• No results found

A new ranking method to fuzzy data envelopment analysis

N/A
N/A
Protected

Academic year: 2021

Share "A new ranking method to fuzzy data envelopment analysis"

Copied!
7
0
0

Loading.... (view fulltext now)

Full text

(1)

Contents lists available atScienceDirect

Computers and Mathematics with Applications

journal homepage:www.elsevier.com/locate/camwa

A new ranking method to fuzzy data envelopment analysis

Meilin Wen

a,∗

, Cuilian You

b

, Rui Kang

a

aDepartment of System Engineering of Engineering Technology, Beihang University, Beijing, 100191, China bCollege of Mathematics and Computer Science, Hebei University, Baoding 071002, China

a r t i c l e i n f o

Article history:

Received 19 June 2009

Received in revised form 22 November 2009

Accepted 26 February 2010

Keywords:

Data envelopment analysis Efficiency

Credibility measure Fuzzy ranking method Fuzzy simulation

a b s t r a c t

Due to its wide practical use, data envelopment analysis (DEA) has been adapted to many fields to deal with problems that have occurred in practice. One adaptation has been in the field of ranking decision-making units (DMUs). Most methods of ranking DMUs assume that all input and output data are exactly known, but in real life the data cannot be precisely measured. Thus this paper will carry out some researches to DEA under fuzzy environment. A fuzzy comparison of fuzzy variables is defined and the CCR model is extended to be a fuzzy DEA model based on credibility measure. In order to rank all the DMUs, a full ranking method will be given. Since the ranking method involves a fuzzy function, a fuzzy simulation is designed and embedded into the genetic algorithm to establish a hybrid intelligent algorithm. However, it is shown to be possible to avoid some of the need for dealing with these nonlinear problems by identifying conditions under which they can be replaced by linear problems. Finally we will provide a numerical example to illustrate the fuzzy DEA model and the ranking method.

©2010 Elsevier Ltd. All rights reserved.

1. Introduction

Data envelopment analysis (DEA) was initially proposed by Charnes et al. [1]. There exist many models for measuring and evaluating the relative efficiencies of a set of decision-making units (DMUs), such as [2–6]. Since these important works, DEA has been extensively used for evaluating the performance of many activities. Examples include railway performance [7], R & D project evaluation [8], productivity evaluation on research institutions [9], firm’s financial statement analysis [10], and even evaluation for Olympic achievements [11]. For more DEA application examples, see [12].

The basic DEA results group the DMUs into two sets: one set is efficient DMUs and the other is inefficient DMUs. In many cases, it is necessary to give a full ranking of the DMUs. For this purpose, different methods with different properties to achieve full ranking of DMUs have been proposed. Sexton et al. [13] proposed the ranking of DMUs based on a cross-efficiency. The bench marking, initially developed by Torgersen [14], was employed to rank all the efficient DMUs. Andersen & Petersen [15] first developed the most popular ranking method called super-efficiency.

Although DEA offers many advantages relative to many other statistical approaches, some limitations have to be considered. One important problem involves its sensitivity to data, so we should have accurate measurement of inputs and outputs in order to successfully apply DEA. However, in many situations, such as in a manufacturing system, a production process or a service system, inputs and outputs are volatile and complex so that it is difficult to measure them in an accurate way. Instead the data can be given as a fuzzy variable. Many fuzzy approaches have been introduced in the DEA literature [16–19]. Recently, Guo and Tanaka [20] and Lertworasirikul et al. [21] applied possibility measure proposed by Zadeh [22] to the fuzzy DEA model. Although possibility measure has been widely used, it has no self-duality property which

Corresponding author.

E-mail addresses:wenmeilin@buaa.edu.cn(M. Wen),youcl05@mails.tsinghua.edu.cn(C. You),kangrui@buaa.edu.cn(R. Kang). 0898-1221/$ – see front matter©2010 Elsevier Ltd. All rights reserved.

(2)

is absolutely needed in both theory and practice. In order to define a self-dual measure, Liu and Liu [23] presented credibility measure in 2002. This paper will extend the CCR model to a fuzzy DEA model based on credibility measure, and then give a fuzzy ranking method to rank all the DMUs with fuzzy inputs and outputs.

This paper is organized as follows: Section2will give some introduction to CCR model; In Section3, some basic definitions and theory on credibility measure will be presented; The fuzzy DEA model and the fuzzy ranking method will be given in Section4; Section5will design a hybrid algorithm combined with a fuzzy simulation and genetic algorithm to solve the fuzzy model; Section6will predigest the fuzzy model when the membership functions of all the inputs and outputs are quasiconcave functions; Finally the fuzzy ranking method and the algorithm is illustrated by a numerical example in Section7.

2. CCR model

This section will give some basic introduction to CCR model, which is a linear programming based method proposed by Charnes et al. [1]. Firstly let us review some symbols and variables:

DMUi: theith DMU,i

=

1

,

2

, . . . ,

n; DMU0: the target DMU;

xi

=

(

xi1

,

xi2

, . . . ,

xip

)

: the inputs vector of DMUi,i

=

1

,

2

, . . . ,

n;

x0

=

(

x01

,

x02

, . . . ,

x0p

)

: the inputs vector of the target DMU0;

yi

=

(

yi1

,

yi2

, . . . ,

yiq

)

: the outputs vector of DMUi,i

=

1

,

2

, . . . ,

n;

y0

=

(

y01

,

y02

, . . . ,

y0q

)

: the outputs vector of the target DMU0.

In CCR model, the efficiency of entity evaluated is obtained as a ratio of the weighted output to the weighted input subject to the condition that the ratio for every entity is not larger than 1. Mathematically, it is described as follows:

(

CCR

)

max u,v

θ

=

vTy0 uTx 0 subject to: vTyj

uTxj

,

j

=

1

,

2

, . . . ,

n u

0 v

0 (1)

which is equivalent to the linear programming as follows:

(

CCR

)

max v

θ

=

vTy0 subject to: uTx0

=

1 vTyj

uTxj

,

j

=

1

,

2

, . . . ,

n u

0 v

0

.

Since CCR’s original work, a number of variations of these linear programs have been developed and implemented in a variety of contexts. For instance, the ratio can be maximized either by maximizing the outputs for a given value of the inputs, or by minimizing the inputs for given values of the outputs. Each of these options yields a different linear program. But the essence is the same, the detailed can consult [6].

Definition 1(Efficiency). DMU0is efficient if

θ

=

1, where

θ

∗is the optimal value of(1).

3. Credibility measure

In this section, we will state some basic concepts and results on fuzzy variables. These results are crucial for the remainder of this paper. For the up-to-date credibility theory, the interested reader can consult [24,25].

LetΘbe a nonempty set, andP

(

Θ

)

the power set ofΘ. For anyA

P

(

Θ

)

, Liu and Liu [23] presented a credibility measure Cr

{

A

}

to express the chance that fuzzy eventAoccurs. Li and Liu [26] proved that a set function Cr

{·}

is a credibility measure if and only if

(i) Cr

{

Θ

} =

1;

(ii) Cr

{

A

} ≤

Cr

{

B

}

, wheneverA

B;

(iii) Cr is self-dual, i.e., Cr

{

A

} +

Cr

{

Ac

} =

1, for anyA

P

(

Θ

)

;

(iv) Cr

{∪

iAi

} =

supiCr

{

Ai

}

for any collection

{

Ai

}

inP

(

Θ

)

with supiCr

{

Ai

}

<

0

.

5.

The triplet

(

Θ

,

P

(

Θ

),

Cr

)

is called a credibility space and fuzzy variable is defined as a function from this space to the set of real numbers [27]. Furthermore, the credibility theory was developed by Liu [24] as a branch of mathematics for studying the behavior of fuzzy phenomena.

(3)

Suppose that

ξ

is a fuzzy variable defined on the credibility space

(

Θ

,

P

(

Θ

),

Cr

)

. Then its membership function is derived from the credibility measure by

µ(

x

)

=

(

2Cr

{

ξ

=

x

}

)

1

,

x

R

.

(2)

Conversely, let

ξ

be a fuzzy variable with membership function

µ

. Then for any setBof real numbers, we have Cr

{

ξ

B

} =

1 2

sup xB

µ(

x

)

+

1

sup xBc

µ(

x

)

.

(3)

This formula is also called the credibility inversion theorem.

4. Fuzzy DEA model and ranking criterion

Based on the CCR model introduced in Section2, we will give the fuzzy DEA model with the fuzzy inputs and outputs. The new symbols are defined as follows:

˜

xi

=

(

˜

xi1

,

x

˜

i2

, . . . ,

˜

xip

)

: the fuzzy inputs vector of DMUi;

˜

yi

=

(

y

˜

i1

,

y

˜

i2

, . . . ,

y

˜

iq

)

: the fuzzy outputs vector of DMUi. Since the fuzzy constraintsvTy

˜

j

uTx

˜

j do not define a deterministic feasible set, we employ the idea of chance-constrained programming (CCP), which was initialized by Charnes and Cooper [28]. We provide a confidence level

α

at which it is desired that the fuzzy constraints hold. In other words, the constraints will be violated at most

α

. Thus we have some chance constraints as follows:

Cr

vTy

˜

j

uTx

˜

j

α,

j

=

1

,

2

, . . . ,

n

.

(4)

As introduced in Section2, the purpose of the CCR model is to maximize the ratio ofvTy

uTx. The DMU is efficient when the optimal value gets to 1, otherwise it is inefficient. That is, the set vTy0

uTx 0

<

1 is inefficient. In fuzzy environment, the event

vTy˜0

uTx˜ 0

<

1 is inefficient. Inspired by the idea of the inefficient event, the fuzzy DEA model can be formulated as follows:

maxf subject to: Cr

vTy

˜

0 uTx

˜

0

f

α

Cr

vTy

˜

j

uTx

˜

j

α,

j

=

1

,

2

, . . . ,

n u

0 v

0 (5) in which

α

∈ [

0

.

5

,

1

]

.

Definition 2. Let

ξ

and

η

be fuzzy variables. We say

ξ > η

if and only if, for some predetermined confidence level

α

(

0

,

1

]

, we have

sup

{

r

|

Cr

{

ξ

r

} ≤

α

}

>

sup

{

r

|

Cr

{

η

r

} ≤

α

}

.

(6)

Ranking criterion: The greater the optimal objective is, the more efficient DMU0is ranked.

If there exists at least one DMU with the optimal valuef

1, we can give the following definition:

Definition 3. DMU0is

α

-efficient iff

1, wheref∗is the optimal value of(5).

5. Algorithm

In the fuzzy DEA model, there exist several fuzzy functions such as Cr

n

vTy˜0

uT˜x 0

f

o

α

and Cr

{

vTy

˜

j

uTx

˜

j

} ≥

α

. To estimate the fuzzy functions, we use fuzzy simulations to calculate them. In this section, we integrate the fuzzy simulations and genetic algorithm to produce a hybrid intelligent algorithm for solving fuzzy DEA model (see [24]).

5.1. Fuzzy simulation

Fuzzy functions are defined as functions with fuzzy parameters. Due to the complexity, we design a fuzzy simulation to estimate the fuzzy function. We writef

(

u

,

v

,

ξ

)

=

vTy˜0

uTx˜

0, in which

ξ

=

(

x

˜

0

,

y

˜

0

)

is the fuzzy vector. The fuzzy function is:

(4)

In order to compute the fuzzy function(7), we randomly generate

θ

kfromΘ, write

ν(

k

)

=

(

2Cr

{

θ

k

}

)

1 and produce

ξ

k

)

,k

=

1

,

2

, . . . ,

N, respectively. Equivalently, we randomly generate

ξ

k

)

and write

ν

k

=

µ(

ξ

k

))

fork

=

1

,

2

, . . . ,

N, where

µ

is the membership function of

ξ

. For any numberr, we set

L

(

r

)

=

1 2

max 1≤kN

{

ν

k

|

f

(

u

,

v

,

ξ

k

))

r

} +

min 1≤kN

{

1

ν

k

|

f

(

u

,

v

,

ξ

k

)) >

r

}

.

(8)

It follows from monotonicity that we may employ bisection search to find the maximal valuersuch thatL

(

r

)

α

. This value is an estimation of fuzzy function(7). We summarize this process as follows:

Step1. Randomly generate

θ

k fromΘ,write

ν(

k

)

=

(

2Cr

{

θ

k

}

)

1 and produce

ξ

k

)

,k

=

1

,

2

, . . . ,

N, respectively. Equivalently, we randomly generate

ξ

k

)

and write

ν

k

=

µ(

ξ

k

))

fork

=

1

,

2

, . . . ,

N, where

µ

is the membership function of

ξ

.

Step2. Find the maximal valuersuch thatL

(

r

)

α

holds.

Step3. Returnr.

5.2. Hybrid algorithm

This section will illustrate the hybrid algorithm combined with fuzzy simulations and genetic algorithm. We summarize this algorithm as follows:

Step1. Initialize pop_size chromosomesVk

=

(

uk

,

vk

)

,k

=

1

,

2

, . . . ,

pop_size. Step2. Calculate the objective valuesUkfor all chromosomesV

k,k

=

1

,

2

, . . . ,

pop_size by fuzzy simulations respectively. Step3. Compute the fitness of all chromosomesVk,k

=

1

,

2

, . . . ,

pop_size.

Step4. Select the chromosomes for a new population.

Step5. Renew the chromosomesVk,k

=

1

,

2

, . . . ,

pop_size by crossover and mutation operations. Step6. Repeat the second to the fifth steps for a given number of cycles.

Step7. Return the best value.

6. A special case

We have given the fuzzy DEA model, but the model is too complex to solve by traditional methods. This section aims to make the model easy to compute when the membership function of the fuzzy inputs and outputs have some particular characters.

Definition 4. A real-valued functionf defined on a convex setX

Rnis said to be quasiconcave if f

x

+

(

1

λ)

y

)

min

{

f

(

x

),

f

(

y

)

}

for anyx

,

y

Xand 0

< λ <

1.

Theorem 1.Suppose that

ξ

1

, ξ

2are fuzzy variables defined on credibility space

(

Θ

,

P

(

Θ

),

Cr

)

. IfCr

{

ξ

1

=

x

}

andCr

{

ξ

2

=

x

}

are quasiconcave, then for any given0

.

5

α

1

Cr

{

ξ

1

+

ξ

2

b

} ≥

α

if and only if

1

)

U1−α

+

2

)

U1−α

b,

Cr

{

ξ

1

+

ξ

2

b

} ≤

α

if and only if

1

)

U1−α

+

2

)

U1−α

b.

Proof. If Cr

{

ξ

1

+

ξ

2

b

} ≥

α

, 0

.

5

α

1, then we have Cr

{

ξ

1

+

ξ

2

b

} =

1

sup x1+x2>b

{

Cr

{

ξ

1

=

x1

} ∧

Cr

{

ξ

2

=

x2

}}

α.

Hence, sup x1+x2>b

{

Cr

{

ξ

1

=

x1

} ∧

Cr

{

ξ

2

=

x2

}} ≤

1

α.

Suppose that

(

x1

,

x2

)

=

arg sup x1,x2∈R

{

Cr

{

ξ

1

=

x1

} ∧

Cr

{

ξ

2

=

x2

}|{

x1

+

x2

>

b

} ≤

1

α

}

.

(9) It follows that Cr

{

ξ

1

=

x∗ 1

} ∧

Cr

{

ξ

2

=

x∗2

} ≤

1

α

and x ∗ 1

+

x ∗ 2

>

b.

Since Cr

{

ξ

1

=

x1

} ∧

Cr

{

ξ

2

=

x2

} ≤

1

α

implies that Cr

{

ξ

1

=

x1

} ≤

1

α,

Cr

{

ξ

2

=

x2

} ≤

1

α

. From that the functions Cr

{

ξ

1

=

x1

}

and Cr

{

ξ

2

=

x2

}

are quasiconcave, we have

x1

1

)

U1α

,

x2

2

)

U1α

.

Then we get

1

)

U1−α

+

2

)

U1−α

b. Otherwise

1

)

U1−α

+

2

)

U2(1−α)

>

b

,

Cr

{

ξ

1

=

1

)

1U−α

} ≥

Cr

{

ξ

1

=

x

1

}

,

Cr

{

ξ

2

=

2

)

U1−α

} ≥

Cr

{

ξ

2

=

x

2

}

which is contradict with(7).

(5)

Conversely, if

1

)

U1−α

+

2

)

U1−α

b, we get

Cr

{

ξ

1

=

a1

} ≤

1

α,

Cr

{

ξ

2

=

a1

} ≤

1

α

sincea1

> (ξ

1

)

U1−αanda2

> (ξ

2

)

U1−α. Consequently, supx1,x2∈R

{

Cr

{

ξ

1

=

x1

} ∧

Cr

{

ξ

2

=

x2

}|{

x1

+

x2

>

b

} ≤

1

α

}

. Then

Cr

{

ξ

1

+

ξ

2

b

} =

1

sup x1+x2>b

{

Cr

{

ξ

1

=

x1

} ∧

Cr

{

ξ

2

=

x2

}}

α.

Theorem 2. Let

(ξ)

Lαand

(ξ)

Uαbe the Lower and upper bounds of

α

-level set of

ξ

, respectively. Then we have

(

a

)

if c

0, then

(

c

ξ)

Uα

=

c

(ξ)

Uαand

(

c

ξ)

Lα

=

c

(ξ)

Lα;

(

b

)

if c

0, then

(

c

ξ)

U

α

=

c

(ξ)

Lαand

(

c

ξ)

Lα

=

c

(ξ)

Uα;

Proof. (a) ifc

0, then the partais obviously valid. Whenc

>

0, we have

(

c

ξ)

Uα

=

sup

{

x

|

µ

cξ

(

x

)

α

}

=

csup

n

x c

µ

ξ

x c

α

o

=

c

(ξ)

Uα

.

A similar way may prove that

(

c

ξ)

L

α

=

c

(ξ)

Lα.

In order to prove the part (b), it suffices to verify that

(

ξ)

U

α

= −

(ξ)

Lαand

(

ξ)

Lα

= −

(ξ)

Uα. In fact, for any

α

(

0

,

1

]

,

we have

(

ξ)

Uα

=

sup

{

x

|

µ

−ξ

(

x

)

α

} = −

inf

{−

x

|

µ

ξ

(

x

)

α

}

= −

(ξ)

Lα

.

Similarly, we may prove that

(

ξ)

Lα

= −

(ξ)

Uα.

FollowingTheorems 1and2, the fuzzy DEA model(5)becomes

maxf subject to: vT

(

y

˜

0

)

U2(1−α) uT

(

x

˜

0

)

L2(1−α)

f vT

(

y

˜

j

)

U2(1−α)

u T

(

x

˜

j

)

L2(1−α)

0

,

j

=

1

,

2

, . . . ,

n u

0 v

0 (10)

in which

α

∈ [

0

.

5

,

1

]

. The model is equivalent to the fractional model as follows:

max v T

(

y

˜

0

)

U2(1−α) uT

(

x

˜

0

)

L2(1−α) subject to: vT

(

y

˜

j

)

U2(1−α)

u T

(

x

˜

j

)

L2(1−α)

0

,

j

=

1

,

2

, . . . ,

n u

0 v

0 (11)

which is equivalent to the linear programming model:

maxvT

(

y

˜

0

)

U2(1−α) subject to: uT

(

x

˜

0

)

L2(1−α)

=

1 vT

(

y

˜

j

)

U2(1−α)

u T

(

x

˜

j

)

L2(1−α)

0

,

j

=

1

,

2

, . . . ,

n u

0 v

0

.

(12)

The model(10)can be easily solved by many methods, i.e., a standard LP solver [29], simplex algorithm [30] and so on. When all the inputsxi and outputsyjare trapezoidal fuzzy variables, denoted byxik

=

(

xrik1

,

x

r2 ik

,

x r3 ik

,

x r4 ik

)

andyil

=

(

xr1 il

,

x r2 il

,

x r3 il

,

x r4

(6)

Table 1

DMUs with two fuzzy inputs and two fuzzy outputs.

DMUi 1 2 3 4 5 Input 1 T(3.5, 4.0, 4.5) T(2.9, 2.9, 2.9) T(4.4, 4.9, 5.4) T(3.4, 4.1, 4.8) T(5.9, 6.5, 7.1) Input 2 T(1.9, 2.1, 2.3) T(1.4, 1.5, 1.6) T(2.2, 2.6, 3.0) T(2.1, 2.3, 2.5) T(3.6, 4.1, 4.6) Output 1 T(2.4, 2.6, 2.8) T(2.2, 2.2, 2.2) T(2.7, 3.2, 3.7) T(2.5, 2.9, 3.3) T(4.4, 5.1, 5.8) Output 2 T(3.8, 4.1, 4.4) T(3.3, 3.5, 3.7) T(4.3, 5.1, 5.9) T(5.5, 5.7, 5.9) T(6.5, 7.4, 8.3) Table 2

Evaluating results withα=0.8.

DMUs (v1, v2,u1,u2) Efficiency value

DMU1 (0.2790, 0.0347, 0.0582, 0.3962) 0.9074 DMU2 (0.2938, 0.0977, 0.0000, 0.6944) 1.0000 DMU3 (0.2783, 0.0000, 0.0224, 0.3801) 0.9740 DMU4 (0.2588, 0.0322, 0.0540, 0.3670) 1.0000 DMU5 (0.1590, 0.0154, 0.1629, 0.0000) 1.0000 Table 3

Evaluating results with differentα.

α DMU1 DMU2 DMU3 DMU4 DMU5

0.5 0.85 1 0.86 1 1 0.6 0.88 1 0.90 1 1 0.7 0.90 1 0.94 1 1 0.8 0.91 1 0.97 1 1 0.9 0.92 0.99 1 1 1 Table 4

Results of evaluating the DMUs with differentα.

α DMU1 DMU2 DMU3 DMU4 DMU5

0.5 Inefficiency Efficiency Inefficiency Efficiency Efficiency

0.6 Inefficiency Efficiency Inefficiency Efficiency Efficiency

0.7 Inefficiency Efficiency Inefficiency Efficiency Efficiency

0.8 Inefficiency Efficiency Inefficiency Efficiency Efficiency

0.9 Inefficiency Inefficiency Efficiency Efficiency Efficiency

following linear programming:

max u,v

(

2

α

1

)

vTyr4 0

+

2

(

1

α)

v Tyr3 0 subject to:

(

2

α

1

)

vTxr1 0

+

2

(

1

α)

v Txr2 0

=

1

(

2

α

1

)(

vTyr4 j

u Txr1 j

)

+

2

(

1

α)(

v Tyr3 j

u Txr2 j

)

0

,

j

=

1

,

2

, . . . ,

n u

0 v

0 (13) in whichxrk j

=

(

x rk j1

,

x rk j2

, . . . ,

x rk jp

)

andy rk j

=

(

y rk j1

,

y rk j2

, . . . ,

y rk jp

)

. 7. A numerical example

This section will give some illustration to the fuzzy model and the ranking method by a numerical example, which is taken from [20].Table 1shows the inputs and outputs information, in whichT

(

a

,

b

,

c

)

denotes the triangular fuzzy variable.

Table 2shows the evaluating results when we set the confidence level

α

=

0

.

8. According to the ranking criterion, the DMUs can be ranked as follows: DMU2, DMU4, DMU5, DMU3, DMU1. Moreover, we can get that DMU2, DMU4, DMU5are efficient and DMU1, DMU3are inefficient by definitionDefinition 3.

Table 3gives the results of ranking DMUs with different confidence levels. The ranking results are affected by the value

α

. When

α

=

0

.

9, the DMUs are ranked: DMU3, DMU4, DMU5, DMU2, DMU1. At other confidence levels, the DMUs are ranked as DMU2, DMU4, DMU5, DMU3, DMU1. FromTable 3andDefinition 3, we can get the evaluating results shown asTable 4. From the comparison ofTables 4and5comes from [20], we can see that the results of evaluating DMU1and DMU5are the same at all levels. However, DMU2, DMU3and DMU4have the same results at some levels and have different results at other levels. In general, the results in this paper are coincident with the results from [20].

(7)

Table 5

Evaluating results with differenthfrom [20].

h DMU1 DMU2 DMU3 DMU4 DMU5

0 Inefficiency Efficiency Efficiency Efficiency Efficiency

0.5 Inefficiency Efficiency Inefficiency Inefficiency Efficiency

0.75 Inefficiency Efficiency Inefficiency Inefficiency Efficiency

0.1 Inefficiency Efficiency Inefficiency Efficiency Efficiency

8. Conclusion

Due to its widely practical used background, DEA has become a pop area of research. To deal with imprecise data, fuzzy set theory has become an effective method to quantify imprecise and vague data in DEA models. In this paper, a new fuzzy DEA model is proposed based on credibility measure as well as a ranking method is given. Due to the character of the fuzzy programming, we design a hybrid algorithm combined with fuzzy simulation and genetic algorithm to compute the fuzzy DEA model. Moreover it is shown to be possible to avoid some of the need for dealing with these nonlinear problems by identifying conditions under which they can be replaced by linear problems. When the membership function of the inputs and outputs are quasiconcave functions (specially trapezoidal or triangular fuzzy variables), the model can transform to linear programming. Finally, we use a numerical example to illustrate the fuzzy DEA model and the fuzzy ranking method.

Acknowledgement

This work was supported by National Natural Science Foundation of China (No. 60425309).

References

[1] A. Charnes, W.W. Cooper, E. Rhodes, Measuring the efficiency of decision making units, European Journal of Operational Research 2 (1978) 429–444. [2] R.D. Banker, A. Charnes, W.W. Cooper, Some models for estimating technical and scale efficiencies in data envelopment analysis, Management Science

30 (1984) 1078–1092.

[3] A. Charnes, W.W. Cooper, L. Seiford, J. Stutz, A multiplicative model for efficiency analysis, Socio-Economic Planning Sciences 6 (1982) 223–224. [4] N.C. Petersen, Data envelopment analysis on a relaxed set of assumptions, Management Science 36 (3) (1990) 305–313.

[5] K. Tone, A slack-based measure of efficiency in data envelopment analysis, European Journal of Operational Research 130 (2001) 498–509. [6] W.W. Cooper, L.M. Seiford, K. Tone, Data Envelopment Analysis: A Comprehensive Text with Models, Applications, References, and DEA-Solver

Software, Kluwer Academic, Boston, 2000.

[7] M.M. Yu, E.T.J. Lin, Efficiency and effectiveness in railway performance using a multi-activity network DEA model, Omega 36 (2008) 1005–1017. [8] H. Eilat, B. Golany, A. Shtub, R & D project evaluation: an integrated DEA and balanced scorecard approach, Omega 36 (2008) 895–912. [9] W. Meng, D. Zhang, L. Qi, W. Liu, Two-level DEA approaches in research evaluation, Omega 36 (2008) 950–957.

[10] N.C.P. Edirisinghe, X. Zhang, Generalized DEA model of fundamental analysis and its application to portfolio optimization, Journal of Banking & Finance (2007)doi:10.1016/j.jbankfin.2007.04.008.

[11] Y. Li, L. Liang, Y. Chen, H. Morita, Models for measuring and benchmarking olympics achievements, Omega 36 (2008) 933–940. [12] W.W. Cooper, L.M. Seiford, J. Zhu, Handbook on Data Envelopment Analysis, Springer, Boston, 2004.

[13] T.R. Sexton, R.H. Silkman, A.J. Hogan, Data envelopment analysis: critique and extensions, in: R.H. Silkman (Ed.), Measuring Efficiency: An Assessment of Data Envelopment Analysis, Jossey-Bass, San Francisco, CA, 1986, pp. 73–105.

[14] A.M. Torgersen, F.R. Forsund, S.A.C. Kittelsen, Slack-adjusted efficiency measures and ranking of efficient units, The Journal of Productivity Analysis 7 (1996) 379–398.

[15] P. Andersen, N.C. Petersen, A procedure for ranking efficient units in data envelopment analysis, Management Science 39 (10) (1993) 1261–1294. [16] W.W. Cooper, K.S. Park, G. Yu, IDEA and AR-IDEA: models for dealing with imprecise data in DEA, Management Science 45 (1999) 597–607. [17] W.W. Cooper, K.S. Park, G. Yu, IDEA (imprecise data envelopment analysis) with CMDs (column maximum decision making units), European Journal

of Operational Research 52 (2001) 176–181.

[18] C. Kao, S.T. Liu, Fuzzy efficiency measures in data envelopment analysis, Fuzzy Sets and Systems 119 (2000) 149–160.

[19] T. Entani, Y. Maeda, H. Tanaka, Dual models ofinterval DEA and its extension to interval data, European Journal of Operational Research 136 (2002) 32–45.

[20] P. Guo, H. Tanaka, Fuzzy DEA: a perceptual evaluation method, Fuzzy Sets and Systems 119 (2001) 149–160.

[21] S. Lertworasirikul, S.C. Fang, J.A. Joines, H.L.W. Nuttle, Fuzzy data envelopment analysis (DEA): a possibility approach, Fuzzy Sets and Systems 139 (2003) 379–394.

[22] L.A. Zadeh, Fuzzy sets as a basis for a theory of possibility, Fuzzy Sets and Systems 1 (1978) 3–28.

[23] B. Liu, Y.K. Liu, Expected value of fuzzy variable and fuzzy expected value models, IEEE Transactions on Fuzzy Systems 10 (4) (2002) 445–450. [24] B. Liu, Uncertainty Theory: An Introduction to its Axiomatic Foundations, Springer-Verlag, Berlin, 2004.

[25] B. Liu, Uncertainty Theory, 2nd ed., Springer-Verlag, Berlin, 2007.

[26] X. Li, B. Liu, A sufficient and necessary condition for credibility measures, International Journal of Uncertainty, Fuzziness & Knowledge-Based Systems 14 (5) (2006) 527–535.

[27] B. Liu, A survey of credibility theory, Fuzzy Optimization and Decision Making 5 (4) (2006) 387–408. [28] A. Charnes, W.W. Cooper, Chance-constrained programming, Management Science 6 (1) (1959) 73–79.

[29] S.C. Fang, S. Puthenpura, Linear Optimization and Extensions: Theory and Algorithms, Prentice-Hall, Englewood Cliffs, NJ, 1993. [30] Chvatal Vasek, Linear Programming, W. H. Freeman and Company, 1983.

References

Related documents

One of the constituent maps appears to be closely related to a very general kind of Hopf invariant defined by Walker [ 11 ].. The constructions and arguments in this paper are

According to the previous biological studies on the differ- ent extracts of the barks [ 11 , 12 ], the ethyl acetate extract had been considered for further chromatographic

unique to the lichen-forming fungi and accumulate either in the cortex such as atranorin, parietin, usnic acid, and fungal melanins or the medulla such as physodic

4.22 Strategi Pelajar Sekolah Menengah Mencari Pecahan Antara Dua Pecahan: Pemahaman Konsep Pecahan Sebagai Nombor 152 4.23 Strategi Pelajar Sekolah Menengah Melihat

POWER for switching the radio on and off LOCK for blocking all button functions METER for selecting the short-wave band RADIO/BUZZ for setting the alarm to radio or

Body weight and absolute and relative (g/100g BW) weights of tissues and organs from female broiler chicks as influenced by preheating temperature, incubation

CAD: Computer Aided Design CBS: Cost Breakdown Structure CER: Cost Estimation Relationship KBE: Knowledge-Based Engineering KM: Knowledge Management MMC: Metal Matrix Composite

a semigroup from a single function on a finite set, using directed graphs, studies the properties. of the