
The utilization of energy (EU) encompasses technologies aimed at discovering more effective methods for using electricity across various sectors, including residential, commercial, industrial, and transportation. Energy is an integral aspect of modern society and a driving force behind many processes in the universe. This paper aims to introduce a new concept, the Complex q-rung Orthopair Fuzzy Soft Relation (CqROFSRs), achieved through the Cartesian product of two Complex q-rung Orthopair Fuzzy Soft Sets (CqROFSSs). The proposed model has the capability to effectively capture and model graded imprecision and vagueness, which are commonly encountered in human interpretations. It provides a parameterized mathematical framework for ranking-based fuzzy modeling of two-dimensional paradoxical data. The theory integrates the CqROFS with the parametric structure of soft sets to achieve this purpose. Moreover, the utilization of complex numbers imbues these structures with the ability to effectively address phase-related and multidimensional challenges, thus conferring them with unparalleled power in managing ambiguity. Furthermore, we delved into various types of relationships, providing corresponding examples, which led to the establishment of accurate outcomes. The CqROFSRs framework is inclusive, encompassing both membership and non-membership degrees with regard to time duration. Additionally, the use of CqROFSRs techniques in selecting the optimal EU area for a daily living has been demonstrated, empowering individuals to make informed decisions and obtain verified results through the score function. To clarify the distinction, a comprehensive comparative analysis was conducted between the proposed concept and previous concepts.
Citation: Naeem Jan, Jeonghwan Gwak, Harish Garg, Younghoon Jeon, Hyoungku Kang. Energy utilization area under Complex q-rung orthopair fuzzy soft information[J]. AIMS Mathematics, 2023, 8(5): 11521-11545. doi: 10.3934/math.2023583
[1] | Zayd Hajjej, Sun-Hye Park . Asymptotic stability of a quasi-linear viscoelastic Kirchhoff plate equation with logarithmic source and time delay. AIMS Mathematics, 2023, 8(10): 24087-24115. doi: 10.3934/math.20231228 |
[2] | Adel M. Al-Mahdi, Mohammad M. Al-Gharabli, Maher Nour, Mostafa Zahri . Stabilization of a viscoelastic wave equation with boundary damping and variable exponents: Theoretical and numerical study. AIMS Mathematics, 2022, 7(8): 15370-15401. doi: 10.3934/math.2022842 |
[3] | Hasan Almutairi, Soh Edwin Mukiawa . On the uniform stability of a thermoelastic Timoshenko system with infinite memory. AIMS Mathematics, 2024, 9(6): 16260-16279. doi: 10.3934/math.2024787 |
[4] | Adel M. Al-Mahdi, Mohammad M. Al-Gharabli, Mohamed Alahyane . Theoretical and numerical stability results for a viscoelastic swelling porous-elastic system with past history. AIMS Mathematics, 2021, 6(11): 11921-11949. doi: 10.3934/math.2021692 |
[5] | Peipei Wang, Yanting Wang, Fei Wang . Indirect stability of a 2D wave-plate coupling system with memory viscoelastic damping. AIMS Mathematics, 2024, 9(7): 19718-19736. doi: 10.3934/math.2024962 |
[6] | Soh E. Mukiawa, Tijani A. Apalara, Salim A. Messaoudi . Stability rate of a thermoelastic laminated beam: Case of equal-wave speed and nonequal-wave speed of propagation. AIMS Mathematics, 2021, 6(1): 333-361. doi: 10.3934/math.2021021 |
[7] | Qian Li . General and optimal decay rates for a viscoelastic wave equation with strong damping. AIMS Mathematics, 2022, 7(10): 18282-18296. doi: 10.3934/math.20221006 |
[8] | Jincheng Shi, Jianye Xia, Wenjing Zhi . Blow-up of energy solutions for the semilinear generalized Tricomi equation with nonlinear memory term. AIMS Mathematics, 2021, 6(10): 10907-10919. doi: 10.3934/math.2021634 |
[9] | Qian Li, Yanyuan Xing . General and optimal decay rates for a system of wave equations with damping and a coupled source term. AIMS Mathematics, 2024, 9(10): 29404-29424. doi: 10.3934/math.20241425 |
[10] | Adel M. Al-Mahdi . The coupling system of Kirchhoff and Euler-Bernoulli plates with logarithmic source terms: Strong damping versus weak damping of variable-exponent type. AIMS Mathematics, 2023, 8(11): 27439-27459. doi: 10.3934/math.20231404 |
The utilization of energy (EU) encompasses technologies aimed at discovering more effective methods for using electricity across various sectors, including residential, commercial, industrial, and transportation. Energy is an integral aspect of modern society and a driving force behind many processes in the universe. This paper aims to introduce a new concept, the Complex q-rung Orthopair Fuzzy Soft Relation (CqROFSRs), achieved through the Cartesian product of two Complex q-rung Orthopair Fuzzy Soft Sets (CqROFSSs). The proposed model has the capability to effectively capture and model graded imprecision and vagueness, which are commonly encountered in human interpretations. It provides a parameterized mathematical framework for ranking-based fuzzy modeling of two-dimensional paradoxical data. The theory integrates the CqROFS with the parametric structure of soft sets to achieve this purpose. Moreover, the utilization of complex numbers imbues these structures with the ability to effectively address phase-related and multidimensional challenges, thus conferring them with unparalleled power in managing ambiguity. Furthermore, we delved into various types of relationships, providing corresponding examples, which led to the establishment of accurate outcomes. The CqROFSRs framework is inclusive, encompassing both membership and non-membership degrees with regard to time duration. Additionally, the use of CqROFSRs techniques in selecting the optimal EU area for a daily living has been demonstrated, empowering individuals to make informed decisions and obtain verified results through the score function. To clarify the distinction, a comprehensive comparative analysis was conducted between the proposed concept and previous concepts.
A numerical sequence is an ordered set of numbers [1,2,3,4,5]. A famous example is the sequence of Fibonacci numbers [1,2,3,4,5]. A sequence can be created from an explicit formula (such as an arithmetic progression) or by taking into consideration specific properties of their elements (such as the sequence of prime numbers) [1,2,3,4,5].
In this article, {x} represents an increasing list of positive integer numbers. A positive integer number x with d divisors may be called d-prime [6]. Hence, according to this definition, the number 1 is the single 1-prime and the usual prime numbers correspond to the particular case d=2.
Consider the sequence of divisors {x,D(x)}, in which D(x)=d is the number of divisors of x. The divisor function D(x) appears in the literature with distinct names and notations [1,2,3,4,5]. For {x}={n}, in which n is a natural number, the sequence of divisors of natural numbers {n,D(n)}n∈N starts as follows:
{(1,1),(2,2),(3,2),(4,3),(5,2),(6,4),(7,2),…} | (1.1) |
For instance, D(6)=4, because 6 has four divisors: the numbers 6, 3, 2, and 1; therefore, 6 is a 4-prime. The list {D(n)}n∈N has the code A000005 in the On-Line Encyclopedia of Integer Sequences (OEIS) [7].
Any positive integer number x can be written as x=∑∞p=0δp10p, with δp∈{0,1,2,...,9}. Now, replace this number by the sum of the square of its digits; that is, by ∑∞p=0(δp)2. Repeat this process. If the number 1 is eventually reached, then x is called happy number in Number Theory [8,9]. For instance, 23 is happy because 22+32=13, 12+32=10, and 12+02=1. Let a happy number be denoted by h and the set of happy numbers by H. In the online database OEIS, the code of the list {h}h∈H is A007770 [7]. For {x}={h}, the beginning of the sequence of divisors of happy numbers {h,D(h)}h∈H is:
{(1,1),(7,2),(10,4),(13,2),(19,2),(23,2),(28,6),…} | (1.2) |
Consider also the sequence here called sequence of trajectories {x,T(x)}. For x>1, each pair (x,T(x)) is obtained from D(di)=di+1 with i=0,1,2,...,T, in which d0=x and dT=2. Since D(1)=1 and D(2)=2, then 1 and 2 are fixed points of the map D(di)=di+1; however, the fixed point 2 is globally attracting for x>1. Hence, the value of T specifies the amount of steps required to arrive at this attracting fixed point from any x>1. For instance, take x=60, in order to illustrate how this sequence is formed. Observe that D(60)=12, D(12)=6, D(6)=4, D(4)=3, and D(3)=2. As the fixed point 2 was reached after 5 steps from x=60, then T(60)=5. For the natural numbers {n}, the code of the list {T(n)}n∈N in the online database OEIS is A036459 [7]. The sequence of trajectories of natural numbers {n,T(n)}n∈N is given by:
{(1,0),(2,0),(3,1),(4,2),(5,1),(6,3),(7,1),…,} | (1.3) |
The sequence of trajectories of happy numbers {h,T(h)}h∈H is written as:
{(1,0),(7,1),(10,3),(13,1),(19,1),(23,1),(28,4),…} | (1.4) |
Graphs have been used to examine the relations among prime numbers and natural numbers [10], prime numbers and even numbers [11], integer numbers and their divisors [12,13], Fibonacci numbers [14], rational numbers [15], the gaps between successive d-primes for d∈{2,3,...,11} [6]. Informational entropy has been computed in studies on the distribution of primes [16,17,18] and d-primes [6]. In this manuscript, the sequences {x,D(x)} and {x,T(x)} are numerically investigated for {x}={n} and {x}={h}. This investigation is based on visibility graphs and informational entropy, which is the approach that we used to study d-primes [6]. Notice that, in Eqs (1.1)–(1.4), {n} and {h} are increasing lists, but {D(n)}, {D(h)}, {T(n)}, and {T(h)} are non-monotonic lists.
The aim of this article is to investigate the properties of numerical sequences that are not obtained from an explicit recurrence relation. The remainder of this article is organized as follows. In Section 2, in order to evaluate the variability of the sequences given by Eqs (1.1)–(1.4), their informational entropy [19] is calculated in function of the sequence length. In Section 3, the four mentioned sequences are transformed into undirected graphs by using two visibility algorithms [20,21]. Thus, eight graphs are built and numerically characterized. For each graph, the average degree ⟨k⟩, the average shortest-path length ⟨l⟩, the average clustering coefficient ⟨c⟩, and the values of A, γ, and δ of the degree distribution P(k)=Ak−γe−δk are computed. Observe that the degree distribution is supposed to be fitted by a power law multiplied by an exponential term [22,23,24,25,26]. The percentages of links between even numbers, between odd numbers, and between an even number and an odd number are also determined for these eight graphs. In Section 4, the results for {n} and {h} are compared and discussed.
Let a numerical sequence be written as {x,F(x)} with {F(x)}={y}. The variability of the list {y}=(y1,y2,...,yN) with N elements can be evaluated by computing its normalized informational entropy Δ defined as:
Δ=HHmax=−∑Jj=1qjlogqjlogJ | (2.1) |
in which qj is the relative frequency of the distinct number yj and J is the amount of distinct numbers yj. Since repetitions in {y} can occur, then J≤N. In Eq (2.1), Hmax is the maximum value of the informational entropy H [19]; thus, 0≤Δ≤1.
Notice that Δ=0 for a sequence in which qj=1 for j=j∗ and qj=0 for j≠j∗ (which implies H=0); that is, a sequence formed by a single yj; and Δ=1 for a sequence in which qj=1/J for any j (which implies H=Hmax=logJ); that is, a sequence derived from an equiprobable distribution. Therefore, Δ expresses the level of intrinsic uncertainty in {y}. It increases with the variability in {y}, ranging from 0 for a constant sequence (in which all numbers are the same) to 1 for an equiprobable sequence (in which the numbers occur with the same relative frequency). The complexity of numerical sequences (or time series) has been related to its variability. In fact, there are complexity measures based on informational entropy [27,28], which have been used, for instance, in analyzes of economic crises [29] and texture of images [30].
Figure 1 shows how Δ for {D(n)} and {T(n)} varies with the length N; Figure 2 is for {D(h)} and {T(h)}. In these figures, N goes up to 30000. The choice of this upper bound was influenced by the computer processing power required to map these sequences into graphs (see the next section). Figures 1 and 2 show that the dependence of Δ on N is non-trivial. Two factors account for the oscillations and jumps observed in these figures. The first factor is the variation of the values of qj (the relative frequency of yj), as the sequence length increases. In fact, the proportions of the numbers yj vary with N. The second factor is the introduction of new numbers yj as N increases; thus, J (the amount of distinct yj) increases with N. The normalized entropy Δ given by Eq (2.1) depends on qj and J. Since qj and J vary with N, then Δ also varies with N. For instance, the jump observed in Figure 1(b) occurs for n=5040, because T(5040)=6 and, for n<5040, the maximum value of {T(n)} is 5. The introduction of the number 6 causes the jump.
For N=30000, the maximum values in {D} and {T} are: max({D(n)})=96, max({D(h)})=160, and max({T(n)})=max({T(h)})=6. The minimum values in these sets are: min({D(n)})=min({D(h)})=1 and min({T(n)})=min({T(h)})=0. Therefore, the sets {T(n)} and {T(h)} are within the same range and the sets {D(n)} and {D(h)} belong to different ranges. For N=30000, Δ=0.582 for {D(n)}, Δ=0.575 for {D(h)}, Δ=0.687 for {T(n)}, and Δ=0.692 for {T(h)}. Thus, for N=30000, Δ≃0.6 for {D(n)} and {D(h)}, and Δ≃0.7 for {T(n)} and {T(h)}.
There are several ways of converting a numerical sequence into a graph [31]. Here, two visibility algorithms are employed for transforming the sequence {x,F(x)} into undirected graphs, because these graphs inherit some properties of the converted sequences [20,21]. Visibility algorithms have been used in studies, for instance, on infection spread [32] and precipitation records [33].
Assume that each node of the visibility graphs corresponds to a distinct value of x. Assume also that xa<xi<xb. In the natural visibility (NV) graph [20], the nodes xa and xb are linked if:
F(xi)<F(xa)+(F(xb)−F(xa))(xi−xaxb−xa) | (3.1) |
Therefore, these nodes are linked if any intermediate point (xi,F(xi)) is below the straight line connecting (xa,F(xa)) and (xb,F(xb)) in the plot x×F(x).
In the horizontal visibility (HV) graph [21], the nodes xa and xb are linked if:
{F(xa),F(xb)}>F(xi) | (3.2) |
Hence, these nodes are linked if any intermediate point (xi,F(xi)) is below the horizontal line connecting (xa,F(xa)) and (xb,F(xb)) in the plot x×F(x). If two nodes are connected in the HV graph, then they are connected in the corresponding NV graph; however, the reverse is not true. Figure 3 illustrates this statement.
Figures 4 and 5 respectively exhibit the partial graphs and the degree distributions P(k) obtained from {n,D(n)} and {n,T(n)} by using the NV algorithm; in Figures 6 and 7, the HV algorithm is employed. Figures 8 and 9 are for {h,D(h)} and {h,T(h)} with the NV algorithm; in Figures 10 and 11, the HV algorithm is used.
In the partial graphs (Figures 4, 6, 8, and 10), only the first 100 links are shown, in order to better visualize their structure. Observe the small-world characteristic [34] of these graphs; that is, the existence of long-range links that shorten the path between any pair of nodes. This characteristic is also present in biological, social, and technological networks that were investigated in classic papers on complex networks [34,35,36].
The plots of P(k) (Figures 5, 7, 9, and 11) and the calculations of the network properties shown in Tables 1 and 2 were made by taking the first 30000 natural numbers and the first 30000 happy numbers.
Figs. | sequence | algorithm | ⟨k⟩ | ⟨l⟩ | ⟨c⟩ | A | γ | δ | MSE |
4, 5 | {D(n)} | NV | 5.78 | 7.92 | 0.33 | 0.17 | −2.27 | 0.78 | 1.6×10−5 |
4, 5 | {T(n)} | NV | 5.04 | 28.3 | 0.06 | 0.38 | −0.76 | 0.48 | 2.4×10−5 |
6, 7 | {D(n)} | HV | 3.58 | 16.3 | 0.27 | 1.68 | 1.53 | 0.14 | 3.3×10−5 |
6, 7 | {T(n)} | HV | 2.98 | 257 | 0.26 | 1.87 | 0.60 | 0.46 | 1.6×10−4 |
8, 9 | {D(h)} | NV | 6.61 | 7.39 | 0.35 | 0.10 | −2.25 | 0.66 | 9.6×10−6 |
8, 9 | {T(h)} | NV | 5.33 | 100 | 0.14 | 0.19 | −2.19 | 0.77 | 7.2×10−6 |
10, 11 | {D(h)} | HV | 3.51 | 15.4 | 0.27 | 1.34 | 0.71 | 0.33 | 9.8×10−6 |
10, 11 | {T(h)} | HV | 2.92 | 157 | 0.26 | 1.71 | −0.39 | 0.77 | 1.4×10−4 |
sequence | algorithm | χ1 | χ2 | m11 | m12 | m21 | m22 | M |
{D(n)} | NV | 50.0 | 50.0 | 3.4 | 26.7 | 26.7 | 43.2 | 86645 |
{T(n)} | NV | 50.0 | 50.0 | 3.7 | 28.7 | 28.4 | 39.2 | 75579 |
{D(n)} | HV | 50.0 | 50.0 | 1.0 | 31.8 | 31.8 | 35.4 | 53723 |
{T(n)} | HV | 50.0 | 50.0 | 1.3 | 37.2 | 37.2 | 24.3 | 44655 |
{D(h)} | NV | 49.6 | 50.4 | 11.1 | 23.6 | 22.6 | 42.7 | 99143 |
{T(h)} | NV | 49.6 | 50.4 | 13.2 | 23.0 | 23.1 | 40.7 | 79940 |
{D(h)} | HV | 49.6 | 50.4 | 14.6 | 23.3 | 22.7 | 39.4 | 52626 |
{T(h)} | HV | 49.6 | 50.4 | 17.4 | 25.8 | 25.6 | 31.2 | 43755 |
Table 1 presents the values of ⟨k⟩, ⟨l⟩, ⟨c⟩, A, γ, and δ. Recall that the node degree k is the number of edges linked to the node, the path length l is the shortest distance between two nodes, and the node clustering coefficient c is percentage of neighbors that are linked together [35,36]. The average values ⟨k⟩, ⟨l⟩, and ⟨c⟩ are calculated by considering all nodes in the graph. Also, P(k) is the percentage of nodes with degree k [35,36]. The values of A, γ, δ, and the mean squared error (MSE) of fitted function P(k)=Ak−γe−δk were determined from the least square fitting method [37].
Table 2 presents χ1 and χ2, which respectively are the percentages of odd nodes and even nodes in each graph. Obviously, χ1+χ2=1. For N=30000, there are 49.6% of odd happy numbers and 50.4% of even happy numbers, and, obviously, 50% of odd natural numbers and 50% of even natural numbers. Table 2 also presents m11, m22, m12, and m21, which respectively denote the percentages of links between odd nodes, links between even nodes, links from an odd node to an even node, and links from an even node to an odd node. Notice that, despite the visibility algorithms generating undirected graphs, m12 and m21 express properties of nodes of directed graphs. This can be done by associating the horizontal axis x in Figure 3 to the direction of time of {x,F(x)} [21]. As time x passes, links start from the current node to arrive at nodes in the future (for instance, in Figure 3, links start from x=a and arrive at x=i and x=b, in the NV graph). Obviously, m11+m12+m21+m22=1 and m12+m21 represent the percentage of links between nodes with distinct parity, if the presumed orientation of the links is ignored. Table 2 also shows M, which is the total number of links in each graph. Recall that ⟨k⟩=2M/N[35,36].
As far as we know, this is the first analysis of the sequences {n,D(n)}, {h,D(h)}, {n,T(n)}, and {h,T(h)} based on the computation of informational entropy and on the construction of visibility graphs. These mathematical tools were selected for the following reasons. Since these four sequences do not exhibit any evident pattern, it is relevant to estimate their variability by calculating their informational entropy. Since visibility graphs inherit some properties of the associated sequences, the study of these graphs may provide hints about the underlying process generating such sequences.
Evidently, the set of the happy numbers {h} is a subset of the set of the natural numbers {n}. Table 2 shows that the percentage of odd (even) happy numbers is similar to the percentage of odd (even) natural numbers for N=30000. Figure 1 reveals that, for N=30000, Δ≃0.6 for {D(n)} and {D(h)}. Notice that, despite the similarity in this value of the normalized entropy, which implies comparable variability, and despite the similar proportion of odd and even numbers in {n} and {h}, the sequences given by Eqs (1.1) and (1.2) are mapped into graphs with distinct topological measures. This statement is also true for the sequences given by Eqs (1.3) and (1.4). Observe that Δ≃0.7 for {T(n)} and {T(h)}, as can be seen in Figure 2; however, these sequences are transformed into graphs with different features.
For N=30000, 1≤D(n)≤96, 1≤D(h)≤160, and 0≤T(n),T(h)≤6. Thus, the number of distinct values in the {D}-sequences is much higher than in the {T}-sequences. Surprisingly, the normalized entropy Δ is higher for the {T}-sequences than for the {D}-sequences.
The HV graph is subgraph of the corresponding NV graph [20,21,31]; hence, as expected, Table 2 shows that M is higher in NV graphs than in HV graphs and Table 1 shows that ⟨k⟩ is higher in NV graphs than in HV graphs and ⟨l⟩ is lower in NV graphs than in HV graphs. For instance, for {D(n)}, MNV=86645>MHV=53723, ⟨k⟩NV=5.78>⟨k⟩HV=3.58, ⟨l⟩NV=7.92<⟨l⟩HV=16.3. However, the highest amount of edges in the NV graphs does not imply higher ⟨c⟩. For instance, ⟨c⟩NV=0.33>⟨c⟩HV=0.27 for {D(n)}, but ⟨c⟩NV=0.06<⟨c⟩HV=0.26 for {T(n)}.
By employing the NV algorithm, the graphs built from the sequence of divisors {D} present greater ⟨k⟩, lower ⟨l⟩, and greater ⟨c⟩ than the respective graphs built from the sequence of trajectories {T}, for natural and happy numbers. For instance, for the NV-graphs, ⟨k⟩{D(h)}=6.61>⟨k⟩{T(h)}=5.33, ⟨l⟩{D(h)}=7.39<⟨l⟩{T(h)}=100, and ⟨c⟩{D(h)}=0.35>⟨c⟩{T(h)}=0.14. By using the HV algorithm, the {D}-graphs present greater ⟨k⟩ and lower ⟨l⟩ than the respective {T}-graphs, but ⟨c⟩ is similar in both graphs.
The expression ⟨l⟩random=logN/log⟨k⟩, usually employed to estimate the average shortest path length in purely random graphs, gives lower values than those shown in Table 1. For instance, for the NV graph for {D(h)}, ⟨l⟩=7.39>⟨l⟩random=5.49; for the HV graph for {D(h)}, ⟨l⟩=15.4>⟨l⟩random=8.21. In fact, the graphs obtained from visibility algorithms are not purely random; hence, ⟨l⟩ in Table 1 is higher than ⟨l⟩random. However, the plots of P(k) suggest that the four sequences can be viewed as quasi-random.
The fitted function P(k) qualitatively changes from the NV plot to the HV plot, for the natural and happy numbers considered here. Loosely speaking, the NV algorithm creates random/small-world networks [35,36] and the HV algorithm creates scale-free networks [35,36]; that is, P(k) in the NV graphs is a Poisson-like distribution (Figures 5 and 9) and P(k) in the HV graphs is a scale-free distribution with an exponential cutoff (Figures 7 and 11). Since a random sequence is mapped by the NV algorithm into a graph with a Poisson degree distribution [20] and by the HV algorithm into a graph with an exponential degree distribution [21], the plots of P(k) suggest that the four analyzed sequences behave like quasi-random sequences. However, these sequences are not generated by a purely random process, because such a process would present Δ=1 and these sequences have Δ≃0.6−0.7. The MSE of the fitted function in these plots could be decreased by increasing the sequence length used in the numerical experiments. Thus, the discrepancies between the data and the fitted function usually found for k above a critical number could be reduced.
Table 2 reveals that, in all graphs, the least frequent type of connection is that between odd numbers (that is, m11<m12,m21,m22); however, this type of connection is more prevalent in the graphs derived from happy numbers than those derived from natural numbers. For instance, by considering the NV algorithm, m11,{D(h)}=0.111>m11,{D(n)}=0.034. This table also reveals that connections from odd number to even number and connections from even number to odd number appear in similar percentages (that is, m12≃m21) in all graphs. Notice that links between odd numbers and links between even numbers connect non-consecutive nodes in the graphs for {n}; however, this is not true in the graphs for {h}.
In short, in this manuscript, four sequences of purely mathematical nature were mapped into graphs with ⟨l⟩≳⟨l⟩random and 0≪⟨c⟩<1, which are connectivity features usually found in real-world networks [34,35,36]. Thus, from a topological perspective, mathematical networks can be similar to networks representing biological, social, and technological systems. Also, the monotonically decreasing degree distributions obtained from the HV-algorithm and the bell-type degree distributions obtained from the NV-algorithm may be a consequence of mapping quasi-random sequences. This study also showed that {D}-graphs are more connected than the corresponding {T}-graphs; and even numbers are more connected than odd numbers. These conclusions were drawn for the four sequences of natural and happy numbers taken into account in this manuscript and they can be useful in the proposition of a theoretical model for these graphs.
The data used to support the findings of this study are available from the first author (bleemayer@gmail.com) upon request.
The authors declare that there are no conflicts of interest regarding the publication of this article.
BLM thanks to Instituto Presbiteriano Mackenzie for the scholarship. LHAM is partially supported by Conselho Nacional de Desenvolvimento Científico e Tecnológico (CNPq) under the grant #302946/2022-5. This study was financed in part by Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES) - finance code 001.
[1] | L. A. Zadeh, Fuzzy sets, Inf. Control, 8 (1965), 338–353. https://doi.org/10.1016/S0019-9958(65)90241-X |
[2] | V. F. Kravchenko, V. I. Ponomaryov, V. I. Pustovoit, Algorithms of three-dimensional filtration using the fuzzy-set theory for color image sequences degraded by noise, In: Doklady Physics, 2008,363–36, Maik Nauka-Interperiodica Publishing. https://doi.org/10.1134/S1028335808070070 |
[3] |
V. Khatibi, G. A. Montazer, Intuitionistic fuzzy set vs. fuzzy set application in medical pattern recognition, Artif. Intell. Med., 47 (2009), 43–52. https://doi.org/10.1016/j.artmed.2009.03.002 doi: 10.1016/j.artmed.2009.03.002
![]() |
[4] | R. Krishnapuram, J. M. Keller, Fuzzy set theoretic approach to computer vision: An overview. In: IEEE International Conference on Fuzzy Systems, 1992,135–142. |
[5] |
J. M. Mendel, Fuzzy logic systems for engineering: A tutorial, P. IEEE, 83 (1995), 345–377. https://doi.org/10.1109/5.364485 doi: 10.1109/5.364485
![]() |
[6] |
K. Atanassov, Intuitionistic fuzzy sets, Int. J. Bio-Automation, 20 (2016), S1–S6. https://doi.org/10.1016/S0165-0114(86)80034-3 doi: 10.1016/S0165-0114(86)80034-3
![]() |
[7] | P. Burillo, H. Bustince, Intuitionistic fuzzy relations (Part I), Mathware Soft Comput., 2 (1995), 5–38. |
[8] | R. R. Yager, Properties and applications of Pythagorean fuzzy sets, In: Imprecision and Uncertainty in Information Representation and Processing, 2016,119–136. Springer, Cham. https://doi.org/10.1007/978-3-319-26302-1_9 |
[9] | U. Dinakaran, Analyzing online food delivery industries using Pythagorean fuzzy relation and composition, Int. J. Hosp. Tour. Syst., 14 (2021). 36. |
[10] |
R. R. Yager, Generalized orthopair fuzzy sets, IEEE T. Fuzzy Syst., 25 (2016), 1222–1230. https://doi.org/10.1109/TFUZZ.2016.2604005 doi: 10.1109/TFUZZ.2016.2604005
![]() |
[11] |
H. Li, S. Yin, Y. Yang, Some preference relations based on q‐rung orthopair fuzzy sets, Int. J. Intell. Syst., 34 (2019), 2920–2936. https://doi.org/10.1002/int.22178 doi: 10.1002/int.22178
![]() |
[12] |
X. Peng, Z. Luo, A review of q-rung orthopair fuzzy information: Bibliometrics and future directions, Artif. Intell. Rev., 54 (2021), 3361–3430. https://doi.org/10.1007/s10462-020-09926-2 doi: 10.1007/s10462-020-09926-2
![]() |
[13] |
X. Peng, L. Liu, Information measures for q‐rung orthopair fuzzy sets, Int. J. Intell. Syst., 34 (2019), 1795–1834. https://doi.org/10.1002/int.22115 doi: 10.1002/int.22115
![]() |
[14] |
D. Ramot, R. Milo, M. Friedman, A. Kandel, Complex fuzzy sets, IEEE T. Fuzzy Syst., 10 (2002), 171–186. https://doi.org/10.1109/91.995119 doi: 10.1109/91.995119
![]() |
[15] |
C. Li, T. W. Chiang, Complex neurofuzzy ARIMA forecasting—a new approach using complex fuzzy sets, IEEE T. Fuzzy Syst., 21 (2012), 567–584. https://doi.org/10.1109/TFUZZ.2012.2226890 doi: 10.1109/TFUZZ.2012.2226890
![]() |
[16] |
G. Zhang, T. S. Dillon, K. Y. Cai, J. Ma, J. Lu, Operation properties and δ-equalities of complex fuzzy sets, Int. J. Approx. Reason., 50 (2009), 1227–1249. https://doi.org/10.1016/j.ijar.2009.05.010 doi: 10.1016/j.ijar.2009.05.010
![]() |
[17] |
D. Rani, H. Garg, Distance measures between the complex intuitionistic fuzzy sets and their applications to the decision-making process, Int. J. Uncertain. Quan., 7 (2017), 423–439. https://doi.org/10.1615/Int.J.UncertaintyQuantification.2017020356 doi: 10.1615/Int.J.UncertaintyQuantification.2017020356
![]() |
[18] |
N. Jan, A. Nasir, M. S. Alhilal, S. U. Khan, D. Pamucar, A. Alothaim, Investigation of Cyber-Security and Cyber-Crimes in oil and gas ssectors using the innovative structures of complex intuitionistic fuzzy relations, Entropy, 23 (2021), 1112. https://doi.org/10.3390/e23091112 doi: 10.3390/e23091112
![]() |
[19] |
R. T. Ngan, M. Ali, D. E.Tamir, N. D. Rishe, A. Kandel, Representing complex intuitionistic fuzzy set by quaternion numbers and applications to decision making, Appl. Soft Comput., 87 (2020), 105961. https://doi.org/10.1016/j.asoc.2019.105961 doi: 10.1016/j.asoc.2019.105961
![]() |
[20] |
K. Ullah, T. Mahmood, Z. Ali, N. Jan, On some distance measures of complex Pythagorean fuzzy sets and their applications in pattern recognition, Complex Intell. Syst., 6 (2020), 15–27. https://doi.org/10.1007/s40747-019-0103-6 doi: 10.1007/s40747-019-0103-6
![]() |
[21] |
N. Jan, S. U. Rehman, A. Nasir, H. Aydi, S. U. Khan, Analysis of economic relationship using the concept of complex Pythagorean fuzzy information, Secur. Commun. Netw., 2021 (2021), Article ID 4513992. https://doi.org/10.1155/2021/4513992 doi: 10.1155/2021/4513992
![]() |
[22] |
H. Garg, J. Gwak, T. Mahmood, Z. Ali, Power aggregation operators and VIKOR methods for complex q-rung orthopair fuzzy sets and their applications, Mathematics, 8 (2020), 538. https://doi.org/10.3390/math8040538 doi: 10.3390/math8040538
![]() |
[23] |
A. Nasir, N. Jan, J. Gwak, S. U. Khan, Investigation of financial track records by uusing some novel concepts of ccomplex q-Rung orthopair fuzzy information, IEEE Access, 9 (2021), 152857–152877. https://doi.org/10.1109/ACCESS.2021.3125383 doi: 10.1109/ACCESS.2021.3125383
![]() |
[24] |
H. Garg, J. Gwak, T. Mahmood, Z. Ali, Power aggregation operators and VIKOR methods for complex q-rung orthopair fuzzy sets and their applications, Mathematics, 8 (22020), 538. https://doi.org/10.3390/math8040538 doi: 10.3390/math8040538
![]() |
[25] |
P. Liu, Z. Ali, T. Mahmood, N. Hassan, Group decision-making using complex q-rung orthopair fuzzy Bonferroni mean, Int. J. Comput. Intell. Syst., 13 (2020), 822. https://doi.org/10.2991/ijcis.d.200514.001 doi: 10.2991/ijcis.d.200514.001
![]() |
[26] | P. K. Maji, R. K. Biswas, A. Roy, Fuzzy soft sets, J. Fuzzy Math., 9 (2001), 589–602. |
[27] |
M. I. Ali, A note on soft sets, rough soft sets and fuzzy soft sets, Appl. Soft Comput., 11 (2011), 3329–3332. https://doi.org/10.1016/j.asoc.2011.01.003 doi: 10.1016/j.asoc.2011.01.003
![]() |
[28] |
F. Feng, Y. B. Jun, X. Liu, L. Li, An adjustable approach to fuzzy soft set-based decision making, J. Comput. Appl. Math., 234 (2010), 10–20. https://doi.org/10.1016/j.cam.2009.11.055 doi: 10.1016/j.cam.2009.11.055
![]() |
[29] | D. K. Sut, An application of fuzzy soft relation in decision making problems, Int. J. Math. Trends Technol., 3 (2012), 51–54. |
[30] | Z. Haiyan, J. Jingjing, Fuzzy soft relation and its application in decision making. In: 2015 7th International Conference on Modelling, Identification and Control (ICMIC), 2015, 1–4, IEEE. https://doi.org/10.1109/ICMIC.2015.7409443 |
[31] |
J. Močkoř, P. Hurtík, Approximations of fuzzy soft sets by fuzzy soft relations with image processing application, Soft Comput., 25 (2021), 6915–6925. https://doi.org/10.1007/s00500-021-05769-3 doi: 10.1007/s00500-021-05769-3
![]() |
[32] |
N. Çağman, S. Karataş, Intuitionistic fuzzy soft set theory and its decision making, J. Intell. Fuzzy Syst., 24 (2013), 829–836. https://doi.org/10.3233/IFS-2012-0601 doi: 10.3233/IFS-2012-0601
![]() |
[33] | B. Dinda, T. K. Samanta, Relations on intuitionistic fuzzy soft sets, arXiv preprint arXiv: 1202.4649, 2012. |
[34] |
T. M. Athira, S. J. John, H. Garg, A novel entropy measure of Pythagorean fuzzy soft sets, AIMS Math., 5 (2020), 1050–1061. https://doi.org/10.3934/math.2020073 doi: 10.3934/math.2020073
![]() |
[35] |
A. Hussain, M. I. Ali, T. Mahmood, M. Munir, q‐Rung orthopair fuzzy soft average aggregation operators and their application in multicriteria decision‐making, Int. J. Intell. Syst., 35 (2020), 571–599. https://doi.org/10.1002/int.22217 doi: 10.1002/int.22217
![]() |
[36] | P. Thirunavukarasu, R. Suresh, V. Ashokkumar, Theory of complex fuzzy soft set and its applications, Int. J. Innov. Res. Sci. Technol., 3 (2017), 13–18. |
[37] |
O. Yazdanbakhsh, S. Dick, A systematic review of complex fuzzy sets and logic, Fuzzy Set. Syst., 338 (2018), 1–22. https://doi.org/10.1016/j.fss.2017.01.010 doi: 10.1016/j.fss.2017.01.010
![]() |
[38] |
T. Kumar, R. K. Bajaj, On complex intuitionistic fuzzy soft sets with distance measures and entropies, J. Math., 2014. Article ID 972198. https://doi.org/10.1155/2014/972198 doi: 10.1155/2014/972198
![]() |
[39] |
J. An, A. Mikhaylov, H. Dinçer, S. Yüksel, Economic modelling of electricity generation: Long short-term memory and Q-rung orthopair fuzzy sets, Heliyon, 8 (2022), e12345. https://doi.org/10.1016/j.heliyon.2022.e12345 doi: 10.1016/j.heliyon.2022.e12345
![]() |
[40] | A. Mikhaylov, I. M. Bhatti, H. Dinçer, S. Yüksel, Integrated decision recommendation system using iteration-enhanced collaborative filtering, golden cut bipolar for analyzing the risk-based oil market spillovers, Comput. Econ., 2022, 1–34. https://doi.org/10.1007/s10614-022-10341-8 |
[41] |
A. Mikhaylov, H. Dinçer, S. Yüksel, Analysis of financial development and open innovation oriented fintech potential for emerging economies using an integrated decision-making approach of MF-X-DMA and golden cut bipolar q-ROFSs, Financ. Innov., 9 (2023), 1–34. https://doi.org/10.1186/s40854-022-00399-6 doi: 10.1186/s40854-022-00399-6
![]() |
[42] |
V. Candila, D. Maximov, A. Mikhaylov, N. Moiseev, T. Senjyu, N. Tryndina, On the relationship between oil and exchange rates of oil-exporting and oil-importing countries: From the great recession period to the Covid-19 era, Energies, 14 (2021), 8046. https://doi.org/10.3390/en14238046 doi: 10.3390/en14238046
![]() |
[43] |
H. Dinçer, S. Yüksel, A. Mikhaylov, G. Pinter, Z. A. Shaikh, Analysis of renewable-friendly smart grid technologies for the distributed energy investment projects using a hybrid picture fuzzy rough decision-making approach, Energy Rep., 8 (2022), 11466–11477. https://doi.org/10.1016/j.egyr.2022.08.275 doi: 10.1016/j.egyr.2022.08.275
![]() |
[44] |
Z. Yang, Q. Li, Y. Yan, W. L. Shang, W. Ochieng, Examining influence factors of Chinese electric vehicle market demand based on online reviews under moderating effect of subsidy policy, Appl. Energy, 326 (2022), 120019. https://doi.org/10.1016/j.apenergy.2022.120019 doi: 10.1016/j.apenergy.2022.120019
![]() |
[45] |
Q. Liu, H. Li, W. L. Shang, K. Wang, Spatio-temporal distribution of Chinese cities' air quality and the impact of high-speed rail, Renew. Sust. Energy Rev., 170 (2022), 112970. https://doi.org/10.1016/j.rser.2022.112970 doi: 10.1016/j.rser.2022.112970
![]() |
[46] |
Z. Yang, S. Ahmad, A. Bernardi, W. L. Shang, J. Xuan, B. Xu, Evaluating alternative low carbon fuel technologies using a stakeholder participation-based q-rung orthopair linguistic multi-criteria framework, Appl. Energy, 332 (2023), 120492. https://doi.org/10.1016/j.apenergy.2022.120492 doi: 10.1016/j.apenergy.2022.120492
![]() |
[47] |
X. Yin, C. Ye, Y. Ding, Y. Song, Exploiting internet data centers as energy prosumers in integrated Electricity-Heat system, IEEE T. Smart Grid, 14 (2022), 167–182. https://doi.org/10.1109/TSG.2022.3197613 doi: 10.1109/TSG.2022.3197613
![]() |
[48] |
R. Ye, P. Liu, K. Shi, B. Yan, State damping control: A novel simple method of rotor UAV with high performance, IEEE Access, 8 (2020), 214346–214357. https://doi.org/10.1109/ACCESS.2020.3040779 doi: 10.1109/ACCESS.2020.3040779
![]() |
Figs. | sequence | algorithm | ⟨k⟩ | ⟨l⟩ | ⟨c⟩ | A | γ | δ | MSE |
4, 5 | {D(n)} | NV | 5.78 | 7.92 | 0.33 | 0.17 | −2.27 | 0.78 | 1.6×10−5 |
4, 5 | {T(n)} | NV | 5.04 | 28.3 | 0.06 | 0.38 | −0.76 | 0.48 | 2.4×10−5 |
6, 7 | {D(n)} | HV | 3.58 | 16.3 | 0.27 | 1.68 | 1.53 | 0.14 | 3.3×10−5 |
6, 7 | {T(n)} | HV | 2.98 | 257 | 0.26 | 1.87 | 0.60 | 0.46 | 1.6×10−4 |
8, 9 | {D(h)} | NV | 6.61 | 7.39 | 0.35 | 0.10 | −2.25 | 0.66 | 9.6×10−6 |
8, 9 | {T(h)} | NV | 5.33 | 100 | 0.14 | 0.19 | −2.19 | 0.77 | 7.2×10−6 |
10, 11 | {D(h)} | HV | 3.51 | 15.4 | 0.27 | 1.34 | 0.71 | 0.33 | 9.8×10−6 |
10, 11 | {T(h)} | HV | 2.92 | 157 | 0.26 | 1.71 | −0.39 | 0.77 | 1.4×10−4 |
sequence | algorithm | χ1 | χ2 | m11 | m12 | m21 | m22 | M |
{D(n)} | NV | 50.0 | 50.0 | 3.4 | 26.7 | 26.7 | 43.2 | 86645 |
{T(n)} | NV | 50.0 | 50.0 | 3.7 | 28.7 | 28.4 | 39.2 | 75579 |
{D(n)} | HV | 50.0 | 50.0 | 1.0 | 31.8 | 31.8 | 35.4 | 53723 |
{T(n)} | HV | 50.0 | 50.0 | 1.3 | 37.2 | 37.2 | 24.3 | 44655 |
{D(h)} | NV | 49.6 | 50.4 | 11.1 | 23.6 | 22.6 | 42.7 | 99143 |
{T(h)} | NV | 49.6 | 50.4 | 13.2 | 23.0 | 23.1 | 40.7 | 79940 |
{D(h)} | HV | 49.6 | 50.4 | 14.6 | 23.3 | 22.7 | 39.4 | 52626 |
{T(h)} | HV | 49.6 | 50.4 | 17.4 | 25.8 | 25.6 | 31.2 | 43755 |
Figs. | sequence | algorithm | ⟨k⟩ | ⟨l⟩ | ⟨c⟩ | A | γ | δ | MSE |
4, 5 | {D(n)} | NV | 5.78 | 7.92 | 0.33 | 0.17 | −2.27 | 0.78 | 1.6×10−5 |
4, 5 | {T(n)} | NV | 5.04 | 28.3 | 0.06 | 0.38 | −0.76 | 0.48 | 2.4×10−5 |
6, 7 | {D(n)} | HV | 3.58 | 16.3 | 0.27 | 1.68 | 1.53 | 0.14 | 3.3×10−5 |
6, 7 | {T(n)} | HV | 2.98 | 257 | 0.26 | 1.87 | 0.60 | 0.46 | 1.6×10−4 |
8, 9 | {D(h)} | NV | 6.61 | 7.39 | 0.35 | 0.10 | −2.25 | 0.66 | 9.6×10−6 |
8, 9 | {T(h)} | NV | 5.33 | 100 | 0.14 | 0.19 | −2.19 | 0.77 | 7.2×10−6 |
10, 11 | {D(h)} | HV | 3.51 | 15.4 | 0.27 | 1.34 | 0.71 | 0.33 | 9.8×10−6 |
10, 11 | {T(h)} | HV | 2.92 | 157 | 0.26 | 1.71 | −0.39 | 0.77 | 1.4×10−4 |
sequence | algorithm | χ1 | χ2 | m11 | m12 | m21 | m22 | M |
{D(n)} | NV | 50.0 | 50.0 | 3.4 | 26.7 | 26.7 | 43.2 | 86645 |
{T(n)} | NV | 50.0 | 50.0 | 3.7 | 28.7 | 28.4 | 39.2 | 75579 |
{D(n)} | HV | 50.0 | 50.0 | 1.0 | 31.8 | 31.8 | 35.4 | 53723 |
{T(n)} | HV | 50.0 | 50.0 | 1.3 | 37.2 | 37.2 | 24.3 | 44655 |
{D(h)} | NV | 49.6 | 50.4 | 11.1 | 23.6 | 22.6 | 42.7 | 99143 |
{T(h)} | NV | 49.6 | 50.4 | 13.2 | 23.0 | 23.1 | 40.7 | 79940 |
{D(h)} | HV | 49.6 | 50.4 | 14.6 | 23.3 | 22.7 | 39.4 | 52626 |
{T(h)} | HV | 49.6 | 50.4 | 17.4 | 25.8 | 25.6 | 31.2 | 43755 |