TY - JOUR
T1 - Interaction hamy mean operators for complex pythagorean fuzzy information and their applications to security threats in computers
AU - Garg, Harish
AU - Kahraman, Cengiz
AU - Ali, Zeeshan
AU - Mahmood, Tahir
N1 - Publisher Copyright:
© 2023 - IOS Press. All rights reserved.
PY - 2023
Y1 - 2023
N2 - Complex Pythagorean fuzzy set (CPFS) is a massive influential principle for managing ambiguity and inconsistent information in genuine life dilemmas. To determine the relationship among any number of attributes, the Hamy mean (HM) operators based on interaction operational laws are very dominant and massive flexible to manage awkward and problematic information. This study aims to combine the complex Pythagorean fuzzy (CPF) information with interaction HM operators to initiate the CPF interaction HM (CPFIHM) operator, CPF interaction weighted HM (CPFIWHM) operator, CPF interaction dual HM (CPFIDHM) operator, CPF interaction weighted dual HM (CPFIWDHM) operator and their powerful properties. Additionally, a decision-making strategy for determining the security threats in the computer is elaborated under the interaction of HM operators based on the CPF setting. Numerous examples are illustrated with the help of presented operators to determine the consistency and flexibility of the investigated operators. Finally, with the help of sensitivity analysis, advantages, and geometrical representation, the supremacy, and efficiency of the presented works are also elaborated.
AB - Complex Pythagorean fuzzy set (CPFS) is a massive influential principle for managing ambiguity and inconsistent information in genuine life dilemmas. To determine the relationship among any number of attributes, the Hamy mean (HM) operators based on interaction operational laws are very dominant and massive flexible to manage awkward and problematic information. This study aims to combine the complex Pythagorean fuzzy (CPF) information with interaction HM operators to initiate the CPF interaction HM (CPFIHM) operator, CPF interaction weighted HM (CPFIWHM) operator, CPF interaction dual HM (CPFIDHM) operator, CPF interaction weighted dual HM (CPFIWDHM) operator and their powerful properties. Additionally, a decision-making strategy for determining the security threats in the computer is elaborated under the interaction of HM operators based on the CPF setting. Numerous examples are illustrated with the help of presented operators to determine the consistency and flexibility of the investigated operators. Finally, with the help of sensitivity analysis, advantages, and geometrical representation, the supremacy, and efficiency of the presented works are also elaborated.
KW - Complex pythagorean fuzzy sets
KW - interaction dual hamy mean operators
KW - interaction hamy mean operators
KW - security threats in computers
UR - http://www.scopus.com/inward/record.url?scp=85162036208&partnerID=8YFLogxK
U2 - 10.3233/JIFS-220947
DO - 10.3233/JIFS-220947
M3 - Article
AN - SCOPUS:85162036208
SN - 1064-1246
VL - 44
SP - 4459
EP - 4479
JO - Journal of Intelligent and Fuzzy Systems
JF - Journal of Intelligent and Fuzzy Systems
IS - 3
ER -