Theory article

Dynamics analysis of a diffusional immunosuppressive infection model with Beddington-DeAngelis functional response

  • Received: 26 July 2023 Revised: 27 August 2023 Accepted: 04 September 2023 Published: 11 September 2023
  • This paper introduces diffusion into an immunosuppressive infection model with virus stimulation delay and Beddington-DeAngelis functional response. First, we study the stability of positive constant steady state solution and show that the Hopf bifurcation will exist under certain conditions. Second, we derive the normal form of the Hopf bifurcation for the model reduced on the center manifold by using the multiple time scales (MTS) method. Moreover, the direction and stability of the bifurcating periodic solution are investigated. Finally, we present numerical simulations to verify the results of theoretical analysis and provide corresponding biological explanations.

    Citation: Yuan Xue, Jinli Xu, Yuting Ding. Dynamics analysis of a diffusional immunosuppressive infection model with Beddington-DeAngelis functional response[J]. Electronic Research Archive, 2023, 31(10): 6071-6088. doi: 10.3934/era.2023309

    Related Papers:

    [1] Muhammad Amir Asif, Rashad Ismail, Ayesha Razaq, Esmail Hassan Abdullatif Al-Sabri, Muhammad Haris Mateen, Shahbaz Ali . An application on edge irregular reflexive labeling for mt-graph of cycle graph. AIMS Mathematics, 2025, 10(1): 1300-1321. doi: 10.3934/math.2025060
    [2] Mohamed Basher . Edge irregular reflexive labeling for the r-th power of the path. AIMS Mathematics, 2021, 6(10): 10405-10430. doi: 10.3934/math.2021604
    [3] Kooi-Kuan Yoong, Roslan Hasni, Gee-Choon Lau, Muhammad Ahsan Asim, Ali Ahmad . Reflexive edge strength of convex polytopes and corona product of cycle with path. AIMS Mathematics, 2022, 7(7): 11784-11800. doi: 10.3934/math.2022657
    [4] Ibrahim Tarawneh, Roslan Hasni, Ali Ahmad, Muhammad Ahsan Asim . On the edge irregularity strength for some classes of plane graphs. AIMS Mathematics, 2021, 6(3): 2724-2731. doi: 10.3934/math.2021166
    [5] Martin Bača, Muhammad Imran, Zuzana Kimáková, Andrea Semaničová-Feňovčíková . A new generalization of edge-irregular evaluations. AIMS Mathematics, 2023, 8(10): 25249-25261. doi: 10.3934/math.20231287
    [6] Ali N. A. Koam, Ali Ahmad, Martin Bača, Andrea Semaničová-Feňovčíková . Modular edge irregularity strength of graphs. AIMS Mathematics, 2023, 8(1): 1475-1487. doi: 10.3934/math.2023074
    [7] Fatma Salama, Randa M. Abo Elanin . On total edge irregularity strength for some special types of uniform theta snake graphs. AIMS Mathematics, 2021, 6(8): 8127-8148. doi: 10.3934/math.2021471
    [8] Gohar Ali, Martin Bača, Marcela Lascsáková, Andrea Semaničová-Feňovčíková, Ahmad ALoqaily, Nabil Mlaiki . Modular total vertex irregularity strength of graphs. AIMS Mathematics, 2023, 8(4): 7662-7671. doi: 10.3934/math.2023384
    [9] Bakhtawar Shaukat, Muhammad Ishaq, Ahtsham Ul Haq . Algebraic invariants of edge ideals of some circulant graphs. AIMS Mathematics, 2024, 9(1): 868-895. doi: 10.3934/math.2024044
    [10] Sadik Delen, Ismail Naci Cangul . Effect of edge and vertex addition on Albertson and Bell indices. AIMS Mathematics, 2021, 6(1): 925-937. doi: 10.3934/math.2021055
  • This paper introduces diffusion into an immunosuppressive infection model with virus stimulation delay and Beddington-DeAngelis functional response. First, we study the stability of positive constant steady state solution and show that the Hopf bifurcation will exist under certain conditions. Second, we derive the normal form of the Hopf bifurcation for the model reduced on the center manifold by using the multiple time scales (MTS) method. Moreover, the direction and stability of the bifurcating periodic solution are investigated. Finally, we present numerical simulations to verify the results of theoretical analysis and provide corresponding biological explanations.



    Crisp set theory and logic are key factors in the foundation of science and engineering. A crisp set describes the belongingness of an element in a digital manner, i.e., an element either belongs to a set or not. However, in many real-life problems, partial belongingness becomes necessary to describe uncertainty. In most of real-life problems, we have to deal with the situations where crisp set theory fails. For example, if a decision maker (DM) requires to seek a best teacher, sharp student, beautiful girl, young researcher, etc., the selection of such individual is vague. Since the criterion of best, sharp, beautiful, and young vary person to person. To deal with such problems, Zadeh [1] extended crisp set to fuzzy set and laid foundation of fuzzy set theory. A fuzzy set assigns partial grades which lies in unit closed interval [0,1] known as membership degree (MDs) to express the partial belongingness of an element to a set under a specific characteristics. A fuzzy set is strong set-theoretic model to express vague information. Fuzzy set got the attention of the researchers and this is broadly used in many fields like computational intelligence, information fusion, pattern recognition, engineering, medical diagnosis, artificial intelligence, machine learning, neural networks, and MCDM problems.

    Atanassov [2] extended fuzzy set to the notion of intuitionistic fuzzy set (IFS). An IFS is very useful and efficient model which assigns MDs and non-membership degrees (NMDs) to each element in the universe of discourse with the constraint that sum of these grades lies between 0 and 1. Yager [3] introduced Pythagorean fuzzy set (PFS) with the constraint that sum of squares of MDs and NMDs is less or equal to 1. PFS is useful to deal with the uncertain situation where IFS fails to hold. For example, if the sum of MD and NMD is greater than 1 but the sum of their squares is less or equal to 1. This clearly shows that every PFS is an IFS but converse does not hold. Peng and Yang [4] presented some important results for PFSs. Peng et al. [5] proposed Pythagorean fuzzy information measures and their applications in pattern recognition, clustering analysis, and medical diagnosis. Peng and Selvachandran [6] introduced further interesting properties of PFSs. Yager [7] further introduced a strong model named as q-rung orthopair fuzzy set (q-ROFS) which is extension of both PFS and IFS.

    Peng and Liu [8] introduced information measures for q-rung orthopair fuzzy sets. Molodtsov [9] introduced the concept of soft set (SS) which is a parameterized collection of subsets of a classical set. Maji et al. [10] extended IFS to intuitionistic fuzzy soft set (IFSS). Peng et al. [11], and Naeem et al. [12] introduced the idea of Pythagorean fuzzy soft sets (PFSSs) as a hybrid model of PFS and SS. Guleria and Bajaj [13] introduced matrix form of PFSSs and proposed a decision-making algorithm and its application.

    Smarandache [14,15] introduced the idea of neutrosophic set (NS) with three functions, truthness (truth membership) T, indeterminacy I, and falsity (false membership) F. Wang et. al. [16] introduced single-valued neutrosophic set (SVNS) with the constraints that three components, truth membership, indeterminacy, and falsity must lies in the unit closed interval [0,1]. Cuong [17] introduced the concept of picture fuzzy set with three index, a membership grade, hesitancy, and a non-membership grade with the constraint that the sum of these grades is less or equal to 1. Gundogdu and Kahraman [18] further introduced the concept of spherical fuzzy set (SFS). These models have the ability to deal with uncertainties in the real-life problems with the interesting features that if one model fails to hold the other will manage the uncertain situation. A SFS is of great importance as it has the ability to express vague and uncertain information with the condition that the sum of squares of three index, a membership grade, hesitancy, and a non-membership grade, is less than or equal to 1. Ahmmad et al. [19] developed new average aggregation operators based on SFSs and their applications in MCDM.

    Gundogdu and Kahraman [20,21,22] introduced several properties and arithmetic operations of spherical fuzzy sets, TOPSIS method for optimal site selection of electric vehicle charging station by using spherical fuzzy, and hospital performance assessment using interval-valued spherical fuzzy analytic hierarchy process. Gundogdu et al. [23] presented the analysis of usability test parameters affecting the mobile application designs by using spherical fuzzy sets. Shishavan et al. [24] proposed novel similarity measures in spherical fuzzy environment and their applications. Rafiq et al. [25] established new cosine similarity measures of spherical fuzzy sets and their applications in decision-making. Deli and Cagman [26] introduced spherical fuzzy numbers and spherical triangular fuzzy numbers and MCDM applications.

    Garg and Arora [27] proposed extended TOPSIS method based on correlation coefficient for MCDM with IFSS information. Ashraf and Abdullah [28] also independently proposed the idea of spherical fuzzy set. Mahmood et al. [29] introduced some elementary operations on SFSs. Sitara et al. [30] decision-making analysis based on q-rung picture fuzzy graph structures. Akram et al. [31] proposed a hybrid decision-making framework under complex spherical fuzzy prioritized weighted aggregation operators. Recently, Akram et al. [32] introduced Extensions of Dombi aggregation operators with MCDM applications. Riaz and Hashmi [33] introduced a new extension of fuzzy sets named as linear Diophantine fuzzy set (LDFS). Kamaci [34] presented linear Diophantine fuzzy algebraic structures and their application to coding theory. Ayub et al. [35] introduced linear Diophantine fuzzy relations and their algebraic structures with decision making application. Shaheen et al. [36] analyzed risk analysis with generalized hesitant fuzzy rough sets (GHFRS).

    Zhang [37] introduced bipolar fuzzy set (BFS) as an extension of FS. This set is used to deal with the data which is bipolar in nature that describes information and with its counter property. Lee [38] introduced bipolar-valued fuzzy sets and their elementary operations. Chen et al. [39] introduced m-polar fuzzy sets (m-PFS) as an extension of bipolar fuzzy sets. An m-PFS deals with multipolarity by assigning m degrees to each element of a crisp set. Recently, some hybrid structures of m-PFSs have been introduced for modeling uncertainties in multi-criteria decision-making (MCDM) problems. Naeem et al. [40] introduced the notion of Pythagorean m-polar fuzzy set (P-m-PFS) as a hybrid model of PFS and m-PFS. Riaz et al. [41] proposed Pythagorean m-polar fuzzy soft set (P-m-PFSS) as a hybrid model of PFS, m-PFS, and SS.

    Correlation is a property that evaluates the mutual or reciprocal relation between two objects in connection to each other, while similarity measurement tests the proximity of two objects. In engineering and statistics, correlation have significant applications. Statistics have used probability approaches successfully to deal with many real space problems that rely on random data analysis. Similarly, the same probability theory has also tackled several mathematical issues in the scientific fields. These techniques, though, have certain inconveniences, as these procedures are dependent on a random choice of samples with a certain degree of confidence. If we gather data on a vast scale, it involves massive fluidity, which makes it impossible to refine idealism. Highlighting these challenges is how to achieve idealistic performance. A big question? It is very difficult to address this query. The first thing to note is that confusion still takes a position in every real situation, regardless of the technicality, medical or administrative problem. Correlation in statistics is one of our most essential topics of different subjects like business, finance, engineering, management, etc. The dilemma, though, is that this kind of correlation can only address the crisp data and we have resolved several real issues without considering complexity. Many ambiguous structures have been added to deal with uncertainty since the birth of the fuzzy set theory. Many extensions of fuzzy sets have been developed to express vague information until now. Consequently, correlation measures must be introduced in almost all extensions of fuzzy sets. Some correlation measures for IFSs was proposed by Ejegwa et. al. [42], Xu et. al. [43], Gerstenkorn and Manko [44], and Szmidt and Kacprzyk [45]. Later, Garg [46] suggested correlation measures in PFS environment. Liu et. al. [47] and Thao [48] observed the restrictions of the earlier defined correlations and proposed some new directional correlations for PFS environment. Correlation measures studied by Mahmood and Ali [49] to define an extended TOPSIS method based on PFS environment. Zulqarnain et al. [50] defined correlated TOPSIS for mask selection procedure. Joshi [51] defined some weighted correlations for MCDM.

    1.In many real-life problems, we have to deal with the hybrid situations where multi-polarity of each of three index (membership, non-membership and neutral-membership degree) of the alternatives are required but with the help of existing models we can't handle this situations. To deal with this type of problems, we introduce the hybrid structure of m-polar fuzzy set and spherical fuzzy set named as m-polar spherical fuzzy set (m-PSFS). We introduce the idea of m-polar spherical fuzzy numbers (m-PSFNs). These concepts are more efficient to express vague and uncertain information in a realistic manner.

    2.We introduce some basic operational laws of m-PSFSs and m-PSFNs. Based on these operational laws, we analyze certain properties of m-PSFSs and m-PSFNs.

    3.We define the score function and certainty functions for comparison of mPSFNs and for finding the ranking of feasible alternatives.

    4.We introduce new correlation measures and weighted correlation measures for m-PSFSs.

    5.We present a MCDM method based on these correlation measures for medical diagnosis and pattern recognition.

    This article is arranged as follows. In Section 2, we discuss basic concepts of m-PFS and SFS. In Section 3, the notion of m-PSFS is introduced which is a robust fusion of m-PFS and SFS. Some basic operations on m-PSFSs are introduced to analyze key properties of m-PSFSs. We also defined several novel features of m-PSFSs. In Section 4, the correlation measures and weighted correlation measures for m-PSFSs are proposed. The proposed correlation measures have their value in the interval [1,1]. In Section 5, we give applications of proposed correlation measures for m-PSFSs to pattern recognition and medical diagnosis. Lastly, the conclusion od current research work is summarized in Section 6.

    In this section, we review some preliminaries like spherical fuzzy set and m-polar fuzzy set that are necessary to understand many novel concepts in this manuscript.

    Definition 2.1. Let X be the universe (set of objects or alternatives). A spherical fuzzy set (SFS) T on X having three index of membership degrees μ, indeterminacy π, and non-membership degree ν, which lies in the unit closed interval [0,1] for each object ςX, can be expressed as

    T={<ς,(μ(ς),π(ς),ν(ς))>:ςX}

    satisfying the restriction

    0μ2(ς)+π2(ς)+ν2(ς)1

    ςX. For the fixed ς, the triplet (μ,π,ν) is called spherical fuzzy number.

    Definition 2.2. For any arbitrary cardinal number m, an m-polar fuzzy set (m-PFS) on X is characterized by the mapping Υ:X[0,1]m. An m-PFS can be expressed as

    M={<ς,(μ1(ς),,μm(ς))>:ςX}

    where 0μi(ς)1, for all i=1,,m.

    In this section, first we introduce the notion of m-PSFS which is a robust fusion of m-PFS and SFS. Then we define some fundamental operations on m-PSFSs and their related key properties. Several novel features of m-PSFSs are also investigated.

    Definition 3.1. An m-PSFSs S defined on X is characterized by the mappings μ(j):X[0,1] (known as membership function), π(j):X[0,1] (known as hesitant function) and ν(j)):X[0,1] (known as non-membership function), respectively with the restriction that sum of their squared values should not exceed unity, i.e.,

    0(μj(ς))2+(πj(ς))2+(νj(ς))21

    for j = 1, 2, 3, ..., m.

    Mathematically, An m-PSFS can be written as

    S={(μ(1)(ς),π(1)(ς),ν(1)(ς)),,(μ(m)(ς),π(m)(ς),ν(m)(ς)):ςX}={ς,(μ(j)(ς),π(j)(ς),ν(j)(ς))mj=1:ςX}

    and refusal degree is R=1(μ(j)(ς))2(π(j)(ς))2(ν(j)(ς))2, for j = 1, 2, 3, ..., m

    For a fixed ς, an m-polar spherical fuzzy number (m-PSFN) can be written as

    N=(μ(1),π(1),ν(1)),,(μ(m),π(m),ν(m))=(μ(j),π(j),ν(j))mj=1

    If the cardinality of X is k, then the tabular representation of m-PSFS is given by Table 1:

    Table 1.  m-polar spherical fuzzy set.
    S mPSFSs
    ς1 (μ(1)(ς1),π(1)(ς1),ν(1)(ς1))(μ(2)(ς1),π(2)(ς1),ν(2)(ς1))(μ(m)(ς1),π(m)(ς1),ν(m)(ς1))
    ς2 (μ(1)(ς2),π(1)(ς2),ν(1)(ς2))(μ(2)(ς2),π(2)(ς2),ν(2)(ς2))(μ(m)(ς2),π(m)(ς2),ν(m)(ς2))
    ςk (μ(1)(ςk),π(1)(ςk),ν(1)(ςk))(μ(2)(ςk),π(2)(ςk),ν(2)(ςk))(μ(m)(ςk),π(m)(ςk),ν(m)(ςk))

     | Show Table
    DownLoad: CSV

    and m-polar spherical fuzzy set(m-PSFS) can be represented in matrix form as

    S=((μ(1)(ς1),π(1)(ς1),ν(1)(ς1))(μ(2)(ς1),π(2)(ς1),ν(2)(ς1))(μ(m)(ς1),π(m)(ς1),ν(m)(ς1))(μ(1)(ς2),π(1)(ς2),ν(1)(ς2))(μ(2)(ς2),π(2)(ς2),ν(2)(ς2))(μ(m)(ς2),π(m)(ς2),ν(m)(ς2))              (μ(1)(ςk),π(1)(ςk),ν(1)(ςk))(μ(2)(ςk),π(2)(ςk),ν(2)(ςk))(μ(m)(ςk),π(m)(ςk),ν(m)(ςk)))

    The collection of all m-PSFSs on X is denoted by mPSFS(X).

    Definition 3.2. An m-PSFS is said to be an empty or null m-PSFS if

    μ(j)(ς)=0, π(j)(ς)=0 and ν(j)(ς)=1 for all j = 1, 2, 3, ..m. It is denoted as ˜Φ and scripted as

    ˜Φ={ς,((0,0,1),(0,0,1),...,(0,0,1)):ςX}

    Its matrix representation is

    ˜Φ=[(0,0,1)(0,0,1)(0,0,1)(0,0,1)(0,0,1)(0,0,1)(0,0,1)(0,0,1)(0,0,1)]

    Definition 3.3. An m-PSFS is said to be absolute m-PSFS, if

    μ(j)(ς)=1, π(j)(ς)=0 and ν(j)(ς)=0 for all j = 1, 2, 3, ..m. It is denoted as ˜X and scripted as

    ˜X={ς,((1,0,0),(1,0,0),...,(1,0,0)):ςX}

    Its matrix representation is

    ˜X=[(1,0,0)(1,0,0)(1,0,0)(1,0,0)(1,0,0)(1,0,0)(1,0,0)(1,0,0)(1,0,0)]

    Definition 3.4. Let S1 and S2 be two m-PSFSs. Then S1 is subset of S2 written as S1S2 if μ(j)1(ς)μ(j)2(ς),π(j)1(ς)π(j)2(ς) and ν(j)1(ς)ν(j)2(ς) for all ςX and for j=1,2,3,,m.

    Two sets S1 and S2 are said to be equal if S1S2 and S2S1.

    Definition 3.5. The complement of m-PSFS

    S={ς,(μ(j)(ς),π(j)(ς),ν(j)(ς))mj=1:ςX}

    is defined as

    Sc={ς,(ν(j)(ς),π(j)(ς),μ(j)(ς))mj=1:ςX}

    It is interesting to note that information given by hesitancy part of m-PSFS is uncertain. It does not give exact information as given by membership and non-membership grades. Thus the h-complement of m-PSFS is denoted as C and defined as

    Sc={ς,(ν(j)(ς),1(π(j)(ς))2,μ(j)(ς))mj=1:ςX}

    Notice that (Sc)c=S, ˜Φc=˜X and ˜Xc=˜Φ.

    Definition 3.6. The union of two m-PSFSs S1 and S2 defined over the same universal set X is defined as

    S1S2={ς,(max(μ(j)1(ς),μ(j)2(ς)),min(π(j)1(ς),π(j)2(ς)),min(ν(j)1(ς),ν(j)2(ς)))mj=1:ςX}.

    Definition 3.7. The intersection of two m-PSFSs S1 and S2 defined over the same universal set X can be defined as

    S1S2={ς,(min(μ(j)1(ς),μ(j)2(ς)),min(π(j)1(ς),π(j)2(ς)),max(ν(j)1(ς),ν(j)2(ς)))mj=1:ςX}.

    Definition 3.8. The difference of two m-PSFSs S1 and S2 defined over the same universal set X is defined as

    S1/S2={ς,(min(ν(j)1(ς),μ(j)2(ς)),min(π(j)1(ς),π(j)2(ς)),max(μ(j)1(ς),ν(j)2(ς)))mj=1:ςX}.

    Definition 3.9. let S1 and S2 are m-PSFSs over X. Then some new operations are as follows.

    1.S1S2={ς,(((μ(j)1(ς))2+(μ(j)2(ς))2(μ(j)1(ς))2(μ(j)2(ς))2))1/2,((1(μ(j)2(ς))2)(π(j)1(ς))2+(1(μ(j)1(ς))2)(π(j)2(ς))2(π(j)1(ς))2(π(j)2(ς))2)1/2,ν(j)1(ς)ν(j)2(ς))mj=1:ςX}

    2.S1S2={ς,(μ(j)1(ς)μ(j)2(ς),((1(ν(j)2(ς))2)(π(j)1(ς))2+(1(ν(j)1(ς))2)(π(j)2(ς))2(π(j)1(ς))2(π(j)2(ς))2)1/2,((ν(j)1(ς))2+(ν(j)2(ς))2(ν(j)1(ς))2(ν(j)2(ς))2)1/2)mj=1:ςX}

    3.λS={ς,((1(1(μ(j)(ς))2)λ)1/2,((1μ(j)(ς))2)λ(1(μ(j)(ς))2(π(j)(ς))2)λ)1/2,(ν(j)(ς))λ)mj=1:ςX},λ>0

    4.Sλ={ς,((μ(j)(ς))λ,((1(ν(j)(ς))2)λ(1(ν(j)(ς))2(π(j)(ς))2)λ)1/2,(1(1(ν(j)(ς))2)λ)1/2)mj=1:ςX},λ>0

    Some novel features of m-polar spherical fuzzy set

    Theorem 3.10. Let S=(μ(j)s,π(j)s,ν(j)s)mj=1, S1=(μ(j)1,π(j)1,ν(j)1)mj=1 S2=(μ(j)2,π(j)2,ν(j)2)mj=1

    and T=(μ(j)T,π(j)T,ν(j)T)mj=1 be m-PSFNs. Then

    1.If SS1 and SS2 then SS1S2.

    2.If S1S and S2S then S1S2S.

    3.If S1S and S2T then S1S2ST.

    4.If S1S and S2T then S1S2ST.

    Proof. In the following, we shall prove (1) and (3) and (2) and (4) can be proved similar.

    (1) If SS1 and SS2, then by definition

    μ(j)Sμ(j)1,π(j)Sπ(j)1,ν(j)Sν(j)1  forallj. (3.1)
    μ(j)Sμ(j)2,π(j)Sπ(j)2,ν(j)Sν(j)2  forallj. (3.2)

    Suppose

    min{μ(j)1,μ(j)2}=μ(j)1,min{π(j)1,π(j)2}=π(j)1  and  max{ν(j)1,ν(j)2}=ν(j)2

    then

    S1S2=(min{μ(j)1,μ(j)2},min{π(j)1,π(j)2},max{ν(j)1,ν(j)2})mj=1=(μ(j)1,π(j)1,ν(j)2)mj=1

    Clearly from equations (3.1) and (3.2) μ(j)Sμ(j)1,π(j)Sπ(j)1 and ν(j)Sν(j)2. This Shows that SS1S2.

    The rest of 7 cases may be discussed similarly.

    (3). If S1S and S2T, then by definition

    μ(j)1μ(j)S,π(j)1π(j)S,ν(j)1ν(j)S  forallj. (3.3)
    μ(j)2μ(j)T,π(j)2π(j)T,ν(j)2ν(j)T  forallj. (3.4)

    Suppose

    max{μ(j)1,μ(j)2}=μ(j)2,min{π(j)1,π(j)2}=π(j)1  and  min{ν(j)1,ν(j)2}=ν(j)1

    and

    min{μ(j)S,μ(j)T}=μ(j)T,min{π(j)S,π(j)T}=π(j)S  and  max{ν(j)S,ν(j)T}=ν(j)S

    then

    S1S2=(max{μ(j)1,μ(j)2},min{π(j)1,π(j)2},min{ν(j)1,ν(j)2})mj=1=(μ(j)2,π(j)1,ν(j)1)mj=1

    ST=(max{μ(j)S,μ(j)T},min{π(j)S,π(j)T},min{ν(j)S,ν(j)T})mj=1=(μ(j)T,π(j)S,ν(j)S)mj=1

    Clearly from equations (3.3) and (3.4)

    μ(j)2μ(j)T,π(j)1π(j)S,ν(j)1ν(j)S  forallj.

    This shows that S1S2ST.

    The rest of 7 cases may be discussed similarly.

    Theorem 3.11. Let S1=(μ(j)1,π(j)1,ν(j)1)mj=1 and S2=(μ(j)2,π(j)2,ν(j)2)mj=1 be two m-PSFNs and λ>0, then

    1.S1S2(S2)c(S1)c

    2.S1=S2(S2)c=(S1)c

    3.S1=S2(S2)c=(S1)c

    4.S1S2λ(S1)λ(S2)

    5.S1=S2λ(S1)=λ(S2)

    Proof. The proof is obvious.

    Theorem 3.12. Let S=(μ(j),π(j),ν(j))mj=1 and λ>0, then following results hold

    1.(Sλ)c=λ(Sc)

    2.(λ(Sc))c=(S)λ

    3.(λS)c=(Sc)λ

    Proof. (1) By definition,

    (Sλ)c=((μ(j))λ,(1(ν(j))2)λ(1(ν(j))2(π(j))2)λ,1(1(ν(j))2)λ)cmj=1=(1(1(ν(j))2)λ,,(1(ν(j))2)λ(1(ν(j))2(π(j))2)λ,(μ(j))λ)mj=1=λ(μ(j),π(j),ν(j))mj=1=λ(Sc)

    (2) By definition,

    (λ(Sc))c=(λ(μ(j),π(j),ν(j))cmj=1)c=(λ(ν(j),π(j),μ(j))mj=1)c=(1(1(ν(j))2)λ,,(1(ν(j))2)λ(1(ν(j))2(π(j))2)λ,(μ(j))λ)cmj=1=((μ(j))λ,(1(ν(j))2)λ(1(ν(j))2(π(j))2)λ,1(1(ν(j))2)λ)mj=1=Sλ

    (3) By definition,

    (λS)c=(λ(μ(j),π(j),ν(j))mj=1)c=((1(1(μ(j))2)λ,(1(μ(j))2)λ(1(μ(j))2(π(j))2)λ,(ν(j))λ)mj=1)c=((ν(j))λ,(1(μ(j))2)λ(1(μ(j))2(π(j))2)λ,1(1(μ(j))2)λ)mj=1=((μ(j),π(j),ν(j))cmj=1)λ=(Sc)λ

    Theorem 3.13. Let S1=(μ(j)1,π(j)1,ν(j)1)mj=1, S2=(μ(j)2,π(j)2,ν(j)2)mj=1 and λ>0, then

    1.λ(S1S2)=λS1λS2

    2.(S1S2)λ=Sλ1Sλ2

    Proof. Here, we shall prove (1) and (2) can be proved analogously.

    Suppose the first possibility

    max{μ(j)1,μ(j)2}=μ(j)2,min{π(j)1,π(j)2}=π(j)1  and  min{ν(j)1,ν(j)2}=ν(j)1

    (1) λS1λS2=λ(μ(j)1,π(j)1,ν(j)1)mj=1  λ(μ(j)2,π(j)2,ν(j)2)mj=1

    =(1(1(μ(j)1)2)λ,(1(μ(j)1)2)λ(1(μ(j)1)2(π(j)1)2)λ,(ν(j)1)λ)mj=1    (1(1(μ(j)2)2)λ,(1(μ(j)2)2)λ(1(μ(j)2)2(π(j)2)2)λ,(ν(j)2)λ)mj=1

    =max{1(1(μ(j)1)2)λ,1(1(μ(j)2)2)λ},min{(1(μ(j)1)2)λ(1(μ(j)1)2(π(j)1)2)λ,(1(μ(j)2)2)λ(1(μ(j)2)2(π(j)2)2)λ},min{(ν(j)2)λ,(ν(j)2)λ}mj=1

    =1(1max{(μ(j)1)2,(μ(j)2)2)}λ,(1min{(μ(j)1)2),(μ(j)2)2}(1min{(μ(j)1)2),(μ(j)2)2)}min{(π(j)1)2),(π(j)2)2)})λ,min{(ν(j)2)λ,(ν(j)2)λ}mj=1

    = λmax{μ1,μ2},min{π1,π2},min{ν1,ν2}

    = λ(S1S2)

    The rest of 7 possibilities may be discussed similarly.

    Theorem 3.14. Let S1=(μ(j)1,π(j)1,ν(j)1)mj=1, S2=(μ(j)2,π(j)2,ν(j)2)mj=1 and λ>0, then

    1. λ(S1S2)=(((S1S2)c)λ)c

    2. λ(S1S2)=(((S1S2)c)λ)c

    3. λ(S1S2)=λ(S1)λ(S2)

    4. (S1S2)λ=Sλ1Sλ2

    5. λ(S1)λ(S2)=(((S1)c)λ((S2)c)λ)c

    Proof. (1) (((S1S2)c)λ)c=(((((μ(j)1)2+(μ(j)2)2(μ(j)1)2(μ(j)2)2)1/2,(1(μ(j)2)2)(π(j)1)2+(1(μ(j)1)2)(π(j)2)2(π(j)1)2(π(j)2)2)1/2,(ν(j)1)(ν(j)2)mj=1)c)λ)c=(((ν(j)1)(ν(j)2),((1(μ(j)2)2)(π(j)1)2+(1(μ(j)1)2)(π(j)2)2(π(j)1)2(π(j)2)2)1/2,((μ(j)1)2+(μ(j)2)2(μ(j)1)2(μ(j)2)2)1/2mj=1)λ)c=((ν(j)1)λ(ν(j)2)λ,((1((μ(j)1)2+(μ(j)2)2(μ(j)1)2(μ(j)2)2))λ((1((μ(j)1)2+(μ(j)2)2(μ(j)1)2(μ(j)2)2))(1(μ(j)2)2)(π(j)1)2+(1(μ(j)1)2)(π(j)2)2(π(j)1)2(π(j)2)2)))1/2,(1(1((μ(j)1)2+(μ(j)2)2(μ(j)1)2(μ(j)2)2))λ)1/2mj=1)c=(1(1((μ(j)1)2+(μ(j)2)2(μ(j)1)2(μ(j)2)2))λ)1/2,((1((μ(j)1)2+(μ(j)2)2(μ(j)1)2(μ(j)2)2))λ((1((μ(j)1)2+(μ(j)2)2(μ(j)1)2(μ(j)2)2))(1(μ(j)2)2)(π(j)1)2+(1(μ(j)1)2)(π(j)2)2(π(j)1)2(π(j)2)2)))1/2,(ν(j)1)λ(ν(j)2)λmj=1=λ((μ(j)1)2+(μ(j)2)2(μ(j)1)2(μ(j)2)2)1/2,(1(μ(j)2)2)(π(j)1)2+(1(μ(j)1)2)(π(j)2)2(π(j)1)2(π(j)2)2)1/2,(ν(j)1)(ν(j)2)mj=1=λ(S1S2)

    Thus (2) can be proved analogously.

    (3) By definition

    λ(S1)=(1(1(μ(j)1)2)λ,(1(μ(j)1)2)λ(1(μ(j)1)2(π(j)1)2)λ,(ν(j)1)λ)mj=1

    and

    λ(S2)=(1(1(μ(j)2)2)λ,(1(μ(j)2)2)λ(1(μ(j)2)2(π(j)2)2)λ,(ν(j)2)λ)mj=1.

    λ(S1)λ(S2)=((1(1(μ(j)1)2)λ)+(1(1(μ(j)2)2)λ)(1(1(μ(j)1)2)λ)(1(1(μ(j)2)2)λ))1/2,((1(1(μ(j)2)2)λ)((1(μ(j)1)2)λ(1(μ(j)1)2(π(j)1)2)λ)+(1(1(μ(j)1)2)λ)((1(μ(j)2)2)λ(1(μ(j)2)2(π(j)2)2)λ)(1(1(μ(j)2)2)λ)((1(μ(j)1)2)λ(1(μ(j)1)2(π(j)1)2)λ)(1(1(μ(j)1)2)λ)((1(μ(j)2)2)λ(1(μ(j)2)2(π(j)2)2)λ))1/2,(ν(j)1)λ(ν(j)2)λmj=1=(2(1(μ(j)1)2)λ(1(μ(j)2)2)λ1+(1(μ(j)1)2)λ+(1(μ(j)2)2)λ(1(μ(j)1)2)λ(1(μ(j)2)2)λ)1/2,((1(μ(j)2)2)λ(1(μ(j)1)2)λ(1(μ(j)2)2)λ(1(μ(j)1)2(π(j)1)2)λ+(1(μ(j)1)2)λ(1(μ(j)2)2)λ(1(μ(j)1)2)λ(1(μ(j)2)2(π(j)2)2)λ(1(μ(j)1)2)λ(1(μ(j)2)2)λ+(1(μ(j)1)2)λ(1(μ(j)2)2(π(j)2)2)λ+(1(μ(j)2)2)λ(1(μ(j)1)2(π(j)1)2)λ(1(μ(j)1)2(π(j)1)2)λ(1(μ(j)2)2(π(j)2)2)λ)1/2,(ν(j)1)λ(ν(j)2)λmj=1=(1(1((μ(j)1)2+(μ(j)2)2(μ(j)1)2(μ(j)2)2))λ)1/2,((1((μ(j)1)2+(μ(j)2)2(μ(j)1)2(μ(j)2)2))λ((1((μ(j)1)2+(μ(j)2)2(μ(j)1)2(μ(j)2)2))(1(μ(j)2)2)(π(j)1)2+(1(μ(j)1)2)(π(j)2)2(π(j)1)2(π(j)2)2)))1/2,(ν(j)1)λ(ν(j)2)λmj=1=λ((μ(j)1)2+(μ(j)2)2(μ(j)1)2(μ(j)2)2)1/2,(1(μ(j)2)2)(π(j)1)2+(1(μ(j)1)2)(π(j)2)2(π(j)1)2(π(j)2)2)1/2,(ν(j)1)(ν(j)2)mj=1=λ(S1S2)

    Thus (4) can be proved analogously.

    (5) (((S1)c)λ((S2)c)λ)c=(((ν(j)1,π(j)1,μ(j)1)mj=1)λ((ν(j)1,π(j)1,μ(j)1)mj=1)λ)c=(((ν(j)1)λ,((1(μ(j)1)2)λ(1(μ(j)1)2π(j)1)2)λ)1/2,(1(1(μ(j)1)2)λ)1/2)((ν(j)2)λ,((1(μ(j)2)2)λ(1(μ(j)2)2π(j)2)2)λ)1/2,(1(1(μ(j)2)2)λ)1/2)mj=1)c=((((ν(j)1)2+(ν(j)2)2(ν(j)1)2(ν(j)2)2)λ)1/2,((1(ν(j)2)2)λ)((1(μ(j)1)2)λ(1(μ(j)1)2(π(j)1)2)λ)+(1(ν(j)1)2)λ)((1(μ(j)2)2)λ(1(μ(j)2)2(π(j)2)2)λ((1(μ(j)1)2)λ(1(μ(j)1)2(π(j)1)2)λ((1(μ(j)2)2)λ(1(μ(j)2)2(π(j)2)2)λ))1/2,(1(1(μ(j)1)2)λ)1/2(1(1(μ(j)2)2)λ)1/2mj=1)c=((((ν(j)1)2+(ν(j)2)2(ν(j)1)2(ν(j)2)2)λ)1/2,(1(ν(j)2)2)λ)(1(μ(j)1)2)λ(1(ν(j)2)2)λ)(1(μ(j)1)2(π(j)1)2)λ)+(1(ν(j)1)2)λ)(1(μ(j)2)2)λ(1(ν(j)1)2)λ)(1(μ(j)2)2(π(j)2)2)λ)(1(ν(j)1)2)λ)(1(μ(j)2)2)λ)+(1(μ(j)1)2)λ)(1(μ(j)2)2(π(j)2)2)λ+(1(μ(j)2)2)λ)(1(μ(j)1)2(π(j)1)2)λ+(1(μ(j)1)2(π(j)1)2)λ(1(μ(j)2)2(π(j)2)2)λ,(1(1(μ(j)2)2)λ)(1(μ(j)1)2)λ)+(1(μ(j)1)2)λ)(1(μ(j)2)2)λ))mj=1)c=(1(1(μ(j)2)2)λ)(1(μ(j)1)2)λ)+(1(μ(j)1)2)λ)(1(μ(j)2)2)λ)),(1(ν(j)2)2)λ)(1(μ(j)1)2)λ(1(ν(j)2)2)λ)(1(μ(j)1)2(π(j)1)2)λ)+(1(ν(j)1)2)λ)(1(μ(j)2)2)λ(1(ν(j)1)2)λ)(1(μ(j)2)2(π(j)2)2)λ)(1(ν(j)1)2)λ)(1(μ(j)2)2)λ)+(1(μ(j)1)2)λ)(1(μ(j)2)2(π(j)2)2)λ+(1(μ(j)2)2)λ)(1(μ(j)1)2(π(j)1)2)λ+(1(μ(j)1)2(π(j)1)2)λ(1(μ(j)2)2(π(j)2)2)λ,(((ν(j)1)2+(ν(j)2)2(ν(j)1)2(ν(j)2)2)λ)1/2mj=1=(1(1(μ(j)1)2)λ)1/2,((1(μ(j)1)2)λ(1(μ(j)1)2π(j)1)2)λ)1/2,(ν(j)1)λmj=1(1(1(μ(j)2)2)λ)1/2,((1(μ(j)2)2)λ(1(μ(j)2)2π(j)2)2)λ)1/2,(ν(j)2)λmj=1=λ(S1)λ(S1)

    Theorem 3.15. let S1=(μ(j)1,π(j)1,ν(j)1)mj=1, S2=(μ(j)2,π(j)2,ν(j)2)mj=1 and S3=(μ(j)3,π(j)3,ν(j)3)mj=1, then

    1.(S1S2)S2=S2

    2. (S1S2)S2=S2

    3. S1S2S3=S1S3S2

    4. S1S2S3=S1S3S2

    Proof. The proof is obvious.

    Theorem 3.16. Let S1=(μ(j)1,π(j)1,ν(j)1)mj=1, S2=(μ(j)2,π(j)2,ν(j)2)mj=1 and S3=(μ(j)3,π(j)3,ν(j)3)mj=1, then

    1.(S1S2)S3=(S1S3)(S2S3)

    2. (S1S2)S3=(S1S3)(S2S3)

    3. (S1S2)S3=(S1S3)(S2S3)

    4. (S1S2)S3=(S1S3)(S2S3)

    Proof. Suppose the first possibility

    max{μ(j)1,μ(j)2}=μ(j)2,max{μ(j)1,μ(j)3}=μ(j)3,max{μ(j)2,μ(j)3}=μ(j)3
    min{π(j)1,π(j)2}=π(j)1,min{π(j)1,π(j)3}=π(j)1,min{π(j)2,π(j)3}=π(j)2
    min{ν(j)1,ν(j)2}=ν(j)1,min{ν(j)1,ν(j)3}=ν(j)1,min{ν(j)2,ν(j)3}=ν(j)2

    (1)

    (S1S3)(S2S3)=((μ(j)1)2+(μ(j)3)2(μ(j)1)2(μ(j)3)2)1/2,(1(μ(j)3)2)(π(j)1)2+(1(μ(j)1)2)(π(j)3)2(π(j)1)2(π(j)3)2)1/2,(v(j)1)(v(j)3)mj=1)(((μ(j)2)2+(μ(j)3)2(μ(j)2)2(μ(j)3)2)1/2,(1(μ(j)3)2)(π(j)2)2+(1(μ(j)2)2)(π(j)3)2(π(j)2)2(π(j)3)2)1/2,(v(j)2)(v(j)3)mj=1)=max{((μ(j)1)2+(μ(j)3)2(μ(j)1)2(μ(j)3)2)1/2,((μ(j)2)2+(μ(j)3)2(μ(j)2)2(μ(j)3)2)1/2},min{(1(μ(j)3)2)(π(j)1)2+(1(μ(j)1)2)(π(j)3)2(π(j)1)2(π(j)3)2)1/2,(1(μ(j)3)2)(π(j)2)2+(1(μ(j)2)2)(π(j)3)2(π(j)2)2(π(j)3)2)1/2},min{(v(j)1)(v(j)3),(v(j)2)(v(j)3)}mj=1=(μ(j)2)2+(μ(j)3)2(μ(j)2)2(μ(j)3)2)1/2,(1(μ(j)3)2)(π(j)1)2+(1(μ(j)2)2)(π(j)3)2(π(j)1)2(π(j)3)2)1/2,(v(j)1)(v(j)3)mj=1=(μ(j)2,π(j)1,v(j)1)mj=1(μ(j)3,π(j)3,v(j)3)mj=1=max{μ(j)1,μ(j)2},min{π(j)1,π(j)2},min{ν(j)1,ν(j)2}mj=1(μ(j)3,π(j)3,ν(j)3)mj=1=(S1S2)S3

    The rest of possibilities may be considered accordingly.

    (3)

    (S1S3)(S2S3)=((μ(j)1)(μ(j)3),(1(ν(j)3)2)(π(j)1)2+(1(ν(j)1)2)(π(j)3)2(π(j)1)2(π(j)3)2)1/2,((ν(j)1)2+(ν(j)3)2(ν(j)1)2(ν(j)3)2)1/2mj=1)((μ(j)2)(μ(j)3),(1(ν(j)3)2)(π(j)2)2+(1(ν(j)2)2)(π(j)3)2(π(j)2)2(π(j)3)2)1/2,((ν(j)2)2+(ν(j)3)2(ν(j)2)2(ν(j)3)2)1/2mj=1)=max{(μ(j)1)(μ(j)3),(μ(j)2)(μ(j)3)},min{(1(ν(j)3)2)(π(j)1)2+(1(ν(j)1)2)(π(j)3)2(π(j)1)2(π(j)3)2)1/2,(1(ν(j)3)2)(π(j)2)2+(1(ν(j)2)2)(π(j)3)2(π(j)2)2(π(j)3)2)1/2,},min{((ν(j)1)2+(ν(j)3)2(ν(j)1)2(ν(j)3)2)1/2,((ν(j)2)2+(ν(j)3)2(ν(j)2)2(ν(j)3)2)1/2}mj=1=(μ(j)2)(μ(j)3),(1(ν(j)3)2)(π(j)1)2+(1(ν(j)1)2)(π(j)3)2(π(j)1)2(π(j)3)2)1/2,((ν(j)1)2+(ν(j)3)2(ν(j)1)2(ν(j)3)2)1/2mj=1=max{μ(j)1,μ(j)2},min{π(j)1,π(j)2},min{ν(j)1,ν(j)2}mj=1(μ(j)3,π(j)3,ν(j)3)mj=1=(S1S2)S3

    The rest of possibilities may be considered accordingly.

    The correlation coefficient is a statistical analysis of how strong an association exists between two variables' variations. The scope of values is -1.0 to 1.0. There was an error in the correlation calculation if the computed number was greater than 1.0 or less than -1.0. A negative correlation of -1.0 indicates a complete negative correlation, while a positive correlation of 1.0 indicates a complete positive correlation. A correlation of 0.0 means that the changes of the two variables have no linear relationship. In this section, we define correlation coefficient in m-PSFSs. We analyze their usefulness and address some of their characteristics.

    Definition 4.1. Let S={ς,(μ(j)(ς),π(j)(ς),ν(j)(ς))mj=1:ςX} be a m-PSFS over a universal set X. Then the average or mean of S is defined as

    ¯S={(¯μ(j),¯π(j),¯ν(j))mj=1}
    ={(1|X|ςμ(j)(ς),1|X|ςπ(j)(ς),1|X|ςν(j)(ς))mj=1}

    If we take X = {ς1,ς2,ς3,ς4,ς5} and 3PSFSs as

    S=((μ(1)(ς1),π(1)(ς1),ν(1)(ς1))(μ(2)(ς1),π(2)(ς1),ν(2)(ς1))(μ(3)(ς1),π(3)(ς1),ν(3)(ς1))(μ(1)(ς2),π(1)(ς2),ν(1)(ς2))(μ(2)(ς2),π(2)(ς2),ν(2)(ς2))(μ(3)(ς2),π(3)(ς2),ν(3)(ς2))(μ(1)(ς3),π(1)(ς3),ν(1)(ς3))(μ(2)(ς3),π(2)(ς3),ν(2)(ς3))(μ(3)(ς3),π(3)(ς3),ν(3)(ς3))(μ(1)(ς4),π(1)(ς4),ν(1)(ς4))(μ(2)(ς4),π(2)(ς4),ν(2)(ς4))(μ(3)(ς4),π(3)(ς4),ν(3)(ς4))(μ(1)(ς5),π(1)(ς5),ν(1)(ς5))(μ(2)(ς5),π(2)(ς5),ν(2)(ς5))(μ(3)(ς5),π(3)(ς5),ν(3)(ς5)))

    then the average or mean of S is given by

    ¯S=((¯μ(1),¯π(1),¯ν(1)),(¯μ(2),¯π(2),¯ν(2)),(¯μ(3),¯π(3),¯ν(3)))

    , where

    ¯μ(1)=155i=1μ(1)(ςi),¯π(1)=155i=1π(1)(ςi),¯ν(1)=155i=1ν(1)(ςi)¯μ(2)=155i=1μ(2)(ςi),¯π(2)=155i=1π(2)(ςi),¯ν(2)=155i=1ν(2)(ςi)¯μ(3)=155i=1μ(3)(ςi),¯π(3)=155i=1π(3)(ςi),¯ν(3)=155i=1ν(3)(ςi)

    Definition 4.2. Let

    SA=((μ(1)A(ς1),π(1)A(ς1),ν(1)A(ς1))(μ(2)A(ς1),π(2)A(ς1),ν(2)A(ς1))(μ(m)A(ς1),π(m)A(ς1),ν(m)A(ς1))(μ(1)A(ς2),π(1)A(ς2),ν(1)A(ς2))(μ(2)A(ς2),π(2)A(ς2),ν(2)A(ς2))(μ(m)A(ς2),π(m)A(ς2),ν(m)A(ς2))(μ(1)A(ςk),π(1)A(ςk),ν(1)A(ςk))(μ(2)A(ςk),π(2)A(ςk),ν(2)A(ςk))(μ(m)A(ςk),π(m)A(ςk),ν(m)A(ςk)))

    and

    SB=((μ(1)B(ς1),π(1)B(ς1),ν(1)B(ς1))(μ(2)B(ς1),π(2)B(ς1),ν(2)B(ς1))(μ(m)B(ς1),π(m)B(ς1),ν(m)B(ς1))(μ(1)B(ς2),π(1)B(ς2),ν(1)B(ς2))(μ(2)B(ς2),π(2)B(ς2),ν(2)B(ς2))(μ(m)B(ς2),π(m)B(ς2),ν(m)B(ς2))(μ(1)B(ςk),π(1)B(ςk),ν(1)B(ςk))(μ(2)B(ςk),π(2)B(ςk),ν(2)B(ςk))(μ(m)B(ςk),π(m)B(ςk),ν(m)B(ςk)))

    be m-PSFSs over X. Then covariance of SA and SB can be defined as

    I(SASB)=13mmj=1(I(j)μ(SASB)+I(j)π(SASB)+I(j)ν(SASB))

    Where,

    I(j)μ(SASB)=ki=1(μ(j)A  (ςi)¯μ(j)A  )(μ(j)B  (ςi)¯μ(j)B  ),
    I(j)π(SASB)=ki=1(π(j)A  (ςi)¯π(j)A  )(π(j)B  (ςi)¯π(j)B  ),
    I(j)ν(SASB)=ki=1(ν(j)A  (ςi)¯ν(j)A  )(ν(j)B  (ςi)¯ν(j)B  )

    for j = 1, 2, 3, ..., m.

    Definition 4.3. Let SA be a m-PSFS on X as mentioned in definition 4.2. Then Variance of SA can be defined as

    V(SA)=13mmj=1(V(j)μ(SA)+V(j)π(SA)+V(j)ν(SA))

    Where,

    V(j)μ(SA)=ki=1(μ(j)A  (ςi)¯μ(j)A  )2,
    V(j)π(SA)=ki=1(π(j)A  (ςi)¯π(j)A  )2,
    V(j)ν(SA)=ki=1(ν(j)A  (ςi)¯ν(j)A  )2

    for j = 1, 2, 3, ..., m.

    Proposition 4.4. The covariance and variance for m-PSFSs of SA and SB follow the following properties.

    (a) I(j)μ(SASA)=V(j)μ(SA), I(j)π(SASA)=V(j)π(SA), I(j)ν(SASA)=V(j)ν(SA)

    (b) I(j)μ(SASB )=I(j)μ(SBSA), I(j)π(SASB )=I(j)π(SBSA), I(j)ν(SASB )=I(j)ν(SBSA)

    (c) I(j)μ(SASB )∣≤V(j)μ(SA)V(j)μ(SB), I(j)π(SASB )∣≤V(j)π(SA)V(j)π(SB),

    I(j)ν(SASB )∣≤V(j)ν(SA)V(j)ν(SB).

    Proof. (a) and (b) are simple to prove.

    (c) We will use Cauchy-Schwarz inequality to prove our result. Cauchy-Schwarz inequality states that

    (nl=1ulvl)2(nl=1u2l)(nl=1v2l)

    for ul,vlR Consider

    (I(j)μ(SASB))2=(ki=1(μ(j)A  (ςi)¯μ(j)A  )(μ(j)B  (ςi)¯μ(j)B  ))2ki=1(μ(j)A  (ςi)¯μ(j)A  )2ki=1(μ(j)B  (ςi)¯μ(j)B  )2=V(j)μ(SA)V(j)μ(SB)
    ⇒∣I(j)μ(SASB)∣≤V(j)μ(SA)V(j)μ(SB)

    The other two are simple to prove.

    Definition 4.5. Let SA and SB be m-PSFSs over X as mentioned in Definition 4.2. Then correlation coefficient of SA and SB can be defined by

    ρ(SA,SB)=13mmj=1(ρ(j)μ(SA,SB)+ρ(j)π(SA,SB)+ρ(j)ν(SA,SB)) (4.1)

    Where,

    ρ(j)μ(SA,SB)=ki=1(μ(j)A  (ςi)¯μ(j)A  )(μ(j)B  (ςi)¯μ(j)B  )ki=1(μ(j)A  (ςi)¯μ(j)A  )2ki=1(μ(j)B  (ςi)¯μ(j)B  )2,
    ρ(j)π(SA,SB)=ki=1(π(j)A  (ςi)¯π(j)A  )(π(j)B  (ςi)¯π(j)B  )ki=1(π(j)A  (ςi)¯π(j)A  )2ki=1(π(j)B  (ςi)¯π(j)B  )2,
    ρ(j)ν(SA,SB)=ki=1(ν(j)A  (ςi)¯ν(j)A  )(ν(j)B  (ςi)¯ν(j)B  )ki=1(ν(j)A  (ςi)¯ν(j)A  )2ki=1(ν(j)B  (ςi)¯ν(j)B  )2

    for j = 1, 2, 3, ..., m.

    It is very critical to note that if, for some j(=1,2,3,...,m), μ(j)A  (ςi)= constant for all i = 1, 2, 3, ..., n, then ¯μ(j)A  = constant and hence I(j)μ(SA=0 and V(j)μ(SA)=0 and hence I(j)μ(SASB )=0 and V(j)μ(SA)=0. Therefore, the correlation ρ(j)μ(SA,SB) can not be defined. Similarly if π(j)A  (ςi)= constant for all i = 1, 2, 3, ..., n, then ¯π(j)A  = constant and hence I(j)π(SA=0 and V(j)π(SA)=0 and hence I(j)π(SASB )=0 and V(j)π(SA)=0. Therefore, the correlation ρ(j)π(SA,SB) can not be defined. And similarly if ν(j)A  (ςi)= constant for all i = 1, 2, 3, ..., n, then ¯ν(j)A  = constant and hence I(j)ν(SA=0 and V(j)ν(SA)=0 and hence I(j)ν(SASB )=0 and V(j)ν(SA)=0. Therefore, the correlation ρ(j)ν(SA,SB) can not be defined. In either case, ρ(SA,SB) is meaningless. Therefore, our m-PSF information should be diverse in nature.

    Example 4.6. Let Table 2

    Table 2.  3-polar spherical fuzzy set.
    SA 3-PSFS
    ς1 (0.28,0.49,0.55),(0.32,0.42,0.20),(0.45,0.37,0.06)
    ς2 (0.55,0.32,0.42),(0.52,0.33,0.22),(0.49,0.55,0.09)
    ς3 (0.42,0.38,0.49),(0.34,0.56,0.48),(0.36,0.49,0.23)

     | Show Table
    DownLoad: CSV

    and Table 3

    Table 3.  3-polar spherical fuzzy set.
    SB 3-PSFS
    ς1 (0.20,0.60,0.25),(0.34,0.41,0.17),(0.52,0.41,0.32)
    ς2 (0.55,0.72,0.08),(0.39,0.45,0.16),(0.32,0.15,0.48)
    ς3 (0.37,0.25,0.42),(0.54,0.32,0.19),(0.49,0.18,0.31)

     | Show Table
    DownLoad: CSV

    be 3-PSFSs defined over X. Then ¯SA=((0.42,0.38,0.42),(0.39,0.44,0.30),(0.43,0.47,0.13)),

    ¯SB=((0.37,0.52,0.22),(0.42,0.39,0.17),(0.44,0.25,0.37)),
    V(SA)=0.02,V(SB)=0.04,I(SASB)=0.003

    Hence,

    ρ(SA,SB)=0.11

    Theorem 4.7. For the m-PSFSs SA and SB, we have

    (a) The correlation ρ is symmetrical, that is, ρ(SA,SB)=ρ(SB,SA)

    (b) The correlation ρ lies between 1 and 1, that is, 1ρ(SA,SB)1

    (c) ρ(SA,SB)=1 if A=B

    (d) ρ(SA,SB)=1 if A=(α)B, α>0.

    Proof. (a) It is easy to prove.

    (b) From the proposition 4.4, we have I(j)μ(SASB )∣≤V(j)μ(SA)V(j)μ(SB)

    V(j)μ(SA)V(j)μ(SB)I(j)μ(SASB)V(j)μ(SA)V(j)μ(SB)
    1I(j)μ(SASB)V(j)μ(SA)V(j)μ(SB)1
    1ρ(j)μ(SA,SB)1

    Similarly, 1ρ(j)π(SA,SB)1 and 1ρ(j)ν(SA,SB)1 and hence 1ρ(SA,SB)1.

    (c) If A = B then μ(j)A  (ςi)=μ(j)B  (ςi), π(j)A  (ςi)=π(j)B  (ςi) and ν(j)A  (ςi)=ν(j)B  (ςi), then

    ρ(j)μ(SA,SB)=ki=1(μ(j)A  (ςi)¯μ(j)A  )(μ(j)B  (ςi)¯μ(j)B  )ki=1(μ(j)A  (ςi)¯μ(j)A  )2ki=1(μ(j)B  (ςi)¯μ(j)B  )2=ki=1(μ(j)A  (ςi)¯μ(j)A  )(μ(j)A  (ςi)¯μ(j)A  )ki=1(μ(j)A  (ςi)¯μ(j)A  )2ki=1(μ(j)A  (ςi)¯μ(j)A  )2=1 Similarly

    ρ(j)π(SA,SB)=1 and ρ(j)ν(SA,SB)=1 and hence ρ(SA,SB)=1.

    (d) If A = (α)B then μ(j)A  (ςi)=(α)μ(j)B  (ςi), π(j)A  (ςi)=(α)π(j)B  (ςi) and ν(j)A  (ςi)=(α)ν(j)B  (ςi), then

    ρ(j)μ(SA,SB)=ki=1(μ(j)A  (ςi)¯μ(j)A  )(μ(j)B  (ςi)¯μ(j)B  )ki=1(μ(j)A  (ςi)¯μ(j)A  )2ki=1(μ(j)B  (ςi)¯μ(j)B  )2   =ki=1((α)μ(j)B  (ςi)(α)¯μ(j)B  )(μ(j)B  (ςi)¯μ(j)B  )ki=1((α)μ(j)B  (ςi)(α)¯μ(j)B  )2ki=1(μ(j)B  (ςi)¯μ(j)B  )2=1

    Similarly ρ(j)π(SA,SB)=1 and ρ(j)ν(SA,SB)=1 and hence ρ(SA,SB)=1.

    Definition 4.8. Let SA and SB be m-PSFSs over X as mentioned in definition 4.2. Then correlation coefficient of SA and SB can also be defined as

    ˜ϱ(SA,SB)=13mmj=1(˜ϱ(j)μ(SA,SB)+˜ϱ(j)π(SA,SB)+˜ϱ(j)ν(SA,SB)) (4.2)

    Where,

    ˜ϱ(j)μ(SA,SB)=ki=1(μ(j)A  (ςi)¯μ(j)A  )(μ(j)B  (ςi)¯μ(j)B  )max{ki=1(μ(j)A  (ςi)¯μ(j)A  )2,ki=1(μ(j)B  (ςi)¯μ(j)B  )2},
    ˜ϱ(j)π(SA,SB)=ki=1(π(j)A  (ςi)¯π(j)A  )(π(j)B  (ςi)¯π(j)B  )max{ki=1(π(j)A  (ςi)¯π(j)A  )2,ki=1(π(j)B  (ςi)¯π(j)B  )2},

    and

    ˜ϱ(j)ν(SA,SB)=ki=1(ν(j)A  (ςi)¯ν(j)A  )(ν(j)B  (ςi)¯ν(j)B  )max{ki=1(ν(j)A  (ςi)¯ν(j)A  )2,ki=1(ν(j)B  (ςi)¯ν(j)B  )2}.

    Theorem 4.9. For the m-PSFSs SA and SB, we have

    (a) The correlation ˜ϱ is symmetrical, that is, ˜ϱ(SA,SB)=˜ϱ(SB,SA)

    (b) The correlation ˜ϱ lies between 1 and 1, that is, 1˜ϱ(SA,SB)1

    (c) ˜ϱ(SA,SB)=1 if A=B

    (d) ˜ϱ(SA,SB)=1 if A=(α)B, α>0.

    Proof. (a) It is easy to prove.

    (b) From the proposition 4.4, we have I(j)μ(SASB )∣≤V(j)μ(SA)V(j)μ(SB)

    V(j)μ(SA)V(j)μ(SB)I(j)μ(SASB)V(j)μ(SA)V(j)μ(SB)
    1I(j)μ(SASB)V(j)μ(SA)V(j)μ(SB)1
    1˜ϱ(j)μ(SA,SB)1

    Similarly, 1˜ϱ(j)π(SA,SB)1 and 1˜ϱ(j)ν(SA,SB)1 and hence 1˜ϱ(SA,SB)1.

    (c) If A = B then μ(j)A  (ςi)=μ(j)B  (ςi), π(j)A  (ςi)=π(j)B  (ςi) and ν(j)A  (ςi)=ν(j)B  (ςi), then

    ˜ϱ(j)μ(SA,SB)=ki=1(μ(j)A  (ςi)¯μ(j)A  )(μ(j)B  (ςi)¯μ(j)B  )max{ki=1(μ(j)A  (ςi)¯μ(j)A  )2,ki=1(μ(j)B  (ςi)¯μ(j)B  )2}=ki=1(μ(j)A  (ςi)¯μ(j)A  )(μ(j)A  (ςi)¯μ(j)A  )max{ki=1(μ(j)A  (ςi)¯μ(j)A  )2,ki=1(μ(j)A  (ςi)¯μ(j)A  )2}=1 Similarly

    ˜ϱ(j)π(SA,SB)=1 and ˜ϱ(j)ν(SA,SB)=1 and hence ˜ϱ(SA,SB)=1.

    (d) If A = (α)B then μ(j)A  (ςi)=(α)μ(j)B  (ςi), π(j)A  (ςi)=(α)π(j)B  (ςi) and ν(j)A  (ςi)=(α)ν(j)B  (ςi), then

    ˜ϱ(j)μ(SA,SB)=ki=1(μ(j)A  (ςi)¯μ(j)A  )(μ(j)B  (ςi)¯μ(j)B  )max{ki=1(μ(j)A  (ςi)¯μ(j)A  )2,ki=1(μ(j)B  (ςi)¯μ(j)B  )2}        =ki=1((α)μ(j)B  (ςi)(α)¯μ(j)B  )(μ(j)B  (ςi)¯μ(j)B  )max{ki=1((α)μ(j)B  (ςi)(α)¯μ(j)B  )2,ki=1(μ(j)B  (ςi)¯μ(j)B  )2}=1

    Similarly ˜ϱ(j)π(SA,SB)=1 and ˜ϱ(j)ν(SA,SB)=1 and hence ˜ϱ(SA,SB)=1.

    Two main aspects of most real-world issues should be addressed: complexity and weights. Uncertainty is a major factor that can influence our decisions and analyses when dealing with such issues. Furthermore, weights have an effect on the majority of unknown mathematical models. We describe weighted Correlation coefficients (WCCs) to deal with such issues.

    Definition 4.10. Let SA and SB be m-PSFSs defined over X as mentioned in definition 4.2. The alternatives are effected by ς1,ς2,,ςn are affected by the weights ω1,ω2,,ωn with the condition ni=1ωi=1 and 0ωi1. Then weighted covariance of SA and SB can be defined as

    ωI(SASB)=13mmj=1(ωI(j)μ(SASB)+ωI(j)π(SASB)+ωI(j)ν(SASB)) (4.3)

    Where,

    ωI(j)μ(SASB)=ki=1  ωi(μ(j)A  (ςi)¯μ(j)A  )(μ(j)B  (ςi)¯μ(j)B  ),
    ωI(j)π(SASB)=ki=1  ωi(π(j)A  (ςi)¯π(j)A  )(π(j)B  (ςi)¯π(j)B  ),
    ωI(j)ν(SASB)=ki=1  ωi(ν(j)A  (ςi)¯ν(j)A  )(ν(j)B  (ςi)¯ν(j)B  )

    for j = 1, 2, 3, ..., m.

    Definition 4.11. Let SA be a m-PSFS on X as mentioned in definition 4.2. Then weighted variance of SA can be defined as

    ωV(SA)=13mmj=1(ωV(j)μ(SA)+ωV(j)π(SA)+ωV(j)ν(SA))

    Where,

    ωV(j)μ(SA)=ki=1  ωi(μ(j)A  (ςi)¯μ(j)A  )2,
    ωV(j)π(SA)=ki=1  ωi(π(j)A  (ςi)¯π(j)A  )2,
    ωV(j)ν(SA)=ki=1  ωi(ν(j)A  (ςi)¯ν(j)A  )2

    for j = 1, 2, 3, ..., m.

    Proposition 4.12. The covariance and variance for m-PSFSs of SA and SB follow the following properties.

    (a) ωI(j)μ(SASA)=ωV(j)μ(SA), ωI(j)π(SASA)=ωV(j)π(SA), ωI(j)ν(SASA)=ωV(j)ν(SA)

    (b) ωI(j)μ(SASB )=ωI(j)μ(SBSA), ωI(j)π(SASB )=ωI(j)π(SBSA), ωI(j)ν(SASB )=ωI(j)ν(SBSA)

    (c) ωI(j)μ(SASB )∣≤ωV(j)μ(SA)ωV(j)μ(SB), ωI(j)π(SASB )∣≤ωV(j)π(SA)ωV(j)π(SB),

    ωI(j)ν(ωSASB )∣≤ωV(j)ν(SA)ωV(j)ν(SB).

    Proof. (a) and (b) are simple to prove.

    (c) We will use Cauchy-Schwarz inequality to prove our result. Cauchy-Schwarz inequality states that

    (nl=1ulvl)2(nl=1u2l)(nl=1v2l)

    for ul,vlR Consider

    (ωI(j)μ(SASB))2=(ki=1  ωi(μ(j)A  (ςi)¯μ(j)A  )(μ(j)B  (ςi)¯μ(j)B  ))2=(ki=1ωi(μ(j)A  (ςi)¯μ(j)A  )ωi(μ(j)B  (ςi)¯μ(j)B  ))2ki=1  ωi(μ(j)A  (ςi)¯μ(j)A  )2ki=1  ωi(μ(j)B  (ςi)¯μ(j)B  )2=ωV(j)μ(SA)ωV(j)μ(SB)
    ⇒∣ωI(j)μ(SASB)∣≤ωV(j)μ(SA)ωV(j)μ(SB)

    The other two are simple to prove.

    Definition 4.13. Let SA and SB be m-PSFSs over X as mentioned in definition 4.2. Then weighted correlation coefficient of SA and SB can be defined by

    ωρ(SA,SB)=13mmj=1(ωρ(j)μ(SA,SB)+ωρ(j)π(SA,SB)+ωρ(j)ν(SA,SB)) (4.4)

    Where,

    ωρ(j)μ(SA,SB)=ki=1  ωi(μ(j)A  (ςi)¯μ(j)A  )(μ(j)B  (ςi)¯μ(j)B  )ki=1  ωi(μ(j)A  (ςi)¯μ(j)A  )2ki=1  ωi(μ(j)B  (ςi)¯μ(j)B  )2,
    ωρ(j)π(SA,SB)=ki=1  ωi(π(j)A  (ςi)¯π(j)A  )(π(j)B  (ςi)¯π(j)B  )ki=1  ωi(π(j)A  (ςi)¯π(j)A  )2ki=1  ωi(π(j)B  (ςi)¯π(j)B  )2,
    ωρ(j)ν(SA,SB)=ki=1  ωi(ν(j)A  (ςi)¯ν(j)A  )(ν(j)B  (ςi)¯ν(j)B  )ki=1  ωi(ν(j)A  (ςi)¯ν(j)A  )2ki=1  ωi(ν(j)B  (ςi)¯ν(j)B  )2

    for j = 1, 2, 3, ..., m.

    Theorem 4.14. For the m-PSFSs SA and SB, we have

    (a) The weighted correlation ωρ is symmetrical, that is, ωρ(SA,SB)=ωρ(SB,SA)

    (b) The weighted correlation ωρ lies between 1 and 1, that is, 1ωρ(SA,SB)1

    (c) ωρ(SA,SB)=1 if A=B

    (d) ωρ(SA,SB)=1 if A=(α)B, α>0.

    Proof. (a) It is easy to prove.

    (b) From the proposition 4.12, we have ωI(j)μ(SASB )∣≤ωV(j)μ(SA)ωV(j)μ(SB)

    ωV(j)μ(SA)ωV(j)μ(SB)ωI(j)μ(SASB)ωV(j)μ(SA)ωV(j)μ(SB)
    1ωI(j)μ(SASB)ωV(j)μ(SA)ωV(j)μ(SB)1
    1ωρ(j)μ(SA,SB)1

    Similarly, 1ωρ(j)π(SA,SB)1 and 1ωρ(j)ν(SA,SB)1 and hence 1ωρ(SA,SB)1.

    (c) If A = B then μ(j)A  (ςi)=μ(j)B  (ςi), π(j)A  (ςi)=π(j)B  (ςi) and ν(j)A  (ςi)=ν(j)B  (ςi), then

    ωρ(j)μ(SA,SB)=ki=1  ωi(μ(j)A  (ςi)¯μ(j)A  )(μ(j)B  (ςi)¯μ(j)B  )ki=1  ωi(μ(j)A  (ςi)¯μ(j)A  )2ki=1  ωi(μ(j)B  (ςi)¯μ(j)B  )2=ki=1  ωi(μ(j)A  (ςi)¯μ(j)A  )(μ(j)A  (ςi)¯μ(j)A  )ki=1  ωi(μ(j)A  (ςi)¯μ(j)A  )2ki=1  ωi(μ(j)A  (ςi)¯μ(j)A  )2=1 Similarly

    ωρ(j)π(SA,SB)=1 and ωρ(j)ν(SA,SB)=1 and hence ωρ(SA,SB)=1.

    (d) If A = (α)B then μ(j)A  (ςi)=(α)μ(j)B  (ςi), π(j)A  (ςi)=(α)π(j)B  (ςi) and ν(j)A  (ςi)=(α)ν(j)B  (ςi), then

    ωρ(j)μ(SA,SB)=ki=1  ωi(μ(j)A  (ςi)¯μ(j)A  )(μ(j)B  (ςi)¯μ(j)B  )ki=1  ωi(μ(j)A  (ςi)¯μ(j)A  )2ki=1  ωi(μ(j)B  (ςi)¯μ(j)B  )2        =ki=1  ωi((α)μ(j)B  (ςi)(α)¯μ(j)B  )(μ(j)B  (ςi)¯μ(j)B  )ki=1  ωi((α)μ(j)B  (ςi)(α)¯μ(j)B  )2ki=1  ωi(μ(j)B  (ςi)¯μ(j)B  )2=1

    Similarly ωρ(j)π(SA,SB)=1 and ωρ(j)ν(SA,SB)=1 and hence ωρ(SA,SB)=1.

    Definition 4.15. Let SA and SB be m-PSFSs over X as mentioned in definition 4.2. Then weighted correlation coefficient of SA and SB can also be defined as

    ω˜ϱ(SA,SB)=13mmj=1(ω˜ϱ(j)μ(SA,SB)+ω˜ϱ(j)π(SA,SB)+ω˜ϱ(j)ν(SA,SB))

    Where,

    ω˜ϱ(j)μ(SA,SB)=ki=1  ωi(μ(j)A  (ςi)¯μ(j)A  )(μ(j)B  (ςi)¯μ(j)B  )max{ki=1  ωi(μ(j)A  (ςi)¯μ(j)A  )2,ki=1  ωi(μ(j)B  (ςi)¯μ(j)B  )2},
    ω˜ϱ(j)π(SA,SB)=ki=1  ωi(π(j)A  (ςi)¯π(j)A  )(π(j)B  (ςi)¯π(j)B  )max{ki=1  ωi(π(j)A  (ςi)¯π(j)A  )2,ki=1  ωi(π(j)B  (ςi)¯π(j)B  )2},

    and

    ω˜ϱ(j)ν(SA,SB)=ki=1  ωi(ν(j)A  (ςi)¯ν(j)A  )(ν(j)B  (ςi)¯ν(j)B  )max{ki=1  ωi(ν(j)A  (ςi)¯ν(j)A  )2,ki=1  ωi(ν(j)B  (ςi)¯ν(j)B  )2}.

    Theorem 4.16. For the m-PSFSs SA and SB, we have

    (a) The correlation ω˜ϱ is symmetrical, that is, ω˜ϱ(SA,SB)=ω˜ϱ(SB,SA)

    (b) The correlation ˜ϱ lies between 1 and 1, that is, 1ω˜ϱ(SA,SB)1

    (c) ω˜ϱ(SA,SB)=1 if A=B

    (d) ω˜ϱ(SA,SB)=1 if A=(α)B, α>0.

    Proof. (a) It is easy to prove.

    (b) From the proposition 4.4, we have ωI(j)μ(SASB )∣≤ωV(j)μ(SA)ωV(j)μ(SB)

    ωV(j)μ(SA)ωV(j)μ(SB)ωI(j)μ(SASB)ωV(j)μ(SA)ωV(j)μ(SB)
    1ωI(j)μ(SASB)ωV(j)μ(SA)ωV(j)μ(SB)1
    1ω˜ϱ(j)μ(SA,SB)1

    Similarly, 1ω˜ϱ(j)π(SA,SB)1 and 1ω˜ϱ(j)ν(SA,SB)1 and hence 1ω˜ϱ(SA,SB)1.

    (c) If A = B then μ(j)A  (ςi)=μ(j)B  (ςi), π(j)A  (ςi)=π(j)B  (ςi) and ν(j)A  (ςi)=ν(j)B  (ςi), then

    ω˜ϱ(j)μ(SA,SB)=ki=1  ωi(μ(j)A  (ςi)¯μ(j)A  )(μ(j)B  (ςi)¯μ(j)B  )max{ki=1  ωi(μ(j)A  (ςi)¯μ(j)A  )2,ki=1  ωi(μ(j)B  (ςi)¯μ(j)B  )2}      =ki=1  ωi(μ(j)A  (ςi)¯μ(j)A  )(μ(j)A  (ςi)¯μ(j)A  )max{ωiki=1  ωi(μ(j)A  (ςi)¯μ(j)A  )2,ki=1  ωi(μ(j)A  (ςi)¯μ(j)A  )2}=1

    Similarly ω˜ϱ(j)π(SA,SB)=1 and ω˜ϱ(j)ν(SA,SB)=1 and hence ω˜ϱ(SA,SB)=1.

    (d) If A = (α)B then μ(j)A  (ςi)=(α)μ(j)B  (ςi), π(j)A  (ςi)=(α)π(j)B  (ςi) and ν(j)A  (ςi)=(α)ν(j)B  (ςi), then

    ω˜ϱ(j)μ(SA,SB)=ki=1  ωi(μ(j)A  (ςi)¯μ(j)A  )(μ(j)B  (ςi)¯μ(j)B  )max{ki=1  ωi(μ(j)A  (ςi)¯μ(j)A  )2,ki=1  ωi(μ(j)B  (ςi)¯μ(j)B  )2}        =ki=1  ωi((α)μ(j)B  (ςi)(α)¯μ(j)B  )(μ(j)B  (ςi)¯μ(j)B  )max{ki=1  ωi((α)μ(j)B  (ςi)(α)¯μ(j)B  )2,ki=1  ωi(μ(j)B  (ςi)¯μ(j)B  )2}=1

    Similarly ω˜ϱ(j)π(SA,SB)=1 and ω˜ϱ(j)ν(SA,SB)=1 and hence ω˜ϱ(SA,SB)=1.

    The weights (1n,1n,,1n) is changeless in correlation. So, once such weights occur, we can just ignore them and proceed unweightedly. In other words, the weighted alternatives can be considered uneven. We may observe that

    ω˜ϱ(j)μ(SA,SB)=ki=1  ωi(μ(j)A  (ςi)¯μ(j)A  )(μ(j)B  (ςi)¯μ(j)B  )max{ki=1  ωi(μ(j)A  (ςi)¯μ(j)A  )2,ki=1  ωi(μ(j)B  (ςi)¯μ(j)B  )2},
          =ki=11n(μ(j)A  (ςi)¯μ(j)A  )(μ(j)B  (ςi)¯μ(j)B  )max{ki=11n(μ(j)A  (ςi)¯μ(j)A  )2,ki=11n(μ(j)B  (ςi)¯μ(j)B  )2},
          =ki=1(μ(j)A  (ςi)¯μ(j)A  )(μ(j)B  (ςi)¯μ(j)B  )max{ki=1(μ(j)A  (ςi)¯μ(j)A  )2,ki=1(μ(j)B  (ςi)¯μ(j)B  )2}=˜ϱ(j)μ(SA,SB)

    and

    ωρ(j)μ(SA,SB)=ki=1  ωi(μ(j)A  (ςi)¯μ(j)A  )(μ(j)B  (ςi)¯μ(j)B  )ki=1  ωi(μ(j)A  (ςi)¯μ(j)A  )2ki=1  ωi(μ(j)B  (ςi)¯μ(j)B  )2,
          =ki=11n(μ(j)A  (ςi)¯μ(j)A  )(μ(j)B  (ςi)¯μ(j)B  )ki=11n(μ(j)A  (ςi)¯μ(j)A  )2ki=11n(μ(j)B  (ςi)¯μ(j)B  )2,
          =ki=1(μ(j)A  (ςi)¯μ(j)A  )(μ(j)B  (ςi)¯μ(j)B  )ki=1(μ(j)A  (ςi)¯μ(j)A  )2ki=1(μ(j)B  (ςi)¯μ(j)B  )2=ρ(j)μ(SA,SB)

    In statistics and engineering the correlation plays a major role. The cumulative relation between two variables can be analysed using the level of stability of the two variables by means of correlation analysis. Correlation actions are prevalent indicators and appropriate methodologies to MCDM problems. Several intellectuals have used correlations in different uncertain conditions to solve these problems quickly and productively. The correlations defined in this article will be used in this section to precisely recognize patterns and medical diagnosis.

    Pattern recognition is automatic identification of collection and aggregation in statistics. It is usually classified based on the type of learning experience for producing the value of output. Pattern recognition methods usually help to identify all the independent variables moderately and to make "most likely" the insights to match, taking their statistical variance into consideration. Pattern recognition is usually divided into the classifications of learning process of creating new value of the output.

    Now we develop Algorithm 1 for pattern recognition with the help of proposed correlation based on m-PSF information.

    Algorithm 1 (Pattern Recognition)
    Step 1: Read the pattern to be recognized as P and express in the form of m-PSFS.
    Step 2: Arrange the known patterns in the form of a sequence P(1),P(2),,P(n).
    Step 3 (i): By using the formula (4.1) or (4.2), find the correlation coefficients of the pattern P from the known patterns P(1),P(2),,P(n).
    Step 3 (ii): If the universe X for the m-PSF model contains weighted alternatives, find the respective weighted correlation coefficients using the formula (4.3) or (4.4).
    Step 4: Pattern P belongs to P(i), if any pattern P(i) finds the greatest correlation with P.

     | Show Table
    DownLoad: CSV

    Example 5.1. Pattern recognition is one of the most important and fundamental concern in robotics, machine learning and security management. We consider a perticular problem of pattern recognition, namely, facial recognition. Facial recognition is a mechanism through which an individual's identification can be confirmed by his face. In photos, videos and even in real time, facial recognition systems can be used to identify people. One of the main category of biometric safety is facial identification. Suppose a machine, which is already feeded with three patterns P(1),P(2) and P(3) of three different persons in the form of m-PSFSs, has to detect a face of an unknown person. (We are considering only three persons in this example because our aim is to give a mathematical model only. However, a certain machine can be feeded with hundreds and thousands of the patterns of different persons at a time). The three patterns are expressed in in terms of 3-PSFS in Table 4, Table 5, Table 6, respectively.

    Table 4.  Assessment of pattern P(1) in terms of 3-PSFS.
    P(1) 3-PSFS
    ς1 (0.19,0.24,0.35),(0.24,0.36,0.49),(0.22,0.33,0.45)
    ς2 (0.24,0.33,0.47),(0.14,0.32,0.48),(0.30,0.47,0.58)
    ς3 (0.25,0.37,0.54),(0.20,0.31,0.50),(0.25,0.39,0.59)

     | Show Table
    DownLoad: CSV
    Table 5.  Assessment of pattern P(2) in terms of 3-PSFS.
    P(2) 3-PSFS
    ς1 (0.25,0.34,0.47),(0.17,0.34,0.40),(0.21,0.34,0.38)
    ς2 (0.08,0.14,0.25),(0.26,0.38,0.47),(0.24,0.32,0.49)
    ς3 (0.27,0.36,0.49),(0.15,0.33,0.63),(0.26,0.43,0.52)

     | Show Table
    DownLoad: CSV
    Table 6.  Assessment of pattern P(3) in terms of 3-PSFS.
    P(3) 3-PSFS
    ς1 (0.18,0.22,0.33),(0.24,0.55,0.67),(0.32,0.49,0.56)
    ς2 (0.25,0.34,0.50),(0.37,0.48,0.62),(0.25,0.34,0.57)
    ς3 (0.14,0.27,0.37),(0.32,0.46,0.53),(0.14,0.28,0.47)

     | Show Table
    DownLoad: CSV

    and

    The machine first detects the face of an unknown person, analyzes it and converts it into a m-PSF model, say P, which is given in Table 7 as follows.

    Table 7.  m-PSF model.
    P 3-PSFS
    ς1 (0.20,0.44,0.66),(0.06,0.19,0.50),(0.32,0.46,0.55)
    ς2 (0.42,0.53,0.65),(0.32,0.44,0.59),(0.37,0.43,0.50)
    ς3 (0.29,0.38,0.52),(0.27,0.36,0.64),(0.23,0.32,0.40)

     | Show Table
    DownLoad: CSV

    It, then, finds the correlations of the unknown pattern from the known ones and decides that which pattern is closest to the unknown pattern. This whole facial recognition process can be performed through the following Algorithm 1, that is, the machine can be feeded with the proposed algorithm in order to detect the person.

    The correlation coefficients of P from P(1),P(2),P(3) (using the formula (4.1) and (4.2) respectively) are given by

    ρ(P,P(1))=0.09 ρ(P,P(2))=0.29 ρ(P,P(3))=0.36
    ˜ϱ(P,P(1))=0.07 ˜ϱ(P,P(2))=0.28 ˜ϱ(P,P(3))=0.23

     | Show Table
    DownLoad: CSV

    However, if the alternatives ς1,ς2,ς3 pursue some weights ω=(0.24,0.36,0.40), then we find the respective weighted correlation coefficients (using the formula (4.3) and (4.4) respectively) as follows.

    ωρ(P,P(1))=0.10 ωρ(P,P(2))=0.31 ωρ(P,P(3))=0.39
    ω˜ϱ(P,P(1))=0.06 ω˜ϱ(P,P(2))=0.29 ω˜ϱ(P,P(3))=0.27

     | Show Table
    DownLoad: CSV

    The correlation flow of P from the known patterns P(1), P(2) and P(3) under the proposed correlations are given in the following table.

    Table 8.  Comparison analysis.
    Correlation measures Ranking The optimal pattern
    ρ P(3)P(1)P(2) P(3)
    ˜ϱ P(3)P(1)P(2) P(3)
    ωρ P(3)P(1)P(2) P(3)
    ω˜ϱ P(3)P(1)P(2) P(3)

     | Show Table
    DownLoad: CSV

    All of the above results show that the pattern P finds the greatest correlation from P(3). Therefore, the facial recognition machine detects the person P as P(3), and then the examiners has to decide the physical existence of the unknown person.

    Now we develop Algorithm 2 for medical diagnosis with the help of proposed correlation for m-PSF information.

    Algorithm 2 (Medical Diagnosis)
    Step 1: Consider the set of m symptoms {ς1,ς2,ςm} and the set of n diseases {β(1),β(2)β(n)}.
    Step 2: Compute assessment matrices for diseases β(1),β(2)β(n) and assessment matrix for the patient P in terms of m-PSFS.
    Step 3 (i): By using the formula (4.1) or (4.2), find the correlation coefficients of the matrix P with each matrix β(1),β(2)β(n).
    Step 3 (ii): Compute weighted correlation coefficients using the formula (4.3) or (4.4).
    Step 4: The disease β(i) showing highest correlation with patient P is the actual disease.

     | Show Table
    DownLoad: CSV

    Example 5.2. In this example, we use the Algorithm 2 to analyze the actual disease of a patient. Suppose a patient has to be diagnosed in a healthcare center and healthcare experts diagnosis the patient with the following symptoms as follows:

    ς1=headache,ς2=fatigue,ς3=chest pain,ς4=breathing difficulty

    and the possible diseases as follows:

    β(1)=fever,β(2)=typhoid,β(3)=corona,β(4)=heart disease

    The assessment matrices for β(1), β(2), β(3) and β(4) are expressed in Table 9, Table 10, Table 11, Table 12, respectively.

    Table 9.  Assessment matrix for β(1).
    β(1) 3-PSFS
    ς1 (0.18,0.26,0.39),(0.15,0.24,0.46),(0.19,0.36,0.42)
    ς2 (0.24,0.38,0.44),(0.36,0.48,0.54),(0.33,0.41,0.57)
    ς3 (0.11,0.22,0.44),(0.12,0.35,0.47),(0.24,0.51,0.62)
    ς4 (0.22,0.34,0.48),(0.10,0.15,0.20),(0.13,0.27,0.46)

     | Show Table
    DownLoad: CSV
    Table 10.  Assessment matrix for β(2).
    β(2) 3-PSFS
    ς1 (0.20,0.35,0.45),(0.18,0.29,0.43),(0.15,0.29,0.37)
    ς2 (0.10,0.16,0.27),(0.26,0.37,0.48),(0.20,0.35,0.50)
    ς3 (0.23,0.33,0.46),(0.32,0.39,0.45),(0.25,0.37,0.46)
    ς4 (0.29,0.38,0.44),(0.27,0.40,0.56),(0.17,0.34,0.62)

     | Show Table
    DownLoad: CSV
    Table 11.  Assessment matrix for β(3).
    β(3) 3-PSFS
    ς1 (0.43,0.50,0.62),(0.18,0.26,0.34),(0.30,0.48,0.64)
    ς2 (0.14,0.28,0.32),(0.17,0.32,0.54),(0.15,0.40,0.57)
    ς3 (0.16,0.30,0.45),(0.24,0.37,0.58),(0.18,0.26,0.44)
    ς4 (0.13,0.29,0.48),(0.32,0.46,0.62),(0.23,0.38,0.50)

     | Show Table
    DownLoad: CSV
    Table 12.  Assessment matrix for β(4).
    β(4) 3-PSFS
    ς1 (0.16,0.24,0.36),(0.19,0.33,0.45),(0.28,0.35,0.43)
    ς2 (0.28,0.37,0.54),(0.26,0.53,0.65),(0.39,0.49,0.54)
    ς3 (0.17,0.26,0.39),(0.34,0.47,0.55),(0.20,0.49,0.62)
    ς4 (0.18,0.46,0.59),(0.39,0.45,0.60),(0.13,0.35,0.49)

     | Show Table
    DownLoad: CSV

    and Assume the expert opinion for the patient and his symptoms is evaluated in terms 3PSFS as given in Table 13.

    Table 13.  Expert opinion in terms of 3-PSFS.
    P 3-PSFS
    ς1 (0.20,0.30,0.40),(0.17,0.25,0.36),(0.09,0.32,0.41)
    ς2 (0.15,0.16,0.18),(0.22,0.35,0.43),(0.15,0.26,0.44)
    ς3 (0.21,0.32,0.52),(0.25,0.34,0.47),(0.33,0.45,0.68)
    ς4 (0.23,0.38,0.42),(0.28,0.49,0.65),(0.26,0.40,0.60)

     | Show Table
    DownLoad: CSV

    In order to check the actual disease of patient, we find the correlation coefficients of β from β(1), β(2) using formula (4.1) and (4.2) respectively as follows.

    ρ(P,β(1))=0.21 ρ(P,β(2))=0.81 ρ(P,β(3))=0.15 ρ(P,β(4))=0.29
    ˜ϱ(P,β(1))=0.15 ˜ϱ(P,β(2))=0.60 ˜ϱ(P,β(3))=0.18 ˜ϱ(P,β(4))=0.20

     | Show Table
    DownLoad: CSV

    However, if the patients ς1,ς2,ς3,ς4 are assigned some weights ω=(0.19,0.22,0.26,0.33) from the healthcare team, then we find the respective weighted correlation coefficients using the formula (4.3) and (4.4) respectively as follows.

    ωρ(P,β(1))=0.23ωρ(P,β(2))=0.80ωρ(P,β(3))=0.13ωρ(P,β(4))=0.29
    ω˜ϱ(P,β(1))=0.16ω˜ϱ(P,β(2))=0.60ω˜ϱ(P,β(3))=0.16ω˜ϱ(P,β(4))=0.19

     | Show Table
    DownLoad: CSV

    The correlation flow of P from β(1), β(2) and β(3) under the suggested correlation measures are given in the Table 14. From these results, we find that the patient P shows the greatest correlation with β(2). So, the patient is suffering from typhoid and the necessary measures are to be taken in this regard.

    Table 14.  Comparison analysis.
    Correlation measures Ranking The optimal diagnosis
    ρ β(2)β(4)β(3)β(1) β(2)
    ˜ϱ β(2)β(4)β(3)β(1) β(2)
    ωρ β(2)β(4)β(3)β(1) β(2)
    ω˜ϱ β(2)β(4)β(3)β(1) β(2)

     | Show Table
    DownLoad: CSV

    MCDM has been studied by a large number of scholars and researchers. The methods designed for this purpose are generally influenced by the judgment operational framework used. The most of its key issues are attached to vague, imprecise, and multi-polar data that can't be adequately explained by fuzzy set alone. An m-polar fuzzy set (m-PFS) has the ability to deal with vagueness by multi-polarity and the spherical fuzzy set (SFS) deal with uncertainty by using three independent grades (membership degree, neutral-membership degree, and non-membership degree).

    In order to deal with real-life vague circumstances when decision makers require a new mathematical model to deal with multi-polarity as well as three independent spherical index, we introduced a new hybrid model named as m-polar spherical fuzzy set (m-PSFS) as a robust fusion of SFS and m-PFS. The existing models namely m-PFS and SFS are the special cases of suggested hybrid m-PSFS. To ensure the algebraic structures of this robust extension, we developed fundamental operations on m-PSFSs and investigated their related results. A suitable numbers of illustrations are presented to explain suggested notions and results. We introduced the correlation measures and weighted correlation measures for m-PSFSs. Certain properties of covariances and the correlation measures are proposed to analyze that suggested concepts are novel extension of crisp correlation measures. The main advantage of proposed correlation measures is that these notions deal with vagueness and uncertainty in the real-life problems efficiently with the help of m-PSF information. We discussed applications of m-PSFSs and their correlation measures in pattern recognition and medical diagnosis. To discuss the superiority and efficiency of proposed correlation measures, we give a comparison analysis of proposed concepts with some existing concepts.

    The authors declare no conflict of interest.

    The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University, Abha 61413, Saudi Arabia for funding this work through research groups program under grant number R.G. P-2/29/42.



    [1] N. L. Komarova, E. Barnes, P. Klenerman, D. Wodarz, Boosting immunity by antiviral drug therapy: a simple relationship among timing, efficacy, and success, Proc. Natl. Acad. Sci., 100 (2003), 1855–1860. https://doi.org/10.1073/pnas.0337483100 doi: 10.1073/pnas.0337483100
    [2] H. Dahari, A. Lo, R. M. Ribeiro, A. S. Perelson, Modeling hepatitis C virus dynamics: Liver regeneration and critical drug efficacy, J. Theor. Biol., 247 (2007), 371–381. https://doi.org/10.1016/j.jtbi.2007.03.006 doi: 10.1016/j.jtbi.2007.03.006
    [3] R. M. Anderson, G. F. Medley, R. M. May, A. M. Johnson, A preliminary study of the transmission dynamics of the human immunodeficiency virus (HIV), the causative agent of AIDS, Math. Med. Biol., 3 (1986), 229–263. https://doi.org/10.1093/imammb/3.4.229 doi: 10.1093/imammb/3.4.229
    [4] L. Zou, S. Ruan, W. Zhang, An age-structured model for the transmission dynamics of hepatitis B, SIAM J. Appl. Math., 70 (2010), 3121–3139. https://doi.org/10.1137/090777645 doi: 10.1137/090777645
    [5] R. S. Wijaya, S. A. Read, S. P. Selvamani, S. Schibeci, M. K. Azardaryany, A. Ong, et al., Hepatitis C virus (HCV) eradication with interferon-free direct-acting antiviral-based therapy results in KLRG1+ HCV-specific memory natural killer cells, J. Infect. Dis., 223 (2021), 1183–1195. https://doi.org/10.1093/infdis/jiaa492 doi: 10.1093/infdis/jiaa492
    [6] R. Wagner, J. T. Randolph, S. V. Patel, L. Nelson, M. A. Matulenko, R. Keddy, et al., Highlights of the structure-activity relationships of benzimidazole linked pyrrolidines leading to the discovery of the hepatitis C virus NS5A inhibitor pibrentasvir (ABT-530), J. Med. Chem., 61 (2018), 4052–4066. https://doi.org/10.1021/acs.jmedchem.8b00082 doi: 10.1021/acs.jmedchem.8b00082
    [7] A. Suk-Fong Lok, Hepatitis B treatment: what we know now and what remains to be researched, Hepatol. Commun., 3 (2019), 8–19. https://doi.org/10.1002/hep4.1281 doi: 10.1002/hep4.1281
    [8] Z. Meng, Y. Chen, M. Lu, Advances in targeting the innate and adaptive immune systems to cure chronic hepatitis B virus infection, Front. Immunol., 10 (2020), 3127. https://doi.org/10.3389/fimmu.2019.03127 doi: 10.3389/fimmu.2019.03127
    [9] M. P. Davenport, D. S. Khoury, D. Cromer, S. R. Lewin, A. D. Kelleher, S. J. Kent, Functional cure of HIV: the scale of the challenge, Nat. Rev. Immunol., 19 (2019), 45–54. https://doi.org/10.1038/s41577-018-0085-4 doi: 10.1038/s41577-018-0085-4
    [10] B. Autran, B. Descours, V. Avettand-Fenoel, C. Rouzioux, Elite controllers as a model of functional cure, Curr. Opin. HIV AIDS, 6 (2011), 181–187. https://doi.org/10.1097/COH.0b013e328345a328 doi: 10.1097/COH.0b013e328345a328
    [11] S. Shi, J. Huang, Y. Kuang, S. Ruan, Stability and Hopf bifurcation of a tumor-immune system interaction model with an immune checkpoint inhibitor, Commun. Nonlinear Sci. Numer. Simul., 118 (2023), 106996. https://doi.org/10.1016/j.cnsns.2022.106996 doi: 10.1016/j.cnsns.2022.106996
    [12] M. A. Benchaib, A. Bouchnita, V. Volpert, A. Makhoute, Mathematical modeling reveals that the administration of EGF can promote the elimination of lymph node metastases by PD-1/PD-L1 blockade, Front. Bioeng. Biotechnol., 7 (2019), 104. https://doi.org/10.3389/fbioe.2019.00104 doi: 10.3389/fbioe.2019.00104
    [13] A. Friedman, X. Lai, Combination therapy for cancer with oncolytic virus and checkpoint inhibitor: A mathematical model, PLoS One, 13 (2018), e0192449. https://doi.org/10.1371/journal.pone.0192449 doi: 10.1371/journal.pone.0192449
    [14] H. Shu, L. Wang, J. Watmough, Sustained and transient oscillations and chaos induced by delayed antiviral immune response in an immunosuppressive infection model, J. Math. Biol., 68 (2014), 477–503. https://doi.org/10.1007/s00285-012-0639-1 doi: 10.1007/s00285-012-0639-1
    [15] C. Tian, W. Gan, P. Zhu, Stability analysis in a diffusional immunosuppressive infection model with delayed antiviral immune response, Math. Methods Appl. Sci., 40 (2017), 4001–4013. https://doi.org/10.1002/mma.4279 doi: 10.1002/mma.4279
    [16] J. Li, X. Ma, J. Li, D. Zhang, Dynamics of a chronic virus infection model with viral stimulation delay, Appl. Math. Lett., 122 (2021), 107547. https://doi.org/10.1016/j.aml.2021.107547 doi: 10.1016/j.aml.2021.107547
    [17] D. Wodarz, Killer Cell Dynamics: Mathematical and Computational Approaches to Immunology, Springer, New York, 2007. https://doi.org/10.1007/978-0-387-68733-9-1
    [18] R. J. De Boer, A. S. Perelson, Towards a general function describing T cell proliferation, J. Theor. Biol., 175 (1995), 567–576. https://doi.org/10.1006/jtbi.1995.0165 doi: 10.1006/jtbi.1995.0165
    [19] R. J. De Boer, A. S. Perelson, Target cell limited and immune control models of HIV infection: a comparison, J. Theor. Biol., 190 (1998), 201–214. https://doi.org/10.1006/jtbi.1997.0548 doi: 10.1006/jtbi.1997.0548
    [20] J. R. Beddington, Mutual interference between parasites or predators and its effect on searching efficiency, J. Anim. Ecol., 44 (1975), 331–340. https://doi.org/10.2307/3866 doi: 10.2307/3866
    [21] D. L. DeAngelis, R. A. Goldstein, R. V. O'Neill, A model for tropic interaction, Ecology, 56 (1975), 881–892. https://doi.org/10.2307/1936298 doi: 10.2307/1936298
    [22] R. S. Cantrell, C. Cosner, On the dynamics of predator-prey models with the Beddington-DeAngelis functional response, J. Math. Anal. Appl., 257 (2001), 206–222. https://doi.org/10.1006/jmaa.2000.7343 doi: 10.1006/jmaa.2000.7343
    [23] W. Chen, M. Wang, Qualitative analysis of predator-prey models with Beddington-DeAngelis fun-ctional response and diffusion, Math. Comput. Model., 42 (2005), 31–44. https://doi.org/10.1016/j.mcm.2005.05.013 doi: 10.1016/j.mcm.2005.05.013
    [24] T. W. Hwang, Global analysis of the predator-prey system with Beddington-DeAngelis functional response, J. Math. Anal. Appl., 281 (2003), 395–401. https://doi.org/10.1016/S0022-247X(02)00395-5 doi: 10.1016/S0022-247X(02)00395-5
    [25] D. Wodarz, Ecological and evolutionary principles in immunology, Ecol. Lett., 9 (2006), 694–705. https://doi.org/10.1111/j.1461-0248.2006.00921.x doi: 10.1111/j.1461-0248.2006.00921.x
    [26] A. M. Elaiw, S. A. Azoz, Global properties of a class of HIV infection models with Beddington-DeAngelis functional response, Math. Methods Appl. Sci., 36 (2013), 383–394. https://doi.org/10.1002/mma.2596 doi: 10.1002/mma.2596
    [27] G. Huang, W. Ma, Y. Takeuchi, Global analysis for delay virus dynamics model with Beddington-DeAngelis functional response, Appl. Math. Lett., 24 (2011), 1199–1203. https://doi.org/10.1016/j.aml.2011.02.007 doi: 10.1016/j.aml.2011.02.007
    [28] X. Wang, Y. Tao, X. Song, A delayed HIV-1 infection model with Beddington-DeAngelis functional response, Nonlinear Dyn., 62 (2010), 67–72. https://doi.org/10.1007/s11071-010-9699-1 doi: 10.1007/s11071-010-9699-1
    [29] Y. Chen, L. Wang, Z. Liu, Y. Wang, Complex dynamics for an immunosuppressive infection model with virus stimulation delay and nonlinear immune expansion, Qual. Theory Dyn. Syst., 22 (2023), 118. https://doi.org/10.1007/s12346-023-00814-y doi: 10.1007/s12346-023-00814-y
  • This article has been cited by:

    1. Preeti Devi, Bartłomiej Kizielewicz, Abhishek Guleria, Andrii Shekhovtsov, Jarosław Wątróbski, Tomasz Królikowski, Jakub Więckowski, Wojciech Sałabun, Decision Support in Selecting a Reliable Strategy for Sustainable Urban Transport Based on Laplacian Energy of T-Spherical Fuzzy Graphs, 2022, 15, 1996-1073, 4970, 10.3390/en15144970
    2. Jih-Chang Wang, Ting-Yu Chen, An Uncertain Multiple-Criteria Choice Method on Grounds of T-Spherical Fuzzy Data-Driven Correlation Measures, 2022, 0868-4952, 857, 10.15388/22-INFOR500
    3. Anas Al-Masarwah, Mohammed Alqahtani, Majdoleen Abu Qamar, Groups and Structures of Commutative Semigroups in the Context of Cubic Multi-Polar Structures, 2022, 14, 2073-8994, 1493, 10.3390/sym14071493
    4. Shan Zhao, Lefeng Zhang, Ping Xiong, PriFace: a privacy-preserving face recognition framework under untrusted server, 2023, 14, 1868-5137, 2967, 10.1007/s12652-023-04543-7
    5. Muhammad Kamran, Rashad Ismail, Shahzaib Ashraf, Nadeem Salamat, Seyma Ozon Yildirim, Ismail Naci Cangul, Decision support algorithm under SV-neutrosophic hesitant fuzzy rough information with confidence level aggregation operators, 2023, 8, 2473-6988, 11973, 10.3934/math.2023605
    6. Paul Augustine Ejegwa, Arun Sarkar, Idoko Charles Onyeke, 2023, Chapter 21, 978-3-031-35667-4, 473, 10.1007/978-3-031-35668-1_21
    7. Ting-Yu Chen, Multiple criteria decision analytic methods in management with T-spherical fuzzy information, 2023, 56, 0269-2821, 14087, 10.1007/s10462-023-10461-z
    8. Sijia Zhu, Zhe Liu, Atiqe Ur Rahman, Novel Distance Measures of Picture Fuzzy Sets and Their Applications, 2024, 49, 2193-567X, 12975, 10.1007/s13369-024-08925-7
    9. Hüseyin Kamacı, Balakrishnan Palpandi, Subramanian Petchimuthu, M. Fathima Banu, m-Polar N-soft set and its application in multi-criteria decision-making, 2025, 44, 2238-3603, 10.1007/s40314-024-03029-2
  • Reader Comments
  • © 2023 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(1226) PDF downloads(80) Cited by(1)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog