Research article Special Issues

Pythagorean fuzzy incidence graphs with application in illegal wildlife trade

  • Received: 18 April 2023 Revised: 18 June 2023 Accepted: 26 June 2023 Published: 10 July 2023
  • MSC : 03E72, 05C72

  • Chemical engineers can model numerous interactions in a process using incidence graphs. They are used to methodically map out a whole network of interconnected processes and controllers to describe each component's impact on the others. It makes it easier to visualize potential process paths or a series of impacts. A Pythagorean fuzzy set is an effective tool to overcome ambiguity and vagueness. In this paper, we introduce the concept of Pythagorean fuzzy incidence graphs. We discuss the incidence path and characterize the strongest incidence path in Pythagorean fuzzy incidence graphs. Furthermore, we propose the idea of Pythagorean fuzzy incidence cycles and Pythagorean fuzzy incidence trees in Pythagorean fuzzy incidence graphs and give some essential results. We illustrate the notions of Pythagorean fuzzy incidence cut vertices, Pythagorean fuzzy incidence bridges, and Pythagorean fuzzy incidence cut pairs. We also establish some results about Pythagorean fuzzy incidence cut pairs. Moreover, we study the types of incidence pairs and determine some crucial results concerning strong incidence pairs in the Pythagorean fuzzy incidence graph. We also obtain the characterization of Pythagorean fuzzy incidence cut pairs using α-strong incidence pairs and find the relation between Pythagorean fuzzy incidence trees and α-strong incidence pairs. Finally, we provide the application of Pythagorean fuzzy incidence graphs in the illegal wildlife trade.

    Citation: Ayesha Shareef, Uzma Ahmad, Saba Siddique, Mohammed M. Ali Al-Shamiri. Pythagorean fuzzy incidence graphs with application in illegal wildlife trade[J]. AIMS Mathematics, 2023, 8(9): 21793-21827. doi: 10.3934/math.20231112

    Related Papers:

    [1] Areej M. AL-Zaydi . On concomitants of generalized order statistics arising from bivariate generalized Weibull distribution and its application in estimation. AIMS Mathematics, 2024, 9(8): 22002-22021. doi: 10.3934/math.20241069
    [2] Wenzhi Zhao, Dou Liu, Huiming Wang . Sieve bootstrap test for multiple change points in the mean of long memory sequence. AIMS Mathematics, 2022, 7(6): 10245-10255. doi: 10.3934/math.2022570
    [3] Jin-liang Wang, Chang-shou Deng, Jiang-feng Li . On moment convergence for some order statistics. AIMS Mathematics, 2022, 7(9): 17061-17079. doi: 10.3934/math.2022938
    [4] Enrique de Amo, José Juan Quesada-Molina, Manuel Úbeda-Flores . Total positivity and dependence of order statistics. AIMS Mathematics, 2023, 8(12): 30717-30730. doi: 10.3934/math.20231570
    [5] H. M. Barakat, M. H. Dwes . Asymptotic behavior of ordered random variables in mixture of two Gaussian sequences with random index. AIMS Mathematics, 2022, 7(10): 19306-19324. doi: 10.3934/math.20221060
    [6] Mohamed Said Mohamed, Muqrin A. Almuqrin . Properties of fractional generalized entropy in ordered variables and symmetry testing. AIMS Mathematics, 2025, 10(1): 1116-1141. doi: 10.3934/math.2025053
    [7] Jinliang Wang, Fang Wang, Songbo Hu . On asymptotic correlation coefficient for some order statistics. AIMS Mathematics, 2023, 8(3): 6763-6776. doi: 10.3934/math.2023344
    [8] Haroon Barakat, Osama Khaled, Hadeer Ghonem . Predicting future order statistics with random sample size. AIMS Mathematics, 2021, 6(5): 5133-5147. doi: 10.3934/math.2021304
    [9] Mikail Et, Muhammed Cinar, Hacer Sengul Kandemir . Deferred statistical convergence of order α in metric spaces. AIMS Mathematics, 2020, 5(4): 3731-3740. doi: 10.3934/math.2020241
    [10] Salim Bouzebda, Amel Nezzal . Uniform in number of neighbors consistency and weak convergence of kNN empirical conditional processes and kNN conditional U-processes involving functional mixing data. AIMS Mathematics, 2024, 9(2): 4427-4550. doi: 10.3934/math.2024218
  • Chemical engineers can model numerous interactions in a process using incidence graphs. They are used to methodically map out a whole network of interconnected processes and controllers to describe each component's impact on the others. It makes it easier to visualize potential process paths or a series of impacts. A Pythagorean fuzzy set is an effective tool to overcome ambiguity and vagueness. In this paper, we introduce the concept of Pythagorean fuzzy incidence graphs. We discuss the incidence path and characterize the strongest incidence path in Pythagorean fuzzy incidence graphs. Furthermore, we propose the idea of Pythagorean fuzzy incidence cycles and Pythagorean fuzzy incidence trees in Pythagorean fuzzy incidence graphs and give some essential results. We illustrate the notions of Pythagorean fuzzy incidence cut vertices, Pythagorean fuzzy incidence bridges, and Pythagorean fuzzy incidence cut pairs. We also establish some results about Pythagorean fuzzy incidence cut pairs. Moreover, we study the types of incidence pairs and determine some crucial results concerning strong incidence pairs in the Pythagorean fuzzy incidence graph. We also obtain the characterization of Pythagorean fuzzy incidence cut pairs using α-strong incidence pairs and find the relation between Pythagorean fuzzy incidence trees and α-strong incidence pairs. Finally, we provide the application of Pythagorean fuzzy incidence graphs in the illegal wildlife trade.



    One of the fundamental concepts in universal algebra is the concept of terms. Terms can be initially constructed from the simplest forms called variables. They are elements from the finite set Xn={x1,,xn} or the countably infinite set X={x1,x2,x3,}. Then variables may be optionally combined with non-nullary operation symbols from the set {fiiI} for a fixed index set I to form new terms. This approach of operation-symbol combination can literally take on any already constructed terms, not just variables. The sequence τ=(ni)iI of arities of operation symbols is called the {type}. The formal definition of the n-ary terms of type τ is as follows:

    (i) Every element of Xn={x1,,xn} is an n-ary term.

    (ii) If t1,,tni are n-ary terms and fi is an ni-ary operation symbol, then the composition fi(t1,,tni) is an n-ary term.

    By Wτ(Xn) and Wτ(X), we denote the set of all n-ary terms of type τ and the set of all terms of type τ, respectively. Note that Wτ(Xn)Wτ(Xm) whenever mn. The applications of terms can be found in both algebraic and theoretical ways. Algebraically, terms are formal languages whose pairs stand for properties of algebras. With the selected properties, one can generate a variety of algebras satisfying those properties. Theoretically, terms are broadly utilized in linguistics and computer science. For more details on the applications of terms, we refer to [1,7,8,12] for algebraic aspects and to [1,8,9] for theoretical aspects. Moreover, readers may look into [4,10,11,13,17,18] for recent trends of term studies.

    Acting as a base set, the set of terms Wτ(Xn) or Wτ(X) induces algebras of terms with various forms of fundamental operations on the said set of terms, one of which is a superposition of terms. A superposition is an operation of terms acting as a variable replacement by other terms. There are many forms of superpositions of terms, each of which is defined on a different base set of terms. For terms which are generated from a finite set of variables Xm and Xn, the superposition Snm:Wτ(Xn)×(Wτ(Xm))nWτ(Xm) is inductively defined as follows: for each tWτ(Xn) and t1,,tnWτ(Xm),

    (i) Snm(t,t1,,tn):=ti if t=xiXn;

    (ii) Snm(t,t1,,tn):=fi(Snm(s1,t1,,tn),,Snm(sni,t1,,tn)) if t=fi(s1,,sni).

    There are also other forms of superpositions such as Sng defined on Wτ(X) (see [6]) and Sn, the particular case of Snm where n=m, defined on Wτn(Xn) where τn is a sequence of arities containing only many n (see [12]). Some superpositions are partial operations due to some restrictions of their corresponding base sets of terms such as those of linear terms, k-terms, fixed-variable, and fixed-length terms (see [3,13,17,18] for more information). Besides, the superpositions we discussed until now share one essential property called superassociative law (SASS):

    Spm(z,Snm(y1,z1,,zn),,Snm(yp,z1,,zn))Snm(Spn(z,y1,,yp),z1,,zn)

    where m,n,p are positive integers, y1,,yp,z1,,zn and z are terms (of an appropriate arity), and Spm,Snm, and Spn are superpositions. Note that those partial superpositions only consider the superassociative law as a weak identity.

    At the period of time superpositions of terms have been studied throughout, Shtrakov [16] defined an inductive composition which is an operation of terms performing similarly to a superposition but with more choices of subterms which also cover variables to be substituted. The set sub(t) of subterms of tWτ(Xn) is inductively defined as follows:

    (i) sub(t):=t if tXn;

    (ii) sub(t):={t}sub(t1)sub(tni) if t=fi(t1,,tni).

    For each r,s,tWτ(Xn), the inductive composition t(rs) gives out the term in Wτ(Xn) which is inductively defined (see e.g., [15,16]) by

    (i) t(rs):=t if rsub(t);

    (ii) t(rs):=s if t=r;

    (iii) t(rs):=fi(t1(rs),,tni(rs)) if t=fi(t1,,tni), rsub(t), and tr.

    Once superassociative operations are obtained, algebraic structures called clones can then be constructed. Clones are multi-based algebras which satisfy the superassociative law (SASS) and the following two identities:

    (C2) Snm(ei,z1,,zn)zi;

    (C3) Snn(z,e1,,en)z.

    Here, m,nN+:={1,2,3,};i{1,,n}; z,z1,,zn are terms; e1,,en are nullary operation symbols; Snm and Snn are operation symbols. The term clone of type τ

    clone.τ:=((Wτ(Xn))nN+,(Snm)m,nN+,(xi)i{1,n},nN+)

    is a basic example of clones.

    There are other terminologies for single-based clone-like algebras of type (n+1) and (n+1,0,,0). The former type induces an algebra called a Menger algebra of rank n which satisfies (SASS), and the latter one induces a unary Menger algebra of rank n, an algebra with n nullary operations which satisfies all of (SASS), (C2), and (C3).

    Clones, Menger algebras, and unary Menger algebras of terms have been investigated for a long time in many kinds of terms and superpositions such as full terms (see [5]), generalized superpositions (see [2]), linear terms (see [3]), fixed-variable terms (see [17]), k-terms (see [13]), and fixed-length terms (see [18]). More background on clones and Menger algebras can be found in [7,12,14].

    One may notice that an inductive composition defined by Shtrakov in [16] provides one subterm replacement at a time while a superposition replaces many variables in a term at once. This is a motivation of this paper to define another operation which inherits the good traits from an inductive composition and a superposition; more precisely, the operation will deal with subterm replacement and replace many subterms at once. We study its properties as well as clones relating to it. The freeness property of such clones is examined.

    In this section, we give the definition of inductive superpositions induced from a fixed sequence of fixed terms of Wτ(Xn) and provide several properties of such superpositions to obtain clones or clone-like algebras concerning them.

    Definition 2.1. Let m,nN+ where mn and r1,rnWτ(Xn) be n-ary fixed terms of type τ such that risub(rj) whenever ij. A mapping

    Sn(m;r1,,rn):Wτ(Xn)×(Wτ(Xm))nWτ(Xm)

    called an (r1,,rn)-inductive superposition is defined for any tWτ(Xn) and t1,,tnWτ(Xm) by

    (i) Sn(m;r1,,rn)(t,t1,,tn):=t if sub(t){r1,,rn}=;

    (ii) Sn(m;r1,,rn)(t,t1,,tn):=ti if t=ri{r1,,rn};

    (iii) Sn(m;r1,,rn)(t,t1,,tn):=fi(Sn(m;r1,,rn)(s1,t1,,tn),,Sn(m;r1,,rn)(sni,t1,,tn))

    if t=fi(s1,,sni){r1,,rn} and sub(t){r1,,rn}.

    Remark 2.1. From the above definition of inductive superpositions, we notice that:

    (i) as an initial term, a variable xXn is always fallen into either (i) or (ii) since sub(x)={x};

    (ii) the condition risub(rj) whenever ij implies that all r's are distinct.

    For convenience, we denote by R the sequence (r1,,rn). So, we may write Sn(m;R) instead of Sn(m;r1,,rn). The following example shows a calculation of an inductive superposition.

    Example 2.1. Let t=f(f(x1,f(x2,x3)),x1),r1=f(x1,f(x2,x3)),r2=f(x3,x1), and r3=f(x1,x1), each of which is in W(2)(X3) where f is a binary operation symbol and let R=(r1,r2,r3). Then we have

    S3(3;R)(t,x3,x2,x1)=S3(3;R)(f(f(x1,f(x2,x3)),x1),x3,x2,x1)=f(S3(3;R)(f(x1,f(x2,x3)),x3,x2,x1),S3(3;R)(x1,x3,x2,x1))=f(S3(3;R)(r1,x3,x2,x1),x1)=f(x3,x1).

    The relation mn in the previous definition is crucial. Lack of such condition can lead to the following invalidation.

    Example 2.2. Let t=x4W(2)(X4) while r1=f(x1,x1),r2=f(x2,x2),r3=f(x2,x1), and r4=f(x1,x2) belong to W(2)(X2) with a binary operation symbol f. Setting R=(r1,r2,r3,r4), we see that n=4 and m=2 which implies mn. Then Sn(m;R)(t,r1,r2,r3,r4)=x4W(2)(Xm) since sub(t){r1,r2,r3,r4}=.

    From this point on, we set R to be a sequence of fixed terms, each of which is not a subterm of the others unless state otherwise. In this paper, we sometimes treat the sequence R of fixed terms as if it is a set of terms so that we can apply set operations such as an intersection and a subtraction to R. For example, a sequence R=(r1,r2,r3) may be treated as the set {r1,r2,r3}.

    Moving to the special case of Sn(m;R) where n=m, we denote such superposition by SnR. Once we have a superposition, it is natural to ask for a corresponding clone. The superposition SnR as well as the sequence of terms R can be used to form an algebra (Wτ(Xn),SnR,R) on Wτ(Xn). Unfortunately, this algebra does not satisfy the superassociativity (SASS) in general. The following example illustrates this matter.

    Example 2.3. Let τ=(2,1) with a binary operation symbol f and g a unary one, and R=(r1,r2,r3) where r1=g(x1),r2=f(g(x2),x3),r3=f(x2,x3). Consider Wτ(X3). We have

    S3R(S3R(f(g(x1),f(g(x2),x3)),x2,x3,x1),g(x1),g(x2),g(x3))=S3R(f(x2,x3),g(x1),g(x2),g(x3))=g(x3)

    while

    S3R(f(g(x1),f(g(x2),x3)),S3R(x2,g(x1),g(x2),g(x3)),S3R(x3,g(x1),g(x2),g(x3)),S3R(x1,g(x1),g(x2),g(x3)))=S3R(f(g(x1),f(g(x2),x3)),x2,x3,x1)=f(x2,x3).

    These show that S3R does not satisfy the clone axiom (SASS) on Wτ(X3).

    As (Wτ(Xn),SnR,R) is not clone-like, our hope may bend to a base set restriction so that SnR is superassociative on that restricted base set. For a sequence R of fixed terms of Wτ(Xn), we denote WRτ(Xn):=Wτ(Xn)rR(sub(r){r}). This set seems to have our desired property. To prove the property, we need the following lemma.

    Lemma 2.1. Let R=(r1,,rn) be a sequence of fixed terms in Wτ(Xn) and t,s1,,snWτ(Xn). If sub(t)R={rn1,,rnk} for some subsequence (n1,,nk) of (1,,n), then sub(sj)sub(SnR(t,s1,,sn)) for all j{n1,,nk}. The inclusion is proper if and only if tR.

    Proof. Assume that sub(t)R={rn1,,rnk}. We prove by induction on the structure of t. If t=rlR for some l{1,,n}, then sub(t)R={rl} and SnR(t,s1,,sn)=sl. Hence, sub(sl)sub(SnR(t,s1,,sn)). For t=fi(t1,,tni)R, we have that for each j{n1,,nk}, there is tj{t1,,tni} such that rjsub(tj). Assume inductively that sub(sj)sub(SnR(tj,s1,,sn)) for each j{n1,,nk}. As SnR(t,s1,,sn)=fi(SnR(t1,s1,,sn),,SnR(tni,s1,,sn)), we see that sub(SnR(t,s1,,sn))={SnR(t,s1,,sn)}nim=1sub(SnR(tm,s1,,sn)). It follows that

    sub(sj)sub(SnR(tj,s1,,sn))sub(SnR(t,s1,,sn)).

    The proof is then complete.

    The essential properties of WRτ(Xn) are described in the next lemma.

    Lemma 2.2. Let R=(r1,,rn) be a sequence of fixed terms in Wτ(Xn) and t,s1,,snWRτ(Xn). Then

    (i) SnR(t,s1,,sn)WRτ(Xn);

    (ii) SnR(t,s1,,sn)R whenever tR;

    (iii) SnR(t,s1,,sn)=rj if and only if t=rk and sk=rj for some j,k{1,n}.

    Proof. (ⅰ) If sub(t)R=, then SnR(t,s1,,sn)=tWRτ(Xn). If t=riR for some i{1,,n}, then SnR(t,s1,,sn)=siWRτ(Xn). For t=fi(t1,,tni)R, sub(t)R, suppose that SnR(t,s1,,sn)WRτ(Xn) Let rksub(t) for some rkR. Since SnR(t,s1,,sn)WRτ(Xn), we have that SnR(t,s1,,sn)rR(sub(r){r}), i.e., SnR(t,s1,,sn)sub(r){r} for some rR. By Lemma 2.1, there follows sksub(sk)sub(SnR(t,s1,,sn))sub(r){r} which is a contradiction to skWRτ(Xn). Therefore, SnR(t,s1,,sn)WRτ(Xn).

    (ⅱ) Assume that tR. If sub(t)R=, then SnR(t,s1,,sn)=tR. For t=fi(t1,,tni)R, and sub(t)R, we suppose that SnR(t,s1,,sn)R. Let sub(t)R={rn1,,rnk}. By Lemma 2.1, we have that sub(sj)sub(SnR(t,s1,,sn)) for each j{n1,,nk}. This means that sj is a proper subterm of a term in R which contradicts sjWRτ(Xn). Therefore, SnR(t,s1,,sn)R.

    (ⅲ) Assume that SnR(t,s1,,sn)=rj for some j{1,n}. By (ii), tR. Then t=rk for some k{1,n}. Hence, rj=SnR(t,s1,,sn)=SnR(rk,s1,,sn)=sk. The converse is obvious.

    Apparently, the converse of Lemma 2.2(ⅱ) does not hold. Moreover, the base set WRτ(Xn) has the following property.

    Lemma 2.3. Let R=(r1,,rn) be a sequence of fixed terms in Wτ(Xn) and t,s1,,snWrτ(Xn) such that sub(t)R={rn1,,rnk}. The following two conditions are equivalent:

    (i) sub(SnR(t,s1,,sn))R=;

    (ii) sub(sj)R= for all j{n1,,nk}.

    Proof. If t=rj for some j{1,,n}, then sub(t)R={rj} and SnR(t,s1,,sn)=sj. It follows that sub(SnR(t,s1,,sn))R= if and only if sub(sj)R=. Next, we consider the case t=fi(t1,,tni)R and sub(t)R. By Lemma 2.2 (ⅱ), we have that SnR(t,s1,,sn)R. To prove one direction, we assume that sub(SnR(t,s1,,sn))R=. By Lemma 2.1, we have that sub(sj)sub(SnR(t,s1,,sn)) for each j{n1,,nk}, and hence for each j{n1,,nk}, sub(sj)Rsub(SnR(t,s1,,sn))R=. Therefore, sub(sj)R=. On the other hand, assume that sub(sj)R= for all j{n1,,nk}. Since SnR(t,s1,,sn)=fi(SnR(t1,s1,,sn),,SnR(tni,s1,,sn)), it follows that sub(SnR(t,s1,,sn))={SnR(t,s1,,sn)}nil=1sub(SnR(tl,s1,,sn)). Let l{1,,ni}. If tlrR (sub(r){r}), then SnR(tl,s1,,sn)=tl. Thus, sub(SnR(tl,s1,,sn))R=sub(tl)R=. If tl=rlR, then SnR(tl,s1,,sn)=sl. Since rl=tlsub(t), we get rlsub(t)R. The assumption then gives sub(SnR(tl,s1,,sn))R=sub(sl)R=. If tlWRτ(Xn)R, then Lemma 2.2(ⅱ) yields SnR(tl,s1,,sn)R. Then we consider in two cases. The first one is sub(tl)R=. This implies that sub(SnR(tl,s1,,sn))R=sub(tl)R=. Another one goes to sub(tl)R. It follows that sub(tl)Rsub(t)R={rn1,,rnk}. For a term uWRτ(Xn), let Iu={m{1,,n}rmsub(u)R}. Then ItlIt. The assumption sub(sj)R= for all j{n1,,nk}=It also provides that sub(sj)R= for all jItl. Using induction hypothesis, we obtain sub(SnR(tl,s1,,sn))R=. Altogether, we finally obtain

    sub(SnR(t,s1,,sn))R=sub(fi(SnR(t1,s1,,sn),,SnR(tni,s1,,sn)))R=({SnR(t,s1,,sn)}nil=1sub(SnR(tl,s1,,sn)))R=({SnR(t,s1,,sn)}R)nil=1(sub(SnR(tl,s1,,sn))R)=.

    The proof is eventually finished.

    The next lemma emphasizes that an initial term tWRτ(Xn) will only be dominated by some certain terms of an inductive superposition.

    Lemma 2.4. Let R=(r1,,rn) be a sequence of fixed terms in Wτ(Xn), t,s1,,snWRτ(Xn) and sub(t)R={rn1,,rnk}. Then

    SnR(t,s1,,sn)=SnR(t,u1,,un11,sn1,un1+1,,unk1,snk,unk+1,,un)

    for any u1,,un11,un1+1,,unk1,unk+1,,unWRτ(Xn).

    Proof. We prove by induction on the structure of t. If t=rjR, then sub(t)R={rj} and SnR(t,s1,,sn)=sj=SnR(t,u1,,uj1,sj,uj+1,,un) for any u1,,uj1,uj+1,,unWRτ(Xn). For t=fi(t1,,tni)R, we have that sub(tj)Rsub(t)R={rn1,,rnk} for each j{1,,ni}. Let L be the largest subset of {t1,,tni} such that sub(tl)R for all tlL. Since tR and sub(t)R, L. For each tlL, suppose that sub(tl)R={rl1,,rlkl}{rn1,,rnk}. Inductively, we assume that for each tlL, SnR(tl,s1,,sn)=SnR(tl,u1,,ul11,sl1,ul1+1,,ulkl1,slkl,ulkl+1,,un) for any u1,,ul11,ul1+1,,ulkl1,ulkl+1,,unWRτ(Xn). We can set each ua where a{n1,,nk}{l1,,lkl} to be sa. In other words, for each tlL, we have

    SnR(tl,s1,,sn)=SnR(tl,u1,,un11,sn1,un1+1,,unk1,snk,unk+1,,un).

    Moreover, for each v{t1,,tni}L, sub(v)R= and thus

    SnR(v,s1,,sn)=v=SnR(v,u1,,un11,sn1,un1+1,,unk1,snk,unk+1,,un).

    Therefore,

    SnR(t,s1,,sn)=fi(SnR(t1,s1,,sn),,SnR(tni,s1,,sn))=fi(SnR(t1,u1,,un11,sn1,un1+1,,unk1,snk,unk+1,,un),,SnR(tni,u1,,un11,sn1,un1+1,,unk1,snk,unk+1,,un))=SnR(t,u1,,un11,sn1,un1+1,,unk1,snk,unk+1,,un).

    The proof is then complete.

    The superposition SnR as well as the sequence R of fixed terms in Wτ(Xn) can be used to form an algebra on WRτ(Xn), namely, n-ary R-inductive clone of type τ denoted by n-cloneRτ. This algebra is defined by

    n-cloneRτ:=(WRτ(Xn),SnR,R).

    This algebra turns out to be a unitary Menger algebra of rank n, an algebra of type (n+1,0,,0) with n nullary operations which satisfies the three clone axioms: (SASS), (C2) and (C3).

    Theorem 2.1. Let R=(r1,,rn) be a sequence of fixed terms in Wτ(Xn). The n-cloneRτ satisfies the three clone axioms: (SASS),(C2) and (C3).

    Proof. First, we prove (SASS) by induction on the structure of the initial term. Let t,s1,,sn,u1,,unWRτ(Xn). If sub(t)R=, then

    SnR(t,SnR(s1,u1,,un),,SnR(sn,u1,,un))=t=SnR(t,u1,,un)=SnR(SnR(t,s1,,sn),u1,,un).

    If t=rj for some j{1,,n}, then

    SnR(t,SnR(s1,u1,,un),,SnR(sn,u1,,un))=SnR(sj,u1,,un)=SnR(SnR(t,s1,,sn),u1,,un).

    For t=fi(t1,,tni)R and sub(t)R, we inductively assume that

    SnR(tk,SnR(s1,u1,,un),,SnR(sn,u1,,un))=SnR(SnR(tk,s1,,sn),u1,,un)

    for each k{1,,ni}. Let sub(t)R={rn1,,rnk}. The term SnR(SnR(t,s1,,sn),u1,,un) must be considered in 2 cases:

    Case 1. sub(SnR(t,s1,,sn))R=.

    By Lemma 2.3, we have that sub(sj)R= for each j{n1,,nk}. There follows SnR(sj,u1,,un)=sj for each j{n1,,nk}. Therefore,

    SnR(SnR(t,s1,,sn),u1,,un)=SnR(t,s1,,sn)=SnR(t,SnR(s1,u1,,un),,SnR(sn,u1,,un)).

    The last equation concerning sl for each l{1,,ni}{n1,,nk} is valid due to Lemma 2.4.

    Case 2. sub(SnR(t,s1,,sn))R.

    By Lemma 2.2(ⅱ), SnR(t,s1,,sn)R. As a consequence, we obtain

    SnR(SnR(t,s1,,sn),u1,,un)=SnR(fi(SnR(t1,s1,,sn),,SnR(tni,s1,,sn)),u1,,un)=fi(SnR(SnR(t1,s1,,sn),u1,,un),,SnR(SnR(tni,s1,,sn),u1,,un))=fi(SnR(t1,SnR(s1,u1,,un),,SnR(sn,u1,,un)),,SnR(tni,SnR(s1,u1,,un),,SnR(sn,u1,,un)))=SnR(fi(t1,,tni),SnR(s1,u1,,un),,SnR(sn,u1,,un))=SnR(t,SnR(s1,u1,,un),,SnR(sn,u1,,un)).

    These ensure the (SASS) satisfaction of n-cloneRτ. For (C2), it is directly obtained from the definition of SnR. To prove (C3), we can simply do so by induction on the structure of the initial term.

    From the previous section, we have shown that n-cloneRτ is a clone (in fact, a unitary Menger algebra of rank n). It's natural to ask for a generating set of a clone which is very essential in studying the freeness property of that clone. In this section, we consider a clone n-cloneRτn=(WRτn(Xn),SnR,R) of a specific type τn:=(ni)iI where ni=n for all iI. We define sub(R):=rRsub(r) and FRτn:={fi(u1,,un)iIaandauj{rj}(sub(R)R)afor eacha1jn}.

    Lemma 3.1. Let R=(r1,,rn) be a sequence of fixed terms in Wτn(Xn). Then GRτn:=(FRτnXn)(WRτn(Xn)R) is a generating system of n-cloneRτn.

    Proof. We show by induction on the complexity of a term tWRτn(Xn) that t can be generated from GRτn. All elements in R belong to the type of n-cloneRτn so they are generated. Next, consider tR. If tXn, then tGRτn and so it is generated. For t=fi(t1,,tn), it is obviously generated if it belongs to GRτn, so we assume that tGRτn. Then there is k{1,,n} such that tk{rk}(sub(R)R). Let K={k1,,km}{1,,n} be the set of all indices such that tk{rk}(sub(R)R) for any kK. This means that tk1,,tkmWRτn(Xn). Inductively assume that tk1,,tkm are all generated. Note that for each l{1,,n}K, tl{rl}(sub(R)R), i.e., tl=rl or tlsub(R)R. The latter provides SnR(tl,s1,,sn)=tl for any s1,,snWRτn(Xn) while the former gives SnR(tl,s1,,sl1,rl,sl+1,sn)=SnR(tl,r1,,rn)=tl for any s1,,sl1,sl+1,,snWRτn(Xn) due to Lemma 2.4 and (C3) satisfaction. Let T=(r1,,rk11,tk1,rk1+1,,rkm1,tkm,rkm+1,,rn) be a sequence. For a shorter expression, we denote SnR(u,r1,,rk11,tk1,rk1+1,,rkm1,tkm,rkm+1,,rn) by simply SnR(u,T) for any uWτn(Xn). Consequently,

    SnR(fi(t1,,tk11,rk1,tk1+1,,tkm1,rkm,tkm+1,,tn),r1,,rk11,tk1,rk1+1,,rkm1,tkm,rkm+1,,rn)=SnR(fi(t1,,tk11,rk1,tk1+1,,tkm1,rkm,tkm+1,,tn),T)=fi(SnR(t1,T),,SnR(tk11,T),SnR(rk1,T),SnR(tk1+1,T),,SnR(tkm1,T),SnR(rkm,T),SnR(tkm+1,T),,SnR(tn,T))=fi(t1,,tk11,tk1,tk1+1,,tkm1,tkm,tkm+1,,tn)=t.

    Hence, t is generated.

    We remark from the previous lemma that when we consider R=Xn, the generating system GRτn of n-cloneRτn becomes {fi(x1,,xn)iI} which coincides with the result discovered in [12].

    Once we obtain a generator of a clone, the freeness property of that clone can then be examined. A clone is free with respect to itself if there is a generating system such that each mapping from this generating system to the corresponding clone can be extended to an endomorphism of that clone. Undoubtedly, if R=Xn, then the clone n-cloneRτn is actually (Wτn(Xn),Sn,x1,,xn) and from the results mentioned in [12], it is free with respect to itself. Unfortunately, not every setting of R makes n-cloneRτn satisfy such freeness as shown in the following example.

    Example 3.1. Let n=3, τ3=(3,3) with ternary operation symbols f and g, R=(f(x1,x1,x1),f(x2,x2,x2),f(x1,x2,x1)). Consider x3WRτ3(X3). It is not difficult to see that x3 cannot be generated unless it is in a generating system. Let G be a generating system of this 3cloneRτ3 and φ:GWRτ3(X3) be a mapping with ¯φ as its extension on WRτ3(X3) and φ(x3)=¯φ(x3)=f(x1,x1,x1). If G is a singleton set of x3, then G3cloneRτ3={x3,r1,r2,r3}WRτ3(X3), a contradiction. So, the cardinality of G must be greater than 1. We also have that for s1,s2,s3WRτ3(X3),

    ¯φ(SnR(x3,s1,s2,s3))=¯φ(x3)=f(x1,x1,x1)

    while

    SnR(¯φ(x3),¯φ(s1),¯φ(s2),¯φ(s3))=SnR(f(x1,x1,x1),¯φ(s1),¯φ(s2),¯φ(s3))=¯φ(s1).

    This implies that ¯φ(SnR(x3,s1,s2,s3))=SnR(¯φ(x3),¯φ(s1),¯φ(s2),¯φ(s3)) if and only if ¯φ designates each term of WRτ3(X3) the term f(x1,x1,x1) in which case the mapping φ is not independent due to the cardinality of G being greater than 1. Therefore, this 3cloneRτ3 is not free with respect to itself.

    Our hope is bended to finding the condition of R which makes n-cloneRτn satisfy freeness property. Referring to the above example, we see that if there is a variable in a generating system, a mapping from the generating system to WRτn(Xn) cannot be selected freely or else its extension will not satisfy homomorphism. This leads to the following lemma whose proof is similar to the reasoning from Example 3.1.

    Lemma 3.2. If the clone n-cloneRτn is free with respect to itself, then Xnsub(R).

    We have to find all possible minimal generators of the clone in order to investigate the incident where the clone is free with respect to itself. To do so, we first define the R-equivalence of terms: let s,tWτ(Xn) be n-ary terms of type τ and R=(r1,,rn) be a sequence of fixed terms in Wτ(Xn). A term t is said to be R-equivalent to s, in which case we denote by tRs, if s can be obtained from t by interchanging each rsub(t)R via a bijection α:sub(t)Rsub(s)R whenever sub(t)R, and s=t otherwise.

    Example 3.2. Let R=(r1,,rn) be a sequence of fixed terms in Wτ(Xn) and g(x1)R. Consider terms from W(2,1,3)(X5) where f,g, and h are binary, unary, and ternary operation symbols, respectively.

    (1) r1Rr2 with a bijection α:{r1}{r2} defined by α(r1)=r2;

    (2) f(r1,r2)Rf(r2,r1) via a bijection α:{r1,r2}{r2,r1} defined by α(r1)=r2 and α(r2)=r1;

    (3) h(r1,g(x1),r3)Rh(r3,g(x1),r2) via a bijection α:{r1,r3}{r3,r2} defined by α(r1)=r3 and α(r3)=r2.

    The following lemma characterizes R-equivalent terms in which at least one rR is included.

    Lemma 3.3. Let R=(r1,,rn) be a sequence of fixed terms in Wτ(Xn) and s,tWτ(Xn) such that sub(t)R and tRs which relates to a bijection α:sub(t)Rsub(s)R.

    (i) If tR, then sR. More precisely, s=α(t)R.

    (ii) If t=fi(t1,,tni)R and sub(t)R, then s=fi(s1,,sni) and tjRsj for all j{1,,ni} with the additional condition of the case sub(tj)R that the bijection αj:sub(tj)Rsub(sj)R relating to the equivalence must be a restriction of α.

    Proof. (ⅰ) This is directly obtained from the definition of R.

    (ⅱ) Assume that t=fi(t1,,tni)R and sub(t)R. Let A={a{1,,ni}sub(ta)R}. Then sub(ta)R= for all a{1,,ni}A. Since s can be obtained from t by interchanging each rsub(t)R, any operation symbol of t which is not a subterm of any rsub(t)R stays unchanged and thus s=fi(s1,,sni) for some s1,,sniWτ(Xn). Again, by the definition of R, we obtain ta=sa for all a{1,,ni}A which also means that taRsa. Consider each ta where aA. If there is jA such that tjRsj, then sj cannot be obtained from tj by simply swapping each rsub(tj)R through any bijection αj:sub(tj)Rsub(sj)R. Acting as a subterm of t and s, respectively, this unpleasant behavior of tj and sj leads to the same behavior for t and s, contrary to tRs. Thus, tjRsj for all jA. Altogether, we obtain tjRsj for all j{1,,ni}. Additionally, for each ta where aA, the index of satisfying sub(ta)R, we let αa:sub(ta)Rsub(sa)R be a bijection corresponding to taRsa. It is crucial to note that |sub(ta)R|=|sub(sa)R|. Therefore, α|sub(ta)R:sub(ta)Rsub(sa)R is also a bijection. A simple calculation provides αa=α|sub(ta)R because otherwise we would get different s. The proof is then complete.

    A common question for any relation is to classify whether it is an equivalent relation or not. The R-equivalence, R, appears to be an equivalent one.

    Lemma 3.4. Let R=(r1,,rn) be a sequence of fixed terms in Wτ(Xn). Then R is an equivalent relation on Wτ(Xn).

    Proof. Let s,t,uWτ(Xn). Reflexivity is obvious. To show symmetry, we assume that tRs. It is easy to see that sRt when sub(t)R=. Additionally assume that sub(t)R. Let α:sub(t)Rsub(s)R be a bijection correponding to tRs. Note that α1:sub(s)Rsub(t)R is also a bijection and hence sRt. To prove transitivity, we assume that tRs and sRu. Then tRu is directly obtained if one of s,t, or u does not have any rR as its subterms. Suppose more that sub(t)R and sub(s)R are nonempty. Let α:sub(t)Rsub(s)R and β:sub(s)Rsub(u)R be bijections correponding to tRs and sRu, respectively. Thus, the mapping βα:sub(t)Rsub(u)R is bijective. Therefore, tRu. Consequently, R is an equivalent relation on Wτ(Xn).

    For a sequence of fixed terms R=(r1,,rn) in Wτ(Xn), we denote by [t]R an equivalent class of tWτ(Xn) relating to R. The next lemma describes a behaviour of terms within the same equivalent class based on R.

    Lemma 3.5. Let R=(r1,,rn) be a sequence of fixed terms in Wτ(Xn), s,tWτ(Xn) with sub(t)R={rn1,,rnk}, and tRs (i.e., t and s are in the same equivalent class of R) corresponding to a bijection α:sub(t)Rsub(s)R. Then SnR(t,r1,,rn11,α(rn1),rn1+1,,rnk1,α(rnk),rnk+1,,rn)=s.

    Proof. We prove by induction on the structure of t. If t=rjR, then Lemma 3.3(ⅰ) yields s=α(rj)=rkR. So, SnR(t,r1,,rj1,α(rj),rj+1,,rn)=SnR(rj,r1,,rj1,rk,rj+1,,rn)=rk=s. For t=fi(t1,,tni)R and sub(t)R, we have by Lemma 3.3(ⅱ) that s=fi(s1,,sni) and tjRsj for all j{1,,ni} and if sub(tj)R, then the equivalence relates to αj:=αsub(tj)R:sub(tj)Rsub(sj)R. Inductively assume that for each m{1,,ni}, if sub(tm)R={rm1,,rma} and tmRsm, then SnR(tm,r1,,rm11,α(rm1),rm1+1,,rma1,α(rma),rma+1,,rm)=sm. Let J={j{1,,ni}sub(tj)R}. By induction hypothesis and Lemma 2.4, we obtain sj=SnR(tj,r1,,rn11,α(rn1),rn1+1,,rnk1,α(rnk),rnk+1,,rn) for all jJ. For each l{1,,ni}J, we see that sub(tl)R= and by the definition of R, we get tl=sl. Hence, SnR(tl,r1,,rn11,α(rn1),rn1+1,,rnk1,α(rnk),rnk+1,,rn)=tl=sl. These imply that SnR(tk,r1,,rn11,α(rn1),rn1+1,,rnk1,α(rnk),rnk+1,,rn)=sk for all k{1,,ni}. Therefore,

    SnR(t,r1,,rn11,α(rn1),rn1+1,,rnk1,α(rnk),rnk+1,,rn)=fi(SnR(t1,r1,,rn11,α(rn1),rn1+1,,rnk1,α(rnk),rnk+1,,rn),,SnR(tni,r1,,rn11,α(rn1),rn1+1,,rnk1,α(rnk),rnk+1,,rn))=fi(s1,,sni)=s.

    Note that the superposition of the form in the previous lemma is also valid for a term t with sub(t)R=. Such form of a superposition in the above lemma leads to an essential result.

    Corollary 3.1. Let R=(r1,,rn) be a sequence of fixed terms in Wτn(Xn) and s,tWRτn(Xn) such that tRs. Then tncloneRτn=sncloneRτn.

    Scoping out the generating system GRτn of n-cloneRτn, we have a characterization of terms in the same R-equivalent class.

    Lemma 3.6. Let R=(r1,,rn) be a sequence of fixed terms in Wτn(Xn),uWRτn(Xn), and tGRτn. Then tRu if and only if t=SnR(u,u1,,un) for some u1,,unWRτn(Xn){t}.

    Proof. One direction is immediately obtained from Lemma 3.5. On the other hand, assume that t=SnR(u,u1,,un) for some u1,,unWRτn(Xn){t}. We consider 3 cases.

    Case 1. tXn(WRτn(Xn)R).

    If sub(u)R, then Lemma 2.1 provides

    sub(ul)sub(SnR(u,u1,,un))=sub(t)={t}

    for some l{1,,n}. This implies that ul=t, a contradiction. Therefore, sub(u)R= and hence t=SnR(u,u1,,un)=u. This means that tRu.

    Case 2. t=fi(t1,,tn) and tjsub(R)R for all j{1,,n}.

    If u=rkR, then t=SnR(u,u1,,un)=uk, a contradiction. For u=fi(s1,,sn)R and sub(u)R, we let K={k{1,,n}sub(sk)R}. Then K and fi(t1,,tn)=t=SnR(u,u1,,un)=fi(SnR(s1,u1,,un),,SnR(sn,u1,,un)). So, SnR(sj,u1,,un)=tj for all j{1,,n}. Now for each kK, SnR(sk,u1,,un)=tk and sub(sk)R. By Lemma 2.1, we obtain ulsub(ul)sub(SnR(sk,u1,,un))=sub(tk) for some l{1,,n} which means that ulsub(R)R, a contradiction to ulWRτn(Xn). Consequently, sub(u)R= and thus t=SnR(u,u1,,un)=u, i.e., tRu.

    Case 3. t=fi(t1,,tn) and tjsub(R)R for some j{1,,n}.

    Let M={m{1,,n}tmsub(R)R}={m{1,,n}tm=rm}. Then M which implies that sub(t)R. We consider the possibility of u. If u=rkR, then t=SnR(u,u1,,un)=uk, a contradiction. If sub(u)R=, then t=SnR(u,u1,,un)=u which contradicts to sub(t)R. Therefore, u=fi(s1,,sn)R and sub(u)R. This implies that fi(t1,,tn)=t=SnR(u,u1,,un)=fi(SnR(s1,u1,,un),,SnR(sn,u1,,un)). For each m{1,,n}M, SnR(sm,u1,,un)=tmsub(R)R. If sub(sm)R, then by Lemma 2.1, there is l{1,,n} such that sub(ul)sub(tm) which means that ulsub(R)R, contradicting ulWRτn(Xn). Hence, sub(sm)R= and thus sm=SnR(sm,u1,,un)=tm. For each mM, we have that SnR(sm,u1,,un)=tm=rm. By Lemma 2.2(ⅲ), sm=rpm and upm=rm for some pm{1,,n}. Let P={p{1,,n}rp=smafor someamM}. We show that |P|=|M|, suppose not. Then |P|<|M| or |M|<|P|. The latter is impossible since otherwise there will be mM such that rp=sm=rp for some distinct p,pP by pigeonhole principle. The former implies, by pigeonhole principle, that there are distinct m,˜mM and pP such that sm=rp and s˜m=rp. Then Lemma 2.2(ⅲ) yields rm=up=r˜m which is impossible. Therefore, |P|=|M|. This means that there is a bijection β:MP or more accurately, a bijection α:sub(t)Rsub(u)R. So far we have the term u=fi(s1,,sn) where sm=tm and sm=rpm for each m{1,,n}M and mM and for some pmP. It follows that the term u can be obtained by swapping each rsub(t)R via a bijection α:sub(t)Rsub(u)R. So, tRu.

    The proof is finally complete.

    Lemma 3.6 provides a robust method how each term in the generating system GRτn of n-cloneRτn is generated. Such term can only be formed by using a term within the same R-class. Again, that term can only be generated by some term from the same R-class. This will be an endless process unless we include terms from that R-class in a generating set. Ideally, only one term from each R-class is needed if we want a minimal one. This discussion leads to the following corollary.

    Corollary 3.2. The generating system GRτn of n-cloneRτn is minimal and the other minimal generating systems of the clone are collections of terms selecting from R-classs of terms in GRτn, one from each class.

    Extending the finding from Lemma 3.2, we now identify conditions which are equivalent to the self-freeness of n-cloneRτn.

    Theorem 3.1. Let R=(r1,,rn) be a sequence of fixed terms in Wτn(Xn) and G be the collection of all minimal generating systems of n-cloneRτn. Then the following statements are equivalent.

    (i) The clone n-cloneRτn is free with respect to itself.

    (ii) R=(xα(1),,xα(n)) for some permutation α on {1,,n} or τn=(1). (iii) There exists GG such that XnG= and fi(t1,,tn)G in which tjsub(R)R for some j{1,,n}.

    Proof. (ⅰ) (ⅲ): Let A be a generator of n-cloneRτn and GG such that GA. Assume that XnG. By Lemma 3.1 and Corollary 3.2, |G|1. Let tXnG,s1,,snWRτn(Xn), and φ:GWRτn(Xn) be a mapping. It follows by Lemma 3.1 and Corollary 3.2 that tXn(WRτn(Xn)R). In order for an extension ¯φ of φ to be an endomorphism of n-cloneRτn, the following expression must be satisfied:

    φ(t)=¯φ(t)=¯φ(SnR(t,s1,,sn))=SnR(¯φ(t),¯φ(s1),,¯φ(sn))=SnR(φ(t),¯φ(s1),,¯φ(sn)).

    Note that φ(t) can be any element from WRτn(Xn). For φ(t)=r1R, we have

    r1=φ(t)=SnR(φ(t),¯φ(s1),,¯φ(sn))=¯φ(s1).

    Since s1 is arbitrary and |G|1, φ must be an identity mapping of G and it cannot be defined freely. Thus, any extension ψ:AWRτn(Xn) of φ cannot be defined freely either. Therefore, n-cloneRτn is not free with respect to itself. Next, assume that s=fi(t1,,tn)G in which tjsub(R)R for some j{1,,n}. This implies that |G|1 by Lemma 3.1 and Corollary 3.2. Let J={j{1,,n}tjsub(R)R}={j1,,jm}. If J={1,,n}, then sub(s)R=. To be a homomorphism, ¯φ needs to satisfy

    φ(s)=¯φ(s)=¯φ(SnR(s,s1,,sn))=SnR(φ(s),¯φ(s1),,¯φ(sn)).

    Consider φ(s)=r1R and we can imply that n-cloneRτn is not free with respect to itself by similar reasoning of the previous case. In the case of J{1,,n}, we have by Lemma 3.1 and Corollary 3.2 that tj=rα(j) for some injective mapping α:{1,,n}J{1,,n} for all j{1,,n}J. The homomorphism requires

    ¯φ(fi(sα(1),,sα(j11),tj1,sα(j1+1),,sα(jm1),tjm,sα(jm+1),,sα(n)))=¯φ(fi(SnR(t1,s1,,sn),,SnR(tn,s1,,sn)))=¯φ(SnR(s,s1,,sn))=SnR(φ(s),¯φ(s1),,¯φ(sn)).

    For φ(s)=rk for some k{1,,n}α({1,,n}J), we see that

    ¯φ(fi(sα(1),,sα(j11),tj1,sα(j1+1),,sα(jm1),tjm,sα(jm+1),,sα(n)))=SnR(φ(s),¯φ(s1),,¯φ(sn))=¯φ(sk).

    Since the leftmost term is not dominated by the term sk, ¯φ(sk) gets mapped to a fixed element for any skWRτn(Xn). With similar reasoning from the first case, we conclude that n-cloneRτn is not free with respect to itself.

    (ⅲ) (ⅱ): Suppose that R(xα(1),,xα(n)) for any permutation α on {1,,n} and τn(1). Let GG. To show that there exists fi(t1,,tn)G in which tjsub(R)R for some j{1,,n}. By assumption, there is rR such that r=fi(u1,,un) for some u1,,unWτn(Xn). It follows that u1,,unsub(R)R. If n2, then for a fixed operation symbol f,

    |{f(v1,,vn)vjsub(R)Ra for some aj{1,,n}}|>n=|R|.

    So, {f(v1,,vn)vjsub(R)Ra for some aj{1,,n}}G. For the case n=1 with two or more operation symbols, let g be a unary operation symbol besides f. As n=1, we have that R=(f(u1)) or R=(g(u1)) for some u1Wτ1(X1). This implies that u1sub(R)R. By Lemma 3.1 and Corollary 3.2, we get g(u1)G if R=(f(u1)) and f(u1)G if R=(g(u1)).

    (ⅱ) (ⅰ): Assume that R=(xα(1),,xα(n)) for some permutation α on {1,,n}. Lemma 3.1 provides GRτn=FRτn={fi(r1,,rn)iI}. We extend φ:GRτnWRτn(Xn) to ¯φ:n-cloneRτnn-cloneRτn by defining

    (1) ¯φ(t)=t if tR;

    (2) ¯φ(t)=SnR(φ(fi(r1,,rn)),¯φ(t1),,¯φ(tn)) if t=fi(t1,,tn).

    Note that the condition for the second case is actually t=fi(t1,,tn)R and sub(t)R. Let t,s1,,snWRτn(Xn). We prove by induction on the structure of t that ¯φ is an endomorphism of n-cloneRτn. If t=rkR, then

    ¯φ(SnR(t,s1,,sn))=¯φ(sk)=SnR(t,¯φ(s1),,¯φ(sn))=SnR(¯φ(t),¯φ(s1),,¯φ(sn)).

    For t=fi(t1,,tn)R and sub(t)R, we inductively assume that ¯φ(SnR(tj,s1,,sn))=SnR(¯φ(tj),¯φ(s1),,¯φ(sn)) for all j{1,,n}. Since R is a sequence of all variables, sub(SnR(tj,s1,,sn))R for any j{1,,n}. It follows that

    ¯φ(SnR(t,s1,,sn))=¯φ(fi(SnR(t1,s1,,sn),,SnR(tn,s1,,sn)))=SnR(φ(fi(r1,,rn)),¯φ(SnR(t1,s1,,sn)),,¯φ(SnR(tn,s1,,sn)))=SnR(φ(fi(r1,,rn)),SnR(¯φ(t1),¯φ(s1),,¯φ(sn)),,SnR(¯φ(tn),¯φ(s1),,¯φ(sn)))=SnR(SnR(φ(fi(r1,,rn)),¯φ(t1),,¯φ(tn)),¯φ(s1),,¯φ(sn))=SnR(¯φ(t),¯φ(s1),,¯φ(sn)).

    These depict the homomorphism of ¯φ. Next, assume that τn=(1) with f as the unary operation symbol. It is easy to identify that GRτn={f(r1)} and WRτn(Xn)={r1,f(r1),f(f(r1)),f(f(f(r1))),}. Note that sub(u)R for all uWRτn(Xn). We extend φ:GRτnWRτn(Xn) to ¯φ:n-cloneRτnn-cloneRτn by defining ¯φ(r1)=r1 and ¯φ(t)=SnR(φ(f(r1)),¯φ(t1)) if t=f(t1). Let t,s1WRτn(Xn). We show that ¯φ(SnR(t,s1))=SnR(¯φ(t),¯φ(s1)). This is immediate when t=r1, so only the case t=f(t1)R remains. Inductively assume that ¯φ(SnR(t1,s1))=SnR(¯φ(t1),¯φ(s1)). We then obtain

    ¯φ(SnR(t,s1))=¯φ(f(SnR(t1,s1)))=SnR(φ(f(r1)),¯φ(SnR(t1,s1)))=SnR(φ(f(r1)),SnR(¯φ(t1),¯φ(s1)))=SnR(SnR(φ(f(r1)),¯φ(t1)),¯φ(s1))=SnR(¯φ(t),¯φ(s1)).

    Consequently, n-cloneRτn is free with respect to itself.

    The condition for the clone n-cloneRτn to be free with respect to itself is eventually obtained. It provides that not every form of mapping φ from a minimal generator M to WRτn(Xn) can be extended to an endomorphism of the clone. The final theorem here gives a sufficient condition for such mapping to be extendable as an endomorphism of the clone.

    Theorem 3.2. Let R=(r1,,rn) be a sequence of fixed terms in Wτn(Xn). Then a mapping φ:GRτnWRτn(Xn) can be extended to an endomorphism on n-cloneRτn if for each tGRτn, sub(φ(t))Rsub(t)R.

    Proof. Assume that sub(φ(t))Rsub(t)R for each tGRτn. Define ¯φ:WRτn(Xn)WRτn(Xn) in the following way: for each tWRτn(Xn),

    (i) ¯φ(t)=t if tR.

    (ii) ¯φ(t)=φ(t) if tXnR.

    (iii) ¯φ(fi(t1,,tn))=SnR(φ(fi(r1,,rn)),¯φ(t1),,¯φ(tn)) if tjWRτn(Xn) for all j{1,,n}.

    (iv) ¯φ(fi(t1,,tn))=SnR(φ(fi(r1,,rk11,tk1,rk1+1,,rkm1,tkm,rkm+1,,rn)),¯φ(t1),,¯φ(tk11),uk1,¯φ(tk1+1),,¯φ(tkm1),ukm,¯φ(tkm+1),,¯φ(tn)) for some uk1,,ukmWRτn(Xn) such that sub(ul)R= for all l{k1,,km} if tk1,,tkmsub(R)R.

    We first show that ¯φ is an extension of φ to WRτn(Xn). This is clear for tXnR. Let t=fi(t1,,tn)GRτn. If tj=rj for all j{1,,n}, then by (iii) and (C3), we see that ¯φ(t)=¯φ(fi(r1,,rn))=SnR(φ(fi(r1,,rn)),¯φ(r1),,¯φ(rn))=SnR(φ(fi(r1,,rn)),r1,,rn)=φ(fi(r1,,rn))=φ(t). Next, for the case of tjrj for some j{1,,n}, we set K={k1,,km}{1,,n} to be the set of all indices such that tksub(R)R for all kK. So, tp=rp for all p{1,,n}K and sub(t)R={rpp{1,,n}K}. It follows from the assumption that sub(φ(t))R{rpp{1,,n}K}. Then (ⅳ), (C3), and Lemma 2.4 give out

    ¯φ(t)=¯φ(fi(r1,,rk11,tk1,rk1+1,,rkm1,tkm,rkm+1,,rn))=SnR(φ(fi(r1,,rk11,tk1,rk1+1,,rkm1,tkm,rkm+1,,rn)),¯φ(r1),,¯φ(rk11),uk1,¯φ(rk1+1),,¯φ(rkm1),ukm,¯φ(rkm+1),,¯φ(rn))=SnR(φ(t),r1,,rn)=φ(t)

    where uk1,,ukmWRτn(Xn) such that sub(ul)R= for all l{k1,,km}. These represent the required extension. Only an endomorphism of ¯φ is left to be proved. Let t,s1,,snWRτn(Xn). We show that ¯φ(SnR(t,s1,,sn))=SnR(¯φ(t),¯φ(s1),,¯φ(sn)). If t=rjR for some j{1,,n}, then

    ¯φ(SnR(t,s1,,sn))=¯φ(sj)=SnR(rj,¯φ(s1),,¯φ(sn))=SnR(¯φ(t),¯φ(s1),,¯φ(sn)).

    If tXnR, then tGRτn and by assumption, we get sub(φ(t))Rsub(t)R={t}R=, and thus sub(φ(t))R=. Therefore,

    SnR(¯φ(t),¯φ(s1),,¯φ(sn))=SnR(φ(t),¯φ(s1),,¯φ(sn))=φ(t)=¯φ(t)=¯φ(SnR(t,s1,,sn)).

    Next, we consider the case t=fi(t1,,tn)R and sub(t)R=. Hence, sub(tj)R= for all j{1,,n}. We first show that sub(¯φ(t))R=. If tjXn for each j{1,,n}, then tjGRτn or tjsub(R)R. The former implies that sub(¯φ(tj))R= due to the assumption at the beginning. Furthermore, there are two possible forms of ¯φ(t), each of which corresponds to (ⅲ) or (ⅳ). Thanks to Lemma 2.3, we obtain, regardless of the form of ¯φ(t), that sub(¯φ(t))R=. For the case of tj=fij(t1j,,tnj) for some j{1,,n}, let T be the set of all terms among t1,,tn which are not a variable. It follows that T. Since tR and sub(t)R=, we have that uR and sub(u)R= for any uT. Assume inductively that sub(¯φ(u))R=. Using similar reasoning from the previous case, we eventually obtain sub(¯φ(t))R=. Now, we have shown that sub(¯φ(t))R=. Thus, we have that SnR(¯φ(t),¯φ(s1),,¯φ(sn))=¯φ(t)=¯φ(SnR(t,s1,,sn)).

    Only the case t=fi(t1,,tn)R and sub(t)R remains. Inductively assume that ¯φ(SnR(tj,s1,,sn))=SnR(¯φ(tj),¯φ(s1),,¯φ(sn)) for each j{1,,n} with tjWRτn(Xn). If tjWRτn(Xn) for all j{1,,n}, we then have

    ¯φ(SnR(t,s1,,sn))=¯φ(SnR(fi(t1,,tn),s1,,sn))=¯φ(fi(SnR(t1,s1,,sn),,SnR(tn,s1,,sn)))=SnR(φ(fi(r1,,rn)),¯φ(SnR(t1,s1,,sn)),,¯φ(SnR(tn,s1,,sn)))=SnR(φ(fi(r1,,rn)),SnR(¯φ(t1),¯φ(s1),,¯φ(sn)),,SnR(¯φ(tn),¯φ(s1),,¯φ(sn)))=SnR(SnR(φ(fi(r1,,rn)),¯φ(t1),,¯φ(tn)),¯φ(s1),,¯φ(sn))=SnR(¯φ(fi(t1,,tn)),¯φ(s1),,¯φ(sn))=SnR(¯φ(t),¯φ(s1),¯φ(sn)).

    If some of t1,,tn belong to sub(R)R, let K={k1,,km}{1,,n} be the set of all indices such that tksub(R)R for all kK. Hence, SnR(tk,s1,,sn)=tk for each kK; moreover, tpWRτn(Xn) for each p{1,,n}K, and hence SnR(tp,s1,,sn)WRτn(Xn).

    Note that for each term uWτn(Xn) with sub(u)R=, u=SnR(u,¯φ(s1),,¯φ(sn)). Then

    ¯φ(SnR(t,s1,,sn))=¯φ(SnR(fi(t1,,tn),s1,,sn))=¯φ(fi(SnR(t1,s1,,sn),,SnR(tn,s1,,sn)))=¯φ(fi(SnR(t1,s1,,sn),,SnR(tk11,s1,,sn),tk1,SnR(tk1+1,s1,,sn),,SnR(tkm1,s1,,sn),tkm,SnR(tkm+1,s1,,sn),,SnR(tn,s1,,sn)))=SnR(φ(fi(r1,,rk11,tk1,rk1+1,,rkm1,tkm,rkm+1,,rn)),¯φ(SnR(t1,s1,,sn)),,¯φ(SnR(tk11,s1,,sn)),uk1,¯φ(SnR(tk1+1,s1,,sn)),,¯φ(SnR(tkm1,s1,,sn)),ukm,¯φ(SnR(tkm+1,s1,,sn)),,¯φ(SnR(tn,s1,,sn)))=SnR(φ(fi(r1,,rk11,tk1,rk1+1,,rkm1,tkm,rkm+1,,rn)),SnR(¯φ(t1),¯φ(s1),,¯φ(sn)),,SnR(¯φ(tk11),¯φ(s1),,¯φ(sn)),uk1,SnR(¯φ(tk1+1),¯φ(s1),,¯φ(sn)),,SnR(¯φ(tkm1),¯φ(s1),,¯φ(sn)),ukm,SnR(¯φ(tkm+1),¯φ(s1),,¯φ(sn)),,(¯φ(tn),¯φ(s1),,¯φ(sn)))=SnR(SnR(φ(fi(r1,,rk11,tk1,rk1+1,,rkm1,tkm,rkm+1,,rn)),¯φ(t1),,¯φ(tk11),uk1,¯φ(tk1+1),,¯φ(tkm1),ukm,¯φ(tkm+1),,¯φ(tn)),¯φ(s1),,¯φ(sn))=SnR(¯φ(t),¯φ(s1),,¯φ(sn)).

    where uk1,,ukmWRτn(Xn) such that sub(ul)R= for all l{k1,,km}. Consequently, ¯φ is an endomorphism.

    Although this final theorem only considers the minimal generating system GRτn, other minimal ones can be substituted for GRτn since each term of any minimal generating system is R-equivalent to the corresponding term from GRτn due to Corollary 3.2. However, the way we define an extension ¯φ will be slightly different from that of GRτn.

    It is crucial to remark that the converse of the previous theorem does not hold. A simple incident occurs where sub(R)R, ensuring the existence of tGRτn such that sub(t)R=, and φ:GRτnWRτn(Xn) maps each element in the generating set GRτn to a fixed term rR. Then we can simply extend the mapping to a constant mapping of WRτn(Xn) which makes it an endomorphism; however, sub(φ(t))R={r}=sub(t)R.

    The main discoveries from this paper regard the properties of an inductive superposition, a superposition performing the subterm replacement instead of the usual variable replacement. Acting as an (n+1)-ary operation, an inductive superposition induces a unitary Menger algebra of rank n whose form generalizes that of [12]. By using the concept of R-equivalent class, we managed to classify all possible minimal generating systems of the clone n-cloneRτn and found out that the clone is not free with respect to itself for some sequences of fixed terms. Fortunately, we were able to seek out all possible conditions for the clone to be self-free. Lastly, a sufficient condition for a mapping to be extendable to an endomorphism of the clone was given. The future research may possibly be conducted toward the use of an inductive superposition in place of a usual variable-replacing superposition such as in the context of a hypersubstitution and of a superposition of tree languages.

    This research was supported by the Fundamental Fund of Khon Kaen University.

    All authors declare no conflicts of interest in this paper.



    [1] L. A. Zadeh, Fuzzy sets, Inform. Control, 8 (1965), 338–353. https://doi.org/10.1016/S0019-9958(65)90241-X doi: 10.1016/S0019-9958(65)90241-X
    [2] K. T. Atanassov, Intuitionistic fuzzy sets, Fuzzy Set. Syst., 20 (1986), 87–96. https://doi.org/10.1016/S0165-0114(86)80034-3 doi: 10.1016/S0165-0114(86)80034-3
    [3] Z. Xu, R. R. Yager, Some geometric aggregation operators based on intuitionistic fuzzy sets, Int. J. Gen. Syst., 35 (2006), 417–433. http://dx.doi.org/10.1080/03081070600574353 doi: 10.1080/03081070600574353
    [4] R. R. Yager, Pythagorean fuzzy subsets, In: Joint IFS World Congress and NAFIPS Annual Meeting, Edmonton, Canada, 2013, 57–61. http://dx.doi.org/10.1109/IFSA-NAFIPS.2013.6608375
    [5] R. R. Yager, Pythagorean membership grades in multiple criteria decision-making, IEEE T. Fuzzy Syst., 22 (2014), 458–465. http://dx.doi.org/10.1109/TFUZZ.2013.2278989 doi: 10.1109/TFUZZ.2013.2278989
    [6] R. R. Yager, A. M. Abbasov, Pythagorean membership grades, complex numbers, and decision-making, Int. J. Intell. Syst., 28 (2013), 436–452. http://dx.doi.org/10.1002/int.21584 doi: 10.1002/int.21584
    [7] A. Kaufmann, Introduction a la Theorie des Sour-Ensembles Flous, Masson et Cie, Paris, France, 1973. https://doi.org/10.1080/03081077508960278
    [8] A. Rosenfeld, Fuzzy graphs, Fuzzy sets and their applications to cognitive and decision processes, Academic press, New York, 1975, 77–95. https://doi.org/10.1016/B978-0-12-775260-0.50008-6
    [9] S. Mathew, M. Sunitha, Node connectivity and arc connectivity in fuzzy graphs, Inform. Sci., 180 (2010), 519–531. http://dx.doi.org/10.1016/j.ins.2009.10.006 doi: 10.1016/j.ins.2009.10.006
    [10] D. Chakraborty, N. K. Mahapatra, Notes on intuitionistic fuzzy graph, Int. J. Adv. Math., 2020 (2020), 9–23.
    [11] J. Bera, K. C. Das, S. Samanta, J. G. Lee, Connectivity status of intuitionistic fuzzy graph and its application to merging of banks, Mathematics, 11 (2023), 1949. http://dx.doi.org/10.3390/math11081949 doi: 10.3390/math11081949
    [12] S. Naz, S. Ashraf, M. Akram, A novel approach to decision-making with Pythagorean fuzzy information, Mathematics, 6 (2018), 95. https://doi.org/10.3390/math6060095 doi: 10.3390/math6060095
    [13] M. Akram, S. Naz, Energy of Pythagorean fuzzy graphs with applications, Mathematics, 6 (2018), 136. https://doi.org/10.3390/math6080136 doi: 10.3390/math6080136
    [14] M. Akram, A. Habib, F. Ilyas, J. M. Dar, Specific types of Pythagorean fuzzy graphs and application to decision-making, Math. Comput. Appl., 23 (2018), 42. https://doi.org/10.3390/mca23030042 doi: 10.3390/mca23030042
    [15] M. Akram, J. M. Dar, S. Naz, Certain graphs under Pythagorean fuzzy environment, Complex Intell. Syst., 5 (2019), 127–144. http://dx.doi.org/10.1007/s40747-018-0089-5 doi: 10.1007/s40747-018-0089-5
    [16] M. Akram, A. Habib, B. Davvaz, Direct sum of n Pythagorean fuzzy graphs with application to group decision-making, J. Mult.-Valued Log. S., 33 (2019), 75–115.
    [17] M. Akram, J. M. Dar, A. Farooq, Planar graphs under Pythagorean fuzzy environment, Mathematics, 6 (2018), 278. https://doi.org/10.3390/math6120278 doi: 10.3390/math6120278
    [18] M. Akram, S. Siddique, M. G. Alharbi, Clustering algorithm with strength of connectedness for m-polar fuzzy network models, Math. Biosci. Eng., 19 (2022), 420–455. http://dx.doi.org/10.3934/mbe.2022021 doi: 10.3934/mbe.2022021
    [19] M. Akram, S. Siddique, J. C. R. Alcantud, Connectivity indices of m-polar fuzzy network model, with an application to a product manufacturing problem, Artif. Intell. Rev., 56 (2023), 7795–7838. https://doi.org/10.1007/s10462-022-10360-9 doi: 10.1007/s10462-022-10360-9
    [20] U. Ahmad, I. Nawaz, Directed rough fuzzy graph with application to trade networking, Comput. Appl. Math., 41 (2022), 1–26. http://dx.doi.org/10.1007/s40314-022-02073-0 doi: 10.1007/s40314-022-02073-0
    [21] U. Ahmad, I. Nawaz, Wiener index of a directed rough fuzzy graph and application to human trafficking, J. Intell. Fuzzy Syst., 44 (2023), 1479–1495. http://dx.doi.org/10.3233/JIFS-221627 doi: 10.3233/JIFS-221627
    [22] U. Ahmad, T. Batool, Domination in rough fuzzy digraphs with application, Soft Comput., 27 (2023), 2425–2442. http://dx.doi.org/10.1007/s00500-022-07795-1 doi: 10.1007/s00500-022-07795-1
    [23] M. Akram, S. Shahzadi, A. Rasool, M. Sarwar, Decision-making methods based on fuzzy soft competition hypergraphs, Complex Intell. Syst., 8 (2022), 2325–2348. https://doi.org/10.1007/s40747-022-00646-4 doi: 10.1007/s40747-022-00646-4
    [24] M. Sarwar, M. Akram, S. Shahzadi, Bipolar fuzzy soft information applied to hypergraphs, Soft Comput., 25 (2021), 3417–3439. https://doi.org/10.1007/s00500-021-05610-x doi: 10.1007/s00500-021-05610-x
    [25] S. Shahzadi, M. Sarwar, M. Akram, Decision-making approach with fuzzy type-2 soft graphs, J. Math., 2020 (2020). https://doi.org/10.1155/2020/8872446 doi: 10.1155/2020/8872446
    [26] S. Shahzadi, A. Rasool, M. Sarwar, M. Akram, A framework of decision making based on bipolar fuzzy competition hypergraphs, J. Intell. Fuzzy Syst., 41 (2021), 1319–1339. http://dx.doi.org/10.3233/JIFS-210216 doi: 10.3233/JIFS-210216
    [27] T. Dinesh, A study on graph structures, incidence algebras and their fuzzy analogues, Ph.D. Thesis, Kannur University, Kerala, India, 2012.
    [28] T. Dinesh, Fuzzy incidence graph–-An introduction, Adv. Fuzzy Set. Syst., 21 (2016), 33–48. http://dx.doi.org/10.17654/FS021010033 doi: 10.17654/FS021010033
    [29] J. N. Mordeson, Fuzzy incidence graphs, Adv. Fuzzy Set. Syst., 21 (2016), 121–131. https://doi.org/10.17654/FS021020121 doi: 10.17654/FS021020121
    [30] D. S. Malik, S. Mathew, J. N. Mordeson, Fuzzy incidence graphs: Applications to human trafficking, Inform. Sci., 447 (2018), 244–255. https://doi.org/10.1016/j.ins.2018.03.022 doi: 10.1016/j.ins.2018.03.022
    [31] S. Mathew, J. N. Mordeson, Connectivity concepts in fuzzy incidence graphs, Inform. Sci., 382–383 (2017), 326–333. https://doi.org/10.1016/j.ins.2016.12.020 doi: 10.1016/j.ins.2016.12.020
    [32] J. Fang, I. Nazeer, T. Rashid, J. B. Liu, Connectivity and Wiener index of fuzzy incidence graphs, Math. Probl. Eng., 2021 (2021). https://doi.org/10.1155/2021/6682966 doi: 10.1155/2021/6682966
    [33] I. Nazeer, T. Rashid, J. L. G. Guirao, Domination of fuzzy incidence graphs with the algorithm and application for the selection of a medical lab, Math. Probl. Eng., 2021 (2021). https://doi.org/10.1155/2021/6682502 doi: 10.1155/2021/6682502
    [34] I. Nazeer, T. Rashid, M. T. Hussain, Cyclic connectivity index of fuzzy incidence graphs with applications in the highway system of different cities to minimize road accidents and in a network of different computers, PLOS One, 16 (2021). https://doi.org/10.1371/journal.pone.0257642 doi: 10.1371/journal.pone.0257642
    [35] J. N. Mordeson, D. S. Malik, S. Mathew, Fuzzy incidence graphs in Fuzzy graph theory with applications to human trafficking, Springer, New York, NY, US, 2018, 87–137. http://dx.doi.org/10.1007/978-3-319-76454-2_3
    [36] I. Nazeer, T. Rashid, A. Keikha, An application of product of intuitionistic fuzzy incidence graphs in textile industry, Complexity, 2021 (2021), 1–16. https://doi.org/10.1155/2021/5541125 doi: 10.1155/2021/5541125
  • This article has been cited by:

    1. O.M. Khaled, H.M. Barakat, Laila A. AL-Essa, Ehab M. Almetwally, Physics and economic applications by progressive censoring and bootstrapping sampling for extension of power Topp-Leone model, 2024, 17, 16878507, 100898, 10.1016/j.jrras.2024.100898
    2. Amany E. Aly, Magdy E. El-Adll, Haroon M. Barakat, Ramy Abdelhamid Aldallal, A new least squares method for estimation and prediction based on the cumulative Hazard function, 2023, 8, 2473-6988, 21968, 10.3934/math.20231120
    3. M. E. Sobh, H. M. Barakat, Magdy E. El-Adll, Amany E. Aly, Asymptotic behavior of bootstrapped extreme order statistics under unknown power normalizing constants, 2025, 66, 0932-5026, 10.1007/s00362-025-01665-2
  • Reader Comments
  • © 2023 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(2010) PDF downloads(119) Cited by(2)

Figures and Tables

Figures(14)  /  Tables(5)

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog