Interaction hamy mean operators for complex pythagorean fuzzy information and their applications to security threats in computers

Harish Garg, Cengiz Kahraman*, Zeeshan Ali, Tahir Mahmood

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

1 Citation (Scopus)

Abstract

Complex Pythagorean fuzzy set (CPFS) is a massive influential principle for managing ambiguity and inconsistent information in genuine life dilemmas. To determine the relationship among any number of attributes, the Hamy mean (HM) operators based on interaction operational laws are very dominant and massive flexible to manage awkward and problematic information. This study aims to combine the complex Pythagorean fuzzy (CPF) information with interaction HM operators to initiate the CPF interaction HM (CPFIHM) operator, CPF interaction weighted HM (CPFIWHM) operator, CPF interaction dual HM (CPFIDHM) operator, CPF interaction weighted dual HM (CPFIWDHM) operator and their powerful properties. Additionally, a decision-making strategy for determining the security threats in the computer is elaborated under the interaction of HM operators based on the CPF setting. Numerous examples are illustrated with the help of presented operators to determine the consistency and flexibility of the investigated operators. Finally, with the help of sensitivity analysis, advantages, and geometrical representation, the supremacy, and efficiency of the presented works are also elaborated.

Original languageEnglish
Pages (from-to)4459-4479
Number of pages21
JournalJournal of Intelligent and Fuzzy Systems
Volume44
Issue number3
DOIs
Publication statusPublished - 2023

Bibliographical note

Publisher Copyright:
© 2023 - IOS Press. All rights reserved.

Keywords

  • Complex pythagorean fuzzy sets
  • interaction dual hamy mean operators
  • interaction hamy mean operators
  • security threats in computers

Fingerprint

Dive into the research topics of 'Interaction hamy mean operators for complex pythagorean fuzzy information and their applications to security threats in computers'. Together they form a unique fingerprint.

Cite this