(F,E) | ε1 | ε2 | ... | εi | ... | εn |
u1 | με1(u1) | με2(u1) | ... | μεi(u1) | ... | μεn(u1) |
u2 | με1(u2) | με2(u2) | ... | μεi(u2) | ... | μεn(u2) |
: | ||||||
uj | με1(uj) | με2(uj) | ... | μεi(uj) | ... | μεn(uj) |
: | ||||||
um | με1(um) | με2(um) | ... | μεi(um) | ... | μεn(um) |
In a world the more and more affected by sudden, unpredictable natural and/or industrial disasters, with few or without warning signs, it is essential to understand, analyze and control population behaviors during such events.
Our objective is to model and investigate the actions that can be deployed by operational staff during catastrophic events in order to optimize risk management, reduce panic and save lives. For this purpose, we propose and solve an optimal control problem by using Pontryagin's Maximum Principle. Finally, we determine the best control strategy in the realistic scenario of a tsunami on the French Riviera.
Citation: Irmand Mikiela, Valentina Lanza, Nathalie Verdière, Damienne Provitolo. Optimal strategies to control human behaviors during a catastrophic event[J]. AIMS Mathematics, 2022, 7(10): 18450-18466. doi: 10.3934/math.20221015
[1] | Admi Nazra, Jenizon, Yudiantri Asdi, Zulvera . Generalized hesitant intuitionistic fuzzy N-soft sets-first result. AIMS Mathematics, 2022, 7(7): 12650-12670. doi: 10.3934/math.2022700 |
[2] | Asit Dey, Tapan Senapati, Madhumangal Pal, Guiyun Chen . A novel approach to hesitant multi-fuzzy soft set based decision-making. AIMS Mathematics, 2020, 5(3): 1985-2008. doi: 10.3934/math.2020132 |
[3] | Alaa M. Abd El-latif, Mesfer H. Alqahtani . Novel categories of supra soft continuous maps via new soft operators. AIMS Mathematics, 2024, 9(3): 7449-7470. doi: 10.3934/math.2024361 |
[4] | Tareq M. Al-shami, José Carlos R. Alcantud, Abdelwaheb Mhemdi . New generalization of fuzzy soft sets: (a,b)-Fuzzy soft sets. AIMS Mathematics, 2023, 8(2): 2995-3025. doi: 10.3934/math.2023155 |
[5] | Feng Feng, Zhe Wan, José Carlos R. Alcantud, Harish Garg . Three-way decision based on canonical soft sets of hesitant fuzzy sets. AIMS Mathematics, 2022, 7(2): 2061-2083. doi: 10.3934/math.2022118 |
[6] | Sisi Xia, Lin Chen, Haoran Yang . A soft set based approach for the decision-making problem with heterogeneous information. AIMS Mathematics, 2022, 7(12): 20420-20440. doi: 10.3934/math.20221119 |
[7] | Atiqe Ur Rahman, Muhammad Saeed, Hamiden Abd El-Wahed Khalifa, Walaa Abdullah Afifi . Decision making algorithmic techniques based on aggregation operations and similarity measures of possibility intuitionistic fuzzy hypersoft sets. AIMS Mathematics, 2022, 7(3): 3866-3895. doi: 10.3934/math.2022214 |
[8] | Ibtesam Alshammari, Islam M. Taha . On fuzzy soft β-continuity and β-irresoluteness: some new results. AIMS Mathematics, 2024, 9(5): 11304-11319. doi: 10.3934/math.2024554 |
[9] | Tram B.T. Tran, My-Phuong Ngo, Quang-Thinh Bui, Vaclav Snasel, Bay Vo . A new approach for operations on neutrosophic soft sets based on the novel norms for constructing topological structures. AIMS Mathematics, 2022, 7(6): 9603-9626. doi: 10.3934/math.2022534 |
[10] | S. Meenakshi, G. Muhiuddin, B. Elavarasan, D. Al-Kadi . Hybrid ideals in near-subtraction semigroups. AIMS Mathematics, 2022, 7(7): 13493-13507. doi: 10.3934/math.2022746 |
In a world the more and more affected by sudden, unpredictable natural and/or industrial disasters, with few or without warning signs, it is essential to understand, analyze and control population behaviors during such events.
Our objective is to model and investigate the actions that can be deployed by operational staff during catastrophic events in order to optimize risk management, reduce panic and save lives. For this purpose, we propose and solve an optimal control problem by using Pontryagin's Maximum Principle. Finally, we determine the best control strategy in the realistic scenario of a tsunami on the French Riviera.
The problems of uncertainty often occur in various fields of life, such as economics, health sciences, engineering and others as a result of uncertain data. These problems can be resolved with problem-solving techniques and models using probability theory, fuzzy sets, rough sets, soft sets and other sciences.
In 1965 Prof. L. A. Zadeh [20] introduced the fuzzy set theory to solve the problem of making decisions about objects whose data contain an element of uncertainty. In fuzzy set theory, the membership values of objects are studied, provided that the membership values are in the interval [0,1]. However, the fuzzy set theory also has limitations; thus, in 1999, Molodtsov [17] introduced the soft set (SS) theory to deal with decision-making problems involving more than one parameter or attribute. This soft set theory is used for grouping objects towards a certain parameter or attribute. Parameters or attributes in the soft set can be numbers, sentences, functions and others. If an object is related to a certain parameter, it is given a value of 1; otherwise, the value is 0. However, the fact is that some problems encountered cannot always be evaluated with real numbers in the closed interval [0, 1]. Consequently, some of them can also be evaluated with a rank (grade) in the form of a non-negative integer. Therefore, in 2018, Fatimah et al. [7] extended the soft set theory called N-soft set (NSS), in which objects studied are ranked according to a parameter or attribute.
At present, the soft set theory is progressing rapidly. Many real-life problems need decision-making, which can be represented as a SS, in which every alternative or object corresponds to one or more parameters. Some of the problems are called Condition and Decision of Decision Systems (C & DDS), in which there are two sets of parameters; Condition Parameter (CP) and Decision Parameter (DP). The CP relates to some SSs, while the DP is related to another. Gong et al. [9] proposed a method of decision-making problems of C & DDS, called the Bijective Soft Set (BSS), as a new type of SS. A BSS is a SS where every object is related to only one parameter, and the union of partition by sets of the parameter is a universe. On the other hand, as said before, some decision-making problems are represented as NSSs, and some may have characteristics of which every alternative can be mapped only into one parameter, and the union of partition by sets of the parameter is also a universe.
As an example, a government agency needs to know what parameters in the Condition Parameter affect the education index in the Decision Parameter of a village (alternative). Suppose there are three CPs; C1, C2 and C3. C1 states the set of parameters related to the level of health services at a1= clinic, a2= public health centre and a3= hospital. C2 states the set of parameters related to the level of ease of access to education to b1= elementary school, b2= junior high school and b3= senior high school and C3 states the set of parameters that categorizes the village economy, namely c1= family economy, c2= village budget and c3= village fund allocation. Moreover, DP is the education index in the village consisting of d1= high and d2= low. If every object corresponds to only one parameter and the union of partition by parameter sets is a universe, then Gong's method can be applied in the case of SS. However, in the case of NSS, Gong's method fails. Therefore, a method in the NSS environment should be extended in order to solve decision-making problems containing CP and DP.
Some studies on bijective soft sets and their extensions are found in [11] and [14], where the concept of bijective interval-valued fuzzy soft set and bijective soft matrix theory are introduced and some of their operations and properties are discussed and studied.
The applications of bijective soft set theory are also extended for decision-making problems. In [6], a new supervised hybrid bijective soft set neural network-based classification method is introduced to predict the Egyptian neonatal jaundice dataset. Gopal et al. [12] classifies disease data using a bijective soft set. Hong et al. [13] proposed the concept of information quantity of condition parameter set and parameter reduction of bijective soft sets based on the information quantity of every parameter. Kumar et al. [15] present a novel approach based on Bijective soft sets for generating classification rules from the data set. Kumar et al. [16] discuss the bijective-soft-set-based classification method for gene expression data of three different cancers, which are breast cancer, lung cancer and leukemia. Tiwari et al.[19] introduces a novel method to handle the qualitative description and subjective judgements of designers on design criteria to design concepts through the bijective soft sets-based method for concept selection.
Furthermore, Gong et al. in 2013, [10] also introduced a particular type of fuzzy soft set called the bijective fuzzy soft set. A bijective fuzzy soft set combines a bijective soft set and a fuzzy soft set. Moreover, research related to decision-making using the approach of the N-soft set continues to grow. Akram et al. [2] developed an application of parameter reduction of N-soft sets. Akram et al. [1] introduced a new hybrid model called fuzzy N-soft sets, investigated some useful properties of fuzzy N-soft sets, constructed fundamental operations on them and presented algorithms as potential applications of fuzzy N-soft sets in decision-making. Fatimah and Alcantud [8] introduced a novel hybrid model called the multi-fuzzy N-soft set and designed an adjustable decision-making methodology for solving problems where the inputs appear in this form. Zhang et al. [21] proposed a new hybrid model called N-soft rough sets, which can be seen as a combination of rough sets and N-soft sets.
We propose a new model in the NSS environment called Bijective N-soft set (BNSS) for solving decision-making problems containing CP and DP, of which every object corresponds to only one parameter and the union of partition by parameter sets is a universe. Based on BNSS, a complement of BNSS and the operation AND are constructed in order to study the relationship between BNSSs. Later, the Condition and Decision of the Decision Systems in the NSS environment are introduced by defining the dependent degree of two NSSs and the reduction of the Decision Systems. Furthermore, by the definitions, an algorithm to study the application of BNSS for decision-making problems are developed.
This paper is organized as follows. Section 2 recalls definitions of fuzzy sets, soft sets, fuzzy soft sets, N-soft sets, bijective soft sets and bijective fuzzy soft sets. Section 3 introduces our new model BNSSs, its complement, operations and properties. This section also presents some definitions corresponding to the Decision System in NSSs. In Section 4, an algorithm as an application of a BNSS is constructed, referring to the definitions related to the Decision System, and a numerical example illustrating a decision-making problem is presented in the BNSS information using the algorithm. In section 5, we present the comparative studies to show the potential benefit of our contribution. Lastly, section 6 concludes the paper.
This section reviews some definitions, such as the fuzzy set (FS), soft set (SS), fuzzy soft set (FSS), N-soft set (NSS), bijective soft set (BSS) and bijective fuzzy soft set (BFSS).
The fuzzy set theory is generally employed to solve decision-making problems for objects whose data contains an element of uncertainty. The following is a definition of the fuzzy set introduced by L. A. Zadeh in 1965 [20].
Definition 2.1. [10] Suppose that U is a set of objects. A fuzzy set (FS) A over U is defined as
A={⟨u;μ(u)⟩|u∈U}, |
where the function μ:U→[0,1] is called membership function, and μ(u) is membership value of u∈U in FS A.
Example 1. Consider that U={u1,u2,u3} is the set of several lamp brands in a shop. The fuzzy set that describes the "brightness of the lights in illuminating a room" can be defined as follows,
μ(u1)=0.3,μ(u2)=0.7,μ(u3)=0.5. |
Furthermore, it can be stated that the fuzzy set A over the set of several lamp brands in a store is
A={⟨u1;0.3⟩,⟨u2;0.7⟩,⟨u3;0.5⟩}. |
Soft set theory is used for grouping objects into a certain attribute or parameter which is expressed by the number 1 or 0. The following is the definition of soft set introduced by Molodtsov in 1999 [17].
Definition 2.2. [17] Let U be a set of objects, P(U) is the power set of U and E is a set of parameters or attributes. A pair (F,E) is called a soft set (SS) over U if and only if F:E→P(U) is a function such that
(F,E)={(εi,F(εi))|εi∈E,F(εi)∈P(U)}. |
For simplification, a soft set can be written as
(F,E)={(εi,{(uj,μεi(uj))|uj∈U})|εi∈E}, | (2.1) |
where μεi(uj):={1,ifuj∈F(εi),0,others.
Here, μεi(uj) is called the grade or rating of the objek uj with respect to the parameter εi.
By the above definition, a soft set can be represented by a table called the Representation Table of a soft set (see Table 1).
(F,E) | ε1 | ε2 | ... | εi | ... | εn |
u1 | με1(u1) | με2(u1) | ... | μεi(u1) | ... | μεn(u1) |
u2 | με1(u2) | με2(u2) | ... | μεi(u2) | ... | μεn(u2) |
: | ||||||
uj | με1(uj) | με2(uj) | ... | μεi(uj) | ... | μεn(uj) |
: | ||||||
um | με1(um) | με2(um) | ... | μεi(um) | ... | μεn(um) |
Example 2. Consider that U={u1,u2,u3,u4} is the set of students enrolled in a mathematics department through the SNMPTN (State University National Entrance Exam). Assume E={e1,e2,e3} is the set of attributes where e1,e2 and e3 respectively state the required qualifications "School Accreditation of A", "Minimum Math Score of 80" and "Have Achievement in Mathematics". After conducting an assessment that groups the students above based on the three parameters, the assessment results for each student are obtained as follows. Students u1,u2,u3 include students with school accreditation of A, students u1,u2,u4 include students with a minimum math score of 80 and students u2,u3 include students who have achievements in mathematics. These results can be expressed in a soft set as follows, F(e1)={u1,u2,u3}, F(e2)={u1,u2,u4}, F(e3)={u2,u3}. Therefore, (F,E)={(e1,{u1,u2,u3}),(e2,{u1,u2,u4}),(e3,{u2,u3})}.
