<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>ORCID:</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Ways of Counteracting Possible Manipulations Within the AHP on The Base of Weighted Linear Equations</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Oleksiy Oletsky</string-name>
          <email>oletsky@ukma.edu.ua</email>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Dmytro Dosyn</string-name>
          <email>dmytro.h.dosyn@lpnu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Information Systems and Network Department, Institute of Computer Science and Information Technologies</institution>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Lviv Polytechnic National University (LPNU)</institution>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>National University of Kyiv-Mohyla Academy</institution>
          ,
          <addr-line>Skovorody St.,2, Kyiv, 04070</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <volume>000</volume>
      <fpage>0</fpage>
      <lpage>0002</lpage>
      <abstract>
        <p>The paper considers a problem of enhancing the quality of pairwise comparisons within the Analytic Hierarchy Process (AHP). A situation when an expert, who is accountable for providing judgments in the form of pairwise comparisons, is not a person of a good integrity. They want to boost up a certain alternative but don't want to claim its advantage explicitly. Then applying procedures for rectifying inconsistency definitely shall result in order violations, and the system of automated decision making should decide what to do with that. An approach based on weighted systems of linear algebraic equations is considered. Some ways of choosing appropriate weights for counteracting manipulations are suggested.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <sec id="sec-1-1">
        <title>Systems and tools for automated algorithmic-driven decision making are widely proliferated now.</title>
      </sec>
      <sec id="sec-1-2">
        <title>A very significant place among the algorithms applied in these systems is taken by the Analytic</title>
      </sec>
      <sec id="sec-1-3">
        <title>Hierarchy Process (AHP) suggested by T.Saaty [1-6 et al.]. AHP typically considers different connected levels of hierarchy, each of them involves estimations given by experts – usually in the form of pairwise comparisons between given alternatives. But there are many problems related to improving initial pairwise comparisons even if there is only one level of hierarchy.</title>
      </sec>
      <sec id="sec-1-4">
        <title>Let there be n alternatives making a set</title>
        <p>= { 1, … ,   }, and let M be a pairwise comparison matrix
(PCM) provided by an expert. As a matter of fact, the matrix M represents some relation of preference.</p>
        <p>= log   ,  ,  = ̅1̅̅,̅̅
where  is a chosen logarithm base. In this paper there is no reason for stipulating any specific values
for</p>
        <p>though this question might matter in some other contexts. What is really essential is that
transforming the initial PCM to the logarithmic form allows to get additive pairwise comparisons [6].</p>
        <p>2022 Copyright for this paper by its authors.</p>
      </sec>
      <sec id="sec-1-5">
        <title>It is very helpful for analyzing consistency and for developing procedures for improving it, which is the main point of the paper.</title>
      </sec>
      <sec id="sec-1-6">
        <title>The great problem is that initial PCMs directly provided by experts may be not of sufficient quality.</title>
        <p>Classical concepts of cardinal and ordinal consistency are ubiquitous, a lot of different indicators of
inconsistency as well as plenty of approaches for rectifying inconsistency have been suggested [1, 6,
13-24 et al.], many of them are frankly heuristic. Since Saaty had suggested his famous inconsistency
threshold (numbering 0.1) that has been permanently debated and reviewed (one well-known
recommendation is that this threshold should be reduced to 0.05). Anyway, such approaches may yield
good results in normal situations but not be so good if things are not that normal. Many studies are
focused on the problem of mere improving consistency which often is confused with the problem of
quality, whereas those problems are not the same. First of all, for an arbitrary square positive matrix
claimed to be a PCM (even if it is generated randomly and moreover even if it is not an
inversesymmetric, in other terms reciprocal, matrix) we can easily construct the ideally consistent matrix with
the same Perronian vector [e.g., 6]. If a procedure for rectifying inconsistency came to such a matrix
with preserving the initial disorder, such a result obviously would not be good.</p>
      </sec>
      <sec id="sec-1-7">
        <title>It appears very important to make plausible assumptions about possible sources of inconsistency. It</title>
        <p>may result from various “benign” factors such as objective difficulty with estimating alternatives, lack
of the experts’ awareness, errors caused by overlooks, inaccuracy, distraction etc. But there may be
factors of another sort, which can be characterized as “malignant”. An expert, who is accountable for
providing judgments in the form of pairwise comparisons, may be not a person of good integrity.
Suppose they want to boost up a certain alternative which is doubted to be the best one, but don’t want
to claim its advantage explicitly. Then, being aware of the algorithms for decision making implemented
in the given system, they likely shall manipulate with pairwise comparisons to deceive the algorithms
and force them to make an improper resolution. In addition to this, a board responsible for organizing
the process of decision making may be not of sufficient integrity as well. They can, for example, involve
dummy technical alternatives, impose irrelevant criteria etc. Such strategies are integrally related to
situations of so-called order violations.</p>
        <sec id="sec-1-7-1">
          <title>An order violation is a situation when  (  ) &lt;  (  ) whereas   ≻   . Order violations are</title>
          <p>ultimately inevitable if the relation represented by a PCM M is non-transitive, but such situations may
occur for transitive relations as well and do so even if the given PCM is comparatively consistent.</p>
        </sec>
      </sec>
      <sec id="sec-1-8">
        <title>Many techniques for enhancing consistency, being applied to an initial PCM which is ordinally but</title>
        <p>not of sufficient cardinal consistency and features an order violation, shall result in getting another
PCM, which will be free of this flaw. A resulting PCM may be very consistent and sometimes be in a
good accordance with the initial Perronian vector, this will be showcased below. Such a result may be
good for “benign” situations (though may be not). But if there is a manipulation, it’s just a false
improvement of the given PCM. It is exactly what the manipulator wanted, which is to let algorithms
make a judgment desirable for the manipulator despite their tricky estimations seemingly contradicting
to that. And then a blame of an improper decision may be put on designers of algorithms but not on the
manipulator. Technically, in such a situation when an expert states in their PCM that A is better than B
but wants the algorithms to decide that B is better than A, just an order violation, which is an intentional
order violation, shall be an integral part and a main goal of the whole manipulation. If such a foul play
really took place, and an order violation has been detected, the latter may be considered as a telltale
sign of a manipulation – but that might be not that case, that could be merely an accidental mistake.</p>
      </sec>
      <sec id="sec-1-9">
        <title>Basically, there may be an opportunity to consult other experts and to form an average PCM based on many estimations. But sometimes this may be impossible. In addition to this, experts’ opinions may be not independent, and/or they may be biased because of a common influence. So, we are still regarding the “pure” case when there is only one expert.</title>
      </sec>
      <sec id="sec-1-10">
        <title>In this paper some ways to combining techniques for enhancing consistency of initial PCMs with counteracting possible manipulations resulting to order violations have been suggested and discussed.</title>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>2. Some examples of deliberate order violations</title>
      <sec id="sec-2-1">
        <title>Firstly, we are going to use the standard Saaty scale. Let there actually be a competition between two alternatives: A1 and A2. 186</title>
        <p>Example 1</p>
      </sec>
      <sec id="sec-2-2">
        <title>The first example is a very basic and well-known one, but we will consider its parametrical form.</title>
      </sec>
      <sec id="sec-2-3">
        <title>Suppose an expert wants to boost up the alternative A2, but they don’t want to state that explicitly. Then</title>
        <p>they might try to manipulate by imposing a technical, obviously a worse alternative A3 and providing
a pairwise comparison matrix (PCM) as follows: A1 gets a slight (quantified as  1) preference over A2
and A3, and A2 gets more significant preference  2 over A3. Let’s denote such a parametrized PCM as
 0( 1,  2), then</p>
        <p>
          The bad news for the manipulator is that within the standard Saaty scale A2 wins if only  1 = 2,  2 =
9. Then the PCM takes a view
 0( 1,  2) =

( 0(
          <xref ref-type="bibr" rid="ref2 ref9">2, 9</xref>
          )) =
 ( 0(
          <xref ref-type="bibr" rid="ref2 ref9">2, 9</xref>
          ))
 (
          <xref ref-type="bibr" rid="ref3">3</xref>
          )
≈
0.2804
0.58
        </p>
      </sec>
      <sec id="sec-2-4">
        <title>One can recognize a PCM having such a consistency ratio as an unacceptable one.</title>
      </sec>
      <sec id="sec-2-5">
        <title>To conceal their manipulations, experts and organizers might try to impose some other base for decision making, for instance as in the following example.</title>
        <p>Example 2</p>
      </sec>
      <sec id="sec-2-6">
        <title>The number of technical alternatives might be increased. Let an overall number of alternatives be n,</title>
        <p>among which only A1 and A2 be the real competitors, and the other n-2 alternatives be the technical
ones. Like the previous example, A1 gets the slight preference  1 over A2 and the technical alternatives,
A2 gets more significant preference  2 over the technical alternatives, and the other (technical)
alternatives are on a par. Then the resulting parametrized PCM takes the view
 ′( ,  1,  2) = (</p>
        <p>The performed experiments show that such a PCM ensures a victory for A2 just already if  =
6,  1 = 2,  2 = 3. In this case the Perronian vector approximately equals
(0.2801,

of scales stipulates that the following grade of preference is quantified  times larger than the previous
one,  is a certain parameter). Then for defining preferences between i-th and j-th alternatives we can
which is the distance between those alternatives in terms of grades. So, the
Example 3
Let n=3, that is there are three alternatives, and the situation is like that in Example 1.
Experiments carried out, for instance, in [25] show that the deliberate order violation is gained if
1
…
  ( ,  ) = (  − 12
  12
1
…
  23
…
…)
 = ( −1
0
−1
1
0
−4
1
4)
0
or if  23 is larger than 4.</p>
        <p>For  = 1.2, the Perronian vector approximately equals
(0.3682,</p>
        <p>0.3912, 0.2406)</p>
        <p>The index of consistency approximately equals 0.0296. Though applying such indices to transitive
scales with different parameters is a special and not very clear issue, it should be the less the better
anyway. The examples given above illustrate deliberate order violation means that what an expert wants
to achieve is different from what they claim when constructing the PCM. Of course, it would be
reasonable to ask the expert for explaining the situation. But the process of decision making can be very
automated, and such a facility can be unavailable. Therefore, it appears important to develop algorithms
and automated procedures aimed at detecting possible manipulations and counteracting them, or in
other words, those robust to manipulations. To say it more accurately, detecting order violations is easy
but counteracting is not.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. A weighted system of linear equations</title>
      <p>algebraic equations was considered in [25].</p>
      <sec id="sec-3-1">
        <title>An approach to enhancing quality of pairwise comparisons based on solving systems of linear</title>
      </sec>
      <sec id="sec-3-2">
        <title>Let M be a pairwise comparison matrix provided by an expert, and C is its logarithmic form</title>
        <p>Then the regarded system can be written in the following form:
where H and b are the matrix and the right side of the system of linear algebraic equations with</p>
        <p>= 
respect to   :</p>
        <p>=   ,  = ̅1̅̅,̅̅,  = ̅̅+̅̅̅1̅̅, ̅̅
∀ ,  &gt;  ,  &gt;   
+  
−  
estimations or of trust to them.</p>
        <p>
          are weighting coefficients which can be clearly interpreted as degrees of certainty about experts’
(
          <xref ref-type="bibr" rid="ref1">1</xref>
          )
(
          <xref ref-type="bibr" rid="ref2">2</xref>
          )
(
          <xref ref-type="bibr" rid="ref3">3</xref>
          )
        </p>
      </sec>
      <sec id="sec-3-3">
        <title>Basically, this system follows the idea of applying the logarithmic least square method for getting more consistent PCMs [6, 26, 27]. It focuses on analysis of triads and on minimizing distances between what is needed for cardinal consistency and what is really provided.</title>
      </sec>
      <sec id="sec-3-4">
        <title>The system (1-3) is over-determined, it contains  ( − 1)/2 unknowns and</title>
        <p>
          equations. Equations forming the group (
          <xref ref-type="bibr" rid="ref2">2</xref>
          ) were named expert equations because they are reflecting
experts’ estimations. Equations of the group (
          <xref ref-type="bibr" rid="ref3">3</xref>
          ) were named consistency, or equidistant, equations,
because they ensue from the requirements of cardinal consistency if those requirements are written in
the logarithmic form. It’s easy to show that the system has a single (pseudo)solution which can be
obtained with the help of the Moore-Penrose pseudo-inversion [28].
        </p>
        <p>The obtained   shall form the new PCM. Such a process can be performed iteratively. The issue
of convergence within iterative improvements has been studied in [29, 30]. It was shown that under
certain conditions the consequence of PCMs converges to the ideally consistent PCM
with zero
consistency index, and this can be confirmed experimentally. But, as it was mentioned before, it is
necessary to control the process so that a risk of transmitting a disorder in the initial data to final
 ( −1)
2
+
 ( −1)( −2)
6
resolutions would be as low as possible.</p>
      </sec>
      <sec id="sec-3-5">
        <title>As a tool for such a control we suggest using weighting coefficients for the equations in (1-3). The</title>
        <p>idea of weighting sources of information has been discussed, for instance, in [31] but this idea can be
implemented in different ways. And the main problem is how to pick out the coefficients   .</p>
      </sec>
      <sec id="sec-3-6">
        <title>Solving the unweighted system is not very helpful for counteracting intentional order violations. As</title>
        <p>it was mentioned before, in this case that can in fact enhance consistency of the PCM but hardly its
quality. Experiments carried out in [24] confirm that such enhancements, which can be done once or
iteratively, eventually result in the consistent PCM with the changed directions of preferences. Whereas
in the initial matrix we had  1 ≻  2, in the resulting PCM we can get  2 ≻  1, and this is exactly the
arranged order violation.</p>
      </sec>
      <sec id="sec-3-7">
        <title>Let’s illustrate this on the Example 3. Since a transitive scale is being used in that example, the</title>
        <p>pairwise comparison matrix C is presented in the logarithmic form from the very beginning.</p>
        <p>For  = 1.2 its “classical” exponential form is</p>
      </sec>
      <sec id="sec-3-8">
        <title>The unweighted system (2-3) for this PCM takes a view</title>
        <p>which is the approximate limit of consequent PCMs.</p>
      </sec>
      <sec id="sec-3-9">
        <title>Its consistency index practically equals 0. Its Perronian vector equals</title>
        <p>So, according to  ∗  2 ≻  1, and  ( 2) &gt;  ( 1). There is no order violation now because it has
been committed before, in the course of iterations. Yet, as we have mentioned before, this is not a
satisfactory solution. So, such algorithms based on unweighted equations shall probably justify
intentional order violations planned by experts who had manipulated. What algorithms of automated
decision making should do is decide whether to accept an order violation resulting from their work or
not. Let’s now look at the problem how to find proper values for the weighting coefficients   .
= ( 0.8333
0.8333</p>
      </sec>
      <sec id="sec-3-10">
        <title>Its solution yields the following updated PCM (in the exponential form) After 10 iterations we come to the matrix</title>
        <p>1
1
1
1
 ∗ = ( 1.0627
0.6535
manipulations by changing
weights of</p>
      </sec>
      <sec id="sec-3-11">
        <title>Surely, algorithm-based counteracting manipulations can’t be determined and straightforward even</title>
        <p>
          after an order violation has been detected. A system of decision making should have a set of rules aimed
at considering a wide range of factors and principles, and this makes the problem rather complicated
and intricated. We are going to discuss some heuristic rules of such a sort and look at how these rules
may come in use for getting more or less appropriate coefficients in (
          <xref ref-type="bibr" rid="ref1 ref2 ref3">1-3</xref>
          ).
        </p>
      </sec>
      <sec id="sec-3-12">
        <title>Hardly there is any reason for changing weights of consistency equations but changing those for</title>
        <p>expert equations appears promising. In this paper we are regarding the following heuristic rules:
 pairwise comparisons have a priority
 considering measures of inconsistency
 analyzing strongly connected components</p>
      </sec>
      <sec id="sec-3-13">
        <title>Let’s illustrate these rules one by one.</title>
        <p>Pairwise comparisons have a priority</p>
      </sec>
      <sec id="sec-3-14">
        <title>Meaningfully this rule has a following interpretation: if an expert explicitly stated in PCM that for</title>
        <p>the alternatives A1, A2  1 ≻  2, and there is no additional opportunity to consult them, then all
transformations must remain this advantage and the relation  ( 1) &gt;  ( 2) should eventually hold.</p>
      </sec>
      <sec id="sec-3-15">
        <title>Unfortunately, following this rule may be problematic if there are multiple order violations or the given</title>
      </sec>
      <sec id="sec-3-16">
        <title>PCM is ordinally inconsistent at all. Technically, it surely can be applied for a single order violation.</title>
      </sec>
      <sec id="sec-3-17">
        <title>But this rule is too strict and can potentially cause problems if the detected order violation was an accidental error but not a deliberately planned result. Certainly, more attention should be paid to order violations between alternatives competing for an overall victory.</title>
        <sec id="sec-3-17-1">
          <title>We are going to illustrate this rule on the Example 3. Let’s entrench the preference  1 ≻  2 by</title>
          <p>taking weighting coefficients  = (1.5, 1, 1, 1).</p>
          <p>The iterative process described above leads to the consistent PCM</p>
          <p>1 1.051 1.6171
 ∗ = ( 0.9515 1 1.5487)</p>
          <p>0.6184 0.6499 1
with the Perronian vector
(0.3891,</p>
          <p>= (  −  ((  )))2
are the largest.</p>
          <p>Let’s build the matrix  ( ) = (  ,  ,  = ̅1̅,̅̅̅̅) for the Example 3. It approximately equals
with the Perronian vector
and with eliminated order violation.</p>
        </sec>
      </sec>
      <sec id="sec-3-18">
        <title>But the regarded case was a very simple one, and the source of the manipulation has been distinctly indicated by the criteria of maximum deviation. In more tricky cases the situation may be more complicated.</title>
        <p>Example 4
corresponding PCM equals (here the standard Saaty scale is applied)</p>
        <p>
          As a matter of fact, it is the Example 2 with the parameters  = 6,  1 = 2,  2 = 3.
The
for the pair (
          <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
          ), which reflects the preference of  1 over  2. In such a situation decreasing weighting
coefficient for the corresponding equation (for instance, by putting it to 0.75 whereas the other
coefficients remain to equal 1) seems not to be helpful. The resulting Perronian vector approximately
equals
(0.2531,
0.2983,
0.1122,
0.1122,
0.1122,
which means that the advantage of the second alternative has been even increased.
        </p>
      </sec>
      <sec id="sec-3-19">
        <title>In this case the manipulation was more concealed and less concentrated. Instead, increasing it</title>
        <p>according to the first heuristic rule (pairwise comparisons have a priority) yields much better results.
For example, putting the coefficient to 1.25 yields the Perronian vector
(0.2859,
0.2648,
0.1123,
0.1123,
0.1123,
0.1123)
and the first alternative wins.</p>
        <p>Analyzing strongly connected components</p>
      </sec>
      <sec id="sec-3-20">
        <title>Basically, picking out and analyzing strongly connected components (SCC) in the preference graph</title>
        <p>related to the given PCM appears to be quite useful if the ordinary consistency doesn’t hold, that is the
initial relation of preference is non-transitive. The idea is to build separate PCMs for each SCC and
then to combine them with a specially constructed PCM connecting these SCCs.</p>
      </sec>
      <sec id="sec-3-21">
        <title>Realizations of such an idea can be very different. For example, the following heuristic approach</title>
        <p>might be applied: for separate PCM  (  ) within the k-th SCC denoted by   preferences could be got
directly from the initial PCM M. But for making the procedure more flexible and adjustable we suggest
that these coefficients should rather be calculated by the formula</p>
        <p>(  ) =   1,
 1 ≤ 1 is a smoothing coefficient designed to reduce a scatter of values within one SCC.
Preferences between SCCs are calculated by averaging
with the additional treating. More
technically, given the initial PCM M, the PCM  ( ) for combining SCCs can be calculated by the
following formula:

 ( ) =</p>
        <p>2
∑( , )∈ 
|  |
 
= {( ,  ):  ∈   ,
 ∈   }
where   and   are the k-th and the l-th SCCs,  2 ≥ 1 is a sharpening coefficient designed to make
difference between compared SCCs more distinct, and coefficients   stand for relations between
  and   .</p>
      </sec>
      <sec id="sec-3-22">
        <title>Then the value of the  -th alternative can be calculated as follows:</title>
        <p>where   (  )should be obtained from the comparison matrix within the SCC   , and  (  ) is a value
ascribed to   on the base of inter-CSS PCM  ( ). Then the obtained vector of values should be
normalized so that the sum of its components would equal 1.</p>
      </sec>
      <sec id="sec-3-23">
        <title>In addition to this, we consider an extended preference graph which contains additional relations</title>
        <p>
          resulting from order violations. Let’s try to apply this technique to the Example 4. The initial PCM is
ordinally consistent. Formally, this means that each alternative constitutes a separate SCC with a single
element. Since we have an order violation in the pair (
          <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
          ), the arc (
          <xref ref-type="bibr" rid="ref1 ref2">2,1</xref>
          ) should be added to the extended
graph. So, we have SCCs in the extended graph as follows:
        </p>
        <p>1 = {1,2},  2 = {3},  3 = {4},  4 = {5},  5 = {6}</p>
        <sec id="sec-3-23-1">
          <title>Comparisons within each SCC but  1 are trivial and yield</title>
          <p>
            (
            <xref ref-type="bibr" rid="ref5">5</xref>
            )
          </p>
          <p>It can be shown that taking  1 =  2 = 1 leads to not very good results. Let’s take  1 = 0.5,  2 =
1.5. Then for  1 we get the PCM
 1(  ) = 1,  = ̅2̅̅,̅5̅
with the Perronian vector</p>
          <p>(0.5858, 0.4142)
Then we obtain the inter-CSS pairwise comparison matrix
with the Perronian vector</p>
          <p>(0.4970, 0.1257, 0.1257, 0.1257, 0.1257)</p>
        </sec>
      </sec>
      <sec id="sec-3-24">
        <title>Finally, calculating by (5) and normalizing the resulting vector yields the following distribution of values among the alternatives:</title>
        <p>(0.2912, 0.2059, 0.1257,</p>
      </sec>
      <sec id="sec-3-25">
        <title>The order violation has been eliminated.</title>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>5. Conclusions and discussion</title>
      <p>In this paper the main attention is paid to possible manipulations with pairwise comparison matrices
within the AHP-based decision making which can be deliberately committed by experts accountable
for forming such judgments. The question is that a manipulator may want to boost up a certain
alternative, but they don’t want to be accused of non-integrity and to declare an advantage of that
alternative explicitly. Then the manipulator would like to make up tricky PCMs, and what they want to
achieve by doing that is force algorithms of decision making to reverse some of their judgments. This
is the pure order violation, and it’s the deliberate and planned one. Therefore, if a manipulation really
takes place, it is typically accompanied with order violations. So, if an order violation is detected, it
should be considered as a signal of possible manipulation though the violation might be caused by other,
more benign reasons like overlooks, inaccuracy etc.</p>
      <sec id="sec-4-1">
        <title>So, AHP-based algorithms for decision making should become more robust to possible</title>
        <p>manipulations and to acquire some techniques of tackling order violations with the aim of counteracting
such manipulations. The strategy of dealing with order violations can’t be easy and straightforward, it
should be based on a set of parametrized rules and involve intelligent combining such rules.</p>
        <p>An approach to enhancing consistency of pairwise comparisons on the base of iterative solving
weighted systems of linear equations is being developed in the paper. An integral part of the suggested
approach is to combine enhancing consistency itself with deciding what to do with detected order
violations. Some rules aimed at picking out weights of these equations are regarded and illustrated in
the paper. These rules are quite simple, other approaches certainly must exist. For instance, it seems
promising to apply different techniques of reinforcement learning. Typically, the AHP-based decision
making is more complicated than it was presented in the paper. It usually comprises some levels of
hierarchy, at least one of them is related to criteria which possible decisions depend on. There is a vast
room for foul plays with these criteria, and the issue how to make algorithms of automated decision
making more robust deserves special research. It appears promising to combine the approach presented
in this paper with the multi-level model “state-probability of choice” for multiagent decision making
[32]. A game view on the problem is worth to be developed. This means considering a game in which
a manipulator can try different strategies of achieving their goals, and a system of decision making
should implement strategies of detecting manipulations and counteracting them.</p>
      </sec>
      <sec id="sec-4-2">
        <title>Such considerations appear to be useful for many practical applications, such as financial privacy of the telecommunications space [33] or prioritizing cybersecurity measures using incomplete data [34].</title>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>6. References</title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>T.L.</given-names>
            <surname>Saaty</surname>
          </string-name>
          , The Analytic Hierarchy Process,
          <string-name>
            <surname>McGraw-Hill</surname>
          </string-name>
          , New York,
          <year>1980</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>M.</given-names>
            <surname>Brunelli</surname>
          </string-name>
          , Introduction to the
          <source>Analytic Hierarchy Process</source>
          , Springer, Cham,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>O.S.</given-names>
            <surname>Vaidya</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Kumar</surname>
          </string-name>
          ,
          <article-title>Analytic hierarchy process: An overview of applications</article-title>
          ,
          <source>European Journal of Operational Research 169-1</source>
          (
          <year>2006</year>
          )
          <fpage>1</fpage>
          -
          <lpage>29</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>A.</given-names>
            <surname>Ishizaka</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Labib</surname>
          </string-name>
          .
          <article-title>Review of the main developments in the analytic hierarchy process</article-title>
          .
          <source>Expert Syst. Appl</source>
          .
          <volume>38</volume>
          (
          <year>2011</year>
          )
          <fpage>14336</fpage>
          -
          <lpage>14345</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>W.</given-names>
            <surname>Ho</surname>
          </string-name>
          ,
          <article-title>Integrated analytic hierarchy process and its applications. A literature review</article-title>
          ,
          <source>European Journal of Operational Research 186-1</source>
          (
          <year>2008</year>
          )
          <fpage>211</fpage>
          -
          <lpage>228</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>W.</given-names>
            <surname>Koczkodaj</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Mikhailov</surname>
          </string-name>
          , G.Redlarski,
          <string-name>
            <given-names>M.</given-names>
            <surname>Soltys</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Szybowski</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Tamazian</surname>
          </string-name>
          , E.Wajch, Kevin Kam Fung Yuen,
          <source>Important Facts and Observations about Pairwise Comparisons, Fundamenta Informaticae</source>
          <volume>144</volume>
          (
          <year>2016</year>
          )
          <fpage>1</fpage>
          -
          <lpage>17</lpage>
          . doi:
          <volume>10</volume>
          .3233/FI-2016-1336
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>E.</given-names>
            <surname>Choo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Wedley</surname>
          </string-name>
          ,
          <article-title>A Common Framework for Deriving Preference Values from Pairwise Comparison Matrices</article-title>
          ,
          <source>Comput. Oper. Res. 31-6</source>
          (
          <year>2004</year>
          )
          <fpage>893</fpage>
          -
          <lpage>908</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>E.</given-names>
            <surname>Choo</surname>
          </string-name>
          , W. Wedley,
          <article-title>Estimating ratio scale values when units are unspecified</article-title>
          ,
          <source>Computers and Industrial Engineering</source>
          <volume>59</volume>
          (
          <year>2010</year>
          )
          <fpage>200</fpage>
          -
          <lpage>208</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.cie.
          <year>2010</year>
          .
          <volume>04</volume>
          .001.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>V.</given-names>
            <surname>Tsyganok</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Kadenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Andriichuk</surname>
          </string-name>
          ,
          <article-title>Usage of Scales with Different Number of Grades for Pair Comparisons in Decision Support Systems</article-title>
          ,
          <source>International Journal of the Analytic Hierarchy Process 8</source>
          <volume>-1</volume>
          (
          <year>2016</year>
          )
          <fpage>112</fpage>
          -
          <lpage>130</lpage>
          . doi:
          <volume>10</volume>
          .13033/ijahp.v8i1.
          <fpage>259</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>R.</given-names>
            <surname>Janicki</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Zhai</surname>
          </string-name>
          ,
          <article-title>On a pairwise comparison-based consistent non-numerical ranking</article-title>
          ,
          <source>Logic Journal of IGPL 20-4</source>
          (
          <year>2012</year>
          )
          <fpage>667</fpage>
          -
          <lpage>676</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>B.</given-names>
            <surname>Cavallo</surname>
          </string-name>
          , L.
          <string-name>
            <surname>D'Apuzzo</surname>
          </string-name>
          , A
          <article-title>general unified framework for pairwise comparison matrices in multicriterial methods</article-title>
          ,
          <source>Int. J. Intell. Syst</source>
          .
          <volume>24</volume>
          (
          <year>2009</year>
          )
          <fpage>377</fpage>
          -
          <lpage>398</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>R.E.</given-names>
            <surname>Jensen</surname>
          </string-name>
          ,
          <article-title>An alternative scaling method for priorities in hierarchical structures</article-title>
          ,
          <source>Journal of Mathematical Psychology</source>
          ,
          <volume>28</volume>
          -
          <fpage>3</fpage>
          (
          <year>1984</year>
          )
          <fpage>317</fpage>
          -
          <lpage>332</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>W.</given-names>
            <surname>Koczkodaj</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Szarek</surname>
          </string-name>
          ,
          <article-title>On distance-based inconsistency reduction algorithms for pairwise comparisons</article-title>
          ,
          <source>Logic Journal of IGPL 18-6</source>
          (
          <year>2010</year>
          )
          <fpage>859</fpage>
          -
          <lpage>869</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>O.</given-names>
            <surname>Yu</surname>
          </string-name>
          ,
          <article-title>Assessing and Improving Consistency of a Pairwise Comparison Matrix</article-title>
          , in: Analytic Hierarchy Process.
          <source>Portland International Conference on Management of Engineering and Technology</source>
          (
          <year>2017</year>
          ), pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          . doi:
          <volume>10</volume>
          .23919/PICMET.
          <year>2017</year>
          .
          <volume>8125304</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>M.M. Potomkin</surname>
            ,
            <given-names>M.V.</given-names>
          </string-name>
          <string-name>
            <surname>Nikolaienko</surname>
            ,
            <given-names>D.I.Grazion</given-names>
          </string-name>
          ,
          <article-title>Improvement of Analytic Hierarchy Process based on the Refinement of the Procedures for the Formation of Pairwise Comparison Matrices</article-title>
          ,
          <source>Cybern Syst Anal</source>
          <volume>56</volume>
          (
          <year>2020</year>
          )
          <fpage>603</fpage>
          -
          <lpage>610</lpage>
          . doi: https://doi.org/10.1007/s10559-020-00277-y
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>L.</given-names>
            <surname>Mikhailov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Siraj</surname>
          </string-name>
          ,
          <article-title>Improving the Ordinal Consistency of Pairwise Comparison Matrices</article-title>
          ,
          <source>in: Proceedings of the XI International Symposium for the Analytic Hierarchy Process ISAHP-201</source>
          ,
          <year>2011</year>
          . doi:
          <volume>10</volume>
          .13033/isahp.y2011.
          <fpage>128</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>S.</given-names>
            <surname>Siraj</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Mikhailov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Keane</surname>
          </string-name>
          ,
          <article-title>A heuristic method to rectify intransitive judgement in pairwise comparison matrices</article-title>
          ,
          <source>European Journal of Operational Research</source>
          <volume>216</volume>
          (
          <year>2012</year>
          )
          <fpage>420</fpage>
          -
          <lpage>428</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>J.</given-names>
            <surname>Barzilai</surname>
          </string-name>
          ,
          <article-title>Consistency measures for pairwise comparison matrices</article-title>
          ,
          <source>J. Multi-Criteria Decis. Anal</source>
          . (
          <year>1998</year>
          )
          <fpage>123</fpage>
          -
          <lpage>132</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>W.</given-names>
            <surname>Koczkodaj</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Orłowski</surname>
          </string-name>
          ,
          <article-title>Computing a consistent approximation to a generalized pairwise comparisons matrix</article-title>
          ,
          <source>Computers &amp; Mathematics with Applications</source>
          ,
          <volume>37</volume>
          -
          <fpage>3</fpage>
          (
          <year>1999</year>
          )
          <fpage>79</fpage>
          -
          <lpage>85</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Iida</surname>
          </string-name>
          ,
          <article-title>Ordinality Consistency Test About Items and Notation of a Pairwise Comparison Matrix</article-title>
          ,
          <source>in: AHP. Proceedings of the X International Symposium for the Analytic Hierarchy Process</source>
          ,
          <year>2009</year>
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>M.</given-names>
            <surname>Brunelli</surname>
          </string-name>
          ,
          <source>Recent Advances on Inconsistency Indices for Pairwise Comparisons, A Commentary, Fundam. Inform</source>
          <volume>144</volume>
          (
          <year>2016</year>
          )
          <fpage>321</fpage>
          -
          <lpage>332</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>W.</given-names>
            <surname>Koczkodaj</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Szwarc</surname>
          </string-name>
          ,
          <article-title>On axiomatization of inconsistency indicators for pairwise comparisons</article-title>
          ,
          <source>Fundam. Inform</source>
          <volume>132</volume>
          (
          <year>2014</year>
          )
          <fpage>485</fpage>
          -
          <lpage>500</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>A.Z.</given-names>
            <surname>Grzybowski</surname>
          </string-name>
          ,
          <article-title>New results on inconsistency indices and their relationship with the quality of priority vector estimation</article-title>
          ,
          <source>Expert Syst. Appl</source>
          .
          <volume>43</volume>
          (
          <year>2016</year>
          )
          <fpage>197</fpage>
          -
          <lpage>212</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>R.</given-names>
            <surname>Ramanathan</surname>
          </string-name>
          , L.Ganesh, Group Preference Aggregation Methods Employed in
          <string-name>
            <surname>AHP</surname>
          </string-name>
          :
          <article-title>An Evaluation and Intrinsic Process for Deriving Members'</article-title>
          ,
          <source>Weightages European Journal of Operational Research</source>
          <volume>79</volume>
          (
          <year>1994</year>
          )
          <fpage>249</fpage>
          -
          <lpage>265</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>O.</given-names>
            <surname>Oletsky</surname>
          </string-name>
          ,
          <article-title>On Constructing Adjustable Procedures for Enhancing Consistency of Pairwise Comparisons on the Base of Linear Equations</article-title>
          ,
          <source>in: CEUR Workshop Proceedings</source>
          ,
          <volume>3106</volume>
          (
          <year>2021</year>
          ) pp.
          <fpage>177</fpage>
          -
          <lpage>185</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>S.</given-names>
            <surname>Bozóki</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Tsyganok</surname>
          </string-name>
          ,
          <article-title>The (logarithmic) least-squares optimality of the arithmetic (geometric) mean of weight vectors calculated from all spanning trees for incomplete additive (multiplicative) pairwise comparison matrices</article-title>
          ,
          <source>International Journal of General Systems 48-4</source>
          (
          <year>2019</year>
          )
          <fpage>362</fpage>
          -
          <lpage>381</lpage>
          . doi:
          <volume>10</volume>
          .1080/03081079.
          <year>2019</year>
          .1585432
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>L.</given-names>
            <surname>Csato</surname>
          </string-name>
          ,
          <article-title>A characterization of the Logarithmic Least Squares Method</article-title>
          ,
          <source>European Journal of Operational Research</source>
          ,
          <fpage>276</fpage>
          -1
          <string-name>
            <surname>-</surname>
          </string-name>
          (
          <year>2019</year>
          )
          <fpage>212</fpage>
          -
          <lpage>216</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>G.H.</given-names>
            <surname>Golub</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.F. Van Loan</given-names>
            ,
            <surname>Matrix computations</surname>
          </string-name>
          (3rd ed.).
          <source>Baltimore: Johns Hopkins</source>
          ,
          <year>1996</year>
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>W.</given-names>
            <surname>Holsztynski</surname>
          </string-name>
          , W.Koczkodaj,
          <article-title>Convergence of Inconsistency Algorithms for the Pairwise Comparisons</article-title>
          ,
          <source>IPL. 59-4</source>
          (
          <year>1996</year>
          )
          <fpage>197</fpage>
          -
          <lpage>202</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [30]
          <string-name>
            <given-names>W.</given-names>
            <surname>Koczkodaj</surname>
          </string-name>
          ,
          <string-name>
            <surname>J. Szybowski,</surname>
          </string-name>
          <article-title>The limit of inconsistency reduction in pairwise comparisons</article-title>
          ,
          <source>Int. J. Appl. Math. Comput. Sci</source>
          .
          <volume>26</volume>
          (
          <year>2016</year>
          )
          <fpage>721</fpage>
          -
          <lpage>729</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [31]
          <string-name>
            <given-names>S.</given-names>
            <surname>Kadenko</surname>
          </string-name>
          ,
          <article-title>Defining relative weights of data sources during aggregation of pair-wise comparisons</article-title>
          , in: http://ceur-ws.
          <source>org/</source>
          Vol-2067/paper7.pdf
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [32]
          <string-name>
            <given-names>E.</given-names>
            <surname>Ivokhin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Oletsky</surname>
          </string-name>
          ,
          <article-title>Restructuring of the Model “State-Probability of Choice” Based on Products of Stochastic Rectangular Matrices, Cybern Syst Anal</article-title>
          . Vol.
          <volume>58</volume>
          -
          <fpage>2</fpage>
          (
          <year>2022</year>
          )
          <fpage>242</fpage>
          -
          <lpage>250</lpage>
          . https://doi.org/10.1007/s10559-022-00456-z
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [33]
          <string-name>
            <given-names>V.</given-names>
            <surname>Kraevsky</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Kostenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Kalivoshko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Kiktev</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Lyutyy</surname>
          </string-name>
          , Financial Infrastructure of Telecommunication Space:
          <article-title>Accounting Information Attributive of Syntalytical Submission</article-title>
          , in: 2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and
          <string-name>
            <surname>Technology (PIC S&amp;T)</surname>
          </string-name>
          , Kyiv, Ukraine,
          <year>2019</year>
          , pp.
          <fpage>873</fpage>
          -
          <lpage>876</lpage>
          , doi: 10.1109/PICST47496.
          <year>2019</year>
          .9061494
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          [34]
          <string-name>
            <given-names>H.</given-names>
            <surname>Hnatiienko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Kiktev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Babenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Desiatko</surname>
          </string-name>
          , L. Myrutenko,
          <article-title>Prioritizing Cybersecurity Measures with Decision Support Methods Using Incomplete Data, in: Selected Papers of the XXI International Scientific and Practical Conference "Information Technologies and Security"</article-title>
          (ITS
          <year>2021</year>
          ), Kyiv, Ukraine, December 9,
          <year>2021</year>
          , pp.
          <fpage>169</fpage>
          -
          <lpage>180</lpage>
          . https://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>3241</volume>
          /paper16.pdf
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>