This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
1. Introduction
Uncertainty is a common feature of many every day decisions. A situation of uncertainty arises when there can be more than one possible consequence of selecting any course of action/decision. Mostly, human decisions are uncertain and unclear. It is an inevitable part of our lives. Meanwhile, in mathematics, successfully detecting, processing, and resolving uncertainty by using the theory of fuzzy sets (FSs) in 1965 were proposed by Zadeh [1], which deal with the uncertainty and ambiguousness of fuzziness. An FS assigns a membership function to each element whose values ranging between
After FS, a new innovation in fuzzy set which is an extended form of fuzzy set was introduced by Ramot et al. [20] known as the concept of complex fuzzy set (CoFS) which represents the membership grades in the form of a complex number, i.e.,
Cubic fuzzy set tells present and future of any object firstly introduced by Jun et al. [30]. It is the generalization of fuzzy set and interval-valued fuzzy set. Kim et al. [31] revealed the idea of cubic fuzzy relations (CFRs) which is the extended form of FRs and IVFRs. It describes the present and future effect of an object. Kaur and Garg et al. [32] described the notion of generalized cubic fuzzy set with t-norm. In 2019, Garg and Kaur [33] give the notion of cubic intuitionistic fuzzy set (CIFS) which is a broader term than the cubic fuzzy set because it explains the effectiveness and ineffectiveness of an object with present and future forecasting. Jun et al. [34] introduced cubic interval-valued intuitionistic fuzzy set and its application in BCK/BCI. Chinnadurai et al. [35] introduce the notion of complex cubic fuzzy sets (CoCFS). CoCFS is a combination of the complex interval-valued fuzzy set (CoIVFS) and complex fuzzy set (CoFS). In CoCFS, there is an advantage to provide the membership grade in complex numbers to solve problems with periodicity. Zhou et al. [36] used CoCF aggregation operators in group decision-making. Chinnadurai et al. [37] presented the notion of complex cubic intuitionistic fuzzy set (CoCIFS) which is a combination of complex cubic membership values and complex cubic nonmembership values and define some related operations on these sets. Rani and Garg [38] proposed an application of complex intuitionistic fuzzy preference relation and their application in individual and group decision-making. As a new extension of a cubic fuzzy set, Gumaei and Hussain [39] proposed the concept of cubic picture fuzzy sets, which is an extension of cubic sets, picture fuzzy sets, and interval-valued picture fuzzy sets.
This article develops a new concept of complex cubic picture fuzzy set (CoCPFS), complex cubic picture fuzzy relation (CoCPFR), and Cartesian product of two COCPFSs. Moreover, the types of CoCPFRs have been defined, including converse, reflexive, symmetric, transitive, and equivalence relation. Every definition is followed by a suitable example for better understanding, and some interesting results of CoCPFR have also been proved. The innovative concept proposed in this paper is superior to all existing structures of FSs, CoFSs, IVFSs, CoIVFSs, PFSs, CoPFSs, IVPFSs, CoIVFSs, CFSs, CoCFSs, CIFSs, CoIFSs, and CPFSs. Since, CoCPFRs are the analyzing the relations between CoCPFSs, so they are composed of degree of membership, indeterminacy, and nonmembership. This structure explains the present and future impact of one object on the other. Due to complex-valued mappings, it is capable to solve multiple variable problems with phase term easily. It gives more accurate results to reduce the uncertainty and ambiguity. This article also aimed to study the effect of e-commerce threats with e-commerce securities in digital business system. For this reason, a better framework is used because it can cover all aspects of the problem, i.e., positive effects, no effects, and negative effects with time phase. By using CoCPFRs, investigate the relations among the set of e-commerce securities and threats. Additionally, this application problem is solved using preexisting structures which are fail to used and reduce uncertainty. These structures can extend to more superior and better structures to produce good modeling techniques which can be used in economics, statistics, medical fields and information technology and computer sciences, etc.