Table 2 is the Representation Table of the above SS (F,E), where the value of 1 states that an element is related to an attribute, while the value of 0 states that an element is not related to an attribute set. In Table 2 it can be seen that students u1,u2,u3 include students with school accreditation of A, students u1,u2,u4 include students with the minimum math score of 80, and students u2,u3 include students with good academic achievements in mathematics.
(F,E) | e1 | e2 | e3 |
u1 | 1 | 1 | 0 |
u2 | 1 | 1 | 1 |
u3 | 1 | 0 | 1 |
u4 | 0 | 1 | 0 |
Definition 2.3. [17] Suppose that (F,A) and (G,B) are two soft sets over U. The operation AND between (F,A) and (G,B), denoted by (F,A) AND (G,B), is a soft set (H,A×B) = (F,A)∧(G,B) defined by H(a,b)=F(a)∩G(b).
Example 3. Consider (F,A) and (G,B) are two soft sets over U which are represented by Tables 3 and 4, respectively. (F,A) AND (G,B) are shown in Table 5.
(F,A) | a1 | a2 | a3 |
u1 | 1 | 0 | 1 |
u2 | 1 | 1 | 0 |
u3 | 1 | 1 | 1 |
(G,B) | b1 | b2 |
u1 | 1 | 1 |
u2 | 1 | 0 |
u3 | 0 | 1 |
(H,A×B) | (a1,b1) | (a1,b2) | (a2,b1) | (a2,b2) | (a3,b1) | (a3,b2) |
u1 | 1 | 1 | 0 | 0 | 1 | 1 |
u2 | 1 | 0 | 1 | 0 | 0 | 0 |
u3 | 0 | 1 | 0 | 1 | 0 | 1 |
In Table 5, the grade of every object associated with the parameter (a,b)∈A×B is obtained from the minimum grade of the object associated with parameters a and b.
In the fuzzy soft set theory, each object associated with a particular attribute is assigned a membership value expressed in a real number between 0 and 1. The fuzzy soft set is defined as a combination of concepts between fuzzy sets and soft sets.
Definition 2.4. [18] Let U be the set of objects, E is a set of parameters/attribute and A⊆E. A fuzzy soft set (FSS) GA over U is a set
GA={(a,gA(a))|a∈A,gA(a)∈IU}, |
where gA:A→IU is a function and IU is a collection of all fuzzy sets over U. Here,
gA(a)={(u;μa(u))|u∈U}, |
with μa:U→[0,1] is a FS over U. Therefore, GA={(a,{(u;μa(u))|u∈U})|a∈A}.
A fuzzy soft set can be presented by a Representation Table as in Table 6.
GA | a1 | a2 | ... | ai | ... | an |
u1 | μa1(u1) | μa2(u1) | ... | μai(u1) | ... | μan(u1) |
u2 | μa1(u2) | μa2(u2) | ... | μai(u2) | ... | μan(u2) |
: | ||||||
uj | μa1(uj) | μa2(uj) | ... | μai(uj) | ... | μan(uj) |
: | ||||||
um | μa1(um) | μa2(um) | ... | μai(um) | ... | μan(um) |
Example 4. Consider that a cosmetics shop conducts a product feasibility test before being sold with U={u1,u2,u3,u4} being the set of products to be sold. Assume E={e1,e2,e3,e4,e5,e6} is a set of attributes and A={e1,e2,e3} is a set of selected attributes with e1 denoting quality product ingredients, e2 denoting low price, and e3 denoting packaging that meets standards. After making observations that describe the level of quality of product materials, cheapness and packaging that meets the standards of each product above, the following results are obtained for each product:
G(e1)={(u1;0.70),(u2;0.80),(u3;0.85),(u4;0.75)},G(e2)={(u1;0.80),(u2;0.80),(u3;0.80),(u4;0.80)},G(e3)={(u1;0.85),(u2;0.78),(u3;0.90),(u4;0.80)}. |
Based on the observations above, G(e1) states the level of material quality in which the first product (u1) is given a value of 0.70, the second product (u2) is given a value of 0.80, the third product (u3) is given a value of 0.85 and the fourth product (u4) is given a value of 0.75. The same interpretation applies to the level of cheapness and packaging that meets the standards of each product. Thus, the above observations can be expressed in a fuzzy soft set GA over U as follows.
GA={(e1,{(u1;0.70),(u2;0.80),(u3;0.85),(u4;0.75)}),(e2,{(u1;0.80),(u2;0.80),(u3;0.80),(u4;0.80)}),(e3,{(u1;0.85),(u2;0.78),(u3;0.90),(u4;0.80)})}. |
The fuzzy soft set GA can also be written in the form of Table 7.
U\ A | e1 | e2 | e3 |
u1 | 0.70 | 0.80 | 0.85 |
u2 | 0.80 | 0.80 | 0.78 |
u3 | 0.85 | 0.80 | 0.90 |
u4 | 0.75 | 0.80 | 0.80 |
In the N-soft set theory, each object is given a rating or grade as a non-negative integer number that meets a particular attribute. The following is a definition of the N-soft set introduced by Fatimah, et al. in 2018 [7], which is an expansion of the soft set concept.
Definition 2.5. [7] Suppose that U is a set of objects, E is a set of parameters and A⊆E. Let R={0,1,2,…,N−1} be the set of grades or ratings where N∈{2,3,4,...}. Triple (F,A,N) is called an N-soft set (NSS) over U, if F:A→2U×R is a function where for each ai∈A, there is an unique (uj,rai(uj))∈U×R such that (uj,rai(uj))∈F(ai),uj∈U,rai(uj)∈R. An NSS can be expressed as
(F,A,N)={(ai,F(ai))|ai∈A}={(ai,{(uj,rai(uj))|uj∈U})|ai∈A} |
with F(ai)={(uj,rai(uj))|uj∈U}. For (uj,rai(uj))∈F(ai), we may write F(ai)(uj)=rai(uj).
The set of attributes used in the N-soft set is a benchmark or reference in determining the rating of each object. N-soft sets can also be expressed in a table called the Representation Table of an N-soft set (Table 8).
(F,A,N) | a1 | a2 | ... | aq |
u1 | ra1(u1) | ra2(u1) | ... | raq(u1) |
u2 | ra1(u2) | ra2(u2) | ... | raq(u2) |
: | ||||
: | ||||
up | ra1(up) | ra2(up) | ... | raq(up) |
Example 5. Consider U={u1,u2,u3,u4} is the set of objects of water that is suitable for drinking, where u1,u2,u3,u4 respectively represent well water, water from Municipal Waterworks (PDAM), rainwater and water from a spring. Then assume A⊆E is a set of attributes in the form of institutions that test the quality of the four types of water above as fit for drinking, where A={a1 = Provincial Health Office, a2 = Department of Chemistry, a3 = Department of Public Health, a4 = Department of Environmental Engineering, a5 = Perum Jasa Tirta Ⅱ, a6 = Sucofindo}. Furthermore, a rating will be given to each water based on the assessment predicate carried out by each institution with conditions as follows:
(1) " 5 " for the very good predicate.
(2) " 4 " for the good predicate.
(3) " 3 " for a rather good predicate.
(4) " 2 " for fair predicate.
(5) " 1 " for rather bad predicate.
(6) " 0 " for the bad predicate.
Each of these institutions fully determines the definition of rating standards. Based on the assessment results from each of these institutions, rating data for each object can be obtained, which can be expressed as the following 6-soft set.
I(a1)={(u1,3),(u2,5),(u3,2),(u4,4)},
I(a2)={(u1,4),(u2,5),(u3,4),(u4,2)},
I(a3)={(u1,4),(u2,3),(u3,3),(u4,3)},
I(a4)={(u1,3),(u2,3),(u3,3),(u4,3)},
I(a5)={(u1,5),(u2,4),(u3,4),(u4,4)},
I(a6)={(u1,4),(u2,4),(u3,4),(u4,3)}. The above example can be stated in the form of Table 9.
(I,A,6) | a1 | a2 | a3 | a4 | a5 | a6 |
u1 | 3 | 4 | 4 | 3 | 5 | 4 |
u2 | 5 | 5 | 3 | 3 | 4 | 4 |
u3 | 2 | 4 | 3 | 3 | 4 | 4 |
u4 | 4 | 2 | 3 | 3 | 4 | 3 |
In Table 9, the assessment carried out shows that by a1= Provincial Health Office, the first water (u1) gets a rating of 3, the second water (u2) gets a rating of 5, the third water (u3) gets a rating of 2 and the fourth water (u4) obtain a rating of 4. The same interpretation applies to the second to sixth institutions for each type of water.
Definition 2.6. [7] Let (F,A,N1) and (G,B,N2) be two N-soft sets over U. The operation AND between (F,A,N1) and (G,B,N2), denote by (F,A,N1) AND (G,B,N2) = (F,A,N1)∧(G,B,N2) is an NSS (H,A×B,min(N1,N2)) where, for each c=(a,b)∈A×B and u∈U,
(u,rc(u))∈H(c)⇔rc(u):=min(ra(u),rb(u)),for (u,ra(u))∈F(a)and(u,rb(u))∈G(b). |
Example 6. Consider that (F,A,7) and (G,B,6) are two N-soft sets over U which are represented by Tables 10 and 11 respectively. (F,A,7) AND (G,B,6)) are shown in Table 12.
(F,A,7) | a1 | a2 | a3 |
u1 | 4 | 3 | 1 |
u2 | 2 | 6 | 0 |
u3 | 1 | 0 | 5 |
(G,B,6) | b1 | b2 |
u1 | 3 | 5 |
u2 | 1 | 4 |
u3 | 2 | 0 |
(H,A×B,6) | (a1,b1) | (a1,b2) | (a2,b1) | (a2,b2) | (a3,b1) | (a3,b2) |
u1 | 3 | 3 | 1 | 4 | 3 | 1 |
u2 | 1 | 1 | 0 | 2 | 4 | 0 |
u3 | 1 | 0 | 2 | 0 | 0 | 0 |
In Table 12, the rating of each object associated with attribute (a,b)∈A×B is obtained from the minimum rating of the object associated with attributes a and b.
Definition 2.7. [2] Let (F1,A,N) and (F2,B,N) be two N-soft sets over U. The NSS (F1,A,N) is called a subset of the N-soft set (F2,B,N), denoted by (F1,A,N)⋐(F2,B,N) if
(1) A⊆B,
(2) ∀ai∈A, and uj∈U,r1ai(uj)≤r2bi(uj), where (uj,r1ai(uj))∈F1(ai) and (uj,r2bi(uj))∈F2(bi).
Definition 2.8. [7] Let (F1,A,N) and (F2,B,N) be two N-soft sets over U. The NSSs (F1,A,N1) and (F2,B,N2) are equal if
(1) F1=F2,
(2) A=B,
(3) N1=N2.
In the bijective soft set theory, each object is only related to one particular parameter or attribute. The following is the definition of a bijective soft set, a particular type of soft set, introduced by Gong, et al. in 2010 [9].
Definition 2.9. [9] Let E be a set of attributes and (F,E) is a SS over U where F is a map F:E→P(U). The SS (F,E) is called a bijective soft set (BSS) if
(1) ⋃e∈EF(e)=U,
(2) For two attributes ei,ej∈E,ei≠ej, then F(ei)∩F(ej)=∅.
Example 7. Consider that U={x1,x2,…..,x7} is the set of several job applicants in a company. Assume that E={e1,e2,e3,e4} is a set of attributes where e1,e2,e3 and e4, respectively, state the required qualifications, namely "Responsible", "Hard Working", "Work Experience" and "Soft skills". After conducting an assessment, the job applicants are grouped based on these four parameters, and the assessment results for each job applicant are obtained as follows. Applicants x1,x2,x3 include responsible applicants, applicants x4,x5,x6 include hard-working applicants, the applicant x7 includes applicants with work experience and applicants x4,x5,x6,x7 include applicants with soft skills. These assessments are represented as follows:
F(e1)={x1,x2,x3},F(e2)={x4,x5,x6},F(e3)={x7},F(e4)={x4,x5,x6,x7}. |
Based on Definition 2.9, (F,{e1,e2,e3}) and (F,{e1,e4}) are bijective soft sets, while (F,{e1,e2}) and (F,{e1,e3}) are not. The Representation Table of BSS (F,{e1,e2,e3}) is in Table 13.
(F,E) | e1 | e2 | e3 |
u1 | 1 | 0 | 0 |
u2 | 1 | 0 | 0 |
u3 | 1 | 0 | 0 |
u4 | 0 | 1 | 0 |
u5 | 0 | 1 | 0 |
u6 | 0 | 1 | 0 |
u7 | 0 | 0 | 1 |
Now, we recall a theorem that the operation AND between two bijective soft sets is a bijective soft set.
Theorem 2.10. [9] Suppose that (F,A) and (G,B) are two bijective soft sets. The operation AND between (F,A) and (G,B), denoted by (F,A)∧(G,B)=(H,A×B), is also a bijective soft set.
The following describes the definition of bijective fuzzy soft sets introduced by Gong et al. in 2013 [10]. First, the definition of λ-level soft set is given where λ∈[0,1] is a threshold of the membership value used to transform the fuzzy soft set into a soft set. The threshold or λ∈[0,1] chosen depends on the decision maker. If λ chosen results in a bijective soft set, it is included in this study; otherwise, it is not.
Definition 2.11. [10] Given a fuzzy soft set
FA={(a,{(u;μa(u))|u∈U})|a∈A}, |
over U. Let λ∈[0,1]. A λ-level soft set of the fuzzy soft set FA is a soft set
(G,A)={(a,{(u,ξuλ(a))|u∈U})|a∈A}, |
where ξuλ(a):={1,ifμa(u)⩾λ,0,elsewhere.
Here, ξuλ(a) is called the λ-level soft set characteristic function of the fuzzy soft set FA.
Example 8. Given a FSS FA as in Table 14. Suppose a decision maker wants to consider each object whose membership value is at least 0.75. Then, by choosing λ=0.75 as a threshold, it is obtained a 0.75-level soft set of the fuzzy soft set FA as follows (see also Table 15):
(G,A)={(a1,{(u1,1),(u2,0),(u3,0),(u4,0),(u5,0),(u6,1)}),(a2,{(u1,0),(u2,1),(u3,1),(u4,0),(u5,1),(u6,0)}),(a3,{(u1,0),(u2,0),(u3,0),(u4,1),(u5,0),(u6,0)})}. |
FA | a1 | a2 | a3 |
u1 | 0.75 | 0.30 | 0.30 |
u2 | 0.55 | 0.80 | 0.70 |
u3 | 0.60 | 0.85 | 0.60 |
u4 | 0.30 | 0.55 | 0.80 |
u5 | 0.70 | 0.80 | 0.55 |
u6 | 0.80 | 0.55 | 0.25 |
(G,A) | a1 | a2 | a3 |
u1 | 1 | 0 | 0 |
u2 | 0 | 1 | 0 |
u3 | 0 | 1 | 0 |
u4 | 0 | 0 | 1 |
u5 | 0 | 1 | 0 |
u6 | 1 | 0 | 0 |
The following is a definition of a fuzzy soft set called a bijective fuzzy soft set.
Definition 2.12. [10] Let A be a set of parameters or attributes. Suppose that (G,A) is a λ-level soft set of a fuzzy soft set FA over U. FA is called a λ-level bijective fuzzy soft set if (G,A) is a bijective soft set.
For simplicity, a λ-level bijective fuzzy soft set will be called a bijective fuzzy soft set when λ is already known.
Example 9. Based on Definition 2.9, in Example 8 (Table 15), the 0.75-level soft set of fuzzy soft set FA qualifies as a bijective soft set because,
ⅰ. ⋃a∈AG(a)=U,
ⅱ. For a1,a2,a3∈A,, G(a1)∩G(a2)=∅, G(a1)∩G(a3)=∅ and G(a2)∩G(a3)=∅.
Therefore, a bijective soft set (G,A) is obtained. By Definition 2.12, FA is the 0.75-level bijective fuzzy soft set.
Definition 2.13. [10] Let FA be a λ-level bijective fuzzy soft set over U with
FA={(a,{(u;μa(u))|u∈U}|a∈A}. |
Suppose that (G,A) is a λ-level soft set of the fuzzy soft set FA with
(G,A)={(a,{(u,ξuλ(a))|u∈U})|a∈A}. |
The combined λ-level bijective fuzzy soft set of FA denoted by HA is defined as
HA={(a,H(a))|a∈A}, |
with H(a)={(u,μa(u)⋅ξuλ(a))|u∈U}. Clearly by definition, HA is a fuzzy soft set.
Example 10. Referring to Example 8, then based on Definition 2.13, the combined 0.75-level bijective fuzzy soft set of FA can be stated in Table 16.
HA | a1 | a2 | a3 |
u1 | 0.75 | 0 | 0 |
u2 | 0 | 0.80 | 0 |
u3 | 0 | 0.85 | 0 |
u4 | 0 | 0 | 0.80 |
u5 | 0 | 0.80 | 0 |
u6 | 0.80 | 0 | 0 |
Table 16 is the only combined 0.75-level bijective fuzzy soft set of FA, in which the membership values for objects u1,u2,u3,u4,u5,u6 are obtained from the initial membership value owned by each object multiplied by the characteristic function on each of these objects.
Considering the rating of the N-soft set as a membership value in terms of the fuzzy soft set, the idea in Definition 2.12 can be adopted and applied to N-soft sets. On this basis, the study of the bijective N-soft set is developed, including the properties derived from the bijective N-soft set concept. The following describes in detail the definition of a bijective N-soft set. First, a T-level soft set is defined where T∈{1,2,...,N−1} is a threshold of the rating used to transform the N-soft set into a soft set. The threshold or T∈{1,2,...,N−1} chosen depends on the decision maker. If T chosen results in a bijective soft set, it is included in this study; otherwise, it is not included.
Definition 3.1. Let R={0,1,2,...,N−1} be a set of ratings or grades, with N∈{2,3,4,...}. Given an N-soft set
(F,A,N)={(a,{(u,ra(u))|u∈U})|a∈A}, |
over U with ra(u)∈R, and T∈{1,2,...,N−1}. A T-level soft set of the N-soft set (F,A,N) is defined as a soft set (G, A) with
(G,A)={(a,{(u,ξuT(a))|u∈U})|a∈A}, |
where ξuT(a):={1,ifra(u)⩾T,0,elsewhere.
Here, ξuT(a) is called the T-level soft set characteristic function of the N-soft set (F,A,N).
Example 11. Given a 6-soft set (F,A,6) as in Table 17.
(F,A,6) | a1 | a2 | a3 |
u1 | 5 | 2 | 1 |
u2 | 0 | 3 | 2 |
u3 | 1 | 2 | 4 |
u4 | 4 | 2 | 0 |
u5 | 3 | 1 | 1 |
u6 | 0 | 5 | 1 |
Suppose a decision maker wants to consider objects with a minimum rating of three; then the threshold T=3 is chosen. The 3-level soft set (G,A) of 6-soft set (F,A,6) is obtained as follows:
(G,A)={(a1,{(u1,1),(u2,0),(u3,0),(u4,1),(u5,1),(u6,0)}),(a2,{(u1,0),(u2,1),(u3,0),(u4,0),(u5,0),(u6,1)}),(a3,{(u1,0),(u2,0),(u3,1),(u4,0),(u5,0),(u6,0)})}. |
Table 18 is the Representation Table of (G,A).
(G,A) | a1 | a2 | a3 |
u1 | 1 | 0 | 0 |
u2 | 0 | 1 | 0 |
u3 | 0 | 0 | 1 |
u4 | 1 | 0 | 0 |
u5 | 1 | 0 | 0 |
u6 | 0 | 1 | 0 |
In Table 18, for an object and particular parameter, the rating on (G,A) will have a value of 1 if the rating on (F,A,6) is greater than or equal to T. Furthermore, the rating on (G,A) will have a value of 0 if the rating on (F,A,6) is less than T.
Now, a definition of when an N-soft set is called a bijective N-soft set is introduced.
Definition 3.2. Let A be a set of parameter or attributes and (G,A) is a T-level soft set of the N-soft set (F,A,N) over U. (F,A,N) is called a T-level bijective N-soft set if (G,A) is a bijective soft set.
For simplicity, a T-level bijective N-soft set is said a bijective N-soft set if T is already known.
Example 12. Based on the Definition 2.9, 3-level soft set (G,A) of (F,A,6), as shown in Table 18, satisfies the condition as bijective soft set, because
ⅰ. ⋃a∈AG(a)=U,
ⅱ. For a1,a2,a3∈A,, G(a1)∩G(a2)=∅, G(a1)∩G(a3)=∅ and G(a2)∩G(a3)=∅.
Therefore, (G,A) is a bijective soft set. Then, based on Definition 3.2, (F,A,6) is a 3-level bijective 6-soft set.
Definition 3.3. Let (F,A,N) be a T-level bijective N-soft set over U with
(F,A,N)={(a,{(u,ra(u))|u∈U})|a∈A}. |
Let (G,A) be a T-level soft set of the N-soft set (F,A,N) with
(G,A)={(a,{(u,ξuT(a))|u∈U})|a∈A}. |
The combined T-level bijective N-soft set of (F,A,N) denoted by (H,A,N) is defined as
(H,A,N)={(a,H(a))|a∈A}, |
with H(a)={(u,ra(u)⋅ξuT(a))|uj∈U}. It is clear that (H,A,N) is an N-soft set.
Example 13. For Example 11, by Definition 3.3, the combined 3-level bijective-soft set of (F,A,6) can be stated in Table 19.
(H,A,6) | a1 | a2 | a3 |
u1 | 5 | 0 | 0 |
u2 | 0 | 3 | 0 |
u3 | 0 | 0 | 4 |
u4 | 4 | 0 | 0 |
u5 | 3 | 0 | 0 |
u6 | 0 | 5 | 0 |
The combined 3-level bijective 6-soft set of (F,A,6) as in Table 19 is unique, as the rating of each object u1,u2,u3,u4,u5,u6 is obtained from the initial rank owned by each object multiplied by the characteristic function of each of these objects.
Definition 3.4. Let (F,A,N) be a T-level bijective N-soft set over U with
(F,A,N)={(a,{(u,ra(u))|u∈U})|a∈A}. |
Let (H,A,N) be the combined T-level bijective N-soft set of (F,A,N) with
(H,A,N)={(a,{(u,ra(u)⋅ξuT(a))|u∈U})|a∈A}. |
The rating total of (H,A,N) is defined as
H=∑u∈U∑a∈Ar′a(u), |
where r′a(u)=ra(u)⋅ξuT(a),∀u∈U,a∈A.
Example 14. For Table 19, the rating total of (H,A,6) is H=∑u∈U∑a∈Ar′a(u)=5+3+4+4+3+5=24.
Definition 3.5. Let (F,A,N) be a T-level bijective N-soft set. If the T-level soft set of (F,A,N) has one attribute column in which all members have values of 1 and the other columns have values of 0, then (F,A,N) is called the vertical T-level bijective N-soft set.
Example 15. Let (J,A,6) be the 3-level bijective 6-soft set as in Table 20. Since the 3-level soft set of (J,A,6) is as in Table 21, given that each object has a value of 1 in attribute column a1 and a value of 0 in attribute columns a2 and a3, thus (J,A,6) is the vertical 3-level bijective 6-soft set.
(J,A,6) | a1 | a2 | a3 |
u1 | 5 | 1 | 2 |
u2 | 5 | 0 | 1 |
u3 | 3 | 2 | 1 |
u4 | 4 | 1 | 2 |
u5 | 3 | 2 | 1 |
u6 | 5 | 2 | 1 |
(J1,A) | a1 | a2 | a3 |
u1 | 1 | 0 | 0 |
u2 | 1 | 0 | 0 |
u3 | 1 | 0 | 0 |
u4 | 1 | 0 | 0 |
u5 | 1 | 0 | 0 |
u6 | 1 | 0 | 0 |
Definition 3.6. Let (F,A,N) be the T-level bijective N-soft set. Suppose that |U| and |A| denote the number of elements of U and A, respectively. For |U|=|A|, if the T-level soft set of (F,A,N) has values of 1 in the diagonal, and in the others are zero, then (F,A,N) is called the diagonal T-level bijective N-soft set.
Example 16. Let (F,A,6) be the 3-level bijective 6-soft set as in Table 22, with |U|=|A|. Since 3-level soft set of (F,A,6) is as in Table 23 thus (F,A,6) is the diagonal 3-level bijective 6-soft set.
(F,A,6) | a1 | a2 | a3 | a4 |
u1 | 5 | 1 | 2 | 1 |
u2 | 0 | 5 | 2 | 1 |
u3 | 1 | 2 | 3 | 0 |
u4 | 1 | 2 | 1 | 4 |
(G,A) | a1 | a2 | a3 | a4 |
u1 | 1 | 0 | 0 | 0 |
u2 | 0 | 1 | 0 | 0 |
u3 | 0 | 0 | 1 | 0 |
u4 | 0 | 0 | 0 | 1 |
Definition 3.7. Let (F,A,N) be the T-level bijective N-soft set with
(F,A,N)={(a,{(u,ra(u))|u∈U})|a∈A}. |
The complement T-level bijective N-soft set of (F,A,N) for |A|=2 is the NSS (Fc,A,N) where
(Fc,A,N)={(a,Fc(a))|a∈A}, |
with Fc(a):={(u,((N−1)−ra(u))|u∈U}.
Example 17. Suppose that (F,A,8) is the 4-level bijective 8-soft set with |A|=2, as in Table 24. The complement 4-level bijective 8-soft set of (F,A,8) is as in Table 25. Table 25 is the only complement 4-level bijective 8-soft set of (F,A,8) given that the rating of each object is obtained from the maximum rating of 7 minus the initial rating of the object.
(F,A,8) | a1 | a2 |
u1 | 7 | 2 |
u2 | 3 | 4 |
u3 | 2 | 5 |
u4 | 0 | 6 |
u5 | 4 | 1 |
u6 | 2 | 4 |
(Fc,A,8) | a1 | a2 |
u1 | 0 | 5 |
u2 | 4 | 3 |
u3 | 5 | 2 |
u4 | 7 | 1 |
u5 | 3 | 6 |
u6 | 5 | 3 |
Now, we propose a proposition, given that the complement T-level bijective N-soft set is the T-level bijective N-soft set.
Proposition 1. Let (F,A,N) be the T-level bijective N-soft set, |A|=2, N={4,6,8,...}, and T=12N. The complement T-level bijective N-soft set of (F,A,N), namely (Fc,A,N) is the T-level bijective N-soft set.
Proof. Let (F,A,N) be the T-level bijective N-soft, |A|=2, N={4,6,8,...} and T=12N. Suppose that (F,A,N) and (Fc,A,N) are represented as in Table 26 and Table 27, respectively.
(F,A,N) | a1 | a2 |
u1 | ra1(u1) | ra2(u1) |
u2 | ra1(u2) | ra2(u2) |
: | : | : |
: | : | : |
uj | ra1(uj) | ra2(uj) |
(Fc,A,N) | a1 | a2 |
u1 | (N−1)−ra1(u1) | (N−1)−ra2(u1) |
u2 | (N−1)−ra1(u2) | (N−1)−ra2(u2) |
: | : | : |
: | : | : |
uj | (N−1)−ra1(uj) | (N−1)−ra2(uj) |
(Fc,A,N) will be the T-level bijective N-soft set, ∀uj∈U, if (N−1)−ra1(uj)⩾T then (N−1)−ra2(uj)<T, or conversely, if (N−1)−ra1(uj)<T then (N−1)−ra2(uj)⩾T.
Since (F,A,N) is the T-level bijective N-soft set, if ra1(uj)⩾T then ra2(uj)<T or conversely, if ra1(uj)<T then ra2(uj)⩾T.
The proposition now can be confirmed, if ra1(uj)⩾T then (N−1)−ra1(uj)<T and if ra2(uj)<T then (N−1)−ra2(uj)⩾T or conversely, if ra1(uj)<T then (N−1)−ra1(uj)⩾T and if ra2(uj)⩾T then (N−1)−ra2(uj)<T.
Without of loss generality, if ra1(uj)≥T then it will be proven that (N−1)−ra1(uj)<T, and if ra2(uj)<T then it will be proved that (N−1)−ra2(uj)≥T, as follows, respectively:
(1) By the contradiction, assume that (N−1)−ra1(uj)≥T. Consider that,
(N−1)−ra1(uj)≥T,(N−1)−ra1(uj)≥12N,−ra1(uj)≥12N−N+1,−ra1(uj)≥−12N+1,ra1(uj)≤12N−1,ra1(uj)≤12N−1<12N,ra1(uj)<12N,ra1(uj)<T. |
This contradicts the hypothesis ra1(uj)≥T.
(2) Similar to (1), assume that (N−1)−ra2(uj)<T. Consider that
(N−1)−ra2(uj)<T,(N−1)−ra2(uj)<12N,−ra2(uj)<12N−N+1,−ra2(uj)<−12N+1,ra2(uj)>12N−1,ra2(uj)>T−1. |
Hence T−1<ra2(uj)<T. This is impossible because T and ra2(uj) are natural numbers.
Therefore, it is proved that, ∀uj∈U, if (N−1)−ra1(uj)⩾T then (N−1)−ra2(uj)<T, or conversely, if (N−1)−ra1(uj)<T then (N−1)−ra2(uj)⩾T. This means that (Fc,A,N) is the T-level bijective N-soft set.
Proposition 2. Let (F,A,N) be the T-level bijective N-soft set, |A|=2, N={3,5,7,...} and T=12(N+1). The complement T-level bijective N-soft set of (F,A,N), namely, (Fc,A,N) is the (T−1)-level bijective N-soft set.
Proof. Let (F,A,N) be the T-level bijective N-soft set, |A|=2, N={3,5,7,...} and T=12(N+1). Suppose that (F,A,N) and (Fc,A,N) are represented as in Table 26 and Table 27, respectively. The (Fc,A,N) will be the (T−1)-level bijective N-soft set, ∀uj∈U, if (N−1)−ra1(uj)⩾T−1 then (N−1)−ra2(uj)<T−1, or conversely, if (N−1)−ra1(uj)<T−1 then (N−1)−ra2(uj)⩾T−1. Since (F,A,N) is the T-level bijective N-soft set, if ra1(uj)⩾T then ra2(uj)<T, or conversely, if ra1(uj)<T then ra2(uj)⩾T.
The proposition can be proved, if ra1(uj)⩾T then (N−1)−ra1(uj)<T−1 and if ra2(uj)<T then (N−1)−ra2(uj)⩾T−1, or conversely, if ra1(uj)<T then (N−1)−ra1(uj)⩾T−1 and if ra2(uj)⩾T then (N−1)−ra2(uj)<T−1.
Without of loss generality, if ra1(uj)≥T then it will prove that (N−1)−ra1(uj)<T−1 and if ra2(uj)<T then it must hold that (N−1)−ra2(uj)≥T−1, as follows, respectively.
(1) Assume that (N−1)−ra1(uj)≥T−1. Let us consider
(N−1)−ra1(uj)≥T−1,(N−1)−ra1(uj)≥12(N+1)−1,−ra1(uj)≥12N+12−1−N+1,−ra1(uj)≥−12N+12,−ra1(uj)≥12(−N+1),ra1(uj)≤12(N−1),ra1(uj)≤12(N−1)<12(N+1),ra1(uj)<12(N+1),ra1(uj)<T. |
This contradicts to the hypothesis ra1(uj)≥T.
(2) Assume that (N−1)−ra2(uj)<T−1. Consider that
(N−1)−ra2(uj)<T−1,(N−1)−ra2(uj)<12(N+1)−1,−ra2(uj)<12N+12−1−N+1,−ra2(uj)<−12N+12,ra2(uj)>12N−12,ra2(uj)>12(N−1),ra2(uj)>12(N+1−2),ra2(uj)>12(N+1)−1,ra2(uj)>T−1. |
Therefore, T−1<ra2(uj)<T. This is a contradiction.
Hence, it is proved that (Fc,A,N) is (T−1)-level bijective N-soft set, because ∀uj∈U, if (N−1)−ra1(uj)⩾T−1 then (N−1)−ra2(uj)<T−1, or conversely, if (N−1)−ra1(uj)<T−1 then (N−1)−ra2(uj)⩾T−1.
Afterward, a theorem is given, that the operation AND between two T-level bijective N-soft sets is the T-level bijective N-soft set.
Theorem 3.8. Suppose that (F,A,N1) and (G,B,N2) are two T-level bijective Ni-soft sets. Then (F,A,N1)∧(G,B,N2)=(H,A×B,min(N1,N2)) is also the T-level bijective min(N1,N2)-soft set.
Proof. Let (F,A,N1) and (G,B,N2) be two bijective N-soft sets as in Table 28 and Table 29, respectively. In these tables, each cell or entry has rating of 0,1,..., or N−1. Let T be a threshold. The following are several cases of each possible rating for each object:
(F,A,N1) | a1 | a2 | ... | ai |
u1 | ra1(u1) | ra2(u1) | ... | rai(u1) |
u2 | ra1(u2) | ra2(u2) | ... | rai(u2) |
: | ||||
: | ||||
uj | ra1(uj) | ra2(uj) | ... | rai(uj) |
(G,B,N2) | b1 | b2 | ... | bi |
u1 | sb1(u1) | sb2(u1) | ... | sbi(u1) |
u2 | sb1(u2) | sb2(u2) | ... | sbi(u2) |
: | ||||
: | ||||
uj | sb1(uj) | sb2(uj) | ... | sbi(uj) |
(ⅰ) If rai(uj)≥T and sbi(uj)≥T, then by Definition 3.1 ξuT(ai)=ξuT(bi)=1. Therefore, min(ξuT(ai),ξuT(bi))=min(1,1)=1.
(ⅱ) If rai(uj)≥T and sbi(uj)<T, then ξuT(ai)=1 and ξuT(bi)=0. Hence, min(ξuT(ai),ξuT(bi))=min(1,0)=0.
(ⅲ) if rai(uj)<T and sbi(uj)≥T, then ξuT(ai)=0 and ξuT(bi)=1. Hence, min(ξuT(ai),ξuT(bi))=min(0,1)=0.
(ⅳ) If rai(uj)<T and sbi(uj)<T, then ξuT(ai)=ξuT(bi)=0, min(ξuT(ai),ξuT(bi))=min(0,0)=0.
Based on Definition 3.2, (F,A,N1)∧(G,B,N2)=(H,A×B,min(N1,N2)) will be the T-level bijective N-soft set, if T-level soft of (H,A×B,min(N1,N2)), namely (H1,A×B), is the bijective soft set (i.e., for each object associated with all parameters in A×B has exactly one parameter having a value of 1 and the others are 0).
Let (F1,A) and (G1,B) are two T-level soft sets of (F,A,N1) and (G,B,N2), respectively. Since (F,A,N1) and (G,B,N2) are two T-level bijective N-soft set, then by Definition 3.2 T-level soft set of (F,A,N1) and (G,B,N2), namely (F1,A) and (G1,B), respectively, are bijective soft sets. Hence, by Theorem 2.10, (F1,A)∧(G1,B)=(H1,A×B) is the bijective soft set. Since (H1,A×B) is the bijective soft set and T-level soft set of (H,A×B,min(N1,N2)), then by Definition 3.2, (H,A×B,min(N1,N2)) is the T-level bijective min(N1,N2)-soft set.
Definition 3.9. Let U be a set of objects and 2U×R is the set of all subsets of U×R. Suppose that (G,B,N2) and (F,A,N1) are two T-level bijective N-soft sets over U, and (H,A,N1) is the combined T-level bijective N-soft set of (F,A,N1). The operation Restricted AND between (H,A,N1) and G(b) for some b∈B, denoted by (H,A,N1)∧RG(b), is defined as
⋃a∈A{H(a)|H(a)⋐G(b)} |
with H(a)={(u,ra(u)⋅ξuT(a))|u∈U}.
Example 18. From Example 13 (see Table 19), (H,A,6) is the combined 4-level bijective 6-soft set of (F,A,6), with H(a1)={(u1,5),(u4,4),(u5,3)}, H(a2)={(u2,3),(u6,5)}, H(a3)={(u3,4)}, (here, the objects with a rating of 0 are hidden). Let G(b)={(u1,6),(u3,5),(u4,6),(u5,4)}. Based on Definition 2.7, H(a1) and H(a3) are subsets of G(b). Meanwhile, H(a2) is not a subset of G(b). Hence, by Definition 3.9, (H,A,6)∧RG(b)={(u1,5),(u3,4),(u4,4),(u5,3)}.
Definition 3.10. Let U be a set of objects. Suppose that (F,A,N) is the collections of n T-level bijective N-soft sets over U (Fi,Ai,Ni), denoted by ⋀ni=1(Fi,Ai,Ni), i=1,...,n, where ∀i≠j,Ai∩Aj=∅,j=1,2,...n. Given the T-level bijective N-soft set over U, (G,B,N), with B∩Ai=∅. ((F,A,N),(G,B,N),U)T is called a Decision System of T-level bijective N-soft set over U, where (F,A,N) and (G,B,N) is called the condition and decision of Decision System of T-level bijective N-soft set over U, respectively.
Definition 3.11. Suppose that (F,A,N1) and (G,B,N2) are two combined T-level bijective N-soft sets over U of (F′,A,N1) and (G′,B,N2), respectively, with A∩B=∅. Let (J,C,N3)=⋃b∈B((F,A,N1)∧RG(b)) with C=B. (F,A,N1) is said to depend on (G,B,N2) by a degree α,0≤α≤1, denoted by γ((F,A,N1),(G,B,N2)) if
α=HCHA, |
where HC=∑u∈U∑c∈Crc(u) and HA=∑u∈U∑a∈Ara(u), for (u,rc(u))∈J(c) and (u,ra(u))∈F(a).
If α=1 then (F,A,N1) is called to be completely dependent on (G,B,N2). If α=0 then (F,A,N1) is called to be independent of (G,B,N2).
Example 19. Suppose that (⋀2i=1(Fi,Ai,Ni),(F3,A3,N3),U)4 is a Decision System of 4-level bijective N-soft set. Subsequently, given the combined 4-level bijective N-soft sets (F1,A1,7), (F2,A2,8) and (F3,A3,8), respectively, as follows:
(F1,A1,7)={(a1,{(u1,5),(u4,4)}),(a2,{(u2,6),(u5,4),(u6,4)}),(a3,{(u3,5)})},(F2,A2,8)={(b1,{(u1,6),(u3,5),(u4,7),(u5,5)}),(b2,{(u2,7),(u6,6)})},(F3,A3,8)={(c1,{(u2,7),(u3,6),(u5,5),(u6,6)}),(c2,{(u1,6),(u4,5)})}. |
All bijective N-soft sets above are represented in Table 30, Table 31 and Table 32, respectively.
(F1,A1,7) | a1 | a2 | a3 |
u1 | 5 | 0 | 0 |
u2 | 0 | 6 | 0 |
u3 | 0 | 0 | 5 |
u4 | 4 | 0 | 0 |
u5 | 0 | 4 | 0 |
u6 | 0 | 4 | 0 |
(F2,A2,8) | b1 | b2 |
u1 | 6 | 0 |
u2 | 0 | 7 |
u3 | 5 | 0 |
u4 | 7 | 0 |
u5 | 5 | 0 |
u6 | 0 | 6 |
(F3,A3,8) | c1 | c2 |
u1 | 0 | 6 |
u2 | 7 | 0 |
u3 | 6 | 0 |
u4 | 0 | 5 |
u5 | 5 | 0 |
u6 | 6 | 0 |
The dependent degree α of a condition 4-level bijective N-soft set on a decision 4-level bijective N-soft set now can be determined.
(1) γ((F1,A1,7),(F3,A3,8)).
By Definition 2.7, F1(a2) and F1(a3) are subsets of F3(c1). Therefore, (F1,A1,7)∧RF3(c1)={(u2,6),(u3,5),(u5,4),(u6,4)}. F1(a1) is the subset of F3(c2). So, (F1,A1,7)∧RF3(c2)={(u1,5),(u4,4)}. It is obtained
(J,C,7)=⋃c∈A3(F1,A1,7)∧RF3(c)={(u1,5),(u2,6),(u3,5),(u4,4),(u5,4),(u6,4)}. |
By Definition 3.11, γ((F1,A1,7),(F3,A3,8)) is
α=(5+6+5+4+4+4)(5+4+6+4+4+5)=2828=1. |
(2) γ((F2,A2,8),(F3,A3,8)).
F2(b1) and F2(b2) are not subsets of F3(c1). So, (F2,A2,8)∧RF3(c1)=∅. F2(b1) and F2(b2) are not also subsets of F3(c2), such that (F2,A2,8)∧RF3(c2)=∅. It is obtained
(J,C,N4)=⋃c∈A3(F2,A2,8)∧RF3(c)=∅. |
γ((F2,A2,8),(F3,A3,8)) is obtained as follows
α=(0)(6+5+7+5+7+6)=036=0. |
(3) γ((F1,A1,7)∧(F2,A2,8),(F3,A3,8)).
Suppose that (F,A1×A2,7) is a (F1,A1,7) AND (F2,A2,8), as in Table 33.
(F,A1×A2,7) | (a1,b1) | (a1,b2) | (a2,b1) | (a2,b2) | (a3,b1) | (a3,b2) |
u1 | 5 | 0 | 0 | 0 | 0 | 0 |
u2 | 0 | 0 | 0 | 6 | 0 | 0 |
u3 | 0 | 0 | 0 | 0 | 5 | 0 |
u4 | 4 | 0 | 0 | 0 | 0 | 0 |
u5 | 0 | 0 | 4 | 0 | 0 | 0 |
u6 | 0 | 0 | 0 | 4 | 0 | 0 |
From Table 33 it is obtained
(F,A1×A2,7)={((a1,b1),{(u1,5),(u4,4)}),((a2,b1),{(u5,4)}),((a2,b2),{(u2,6),(u6,4)}),((a3,b1),{(u3,5)})}.
Since (F3,A3,8)={(c1,{(u2,7),(u3,6),(u5,5),(u6,6)}),(c2,{(u1,6),(u4,5)})}, we obtain (F,A1×A2,7)∧RF3(c1)={(u5,4),(u2,6),(u6,4),(u3,5)}, and (F,A1×A2,7)∧RF3(c2)={(u1,5),(u4,4)}.
We get
(J,C,7)=⋃c∈A3(F,A1×A2,7)∧RF3(c)={(u1,5),(u2,6),(u3,5),(u4,4),(u5,4),(u6,4)}. |
Finally, γ((F1,A1,7)∧(F2,A2,8),(F3,A3,8)) is obtained as follows
α=(5+6+5+4+4+4)(5+4+4+6+4+5)=2828=1. |
Definition 3.12. Suppose that ((F,A,N),(G,B,N),U))T is the Decision System of T-level bijective N-soft set, in which (F,A,N) is a collection of n T-level bijective N-soft sets over U, denoted by ⋀ni=1(Fi,Ai,Ni), i=1,...,n. γ(⋀ni=1(Fi,Ai,Ni),(G,B,N)) is the dependent degree of (F1,A1,N1)∧...∧(Fn,An,Nn) on (G,B,N). If
γ(m⋀i=1(Fσ(i),Aσ(i),Nσ(i)),(G,B,N))=γ(n⋀i=1(Fi,Ai,Ni),(G,B,N)), |
with σ is the permutation of {1,...,n}, then ⋀mi=1(Fσ(i),Aσ(i),Nσ(i)) is called the reduction of Decision System of T-level bijective N-soft set ((F,A,N),(G,B,N),U))T.
Example 20. From Example 19, we obtained that γ((F1,A1,7),(F3,A3,8))= γ((F1,A1,7)∧(F2,A2,8),(F3,A3,8))=1. By Definition 3.12, we get that (F1,A1,8) is the reduction of Decision System of 4-level bijective N-soft set (⋀2i=1(Fi,Ai,Ni),(F3,A3,N3),U)4.
In this section, a decision-making problem algorithm will be given in order to apply the concept of a T-level bijective N-soft set using the previously given definitions.
Algorithm:
(1) Define a Decision System of T-level bijective N-soft set (⋀ni=1(Fi,Ai,Ni),(Fn+1,An+1,Nn+1),U)T.
(2) Calculate the dependent degree of each operation AND between ⋀ni=1(Fi,Ai,Ni) and (Fn+1,An+1,Nn+1), 0<i≤n, using Definition 3.11.
(3) By Definition 3.12, find the reduction of Decision System of T-level bijective N-soft set (⋀ni=1(Fi,Ai,Ni),(Fn+1,An+1,Nn+1),U)T.
(4) Refer to the reduction of Decision System of T-level bijective N-soft set (⋀ni=1(Fi,Ai,Ni),(Fn+1,An+1,Nn+1),U)T above, we get a grouping of attributes that produce a decision.
The following is an illustrative example of a case that can be presented as a Bijective N-soft set, which is the decision-making process using the above algorithm. In this example, the technicalities and accuracy of obtaining data are not explained as this requires independent and in-depth research involving experts in the studied field.
Example 21. A government agency researches villages to determine the attributes affecting the education index of a village. Suppose U={u1,u2,u3,u4,u5,u6} is the set of villages in an area. Suppose A=A1∪A2∪A3∪A4 is a union of four sets of attributes A1,A2,A3 and A4. A1 states the set of parameters related to the level of health services at a1 = clinic, a2 = a public health center, and a3 = hospital. A2 states the set of parameters related to ease of access to education to b1= elementary school, b2 = junior high school, and b3 = senior high school. A3 which categorizes the village economy states the set of parameters c1 = family economy, c2 = village budget, and c3 = village fund allocation. A4 which categorizes the education index in the village represents the set of parameters d1 = high and d2 = low. A rating later is given to each village and parameter at A1, A2 and A3 based on the assessment predicate defined by the expert with the following conditions:
(1) " 5 " for the very good predicate.
(2) " 4 " for the good predicate.
(3) " 3 " for the not good predicate.
(4) " 2 " for the bad predicate.
(5) " 1 " for the very bad predicate.
Related to the A4, a rating is given to each village for each parameter in A4 based on the rating predicate defined by the expert with the conditions:
a) The village education index (x) is categorized as high if the village education index is greater than 0.5 by category:
(1) " 5 " for index 0.9<x⩽1.0.
(2) " 4 " for index 0.8<x⩽0.9.
(3) " 3 " for index 0.7<x⩽0.8.
(4) " 2 " for index 0.6<x⩽0.7.
(5) " 1 " for index 0.5<x⩽0.6.
b) The village education index (x) is categorized as low if the village education index is less than 0.5 with the category:
(1) " 5 " for index 0.0<x⩽0.1.
(2) " 4 " for index 0.1<x⩽0.2.
(3) " 3 " for index 0.2<x⩽0.3.
(4) " 2 " for index 0.3<x⩽0.4.
(5) " 1 " for index 0.4<x⩽0.5.
Based on the expert's assessment results, rating data for each object for each of the existing parameters are obtained and be stated as a 3-level bijective N-soft set presented in Tables 34–37.
(F1,A1,6) | a1 | a2 | a3 |
u1 | 2 | 5 | 2 |
u2 | 1 | 2 | 3 |
u3 | 5 | 2 | 2 |
u4 | 2 | 1 | 3 |
u5 | 2 | 4 | 2 |
u6 | 2 | 2 | 3 |
(F2,A2,6) | b1 | b2 | b3 |
u1 | 3 | 2 | 1 |
u2 | 2 | 2 | 5 |
u3 | 2 | 4 | 2 |
u4 | 2 | 3 | 2 |
u5 | 2 | 2 | 4 |
u6 | 3 | 2 | 2 |
(F3,A3,6) | c1 | c2 | c3 |
u1 | 3 | 1 | 2 |
u2 | 1 | 4 | 2 |
u3 | 3 | 2 | 2 |
u4 | 2 | 1 | 5 |
u5 | 4 | 2 | 2 |
u6 | 3 | 1 | 2 |
(F4,A4,5) | d1 | d2 |
u1 | 0 | 3 |
u2 | 4 | 0 |
u3 | 0 | 4 |
u4 | 4 | 0 |
u5 | 3 | 0 |
u6 | 0 | 3 |
Next, the combined 3-level bijective N-soft set of (F1,A1,6),(F2,A2,6),(F3,A3,6) and (F4,A4,5) are as in Table 38, Table 39, Table 40 and Table 41, respectively.
(F1,A1,6) | a1 | a2 | a3 |
u1 | 0 | 5 | 0 |
u2 | 0 | 0 | 3 |
u3 | 5 | 0 | 0 |
u4 | 0 | 0 | 3 |
u5 | 0 | 4 | 0 |
u6 | 0 | 0 | 3 |
(F2,A2,6) | b1 | b2 | b3 |
u1 | 3 | 0 | 0 |
u2 | 0 | 0 | 5 |
u3 | 0 | 4 | 0 |
u4 | 0 | 3 | 0 |
u5 | 0 | 0 | 4 |
u6 | 3 | 0 | 0 |
(F3,A3,6) | c1 | c2 | c3 |
u1 | 3 | 0 | 0 |
u2 | 0 | 4 | 0 |
u3 | 3 | 0 | 0 |
u4 | 0 | 0 | 5 |
u5 | 4 | 0 | 0 |
u6 | 3 | 0 | 0 |
(F4,A4,5) | d1 | d2 |
u1 | 0 | 3 |
u2 | 4 | 0 |
u3 | 0 | 4 |
u4 | 4 | 0 |
u5 | 3 | 0 |
u6 | 0 | 3 |
By the Algorithm (step 1), (⋀3i=1(Fi,Ai,Ni),(F4,A4,5),U)3 is constructed as a Decision System 3-level bijective N-soft set, in which ⋀3i=1(Fi,Ai,Ni) is the condition of the Decision System 3-level bijective N-soft set and (F4,A4,5) is the decision of Decision System 3-level bijective 5-soft set. By the second step, the dependent degree of each the operation AND between the combination of ⋀3i=1(Fi,Ai,Ni) and (F4,A4,5) is calculated as in Table 42.
γ(∧3j=0(Fj,Aj,Nj),(F4,A4,5)) | α |
γ((F1,A1,6),(F4,A4,5)) | 0 |
γ((F2,A2,6),(F4,A4,5)) | 0.2727 |
γ((F3,A3,6),(F4,A4,5)) | 0.1904 |
γ((F1,A1,6)∧(F2,A2,6),(F4,A4,5)) | 0.8 |
γ((F1,A1,6)∧(F3,A3,6),(F4,A4,5)) | 0.7058 |
γ((F2,A2,6)∧(F3,A3,6),(F4,A4,5)) | 1 |
γ((F1,A1,6)∧(F2,A2,6)∧(F3,A3,6),(F4,A4,5)) | 1 |
From Table 42,
γ((F2,A2,6)∧(F3,A3,6),(F4,A4,5))=γ((F1,A1,6)∧(F2,A2,6)∧(F3,A3,6),(F4,A4,5))=1 |
is obtained. Therefore, {(F2,A2,6), (F3,A3,6)} is the reduction of Decision System 3-level bijective 5-soft set (⋀3i=1(Fi,Ai,Ni),(F4,A4,5),U)3. Thus the attributes affecting the village education index are the ease of education access to schools and the village economy.
Moreover, from the reduced attributes, the grouping of attributes that produces a decision is obtained, as shown in Tables 39–41. The objects corresponding to the parameters in A2,A3 and A4, which have a non-zero rating, are later noted. In this case, based on existing data, it is found that the parameters influencing the decision parameter A4 are parameters A2 and A3. This is based on the interpretation of the results of the last step of the algorithm above, as obtained from an overview of the conditions of each village, with the following details:
(1) If the ease of access to Elementary School and the family economy are not good; therefore, the education index is low.
(2) If the ease of access to Senior High School is very good and the village budget is good; therefore, the education index is high.
(3) If the ease of access to Junior High School is good and the family economy is not good; therefore, the education index is low.
(4) If the ease of access to Junior High School is not good and the allocation of village funds is very good; therefore, the education index is high.
(5) If the ease of access to Senior High School and the family economy are good; therefore, the education index is high.
(6) If the ease of access to Elementary school is not good and the family economy is not good; therefore, the education index is low.
From the illustrative example in the case above, an illustration obtained is that the algorithm defined in the last section can be used as an alternative method to determine which parameters from a set of conditional parameters influence the decision parameters in a Decision System bijective N-soft set. Therefore, this algorithm can be used in cases of decision-making problems requiring decisions like in the illustration above.
By 2023, there have been many studies on N-Soft sets theory and their application for decision-making problems, such as in [2,3,4,5]. However, the scope of applications of such research is without considering condition and decision NSSs. This means that the decision-making problems in the NSS environment to identify which parameters in condition NSSs impact parameters in decision NSS are inadequate to be handled only by existing studies. The conditions imposed in Bijective N-soft sets are vital in enhancing their suitability. Bijective N-soft sets are designed to manage situations where non-binary evaluations are expected, making them adept at capturing and handling complex evaluations in decision-making scenarios, especially for solving decision-making problems containing Condition Parameters and Decision Parameters, of which every object corresponds to only one parameter and the union of partition by parameter sets is a universe. The success of the research on Bijective NSS indicates the potential benefits of our contribution. On the other hand, BNSS is the generalization of BSS, where for N = 2, the concept of BNSS (F, A, N) is the same as that of BSS.
Bijective N-Soft set (BNSS) is a concept that can be applied to solve decision-making problems consisting of Condition N-Soft Sets and a Decision N-Soft Set, in which existing studies on N-Soft Set fail to be applied. We found that the Bijective N-soft set is a new model to handle such decision-making problems. Then, the complement of the Bijective N-soft set is also obtained in the concept of the Bijective N-soft set. We have defined the restricted AND operation on the Bijective N-soft sets, the dependence between two Bijective N-soft sets and the reduction of the Bijective N-soft set associated with the Decision System Bijective N-soft set. In addition, in the Bijective N-soft set, it is proved that the properties associated with the previously defined operations include the closed property of the complement and the AND operation. In the final part of this article, an algorithm that can be used as an alternative method in solving decision-making problems in Bijective N-soft sets environment has been defined. Using the algorithm, we can determine which parameters from a set of conditional parameters influence the decision parameters in a Decision System bijective N-soft set. Despite the fact that not all Condition and Decision N-Soft Sets (CDNSS) can be solved with BNSS, by defining a threshold T that makes CDNSS a BNSS, the concept of BNSS can be applied. As the concepts of NSS such as Fuzzy NSS, Hesitant NSS, Hesitant Fuzzy NSS and Intuitionistic Fuzzy NSS have been progressing rapidly, research studies on the issue of BNSS combined with them are yet to be explored.
The authors declare that they have not used Artificial Intelligence (AI) tools in the creation of this article.
This research is supported by a research fund from Universitas Andalas in accordance with the contract of Indexed Publication Research, T/8/UN.16.17/PT.01.03/IS-RPT/2022.
The authors declare that there are no conflicts of interest.
[1] | L. Boschetti, D. Provitolo, E. Tric, A method to analyze territory resilience to natural hazards, the example of the French Riviera against tsunami, EGU General Assembly Conference Abstracts, 19 (2017), 12935. |
[2] |
G. Cantin, N. Verdière, V. Lanza, Synchronization under control in complex networks for a panic model, International Conference on Computational Science, (2019), 262–275. https://doi.org/10.1007/978-3-030-22741-8_19 doi: 10.1007/978-3-030-22741-8_19
![]() |
[3] |
G. Cantin, N. Verdière, V. Lanza, M. Aziz-Alaoui, R. Charrier, C. Bertelle, et al., Mathematical modeling of human behaviors during catastrophic events: stability and bifurcations, Int. J. Bifurcat. Chaos, 26 (2016), 1630025. https://doi.org/10.1142/S0218127416300251 doi: 10.1142/S0218127416300251
![]() |
[4] |
F. E. Cornes, G. A. Frank, C. O. Dorso, Fear propagation and the evacuation dynamics, Simul. Model. Pract. Th., 95 (2019), 112–133. https://doi.org/10.1016/j.simpat.2019.04.012 doi: 10.1016/j.simpat.2019.04.012
![]() |
[5] | L. Crocq, Paniques Collectives (Les), Odile Jacob, 2013. |
[6] | E. Dubos-Paillard, A. Berred, D. Provitolo, Classification des catastrophes fondée sur l'analyse des relations entre les propriétés de l'événement et les comportements humains, Technical report, ANR, 2021. |
[7] | W. H. Fleming, R. W. Rishel, Deterministic and stochastic optimal control, vol. 1, Springer Science & Business Media, 2012. |
[8] |
D. T. Gilbert, R. B. Giesler, K. A. Morris, When comparisons arise., J. Pers. Soc. Psychol., 69 (1995), 227. https://doi.org/10.1037/0022-3514.69.2.227 doi: 10.1037/0022-3514.69.2.227
![]() |
[9] | D. Helbing, A. Johansson, Pedestrian, crowd, and evacuation dynamics, arXiv preprint arXiv: 1309.1609. |
[10] |
H. W. Hethcote, The mathematics of infectious diseases, SIAM review, 42 (2000), 599–653. https://doi.org/10.1137/S0036144500371907 doi: 10.1137/S0036144500371907
![]() |
[11] |
V. Lanza, E. Dubos-Paillard, R. Charrier, N. Verdière, D. Provitolo, O. Navarro, et al., Spatio-temporal dynamics of human behaviors during disasters: A mathematical and geographical approach, Complex Systems, Smart Territories and Mobility, (2021), 201–218. https://doi.org/10.1007/978-3-030-59302-5_11 doi: 10.1007/978-3-030-59302-5_11
![]() |
[12] | V. Lanza, D. Provitolo, N. Verdière, C. Bertelle, E. Dubos-Paillard, R. Charrier, et al., Modeling and analyse of the impact of risk culture on the human behavior during a catastrophic event, Submitted. |
[13] | D. L. Lukes, Differential equations: classical to controlled, Elsevier, 1982. |
[14] |
F. Martinez-Gil, M. Lozano, I. García-Fernández, F. Fernández, Modeling, evaluation and scale on artificial pedestrians: A literature review, ACM Comput. Surv., 50 (2017), 1–35. https://doi.org/10.1145/3117808 doi: 10.1145/3117808
![]() |
[15] |
B. Maury, J. Venel, A discrete contact model for crowd motion, ESAIM: Math. Model. Num., 45 (2011), 145–168. https://doi.org/10.1051/m2an/2010035 doi: 10.1051/m2an/2010035
![]() |
[16] | L. Perko, Differential equations and dynamical systems, Springer, New York, 3rd edn., 2001. https://doi.org/10.1007/978-1-4613-0003-8 |
[17] | D. Provitolo, E. Dubos-Paillard, J.-P. Müller, Emergent human behaviour during a disaster: Thematic versus complex systems approaches, European Conference on Complex System, (2011), 1–11. |
[18] |
D. Provitolo, E. Dubos-Paillard, N. Verdière, V. Lanza, R. Charrier, C. Bertelle, M. Aziz-Alaoui, Les comportements humains en situation de catastrophe: de l'observation à la modélisation conceptuelle et mathématique, Cybergeo: European Journal of Geography, (2015), 735. https://doi.org/10.4000/cybergeo.27150 doi: 10.4000/cybergeo.27150
![]() |
[19] | D. Provitolo, A. Tricot, A. Schleyer-Lindenmann, A.-H. Boudoukha, N. Verdière, S. Haule, et al., Saisir les comportements humains en situation de catastrophes : proposition d'une démarche méthodologique immersive, Cybergeo : European Journal of Geography, in press. |
[20] | M. Reghezza-Zitt, S. Rufat, Resilience imperative: uncertainty, risks and disasters, Elsevier, 2015. |
[21] |
W. Tong, L. Cheng, Simulation of pedestrian flow based on multi-agent, Procedia-Social and Behavioral Sciences, 96 (2013), 17–24. https://doi.org/10.1016/j.sbspro.2013.08.005 doi: 10.1016/j.sbspro.2013.08.005
![]() |
[22] |
E. Trélat, Optimal control and applications to aerospace: some results and challenges, J. Optimiz. Theory App., 154 (2012), 713–758. https://doi.org/10.1007/s10957-012-0050-5 doi: 10.1007/s10957-012-0050-5
![]() |
[23] | A. Tricot, D. Provitolo, E. Dubos-Paillard, Typologie synthétique des comportements humains lors de catastrophes, Technical report, ANR, 2020. |
[24] | N. Verdière, V. Lanza, R. Charrier, D. Provitolo, E. Dubos-Paillard, C. Bertelle, et al., Mathematical modeling of human behaviors during catastrophic events, 4th International Conference on Complex Systems and Applications (ICCSA2014), (2014), 67–74. |
[25] |
N. Verdière, O. Navarro, A. Naud, A. Berred, D. Provitolo, Towards parameter identification of a behavioral model from a virtual reality experiment, Mathematics, 9 (2021), 3175. https://doi.org/10.3390/math9243175 doi: 10.3390/math9243175
![]() |
[26] |
X. Wang, L. Zhang, Y. Lin, Y. Zhao, X. Hu, Computational models and optimal control strategies for emotion contagion in the human population in emergencies, Knowledge-Based Systems, 109 (2016), 35–47. https://doi.org/10.1016/j.knosys.2016.06.022 doi: 10.1016/j.knosys.2016.06.022
![]() |
[27] | V. Zachariadis, J. Amos, B. Kohn, Simulating pedestrian route-choice behavior under transient traffic conditions, in Pedestrian Behavior, Emerald Group Publishing Limited, 2009. https://doi.org/10.1108/9781848557512-006 |
[28] |
W. Zeng, H. Nakamura, P. Chen, A modified social force model for pedestrian behavior simulation at signalized crosswalks, Procedia-Social and Behavioral Sciences, 138 (2014), 521–530. https://doi.org/10.1016/j.sbspro.2014.07.233 doi: 10.1016/j.sbspro.2014.07.233
![]() |
(F,E) | ε1 | ε2 | ... | εi | ... | εn |
u1 | με1(u1) | με2(u1) | ... | μεi(u1) | ... | μεn(u1) |
u2 | με1(u2) | με2(u2) | ... | μεi(u2) | ... | μεn(u2) |
: | ||||||
uj | με1(uj) | με2(uj) | ... | μεi(uj) | ... | μεn(uj) |
: | ||||||
um | με1(um) | με2(um) | ... | μεi(um) | ... | μεn(um) |
(F,E) | e1 | e2 | e3 |
u1 | 1 | 1 | 0 |
u2 | 1 | 1 | 1 |
u3 | 1 | 0 | 1 |
u4 | 0 | 1 | 0 |
(F, A) | a_{1} | a_{2} | a_{3} |
u_{1} | 1 | 0 | 1 |
u_{2} | 1 | 1 | 0 |
u_{3} | 1 | 1 | 1 |
(G, B) | b_{1} | b_{2} |
u_{1} | 1 | 1 |
u_{2} | 1 | 0 |
u_{3} | 0 | 1 |
(H, A \times B) | (a_{1}, b_{1}) | (a_{1}, b_{2}) | (a_{2}, b_{1}) | (a_{2}, b_{2}) | (a_{3}, b_{1}) | (a_{3}, b_{2}) |
u_{1} | 1 | 1 | 0 | 0 | 1 | 1 |
u_{2} | 1 | 0 | 1 | 0 | 0 | 0 |
u_{3} | 0 | 1 | 0 | 1 | 0 | 1 |
G_A | a_{1} | a_{2} | ... | a_{i} | ... | a_n |
u_{1} | \mu_{a_1}(u_1) | \mu_{a_2}(u_1) | ... | \mu_{a_i}(u_1) | ... | \mu_{a_n}(u_1) |
u_{2} | \mu_{a_1}(u_2) | \mu_{a_2}(u_2) | ... | \mu_{a_i}(u_2) | ... | \mu_{a_n}(u_2) |
: | ||||||
u_j | \mu_{a_1}(u_j) | \mu_{a_2}(u_j) | ... | \mu_{a_i}(u_j) | ... | \mu_{a_n}(u_j) |
: | ||||||
u_{m} | \mu_{a_1}(u_m) | \mu_{a_2}(u_m) | ... | \mu_{a_i}(u_m) | ... | \mu_{a_n}(u_m) |
U \bigg \backslash A | e_1 | e_{2} | e_{3} |
u_{1} | 0.70 | 0.80 | 0.85 |
u_{2} | 0.80 | 0.80 | 0.78 |
u_{3} | 0.85 | 0.80 | 0.90 |
u_{4} | 0.75 | 0.80 | 0.80 |
(F, A, N) | a_{1} | a_{2} | ... | a_{q} |
u_{1} | r_{a_1}(u_1) | r_{a_2}(u_1) | ... | r_{a_q}(u_1) |
u_{2} | r_{a_1}(u_2) | r_{a_2}(u_2) | ... | r_{a_q}(u_2) |
: | ||||
: | ||||
u_{p} | r_{a_1}(u_p) | r_{a_2}(u_p) | ... | r_{a_q}(u_p) |
(I, A, 6) | a_1 | a_2 | a_3 | a_4 | a_5 | a_6 |
u_{1} | 3 | 4 | 4 | 3 | 5 | 4 |
u_{2} | 5 | 5 | 3 | 3 | 4 | 4 |
u_{3} | 2 | 4 | 3 | 3 | 4 | 4 |
u_{4} | 4 | 2 | 3 | 3 | 4 | 3 |
(F, A, 7) | a_{1} | a_{2} | a_{3} |
u_{1} | 4 | 3 | 1 |
u_{2} | 2 | 6 | 0 |
u_{3} | 1 | 0 | 5 |
(G, B, 6) | b_{1} | b_{2} |
u_{1} | 3 | 5 |
u_{2} | 1 | 4 |
u_{3} | 2 | 0 |
(H, A \times B, 6) | (a_{1}, b_{1}) | (a_{1}, b_{2}) | (a_{2}, b_{1}) | (a_{2}, b_{2}) | (a_{3}, b_{1}) | (a_{3}, b_{2}) |
u_{1} | 3 | 3 | 1 | 4 | 3 | 1 |
u_{2} | 1 | 1 | 0 | 2 | 4 | 0 |
u_{3} | 1 | 0 | 2 | 0 | 0 | 0 |
(F, E) | e_{1} | e_{2} | e_{3} |
u_{1} | 1 | 0 | 0 |
u_{2} | 1 | 0 | 0 |
u_{3} | 1 | 0 | 0 |
u_{4} | 0 | 1 | 0 |
u_{5} | 0 | 1 | 0 |
u_{6} | 0 | 1 | 0 |
u_{7} | 0 | 0 | 1 |
F_A | a_{1} | a_{2} | a_{3} |
u_{1} | 0.75 | 0.30 | 0.30 |
u_{2} | 0.55 | 0.80 | 0.70 |
u_{3} | 0.60 | 0.85 | 0.60 |
u_{4} | 0.30 | 0.55 | 0.80 |
u_{5} | 0.70 | 0.80 | 0.55 |
u_{6} | 0.80 | 0.55 | 0.25 |
(G, A) | a_{1} | a_{2} | a_{3} |
u_{1} | 1 | 0 | 0 |
u_{2} | 0 | 1 | 0 |
u_{3} | 0 | 1 | 0 |
u_{4} | 0 | 0 | 1 |
u_{5} | 0 | 1 | 0 |
u_{6} | 1 | 0 | 0 |
H_A | a_{1} | a_{2} | a_{3} |
u_{1} | 0.75 | 0 | 0 |
u_{2} | 0 | 0.80 | 0 |
u_{3} | 0 | 0.85 | 0 |
u_{4} | 0 | 0 | 0.80 |
u_{5} | 0 | 0.80 | 0 |
u_{6} | 0.80 | 0 | 0 |
( F,A,6 ) | a_{1} | a_{2} | a_{3} |
u_{1} | 5 | 2 | 1 |
u_{2} | 0 | 3 | 2 |
u_{3} | 1 | 2 | 4 |
u_{4} | 4 | 2 | 0 |
u_{5} | 3 | 1 | 1 |
u_{6} | 0 | 5 | 1 |
(G, A) | a_{1} | a_{2} | a_{3} |
u_{1} | 1 | 0 | 0 |
u_{2} | 0 | 1 | 0 |
u_{3} | 0 | 0 | 1 |
u_{4} | 1 | 0 | 0 |
u_{5} | 1 | 0 | 0 |
u_{6} | 0 | 1 | 0 |
(H, A, 6) | a_{1} | a_{2} | a_{3} |
u_{1} | 5 | 0 | 0 |
u_{2} | 0 | 3 | 0 |
u_{3} | 0 | 0 | 4 |
u_{4} | 4 | 0 | 0 |
u_{5} | 3 | 0 | 0 |
u_{6} | 0 | 5 | 0 |
(J, A, 6) | a_{1} | a_{2} | a_{3} |
u_{1} | 5 | 1 | 2 |
u_{2} | 5 | 0 | 1 |
u_{3} | 3 | 2 | 1 |
u_{4} | 4 | 1 | 2 |
u_{5} | 3 | 2 | 1 |
u_{6} | 5 | 2 | 1 |
(J_{1}, A) | a_{1} | a_{2} | a_{3} |
u_{1} | 1 | 0 | 0 |
u_{2} | 1 | 0 | 0 |
u_{3} | 1 | 0 | 0 |
u_{4} | 1 | 0 | 0 |
u_{5} | 1 | 0 | 0 |
u_{6} | 1 | 0 | 0 |
(F, A, 6) | a_{1} | a_{2} | a_{3} | a_{4} |
u_{1} | 5 | 1 | 2 | 1 |
u_{2} | 0 | 5 | 2 | 1 |
u_{3} | 1 | 2 | 3 | 0 |
u_{4} | 1 | 2 | 1 | 4 |
(G, A) | a_{1} | a_{2} | a_{3} | a_{4} |
u_{1} | 1 | 0 | 0 | 0 |
u_{2} | 0 | 1 | 0 | 0 |
u_{3} | 0 | 0 | 1 | 0 |
u_{4} | 0 | 0 | 0 | 1 |
(F, A, 8) | a_{1} | a_{2} |
u_{1} | 7 | 2 |
u_{2} | 3 | 4 |
u_{3} | 2 | 5 |
u_{4} | 0 | 6 |
u_{5} | 4 | 1 |
u_{6} | 2 | 4 |
(F^c, A, 8) | a_{1} | a_{2} |
u_{1} | 0 | 5 |
u_{2} | 4 | 3 |
u_{3} | 5 | 2 |
u_{4} | 7 | 1 |
u_{5} | 3 | 6 |
u_{6} | 5 | 3 |
(F, A, N) | a_{1} | a_{2} |
u_{1} | r_{a_1}(u_1) | r_{a_2}(u_1) |
u_{2} | r_{a_1}(u_2) | r_{a_2}(u_2) |
: | : | : |
: | : | : |
u_{j} | r_{a_1}(u_j) | r_{a_2}(u_j) |
(F^c, A, N) | a_{1} | a_{2} |
u_{1} | (N-1)-r_{a_1}(u_1) | (N-1)-r_{a_2}(u_1) |
u_{2} | (N-1)-r_{a_1}(u_2) | (N-1)-r_{a_2}(u_2) |
: | : | : |
: | : | : |
u_{j} | (N-1)-r_{a_1}(u_j) | (N-1)-r_{a_2}(u_j) |
(F, A, N_1) | a_{1} | a_{2} | ... | a_{i} |
u_{1} | r_{a_1}(u_1) | r_{a_2}(u_1) | ... | r_{a_i}(u_1) |
u_{2} | r_{a_1}(u_2) | r_{a_2}(u_2) | ... | r_{a_i}(u_2) |
: | ||||
: | ||||
u_{j} | r_{a_1}(u_j) | r_{a_2}(u_j) | ... | r_{a_i}(u_j) |
(G, B, N_2) | b_{1} | b_{2} | ... | b_{i} |
u_{1} | s_{b_1}(u_1) | s_{b_2}(u_1) | ... | s_{b_i}(u_1) |
u_{2} | s_{b_1}(u_2) | s_{b_2}(u_2) | ... | s_{b_i}(u_2) |
: | ||||
: | ||||
u_{j} | s_{b_1}(u_j) | s_{b_2}(u_j) | ... | s_{b_i}(u_j) |
(F_1, A_1, 7) | a_{1} | a_{2} | a_{3} |
u_{1} | 5 | 0 | 0 |
u_{2} | 0 | 6 | 0 |
u_{3} | 0 | 0 | 5 |
u_{4} | 4 | 0 | 0 |
u_{5} | 0 | 4 | 0 |
u_{6} | 0 | 4 | 0 |
(F_2, A_2, 8) | b_{1} | b_{2} |
u_{1} | 6 | 0 |
u_{2} | 0 | 7 |
u_{3} | 5 | 0 |
u_{4} | 7 | 0 |
u_{5} | 5 | 0 |
u_{6} | 0 | 6 |
(F_3, A_3, 8) | c_{1} | c_{2} |
u_{1} | 0 | 6 |
u_{2} | 7 | 0 |
u_{3} | 6 | 0 |
u_{4} | 0 | 5 |
u_{5} | 5 | 0 |
u_{6} | 6 | 0 |
(F, A_1 \times A_2, 7) | (a_{1}, b_{1}) | (a_{1}, b_{2}) | (a_{2}, b_{1}) | (a_{2}, b_{2}) | (a_{3}, b_{1}) | (a_{3}, b_{2}) |
u_{1} | 5 | 0 | 0 | 0 | 0 | 0 |
u_{2} | 0 | 0 | 0 | 6 | 0 | 0 |
u_{3} | 0 | 0 | 0 | 0 | 5 | 0 |
u_{4} | 4 | 0 | 0 | 0 | 0 | 0 |
u_{5} | 0 | 0 | 4 | 0 | 0 | 0 |
u_{6} | 0 | 0 | 0 | 4 | 0 | 0 |
(F_1, A_1, 6) | a_1 | a_2 | a_3 |
u_{1} | 2 | 5 | 2 |
u_{2} | 1 | 2 | 3 |
u_{3} | 5 | 2 | 2 |
u_{4} | 2 | 1 | 3 |
u_{5} | 2 | 4 | 2 |
u_{6} | 2 | 2 | 3 |
( F_2, A_2, 6 ) | b_1 | b_2 | b_3 |
u_{1} | 3 | 2 | 1 |
u_{2} | 2 | 2 | 5 |
u_{3} | 2 | 4 | 2 |
u_{4} | 2 | 3 | 2 |
u_{5} | 2 | 2 | 4 |
u_{6} | 3 | 2 | 2 |
( F_3, A_3, 6 ) | c_1 | c_2 | c_3 |
u_{1} | 3 | 1 | 2 |
u_{2} | 1 | 4 | 2 |
u_{3} | 3 | 2 | 2 |
u_{4} | 2 | 1 | 5 |
u_{5} | 4 | 2 | 2 |
u_{6} | 3 | 1 | 2 |
( F_4, A_4, 5 ) | d_1 | d_2 |
u_{1} | 0 | 3 |
u_{2} | 4 | 0 |
u_{3} | 0 | 4 |
u_{4} | 4 | 0 |
u_{5} | 3 | 0 |
u_{6} | 0 | 3 |
(F_1, A_1, 6) | a_1 | a_2 | a_3 |
u_{1} | 0 | 5 | 0 |
u_{2} | 0 | 0 | 3 |
u_{3} | 5 | 0 | 0 |
u_{4} | 0 | 0 | 3 |
u_{5} | 0 | 4 | 0 |
u_{6} | 0 | 0 | 3 |
(F_2, A_2, 6) | b_1 | b_2 | b_3 |
u_{1} | 3 | 0 | 0 |
u_{2} | 0 | 0 | 5 |
u_{3} | 0 | 4 | 0 |
u_{4} | 0 | 3 | 0 |
u_{5} | 0 | 0 | 4 |
u_{6} | 3 | 0 | 0 |
(F_3, A_3, 6) | c_1 | c_2 | c_3 |
u_{1} | 3 | 0 | 0 |
u_{2} | 0 | 4 | 0 |
u_{3} | 3 | 0 | 0 |
u_{4} | 0 | 0 | 5 |
u_{5} | 4 | 0 | 0 |
u_{6} | 3 | 0 | 0 |
(F_4, A_4, 5) | d_1 | d_2 |
u_{1} | 0 | 3 |
u_{2} | 4 | 0 |
u_{3} | 0 | 4 |
u_{4} | 4 | 0 |
u_{5} | 3 | 0 |
u_{6} | 0 | 3 |
\gamma(\wedge_{j=0}^3 (F_j, A_j, N_j), (F_4, A_4, 5)) | \alpha |
\gamma((F_1, A_1, 6), (F_4, A_4, 5)) | 0 |
\gamma((F_2, A_2, 6), (F_4, A_4, 5)) | 0.2727 |
\gamma((F_3, A_3, 6), (F_4, A_4, 5)) | 0.1904 |
\gamma((F_1, A_1, 6)\wedge(F_2, A_2, 6), (F_4, A_4, 5)) | 0.8 |
\gamma((F_1, A_1, 6)\wedge(F_3, A_3, 6), (F_4, A_4, 5)) | 0.7058 |
\gamma((F_2, A_2, 6)\wedge(F_3, A_3, 6), (F_4, A_4, 5)) | 1 |
\gamma((F_1, A_1, 6)\wedge(F_2, A_2, 6)\wedge (F_3, A_3, 6), (F_4, A_4, 5)) | 1 |
(F, E) | \varepsilon_{1} | \varepsilon_{2} | ... | \varepsilon_{i} | ... | \varepsilon_n |
u_{1} | \mu_{\varepsilon_1}(u_1) | \mu_{\varepsilon_2}(u_1) | ... | \mu_{\varepsilon_i}(u_1) | ... | \mu_{\varepsilon_n}(u_1) |
u_{2} | \mu_{\varepsilon_1}(u_2) | \mu_{\varepsilon_2}(u_2) | ... | \mu_{\varepsilon_i}(u_2) | ... | \mu_{\varepsilon_n}(u_2) |
: | ||||||
u_j | \mu_{\varepsilon_1}(u_j) | \mu_{\varepsilon_2}(u_j) | ... | \mu_{\varepsilon_i}(u_j) | ... | \mu_{\varepsilon_n}(u_j) |
: | ||||||
u_{m} | \mu_{\varepsilon_1}(u_m) | \mu_{\varepsilon_2}(u_m) | ... | \mu_{\varepsilon_i}(u_m) | ... | \mu_{\varepsilon_n}(u_m) |
(F, E) | e_{1} | e_{2} | e_{3} |
u_{1} | 1 | 1 | 0 |
u_{2} | 1 | 1 | 1 |
u_{3} | 1 | 0 | 1 |
u_{4} | 0 | 1 | 0 |
(F, A) | a_{1} | a_{2} | a_{3} |
u_{1} | 1 | 0 | 1 |
u_{2} | 1 | 1 | 0 |
u_{3} | 1 | 1 | 1 |
(G, B) | b_{1} | b_{2} |
u_{1} | 1 | 1 |
u_{2} | 1 | 0 |
u_{3} | 0 | 1 |
(H, A \times B) | (a_{1}, b_{1}) | (a_{1}, b_{2}) | (a_{2}, b_{1}) | (a_{2}, b_{2}) | (a_{3}, b_{1}) | (a_{3}, b_{2}) |
u_{1} | 1 | 1 | 0 | 0 | 1 | 1 |
u_{2} | 1 | 0 | 1 | 0 | 0 | 0 |
u_{3} | 0 | 1 | 0 | 1 | 0 | 1 |
G_A | a_{1} | a_{2} | ... | a_{i} | ... | a_n |
u_{1} | \mu_{a_1}(u_1) | \mu_{a_2}(u_1) | ... | \mu_{a_i}(u_1) | ... | \mu_{a_n}(u_1) |
u_{2} | \mu_{a_1}(u_2) | \mu_{a_2}(u_2) | ... | \mu_{a_i}(u_2) | ... | \mu_{a_n}(u_2) |
: | ||||||
u_j | \mu_{a_1}(u_j) | \mu_{a_2}(u_j) | ... | \mu_{a_i}(u_j) | ... | \mu_{a_n}(u_j) |
: | ||||||
u_{m} | \mu_{a_1}(u_m) | \mu_{a_2}(u_m) | ... | \mu_{a_i}(u_m) | ... | \mu_{a_n}(u_m) |
U \bigg \backslash A | e_1 | e_{2} | e_{3} |
u_{1} | 0.70 | 0.80 | 0.85 |
u_{2} | 0.80 | 0.80 | 0.78 |
u_{3} | 0.85 | 0.80 | 0.90 |
u_{4} | 0.75 | 0.80 | 0.80 |
(F, A, N) | a_{1} | a_{2} | ... | a_{q} |
u_{1} | r_{a_1}(u_1) | r_{a_2}(u_1) | ... | r_{a_q}(u_1) |
u_{2} | r_{a_1}(u_2) | r_{a_2}(u_2) | ... | r_{a_q}(u_2) |
: | ||||
: | ||||
u_{p} | r_{a_1}(u_p) | r_{a_2}(u_p) | ... | r_{a_q}(u_p) |
(I, A, 6) | a_1 | a_2 | a_3 | a_4 | a_5 | a_6 |
u_{1} | 3 | 4 | 4 | 3 | 5 | 4 |
u_{2} | 5 | 5 | 3 | 3 | 4 | 4 |
u_{3} | 2 | 4 | 3 | 3 | 4 | 4 |
u_{4} | 4 | 2 | 3 | 3 | 4 | 3 |
(F, A, 7) | a_{1} | a_{2} | a_{3} |
u_{1} | 4 | 3 | 1 |
u_{2} | 2 | 6 | 0 |
u_{3} | 1 | 0 | 5 |
(G, B, 6) | b_{1} | b_{2} |
u_{1} | 3 | 5 |
u_{2} | 1 | 4 |
u_{3} | 2 | 0 |
(H, A \times B, 6) | (a_{1}, b_{1}) | (a_{1}, b_{2}) | (a_{2}, b_{1}) | (a_{2}, b_{2}) | (a_{3}, b_{1}) | (a_{3}, b_{2}) |
u_{1} | 3 | 3 | 1 | 4 | 3 | 1 |
u_{2} | 1 | 1 | 0 | 2 | 4 | 0 |
u_{3} | 1 | 0 | 2 | 0 | 0 | 0 |
(F, E) | e_{1} | e_{2} | e_{3} |
u_{1} | 1 | 0 | 0 |
u_{2} | 1 | 0 | 0 |
u_{3} | 1 | 0 | 0 |
u_{4} | 0 | 1 | 0 |
u_{5} | 0 | 1 | 0 |
u_{6} | 0 | 1 | 0 |
u_{7} | 0 | 0 | 1 |
F_A | a_{1} | a_{2} | a_{3} |
u_{1} | 0.75 | 0.30 | 0.30 |
u_{2} | 0.55 | 0.80 | 0.70 |
u_{3} | 0.60 | 0.85 | 0.60 |
u_{4} | 0.30 | 0.55 | 0.80 |
u_{5} | 0.70 | 0.80 | 0.55 |
u_{6} | 0.80 | 0.55 | 0.25 |
(G, A) | a_{1} | a_{2} | a_{3} |
u_{1} | 1 | 0 | 0 |
u_{2} | 0 | 1 | 0 |
u_{3} | 0 | 1 | 0 |
u_{4} | 0 | 0 | 1 |
u_{5} | 0 | 1 | 0 |
u_{6} | 1 | 0 | 0 |
H_A | a_{1} | a_{2} | a_{3} |
u_{1} | 0.75 | 0 | 0 |
u_{2} | 0 | 0.80 | 0 |
u_{3} | 0 | 0.85 | 0 |
u_{4} | 0 | 0 | 0.80 |
u_{5} | 0 | 0.80 | 0 |
u_{6} | 0.80 | 0 | 0 |
( F,A,6 ) | a_{1} | a_{2} | a_{3} |
u_{1} | 5 | 2 | 1 |
u_{2} | 0 | 3 | 2 |
u_{3} | 1 | 2 | 4 |
u_{4} | 4 | 2 | 0 |
u_{5} | 3 | 1 | 1 |
u_{6} | 0 | 5 | 1 |
(G, A) | a_{1} | a_{2} | a_{3} |
u_{1} | 1 | 0 | 0 |
u_{2} | 0 | 1 | 0 |
u_{3} | 0 | 0 | 1 |
u_{4} | 1 | 0 | 0 |
u_{5} | 1 | 0 | 0 |
u_{6} | 0 | 1 | 0 |
(H, A, 6) | a_{1} | a_{2} | a_{3} |
u_{1} | 5 | 0 | 0 |
u_{2} | 0 | 3 | 0 |
u_{3} | 0 | 0 | 4 |
u_{4} | 4 | 0 | 0 |
u_{5} | 3 | 0 | 0 |
u_{6} | 0 | 5 | 0 |
(J, A, 6) | a_{1} | a_{2} | a_{3} |
u_{1} | 5 | 1 | 2 |
u_{2} | 5 | 0 | 1 |
u_{3} | 3 | 2 | 1 |
u_{4} | 4 | 1 | 2 |
u_{5} | 3 | 2 | 1 |
u_{6} | 5 | 2 | 1 |
(J_{1}, A) | a_{1} | a_{2} | a_{3} |
u_{1} | 1 | 0 | 0 |
u_{2} | 1 | 0 | 0 |
u_{3} | 1 | 0 | 0 |
u_{4} | 1 | 0 | 0 |
u_{5} | 1 | 0 | 0 |
u_{6} | 1 | 0 | 0 |
(F, A, 6) | a_{1} | a_{2} | a_{3} | a_{4} |
u_{1} | 5 | 1 | 2 | 1 |
u_{2} | 0 | 5 | 2 | 1 |
u_{3} | 1 | 2 | 3 | 0 |
u_{4} | 1 | 2 | 1 | 4 |
(G, A) | a_{1} | a_{2} | a_{3} | a_{4} |
u_{1} | 1 | 0 | 0 | 0 |
u_{2} | 0 | 1 | 0 | 0 |
u_{3} | 0 | 0 | 1 | 0 |
u_{4} | 0 | 0 | 0 | 1 |
(F, A, 8) | a_{1} | a_{2} |
u_{1} | 7 | 2 |
u_{2} | 3 | 4 |
u_{3} | 2 | 5 |
u_{4} | 0 | 6 |
u_{5} | 4 | 1 |
u_{6} | 2 | 4 |
(F^c, A, 8) | a_{1} | a_{2} |
u_{1} | 0 | 5 |
u_{2} | 4 | 3 |
u_{3} | 5 | 2 |
u_{4} | 7 | 1 |
u_{5} | 3 | 6 |
u_{6} | 5 | 3 |
(F, A, N) | a_{1} | a_{2} |
u_{1} | r_{a_1}(u_1) | r_{a_2}(u_1) |
u_{2} | r_{a_1}(u_2) | r_{a_2}(u_2) |
: | : | : |
: | : | : |
u_{j} | r_{a_1}(u_j) | r_{a_2}(u_j) |
(F^c, A, N) | a_{1} | a_{2} |
u_{1} | (N-1)-r_{a_1}(u_1) | (N-1)-r_{a_2}(u_1) |
u_{2} | (N-1)-r_{a_1}(u_2) | (N-1)-r_{a_2}(u_2) |
: | : | : |
: | : | : |
u_{j} | (N-1)-r_{a_1}(u_j) | (N-1)-r_{a_2}(u_j) |
(F, A, N_1) | a_{1} | a_{2} | ... | a_{i} |
u_{1} | r_{a_1}(u_1) | r_{a_2}(u_1) | ... | r_{a_i}(u_1) |
u_{2} | r_{a_1}(u_2) | r_{a_2}(u_2) | ... | r_{a_i}(u_2) |
: | ||||
: | ||||
u_{j} | r_{a_1}(u_j) | r_{a_2}(u_j) | ... | r_{a_i}(u_j) |
(G, B, N_2) | b_{1} | b_{2} | ... | b_{i} |
u_{1} | s_{b_1}(u_1) | s_{b_2}(u_1) | ... | s_{b_i}(u_1) |
u_{2} | s_{b_1}(u_2) | s_{b_2}(u_2) | ... | s_{b_i}(u_2) |
: | ||||
: | ||||
u_{j} | s_{b_1}(u_j) | s_{b_2}(u_j) | ... | s_{b_i}(u_j) |
(F_1, A_1, 7) | a_{1} | a_{2} | a_{3} |
u_{1} | 5 | 0 | 0 |
u_{2} | 0 | 6 | 0 |
u_{3} | 0 | 0 | 5 |
u_{4} | 4 | 0 | 0 |
u_{5} | 0 | 4 | 0 |
u_{6} | 0 | 4 | 0 |
(F_2, A_2, 8) | b_{1} | b_{2} |
u_{1} | 6 | 0 |
u_{2} | 0 | 7 |
u_{3} | 5 | 0 |
u_{4} | 7 | 0 |
u_{5} | 5 | 0 |
u_{6} | 0 | 6 |
(F_3, A_3, 8) | c_{1} | c_{2} |
u_{1} | 0 | 6 |
u_{2} | 7 | 0 |
u_{3} | 6 | 0 |
u_{4} | 0 | 5 |
u_{5} | 5 | 0 |
u_{6} | 6 | 0 |
(F, A_1 \times A_2, 7) | (a_{1}, b_{1}) | (a_{1}, b_{2}) | (a_{2}, b_{1}) | (a_{2}, b_{2}) | (a_{3}, b_{1}) | (a_{3}, b_{2}) |
u_{1} | 5 | 0 | 0 | 0 | 0 | 0 |
u_{2} | 0 | 0 | 0 | 6 | 0 | 0 |
u_{3} | 0 | 0 | 0 | 0 | 5 | 0 |
u_{4} | 4 | 0 | 0 | 0 | 0 | 0 |
u_{5} | 0 | 0 | 4 | 0 | 0 | 0 |
u_{6} | 0 | 0 | 0 | 4 | 0 | 0 |
(F_1, A_1, 6) | a_1 | a_2 | a_3 |
u_{1} | 2 | 5 | 2 |
u_{2} | 1 | 2 | 3 |
u_{3} | 5 | 2 | 2 |
u_{4} | 2 | 1 | 3 |
u_{5} | 2 | 4 | 2 |
u_{6} | 2 | 2 | 3 |
( F_2, A_2, 6 ) | b_1 | b_2 | b_3 |
u_{1} | 3 | 2 | 1 |
u_{2} | 2 | 2 | 5 |
u_{3} | 2 | 4 | 2 |
u_{4} | 2 | 3 | 2 |
u_{5} | 2 | 2 | 4 |
u_{6} | 3 | 2 | 2 |
( F_3, A_3, 6 ) | c_1 | c_2 | c_3 |
u_{1} | 3 | 1 | 2 |
u_{2} | 1 | 4 | 2 |
u_{3} | 3 | 2 | 2 |
u_{4} | 2 | 1 | 5 |
u_{5} | 4 | 2 | 2 |
u_{6} | 3 | 1 | 2 |
( F_4, A_4, 5 ) | d_1 | d_2 |
u_{1} | 0 | 3 |
u_{2} | 4 | 0 |
u_{3} | 0 | 4 |
u_{4} | 4 | 0 |
u_{5} | 3 | 0 |
u_{6} | 0 | 3 |
(F_1, A_1, 6) | a_1 | a_2 | a_3 |
u_{1} | 0 | 5 | 0 |
u_{2} | 0 | 0 | 3 |
u_{3} | 5 | 0 | 0 |
u_{4} | 0 | 0 | 3 |
u_{5} | 0 | 4 | 0 |
u_{6} | 0 | 0 | 3 |
(F_2, A_2, 6) | b_1 | b_2 | b_3 |
u_{1} | 3 | 0 | 0 |
u_{2} | 0 | 0 | 5 |
u_{3} | 0 | 4 | 0 |
u_{4} | 0 | 3 | 0 |
u_{5} | 0 | 0 | 4 |
u_{6} | 3 | 0 | 0 |
(F_3, A_3, 6) | c_1 | c_2 | c_3 |
u_{1} | 3 | 0 | 0 |
u_{2} | 0 | 4 | 0 |
u_{3} | 3 | 0 | 0 |
u_{4} | 0 | 0 | 5 |
u_{5} | 4 | 0 | 0 |
u_{6} | 3 | 0 | 0 |
(F_4, A_4, 5) | d_1 | d_2 |
u_{1} | 0 | 3 |
u_{2} | 4 | 0 |
u_{3} | 0 | 4 |
u_{4} | 4 | 0 |
u_{5} | 3 | 0 |
u_{6} | 0 | 3 |
\gamma(\wedge_{j=0}^3 (F_j, A_j, N_j), (F_4, A_4, 5)) | \alpha |
\gamma((F_1, A_1, 6), (F_4, A_4, 5)) | 0 |
\gamma((F_2, A_2, 6), (F_4, A_4, 5)) | 0.2727 |
\gamma((F_3, A_3, 6), (F_4, A_4, 5)) | 0.1904 |
\gamma((F_1, A_1, 6)\wedge(F_2, A_2, 6), (F_4, A_4, 5)) | 0.8 |
\gamma((F_1, A_1, 6)\wedge(F_3, A_3, 6), (F_4, A_4, 5)) | 0.7058 |
\gamma((F_2, A_2, 6)\wedge(F_3, A_3, 6), (F_4, A_4, 5)) | 1 |
\gamma((F_1, A_1, 6)\wedge(F_2, A_2, 6)\wedge (F_3, A_3, 6), (F_4, A_4, 5)) | 1 |