{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T16:15:00Z","timestamp":1776183300286,"version":"3.50.1"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"17","license":[{"start":{"date-parts":[[2023,5,12]],"date-time":"2023-05-12T00:00:00Z","timestamp":1683849600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,5,12]],"date-time":"2023-05-12T00:00:00Z","timestamp":1683849600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100004829","name":"Department of Science and Technology of Sichuan Province","doi-asserted-by":"publisher","award":["2021YFG0031"],"award-info":[{"award-number":["2021YFG0031"]}],"id":[{"id":"10.13039\/501100004829","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004829","name":"Department of Science and Technology of Sichuan Province","doi-asserted-by":"publisher","award":["22YSZH0021"],"award-info":[{"award-number":["22YSZH0021"]}],"id":[{"id":"10.13039\/501100004829","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2023,9]]},"DOI":"10.1007\/s00500-023-08232-7","type":"journal-article","created":{"date-parts":[[2023,5,12]],"date-time":"2023-05-12T11:02:06Z","timestamp":1683889326000},"page":"12267-12288","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["Fuzzy analytic hierarchy process with ordered pair of normalized real numbers"],"prefix":"10.1007","volume":"27","author":[{"given":"Haoyang","family":"Cui","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2442-0045","authenticated-orcid":false,"given":"Hui","family":"Zhang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Lei","family":"Zhou","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Chunming","family":"Yang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Bo","family":"Li","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xujian","family":"Zhao","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2023,5,12]]},"reference":[{"issue":"1","key":"8232_CR1","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/0165-0114(89)90215-7","volume":"33","author":"KT Atanassov","year":"1989","unstructured":"Atanassov KT (1989) More on intuitionistic fuzzy sets. Fuzzy Sets Syst 33(1):37\u201345. https:\/\/doi.org\/10.1016\/0165-0114(89)90215-7","journal-title":"Fuzzy Sets Syst"},{"issue":"4","key":"8232_CR2","doi-asserted-by":"publisher","first-page":"B\u2013141","DOI":"10.1287\/mnsc.17.4.B141","volume":"17","author":"RE Bellman","year":"1970","unstructured":"Bellman RE, Zadeh LA (1970) Decision-making in a fuzzy environment. Manag Sci 17(4):B-141-B-164. https:\/\/doi.org\/10.1287\/mnsc.17.4.B141","journal-title":"Manag Sci"},{"issue":"3","key":"8232_CR3","doi-asserted-by":"publisher","first-page":"2033","DOI":"10.3233\/jifs-161640","volume":"32","author":"F Blanco-Mesa","year":"2017","unstructured":"Blanco-Mesa F, Merigo JM, Gil-Lafuente AM (2017) Fuzzy decision making: a bibliometric-based review. J Intell Fuzzy Syst 32(3):2033\u20132050. https:\/\/doi.org\/10.3233\/jifs-161640","journal-title":"J Intell Fuzzy Syst"},{"issue":"3","key":"8232_CR4","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1016\/0165-0114(85)90090-9","volume":"17","author":"JJ Buckley","year":"1985","unstructured":"Buckley JJ (1985) Fuzzy hierarchical analysis. Fuzzy Sets Syst 17(3):233\u2013247. https:\/\/doi.org\/10.1016\/0165-0114(85)90090-9","journal-title":"Fuzzy Sets Syst"},{"key":"8232_CR5","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1255\/1\/012012","volume":"1255","author":"IS Damanik","year":"2019","unstructured":"Damanik IS, Windarto AP, Wanto A et al (2019) Decision tree optimization in c4.5 algorithm using genetic algorithm. J Phys Conf Ser 1255:012012. https:\/\/doi.org\/10.1088\/1742-6596\/1255\/1\/012012","journal-title":"J Phys Conf Ser"},{"issue":"4","key":"8232_CR6","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1007\/s13347-017-0293-z","volume":"31","author":"PB de Laat","year":"2018","unstructured":"de Laat PB (2018) Algorithmic decision-making based on machine learning from big data: Can transparency restore accountability? Philos Technol 31(4):525\u2013541. https:\/\/doi.org\/10.1007\/s13347-017-0293-z","journal-title":"Philos Technol"},{"key":"8232_CR7","unstructured":"Dua D, Graff C (2017) UCI machine learning repository. http:\/\/archive.ics.uci.edu\/ml"},{"key":"8232_CR8","doi-asserted-by":"publisher","unstructured":"Guan C, Zeng X (2011) An improved id3 based on weighted modified information gain. In: 2011 seventh international conference on computational intelligence and security. IEEE, pp 1283\u20131285. https:\/\/doi.org\/10.1109\/CIS.2011.284","DOI":"10.1109\/CIS.2011.284"},{"issue":"1","key":"8232_CR9","doi-asserted-by":"publisher","first-page":"337","DOI":"10.3233\/jifs-181401","volume":"36","author":"FK Gundogdu","year":"2019","unstructured":"Gundogdu FK, Kahraman C (2019) Spherical fuzzy sets and spherical fuzzy topsis method. J Intell Fuzzy Syst 36(1):337\u2013352. https:\/\/doi.org\/10.3233\/jifs-181401","journal-title":"J Intell Fuzzy Syst"},{"issue":"2","key":"8232_CR10","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1016\/j.ejor.2017.09.007","volume":"267","author":"W Ho","year":"2018","unstructured":"Ho W, Ma X (2018) The state-of-the-art integrations and applications of the analytic hierarchy process. Eur J Oper Res 267(2):399\u2013414. https:\/\/doi.org\/10.1016\/j.ejor.2017.09.007","journal-title":"Eur J Oper Res"},{"key":"8232_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2020.104326","volume":"145","author":"H Jiang","year":"2021","unstructured":"Jiang H, Mao H, Lu H et al (2021) Machine learning-based models to support decision-making in emergency department triage for patients with suspected cardiovascular disease. Int J Med Inform 145:104326. https:\/\/doi.org\/10.1016\/j.ijmedinf.2020.104326","journal-title":"Int J Med Inform"},{"key":"8232_CR12","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1080\/18756891.2016.1180817","volume":"9","author":"C Kahraman","year":"2016","unstructured":"Kahraman C, Oztaysi B, Onar SC (2016) A comprehensive literature review of 50 years of fuzzy set theory. Int J Comput Intell Syst 9:3\u201324. https:\/\/doi.org\/10.1080\/18756891.2016.1180817","journal-title":"Int J Comput Intell Syst"},{"issue":"6","key":"8232_CR13","doi-asserted-by":"publisher","first-page":"4607","DOI":"10.1007\/s00500-019-04222-w","volume":"24","author":"F Kutlu Gundogdu","year":"2020","unstructured":"Kutlu Gundogdu F, Kahraman C (2020) A novel spherical fuzzy analytic hierarchy process and its renewable energy application. Soft Comput 24(6):4607\u20134621. https:\/\/doi.org\/10.1007\/s00500-019-04222-w","journal-title":"Soft Comput"},{"issue":"1","key":"8232_CR14","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1016\/j.jcss.2004.06.002","volume":"70","author":"DF Li","year":"2005","unstructured":"Li DF (2005) Multiattribute decision making models and methods using intuitionistic fuzzy sets. J Comput Syst Sci 70(1):73\u201385. https:\/\/doi.org\/10.1016\/j.jcss.2004.06.002","journal-title":"J Comput Syst Sci"},{"key":"8232_CR15","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1016\/j.asoc.2014.03.014","volume":"21","author":"FR Lima Junior","year":"2014","unstructured":"Lima Junior FR, Osiro L, Ribeiro Carpinetti LC (2014) A comparison between fuzzy ahp and fuzzy topsis methods to supplier selection. Appl Soft Comput 21:194\u2013209. https:\/\/doi.org\/10.1016\/j.asoc.2014.03.014","journal-title":"Appl Soft Comput"},{"key":"8232_CR16","doi-asserted-by":"publisher","unstructured":"Mohd WRW, Abdullah L (2017) Pythagorean fuzzy analytic hierarchy process to multi-criteria decision making. In: AIP conference proceedings, vol 1905. AIP Publishing LLC, p 040020, https:\/\/doi.org\/10.1063\/1.5012208","DOI":"10.1063\/1.5012208"},{"key":"8232_CR17","doi-asserted-by":"publisher","unstructured":"Oztaysi B, Onar SC, Bolturk E, et\u00a0al (2015) Hesitant fuzzy analytic hierarchy process. In: IEEE international conference on fuzzy systems (FUZZ-IEEE), IEEE international fuzzy systems conference proceedings, https:\/\/doi.org\/10.1109\/FUZZ-IEEE.2015.7337948","DOI":"10.1109\/FUZZ-IEEE.2015.7337948"},{"issue":"3","key":"8232_CR18","doi-asserted-by":"publisher","first-page":"1873","DOI":"10.1007\/s10462-017-9596-9","volume":"52","author":"X Peng","year":"2019","unstructured":"Peng X, Selvachandran G (2019) Pythagorean fuzzy set: state of the art and future directions. Artif Intell Rev 52(3):1873\u20131927. https:\/\/doi.org\/10.1007\/s10462-017-9596-9","journal-title":"Artif Intell Rev"},{"issue":"1","key":"8232_CR19","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1109\/mci.2018.2881643","volume":"14","author":"EH Ruspini","year":"2019","unstructured":"Ruspini EH, Bezdek JC, Keller JM (2019) Fuzzy clustering: a historical perspective. IEEE Comput Intell Mag 14(1):45\u201355. https:\/\/doi.org\/10.1109\/mci.2018.2881643","journal-title":"IEEE Comput Intell Mag"},{"key":"8232_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ins.2013.12.060","volume":"266","author":"L Rutkowski","year":"2014","unstructured":"Rutkowski L, Jaworski M, Pietruczuk L et al (2014) The cart decision tree for mining data streams. Inform Sci 266:1\u201315. https:\/\/doi.org\/10.1016\/j.ins.2013.12.060","journal-title":"Inform Sci"},{"issue":"3","key":"8232_CR21","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1016\/0022-2496(77)90033-5","volume":"15","author":"TL Saaty","year":"1977","unstructured":"Saaty TL (1977) A scaling method for priorities in hierarchical structures. J Math Psychol 15(3):234\u2013281. https:\/\/doi.org\/10.1016\/0022-2496(77)90033-5","journal-title":"J Math Psychol"},{"issue":"1\u20132","key":"8232_CR22","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1016\/S0924-0136(01)01016-0","volume":"117","author":"X Shao","year":"2001","unstructured":"Shao X, Zhang G, Li P et al (2001) Application of id3 algorithm in knowledge acquisition for tolerance design. J Mater Process Technol 117(1\u20132):66\u201374. https:\/\/doi.org\/10.1016\/S0924-0136(01)01016-0","journal-title":"J Mater Process Technol"},{"issue":"1","key":"8232_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ejor.2004.04.028","volume":"169","author":"OS Vaidya","year":"2006","unstructured":"Vaidya OS, Kumar S (2006) Analytic hierarchy process: an overview of applications. Eur J Oper Res 169(1):1\u201329. https:\/\/doi.org\/10.1016\/j.ejor.2004.04.028","journal-title":"Eur J Oper Res"},{"issue":"8","key":"8232_CR24","doi-asserted-by":"publisher","first-page":"2324","DOI":"10.1109\/tcomm.2010.08.090481","volume":"58","author":"F Wang","year":"2010","unstructured":"Wang F, Wang X (2010) Fast and robust modulation classification via kolmogorov\u2013smirnov test. IEEE Trans Commun 58(8):2324\u20132332. https:\/\/doi.org\/10.1109\/tcomm.2010.08.090481","journal-title":"IEEE Trans Commun"},{"key":"8232_CR25","doi-asserted-by":"publisher","unstructured":"Wu G, Xu J (2015) Optimized approach of feature selection based on information gain. In: International conference on computer science and mechanical automation (CSMA 2015), pp 157\u2013161. https:\/\/doi.org\/10.1109\/csma.2015.38","DOI":"10.1109\/csma.2015.38"},{"issue":"2","key":"8232_CR26","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1007\/s13042-015-0340-y","volume":"8","author":"M Xia","year":"2017","unstructured":"Xia M, Xu Z (2017) Some studies on properties of hesitant fuzzy sets. Int J Mach Learn Cybern 8(2):489\u2013495. https:\/\/doi.org\/10.1007\/s13042-015-0340-y","journal-title":"Int J Mach Learn Cybern"},{"issue":"4","key":"8232_CR27","doi-asserted-by":"publisher","first-page":"749","DOI":"10.1109\/tfuzz.2013.2272585","volume":"22","author":"Z Xu","year":"2014","unstructured":"Xu Z, Liao H (2014) Intuitionistic fuzzy analytic hierarchy process. IEEE Trans Fuzzy Syst 22(4):749\u2013761. https:\/\/doi.org\/10.1109\/tfuzz.2013.2272585","journal-title":"IEEE Trans Fuzzy Syst"},{"issue":"1","key":"8232_CR28","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/s11227-009-0338-x","volume":"53","author":"Y Yasami","year":"2010","unstructured":"Yasami Y, Mozaffari SP (2010) A novel unsupervised classification approach for network anomaly detection by k-means clustering and id3 decision tree learning methods. J Supercomput 53(1):231\u2013245. https:\/\/doi.org\/10.1007\/s11227-009-0338-x","journal-title":"J Supercomput"},{"issue":"16","key":"8232_CR29","doi-asserted-by":"publisher","first-page":"11035","DOI":"10.1007\/s00500-021-05840-z","volume":"25","author":"M Yucesan","year":"2021","unstructured":"Yucesan M, Gul M (2021) Failure modes and effects analysis based on neutrosophic analytic hierarchy process: method and application. Soft Comput 25(16):11035\u201311052. https:\/\/doi.org\/10.1007\/s00500-021-05840-z","journal-title":"Soft Comput"},{"key":"8232_CR30","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1016\/j.ins.2020.05.036","volume":"538","author":"L Zhou","year":"2020","unstructured":"Zhou L (2020) Ordered pair of normalized real numbers. Inform Sci 538:290\u2013313. https:\/\/doi.org\/10.1016\/j.ins.2020.05.036","journal-title":"Inform Sci"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-023-08232-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00500-023-08232-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-023-08232-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,21]],"date-time":"2023-07-21T09:06:14Z","timestamp":1689930374000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00500-023-08232-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,12]]},"references-count":30,"journal-issue":{"issue":"17","published-print":{"date-parts":[[2023,9]]}},"alternative-id":["8232"],"URL":"https:\/\/doi.org\/10.1007\/s00500-023-08232-7","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-1270442\/v1","asserted-by":"object"}]},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,5,12]]},"assertion":[{"value":"8 April 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 May 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}