h3 > h12 > > h4 > h2 > h6 > h18 > h1 >h15 > h5 > h19 > h17 > h16 > h14 > h8 > h9 > h13 > h10h7
Algorithm 4 [19]h7 > h12 > h3 > h11 > h4 > h2 > h6 > h5 > h18 > h15 > h1 > h16 > h19 > h17 > h8 > h14 > h9 > h10 > h13h7
Table 25. Comparison results among five methods.
Table 25. Comparison results among five methods.
MethodsAlgorithm 1 [20]Algorithm 2 [20]Algorithm 3 [20]Algorithm 4 [19]Our Method
sorting
classification × × × ×
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Qin, H.; Han, Y.; Ma, X. Multi-Attribute Three-Way Decision Approach Based on Ideal Solutions under Interval-Valued Fuzzy Soft Environment. Symmetry 2024, 16, 1327. https://doi.org/10.3390/sym16101327

AMA Style

Qin H, Han Y, Ma X. Multi-Attribute Three-Way Decision Approach Based on Ideal Solutions under Interval-Valued Fuzzy Soft Environment. Symmetry. 2024; 16(10):1327. https://doi.org/10.3390/sym16101327

Chicago/Turabian Style

Qin, Hongwu, Yanyan Han, and Xiuqin Ma. 2024. "Multi-Attribute Three-Way Decision Approach Based on Ideal Solutions under Interval-Valued Fuzzy Soft Environment" Symmetry 16, no. 10: 1327. https://doi.org/10.3390/sym16101327

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop