Next Article in Journal
Effective Majorana Neutrino Mass for ΔL = 2 Neutrino Oscillations
Next Article in Special Issue
Revisiting Additive Consistency of Hesitant Fuzzy Linguistic Preference Relations
Previous Article in Journal
Deployment and Retrieval Missions from Quasi-Periodic and Chaotic States under a Non-Linear Control Law
Previous Article in Special Issue
Multicriteria Optimization of Logistics Processes Using a Grey FUCOM-SWOT Model
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Topological Structure of Single-Valued Neutrosophic Hesitant Fuzzy Sets and Data Analysis for Uncertain Supply Chains

1
Department of Mathematics, University of the Punjab, Lahore 54590, Pakistan
2
Department of Mathematics, College of Sciences, King Khalid University, Abha 61413, Saudi Arabia
*
Author to whom correspondence should be addressed.
Symmetry 2022, 14(7), 1382; https://doi.org/10.3390/sym14071382
Submission received: 8 May 2022 / Revised: 20 June 2022 / Accepted: 1 July 2022 / Published: 5 July 2022
(This article belongs to the Special Issue Algorithms for Multi-Criteria Decision-Making under Uncertainty)

Abstract

:
From production to retail, the food supply chain (FSC) encompasses all stages of food production. Food is now transmitted across continents over long ranges. People depend on supply chains for basic necessities such as food, water, drinks, etc. Any disruption in these shipment pipelines poses a serious threat to human life. Supplier selection (SS) has been identified as a crucial component of FSC, which has been contemplated as a multi-criteria decision-making (MCDM) problem in many studies. The failure of some specific MCDM problems is due to failure in contemplating the relationships between alternatives under uncertain circumstances. To address such challenges, we present a contemporary method for designating green suppliers based on single-valued neutrosophic hesitant fuzzy (SVNHF) information, in which the input assessment is taken into account using single-valued neutrosophic hesitant fuzzy numbers (SVNHFNs). The foremost purpose of this analysis is to construct a topological structure on single-valued neutrosophic hesitant fuzzy sets (SVNHFSs) as well as to validate several key properties with examples. We discuss certain properties of SVNHF topology such as the SVNHF closure, SVNHF interior, SVNHF exterior, and SVNHF frontier. We also examine the conceptualization of the SVNHF dense set and SVNHF base in SVNHF topology using comprehensive examples. Eventually, to demonstrate and validate the superiority and inferiority ranking (SIR) method and choice value (CV) method in terms of their rationality and scientific basis, a real-world example of supplier selection in a food supply chain is provided. A comparative analysis is also performed to discuss the symmetry, validity and advantage of the proposed techniques.

1. Introduction

Data analysis and information aggregation techniques have been an increasing focus in various fields such as engineering, healthcare, economics, environmental concerns, and decision making. Due to uncertain information and limitations in data analysis, we cannot seek accurate and ideal evaluation in MCDM problems. To resolve such circumstances, Zadeh [1] introduced “fuzzy set theory” initially with the concept of membership function on behalf of an exact real number in [ 0 , 1 ] to express the degree of belonging of objects under a criterion. The components of membership (MG) and non-membership (NMG) of objects were addressed by Atanassov [2] in terms of an “Intuitionistic fuzzy set (IFS)”. “Pythagorean fuzzy set” (PFS), a new method for coping with vagueness when considering membership degree ω μ and non-membership degree ω ν was proposed by Yager [3]. It can characterize uncertain information more adequately and accurately than IFSs. Although IFSs and PFSs can effectively report the attribute values in MCDM in the vast majority of instances, there are a few instances where they are deficient. In accordance with the constraints imposed by IFSs and PFSs, the attribute value cannot be represented by both IFSs and PFSs when the square sum of ω μ and ω ν degrees exceeds unity. In order to cope with this scenario, Yager [4] established the notion of the q-rung orthopair fuzzy set (q-ROFS), which can be considered a generalization of IFS and PFS. The “picture fuzzy set” (PiFS) was developed by Cuong [5], and the “spherical fuzzy set” (SFS) initiated by Mahmood et al. [6], Ashraf et al. [7], and Gündogdu and Kahraman [8]. The idea of a neutrosophic set was suggested by Smarandache [9]. Some extensions of fuzzy sets and their constraints are expressed in Table 1.
Smarandache [9] developed the “neutrosophic set” (NS) and neutrosophic logic. The neutrosophic logic is a conventional framework for determining truth, indeterminacy, and falsification. In the NS, indeterminacy is the main focus, although truth and falsity are basic components. This presumption is critical in a variety of situations, as in information fusion, which involves combining data from multiple sensors. Furthermore, because it can handle vague and imperfect information, neutrosophy appears to be preferable for modeling uncertainties, as it is rare to have complete information at one’s disposal when making decisions. The NS derives its component values from a subset of ] 0 , 1 + [ that is either real or non-standard. However, in real-world engineering and scientific problems, using an NS with values from a real standard or non-standard subset of ] 0 , 1 + [ is difficult. However, a single-valued neutrosophic set (SVNS) [10] derives its components T , I , F [ 0 , 1 ] with T + I + F [ 0 , 3 ] . An SVNS [10] is a type of neutrosophic set that adds a new way to represent the undetermined, vague, imperfect, and inconsistent statistics that subsist in the the real world. It is better suited for dealing with unspecified and inconsistent data.
Molodtsov [11] proposed “soft set” (SS) theory to cope with uncertainty of parameters and their approximate elements. Hashmi et al. [12] introduced the m-polar neutrosophic set and extended it to m-polar neutrosophic topological structure with clustering analysis and healthcare. It can be difficult to regulate an element’s membership in a fixed set at times, which could be due to a misunderstanding of a collection of different values. Torra [13] suggested the notion of “hesitant fuzzy sets” (HFSs) as a generalization of FSs to better describe this situation, which permits membership degree to aid in the collection of practicable values in the closed interval [0, 1]. Experts have used HFSs to choose a variety of possible MGs to evaluate objects under suitable criteria. The theory of HFS has a diverse set of applications in a variety of disciplines, such as for computational intelligence, clustering, healthcare, and MCDM problems.
In an HFS, because of the doubts of decision makers, there is only one truth-membership hesitant function, and it is impossible to manifest this problem using only a few different values assigned by truth, indeterminacy, and falsity membership degrees. As a result, it can only represent one type of hesitancy statistics in this situation and cannot manifest three types of hesitancy statistics. To handle uncertain problems, the idea of a single-valued neutrosophic hesitant fuzzy set (SVNHFS) was introduced by Jun [14]. The truth-membership hesitancy function (TMFF), the indeterminacy-membership hesitancy function (IMHF), and the falsity-membership hesitancy function (FMHF) are three parts of the SVNHFS that can exhibit three types of hesitancy information in this state. Tanuwijaya et al. [15] proposed a novel SVNHF time series model and applied it to stock index forecasting in Indonesia and Argentina. Aggregation operators of SVNHFS were introduced by Liu et al. [16]. Wang and Li [17] proposed generalized single-valued neutrosophic hesitant fuzzy prioritized aggregation operators. The TOPSIS method for neutrosophic hesitant fuzzy multi-attribute decision making was extended by Giri et al. [18].
The CV method is a renowned and widely used MCDM basis for evaluating a set of choices using a set of criteria. Each choice is contrasted with the others by calculating a number of ratios, one per choice criterion. Every ratio is multiplied by the proportional weight of the criterion in consideration. The selection of one or more options from the set of alternatives based on the number of criteria is a fundamental task in MCDM problems.
Xu [19] proposed the SIR method, which is extension of the PROMETHEE method. The SIR method is an important MCDM approach which can grasp real data and supply the system user with six different preference structures. According to the two ranking lists, the SIR method ranks the alternatives more accurately. This method ranks alternatives using a superiority ranking list and an inferiority ranking list. The great feature of using the SIR method is that it incorporates the possessions of other MCDM techniques such as TOPSIS, SAW, and PROMETHEE. Some applications of the SIR method are given in Table 2.
Certain novel concepts of neutrosophic sets, neutrosophic logic, and neutrosophic probability were explored in [31]. Seikh and Dutta [32] developed a matrix games model based on SVNSs. Saha and Paul [33] proposed generalized weighted exponential similarity measures for SVNSs. Alcantud et al. [34] developed generalized OWA aggregation operators and multi-agent decision making with N-soft sets. Sitara et al. [35] proposed the notion of q-rung picture fuzzy graph structures for decision analysis. Riaz et al. [36] studied recent trends in pharmaceutical logistics and supply chain management based on distance and similarity measures for bipolar fuzzy soft sets. Farid and Riaz [37] investigated the properties of Einstein interactive geometric information aggregation with q-ROFSs. Zararsiz and Riaz [38] introduced the idea of bipolar fuzzy metric spaces with applications in decision making. Riaz et al. [39] proposed topological data analysis with spherical fuzzy soft AHP-TOPSIS for an environmental mitigation system. Riaz et al. [40] proposed the idea of interval-valued linear Diophantine fuzzy Frank aggregation operators for computational intelligence and MCDM problems.
The foremost purpose of the paper is to construct the topological structure on a single-valued neutrosophic hesitant fuzzy set and to derive significant results. These results are explained with the help of examples. We define certain concepts of SVHF topology such as the interior of SVNHFS, the closure of SVNHFS, the exterior of SVNHFS, the frontier of SVNHFS, dense sets and the base of SVNHF topology. We establish an extension of the SIR technique towards SVNHF topology to deal with uncertain MCDM problems. Moreover, to demonstrate and validate the SIR method and the CV method, a practical example of supplier selection in a food supply chain is provided. A comparative analysis is also given to discuss the validity and advantage of the proposed techniques.
The organization of the rest of the paper is as follows. In Section 2, we examine some elementary conceptions such as NS, SVNS, HFS, SVNHFS, SF, and AF of SVNHFNs and operations on SVNHFSs. In Section 3, we introduce the topological structure of SVNHFSs. Section 4 introduces the SIR method, and the CV method is developed in Section 5 for SVNHF information. In Section 6, an application of the SIR method and the CV method for SVNHF information is illustrated for data analysis in uncertain supply chains. Section 5 concludes the article and discusses future directions.

