three-way group conflict analysis based on …fuzzy numbers. in this paper, we first provide the...

15
1063-6706 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information. This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TFUZZ.2019.2908123, IEEE Transactions on Fuzzy Systems IEEE TRANSACTION OF FUZZY SYSTEMS, VOL. *, NO. *, MARCH 2019 1 Three-way Group Conflict Analysis Based on Pythagorean Fuzzy Set Theory Guangming Lang, Duoqian Miao and Hamido Fujita Abstract—In some real-world situations, Pythagorean fuzzy sets are more powerful and eective than intuitionistic fuzzy sets to describe vague and uncertain information, and there are many Pythagorean fuzzy information systems for conflicts in which attitudes of agents on issues are depicted by Pythagorean fuzzy numbers. In this paper, we first provide the concepts of positive, neutral and negative alliances with two thresholds and employ examples to illustrate how to compute positive, neutral and negative alliances in Pythagorean fuzzy information systems for conflicts. Then we focus on three-way conflict analysis based on Bayesian minimum risk theory and explore examples to show how to compute the positive, neutral and negative alliances with a Pythagorean fuzzy loss function given by an expert. Finally, we study how to calculate positive, neutral and negative alliances with group decision theory and take examples to demonstrate how to construct the positive, neutral and negative alliances with a group of Pythagorean fuzzy loss functions given by more experts. Index Terms—Bayesian Minimum Risk Theory, Conflict Anal- ysis, Pythagorean Fuzzy Sets, Pythagorean Fuzzy Information System, Pythagorean Fuzzy Loss Function. I. Introduction C ONFLICTS are undoubtedly one of the most essential characteristics of Human Society, and the study of which is of utmost significance both theoretically and practically. Especially, conflict analysis [1]–[21], which plays an im- portant role in many fields such as business, political and legal disputes, investigates conflict structures with conflict, neutrality and alliance relations and gives some guidance to conflict resolution. For example, Pawlak [1] initially consid- ered the auxiliary functions and distance functions and oered deeper insight into the structure of conflicts. Cholvy et al. [4] proposed a method for estimating the relative reliability of information sources. Deja [7] transformed conflict analy- sis problems and conflict-resolving problems into Boolean- reasoning problems with the rough sets and Boolean reasoning methods. Jabbour et al. [9] provided the notion of conflicting Manuscript received September 28, 2017. This work is supported by the National Natural Science Foundation of China (Nos.61603063, 61273304,11526039), Specialized Research Fund for the Doctoral Program of Higher Education of China (No.201300721004), China Postdoctoral Science Foundation (NO.2015M580353), China Postdoctoral Science special Founda- tion (NO.2016T90383)(Corresponding authors: Duoqian Miao). Guangming Lang is with the School of Mathematics and Statistics, Changsha University of Science and Technology, Changsha, Hunan 410114, P.R. China; Duoqian Miao is with the Department of Computer Science and Technology and the Key Laboratory of Embedded System and Service Computing, Ministry of Education of China, Tongji University, Shanghai, 201804, P.R. China; Hamido Fujita is with the Faculty of Software and Information Science, Iwate Prefectural University, Iwate 020-0693, Japan, (e-mail: [email protected], [email protected], HFujita- [email protected]). variable and investigated quantifying conflicts in propositional logic through prime implicates. Ramanna et al. [13] studied how to model a combination of complex situations among agents where there are disagreements leading to a conflict situation. Silva and Almeida-Filho [14] presented a multicri- teria approach for analysis of conflicts in evidence theory. Skowron and Deja [15] explained the nature of conflict and defined the conflict situation model in a way to encapsulate the conflict components in a clear manner. Sun et al. [18] proposed a conflict analysis decision model and developed a matrix approach for conflict analysis based on rough set theory over two universes. Yang et al. [19] investigated evidence conflict and belief convergence based on the analysis of the degree of coherence between two sources of evidence and illustrated the stochastic interpretation for basic probability assignments. Yu et al. [20] provided the supporting probability distance to characterize the dierences among bodies of evidence and gave a new combination rule for the combination of the con- flicting evidence. Zhu and Wang [21] studied the problems of conflicts of interest in database access security using granular computing based on covering rough set theory. Three-way decision theory, proposed by Yao [22] for deci- sion making with less risks, promotes thinking and problem solving in threes such as using three regions, three elements, three views, three levels and three stages. Many scholars [23]– [38] have developed three-way decision theory in theoretical and practical aspects, which has become a new mathematical tool to deal with uncertain information and problems. For instance, Chen et al. [23] focused on three-way decision support for diagnosis on focal liver lesions. Feng et al. [24] studied uncertainty and reduction of variable precision multi- granulation fuzzy rough sets based on three-way decisions. Hu et al. [25] provided two types of three-way decisions in three- way decision spaces and discussed properties of the three-way decisions. Khan et al. [26] introduced a three-way approach for learning rules in automatic knowledge-based topic models. Li et al. [30] presented cost-sensitive sequential three-way decision modeling using a deep neural network. Qian et al. [31] investigated attribute reduction for sequential three-way decisions under dynamic granulation. Sun et al. [32] studied three-way group decision making based on multigranulation fuzzy decision-theoretic rough sets over two universes. Xu et al. [33] provided a three-way decision model with probabilistic rough sets for stream computing. Yang et al. [37] proposed a unified model of sequential three-way decisions and multilevel incremental processing. Pythagorean fuzzy sets (PFSs), introduced by Yager [39] for describing uncertainty, are considered as a generalization

Upload: others

Post on 08-Mar-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Three-way Group Conflict Analysis Based on …fuzzy numbers. In this paper, we first provide the concepts of positive, neutral and negative alliances with two thresholds and employ

1063-6706 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TFUZZ.2019.2908123, IEEETransactions on Fuzzy Systems

IEEE TRANSACTION OF FUZZY SYSTEMS, VOL. *, NO. *, MARCH 2019 1

Three-way Group Conflict Analysis Based onPythagorean Fuzzy Set Theory

Guangming Lang, Duoqian Miao and Hamido Fujita

Abstract—In some real-world situations, Pythagorean fuzzysets are more powerful and effective than intuitionistic fuzzysets to describe vague and uncertain information, and there aremany Pythagorean fuzzy information systems for conflicts inwhich attitudes of agents on issues are depicted by Pythagoreanfuzzy numbers. In this paper, we first provide the concepts ofpositive, neutral and negative alliances with two thresholds andemploy examples to illustrate how to compute positive, neutraland negative alliances in Pythagorean fuzzy information systemsfor conflicts. Then we focus on three-way conflict analysis basedon Bayesian minimum risk theory and explore examples to showhow to compute the positive, neutral and negative alliances with aPythagorean fuzzy loss function given by an expert. Finally, westudy how to calculate positive, neutral and negative allianceswith group decision theory and take examples to demonstratehow to construct the positive, neutral and negative allianceswith a group of Pythagorean fuzzy loss functions given by moreexperts.

Index Terms—Bayesian Minimum Risk Theory, Conflict Anal-ysis, Pythagorean Fuzzy Sets, Pythagorean Fuzzy InformationSystem, Pythagorean Fuzzy Loss Function.

I. Introduction

CONFLICTS are undoubtedly one of the most essentialcharacteristics of Human Society, and the study of which

is of utmost significance both theoretically and practically.Especially, conflict analysis [1]–[21], which plays an im-portant role in many fields such as business, political andlegal disputes, investigates conflict structures with conflict,neutrality and alliance relations and gives some guidance toconflict resolution. For example, Pawlak [1] initially consid-ered the auxiliary functions and distance functions and offereddeeper insight into the structure of conflicts. Cholvy et al.[4] proposed a method for estimating the relative reliabilityof information sources. Deja [7] transformed conflict analy-sis problems and conflict-resolving problems into Boolean-reasoning problems with the rough sets and Boolean reasoningmethods. Jabbour et al. [9] provided the notion of conflicting

Manuscript received September 28, 2017. This work is supportedby the National Natural Science Foundation of China (Nos.61603063,61273304,11526039), Specialized Research Fund for the Doctoral Program ofHigher Education of China (No.201300721004), China Postdoctoral ScienceFoundation (NO.2015M580353), China Postdoctoral Science special Founda-tion (NO.2016T90383)(Corresponding authors: Duoqian Miao).

Guangming Lang is with the School of Mathematics and Statistics,Changsha University of Science and Technology, Changsha, Hunan 410114,P.R. China; Duoqian Miao is with the Department of Computer Scienceand Technology and the Key Laboratory of Embedded System and ServiceComputing, Ministry of Education of China, Tongji University, Shanghai,201804, P.R. China; Hamido Fujita is with the Faculty of Software andInformation Science, Iwate Prefectural University, Iwate 020-0693, Japan,(e-mail: [email protected], [email protected], [email protected]).

variable and investigated quantifying conflicts in propositionallogic through prime implicates. Ramanna et al. [13] studiedhow to model a combination of complex situations amongagents where there are disagreements leading to a conflictsituation. Silva and Almeida-Filho [14] presented a multicri-teria approach for analysis of conflicts in evidence theory.Skowron and Deja [15] explained the nature of conflict anddefined the conflict situation model in a way to encapsulate theconflict components in a clear manner. Sun et al. [18] proposeda conflict analysis decision model and developed a matrixapproach for conflict analysis based on rough set theory overtwo universes. Yang et al. [19] investigated evidence conflictand belief convergence based on the analysis of the degreeof coherence between two sources of evidence and illustratedthe stochastic interpretation for basic probability assignments.Yu et al. [20] provided the supporting probability distanceto characterize the differences among bodies of evidence andgave a new combination rule for the combination of the con-flicting evidence. Zhu and Wang [21] studied the problems ofconflicts of interest in database access security using granularcomputing based on covering rough set theory.

Three-way decision theory, proposed by Yao [22] for deci-sion making with less risks, promotes thinking and problemsolving in threes such as using three regions, three elements,three views, three levels and three stages. Many scholars [23]–[38] have developed three-way decision theory in theoreticaland practical aspects, which has become a new mathematicaltool to deal with uncertain information and problems. Forinstance, Chen et al. [23] focused on three-way decisionsupport for diagnosis on focal liver lesions. Feng et al. [24]studied uncertainty and reduction of variable precision multi-granulation fuzzy rough sets based on three-way decisions. Huet al. [25] provided two types of three-way decisions in three-way decision spaces and discussed properties of the three-waydecisions. Khan et al. [26] introduced a three-way approachfor learning rules in automatic knowledge-based topic models.Li et al. [30] presented cost-sensitive sequential three-waydecision modeling using a deep neural network. Qian et al.[31] investigated attribute reduction for sequential three-waydecisions under dynamic granulation. Sun et al. [32] studiedthree-way group decision making based on multigranulationfuzzy decision-theoretic rough sets over two universes. Xu etal. [33] provided a three-way decision model with probabilisticrough sets for stream computing. Yang et al. [37] proposed aunified model of sequential three-way decisions and multilevelincremental processing.

Pythagorean fuzzy sets (PFSs), introduced by Yager [39]for describing uncertainty, are considered as a generalization

Page 2: Three-way Group Conflict Analysis Based on …fuzzy numbers. In this paper, we first provide the concepts of positive, neutral and negative alliances with two thresholds and employ

1063-6706 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TFUZZ.2019.2908123, IEEETransactions on Fuzzy Systems

IEEE TRANSACTION OF FUZZY SYSTEMS, VOL. *, NO. *, MARCH 2019 2

of intuitionistic fuzzy sets (IFSs) and characterized by amembership degree and a non-membership degree satisfyingthe condition that the square sum of its membership degreeand non-membership degree is equal to or less than 1. Manyinvestigations [39]–[58] have focused on Pythagorean fuzzysets, which have more powerful ability than IFSs to modelthe uncertain information in decision making problems. Forexample, Beliakov and James [41] provided the averaging ag-gregation functions for preferences expressed as Pythagoreanmembership grades and fuzzy orthopairs. Bustince et al. [42]investigated a historical account of types of fuzzy sets anddiscussed their relationships. Peng and Yang [45] developed aPythagorean fuzzy superiority and inferiority ranking methodto solve uncertainty multiple attribute group decision makingproblem. Peng and Selvachandran [46] presented an overviewon Pythagorean fuzzy sets with aim of offering a clear per-spective on the different concepts, tools and trends related totheir extension and provided two novel algorithms in decisionmaking problems under Pythagorean fuzzy environment. Re-format and Yager [50] proposed a novel collaborative-basedrecommender system that provides a user with the ability tocontrol a process of constructing a list of suggested items usingPythagorean fuzzy sets. Ren et al. [51] extended the TODIMapproach to solve the MCDM problems with Pythagoreanfuzzy information and analyzed how the risk attitudes of thedecision makers exert the influence on the results of MCDMunder uncertainty. Wu and Liu [52] proposed a knowledge-augmented logical analysis framework for policy conflicts inorder to make services collaboration possible and smooth.Zhang [56] presented a hierarchical QUALIFLEX approachwith the closeness index-based ranking methods for multi-criteria Pythagorean fuzzy decision analysis. Zhang et al. [58]introduced the models of Pythagorean fuzzy rough sets overtwo universes and Pythagorean fuzzy multi-granulation roughsets over two universes.

In conflict analysis, we are mainly interested in findingthe relationship among agents taking part in the dispute, andstudy what measures can be taken for solving the conflict.In this study, we investigate how to compute positive, neutraland negative alliances based on Pythagorean fuzzy set theory.The motivations and innovations of this study are given byanswering the following three questions:

(1) Why study conflicts based on Pythagorean fuzzy set the-ory? In practice, Pythagorean fuzzy sets are more suitable thanintuitionistic fuzzy sets for describing attitudes of agents inconflicts. For instance, when a person expresses his preferenceabout the degree of an issue, he gives the degree to support thisissue as

√3

2 , and the degree to against this issue as 12 , and we

have (√

32 )2 + ( 1

2 )2 = 1 and√

32 +

12 > 1, and intuitionistic fuzzy

sets can not work in this situation. Furthermore, Pythagoreanfuzzy loss functions are more accurate than intuitionistic fuzzyloss functions for measuring losses and risks in decisionmaking problems, which helps people make decisions withless losses and risks.

(2) Why investigate conflicts with three-way decision theoryand group decision theory? In conflict situations, we ask theagents to specify their views from disagreement, neutral and

agreement and classify all agents into conflict set, neutralset and alliance set of an agent with conflict, neutral andalliance relations, respectively. We also find that three-waydecision theory partitions all agents into positive, boundaryand negative regions based on Bayesian minimum risk theory,which is consistent with the thought of conflict analysis.Moreover, we see that Pythagorean fuzzy loss functions aregiven by experts, and different experts have different opinionsfor the same problem and give different Pythagorean fuzzyloss functions. We employ a group of Pythagorean fuzzy lossfunctions given by many famous experts to calculate positive,neutral and negative alliances in conflict analysis so as to makedecisions with less losses and risks.

(3) What are innovations of this study? We have notobserved studies on Pythagorean fuzzy information systemsfor conflicts, where attitudes of agents are Pythagorean fuzzynumbers. The innovations of this study mainly include: (1)construct positive, neutral and negative alliances with three-way decision theory; (2) classify all agents into positive,neutral and negative alliances based on Bayesian minimumrisk theory; (3) employ a group of Pythagorean fuzzy lossfunctions to compute positive, neutral and negative allianceswith the minimum risk.

The contributions of this paper are shown as follows. Firstly,we provide the concept of Pythagorean fuzzy information sys-tem and employ an example to illustrate the difference betweenPawlak information systems and Pythagorean fuzzy informa-tion systems. We provide the concepts of positive, neutraland negative alliances with two thresholds and employ severalexamples to illustrate how to compute the positive, neutral andnegative alliances in Pythagorean fuzzy information systemsfor conflicts. Secondly, we provide the concept of Pythagoreanfuzzy loss function for conflict analysis of Pythagorean fuzzyinformation systems, and illustrate mechanisms of computingthe positive, neutral and negative alliances based on Bayesianminimum risk theory. We also employ several examples toillustrate how to compute the positive, neutral and negativealliances with a Pythagorean fuzzy loss function given by anexpert. Thirdly, we demonstrate mechanisms of calculating thepositive, neutral, and negative alliances for conflict analysiswith group decision theory, and employ several examples toillustrate how to construct the positive, neutral and negativealliances with a group of Pythagorean fuzzy loss functionsgiven by more experts.

The rest of this paper is organized as follows. Section IIreviews the basic concepts of Pythagorean fuzzy sets andconflict analysis. Section III proposes the concepts of positive,neutral and negative alliances with two thresholds. Section IVfocuses on three-way conflict analysis based on Bayesian mini-mum risk theory. Section V provides three-way group conflictanalysis based on group decision theory. The conclusion isgiven in Section VI.

II. Preliminaries

In this section, we review the related concepts of Pythagore-an fuzzy sets and conflict analysis.

Page 3: Three-way Group Conflict Analysis Based on …fuzzy numbers. In this paper, we first provide the concepts of positive, neutral and negative alliances with two thresholds and employ

1063-6706 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TFUZZ.2019.2908123, IEEETransactions on Fuzzy Systems

IEEE TRANSACTION OF FUZZY SYSTEMS, VOL. *, NO. *, MARCH 2019 3

A. Pythagorean Fuzzy Sets

Definition 2.1: [53] Let U be an arbitrary non-empty set,and a Pythagorean fuzzy set (PFS) P is a mathematical objectof the form as follows:

P = < x, P(µP(x), νP(x)) > |x ∈ U,

where µP(x), νP(x) : U → [0, 1] such as µ2P(x) + ν2P(x) ≤ 1, for

every x ∈ U, µP(x) and νP(x) denote the membership degreeand the non-membership degree of the element x ∈ U in P,respectively.

For convenience, we denote the Pythagorean fuzzy num-ber (PFN) and the hesitant degree as γ = P(µγ, νγ) andπγ =

√1 − µ2

γ − ν2γ, respectively. Moreover, if γ = P(µγ, νγ)satisfying µγ + νγ ≤ 1, then γ is an intuitionistic fuzzynumber, and the relationship between a Pythagorean fuzzynumber and an intuitionistic fuzzy number is illustrated by Fig.1. Therefore, Pythagorean fuzzy sets, as a generalization ofintuitionistic fuzzy sets, are powerful for describing impreciseinformation.

0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1µγ

0

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

νγ

µ2

γ+ ν

2

γ≤ 1

µγ + νγ ≤ 1

Fig. 1. The relationship between a Pythagorean fuzzy number and anintuitionistic fuzzy number.

Definition 2.2: [53] Let γ1 = P(µγ1 , νγ1 ) and γ2 =

P(µγ2 , νγ2 ) be Pythagorean fuzzy numbers. Then a naturequasi-ordering on PFNs is defined as follows:

γ1 ≥ γ2 if and only if µγ1 ≥ µγ2 and νγ1 ≤ νγ2 .

For convenience, we define the function I(γ) = γ for anyPythagorean fuzzy number γ. So γ1 ≥ γ2 ⇔ I(γ1) ≥ I(γ2).Moreover, Yager provided multiplication and summation op-erations for Pythagorean fuzzy numbers as follows:

(1) kγ = P(√

1 − (1 − µ2γ)k, νkγ);

(2) γ1 ⊕ γ2 = P(√µ2γ1+ µ2γ2− µ2γ1∗ µ2γ2, νγ1 ∗ νγ2 ).

Definition 2.3: [57] Let γ = P(µγ, νγ) be a Pythagoreanfuzzy number. Then the score function S for γ is defined asfollows:

S (γ) = µ2γ − ν2γ.

We have that −1 ≤ S (γ) ≤ 1 for the Pythagorean fuzzynumber γ. Especially, the score function is effective to discernPythagorean fuzzy numbers.

Definition 2.4: [57] Let γ1 = P(µγ1 , νγ1 ) and γ2 =

P(µγ2 , νγ2 ) be Pythagorean fuzzy numbers. Then the Euclideandistance d between γ1 and γ2 is defined as follows:

d(γ1, γ2) =12

(|µ2γ1− µ2γ2| + |ν2γ1

− ν2γ2| + |π2

γ1− π2γ2|).

Specially, we obtain the Euclidean distance between thePythagorean fuzzy number P(µγ, νγ) and the positive idealPFN γ+ = P(1, 0) as follows:

d(γ, γ+) =12

(1 − µ2γ + ν

2γ + π

2γ) = 1 − µ2

γ,

and the Euclidean distance between the Pythagorean fuzzynumber P(µγ, νγ) and the negative ideal PFN γ− = P(0, 1) asfollows:

d(γ, γ−) =12

(1 − ν2γ + µ2γ + π

2γ) = 1 − ν2γ.

Definition 2.5: [56] Let γ = P(µγ, νγ) be a Pythagoreanfuzzy number, γ+ = P(1, 0) and γ− = P(0, 1). Then thecloseness index P for γ is defined as follows:

P(γ) =d(γ, γ−)

d(γ, γ+) + d(γ, γ−)=

1 − ν2γ2 − µ2

γ − ν2γ.

We see that the closeness index P(γ) of γ is constructedbased on the Euclidean distance between the Pythagoreanfuzzy number P(µγ, νγ) and the positive ideal PFN γ+ andthe Euclidean distance between the Pythagorean fuzzy numberP(µγ, νγ) and the negative ideal PFN γ−. Especially, we have0 ≤P(γ) ≤ 1 for the Pythagorean fuzzy number γ.

Definition 2.6: [39] Let γ = P(µγ, νγ) be a Pythagoreanfuzzy number. Then the function F for γ is defined as follows:

F(γ) =12+

√µ2γ + ν

2γ ∗ (

12−

2 arccos( µγ√µ2γ+ν

)

π).

The function F provides an effective approach to comparingPythagorean fuzzy numbers. Moreover, by Definitions 2.2-2.6,we provide the comparison law for discerning Pythagoreanfuzzy numbers as follows.

Definition 2.7: Let γ1 = P(µγ1 , νγ1 ) and γ2 = P(µγ2 , νγ2 ) bePythagorean fuzzy numbers, and • = I, S ,P , F. Then

(1) If •(γ1) > •(γ2), then γ1 is bigger than γ2, denoted byγ1 ≻• γ2;

(2) If •(γ1) < •(γ2), then γ1 is smaller than γ2, denoted byγ1 ≺• γ2;

(3) If •(γ1) = •(γ2), then γ1 is equal to γ2, denoted byγ1 ∼• γ2.

We employ the following example to illustrate how todiscern Pythagorean fuzzy numbers with Definition 2.7.

Example 2.8: (1) Taking γ1 = P(√

53 ,

13 ) and γ2 =

P(√

23 ,

√2

3 ), we have I(γ1) = P(√

53 ,

13 ) and I(γ2) = P(

√2

3 ,√

23 ).

Since√

53 >

√2

3 and 13 <

√2

3 , then we have γ1 ≻I γ2.Sometimes, we can not discern Pythagorean fuzzy numbers

with Definition 2.2. For example, it does not work for γ1 =

P(√

53 ,

√2

3 ) and γ2 = P(√

23 ,

13 ).

(2) Taking γ1 = P(√

53 ,

√2

3 ) and γ2 = P(√

23 ,

13 ), by Definition

2.3, we have S (γ1) = S (P(√

53 ,

√2

3 )) = 39 and S (γ2) =

S (P(√

23 ,

13 )) = 1

9 . Therefore, we have γ1 ≻S γ2.We see that the score function fails to discern some

Pythagorean fuzzy numbers. For example, for γ1 = P(√

53 ,

23 )

and γ2 = P( 23 ,√

33 ), we have

S (γ1) = (

√5

3)2 − (

23

)2 =19

and S (γ2) = (23

)2 − (

√3

3)2 =

19.

Page 4: Three-way Group Conflict Analysis Based on …fuzzy numbers. In this paper, we first provide the concepts of positive, neutral and negative alliances with two thresholds and employ

1063-6706 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TFUZZ.2019.2908123, IEEETransactions on Fuzzy Systems

IEEE TRANSACTION OF FUZZY SYSTEMS, VOL. *, NO. *, MARCH 2019 4

(3) Taking γ1 = P(√

53 ,

23 ) and γ2 = P( 2

3 ,√

33 ), by Definition

2.5, we have

P(γ1) =1 − 4

9

2 − 59 −

49

=59

and P(γ2) =1 − 3

9

2 − 49 −

39

=611.

Therefore, we get γ1 ≻P γ2.(4) Taking γ1 = P(

√5

3 ,23 ) and γ2 = P( 2

3 ,√

33 ), by Definition

2.6, we have

F(γ1) =12+

√µ2γ1+ ν2γ1

∗ (12−

2 arccos(µγ1√µ2γ1+ν

2γ1

)

π);

≈ 0.5355;

F(γ2) =12+

√µ2γ2+ ν2γ2

∗ (12−

2 arccos(µγ2√µ2γ2+ν

2γ2

)

π);

≈ 0.5402.

Therefore, we get γ2 ≻F γ1..We observe that there are four types of functions for

comparing Pythagorean fuzzy numbers. If we choose one ofthem to discern Pythagorean fuzzy numbers, and it does notwork, then the other functions can be applied in practicalsituations.

B. Conflict Analysis

Definition 2.9: [1] An information system is a 4-tuple S =(U, A,V, f ), where U = x1, x2, ..., xn is a finite set of agents,A is a finite set of issues, V = Vc | c ∈ A, where Vc is the setof values of issue c, and card(Vc) > 1, f is a function fromU × A into V .

The classical information system given by Definition 2.9is called Pawlak information system, and information systemsmentioned in this section are Pawlak information systems.

Definition 2.10: [2] Let S = (U, A,V, f ) be an informationsystem. Then the auxiliary function ϕc(x, y) for any c ∈ A isdefined as follows:

ϕc(x, y) =

1, if c(x) · c(y) = 1 ∨ x = y;0, if c(x) · c(y) = 0 ∧ x , y;−1, if c(x) · c(y) = −1,

where c(x) and c(y) denote issue values of x and y on c.If ϕc(x, y) = 1, then x and y have the same opinion about

issue c; if ϕc(x, y) = 0, then it means that x or y has a neutralopinion about issue c; and if ϕc(x, y) = −1, then x and y havedifferent opinions about issue c.

Example 2.11: [2] TABLE I shows the information systemfor the Middle East conflict, where x1, x2, x3, x4, x5 and x6denote six countries, c1, c2, c3, c4, c5 and c6 denote six issues.For example, c1(x1) = −1 denotes the agent x1 is against theissue c1, and c1(x2) = +1 denotes the agent x2 supports theissue c1, and c1(x4) = 0 denotes the agent x4 is neutral to theissue c1.

TABLE IInformation system for theMiddle East conflict.

U c1 c2 c3 c4 c5x1 −1 +1 +1 +1 +1x2 +1 0 −1 −1 −1x3 +1 −1 −1 −1 0x4 0 −1 −1 0 −1x5 +1 −1 −1 −1 −1x6 0 +1 −1 0 +1

Remarks: x1, x2, x3, x4, x5 and x6 denote Israel, Egypt,Palestine, Jordan, Syria and Saudi Arabia, respectively. More-over, c1 means Autonomous Palestinian state on the WestBank and Gaza; c2 denotes Israeli military outpost along theJordan River; c3 stands for Israel retains East Jerusalem; c4is Israeli military outposts on the Golan Heights; c5 denotesArab countries grant citizenship to Palestinians who choose toremain within their borders.

Definition 2.12: [2] Let S = (U, A,V, f ) be an informationsystem. Then the distance function ρA(x, y) for x, y ∈ U isdefined as follows:

ρA(x, y) =∑

c∈A ϕ∗c(x, y)|A| ,

where

ϕ∗c(x, y) =1 − ϕc(x, y)

2=

0, if c(x) · c(y) = 1 ∨ x = y;

0.5, if c(x) · c(y) = 0 ∧ x , y;1, if c(x) · c(y) = −1.

After that, Pawlak provided the conflict, neutral and alliedrelations for conflict analysis with Definition 2.12 as follows.

Definition 2.13: [2] Let S = (U, A,V, f ) be an informationsystem, and the distance function ρA(x, y) for x, y ∈ U. Thena pair x and y is said to be

(1) conflict if ρA(x, y) > 0.5;(2) neutral if ρA(x, y) = 0.5;(3) allied if ρA(x, y) < 0.5.Pawlak also proposed the allied, conflict and neutral sets as

follows.Definition 2.14: [2] Let S = (U, A,V, f ) be an information

system. Then the conflict, neutral and allied sets of x ∈ U aredefined as follows:

(1) CO(x) = y ∈ U | ρA(x, y) > 0.5;(2) NE(x) = y ∈ U | ρA(x, y) = 0.5;(3) AL(x) = y ∈ U | ρA(x, y) < 0.5.We classify all agents with respect to x into three parts:

CO(x),NE(x) and AL(x). Since decision-theoretic rough settheory is a powerful mathematical tool for depicting ambigu-ous information, Lang et al. [27] investigated conflict analysisusing decision-theoretic rough set theory, which actually pro-vides constructive advice for decision making with less loss.

Definition 2.15: [27] Let S = (U, A,V, f ) be an infor-mation system, and 0 ≤ β ≤ α ≤ 1. For any x ∈ U, theprobabilistic conflict, neutral and allied sets COαβ (x), NEαβ (x)and ALαβ (x) of x are defined as follows:

(1) COαβ (x) = y ∈ U | ρA(x, y) > α;(2) NEαβ (x) = y ∈ U | α ≥ ρA(x, y) ≥ β;(3) ALαβ (x) = y ∈ U | ρA(x, y) < β.In some practical situations, Pythagorean fuzzy sets are

effective for describing uncertain information, and there are

Page 5: Three-way Group Conflict Analysis Based on …fuzzy numbers. In this paper, we first provide the concepts of positive, neutral and negative alliances with two thresholds and employ

1063-6706 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TFUZZ.2019.2908123, IEEETransactions on Fuzzy Systems

IEEE TRANSACTION OF FUZZY SYSTEMS, VOL. *, NO. *, MARCH 2019 5

some Pythagorean fuzzy information systems for conflicts,where all issue values are Pythagorean fuzzy numbers, andthere has been relatively little progress in developing effectivemethods for studying Pythagorean fuzzy information systemsfor conflicts.

III. Conflict analysis of Pythagorean fuzzy informationsystems

In this section, we investigate Pythagorean fuzzy informa-tion systems for conflicts.

Definition 3.1: A Pythagorean fuzzy information system isa 4-tuple S = (U, A,V, f ), where U = x1, x2, ..., xn is a finiteset of agents, A = c1, c2, ..., cl is a finite set of issues, V =Vc | c ∈ A, where Vc is the set of issue values on c, all issuevalues are Pythagorean fuzzy numbers, and f is a functionfrom U × A into V .

We see that Pythagorean fuzzy information systems, asa generalization of Pawlak information systems, representall available information and knowledge, where agents aremeasured by using a finite number of issues and issue valuesare PFNs, which provides more information than intuitionisticfuzzy information systems. Furthermore, we provide matrixrepresentation M(S ) of the Pythagorean fuzzy informationsystem S for conflict analysis as follows:

M(S ) =

P(µ11,ν11) P(µ12,ν12) . . . P(µ1l,ν1l)P(µ21,ν21) P(µ22,ν22) . . . P(µ2l,ν2l). . . . . .. . . . . .. . . . . .

P(µn1,νn1) P(µn2,νn2) . . . P(µnl,νnl)

,where n and l are the numbers of agents and issues, respec-tively.

Example 3.2: (1) We employ a Pythagorean fuzzy infor-mation system depicted by TABLE II to show the MiddleEast conflict, where x1, x2, x3, x4, x5 and x6 denote six agents,c1, c2, c3, c4, c5 and c6 denote six issues. For example, we havec1(x1) = P(µP(x1), νP(x1)) = P(1.0, 0.0), where µP(x1) = 1.0denotes the support degree of the agent x1 to the issue c1,and νP(x1) = 0.0 denotes the against degree of the agent x1 tothe issue c1; we have c5(x6) = P(µP(x6), νP(x6)) = P(0.8, 0.4),where µP(x6) = 0.8 denotes the support degree of the agent x6to the issue c5, and νP(x6) = 0.4 denotes the against degree ofthe agent x6 to the issue c5.

TABLE IIThe Pythagorean fuzzy information system for theMiddle East conflict.

U c1 c2 c3 c4 c5x1 P(1.0, 0.0) P(0.9, 0.3) P(0.8, 0.2) P(0.9, 0.1) P(0.9, 0.2)x2 P(0.9, 0.1) P(0.5, 0.5) P(0.1, 0.9) P(0.3, 0.8) P(0.1, 0.9)x3 P(0.1, 0.9) P(0.1, 0.9) P(0.2, 0.8) P(0.1, 0.9) P(0.5, 0.5)x4 P(0.5, 0.5) P(0.1, 0.9) P(0.3, 0.7) P(0.5, 0.5) P(0.1, 0.9)x5 P(0.9, 0.2) P(0.4, 0.6) P(0.1, 0.9) P(0.1, 0.9) P(0.3, 0.9)x6 P(0.0, 1.0) P(0.9, 0.1) P(0.2, 0.9) P(0.5, 0.5) P(0.8, 0.4)

(2) From TABLE II, we have the Pythagorean matrix M(S )of the Pythagorean fuzzy information system S in Example3.2(1) as follows:

M(S ) =

P(1.0,0.0) P(0.9,0.3) P(0.8,0.2) P(0.9,0.1) P(0.9,0.2)P(0.9,0.1) P(0.5,0.5) P(0.1,0.9) P(0.3,0.8) P(0.1,0.9)P(0.1,0.9) P(0.1,0.9) P(0.2,0.8) P(0.1,0.9) P(0.5,0.5)P(0.5,0.5) P(0.1,0.9) P(0.3,0.7) P(0.5,0.5) P(0.1,0.9)P(0.9,0.2) P(0.4,0.6) P(0.1,0.9) P(0.1,0.9) P(0.3,0.9)P(0.0,1.0) P(0.9,0.1) P(0.2,0.9) P(0.5,0.5) P(0.8,0.4)

.

Remark: We denote Israel, Egypt, Palestinians, Jordan,Syria and Saudi Arabia as x1, x2, x3, x4, x5 and x6, respec-tively; c1 means Autonomous Palestinian state on the WestBank and Gaza; c2 denotes Israeli military outpost along theJordan River; c3 stands for Israeli retains East Jerusalem; c4is Israeli military outposts on the Golan Heights; c5 notesArab countries grant citizenship to Palestinians who choose toremain with their borders. Furthermore, we employ TABLE Iand TABLE II to depict the Middle East conflict, and there isno relationship among issue values of agents. We also employPythagorean matrix M(S ) to represent the Pythagorean fuzzyinformation system S , which provides an effective tool forstudying Pythagorean fuzzy information systems for conflicts.

Definition 3.3: [53] Let P = γi|γi = P(µγi , νγi ), i =1, 2, ..., l be a collection of Pythagorean fuzzy numbers, andK = k1, k2, ..., kl be the weight vector of γi (i = 1, 2, ..., l),where ki indicates the importance degree of γi, and satisfieski ≥ 0 (i = 1, 2, ..., l) and Σl

i=1ki = 1. Then the Pythagoreanfuzzy weighted averaging operator R: Θl → Θ is defined asfollows: R(γ1, γ2, ..., γl) = P(Σl

i=1kiµγi ,Σli=1kiνγi ).

By Definition 3.3, we aggregate a collection of Pythagore-an fuzzy numbers γi|γi = P(µγi , νγi ), i = 1, 2, ..., l into aPythagorean fuzzy number R(γ1, γ2, ..., γl) with the weightvector. For simplicity, we denote R(c1(x), c2(x), ..., cl(x)) asR(x) in the following discussion. Moreover, we provide thepositive, neutral and negative alliances with two thresholds asfollows.

Definition 3.4: Let S = (U, A,V, f ) be a Pythagorean fuzzyinformation system, α and β are two thresholds, and • denotesa function for Pythagorean fuzzy numbers. Then the positive,neutral and negative alliances are defined as follows:

POA(•,α,β)(U) = x ∈ U | •(R(x)) ≥ α;CT A(•,α,β)(U) = x ∈ U | β < •(R(x)) < α;NEA(•,α,β)(U) = x ∈ U | •(R(x)) ≤ β.

By Definition 3.4, we get the positive, neutral and nega-tive alliances POA(•,α,β)(U),CT A(•,α,β)(U) and NEA(•,α,β)(U)with two thresholds α and β, and we have POA(•,α,β)(U) ∪CT A(•,α,β)(U) ∪ NEA(•,α,β)(U) ⊆ U. Furthermore, we providefour types of positive, neutral and negative alliances when• = I, S ,P , F in Definition 3.4 as follows.

Definition 3.5: Let S = (U, A,V, f ) be a Pythagorean fuzzyinformation system.

(1) If α and β are Pythagorean fuzzy numbers, and P(0, 1) ≤β ≤ α ≤ P(1, 0), then we define the first positive, neutral andnegative alliances as follows:

POA(I,α,β)(U) = x ∈ U | I(R(x)) ≥ α;CT A(I,α,β)(U) = x ∈ U | β < I(R(x)) < α;NEA(I,α,β)(U) = x ∈ U | I(R(x)) ≤ β.

(2) If −1 ≤ β ≤ α ≤ 1, then we define the second positive,neutral and negative alliances as follows:

POA(S ,α,β)(U) = x ∈ U | S (R(x)) ≥ α;CT A(S ,α,β)(U) = x ∈ U | β < S (R(x)) < α;NEA(S ,α,β)(U) = x ∈ U | S (R(x)) ≤ β.

Page 6: Three-way Group Conflict Analysis Based on …fuzzy numbers. In this paper, we first provide the concepts of positive, neutral and negative alliances with two thresholds and employ

1063-6706 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TFUZZ.2019.2908123, IEEETransactions on Fuzzy Systems

IEEE TRANSACTION OF FUZZY SYSTEMS, VOL. *, NO. *, MARCH 2019 6

(3) If 0 ≤ β ≤ α ≤ 1, then we define the third positive,neutral and negative alliances as follows:

POA(P,α,β)(U) = x ∈ U |P(R(x)) ≥ α;CT A(P,α,β)(U) = x ∈ U | β <P(R(x)) < α;NEA(P,α,β)(U) = x ∈ U |P(R(x)) ≤ β.

(4) If 0 ≤ β ≤ α ≤ 1, then we define the fourth positive,neutral and negative alliances as follows:

POA(F,α,β)(U) = x ∈ U | F(R(x)) ≥ α;CT A(F,α,β)(U) = x ∈ U | β < F(R(x)) < α;NEA(F,α,β)(U) = x ∈ U | F(R(x)) ≤ β.

where R(x) = (µ(x), ν(x)) and F(R(x)) = 12 +√µ(x)2 + ν(x)2 ∗

( 12 −

2 arccos( µ(x)√µ(x)2+ν(x)2

)

π) for x ∈ U.

Example 3.6: (Continuation from Example 3.2) (1) Takingk1 = k2 = k3 = k4 = k5 =

15 , α = P(0.7, 0.4) and

β = P(0.25, 0.85). By Definition 3.3, we have the Pythagoreanfuzzy weighted averaging closeness index of x1, x2, x3, x4, x5and x6 on A as follows:

I(R(x1)) = P(Σ5i=1

15∗ µγ1i ,Σ

5i=1

15∗ νγ1i ) = P(0.90, 0.16);

I(R(x2)) = P(Σ5i=1

15∗ µγ2i ,Σ

5i=1

15∗ νγ2i ) = P(0.38, 0.64);

I(R(x3)) = P(Σ5i=1

15∗ µγ3i ,Σ

5i=1

15∗ νγ3i ) = P(0.20, 0.80);

I(R(x4)) = P(Σ5i=1

15∗ µγ4i ,Σ

5i=1

15∗ νγ4i ) = P(0.30, 0.70);

I(R(x5)) = P(Σ5i=1

15∗ µγ5i ,Σ

5i=1

15∗ νγ5i ) = P(0.36, 0.70);

I(R(x6)) = P(Σ5i=1

15∗ µγ6i ,Σ

5i=1

15∗ νγ6i ) = P(0.48, 0.58).

By Definition 3.5(1), we have POA(I,α,β)(U) = x1,CT A(I,α,β)(U) = x2, x4, x5, x6 and NEA(I,α,β)(U) = ∅. So weclassify x1, x2, x4, x5, x6 into POA(I,α,β)(U),CT A(I,α,β)(U) andNEA(I,α,β)(U). But it does not work for x3. Furthermore, wesee that x1 and x2, x4, x5, x6 are difference alliances, but x3does not belong to any alliance.

(2) Taking α = 0.5 and β = −0.5, we have

S (R(x1)) = 0.902 − 0.162 = +0.7844;S (R(x2)) = 0.382 − 0.642 = −0.2652;S (R(x3)) = 0.202 − 0.802 = −0.6000;S (R(x4)) = 0.302 − 0.702 = −0.4000;S (R(x5)) = 0.362 − 0.702 = −0.3604;S (R(x6)) = 0.482 − 0.582 = −0.1060.

By Definition 3.5(2), we have POA(S ,α,β)(U) =

x1,CT A(S ,α,β)(U) = x2, x4, x5, x6 and NEA(S ,α,β)(U) = x3.Furthermore, we see that x1, x3 and x2, x4, x5, x6 aredifference alliances. Especially, x1 and x3 has differentopinions on issues, and x2, x4, x5, x6 is a neutral alliance.

(3) Taking α = 0.75 and β = 0.3, we have

P(R(x1)) =1 − 0.162

2 − 0.902 − 0.162 = 0.8368;

P(R(x2)) =1 − 0.642

2 − 0.382 − 0.642 = 0.4083;

P(R(x3)) =1 − 0.802

2 − 0.202 − 0.802 = 0.2727;

P(R(x4)) =1 − 0.702

2 − 0.702 − 0.302 = 0.3592;

P(R(x5)) =1 − 0.702

2 − 0.702 − 0.362 = 0.3695;

P(R(x6)) =1 − 0.582

2 − 0.582 − 0.482 = 0.4584.

By Definition 3.5(3), we have POA(P,α,β)(U) =

x1,CT A(P,α,β)(U) = x2, x4, x5, x6 and NEA(P,α,β)(U) =x3. Moreover, we observe that x1, x3 and x2, x4, x5, x6are difference alliances. Specially, x2, x4, x5, x6 is a neutralalliance, x1 and x3 are opposite alliances.

(4) Taking α = 0.75 and β = 0.3, we have

F(R(x1))

=12+√

0.902 + 0.162 ∗ (12−

2 arccos( 0.90√0.902+0.162

)

π)

= 0.8547;F(R(x2))

=12+√

0.382 + 0.642 ∗ (12−

2 arccos( 0.38√0.382+0.642

)

π)

= 0.3817;F(R(x3))

=12+√

0.202 + 0.802 ∗ (12−

2 arccos( 0.20√0.202+0.802

)

π)

= 0.2163;

F(R(x4))

=12+√

0.302 + 0.702 ∗ (12−

2 arccos( 0.30√0.302+0.702

)

π)

= 0.3155;F(R(x5))

=12+√

0.362 + 0.702 ∗ (12−

2 arccos( 0.36√0.362+0.702

)

π)

= 0.3445;F(R(x6))

=12+√

0.482 + 0.582 ∗ (12−

2 arccos( 0.48√0.482+0.582

)

π)

= 0.4549.

By Definition 3.5(4), we have POA(F,α,β)(U) =

x1,CT A(F,α,β)(U) = x2, x4, x5, x6 and NEA(F,α,β)(U) = x3.Moreover, we find that x1, x3 and x2, x4, x5, x6 aredifference alliances. Specially, x2, x4, x5, x6 is a neutralalliance, x1 and x3 are opposite alliances.

By Definition 3.5, we partition the universe into threeregions: positive, neutral and negative alliances with differentoperators, and denote the positive, neutral and negative al-liances of U as POA(U),CT A(U) and NEA(U) for simplicity.

Page 7: Three-way Group Conflict Analysis Based on …fuzzy numbers. In this paper, we first provide the concepts of positive, neutral and negative alliances with two thresholds and employ

1063-6706 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TFUZZ.2019.2908123, IEEETransactions on Fuzzy Systems

IEEE TRANSACTION OF FUZZY SYSTEMS, VOL. *, NO. *, MARCH 2019 7

Furthermore, we classify all agents into three regions byDefinition 3.5(1) when they are depicted by Pythagoreanfuzzy numbers. If Definition 3.5(1) does not work, then wechoose Definition 3.5(2) to partition these agents. Specially, ifDefinitions 3.5(1) and 3.5(2) do not work, we apply Definition3.5(3) to classify these agents.

IV. Three-way conflict analysis of Pythagorean fuzzyinformation systems

In this section, we study Pythagorean fuzzy informationsystems for conflicts based on three-way decision theory andBayesian minimum risk theory.

Definition 4.1: A Pythagorean fuzzy loss function given byan expert is a 3-tuple λ = (Ω,A ,L ) shown as TABLE III,where Ω = X,¬X is a set of 2 states, A = aP, aB, aN is a setof 3 actions for each state, L = λPP, λBP, λNP, λPN , λBN , λNN,X(⊆ U) and ¬X(⊆ U) indicate that an agent is in X andnot in X, respectively; aP, aB and aN denote three actions inclassifying an agent x into POA(U), CT A(U) and NEA(U),respectively; λPP, λBP and λNP stand for the losses of takingactions aP, aB and aN , respectively, when an agent belongsto X; λPN , λBN and λNN mean the losses of taking actionsaP, aB and aN , respectively, when an agent belongs to ¬X,where λPP, λBP, λNP, λPN , λBN and λNN are Pythagorean fuzzynumbers.

TABLE IIIA Pythagorean Fuzzy Loss Function given by an expert.

Action X ¬XaP λPP = P(µλPP , νλPP ) λPN = P(µλPN , νλPN )aB λBP = P(µλBP , νλBP ) λBN = P(µλBN , νλBN )aN λNP = P(µλNP , νλNP ) λNN = P(µλNN , νλNN )

For simplicity, we employ the same symbol to denote boththe set C and the corresponding state; we also denote both theset ¬C and the corresponding state as the same symbol. Fur-thermore, we assume that the loss of assigning an object intothe boundary region is between an incorrect classification anda correct classification. That is, the loss of right decision is lessthan that of deferred decision, and the loss of deferred decisionis less than that of the wrong decision in practice. So λPN , λBN ,λNN λPN , λBN and λNN should satisfy the above relations.Furthermore, there are four types of Pythagorean fuzzy lossfunctions as follows: (1) the Pythagorean fuzzy loss functionsatisfying λPP ≤ λBP ≤ λNP and λNN ≤ λBN ≤ λPN ; (2) thePythagorean fuzzy loss function satisfying S (λPP) ≤ S (λBP) ≤S (λNP) and S (λNN) ≤ S (λBN) ≤ S (λPN); (3) the Pythagoreanfuzzy loss function satisfying P(λPP) ≤ P(λBP) ≤ P(λNP)and P(λNN) ≤ P(λBN) ≤ P(λPN); (4) the Pythagoreanfuzzy loss function satisfying F(λPP) ≤ F(λBP) ≤ F(λNP)and F(λNN) ≤ F(λBN) ≤ F(λPN). In practice, loss functionsare very important for conflict analysis of Pythagorean fuzzyinformation systems, there are many methods of deriving lossfunctions such as practical experience and given by famousexperts. Although there are plenty of loss functions besidesthe above four types, we only discuss the Pythagorean fuzzyloss functions given by experts satisfying λPP ≤ λBP ≤ λNP

and λNN ≤ λBN ≤ λPN in this section.

Example 4.2: TABLE IV depicts a Pythagorean fuzzy lossfunction given by an expert, and λPP, λBP, λNP, λNN , λBN andλPN are Pythagorean fuzzy numbers. Especially, we haveλPP ≤ λBP ≤ λNP and λNN ≤ λBN ≤ λPN .

TABLE IVA Pythagorean Fuzzy Loss Function.

Action X ¬XaP λPP = P(0.1, 0.8) λPN = P(0.9, 0.2)aB λBP = P(0.6, 0.5) λBN = P(0.5, 0.6)aN λNP = P(0.9, 0.3) λNN = P(0.2, 0.8)

Suppose λPP, λBP, λNP, λPN , λBN and λNN are Pythagore-an fuzzy numbers, which satisfy λPP ≤ λBP ≤ λNP andλNN ≤ λBN ≤ λPN . For the object x ∈ U, the expected lossesR(aP|x), R(aB|x) and R(aN |x) under the actions aP, aB and aN ,respectively, are shown as follows:

R(aP|x) = P(R(x)) ∗ λPP ⊕ [1 −P(R(x))] ∗ λPN ;R(aB|x) = P(R(x)) ∗ λBP ⊕ [1 −P(R(x))] ∗ λBN ;R(aN |x) = P(R(x)) ∗ λNP ⊕ [1 −P(R(x))] ∗ λNN .

We see that the expected loss functions R(aP|x), R(aB|x)and R(aN |x) are constructed on the closeness index functionP(R(x)), which are different from the expected loss functionsof reference [27]. According to Definition 4.1, we have theexpected losses R(aP|x), R(aB|x) and R(aN |x) as follows:

R(aP|x) = P(√

1 − (1 − µ2λPP

)P(R(x)), (νλPP )P(R(x)))

⊕P(√

1 − (1 − µ2λPN

)1−P(R(x)), (νλPN )1−P(R(x)));

R(aB|x) = P(√

1 − (1 − µ2λBP

)P(R(x)), (νλBP )P(R(x)))

⊕P(√

1 − (1 − µ2λBN

)1−P(R(x)), (νλBN )1−P(R(x)));

R(aN |x) = P(√

1 − (1 − µ2λNP

)P(R(x)), (νλNP )P(R(x)))

⊕P(√

1 − (1 − µ2λNN

)1−P(R(x)), (νλNN )1−P(R(x))).

Theorem 4.3: Let R(a•|x) be the expected loss under theaction a• for the object x ∈ U, where • = P, B,N. Then

R(aP|x) = P(√

1 − (1 − µ2λPP

)P(R(x)) ∗ (1 − µ2λPN

)1−P(R(x)),

(νλPP )P(R(x)) ∗ (νλPN )1−P(R(x)));

R(aB|x) = P(√

1 − (1 − µ2λBP

)P(R(x)) ∗ (1 − µ2λBN

)1−P(R(x)),

(νλBP )P(R(x)) ∗ (νλBN )1−P(R(x)));

R(aN |x) = P(√

1 − (1 − µ2λNP

)P(R(x)) ∗ (1 − µ2λNN

)1−P(R(x)),

(νλNP )P(R(x)) ∗ (νλNN )1−P(R(x))).

Proof: We assume t1 = (1 − µ2λPP

)P(R(x)), t2 = (1 −µ2λPN

)1−P(R(x)), y1 = (νλPP )P(R(x)) and y2 = (νλPN )1−P(R(x)). By

Page 8: Three-way Group Conflict Analysis Based on …fuzzy numbers. In this paper, we first provide the concepts of positive, neutral and negative alliances with two thresholds and employ

1063-6706 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TFUZZ.2019.2908123, IEEETransactions on Fuzzy Systems

IEEE TRANSACTION OF FUZZY SYSTEMS, VOL. *, NO. *, MARCH 2019 8

Definition 2.1, we have

R(aP|x) = P(√

1 − (1 − µ2λPP

)P(R(x)), (νλPP )P(R(x)))

⊕P(√

1 − (1 − µ2λPN

)1−P(R(x)), (νλPN )1−P(R(x)))

= P(√

1 − t1, y1) ⊕ P(√

1 − t2, y2)

= P(√

1 − t1 + 1 − t2 − (1 − t1)(1 − t2), y1y2)

= P(√

1 − t1t2, y1y2)

= P(√

1 − (1 − µ2λPP

)P(R(x)) ∗ (1 − µ2λPN

)1−P(R(x)),

(νλPP )P(R(x)) ∗ (νλPN )1−P(R(x))).

Furthermore, we also prove

R(aB|x) = P(√

1 − (1 − µ2λBP

)P(R(x)) ∗ (1 − µ2λBN

)1−P(R(x)),

(νλBP )P(R(x)) ∗ (νλBN )1−P(R(x)));

R(aN |x) = P(√

1 − (1 − µ2λNP

)P(R(x)) ∗ (1 − µ2λNN

)1−P(R(x)),

(νλNP )P(R(x)) ∗ (νλNN )1−P(R(x))).

We observe that Theorem 4.3 illustrates that the expectedlosses R(aP|x), R(aB|x) and R(aN |x) are Pythagorean fuzzynumbers. Especially, it implies that how to compute the ex-pected losses R(aP|x), R(aB|x) and R(aN |x) with the closenessindex function P(R(x)).

Definition 4.4: Let S = (U, A,V, f ) be a Pythagorean fuzzyinformation system, R(aP|x), R(aB|x) and R(aN |x) are theexpected losses under the actions aP, aB and aN , respectively,for the object x ∈ U. Then the Expected Loss Table IR(S ),Score Table S R(S ), Closeness Table PR(S ) and PreferredTable FR(S ) are defined as TABLE V, TABLE VI, TABLEVII and TABLE VIII, respectively.

TABLE VThe Expected Loss Table IR(S ).

Action P B Nx1 I(R(aP |x1)) I(R(aB|x1)) I(R(aN |x1))x2 I(R(aP |x2)) I(R(aB|x2)) I(R(aN |x2)). . . .

. . . .

. . . .

xn I(R(aP |xn)) I(R(aB|xn)) I(R(aN |xn))

TABLE VIThe Score Table S R(S ).

Action P B Nx1 S (R(aP |x1)) S (R(aB|x1)) S (R(aN |x1))x2 S (R(aP |x2)) S (R(aB|x2)) S (R(aN |x2)). . . .

. . . .

. . . .

xn S (R(aP |xn)) S (R(aB|xn)) S (R(aN |xn))

TABLE VIIThe Closeness Table PR(S ).

Action P B Nx1 P(R(aP |x1)) P(R(aB|x1)) P(R(aN |x1))x2 P(R(aP |x2)) P(R(aB|x2)) P(R(aN |x2)). . . .

. . . .

. . . .

xn P(R(aP |xn)) P(R(aB|xn)) P(R(aN |xn))

TABLE VIIIThe Preferred Table FR(S ).

Action P B Nx1 F(R(aP |x1)) F(R(aB|x1)) F(R(aN |x1))x2 F(R(aP |x2)) F(R(aB|x2)) F(R(aN |x2)). . . .

. . . .

. . . .

xn F(R(aP |xn)) F(R(aB|xn)) F(R(aN |xn))

Theorem 4.5: Let S = (U, A,V, f ) be a Pythagorean fuzzyinformation system, R(aP|x), R(aB|x) and R(aN |x) are theexpected losses under the actions aP, aB and aN , respectively,for the object x ∈ U, and • = I, S ,P , F.P: If •(R(aP|x)) ≤ •(R(aB|x)) and •(R(aP|x)) ≤ •(R(aN |x)),then we have x ∈ POA(U);B: If •(R(aB|x)) ≤ •(R(aP|x)) and •(R(aB|x)) ≤ •(R(aN |x)),then we have x ∈ CT A(U);N: If •(R(aN |x)) ≤ •(R(aP|x)) and •(R(aN |x)) ≤ •(R(aB|x)),then we have x ∈ NEA(U).Proof: It is straightforward by Bayesian minimum risktheory.

Example 4.6: (Continuation from Examples 3.2 and 4.2)We compute POA(U),CT A(U) and NEA(U) based on Defi-nition 3.5 and Bayesian minimum risk theory as follows:

(1) First, by TABLE III and Theorem 4.3, for xi ∈ U, 1 ≤i ≤ 6, we have

R(aP|xi) = P(√

1 − (1 − µ2λPP

)P(R(xi)) ∗ (1 − µ2λPN

)1−P(R(xi)),

(νλPP )P(R(xi)) ∗ (νλPN )1−P(R(xi)))

= P(√

1 − (1 − 0.12)P(R(xi)) ∗ (1 − 0.92)1−P(R(xi)),

0.8P(R(xi)) ∗ 0.21−P(R(xi)));

R(aB|xi) = P(√

1 − (1 − µ2λBP

)P(R(xi)) ∗ (1 − µ2λBN

)1−P(R(xi)),

(νλBP )P(R(xi)) ∗ (νλBN )1−P(R(xi)))

= P(√

1 − (1 − 0.62)P(R(xi)) ∗ (1 − 0.52)1−P(R(xi)),

0.5P(R(xi)) ∗ 0.61−P(R(xi)));

R(aN |xi) = P(√

1 − (1 − µ2λNP

)P(R(xi)) ∗ (1 − µ2λNN

)1−P(R(xi)),

(νλNP )P(R(xi)) ∗ (νλNN )1−P(R(xi)))

= P(√

1 − (1 − 0.92)P(R(xi)) ∗ (1 − 0.22)1−P(R(xi)),

0.3P(R(xi)) ∗ 0.81−P(R(xi))).

Second, by Definition 4.4, we have the Expected Loss TableIR(S ) shown by TABLE IX as follows:

Page 9: Three-way Group Conflict Analysis Based on …fuzzy numbers. In this paper, we first provide the concepts of positive, neutral and negative alliances with two thresholds and employ

1063-6706 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TFUZZ.2019.2908123, IEEETransactions on Fuzzy Systems

IEEE TRANSACTION OF FUZZY SYSTEMS, VOL. *, NO. *, MARCH 2019 9

TABLE IXThe Expected Loss Table IR(S ).

Action P B Nx1 P(0.4937,0.6380) P(0.5859,0.5151) P(0.8675,0.3521)x2 P(0.7920,0.3522) P(0.5450,0.5570) P(0.7103,0.5360)x3 P(0.8378,0.2919) P(0.5308,0.5709) P(0.6187,0.6122)x4 P(0.8101,0.3291) P(0.5399,0.5620) P(0.6808,0.5625)x5 P(0.8065,0.3338) P(0.5410,0.5609) P(0.6873,0.5568)x6 P(0.7694,0.3800) P(0.5505,0.5514) P(0.7393,0.5080)

Third, by Theorem 4.5, we have POA(U) = x1,CT A(U) =x2, x5, x6 and NEA(U) = ∅. Obviously, it is difficult tocompare the expected losses under the actions aP, aB and aN

for the agents x3 and x4. So it fails to put the agents x3 andx4 into POA(U), CT A(U) and NEA(U). Therefore, x1 andx2, x5, x6 are different alliances, but we can not identify x3and x4.

(2) First, by Definition 2.3 and TABLE V, for xi ∈ U, 1 ≤i ≤ 6, we have

S (R(aP|xi))

= S (P(√

1 − (1 − µ2λPP

)P(R(xi)) ∗ (1 − µ2λPN

)1−P(R(xi)),

(νλPP )P(R(xi)) ∗ (νλPN )1−P(R(xi))))

= S (P(√

1 − (1 − 0.12)P(R(xi)) ∗ (1 − 0.92)1−P(R(xi)),

0.8P(R(xi)) ∗ 0.21−P(R(xi))));S (R(aB|xi))

= S (P(√

1 − (1 − µ2λBP

)P(R(xi)) ∗ (1 − µ2λBN

)1−P(R(xi)),

(νλBP )P(R(xi)) ∗ (νλBN )1−P(R(xi))))

= S (P(√

1 − (1 − 0.62)P(R(xi)) ∗ (1 − 0.52)1−P(R(xi)),

0.5P(R(xi)) ∗ 0.61−P(R(xi))));S (R(aN |xi))

= S (P(√

1 − (1 − µ2λNP

)P(R(xi)) ∗ (1 − µ2λNN

)1−P(R(xi)),

(νλNP )P(R(xi)) ∗ (νλNN )1−P(R(xi))))

= S (P(√

1 − (1 − 0.92)P(R(xi)) ∗ (1 − 0.22)1−P(R(xi)),

0.3P(R(xi)) ∗ 0.81−P(R(xi)))).

Second, by Definition 4.4, we have the Score Table S R(S )shown by TABLE X as follows.

TABLE XThe Score Table S R(S ).

Action P B Nx1 -0.1633 0.0779 0.6286x2 0.5031 -0.0132 0.2172x3 0.6168 -0.0442 0.0080x4 0.5480 -0.0243 0.1471x5 0.5390 -0.0219 0.1623x6 0.4476 -0.0010 0.2885

Third, by Theorem 4.5, we have POA(U) = x1,CT A(U) =x2, x3, x4, x5, x6 and NEA(U) = ∅. Moreover, we find thatx1 and x2, x3, x4, x5, x6 are difference alliances. Specially,x1 is a positive alliance, and x2, x3, x4, x5, x6 is a neutralalliance.

(3) First, by Definition 2.5, for xi ∈ U, 1 ≤ i ≤ 6, we have

P(R(aP|xi)

=P(P(√

1 − (1 − µ2λPP

)P(R(xi)) ∗ (1 − µ2λPN

)1−P(R(xi)),

(νλPP )P(R(xi)) ∗ (νλPN )1−P(R(xi))))

=P(P(√

1 − (1 − 0.12)P(R(xi)) ∗ (1 − 0.92)1−P(R(xi)),

0.8P(R(xi)) ∗ 0.21−P(R(xi))));P(R(aB|xi))

=P(P(√

1 − (1 − µ2λBP

)P(R(xi)) ∗ (1 − µ2λBN

)1−P(R(xi)),

(νλBP )P(R(xi)) ∗ (νλBN )1−P(R(xi))))

=P(P(√

1 − (1 − 0.62)P(R(xi)) ∗ (1 − 0.52)1−P(R(xi)),

0.5P(R(xi)) ∗ 0.61−P(R(xi))));P(R(aN |xi))

=P(P(√

1 − (1 − µ2λNP

)P(R(xi)) ∗ (1 − µ2λNN

)1−P(R(xi)),

(νλNP )P(R(xi)) ∗ (νλNN )1−P(R(xi))))

=P(P(√

1 − (1 − 0.92)P(R(xi)) ∗ (1 − 0.22)1−P(R(xi)),

0.3P(R(xi)) ∗ 0.81−P(R(xi)))).

Second, by Definition 4.4, we have the Closeness TablePR(S ) shown by TABLE XI as follows.

TABLE XIThe Closeness Table PR(S ).

Action P B Nx1 0.4395 0.5280 0.7797x2 0.7015 0.4953 0.5899x3 0.7543 0.4841 0.5032x4 0.7218 0.4913 0.5603x5 0.7176 0.4921 0.5666x6 0.6771 0.4997 0.6207

Third, by Theorem 4.5, we have POA(U) = x1,CT A(U) =x2, x3, x4, x5, x6 and NEA(U) = ∅. Furthermore, we find thatx1 and x2, x3, x4, x5, x6 are difference alliances. Specially,x1 is a positive alliance, and x2, x3, x4, x5, x6 is a neutralalliance.

(4) First, by Definition 4.4, we have the Preferred TableFR(S ) shown by TABLE XII as follows:

TABLE XIIThe Preferred Table FR(S ).

Action P B Nx1 0.4349 0.5319 0.7383x2 0.7025 0.4946 0.5787x3 0.7543 0.4819 0.5029x4 0.7224 0.4901 0.5533x5 0.7184 0.4910 0.5588x6 0.6784 0.4996 0.6047

Then, by Theorem 4.5, we have POA(U) = x1,CT A(U) =x2, x3, x4, x5, x6 and NEA(U) = ∅. Moreover, we see that x1and x2, x3, x4, x5, x6 are difference alliances. Specially, x1 isa positive alliance, and x2, x3, x4, x5, x6 is a neutral alliance.

(5) First, we list the alliances computed usingIR(S ), S R(S ), PR(S ) and FR(S ) in TABLE XIII. Concretely,we have the same alliances with S R(S ), PR(S ) and FR(S ),

Page 10: Three-way Group Conflict Analysis Based on …fuzzy numbers. In this paper, we first provide the concepts of positive, neutral and negative alliances with two thresholds and employ

1063-6706 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TFUZZ.2019.2908123, IEEETransactions on Fuzzy Systems

IEEE TRANSACTION OF FUZZY SYSTEMS, VOL. *, NO. *, MARCH 2019 10

which are different from the results with IR(S ); all agentsare classified into the positive, neutral and negative allianceswith S R(S ), PR(S ) and FR(S ), but we can not put x3 intoany alliance with IR(S ); almost all agents are classified intothe neutral alliances with IR(S ), S R(S ), PR(S ) and FR(S ),and no agents are put into the negative alliances. Second,we have the positive alliance x1 and the neutral alliancex2, x5, x6 by IR(S ); we get the positive alliance x1 andthe neutral alliance x2, x3, x4, x5, x6 by S R(S ), PR(S ) andFR(S ). It is obvious that most of countries belong to theneutral alliance, and x1 holds different opinions on someissues, so it is a single alliance. If x1 wants to get supportsfrom other countries, then it must change opinions on someissues. Third, there are so many agents in the neutral alliance,so we should choose the appropriate thresholds and providemore effective approaches for studying Pythagorean fuzzyinformation systems for conflicts.

TABLE XIIIThree alliances based on IR(S ), S R(S ), PR(S ) and FR(S ).

Methods POA(U) CT A(U) NEA(U)IR(S ) x1 x2, x5, x6 ∅S R(S ) x1 x2, x3, x4, x5, x6 ∅PR(S ) x1 x2, x3, x4, x5, x6 ∅FR(S ) x1 x2, x3, x4, x5, x6 ∅

V. Three-way group conflict analysis of Pythagorean fuzzyinformation systems

In this section, we investigate Pythagorean fuzzy informa-tion systems for conflicts with group decision theory.

Suppose there are m experts E1, E2, ..., Em, who give theloss functions λ(1), λ(2), ..., λ(m) shown by TABLE XIV, whereλ(i) = (Ω,A ,L (i)), Ω = X,¬X is a set of 2 states, A =

aP, aB, aN, L (i) = λ(i)PP, λ

(i)BP, λ

(i)NP, λ

(i)PN , λ

(i)BN , λ

(i)NN, X(⊆ U) and

¬X(⊆ U) indicate that an agent is in X and not in X, respec-tively. For simplicity, we take the same symbol to denote boththe set C and the corresponding state. We also employ boththe set ¬C and the corresponding state as the same symbol.Furthermore, aP, aB and aN denote three actions in classifyingan agent x into POA(U), CT A(U) and NEA(U), respectively;λ(i)

PP, λ(i)BP and λ(i)

NP stand for the losses of taking actions aP, aB

and aN , respectively, when an agent belongs to X; λ(i)PN , λ

(i)BN

and λ(i)NN mean the losses of taking actions aP, aB and aN ,

respectively, when an agent belongs to ¬X, where λ(i)PP, λ

(i)BP,

λ(i)NP, λ(i)

PN , λ(i)BN and λ(i)

NN are Pythagorean fuzzy numbers, whichsatisfy λ(i)

PP ≤ λ(i)BP ≤ λ

(i)NP and λ(i)

NN ≤ λ(i)BN ≤ λ

(i)PN . For the agent

x ∈ U, the expected losses R(i)(aP|x), R(i)(aB|x) and R(i)(aN |x)under the actions aP, aB, and aN with respect to the loss givenby the expert Ei, respectively, as follows:

R(i)(aP|x) = P(R(x)) ∗ λ(i)PP ⊕ [1 −P(R(x))] ∗ λ(i)

PN ;

R(i)(aB|x) = P(R(x)) ∗ λ(i)BP ⊕ [1 −P(R(x))] ∗ λ(i)

BN ;

R(i)(aN |x) = P(R(x)) ∗ λ(i)NP ⊕ [1 −P(R(x))] ∗ λ(i)

NN .

TABLE XIVPythagorean Fuzzy Loss Functions λ(i) |i = 1, 2, ...,m.

λ Action X ¬X

λ(1)aP λ(1)

PP = P(µλ

(1)PP, νλ

(1)PP

) λ(1)PN = P(µ

λ(1)PN, νλ

(1)PN

)

aB λ(1)BP = P(µ

λ(1)BP, νλ

(1)BP

) λ(1)BN = P(µ

λ(1)BN, νλ

(1)BN

)

aN λ(1)NP = P(µ

λ(1)NP, νλ

(1)NP

) λ(1)NN = P(µ

λ(1)NN, νλ

(1)NN

)

λ(2)aP λ(2)

PP = P(µλ

(2)PP, νλ

(2)PP

) λ(2)PN = P(µ

λ(2)PN, νλ

(2)PN

)

aB λ(2)BP = P(µ

λ(2)BP, νλ

(2)BP

) λ(2)BN = P(µ

λ(2)BN, νλ

(2)BN

)

aN λ(2)NP = P(µ

λ(2)NP, νλ

(2)NP

) λ(2)NN = P(µ

λ(2)NN, νλ

(2)NN

)

.. . .. . .. . .

λ(m)aP λ(m)

PP = P(µλ

(m)PP, νλ

(m)PP

) λ(m)PN = P(µ

λ(m)PN, νλ

(m)PN

)

aB λ(m)BP = P(µ

λ(m)BP, νλ

(m)BP

) λ(m)BN = P(µ

λ(m)BN, νλ

(m)BN

)

aN λ(m)NP = P(µ

λ(m)NP, νλ

(m)NP

) λ(m)NN = P(µ

λ(m)NN, νλ

(m)NN

)

Example 5.1: (Continuation from Example 4.6) TABLEXV depicts a collection of Pythagorean fuzzy loss functionsλ(i)|i = 1, 2, 3, which are given by three experts E1, E2, E3.

TABLE XVPythagorean Fuzzy Loss Functions λ(i) |i = 1, 2, 3.

λ Action X ¬X

λ(1)aP λ(1)

PP = P(0.1, 0.8) λ(1)PN = P(0.9, 0.2)

aB λ(1)BP = P(0.6, 0.5) λ(1)

BN = P(0.5, 0.6)aN λ(1)

NP = P(0.9, 0.3) λ(1)NN = P(0.2, 0.8)

λ(2)aP λ(2)

PP = P(0.2, 0.9) λ(2)PN = P(0.8, 0.3)

aB λ(2)BP = P(0.5, 0.7) λ(2)

BN = P(0.6, 0.5)aN λ(2)

NP = P(0.8, 0.2) λ(2)NN = P(0.1, 0.9)

λ(3)aP λ(3)

PP = P(0.3, 0.9) λ(3)PN = P(0.8, 0.1)

aB λ(3)BP = P(0.5, 0.6) λ(3)

BN = P(0.6, 0.6)aN λ(3)

NP = P(0.7, 0.1) λ(3)NN = P(0.2, 0.9)

By Theorem 4.3, we have the expected lossesR(i)(aP|x),R(i)(aB|x) and R(i)(aN |x) with respect to thePythagorean fuzzy loss function λ(i) as follows:

R(i)(aP|x) = P(√

1 − (1 − µ2λ(i)

PP

)P(R(x)) ∗ (1 − µ2λ(i)

PN

)1−P(R(x)),

(νλ(i)PP

)P(R(x)) ∗ (νλ(i)PN

)1−P(R(x)));

R(i)(aB|x) = P(√

1 − (1 − µ2λ(i)

BP

)P(R(x)) ∗ (1 − µ2λ(i)

BN

)1−P(R(x)),

(νλ(i)BP

)P(R(x)) ∗ (νλ(i)BN

)1−P(R(x)));

R(i)(aN |x) = P(√

1 − (1 − µ2λ(i)

NP

)P(R(x)) ∗ (1 − µ2λ(i)

NN

)1−P(R(x)),

(νλ(i)NP

)P(R(x)) ∗ (νλ(i)NN

)1−P(R(x))).

Theorem 5.2: Let R(i)(aP|x), R(i)(aB|x) and R(i)(aN |x) bethe expected losses under the actions aP, aB and aN usingthe Pythagorean fuzzy loss function λ(i), respectively, for theobject x ∈ U, and W = w1,w2, ...,wm be the weight vector

Page 11: Three-way Group Conflict Analysis Based on …fuzzy numbers. In this paper, we first provide the concepts of positive, neutral and negative alliances with two thresholds and employ

1063-6706 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TFUZZ.2019.2908123, IEEETransactions on Fuzzy Systems

IEEE TRANSACTION OF FUZZY SYSTEMS, VOL. *, NO. *, MARCH 2019 11

of R(i)(a•|x)(i = 1, 2, ...,m, • = P, B,N). Then

R(R(1)(aP|x), ...,R(m)(aP|x)) =

P(Σmi=1wi ∗

√1 − (1 − µ2

λ(i)PP

)P(R(x)) ∗ (1 − µ2λ(i)

PN

)1−P(R(x)),

Σmi=1wi ∗ (νλ(i)

PP)P(R(x)) ∗ (νλ(i)

PN)1−P(R(x)));

R(R(1)(aB|x), ...,R(m)(aB|x)) =

P(Σmi=1wi ∗

√1 − (1 − µ2

λ(i)BP

)P(R(x)) ∗ (1 − µ2λ(i)

BN

)1−P(R(x)),

Σmi=1wi ∗ (νλ(i)

BP)P(R(x)) ∗ (νλ(i)

BN)1−P(R(x)));

R(R(1)(aN |x), ...,R(m)(aN |x)) =

P(Σmi=1wi ∗

√1 − (1 − µ2

λ(i)NP

)P(R(x)) ∗ (1 − µ2λ(i)

NN

)1−P(R(x)),

Σmi=1wi ∗ (νλ(i)

NP)P(R(x)) ∗ (νλ(i)

NN)1−P(R(x))).

Proof: It is straightforward by Theorem 4.3.

We see that Theorem 5.2 illustrates that the expected loss-es R(R(1)(aP|x), ...,R(m)(aP|x)), R(R(1)(aB|x), ...,R(m)(aB|x)) andR(R(1)(aN |x), ...,R(m)(aN |x)) are Pythagorean fuzzy numbers.Especially, it implies that how to compute the expected loss-es R(R(1)(aP|x), ...,R(m)(aP|x)), R(R(1)(aB|x), ...,R(m)(aB|x)) andR(R(1)(aN |x), ...,R(m)(aN |x)) with the closeness index functionP(R(x)).

Definition 5.3: Let S = (U, A,V, f ) be a Pythagore-an fuzzy information system, R(R(1)(aP|x), ...,R(m)(aP|x)),R(R(1)(aB|x), ...,R(m)(aB|x)) and R(R(1)(aN |x), ...,R(m)(aN |x))are the expected losses under the actions aP, aB and aN ,respectively, for the agent x ∈ U. Then the Group ExpectedLoss Table R(R(S )), Group Score Table S (R(S )), GroupCloseness Table P(R(S )) and Group Preferred Table F (R(S ))are defined as TABLE XVI, TABLE XVII, TABLE XVIII andTABLE XIX, respectively.

Theorem 5.4: Let S = (U, A,V, f ) be a Pythagorean fuzzyinformation system, R(aP|x), R(aB|x) and R(aN |x) are theexpected losses under the actions aP, aB and aN , respectively,for the agent x ∈ U, and • = I, S ,P , F. Then

P∗ : If •(R(R(1)(aP|x), ...,R(m)(aP|x))) ≤ •(R(R(1)(aB|x),...,R(m)(aB|x))) and •(R(R(1)(aP|x), ...,R(m)(aP|x))) ≤•(R(R(1)(aN |x), ...,R(m)(aN |x))), then we have x ∈ POA(U);

B∗ : If •(R(R(1)(aB|x), ...,R(m)(aB|x))) ≤ •(R(R(1)(aP|x),...,R(m)(aP|x))) and •(R(R(1)(aB|x), ...,R(m)(aB|x))) ≤•(R(R(1)(aN |x), ...,R(m)(aN |x))), then we have x ∈ CT A(U);

N∗ : If •(R(R(1)(aN |x), ...,R(m)(aN |x))) ≤ •(R(R(1)(aP|x),...,R(m)(aP|x))) and •(R(R(1)(aN |x), ...,R(m)(aN |x))) ≤•(R(R(1)(aB|x), ...,R(m)(aB|x))), then we have x ∈ NEA(U).

Proof: It is straightforward by Bayesian minimum risktheory.

Example 5.5: (Continuation from Example 5.1) Takingw1 = w2 = w3 =

13 for Pythagorean fuzzy loss functions

λ(i)|i = 1, 2, 3, we compute POA(U),CT A(U) and NEA(U)as follows:

(1) First, for x j ∈ U, by Theorem 5.2, we have

I(R(R(1)(aP|x j), ...,R(m)(aP|x j))) =

P(Σmi=1wi ∗

√1 − (1 − µ2

λ(i)PP

)P(R(x j)) ∗ (1 − µ2λ(i)

PN

)1−P(R(x j)),

Σmi=1wi ∗ (νλ(i)

PP)P(R(x j)) ∗ (νλ(i)

PN)1−P(R(x j)));

I(R(R(1)(aB|x j), ...,R(m)(aB|x j))) =

P(Σmi=1wi ∗

√1 − (1 − µ2

λ(i)BP

)P(R(x j)) ∗ (1 − µ2λ(i)

BN

)1−P(R(x j)),

Σmi=1wi ∗ (νλ(i)

BP)P(R(x j)) ∗ (νλ(i)

BN)1−P(R(x j)));

I(R(R(1)(aN |x j), ...,R(m)(aN |x j))) =

P(Σmi=1wi ∗

√1 − (1 − µ2

λ(i)NP

)P(R(x j)) ∗ (1 − µ2λ(i)

NN

)1−P(R(x j)),

Σmi=1wi ∗ (νλ(i)

NP)P(R(x j)) ∗ (νλ(i)

NN)1−P(R(x j))).

Second, by Definition 5.3, we have the Group ExpectedLoss Table R(R(S )) as TABLE XX.

TABLE XXThe Group Expected Loss TableR(R(S )).

Action P B Nx1 P(0.4623,0.6731) P(0.5412,0.5926) P(0.7617,0.2503)x2 P(0.7203,0.3558) P(0.5571,0.5769) P(0.6020,0.4633)x3 P(0.7660,0.2929) P(0.5609,0.5730) P(0.5186,0.5679)x4 P(0.7380,0.3314) P(0.5586,0.5754) P(0.5746,0.4986)x5 P(0.7344,0.3364) P(0.5583,0.5757) P(0.5806,0.4909)x6 P(0.6987,0.3852) P(0.5554,0.5786) P(0.6295,0.4273)

Third, by Theorem 5.4, we have POA(U) = x1,CT A(U) =x2, x4, x5, x6 and NEA(U) = ∅. It is difficult to compare theexpected losses under the actions aP, aB and aN for the agentx3 by Definition 2.2. So we can not classify the agent x3 intoPOA(U),CT A(U) and NEA(U).

Therefore, x1 is a positive alliance, and x2, x4, x5, x6 isa neutral alliance. We find that x1 and x2, x4, x5, x6 aredifference alliances.

(2) First, for x j ∈ U, by Theorem 5.2, we have

S (R(R(1)(aP|x j), ...,R(m)(aP|x j))) =

S (P(Σmi=1wi ∗

√1 − (1 − µ2

λ(i)PP

)P(R(x j)) ∗ (1 − µ2λ(i)

PN

)1−P(R(x j)),

Σmi=1wi ∗ (νλ(i)

PP)P(R(x j)) ∗ (νλ(i)

PN)1−P(R(x j))));

S (R(R(1)(aB|x j), ...,R(m)(aB|x j))) =

S (P(Σmi=1wi ∗

√1 − (1 − µ2

λ(i)BP

)P(R(x j)) ∗ (1 − µ2λ(i)

BN

)1−P(R(x j)),

Σmi=1wi ∗ (νλ(i)

BP)P(R(x j)) ∗ (νλ(i)

BN)1−P(R(x j))));

S (R(R(1)(aN |x j), ...,R(m)(aN |x j))) =

S (P(Σmi=1wi ∗

√1 − (1 − µ2

λ(i)NP

)P(R(x j)) ∗ (1 − µ2λ(i)

NN

)1−P(R(x j)),

Σmi=1wi ∗ (νλ(i)

NP)P(R(x j)) ∗ (νλ(i)

NN)1−P(R(x j)))).

Second, by Definition 5.3, we have the Group Score TableS (R(S )) shown in TABLE XXI as follows:

Page 12: Three-way Group Conflict Analysis Based on …fuzzy numbers. In this paper, we first provide the concepts of positive, neutral and negative alliances with two thresholds and employ

1063-6706 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TFUZZ.2019.2908123, IEEETransactions on Fuzzy Systems

IEEE TRANSACTION OF FUZZY SYSTEMS, VOL. *, NO. *, MARCH 2019 12

TABLE XVIThe Group Expected Loss TableR(R(S )).

Action P B Nx1 R(R(1)(aP |x1), ...,R(m)(aP |x1)) R(R(1)(aB|x1), ...,R(m)(aB|x1)) R(R(1)(aN |x1), ...,R(m)(aN |x1))x2 R(R(1)(aP |x2), ...,R(m)(aP |x2)) R(R(1)(aB|x2), ...,R(m)(aB|x2)) R(R(1)(aN |x2), ...,R(m)(aN |x2)). . . .

. . . .

. . . .

xn R(R(1)(aP |xn), ...,R(m)(aP |xn)) R(R(1)(aB|xn), ...,R(m)(aB|xn)) R(R(1)(aN |xn), ...,R(m)(aN |xn))

TABLE XVIIThe Group Score TableS (R(S )).

Action P B Nx1 S (R(R(1)(aP |x1), ...,R(m)(aP |x1))) S (R(R(1)(aB|x1), ...,R(m)(aB|x1))) S (R(R(1)(aN |x1), ...,R(m)(aN |x1)))x2 S (R(R(1)(aP |x2), ...,R(m)(aP |x2))) S (R(R(1)(aB|x2), ...,R(m)(aB|x2))) S (R(R(1)(aN |x2), ...,R(m)(aN |x2))). . . .

. . . .

. . . .

xn S (R(R(1)(aP |xn), ...,R(m)(aP |xn))) S (R(R(1)(aB|xn), ...,R(m)(aB|xn))) S (R(R(1)(aN |xn), ...,R(m)(aN |xn)))

TABLE XVIIIThe Group Closeness TableP(R(S )).

Action P B Nx1 P(R(R(1)(aP |x1), ...,R(m)(aP |x1))) P(R(R(1)(aB|x1), ...,R(m)(aB|x1))) P(R(R(1)(aN |x1), ...,R(m)(aN |x1)))x2 P(R(R(1)(aP |x2), ...,R(m)(aP |x2))) P(R(R(1)(aB|x2), ...,R(m)(aB|x2))) P(R(R(1)(aN |x2), ...,R(m)(aN |x2))). . . .

. . . .

. . . .

xn P(R(R(1)(aP |xn), ...,R(m)(aP |xn))) P(R(R(1)(aB|xn), ...,R(m)(aB|xn))) P(R(R(1)(aN |xn), ...,R(m)(aN |xn)))

TABLE XIXThe Group Preferred TableF (R(S )).

Action P B Nx1 F(R(R(1)(aP |x1), ...,R(m)(aP |x1))) F(R(R(1)(aB|x1), ...,R(m)(aB|x1))) F(R(R(1)(aN |x1), ...,R(m)(aN |x1)))x2 F(R(R(1)(aP |x2), ...,R(m)(aP |x2))) F(R(R(1)(aB|x2), ...,R(m)(aB|x2))) F(R(R(1)(aN |x2), ...,R(m)(aN |x2))). . . .

. . . .

. . . .

xn F(R(R(1)(aP |xn), ...,R(m)(aP |xn))) F(R(R(1)(aB|xn), ...,R(m)(aB|xn))) F(R(R(1)(aN |xn), ...,R(m)(aN |xn)))

TABLE XXIThe Group Score TableS (R(S )).

Action P B Nx1 -0.2393 -0.0583 0.5176x2 0.3922 -0.0224 0.1478x3 0.5009 -0.0137 -0.0536x4 0.4349 -0.0191 0.0816x5 0.4263 -0.0198 0.0961x6 0.3398 -0.0262 0.2137

Third, by Theorem 5.4, we have POA(U) = x1,CT A(U) =x2, x4, x5, x6 and NEA(U) = x3. Therefore, x1 is a positivealliance, x2, x4, x5, x6 is a neutral alliance, and x3 is anegative alliance.

(3) First, for x j ∈ U, by Theorem 5.2, we have

P(R(R(1)(aP|x j), ...,R(m)(aP|x j))) =

P(P(Σmi=1wi ∗

√1 − (1 − µ2

λ(i)PP

)P(R(x j)) ∗ (1 − µ2λ(i)

PN

)1−P(R(x j)),

Σmi=1wi ∗ (νλ(i)

PP)P(R(x j)) ∗ (νλ(i)

PN)1−P(R(x j))));

P(R(R(1)(aB|x j), ...,R(m)(aB|x j))) =

P(P(Σmi=1wi ∗

√1 − (1 − µ2

λ(i)BP

)P(R(x j)) ∗ (1 − µ2λ(i)

BN

)1−P(R(x j)),

Σmi=1wi ∗ (νλ(i)

BP)P(R(x j)) ∗ (νλ(i)

BN)1−P(R(x j))));

P(R(R(1)(aN |x j), ...,R(m)(aN |x j))) =

P(P(Σmi=1wi ∗

√1 − (1 − µ2

λ(i)NP

)P(R(x j)) ∗ (1 − µ2λ(i)

NN

)1−P(R(x j)),

Σmi=1wi ∗ (νλ(i)

NP)P(R(x j)) ∗ (νλ(i)

NN)1−P(R(x j)))).

Second, by Definition 5.3, we have the Group ClosenessTable P(R(S )) shown in TABLE XXII as follows:

TABLE XXIIThe Group Closeness TableP(R(S )).

Action P B Nx1 0.4103 0.4785 0.6907x2 0.6448 0.4918 0.5519x3 0.6887 0.4950 0.4810x4 0.6616 0.4930 0.5287x5 0.6582 0.4927 0.5338x6 0.6246 0.4903 0.5752

Third, by Theorem 5.4, we have POA(U) = x1,CT A(U) =x2, x4, x5, x6 and NEA(U) = x3. Therefore, x1 is a positivealliance, x2, x4, x5, x6 is a neutral alliance, and x3 is anegative alliance.

Page 13: Three-way Group Conflict Analysis Based on …fuzzy numbers. In this paper, we first provide the concepts of positive, neutral and negative alliances with two thresholds and employ

1063-6706 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TFUZZ.2019.2908123, IEEETransactions on Fuzzy Systems

IEEE TRANSACTION OF FUZZY SYSTEMS, VOL. *, NO. *, MARCH 2019 13

(4) First, for x j ∈ U, by Theorem 5.2, we have

F(R(R(1)(aP|x j), ...,R(m)(aP|x j))) =

F(P(Σmi=1wi ∗

√1 − (1 − µ2

λ(i)PP

)P(R(x j)) ∗ (1 − µ2λ(i)

PN

)1−P(R(x j)),

Σmi=1wi ∗ (νλ(i)

PP)P(R(x j)) ∗ (νλ(i)

PN)1−P(R(x j))));

F(R(R(1)(aB|x j), ...,R(m)(aB|x j))) =

F(P(Σmi=1wi ∗

√1 − (1 − µ2

λ(i)BP

)P(R(x j)) ∗ (1 − µ2λ(i)

BN

)1−P(R(x j)),

Σmi=1wi ∗ (νλ(i)

BP)P(R(x j)) ∗ (νλ(i)

BN)1−P(R(x j))));

F(R(R(1)(aN |x j), ...,R(m)(aN |x j))) =

F(P(Σmi=1wi ∗

√1 − (1 − µ2

λ(i)NP

)P(R(x j)) ∗ (1 − µ2λ(i)

NN

)1−P(R(x j)),

Σmi=1wi ∗ (νλ(i)

NP)P(R(x j)) ∗ (νλ(i)

NN)1−P(R(x j)))).

Second, by Definition 5.3, we have the Group PreferredTable F (R(S )) shown in TABLE XXIII as follows:

TABLE XXIIIThe Group Preferred TableF (R(S )).

Action P B Nx1 0.4046 0.4768 0.7389x2 0.6670 0.4911 0.5626x3 0.7193 0.4946 0.4778x4 0.6871 0.4924 0.5343x5 0.6830 0.4922 0.5404x6 0.6430 0.4896 0.5916

Third, by Theorem 5.4, we have POA(U) = x1,CT A(U) =x2, x4, x5, x6 and NEA(U) = x3. Therefore, x1 is a positivealliance, x2, x4, x5, x6 is a neutral alliance, and x3 is anegative alliance.

(5) First, we list the alliances computed usingR(R(S )),S (R(S )),P(R(S )) and F (R(S )) in TableXXIV. Concretely, we have the same alliances withS (R(S )),P(R(S )) and F (R(S )), which are differentfrom the results with R(R(S )); all agents are classifiedinto the positive, neutral, and negative alliances withS (R(S )),P(R(S )) and F (R(S )), but we can not put x3 intoany alliance with R(R(S )); almost all agents are classifiedinto the neutral alliances with R(R(S )),S (R(S )),P(R(S ))and F (R(S )), and less agents are put into the positive andnegative alliances. Second, we have the positive alliance x1and the neutral alliance x2, x4, x5, x6 by R(R(S )); we getthe positive alliance x1, the neutral alliance x2, x4, x5, x6and the negative alliance x3 by S (R(S )),P(R(S )) andF (R(S )). So we find that x1 and x3 belong to the positivealliance and the neutral alliance, respectively, so they holddifferent opinions on most of issues. In other words, they areopponents. We also see that x1 and x3 are single alliances,if they want to get supports from other countries, then theymust change opinions on some issues. Third, we put theagent x3 into the neutral alliance in Example 4.6 with a lossfunction, and we assign the agent x3 to the negative alliancein Example 5.5 with three loss functions. So we find thatthree-way group method is more effective than three-waymethod for conflict analysis of Pythagorean fuzzy information

systems. Therefore, we should study how to compute theexpected losses of actions with more loss functions orother types of Pythagorean fuzzy loss functions and providemore effective approaches for studying Pythagorean fuzzyinformation systems for conflicts in the future.

TABLE XXIVThree alliances based onR(R(S )),S (R(S )),P(R(S )) andF (R(S )).

Method POA(U) CT A(U) NEA(U)R(R(S )) x1 x2, x4, x5, x6 ∅S (R(S )) x1 x2, x4, x5, x6 x3P(R(S )) x1 x2, x4, x5, x6 x3F (R(S )) x1 x2, x4, x5, x6 x3

VI. Conclusions and future work

In the era of Big Data, the study of conflicts is of great-est importance both practically and theoretically for HumanSociety. In this paper, we have presented the concepts ofpositive, neutral, and negative alliances with two thresholds,and employed examples to illustrate how to construct thepositive, neutral and negative alliances in Pythagorean fuzzyinformation systems for conflicts. Moreover, we have studiedthree-way conflict analysis of Pythagorean fuzzy informa-tion systems based on Bayesian minimum risk theory andemployed examples to illustrate how to compute differentalliances with a Pythagorean fuzzy loss function given byan expert. Finally, we have investigated three-way groupconflict analysis of Pythagorean fuzzy information systemsand explored examples to illustrate how to calculate differentalliances with a group of Pythagorean fuzzy loss functionsgiven by more experts.

In the future, we will study dynamic Pythagorean fuzzyinformation systems for conflicts. Furthermore, we will pro-vide effective algorithms for conflict analysis of dynamicPythagorean fuzzy information systems in the future.

Acknowledgements

We would like to thank the reviewers very much for theirprofessional comments and valuable suggestions.

References

[1] Z. Pawlak, “An inquiry into anatomy of conflicts,” Information Sciences,vol. 109, no. 1-4, pp. 65-78, Aug. 1998.

[2] Z. Pawlak, “Some remarks on conflict analysis,” European Journal ofOperational Research, vol. 166, no. 3, pp. 649-654, Nov. 2005.

[3] Z. Pawlak, “On conflicts,” International Journal of Man-Machine Studies,vol. 21, no. 2, pp. 127-134, 1984.

[4] L. Cholvy, L. Perrussel, J.M. Thevenin, “Using inconsistency measuresfor estimating reliability,” International Journal of Approximate Reason-ing, vol. 89 pp. 41-57, Oct. 2017.

[5] R. Deja, “Conflict model with negotiation,” Bulletin of the Polish Acade-my of Sciences, vol. 44, no. 4, pp. 475-498, 1996.

[6] R. Deja, “Conflict analysis, rough set methods and applications,” Studiesin Fuzzyness and Soft Computing, 2000, pp. 491-520.

[7] R. Deja, “Conflict analysis,” International Journal of Intelligent Systems,vol. 17, pp. 235-253, 2002.

Page 14: Three-way Group Conflict Analysis Based on …fuzzy numbers. In this paper, we first provide the concepts of positive, neutral and negative alliances with two thresholds and employ

1063-6706 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TFUZZ.2019.2908123, IEEETransactions on Fuzzy Systems

IEEE TRANSACTION OF FUZZY SYSTEMS, VOL. *, NO. *, MARCH 2019 14

[8] Y.C. Jiang, Y. Tang, Q.M. Chen, Z.M. Cao, “Semantic operations ofmultiple soft sets under conflict,” Computers and Mathematics withApplications, vol. 62, no. 4, pp. 1923-1939, Aug. 2011.

[9] S. Jabbour, Y. Ma, B. Raddaoui, L. Sais, “Quantifying conflicts inpropositional logic through prime implicates,” International Journal ofApproximate Reasoning, vol. 89, pp. 27-40, Oct. 2017.

[10] Y. Liu, Y. Lin, “Intuitionistic fuzzy rough set model based on conflictdistance and applications,” Applied Soft Computing, vol. 31, pp. 266-273,June 2015.

[11] N.T. Nguyen, M. Malowiecki, “Consistency measures for conflict pro-files,” Transactions on Rough Sets I, vol. 3100, pp. 169-186, 2004.

[12] S. Ramanna, A. Skowron, “Requirements interaction and conflicts: Arough set approach,” in: Proc. IEEE Symposium Series on Foundationsof Computational Intelligence, 2007.

[13] S. Ramanna, J. Peters, A. Skowron, “Approaches to conflict dynamicsbased on rough sets,” Fundamenta Informaticae, vol. 75, no. 1-4, pp.453-468, 2007.

[14] L.G. de O. Silva, A.T. de Almeida-Filho, “A multicriteria approach foranalysis of conflicts in evidence theory,” Information Sciences, vols. 346-347, pp. 275-285, June 2016.

[15] A. Skowron, R. Deja, “On some conflict models and conflict resolu-tions,” Romanian Journal of Information Science and Technology, vol. 5,nos. 1-2, pp. 69-82, 2002.

[16] A. Skowron, S. Ramanna, J. Peters, “Conflict analysis and informationsystems: a rough set approach,” Rough Sets and Current Trends inComputing, vol. 4062, pp. 233-240, 2006.

[17] B.Z. Sun, W.M. Ma, “Rough approximation of a preference relation bymulti-decision dominance for a multi-agent conflict analysis problem,”Information Sciences, vol. 315, pp. 39-53, Sep. 2015.

[18] B.Z. Sun, W.M. Ma, H.Y. Zhao, “Rough set-based conflict analysismodel and method over two universes,” Information Sciences, vol. 372,pp. 111-125, Dec. 2016.

[19] J.P. Yang, H.Z. Huang, Q. Miao, R. Sun, “A novel information fusionmethod based on Dempster-Shafer evidence theory for conflict resolu-tion,” Intelligent Data Analysis, vol. 15, pp. 399-411, 2011.

[20] C. Yu, J. Yang, D. Yang, X. Ma, H. Min, “An improved conflictingevidence combination approach based on a new supporting probabilitydistance,” Expert Systems with Applications, vol. 42, no. 12, pp. 5139-5149, July 2015.

[21] W. Zhu, F.Y. Wang, “Covering based granular computing for conflictanalysis,” Rough Sets Current Trends Computing, vol. 3975, pp. 566-571,2006.

[22] Y.Y. Yao, “Three-way decisions with probabilistic rough sets,” Informa-tion Sciences, vol. 180, no. 3, pp. 341-353, Feb. 2010.

[23] Y.F. Chen, X.D. Yue, H. Fujita, S.Y. Fu, “Three-way decision supportfor diagnosis on focal liver lesions,” Knowledge-Based Systems, vol. 127,pp. 85-99, July 2017.

[24] T. Feng, H.T. Fan, J.S. Mi, “Uncertainty and reduction of variable pre-cision multigranulation fuzzy rough sets based on three-way decisions,”International Journal of Approximate Reasoning, vol. 85, pp. 36-58, June2017.

[25] B.Q. Hu, H. Wong, K.C. Yiu, “On two novel types of three-way deci-sions in three-way decision spaces,” International Journal of ApproximateReasoning, vol. 82, pp. 285-306, Mar. 2017.

[26] M.T. Khan, N. Azam, S. Khalid, J.T. Yao, “A three-way approach forlearning rules in automatic knowledge-based topic models,” InternationalJournal of Approximate Reasoning, vol. 82, pp. 210-226, Mar. 2017.

[27] G.M. Lang, D.Q. Miao, M.J. Cai, “Three-way decision approaches toconflict analysis using decision-theoretic rough set theory,” InformationSciences, vol. 406, pp. 185-207, Sep. 2017.

[28] J.H. Li, C.C. Huang, J.J. Qi, Y.H. Qian, W.Q. Liu, “Three-way cognitiveconcept learning via multi-granularity,” Information Sciences, vol. 378,pp. 244-263, Feb. 2017.

[29] X.N. Li, H.J. Yi, Y.H. She, B.Z. Sun, “Generalized three-way decisionmodels based on subset evaluation,” International Journal of ApproximateReasoning, vol. 83, pp. 142-159, April 2017.

[30] H.X. Li, L.B. Zhang, X.Z. Zhou, B. Huang, “Cost-sensitive sequentialthree-way decision modeling using a deep neural network,” InternationalJournal of Approximate Reasoning, vol. 85, pp. 68-78, June 2017.

[31] J. Qian, C.Y. Dang, X.D. Yue, N. Zhang, “Attribute reduction forsequential three-way decisions under dynamic granulation,” InternationalJournal of Approximate Reasoning, vol. 85, pp. 196-216, June 2017.

[32] B.Z. Sun, W.M. Ma, X. Xiao, “Three-way group decision makingbased on multigranulation fuzzy decision-theoretic rough set over twouniverses,” International Journal of Approximate Reasoning, vol. 81, pp.87-102, Feb. 2017.

[33] J.F. Xu, D.Q. Miao, Y.J. Zhang, Z.F. Zhang, “A three-way decisionsmodel with probabilistic rough sets for stream computing,” InternationalJournal of Approximate Reasoning, vol. 88, pp. 1-22, Sep. 2017.

[34] Y.Y. Yao, “Probabilistic rough set approximations,” International Journalof Approximate Reasoning, vol. 49, no. 2, pp. 255-271, Oct. 2008.

[35] Y.Y. Yao, “Three-way decision and granular computing,” InternationalJournal of Approximate Reasoning, vol. 103, pp. 107-123, Sep. 2018.

[36] Y.Y. Yao, S. Wang, X.F. Deng, “Constructing shadowed sets and three-way approximations of fuzzy sets,” Information Sciences, vols. 412-413,pp. 132-153, Oct. 2017.

[37] X. Yang, T.R. Li, H. Fujita, D. Liu, Y.Y. Yao, “A unified model ofsequential three-way decisions and multilevel incremental processing,”Knowledge-Based Systems, vol. 134, pp. 172-188, Oct. 2017.

[38] H.R. Zhang, F. Min, B. Shi, “Regression-based three-way recommenda-tion,” Information Sciences, vol. 378, pp. 444-461, Feb. 2017.

[39] R.R. Yager, A.M. Abbasov, “Pythagorean membership grades, complexnumbers, and decision making,” International Journal of IntelligentSystems, vol. 28, no. 5, pp. 436-452, May 2013.

[40] K.T. Atanassov, Intuitionistic fuzzy sets, Fuzzy Sets and Systems, vol.20, no. 1, pp. 87-96, Aug. 1986.

[41] G. Beliakov, S. James, “Averaging aggregation functions for preferencesexpressed as Pythagorean membership grades and fuzzy orthopairs,”in: Proceedings of 2014 IEEE International Conference on FuzzySystems(FUZZ-IEEE), IEEE, 2014, pp. 298-305.

[42] H. Bustince, E. Barrenechea, M. Pagola, J. Fernandez, Z.S. Xu, B.Bedregal, J. Montero, H. Hagras, F. Herrera, B. DeBaets, “A historicalaccount of types of fuzzy sets and their relationships,” IEEE Transactionson Fuzzy Systems, vol. 24, no. 1, pp. 179-194, Feb. 2016.

[43] G.M. Lang, D.Q. Miao, Z.F. Zhang, N. Yao, “Conflict Analysis forPythagorean Fuzzy Information Systems,” Lecture Notes in ComputerScience, vol. 10314, pp. 359-367, Jun. 2017.

[44] D.C. Liang, Z.S. Xu, “The new extension of TOPSIS method formultiple criteria decision making with hesitant Pythagorean fuzzy sets,”Applied Soft Computing, vol. 60, pp. 167-179, Jun. 2017.

[45] X.D. Peng, Y. Yang, “Some results for Pythagorean Fuzzy Sets,”International Journal of Intelligent Systems, vol. 30, no. 11, pp. 1133-1160, Nov. 2015.

[46] X.D. Peng, G. Selvachandran, “Pythagorean fuzzy set: stateof the art and future directions,” Artificial Intelligence Review,https://doi.org/10.1007/s10462-017-9596-9, Nov. 2017.

[47] X.D. Peng, J.G. Dai, “Approaches to Pythagorean Fuzzy StochasticMulti-criteria Decision Making Based on Prospect Theory and RegretTheory with New Distance Measure and Score Function,” InternationalJournal of Intelligent Systems, vol. 32, pp. 1187-1214, Nov. 2017.

Page 15: Three-way Group Conflict Analysis Based on …fuzzy numbers. In this paper, we first provide the concepts of positive, neutral and negative alliances with two thresholds and employ

1063-6706 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TFUZZ.2019.2908123, IEEETransactions on Fuzzy Systems

IEEE TRANSACTION OF FUZZY SYSTEMS, VOL. *, NO. *, MARCH 2019 15

[48] X.D. Peng, H. Yuan, Y.Yang, “Pythagorean fuzzy information measuresand their applications,” International Journal of Intelligent Systems,International Journal of Intelligent Systems, vol. 32, no. 10, pp. 991-1029, Feb. 2017.

[49] X.D. Peng, “New Operations for Interval-valued Pythagorean FuzzySet,” Scientia Iranica, https://doi.10.24200/SCI.2018.5142.1119, Mar.2018.

[50] M.Z. Reformat, R.R. Yager, “Suggesting recommendations usingPythagorean fuzzy sets illustrated using netflix movie data,” in: Infor-mation Processing and Management of Uncertainty in Knowledge-BasedSystems, Springer, 2014, pp. 546-556.

[51] P.J. Ren, Z.S. Xu, X.J. Gou, “Pythagorean fuzzy TODIM approach tomulti-criteria decision making,” Applied Soft Computing, vol. 42, pp. 246-259, May 2016.

[52] Z.P. Wu, Y.Y. Liu, “Knowledge augmented policy conflict analysis forservices collaboration,” Knowledge-Based Systems, vol. 62, pp. 11-27,May 2014.

[53] R.R. Yager, “Pythagorean membership grades in multicriteria decisionmaking,” IEEE Transactions on Fuzzy Systems, vol. 22, no. 4, pp. 958-965, Aug. 2014.

[54] R.R. Yager, “Pythagorean membership grades in multicriteria decisionmaking,” IEEE Transactions on Fuzzy Systems, vol. 22, no. 4, pp. 958-965, Aug. 2014.

[55] Y. Yang, H. Ding, Z.S. Chen, Y.L. Li, “A note on Extension ofTOPSIS to multiple criteria decision making with Pythagorean fuzzysets,” International Journal of Intelligent Systems, vol. 31, no. 1, pp.68-72, Jan. 2016.

[56] X.L. Zhang, “Multicriteria Pythagorean fuzzy decision analysis: Ahier-archical QUALIFLEX approach with the closeness index-based rankingmethods,” Information Sciences, vol. 330, pp.104-124, Feb. 2016.

[57] X.L. Zhang, Z.S. Xu, “Extension of TOPSIS to multiple criteria decisionmaking with Pythagorean fuzzy sets,” International Journal of IntelligentSystems, vol. 29, no. 12, pp. 1061-1078, Dec. 2014.

[58] C. Zhang, D.Y. Li, R. Ren, “Pythagorean Fuzzy Multigranulation RoughSet over Two Universes and Its Applications in Merger And Acquisition,”International Journal of Intelligent Systems, vol. 31, no. 9, pp. 921-943,Sep. 2016.

Guangming Lang received the Ph.D. degree inMathematics from Hunan University, Changsha,China, in 2013. He is currently a Associate Pro-fessor in the School of Mathematics and Statistics,Changsha University of Science and Technology. Hismain research interests include Granular computing,Rough set theory, Fuzzy set theory, Lattice Theoryand Three-way decision theory.

Duoqian Miao received the Ph.D. degree in patternrecognition and intelligent system from the Instituteof Automation, Chinese Academy of Sciences, Bei-jing, China, in 1997. He is currently a Professorwith the School of Electronics and Information En-gineering and the Key Laboratory of Embedded Sys-tem and Service Computing, Ministry of Education,Tongji University, Shanghai, China. His main re-search interests include Soft computing, Rough sets,Pattern recognition, Data mining, Machine learningand Intelligent systems.

Hamido Fujita received the Ph.D. degree in In-formation Science from Tohoku University, Sendai,Japan, in 1988. He is a Chair Professor in theFaculty of Software and Information Science, IwatePrefectural University. His main research interestsinclude Fuzzy set theory, Cloud computing, Decisionsupport systems, Emergency management, Featureselection, Fuzzy logic, Granular computing, Healthcare, Image fusion, Social sciences and Medicalcomputing.