z-logo
open-access-imgOpen Access
CPT-TODIM METHOD FOR INTERVAL-VALUED BIPOLAR FUZZY MULTIPLE ATTRIBUTE GROUP DECISION MAKING AND APPLICATION TO INDUSTRIAL CONTROL SECURITY SERVICE PROVIDER SELECTION
Author(s) -
Mengwei Zhao,
Guiwu Wei,
Yanfeng Guo,
Xudong Chen
Publication year - 2021
Publication title -
technological and economic development of economy
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.634
H-Index - 47
eISSN - 2029-4921
pISSN - 2029-4913
DOI - 10.3846/tede.2021.15044
Subject(s) - computer science , prospect theory , interval (graph theory) , fuzzy logic , entropy (arrow of time) , operations research , selection (genetic algorithm) , cumulative prospect theory , control (management) , reliability engineering , mathematics , artificial intelligence , engineering , business , physics , finance , combinatorics , quantum mechanics
In recent years, a series of serious attacks against industrial control system (ICS), such as Stuxnet, Duqu, Flame and Havex, have sounded the alarm for industrial enterprises. For many industrial enterprises, it is a very important part of enterprise management decisions to evaluate ICS security suppliers and choose the appropriate one as a partner. The purpose of this paper is to build the TODIM method based on cumulative prospect theory (CPT-TODIM) to solve multiattribute group decision making problem under interval-valued bipolar fuzzy environment. This extraordinary model not only uses CPT to supplement the traditional TODIM method, but also introduces the entropy weight method to determine the attribute weight so as to avoid the negative influence of subjective weight on the decision result. In addition, in this model, all attribute evaluation information will be interval-valued bipolar fuzzy number (IVBFN) to cope with complex and fuzzy decision environment. Then, the most important part of this paper, we elaborate on the logical structure of the model. What’s more, in the last two sections, we apply this newly constructed model to the selection of ICS security suppliers, and verify the acceptability of this method by sensitivity analysis and comparing with IVBFWA and IVBFWG operator.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here