“…The choice of the best-compromised solution among the set of all compromised solutions is made by decision-makers using the preference information. Many techniques based on MCDM, data clustering, fuzzy logic, and some other criteria that are applied to find the best-compromised solution in the studied literature is given in Table XII [201], [136], [139], [49], [183], [54] t-test [127], [45], [199], [133], [117], [50] Wilcoxon sign rank test [141], [168], [109], [208], [93] Wilcoxon rank-sum test [201], [114], [205], [80] Statistical hypothesis tests [159], [47], [107], [194] Kruskal-Wallis test [201], [94], [54] Friedman test [184], [110], [208] Wilcoxon paired test [137], [45] Shapiro-Wilk statistical hypothesis test [45], [54] ANOM test [79], [85] Sign test, Permutation test, Bonferroni/Dunn's test, Welch test, Levene test, Kolmogorov-Smirnov (K-S) test, Post-hoc test [137], [116], [110], [54], [54],…”