1. Introduction
Multi-attribute decision-making (MADM) procedures are some of the finest or best techniques for evaluating the valuable and dominant preference from the set of feasible ones under the consideration of the available data. Traditionally, the MADM problem is a part of the decision-making procedure which often needs experts to provide evaluation data about the attributes and the alternatives with fuzzy sets (FSs) [
1] in which FSs have been applied in different fields [
2,
3,
4]. Various attempts have been derived by the distinct individuals in proceeding the data values using different extensions such as hesitant soft fuzzy rough sets [
5], and fuzzy Mandelbrot sets [
6]. Furthermore, intuitionistic FSs (IFSs) are also one of the most valuable and dominant extensions of FSs which was performed by Atanassov [
7]. IFSs cover the degree of membership and the degree of non-membership of a given element to the set of discourse with the characteristic in which the sum of the pair must be contained in the unit interval. FSs are the particular cases of IFSs if we remove the degree of non-membership with its applications [
8,
9,
10]. Furthermore, the utilization of the second term in the grade of truth is very awkward, and so, in many situations, we may face a problem with two-dimensional information, where FSs and IFSs deal only with one-dimensional information. Therefore, Ramot, et al. [
11] successfully utilized the second term in the grade of truth and gave their name in the form of complex FS (CFS), where the truth grade in CFS is computed in the form of complex numbers whose real and unreal (imaginary) parts are covered in the unit interval. Various attempts have been performed by various individuals using systems such as the Mamdani complex fuzzy inference system [
12]. Additionally, Alkouri and Salleh [
13] exposed the new theory of complex IFS (CIFS) with its applications [
14], which is the modified version of the three different types of ideas such as FSs, IFSs, and CFSs.
Frank t-norm and t-conorm are used for computing any type of aggregation operators (AOs) which was derived by Frank [
15] in 1979. Frank norms have a lot of benefits because the simple algebraic and Lukasiewicz’s t-norm and t-conorm [
16] are the special cases of Frank t-norm and t-conorm. Furthermore, the idea of prioritizing AOs for the first time was given by Yager [
17], and then Yu and Xu [
18] who considered prioritized intuitionistic fuzzy AOs. These AOs were computed based on algebraic operational laws. Moreover, the main idea of the weighted aggregated sum product assessment (WASPAS) technique was given by Zavadskas, et al. [
19,
20] with its applications [
21,
22], which is the generalization of two different techniques such as weighted sum assessment (WSA) and weighted product assessment (WPS). The WASPAS technique is very strong and valuable because this is the modified version of many techniques and many individuals have utilized it in numerous fields such as the computer sciences, pure mathematics, engineering sciences, artificial intelligence, and decision-making.
The theory of FSs, IFSs, CFSs, and CIFSs has gained a lot of attention from different fuzzy researchers because these structures are very beneficial and valuable for depicting awkward and unreliable information very easily. Various attempts have been derived by distinct individuals in proceeding with the data values using different extensions such as AOs for IFSs [
23] and geometric AOs for IFSs [
24]. Furthermore, the Frank power AOs based on IFSs [
25] are also a combination of the Frank and power AOs which is a very awkward and complicated task. The complex fuzzy credibility of Frank AOs was derived by Yahya, et al. [
26]. Under the consideration of hesitant fuzzy information, the theory of Frank AOs was invented by Qin, et al. [
27]. In the presence of the dual hesitant set theory, the major theory of Frank AOs was evaluated by Tang, et al. [
28]. The prioritized AOs for trapezoidal IFS were derived by Ye [
29], and the simple prioritized AOs for IFS were evaluated by Yu and Xu [
18]. Ali, et al. [
30] derived the idea of prioritized AOs for CIF soft information with their application in decision-making procedures. Yu [
31] examined the theory of generalized prioritized AOs for intuitionistic fuzzy environments, and Lin, et al. [
32] derived the fuzzy number intuitionistic fuzzy prioritized AOs and their application in decision-making procedures. Furthermore, Garg and Rani [
33] exposed the averaging operators for CIFSs. Garg and Rani [
34] evaluated the geometric operators for CIFSs, and Mahmood, et al. [
35] examined the Aczel–Alsina AOs for CIFSs. Sarfraz, et al. [
36] examined the prioritized AOs for IFSs with IF-prioritized Aczel–Alsina averaging. Poryazov, et al. [
37] applied AOs for IFSs to the estimation of service compositions in telecommunication systems. Dai [
38] derived linguistic complex fuzzy sets with their properties.
Frank and prioritized AOs based on IFSs were derived by different researchers, however, the theory of Frank and prioritized AOs based on CIFSs has not yet been evaluated by researchers in the literature. The investigation of Frank and prioritized AOs based on CIFSs is a very challenging task. In this analysis, we have accepted this task and not only derive the theory of Frank and prioritized AOs based on CIFSs but also derive the combination of Frank and prioritized AOs based on CIFSs, where the simple Frank and prioritized AOs are the special case of the derived theory. Furthermore, we also invent the theory of WASPAS for CIFSs. Inspired by the above discussion, the major investigations of this analysis are listed below:
To discover Frank operational laws for managing the theory of CIF information;
To derive the CIF Frank prioritized averaging (CIFFPA) operator, the CIF Frank prioritized ordered averaging (CIFFPOA) operator, the CIF Frank prioritized geometric (CIFFPG) operator, and the CIF Frank prioritized ordered geometric (CIFFPOG) operator with their properties;
To expose the idea of the weighted aggregates sum product assessment (WASPAS) procedure under the consideration or presence of the CIF information and try to simplify it with the help of a suitable example;
To demonstrate an example in the presence of the MADM procedures for evaluating the comparison between the proposed operators with some well-known existing operators to show the validity and worth of the discovered approaches.
This article is arranged in the form as follows: in
Section 2, we review the different types of norms, CIFS, and the WASPAS technique; in
Section 3, we examine Frank operational laws, CIFFPA operator, CIFFPOA operator, CIFFPG operator, and CIFFPOG operator, and their properties of idempotency, monotonicity, and boundedness; in
Section 4, we derive the WASPAS for CIF information and try to justify it with the help of a suitable example; and in
Section 5, we illustrate some examples in the presence of the MADM procedures for evaluating CIF information. Furthermore, the comparisons between the proposed operators and some well-known existing operators, such as Xu [
23], Xu and Yager [
24], Yahya, et al. [
26], Yu [
31], Lin, et al. [
32], Garg and Rani [
33], Garg and Rani [
34], and Mahmood, et al. [
35], are used to show the validity and worth of the discovered approaches and are discussed in
Section 6. The final concluding information is shown in
Section 7.
3. CIF Frank Prioritized Aggregation Operators
In this section, we propose the idea of Frank operational laws for CIF information. Furthermore, we examine the theory of the CIFFPA operator, the CIFFPOA operator, the CIFFPG operator, and the CIFFPOG operator, and their properties (idempotency, monotonicity, and boundedness). From now on, we will be using the CIFVs for constructing any ideas.
Definition 5. The mathematical form of Frank operational laws is stated as follows: for
Definition 6. The mathematical form of the CIFFPA operator is shown below:
With the values of and .
Theorem 1. With the help of the data in Equation (18), we show that the aggregated value of Equation (18) will again be in the form of CIFV, such as:
Proof. The procedure of Mathematical Induction is used in this proof as follows:
if
, then we obtain
We obtain the correct theory. Furthermore, we assume that we also obtain the correct theory for
, such that:
Furthermore, we prove it for
, such as:
This proves the theorem. □
Proposition 1 (Idempotency). If we use , then This proves the proposition. □
Proposition 2 (Monotonicity). If , then Proof. Consider
. Notice that and , then we have .
In the same way, we find the unreal part, such as:
Furthermore, we have
.
In the same way, we find the unreal part, such as: . Then, with the presence of the score function and accuracy function, we can easily obtain our required result with This proves the proposition. □
Proposition 3 (Boundedness). If
and, then we have Proof. Using Propositions 1 and 2, we have
and . Then, □
Definition 7. The mathematical form of the CIFFPOA operator is shown below:
With the values of and and .
Theorem 2. With the help of the data in Equation (23), we expose that the aggregated value of Equation (23) will again be in the form of CIFV, such as:
Proposition 4 (Idempotency) If we use
Proposition 5 (Monotonicity). If
Proposition 6 (Boundedness). If
and, then we have Definition 8. The mathematical form of the CIFFPG operator is shown below:
With the values of and .
Theorem 3. With the help of the data in Equation (28), we expose that the aggregated value of Equation (28) will again be in the form of CIFV, such as:
Proposition 7 (Idempotency). If we use
Proposition 8 (Monotonicity). If
Proposition 9 (Boundedness). If and , then we have Definition 9. The mathematical form of the CIFFPOG operator is shown below:
With the values of and and
Theorem 4. With the help of the data in Equation (33), we expose that the aggregated value of Equation (33) will again be in the form of CIFV, such as:
Proposition 10 (Idempotency). If we use
Proposition 11 (Monotonicity). If
Proposition 12 (Boundedness). If and , then we have 4. CIF WASPAS Procedures
The main point of this section is to extend the theory of the WASPAS procedure to CIF information. The procedures of the WASPAS method contain various valuable and dominant steps. Before evaluating the normalization, we arrange a collection of CIF data which may be of a benefit type or cost type. If the data are of a benefit type, then good, otherwise, using the below theory, we normalize the information, such as:
After performing the above evaluation, we calculate the WSA and WPA with the help of derived theory, such as:
where,
and
.
Using the data in Equations (40) and (41), we calculate the aggregated measure based on convex theory, such as:
Before ranking the alternatives, we discuss the special cases of the WASPAS technique based on CIF information such as:
When , we obtain the data in Equation (40);
When , we obtain the data in Equation (41).
In last, we derive the ranking result for examining the best one from the family of finite preferences. Furthermore, we justify the supremacy and worth of the derived theory with the help of some suitable examples, such as:
Then, we find the positive ideal, such as:
With the help of the
and the information in
, we obtain the below theory, such as:
After performing the above evaluation, we calculate the WSA and WPA with the help of derived theory, such as: , and . Using the data in Equations (40) and (41) with , we calculate the aggregated measure based on convex theory, such as: . According to the score values of the four alternatives, the ranking results is with . Thus, the best optimal is according to the score values of alternatives.
5. Application in MADM Method
The MADM technique is the valuable and dominant part of the decision-making procedure. The main theme of this section is to utilize the theory of the MADM technique based on the presented information for CIF set theory. To examine the above problem, we collect the finite family of alternatives and their attributes . Based on the above alternatives and their attributes, we compute the matrix of information whose term is computed in the form of CIF values such that the CIFS with a truth grade and falsity grade must be implementing the following rule: and . The notion of neutral grade is stated by and the representation of the CIFVs is with . Furthermore, to proceed with the above information, we compute a technique of decision-making, whose major steps are shown below:
Step 1: Before evaluating the normalization, we arrange a collection of CIF data which may be of a benefit type or cost type. If the data are of a benefit type, then good, otherwise, using the below theory, we normalize the information, such as:
Step 2: After performing the above evaluation, we calculate the CIFFPA operator and CIFFPG operator with the help of the derived theory.
Step 3: Evaluate the score or accuracy values of the aggregated information.
Step 4: Examine the ranking values in the presence of the score information.
In the last, we aim to show the supremacy and worth of the above procedure with the help of illustrating some numerical examples.
Illustrative Example: An investment enterprise wants to invest in an enterprise to increase or grow its income. There are five potential enterprises as alternatives, which are and . Four attributes are employed to resolve the problem in order to find the best preference from our five alternatives, including : growth analysis, : social-political impact, : environmental impact, and : development of society. Furthermore, to proceed with the above information, we compute a technique of decision-making, whose major steps are shown below:
Step 1: Before evaluating the normalization, we arrange a collection of CIF data in the form of
Table 1, which may be of a benefit type or cost type. If the data are of a benefit type, then good, otherwise, using the below theory, we normalize the information, such as:
However, the data in
Table 2 is not required to be normalized.
Step 2: After performing the above evaluation, we calculate the CIFFPA operator and CIFFPG operator with the help of the derived theory, and see
Table 3.
Step 3: Evaluate the score or accuracy values of aggregated information, and see
Table 4.
Step 4: Examine the ranking values of the score information, and see
Table 5.
The valuable and best preference is
, according to the theory of CIFFPA and CIFFPG operators. Furthermore, by excluding the phase term, we have checked the stability and supremacy of the derived information. Thus, we remove the phase information from the data in
Table 2 in which their score values are shown in
Table 6.
Furthermore, we examine the ranking values of the score information, and see
Table 7.
The valuable and best preference is
according to the theory of the CIFFPA operator. Furthermore, the best preference is
according to the theory of the CIFFPG operator. Additionally, we find the comparisons between the proposed and existing data with the help of data in
Table 2.
6. Comparative Analysis
In this section, we select some existing operators based on various prevailing ideas. We then try to compare their obtained results with the obtained results of our proposed works. The comparative analysis is one of the most effective and dominant techniques because without comparison we fail to show the supremacy and validity of the derived theory. For this, we consider different types of information, such as aggregation operators (AOs) for IFSs [
23], geometric AOs for IFSs [
24], the complex fuzzy credibility Frank AOs [
26]. Additionally, Yu [
31] examined the theory of generalized prioritized AOs for intuitionistic fuzzy environments, and Lin, et al. [
32] derived the fuzzy number intuitionistic fuzzy prioritized AOs and their application in decision-making procedures. Furthermore, Garg and Rani [
33] exposed the averaging operators for CIFSs. Garg and Rani [
34] evaluated the geometric operators for CIFSs, and Mahmood, et al. [
35] examined the Aczel–Alsina aggregation operators for CIFSs. Using data in
Table 2, the comparison information is listed in
Table 8.
The valuable and best preference is
, according to the theory of CIFFPA, CIFFPG operators, Garg and Rani [
33,
34], and Mahmood, et al. [
35]. However, the theory of AOs for IFSs [
23], geometric AOs for IFSs [
24], the complex fuzzy credibility of Frank AOs [
26], and Yu [
31] examined the theory of generalized prioritized AOs for intuitionistic fuzzy environments with the limitation that fails to evaluate it. Similarly, Lin, et al. [
35] derive the fuzzy number intuitionistic fuzzy prioritized AOs and their application in decision-making procedures also with the limitation and restriction, because they fail to evaluate it. It is possible if we use the data in
Table 2, however, without phase information, then the comparison information is listed in
Table 9.
The valuable and best preference is
according to the theory of the CIFFPA operator, Xu [
23], Xu and Yager [
24], Yu [
31], Lin, et al. [
32], Garg and Rani [
33,
34], and Mahmood, et al. [
35]. However, the most valuable and best preference is
according to the theory of the CIFFPG operator. However, the complex fuzzy credibility Frank AOs [
26] have limitations and restrictions, and because it failed to evaluate it. Therefore, the proposed work is effective and valid for evaluating most of the CIFS information.