2. Preliminaries

In this section, we review the notions of NS [9], SVNS [10], HFS [13], and SVNHFS [14].
Definition 1
([9]). Let K be a set. A NS A in K is specified by the three components defined by
A = ς , ( T A , I A , N A ) : ς K
where T A ( ς ) , I A ( ς ) , N A ( ς ) ] 0 , 1 + [ such that 0 sup T A ( ς ) + sup I A ( ς ) + sup N A ( ς ) 3 + .
Definition 2
([10]). Let K be a set. A SVNS S in K can be expressed as
S = { ς , T S ( ς ) , I S ( ς ) , F S ( ς ) | ς K }
where the components are described by mappings T S , I S , F S : S [ 0 , 1 ] . The components also satisfy the condition 0 T S ( ς ) + I S ( ς ) + F S ( ς ) 3 .
Example 1.
Let K = { ς 1 , ς 2 , ς 3 , ς 4 } be a set. Then, an SVNS in K is of the form
S = { ς 1 , ( 0.235 , 0.476 , 0.667 ) , ς 2 , ( 0.133 , 0.345 , 0.198 ) , ς 3 , ( 0.421 , 0.782 , 0.385 ) , ς 4 , ( 0.347 , 0.847 , 0.667 ) } .
Definition 3
([13]). Assume that K is a set. An HFS set can be defined as follows:
h = { φ , h ˇ ( φ ) φ K }
where h ˇ ( φ ) yields a finite subset of [ 0 , 1 ] . Then h ˇ ( φ ) denotes an HF-element that involve some values in [ 0 , 1 ] indicating the MGs of element φ K to the set h .
Example 2.
Let K = { φ 1 , φ 2 , φ 3 , φ 4 , φ 5 } be a set. Then, the HFS can be expressed as
h = { φ 1 , { 0.645 , 0.125 , 0.667 } , φ 2 , { 0.133 , 0.345 , 0.988 , 0.259 } , φ 3 , { 0.511 , 0.178 } , φ 4 , { 0.481 , 0.872 } , φ 5 , { 0.666 , 0.879 } }
where, h ( φ 1 ) = { 0.645 , 0.125 , 0.667 } , h ( φ 2 ) = { 0.133 , 0.345 , 0.988 , 0.259 } ,
h ( φ 3 ) = { 0.511 , 0.178 } , h ( φ 4 ) = { 0.481 , 0.872 } , and h ( φ 5 ) = { 0.666 , 0.879 } are HF-elements corresponding to φ 1 , φ 2 , φ 3 , φ 4 and φ 5 , respectively.
Definition 4
([14]). Let K be a set; a SVNHFS in K is defined as
Υ = ω x , ω μ ( ω x ) , ω I ( ω x ) , ω ν ( ω x ) | ω x K
in which ω μ ( ω x ) , ω I ( ω x ) and ω ν ( ω x ) are three sets of some values in [ 0 , 1 ] , denoting the possible truth hesitant degrees (THD), indeterminacy hesitant degrees (IHD), and falsity hesitant degrees (FHD) of the element ω x K to the set Υ , respectively, with the conditions 0 ω μ , ω I , ω ν 1 and 0 ω μ + + ω I + + ω ν + 3 , where ω μ ω μ ( ω x ) , ω I ω I ( ω x ) , ω ν ω ν ( ω x ) , ω μ + ω μ + ( ω x ) = ω μ ω μ ( ω x ) max { ω μ } , ω I + ω I + ( ω x ) = ω I ω I ( ω x ) max { ω I } and ω ν + ω ν + ( ω x ) = ω ν ω ν ( ω x ) max { ω ν } for ω x K . The three-tuple ν ( ω x ) = { ω μ ( ω x ) , ω I ( ω x ) , ω ν ( ω x ) } is called a single-valued neutrosophic hesitant fuzzy element (SVNHFE). It can be expressed as N = { ω μ , ˜ ω I , ˜ ω ν } .
Example 3.
Let K = { ω 1 x , ω 2 x , ω 3 x , ω 4 x } be a set. Then, an SVNHFS Υ in K can be expressed as follows:
Υ = { ω 1 x , { 0.645 , 0.125 , 0.667 } , { 0.211 } , { 0.111 , 0.200 } , ω 2 x , { 0.133 , 0.345 } , { 0.988 , 0.259 } , { 0.335 , 0.121 } , ω 3 x , { 0.511 } , { 0.124 , 0.654 } , { 0.652 , 0.783 , 0.284 } , ω 4 x , { 0.481 , 0.872 , 0.100 , 0.321 } , { 0.865 } , { 0.768 } }
Definition 5
([14]). A SVNHFS Υ is said to be null SVNHFS if  ω i μ ( ω x ) = 0 , ω i I ( ω x ) = 1 and ω i ν ( ω x ) = 1 , where i varies according to alternatives, and the null SVNHFS is denoted as 0 Υ .
A SVNHFS Υ is said to be an absolute SVNHFS if  ω i μ ( ω x ) = 1 , ω i I ( ω x ) = 0 and ω i ν ( ω x ) = 0 , where i varies according to alternatives, and the absolute SVNHFS is denoted as 1 Υ .
Definition 6
([41]). Let N i = ω i μ , ω i I , ω i ν ( i = 1 , 2 , , n ) be the collection of SVNHFEs. Then, the score function (SF) S N i , the accuracy function (AF) A N i , and the certainty function (CF) C N i of N i ( i = 1 , 2 , , n ) can be defined as follows:
S N i = 1 3 2 + 1 l ω μ ω μ ω μ ( ω x ) ω μ 1 l ω I ω I ω I ( ω x ) ω I 1 l ω ν ω ν ω ν ( ω x ) ω ν
A N i = 1 l ω μ ω μ ω μ ( ω x ) ω μ 1 l ω ν ω ν ω ν ( ω x ) ω ν
C N i = 1 l ω μ ω μ ω μ ( ω x ) ω μ
SVNHFSs are used to express the method of ranking alternatives as follows, based on the concepts of SF, AF, and CF on SVNHFSs. Let N 1 and N 2 be two SVNHFEs; the ranking method is:
  • If S ( N 1 ) > S ( N 2 ) , then N 1 is superior to N 2 , designated by N 1 N 2 .
  • If S ( N 1 ) = S ( N 2 ) and A ( N 1 ) > A ( N 2 ) , then N 1 is superior to N 2 , designated by N 1 N 2 .
  • If S ( N 1 ) = S ( N 2 ) , A ( N 1 ) = A ( N 2 ) and C ( N 1 ) > C ( N 2 ) , then N 1 is superior to N 2 , designated by N 1 N 2 .
  • If S ( N 1 ) = S ( N 2 ) , A ( N 1 ) = A ( N 2 ) and C ( N 1 ) = C ( N 2 ) , then N 1 is equal to N 2 designated by N 1 N 2 .
Definition 7
([14]). Let N i ( i = 1 , 2 , , k ) be a cluster of SVNHFEs; the SVNHFWA operator is also an SVNHFE defined by
S V N H F W A N 1 , N 2 , , N k = i = 1 k θ i N i
= ω μ 1 ω 1 μ , , ω μ k ω k μ , ω I 1 ω 1 I , , ω I k ω k I , ω ν 1 ω 1 ν , , ω ν k ω k ν 1 i = 1 k 1 ω μ i θ i , i = 1 k ω I i θ i , i = 1 k ω ν i θ i
where θ = θ 1 , θ 2 , , θ k μ is the weight vector of N i ( i = 1 , 2 , , k ) with θ i > 0 , i = 1 k θ i = 1 .
The weight of each component is considered by the SVNHFWA operators, and the aggregation is also an SVNHFE.
Definition 8
([41]). Let N 1 = ω 1 μ , ω 1 I , ω 1 ν and N 2 = ω 2 μ , ω 2 I , ω 2 ν be two SVNHFEs. Then, the normalized Hamming distance between N 1 and N 2 is defined as follows:
D N 1 , N 2 = 1 3 1 l ω 1 μ ω μ 1 ω 1 μ ( ω x ) ω μ 1 1 l ω 2 μ ω μ 2 ω 2 μ ( ω x ) ω μ 2 + 1 l ω 1 I ω I 1 ω 1 I ( ω x ) ω I 1 1 l ω 2 I ω I 2 ω 2 I ( ω x ) ω I 2 + 1 l ω 1 ν ω ν 1 ω 1 ν ( ω x ) ω ν 1 1 l ω 2 ν ω ν 2 ω 2 ν ( ω x ) ω ν 2
where l ω k μ , l ω k I and l ω k ν are numbers of feasible membership values in N k for k = 1 , 2 .
Definition 9.
Let us consider two SNVHFEs N 1 = { ω 1 μ ( ω x ) , ˜ ω 1 I ( ω x ) , ˜ ω 1 ν ( ω x ) } and N 2 = { ω 2 μ ( ω x ) , ˜ ω 2 I ( ω x ) , ˜ ω 2 ν ( ω x ) } . Some operations on SNVHFEs are defined in [14], which are the following.
  • Complement: The complements of SVNHFEs N 1 and N 1 can be expressed as follows:
    N 1 c = { ω 1 ν ( ω x ) , 1 ω 1 I ( ω x ) , ω 1 μ ( ω x ) } ,
    N 2 c = { ω 2 ν ( ω x ) , 1 ω 2 I ( ω x ) , ω 2 μ ( ω x ) } .
  • Inclusion: N 1 N 2 ω 1 μ ( ω x ) ω 2 μ ( ω x ) , ω 1 I ( ω x ) ω 2 I ( ω x ) and ω 1 ν ( ω x ) ω 2 ν ( ω x ) for each ω x Υ .
  • The union of two SVNHFEs is defined as follows:
    N 1 N 2 = { ω μ ( ω 1 μ ω 2 μ ) | ω μ max ( ω 1 μ , ω 2 μ ) , ω I ( ω 1 I ω 2 I ) | ω I min ( ω 1 I + , ω 2 I + ) , ω ν ( ω 1 ν ω 2 ν ) | ω ν min ( ω 1 ν + , ω 2 ν + ) } .
  • The intersection of two SVNHFEs is defined as follows: N 1 N 2 = { ω μ ( ω 1 μ ω 2 μ ) | ω μ min ( ω 1 μ + , ω 2 μ + ) , ω I ( ω 1 I ω 2 I ) | ω I max ( ω 1 I , ω 2 I ) , ω ν ( ω 1 ν ω 2 ν ) | ω ν max ( ω 1 ν , ω 2 ν ) } .
  • N 1 N 2 = { ω 1 μ ω 2 μ , ω 1 I ω 2 I , ω 1 ν ω 2 ν } = ω μ 1 ω 1 μ , ω I 1 ω 1 I , ω ν 1 ω 1 ν , ω μ 2 ω 2 μ , ω I 2 ω 2 I , ω ν 2 ω 2 ν { { ω μ 1
    + ω μ 2 ω μ 1 ω μ 2 } , { ω I 1 ω I 2 } , { ω ν 1 ω ν 2 } } .
  • N 1 N 2 = { ω 1 μ ω 2 μ , ω 1 I ω 2 I , ω 1 ν ω 2 ν } = ω μ 1 ω 1 μ , ω I 1 ω 1 I , ω ν 1 ω 1 ν , ω μ 2 ω 2 μ , ω I 2 ω 2 I , ω ν 2 ω 2 ν { { ω μ 1 ω μ 2 } , { ω I 1 + ω I 2 ω I 1 ω I 2 } ,
    { ω ν 1 + ω ν 2 ω ν 1 ω ν 2 } } .
  • θ N 1 = ω μ 1 ω 1 μ , ω I 1 ω 1 I , ω ν 1 ω 1 ν { 1 ( 1 ω μ 1 ) θ } , { ω I 1 ) θ } , { ω ν 1 θ } , θ > 0 .
  • N 1 θ = ω μ 1 ω 1 μ , ω I 1 ω 1 I , ω ν 1 ω 1 ν { ( ω μ 1 ) θ } , { 1 ( 1 ω I 1 ) θ } , { 1 ( 1 ω ν 1 ) θ } , θ > 0 .

3. SVNHF Topology

Ye [14] proposed the idea of SVNHFS as an efficient model for modeling uncertainties. Biswas et al. [41] suggested the notions of SF, AF, and CF for SVNHFEs. In this section, the notion of SVNHF topology is introduced using fundamental characteristics of SVNHFSs.
Definition 10.
Let K be a set and τ be the collection of SVNHFSs in K . Then, τ is called an SVNHF topology if it satisfies following properties:
  • 0 Υ , 1 Υ τ .
  • For each i Υ τ , i Ω , i Ω i Υ τ .
  • For any 1 Υ , 2 Υ τ , 1 Υ 2 Υ τ .
Then ( K , τ ) is called SVNHF topological space.
Example 4.
Let K = { ω 1 x , ω 2 x , ω 3 x , ω 4 x } be a set. Let us consider
1 Υ = { ω 1 x , { 0.321 , 0.567 , 0.411 } , { 0.102 } , { 0.536 , 0.844 , 0.689 } , ω 2 x , { 0.213 , 0.469 , 0.328 } , { 0.650 , 0.679 } , { 0.998 , 0.450 } , ω 3 x , { 0.404 , 0.500 } , { 0.308 } , { 0.792 , 0.670 , 0.666 } , ω 4 x , { 0.210 , 0.410 , 0.589 } , { 0.752 , 0.890 , 0.786 } , { 0.450 } } , 2 Υ = { ω 1 x , { 0.600 , 0.580 , 0.893 } , { 0.100 } , { 0.520 , 0.440 , 0.250 } , ω 2 x , { 0.469 , 0.480 , 0.850 } , { 0.210 , 0.650 } , { 0.450 , 0.100 } , ω 3 x , { 0.540 , 0.600 } , { 0.300 } , { 0.150 , 0.150 , 0.655 } , ω 4 x , { 0.589 , 0.650 , 0.890 } , { 0.095 , 0.350 , 0.750 } , { 0.400 } }
any two SVNHFSs in K . Table 3 and Table 4 show the union and intersection, respectively, of the SVNHFSs 1 Υ and 2 Υ .
We see that
τ 1 = 0 Υ , 1 Υ
τ 2 = 0 Υ , 1 Υ , 1 Υ
τ 3 = 0 Υ , 2 Υ , 1 Υ
τ 4 = 0 Υ , 1 Υ , 2 Υ , 1 Υ
are SVNHF topologies on K .
where
0 Υ = { ω 1 x , { 0.000 , 0.000 , 0.000 } , { 1.000 } , { 1.000 , 1.000 , 1.000 } , ω 2 x , { 0.000 , 0.000 , 0.000 } , { 1.000 , 1.000 } } , { 1.000 , 1.000 } , ω 3 x , { 0.000 , 0.000 } , { 1.000 } , { 1.000 , 1.000 , 1.000 } , ω 4 x , { 0.000 , 0.000 , 0.000 } , { 1.000 , 1.000 , 1.000 } , { 1.000 } }
is a null SVNHFS in K .
1 Υ = { ω 1 x , { 1.000 , 1.000 , 1.000 } , { 0.000 } , { 0.000 , 0.000 , 0.000 } , ω 2 x , { 1.000 , 1.000 , 1.000 } , { 0.000 , 0.000 } } , { 0.000 , 0.000 } , ω 3 x , { 1.000 , 1.000 } , { 0.000 } , { 0.000 , 0.000 , 0.000 } , ω 4 x , { 1.000 , 1.000 , 1.000 } , { 0.000 , 0.000 , 0.000 } , { 0.000 } }
is an absolute SVNHFS in K .
Definition 11.
If ( K , τ ) is an SVNHF topological space over K , then the members of SVNHF topology τ are called SVNHF open sets. That is, if  Υ τ , then Υ is called an SVNHF open set.
Theorem 1.
If ( K , τ ) is any SVNHF topological space, then
  • 0 Υ and 1 Υ are SVNHF open sets;
  • ω Ω ω Υ is an SVNHF open set, where each ω Υ is an SVNHF open set;
  • i = 1 n i Υ is an SVNHF open set, where each i Υ is an SVNHF open set.
Proof .
  • From the definition of SVNHF topology τ, 0 Υ , 1 Υ τ . Hence, 0 Υ and 1 Υ are SVNHF open sets.
  • Let ( ω Υ ) ω Ω be SVNHF open sets. Then, ω Υ τ . By the definition of τ
    ω Ω ω Υ τ
    Hence, ω Ω ω Υ is SVNHF open set.
  • Let 1 Υ , 2 Υ , , n Υ be SVNHF open sets. Then, by the definition of τ,
    i = 1 n i Υ τ
    Hence, i = 1 n i Υ is an SVNHF open set.
   □
Definition 12.
Let ( K , τ ) be an SVNHF topological space over K . If the complement of an SVNHFS is SVNHF open, then it is called an SVNHF closed set in K . That is, Υ is called an SVNHF closed set if, and only if, ( Υ ) c τ .
Theorem 2.
Assume that ( K , τ ) is an SVNHF topological space. Then,
  • 0 Υ , 1 Υ are SVNHF closed sets over K ;
  • ( ω Υ ) ω Ω is an SVNHF closed set over K , where each ω Υ is an SVNHF closed set;
  • ( i Υ ) is an SVNHF closed set over K , for any SVNHF closed sets 1 Υ and 2 Υ .
Proof .
The proof is obvious.    □
Definition 13.
Let ( K , τ 1 ) and ( K , τ 2 ) be two SVNHF topological spaces over same set K . If τ 1 τ 2 , then τ 1 is said to be SVNHF coarser or SVNHF weaker than τ 2 , and τ 2 is said to be SVNHF finer or SVNHF stronger than τ 1 .
If τ 1 τ 2 or τ 2 τ 1 , then these SVNHF topologies are not comparable.
Example 5.
From Example 4, let us consider τ 2 = { 0 Υ , 1 Υ , 1 Υ } and τ 4 = { 0 Υ , 1 Υ 2 Υ , 1 Υ } , two SVNHF topologies on K . It is comprehensible that τ 2 τ 4 . Thus, τ 2 is SVNHF coarser than τ 4 and τ 4 is SVNHF finer than τ 2 .
Definition 14.
Assume a universal set K , and the assemblage of all SVNHFSs τ is defined over K . Then, τ is an SVNHF discrete topology on K , and ( K , τ ) is known as SVNHF discrete topological space over K .
Definition 15.
Suppose that K is a universal set and τ = { 0 Υ , 1 Υ } . Then, τ is an SVNHF non-discrete topology on K and ( K , τ ) is an SVNHF non-discrete topological space over K .
Theorem 3.
Suppose that ( K , τ 1 ) and ( K , τ 2 ) are two SVNHF topological spaces over identical universes of discourse K ; then, ( K , τ 1 τ 2 ) is an SVNHF topological space over  K .
Proof .
The proof is obvious.    □
Definition 16.
Let us consider an SVNHF topological space ( K , τ ) . For any SVNHFS Υ of K , the SVNHF interior ( Υ ) is interpreted as the union of all SVNHF open subsets of Υ . ( Υ ) is the largest SVNHF open set contained in Υ .
Example 6.
From Example 4, we see that τ = { 0 Υ , 1 Υ , 2 Υ , 1 Υ } is an SVNHF topology on K .Consider an SVNHFS defined on K = { ω 1 x , ω 2 x , ω 3 x , ω 4 x }
Υ = { ( ω 1 x , { 0.400 , 0.575 , 0.589 } , { 0.101 } , { 0.530 , 0.540 , 0.570 } , ω 2 x , { 0.369 , 0.470 , 0.638 } , { 0.400 , 0.660 } , { 0.700 , 0.200 } , ω 3 x , { 0.500 , 0.550 } , { 0.305 } , { 0.400 , 0.380 , 0.660 } ω 4 x , { 0.330 , 0.500 , 0.700 } , { 0.400 , 0.611 , 0.770 } , { 0.440 } }
Then, ( Υ ) = 0 Υ 1 Υ = 1 Υ .
Theorem 4.
Assume that ( K , τ ) is an SVNHF topological space over K , 1 Υ and 2 Υ are SVNHFSs over K . Then,
  • ( 1 Υ ) 1 Υ
  • ( 1 Υ ) = ( ( 1 Υ ) )
  • 1 Υ is an SVNHF open set ( 1 Υ ) = 1 Υ
  • ( 1 Υ ) ( 2 Υ ) if 1 Υ 2 Υ
  • ( 1 Υ ) ( 2 Υ ) = ( 1 Υ 2 Υ )
  • ( 1 Υ ) ( 2 Υ ) ( 1 Υ 2 Υ )
Proof .
  • This is obvious from the definition of the SVNHF interior.
  • Since ( 1 Υ ) is an SVNHF open set and it is also the biggest SVNHF open subset of itself, ( 1 Υ ) = ( ( 1 Υ ) ) .
  • If 1 Υ is an SVNHF open subset, then 1 Υ will be an SVNHF interior of itself since it is the largest SVNHF open subset. Conversely, if  ( 1 Υ ) = 1 Υ , then 1 Υ is an SVNHF open set because ( 1 Υ ) is SVNHF open.
  • Since 1 Υ 2 Υ , from part ( 1 ) , ( 1 Υ ) 1 Υ 2 Υ . ( 1 Υ ) is an SVNHF open subset of 2 Υ and so, by the definition of ( 2 Υ ) , we have ( 1 Υ ) ( 2 Υ )
  • From part ( 4 ) ,
    1 Υ 2 Υ 1 Υ and 1 Υ 2 Υ 2 Υ
    ( 1 Υ 2 Υ ) ( 1 Υ ) and ( 1 Υ 2 Υ ) ( 2 Υ )
    so that
    ( 1 Υ 2 Υ ) ( 1 Υ ) ( 2 Υ )
    Furthermore, since ( 1 Υ ) 1 Υ , ( 2 Υ ) 2 Υ , ( 1 Υ ) ( 2 Υ ) 1 Υ 2 Υ , so that ( 1 Υ ) ( 2 Υ ) is an SVNHF open subset of 1 Υ 2 Υ . Hence,
    ( 1 Υ ) ( 2 Υ ) ( 1 Υ 2 Υ )
    Thus,
    ( 1 Υ 2 Υ ) = ( 1 Υ ) ( 2 Υ ) .
  • From 1 Υ 1 Υ 2 Υ , 2 Υ 1 Υ 2 Υ
    we have
    ( 1 Υ ) ( 1 Υ 2 Υ ) , ( 2 Υ ) ( 1 Υ 2 Υ )
    so that, because ( 1 Υ ) ( 2 Υ ) is SVNHF open,
    ( 1 Υ ) ( 2 Υ ) ( 1 Υ 2 Υ ) .
   □
Definition 17.
Let us consider an SVNHF topological space ( K , τ ) . For any SVNHFS Υ of K , the SVNHF closure Υ ¯ is the intersection of all SVNHF closed super sets of Υ .
Example 7.
Consider an SVNHF topology τ = { 0 Υ , 1 Υ , 2 Υ , 1 Υ } on K defined in Example 4 and an SVNHFS defined in Example 6 For SVNHF closure, we have to find the complements of 1 Υ , 2 Υ , 0 Υ and 1 Υ .
( 1 Υ ) c = { ( ω 1 x , { 0.536 , 0.844 , 0.689 } , { 0.898 } , { 0.321 , 0.567 , 0.411 } , ω 2 x , { 0.998 , 0.450 } , { 0.350 , 0.321 } , { 0.213 , 0.469 , 0.328 } , ω 3 x , { 0.792 , 0.670 , 0.666 } , { 0.692 } , { 0.404 , 0.500 } ω 4 x , { 0.450 } , { 0.248 , 0.110 , 0.214 } , { 0.210 , 0.410 , 0.589 } } ( 2 Υ ) c = { ω 1 x , { 0.520 , 0.440 , 0.250 } , { 0.900 } , { 0.600 , 0.580 , 0.893 } , ω 2 x , { 0.450 , 0.100 } , { 0.790 , 0.350 } , { 0.469 , 0.480 , 0.850 } , ω 3 x , { 0.150 , 0.150 , 0.655 } , { 0.700 } , { 0.540 , 0.600 } ω 4 x , { 0.400 } , { 0.905 , 0.650 , 0.250 } , { 0.589 , 0.650 , 0.890 } } ( 0 Υ ) c = { ω 1 x , { 1.000 , 1.000 , 1.000 } , { 0.000 } , { 0.000 , 0.000 , 0.000 } , ω 2 x , { 1.000 , 1.000 , 1.000 } , { 0.000 , 0.000 } } , { 0.000 , 0.000 } , ω 3 x , { 1.000 , 1.000 } , { 0.000 } , { 0.000 , 0.000 , 0.000 } , ω 4 x , { 1.000 , 1.000 , 1.000 } , { 0.000 , 0.000 , 0.000 } , { 0.000 } } ( 1 Υ ) c = { ω 1 x , { 0.000 , 0.000 , 0.000 } , { 1.000 } , { 1.000 , 1.000 , 1.000 } , ω 2 x , { 0.000 , 0.000 , 0.000 } , { 1.000 , 1.000 } } , { 1.000 , 1.000 } , ω 3 x , { 0.000 , 0.000 } , { 1.000 } , { 1.000 , 1.000 , 1.000 } , ω 4 x , { 0.000 , 0.000 , 0.000 } , { 1.000 , 1.000 , 1.000 } , { 1.000 } }
Then, Υ ¯ = ( 0 Υ ) c = 1 Υ .
Theorem 5.
Suppose that K is a universal set, that ( K , τ ) is an SVNHF topological space over K , and that 1 Υ and 2 Υ are SVNHFSs over K . Then,
  • 0 Υ ¯ = 0 Υ and 1 Υ ¯ = 1 Υ
  • 1 Υ 1 Υ ¯
  • 1 Υ is an SVNHF closed set 1 Υ = 1 Υ ¯
  • 1 Υ ¯ ¯ = 1 Υ ¯
  • 1 Υ ¯ 2 Υ ¯ if 1 Υ 2 Υ
  • 1 Υ ¯ 2 Υ ¯ = 1 Υ 2 Υ ¯
  • 1 Υ 2 Υ ¯ 1 Υ ¯ 2 Υ ¯
Proof .
  • By definition, 0 Υ 0 Υ ¯ . Since 0 Υ is an SVNHF closed superset of itself, 0 Υ ¯ 0 Υ . Thus, 0 Υ ¯ = 0 Υ . Similarly, 1 Υ ¯ = 1 Υ .
  • By definition, 1 Υ 1 Υ ¯ , because 1 Υ ¯ is the intersection of all SVNHF closed supersets of 1 Υ .
  • The proof is obvious.
  • Since 1 Υ ¯ is an SVNHF closed set, by ( 3 ) we have 1 Υ ¯ ¯ = 1 Υ ¯ .
  • Suppose 1 Υ 2 Υ as  2 Υ 2 Υ ¯ . Therefore, 1 Υ 2 Υ ¯ . This means that 2 Υ ¯ is an SVNHF closed superset of 1 Υ . Thus, 1 Υ ¯ 2 Υ ¯ .
  • As we know that 1 Υ 1 Υ 2 Υ and 2 Υ 1 Υ 2 Υ , by using part ( 5 ) , 1 Υ ¯ 1 Υ 2 Υ ¯ and 2 Υ ¯ 1 Υ 2 Υ ¯ .
    1 Υ ¯ 2 Υ ¯ 1 Υ 2 Υ ¯ .
    Conversely, suppose that 1 Υ 1 Υ ¯ and 2 Υ 2 Υ ¯ .
    Thus, 1 Υ 2 Υ 1 Υ 2 Υ ¯ .
    Since 1 Υ ¯ 2 Υ ¯ is s SVNHF closed superset of 1 Υ 2 Υ .Therefore, 1 Υ 2 Υ ¯ 1 Υ ¯ 2 Υ ¯ .
    Thus, 1 Υ ¯ 2 Υ ¯ = 1 Υ 2 Υ ¯ .
  • If 1 Υ 2 Υ 1 Υ and 1 Υ 2 Υ 2 Υ , then 1 Υ 2 Υ ¯ 1 Υ ¯ and 1 Υ 2 Υ ¯ 2 Υ ¯ . Thus, 1 Υ 2 Υ ¯ 1 Υ ¯ 2 Υ ¯ .
   □
Definition 18.
Let us consider an SVNHF topological space ( K , τ ) . For any SVNHFS Υ of K , the SVNHF exterior Ext ( Υ ) is interpreted as the interior of the complement of SVNHFS Υ .
Example 8.
From Example 4, consider an SVNHF topology τ = { 0 Υ , 1 Υ , 2 Υ , 1 Υ } on K and an SVNHFS defined in Example 6. For SVNHF exterior, we have to find the complement of Υ .
( Υ ) c = { ( ω 1 x , { 0.530 , 0.540 , 0.570 } , { 0.899 } , { 0.400 , 0.575 , 0.589 } , ω 2 x , { 0.700 , 0.200 } , { 0.600 , 0.340 } , { 0.369 , 0.470 , 0.638 } , ω 3 x , { 0.400 , 0.380 , 0.660 } , { 0.695 } , { 0.500 , 0.550 } ω 4 x , { 0.440 } , { 0.600 , 0.389 , 0.230 } , { 0.330 , 0.500 , 0.700 } }
Then, Ext ( Υ ) = ( ( Υ ) c ) = 0 Υ .
Theorem 6.
Suppose that ( K , τ ) is an SVNHF topological space over K , and that 1 Υ and 2 Υ are SVNHFSs over K . Then,
  • ( 1 Υ ) c contains the largest SVNHF open set E x t ( 1 Υ ) .
  • ( 1 Υ ) c is SVNHF open E x t ( 1 Υ ) = ( 1 Υ ) c .
  • 1 Υ 2 Υ E x t ( 1 Υ ) E x t ( 2 Υ ) .
Proof .
Straight forward.    □
Definition 19.
Let us consider an SVNHF topological space ( K , τ ) . For any SVNHFS Υ of K , the SVNHF frontier Fr ( Υ ) is interpreted as the intersection of Υ ¯ and ( Υ ) c ¯
Example 9.
From Example 4, consider an SVNHF topology τ = { 0 Υ , 1 Υ , 2 Υ , 1 Υ } on K and an SVNHFS defined in Example 6. The SVNHF frontier is
Fr ( Υ ) = Υ ¯ ( Υ ) c ¯ = 1 Υ .
Theorem 7.
Consider an SVNHF topological space ( K , τ ) and Υ as an SVNHFS; then,
  • F r ( Υ ) = F r ( ( Υ ) c ) .
  • ( F r ( Υ ) ) c = ( Υ ) ( ( Υ ) c ) .
  • If Υ is SVNHF open, then F r ( Υ ) ( Υ ) c .
Proof .
  • By the definition of the SVNHF frontier, F r ( Υ ) = Υ ¯ ( Υ ) c ¯ = ( Υ ) c ¯ Υ ¯ = ( Υ ) c ¯ ( ( Υ ) c ) c ¯ = F r ( ( Υ ) c ) .
  • Since F r ( Υ ) = Υ ¯ ( Υ ) c ¯ , by taking the SVNHF complement on both sides, we obtain ( F r ( Υ ) ) c = Υ ¯ ( Υ ) c ¯ c = Υ ¯ c .
    ( Υ ) c ¯ c = ( ( Υ ) c ) Υ by Theorem 5.
  • Let Υ be an SVNHF open set; this yields that ( Υ ) c is SVNHF closed. Utilizing ( 2 ) , F r ( Υ ) c ( Υ ) c , and by ( 1 ) , we obtain F r ( Υ ) ( Υ ) c .
   □
Theorem 8.
Suppose that ( K , τ ) is an SVNHF topological space over K and that Υ is an SVNHFS; then,
  • ( Υ ) c ¯ = ( ( Υ ) ) c
  • ( Υ ) ¯ = Υ F r ( Υ ) .
  • ( Υ ) = Υ F r ( Υ ) .
  • For any subset Υ in ( K , τ ) , Υ is open if, and only if, Υ F r ( Υ ) is a null SVNHFS.
  • For any subset Υ in ( K , τ ) , Υ is closed if, and only if, Υ F r ( Υ ) .
  • For any subset Υ in ( K , τ ) , Υ is both open and closed if, and only if, F r ( Υ ) is a null SVNHFS.
Proof .
The proof is obvious.    □
Definition 20.
Consider an SVNHF topological space ( K , τ ) . A SVNHFS Υ is termed dense in K if Υ ¯ = 1 Υ .
Example 10.
Let us consider SVNHF topological space given in Example 4 an SVNHFS Υ defined in Example 6. We see that Υ ¯ = 1 Υ . This shows that Υ is dense in K .
Definition 21.
Consider an SVNHF topological space ( K , τ ) . A sub-collection B of τ is called an SVNHF base for τ if every SVNHF open set in τ is a union of members of B .
Example 11.
From Example 4, consider SVNHF topology τ = { 0 Υ , 1 Υ , 2 Υ , 1 Υ } over K . Then, B = { 0 Υ , 1 Υ , 2 Υ , 1 Υ } is an SVNHF base for τ.

4. Extension of SIR Method for SVNHF Information

In this section, a new MCDM method is developed based on Algorithm 1, which is an extension of the SIR method to SVNHFSs.
Algorithm 1: (SIR method for SVNHFSs)
Let K = { ω i x : i = 1 , 2 , , l } be an assemblage of substitutes/alternatives and C = { ω j C : j = 1 , 2 , , m } is the collection of accredits/attributes. Assume that
E = { ω k e : k = 1 , 2 , , n } be the collection of experts with weight vectors W ˙ = { w ˙ 1 , w ˙ 2 , , w ˙ n } . Suppose P ( k ) = p i j ( k ) l × m ( i = 1 , 2 , , l ; j = 1 , 2 , , m ; k = 1 , 2 , , n ) is the SVNHF decision matrix, where p i j ( k ) designates the accredits value that substitutes ω i x and persuades the accredits ω j C designated by expert ω k e . The accredits weighted decision matrix is w ˙ = ( w ˙ j ( k ) ) n × m , where w ˙ j ( k ) designates the weight value of the accredits ω j C designated by expert ω k e .
A novel approach based on SVNHF-SIR is addressed below:
Step 1: Calculate the discrete/individual measure degree ρ k ( k = 1 , 2 , , n ) via the weights of experts, which take the form of SVNHFEs. The relative closeness coefficient is procured as follows:
ρ k = d ( W ˙ k , W ˙ ) d ( W ˙ k , W ˙ ) + d ( W ˙ k , W ˙ + ) .
where W ˙ + = ( max { ω k μ } , min { ω k I } , min { ω k ν } ) , W ˙ = ( min { ω k μ } , max { ω k I } , max { ω k ν } ) . It is easily obtained that 0 W ˙ k 1 and if ρ k 1 , then W ˙ k W ˙ + ; if ρ k 0 , then W ˙ k W ˙ .
Step 2: To make the sum into a unit, normalize the ρ k ( k = 1 , 2 , , n ) and obtain as follows:
ϖ k = ρ k k = 1 n ρ k = ρ k ρ 1 + ρ 2 + + ρ n
We obtain the vector of real numbers that have been normalized ϖ = ( ϖ 1 , ϖ 2 , , ϖ n ) μ as discrete/individual measure degrees.
Step 3: Employ the SVNHFWA operator to aggregate individual perspectives into group perspectives as follows:
  • Discrete/individual attributes’ weights integration:
    w ˙ ¯ j = S V N H F W A ϖ k w ˙ j ( 1 ) , w ˙ j ( 2 ) , , w ˙ j ( n ) = 1 k = 1 n 1 ω μ j ( k ) ϖ k , k = 1 n ω I j ( k ) ϖ k , k = 1 n ω ν j ( k ) ϖ k = ( j , j , j )
  • Discrete/individual decision matrix integration:
    p ¯ i j = S V N H F W A ϖ k p i j ( 1 ) , p i j ( 2 ) , , p i j ( n ) = 1 k = 1 n 1 ω μ i j ( k ) ϖ k , k = 1 n ω I i j ( k ) ϖ k , k = 1 n ω ν i j ( k ) ϖ k
From this step, the group-integrated decision matrix p = ( p ¯ i j ) l × m and the attribute weight vector w ˙ ¯ = ( w ˙ ¯ 1 , w ˙ ¯ 2 , , w ˙ ¯ m ) are acquired.
Step 4: Acquire the SVNHF superiority/inferiority matrix
  • Attain the performance function f i j :
    f i j = f ( p ¯ i j ) = d ( p ¯ i j , p ¯ ) d ( p ¯ i j , p ¯ ) + d ( p ¯ i j , p ¯ + )
    where p ¯ = { ω j C , ( min { ω i j μ } , max { ω i j I } , max { ω i j ν } ) } ,
    p ¯ + = { ω j C , ( max { ω i j μ } , min { ω i j I } , min { ω i j ν } ) } . It is easily obtained that 0 f i j 1 and if f i j 1 , then p ¯ i j p ¯ + ; if f i j 0 , then p ¯ i j p ¯ .
  • Attain the preference intensity P I j ( ω i x , ω t x ) :
    We define P I j ( ω i x , ω t x ) ( i , t = 1 , 2 , , l , i t ; j = 1 , 2 , , m ) as the preference intensity of alternatives ω i x to the corresponding attribute ω j C , which is given as follows:
    P I j ( ω i x , ω t x ) = ϕ j ( f i j f t j ) = ϕ j ( d )
    where ϕ j ( d ) is a non-decreasing function from the real number to [ 0 , 1 ] . Normally, ϕ j ( d ) is from a set of six generalized threshold functions [42], or interpreted by the experts themselves.
  • Acquire superiority matrix and inferiority matrix:
    Superiority index ( S -index): S = ( S i j ) l × m
    S i j = t = 1 m P I j ( ω i x , ω t x ) = t = 1 m ϕ j ( f i j f t j ) ;
    Inferiority index ( I -index): I = ( I i j ) l × m
    I i j = t = 1 m P I j ( ω i x , ω t x ) = t = 1 m ϕ j ( f t j f i j ) ;
Step 5: Calculate the superiority flow and inferiority flow as follows:
S -flow
Ψ > ( ω i x ) = S V N H F W A S i j ( w ˙ ¯ 1 , w ˙ ¯ 2 , , w ˙ ¯ m ) = 1 j = 1 m ( 1 j ) S i j , j = 1 m ( j ) S i j , j = 1 m ( j ) S i j
I -flow
Ψ < ( ω i x ) = S V N H F W A I i j ( w ˙ ¯ 1 , w ˙ ¯ 2 , , w ˙ ¯ m ) = 1 j = 1 m ( 1 j ) I i j , j = 1 m ( j ) I i j , j = 1 m ( j ) I i j
By using Equation (1), we calculate the score function of the corresponding S -flow Ψ > ( ω i x ) and I -flow Ψ < ( ω i x ) , respectively. Hence, we obtain the S -flow and I -flow of alternative ω i x as ω i x ( Ψ > ( ω i x ) , Ψ < ( ω i x ) ) . It seems that if the S -flow Ψ > ( ω i x ) is larger and the I -flow Ψ < ( ω i x ) is smaller, the alternative ω i x is preferable.
Step 6: Superiority ranking rule ( S R -Rule):
S R R u l e 1 . If  Ψ > ( ω i x ) > Ψ > ( ω t x ) and Ψ < ( ω i x ) < Ψ < ( ω t x ) , then ω i x ω t x ;
S R R u l e 2 . If  Ψ > ( ω i x ) > Ψ > ( ω t x ) and Ψ < ( ω i x ) = Ψ < ( ω t x ) , then ω i x ω t x ;
S R R u l e 3 . If  Ψ > ( ω i x ) = Ψ > ( ω t x ) and Ψ < ( ω i x ) < Ψ < ( ω t x ) , then ω i x ω t x .
Inferiority ranking rule ( I R -Rule):
I R R u l e 1 . If  Ψ > ( ω i x ) < Ψ > ( ω t x ) and Ψ < ( ω i x ) > Ψ < ( ω t x ) , then ω i x ω t x ;
I R R u l e 2 . If  Ψ > ( ω i x ) < Ψ > ( ω t x ) and Ψ < ( ω i x ) = Ψ < ( ω t x ) , then ω i x ω t x ;
I R R u l e 3 . If  Ψ > ( ω i x ) = Ψ > ( ω t x ) and Ψ < ( ω i x ) > Ψ < ( ω t x ) , then ω i x ω t x .
Step 7: By incorporating the S R -Rule and the I R -Rule, we can achieve the best alternative ω i x ( i = 1 , 2 , , l ) .
A flow chart of the SIR method for supplier selection is shown in Figure 1.
Figure 1. Flow chart of SIR method for supplier selection.
Figure 1. Flow chart of SIR method for supplier selection.
Symmetry 14 01382 g001

5. Extension of CV Method for SVNHF Information

In this section, a new MCDM method is developed in Algorithm 2, which is extension of the CV method to SVNHFSs. Table 5 includes various types of cases where different systems were used to help with operations or decision-making in the food supply chain.
Algorithm 2: (CV method for SVNHFSs)
Step 1: Obtain the decision matrices from the decision makers, with alternative ω j x evaluated on the basis of criterion ω i C , given in Table 6. The aggregated decision matrix p ¯ i j is obtained using step 1, step 2 and step 3 ( 2 ) .
Step 2: Decision makers also give weight w to the criteria with the condition that the sum of weights must be equal to 1. Then, the multiplication of decision matrix is computed with criteria weights, to obtain the matrix q ¯ i j .
Step 3: Find the score function of each SVNHFN.
Step 4: Compute the ranking of the alternatives according to their score function values.

Case Study

The food industry is critical for delivering the essentials for a variety of uses and tendencies [43]. Food must be stored, supplied, and marketed as soon as it is cultivated or produced so that it can reach the ultimate customers on time. Every year, worldwide food loss would supply more than enough to nourish the world’s nearly 1 billion starving people. In Pakistan, it is anticipated that 40 % of food is wasted. Food is produced in sufficient quantities to feed the overall population of Pakistan, but due to food waste, an expected 6 out of 10 inhabitants go to bed without dinner. Pakistan stands 107th out of 118 developing countries on the International Poverty Index. Approximately one-third of all produced food is destroyed or wasted each year (approximately 1.3 billion tonnes) [44]. Two-thirds of all waste in food (roughly 1 billion tonnes) occurs at the supply chain stage, which encompasses cultivation, shipments, and storage [45].
The term FSCM has been utilized to depict the activities or procedures occurring during the yield, dispersion, and the use of various foods in order to preserve their quality and safety in effective and efficient ways [46,47]. The relevance of factors such as safety, food quality, and freshness within a specified time frame distinguishes FSCM from many other supply chains including furniture logistics and supply chain management, making the underpinning supply chain more convoluted and unmanageable [48]. As the challenges of global coordination have increased, the attention turned from a single echelon, such as food production, to the effectiveness and efficiency of the comprehensive supply chain. That is, the food supply chain resources such as vehicles, storage areas, transport services, and laborers will be used proficiently to ensure the quality and safety of food through effective efforts including optimization decisions [49]. The relevance of value chains in FSCM is that they benefit both consumers and producers. The traceability of food has become increasingly popular in recent decades, with a wide range of applications. Because of the emergence of food, FSCM is becoming more dynamic and complex in order to meet the diversifying and globalized industries.

FSCM IT Systems

There is no doubt that IT systems are crucial in FSCM because so much can go wrong, such as vehicles, food suppliers, data entry, and so on. The decision-making systems and traceability for FSCM are used as examples of current state-of-the-art situations that professionals can use when instituting IT-based solutions. A food’s traceability consists in a data trail that follows the physiological trail of the food through different phases [50]. Some systems track food all the way from the retailer to the farm, while others only examine key stages of the supply chain. Some traceability systems gather information only for tracking food products to the minute of manufacturing or logistics path, while others track only superficial data, such as in a vast geographical area [51]. Aside from FSCM’s traceability systems, other decision-making processes in the food industry include implementation, strategy, vehicle maintenance, and WMS.
The internationalization of food production, logistics, and utilization has resulted in an integrated world for FSCM, whose models are critical in ensuring consistently high standards and security in food products [52]. Quality of food, high delivery performance, and food security appear to be more important in these models. Multi-objective considerations are also common; for example, food quality assurance is incorporated into decision models. Recently, supply chain effectiveness and value chain evaluation have received special attention, since the international FSCM is becoming increasingly important.
Table 5. Cases involving IT systems in FSCM that have been reported.
Table 5. Cases involving IT systems in FSCM that have been reported.
InstanceFirmNetworkEnhancement
Aramyan et al. [53]Tomato firmPerformanceEfficiency and flexibility
  measurement systemhave both improved,
   food quality has improved,
   and there is a faster response time.
Bevilacqua et al. [54]Tronto ValleyARISThree types of costs
   are being reduced;
   improved traceability.
Pagell and Wu [55]Pizza restaurantsTQM Lean/JITEnhanced information sharing,
   superior quality,
   enhanced logistical efficiency.
Tuncel and Alpan [56]A medium sizeRisk managementThe percentage of orders completed
   on time has increased to 90.6 % ,
   with risk reduction rising by 9.9 % .
Zhu et al. [57]A food manufacturerCustomer cooperationCustomer cooperation has improved;
  systeminternal environment management
   has been improved.
Jacxsens et al. [58]A fresh producerFood safetyFood of higher quality;
  management systemimproved risk management ability.
Friel et al. [59]Agri-food supply chainH&S foodA more nutritious diet,
  decision-makingwith improved environmental
  systemsustainability.
Savino et al. [60]A chestnutValue chainIncreased long-term viability,
 companymanagementCO2 reduced emissions,
  systemenhanced value chain.
Banasik et al. [61]A mushroomSupply chainOverall profitability increased by 11 % ,
 manufacturermanagementwith improved environmental
  systemperformance
Sgarbossa and Russo [62]6 FirmsFSCM systemConserving energy,
   costs of disposal avoided,
   enhanced productivity.
Table 6. Single-valued neutrosophic hesitant fuzzy decision matrices.
Table 6. Single-valued neutrosophic hesitant fuzzy decision matrices.
ω 1 e ω 1 C ω 2 C ω 3 C
ω 1 x { 0.125 , 0.326 } , { 0.444 } , { 0.236 } { 0.230 } , { 0.200 } , { 0.912 } { 0.200 } , { 0.111 , 0.253 } , { 0.751 }
ω 2 x { 0.111 } , { 0.750 , 0.905 } , { 0.216 } { 0.250 } , { 0.112 } , { 0.445 } { 0.523 } , { 0.521 } , { 0.423 , 0.624 }
ω 3 x { 0.149 } , { 0.242 } , { 0.889 } { 0.246 , 0.925 } , { 0.851 } , { 0.124 } { 0.259 , 0.590 } , { 0.125 } , { 0.300 }
ω 4 x { 0.195 } , { 0.860 } , { 0.120 , 0.120 } { 0.315 } , { 0.866 } , { 0.606 } { 0.400 , 0.580 } , { 0.430 } , { 0.118 }
ω 2 e ω 1 C ω 2 C ω 3 C
ω 1 x { 0.326 } , { 0.414 } , { 0.216 } { 0.655 } , { 0.200 } , { 0.219 } { 0.800 } , { 0.253 } , { 0.715 , 0.870 }
ω 2 x { 0.456 } , { 0.570 , 0.800 } , { 0.206 } { 0.250 } , { 0.102 , 0.436 } , { 0.102 } { 0.600 } , { 0.500 } , { 0.421 }
ω 3 x { 0.419 } , { 0.237 } , { 0.900 } { 0.380 } , { 0.450 } , { 0.120 } { 0.529 } , { 0.125 } , { 0.210 }
ω 4 x { 0.528 } , { 0.111 } , { 0.120 , 0.300 } { 0.513 } , { 0.750 } , { 0.880 } { 0.450 } , { 0.400 , 0.500 } , { 0.117 }
ω 3 e ω 1 C ω 2 C ω 3 C
ω 1 x { 0.225 , 0.350 } , { 0.420 } , { 0.220 } { 0.222 } , { 0.150 , 0.215 } , { 0.319 } { 0.755 } , { 0.253 } , { 0.745 }
ω 2 x { 0.330 } , { 0.100 } , { 0.498 } { 0.546 } , { 0.110 } , { 0.623 } { 0.550 , 0.600 } , { 0.520 } , { 0.324 }
ω 3 x { 0.240 } , { 0.230 , 0.300 } , { 0.850 } { 0.855 } , { 0.114 } , { 0.522 } { 0.300 } , { 0.100 , 0.550 } , { 0.900 }
ω 4 x { 0.800 } , { 0.200 } , { 0.120 , 0.300 } { 0.356 } , { 0.777 } , { 0.415 } { 0.444 } , { 0.232 } , { 0.718 }
Choosing a supplier is a critical element of any business’s operations. Reputation, reliability, service, cost, and value for money are all important considerations. The aim of supplier selection is to identify the best supplier who delivers the best value for money in terms of product or service. Suitable supplier selection yields good profit and quality in the end. The supplier is treated as an integral part of the organization in this strategic alliance. All purchasers must choose a supplier, and it is a critical step in the acquisition process. Purchasers should go through several stages of decision making and develop their own selection criteria for selecting appropriate suppliers.
Some interesting studies for supply chain can be seen in [63,64,65].

6. MCDM Process

The RH Flour Mills in Lahore wants to find the best supplier for one of its key components in the manufacturing process. Four suppliers were left as alternatives. The four criteria considered were: quality and safety, delivery, social responsibility, and service. The suppliers are evaluated using the recommended methodology by a group of decision makers. In multi-criteria decision making with a fuzzy environment, four decision makers were chosen, consisting of supplier experts and expert academics. The steps in the procedure for selecting the best green supplier are as follows.
The decision-making process using Algorithm 1 is illustrated as follows:
Let K = { ω 1 x , ω 2 x , ω 3 x , ω 4 x } is the set of alternatives and C = { ω 1 C , ω 2 C , ω 3 C } is the set of attributes. Assume that E = { ω 1 e , ω 2 e , ω 3 e } is the set of experts. Then, the single-valued neutrosophic hesitant fuzzy decision matrices are expressed in Table 6, the weights of the experts are given in Table 7, and the weights of the attributes are shown in Table 8.
Step 1: Compute the individual measure degree ρ k ( k = 1 , 2 , 3 ) using Equation (6), given by
ρ = ( 0.432 , 0.466 , 0.573 ) μ
Step 2: Acquire the normalized vector using Equation (7), given as
ϖ = ( 0.294 , 0.317 , 0.390 ) μ
Step 3: The attribute weights can be obtained using Equation (8), which are expressed as follows:
w ˙ 1 = { 0.226 , 0.480 } , { 0.240 , 0.328 } , { 0.310 } w ˙ 2 = { 0.483 , 0.501 } , { 0.258 , 0.304 } , { 0.258 } w ˙ 3 = { 0.216 , 0.394 } , { 0.520 , 0.611 } , { 0.576 }
The aggregated decision matrices can be obtained using Equation (9), and can be written as follows:
( p i j ) 4 × 3 = { 0.232 , 0.283 , 0.289 , 0.336 } , { 0.425 } , { 0.223 } { 0.401 } , { 0.178 , 0.205 } , { 0.385 } { 0.675 } , { 0.198 , 0.253 } , { 0.737 , 0.784 } { 0.319 } , { 0.313 , 0.349 , 0.331 , 0.369 } , { 0.294 } { 0.384 } , { 0.108 , 0.171 } , { 0.318 } { 0.559 , 0.579 } , { 0.514 } , { 0.380 , 0.426 } { 0.279 } , { 0.253 , 0.261 } , { 0.877 } { 0.628 , 0.811 } , { 0.317 } , { 0.215 } { 0.372 , 0.473 } , { 0.114 , 0.222 } , { 0.411 } { 0.605 } , { 0.254 } , { 0.120 , 0.171 , 0.359 , 0.215 } { 0.400 } , { 0.793 } , { 0.588 } { 0.434 , 0.490 } , { 0.330 , 0.354 } , { 0.237 }
Step 4: Acquire the performance function f i j using Equation (10):
( f i j ) 4 × 3 = 0.586 0.540 0.464 0.625 0.644 0.599 0.179 0.767 0.688 1 0.198 0.601
The threshold attribute function was set to
ϕ k ( d ) = 0.01 i f d > 0 0.00 i f d 0
Acquire the superiority matrix ( S -matrix) using Equation (12):
S = 0.01 0.01 0 0.02 0.02 0.01 0 0.03 0.03 0.03 0 0.02
Acquire the inferiority matrix ( I -matrix) using Equation (13):
I = 0.02 0.02 0.03 0.01 0.01 0.02 0.03 0 0 0 0.03 0.01
Step 5: Measure the flow of superiority and inferiority using Equations (14) and (15), which are exhibited in Table 9 and Table 10.
Step 6: Integrate Table 9 with the S R -Rule, and the following seems to be accessible:
ω 1 x ω 2 x ω 3 x ω 4 x
Combine Table 10 with the I R -Rule, and the following seems to be accessible:
ω 1 x ω 2 x ω 4 x ω 3 x
Step 7: The most desirable alternative, according to the results of the S R -Rule and the I R -Rule, is ω 1 x . A representation of SVNHF superiority and inferiority flow is shown in Figure 2.
The decision-making process using Algorithm 2 is illustrated as follows: Step 1: Consider SVNHF decision matrices given in Table 6. Obtain aggregated decision matrix ( p ¯ i j ) 4 × 3 using Step 1, Step 2, and Step 3. Step 2: The decision makers provide weights to three criteria as w 1 = 0.235 , w 2 = 0.312 , and w 3 = 0.453 , with w i = 1
( q ¯ i j ) 4 × 3 = { 0.232 , 0.283 , 0.289 , 0.336 } , { 0.425 } , { 0.223 } { 0.401 } , { 0 . 0.178 , 0.205 } , { 0.385 } { 0.675 } , { 0 . 0.198 , 0.253 } , { 0.737 , 0.784 } { 0.319 } , { 0.313 , 0.349 , 0.331 , 0.369 } , { 0.294 } { 0.384 } , { 0.108 , 0.171 } , { 0.318 } { 0.559 , 0.579 } , { 0.514 } , { 0.380 , 0.426 } { 0.279 } , { 0.253 , 0.261 } , { 0.877 } { 0.628 , 0.811 } , { 0.317 } , { 0.215 } { 0.372 , 0.473 } , { 0.114 , 0.222 } , { 0.411 } { 0.605 } , { 0.254 } , { 0.120 , 0.171 , 0.359 , 0.215 } { 0.400 } , { 0.793 } , { 0.588 } { 0.434 , 0.490 } , { 0.330 , 0.354 } , { 0.237 } 0.235 0.312 0.453
( q ¯ i j ) 4 × 1 = { 0.484 , 0.495 , 0.496 , 0.507 } , { 0.0005 , 0.0007 } , { 0.0021 , 0.0022 } { 0.446 , 0.455 } , { 0.0006 , 0.0006 , 0.0006 , 0.0011 } , { 0.0017 , 0.0013 } { 0.429 , 0.529 } , { 0.0003 , 0.0006 } , { 0.0026 } { 0.461 , 0.485 } , { 0.0022 , 0.0024 } , { 0.0005 , 0.0008 , 0.0016 , 0.0010 }
Step 3: Compute the score values of each alternative. The score values of the alternatives are given in Table 11.
Step 4: Rank the alternatives according to their score values.
ω 1 x ω 3 x ω 4 x ω 2 x
As a result, ω 1 x is the best supplier among the four alternatives according to the qualities of all criteria.

Comparative Analysis

This paper develops new techniques for modeling uncertainties using SVNHF information. We compare the ranking of alternatives using proposed SIR method and the CV method for SVNHFSs. If we use the SVNHF SIR approach to assemble the alternatives, they are ranked for superiority flow as
ω 1 x ω 2 x ω 3 x ω 4 x
and for inferiority flow as
ω 1 x ω 2 x ω 4 x ω 3 x
On the other hand, when we use the technique of the CV method, the ranking of the alternatives becomes
ω 1 x ω 3 x ω 4 x ω 2 x
Based on these findings, it is clear that the ranking of the alternatives is not same. However, the optimal alternative ω 1 x remains identical in both MCDM methods.
The ranking of alternatives using the SIR method and the CV method is also shown in Figure 3.

7. Conclusions

This paper was designed to introduce the concept of single-valued neutrosophic hesitant fuzzy (SVNHF) topology and its applications in data analysis for uncertain supply chains. An SVNHFS is a hybrid structure of a hesitant fuzzy set (HFS) and a single-valued neutrosophic set (SVNS), which is a novel concept for modeling uncertainties in real-life circumstances with key features of three membership functions: truth-hesitancy membership function, indeterminacy-hesitancy membership function and falsity-hesitancy membership function. Using the characteristics of SVNHFSs, we defined the notion of SVNHF topology. We investigated the fundamental properties of SVNHF topology, such as the SVNHF closure, the SVNHF interior, the SVNHF exterior, and the SVNHF frontier, as well as the SVNHF dense set and the SVNHF base, with the help illustrative examples. Eventually, to demonstrate and validate the SIR method and the CV method in terms of rationality and scientific basis, a real-life example of supplier selection in a food supply chain was provided. A comparative analysis was also given to discuss the validity and advantage of proposed techniques. The proposed methods can be further extended to investigate the dynamics of human decision analysis, humanized computing, data analysis, computational intelligence, and healthcare.

Author Contributions

M.R.: conceptualization, formal analysis, and supervision. Y.A.: investigation, supervision, and funding acquisition. S.B.: methodology and writing—review and editing. S.T.: investigation and writing—review and editing. All authors have read and agreed to the published version of the manuscript.

Funding

The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University, Abha, Saudi Arabia, for funding this work through a research groups program under grant number RGP.2/211/43.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Acknowledgments

The authors are thankful to the Editor-in-Chief and reviewers for their valuable suggestions to improve the quality of this manuscript.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Zadeh, L.A. Fuzzy sets. Inf. Control. 1965, 8, 338–353. [Google Scholar] [CrossRef] [Green Version]
  2. Atanassov, T.K. Intuitionistic fuzzy sets. Fuzzy Sets Syst. 1986, 20, 87–96. [Google Scholar] [CrossRef]
  3. Yager, R.R. Pythagorean fuzzy subsets. In Proceedings of the Joint IFSA World Congress and NAFIPS Annual Meeting, Edmonton, AB, Canada, 24–28 June 2013; pp. 57–61. [Google Scholar]
  4. Yager, R.R. Generalized orthopair fuzzy sets. IEEE Trans. Fuzzy Syst. 2017, 25, 1222–1230. [Google Scholar] [CrossRef]
  5. Cuong, B.C. Picture fuzzy sets. J. Comput. Sci. Cybern. 2014, 30, 409–420. [Google Scholar]
  6. Mahmood, T.; Ullah, K.; Khan, Q.; Jan, N. An approach toward decision-making and medical diagnosis problems using the concept of spherical fuzzy sets. Neural Comput. Appl. 2019, 31, 7041–7053. [Google Scholar] [CrossRef]
  7. Ashraf, S.; Abdullah, S.; Mahmood, T.; Ghani, F.; Mahmood, T. Spherical fuzzy sets and their applications in multi-attribute decision making problems. J. Intell. Fuzzy Syst. 2019, 36, 2829–2844. [Google Scholar] [CrossRef]
  8. Gündogdu, F.K.; Kahraman, C. Spherical fuzzy sets and spherical fuzzy TOPSIS method. J. Intell. Fuzzy Syst. 2018, 36, 337–352. [Google Scholar] [CrossRef]
  9. Smarandache, F. A Unifying Field in Logics: Neutrosophy: Neutrosophic Probability, Set and Logic; American Research Press: Rehoboth, DE, USA, 1999; pp. 1–141. [Google Scholar]
  10. Wang, H.; Smarandache, F.; Zhang, Y.; Sunderraman, R. Single-Valued Neutrosophic Sets; Infinite Study: Coimbatore, India, 2010; pp. 1–4. [Google Scholar]
  11. Molodtsov, D. Soft set theory-first results. Comput. Math. Appl. 1999, 37, 19–31. [Google Scholar] [CrossRef] [Green Version]
  12. Hashmi, M.R.; Riaz, M.; Smarandache, F. m-polar Neutrosophic Topology with Applications to Multi-Criteria Decision-Making in Medical Diagnosis and Clustering Analysis. Int. J. Fuzzy Syst. 2020, 22, 273–292. [Google Scholar] [CrossRef]
  13. Torra, V. Hesitant fuzzy sets. Int. J. Intell. Syst. 2010, 25, 529–539. [Google Scholar] [CrossRef]
  14. Ye, J. Multiple-attribute Decision-Making Method under a Single-Valued Neutrosophic Hesitant Fuzzy Environment. J. Intell. Syst. 2015, 24, 23–36. [Google Scholar] [CrossRef]
  15. Tanuwijaya, B.; Selvachandran, G.; Son, L.H.; Basset, M.A.; Huynh, H.X.; Pham, V.H.; Ismail, M. A Novel Single Valued Neutrosophic Hesitant Fuzzy Time Series Model: Applications in Indonesian and Argentinian Stock Index Forecasting. IEEE Access 2020, 8, 60126–60141. [Google Scholar] [CrossRef]
  16. Liu, C.F.; Luo, Y.S. New aggregation operators of single-valued neutrosophic hesitant fuzzy set and their application in multi-attribute decision making. Pattern Anal. Appl. 2019, 22, 417–427. [Google Scholar] [CrossRef]
  17. Wang, R.; Li, Y. Generalized Single-Valued Neutrosophic Hesitant Fuzzy Prioritized Aggregation Operators and Their Applications to Multiple Criteria Decision-Making. Information 2018, 9, 10. [Google Scholar] [CrossRef] [Green Version]
  18. Giri, B.C.; Molla, M.U.; Biswas, P. TOPSIS Method for Neutrosophic Hesitant Fuzzy Multi-Attribute Decision Making. Informatica 2020, 31, 35–63. [Google Scholar] [CrossRef]
  19. Xu, X. The SIR method: A superiority and inferiority ranking method for multiple criteria decision making. Eur. J. Oper. Res. 2001, 131, 587–602. [Google Scholar] [CrossRef]
  20. Tam, C.M.; Tong, T.K.L.; Wong, Y.W. Selection of concrete pump using the superiority and inferiority ranking method. J. Constr. Eng. Manag. 2004, 130, 827–834. [Google Scholar] [CrossRef]
  21. Tam, C.M.; Tong, T.K. Locating large-scale harbourfront project developments using SIR method with grey aggregation approach. Constr. Innov. 2008, 8, 120–136. [Google Scholar] [CrossRef]
  22. Chai, J.; Liu, J.N.K. A Novel Multicriteria Group Decision Making Approach with Intuitionistic Fuzzy SIR Method. In Proceedings of the World Automation Congress, Kobe, Japan, 19–23 September 2010. [Google Scholar]
  23. Ma, Z.J.; Zhang, N.; Dai, Y. A novel SIR method for multiple attributes group decision making problem under hesitant fuzzy environment. J. Intell. Fuzzy Syst. 2014, 26, 2119–2130. [Google Scholar] [CrossRef]
  24. Peng, X.; Yang, Y. Some results for Pythagorean fuzzy sets. Int. J. Intell. Syst. 2015, 30, 1133–1160. [Google Scholar] [CrossRef]
  25. Rouhani, S. A fuzzy superiority and inferiority ranking based approach for IT service management software selection. Kybernetes 2017, 46, 728–746. [Google Scholar] [CrossRef]
  26. Chen, T. A novel PROMETHEE-based outranking approach for multiple criteria decision analysis with Pythagorean fuzzy information. IEEE Access 2018, 6, 54495–54506. [Google Scholar] [CrossRef]
  27. Tavana, M.; Zareinejad, M.; Arteaga, F.J.S. An intuitionistic fuzzy-grey superiority and inferiority ranking method for third-party reverse logistics provider selection. Int. J. Syst. Sci. Oper. Logist. 2018, 5, 175–194. [Google Scholar] [CrossRef]
  28. Zhao, N.; Xu, Z.; Ren, Z. Hesitant fuzzy linguistic prioritized superiority and inferiority ranking method and its application in sustainable energy technology evaluation. Inf. Sci. 2019, 478, 239–257. [Google Scholar] [CrossRef]
  29. Geetha, S.; Narayanamoorthy, S. Superiority and inferiority ranking method with hesitant Pythagorean fuzzy set for solving MCDM problems. Malaya J. Mat. 2020, 1, 11–15. [Google Scholar]
  30. Jian, J.; Zhan, N.; Su, J. A novel superiority and inferiority ranking method for engineering investment selection under interval-valued intuitionistic fuzzy environment. J. Intell. Fuzzy Syst. 2019, 37, 6645–6653. [Google Scholar] [CrossRef]
  31. Smarandache, F. New types of Neutrosophic Set/Logic/Probability, Neutrosophic Over-/Under-/Off-Set, Neutrosophic Refined Set, and their Extension to Plithogenic Set/Logic/Probability, with Applications; MDPI: Basel, Switzerland, 2019. [Google Scholar]
  32. Seikh, M.R.; Dutta, S. A Nonlinear Programming Model to Solve Matrix Games with Pay-offs of Single-valued Neutrosophic Numbers. Neutrosophic Sets Syst. 2021, 47, 366–383. [Google Scholar]
  33. Saha, A.; Paul, A. Generalized Weighted Exponential Similarity Measures of Single Valued Neutrosophic Sets. Int. J. Neutrosophic Sci. 2019, 0, 57–66. [Google Scholar]
  34. Alcantud, J.C.R.; Garcia, G.S.; Akram, M. OWA aggregation operators and multi-agent decisions with N-soft sets. Expert Syst. Appl. 2022, 203, 1–17. [Google Scholar]
  35. Sitara, M.; Akram, M.; Riaz, M. Decision-making analysis based on q-rung picture fuzzy graph structures. J. Appl. Math. Comput. 2021, 67, 541–577. [Google Scholar] [CrossRef]
  36. Riaz, M.; Riaz, M.; Jamil, N.; Zararsiz, Z. Distance and similarity measures for bipolar fuzzy soft sets with application to pharmaceutical logistics and supply chain management. J. Intell. Fuzzy Syst. 2022, 42, 3169–3188. [Google Scholar] [CrossRef]
  37. Farid, H.M.A.; Riaz, M. Some generalized q-rung orthopair fuzzy Einstein interactive geometric aggregation operators with improved operational laws. Int. J. Intell. Syst. 2021, 36, 7239–7273. [Google Scholar] [CrossRef]
  38. Zararsiz, Z.; Riaz, M. Bipolar fuzzy metric spaces with application. Comput. Appl. Math. 2022, 41, 41–49. [Google Scholar] [CrossRef]
  39. Riaz, M.; Tanveer, S.; Pamucar, D.; Qin, D.S. Topological data analysis with spherical fuzzy soft AHP-TOPSIS for environmental mitigation system. Mathematics 2022, 10, 1826. [Google Scholar] [CrossRef]
  40. Riaz, M.; Farid, H.M.A.; Wang, W.; Pamucar, D. Interval-valued linear Diophantine fuzzy Frank aggregation operators with multi-criteria decision-making. Mathematics 2022, 10, 1811. [Google Scholar] [CrossRef]
  41. Biswas, P.; Pramanik, S.; Giri, B.C. GRA Method of Multiple Attribute Decision Making with Single Valued Neutrosophic Hesitant Fuzzy Set Information. In New Trends in Neutrosophic Theory and Applications; Pons Editions: Brussels, Belgium, 2016. [Google Scholar]
  42. Brans, J.P.; Vincke, P.; Mareschal, B. How to select and how to rank projects: The PROMETHEE method. Eur. J. Oper. Res. 1986, 24, 228–238. [Google Scholar] [CrossRef]
  43. Cooper, M.C.; Ellram, L.M. Characteristics of supply chain management and the implications for purchasing and logistics strategy. Int. J. Logist. Manag. 1993, 4, 13–24. [Google Scholar] [CrossRef]
  44. Manning, L.; Baines, R.; Chadd, S. Quality assurance models in the food supply chain. Br. Food J. 2006, 108, 91–104. [Google Scholar] [CrossRef]
  45. Fritz, M.; Schiefer, G. Food chain management for sustainable food system development: A European research agenda. Agribusiness 2008, 24, 440–452. [Google Scholar] [CrossRef]
  46. Blandon, J.; Henson, S.; Cranfield, J. Small-scale farmer participation in new agri-food supply chains: Case of the supermarket supply chain for fruit and vegetables in Honduras. J. Int. Dev. 2009, 21, 971–984. [Google Scholar] [CrossRef]
  47. Marsden, T.; Banks, J.; Bristow, G. Food supply chain approaches: Exploring their role in rural development. Sociol. Rural. 2000, 40, 424–438. [Google Scholar] [CrossRef]
  48. Scalia, G.L.; Settanni, L.; Micale, R.; Enea, M. Predictive shelf life model based on RF technology for improving the management of food supply chain: A case study. Int. J. Technol. 2016, 7, 31–42. [Google Scholar] [CrossRef]
  49. Wu, K.J.; Liao, C.J.; Tseng, M.; Chiu, K.K.S. Multi-attribute approach to sustainable supply chain management under uncertainty. Ind. Manag. Data Syst. 2016, 116, 777–800. [Google Scholar] [CrossRef]
  50. Smith, G.; Tatum, J.; Belk, K.; Scanga, J.; Grandin, T.; Sofos, J. Traceability from a US perspective. Meat Sci. 2005, 71, 174–193. [Google Scholar] [CrossRef]
  51. Dickinson, D.L.; Bailey, D. Meat traceability: Are US consumers willing to pay for it? J. Agric. Resour. Econ. 2002, 27, 348–364. [Google Scholar]
  52. Choi, T.M.; Chiu, C.H.; Chan, H.K. Risk management of logistics systems. Transp. Res. Logist. Transp. Rev. 2016, 90, 1–6. [Google Scholar] [CrossRef]
  53. Aramyan, L.H.; Lansink, A.G.O.; Vorst, J.G.V.D.; Van Kooten, O. Performance measurement in agri-food supply chains: A case study. Supply Chain. Manag. Int. J. 2007, 12, 304–315. [Google Scholar] [CrossRef]
  54. Bevilacqua, M.; Ciarapica, F.; Giacchetta, G. Business process reengineering of a supply chain and a traceability system: A case study. J. Food Eng. 2009, 93, 13–22. [Google Scholar] [CrossRef]
  55. Pagell, M.; Wu, Z. Building a more complete theory of sustainable supply chain management using case studies of 10 exemplars. J. Supply Chain. Manag. 2009, 45, 37–56. [Google Scholar] [CrossRef]
  56. Tuncel, G.; Alpan, G. Risk assessment and management for supply chain networks: A case study. Comput. Ind. 2010, 61, 250–259. [Google Scholar] [CrossRef]
  57. Zhu, Q.H.; Geng, Y.; Fujita, T.; Hashimoto, S. Green supply chain management in leading manufacturers: Case studies in Japanese large companies. Manag. Res. Rev. 2010, 33, 380–392. [Google Scholar] [CrossRef]
  58. Jacxsens, L.; Luning, P.; Vorst, J.V.D.; Devlieghere, F.; Leemans, R.; Uyttendaele, M. Simulation modelling and risk assessment as tools to identify the impact of climate change on microbiological food safety—The case study of fresh produce supply chain. Food Res. Int. 2010, 43, 1925–1935. [Google Scholar] [CrossRef]
  59. Friel, S.; Barosh, L.J.; Lawrence, M. Towards healthy and sustainable food consumption: An Australian case study. Public Health Nutr. 2014, 17, 1156–1166. [Google Scholar] [CrossRef] [Green Version]
  60. Savino, M.M.; Manzini, R.; Mazza, A. Environmental and economic assessment of fresh fruit supply chain through value chain analysis: A case study in chestnuts industry. Prod. Plan. Control. 2015, 26, 1–18. [Google Scholar] [CrossRef]
  61. Banasik, A.; Kanellopoulos, A.; Claassen, G.; Bloemhof-Ruwaard, J.M.; Vorst, J.G.V.D. Closing loops in agricultural supply chains using multi-objective optimization: A case study of an industrial mushroom supply chain. Int. J. Prod. Econ. 2017, 183, 409–420. [Google Scholar] [CrossRef]
  62. Sgarbossa, F.; Russo, I. A proactive model in sustainable food supply chain: Insight from a case study. Int. J. Prod. Econ. 2017, 183, 596–606. [Google Scholar] [CrossRef]
  63. Tzounis, A.; Katsoulas, N.; Bartzanas, T.; Kittas, C. Internet of Things in agriculture, recent advances and future challenges. Biosyst. Eng. 2017, 164, 31–48. [Google Scholar] [CrossRef]
  64. Feng, F.; Jun, Y.B.; Liu, X.; Li, L. An adjustable approach to fuzzy soft set based decision making. J. Comput. Appl. Math. 2010, 234, 10–20. [Google Scholar]
  65. Zhong, R.; Xu, X.; Wang, L. Food supply chain management: Systems, implementations, and future research. Ind. Manag. Data Syst. 2017, 117, 2085–2114. [Google Scholar] [CrossRef]
Figure 2. Representation of SVNHF superiority and inferiority flow.
Figure 2. Representation of SVNHF superiority and inferiority flow.
Symmetry 14 01382 g002
Figure 3. Ranking of alternatives using the SIR method and the CV method.
Figure 3. Ranking of alternatives using the SIR method and the CV method.
Symmetry 14 01382 g003
Table 1. Representations of some fuzzy sets and fuzzy numbers as well as their constraints.
Table 1. Representations of some fuzzy sets and fuzzy numbers as well as their constraints.
Fuzzy SetsFuzzy NumbersConstraints
IFS [2] ( ω μ , ω ν ) ω μ , ω ν [ 0 , 1 ] ,       0 ω μ + ω ν 1
PFS [3] ( ω μ , ω ν ) ω μ , ω ν [ 0 , 1 ] ,       0 ( ω μ ) 2 + ( ω ν ) 2 1
q-ROFS [4] ( ω μ , ω ν ) ω μ , ω ν [ 0 , 1 ] ,       0 ( ω μ ) q + ( ω ν ) q 1 , q 1
PiFS [5] ( ω μ , ω I , ω ν ) ω μ , ω I , ω ν [ 0 , 1 ] 0 ω μ + ω I + ω ν 1
SFS [6,7,8] ( ω μ , ω I , ω ν ) ω μ , ω I , ω ν [ 0 , 1 ] 0 ( ω μ ) 2 + ( ω I ) 2 + ( ω ν ) 2 1
NS [9] ( T , I , F ) T , I , F ] 0 , 1 + [ ,    T + I + F [ 0 , 3 + ]
SVNS [10] ( T , I , F ) T , I , F [ 0 , 1 ] ,       T + I + F [ 0 , 3 ]
Table 2. Some applications of the SIR method.
Table 2. Some applications of the SIR method.
ResearchersBenchmarksApplications
Tam et al. [20]SIR methodConcrete pump selection
Tom and Tong [21]SIR methodDevelopments in the project concerning
the location of the large-scale harbor
Liu [22]IF SIR methodSupply chain management
Ma et al. [23]HF SIR methodSelection of outstanding teachers from overseas
Peng and Yang [24]PF SIR methodInvestment in internet stocks
Rouhani [25]Fuzzy SIR methodSoftware selection in IT field
Chen [26]PF PROMETHEEBridge construction
method with superiority
and inferiority PFNs
Tavana et al. [27]IFG SIR methodSolution of third-party reverse
logistics problem
Zhao et al. [28]SIR method with HFLSustainable energy technology evaluation
prioritized value
Geetha andPF SIR methodFor investment selection of the internet
Narayanamoorthy [29] Stock marketing companies
Jie et al. [30]IVIF SIR methodEngineering investment selection
Table 3. Union of SVNHFSs.
Table 3. Union of SVNHFSs.
Union 0 Υ   1 Υ 2 Υ   1 Υ  
0 Υ 0 Υ 1 Υ 2 Υ 1 Υ
1 Υ 1 Υ 1 Υ 2 Υ 1 Υ
2 Υ 2 Υ 2 Υ 2 Υ 1 Υ
1 Υ 1 Υ 1 Υ 1 Υ 1 V
Table 4. Intersection of SVNHFSs.
Table 4. Intersection of SVNHFSs.
Intersection 0 Υ   1 Υ 2 Υ   1 Υ  
0 Υ 0 Υ 0 Υ 0 Υ 0 Υ
1 Υ 0 Υ 1 Υ 1 Υ 1 Υ
2 Υ 0 Υ 1 Υ 2 Υ 2 Υ
1 Υ 0 Υ 1 Υ 2 Υ 1 Υ
Table 7. The weights of the experts.
Table 7. The weights of the experts.
ExpertsSVNHFEs
ω 1 e { 0.831 , 0.120 } , { 0.310 } , { 0.456 , 0.511 }
ω 2 e { 0.802 } , { 0.408 , 0.300 } , { 0.472 }
ω 3 e { 0.711 , 0.177 } , { 0.234 , 0.500 } , { 0.500 , 0.250 }
Table 8. The weights of the attributes.
Table 8. The weights of the attributes.
ω 1 C ω 2 C ω 3 C
ω 1 e { 0.311 } , { 0.200 } , { 0.500 } { 0.111 , 0.210 } , { 0.100 } , { 0.805 } { 0.200 , 0.666 } , { 0.555 } , { 0.213 }
ω 2 e { 0.207 } , { 0.300 , 0.804 } , { 0.274 } { 0.750 } , { 0.455 } , { 0.123 } { 0.100 } , { 0.578 } , { 0.920 }
ω 3 e { 0.170 , 0.701 } , { 0.230 } , { 0.240 } { 0.380 } , { 0.335 , 0.510 } , { 0.200 } { 0.310 } , { 0.456 , 0.687 } , { 0.836 }
Table 9. SVNHF superiority flow.
Table 9. SVNHF superiority flow.
Ψ > ( ω i x ) S ( Ψ > ( ω i x ) )
ω 1 x { 0.00709 , 0.00981 } , { 0.00498 , 0.00632 } , { 0.00568 } 0.6657
ω 2 x { 0.01634 , 0.02356 } , { 0.01516 , 0.01875 } , { 0.01712 } 0.6619
ω 3 x { 0.02097 , 0.02685 } , { 0.02334 , 0.02745 } , { 0.02502 } 0.6597
ω 4 x { 0.0111 , 0.02228 } , { 0.0176 , 0.02206 } , { 0.02082 } 0.6587
Table 10. SVNHF inferiority flow.
Table 10. SVNHF inferiority flow.
Ψ < ( ω i x ) S ( Ψ < ( ω i x ) )
ω 1 x { 0.02066 , 0.03144 } , { 0.02556 , 0.03097 } , { 0.02864 } 0.6564
ω 2 x { 0.01175 , 0.01769 } , { 0.01538 , 0.01854 } , { 0.0172 } 0.6602
ω 3 x { 0.00678 , 0.0144 } , { 0.0072 , 0.00984 } , { 0.0093 } 0.6643
ω 4 x { 0.01665 , 0.01897 } , { 0.01294 , 0.01523 } , { 0.0135 } 0.6634
Table 11. Score values.
Table 11. Score values.
AlternativesScore Values
ω 1 x 0.8309
ω 2 x 0.8158
ω 3 x 0.8253
ω 4 x 0.8233
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Riaz, M.; Almalki, Y.; Batool, S.; Tanveer, S. Topological Structure of Single-Valued Neutrosophic Hesitant Fuzzy Sets and Data Analysis for Uncertain Supply Chains. Symmetry 2022, 14, 1382. https://doi.org/10.3390/sym14071382

AMA Style

Riaz M, Almalki Y, Batool S, Tanveer S. Topological Structure of Single-Valued Neutrosophic Hesitant Fuzzy Sets and Data Analysis for Uncertain Supply Chains. Symmetry. 2022; 14(7):1382. https://doi.org/10.3390/sym14071382

Chicago/Turabian Style

Riaz, Muhammad, Yahya Almalki, Sania Batool, and Shaista Tanveer. 2022. "Topological Structure of Single-Valued Neutrosophic Hesitant Fuzzy Sets and Data Analysis for Uncertain Supply Chains" Symmetry 14, no. 7: 1382. https://doi.org/10.3390/sym14071382

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop