Next Article in Journal
A Two Phase Integrated Fuzzy Decision-Making Framework for Green Supplier Selection in the Coffee Bean Supply Chain
Previous Article in Journal
Some New Results for Jaggi-W-Contraction-Type Mappings on b-Metric-like Spaces
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Another View of Complex Intuitionistic Fuzzy Soft Sets Based on Prioritized Aggregation Operators and Their Applications to Multiattribute Decision Making

1
Department of Mathematics & Statistics, International Islamic University, Islamabad 44000, Pakistan
2
Department of Mathematics, College of Sciences, King Khalid University, Abha 61413, Saudi Arabia
3
Algebra and Applications Research Unit, Division of Computational Science, Faculty of Science, Prince of Songkla University, Hat Yai 90110, Songkhla, Thailand
*
Author to whom correspondence should be addressed.
Mathematics 2021, 9(16), 1922; https://doi.org/10.3390/math9161922
Submission received: 3 July 2021 / Revised: 25 July 2021 / Accepted: 28 July 2021 / Published: 12 August 2021

Abstract

:
In a conventional interpretation of decision-making based on ambiguity, a decision-maker must prefer the best possible opportunity including various feasible possibilities. However, the dilemma of picking the best possible alternative has continued to be a substantial task to resolve. In this manuscript, we improve the existing complex intuitionistic fuzzy soft set (CIFSS), which includes the grade of truth and falsity with the rule that the sum of the real and imaginary parts of both grades is confined to [0, 1]. CIFS is a valuable procedure to determine the authenticity and consistency of the elaborated approaches. The fundamental laws and their related examples are also determined. Moreover, by using these laws, we investigated the complex intuitionistic fuzzy soft prioritized weighted averaging operator (CIFSPWAO), the complex intuitionistic fuzzy soft prioritized ordered weighted averaging operator (CIFSPOWAO), the complex intuitionistic fuzzy soft prioritized weighted geometric operator (CIFSPWGO), complex intuitionistic fuzzy soft prioritized ordered weighted geometric operator (CIFSPOWGO), and their related properties are also developed. Based on the developed operators, the multiattribute decision-making (MADM) tool is developed by using the explored operators based on CIFSS. Some numerical examples are also illustrated by using the investigated operators to determine the feasibility and consistency of the developed approaches. Finally, the comparative analysis and their geometrical manifestations are also determined to enhance the excellence of the performed explorations.

1. Introduction

MADM is a mutual procedure in individuals’ everyday natural life and industry organization. In the exploration of MADM procedures, developing and controlling evaluation material is a requirement for achieving the best explanation. Since Zadeh [1] initially suggested the idea of fuzzy set (FS) to illustrate the ambiguity of an object, various conventional expansions of FSs have been offered to adapt to unique decision-making situations, such as the idea of soft set (SS), which was elaborated by Molodtsov [2]. Mahmood [3] developed the notion of bipolar soft set and discussed its application in decision making problems. Between these expansions of FSs, researchers have also sought effective implementations for exhibiting ambiguity and vagueness, which describe every single component with a truth degree belonging to [0, 1]. In the last 30 years, numerous researchers have conducted in-depth investigations and explorations in FS theory, and in consequence a huge number of discoveries have been accomplished within the field of FS, comprising assessment and ranking procedures, aggregation operators, hybrid operators, similarity measures and allowances of traditional MADM approaches, etc. However, there are various concerns that when an individual faced this kind of situation, which includes the grade of truth and falsity, then the FS is not proficient to operate within it. For this purpose, the theory of intuitionistic FS (IFS) was elaborated by Atanassov [4] as a generalization of FS that includes the grade of truth and falsity with the rule that 0 μ Ξ ˜ I F + η Ξ ˜ I F 1 . IFS is an extensive validation procedure used to determine the dependability and consistency of the created approaches. Since its development, this theory has received extensive attention from distinguished scholars and several individuals have utilized it in many directions [5,6,7,8,9,10].
From the above prevailing examinations, it is noted that they are extensively manipulated but that previous researchers have neglected to carry out the time-periodic problems and two-dimensional knowledge mutually in a specific set. In light of this, Ramot et al. [11] suggested the concept of complex FS (CFS) to illustrate the ambiguity of an object discussed above. CFS theory is exhibited by a complex-valued truth function with a codomain unit disc in the complex plane. Since its development, this theory has received extensive attention from distinguished scholars and several individuals have utilized it in many directions, like distance measures and cross-entropy [12], logic [13,14] and neurofuzzy architecture [15]. Keeping in view the effectiveness and importance of CFS theory in the last 15 years, numerous researchers have undertaken in-depth investigation and exploration of CFSs and a huge number of solutions making use of the CFSs have been studied, comprising assessment and ranking procedures, aggregation operators, hybrid operators, similarity measures and allowances of traditional MADM approaches, etc. However, there are various concerns that when an individual is faced with this kind of situation, which includes the grade of truth and falsity in the form of complex-valued, then the CFS is not proficient to operate with it. For this reason, Alkouri and Salleh [16] generalized the notion of CFSs to Complex IFSs (CIFSs) by familiarizing falsity degrees into the assessment. In CIFS theory, complex values of truth and falsity are measured in polar structure. The amplitude terms related with agreeing (disagreeing) values depict the strength of being appropriate (not-being appropriate) for the aspect in the set and the phase terms require extra knowledge, which is correlated with periodicity. These phase terms discriminate the CIFS and IFS theories. IFS nature cannot carry extra one-dimensional problems, which affects the failure of knowledge in certain situations. However, in complex problems, e.g., when designing two-dimensional pieces of information simultaneously in one set, it becomes even more essential to combine the phase terms with truth and falsity grades. This establishment of supplementary terms precludes the situation of knowledge loss and developments of the completed knowledge collectively in one set. CIFS is a modified technique of CFS that includes the grade of truth and falsity with the rules that 0 μ Ξ ˜ R P + η Ξ ˜ R P 1 and 0 μ Ξ ˜ I P + η Ξ ˜ I P 1 . CIFS has received much attraction from different scholars and certain scholars have utilized it in the environments of different directions [17,18,19,20,21,22,23].
Distinguished scholars have utilized the theory of aggregation operators in the circumstances of separated areas; as a result of this, the theory of intuitionistic fuzzy soft set (IFSS) was discovered by Maji [24]. The MCDM model in an IFSS environment considers the hesitancy of experts in arriving at the membership grades, since the IFS allows an expert to record his hesitancy factor. However, hesitancy is a feature of one’s perception, and it needs to be supported by another independent observer/expert. To address this problem, the notion of generalized IFSS and their applications were initiated by Garg and Arora [25]. Hayat et al. [26] explored aggregation operators for generalized IFSSs. Prioritized averaging/geometric aggregation operators for IFSSs were investigated by Arora and Garg [27]. Bonferroni mean operators for IFSS were introduced by Garg and Arora [28]. Robust aggregation operators for IFSSs were discovered by Arora and Garg [29]. Prioritized intuitionistic fuzzy soft interaction averaging aggregation operators were developed by Garg and Arora [30]. Khan et al. [31] discovered the generalized IFSSs and discussed their applications. In certain real-life troubles, we go over numerous circumstances where we need to aggregate the vulnerability existing in the information to settle on ideal choices. Aggregation operators are significant tools for taking care of unsure data present in our day-to-day life issues. Different operators of information, such as averaging, geometric, and hybrid operators, process the inconsistent information and allow us to reach some conclusions. Recently, these operators have gained much attention from many authors due to their wide applications in various fields, such as pattern recognition, medical diagnosis, clustering analysis, and image processing. All the prevailing approaches of decision-making, based on aggregation operators in FS, IFS, and IFSS theories, deal only with the grades of truth and falsity, which are real-valued. In CIFSS theory, truth and falsity grades are complex-valued and are represented in polar coordinates. The amplitude term corresponding to truth and falsity degrees gives the extent of membership and non-membership of an object in a CIFSS with the rule that the sum of the real and unreal parts of both grades is restricted to the unit interval. The phase terms are novel parameters of the truth and falsity degrees, and these are the parameters that distinguish the CIFSS and traditional IFS and IFSS theories. IFSS theory deals with only one dimension at a time, which results in information loss in some cases. However, in real life, we come across complex natural phenomena where it becomes essential to add the second dimension to the expression of truth and falsity grades. By introducing this second dimension, the complete information can be projected in one set, and hence loss of information can be avoided.
To illustrate the significance of the phase term, we give an example. Assume XYZ organization chooses to set up biometric-based participation gadgets (BBPGs) in the entirety of its workplaces spread everywhere in the country. For this, the organization counsels a specialist who gives the data concerning (i) demonstrates of BBPGs and (ii) creation dates of BBPGs. The organization needs to choose the most ideal model of BBPGs with its creation date all the while. Here, the issue is two-dimensional, to be specific, the model of BBPGs and the creation date of BBPGs. This kind of issue cannot be handled precisely by utilizing the conventional IFSS hypothesis as the IFSS hypothesis cannot handle both the measurements at the same time. The most ideal approach to address the entirety of the data given by the master is by utilizing the notion of CIFSS. The sufficiency terms in CIFSS might be utilized to give the organization’s choice regarding the model of BBPGs and the stage terms might be utilized to address the organization’s judgment concerning the creation date of BBPGs. When an intellectual provides μ Ξ ˜ C I j ( x l ) = μ Ξ ˜ R P j ( x l ) e i 2 π ( μ Ξ ˜ I P j ( x l ) ) for truth grade and η Ξ ˜ C I j ( x l ) = η Ξ ˜ R P j ( x l ) e i 2 π ( η Ξ ˜ I P j ( x l ) ) for falsity grade with the rules such that 0 μ Ξ ˜ R P j ( x l ) + η Ξ ˜ R P j ( x l ) 1 and 0 μ Ξ ˜ I P j ( x l ) + η Ξ ˜ I P j ( x l ) 1 , then the principle of fuzzy sets, complex fuzzy sets, soft sets, complex fuzzy soft sets, intuitionistic fuzzy sets, intuitionistic fuzzy soft sets, and complex intuitionistic fuzzy sets are unable to cope with it. For managing such information, the theory of CIFSSs is a very important and effective technique, which is developed in this manuscript. Keeping the advantages of the soft set and complex intuitionistic fuzzy sets, the aims of this manuscript are discussed below:
  • To improve the theory of CIFSSs and to develop their fundamental laws such as operational laws, score value, accuracy value, and their examples.
  • To elaborate on the CIFSPWAO, CIFSPOWAO, CIFSPWGO, and CIFSPOWGO, and deliberate on their properties based on the above-investigated approaches.
  • To determine a MADM tool by using the elaborated operators based on CIFSSs.
  • To determine the verity of the elaborated approaches with the help of some examples by using the elaborated operators to determine the consistency and validity of the developed approaches.
  • To determine the comparative analysis of the elaborated operators by using some existing operators.
  • To utilize the geometrical manifestations of the settled operators are discussed to show the advantages of the proposed tools.
The principle of FSs, CFSs, SSs, CFSSs, IFSs, IFSSs, and CIFS are the special cases of the presented CIFSSs.
The rest of this manuscript is arranged as follows. In Section 2, we briefly recall some fundamental notions such as SSs, CIFSs, and their operational laws. The existing theory of CIFSSs, which was explored by Kumar and Bajaj [32] and Quek et al. [33] and the prioritized weighted aggregation operator (PWAO) is also revised. In Section 3, we improve the idea of CIFSSs and investigate their fundamental laws. In Section 4, by using these laws, we elaborate on the CIFSPWAO, CIFSPOWAO, CIFSPWGO, and CIFSPOWGO, and deliberate on their properties. In Section 5, we developed a MADM tool by using the investigated operators. Some examples are illustrated by using the elaborated operators to determine the consistency and validity of the developed approaches. The comparative analysis of the elaborated operators by using some existing operators is also discussed. The geometrical manifestations of the settled operators are also utilized. The conclusion of this manuscript is discussed in Section 6.

2. Preliminaries

To explain better the investigated ideas, we briefly recall some fundamental notions such as SSs, CIFSs, and their operational laws. The existing theory of CIFSSs, which was explored by Kumar and Bajaj [32] and Quek et al. [33] and the prioritized weighted aggregation operator (PWAO) is also revised. In the overall manuscript, the symbol X U N I is used for fixed set and the terms μ T f C I and η T f C I are used to show the grade of positive and the grade of negative.
Definition 1
([2]). Suppose   is a set of parameters. A duplet  ( Ξ ˜ S S ,   )  expresses the SSs based on the fixed set  X U N I , where  Ξ ˜ S S :   K X U N I  and the set of all subsets of  X U N I .
From the prevailing examinations, it is noticed that they are extensively manipulated but are neglect to carry out the time-periodic troubles and two-dimensional knowledge mutually in a specific set. Therefore, Ramot et al. [11] initially suggested the thought of complex FS (CFS) to illustrate the ambiguity of object; various conventional expansions of CFSs have been offered to adapt to unique decision-making situations. However, there are various concerns, while an individual faced such sorts of situation, which includes the grade of truth and falsity in the form of complex-values, then the notion of CFS is not proficient to operate with it. For this, Alkouri and Salleh [16] generalized the notion of CFSs to Complex IFSs (CIFSs) by familiarizing falsity degrees into the assessment. In CIFS theory, complex values of truth and falsity are measured in polar structure. CIFS is the generalized form of CFS that includes the grade of truth and falsity with the rules that 0 μ Ξ ˜ R P + η Ξ ˜ R P 1 and 0 μ Ξ ˜ I P + η Ξ ˜ I P 1 . The principle of CIFS is discussed below:
Definition 2
([16]). A CIFS  Ξ ˜ C I  is demonstrated by: 
Ξ ˜ C I = { ( μ Ξ ˜ C I ( x ) , η Ξ ˜ C I ( x ) ) : x X U N I }
where  μ Ξ ˜ C I = μ Ξ ˜ R P e i 2 π ( μ Ξ ˜ I P )  and  η Ξ ˜ C I = η Ξ ˜ R P e i 2 π ( η Ξ ˜ I P )  where  0 μ Ξ ˜ R P + η Ξ ˜ R P 1  and  0 μ Ξ ˜ I P + η Ξ ˜ I P 1 . Furthermore, the refusal grade is demonstrated in the form of  Ξ ˜ C I = Ξ ˜ R P e i 2 π ( Ξ ˜ I P ) = ( 1 μ Ξ ˜ R P η Ξ ˜ R P ) e i 2 π ( 1 μ Ξ ˜ R P η Ξ ˜ R P ) . In the overall manuscript, the complex intuitionistic fuzzy numbers (CIFNs) are represented by:  Ξ ˜ C I i = ( μ Ξ ˜ R P i e i 2 π ( μ Ξ ˜ I P i ) , η Ξ ˜ R P i e i 2 π ( η Ξ ˜ I P i ) ) , i = 1 , 2 , , n . To determine the relationship among any number of attributes, the operations of addition, multiplication, and scaler multiplication and vector power scaler are discussed below. The graphical expressions of the unit disc are explained in Figure 1.
Definition 3
([17]). By using two CIFNs  Ξ ˜ C I i = ( μ Ξ ˜ R P i e i 2 π ( μ Ξ ˜ I P i ) , η Ξ ˜ R P i e i 2 π ( η Ξ ˜ I P i ) ) , i = 1 , 2 , then
Ξ ˜ C I 1 Ξ ˜ C I 2 = ( ( μ Ξ ˜ R P 1 + μ Ξ ˜ R P 2 μ Ξ ˜ R P 1 μ Ξ ˜ R P 2 ) e i 2 π ( μ Ξ ˜ I P 1 + μ Ξ ˜ I P 2 μ Ξ ˜ I P 1 μ Ξ ˜ I P 2 ) , η Ξ ˜ R P 1 η Ξ ˜ R P 2 e i 2 π ( η Ξ ˜ I P 1 η Ξ ˜ I P 2 ) )
Ξ ˜ C I 1 Ξ ˜ C I 2 = ( μ Ξ ˜ R P 1 μ Ξ ˜ R P 2 e i 2 π ( μ Ξ ˜ I P 1 μ Ξ ˜ I P 2 ) , ( η Ξ ˜ R P 1 + η Ξ ˜ R P 2 η Ξ ˜ R P 1 η Ξ ˜ R P 2 ) e i 2 π ( η Ξ ˜ I P 1 + η Ξ ˜ I P 2 η Ξ ˜ I P 1 η Ξ ˜ I P 2 ) )  
Φ S C Ξ ˜ C I 1 = ( ( 1 ( 1 μ Ξ ˜ R P 1 ) Φ S C ) e i 2 π ( 1 ( 1 μ Ξ ˜ I P 1 ) Φ S C ) , η Ξ ˜ R P 1 Φ S C e i 2 π ( η Ξ ˜ I P 1 Φ S C ) )
Ξ ˜ C I 1 Φ S C = ( μ Ξ ˜ R P 1 Φ S C e i 2 π ( μ Ξ ˜ I P 1 Φ S C ) , ( 1 ( 1 η Ξ ˜ R P 1 ) Φ S C ) e i 2 π ( 1 ( 1 η Ξ ˜ I P 1 ) Φ S C ) )
To find the order between any two CIFS, we review the idea of score value (SV) and accuracy value (AV) based on CIFS, which are illustrated below. Without SV and AV, it is difficult to compare the CIFSs.
Definition 4
([17]). For two CIFNs  Ξ ˜ C I i = ( μ Ξ ˜ R P i e i 2 π ( μ Ξ ˜ I P i ) , η Ξ ˜ R P i e i 2 π ( η Ξ ˜ I P i ) ) , i = 1 , the score value (SV) and accuracy value (AV) are demonstrated as: 
S S V ( Ξ ˜ C I 1 ) = 1 2 ( μ Ξ ˜ R P 1 + μ Ξ ˜ R P 2 η Ξ ˜ R P 1 η Ξ ˜ R P 1 )
A V ( Ξ ˜ C I 1 ) = 1 2 ( μ Ξ ˜ R P 1 + μ Ξ ˜ R P 2 + η Ξ ˜ R P 1 + η Ξ ˜ R P 1 )
By using the above information, we can determine which CIFN is superior and which one is inferior, for this purpose we must revise the rules for comparison between any number of CIFNs such as:
  • When S S V ( Ξ ˜ C I 1 ) > S S V ( Ξ ˜ C I 2 ) Ξ ˜ C I 1 > Ξ ˜ C I 2 ;
  • When S S V ( Ξ ˜ C I 1 ) = S S V ( Ξ ˜ C I 2 )
    (1)
    When A V ( Ξ ˜ C I 1 ) = A V ( Ξ ˜ C I 2 ) Ξ ˜ C I 1 = Ξ ˜ C I 2 .
    (2)
    When A V ( Ξ ˜ C I 1 ) = A V ( Ξ ˜ C I 2 ) Ξ ˜ C I 1 = Ξ ˜ C I 2 .
To determine the exact value from the group of values, the aggregation operators are more flexible and more dominant to find the reliability and consistency in genuine life troubles. The prioritized aggregation operator is one of the most important and dominant parts of the operators that perform mathematical operations, such as Average, Aggregate, Count, Max, Min, and Sum, on the numeric property of the elements in the collection.
Definition 5
([27]). By using any numbers of positive integers  Ξ ˜ C I i , i = 1 , 2 , , n , the PWA operator is demonstrated by:
P W A ( Ξ ˜ C I 1 , Ξ ˜ C I 2 , , Ξ ˜ C I n ) = i = 1 n Z i i = 1 n Z i
where  Z 1 = 1 , with
Z i = k = 1 i 1 Ξ ˜ C I k
Definition 6
([32]). A CIFSS  Ξ ˜ C I : C I F S ( X U N I )  is demonstrated by:
( Ξ ˜ C I ,   ) = { ( x i , Ξ ˜ C I e j ( x i ) ) : x l X U N I }
Definition 7
([33]). A CIFSS  Ξ ˜ C I : C I F S ( X U N I )  is demonstrated by:
Ξ ˜ C I ( e ) = { ( μ Ξ ˜ R P j ( x l ) e i ( μ Ξ ˜ I P j ( x l ) ) , η Ξ ˜ R P j ( x l ) e i ( η Ξ ˜ I P j ( x l ) ) ) : x l X U N I }
where  μ Ξ ˜ I P j ( x l ) , η Ξ ˜ I P j ( x l ) [ 0 , 2 π ] . The ideas in Equations (10) and (11), encompass some problems related to imaginary parts and their conditions. Similarly, no one elaborated on the operational laws or score value and accuracy value, which are very useful and important for developing aggregation operators. To resolve the above troubles, in the next study, we elaborated on the idea of CIFSSs with the new structure and utilized their operational laws.

3. A Novel Complex Intuitionistic Fuzzy Soft Set

In this study, we will improve the existing principle of CIFSSs and elaborate on their new fundamental laws. The proposed work is also justified with the help of some numerical examples to show the reliability and effectiveness of the presented work. The existing CIFSSs were explored by Kumar and Bajaj [32] and Quek et al. [33]. Based on the above existing ideas, the novel approach is discussed below.
Definition 8.
A CIFSS  Ξ ˜ C I : C I F S ( X U N I )  is demonstrated by:
Ξ ˜ C I e j ( x i ) = { ( μ Ξ ˜ C I j ( x l ) , η Ξ ˜ C I j ( x l ) ) : x l X U N I }
where  μ Ξ ˜ C I j ( x l ) = μ Ξ ˜ R P j ( x l ) e i 2 π ( μ Ξ ˜ I P j ( x l ) )  and  η Ξ ˜ C I j ( x l ) = η Ξ ˜ R P j ( x l ) e i 2 π ( η Ξ ˜ I P j ( x l ) )  with the rules such that  0 μ Ξ ˜ R P j ( x l ) + η Ξ ˜ R P j ( x l ) 1  and  0 μ Ξ ˜ I P j ( x l ) + η Ξ ˜ I P j ( x l ) 1 . Furthermore, the term  Ξ ˜ C I j ( x l ) = Ξ ˜ R P j ( x l ) e i 2 π ( Ξ ˜ I P j ( x l ) ) = ( 1 μ Ξ ˜ R P j ( x l ) η Ξ ˜ R P j ( x l ) ) e i 2 π ( 1 μ Ξ ˜ R P j ( x l ) η Ξ ˜ R P j ( x l ) )  expresses the refusal grade. Where the symbol  C I F S ( X U N I )  expresses the family of CQROFNs. Throughout this manuscript, the complex intuitionistic fuzzy soft number (CIFSN) is expressed by:  Ξ ˜ C I e i j = ( μ Ξ ˜ R P i j e i 2 π ( μ Ξ ˜ I P i j ) , η Ξ ˜ R P i j e i 2 π ( η Ξ ˜ I P i j ) ) , i , j = 1 , 2 , , n , m .
Example 1.
Among the main applications of radiophysics are radio communications, radiolocation, radio astronomy, and radiology. Classical radiophysics deals with radio wave communications and detection. This well-known experience of actual application of complex numbers in radiophysics, optics, and energy systems naturally anticipates oscillating and periodic time parameters for complex models of decision making and is more suitable for the complex module. For this, we choose the family of a fixed set  X U N I = { x 1 , x 2 , x 3 , x 4 }  and corresponding of parameters  = { e 1 ( E x p e n s i v e ) , e 2 ( W o o d e n ) , e 3 ( C h e a p ) , e 4 ( B e a u t i f u l ) , e 5 ( I n   g o o d   l o c a t i o n ) } , then the rating values of each value of the fix set concerning parameters are discussed in Table 1.
In the procedure to utilize the CQROFSSs in realistic troubles, it is necessary to determine the ranking of these all numbers. For this, we develop the SV and AV, demonstrated below.
Definition 9.
For the CIFSNs,  Ξ ˜ C I e i j = ( μ Ξ ˜ R P i j e i 2 π ( μ Ξ ˜ I P i j ) , η Ξ ˜ R P i j e i 2 π ( η Ξ ˜ I P i j ) ) , i , j = 1 , 2 , , n , m  their SV and AV are demonstrated by:
S S V ( Ξ ˜ C I e i j ) = 1 4 ( 1 + μ Ξ ˜ R P i j + μ Ξ ˜ R P i j η Ξ ˜ R P i j η Ξ ˜ R P i j )
A V ( Ξ ˜ C I e i j ) = 1 4 ( 1 + μ Ξ ˜ R P i j + μ Ξ ˜ R P i j + η Ξ ˜ R P i j + η Ξ ˜ R P i j )
By using the above information, we can determine which CIFSN is superior and which one is inferior. We, thus, revise the rules for the comparison between any number of CIFSNs such as:
  • When S S V ( Ξ ˜ C I e i j ) > S S V ( Ξ ˜ C I e i j ) Ξ ˜ C I e i j > Ξ ˜ C I e i j ;
  • When S S V ( Ξ ˜ C I e i j ) = S S V ( Ξ ˜ C I e i j )
    (1)
    When A V ( Ξ ˜ C I e i j ) > A V ( Ξ ˜ C I e i j ) Ξ ˜ C I e i j > Ξ ˜ C I e i j ;
    (2)
    When A V ( Ξ ˜ C I e i j ) = A V ( Ξ ˜ C I e i j ) Ξ ˜ C I e i j = Ξ ˜ C I e i j .
Definition 10.
By using two CIFSNs  Ξ ˜ C I e 11 = ( μ Ξ ˜ R P 11 e i 2 π ( μ Ξ ˜ I P 11 ) , η Ξ ˜ R P 11 e i 2 π ( η Ξ ˜ I P 11 ) )  and  Ξ ˜ C I e 12 = ( μ Ξ ˜ R P 12 e i 2 π ( μ Ξ ˜ I P 12 ) , η Ξ ˜ R P 12 e i 2 π ( η Ξ ˜ I P 12 ) ) , then
Ξ ˜ C I e 11 Ξ ˜ C I e 12 = ( ( μ Ξ ˜ R P 11 + μ Ξ ˜ R P 12 μ Ξ ˜ R P 11 μ Ξ ˜ R P 12 ) e i 2 π ( μ Ξ ˜ I P 11 + μ Ξ ˜ I P 12 μ Ξ ˜ I P 11 μ Ξ ˜ I P 12 ) , η Ξ ˜ R P 11 η Ξ ˜ R P 12 e i 2 π ( η Ξ ˜ I P 11 η Ξ ˜ I P 12 ) )
Ξ ˜ C I e 11 Ξ ˜ C I 12 = ( μ Ξ ˜ R P 11 μ Ξ ˜ R P 12 e i 2 π ( μ Ξ ˜ I P 11 μ Ξ ˜ I P 12 ) , ( η Ξ ˜ R P 11 + η Ξ ˜ R P 12 η Ξ ˜ R P 11 η Ξ ˜ R P 12 ) e i 2 π ( η Ξ ˜ I P 11 + η Ξ ˜ I P 12 η Ξ ˜ I P 11 η Ξ ˜ I P 12 ) )
Φ S C Ξ ˜ C I e 11 = ( ( 1 ( 1 μ Ξ ˜ R P 11 ) Φ S C ) e i 2 π ( 1 ( 1 μ Ξ ˜ I P 11 ) Φ S C ) , η Ξ ˜ R P 11 Φ S C e i 2 π ( η Ξ ˜ I P 11 Φ S C ) )
Ξ ˜ C I e 11 Φ S C = ( μ Ξ ˜ R P 11 Φ S C e i 2 π ( μ Ξ ˜ I P 11 Φ S C ) , ( 1 ( 1 η Ξ ˜ R P 11 ) Φ S C ) e i 2 π ( 1 ( 1 η Ξ ˜ I P 11 ) Φ S C ) )
Theorem 1.
By using CIFSNs  Ξ ˜ C I e i j = ( μ Ξ ˜ R P i j e i 2 π ( μ Ξ ˜ I P i j ) , η Ξ ˜ R P i j e i 2 π ( η Ξ ˜ I P i j ) ) , i , j = 1 , 2 , , n , m , then
  • Ξ ˜ C I e 11 Ξ ˜ C I e 12 = Ξ ˜ C I e 12 Ξ ˜ C I e 11 ;
  • Ξ ˜ C I e 11 Ξ ˜ C I e 12 = Ξ ˜ C I e 12 Ξ ˜ C I e 11 ;
  • ( Ξ ˜ C I e 11 Ξ ˜ C I e 12 ) Ξ ˜ C I e 13 = Ξ ˜ C I e 12 ( Ξ ˜ C I e 11 Ξ ˜ C I e 13 ) ;
  • ( Ξ ˜ C I e 11 Ξ ˜ C I e 12 ) Ξ ˜ C I e 13 = Ξ ˜ C I e 12 ( Ξ ˜ C I e 11 Ξ ˜ C I e 13 ) ;
  • Φ S C ( Ξ ˜ C I e 11 Ξ ˜ C I e 12 ) = Φ S C Ξ ˜ C I e 11 Φ S C Ξ ˜ C I e 12 ;
  • ( Ξ ˜ C I e 11 Ξ ˜ C I e 12 ) Φ S C = Ξ ˜ C I e 11 Φ S C Ξ ˜ C I e 12 Φ S C ;
  • Φ S C 1 Ξ ˜ C I e 11 Φ S C 2 Ξ ˜ C I e 11 = ( Φ S C 1 + Φ S C 2 ) Ξ ˜ C I e 11 ;
  • Ξ ˜ C I e 11 Φ S C 1 Ξ ˜ C I e 11 Φ S C 2 = Ξ ˜ C I e 11 ( Φ S C 1 + Φ S C 2 ) .
Proof. 
Trivial. □

4. Averaging and Geometric Prioritized Aggregation Operators

As shown above, to find the relationship among any number of attributes the aggregation operators are one the best technique to determine the consistency of the elaborated operators. By using the advantages of the elaborated CIFSSs, in this study, we elaborated on CIFSPWAO, CIFSPOWAO, CIFSPWGO, and CIFSPOWGO, and deliberated their properties.
Definition 11.
For the CIFSNs  Ξ ˜ C I e i j = ( μ Ξ ˜ R P i j e i 2 π ( μ Ξ ˜ I P i j ) , η Ξ ˜ R P i j e i 2 π ( η Ξ ˜ I P i j ) ) , i , j = 1 , 2 , , n , m , their CIFSPWA operators are demonstrated by:
C I F S P W A ( Ξ ˜ C I e 11 , Ξ ˜ C I e 12 , , Ξ ˜ C I e m n ) = i = 1 m Z i i = 1 m Z i ( j = 1 n j j = 1 n j Ξ ˜ C I e i j )
where  1 = Z 1 = 1  and
j = l = 1 j 1 S S V ( Ξ ˜ C I l ) , j = 1 , 2 , , n
Z i = k = 1 i 1 S S V ( Ξ ˜ C I k ) , i , j = 1 , 2 , , m
By using Definition 11, we utilized the following results.
Theorem 2.
For the CIFSNs  Ξ ˜ C I e i j = ( μ Ξ ˜ R P i j e i 2 π ( μ Ξ ˜ I P i j ) , η Ξ ˜ R P i j e i 2 π ( η Ξ ˜ I P i j ) ) , i , j = 1 , 2 , , n , m , thereby using Equation (19), we have
C I F S P W A ( Ξ ˜ C I e 11 , Ξ ˜ C I e 12 , , Ξ ˜ C I e m n ) = ( ( 1 i = 1 m ( j = 1 n ( 1 μ Ξ ˜ R P i j ) j j = 1 n j ) Z i i = 1 m Z i ) e i 2 π ( 1 i = 1 m ( j = 1 n ( 1 μ Ξ ˜ I P i j ) j j = 1 n j ) Z i i = 1 m Z i ) , i = 1 m ( j = 1 n η Ξ ˜ R P i j j j = 1 n j ) Z i i = 1 m Z i e i 2 π ( i = 1 m ( j = 1 n η Ξ ˜ I P i j j j = 1 n j ) Z i i = 1 m Z i ) )
Proof. 
See Appendix A. □
By using Theorem 2, we initiated the following properties such as idempotency, boundedness, and monotonicity.
Theorem 3.
For the CIFSNs  Ξ ˜ C I e i j = ( μ Ξ ˜ R P i j e i 2 π ( μ Ξ ˜ I P i j ) , η Ξ ˜ R P i j e i 2 π ( η Ξ ˜ I P i j ) ) , i , j = 1 , 2 , , n , m , if  Ξ ˜ C I e i j = Ξ ˜ C I e = ( μ Ξ ˜ R P e i 2 π ( μ Ξ ˜ I P ) , η Ξ ˜ R P e i 2 π ( η Ξ ˜ I P ) ) , then
C I F S P W A ( Ξ ˜ C I e 11 , Ξ ˜ C I e 12 , , Ξ ˜ C I e m n ) = Ξ ˜ C I e
Proof. 
See Appendix A. □
Theorem 4.
For the CIFSNs  Ξ ˜ C I e i j = ( μ Ξ ˜ R P i j e i 2 π ( μ Ξ ˜ I P i j ) , η Ξ ˜ R P i j e i 2 π ( η Ξ ˜ I P i j ) ) , i , j = 1 , 2 , , n , m , if  Ξ ˜ C I e i j = ( m i n   i m i n   j μ Ξ ˜ R P i j e i 2 π ( m i n   i m i n   j μ Ξ ˜ I P i j ) , m a x   i m a x   j η Ξ ˜ R P i j e i 2 π ( m a x   i m a x   j η Ξ ˜ R P i j ) )  and  Ξ ˜ C I e i j + = ( m a x   i m a x   j μ Ξ ˜ R P i j e i 2 π ( m a x   i m a x   j μ Ξ ˜ I P i j ) , m i n   i m i n   j η Ξ ˜ R P i j e i 2 π ( m i n   i m i n   j η Ξ ˜ R P i j ) ) , the
Ξ ˜ C I e i j C I F S P W A ( Ξ ˜ C I e 11 , Ξ ˜ C I e 12 , , Ξ ˜ C I e m n ) Ξ ˜ C I e i j +  
Proof. 
See Appendix A. □
Theorem 5.
For the CIFSNs  Ξ ˜ C I e i j = ( μ Ξ ˜ R P i j e i 2 π ( μ Ξ ˜ I P i j ) , η Ξ ˜ R P i j e i 2 π ( η Ξ ˜ I P i j ) ) , i , j = 1 , 2 , , n , m , if  Ξ ˜ C I e i j Ξ ˜ C I e i j , then
C I F S P W A ( Ξ ˜ C I e 11 , Ξ ˜ C I e 12 , , Ξ ˜ C I e m n ) C I F S P W A ( Ξ ˜ C I e 11 , Ξ ˜ C I e 12 , , Ξ ˜ C I e m n )  
Proof. 
The proof of this theorem is like the proof of Theorem 4. □
Definition 12.
For the CIFSNs  Ξ ˜ C I e i j = ( μ Ξ ˜ R P i j e i 2 π ( μ Ξ ˜ I P i j ) , η Ξ ˜ R P i j e i 2 π ( η Ξ ˜ I P i j ) ) , i , j = 1 , 2 , , n , m , their CIFSPOWA operators is demonstrated by:
C I F S P O W A ( Ξ ˜ C I e 11 , Ξ ˜ C I e 12 , , Ξ ˜ C I e m n ) = i = 1 m Z i i = 1 m Z i ( j = 1 n j j = 1 n j Ξ ˜ C I e σ ( i ) σ ( j ) )
where  1 = Z 1 = 1  and
j = l = 1 j 1 S S V ( Ξ ˜ C I σ ( l ) ) , j = 1 , 2 , , n
Z i = k = 1 i 1 S S V ( Ξ ˜ C I σ ( k ) ) , i , j = 1 , 2 , , m
Moreover, σ is a transformation function of i = 1 , 2 , , n such that σ ( i 1 ) σ ( i ) . By using Definition 12, we utilized the following results.
Theorem 6.
For the CIFSNs  Ξ ˜ C I e i j = ( μ Ξ ˜ R P i j e i 2 π ( μ Ξ ˜ I P i j ) , η Ξ ˜ R P i j e i 2 π ( η Ξ ˜ I P i j ) ) , i , j = 1 , 2 , , n , m , then by using Equation (26), we have
C I F S P O W A ( Ξ ˜ C I e 11 , Ξ ˜ C I e 12 , , Ξ ˜ C I e m n ) = ( ( 1 i = 1 m ( j = 1 n ( 1 μ Ξ ˜ R P σ ( i ) σ ( j ) ) j j = 1 n j ) Z i i = 1 m Z i ) e i 2 π ( 1 i = 1 m ( j = 1 n ( 1 μ Ξ ˜ I P σ ( i ) σ ( j ) ) j j = 1 n j ) Z i i = 1 m Z i ) , i = 1 m ( j = 1 n η Ξ ˜ R P σ ( i ) σ ( j ) j j = 1 n j ) Z i i = 1 m Z i e i 2 π ( i = 1 m ( j = 1 n η Ξ ˜ I P σ ( i ) σ ( j ) j j = 1 n j ) Z i i = 1 m Z i ) )
Proof. 
Trivial. □
By using Theorem 6, we utilized the following properties such as idempotency, boundedness, and monotonicity.
Theorem 7.
For the CIFSNs  Ξ ˜ C I e i j = ( μ Ξ ˜ R P i j e i 2 π ( μ Ξ ˜ I P i j ) , η Ξ ˜ R P i j e i 2 π ( η Ξ ˜ I P i j ) ) , i , j = 1 , 2 , , n , m , if  Ξ ˜ C I e i j = Ξ ˜ C I e = ( μ Ξ ˜ R P e i 2 π ( μ Ξ ˜ I P ) , η Ξ ˜ R P e i 2 π ( η Ξ ˜ I P ) ) , their
C I F S P O W A ( Ξ ˜ C I e 11 , Ξ ˜ C I e 12 , , Ξ ˜ C I e m n ) = Ξ ˜ C I e  
Proof. 
Trivial. □
Theorem 8.
For the CIFSNs  Ξ ˜ C I e i j = ( μ Ξ ˜ R P i j e i 2 π ( μ Ξ ˜ I P i j ) , η Ξ ˜ R P i j e i 2 π ( η Ξ ˜ I P i j ) ) , i , j = 1 , 2 , , n , m , if  Ξ ˜ C I e i j = ( m i n   i m i n   j μ Ξ ˜ R P i j e i 2 π ( m i n   i m i n   j μ Ξ ˜ I P i j ) , m a x   i m a x   j η Ξ ˜ R P i j e i 2 π ( m a x   i m a x   j η Ξ ˜ R P i j ) )  and  Ξ ˜ C I e i j + = ( m a x   i m a x   j μ Ξ ˜ R P i j e i 2 π ( m a x   i m a x   j μ Ξ ˜ I P i j ) , m i n   i m i n   j η Ξ ˜ R P i j e i 2 π ( m i n   i m i n   j η Ξ ˜ R P i j ) ) , their
Ξ ˜ C I e i j C I F S P O W A ( Ξ ˜ C I e 11 , Ξ ˜ C I e 12 , , Ξ ˜ C I e m n ) Ξ ˜ C I e i j +  
Proof. 
Trivial. □
Theorem 9.
For the CIFSNs  Ξ ˜ C I e i j = ( μ Ξ ˜ R P i j e i 2 π ( μ Ξ ˜ I P i j ) , η Ξ ˜ R P i j e i 2 π ( η Ξ ˜ I P i j ) ) , i , j = 1 , 2 , , n , m , if  Ξ ˜ C I e i j Ξ ˜ C I e i j , their
C I F S P O W A ( Ξ ˜ C I e 11 , Ξ ˜ C I e 12 , , Ξ ˜ C I e m n ) C I F S P O W A ( Ξ ˜ C I e 11 , Ξ ˜ C I e 12 , , Ξ ˜ C I e m n )  
Proof. 
Trivial. □
Definition. 13.
For the CIFSNs  Ξ ˜ C I e i j = ( μ Ξ ˜ R P i j e i 2 π ( μ Ξ ˜ I P i j ) , η Ξ ˜ R P i j e i 2 π ( η Ξ ˜ I P i j ) ) , i , j = 1 , 2 , , n , m , their CIFSPWG operator is demonstrated by:
C I F S P W G ( Ξ ˜ C I e 11 , Ξ ˜ C I e 12 , , Ξ ˜ C I e m n ) = i = 1 m Z i i = 1 m Z i ( j = 1 n j j = 1 n j Ξ ˜ C I e i j )
where  1 = Z 1 = 1  and
j = l = 1 j 1 S S V ( Ξ ˜ C I l ) , j = 1 , 2 , , n
Z i = k = 1 i 1 S S V ( Ξ ˜ C I k ) , i , j = 1 , 2 , , m
By using Definition 13, we utilized the following results.
Theorem 10.
For the CIFSNs  Ξ ˜ C I e i j = ( μ Ξ ˜ R P i j e i 2 π ( μ Ξ ˜ I P i j ) , η Ξ ˜ R P i j e i 2 π ( η Ξ ˜ I P i j ) ) , i , j = 1 , 2 , , n , m , then by using Equation (33), we have
C I F S P W A ( Ξ ˜ C I e 11 , Ξ ˜ C I e 12 , , Ξ ˜ C I e m n ) = ( i = 1 m ( j = 1 n μ Ξ ˜ R P i j j j = 1 n j ) Z i i = 1 m Z i e i 2 π ( i = 1 m ( j = 1 n μ Ξ ˜ I P i j j j = 1 n j ) Z i i = 1 m Z i ) , ( 1 i = 1 m ( j = 1 n ( 1 η Ξ ˜ R P i j ) j j = 1 n j ) Z i i = 1 m Z i ) e i 2 π ( 1 i = 1 m ( j = 1 n ( 1 η Ξ ˜ I P i j ) j j = 1 n j ) Z i i = 1 m Z i ) )
Proof. 
Trivial. □
By using Theorem 10, we utilized the following properties such as idempotency, boundedness, and monotonicity.
Theorem 11.
For the CIFSNs  Ξ ˜ C I e i j = ( μ Ξ ˜ R P i j e i 2 π ( μ Ξ ˜ I P i j ) , η Ξ ˜ R P i j e i 2 π ( η Ξ ˜ I P i j ) ) , i , j = 1 , 2 , , n , m , if  Ξ ˜ C I e i j = Ξ ˜ C I e = ( μ Ξ ˜ R P e i 2 π ( μ Ξ ˜ I P ) , η Ξ ˜ R P e i 2 π ( η Ξ ˜ I P ) ) , their
C I F S P W G ( Ξ ˜ C I e 11 , Ξ ˜ C I e 12 , , Ξ ˜ C I e m n ) = Ξ ˜ C I e
Proof. 
Trivial. □
Theorem 12.
Neutrosophic sets  Ξ ˜ C I e i j = ( μ Ξ ˜ R P i j e i 2 π ( μ Ξ ˜ I P i j ) , η Ξ ˜ R P i j e i 2 π ( η Ξ ˜ I P i j ) ) , i , j = 1 , 2 , , n , m , if  Ξ ˜ C I e i j = ( m i n   i m i n   j μ Ξ ˜ R P i j e i 2 π ( m i n   i m i n   j μ Ξ ˜ I P i j ) , m a x   i m a x   j η Ξ ˜ R P i j e i 2 π ( m a x   i m a x   j η Ξ ˜ R P i j ) )  and  Ξ ˜ C I e i j + = ( m a x   i m a x   j μ Ξ ˜ R P i j e i 2 π ( m a x   i m a x   j μ Ξ ˜ I P i j ) , m i n   i m i n   j η Ξ ˜ R P i j e i 2 π ( m i n   i m i n   j η Ξ ˜ R P i j ) ) , their
Ξ ˜ C I e i j C I F S P W G ( Ξ ˜ C I e 11 , Ξ ˜ C I e 12 , , Ξ ˜ C I e m n ) Ξ ˜ C I e i j +  
Proof. 
Trivial. □
Theorem 13.
For the CIFSNs  Ξ ˜ C I e i j = ( μ Ξ ˜ R P i j e i 2 π ( μ Ξ ˜ I P i j ) , η Ξ ˜ R P i j e i 2 π ( η Ξ ˜ I P i j ) ) , i , j = 1 , 2 , , n , m , if  Ξ ˜ C I e i j Ξ ˜ C I e i j , their
C I F S P W G ( Ξ ˜ C I e 11 , Ξ ˜ C I e 12 , , Ξ ˜ C I e m n ) C I F S P W G ( Ξ ˜ C I e 11 , Ξ ˜ C I e 12 , , Ξ ˜ C I e m n )  
Proof. 
Trivial. □
Definition 14.
For the CIFSNs  Ξ ˜ C I e i j = ( μ Ξ ˜ R P i j e i 2 π ( μ Ξ ˜ I P i j ) , η Ξ ˜ R P i j e i 2 π ( η Ξ ˜ I P i j ) ) , i , j = 1 , 2 , , n , m , their CIFSPOWG operators is demonstrated by:
C I F S P O W G ( Ξ ˜ C I e 11 , Ξ ˜ C I e 12 , , Ξ ˜ C I e m n ) = i = 1 m Z i i = 1 m Z i ( j = 1 n j j = 1 n j Ξ ˜ C I e σ ( i ) σ ( j ) )
where and
j = l = 1 j 1 S S V ( Ξ ˜ C I σ ( l ) ) , j = 1 , 2 , , n
Z i = k = 1 i 1 S S V ( Ξ ˜ C I σ ( k ) ) , i , j = 1 , 2 , , m    
Moreover, σ is a transformation function of i = 1 , 2 , , n such that σ ( i 1 ) σ ( i ) . By using Definition 14, we obtained the following results.
Theorem 14.
For the CIFSNs  Ξ ˜ C I e i j = ( μ Ξ ˜ R P i j e i 2 π ( μ Ξ ˜ I P i j ) , η Ξ ˜ R P i j e i 2 π ( η Ξ ˜ I P i j ) ) , i , j = 1 , 2 , , n , m , then by using Equation (40), we have
C I F S P O W A ( Ξ ˜ C I e 11 , Ξ ˜ C I e 12 , , Ξ ˜ C I e m n ) = ( i = 1 m ( j = 1 n μ Ξ ˜ R P σ ( i ) σ ( j ) j j = 1 n j ) Z i i = 1 m Z i e i 2 π ( i = 1 m ( j = 1 n μ Ξ ˜ I P σ ( i ) σ ( j ) j j = 1 n j ) Z i i = 1 m Z i ) , ( 1 i = 1 m ( j = 1 n ( 1 η Ξ ˜ R P σ ( i ) σ ( j ) ) j j = 1 n j ) Z i i = 1 m Z i ) e i 2 π ( 1 i = 1 m ( j = 1 n ( 1 η Ξ ˜ I P σ ( i ) σ ( j ) ) j j = 1 n j ) Z i i = 1 m Z i ) )
Proof. 
Trivial. □
By using Theorem 14, we utilized the following properties such as idempotency, boundedness, and monotonicity.
Theorem 15.
For the CIFSNs  Ξ ˜ C I e i j = ( μ Ξ ˜ R P i j e i 2 π ( μ Ξ ˜ I P i j ) , η Ξ ˜ R P i j e i 2 π ( η Ξ ˜ I P i j ) ) , i , j = 1 , 2 , , n , m , if  Ξ ˜ C I e i j = Ξ ˜ C I e = ( μ Ξ ˜ R P e i 2 π ( μ Ξ ˜ I P ) , η Ξ ˜ R P e i 2 π ( η Ξ ˜ I P ) ) , then
C I F S P O W G ( Ξ ˜ C I e 11 , Ξ ˜ C I e 12 , , Ξ ˜ C I e m n ) = Ξ ˜ C I e  
Proof. 
Trivial. □
Theorem 16.
For the CIFSNs  Ξ ˜ C I e i j = ( μ Ξ ˜ R P i j e i 2 π ( μ Ξ ˜ I P i j ) , η Ξ ˜ R P i j e i 2 π ( η Ξ ˜ I P i j ) ) , i , j = 1 , 2 , , n , m , if  Ξ ˜ C I e i j = ( m i n   i m i n   j μ Ξ ˜ R P i j e i 2 π ( m i n   i m i n   j μ Ξ ˜ I P i j ) , m a x   i m a x   j η Ξ ˜ R P i j e i 2 π ( m a x   i m a x   j η Ξ ˜ R P i j ) )  and  Ξ ˜ C I e i j + = ( m a x   i m a x   j μ Ξ ˜ R P i j e i 2 π ( m a x   i m a x   j μ Ξ ˜ I P i j ) , m i n   i m i n   j η Ξ ˜ R P i j e i 2 π ( m i n   i m i n   j η Ξ ˜ R P i j ) ) , then
Ξ ˜ C I e i j C I F S P O W G ( Ξ ˜ C I e 11 , Ξ ˜ C I e 12 , , Ξ ˜ C I e m n ) Ξ ˜ C I e i j +  
Proof. 
Trivial. □
Theorem 17.
For the CIFSNs  Ξ ˜ C I e i j = ( μ Ξ ˜ R P i j e i 2 π ( μ Ξ ˜ I P i j ) , η Ξ ˜ R P i j e i 2 π ( η Ξ ˜ I P i j ) ) , i , j = 1 , 2 , , n , m , if  Ξ ˜ C I e i j Ξ ˜ C I e i j , then
C I F S P O W G ( Ξ ˜ C I e 11 , Ξ ˜ C I e 12 , , Ξ ˜ C I e m n ) C I F S P O W G ( Ξ ˜ C I e 11 , Ξ ˜ C I e 12 , , Ξ ˜ C I e m n )  
Proof. 
Trivial. □
The presented operators based on CIFSS are more powerful than the existing operators based on fuzzy sets, soft sets, complex fuzzy sets, fuzzy soft sets, complex fuzzy soft sets, intuitionistic fuzzy sets, intuitionistic fuzzy soft sets, and complex intuitionistic fuzzy sets. If we are ignoring the value of soft sets, then the proposed operators based on CIFSSs are converted for CIFSs. Similarly, if we are ignoring the imaginary part in truth and falsity grades, then the presented operators based on CIFSSs are converted for intuitionistic fuzzy soft sets. Additionally, if we chose the value of falsity is equal to zero, then the presented operators based on CIFSSs are converted for complex fuzzy soft sets. The prioritized aggregation operators based on fuzzy sets, soft sets, complex fuzzy sets, fuzzy soft sets, complex fuzzy soft sets, intuitionistic fuzzy sets, intuitionistic fuzzy soft sets, and complex intuitionistic fuzzy sets all are the special cases of the presented operators based on CIFSSs.

5. MADM Procedure Based on Investigated Operators

By using the investigated operators based on CIFSS, we develop a new process of strategy to find the MADM technique by using the investigated approaches. For this, we choose the family of alternatives and their attributes such that Ξ ˜ C I = { Ξ ˜ C I 1 , Ξ ˜ C I 2 , , Ξ ˜ C I n } and Ξ ˜ A T = { Ξ ˜ A T 1 , Ξ ˜ A T 2 , , Ξ ˜ A T m } . For this, we choose the family of parameters, whose expressions are discussed as: { x 1 , x 2 , , x t } . For this, we create a decision matrix, whose every item is in the form of CIFSNs such that Ξ ˜ C I i = ( μ Ξ ˜ R P i j e i 2 π ( μ Ξ ˜ I P i j ) , η Ξ ˜ R P i j e i 2 π ( η Ξ ˜ I P i j ) ) , where μ Ξ ˜ C I = μ Ξ ˜ R P e i 2 π ( μ Ξ ˜ I P ) and η Ξ ˜ C I = η Ξ ˜ R P e i 2 π ( η Ξ ˜ I P ) with the rules such that 0 μ Ξ ˜ R P 1 + η Ξ ˜ R P 1 1 and 0 μ Ξ ˜ I P 1 + η Ξ ˜ I P 1 1 . Furthermore, the refusal grade is demonstrated in the form of Ξ ˜ C I = Ξ ˜ R P e i 2 π ( Ξ ˜ I P ) = ( 1 μ Ξ ˜ R P 1 η Ξ ˜ R P 1 ) e i 2 π ( 1 μ Ξ ˜ I P 1 η Ξ ˜ I P 1 ) . As shown above, the procedure of the decision-making technique is digested in the ensuing ways:
Step 1: By using the family of CIFSNs, we construct the decision matrix, which includes the CIFSNs.
Step 2: By using Equation (22), we aggregate the constructed matrix.
Step 3: By using Equation (13), we determine the score standards of the collected beliefs.
Step 4: Rank all options and discover the best option.
Step 5: Finished.

5.1. Illustrated Example

In this study, we present a pragmatic numerous trait dynamic technique to outline the use of the new strategy. There is an organization that needs to contribute a lot of cash to the accompanying conceivable region: Ξ ˜ C I 1 : gold, Ξ ˜ C I 2 : the travel industry, Ξ ˜ C I 3 : real bequest, and Ξ ˜ C I 4 : energy industry. The organization welcomes some expert venture associations to help with dynamic decision making. The task group thinks about the accompanying attributes: Ξ ˜ A T 1 : market potential, Ξ ˜ A T 2 : the measure of interests obtained, Ξ ˜ A T 3 : growth potential, Ξ ˜ A T 4 : danger of losing capital whole, and Ξ ˜ A T 5 : other. For this, we choose the family of parameters whose expressions are discussed as: { x 1 , x 2 , x 3 , x 4 , x 5 } . The proposed technique is applied to choose the best speculation choice and the solid choices are as follows.
As shown above, the procedure of the decision-making technique is condensed in the following ways:
Step 1: For the family of CIFSNs, we construct the decision matrix, which includes the CIFSNs that are discussed in Table 2, Table 3, Table 4 and Table 5.
Step 2: By using Equation (22), we aggregate the constructed matrix.
j 1 = [ 1 1 1 1 1   0.2 0.5 0.45 0.15 0.5   0.45 0.45 0.5 0.45 0.2   0.45 0.15 0.3 0.5 0.3   0.55 0.45 0.25 0.4 0.5 ] , j 2 = [ 1 1 1 1 1   0.3 0.5 0.35 0.35 0.35   0.45 0.35 0.45 0.45 0.4   0.45 0.3 0.35 0.35 0.25   0.55 0.3 0.3 0.45 0.5 ] , j 3 = [ 1 1 1 1 1   0.3 0.45 0.35 0.45 0.55   0.3 0.3 0.45 0.2 0.15   0.4 0.3 0.35 0.3 0.35   0.5 0.35 0.25 0.5 0.35 ]
j 3 = [ 1 1 1 1 1   0.2 0.45 0.3 0.5 0.4   0.6 0.35 0.35 0.45 0.3   0.55 0.35 0.3 0.5 0.35   0.3 0.5 0.35 0.4 0.3 ]
Z i 1 = [ 1 0.55 0.2475 0.1013 0.0456 ] , Z i 2 = [ 1 0.55 0.165 0.0709 0.0319 ] , Z i 3 = [ 1 0.5 0.175 0.0473 0.0219 ] , Z i 4 = [ 1 0.6 0.21 0.0735 0.0331 ]
Ξ ˜ A T 1 = ( 0.0248 e i 2 π ( 0.0248 ) , 0.2979 e i 2 π ( 0.2979 ) ) , Ξ ˜ A T 2 = ( 0.1764 e i 2 π ( 0.1764 ) , 0.4615 e i 2 π ( 0.4615 ) ) , Ξ ˜ A T 3 = ( 0.4711 e i 2 π ( 0.4711 ) , 0.7388 e i 2 π ( 0.7388 ) ) , Ξ ˜ A T 4 = ( 0.1527 e i 2 π ( 0.1527 ) , 0.3097 e i 2 π ( 0.3097 ) ) , Ξ ˜ A T 5 = ( 0.0703 e i 2 π ( 0.0703 ) , 0.3189 e i 2 π ( 0.3189 ) )
Step 3: By using Equation (13), we determine the score standards of the collected beliefs that are discussed in Table 6.
Step 4: Rank all options and discover the best option.
Ξ ˜ A T 4 Ξ ˜ A T 5 Ξ ˜ A T 3 Ξ ˜ A T 1 Ξ ˜ A T 2
Therefore, the alternative Ξ ˜ A T 4 is the best option.
Step 5: Finished.
As shown above, if we prefer the CIFSSs sorts of material, then the existing operators based on IFSs and IFSSs are unable to resolve it. However, if we prefer the existing sorts of material, then the elaborated operators based on CIFSSs can resolve it. To further justify the quality of the elaborated operators based on CIFSSs, we choose the IFSSs sorts of information and resolve it by using the elaborated operators. The graphical expressions of the information in Table 6 are explained in Figure 2.
The IFSSs sorts of information are discussed in Table 7, Table 8, Table 9 and Table 10.
Step 2: By using Equation (22), we aggregate the constructed matrix.
j 1 = [ 1 1 1 1 1   0.225 0.375 0.35 0.2 0.375   0.35 0.35 0.375 0.35 0.275   0.35 0.2 0.275 0.375 0.275   0.4 0.35 0.25 0.325 0.375 ] , j 2 = [ 1 1 1 1 1   0.275 0.375 0.3 0.3 0.3   0.35 0.3 0.35 0.35 0.325   0.35 0.375 0.3 0.3 0.25   0.4 0.275 0.275 0.35 0.375 ] , j 3 = [ 1 1 1 1 1   0.275 0.35 0.3 0.35 0.4   0.275 0.275 0.35 0.225 0.2   0.275 0.3 0.275 0.3 0.25   0.3 0.25 0.375 0.3 0.25 ]
j 3 = [ 1 1 1 1 1   0.225 0.35 0.275 0.375 0.325   0.425 0.3 0.3 0.35 0.275   0.4 0.3 0.275 0.375 0.3   0.275 0.375 0.3 0.325 0.275 ]
Z i 1 = [ 1 0 . 0.14 0.0459 0.0161 ] , Z i 2 = [ 1 0.4 0.11 0.0368 0.0129 ] , Z i 3 = [ 1 0.375 0.1125 0.0289 0.0105 ] , Z i 4 = [ 1 0.425 0.1275 0.0383 0.0134 ]
Ξ ˜ A T 1 = ( 0.0582 , 0.3332 ) , Ξ ˜ A T 2 = ( 0.3844 , 0.5671 ) , Ξ ˜ A T 3 = ( 0.7042 , 0.8367 ) , Ξ ˜ A T 4 = ( 0.2485 , 0.298 ) , Ξ ˜ A T 5 = ( 0.1227 , 0.3065 )
Step 3: By using Equation (13), we determined the score standards of the collected beliefs that are discussed in Table 11.
Step 4: Rank all options and discover the best option.
Ξ ˜ A T 4 Ξ ˜ A T 3 Ξ ˜ A T 2 Ξ ˜ A T 5 Ξ ˜ A T 1
Therefore, the alternative Ξ ˜ A T 4 is the best option.
Step 5: Finished. The graphical expressions of the information in Table 11 are explained in Figure 3.
As shown above, we chose different sorts of information and resolved it by using elaborated operators based on improved CIFSSs. In both examples, we received the same best option, which is Ξ ˜ A T 4 . Therefore, the elaborated operators based on CIFSSs are extensively valuable and more valid than the existing theories.

5.2. Comparative Analysis

Based on the investigated CIFSPWAO, CIFSPOWAO, CIFSPWGO, and CIFSPOWGO operators, we determined the reliability and consistency of the developed operators with the help of comparative analysis by using the information of Table 2, Table 3, Table 4, Table 5, Table 7, Table 8, Table 9 and Table 10 shown in Section 5.1. The information related to existing theories is as follows: Prioritized averaging/geometric aggregation operators for IFSSs were investigated by Arora and Garg [27]. Bonferroni mean operators for IFSS were introduced by Garg and Arora [28]. Robust aggregation operators for IFSSs were discovered by Arora and Garg [29]. Prioritized intuitionistic fuzzy soft interaction averaging aggregation operators were developed by Garg and Arora [30]. The comparative analysis of the investigated operators and existing operators are discussed in Table 12 by using the information in Table 2, Table 3, Table 4 and Table 5.
The above information gives different sorts of ranking values, which are Ξ ˜ A T 1 and Ξ ˜ A T 4 . The graphical expressions of the information in Table 12 are explained in Figure 4.
As shown above, we choose numerous sorts of materials in the form of elaborated and existing operators and by using the information of Table 2, Table 3, Table 4 and Table 5 we were able to obtain the information in Table 12. As shown above, it is clear that, the existing sorts of information are not able to cope with this problem. Therefore, the elaborated operators based on the CIFSSs are more useful and extensively validated to manage awkward and inconsistent information in realistic problems. The comparative analysis of the investigated operators and existing operators is discussed in Table 13 by using the information form Table 7, Table 8, Table 9 and Table 10.
As shown in Figure 4 and Figure 5, we see that it contains four existing sorts of operators and four elaborated sorts of operators. Both figures contain five alternatives in the form of different colors. For simplicity and better understanding, we have drawn these figures.
The above information gives different sorts of ranking values, which are Ξ ˜ A T 1  and Ξ ˜ A T 4 The graphical expressions of the information in Table 13 are explained in Figure 5.
As shown above, we choose numerous sorts of materials in the form of elaborated and existing operators and by using the information from Table 2, Table 3, Table 4, Table 5, Table 7, Table 8, Table 9 and Table 10, obtained in the form of the information from Table 12 and Table 13. As shown above, it is clear that the existing sorts of information are unable to cope with this problem. Therefore, the elaborated operators based on the CIFSSs are more useful and extensively valid to manage awkward and inconsistent information in realistic problems.

6. Conclusions

A prioritized aggregation operator is one of the most flexible and more dominant techniques to determine the interrelationship among any number of attributes. In this manuscript, we elaborated on the notion of CIFSS, which includes the grade of truth and falsity with the rule that the sum of the real and imaginary part of both grades is confined to [0, 1]. CIFSS is a valuable procedure to determine the authenticity and consistency of the elaborated approaches. The principle of CIFSS is more powerful and modified from the existing ideas such as fuzzy sets, complex fuzzy sets, soft sets, complex fuzzy soft sets, intuitionistic fuzzy sets, intuitionistic fuzzy soft sets, and complex intuitionistic fuzzy sets. The fundamental laws and their related examples are also determined. Moreover, by using these laws, we investigated the notions of CIFSPWAO, CIFSPOWAO, CIFSPWGO, and CIFSPOWGO, and their related properties are also developed. Based on the developed operators, a MADM tool is developed by using the explored operators based on CIFSS. Some numerical examples are also illustrated by using the investigated operators to determine the feasibility and consistency of the developed approaches. Finally, the comparative analysis and their geometrical manifestations are also determined to enhance the excellence of the performed explorations.
In the future, we will encompass the investigated ideas in the environment of complex q-rung orthopair fuzzy sets [32,33,34,35,36], spherical and T-spherical fuzzy sets [37], complex T-spherical fuzzy sets [38], and complex neutrosophic sets [39,40], etc. We will use [41,42,43] to enhance the excellence of the scrutinized approaches. Furthermore, we may also apply the proposed aggregation operators to two-sided matching decision-making problems or consider the consensus reaching process with complex intuitionistic fuzzy soft sets in group decision making by referring to two-sided matching decision making with multigranular hesitant fuzzy linguistic term sets and incomplete criteria weight information [44,45,46].

Author Contributions

Conceptualization, Z.A. and T.M.; methodology, Z.A. and T.M.; validation, Z.A. and T.M.; formal analysis, Z.A.; investigation, Z.A. and T.M.; writing—original draft preparation, Z.A. and T.M.; writing—review and editing, M.A. and R.C.; supervision, T.M.; project administration, Z.A.; funding acquisition, M.A. and R.C. All authors have read and agreed to the published version of the manuscript.

Funding

The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University, Abha 61413, Saudi Arabia for funding this work through research groups program under grant number R.G. P-2/29/42.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The authors declare that the data used in this article are hypothetical and can be used by anyone without any prior permission by just citing this article.

Acknowledgments

The authors would like to thank the anonymous reviewers for their helpful comments for improving this paper.

Conflicts of Interest

The authors declare that they have no conflict of interest.

Appendix A

Proof of Theorem 2.
For n = 1 , we have
C I F S P W A ( Ξ ˜ C I e 11 , Ξ ˜ C I e 21 , , Ξ ˜ C I e m 1 ) = i = 1 m Z i i = 1 m Z i Ξ ˜ C I e i 1 = ( ( 1 i = 1 m ( ( 1 μ Ξ ˜ R P i 1 ) z i i = 1 m z i ) e i 2 π ( 1 i = 1 m ( ( 1 μ Ξ ˜ I P i 1 ) z i i = 1 m z i ) , i = 1 m η Ξ ˜ R P i 1 z i i = 1 m z i e i 2 π ( i = 1 m η Ξ ˜ I P i 1 z i i = 1 m z i ) ) = ( ( 1 i = 1 m ( j = 1 1 ( 1 μ Ξ ˜ R P i j ) j j = 1 n j ) Z i i = 1 m Z i ) e i 2 π ( 1 i = 1 m ( j = 1 1 ( 1 μ Ξ ˜ I P i j ) j j = 1 n j ) Z i i = 1 m Z i ) , i = 1 m ( j = 1 1 η Ξ ˜ R P i j j j = 1 n j ) Z i i = 1 m Z i e i 2 π ( i = 1 m ( j = 1 1 η Ξ ˜ I P i j j j = 1 n j ) Z i i = 1 m Z i ) )
Similarly, when we chose m = 1 , we have
C I F S P W A ( Ξ ˜ C I e 11 , Ξ ˜ C I e 12 , , Ξ ˜ C I e 1 n ) = j = 1 n 3 j j = 1 n 3 j Ξ ˜ C I e 1 j = ( ( 1 j = 1 n ( ( 1 μ Ξ ˜ R P 1 j ) 3 j j = 1 n 3 j ) e i 2 π ( 1 j = 1 n ( ( 1 μ Ξ ˜ I P 1 j ) 3 j j = 1 n 3 j ) , j = 1 n η Ξ ˜ R P 1 j 3 j j = 1 n 3 j e i 2 π ( j = 1 n η Ξ ˜ I P 1 j 3 j j = 1 n 3 j ) ) = ( ( 1 i = 1 1 ( j = 1 n ( 1 μ Ξ ˜ R P i j ) j j = 1 n j ) Z i i = 1 m Z i ) e i 2 π ( 1 i = 1 1 ( j = 1 n ( 1 μ Ξ ˜ I P i j ) j j = 1 n j ) Z i i = 1 m Z i ) , i = 1 1 ( j = 1 n η Ξ ˜ R P i j j j = 1 n j ) Z i i = 1 m Z i e i 2 π ( i = 1 1 ( j = 1 n η Ξ ˜ I P i j j j = 1 n j ) Z i i = 1 m Z i ) )
Thus, Equation (22), is satisfied for n = m = 1 . Assume that Equation (22) is satisfied for m = k 1 + 1 , n = k 2 and m = k 1 , n = k 2 + 1 , i.e.,
i = 1 k 1 + 1 Z i i = 1 m Z i ( j = 1 k 2 3 j j = 1 n 3 j Ξ ˜ C I e i j ) = ( ( 1 i = 1 k 1 + 1 ( j = 1 k 2 ( 1 μ Ξ ˜ R P i j ) j j = 1 n j ) Z i i = 1 m Z i ) e i 2 π ( 1 i = 1 k 1 + 1 ( j = 1 k 2 ( 1 μ Ξ ˜ I P i j ) j j = 1 n j ) Z i i = 1 m Z i ) , i = 1 k 1 + 1 ( j = 1 k 2 η Ξ ˜ R P i j j j = 1 n j ) Z i i = 1 m Z i e i 2 π ( i = 1 k 1 + 1 ( j = 1 k 2 η Ξ ˜ I P i j j j = 1 n j ) Z i i = 1 m Z i ) )
i = 1 k 1 Z i i = 1 m Z i ( j = 1 k 2 + 1 3 j j = 1 n 3 j Ξ ˜ C I e i j ) = ( ( 1 i = 1 k 1 ( j = 1 k 2 + 1 ( 1 μ Ξ ˜ R P i j ) j j = 1 n j ) Z i i = 1 m Z i ) e i 2 π ( 1 i = 1 k 1 ( j = 1 k 2 + 1 ( 1 μ Ξ ˜ I P i j ) j j = 1 n j ) Z i i = 1 m Z i ) , i = 1 k 1 ( j = 1 k 2 + ! η Ξ ˜ R P i j j j = 1 n j ) Z i i = 1 m Z i e i 2 π ( i = 1 k 1 ( j = 1 k 2 + 1 η Ξ ˜ I P i j j j = 1 n j ) Z i i = 1 m Z i ) )
and
i = 1 k 1 + 1 Z i i = 1 k 1 + 1 Z i ( j = 1 k 2 + 1 j j = 1 k 2 + 1 j Ξ ˜ C I e i j ) = i = 1 k 1 + 1 Z i i = 1 k 1 + 1 Z i ( j = 1 k 2 j j = 1 k 2 j Ξ ˜ C I e i j k 2 + 1 j = 1 k 2 + 1 j Ξ ˜ C I e ( k 2 + 1 ) j ) = ( i = 1 k 1 + 1 Z i i = 1 k 1 + 1 Z i ( j = 1 k 2 j j = 1 k 2 j Ξ ˜ C I e i j ) ) ( i = 1 k 1 + 1 Z i i = 1 k 1 + 1 Z i ( k 2 + 1 j = 1 k 2 + 1 j Ξ ˜ C I e ( k 2 + 1 ) j ) ) = ( ( 1 i = 1 k 1 + 1 ( j = 1 k 2 ( 1 μ Ξ ˜ R P i j ) j j = 1 n j ) Z i i = 1 m Z i ) e i 2 π ( 1 i = 1 k 1 + 1 ( j = 1 k 2 ( 1 μ Ξ ˜ I P i j ) j j = 1 n j ) Z i i = 1 m Z i ) , i = 1 k 1 + 1 ( j = 1 k 2 η Ξ ˜ R P i j j j = 1 n j ) Z i i = 1 m Z i e i 2 π ( i = 1 k 1 + 1 ( j = 1 k 2 η Ξ ˜ I P i j j j = 1 n j ) Z i i = 1 m Z i ) ) ( ( 1 i = 1 k 1 + 1 ( j = 1 k 2 ( μ Ξ ˜ R P i j ) k 2 + 1 j = 1 k 2 + 1 j ) Z i i = 1 k 2 + ! Z i ) e i 2 π ( 1 i = 1 k 1 + 1 ( j = 1 k 2 ( μ Ξ ˜ I P i j ) k 2 + 1 j = 1 k 2 + 1 j ) Z i i = 1 k 2 + ! Z i ) , i = 1 k 1 + 1 ( η Ξ ˜ R P i j k 2 + 1 j = 1 k 2 + 1 j ) Z i i = 1 k 2 + 1 Z i e i 2 π ( i = 1 k 1 + 1 ( η Ξ ˜ I P i j k 2 + 1 j = 1 k 2 + 1 j ) Z i i = 1 k 2 + 1 Z i ) ) = ( ( 1 i = 1 k 1 + 1 ( j = 1 k 2 + 1 ( 1 μ Ξ ˜ R P i j ) j j = 1 k 2 + 1 j ) Z i i = 1 k 1 + 1 Z i ) e i 2 π ( 1 i = 1 k 1 + 1 ( j = 1 k 2 + ! ( 1 μ Ξ ˜ I P i j ) j j = 1 k 2 + 1 j ) Z i i = 1 k 1 + 1 Z i ) , i = 1 k 1 + 1 ( j = 1 k 2 + 1 η Ξ ˜ R P i j j j = 1 k 2 + 1 j ) Z i i = 1 k 1 + 1 Z i e i 2 π ( i = 1 k 1 + 1 ( j = 1 k 2 + 1 η Ξ ˜ I P i j j j = 1 k 2 + 1 j ) Z i i = 1 k 1 + 1 Z i ) )
Thus, Equation (22), is satisfied for all n . □
Proof of Theorem 3.
As shown above, if Ξ ˜ C I e i j = Ξ ˜ C I e = ( μ Ξ ˜ R P e i 2 π ( μ Ξ ˜ I P ) , η Ξ ˜ R P e i 2 π ( η Ξ ˜ I P ) ) , then
C I F S P W A ( Ξ ˜ C I e 11 , Ξ ˜ C I e 12 , , Ξ ˜ C I e m n ) = ( ( 1 i = 1 m ( j = 1 n ( 1 μ Ξ ˜ R P ) j j = 1 n j ) Z i i = 1 m Z i ) e i 2 π ( 1 i = 1 m ( j = 1 n ( 1 μ Ξ ˜ I P ) j j = 1 n j ) Z i i = 1 m Z i ) , i = 1 m ( j = 1 n η Ξ ˜ R P j j = 1 n j ) Z i i = 1 m Z i e i 2 π ( i = 1 m ( j = 1 n η Ξ ˜ I P j j = 1 n j ) Z i i = 1 m Z i ) ) = ( ( 1 ( ( 1 μ Ξ ˜ R P ) j = 1 n j j = 1 n j ) i = 1 m Z i i = 1 m Z i ) e i 2 π ( 1 ( ( 1 μ Ξ ˜ I P ) j = 1 n j j = 1 n j ) i = 1 m Z i i = 1 m Z i ) , ( η Ξ ˜ R P j = 1 n j j = 1 n j ) i = 1 m Z i i = 1 m Z i e i 2 π ( η Ξ ˜ I P j = 1 n j j = 1 n j ) i = 1 m Z i i = 1 m Z i ) = ( μ Ξ ˜ R P e i 2 π ( μ Ξ ˜ I P ) , η Ξ ˜ R P e i 2 π ( η Ξ ˜ I P ) ) = Ξ ˜ C I e
 □
Proof of Theorem 4.
As shown above, if Ξ ˜ C I e i j = ( min   i min   j μ Ξ ˜ R P i j e i 2 π ( min   i min   j μ Ξ ˜ I P i j ) , max   i max   j η Ξ ˜ R P i j e i 2 π ( max   i max   j η Ξ ˜ R P i j ) ) and Ξ ˜ C I e i j + = ( max   i max   j μ Ξ ˜ R P i j e i 2 π ( max   i max   j μ Ξ ˜ I P i j ) , min   i min   j η Ξ ˜ R P i j e i 2 π ( min   i min   j η Ξ ˜ R P i j ) ) , then
min   i min   j μ Ξ ˜ R P i j μ Ξ ˜ R P i j max   i max   j μ Ξ ˜ R P i j 1 min   i min   j μ Ξ ˜ R P i j 1 μ Ξ ˜ R P i j 1 max   i max   j μ Ξ ˜ R P i j ( 1 min   i min   j μ Ξ ˜ R P i j ) j j = 1 n j ( 1 μ Ξ ˜ R P i j ) j j = 1 n j ( 1 max   i max   j μ Ξ ˜ R P i j ) j j = 1 n j 1 min   i min   j μ Ξ ˜ R P i j j = 1 n ( 1 μ Ξ ˜ R P ) j j = 1 n j 1 max   i max   j μ Ξ ˜ R P i j 1 min   i min   j μ Ξ ˜ R P i j i = 1 m e ( j = 1 n e ( 1 μ Ξ ˜ R P ) j j = 1 n e j ) Z i i = 1 m e Z i 1 max   i max   j μ Ξ ˜ R P i j 1 min   i min   j μ Ξ ˜ R P i j 1 i = 1 m ( j = 1 n ( 1 μ Ξ ˜ R P ) j j = 1 n j ) Z i i = 1 m Z i 1 max   i max   j μ Ξ ˜ R P i j
Similarly, for the imaginary part, we obtain
1 min   i min   j μ Ξ ˜ I P i j 1 i = 1 m ( j = 1 n ( 1 μ Ξ ˜ I P ) j j = 1 n j ) Z i i = 1 m Z i 1 max   i max   j μ Ξ ˜ I P i j
Similarly, for real and imaginary parts, we obtain
min   i min   j η Ξ ˜ R P i j i = 1 m ( j = 1 n η Ξ ˜ R P j j = 1 n j ) Z i i = 1 m Z i max   i max   j η Ξ ˜ R P i j
min   i min   j η Ξ ˜ I P i j i = 1 m ( j = 1 n η Ξ ˜ I P j j = 1 n j ) Z i i = 1 m Z i max   i max   j η Ξ ˜ I P i j
Then, by using Equation (6), we obtain
S S V ( Ξ ˜ C I e ) = 1 4 ( 1 + μ Ξ ˜ R P + μ Ξ ˜ R P η Ξ ˜ R P η Ξ ˜ R P ) = 1 4 ( 1 + max   i max   j μ Ξ ˜ R P i j + max   i max   j μ Ξ ˜ I P i j min   i min   j η Ξ ˜ R P i j min   i min   j η Ξ ˜ I P i j ) = S S V ( Ξ ˜ C I e i j + )
S S V ( Ξ ˜ C I e ) = 1 4 ( 1 + μ Ξ ˜ R P + μ Ξ ˜ R P η Ξ ˜ R P η Ξ ˜ R P ) = 1 4 ( 1 + min   i min   j μ Ξ ˜ R P i j + min   i min   j μ Ξ ˜ I P i j max   i max   j η Ξ ˜ R P i j max   i max   j η Ξ ˜ I P i j ) = S S V ( Ξ ˜ C I e i j )
As shown above, we elaborate on the following cases:
Case 1: If S S V ( Ξ ˜ C I e i j + ) > S S V ( Ξ ˜ C I e i j ) and S S V ( Ξ ˜ C I e i j ) < S S V ( Ξ ˜ C I e i j ) , then based on the comparison rule, we obtain
Ξ ˜ C I e i j C I F S P W A ( Ξ ˜ C I e 11 , Ξ ˜ C I e 12 , , Ξ ˜ C I e m n ) Ξ ˜ C I e i j +
Case 2: If S S V ( Ξ ˜ C I e i j + ) = S S V ( Ξ ˜ C I e i j ) and S S V ( Ξ ˜ C I e i j ) = S S V ( Ξ ˜ C I e i j ) , then based on Equation (7), we obtain
A V ( Ξ ˜ C I e ) = 1 4 ( 1 + μ Ξ ˜ R P + μ Ξ ˜ R P + η Ξ ˜ R P + η Ξ ˜ R P ) = 1 4 ( 1 + max   i max   j μ Ξ ˜ R P i j + max   i max   j μ Ξ ˜ I P i j + min   i min   j η Ξ ˜ R P i j + min   i min   j η Ξ ˜ I P i j ) = A V ( Ξ ˜ C I e i j + )
A V ( Ξ ˜ C I e ) = 1 4 ( 1 + μ Ξ ˜ R P + μ Ξ ˜ R P + η Ξ ˜ R P + η Ξ ˜ R P ) = 1 4 ( 1 + min   i min   j μ Ξ ˜ R P i j + min   i min   j μ Ξ ˜ I P i j + max   i max   j η Ξ ˜ R P i j + max   i max   j η Ξ ˜ I P i j ) = A V ( Ξ ˜ C I e i j )
As shown above, we obtain
Ξ ˜ C I e i j = C I F S P W A ( Ξ ˜ C I e 11 , Ξ ˜ C I e 12 , , Ξ ˜ C I e m n ) = Ξ ˜ C I e i j +
Therefore, we obtained the result such that
Ξ ˜ C I e i j C I F S P W A ( Ξ ˜ C I e 11 , Ξ ˜ C I e 12 , , Ξ ˜ C I e m n ) Ξ ˜ C I e i j +
 □

References

  1. Zadeh, L.A. Fuzzy sets. Infor. Control 1965, 8, 338–353. [Google Scholar] [CrossRef] [Green Version]
  2. Molodtsov, D. Soft set theory—first results. Comput. Math. Appl. 1999, 37, 19–31. [Google Scholar] [CrossRef] [Green Version]
  3. Mahmood, T. A novel approach towards bipolar soft sets and their applications. J. Math. 2020, 2021, 4690808. [Google Scholar] [CrossRef]
  4. Atanassov, K. Intuitionistic fuzzy sets. Fuzzy Sets Syst. 1986, 20, 87–96. [Google Scholar] [CrossRef]
  5. Kumari, R.; Mishra, A.R. Multi-criteria COPRAS method based on parametric measures for intuitionistic fuzzy sets: Application of green supplier selection. Iran. J. Sci. Technol. Trans. Electr. Eng. 2020, 44, 1645–1662. [Google Scholar] [CrossRef]
  6. Jana, C.; Pal, M. Application of bipolar intuitionistic fuzzy soft sets in decision making problem. Int. J. Fuzzy Syst. Appl. 2018, 7, 32–55. [Google Scholar] [CrossRef]
  7. Zeng, S.; Xiao, Y. TOPSIS method for intuitionistic fuzzy multiple-criteria decision making and its application to investment selection. Kybernetes 2016, 7, 144–157. [Google Scholar] [CrossRef]
  8. Li, Y.; Shan, Y.; Liu, P. An extended TODIM method for group decision making with the interval intuitionistic fuzzy sets. Math. Probl. Eng. 2015, 5, 167–189. [Google Scholar] [CrossRef]
  9. Feng, F.; Fujita, H.; Ali, M.I.; Yager, R.R.; Liu, X. Another view on generalized intuitionistic fuzzy soft sets and related multiattribute decision making methods. IEEE Trans. Fuzzy Syst. 2018, 27, 474–488. [Google Scholar] [CrossRef]
  10. Zhang, X.; Liu, P. Method for aggregating triangular fuzzy intuitionistic fuzzy information and its application to decision making. Technol. Econ. Dev. Econ. 2010, 16, 280–290. [Google Scholar] [CrossRef]
  11. Ramot, D.; Milo, R.; Friedman, M.; Kandel, A. Complex fuzzy sets. IEEE Trans. Fuzzy Syst. 2002, 10, 171–186. [Google Scholar] [CrossRef]
  12. Liu, P.; Ali, Z.; Mahmood, T. The distance measures and cross-entropy based on complex fuzzy sets and their application in decision making. J. Intell. Fuzzy Syst. 2020, 39, 3351–3374. [Google Scholar] [CrossRef]
  13. Ramot, D.; Friedman, M.; Langholz, G.; Kandel, A. Complex fuzzy logic. IEEE Trans. Fuzzy Syst. 2003, 11, 450–461. [Google Scholar] [CrossRef]
  14. Chen, Z.; Aghakhani, S.; Man, J.; Dick, S. ANCFIS: A neurofuzzy architecture employing complex fuzzy sets. IEEE Trans. Fuzzy Syst. 2010, 19, 305–322. [Google Scholar] [CrossRef]
  15. Dick, S. Toward complex fuzzy logic. IEEE Trans. Fuzzy Syst. 2005, 13, 405–414. [Google Scholar] [CrossRef]
  16. Alkouri, A.M.D.J.S.; Salleh, A.R. Complex intuitionistic fuzzy sets. AIP Conf. Proc. 2012, 1482, 464–470. [Google Scholar]
  17. Rani, D.; Garg, H. Distance measures between the complex intuitionistic fuzzy sets and their applications to the decision-making process. Int. J. Uncertain. Quantif. 2017, 7, 1–27. [Google Scholar] [CrossRef]
  18. Garg, H.; Rani, D. Some results on information measures for complex intuitionistic fuzzy sets. Int. J. Intell. Syst. 2019, 34, 2319–2363. [Google Scholar] [CrossRef]
  19. Kumar, T.; Bajaj, R.K. On complex intuitionistic fuzzy soft sets with distance measures and entropies. J. Math. 2014, 2014, 972198. [Google Scholar] [CrossRef] [Green Version]
  20. Garg, H.; Rani, D. Novel aggregation operators and ranking method for complex intuitionistic fuzzy sets and their applications to decision-making process. Artif. Intell. Rev. 2019, 53, 3595–3620. [Google Scholar] [CrossRef]
  21. Ngan, R.T.; Ali, M.; Tamir, D.E.; Rishe, N.D.; Kandel, A. Representing complex intuitionistic fuzzy set by quaternion numbers and applications to decision making. Appl. Soft Comput. 2020, 87, 105961–105975. [Google Scholar] [CrossRef]
  22. Garg, H.; Rani, D. Complex interval-valued intuitionistic fuzzy sets and their aggregation operators. Fundam. Inform. 2019, 164, 61–101. [Google Scholar] [CrossRef]
  23. Garg, H.; Rani, D. Generalized geometric aggregation operators based on t-norm operations for complex intuitionistic fuzzy sets and their application to decision-making. Cogn. Comput. 2019, 12, 679–698. [Google Scholar] [CrossRef]
  24. Maji, P.K. More on intuitionistic fuzzy soft sets. In International Workshop on Rough Sets, Fuzzy Sets, Data Mining, and Granular-Soft Computing; Springer: Berlin/Heidelberg, Germany, 2009; Volume 1, pp. 231–240. [Google Scholar]
  25. Garg, H.; Arora, R. Generalized and group-based generalized intuitionistic fuzzy soft sets with applications in decision-making. Appl. Intell. 2018, 48, 343–356. [Google Scholar] [CrossRef]
  26. Hayat, K.; Ali, M.I.; Cao, B.Y.; Karaaslan, F.; Yang, X.P. Another view of aggregation operator on group-based generalized intuitionistic fuzzy soft sets: Multi-attribute decision making methods. Symmetry 2018, 10, 753. [Google Scholar] [CrossRef] [Green Version]
  27. Arora, R.; Garg, H. Prioritized averaging/geometric aggregation operators under the intuitionistic fuzzy soft set environment. Sci. Iran. 2018, 25, 466–482. [Google Scholar] [CrossRef] [Green Version]
  28. Garg, H.; Arora, R. Bonferroni mean aggregation operators under intuitionistic fuzzy soft set environment and their applications to decision-making. J. Oper. Res. Soc. 2018, 69, 1711–1724. [Google Scholar] [CrossRef]
  29. Arora, R.; Garg, H. A robust aggregation operator for multi-criteria decision-making with intuitionistic fuzzy soft set environment. Sci. Iran. 2018, 25, 931–942. [Google Scholar] [CrossRef] [Green Version]
  30. Garg, H.; Arora, R. Novel scaled prioritized intuitionistic fuzzy soft interaction averaging aggregation operators and their application to multi criteria decision making. Eng. Appl. Artif. Intell. 2018, 71, 100–112. [Google Scholar] [CrossRef]
  31. Khan, M.J.; Kumam, P.; Liu, P.; Kumam, W.; Ashraf, S. A novel approach to generalized intuitionistic fuzzy soft sets and its application in decision support system. Mathematics 2019, 7, 742. [Google Scholar] [CrossRef] [Green Version]
  32. Gulzar, M.; Mateen, M.H.; Alghazzawi, D.; Kausar, N. A novel application of complex intuitionistic fuzzy sets in group theory. IEEE Access 2020, 8, 196075–196085. [Google Scholar] [CrossRef]
  33. Quek, S.G.; Selvachandran, G.; Davvaz, B.; Pal, M. The algebraic structures of complex intuitionistic fuzzy soft sets associated with groups and subgroups. Sci. Iran. 2020, 26, 1898–1912. [Google Scholar] [CrossRef] [Green Version]
  34. Ali, Z.; Mahmood, T. Maclaurin symmetric mean operators and their applications in the environment of complex q-rung orthopair fuzzy sets. Comput. Appl. Math. 2020, 39, 161. [Google Scholar] [CrossRef]
  35. Liu, P.; Mahmood, T.; Ali, Z. Complex q-rung orthopair fuzzy aggregation operators and their applications in multi-attribute group decision making. Information 2020, 11, 5. [Google Scholar] [CrossRef] [Green Version]
  36. Garg, H.; Gwak, J.; Mahmood, T.; Ali, Z. Power aggregation operators and VIKOR methods for complex q-rung orthopair fuzzy sets and their applications. Mathematics 2020, 8, 538. [Google Scholar] [CrossRef] [Green Version]
  37. Ali, Z.; Mahmood, T.; Yang, M.S. TOPSIS Method Based on Complex Spherical Fuzzy Sets with Bonferroni Mean Operators. Mathematics 2020, 8, 1739. [Google Scholar] [CrossRef]
  38. Ali, Z.; Mahmood, T.; Yang, M.S. Complex T-spherical fuzzy aggregation operators with application to multi-attribute decision making. Symmetry 2020, 12, 1311. [Google Scholar] [CrossRef]
  39. Ali, Z.; Mahmood, T. Complex neutrosophic generalised dice similarity measures and their application to decision making. CAAI Trans. Intell. Technol. 2020, 5, 78–87. [Google Scholar] [CrossRef]
  40. Li, D.F.; Mahmood, T.; Ali, Z.; Dong, Y. Decision making based on interval-valued complex single-valued neutrosophic hesitant fuzzy generalized hybrid weighted averaging operators. J. Intell. Fuzzy Syst. 2020, 38, 4359–4401. [Google Scholar] [CrossRef]
  41. Riaz, M.; Tehrim, S.T. Certain properties of bipolar fuzzy soft topology via Q-neighborhood. Punjab Univ. J. Math. 2019, 51, 113–131. [Google Scholar]
  42. Riaz, M.; Hashmi, M.R.; Kalsoom, H.; Pamucar, D.; Chu, Y.M. Linear Diophantine Fuzzy Soft Rough Sets for the Selection of Sustainable Material Handling Equipment. Symmetry 2020, 12, 1215. [Google Scholar] [CrossRef]
  43. Riaz, M.; Tehrim, S.T. A robust extension of VIKOR method for bipolar fuzzy sets using connection numbers of SPA theory based metric spaces. Artif. Intell. Rev. 2021, 54, 561–591. [Google Scholar] [CrossRef]
  44. Zhang, Z.; Gao, J.; Gao, Y.; Yu, W. Two-sided matching decision making with multi-granular hesitant fuzzy linguistic term sets and incomplete criteria weight information. Expert Syst. Appl. 2021, 16, 114311–114327. [Google Scholar] [CrossRef]
  45. Zhang, Z.; Kou, X.; Yu, W.; Gao, Y. Consistency improvement for fuzzy preference relations with self-confidence: An application in two-sided matching decision making. J. Oper. Res. Soc. 2020, 6, 1–14. [Google Scholar] [CrossRef]
  46. Zhang, Z.; Li, Z.; Gao, Y. Consensus reaching for group decision making with multi-granular unbalanced linguistic information: A bounded confidence and minimum adjustment-based approach. Inf. Fusion 2021, 74, 96–110. [Google Scholar] [CrossRef]
Figure 1. Geometrical expressions of the unit disc.
Figure 1. Geometrical expressions of the unit disc.
Mathematics 09 01922 g001
Figure 2. Graphical expressions of the information in Table 6.
Figure 2. Graphical expressions of the information in Table 6.
Mathematics 09 01922 g002
Figure 3. Graphical expressions of the information in Table 11.
Figure 3. Graphical expressions of the information in Table 11.
Mathematics 09 01922 g003
Figure 4. Graphical expressions of the information in Table 12.
Figure 4. Graphical expressions of the information in Table 12.
Mathematics 09 01922 g004
Figure 5. Graphical expressions of the information in Table 13.
Figure 5. Graphical expressions of the information in Table 13.
Mathematics 09 01922 g005
Table 1. Expressions of the complex intuitionistic fuzzy soft numbers.
Table 1. Expressions of the complex intuitionistic fuzzy soft numbers.
Ξ ˜ C I e 1 e 2 e 3 e 4 e 5
x 1 ( 0.2 e i 2 π ( 0.2 ) , 0.6 e i 2 π ( 0.6 ) ) ( 0.1 e i 2 π ( 0.1 ) , 0.5 e i 2 π ( 0.5 ) ) ( 0.9 e i 2 π ( 0.9 ) , 0.1 e i 2 π ( 0.1 ) ) ( 0.3 e i 2 π ( 0.3 ) , 0.4 e i 2 π ( 0.4 ) ) ( 0.6 e i 2 π ( 0.6 ) , 0.2 e i 2 π ( 0.2 ) )
x 2 ( 0.5 e i 2 π ( 0.5 ) , 0.4 e i 2 π ( 0.4 ) ) ( 0.2 e i 2 π ( 0.2 ) , 0.5 e i 2 π ( 0.5 ) ) ( 0.3 e i 2 π ( 0.3 ) , 0.7 e i 2 π ( 0.7 ) ) ( 0.6 e i 2 π ( 0.6 ) , 0.2 e i 2 π ( 0.2 ) ) ( 0.4 e i 2 π ( 0.4 ) , 0.4 e i 2 π ( 0.4 ) )
x 3 ( 0.6 e i 2 π ( 0.6 ) , 0.2 e i 2 π ( 0.2 ) ) ( 0.5 e i 2 π ( 0.5 ) , 0.4 e i 2 π ( 0.4 ) ) ( 0.8 e i 2 π ( 0.8 ) , 0.1 e i 2 π ( 0.1 ) ) ( 0.6 e i 2 π ( 0.6 ) , 0.4 e i 2 π ( 0.4 ) ) ( 0.2 e i 2 π ( 0.2 ) , 0.7 e i 2 π ( 0.7 ) )
x 4 ( 0.4 e i 2 π ( 0.4 ) , 0.5 e i 2 π ( 0.5 ) ) ( 0.3 e i 2 π ( 0.3 ) , 0.5 e i 2 π ( 0.5 ) ) ( 0.6 e i 2 π ( 0.6 ) , 0.1 e i 2 π ( 0.1 ) ) ( 0.4 e i 2 π ( 0.4 ) , 0.1 e i 2 π ( 0.1 ) ) ( 0.2 e i 2 π ( 0.2 ) , 0.4 e i 2 π ( 0.4 ) )
Table 2. Original decision matrix for candidates Ξ ˜ C I 1 .
Table 2. Original decision matrix for candidates Ξ ˜ C I 1 .
x 1 x 2 x 3 x 4 x 5
Ξ ˜ A T 1 ( 0.3 e i 2 π ( 0.3 ) , 0.4 e i 2 π ( 0.4 ) ) ( 0.5 e i 2 π ( 0.5 ) , 0.1 e i 2 π ( 0.1 ) ) ( 0.6 e i 2 π ( 0.6 ) , 0.2 e i 2 π ( 0.2 ) ) ( 0.7 e i 2 π ( 0.7 ) , 0.1 e i 2 π ( 0.1 ) ) ( 0.6 e i 2 π ( 0.6 ) , 0.2 e i 2 π ( 0.2 ) )
Ξ ˜ A T 2 ( 0.6 e i 2 π ( 0.6 ) , 0.1 e i 2 π ( 0.1 ) ) ( 0.6 e i 2 π ( 0.6 ) , 0.2 e i 2 π ( 0.2 ) ) ( 0.2 e i 2 π ( 0.2 ) , 0.4 e i 2 π ( 0.4 ) ) ( 0.5 e i 2 π ( 0.5 ) , 0.1 e i 2 π ( 0.1 ) ) ( 0.7 e i 2 π ( 0.7 ) , 0.3 e i 2 π ( 0.3 ) )
Ξ ˜ A T 3 ( 0.5 e i 2 π ( 0.5 ) , 0.1 e i 2 π ( 0.1 ) ) ( 0.7 e i 2 π ( 0.7 ) , 0.2 e i 2 π ( 0.2 ) ) ( 0.5 e i 2 π ( 0.5 ) , 0.4 e i 2 π ( 0.4 ) ) ( 0.2 e i 2 π ( 0.2 ) , 0.2 e i 2 π ( 0.2 ) ) ( 0.4 e i 2 π ( 0.4 ) , 0.2 e i 2 π ( 0.2 ) )
Ξ ˜ A T 4 ( 0.2 e i 2 π ( 0.2 ) , 0.4 e i 2 π ( 0.4 ) ) ( 0.5 e i 2 π ( 0.5 ) , 0.1 e i 2 π ( 0.1 ) ) ( 0.6 e i 2 π ( 0.6 ) , 0.1 e i 2 π ( 0.1 ) ) ( 0.4 e i 2 π ( 0.4 ) , 0.1 e i 2 π ( 0.1 ) ) ( 0.6 e i 2 π ( 0.6 ) , 0.2 e i 2 π ( 0.2 ) )
Ξ ˜ A T 5 ( 0.6 e i 2 π ( 0.6 ) , 0.1 e i 2 π ( 0.1 ) ) ( 0.3 e i 2 π ( 0.3 ) , 0.4 e i 2 π ( 0.4 ) ) ( 0.4 e i 2 π ( 0.4 ) , 0.3 e i 2 π ( 0.3 ) ) ( 0.6 e i 2 π ( 0.6 ) , 0.1 e i 2 π ( 0.1 ) ) ( 0.5 e i 2 π ( 0.5 ) , 0.2 e i 2 π ( 0.2 ) )
Table 3. Original decision matrix for candidates Ξ ˜ C I 2 .
Table 3. Original decision matrix for candidates Ξ ˜ C I 2 .
x 1 x 2 x 3 x 4 x 5
Ξ ˜ A T 1 ( 0.4 e i 2 π ( 0.4 ) , 0.3 e i 2 π ( 0.3 ) ) ( 0.5 e i 2 π ( 0.5 ) , 0.1 e i 2 π ( 0.1 ) ) ( 0.6 e i 2 π ( 0.6 ) , 0.2 e i 2 π ( 0.2 ) ) ( 0.7 e i 2 π ( 0.7 ) , 0.1 e i 2 π ( 0.1 ) ) ( 0.7 e i 2 π ( 0.7 ) , 0.2 e i 2 π ( 0.2 ) )
Ξ ˜ A T 2 ( 0.6 e i 2 π ( 0.6 ) , 0.1 e i 2 π ( 0.1 ) ) ( 0.5 e i 2 π ( 0.5 ) , 0.3 e i 2 π ( 0.3 ) ) ( 0.4 e i 2 π ( 0.4 ) , 0.3 e i 2 π ( 0.3 ) ) ( 0.4 e i 2 π ( 0.4 ) , 0.3 e i 2 π ( 0.3 ) ) ( 0.4 e i 2 π ( 0.4 ) , 0.1 e i 2 π ( 0.1 ) )
Ξ ˜ A T 3 ( 0.5 e i 2 π ( 0.5 ) , 0.3 e i 2 π ( 0.3 ) ) ( 0.5 e i 2 π ( 0.5 ) , 0.1 e i 2 π ( 0.1 ) ) ( 0.5 e i 2 π ( 0.5 ) , 0.3 e i 2 π ( 0.3 ) ) ( 0.3 e i 2 π ( 0.3 ) , 0.2 e i 2 π ( 0.2 ) ) ( 0.6 e i 2 π ( 0.6 ) , 0.2 e i 2 π ( 0.2 ) )
Ξ ˜ A T 4 ( 0.5 e i 2 π ( 0.5 ) , 0.3 e i 2 π ( 0.3 ) ) ( 0.7 e i 2 π ( 0.7 ) , 0.3 e i 2 π ( 0.3 ) ) ( 0.4 e i 2 π ( 0.4 ) , 0.2 e i 2 π ( 0.2 ) ) ( 0.5 e i 2 π ( 0.5 ) , 0.1 e i 2 π ( 0.1 ) ) ( 0.5 e i 2 π ( 0.5 ) , 0.2 e i 2 π ( 0.2 ) )
Ξ ˜ A T 5 ( 0.4 e i 2 π ( 0.4 ) , 0.2 e i 2 π ( 0.2 ) ) ( 0.5 e i 2 π ( 0.5 ) , 0.2 e i 2 π ( 0.2 ) ) ( 0.3 e i 2 π ( 0.3 ) , 0.3 e i 2 π ( 0.3 ) ) ( 0.6 e i 2 π ( 0.6 ) , 0.1 e i 2 π ( 0.1 ) ) ( 0.4 e i 2 π ( 0.4 ) , 0.2 e i 2 π ( 0.2 ) )
Table 4. Original decision matrix for candidates Ξ ˜ C I 3 .
Table 4. Original decision matrix for candidates Ξ ˜ C I 3 .
x 1 x 2 x 3 x 4 x 5
Ξ ˜ A T 1 ( 0.4 e i 2 π ( 0.4 ) , 0.3 e i 2 π ( 0.3 ) ) ( 0.5 e i 2 π ( 0.5 ) , 0.4 e i 2 π ( 0.4 ) ) ( 0.5 e i 2 π ( 0.5 ) , 0.2 e i 2 π ( 0.2 ) ) ( 0.6 e i 2 π ( 0.6 ) , 0.1 e i 2 π ( 0.1 ) ) ( 0.4 e i 2 π ( 0.4 ) , 0.2 e i 2 π ( 0.2 ) )
Ξ ˜ A T 2 ( 0.5 e i 2 π ( 0.5 ) , 0.1 e i 2 π ( 0.1 ) ) ( 0.3 e i 2 π ( 0.3 ) , 0.2 e i 2 π ( 0.2 ) ) ( 0.3 e i 2 π ( 0.3 ) , 0.2 e i 2 π ( 0.2 ) ) ( 0.4 e i 2 π ( 0.4 ) , 0.2 e i 2 π ( 0.2 ) ) ( 0.3 e i 2 π ( 0.3 ) , 0.2 e i 2 π ( 0.2 ) )
Ξ ˜ A T 3 ( 0.5 e i 2 π ( 0.5 ) , 0.3 e i 2 π ( 0.3 ) ) ( 0.5 e i 2 π ( 0.5 ) , 0.1 e i 2 π ( 0.1 ) ) ( 0.4 e i 2 π ( 0.4 ) , 0.2 e i 2 π ( 0.2 ) ) ( 0.2 e i 2 π ( 0.2 ) , 0.2 e i 2 π ( 0.2 ) ) ( 0.5 e i 2 π ( 0.5 ) , 0.4 e i 2 π ( 0.4 ) )
Ξ ˜ A T 4 ( 0.5 e i 2 π ( 0.5 ) , 0.1 e i 2 π ( 0.1 ) ) ( 0.4 e i 2 π ( 0.4 ) , 0.5 e i 2 π ( 0.5 ) ) ( 0.3 e i 2 π ( 0.3 ) , 0.2 e i 2 π ( 0.2 ) ) ( 0.7 e i 2 π ( 0.7 ) , 0.2 e i 2 π ( 0.2 ) ) ( 0.3 e i 2 π ( 0.3 ) , 0.2 e i 2 π ( 0.2 ) )
Ξ ˜ A T 5 ( 0.7 e i 2 π ( 0.7 ) , 0.1 e i 2 π ( 0.1 ) ) ( 0.4 e i 2 π ( 0.4 ) , 0.6 e i 2 π ( 0.6 ) ) ( 0.4 e i 2 π ( 0.4 ) , 0.2 e i 2 π ( 0.2 ) ) ( 0.3 e i 2 π ( 0.3 ) , 0.1 e i 2 π ( 0.1 ) ) ( 0.6 e i 2 π ( 0.6 ) , 0.1 e i 2 π ( 0.1 ) )
Table 5. Original decision matrix for candidates Ξ ˜ C I 4 .
Table 5. Original decision matrix for candidates Ξ ˜ C I 4 .
x 1 x 2 x 3 x 4 x 5
Ξ ˜ A T 1 ( 0.3 e i 2 π ( 0.3 ) , 0.4 e i 2 π ( 0.4 ) ) ( 0.8 e i 2 π ( 0.8 ) , 0.1 e i 2 π ( 0.1 ) ) ( 0.7 e i 2 π ( 0.7 ) , 0.1 e i 2 π ( 0.1 ) ) ( 0.4 e i 2 π ( 0.4 ) , 0.3 e i 2 π ( 0.3 ) ) ( 0.2 e i 2 π ( 0.2 ) , 0.3 e i 2 π ( 0.3 ) )
Ξ ˜ A T 2 ( 0.5 e i 2 π ( 0.5 ) , 0.1 e i 2 π ( 0.1 ) ) ( 0.4 e i 2 π ( 0.4 ) , 0.2 e i 2 π ( 0.2 ) ) ( 0.4 e i 2 π ( 0.4 ) , 0.2 e i 2 π ( 0.2 ) ) ( 0.6 e i 2 π ( 0.6 ) , 0.1 e i 2 π ( 0.1 ) ) ( 0.2 e i 2 π ( 0.2 ) , 0.6 e i 2 π ( 0.6 ) )
Ξ ˜ A T 3 ( 0.2 e i 2 π ( 0.2 ) , 0.1 e i 2 π ( 0.1 ) ) ( 0.4 e i 2 π ( 0.4 ) , 0.2 e i 2 π ( 0.2 ) ) ( 0.5 e i 2 π ( 0.5 ) , 0.4 e i 2 π ( 0.4 ) ) ( 0.4 e i 2 π ( 0.4 ) , 0.2 e i 2 π ( 0.2 ) ) ( 0.5 e i 2 π ( 0.5 ) , 0.2 e i 2 π ( 0.2 ) )
Ξ ˜ A T 4 ( 0.7 e i 2 π ( 0.7 ) , 0.2 e i 2 π ( 0.2 ) ) ( 0.5 e i 2 π ( 0.5 ) , 0.1 e i 2 π ( 0.1 ) ) ( 0.6 e i 2 π ( 0.6 ) , 0.1 e i 2 π ( 0.1 ) ) ( 0.4 e i 2 π ( 0.4 ) , 0.1 e i 2 π ( 0.1 ) ) ( 0.7 e i 2 π ( 0.7 ) , 0.1 e i 2 π ( 0.1 ) )
Ξ ˜ A T 5 ( 0.5 e i 2 π ( 0.5 ) , 0.2 e i 2 π ( 0.2 ) ) ( 0.5 e i 2 π ( 0.5 ) , 0.4 e i 2 π ( 0.4 ) ) ( 0.4 e i 2 π ( 0.4 ) , 0.2 e i 2 π ( 0.2 ) ) ( 0.3 e i 2 π ( 0.3 ) , 0.2 e i 2 π ( 0.2 ) ) ( 0.7 e i 2 π ( 0.7 ) , 0.1 e i 2 π ( 0.1 ) )
Table 6. By using the information in step 2, we obtain the score values.
Table 6. By using the information in step 2, we obtain the score values.
MethodsScore Values
CIFSPWA operator Ξ ˜ A T 1 = 0.1135 , Ξ ˜ A T 2 = 0.1075 , Ξ ˜ A T 3 = 0.1162 , Ξ ˜ A T 4 = 0.1715 , Ξ ˜ A T 5 = 0.1257
Table 7. Original decision matrix for candidates Ξ ˜ C I 1 .
Table 7. Original decision matrix for candidates Ξ ˜ C I 1 .
x 1 x 2 x 3 x 4 x 5
Ξ ˜ A T 1 ( 0.3 e i 2 π ( 0 ) , 0.4 e i 2 π ( 0 ) ) ( 0.5 e i 2 π ( 0 ) , 0.1 e i 2 π ( 0 ) ) ( 0.6 e i 2 π ( 0 ) , 0.2 e i 2 π ( 0 ) ) ( 0.7 e i 2 π ( 0 ) , 0.1 e i 2 π ( 0 ) ) ( 0.6 e i 2 π ( 0 ) , 0.2 e i 2 π ( 0 ) )
Ξ ˜ A T 2 ( 0.6 e i 2 π ( 0 ) , 0.1 e i 2 π ( 0 ) ) ( 0.6 e i 2 π ( 0 ) , 0.2 e i 2 π ( 0 ) ) ( 0.2 e i 2 π ( 0 ) , 0.4 e i 2 π ( 0 ) ) ( 0.5 e i 2 π ( 0 ) , 0.1 e i 2 π ( 0 ) ) ( 0.7 e i 2 π ( 0 ) , 0.3 e i 2 π ( 0 ) )
Ξ ˜ A T 3 ( 0.5 e i 2 π ( 0 ) , 0.1 e i 2 π ( 0 ) ) ( 0.7 e i 2 π ( 0 ) , 0.2 e i 2 π ( 0 ) ) ( 0.5 e i 2 π ( 0 ) , 0.4 e i 2 π ( 0 ) ) ( 0.2 e i 2 π ( 0 ) , 0.2 e i 2 π ( 0 ) ) ( 0.4 e i 2 π ( 0 ) , 0.2 e i 2 π ( 0 ) )
Ξ ˜ A T 4 ( 0.2 e i 2 π ( 0 ) , 0.4 e i 2 π ( 0 ) ) ( 0.5 e i 2 π ( 0 ) , 0.1 e i 2 π ( 0 ) ) ( 0.6 e i 2 π ( 0 ) , 0.1 e i 2 π ( 0 ) ) ( 0.4 e i 2 π ( 0 ) , 0.1 e i 2 π ( 0 ) ) ( 0.6 e i 2 π ( 0 ) , 0.2 e i 2 π ( 0 ) )
Ξ ˜ A T 5 ( 0.6 e i 2 π ( 0 ) , 0.1 e i 2 π ( 0 ) ) ( 0.3 e i 2 π ( 0 ) , 0.4 e i 2 π ( 0 ) ) ( 0.4 e i 2 π ( 0 ) , 0.3 e i 2 π ( 0 ) ) ( 0.6 e i 2 π ( 0 ) , 0.1 e i 2 π ( 0 ) ) ( 0.5 e i 2 π ( 0 ) , 0.2 e i 2 π ( 0 ) )
Table 8. Original decision matrix for candidates Ξ ˜ C I 2 .
Table 8. Original decision matrix for candidates Ξ ˜ C I 2 .
x 1 x 2 x 3 x 4 x 5
Ξ ˜ A T 1 ( 0.4 e i 2 π ( 0 ) , 0.3 e i 2 π ( 0 ) ) ( 0.5 e i 2 π ( 0 ) , 0.1 e i 2 π ( 0 ) ) ( 0.6 e i 2 π ( 0 ) , 0.2 e i 2 π ( 0 ) ) ( 0.7 e i 2 π ( 0 ) , 0.1 e i 2 π ( 0 ) ) ( 0.7 e i 2 π ( 0 ) , 0.2 e i 2 π ( 0 ) )
Ξ ˜ A T 2 ( 0.6 e i 2 π ( 0 ) , 0.1 e i 2 π ( 0 ) ) ( 0.5 e i 2 π ( 0 ) , 0.3 e i 2 π ( 0 ) ) ( 0.4 e i 2 π ( 0 ) , 0.3 e i 2 π ( 0 ) ) ( 0.4 e i 2 π ( 0 ) , 0.3 e i 2 π ( 0 ) ) ( 0.4 e i 2 π ( 0 ) , 0.1 e i 2 π ( 0 ) )
Ξ ˜ A T 3 ( 0.5 e i 2 π ( 0 ) , 0.3 e i 2 π ( 0 ) ) ( 0.5 e i 2 π ( 0 ) , 0.1 e i 2 π ( 0 ) ) ( 0.5 e i 2 π ( 0 ) , 0.3 e i 2 π ( 0 ) ) ( 0.3 e i 2 π ( 0 ) , 0.2 e i 2 π ( 0 ) ) ( 0.6 e i 2 π ( 0 ) , 0.2 e i 2 π ( 0 ) )
Ξ ˜ A T 4 ( 0.5 e i 2 π ( 0 ) , 0.3 e i 2 π ( 0 ) ) ( 0.7 e i 2 π ( 0 ) , 0.3 e i 2 π ( 0 ) ) ( 0.4 e i 2 π ( 0 ) , 0.2 e i 2 π ( 0 ) ) ( 0.5 e i 2 π ( 0 ) , 0.1 e i 2 π ( 0 ) ) ( 0.5 e i 2 π ( 0 ) , 0.2 e i 2 π ( 0 ) )
Ξ ˜ A T 5 ( 0.4 e i 2 π ( 0 ) , 0.2 e i 2 π ( 0 ) ) ( 0.5 e i 2 π ( 0 ) , 0.2 e i 2 π ( 0 ) ) ( 0.3 e i 2 π ( 0 ) , 0.3 e i 2 π ( 0 ) ) ( 0.6 e i 2 π ( 0 ) , 0.1 e i 2 π ( 0 ) ) ( 0.4 e i 2 π ( 0 ) , 0.2 e i 2 π ( 0 ) )
Table 9. Original decision matrix for candidates Ξ ˜ C I 3 .
Table 9. Original decision matrix for candidates Ξ ˜ C I 3 .
x 1 x 2 x 3 x 4 x 5
Ξ ˜ A T 1 ( 0.4 e i 2 π ( 0 ) , 0.3 e i 2 π ( 0 ) ) ( 0.5 e i 2 π ( 0 ) , 0.4 e i 2 π ( 0 ) ) ( 0.5 e i 2 π ( 0 ) , 0.2 e i 2 π ( 0 ) ) ( 0.6 e i 2 π ( 0 ) , 0.1 e i 2 π ( 0 ) ) ( 0.4 e i 2 π ( 0 ) , 0.2 e i 2 π ( 0 ) )
Ξ ˜ A T 2 ( 0.5 e i 2 π ( 0 ) , 0.1 e i 2 π ( 0 ) ) ( 0.3 e i 2 π ( 0 ) , 0.2 e i 2 π ( 0 ) ) ( 0.3 e i 2 π ( 0 ) , 0.2 e i 2 π ( 0 ) ) ( 0.4 e i 2 π ( 0 ) , 0.2 e i 2 π ( 0 ) ) ( 0.3 e i 2 π ( 0 ) , 0.2 e i 2 π ( 0 ) )
Ξ ˜ A T 3 ( 0.5 e i 2 π ( 0 ) , 0.3 e i 2 π ( 0 ) ) ( 0.5 e i 2 π ( 0 ) , 0.1 e i 2 π ( 0 ) ) ( 0.4 e i 2 π ( 0 ) , 0.2 e i 2 π ( 0 ) ) ( 0.2 e i 2 π ( 0 ) , 0.2 e i 2 π ( 0 ) ) ( 0.5 e i 2 π ( 0 ) , 0.4 e i 2 π ( 0 ) )
Ξ ˜ A T 4 ( 0.5 e i 2 π ( 0 ) , 0.1 e i 2 π ( 0 ) ) ( 0.4 e i 2 π ( 0 ) , 0.5 e i 2 π ( 0 ) ) ( 0.3 e i 2 π ( 0 ) , 0.2 e i 2 π ( 0 ) ) ( 0.7 e i 2 π ( 0 ) , 0.2 e i 2 π ( 0 ) ) ( 0.3 e i 2 π ( 0 ) , 0.2 e i 2 π ( 0 ) )
Ξ ˜ A T 5 ( 0.7 e i 2 π ( 0 ) , 0.1 e i 2 π ( 0 ) ) ( 0.4 e i 2 π ( 0 ) , 0.6 e i 2 π ( 0 ) ) ( 0.4 e i 2 π ( 0 ) , 0.2 e i 2 π ( 0 ) ) ( 0.3 e i 2 π ( 0 ) , 0.1 e i 2 π ( 0 ) ) ( 0.6 e i 2 π ( 0 ) , 0.1 e i 2 π ( 0 ) )
Table 10. Original decision matrix for candidates Ξ ˜ C I 4 .
Table 10. Original decision matrix for candidates Ξ ˜ C I 4 .
x 1 x 2 x 3 x 4 x 5
Ξ ˜ A T 1 ( 0.3 e i 2 π ( 0 ) , 0.4 e i 2 π ( 0 ) ) ( 0.8 e i 2 π ( 0 ) , 0.1 e i 2 π ( 0 ) ) ( 0.7 e i 2 π ( 0 ) , 0.1 e i 2 π ( 0 ) ) ( 0.4 e i 2 π ( 0 ) , 0.3 e i 2 π ( 0 ) ) ( 0.2 e i 2 π ( 0 ) , 0.3 e i 2 π ( 0 ) )
Ξ ˜ A T 2 ( 0.5 e i 2 π ( 0 ) , 0.1 e i 2 π ( 0 ) ) ( 0.4 e i 2 π ( 0 ) , 0.2 e i 2 π ( 0 ) ) ( 0.4 e i 2 π ( 0 ) , 0.2 e i 2 π ( 0 ) ) ( 0.6 e i 2 π ( 0 ) , 0.1 e i 2 π ( 0 ) ) ( 0.2 e i 2 π ( 0 ) , 0.6 e i 2 π ( 0 ) )
Ξ ˜ A T 3 ( 0.2 e i 2 π ( 0 ) , 0.1 e i 2 π ( 0 ) ) ( 0.4 e i 2 π ( 0 ) , 0.2 e i 2 π ( 0 ) ) ( 0.5 e i 2 π ( 0 ) , 0.4 e i 2 π ( 0 ) ) ( 0.4 e i 2 π ( 0 ) , 0.2 e i 2 π ( 0 ) ) ( 0.5 e i 2 π ( 0 ) , 0.2 e i 2 π ( 0 ) )
Ξ ˜ A T 4 ( 0.7 e i 2 π ( 0 ) , 0.2 e i 2 π ( 0 ) ) ( 0.5 e i 2 π ( 0 ) , 0.1 e i 2 π ( 0 ) ) ( 0.6 e i 2 π ( 0 ) , 0.1 e i 2 π ( 0 ) ) ( 0.4 e i 2 π ( 0 ) , 0.1 e i 2 π ( 0 ) ) ( 0.7 e i 2 π ( 0 ) , 0.1 e i 2 π ( 0 ) )
Ξ ˜ A T 5 ( 0.5 e i 2 π ( 0 ) , 0.2 e i 2 π ( 0 ) ) ( 0.5 e i 2 π ( 0 ) , 0.4 e i 2 π ( 0 ) ) ( 0.4 e i 2 π ( 0 ) , 0.2 e i 2 π ( 0 ) ) ( 0.3 e i 2 π ( 0 ) , 0.2 e i 2 π ( 0 ) ) ( 0.7 e i 2 π ( 0 ) , 0.1 e i 2 π ( 0 ) )
Table 11. By using the information in step 2, we obtain the score values.
Table 11. By using the information in step 2, we obtain the score values.
MethodsScore Values
CIFSPWA operator Ξ ˜ A T 1 = 0.1812 , Ξ ˜ A T 2 = 0.2043 , Ξ ˜ A T 3 = 0.2169 , Ξ ˜ A T 4 = 0.2376 , Ξ ˜ A T 5 = 0.204
Table 12. Comparative analysis of the existing and elaborated operators.
Table 12. Comparative analysis of the existing and elaborated operators.
MethodsScore ValuesRanking Values
Arora and Garg [27] C a n n o t   b e   C a l c u l a t e d N i l
Garg and Arora [28] C a n n o t   b e   C a l c u l a t e d N i l
Arora and Garg [29] C a n n o t   b e   C a l c u l a t e d N i l
Garg and Arora [30] C a n n o t   b e   C a l c u l a t e d N i l
Proposed OperatorsPWA Ξ ˜ A T 1 = 0.1135 , Ξ ˜ A T 2 = 0.1075 , Ξ ˜ A T 3 = 0.1162 ,
Ξ ˜ A T 4 = 0.1715 , Ξ ˜ A T 5 = 0.1257
Ξ ˜ A T 4 Ξ ˜ A T 5 Ξ ˜ A T 3
Ξ ˜ A T 1 Ξ ˜ A T 2
POWA Ξ ˜ A T 1 = 0.1255 , Ξ ˜ A T 2 = 0.1195 , Ξ ˜ A T 3 = 0.1282 ,
Ξ ˜ A T 4 = 0.1825 , Ξ ˜ A T 5 = 0.1377
Ξ ˜ A T 4 Ξ ˜ A T 5 Ξ ˜ A T 3
Ξ ˜ A T 1 Ξ ˜ A T 2
PWG Ξ ˜ A T 1 = 0.5022 , Ξ ˜ A T 2 = 0.3859 , Ξ ˜ A T 3 = 0.3288 ,
Ξ ˜ A T 4 = 0.3396 , Ξ ˜ A T 5 = 0.4365
Ξ ˜ A T 1 Ξ ˜ A T 5 Ξ ˜ A T 2
Ξ ˜ A T 4 Ξ ˜ A T 3
POWG Ξ ˜ A T 1 = 0.1346 , Ξ ˜ A T 2 = 0.1286 , Ξ ˜ A T 3 = 0.1373 ,
Ξ ˜ A T 4 = 0.1926 , Ξ ˜ A T 5 = 0.1468
Ξ ˜ A T 4 Ξ ˜ A T 5 Ξ ˜ A T 3
Ξ ˜ A T 1 Ξ ˜ A T 2
Table 13. Comparative analysis of the existing and elaborated operators.
Table 13. Comparative analysis of the existing and elaborated operators.
MethodsScore ValuesRanking Values
Arora and Garg [27] Ξ ˜ A T 1 = 0.2912 , Ξ ˜ A T 2 = 0.3143 , Ξ ˜ A T 3 = 0.3269 ,
Ξ ˜ A T 4 = 0.3476 , Ξ ˜ A T 5 = 0.3141
Ξ ˜ A T 4 Ξ ˜ A T 3 Ξ ˜ A T 2
Ξ ˜ A T 5 Ξ ˜ A T 1
Garg and Arora [28] Ξ ˜ A T 1 = 0.1702 , Ξ ˜ A T 2 = 0.2033 , Ξ ˜ A T 3 = 0.2059 ,
Ξ ˜ A T 4 = 0.2266 , Ξ ˜ A T 5 = 0.2031
Ξ ˜ A T 4 Ξ ˜ A T 3 Ξ ˜ A T 2
Ξ ˜ A T 5 Ξ ˜ A T 1
Arora and Garg [29] Ξ ˜ A T 1 = 0.3922 , Ξ ˜ A T 2 = 0.4253 , Ξ ˜ A T 3 = 0.4279 ,
Ξ ˜ A T 4 = 0.4486 , Ξ ˜ A T 5 = 0.4151
Ξ ˜ A T 4 Ξ ˜ A T 3 Ξ ˜ A T 2
Ξ ˜ A T 5 Ξ ˜ A T 1
Garg and Arora [30] Ξ ˜ A T 1 = 0.1834 , Ξ ˜ A T 2 = 0.2065 , Ξ ˜ A T 3 = 0.2191 ,
Ξ ˜ A T 4 = 0.2398 , Ξ ˜ A T 5 = 0.2261
Ξ ˜ A T 4 Ξ ˜ A T 3 Ξ ˜ A T 2
Ξ ˜ A T 5 Ξ ˜ A T 1
Proposed OperatorsPWA Ξ ˜ A T 1 = 0.1812 , Ξ ˜ A T 2 = 0.2043 , Ξ ˜ A T 3 = 0.2169 ,
Ξ ˜ A T 4 = 0.2376 , Ξ ˜ A T 5 = 0.204
Ξ ˜ A T 4 Ξ ˜ A T 3 Ξ ˜ A T 2
Ξ ˜ A T 5 Ξ ˜ A T 1
POWA Ξ ˜ A T 1 = 0.1024 , Ξ ˜ A T 2 = 0.1064 , Ξ ˜ A T 3 = 0.1051 ,
Ξ ˜ A T 4 = 0.1604 , Ξ ˜ A T 5 = 0.1146
Ξ ˜ A T 4 Ξ ˜ A T 5 Ξ ˜ A T 3
Ξ ˜ A T 1 Ξ ˜ A T 2
PWG Ξ ˜ A T 1 = 0.3538 , Ξ ˜ A T 2 = 0.282 , Ξ ˜ A T 3 = 0.2662 ,
Ξ ˜ A T 4 = 0.2622 , Ξ ˜ A T 5 = 0.3115
Ξ ˜ A T 1 Ξ ˜ A T 5 Ξ ˜ A T 2
Ξ ˜ A T 3 Ξ ˜ A T 4
POWG Ξ ˜ A T 1 = 0.4135 , Ξ ˜ A T 2 = 0.4075 , Ξ ˜ A T 3 = 0.4162 ,
Ξ ˜ A T 4 = 0.4715 , Ξ ˜ A T 5 = 0.4257
Ξ ˜ A T 4 Ξ ˜ A T 5 Ξ ˜ A T 3
Ξ ˜ A T 1 Ξ ˜ A T 2
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Ali, Z.; Mahmood, T.; Aslam, M.; Chinram, R. Another View of Complex Intuitionistic Fuzzy Soft Sets Based on Prioritized Aggregation Operators and Their Applications to Multiattribute Decision Making. Mathematics 2021, 9, 1922. https://doi.org/10.3390/math9161922

AMA Style

Ali Z, Mahmood T, Aslam M, Chinram R. Another View of Complex Intuitionistic Fuzzy Soft Sets Based on Prioritized Aggregation Operators and Their Applications to Multiattribute Decision Making. Mathematics. 2021; 9(16):1922. https://doi.org/10.3390/math9161922

Chicago/Turabian Style

Ali, Zeeshan, Tahir Mahmood, Muhammad Aslam, and Ronnason Chinram. 2021. "Another View of Complex Intuitionistic Fuzzy Soft Sets Based on Prioritized Aggregation Operators and Their Applications to Multiattribute Decision Making" Mathematics 9, no. 16: 1922. https://doi.org/10.3390/math9161922

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop