Research article Special Issues

Sustainable practices to reduce environmental impact of industry using interaction aggregation operators under interval-valued Pythagorean fuzzy hypersoft set

  • Optimization techniques can be used to find the optimal combination of inputs and parameters and help identify the most efficient solution. Aggregation operators (AOs) play a prominent role in discernment between two circulations of prospect and pull out anxieties from that insight. The most fundamental objective of this research is to extend the interaction AOs to the interval-valued Pythagorean fuzzy hypersoft set (IVPFHSS), the comprehensive system of the interval-valued Pythagorean fuzzy soft set (IVPFSS). The IVPFHSS adroitly contracts with defective and ambagious facts compared to the prevalent Pythagorean fuzzy soft set and interval-valued intuitionistic fuzzy hypersoft set (IVIFHSS). It is the dominant technique for enlarging imprecise information in decision-making (DM). The most important intention of this exploration is to intend interactional operational laws for IVPFHSNs. We extend the AOs to interaction AOs under IVPFHSS setting such as interval-valued Pythagorean fuzzy hypersoft interactive weighted average (IVPFHSIWA) and interval-valued Pythagorean fuzzy hypersoft interactive weighted geometric (IVPFHSIWG) operators. Also, we study the significant properties of the proposed operators, such as Idempotency, Boundedness, and Homogeneity. Still, the prevalent multi-criteria group decision-making (MCGDM) approaches consistently carry irreconcilable consequences. Meanwhile, our proposed MCGDM model is deliberate to accommodate these shortcomings. By utilizing a developed mathematical model and optimization technique, Industry 5.0 can achieve digital green innovation, enabling the development of sustainable processes that significantly decrease environmental impact. The impacts show that the intentional model is more operative and consistent in conducting inaccurate data based on IVPFHSS.

    Citation: Nadia Khan, Sehrish Ayaz, Imran Siddique, Hijaz Ahmad, Sameh Askar, Rana Muhammad Zulqarnain. Sustainable practices to reduce environmental impact of industry using interaction aggregation operators under interval-valued Pythagorean fuzzy hypersoft set[J]. AIMS Mathematics, 2023, 8(6): 14644-14683. doi: 10.3934/math.2023750

    Related Papers:

    [1] Ruifang Yang, Shilin Yang . Representations of a non-pointed Hopf algebra. AIMS Mathematics, 2021, 6(10): 10523-10539. doi: 10.3934/math.2021611
    [2] Fengxia Gao, Jialei Chen . Conjugacy classes of left ideals of Sweedler's four-dimensional algebra H4. AIMS Mathematics, 2022, 7(5): 7720-7727. doi: 10.3934/math.2022433
    [3] Haijun Cao, Fang Xiao . The category of affine algebraic regular monoids. AIMS Mathematics, 2022, 7(2): 2666-2679. doi: 10.3934/math.2022150
    [4] Yaguo Guo, Shilin Yang . Projective class rings of a kind of category of Yetter-Drinfeld modules. AIMS Mathematics, 2023, 8(5): 10997-11014. doi: 10.3934/math.2023557
    [5] Faiza Shujat, Faarie Alharbi, Abu Zaid Ansari . Weak (p,q)-Jordan centralizer and derivation on rings and algebras. AIMS Mathematics, 2025, 10(4): 8322-8330. doi: 10.3934/math.2025383
    [6] Mingze Zhao, Huilan Li . A pair of dual Hopf algebras on permutations. AIMS Mathematics, 2021, 6(5): 5106-5123. doi: 10.3934/math.2021302
    [7] Panpan Jia, Jizhu Nan, Yongsheng Ma . Separating invariants for certain representations of the elementary Abelian p-groups of rank two. AIMS Mathematics, 2024, 9(9): 25603-25618. doi: 10.3934/math.20241250
    [8] Zehra Velioǧlu, Mukaddes Balçik . On the Tame automorphisms of differential polynomial algebras. AIMS Mathematics, 2020, 5(4): 3547-3555. doi: 10.3934/math.2020230
    [9] Qining Li . Double Ore extensions of anti-angle type for Hopf algebras. AIMS Mathematics, 2022, 7(7): 12566-12586. doi: 10.3934/math.2022696
    [10] Simone Costa, Marco Pavone . Orthogonal and oriented Fano planes, triangular embeddings of K7, and geometrical representations of the Frobenius group F21. AIMS Mathematics, 2024, 9(12): 35274-35292. doi: 10.3934/math.20241676
  • Optimization techniques can be used to find the optimal combination of inputs and parameters and help identify the most efficient solution. Aggregation operators (AOs) play a prominent role in discernment between two circulations of prospect and pull out anxieties from that insight. The most fundamental objective of this research is to extend the interaction AOs to the interval-valued Pythagorean fuzzy hypersoft set (IVPFHSS), the comprehensive system of the interval-valued Pythagorean fuzzy soft set (IVPFSS). The IVPFHSS adroitly contracts with defective and ambagious facts compared to the prevalent Pythagorean fuzzy soft set and interval-valued intuitionistic fuzzy hypersoft set (IVIFHSS). It is the dominant technique for enlarging imprecise information in decision-making (DM). The most important intention of this exploration is to intend interactional operational laws for IVPFHSNs. We extend the AOs to interaction AOs under IVPFHSS setting such as interval-valued Pythagorean fuzzy hypersoft interactive weighted average (IVPFHSIWA) and interval-valued Pythagorean fuzzy hypersoft interactive weighted geometric (IVPFHSIWG) operators. Also, we study the significant properties of the proposed operators, such as Idempotency, Boundedness, and Homogeneity. Still, the prevalent multi-criteria group decision-making (MCGDM) approaches consistently carry irreconcilable consequences. Meanwhile, our proposed MCGDM model is deliberate to accommodate these shortcomings. By utilizing a developed mathematical model and optimization technique, Industry 5.0 can achieve digital green innovation, enabling the development of sustainable processes that significantly decrease environmental impact. The impacts show that the intentional model is more operative and consistent in conducting inaccurate data based on IVPFHSS.



    In the experiments of various fields such as sciences, public health, and medicine, a proper censoring scheme is often considered because censored data arise commonly. The most famous censoring scheme is the progressive Type-II (PT-II) censoring scheme, where the observation number m(n) and the associated censoring scheme R=(R1,,Rm) are pre-fixed, and the Ri surviving units are randomly withdrawn when the ith failure arises from the experiment. The PT-II censoring scheme is attractive in that cost and time are saved by withdrawing surviving units during the experiment. This advantage has given significant attention to this censoring scheme in the literature [1,2,3]. In particular, some authors developed inference methods based on a pivotal quantity as an alternative to the maximum likelihood method under the PT-II censoring scheme. Wang et al. [4] proved that a pivotal approach is superior to the maximum likelihood approach in parameter estimation of the two-parameter Weibull distribution for a small sample size. Seo and Kang [5] discussed a pivotal-based inference for estimating a scale parameter of the scaled half logistic distribution. They demonstrated the superiority of estimators based on a pivotal quantity for a small sample size, compared to the maximum likelihood estimator (MLE) and approximate MLEs. Seo et al. [6] studied an estimation method for unknown parameters of a Pareto distribution based on the regression-type framework using a pivotal quantity by extending the idea of Lu and Tao [7].

    However, the PT-II censoring scheme has a drawback in that the total experiment time can still be long. To overcome this issue, Ng et al. [8] proposed the use of the ideal experiment time T as an adapted version, and adapted the PT-II censoring scheme as follows: If the mth failure arises before time T, then the experiment is terminated at the time Xm:m:n, which is the same as the PT-II censoring scheme. If the mth failure arises after time T, then surviving units are not withdrawn from the experiment by setting RL+1==Rm1=0, where L(<m1) is the number of observed failures until time T. At the time of the mth failure, all remaining Rm=nmLi=1Ri surviving units are withdrawn. This censoring scheme is called the adaptive PT-II (APT-II) censoring scheme. The basic idea of the APT-II censoring scheme is to finish the experiment as fast as possible when the experiment duration exceeds a predetermined time T. So, this censoring scheme can save both the total experiment time and cost, and increase the efficiency of statistical analysis. Due to this efficiency, the APT-II censoring scheme has been discussed by some authors such as Sobhi and Soliman [9], Ye et al. [10], and Mohan and Chacko [11].

    This paper proposes an inference method based on a pivotal quantity under the APT-II censoring scheme. For an illustration of the proposed methodology, a Pareto distribution with the following cumulative distribution function (CDF) and probability density function is employed:

    F(x;λ,θ)=1(θx)λ (1.1)

    and

    f(x;λ,θ)=λθλx(λ+1),x>θ,λ>0,θ>0,

    respectively, where λ is the shape parameter of interest and θ is the scale parameter. The Pareto distribution is one of the most widely used distributions to model a wide range of real-world cases in various fields such as economics, sociology, and engineering. For example, the distribution of income, internet traffic, and urban population is known to follow the Pareto distribution. To improve the estimation performance of the Pareto distribution, some authors have studied the inference for unknown parameters of this distribution by applying a pivotal quantity. Chen [12] used a pivotal quantity to obtain a joint confidence region for unknown parameters. Wu [13] introduced a pivotal-based method for obtaining a joint confidence region for unknown parameters under the doubly Type-II censoring scheme. Zhang [14] provided simplified versions of Chen [12] and Wu [13] to avoid computational difficulties. Kim et al. [15] proposed an estimation method based on the regression-type framework using a pivotal quantity, which provides a consistent estimator for the shape parameter. However, despite the superiority of the pivotal-based method, Mohie El-Din et al. [16] discussed a Bayesian approach for the Pareto distribution under the APT-II censoring scheme, and the approach has a substantial computational burden. Alternatively, by extending a pivotal approach to the APT-II censoring scheme, this paper proposes an inference method based on its excellent scalability, and the superiority and applicability of the proposed method are substantiated. Significantly, this study marks a novel approach by utilizing a pivotal-based method for the first time, aimed at estimating the unknown parameters of the Pareto distribution within the context of the APT-II censoring scheme.

    For the Pareto distribution with CDF (1.1), classical methods such as the maximum likelihood and bootstrap methods have limitations in estimating confidence intervals (CIs) for λ and θ. The maximum likelihood method yields not exact but approximate CIs with the burden of computing the Fisher information matrix (FIM), and the approximate CIs do not ensure the satisfaction of the nominal levels when a sample size is not large enough. In addition, the asymptotic variance-covariance matrix (AVCM) of the MLEs suffers from a constraint. In the case of the bootstrap method, the CIs fail to satisfy nominal levels. These issues are expounded in Section 2. On the other hand, the proposed pivotal-based method not only easily leads to exact CIs (ECIs) for λ and θ without any conditions even in a situation where a sample size is not large enough, but also provides closed-form inference results.

    Furthermore, this paper introduces the generalized pivotal quantity (GPQ) under the APT-II censoring scheme, which is applicable to the inference for functions with unknown parameters. As a specific example, we develop a method of generating the replicated data from the marginal distribution for the observed APT-II censored sample, inferring the distribution.

    The rest of this paper is organized as follows: Section 2 proposes a pivotal-based estimation method for the unknown parameters of the Pareto distribution under the APT-II censoring scheme. Section 3 provides an algorithm, that generates the replicated data of the observed APT-II censored sample, based on GPQs. Section 4 conducts the Monte Carlo simulation and the real data analysis to assess the proposed methodology. Section 5 concludes this paper.

    Let X1:m:nXm:m:n be an APT-II censored sample with the censoring scheme

    R={R,if Xm:m:n<T,(R1,,RL,0mL1,nmLi=1Ri),if Xm:m:n>T, (2.1)

    where 0mL1 denotes a vector of zeros of the size mL1. The censoring scheme (2.1) means that the APT-II censoring scheme is the same as the PT-II censoring scheme for Xm:m:n<T, and does not allow the removal of experimental units by setting RL+1==Rm1=0 for Xm:m:n>T.

    Suppose that the APT-II censored sample has a Pareto distribution with CDF (1.1). The corresponding likelihood and its logarithm functions are given by

    L(λ,θ)λmθλnmi=1xλ(1+Ri)1i:m:n

    and

    logL(λ,θ)mlogλ+λnlogθλmi=1(1+Ri)logxi:m:n, (2.2)

    respectively. Since the log-likelihood function (2.2) is a monotonically increasing function of θ, the MLE of θ is obtained as ˆθ=X1:m:n. Then, the MLE of λ is obtained as ˆλ=m/(mi=1(1+Ri)logXi:m:nnlogX1:m:n) by maximizing the log-likelihood function with θ=X1:m:n. Note that the MLEs ˆλ and ˆθ are biased estimators. This is proved after stating Lemma 2.1. Moreover, constructing approximate CIs based on the MLEs is straightforward due to the asymptotic normality of the MLEs. However, this process necessitates the variance of the MLEs, which can be derived from the following FIM, calculated using the second partial derivatives of the negative log-likelihood function:

    I(λ,θ)=[E(2logL(λ,θ)λ2)E(2logL(λ,θ)λθ)E(2logL(λ,θ)θλ)E(2logL(λ,θ)θ2)]=(m/λ2n/θn/θnλ/θ2). (2.3)

    By inverting the FIM (2.3), the AVCM of the MLEs ˆλ and ˆθ is obtained as

    ˆΣ=(m/λ2n/θn/θnλ/θ2)1|(λ=ˆλ,θ=ˆθ)=ˆθ2ˆλn(mnˆλ)(nˆλ/ˆθ2n/ˆθn/ˆθm/ˆλ2),ˆλ<mn. (2.4)

    The diagonal elements of the AVCM (2.4) are the variances of the MLEs ˆλ and ˆθ, respectively. Note that the AVCM (2.4) does not always exist because of the constraint ˆλ<m/n. In other words, the construction of approximate CIs is not always possible. Alternatively, we propose inference based on the pivotal quantity under the APT-II censoring scheme.

    Let

    Yi:m:n=log(1F(xi:m:n;λ,θ))=λlog(Xi:m:nθ),i=1,,m. (2.5)

    Then, Y1:m:nYm:m:n is an APT-II censored sample that has a standard exponential distribution with mean E(Yi:m:n)=ij=11/Γj, where Γ1=n and Γj=nj1k=1(1+Rk) for j=2,,m. It is readily apparent that, as the quantity (2.5) is expressed as Yi:m:nd=log(1Ui:m:n), using the relationship F(Xi:m:n;λ,θ)d=Ui:m:n, where Ad=B denotes that A and B have the same distribution, and Ui:m:n is an ith APT-II censored order statistic from a standard uniform distribution. In addition, the quantity (2.5) induces the normalized spacings

    Zi=Γi(Yi:m:nYi1:m:n)=λΓilog(Xi:m:nXi1:m:n),i=1,,m,

    where Y0:m:n=0. Note that Zi (i=1,,m) are independent standard exponential random variables [17], which leads to some pivotal quantities that play an important role in deriving estimation equations. These pivotal quantities are provided in Lemma 2.1. Before introducing Lemma 2.1, to simply express the frequently used distributions, we declare two notations as follows: χ2v and F(d1,d2) denote a χ2 distribution with v degrees of freedom and an F distribution with (d1,d2) degrees of freedom, respectively.

    Lemma 2.1. Let X1:m:nXm:m:n be an APT-II censored sample with the censoring scheme R from the Pareto distribution with CDF (1.1). Then,

    (a)X1(λ)=2λ(mi=1(1+Ri)logXi:m:nnlogX1:m:n),(b)F(θ)=mi=1(1+Ri)logXi:m:nnlogX1:m:nn(m1)log(X1:m:n/θ),

    and

    (c)X2(θ)=2(m1)log(mj=1(1+Rj)logXj:m:nnlogθ)2m1i=1log[ij=1(1+Rj)logXj:m:n+(nij=1(1+Rj))logXi:m:nnlogθ],

    which have χ22(m1), F(2(m1),2), and χ22(m1) distributions, respectively.

    Proof. (a) and (b) are clear from X1(λ)=2mi=2Zi and F(θ)=(2mi=2Zi/[2(m1)])/(2Z1/2) since Zi(i=1,,m) are independent standard exponential random variables as mentioned earlier. In addition, the quantity ij=1Zj/mj=1Zj(i=1,,m1) are the order statistics from a standard uniform distribution with the sample size m1. Then, (c) is proved from

    X2(θ)=2m1i=1log(ij=1Zjmj=1Zj).

    This completes the proof.

    The following subsections provide inference results based on the pivotal quantities in Lemma 2.1.

    From the pivotal quantity X1(λ) in Lemma 2.1, it is easily proved that the MLE ˆλ is a biased estimator because it has an inverse gamma distribution with parameters (m1,λm). Alternatively, an estimator of λ is obtained as

    ˆλu=m2mi=1(1+Ri)logXi:m:nnlogX1:m:n.

    Theorem 2.2. The estimator ˆλu has unbiasedness and consistency.

    Proof. The estimator ˆλu has an inverse gamma distribution with parameters (m1,λ(m2)) from the pivotal quantity X1(λ) in Lemma 2.1. This indicates E(ˆλu )=λ and Var(ˆλu)=λ2/(m3). In addition, the variance Var(ˆλu) converges to zero in probability as m. This completes the proof.

    We introduce another consistent estimator for λ under the APT-II censoring scheme, which is derived from a weighted least squares approach based on a regression-type framework using the quantity (2.5).

    Let Di:m:n=Yi:m:nY1:m:n (i=2,,m). Then, its expectation is given by

    E(Di:m:n)=E(Yi:m:n)E(Y1:m:n)=ij=11Γj1Γ1=ij=21Γj,i=2,,m.

    Using it, we can consider the following linear regression model:

    E(Di:m:n)=λlog(Xi:m:nX1:m:n)+εi,i=2,,m, (2.6)

    where εi is the error term with E(εi)=0. Note that the regression model (2.6) is a simple regression model with no intercept and does not depend on θ. Then, the weighted least squares estimator for λ is obtained from Eq (2.6) by minimizing the quantity mi=2wi:m:n[E(Di:m:n)λlog(Xi:m:n/X1:m:n)]2 with respect to λ as

    ˆλw=mi=2wi:m:nE(Di:m:n)log(Xi:m:n/X1:m:n)mi=2wi:m:n[log(Xi:m:n/X1:m:n)]2, (2.7)

    where wi:m:n is the weight of each data point and assumes that it is not an identical constant.

    Theorem 2.3. Let wi:m:n=1/Var(Di:m:n) in the estimator (2.7), where Var(Di:m:n)=ij=2Γ2j,i=2,,m. Then, the estimator ˆλw is a consistent estimator.

    Proof. The estimator ˆλw with wi:m:n=1/Var(Di:m:n) can be written as

    ˆλw=λmi=2Di:m:nE(Di:m:n)/Var(Di:m:n)mi=2D2i:m:n/Var(Di:m:n)=λmi=2Q1,i:m:n+mi=2Q3,i:m:nmi=2Q2,i:m:n+mi=2Q3,i:m:n=λmi=2Q1,i:m:n/m2+mi=2Q3,i:m:n/m2mi=2Q2,i:m:n/m2+mi=2Q3,i:m:n/m2, (2.8)

    where

    Q1,i:m:n=Di:m:nE(Di:m:n)E2(Di:m:n)Var(Di:m:n),Q2,i:m:n=D2i:m:nE2(Di:m:n)Var(Di:m:n),Q3,i:m:m=E2(Di:m:n)Var(Di:m:n).

    In Eq (2.8), the quantities mi=2Q1,i:m:n/m2 and mi=2Q2,i:m:n/m2 converge to zero in probability as m. In addition, since the quantity mi=2Q3,i:m:n/m2 converges to a constant in probability as m, the fraction term in Eq (2.8) converges to 1 in probability as m. The results for these probability convergences can be easily shown according to Seo et al. [6]. The proof in Seo et al. [6] is restated to match our notation.

    The quantities mi=2Q1,i:m:n/m2 and mi=2Q2,i:m:n/m2 converge in the mean to 0 since

    E(|1m2mi=2Q1,i:m:n|)=0

    and

    E(|1m2mi=2Q2,i:m:n|)=m1m2,

    which implies convergence in probability [18]. In addition,

    1m2mi=2Q3,i:m:n=1m2mi=2{ij=2[mk=j(1+Rk)]1}2ij=2[mk=j(1+Rk)]21m2mi=2[ij=2(m1+mk=jRk)1]2ij=2(mi+1)2=1m2mi=2(i1)(mi+1m1+mk=jRk)2=1m2(m1+mk=jRk)2(m2mj=1j+mj=1j32mmj=1j2),

    which converges to a constant as m. This completes the proof.

    The estimation for θ can be accomplished by a similar argument to that used for obtaining the estimator ˆλu. To do this, we employ the pivotal quantity F(θ) in Lemma 2.1. The inverse of the pivotal quantity F(θ) is written as

    1F(θ)=2Z1/22mi=2Zi/[2(m1)], (2.9)

    which has an F(2,2(m1)) distribution. By Slutsky's theorem [19], the distribution of 2/F(θ) converges to a χ22 distribution as m since the denominator term in (2.9) converges to 1 in probability as m. Then, using the mean of a χ22 distribution, an equation for θ is obtained as 2/F(θ)=2. From the equation, an estimator of θ is derived as

    ˆθp=X1:m:nexp(mi=1(1+Ri)logXi:m:nnlogX1:m:nn(m1)).

    Theorem 2.4. The estimator ˆθp is an asymptotic unbiased and consistent estimator.

    Proof. Since the quantity (mi=1(1+Ri)logXi:m:nnlogX1:m:n)/[n(m1)] has a gamma distribution with parameters (m1,nλ(m1)), by its moment generating function, we have

    E[exp(mi=1(1+Ri)logXi:m:nnlogX1:m:nn(m1))]=[1+1nλ(m1)](m1) (2.10)

    and

    E[exp(2(mi=1(1+Ri)logXi:m:nnlogX1:m:n)n(m1))]=[1+2nλ(m1)](m1). (2.11)

    In addition, the first and second moments of X1:m:n are

    E(X1:m:n)=θnλ(θx)λndx=nλθnλ1,λ>1n (2.12)

    and

    E(X21:m:n)=θnλx(θx)λndx=nλθ2nλ2,λ>2n, (2.13)

    respectively. Then, using (2.10) and (2.12), the mean of the estimator ˆθp is obtained as

    E(ˆθp)=E[X1:m:nexp(mi=1(1+Ri)logXi:m:nnlogX1:m:nn(m1))]=E(X1:m:n)E[exp(mi=1(1+Ri)logXi:m:nnlogX1:m:nn(m1))]=nλθ(nλ1)[1+1nλ(m1)](m1)

    and using (2.10)–(2.13), the variance of the estimator ˆθp is obtained as

    Var(ˆθp)=Var[X1:m:nexp(mi=1(1+Ri)logXi:m:nnlogX1:m:nn(m1))]={E[exp(mi=1(1+Ri)logXi:m:nnlogX1:m:nn(m1))]}2Var(X1:m:n)+Var[exp(mi=1(1+Ri)logXi:m:nnlogX1:m:nn(m1))]E(X21:m:n)=[1+1nλ(m1)]2(m1)n2λ2θ2(nλ1)2+[1+2nλ(m1)](m1)nλθ2(nλ2)=[1+1(m+mi=1Ri)λ(m1)]2(m1)(m+mi=1Ri)2λ2θ2[(m+mi=1Ri)λ1]2+[1+2(m+mi=1Ri)λ(m1)](m1)(m+mi=1Ri)λθ2[(m+mi=1Ri)λ2].

    The mean E(ˆθp) converges to θ in probability as m, and the variance Var(ˆθp) converges to zero in probability as m. This completes the proof.

    Note that the estimator ˆθp is not unbiased because of E(ˆθp)θ. So, we provide another estimator for θ that is improved in terms of the bias. From (2.12), an unbiased estimator of θ is obtained as X1:m:n[11/(nλ)] for known λ. Then, by substituting λ with the MLE ˆλ, an unbiased estimator of θ is derived as

    ˆθu=X1:m:n[1mn(m1)ˆλ]=X1:m:n[1mi=1(1+Ri)logXi:m:nnlogX1:m:nn(m1)].

    The relationship ˆθpˆθu is satisfied because of exp(a)1a for all real numbers a which can be easily shown from the Maclaurin series exp(a)=1+a+i=2ai/i! for all real numbers a.

    Theorem 2.5. The estimator ˆθu has unbiasedness and consistency.

    Proof. The inverse of MLE ˆλ has a gamma distribution with parameters (m1,λm), and its first and second moments are

    E(1ˆλ)=m1λm (2.14)

    and

    E(1ˆλ2)=m1λ2m, (2.15)

    respectively. Then, using (2.12) and (2.14), the mean of the estimator ˆθu is obtained as

    E(ˆθu)=E[X1:m:n(1mn(m1)ˆλ)]=E(X1:m:n)E(X1:m:n)E[mn(m1)ˆλ]=nλθnλ1θnλ1=θ.

    Using (2.12)–(2.15), the variance of the estimator ˆθu is obtained as

    Var(ˆθu)=Var[X1:m:n(1mn(m1)ˆλ)]={E[1mn(m1)ˆλ]}2Var(X1:m:n)+Var[1mn(m1)ˆλ]E(X2i:m:n)=mθ2nλ(nλ2)(m1)=mθ2(m+mi=1Ri)λ[(m+mi=1Ri)λ2](m1),

    which converges to zero as m. This completes the proof.

    On the other hand, the pivotal quantity X2(θ) yields an estimation equation X2(θ)=2(m2) from the fact that X2(θ)/2(m2) converges to 1 in probability as m. However, the equation does not provide a closed form of solution, so it is not considered here.

    As mentioned earlier, the approximate CIs based on the MLEs are constructed when the condition ˆλ<m/n is satisfied. Another classical method of constructing CIs for λ and θ is based on the bootstrap method. It is conducted through the following steps: First, the MLEs ˆλ and ˆθ are calculated based on the original APT-II censored sample. Second, B bootstrap APT-II censored samples are generated from the marginal distribution with the MLEs ˆλ and ˆθ, which is denoted as X(b)1:m:nX(b)m:m:n,b=1,,B. Then, the MLEs for λ and θ are calculated based on the bootstrap APT-II censored sample {X(b)1:m:n,,X(b)m:m:n}, and it is denoted as ˆλ(b) and ˆθ(b),b=1,,B, respectively. After obtaining {ˆλ(1),,ˆλ(B)} and {ˆθ(1),,ˆθ(B)}, we can construct the CIs for λ and θ using their percentiles. In other words, 100(1α)% CIs for λ and θ are constructed as (ˆλ([(α/2)B]),ˆλ([(1α/2)B])) and (ˆθ([(α/2)B]),ˆθ([(1α/2)B])) for 0<α<1, where ˆλ([αB]) and ˆθ([αB]) denote the [αB]th smallest values of {ˆλ(1),,ˆλ(B)} and {ˆθ(1),,ˆθ(B)}, respectively. However, the CI for θ does not satisfy nominal levels because ˆθ(b)=X(b)1:m:n,b=1,,B is always greater than the true value of θ.

    The pivotal-based interval inference we now provide can address these limitations, and it does not require complex mathematical calculations, unlike the FIM. Even for a small sample size, the estimated interval from the pivotal quantity satisfies nominal levels well. Here, ECIs for λ and θ are provided using the pivotal quantities in Lemma 2.1.

    For λ, since the pivotal quantity X1(λ) in Lemma 2.1 has a χ22(m1) distribution, it follows that

    1α=P[χ21α/2,2(m1)<2λ(mi=1(1+Ri)logXi:m:nnlogX1:m:n)<χ2α/2,2(m1)]

    for 0<α<1, where χ2α,2(m1) denotes the upper α percentile of a χ22(m1) distribution. Then, an exact 100(1α)% CI for λ is given by

    [χ21α/2,2(m1)2(mi=1(1+Ri)logXi:m:nnlogX1:m:n),χ2α/2,2(m1)2(mi=1(1+Ri)logXi:m:nnlogX1:m:n)].

    For θ, since the pivotal quantity F(θ) in Lemma 2.1 has an F(2(m1),2) distribution, it follows that

    1α=P[F1α/2(2(m1),2)<mi=1(1+Ri)logXi:m:nnlogX1:m:nn(m1)log(X1:m:n/θ)<Fα/2(2(m1),2)]

    for 0<α<1, where Fα(2(m1),2) denotes the upper α percentile of an F(2(m1),2) distribution. Then, an exact 100(1α)% CI for θ is given by

    [X1:m:nexp(Fα/2(2,2(m1))g(X)),X1:m:nexp(F1α/2(2,2(m1))g(X))],

    where g(X)=(mi=1(1+Ri)logXi:m:nnlogX1:m:n)/[n(m1)].

    Let Xrepi:m:n(i=1,,m) be the replicated data of the observed APT-II censored sample x={x1:m:n,,xm:m:n} with the censoring scheme R. The replicated data Xrepi:m:n is generated by inferring the marginal distribution F(Xrepi:m:n|x;λ,θ) based on the observed APT-II censored sample. To achieve it, GPQs for λ and θ are first defined as

    G1(λ)=X1(λ)2(mi=1(1+Ri)logxi:m:nnlogx1:m:n)

    and

    G2(θ)=exp(logx1:m:nmi=1(1+Ri)logxi:m:nnlogx1:m:nn(m1)F(θ)),

    respectively, according to the argument of Weerahandi [20]. The GPQs G1(λ) and G2(θ) obviously have two properties: The distributions of the GPQs G1(λ) and G2(θ) are free of unknown parameters, and the realization of the GPQs G1(λ) and G2(θ) does not depend on the nuisance parameter.

    The realization of the GPQs G1(λ) and G2(θ) is obtained by using a pseudorandom sequence from a χ22 distribution based on an idea on which the pivotal quantities X1(λ) and F(θ) in Lemma 2.1 are derived. Then, by substituting λ and θ in the marginal distribution F(Xrepi:m:n|x;λ,θ) with the realization of the GPQs G1(λ) and G2(θ), respectively, the replicated data Xrepi:m:n is generated. The detailed steps are given in the following algorithm:

    Algorithm 1

    (a) Generate ζ1,,ζm from a χ22 distribution.

    (b) Compute X=mi=2ζi, followed by G1(λ)=X2(mi=1(1+Ri)logxi:m:nnlogx1:m:n).

    (c) Compute F=mi=2ζi/[2(m1)]/(ζ1/2), followed by G2(θ)=exp(logx1:m:nmi=1(1+Ri)logxi:m:nnlogx1:m:nn(m1)F).

    (d) Generate Xrepi:m:n from the sampling distribution F(Xrepi:m:n|x;G1(λ),G2(θ)).

    (e) Repeat N(10,000) times (a)–(d).

    From Algorithm 1, a 100(1α)% interval for the replicated data Xrepi:m:n is constructed as

    (Xrep,([(α/2)N])i:m:n,Xrep,([(1α/2)N])i:m:n),

    where Xrep,([αN])i:m:n denotes the [αN]th smallest value of {Xrep,1i:m:n,,Xrep,Ni:m:n}. This interval is employed to evaluate the uncertainty of the replicated data Xrepi:m:n in Section 4.2.

    The proposed methodology is evaluated using the Monte Carlo simulation technique. Moreover, its applicability and scalability are examined by performing real-world data analysis.

    To verify the estimation performance of the proposed estimators in comparison with the MLEs, Monte Carlo simulations with 10,000 replications are conducted through the R software. For the Pareto distribution, the shape parameter of interest, λ, is assigned 0.5(0.5)1.5 to showcase the variations in results according to the values of λ, and the scale parameter θ is assigned 1 without loss of generality. In addition, the following censoring scheme is employed to emphasize the strength of the proposed methodology for a sample size that is not large enough in various situations:

    Scheme I : n=20,m=8,R=(13,04,9),II : n=20,m=8,R=(22,05,8),III : n=20,m=6,R=(12,03,12),IV : n=20,m=6,R=(2,04,12),V : n=40,m=16,R=(17,08,17),VI : n=40,m=16,R=(26,09,12),VII : n=40,m=12,R=(15,06,23),VIII : n=40,m=12,R=(24,07,20).

    For each censoring scheme, an APT-II censored sample is generated using the following steps:

    (a) Generate an ordinary PT-II censored sample X1:m:n,,Xm:m:n with the censoring scheme R from the algorithms of Balakrishnan and Sandhu [21] as follows:

    (1) Generate m random numbers W1,,Wm from a standard uniform distribution.

    (2) Compute Vi=W1/(i+Rm++Rmi+1)i, i=1,,m.

    (3) Compute Ui=1VmVmi+1, i=1,,m, where U1,,Um is a PT-II censored sample of size m from a standard uniform distribution.

    (4) Compute Xi:m:n=θ/(1Ui)1/λ, i=1,,m, to obtain a PT-II censored sample from the Pareto distribution with CDF (1.1).

    (b) Determine the value of L, where XL:m:n<T<XL+1:m:n.

    (c) Generate the first ml1 order statistics from a truncated distribution f(x)/[1F(xl+1:m:n)] with sample size nli=1(1+Ri)1.

    (d) Substitute Xl+2:m:n,,Xm:m:n with the first ml1 order statistics obtained in (c).

    To ensure that the number of simulated APT-II censored samples observed until T is greater than 1, we assign T=2.5. Based on the generated APT-II censored samples, the mean squared errors (MSEs) and biases of the provided estimators are computed for each censoring scheme. The results are reported in Figure 1. In addition, the coverage probabilities (CPs) for the exact 95% CIs are provided in Figure 2. As mentioned earlier, the approximate and bootstrap CIs based on the MLEs suffer from constraints. Accordingly, only the results of the proposed ECIs for λ and θ are reported.

    Figure 1.  MSEs and biases of estimators for (a) λ and (b) θ.
    Figure 2.  CPs of ECIs for λ and θ.

    In Figure 1, the length of the line indicates the difference from the true value, so the shorter this is, the better the performance of the corresponding estimator. Based on this argument, the results are summarized as follows: For λ, ˆλu has the best performance in terms of the MSE and bias, followed by ˆλw. For θ, ˆθp and ˆθu are more efficient than ˆθ in terms of the MSE and bias. To be specific, ˆθu has the smallest bias, as expected, while ˆθp is slightly better than ˆθu in terms of the MSE. Taken together, the proposed estimators have generally better performance than the corresponding MLEs in terms of MSE and bias. Furthermore, the use of the proposed estimators, especially ˆλu and ˆθu, is strongly recommended to infer the unknown parameters of the Pareto distribution with CDF (1.1) when the sample size is not large enough. In Figure 2, the length of the line represents the difference from the considered nominal level 0.95. According to this argument, the proposed intervals have a highly closer CP to the considered nominal level.

    In conclusion, the results in Figures 1 and 2 reveal that the proposed estimation method yields more satisfactory results than the maximum likelihood estimation method in a situation where the sample size is not large enough.

    The Pareto distribution is often employed for modeling a wide range of real-world datasets, such as insurance, reliability, engineering, and economics. In this subsection, the mortality rate of COVID-19 studied by Almetwally et al. [22] and Nik et al. [23] is analyzed to validate the practical application of the proposed approaches for a real-world dataset, where the mortality rate refers to the proportion of individuals who have died in a specific population or group affected by a particular disease. Nik et al. [23] applied a new Pareto-type distribution to the mortality rate of COVID-19 for 25 days, from 10 April to 4 May 2020, in Canada, and the data is as follows:

    3.1091 3.3825 3.1444 3.2135 2.4946 3.5146 4.9274 3.3769 6.8686 3.0914 4.9378 3.1091 3.2823
    3.8594 4.0480 4.1685 3.6426 3.2110 2.8636 3.2218 2.9078 3.6346 2.7957 4.2781 4.2202

    For analysis, an APT-II censored sample is generated from the above dataset by setting R=(2,111) with m=12 and T=3.15. The generated APT-II censored sample and the analysis results are reported in Tables 1 and 2, respectively.

    Table 1.  An APT-II censored sample from the mortality rate of COVID-19.
    i 1 2 3 4 5 6 7 8 9 10 11 12
    xi:12:25 2.4946 2.7957 2.8636 2.9078 3.1091 3.1091 3.2218 3.2823 3.3769 3.3825 3.6346 3.6426

     | Show Table
    DownLoad: CSV
    Table 2.  Estimates and 95% CIs of λ and θ.
    Estimates 95% CIs
    ˆλ ˆλu ˆλw ˆθ ˆθp ˆθu ECI for λ ECI for θ
    2.050 1.708 1.209 2.495 2.441 2.442 (0.938,3.141) (2.272,2.493)

     | Show Table
    DownLoad: CSV

    Additionally, to examine the applicability of Algorithm 1 in Section 3, the 95% intervals for the replicated data Xrepi:12:25 are obtained based on N=20000. The resulting plot is presented in Figure 3, which shows that the observed APT-II censored sample lies well within the 95% intervals. This result reveals the applicability of the provided Algorithm 1 for real-world data analysis. In addition, Figure 3 shows the goodness-of-fit test results obtained through the plug-in method. The plug-in method generates the replicated data Xrepi:12:25 by substituting the unknown parameters λ and θ in the marginal distribution F(Xrepi:12:25|x;λ,θ) with their estimators. Here, 20,000 replicated data Xrepi:12:25 are from F(Xrepi:12:25|x;ˆλ,ˆθ) and F(Xrepi:12:25|x;ˆλu,ˆθp), and the empirical mean is computed. From Figure 3, it can be seen that the APT-II censored sample reported in Table 1 has the Pareto distribution because the points are close to a straight line.

    Figure 3.  95% intervals for Xrepi:12:25 and the scatter plot between the APT-II censored sample xi:12:25 and the empirical mean of Xrepi:12:25.

    The main goal of this paper is the proposal of an efficient inference method compared to classical methods under the APT-II censoring scheme. To achieve this goal, we employed the pivotal quantity. For illustration, the proposed method was applied to the Pareto distribution and provided closed-form estimators with excellent properties for the unknown parameters. In addition, the pivotal approach led to the exact inference results for the unknown parameters even when a sample size is not large enough, unlike the maximum likelihood and bootstrap methods which suffer from constraints. Additionally, an algorithm was proposed that generates the replicated data based on the GPQs.

    The proposed methodology was evaluated through Monte Carlo simulations for small and middle sample sizes. Our results showed that the provided estimators are superior to the MLEs in terms of MSE and bias, and, especially, the unbiased and consistent estimators ˆλu and ˆθu have the best performance. In addition, the proposed intervals are clearly exact for unknown parameters, and it is demonstrated that their CPs are highly close to the considered nominal level in simulation results. These results reveal the usefulness of the proposed method in a situation where the sample size is not large enough. Additionally, the mortality rate of COVID-19 in Canada was analyzed, through which the applicability of the proposed methodology for a real-world dataset is demonstrated.

    In conclusion, for the Pareto distribution, the proposed methodology has superior performance when the sample size is not large enough, in comparison to the classical method. While this paper primarily provided insights into the Pareto distribution, future studies will delve into several critical aspects. First, the efficiency and accuracy of the proposed methodology will be assessed in various realistic scenarios, to extend its practical utility. Second, the applicability of our approach to various other probability distributions will be explored, broadening the scope of the study. In addition, a sensitivity analysis will also be conducted to ascertain the robustness of our methodology, especially in situations where the distribution estimation may be incorrect. Finally, subsequent studies will focus on validating the performance of our approach in real-world applications, and a deeper exploration of applicability in industrial settings will be undertaken.

    The authors declare they have not used Artificial Intelligence (AI) tools in the creation of this article.

    The authors declare there is no conflict of interest.



    [1] L. A. Zadeh, Fuzzy sets, Inform. Control, 8 (1965), 338–353. https://doi.org/10.1016/S0019-9958(65)90241-X doi: 10.1016/S0019-9958(65)90241-X
    [2] F. Xiao, CaFtR: A fuzzy complex event processing method, Int. J. Fuzzy Syst., 24 (2022), 1098–1111. https://doi.org/10.1007/s40815-021-01118-6 doi: 10.1007/s40815-021-01118-6
    [3] I. B. Turksen, Interval valued fuzzy sets based on normal forms, Fuzzy Set. Syst., 20 (1986), 191–210. https://doi.org/10.1016/0165-0114(86)90077-1 doi: 10.1016/0165-0114(86)90077-1
    [4] K. Atanassov, Intuitionistic fuzzy sets, Fuzzy Set.. Syst., 20 (1986), 87–96. https://doi.org/10.1016/S0165-0114(86)80034-3 doi: 10.1016/S0165-0114(86)80034-3
    [5] W. Wang, X. Liu, Intuitionistic fuzzy geometric aggregation operators based on Einstein operations, Int. J. Intell. Syst., 26 (2011), 1049–1075. https://doi.org/10.1002/int.20498 doi: 10.1002/int.20498
    [6] F. Xiao, A distance measure for intuitionistic fuzzy sets and its application to pattern classification problems, IEEE T. Syst. Man Cy.-S., 51 (2019), 3980–3992. https://doi.org/10.1109/TSMC.2019.2958635 doi: 10.1109/TSMC.2019.2958635
    [7] K. T. Atanassov, Interval-valued intuitionistic fuzzy sets, In: Intuitionistic Fuzzy Sets, Physica, Heidelberg, 35 (1999). https://doi.org/10.1007/978-3-7908-1870-3_2
    [8] F. Xiao, EFMCDM: Evidential fuzzy multicriteria decision making based on belief entropy, IEEE T. Fuzzy Syst., 28 (2019), 1477–1491. https://doi.org/10.1109/TFUZZ.2019.2936368 doi: 10.1109/TFUZZ.2019.2936368
    [9] R. R. Yager, Pythagorean membership grades in multi-criteria decision making, IEEE T. Fuzzy Syst., 22 (2013), 958–965. https://doi.org/10.1109/TFUZZ.2013.2278989 doi: 10.1109/TFUZZ.2013.2278989
    [10] M. J. Khan, M. I. Ali, P. Kumam, W. Kumam, M. Aslam, J. C. R. Alcantud, Improved generalized dissimilarity measure‐based VIKOR method for Pythagorean fuzzy sets, Int. J. Intell. Syst., 37 (2022), 1807–1845. https://doi.org/10.1002/int.22757 doi: 10.1002/int.22757
    [11] K. Rahman, S. Abdullah, R. Ahmed, M. Ullah, Pythagorean fuzzy Einstein weighted geometric aggregation operator and their application to multiple attribute group decision making, J. Intell. Fuzzy Syst., 33 (2017), 635–647. https://doi.org/10.3233/JIFS-16797 doi: 10.3233/JIFS-16797
    [12] C. Huang, M. Lin, Z. Xu, Pythagorean fuzzy MULTIMOORA method based on distance measure and score function: Its application in multicriteria decision making process, Knowl. Inform. Syst., 62 (2020), 4373–4406. https://doi.org/10.1007/s10115-020-01491-y doi: 10.1007/s10115-020-01491-y
    [13] X. Zhang, Z. Xu, Extension of TOPSIS to multiple criteria decision making with Pythagorean fuzzy sets, Int. J. Intell. Syst., 29 (2014), 1061–1078. https://doi.org/10.1002/int.21676 doi: 10.1002/int.21676
    [14] M. Lin, C. Huang, R. Chen, H. Fujita, X. Wang, Directional correlation coefficient measures for Pythagorean fuzzy sets: Their applications to medical diagnosis and cluster analysis, Complex Intell. Syst., 7 (2021), 1025–1043. https://doi.org/10.1007/s40747-020-00261-1 doi: 10.1007/s40747-020-00261-1
    [15] G. Wei, M. Lu, Pythagorean fuzzy power aggregation operators in multiple attribute decision making, Int. J. Intell. Syst., 33 (2018), 169–186. https://doi.org/10.1002/int.21946 doi: 10.1002/int.21946
    [16] M. Akram, K. Zahid, J.C. R. Alcantud, A new outranking method for multicriteria decision making with complex Pythagorean fuzzy information, Neural Comput. Appl., 34 (2022), 8069–8102. https://doi.org/10.1007/s00521-021-06847-1 doi: 10.1007/s00521-021-06847-1
    [17] F. Xiao, W. Ding, Divergence measure of Pythagorean fuzzy sets and its application in medical diagnosis, Appl. Soft Comput., 79 (2019), 254–267. https://doi.org/10.1016/j.asoc.2019.03.043 doi: 10.1016/j.asoc.2019.03.043
    [18] L. Wang, N. Li, Pythagorean fuzzy interaction power Bonferroni means aggregation operators in multiple attribute decision making, Int. J. Intell. Syst., 35 (2020), 150–183. https://doi.org/10.1002/int.22204 doi: 10.1002/int.22204
    [19] M. Lin, J. Wei, Z. Xu, R. Chen, Multiattribute group decision-making based on linguistic Pythagorean fuzzy interaction partitioned bonferroni mean aggregation operators, Complexity, 2018 (2018). https://doi.org/10.1155/2018/9531064 doi: 10.1155/2018/9531064
    [20] M. R. Khan, K. Ullah, Q. Khan, Multi-attribute decision-making using Archimedean aggregation operator in T-spherical fuzzy environment, Rep. Mech. Eng., 4 (2023), 18–38. https://doi.org/10.31181/rme20031012023k doi: 10.31181/rme20031012023k
    [21] M. Akram, F. Wasim, J. C. R. Alcantud, A. N. Al-Kenani, Multi-criteria optimization technique with complex Pythagorean fuzzy n-soft information, Int. J. Comput. Intell. Syst., 14 (2021), 1–24. https://doi.org/10.1007/s44196-021-00008-x doi: 10.1007/s44196-021-00008-x
    [22] X. Zhang, A novel approach based on similarity measure for Pythagorean fuzzy multiple criteria group decision making, Int. J. Intell. Syst., 31 (2016), 593–611. https://doi.org/10.1002/int.21796 doi: 10.1002/int.21796
    [23] M. Riaz, H. M. A. Farid, Picture fuzzy aggregation approach with application to third-party logistic provider selection process, Rep. Mech. Eng., 3 (2022), 227–236. https://doi.org/10.31181/rme20023062022r doi: 10.31181/rme20023062022r
    [24] M. Lin, X. Li, R. Chen, H. Fujita, J. Lin, Picture fuzzy interactional partitioned Heronian mean aggregation operators: an application to MADM process, Artif. Intell. Rev., 55 (2022), 1171–1208. https://doi.org/10.1007/s10462-021-09953-7 doi: 10.1007/s10462-021-09953-7
    [25] X. Peng, Y. Yang, Fundamental properties of interval‐valued Pythagorean fuzzy aggregation operators, Int. J. Intell. Syst., 31 (2016), 444–487. https://doi.org/10.1002/int.21790 doi: 10.1002/int.21790
    [26] M. Lin, C. Huang, Z. Xu, R. Chen, Evaluating IoT platforms using integrated probabilistic linguistic MCDM method, IEEE Internet Things, 7 (2020), 11195–11208. https://doi.org/10.1109/JIOT.2020.2997133 doi: 10.1109/JIOT.2020.2997133
    [27] K. Rahman, S. Abdullah, M. Shakeel, M. S. Ali Khan, M. Ullah, Interval-valued Pythagorean fuzzy geometric aggregation operators and their application to group decision making problem, Cogent Math., 4 (2017), 1338638. https://doi.org/10.1080/23311835.2017.1338638 doi: 10.1080/23311835.2017.1338638
    [28] M. Lin, X. Li, L. Chen, Linguistic q‐rung orthopair fuzzy sets and their interactional partitioned Heronian mean aggregation operators, Int. J. Intell. Syst., 35 (2020), 217–249. https://doi.org/10.1002/int.22136 doi: 10.1002/int.22136
    [29] D. Molodtsov, Soft set theory—first results, Comput. Math. Appl., 37 (1999), 19–31. https://doi.org/10.1016/S0898-1221(99)00056-5 doi: 10.1016/S0898-1221(99)00056-5
    [30] P. K. Maji, R. Biswas, A. R. Roy, Soft set theory, Comput. Math. Appl., 45 (2003), 555–562. https://doi.org/10.1016/S0898-1221(03)00016-6 doi: 10.1016/S0898-1221(03)00016-6
    [31] P. K. Maji, R. Biswas, A. R. Roy, Fuzzy soft sets, J. Fuzzy Math., 9 (2001), 589–602.
    [32] P. K. Maji, R. Biswas, A. R. Roy, Intuitionistic fuzzy soft sets, J. Fuzzy Math., 9 (2001), 677–692.
    [33] R. Arora, H. Garg, A robust aggregation operators for multi-criteria decision-making with intuitionistic fuzzy soft set environment, Sci. Iran., 25 (2018), 931–942.
    [34] A. K. Das, FP-intuitionistic multi fuzzy N-soft set and its induced FP-hesitant N soft set in decision-making, Decis. Mak. Appl. Manag. Eng., 5 (2022), 67–89. https://doi.org/10.31181/dmame181221045d doi: 10.31181/dmame181221045d
    [35] Y. Jiang, Y. Tang, Q. Chen, H. Liu, J. Tang, Interval-valued intuitionistic fuzzy soft sets and their properties, Comput. Math. Appl., 60 (2010), 906–918. https://doi.org/10.1016/j.camwa.2010.05.036 doi: 10.1016/j.camwa.2010.05.036
    [36] R. M. Zulqarnain, X. L. Xin, M. Saqlain, W. A. Khan, TOPSIS method based on the correlation coefficient of interval-valued intuitionistic fuzzy soft sets and aggregation operators with their application in decision-making, J. Math., 2021 (2021), 1–16. https://doi.org/10.1155/2021/6656858 doi: 10.1155/2021/6656858
    [37] X. D. Peng, Y. Yang, J. Song, Y. Jiang, Pythagorean fuzzy soft set and its application, Comput. Eng., 41 (2015), 224–229.
    [38] R. M. Zulqarnain, I. Siddique, A. Iampan, D. Baleanu, Aggregation operators for interval-valued Pythagorean fuzzy soft set with their application to solve multi-attribute group decision making problem, CMES-Comput. Model. Eng. Sci., 131 (2022), 1717–1750. https://doi.org/10.32604/cmes.2022.019408 doi: 10.32604/cmes.2022.019408
    [39] F. Smarandache, Extension of soft set to hypersoft set, and then to plithogenic hypersoft set, Neutrosophic Sets Sy., 22 (2018), 168–170.
    [40] A. U. Rahman, M. Saeed, H. A. E. W. Khalifa, W. A. Afifi, Decision making algorithmic techniques based on aggregation operations and similarity measures of possibility intuitionistic fuzzy hypersoft sets, AIMS Math., 7 (2022), 3866–3895. https://doi.org/10.3934/math.2022214 doi: 10.3934/math.2022214
    [41] A. U. Rahman, M. Saeed, S. S. Alodhaibi, H. Abd, Decision making algorithmic approaches based on parameterization of neutrosophic set under hypersoft set environment with fuzzy, intuitionistic fuzzy and neutrosophic settings, CMES-Comput. Model. Eng. Sci., 12 (2021), 743–777. https://doi.org/10.32604/cmes.2021.016736 doi: 10.32604/cmes.2021.016736
    [42] M. Saeed, M. Ahsan, A. U. Rahman, M. H. Saeed, A. Mehmood, An application of neutrosophic hypersoft mapping to diagnose brain tumor and propose appropriate treatment, J. Intell. Fuzzy Syst., 41 (2021), 1677–1699. https://doi.org/10.3233/JIFS-210482 doi: 10.3233/JIFS-210482
    [43] R. M. Zulqarnain, I. Siddique, R. Ali, D. Pamucar, D. Marinkovic, D. Bozanic, Robust aggregation operators for intuitionistic fuzzy hypersoft set with their application to solve MCDM problem, Entropy, 23 (2021), 688. https://doi.org/10.3390/e23060688 doi: 10.3390/e23060688
    [44] R. M. Zulqarnain, X. L. Xin, M. Saeed, A development of Pythagorean fuzzy hypersoft set with basic operations and decision-making approach based on the correlation coefficient, In: Theory and Application of Hypersoft Set, Pons Publishing House Brussels., 2021 (2021), 85–106.
    [45] R. M. Zulqarnain, I. Siddique, R. Ali, F. Jarad, A. Iampan, Aggregation operators for interval-valued Pythagorean fuzzy hypersoft set with their application to solve MCDM problem, CMES-Comput. Model. Eng. Sci., 135 (2022), 619–651. https://doi.org/10.32604/cmes.2022.022767 doi: 10.32604/cmes.2022.022767
    [46] K. Chatterjee, D. Pamucar, E. K. Zavadskas, Evaluating the performance of suppliers based on using the R'AMATELMAIRCA method for green supply chain implementation in electronics industry, J. Clean. Prod., 184 (2018), 101–129. https://doi.org/10.1016/j.jclepro.2018.02.186 doi: 10.1016/j.jclepro.2018.02.186
    [47] Z. Stevic, D. Pamucar, M. Vasiljevic, G. Stojic, S. Korica, Novel integrated multicriteria model for supplier selection: Case study construction company, Symmetry, 9 (2017), 279. https://doi.org/10.3390/sym9110279 doi: 10.3390/sym9110279
    [48] G. Stojic, Z. Stevic, J. Antucheviciene, D. Pamucar, M. Vasiljevic, A novel rough WASPAS approach for supplier selection in a company manufacturing PVC carpentry products, Information, 9 (2018), 121. https://doi.org/10.3390/info9050121 doi: 10.3390/info9050121
    [49] Z. Stevic, D. Pamucar, A. Puska, P. Chatterjee, Sustainable supplier selection in healthcare industries using a new MCDM method: Measurement of alternatives and ranking according to COmpromise solution (MARCOS), Comput. Ind. Eng., 140 (2020), 106231. https://doi.org/10.1016/j.cie.2019.106231 doi: 10.1016/j.cie.2019.106231
    [50] W. Wang, X. Liu, Y. Qin, Interval-valued intuitionistic fuzzy aggregation operators, J. Syst. Eng. Electron., 23 (2012), 574–580. https://doi.org/10.1109/JSEE.2012.00071 doi: 10.1109/JSEE.2012.00071
    [51] Z. Xu, J. Chen, On geometric aggregation over interval-valued intuitionistic fuzzy information, In: Fourth international conference on fuzzy systems and knowledge discovery (FSKD 2007), Haikou, China, 2007,466–471. https://doi.org/10.1109/FSKD.2007.427
    [52] S. Khan, H. F. Ashraf, Analysis of Pakistan's electric power sector, In: Blekinge Institute of Technology, Department of Electrical Engineering, 2015. Available from: https://www.diva-portal.org/smash/get/diva2: 917526/FULLTEXT01.pdf.
    [53] D. Anderson, F. Britt, D. Favre, The seven principles of supply chain management, Supply Chain Manag. Rev., 1 (1997), 21–31.
    [54] X. Y. Deng, Y. Hu, Y. Deng, S. Mahadevan, Supplier selection using AHP methodology extended by D numbers, Expert Syst. Appl., 41 (2014), 156–167. https://doi.org/10.1016/j.eswa.2013.07.018 doi: 10.1016/j.eswa.2013.07.018
    [55] G. W. Dickson, An analysis of vendor selection: Aystems and decisions, J. Purch., 1 (1966), 5–17. https://doi.org/10.1111/j.1745-493X.1966.tb00818.x doi: 10.1111/j.1745-493X.1966.tb00818.x
    [56] Y. Wind, P. E. Green, P. J. Robinson, The determinants of vendor selection: The evaluation function approach, J. Purch., 8 (1968), 29–41. https://doi.org/10.1111/j.1745-493X.1968.tb00592.x doi: 10.1111/j.1745-493X.1968.tb00592.x
    [57] W. Ho, X. Xu, P. K. Dey, Multi-criteria decision making approaches for supplier evaluation and selection: A literature review, Eur. J.. Oper. Res., 202 (2010), 16–24. https://doi.org/10.1016/j.ejor.2009.05.009 doi: 10.1016/j.ejor.2009.05.009
    [58] C. A. Weber, J. R. Current, W. C. Benton, Vendor selection criteria and methods, Eur. J.. Oper. Res., 50 (1991), 2–18. https://doi.org/10.1016/0377-2217(91)90033-R doi: 10.1016/0377-2217(91)90033-R
    [59] A. Amid, S. H. Ghodsypour, C. Brien, A weighted max-min model for fuzzy multiobjective supplier selection in a supply chain, Int. J. Prod. Econ., 131 (2011), 139–145. https://doi.org/10.1016/j.ijpe.2010.04.044 doi: 10.1016/j.ijpe.2010.04.044
    [60] F. Jolai, S. A. Yazdian, K. Shahanaghi, M. A. Khojasteh, Integrating fuzzy TOPSIS and multiperiod goal programming for purchasing multiple products from multiple suppliers, J. Purch. Supply Manag., 17 (2011), 42–53. https://doi.org/10.1016/j.pursup.2010.06.004 doi: 10.1016/j.pursup.2010.06.004
    [61] M. Sevkli, S. C. L. Koh, S. Zaim, M. Demirbag, E. Tatoglu, Hybrid analytical hierarchy process model for supplier selection, Ind. Manage. Data Syst., 108 (2008), 122–142. https://doi.org/10.1108/02635570810844124 doi: 10.1108/02635570810844124
    [62] A. Anastasiadis, S. Konstantinopoulos, G. Kondylis, G. A. Vokas, M. J. Salame, Carbon tax, system marginal price and environmental policies on smart microgrid operation, Manag. Environ. Qual., 29 (2018), 76–88. https://doi.org/10.1108/MEQ-11-2016-0086 doi: 10.1108/MEQ-11-2016-0086
    [63] K. Govindan, R. Sivakumar, Green supplier selection and order allocation in a low-carbon paper industry: Integrated multi-criteria heterogeneous decision-making and multiobjective linear programming approaches, Ann. Oper. Res., 238 (2016), 243–276. https://doi.org/10.1007/s10479-015-2004-4 doi: 10.1007/s10479-015-2004-4
    [64] J. D. Qin, X. W. Liu, W. Pedrycz, An extended TODIM multi-criteria group decision making method for green supplier selection in interval type-2 fuzzy environment, Eur. J. Oper. Res., 258 (2017), 626–638. https://doi.org/10.1016/j.ejor.2016.09.059 doi: 10.1016/j.ejor.2016.09.059
    [65] M. Davood, H. G. Seyed, H. Ashkan, A game theoretic analysis in capacity-constrained supplier selection and cooperation by considering the total supply chain inventory costs, Int. J. Prod. Econ., 181 (2016), 87–97. https://doi.org/10.1016/j.ijpe.2015.11.016 doi: 10.1016/j.ijpe.2015.11.016
    [66] X. Tong, Z. J. Wang, A group decision framework with intuitionistic preference relations and its application to low carbon supplier selection, Int. J. Environ. Res. Pub. He., 13 (2016), 923. https://doi.org/10.3390/ijerph13090923 doi: 10.3390/ijerph13090923
    [67] S. Zeng, X. Peng, T. Baležentis, D. Streimikiene, Prioritization of low-carbon suppliers based on Pythagorean fuzzy group decision making with self-confidence level, Econ. Res.-Ekon. Istraaz., 32 (2019), 1073–1087. https://doi.org/10.1080/1331677X.2019.1615971 doi: 10.1080/1331677X.2019.1615971
  • Reader Comments
  • © 2023 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(2044) PDF downloads(46) Cited by(6)

Figures and Tables

Figures(4)  /  Tables(11)

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog