Abstract

How to determine a suitable security algorithm for a special application scenario is a complex problem. In this paper, this complex problem is formulated as a multicriteria decision-making (MCDM) problem, and we propose a novel MULTIMOORA (multiobjective optimization on the basis of a ratio analysis plus the full MULTIpevaluation information in the security algorithms evaluation problem. The MULTIMOORA method is an excellent decision method, which owns strong robustness. However, it has not been used to process the complex information structure of q-rung orthopair fuzzy sets. Moreover, it cannot solve the problem that the extreme values negatively influence the ranking results, and it also cannot capture the interrelationship hiding behind the criteria. To overcome the above challenges, we propose novel q-rung orthopair fuzzy Dombi power Heronian mean (DPHM) operator and q-rung orthopair fuzzy Dombi power geometric Heronian mean (DPGHM) operator. Based on these two operators, the MULTIMOORA method is improved for solving the security algorithms’ evaluation problem. Finally, a practical example for evaluating five security algorithms is used to illustrate the decision process of the proposed q-rung orthopair fuzzy MULTIMOORA method.

1. Introduction

With the quick development of multiple information technologies including cloud computing, Internet of Things, and edge computing [1], more and more companies and personals choose to upload their private data to the network [2]. However, as the scale of network becomes larger, the whole network becomes more complicated [3]. The network shows massive security loophole [4]. The companies and personals also own the special software to improve their business. The software also has massive security loophole and risks. To ensure the reliability of software and network, researchers and scholars have provided some solutions. For example, Abdel-Basset et al. [5] have put forward a neutrosophic decision-making model for evaluating the e-government website according to the quality, security, and accessibility. Wang et al. [6] have combined the TOPSIS (technique for order of preference by similarity to ideal solution) approach with the 0-1 integer programming method to choose an intelligent web service for improving the reliability of network.

Researchers and scholars also designed a number of efficient security algorithms to ensure the security requirements of network [79]. However, these security algorithms usually own different characteristics and advantages [10]. For a special application scenario, a suitable security algorithm should be selected for satisfying the requirements of this application scenario. How to choose the most suitable security algorithm for a special application scenario is a big challenge. To address this problem, Ning et al. [11] formulated this problem as a multicriteria decision-making (MCDM) problem and proposed a hybrid model for selecting the best encryption algorithm according to several requirements such as the performance, physical, and security. However, the study [11] still has some shortcomings.(1)In the study [11], crisp values are used to evaluate security algorithms. Since the security algorithm evaluation problem becomes more and more complex, it is not easy for decision makers to use accurate crisp values for evaluating security algorithms [13]. The birth of fuzzy sets (FSs) [14] provides decision makers with a new way to express uncertain evaluation information. However, FSs only describe the membership degree (MD) information. To enhance the uncertain information modeling capability, intuitionistic fuzzy sets (IFSs) [15] were proposed to express the MD and nonmembership degree (NMD) information. In IFSs, the sum of MD and NMD values is not larger than 1. To provide the decision makers with more freedom for expressing the evaluation information, the concept of Pythagorean fuzzy sets (PFSs) was proposed by Yager and Abbasov [16], where the square sum of MD and NMD is not larger than 1. To generalize the concepts of IFSs and PFSs, a generic version, called q-rung orthopair fuzzy set (q-ROFS), was proposed by Yager [17]. In this study, we intend to use q-ROFSs to express the uncertain information. The significance of q-ROFSs is that this information representation way is flexible, and it provides the decision makers with more freedom than PFSs and IFSs.(2)q-ROFSs have attracted many researchers since its birth. For example, linguistic q-ROFSs [1820] and interval-valued q-ROFSs [21] are the qualitative and uncertain versions of q-ROFSs. To fuse q-ROFSs’ information, various aggregation operators have been proposed [2228], such as Archimedean Bonferroni mean operators [22], partitioned Bonferroni mean operators [23], Heronian mean operators [24], Maclaurin symmetric mean operators [25, 26], Hamy mean operators [27], and Choquet integral operators [28]. They are the value measurement MCDM methods [2931], which do not consider the distance between each criterion value and maximum criterion value.(3)As one of the efficient decision methods, the MULTIMOORA (multiobjective optimization on the basis of a ratio analysis plus the full MULTIplicative form) method [32] consists of three submodels for comprehensively determining the decision results. As shown in Table 1, the decision results that are obtained from the MULTIMOORA method are robust and the MULTIMOORA method outperforms than some other decision methods [12]. Because of its excellent characteristics, the MULTIMOORA method has been used to process various evaluation information, such as interval numbers [33], IFSs [34], picture fuzzy sets [35], and probabilistic linguistic term sets [36]. To the best of our knowledge, there have been no research results on the combination of q-ROFSs and MULTIMOORA method to date. In this paper, we intend to extend the MULTIMOORA method for processing the q-ROFS information in the MCDM problems. Nevertheless, the MULTIMOORA method cannot handle the case that extreme values influence the reliability of the decision results. Moreover, it is incapable of processing the complex interrelationships hiding behind criteria values.

Hence, the motivations of this study are summarized as(1)A more flexible way of q-ROFSs is used to express the uncertain and vague evaluation information for the security algorithms evaluation problems(2)A novel decision-making method is developed to solve the security algorithms evaluation problems and select an appropriate algorithm for a special application scenario

To overcome the challenges, a novel q-rung orthopair fuzzy MULTIMOORA method based on Dombi power Heronian mean aggregation operators is proposed in this paper, and it is applied to solve the security algorithms’ evaluation problem.(1)The Dombi operational laws, special forms of t-norms and t-conorms, show strong flexibility when computing input values. The power average (PA) operator has the ability of alleviating negative influences of extreme input values on the decision results. The Heronian mean (HM) acts as a mapping function that can capture the complex interrelationships among input values. Considering the excellent characteristics, in this paper, some Dombi power Heronian mean aggregation operators are proposed to fuse q-rung orthopair fuzzy numbers (q-ROFNs), which are q-rung orthopair fuzzy Dombi power Heronian mean (q-ROFDPHM) operator and q-rung orthopair fuzzy Dombi power geometric Heronian mean (q-ROFDPGHM) operator, as well as their weighted forms. Afterwards, their features are discussed.(2)The weighted forms of the q-ROFDPHM and q-ROFDPGHM operators are applied to improve the MULTIMOORA method so that a novel q-rung orthopair fuzzy MULTIMOORA method is put forward for handling the security algorithms’ evaluation problem. After that, the detailed decision-making procedure of the proposed q-rung orthopair fuzzy MULTIMOORA method is provided.(3)A case concerning the evaluation of five security algorithms is provided to show the implementation processes of the proposed q-rung orthopair fuzzy MULTIMOORA method. Afterwards, the influences of the parameters on the ranking results are analyzed. Then, the q-rung orthopair fuzzy MULTIMOORA method is compared with the existing decision methods that handle the q-ROFS information.

The rest content of this paper is organized as follows. The basic knowledge of q-rung orthopair fuzzy sets, PA, Dombi T-conorm and T-norm, HM operator, and MULTIMOORA method is provided in Section 2. In Section 3, the q-ROFDPHM operator and its weighted form are put forward. Section 4 puts forward the q-ROFDPGHM operator and its weighted form. In Section 5, we apply the proposed operators to propose a novel q-rung orthopair fuzzy MULTIMOORA method and also present the decision procedure. In Section 6, an illustrative example of evaluating of security algorithms is provided to show the implementation process of the proposed q-rung orthopair fuzzy MULTIMOORA method. In Section 7, some valuable conclusions are listed.

2. Preliminaries

In this paper, the basic information of q-ROFSs, PA, Dombi T-conorm and T-norm, HM operator, and MULTIMOORA method is provided.

2.1. q-Rung Orthopair Fuzzy Sets

The concept of q-ROFSs was proposed based on IFSs and PFSs. The q-ROFSs show higher flexibility and larger value range than IFSs and PFSs [3739].

Definition 1 (see [17]). Let be a finite universe of discourse (UoD); then, a q-ROFS on is mathematically expressed aswhere and are the membership degree (MD) and nonmembership degree (NMD) of the element belonging to the q-ROFS , respectively. The constraint conditions for q-ROFS are , , and , for all . The parameter is a positive integer. The value of is defined to be the hesitant degree (HD) of the element belonging to the q-ROFS . For convenience, the two-tuple is simplified as , which is also called q-rung orthopair fuzzy number (q-ROFN) by Liu and Wang [40].
For comparing q-ROFNs, the definitions of score function and accuracy function were given by Liu and Wang [40] for q-ROFNs as follows.

Definition 2 (see [40]). Given a q-ROFN , then its score function and accuracy function are defined as and , in which denotes the score function and is the accuracy function.
Based on the above score function and accuracy function presented in Definition 2, Liu and Wang [40] gave a method for comparing two q-ROFNs as follows.

Definition 3 (see [40]). Given two q-ROFNs and , and are their score function values, and and are their accuracy function values,(1)If , then it can be considered that .(2)If , then their accuracy function values should be further compared as follows:(1)If , then .(2)If , then .To measure the deviation degree between any two q-ROFNs, Liu et al. [41] provided the definition of distance between them as follows.

Definition 4 (see [41]). For q-ROFNs, and , the distance between them is computed aswhere and are the HD values of q-ROFNs and , respectively.

2.2. Power Average Operator

The power average (PA) is a useful aggregation operator that was put forward by Yager [42]. The PA operator has the ability of alleviating negative influences of extreme input values on the calculation results. The original PA operator was devised to process crisp values. Its mathematical definition is given as follows:

Definition 5 (see [42]). Let be a series of nonnegative crisp values; then, the PA operator really acts as a function thatwhere is the support degree for from and .
The support degree satisfies the following features:(1)(2)(3)If , then , where denotes the distance between and

2.3. Dombi T-Norm and T-Conorm

The Dombi T-norm (TNM) and T-conorm (TCNM), which were proposed by Dombi [43], are referred to as special forms of t-norms and t-conorms. Their mathematical expressions are provided as follows.

Definition 6 (see [43]). Given any two real values, and , then the Dombi TNM and Dombi TCNM act as two functions, which are mathematically defined aswhere , .
Based on the above Dombi TNM and Dombi TCNM, Jana et al. [44] gave the Dombi operational laws for computing q-ROFNs as follows.

Definition 7 (see [44]). Given two q-ROFNs and , then the Dombi operational laws of q-ROFNs are defined as(1)(2)(3)(4), where

2.4. Heronian Mean and Geometric Heronian Mean Operators

The aggregation operators (AOs) [4547] are value measurement MCDM methods. It is very simple and easy to perform AOs. The AOs are the processes, which fuse given input values into a single value [48]. For aggregating the complicated information structures of various fuzzy sets, researchers have put forward various AOs. The Heronian mean (HM) operator [49], an excellent and useful AO, is capable of processing the complicated interrelationships among input values, which are common in the MCDM contexts. The HM operators can be divided into two categories: arithmetic HM (AHM) and geometric HM (GHM) operators, which are mathematically defined as follows.

Definition 8 (see [49]). Let be a series of nonnegative real values; the parameters , ; then, the AHM operator can aggregate the nonnegative real values as

Definition 9 (see [49]). Let be a series of nonnegative real values; the parameters , ; then, the GHM operator can aggregate the nonnegative real values asFor the AHM operator, its aggregated values are greatly influenced by extreme values [50]. The GHM operator is capable of balancing the big differences among input values [51]. Therefore, the GHM operator performs better than the AHM operator in some cases.

2.5. MULTIMOORA

To obtain more robust decision results, the full multiplicative form (FMF) was applied by Brauers and Zavadskas [32] to extend the initial MOORA (multiobjective optimization on the basis of ratio analysis) method. Thus, the MULTIMOORA method has three components: ratio system (RS) component, reference point (RP) component, and FMF component, respectively [52]. These three components derive the decision results independently. For the purpose of determining the final decision result, the decision results obtained from these three components are processed by the dominance theory [32]. In the following part, the process for implementing the MULTIMOORA method is listed as follows.

Let us suppose that there exists an MCDM problem consisting of alternatives and criteria . The weight vector of criteria is denoted as , where and . The decision matrix (DM) corresponding to the MCDM problem contains the evaluation information from experts. The element represents the evaluation information of alternative with respect to criterion .

The evaluation information of alternatives across multiple criteria usually shows different dimensions, so the evaluation information in the DM is suggested to be normalized as

After that, the normalized DM can be derived.

2.5.1. RS Component

In this component, the criteria should be divided into two categories: benefit-type (BT) criteria and cost-type (CT) criteria. For BT criteria, the larger the evaluation information of alternative, the better the alternative. For CT criteria, the larger the evaluation information of alternative, the worse the alternative. The weighted arithmetic aggregation operator (AAO) is used to calculate the ranking value of alternative aswhere represents the number of benefit-type criteria and means the number of cost-type criteria. From the above equation, it is noted that the alternative in the RS component having the maximum ranking value is considered as the best one. Therefore, the alternatives can be ranked based on the descending order of their ranking values.

2.5.2. RP Component

For the RP component, the worst criterion value of each alternative that is farthest from the reference point of the corresponding criterion should be first derived, and then, the alternative with the smallest worst criterion value is considered as the optimal one.

In this component, the reference point of each criterion is first determined aswhere denotes the reference point of alternatives with respect to criterion .

Then, the weighted distance between the normalized evaluation information of the alternative with respect to each criterion and the reference point of the same criterion is computed as .

Finally, the ranking value of alternative is computed as .

According to the RP component, the optimal alternative should have the smallest ranking value. Thus, the alternatives can be ranked based on the ascending order of their ranking values.

2.5.3. FMF Component

The design idea of FMF component is the same as that of RS component. In the FMF component, the better alternative should have higher values for benefit-type criteria and lower values for cost-type criteria. The weighted geometric aggregation operator (GGO) is used to determine the ranking value of alternative as .

According to the design idea, the alternative having the largest ranking value should be considered as the best one in the FMF component. Hence, the alternatives can be ranked based on the descending order of their ranking values.

To aggregate the ranking orders of alternatives obtained from these three components, the dominance theory was suggested by Brauers and Zavadskas [32] to be used for deriving the final decision results.

3. q-Rung Orthopair Fuzzy Dombi Power Heronian Mean Operators

In this section, we use the PA operator, Dombi operational laws for q-ROFNs, and arithmetic HM operator to propose q-rung orthopair fuzzy Dombi power HM (q-ROFDPHM) operator and its weighted form. Then, the features are discussed.

Definition 10. Given a set of q-ROFNs and three parameters and , then the q-ROFDPHM operator is defined asBased on the Dombi operational laws of q-ROFNs [36] and HM operator, the following theorems can be derived.

Theorem 1. Given q-ROFNs and the parameters and , then the aggregated result derived from equation (10) is still an q-ROFN, which iswhere , , , , , , , and .

Proof. According to Definition 10, we haveLet and ; then, we can deriveAccording to Definition 7, it can be derived thatLet , , , and ; then, we haveLet and ; then, the above equations can be transformed intoThus, ,Then, the final result can be determined asThen, we need to prove that the aggregated result from the q-ROFDPHM operator is still a q-ROFN.
Let and ; then, we need to prove that (1) and and (2) .
Since and , then .
Then, we can haveThus, . Similarly, it can be proven that . It can be derived that .
Because and , then and . Thus, and . It can be derived that and . Then, we haveThus,Then, we can havewhich completes the proof of Theorem 1.

Theorem 2 (idempotency). Suppose that there are a group of q-ROFNs and the parameters , and . If , for , then we havewhere , , , , , , , and .

Proof. Since , for , then .
Thus, we haveThen, it can be derived thatSimilarly, . Then, the NMD value of the q-ROFDPHM operator can be derived asThus, we have , which completes the proof of Theorem 2.

Theorem 3 (boundedness). Suppose that there are a group of q-ROFNs and the parameters , and . If and , then we havewhere

Proof. According to Definition 7, we haveSince , then we have and .
Thus, it can be derived thatThen, we can haveSimilarly, we haveSince and , then we haveSimilarly, it can be proven that in the same way, which completes the proof of Theorem 3.
It can be noted that the proposed q-ROFDPHM operator uses the PA operator and Dombi operational laws to optimize the HM operator. Its significance can be listed as follows. (1) It can alleviate negative influences of extreme input values on the calculation results. (2) It shows strong flexibility for computing input values. (3) It is capable of capturing the complex interrelationships among criteria values. (4) It can process the complex information structure of q-ROFSs. Nevertheless, during the aggregation processes, it does not consider the weight values of criteria, which is very important in the MCDM contexts. To tackle this deficiency, a novel q-rung orthopair fuzzy weighted Dombi power Heronian mean (q-ROFWDPHM) operator is put forward in the following part.

Definition 11. Given a set of q-ROFNs , three parameters and , and the weight values of q-ROFNs, then the q-ROFWDPHM operator is defined as

Theorem 4. Given a set of q-ROFNs , three parameters and , and the weight values of q-ROFNs, then the aggregated result obtained from the q-ROFWDPHM operator is still a q-ROFN, which iswhere , , , , , , , and .

Proof. Let and ; then, equation (34) can be transformed intoAccording to Definition 7, we haveLet , , , and ; then, these equations can be transformed intoAccording to Definition 7, then we haveLet and ; then, the above two equations can be transformed intoThe process for proving that the aggregation result of the q-ROFWDPHM operator is a q-ROFN is the same as that of Theorem 1. Thus, it is omitted here.
The proposed q-ROFWDPHM operator also owns the features of idempotency and boundedness as the proposed q-ROFDPHM operator. Their proof processes are similar to those of Theorems 2 and 3. Due to the limited space, the proof processes are omitted here.

4. q-Rung Orthopair Fuzzy Dombi Power Geometric Heronian Mean Operators

In this section, we use the PA operator, Dombi operational laws for q-ROFNs, and geometric HM operator to develop a novel q-ROFDPGHM operator and its weighted form. Then, the features are discussed.

Definition 12. Given a set of q-ROFNs and three parameters and , then the q-ROFDPGHM operator is defined asBased on the Dombi operational laws of q-ROFNs and GHM operator, a theorem is derived.

Theorem 5. Given q-ROFNs and the parameters and , then the aggregated result derived from equation (41) is still a q-ROFN, which iswhere , , , , , , , and .
The proof process of this theorem is similar to that of Theorem 1. Thus, it is omitted here.
The proposed q-ROFDPGHM operator also owns the features of idempotency and boundedness as the proposed q-ROFDPHM operator. Their proof processes are similar to those of Theorems 2 and 3. Due to the limited space, the proof processes are omitted here.
Similar to the proposed q-ROFDPHM operator, the q-ROFDPGHM also does not consider the weight values of criteria. To tackle this deficiency, a new q-rung orthopair fuzzy weighted Dombi power geometric Heronian mean (q-ROFWDPGHM) operator is put forward in the following part.

Definition 13. Given a set of q-ROFNs , three parameters and , and the weight values of q-ROFNs, then the q-ROFWDPGHM operator is defined asBased on the Dombi operational laws of q-ROFNs and GHM operator, a theorem is derived.

Theorem 6. Given a set of q-ROFNs , the parameters , and , and the weight values of q-ROFNs, then the aggregated result that is obtained from equation (43) is still a q-ROFN, which iswhere , , , , , , , and .

Proof. The proof process is similar to that of Theorem 1. Thus, it is omitted here.
The proposed q-ROFWDPGHM operator also has the features of idempotency and boundedness as the proposed q-ROFDPHM operator. Their proof processes are similar to those of Theorems 2 and 3. Due to the limited space, the proof processes are omitted here.

5. MULTIMOORA Method for q-Rung Orthopair Fuzzy Sets

In this section, the MULTIMOORA method is improved for processing the MCDM problems with the q-ROFS information. There usually exist the interrelationships among the criteria in the MCDM problems. Moreover, there may be extreme criteria values in the MCDM problems. To tackle these two problems, we use the proposed q-ROFWDPHM and q-ROFWDPGHM operators to modify the MULTIMOORA method.

5.1. Problem Description

Let us suppose that there exists an MCDM problem consisting of alternatives and criteria . The weight values of criteria are denoted as , where and . The decision matrix (DM) corresponding to this MCDM problem consists of the evaluation information from experts. The element denotes the evaluation information of alternative with respect to criterion . In this MCDM problem, experts use the flexible q-ROFNs for expressing the evaluation information of alternative with respect to criterion , namely, . Here, the criteria are divided into two different categories: benefit-type criteria and cost-type criteria.

Before processing DM , equation (45) is used to transform the values of cost-type criteria for deriving the transformed DM :

5.2. q-Rung Orthopair Fuzzy MULTIMOORA Method

According to the above problem description, we introduce the q-ROFWDPHM and q-ROFWDPGHM operators to improve the original MULTIMOORA method so as to propose a novel q-rung orthopair fuzzy MULTIMOORA (q-ROF-MULTIMOORA) method. Similar to the original MULTIMOORA method [53], the q-ROF-MULTMOORA method is also composed of three components, which are the q-rung orthopair fuzzy RS (q-ROF-RS) component, q-rung orthopair fuzzy RP (q-ROF-RP) component, and q-rung orthopair fuzzy FMF (q-ROF-FMF) component, respectively. Based on the transformed DM , these three components compute the ranking values of alternatives as follows.

5.2.1. q-ROF-RS Component

In this component, the q-ROFWDPHM operator is applied to aggregate the evaluation information of each alternative with respect to its criteria. Therefore, using (34), the aggregated criteria value of alternative can be computed aswhere and .

Since the aggregated value is a q-ROFN, then the score function in Definition 2 is used to derive the crisp ranking value of alternative aswhere , , , , , , , and .

The alternative with larger ranking value is better. Hence, all the alternatives can be ranked according to the descending order of their ranking values.

5.2.2. q-ROF-RP Component

In this component, the reference point of each criterion is first derived as

In the second step, Definition 4 is applied to compute the distance between the evaluation information of alternative with respect to each criterion and the reference point of the same criterion as

It can be known that is a real value and . Considering the interrelationships among criteria, the ranking value of alternative is computed by aggregating the criteria distances of alternative aswhere and .

In this component, the alternative with smaller ranking value is better. Thus, all the alternatives should be ranked according to the ascending order of their ranking values.

5.2.3. q-ROF-FMF Component

In this component, the proposed q-ROFWDPGHM operator is applied to aggregate the evaluation information of each alternative with respect to its criteria. Thus, using equation (43), the aggregated criteria value of alternative can be computed aswhere and .

Since the aggregated value is a q-ROFN, then the score function in Definition 2 is used to derive the crisp ranking value of alternative aswhere , , , , , , , and .

In this component, the alternative with larger ranking value is better. Hence, all the alternatives can be ranked according to the descending order of their ranking values.

After obtaining the ranking values of all the alternatives from these three components, we need to fuse them for deriving the final ranking values. In the original MULTIMOORA method, the dominance theory is usually used to aggregate three ranking orders for deriving the final ranking order. However, it is incapable of handling massive operations resulting from its cumbersome pairwise comparison processes [54]. For the purpose of overcoming the deficiency of dominancy theory, the HM operator is put forward for integrating the ranking values of alternatives obtained from three components of the proposed q-ROF-MULTIMOORA method. The HM operator owns the advantage of capturing the interrelationships hiding behind input values. Afterwards, by using the ranking values obtained from equations (47)–(52), here a new DM is constructed, where the three components of the q-ROF-MULTIMOORA method are regarded as criteria of alternatives: q-ROF-RS component (), q-ROF-RP component (), and q-ROF-FMF component (). Hence, the new DM is constructed aswhere denotes the set of alternatives and denotes the set of criteria. The element in the DM denotes the ranking value of the alternative with respect to the criterion . Let be the weight values of criteria , satisfying and . In general, the weight values of criteria are set to . For the DM , the ranking values of each alternative with respect to three criteria should be aggregated for determining the final ranking values. However, the ranking values show different dimensions because they are obtained from the different components. For the purpose of making them dimensionless, all the ranking values are normalized aswhere and .

Afterwards, the weighted HM operator [55] is used to aggregate the normalized ranking values of each alternative with respect to three criteria for deriving the final ranking value of this alternative as

The alternative with larger final ranking value is better. Hence, all the alternatives can be ranked based on the descending order of their final ranking values.

5.3. Decision-Making Procedure

Based on the discussion and results in Section 5.2, the decision-making procedure of the proposed q-ROF-MULTIMOORA method is summarized using the following 7 steps.Step 1: all the evaluation information is collected for constructing DM . At the same time, the values of the parameters , , , and should be provided.Step 2: to transform the criteria values of each alternative with respect to cost-type criteria, (45) is used to transform DM into DM .Step 3: for the transformed DM , (47) is applied to compute the ranking value of each alternative with respect to the q-ROF-RS component. The alternatives can be ranked according to the descending order of their ranking values.Step 4: for the transformed DM , (50) is applied to compute the ranking value of each alternative with respect to the q-ROF-RP component. The alternatives can be ranked according to the ascending order of their ranking values.Step 5: for the transformed DM , (52) is applied to compute the ranking value of each alternative with respect to the q-ROF-FMF component. The alternatives can be ranked according to the descending order of their ranking values.Step 6: based on the ranking values of alternatives obtained from three components in Steps 3–5, a new DM is constructed. Afterwards, (54) is applied to transform DM into .Step 7: in the final step, (55) is used to aggregate the ranking values of alternatives with respect to three components of the q-ROF-MULTIMOORA method for deriving the final ranking values. Then, all the alternatives are ranked according to the descending order of their final ranking values.

The above steps are also shown in Figure 1.

The q-ROF-MULTIMOORA method is a combination of PA operator, Dombi operational laws, AHM, GHM, and MULTIMOORA. It shows the following advantages:(1)It has the ability of alleviating negative influences of extreme criteria values on the decision results, which makes the decision results more stable and robust.(2)It shows strong flexibility when computing the criteria values due to the Dombi operational laws of q-ROFNs.(3)The HM and GHM operators are capable of capturing the complex interrelationships hiding behind the criteria values. Moreover, the MULTIMOORA method integrates the ranking values obtained from three components for deriving the final ranking values. Thus, the decision results of the q-ROF-MULTIMOORA method are more reasonable and effective.

6. Illustrative Example and Comparison Analysis

In this section, a practical case concerning the evaluation of security algorithm is shown to illustrate the decision-making procedure of the proposed q-ROF-MULTIMOORA method. Afterwards, the influences of the parameters on the decision results are analyzed. Finally, the proposed q-ROF-MULTIMOORA method is compared with the original MULTIMOORA method for processing q-ROFNs.

6.1. Decision Process Using the q-ROF-MULTIMOORA Method

In this section, a real case concerning the evaluation of security algorithms is provided to illustrate the decision procedure of the proposed q-ROF-MULTIMOORA method.

Example 1. With the quick development of Internet applications, more and more user data are stored online. Hackers frequently attack the Internet applications for obtaining the privacy data. To protect users’ privacy data, various security algorithms have been designed and implemented. However, these security algorithms show different features. How to choose the suitable security algorithm is a big challenge for organizations since multiple criteria should be considered. Here, we try to formulate the process of evaluating the security algorithms and selecting a suitable one as a classical MCDM problem. Suppose organization plans to evaluate 5 candidates of security algorithms and select the suitable one by considering 6 criteria: function (), reliability (), usability (), performance (), portability (), and complexity (). Hence, an MCDM problem composed of 5 security algorithms and 6 criteria can be constructed. According to the real requirements for building the security system, the organization sets the weights of criteria as . The technical panel of this organization uses the q-ROFNs to evaluate these five security algorithms with respect to their criteria. All the q-ROFNs are collected to form the DM , as shown in Table 2.Step 1: the values of the parameters , , and are set to 1 and the value of the parameter is set to 3.Step 2: the first five criteria are benefit-type criteria, while the maintenance cost is cost-type criteria. Hence, (45) is used to transform DM in Table 2 into DM as depicted in Table 3.Step 3: for the transformed DM , (47) is applied to compute the ranking value of each security algorithm with respect to the q-ROF-RS component asHence, these security algorithms can be ranked as .Step 4: for the transformed DM , (50) is applied to compute the ranking value of each security algorithm with respect to the q-ROF-RP component asHence, these security algorithms can be ranked as .Step 5: for the transformed DM , (52) is applied to compute the ranking value of each security algorithm with respect to the q-ROF-FMF component asHence, these security algorithms can be ranked as .Step 6: based on the ranking values of security algorithms obtained from three components in Steps 3–5, a new DM is formed. Afterwards, (54) is applied to transform the DM into asStep 7: in the final step, equation (55) is used to aggregate the ranking values of five security algorithms with respect to three components for deriving the final ranking values asThen, the final ranking order of these security algorithms is . Thus, the security algorithm is the suitable one for the organization when building the security system.

6.2. Influences of the Parameters on the Ranking Results

In this section, the influences of the parameters on the ranking results are discussed.

6.2.1. Influence of the Parameter on the Final Ranking Results

The influence of the parameter on the final ranking results of the q-ROF-MULTIMOORA method is first discussed. In this case, the parameters . For the transformed DM in Table 2, the ranking results of security algorithms are shown in Table 4 and Figure 2 when the value of the parameter varies.

From Table 4, it can be known that the ranking results of security algorithms are different when the value of varies. When , the ranking result of security algorithms is . When , the ranking result of security algorithms is . When or , the ranking results of security algorithms are . Although the ranking result of security algorithms changes when the value of the parameter varies, the most suitable security algorithm keeps unchanged, namely, . When , then q-ROFNs reduce to IFNs. When , then q-ROFNs reduce to PFNs. How to determine the reasonable value of depends on the evaluation information provided by the expert. The smallest value of the parameter should satisfy . For instance, if the evaluation information given by the expert is (0.9, 0.9), then the smallest value of the parameter should be 7 so that .

6.2.2. Influences of the Parameters and on the Ranking Results

The influences of the parameters and on the ranking results of the q-ROF-MULTIMOORA method are analyzed in this part. In this case, the parameters and . For DM in Table 2, the ranking results of security algorithms are shown in Table 5 and Figure 3 when the values of the parameters and vary.

From Table 5, it can be seen that the ranking result obtained from the q-ROF-MULTIMOORA method is always except when and . Nevertheless, the most suitable security algorithm is always . When and , the ranking result of security algorithms changes into . Thus, the ranking result obtained from the q-ROF-MULTIMOORA method is not sensitive to the values of these two parameters. In other words, the q-ROF-MULTIMOORA method is robust and effective.

6.2.3. Influence of the Parameter on the Ranking Results

The influence of the parameter on the ranking results of the q-ROF-MULTIMOORA method is analyzed in this part. In this case, the parameters and . For DM in Table 2, the ranking results of security algorithms are listed in Table 6 and Figure 4 when the value of the parameter varies.

From Table 6, it can be seen that the ranking result obtained from the q-ROF-MULTIMOORA method slightly changes when the value of the parameter varies. When the value of the parameter is set to , then the ranking result of security algorithms is . When the value of the parameter is set to a value in the integer set , then the ranking result of security algorithms is changed into . However, the most suitable security algorithm always keeps unchanged, namely, no matter how the value of the parameter varies. Hence, the ranking result that is obtained from the q-ROF-MULTIMOORA method is relatively stable. Because of the Dombi operational laws for q-ROFNs, the q-ROF-MULTIMOORA method has high flexibility by providing the parameter . Experts can adjust the value of the parameter according to the actual situation of MCDM problems.

6.3. Comparative Analysis

For the proposed q-ROF-MULTIMOORA method, it applies the PA operator to alleviate the negative influence of extreme values on the ranking results and integrates the AHM and GHM operators to handle the interrelationships hiding behind criteria values. For the purpose of verifying the effectiveness of the q-ROF-MULTIMOORA method, it is compared with the original MULTIMOORA method [32, 56] for handling the q-ROFNs. Different from the q-ROF-MULTIMOORA method, the original MULTIMOORA method does not contain the PA operator to solve the problem of extreme values and also does not integrate the AHM and GHM operators to handle the interrelationships among criteria values. Hence, it is a suitable way for comparing the q-ROF-MULTIMOORA method with the original MULTIMOORA method. For the purpose of conducting this comparative analysis, an example of evaluating blockchain platforms is given.

Example 2. The blockchain technology has the ability to solve the problems resulting from our increasingly connected society and tackle real-world business concerns. It has been broadly applied to many fields such as distributed cloud storage and health care, as well as payment and transfers. To benefit from the blockchain technology, organizations across the globe try to introduce the blockchain technology for building their own decentralized systems. The blockchain platforms are a good solution, which help organizations to facilitate the development and deployment of decentralized systems. Suppose that an organization wants to evaluate five blockchain platforms with respect to five criteria: usability, performance, scalability, security, and cost. Therefore, evaluating these five blockchain platforms can be formulated as an MCDM composed of blockchain platforms with respect to criteria . The weights of criteria are set to . The transformed DM is given in Table 7.
The original MULTIMOORA method and q-ROF-MULTIMOORA method are applied to process the transformed q-rung orthopair fuzzy DM in Table 7. Because of the limited space, the computation processes are omitted here and the ranking results of different methods are provided in Table 8.
In Table 8, the ranking results obtained from the q-ROF-MULTIMOORA method and original method are provided. Moreover, the ranking results obtained from the three components of q-ROF-MULTIMOORA and original method are also given. From Table 8, it can be noted that the ranking results obtained from the q-ROF-MULTIMOORA method and original MULTIMOORA method are different. Moreover, the ranking result obtained from the q-ROF-RS component of the q-ROF-MULTIMOORA method is different from that obtained from the RS component of the original MULTIMOORA method, so do the ranking results of other two components in the q-ROF-MULTIMOORA method and original MULTIMOORA method. The reasons are analyzed as follows:(1)In the process of evaluating blockchain platforms, there are the interrelationships hiding behind the criteria values. The q-ROF-MULTIMOORA method has been equipped with the AHM and GHM operators to process the interrelationships, while the original MULTIMOORA method is unable to process the hiding interrelationships.(2)For the q-rung orthopair fuzzy DM , there exists relatively great difference among criteria values. The q-ROF-MULTIMOORA method is integrated with the PA operator to alleviate the negative impact of extreme criteria values on the ranking results, while the original MULTIMOORA method ignores this case.From the above analysis, it can be noted that the q-ROF-MULTIMOORA method performs better than the original MUTLIMOORA method because the q-ROF-MULTIMOORA method derives more robust and reasonable ranking results.

7. Conclusions

To solve the security algorithms’ evaluation problem, we propose an efficient q-ROF-MULTIMOORA method in this paper. Our contributions are listed as follows:(1)We combine the PA operator, Dombi operational laws, and AHM and GHM operators to design the q-ROFDPHM, q-ROFWDPHM, q-ROFDPGHM, and q-ROFWDPGHM operators to aggregate q-ROFNs.(2)The proposed q-ROFWDPHM and q-ROFWDPGHM operators are applied to modify the original MULTIMOORA method for proposing a novel q-ROF-MULTIMOORA method.(3)A practical case of evaluating five security algorithms is given to show the decision procedure of the q-ROF-MULTIMOORA method. The influences of the parameters on the ranking results are analyzed.(4)To validate the effectiveness of the proposed q-ROF-MULTIMOORA method, a new example of evaluating blockchain platforms is given.

The proposed methods also have some limitations:(1)the q-ROFSs model, the uncertain information uses only three characteristic functions and does not have the characteristic function that denotes the degree of abstinence. This limitation can be removed by introducing the concept of T-spherical fuzzy sets, which was proposed by Mahmood et al. [57]. It has been studied by many scholars [58,59].(2)The weights of attributes are directly given in this study. It ignores the objective significance. The method combining the objective weights and subjective weights should be considered in the future.(3)In the proposed q-ROF-MULTIMOORA method, the q-ROFDPHM and q-ROFDPGHM operators do not consider the interaction between the membership degree and the nonmembership degree of q-ROFSs, which will produce unreasonable aggregated results.

The proposed q-ROF-MULTIMOORA method has some potential applications. In the future research plan, we intend to apply the proposed method into the sustainable supplier selection [60]. According to the third limitation mentioned in the above paragraph, the idea of interaction operational rules [61] will be used to improve the proposed method.

Data Availability

The data used to support the findings of this study are included within the article.

Conflicts of Interest

The authors declare that they have no conflicts of interest.

Acknowledgments

This research work was supported by the Project of Exploration and Practice of Network Engineering Major (Intelligent Internet of Things Direction) University-Enterprise Collaborative Talent Training Scheme Model Based on New Engineering and Technical Disciplines.