Another method for construction of generalized compromise operator
QIN Feng1, WAN Hongyan2
Computer Engineering and Applications . 2015, (4): 49 -53 .