1. Introduction
In mathematics, modeling is the process of representing practical problems and events in a mathematical format or language. There are plenty of techniques for carrying out mathematical modeling. When it comes to modeling uncertainty, indistinctness and inaccuracy, fuzzy set theory and fuzzy logic are the right choices because they have the right tools for the said purpose. This theory was introduced by Zadeh [
1] in 1965. A fuzzy set is a collection of objects that are assigned fuzzy value (real numbers between
and
, inclusively) mappings. This numerical value defies the partial membership of the elements to the fuzzy set. Afterward, this theory caught the attention of researchers worldwide. Today, the fuzzy set theory is mainly used for decision-making processes. Kandel and Byatt [
2] wrote a research article on fuzzy sets (FSs), fuzzy statistics and fuzzy algebra. Robinson [
3] described the fundamentals of FSs and their usages in geographic information systems. Yang et al. [
4] showed the use of FSs in database acquisition. Kabir and Papadopoulos [
5] reviewed the applications of FSs for safe and reliable engineering. Mardani et al. [
6] applied FSs-based decision making (DM) to assess medical problems and healthcare. Mishra et al. [
7] comprehended the fuzzy DM framework for choosing drugs to treat COVID-19 with mild symptoms, and Khalil et al. [
8] proposed fuzzy logical algebra with its application to the effectiveness of medications for COVID-19.
Ramot et al. [
9] reformed the structure of FSs by altering its membership mapping values from real numbers to complex numbers. The extended structure is called the complex FS (CFS). Hence, a CFS is a collection of objects that is assigned a complex valued mapping with a modulus less than or equal to
. The complex numbers are more often written in exponential form. The coefficient of exponential function is called the amplitude term, whose value is a fuzzy number, and the exponent is called the phase term, which also takes on values from a unit interval
. Due to its complex structure, a CFS can model multivariable problems. The phase term usually refers to phase-altering variables such as time phase or periodicity. A CFS is a generalization of FS, as the CFS with
phase term value becomes an FS. Ma et al. [
10] proposed a method that uses CFSs for prediction problems, i.e., multiple periodic factor prediction. Tamura et al. [
11] first used FRs for pattern classification, and Yang and Shih [
12] further extended it in cluster analysis. In 2003, Ramot et al. [
13] formulated a complex FR (CFR) between two CFSs. Yazdanbakhsh and Dick [
14] analyzed an organized review of CFSs and logic. Ali et al. [
15] applied CFSs in the TOPSIS method. Nasir et al. [
16] defined interval-valued CFRs and applied their method for studying the medical diagnoses and life expectancies of patients. Jan et al. [
17,
18,
19] analyzed cybersecurity and cyber-threats using the extensions of CFRs.
Zhang [
20] further generalized FSs and defined the concept of bipolar FSs (BFSs). A BFS is composed of objects carrying a pair of numbers; the positive membership mapping that takes on values form a unit interval
and the negative membership mapping, which takes on the values from
, thus allowing the modeling of objects that possess dual properties. Each of the membership mapping represents two different and opposing properties of an object. Zhang [
21] also proposed the YinYang BFSs. Abdullah et al. [
22] introduced the BF soft sets (BFSSs) and applied them in DM problems. Sarwar and Akram [
23] offered the concept of bipolar fuzzy circuits and discussed their applications. Akram and Arshad [
24] showed the bipolar fuzzy ELECTRE-I and TOPSIS methods for diagnosis. Lee and Hur [
25] considered bipolar FRs (BFRs). Ali et al. [
26] presented the attribute reductions of BFR decision systems. Alkouri et al. [
27] extended BFSs to complex BFSs (CBFSs) with their applications. The advancement in the structure of CBFSs is the inclusion of complex valued positive and negative membership mappings. This improvement permitted the CBFS to model multidimensional uncertainty problems of periodic nature. Akram et al. [
28] considered the solution of a CBF linear system. Gulistan et al. [
29] applied CBFSs to a transport company, and Mahmood and Rehman [
30] showed the applications of CBFSs in generalized similarity measures. Aliannezhadi et al. [
31] showed an algorithm for the solution of linear programming-related problems of BFRs. Dutta and Doley [
32] proposed a medical diagnosis under BFSs.
This article initiates complex bipolar fuzzy relations (CBFRs) as a generalization of CBFRs, CFRs and FRs. These concepts have similar structures as CBFSs—a pair of objects taking two complex values as their positive and negative membership mappings. This concept will help to find out the relation between CBFSs. Substituting phase terms equal to in CBFR makes it a BFR. When the negative membership mapping’s value is zero in a CBFR, then it becomes a CFR. For zero phase term and zero negative membership value, CBFR converts to a FR. Thus, a CBFR is a supreme tool that can handle all sorts of information. In addition, the Cartesian product between two CBFSs is also formulated. Furthermore, the types of CBFRs such as complex bipolar fuzzy reflexive relation, complex bipolar fuzzy irreflexive relation, complex bipolar fuzzy symmetric relation complex bipolar fuzzy antisymmetric relation, complex bipolar fuzzy transitive relation, complex bipolar fuzzy equivalence relation, complex bipolar fuzzy strict order relation, complex bipolar fuzzy complete relation, complex bipolar fuzzy partial order relation, complex bipolar fuzzy preorder relation, complex bipolar fuzzy linear order relation, inverse of a CBFR, and the complex bipolar fuzzy composite relation are defined. Moreover, the equivalence classes for complex bipolar fuzzy equivalence relation are defined. All of these definitions are supported by appropriate and palpable examples.
In the modern world, the economy of any country highly depends on energy resources. In the late 19th century, petroleum became the leading source of energy, which is used as fuel in vehicles and countless industrial machineries. Nations around the world tend to achieve power and strong geopolitical position. A country that has more access to energy resources also has better geopolitical position. They can dictate other nations by making advantageous policies to show their power. Since the petroleum industry adds importance and value to a nation’s economy, it has many threats and risks ranging from software-based attacks to attacks by terrorists. In this paper, the analysis of security measures and terrorist attacks on petroleum industries is carried out. For that reason, the CBFR is used to model the situation and achieve the best results. By using the techniques of translating practical problems to fuzzy values, the information of selected problems was converted into fuzzy information. Further, the applications of BFSs and CBFSs were learned by the works of Ref [
19,
20,
26]. In short, the methodology of previous researchers is followed, but the modeling technique and methods of solutions are improved. This research has used the improved structure, which are CBFS and CBFR. The major benefit of this structure is that it takes the time factor into consideration, whereas the other structures do not discuss time. The advantages of the proposed structures are systematically described in further sections of the paper. Lastly, a comprehensive comparative study has been carried out among the proposed methods and the older methods. The method introduced in this article is stronger than other methods in all aspects. Further, it has the ability to deal with the information of FSs, CFSs and BFSs because it generalizes all of them. Moreover, it provides complete and meaningful results for the application problem.
The remainder of the paper is organized as:
Section 2 reviews the fundamental concepts that provide a base for the proposed methods.
Section 3 defines the novel concepts of CBFRs and their types. In addition, some interesting results have been achieved. An application of the proposed methods for security and threat analysis in petroleum industries is proposed in
Section 4. A comprehensive and head-to-head comparison of the proposed method with other methods is carried out in
Section 5. Finally,
Section 6 concludes the paper.
2. Preliminaries
In this section, some of the fundamental and essential definitions are reviewed, such as fuzzy set (FS), complex FS (CFS), bipolar FS (BFS), complex BFS (CBFS), complex fuzzy relation (CFR) and the Cartesian product between two CFSs.
Definition 1. [
1] Suppose
represents a universal set. Then, a fuzzy set (FS) on
, denoted by
, has the following organization
where
is a representative mapping, known as the membership mapping and defined as
.
Example 1. is a fuzzy set.
Definition 2. [
9] Suppose
represents a universal set. Then, a complex fuzzy set (CFS) on
, denoted by
, has the following organization
where
and
are representative mappings, known as amplitude term and phase term of membership mapping, respectively, and defined as
and
. Moreover,
.
Example 2. is a complex fuzzy set.
Definition 3. [
13] Let
and
be two CFSs in
. The Cartesian product (CP) of
and
is defined as follows:
where
and
.
Definition 4. [
13] A complex fuzzy relation (CFR)
between two CFSs is the subset of their CP.
Example 3. and
are the CFSs, and their CP is as follows:
Since by definition, the CFR between two CFSs is the subset of their CP, thus CFR
is as
Definition 5. [
20] Suppose
represents a universal set. Then, a bipolar fuzzy set (BFS) on
, denoted by
, has the following organization
where
and
are representative mappings, known as positive membership mapping and negative membership mapping, respectively, defined as
and
.
Example 4. is a bipolar fuzzy set.
Definition 6. [
27] Suppose
represents a universal set. Then, a complex bipolar fuzzy set (CBFS) on
, denoted by
, has the following organization
where
,
,
and
are representative mappings.
and
are known as amplitude term and phase term of positive membership mapping, respectively.
and
are known as amplitude term and phase term of negative membership mapping, respectively. These terms are defined as follows:
and , and . Moreover, .
Example 5.
is a complex bipolar fuzzy set.
3. Complex Bipolar Fuzzy Relations and Their Properties
This section contains the main contributions of the article. Here, the complex bipolar fuzzy relations (CBFRs) and its types are defined. A self-explanatory example is given for each definition. Moreover, some useful results and interesting properties of the proposed structures have been discussed.
Definition 7. Let
and
be two CBFSs in
. The CP of
and
is defined as follows:
where
,
,
and
.
Definition 8. A complex bipolar fuzzy relation (CBFR) between two CBFSs is the subset of their CP.
Example 6. is a CBFSs, and the CP
is as follows:
Since, by definition, the CBFR between two CBFSs is the subset of their CP, CBFR
is as follows:
Definition 9. A complex bipolar fuzzy relation (CBFR) on a CBFS is said to be a complex bipolar fuzzy reflexive relation implies that .
Example 7. Following the Cartesian product of CBFS
in Example 6, the complex bipolar fuzzy reflexive relation
is with
Definition 10. A CBFR on a CBFS is said to be a complex bipolar fuzzy symmetric relation then implies that .
Example 8. Following the Cartesian product of CBFS
in Example 6, the complex bipolar fuzzy symmetric relation
is with
Definition 11. A CBFR on a CBFS is said to be a complex bipolar fuzzy transitive relation , then and imply that .
Example 9. Following the Cartesian product of CBFS
in Example 6, the complex bipolar fuzzy transitive relation
is
Definition 12. If a relation possesses the properties of complex bipolar fuzzy reflexive relation and complex bipolar fuzzy transitive relation, then is called a complex bipolar fuzzy preorder relation.
Example 10. Following the Cartesian product of CBFS
in Example 6, the complex bipolar fuzzy preorder relation
is with
Definition 13. If a relation possesses the properties of complex bipolar fuzzy reflexive relation, complex bipolar fuzzy symmetric relation and complex bipolar fuzzy transitive relation, then is called a complex bipolar fuzzy equivalence relation.
Example 11. Following the Cartesian product of CBFS
in Example 6, the complex bipolar fuzzy equivalence relation
is
Definition 14. A CBFR on a CBFS is said to be a complex bipolar fuzzy irreflexive relation if implies that .
Example 12. Following the Cartesian product of CBFS
in Example 6, the complex bipolar fuzzy irreflexive relation
is
Definition 15. If a relation possesses the properties of complex bipolar fuzzy irreflexive relation and complex bipolar fuzzy transitive relation, then is called a complex bipolar fuzzy strict order relation.
Example 13. Following the Cartesian product of CBFS
in Example 6, the complex bipolar fuzzy strict order relation
is with
Definition 16. A CBFR
on a CBFS
is said to be a complex bipolar fuzzy antisymmetric relation if
then
and
imply that
Example 14. Following the Cartesian product of CBFS
in Example 6, the complex bipolar fuzzy antisymmetric relation
is
Definition 17. If a relation possesses the properties of complex bipolar fuzzy reflexive relation, complex bipolar fuzzy antisymmetric relation and complex bipolar fuzzy transitive relation, then is called a complex bipolar fuzzy partial order relation or complex bipolar fuzzy order relation.
Example 15. Following the Cartesian product of CBFS
in Example 6, the complex bipolar fuzzy partial order relation
is with
Definition 18. A CBFR on a CBFS is said to be a complex bipolar fuzzy complete relation if imply that either or .
Example 16. Following the Cartesian product of CBFS
in Example 6, the complex bipolar fuzzy complete relation
is
Definition 19. If a relation possesses the properties of complex bipolar fuzzy reflexive relation, complex bipolar fuzzy antisymmetric relation, complex bipolar fuzzy complete relation and complex bipolar fuzzy transitive relation, then is called a complex bipolar fuzzy linear order relation or complex bipolar fuzzy total relation.
Example 17. Following the Cartesian product of CBFS
in Example 6, the complex bipolar fuzzy linear order relation
is with
Definition 20. The complex bipolar fuzzy converse relation or complex bipolar fuzzy inverse relation, denoted by
, of a CBFR
is given as
Example 18. Consider the following CBFR
on some CBFS with
The CBFR
is the complex bipolar fuzzy inverse relation of
with
Definition 21. The complex bipolar fuzzy equivalence class of
mod
, where
is a complex bipolar fuzzy equivalence relation on a CBFS
, is given as
Example 19. For a CBFS
in Example 6, consider the following complex bipolar fuzzy equivalence relation
The complex bipolar fuzzy equivalence classes are given as follows:
Definition 22. Let the complex bipolar fuzzy composite relations
and
on a CBFS
be with
and
then
Then,
is given as
Note that .
Example 20. Consider the following CBFRs
and
on some CBFSs with
Then, , and . That is, .
Theorem 1. Let be a universal set and be a CBFS on . Then, a CBFR on is a complex bipolar fuzzy symmetric relation .
Proof of Theorem 1. First, suppose that
, which implies the followings. According to Definition 20, i.e., for any
complex bipolar fuzzy inverse relation, we have
Since
, we have
Therefore, by the statement of theorem,
is a complex bipolar fuzzy symmetric relation on
. Conversely, assume that
is a complex bipolar fuzzy symmetric relation on
, then Definition 10 implies the following
However, by Definition 20, Equation (1) implies the following
Thus, by Equations (2) and (3), we have, . Hence, the assertion is proven. □
Theorem 2. Let be a universal set and be a CBFS on . Then, a CBFR on is a complex bipolar fuzzy transitive relation .
Proof of Theorem 2. First, suppose that
is a complex bipolar fuzzy transitive relation on a CBFS
. Let
Using Definition 11, we have
and
imply that
By Equations (4) and (5), we have .
Conversely, assume that
. Then, by Definition 22, we have
and
imply that
However, it is assumed that . Thus, .
Therefore, is a complex bipolar fuzzy transitive relation on a CBFS . □
Theorem 3. Let be a universal set and be a CBFS on . Then, a CBFR on is a complex bipolar fuzzy equivalence relation .
Proof of Theorem 3. Suppose that
Then, Definition 10 implies that
. Now, by using Definition 11, we have
. In addition, Definition 22 implies that
Therefore,
Conversely, assume that
. By Definition 22, there must be
such that
and
. However,
is a complex bipolar fuzzy equivalence relation on
. Therefore,
is also a complex bipolar fuzzy transitive relation. Hence, it implies that
. Thus, we have
Therefore, Equations (7) and (8) imply that . □
Theorem 4. Let be a universal set and be a CBFS on . Then, the inverse complex bipolar fuzzy partial order relation on is a complex bipolar fuzzy partial order relation on .
Proof of Theorem 4. As a complex bipolar fuzzy partial order relation
on a CBFS
,
possesses the properties of complex bipolar fuzzy reflexive, antisymmetric and transitive relations. Since
is a complex bipolar fuzzy reflexive relation, any
implies that
. Then, we have
Let and . Then, Definition 20 implies that and
Since
is a complex bipolar fuzzy antisymmetric relation, we have
Let and . Then, Definition 20 implies that and
Since
is a complex bipolar fuzzy transitive relation, we have
Hence, (10)–(12) prove that is a complex bipolar fuzzy partial order relation on . □
Theorem 5. Let be a universal set and be a CBFS on . Then, a complex bipolar fuzzy equivalence relation on implies that .
Proof of Theorem 5. Suppose that and . This implies that . By Definition 11, we have .
By using Definition 10 for , we obtain . Likewise, assume that , which implies that . By using Definition 11, we have .
Thus, (13) and (14) imply that .
Conversely, suppose that with which implies that
and . Using Definition 10, we have.
Now, for and , Definition 11 implies that .
Hence, the proof is complete. □
4. Application
In this section, the concepts introduced in the previous section will be used to model and evaluate the security problems faced by the petroleum industries.
4.1. Security Risks to the Petroleum Industries
Every nation on the geographic map tends to attain power. In other words, they want to gain a strong geopolitical position. In order to achieve these goals, the countries need to work out some practices based on essential policies. One of the major aims is access to energy resources. The nations that have more access to resources of energy have a better geopolitical position because they use certain energy policies to achieve economic advantages. These nations make other nations reliant, which is the indication of their power. Water energy, coal, solar energy, wind energy, petroleum (oil and gas), nuclear energy, biomass plants, etc., are some of the energy resources. On an international scale, petroleum has been the most traded product since the late 1800s. Today, it is used as the primary fuel for industrial machinery.
Since petroleum is such a treasure, these industries face many security risks. In this application, terrorist attacks against the petroleum industry and the management of these attacks will remain the primary discussion. International terrorists, irrespective of politics and societies, choose to target the petroleum industries. There are several cases of such terrorist attacks, for example, The Flute [
33], ULFA attacking the pipelines in Assam [
34], pipeline sabotage in Iraq [
34] and attacks by the EPS in Mexico. In
Section 4.2, these terrorist attacks are discussed.
Section 4.3. provides the details for possible securities to cope with these attacks. Finally,
Section 4.4. applies the proposed methods to provide the mathematical arguments for these terrorist attacks and their management.
4.2. Terrorist Attacks
Before stating the capabilities of terrorists, we feel the urge to discuss the cycle of petroleum, starting with its extraction from the wells to its consumption or combustion. The whole process has been divided into the following five stages (
Figure 1):
Extraction and production: After exploration, the site for drilling/mining is determined. Then, the process of extraction begins. This process is time-consuming and costly. Numerous measurements, experiments, sampling, drilling and boring wells are required to approve the existence of the natural resource. There are many obstacles in the said process, which are somewhat removed by modern machineries.
Crude oil transportation: Crude oil needs to be transferred from wells to a refinery or storage facilities. After successful extraction of raw petroleum from the Earth, the best mode of transportation is determined. There are several factors influencing the means of transportation, such as geography, infrastructure and cost implications. Crude oil can be transported through various means, which are briefly described in
Table 1. Since, pipelines are the most commonly used option to transport the crude oil, it is not only the cheapest but also a safe way for transporting petroleum from upstream to refinery and then from refinery to downstream. Thus, this application will consider the pipelines for the mathematical analysis.
Refinery: A refinery is an industrial plant that refines/transforms the crude oil into different pure and perfect energy products, which can be used as fuels, such as heating oils, gasoline, petrol and diesel. These refineries also serve as secondary storage for petroleum products.
Refined product transport: Once the crude oil and raw petroleum is refined, the final and pure products are ready to be distributed. Therefore, the commodities are moved to their destined storages. The options of transport are similar to the upstream transportation. Natural gas uses pipelines and petrol/diesel are mostly moved by oil tankers.
Consumption: Finally, the ultimate products are delivered to the consumers; i.e., filling stations, houses, factories, industries, etc. The consumers burn these resources to fulfill their energy requirements.
As we are now familiar with the complete cycle and all the stages of the process, it is convenient to discuss terrorist attacks.
Table 2 gives the abbreviations and the mathematical values of these attacks for mathematical analysis. The assignation of the fuzzy values to these risk factors is an essential technique. In order to do so, the risks are deeply studied and the situations of different companies are carefully analyzed. Then, on the basis of these expert observations, each of the factors are assigned a value. These values describe different aspects of a factor. The proposed model is elegant and supple in that its numerical values can be representative of diverse characteristics. In this paper, the threat and hazard levels have been characterized by these values. Further explanations will be provided in the calculation sections.
- a.
Attack on Exploration Site
Explorations and developments are often sited in faraway areas, where communication to the authorities, transportation networks and related security setups are poor. Thus, it is difficult to stop an outside invasion. In the case of state-served security for shielding the site, attackers usually outnumber these forces, since these terrorists typically belong to the surrounding groups. These attacks also require relatively small amounts of explosives, which allows a single person to bring such things simultaneously. Thus, such sites are attractive targets for them. These terrorists can use vehicles, UAVs and speedboats. Thus, they are capable of performing organized attacks on these isolated locations.
These terrorists can possibly coordinate a wide range of attacks. Some possible attacks are listed below:
Murder or kidnap the employees;
Suicide attacks (vehicle bombs);
Cover attacks;
Destruction of pipelines;
Destroying communication systems;
Hijacking fuel carrying vehicles.
- b.
Attack on Transport
Tankers are comparatively easy targets for the terrorists. They aim to attack ships at sea because of the following reasons:
Limited onboard security countermeasures to discourage potential attackers such as high-powered sirens or pressured water hoses;
The availability of security crew is reasonably low;
The freight onboard is an ecologically harmful and inflammable product;
The support accessible from external securities is only with extensive time delays.
- c.
Attack on Refinery
In the cycle of petroleum fuels, a refinery is the most valuable asset. Its security is the utmost necessity for a continuous operation. The refining capacities are extended to the limits in numerous countries. The greatest security challenges for a refinery are due to the following reasons:
Refinery covers a large area;
Complex operations;
Substantial flow of material and people, i.e., external contractors and staff.
The national authorities and managing crew of the refinery acknowledge its worth. Henceforth, they provide a number of security layers around it.
- d.
Attack on Offshore Platform
The offshore platforms are part of the national framework of critical infrastructure. Hence, they are given greater physical security. However, a fighter ship with superior operational and technical capabilities cannot hold off a terrorist attack, and it is vulnerable to a suicide terrorist boat attack.
- e.
Attack on Retailing Sector
When the final products are refined in the refinery from the crude oil, they are distributed to the trading sectors. Since these products are highly inflammable and hazardous; thus, they are the most vulnerable assets to attacks. Trucks and vehicles (railcars) carrying these fuels are visible in traffic flows. The attack against a stationary target is comparatively easier than performing an attack against a moving target, as these vehicles have many episodes of parking, loading and unloading, which lead to smooth attacks. Moreover, the sale and purchase points (storage region and filling stations) are physically insecure and are located in highly populated areas. Due to great population density and the explosive nature of gas and fuels, any terrorist attack might have major consequences. Henceforth, such weak (defenseless) points are attractive targets for attackers. Additionally, considering the risk of an ill use of trucks carrying fuel tanks, they could be used as an explosive weapon, which can easily destroy a building. The fire afterward will have additional consequences. Thus, there is high possibility of huge destruction.
4.3. Recommended Security Measures
As the petroleum industries face growing security threats and attacks, it is recommended to counter these threats by engaging in a two-pronged global initiative, i.e., merging the features of operational security and strategic security.
Terrorists are expected to organize strong tactical attacks, such as attacking a few components of the petroleum cycle and responding aggressively to security crew. Thus, all the assets of petroleum cycle (extraction to distribution) should be secured. It must be considered a national strategic concern. Some of the recommended physical security practices are discussed below:
Make organizations stronger through government security agencies and first responders. For mathematical analysis, this strategy will be denoted by .
Diminish the possibility of successful terrorist attack by advanced, technical and operational security methods. This strategy will be denoted by .
In order to shrink the chances of terrorist attacks, carry out continuous security drills and exercises at all levels. This strategy will be symbolized by .
In order to minimize the inside terrorizations and strengthen the company’s resilience, it is required to adopt the culture of corporate security. This strategy will be symbolized by for mathematical purposes.
Update and evaluate the security tactics and strategies to counter the risks. Mathematically, it will be represented by .
A regular assessment of risk and threat should be carried out in order to identify the risks in case of a changing environment. will be used to represent this strategy in calculations.
Similar to the construction rules of
Table 2,
Table 3 is constructed, which sets the security techniques and allocates them into certain fuzzy numbers. These fuzzy numbers are representatives of security and weakness levels. The values assigned to these securities greatly depend on the analysis of circumstances and expert observation of the securities in different scenarios. Based on these careful observations, the values are professionally assigned after being translated into fuzzy theory.
Currently, to minimize security threats and risks, major struggles are being made to achieve stronger assessment and security abilities:
- g.
Development of high technology (denoted by ): Robotic helicopters, automatic weaponized UAVs, wrapping the pipelines with carbon fiber for protection, use of modern geographic and satellite monitoring data systems combined with sets of ground-based data for integrated 3D-vulnerability assessment, application of alarms with seismic sensors for providing instant warning to response teams.
- h.
Logistics (denoted by ): Maintaining a sufficient inventory of custom-built replacement parts, shortening the repair time after an attack, solidification of physical security at serious interchanges, better physical access control, encrypted communication, layered and restricted access for reaching areas of a higher value, instantaneous monitoring of vehicle data.
- i.
Training and Policy (denoted by OS3): Execution of industrial corporate security awareness programs for the development of a security policy, facilitating all the workers with security training and security strategies. Strategies to identify insider, global marketing, and communication of security as a defensive tool.
4.4. Fuzzy Mathematical Analysis
The algorithm for carrying out the proposed method is depicted in
Figure 2.
In order to perform a mathematical analysis based on the proposed methods, a set of securities
and a set of terrorist attacks
are constructed. In previous subsections,
Table 2 and
Table 3 describe the sets
and
, respectively. Additionally, the values of positive and negative membership mappings are also assigned. Hence,
In set , the values of positive membership mappings indicate the security levels, and the values of negative membership mappings indicate the weakness levels. Each value is represented by a complex number in an exponential form. The amplitude terms specify the partial membership of the elements to the set, i.e., the higher values of positive membership amplitude terms show that the security provided is strong and vice versa, whereas the higher value of negative membership amplitude terms show the weakness levels of security practices and vice versa. Moreover, the phase terms refer to the duration or time phase. Hence, these values describe the specifications of security with respect to the time phase. In case of positive values, the numbers closer to are considered high and those near are said to be low. In contrast, the negative membership values are higher when they are close to and lower when closer to .
Similar is the case with the set of attacks . The value of positive membership mapping of an attack represents the level of threat and strength of that attack with respect to some time frame. Conversely, the values of negative membership mapping characterize the level of danger, hazard or disaster that can happen due to those attacks. Again, the value of amplitude terms shows the strength and weakness of said properties that are possessed by an attack. The phase terms refer to time phase. The higher values of amplitude terms in positive membership mappings are signs of extreme attacks and vice versa, while the higher values of amplitude terms in negative membership mappings point toward the ability to achieve higher damage and destruction and vice versa. The rules of higher and lower values are the same as for the set of securities S.
Now, the Cartesian product
is found to study the relationships of these attacks against the recommended security types. The Cartesian product
is presented in
Table 4, which is obtained by using Definition 8.
.
The above table shows the Cartesian product between the set of securities and the set of terrorist attacks . Both of the sets are CBFSs; thus, their Cartesian product is a CBFR. Each member of is in the form of a pair of elements. The first element in each pair belongs to the set of securities, and the second element belongs to the set of terrorist attacks. The relation between the elements of a pair is described through the numerical values, i.e., values of positive and negative membership mappings. Due to their complex nature, the values are complex numbers written in exponential form. The positive membership mapping represents the level of security provided by a particular security against a certain attack. For example, the pair tells the relations between security of high-tech development and the terrorist attack on a refinery. Its positive membership mapping takes values to mean the security level of high-tech development against an attack on a refinery, and the negative membership mapping explains the vulnerability of the said security system to other attacks after being attacked.
The amplitude term with the higher value (closer to ) of a positive membership mapping tells that the security level provided by the first element against the attack in the ordered pair is great, and the lower value of positive membership mapping (near ) shows that the security strategy cannot hold the particular attack. Alternatively, the amplitude term with higher value (close to ) of a negative membership mapping tells that the level of vulnerability of the security system, after being hit by a terrorist attack (mentioned in the order pair), is high, and the lower value of amplitude term of negative membership mapping (near ) shows that the exposure of that security system is low. The phase terms refer to the time phase. For better understanding, let us interpret the relation . The value of positive membership mapping tells that high-tech development provides higher security of or for half a month (in the case when the time phase is a month) against an attack of terrorists on an exploration site, whereas the value of negative membership puts forward that, after an attack on a refinery, the defending high-tech development system weakens up to for a 10th of a month, i.e., 3 days. In the same way, the numerical results of every relation can be interpreted.
The proposed modeling method provides a possible solution for security issues for the oil and gas industries. The authorities can think of several securities and assume different attack types. The proposed method has the capability of suggesting the best security strategy for particular sites against specific attacks. Furthermore, the repair time and the time of high alerts after an attack can be predicted. Conversely, a question arises on the validity of the results achieved by the proposed modeling method when they are applied to large data. The outcomes obtained in this article can be verified by an ample discussion and systematic analysis. In application, we only apply the proposed model to the data for the security problems faced by petroleum industries. In this case, if the data size increases, the proposed model is still applicable. Hence, the working of this model and solution methods are impeccable for any size of data. Moreover, the contribution of this research, particularly the models and the mathematical techniques, is to provide advantages to the industries and help them build a secure industrial system. The industries might provide a small amount of data, which can be manually manipulated using the proposed method. However, if an industry offers big data, then a computer-based program and algorithm will be required to carry out the operations to achieve the obligatory results.
The validity of the proposed methodology and given structures is experimentally shown in the coming section by a deep comparative study. Here, the practical world problems are analyzed carefully and modeled through fuzzy information. Initially, the information is converted to the fuzzy numerical form by standard methodology, as used by Zhang [
19,
20], Lee and Hur [
24], Alkouri et al. [
26] and Ref [
31,
32]. Then, for solving fuzzy information, the CBFSs and CBFRs are selected to fulfill the requirement of a strong fuzzy structure and tool. Next, we present the detailed comparison and head-to-head advantages of the selected model and structures in the following section.