Chemical engineers can model numerous interactions in a process using incidence graphs. They are used to methodically map out a whole network of interconnected processes and controllers to describe each component's impact on the others. It makes it easier to visualize potential process paths or a series of impacts. A Pythagorean fuzzy set is an effective tool to overcome ambiguity and vagueness. In this paper, we introduce the concept of Pythagorean fuzzy incidence graphs. We discuss the incidence path and characterize the strongest incidence path in Pythagorean fuzzy incidence graphs. Furthermore, we propose the idea of Pythagorean fuzzy incidence cycles and Pythagorean fuzzy incidence trees in Pythagorean fuzzy incidence graphs and give some essential results. We illustrate the notions of Pythagorean fuzzy incidence cut vertices, Pythagorean fuzzy incidence bridges, and Pythagorean fuzzy incidence cut pairs. We also establish some results about Pythagorean fuzzy incidence cut pairs. Moreover, we study the types of incidence pairs and determine some crucial results concerning strong incidence pairs in the Pythagorean fuzzy incidence graph. We also obtain the characterization of Pythagorean fuzzy incidence cut pairs using α-strong incidence pairs and find the relation between Pythagorean fuzzy incidence trees and α-strong incidence pairs. Finally, we provide the application of Pythagorean fuzzy incidence graphs in the illegal wildlife trade.
Citation: Ayesha Shareef, Uzma Ahmad, Saba Siddique, Mohammed M. Ali Al-Shamiri. Pythagorean fuzzy incidence graphs with application in illegal wildlife trade[J]. AIMS Mathematics, 2023, 8(9): 21793-21827. doi: 10.3934/math.20231112
[1] | Areej M. AL-Zaydi . On concomitants of generalized order statistics arising from bivariate generalized Weibull distribution and its application in estimation. AIMS Mathematics, 2024, 9(8): 22002-22021. doi: 10.3934/math.20241069 |
[2] | Wenzhi Zhao, Dou Liu, Huiming Wang . Sieve bootstrap test for multiple change points in the mean of long memory sequence. AIMS Mathematics, 2022, 7(6): 10245-10255. doi: 10.3934/math.2022570 |
[3] | Jin-liang Wang, Chang-shou Deng, Jiang-feng Li . On moment convergence for some order statistics. AIMS Mathematics, 2022, 7(9): 17061-17079. doi: 10.3934/math.2022938 |
[4] | Enrique de Amo, José Juan Quesada-Molina, Manuel Úbeda-Flores . Total positivity and dependence of order statistics. AIMS Mathematics, 2023, 8(12): 30717-30730. doi: 10.3934/math.20231570 |
[5] | H. M. Barakat, M. H. Dwes . Asymptotic behavior of ordered random variables in mixture of two Gaussian sequences with random index. AIMS Mathematics, 2022, 7(10): 19306-19324. doi: 10.3934/math.20221060 |
[6] | Mohamed Said Mohamed, Muqrin A. Almuqrin . Properties of fractional generalized entropy in ordered variables and symmetry testing. AIMS Mathematics, 2025, 10(1): 1116-1141. doi: 10.3934/math.2025053 |
[7] | Jinliang Wang, Fang Wang, Songbo Hu . On asymptotic correlation coefficient for some order statistics. AIMS Mathematics, 2023, 8(3): 6763-6776. doi: 10.3934/math.2023344 |
[8] | Haroon Barakat, Osama Khaled, Hadeer Ghonem . Predicting future order statistics with random sample size. AIMS Mathematics, 2021, 6(5): 5133-5147. doi: 10.3934/math.2021304 |
[9] | Mikail Et, Muhammed Cinar, Hacer Sengul Kandemir . Deferred statistical convergence of order α in metric spaces. AIMS Mathematics, 2020, 5(4): 3731-3740. doi: 10.3934/math.2020241 |
[10] | Salim Bouzebda, Amel Nezzal . Uniform in number of neighbors consistency and weak convergence of kNN empirical conditional processes and kNN conditional U-processes involving functional mixing data. AIMS Mathematics, 2024, 9(2): 4427-4550. doi: 10.3934/math.2024218 |
Chemical engineers can model numerous interactions in a process using incidence graphs. They are used to methodically map out a whole network of interconnected processes and controllers to describe each component's impact on the others. It makes it easier to visualize potential process paths or a series of impacts. A Pythagorean fuzzy set is an effective tool to overcome ambiguity and vagueness. In this paper, we introduce the concept of Pythagorean fuzzy incidence graphs. We discuss the incidence path and characterize the strongest incidence path in Pythagorean fuzzy incidence graphs. Furthermore, we propose the idea of Pythagorean fuzzy incidence cycles and Pythagorean fuzzy incidence trees in Pythagorean fuzzy incidence graphs and give some essential results. We illustrate the notions of Pythagorean fuzzy incidence cut vertices, Pythagorean fuzzy incidence bridges, and Pythagorean fuzzy incidence cut pairs. We also establish some results about Pythagorean fuzzy incidence cut pairs. Moreover, we study the types of incidence pairs and determine some crucial results concerning strong incidence pairs in the Pythagorean fuzzy incidence graph. We also obtain the characterization of Pythagorean fuzzy incidence cut pairs using α-strong incidence pairs and find the relation between Pythagorean fuzzy incidence trees and α-strong incidence pairs. Finally, we provide the application of Pythagorean fuzzy incidence graphs in the illegal wildlife trade.
One of the fundamental concepts in universal algebra is the concept of terms. Terms can be initially constructed from the simplest forms called variables. They are elements from the finite set Xn={x1,…,xn} or the countably infinite set X={x1,x2,x3,…}. Then variables may be optionally combined with non-nullary operation symbols from the set {fi∣i∈I} for a fixed index set I to form new terms. This approach of operation-symbol combination can literally take on any already constructed terms, not just variables. The sequence τ=(ni)i∈I of arities of operation symbols is called the {type}. The formal definition of the n-ary terms of type τ is as follows:
(i) Every element of Xn={x1,…,xn} is an n-ary term.
(ii) If t1,…,tni are n-ary terms and fi is an ni-ary operation symbol, then the composition fi(t1,…,tni) is an n-ary term.
By Wτ(Xn) and Wτ(X), we denote the set of all n-ary terms of type τ and the set of all terms of type τ, respectively. Note that Wτ(Xn)⊆Wτ(Xm) whenever m≥n. The applications of terms can be found in both algebraic and theoretical ways. Algebraically, terms are formal languages whose pairs stand for properties of algebras. With the selected properties, one can generate a variety of algebras satisfying those properties. Theoretically, terms are broadly utilized in linguistics and computer science. For more details on the applications of terms, we refer to [1,7,8,12] for algebraic aspects and to [1,8,9] for theoretical aspects. Moreover, readers may look into [4,10,11,13,17,18] for recent trends of term studies.
Acting as a base set, the set of terms Wτ(Xn) or Wτ(X) induces algebras of terms with various forms of fundamental operations on the said set of terms, one of which is a superposition of terms. A superposition is an operation of terms acting as a variable replacement by other terms. There are many forms of superpositions of terms, each of which is defined on a different base set of terms. For terms which are generated from a finite set of variables Xm and Xn, the superposition Snm:Wτ(Xn)×(Wτ(Xm))n→Wτ(Xm) is inductively defined as follows: for each t∈Wτ(Xn) and t1,…,tn∈Wτ(Xm),
(i) Snm(t,t1,…,tn):=ti if t=xi∈Xn;
(ii) Snm(t,t1,…,tn):=fi(Snm(s1,t1,…,tn),…,Snm(sni,t1,…,tn)) if t=fi(s1,…,sni).
There are also other forms of superpositions such as Sng defined on Wτ(X) (see [6]) and Sn, the particular case of Snm where n=m, defined on Wτn(Xn) where τn is a sequence of arities containing only many n (see [12]). Some superpositions are partial operations due to some restrictions of their corresponding base sets of terms such as those of linear terms, k-terms, fixed-variable, and fixed-length terms (see [3,13,17,18] for more information). Besides, the superpositions we discussed until now share one essential property called superassociative law (SASS):
Spm(z,Snm(y1,z1,…,zn),…,Snm(yp,z1,…,zn))≈Snm(Spn(z,y1,…,yp),z1,…,zn) |
where m,n,p are positive integers, y1,…,yp,z1,…,zn and z are terms (of an appropriate arity), and Spm,Snm, and Spn are superpositions. Note that those partial superpositions only consider the superassociative law as a weak identity.
At the period of time superpositions of terms have been studied throughout, Shtrakov [16] defined an inductive composition which is an operation of terms performing similarly to a superposition but with more choices of subterms which also cover variables to be substituted. The set sub(t) of subterms of t∈Wτ(Xn) is inductively defined as follows:
(i) sub(t):=t if t∈Xn;
(ii) sub(t):={t}∪sub(t1)∪…∪sub(tni) if t=fi(t1,…,tni).
For each r,s,t∈Wτ(Xn), the inductive composition t(r←s) gives out the term in Wτ(Xn) which is inductively defined (see e.g., [15,16]) by
(i) t(r←s):=t if r∉sub(t);
(ii) t(r←s):=s if t=r;
(iii) t(r←s):=fi(t1(r←s),…,tni(r←s)) if t=fi(t1,…,tni), r∈sub(t), and t≠r.
Once superassociative operations are obtained, algebraic structures called clones can then be constructed. Clones are multi-based algebras which satisfy the superassociative law (SASS) and the following two identities:
(C2) Snm(ei,z1,…,zn)≈zi;
(C3) Snn(z,e1,…,en)≈z.
Here, m,n∈N+:={1,2,3,…};i∈{1,…,n}; z,z1,…,zn are terms; e1,…,en are nullary operation symbols; Snm and Snn are operation symbols. The term clone of type τ
clone.τ:=((Wτ(Xn))n∈N+,(Snm)m,n∈N+,(xi)i∈{1,…n},n∈N+) |
is a basic example of clones.
There are other terminologies for single-based clone-like algebras of type (n+1) and (n+1,0,…,0). The former type induces an algebra called a Menger algebra of rank n which satisfies (SASS), and the latter one induces a unary Menger algebra of rank n, an algebra with n nullary operations which satisfies all of (SASS), (C2), and (C3).
Clones, Menger algebras, and unary Menger algebras of terms have been investigated for a long time in many kinds of terms and superpositions such as full terms (see [5]), generalized superpositions (see [2]), linear terms (see [3]), fixed-variable terms (see [17]), k-terms (see [13]), and fixed-length terms (see [18]). More background on clones and Menger algebras can be found in [7,12,14].
One may notice that an inductive composition defined by Shtrakov in [16] provides one subterm replacement at a time while a superposition replaces many variables in a term at once. This is a motivation of this paper to define another operation which inherits the good traits from an inductive composition and a superposition; more precisely, the operation will deal with subterm replacement and replace many subterms at once. We study its properties as well as clones relating to it. The freeness property of such clones is examined.
In this section, we give the definition of inductive superpositions induced from a fixed sequence of fixed terms of Wτ(Xn) and provide several properties of such superpositions to obtain clones or clone-like algebras concerning them.
Definition 2.1. Let m,n∈N+ where m≥n and r1,…rn∈Wτ(Xn) be n-ary fixed terms of type τ such that ri∉sub(rj) whenever i≠j. A mapping
Sn(m;r1,…,rn):Wτ(Xn)×(Wτ(Xm))n→Wτ(Xm) |
called an (r1,…,rn)-inductive superposition is defined for any t∈Wτ(Xn) and t1,…,tn∈Wτ(Xm) by
(i) Sn(m;r1,…,rn)(t,t1,…,tn):=t if sub(t)∩{r1,…,rn}=∅;
(ii) Sn(m;r1,…,rn)(t,t1,…,tn):=ti if t=ri∈{r1,…,rn};
(iii) Sn(m;r1,…,rn)(t,t1,…,tn):=fi(Sn(m;r1,…,rn)(s1,t1,…,tn),…,Sn(m;r1,…,rn)(sni,t1,…,tn))
if t=fi(s1,…,sni)∉{r1,…,rn} and sub(t)∩{r1,…,rn}≠∅.
Remark 2.1. From the above definition of inductive superpositions, we notice that:
(i) as an initial term, a variable x∈Xn is always fallen into either (i) or (ii) since sub(x)={x};
(ii) the condition ri∉sub(rj) whenever i≠j implies that all r's are distinct.
For convenience, we denote by R the sequence (r1,…,rn). So, we may write Sn(m;R) instead of Sn(m;r1,…,rn). The following example shows a calculation of an inductive superposition.
Example 2.1. Let t=f(f(x1,f(x2,x3)),x1),r1=f(x1,f(x2,x3)),r2=f(x3,x1), and r3=f(x1,x1), each of which is in W(2)(X3) where f is a binary operation symbol and let R=(r1,r2,r3). Then we have
S3(3;R)(t,x3,x2,x1)=S3(3;R)(f(f(x1,f(x2,x3)),x1),x3,x2,x1)=f(S3(3;R)(f(x1,f(x2,x3)),x3,x2,x1),S3(3;R)(x1,x3,x2,x1))=f(S3(3;R)(r1,x3,x2,x1),x1)=f(x3,x1). |
The relation m≥n in the previous definition is crucial. Lack of such condition can lead to the following invalidation.
Example 2.2. Let t=x4∈W(2)(X4) while r1=f(x1,x1),r2=f(x2,x2),r3=f(x2,x1), and r4=f(x1,x2) belong to W(2)(X2) with a binary operation symbol f. Setting R=(r1,r2,r3,r4), we see that n=4 and m=2 which implies m≱n. Then Sn(m;R)(t,r1,r2,r3,r4)=x4∉W(2)(Xm) since sub(t)∩{r1,r2,r3,r4}=∅.
From this point on, we set R to be a sequence of fixed terms, each of which is not a subterm of the others unless state otherwise. In this paper, we sometimes treat the sequence R of fixed terms as if it is a set of terms so that we can apply set operations such as an intersection and a subtraction to R. For example, a sequence R=(r1,r2,r3) may be treated as the set {r1,r2,r3}.
Moving to the special case of Sn(m;R) where n=m, we denote such superposition by SnR. Once we have a superposition, it is natural to ask for a corresponding clone. The superposition SnR as well as the sequence of terms R can be used to form an algebra (Wτ(Xn),SnR,R) on Wτ(Xn). Unfortunately, this algebra does not satisfy the superassociativity (SASS) in general. The following example illustrates this matter.
Example 2.3. Let τ=(2,1) with a binary operation symbol f and g a unary one, and R=(r1,r2,r3) where r1=g(x1),r2=f(g(x2),x3),r3=f(x2,x3). Consider Wτ(X3). We have
S3R(S3R(f(g(x1),f(g(x2),x3)),x2,x3,x1),g(x1),g(x2),g(x3))=S3R(f(x2,x3),g(x1),g(x2),g(x3))=g(x3) |
while
S3R(f(g(x1),f(g(x2),x3)),S3R(x2,g(x1),g(x2),g(x3)),S3R(x3,g(x1),g(x2),g(x3)),S3R(x1,g(x1),g(x2),g(x3)))=S3R(f(g(x1),f(g(x2),x3)),x2,x3,x1)=f(x2,x3). |
These show that S3R does not satisfy the clone axiom (SASS) on Wτ(X3).
As (Wτ(Xn),SnR,R) is not clone-like, our hope may bend to a base set restriction so that SnR is superassociative on that restricted base set. For a sequence R of fixed terms of Wτ(Xn), we denote WRτ(Xn):=Wτ(Xn)∖⋃r∈R(sub(r)∖{r}). This set seems to have our desired property. To prove the property, we need the following lemma.
Lemma 2.1. Let R=(r1,…,rn) be a sequence of fixed terms in Wτ(Xn) and t,s1,…,sn∈Wτ(Xn). If sub(t)∩R={rn1,…,rnk} for some subsequence (n1,…,nk) of (1,…,n), then sub(sj)⊆sub(SnR(t,s1,…,sn)) for all j∈{n1,…,nk}. The inclusion is proper if and only if t∉R.
Proof. Assume that sub(t)∩R={rn1,…,rnk}. We prove by induction on the structure of t. If t=rl∈R for some l∈{1,…,n}, then sub(t)∩R={rl} and SnR(t,s1,…,sn)=sl. Hence, sub(sl)⊆sub(SnR(t,s1,…,sn)). For t=fi(t1,…,tni)∉R, we have that for each j∈{n1,…,nk}, there is t′j∈{t1,…,tni} such that rj∈sub(t′j). Assume inductively that sub(sj)⊆sub(SnR(t′j,s1,…,sn)) for each j∈{n1,…,nk}. As SnR(t,s1,…,sn)=fi(SnR(t1,s1,…,sn),…,SnR(tni,s1,…,sn)), we see that sub(SnR(t,s1,…,sn))={SnR(t,s1,…,sn)}∪⋃nim=1sub(SnR(tm,s1,…,sn)). It follows that
sub(sj)⊆sub(SnR(t′j,s1,…,sn))⊊sub(SnR(t,s1,…,sn)). |
The proof is then complete.
The essential properties of WRτ(Xn) are described in the next lemma.
Lemma 2.2. Let R=(r1,…,rn) be a sequence of fixed terms in Wτ(Xn) and t,s1,…,sn∈WRτ(Xn). Then
(i) SnR(t,s1,…,sn)∈WRτ(Xn);
(ii) SnR(t,s1,…,sn)∉R whenever t∉R;
(iii) SnR(t,s1,…,sn)=rj if and only if t=rk and sk=rj for some j,k∈{1,…n}.
Proof. (ⅰ) If sub(t)∩R=∅, then SnR(t,s1,…,sn)=t∈WRτ(Xn). If t=ri∈R for some i∈{1,…,n}, then SnR(t,s1,…,sn)=si∈WRτ(Xn). For t=fi(t1,…,tni)∉R, sub(t)∩R≠∅, suppose that SnR(t,s1,…,sn)∉WRτ(Xn) Let rk∈sub(t) for some rk∈R. Since SnR(t,s1,…,sn)∉WRτ(Xn), we have that SnR(t,s1,…,sn)∈⋃r∈R(sub(r)∖{r}), i.e., SnR(t,s1,…,sn)∈sub(r)∖{r} for some r∈R. By Lemma 2.1, there follows sk∈sub(sk)⊊sub(SnR(t,s1,…,sn))⊆sub(r)∖{r} which is a contradiction to sk∈WRτ(Xn). Therefore, SnR(t,s1,…,sn)∈WRτ(Xn).
(ⅱ) Assume that t∉R. If sub(t)∩R=∅, then SnR(t,s1,…,sn)=t∉R. For t=fi(t1,…,tni)∉R, and sub(t)∩R≠∅, we suppose that SnR(t,s1,…,sn)∈R. Let sub(t)∩R={rn1,…,rnk}. By Lemma 2.1, we have that sub(sj)⊊sub(SnR(t,s1,…,sn)) for each j∈{n1,…,nk}. This means that sj is a proper subterm of a term in R which contradicts sj∈WRτ(Xn). Therefore, SnR(t,s1,…,sn)∉R.
(ⅲ) Assume that SnR(t,s1,…,sn)=rj for some j∈{1,…n}. By (ii), t∈R. Then t=rk for some k∈{1,…n}. Hence, rj=SnR(t,s1,…,sn)=SnR(rk,s1,…,sn)=sk. The converse is obvious.
Apparently, the converse of Lemma 2.2(ⅱ) does not hold. Moreover, the base set WRτ(Xn) has the following property.
Lemma 2.3. Let R=(r1,…,rn) be a sequence of fixed terms in Wτ(Xn) and t,s1,…,sn∈Wrτ(Xn) such that sub(t)∩R={rn1,…,rnk}. The following two conditions are equivalent:
(i) sub(SnR(t,s1,…,sn))∩R=∅;
(ii) sub(sj)∩R=∅ for all j∈{n1,…,nk}.
Proof. If t=rj for some j∈{1,…,n}, then sub(t)∩R={rj} and SnR(t,s1,…,sn)=sj. It follows that sub(SnR(t,s1,…,sn))∩R=∅ if and only if sub(sj)∩R=∅. Next, we consider the case t=fi(t1,…,tni)∉R and sub(t)∩R≠∅. By Lemma 2.2 (ⅱ), we have that SnR(t,s1,…,sn)∉R. To prove one direction, we assume that sub(SnR(t,s1,…,sn))∩R=∅. By Lemma 2.1, we have that sub(sj)⊆sub(SnR(t,s1,…,sn)) for each j∈{n1,…,nk}, and hence for each j∈{n1,…,nk}, sub(sj)∩R⊆sub(SnR(t,s1,…,sn))∩R=∅. Therefore, sub(sj)∩R=∅. On the other hand, assume that sub(sj)∩R=∅ for all j∈{n1,…,nk}. Since SnR(t,s1,…,sn)=fi(SnR(t1,s1,…,sn),…,SnR(tni,s1,…,sn)), it follows that sub(SnR(t,s1,…,sn))={SnR(t,s1,…,sn)}∪⋃nil=1sub(SnR(tl,s1,…,sn)). Let l∈{1,…,ni}. If tl∈⋃r∈R (sub(r)∖{r}), then SnR(tl,s1,…,sn)=tl. Thus, sub(SnR(tl,s1,…,sn))∩R=sub(tl)∩R=∅. If tl=rl′∈R, then SnR(tl,s1,…,sn)=sl′. Since rl′=tl∈sub(t), we get rl′∈sub(t)∩R. The assumption then gives sub(SnR(tl,s1,…,sn))∩R=sub(sl′)∩R=∅. If tl∈WRτ(Xn)∖R, then Lemma 2.2(ⅱ) yields SnR(tl,s1,…,sn)∉R. Then we consider in two cases. The first one is sub(tl)∩R=∅. This implies that sub(SnR(tl,s1,…,sn))∩R=sub(tl)∩R=∅. Another one goes to sub(tl)∩R≠∅. It follows that ∅≠sub(tl)∩R⊆sub(t)∩R={rn1,…,rnk}. For a term u∈WRτ(Xn), let Iu={m∈{1,…,n}∣rm∈sub(u)∩R}. Then Itl⊆It. The assumption sub(sj)∩R=∅ for all j∈{n1,…,nk}=It also provides that sub(sj)∩R=∅ for all j∈Itl. Using induction hypothesis, we obtain sub(SnR(tl,s1,…,sn))∩R=∅. Altogether, we finally obtain
sub(SnR(t,s1,…,sn))∩R=sub(fi(SnR(t1,s1,…,sn),…,SnR(tni,s1,…,sn)))∩R=({SnR(t,s1,…,sn)}∪ni⋃l=1sub(SnR(tl,s1,…,sn)))∩R=({SnR(t,s1,…,sn)}∩R)∪ni⋃l=1(sub(SnR(tl,s1,…,sn))∩R)=∅. |
The proof is eventually finished.
The next lemma emphasizes that an initial term t∈WRτ(Xn) will only be dominated by some certain terms of an inductive superposition.
Lemma 2.4. Let R=(r1,…,rn) be a sequence of fixed terms in Wτ(Xn), t,s1,…,sn∈WRτ(Xn) and sub(t)∩R={rn1,…,rnk}. Then
SnR(t,s1,…,sn)=SnR(t,u1,…,un1−1,sn1,un1+1,…,unk−1,snk,unk+1,…,un) |
for any u1,…,un1−1,un1+1,…,unk−1,unk+1,…,un∈WRτ(Xn).
Proof. We prove by induction on the structure of t. If t=rj∈R, then sub(t)∩R={rj} and SnR(t,s1,…,sn)=sj=SnR(t,u1,…,uj−1,sj,uj+1,…,un) for any u1,…,uj−1,uj+1,…,un∈WRτ(Xn). For t=fi(t1,…,tni)∉R, we have that sub(tj)∩R⊆sub(t)∩R={rn1,…,rnk} for each j∈{1,…,ni}. Let L be the largest subset of {t1,…,tni} such that sub(tl)∩R≠∅ for all tl∈L. Since t∉R and sub(t)∩R≠∅, L≠∅. For each tl∈L, suppose that sub(tl)∩R={rl1,…,rlkl}⊆{rn1,…,rnk}. Inductively, we assume that for each tl∈L, SnR(tl,s1,…,sn)=SnR(tl,u1,…,ul1−1,sl1,ul1+1,…,ulkl−1,slkl,ulkl+1,…,un) for any u1,…,ul1−1,ul1+1,…,ulkl−1,ulkl+1,…,un∈WRτ(Xn). We can set each ua where a∈{n1,…,nk}∖{l1,…,lkl} to be sa. In other words, for each tl∈L, we have
SnR(tl,s1,…,sn)=SnR(tl,u1,…,un1−1,sn1,un1+1,…,unk−1,snk,unk+1,…,un). |
Moreover, for each v∈{t1,…,tni}∖L, sub(v)∩R=∅ and thus
SnR(v,s1,…,sn)=v=SnR(v,u1,…,un1−1,sn1,un1+1,…,unk−1,snk,unk+1,…,un). |
Therefore,
SnR(t,s1,…,sn)=fi(SnR(t1,s1,…,sn),…,SnR(tni,s1,…,sn))=fi(SnR(t1,u1,…,un1−1,sn1,un1+1,…,unk−1,snk,unk+1,…,un),…,SnR(tni,u1,…,un1−1,sn1,un1+1,…,unk−1,snk,unk+1,…,un))=SnR(t,u1,…,un1−1,sn1,un1+1,…,unk−1,snk,unk+1,…,un). |
The proof is then complete.
The superposition SnR as well as the sequence R of fixed terms in Wτ(Xn) can be used to form an algebra on WRτ(Xn), namely, n-ary R-inductive clone of type τ denoted by n-cloneRτ. This algebra is defined by
n-cloneRτ:=(WRτ(Xn),SnR,R). |
This algebra turns out to be a unitary Menger algebra of rank n, an algebra of type (n+1,0,…,0) with n nullary operations which satisfies the three clone axioms: (SASS), (C2) and (C3).
Theorem 2.1. Let R=(r1,…,rn) be a sequence of fixed terms in Wτ(Xn). The n-cloneRτ satisfies the three clone axioms: (SASS),(C2) and (C3).
Proof. First, we prove (SASS) by induction on the structure of the initial term. Let t,s1,…,sn,u1,…,un∈WRτ(Xn). If sub(t)∩R=∅, then
SnR(t,SnR(s1,u1,…,un),…,SnR(sn,u1,…,un))=t=SnR(t,u1,…,un)=SnR(SnR(t,s1,…,sn),u1,…,un). |
If t=rj for some j∈{1,…,n}, then
SnR(t,SnR(s1,u1,…,un),…,SnR(sn,u1,…,un))=SnR(sj,u1,…,un)=SnR(SnR(t,s1,…,sn),u1,…,un). |
For t=fi(t1,…,tni)∉R and sub(t)∩R≠∅, we inductively assume that
SnR(tk,SnR(s1,u1,…,un),…,SnR(sn,u1,…,un))=SnR(SnR(tk,s1,…,sn),u1,…,un) |
for each k∈{1,…,ni}. Let sub(t)∩R={rn1,…,rnk}. The term SnR(SnR(t,s1,…,sn),u1,…,un) must be considered in 2 cases:
Case 1. sub(SnR(t,s1,…,sn))∩R=∅.
By Lemma 2.3, we have that sub(sj)∩R=∅ for each j∈{n1,…,nk}. There follows SnR(sj,u1,…,un)=sj for each j∈{n1,…,nk}. Therefore,
SnR(SnR(t,s1,…,sn),u1,…,un)=SnR(t,s1,…,sn)=SnR(t,SnR(s1,u1,…,un),…,SnR(sn,u1,…,un)). |
The last equation concerning sl for each l∈{1,…,ni}∖{n1,…,nk} is valid due to Lemma 2.4.
Case 2. sub(SnR(t,s1,…,sn))∩R≠∅.
By Lemma 2.2(ⅱ), SnR(t,s1,…,sn)∉R. As a consequence, we obtain
SnR(SnR(t,s1,…,sn),u1,…,un)=SnR(fi(SnR(t1,s1,…,sn),…,SnR(tni,s1,…,sn)),u1,…,un)=fi(SnR(SnR(t1,s1,…,sn),u1,…,un),…,SnR(SnR(tni,s1,…,sn),u1,…,un))=fi(SnR(t1,SnR(s1,u1,…,un),…,SnR(sn,u1,…,un)),…,SnR(tni,SnR(s1,u1,…,un),…,SnR(sn,u1,…,un)))=SnR(fi(t1,…,tni),SnR(s1,u1,…,un),…,SnR(sn,u1,…,un))=SnR(t,SnR(s1,u1,…,un),…,SnR(sn,u1,…,un)). |
These ensure the (SASS) satisfaction of n-cloneRτ. For (C2), it is directly obtained from the definition of SnR. To prove (C3), we can simply do so by induction on the structure of the initial term.
From the previous section, we have shown that n-cloneRτ is a clone (in fact, a unitary Menger algebra of rank n). It's natural to ask for a generating set of a clone which is very essential in studying the freeness property of that clone. In this section, we consider a clone n-cloneRτn=(WRτn(Xn),SnR,R) of a specific type τn:=(ni)i∈I where ni=n for all i∈I. We define sub(R):=⋃r∈Rsub(r) and FRτn:={fi(u1,…,un)∣i∈Iaandauj∈{rj}∪(sub(R)∖R)afor eacha1≤j≤n}.
Lemma 3.1. Let R=(r1,…,rn) be a sequence of fixed terms in Wτn(Xn). Then GRτn:=(FRτn∪Xn)∩(WRτn(Xn)∖R) is a generating system of n-cloneRτn.
Proof. We show by induction on the complexity of a term t∈WRτn(Xn) that t can be generated from GRτn. All elements in R belong to the type of n-cloneRτn so they are generated. Next, consider t∉R. If t∈Xn, then t∈GRτn and so it is generated. For t=fi(t1,…,tn), it is obviously generated if it belongs to GRτn, so we assume that t∉GRτn. Then there is k∈{1,…,n} such that tk∉{rk}∪(sub(R)∖R). Let K={k1,…,km}⊆{1,…,n} be the set of all indices such that tk′∉{rk′}∪(sub(R)∖R) for any k′∈K. This means that tk1,…,tkm∈WRτn(Xn). Inductively assume that tk1,…,tkm are all generated. Note that for each l∈{1,…,n}∖K, tl∈{rl}∪(sub(R)∖R), i.e., tl=rl or tl∈sub(R)∖R. The latter provides SnR(tl,s1,…,sn)=tl for any s1,…,sn∈WRτn(Xn) while the former gives SnR(tl,s1,…,sl−1,rl,sl+1,sn)=SnR(tl,r1,…,rn)=tl for any s1,…,sl−1,sl+1,…,sn∈WRτn(Xn) due to Lemma 2.4 and (C3) satisfaction. Let T=(r1,…,rk1−1,tk1,rk1+1,…,rkm−1,tkm,rkm+1,…,rn) be a sequence. For a shorter expression, we denote SnR(u,r1,…,rk1−1,tk1,rk1+1,…,rkm−1,tkm,rkm+1,…,rn) by simply SnR(u,T) for any u∈Wτn(Xn). Consequently,
SnR(fi(t1,…,tk1−1,rk1,tk1+1,…,tkm−1,rkm,tkm+1,…,tn),r1,…,rk1−1,tk1,rk1+1,…,rkm−1,tkm,rkm+1,…,rn)=SnR(fi(t1,…,tk1−1,rk1,tk1+1,…,tkm−1,rkm,tkm+1,…,tn),T)=fi(SnR(t1,T),…,SnR(tk1−1,T),SnR(rk1,T),SnR(tk1+1,T),…,SnR(tkm−1,T),SnR(rkm,T),SnR(tkm+1,T),…,SnR(tn,T))=fi(t1,…,tk1−1,tk1,tk1+1,…,tkm−1,tkm,tkm+1,…,tn)=t. |
Hence, t is generated.
We remark from the previous lemma that when we consider R=Xn, the generating system GRτn of n-cloneRτn becomes {fi(x1,…,xn)∣i∈I} which coincides with the result discovered in [12].
Once we obtain a generator of a clone, the freeness property of that clone can then be examined. A clone is free with respect to itself if there is a generating system such that each mapping from this generating system to the corresponding clone can be extended to an endomorphism of that clone. Undoubtedly, if R=Xn, then the clone n-cloneRτn is actually (Wτn(Xn),Sn,x1,…,xn) and from the results mentioned in [12], it is free with respect to itself. Unfortunately, not every setting of R makes n-cloneRτn satisfy such freeness as shown in the following example.
Example 3.1. Let n=3, τ3=(3,3) with ternary operation symbols f and g, R=(f(x1,x1,x1),f(x2,x2,x2),f(x1,x2,x1)). Consider x3∈WRτ3(X3). It is not difficult to see that x3 cannot be generated unless it is in a generating system. Let G be a generating system of this 3−cloneRτ3 and φ:G→WRτ3(X3) be a mapping with ¯φ as its extension on WRτ3(X3) and φ(x3)=¯φ(x3)=f(x1,x1,x1). If G is a singleton set of x3, then ⟨G⟩3−cloneRτ3={x3,r1,r2,r3}≠WRτ3(X3), a contradiction. So, the cardinality of G must be greater than 1. We also have that for s1,s2,s3∈WRτ3(X3),
¯φ(SnR(x3,s1,s2,s3))=¯φ(x3)=f(x1,x1,x1) |
while
SnR(¯φ(x3),¯φ(s1),¯φ(s2),¯φ(s3))=SnR(f(x1,x1,x1),¯φ(s1),¯φ(s2),¯φ(s3))=¯φ(s1). |
This implies that ¯φ(SnR(x3,s1,s2,s3))=SnR(¯φ(x3),¯φ(s1),¯φ(s2),¯φ(s3)) if and only if ¯φ designates each term of WRτ3(X3) the term f(x1,x1,x1) in which case the mapping φ is not independent due to the cardinality of G being greater than 1. Therefore, this 3−cloneRτ3 is not free with respect to itself.
Our hope is bended to finding the condition of R which makes n-cloneRτn satisfy freeness property. Referring to the above example, we see that if there is a variable in a generating system, a mapping from the generating system to WRτn(Xn) cannot be selected freely or else its extension will not satisfy homomorphism. This leads to the following lemma whose proof is similar to the reasoning from Example 3.1.
Lemma 3.2. If the clone n-cloneRτn is free with respect to itself, then Xn⊆sub(R).
We have to find all possible minimal generators of the clone in order to investigate the incident where the clone is free with respect to itself. To do so, we first define the R-equivalence of terms: let s,t∈Wτ(Xn) be n-ary terms of type τ and R=(r1,…,rn) be a sequence of fixed terms in Wτ(Xn). A term t is said to be R-equivalent to s, in which case we denote by t∼Rs, if s can be obtained from t by interchanging each r∈sub(t)∩R via a bijection α:sub(t)∩R→sub(s)∩R whenever sub(t)∩R≠∅, and s=t otherwise.
Example 3.2. Let R=(r1,…,rn) be a sequence of fixed terms in Wτ(Xn) and g(x1)∉R. Consider terms from W(2,1,3)(X5) where f,g, and h are binary, unary, and ternary operation symbols, respectively.
(1) r1∼Rr2 with a bijection α:{r1}→{r2} defined by α(r1)=r2;
(2) f(r1,r2)∼Rf(r2,r1) via a bijection α:{r1,r2}→{r2,r1} defined by α(r1)=r2 and α(r2)=r1;
(3) h(r1,g(x1),r3)∼Rh(r3,g(x1),r2) via a bijection α:{r1,r3}→{r3,r2} defined by α(r1)=r3 and α(r3)=r2.
The following lemma characterizes R-equivalent terms in which at least one r∈R is included.
Lemma 3.3. Let R=(r1,…,rn) be a sequence of fixed terms in Wτ(Xn) and s,t∈Wτ(Xn) such that sub(t)∩R≠∅ and t∼Rs which relates to a bijection α:sub(t)∩R→sub(s)∩R.
(i) If t∈R, then s∈R. More precisely, s=α(t)∈R.
(ii) If t=fi(t1,…,tni)∉R and sub(t)∩R≠∅, then s=fi(s1,…,sni) and tj∼Rsj for all j∈{1,…,ni} with the additional condition of the case sub(tj)∩R≠∅ that the bijection αj:sub(tj)∩R→sub(sj)∩R relating to the equivalence must be a restriction of α.
Proof. (ⅰ) This is directly obtained from the definition of ∼R.
(ⅱ) Assume that t=fi(t1,…,tni)∉R and sub(t)∩R≠∅. Let A={a∈{1,…,ni}∣sub(ta)∩R≠∅}. Then sub(ta′)∩R=∅ for all a′∈{1,…,ni}∖A. Since s can be obtained from t by interchanging each r∈sub(t)∩R, any operation symbol of t which is not a subterm of any r∈sub(t)∩R stays unchanged and thus s=fi(s1,…,sni) for some s1,…,sni∈Wτ(Xn). Again, by the definition of ∼R, we obtain ta′=sa′ for all a′∈{1,…,ni}∖A which also means that ta′∼Rsa′. Consider each ta where a∈A. If there is j∈A such that tj≁Rsj, then sj cannot be obtained from tj by simply swapping each r∈sub(tj)∩R through any bijection αj:sub(tj)∩R→sub(sj)∩R. Acting as a subterm of t and s, respectively, this unpleasant behavior of tj and sj leads to the same behavior for t and s, contrary to t∼Rs. Thus, tj∼Rsj for all j∈A. Altogether, we obtain tj∼Rsj for all j∈{1,…,ni}. Additionally, for each ta where a∈A, the index of satisfying sub(ta)∩R≠∅, we let αa:sub(ta)∩R→sub(sa)∩R be a bijection corresponding to ta∼Rsa. It is crucial to note that |sub(ta)∩R|=|sub(sa)∩R|. Therefore, α|sub(ta)∩R:sub(ta)∩R→sub(sa)∩R is also a bijection. A simple calculation provides αa=α|sub(ta)∩R because otherwise we would get different s. The proof is then complete.
A common question for any relation is to classify whether it is an equivalent relation or not. The R-equivalence, ∼R, appears to be an equivalent one.
Lemma 3.4. Let R=(r1,…,rn) be a sequence of fixed terms in Wτ(Xn). Then ∼R is an equivalent relation on Wτ(Xn).
Proof. Let s,t,u∈Wτ(Xn). Reflexivity is obvious. To show symmetry, we assume that t∼Rs. It is easy to see that s∼Rt when sub(t)∩R=∅. Additionally assume that sub(t)∩R≠∅. Let α:sub(t)∩R→sub(s)∩R be a bijection correponding to t∼Rs. Note that α−1:sub(s)∩R→sub(t)∩R is also a bijection and hence s∼Rt. To prove transitivity, we assume that t∼Rs and s∼Ru. Then t∼Ru is directly obtained if one of s,t, or u does not have any r∈R as its subterms. Suppose more that sub(t)∩R and sub(s)∩R are nonempty. Let α:sub(t)∩R→sub(s)∩R and β:sub(s)∩R→sub(u)∩R be bijections correponding to t∼Rs and s∼Ru, respectively. Thus, the mapping β∘α:sub(t)∩R→sub(u)∩R is bijective. Therefore, t∼Ru. Consequently, ∼R is an equivalent relation on Wτ(Xn).
For a sequence of fixed terms R=(r1,…,rn) in Wτ(Xn), we denote by [t]∼R an equivalent class of t∈Wτ(Xn) relating to ∼R. The next lemma describes a behaviour of terms within the same equivalent class based on ∼R.
Lemma 3.5. Let R=(r1,…,rn) be a sequence of fixed terms in Wτ(Xn), s,t∈Wτ(Xn) with sub(t)∩R={rn1,…,rnk}, and t∼Rs (i.e., t and s are in the same equivalent class of ∼R) corresponding to a bijection α:sub(t)∩R→sub(s)∩R. Then SnR(t,r1,…,rn1−1,α(rn1),rn1+1,…,rnk−1,α(rnk),rnk+1,…,rn)=s.
Proof. We prove by induction on the structure of t. If t=rj∈R, then Lemma 3.3(ⅰ) yields s=α(rj)=rk∈R. So, SnR(t,r1,…,rj−1,α(rj),rj+1,…,rn)=SnR(rj,r1,…,rj−1,rk,rj+1,…,rn)=rk=s. For t=fi(t1,…,tni)∉R and sub(t)∩R≠∅, we have by Lemma 3.3(ⅱ) that s=fi(s1,…,sni) and tj∼Rsj for all j∈{1,…,ni} and if sub(tj)∩R≠∅, then the equivalence relates to αj:=α∣sub(tj)∩R:sub(tj)∩R→sub(sj)∩R. Inductively assume that for each m∈{1,…,ni}, if sub(tm)∩R={rm1,…,rma} and tm∼Rsm, then SnR(tm,r1,…,rm1−1,α(rm1),rm1+1,…,rma−1,α(rma),rma+1,…,rm)=sm. Let J={j∈{1,…,ni}∣sub(tj)∩R≠∅}. By induction hypothesis and Lemma 2.4, we obtain sj=SnR(tj,r1,…,rn1−1,α(rn1),rn1+1,…,rnk−1,α(rnk),rnk+1,…,rn) for all j∈J. For each l∈{1,…,ni}∖J, we see that sub(tl)∩R=∅ and by the definition of ∼R, we get tl=sl. Hence, SnR(tl,r1,…,rn1−1,α(rn1),rn1+1,…,rnk−1,α(rnk),rnk+1,…,rn)=tl=sl. These imply that SnR(tk,r1,…,rn1−1,α(rn1),rn1+1,…,rnk−1,α(rnk),rnk+1,…,rn)=sk for all k∈{1,…,ni}. Therefore,
SnR(t,r1,…,rn1−1,α(rn1),rn1+1,…,rnk−1,α(rnk),rnk+1,…,rn)=fi(SnR(t1,r1,…,rn1−1,α(rn1),rn1+1,…,rnk−1,α(rnk),rnk+1,…,rn),…,SnR(tni,r1,…,rn1−1,α(rn1),rn1+1,…,rnk−1,α(rnk),rnk+1,…,rn))=fi(s1,…,sni)=s. |
Note that the superposition of the form in the previous lemma is also valid for a term t with sub(t)∩R=∅. Such form of a superposition in the above lemma leads to an essential result.
Corollary 3.1. Let R=(r1,…,rn) be a sequence of fixed terms in Wτn(Xn) and s,t∈WRτn(Xn) such that t∼Rs. Then ⟨t⟩n−cloneRτn=⟨s⟩n−cloneRτn.
Scoping out the generating system GRτn of n-cloneRτn, we have a characterization of terms in the same ∼R-equivalent class.
Lemma 3.6. Let R=(r1,…,rn) be a sequence of fixed terms in Wτn(Xn),u∈WRτn(Xn), and t∈GRτn. Then t∼Ru if and only if t=SnR(u,u1,…,un) for some u1,…,un∈WRτn(Xn)∖{t}.
Proof. One direction is immediately obtained from Lemma 3.5. On the other hand, assume that t=SnR(u,u1,…,un) for some u1,…,un∈WRτn(Xn)∖{t}. We consider 3 cases.
Case 1. t∈Xn∩(WRτn(Xn)∖R).
If sub(u)∩R≠∅, then Lemma 2.1 provides
sub(ul)⊆sub(SnR(u,u1,…,un))=sub(t)={t} |
for some l∈{1,…,n}. This implies that ul=t, a contradiction. Therefore, sub(u)∩R=∅ and hence t=SnR(u,u1,…,un)=u. This means that t∼Ru.
Case 2. t=fi(t1,…,tn) and tj∈sub(R)∖R for all j∈{1,…,n}.
If u=rk∈R, then t=SnR(u,u1,…,un)=uk, a contradiction. For u=fi(s1,…,sn)∉R and sub(u)∩R≠∅, we let K={k∈{1,…,n}∣sub(sk)∩R≠∅}. Then K≠∅ and fi(t1,…,tn)=t=SnR(u,u1,…,un)=fi(SnR(s1,u1,…,un),…,SnR(sn,u1,…,un)). So, SnR(sj,u1,…,un)=tj for all j∈{1,…,n}. Now for each k∈K, SnR(sk,u1,…,un)=tk and sub(sk)∩R≠∅. By Lemma 2.1, we obtain ul∈sub(ul)⊆sub(SnR(sk,u1,…,un))=sub(tk) for some l∈{1,…,n} which means that ul∈sub(R)∖R, a contradiction to ul∈WRτn(Xn). Consequently, sub(u)∩R=∅ and thus t=SnR(u,u1,…,un)=u, i.e., t∼Ru.
Case 3. t=fi(t1,…,tn) and tj∉sub(R)∖R for some j∈{1,…,n}.
Let M={m∈{1,…,n}∣tm∉sub(R)∖R}={m∈{1,…,n}∣tm=rm}. Then M≠∅ which implies that sub(t)∩R≠∅. We consider the possibility of u. If u=rk∈R, then t=SnR(u,u1,…,un)=uk, a contradiction. If sub(u)∩R=∅, then t=SnR(u,u1,…,un)=u which contradicts to sub(t)∩R≠∅. Therefore, u=fi(s1,…,sn)∉R and sub(u)∩R≠∅. This implies that fi(t1,…,tn)=t=SnR(u,u1,…,un)=fi(SnR(s1,u1,…,un),…,SnR(sn,u1,…,un)). For each m′∈{1,…,n}∖M, SnR(sm′,u1,…,un)=tm′∈sub(R)∖R. If sub(sm′)∩R≠∅, then by Lemma 2.1, there is l∈{1,…,n} such that sub(ul)⊆sub(tm′) which means that ul∈sub(R)∖R, contradicting ul∈WRτn(Xn). Hence, sub(sm′)∩R=∅ and thus sm′=SnR(sm′,u1,…,un)=tm′. For each m∈M, we have that SnR(sm,u1,…,un)=tm=rm. By Lemma 2.2(ⅲ), sm=rpm and upm=rm for some pm∈{1,…,n}. Let P={p∈{1,…,n}∣rp=smafor someam∈M}. We show that |P|=|M|, suppose not. Then |P|<|M| or |M|<|P|. The latter is impossible since otherwise there will be m∈M such that rp=sm=rp′ for some distinct p,p′∈P by pigeonhole principle. The former implies, by pigeonhole principle, that there are distinct m,˜m∈M and p∈P such that sm=rp and s˜m=rp. Then Lemma 2.2(ⅲ) yields rm=up=r˜m which is impossible. Therefore, |P|=|M|. This means that there is a bijection β:M→P or more accurately, a bijection α:sub(t)∩R→sub(u)∩R. So far we have the term u=fi(s1,…,sn) where sm′=tm′ and sm=rpm for each m′∈{1,…,n}∖M and m∈M and for some pm∈P. It follows that the term u can be obtained by swapping each r∈sub(t)∩R via a bijection α:sub(t)∩R→sub(u)∩R. So, t∼Ru.
The proof is finally complete.
Lemma 3.6 provides a robust method how each term in the generating system GRτn of n-cloneRτn is generated. Such term can only be formed by using a term within the same ∼R-class. Again, that term can only be generated by some term from the same ∼R-class. This will be an endless process unless we include terms from that ∼R-class in a generating set. Ideally, only one term from each ∼R-class is needed if we want a minimal one. This discussion leads to the following corollary.
Corollary 3.2. The generating system GRτn of n-cloneRτn is minimal and the other minimal generating systems of the clone are collections of terms selecting from ∼R-classs of terms in GRτn, one from each class.
Extending the finding from Lemma 3.2, we now identify conditions which are equivalent to the self-freeness of n-cloneRτn.
Theorem 3.1. Let R=(r1,…,rn) be a sequence of fixed terms in Wτn(Xn) and G be the collection of all minimal generating systems of n-cloneRτn. Then the following statements are equivalent.
(i) The clone n-cloneRτn is free with respect to itself.
(ii) R=(xα(1),…,xα(n)) for some permutation α on {1,…,n} or τn=(1). (iii) There exists G∈G such that Xn∩G=∅ and fi(t1,…,tn)∉G in which tj∈sub(R)∖R for some j∈{1,…,n}.
Proof. (ⅰ) ⇒ (ⅲ): Let A be a generator of n-cloneRτn and G∈G such that G⊆A. Assume that Xn∩G≠∅. By Lemma 3.1 and Corollary 3.2, |G|≥1. Let t∈Xn∩G,s1,…,sn∈WRτn(Xn), and φ:G→WRτn(Xn) be a mapping. It follows by Lemma 3.1 and Corollary 3.2 that t∈Xn∩(WRτn(Xn)∖R). In order for an extension ¯φ of φ to be an endomorphism of n-cloneRτn, the following expression must be satisfied:
φ(t)=¯φ(t)=¯φ(SnR(t,s1,…,sn))=SnR(¯φ(t),¯φ(s1),…,¯φ(sn))=SnR(φ(t),¯φ(s1),…,¯φ(sn)). |
Note that φ(t) can be any element from WRτn(Xn). For φ(t)=r1∈R, we have
r1=φ(t)=SnR(φ(t),¯φ(s1),…,¯φ(sn))=¯φ(s1). |
Since s1 is arbitrary and |G|≥1, φ must be an identity mapping of G and it cannot be defined freely. Thus, any extension ψ:A→WRτn(Xn) of φ cannot be defined freely either. Therefore, n-cloneRτn is not free with respect to itself. Next, assume that s=fi(t1,…,tn)∈G in which tj∈sub(R)∖R for some j∈{1,…,n}. This implies that |G|≥1 by Lemma 3.1 and Corollary 3.2. Let J={j∈{1,…,n}∣tj∈sub(R)∖R}={j1,…,jm}. If J={1,…,n}, then sub(s)∩R=∅. To be a homomorphism, ¯φ needs to satisfy
φ(s)=¯φ(s)=¯φ(SnR(s,s1,…,sn))=SnR(φ(s),¯φ(s1),…,¯φ(sn)). |
Consider φ(s)=r1∈R and we can imply that n-cloneRτn is not free with respect to itself by similar reasoning of the previous case. In the case of J≠{1,…,n}, we have by Lemma 3.1 and Corollary 3.2 that tj′=rα(j′) for some injective mapping α:{1,…,n}∖J→{1,…,n} for all j′∈{1,…,n}∖J. The homomorphism requires
¯φ(fi(sα(1),…,sα(j1−1),tj1,sα(j1+1),…,sα(jm−1),tjm,sα(jm+1),…,sα(n)))=¯φ(fi(SnR(t1,s1,…,sn),…,SnR(tn,s1,…,sn)))=¯φ(SnR(s,s1,…,sn))=SnR(φ(s),¯φ(s1),…,¯φ(sn)). |
For φ(s)=rk for some k∈{1,…,n}∖α({1,…,n}∖J), we see that
¯φ(fi(sα(1),…,sα(j1−1),tj1,sα(j1+1),…,sα(jm−1),tjm,sα(jm+1),…,sα(n)))=SnR(φ(s),¯φ(s1),…,¯φ(sn))=¯φ(sk). |
Since the leftmost term is not dominated by the term sk, ¯φ(sk) gets mapped to a fixed element for any sk∈WRτn(Xn). With similar reasoning from the first case, we conclude that n-cloneRτn is not free with respect to itself.
(ⅲ) ⇒ (ⅱ): Suppose that R≠(xα(1),…,xα(n)) for any permutation α on {1,…,n} and τn≠(1). Let G∈G. To show that there exists fi(t1,…,tn)∈G in which tj∈sub(R)∖R for some j∈{1,…,n}. By assumption, there is r∈R such that r=fi(u1,…,un) for some u1,…,un∈Wτn(Xn). It follows that u1,…,un∈sub(R)∖R. If n≥2, then for a fixed operation symbol f,
|{f(v1,…,vn)∣vj∈sub(R)∖Ra for some aj∈{1,…,n}}|>n=|R|. |
So, {f(v1,…,vn)∣vj∈sub(R)∖Ra for some aj∈{1,…,n}}∩G≠∅. For the case n=1 with two or more operation symbols, let g be a unary operation symbol besides f. As n=1, we have that R=(f(u1)) or R=(g(u1)) for some u1∈Wτ1(X1). This implies that u1∈sub(R)∖R. By Lemma 3.1 and Corollary 3.2, we get g(u1)∈G if R=(f(u1)) and f(u1)∈G if R=(g(u1)).
(ⅱ) ⇒ (ⅰ): Assume that R=(xα(1),…,xα(n)) for some permutation α on {1,…,n}. Lemma 3.1 provides GRτn=FRτn={fi(r1,…,rn)∣i∈I}. We extend φ:GRτn→WRτn(Xn) to ¯φ:n-cloneRτn→n-cloneRτn by defining
(1) ¯φ(t)=t if t∈R;
(2) ¯φ(t)=SnR(φ(fi(r1,…,rn)),¯φ(t1),…,¯φ(tn)) if t=fi(t1,…,tn).
Note that the condition for the second case is actually t=fi(t1,…,tn)∉R and sub(t)∩R≠∅. Let t,s1,…,sn∈WRτn(Xn). We prove by induction on the structure of t that ¯φ is an endomorphism of n-cloneRτn. If t=rk∈R, then
¯φ(SnR(t,s1,…,sn))=¯φ(sk)=SnR(t,¯φ(s1),…,¯φ(sn))=SnR(¯φ(t),¯φ(s1),…,¯φ(sn)). |
For t=fi(t1,…,tn)∉R and sub(t)∩R≠∅, we inductively assume that ¯φ(SnR(tj,s1,…,sn))=SnR(¯φ(tj),¯φ(s1),…,¯φ(sn)) for all j∈{1,…,n}. Since R is a sequence of all variables, sub(SnR(tj,s1,…,sn))∩R≠∅ for any j∈{1,…,n}. It follows that
¯φ(SnR(t,s1,…,sn))=¯φ(fi(SnR(t1,s1,…,sn),…,SnR(tn,s1,…,sn)))=SnR(φ(fi(r1,…,rn)),¯φ(SnR(t1,s1,…,sn)),…,¯φ(SnR(tn,s1,…,sn)))=SnR(φ(fi(r1,…,rn)),SnR(¯φ(t1),¯φ(s1),…,¯φ(sn)),…,SnR(¯φ(tn),¯φ(s1),…,¯φ(sn)))=SnR(SnR(φ(fi(r1,…,rn)),¯φ(t1),…,¯φ(tn)),¯φ(s1),…,¯φ(sn))=SnR(¯φ(t),¯φ(s1),…,¯φ(sn)). |
These depict the homomorphism of ¯φ. Next, assume that τn=(1) with f as the unary operation symbol. It is easy to identify that GRτn={f(r1)} and WRτn(Xn)={r1,f(r1),f(f(r1)),f(f(f(r1))),…}. Note that sub(u)∩R≠∅ for all u∈WRτn(Xn). We extend φ:GRτn→WRτn(Xn) to ¯φ:n-cloneRτn→n-cloneRτn by defining ¯φ(r1)=r1 and ¯φ(t)=SnR(φ(f(r1)),¯φ(t1)) if t=f(t1). Let t,s1∈WRτn(Xn). We show that ¯φ(SnR(t,s1))=SnR(¯φ(t),¯φ(s1)). This is immediate when t=r1, so only the case t=f(t1)∉R remains. Inductively assume that ¯φ(SnR(t1,s1))=SnR(¯φ(t1),¯φ(s1)). We then obtain
¯φ(SnR(t,s1))=¯φ(f(SnR(t1,s1)))=SnR(φ(f(r1)),¯φ(SnR(t1,s1)))=SnR(φ(f(r1)),SnR(¯φ(t1),¯φ(s1)))=SnR(SnR(φ(f(r1)),¯φ(t1)),¯φ(s1))=SnR(¯φ(t),¯φ(s1)). |
Consequently, n-cloneRτn is free with respect to itself.
The condition for the clone n-cloneRτn to be free with respect to itself is eventually obtained. It provides that not every form of mapping φ from a minimal generator M to WRτn(Xn) can be extended to an endomorphism of the clone. The final theorem here gives a sufficient condition for such mapping to be extendable as an endomorphism of the clone.
Theorem 3.2. Let R=(r1,…,rn) be a sequence of fixed terms in Wτn(Xn). Then a mapping φ:GRτn→WRτn(Xn) can be extended to an endomorphism on n-cloneRτn if for each t∈GRτn, sub(φ(t))∩R⊆sub(t)∩R.
Proof. Assume that sub(φ(t))∩R⊆sub(t)∩R for each t∈GRτn. Define ¯φ:WRτn(Xn)→WRτn(Xn) in the following way: for each t∈WRτn(Xn),
(i) ¯φ(t)=t if t∈R.
(ii) ¯φ(t)=φ(t) if t∈Xn∖R.
(iii) ¯φ(fi(t1,…,tn))=SnR(φ(fi(r1,…,rn)),¯φ(t1),…,¯φ(tn)) if tj∈WRτn(Xn) for all j∈{1,…,n}.
(iv) ¯φ(fi(t1,…,tn))=SnR(φ(fi(r1,…,rk1−1,tk1,rk1+1,…,rkm−1,tkm,rkm+1,…,rn)),¯φ(t1),…,¯φ(tk1−1),uk1,¯φ(tk1+1),…,¯φ(tkm−1),ukm,¯φ(tkm+1),…,¯φ(tn)) for some uk1,…,ukm∈WRτn(Xn) such that sub(ul)∩R=∅ for all l∈{k1,…,km} if tk1,…,tkm∈sub(R)∖R.
We first show that ¯φ is an extension of φ to WRτn(Xn). This is clear for t∈Xn∖R. Let t=fi(t1,…,tn)∈GRτn. If tj=rj for all j∈{1,…,n}, then by (iii) and (C3), we see that ¯φ(t)=¯φ(fi(r1,…,rn))=SnR(φ(fi(r1,…,rn)),¯φ(r1),…,¯φ(rn))=SnR(φ(fi(r1,…,rn)),r1,…,rn)=φ(fi(r1,…,rn))=φ(t). Next, for the case of tj≠rj for some j∈{1,…,n}, we set K={k1,…,km}⊆{1,…,n} to be the set of all indices such that tk∈sub(R)∖R for all k∈K. So, tp=rp for all p∈{1,…,n}∖K and sub(t)∩R={rp∣p∈{1,…,n}∖K}. It follows from the assumption that sub(φ(t))∩R⊆{rp∣p∈{1,…,n}∖K}. Then (ⅳ), (C3), and Lemma 2.4 give out
¯φ(t)=¯φ(fi(r1,…,rk1−1,tk1,rk1+1,…,rkm−1,tkm,rkm+1,…,rn))=SnR(φ(fi(r1,…,rk1−1,tk1,rk1+1,…,rkm−1,tkm,rkm+1,…,rn)),¯φ(r1),…,¯φ(rk1−1),uk1,¯φ(rk1+1),…,¯φ(rkm−1),ukm,¯φ(rkm+1),…,¯φ(rn))=SnR(φ(t),r1,…,rn)=φ(t) |
where uk1,…,ukm∈WRτn(Xn) such that sub(ul)∩R=∅ for all l∈{k1,…,km}. These represent the required extension. Only an endomorphism of ¯φ is left to be proved. Let t,s1,…,sn∈WRτn(Xn). We show that ¯φ(SnR(t,s1,…,sn))=SnR(¯φ(t),¯φ(s1),…,¯φ(sn)). If t=rj∈R for some j∈{1,…,n}, then
¯φ(SnR(t,s1,…,sn))=¯φ(sj)=SnR(rj,¯φ(s1),…,¯φ(sn))=SnR(¯φ(t),¯φ(s1),…,¯φ(sn)). |
If t∈Xn∖R, then t∈GRτn and by assumption, we get sub(φ(t))∩R⊆sub(t)∩R={t}∩R=∅, and thus sub(φ(t))∩R=∅. Therefore,
SnR(¯φ(t),¯φ(s1),…,¯φ(sn))=SnR(φ(t),¯φ(s1),…,¯φ(sn))=φ(t)=¯φ(t)=¯φ(SnR(t,s1,…,sn)). |
Next, we consider the case t=fi(t1,…,tn)∉R and sub(t)∩R=∅. Hence, sub(tj)∩R=∅ for all j∈{1,…,n}. We first show that sub(¯φ(t))∩R=∅. If tj∈Xn for each j∈{1,…,n}, then tj∈GRτn or tj∈sub(R)∖R. The former implies that sub(¯φ(tj))∩R=∅ due to the assumption at the beginning. Furthermore, there are two possible forms of ¯φ(t), each of which corresponds to (ⅲ) or (ⅳ). Thanks to Lemma 2.3, we obtain, regardless of the form of ¯φ(t), that sub(¯φ(t))∩R=∅. For the case of tj=fij(t1j,…,tnj) for some j∈{1,…,n}, let T be the set of all terms among t1,…,tn which are not a variable. It follows that T≠∅. Since t∉R and sub(t)∩R=∅, we have that u∉R and sub(u)∩R=∅ for any u∈T. Assume inductively that sub(¯φ(u))∩R=∅. Using similar reasoning from the previous case, we eventually obtain sub(¯φ(t))∩R=∅. Now, we have shown that sub(¯φ(t))∩R=∅. Thus, we have that SnR(¯φ(t),¯φ(s1),…,¯φ(sn))=¯φ(t)=¯φ(SnR(t,s1,…,sn)).
Only the case t=fi(t1,…,tn)∉R and sub(t)∩R≠∅ remains. Inductively assume that ¯φ(SnR(tj,s1,…,sn))=SnR(¯φ(tj),¯φ(s1),…,¯φ(sn)) for each j∈{1,…,n} with tj∈WRτn(Xn). If tj∈WRτn(Xn) for all j∈{1,…,n}, we then have
¯φ(SnR(t,s1,…,sn))=¯φ(SnR(fi(t1,…,tn),s1,…,sn))=¯φ(fi(SnR(t1,s1,…,sn),…,SnR(tn,s1,…,sn)))=SnR(φ(fi(r1,…,rn)),¯φ(SnR(t1,s1,…,sn)),…,¯φ(SnR(tn,s1,…,sn)))=SnR(φ(fi(r1,…,rn)),SnR(¯φ(t1),¯φ(s1),…,¯φ(sn)),…,SnR(¯φ(tn),¯φ(s1),…,¯φ(sn)))=SnR(SnR(φ(fi(r1,…,rn)),¯φ(t1),…,¯φ(tn)),¯φ(s1),…,¯φ(sn))=SnR(¯φ(fi(t1,…,tn)),¯φ(s1),…,¯φ(sn))=SnR(¯φ(t),¯φ(s1),…¯φ(sn)). |
If some of t1,…,tn belong to sub(R)∖R, let K={k1,…,km}⊆{1,…,n} be the set of all indices such that tk∈sub(R)∖R for all k∈K. Hence, SnR(tk,s1,…,sn)=tk for each k∈K; moreover, tp∈WRτn(Xn) for each p∈{1,…,n}∖K, and hence SnR(tp,s1,…,sn)∈WRτn(Xn).
Note that for each term u∈Wτn(Xn) with sub(u)∩R=∅, u=SnR(u,¯φ(s1),…,¯φ(sn)). Then
¯φ(SnR(t,s1,…,sn))=¯φ(SnR(fi(t1,…,tn),s1,…,sn))=¯φ(fi(SnR(t1,s1,…,sn),…,SnR(tn,s1,…,sn)))=¯φ(fi(SnR(t1,s1,…,sn),…,SnR(tk1−1,s1,…,sn),tk1,SnR(tk1+1,s1,…,sn),…,SnR(tkm−1,s1,…,sn),tkm,SnR(tkm+1,s1,…,sn),…,SnR(tn,s1,…,sn)))=SnR(φ(fi(r1,…,rk1−1,tk1,rk1+1,…,rkm−1,tkm,rkm+1,…,rn)),¯φ(SnR(t1,s1,…,sn)),…,¯φ(SnR(tk1−1,s1,…,sn)),uk1,¯φ(SnR(tk1+1,s1,…,sn)),…,¯φ(SnR(tkm−1,s1,…,sn)),ukm,¯φ(SnR(tkm+1,s1,…,sn)),…,¯φ(SnR(tn,s1,…,sn)))=SnR(φ(fi(r1,…,rk1−1,tk1,rk1+1,…,rkm−1,tkm,rkm+1,…,rn)),SnR(¯φ(t1),¯φ(s1),…,¯φ(sn)),…,SnR(¯φ(tk1−1),¯φ(s1),…,¯φ(sn)),uk1,SnR(¯φ(tk1+1),¯φ(s1),…,¯φ(sn)),…,SnR(¯φ(tkm−1),¯φ(s1),…,¯φ(sn)),ukm,SnR(¯φ(tkm+1),¯φ(s1),…,¯φ(sn)),…,(¯φ(tn),¯φ(s1),…,¯φ(sn)))=SnR(SnR(φ(fi(r1,…,rk1−1,tk1,rk1+1,…,rkm−1,tkm,rkm+1,…,rn)),¯φ(t1),…,¯φ(tk1−1),uk1,¯φ(tk1+1),…,¯φ(tkm−1),ukm,¯φ(tkm+1),…,¯φ(tn)),¯φ(s1),…,¯φ(sn))=SnR(¯φ(t),¯φ(s1),…,¯φ(sn)). |
where uk1,…,ukm∈WRτn(Xn) such that sub(ul)∩R=∅ for all l∈{k1,…,km}. Consequently, ¯φ is an endomorphism.
Although this final theorem only considers the minimal generating system GRτn, other minimal ones can be substituted for GRτn since each term of any minimal generating system is R-equivalent to the corresponding term from GRτn due to Corollary 3.2. However, the way we define an extension ¯φ will be slightly different from that of GRτn.
It is crucial to remark that the converse of the previous theorem does not hold. A simple incident occurs where sub(R)∖R≠∅, ensuring the existence of t∈GRτn such that sub(t)∩R=∅, and φ:GRτn→WRτn(Xn) maps each element in the generating set GRτn to a fixed term r∈R. Then we can simply extend the mapping to a constant mapping of WRτn(Xn) which makes it an endomorphism; however, sub(φ(t))∩R={r}⊈∅=sub(t)∩R.
The main discoveries from this paper regard the properties of an inductive superposition, a superposition performing the subterm replacement instead of the usual variable replacement. Acting as an (n+1)-ary operation, an inductive superposition induces a unitary Menger algebra of rank n whose form generalizes that of [12]. By using the concept of R-equivalent class, we managed to classify all possible minimal generating systems of the clone n-cloneRτn and found out that the clone is not free with respect to itself for some sequences of fixed terms. Fortunately, we were able to seek out all possible conditions for the clone to be self-free. Lastly, a sufficient condition for a mapping to be extendable to an endomorphism of the clone was given. The future research may possibly be conducted toward the use of an inductive superposition in place of a usual variable-replacing superposition such as in the context of a hypersubstitution and of a superposition of tree languages.
This research was supported by the Fundamental Fund of Khon Kaen University.
All authors declare no conflicts of interest in this paper.
[1] |
L. A. Zadeh, Fuzzy sets, Inform. Control, 8 (1965), 338–353. https://doi.org/10.1016/S0019-9958(65)90241-X doi: 10.1016/S0019-9958(65)90241-X
![]() |
[2] |
K. T. Atanassov, Intuitionistic fuzzy sets, Fuzzy Set. Syst., 20 (1986), 87–96. https://doi.org/10.1016/S0165-0114(86)80034-3 doi: 10.1016/S0165-0114(86)80034-3
![]() |
[3] |
Z. Xu, R. R. Yager, Some geometric aggregation operators based on intuitionistic fuzzy sets, Int. J. Gen. Syst., 35 (2006), 417–433. http://dx.doi.org/10.1080/03081070600574353 doi: 10.1080/03081070600574353
![]() |
[4] | R. R. Yager, Pythagorean fuzzy subsets, In: Joint IFS World Congress and NAFIPS Annual Meeting, Edmonton, Canada, 2013, 57–61. http://dx.doi.org/10.1109/IFSA-NAFIPS.2013.6608375 |
[5] |
R. R. Yager, Pythagorean membership grades in multiple criteria decision-making, IEEE T. Fuzzy Syst., 22 (2014), 458–465. http://dx.doi.org/10.1109/TFUZZ.2013.2278989 doi: 10.1109/TFUZZ.2013.2278989
![]() |
[6] |
R. R. Yager, A. M. Abbasov, Pythagorean membership grades, complex numbers, and decision-making, Int. J. Intell. Syst., 28 (2013), 436–452. http://dx.doi.org/10.1002/int.21584 doi: 10.1002/int.21584
![]() |
[7] | A. Kaufmann, Introduction a la Theorie des Sour-Ensembles Flous, Masson et Cie, Paris, France, 1973. https://doi.org/10.1080/03081077508960278 |
[8] | A. Rosenfeld, Fuzzy graphs, Fuzzy sets and their applications to cognitive and decision processes, Academic press, New York, 1975, 77–95. https://doi.org/10.1016/B978-0-12-775260-0.50008-6 |
[9] |
S. Mathew, M. Sunitha, Node connectivity and arc connectivity in fuzzy graphs, Inform. Sci., 180 (2010), 519–531. http://dx.doi.org/10.1016/j.ins.2009.10.006 doi: 10.1016/j.ins.2009.10.006
![]() |
[10] | D. Chakraborty, N. K. Mahapatra, Notes on intuitionistic fuzzy graph, Int. J. Adv. Math., 2020 (2020), 9–23. |
[11] |
J. Bera, K. C. Das, S. Samanta, J. G. Lee, Connectivity status of intuitionistic fuzzy graph and its application to merging of banks, Mathematics, 11 (2023), 1949. http://dx.doi.org/10.3390/math11081949 doi: 10.3390/math11081949
![]() |
[12] |
S. Naz, S. Ashraf, M. Akram, A novel approach to decision-making with Pythagorean fuzzy information, Mathematics, 6 (2018), 95. https://doi.org/10.3390/math6060095 doi: 10.3390/math6060095
![]() |
[13] |
M. Akram, S. Naz, Energy of Pythagorean fuzzy graphs with applications, Mathematics, 6 (2018), 136. https://doi.org/10.3390/math6080136 doi: 10.3390/math6080136
![]() |
[14] |
M. Akram, A. Habib, F. Ilyas, J. M. Dar, Specific types of Pythagorean fuzzy graphs and application to decision-making, Math. Comput. Appl., 23 (2018), 42. https://doi.org/10.3390/mca23030042 doi: 10.3390/mca23030042
![]() |
[15] |
M. Akram, J. M. Dar, S. Naz, Certain graphs under Pythagorean fuzzy environment, Complex Intell. Syst., 5 (2019), 127–144. http://dx.doi.org/10.1007/s40747-018-0089-5 doi: 10.1007/s40747-018-0089-5
![]() |
[16] | M. Akram, A. Habib, B. Davvaz, Direct sum of n Pythagorean fuzzy graphs with application to group decision-making, J. Mult.-Valued Log. S., 33 (2019), 75–115. |
[17] |
M. Akram, J. M. Dar, A. Farooq, Planar graphs under Pythagorean fuzzy environment, Mathematics, 6 (2018), 278. https://doi.org/10.3390/math6120278 doi: 10.3390/math6120278
![]() |
[18] |
M. Akram, S. Siddique, M. G. Alharbi, Clustering algorithm with strength of connectedness for m-polar fuzzy network models, Math. Biosci. Eng., 19 (2022), 420–455. http://dx.doi.org/10.3934/mbe.2022021 doi: 10.3934/mbe.2022021
![]() |
[19] |
M. Akram, S. Siddique, J. C. R. Alcantud, Connectivity indices of m-polar fuzzy network model, with an application to a product manufacturing problem, Artif. Intell. Rev., 56 (2023), 7795–7838. https://doi.org/10.1007/s10462-022-10360-9 doi: 10.1007/s10462-022-10360-9
![]() |
[20] |
U. Ahmad, I. Nawaz, Directed rough fuzzy graph with application to trade networking, Comput. Appl. Math., 41 (2022), 1–26. http://dx.doi.org/10.1007/s40314-022-02073-0 doi: 10.1007/s40314-022-02073-0
![]() |
[21] |
U. Ahmad, I. Nawaz, Wiener index of a directed rough fuzzy graph and application to human trafficking, J. Intell. Fuzzy Syst., 44 (2023), 1479–1495. http://dx.doi.org/10.3233/JIFS-221627 doi: 10.3233/JIFS-221627
![]() |
[22] |
U. Ahmad, T. Batool, Domination in rough fuzzy digraphs with application, Soft Comput., 27 (2023), 2425–2442. http://dx.doi.org/10.1007/s00500-022-07795-1 doi: 10.1007/s00500-022-07795-1
![]() |
[23] |
M. Akram, S. Shahzadi, A. Rasool, M. Sarwar, Decision-making methods based on fuzzy soft competition hypergraphs, Complex Intell. Syst., 8 (2022), 2325–2348. https://doi.org/10.1007/s40747-022-00646-4 doi: 10.1007/s40747-022-00646-4
![]() |
[24] |
M. Sarwar, M. Akram, S. Shahzadi, Bipolar fuzzy soft information applied to hypergraphs, Soft Comput., 25 (2021), 3417–3439. https://doi.org/10.1007/s00500-021-05610-x doi: 10.1007/s00500-021-05610-x
![]() |
[25] |
S. Shahzadi, M. Sarwar, M. Akram, Decision-making approach with fuzzy type-2 soft graphs, J. Math., 2020 (2020). https://doi.org/10.1155/2020/8872446 doi: 10.1155/2020/8872446
![]() |
[26] |
S. Shahzadi, A. Rasool, M. Sarwar, M. Akram, A framework of decision making based on bipolar fuzzy competition hypergraphs, J. Intell. Fuzzy Syst., 41 (2021), 1319–1339. http://dx.doi.org/10.3233/JIFS-210216 doi: 10.3233/JIFS-210216
![]() |
[27] | T. Dinesh, A study on graph structures, incidence algebras and their fuzzy analogues, Ph.D. Thesis, Kannur University, Kerala, India, 2012. |
[28] |
T. Dinesh, Fuzzy incidence graph–-An introduction, Adv. Fuzzy Set. Syst., 21 (2016), 33–48. http://dx.doi.org/10.17654/FS021010033 doi: 10.17654/FS021010033
![]() |
[29] |
J. N. Mordeson, Fuzzy incidence graphs, Adv. Fuzzy Set. Syst., 21 (2016), 121–131. https://doi.org/10.17654/FS021020121 doi: 10.17654/FS021020121
![]() |
[30] |
D. S. Malik, S. Mathew, J. N. Mordeson, Fuzzy incidence graphs: Applications to human trafficking, Inform. Sci., 447 (2018), 244–255. https://doi.org/10.1016/j.ins.2018.03.022 doi: 10.1016/j.ins.2018.03.022
![]() |
[31] |
S. Mathew, J. N. Mordeson, Connectivity concepts in fuzzy incidence graphs, Inform. Sci., 382–383 (2017), 326–333. https://doi.org/10.1016/j.ins.2016.12.020 doi: 10.1016/j.ins.2016.12.020
![]() |
[32] |
J. Fang, I. Nazeer, T. Rashid, J. B. Liu, Connectivity and Wiener index of fuzzy incidence graphs, Math. Probl. Eng., 2021 (2021). https://doi.org/10.1155/2021/6682966 doi: 10.1155/2021/6682966
![]() |
[33] |
I. Nazeer, T. Rashid, J. L. G. Guirao, Domination of fuzzy incidence graphs with the algorithm and application for the selection of a medical lab, Math. Probl. Eng., 2021 (2021). https://doi.org/10.1155/2021/6682502 doi: 10.1155/2021/6682502
![]() |
[34] |
I. Nazeer, T. Rashid, M. T. Hussain, Cyclic connectivity index of fuzzy incidence graphs with applications in the highway system of different cities to minimize road accidents and in a network of different computers, PLOS One, 16 (2021). https://doi.org/10.1371/journal.pone.0257642 doi: 10.1371/journal.pone.0257642
![]() |
[35] | J. N. Mordeson, D. S. Malik, S. Mathew, Fuzzy incidence graphs in Fuzzy graph theory with applications to human trafficking, Springer, New York, NY, US, 2018, 87–137. http://dx.doi.org/10.1007/978-3-319-76454-2_3 |
[36] |
I. Nazeer, T. Rashid, A. Keikha, An application of product of intuitionistic fuzzy incidence graphs in textile industry, Complexity, 2021 (2021), 1–16. https://doi.org/10.1155/2021/5541125 doi: 10.1155/2021/5541125
![]() |
1. | O.M. Khaled, H.M. Barakat, Laila A. AL-Essa, Ehab M. Almetwally, Physics and economic applications by progressive censoring and bootstrapping sampling for extension of power Topp-Leone model, 2024, 17, 16878507, 100898, 10.1016/j.jrras.2024.100898 | |
2. | Amany E. Aly, Magdy E. El-Adll, Haroon M. Barakat, Ramy Abdelhamid Aldallal, A new least squares method for estimation and prediction based on the cumulative Hazard function, 2023, 8, 2473-6988, 21968, 10.3934/math.20231120 | |
3. | M. E. Sobh, H. M. Barakat, Magdy E. El-Adll, Amany E. Aly, Asymptotic behavior of bootstrapped extreme order statistics under unknown power normalizing constants, 2025, 66, 0932-5026, 10.1007/s00362-025-01665-2 |