Research article Special Issues

A study of -Ricci–Yamabe solitons on LP-Kenmotsu manifolds

  • Received: 11 June 2024 Revised: 10 July 2024 Accepted: 16 July 2024 Published: 22 July 2024
  • MSC : 53C21, 53C25, 53C50, 53C80, 53E20

  • In this study, we characterize LP-Kenmotsu manifolds admitting -Ricci–Yamabe solitons (-RYSs) and gradient -Ricci–Yamabe solitons (gradient -RYSs). It is shown that an LP-Kenmotsu manifold of dimension n admitting a -Ricci–Yamabe soliton obeys Poisson's equation. We also determine the necessary and sufficient conditions under which the Laplace equation is satisfied by LP-Kenmotsu manifolds. Finally, by using a non-trivial example of an LP-Kenmotsu manifold, we verify some results of our paper.

    Citation: Abdul Haseeb, Fatemah Mofarreh, Sudhakar Kumar Chaubey, Rajendra Prasad. A study of -Ricci–Yamabe solitons on LP-Kenmotsu manifolds[J]. AIMS Mathematics, 2024, 9(8): 22532-22546. doi: 10.3934/math.20241096

    Related Papers:

    [1] Wei Lu, Yuangang Li, Yixiu Kong, Liangli Yang . Generalized triangular Pythagorean fuzzy weighted Bonferroni operators and their application in multi-attribute decision-making. AIMS Mathematics, 2023, 8(12): 28376-28397. doi: 10.3934/math.20231452
    [2] Saleem Abdullah, Muhammad Qiyas, Muhammad Naeem, Mamona, Yi Liu . Pythagorean Cubic fuzzy Hamacher aggregation operators and their application in green supply selection problem. AIMS Mathematics, 2022, 7(3): 4735-4766. doi: 10.3934/math.2022263
    [3] Misbah Rasheed, ElSayed Tag-Eldin, Nivin A. Ghamry, Muntazim Abbas Hashmi, Muhammad Kamran, Umber Rana . Decision-making algorithm based on Pythagorean fuzzy environment with probabilistic hesitant fuzzy set and Choquet integral. AIMS Mathematics, 2023, 8(5): 12422-12455. doi: 10.3934/math.2023624
    [4] Jun Hu, Jie Wu, Mengzhe Wang . Research on VIKOR group decision making using WOWA operator based on interval Pythagorean triangular fuzzy numbers. AIMS Mathematics, 2023, 8(11): 26237-26259. doi: 10.3934/math.20231338
    [5] Esmail Hassan Abdullatif Al-Sabri, Muhammad Rahim, Fazli Amin, Rashad Ismail, Salma Khan, Agaeb Mahal Alanzi, Hamiden Abd El-Wahed Khalifa . Multi-criteria decision-making based on Pythagorean cubic fuzzy Einstein aggregation operators for investment management. AIMS Mathematics, 2023, 8(7): 16961-16988. doi: 10.3934/math.2023866
    [6] Mehwish Shehzadi, Hanan Alolaiyan, Umer Shuaib, Abdul Razaq, Qin Xin . Crafting optimal cardiovascular treatment strategy in Pythagorean fuzzy dynamic settings. AIMS Mathematics, 2024, 9(11): 31495-31531. doi: 10.3934/math.20241516
    [7] Nasser Aedh Alreshidi, Muhammad Rahim, Fazli Amin, Abdulaziz Alenazi . Trapezoidal type-2 Pythagorean fuzzy TODIM approach for sensible decision-making with unknown weights in the presence of hesitancy. AIMS Mathematics, 2023, 8(12): 30462-30486. doi: 10.3934/math.20231556
    [8] Jian Qi . Artificial intelligence-based intelligent computing using circular q-rung orthopair fuzzy information aggregation. AIMS Mathematics, 2025, 10(2): 3062-3094. doi: 10.3934/math.2025143
    [9] Sana Shahab, Mohd Anjum, Ashit Kumar Dutta, Shabir Ahmad . Gamified approach towards optimizing supplier selection through Pythagorean Fuzzy soft-max aggregation operators for healthcare applications. AIMS Mathematics, 2024, 9(3): 6738-6771. doi: 10.3934/math.2024329
    [10] Li Li, Mengjing Hao . Interval-valued Pythagorean fuzzy entropy and its application to multi-criterion group decision-making. AIMS Mathematics, 2024, 9(5): 12511-12528. doi: 10.3934/math.2024612
  • In this study, we characterize LP-Kenmotsu manifolds admitting -Ricci–Yamabe solitons (-RYSs) and gradient -Ricci–Yamabe solitons (gradient -RYSs). It is shown that an LP-Kenmotsu manifold of dimension n admitting a -Ricci–Yamabe soliton obeys Poisson's equation. We also determine the necessary and sufficient conditions under which the Laplace equation is satisfied by LP-Kenmotsu manifolds. Finally, by using a non-trivial example of an LP-Kenmotsu manifold, we verify some results of our paper.



    One of the most preferable and valuable techniques is called meta-analysis [1], which is a statistical tool used to combine and evaluate the results from various independent studies on a particular topic or research question. The technique of meta-analysis [2] is a very suitable procedure for depicting vague and problematic information, but utilizing the technique of meta-analysis under the consideration of the classical set theory is very complex and vague because the range of crisp set is very limited. Further, the decision-making procedure is also used for finding the best optimal among the collection of alternatives, where the MADM technique is an important part of the decision-making process, and is also used for evaluating the required results under the concern criteria [3]. During the decision-making process, many experts have lost a lot of information because of limited information, such as zero and one. For this, Zadeh [4] proposed the fuzzy sets (FSs) with a truth function, such as FBM(Lj)[0,1], where FBM:X[0,1]. Moreover, in dealing with uncertain and unreliable information, the technique of truth function is not enough to resolve some complex problems. Further, the falsity function also plays an essential role in many complex problems because of their features. For this, Atanassov [5,6] derived the intuitionistic FSs (IFSs), which is a very flexible and reliable theory for managing vague and unreliable information, where the truth function and falsity function are a major part of the IFSs with a condition that the sum of the duplet will be contained in the unit interval. Further, the idea of FSs is a special case of the IFSs, and due to these features, many applications have been designed, such as aggregation operators [7,8], hybrid operators [9,10], and decision-making problems [11,12].

    The function of truth grade and the function of falsity grade have a lot of potential to cope with vague and uncertain information with the condition that the sum of the duplet is contained in the unit interval; however, in the presence of the following kinds of pair, (0.6,0.7), the IFSs have not worked feasibly because 0.6+0.7=1.3[0,1]. For this reason, in 2013, Yager [13] proposed the Pythagorean FSs (PFSs), where the structure of PFSs is the same as the structure of IFSs, but the condition of both techniques are different such as the sum of the square of the duplet will be contained in unit interval: 0.62+0.72=0.36+0.49=0.85[0,1]. The technique of PFSs is very wide due to their condition, where the IFSs and FSs are the special cases of the PFSs. Further, Deveci et al. [14] discussed the survey on recent applications of PFSs. Moreover, Mandel and Ranadive [15] exposed the decision-theoretic rough set based on PFSs. Additionally, Perez-Dominguez et al. [16] evaluated the CODAS technique for PFSs and their applications. Further, Alkan and Kahraman [17] presented the CODAS technique for PFSs with application in supply chain management. Moreover, Sun and Wang [18] exposed the distance measures for Pythagorean fuzzy information processing. Additionally, Calik [19] presented the AHP and TOPSIS techniques based on PFSs and their application in Industry 4.0.

    IFSs contained the truth function and falsity function with a condition that the sum of the duplet will be contained in the unit interval, but it is also possible to involve a new function, called the radius function between truth and falsity grades. Therefore, Atanassov [20] presented the technique of circular IFSs (CIFSs) with three different functions with the same range, called the truth function, falsity function, and radius function, with a condition that the sum of the duplet will be contained in the unit interval. Many applications have been proposed by different scholars: example, decision-making problems for CIFSs [21], divergence measures for CIFSs [22], distance measures for CIFSs [23], and similarity/entropy measures for CIFSs [24]. Further, Bozyigit et al. [25] presented the technique of circular PFSs (CPFSs) by modifying the condition of the CIFSs such as that the sum of the square of the duplet will be contained in the unit interval. Further, the CPFSs contain the technique of truth function, falsity function, and radius function, which is wider and more reliable than the existing techniques, such as FSs, IFSs, PFSs, and CIFSs, which can cope with vague and unreliable information in genuine life problems. Further, Ali and Yang [26] derived the technique of Hamacher operators for CPFSs.

    Keshavarz Ghorabaee et al. [27] proposed a new technique, called the EDAS method, known as evaluation based on the distance from average solution, which is mostly used for evaluating the best optimal among the collection of information. Further, Klement et al. [28] proposed the idea of triangular norms, which contained different types of norms and their geometrical representations. Additionally, the Bonferroni mean (BM) operators [29] were proposed based on algebraic norms, which are used for aggregating the collection of information into a singleton set. Furthermore, Xu and Yager [30] proposed the BM operators for IFSs. Moreover, Xia et al. [31] evaluated the BM operators for generalized IFSs. Additionally, Liang et al. [32] derived the BM operators for PFSs and their applications. Further, Yang et al. [33] exposed the BM operators for PFSs based on triangular norms.

    After the overall discussion, we observed that the model of circular Pythagorean fuzzy sets is very reliable and dominant because of the: The model of FSs to the model of CIFSs is the part of the CPF sets. Further, we also noticed that the model of Bonferroni mean operators and weighted Bonferroni mean operators are not proposed yet based on CPFSs, which are used for the aggregation of a finite number of information into a singleton set. The major problem is that up to date no one has derived the BM operators for CPFSs. Further, we also noticed that the EDAS method has not been proposed, which is a very reliable technique for evaluating some complicated and vague information. The major themes of this manuscript are listed below:

    1) To propose the technique of the CPFBM, CPFWBM and describes their special cases using two parameters, "s" and "t". Some describable properties are also proposed for the above techniques.

    2) To present the technique of the EDAS technique for the CPFSs.

    3) To show the flexibility and dominance of the proposed operators by comparing the proposed methods with some techniques.

    This manuscript is arranged as follows: In Section 2, we describe the prevailing notion of CPFSs and their operational laws. Moreover, we discuss the technique of the BM operator for any collection of non-negative integers. In Section 3, we propose the CPFBM operator, and CPFWBM operator and describe their special cases using two parameters, "s" and "t". Some describable properties are also proposed for the above techniques. In Section 4, we present the technique of the EDAS technique for the CPFSs. In Section 5, we use some examples to show the flexibility and dominance of the proposed operators. In Section 6, we compare the proposed method with some existing techniques to enhance the worth of the proposed theory. Some remarkable statements are given in Section 7.

    In this section, we describe the prevailing notion of CPFSs and their operational laws. Moreover, we discuss the technique of the BM operator for any collection of non-negative integers.

    In this section, we describe the prevailing notion of CPFSs and their operational laws. Moreover, we discuss the technique of the BM operator for any collection of non-negative integers.

    Definition 1. [25] A CPFS P on fixed set X is explained below:

    P={(x,FBM(Lj),GBM(Lj),HBM(Lj))|LjX}. (1)

    Here, the representation of the truth grade and falsity grade with radius are follows, such as FBM(Lj),GBM(Lj), and HBM(Lj), satisfying 1FBM(Lj)1, 0GBM(Lj)1 with (FBM(Lj))2+(GBM(Lj))21. Further, for convenience, the simple name of the pair (FPBM(Lj),GPBM(Lj),HPBM(Lj)) is called CPFN, such as Pσ=(FσBM(Lj),GσBM(Lj),HσBM(Lj)),σ=1,2,,φ.

    Definition 2. [26] Consider three CPFNs, P=(FBM(Lj),GBM(Lj),HBM(Lj)), P1=(F1BM(Lj),G1BM(Lj),H1BM(Lj)), and P2=(F2BM(Lj),G2BM(Lj),H2BM(Lj)) with λ, thus

    P1TNP2=((F1BM(Lj))2+(F2BM(Lj))2(F1BM(Lj))2(F2BM(Lj))2,G1BM(Lj)G2BM(Lj),(H1BM(Lj))2+(H2BM(Lj))2(H1BM(Lj))2(H2BM(Lj))2), (2)
    P1TCNP2=((F1BM(Lj))2+(F2BM(Lj))2(F1BM(Lj))2(F2BM(Lj))2,G1BM(Lj)G2BM(Lj),H1BM(Lj)H2BM(Lj)), (3)
    P1TNP2=(F1BM(Lj)F2BM(Lj),(G1BM(Lj))2+(G2BM(Lj))2(G1BM(Lj))2(G2BM(Lj))2,H1BM(Lj)H2BM(Lj)), (4)
    P1TCNP2=(F1BM(Lj)F2BM(Lj),(G1BM(Lj))2+(G2BM(Lj))2(G1BM(Lj))2(G2BM(Lj))2,(H1BM(Lj))2+(H2BM(Lj))2(H1BM(Lj))2(H2BM(Lj))2), (5)
    (λP)TN=(1(1(FBM(Lj))2)λ,(GBM(Lj))λ,1(1(HBM(Lj))2)λ), (6)
    (λP)TCN=(1(1(FBM(Lj))2)λ,(GBM(Lj))λ,(HBM(Lj))λ), (7)
    (Pλ)TN=((FBM(Lj))λ,1(1(GBM(Lj))2)λ,(FBM(Lj))λ), (8)
    (Pλ)TCN=((FBM(Lj))λ,1(1(GBM(Lj))2)λ,1(1(HBM(Lj))2)λ). (9)

    Definition 3. [26] Consider a CPFN, such as P=(FBM(Lj),GBM(Lj),HBM(Lj)), we have

    S(P)=((FBM(Lj))2(GBM(Lj))2)(HBM(Lj))2[1,1], (10)
    H(P)=((FBM(Lj))2+(GBM(Lj))2)(HBM(Lj))2. (11)

    Called score value and accuracy value with a condition that is if S(P1)>S(P1), then P1>P2; if S(P1)=S(P1), then P1=P2, then if H(P1)>H(P1), then P1>P2.

    Definition 4. [29] Consider P,Q0 with a collection of non-negative integers aσ(σ=1,2,,φ), thus

    BMP,Q(a1,a2,,aφ)=[1φ(φ1)φσ,θ=1σθaPσaQθ]1P+Q. (12)

    Called BM operator.

    In this section, we compute the technique of CPFBM operator and CPFWBM operator. Further, we discuss some basic properties of the above-proposed operators, called idempotency, monotonicity, and boundedness.

    Definition 5. Consider s,t>0 with a collection of CPFNs,

    Pσ=(FσBM(Lj),GσBM(Lj),HσBM(Lj))(σ=1,2,,φ).

    Thus,

    CPFBMs,t(P1,P2,,Pφ)TN=[1φ(φ1)[φσ,θ=1σθ(PsσPtθ)]]1s+t, (13)
    CPFBMs,t(P1,P2,,Pφ)TCN=[1φ(φ1)[φσ,θ=1σθ(PsσPtθ)]]1s+t. (14)

    Called CPFBMs,t Operator for t-norm and t-conorm.

    Theorem 1. Consider s,t>0 with a collection of CPFNs,

    Pσ=(FσBM(Lj),GσBM(Lj),HσBM(Lj))(σ=1,2,,φ),

    thus, we prove that the aggregated theory of the above operators is again CPFN, such as

    CPFBMs,t(P1,P2,,Pφ)TN=((1φσ,θ=1σθ(1(FσBM(Lj))2s(FθBM(Lj))2s)φφ(φ1))t2(s+t),1(1φσ,θ=1σθ(1(1(GσBM(Lj))2)s(1(GθBM(Lj))2)t)1φ(φ1))t2(s+t),(1φσ,θ=1σθ(1(HσBM(Lj))2s(HθBM(Lj))2s)φφ(φ1))t2(s+t)) (15)
    CPFBMs,t(P1,P2,,Pφ)TCN=((1φσ,θ=1σθ(1(FσBM(Lj))2s(FθBM(Lj))2s)φφ(φ1))t2(s+t),1(1φσ,θ=1σθ(1(1(GσBM(Lj))2)s(1(GθBM(Lj))2)t)1φ(φ1))t2(s+t),1(1φσ,θ=1σθ(1(1(HσBM(Lj))2)s(1(HθBM(Lj))2)t)1φ(φ1))t2(s+t)). (16)

    Proof. Using mathematical induction, we prove the above theory, such as if

    Psσ=((FσBM(Lj))s,1(1(GσBM(Lj))2)s,(HσBM(Lj))s),
    Ptθ=((FθBM(Lj))t,1(1(GθBM(Lj))2)t,(HθBM(Lj))t).

    Thus, we combine the above two information with the help of product rules, such as

    PsσPtθ=((FσBM(Lj))s(FθBM(Lj))t,1(1(GσBM(Lj))2)s(1(GθBM(Lj))2)t,(HσBM(Lj))s(HθBM(Lj))t).

    Further, we use the addition technique, we have

    φσ,θ=1σθ(PsσPtθ)=(1φσ,θ=1σθ(1(FσBM(Lj))2s(FθBM(Lj))2t),φσ,θ=1σθ(1(1(GσBM(Lj))2)s(1(GθBM(Lj))2)t)1φσ,θ=1σθ(1(HσBM(Lj))2s(HθBM(Lj))2t)).

    Finally, by mathematical induction, we have, if φ=2, such as

    2σ,θ=1σθ(PsσPtθ)=(PsσPtθ)(PsσPtθ)=(1(1(F1BM(Lj))2s(F2BM(Lj))2t)(1(F2BM(Lj))2s(F1BM(Lj))2t),(1(1(G1BM(Lj))2)s(1(G2BM(Lj))2)t)(1(1(G2BM(Lj))2)s(1(G1BM(Lj))2)t),1(1(H1BM(Lj))2s(H2BM(Lj))2t)(1(H2BM(Lj))2s(H1BM(Lj))2t))

    The proposed theory holds for φ=2, if we have done the above theory for φ=ω, such as

    ωσ,θ=1σθ(PsσPtθ)=(1ωσ,θ=1σθ(1(FσBM(Lj))2s(FθBM(Lj))2t),ωσ,θ=1σθ(1(1(GσBM(Lj))2)s(1(GθBM(Lj))2)t),1ωσ,θ=1σθ(1(HσBM(Lj))2s(HθBM(Lj))2t)).

    Then, we prove it for φ=ω+1, such as

    ω+1σ,θ=1σθ(PsσPtθ)=(ωσ,θ=1σθ(PsσPtθ))(ωσ=1(PsσPtω+1))(ωσ=1(Psω+1Ptθ)).

    Where,

    ωσ,θ=1σθ(PsσPtω+1)=(1ωσ,θ=1σθ(1(FσBM(Lj))2s(Fω+1BM(Lj))2t),ωσ,θ=1σθ(1(1(GσBM(Lj))2)s(1(Gω+1BM(Lj))2)t),1ωσ,θ=1σθ(1(HσBM(Lj))2s(Hω+1BM(Lj))2t))

    and

    ωσ,θ=1σθ(Psω+1Ptθ)=(1ωσ,θ=1σθ(1(Fω+1BM(Lj))2s(FθBM(Lj))2t),ωσ,θ=1σθ(1(1(Gω+1BM(Lj))2)s(1(GθBM(Lj))2)t),1ωσ,θ=1σθ(1(Hω+1BM(Lj))2s(HθBM(Lj))2t)).

    Then,

    ω+1σ,θ=1σθ(PsσPtθ)=(1ωσ,θ=1σθ(1(Fω+1BM(Lj))2s(FθBM(Lj))2t),ωσ,θ=1σθ(1(1(GσBM(Lj))2)s(1(Gω+1BM(Lj))2)t),1ωσ,θ=1σθ(1(HσBM(Lj))2s(Hω+1BM(Lj))2t))(1ωσ,θ=1σθ(1(FσBM(Lj))2s(Fω+1BM(Lj))2t),ωσ,θ=1σθ(1(1(GσBM(Lj))2)s(1(Gω+1BM(Lj))2)t),1ωσ,θ=1σθ(1(HσBM(Lj))2s(Hω+1BM(Lj))2t))(1ωσ,θ=1σθ(1(Fω+1BM(Lj))2s(FθBM(Lj))2t),ωσ,θ=1σθ(1(1(Gω+1BM(Lj))2)s(1(GθBM(Lj))2)t),1ωσ,θ=1σθ(1(Hω+1BM(Lj))2s(HθBM(Lj))2t))=(1ω+1σ,θ=1σθ(1(Fω+1BM(Lj))2s(FθBM(Lj))2t),ω+1σ,θ=1σθ(1(1(GσBM(Lj))2)s(1(Gω+1BM(Lj))2)t),1ω+1σ,θ=1σθ(1(HσBM(Lj))2s(Hω+1BM(Lj))2t))

    The proposed theory is held for φ=ω+1. Then,

    1φ(φ1)(φσ,θ=1σθ(PsσPtθ))=(1(φσ,θ=1σθ(1(FσBM(Lj))2s(FθBM(Lj))2s))1φ(φ1),φσ,θ=1σθ(1(1(GσBM(Lj))2)s(1(GθBM(Lj))2)t)12φ(φ1),1(φσ,θ=1σθ(1(HσBM(Lj))2s(HθBM(Lj))2s))1φ(φ1)).

    Hence,

    CPFBMP,Q(P1,P2,,Pφ)=[1φ(φ1)(φσ,θ=1σθ(PsσPtθ))]1s+t=((1φσ,θ=1σθ(1(FσBM(Lj))2s(FθBM(Lj))2s)φ2(s+t))12(s+t),1(1φσ,θ=1σθ(1(1(GσBM(Lj))2)s(1(GθBM(Lj))2)t)1φ(φ1))1s+t,(1φσ,θ=1σθ(1(HσBM(Lj))2s(HθBM(Lj))2s)φφ(φ1))12(s+t)).

    The proposed theory holds for all values of φ. Similarly, we evaluate the remaining part using the same procedures, such as

    CPFBMs,t(P1,P2,,Pφ)TCN=((1φσ,θ=1σθ(1(FσBM(Lj))2s(FθBM(Lj))2s)φφ(φ1))t2(s+t),1(1φσ,θ=1σθ(1(1(GσBM(Lj))2)s(1(GθBM(Lj))2)t)1φ(φ1))t2(s+t),1(1φσ,θ=1σθ(1(1(HσBM(Lj))2)s(1(HθBM(Lj))2)t)1φ(φ1))t2(s+t)).

    Theorem 2. Consider s,t>0 with a collection of CPFNs Pσ=(FσBM(Lj),GσBM(Lj),HσBM(Lj))(σ=1,2,,φ), then

    1) Idempotency: If Pσ=P=(FBM(Lj),GBM(Lj),HBM(Lj)), then

    CPFBMs,t(P1,P2,,Pφ)TN=P=(FBM(Lj),GBM(Lj),HBM(Lj)).
    CPFBMs,t(P1,P2,,Pφ)TCN=P=(FBM(Lj),GBM(Lj),HBM(Lj)).

    2) Monotonicity: If PσPσ that is FσBM(Lj)FσBM(Lj), GσBM(Lj)GσBM(Lj), and HBM(Lj)HBM(Lj), thus

    CPFBMs,t(P1,P2,,Pφ)TNCPFBMs,t(P1,P2,,Pφ)TN.
    CPFBMs,t(P1,P2,,Pφ)TCNCPFBMs,t(P1,P2,,Pφ)TCN.

    3) Commutativity: Consider Pσ(σ=1,2,,φ) be the permutation of Pσ(σ=1,2,,φ), thus

    CPFBMs,t(P1,P2,,Pφ)TN=CPFBMs,t(P1,P2,,Pφ)TN.
    CPFBMs,t(P1,P2,,Pφ)TCN=CPFBMs,t(P1,P2,,Pφ)TCN.

    4) Boundedness: Consider P=(mσφσ(FσBM(Lj)),maxσ(GσBM(Lj)),mσφσ(HσBM(Lj))) and P+=(maxσ(FσBM(Lj)),mσφσ(GσBM(Lj)),maxσ(HσBM(Lj))), thus

    PCPFBMs,t(P1,P2,,Pφ)TNP+.
    PCPFBMs,t(P1,P2,,Pφ)TCNP+.

    Further, we simplify the supremacy and validity of the proposed theory by discussing their special cases with the help of parameters.

    Case 1: When t0, then

    lσmt0CPFBMs,t(P1,P2,,Pφ)TN=((1φσ=1(1(FσBM(Lj))2s)1φ)12s,1(1φσ=1(1(1(GσBM(Lj))2)s)1φ)1s,(1φσ=1(1(HσBM(Lj))2s)1φ)12s)=[1φ(φσ=1Psσ)]1s.
    lσmt0CPFBMs,t(P1,P2,,Pφ)TCN=((1φσ=1(1(FσBM(Lj))2s)1φ)12s,1(1φσ=1(1(1(GσBM(Lj))2)s)1φ)1s,1(1φσ=1(1(1(HσBM(Lj))2)s)1φ)1s)=[1φ(φσ=1Psσ)]1s.

    Called the generalized CPF averaging (GCPFA) operator.

    Case 2: When s=1 and t0, thus

    lσmt0CPFBM1,t(P1,P2,,Pφ)TN=(1φσ=1(1(FσBM(Lj))2)1φ,(φσ=1GσBM(Lj))1φ,1φσ=1(1(HσBM(Lj))2)1φ)=1φ(φσ=1Pσ).
    lσmt0CPFBM1,t(P1,P2,,Pφ)TCN=(1φσ=1(1(FσBM(Lj))2)1φ,(φσ=1GσBM(Lj))1φ,(φσ=1HσBM(Lj))1φ)=1φ(φσ=1Pσ).

    This is called the CPF averaging (CPFA) operator.

    Case 3: When s=2 and t0, thus

    lσmt0CPFBM2,t(P1,P2,,Pφ)TN=((1φσ=1(1(FσBM(Lj))4)1φ)14,1(1φσ=1(1(1(GσBM(Lj))2)2)1φ)12,(1φσ=1(1(HσBM(Lj))4)1φ)14)=[1φ(φσ=1(Pσ)2)]12.
    lσmt0CPFBM2,t(P1,P2,,Pφ)TCN=((1φσ=1(1(FσBM(Lj))4)1φ)14,1(1φσ=1(1(1(GσBM(Lj))2)2)1φ)12,1(1φσ=1(1(1(HσBM(Lj))2)2)1φ)12)=[1φ(φσ=1(Pσ)2)]12.

    Called the CPF square mean (CPFSM) operator.

    Definition 6. Consider s,t>0 with a collection of CPFNs,

    Pσ=(FσBM(Lj),GσBM(Lj),HσBM(Lj))(σ=1,2,,φ),

    thus

    CPFWBMs,t(P1,P2,,Pφ)TN=[1φ(φ1)(φσ,θ=1σθ((wσPσ)s(wθPθ)t))]1s+t (17)
    CPFWBMs,t(P1,P2,,Pφ)TCN=[1φ(φ1)(φσ,θ=1σθ((wσPσ)s(wθPθ)t))]1s+t. (18)

    This is called the CPFWBMs,t operator with weight vector wσ[0,1] and φσ=1wσ=1.

    Theorem 3. Consider s,t>0 with a collection of CPFNs, Pσ=(FσBM(Lj),GσBM(Lj),HσBM(Lj))(σ=1,2,,φ), thus we prove that the aggregated theory of the above operators is again CPFN, such as

    CPFWBMs,t(P1,P2,,Pφ)TN=(1(1φσ,θ=1σθ(1(1(1(GσBM(Lj))2)wσ)s(1(1(GσBM(Lj))2)wθ)t)12(s+t))12(s+t),1(1φσ,θ=1σθ(1(1(GσBM(Lj))2wσ)s(1(GθBM(Lj))2wθ)t)1φ(φ1))1s+t,1(1φσ,θ=1σθ(1(1(1(HσBM(Lj))2)wσ)s(1(1(HσBM(Lj))2)wθ)t)12(s+t))12(s+t)). (19)
    CPFWBMs,t(P1,P2,,Pφ)TCN=(1(1φσ,θ=1σθ(1(1(1(GσBM(Lj))2)wσ)s(1(1(GσBM(Lj))2)wθ)t)12(s+t))12(s+t),1(1φσ,θ=1σθ(1(1(GσBM(Lj))2wσ)s(1(GθBM(Lj))2wθ)t)1φ(φ1))1s+t,1(1φσ,θ=1σθ(1(1(HσBM(Lj))2wσ)s(1(HθBM(Lj))2wθ)t)1φ(φ1))12(s+t)). (20)

    Proof. Omitted.

    Theorem 4: Consider s,t>0 with a collection of CPFNs Pσ=(FσBM(Lj),GσBM(Lj),HσBM(Lj))(σ=1,2,,φ), then

    1) Idempotency: If Pσ=P=(FBM(Lj),GBM(Lj),HBM(Lj)), then

    CPFWBMs,t(P1,P2,,Pφ)TN=P=(FBM(Lj),GBM(Lj),HBM(Lj))
    CPFWBMs,t(P1,P2,,Pφ)TCN=P=(FBM(Lj),GBM(Lj),HBM(Lj)).

    2) Monotonicity: If PσPσ that is FσBM(Lj)FσBM(Lj), GσBM(Lj)GσBM(Lj), and HBM(Lj)HBM(Lj), thus

    CPFWBMs,t(P1,P2,,Pφ)TNCPFWBMs,t(P1,P2,,Pφ)TN
    CPFWBMs,t(P1,P2,,Pφ)TCNCPFWBMs,t(P1,P2,,Pφ)TCN.

    3) Commutativity: Consider Pσ(σ=1,2,,φ) be the permutation of Pσ(σ=1,2,,φ), thus

    CPFWBMs,t(P1,P2,,Pφ)TN=CPFWBMs,t(P1,P2,,Pφ)TN
    CPFWBMs,t(P1,P2,,Pφ)TCN=CPFWBMs,t(P1,P2,,Pφ)TCN.

    4) Boundedness: Consider P=(mσφσ(FσBM(Lj)),maxσ(GσBM(Lj)),mσφσ(HσBM(Lj))) and P+=(maxσ(FσBM(Lj)),mσφσ(GσBM(Lj)),maxσ(HσBM(Lj))), thus

    PCPFWBMs,t(P1,P2,,Pφ)TNP+
    PCPFWBMs,t(P1,P2,,Pφ)TCNP+.

    Proof. Omitted.

    The major theme of this section is to expose or construct the technique of the EDAS procedure based on the initiated operators. For this, we compute the following procedure, such as

    Step 1: Design the matrix by including the terms of CPFNS by assigning to each attribute θth in every alternative σth, such as

    DM=[Pij]n×m=[P11P12P1mP21P22P2mPφ1Pφ2Pφm]. (21)

    The representation of the weight vector is as follows, such as W=(w1,w2,,wm)T with φθ=1wj=1.

    Step 2: Consider the technique of the CPFBM operator, we expose the average solution, such as

    CPFBMs,t(P1,P2,,Pφ)TN=((1φσ,θ=1σθ(1(FσBM(Lj))2s(FθBM(Lj))2s)φφ(φ1))t2(s+t),1(1φσ,θ=1σθ(1(1(GσBM(Lj))2)s(1(GθBM(Lj))2)t)1φ(φ1))t2(s+t),(1φσ,θ=1σθ(1(HσBM(Lj))2s(HθBM(Lj))2s)φφ(φ1))t2(s+t)). (22)

    Step 3: Compute the value of PDA and the value of NDA in the shape of a matrix, such as

    PDAσθ=max(0,(xijAVθ))AVθ, (23)
    NDAσθ=max(0,(AVθxij))AVθ. (24)

    These techniques will be used for truth, falsity, and radius functions.

    Step 4: Derive the technique of weighted summation according to the technique of PDA and NDA, such as

    SPi=mj=1wjPDAσθ, (25)
    SNi=mj=1wjNDAσθ. (26)

    Step 5: Compute the normalized values according to the values of SPi and SNi, such as

    NSPi=SPimax(SNi), (27)
    NSNi=1SNimax(SNi). (28)

    Step 6: Derive the appraisal values based on the above information, such as

    ASi=12(NSPi+NSNi). (29)

    Step 7: Rank all alternatives, to examine the best optimal.

    Moreover, we discuss the supremacy of the above technique by evaluating some examples with the help of the above technique. For this, we discuss the problem of the classification of the CPF meta-analysis and its application.

    In this section, we describe one of the most preferable and dominant techniques or applications called meta-analysis, which is a statistical technique used to evaluate or analyze the data from multiple independent studies for a particular topic or research question. In this application, we concentrate on using the initiated operators and methods to evaluate the above problems. For this, we consider the problem of meta-analysis and find the major key steps involved in meta-analysis, such as

    1) Data Extraction "A1".

    2) Pooling of Effect Sizes "A2".

    3) Assessment of Heterogeneity "A3".

    4) Publication Bias Assessment "A4".

    5) Subgroup Analysis and Sensitive Analysis "A5".

    We have some attributes, such as growth analysis, social impact, political impact, environmental impact, and internet resources. For this, we compute the following procedure, such as

    Step 1: Design the matrix by including the terms of CPFNS by assigning to each attribute θth in every alternative σth, see Table 1.

    Table 1.  Representation of the CPF matrix.
    G1 G2 G3 G4 G5
    A1 (0.8,0.5,0.3) (0.81,0.51,0.31) (0.82,0.52,0.32) (0.83,0.53,0.33) (0.84,0.54,0.34)
    A2 (0.4,0.3,0.1) (0.41,0.31,0.11) (0.42,0.32,0.12) (0.43,0.33,0.13) (0.44,0.34,0.14)
    A3 (0.7,0.6,0.3) (0.71,0.61,0.31) (0.72,0.62,0.32) (0.73,0.63,0.33) (0.74,0.64,0.34)
    A4 (0.6,0.5,0.4) (0.61,0.51,0.41) (0.62,0.52,0.42) (0.63,0.53,0.43) (0.64,0.54,0.44)
    A5 (0.5,0.4,0.2) (0.51,0.41,0.21) (0.52,0.42,0.22) (0.53,0.43,0.23) (0.54,0.44,0.24)

     | Show Table
    DownLoad: CSV

    Step 2: Consider the technique of the CPFBM operator, we expose the average solution, such as

    AV1=(0.9945,0.4674,0.8303),
    AV2=(0.9952,0.4775,0.8439),
    AV3=(0.9959,0.4876,0.8565),
    AV4=(0.9964,0.4977,0.8681),
    AV5=(0.9969,0.5078,0.8788).

    Step 3: Compute the value of PDA and the value of NDA in the shape of a matrix, see Tables 2 and 3.

    Table 2.  Positive distance matrix.
    (0,0.0695,0) (0,0.0679,0) (0,0.0663,0) (0,0.0647,0) (0,0.0632,0)
    (0,0,0) (0,0,0) (0,0,0) (0,0,0) (0,0,0)
    (0,0.2834,0) (0,0.2773,0) (0,0.2713,0) (0,0.2656,0) (0,0.2601,0)
    (0,0.0695,0) (0,0.0679,0) (0,0.0663,0) (0,0.0647,0) (0,0.0632)
    (0,0,0) (0,0,0) (0,0,0) (0,0,0) (0,0,0)

     | Show Table
    DownLoad: CSV
    Table 3.  Negative distance matrix.
    (0.1956,0,0.6387) (0.1861,0,0.63269) (0.1766,0,0.6264) (0.1670,0,0.6198) (0.1574,0,0.6131)
    (0.5978,0.3582,0.8795) (0.5880,0.3508,0.8696) (0.5782,0.3437,0.8599) (0.5684,0.3370,0.8502) (0.5586,0.3305,0.8407)
    (0.2961,0,0.6387) (0.2866,0,0.6326) (0.2770,0,0.6264) (0.26742,0,0.6198) (0.2577,0,0.6131)
    (0.3967,0,0.5182) (0.3871,0,0.5142) (0.3774,0,0.5096) (0.367,0,0.5046) (0.3580,0,0.4993)
    (0.4972,0.1443,0.7591) (0.4875,0.1414,0.7511) (0.4778,0.1387,0.7431) (0.4681,0.1361,0.7350) (0.4583,0.1336,0.7269)

     | Show Table
    DownLoad: CSV

    Step 4: Derive the technique of weighted summation according to the technique of PDA and NDA based on the weight vector (0.2,0.2,0.2,0.2,0.2). Tables 4 and 5.

    Table 4.  Weighted information based on the Positive distance matrix.
    SP1 (0,0.0845,0)
    SP2 (0,0.082,0)
    SP3 (0,0.080,0)
    SP4 (0,0.0790,0)
    SP5 (0,0.0773,0)

     | Show Table
    DownLoad: CSV
    Table 5.  Weighted information based on the Negative distance matrix.
    NP1 (0.3967,0.1005,0.6868)
    NP2 (0.3871,0.0984,0.6800)
    NP3 (0.3774,0.0965,0.6731)
    NP4 (0.367,0.0946,0.6659)
    NP5 (0.3580,0.0928,0.6586)

     | Show Table
    DownLoad: CSV

    Step 5: Compute the normalized values according to the values of SPi and SNi, see Table 6.

    Table 6.  Normalized matrix of information.
    NSP1NSN1 (0,0,0)
    NSP2NSN2 (0,0.0204,0.0098)
    NSP3NSN3 (0.9514,0.0399,0.0200)
    NSP4NSN4 (0.9269,0.0586,0.0304)
    NSP5NSN5 (0.9025,0.0765,0.411)

     | Show Table
    DownLoad: CSV

    Step 6: Derive the appraisal values based on the above information, such as

    SV1=0.0,SV2=0.0,SV3=0.0181,SV4=0.0260,SV5=0.0303.

    Step 7: Rank all alternatives, to examine the best optimal, such as

    SV5>SV4>SV3>SV2=SV1.

    The most prominent decision is SV5, according to the technique of the EDAS method, which is represented by the "Subgroup analysis and Sensitive Analysis". Further, we show the flexibility of the proposed theory by using the proposed operators without the EDAS method to evaluate the dominancy and flexibility of the proposed operators. For this, we consider the information in Table 7.

    Table 7.  CPF matrix of information.
    G1 G2 G3 G4 G5
    A1 (0.8,0.5,0.3) (0.81,0.51,0.31) (0.82,0.52,0.32) (0.83,0.53,0.33) (0.84,0.54,0.34)
    A2 (0.4,0.3,0.1) (0.41,0.31,0.11) (0.42,0.32,0.12) (0.43,0.33,0.13) (0.44,0.34,0.14)
    A3 (0.7,0.6,0.3) (0.71,0.61,0.31) (0.72,0.62,0.32) (0.73,0.63,0.33) (0.74,0.64,0.34)
    A4 (0.6,0.5,0.4) (0.61,0.51,0.41) (0.62,0.52,0.42) (0.63,0.53,0.43) (0.64,0.54,0.44)
    A5 (0.5,0.4,0.2) (0.51,0.41,0.21) (0.52,0.42,0.22) (0.53,0.43,0.23) (0.54,0.44,0.24)

     | Show Table
    DownLoad: CSV

    Further, we evaluate the support of any two CPF values based on distance measures. Thus, we have

    S112=S112=0.7333,S113=S131=0.9333,S114=S141=0.9,S115=S151=0.833,S123=S132=0.8333,S124=S142=0.7666,S125=S152=0.9,S134=S143=0.9,S135=S153=0.8333,S145=S154=0.8666.
    S212=S212=0.7333,S213=S231=0.9333,S214=S241=0.9,S215=S251=0.833,S223=S232=0.8333,S224=S242=0.7666,S225=S252=0.9,S234=S243=0.9,S235=S253=0.8333,S245=S254=0.8666.
    S312=S312=0.7333,S313=S331=0.9333,S314=S341=0.9,S315=S351=0.833,S323=S332=0.8333,S324=S342=0.7666,S325=S352=0.9,S334=S343=0.9,S335=S353=0.8333,S345=S354=0.8666.
    S412=S412=0.7333,S413=S431=0.9333,S414=S441=0.9,S415=S451=0.833,S423=S432=0.8333,S424=S442=0.7666,S425=S452=0.9,S434=S443=0.9,S435=S453=0.8333,S445=S454=0.8666.
    S512=S512=0.7333,S513=S531=0.9333,S514=S541=0.9,S515=S551=0.833,S523=S532=0.8333,S524=S542=0.7666,S525=S552=0.9,S534=S543=0.9,S535=S553=0.8333,S545=S554=0.8666.

    Thus, by using the above values, we find the following information, such as

    τ11=0.2018,τ12=0.1896,τ13=0.2018,τ14=0.2033,τ15=0.2033.
    τ21=0.2018,τ22=0.1896,τ23=0.2018,τ24=0.2033,τ25=0.2033.
    τ31=0.2018,τ32=0.1896,τ33=0.2018,τ34=0.2033,τ35=0.2033.
    τ41=0.2018,τ42=0.1896,τ43=0.2018,τ44=0.2033,τ45=0.2033.
    τ51=0.2018,τ52=0.1896,τ53=0.2018,τ54=0.2033,τ55=0.2033.

    Moreover, using the technique of the CPFBM operator, we have the following aggregated values, such as

    z1=(0.9945,0.46748,0.8303),z2=(0.9952,0.477,0.8439),z3=(0.9959,0.4876,0.856),z4=(0.9964,0.4977,0.8681),z5=(0.9969,0.5078,0.8788).

    Thus, we consider the technique of score values, such as

    S(z1)=0.6399,S(z2)=0.6435,S(z3)=0.6458,S(z4)=0.6469,S(z5)=0.6468.

    Finally, we have the following ranking values, such as

    S(z4)>S(z5)>S(z3)>S(z2)>S(z1).

    The most prominent decision is SV4 according to the technique of the CPFBM operator, which is represented by the "Publication Bias Assessment". Further, we compare the proposed theory with some existing techniques for evaluating the supremacy and validity of the proposed theory.

    The main theme of this article is to evaluate the supremacy and flexibility of the proposed method and proposed operators by comparing their ranking values with the obtained values of existing techniques to enhance the worth of the initiated theory. For this, we consider some existing techniques: Ali and Yang [26] derived the technique of Hamacher operators for CPFSs. Furthermore, Xu and Yager [30] proposed the theory of BM operators for IFSs. Moreover, Xia et al. [31] evaluated the technique of BM operators for generalized IFSs. Additionally, Liang et al. [32] derived the technique of BM operators for PFSs and their applications. Further, Yang et al. [33] exposed the BM operators for PFSs based on triangular norms. Finally, using the information in Table 7, the comparative analysis is listed in Table 8.

    Table 8.  Representation of the comparative analysis.
    Methods Score values Best optimal
    Ali and Yang [26] S(z4)>S(z5)>S(z3)>S(z2)>S(z1) S(z4)
    Xu and Yager [30] No No
    Xia et al. [31] No No
    Liang et al. [32] No No
    Yang et al. [33] No No
    CPFBM operator S(z4)>S(z5)>S(z3)>S(z2)>S(z1) S(z4)

     | Show Table
    DownLoad: CSV

    The most prominent decision is SV4, according to the technique of the CPFBM operator, which is represented by the "Publication Bias Assessment". Further, the existing techniques have failed because of ambiguity and limitations, where the proposed theory of Xu and Yager [30], Xia et al. [31], Liang et al. [32], and Yang et al. [33] are the special cases of the proposed theory. The limitations of the existing models are described below:

    1) Ali and Yang [26] derived the technique of Hamacher operators for CPFSs. The models for the Hamacher operators are very flexible and dominant because of their features. According to the theory of Ali and Yang [26], the ranking values are listed as follows: S(z4)>S(z5)>S(z3)>S(z2)>S(z1). Once more, the proposed model is different from the existing technique because it is computed based on the Bonferroni operators.

    2) Xu and Yager [30] proposed the theory of BM operators for IFSs, which is a special part of the proposed theory. The technique of BM operators for IFSs cannot evaluate the CPF kind of information, because the condition of CPF sets is more general. The three functions are the part of CPFSs, but in the case of IFSs, we have just two functions, which is the special case of the derived theory.

    3) Xia et al. [31] evaluated the technique of BM operators for generalized IFSs, which is a special part of the proposed theory. The technique of BM operators for IFSs cannot evaluate the CPF kind of information, because the condition of CPF sets is more general, where the three functions are the part of CPFSs, but in the case of IFSs, we have just two functions, which is the special case of the derived theory.

    4) Liang et al. [32] derived the technique of BM operators for PFSs and their applications as part of initiated operators, since this technique contains only two functions, but the proposed model is the modified version. This is because they contained three functions, and if we ignored the radius function form the CPFSs, then the proposed theory will be converted to the existing models.

    5) Further, Yang et al. [33] exposed the BM operators for PFSs based on triangular norms as part of initiated operators, since this technique contains only two functions, but the proposed model is the modified version. This is because they contained three functions, and if we ignored the radius function form the CPFSs, then the proposed theory will be converted to the existing models.

    Thus, after our long analysis, we concluded that the proposed model is superior and more general than the existing technique in coping with vague and uncertain information. Hence, the proposed model is more reliable and more general than the existing information.

    The major themes of this manuscript are listed below:

    1) We propose the technique of the CPFBM operator, and CPFWBM operator and describe their special cases with the help of two parameters, "s" and "t". Some describable properties are also proposed for the above techniques.

    2) We present the technique of the EDAS technique for the CPFSs.

    3) We show the flexibility and dominance of the proposed operators by comparing the proposed methods with some existing techniques.

    In the future, we will discuss the novel technique of circular picture fuzzy sets and their extensions. Further, we will develop some new techniques for aggregation operators [34], similarity measures [35], and different kinds of methods [36]. Finally, we will discuss their application in artificial intelligence [37], data science [38], and decision-making theory [39] to enhance the worth of the proposed methods.

    Weiwei Jiang: Conceptualization, Methodology, Formal analysis, Writing–review and editing, Visualization; Zeeshan Ali: Conceptualization, Software, Validation, Formal analysis, Investigation, Data Curation, Writing–review and editing; Muhammad Waqas: Conceptualization, Software, Validation, Formal analysis, Investigation, Data Curation, Writing–review and editing; Peide Liu: Software, Validation, Investigation, Resources, Data Curation, Writing–review and editing, Visualization Supervision, Project administration, Funding acquisition. All authors have read and approved the final version of the manuscript for publication.

    The authors declare there is no conflict of interest.



    [1] R. S. Hamilton, Lectures on geometric flows (Unpublished manuscript), 1989.
    [2] R. S. Hamilton, The Ricci flow on surfaces, 1986.
    [3] W. Zeng, X. D. Gu, Ricci flow for shape analysis and surface registration, New York, NY: Springer, 2013. https://doi.org/10.1007/978-1-4614-8781-4
    [4] E. Barbosa, E. Ribeiro, On conformal solutions of the Yamabe flow, Arch. Math., 101 (2013), 79–89. https://doi.org/10.1007/s00013-013-0533-0 doi: 10.1007/s00013-013-0533-0
    [5] A. Barros, E. Ribeiro, Some characterizations for compact almost Ricci solitons, Proc. Amer. Math. Soc., 140 (2012), 1033–1040. https://doi.org/10.1090/S0002-9939-2011-11029-3 doi: 10.1090/S0002-9939-2011-11029-3
    [6] D. E. Blair, Riemannian geometry of contact and symplectic manifolds, MA: Birkhauser Boston, 2010. https://doi.org/10.1007/978-0-8176-4959-3
    [7] S. Tachibana, On almost-analytic vectors in almost-Kahlerian manifolds, Tohoku Math. J., 11 (1959), 247–265. https://doi.org/10.2748/tmj/1178244584 doi: 10.2748/tmj/1178244584
    [8] T. Hamada, Real hypersurfaces of complex space forms in terms of Ricci -tensor, Tokyo J. Math., 25 (2002), 473–483. https://doi.org/10.3836/tjm/1244208866 doi: 10.3836/tjm/1244208866
    [9] G. Kaimakamis, K. Panagiotidou, -Ricci solitons of real hypersurfaces in non flat complex space forms, J. Geom. Phys., 86 (2014), 408–413. https://doi.org/10.1016/j.geomphys.2014.09.004 doi: 10.1016/j.geomphys.2014.09.004
    [10] S. Güler, M. Crasmareanu, Ricci-Yamabe maps for Riemannian flows and their volume variation and volume entropy, Turk. J. Math., 43 (2019), 2631–2641. https://doi.org/10.3906/mat-1902-38 doi: 10.3906/mat-1902-38
    [11] Y. Akrami, T. S. Koivisto, A. R. Solomon, The nature of spacetime in bigravity: Two metrics or none? Gen. Relativ. Grav., 47 (2015), 1838. https://doi.org/10.1007/s10714-014-1838-4
    [12] D. E. Allison, B. Unal, Geodesic structure of standard static space-times, J. Geom. Phys., 46 (2003), 193–200. https://doi.org/10.1016/S0393-0440(02)00154-7 doi: 10.1016/S0393-0440(02)00154-7
    [13] B. O'Neill, Semi-Riemannian geometry with applications to relativity, 1983.
    [14] K. Matsumoto, On Lorentzian paracontact manifolds, Bull. Yamagata Univ. Nat. Sci., 12 (1989), 151–156.
    [15] T. Mazur, On Lorentzian P-Sasakian manifolds, In: Classical analysis, Proceedings of 6th Symposium, Singapore: World Scientific, 1992,155–169. https://doi.org/10.1142/9789814537568
    [16] A. Haseeb, R. Prasad, Certain results on Lorentzian para-Kenmotsu manifolds, Bol. Soc. Parana. Mat., 39 (2021), 201–220. https://doi.org/10.5269/bspm.40607 doi: 10.5269/bspm.40607
    [17] A. M. Blaga, Some geometrical aspects of Einstein, Ricci and Yamabe solitons, J. Geom. Symmetry Phys., 52 (2019), 17–26. https://doi.org/10.7546/jgsp-52-2019-17-26 doi: 10.7546/jgsp-52-2019-17-26
    [18] S. Deshmukh, B. Y. Chen, A note on Yamabe solitons, Balkan J. Geom. Appl., 23 (2018), 37–43.
    [19] S. Chidananda, V. Venkatesha, Yamabe and Riemann solitons on Lorentzian para-Sasakian manifold, Commun. Korean Math. Soc., 37 (2022), 213–228. https://doi.org/10.4134/CKMS.c200365 doi: 10.4134/CKMS.c200365
    [20] A. Haseeb, H. Almusawa, Some results on Lorentzian para-Kenmotsu manifolds admitting η-Ricci solitons, Palestine J. Math., 11 (2022), 205–213.
    [21] A. Haseeb, U. C. De, η-Ricci solitons in ϵ-Kenmotsu manifolds, J. Geom., 110 (2019), 34. https://doi.org/10.1007/s00022-019-0490-2 doi: 10.1007/s00022-019-0490-2
    [22] M. A. Lone, I. F. Harry, Ricci solitons on Lorentz-Sasakian space forms, J. Geom. Phys., 178 (2022), 104547. https://doi.org/10.1016/j.geomphys.2022.104547 doi: 10.1016/j.geomphys.2022.104547
    [23] A. Haseeb, M. Bilal, S. K. Chaubey, A. A. H. Ahmadini, ζ-conformally flat LP-Kenmotsu manifolds and Ricci-Yamabe solitons, Mathematics, 11 (2023), 212. https://doi.org/10.3390/math11010212 doi: 10.3390/math11010212
    [24] J. P. Singh, M. Khatri, On Ricci-Yamabe soliton and geometrical structure in a perfect fluid spacetime, Afr. Mat., 32 (2021), 1645–1656. https://doi.org/10.1007/s13370-021-00925-2 doi: 10.1007/s13370-021-00925-2
    [25] Y. J. Suh, U. C. De, Yamabe solitons and Ricci solitons on almost co-Kahler manifolds, Can. Math. Bull., 62 (2019), 653–661. https://doi.org/10.4153/S0008439518000693 doi: 10.4153/S0008439518000693
    [26] H. I. Yoldas, On Kenmotsu manifolds admitting η-Ricci-Yamabe solitons, Int. J. Geom. Methods M., 18 (2021), 2150189. https://doi.org/10.1142/s0219887821501899 doi: 10.1142/s0219887821501899
    [27] P. Zhang, Y. Li, S. Roy, S. Dey, A. Bhattacharyya, Geometrical structure in a perfect fuid spacetime with conformal Ricci Yamabe soliton, Symmetry, 14 (2022), 594. https://doi.org/10.3390/sym14030594 doi: 10.3390/sym14030594
    [28] D. Dey, -Ricci-Yamabe soliton and contact geometry, arXiv: 2109.04220v1. https://doi.org/10.48550/arXiv.2109.04220
    [29] S. Dey, P. Laurian-ioan Laurian-ıoan, S. Roy, Geometry of -k-Ricci-Yamabe soliton and gradient -k-Ricci-Yamabe soliton on Kenmotsu manifolds, Hacet. J. Math. Stat., 52 (2023), 907–922. https://doi.org/10.15672/hujms.1074722 doi: 10.15672/hujms.1074722
    [30] A. Ghosh, D. S. Patra, -Ricci solitons within the framework of Sasakian and (K,μ)-contact manifold, Int. J. Geom. Methods Mod. Phys., 15 (2018), 1850120. https://doi.org/10.1142/S0219887818501207 doi: 10.1142/S0219887818501207
    [31] A. Haseeb, S. K. Chaubey, Lorentzian para-Sasakian manifolds and -Ricci solitons, Kragujev. J. Math., 48 (2024), 167–179. https://doi.org/10.46793/KgJMat2402.167H doi: 10.46793/KgJMat2402.167H
    [32] A. Haseeb, R. Prasad, F. Mofarreh, Sasakian manifolds admitting -η-Ricci-Yamabe solitons, Adv. Math. Phys., 2022 (2022), 5718736. https://doi.org/10.1155/2022/5718736 doi: 10.1155/2022/5718736
    [33] Venkatesha, D. M. Naik, H. A. Kumara, -Ricci solitons and gradient almost -Ricci solitons on Kenmotsu manifolds, Math. Slovaca, 69 (2019), 1447–1458. https://doi.org/10.1515/ms-2017-0321 doi: 10.1515/ms-2017-0321
    [34] S. Azami, M. Jafari, N. Jamal, A. Haseeb, Hyperbolic Ricci solitons on perfect fluid spacetimes, AIMS Mathematics, 9 (2024), 18929–18943. https://doi.org/10.3934/math.2024921 doi: 10.3934/math.2024921
    [35] A. Haseeb, R. Prasad, Some results on Lorentzian para-Kenmotsu manifolds, Bull. Transilvania Univ. Brasov, 13 (2020), 185–198. https://doi.org/10.31926/but.mif.2020.13.62.1.14 doi: 10.31926/but.mif.2020.13.62.1.14
    [36] Y. Li, A. Haseeb, M. Ali, LP-Kenmotsu manifolds admitting η-Ricci solitons and spacetime, J. Math., 2022 (2022), 6605127. https://doi.org/10.1155/2022/6605127 doi: 10.1155/2022/6605127
    [37] R. Prasad, A. Haseeb, V. Kumar, η-Ricci-Yamabe and -η-Ricci-Yamabe solitons in Lorentzian para-Kenmotsu manifolds, Analysis, 2024. https://doi.org/10.1515/anly-2023-0039
    [38] K. Yano, Integral formulas in Riemannian geometry, Marcel Dekker, 1970.
  • Reader Comments
  • © 2024 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(1106) PDF downloads(44) Cited by(0)

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog