Processing math: 54%
Research article

Simulator selection based on complex probabilistic hesitant fuzzy soft structure using multi-parameters group decision-making

  • Received: 18 April 2023 Revised: 12 May 2023 Accepted: 16 May 2023 Published: 24 May 2023
  • MSC : 03B52, 03E72

  • Simulation software replicates the behavior of real electrical equipment using mathematical models. This is efficient not only in regard to time savings but also in terms of investment. It, at large scale for instance airplane pilots, chemical or nuclear plant operators, etc., provides valuable experiential learning without the risk of a catastrophic outcome. But the selection of a circuit simulator with effective simulation accuracy poses significant challenges for today's decision-makers because of uncertainty and ambiguity. Thus, better judgments with increased productivity and accuracy are crucial. For this, we developed a complex probabilistic hesitant fuzzy soft set (CPHFSS) to capture ambiguity and uncertain information with higher accuracy in application scenarios. In this manuscript, the novel concept of CPHFSS is explored and its fundamental laws are discussed. Additionally, we investigated several algebraic aspects of CPHFSS, including union, intersections, soft max-AND, and soft min-OR operators, and we provided numerical examples to illustrate these key qualities. The three decision-making strategies are also constructed using the investigated idea of CPHFSS. Furthermore, numerical examples related to bridges and circuit simulation are provided in order to assess the validity and efficacy of the proposed methodologies. The graphical expressions of the acquired results are also explored. Finally, we conclude the whole work.

    Citation: Shahzaib Ashraf, Harish Garg, Muneeba Kousar, Sameh Askar, Shahid Abbas. Simulator selection based on complex probabilistic hesitant fuzzy soft structure using multi-parameters group decision-making[J]. AIMS Mathematics, 2023, 8(8): 17765-17802. doi: 10.3934/math.2023907

    Related Papers:

    [1] Asit Dey, Tapan Senapati, Madhumangal Pal, Guiyun Chen . A novel approach to hesitant multi-fuzzy soft set based decision-making. AIMS Mathematics, 2020, 5(3): 1985-2008. doi: 10.3934/math.2020132
    [2] Admi Nazra, Jenizon, Yudiantri Asdi, Zulvera . Generalized hesitant intuitionistic fuzzy N-soft sets-first result. AIMS Mathematics, 2022, 7(7): 12650-12670. doi: 10.3934/math.2022700
    [3] Adel Fahad Alrasheedi, Jungeun Kim, Rukhsana Kausar . q-Rung orthopair fuzzy information aggregation and their application towards material selection. AIMS Mathematics, 2023, 8(8): 18780-18808. doi: 10.3934/math.2023956
    [4] Feng Feng, Zhe Wan, José Carlos R. Alcantud, Harish Garg . Three-way decision based on canonical soft sets of hesitant fuzzy sets. AIMS Mathematics, 2022, 7(2): 2061-2083. doi: 10.3934/math.2022118
    [5] Jia-Bao Liu, Rashad Ismail, Muhammad Kamran, Esmail Hassan Abdullatif Al-Sabri, Shahzaib Ashraf, Ismail Naci Cangul . An optimization strategy with SV-neutrosophic quaternion information and probabilistic hesitant fuzzy rough Einstein aggregation operator. AIMS Mathematics, 2023, 8(9): 20612-20653. doi: 10.3934/math.20231051
    [6] Misbah Rasheed, ElSayed Tag-Eldin, Nivin A. Ghamry, Muntazim Abbas Hashmi, Muhammad Kamran, Umber Rana . Decision-making algorithm based on Pythagorean fuzzy environment with probabilistic hesitant fuzzy set and Choquet integral. AIMS Mathematics, 2023, 8(5): 12422-12455. doi: 10.3934/math.2023624
    [7] Tareq M. Al-shami, José Carlos R. Alcantud, Abdelwaheb Mhemdi . New generalization of fuzzy soft sets: (a,b)-Fuzzy soft sets. AIMS Mathematics, 2023, 8(2): 2995-3025. doi: 10.3934/math.2023155
    [8] Sana Shahab, Mohd Anjum, Ashit Kumar Dutta, Shabir Ahmad . Gamified approach towards optimizing supplier selection through Pythagorean Fuzzy soft-max aggregation operators for healthcare applications. AIMS Mathematics, 2024, 9(3): 6738-6771. doi: 10.3934/math.2024329
    [9] Esra Korkmaz . An innovative algorithm based on weighted fuzzy soft multisets and its application in selecting optimal construction materials. AIMS Mathematics, 2024, 9(10): 27512-27534. doi: 10.3934/math.20241336
    [10] S. Meenakshi, G. Muhiuddin, B. Elavarasan, D. Al-Kadi . Hybrid ideals in near-subtraction semigroups. AIMS Mathematics, 2022, 7(7): 13493-13507. doi: 10.3934/math.2022746
  • Simulation software replicates the behavior of real electrical equipment using mathematical models. This is efficient not only in regard to time savings but also in terms of investment. It, at large scale for instance airplane pilots, chemical or nuclear plant operators, etc., provides valuable experiential learning without the risk of a catastrophic outcome. But the selection of a circuit simulator with effective simulation accuracy poses significant challenges for today's decision-makers because of uncertainty and ambiguity. Thus, better judgments with increased productivity and accuracy are crucial. For this, we developed a complex probabilistic hesitant fuzzy soft set (CPHFSS) to capture ambiguity and uncertain information with higher accuracy in application scenarios. In this manuscript, the novel concept of CPHFSS is explored and its fundamental laws are discussed. Additionally, we investigated several algebraic aspects of CPHFSS, including union, intersections, soft max-AND, and soft min-OR operators, and we provided numerical examples to illustrate these key qualities. The three decision-making strategies are also constructed using the investigated idea of CPHFSS. Furthermore, numerical examples related to bridges and circuit simulation are provided in order to assess the validity and efficacy of the proposed methodologies. The graphical expressions of the acquired results are also explored. Finally, we conclude the whole work.



    Due to the rising complexity of current technology and engineering systems, simulation stability is of the greatest priority. Simulation is quite time-saving and cost-effective [1]. Simulation software is based on the technique of mathematically simulating real-world phenomena. Essentially, it is a tool that lets the user see a process via simulation without really conducting it [2]. As a result, engineers often turn to simulation software to ensure that their machines produce results as near to the intended specifications as feasible without resorting to costly alterations during production. When engineers get excellent and precise results from their simulation, they may help decrease the utilization of expensive hardware resources and only create hardware when strictly essential [3]. Real-time reaction simulation software is often used in engineering and when the penalty for improper operation is severe, a replica of the actual control panel is linked to a real-time simulation of the physical response, providing valuable training without the danger of a disastrous outcome.

    A variety of simulators exist with diverse applications and features. The selection of a circuit simulator with effective simulation accuracy poses significant challenges for today's decision-makers. Decision-making procedures encompass crips data, but uncertainty performs a predominant role in any decisions pertaining to our daily life problems, and the data may not always be in crips form. To deal with the complications of decision-making and modeling of ambiguous or uncertain data, our researchers perform a significant role in various fields like process control, artificial intelligence, environmental sciences, computer vision, economics, medical science, engineering, image analysis, natural language processing, etc. Standard methods are always not fruitful for dealing with ambiguous or uncertain data. Throughout the preceding few decades, modeling of the natural world predicated on fuzzy logic and fuzzy sets has been manifested for explaining practical problems in such types of fields. Before providing the motivation for this paper, we describe the brief history that our researchers presented to deal with ambiguous or uncertain data. Lotfi Asker Zadeh in 1965 presented the concept of a fuzzy set to deal with such types of uncertainty [4]. The researcher is able to conduct a quantitative analysis of the uncertainty of an event by using this sort of mathematical model [6]. Researchers have defined numerous extensions of this impression [7,8,9,10,11,12].

    One crucial problem shared by those theories is their inadequacy with parametrization tools, such as the level of the membership determined by the individual depending on the information received by the individual. For that reason, they are vulnerable to subjective components. Furthermore, distinct attributes in a single problem require them to be thought about in an integrated way. Molodtsov in 1999 presented the soft set theory to address these limitations [13]. The soft set theory is distinct from classical methods to deal with vagueness or uncertainties. The benefit of soft set theory is that it can solve problems that have multiple parameters and perform a very significant role in applications of numerous fields [14,15]. This is especially the case in decision-making under an imprecise environment [16] and in data analysis [17]. Numerous extensions of soft set theory have been defined by researchers. For instance, Maji et al. [18] presented a fuzzy soft set by combining a fuzzy set and a soft set. Maji and Roy presented the impression of a fuzzy soft set and gave its operations, properties, and applications in decision-making [19,20,21].

    Sometimes randomness and fuzziness related uncertainties occur in the system at the same time. Meghdadi in 2001 presented probabilistic fuzzy logic [22] to handle both sorts of uncertainties concurrently in a single framework. Probabilistic modeling is a very significant tool to deal with random uncertainties, such as power systems [23], robotic control systems [24], signal processing [25], medical applications [26], and control applications [27]. When there is only limited information about randomness, probabilistic models can be used by making appropriate assumptions about randomness statistics [28].

    Ramot has examined the presented theories that have evaluated the decision-making problems under the fuzzy set and its generalizations, which are only capable of dealing with the vagueness and uncertainty that exist in data. These are not able to describe the fluctuations of data at a given point in time. Ramot in 2002 presented a complex fuzzy set to address these limitations. In contrast to a traditional fuzzy membership function, this range is not limited to [0, 1], but extended to the unit circle in the complex plane [29]. It is unique because it has a complex membership value that incorporates amplitude and phase terms. The phase term denotes the declaration of a complex fuzzy set that needs the second dimension of membership, while the amplitude term retains the concept of fuzziness. The complex fuzzy set offers the ability to resolve temporal issues and combine data from various aspects into a single, understandable collection. Two different components of the data are explained, each in its own way. As a result, it is more inclusive than the conventional fuzzy set. Dick presented a systematic analysis of complex fuzzy sets and logic, and also talked about their applications [30]. Alkouri presented complex intuitionistic fuzzy sets [31], their composition, relation, projection [32] and some of its operation [33]. Researchers have also defined numerous extensions of this impression [34,35,36,37].

    Torra in 2010 presented a hesitant fuzzy set to deal with hesitant situations [38]. In this case, he regarded the membership function as a set of possible membership values, namely h(x), where h(x) is a finite subset of [0, 1]. When decision-makers are unable to determine which of many possible assessment values best reflects their point of view, hesitant fuzzy set may be used to address the situation by assigning different probabilities to each of the possible assessment values. Often, in probabilistic fuzzy settings, the probabilistic information is lost. This is why Pang [39] created a new class of probabilistic fuzzy linguistic objects to address these concerns in the setting of fuzzy language. An innovative concept known as probabilistic hesitant fuzzy sets was found thanks to the research of Xu and Zhou [40]. Hesitant fuzzy sets have attracted the concentration of many researchers who presented multiple extensions and their operators, which also perform a significant role in decision-making [41], such as in [42] where authors introduced the dual hesitant fuzzy soft set to group forecasting, in which they presented the example of a pharmaceutical company's board of directors' need to decide the further investment priorities for the subsidiaries based on net income. In [43] they developed the methods of E-VIKOR and TOPSIS and in [44] the EDAS method to solve multi-criteria decision-making problems with the hesitant fuzzy set information.

    Humans have always struggled to attain a better perception of the developing world in which they live. In this developing world, we face vagueness and uncertainty created by fuzziness, hesitancy, and randomness when trying to make optimal decisions. A number of scholars investigated and developed distinct approaches for dealing with barriers to decision-making. Practical decision-making involves a lot of uncertainties, imprecise information and vagueness, whose representations and management are constantly the main concerns. In some real-world applications of decision theory, decision-makers deal with situations involving specific attributes in which the values of their membership degree need to deal with probability, phase of time, and hesitancy collectively. By using these terms, the evaluation is more precise and accurate as well as beyond one's preferences, which is the key point during making decisions. For instance, when treating mental diseases, doctors face many difficulties. A patient with a mental illness is frequently treated by several doctors, which causes uncertainty, reluctance, and randomness and makes diagnosis challenging. In such a situation, existing theories are unable to produce any results that are satisfactory. Thus, we created the concept of a complex probabilistic hesitant fuzzy soft set to address this issue, which plays a very significant role in making decisions in a short interval of time and as accurately as possible.

    In complex probabilistic hesitant fuzzy soft set, membership grade is probabilistic hesitant and complex-valued which is illustrated in polar coordinate. The amplitude term of the membership grade expresses the belongingness of CPHFSS to some extent, and the phase term related to the membership grade gives additional information relevant to the phase of time and periodicity. This structure serves a crucial function in achieving more accurate and precise measurements in mechanical and especially electrical equipment. We consider multiple attributes to more accurately reflect our perceptions and it performs a very significant role in decision making to make optimal decisions. In the last part, we also present a real scenario based on numerical examples on decision making problems with the complex probabilistic hesitant fuzzy information to show the advantages of this methodology and efficacy.

    The organization of the rest of the paper is as follows: Section 2 comprises of preliminaries, in which we recall the concept of a few basic definitions in a precise manner, enabling us to communicate easily in the rest of the sections. In Section 3, we introduce the model of a complex probabilistic hesitant fuzzy soft set. We discuss some basic operations (such as extended and restricted union, extended and restricted intersection, complement) and soft max-AND soft min-OR operators. Also, we verify their fundamental laws. Further, the numerical examples are solved to manifest the integrity and supremacy of the explored work. In Section 4, we establish three different algorithms for decision making with complex probabilistic hesitant fuzzy information under the environment of multiple attributes. In Section 5, we illustrate applications and case studies to make optimal decisions. In Section 6, we give the conclusion of this paper.

    In this section, a brief review of a few basic definitions which we use to establish the methods proposed in this paper is presented.

    Definition 1. Let M be a universe of discourse, then a fuzzy set ˆA defined on M as

    ˆA={mi,μˆA(mi)|miM},

    where μˆA(mi) is a membership grade of mi in ˆA and μˆA:M[0,1]. If μˆA(mi)=1 then it is full membership of mi, if μˆA(mi)=0 then it is non-membership of mi, and if μˆA(mi) has a value between 0 and 1 then it is partial membership of mi [4].

    Definition 2. Let M be a universe of discourse, then a hesitant fuzzy set ˆB is in terms of a function h that when applied to M return a subset of [0, 1] which is represented as

    ˆB={mi,hˆB(mi)|miM},

    where hˆB(mi) is a set of different finite elements in [0, 1], representing the possible membership grades of the element miM to the set ˆB [38].

    Definition 3. Let M be a universe of discourse, then a probabilistic hesitant fuzzy set ˆC is defined as

    ˆC={mi,hˆC(μx(mi)|PˆCx)|miM},

    where hˆC(μx(mi)|PˆCx) is the set of different finite elements (μx(mi)|PˆCx) representing the hesitant fuzzy information along probabilities to the set ˆC,x=1,2,3,...,n where n is the number of possible elements in hˆC(μx(mi)|PˆCx),PˆCx[0,1] is the hesitant probability of mi and xPˆCx=1 [45].

    Definition 4. Let M be a universe of discourse, then a complex fuzzy set ˆD is defined as

    ˆD={mi,rˆD(mi)e2πiωˆD(mi)|miM},

    where rˆD(mi)e2πiωˆD(mi) is a complex valued membership grade of mi in ˆD and it may receive all values lie within the unit circle in the complex plane and rˆD(mi)[0,1], ωˆD(mi)(0,1] and i=1 [29].

    Definition 5. Let M be a universe of discourse, then a complex probabilistic hesitant fuzzy set (CPHFS) ˆE is defined as

    ˆE={mi,hˆE(rˆEx(mi)e2πiωˆEx(mi)|PˆEx)|miM},

    where hˆE(rˆEx(mi)e2πiωˆEx(mi)|PˆEx) is the set of a few complex elements representing the complex hesitant fuzzy information along probabilities to the set ˆE,rˆEx(mi)[0,1] and ωˆEx(mi)[0,1],x=1,2,...,n where n is the number of possible elements in hˆE(rˆEx(mi)e2πiωˆEx(mi)|PˆEx) and PˆEx[0,1] is the complex hesitant probability of rˆEx(mi)e2πiωˆEx(mi) and xPˆEx=1.

    Definition 6. Let M be a universe of discourse and G be the set of attributes, for any non-empty set EG. A pair (F,E) is called the soft set over M if there is a mapping F:EP(M) where P(M) denotes the power set of M.

    Thus, the soft set is a parametric family of the subsets of the universe of discourse. For each ejG, we can interpret F(ej) as a subset of the universe of discourse M. We can also consider F(ej) as a mapping F(ej):M{0,1} and then F(ej)(mi)=1 is equivalent to miF(ej), otherwise F(ej)(mi)=0 [46]. Molodtsov considered many examples in [13] to illustrate the soft set.

    Definition 7. Let M be a universe of discourse and G be the set of attributes, for any non-empty set EG. A pair (ˆH,E) is called the fuzzy soft set over M if there is a mapping ˆH:EF(M) where F(M) denotes the fuzzy power set of M (all possible fuzzy subsets of M)[47].

    In this section, we develope the model of complex probabilistic hesitant fuzzy soft set and numerical example to illustrate this model. We discuss some basic operations and soft max-AND soft min-OR operators. Also, we verify their fundamental laws. Further, the numerical examples are solved to manifest the integrity and supremacy of the explored work.

    Definition 8. [48] Let M be a universe of discourse and G be the set of attributes, for any non-empty set EG. A pair (ˆK,E) is called the complex probabilistic hesitant fuzzy soft set over M if there is a mapping ˆK:EF(M) where F(M) denotes the all possible complex probabilistic hesitant fuzzy subset of M. It is represented as

    ˆK(ej)={mi,hˆK(rˆKx(mi)e2πiωˆKx(mi)|PˆKx)|miM},ejEG,

    where hˆK(rˆKx(mi)e2πiωˆKx(mi)|PˆKx) is the set of a few complex elements representing the complex hesitant fuzzy information along probabilities to the set ˆK,rˆKx(mi)[0,1] and ωˆKx(mi)[0,1],x=1,2,...,n where n is the number of possible elements in hˆK(rˆKx(mi)e2πiωˆKx(mi)|PˆKx) and PˆKx[0,1] is the complex hesitant probability of rˆKx(mi)e2πiωˆKx(mi) and xPˆKx=1.

    Example 1. Let M={m1,m2,m3} be the set of energy projects, EG be the set of attributes, such that E={e1=environmental,e2=economical,e3=technological}. Then, (ˆK,E) is the complex probabilistic hesitant fuzzy soft set over M as follows:

    ˆK(e1)={m1,{0.6e2πi0.6|0.2,0.7e2πi0.5|0.3,0.8e2πi0.6|0.5},m2,{0.9e2πi0.8|1},m3,{0.5e2πi0.3|1}},

    ˆK(e2)={m1,{0.2e2πi0.3|1},m2,{0.4e2πi0.5|0.5,0.5e2πi0.4|0.5},m3,{0.3e2πi0.8|0.1,0.9e2πi0.1|0.9}},

    ˆK(e3)={m1,{0.5e2πi0.8|1},m2,{0.1e2πi0.2|0.8,0.2e2πi0.3|0.2},m3,{0.7e2πi0.7|1}}.

    We can write complex probabilistic hesitant fuzzy soft set in a tabular form as represented in Table 1.

    Table 1.  Tabular representation of CPHFSS.
    (ˆK,E) e1 e2 e3
    m1 {0.6e2πi0.6|0.2,0.7e2πi0.5|0.3,0.8e2πi0.6|0.5} {0.2e2πi0.3|1} {0.5e2πi0.8|1}
    m2 {0.9e2πi0.8|1} {0.4e2πi0.5|0.5,0.5e2πi0.4|0.5} {0.1e2πi0.2|0.8,0.2e2πi0.3|0.2}
    m3 {0.5e2πi0.3|1} {0.3e2πi0.8|0.1,0.9e2πi0.1|0.9} {0.7e2πi0.7|1}

     | Show Table
    DownLoad: CSV

    Definition 9. Let M be a universe of discourse and G be the set of attributes, for any non-empty set EG. A pair (ˆK,E) is called the empty complex probabilistic hesitant fuzzy soft set over M. If ˆK(ej)=ϕ for all eiE.

    Definition 10. Let M be a universe of discourse and G be the set of attributes, for any non-empty set EG. A pair (ˆK,E) is called the full complex probabilistic hesitant fuzzy soft set over M. If ˆK(ej)=1 for all eiE.

    Definition 11. Let M be a universe of discourse. If (^K1,E1) and (^K2,E2) are two CPHFSS over M then their restricted union is defined as

    (ˆQ,O)=(^K1,E1)ξ(^K2,E2),

    where ˆQ=^K1ξ^K2, O=E1E2ϕ; ojO and miM, mi,hˆQ(rˆQx(mi)e2πiωˆQx(mi)|PˆQx)ˆQ(oj) rˆQx(mi)e2πiωˆQx(mi)|PˆQx

     ={ r^K1x(mi)e2πiω^K1x(mi)|P^K1x,ifxh^K1xh^K2x,r^K2x(mi)e2πiω^K2x(mi)|P^K2x,ifxh^K2xh^K1x,max{r^K1x(mi),r^K2x(mi)}e2πimax{ω^K1x(mi),ω^K2x(mi)}|P^K1xP^K2x,ifxh^K1xh^K2x.

    Example 2. Let (^K1,E1) and (^K2,E2) be the two complex probabilistic hesitant fuzzy softs represented in Tables 2 and 3 respectively.

    Table 2.  CPHFSS (ˆK1,E1).
    (ˆK1,E1) e1 e2 e3
    m1 {0.6e2πi0.5|1} {0.3e2πi0.6|0.1,0.2e2πi0.5|0.2,0.1e2πi0.3|0.7} {0.6e2πi0.6|0.2,0.9e2πi0.5|0.3,0.5e2πi0.9|0.5}
    m2 {0.8e2πi0.5|0.2,0.3e2πi0.3|0.8} {0.7e2πi0.6|1} {0.8e2πi0.7|0.2,0.3e2πi0.3|0.8}
    m3 {0.5e2πi0.4|0.2,0.3e2πi0.8|0.4,0.8e2πi0.2|0.4} {0.7e2πi0.3|0.1,0.4e2πi0.7|0.9} {0.4e2πi0.6|0.3,0.4e2πi0.7|0.7}

     | Show Table
    DownLoad: CSV
    Table 3.  CPHFSS (ˆK2,E2).
    (ˆK2,E2) e1 e2 e4
    m1 {0.3e2πi0.7|0.1,0.6e2πi0.4|0.3,0.4e2πi0.3|0.6} {0.8e2πi0.4|1} {0.7e2πi0.2|0.4,0.7e2πi0.8|0.6}
    m2 {0.6e2πi0.9|1} {0.5e2πi0.2|0.1,0.2e2πi0.6|0.4,0.8e2πi0.9|0.5} {0.3e2πi0.3|0.3,0.4e2πi0.7|0.7}
    m3 {0.6e2πi0.4|1} {0.3e2πi0.3|0.1,0.3e2πi0.4|0.9} {0.5e2πi0.3|1}

     | Show Table
    DownLoad: CSV

    Then their restricted union is represented in Table 4.

    Table 4.  Tabular representation of restricted union.
    (ˆQ,O) e1 e2
    m1 {0.6e2πi0.7|0.10.6e2πi0.4|0.30.4e2πi0.3|0.6} {0.8e2πi0.6|0.1,0.2e2πi0.5|0.2,0.1e2πi0.3|0.7}
    m2 {0.8e2πi0.9|0.2,0.3e2πi0.3|0.8} {0.7e2πi0.6|0.10.2e2πi0.6|0.40.8e2πi0.9|0.5}
    m3 {0.6e2πi0.4|0.2,0.3e2πi0.8|0.4,0.8e2πi0.2|0.4} {0.7e2πi0.3|0.01,0.4e2πi0.7|0.81}

     | Show Table
    DownLoad: CSV

    Definition 12. Let M be a universe of discourse. If (^K1,E1) and (^K2,E2) are two CPHFSS over M, then their restricted intersection is defined as

    (ˆR,O)=(^K1,E1)ξ(^K2,E2),

    where ˆR=^K1ξ^K2, O=E1E2ϕ; ojO and miM,

    mi,hˆR(rˆRx(mi)e2πiωˆRx(mi)|PˆRx)ˆR(oj) rˆRx(mi)e2πiωˆRx(mi)|PˆRx

     ={ r^K1x(mi)e2πiω^K1x(mi)|P^K1x,ifxh^K1xh^K2x,r^K2x(mi)e2πiω^K2x(mi)|P^K2x,ifxh^K2xh^K1x,min{r^K1x(mi),r^K2x(mi)}e2πimin{ω^K1x(mi),ω^K2x(mi)}|P^K1xP^K2x,ifxh^K1xh^K2x.

    Example 3. Consider (^K1,E1) and (^K2,E2) as described in Example 2. Then their restricted intersection is represented in Table 5.

    Table 5.  Tabular representation of restricted intersection.
    (ˆR,O) e1 e2
    m1 {0.3e2πi0.5|0.10.6e2πi0.4|0.30.4e2πi0.3|0.6} {0.3e2πi0.4|0.1,0.2e2πi0.5|0.2,0.1e2πi0.3|0.7}
    m2 {0.6e2πi0.5|0.2,0.3e2πi0.3|0.8} {0.5e2πi0.2|0.10.2e2πi0.6|0.40.8e2πi0.9|0.5}
    m3 {0.5e2πi0.4|0.2,0.3e2πi0.8|0.4,0.8e2πi0.2|0.4} {0.3e2πi0.3|0.01,0.3e2πi0.4|0.81}

     | Show Table
    DownLoad: CSV

    Definition 13. Let M be a universe of discourse. If (^K1,E1) and (^K2,E2) are two CPHFSS over M, then their extended union is defined as

    (ˆS,P)=(^K1,E1)ζ(^K2,E2),

    where ˆS=^K1ζ^K2, P=E1E2; pjP and miM, with p1jE1 and p2jE2.

     ˆS(pj)={ ^K1(p1j),ifpjE1E2,^K2(p2j),ifpjE2E1,^K1(p1j)ξ^K2(p2j),ifpjE1E2.

    Example 4. Consider (^K1,E1) and (^K2,E2) as described in Example 2.

    Then their extended union is represented in Table 6.

    Table 6.  Tabular representation of extended union.
    (ˆS,P) e1 e2 e3 e4
    m1 {0.6e2πi0.7|0.10.6e2πi0.4|0.30.4e2πi0.3|0.6} {0.8e2πi0.6|0.1,0.2e2πi0.5|0.2,0.1e2πi0.3|0.7} {0.6e2πi0.6|0.2,0.9e2πi0.5|0.3,0.5e2πi0.9|0.5} {0.7e2πi0.2|0.4,0.7e2πi0.8|0.6}
    m2 {0.8e2πi0.9|0.2,0.3e2πi0.3|0.8} {0.7e2πi0.6|0.10.2e2πi0.6|0.40.8e2πi0.9|0.5} {0.8e2πi0.7|0.2,0.3e2πi0.3|0.8} {0.3e2πi0.3|0.3,0.4e2πi0.7|0.7}
    m3 {0.6e2πi0.4|0.2,0.3e2πi0.8|0.4,0.8e2πi0.2|0.4} {0.7e2πi0.3|0.01,0.4e2πi0.7|0.81} {0.4e2πi0.6|0.3,0.4e2πi0.7|0.7} {0.5e2πi0.3|1}

     | Show Table
    DownLoad: CSV

    Definition 14. Let M be a universe of discourse. If (^K1,E1) and (^K2,E2) are two CPHFSS over M, then their extended intersection is defined as

    (ˆT,P)=(^K1,E1)ζ(^K2,E2),

    where ˆT=^K1ζ^K2, P=E1E2; pjP and miM, with p1jE1 and p2jE2.

     ˆT(pj)={ ^K1(p1j),ifpjE1E2,^K2(p2j),ifpjE2E1,^K1(p1j)ξ^K2(p2j),ifpjE1E2.

    Example 5. Consider (^K1,E1) and (^K2,E2) as described in Example 2. Then their extended union is represented in Table 7.

    Table 7.  Tabular representation of extended intersection.
    (ˆT,P) e1 e2 e3 e4
    m1 {0.3e2πi0.5|0.10.6e2πi0.4|0.30.4e2πi0.3|0.6} {0.3e2πi0.4|0.1,0.2e2πi0.5|0.2,0.1e2πi0.3|0.7} {0.6e2πi0.6|0.2,0.9e2πi0.5|0.3,0.5e2πi0.9|0.5} {0.7e2πi0.2|0.4,0.7e2πi0.8|0.6}
    m2 {0.6e2πi0.5|0.2,0.3e2πi0.3|0.8} {0.5e2πi0.2|0.10.2e2πi0.6|0.40.8e2πi0.9|0.5} {0.8e2πi0.7|0.2,0.3e2πi0.3|0.8} {0.3e2πi0.3|0.3,0.4e2πi0.7|0.7}
    m3 {0.5e2πi0.4|0.2,0.3e2πi0.8|0.4,0.8e2πi0.2|0.4} {0.3e2πi0.3|0.01,0.3e2πi0.4|0.81} {0.4e2πi0.6|0.3,0.4e2πi0.7|0.7} {0.5e2πi0.3|1}

     | Show Table
    DownLoad: CSV

    Definition 15. Let M be a universe of discourse. If (ˆK,E) is the CPHFSS over M, then its complement is defined as

    ˆKc(ej)={mi,hˆKc((1rˆKx(mi))e2πi(1ωˆKx(mi))|1PˆKx)|miM},ejEG.

    Example 6. Consider (ˆK,E) as described in Example 1. Then its complement is represented in Table 8.

    Table 8.  Tabular representation of CPHFSS.
    (ˆK,E) e1 e2 e3
    m1 {0.4e2πi0.4|0.2,0.3e2πi0.5|0.3,0.2e2πi0.4|0.5} {0.8e2πi0.7|1} {0.5e2πi0.2|1}
    m2 {0.1e2πi0.2|1} {0.6e2πi0.5|0.5,0.5e2πi0.6|0.5} {0.9e2πi0.8|0.8,0.8e2πi0.7|0.2}
    m3 {0.5e2πi0.7|1} {0.7e2πi0.2|0.1,0.1e2πi0.9|0.9} {0.3e2πi0.3|1}

     | Show Table
    DownLoad: CSV

    Definition 16. Soft max-AND operation of two CPHFSS (^K1,E1) and (^K2,E2) (where ^K1:E1F(M) and ^K2:E2F(M)) defined as

    (^K1,E1)(^K2,E2)=(ˆQ,L),

    where ˆQ:LF(M) such that ˆQ=^K1^K2 and L=E1×E2; (li,lj)(E1×E2),li,ljΛ.

    mi,hˆQ(rˆQx(mi)e2πiωˆQx(mi)|PˆQx)ˆQ(li,lj)rˆQx(mi)e2πiωˆQx(mi)|PˆQx

     ={ r^K1x(mi)e2πiω^K1x(mi)|P^K1x,ifxh^K1xh^K2x,r^K2x(mi)e2πiω^K2x(mi)|P^K2x,ifxh^K2xh^K1x,max{r^K1x(mi),r^K2x(mi)}e2πimax{ω^K1x(mi),ω^K2x(mi)}|P^K1xP^K2x,ifxh^K1xh^K2x.

    Definition 17. Soft min-OR operation of two CPHFSS (^K1,E1) and (^K2,E2) (where ^K1:E1F(M) and ^K2:E2F(M)) defined as

    (^K1,E1)(^K2,E2)=(ˆR,L),

    where ˆR:LF(M) such that ˆR=^K1^K2 and L=E1×E2; (li,lj)(E1×E2),li,ljΛ.

    mi,hˆR(rˆRx(mi)e2πiωˆRx(mi)|PˆRx)ˆR(li,lj)rˆRx(mi)e2πiωˆRx(mi)|PˆRx

     ={ r^K1x(mi)e2πiω^K1x(mi)|P^K1x,ifxh^K1xh^K2x,r^K2x(mi)e2πiω^K2x(mi)|P^K2x,ifxh^K2xh^K1x,min{r^K1x(mi),r^K2x(mi)}e2πimin{ω^K1x(mi),ω^K2x(mi)}|P^K1xP^K2x,ifxh^K1xh^K2x.

    Proposition 1. Given that (^K1,E1), (^K2,E2) and (^K3,E3) are any three CPHFSS on M, then the following holds:

    Idempotent laws.

    (i). (^K1,E1)ζ(^K1,E1)=(^K1,E1),

    (ii). (^K1,E1)ζ(^K1,E1)=(^K1,E1),

    (iii). (^K1,E1)ξ(^K1,E1)=(^K1,E1),

    (iv). (^K1,E1)ξ(^K1,E1)=(^K1,E1),

    Commutative laws.

    (v). (^K1,E1)ζ(^K2,E2)=(^K2,E2)ζ(^K1,E1),

    (vi). (^K1,E1)ζ(^K2,E2)=(^K2,E2)ζ(^K1,E1),

    (vii). (^K1,E1)ξ(^K2,E2)=(^K2,E2)ξ(^K1,E1),

    (viii). (^K1,E1)ξ(^K2,E2)=(^K2,E2)ξ(^K1,E1),

    Associative laws.

    (ix). (^K1,E1)ζ((^K2,E2)ζ(^K3,E3))=((^K1,E1)ζ(^K2,E2))ζ(^K3,E3),

    (x). (^K1,E1)ζ((^K2,E2)ζ(^K3,E3))=((^K1,E1)ζ(^K2,E2))ζ(^K3,E3),

    (xi). (^K1,E1)ξ((^K2,E2)ξ(^K3,E3))=((^K1,E1)ξ(^K2,E2))ξ(^K3,E3),

    (xii). (^K1,E1)ξ((^K2,E2)ξ(^K3,E3))=((^K1,E1)ξ(^K2,E2))ξ(^K3,E3).

    Proof. (i)–(viii) laws are straight-forward and follow from their definition.

    (ix) L.H.S: Let (^K2,E2) and (^K3,E3) (where ^K2:E2F(M) and ^K3:E3F(M)) be two CPHFSS on M. By definition of extended union we have (ˆW,M) (where ˆW:MF(M)) such that

    (ˆW,M)=(^K2,E2)ζ(^K3,E3),

    where ˆW=^K2ζ^K3, M=E2E3; mjM and miM, with m1jE2 and m2jE3.

     ˆW(mj)={ ^K2(m1j),ifmjE2E3,^K3(m2j),ifmjE3E2,^K2(m1j)ξ^K3(m2j),ifmjE2E3.

    As, (^K1,E1)ζ((^K2,E2)ζ(^K3,E3))=(^K1,E1)ζ(ˆW,M). Suppose that (^K1,E1)ζ(ˆW,M)=(ˆX,N) such that ˆX:NF(M), where ˆX=(^K1ζˆW), N=E1M=E1E2E3; njN with n1jE1, n2jE2 and n3jE3,

     ˆX(nj)={ ^K1(n1j),ifnjE1E2E3,^K2(n2j),ifnjE2E3E1,^K3(n3j),ifnjE3E1E2,^K1(n1j)ξ^K2(n2j),ifnjE1E2E3,^K2(n2j)ξ^K3(n3j),ifnjE2E3E1,^K3(n3j)ξ^K1(n1j),ifnjE3E1E2,^K1(n1j)ξ^K2(n2j)ξ^K3(n3j),ifnjE1E2E3.

    R.H.S: Let (^K1,E1) and (^K2,E2) (where ^K1:E1F(M) and ^K2:E2F(M)) be two CPHFSS over M. By definition of extended union we have (ˆS,P) (where ˆS:PF(M)) such that

    (ˆS,P)=(^K1,E1)ζ(^K2,E2),

    where ˆS=^K1ζ^K2, P=E1E2; pjP and miM, with p1jE1 and p2jE2.

     ˆS(pj)={ ^K1(p1j),ifpjE1E2,^K2(p2j),ifpjE2E1,^K1(p1j)ξ^K2(p2j),ifpjE1E2.

    As, ((^K1,E1)ζ(^K2,E2))ζ(^K3,E3)=(ˆS,P)ζ(^K3,E3). Suppose that (ˆS,P)ζ(^K3,E3)=(ˆY,N) such that ˆY:NF(M), where ˆY=(ˆSζ^K3), N=PE3=E1E2E3; njN with n1jE1, n2jE2 and n3jE3,

     ˆY(nj)={ ^K1(n1j),ifnjE1E2E3,^K2(n2j),ifnjE2E3E1,^K3(n3j),ifnjE3E1E2,^K1(n1j)ξ^K2(n2j),ifnjE1E2E3,^K2(n2j)ξ^K3(n3j),ifnjE2E3E1,^K3(n3j)ξ^K1(n1j),ifnjE3E1E2,^K1(n1j)ξ^K2(n2j)ξ^K3(n3j),ifnjE1E2E3.

    Then ˆX(nj)=ˆY(nj), njN.

    Thus L.H.S = R.H.S.

    Hence, (ix) is hold.

    Proof. (xi) L.H.S: Let (^K2,E2) and (^K3,E3) (where ^K2:E2F(M) and ^K3:E3F(M)) be two CPHFSS on M. By definition of restricted union we have (ˆU,M) (where ˆU:MF(M)) such that

    (ˆU,M)=(^K2,E2)ξ(^K3,E3),

    where ˆU=^K2ξ^K3, M=E2E3; mjM and miM,

    mi,hˆU(rˆUx(mi)e2πiωˆUx(mi)|PˆUx)ˆU(mj) rˆUx(mi)e2πiωˆUx(mi)|PˆUx

     ={ r^K2x(mi)e2πiω^K2x(mi)|P^K2x,ifxh^K2xh^K3x,r^K3x(mi)e2πiω^K3x(mi)|P^K3x,ifxh^K3xh^K2x,max{r^K2x(mi),r^K3x(mi)}e2πimax{ω^K2x(mi),ω^K3x(mi)}|P^K2xP^K3x,ifxh^K2xh^K3x,

    As, (^K1,E1)ξ((^K2,E2)ξ(^K3,E3))=(^K1,E1)ξ(ˆU,M). Suppose that (^K1,E1)ξ(ˆU,M)=(ˆV,N) such that ˆV:NF(M), where ˆV=(^K1ξˆU), N=E1M=E1E2E3; njN,

    mi,hˆV(rˆVx(mi)e2πiωˆVx(mi)|PˆVx)ˆV(nj) rˆVx(mi)e2πiωˆVx(mi)|PˆVx

     ={ r^K1x(mi)e2πiω^K1x(mi)|P^K1x,ifxh^K1xh^K2xh^K3x,r^K2x(mi)e2πiω^K2x(mi)|P^K2x,ifxh^K2xh^K3xh^K1x,r^K3x(mi)e2πiω^K3x(mi)|P^K3x,ifxh^K3xh^K1xh^K2x,max{r^K1x(mi),r^K2x(mi)}e2πimax{ω^K1x(mi),ω^K2x(mi)}|P2,ifxh^K1xh^K2xh^K3x,max{r^K2x(mi),r^K3x(mi)}e2πimax{ω^K2x(mi),ω^K3x(mi)}|P3,ifxh^K2xh^K3xh^K1x,max{r^K3x(mi),r^K1x(mi)}e2πimax{ω^K3x(mi),ω^K1x(mi)}|P4,ifxh^K3xh^K1xh^K2x,max{r^K1x(mi),r^K2x(mi),r^K3x(mi)}e2πimax{ω^K2x(mi),ω^K2x(mi),ω^K3x(mi)}|P5,ifxh^K1xh^K2xh^K3x,

    where P2=P^K1xP^K2x,P3=P^K2xP^K3x,P4=P^K3xP^K1x and P5=P^K1xP^K2xP^K3x.

    R.H.S: Let (^K1,E1) and (^K2,E2) (where ^K1:E1F(M) and ^K2:E2F(M)) be two CPHFSS over M. By definition of restricted union we have (ˆQ,O) (where ˆQ:OF(M)) such that

    (ˆQ,O)=(^K1,E1)ξ(^K2,E2),

    where ˆS=^K1ξ^K2, O=E1E2; ojO and miM,

    mi,hˆQ(rˆQx(mi)e2πiωˆQx(mi)|PˆQx)ˆQ(oj) rˆQx(mi)e2πiωˆQx(mi)|PˆQx

     ={ r^K1x(mi)e2πiω^K1x(mi)|P^K1x,ifxh^K1xh^K2x,r^K2x(mi)e2πiω^K2x(mi)|P^K2x,ifxh^K2xh^K1x,max{r^K1x(mi),r^K2x(mi)}e2πimax{ω^K1x(mi),ω^K2x(mi)}|P^K1xP^K2x,ifxh^K1xh^K2x,

    As, ((^K1,E1)ξ(^K2,E2))ξ(^K3,E3)=(ˆS,P)ξ(^K3,E3). Suppose that (ˆQ,O)ξ(^K3,E3)=(ˆZ,N) such that ˆZ:NF(M), where ˆZ=(ˆQξ^K3), N=OE3=E1E2E3; njN,

    mi,hˆZ(rˆZx(mi)e2πiωˆZx(mi)|PˆZx)ˆZ(nj) rˆZx(mi)e2πiωˆZx(mi)|PˆZx

     ={ r^K1x(mi)e2πiω^K1x(mi)|P^K1x,ifxh^K1xh^K2xh^K3x,r^K2x(mi)e2πiω^K2x(mi)|P^K2x,ifxh^K2xh^K3xh^K1x,r^K3x(mi)e2πiω^K3x(mi)|P^K3x,ifxh^K3xh^K1xh^K2x,max{r^K1x(mi),r^K2x(mi)}e2πimax{ω^K1x(mi),ω^K2x(mi)}|P2,ifxh^K1xh^K2xh^K3x,max{r^K2x(mi),r^K3x(mi)}e2πimax{ω^K2x(mi),ω^K3x(mi)}|P3,ifxh^K2xh^K3xh^K1x,max{r^K3x(mi),r^K1x(mi)}e2πimax{ω^K3x(mi),ω^K1x(mi)}|P4,ifxh^K3xh^K1xh^K2x,max{r^K1x(mi),r^K2x(mi),r^K3x(mi)}e2πimax{ω^K2x(mi),ω^K2x(mi),ω^K3x(mi)}|P5,ifxh^K1xh^K2xh^K3x,

    where P2=P^K1xP^K2x,P3=P^K2xP^K3x,P4=P^K3xP^K1x and P5=P^K1xP^K2xP^K3x.

    Then ˆV(nj)=ˆZ(nj), njN.

    Thus L.H.S = R.H.S.

    Hence, (xi) is hold.

    The proof of (x) is similar to (ix) and (xii) is similar to (xi).

    Proposition 2. Given that (^K1,E1) and (^K2,E2) are any two CPHFSS on M, then the following holds:

    Involution law.

    (i). ((^K1c)c,E1)=(^K1,E1),

    De-Morgan's law.

    (ii). (^K1c,E1)ξ(^K2c,E2)=((^K1ξ^K2)c,(E1E2)),

    (iii). (^K1c,E1)ξ(^K2c,E2)=((^K1ξ^K2)c,(E1E2)),

    (iv). (^K1c,E1)ζ(^K2c,E2)=((^K1ζ^K2)c,(E1E2)),

    (v). (^K1c,E1)ζ(^K2c,E2)=((^K1ζ^K2)c,(E1E2)).

    (vi). (^K1c,E1)(^K2c,E2)=((^K1^K2)c,(E1×E2)),

    (vii). (^K1c,E1)(^K2c,E2)=((^K1^K2)c,(E1×E2)).

    Proof. (i) is straight-forward.

    (ii) L.H.S: Let (^K1,E1) and (^K2,E2) (where ^K1:E1F(M) and ^K2:E2F(M)) be two CPHFSS on M. Then by definition of complement and restricted intersection we have

    (^K1c,E1)ξ(^K2c,E2)=(ˆI,O),

    where ˆI=(^K1cξ^K2c) and O=E1E2; ojO,

    mi,hˆI(rˆIx(mi)e2πiωˆIx(mi)|PˆIx)ˆI(oj) rˆIx(mi)e2πiωˆIx(mi)|PˆIx

     ={ r^K1cx(mi)e2πiω^K1cx(mi)|P^K1cx,ifxh^K1cxh^K2cx,r^K2cx(mi)e2πiω^K2cx(mi)|P^K2cx,ifxh^K2cxh^K1cx,min{r^K1cx(mi),r^K2cx(mi)}e2πimin{ω^K1cx(mi),ω^K2cx(mi)}|P^K1cxPc^K2x,ifxh^K1cxh^K2cx.

    R.H.S: By the definition of restricted union we have (ˆQ,O)=(^K1,E1)ξ(^K2,E2) where ˆQ=^K1ξ^K2, O=E1E2ϕ; ojO and miM,

    mi,hˆQ(rˆQx(mi)e2πiωˆQx(mi)|PˆQx)ˆQ(oj) rˆQx(mi)e2πiωˆQx(mi)|PˆQx

     ={ r^K1x(mi)e2πiω^K1x(mi)|P^K1x,ifxh^K1xh^K2x,r^K2x(mi)e2πiω^K2x(mi)|P^K2x,ifxh^K2xh^K1x,max{r^K1x(mi),r^K2x(mi)}e2πimax{ω^K1x(mi),ω^K2x(mi)}|P^K1xP^K2x,ifxh^K1xh^K2x.

    Now, by the definition of complement rˆQcx(mi)e2πiωˆQcx(mi)|PˆQcx

     ={ r^K1cx(mi)e2πiω^K1cx(mi)|P^K1cx,ifxh^K1cxh^K2cx,r^K2cx(mi)e2πiω^K2cx(mi)|P^K2cx,ifxh^K2cxh^K1cx,min{r^K1cx(mi),r^K2cx(mi)}e2πimin{ω^K1cx(mi),ω^K2cx(mi)}|P^K1cxPc^K2x,ifxh^K1cxh^K2cx.

    Then, ˆI(oj)=ˆQc(oj); ojO.

    Thus L.H.S = R.H.S.

    Hence, (ii) is hold.

    Proof. (iv) L.H.S: Let (^K1,E1) and (^K2,E2) (where ^K1:E1F(M) and ^K2:E2F(M)) be two CPHFSS on M. Then by definition of complement and extended intersection we have

    (^K1c,E1)ζ(^K2c,E2)=(ˆJ,P),

    where ˆJ=(^K1cζ^K2c) and P=E1E2; pjP and miM, with p1jE1 and p2jE2.

     ˆJ(pj)={ ^K1c(p1j),ifpjE1E2,^K2c(p2j),ifpjE2E1,^K1c(p1j)ξ^K2c(p2j),ifpjE1E2.

    R.H.S: By the definition of extended union we have (ˆS,P)=(^K1,E1)ζ(^K2,E2) where ˆS=^K1ζ^K2, P=E1E2; pjP and miM, with p1jE1 and p2jE2.

     ˆS(pj)={ ^K1(p1j),ifpjE1E2,^K2(p2j),ifpjE2E1,^K1(p1j)ξ^K2(p2j),ifpjE1E2.

    Now, by the definition of complement we have

     ˆSc(pj)={ ^K1c(p1j),ifpjE1E2,^K2c(p2j),ifpjE2E1,^K1c(p1j)ξ^K2c(p2j),ifpjE1E2.

    Then, ˆJ(pj)=ˆSc(pj); pjP.

    Thus L.H.S = R.H.S.

    Hence, (iv) is hold.

    Proof. (vi) L.H.S: Let (^K1,E1) and (^K2,E2) (where ^K1:E1F(M) and ^K2:E2F(M)) be two CPHFSS on M. Then by definition of complement and soft max-AND operation we have

    (^K1c,E1)(^K2c,E2)=(ˆJ,L),

    where ˆJ=(^K1c^K2c) and L=E1×E2; (li,lj)(E1×E2),li,ljΛ,

    mi,hˆJ(rˆJx(mi)e2πiωˆJx(mi)|PˆJx)ˆJ(li,lj) rˆJx(mi)e2πiωˆJx(mi)|PˆJx

     ={ r^K1cx(mi)e2πiω^K1cx(mi)|P^K1cx,ifxh^K1cxh^K2cx,r^K2cx(mi)e2πiω^K2cx(mi)|P^K2cx,ifxh^K2cxh^K1cx,max{r^K1cx(mi),r^K2cx(mi)}e2πimax{ω^K1cx(mi),ω^K2cx(mi)}|P^K1cxP^K2cx,ifxh^K1cxh^K2cx.

    R.H.S: By the definition of soft min-OR we have

    (^K1,E1)(^K2,E2)=(ˆR,L),

    where ˆR:LF(M) such that ˆR=^K1^K2 and L=E1×E2; (li,lj)(E1×E2),li,ljΛ.

    mi,hˆR(rˆRx(mi)e2πiωˆRx(mi)|PˆRx)ˆR(li,lj)rˆRx(mi)e2πiωˆRx(mi)|PˆRx

     ={ r^K1x(mi)e2πiω^K1x(mi)|P^K1x,ifxh^K1xh^K2x,r^K2x(mi)e2πiω^K2x(mi)|P^K2x,ifxh^K2xh^K1x,min{r^K1x(mi),r^K2x(mi)}e2πimin{ω^K1x(mi),ω^K2x(mi)}|P^K1xP^K2x,ifxh^K1xh^K2x.

    Now, by the definition of complement we have rˆRcx(mi)e2πiωˆRcx(mi)|PcˆRx

     ={ r^K1cx(mi)e2πiω^K1cx(mi)|P^K1cx,ifxh^K1cxh^K2cx,r^K2cx(mi)e2πiω^K2cx(mi)|P^K2cx,ifxh^K2cxh^K1cx,max{r^K1cx(mi),r^K2cx(mi)}e2πimax{ω^K1cx(mi),ω^K2cx(mi)}|P^K1cxP^K2cx,ifxh^K1cxh^K2cx.

    Then, ˆJ(li,lj)=ˆRc(li,lj); (li,lj)(E1×E2).

    Thus L.H.S = R.H.S.

    Hence, (vi) is hold.

    The proof of (iii) is similar to (ii), (v) is similar to (iv) and (vii) is similar to (vi).

    In this section, we will present the algorithms by comparison method, soft max-AND operation and soft min-OR operation on one and two complex probabilistic hesitant fuzzy soft sets for decision making. If the evaluation is done by single expert then we use Algorithm 1. If the evaluation is done by two experts and the person wants the decision based on supreme quality of parameters then we use Algorithm 2 and if the evaluation is done by two experts and the person wants the decision based on lowest quality of parameters then we use Algorithm 3. If the experts are more than two then the Algorithms 2 and 3 can also be used with the same working policy except where we use two sets in Step 2 we will use more than two sets with the same selection.

    Definition 18. In the comparison algorithm the score function ˉS is defined as

    ˉS=(˜S(rˆK)+˜S(ωˆK))טS(PˆK),

    where ˜S(rˆK) is obtained by subtracting the column sum from the row sum of amplitude terms in the comparison table, ˜S(ωˆK) is obtained by subtracting the column sum from the row sum of phase terms in the comparison table, and ˜S(PˆK) is obtained by taking the product of probability choice values.

    Algorithm 1: Proposed Algorithm-1
    Step 1: Input universal set M={m1,m2,m3,...,ml} and set of attributes E where EG.
    Step 2: Design CPHFSS (ˆK,E) where ˆK:EF(M) on M.
    Step 3: Design tables for complex valued membership hˆK(rˆKx(mi)e2πiωˆKx(mi)|PˆKx) of CPHFSS (ˆK,E) separately for rˆK, ωˆK and PˆK.
    Step 4: Compute the choice value ˇC in the tabular form for amplitude term ˇC(rˆK) and phase term ˇC(ωˆK) by taking average of hesitant fuzzy set and for probability ˇC(PˆK) by taking their product.
    Step 5: Compute the comparison tables for amplitude term ˜C(rˆK) and phase term ˜C(ωˆK), where ˜C(mi,mˊi)=ejE (if mi w.r.t ejmˊi w.r.t ej then 1 otherwise 0) where i,ˊi={1,2,3,..., no. of the universal elements}.
    Step 6: Calculate the ˜S(rˆK), ˜S(ωˆK) and ˜S(PˆK) by using Definition 18.
    Step 7: Evaluate the final score ˉS by using Definition 18.
    Step 8: Any of the alternative is selected as optimal decision with the highest score value.

    The flow chart of Algorithm 1 is given in Figure 1.

    Figure 1.  Flow chart of Algorithm 1.

    Algorithm 2: Proposed Algorithm-2
    Step 1: Input universal set M={m1,m2,m3,...,ml} and set of attributes E where EG.
    Step 2: Design two CPHFSSs (^K1,E1) and (^K2,E2) (where ^K1:E1F(M) and ^K2:E2F(M)) on universal set M.
    Step 3: Evaluate
    (ˆQ,L)=(^K1,E1)(^K2,E2),
    where ˆQ:LF(M); (li,lj)(E1×E2),li,ljΛ.
    Step 4: Figure out the choice value (li,lj)(mi);miM,(li,lj)(E1×E2) defined as
    (li,lj)(mi)=x(rˆQx(mi)×ωˆQx(mi))x(rˆQx(mi))|xPˆQx,
    where x=1,2,3,...,n and n is the number of possible elements in hˆQ(rˆQx(mi)e2πiωˆQx(mi)|PˆQx).
    Step 5: Figure out the score values S(li,lj)(mi) by product of the maximum of (li,lj) against each mi with corresponding probability.
    Step 6: The weighted value for each S(li,lj)(mi) is:
    S(mi)=(li,lj))(E1×E2)S(li,lj)(mi).
    Step 7: Any of the alternative is selected as optimal decision for which:
    ¥=max{S(m1),S(m2),...,S(ml)}.

    The flow chart of Algorithm 2 is given in Figure 2.

    Figure 2.  Flow chart of Algorithm 2.

    Algorithm 3: Proposed Algorithm-3
    Step 1: Input universal set M={m1,m2,m3,...,ml} and set of attributes E where EG.
    Step 2: Design two CPHFSSs (^K1,E1) and (^K2,E2) (where ^K1:E1F(M) and ^K2:E2F(M)) on universal set M.
    Step 3: Evaluate
    (ˆR,L)=(^K1,E1)(^K2,E2),
    where ˆR:LF(M); (li,lj)(E1×E2),li,ljΛ.
    Step 4: Figure out the choice value (li,lj)(mi);miM,(li,lj)(E1×E2) defined as
    (li,lj)(mi)=x(rˆQx(mi)×ωˆQx(mi))x(rˆQx(mi))|xPˆQx,
    where x=1,2,3,...,n and n is the number of possible elements in hˆQ(rˆQx(mi)e2πiωˆQx(mi)|PˆQx).
    Step 5: Figure out the score values S(li,lj)(mi) by product of the maximum of (li,lj) against each mi with corresponding probability.
    Step 6: The weighted value for each S(li,lj)(mi) is
    S(mi)=(li,lj))(E1×E2)S(li,lj)(mi).
    Step 7: Any of the alternative is selected as optimal decision for which
    ¥=max{S(m1),S(m2),...,S(ml)}.

    The flow chart of Algorithm 3 is given in Figure 3.

    Figure 3.  Flow chart of Algorithm 3.

    In this section, we illustrate applications and case studies of our proposed sets to manifest the integrity and supremacy of the explored work. In this paper, we deal with hesitancy, randomness, and fuzziness using parameterized families simultaneously, which is efficient and useful. Complex probabilistic hesitant fuzzy sets play a very significant role in decision making. It helps to save time while dealing with hesitancy, randomness, and fuzziness separately. In this paper, the membership function is in complex form. In the engineering field, complex forms or complex numbers play a very very significant role. For example, in the modelling of bridges, signal processing, computational intelligence, data analysis, image processing, radar systems, mobile communication systems, computer graphics, launching a satellite, electrical appliances, and many more.

    One of the biggest failures due to lack of knowledge of complex numbers is, the Tacoma Bridge in the USA in Washington State near Puget Sound, which was opened on 1st July 1940, but unfortunately on 7th November 1940 it collapsed for certain reasons [49]. In the modeling of bridges, the imaginary part of complex numbers measures the frequency of the vibrations, and the real part gives you the measure of the amount of decay in the motion. Professor Ahmer Wadee of Imperial College London spoke about the strength of complex numbers and how they work to keep bridges from collapsing [50].

    Case study 1. A suspension bridge can be characterized as a pedestrian bridge or footbridge, a very environment-friendly, light-weight shape that allows pedestrians to go through risky areas such as highways, rivers, and ravines. Suspension bridges can span somewhere between 2, 000 to 13, 000 feet, which is farther than different kinds of bridges. This is why it is frequently the layout of preference when connecting very far-off locations. Suspension bridges are an antique but smart technology.

    Suppose the X country wants to construct the world's best suspension bridge and M={m1,m2, m3,m4,m5} be the set of the engineers who presented the bridge model. The government wants to take into account the following three specific features E={e1,e2,e3} where e1= "capability to bear forces (such as wind force, gravity force, restoring force)", e2="safety during natural disasters" and e3="durability". The government wants to select the best model among them. As a result, experts gave the CPHFSS (ˆK,E) which furnishes an approximate narration of complex probabilistic hesitant fuzzy information of five models of engineers and their features represented in the Table 9.

    Table 9.  Tabular representation of CPHFSS (ˆK,E).
    (ˆK,E) e1 e2 e3
    m1 {0.4e2πi0.8|0.7,0.2e2πi0.6|0.2,0.3e2πi0.2|0.1} {0.7e2πi0.7|0.4,0.1e2πi0.5|0.3,0.3e2πi0.9|0.3} {0.9e2πi0.9|0.6,0.8e2πi0.1|0.4}
    m2 {0.1e2πi0.7|0.8,0.8e2πi0.3|0.2} {0.4e2πi0.5|0.5,0.5e2πi0.4|0.5} {0.2e2πi0.3|1}
    m3 {0.2e2πi0.6|1} {0.8e2πi0.3|1} {0.7e2πi0.3|0.9,0.9e2πi0.7|0.1}
    m4 {0.5e2πi0.5|0.7,0.7e2πi0.8|0.3} {0.8e2πi0.6|0.2,0.9e2πi0.5|0.3,0.8e2πi0.8|0.5} {0.3e2πi0.4|0.8,0.7e2πi0.8|0.2}
    m5 {0.5e2πi0.3|1} {0.3e2πi0.8|0.9,0.9e2πi0.7|0.1} {0.7e2πi0.7|1}

     | Show Table
    DownLoad: CSV

    For illustration, the above table is of CPHFSS (ˆK,E) established on specific parameters (forces, safety, and durability) of the bridge models presented by engineers. Where the top left cell contains the complex membership of the bridge model of m1 with respect to e1 = forces. Similarly, the bottom right cell contains the complex membership of the bridge model of m5 with respect to e3 = durability.

    By using Step 3 of the Algorithm 1, Tables 1012 represent the complex membership values for the amplitude term, phase term, and probability separately.

    Table 10.  Tabular representation of the membership of amplitude term.
    rˆK e1 e2 e3
    m1 {0.4,0.2,0.3} {0.7,0.1,0.3} {0.9,0.8}
    m2 {0.1,0.8} {0.4,0.5} {0.2}
    m3 {0.2} {0.8} {0.7,0.9}
    m4 {0.5,0.7} {0.8,0.9,0.8} {0.30.7}
    m5 {0.5} {0.3,0.9} {0.7}

     | Show Table
    DownLoad: CSV
    Table 11.  Tabular representation of the membership of phase term.
    ωˆK e1 e2 e3
    m1 {0.8,0.6,0.2} {0.7,0.5,0.9} {0.9,0.1}
    m2 {0.7,0.3} {0.5,0.4} {0.3}
    m3 {0.6} {0.3} {0.3,0.7}
    m4 {0.5,0.8} {0.6,0.5,0.8} {0.4,0.8}
    m5 {0.3} {0.8,0.7} {0.7}

     | Show Table
    DownLoad: CSV
    Table 12.  Tabular representation of the probability of membership.
    PˆK e1 e2 e3
    m1 {0.7,0.2,0.1} {0.4,0.3,0.3} {0.6,0.4}
    m2 {0.8,0.2} {0.5,0.5} {1}
    m3 {1} {1} {0.9,0.1}
    m4 {0.7,0.3} {0.2,0.3,0.5} {0.8,0.2}
    m5 {1} {0.9,0.1} {1}

     | Show Table
    DownLoad: CSV

    Computation by using Step 4 of the Algorithm 1, Tables 1315 represent the choice values for amplitude term, phase term, and probability separately.

    Table 13.  Choice value of amplitude term.
    ˇC(rˆK) e1 e2 e3
    m1 0.3 0.36 0.85
    m2 0.45 0.45 0.2
    m3 0.2 0.8 0.8
    m4 0.6 0.83 0.5
    m5 0.5 0.6 0.7

     | Show Table
    DownLoad: CSV
    Table 14.  Choice value of phase term.
    ˇC(ωˆK) e1 e2 e3
    m1 0.53 0.7 0.5
    m2 0.5 0.45 0.3
    m3 0.6 0.3 0.5
    m4 0.65 0.63 0.6
    m5 0.3 0.75 0.7

     | Show Table
    DownLoad: CSV
    Table 15.  Choice value of probability.
    ˇC(PˆK) e1 e2 e3
    m1 0.014 0.036 0.24
    m2 0.16 0.25 1
    m3 1 1 0.09
    m4 0.21 0.03 0.16
    m5 1 0.09 1

     | Show Table
    DownLoad: CSV

    Computation by using Step 5 of the Algorithm 1, Tables 16 and 17 represent the comparison of amplitude term and phase term.

    Table 16.  Comparision table for amplitude term.
    ˜C(rˆK) m1 m2 m3 m4 m5
    m1 3 1 2 1 1
    m2 2 3 1 0 0
    m3 1 2 3 1 2
    m4 2 3 2 3 2
    m5 2 3 1 1 3

     | Show Table
    DownLoad: CSV
    Table 17.  Comparison table for phase term.
    ˜C(ωˆK) m1 m2 m3 m4 m5
    m1 3 3 2 1 1
    m2 0 3 1 0 1
    m3 2 2 3 0 1
    m4 2 3 3 3 1
    m5 2 2 2 2 3

     | Show Table
    DownLoad: CSV

    Evaluation by using Step 6 of the Algorithm 1, Table 18 represent the score values of ˜S(rˆK), ˜S(ωˆK) and ˜S(PˆK).

    Table 18.  Score values.
    row sum ˜C(rˆK) col. sum ˜C(rˆK)} ˜S(rˆK) row sum ˜C(ωˆK)} col. sum ˜C(ωˆK)} ˜S(ωˆK) ˜S(PˆK)
    m1 8 10 -2 10 9 1 0.00012096
    m2 6 12 -6 5 13 -8 0.04
    m3 9 9 0 8 11 -3 0.09
    m4 12 6 6 12 6 6 0.001008
    m5 10 8 2 11 7 4 0.09

     | Show Table
    DownLoad: CSV

    Evaluation by using Step 7 of the Algorithm 1, the final score ˉS is

    ˉS(m1)=0.00012,ˉS(m2)=0.56,ˉS(m3)=0.27,ˉS(m4)=0.012096,ˉS(m5)=0.54.

    By using Step 8 of the Algorithm 1, the best bridge model among five engineers is of m5. So, the government will select the model of m5 engineer to build the suspension bridge.

    The graphical representation of ranking is given in Figure 4.

    Figure 4.  Ranking results.

    Case study 2. Circuit simulation is an essential phase of developing digital products. With the assistance of simulators, we are able to compute the competencies of circuits as well as analyze their overall performance without making the circuit. It is cost effiient as well as time-saving. With the assistance of software, we can design complicated circuits in no time.

    There is a wide range of circuit simulator software and equipment in the market. For instance, Proteus, Droid Tesla, NI's Multisim, Ngspice, Synopsys, Cadence Spectre, PSIM and many more. These assist agencies by means of saving their time and money. However, it is difficult to pick out exceptional circuit simulation software by giving a significant number of options.

    Suppose the manager of the multinational company Y wants to buy complicated multi-purpose circuit simulator software. For that, the manager hires the two experts and provides them with five circuit simulator software and M={m1,m2, m3,m4,m5} be the set of the simulator softwares. The two experts evaluate with CPHF information based on the given set of parameters G. Let the first expert ^K1 evaluate with the set of parameters E1={e1,e2,e3,e4}G and the second expert ^K2 evaluate with the set of parameters E2={e5,e6,e7,e8}G where e1= library parts, e2= 3D viewing features, e3= graphical representation, e4= analog and digital components, e5= real looking, e6= draw circuit quickly, e7= readymade circuit and e8= expensive. The manager wants to buy the circuit simulator software, which consists of supreme quality parameters. Then the right decision for selecting the software is done by using the max-AND operator. The evaluation given by the experts is presented in Tables 19 and 20.

    Table 19.  Tabular representation of CPHFSS (^K1,E1).
    (^K1,E1) e1 e2 e3 e4
    m1 {0.2e2πi0.1|0.7,0.7e2πi0.7|0.3} {0.3e2πi0.8|0.6,0.9e2πi0.1|0.4} {0.1e2πi0.4|1} {0.6e2πi0.1|0.1,0.7e2πi0.5|0.1,0.3e2πi0.3|0.8}
    m2 {0.9e2πi0.4|0.8,0.7e2πi0.8|0.2} {0.5e2πi0.8|1} {0.1e2πi0.2|0.9,0.2e2πi0.3|0.1} {0.1e2πi0.3|1}
    m3 {0.4e2πi0.4|1} {0.6e2πi0.9|0.2,0.8e2πi0.4|0.4,0.7e2πi0.1|0.4} {0.1e2πi0.1|0.8,0.7e2πi0.3|0.2} {0.2e2πi0.9|0.6,0.3e2πi0.5|0.4}
    m4 {0.3e2πi0.6|0.1,0.9e2πi0.2|0.2,0.5e2πi0.8|0.7} {0.4e2πi0.1|1} {0.7e2πi0.2|0.7,0.2e2πi0.4|0.3} {0.6e2πi0.9|0.6,0.4e2πi0.7|0.4}
    m5 {0.3e2πi0.3|1} {0.9e2πi0.3|0.9,0.8e2πi0.8|0.1} {0.5e2πi0.1|0.2,0.9e2πi0.4|0.3,0.6e2πi0.6|0.5} {0.2e2πi0.8|1}

     | Show Table
    DownLoad: CSV
    Table 20.  Tabular representation of CPHFSS (^K2,E2).
    (^K2,E2) e5 e6 e7 e8
    m1 {0.6e2πi0.5|1} {0.2e2πi0.7|0.3,0.1e2πi0.6|0.3,0.3e2πi0.3|0.4} {0.4e2πi0.9|0.3,0.7e2πi0.2|0.7} {0.6e2πi0.7|0.2,0.7e2πi0.8|0.8}
    m2 {0.4e2πi0.3|0.2,0.9e2πi0.8|0.2,0.1e2πi0.7|0.6} {0.1e2πi0.1|1} {0.8e2πi0.4|0.3,0.9e2πi0.2|0.7} {0.7e2πi0.9|0.6,0.9e2πi0.7|0.4}
    m3 {0.7e2πi0.9|1} {0.1e2πi0.3|0.5,0.2e2πi0.4|0.5} {0.6e2πi0.3|0.2,0.6e2πi0.7|0.4,0.8e2πi0.9|0.4} {0.2e2πi0.6|1}
    m4 {0.2e2πi0.6|0.2,0.8e2πi0.2|0.8} {0.6e2πi0.5|0.1,0.3e2πi0.3|0.9} {0.5e2πi0.7|1} {0.2e2πi0.8|0.3,0.5e2πi0.4|0.3,0.8e2πi0.1|0.4}
    m5 {0.3e2πi0.3|0.2,0.5e2πi0.3|0.8} {0.1e2πi0.2|0.2,0.3e2πi0.4|0.3,0.6e2πi0.3|0.5} {0.8e2πi0.3|0.3,0.8e2πi0.6|0.7} {0.9e2πi0.3|1}

     | Show Table
    DownLoad: CSV

    Evaluate the soft max-AND operation (ˆQ,L)=(^K1,E1)(^K2,E2) by using Step 3 of Algorithm 2, represented in Table 21.

    Table 21.  Evaluation by using soft max-AND operation.
    (ˆQ,L) (e1×e5) (e1×e6) (e1×e7) (e1×e8)
    m1 {0.6e2πi0.5|0.7,0.7e2πi0.7|0.3} {0.2e2πi0.7|0.21,0.7e2πi0.7|0.09,0.3e2πi0.3|0.4} {0.4e2πi0.9|0.210.7e2πi0.7|0.21} {0.6e2πi0.7|0.14,0.7e2πi0.8|0.24}
    m2 {0.9e2πi0.4|0.16,0.9e2πi0.8|0.04,0.1e2πi0.7|0.6} {0.9e2πi0.4|0.8,0.7e2πi0.8|0.2} {0.9e2πi0.4|0.24,0.9e2πi0.8|0.14} {0.9e2πi0.9|0.48,0.9e2πi0.8|0.08}
    m3 {0.7e2πi0.9|1} {0.4e2πi0.4|0.5,0.2e2πi0.4|0.5} {0.6e2πi0.4|0.2,0.6e2πi0.7|0.4,0.8e2πi0.9|0.4} {0.4e2πi0.6|1}
    m4 {0.3e2πi0.6|0.02,0.9e2πi0.2|0.16,0.5e2πi0.8|0.7} {0.6e2πi0.6|0.01,0.9e2πi0.3|0.18,0.5e2πi0.8|0.7} {0.5e2πi0.7|0.1,0.9e2πi0.2|0.2,0.5e2πi0.8|0.7} {0.3e2πi0.8|0.03,0.9e2πi0.4|0.06,0.8e2πi0.8|0.28}
    m5 {0.3e2πi0.3|0.2,0.5e2πi0.3|0.8} {0.3e2πi0.3|0.2,0.3e2πi0.4|0.3,0.6e2πi0.3|0.5} {0.8e2πi0.3|0.3,0.8e2πi0.6|0.7} {0.9e2πi0.3|1}
    (ˆQ,L) (e2×e5) (e2×e6) (e2×e7) (e2×e8)
    m1 {0.6e2πi0.8|0.6,0.9e2πi0.1|0.4} {0.3e2πi0.8|0.18,0.9e2πi0.6|0.120.3e2πi0.3|0.4} {0.4e2πi0.9|0.18,0.9e2πi0.2|0.28} {0.6e2πi0.8|0.12,0.9e2πi0.8|0.32}
    m2 {0.5e2πi0.8|0.2,0.9e2πi0.8|0.2,0.1e2πi0.7|0.6} {0.5e2πi0.8|1} {0.8e2πi0.8|0.3,0.9e2πi0.2|0.7} {0.7e2πi0.9|0.6,0.9e2πi0.7|0.4}
    m3 {0.7e2πi0.9|0.2,0.8e2πi0.4|0.4,0.7e2πi0.1|0.4} {0.6e2πi0.9|0.1,0.8e2πi0.4|0.2,0.7e2πi0.1|0.4} {0.6e2πi0.9|0.04,0.8e2πi0.7|0.160.8e2πi0.9|0.16} {0.6e2πi0.9|0.2,0.8e2πi0.4|0.4,0.7e2πi0.1|0.4}
    m4 {0.4e2πi0.6|0.2,0.8e2πi0.2|0.8} {0.6e2πi0.5|0.1,0.3e2πi0.3|0.9} {0.5e2πi0.7|1} {0.4e2πi0.8|0.3,0.5e2πi0.4|0.3,0.8e2πi0.1|0.4}
    m5 {0.9e2πi0.3|0.18,0.8e2πi0.8|0.08} {0.9e2πi0.3|0.18,0.8e2πi0.8|0.03,0.6e2πi0.3|0.5} {0.9e2πi0.3|0.27,0.8e2πi0.8|0.07} {0.9e2πi0.3|0.9,0.8e2πi0.8|0.1}
    (ˆQ,L) (e3×e5) (e3×e6) (e3×e7) (e3×e8)
    m1 {0.6e2πi0.5|1} {0.2e2πi0.7|0.3,0.1e2πi0.6|0.3,0.3e2πi0.3|0.4} {0.4e2πi0.9|0.3,0.7e2πi0.2|0.7} {0.6e2πi0.7|0.2,0.7e2πi0.8|0.8}
    m2 {0.4e2πi0.3|0.18,0.9e2πi0.8|0.02,0.1e2πi0.7|0.6} {0.1e2πi0.2|0.9,0.2e2πi0.3|0.1} {0.8e2πi0.4|0.27,0.9e2πi0.3|0.07} {0.7e2πi0.9|0.54,0.9e2πi0.7|0.04}
    m3 {0.7e2πi0.9|0.8,0.7e2πi0.3|0.2} {0.1e2πi0.3|0.4,0.7e2πi0.4|0.1} {0.6e2πi0.3|0.16,0.7e2πi0.7|0.08,0.8e2πi0.9|0.4} {0.2e2πi0.6|0.8,0.7e2πi0.3|0.2}
    m4 {0.7e2πi0.6|0.14,0.8e2πi0.4|0.24} {0.7e2πi0.5|0.07,0.3e2πi0.4|0.27} {0.7e2πi0.7|0.7,0.2e2πi0.4|0.3} {0.7e2πi0.8|0.21,0.5e2πi0.4|0.09,0.8e2πi0.1|0.4}
    m5 {0.5e2πi0.3|0.04,0.9e2πi0.4|0.24,0.6e2πi0.6|0.5} {0.5e2πi0.2|0.04,0.9e2πi0.4|0.09,0.6e2πi0.6|0.25} {0.8e2πi0.3|0.06,0.9e2πi0.6|0.21,0.6e2πi0.6|0.5} {0.9e2πi0.3|0.2,0.9e2πi0.4|0.3,0.6e2πi0.6|0.5}
    (ˆQ,L) (e4×e5) (e4×e6) (e4×e7) (e4×e8)
    m1 {0.6e2πi0.5|0.1,0.7e2πi0.5|0.1,0.3e2πi0.3|0.8} {0.6e2πi0.7|0.03,0.7e2πi0.6|0.03,0.3e2πi0.3|0.32} {0.6e2πi0.9|0.03,0.7e2πi0.5|0.07,0.3e2πi0.3|0.8} {0.6e2πi0.7|0.02,0.7e2πi0.8|0.08,0.3e2πi0.3|0.8}
    m2 {0.4e2πi0.3|0.2,0.9e2πi0.8|0.2,0.1e2πi0.7|0.6} {0.1e2πi0.3|1} {0.8e2πi0.4|0.3,0.9e2πi0.2|0.7} {0.7e2πi0.9|0.6,0.9e2πi0.7|0.4}
    m3 {0.7e2πi0.9|0.6,0.3e2πi0.5|0.4} {0.2e2πi0.9|0.3,0.3e2πi0.5|0.2} {0.6e2πi0.9|0.12,0.6e2πi0.7|0.16,0.8e2πi0.9|0.4} {0.2e2πi0.9|0.6,0.3e2πi0.5|0.4}
    m4 {0.6e2πi0.9|0.12,0.8e2πi0.7|0.32} {0.6e2πi0.9|0.06,0.4e2πi0.7|0.36} {0.6e2πi0.9|0.6,0.4e2πi0.7|0.4} {0.6e2πi0.9|0.18,0.5e2πi0.7|0.12,0.8e2πi0.1|0.4}
    m5 {0.3e2πi0.8|0.2,0.5e2πi0.3|0.8} {0.2e2πi0.8|0.2,0.3e2πi0.4|0.3,0.6e2πi0.3|0.5} {0.8e2πi0.8|0.3,0.8e2πi0.6|0.7} {0.9e2πi0.8|1}

     | Show Table
    DownLoad: CSV

    Computation of the choice value (li,lj)(mi);miM,(li,lj)(E1×E2) by using Step 4 of the Algorithm 2, represented in Table 22.

    Table 22.  Tabular representation of choice value.
    (e1×e1) (e1×e2) (e1×e3) (e1×e4)
    m1 0.60769|0.21 0.6|0.00756 0.77272|0.0441 0.75384|0.0336
    m2 0.60526|0.00384 0.575|0.16 0.6|0.0336 0.85|0.0384
    m3 0.9|1 0.4|0.25 0.69|0.032 0.6|1
    m4 0.44705|0.00224 0.515|0.00126 0.48947|0.014 0.62|0.000504
    m5 0.3|0.16 0.325|0.03 0.45|0.21 0.3|1
    (e2×e1) (e2×e2) (e2×e3) (e2×e4)
    m1 0.38|0.24 0.58|0.00864 0.41538|0.0504 0.8|0.0384
    m2 0.79333|0.024 0.8|1 0.48235|0.21 0.7875|0.24
    m3 0.46363|0.032 0.44285|0.008 0.82727|0.001024 0.44285|0.032
    m4 0.33333|0.16 0.43333|0.09 0.7|1 0.35294|0.036
    m5 0.53529|0.0144 0.47391|0.0027 0.53529|0.0189 0.53529|0.09
    (e3×e1) (e3×e2) (e3×e3) (e3×e4)
    m1 0.5|1 0.48333|0.036 0.45454|0.21 0.75384|0.16
    m2 0.65|0.00216 0.26666|0.09 0.34705|0.0189 0.7875|0.0216
    m3 0.6|0.16 0.3875|0.04 0.66190|0.00512 0.36666|0.16
    m4 0.49333|0.0336 0.47|0.0189 0.63333|0.21 0.42|0.00756
    m5 0.435|0.0048 0.41|0.0009 0.49565|0.0063 0.4125|0.03
    (e4×e1) (e4×e2) (e4×e3) (e4×e4)
    m1 0.4625|0.008 0.58125|0.000288 0.6125|0.00168 0.66875|0.00128
    m2 0.65|0.024 0.3|1 0.29411|0.21 0.7875|0.24
    m3 0.78|0.24 0.66|0.06 0.84|0.00768 0.66|0.24
    m4 0.78571|0.0384 0.82|0.0216 0.82|0.24 0.51052|0.00864
    m5 0.4875|0.16 0.41818|0.03 0.7|0.21 0.8|1

     | Show Table
    DownLoad: CSV

    Computation of the the score values S(li,lj)(mi) by using Step 5 of Algorithm 2, represented in Table 23.

    Table 23.  Tabular representation of score value.
    S(li,lj)(mi) The Score S(li,lj)(mi) The Score
    S(e1×e1)(m3) 0.9 S(e3×e1)(m2) 0.00140
    S(e1×e2)(m1) 0.00453 S(e3×e2)(m1) 0.0174
    S(e1×e3)(m1) 0.03407 S(e3×e3)(m3) 0.00338
    S(e1×e4)(m2) 0.03264 S(e3×e4)(m2) 0.01701
    S(e2×e1)(m2) 0.01904 S(e4×e1)(m4) 0.03017
    S(e2×e2)(m2) 0.8 S(e4×e2)(m4) 0.01771
    S(e2×e3)(m3) 0.00084 S(e4×e3)(m3) 0.00645
    S(e2×e4)(m1) 0.03072 S(e4×e4)(m5) 0.8

     | Show Table
    DownLoad: CSV

    Evaluation of weighted values for each S(li,lj)(mi) by using Step 6 of Algorithm 2 is

    S(m1)=0.08673,S(m2)=0.87009,S(m3)=0.91068,S(m4)=0.04788,S(m5)=0.8.

    By using Step 7 of Algorithm 2 the best circuit simulator software is m3. So, the manager will buy the m3 software.

    The graphical representation of ranking is given in Figure 5.

    Figure 5.  Ranking results.

    Case study 3. Consider the Case Study study 2. Manager wants to buy the circuit simulator software which consists of the lowest quality of parameters. Then, the right decision for selecting the software is done by using the min-OR operator. Evaluation given by the experts is represented in Tables 19 and 20.

    First of all evaluate the soft min-OR operation (ˆR,L)=(^K1,E1)(^K2,E2) by using Step 3 of Algorithm 3, represented in Table 24.

    Table 24.  Evaluation by using soft min-OR operation.
    (ˆR,L) (e1×e5) (e1×e6) (e1×e7) (e1×e8)
    m1 {0.2e2πi0.1|0.7,0.7e2πi0.7|0.3} {0.2e2πi0.1|0.21,0.1e2πi0.6|0.09,0.3e2πi0.3|0.4} {0.2e2πi0.1|0.210.7e2πi0.2|0.21} {0.2e2πi0.1|0.14,0.7e2πi0.7|0.24}
    m2 {0.4e2πi0.3|0.16,0.7e2πi0.8|0.04,0.1e2πi0.7|0.6} {0.1e2πi0.1|0.8,0.7e2πi0.8|0.2} {0.8e2πi0.4|0.24,0.7e2πi0.2|0.14} {0.7e2πi0.4|0.48,0.7e2πi0.7|0.08}
    m3 {0.4e2πi0.4|1} {0.1e2πi0.3|0.5,0.2e2πi0.4|0.5} {0.4e2πi0.3|0.2,0.6e2πi0.7|0.4,0.8e2πi0.9|0.4} {0.2e2πi0.4|1}
    m4 {0.2e2πi0.6|0.02,0.8e2πi0.2|0.16,0.5e2πi0.8|0.7} {0.3e2πi0.5|0.01,0.3e2πi0.2|0.18,0.5e2πi0.8|0.7} {0.3e2πi0.6|0.1,0.9e2πi0.2|0.2,0.5e2πi0.8|0.7} {0.2e2πi0.6|0.03,0.5e2πi0.2|0.06,0.5e2πi0.1|0.28}
    m5 {0.3e2πi0.3|0.2,0.5e2πi0.3|0.8} {0.1e2πi0.2|0.2,0.3e2πi0.4|0.3,0.6e2πi0.3|0.5} {0.3e2πi0.3|0.3,0.8e2πi0.6|0.7} {0.3e2πi0.3|1}
    (ˆR,L) (e2×e5) (e2×e6) (e2×e7) (e2×e8)
    m1 {0.3e2πi0.5|0.6,0.9e2πi0.1|0.4} {0.2e2πi0.7|0.18,0.1e2πi0.1|0.120.3e2πi0.3|0.4} {0.3e2πi0.8|0.18,0.7e2πi0.1|0.28} {0.3e2πi0.7|0.12,0.7e2πi0.1|0.32}
    m2 {0.4e2πi0.3|0.2,0.9e2πi0.8|0.2,0.1e2πi0.7|0.6} {0.1e2πi0.1|1} {0.5e2πi0.4|0.3,0.9e2πi0.2|0.7} {0.5e2πi0.8|0.6,0.9e2πi0.7|0.4}
    m3 {0.6e2πi0.9|0.2,0.8e2πi0.4|0.4,0.7e2πi0.1|0.4} {0.1e2πi0.3|0.1,0.2e2πi0.4|0.2,0.7e2πi0.1|0.4} {0.6e2πi0.3|0.04,0.6e2πi0.4|0.160.7e2πi0.1|0.16} {0.2e2πi0.6|0.2,0.8e2πi0.4|0.4,0.7e2πi0.1|0.4}
    m4 {0.2e2πi0.1|0.2,0.8e2πi0.2|0.8} {0.4e2πi0.1|0.1,0.3e2πi0.3|0.9} {0.4e2πi0.1|1} {0.2e2πi0.1|0.3,0.5e2πi0.4|0.3,0.8e2πi0.1|0.4}
    m5 {0.3e2πi0.3|0.18,0.5e2πi0.3|0.08} {0.1e2πi0.2|0.18,0.3e2πi0.4|0.03,0.6e2πi0.3|0.5} {0.8e2πi0.3|0.27,0.8e2πi0.6|0.07} {0.9e2πi0.3|0.9,0.8e2πi0.8|0.1}
    (ˆR,L) (e3×e5) (e3×e6) (e3×e7) (e3×e8)
    m1 {0.1e2πi0.4|1} {0.1e2πi0.4|0.3,0.1e2πi0.6|0.3,0.3e2πi0.3|0.4} {0.1e2πi0.4|0.3,0.7e2πi0.2|0.7} {0.1e2πi0.4|0.2,0.7e2πi0.8|0.8}
    m2 {0.1e2πi0.2|0.18,0.2e2πi0.3|0.02,0.1e2πi0.7|0.6} {0.1e2πi0.1|0.9,0.2e2πi0.3|0.1} {0.1e2πi0.2|0.27,0.1e2πi0.2|0.07} {0.1e2πi0.2|0.54,0.2e2πi0.3|0.04}
    m3 {0.1e2πi0.1|0.8,0.7e2πi0.3|0.2} {0.1e2πi0.1|0.4,0.2e2πi0.3|0.1} {0.1e2πi0.1|0.16,0.6e2πi0.3|0.08,0.8e2πi0.9|0.4} {0.1e2πi0.1|0.8,0.7e2πi0.3|0.2}
    m4 {0.2e2πi0.2|0.14,0.2e2πi0.2|0.24} {0.6e2πi0.2|0.07,0.2e2πi0.3|0.27} {0.5e2πi0.2|0.7,0.2e2πi0.4|0.3} {0.2e2πi0.2|0.21,0.2e2πi0.4|0.09,0.8e2πi0.1|0.4}
    m5 {0.3e2πi0.1|0.04,0.5e2πi0.3|0.24,0.6e2πi0.6|0.5} {0.1e2πi0.1|0.04,0.3e2πi0.4|0.09,0.6e2πi0.3|0.25} {0.5e2πi0.1|0.06,0.8e2πi0.4|0.21,0.6e2πi0.6|0.5} {0.5e2πi0.1|0.2,0.9e2πi0.4|0.3,0.6e2πi0.6|0.5}
    (ˆR,L) (e4×e5) (e4×e6) (e4×e7) (e4×e8)
    m1 {0.6e2πi0.1|0.1,0.7e2πi0.5|0.1,0.3e2πi0.3|0.8} {0.2e2πi0.1|0.03,0.1e2πi0.5|0.03,0.3e2πi0.3|0.32} {0.4e2πi0.1|0.03,0.7e2πi0.2|0.07,0.3e2πi0.3|0.8} {0.6e2πi0.1|0.02,0.7e2πi0.5|0.08,0.3e2πi0.3|0.8}
    m2 {0.1e2πi0.3|0.2,0.9e2πi0.8|0.2,0.1e2πi0.7|0.6} {0.1e2πi0.1|1} {0.1e2πi0.3|0.3,0.9e2πi0.2|0.7} {0.1e2πi0.3|0.6,0.9e2πi0.7|0.4}
    m3 {0.2e2πi0.9|0.6,0.3e2πi0.5|0.4} {0.1e2πi0.3|0.3,0.2e2πi0.4|0.2} {0.2e2πi0.3|0.12,0.3e2πi0.5|0.16,0.8e2πi0.9|0.4} {0.2e2πi0.6|0.6,0.3e2πi0.5|0.4}
    m4 {0.2e2πi0.6|0.12,0.4e2πi0.2|0.32} {0.6e2πi0.5|0.06,0.3e2πi0.3|0.36} {0.5e2πi0.7|0.6,0.4e2πi0.7|0.4} {0.2e2πi0.8|0.18,0.4e2πi0.4|0.12,0.8e2πi0.1|0.4}
    m5 {0.2e2πi0.3|0.2,0.5e2πi0.3|0.8} {0.1e2πi0.2|0.2,0.3e2πi0.4|0.3,0.6e2πi0.3|0.5} {0.2e2πi0.3|0.3,0.8e2πi0.6|0.7} {0.2e2πi0.3|1}

     | Show Table
    DownLoad: CSV

    Computation of the choice value (li,lj)(mi);miM,(li,lj)(E1×E2) by using Step 4 of Algorithm 3, represented in Table 25.

    Table 25.  Tabular representation of choice value.
    (e1×e1) (e1×e2) (e1×e3) (e1×e4)
    m1 0.56666|0.21 0.28333|0.00756 0.17777|0.0441 0.56666|0.0336
    m2 0.625|0.00384 0.7125|0.16 0.30666|0.0336 0.55|0.0384
    m3 0.4|1 0.36666|0.25 0.7|0.032 0.4|1
    m4 0.45333|0.00224 0.55454|0.00126 0.44705|0.014 0.225|0.000504
    m5 0.3|0.16 0.32|0.03 0.51818|0.21 0.3|1
    (e2×e1) (e2×e2) (e2×e3) (e2×e4)
    m1 0.2|0.24 0.4|0.00864 0.31|0.0504 0.28|0.0384
    m2 0.65|0.024 0.1|1 0.27142|0.21 0.73571|0.24
    m3 0.44285|0.032 0.18|0.008 0.25789|0.001024 0.3|0.032
    m4 0.18|0.16 0.18571|0.09 0.1|1 0.2|0.036
    m5 0.3|0.0144 0.32|0.0027 0.45|0.0189 0.53529|0.09
    (e3×e1) (e3×e2) (e3×e3) (e3×e4)
    m1 0.4|1 0.38|0.036 0.225|0.21 0.75|0.16
    m2 0.375|0.00216 0.23333|0.09 0.2|0.0189 0.26666|0.0216
    m3 0.275|0.16 0.23333|0.04 0.60666|0.00512 0.275|0.16
    m4 0.2|0.0336 0.225|0.0189 0.25714|0.21 0.16666|0.00756
    m5 0.38571|0.0048 0.31|0.0009 0.38421|0.0063 0.385|0.03
    (e4×e1) (e4×e2) (e4×e3) (e4×e4)
    m1 0.3125|0.008 0.26666|0.000288 0.19285|0.00168 0.3125|0.00128
    m2 0.74545|0.024 0.1|1 0.21|0.21 0.66|0.24
    m3 0.66|0.24 0.36666|0.06 0.71538|0.00768 0.54|0.24
    m4 0.33333|0.0384 0.43333|0.0216 0.7|0.24 0.28571|0.00864
    m5 0.3|0.16 0.32|0.03 0.54|0.21 0.3|1

     | Show Table
    DownLoad: CSV

    Computation of the the score values S(li,lj)(mi) by using Step 5 of Algorithm 3, represented in Table 26.

    Table 26.  Tabular representation of score value.
    S(li,lj)(mi) The Score S(li,lj)(mi) The Score
    S(e1×e1)(m2) 0.0024 S(e3×e1)(m1) 0.4
    S(e1×e2)(m2) 0.114 S(e3×e2)(m1) 0.01368
    S(e1×e3)(m3) 0.0224 S(e3×e3)(m3) 0.00310
    S(e1×e4)(m1) 0.01904 S(e3×e4)(m1) 0.12
    S(e2×e1)(m2) 0.0156 S(e4×e1)(m2) 0.01789
    S(e2×e2)(m1) 0.00345 S(e4×e2)(m4) 0.00936
    S(e2×e3)(m5) 0.00850 S(e4×e3)(m3) 0.00549
    S(e2×e4)(m2) 0.17657 S(e4×e4)(m2) 0.1584

     | Show Table
    DownLoad: CSV

    Evaluation of weighted values for each S(li,lj)(mi) by using Step 6 of Algorithm 3 is

    S(m1)=0.55617,S(m2)=0.48486,S(m3)=0.031,S(m4)=0.00936,S(m5)=0.00850,

    optimal decision

    ¥=max{S(m1),S(m2),S(m3),S(m4),S(m5)}.

    By using Step 7 of Algorithm 3 the best circuit simulator software is m1. So, the manager will buy the m1 software.

    The graphical representation of ranking is given in Figure 6.

    Figure 6.  Ranking results.

    We devised an approach by combining the theory of constraints with multiattribute and multiobjective decision-making techniques in order to find a solution to a challenging problem which still exists in the real-world. In the context of the CPHFSS, we examined three different algorithms. All three approaches provide a ranked list of all viable options regardless of whether there is a single best answer. However, none of the existing work is up to the task of handling Soft max-AND or min-OR kind of information supplied by CPHFSS to a decision-maker. While the suggested method is capable of handling data from pre-existing methods as well, it has the potential to significantly improve upon them. Several structures supplied by various researchers were compared to show how well the proposed method performed in contrast to the existing methods for multi-parameter group decision-making. The comparison is given in Table 27 and concludes that our proposed study is superior and more reliable than the those currently in use.

    Table 27.  The characteristic comparison with existing approaches.
    Methods Capable of making decisions using probability Capable of handling two dimensional information Flexible to adapt decision-makers' choices Capable of integrate information capable of handling multi-parameter information
    Zadeh [4] no no no no no
    Roy and Maji [16] no no no no yes
    Torra [38] no no yes no no
    Babitha and John [51] no no yes no yes
    Garg et al. [52] no yes yes no no
    Proposed approach yes yes yes yes yes

     | Show Table
    DownLoad: CSV

    Many struggles have been made in the literature about the enhancement of data measures. However, there is nonetheless a lot of room to enhance these measures in a higher way and use them to locate new functions and novel directions. As computational intelligence has grown to be more popular these days due to big data, superior algorithms, and elevated computing electricity and storage, these structures are becoming an embedded factor of digital systems and, more specifically, are having a profound impact on human selection making. As a result, there is a growing demand for information systems researchers to look at and recognize the implications of computational intelligence for selection making and to make a contribution to theoretical development, especially in engineering applications. In this paper, we developed the complex probabilistic hesitant fuzzy set and its operations such as restricted union, restricted intersection, extended union, extended intersection, complement, soft max-AND operator and soft min-OR operator by integrating randomness, hesitancy, and uncertainty with parameterized families. Several examples are introduced to exhibit the suitability and validity of the proposed methods. Based on computational results, it is viewed that the proposed techniques are realistic and well-suited to the surroundings of CPHFSS. We prove their fundamental laws, such as commutativity, associativity, idempotency, involution, and de-Morgan laws. We also proposed three different algorithms and case studies based on bridges and simulation for decision-making to exhibit the validity and effectiveness of the new approach. Furthermore, the limitation of this structure is that we can not take the membership values beyond the complex plane unit circle. In further research, the average or Einstein aggregation operators of complex probabilistic hesitant fuzzy soft set is an important and interesting issue to be addressed, and TODIM, EDAS, TAOV and AHP methodologies can also be investigated. The proposed metrics will be applied to various applications like risk analysis, investment strategy, feature extractions, bipartite consensus control models, and unmanned aerial vehicles [53,54,55].

    The authors declare they have not used Artificial Intelligence (AI) tools in the creation of this article.

    This Project is funded by King Saud University, Riyadh, Saudi Arabia.

    Research Supporting Project number (RSP2023R167), King Saud University, Riyadh, Saudi Arabia.

    The authors declare that they have no conflicts of interest to report regarding the present study.



    [1] S. Song, G. Paulino, W. Buttlar, Simulation of crack propagation in asphalt concrete using an intrinsic cohesive zone model, J. Eng. Mech., 132 (2006), 1215–1223. http://dx.doi.org/10.1061/(ASCE)0733-9399(2006)132:11(1215) doi: 10.1061/(ASCE)0733-9399(2006)132:11(1215)
    [2] S. Abar, G. Theodoropoulos, P. Lemarinier, G. O'Hare, Agent based modelling and simulation tools: a review of the state-of-art software, Comput. Sci. Rev., 24 (2017), 13–33. http://dx.doi.org/10.1016/j.cosrev.2017.03.001 doi: 10.1016/j.cosrev.2017.03.001
    [3] F. Haan, P. Sarkar, W. Gallus, Design, construction and performance of a large tornado simulator for wind engineering applications, Eng. Struct., 30 (2008), 1146–1159. http://dx.doi.org/10.1016/j.engstruct.2007.07.010 doi: 10.1016/j.engstruct.2007.07.010
    [4] L. Zadeh, Fuzzy sets, In: Fuzzy sets, fuzzy logic, and fuzzy systems, New York: World scientific, 1996,394–432. http://dx.doi.org/10.1142/9789814261302_0021
    [5] H. Ibrahim, T. Al-Shami, A. Mhemdi, Applications of nth power root fuzzy sets in multicriteria decision making, J. Math., 2023 (2023), 1487724. http://dx.doi.org/10.1155/2023/1487724
    [6] T. Al-shami, A. Mhemdi, Generalized frame for orthopair fuzzy sets: (m, n)-fuzzy sets and their applications to multi-criteria decision-making methods, Information, 14 (2023), 56. http://dx.doi.org/10.3390/info14010056} doi: 10.3390/info14010056
    [7] S. Ashraf, S. Abdullah, S. Khan, Fuzzy decision support modeling for internet finance soft power evaluation based on sine trigonometric Pythagorean fuzzy information, J. Ambient Intell. Human. Comput., 12 (2021), 3101–3119. http://dx.doi.org/10.1007/s12652-020-02471-4 doi: 10.1007/s12652-020-02471-4
    [8] A. Almagrabi, S. Abdullah, M. Shams, Y. Al-Otaibi, S. Ashraf, A new approach to q-linear Diophantine fuzzy emergency decision support system for COVID19, J. Ambient Intell. Human. Comput., 13 (2022), 1687–1713. http://dx.doi.org/10.1007/s12652-021-03130-y doi: 10.1007/s12652-021-03130-y
    [9] S. Ashraf, S. Abdullah, S. Zeng, H. Jin, F. Ghani, Fuzzy decision support modeling for hydrogen power plant selection based on single valued neutrosophic sine trigonometric aggregation operators, Symmetry, 12 (2020), 298. http://dx.doi.org/10.3390/sym12020298 doi: 10.3390/sym12020298
    [10] S. Ali, M. Kousar, Q. Xin, D. Pamucar, M. Hameed, R. Fayyaz, Belief and possibility belief interval-valued N-soft set and their applications in multi-attribute decision-making problems, Entropy, 23 (2021), 1498. http://dx.doi.org/10.3390/e23111498 doi: 10.3390/e23111498
    [11] J. Gong, A. Rezaeipanah, A fuzzy delay-bandwidth guaranteed routing algorithm for video conferencing services over SDN networks, Multimed. Tools Appl., in press. http://dx.doi.org/10.1007/s11042-023-14349-6
    [12] A. Taghieh, C. Zhang, K. Alattas, Y. Bouteraa, S. Rathinasamy, A. Mohammadzadeh, A predictive type-3 fuzzy control for underactuated surface vehicles, Ocean Eng., 266 (2022), 113014. http://dx.doi.org/10.1016/j.oceaneng.2022.113014 doi: 10.1016/j.oceaneng.2022.113014
    [13] D. Molodtsov, Soft set theory-first results, Comput. Math. Appl., 37 (1999), 19–31. http://dx.doi.org/10.1016/S0898-1221(99)00056-5 doi: 10.1016/S0898-1221(99)00056-5
    [14] F. Feng, J. Cho, W. Pedrycz, H. Fujita, T. Herawan, Soft set based association rule mining, Knowl.-Based Syst., 111 (2016), 268–282. http://dx.doi.org/10.1016/j.knosys.2016.08.020 doi: 10.1016/j.knosys.2016.08.020
    [15] F. Feng, Y. Li, Soft subsets and soft product operations, Inform. Sci., 232 (2013), 44–57. http://dx.doi.org/10.1016/j.ins.2013.01.001 doi: 10.1016/j.ins.2013.01.001
    [16] A. Roy, P. Maji, A fuzzy soft set theoretic approach to decision making problems, J. Comput. Appl. Math., 203 (2007), 412–418. http://dx.doi.org/10.1016/j.cam.2006.04.008 doi: 10.1016/j.cam.2006.04.008
    [17] Y. Zou, Z. Xiao, Data analysis approaches of soft sets under incomplete information, Knowl.-Based Syst., 21 (2008), 941–945. http://dx.doi.org/10.1016/j.knosys.2008.04.004 doi: 10.1016/j.knosys.2008.04.004
    [18] P. Maji, R. Biswas, A. Roy, Fuzzy soft sets, Journal of Fuzzy Mathematics, 9 (2001), 589–602.
    [19] P. Maji, R. Biswas, A. Roy, Soft set theory, Comput. Math. Appl., 45 (2003), 555–562. http://dx.doi.org/10.1016/S0898-1221(03)00016-6
    [20] S. Ashraf, M. Kousar, M. Hameed, Early infectious diseases identification based on complex probabilistic hesitant fuzzy N-soft information, Soft Comput., in press. https://doi.org/10.1007/s00500-023-08083-2
    [21] M. Shazib Hameed, S. Mukhtar, H. Khan, S. Ali, M. Haris Mateen, M. Gulzar, Pythagorean fuzzy N-Soft groups, Indonesian Journal of Electrical Engineering and Computer Science, 21 (2021), 1030–1038. http://dx.doi.org/10.11591/ijeecs.v21i2.pp1030-1038 doi: 10.11591/ijeecs.v21i2.pp1030-1038
    [22] A. Meghdadi, M. Akbarzadeh-T, Probabilistic fuzzy logic and probabilistic fuzzy systems, Proceedings of 10th IEEE International Conference on Fuzzy Systems, 2001, 1127–1130. http://dx.doi.org/10.1109/FUZZ.2001.1008853
    [23] J. Pidre, C. Carrillo, A. Lorenzo, Probabilistic model for mechanical power fluctuations in asynchronous wind parks, IEEE T. Power Syst., 18 (2003), 761–768. http://dx.doi.org/10.1109/TPWRS.2003.811201 doi: 10.1109/TPWRS.2003.811201
    [24] K. Valavanis, G. Saridis, Probabilistic modeling of intelligent robotic systems, IEEE Transactions on Robotics and Automation, 7 (1991), 164–171. http://dx.doi.org/10.1109/70.68080 doi: 10.1109/70.68080
    [25] D. Huang, S. Ma, A new radial basis probabilistic neural network model, Proceedings of Third International Conference on Signal Processing, 1996, 1449–1452. http://dx.doi.org/10.1109/ICSIGP.1996.571134
    [26] Attaullah, S. Ashraf, N. Rehman, H. AlSalman, A. Gumaei, A decision-making framework using q-rung orthopair probabilistic hesitant fuzzy rough aggregation information for the drug selection to treat COVID-19, Complexity, 2022 (2022), 5556309. http://dx.doi.org/10.1155/2022/5556309 doi: 10.1155/2022/5556309
    [27] Z. Liu, H. Li, A probabilistic fuzzy logic system for modeling and control, IEEE T. Fuzzy Syst., 13 (2005), 848–859. http://dx.doi.org/10.1109/TFUZZ.2005.859326 doi: 10.1109/TFUZZ.2005.859326
    [28] S. Chen, E. Nikolaidis, H. Cudney, R. Rosca, R. Haftka, Comparison of probabilistic and fuzzy set methods for designing under uncertainty, Proceedings of 40th structures, structural dynamics, and materials conference and exhibit, (1999), 2860–2874. http://dx.doi.org/10.2514/6.1999-1579
    [29] D. Ramot, R. Milo, M. Friedman, A. Kandel, Complex fuzzy sets, IEEE T. Fuzzy Syst., 10 (2002), 171–186. http://dx.doi.org/10.1109/91.995119
    [30] O. Yazdanbakhsh, S. Dick, A systematic review of complex fuzzy sets and logic, Fuzzy Set. Syst., 338 (2018), 1–22. http://dx.doi.org/10.1016/j.fss.2017.01.010 doi: 10.1016/j.fss.2017.01.010
    [31] A. Alkouri, A. Salleh, Complex intuitionistic fuzzy sets, AIP Conference Proceedings, 1482 (2012), 464–470. http://dx.doi.org/10.1063/1.4757515 doi: 10.1063/1.4757515
    [32] A. Alkouri, A. Salleh, Complex Atanassov's intuitionistic fuzzy relation, Abstr. Appl. Anal., 2013 (2013), 287382. http://dx.doi.org/10.1155/2013/287382 doi: 10.1155/2013/287382
    [33] A. Alkouri, A. Salleh, Some operations on complex Atanassov's intuitionistic fuzzy sets, AIP Conference Proceedings, 1571 (2013), 987–993. http://dx.doi.org/10.1063/1.4858782 doi: 10.1063/1.4858782
    [34] M. Akram, A. Khan, J. Alcantud, G. Santos-Garcia, A hybrid decision-making framework under complex spherical fuzzy prioritized weighted aggregation operators, Expert Syst., 38 (2021), 12712. http://dx.doi.org/10.1111/exsy.12712 doi: 10.1111/exsy.12712
    [35] M. Akram, U. Amjad, J. Alcantud, G. Santos-Garcia, Complex fermatean fuzzy N-soft sets: a new hybrid model with applications, J. Ambient Intell. Human. Comput., in press. http://dx.doi.org/10.1007/s12652-021-03629-4
    [36] M. Akram, K. Zahid, J. Alcantud, A new outranking method for multicriteria decision making with complex Pythagorean fuzzy information, Neural Comput. Appl., 34 (2022), 8069–8102. http://dx.doi.org/10.1007/s00521-021-06847-1 doi: 10.1007/s00521-021-06847-1
    [37] X. Xie, Y. Tian, G. Wei, Deduction of sudden rainstorm scenarios: integrating decision makers' emotions, dynamic Bayesian network and DS evidence theory, Nat. Hazards, 116 (2023), 2935–2955. http://dx.doi.org/10.1007/s11069-022-05792-z doi: 10.1007/s11069-022-05792-z
    [38] V. Torra, Hesitant fuzzy sets, Int. J. Intell. Syst., 25 (2010), 529–539. http://dx.doi.org/10.1002/int.20418
    [39] Q. Pang, H. Wang, Z. Xu, Probabilistic linguistic term sets in multi-attribute group decision making, Inform. Sci., 369 (2016), 128–143. http://dx.doi.org/10.1016/j.ins.2016.06.021 doi: 10.1016/j.ins.2016.06.021
    [40] Z. Xu, W. Zhou, Consensus building with a group of decision makers under the hesitant probabilistic fuzzy environment, Fuzzy Optim. Decis. Making, 16 (2017), 481–503. http://dx.doi.org/10.1007/s10700-016-9257-5} doi: 10.1007/s10700-016-9257-5
    [41] J. Alcantud, Ranked hesitant fuzzy sets for multi-criteria multi-agent decisions, Expert Syst. Appl., 209 (2022), 118276. http://dx.doi.org/10.1016/j.eswa.2022.118276 doi: 10.1016/j.eswa.2022.118276
    [42] B. Zhu, Z. Xu, M. Xia, Dual hesitant fuzzy sets, J. Appl. Math., 2012 (2012), 879629. http://dx.doi.org/10.1155/2012/879629
    [43] N. Zhang, G. Wei, Extension of VIKOR method for decision making problem based on hesitant fuzzy set, Appl. Math. Model., 37 (2013), 4938–4947. http://dx.doi.org/10.1016/j.apm.2012.10.002 doi: 10.1016/j.apm.2012.10.002
    [44] N. Liao, H. Gao, R. Lin, G. Wei, X. Chen, An extended EDAS approach based on cumulative prospect theory for multiple attributes group decision making with probabilistic hesitant fuzzy information, Artif. Intell. Rev., 56 (2023), 2971–3003. http://dx.doi.org/10.1007/s10462-022-10244-y doi: 10.1007/s10462-022-10244-y
    [45] Z. Xu, W. Zhou, Consensus building with a group of decision makers under the hesitant probabilistic fuzzy environment, Fuzzy Optim. Decis. Making, 16 (2017), 481–503. http://dx.doi.org/10.1007/s10700-016-9257-5 doi: 10.1007/s10700-016-9257-5
    [46] F. Fatimah, D. Rosadi, R. Fajriya Hakim, J. Alcantud, N-soft sets and their decision making algorithms, Soft Comput., 22 (2018), 3829–3842. http://dx.doi.org/10.1007/s00500-017-2838-6 doi: 10.1007/s00500-017-2838-6
    [47] B. Yao, J. Liu, R. Yan, Fuzzy soft set and soft fuzzy set, Proceedings of Fourth International Conference on Natural Computation, 2008,252–255. http://dx.doi.org/10.1109/ICNC.2008.137
    [48] S. Ashraf, H. Garg, M. Kousar, An industrial disaster emergency decision-making based on China Tianjin city port explosion under complex probabilistic hesitant fuzzy soft environment, Eng. Appl. Artif. Intell., 123 (2023), 106400. https://doi.org/10.1016/j.engappai.2023.106400 doi: 10.1016/j.engappai.2023.106400
    [49] G. Arioli, F. Gazzola, A new mathematical explanation of what triggered the catastrophic torsional mode of the Tacoma Narrows Bridge, Appl. Math. Model., 39 (2015), 901–912. http://dx.doi.org/10.1016/j.apm.2014.06.022 doi: 10.1016/j.apm.2014.06.022
    [50] Plus, Complex numbers: strength, Marianne, 2017. Available from: https://plus.maths.org/content/complex-numbers-strength.
    [51] K. Babitha, S. John, Hesitant fuzzy soft sets, Journal of New Results in Science, 3 (2013), 98–107.
    [52] H. Garg, T. Mahmood, U. Rehman, Z. Ali, CHFS: complex hesitant fuzzy sets-their applications to decision making with different and innovative distance measures, CAAI T. Intell. Techno., 6 (2021), 93–122. http://dx.doi.org/10.1049/cit2.12016 doi: 10.1049/cit2.12016
    [53] X. Li, Y. Sun, Stock intelligent investment strategy based on support vector machine parameter optimization algorithm, Neural Comput. Appl., 32 (2020), 1765–1775. http://dx.doi.org/10.1007/s00521-019-04566-2 doi: 10.1007/s00521-019-04566-2
    [54] S. Lu, Y. Ding, M. Liu, Z. Yin, L. Yin, W. Zheng, Multiscale feature extraction and fusion of image and text in VQA, Int. J. Comput. Intell. Syst., 16 (2023), 54. http://dx.doi.org/10.1007/s44196-023-00233-6 doi: 10.1007/s44196-023-00233-6
    [55] Z. Peng, J. Hu, K. Shi, R. Luo, R. Huang, B. Ghosh, et al., A novel optimal bipartite consensus control scheme for unknown multi-agent systems via model-free reinforcement learning, Appl. Math. Comput., 369 (2020), 124821. http://dx.doi.org/10.1016/j.amc.2019.124821 doi: 10.1016/j.amc.2019.124821
  • This article has been cited by:

    1. Muhammad Saqib, Shahzaib Ashraf, Hafiz Muhammad Athar Farid, Vladimir Simic, Muneeba Kousar, Erfan Babaee Tirkolaee, Benchmarking of industrial wastewater treatment processes using a complex probabilistic hesitant fuzzy soft Schweizer–Sklar prioritized-based framework, 2024, 162, 15684946, 111780, 10.1016/j.asoc.2024.111780
    2. Shahzaib Ashraf, Muneeba Kousar, Gilbert Chambashi, Identification of mental disorders in South Africa using complex probabilistic hesitant fuzzy N-soft aggregation information, 2023, 13, 2045-2322, 10.1038/s41598-023-45991-7
    3. Zainab Saif, Shahzaib Ashraf, Muhammad Shazib Hameed, Muneeba Kousar, Vladimir Simic, Nezir Aydin, AI-driven predictive maintenance using an enhanced TOPSIS approach for complex fuzzy information with Z-numbers, 2025, 171, 15684946, 112759, 10.1016/j.asoc.2025.112759
    4. Shahzaib Ashraf, Razia Choudhary, Muhammad Sohail, Gokul K. C., Ghous Ali, Optimizing Business Investments Using a Novel Approach Based on Picture Hesitant Fuzzy Soft Aggregation Information, 2025, 2025, 2314-4629, 10.1155/jom/3886960
  • Reader Comments
  • © 2023 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(1675) PDF downloads(49) Cited by(4)

Figures and Tables

Figures(6)  /  Tables(27)

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog