Sustainable supplier selection (SSS) is recognized as a prime aim in supply chain because of its impression on profitability, adorability, and agility of the organization. This work introduces a multi-phase intuitionistic fuzzy preference-based model with which decision experts are authorized to choose the suitable supplier using the sustainability "triple bottom line (TBL)" attributes. To solve this issue, an intuitionistic fuzzy gained and lost dominance score (IF-GLDS) approach is proposed using the developed IF-entropy. To make better use of experts' knowledge and fully represent the uncertain information, the evaluations of SSS are characterized in the form of intuitionistic fuzzy set (IFS). To better distinguish fuzziness of IFSs, new entropy for assessing criteria weights is proposed with the help of an improved score function. By considering the developed entropy and improved score function, a weight-determining process for considered criterion is presented. A case study concerning the iron and steel industry in India for assessing and ranking the SSS is taken to demonstrate the practicability of the developed model. The efficacy of the developed model is certified with the comparison by diverse extant models.
Citation: Ibrahim M. Hezam, Pratibha Rani, Arunodaya Raj Mishra, Ahmad Alshamrani. An intuitionistic fuzzy entropy-based gained and lost dominance score decision-making method to select and assess sustainable supplier selection[J]. AIMS Mathematics, 2023, 8(5): 12009-12039. doi: 10.3934/math.2023606
[1] | Raweerote Suparatulatorn, Wongthawat Liawrungrueang, Thanasak Mouktonglang, Watcharaporn Cholamjiak . An algorithm for variational inclusion problems including quasi-nonexpansive mappings with applications in osteoporosis prediction. AIMS Mathematics, 2025, 10(2): 2541-2561. doi: 10.3934/math.2025118 |
[2] | Salman khan, Muhammad Naeem, Muhammad Qiyas . Deep intelligent predictive model for the identification of diabetes. AIMS Mathematics, 2023, 8(7): 16446-16462. doi: 10.3934/math.2023840 |
[3] | Federico Divina, Miguel García-Torres, Francisco Gómez-Vela, Domingo S. Rodriguez-Baena . A stacking ensemble learning for Iberian pigs activity prediction: a time series forecasting approach. AIMS Mathematics, 2024, 9(5): 13358-13384. doi: 10.3934/math.2024652 |
[4] | Hend Khalid Alkahtani, Nuha Alruwais, Asma Alshuhail, Nadhem NEMRI, Achraf Ben Miled, Ahmed Mahmud . Election-based optimization algorithm with deep learning-enabled false data injection attack detection in cyber-physical systems. AIMS Mathematics, 2024, 9(6): 15076-15096. doi: 10.3934/math.2024731 |
[5] | Turki Althaqafi . Mathematical modeling of a Hybrid Mutated Tunicate Swarm Algorithm for Feature Selection and Global Optimization. AIMS Mathematics, 2024, 9(9): 24336-24358. doi: 10.3934/math.20241184 |
[6] | Olfa Hrizi, Karim Gasmi, Abdulrahman Alyami, Adel Alkhalil, Ibrahim Alrashdi, Ali Alqazzaz, Lassaad Ben Ammar, Manel Mrabet, Alameen E.M. Abdalrahman, Samia Yahyaoui . Federated and ensemble learning framework with optimized feature selection for heart disease detection. AIMS Mathematics, 2025, 10(3): 7290-7318. doi: 10.3934/math.2025334 |
[7] | Mohammed Abdul Kader, Muhammad Ahsan Ullah, Md Saiful Islam, Fermín Ferriol Sánchez, Md Abdus Samad, Imran Ashraf . A real-time air-writing model to recognize Bengali characters. AIMS Mathematics, 2024, 9(3): 6668-6698. doi: 10.3934/math.2024325 |
[8] | Jiawen Ye, Lei Dai, Haiying Wang . Enhancing sewage flow prediction using an integrated improved SSA-CNN-Transformer-BiLSTM model. AIMS Mathematics, 2024, 9(10): 26916-26950. doi: 10.3934/math.20241310 |
[9] | Senyuan Yang, Bo Yu, Jianxin Pan, Wuliang Yin, Hua Wang, Kai Yang, Qingtai Xiao . Application of a hybrid nonlinear algorithm driven by machine learning and feature importance identification for temperature control prediction of the bath smelting process. AIMS Mathematics, 2025, 10(6): 13104-13129. doi: 10.3934/math.2025588 |
[10] | Bao Ma, Yanrong Ma, Jun Ma . Adaptive robust AdaBoost-based kernel-free quadratic surface support vector machine with Universum data. AIMS Mathematics, 2025, 10(4): 8036-8065. doi: 10.3934/math.2025369 |
Sustainable supplier selection (SSS) is recognized as a prime aim in supply chain because of its impression on profitability, adorability, and agility of the organization. This work introduces a multi-phase intuitionistic fuzzy preference-based model with which decision experts are authorized to choose the suitable supplier using the sustainability "triple bottom line (TBL)" attributes. To solve this issue, an intuitionistic fuzzy gained and lost dominance score (IF-GLDS) approach is proposed using the developed IF-entropy. To make better use of experts' knowledge and fully represent the uncertain information, the evaluations of SSS are characterized in the form of intuitionistic fuzzy set (IFS). To better distinguish fuzziness of IFSs, new entropy for assessing criteria weights is proposed with the help of an improved score function. By considering the developed entropy and improved score function, a weight-determining process for considered criterion is presented. A case study concerning the iron and steel industry in India for assessing and ranking the SSS is taken to demonstrate the practicability of the developed model. The efficacy of the developed model is certified with the comparison by diverse extant models.
Error-correcting codes have been a widely studied topic for the past six decades. Among all linear codes, cyclic codes have received significant attention. Boucher et al. [9] generalized the concept of cyclic codes over finite fields to skew cyclic codes. Siap et al. [25] extended their results to skew cyclic codes of arbitrary length. For the last twenty years, scholars have focused on error-correcting codes over finite rings.
There exist a host of studies on skew cyclic codes and double skew cyclic codes over finite commutative rings. Boucher et al. [10] and Jitman et al. [17] considered skew constacyclic codes over Galois rings and finite chain rings, respectively. Abualrub et al. [1] built θ-cyclic codes over F2+vF2. Gao [13] investigated the algebraic structure of skew cyclic codes over Fp+vFp. Gursoy et al. [15] accomplished the construction of skew cyclic codes over Fq+vFq. The algebraic properties of skew cyclic codes over the finite semi-local ring Fpm+vFpm were studied by M. Ashraf [3]. Shi et al. [22,23] established skew cyclic codes over Fq+vFq+v2Fq and Fq+vFq+⋯+vm−1Fq. Bagheri et al. [6] studied skew cyclic codes of length ps over Fpm+uFpm and obtained some torsion codes of skew cyclic codes. Shi et al. [24] proved the structure of skew cyclic codes over a finite non-chain ring. Recently, Prakash [21] studied the structure of skew cyclic codes over Fq[u,v,w]/⟨u2−1,v2−1,w2−1,uv−vu,vw−wv,wu−uw⟩. Gao et al. [14] studied weight distribution of double cyclic codes over Galois rings. Aydogdu et al. [4] characterized the algebraic structure of double skew cyclic codes over Fq.
Since Wood [26] proved that the finite Frobenius rings can serve as the alphabets of coding theory, many papers on cyclic codes over matrix rings have been published (see [2,7,11,16,18,19,20]). However, there are few papers investigating skew and double skew cyclic codes over matrix rings. In this study, we use the F4-cyclic algebra given in [5] to build the algebraic structure of skew cyclic codes over M2(F2). Additionally, we discuss the dual codes of skew cyclic codes and double skew cyclic codes over M2(F2).
This article is organized as follows: Section 2 provides some basic facts, and considers the algebraic structure of skew cyclic codes over M2(F2). We prove that a skew cyclic code C with a polynomial of minimum degree d(x) is a free submodule generated by d(x). We discuss Euclidean and Hermitian dual codes of θ-cyclic codes in Section 3. In Section 4, the spanning sets of double skew cyclic codes over M2(F2) are obtained, and Section 5 concludes this paper.
Let R be a finite ring with identity 1≠0. A left (resp. right) R-module M is denoted by RM (resp. MR). The socle of a module M is defined as the sum of its minimal submodules, denoted by Soc(M). The ring R is called a Frobenius ring if Soc(RR) (resp. Soc(RR)) is a principal left (resp. right) ideal. The ring R is called a local ring if R has a unique left (resp. right) maximal ideal (or equivalently, if R/rad(R) is a division ring). A ring R is called a left (resp. right) chain ring if the set of all left (resp. right) ideals of R is linearly ordered under the set inclusion. Lemma 2.1 describes the equivalence conditions between chain rings, principal ideal rings and local rings (cf. [12,Theorem 2.1]).
Lemma 2.1. For any finite ring R, the following conditions are equivalent:
(i) R is a local principal ideal ring;
(ii) R is a local ring and the unique maximal ideal M of R is principal;
(iii) R is a chain ring whose ideal are ⟨ri⟩, 0≤i≤N(r), where N(r) is the nilpotency index of r.
Moreover, if R is a finite chain ring with the unique maximal ideal ⟨r⟩ and the nilpotency index of r is z, then the cardinality of ⟨ri⟩ is |R/⟨r⟩|z−i for i=0,1,⋯,z−1.
We denote the 2×2 matrix ring over finite field F2 by M2(F2). By [5], we have M2(F2) is isomorphic to the F4-cyclic algebra R=F4⊕eF4 with e2=1 under the map δ,
δ:(0110)↦e,δ:(0111)↦ω, |
where F4=F2[ω] and ω2+ω+1=0. Note that (e+1)2=0, then e+1 is a nilpotent element of order 2. The multiplication in R is given by re=eσ(r) for any r∈R, where σ(r)=r2 is the Frobenius map on F4 and the addition is usual.
The set of the unit elements of R is {1,ω,1+ω,e,eω,e(1+ω)}. It is easy to know that the ring R has the unique maximal ideal ⟨e+1⟩. Since the n×n matrix ring Mn(R) over a Frobenius ring R is also Frobenius, then R is a finite local Frobenius ring.
Define a map θ:R→R by θ(a+eb)=σ(a)+eσ(b), a,b∈F4. One can verify that θ is an automorphism of R with order 2. The set F4,θ={0,1,e,1+e} is the fixed commutative subring of R by θ. Define the skew polynomial ring
R[x,θ]={rnxn+rn−1xn−1+⋯+r1x+r0|ri∈R,n∈N} |
with the usual polynomial addition, and the multiplication is defined by the rule r1xi⋅r2xj=r1θi(r2)xi+j, i,j∈N. Then for every a+eb∈R,
xi(a+eb)={(a+eb)xi,if i is even,(a2+eb2)xi,if i is odd. |
Note that R[x,θ] is non-commutative for multiplication, therefore, the submodules we discussed in this paper are always left. It should be noted also that R[x,θ] is not a unique factorization ring, for instance, x2=x⋅x=ex⋅ex, x3=x⋅x⋅x=x⋅ex⋅ex. In addition, the right division can be defined.
Lemma 2.2. Let f(x), g(x)∈R[x,θ], where the leading coefficient of g(x) is invertible. Then there exist unique q(x), r(x)∈R[x,θ] such that
f(x)=q(x)g(x)+r(x), |
where r(x)=0 or deg(r(x))<deg(g(x)). The polynomials q(x) and r(x) are called the right quotient and right remainder, respectively. The polynomial g(x) is called a right divisor of f(x) if g(x)|f(x).
Proof. The proof is similar to that of Lemma 2.3 of [13].
Proposition 2.3. The center Z(R[x,θ]) of R[x,θ] is F4,θ[x2].
Proof. This proof is similar to that of [13,Theorem 1]. We give the proof briefly. Since |⟨θ⟩|=2, then x2i⋅r=(θ2)i(r)x2i=rx2i with any r∈R. Thus x2i∈Z(R[x,θ]). It implies that f(x)=∑sj=0rjx2j∈Z(R[x,θ]), where rj∈F4,θ. Conversely, for any fz∈Z(R[x,θ]) and r∈R, if rfz=fzr and xfz=fzx, then the coefficients of fz are all in F4,θ and fz∈R[x2,θ]. Therefore fz∈F4,θ[x2].
Corollary 2.4. We have that xn+1∈Z(R[x,θ]) if and only if n is even.
Let Rn be the set of all n-tuples over R. Then a code C of length n over R is a nonempty subset of Rn. If C is a left (resp. right) R-submodule of Rn, then C is called a left (resp. right) linear code of length n over R. Every element c=(c0,c1,⋯,cn−1) in C is called a codeword.
Define the Gray map φ(a+eb)=(b,a+b) from R to F24 following the method in [8]. This map φ is a linear bijection and can be extended to a map from Rn onto F2n4 by concatenating the images of each component. For any element a+eb∈R, Lee weight of a+eb is defined as
wL(a+eb)=wHam(b)+wHam(a+b), |
where wHam(∗) stands for Hamming weight over finite fields. If x=(x0,x1,⋯,xn−1)∈Rn, then Lee weight of x is defined as
wL(x)=wL(x0)+wL(x1)+⋯+wL(xn−1). |
If C is a linear code of length n over R, then Hamming and Lee distance of C are defined as dHam=min{wHam(x)|x∈C} and dL=min{wL(x)|x∈C}, respectively. Analogously to [19,Theorem 7], we get the following result. It is a proposition of the image of the linear code C over R under the Gray map φ.
Proposition 2.5. Let C be a linear code over R of length n with size M and minimum Lee distance dL. Then φ(C) is a linear code over F4 of length 2n with size M and minimum Hamming distance dHam.
We discuss the algebraic structure of skew cyclic codes over R below. Let n be a positive integer. The set Rn=R[x,θ]/⟨xn−1⟩ is a ring if n is even. When n is odd, the set Rn is a left R[x,θ]-module under the multiplication defined by
f1(x)(f2(x)+(xn−1))=f1(x)f2(x)+(xn−1). |
Denote by T the standard shift operator on a linear code C, i.e., T(c)=(cn−1,c0,⋯,cn−2) for any codeword c=(c0,c1,⋯,cn−1)∈C. A linear code C over R is cyclic if any cyclic shift of a codeword c∈C is also a codeword, i.e., T(c)∈C. A linear code over R is called quasi-cyclic of index ℓ (or ℓ-quasi-cyclic) if and only if it is invariant under Tℓ. If ℓ=1, then it is a cyclic code. A linear code C of length n is called a skew cyclic code if and only if
θ(c)=(θ(cn−1),θ(c0),⋯,θ(cn−2))∈C, |
for any codeword c=(c0,c1,⋯,cn−1)∈C.
In a set of polynomials, a polynomial is called the polynomial of minimum degree if and only if it is not a polynomial of lower degree by removing any of its terms. Let d(x)=xn−m+∑n−m−1i=0dixi be a monic right divisor of xn−1. Then a m×n generator matrix G of the skew cyclic code C=⟨d(x)⟩ is given by
G=(d0d1⋯dn−m−110⋯000θ(d0)⋯θ(dn−m−2)θ(dn−m−1)1⋯0000⋯θ2(dn−m−3)θ2(dn−m−2)θ2(dn−m−1)⋯00⋮⋮⋯⋮⋮⋮⋯⋮⋮00⋯θm−2(d0)θm−2(d1)θm−2(d3)⋯1000⋯0θm−1(d0)θm−1(d1)⋯θm−1(dn−m−1)1). |
Proposition 2.6 shows that skew cyclic codes with a polynomial of minimum degree over R are free codes. Proposition 2.9 gives a sufficient and necessary condition for a skew cyclic code over R to become a cyclic code. Propositions 2.7 and 2.8 describe the relationship between skew cyclic codes of length n and cyclic codes, quasi-cyclic codes, respectively.
Proposition 2.6. Let n be a positive integer and C be a skew cyclic code of length n over R with a polynomial of minimum degree d(x), where the leading coefficient of d(x) is a unit. Then C is a free R[x,θ]-submodule of Rn such that C=⟨d(x)⟩, where d(x) is a right divisor of xn−1. Moreover, the code C has a basis B={d(x),xd(x),⋯,xn−deg(d(x))−1d(x)} and the number of codewords in C is |R|n−deg(d(x)).
Proof. By Lemma 2.2, any polynomial in C is divisible by d(x). It implies that d(x)|xn−1 and C=⟨d(x)⟩. For the second statement, let xn−1=q(x)d(x) for some q(x)∈R[x,θ]. Since the leading coefficient of d(x) is a unit, then the leading coefficient of q(x) is also invertible. Let m be the degree of q(x), then the degree of d(x) is n−m. Let q(x)=∑mi=0qixi, where qm is invertible. Therefore ∑mi=0qixid(x)=0 in Rn. It follows that xjd(x) with j≥m can be linearly presented by the elements of the set B={d(x),xd(x),⋯,xm−1d(x)}.
Let ∑m−1i=0ai⋅xid(x)=0, where ai∈R, i=0,1,⋯,m−1. Thus a(x)d(x)=0, where a(x)=∑m−1i=0aixi. The polynomial a(x)d(x) can be represented to a(x)d(x)=ζ(x)(xn−1) for some ζ(x)∈R[x,θ]. The degree of a(x)d(x) is n−1, while the degree of ζ(x)(xn−1) is greater than or equal to n if ζ(x)≠0. This is a contradiction. Therefore, we have ζ(x)=a(x)=0, i.e. ai=0 for i=0,1,⋯,m−1. The set B={d(x),xd(x),⋯,xm−1d(x)} is R-linearly independent. Consequently B is a basis of C and |C|=|R|n−deg(d(x)). This completes the proof.
Proposition 2.7. If C is a skew cyclic code of odd length over R, then C is a cyclic code over R.
Proof. Let n be odd and C be a skew cyclic code of length n over R. There exist two integers s,t such that 2s+nt=1. Thus, we have 2s=1−nt. If c(x)=∑n−1i=0cixi is any codeword in C, then
x2sc(x)=x1−ntc(x)=n−1∑i=0cixi+1−nt. |
Since xn=1, then
x2sc(x)=n−1∑i=0xi+1=xc(x)∈C. |
It follows that (cn−1,c0,⋯,cn−2)∈C for any codeword (c0,c1,⋯,cn−1) in C.
Proposition 2.8. If C is a skew cyclic code of even length over R, then C is a quasi-cyclic code of index 2.
Proof. Let C be a skew cyclic code of length 2t over R and c=(c0,0,c0,1,c1,0,⋯,ct−1,0,ct−1,1)∈C. Since θ(c)∈C and θ2=1, it follows that θ2(c)=(ct−1,0,ct−1,1,c0,0,c0,1,⋯,ct−2,0,ct−2,1)∈C. By the definition of quasi-cyclic codes, the code C is a 2-quasi-cyclic code of length 2t.
Proposition 2.9. Let C be a skew cyclic code generated by d(x) of even length n over R, where d(x) is a monic right divisor of xn−1. Then C is a cyclic code over R if and only if d(x) is fixed by θ.
Proof. Let d(x)=xl+dl−1xl−1+⋯+d1x+d0, where θ(di)=di, i=0,1,2,⋯,l−1. Then xd(x)=d(x)x∈C. It follows that the code C=⟨d(x)⟩ is cyclic over R.
Conversely, if C is a cyclic code of even length n over R, then C is a left ideal of Rn and an ideal of R[x]/⟨xn−1⟩. Therefore, d(x)x is a codeword in C. Since C is linear, we have d(x)x−xd(x)∈C. It implies that ∑l−1i=0(di−θ(di))xi+1 is a left multiple of d(x) such that d(x)x−xd(x)=rd(x) with r∈R. Note that the constant term of d(x)x−xd(x) is 0, then d(x)x−xd(x) must be 0. It shows that θ(di)=di, i=0,1,⋯,l−1. The proof is done.
Example 2.10. There are two examples:
(1) Let C be a skew cyclic code of length 4 over R generated by the following matrix,
(ee+1100ee+11). |
The generated polynomial of C is d(x)=x2+(e+1)x+e. Note that d(x) is a commutative right divisor of x4−1, and all coefficients of d(x) are fixed by θ. By Proposition 2.9, the code C is cyclic.
(2) Let C1 be a skew cyclic code of length 4 generated by the following matrix,
(ω1000ω+11000ω1). |
The generated polynomial of C1 is d1(x)=x+ω, and it is a right divisor of x4−1. The coefficients of d1(x) are not all fixed by θ. By Propositions 2.8 and 2.9, the code C1 is not cyclic but 2-quasi-cyclic.
This section investigates the dual codes of skew cyclic codes over the ring R. For any x=(x0,x1,⋯,xn−1) and y=(y0,y1,⋯,yn−1)∈Rn, the Euclidean inner product on Rn is defined by ⟨x,y⟩=∑n−1i=0xiyi. If the order of the automorphism θ is 2, then the Hermitian inner product of any x,y∈Rn is defined by ⟨x,y⟩H=∑n−1i=0xiθ(yi).
The elements x,y∈Rn are called Euclidean or Hermitian orthogonal if ⟨x,y⟩=0 or ⟨x,y⟩H=0, respectively. Let C be a skew cyclic code over R. Then its Euclidean dual code C⊥ is defined as C⊥={y∈Rn|⟨y,x⟩=0 for all x∈C }. The Hermitian dual code C⊥H of C is defined as C⊥H={z∈Rn|⟨z,x⟩H=0 for all x∈C }. A code C is called Euclidean or Hermitian self-dual if C=C⊥ or C=C⊥H, respectively.
Jitman et al. [17] described the algebraic structure of skew constacyclic codes over finite chain rings, and provided the generators of Euclidean and Hermitian dual codes of such codes. The ring R=F4⊕eF4 can be alternatively represented as F4⊕uF4 with u2=(e+1)2=0. This indicates that R is a finite chain ring under the change of basis.
In this section, Proposition 3.2 delineates a sufficient and necessary condition for Hermitian dual code of a skew cyclic code with length n over R. Proposition 3.3 is the self-dual skew condition of Hermitian dual code. Propositions 3.2 and 3.3 can be seen as corollaries of Theorems 3.7 and 3.8 of [17], respectively. The main work of this section is to depict the structure of Euclidean dual codes of skew cyclic codes over R. Proposition 3.6 illustrates that the Euclidean dual codes of skew cyclic codes of even length generated by a monic polynomial over R are also free and gives their generator polynomials.
By Lemmas 3.1 and 3.5 of [17], we acquire the following statement.
Lemma 3.1. Let C be a linear code of length n over R.
(i) For any integer n, the code C is a skew cyclic code if and only if C⊥ is skew cyclic.
(ii) For even integer n, the code C is a skew cyclic code if and only if C⊥H is skew cyclic.
From [17], the ring automorphism ρ on R[x,θ] is given as
ρ(t∑i=0rixi)=t∑i=0θ(ri)xi. |
By Theorems 3.7 and 3.8 of [17], we have the following results.
Proposition 3.2. Let n be even. If d(x) is a monic right divisor of xn−1 and ˆd(x)=xn−1d(x), then C is a free skew cyclic code generated by d(x) if and only if C⊥H is a skew cyclic code generated by
d⊥(x)=ρ(xdeg(ˆd(x))ϕ(ˆd(x))), |
where ϕ:R[x,θ]→R[x,θ]S−1 is the anti-monomorphism of rings defined by
ϕ(t∑i=0rixi)=t∑i=0x−iri |
with S={xi|i∈N}.
Proposition 3.3. Let n=2k. If d(x)=xk+∑k−1i=0dixi is a right divisor of xn−1, then the skew cyclic code C=⟨d(x)⟩ is a Hermitian self-dual code if and only if
(xk+k−1∑i=0dixi)(θ−k−1(d−10))+k−1∑i=1θi−k−1((d−10dk−i)xi+xk)=xn−1. |
This is called the self-dual skew condition.
Next, we discuss the algebraic properties of Euclidean dual codes of skew cyclic codes over R.
Lemma 3.4. Let d(x),q(x)∈R[x,θ], where the leading coefficient of q(x) is a unit. If d(x)q(x)∈Z(R[x,θ]) is a monic polynomial, then d(x)q(x)=q(x)d(x).
Proof. It is easy to prove by q(x)(d(x)q(x))=(d(x)q(x))q(x) and Lemma 2.2.
Lemma 3.5. Let n be even and xn−1=q(x)d(x), where the leading coefficient of q(x) is a unit. If C=⟨d(x)⟩ is a skew cyclic code of length n over R, then c(x)∈Rn is in C if and only if c(x)q(x)=0 in Rn.
Proof. Let c(x)∈C. Then c(x)=r(x)d(x) for some r(x)∈R[x,θ]. Since xn−1=q(x)d(x)∈Z(R[x,θ]), we have q(x)d(x)=d(x)q(x). Hence c(x)q(x)=r(x)d(x)q(x)=r(x)q(x)d(x)=0 in Rn.
Conversely, if c(x)q(x)=0 in Rn for some c(x)∈R[x,θ], then there exists r(x)∈R[x,θ] such that c(x)q(x)=r(x)(xn−1)=r(x)q(x)d(x)=r(x)d(x)q(x), i.e., c(x)=r(x)d(x)∈C.
Proposition 3.6. Let C=⟨d(x)⟩ be a skew cyclic code of even length n over R, where d(x) is a monic right divisor of xn−1. Let xn−1=q(x)d(x), q(x)=xm+∑m−1j=0qjxj and d(x)=xn−m+∑n−m−1i=0dixi. Then C⊥ is generated by the polynomial q∗(x)=1+∑mi=0θi(qm−i)xi.
Proof. Let c(x)=∑n−1i=0cixi be a codeword in C. Then c(x)q(x)=0 in Rn by Lemma 3.5. The coefficients of xm,xm+1,⋯,xn−1 are all zeros in c(x)q(x). Therefore, we have
c0+c1θ(qm−1)+c2θ2(qm−2)+⋯cmθm(q0)=0,c1+c2θ2(qm−1)+c3θ3(qm−2)+⋯cm+1θm+1(q0)=0,c2+c3θ3(qm−1)+c4θ4(qm−2)+⋯cm+2θm+2(q0)=0,⋮cn−m−1+cn−mθn−m(qm−1)+cn−m−1θn−m(qm−2)+⋯cn−1θn−1(q0)=0. |
We set
Q∗=(1θ(qm−1)θ2(qm−2)…θm−1(q1)θm(q0)…001θ2(qm−1)…θm−1(q2)θm(q1)…0001…θm−1(q3)θm(q2)…0⋮⋮⋮⋮⋮⋮⋮⋮000…1θn−m(qm−1)…θn−1(q0)). |
It is easy to know that each row vector of Q∗ is orthogonal to every codeword in C. Thus, all the row vectors of Q∗ are in C⊥. Since C is a Frobenius ring and deg(d(x))=n−m, then |C||C⊥|=|R|n, |C|=|R|m and |C⊥|=|R|n−m. Note that the rows of Q∗ are linearly independent. Consequently, the cardinality of the row spanning of Q∗ is |R|n−m. It follows that Q∗ is a generator matrix of C⊥. Observe that Q∗ is a circular matrix, then the corresponding polynomial q∗(x)=1+∑mi=0θi(qm−i)xi is a generator polynomial of C⊥. The proof is done.
Example 3.7. Let C1=⟨d1(x)⟩ be a skew cyclic code of length 4 over R. With the same notation as in Example 2.10, by Proposition 3.6, we have that the generated polynomial of dual code C⊥1 of C1 is q∗1(x)=ωx3+x2+ωx. The generated matrix of C⊥1 is
(0ω1ω). |
Both double cyclic codes and double skew cyclic codes are good linear codes because of their specific closure properties under the standard shift and addition operations. Double cyclic codes can be extended to double skew cyclic codes. We investigate double skew cyclic codes over R in this section.
A code C of length n is called double skew linear code if any codeword in C is partitioned into two blocks of lengths n1 and n2 such that the set of the first blocks of n1 symbols and the set of second blocks of n2 symbols form skew linear codes of lengths n1 and n2 over R, respectively.
For any r∈R and c=(u0,u1,⋯,un1−1,v0,v1,⋯,vn2−1)∈Rn1+n2, we define
rc=(ru0,ru1,⋯,run1−1,rv0,rv1,⋯,rvn2−1). |
It implies that Rn1+n2 is an R-module under the multiplication and a double skew linear code is an R-submodule of Rn1+n2.
A double linear code C of length n=n1+n2 over R is called double cyclic code if
(u0,u1,⋯,un1−1,v0,v1,⋯,vn2−1)∈C |
implies
(un1−1,u0,⋯,un1−2,vn2−1,v0,⋯,vn2−2)∈C. |
A double skew linear code C of length n1+n2 over R is called a double skew cyclic code if and only if
(θ(un1−1),θ(u0),⋯,θ(un1−2),θ(vn2−1),θ(v0),⋯,θ(vn2−2))∈C |
for any codeword
c=(u0,u1,⋯,un1−1,v0,v1,⋯,vn2−1)∈C. |
We denote the codeword c=(u0,u1,⋯,un1−1,v0,v1,⋯,vn2−1)∈C by c(x)=(c1(x)|c2(x)), where
c1(x)=n1−1∑i=0uixi∈R[x,θ]/⟨xn1−1⟩ |
and
c2(x)=n2−1∑j=0vjxj∈R[x,θ]/⟨xn2−1⟩. |
It gives a bijection between Rn1+n2 and Rn1,n2=R[x,θ]/⟨xn1−1⟩×R[x,θ]/⟨xn2−1⟩. Define the multiplication of any r(x)∈R[x,θ] and (c1(x)|c2(x))∈Rn1,n2 as
r(x)(c1(x)|c2(x))=(r(x)c1(x)|r(x)c2(x)). |
Under the multiplication, we have that Rn1,n2 is a left R[x,θ]-module. If c(x)=(c1(x)|c2(x)) is a codeword in C, then xc(x) is the standard skew cyclic shift of c.
Propositions 4.1 to 4.3 depict the structural properties of double skew cyclic codes of length n1+n2 over R.
Proposition 4.1. A code C is a double skew cyclic code over R if and only if C is a R[x,θ]-submodule of Rn1,n2.
Proof. Let C be a double skew cyclic code and c=(c1(x)|c2(x))∈C. Notice that xc(x)∈C and C is linear, then r(x)c(x)∈C for any r(x)∈R[x,θ]. Therefore C is a left R[x,θ]-submodule of the left module Rn1,n2. The converse is trivial.
Proposition 4.2. A double skew cyclic code of length n1+n2 is a double cyclic code if n1 and n2 are both odd.
Proof. The proof follows by Proposition 2.7.
Proposition 4.3. Let xn1−1=q1(x)d1(x) and xn2−1=q2(x)d2(x), where d1(x) and d2(x) are two monic polynomials. If C1=⟨d1(x)⟩ and C2=⟨d2(x)⟩ are two free skew cyclic codes of length n1 and n2 over R, respectively, then the code C generated by d(x)=(d1(x)|d2(x)) is a double skew cyclic code. Furthermore, A={d(x),xd(x),⋯,xl−1d(x)} is a spanning set of C, where l=deg(q(x)) and q(x)=lcm{q1(x),q2(x)}=∑li=0qixi.
Proof. By the definition of double skew cyclic codes, it is clear that C=⟨d(x)⟩ is a double skew cyclic code. The first statement follows. For the second statement, since q(x) is the least common multiple of q1(x) and q2(x), we have q(x)d(x)=q(x)(d1(x)|d2(x))=0 and xjd(x) with j≥l can be linearly represented by the elements of the set A={d(x),xd(x),⋯,xl−1d(x)}. Now let c(x)∈C be any non-zero codeword in C. Then c(x)=a(x)d(x) for some a(x)∈R[x,θ]. If deg(a(x))≥l, then a(x)=p(x)q(x)+r(x) by Lemma 2.2, where r(x)=0 or deg(r(x))<deg(q(x)). It follows that c(x)=a(x)d(x)=r(x)d(x). Since r(x)=0 or deg(r(x))≤l−1, then any non-zero codeword in C is a linear combination of the elements in A. The proof is done.
In this paper, we examine the structure of skew cyclic codes over M2(F2). All skew cyclic codes of length n over M2(F2) can be identified as left R[x,θ]-submodules of left module Rn=R[x,θ]/⟨xn−1⟩. Our results show that a skew cyclic code C with a polynomial of minimum degree d(x) is a free submodule ⟨d(x)⟩. We prove that a skew cyclic code of odd or even length over M2(F2) is a cyclic or 2-quasi-cyclic code. We give the self-dual skew condition of the Hermitian dual code and the generator of Euclidean dual code of a skew cyclic code, respectively. Furthermore, a spanning set of a double skew cyclic code over M2(F2) is obtained.
The authors declare they have not used Artificial Intelligence (AI) tools in the creation of this article.
This work was supported by the Natural Science Foundation of Shandong Province, China (Grant number ZR2019BA011) and by the National Natural Science Foundation of China (Grant number 11401285).
The authors declare no conflicts of interest.
[1] |
A. Memari, A. Dargi, M. R. Akbari, J. R. Ahmad, A. R. Abdul Rahim, Sustainable supplier selection: A multi-criteria intuitionistic fuzzy TOPSIS method, J. Manuf. Syst., 50 (2019), 9–24. http://doi.org/10.1016/j.jmsy.2018.11.002 doi: 10.1016/j.jmsy.2018.11.002
![]() |
[2] |
S. Hendiani, M. Bagherpour, Development of sustainability index using Z-numbers: A new possibilistic hierarchical model in the context of Z-information, Environ. Dev. Sustain., 22 (2019), 6077–6109. http://doi.org/10.1007/s10668-019-00464-8 doi: 10.1007/s10668-019-00464-8
![]() |
[3] |
R. Alikhani, S. A. Torabi, N. Altay, Strategic supplier selection under sustainability and risk criteria, Int. J. Prod. Econ., 208 (2019), 69–82. http://doi.org/10.1016/j.ijpe.2018.11.018 doi: 10.1016/j.ijpe.2018.11.018
![]() |
[4] |
Z. Xu, J. D. Qin, J. Liu, L. Martínez, Sustainable supplier selection based on AHPSort Ⅱ in interval type-2 fuzzy environment, Inf. Sci., 483 (2019), 273–293. http://doi.org/10.1016/j.ins.2019.01.013 doi: 10.1016/j.ins.2019.01.013
![]() |
[5] |
A. Kumar, V. Jain, S. Kumar, A comprehensive environment friendly approach for supplier selection, Omega, 42 (2014), 109–123. http://doi.org/10.1016/j.omega.2013.04.003 doi: 10.1016/j.omega.2013.04.003
![]() |
[6] |
C. X. Yu, Y. F. Shao, K. Wang, L. P. Zhang, A group decision making sustainable supplier selection approach using extended TOPSIS under interval-valued Pythagorean fuzzy environment, Expert Syst. Appl., 121 (2019), 1–17. http://doi.org/10.1016/j.eswa.2018.12.010 doi: 10.1016/j.eswa.2018.12.010
![]() |
[7] |
X. G. Xu, H. Shi, L. J. Zhang, H. C. Liu, Green supplier evaluation and selection with an extended MABAC method under the heterogeneous information environment, Sustainability, 11 (2019), 6616. https://doi.org/10.3390/su11236616 doi: 10.3390/su11236616
![]() |
[8] |
J. Rezaei, Best-worst multi-criteria decision-making method, Omega, 53 (2015), 49–57. http://doi.org/10.1016/j.omega.2014.11.009 doi: 10.1016/j.omega.2014.11.009
![]() |
[9] |
M. Keshavarz-Ghorabaee, M. Amiri, E. K. Zavadskas, Z. Turskis, J. Antucheviciene, Determination of objective weights using a new method based on the removal effects of criteria (MEREC), Symmetry, 13 (2021), 525. https://doi.org/10.3390/sym13040525 doi: 10.3390/sym13040525
![]() |
[10] |
H. C. Liao, Z. S. Xu, E. Herrera-Viedma, F. Herrera, Hesitant fuzzy linguistic term set and its application in decision making: A state-of-the art survey, Int. J. Fuzzy Syst., 20 (2018), 2084–2110. https://doi.org/10.1007/s40815-017-0432-9 doi: 10.1007/s40815-017-0432-9
![]() |
[11] |
S. Opricovic, G. H. Tzeng, Compromise solution by MCDM methods: A comparative analysis of VIKOR and TOPSIS, Eur. J. Oper. Res., 156 (2004), 445–455. https://doi.org/10.1016/S0377-2217(03)00020-1 doi: 10.1016/S0377-2217(03)00020-1
![]() |
[12] |
X. L. Wu, H. C. Liao, Z. S. Xu, A. Hafezalkotob, F. Herrera, Probabilistic linguistic MULTIMOORA: A multi-attributes decision making method based on the probabilistic linguistic expectation function and the improved Borda rule, IEEE Trans. Fuzzy Syst., 26 (2018), 3688–3702. http://doi.org/10.1109/TFUZZ.2018.2843330 doi: 10.1109/TFUZZ.2018.2843330
![]() |
[13] |
X. Wu, H. C. Liao, A consensus-based probabilistic linguistic gained and lost dominance score method, Eur. J. Oper. Res., 272 (2019), 1017–1027. https://doi.org/10.1016/j.ejor.2018.07.044 doi: 10.1016/j.ejor.2018.07.044
![]() |
[14] | A. R. Mishra, Intuitionistic fuzzy information measures with application in rating of township development, Iran. J. Fuzzy Syst., 13 (2016), 49–70. |
[15] | A. R. Mishra, P. Rani, D. Jain, Information measures based TOPSIS method for multicriteria decision making problem in intuitionistic fuzzy environment, Iran. J. Fuzzy Syst., 14 (2017), 41–63. |
[16] |
A. R. Mishra, P. Rani, Shapley divergence measures with VIKOR method for multi-attribute decision making problems, Neural Comput. Appl., 31 (2019), 1299–1316. https://doi.org/10.1007/s00521-017-3101-x doi: 10.1007/s00521-017-3101-x
![]() |
[17] |
M. Behzadian, R. B. Kazemzadeh, A. Albadvi, M. Aghdasi, PROMETHEE: A comprehensive literature review on methodologies and applications, Eur. J. Oper. Res., 200 (2010), 198–215. https://doi.org/10.1016/j.ejor.2009.01.021 doi: 10.1016/j.ejor.2009.01.021
![]() |
[18] | Z. G. Fu, X. L. Wu, H. C. Liao, F. Herrera, Underground mining method selection with the hesitant fuzzy linguistic gained and lost dominance score method, IEEE Access, 6 (2018), 66442–66458. |
[19] |
H. Liao, J. Yu, X. Wu, A. Al-Barakati, A. Altalhi, F. Herrera, Life satisfaction evaluation in earthquake-hit area by the probabilistic linguistic GLDS method integrated with the logarithm-multiplicative analytic hierarchy process, Int. J. Disaster Risk Reduct., 38 (2019), 101190. https://doi.org/10.1016/j.ijdrr.2019.101190 doi: 10.1016/j.ijdrr.2019.101190
![]() |
[20] |
R. Fang, H. C. Liao, J. B. Yang, D. L. Xu, Generalised probabilistic linguistic evidential reasoning approach for multi-criteria decision-making under uncertainty, J. Oper. Res. Soc., 72 (2019), 130–144. https://doi.org/10.1080/01605682.2019.1654415 doi: 10.1080/01605682.2019.1654415
![]() |
[21] |
H. C. Liao, H. R. Zhang, C. Zhang, X. L. Wu, A. Mardani, A. Al-Barakati, A q-rung orthopair fuzzy GLDS method for investment evaluation of BE angel capital in China, Technol. Econ. Dev. Econ., 26 (2020), 103–134. https://doi.org/10.3846/tede.2020.11260 doi: 10.3846/tede.2020.11260
![]() |
[22] |
L. Liu, J. Wu, G. W. Wei, C. Wei, J. Wang, Y. Wei, Entropy-based GLDS method for social capital selection of a PPP project with q-rung orthopair fuzzy information, Entropy, 22 (2020), 4014. https://doi.org/10.3390/e22040414 doi: 10.3390/e22040414
![]() |
[23] | Z. Q. Liao, H. C. Liao, A. Al-Barakati, A Choquet integral-based GLDS method for green supplier selection with hesitant fuzzy information, Proceedings of the Thirteenth International Conference on Management Science and Engineering Management, 2020,273–282. |
[24] |
Y. Ming, L. Luo, X. L. Wu, H. C. Liao, B. Lev, L. Jiang, Managing patient satisfaction in a blood-collection room by the probabilistic linguistic gained and lost dominance score method integrated with the best-worst method, Comput. Ind. Eng., 145 (2020), 106547. https://doi.org/10.1016/j.cie.2020.106547 doi: 10.1016/j.cie.2020.106547
![]() |
[25] |
X. D. Liang, X. L. Wu, H. C. Liao, A gained and lost dominance score Ⅱ method for modelling group uncertainty: Case study of site selection of electric vehicle charging stations, J. Clean. Prod., 262 (2020), 121239. https://doi.org/10.1016/j.jclepro.2020.121239 doi: 10.1016/j.jclepro.2020.121239
![]() |
[26] | J. P. Fan, F. Yan, M. Q. Wu, GLDS method for multiple attribute group decision making under 2-tuple linguistic neutrosophic environment, J. Intell. Fuzzy Syst., 40 (2021), 11523–11538. |
[27] |
X. D. Wang, X. J. Gou, Z. S. Xu, A continuous interval-valued double hierarchy linguistic GLDS method and its application in performance evaluation of bus companies, Appl. Intell., 52 (2022), 4511–4526. https://doi.org/10.1007/s10489-021-02581-2 doi: 10.1007/s10489-021-02581-2
![]() |
[28] | T. Zhai, D. Q. Wang, Q. Zhang, P. Saeidi, A. R. Mishra, Assessment of the agriculture supply chain risks for investments of agricultural small and medium-sized enterprises (SMEs) using the decision support model, Econ. Res.-Ekon. Istraz., In press. https://doi.org/10.1080/1331677X.2022.2126991. |
[29] | A. R. Mishra, S. M. Chen, P. Rani, Multicriteria decision making based on novel score function of Fermatean fuzzy numbers, the CRITIC method, and the GLDS method, Inf. Sci., 623 (2023), 915–931. |
[30] |
M. Nilashi, P. F. Rupani, M. M. Rupani, H. Kamyab, W. Shao, H. Ahmadi, et al., Measuring sustainability through ecological sustainability and human sustainability: A machine learning approach, J. Clean. Prod., 240 (2019), 118162. http://doi.org/10.1016/j.jclepro.2019.118162 doi: 10.1016/j.jclepro.2019.118162
![]() |
[31] |
S. Asadi, S. O. Pourhashemi, M. Nilashi, R. Abdullah, S. Samad, E. Yadegaridehkordi, et al., Investigating influence of green innovation on sustainability performance: A case on Malaysian hotel industry, J. Clean. Prod., 258 (2020), 120860. http://doi.org/10.1016/j.jclepro.2020.120860 doi: 10.1016/j.jclepro.2020.120860
![]() |
[32] |
G. Noci, Designing "green" vendor rating systems for the assessment of a supplier's environmental performance, Eur. J. Purch. Supply Manag., 3 (1997), 103–114. http://doi.org/10.1016/S0969-7012(96)00021-4 doi: 10.1016/S0969-7012(96)00021-4
![]() |
[33] |
H. Mobli, N. Banaeian, B. Fahimnia, M. Omid, I. E. Nielsen, Green supplier selection using fuzzy group decision making methods: A case study from the agri-food industry, Comput. Oper. Res., 89 (2018), 337–347. http://doi.org/10.1016/j.cor.2016.02.015 doi: 10.1016/j.cor.2016.02.015
![]() |
[34] |
A. R. Mishra, P. Rani, K. R. Pardasani, A. Mardani, A novel hesitant fuzzy WASPAS method for assessment of green supplier problem based on exponential information measures, J. Clean. Prod., 238 (2019), 117901. https://doi.org/10.1016/j.jclepro.2019.117901 doi: 10.1016/j.jclepro.2019.117901
![]() |
[35] | S. Hendiani, H. C. Liao, R. X. Ren, B. Lev, A likelihood-based multi-criteria sustainable supplier selection approach with complex preference information, Inf. Sci., 536 (2020), 135–155. |
[36] |
K. Zimmer, K. Fröhling, F. Schultmann, Sustainable supplier management-A review of models supporting sustainable supplier selection, monitoring and development, Int. J. Prod. Res., 54 (2016), 1412–1442. http://doi.org/10.1080/00207543.2015.1079340 doi: 10.1080/00207543.2015.1079340
![]() |
[37] | P. Meksavang, H. Shi, S. M. Lin, H. C. Liu, An extended picture fuzzy VIKOR approach for sustainable supplier management and its application in the beef industry, Symmetry, 11 (2019), 468. |
[38] | Z. M. Lu, X. K. Sun, Y. X. Wang, C. B. Xu, Green supplier selection in straw biomass industry based on cloud model and possibility degree, J. Clean. Prod., 209 (2019), 995–1005. |
[39] | Ž. Stevic, D. Pamucar, A. Puška, P. Chatterjee, Sustainable supplier selection in healthcare industries using a new MCDM method: Measurement of alternatives and ranking according to Compromise solution (MARCOS), Comput. Ind. Eng., 140 (2020), 106231. |
[40] |
J. J. Peng, C. Tian, W. Y. Zhang, S. Zhang, J. Q. Wang, An integrated multi-criteria decision-making framework for sustainable supplier selection under picture fuzzy environment, Technol. Econ. Dev. Econ., 26 (2020), 573–598. https://doi.org/10.3846/tede.2020.12110 doi: 10.3846/tede.2020.12110
![]() |
[41] |
R. Kumari, A. R. Mishra, Multi-criteria COPRAS method based on parametric measures for intuitionistic fuzzy sets: Application of green supplier selection, Iran. J. Sci. Technol. Trans. Electr. Eng., 44 (2020), 1645–1662. https://doi.org/10.1007/s40998-020-00312-w doi: 10.1007/s40998-020-00312-w
![]() |
[42] |
P. Rani, A. R. Mishra, R. Krishankumar, A. Mardani, F. Cavallaro, K. S. Ravichandran, et al., Hesitant fuzzy SWARA-complex proportional assessment approach for sustainable supplier selection (HF-SWARA-COPRAS), Symmetry, 12 (2020), 1152. https://doi.org/10.3390/sym12071152 doi: 10.3390/sym12071152
![]() |
[43] |
A. R. Mishra, P. Rani, R. Krishankumar, E. K. Zavadskas, F. Cavallaro, K. S. Ravichandran, A hesitant fuzzy combined compromise solution framework-based on discrimination measure for ranking sustainable third-party reverse logistic providers, Sustainability, 13 (2021), 2064. https://doi.org/10.3390/su13042064 doi: 10.3390/su13042064
![]() |
[44] |
A. R. Mishra, P. Rani, Assessment of sustainable third party reverse logistic provider using the single-valued neutrosophic Combined Compromise Solution framework, Clean. Responsible Consumption, 2 (2021), 100011. https://doi.org/10.1016/j.clrc.2021.100011 doi: 10.1016/j.clrc.2021.100011
![]() |
[45] |
L. J. Chen, D. T. Duan, A. R. Mishra, M. Alrasheedi, Sustainable third-party reverse logistics provider selection to promote circular economy using new uncertain interval-valued intuitionistic fuzzy-projection model, J. Enterp. Inf. Manag., 35 (2022), 955–987. https://doi.org/10.1108/JEIM-02-2021-0066 doi: 10.1108/JEIM-02-2021-0066
![]() |
[46] |
M. Alrasheedi, A. Mardani, A. R. Mishra, P. Rani, N. Loganathan, An extended framework to evaluate sustainable suppliers in manufacturing companies using a new Pythagorean fuzzy entropy-SWARA-WASPAS decision-making approach, J. Enterp. Inf. Manag., 35 (2022), 333–357. https://doi.org/10.1108/JEIM-07-2020-0263 doi: 10.1108/JEIM-07-2020-0263
![]() |
[47] | L. A. Zadeh, Fuzzy sets, Inf. Control, 8 (1965), 338–353. |
[48] |
K. T. Atanassov, Intuitionistic fuzzy sets, Fuzzy Sets Syst., 20 (1986), 87–96. https://doi.org/10.1016/S0165-0114(86)80034-3 doi: 10.1016/S0165-0114(86)80034-3
![]() |
[49] |
A. R. Mishra, G. Sisodia, K. R. Pardasani, K. Sharma, Multicriteria IT personnel selection on intuitionistic fuzzy information measures and ARAS methodology, Iran. J. Fuzzy Syst., 17 (2020), 55–68. https://doi.org/10.22111/ijfs.2020.5406 doi: 10.22111/ijfs.2020.5406
![]() |
[50] | A. R. Mishra, D. Jain, D. S. Hooda, Exponential intuitionistic fuzzy information measure with assessment of service quality, Int. J. Fuzzy Syst., 19 (2017), 788–798. |
[51] | L. A. Zadeh, Probability measures of fuzzy events, J. Math. Anal. Appl., 23 (1968), 421–427. |
[52] | E. Szmidt, J. Kacprzyk, Entropy for intuitionistic fuzzy sets, Fuzzy Sets Syst., 118 (2001), 467–477. |
[53] | H. Bustince, P. Burillo, Vague sets are intuitionistic fuzzy sets, Fuzzy Sets Syst., 79 (1996), 403–405. |
[54] | M. D. Ansari, A. R. Mishra, F. T. Ansari, New divergence and entropy measures for intuitionistic fuzzy sets on edge detection, Int. J. Fuzzy Syst., 20 (2018), 474–487. |
[55] | I. K. Vlachos, G. D. Sergiadis, Intuitionistic fuzzy information-applications to pattern recognition, Pattern Recognit. Lett., 28 (2007), 197–206. |
[56] | W. L. Hung, M. S. Yang, Fuzzy entropy on intuitionistic fuzzy sets, Int. J. Intell. Syst., 21 (2006), 443–451. |
[57] | C. P. Wei, Z. H. Gao, T. T. Guo, An intuitionistic fuzzy entropy measure based on the trigonometric function, Control Decis., 27 (2012), 571–574. |
[58] | P. Rani, A. R. Mishra, Single-valued neutrosophic SWARA-VIKOR framework for performance assessment of eco-industrial thermal power plants, ICSES Trans. Neural Fuzzy Comput., 3 (2020), 335. |
[59] |
A. R. Mishra, A. Mardani, P. Rani, E. K. Zavadskas, A novel EDAS approach on intuitionistic fuzzy set for assessment of health-care waste disposal technology using new parametric divergence measures, J. Clean. Prod., 272 (2020), 122807. https://doi.org/10.1016/j.jclepro.2020.122807 doi: 10.1016/j.jclepro.2020.122807
![]() |
[60] |
A. R. Mishra, A. Mardani, P. Rani, H. Kamyab, M. Alrasheedi, A new intuitionistic fuzzy combinative distance-based assessment framework to assess low-carbon sustainable suppliers in the maritime sector, Energy, 237 (2021), 121500. https://doi.org/10.1016/j.energy.2021.121500 doi: 10.1016/j.energy.2021.121500
![]() |
[61] |
B. Yan, Y. Rong, L. Y. Yu, Y. T. Huang, A hybrid intuitionistic fuzzy group decision framework and its application in urban rail transit system selection, Mathematics, 10 (2022), 2133. https://doi.org/10.3390/math10122133 doi: 10.3390/math10122133
![]() |
[62] |
M. Rasoulzadeh, S. A. Edalatpanah, M. Fallah, S. E. Najafi, A multi-objective approach based on Markowitz and DEA cross-efficiency models for the intuitionistic fuzzy portfolio selection problem, Decis. Mak. Appl. Manag. Eng., 5 (2022), 241–259. https://doi.org/10.31181/dmame0324062022e doi: 10.31181/dmame0324062022e
![]() |
[63] | J. M. Zhan, H. Masood Malik, M. Akram, Novel decision-making algorithms based on intuitionistic fuzzy rough environment, Int. J. Mach. Learn. Cybern., 10 (2019), 1459–1485. |
[64] | M. Akram, G. Ali, J. C. R. Alcantud, New decision-making hybrid model: Intuitionistic fuzzy N-soft rough sets, Soft Comput., 23 (2019), 9853–9868 |
[65] | M. Akram, X. D. Peng, A. Sattar, A new decision-making model using complex intuitionistic fuzzy Hamacher aggregation operators, Soft Comput., 25 (2021), 7059–7086. |
[66] | F. Feng, Y. J. Zheng, B. Z. Sun, M. Akram, Novel score functions of generalized orthopair fuzzy membership grades with application to multiple attribute decision making, Granul. Comput., 7 (2022), 95–111. |
[67] | M. Akram, U. Ali, G. Santos-García, Z. Niaz, 2-tuple linguistic Fermatean fuzzy MAGDM based on the WASPAS method for selection of solid waste disposal location, Math. Biosci. Eng., 20 (2023), 3811–3837. |
[68] | D. K. Tripathi, S. K. Nigam, A. R. Mishra, A. R. Shah, A novel intuitionistic fuzzy distance measure-SWARA-COPRAS method for multi-criteria food waste treatment technology selection, Oper. Res. Eng. Sci.: Theory Appl., In press. |
[69] |
I. M. Hezam, A. R. Mishra, P. Rani, F. Cavallaro, A. Saha, J. Ali, et al., A hybrid intuitionistic fuzzy-MEREC-RS-DNMA method for assessing the alternative fuel vehicles with sustainability perspectives, Sustainability, 14 (2022), 5463. https://doi.org/10.3390/su14095463 doi: 10.3390/su14095463
![]() |
[70] | M. Rahimi, P. Kumar, B. Moomivand, G. Yari, An intuitionistic fuzzy entropy approach for supplier selection, Complex Intell. Syst., 7 (2021), 1869–1876. |
[71] | D. K. Tripathi, S. K. Nigam, P. Rani, A. R. Shah, New intuitionistic fuzzy parametric divergence measures and score function-based CoCoSo method for decision-making problems, Decis. Mak.: Appl. Manag. Eng., In press. https://doi.org/10.31181/dmame0318102022t |
[72] | Z. S. Xu, Intuitionistic fuzzy aggregation operators, IEEE Trans. Fuzzy Syst., 15 (2007), 1179–1187. |
[73] | D. S. Hooda, A. R. Mishra, On trigonometric fuzzy information measures, ARPN J. Sci. Technol., 5 (2015), 145–152. |
[74] | Q. S. Zhang, S. Y. Jiang, A note on information entropy measures for vague sets and its applications, Inf. Sci., 178 (2008), 4184–4191. |
[75] | S. K. De, R. Biswas, A. R. Roy, Some operations on intuitionistic fuzzy sets, Fuzzy Sets Syst., 114 (2000), 477–484. |
[76] |
A. R. Mishra, P. Rani, F. Cavallaro, I. M. Hezam, J. Lakshmi, An integrated intuitionistic fuzzy closeness coefficient-based OCRA method for sustainable urban transportation options selection, Axioms, 12 (2023), 144. https://doi.org/10.3390/axioms12020144 doi: 10.3390/axioms12020144
![]() |
[77] | S. Aouadni, A. Rebai, Z. Turskis, The meaningful mixed data TOPSIS (TOPSIS-MMD) method and its application in supplier selection, Stud. Inf. Control, 26 (2017), 353–363. |
[78] |
D. K. Sen, S. Datta, S. S. Mahapatra, Sustainable supplier selection in intuitionistic fuzzy environment: A decision-making perspective, Benchmarking: Int. J., 25 (2018), 545–574. https://doi.org/10.1108/bij-11-2016-0172 doi: 10.1108/bij-11-2016-0172
![]() |
[79] | H. Gitinavard, M. A. Shirazi, An extended intuitionistic fuzzy modified group complex proportional assessment approach, J. Ind. Syst. Eng., 11 (2018), 229–246. |