Processing math: 45%
Research article Special Issues

Exploring variable-sensitive q-difference equations for q-SINE Euler polynomials and q-COSINE-Euler polynomials

  • In this study, we introduced several types of higher-order difference equations involving q-SINE Euler (QSE) and q-COSINE Euler (QCE) polynomials. Depending on the parameters selected, these higher-order difference equations exhibited properties of trigonometric functions or related Euler numbers. Approximate root construction focused on the QSE polynomial, which was the solution of the q-difference equations obtained earlier. We also showed the structure of the approximate roots of higher-order polynomials among the QSE polynomials, understood them, and considered the associated conjectures.

    Citation: Jung Yoog Kang, Cheon Seoung Ryoo. Exploring variable-sensitive q-difference equations for q-SINE Euler polynomials and q-COSINE-Euler polynomials[J]. AIMS Mathematics, 2024, 9(6): 16753-16772. doi: 10.3934/math.2024812

    Related Papers:

    [1] Serap Özcan . Some integral inequalities of Hermite-Hadamard type for multiplicatively preinvex functions. AIMS Mathematics, 2020, 5(2): 1505-1518. doi: 10.3934/math.2020103
    [2] Muhammad Tariq, Asif Ali Shaikh, Sotiris K. Ntouyas, Jessada Tariboon . Some novel refinements of Hermite-Hadamard and Pachpatte type integral inequalities involving a generalized preinvex function pertaining to Caputo-Fabrizio fractional integral operator. AIMS Mathematics, 2023, 8(11): 25572-25610. doi: 10.3934/math.20231306
    [3] Humaira Kalsoom, Muhammad Amer Latif, Muhammad Idrees, Muhammad Arif, Zabidin Salleh . Quantum Hermite-Hadamard type inequalities for generalized strongly preinvex functions. AIMS Mathematics, 2021, 6(12): 13291-13310. doi: 10.3934/math.2021769
    [4] Haoliang Fu, Muhammad Shoaib Saleem, Waqas Nazeer, Mamoona Ghafoor, Peigen Li . On Hermite-Hadamard type inequalities for n-polynomial convex stochastic processes. AIMS Mathematics, 2021, 6(6): 6322-6339. doi: 10.3934/math.2021371
    [5] Muhammad Tariq, Hijaz Ahmad, Abdul Ghafoor Shaikh, Soubhagya Kumar Sahoo, Khaled Mohamed Khedher, Tuan Nguyen Gia . New fractional integral inequalities for preinvex functions involving Caputo-Fabrizio operator. AIMS Mathematics, 2022, 7(3): 3440-3455. doi: 10.3934/math.2022191
    [6] Tekin Toplu, Mahir Kadakal, İmdat İşcan . On n-Polynomial convexity and some related inequalities. AIMS Mathematics, 2020, 5(2): 1304-1318. doi: 10.3934/math.2020089
    [7] Sabila Ali, Rana Safdar Ali, Miguel Vivas-Cortez, Shahid Mubeen, Gauhar Rahman, Kottakkaran Sooppy Nisar . Some fractional integral inequalities via h-Godunova-Levin preinvex function. AIMS Mathematics, 2022, 7(8): 13832-13844. doi: 10.3934/math.2022763
    [8] Shuang-Shuang Zhou, Saima Rashid, Muhammad Aslam Noor, Khalida Inayat Noor, Farhat Safdar, Yu-Ming Chu . New Hermite-Hadamard type inequalities for exponentially convex functions and applications. AIMS Mathematics, 2020, 5(6): 6874-6901. doi: 10.3934/math.2020441
    [9] Muhammad Tariq, Soubhagya Kumar Sahoo, Fahd Jarad, Bibhakar Kodamasingh . Some integral inequalities for generalized preinvex functions with applications. AIMS Mathematics, 2021, 6(12): 13907-13930. doi: 10.3934/math.2021805
    [10] M. Emin Özdemir, Saad I. Butt, Bahtiyar Bayraktar, Jamshed Nasir . Several integral inequalities for (α, s,m)-convex functions. AIMS Mathematics, 2020, 5(4): 3906-3921. doi: 10.3934/math.2020253
  • In this study, we introduced several types of higher-order difference equations involving q-SINE Euler (QSE) and q-COSINE Euler (QCE) polynomials. Depending on the parameters selected, these higher-order difference equations exhibited properties of trigonometric functions or related Euler numbers. Approximate root construction focused on the QSE polynomial, which was the solution of the q-difference equations obtained earlier. We also showed the structure of the approximate roots of higher-order polynomials among the QSE polynomials, understood them, and considered the associated conjectures.



     

    Abbreviations Name
    MADM Multiple Attributive decision making
    FFN Fermatean fuzzy number
    DMs Decision matrixes
    SSTT Schweizer-Sklar t-norm and t-conorm
    FF Fermatean fuzzy
    IFS Intuitionistic fuzzy set
    BT Blockchain technology
    MCDM Multiple criteria decision making
    ICT information communications technology
    FFSSTWA Fermatean fuzzy Schweizer-Sklar t-norm weighted average
    FFSSTOWA Fermatean fuzzy Schweizer-Sklar t-norm ordered weighted average
    FFSSTHWA Fermatean fuzzy Schweizer-Sklar t-norm hybrid weighted average
    FFSSTWG Fermatean fuzzy Schweizer-Sklar t-norm weighted geometric
    FFSSTOWG Fermatean fuzzy Schweizer-Sklar t-norm ordered weighted geometric
    FFSSTHWG Fermatean fuzzy Schweizer-Sklar t-norm hybrid weighted geometric
    AHP Analytic hierarchy process

    The uncertainty and complexity of decision-making information have an impact on decision-making results. To describe decision-making information more accurately and truly, Zadeh [10] introduced fuzzy set theory. One of the most successful and promising adaptations of the Zadeh notion is the intuitionistic fuzzy set (IFS) [1] theory. Colak et al. [2] exhibited the criteria and sub-criteria for performance assessment of Blockchain Technology (BT) in supply chain management. The weights of main and sub-criteria have been attained through HF-AHP method, and a categorized MCDM problem that comprises of 5 main and 17 sub-criteria has been established and the alternative segments have been analyzed. A decision model for selecting the finest blockchain platform has been exhibited by Farshidi et al. [3]. The stated model has been assessed with three case studies of real problems. Cognitive function methods based on FST and Decision-Making Trail and Evaluating Laboratory (DEMATEL), MCDM methodology has been introduced by Karaşan et al. [4].

    For instance, the depositor wishes an agreement to choose the most efficient enterprise according to avert asset risk than secure the highest payback, yet the organization desires in imitation of assessing its automation degree before improving it. Usually, whole its things to do, need conformity and remain evaluated along respect in conformity with several attributes, as are additionally acknowledged as MADM issues yet are entirely frequent between our daily life. MADM is a condition confronted when persons together brand an excellent from the replacements with deference to a usual attribute. MADM difficulties inhabit vital situations in the arena of culture decision making. For sample, the depositor desires to choose the optimum business to avoid venture danger and gain the supreme reappearance, and the innovativeness. MADM problems have conventional countless considerations in the historical few decades. The MCDM techniques are represented in Figure 1.

    Figure 1.  MCDM technique.

    Lin et al. [5] presented reviewed blockchain-based theories connected with ICT-based technology. Tang et al. [7] presented assessment statistics and the ranking results of public blockchains.

    A generic class of intuitionistic and Pythagorean sets is known as q-rung Orthopair fuzzy sets which was suggested by Yager [8]. Orthopair fuzzy subsets are such that the degree of support for membership in the fuzzy set and the degree of support against membership are indicated by pairs of values from the unit interval in the membership grades. We noticed that the q-rung Orthopair fuzzy sets where the qth power of the support for and qth power of the support against are sum together and bonded by one. We observe that when q rises, the range of acceptable Orthopair expands, giving the user greater latitude in expressing their opinion regarding membership grade. The key properties and features of the blockchain were provided by Yaqoob et al. [9]. We go over the top benefits of implementing blockchain technology as well as potential for the healthcare sector. Zhang et al. [11] suggested a cyber security paradigm with human-in-the-loop intelligence based on the limitations and challenges. Zhou et al. [12] presented a new PF-VIKOR method considering the DM's choice for risk, a new way to estimate the distance that is presented in detail, and a difficulty with choosing the best blockchain technology solution.

    Senapati et al. [13] developed the Fermatean fuzzy TOPSIS method to address the problem of multiple criteria decision-making. The approach for the MCDM issue considering new operators under the Fermatean fuzzy condition was provided by Senapati et al. [14]. The Fermatean fuzzy weighted product model was presented by Senapati et al. [15] to address the multi-criteria decision-making issue. Type-2 fuzzy sets were presented by Own [16], as well as the relationship between type-2 fuzzy sets and intuitionistic fuzzy sets. Mondal et al. [17] developed the notion of the tangent similarity measure of intuitionistic fuzzy sets.

    Deng et al. [18] introduced the matters in the outranking relative secret into three diverse areas by a clustering technique. Wang et al. [19] presented uniqueness of the essential fixings for the regret philosophy of the regret-rejoice function and hesitant fuzzy environments. Deng et al. [20] introduced the renovate the multi-scale assessment data into an interval fuzzy number by applying a linguistic term set. Zhan et al. [21] introduced the Triple interactive executive with hesitant fuzzy data. Gai et al. [22] presented dependable capitals to facilitate the attainment of cluster consensus. An approach based on large-scale group decision making (LSGDM) and online reviews is proposed by Feixia Ji et al. [23] to assess user satisfaction with shared living. Wu et al. [24] presented an optimization model built to minimize the total adjustment cost of reaching consensus by determining the personalized feedback adoption coefficient based on individuals' consensus levels. This method reflects both the subjective assessments of the constant standards and the unique risk perspectives about innovation.

    Different variations of the Fermatean fuzzy set were introduced by Akram and other scholars, we summarized these as follows. Akram et al. [25] introduced the Fermatean fuzzy soft expert knowledge. Akram et al. [26] introduction complex Fermatean fuzzy N-soft sets. Akram et al [27] introduced the objective functions that should be maximized. Akram et al. [28] developed a novel MCGDM analysis by fusing soft expert sets with m-polar fuzzy sets, he also looked into their structural characteristics, as well as the subset, complement, intersection, union, and OR and AND operators. Alcantud et al. [29] proposed a novel theory for the aggregation of N-soft sets, initial scores of alternatives, determined by multi-agent, multinary evaluations. Akram et al. [30] presented 2TLCq-RPF aggregation operators, including 2TLCq-RPF weighted averaging/geometric operators, sophisticated aggregation operators based on the Hamacher operator key characteristics of the new operators, and multi-attribute decision making strategy for problems posed in the 2TLCq-RPFS setting. The algebraic and Einstein operations are extended by the Hamacher operation. The technique based on the Combined Compromise Solution (COCOSO) with Criteria Importance was developed by Akram et al. [31] by combining 2-tuple linguistic Fermatean fuzzy (2TLFF) numbers and the Hamacher operation. Issues with multiple attribute group decision-making (MAGDM) in a 2TLFF context can be managed by Criteria Importance Through inter-criteria correlation (CRITIC). Different extensions of the fuzzy set and their interrelationship have been described in Figure 2.

    Figure 2.  Different extensions of the fuzzy set and their interrelationship have been exhibited with the help of flowchart.

    In accordance with the available literature and magnificent structure of innovation, we define the standard criteria to comprehensively grade the blockchain skill beneficiaries' performance concerning the reopen allowance for chief circles. We define the Fermatean fuzzy Schweizer-Sklar Operators, which can inarticulacy and hesitations in verdicts due to deficient postulation and sharing related, to gain the criterion weights with FF statistics. We use the Fermatean fuzzy Schweizer-Sklar Operators, determining the inclusive authority ranking for each pretender, and active the entrants in dropping direction sighted the DM's threat need regarding a blockchain by decisive the reduction subject of the affronted.

    The standards and techniques for evaluating blockchain capabilities, phases, crops, and suppliers are briefly evaluated. This establishes the framework for developing the standards for selecting the best blockchain knowledge provider for primary sets of financial organizations to link blockchain expertise throughout the process of cross-border transmittal.

    The goals and motivations of this paper are:

    (1) To endorse the notion of FFS.

    (2) Investigate the structure of FFSSTWA operators.

    (3) Suggest an SSTT operation for FF components.

    (4) To suggest an innovative technique for MADM founded on the planned operators. Congruently, the offerings of this paper are:

    i. We presented an intimate of data aggregation operators by joining the FFS and SST operators founded on SSTT functioning rules.

    ii. We provide a universal background of the proposed technique to MADM complications.

    iii. Offered process to innovativeness statistics and assessment.

    The break of this paper is systematized as follows: Section 2, discussed FFN and operational laws. Section 3 remembrances approximately plain designs and provides the SSTT operational rules established on FFS. Section 4 proposes a series of FFN aggregation operators. Section 5 presents an innovative method to MADM. Section 6 delivers a mathematical example to authenticate the rationality and qualities of the proposed viewpoint. Section 7, we discuss in the conclusion. Finally, interdependency of the different sections of the paper has been exhibited in Figure 9.

    We recall some basic concepts of Fuzzy set in this section, to understand the paper. Zadeh introduced the fuzzy set [10]. We recall this as follows.

    Definition 2.1. [10] Let us consider that ΦH and by a fuzzy set γ={y,ηγ(y):yH},ηγ(y) is a mapping from H to [0,1] characterize membership task of an component y in H.

    FFN and operational laws

    Fermatean Fuzzy Numbers (FFN) and their operational laws, score and accuracy functions were defined by Senapati et al. [14], we recall it's as follows.

    Definition 2.1.1. [14] The fixed setE and the FFN F is defined in F={ςF(y),χF(y):yE}, anywhere ςF(y) and χF(y) characterize the MED and NOMED, and ςF(y)[0,1], χF(y)[0,1] and 0ςF(y)3+χF(y)31. The grade of indeterminacy is defined as πF(y)=3(ςF(y)3+χF(y)3ςF(y)3χF(y)3). The FFN is indicated as F=ςF,χF.

    Operational laws of FFNs are described as follows:

    Definition 2.1.2. [14] Let a1={ς1,χ1} and a2={ς2,χ2} be two FFNs, λ>0, then.

    a1a2=[3(ς31+ς32ς31ς32),χ1χ2];
    a1a2=[ς1ς2,3(χ31+χ32χ31χ32)];
    λa1=[31(1ς31)λ,χ,χλ1];
    aλ1=[ςλ1,31(1χ31)λ].

    Definition 2.1.3. [14] Let ϖ={υ,δ},be the FFNs, then the score is ϖ={υ3δ3}.

    Definition 2.1.4. [14] Letϖ={υ,δ},be the FFNs, then the accuracy is ϖ={υ3+δ3}.

    The descriptions of Schweizer-Sklar t-norm and t-conorm are offered as follows:

    T(f,e)=(fΓ+eΓ1)1ΓT(x,y)=1((1f)Γ+(1e)Γ1)1Γ

    where Γ<0,f,e[0,1]. Additionally, when Γ0, we have

    T(f,e)=fe and T(f,e)=f+efe.

    They are the statistical t-norm and statistical t-conorm.

    FFN operational laws founded on Schweizer-Sklar Operators

    Definition 3.1.1. Let a1=[η1,κ1] and a2=[η2,κ2] be two FFNs based on SST operator and Γ>0, then,

    a1a2=[31((1(η31))Γ+(1(η32))Γ1)1Γ,(κΓ1+κΓ21)1Γ];
    a1a2=[(ηΓ1+ηΓ21)1Γ,31((1(η31))Γ+(1(η32))Γ1)1Γ];
    na1=[31(n(1(η31))Γ+(n1))1Γ,(nκΓ1+(n1))1Γ];
    an1=[(nηΓ1+(n1))1Γ,31(n(1(κ31))Γ+(n1))1Γ].

    In this section, FFSSTWA, FFSSTOWA, FFSSTHWA, FFSSTWG, FFSSTOWG and FFSSTHWG operators are defined and graphically represented their interrelationship, see Figure 3.

    Figure 3.  Different novel operators (FFSSTWA, FFSSTOWA, FFSSTHWA, FFSSTWG, FFSSTOWG and FFSSTHWG) based on Schweizer-Sklar operators, and their relationships has been exhibited.

    Definition 4.1.1. The collection of FFNs are cj=[η,κ] and the weight vector is e=(e1,e2,...,en)T with ej[0,1] and nj=1ej=1. Then FFSST(c1,c2,...,cn)=nj=1ejcj

    is assumed to be a FFSSTWA operator.

    Theorem 4.1.2. The collection of FFNs gj={[η,ϕ]} and the weight vector is χ=(χ1,χ2,...,χn)T with χj[0,1] and nj=1χj=1. Then it will be a FFSSTWA operator and

    FFSSTWA(g1,g2,...,gn)=[31nj=1(ρ(1(η3j))χ+(ρ1))1χ,(ρnj=1ϕχj+(ρ1))1χ].

    Proof. By induction on n, we will continue. If n is 1 then

    χ1g1=[311j=1(ρ(1(η31))χ1+(ρ1))1χ1,(ρ1j=1ϕχ11+(ρ1))1χ1]
    χ2g2=[312j=1(ρ(1(η32))χ2+(ρ1))1χ1,(ρ2j=1ϕχ22+(ρ1))1χ2]
    χ1g1χ2g2=[311j=1(ρ(1(η31))χ1+(ρ1))1χ1,(ρ1j=1ϕχ11+(ρ1))1χ1]
    [312j=1(ρ(1(η32))χ2+(ρ1))1χ2,(ρ2j=1ϕχ22+(ρ1))1χ2].

    Let the statement is true for n=k

    FFSSTWA(a1,a2,...,an)=[31kj=1(ρ(1(η3j))χ+(ρ1))1χ,(ρkj=1ϕϑj+(ρ1))1χ].

    Now for n=k+1

    FFSSTWA(a1,a2,...,an)=[31k+1j=1(ρ(1(η3j))χ+(ρ1))1χ,(ρk+1j=1ϕχ1+(ρ1))1χ].

    The following theorems' proofs are simple; therefore, we skip them.

    Theorem 4.1.3. (Idempotency): If Y=[κ,ς] for all h=1,2,3,...,m, then

    FFSSTWA(Y,Y,Y,...,Y)=Y.

    Theorem 4.1.4. (Commutativity): If (d1,d2,...,dn) is any permutation of (d1,d2,...,dn), then FFSSTWA (d1,d2,...,dn)= FFSSTWA (d1,d2,...,dn).

    Theorem 4.1.5. (Boundedness): If Y=min(d1,d2,...,dn),Y+=max(d1,d2,...,dn), then YFFSSTWA(d1,d2,...,dn)Y+.

    Definition 4.2.1. The gathering of FFNs are ck=[η,ϕ] and the weight vector is h=(h1,h2,...,hm)T with hk[0,1] and mk=1hk=1.The

    FFSST(c1,c2,...,cm)=mk=1hkck

    is said to be FFSSTOWA operator.

    The proof of the following theorems is straightforward, and we omit it.

    Theorem 4.2.2. The collection of FFNs are fk={[η,ϕ]} and the weight vector is ϑ=(ϑ1,ϑ2,...,ϑn)T with ϑj[0,1] and nk=1ϑk=1. Then it will be a FFSSTOWA operator and

    FFSSTOWA(f1,f2,...,fn)=[31nk=1(ρ(1(η3k))ϑ+(ρ1))1ϑ,(ρnk=1ϕϑk+(ρ1))1ϑ].

    The proof of the following theorems is straightforward, and we omit it.

    Theorem 4.2.3. (Idempotency): If Y=[κ,ς] for all r=1,2,3,...,m, then FFSSTOWA(Y,Y,Y,...,Y)=Y.

    Theorem 4.2.4. (Commutativity): If (d1,d2,...,dn) is any permutation of (d1,d2,...,dn), then FFSSTOWA (d1,d2,...,dn)=FFSSTOWA (d1,d2,...,dn)

    Theorem 4.2.5. (Boundedness): If Y=min(e1,e2,...,en),Y+=max(e1,e2,...,en), then YFFSSTOWA(e1,e2,...,en)Y+.

    Definition 4.3.1. The congregation of FFNs are cj=[η,φ] and the weight vector is g=(g1,g2,...,gn)T with gj[0,1] and nj=1gj=1. Then FFSST(c1,c2,...,cn)=nj=1gjcj

    will be a FFSSTHWA operator.

    The proof of the following theorems is straightforward, and we omit it.

    Theorem 4.3.2. The gathering of FFNs are gj={[η,ϕ]} and the weight vector is u=(u1,u2,...,un)T with uj[0,1] and nj=1uj=1. Then it is held FFSSTHWA operator and

    FFSSTHWA(g1,g2,...,gn)=[31nj=1(ρ(1(η3j))u+(ρ1))1ϑ,(ρnj=1ϕuj+(ρ1))1ϑ].

    Theorem 4.3.3. (Idempotency): If O=[κ,ς] for all k=1,2,3,...,n, then FFSSTHWA (O,O,O,...,O)=O.

    Theorem 4.3.4. (Commutativity): If (e1,e2,...,em) is any permutation of (e1,e2,...,em), then FFSSTHWA (e1,e2,...,em)=FFSSTHWA (e1,e2,...,em).

    Theorem 4.3.5. (Boundedness): If Y=min(d1,d2,...,dm),Y+=max(d1,d2,...,dm), then Y FFSSTHWA (d1,d2,...,dm)Y+.

    Definition 4.4.1. The congregation of FFNs are ck=[η,ϕ] and the weight vector is f=(f1,f2,...,fm)T with fk[0,1] and mk=1fk=1. Then FFSST(c1,c2,...,cm)=mk=1cfkk

    is said FFSSTWG operator.

    Theorem 4.4.2. The collection of FFNs are dj={[η,ϕ]} and the weight vector is e=(e1,e2,...,em)T with ej[0,1] and mj=1ej=1. Then it is held FFSSTWG operator and

    FFSSTWG(d1,d2,...,dm)=[(ρmj=1ηej+(ρ1))1e,31mj=1(ρ(1(ϕ31))e+(ρ1))1e].

    Proof. By induction on m, we will continue. If m is 1 then

    e1d1=[(ρ1j=1ηe1+(ρ1))1e,311j=1(ρ(1(ϕ31))e+(ρ1))1e]
    e2d2=[(ρ2j=1ηe2+(ρ1))1e,312j=1(ρ(1(ϕ32))e+(ρ1))1e]e1d1e2d2=[(ρ1j=1ηe1+(ρ1))1e,311j=1(ρ(1(ϕ31))e+(ρ1))1e][(ρ2j=1ηe2+(ρ1))1e,312j=1(ρ(1(ϕ32))e+(ρ1))1e].

    Let the statement is true for m=k

    FFSSTWG(d1,d2,...,dm)=[(ρkj=1ηe1+(ρ1))1e,31kj=1(ρ(1(ϕ31))e+(ρ1))1e].

    Now for m=k+1

    FFSSTWG(d1,d2,...,dm)=[(ρk+1j=1ηe1+(ρ1))1e,31k+1j=1(ρ(1(ϕ31))e+(ρ1))1e].

    The proof of the following theorems is straightforward, and we omit it.

    Theorem 4.4.3 (Idempotency): If Y=[κ,ς] for all h=1,2,3,...,m, then FFSSTWG(Y,Y,Y,...,Y)=Y.

    Theorem 4.4.4. (Commutativity): If (d1,d2,...,dn) is some permutation of (d1,d2,...,dn), then FFSSTWG (d1,d2,...,dn)=FFSSTWG (d1,d2,...,dn)

    Theorem 4.4.5. (Boundedness): If Y=min(d1,d2,...,dn),Y+=max(d1,d2,...,dn), then YFFSSTWG(d1,d2,...,dn)Y+.

    Definition 4.5.1. The collection of FFNs are cj=[η,κ] and the weight vector is e=(e1,e2,...,en)T with ej[0,1] and nj=1ej=1. Then FFSST (c1,c2,...,cn)=nj=1cejj is said FFSSTOWG operator.

    The proof of the following theorems is straightforward, and we omit it.

    Theorem 4.5.2. The gathering of FFNs are dj={[η,ϕ]} and the weight vector is e=(e1,e2,...,em)T with ej[0,1] and mj=1ej=1. Then it is held FFSSTOWG operator and

    FFSSTOWG(d1,d2,...,dm)=[(ρmj=1ηe+(ρ1))1e,31mj=1(ρ(1(ϕ3))e+(ρ1))1e].

    Theorem 4.5.3. (Idempotency): If Y=[κ,ς] for all h=1,2,3,...,n, then FFSSTOWG(Y,Y,Y,...,Y)=Y.

    Theorem 4.5.4. (Commutativity): If (R1,R2,...,Rn) is any permutation of (R1,R2,...,Rn), then FFSSTOWG (R1,R2,...,Rn)=FFSSTOWG (R1,R2,...,Rn).

    Theorem 4.5.5. (Boundedness): If Y=min(L1,L2,...,Ln),Y+=max(L1,L2,...,Ln), then YFFSSTOWG(L1,L2,...,Ln)Y+.

    Definition 4.6.1. The gathering of FFNs are cj=[η,ϕ] and the weight vector is e=(e1,e2,...,en)T with ej[0,1] and nj=1ej=1. Then FFSST(c1,c2,...,cn)=nj=1cejj

    is said FFSSTHWG operator.

    The proof of the following theorems is straightforward, and we omit it.

    Theorem 4.6.2. The collection of FFNs are dj={[η,ϕ]} and the weight vector is e=(e1,e2,...,en)T with ej[0,1] and nj=1ej=1. Then it is held FFSSTHWG operator and

    FFSSTHWG(d1,d2,...,dn)=[(ρnj=1ηe+(ρ1))1e,31nj=1(ρ(1(ϕ3))e+(ρ1))1e].

    Theorem 4.6.3. (Idempotency): If Y=[κ,ς] for all h=1,2,3,...,n, then FFSSTHWG(Y,Y,Y,...,Y)=Y.

    Theorem 4.6.4. (Commutativity): If (d1,d2,...,dn) is any permutation of (d1,d2,...,dn), then. FFSSTHWG(d1,d2,...,dn)=FFSSTHWG(d1,d2,...,dn).

    Theorem 4.6.5. (Boundedness): If Y=min(d1,d2,...,dn),Y+=max(d1,d2,...,dn), then YFFSSTHWG(d1,d2,...,dn)Y+.

    In this section we discuss the challenges of creative service collecting for major tiers or fiscal organizations by utilising a novel combination method that joins AHP with SST using FF data. To evaluate the work and the individual aspects of the innovation, a system of hierarchical evaluation criteria will be set up, able to balance strong presentation with obvious risks. The AHP is then applied to the FF scenery to quickly address the DMs' queries regarding the pairwise assessment of the relevant criteria, and to categorise the reliable criterion weights of the innovativeness dealers. The SST scheme is then added to the FF scenario to raise the suppliers' overall quality ratings while seeing the DMs' risk distaste concerning innovation. The position effects will quickly assess both the criteria's impartial values as well as the DMs' individual risk assurance through the blockchain. As a result, the proposed FF-AHP-SST technique address more effectively the problem of innovativeness worker collecting by considering the material topographies of innovativeness as well as the logical and emotional performance of DMs. Further graphically stepwise algorithm of proposed aggregation operators has been represented in Figure 4.

    Figure 4.  Stepwise algorithm of proposed aggregation operators, represented through flowchart.

    Innovativeness assortment, as a distinguishing MCDM problems, is done by gathering the decision mediums. Let A={A1,A2,...,An} signify sure dormant blockchain ability workers PS={PS1,PS2,...,PSn} denote weighty evaluative criteria transported by frequent specialists DM={DM1,DM2,...,DMn}, and the conforming vigorous of experts is signified by Δ=(Δ1,Δ2,...,Δn)T satisfying the situations nj=1Δj=1. Furthermore, the vigorous of the evaluative criteria is characterized by W=(W1,W2,,Wn)T, consultation the ensuing environments: nj=1Wj=1. Each constituent in the decision medium means the appropriate aspirant's evaluative valuation on a persuaded principle from the DM.

    Case 1.

    Step 1: Designate the FF decision matrix.

    Step 2: Designate the FFSSTHWA operator and ξ=(ξ1,ξ2,...,ξn).

    FFSSTHWA(a1,a2,...,an)=[31nj=1(ρ(1(η31))ξ+(ρ1))1ξ,(ρnj=1ϕξ1+(ρ1))1ξ].

    Step 3: Designate the FFSSTHWA operator and ξ=(ξ1,ξ2,...,ξn).

    FFSSTHWA(a1,a2,...,an)=[31nj=1(ρ(1(η31))ξ+(ρ1))1ξ,(ρnj=1ϕξ1+(ρ1))1ξ].

    Step 4: Find the level.

    Case 2.

    Step 1: Describe the FF decision matrix.

    Step 2: Describe the FFSSTHWG operator and ξ=(ξ1,ξ2,...,ξn).

    FFSSTHWG(a1,a2,...,an)=[(ρnj=1ηΓ1+(ρ1))1Γ,31nj=1(ρ(1(ϕ31))Γ+(ρ1))1Γ].

    Step 3: Describe the FFSSTHWG operator and ξ=(ξ1,ξ2,...,ξn).

    FFSSTHWG(a1,a2,...,an)=[(ρnj=1ηΓ1+(ρ1))1Γ,31nj=1(ρ(1(ϕ31))Γ+(ρ1))1Γ].

    Step 4: Find the rank.

    TE-FOOD is a community permissioned nourishment traceability system that enables all supply chain participants blockchain-based farm-to-table and customer trace of the food's data. The Food Chain (TE-FOOD's blockchain) is a community permissioned blockchain that lets supply chain performers and patrons uphold chief bulges to disperse traceability data. Customers of TE-FOOD use the flexibility to improve comprehensive perspectives into the stock restraint of food manufacture. TFD is symbolic of TE-ERC FOOD, which is classically abandoned on the wraithlike phase.

    The situation, to provide visibility in the food stream shackle by guiding the products through the entire spring chain (farm, computer or abattoir, supplier, shop) and offering clients, supply chain businesses, and management activities with tools to study the history and perfection of food. The TE-FOOD aims to enhance customer confidence and communication, acquire better supply chain data to restore operating effectiveness, abide by spread guidelines, protect their products from counterfeiting, and carry out earlier invention memories.

    The TE-Food system consists of diverse arenas:

    Understanding tools it includes safety closures, tag stickers, 1D/2D barcodes, RFID ear stickers, and tag labels. Traceability management includes a mobile B2B (Business-to-Business) app, a web app, a dominating system, outer interfaces, and journalistic tools. Skill and client tools include B2C (Business-to-Consumer), new yield legacy mobile apps, web apps, and trade side nutrition ancient numerical signage tools. Solutions offered by national livestock organisations: It includes plans for managing and implementing cattle.

    Gears for farm organisation: These tools are based on the category-specific (Inoculation, nourishing, composts, vegetable defence harvests, etc.). A Scam organisation arrangement, nourishment complaint device paraphernalia, and meat excellence graphic examination scheme are some of the equipment used in food care. The plan uses several documentation resources, including paper-based marker labels with QR codes, flexible terminations with QR codes, and malleable credentialing labels with RFID, to categorise the watched bodily fluids (crops, chairs, etc.)

    It fulfils many customers' needs for traceability, including movable apps used by B2B and clients to access double documentation capitals and appeal/arrival statistics. For users who do not want to use a mobile app to see the creation history, there is a web app. Exposed border for supply chain businesses that now use practise software to wrest origination's information's-FOOD propositions dualistic implementation representations, distant or official, and IoT API for food industries that permit to organisation statistics conservative from the strategies.

    TE-FOOD being focused on food production yields only solutions for the agricultural sector. Only the trackability solution provides multiple B2B (Business-to-Business), B2C (Business-to-Consumer), and B2A (Business-to-Authorities) capabilities, supporting businesses, customers, and institutions.

    Customer trust is shaped since they can trace the origin of the food creation while accounting for all the distributions the creation received.

    Good trackability and sensors allow for the early isolation of contaminated food production before it spreads to stores, thereby reducing the number of foodborne illnesses.

    Controlling entities have realistic perspectives on the food industry that support the application of food care regulations.

    One of the TE-FOOD restrictions is the TFD symbolising the relatively slow deal/second (15 TPS) rate of delicate net earnings. Additionally, TE-FOOD must demonstrate an unintentional and direct rivalry with other rival companies like Ambrosius, WABI, MOD, and WTC. Additionally, TE-FOOD has a significant customer base in Vietnam and Republic of Hungary, and it is important to establish contacts in the world-wide market.

    The operation and growth of innovativeness are devoted from data building in the data stage. Innovative information building points to recover the organization break even with the complete trade wrapped up and information expertise. Activities can recoup the competence of their operations and organization through information director, planning by automatic and brainy progressed equipment and computer program device and administrations. Further by establishing a work organize checking framework database on all sorts of information, organization plans, to come about the commitment of modern innovativeness organization. In public, it is fundamental to make an automation even for calculation as it is one most essential tool for any organisation in this modern era. In uncertainty, DMs must provide their evaluations for the innovativeness with devotion to set up a right direction; in this way, the estimation movement can be seen as an agent MADM risky. Let a corporation is scheduled to support its four companies to expand their automation structure equally. The corporation will request four experts to make material for assessment of the four companies. PSi(i=1,2,3,4) with reverence to four qualities GBIUi(i=1,2,3,4). As the availability of data and the feasibility of the review, four attributes are ultimately chosen: GBIU1(IT attention degree), GBIU2 (IT reserve attention degree), GBIU3 (IT influence degree), and GBIU4 (amount of speculation for automation). The weight vector of four experts is w=(0.2,0.3,0.4,0.1)T.

    Attractive into clarifying the effort of real-world states and the suitability of data, the ultimate decision maker requires DMs to utilize Fermatean fuzzy basics to direct their appraisal data. So, the decision matrices measured by DMs are observable in Tables 1 and 2.

    Table 1.  Fermatean fuzzy decision matrix.
    GBIU1 GBIU2 GBIU3 GBIU4
    PS1 [0.11,0.13] [0.15,0.17] [0.24,0.28] [0.11,0.31]
    PS2 [0.24,0.28] [0.11,0.13] [0.24,0.28] [0.11,0.13]
    PS3 [0.11,0.13] [0.5,0.9] [0.11,0.13] [0.105,0.109]
    PS4 [0.5,0.9] [0.11,0.13] [0.44,0.55] [0.11,0.13]

     | Show Table
    DownLoad: CSV

    The FF decision matrix Table 2 is as below.

    Table 2.  Fermatean fuzzy decision matrix.
    GBIU1 GBIU2 GBIU3 GBIU4
    PS1 [0.001,0.003] [0.02,0.03] [0.0024,0.0028] [0.3,0.5]
    PS2 [0.5,0.8] [0.11,0.13] [0.3,0.5] [0.11,0.13]
    PS3 [0.11,0.13] [0.3,0.5] [0.11,0.13] [0.2,0.7]
    PS4 [0.3,0.5] [0.5,0.8] [0.05,0.08] [0.01,0.03]

     | Show Table
    DownLoad: CSV

    The assessment originates that the overweight of the four are wholly reported confidential after four cross units. By performing the four steps algorithm, the final ranking fallouts of FFSSTWA operators of Cases 1 and 2 has been denoted in Figures 5 and 6 individually.

    Figure 5.  Graphically representation of ranking result FFSSTWA operator.
    Figure 6.  Graphically representation of ranking result FFSSTWG operator.

    Case 1.

    Step 1: Define the FF decision matrix. The FF decision matrix Table 1 is as below.

    Step 2: Describe the FFSSTWA operator and ξ=(0.23,0.24,0.25,0.28).

    FFSSTWA operator Table 3.

    Table 3.  FFSSTWA operator.
    GBIU1 GBIU2 GBIU3 GBIU4
    PS1 [0.1341,0.3081] [0.1022,0.5012] [0.0329,0.4211] [0.2211,0.4513]
    PS2 [0.1223,0.1345] [0.8721,0.9812] [0.4801,0.6801] [0.4512,0.5411]
    PS3 [0.1856,0.2321] [0.6021,0.7634] [0.6192,0.6734] [0.6013,0.5691]
    PS4 [0.0131,0.0345] [0.3336,0.5678] [0.1913,0.5678] [0.6181,0.8534]

     | Show Table
    DownLoad: CSV

    Step 3: Designate the FFSSTWA operator and ξ=(0.23,0.24,0.25,0.28).

    FFSSTWA operator Table 4.

    Table 4.  FFSSTWA operator.
    PS1 [0.1041,0.3081]
    PS2 [0.1623,0.1345]
    PS3 [0.1056,0.2321]
    PS4 [0.2131,0.0345]

     | Show Table
    DownLoad: CSV

    Step 4: Determine the score values.

    Z1=0.0185,Z2=0.4734,Z3=0.2329,Z4=0.4843.

    Case 2

    Step 1: The FF decision matrix. The FF decision matrix Table 5 is as below.

    Table 5.  Fermatean fuzzy decision matrix.
    GBIU1 GBIU2 GBIU3 GBIU4
    PS1 [0.11,0.13] [0.05,0.07] [0.1,0.5] [0.1,0.6]
    PS2 [0.24,0.28] [0.1,0.6] [0.11,0.13] [0.11,0.13]
    PS3 [0.11,0.13] [0.5,0.9] [0.1,0.6] [0.01,0.03]
    PS4 [0.015,0.018] [0.11,0.13] [0.1,0.7] [0.11,0.13]

     | Show Table
    DownLoad: CSV

    FF decision matrix. The FF decision matrix Table 6 is as below.

    Table 6.  Fermatean fuzzy decision matrix.
    GBIU1 GBIU2 GBIU3 GBIU4
    PS1 [0.0201,0.0203] [0.202,0.203] [0.1324,0.2528] [0.0011,0.0051]
    PS2 [0.0011,0.0051] [0.1324,0.2528] [0.3,0.5] [0.01,0.03]
    PS3 [0.11,0.13] [0.0011,0.0051] [0.11,0.51] [0.1324,0.2528]
    PS4 [0.1324,0.2528] [0.11,0.51] [0.0011,0.0051] [0.01,0.03]

     | Show Table
    DownLoad: CSV

    Step 2: Designate the FFSSTWG operator and ξ=(0.23,0.24,0.25,0.28).

    FFSSTWG operator Table 7.

    Table 7.  FFSSTWG operator.
    GBIU1 GBIU2 GBIU3 GBIU4
    PS1 [0.1041,0.3981] [0.1122,0.5312] [0.1329,0.4201] [0.7811,0.4613]
    PS2 [0.1003,0.8145] [0.8721,0.1812] [0.1801,0.3801] [0.1512,0.3411]
    PS3 [0.4856,0.6321] [0.5021,0.8634] [0.1192,0.8734] [0.9013,0.0691]
    PS4 [0.3131,0.7345] [0.3006,0.5008] [0.1093,0.5988] [0.6091,0.8094]

     | Show Table
    DownLoad: CSV

    Step 3: The FFSSTWG operator and ξ=(0.23,0.24,0.25,0.28).

    FFSSTWG operator Table 8.

    Table 8.  FFSSTWG operator.
    PS1 [0.0341,0.3481]
    PS2 [0.7223,0.4345]
    PS3 [0.9856,0.3321]
    PS4 [0.5131,0.1346]

     | Show Table
    DownLoad: CSV

    Step 4: Determine the score value.

    Z1=0.0102,Z2=0.4904,Z3=0.2229,Z4=0.7888.

    Sketches are used to compare the optional plan to another plan that is inferior based on IFSs [1] and FFWG statistics [14] to support and conventionally optimistic feasibility. Other strategies are odd applications of our technique strategy, which was developed on FFN to the same description circumstance. Ranking result of the optimal solution of the existing technique has been represented in Figures 7 and 8.

    Figure 7.  Ranking result of the optimal solution of the existing technique.
    Figure 8.  Ranking result of the optimal solution of the existing technique.

    Step 1: IF decision matrix Table 9 in is as below.

    Table 9.  Intuitionistic fuzzy decision matrix.
    GBIU1 GBIU2 GBIU3 GBIU4
    PS1 [0.01,0.03] [0.2,0.4] [0.9,0.11] [0.11,0.33]
    PS2 [0.12,0.13] [0.4,0.6] [0.31,0.33] [0.112,0.313]
    PS3 [0.11,0.33] [0.12,0.13] [0.2,0.4] [0.554,0.556]
    PS4 [0.3004,0.3006] [0.34,0.36] [0.12,0.13] [0.2,0.4]

     | Show Table
    DownLoad: CSV

    Step 2: Describe the IFWA operator and the weight (0.1,0.2,0.3,0.4). In Table 10.

    Table 10.  Intuitionistic fuzzy weighted averaging operator.
    PS1 [0.4427,0.3145]
    PS2 [0.4534,0.2756]
    PS3 [0.2991,0.3653]
    PS4 [0.2801,0.3843]

     | Show Table
    DownLoad: CSV

    Step 3: The score value is

    Z1=0.1121,Z2=0.1498,Z3=0.1971,Z4=0.4121.

    Step 4: Given the ranking Z4>Z3>Z2>Z1 and hence Z4is the best.

    Step 1: The FF decision matrix is given in Table 11.

    Table 11.  Fermatean Fuzzy decision matrix.
    GBIU1 GBIU2 GBIU3 GBIU4
    PS1 [0.21,0.23] [0.212,0.214] [0.209,0.211] [0.002,0.004]
    PS2 [0.12,0.14] [0.11,0.13] [0.3001,0.3003] [0.1012,0.3013]
    PS3 [0.11,0.13] [0.11,0.12] [0.1,0.4] [0.553,0.554]
    PS4 [0.3002,0.3004] [0.32,0.34] [0.11,0.13] [0.2,0.4]

     | Show Table
    DownLoad: CSV

    Step 2: The FFWG operator and the weight vector is(0.1,0.2,0.3,0.4). FFWG operator Table 12.

    Table 12.  FFWG operator.
    PS1 [0.4145,0.1231]
    PS2 [0.4111,0.1132]
    PS3 [0.4353,0.8935]
    PS4 [0.7231,0.3343]

     | Show Table
    DownLoad: CSV

    Step 3: The score function is.

    Z1=0.0414,Z2=0.1835,Z3=0.2802,Z4=0.5001.

    Step 4: Find the ranking Z4>Z3>Z2>Z1 and henceZ4is the best.

    When there are interrelationships including any various criteria: The varied methods can hold this formal, see Table 13.

    Table 13.  Comparison of different techniques.
    Methods 1 2 3 4 5
    Colak et al. [2] 0.0253 0.2901 0.3008 0.0621 0.3498
    Farshidi et al. [3] 0.0909 0.4056 0.3087 0.4085 0.0095
    Karaşan et al [4] 0.1537 0.1881 0.8601 0.1916 0.0483
    Tang et al. [7] 0.5243 0.3041 0.3007 0.9721 0.6098

     | Show Table
    DownLoad: CSV

    We highlighted some merits of the suggested approach, as follows.

    1) The approach proposed in this paper is related with the group decision-making technique grounded on imitation and FFS proposed in (Senapati et al. 2019), and the ranking result by the mixture of imitation and FFS isη2>η4>η3>η1. It is observed that the best structure found by the process proposed in this study is the similar as that gained by the group decision-making system in (Senapati et al. 2019), that is η2, but the command of each structure is still changed. Since the risk favourites of dissimilar decision-makers are booked into explanation in the aggregation technique used in this paper. The consequence of indecision on decision-making consequences is counted from the viewpoint of decision-makers, so the decision-making consequence is more in streak with the real decision-making condition.

    2) It is more sensible and applied to use the technique suggested in this paper to regulate the weight of decision-makers than the lengthy FFS technique used in (Senapati, T and Yager, R. R. (2020)). As The masses of decision-makers resolute through the FFs technique is the similar for dissimilar qualities, and folks using the method outlined in this paper are different for different qualities. In actual decision-making, the different qualities may include changed arenas, and correspondingly decision maker is clearly only decent at some fields but not altogether in all fields. It is more sensible that decision makers have diverse weights under different attributes. In adding, the existing study consequences use resemblance or nearness to control the weight of decision makers, but the resemblance is not essentially high underneath great closeness. Consequently, this paper interminably uses comparison and nearness in the technique of critical the weight of decision makers to enhanced variety filled procedure of decision data, so that the persevering decision creator commonalities are closer to the real weights.

    3) The technique suggested in this paper has persistent distinguishability compared to the extended FFS technique in works (Senapati, T., and Yager, R. R. (2020)), which can help us to control the unique ideal explanation for various decision-makers' safety preferences. To the contrary, the extended FFS approach may produce close complete evaluation values for each scheme, weakening the distinguishability of this method and making it challenging to distinguish the schemes.

    4) There is a little doubt that the two strategies' focal points and methods differ (Own C-M 2009). In contrast to the strategy suggested by the former, which generates the Fermatean fuzzy number and is used to the MADM problematic with solitary one decision maker, the approach offered in this study is appropriate to the MAGDM problem with FFN whose quality weight information is completely unknown. The prior way only needs the decision maker to assess the favourite relationship between schemes after pairwise judgement, as opposed to the current method, which analyses each scheme in relation to each attribute.

    5) The same planned DM approach is used with a smaller MAGDM subject to instruct students in a way that produces the best results. The effective and true MAGDM method allows us to apply the same strategy to a minor unruly and obtain the same outcome as with the MAGDM challenging.

    6) The complex alternative evaluation must be comparable to the undecomposed difficulty's unique assessment when the primary MAGDM issue is reduced to a minor issue. To strengthen the alternative, we employ techniques like those utilised in the MAGDM problem on small subjects.

    7) The FFSSTWA operator must be satisfied to resonant a proficient and accurate MAGDM approach.

    8) We can assume that the position leans are equal based on the outputs of the optional operators and previous laborious procedures. The MCDM method is a complete and innovative solution for commerce with indecision under DM conditions and is dependent on the Schweizer-Sklar aggregation operations. In practical situations, using Schweizer-Sklar norm-dependent aggregate operators in a different ranking value are more flexible and cost-effective.

    9) Operations research's branch known as multiple-criteria decision-making openly assesses numerous, contradictory factors when making decisions (as well as in environments including business, government, and medical). Inconsistent criteria are commonly present while analysing possibilities: cost or price is typically one of the fundamental criteria, and a quality measure is frequently another, readily at conflict with the cost. Cost, comfort, safety, and fuel efficiency may be some of the primary factors we take into consideration when buying a car. It is unusual for the economical car to also be the greatest contented and safest one. The goal of portfolio management is to maximize returns while minimizing risks, yet the companies with the highest potential returns often have the most risk.

    In this subsection, the proposed method compares with a different method.

    1) This method is innovative and good assessment for Schweizer-Sklar t-norm and t-conorm operational comments for FFNS.

    2) Further, the presented FFNS method founded on Schweizer-Sklar considers the concordance set beside the different set, but the existing FFS technique does not expressly consider the different set when two choices have the same performance.

    3) The proposed aggregation operators are superior to the existing aggregation operators. As FFSSTWA is more informative and more flexible.

    4) An extended MCGDM technique for FFNS heightened the sturdiness of the application by inspection the alternative superiority, impartiality and subservience dealings completed other changes, as well as the graphical explanation of weedy and robust outranking relatives that energy elsewhere the construction of preceding replicas.

    5) This feature climaxes the superiority of the original FFNS practise completed the former classical.

    Different existing techniques, see Table 14.

    Table 14.  Different existing techniques.
    Methods Score Function Ranking Final Ranking
    MCDM [6] {η1=0.2014,η2=0.8755,η3=0.5811,η4=0.6711} {η2>η4>η3>η1} {η2>η4>η3>η1}
    Pythagorean operators [12] {η1=0.0213,η2=0.1745,η3=0.0545,η4=0.0893} {η2>η4>η3>η1} {η2>η4>η3>η1}
    IFSS [17] {η1=0.0074,η2=0.1234,η3=0.0611,η4=0.1012} {η2>η4>η3>η1} {η2>η4>η3>η1}

     | Show Table
    DownLoad: CSV

    The anxiety is by what means to evaluate the former multi-criteria efficiency mark for a suitable decision scenery because the proposed FFN context, which is an effectiveness or scoring degree-based model for MCDA, selects choice with the maximum helpfulness degree, as compared to the existing replicas, which are concession degree replicas and select a selection that is contiguous to the ideal explanation, see Table 15.

    Table 15.  Effectiveness of the proposed method.
    Methods Score Function Ranking Final Ranking
    MCDM on FFSSTWA {η1=0.0014,η2=0.8105,η3=0.4522,η4=0.6022} {η2>η4>η3>η1} {η2>η4>η3>η1}
    MCDM on FFSSTOWA {η1=0.1012,η2=0.7041,η3=0.4229,η4=0.5612} {η2>η4>η3>η1} {η2>η4>η3>η1}
    MCDM on FFSSTHWA {η1=0.1012,η2=0.2078,η3=0.1502,η4=0.1804} {η2>η4>η3>η1} {η2>η4>η3>η1}
    MCDM on FFSSTHWG {η1=0.0123,η2=0.1829,η3=0.1045,η4=0.1345} {η2>η4>η3>η1} {η2>η4>η3>η1}

     | Show Table
    DownLoad: CSV

    In this subsection limitation of FFs based on two sets has been exhibited (see Table 16).

    Table 16.  Limitation of Fermatean fuzzy set based on two sets.
    Methods Score Function Ranking Final Ranking
    Mondal et al. [17] {η1=0.0121,η2=0.1987,η3=0.1333,η4=0.1721} {η2>η4>η3>η1} {η2>η4>η3>η1}
    Own C-M [16] {η1=0.0103,η2=0.1012,η3=0.0234,η4=0.0981} \left\{ {\begin{array}{*{20}{c}} {{\eta _2} > } \\ {{\eta _4} > } \\ {{\eta _3} > } \\ {{\eta _1}} \end{array}} \right\} \left\{ {\begin{array}{*{20}{c}} {{\eta _2} > } \\ {{\eta _4} > } \\ {{\eta _3} > } \\ {{\eta _1}} \end{array}} \right\}
    Zhou et al. [12] \left\{ {\begin{array}{*{20}{c}} {{\eta _1} = 0.0109, } \\ {{\eta _2} = 0.1981, } \\ {{\eta _3} = 0.0451, } \\ {{\eta _4} = 0.1213} \end{array}} \right\} \left\{ {\begin{array}{*{20}{c}} {{\eta _2} > } \\ {{\eta _4} > } \\ {{\eta _3} > } \\ {{\eta _1}} \end{array}} \right\} \left\{ {\begin{array}{*{20}{c}} {{\eta _2} > } \\ {{\eta _4} > } \\ {{\eta _3} > } \\ {{\eta _1}} \end{array}} \right\}

     | Show Table
    DownLoad: CSV

    The primary aim of this research is to present a unique MADM technique and tie it to a real innovation in information and evaluation issues. To achieve this, we focused primarily on three components: The data face way, the data aggregation technique, and the operational rules in the data aggregation process. Initially, we proposed the concept of FFS, which is a practical and significant data presentation strategy for controlling uncertainty. The proposed FFS has the advantage of giving DMs more autonomy. To provide an additional flexibility to the circumstance, the Schweizer-Sklar t-norm and t-conorm operational defined for FFNS. A series of operators, with the combination FFNS and SSTT operational rules are presented, namely the FFSSTWA operator, FFSSTOWA operator, FFSSTHWA operator, FFSSTWG operator, FFSSTOWG operator, and FFSSTHWG operator, in control to hold the interrelationship during qualities. We worked with the SST operator to collectively assess data with FFNs. The interrelationship between different attributes might be considered using the provided operator. Then, an innovated method to MADM problems based on the suggested operators is pre-summit. The FFSSTWA and FFSSTWG operators are utilised to fix the challenge in the appropriate ways. To conclude, we coupled the method to an innovativeness automation equal appraisal tricky. To demonstrate that the offered operators provide a reducible approach to the MCDM problem, a comparison with several existing operators was made.

    In the future, we will offer the proposed techniques to other FFN methods and aggregation operators, such as the Muirhead mean operator and presence worth exploring power average operator. Additionally, our suggested strategy can be related to additional issues including dealer collecting challenges, speculative topics.

    Interdependency of the different sections of the paper has been exhibited in Figure 9.

    Figure 9.  Flowchart of the paper, to exhibit interdependency of the different section of the paper.

    The authors declare no conflict of interest



    [1] W. H. Abdi, On q-Laplace transforms, Proc. Natl. Acad. Sci. India, 29 (1961), 389–408.
    [2] G. Bangerezako, An Introduction to q-Difference Equations, Preprint, Bujumbura: University of Burundi, 2007.
    [3] L. Carlitz, q-Bernoulli numbers and polynomials, Duke Math. J., 15 (1948), 987–1000.
    [4] L. Carlitz, q-Bernoulli and Eulerian numbers, Trans. Amer. Math. Soc., 76 (1954), 332–350.
    [5] T. Ernst, A Comprehensive Treatment of q-Calculus, New York: Springer Science, Business Media, 2012.
    [6] J. A. Ganie, A. A. Bhat, S. A. Wani, Natural transform of two variables in q-calculus with applications, Bollettino dell'Unione Matematica Italian, 17 (2024), 101–117.
    [7] R. N. Goldman, P. Simenov, Y. Simsek, Generating Functions For The Q-Bernstein Bases, Siam J. Discrete Math., 28 (2014), 1009–1025.
    [8] H. F. Jackson, q-Difference equations, Am. J. Math., 32 (1910), 305–314.
    [9] H. F. Jackson, On q-functions and a certain difference operator, Earth Environ. Sci. Trans. R. Soc. Edinb., 46 (2013), 253–281.
    [10] A. Kemp, Certain q-analogues of the binomial distribution, Sankhya Indian J. Stat. Ser. A, 64 (2002), 293–305.
    [11] N. Kilar, Y. Simsek, Computational formulas and identities for new classes of Hermite-based Milne–Thomson type polynomials: Analysis of generating functions with Euler's formula, Math. Appl. Sci., 44 (2021), 6731–6762.
    [12] N. Kilar, Y. Simsek, H. M. Srivastava, Recurrence relations, associated formulas, and combinatorial sums for some parametrically generalized polynomials arising from an analysis of the Laplace transform and generating functions, Ramanujan J., 61 (2023), 731–756.
    [13] N. Kilar, Y. Simsek, Identities and relations for Hermite-based Milne–Thomson polynomials associated with Fibonacci and Chebyshev polynomials, RACSAM, 115 (2021), 28. https://doi.org/10.1007/s13398-020-00968-3 doi: 10.1007/s13398-020-00968-3
    [14] J. Konvalina, A unified interpretation of the binomial coefficients, the Stirling numbers, and the Gaussian coefficients, Am. Math. Mon., 107 (2000), 901–910. https://doi.org/10.1080/00029890.2000.12005290 doi: 10.1080/00029890.2000.12005290
    [15] T. Kim, C. S. Ryoo, Some identities for Euler and Bernoulli polynomials and their zeros, Axioms, 7 (2018), 56. https://doi.org/10.3390/axioms7030056 doi: 10.3390/axioms7030056
    [16] J. Y. Kang, C. S. Ryoo, Various structures of the roots and explicit properties of q-cosine Bernoulli polynomials and q-sine Bernoulli polynomials, Mathematics, 8 (2020), 463. https://doi.org/10.3390/math8040463 doi: 10.3390/math8040463
    [17] Q. Luo, H. M. Srivastava, q-extensions of some relationships between the Bernoulli and Euler polynomials, Taiwan. J. Math., 15 (2011), 241–257.
    [18] S. Picoli Jr., R. S. Mendes, L. C. Malacarne, R. P. B. Santos, q-distributions in complex systems: A brief review, Braz. J. Phys., 39 (2009), 468–474. https://doi.org/10.1590/S0103-97332009000400023 doi: 10.1590/S0103-97332009000400023
    [19] C. S. Ryoo, J. Y. Kang, Explicit Properties of q-Cosine and q-Sine Euler Polynomials Containing Symmetric Structures, Symmetry, 12 (2020), 1274. https://doi.org/10.3390/sym12081247 doi: 10.3390/sym12081247
    [20] C. S. Ryoo, J. Y. Kang, Various Types of q-Differential Equations of Higher Order for q-Euler and q-Genocchi Polynomials, Mathematics, 10 (2022), 1181. https://doi.org/10.3390/math10071181 doi: 10.3390/math10071181
    [21] P. S. Rodrigues, G. Wachs-Lopes, R. M. Santos, E. Coltri, G. A. Giraldi, A q-extension of sigmoid functions and the application for enhancement of ultrasound images, Entropy, 21 (2019), 430. https://doi.org/10.3390/e21040430 doi: 10.3390/e21040430
    [22] E. Schrödinger, A method for determining quantum mechanical eigenvalues and eigenfunctions, Proc. Roy. Irish. Acad. A, 46 (1940), 9–16.
    [23] K. Victor, C. Pokman, Quantum Calculus Universitext, New York: Springer, 2002.
  • This article has been cited by:

    1. Yi Yang, Mengqi Jie, Yuhan Zhao, Limei Liu, Junfeng Yang, Jie Chen, The extended weighted t-norms-based linear hybrid aggregation function and its application for aggregating improved basic uncertain linguistic information, 2024, 136, 09521976, 108975, 10.1016/j.engappai.2024.108975
    2. Saeid Jafarzadeh Ghoushchi, Sina Shaffiee Haghshenas, Sahand Vahabzadeh, Giuseppe Guido, Zong Woo Geem, An integrated MCDM approach for enhancing efficiency in connected autonomous vehicles through augmented intelligence and IoT integration, 2024, 23, 25901230, 102626, 10.1016/j.rineng.2024.102626
    3. Lifeng Kang, Yankun Wang, Efficient and accurate personalized product recommendations through frequent item set mining fusion algorithm, 2024, 10, 24058440, e25044, 10.1016/j.heliyon.2024.e25044
    4. Biwei Xu, Lipeng Luo, ExpTODIM-EDAS Framework for Multiple-Attribute Decision-Making Under Z-Number Environment and Applications to Comprehensive Quality Evaluation of Swimmers’ Specific Competencies, 2024, 12, 2169-3536, 165359, 10.1109/ACCESS.2024.3493114
  • Reader Comments
  • © 2024 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(752) PDF downloads(32) Cited by(0)

Figures and Tables

Figures(3)  /  Tables(1)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog