{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T17:51:04Z","timestamp":1754157064141,"version":"3.41.2"},"reference-count":17,"publisher":"Emerald","issue":"1","license":[{"start":{"date-parts":[[2013,1,4]],"date-time":"2013-01-04T00:00:00Z","timestamp":1357257600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,1,4]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>The purpose of this paper is to present a more objective evaluation method for a mining area ecological environment. It proposes the weight of indices with respect to the total goal, and provides a new evaluation method which generalizes the weighted\u2010average method.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>First, the authors describe the evaluation grades by fuzzy variables in credibility space, and the degree of an index belonging to a grade is transformed to be the credibility measure of a fuzzy event by the credibility inversion theorem. Second, a new algorithm which generalizes the weighted\u2010average method is proposed to realize the transformation from the credibility degree of the underlying indices to the credibility degree of the total target.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>The method proposed in this paper can obtain the correct results illustrated with a numerical evaluation example. The comparison with two other methods shows that the proposed method has stronger classification ability.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>The new method presented in this paper generalizes the weighted\u2010average method, and provides methods for other evaluation systems with a hierarchical structure.<\/jats:p><\/jats:sec>","DOI":"10.1108\/03684921311295475","type":"journal-article","created":{"date-parts":[[2013,3,25]],"date-time":"2013-03-25T14:13:02Z","timestamp":1364220782000},"page":"55-66","source":"Crossref","is-referenced-by-count":0,"title":["A new method for mining area ecological environment assessment based on credibility measure"],"prefix":"10.1108","volume":"42","author":[{"given":"Jiqiang","family":"Chen","sequence":"first","affiliation":[]},{"given":"Litao","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Hong","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022012619515972400_b1","unstructured":"Chen, Q., Hu, K., Luo, K.L., Li, F.L. and Zhao, W. (2006), \u201cStudy on the synthetical assessment model of mine eco\u2010environments based on AHP\u201d, Journal of China University of Mining & Technology, Vol. 35 No. 3, pp. 377\u201083."},{"key":"key2022012619515972400_b3","unstructured":"Cheng, Q.S. (1997), \u201cA model of property identification and its application\u201d, Acta Scientiarum Naturalium Universitatis Pekinensis, Vol. 33 No. 1, pp. 12\u201020."},{"key":"key2022012619515972400_b4","doi-asserted-by":"crossref","unstructured":"Chuang, C.C., Jeng, J.T. and Tao, C.W. (2009), \u201cHybrid robust approach for TSK fuzzy modeling with outliers\u201d, Expert Systems with Applications, Vol. 36 No. 5, pp. 8925\u201031.","DOI":"10.1016\/j.eswa.2008.11.053"},{"key":"key2022012619515972400_b5","doi-asserted-by":"crossref","unstructured":"Da\u011fdeviren, M., Yavuz, S. and K\u0131l\u0131n\u00e7, N. (2009), \u201cWeapon selection using the AHP and TOPSIS methods under fuzzy environment\u201d, Expert Systems with Applications, Vol. 36 No. 4, pp. 8143\u201051.","DOI":"10.1016\/j.eswa.2008.10.016"},{"key":"key2022012619515972400_b6","doi-asserted-by":"crossref","unstructured":"Han, M., Sun, Y.N. and Fan, Y.N. (2008), \u201cAn improved fuzzy neural network based on T\u2010S model\u201d, Expert Systems with Applications, Vol. 34 No. 4, pp. 2905\u201020.","DOI":"10.1016\/j.eswa.2007.05.020"},{"key":"key2022012619515972400_b7","doi-asserted-by":"crossref","unstructured":"Kang, H.Y. and Lee, A.H.I. (2007), \u201cPriority mix planning for semiconductor fabrication by fuzzy AHP ranking\u201d, Expert Systems with Applications, Vol. 32, pp. 560\u201070.","DOI":"10.1016\/j.eswa.2006.01.035"},{"key":"key2022012619515972400_b8","doi-asserted-by":"crossref","unstructured":"Kruszewski, A., Wang, R. and Guerra, T.M. (2008), \u201cNonquadratic stabilization conditions for a class of uncertain nonlinear discrete time T\u2010S fuzzy models: a new approach\u201d, IEEE Transactions on Automatic Control, Vol. 53 No. 2, pp. 606\u201011.","DOI":"10.1109\/TAC.2007.914278"},{"key":"key2022012619515972400_b9","doi-asserted-by":"crossref","unstructured":"Kumar, P.P., Kar, I. and Behera, L. (2006), \u201cVariable\u2010gain controllers for nonlinear systems using the T\u2010S fuzzy model\u201d, IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics, Vol. 36 No. 6, pp. 1442\u20109.","DOI":"10.1109\/TSMCB.2006.877799"},{"key":"key2022012619515972400_b10","doi-asserted-by":"crossref","unstructured":"Lee, A.H.I., Chen, W.C. and Chang, C.J. (2008), \u201cA fuzzy AHP and BSC approach for evaluating performance of IT department in the manufacturing industry in Taiwan\u201d, Expert Systems with Applications, Vol. 34 No. 1, pp. 96\u2010107.","DOI":"10.1016\/j.eswa.2006.08.022"},{"key":"key2022012619515972400_b11","doi-asserted-by":"crossref","unstructured":"Li, T.S. and Huang, H.H. (2009), \u201cApplying TRIZ and fuzzy AHP to develop innovative design for automated manufacturing systems\u201d, Expert Systems with Applications, Vol. 36 No. 44, pp. 8302\u201012.","DOI":"10.1016\/j.eswa.2008.10.025"},{"key":"key2022012619515972400_b12","unstructured":"Liu, B.D. (2004), Uncertainty Theory: An Introduction to its Axiomatic Foundations, Springer, Berlin."},{"key":"key2022012619515972400_b13","doi-asserted-by":"crossref","unstructured":"Liu, B.D. (2006), \u201cA survey of credibility theory\u201d, Fuzzy Optimization and Decision, Vol. 5, pp. 387\u2010408.","DOI":"10.1007\/s10700-006-0016-x"},{"key":"key2022012619515972400_b14","doi-asserted-by":"crossref","unstructured":"Liu, Y.K. (2005), \u201cFuzzy programming with recourse\u201d, International Journal of Uncertainty Fuzziness and Knowledge\u2010Based Systems, Vol. 13 No. 4, pp. 381\u2010413.","DOI":"10.1142\/S0218488505003539"},{"key":"key2022012619515972400_b15","doi-asserted-by":"crossref","unstructured":"Wang, P. (2009), \u201cQoS\u2010aware web services selection with intuitionistic fuzzy set under consumer's vague perception\u201d, Expert Systems with Applications, Vol. 36 No. 3, pp. 4460\u20106.","DOI":"10.1016\/j.eswa.2008.05.007"},{"key":"key2022012619515972400_b16","doi-asserted-by":"crossref","unstructured":"Wang, Y.M., Chin, K.S., Poon, G.K.K. and Yang, J.B. (2009), \u201cRisk evaluation in failure mode and effects analysis using fuzzy weighted geometric mean\u201d, Expert Systems with Applications, Vol. 36 No. 2, pp. 1195\u2010207.","DOI":"10.1016\/j.eswa.2007.11.028"},{"key":"key2022012619515972400_b17","doi-asserted-by":"crossref","unstructured":"Zadeh, L.A. (1965), \u201cFuzzy sets\u201d, Information and Control, Vol. 8 No. 3, pp. 338\u201053.","DOI":"10.1016\/S0019-9958(65)90241-X"},{"key":"key2022012619515972400_frd1","doi-asserted-by":"crossref","unstructured":"Chen, Y.Z., Fung, R.Y.K. and Tang, J.F. (2006), \u201cRating technical attributes in fuzzy QFD by integrating fuzzy weighted average method and fuzzy expected value operator\u201d, European Journal of Operational Research, Vol. 174 No. 3, pp. 1553\u201066.","DOI":"10.1016\/j.ejor.2004.12.026"}],"container-title":["Kybernetes"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/03684921311295475","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/03684921311295475\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/03684921311295475\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:27:45Z","timestamp":1753399665000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/k\/article\/42\/1\/55-66\/446504"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,1,4]]},"references-count":17,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2013,1,4]]}},"alternative-id":["10.1108\/03684921311295475"],"URL":"https:\/\/doi.org\/10.1108\/03684921311295475","relation":{},"ISSN":["0368-492X"],"issn-type":[{"type":"print","value":"0368-492X"}],"subject":[],"published":{"date-parts":[[2013,1,4]]}}}