
Communication networks are exposed to internal or external risks that can affect all or part of the system. The most important components that form the infrastructure of these systems are routers, which act as nodes. In the field of graph theory, there are sophisticated techniques that can be used to optimize the path of a packet as it travels through various routers from its origin to its destination. A notable example of such an algorithm is Dijkstra's algorithm, which is designed to efficiently determine the shortest path. The algorithm works under the assumption that the system operates under ideal conditions. Real-time systems can perform better if risk factors and optimal conditions are taken into account. The relationship between the nodes can be expressed by various metrics such as distance, delay, and bandwidth. The aforementioned metrics facilitate the calculation of the optimal path, with the ultimate objective of achieving low-latency networks characterized by rapid response times. Round-trip time (RTT) can be employed as a metric for measuring enhancements in a range of latency types, including those associated with processing, transmission, queuing, and propagation. The use of Z-numbers was employed in this study to incorporate risk into the optimal path metric. RTT was the preferred metric and reliability was represented by fuzzy linguistic qualifiers. A comparison of several scenarios was shown using a numerical example of a communication network. It is expected that this study will have a significant impact on the evolution from models that consider only ideal conditions to real-time systems that include risks using Z-numbers.
Citation: Nurdoğan Güner, Halit Orhan, Tofigh Allahviranloo, Bilal Usanmaz. A precise solution to the shortest path optimization problem in graphs using Z-numbers[J]. AIMS Mathematics, 2024, 9(11): 30100-30121. doi: 10.3934/math.20241454
[1] | Xiaomei Zhang, Xiang Chen . Uniqueness of difference polynomials. AIMS Mathematics, 2021, 6(10): 10485-10494. doi: 10.3934/math.2021608 |
[2] | Hicham Saber, Zahid Raza, Abdulaziz M. Alanazi, Adel A. Attiya, Akbar Ali . On trees with a given number of segments and their maximum general $ Z $-type index. AIMS Mathematics, 2025, 10(1): 195-207. doi: 10.3934/math.2025010 |
[3] | Rabha W. Ibrahim, Dumitru Baleanu . Geometric behavior of a class of algebraic differential equations in a complex domain using a majorization concept. AIMS Mathematics, 2021, 6(1): 806-820. doi: 10.3934/math.2021049 |
[4] | Ran Ran Zhang, Chuang Xin Chen, Zhi Bo Huang . Uniqueness on linear difference polynomials of meromorphic functions. AIMS Mathematics, 2021, 6(4): 3874-3888. doi: 10.3934/math.2021230 |
[5] | Chunlian Liu . Non-resonance with one-sided superlinear growth for indefinite planar systems via rotation numbers. AIMS Mathematics, 2022, 7(8): 14163-14186. doi: 10.3934/math.2022781 |
[6] | Rashid Farooq, Laiba Mudusar . Non-self-centrality number of some molecular graphs. AIMS Mathematics, 2021, 6(8): 8342-8351. doi: 10.3934/math.2021483 |
[7] | Shunqi Ma . On the distribution of $ k $-full lattice points in $ \mathbb{Z}^2 $. AIMS Mathematics, 2022, 7(6): 10596-10608. doi: 10.3934/math.2022591 |
[8] | Fugang Chao, Donghan Zhang . Neighbor sum distinguishing total choice number of IC-planar graphs with restrictive conditions. AIMS Mathematics, 2023, 8(6): 13637-13646. doi: 10.3934/math.2023692 |
[9] | Fareeha Jamal, Muhammad Imran . Distance spectrum of some zero divisor graphs. AIMS Mathematics, 2024, 9(9): 23979-23996. doi: 10.3934/math.20241166 |
[10] | Tae Hun Kim, Ha Nuel Ju, Hong Nyeong Kim, Seong Yoon Jo, Choonkil Park . Bihomomorphisms and biderivations in Lie Banach algebras. AIMS Mathematics, 2020, 5(3): 2196-2210. doi: 10.3934/math.2020145 |
Communication networks are exposed to internal or external risks that can affect all or part of the system. The most important components that form the infrastructure of these systems are routers, which act as nodes. In the field of graph theory, there are sophisticated techniques that can be used to optimize the path of a packet as it travels through various routers from its origin to its destination. A notable example of such an algorithm is Dijkstra's algorithm, which is designed to efficiently determine the shortest path. The algorithm works under the assumption that the system operates under ideal conditions. Real-time systems can perform better if risk factors and optimal conditions are taken into account. The relationship between the nodes can be expressed by various metrics such as distance, delay, and bandwidth. The aforementioned metrics facilitate the calculation of the optimal path, with the ultimate objective of achieving low-latency networks characterized by rapid response times. Round-trip time (RTT) can be employed as a metric for measuring enhancements in a range of latency types, including those associated with processing, transmission, queuing, and propagation. The use of Z-numbers was employed in this study to incorporate risk into the optimal path metric. RTT was the preferred metric and reliability was represented by fuzzy linguistic qualifiers. A comparison of several scenarios was shown using a numerical example of a communication network. It is expected that this study will have a significant impact on the evolution from models that consider only ideal conditions to real-time systems that include risks using Z-numbers.
Uncertainties are common in real-life information. In order to effectively incorporate this information into decision-making processes, it is essential to represent uncertainties and natural language expressions in a scientifically accurate way. In 1965, Lotfi A. Zadeh introduced the concept of a fuzzy representation of situations in the real world [1]. Fuzzy numbers, which are often used in fuzzy logic applications, represent uncertainty by a singular membership function. This means that the uncertainty measure is not taken into account. A first attempt to overcome this limitation was the introduction of the idea of a type-2 fuzzy set [2]. In 2011, Zadeh defined the concept of the Z-number by assigning a reliability measure, which is also a fuzzy number, to fuzzy numbers [3]. The Z-number, which is referred as Z=(A,B), consists of two components. The first component, A, represents a number with inherent uncertainty, while the second component, B, serves as a measure of the reliability associated with A. The value of B can be viewed as a probability measure for A. For example, the statement "The estimated arrival time from city X to city Y is usually about 5 hours" is a Z-number. In this context, the statement "about 5 hours" refers to the fuzzy number A. The term "usually" refers to the fuzzy number B, which indicates an uncertain estimate of the reliability of A.
Z-numbers have numerous applications to overcome the deficiency mentioned above [4,5,6,7]. However, due to the complexity of calculations with Z-numbers, certain difficulties arise in their application. To overcome these difficulties, a number of methods have been proposed, such as computing Z-numbers by converting them into fuzzy numbers [8]. However, the use of these techniques significantly reduces the advantage of using Z-numbers.
The first studies on arithmetic operations for the use of Z-numbers in applications were carried out by R. A. Aliev et al. [9,10,11]. On the other hand, several methods have been proposed for ranking Z-numbers [12,13,14,15].
One of the main topics of graph theory is the optimization of the shortest path. The Dijkstra algorithm is a widely used approach to solve this problem. It has been used in communication networks as part of the OSPF (open shortest path first) protocol to optimize the path between routers [16].
Dijkstra's algorithm utilizes crisp numbers, however there are also studies in the literature using fuzzy numbers to explain the uncertainty [17,18,19,20]. Biswas suggested that Z-numbers can solve the shortest path problem using Dijkstra's algorithm [21]. Veerammal also solved the numerical example using Biswas' method given in [22]. However, in these studies, the probability distributions underlying the second components of the numbers in addition to the Z-numbers were not considered.
In this study, Z-numbers are employed to perform the requisite addition and ranking operations for Dijkstra's algorithm, in accordance with the methodologies described in 2.3 and 2.4. The incorporation of Z-numbers, which are uniquely capable of capturing both the value of uncertain information and the degree of confidence in that information, demonstrates that they offer a more effective means of representing uncertainty than crisp and fuzzy numbers. This is corroborated by numerical solutions across a range of scenarios, which show how Z-numbers provide a more comprehensive and accurate reflection of uncertainty.
The results of the study highlight the strengths of Z-numbers in handling uncertainty in computational processes, particularly in complex systems such as network optimization and pathfinding algorithms like Dijkstra's.
The process of adding Z-numbers includes operations on random variables in accordance with the probability constraint in the second component. Therefore, this section includes explanations about random variables as well as basic concepts about Z-numbers.
Random variables and their operations are provided in [23,24]. This section contains some definitions of random variables and the convolution theorem for the sum of continuous random variables.
Definition 2.1. A random variable X is a function that assigns a numerical value to every random event in the sample space S. There are two types of random variables: Continuous and discrete random variables.
Provided that X is a random variable,
● If X has a finite number of possible outcomes, it is a discrete random variable.
● If X has an infinite number of possible outcomes, it is a continuous random variable [9].
To determine a probability that a continuous random variable X takes any value in a closed interval [a,b], denoted by P(a≤X≤b), the concept of probability distribution is used. A probability distribution or probability density function (pdf) is a function p(x) such that for any two numbers a and b with a≤b:
P(a≤X≤b)=∫bap(x)dx, |
where p(x)≥0 and ∫∞−∞p(x)dx=1.
Definition 2.2. The continuous random variable X follows a normal (Gaussian) distribution if its pdf is defined as:
p(x)=1σ√2πe−12(x−μσ)2, |
where μ is the mean of X and σ2 is the variance of X. For a normal pdf, a typical notation is used: p=N(μ,σ) [11].
Theorem 2.1. Let X1 and X2 be independent random variables. Then, the pdf of X12=X1+X2 is the convolution of the pdfs of X1 and X2:
p12(x12)=∫∞−∞p1(x1)p2(x12−x1)dx1. | (2.1) |
If Xi,i=1,2, is a normal random distribution with μ12=μ1+μ2 and σ12=√σ12+σ22 [23], then the pdf of convolution p12 is
p12(x)=1√2π(σ12+σ22)e−12(x−(μ1+μ2))2σ12+σ22. | (2.2) |
In this section, the definition of a Z-number and some basic concepts related to Z-numbers are given.
Definition 2.3. A fuzzy set A whose membership function is μA:R→[0,1] is a fuzzy number if it satisfies the following conditions:
a. A is normal, that is ∃u0∈R with μA(u0)=1,
b. A is convex, that is μA((1−λ)u+λv)≥min{μA(u),μA(v)}, ∀u,v∈R, λ∈[0,1],
c. A is upper semicontinuous, that is ∀ε>0, ∃δ>0 such that μA(x)−μA(x0)<ε, |x−x0|<δ,
d. cl(A)={x∈R:μA(x)>0} is compact, where cl(A) denotes the closure of the set A [25].
Note that the notation A represents the fuzzy number and μA(x) represents the membership function of A.
Definition 2.4. A trapezoidal fuzzy number is represented by four real numbers as follows: A=(a,b,c,d), with a≤b≤c≤d, and its membership function μA is given by
μA(x)={x−ab−a, a≤x≤b,1, b≤x≤c,d−xd−c, c≤x≤d,0, otherwise. |
If A=(a,b,c,d) is a trapezoidal fuzzy number and b=c, then A is a triangular fuzzy number, which is represented by the form A=(a,b,d) [26].
Definition 2.5. A fuzzy number A with μA(x)=0 for ∀x<0 is called a positive fuzzy number [27].
Definition 2.6. Let X be a real-valued uncertain variable, A and B are two fuzzy numbers, and the Z-number is defined as an ordered pair of fuzzy numbers Z=(A,B). The first component A is a fuzzy restriction on the values of X, a real-valued uncertain variable. The second component B is a measure of reliability for A.
The basic form of Z=(A,B) on the random variable X, "X is (A,B)", can be expressed as follows:
Prob(X is A) is B or (X is A) isp B, |
where B is the restriction probability measure of X being represented by the fuzzy number A. Also, "isp" is the abbreviation for "is probability" [5].
Illustrative Example: Let us consider that we have the information that the average life expectancy will likely be around80 years in the near future. The phrase "around 80 years" in this linguistic expression indicates a fuzzy number. The phrase "likely" serves as a fuzzy restrictive probability measure of the possibility of this fuzzy number. If we take the expressions "around 80 years" and "likely" in natural language as triangular fuzzy numbers (70,80,90) and (0.5,0.725,0.95) respectively, we get the Z=(A,B)=((70,80,90),(0.5,0.725,0.95)) Z-number. In this Z-number, the fuzzy numberB=(0.5,0.725,0.95), which corresponds to the phrase "likely", can be interpreted as a fuzzy probability value that indicates the degree of confidence in the information that the average life expectancy will be "around 80 years" in the near future. The graphs of the membership functions of the fuzzy numbers A and B, which are the components of the Z=(A,B) Z-number, are shown in Figure 1.
Definition 2.7. Z=(A,B), whose components A and B are continuous fuzzy numbers, is called a continuous Z-number [9].
Definition 2.8. If A and B are positive fuzzy numbers, Z=(A,B) is called a positive Z-number [28].
Definition 2.9. The Z-number is expressed as the dual Z+=(A,R). Here A plays the same role as in the Z-number Z=(A,B). R is a random number defined by the probability density function pR [9]. Thus:
∫RμA(x)pR(x)dx is BμpR(pR)=μB(∫RμA(x)pR(x)dx). | (2.3) |
In the continuous Z-number Z=(A,B), there are many probability distributions underlying the fuzzy number B, which expresses the probability measure. In this study, normal probability distribution is used for the convenience of calculations for continuous Z-numbers.
To simplify the calculations for two Z-numbers Z+j=(Aj,Rj), j=1,2, the membership degrees given in (2.3) can be discretized as follows:
μpj(pjl)=μBj(nj∑i=1μAj(xji)pjl(xji)), j=1,2. | (2.4) |
To calculate the discretized membership degrees, supp(Bj) must be divided by bjl, l=1,m discrete subintervals. This produces the goal programming equation
bjl=P(Aj)=nj∑i=1μAj(xji)pjl(xji), | (2.5) |
which contains the values of the probability measure of the fuzzy number Aj. It is known that this equation satisfies the following compatibility conditions:
nj∑i=1pjl(xji)=1, pjl(xji)≥0, | (2.6) |
nj∑i=1pjl(xji)xji=∑nji=1μAj(xji)xji∑nji=1μAj(xji). | (2.7) |
In this section, the steps of addition with continuous Z-numbers described in [11] are given.
Let Z1=(A1,B1) and Z2=(A2,B2) be continuous Z-numbers. The steps of the Z12=Z1+Z2=(A1+A2,B1+B2)=(A12,B12) addition process are as follows:
Step 1. The addition of A12=A1+A2 is calculated. Let A1=(l1,m1,u1) and A2=(l2,m2,u2) be triangular fuzzy numbers. In this case, A1+A2=(l1+l2,m1+m2,u1+u2).
Step 2. Switch to Z-numbers and use (2.1) to compute R12=R1+R2 via convolution of p12=p1∘p2. The probability distributions p1 and p2, which underlie R1 and R2, are treated as normal pdfs in this study, and the calculation is performed using the (2.2) formula.
Step 3. The membership degrees of the discretized μpj, j=1,2, are calculated using (2.4). To do this, linear programming equations written using (2.5) are solved, taking into account the compatibility conditions given in (2.6) and (2.7).
Step 4. The membership degrees of the discretized μp12 are determined with the use of μp12(p12s)=[μp1(p1l1)∧μp2(p2l2)], where p12s is the p1l1∘p2l2 convolution.
Step 5. The value of μB12 is determined using the μB12(b12s)=μp12s(p12s) equation with μp12 and μA12. This value is designated as b12s=∑ni=1μA12(xi)p12s(xi). Using the obtained μB12, the B12 triangle fuzzy number is determined.
So Z12=Z1+Z2=(A12,B12) is calculated.
Ranking of Z-numbers was studied in [12,13,14,15]. In this section, the Z-numbers ranking algorithm by a sigmoid function based on the combination of the convex method in [15] is briefly introduced.
The Rank(Z) value of a Z=(A,B) Z-number, including G=(xA∗×|α|)+STDA∗, can be calculated using the formula provided below.
Rank(Z)={11+e−G, G>0,0, G=0,−11+e−G, G<0. |
In this algorithm; α represents the conversion of B (reliability) into a crisp number, which is calculated according to the following formula:
α=∫XxμBdx∫XμBdx. |
A∗ represents the standardized generalized version of the trapezoidal fuzzy number A. The defuzzified value of A∗, denoted by xA∗, is calculated according to the following formula, which combines the definition of the mean value and the convex combination:
xA∗=λ(a∗2+a∗3)+(1−λ)(a∗1+a∗4)λδ1+(1−λ)δ2. |
STDA∗ represents the spread value of A∗ and is calculated as follows.
STDA∗=√λ((a∗2−xA∗)2+(a∗3−xA∗)2)+(1−λ)((a∗1−xA∗)2+(a∗4−xA∗)2)λδ1+(1−λ)δ2. |
Various convex combinations for trapezoidal fuzzy numbers are shown in [15]. In this study, the value of Rank(Z)∈(−1,1) was calculated using λ(a∗2+a∗3)+(1−λ)(a∗1+a∗4) for λ=0.5. Since triangular fuzzy numbers were used in this paper, a2=a3 was taken.
As the Rank(Z) value increases, so does the value of the Z-number. In other words, if u and v are Z-numbers and Rank(u)>Rank(v), then u is considered greater than v. Additionally, if w is a positive Z-number, then Rank(u)<Rank(u+w).
This section contains the basic concepts of the graph and the definition of the Z-graph.
Definition 2.10. A graph is comprised of two sets: The vertex set, V, and the edge set, E. An edge, denoted by xy, is an unordered pair of vertices, where x and y are elements of V. G or G=(V,E) will be frequently used as shorthand [29].
Definition 2.11. A weighted graph G=(V,E,w) is a graph in which each edge is associated with a real number. The weight of the edge xy is denoted as w(xy) [29].
Definition 2.12. A graph is considered a Z-graph if at least one of its edges has a Z-number weight [21].
The proposed Z-number based approach for shortest path optimization and some explanations required for it are presented in this section.
This section contains an explanation of the shortest path algorithm, which is a fundamental method in graph theory and is employed to determine the most efficient route between two vertices in a given network.
Dijkstra's algorithm is known as one of the best-known algorithms for this particular objective [30]. The operation of this method is based on scanning neighboring vertices from the marked vertex at each step and updating the tags of the scanned vertices. The process begins with the selection of the source vertex, which is then assigned a distance value of zero. Subsequently, an analysis is conducted on all adjacent vertices of the initial vertex, whereby distances are assigned to them in accordance with their respective edge weights. The algorithm then selects the vertex with the shortest distance and works by assigning or updating tags to the neighbors of this vertex. The procedure described above is executed iteratively until all vertices have been visited or until the target vertex has been reached.
The objective of the algorithm is to find the path with the lowest cumulative weight from the source vertex to the destination vertex, which is achieved by backward tracking using labels [29].
This section contains a description of round-trip time (RTT), a metric used to represent the Z-number cost values (referred to as Z-cost) associated with communication links between routers (also referred to as nodes) in a network.
RTT is used as a cost metric for the connections between nodes. Each node is considered as a router in computer networks. Round-trip time, the time it takes to send a packet to a given destination and receive a response, is often used as a metric to evaluate network performance [31].
The objective is to achieve high performance in networks, characterized by low latency and fast response time. The term "network latency" is typically used to describe a range of factors that can impede communication over a given network, ultimately affecting its overall performance. In a network, a data packet must traverse numerous links and nodes (such as cables, fibers, routers, and switches) to reach its intended destination. Each of these steps introduces a certain degree of delay. The primary sources of delay can be broadly classified into four categories: processing, transmission, queuing, and propagation delay. RTT is a complex metric that can be used to quantify the cumulative impact of these delays [32].
In this study, the RTT values, which indicate the delays between nodes, are represented by Z-numbers to incorporate the uncertainties associated with the delays in the actual operation of the communication network.
In this section, the Dijkstra algorithm in [29,33,34] has been rearranged to include operations with Z-numbers and its accuracy has been proven.
Let G=(V,E,w) be a Z-graph. The set of vertices of G is denoted by V, while E represents the set of edges that connect neighboring vertices. The function w assigns a positive Z-number value w(xy) to each xy edge.
The Dijkstra algorithm assigns to each vertex v∈V in the graph G an ordered binary label L(v)=(x,δ(v)). Where Vertex x is the last vertex visited before reaching v, and δ(v) is the Z-number weight of the shortest path used to reach vertex v from the starting point. At each stage of the algorithm, a set of previously unmarked neighboring vertices, denoted by N, is considered.
The steps to find ρ(v), the shortest path from the starting vertex to each v∈V in the graph G, and δ(v), the Z-number weight of this path, are as follows:
Step 1*. Assign the label L(x) to each vertex x of G. When labeling for the first time, set x=u as L(x)=(−,0) for the starting corner and L(x)=(−,∞) for the other corners. Mark the start vertex.
Step 2*. Define N as the neighbors of vertex u. For each v∈N, update L(v)=(u,w(uv)). Mark the vertex v with the lowest weight Rank(δ(v)). Assign u=v.
Step 3*. Update N by adding neighbors of vertex u to N. Then for each v∈N, calculate the Z-addition δ(u)+w(uv).
If Rank(δ(u)+w(uv))<Rank(δ(v)), update L(v)=(u,δ(u)+w(uv)). |
Otherwise, do not change L(v).
Note that for vertices visited for the first time, the Rank(δ(v)) value is taken to be ∞.
Step 4*. Mark the edge uv and the vertex v∈N with the lowest weight in the Z-ranking result. Assign u=v.
Step 5*. Repeat Steps 3* and 4* until all vertices have been visited. During each iteration, update labels only for vertices that are adjacent to the last marked vertex.
Step 6*. The shortest path from the starting vertex u to any vertex x, denoted as ρ(x), is determined by backtracking with the assistance of the first component of L(x). The cumulative Z-number weight of the path is represented by the second component of L(x).
If weight is interpreted as cost, then w(xy) can be thought of as the Z-cost value of the xy edge. In this case, the cost from u to x is defined as the minimum weight of a path directed from u to x. If P(u,x)=(u=v0,v1,...,vt=x) represents the directed path from vertex u to vertex x, then the Z-cost of the path P is equal to ∑t−1i=0w(vivi+1), which is the sum of the cost values of all the edges in the path. In addition, Rank(Z) values, which are real numbers, are used to compare Z-cost values.
The correctness theorem of Dijkstra's algorithm for the Z-graph G, which is weighted with positive Z-number values, and the required lemmas for this theorem are as follows.
Lemma 3.1. Let x be a vertex and let ρ(x)=(u=v0,v1,...,vt=x) be a shortest path from u to x. Then for every integer j with 0<j<t, (v0,v1,...,vj) is a shortest path from u to vj and (vj,vj+1,...,vt) is a shortest path from vj to vt.
Proof. Assuming there is an alternative path P∗(u,vj) that differs from ρ(vj) where Rank(δ∗(vj))<Rank(δ(vj)), and the shortest path from u to vj becomes ρ∗(vj). Additionally, the shortest path from u to vt is found in P∗(u,vt), which differs from ρ(vt). This creates a contradiction, thus ρ(vj)=P(u,vj) is the shortest path from u to vj. Similarly, it can be demonstrated that the shortest path from vj to vt is P(u,vj). Therefore, the lemma is correct.
Lemma 3.2. At the end of the algorithm, let ρ(vn)=(v1,v2,...,vn) be the sequence of vertices of the shortest path from v1 to vn. Then
Rank(δ(v1))≤Rank(δ(v2))≤⋯≤Rank(δ(vn)). | (3.1) |
Proof. For n=1, the accuracy is obvious. Assuming that inequality (3.1) is true for n=k, we need to prove that it is true for n=k+1. In this case,
Rank(δ(v1))≤Rank(δ(v2))≤⋯≤Rank(δ(vk))≤Rank(δ(vk)+w(vkvk+1))=Rank(δ(vk+1)) |
due to w(vkvk+1), which has a positive Z-number weight. Therefore, the inequality (3.1) is satisfied. Thus, ρ(vk+1)=(v1,v2,...,vk+1), and the lemma holds true.
Theorem 3.1. Dijkstra's algorithm computes the shortest path for each vertex x in the Z-graph G and determines the Z-cost value of this path. When the algorithm is complete, δ(x) is the minimum Z-cost from u to x, and ρ(x)=P(u,x) is the shortest path from u to x.
Proof. The correctness of the theorem is obvious: When x=u, then δ(x)=0 and ρ(x)=(u). Let us consider the case where x≠u. To establish the existence of ρ(x), which is the shortest path from u to x by induction, and δ(x), which is the Z-cost value of this path, let us assume that the shortest path from u to x has the minimum number n of edges.
If n=1, then the shortest path from u to x, according to Step 2*, is ρ(x)=P(u,x), i.e., (u,x), and the Z-cost value of this path is δ(x)=w(ux).
Assuming k is a positive integer greater than 1, if the number of edges on the shortest path from u to x is n=k, let us accept that δ(x)=δ(vk) is the Z-cost value from u=v0 to x=vk, and ρ(x)=P(u,vk) is the shortest path from u=v0 to x=vk. As shown in Figure 2, it is worth noting that P(u,vk) may not be the same as the Q path. However, if they differ, their Z-cost values will be the same, i.e., δ(vk).
Now we will demonstrate the theorem's correctness in the event that the number of edges on the shortest path from u to x is n=k+1.
Let vk=vi and x=vj, where i and j are unique integers.
If j<i, then
Rank(δ(vk−1))≤Rank(δ(vk))≤Rank(δ(vk)+w(vkx))=Rank(δ(x)) |
due to Lemma 3.2 and the positive Z-number weight of w(vkx) (see Figure 3(a)). Since a value greater than the current Rank(δ(vk−1)) value is found for vertex vk−1, no updates are made as per Step 3*. Therefore, δ(x)=δ(vk−1) and ρ(x)=P(u,vk−1)=(v0,v1,v2,...,vk−1).
On the other hand, let j>i. If x is a vertex that has not been visited before, then
Rank(δ(x))=Rank(δ(vk)+w(vkx))<∞. |
In this case, due to Steps 2* and 3*, δ(x)=δ(vk+1) and ρ(x)=P(u,vk+1)=(v0,v1,v2,...,vk+1) (see Figure 3(b)). If x is a vertex that has been visited before, then δ(x)=min{Rank(δ(vk+1)),Rank(δ(x∗))} due to Step 3* in this case, where Rank(δ(x∗)) is the previous Z-cost value of the vertex vk+1. Moreover, ρ(x)=P(u,x) is the shortest path with a Z-cost value δ(x).
In this section, the method proposed in 3.3 is implemented on an illustrative example. The solution and obtained results of this problem are given as follows.
The Z-graph of a communication network with alternative paths from source node a to destination node i is shown in Figure 4. In this network, the nodes a, b, c, d, e, f, g, h, and i represent the routers and the vertices of the Z-graph. The links between neighboring nodes, which are the edges of the Z-graph, are represented by Z-numbers in the form Z=(A,B), indicating their Z-cost values. The metric of the first component of these values, A, is RTT and they are triangular fuzzy numbers in seconds.
B, the second component of the Z-cost values, is the probability measure of the reliability of the triangular fuzzy number A, which shows the RTT value between two nodes.
The symbols for the connection between nodes a and e are displayed in Figure 5.
The link between nodes a and e are weighted according to the Z-number Zae=(Aae,Bae). The triangular fuzzy number Aae=(8,10,12) indicates that a data packet sent from node a to node e completes the round trip in close to 10 seconds. The triangular fuzzy number Bae=(0.25,0.50,0.75) can be regarded as a restriction probability measure, indicating that the reliability of representing this path with Aae is evenly 0.50.
Fuzzy linguistic scales are widely used to represent real-life situations of uncertainty. Erkayman et al. used Chen's fuzzy language scale to calculate fuzzy TOPSIS when solving a multiple criteria decision-making problem in [35]. In this study, the fuzzy scale "Linguistic Values and Fuzzy Values of Probability" was used, which is presented in Table 1, that was prepared by M. Ebrat and R. Ghodsi [36]. This scale was used to represent the second component, B, of the Z-numbers. The scale was adjusted for ease of operation in the solution steps by replacing 0 with 0.01 in B1 and 1 with 0.99 in B5.
Variable | Linguistic Expression | Triangular Fuzzy Number |
B1 | Very Unlikely | [0.01,0.125,0.25] |
B2 | Unlikely | [0.05,0.275,0.5] |
B3 | Even | [0.25,0.5,0.75] |
B4 | Likely | [0.5,0.725,0.95] |
B5 | Very Likely | [0.75,0.875,0.99] |
Table 2 shows the B values for the scenarios based on four different expressions. Each scenario was created by changing a single B value in the first scenario while keeping the A values of the Z-numbers constant.
Bab | Bac | Bad | Bae | Bbc | Bbf | Bcd | Bcf | Bcg | Bde | Bdg | Bdh | Beh | Bfg | Bfi | Bgh | Bgi | Bhi | |
Scenario 1 | B2 | B3 | B2 | B3 | B4 | B5 | B1 | B2 | B5 | B1 | B4 | B3 | B4 | B3 | B4 | B1 | B2 | B5 |
Scenario 2 | B2 | B3 | B2 | B3 | B4 | B5 | B1 | B2 | B5 | B1 | B4 | B3 | B4 | B3 | B2 | B1 | B2 | B5 |
Scenario 3 | B2 | B4 | B2 | B3 | B4 | B5 | B1 | B2 | B5 | B1 | B4 | B3 | B4 | B3 | B4 | B1 | B2 | B5 |
Scenario 4 | B2 | B3 | B2 | B3 | B4 | B5 | B1 | B2 | B5 | B1 | B4 | B3 | B4 | B3 | B4 | B3 | B2 | B5 |
Note that the Z-cost values in Figure 4 and Table 2 are determined based on assumptions.
The objective is to determine the shortest path and its weight for a data packet transmitted from node a to node i.
Solution 4.1. The steps to solve Scenario 1 using the method proposed in Section 3.3 are presented below.
Step 1*. Set L(a)=(−,0). Set L(x)=(−,∞) for each x∈V−{a} (see Table 3(ⅰ)). Mark node a (see Figure 6 (ⅰ)).
(ⅰ) | (ⅱ) | (ⅲ) |
N={}L(a)=(−, 0)L(b)=(−, ∞)L(c)=(−, ∞)L(d)=(−, ∞)L(e)=(−, ∞)L(f)=(−, ∞)L(g)=(−, ∞)L(h)=(−, ∞)L(i)=(−, ∞) | u=aN={b,c,d,e}L(a)=(−, 0)L(b)=(a, [(6, 7, 8), (0.05, 0.275, 0.5)])L(c)=(a, [(7, 8, 9), (0.25, 0.5, 0.75)])L(d)=(a, [(9, 11, 13), (0.05, 0.275, 0.5)])L(e)=(a, [(8, 10, 12), (0.25, 0.5, 0.75)])L(f)=(−, ∞)L(g)=(−, ∞)L(h)=(−, ∞)L(i)=(−, ∞) | u=bN={c,d,e,f}L(a)=(−, 0)L(b)=(a, [(6, 7, 8), (0.05, 0.275, 0.5)])L(c)=(a, [(7, 8, 9), (0.25, 0.5, 0.75)])L(d)=(a, [(9, 11, 13), (0.05, 0.275, 0.5)])L(e)=(a, [(8, 10, 12), (0.25, 0.5, 0.75)])L(f)=(b, [(14, 18, 22), (0.20, 0.71, 0.86)])L(g)=(−, ∞)L(h)=(−, ∞)L(i)=(−, ∞) |
(iv) | (v) | (vi) |
u=cN={d,e,f,g}L(a)=(−, 0)L(b)=(a, [(6, 7, 8), (0.05, 0.275, 0.5)])L(c)=(a, [(7, 8, 9), (0.25, 0.5, 0.75)])L(d)=(c, [(9, 11, 13), (0.02, 0.24, 0.45)])L(e)=(a, [(8, 10, 12), (0.25, 0.5, 0.75)])L(f)=(c, [(11, 13, 15), (0.10, 0.45, 0.70)])L(g)=(c, [(18, 20, 22), (0.45, 0.72, 0.87)])L(h)=(−, ∞)L(i)=(−, ∞) | u=dN={e,f,g,h}L(a)=(−, 0)L(b)=(a, [(6, 7, 8), (0.05, 0.275, 0.5)])L(c)=(a, [(7, 8, 9), (0.25, 0.5, 0.75)])L(d)=(c, [(9, 11, 13), (0.02, 0.24, 0.45)])L(e)=(a, [(8, 10, 12), (0.25, 0.5, 0.75)])L(f)=(c, [(11, 13, 15), (0.10, 0.45, 0.70)])L(g)=(d, [(16, 20, 24), (0.04, 0.43, 0.69)])L(h)=(d, [(15, 18, 21), (0.03, 0.34, 0.59)])L(i)=(−, ∞) | u=eN={f,g,h}L(a)=(−, 0)L(b)=(a, [(6, 7, 8), (0.05, 0.275, 0.5)])L(c)=(a, [(7, 8, 9), (0.25, 0.5, 0.75)])L(d)=(c, [(9, 11, 13), (0.02, 0.24, 0.45)])L(e)=(a, [(8, 10, 12), (0.25, 0.5, 0.75)])L(f)=(c, [(11, 13, 15), (0.10, 0.45, 0.70)])L(g)=(d, [(16, 20, 24), (0.04, 0.43, 0.69)])L(h)=(d, [(15, 18, 21), (0.03, 0.34, 0.59)])L(i)=(−, ∞) |
(vii) | (viii) | (ix) |
u=fN={g,h,i}L(a)=(−, 0)L(b)=(a, [(6, 7, 8), (0.05, 0.275, 0.5)])L(c)=(a, [(7, 8, 9), (0.25, 0.5, 0.75)])L(d)=(c, [(9, 11, 13), (0.02, 0.24, 0.45)])L(e)=(a, [(8, 10, 12), (0.25, 0.5, 0.75)])L(f)=(c, [(11, 13, 15), (0.10, 0.45, 0.70)])L(g)=(d, [(16, 20, 24), (0.04, 0.43, 0.69)])L(h)=(d, [(15, 18, 21), (0.03, 0.34, 0.59)])L(i)=(f, [(22, 26, 30), (0.19, 0.66, 0.85)]) | u=hN={g,i}L(a)=(−, 0)L(b)=(a, [(6, 7, 8), (0.05, 0.275, 0.5)])L(c)=(a, [(7, 8, 9), (0.25, 0.5, 0.75)])L(d)=(c, [(9, 11, 13), (0.02, 0.24, 0.45)])L(e)=(a, [(8, 10, 12), (0.25, 0.5, 0.75)])L(f)=(c, [(11, 13, 15), (0.10, 0.45, 0.70)])L(g)=(h, [(17, 21, 25), (0.03, 0.33, 0.57)])L(h)=(d, [(15, 18, 21), (0.03, 0.34, 0.59)])L(i)=(h, [(21, 26, 31), (0.05, 0.51, 0.74)]) | u=gN={i}L(a)=(−, 0)L(b)=(a, [(6, 7, 8), (0.05, 0.275, 0.5)])L(c)=(a, [(7, 8, 9), (0.25, 0.5, 0.75)])L(d)=(c, [(9, 11, 13), (0.02, 0.24, 0.45)])L(e)=(a, [(8, 10, 12), (0.25, 0.5, 0.75)])L(f)=(c, [(11, 13, 15), (0.10, 0.45, 0.70)])L(g)=(h, [(17, 21, 25), (0.03, 0.33, 0.57)])L(h)=(d, [(15, 18, 21), (0.03, 0.34, 0.59)])L(i)=(g, [(22, 27, 32), (0.03, 0.38, 0.63)]) |
Step 2*. Let u=a. Then the neighbors of node a are N={b,c,d,e}.
Update,
L(b)=(a,[(6,7,8),(0.05,0.275,0.5)]), L(c)=(a,[(7,8,9),(0.25,0.5,0.75)]),
L(d)=(a,[(9,11,13),(0.05,0.275,0.5)]), and
L(e)=(a,[(8,10,12),(0.25,0.5,0.75)]) (see Table 3(ⅱ)).
The rank values δ(b), δ(c), δ(d), and δ(e) are 0.95890, 0.99465, 0.99583, and 0.99942, respectively. Since the Rank(δ(b)) value is minimal, link ab and node b are marked (see Figure 6(ⅱ)).
Step 3*. Let u=b. Then N={c,d,e,f}. Compute the Z-addition δ(b)+w(bv) and the value of Rank(δ(v)) for each v∈N that is a neighbor of node b in N.
Rank(δ(b)+w(bc))=Rank([(11,13,15),(0.10,0.48,0.73)])=0.99984≮0.99465=Rank(δ(c))
Rank(δ(b)+w(bf))=Rank([(14,18,22),(0.20,0.71,0.86)])=0.9999998<∞
Update, L(f)=(b,[(14,18,22),(0.20,0.71,0.86)]) (see Table 3(ⅲ)).
Step 4*. Since the Rank(δ(c)) value is minimal, link ac and node c are marked (see Figure 6(ⅲ)).
Step 5*. (Step 3*-Iteration 2) Let u=c. Then N={d,e,f,g}. Compute the Z-addition δ(c)+w(cv) and the value of Rank(δ(v)) for each v∈N that is a neighbor of node c in N.
Rank(δ(c)+w(cd))=Rank([(9,11,13),(0.02,0.24,0.45)])=0.99359<0.99583=Rank(δ(d))
Rank(δ(c)+w(cf))=Rank([(11,13,15),(0.10,0.45,0.70)])=0.99962<0.9999998=Rank(δ(f))
Rank(δ(c)+w(cg))=Rank([(18,20,22),(0.45,0.72,0.87)])=0.999999897<∞
Update,
L(d)=(c,[(9,11,13),(0.02,0.24,0.45)]),
L(f)=(c,[(11,13,15),(0.10,0.45,0.70)]), and
L(g)=(c,[(18,20,22),(0.45,0.72,0.87)]). (see Table 3(ⅳ)).
Step 5*. (Step 4*-Iteration 2) Since the Rank(δ(d)) value is minimal, link cd and node d are marked (see Figure 6(ⅳ)).
Step 5*. (Step 3*-Iteration 3) Let u=d. Then N={e,f,g,h}. Compute the Z-addition δ(d)+w(dv) and the value of Rank(δ(v)) for each v∈N that is a neighbor of node d in N.
Rank(δ(d)+w(de))=Rank([(12,15,18),(0.03,0.26,0.47)])=0.99953≮0.99942=Rank(δ(e))
Rank(δ(d)+w(dg))=Rank([(16,20,24),(0.04,0.43,0.69)])=0.9999988<0.999999897=Rank(δ(g))
Rank(δ(d)+w(dh))=Rank([(15,18,21),(0.03,0.34,0.59)])=0.99996<∞
Update,
L(g)=(d,[(16,20,24),(0.04,0.43,0.69)]) and
L(h)=(d,[(15,18,21),(0.03,0.34,0.59)]). (see Table 3(ⅴ)).
Step 5*. (Step 4*-Iteration 3) Since the Rank(δ(e)) value is minimal, link de and node e are marked (see Figure 6(ⅴ)).
Step 5*. (Step 3*-Iteration 4) Let u=e. Then N={f,g,h}. Compute the Z-addition δ(e)+w(ev) and the value of Rank(δ(v)) for each v∈N that is a neighbor of node e in N.
Rank(δ(e)+w(eh))=Rank([(20,24,28),(0.03,0.33,0.58)])=0.9999998≮0.99996=Rank(δ(h))
Do not update (see Table 3(ⅵ)).
Step 5*. (Step 4*-Iteration 4) Since the Rank(δ(f)) value is minimal, link cf and node f are marked (see Figure 6(ⅵ)).
Step 5*. (Step 3*-Iteration 5) Let u=f. Then N={g,h,i}. Compute the Z-addition δ(f)+w(fv) and the value of Rank(δ(v)) for each v∈N that is a neighbor of node f in N.
Rank(δ(f)+w(fg))=Rank([(19,23,27),(0.18,0.60,0.81)])=0.999999997≮0.9999988=Rank(δ(g))
Rank(δ(f)+w(fi))=Rank([(22,26,30),(0.19,0.66,0.85)])=0.999999997<∞
Update, L(i)=(f,[(22,26,30),(0.19,0.66,0.85)]) (see Table 3(ⅶ)).
Step 5*. (Step 4*-Iteration 5) Since the Rank(δ(h)) value is minimal, link dh and node h are marked (see Figure 6(ⅶ)).
Step 5*. (Step 3*-Iteration 6) Let u=h. Then N={g,i}. Compute the Z-addition δ(h)+w(hv) and the value of Rank(δ(v)) for each v∈N that is a neighbor of node h in N.
Rank(δ(h)+w(hg))=Rank([(17,21,25),(0.03,0.33,0.57)])=0.999989<0.9999988=Rank(δ(g))
Rank(δ(h)+w(hi))=Rank([(21,26,31),(0.05,0.51,0.74)])=0.99999998<0.999999997=Rank(δ(i))
Update,
L(g)=(h,[(17,21,25),(0.03,0.33,0.57)]) and
L(i)=(h,[(21,26,31),(0.05,0.51,0.74)]) (see Table 3(ⅷ)).
Step 5*. (Step 4*-Iteration 6) Since the Rank(δ(g)) value is minimal, link hg and node g are marked (see Figure 6(ⅷ)).
Step 5*. (Step 3*-Iteration 7) Let u=g. Then N={i}. Compute the Z-addition δ(g)+w(gv) and the value of Rank(δ(v)) for each v∈N that is a neighbor of node g in N.
Rank(δ(g)+w(gi))=Rank([(22,27,32),(0.03,0.38,0.63)])=0.9999998<0.99999998=Rank(δ(i))
Update, L(i)=(g,[(22,27,32),(0.03,0.38,0.63)]) (see Table 3(ⅸ)).
Step 5*. (Step 4*-Iteration 7) Since the Rank(δ(i)) value is minimal, link gi and node i are marked (see Figure 6(ⅸ)).
Step 6*. The algorithmic process is complete since all nodes have been visited. By considering the first components of the labels, the shortest path ρ(i)=(a,c,d,h,g,i) from the starting node a to the target node i is determined. Additionally, the Z-cost value of this path is Zρ(i)=δ(i)=[(22,27,32),(0.03,0.38,0.63)].
Table 4 presents the results obtained by applying the same steps to the other scenarios listed in Table 2.
ρ(i) | Zρ(i) | |
Scenario 1 | (a,c,d,h,g,i) | [(22,27,32),(0.03,0.38,0.63)] |
Scenario 2 | (a,c,f,i) | [(22,26,30),(0.09,0.44,0.69)] |
Scenario 3 | (a,d,h,g,i) | [(22,27,32),(0.05,0.40,0.65)] |
Scenario 4 | (a,c,d,g,i) | [(21,26,31),(0.05,0.48,0.73)] |
Figure 7 shows the shortest paths from node a to node i in the graph for each scenario.
In this study, Dijkstra's algorithm has been restructured to include Z-numbers. The algorithm of which steps and verification are given in 3.3 has been used in order to find the shortest path between the a and i nodes of the graph shown in Figure 4. The graph consisting of 9 nodes and 18 links has been designed for 4 different scenarios. For each scenario, the first components of the Z-cost values, which represent the RTT metric between links, have been kept constant. The scenarios have been differentiated by changing only one of the B values representing reliability in Scenario 1. Scenario 2 has been obtained by replacing the Bfi value with B2, Scenario 3 by replacing the Bac value with B4, and Scenario 4 by replacing the Bgh value with B3.
The results of addition operations with Z-numbers have been presented with two decimal digits after the comma and Z-ranking values have been presented with five decimal digits after the comma. If the decimal part of the Z-ranking value consists of 9 consecutive digits, then the decimal part is rounded to contain a number other than 9.
Table 3 presents the algorithmic step values of the first scenario. The nodes and paths followed for each step have been shown in Figure 6.
As a result, the shortest paths obtained for each scenario and their weights are presented in Table 4, and these paths are shown in Figure 7.
In this article, it has been shown that the shortest path can be determined more precisely by representing the uncertainties that may be encountered in the data transfer processes between routers in communication networks with Z-numbers. When the results obtained are taken into consideration, it is seen that the method put forward allows the uncertainty situations to be taken into account by blending.
By considering the central values of the first components of the Z-numbers representing the path weights of the graph shown in Figure 4, these weights can be considered as crisp numbers. In this case, the value of the shortest path from node a to node i is found to be 26 in seconds. There are a total of six paths with this value. These are: (a,c,f,i), (a,c,g,i), (a,c,d,g,i), (a,c,d,h,i), (a,d,g,i), and (a,d,h,i). Again, considering only the first components of the Z-numbers indicating the path weights, these weights can be considered as fuzzy numbers. In this case, considering the order of the fuzzy numbers, even if some of the shortest paths with equal weight are eliminated, paths with the same fuzzy numbers are encountered. For example, the fuzzy cost value of the paths (a,c,d,g,i), (a,c,d,h,i), (a,d,g,i), and (a,d,h,i) is (21,26,31). Therefore, it is not enough to show the weights of the paths between the links with fuzzy numbers. In this study, uncertainties were included in the calculation in a more precise way using Z-numbers and B in Scenario 1 was found to be the optimal way with fuzzy number values (a,c,d,h,g,i). The value of this path is also [(22,27,32),(0.03,0.38,0.63)].
In this study, the Z-number ranking algorithm according to a sigmoid function based on convex combination is used for Z-ranking and the validity of the results can be increased by selecting the most appropriate method for the problem from methods in the literature.
The Z-cost values of the connections between the nodes presented in Table 2 are hypothetical. In line with expert opinions, it is expected that the method proposed in 3.3 with Z-cost values to be obtained from real data will provide a more realistic solution to the shortest path optimization problems.
The complexity of operations involving Z-numbers renders the applicability of the proposed method increasingly challenging in real-world situations involving big data sets. Furthermore, in problems of a large dimension, it is considered that the effect of component B is reduced as the number of additions increases, which in turn results in a weakening of the overall impact of the proposed method.
The approach set out in this article can be applied to various fields such as multi-criteria decision-making, optimization, logistics, traveling salesman, and vehicle routing problems. In addition, the method set out in this article can be extended to cover different algorithms and methods.
Nurdoğan Güner: Conceptualization, Formal analysis, Methodology, Software, Validation, Visualization, Writing-original draft, Writing-review and editing; Halit Orhan: Conceptualization, Project administration, Supervision, Writing-review and editing; Tofigh Allahviranloo: Conceptualization, Project administration, Supervision, Writing-review and editing; Bilal Usanmaz: Conceptualization, Formal analysis, Methodology, Software, Validation, Visualization, Writing-review and editing. All the authors have read and approved the final version of the manuscript for publication.
The authors declare no conflict of interest.
[1] |
L. A. Zadeh, Fuzzy sets, Inf. Control, 8 (1965), 338–353. https://doi.org/10.1016/S0019-9958(65)90241-X doi: 10.1016/S0019-9958(65)90241-X
![]() |
[2] |
L. A. Zadeh, The concept of a linguistic variable and its application to approximate reasoning–-Ⅰ, Inf. Sci., 8 (1975), 199–249. https://doi.org/10.1016/0020-0255(75)90036-5 doi: 10.1016/0020-0255(75)90036-5
![]() |
[3] |
L. A. Zadeh, A note on Z-numbers, Inf. Sci., 181 (2011), 2923–2932. https://doi.org/10.1016/j.ins.2011.02.022 doi: 10.1016/j.ins.2011.02.022
![]() |
[4] | B. Kang, D. Wei, Y. Li, Y. Deng, Decision making using Z-numbers under uncertain environment, J. Comput. Infor. Syst., 8 (2012), 2807–2814. |
[5] |
P. Patel, S. Rahimi, E. Khorasani, Applied Z-numbers, 2015 Annual Conf. North American Fuzzy Inf. Proc. Soc., 5 (2015), 1–6. https://doi.org/10.1109/NAFIPS-WConSC.2015.7284154 doi: 10.1109/NAFIPS-WConSC.2015.7284154
![]() |
[6] |
Z. Ren, H. Liao, Y. Liu, Generalized Z-numbers with hesitant fuzzy linguistic information and its application to medicine selection for the patients with mild symptoms of the COVID-19, Comput. Industr. Engin., 145 (2020), 106517. https://doi.org/10.1016/j.cie.2020.106517 doi: 10.1016/j.cie.2020.106517
![]() |
[7] |
T. Zamali, M. A. Lazim, Multi-criteria decision making based on Z-Number valuation for uncertain information, 2021 2nd Int. Conf. Artif. Intell. Data Sci., 2 (2021), 1–4. https://doi.org/10.1109/AiDAS53897.2021.9574134 doi: 10.1109/AiDAS53897.2021.9574134
![]() |
[8] | B. Kang, D. Wei, Y. Li, Y. Deng, A method of converting Z-number to classical fuzzy number, J. Infor. Comput. Sci., 9 (2012), 703–709. |
[9] | R. A. Aliev, A. Alizadeh, R. R. Aliyev, O. H. Huseynov, The arithmetic of Z-Numbers: Theory and applications, Singapore: World Scientific, 2015. https://doi.org/10.1142/9575 |
[10] |
R. A. Aliev, A. V. Alizadeh, O. H. Huseynov, The arithmetic of discrete Z-numbers, Infor. Sci., 290 (2015), 134–155. http://dx.doi.org/10.1016/j.ins.2014.08.024 doi: 10.1016/j.ins.2014.08.024
![]() |
[11] |
R. A. Aliev, O. H. Huseynov, L. M. Zeinalova, The arithmetic of continuous Z-numbers, Inf. Sci., 373 (2016), 441–460. https://doi.org/10.1016/j.ins.2016.08.078 doi: 10.1016/j.ins.2016.08.078
![]() |
[12] |
A. S. A. Bakar, A. Gegov, Multi-layer decision methodology for ranking Z-numbers, Int. J. Comput. Intell. Syst., 8 (2015), 395–406. https://doi.org/10.1080/18756891.2015.1017371 doi: 10.1080/18756891.2015.1017371
![]() |
[13] |
R. A. Aliev, O. H. Huseynov, R. Serdaroglu, Ranking of Z-numbers and its application in decision making, Int. J. Inf. Tech. Decision Making, 15 (2016), 1503–1519. https://doi.org/10.1142/S0219622016500310 doi: 10.1142/S0219622016500310
![]() |
[14] |
S. Ezadi, T. Allahviranloo, New multi-layer method for Z-number ranking using hyperbolic tangent function and convex combination, Int. Autom. Soft Comput., 2017, 1–7. https://doi.org/10.1080/10798587.2017.1367146 doi: 10.1080/10798587.2017.1367146
![]() |
[15] |
S. Ezadi, T. Allahviranloo, S. Mohammadi, Two new methods for ranking of Z-numbers based on sigmoid function and sign method, Int. J. Intell. Syst., 33 (2018), 1476–1487. https://doi.org/10.1002/int.21987 doi: 10.1002/int.21987
![]() |
[16] | Online content: OSPF protocol analysis, 1991. Available from: https://www.rfc-editor.org/rfc/rfc1245. |
[17] |
Y. Deng, Y. Chen, Y. Zhang, S. Mahadevan, Fuzzy Dijkstra algorithm for shortest path problem under uncertain environment, Appl. Soft Comput., 12 (2012), 1231–1237. https://doi.org/10.1016/j.asoc.2011.11.011 doi: 10.1016/j.asoc.2011.11.011
![]() |
[18] | K. K. Mishra, Dijkstra's Algorithm for solving fuzzy number Shortest Path Problem, Malaya J. Matematik, 8 (2019), 714–719. |
[19] |
A. Candra, M. A. Budiman, K. Hartanto, Dijkstra's and a-star in finding the shortest path: A tutorial, J. 2020 Int. Conf. Data Sci. Artif. Intell. Business Anal., 58 (2020), 28–32. http://dx.doi.org/10.1109/DATABIA50434.2020.9190342 doi: 10.1109/DATABIA50434.2020.9190342
![]() |
[20] |
M. Akram, A. Habib, J. C. R. Alcantud, An optimization study based on Dijkstra algorithm for a network with trapezoidal picture fuzzy numbers, Neural Comput. Appl., 33 (2021), 1329–1342. https://doi.org/10.1007/s00521-020-05034-y doi: 10.1007/s00521-020-05034-y
![]() |
[21] |
S. S. Biswas, Z-Dijkstra's algorithm to solve shortest path problem in a Z-Graph, Oriental J. Comput. Sci. Techn., 10 (2017), 180–186. http://dx.doi.org/10.13005/ojcst/10.01.24 doi: 10.13005/ojcst/10.01.24
![]() |
[22] | P. Veerammal, Fuzzy Z-Number shortest path problem using Dijkstra algorithm, Periodico di Mineral., 91 (2022), 942–950. |
[23] | A. Papoulis, Random variables and stochastic processes, New York: McGraw Hill, 1965. |
[24] | M. D. Springer, The algebra of random variables, New York: Wiley, 1979. |
[25] | B. Bede, Fuzzy analysis, Heidelberg: Springer, 2013. https://doi.org/10.1007/978-3-642-35221-8_8 |
[26] | E. Eljaoui, S. Melliani, L. S. Chadli, Multiplication operation and powers of trapezoidal fuzzy numbers, Cham: Springer, 2019. https://doi.org/10.1007/978-3-030-02155-9_11 |
[27] | H. Nasseri, Fuzzy numbers: Positive and nonnegative, Int. Mathem. Forum, 3 (2008), 1777–1780. |
[28] |
B. Kang, Y. Deng, R. Sadiq, Total utility of Z-number, Appl. Intell., 48 (2018), 703–729. https://doi.org/10.1007/s10489-017-1001-5 doi: 10.1007/s10489-017-1001-5
![]() |
[29] | K. R. Saoub, Graph theory: An introduction to proofs, algorithms, and applications, Florida: CRC Press, 2021. |
[30] | E. W. Dijkstra, A note on two problems in connexion with graphs, New York: Association for Computing Machinery, 2022. https://doi.org/10.1145/3544585.3544600 |
[31] |
A. Atary, A. Bremler-Barr, Efficient round-trip time monitoring in OpenFlow networks, IEEE INFOCOM 2016 35th Annual IEEE Int. Conf. Comput. Commun., 31 (2016), 1–9. https://doi.org/10.1109/INFOCOM.2016.7524501 doi: 10.1109/INFOCOM.2016.7524501
![]() |
[32] |
G. Martínez, J. A. Hernández, P. Reviriego, P. Reinheimer, Round trip time (rtt) delay in the internet: Analysis and trends, IEEE Net., 38 (2023), 280–285. https://doi.org/10.1109/MNET004.2300008 doi: 10.1109/MNET004.2300008
![]() |
[33] | M. T. Keller, W. T. Trotter, Applied combinatorics, California: Open Textbook Library, 2017. |
[34] |
D. Rachmawati, L. Gustin, Analysis of Dijkstra's algorithm and A* algorithm in shortest path problem, J. Phys. Confer. Series, 1566 (2020), 012061. http://dx.doi.org/10.1088/1742-6596/1566/1/012061 doi: 10.1088/1742-6596/1566/1/012061
![]() |
[35] |
B. Erkayman, E. Gundogar, A. Yılmaz, An integrated fuzzy approach for strategic alliance partner selection in third-party logistics, Sci. World J., 2012 (2012), 486306. http://dx.doi.org/10.1100/2012/486306 doi: 10.1100/2012/486306
![]() |
[36] |
M. Ebrat, R. Ghodsi, Construction project risk assessment by using adaptive-network-based fuzzy inference system: An empirical study, KSCE J. Civil Engin., 18 (2014), 1213–1227. https://doi.org/10.1007/s12205-014-0139-5 doi: 10.1007/s12205-014-0139-5
![]() |
Variable | Linguistic Expression | Triangular Fuzzy Number |
B1 | Very Unlikely | [0.01,0.125,0.25] |
B2 | Unlikely | [0.05,0.275,0.5] |
B3 | Even | [0.25,0.5,0.75] |
B4 | Likely | [0.5,0.725,0.95] |
B5 | Very Likely | [0.75,0.875,0.99] |
Bab | Bac | Bad | Bae | Bbc | Bbf | Bcd | Bcf | Bcg | Bde | Bdg | Bdh | Beh | Bfg | Bfi | Bgh | Bgi | Bhi | |
Scenario 1 | B2 | B3 | B2 | B3 | B4 | B5 | B1 | B2 | B5 | B1 | B4 | B3 | B4 | B3 | B4 | B1 | B2 | B5 |
Scenario 2 | B2 | B3 | B2 | B3 | B4 | B5 | B1 | B2 | B5 | B1 | B4 | B3 | B4 | B3 | B2 | B1 | B2 | B5 |
Scenario 3 | B2 | B4 | B2 | B3 | B4 | B5 | B1 | B2 | B5 | B1 | B4 | B3 | B4 | B3 | B4 | B1 | B2 | B5 |
Scenario 4 | B2 | B3 | B2 | B3 | B4 | B5 | B1 | B2 | B5 | B1 | B4 | B3 | B4 | B3 | B4 | B3 | B2 | B5 |
(ⅰ) | (ⅱ) | (ⅲ) |
N={}L(a)=(−, 0)L(b)=(−, ∞)L(c)=(−, ∞)L(d)=(−, ∞)L(e)=(−, ∞)L(f)=(−, ∞)L(g)=(−, ∞)L(h)=(−, ∞)L(i)=(−, ∞) | u=aN={b,c,d,e}L(a)=(−, 0)L(b)=(a, [(6, 7, 8), (0.05, 0.275, 0.5)])L(c)=(a, [(7, 8, 9), (0.25, 0.5, 0.75)])L(d)=(a, [(9, 11, 13), (0.05, 0.275, 0.5)])L(e)=(a, [(8, 10, 12), (0.25, 0.5, 0.75)])L(f)=(−, ∞)L(g)=(−, ∞)L(h)=(−, ∞)L(i)=(−, ∞) | u=bN={c,d,e,f}L(a)=(−, 0)L(b)=(a, [(6, 7, 8), (0.05, 0.275, 0.5)])L(c)=(a, [(7, 8, 9), (0.25, 0.5, 0.75)])L(d)=(a, [(9, 11, 13), (0.05, 0.275, 0.5)])L(e)=(a, [(8, 10, 12), (0.25, 0.5, 0.75)])L(f)=(b, [(14, 18, 22), (0.20, 0.71, 0.86)])L(g)=(−, ∞)L(h)=(−, ∞)L(i)=(−, ∞) |
(iv) | (v) | (vi) |
u=cN={d,e,f,g}L(a)=(−, 0)L(b)=(a, [(6, 7, 8), (0.05, 0.275, 0.5)])L(c)=(a, [(7, 8, 9), (0.25, 0.5, 0.75)])L(d)=(c, [(9, 11, 13), (0.02, 0.24, 0.45)])L(e)=(a, [(8, 10, 12), (0.25, 0.5, 0.75)])L(f)=(c, [(11, 13, 15), (0.10, 0.45, 0.70)])L(g)=(c, [(18, 20, 22), (0.45, 0.72, 0.87)])L(h)=(−, ∞)L(i)=(−, ∞) | u=dN={e,f,g,h}L(a)=(−, 0)L(b)=(a, [(6, 7, 8), (0.05, 0.275, 0.5)])L(c)=(a, [(7, 8, 9), (0.25, 0.5, 0.75)])L(d)=(c, [(9, 11, 13), (0.02, 0.24, 0.45)])L(e)=(a, [(8, 10, 12), (0.25, 0.5, 0.75)])L(f)=(c, [(11, 13, 15), (0.10, 0.45, 0.70)])L(g)=(d, [(16, 20, 24), (0.04, 0.43, 0.69)])L(h)=(d, [(15, 18, 21), (0.03, 0.34, 0.59)])L(i)=(−, ∞) | u=eN={f,g,h}L(a)=(−, 0)L(b)=(a, [(6, 7, 8), (0.05, 0.275, 0.5)])L(c)=(a, [(7, 8, 9), (0.25, 0.5, 0.75)])L(d)=(c, [(9, 11, 13), (0.02, 0.24, 0.45)])L(e)=(a, [(8, 10, 12), (0.25, 0.5, 0.75)])L(f)=(c, [(11, 13, 15), (0.10, 0.45, 0.70)])L(g)=(d, [(16, 20, 24), (0.04, 0.43, 0.69)])L(h)=(d, [(15, 18, 21), (0.03, 0.34, 0.59)])L(i)=(−, ∞) |
(vii) | (viii) | (ix) |
u=fN={g,h,i}L(a)=(−, 0)L(b)=(a, [(6, 7, 8), (0.05, 0.275, 0.5)])L(c)=(a, [(7, 8, 9), (0.25, 0.5, 0.75)])L(d)=(c, [(9, 11, 13), (0.02, 0.24, 0.45)])L(e)=(a, [(8, 10, 12), (0.25, 0.5, 0.75)])L(f)=(c, [(11, 13, 15), (0.10, 0.45, 0.70)])L(g)=(d, [(16, 20, 24), (0.04, 0.43, 0.69)])L(h)=(d, [(15, 18, 21), (0.03, 0.34, 0.59)])L(i)=(f, [(22, 26, 30), (0.19, 0.66, 0.85)]) | u=hN={g,i}L(a)=(−, 0)L(b)=(a, [(6, 7, 8), (0.05, 0.275, 0.5)])L(c)=(a, [(7, 8, 9), (0.25, 0.5, 0.75)])L(d)=(c, [(9, 11, 13), (0.02, 0.24, 0.45)])L(e)=(a, [(8, 10, 12), (0.25, 0.5, 0.75)])L(f)=(c, [(11, 13, 15), (0.10, 0.45, 0.70)])L(g)=(h, [(17, 21, 25), (0.03, 0.33, 0.57)])L(h)=(d, [(15, 18, 21), (0.03, 0.34, 0.59)])L(i)=(h, [(21, 26, 31), (0.05, 0.51, 0.74)]) | u=gN={i}L(a)=(−, 0)L(b)=(a, [(6, 7, 8), (0.05, 0.275, 0.5)])L(c)=(a, [(7, 8, 9), (0.25, 0.5, 0.75)])L(d)=(c, [(9, 11, 13), (0.02, 0.24, 0.45)])L(e)=(a, [(8, 10, 12), (0.25, 0.5, 0.75)])L(f)=(c, [(11, 13, 15), (0.10, 0.45, 0.70)])L(g)=(h, [(17, 21, 25), (0.03, 0.33, 0.57)])L(h)=(d, [(15, 18, 21), (0.03, 0.34, 0.59)])L(i)=(g, [(22, 27, 32), (0.03, 0.38, 0.63)]) |
ρ(i) | Zρ(i) | |
Scenario 1 | (a,c,d,h,g,i) | [(22,27,32),(0.03,0.38,0.63)] |
Scenario 2 | (a,c,f,i) | [(22,26,30),(0.09,0.44,0.69)] |
Scenario 3 | (a,d,h,g,i) | [(22,27,32),(0.05,0.40,0.65)] |
Scenario 4 | (a,c,d,g,i) | [(21,26,31),(0.05,0.48,0.73)] |
Variable | Linguistic Expression | Triangular Fuzzy Number |
B1 | Very Unlikely | [0.01,0.125,0.25] |
B2 | Unlikely | [0.05,0.275,0.5] |
B3 | Even | [0.25,0.5,0.75] |
B4 | Likely | [0.5,0.725,0.95] |
B5 | Very Likely | [0.75,0.875,0.99] |
Bab | Bac | Bad | Bae | Bbc | Bbf | Bcd | Bcf | Bcg | Bde | Bdg | Bdh | Beh | Bfg | Bfi | Bgh | Bgi | Bhi | |
Scenario 1 | B2 | B3 | B2 | B3 | B4 | B5 | B1 | B2 | B5 | B1 | B4 | B3 | B4 | B3 | B4 | B1 | B2 | B5 |
Scenario 2 | B2 | B3 | B2 | B3 | B4 | B5 | B1 | B2 | B5 | B1 | B4 | B3 | B4 | B3 | B2 | B1 | B2 | B5 |
Scenario 3 | B2 | B4 | B2 | B3 | B4 | B5 | B1 | B2 | B5 | B1 | B4 | B3 | B4 | B3 | B4 | B1 | B2 | B5 |
Scenario 4 | B2 | B3 | B2 | B3 | B4 | B5 | B1 | B2 | B5 | B1 | B4 | B3 | B4 | B3 | B4 | B3 | B2 | B5 |
(ⅰ) | (ⅱ) | (ⅲ) |
N={}L(a)=(−, 0)L(b)=(−, ∞)L(c)=(−, ∞)L(d)=(−, ∞)L(e)=(−, ∞)L(f)=(−, ∞)L(g)=(−, ∞)L(h)=(−, ∞)L(i)=(−, ∞) | u=aN={b,c,d,e}L(a)=(−, 0)L(b)=(a, [(6, 7, 8), (0.05, 0.275, 0.5)])L(c)=(a, [(7, 8, 9), (0.25, 0.5, 0.75)])L(d)=(a, [(9, 11, 13), (0.05, 0.275, 0.5)])L(e)=(a, [(8, 10, 12), (0.25, 0.5, 0.75)])L(f)=(−, ∞)L(g)=(−, ∞)L(h)=(−, ∞)L(i)=(−, ∞) | u=bN={c,d,e,f}L(a)=(−, 0)L(b)=(a, [(6, 7, 8), (0.05, 0.275, 0.5)])L(c)=(a, [(7, 8, 9), (0.25, 0.5, 0.75)])L(d)=(a, [(9, 11, 13), (0.05, 0.275, 0.5)])L(e)=(a, [(8, 10, 12), (0.25, 0.5, 0.75)])L(f)=(b, [(14, 18, 22), (0.20, 0.71, 0.86)])L(g)=(−, ∞)L(h)=(−, ∞)L(i)=(−, ∞) |
(iv) | (v) | (vi) |
u=cN={d,e,f,g}L(a)=(−, 0)L(b)=(a, [(6, 7, 8), (0.05, 0.275, 0.5)])L(c)=(a, [(7, 8, 9), (0.25, 0.5, 0.75)])L(d)=(c, [(9, 11, 13), (0.02, 0.24, 0.45)])L(e)=(a, [(8, 10, 12), (0.25, 0.5, 0.75)])L(f)=(c, [(11, 13, 15), (0.10, 0.45, 0.70)])L(g)=(c, [(18, 20, 22), (0.45, 0.72, 0.87)])L(h)=(−, ∞)L(i)=(−, ∞) | u=dN={e,f,g,h}L(a)=(−, 0)L(b)=(a, [(6, 7, 8), (0.05, 0.275, 0.5)])L(c)=(a, [(7, 8, 9), (0.25, 0.5, 0.75)])L(d)=(c, [(9, 11, 13), (0.02, 0.24, 0.45)])L(e)=(a, [(8, 10, 12), (0.25, 0.5, 0.75)])L(f)=(c, [(11, 13, 15), (0.10, 0.45, 0.70)])L(g)=(d, [(16, 20, 24), (0.04, 0.43, 0.69)])L(h)=(d, [(15, 18, 21), (0.03, 0.34, 0.59)])L(i)=(−, ∞) | u=eN={f,g,h}L(a)=(−, 0)L(b)=(a, [(6, 7, 8), (0.05, 0.275, 0.5)])L(c)=(a, [(7, 8, 9), (0.25, 0.5, 0.75)])L(d)=(c, [(9, 11, 13), (0.02, 0.24, 0.45)])L(e)=(a, [(8, 10, 12), (0.25, 0.5, 0.75)])L(f)=(c, [(11, 13, 15), (0.10, 0.45, 0.70)])L(g)=(d, [(16, 20, 24), (0.04, 0.43, 0.69)])L(h)=(d, [(15, 18, 21), (0.03, 0.34, 0.59)])L(i)=(−, ∞) |
(vii) | (viii) | (ix) |
u=fN={g,h,i}L(a)=(−, 0)L(b)=(a, [(6, 7, 8), (0.05, 0.275, 0.5)])L(c)=(a, [(7, 8, 9), (0.25, 0.5, 0.75)])L(d)=(c, [(9, 11, 13), (0.02, 0.24, 0.45)])L(e)=(a, [(8, 10, 12), (0.25, 0.5, 0.75)])L(f)=(c, [(11, 13, 15), (0.10, 0.45, 0.70)])L(g)=(d, [(16, 20, 24), (0.04, 0.43, 0.69)])L(h)=(d, [(15, 18, 21), (0.03, 0.34, 0.59)])L(i)=(f, [(22, 26, 30), (0.19, 0.66, 0.85)]) | u=hN={g,i}L(a)=(−, 0)L(b)=(a, [(6, 7, 8), (0.05, 0.275, 0.5)])L(c)=(a, [(7, 8, 9), (0.25, 0.5, 0.75)])L(d)=(c, [(9, 11, 13), (0.02, 0.24, 0.45)])L(e)=(a, [(8, 10, 12), (0.25, 0.5, 0.75)])L(f)=(c, [(11, 13, 15), (0.10, 0.45, 0.70)])L(g)=(h, [(17, 21, 25), (0.03, 0.33, 0.57)])L(h)=(d, [(15, 18, 21), (0.03, 0.34, 0.59)])L(i)=(h, [(21, 26, 31), (0.05, 0.51, 0.74)]) | u=gN={i}L(a)=(−, 0)L(b)=(a, [(6, 7, 8), (0.05, 0.275, 0.5)])L(c)=(a, [(7, 8, 9), (0.25, 0.5, 0.75)])L(d)=(c, [(9, 11, 13), (0.02, 0.24, 0.45)])L(e)=(a, [(8, 10, 12), (0.25, 0.5, 0.75)])L(f)=(c, [(11, 13, 15), (0.10, 0.45, 0.70)])L(g)=(h, [(17, 21, 25), (0.03, 0.33, 0.57)])L(h)=(d, [(15, 18, 21), (0.03, 0.34, 0.59)])L(i)=(g, [(22, 27, 32), (0.03, 0.38, 0.63)]) |
ρ(i) | Zρ(i) | |
Scenario 1 | (a,c,d,h,g,i) | [(22,27,32),(0.03,0.38,0.63)] |
Scenario 2 | (a,c,f,i) | [(22,26,30),(0.09,0.44,0.69)] |
Scenario 3 | (a,d,h,g,i) | [(22,27,32),(0.05,0.40,0.65)] |
Scenario 4 | (a,c,d,g,i) | [(21,26,31),(0.05,0.48,0.73)] |