The arrangement of the remaining paper is as follows: Section 2 consists of all preexisting and basic concepts of fuzzy algebra that are used as basis of current research. Section 3 contains the newly defined concepts of CoCPFSs, Cartesian product of two CoCPFSs, CoCPFRs, and their types. Some results of CoCPFRs have also been proved. Section 4 contains an application of investigating the e-commerce securities and threats. Section 5 studies the comparison between CoCPFSs and preexisting frameworks of fuzzy set. Section 6 concludes the results.
2. Preliminaries
Here, we explained some fundamental concepts of fuzzy algebra. We define the FS, CFS, IVFS, CoIVFS, IFS, CoIFS, IVIFS, PFS, CoPFS, IVPFS, CoIVPFS, CFS, CoCFS, CIFS, CoIFS and CPFS.
Definition 1 (see [1]).
A fuzzy set (FS)
Definition 2 (see [20]).
A complex fuzzy set (CoFS)
Definition 3. (see [23]).
A complex interval-valued fuzzy set (CoIVFS)
Definition 4 (see [13]).
An intuitionistic fuzzy set (IFS)
Given that
Definition 5 (see [25]).
A set on a universe
Definition 6 (see [18]).
A picture fuzzy set (PFS)
Definition 7 (see [28]).
A complex picture fuzzy set (CoPFS)
Definition 8 (see [30]).
A cubic fuzzy set (CFS)
Definition 9 (see [35]).
On a universe
Definition 10 (see [33]).
A cubic intuitionistic fuzzy set (CIFS)
Definition 11 (see [37]).
A complex cubic intuitionistic fuzzy set (CoCIFS)
Hence, a CoCIFS can be expressed as
Definition 12 (see [39]).
A cubic picture fuzzy set (CPFS)
Hence, a CPFS can be expressed as
3. Main Results
By using previously defined basic concepts, the CoCPFSs, Cartesian product of two CoCPFSs, CoCPFRs, and their types are defined.
Definition 13.
A complex cubic picture fuzzy set (CoCPFS)
Definition 14.
Take two CoCPFSs
Then, their Cartesian product is
Example 1.
Let
The Cartesian product
Definition 15.
Any subcollection of the Cartesian products of CoCPFSs is known as CoCPF relation (CoCPFR) and denoted by
Example 2.
From Equation (20), the subset
Definition 16.
A CoCPF relation
This implies
Definition 17.
A CoCPF relation
If
Then, there exists
Definition 18.
A CoCPF relation
Definition 19.
A CoCPF relation
(i) CoCP reflexive FR
(ii) CoCP symmetric FR
(iii) CoCP transitive FR
Definition 20.
A CoCPF relation is known as complex cubic picture antisymmetric fuzzy relation (CoCP anti-symmetric FR), if
Then,
Definition 21.
A CoCPF relation
(i) CoCP reflexive FR
(ii) CoCP antisymmetric FR
(iii) CoCP transitive FR
Definition 22.
A CCPF relation
Then, there exist
Definition 23.
A CoCPF relation
(i) CoCP reflexive FR
(ii) CoCP transitive FR
Definition 24.
A CoCPF relation
(i) CoCP irreflexive FR
(ii) CoCP transitive FR
Definition 25.
A CoCPF relation
(i) CoCP reflexive FR
(ii) CoCP anti symmetric FR
(iii) CoCP transitive FR
(iv) CoCP complete FR
Example 3.
Considering the Cartesian product in Equation (20), the following relations are given as
(a) the CoCP equivalence FR
(b) the CoCP partial order FR
(c) the CoCP preorder FR
Definition 26.
The converse of a CoCPF relation
Definition 27.
Let
For any
Then,
Definition 28.
For CoCPF equivalence fuzzy relation
Theorem 29.
A CoCPFR
Proof.
Necessity condition:
Suppose that
However,
Sufficient condition:
Let
We have
This implies that
This is required result.
Theorem 30.
A CoCPFR
Proof.
Necessity condition
Assume that
Then by definition of transitivity
This implies
Conversely, assume that
And
This implies
So,
Hence,
Theorem 31.
Suppose
Proof.
Assume that
Then by symmetry of CoCP equivalence FR,
Now by using transitive property,
Hence, by definition of CoCP composite FR,
Thus,
Conversely, suppose that
This implies
From (55) to (57),
4. Application
In this section, an application of newly proposed concepts CoCPFSs, CoCPFRs and theirs types is discussed.
4.1. Protection of E-Commerce from Digital Extortions
E-commerce is buying and selling of goods over internet. In such transactions, these products and goods are sold through an electronic medium without using any paper document. Almost everything can be purchased through e-commerce. It focuses on the use of information and communication technology to enable the external activities and relationships of the business with individuals, groups, and other businesses. It facilitates the human lives to buy things at home. The recent outbreak of COVID-19 has dramatically changed the current business climate. For stores that have closed their doors, for the time being, having a reliable e-commerce platform can help to create stable revenue and save business. This pandemic has affected consumer behavior. People are now choosing to shop online to avoid contacts with other. This rapid grow of e-commerce is facing many types of threats and risks. These threats can put negative impact on e-commerce, which results in losses of money. Some threats and methods used for security purposes are discussed below. Figure 1 presents the algorithm of application.
[figure(s) omitted; refer to PDF]
Here, each threat has been assigned membership, indeterminacy, and nonmembership grades. These all grades are set by experts according to their work. The membership grade of threats indicates its weakness; indeterminacy indicates neutral effect, indeterminacy indicates the neutral effect of threat, and nonmembership grades show the strength of threats. Amplitude term indicates the term which indicates the level of strength or weakness, and phase term show the time duration of level of strength or weakness.
4.1.1. Securities
The method use to secure e-commerce is discussed below and assigned membership, indeterminacy, and nonmembership to each security. Table 1 contains all the abbreviations for security measures.
Table 1
Summary of securities.
Securities | Abbreviations |
Strong cybersecurity | |
Securing payment gateway | |
Mobile devices | |
Solid rock firewall | |
Antimalware software |
(1) Strong Cybersecurity. A strong cybersecurity is the application of technologies, processes, and controls to protest system, devices, and data from cyberattacks. It protects against the unauthorized exploitation of system. A robust cybersecurity strategy is the best defense against attack but many organizations do not know where to begin.
(2) Securing Payment Gateway. It is a payment gateway as a merchant service that processes credit cards payments for e-commerce sites and traditional brick and motor stores. Popular payment gateways include PayPal, Stripe, and Square.
(3) Mobile Devices. Mobility is an essential part of business these days. However, while it is necessary, the use of personal phones and mobile devices for work can open your business to additional security risks. If you plan to allow your employees to use their personal devices for business purposes, you need to be sure you have security policies in place, including requirements that devices be password-protected to prevent outside access to confidential data in the event that devices are lost or stolen.
(4) Solid Rock Firewalls. Use effective e-commerce software and plugins to bar untrusted networks and regulate the inflow and outflow of website traffic. They should provide selective permeability, only permitting trusted traffic to go through. You can trust the Astra firewall to stop spam, malware, and many other attacks on your website.
(5) Antimalware Software. The electronic devices, computer systems, and web system need a program or software that detects and block malicious software, otherwise known as malware. Such protective software is called antimalware software. An effective antimalware should render all the hidden malware on your website.
Now the set of securities
4.1.2. Threats
Some common threats faced in e-commerce are explained below and assigned the level of membership, level of abstinence, and level of nonmembership to them. Table 2 contains all the abbreviations for security threats.
Table 2
Summary of threats.
Threats | Abbreviations |
Phishing | |
Spamming | |
Bots | |
Man in the middle | |
e-Skimming |
(1) Phishing. It is cyberattack that uses disguised email as a weapon. The goal is to steal sensitive data like credit cards and login information.
(2) Spamming. Some hackers can leave infected links in their comments and messages on blog post and contact forms. Once you click on such links, they will direct you to their spam websites, where you may end up being victim.
(3) Bots. Some attackers develop special bots that can scrape your websites to get information about inventory and prices. Such hackers can then use the data to lower and modify the prices in their websites in an attempt to lower your sales and revenue.
(4) Man, in the Middle. A hacker may listen in on the communication taking place between your e-commerce store and a user. If the user is connected to a vulnerable Wi-Fi or network, then attackers can take advantage of that.
(5) e-Skimming. It involves infecting a website’s checkout pages with malicious software. The intention is to steal the client’s personal data and payment details.
Then the set of threats
Now the determining the effectiveness of each security against each threat, calculate the Cartesian product
Table 3
Cartesian product
Ordered pair | Complex picture fuzzy set | Complex interval-valued picture fuzzy set |
Each member of
5. Comparative Analysis
In this section, compare the proposed concept of CoCPFRs with preexisting concepts, i.e., cubic fuzzy relations (CFRs), complex CFRs (CoCFRs), cubic intuitionistic fuzzy relations (CIFRs), complex cubic intuitionistic fuzzy relations (CoCIRs), and cubic picture fuzzy relations (CPFRs).
5.1. CoCPFRs with CoFRs, CoIFRs, and CoPFRs
The CoFRs only describe the membership grade with respect to amplitude and phase terms of an entity. Although it possesses the properties to model the uncertain problems with periodicity, but it fails to cover the future aspects of a problem. Moreover, the lack of nonmembership and indeterminacy also makes it limited in practicality, whereas CoIFRs and CoPFRs are more generalized structure. They not only possess the property of amplitude and phase terms but also define an object with membership, nonmembership, and indeterminacy. But they also fall short when dealing with the future aspects. Let us analyze this mathematically by solving the application problem using complex picture fuzzy information.
Consider the following CoPFSs for the sets of securities and threats:
Their Cartesian product is in Table 4:
Table 4
Cartesian product
Ordered pair | Membership | Indeterminacy | Nonmembership |
Each ordered pair of
5.2. CoCPFRs with CFRs, CIFRs, and CPFRs
CFR is a collection of FS and IVFS. It explains only the amplitude term of membership and interval-valued membership grades of any object. CIFRs explain the amplitude term of membership and nonmembership with single variable. CPFR discussed membership, indeterminacy, and nonmembership with single variable. They are limited to solve only one-dimensional problems. These structures are not capable to solve the periodicity of the problem. On the other hand, CoCPFSs discuss all the three stages, i.e., membership, indeterminacy, and nonmembership with multivariable.
Let consider the previous problem of e-commerce with CPFSs:
Then, their Cartesian product is in Table 5:
Table 5
Cartesian product
Ordered pair | Picture fuzzy grades | Interval-valued picture fuzzy grades |
Each ordered pair of
5.3. CoCPFRs with CoCFRs and CoCIFRs
CoCFRs discuss complex membership, and CoCIFRs only explain the complex membership and complex nonmembership with multivariable. These structures are capable to solve multidimensional problems and also discuss the periodicity of the problem. But CoCPFRs also describes the neutral effect of one object on the other. It is the broader than CoCFRs and CoCIFRs.
Here, an example is taken of previously presented application problem and solve it with respect to CoCIFSs and carry out a comprehensive analysis.
Their Cartesian product is in Table 6:
Table 6
Cartesian product
Ordered pair | Complex picture fuzzy set | Complex interval-valued picture fuzzy set |
Each ordered pair of
Table 7
A complete comparison among all the structure based on different fuzzy information.
Structure | Membership | Indeterminacy | Nonmembership | Multidimensional | Dual memberships |
FR | Yes | No | No | No | No |
CFR | Yes | No | No | No | Yes |
CoCFR | Yes | No | No | Yes | Yes |
IFR | Yes | No | Yes | No | No |
CIFR | Yes | No | Yes | No | Yes |
CoCIFR | Yes | No | Yes | Yes | Yes |
PFR | Yes | Yes | Yes | No | No |
CPFR | Yes | Yes | Yes | No | Yes |
CoCPFR | Yes | Yes | Yes | Yes | Yes |
To summarize the above comparisons, the advantages of the proposed concepts are stated below based on the experimental results:
(a) CoCPFRs deal with three grades, which are membership, nonmembership, and indeterminacy
(b) Their structure is composed of complex-valued functions, so they model periodicity with the help of phase terms, that is, the imaginary part
(c) They have dual degrees comprising of single-valued and interval-valued membership, indeterminacy, and nonmembership grades. This allows them to present two different time periods or stages in a decision-making process
6. Conclusion
This research introduced the innovative concepts of complex cubic picture fuzzy sets (CoCPFSs), complex cubic picture fuzzy relations (CoCPFRs), and Cartesian product of two complex cubic picture fuzzy sets. Furthermore, various types of CoCPFRs are also defined, including CoCP-reflexive-FR, CoCP-symmetric-FR, CoCP-transitive-FR, CoCP-equivalence-FR, CoCP-partial order-FR, CoCP-strict order-FR, CoCP-linear order-FR, CoCP-composite-FR, and CoCPF equivalence class, and were also studied with the help of suitable examples, properties, and some results which are also proven. The idea of these newly defined concepts and novel modeling techniques is used to address the security concerns in e-commerce in digital business system. Online business systems have recently been targeted by the hackers and cybercriminals. The current study analyzes the relationships among the effectiveness of e-commerce security and the most serious and common risks to the digital business. Then, by using CoCPFRs investigate the impact of security on the threats. This innovative structure explains the present impact as well as the future forecasting of the impact in the form of interval to reduce ambiguity of securities on threats. The strength of this structure is it discussed all level of an object which is level of membership, level of indeterminacy, and level of nonmembership. As it is complex, it deals with periodicity of an object with multivariables. These concepts can be extended to other generalization of fuzzy sets which will give rise to many structures with vast range of applications.
Acknowledgments
This work was supported in part by the “Regional Innovation Strategy (RIS)” through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (MOE) (2021RIS-001 (1345341783)).
[1] L. A. Zadeh, "Fuzzy sets," Information and control, vol. 8 no. 3, pp. 338-353, DOI: 10.1016/S0019-9958(65)90241-X, 1965.
[2] G. Q. Chen, S. C. Lee, S. H. Eden, "Application of fuzzy set theory to economics," Advances in Fuzzy Sets, Possibility Theory, and Applications, pp. 277-305, DOI: 10.1007/978-1-4613-3754-6_18, 1983.
[3] K. P. Adlassnig, "Fuzzy set theory in medical diagnosis," IEEE Transactions on Systems, Man, and Cybernetics, vol. 16 no. 2, pp. 260-265, DOI: 10.1109/TSMC.1986.4308946, 1986.
[4] J. Lu, D. Ruan, Multi-Objective Group Decision Making: Methods, Software and Applications with Fuzzy Set Techniques, vol. 6,DOI: 10.1142/p505, 2007.
[5] G. J. Klir, M. J. Wierman, "Uncertainty-based information: elements of generalized information theory," Physica, vol. 15, 2013.
[6] J. M. Mendel, "Fuzzy logic systems for engineering: a tutorial," Proceedings of the IEEE, vol. 83 no. 3, pp. 345-377, DOI: 10.1109/5.364485, 1995.
[7] D. Yu, Q. Hu, C. Wu, "Uncertainty measures for fuzzy relations and their applications," Applied Soft Computing, vol. 7 no. 3, pp. 1135-1143, DOI: 10.1016/j.asoc.2006.10.004, 2007.
[8] L. A. Zadeh, "The concept of a linguistic variable and its application to approximate reasoning--I," Information Sci, vol. 8 no. 3, pp. 199-249, DOI: 10.1016/0020-0255(75)90036-5, 1975.
[9] H. Bustince, "Indicator of inclusion grade for interval-valued fuzzy sets. Application to approximate reasoning based on interval-valued fuzzy sets," International Journal of Approximate Reasoning, vol. 23 no. 3, pp. 137-209, DOI: 10.1016/S0888-613X(99)00045-6, 2000.
[10] H. Bustince, P. Burillo, "Mathematical analysis of interval-valued fuzzy relations: application to approximate reasoning," Fuzzy Sets and Systems, vol. 113 no. 2, pp. 205-219, DOI: 10.1016/S0165-0114(98)00020-7, 2000.
[11] M. Gehrke, C. Walker, E. Walker, "Some comments on interval valued fuzzy sets!," Structure, vol. 1, 1996.
[12] M. K. Roy, R. Biswas, "I-v fuzzy relations and Sanchez’s approach for medical diagnosis," Fuzzy Sets and Systems, vol. 47 no. 1, pp. 35-38, DOI: 10.1016/0165-0114(92)90057-B, 1992.
[13] K. Atanassov, "Intuitionistic fuzzy sets," International Journal Bioautomation, vol. 20, 2016.
[14] L. Dengfeng, C. Chuntian, "New similarity measures of intuitionistic fuzzy sets and application to pattern recognitions," Pattern Recognition Letters, vol. 23 no. 1-3, pp. 221-225, DOI: 10.1016/S0167-8655(01)00110-6, 2002.
[15] E. Szmidt, J. Kacprzyk, "Intuitionistic fuzzy sets in some medical applications," pp. 148-151, DOI: 10.1007/3-540-45493-4_19, .
[16] P. Burillo, H. Bustince, "Intuitionistic fuzzy relations (part I)," Mathware and soft computing, vol. 2 no. 1, 1995.
[17] Y. J. Lei, B. S. Wang, Q. G. Miao, "On the intuitionistic fuzzy relations with compositional operations," Systems Engineering-theory & Practice, vol. 2, 2005.
[18] B. C. Cuong, V. Kreinovich, "Picture fuzzy sets-a new concept for computational intelligence problems," .
[19] A. H. Ganie, S. Singh, P. K. Bhatia, "Some new correlation coefficients of picture fuzzy sets with applications," Neural Computing and Applications, vol. 32 no. 16, pp. 12609-12625, DOI: 10.1007/s00521-020-04715-y, 2020.
[20] D. Ramot, R. Milo, M. Friedman, A. Kandel, "Complex fuzzy sets," IEEE Transactions on Fuzzy Systems, vol. 10 no. 2, pp. 171-186, DOI: 10.1109/91.995119, 2002.
[21] C. Li, T. W. Chiang, "Complex neurofuzzy ARIMA forecasting—a new approach using complex fuzzy sets," IEEE Transactions on Fuzzy Systems, vol. 21 no. 3, pp. 567-584, 2013.
[22] G. Zhang, T. S. Dillon, K. Y. Cai, J. Ma, J. Lu, "Operation properties and δ -equalities of complex fuzzy sets," International Journal of Approximate Reasoning, vol. 50 no. 8, pp. 1227-1249, DOI: 10.1016/j.ijar.2009.05.010, 2009.
[23] S. Greenfield, F. Chiclana, S. Dick, "Interval-valued complex fuzzy logic," pp. 2014-2019, .
[24] A. Nasir, N. Jan, A. Gumaei, S. U. Khan, "Medical diagnosis and life span of sufferer using interval valued complex fuzzy relations," IEEE Access, vol. 9, pp. 93764-93780, DOI: 10.1109/ACCESS.2021.3078185, 2021.
[25] D. Rani, H. Garg, "Distance measures between the complex intuitionistic fuzzy sets and their applications to the decision-making process," International Journal for Uncertainty Quantification, vol. 7 no. 5, pp. 423-439, DOI: 10.1615/Int.J.UncertaintyQuantification.2017020356, 2017.
[26] N. Jan, A. Nasir, M. S. Alhilal, S. U. Khan, D. Pamucar, A. Alothaim, "Investigation of cyber-security and cyber-crimes in oil and gas sectors using the innovative structures of complex intuitionistic fuzzy relations," Entropy, vol. 23 no. 9,DOI: 10.3390/e23091112, 2021.
[27] R. T. Ngan, M. Ali, D. E. Tamir, N. D. Rishe, A. Kandel, "Representing complex intuitionistic fuzzy set by quaternion numbers and applications to decision making," Applied Soft Computing, vol. 87,DOI: 10.1016/j.asoc.2019.105961, 2020.
[28] M. Akram, A. Bashir, H. Garg, "Decision-making model under complex picture fuzzy Hamacher aggregation operators," Computational and Applied Mathematics, vol. 39 no. 3,DOI: 10.1007/s40314-020-01251-2, 2020.
[29] A. Nasir, N. Jan, S. U. Khan, A. Gumaei, A. Alothaim, "Analysis of communication and network securities using the concepts of complex picture fuzzy relations," Computational Intelligence and Neuroscience, vol. 2021,DOI: 10.1155/2021/9427492, 2021.
[30] Y. B. Jun, C. S. Kim, K. O. Yang, "Cubic sets," Ann. Fuzzy Math. Inform, vol. 4 no. 1, pp. 83-98, 2012.
[31] J. Kim, P. K. Lim, J. G. Lee, K. Hur, "Cubic relations," Ann. Fuzzy Math. Inform, vol. 19 no. 1, pp. 21-43, DOI: 10.30948/afmi.2020.19.1.21, 2020.
[32] G. Kaur, H. Garg, "Generalized cubic intuitionistic fuzzy aggregation operators using t-norm operations and their applications to group decision-making process," Arabian Journal for Science and Engineering, vol. 44 no. 3, pp. 2775-2794, DOI: 10.1007/s13369-018-3532-4, 2019.
[33] H. Garg, G. Kaur, "Cubic intuitionistic fuzzy sets and its fundamental properties," Journal of Multiple-Valued Logic & Soft Computing, vol. 33 no. 6, 2019.
[34] Y. B. Jun, S. Z. Song, S. J. Kim, "Cubic interval-valued intuitionistic fuzzy sets and their application in BCK/BCI-algebras," Axioms, vol. 7 no. 1,DOI: 10.3390/axioms7010007, 2018.
[35] V. Chinnadurai, S. Thayalana, A. Bobin, "Complex cubic set and their properties," Advances in Mathematics, vol. 9, pp. 1561-1567, 2020.
[36] X. Zhou, Y. Deng, Z. Huang, F. Yan, W. Li, "Complex cubic fuzzy aggregation operators with applications in group decision-making," IEEE Access, vol. 8, pp. 223869-223888, DOI: 10.1109/ACCESS.2020.3044456, 2020.
[37] V. Chinnadurai, S. Thayalana, A. Bobin, "Complex cubic intuitionistic fuzzy set and its decision making," Advances in Mathematics, vol. 9, pp. 7933-7946, 2020.
[38] D. Rani, H. Garg, "Complex intuitionistic fuzzy preference relations and their applications in individual and group decision-making problems," International Journal of Intelligent Systems, vol. 36 no. 4, pp. 1800-1830, DOI: 10.1002/int.22361, 2021.
[39] A. Gumaei, A. Hussain, "New operators of cubic picture fuzzy information with applications," Journal of Mathematics, vol. 2021,DOI: 10.1155/2021/9938181, 2021.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
Copyright © 2022 Jeonghwan Gwak et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0/
Abstract
Digital technology is so broad today as to encompass almost everything. It eases the difficulties of day-to day life with internet. E-commerce plays an important role in digital age of technology. Instead of many benefits of online system, it faces many types of threats. Sometime, choosing the best e-commerce security has a lot of uncertainties and ambiguities to reduce the effect of threats. To reduce these uncertainties, this article developed a new concept of complex cubic picture fuzzy set (CoCPFS) of fuzzy algebra that explains the positive effect, neutral effect, and negative effect of any object and additionally discussed the Cartesian product between two CoCPFSs, CoCPF relations, and their types. The relationship among the e-commerce securities and threats is investigated for the first time in the history of fuzzy algebra. These relations show the ways of disabling the effects of a threat by an effective security technique. Furthermore, the advantages and benefits of CoCPFS are explained through comparison tests with preexisting frameworks of fuzzy sets.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
Details

1 Department of Software, Korea National University of Transportation, Chungju 27469, Republic of Korea; Department of Biomedical Engineering, Korea National University of Transportation, Chungju 27469, Republic of Korea; Department of AI Robotics Engineering, Korea National University of Transportation, Chungju 27469, Republic of Korea; Department of IT & Energy Convergence (BK21 FOUR), Korea National University of Transportation, Chungju 27469, Republic of Korea
2 Department of Mathematics, Institute of Numerical Sciences, Gomal University, Dera Ismail Khan, 29050 KPK, Pakistan