Interval Valued Intuitionistic Fuzzy MAGDM Problems with OWA Entropy Weights
Journal Title: INTERNATIONAL JOURNAL OF MATHEMATICS TRENDS AND TECHNOLOGY - Year 2014, Vol 9, Issue 2
Abstract
In this paper, the Multiple Attribute Group Decision Making (MAGDM) problems is based on the Renyi’s, Daroczy’s and R-norm entropy weights especially when the attribute weights are completely unknown. The interval-valued intuitionistic fuzzy ordered weighted averaging (IIFOWA) operator and the interval-valued intuitionistic fuzzy hybrid averaging (IIFHA) operator are utilized to aggregate the interval-valued intuitionistic fuzzy decision matrices provided by the decision-makers. Correlation coefficient of Interval Valued Intuitionistic Fuzzy Sets (IVIFS) is utilized to rank the alternatives and select the most desirable one. A numerical illustration is presented to demonstrate the proposed approach.
Authors and Affiliations
A. Solairaju , P. John Robinson , S. Rethinakumar
Near Meanness on Special Types of Graphs
The graph that admits a near mean labeling is called a near mean graph (NMG). In this paper, we proved that the graphs Special types of graphs Triangular snake, Quadrilateral snake, , Sm,3, Sm,4 and Parachutes are near m...
Decision Making Approach for Solving Fuzzy Soft Matrix
In this work, we investigate fuzzy soft matrix and their operations. We then investigate fuzzy soft algorithm that allows constructing those efficient decision making method. Finally, we give an example which shows that...
Numerical Solution of Fuzzy Differential Equations by Adams fifth order predictor-corrector method
In this paper, an Adams fifth order predictor-corrector (AFPC) method is developed to solve the fuzzy initial value problems(IVPs). The AFPC method is generated by compining an explicit five step method and implicit four...
Contra θgs-Continuous Functions
The aim of this paper is to introduce and study of a new generalization of contra continuity called contra gs-continuous functions utilizing gs-closed set.
Securing Server System from Buffer Overflow vulnerability using Vel-Alagar Algorithm
Now a day’s buffer overflows have take place the most common target for network based attacks. The main proliferation method used by worms, malicious codes and improper coding by developers. Many techniques have be...