Loading [MathJax]/jax/output/SVG/jax.js
Research article Special Issues

Association of personal and equipment-related factors on ACL injury risk in alpine skiers with cautious or risk-taking behaviour: A case-control study

  • Received: 28 October 2022 Revised: 17 April 2023 Accepted: 12 April 2023 Published: 06 May 2023
  • Background 

    In recreational alpine skiing ACL injury risk depends on the interaction of individual characteristics and behaviours as well as on equipment-related factors.

    Aim 

    to evaluate if and to what extent personal characteristics and equipment-related parameters are associated with ACL injury risk in cautious and risk-taking recreational alpine skiers.

    Methods 

    A retrospective questionnaire-based, case-control study of ACL-injured and uninjured in a cohort of cautious as well as risk-taking recreational skiers was conducted. Participants self-reported their demographics, skiing skill level, and risk-taking behaviour. Ski length, side-cut radius, widths of the tip, waist, and tail were recorded from each participant's skis. Standing heights at the front and rear components of the ski binding were measured with a digital sliding caliper, and a standing height ratio between the front and rear components was calculated. Ski boot sole abrasion at the toe and heel pieces was also measured with the digital sliding caliper.

    Results 

    In total, 1068 recreational skiers (50.8% females) with a mean age of 37.8 ± 12.3 years participated, of whom 193 (22.0%) sustained an ACL injury, and 330 (30.9%) participants reported a risk-taking behaviour. Results of the multiple logistic regression analyses revealed that a higher age, a lower skill level, a higher standing height ratio, and greater ski boot sole abrasion at the toe as well as heel pieces were independently associated with an increased ACL injury risk in both the cautious and the risk-taking group. Among cautious skiers, a longer ski length was an additional significant risk factor for sustaining an ACL injury. In conclusion, the same personal and equipment related characteristics contribute to an increase in the ACL injury risk regardless of risk-taking behaviour, with the only difference that longer skis represent an additional risk factor in cautious skiers.

    Citation: Gerhard Ruedl, Markus Posch, Elena Pocecco, Katja Tecklenburg, Birgit Schliernzauer, Michael D. Kennedy, Martin Faulhaber, Martin Burtscher. Association of personal and equipment-related factors on ACL injury risk in alpine skiers with cautious or risk-taking behaviour: A case-control study[J]. AIMS Public Health, 2023, 10(2): 348-359. doi: 10.3934/publichealth.2023026

    Related Papers:

    [1] Wei Lu, Yuangang Li, Yixiu Kong, Liangli Yang . Generalized triangular Pythagorean fuzzy weighted Bonferroni operators and their application in multi-attribute decision-making. AIMS Mathematics, 2023, 8(12): 28376-28397. doi: 10.3934/math.20231452
    [2] Saleem Abdullah, Muhammad Qiyas, Muhammad Naeem, Mamona, Yi Liu . Pythagorean Cubic fuzzy Hamacher aggregation operators and their application in green supply selection problem. AIMS Mathematics, 2022, 7(3): 4735-4766. doi: 10.3934/math.2022263
    [3] Misbah Rasheed, ElSayed Tag-Eldin, Nivin A. Ghamry, Muntazim Abbas Hashmi, Muhammad Kamran, Umber Rana . Decision-making algorithm based on Pythagorean fuzzy environment with probabilistic hesitant fuzzy set and Choquet integral. AIMS Mathematics, 2023, 8(5): 12422-12455. doi: 10.3934/math.2023624
    [4] Jun Hu, Jie Wu, Mengzhe Wang . Research on VIKOR group decision making using WOWA operator based on interval Pythagorean triangular fuzzy numbers. AIMS Mathematics, 2023, 8(11): 26237-26259. doi: 10.3934/math.20231338
    [5] Esmail Hassan Abdullatif Al-Sabri, Muhammad Rahim, Fazli Amin, Rashad Ismail, Salma Khan, Agaeb Mahal Alanzi, Hamiden Abd El-Wahed Khalifa . Multi-criteria decision-making based on Pythagorean cubic fuzzy Einstein aggregation operators for investment management. AIMS Mathematics, 2023, 8(7): 16961-16988. doi: 10.3934/math.2023866
    [6] Mehwish Shehzadi, Hanan Alolaiyan, Umer Shuaib, Abdul Razaq, Qin Xin . Crafting optimal cardiovascular treatment strategy in Pythagorean fuzzy dynamic settings. AIMS Mathematics, 2024, 9(11): 31495-31531. doi: 10.3934/math.20241516
    [7] Nasser Aedh Alreshidi, Muhammad Rahim, Fazli Amin, Abdulaziz Alenazi . Trapezoidal type-2 Pythagorean fuzzy TODIM approach for sensible decision-making with unknown weights in the presence of hesitancy. AIMS Mathematics, 2023, 8(12): 30462-30486. doi: 10.3934/math.20231556
    [8] Jian Qi . Artificial intelligence-based intelligent computing using circular q-rung orthopair fuzzy information aggregation. AIMS Mathematics, 2025, 10(2): 3062-3094. doi: 10.3934/math.2025143
    [9] Sana Shahab, Mohd Anjum, Ashit Kumar Dutta, Shabir Ahmad . Gamified approach towards optimizing supplier selection through Pythagorean Fuzzy soft-max aggregation operators for healthcare applications. AIMS Mathematics, 2024, 9(3): 6738-6771. doi: 10.3934/math.2024329
    [10] Li Li, Mengjing Hao . Interval-valued Pythagorean fuzzy entropy and its application to multi-criterion group decision-making. AIMS Mathematics, 2024, 9(5): 12511-12528. doi: 10.3934/math.2024612
  • Background 

    In recreational alpine skiing ACL injury risk depends on the interaction of individual characteristics and behaviours as well as on equipment-related factors.

    Aim 

    to evaluate if and to what extent personal characteristics and equipment-related parameters are associated with ACL injury risk in cautious and risk-taking recreational alpine skiers.

    Methods 

    A retrospective questionnaire-based, case-control study of ACL-injured and uninjured in a cohort of cautious as well as risk-taking recreational skiers was conducted. Participants self-reported their demographics, skiing skill level, and risk-taking behaviour. Ski length, side-cut radius, widths of the tip, waist, and tail were recorded from each participant's skis. Standing heights at the front and rear components of the ski binding were measured with a digital sliding caliper, and a standing height ratio between the front and rear components was calculated. Ski boot sole abrasion at the toe and heel pieces was also measured with the digital sliding caliper.

    Results 

    In total, 1068 recreational skiers (50.8% females) with a mean age of 37.8 ± 12.3 years participated, of whom 193 (22.0%) sustained an ACL injury, and 330 (30.9%) participants reported a risk-taking behaviour. Results of the multiple logistic regression analyses revealed that a higher age, a lower skill level, a higher standing height ratio, and greater ski boot sole abrasion at the toe as well as heel pieces were independently associated with an increased ACL injury risk in both the cautious and the risk-taking group. Among cautious skiers, a longer ski length was an additional significant risk factor for sustaining an ACL injury. In conclusion, the same personal and equipment related characteristics contribute to an increase in the ACL injury risk regardless of risk-taking behaviour, with the only difference that longer skis represent an additional risk factor in cautious skiers.



    One of the most preferable and valuable techniques is called meta-analysis [1], which is a statistical tool used to combine and evaluate the results from various independent studies on a particular topic or research question. The technique of meta-analysis [2] is a very suitable procedure for depicting vague and problematic information, but utilizing the technique of meta-analysis under the consideration of the classical set theory is very complex and vague because the range of crisp set is very limited. Further, the decision-making procedure is also used for finding the best optimal among the collection of alternatives, where the MADM technique is an important part of the decision-making process, and is also used for evaluating the required results under the concern criteria [3]. During the decision-making process, many experts have lost a lot of information because of limited information, such as zero and one. For this, Zadeh [4] proposed the fuzzy sets (FSs) with a truth function, such as FBM(Lj)[0,1], where FBM:X[0,1]. Moreover, in dealing with uncertain and unreliable information, the technique of truth function is not enough to resolve some complex problems. Further, the falsity function also plays an essential role in many complex problems because of their features. For this, Atanassov [5,6] derived the intuitionistic FSs (IFSs), which is a very flexible and reliable theory for managing vague and unreliable information, where the truth function and falsity function are a major part of the IFSs with a condition that the sum of the duplet will be contained in the unit interval. Further, the idea of FSs is a special case of the IFSs, and due to these features, many applications have been designed, such as aggregation operators [7,8], hybrid operators [9,10], and decision-making problems [11,12].

    The function of truth grade and the function of falsity grade have a lot of potential to cope with vague and uncertain information with the condition that the sum of the duplet is contained in the unit interval; however, in the presence of the following kinds of pair, (0.6,0.7), the IFSs have not worked feasibly because 0.6+0.7=1.3[0,1]. For this reason, in 2013, Yager [13] proposed the Pythagorean FSs (PFSs), where the structure of PFSs is the same as the structure of IFSs, but the condition of both techniques are different such as the sum of the square of the duplet will be contained in unit interval: 0.62+0.72=0.36+0.49=0.85[0,1]. The technique of PFSs is very wide due to their condition, where the IFSs and FSs are the special cases of the PFSs. Further, Deveci et al. [14] discussed the survey on recent applications of PFSs. Moreover, Mandel and Ranadive [15] exposed the decision-theoretic rough set based on PFSs. Additionally, Perez-Dominguez et al. [16] evaluated the CODAS technique for PFSs and their applications. Further, Alkan and Kahraman [17] presented the CODAS technique for PFSs with application in supply chain management. Moreover, Sun and Wang [18] exposed the distance measures for Pythagorean fuzzy information processing. Additionally, Calik [19] presented the AHP and TOPSIS techniques based on PFSs and their application in Industry 4.0.

    IFSs contained the truth function and falsity function with a condition that the sum of the duplet will be contained in the unit interval, but it is also possible to involve a new function, called the radius function between truth and falsity grades. Therefore, Atanassov [20] presented the technique of circular IFSs (CIFSs) with three different functions with the same range, called the truth function, falsity function, and radius function, with a condition that the sum of the duplet will be contained in the unit interval. Many applications have been proposed by different scholars: example, decision-making problems for CIFSs [21], divergence measures for CIFSs [22], distance measures for CIFSs [23], and similarity/entropy measures for CIFSs [24]. Further, Bozyigit et al. [25] presented the technique of circular PFSs (CPFSs) by modifying the condition of the CIFSs such as that the sum of the square of the duplet will be contained in the unit interval. Further, the CPFSs contain the technique of truth function, falsity function, and radius function, which is wider and more reliable than the existing techniques, such as FSs, IFSs, PFSs, and CIFSs, which can cope with vague and unreliable information in genuine life problems. Further, Ali and Yang [26] derived the technique of Hamacher operators for CPFSs.

    Keshavarz Ghorabaee et al. [27] proposed a new technique, called the EDAS method, known as evaluation based on the distance from average solution, which is mostly used for evaluating the best optimal among the collection of information. Further, Klement et al. [28] proposed the idea of triangular norms, which contained different types of norms and their geometrical representations. Additionally, the Bonferroni mean (BM) operators [29] were proposed based on algebraic norms, which are used for aggregating the collection of information into a singleton set. Furthermore, Xu and Yager [30] proposed the BM operators for IFSs. Moreover, Xia et al. [31] evaluated the BM operators for generalized IFSs. Additionally, Liang et al. [32] derived the BM operators for PFSs and their applications. Further, Yang et al. [33] exposed the BM operators for PFSs based on triangular norms.

    After the overall discussion, we observed that the model of circular Pythagorean fuzzy sets is very reliable and dominant because of the: The model of FSs to the model of CIFSs is the part of the CPF sets. Further, we also noticed that the model of Bonferroni mean operators and weighted Bonferroni mean operators are not proposed yet based on CPFSs, which are used for the aggregation of a finite number of information into a singleton set. The major problem is that up to date no one has derived the BM operators for CPFSs. Further, we also noticed that the EDAS method has not been proposed, which is a very reliable technique for evaluating some complicated and vague information. The major themes of this manuscript are listed below:

    1) To propose the technique of the CPFBM, CPFWBM and describes their special cases using two parameters, "s" and "t". Some describable properties are also proposed for the above techniques.

    2) To present the technique of the EDAS technique for the CPFSs.

    3) To show the flexibility and dominance of the proposed operators by comparing the proposed methods with some techniques.

    This manuscript is arranged as follows: In Section 2, we describe the prevailing notion of CPFSs and their operational laws. Moreover, we discuss the technique of the BM operator for any collection of non-negative integers. In Section 3, we propose the CPFBM operator, and CPFWBM operator and describe their special cases using two parameters, "s" and "t". Some describable properties are also proposed for the above techniques. In Section 4, we present the technique of the EDAS technique for the CPFSs. In Section 5, we use some examples to show the flexibility and dominance of the proposed operators. In Section 6, we compare the proposed method with some existing techniques to enhance the worth of the proposed theory. Some remarkable statements are given in Section 7.

    In this section, we describe the prevailing notion of CPFSs and their operational laws. Moreover, we discuss the technique of the BM operator for any collection of non-negative integers.

    In this section, we describe the prevailing notion of CPFSs and their operational laws. Moreover, we discuss the technique of the BM operator for any collection of non-negative integers.

    Definition 1. [25] A CPFS P on fixed set X is explained below:

    P={(x,FBM(Lj),GBM(Lj),HBM(Lj))|LjX}. (1)

    Here, the representation of the truth grade and falsity grade with radius are follows, such as FBM(Lj),GBM(Lj), and HBM(Lj), satisfying 1FBM(Lj)1, 0GBM(Lj)1 with (FBM(Lj))2+(GBM(Lj))21. Further, for convenience, the simple name of the pair (FPBM(Lj),GPBM(Lj),HPBM(Lj)) is called CPFN, such as Pσ=(FσBM(Lj),GσBM(Lj),HσBM(Lj)),σ=1,2,,φ.

    Definition 2. [26] Consider three CPFNs, P=(FBM(Lj),GBM(Lj),HBM(Lj)), P1=(F1BM(Lj),G1BM(Lj),H1BM(Lj)), and P2=(F2BM(Lj),G2BM(Lj),H2BM(Lj)) with λ, thus

    P1TNP2=((F1BM(Lj))2+(F2BM(Lj))2(F1BM(Lj))2(F2BM(Lj))2,G1BM(Lj)G2BM(Lj),(H1BM(Lj))2+(H2BM(Lj))2(H1BM(Lj))2(H2BM(Lj))2), (2)
    P1TCNP2=((F1BM(Lj))2+(F2BM(Lj))2(F1BM(Lj))2(F2BM(Lj))2,G1BM(Lj)G2BM(Lj),H1BM(Lj)H2BM(Lj)), (3)
    P1TNP2=(F1BM(Lj)F2BM(Lj),(G1BM(Lj))2+(G2BM(Lj))2(G1BM(Lj))2(G2BM(Lj))2,H1BM(Lj)H2BM(Lj)), (4)
    P1TCNP2=(F1BM(Lj)F2BM(Lj),(G1BM(Lj))2+(G2BM(Lj))2(G1BM(Lj))2(G2BM(Lj))2,(H1BM(Lj))2+(H2BM(Lj))2(H1BM(Lj))2(H2BM(Lj))2), (5)
    (λP)TN=(1(1(FBM(Lj))2)λ,(GBM(Lj))λ,1(1(HBM(Lj))2)λ), (6)
    (λP)TCN=(1(1(FBM(Lj))2)λ,(GBM(Lj))λ,(HBM(Lj))λ), (7)
    (Pλ)TN=((FBM(Lj))λ,1(1(GBM(Lj))2)λ,(FBM(Lj))λ), (8)
    (Pλ)TCN=((FBM(Lj))λ,1(1(GBM(Lj))2)λ,1(1(HBM(Lj))2)λ). (9)

    Definition 3. [26] Consider a CPFN, such as P=(FBM(Lj),GBM(Lj),HBM(Lj)), we have

    S(P)=((FBM(Lj))2(GBM(Lj))2)(HBM(Lj))2[1,1], (10)
    H(P)=((FBM(Lj))2+(GBM(Lj))2)(HBM(Lj))2. (11)

    Called score value and accuracy value with a condition that is if S(P1)>S(P1), then P1>P2; if S(P1)=S(P1), then P1=P2, then if H(P1)>H(P1), then P1>P2.

    Definition 4. [29] Consider P,Q0 with a collection of non-negative integers aσ(σ=1,2,,φ), thus

    BMP,Q(a1,a2,,aφ)=[1φ(φ1)φσ,θ=1σθaPσaQθ]1P+Q. (12)

    Called BM operator.

    In this section, we compute the technique of CPFBM operator and CPFWBM operator. Further, we discuss some basic properties of the above-proposed operators, called idempotency, monotonicity, and boundedness.

    Definition 5. Consider s,t>0 with a collection of CPFNs,

    Pσ=(FσBM(Lj),GσBM(Lj),HσBM(Lj))(σ=1,2,,φ).

    Thus,

    CPFBMs,t(P1,P2,,Pφ)TN=[1φ(φ1)[φσ,θ=1σθ(PsσPtθ)]]1s+t, (13)
    CPFBMs,t(P1,P2,,Pφ)TCN=[1φ(φ1)[φσ,θ=1σθ(PsσPtθ)]]1s+t. (14)

    Called CPFBMs,t Operator for t-norm and t-conorm.

    Theorem 1. Consider s,t>0 with a collection of CPFNs,

    Pσ=(FσBM(Lj),GσBM(Lj),HσBM(Lj))(σ=1,2,,φ),

    thus, we prove that the aggregated theory of the above operators is again CPFN, such as

    CPFBMs,t(P1,P2,,Pφ)TN=((1φσ,θ=1σθ(1(FσBM(Lj))2s(FθBM(Lj))2s)φφ(φ1))t2(s+t),1(1φσ,θ=1σθ(1(1(GσBM(Lj))2)s(1(GθBM(Lj))2)t)1φ(φ1))t2(s+t),(1φσ,θ=1σθ(1(HσBM(Lj))2s(HθBM(Lj))2s)φφ(φ1))t2(s+t)) (15)
    CPFBMs,t(P1,P2,,Pφ)TCN=((1φσ,θ=1σθ(1(FσBM(Lj))2s(FθBM(Lj))2s)φφ(φ1))t2(s+t),1(1φσ,θ=1σθ(1(1(GσBM(Lj))2)s(1(GθBM(Lj))2)t)1φ(φ1))t2(s+t),1(1φσ,θ=1σθ(1(1(HσBM(Lj))2)s(1(HθBM(Lj))2)t)1φ(φ1))t2(s+t)). (16)

    Proof. Using mathematical induction, we prove the above theory, such as if

    Psσ=((FσBM(Lj))s,1(1(GσBM(Lj))2)s,(HσBM(Lj))s),
    Ptθ=((FθBM(Lj))t,1(1(GθBM(Lj))2)t,(HθBM(Lj))t).

    Thus, we combine the above two information with the help of product rules, such as

    PsσPtθ=((FσBM(Lj))s(FθBM(Lj))t,1(1(GσBM(Lj))2)s(1(GθBM(Lj))2)t,(HσBM(Lj))s(HθBM(Lj))t).

    Further, we use the addition technique, we have

    φσ,θ=1σθ(PsσPtθ)=(1φσ,θ=1σθ(1(FσBM(Lj))2s(FθBM(Lj))2t),φσ,θ=1σθ(1(1(GσBM(Lj))2)s(1(GθBM(Lj))2)t)1φσ,θ=1σθ(1(HσBM(Lj))2s(HθBM(Lj))2t)).

    Finally, by mathematical induction, we have, if φ=2, such as

    2σ,θ=1σθ(PsσPtθ)=(PsσPtθ)(PsσPtθ)=(1(1(F1BM(Lj))2s(F2BM(Lj))2t)(1(F2BM(Lj))2s(F1BM(Lj))2t),(1(1(G1BM(Lj))2)s(1(G2BM(Lj))2)t)(1(1(G2BM(Lj))2)s(1(G1BM(Lj))2)t),1(1(H1BM(Lj))2s(H2BM(Lj))2t)(1(H2BM(Lj))2s(H1BM(Lj))2t))

    The proposed theory holds for φ=2, if we have done the above theory for φ=ω, such as

    ωσ,θ=1σθ(PsσPtθ)=(1ωσ,θ=1σθ(1(FσBM(Lj))2s(FθBM(Lj))2t),ωσ,θ=1σθ(1(1(GσBM(Lj))2)s(1(GθBM(Lj))2)t),1ωσ,θ=1σθ(1(HσBM(Lj))2s(HθBM(Lj))2t)).

    Then, we prove it for φ=ω+1, such as

    ω+1σ,θ=1σθ(PsσPtθ)=(ωσ,θ=1σθ(PsσPtθ))(ωσ=1(PsσPtω+1))(ωσ=1(Psω+1Ptθ)).

    Where,

    ωσ,θ=1σθ(PsσPtω+1)=(1ωσ,θ=1σθ(1(FσBM(Lj))2s(Fω+1BM(Lj))2t),ωσ,θ=1σθ(1(1(GσBM(Lj))2)s(1(Gω+1BM(Lj))2)t),1ωσ,θ=1σθ(1(HσBM(Lj))2s(Hω+1BM(Lj))2t))

    and

    ωσ,θ=1σθ(Psω+1Ptθ)=(1ωσ,θ=1σθ(1(Fω+1BM(Lj))2s(FθBM(Lj))2t),ωσ,θ=1σθ(1(1(Gω+1BM(Lj))2)s(1(GθBM(Lj))2)t),1ωσ,θ=1σθ(1(Hω+1BM(Lj))2s(HθBM(Lj))2t)).

    Then,

    ω+1σ,θ=1σθ(PsσPtθ)=(1ωσ,θ=1σθ(1(Fω+1BM(Lj))2s(FθBM(Lj))2t),ωσ,θ=1σθ(1(1(GσBM(Lj))2)s(1(Gω+1BM(Lj))2)t),1ωσ,θ=1σθ(1(HσBM(Lj))2s(Hω+1BM(Lj))2t))(1ωσ,θ=1σθ(1(FσBM(Lj))2s(Fω+1BM(Lj))2t),ωσ,θ=1σθ(1(1(GσBM(Lj))2)s(1(Gω+1BM(Lj))2)t),1ωσ,θ=1σθ(1(HσBM(Lj))2s(Hω+1BM(Lj))2t))(1ωσ,θ=1σθ(1(Fω+1BM(Lj))2s(FθBM(Lj))2t),ωσ,θ=1σθ(1(1(Gω+1BM(Lj))2)s(1(GθBM(Lj))2)t),1ωσ,θ=1σθ(1(Hω+1BM(Lj))2s(HθBM(Lj))2t))=(1ω+1σ,θ=1σθ(1(Fω+1BM(Lj))2s(FθBM(Lj))2t),ω+1σ,θ=1σθ(1(1(GσBM(Lj))2)s(1(Gω+1BM(Lj))2)t),1ω+1σ,θ=1σθ(1(HσBM(Lj))2s(Hω+1BM(Lj))2t))

    The proposed theory is held for φ=ω+1. Then,

    1φ(φ1)(φσ,θ=1σθ(PsσPtθ))=(1(φσ,θ=1σθ(1(FσBM(Lj))2s(FθBM(Lj))2s))1φ(φ1),φσ,θ=1σθ(1(1(GσBM(Lj))2)s(1(GθBM(Lj))2)t)12φ(φ1),1(φσ,θ=1σθ(1(HσBM(Lj))2s(HθBM(Lj))2s))1φ(φ1)).

    Hence,

    CPFBMP,Q(P1,P2,,Pφ)=[1φ(φ1)(φσ,θ=1σθ(PsσPtθ))]1s+t=((1φσ,θ=1σθ(1(FσBM(Lj))2s(FθBM(Lj))2s)φ2(s+t))12(s+t),1(1φσ,θ=1σθ(1(1(GσBM(Lj))2)s(1(GθBM(Lj))2)t)1φ(φ1))1s+t,(1φσ,θ=1σθ(1(HσBM(Lj))2s(HθBM(Lj))2s)φφ(φ1))12(s+t)).

    The proposed theory holds for all values of φ. Similarly, we evaluate the remaining part using the same procedures, such as

    CPFBMs,t(P1,P2,,Pφ)TCN=((1φσ,θ=1σθ(1(FσBM(Lj))2s(FθBM(Lj))2s)φφ(φ1))t2(s+t),1(1φσ,θ=1σθ(1(1(GσBM(Lj))2)s(1(GθBM(Lj))2)t)1φ(φ1))t2(s+t),1(1φσ,θ=1σθ(1(1(HσBM(Lj))2)s(1(HθBM(Lj))2)t)1φ(φ1))t2(s+t)).

    Theorem 2. Consider s,t>0 with a collection of CPFNs Pσ=(FσBM(Lj),GσBM(Lj),HσBM(Lj))(σ=1,2,,φ), then

    1) Idempotency: If Pσ=P=(FBM(Lj),GBM(Lj),HBM(Lj)), then

    CPFBMs,t(P1,P2,,Pφ)TN=P=(FBM(Lj),GBM(Lj),HBM(Lj)).
    CPFBMs,t(P1,P2,,Pφ)TCN=P=(FBM(Lj),GBM(Lj),HBM(Lj)).

    2) Monotonicity: If PσPσ that is FσBM(Lj)FσBM(Lj), GσBM(Lj)GσBM(Lj), and HBM(Lj)HBM(Lj), thus

    CPFBMs,t(P1,P2,,Pφ)TNCPFBMs,t(P1,P2,,Pφ)TN.
    CPFBMs,t(P1,P2,,Pφ)TCNCPFBMs,t(P1,P2,,Pφ)TCN.

    3) Commutativity: Consider Pσ(σ=1,2,,φ) be the permutation of Pσ(σ=1,2,,φ), thus

    CPFBMs,t(P1,P2,,Pφ)TN=CPFBMs,t(P1,P2,,Pφ)TN.
    CPFBMs,t(P1,P2,,Pφ)TCN=CPFBMs,t(P1,P2,,Pφ)TCN.

    4) Boundedness: Consider P=(mσφσ(FσBM(Lj)),maxσ(GσBM(Lj)),mσφσ(HσBM(Lj))) and P+=(maxσ(FσBM(Lj)),mσφσ(GσBM(Lj)),maxσ(HσBM(Lj))), thus

    PCPFBMs,t(P1,P2,,Pφ)TNP+.
    PCPFBMs,t(P1,P2,,Pφ)TCNP+.

    Further, we simplify the supremacy and validity of the proposed theory by discussing their special cases with the help of parameters.

    Case 1: When t0, then

    lσmt0CPFBMs,t(P1,P2,,Pφ)TN=((1φσ=1(1(FσBM(Lj))2s)1φ)12s,1(1φσ=1(1(1(GσBM(Lj))2)s)1φ)1s,(1φσ=1(1(HσBM(Lj))2s)1φ)12s)=[1φ(φσ=1Psσ)]1s.
    lσmt0CPFBMs,t(P1,P2,,Pφ)TCN=((1φσ=1(1(FσBM(Lj))2s)1φ)12s,1(1φσ=1(1(1(GσBM(Lj))2)s)1φ)1s,1(1φσ=1(1(1(HσBM(Lj))2)s)1φ)1s)=[1φ(φσ=1Psσ)]1s.

    Called the generalized CPF averaging (GCPFA) operator.

    Case 2: When s=1 and t0, thus

    lσmt0CPFBM1,t(P1,P2,,Pφ)TN=(1φσ=1(1(FσBM(Lj))2)1φ,(φσ=1GσBM(Lj))1φ,1φσ=1(1(HσBM(Lj))2)1φ)=1φ(φσ=1Pσ).
    lσmt0CPFBM1,t(P1,P2,,Pφ)TCN=(1φσ=1(1(FσBM(Lj))2)1φ,(φσ=1GσBM(Lj))1φ,(φσ=1HσBM(Lj))1φ)=1φ(φσ=1Pσ).

    This is called the CPF averaging (CPFA) operator.

    Case 3: When s=2 and t0, thus

    lσmt0CPFBM2,t(P1,P2,,Pφ)TN=((1φσ=1(1(FσBM(Lj))4)1φ)14,1(1φσ=1(1(1(GσBM(Lj))2)2)1φ)12,(1φσ=1(1(HσBM(Lj))4)1φ)14)=[1φ(φσ=1(Pσ)2)]12.
    lσmt0CPFBM2,t(P1,P2,,Pφ)TCN=((1φσ=1(1(FσBM(Lj))4)1φ)14,1(1φσ=1(1(1(GσBM(Lj))2)2)1φ)12,1(1φσ=1(1(1(HσBM(Lj))2)2)1φ)12)=[1φ(φσ=1(Pσ)2)]12.

    Called the CPF square mean (CPFSM) operator.

    Definition 6. Consider s,t>0 with a collection of CPFNs,

    Pσ=(FσBM(Lj),GσBM(Lj),HσBM(Lj))(σ=1,2,,φ),

    thus

    CPFWBMs,t(P1,P2,,Pφ)TN=[1φ(φ1)(φσ,θ=1σθ((wσPσ)s(wθPθ)t))]1s+t (17)
    CPFWBMs,t(P1,P2,,Pφ)TCN=[1φ(φ1)(φσ,θ=1σθ((wσPσ)s(wθPθ)t))]1s+t. (18)

    This is called the CPFWBMs,t operator with weight vector wσ[0,1] and φσ=1wσ=1.

    Theorem 3. Consider s,t>0 with a collection of CPFNs, Pσ=(FσBM(Lj),GσBM(Lj),HσBM(Lj))(σ=1,2,,φ), thus we prove that the aggregated theory of the above operators is again CPFN, such as

    CPFWBMs,t(P1,P2,,Pφ)TN=(1(1φσ,θ=1σθ(1(1(1(GσBM(Lj))2)wσ)s(1(1(GσBM(Lj))2)wθ)t)12(s+t))12(s+t),1(1φσ,θ=1σθ(1(1(GσBM(Lj))2wσ)s(1(GθBM(Lj))2wθ)t)1φ(φ1))1s+t,1(1φσ,θ=1σθ(1(1(1(HσBM(Lj))2)wσ)s(1(1(HσBM(Lj))2)wθ)t)12(s+t))12(s+t)). (19)
    CPFWBMs,t(P1,P2,,Pφ)TCN=(1(1φσ,θ=1σθ(1(1(1(GσBM(Lj))2)wσ)s(1(1(GσBM(Lj))2)wθ)t)12(s+t))12(s+t),1(1φσ,θ=1σθ(1(1(GσBM(Lj))2wσ)s(1(GθBM(Lj))2wθ)t)1φ(φ1))1s+t,1(1φσ,θ=1σθ(1(1(HσBM(Lj))2wσ)s(1(HθBM(Lj))2wθ)t)1φ(φ1))12(s+t)). (20)

    Proof. Omitted.

    Theorem 4: Consider s,t>0 with a collection of CPFNs Pσ=(FσBM(Lj),GσBM(Lj),HσBM(Lj))(σ=1,2,,φ), then

    1) Idempotency: If Pσ=P=(FBM(Lj),GBM(Lj),HBM(Lj)), then

    CPFWBMs,t(P1,P2,,Pφ)TN=P=(FBM(Lj),GBM(Lj),HBM(Lj))
    CPFWBMs,t(P1,P2,,Pφ)TCN=P=(FBM(Lj),GBM(Lj),HBM(Lj)).

    2) Monotonicity: If PσPσ that is FσBM(Lj)FσBM(Lj), GσBM(Lj)GσBM(Lj), and HBM(Lj)HBM(Lj), thus

    CPFWBMs,t(P1,P2,,Pφ)TNCPFWBMs,t(P1,P2,,Pφ)TN
    CPFWBMs,t(P1,P2,,Pφ)TCNCPFWBMs,t(P1,P2,,Pφ)TCN.

    3) Commutativity: Consider Pσ(σ=1,2,,φ) be the permutation of Pσ(σ=1,2,,φ), thus

    CPFWBMs,t(P1,P2,,Pφ)TN=CPFWBMs,t(P1,P2,,Pφ)TN
    CPFWBMs,t(P1,P2,,Pφ)TCN=CPFWBMs,t(P1,P2,,Pφ)TCN.

    4) Boundedness: Consider P=(mσφσ(FσBM(Lj)),maxσ(GσBM(Lj)),mσφσ(HσBM(Lj))) and P+=(maxσ(FσBM(Lj)),mσφσ(GσBM(Lj)),maxσ(HσBM(Lj))), thus

    PCPFWBMs,t(P1,P2,,Pφ)TNP+
    PCPFWBMs,t(P1,P2,,Pφ)TCNP+.

    Proof. Omitted.

    The major theme of this section is to expose or construct the technique of the EDAS procedure based on the initiated operators. For this, we compute the following procedure, such as

    Step 1: Design the matrix by including the terms of CPFNS by assigning to each attribute θth in every alternative σth, such as

    DM=[Pij]n×m=[P11P12P1mP21P22P2mPφ1Pφ2Pφm]. (21)

    The representation of the weight vector is as follows, such as W=(w1,w2,,wm)T with φθ=1wj=1.

    Step 2: Consider the technique of the CPFBM operator, we expose the average solution, such as

    CPFBMs,t(P1,P2,,Pφ)TN=((1φσ,θ=1σθ(1(FσBM(Lj))2s(FθBM(Lj))2s)φφ(φ1))t2(s+t),1(1φσ,θ=1σθ(1(1(GσBM(Lj))2)s(1(GθBM(Lj))2)t)1φ(φ1))t2(s+t),(1φσ,θ=1σθ(1(HσBM(Lj))2s(HθBM(Lj))2s)φφ(φ1))t2(s+t)). (22)

    Step 3: Compute the value of PDA and the value of NDA in the shape of a matrix, such as

    PDAσθ=max(0,(xijAVθ))AVθ, (23)
    NDAσθ=max(0,(AVθxij))AVθ. (24)

    These techniques will be used for truth, falsity, and radius functions.

    Step 4: Derive the technique of weighted summation according to the technique of PDA and NDA, such as

    SPi=mj=1wjPDAσθ, (25)
    SNi=mj=1wjNDAσθ. (26)

    Step 5: Compute the normalized values according to the values of SPi and SNi, such as

    NSPi=SPimax(SNi), (27)
    NSNi=1SNimax(SNi). (28)

    Step 6: Derive the appraisal values based on the above information, such as

    ASi=12(NSPi+NSNi). (29)

    Step 7: Rank all alternatives, to examine the best optimal.

    Moreover, we discuss the supremacy of the above technique by evaluating some examples with the help of the above technique. For this, we discuss the problem of the classification of the CPF meta-analysis and its application.

    In this section, we describe one of the most preferable and dominant techniques or applications called meta-analysis, which is a statistical technique used to evaluate or analyze the data from multiple independent studies for a particular topic or research question. In this application, we concentrate on using the initiated operators and methods to evaluate the above problems. For this, we consider the problem of meta-analysis and find the major key steps involved in meta-analysis, such as

    1) Data Extraction "A1".

    2) Pooling of Effect Sizes "A2".

    3) Assessment of Heterogeneity "A3".

    4) Publication Bias Assessment "A4".

    5) Subgroup Analysis and Sensitive Analysis "A5".

    We have some attributes, such as growth analysis, social impact, political impact, environmental impact, and internet resources. For this, we compute the following procedure, such as

    Step 1: Design the matrix by including the terms of CPFNS by assigning to each attribute θth in every alternative σth, see Table 1.

    Table 1.  Representation of the CPF matrix.
    G1 G2 G3 G4 G5
    A1 (0.8,0.5,0.3) (0.81,0.51,0.31) (0.82,0.52,0.32) (0.83,0.53,0.33) (0.84,0.54,0.34)
    A2 (0.4,0.3,0.1) (0.41,0.31,0.11) (0.42,0.32,0.12) (0.43,0.33,0.13) (0.44,0.34,0.14)
    A3 (0.7,0.6,0.3) (0.71,0.61,0.31) (0.72,0.62,0.32) (0.73,0.63,0.33) (0.74,0.64,0.34)
    A4 (0.6,0.5,0.4) (0.61,0.51,0.41) (0.62,0.52,0.42) (0.63,0.53,0.43) (0.64,0.54,0.44)
    A5 (0.5,0.4,0.2) (0.51,0.41,0.21) (0.52,0.42,0.22) (0.53,0.43,0.23) (0.54,0.44,0.24)

     | Show Table
    DownLoad: CSV

    Step 2: Consider the technique of the CPFBM operator, we expose the average solution, such as

    AV1=(0.9945,0.4674,0.8303),
    AV2=(0.9952,0.4775,0.8439),
    AV3=(0.9959,0.4876,0.8565),
    AV4=(0.9964,0.4977,0.8681),
    AV5=(0.9969,0.5078,0.8788).

    Step 3: Compute the value of PDA and the value of NDA in the shape of a matrix, see Tables 2 and 3.

    Table 2.  Positive distance matrix.
    (0,0.0695,0) (0,0.0679,0) (0,0.0663,0) (0,0.0647,0) (0,0.0632,0)
    (0,0,0) (0,0,0) (0,0,0) (0,0,0) (0,0,0)
    (0,0.2834,0) (0,0.2773,0) (0,0.2713,0) (0,0.2656,0) (0,0.2601,0)
    (0,0.0695,0) (0,0.0679,0) (0,0.0663,0) (0,0.0647,0) (0,0.0632)
    (0,0,0) (0,0,0) (0,0,0) (0,0,0) (0,0,0)

     | Show Table
    DownLoad: CSV
    Table 3.  Negative distance matrix.
    (0.1956,0,0.6387) (0.1861,0,0.63269) (0.1766,0,0.6264) (0.1670,0,0.6198) (0.1574,0,0.6131)
    (0.5978,0.3582,0.8795) (0.5880,0.3508,0.8696) (0.5782,0.3437,0.8599) (0.5684,0.3370,0.8502) (0.5586,0.3305,0.8407)
    (0.2961,0,0.6387) (0.2866,0,0.6326) (0.2770,0,0.6264) (0.26742,0,0.6198) (0.2577,0,0.6131)
    (0.3967,0,0.5182) (0.3871,0,0.5142) (0.3774,0,0.5096) (0.367,0,0.5046) (0.3580,0,0.4993)
    (0.4972,0.1443,0.7591) (0.4875,0.1414,0.7511) (0.4778,0.1387,0.7431) (0.4681,0.1361,0.7350) (0.4583,0.1336,0.7269)

     | Show Table
    DownLoad: CSV

    Step 4: Derive the technique of weighted summation according to the technique of PDA and NDA based on the weight vector (0.2,0.2,0.2,0.2,0.2). Tables 4 and 5.

    Table 4.  Weighted information based on the Positive distance matrix.
    SP1 (0,0.0845,0)
    SP2 (0,0.082,0)
    SP3 (0,0.080,0)
    SP4 (0,0.0790,0)
    SP5 (0,0.0773,0)

     | Show Table
    DownLoad: CSV
    Table 5.  Weighted information based on the Negative distance matrix.
    NP1 (0.3967,0.1005,0.6868)
    NP2 (0.3871,0.0984,0.6800)
    NP3 (0.3774,0.0965,0.6731)
    NP4 (0.367,0.0946,0.6659)
    NP5 (0.3580,0.0928,0.6586)

     | Show Table
    DownLoad: CSV

    Step 5: Compute the normalized values according to the values of SPi and SNi, see Table 6.

    Table 6.  Normalized matrix of information.
    NSP1NSN1 (0,0,0)
    NSP2NSN2 (0,0.0204,0.0098)
    NSP3NSN3 (0.9514,0.0399,0.0200)
    NSP4NSN4 (0.9269,0.0586,0.0304)
    NSP5NSN5 (0.9025,0.0765,0.411)

     | Show Table
    DownLoad: CSV

    Step 6: Derive the appraisal values based on the above information, such as

    SV1=0.0,SV2=0.0,SV3=0.0181,SV4=0.0260,SV5=0.0303.

    Step 7: Rank all alternatives, to examine the best optimal, such as

    SV5>SV4>SV3>SV2=SV1.

    The most prominent decision is SV5, according to the technique of the EDAS method, which is represented by the "Subgroup analysis and Sensitive Analysis". Further, we show the flexibility of the proposed theory by using the proposed operators without the EDAS method to evaluate the dominancy and flexibility of the proposed operators. For this, we consider the information in Table 7.

    Table 7.  CPF matrix of information.
    G1 G2 G3 G4 G5
    A1 (0.8,0.5,0.3) (0.81,0.51,0.31) (0.82,0.52,0.32) (0.83,0.53,0.33) (0.84,0.54,0.34)
    A2 (0.4,0.3,0.1) (0.41,0.31,0.11) (0.42,0.32,0.12) (0.43,0.33,0.13) (0.44,0.34,0.14)
    A3 (0.7,0.6,0.3) (0.71,0.61,0.31) (0.72,0.62,0.32) (0.73,0.63,0.33) (0.74,0.64,0.34)
    A4 (0.6,0.5,0.4) (0.61,0.51,0.41) (0.62,0.52,0.42) (0.63,0.53,0.43) (0.64,0.54,0.44)
    A5 (0.5,0.4,0.2) (0.51,0.41,0.21) (0.52,0.42,0.22) (0.53,0.43,0.23) (0.54,0.44,0.24)

     | Show Table
    DownLoad: CSV

    Further, we evaluate the support of any two CPF values based on distance measures. Thus, we have

    S112=S112=0.7333,S113=S131=0.9333,S114=S141=0.9,S115=S151=0.833,S123=S132=0.8333,S124=S142=0.7666,S125=S152=0.9,S134=S143=0.9,S135=S153=0.8333,S145=S154=0.8666.
    S212=S212=0.7333,S213=S231=0.9333,S214=S241=0.9,S215=S251=0.833,S223=S232=0.8333,S224=S242=0.7666,S225=S252=0.9,S234=S243=0.9,S235=S253=0.8333,S245=S254=0.8666.
    S312=S312=0.7333,S313=S331=0.9333,S314=S341=0.9,S315=S351=0.833,S323=S332=0.8333,S324=S342=0.7666,S325=S352=0.9,S334=S343=0.9,S335=S353=0.8333,S345=S354=0.8666.
    S412=S412=0.7333,S413=S431=0.9333,S414=S441=0.9,S415=S451=0.833,S423=S432=0.8333,S424=S442=0.7666,S425=S452=0.9,S434=S443=0.9,S435=S453=0.8333,S445=S454=0.8666.
    S512=S512=0.7333,S513=S531=0.9333,S514=S541=0.9,S515=S551=0.833,S523=S532=0.8333,S524=S542=0.7666,S525=S552=0.9,S534=S543=0.9,S535=S553=0.8333,S545=S554=0.8666.

    Thus, by using the above values, we find the following information, such as

    τ11=0.2018,τ12=0.1896,τ13=0.2018,τ14=0.2033,τ15=0.2033.
    τ21=0.2018,τ22=0.1896,τ23=0.2018,τ24=0.2033,τ25=0.2033.
    τ31=0.2018,τ32=0.1896,τ33=0.2018,τ34=0.2033,τ35=0.2033.
    τ41=0.2018,τ42=0.1896,τ43=0.2018,τ44=0.2033,τ45=0.2033.
    τ51=0.2018,τ52=0.1896,τ53=0.2018,τ54=0.2033,τ55=0.2033.

    Moreover, using the technique of the CPFBM operator, we have the following aggregated values, such as

    z1=(0.9945,0.46748,0.8303),z2=(0.9952,0.477,0.8439),z3=(0.9959,0.4876,0.856),z4=(0.9964,0.4977,0.8681),z5=(0.9969,0.5078,0.8788).

    Thus, we consider the technique of score values, such as

    S(z1)=0.6399,S(z2)=0.6435,S(z3)=0.6458,S(z4)=0.6469,S(z5)=0.6468.

    Finally, we have the following ranking values, such as

    S(z4)>S(z5)>S(z3)>S(z2)>S(z1).

    The most prominent decision is SV4 according to the technique of the CPFBM operator, which is represented by the "Publication Bias Assessment". Further, we compare the proposed theory with some existing techniques for evaluating the supremacy and validity of the proposed theory.

    The main theme of this article is to evaluate the supremacy and flexibility of the proposed method and proposed operators by comparing their ranking values with the obtained values of existing techniques to enhance the worth of the initiated theory. For this, we consider some existing techniques: Ali and Yang [26] derived the technique of Hamacher operators for CPFSs. Furthermore, Xu and Yager [30] proposed the theory of BM operators for IFSs. Moreover, Xia et al. [31] evaluated the technique of BM operators for generalized IFSs. Additionally, Liang et al. [32] derived the technique of BM operators for PFSs and their applications. Further, Yang et al. [33] exposed the BM operators for PFSs based on triangular norms. Finally, using the information in Table 7, the comparative analysis is listed in Table 8.

    Table 8.  Representation of the comparative analysis.
    Methods Score values Best optimal
    Ali and Yang [26] S(z4)>S(z5)>S(z3)>S(z2)>S(z1) S(z4)
    Xu and Yager [30] No No
    Xia et al. [31] No No
    Liang et al. [32] No No
    Yang et al. [33] No No
    CPFBM operator S(z4)>S(z5)>S(z3)>S(z2)>S(z1) S(z4)

     | Show Table
    DownLoad: CSV

    The most prominent decision is SV4, according to the technique of the CPFBM operator, which is represented by the "Publication Bias Assessment". Further, the existing techniques have failed because of ambiguity and limitations, where the proposed theory of Xu and Yager [30], Xia et al. [31], Liang et al. [32], and Yang et al. [33] are the special cases of the proposed theory. The limitations of the existing models are described below:

    1) Ali and Yang [26] derived the technique of Hamacher operators for CPFSs. The models for the Hamacher operators are very flexible and dominant because of their features. According to the theory of Ali and Yang [26], the ranking values are listed as follows: S(z4)>S(z5)>S(z3)>S(z2)>S(z1). Once more, the proposed model is different from the existing technique because it is computed based on the Bonferroni operators.

    2) Xu and Yager [30] proposed the theory of BM operators for IFSs, which is a special part of the proposed theory. The technique of BM operators for IFSs cannot evaluate the CPF kind of information, because the condition of CPF sets is more general. The three functions are the part of CPFSs, but in the case of IFSs, we have just two functions, which is the special case of the derived theory.

    3) Xia et al. [31] evaluated the technique of BM operators for generalized IFSs, which is a special part of the proposed theory. The technique of BM operators for IFSs cannot evaluate the CPF kind of information, because the condition of CPF sets is more general, where the three functions are the part of CPFSs, but in the case of IFSs, we have just two functions, which is the special case of the derived theory.

    4) Liang et al. [32] derived the technique of BM operators for PFSs and their applications as part of initiated operators, since this technique contains only two functions, but the proposed model is the modified version. This is because they contained three functions, and if we ignored the radius function form the CPFSs, then the proposed theory will be converted to the existing models.

    5) Further, Yang et al. [33] exposed the BM operators for PFSs based on triangular norms as part of initiated operators, since this technique contains only two functions, but the proposed model is the modified version. This is because they contained three functions, and if we ignored the radius function form the CPFSs, then the proposed theory will be converted to the existing models.

    Thus, after our long analysis, we concluded that the proposed model is superior and more general than the existing technique in coping with vague and uncertain information. Hence, the proposed model is more reliable and more general than the existing information.

    The major themes of this manuscript are listed below:

    1) We propose the technique of the CPFBM operator, and CPFWBM operator and describe their special cases with the help of two parameters, "s" and "t". Some describable properties are also proposed for the above techniques.

    2) We present the technique of the EDAS technique for the CPFSs.

    3) We show the flexibility and dominance of the proposed operators by comparing the proposed methods with some existing techniques.

    In the future, we will discuss the novel technique of circular picture fuzzy sets and their extensions. Further, we will develop some new techniques for aggregation operators [34], similarity measures [35], and different kinds of methods [36]. Finally, we will discuss their application in artificial intelligence [37], data science [38], and decision-making theory [39] to enhance the worth of the proposed methods.

    Weiwei Jiang: Conceptualization, Methodology, Formal analysis, Writing–review and editing, Visualization; Zeeshan Ali: Conceptualization, Software, Validation, Formal analysis, Investigation, Data Curation, Writing–review and editing; Muhammad Waqas: Conceptualization, Software, Validation, Formal analysis, Investigation, Data Curation, Writing–review and editing; Peide Liu: Software, Validation, Investigation, Resources, Data Curation, Writing–review and editing, Visualization Supervision, Project administration, Funding acquisition. All authors have read and approved the final version of the manuscript for publication.

    The authors declare there is no conflict of interest.



    Conflict of interest



    All authors declare no conflicts of interest in this paper.

    [1] Kim S, Endres NK, Johnson RJ, et al. (2012) Snowboarding injuries: trends over time and comparisons with alpine skiing injuries. Am J Sports Med 40: 770-776. https://doi.org/10.1177/0363546511433279
    [2] LaPorte JD, Bajolle L, Lamy D, et al. (2012) Winter sport injuries in France over two decades. Skiing Trauma and Safety . ASTM International 201-215. https://doi.org/10.1520/STP20120055
    [3] Majewski M, Habelt S, Steinbrück K (2006) Epidemiology of athletic knee injuries: a 10-year study. Knee 13: 184-188. https://doi.org/10.1016/j.knee.2006.01.005
    [4] Posch M, Schranz A, Lener M, et al. (2021) In recreational alpine skiing, the ACL is predominantly injured in all knee injuries needing hospitalisation. Knee Surg Sport Tr A 29: 1790-1796. https://doi.org/10.1007/s00167-020-06221-z
    [5] Bahr R, Krosshaug T (2005) Understanding injury mechanisms: a key component of preventing injuries in sport. Br J Sports Med 39: 324-329. https://doi.org/10.1136/bjsm.2005.018341
    [6] Hagel BE, Pless IB, Goulet C, et al. (2005) The effect of helmet use on injury severity and crash circumstances in skiers and snowboarders. Accid Anal Prev 37: 103-108. https://doi.org/10.1016/j.aap.2004.04.003
    [7] Scott MD, Buller DB, Andersen PA, et al. (2007) Testing the risk compensation hypothesis for safety helmets in alpine skiing and snowboarding. Inj Prev 13: 173-177. https://doi.org/10.1136/ip.2006.014142
    [8] Sulheim S, Holme I, Ekeland A, et al. (2006) Helmet use and risk of head injuries in alpine skiers and snowboarders. JAMA 296: 919-924. https://doi.org/10.1001/jama.295.8.919
    [9] Bianchi G, Brügger O, Niemann S, et al. (2011) Helmet use and self-reported risk taking in skiing and snowboarding. J ASTM Int 18: 32-43. https://doi.org/10.1520/STP49261S
    [10] Ruzic L, Tudor A (2011) Risk-taking behavior in skiing among helmet wearers and nonwearers. Wild Environ Med 22: 291-296. https://doi.org/10.1016/j.wem.2011.09.001
    [11] Thomson CJ, Carlson SR (2015) Increased patterns of risky behaviours among helmet wearers in skiing and snowboarding. Accid Anal Prev 75: 179-183. https://doi.org/10.1016/j.aap.2014.11.024
    [12] Ruedl G, Pocecco E, Sommersacher R, et al. (2010) Factors associated with self reported risk taking behaviour on ski slopes. Br J Sports Med 44: 204-206. https://doi.org/10.1136/bjsm.2009.066779
    [13] Ruedl G, Abart M, Ledochowski L, et al. (2012) Self reported risk taking and risk compensation in skiers and snowboarders are associated with sensation seeking. Acc Anal Prev 48: 292-296. https://doi.org/10.1016/j.aap.2012.01.031
    [14] Ruedl G, Kopp M, Burtscher M (2012) Does risk compensation undo the protection of ski helmet use?. Epidemiology 23: 936-937. https://doi.org/10.1097/EDE.0b013e31826d2403
    [15] Bouter LM, Knipschild PG, Feij JA, et al. (1988) Sensation seeking and injury risk in downhill skiing. Pers Indiv Differ 9: 667-673. https://doi.org/10.1016/0191-8869(88)90164-X
    [16] Goulet C, Regnier G, Valois P, et al. (2000) Injuries and risk taking in alpine skiing. Skiing Trauma and Safety . ASTM International 139-148. https://doi.org/10.1520/STP12872S
    [17] Ruedl G, Burtscher M, Wolf M, et al. (2015) Are self-reported risk-taking behaviour and helmet use associated with injury causes among skiers and snowboarders?. Scan J Med Sci Sports 25: 125-130. https://doi.org/10.1111/sms.12139
    [18] Niedermeier M, Ruedl G, Burtscher M, et al. (2019) Injury-related behavioral variables in alpine skiers, snowboarders and ski tourers – a matched and enlarged re-analysis. Int J Environ Res Public Health 16: 3807. https://doi.org/10.3390/ijerph16203807
    [19] Ruedl G, Posch M, Niedermeier M, et al. (2019) Are risk taking and ski helmet use associated with an ACL injury in recreational alpine skiing?. Int J Environ Res Public Health 16: 3107. https://doi.org/10.3390/ijerph16173107
    [20] Spörri J, Kröll J, Gilgien M, et al. (2016) Sidecut radius and the mechanics of turning-equipment designed to reduce risk of severe traumatic knee injuries in alpine giant slalom ski racing. Br J Sports Med 50: 14-19. https://doi.org/10.1136/bjsports-2015-095737
    [21] Posch M, Ruedl G, Schranz A, et al. (2019) Is ski boot sole abrasion a potential ACL injury risk factor for male and female recreational skiers?. Scand J Med Sci Sports 29: 736-741. https://doi.org/10.1111/sms.13391
    [22] Ruedl G, Posch M, Tecklenburg K, et al. (2022) Impact of ski geometry data and standing height ratio on the ACL injury risk and its use for prevention in recreational skiers. Br J Sports Med . https://doi.org/10.1136/bjsports-2021-105221
    [23] Sulheim S, Ekeland A, Bahr R (2007) Self-estimation of ability among skiers and snowboarders in alpine skiing resorts. Knee Surg Sport Tr A 15: 665-670. https://doi.org/10.1007/s00167-006-0122-x
    [24] Zuckerman M, Eysenck SB, Eysenck HJ (1978) Sensation seeking in England and America: Cross-cultural, age, and sex comparisons. J Consult Clin Psychol 46: 139-149. https://doi.org/10.1037//0022-006X.46.1.139
    [25] Burtscher M, Sommersacher R, Ruedl G, et al. (2009) Potential risk factors for knee injuries in alpine skiers. Skiing Trauma and Safety . ASTM International 1-4. https://doi.org/10.1520/JAI101378
    [26] McCarthy MM, Hannafin JA (2014) The mature athlete: aging tendon and ligament. Sports Health 6: 41-48. https://doi.org/10.1177/1941738113485691
    [27] McLeod M, Breen L, Hamilton DL, et al. (2016) Live strong and prosper: the importance of skeletal muscle strength for healthy ageing. Biogerontology 17: 497-510. https://doi.org/10.1007/s10522-015-9631-7
    [28] Hagel B (2005) Skiing and snowboarding injuries. Med Sport Sci 48: 74-119. https://doi.org/10.1159/000084284
    [29] Sulheim S, Holme I, Rødven A, et al. (2011) Risk factors for injuries in alpine skiing, telemark skiing and snowboarding – case-control study. Br J Sports Med 45: 1303-1309. https://doi.org/10.1136/bjsports-2011-090407
    [30] Wilson SA, Dahl KD, Dunford KM, et al. (2021) Ski boot canting adjustments affect kinematic, kinetic, and postural control measures associated with fall and injury risk. J Sci Med Sport 24: 1015-1020. https://doi.org/10.1016/j.jsams.2020.05.009
    [31] Wascher DC, Markolf KL, Shapiro MS, et al. (1993) Direct in vitro measurement of forces in the cruciate ligaments: Part I: The effect of multiplane loading in the intact knee. J Bone Joint Surg Am 75: 377-386. https://doi.org/10.2106/00004623-199303000-00009
    [32] Böhm H, Senner V (2008) Effect of ski boot settings on tibio-femoral abduction and rotation during standing and simulated skiing. J Biomech 41: 498-505. https://doi.org/10.1016/j.jbiomech.2007.10.019
    [33] Costa-Scorse B, Hopkins WG, Cronin J, et al. (2017) The utility of two national injury databases to evaluate snow-sports injuries in New Zealand. Snow Sports Trauma and Safety . Springer Nature 41-49. https://doi.org/10.1007/978-3-319-52755-0_4
    [34] Brener ND, Billy JOG, Grady WR (2003) Assessment of factors affecting the validity of self-reported health-risk behavior among adolescents: evidence from the scientific literature. J Adolesc Health 33: 436-457. https://doi.org/10.1016/S1054-139X(03)00052-1
    [35] Jack SJ, Ronan KR (1998) Sensation seeking among high- and low-risk sports participants. Pers Individ Dif 25: 1063-1083. https://doi.org/10.1016/S0191-8869(98)00081-6
    [36] Zuckerman M (2007) Sensation seeking and risky behavior. Washington: American Psychological Association. https://doi.org/10.1037/11555-000
  • Reader Comments
  • © 2023 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(2516) PDF downloads(84) Cited by(0)

Figures and Tables

Tables(3)

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog