Next Article in Journal
Securing the Network: A Red and Blue Cybersecurity Competition Case Study
Next Article in Special Issue
Ensemble Modeling with a Bayesian Maximal Information Coefficient-Based Model of Bayesian Predictions on Uncertainty Data
Previous Article in Journal
Boosting Holistic Cybersecurity Awareness with Outsourced Wide-Scope CyberSOC: A Generalization from a Spanish Public Organization Study
Previous Article in Special Issue
Employee Productivity Assessment Using Fuzzy Inference System
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Large-Scale Group Decision-Making Method Using Hesitant Fuzzy Rule-Based Network for Asset Allocation

by
Abdul Malek Yaakob
1,2,
Shahira Shafie
1,
Alexander Gegov
3,4,*,
Siti Fatimah Abdul Rahman
5 and
Ku Muhammad Naim Ku Khalif
6,7
1
Department of Mathematics & Statistics, School of Quantitative Sciences, Universiti Utara Malaysia (UUM), Sintok 06010, Malaysia
2
Institute of Strategic Industrial Decision Modelling, Universiti Utara Malaysia, Sintok 06010, Malaysia
3
School of Computing, University of Portsmouth, Portsmouth PO1 3HE, UK
4
English Faculty of Engineering, Technical University of Sofia, 1756 Sofia, Bulgaria
5
School of Mathematical Sciences, College of Computing, Informatics and Media, Universiti Teknologi MARA (UiTM) Perlis Branch, Arau Campus, Arau 02600, Malaysia
6
Centre for Mathematical Sciences, Universiti Malaysia Pahang Al-Sultan Abdullah, Kuantan 26300, Malaysia
7
Centre of Excellence for Artificial Intelligence and Data Science, Universiti Malaysia Pahang Al-Sultan Abdullah, Kuantan 26300, Malaysia
*
Author to whom correspondence should be addressed.
Information 2023, 14(11), 588; https://doi.org/10.3390/info14110588
Submission received: 3 July 2023 / Revised: 17 October 2023 / Accepted: 17 October 2023 / Published: 26 October 2023

Abstract

:
Large-scale group decision-making (LSGDM) has become common in the new era of technology development involving a large number of experts. Recently, in the use of social network analysis (SNA), the community detection method has been highlighted by researchers as a useful method in handling the complexity of LSGDM. However, it is still challenging to deal with the reliability and hesitancy of information as well as the interpretability of the method. For this reason, we introduce a new approach of a Z-hesitant fuzzy network with the community detection method being put into practice for stock selection. The proposed approach was subsequently compared to an established approach in order to evaluate its applicability and efficacy.

1. Introduction

The trust value of decisions made decreases when many people are involved in the decision-making process, thus impacting the presentation of information negatively [1]. Notably, social network analysis (SNA) can establish the significance passed from one person to another, as well as other linkages between them, by showing the links and relationships established through individual interactions [2] in any substantial portion of the population ranging from a group of people to a significant segment of a nation. The community detection method, which is one of the approaches of SNA, can reduce the dimension of large-scale group decision-making to a convenient and understandable calculation in order to obtain the weights of individual decision makers (DMs) and partitions based on the centrality indexes that can reflect the importance of DMs. The formulation’s extension of hesitant fuzzy sets can be used to determine the allocation or standards of options involved with the decision-making challenges faced [3]. A hesitant fuzzy set is subsumed in the formulation, as it helps with the insufficiency of available information. Evidently, hesitant fuzzy sets in decision-making allow decision makers to incorporate several possible values into an evaluation, which facilitates the proficiency of decision-making [4]. The hesitant fuzzy set can also effectively handle the haziness of a decision maker’s judgments over alternatives in terms of attributes. A generalization of the fuzzy set, which is known as a hesitant fuzzy set, allows the membership degree of an element to be expressed as a number of potential values between 0 and 1 [5]. Recently, the use of hesitant fuzzy sets has been successfully applied in the fields of renewable energy [6], safety and healthcare, and the food industry [7]. It is best described in situations where people are reluctant to render their choices over artifacts in the decision-making process.
Z-numbers denote an approach used in the fuzzy theory, which provides data on people through the dependability of decision-making and is useful for providing ambiguous evidence. According to Kang, Wei, Li, and Deng, 2012 [5], Zadeh established the Z-number as a fuzzy set that can capture the dependability of decisions made through the confidence level of decision makers. The Z-number contains two parts in an ordered pair of fuzzy numbers. The first element constitutes the ratings, whereas the second element entails the decision makers’ level of confidence in the ratings. Z-numbers are used to execute decision makers’ evaluations, as the decision makers will decide on their level of confidence in the ratings made, thereby making the decision more reliable.
The benefits of fuzzy systems in terms of explainability, interpretability, and transparency have been emphasized in recent years. By depicting the arrangement of measures as a node and the network as links, Gegov introduced the fuzzy network, which is a networked rule-based system that contains the interior structure of the demonstrating network [6]. A fuzzy network also has the ability to be direct and precise, which is highly important when trying to make a better judgment. Although fuzzy networks have the same capabilities as other types of fuzzy systems with rule bases, they are also acknowledged as a novel approach in fuzzy systems owing to the straightforwardness and precision of the application’s structure. These two characteristics are crucial for better decision-making and are often emphasized [7]. In order to illuminate the transparency that has received less attention in the paradigm of complex systems, fuzzy networks are used. Adel, Teh, and Raja [8] claimed that a system that has coherently applied transparency denotes a model that can accurately represent the relationship between the input and output applied. In order to accommodate more information in the decision-making process, the suggested approach incorporates social network analysis with a fuzzy network approach to highlight transparency.
According to Bonchi, Castillo, Gionis, and Jaimes [9], social network analysis is a significant and vital means of network analysis. Using the theoretical instrument of social network analysis, Perez, Mata, and Chiclana in 2014 [10] carried out a study to look at the links that bind people, groups, organizations, or communities. Moreover, in order to accommodate the idea of connected relationships among a group of people, social network analysis is helpful. Additionally, it is believed that people are linked to and interconnected with one another globally. As asserted by Canright and Engo-Monsen [11], social network analysis plays a crucial role in revealing the links and alliances formed by individuals and further confirming the context in which each individual interacts with others. Furthermore, the interactions occurring between individuals generate value for the information received; thus, they are useful for decision makers in making decisions.

2. Z-Hesitant Fuzzy Network with Social Network Analysis (Z-HFN SNA)

In this section, Z-HFN SNA is demonstrated in steps. Firstly, the community detection method (CDM) is carried out in Steps 1–3 and Steps 4–8 implying the TOPSIS method for computing the closeness coefficient (CC). Meanwhile, Steps 9–14 are the steps involved in the fuzzy network approach. The formulation steps are as follows:
Step 1: Using Pajek software, distinguish the network structure linked by experts to find the degree centralities, C D d ρ of experts, ρ . Normalize the degree centralities, ( C D d ρ ) , and the expertise levels of experts as evaluated by the experts themselves.
C D d ρ = C D d ρ ρ = 1 t C D d ρ
Step 2: Detect the partitions among the large-scale decision makers. Calculate the fusion of degree centrality, C F d ρ , and the expertise level in the fusion centrality, C E d ρ , using the following normalized degree centralities:
C F d ρ = φ C D d ρ + ( 1 φ ) ( C E d ρ )
where φ is defined as the importance of the degree of the relation between two centralities that are set by the experts between 0 and 1.
Step 3: Compute the partitions weights, ( ω ρ ). Calculate the weight of each node that represents the experts’ and the partitions’ weights according to the partitions grouped using Pajek in the community detection method. The value of the weight of node, v ρ   ( v ρ C t , 1 ρ r ) , is calculated as follows:
ω ρ = C F d ρ ρ = 1 s C F d ρ
where there are s nodes being clustered into ρ groups under the community detection method as r nodes are acquired in the community, C t ( 1 t ρ ) . The distance between a group and the entire network indicates the weight of the group, with a group’s closeness to the entire network reflecting its higher weight. The mean fusion centrality for all DMs is accommodated at the center of the entire network, whereas the weight of the group, determined as the sum of the fusion centralities of its members, is similar to the center of the group. The fusion centrality, ( C F ) , of the whole network is calculated as follows:
C F = ρ N C F d ρ N
where N is defined as the total number of nodes as a whole in the network, N = v 1 , v 2 , v 3 , v N . Subsequently, calculate the fusion centrality of each group:
C F t = ρ Z t C F Z ρ Z t
where Z t is defined as the number of nodes in the t th group, and C F and Z ρ stand for nodes in Z ρ in the group, C F . Using the fusion centrality of the whole network, C F , and fusion centrality of each group, C F t , calculate the weight of each group, ω t , in the Formula (6). The relationship between a group’s weight and its distance from the entire network can be shown by measuring the distance of the fusion centrality between each group and the network as a whole.
ω t = ω t ρ = 1 t ω t
σ k = θ k i = 1 k θ k For   k = 1 , 2 , K
ω t = 1 C F t C F
Step 4: Construct the decision matrices. Specifically, use the information in Table 1 to translate the ratings of alternatives into fuzzy numbers and build decision matrices. The implementation of Z-numbers in the fuzzy network approach typically requires additional reliability in the decisions made according to the alternatives delivered by decision makers in reference to each criterion. Thus, decision makers are advised to apply the linguistic terms that represent reliability, as shown in Table 2, in order to signify their confidence in the decisions made on the alternatives.
The hesitant fuzzy set is incorporated into the decision matrix, which can be expressed as follows:
H i j , k = h 11 h 12 h 1 n h 21 h 22 h 2 n h m 1 h m 2 h m n
where H i k is the decision matrix in accordance with i alternatives, the j th attribute, and k decision makers. Hesitant fuzzy elements, h m n , stand for possible decisions on the alternatives of the decision matrix delivered by the decision makers. Specifically, a hesitant fuzzy set of the ith alternative, A i , on x k is given by
A i = < x j , h A i ( x j ) > x j X ,
where h A i x j = γ γ h A i x j , 0 γ 1 ,   i = 1 , 2 , , m ;   j = 1 , 2 , , n
h A i x j is the possible membership degrees of the i th alternative, A i , under the j th attribute, x j , and it can be interpreted as HFE, h i j . In simple words, decision makers are allowed to contribute several opinions to an alternative, according to an attribute.
Step 5: Assign the weight and normalize the decision matrices. Incorporate the weight into decision matrices accordingly by multiplying the importance of criteria to each decision matrix, h A i x j , and normalize the membership function by dividing each value into the maximum values. The same weighting and normalization processes are applied for all sub-criteria.
Normalized   h A i x j = h A i x j max ( h A 1 x 1 , h A 1 x 2 , , h A m x n )
where i = 1 , 2 , , m ,   j = 1 , 2 , , n .
Step 6: Retrieve the positive ideal solution (PIS) and negative ideal solution (NIS) for each alternative.
A + = x j , m a x h A i x j , i = 1 , 2 , , m
= x 1 , h A 1 1 + , h A 1 2 + , , h A 1 l + × x 2 , h A 2 1 + , h A 2 2 + , , h A 2 l + ×   x n , h A m 1 + , h A m 2 + , , h A m l +
A = x j , m i n h A i x j , i = 1 , 2 , m
A = x 1 , h A 1 1 , h A 1 2 , , h A 1 l × x 2 , h A 2 1 , h A 2 2 , , h A 2 l × x n , h A m 1 , h A m 2 , , h A m l
Step 7: Determine the distance, d i , of each alternative from the PIS and NIS using the hesitant fuzzy Euclidean distance.
d i + = j = 1 m d h A i x j , h x j + w j
= i = 1 n w j 1 l λ = 1 l h A i x j h x j σ ( λ ) + 2
d i = j = 1 m d h A i x j , h x j w j
= i = 1 n w j 1 l λ = 1 l h A i x j h x j σ ( λ ) 2
i = 1 , 2 , n
Step 8: Compute each alternative’s relative closeness coefficient ( C C i ).
C C i = d i d i + + d i
θ resembles the influence degree of the kth partition. By allocating the normalized influence degree to each correlation coefficient of the alternatives, I C C i , k , in line with the category of criteria, the procedure is carried out
I C C i , k = θ k × C C i , k
according to i = 1 , 2 , , n and k = 1 , 2 , , K .
Next, I C C i , k is normalized as shown in the following equation in order to ensure that the values between 0 and 1 are achieved:
N I C C i , k = I C C i , k max j I C C i , k
According   to   j = 1 ,   2 , ,   m   and   k = 1 ,   2 , ,   K
Subsequently, the level of alternative performance is calculated by translating the normalized influenced closeness coefficient into linguistic terms.
Step 9: Based on DM opinions and NICC coefficient values, construct the antecedent and consequent matrices for the category systems. We can determine the antecedent matrix of each category, D and F, for each partition, k, the opinions of all DMs, and A i for each possibility with regard to each criterion, as shown in Equations (21) and (22):
D k = d 11 , k d 12 , k d 1 m , k d 21 , k d 22 , k d 2 m , k d e 1 , k d e 2 , k d e m , k
F k = f 11 , k f 12 , k f 1 m , k f 21 , k f 22 , k f 2 m , k f e 1 , k f e 2 , k f e m , k
for   k = 1 , 2 , ,   K
where d e m , k and f e m , k are the linguistic terms representing the opinions of decision makers for category D and F . The consequent matrices are defined as in Equations (19) and (20).
ϑ k = D L ϑ 1 , k   ϑ 2 , k ϑ m , k
τ k = F L τ 1 , k   τ 2 , k τ m , k
as   k = 1 , 2 , ,   K .
where ϑ k and τ k are linguistic terms that represent the output of the category systems based respectively on the values of N I C C i , k . The D subsystem consists of K decision matrix rules presented in the rule base in Equation (21).
If   D k = d 11 , k d 12 , k d 1 m , k d 21 , k d 22 , k d 2 m , k d e 1 , k d e 2 , k d e m , k ,   then   ϑ k = ϑ 1 , k   ϑ 2 , k ϑ m , k
For matrices   k = 1 ,   2 ,   ,   K .
The NICC equation indicates the difference between each alternative amid the fuzzy positive initial solution (FPIS) that represents the compromise solution and FNIS with the closest consensus solution value of 1, as the FNIS represents the worst possible solution. In other words, NICC values nearer to 1 result in the most exclusive coefficients among the alternatives. The scalar is then interpreted into linguistic terms under the value with the biggest membership degree, and can best be described in if-then rules:
r u l e   1 :   i f   D 1   i s   d 11 , k   a n d   D e   i s   d e 1 , k ,   t h e n   D L 1   i s   ϑ 1 , k
r u l e   m :   i f   D 1   i s   d 1 m , k   a n d   D e   i s   d e m , k ,   t h e n   D L m   i s   ϑ m , k
where D L is the D level of alternatives for i = 1 , 2 , m and k = 1 , 2 , K . The same application of rule bases is applied to the F subsystem, which consists of the following K decision matrix rules:
If   F k = f 11 , k f 12 , k f 1 m , k f 21 , k f 22 , k f 2 m , k f e 1 , k f e 2 , k f e m , k ,   then   τ k = τ 1 , k   τ 2 , k τ m , k
For matrices   k = 1 ,   2 , ,   K .
The NICC is then interpreted into linguistic terms under the value that has the biggest membership degree, and is best described in if-then rules as follows:
r u l e   1 :   i f   F 1   i s   f 11 , k   a n d   F e   i s   f e 1 , k ,   t h e n   F L 1   i s   τ 1 , k
r u l e   m :   i f   F 1   i s   f 1 m , k   a n d   F   i s   f e m , k ,   t h e n   F L m   i s   τ m , k
Step 10: Construct the antecedent matrices and consequent matrices for the alternative system (AS). The AS antecedent matrices are based on the category levels, D L , ϑ m , k ,   a n d   F L , τ m , k , which represent the outputs of the category systems. Every ordered list of inputs corresponds to the computed degrees of identical alternatives using n different types of criteria. Therefore, the AS antecedent matrices, G, are of size n × m · m . For example, under the same matrices and rule bases of two inputs, DL and FL, the antecedent matrices, G k , in the size of 2 × m are as follows:
G k = D L F L ϑ 1 , k ϑ 2 , k ϑ m , k τ 1 , k τ 2 , k τ m , k
F o r   k = 1 , 2 , , K
Step 11: Derive the consequent matrices of the alternative system.
  • Calculate the average of weighted NICCs according to each category. The aggregation of weighted NICCs, δi,k, is divided by the number of main categories, n, to reflect the equivalent value of each of the two subsystems in a weighted mean:
    δ i , k = N I C C i , k D × e e   +   f + N I C C i , k F × f e   +   f n
    f o r   i = 1 , 2 , ,   n   a n d   k = 1 , 2 , ,   K .
  • Subsequently, normalization is required to ensure that the NICC, δ i,k is stated between 0 and 1 by adapting the following formula:
    N δ   i , k = δ   i , k max i δ   i , k
    f o r   i = 1 , 2 , , n   a n d   k = 1 , 2 , , K .
  • Translate the normalized affected closeness coefficient into linguistic terms to create the ensuing matrices for the alternative system (AS). Next, the K for AS consequent matrices, in this case of size 1 × m instead of 1 × m·m, is as follows:
    k = AL[ 1,k 2,k m,k]
    for k = 1,2, …, K
  • K matrices represent decision rules that are elaborated on in terms of the alternative system in which AL stands for alternative level.
I f   G k = D L F L ϑ 1 , k ϑ 2 , k ϑ m , k τ 1 , k τ 2 , k τ m , k ,   t h e n   N δ   k = A L N δ   1 , k N δ   2 , k N δ   m , k
f o r   k = 1 , 2 ,   ,   K
This is best described with if-then rules, as follows:
rule 1: if DL is ϑ1,k and FL is τ1,k, then AL is 1,k.
⋮  ⋮  ⋮
rule m: if DL is ϑm,k and FL is τm,k, then AL is m,k.
for k = 1,2, …, K.
Step 12: Build the generalized Boolean matrix of the overall system.
  • The rules developed based on the category systems, DS, FS, and AS, are used by converting the rules into decision matrices based on the evaluation of K decision makers in order to produce a generalized Boolean matrix for each alternative:
    Θ 1 , k ϑ m , k d 11 , k d 1 m , k d e 1 , k d e m , k 1 0 0 1
    The Boolean matrix’s row and column labels represent every potential permutation for the output’s DS rule base of linguistic terms.
    τ 1 , k τ m , k f 11 , k f 1 m , k f e 1 , k f e m , k 1 0 0 1
    where the FS rule base’s linguistic phrases for the output are all feasible permutations for the row and column labels of the Boolean matrix.
  • Conduct vertical merging between the generalized Boolean matrices of DS and FS in order to form a generalization of the Boolean matrix:
    ϑ 1 , k ϑ m , k τ 1 , k τ m , k d 11 , k d 1 m , k f 11 , k f 1 m , k d e 1 , k f e 1 , k d e m , k f e m , k 1 0 0 1
  • Construct the generalized Boolean matrix AS with regard to the decision makers’ evaluations:
    N δ 1 , k N δ m , k ϑ 1 , k τ 1 , k ϑ m , k τ m , k 1 0 0 1
    The overall system is interpreted in the generalized Boolean matrix of m alternatives according to the evaluation of K decision makers, as follows:
N δ 1 , k N δ m , k d 11 , k d 1 m , k f 11 , k f 1 m , k d e 1 , k f e 1 , k d e m , k f e m , k 1 0 0 1
Step 13: Set up the rules for the alternatives based on the system’s generalized Boolean matrix.
rule 1: if DL is ϑ1,k and … and DL is ϑ1,k, and FL is τ1,k, … and FL is τ1,k, then AL is  1,k.
⋮  ⋮  ⋮
rule m: if DL is ϑ1,k andand DL is ϑ1,k, and FL is τ1,k, … and FL is τ1,k, then AL is  1,k.
Step 14: Derive the final score for each alternative.
Multiply the influence multiplier with the average aggregate membership value of the consequent part of the previous nj rules to obtain the final score, φi, for each alternative, j.
φ i = R u l e   1 n k = 1 K N δ i , K · N I C C i , k D + N I C C i , k F n · K
For   i = 1 , m
Finally, the final scores, φi, of the alternatives are arranged in descending order to acknowledge the ranking of the alternatives. Better alternatives can be acknowledged to score the highest in the final score after the arrangement of all alternatives.

3. Asset Allocation

Investors consider stock market analysis carefully to ensure that their investments increase in value. Decisions are drawn from various sources, including social networks that include extensive levels of interactions and inputs. This has drawn a lot of attention to the development of big data and social computing. In this section, a case study takes into account 33 decision makers (DM) from a Facebook page, each with a different level of expertise, to evaluate 30 stocks from Bursa Malaysia Kuala Lumpur Composite Index (KLCI) companies to invest according to the assigned attributes, including the market value firm (MVF), return on equity (ROE), debt to equity (D/E), current ratio (CR), market value to net sales (MV/NS), and price per earning (P/E). In this study, the stocks were assigned as alternatives, A = {S1, S2, S3,…, S33}, with respect to six attributes, and their weights, w, were determined. The alternatives were considered unknown to the decision makers, and only the values of the attributes of each stock were taken into account.
Step 1: Determine the network structure of the LGDM problem.
The decision makers are linked to the network structure based on their expertise level and propensity towards risk interaction and investment behavior towards each other. For example, the edge between DM1 and DM5 is denoted as e(DM1, DM5).
Step 2: Detect partitions in large-scale DMs.
The 33 DMs can be classified into five partitions by running the community detection method via the Pajek 5.13 software package. The five partitions are shown in Table 3.
Step 3: Calculate the weights for the nodes and partitions.
The node weight vectors, w, for the 33 DMs who belong to different clusters, are shown in Table 4, Table 5, Table 6, Table 7 and Table 8. Similarly, the partition weight vectors, w, for the five partitions are shown in Table 9.
Step 4: Create the decision matrices for the five partitions.
Apply HFN to construct the decision matrices for the five partitions. After being converted to fuzzy numbers, the evaluations of the five expert groups are applied in the form of HFS.
Step 5: Calculate the positive initial solution (PIS) and the negative initial solution (NIS).
Determine the hesitant fuzzy PIS (A+) and NIS (A) separately according to the decision makers:
A+ ={〈0.9, 1, 1, 1〉, 〈0.9, 1, 1, 1〉, 〈0.7667, 0.9333, 0.9333, 1〉, 〈0.9, 1, 1, 1〉, 〈0.9, 1, 1, 1〉, 〈0.9, 1, 1, 1〉}
A = {〈0.0333, 0.1333, 0.1333, 0.3〉, 〈0, 0.0333, 0.0333, 0.1667〉, 〈0, 0.0333, 0.0333, 0.1667〉, 〈0, 0.0333, 0.0333, 0.1667〉, 〈0.0333, 0.1667, 0.1667, 0.3667〉, 〈0.3667, 0.5667, 0.5667, 0.7667〉}
Step 6: Compute the separation measures for each alternative.
The distances, δ+ and δ, are calculated according to each cost and benefit criterion as in Table 10. Alternatives A i from the A + and A are determined using Equations (18)–(20).
Step 7: Calculate the relative closeness to the ideal solution. The relative closeness coefficients ϕ i alternative Ai are calculated and the result is shown is Table 11.
Step 8: Compute the normalized influence closeness coefficient (NICC) and the influence closeness coefficient (ICC).
Using the information in Table 11, incorporate the weights as the influence degree of each partition. To generate NICCs, the influence degree of each partition to the closeness coefficient of alternatives is calculated according to Equation (18) until Equation (20).
Step 9: The rule base for the benefit system (BS) and the cost system (CS) is constructed based on the NICC calculated. The NICC obtained is converted into linguistic terms in order to form the antecedent and consequent matrices of both the BS and CS, as performed in Equations (21)–(26).
N I C C 1,1 B = 0.3266 = R
N I C C 1,1 C = 0.2325 = B
M 1 = B L C L λ 1,1 , λ 2,1 , λ 3,1 λ 30,1 ψ 1,1 , ψ 2,1 , ψ 3,1 ψ 30,1
= B L C L R , G , R R B , R , B R
Rule   1 :   I f   B L 1   i s   R   a n d   a n d   C L 1   i s   B ,   t h e n   A L 1   i s   N ξ 1 , k . Rule   m :   I f   B L 30   i s   λ 30 , k   a n d   a n d   C L m   i s   ψ m , k , t h e n   A L m   i s   N ξ m , k .
Step 10: Build the antecedent matrices of the alternative system (AS). The antecedent matrices, Mk, of the alternative system (AS) of each DM, k, are constructed based on the benefit level (BL) and cost level (CL), which are the outputs of the benefit system (BS) and cost system (CS), respectively, based on the opinion of G1.
M 1 = B L C L λ 1,1 , λ 2,1 , λ 3,1 λ 30,1 ψ 1,1 , ψ 2,1 , ψ 3,1 ψ 30,1
              = B L C L R , G , R R B , R , B R
The AS consequent matrices are derived as follows:
  • The calculation of the aggregation, ξj,1, of weighted NICCB and NICCC is as follows:
    ξ 1 , 1 = N I C C 1,1 B × e e   +   f + N I C C 1,1 C × f e   +   f 2
    = 0.3266 × 4 2   +   4 + 0.2325 × 2 2   +   4 2
    = 0.2952
  • The normalization of the values of ξj,k to confirm that their values lie between [0, 1] is as follows:
    N ξ 1 , 1 = ξ 1 , 1 max j ξ j , 1 = 0.2952 0.5
    = 0.5905 = G
  • The values of Nξ1,1 are converted into linguistic terms.
The AS consequent matrix, N1, for G1 is constructed based on the values of Nξj,1 or each alternative, j, as follows:
I f   M 1 = B L C L R , G , R R B , R , B R ,     t h e n   N 1 = A L G , R R .
This can best be interpreted in the following rule bases:
Rule 1: if BL is R, and CL is B, then AL is G.
Rule 2: if BL is G, and CL is R, then AL is R.
Rule 2: if BL is G, and CL is R, then AL is R.
Step 11: The derived rules from the BS, CS, and AS are presented as Boolean matrices. The resulting Boolean benefit system matrix for S1 is displayed below:
1111 2222 5555 6233 6234 1 0 2 0 0 0 0 0 3 0 1 1 4 0 5 0 0 0 0
The Boolean cost system matrix for S1 was generated, as shown below:
11 16 22 25 26 1 2 1 1 3 1 4 5
Vertical merging was projected to combine the BS-generalized Boolean matrices with the CS-generalized Boolean matrices to create a generalized Boolean matrix.
5555 / 55 6233 / 16 6233 / 25 6233 / 26 6234 / 16 6234 / 25 11 0 0 22 0 0 31 0 32 0 1 1 1 1 33 0 0 0 0 1 34 0 0 0 0 0 0 0 0 35 0
The AS Boolean matrix for S1 was evaluated as follows:
11 22 32 33 1 2 3 1 1 4 5   5555 / 55 6233 / 16 6233 / 25 6233 / 26 6234 / 16 6234 / 25 6234 / 26 1 0 2 0 0 0 0 3 0 1 1 1 1 1 1 4 0 5 0 0 0
The rules for stock S1 were generated in reference to the Boolean matrix derived:
Rule 1:6233/16/36233163R
Rule 2:6233/25/36233253R
Rule 3:6233/26/36233263R
Rule 4:6234/25/36234253R
Rule 5:6234/26/36234263R
Five rules were obtained, which can be interpreted according to the linguistic terms on the level of rating, as follows:
Rule 1: If B 1 is G, and B 2 is P and B 3 is MP and B 4 is MP and C 1 is VP and C 2 is G, then S1 is R.
Rule 2: If B 1 is G, and B 2 is P and B 3 is MP and B 4 is MP and C 1 is P and C 2 is MG, then S1 is R.
Rule 3: If B 1 is G, and B 2 is P and B 3 is MP and B 4 is MP and C 1 is P and C 2 is G, then S1 is R.
Rule 4: If B 1 is G, and B 2 is P and B 3 is MP and B 4 is N and C 1 is P and C 2 is MG, then S 1 is R.
Rule 5: If B 1 is G, and B 2 is P and B 3 is MP and B 4 is N and C 1 is P and C 2 is G, then S 1 is R.
Step 12: Derive the final scores and ranks. The ranking positions for all 30 stocks considered in this case study are defined based on the principle that the higher the final score, the better the ranking position.

4. Analysis of Results

For the validation of the proposed Z-HFN-SNA, the authors considered the established TOPSIS method [12] for comparison. This method was applied to find the final ranking of the stocks from the case study in Section 3, which was then compared with the performance of the novel Z-HFN SNA. As observed from the final rank obtained in Table 12 and scores calculated under Spearman analysis [13] in Table 13, the novel method, namely the Z-hesitant fuzzy network with social network analysis (Z-HFN SNA) approach, outperformed the established LGDM method since the novel approach could imply more decisions from DMs, which were divided into five divisions using the community detection method under SNA. The use of tentative fuzzy valuations increases the dependability and usefulness of the DMs’ judgments in making decisions. Additionally, the fuzzy network added to the methodology provided transparency, as intermediate variables were used to translate inputs into outputs. The implementation of SNA in this approach also seems effective in adapting the model of relationships among a group of people. The study has demonstrated that when analyzing a network, having more networks in a personal network yields better outcomes. In fact, it is essential to consider how the nodes are connected or not connected, as well as the destinations of the networks that are created [14].

5. Conclusions

This study has proposed a novel approach by enhancing rule-based fuzzy networks’ capabilities for use in large-scale decision-making. The Z-HFN SNA considers experts’ experiences, influence, and knowledge while making decisions. By explicitly considering all subsystems and interactions, the suggested strategy simultaneously increases transparency, notably in the decision-making process. However, due to the shifting financial conditions and limited time and sources, such as volunteer decision makers in the approach, there is a limit in testifying to the approach’s effectiveness across a range of studies and at various times. The strategy can also be improved by combining other fuzzy approaches such as type-2 fuzzy numbers and implementing an Analytic Hierarchy Process (AHP) in the approach. By utilizing actual ranks as a benchmark in comparison to the approach, the performance of the suggested method can be validated.

Author Contributions

Main text, S.S. and A.M.Y.; fuzzy Network, A.G.; supervision, A.M.Y. and A.G.; funding acquisition, S.F.A.R. and K.M.N.K.K. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Ministry of Higher Education (MOHE) of Malaysia through the Fundamental Research Grant Scheme (FRGS/1/2021/STG06/UUM/03/1). We would like to thank the Government of Malaysia for providing the MyBrain15 program and sponsoring this research under the self-funded research grant and L00022 from the Ministry of Science, Technology, and Innovation (MOSTI). The authors would like to thank Universiti Malaysia Pahang for the additional financial support under the UMP Postgraduate Research Grants Scheme (PGRS) No. PGRS2003168.

Data Availability Statement

Data is unavailable due to privacy and ethical restrictions.

Acknowledgments

This research was supported by the Ministry of Higher Education (MOHE) of Malaysia through the Fundamental Research Grant Scheme (FRGS/1/2021/STG06/UUM/03/1). We would also like to thank the Government of Malaysia for providing the MyBrain15 program and sponsoring this research under the self-funded research grant and L00022 from the Ministry of Science, Technology, and Innovation (MOSTI). The authors would like to thank Universiti Malaysia Pahang for the additional financial support under the UMP Postgraduate Research Grants Scheme (PGRS) No. PGRS2003168.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Liu, Y.; Liu, J.; Hong, Z.Y. A Multiple Attribute Decision Making Approach Based on New Similarity Measures of Interval-valued Hesitant Fuzzy Sets. Int. J. Comput. Intell. Syst. 2018, 11, 15–32. [Google Scholar] [CrossRef]
  2. Aliev, R.; Memmedova, K. Application of Z-Number Based Modelling in Psychological Research. Comput. Intell. Neurosci. 2015, 2015, 760403. [Google Scholar] [CrossRef] [PubMed]
  3. Tiryaki, F.; Ahlatcioglu, M. Fuzzy stock selection using a new fuzzy ranking and weighting algorithm. Appl. Math. Comput. 2005, 170, 144–157. [Google Scholar] [CrossRef]
  4. Xia, M.; Xu, Z. Hesitant fuzzy information aggregation in decision making. Int. J. Approx. Reason. 2011, 52, 395–407. [Google Scholar] [CrossRef]
  5. Kang, B.; Wei, D.; Li, Y.; Deng, Y. A method of converting Z-number to classical fuzzy number. J. Inf. Comput. Sci. 2012, 9, 703–709. [Google Scholar]
  6. Yaakob, A.M.; Serguieva, A.; Gegov, A. FN-TOPSIS: Fuzzy Networks for Ranking Traded Equities. IEEE Trans. Fuzzy Syst. 2017, 25, 315–332. [Google Scholar] [CrossRef]
  7. Wang, L.; Rodriguez, R.M.; Wang, Y.-M. A dynamic multi-attribute group emergency decision making method considering experts’ hesitation. Int. J. Comput. Intell. Syst. 2018, 11, 163–182. [Google Scholar] [CrossRef]
  8. Lahsasna, A.; Ainon, R.N.; Wah, T.Y. Enhancement of transparency and accuracy of credit scoring models through genetic fuzzy classifier. Maejo Int. J. Sci. Technol. 2010, 4, 136–158. [Google Scholar]
  9. Bonchi, F.; Castillo, C.; Gionis, A.; Jaimes, A. Social Network Analysis and Mining for Business Applications. ACM Trans. Intell. Syst. Technol. 2011, 2, 1–37. [Google Scholar] [CrossRef]
  10. Perez, L.G.; Mata, F.; Chiclana, F. Social network decision making with linguistic trustworthiness–based induced OWA operators. Int. J. Intell. Syst. 2014, 29, 1117–1137. [Google Scholar] [CrossRef]
  11. Canright, G.S.; Engo-Monsen, K. Introducing Network Analysis. In Telektronikk Network Analysis; Lehne, P.H., Ed.; Telenor ASA: Oslo, Norway, 2008; Volume 104, p. 418. [Google Scholar]
  12. Yaakob, A.M.; Shafie, S.; Gegov, A.; Abdul Rahman, S.F. Z Hesitant Fuzzy Network Model with Reliability and Transparency of Information for Decision Systems. Int. J. Comput. Intell. Syst. 2021, 14, 176. [Google Scholar] [CrossRef]
  13. Sedgwick, P. Spearman’s rank correlation coefficient. BMJ 2014, 349, g7327. [Google Scholar] [CrossRef] [PubMed]
  14. Fox, W.P.; Everton, S.F. Mathematical modeling in social network analysis: Using TOPSIS to find node influences in a social network. J. Math. Syst. Sci. 2017, 3, 531–541. [Google Scholar]
Table 1. Linguistic terms for the ratings of alternatives.
Table 1. Linguistic terms for the ratings of alternatives.
Linguistic TermFuzzy Number
Very poor (VP)(0, 0, 1)
Poor (P)(0, 1, 3)
Medium poor (MP)(1, 3, 5)
Fair (F)(3, 5, 7)
Medium good (MG)(5, 7, 9)
Good (G)(7, 9, 10)
Very good (VG)(9, 10, 10)
Table 2. Linguistic terms for the reliability of each criterion.
Table 2. Linguistic terms for the reliability of each criterion.
Linguistic TermRankFuzzy Number
Strongly unlikely 1(0.00, 0.00, 0.10)
Unlikely 2(0.00, 0.10, 0.25)
Somewhat unlikely 3(0.10, 0.25, 0.40)
Neutral 4(0.25, 0.40, 0.55)
Somewhat likely 5(0.40, 0.55, 0.70)
Likely 6(0.55, 0.70, 0.85)
Strongly likely7(0.70, 0.85, 1.00)
Table 3. Decision makers (DMs) according to partition.
Table 3. Decision makers (DMs) according to partition.
PartitionDecision Makers (DMs)
P1DM1, DM3, DM8, DM12, DM15, DM25, DM33
P2DM2, DM11, DM16, DM18, DM19, DM20
P3DM4, DM6, DM14, DM22, DM24, DM28
P4DM5, DM7, DM9, DM13, DM17, DM21,
DM23, DM27, DM30, DM32
P5DM10, DM26, DM29, DM31
Table 4. Node weights for Partition 1.
Table 4. Node weights for Partition 1.
w1w3w8w12w15w25w33
0.1550.1110.1440.1220.0880.2110.166
634008849164695045605
Table 5. Node weights for Partition 2.
Table 5. Node weights for Partition 2.
w2w11w16w18w19w20
0.19410.09680.16500.20400.14570.1941
513269623551
Table 6. Node weights for Partition 3.
Table 6. Node weights for Partition 3.
w4w6w14w22w24w28
0.15590.13020.14280.24630.20780.1167
034657587165
Table 7. Node weights for Partition 4.
Table 7. Node weights for Partition 4.
w 5 w 7 w 9 w 13 w 17 w 21 w 23 w 27 w 30 w 32
0.1043960.1268730.1418580.104520.104520.104770.1714540.0373380.1042710.104271
Table 8. Node weights for Partition 5.
Table 8. Node weights for Partition 5.
w10w26w29w31
0.175330.3856090.1935390.245521
Table 9. Partition weights for the entire network.
Table 9. Partition weights for the entire network.
P1P2P3P4P5
0.1671230.4809930.1716170.138610.041656
Table 10. Separation measures of stocks from A+ and A.
Table 10. Separation measures of stocks from A+ and A.
StockBenefit CriteriaCost Criteria
δ+δδ+δ
S10.87920.39740.36160.1051
S20.44860.83890.30520.1643
S30.92570.35520.37770.0937
S40.14611.13540.26150.2107
S300.71660.55990.35350.1169
Table 11. Closeness coefficients, Φ, of stocks.
Table 11. Closeness coefficients, Φ, of stocks.
StocksΦBΦC
S10.31130.2251
S20.65160.3499
S30.27730.1988
S40.88600.4462
S300.43860.2485
Table 12. Comparison of the ranking of stocks according to the proposed and established methods.
Table 12. Comparison of the ranking of stocks according to the proposed and established methods.
STOCKRANKING
ACTUALZ-HFN SNAZ-HFN
S1302825
S291718
S3212526
S4263
S5243030
S6232427
S7181315
S81496
S9121816
S10442
S111112
S1281114
S13131013
S141171
S15202929
S1651617
S17272728
S18191510
S197149
S206311
S211054
S22152021
S23222119
S2416125
S251787
S26262323
S27281924
S28252620
S29328
S30292222
Table 13. Spearman rho correlation.
Table 13. Spearman rho correlation.
MethodsSpearman Rho Correlation
Proposed method:
Z-HFN SNA
0.817
Established method: Z-HFN0.712
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Yaakob, A.M.; Shafie, S.; Gegov, A.; Rahman, S.F.A.; Khalif, K.M.N.K. Large-Scale Group Decision-Making Method Using Hesitant Fuzzy Rule-Based Network for Asset Allocation. Information 2023, 14, 588. https://doi.org/10.3390/info14110588

AMA Style

Yaakob AM, Shafie S, Gegov A, Rahman SFA, Khalif KMNK. Large-Scale Group Decision-Making Method Using Hesitant Fuzzy Rule-Based Network for Asset Allocation. Information. 2023; 14(11):588. https://doi.org/10.3390/info14110588

Chicago/Turabian Style

Yaakob, Abdul Malek, Shahira Shafie, Alexander Gegov, Siti Fatimah Abdul Rahman, and Ku Muhammad Naim Ku Khalif. 2023. "Large-Scale Group Decision-Making Method Using Hesitant Fuzzy Rule-Based Network for Asset Allocation" Information 14, no. 11: 588. https://doi.org/10.3390/info14110588

APA Style

Yaakob, A. M., Shafie, S., Gegov, A., Rahman, S. F. A., & Khalif, K. M. N. K. (2023). Large-Scale Group Decision-Making Method Using Hesitant Fuzzy Rule-Based Network for Asset Allocation. Information, 14(11), 588. https://doi.org/10.3390/info14110588

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop