ODAM – Vol 4 – Issue 3 (2021) – PISRT https://old.pisrt.org Mon, 24 Jan 2022 12:55:40 +0000 en-US hourly 1 https://wordpress.org/?v=6.7 The inverse sum indeg index (\(ISI\)) and \(ISI\) energy of Hyaluronic Acid-Paclitaxel molecules used in anticancer drugs https://old.pisrt.org/psr-press/journals/odam-vol-4-issue-3-2021/the-inverse-sum-indeg-index-isi-and-isi-energy-of-hyaluronic-acid-paclitaxel-molecules-used-in-anticancer-drugs/ Fri, 24 Dec 2021 20:27:43 +0000 https://old.pisrt.org/?p=6128
ODAM-Vol. 4 (2021), Issue 3, pp. 72 - 81 Open Access Full-Text PDF
Özge Çolakoglu Havare
Abstract:The inverse sum indeg index \(ISI(G)\) of a graph is equal to the sum over all edges \(uv\in E(G)\) of weights \(\frac{d_{u}d_{v}}{d_{u}+d_{v}}\). In this paper, we calculated the inverse indeg indices and inverse indeg energies that give information about the physicochemical properties and biological characteristics of Hyaluronic Acid-Paclitaxel conjugates used in the production of drugs used in the treatment of cancer disease. This study presents the relation between the ISI index and the ISI energy of the molecular graph of Hyaluronic Acid-Paclitaxel conjugates.
]]>

Open Journal of Discrete Applied Mathematics

The inverse sum indeg index (\(ISI\)) and \(ISI\) energy of Hyaluronic Acid-Paclitaxel molecules used in anticancer drugs

Özge Çolakoglu Havare
Mersin University, Science and Arts Faculty, Mathematics Department, 33343, Mersin-Turkey; ozgeeclkgl@gmail.com

Abstract

The inverse sum indeg index \(ISI(G)\) of a graph is equal to the sum over all edges \(uv\in E(G)\) of weights \(\frac{d_{u}d_{v}}{d_{u}+d_{v}}\). In this paper, we calculated the inverse indeg indices and inverse indeg energies that give information about the physicochemical properties and biological characteristics of Hyaluronic Acid-Paclitaxel conjugates used in the production of drugs used in the treatment of cancer disease. This study presents the relation between the ISI index and the ISI energy of the molecular graph of Hyaluronic Acid-Paclitaxel conjugates.

Keywords:

Graph theory; Topological index; Inverse sum indeg index; Inverse sum energy; Spectral radius; Hyaluronic Acid-Paclitaxel conjugates.

1. Introduction

Let \(G(V,E)\) be a simple connected graph where \(V\) is vertex set and \(E\) is edge set. The cardinality of the vertex set of a graph is denoted by \(n\) and the cardinality of its edge set is denoted by \(m\). An edge \(e=uv\) of this graph connects the vertices \(u\) and \(v\). The degree of a vertex \(u\) is denoted by \(d_{u}\) and is defined in [1].

A molecular graph represents the skeletons of nonsaturated hydrocarbon of molecules and molecular compounds. The vertices and edges of this graph correspond to non-hydrogen atoms and covalent bonds between atoms, respectively. Note that hydrogen atoms are often omitted. Chemical graph theory deals with the energy levels of electrons in a molecular which is the eigenvalues of the graph and the strength of particles which is the spectrum of the graph [2,3]. Topological indices are numerical descriptors of a molecular graph. They are used to predict the physicochemical and bioactivity properties of molecules and molecular compounds [4,5,6].

The Wiener index which was introduced by Harold Wiener is the oldest topological index. This index was used for the physical properties of paraffin [7]. Topological indices can be classified according to the structural features of the graph. For example, the Wiener index which is based on the distance between vertices, the Randic and the Zagreb indices which are based on degree, the Estrada index which is based on the spectrum of a graph, the Hosaya index which is based on the matching, the bond-additive indices which are based measure of peripherality in graphs [4].

Hyaluronic acid (HA) which is a major component of the extracellular matrix and a naturally-occurring glycosaminoglycan is a promising molecule for use in drug production due to its biodegradable, non-toxic, hydrophilic, biocompatible, non -immutable features and unique [8]. Therefore, HA has attracted great attention in pharmaceutical production. In recent years, many scientists have shown that the use of HA in the production of anticancer drugs helps the treatment [9,10,11]. It has been observed that HA can be useful in the treatment of heart diseases [12]. Figure 1 shows the molecular graph of Hyaluronic acid and Figure 2 shows the molecular graph of Hyaluronic Acid-Paclitaxel (HA-PTX) conjugates with \(n=3\).

Figure 1. The molecular graph of HA-PTX[1] (\protect \cite{Wang2,Zengi}).

Figure 2. The molecular graph of HA-PTX[3] (see \protect\cite{Zengi}).

Since the experiments are costly and time-consuming, it has been necessary to calculate topological indices that give information about the topology (physical chemistry and biological properties) of the molecule and molecular compounds. Many scientists studied the topological indices of HA and HA-PTX conjugates [8,13,14]. Many studies have been conducted in chemistry and pharmaceutical science since it is useful to calculate the topological indices of molecules [15,16,17,18,19,20,21,22,23,24,25].

Gutman and Trinajtic defined first Zagreb index in [26] as

\begin{equation*} M_{1}(G)=\underset{u\in V(G)}{\sum }d_{u}^{2}=\underset{uv\in E\left( G\right) }{\sum }d_{u}+d_{v}. \end{equation*} Vukicevic and Gasperov introduced the discrete Adriatic indices which are bond-additive indices [27]. One of these indices is inverse sum indeg index which is defined as
\begin{equation} ISI(G)=\underset{uv\in E(G)}{\sum }\frac{d_{u}d_{v}}{d_{u}+d_{v}}. \label{1} \end{equation}
(1)
The inverse sum indeg adjacency matrix \(ISI\) is a matrix with entries \(s_{ij}\) defined as follows [28,29]: \begin{equation*} s_{ij}=\left\{ \begin{array}{c} \frac{d_{i}d_{j}}{d_{i}+d_{j}}\text{,    }ij\in E(G) \\ 0\text{,     Otherwise} \end{array} \right.. \end{equation*} Let \(s_{1}\geq s_{2}\geq ...\geq s_{n}\) be the eigenvalues of the matrix \( ISI \). It is elementary to show that
\begin{equation} tr(ISI)=\overset{n}{\underset{i=1}{\sum }}s_{i}=0 \label{e1} \end{equation}
(2)
where \(tr(ISI)\) is traces of \(ISI\) [28,29]. The energy of the \(ISI\) adjacency matrix is defined in [28,29] as
\begin{equation} ISIE=\overset{n}{\underset{i=1}{\sum }}\left\vert s_{i}\right\vert . \label{e3} \end{equation}
(3)

Lemma 1. [30,31] Let \(A\), \(B\) be Hermitian matrices of order \(n\). Suppose that \(A,B\) and \(A+B\) be \(\lambda _{i}(A),\lambda _{i}(B)\) and \(\lambda _{i}(A+B)\) for \( i=1,2,...,n\), rexpectively, each algebraically ordered in nonincreasing order. Then, for \(i=1,2,...,k,\) \begin{equation*} \lambda _{i}(A)+\lambda _{n}(B)\leq \lambda _{i}(A+B)\leq \lambda _{i}(A)+\lambda _{1}(B). \end{equation*}

Vukicevic et al., found that the ISI index is an important estimator of the total surface area of octane isomers [27]. Sedlar et al., obtained extremal values for ISI index of various graph classes [32]. Lokesha et al., studied on the ISI index of some nanostructure [33]. Nezhad et al., presented the ISI index of some nanotubes [34]. Chen and Deng gave some bounds for the ISI index in terms of various graph parameters [35]. Hafeez and Farooq studied on \(ISI\) energy formula of several graph classes [36].

In this study, we computed the \(ISI \) energies, spectral radii of ISI matrices, and the ISI indices of the molecular graph of the HA-PTX conjugates. Furthermore, we compared the inverse sum indeg indices and the inverse sum indeg energies for the molecular graph of the HA-PTX conjugates used in anticancer drug production.

2. The inverse sum indeg index (\(ISI\)), \(ISI\) energy, spectral radius of molecular graph of the Hyaluronic Acid-Paclitaxel conjugates

Let \(G\) be molecular graph of HA-PTX conjugate with \(n\). Then, \( |V(G_{n})|=87n\) and \(|E(G_{n})|=96n-1\) ([8,13,14]).

Theorem 1. Let \(G\) be molecular graph of HA-PTX conjugate with \(n=1\) unit. Then, \begin{equation*} ISI(G)=\frac{6697}{60}. \end{equation*}

Proof. As discussed in [8,13,14], the edge set of \(G\) can be partitions as follows:

\(\left\vert E_{1,2}\right\vert=\left\vert\{d_{u}=1\text{ and }d_{v}=2 \}\right\vert=1,\)

\(\left\vert E_{1,3}\right\vert=\left\vert\{d_{u}=1\text{ and }d_{v}=3 \}\right\vert=17\),

\(\left\vert E_{1,4}\right\vert=\left\vert\{d_{u}=1\text{ and }d_{v}=4 \}\right\vert=4\),

\(\left\vert E_{2,2}\right\vert=\left\vert\{d_{u}=2\text{ and }d_{v}=2 \}\right\vert=14\),

\(\left\vert E_{2,3}\right\vert=\left\vert\{d_{u}=2\text{ and }d_{v}=3\}\right\vert=30\),

\(\left\vert E_{2,4}\right\vert=\left\vert\{d_{u}=2\text{ and }d_{v}=4 \}\right\vert=3\),

\(\left\vert E_{3,3}\right\vert=\left\vert\{d_{u}=3\text{ and }d_{v}=3 \}\right\vert=18\),

\(\left\vert E_{3,4}\right\vert=\left\vert\{d_{u}=3\text{ and }d_{v}=4 \}\right\vert=7\),

\(\left\vert E_{4,4}\right\vert =\left\vert\{d_{u}=4\text{ and }d_{v}=4 \}\right\vert=1\).

Assume that \(\gamma _{uv}=\) \(\frac{d_{u}d_{v}}{d_{u}+d_{v}}\). From Equation (1), it can be written
\begin{align} \label{2} ISI(G) =&\underset{uv\in E_{1,2}}{\sum }\gamma _{uv}+\underset{uv\in E_{1,3} }{\sum }\gamma _{uv}+\underset{uv\in E_{1,4}}{\sum }\gamma _{uv}+\underset{ uv\in E_{2,2}}{\sum }\gamma _{uv}+\underset{uv\in E_{2,3}}{\sum }\gamma _{uv} \notag \\ & +\underset{uv\in E_{2,4}}{\sum }\gamma _{uv} +\underset{uv\in E_{3,3}}{ \sum }\gamma _{uv}+\underset{uv\in E_{3,4}}{\sum }\gamma _{uv}+\underset{ uv\in E_{4,4}}{\sum }\gamma _{uv}. \end{align}
(4)
From Equation (4), we obtain \begin{equation} ISI(G)=1\times \frac{2}{3}+17\times \frac{3}{4}+4\times \frac{4}{5}+14\times \frac{4}{4}+30\times \frac{6}{5}+3\times \frac{8}{6}+18\times \frac{9}{6} +7\times \frac{12}{7}+1\times \frac{16}{8}. \notag \end{equation}

Theorem 2. Let \(G\) be molecular graph of HA-PTX conjugate with \(n=1\) unit. Then, \(s_{1}(G)=7.2712\).

Proof. The eigenvalues of the inverse sum indeg matrix of the molecular graph of the HA-PTX conjugate with \(n=1\) are calculated using the MATLAB program. The positive eigenvalues are: \(7.2712,\,4.0449,\,3.5368,\,3.2252,\,3.0890,\, 3.0072,\,2.9687,\) \(2.6823,\,2.5252,\,2.3681,\,2.2741,\,2.1448,\,2.0263,\,1.8462,\) \(1.7983,\,1.7280,\,1.6222,\,1.6016,\,1.5699,\, 1.4821,\,1.4599,\,\) \(1.2686,\) \(1.1608,\,1.0529,\,1,\,1,\,1,\, 0.9905,\,0.8327,\,0.8027,\,\) \(0.6178,\,0.4489,\,0.3813,\,0.3580,\,0.2976,\, 0.2290,\,0.2128,\,\) \(0.1792,0.1264.\) The spectral radius of and the smallest eigenvalue of the inverse sum indeg matrix of the HA-PTX conjugate with \(n=1\) are \(7.2712,-7.2712,\) respectively.

Theorem 3. Let \(EISI(G)\) be the inverse sum energy of the molecular graph of HA-PTX[1]. Then, \begin{equation*} EISI(G)=132.4624. \end{equation*}

Proof. From Equation (2), it can be written \(EISI=2\underset{i=1}{\sum }s_{i}\) for \(s_{i}>0.\) The proof is complemented from the positive eigenvalues of the inverse sum indeg matrix of HA-PTX conjugate with \(n=1\) in the proof of Theorem 2 and Equation (3).

Theorem 4. If \(G\) is the molecular graph of HA-PTX[n] then \begin{equation*} ISI(G)=\frac{3413}{30}n-\frac{43}{20}. \end{equation*}

Proof. Assume that \(G\) is the molecular graph of HA-PTX[n]. As discussed in [13] , the edge set of \(G\) can be partitioned as;

\(\left\vert E_{1,2}\right\vert=\left\vert\{d_{u}=1\text{ , }d_{v}=2 \}\right\vert=n,\)

\(\left\vert E_{1,3}\right\vert=\left\vert\{d_{u}=1\text{ , }d_{v}=3 \}\right\vert=16n+1\),

\(\left\vert E_{1,4}\right\vert=\left\vert\{d_{u}=1\text{ , }d_{v}=4 \}\right\vert=4n\),

\(\left\vert E_{2,2}\right\vert=\left\vert\{d_{u}=2\text{ , }d_{v}=2 \}\right\vert=13n+1\),

\(\left\vert E_{2,3}\right\vert=\left\vert\{d_{u}=2\text{ , }d_{v}=3 \}\right\vert=32n-2\),

\(\left\vert E_{2,4}\right\vert=\left\vert\{d_{u}=2\text{ , }d_{v}=4 \}\right\vert=3n\),

\(\left\vert E_{3,3}\right\vert=\left\vert\{d_{u}=3\text{ , }d_{v}=3 \}\right\vert=19n-1\),

\(\left\vert E_{3,4}\right\vert=\left\vert\{d_{u}=3\text{ , }d_{v}=4 \}\right\vert=7n\),

\(\left\vert E_{4,4}\right\vert=\left\vert\{d_{u}=4\text{ , }d_{v}=4 \}\right\vert=n\).

Assume that \(\gamma _{uv}=\) \(\frac{d_{u}d_{v}}{d_{u}+d_{v}}\). From Equation (4), the following equation is obtained \begin{align*} ISI(G) =&n\times \frac{2}{3}+\left( 16n+1\right) \times \frac{3}{4} +4n\times \frac{4}{5}+\left( 13n+1\right) \times \frac{4}{4}+\left( 32n-2\right) \times \frac{6}{5}+3n\times \frac{8}{6} \\ &+\left( 19n-1\right) \times \frac{9}{6}+7n\times \frac{12}{7}+n\times \frac{16}{8}. \end{align*} This proof is completed by the calculation.

Theorem 5. If \(G\) is the molecular graph of HA-PTX[n], then \begin{equation*} 5.9455\leq s_{1}(G)\leq 8.5969. \end{equation*}

Proof. Suppose that \(G_{1}\) and \(G\) are the molecular structures of HA-PTX conjugate with \(n=1\) and HA-PTX[n], respectively. Let \(ISI^{^{\prime }}\) be the \(ISI\) matrix of \(G_{1} \) which is \(87\times 87\) matrix. Let \(ISI\) be the \(ISI\) matrix of \(G\). Figure 3 shows the bridge graph of the molecule of HA-PTX conjugates with \(n=1\).

Figure 3. The bridge graph of HA-PTX conjugates with n=1.

By using Figure 3, it can be written the \(ISI\) matrix of \(G\) is as follows
\begin{equation} ISI=A_{87n\times 87n}+B_{87n\times 87n}, \label{3} \end{equation}
(5)
where \begin{equation*} A_{87n\times 87n}= \begin{bmatrix} ISI^{^{\prime }} & \ast & ... & \ast \\ \ast & ISI^{^{\prime }} & ... & \ast \\ \ast & \ast & ... & \ast \\ \ast & \ast & ... & \ast \\ \ast & \ast & ... & ISI^{^{\prime }} \end{bmatrix} _{87n\times 87n}, \end{equation*} where \(\ast \) is \(0_{87\times 87}\) and \begin{equation*} B_{87n\times 87n}= \begin{bmatrix} 0_{84\times 84} & 0_{84\times 5} & 0_{84\times 82} & 0_{84\times 5} & 0_{84\times 82} & & 0_{84\times 82} & 0_{84\times 5} & 0_{84\times 85} \\ 0_{5\times 84} & C & 0_{5\times 82} & 0_{5\times 5} & 0_{5\times 82} & & 0_{5\times 82} & 0_{5\times 5} & 0_{5\times 85} \\ 0_{82\times 84} & 0_{82\times 5} & 0_{82\times 82} & 0_{82\times 5} & 0_{82\times 82} & & 0_{82\times 82} & 0_{82\times 5} & 0_{82\times 85} \\ 0_{5\times 84} & 0_{5\times 5} & 0_{5\times 82} & C & 0_{5\times 82} & & 0_{5\times 82} & 0_{5\times 5} & 0_{5\times 85} \\ 0_{82\times 84} & 0_{82\times 5} & 0_{82\times 82} & 0_{82\times 5} & 0_{82\times 82} & ... & 0_{82\times 82} & 0_{82\times 5} & 0_{82\times 85} \\ \vdots & & & & & ... & & & \\ 0_{82\times 84} & 0_{82\times 5} & 0_{82\times 82} & 0_{82\times 5} & 0_{82\times 82} & & 0_{82\times 82} & 0_{82\times 5} & 0_{82\times 85} \\ 0_{5\times 84} & 0_{5\times 5} & 0_{5\times 82} & 0_{5\times 5} & 0_{5\times 82} & & 0_{5\times 82} & C & 0_{5\times 85} \\ 0_{85\times 84} & 0_{85\times 5} & 0_{85\times 82} & 0_{85\times 5} & 0_{85\times 82} & & 0_{85\times 82} & 0_{85\times 5} & 0_{85\times 85} \end{bmatrix} _{87n\times 87n}, \end{equation*} and \begin{equation*} C= \begin{bmatrix} 0 & 1/5 & 0 & 0 & 0 \\ 1/5 & 0 & 3/10 & 6/5 & 0 \\ 0 & 3/10 & 0 & 0 & 0 \\ 0 & 6/5 & 0 & 0 & 9/20 \\ 0 & 0 & 0 & 9/20 & 0 \end{bmatrix} _{5\times 5}. \end{equation*} By using the Matlab program, the eigenvalues of the \(C\) matrix are
\begin{equation} -1.3257,-0.1224,0,0.1224,1.3257. \label{11} \end{equation}
(6)
So, the \(B\) matrix has \(n-1\) eigenvalues each \(-1.3257\), \(-0.1224\), \(0.1224\) and \(1.3257\). Other eigenvalues of the \(B\) matrix are \(0\). The \(A_{87n\times 87n}\) matrix has \(n\) eigenvalues each the eigenvalues in the proof of Theorem 2. From Theorem 2, the eigenvalues in (6) and Lemma 1 , we have \begin{equation*} 7.2712+(-1.3257)\leq s_{1}(G)\leq 7.2712+1.3257. \end{equation*}

Theorem 6. If \(G\) is the molecular graph HA-PTX[n], then \begin{equation*} -6.7919n\leq EISI(G)\leq 223.8799n. \end{equation*}

Proof. From the eigenvalues in (6), it is known that the smallest eigenvalue of the \(B\) matrix is \(-1.3257\) and spectral radius of the \(B\) matrix is \( 1.3257\). By using the eigenvalues from the proof of Theorem 2 and Lemma 1, one can obtain the eigenvalues of graph \(G\) for \(i=1,...87.\) \begin{equation*} s_{i}(A)+s_{87n}(B)\leq s_{i}(ISI(G))\leq s_{i}(A)+s_{1}(B). \end{equation*} From the above inequality, \(s_{i}(ISI(G))\) is negative for all eigenvalues between \((-7.2712)\)-\((-1.4599)\) of the matrix \(A\). So, the following inequality is obtained from Equation (3) \begin{align*} 2[7.2712+...+1.4599]+\overset{87}{\underset{i=1}{\sum }}s_{87n}(B) \leq & \overset{87}{\underset{i=1}{\sum }}s_{i}(ISI(G))\leq 2[7.2712+...+1.4599]+ \overset{87}{\underset{i=1}{\sum }}s_{1}(B) \\ 108.544-115.3359 \leq &\overset{87}{\underset{i=1}{\sum }}s_{i}(ISI(G))\leq 108.544+115.3359 \\ -6.7919 \leq &\overset{87}{\underset{i=1}{\sum }}s_{i}(ISI(G))\leq 223.8799. \end{align*} Since the \(A\) matrix has \(n\) eigenvalues in the proof of Theorem 2 , this proof is completed.

3. Comparison with the inverse sum indeg index, spectral radius and ISI energy of molecular graphs of Hyaluronic Acidpaclitaxel conjugates

Table 1 shows spectral radii, the inverse sum indeg indices and the ISI energies of molecular graphs of Hyaluronic Acid-Paclitaxel (HA-PTX) conjugates with \(n=1,2,3,4,5\). The eigenvalues of molecular graphs of HA-PTX conjugates with \(n=2,3,4,5\) are computed by the Matlab program and the results are given in Table 2, Table 3, Table 4 and Table 5, respectively, in the appendix.

Table 1.The spectral radii, the inverse sum indeg indices and the ISI energies of Hyaluronic Acid-Paclitaxel conjugates with \(n=1,2,3,4,5\).
\(G\) \(s_{1}\) \(ISI(G)\) \(EISI(G)\)
\(n=1\) \(7.2712\) \(111.6166\) \(132.4624\)
\(n=2\) \(7.2712\) \(225.3833\) \(263.1968\)
\(n=3\) \(7.2712\) \(339.15\) \(395.397\)
\(n=4\) \(7.2712\) \(452.9166\) \(535.8942\)
\(n=5\) \(7.2712\) \(566.6833\) \(667.5636\)

The graphical representation of these results was obtained with the Microsoft office excel program. Figure 4 shows a diagram of the data of Table 1. It seems that the inverse sum indeg index from the data of Table 1 and Theorem 3 is an asymptotic line. An interval for the energy is obtained in Theorem 5 when the eigenvalues for the \(EISI \) value of the Hyaluronic Acid-Paclitaxel conjugates are difficult to calculate as \(n\) units increased. From this interval and the data in Table 1, we conjecture that the energy probably will be tended to line, asymptotically. Our calculations suggest that the inverse sum indeg energy of the Hyaluronic Acid-Paclitaxel conjugates can be evaluated by \(EISI(G)=139.29n-3.9671 \) from Table 1. It was found that the inverse indeg energy and \(ISI\) index of the Hyaluronic Acid-Paclitaxel conjugates increase with increasing of \(n\) unit.

Figure 4. The diagram of ISI and EISI of molecular graphs of the Hyaluronic Acid-Paclitaxel conjugates.

4. Conclusion

Studying the physicochemical properties of a molecule or molecular compound is not only time consuming but also a costly process. Therefore, mathematical chemistry focuses on topological indices. As the number of vertices of a molecular graph increases, it is difficult to obtain data and make calculations on it. In this case, computational and statistical methods become important for analyzing the behavior of the data. In this way, the desired values can become predictable without time-consuming experiments.

HA-PTX conjugates are popular lately, especially in drug manufacturing. Therefore, it has been considered necessary to calculate the topological indices of their molecular graphs in order to examine the physicochemical and biological properties of these molecules. This study mainly aims to compare the eigenvalue-based energy of HA-PTX conjugates in the light of molecular structural analysis with the degree-based index. The ISI index and ISI energy of molecular structures of HA-PTX conjugates are determined and compared. This study gives information about the energy levels of electrons and the strength of particles of the Hyaluronic Acid-paclitaxel conjugates. The results obtained in this study are thought to contribute to the applications in chemistry and pharmaceutical science in cancer treatment.

5. Appendix

The eigenvalues of HA-PTX conjugates with \(n=2,3,4,5\) are computed by the Matlab program and the results are given in Table 2, Table 3, Table 4 and Table 5, respectively.

Table 2. The positive eigenvalues of HA-PTX conjugates with \(n=2.\).
\(7.2712\), \(7.2712\),\(4.0449\), 4.0449, 3.5368, 3.5368, 3.3203, 3.2340, 3.1426,3.0898,
3.0384, 3.0148, 2.9687, 2.9688, 2.6823, 2.6823, 2.5252, 2.5252, 2.3740,2.3682,
2.3034, 2.2737, 2.2207, 2.1453, 2.0642, 2.0282, 1.9172, 1.8465,1.8384,1.7997,
1.7283, 1.7280, 1.6224, 1.6222, 1.6179, 1.1615, 1.6016, 1.6016, 1.1605,1.5699,
1.5699, 1.4813, 1.4667, 1.4599, 1.4310, 1.2676, 1.0594, 1.0524, 1, 1, 1, 1,1, 1,
0.9907, 0.9905, 0.8445, 0.8337, 0.8064, 0.8015, 0.6180, 0.6178, 0.4917,0.4467,
0.3976, 0.3781, 0.3583, 0.3579, 0.3138, 0.2971, 0.2926, 0.2290, 0.2129,0.2128,
0.1792, 0.1792, 0.1272, 0.1264, 0.0784
Table 3. The positive eigenvalues of HA-PTX conjugates with \(n=3 \).
\(7.2712\), \(7.2712\), \(7.2712\), \(4.0449\), \(4.0449\), \(4.0449\), \(3.5368\), \( 3.5368 \), \(3.5368\), \(3.3303\),
\(3.2944\), \(3.2351\), \(3.1612\), \(3.1255\), \(3.0897\), \(3.0481\), \(3.0286\), \(3.0154\), 2.9688, 2.9688,
2.9687, 2.6823, 2.6823, 2.6823, 2.3796, 2.3705, 2.3683, 2.3126, 2.2738,2.2914,
2.5252, 2.5252, 2.5252, 2.2207, 2.1869, 2.1447, 2.0888, 2.0474, 2.0280,1.9370,
1.8991, 1.8466, 1.8391, 1.8378, 1.8002, 1.7285, 1.7283, 1.7280, 1.6823,1.6222,
1.6222, 1.6222, 1.6016, 1.6016, 1.6016, 1.5792, 1.5699, 1.5699,1.5699,1.4813,
1.4668, 1.4666, 1.4599, \(1.4318+0.0034i\), 1.4318-0.0034i, 1.1618,1.1610,1.1605,
1.2676, 1.0524, 1.0613, 1.0569, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0.9908, 0.9907,0.9905,
0.8488, 0.8400, 0.8353, 0.8084, 0.8047, 0.8015, 0.6181, 0.6180, 0.6178,0.5062,
0.4768, 0.4466, 0.4011, 0.3926, 0.3780, 0.3584, 0.3582, 0.3579, 0.3208,0.3067,
0.2971, 0.2936, 0.2912, 0.2290, 0.2129, 0.2129,0.2128, 0.1792, 0.1792,0.1792,
0.1273, 0.1271, 0.1264, 0.0796, 0.0764
Table 4. The positive eigenvalues of HA-PTX conjugates with \(n=4.\) .
\(7.2712\), \(7.2712\), \(7.2712\), \(7.2712\), \(4.0449\), \(4.0449\), \(4.0449\), \( 4.0449 \), \(3.5368\), \(3.5368\),
\(3.5368\), \(3.5368\), \(3.3422\), \(3.3237\), \(3.2818\), \(3.2364\), \(3.1881\), \(3.1473\), \(3.1200 \), \(3.0899\),
\(3.0515 \), \(3.0406\), \(3.0242\), \(3.0176\), \(2.9688\), \(2.9688\), \(2.9687\), \( 2.9687\), \(2.6823\), \(2.6823 \),
\(2.6823\), \(2.6823\), \(2.5252\), \(2.5252 \), \(2.5252\), \(2.5252\), \(2.3833\), \( 2.3747\), \(2.3695\), \(2.3684\),
\(2.3172\), \(2.3042\), \(2.2878\), \(2.2738\), \(2.2207\), \(2.2160\), \(2.1868 \), \( 2.1453\), \(2.0981\), \(2.0660\),
\(2.0403\), \(2.0284\), \(1.9415\), \(1.9216\), \(1.8852\), \(1.8467\), \(1.8392\), \(1.8388\), \(1.8371\), \(1.8013 \),
\(1.7294\), \(1.7283\), \(1.7283\), \(1.7280\), \(1.7155\), \(1.6249\), \(1.6222\), \(1.6222\), \(1.6222\), \(1.6217\),
\(1.6016\), \(1.6016\), \(1.6016 \), \(1.6016\), \(1.5699\), \(1.5699\), \(1.5699\), \( 1.5699\), \(1.5664\), \(1.4813\),
\(1.4674\), \(1.4668\), \(1.4666\), \(1.4599\), \(1.4426\), \(1.4295+0.0034i\), \( 1.4295-0.0034i\),
\(1.2683\), \(1.1620\),\(1.1615\), \(1.1608\), \(1.1605\), \(1.0626\), \(1.0598\), \(1.0563\) , \(1.0524\), \(1\), \(1\), \(1\),
\(1\), \(1\), \(1\), \(1\), \(1\), \(1\), \(1\), \(1\), \(1\), \(0.9908\), \(0.9907\), \(0.9906\), \( 0.9905\), \(0.8493\), \(0.8449\), \(0.8380\),
\(0.8350\), \(0.8096 \), \(0.8064\), \(0.8036\), \(0.8015\), \(0.6182\), \(0.6178\), \( 0.6180\), \(0.6180\), \(0.5113\),
\(0.4908\), \(0.4706\), \(0.4466\), \(0.4018\), \(0.3974 \), \(0.3896\), \(0.3779\), \( 0.3584\), \(0.3583\), \(0.3582\),
\(0.3579\),\(0.3230\), \(0.3125\), \(0.3040\), \(0.2970\), \(0.2940\), \(0.2920\), \(0.2907\), \(0.2290\), \(0.2129\),
\(0.2129\), \(0.2129\), \(0.2128\), \(0.1792\), \(0.1792\), \(0.1792\), \(0.1792\), \(0.1273\), \(0.1272\), \(0.1271\),
\(0.1264 \), \(0.0797\), \(0.0770\), \(0.0755\)
Table 1. The positive eigenvalues of HA-PTX conjugates with \(n=5.\)
\(7.2712\), \(7.2712\), \(7.2712\), \(7.2712\), \(7.2712\), \(4.0449\), \(4.0449\), \( 4.0449 \), \(4.0449\), \(4.0449\),
\(3.5368\), \(3.5368\), \(3.5368\), \(3.5368\), \(3.5368\), \(3.3505\), \(3.3305\), \(3.3141\), \(3.2759\), \(3.2373 \),
\(3.2040\), \(3.1608\), \(3.1404\), \(3.1190\), \(3.0899\), \(3.0527\), \(3.0464\), \(3.0362\), \(3.0222\), \(3.0185\),
\(2.9687\), \(2.9687 \), \(2.9688\), \(2.9688\), \(2.9688\), \(2.6823\), \(2.6823\), \( 2.6823\), \(2.6823\), \(2.6823\),
\(2.3859\), \(2.3780\), \(2.3722\), \(2.3684 \), \(2.3691\), \(2.3203\), \(2.3103\), \( 2.2738\), \(2.2971\), \(2.2864\),
\(2.2207\), \(2.5252\), \(2.5252\), \(2.5252\), \(2.5252\), \(2.5252 \), \(2.2158\), \( 2.2161\), \(2.1868\), \(2.1453\),
\(2.1011\), \(2.0804\),\(2.0556\), \(2.0366\), \(2.0287\), \(1.9428\), \(1.9324\), \(1.9106\) , \(1.8749\), \(1.8468\),
\(1.8392\), \(1.8390\), \(1.8384\), \(1.8361\), \(1.8021\), \(1.7377\), \(1.7284\), \(1.7283\), \(1.7283\), \(1.7280 \),
\(1.7264\), \(1.6591\), \(1.6222\), \(1.6222\), \(1.6222\), \(1.6222\), \(1.6221\), \(1.6016\), \(1.6016\), \(1.6016\),
\(1.6016\), \(1.6016 \), \(1.5979\), \(1.5699\), \(1.5699\), \(1.5699,\) \(1.5699\), \( 1.5699\), \(1.5610\), \(1.4813\),
\(1.4675\), \(1.4673\), \(1.4668\), \(1.4666 \), \(1.4599\), \(1.4450\), \(1.4375\),1.4290+0.0028i,
1.4290-0.0028i,1.2683,1.1623,1.1617,1.1612,1.1608,1.1605,1.0637, \(1.0610\),\( 1.0585\),
\(1.0561\),\(1.0524\),\(1,1,1,1,1,1,1,1,\) 1,1,1,1,1,1,1, 0.9908,0.9908, 0.9907,\( 0.9906\),
\(0.9905\),0.8495,0.8470,0.8419,0.8371,0.8347,0.8104,0.8075,0.8051,0.8031,0.8015,
0.6182, 0.6181 , \(0.6180\), \(0.6179\), \(0.6178\), \(0.5138\), \(0.4996\), \(0.4814\),\(0.4677\), \(0.4466 \),
\(0.4021\), \(0.3995\), \(0.3944\), \(0.3878\), \(0.3779\), \(0.3584\), \(0.3584\), \(0.3583\), \(0.3581\), \(0.3579\),
\(0.3239\), \(0.3165 \), \(0.3084\), \(0.3025\), \(0.2970\), \(0.2943\), 0.2927, 0.2913,0.2906, 0.2290,
0.2129, 0.2129, 0.2129, 0.2129, 0.2128, 0.1792, 0.1792, 0.1792, 0.1792,0.1792,
0.1273, 0.1272, 0.1271, 0.1270, 0.1264, 0.0797, 0.0774, 0.0763, 0.0749

Conflicts of Interest

The author declares no conflict of interest.

Acknowledgments

The author is deeply thankful to the editor and the reviewers for their valuable suggestions to improve the quality of this manuscript.

References

  1. Lesniak, L., & Chartrand, G. (2005). Graphs and Digraphs. London: Chapman and Hall/CRC.[Google Scholor]
  2. Chu, Z. Q., Nazeer, S., Zia, T. J., Ahmed, I., & Shahid, S. (2019). Some new results on various graph energies of the splitting graph. Journal of Chemistry, 2019, Article ID 7214047. https://doi.org/10.1155/2019/7214047. [Google Scholor]
  3. Ghorbani, M., & Ghazi, M. (2010). Computing some topological indices of triangular benzenoid. Digest Journal of Nanomaterials and Biostructures, 5(4), 1107-1111. [Google Scholor]
  4. Havare, O. C. (2019). QSPR Analysis with Curvilinear Regression Modeling and Topological Indices. Iranian Journal of Mathematical Chemistry, 10(4), 331-341. [Google Scholor]
  5. Shafiei, F. (2015). Relationship between topological indices and thermodynamic properties and of the monocarboxylic acids applications in QSPR. Iranian Journal of Mathematical Chemistry, 6(1), 15-28. [Google Scholor]
  6. Vukicevic, D. (2011). Bond additive modeling 4. QSPR and QSAR studies of the variable adriatic indices. Croatica Chemica Acta, 84, 87-91. [Google Scholor]
  7. Wiener, H. (1947). Structural determination of paraffin boiling points. Journal of the American Chemical Society, 69(1), 17-20. [Google Scholor]
  8. Jahanbani, A., Shao, Z., & Sheikholeslami, S. M. (2021). Calculating degree based multiplicative topological indices of Hyaluronic Acid-Paclitaxel conjugates' molecular structure in cancer treatment. Journal of Biomolecular Structure and Dynamics, 39(14), 5304-5313. [Google Scholor]
  9. Arpicco, S., Milla, P., Stella, B., & Dosio, F. (2014). Hyaluronic acid conjugates as vectors for the active targeting of drugs, genes and nanocomposites in cancer treatment. Molecules, 19(3), 3193-3230. [Google Scholor]
  10. Dosio, F., Arpicco, S., Stella, B., & Fattal, E. (2016). Hyaluronic acid for anticancer drug and nucleic acid delivery. Advanced Drug Delivery Reviews, 97, 204-236. [Google Scholor]
  11. Leonelli, F., La Bella, A., Migneco, L. M., & Bettolo, R. M. (2008). Design, synthesis and applications of hyaluronic acid -paclitaxel bioconjugates. Molecules, 13(2), 360-378. [Google Scholor]
  12. Yoon, S. J., Fang, Y. H., Lim, C. H., Kim, B. S., Son, H. S., Park, Y., & Sun, K. (2009). Regeneration of ischemic heart using hyaluronic acid-based injectable hydrogel. Journal of Biomedical Materials Research Part B: Applied Biomaterials, 91(1), 163-171. [Google Scholor]
  13. Wang, J., Wang, Y., Wang, Y., & Zheng, L. (2020). Computation on the topological indices of hyaluronic acid. Journal of Applied Analysis & Computation, 10(3), 1193-1198. [Google Scholor]
  14. Zheng, L., Wang, Y., & Gao, W. (2019). Topological Indices of Hyaluronic Acid-Paclitaxel Conjugates’ Molecular Structure in Cancer Treatment. Open Chemistry, 17(1), 81-87. [Google Scholor]
  15. Imran, M., Bokhary, S. A. U. H., Manzoor, S., & Siddiqui, M. K. (2020). On molecular topological descriptors of certain families of nanostar dendrimers. Eurasian Chemical Communications, 2(6), 680-687. [Google Scholor]
  16. Ashrafi, A. R. (2010). Experimental results on the energy and Estrada index of HC5C7 [4p, 8] nanotubes. Optoelectronics and Advanced Materials-Rapid Communications, 4(January 2010), 48-49. [Google Scholor]
  17. Ahmad, Z., Mufti, Z. S., Nadeem, M. F., Shaker, H., & Siddiqui, H. M. A. (2021). Theoretical study of energy, inertia and nullity of phenylene and anthracene. Open Chemistry, 19(1), 541-547. [Google Scholor]
  18. Nadeem, M. F., Imran, M., Siddiqui, H. M. A., Azeem, M., Khalil, A., & Ali, Y. (2021). Topological aspects of metal-organic structure with the help of underlying networks. Arabian Journal of Chemistry, 14(6), 103157. https://doi.org/10.1016/j.arabjc.2021.103157. [Google Scholor]
  19. Bakhshi, K., & Mojallal, S. A. (2013). Relation between topological indices and exchange -correlation energy for Graphene Nanosurface: A DFT study. Fullerenes, Nanotubes and Carbon Nanostructures, 21(7), 617-623. [Google Scholor]
  20. Malik, M. A., & Farooq, R. (2015). Computational results on the energy and Estrada index of TUC4C8 (R)[m, n] nanotubes. Optoelectronics and Advanced Materials -Rapid Communications, 9(1-2), 311-313. [Google Scholor]
  21. Hayat, S., Imran, M., & Liu, J. B. (2019). Correlation between the Estrada index and \(\pi-\)electronic energies for benzenoid hydrocarbons with applications to boron nanotubes. International Journal of Quantum Chemistry, 119(23), e26016. [Google Scholor]
  22. Kulli, V. R. (2019). On hyper KV and square KV indices and their polynomials of certain families of dendrimers. Journal of Computer and Mathematical Sciences, 10(2), 279-286. [Google Scholor]
  23. Ediz, S. (2013). The Ediz eccentric connectivity index of one pentagonal carbon nanocones. Fullerenes, Nanotubes and Carbon Nanostructures, 21(2), 113-116. [Google Scholor]
  24. Nadeem, M. F., Azeem, M., & Farman, I. (2021). Comparative study of topological indices for Capped and Uncapped Carbon Nanotubes. Polycyclic Aromatic Compounds, https://doi.org/10.1080/10406638.2021.1890625. [Google Scholor]
  25. Koorepazan-Moftakhar, F., Ori, O., & Ashrafi, A. R. (2019). Symmetry-based invariants of nanostructures and their effect on edge states of carbon nanotubes. Fullerenes, Nanotubes and Carbon Nanostructures, 27(3), 215-224. [Google Scholor]
  26. Gutman, I., & Trinajstic, N. (1972). Graph theory and molecular orbitals. Total \(\phi-\)electron energy of alternant hydrocarbons. Chemical Physics Letters, 17(4), 535-538. [Google Scholor]
  27. Vukicevic, D., & Gašperov, M. (2010). Bond additive modeling 1. Adriatic indices. Croata Chemica Acta, 83, 243-260. [Google Scholor]
  28. Das, K. C., Gutman, I., Milovanovic, I., Milovanovic, E., Furtula, B. (2018). Degree -based energies of graphs. Linear Algebra and its Applications, 554, 185-204. [Google Scholor]
  29. Zangi, S., Ghorbani, M., & Eslampour, M. (2018). On the eigenvalues of some matrices based on vertex Degree. Iranian Journal of Mathematical Chemistry, 9(2), 149-156. [Google Scholor]
  30. Guo, J. M., Wang, Z. W., & Li, X. (2019). Sharp upper bounds of the spectral radius of a graph. Discrete Mathematics, 342(9), 2559-2563. [Google Scholor]
  31. Horn R. A., & Johnson, C. R. (2013). Matrix Analysis, 2nd ed. Cambridge University Press. [Google Scholor]
  32. Sedlar, J., Stevanovic, D., & Vasilyev, A. (2015). On the inverse sum indeg index. Discrete Applied Mathematics, 184, 202-212. [Google Scholor]
  33. Lokesha, V., Deepika, T., & Cangul, I. N. (2017). Symmetric division deg and inverse sum indeg indices of Polycyclic Aromatic Hydrocarbons (PAHs) and Polyhex Nanotubes. Southeast Asian Bulletin of Mathematics, 41(5), 707-715. [Google Scholor]
  34. Nezhad, F. F., & Azari, M. (2016). The inverse sum indeg index of some nanotubes. Studia Universitatis Babes -Bolyai, Chemia, 61(1), 63-70. [Google Scholor]
  35. Chen, H., & Deng, H. (2018). The inverse sum indeg index of graphs with some given parameters. Discrete Mathematics, Algorithms and Applications, 10(1), 1850006. https://doi.org/10.1142/S1793830918500064. [Google Scholor]
  36. Hafeez, S., & Farooq, R. (2019). Inverse sum indeg energy of graphs. IEEE Access, 7, 100860-100866. [Google Scholor]
]]>
Degree-based topological indices of product graphs https://old.pisrt.org/psr-press/journals/odam-vol-4-issue-3-2021/degree-based-topological-indices-of-product-graphs/ Sun, 31 Oct 2021 19:35:00 +0000 https://old.pisrt.org/?p=6050
ODAM-Vol. 4 (2021), Issue 3, pp. 60 - 71 Open Access Full-Text PDF
Xiaojing Wang, Zhen Lin, Lianying Miao
Abstract:In this paper, we obtain the quantitative calculation formula of the degree-based topological indices of four standard product for the path and regular graphs, which unify to solve the question on product of these basic graphs without having to deal with it one by one separately. As applications, we give corresponding calculation formula of the general Randić index, the first general Zagreb index and the general sum-connectivity index.
]]>

Open Journal of Discrete Applied Mathematics

Degree-based topological indices of product graphs

Xiaojing Wang, Zhen Lin\(^1\), Lianying Miao
School of Mathematics, China University of Mining and Technology, Xuzhou, 221116, Jiangsu, P.R. China.; (X.W & L.M)
School of Mathematics and Statistics, Qinghai Normal University, Xining, 810008, Qinghai, P.R. China.; (Z.L)
\(^{1}\)Corresponding Author: lnlinzhen@163.com

Abstract

In this paper, we obtain the quantitative calculation formula of the degree-based topological indices of four standard product for the path and regular graphs, which unify to solve the question on product of these basic graphs without having to deal with it one by one separately. As applications, we give corresponding calculation formula of the general Randić index, the first general Zagreb index and the general sum-connectivity index.

Keywords:

Degree-based topological indices; Cartesian product; Direct product; Strong product; Lexicographic product.

1. Introduction

Throughout the article, \(G\) is a simple undirected connected graph with vertex set \(V\left(G\right)\) and edge set \(E\left(G\right)\). The number of vertices and edges of \(G\) is called order and size, respectively. If the vertices \(u\) and \(v\) are adjacent, then we write \(u\sim v\). For \(v\in V\left(G\right)\), \(d_v=d_G\left(v\right)\) denotes the degree of vertex \(v\) in \(G\). Denote by \(P_n\) and \(K_{1,\,n-1}\) the path and star with \(n\) vertices, respectively.

Cheminformatics is a new interdiscipline composed of chemistry, mathematics and information science, which contributes a major role in the field of chemical sciences by implementing graph theory to mathematical modeling of chemical occurrence. In cheminformatics, the topological indices play a significant role in predicting the biological activities and properties of chemical compounds due to the fact that the numerical characteristics of topological indices reflect certain physico-chemical properties of chemical compounds, such as boiling point, stability, strain energy etc. A large number of topological indices have been studied in the models of Quantitative structure-activity relationships (QSAR) and structure-property relationships (QSPR), such as Wiener index, Randic index, Zagreb index, ABC index and so on.

The study on degree-based topological indices has been one of the hotspots in cheminformatics [1]. Let \(K=\{\left(i,\,j\right) \in \mathbb{N} \times \mathbb{N}: 1\leq i\leq j \leq n-1\}\) and \(m_{i,\, j}=m_{i,\, j}\left(G\right)\) be the number of edges in \(G\) joining vertices of degree \(i\) and \(j\). For any set of numbers \(\{\varphi_{i,\,j }\}_{\left(i,\, j\right)\in K}\), the general formula of degree-based topological indices is \[DTI\left(G\right)=\sum\limits_{\left(i,\, j\right)\in K}m_{i,\,j}\left(G\right)\varphi_{i,\,j}.\] In particular, we obtain the first Zagreb index and the second Zagreb index when \(\varphi_{i,\,j}=i+j\) and \(\varphi_{i,\,j}=ij\), respectively.

In 1998, the general Randic index of a graph \(G\), introduced by Bollobás and Erdos [2], is defined as \[R^{t}=R^{t}\left(G\right)=\sum\limits_{v_iv_j\in E\left(G\right)}\left(d_id_j\right)^t, \quad t\in \mathbb{R}.\] Clearly, we have that \(R^{0}\) is the number of edges, \(R^{-\frac{1}{2}}\) is the Randic index [3], \(R^{-1}\) is the modified second Zagreb index [3], \(R^{\frac{1}{2}}\) is the reciprocal Randic index [4], \(R^{2}\) is the second Hyper-Zagreb index [4], \(R^{1}\) is the second Zagreb index [5], etc.

In 2005, the first general Zagreb index of a graph \(G\) was introduced by Li and Zheng [6] and is defined as \[Z^{t}=Z^{t}\left(G\right)=\sum\limits_{v_i\in V\left(G\right)}d_i^t=\sum\limits_{v_iv_j\in E\left(G\right)}\left(d_i^{t-1}+d_j^{t-1}\right), \quad t\in \mathbb{R}.\] It is easy to see that \(Z^{0}\) is the number of vertices, \(Z^{1}\) is twice the number of edges, \(Z^{2}\) is the first Zagreb index [5], \(Z^{3}\) is the forgotten topological index [7], etc.

In 2010, Zhou and Trinajstic [8] proposed the general sum-connectivity index of a graph \(G\) as follows: \[\chi^{t}=\chi^{t}\left(G\right)=\sum\limits_{v_iv_j\in E\left(G\right)}\left(d_i+d_j\right)^t, \quad t\in \mathbb{R}.\] It is not difficult to find that \(2\chi^{-1}\) is the harmonic index [9], \(\chi^{-\frac{1}{2}}\) is the sum-connectivity index [10], \(\chi^{\frac{1}{2}}\) is the reciprocal sum-connectivity index [11], etc.

The product graphs are useful in constructing many important structural models with regularities [12], especially the following four standard product graphs which are widely used in network design [13], multiprocessor system [14], automata theory [15] and other fields. Let \(G_1\) and \(G_2\) be two graphs with disjoint vertex sets \(\{u_1, \ldots, u_m\}\) and \(\{v_1,\ldots, v_n\}\), respectively. The Cartesian product of \(G_{1}\) and \(G_{2}\), denoted by \(G_1\Box G_2\) is the graph, where \(\left(u_i, v_j\right)\sim \left(u_r, v_s\right)\) if either (\(u_i = u_r\) and \(v_j\sim v_s\) in \(G_2\)) or (\(u_i\sim u_r\) in \(G_1\) and \(v_j = v_s\)). The direct product or Kronecker product of \(G_1\) and \(G_2\), denoted by \(G_1\otimes G_2\), is the graph where \(\left(u_i, v_j\right)\sim \left(u_r, v_s\right)\) if \(u_i\sim u_r\) in \(G_1\) and \(v_j\sim v_s\) in \(G_2\). The strong product of \(G_{1}\) and \(G_{2}\), denoted by \(G_{1}\boxtimes G_{2}\), is graph where \(\left(u_{i},u_{j}\right)\sim\left(u_{r},u_{s}\right)\) if either (\(u_{i}=u_{r}\) and \(u_{j}\sim u_{s}\) in \(G_{2}\)) or (\(u_{i}\sim u_{r}\) in \(G_{1}\) and \(u_{j}=u_{s}\)) or (\(u_{i}\sim u_{r}\) in \(G_{1}\) and \(u_{j}\sim u_{s}\) in \(G_{2}\)). The lexicographic product of \(G_{1}\) and \(G_{2}\), denoted by \(G_1[G_2]\), is the graph where \(\left(u_i, v_j\right)\sim\left(u_r, v_s\right)\) if either (\(u_i\sim u_r\) in \(G_1\)) or (\(u_i = u_r\) and \(v_j\sim v_s\) in \(G_2\)).

In this paper, we give a unified approach to solve the computational problems of degree-based topological indices of standard product graphs for the path and regular graphs, which is generalization of many specific degree-based topological indices. As applications, the corresponding calculation formulas of the general Randic index, the first general Zagreb index and the general sum-connectivity index are obtained.

2. Cartesian product

Theorem 1. Let \(P_{n_{1}}\) and \(P_{n_{2}}\) be two path graphs of order \(n_{1}\) and \(n_{2}\), respectively. Then \[DTI\left(P_{n_{1}}\Box P_{n_{2}}\right) = 8\varphi_{2,3}+2\left(n_{1}+n_{2}-6\right)\varphi_{3,3}+2\left(n_{1}+n_{2}-4\right)\varphi_{3,4} +\left(2n_{1}n_{2}-5n_{1}-5n_{2}+12\right)\varphi_{4,4}\] for \(n_{1}\geq n_{2}\geq3\).

Proof. By the definition of Cartesian product, we obtain the basic information on \(P_{n_{1}}\Box P_{n_{2}}\) in the Table 1.

Table 1.The basic information on \(P_{n_{1}}\Box P_{n_{2}}\).
\(m_{2,3}\) \(m_{3,3}\) \(m_{3,4}\) \(m_{4,4}\)
\(8\) \(2\left(n_{1}+n_{2}-6\right)\) \(2\left(n_{1}+n_{2}-4\right)\) \(2n_{1}n_{2}-5n_{1}-5n_{2}+12\)

Thus we have

\[ DTI\left(P_{n_{1}}\Box P_{n_{2}}\right) = \sum\limits_{\left(i,\, j\right)\in K}m_{i,\,j}\left(G\right)\varphi_{i,\,j} =8\varphi_{2,3}+2\left(n_{1}+n_{2}-6\right)\varphi_{3,3}+2\left(n_{1}+n_{2}-4\right)\varphi_{3,4} +\left(2n_{1}n_{2}-5n_{1}-5n_{2}+12\right)\varphi_{4,4}. \] This completes the proof.

Corollary 1. Let \(P_{n_{1}}\) and \(P_{n_{2}}\) be two path graphs of order \(n_{1}\) and \(n_{2}\), respectively. Then \begin{align*} R^{t}\left(P_{n_{1}}\Box P_{n_{2}}\right) & = 8\cdot6^{t}+2\cdot9^{t}\left(n_{1}+n_{2}-6\right)+2\cdot12^{t}\left(n_{1}+n_{2}-4\right) +16^{t}\left(2n_{1}n_{2}-5n_{1}-5n_{2}+12\right),\\ Z^{t}\left(P_{n_{1}}\Box P_{n_{2}}\right) & = 8\left(2^{t-1}+3^{t-1}\right)+4\cdot 3^{t-1}\left(n_{1}+n_{2}-6\right)+2\left(n_{1}+n_{2}-4\right)\left(3^{t-1}+4^{t-1}\right) +2\cdot4^{t-1}\left(2n_{1}n_{2}-5n_{1}-5n_{2}+12\right),\end{align*}\begin{align*} \chi^{t}\left(P_{n_{1}}\Box P_{n_{2}}\right) & = 8\cdot5^{t}+2\cdot 6^{t}\left(n_{1}+n_{2}-6\right)+2\cdot7^{t}\left(n_{1}+n_{2}-4\right) +8^{t}\left(2n_{1}n_{2}-5n_{1}-5n_{2}+12\right)\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\; \end{align*} for \(n_{1}\geq n_{2}\geq3\).

Theorem 2. Let \(P_{n_{1}}\) and \(G_{r}\) be a path and a \(r\)-regular graph of order \(n_{1}\) and \(n_{2}\), respectively. Then \[ DTI\left(P_{n_{1}}\Box G_{r}\right) = rn_{2}\varphi_{r+1,r+1}+ 2n_{2}\varphi_{r+1,r+2}+\frac{1}{2}[rn_{2}\left(n_{1}-2\right)+2n_{1}n_{2}-6n_{2}]\varphi_{r+2,r+2} \] for \(n_{1}\geq n_{2}\geq2\).

Proof. By the definition of Cartesian product, we obtain the basic information on \(P_{n_{1}}\Box G_{r}\) in the following Table 2.

Table 2. The basic information on \(P_{n_{1}}\Box G_{r}\).
\(m_{r+1,r+1}\) \(m_{r+1,r+2}\) \(m_{r+2,r+2}\)
\(rn_{2}\) \(2n_{2}\) \(\dfrac{rn_{2}\left(n_{1}-2\right)}{2}+n_{1}n_{2}-3n_{2}\)

Thus we have

\[DTI\left(P_{n_{1}}\Box G_{r}\right) = \sum\limits_{\left(i,\, j\right)\in K}m_{i,\,j}\left(G\right)\varphi_{i,\,j} = rn_{2}\varphi_{r+1,r+1}+ 2n_{2}\varphi_{r+1,r+2}+\frac{1}{2}[rn_{2}\left(n_{1}-2\right)+2n_{1}n_{2}-6n_{2}]\varphi_{r+2,r+2}.\] This completes the proof.

Corollary 2. Let \(P_{n_{1}}\) and \(G_{r}\) be a path and a \(r\)-regular graph of order \(n_{1}\) and \(n_{2}\), respectively. Then \begin{align*} R^{t}\left(P_{n_{1}}\Box G_{r}\right) & = rn_{2}\left(r+1\right)^{2t}+ 2n_{2}\left(r+1\right)^{t}\left(r+2\right)^{t}+\left[\dfrac{rn_{2}\left(n_{1}-2\right)}{2}+n_{2}\left(n_{1}-3\right)\right]\left(r+2\right)^{2t},\\ Z^{t}\left(P_{n_{1}}\Box G_{r}\right) & = 2rn_{2}\left(r+1\right)^{t-1}+ 2n_{2}\left[\left(r+1\right)^{t-1}+\left(r+2\right)^{t-1}\right] +2\left(r+2\right)^{t-1}\left[\dfrac{rn_{2}\left(n_{1}-2\right)}{2}+n_{2}\left(n_{1}-3\right)\right],\\ \chi^{t}\left(P_{n_{1}}\Box G_{r}\right) & = 2^{t}rn_{2}\left(r+1\right)^{t}+ 2n_{2}\left(2r+3\right)^{t}+2^{t}\left(r+2\right)^{t}\left[\dfrac{rn_{2}\left(n_{1}-2\right)}{2}+n_{2}\left(n_{1}-3\right)\right] \end{align*} for \(n_{1}\geq n_{2}\geq2\).

Theorem 3. Let \(G_{r}\) and \(P_{n_{2}}\) be a \(r\)-regular and a path of order \(n_{1}\) and \(n_{2}\), respectively. Then \begin{eqnarray*} DTI\left(G_{r}\Box P_{n_{2}}\right) & = & rn_{1}\varphi_{r+1,r+1}+ 2n_{1}\varphi_{r+1,r+2}+ \frac{1}{2}\left[rn_{1}\left(n_{2}-2\right)+2n_{1}n_{2}-6n_{1}\right]\varphi_{r+2,r+2} \end{eqnarray*} for \(n_{1}\geq n_{2}\geq2\).

Proof. By the definition of Cartesian product, we obtain the basic information on \(G_{r}\Box P_{n_{2}}\) in the following Table 3.

Table 3.The basic information on \(G_{r}\Box P_{n_{2}}\).
\(m_{r+1,r+1}\) \(m_{r+1,r+2}\) \(m_{r+2,r+2}\)
\(rn_{1}\) \(2n_{1}\) \(\dfrac{rn_{1}\left(n_{2}-2\right)}{2}+n_{1}n_{2}-3n_{1}\)

Thus we have

\[DTI\left(G_{r}\Box P_{n_{2}}\right) = \sum\limits_{\left(i,\, j\right)\in K}m_{i,\,j}\left(G\right)\varphi_{i,\,j} = rn_{1}\varphi_{r+1,r+1}+ 2n_{1}\varphi_{r+1,r+2}+ \frac{1}{2}\left[rn_{1}\left(n_{2}-2\right)+2n_{1}n_{2}-6n_{1}\right]\varphi_{r+2,r+2}.\] This completes the proof.

Corollary 3. Let \(G_{r}\) and \(P_{n_{2}}\) be a \(r\)-regular and a path of order \(n_{1}\) and \(n_{2}\), respectively. Then \begin{align*} R^{t}\left(G_{r}\Box P_{n_{2}}\right) & = rn_{1}\left(r+1\right)^{2t}+ 2n_{1}\left(r+1\right)^{t}\left(r+2\right)^{t}+\left[\dfrac{rn_{1}\left(n_{2}-2\right)}{2}+n_{1}\left(n_{2}-3\right)\right] \left(r+2\right)^{2t},\\ Z^{t}\left(G_{r}\Box P_{n_{2}}\right) & = 2rn_{1}\left(r+1\right)^{t-1}+ 2n_{1}\left[\left(r+1\right)^{t-1}+\left(r+2\right)^{t-1}\right] +2\left(r+2\right)^{t-1}\left[\dfrac{rn_{1}\left(n_{2}-2\right)}{2}+n_{1}\left(n_{2}-3\right)\right],\\ \chi^{t}\left(G_{r}\Box P_{n_{2}}\right) & = 2^{t}rn_{1}\left(r+1\right)^{t}+ 2n_{1}\left(2r+3\right)^{t}+2^{t}\left(r+2\right)^{t}\left[\dfrac{rn_{1}\left(n_{2}-2\right)}{2}+n_{1}\left(n_{2}-3\right)\right] \end{align*} for \(n_{1}\geq n_{2}\geq2\).

Theorem 4. Let \(G_{1}\) and \(G_{2}\) be a \(r_{1}\)-regular graph and a \(r_{2}\)-regular graph with order \(n_{1}\) and \(n_{2}\), respectively. Then \begin{align*} DTI\left(G_{1}\Box G_{2}\right) = & \frac{n_{1}n_{2}\left(r_{1}+r_{2}\right)}{2}\varphi_{r_{1}+r_{2},r_{1}+r_{2}} \end{align*} for \(n_{1}\geq n_{2}\geq2\).

Proof. By the definition of Cartesian product, we have \(G_{1}\Box G_{2}\) is a \(\left(r_{1}+r_{2}\right)\)-regular graph with \(\frac{n_{1}n_{2}\left(r_{1}+r_{2}\right)}{2}\) edges. Thus \[DTI\left(G_{1}\Box G_{2}\right) = \sum\limits_{\left(i,\, j\right)\in K}m_{i,\,j}\left(G\right)\varphi_{i,\,j} = \frac{n_{1}n_{2}\left(r_{1}+r_{2}\right)}{2}\varphi_{r_{1}+r_{2},r_{1}+r_{2}}.\] This completes the proof.

Corollary 4. Let \(G_{1}\) and \(G_{2}\) be a \(r_{1}\)-regular graph and a \(r_{2}\)-regular graph with order \(n_{1}\) and \(n_{2}\), respectively. Then \begin{align*} R^{t}\left(G_{1}\Box G_{2}\right) & = \dfrac{n_{1}n_{2}\left(r_{1}+r_{2}\right)^{2t+1}}{2},\\ Z^{t}\left(G_{1}\Box G_{2}\right) & = n_{1}n_{2}\left(r_{1}+r_{2}\right)^{t},\\ \chi^{t}\left(G_{1}\Box G_{2}\right) & = 2^{t-1}n_{1}n_{2}\left(r_{1}+r_{2}\right)^{t+1} \end{align*} for \(n_{1}\geq n_{2}\geq2\).

3. Direct product

Theorem 5. Let \(P_{n_{1}}\) and \(P_{n_{2}}\) be two path graphs of order \(n_{1}\) and \(n_{2}\), respectively. Then \begin{align*} DTI\left(P_{n_{1}}\otimes P_{n_{2}}\right) & = 4\varphi_{1,4}+4\varphi_{2,2}+4\left(n_{1}+n_{2}-6\right)\varphi_{2,4}+2\left(n_{1}-3\right)\left(n_{2}-3\right)\varphi_{4,4} \end{align*} for \(n_{1}\geq n_{2}\geq3\).

Proof. By the definition of direct product, we obtain the basic information on \(P_{n_{1}}\otimes P_{n_{2}}\) in the following Table 4.

Table 4.The basic information on \(P_{n_{1}}\otimes P_{n_{2}}\) .
\(m_{1,4}\) \(m_{2,2}\) \(m_{2,4}\) \(m_{4,4}\)
\(4\) \(4\) \(4\left(n_{1}+n_{2}-6\right)\) \(2\left(n_{1}-3\right)\left(n_{2}-3\right)\)

Thus we have

\[ DTI\left(P_{n_{1}}\otimes P_{n_{2}}\right) = \sum\limits_{\left(i,\, j\right)\in K}m_{i,\,j}\left(G\right)\varphi_{i,\,j} = 4\varphi_{1,4}+4\varphi_{2,2}+4\left(n_{1}+n_{2}-6\right)\varphi_{2,4}+2\left(n_{1}-3\right)\left(n_{2}-3\right)\varphi_{4,4}. \] This completes the proof.

Corollary 5. Let \(P_{n_{1}}\) and \(P_{n_{2}}\) be two path graphs of order \(n_{1}\) and \(n_{2}\), respectively. Then \begin{align*} R^{t}\left(P_{n_{1}}\otimes P_{n_{2}}\right) = & 8\cdot4^{t}+2\cdot8^{t}\left(n_{1}n_{2}-n_{1}-n_{2}-3\right),\\ Z^{t}\left(P_{n_{1}}\otimes P_{n_{2}}\right) = & 4\left[1+2^{t}+\left(n_{1}+n_{2}-6\right)\left(2^{t-1}+4^{t-1}\right)\right]+4^{t}\left[1+\left(n_{1}-3\right)\left(n_{2}-3\right)\right],\\ \chi^{t}\left(P_{n_{1}}\otimes P_{n_{2}}\right) = & 4\left[4^{t}+5^{t}+6^{t}\left(n_{1}+n_{2}-6\right)\right]+2^{3t+1}\left(n_{1}-3\right)\left(n_{2}-3\right) \end{align*} for \(n_{1}\geq n_{2}\geq3\).

Theorem 6. Let \(P_{n_{1}}\) and \(G_{r}\) be a path and a \(r\)-regular of order \(n_{1}\) and \(n_{2}\), respectively. Then \begin{align*} DTI\left(P_{n_{1}}\otimes G_{r}\right) = & 2rn_{2}\varphi_{r,2r}+rn_{2}\left(n_{1}-3\right)\varphi_{2r,2r} \end{align*} for \(n_{1}\geq n_{2}\geq3\).

Proof. By the definition of direct product, we obtain the basic information on \(P_{n_{1}}\otimes G_{r}\) in the following Table 5.

Table 5.The basic information on \(P_{n_{1}}\otimes G_{r}\) .
\(m_{r,2r}\) \(m_{2r,2r}\)
\(2rn_{2}\) \(rn_{2}\left(n_{1}-3\right)\)

Thus we have

\[DTI\left(P_{n_{1}}\otimes G_{r}\right) = \sum\limits_{\left(i,\, j\right)\in K}m_{i,\,j}\left(G\right)\varphi_{i,\,j}= 2rn_{2}\varphi_{r,2r}+rn_{2}\left(n_{1}-3\right)\varphi_{2r,2r}.\] This completes the proof.

Corollary 6. Let \(P_{n_{1}}\) and \(G_{r}\) be a path and a \(r\)-regular of order \(n_{1}\) and \(n_{2}\), respectively. Then \begin{align*} R^{t}\left(P_{n_{1}}\otimes G_{r}\right) = & 2^{t+1}r^{2t+1}n_{2}+2^{2t}r^{2t+1}n_{2}\left(n_{1}-3\right),\\ Z^{t}\left(P_{n_{1}}\otimes G_{r}\right) = & \left(2+2^{t}\right)r^{t}n_{2}+2^{t}r^{t}n_{2}\left(n_{1}-3\right),\\ \chi^{t}\left(P_{n_{1}}\otimes G_{r}\right) = & 2n_{2}\cdot3^{t}\cdot r^{t+1}+4^{t}r^{t+1}n_{2}\left(n_{1}-3\right) \end{align*} for \(n_{1}\geq n_{2}\geq3\).

Theorem 7. Let \(G_{r}\) and \(P_{n_{2}}\) be a \(r\)-regular and a path of order \(n_{1}\) and \(n_{2}\), respectively. Then \[DTI\left(G_{r}\otimes P_{n_{2}}\right) = 2rn_{1}\varphi_{r,2r}+rn_{1}\left(n_{2}-3\right)\varphi_{2r,2r}\] for \(n_{1}\geq n_{2}\geq3\).

Proof. By the definition of direct product, we obtain the basic information on \(G_{r}\otimes P_{n_{2}}\) in the following Table 6.

Table 6.The basic information on \(G_{r}\otimes P_{n_{2}}\) .
\(m_{r,2r}\) \(m_{2r,2r}\)
\(2rn_{1}\) \(rn_{1}\left(n_{2}-3\right)\)

Thus we have

\[DTI\left(G_{r}\otimes P_{n_{2}}\right) = \sum\limits_{\left(i,\, j\right)\in K}m_{i,\,j}\left(G\right)\varphi_{i,\,j}= 2rn_{1}\varphi_{r,2r}+rn_{1}\left(n_{2}-3\right)\varphi_{2r,2r}.\] This completes the proof.

Corollary 7. Let \(G_{r}\) and \(P_{n_{2}}\) be a \(r\)-regular and a path of order \(n_{1}\) and \(n_{2}\), respectively. Then \begin{align*} R^{t}\left(G_{r}\otimes P_{n_{2}}\right) = & 2^{t+1}r^{2t+1}n_{1}+2^{2t}r^{2t+1}n_{1}\left(n_{2}-3\right),\\ Z^{t}\left(G_{r}\otimes P_{n_{2}}\right) = & r^{t}n_{1}\left(2+2^{t}\right)+2^{t}r^{t}n_{1}\left(n_{2}-3\right),\\ \chi^{t}\left(G_{r}\otimes P_{n_{2}}\right) = & 2\cdot3^{t}\cdot r^{t+1}n_{1}+4^{t}r^{t+1}n_{1}\left(n_{2}-3\right) \end{align*} for \(n_{1}\geq n_{2}\geq3\).

Theorem 8. Let \(G_{1}\) and \(G_{2}\) be a \(r_{1}\)-regular graph and a \(r_{2}\)-regular graph with order \(n_{1}\) and \(n_{2}\), respectively. Then \[DTI\left(G_{1}\otimes G_{2}\right)=\frac{r_{1}r_{2}n_{1}n_{2}}{2}\varphi_{r_{1}r_{2},r_{1}r_{2}}\] for \(n_{1}\geq n_{2}\geq2\).

Proof. By the definition of direct product, we have \(G_{1}\otimes G_{2}\) is a \(r_{1}r_{2}\)-regular graph with \(\frac{r_{1}r_{2}n_{1}n_{2}}{2}\) edges. Thus \[DTI\left(G_{1}\otimes G_{2}\right)= \sum\limits_{\left(i,\, j\right)\in K}m_{i,\,j}\left(G\right)\varphi_{i,\,j}=\frac{r_{1}r_{2}n_{1}n_{2}}{2}\varphi_{r_{1}r_{2},r_{1}r_{2}}.\] This completes the proof.

Corollary 8. Let \(G_{1}\) and \(G_{2}\) be a \(r_{1}\)-regular graph and a \(r_{2}\)-regular graph with order \(n_{1}\) and \(n_{2}\), respectively. Then \begin{align*} R^{t}\left(G_{1}\otimes G_{2}\right) = &\dfrac{n_{1}n_{2}\left(r_{1}r_{2}\right)^{2t+1}}{2},\\ Z^{t}\left(G_{1}\otimes G_{2}\right) = &n_{1}n_{2}\left(r_{1}r_{2}\right)^{t},\\ \chi^{t}\left(G_{1}\otimes G_{2}\right) = &2^{t-1}n_{1}n_{2}\left(r_{1}r_{2}\right)^{t+1} \end{align*} for \(n_{1}\geq n_{2}\geq2\).

4. Strong product

Theorem 9. Let \(P_{n_{1}}\) and \(P_{n_{2}}\) be two path graphs of order \(n_{1}\) and \(n_{2}\), respectively. Then \[DTI\left(P_{n_{1}}\boxtimes P_{n_{2}}\right) = 8\varphi_{3,5}+ 4\varphi_{3,8}+ 2\left(n_{1}+n_{2}-4\right)\varphi_{5,5}+\left(6n_{1}+6n_{2}-32\right)\varphi_{5,8} +[4n_{1}n_{2}-11\left(n_{1}+n_{2}\right)+30]\varphi_{8,8}\] for \(n_{1}\geq n_{2}\geq 3\).

Proof. By the definition of strong product, we obtain the basic information on \(P_{n_{1}}\boxtimes P_{n_{2}}\) in the following Table 7.

Table 7. The basic information on \(P_{n_{1}}\boxtimes P_{n_{2}}\) .
\(m_{3,5}\) \(m_{3,8}\) \(m_{5,5}\) \(m_{5,8}\) \(m_{8,8}\)
\(8\) \(4\) \(2\left(n_{1}+n_{2}\right)-8\) \(6\left(n_{1}+n_{2}\right)-32\) \(4n_{1}n_{2}-11\left(n_{1}+n_{2}\right)+30\)

Thus we have

\begin{align*} DTI\left(P_{n_{1}}\boxtimes P_{n_{2}}\right) = & \sum\limits_{\left(i,\, j\right)\in K}m_{i,\,j}\left(G\right)\varphi_{i,\,j}\\ = & 8\varphi_{3,5}+ 4\varphi_{3,8}+ 2\left(n_{1}+n_{2}-4\right)\varphi_{5,5}+\left(6n_{1}+6n_{2}-32\right)\varphi_{5,8} +[4n_{1}n_{2}-11\left(n_{1}+n_{2}\right)+30]\varphi_{8,8}. \end{align*} This completes the proof.

Corollary 9. Let \(P_{n_{1}}\) and \(P_{n_{2}}\) be two path graphs of order \(n_{1}\) and \(n_{2}\), respectively. Then \begin{align*} R^{t}\left(P_{n_{1}}\boxtimes P_{n_{2}}\right) = & 8\cdot15^{t}+ 4\cdot24^{t}+ 25^{t}\cdot[2\left(n_{1}+n_{2}-4\right)]+40^{t}\cdot\left(6n_{1}+6n_{2}-32\right)\\ & +64^{t}\cdot[4n_{1}n_{2}-11\left(n_{1}+n_{2}\right)+30],\\ Z^{t}\left(P_{n_{1}}\boxtimes P_{n_{2}}\right) = & 8\cdot\left(3^{t-1}+ 5^{t-1}\right)+4\cdot\left(3^{t-1}+ 8^{t-1}\right)+4\cdot5^{t-1}[\left(n_{1}+n_{2}\right)-4]\\ & +\left(6n_{1}+6n_{2}-32\right)\cdot\left(5^{t-1}+8^{t-1}\right)+2\cdot8^{t-1}[4n_{1}n_{2}-11\left(n_{1}+n_{2}\right)+30],\\ \chi^{t}\left(P_{n_{1}}\boxtimes P_{n_{2}}\right) = & 8^{t+1}+4\cdot11^{t}+10^{t}\cdot[2\left(n_{1}+n_{2}\right)-8]+13^{t}\cdot\left(6n_{1}+6n_{2}-32\right)\\ &+16^{t}\cdot[4n_{1}n_{2}-11\left(n_{1}+n_{2}\right)+30] \end{align*} for \(n_{1}\geq n_{2}\geq 3\).

Theorem 10. Let \(P_{n_{1}}\) and \(G_{r}\) be a path and a \(r\)-regular of order \(n_{1}\) and \(n_{2}\), respectively. Then \[DTI\left(P_{n_{1}}\boxtimes G_{r}\right) = rn_{2}\varphi_{2r+1,2r+1}+2\left(r+1\right)n_{2}\varphi_{2r+1,3r+2} +\frac{1}{2}\left[n_{1}n_{2}\left(3r+2\right)-2n_{2}\left(4r+3\right)\right]\varphi_{3r+2,3r+2}\] for \(n_{1}> n_{2}\geq2\).

Proof. By the definition of strong product, we obtain the basic information on \(P_{n_{1}}\boxtimes G_{r}\) in the following Table 8.

Table 8. The basic information on \(P_{n_{1}}\boxtimes G_{r}\).
\(m_{2r+1,2r+1}\) \(m_{2r+1,3r+2}\) \(m_{3r+2,3r+2}\)
\(rn_{2}\) \(2\left(r+1\right)n_{2}\) \(n_{1}n_{2}\left(\frac{3r}{2}+1\right)-n_{2}\left(4r+3\right)\)

Thus we have

\begin{align*} DTI\left(P_{n_{1}}\boxtimes G_{r}\right) = &\sum\limits_{\left(i,\, j\right)\in K}m_{i,\,j}\left(G\right)\varphi_{i,\,j}\\ =& rn_{2}\varphi_{2r+1,2r+1}+2\left(r+1\right)n_{2}\varphi_{2r+1,3r+2} +\frac{1}{2}\left[n_{1}n_{2}\left(3r+2\right)-2n_{2}\left(4r+3\right)\right]\varphi_{3r+2,3r+2}. \end{align*} This completes the proof.

Corollary 10. Let \(P_{n_{1}}\) and \(G_{r}\) be a path and a \(r\)-regular of order \(n_{1}\) and \(n_{2}\), respectively. Then \begin{align*} R^{t}\left(P_{n_{1}}\boxtimes G_{r}\right) = & rn_{2}\left(2r+1\right)^{2t}+2n_{2}\left(r+1\right)\left(2r+1\right)^{t}\left(3r+2\right)^{t} +\left[n_{1}n_{2}\left(\frac{3r}{2}+1\right)-n_{2}\left(4r+3\right)\right]\left(3r+2\right)^{2t},\\ Z^{t}\left(P_{n_{1}}\boxtimes G_{r}\right) = & 2rn_{2}\left(2r+1\right)^{t-1}+2n_{2}\left(r+1\right)\left[\left(2r+1\right)^{t-1}+\left(3r+2\right)^{t-1}\right] +2\left(3r+2\right)^{t-1}\left[n_{1}n_{2}\left(\frac{3r}{2}+1\right)-n_{2}\left(4r+3\right)\right],\\ \chi^{t}\left(P_{n_{1}}\boxtimes G_{r}\right) = & 2^{t}rn_{2}\left(2r+1\right)^{t}+2n_{2}\left(r+1\right)\left(5r+3\right)^{t} +2^{t}\left(3r+2\right)^{t}\left[n_{1}n_{2}\left(\frac{3r}{2}+1\right)-n_{2}\left(4r+3\right)\right] \end{align*} for \(n_{1}> n_{2}\geq2\).

Theorem 11. Let \(G_{r}\) and \(P_{n_{2}}\) be a \(r\)-regular and a path of order \(n_{1}\) and \(n_{2}\), respectively. Then \[ DTI\left(G_{r}\boxtimes P_{n_{2}}\right) = rn_{1}\varphi_{2r+1,2r+1}+2\left(r+1\right)n_{1}\varphi_{2r+1,3r+2} +\frac{1}{2}\left[n_{1}n_{2}\left(3r+2\right)-2n_{1}\left(4r+3\right)\right]\varphi_{3r+2,3r+2} \] for \(n_{1}\geq n_{2}\geq3\).

Proof. By the definition of strong product, we obtain the basic information on \(G_{r}\boxtimes P_{n_{2}}\) in the following Table 9.

Table 9.The basic information on \(G_{r}\boxtimes P_{n_{2}}\) .
\(m_{2r+1,2r+1}\) \(m_{2r+1,3r+2}\) \(m_{3r+2,3r+2}\)
\(rn_{1}\) \(2\left(r+1\right)n_{1}\) \(n_{1}n_{2}\left(\frac{3r}{2}+1\right)-n_{1}\left(4r+3\right)\)

Thus we have

\begin{align*}DTI\left(G_{r}\boxtimes P_{n_{2}}\right) &= \sum\limits_{\left(i,\, j\right)\in K}m_{i,\,j}\left(G\right)\varphi_{i,\,j} \\&= rn_{1}\varphi_{2r+1,2r+1}+2\left(r+1\right)n_{1}\varphi_{2r+1,3r+2} +\frac{1}{2}\left[n_{1}n_{2}\left(3r+2\right)-2n_{1}\left(4r+3\right)\right]\varphi_{3r+2,3r+2}.\end{align*} This completes the proof.

Corollary 11. Let \(G_{r}\) and \(P_{n_{2}}\) be a \(r\)-regular and a path of order \(n_{1}\) and \(n_{2}\), respectively. Then \begin{align*} R^{t}\left(G_{r}\boxtimes P_{n_{2}}\right) = & rn_{1}\left(2r+1\right)^{2t}+2n_{1}\left(r+1\right)\left(2r+1\right)^{t}\left(3r+2\right)^{t} +\left(3r+2\right)^{2t}\left[n_{1}n_{2}\left(\frac{3r}{2}+1\right)-n_{1}\left(4r+3\right)\right],\\ Z^{t}\left(G_{r}\boxtimes P_{n_{2}}\right) = & 2rn_{1}\left(2r+1\right)^{t-1}+2n_{1}\left(r+1\right)\left[\left(2r+1\right)^{t-1}+\left(3r+2\right)^{t-1}\right] +2\left(3r+2\right)^{t-1}\left[n_{1}n_{2}\left(\frac{3r}{2}+1\right)-n_{1}\left(4r+3\right)\right],\\ \chi^{t}\left(G_{r}\boxtimes P_{n_{2}}\right) = & 2^{t}rn_{1}\left(2r+1\right)^{t}+2n_{1}\left(r+1\right)\left(5r+3\right)^{t} +2^{t}\left(3r+2\right)^{t}\left[n_{1}n_{2}\left(\frac{3r}{2}+1\right)-n_{1}\left(4r+3\right)\right] \end{align*} for \(n_{1}\geq n_{2}\geq3\).

Theorem 12. Let \(G_{1}\) and \(G_{2}\) be a \(r_{1}\)-regular graph and a \(r_{2}\)-regular graph with order \(n_{1}\) and \(n_{2}\), respectively. Then \[DTI\left(G_{1}\boxtimes G_{2}\right)= \frac{n_{1}n_{2}\left(r_{1}r_{2}+r_{1}+r_{2}\right)}{2}\varphi_{r_{1}r_{2}+r_{1}+r_{2},r_{1}r_{2}+r_{1}+r_{2}}\] for \(n_{1}\geq n_{2}\geq2\).

Proof. By the definition of strong product, we have \(G_{1}\boxtimes G_{2}\) is a \(\left(r_{1}r_{2}+r_{1}+r_{2}\right)\)-regular graph with \(\frac{n_{1}n_{2}\left(r_{1}r_{2}+r_{1}+r_{2}\right)}{2}\) edges. Thus \[DTI\left(G_{1}\boxtimes G_{2}\right) =\sum\limits_{\left(i,\, j\right)\in K}m_{i,\,j}\left(G\right)\varphi_{i,\,j}= \frac{n_{1}n_{2}\left(r_{1}r_{2}+r_{1}+r_{2}\right)}{2}\varphi_{r_{1}r_{2}+r_{1}+r_{2},r_{1}r_{2}+r_{1}+r_{2}}.\] This completes the proof.

Corollary 12. Let \(G_{1}\) and \(G_{2}\) be a \(r_{1}\)-regular graph and a \(r_{2}\)-regular graph with order \(n_{1}\) and \(n_{2}\), respectively. Then \begin{align*} R^{t}\left(G_{1}\boxtimes G_{2}\right) = & \dfrac{n_{1}n_{2}\left(r_{1}r_{2}+r_{1}+r_{2}\right)^{2t+1}}{2},\\ Z^{t}\left(G_{1}\boxtimes G_{2}\right) = & n_{1}n_{2}\left(r_{1}r_{2}+r_{1}+r_{2}\right)^{t},\\ \chi^{t}\left(G_{1}\boxtimes G_{2}\right) = & 2^{t-1}n_{1}n_{2}\left(r_{1}r_{2}+r_{1}+r_{2}\right)^{t+1} \end{align*} for \(n_{1}\geq n_{2}\geq2\).

5. Lexicographic product

Theorem 13. Let \(P_{n_{1}}\) and \(P_{n_{2}}\) be two path graphs of order \(n_{1}\) and \(n_{2}\), respectively. Then \begin{align*} DTI\left(P_{n_{1}}[P_{n_{2}}]\right)& = 4\varphi_{n_{2}+1,n_{2}+2}+8\varphi_{n_{2}+1,2n_{2}+1}+4\left(n_{2}-2\right)\varphi_{n_{2}+1,2n_{2}+2}+2\left(n_{2}-3\right)\varphi_{n_{2}+2,n_{2}+2} +4\left(n_{2}-2\right)\varphi_{n_{2}+2,2n_{2}+1}\\ & +2\left(n_{2}-2\right)^{2}\varphi_{n_{2}+2,2n_{2}+2} +4\left(n_{1}-3\right)\varphi_{2n_{2}+1,2n_{2}+1}+[2\left(n_{1}-2\right)+4\left(n_{1}-3\right)\left(n_{2}-2\right)]\varphi_{2n_{2}+1,2n_{2}+2}\\ & +[\left(n_{1}-2\right)\left(n_{2}-3\right)+\left(n_{1}-3\right)\left(n_{2}-2\right)^{2}]\varphi_{2n_{2}+2,2n_{2}+2} \end{align*} for \(n_{1}\geq n_{2}\geq3\).

Proof. By the definition of lexicographic product, we obtain the basic information on \(P_{n_{1}}[P_{n_{2}}]\) in the following Table 10.

Table 10. The basic information on \(P_{n_{1}}[P_{n_{2}}]\).
\(m_{n_{2}+1,n_{2}+2}\) \(4\)
\(m_{n_{2}+1,2n_{2}+1}\) \(8\)
\(m_{n_{2}+1,2n_{2}+2}\) \(4\left(n_{2}-2\right)\)
\(m_{n_{2}+2,n_{2}+2}\) \(2\left(n_{2}-3\right)\)
\(m_{n_{2}+2,2n_{2}+1}\) \(4\left(n_{2}-2\right)\)
\(m_{n_{2}+2,2n_{2}+2}\) \(2\left(n_{2}-2\right)^{2}\)
\(m_{2n_{2}+1,2n_{2}+1}\) \(4\left(n_{1}-3\right)\)
\(m_{2n_{2}+1,2n_{2}+2}\) \(2\left(n_{1}-2\right)+4\left(n_{1}-3\right)\left(n_{2}-2\right)\)
\(m_{2n_{2}+2,2n_{2}+2}\) \(\left(n_{1}-2\right)\left(n_{2}-3\right)+\left(n_{1}-3\right)\left(n_{2}-2\right)^{2}\)

Thus we have

\begin{align*} DTI\left(P_{n_{1}}[P_{n_{2}}]\right) = &\sum\limits_{\left(i,\, j\right)\in K}m_{i,\,j}\left(G\right)\varphi_{i,\,j}\\ = & 4\varphi_{n_{2}+1,n_{2}+2}+8\varphi_{n_{2}+1,2n_{2}+1}+4\left(n_{2}-2\right)\varphi_{n_{2}+1,2n_{2}+2}\\ & +2\left(n_{2}-3\right)\varphi_{n_{2}+2,n_{2}+2}+4\left(n_{2}-2\right)\varphi_{n_{2}+2,2n_{2}+1}+2\left(n_{2}-2\right)^{2}\varphi_{n_{2}+2,2n_{2}+2}\\ & +4\left(n_{1}-3\right)\varphi_{2n_{2}+1,2n_{2}+1}+[2\left(n_{1}-2\right)+4\left(n_{1}-3\right)\left(n_{2}-2\right)]\varphi_{2n_{2}+1,2n_{2}+2}\\ & +[\left(n_{1}-2\right)\left(n_{2}-3\right)+\left(n_{1}-3\right)\left(n_{2}-2\right)^{2}]\varphi_{2n_{2}+2,2n_{2}+2}. \end{align*} This completes the proof.

Corollary 13. Let \(P_{n_{1}}\) and \(P_{n_{2}}\) be two path graphs of order \(n_{1}\) and \(n_{2}\), respectively. Then \begin{align*} R^{t}\left(P_{n_{1}}[P_{n_{2}}]\right) = & 4[\left(n_{2}+1\right)\left(n_{2}+2\right)]^{t}+8[\left(n_{2}+1\right)\left(2n_{2}+1\right)]^{t}+4\left(n_{2}-2\right)[\left(n_{2}+1\right)\left(2n_{2}+2\right)]^{t}\\ & +2\left(n_{2}-3\right)\left(n_{2}+2\right)^{2t}+4\left(n_{2}-2\right)[\left(n_{2}+2\right)\left(2n_{2}+1\right)]^{t}\\ &+2\left(n_{2}-2\right)^{2}[\left(n_{2}+2\right)\left(2n_{2}+2\right)]^{t}+4\left(n_{1}-3\right)\left(2n_{2}+1\right)^{2t}\\ & +[2\left(n_{1}-2\right)+4\left(n_{1}-3\right)\left(n_{2}-2\right)][\left(2n_{2}+1\right)\left(2n_{2}+2\right)]^{t}\\ & +[\left(n_{1}-2\right)\left(n_{2}-3\right)+\left(n_{1}-3\right)\left(n_{2}-2\right)^{2}]\left(2n_{2}+2\right)^{2t},\\ Z^{t}\left(P_{n_{1}}[P_{n_{2}}]\right)= & 4[\left(n_{2}+1\right)^{t-1}+\left(n_{2}+2\right)^{t-1}]+8[\left(n_{2}+1\right)^{t-1}+\left(2n_{2}+1\right)^{t-1}]\\ &+4\left(n_{2}-2\right)[\left(n_{2}+1\right)^{t-1}+\left(2n_{2}+2\right)^{t-1}]+4\left(n_{2}-3\right)\left(n_{2}+2\right)^{t-1}\\ & +4\left(n_{2}-2\right)[\left(n_{2}+2\right)^{t-1}+\left(2n_{2}+1\right)^{t-1}]+2\left(n_{2}-2\right)^{2}[\left(n_{2}+2\right)^{t-1}\\ & +\left(2n_{2}+2\right)^{t-1}]+8\left(n_{1}-3\right)\left(2n_{2}+1\right)^{t-1}\\ &+[2\left(n_{1}-2\right)+4\left(n_{1}-3\right)\left(n_{2}-2\right)][\left(2n_{2}+1\right)^{t-1}+\left(2n_{2}+2\right)^{t-1}]\\ & +2\left(2n_{2}+2\right)^{t-1}[\left(n_{1}-2\right)\left(n_{2}-3\right)+\left(n_{1}-3\right)\left(n_{2}-2\right)^{2}],\\ \chi^{t}\left(P_{n_{1}}[P_{n_{2}}]\right) = & 4\left(2n_{2}+3\right)^{t}+8\left(3n_{2}+2\right)^{t} +8\cdot3^{t}\cdot\left(n_{2}-2\right)\left(n_{2}+1\right)^{t}+2\left(n_{2}-3\right)\left(2n_{2}+4\right)^{t}\\ & +2\left(n_{2}-2\right)^{2}\left(3n_{2}+4\right)^{t}+4\left(n_{1}-3\right)\left(4n_{2}+2\right)^{t}\\ &+[2\left(n_{1}-2\right)+4\left(n_{1}-3\right)\left(n_{2}-2\right)]\left(4n_{2}+3\right)^{t}\\ & +4^{t}\left(n_{2}+1\right)^{t}[\left(n_{1}-2\right)\left(n_{2}-3\right)+\left(n_{1}-3\right)\left(n_{2}-2\right)^{2}] \end{align*} for \(n_{1}\geq n_{2}\geq3\).

Theorem 14. Let \(P_{n_{1}}\) and \(G_{r}\) be a path and a r-regular of order \(n_{1}\) and \(n_{2}\), respectively. Then \[DTI\left(P_{n_{1}}\left[G_{r}\right]\right) = rn_{2}\varphi_{r+n_{2},r+n_{2}}+ 2n_{2}^{2}\varphi_{r+n_{2},2n_{2}+r}+\frac{1}{2}\left[rn_{2}\left(n_{1}-2\right)+2\left(n_{1}-3\right)n_{2}^{2}\right]\varphi_{2n_{2}+r,2n_{2}+r}\] for \(n_{1}> n_{2}\geq2\).

Proof. By the definition of lexicographic product, we obtain the basic information on \(P_{n_{1}}[G_{r}]\) in the following Table 11.

Table 11.The basic information on \(P_{n_{1}}[G_{r}]\) .
\(m_{r+n_{2},r+n_{2}}\) \(m_{r+n_{2},2n_{2}+r}\) \(m_{2n_{2}+r,2n_{2}+r}\)
\(rn_{2}\) \(2n_{2}^{2}\) \(\dfrac{rn_{2}\left(n_{1}-2\right)}{2}+n_{2}^{2}\left(n_{1}-3\right)\)
Thus we have \begin{align*} DTI\left(P_{n_{1}}\left[G_{r}\right]\right) = &\sum\limits_{\left(i,\, j\right)\in K}m_{i,\,j}\left(G\right)\varphi_{i,\,j}\\ = & rn_{2}\varphi_{r+n_{2},r+n_{2}}+ 2n_{2}^{2}\varphi_{r+n_{2},2n_{2}+r} +\frac{1}{2}\left[rn_{2}\left(n_{1}-2\right)+2\left(n_{1}-3\right)n_{2}^{2}\right]\varphi_{2n_{2}+r,2n_{2}+r}. \end{align*} This completes the proof.

Corollary 14. Let \(P_{n_{1}}\) and \(G_{r}\) be a path and a r-regular of order \(n_{1}\) and \(n_{2}\), respectively. Then \begin{align*} R^{t}\left(P_{n_{1}}\left[G_{r}\right]\right) = & rn_{2}\left(r+n_{2}\right)^{2t}+ 2n_{2}^{2}\left(r+n_{2}\right)^{t}\left(2n_{2}+r\right)^{t} +\left[\dfrac{rn_{2}\left(n_{1}-2\right)}{2}+\left(n_{1}-3\right)n_{2}^{2}\right]\left(2n_{2}+r\right)^{2t},\\ Z^{t}\left(P_{n_{1}}\left[G_{r}\right]\right) = & 2rn_{2}\left(r+n_{2}\right)^{t-1}+ 2n_{2}^{2}\left[\left(r+n_{2}\right)^{t-1}+\left(2n_{2}+r\right)^{t-1}\right] +\left[rn_{2}\left(n_{1}-2\right)+2\left(n_{1}-3\right)n_{2}^{2}\right]\left(2n_{2}+r\right)^{t-1},\\ \chi^{t}\left(P_{n_{1}}\left[G_{r}\right]\right) = & 2^{t}rn_{2}\left(r+n_{2}\right)^{t}+ 2n_{2}^{2}\left(2r+3n_{2}\right)^{t} +2^{t}\left[\dfrac{rn_{2}\left(n_{1}-2\right)}{2}+\left(n_{1}-3\right)n_{2}^{2}\right]\left(2n_{2}+r\right)^{t} \end{align*} for \(n_{1}> n_{2}\geq2\).

Theorem 15. Let \(G_{r}\) and \(P_{n_{2}}\) be a \(r\)-regular and a path of order \(n_{1}\) and \(n_{2}\), respectively. Then \[ DTI\left(G_{r}[P_{n_{2}}]\right) = 2rn_{1}\varphi_{rn_{2}+1,rn_{2}+1}+2n_{1}\left[1+r\left(n_{2}-2\right)\right]\varphi_{rn_{2}+1,rn_{2}+2} +\frac{1}{2}\left[2n_{1}\left(n_{2}-3\right)+rn_{1}\left(n_{2}-2\right)^{2}\right]\varphi_{rn_{2}+2,rn_{2}+2} \] for \(n_{1}\geq n_{2}\geq3\).

Proof. By the definition of lexicographic product, we obtain the basic information on \(G_{r}[P_{n_{2}}]\) in the following Table 12.

Table 12. The basic information on \(G_{r}[P_{n_{2}}]\).
\(m_{rn_{2}+1,rn_{2}+1}\) \(m_{rn_{2}+1,rn_{2}+2}\) \(m_{rn_{2}+2,rn_{2}+2}\)
\(2rn_{1}\) \(2n_{1}[1+r\left(n_{2}-2\right)]\) \(n_{1}\left(n_{2}-3\right)+\frac{rn_{1}\left(n_{2}-2\right)^{2}}{2}\)
Thus we have \begin{align*} DTI\left(G_{r}[P_{n_{2}}]\right) = &\sum\limits_{\left(i,\, j\right)\in K}m_{i,\,j}\left(G\right)\varphi_{i,\,j}\\ = & 2rn_{1}\varphi_{rn_{2}+1,rn_{2}+1}+2n_{1}\left[1+r\left(n_{2}-2\right)\right]\varphi_{rn_{2}+1,rn_{2}+2} +\frac{1}{2}\left[2n_{1}\left(n_{2}-3\right)+rn_{1}\left(n_{2}-2\right)^{2}\right]\varphi_{rn_{2}+2,rn_{2}+2}. \end{align*} This completes the proof.

Corollary 15. Let \(G_{r}\) and \(P_{n_{2}}\) be a \(r\)-regular and a path of order \(n_{1}\) and \(n_{2}\), respectively. Then \begin{align*} R^{t}\left(G_{r}\left[P_{n_{2}}\right]\right) = & 2rn_{1}\left(rn_{2}+1\right)^{2t}+2n_{1}\left[1+r\left(n_{2}-2\right)\right]\left[\left(rn_{2}+1\right)\left(rn_{2}+2\right)\right]^{t}\\ & +\left[n_{1}\left(n_{2}-3\right)+\dfrac{rn_{1}\left(n_{2}-2\right)^{2}}{2}\right]\left(rn_{2}+2\right)^{2t},\\ Z^{t}\left(G_{r}\left[P_{n_{2}}\right]\right) = & 4rn_{1}\left(rn_{2}+1\right)^{t-1}+2n_{1}\left[1+r\left(n_{2}-2\right)\right]\left[\left(rn_{2}+1\right)^{t-1}+\left(rn_{2}+2\right)^{t-1}\right]\\ & +\left[2n_{1}\left(n_{2}-3\right)+rn_{1}\left(n_{2}-2\right)^{2}\right]\left(rn_{2}+2\right)^{t-1},\\ \chi^{t}\left(G_{r}\left[P_{n_{2}}\right]\right) = & 2^{t+1}rn_{1}\left(rn_{2}+1\right)^{t}+2n_{1}\left[1+r\left(n_{2}-2\right)\right]\left(2rn_{2}+3\right)^{t}\\ & +2^{t}\left[n_{1}\left(n_{2}-3\right)+\dfrac{rn_{1}\left(n_{2}-2\right)^{2}}{2}\right]\left(rn_{2}+2\right)^{t} \end{align*} for \(n_{1}\geq n_{2}\geq3\).

Theorem 16. Let \(G_{1}\) and \(G_{2}\) be a \(r_{1}\)-regular graph and a \(r_{2}\)-regular graph with order \(n_{1}\) and \(n_{2}\), respectively. Then \[DTI\left(G_{1}[G_{2}]\right)=\frac{1}{2}n_{1}n_{2}\left(r_{2}+r_{1}n_{2}\right)\varphi_{r_{1}n_{2}+r_{2},r_{1}n_{2}+r_{2}}\] for \(n_{1}\geq n_{2}\geq2\).

Proof. By the definition of lexicographic product, we have \(G_{1}[G_{2}]\) is a \(\left(r_{1}n_{2}+r_{2}\right)\)-regular graph. Thus \[ DTI\left(G_{1}[G_{2}]\right) = \sum\limits_{\left(i,\, j\right)\in K}m_{i,\,j}\left(G\right)\varphi_{i,\,j}=\frac{1}{2}n_{1}n_{2}\left(r_{2}+r_{1}n_{2}\right)\varphi_{r_{1}n_{2}+r_{2},r_{1}n_{2}+r_{2}}.\] This completes the proof.

Corollary 16. Let \(G_{1}\) and \(G_{2}\) be a \(r_{1}\)-regular graph and a \(r_{2}\)-regular graph with order \(n_{1}\) and \(n_{2}\), respectively. Then \begin{align*} R^{t}\left(G_{1}[G_{2}]\right) = & \dfrac{n_{1}n_{2}\left(r_{2}+r_{1}n_{2}\right)^{2t+1}}{2},\\ Z^{t}\left(G_{1}[G_{2}]\right) = & n_{1}n_{2}\left(r_{2}+r_{1}n_{2}\right)^{t},\\ \chi^{t}\left(G_{1}[G_{2}]\right) = & 2^{t-1}n_{1}n_{2}\left(r_{2}+r_{1}n_{2}\right)^{t+1} \end{align*} for \(n_{1}\geq n_{2}\geq2\).

6. Conclusion

In this paper, we give a unified approach to solve the computational problems of degree-based topological indices of standard product graphs for the path, star and regular graphs. It is imaginable to use other graph operations to calculate degree-based topological indices uniformly in the future.

Acknowledgments

This work was supported by the Qinghai science and technology plan project (No. 2021-ZJ-703) and the National Natural Science Foundation of China (No. 11771443).

Author Contributions

All authors contributed equally to the writing of this paper. All authors read and approved the final manuscript.

Conflicts of Interest

''The authors declare no conflict of interest.''

References

  1. Todeschini, R., & Consonni, V. (2009). Molecular Descriptors for Chemoinformatics. Wiley-VCH, Weinheim. [Google Scholor]
  2. Bollobás, B., & Erdos, P. (1998). Graphs of extremal weights. Ars Combinatoria, 50, 225-233. [Google Scholor]
  3. Randic, M. (1975). On characterization of molecular branching. Journal of the American Chemical Society, 97, 6609-6615. [Google Scholor]
  4. Gutman, I., Furtula, B., & Elphick, C. (2014). Some new/old vertex-degree-based topological indices. MATCH Communications in Mathematical and in Computer Chemistry, 72, 617-632. [Google Scholor]
  5. Gutman, I., & Trinajstic, N. (1972). Graph theory and molecular orbitals, Total \(\pi\) electron energy of alternant hydrocarbons. Chemical Physics Letters, 17, 535-538. [Google Scholor]
  6. Li, X., & Zheng, J. (2005). A unifled approach to the extremal trees for difierent indices. MATCH Communications in Mathematical and in Computer Chemistry, 54, 195-208. [Google Scholor]
  7. Furtula, B., & Gutman, I. (2015). A forgotten topological index. Journal of Mathematical Chemistry, 53, 1184-1190. [Google Scholor]
  8. Zhou, B., & Trinajstic, N. (2010). On general sum-connectivity index. Journal of Mathematical Chemistry, 47, 210-218. [Google Scholor]
  9. Fajtlovicz, S. (1987). On conjectures on Graffiti-II. Congr numer, 60, 187-197. [Google Scholor]
  10. Zhou, B., & Trinajstic, N. (2009). On a novel connectivity index. Journal of Mathematical Chemistry, 46, 1252-1270. [Google Scholor]
  11. Das, K. Ch., Gutman, I., Milovanovic, I., Milovanovic, E., & Furtula, B. (2018). Degree-based energies of graphs. Linear Algebra and Its Applications, 554, 185-204. [Google Scholor]
  12. Imrich, W., & Klavžar, S. (2000). Product Graphs. Structure and Recognition, Wiley-Interscience. New York. [Google Scholor]
  13. Feder, T. (1995). Stable networks and product graphs. Memoirs of the American Mathematical Society, 116, 555. [Google Scholor]
  14. Lammprey, R. H., & Barnes, B. H. (1974). Products of graphs and applications. Modeling and Simulation, 5, 1119-1123. [Google Scholor]
  15. Ghozati, S. A. (1999). A finite automata approach to modeling the cross product of interconnection networks. Mathematical and Computer Modelling, 30, 185-200. [Google Scholor]
]]>
The evolutionary spatial snowdrift game on a cycle: An asymptotic analysis https://old.pisrt.org/psr-press/journals/odam-vol-4-issue-3-2021/the-evolutionary-spatial-snowdrift-game-on-a-cycle-an-asymptotic-analysis/ Sun, 31 Oct 2021 11:07:32 +0000 https://old.pisrt.org/?p=6048
ODAM-Vol. 4 (2021), Issue 3, pp. 36 - 59 Open Access Full-Text PDF
Benedikt Valentin Meylahn, Jan Harm van Vuuren
Abstract:The temporal dynamics of games have been studied widely in evolutionary spatial game theory using simulation. Each player is usually represented by a vertex of a graph and plays a particular game against every adjacent player independently. These games result in payoffs to the players which affect their relative fitness. The fitness of a player, in turn, affects its ability to reproduce. In this paper, we analyse the temporal dynamics of the evolutionary 2-person, 2-strategy snowdrift game in which players are arranged along a cycle of arbitrary length. In this game, each player has the option of adopting one of two strategies, namely cooperation or defection, during each game round. We compute the probability of retaining persistent cooperation over time from a random initial assignment of strategies to players. We also establish bounds on the probability that a small number of players of a particular mutant strategy introduced randomly into a cycle of players which have established the opposite strategy leads to the situation where all players eventually adopt the mutant strategy. We adopt an analytic approach throughout as opposed to a simulation approach clarifying the underlying dynamics intrinsic to the entire class of evolutionary spatial snowdrift games.
]]>

Open Journal of Discrete Applied Mathematics

The evolutionary spatial snowdrift game on a cycle: An asymptotic analysis

Benedikt Valentin Meylahn\(^1\), Jan Harm van Vuuren
Stellenbosch Unit for Operations Research in Engineering, Department of Industrial Engineering, Stellenbosch University, Stellenbosch, South Africa.; (B.V.M & J.H.V)
\(^{1}\)Corresponding Author: benedikt.meylahn@gmail.com; Tel.: +31205256097

Abstract

The temporal dynamics of games have been studied widely in evolutionary spatial game theory using simulation. Each player is usually represented by a vertex of a graph and plays a particular game against every adjacent player independently. These games result in payoffs to the players which affect their relative fitness. The fitness of a player, in turn, affects its ability to reproduce. In this paper, we analyse the temporal dynamics of the evolutionary 2-person, 2-strategy snowdrift game in which players are arranged along a cycle of arbitrary length. In this game, each player has the option of adopting one of two strategies, namely cooperation or defection, during each game round. We compute the probability of retaining persistent cooperation over time from a random initial assignment of strategies to players. We also establish bounds on the probability that a small number of players of a particular mutant strategy introduced randomly into a cycle of players which have established the opposite strategy leads to the situation where all players eventually adopt the mutant strategy. We adopt an analytic approach throughout as opposed to a simulation approach clarifying the underlying dynamics intrinsic to the entire class of evolutionary spatial snowdrift games.

Keywords:

Noncooperative games on graphs; Evolutionary games; Cycle graphs; Evolution of cooperation.

1. Introduction

The snowdrift game (also known as the hawk-dove game) is attributed to Maynard Smith [1]. This game may be described as a contest between two motorists stuck in a snowdrift. Each individual may choose to exit her or his vehicle and shovel snow (cooperate) or a remain warm inside their car (defect). Assuming that being able to continue home is valued above having to shovel snow, the outcomes of the game are: Two cooperating individuals each shovel half the snow and continue on their way home, and so obtain the reward for mutual cooperation \(R\). A cooperating individual facing a defecting individual shovels all of the snow (but still gets to continue at least) and so obtains the sucker's payoff \(S\), while the defecting individual shovels no snow and may continue on her or his way; the temptation to defect \(T\). Finally, two defecting individuals stay put in their vehicles but cannot continue on their way home, and thus receive the punishment for mutual defection \(P\). These payoffs satisfy the inequality chain

\begin{equation}\label{IneqSnow} T>R>S>P. \end{equation}
(1)
The evolution of cooperation in the context of a competitive environment has been studied in the fields of evolutionary dynamics, economics, ecology and game theory for many years. In 1984, Axelrod [2] hosted two computer tournaments in which game theorists and enthusiasts could submit strategy schemes which were to compete against one another in the setting of the iterated prisoner's dilemma. The prisoner's dilemma is a 2-person, 2-strategy game with the same strategies as those described above, but with payoffs satisfying the inequality chain \(T>R>P>S\). The results of the tournaments were analysed by Axelrod in the hope of identifying characteristics of successful strategies. He found that "nice" strategies (strategies which do not defect unless provoked) outperform strictly competitive strategies. This has since led to a large body of work aimed at determining, within a variety of biological or economic systems, what gives rise to the evolution of cooperation. Other noteworthy work in the field of evolutionary game theory is concerned with the notion of an evolutionary stable strategy, introduced by Maynard Smith and Price [3]. Such a strategy is robust against invasion of other strategies in the context of an entire population playing it. For an overview of work in evolutionary game theory the interested reader may consult [4,5].

Introducing game theory into the realm of temporal evolutionary dynamics provided a mechanism for modelling a population of individuals competing with one another for opportunities to replicate themselves as offspring. Traditionally, their chance of replicating their genetic material into future generations depends on their fitness. Depending on the nature of the selection dynamics, their fitness is either slightly or largely influenced by their relative performance in the game. Strong selection refers to the situation in which an individual's fitness is mainly determined by its performance in the game while weak selection assigns individuals a standard fitness that is slightly perturbed based on the individual's performance in the game. Furthermore, the selection dynamics may be global in the sense that all individuals compete during every game round or local, in which case a specific individual is selected for replication according to a probability proportional to its fitness.

A spatial extension to evolutionary games was pioneered by Nowak and May [6] who argued that in natural settings players do not frequently interact with all other members of the population, but rather experience frequent local interactions with a few individuals. They therefore positioned players at the vertices of a grid graph allowing for local interaction with their neighbours only. A game round consisted of each player playing the game against each of its neighbours (in pairs) and updating its strategy in order to "copy" the strategy of its best performing neighbour. The game was simulated from various initial conditions until steady states were reached and the results showed that in the prisoner's dilemma, a spatial extension is beneficial to the evolution of cooperation as it allows for clusters of cooperation to withstand the pressure of surrounding defectors.

Spatial extensions to the snowdrift game have, however, yielded mixed results, in some cases aiding and in others hindering the evolution of cooperation [7,8]. Roca et al., [8] discussed the considerable dependence of this facilitation and hindrance of cooperation on the clustering of the spatial structure as well as the relevant strategy update rule. This indicates that further investigations into the nature of the spatial snowdrift game might be of interest in a variety of settings. In this paper we adopt an analytic approach towards studying the long-term strategy behaviour of players in a deterministic version of the evolutionary spatial snowdrift game (ESSG), arranged along a cycle. More specifically, we determine the probability of retaining some form of cooperation over game rounds and also establish bounds on the probability that a small number of players of a particular mutant strategy introduced randomly into a cycle of players who adopt the opposite strategy leads to a situation where all players eventually adopt the mutant strategy.

The remainder of this paper is organised as follows: Pertinent related literature is highlighted in §2. In §3, the dynamics of the game investigated are presented along with nomenclature pertaining to the representation of the game. We present the body of our investigation in §4, §5, and §6, each in the context of one of three regions of interest in the parameter phase plane of the game. Finally, a number of conclusions are presented in §7.

2. Related literature

Academic interest in games played on cycle graphs has varied over time, starting with the paper by Eshel et al., [9], in which a version of the prisoner's dilemma, which carefully selected parameter values was considered, allowing for a representation of the payoffs parameterised by only one parameter, namely \(C\), as \(T=1+C/2\), \(R=1\), \(P=C/2\), and \(S=0\), with the restriction that \(0< C< 1/2\). The update rule employed resulted in an individual adopting the strategy which yielded the largest average payoff to players in their closed neighbourhoods. The analysis included a characterisation of states that lead to persistent cooperation, as well as an implicit calculation of the probability of persistent cooperation in the limit as the population grows large. Moreover, the existence of groups of defectors was established which alternate between having length \(d=1\) and length \(d=3\). They also analysed mutation dynamics according to which each player mutates (switches its strategy) with constant probability \(\lambda\). The deterministic update model was morphed into a probabilistic model analysed using methods from the realm of Markov processes. The results showed that pockets of cooperators can grow amidst a sea of defectors while the reverse is not true.

There has since been recent interest in evolutionary games played on cycle graphs [10,11,12]. These graphs may be considered one-dimensional lattice structures and therefore represent a simplification of larger grid structures, allowing for analytical investigations instead of analyses based on simulation studies. The objective in such investigations is to gain insight into the intrinsic nature of potential strategy interactions in more general graph structures.

The first of these investigations was carried out by Ohtsuki and Nowak [10] and pertained to 2-person, 2-strategy games played on cycle graphs in the context of three different update rules, namely birth-death, death-birth, and imitation. According to all three rules, a singular player is selected randomly during each game round whose strategy is to be updated. The investigation of Ohtsuki and Nowak related to the notion of fixation probabilities. A fixation probability is the probability of a player playing strategy \(A\), introduced into a population of players all playing strategy \(B\), resulting in the entire population adopting strategy \(A\) during a future generation.

Burger et al., [11] studied an evolutionary version of the prisoner's dilemma on a cycle in which the payoffs were normalised to \(T>1>P>0\), having set \(R=1\) and \(S=0\). The update rule was deterministic and synchronous in nature, meaning that each player would update its strategy during every round to the strategy of the best-performing player in its closed neighbourhood, and keeping it unaltered in the case of a tie between two strategies. One of the main results of the investigation was a quantification of the probability of achieving persistent cooperation ( i.e.the strategy of cooperation occurring in a steady state of the game) from a random initial assignment of strategies to the players on the cycle. While pockets of adjacent cooperation could not grow in this game, as the payoff of a cooperator adjacent to a defector would never exceed that of the defectors, it was shown that the aforementioned probability of persistent cooperation nevertheless tends to unity as the order of the cycle increases. Initial states of the game that lead to a steady state containing cooperation were also characterised. As found in [6], structures that lead to persistent cooperation involve clusters of cooperators surrounded by clusters of defectors. The reason for this finding is that interior cooperators may achieve a larger payoff than that of the first defector adjacent to the cluster of cooperators and so the cooperators on the boundaries of same-strategy clusters retain their strategies. The steady states of the game were also enumerated in terms of the order of the underlying cycle.

Finally, Laird [12] conducted an investigation into standoffs between cooperators and defectors in the ESSG. These standoff structures are only attainable when the payoff obtained by cooperators and defectors can be equal, leading to a situation where ties can occur on the boundaries between clusters of cooperators and clusters of defectors. The game under investigation was, however, semi-stochastic in the sense that a single player is chosen during each round and its payoff is compared with the payoffs obtained by its neighbours, upon which the player probabilistically changes its strategy to that of one of its neighbours strategies if these achieve larger payoffs than its own. This game dynamic allows for various game rounds during which no changes occur in the distribution of player strategies, even if adjacent players' payoffs are indeed distinct at the boundary between two clusters of differing strategies. Standoffs were found to occur for payoff parameters for which the equalities \(T=2S\) and \(T=S+1\) hold, upon normalisation so that \(P=0\) and \(R=1\).

3. Problem and nomenclature

The game considered in this paper is the (deterministic) ESSG, with players arranged along a cycle of order \(n\) and with payoff parameters normalised as described in the previous section so that \(T>1>S>0\). A game state is an allocation of strategies to the players in the population during any game round. Such a game state is represented succinctly by a binary string \(W\) of characters \(W_1W_2\cdots W_n\) in which \(W_x\in \{C,D\}\) for each \(x\in\{1,2,\ldots,n\}\), depending on the strategy (cooperation, denoted by \(C\), or defection, denoted by \(D\)) of player \(x\). The players are numbered so that player \(x\) is adjacent to players \(x\pm 1\text{ (mod }n)\), forming the underlying population structure of a cycle. A run is a maximal (contiguous) substring of \(W\) representing players playing the same strategy. A game state may be represented graphically by a two-colouring of the vertices of the underlying cycle graph in which the two colours represent the two strategies. This representation may be abbreviated by representing the player strategies in the form of a linear array of coloured vertices, with wrapping of is extremal vertices. Consider, as an example, the state \(CCCDCD\) of the ESSG on a cycle of order 6 depicted graphically in Figure 1. The convention adopted in the graphical representation is that a solid vertex represents a player playing the strategy of cooperation, while an open vertex represents a player playing the strategy of defection.

Figure 1. (a) A graphical representation of the game state \(CCCDCD\) in the ESSG on a cycle of order 6, and (b) the corresponding, more concise, linear array representation in which the adjacency of the first and last vertices is omitted from the representation. A solid vertex represents a player playing the strategy of cooperation, while an open vertex represents a player playing the strategy of defection.

An automorphism is a mapping \(f: W^1 \mapsto W^2\) from one game state \(W^1\) to another state \(W^2\) (called automorphic states) in which adjacency of players as well as strategy allocation is preserved (i.e. players \(x\) and \(y\) playing strategies \(W_x^1\) and \(W_y^1\), respectively, in \(W^1\) are adjacent in the cycle if and only if players \(f(x)\) and \(f(y)\) play the strategies \(W_{f(x)}^2\) and \(W_{f(y)}^2\), respectively, in \(W_2\)). An automorphism class is a maximal subset of game states that are pairwise automorphic. An (automorphism) class leader is the lexicographically smallest member \(W\) of the particular automorphism class, taking \(C< D\) in the string \(W\). For the special case where \(n=5\), for example, the automorphism classes and their leaders are shown in Table 1.

Table 1. The eight automorphism classes of the ESSG on a 5-cycle in linear array representation format. Class leaders are depicted in black and white, while the remaining class members are depicted in grey-scale. A solid vertex represents a player playing the strategy of cooperation, while an open vertex represents a player playing the strategy of defection.

During every round of the ESSG on a cycle, each player plays the snowdrift game, adopting its chosen strategy, against both of its neighbours in the underlying cycle and sums the payoffs thus obtained. Each player then compares its own total payoff with those of its two neighbours, adopting the strategy of the best-performing neighbour during the following round. The game dynamics are succinctly summarised in the form of a state graph, as defined in [13]. The state graph of the ESSG is a directed graph in which each vertex represents a game state, and in which a directed edge of the form \((W^1, W^2)\) indicates that the state \(W^1\) transitions to the state \(W^2\) during a single round of the game. Only automorphism class leaders appear in the state graph, however, each representing its entire class. Since the ESSG is deterministic, each vertex of its state graph has an outdegree of 1 (possibly forming a loop).

Because the state graph of the ESSG on a cycle of order \(n\) is finite (its order is at most \(2^n\)), the (infinite) sequence \(W^{1}, W^{2}, W^{3},\ldots\) of states in any ESSG instance necessarily ends in an infinite tail of repetition in one of two fundamentally different forms. The first is a limit cycle, which is represented by a directed cycle of length at least \(2\) in the state graph of the ESS. Note, therefore, that the states in a limit cycle are pairwise non-automorphic. The other fundamental form of repetition in which the sequence of game states can end is represented by a loop (a directed cycle of length \(1\)) in the state graph. A distinction is made between two different incarnations of the latter form of repetition. The first incarnation occurs if a game state \(W^{*}\) is reached during some round \(t^*\) upon which the state of the game during round \(t\) remains equal to \(W^*\) for all \(t\geq t^*\). In this case, the game state \(W^*\) is called a steady state. The second incarnation occurs if a game state \(W\) is reached (for the first time) during some round \(t\) upon which the state of the game during round \(t\) is automorphic (but not necessarily identically equal) to \(W\) for all \(t>t\). In this case, the game state \(W\) and all its subsequent states are collectively called a set of transient states. The union of the set of all steady states, the collection of all states appearing in sets of transient states and the set of all states appearing in limit cycles is referred to as the set of end states. Every component of the state graph of the ESSG therefore contains at least one end state.

Our objective in this paper is to elucidate the nature of end states of the ESSG and to characterise game states that lead asymptotically to end states containing the strategy of cooperation, referred to as the situation of persistent cooperation (i.e. game states from which the strategy of cooperation is not completely eradicated). The asymptotic game behaviour, however, depends fundamentally on the relationship between the payoff parameters \(S\) and \(T\) employed in the game. The isoclines in the \((S,T)\)-phase plane, indicated as dotted lines in Figure 2, are obtained by setting the payoffs obtainable by players adjacent to the boundaries between runs of different strategies in a game state equal to one another, i.e. \(T=S+1\) and \(T=2S\). The payoff \(2T\) received by a defector playing against two cooperators is not considered for isocline purposes as this is by definition the largest payoff attainable and should always win. The opposite is true for the payoff 0, obtained by a defector playing against two defectors. As a result, the phase plane consists of three regions (denoted by A, B and C) in which differing game dynamics are anticipated. This anticipation is confirmed by the state graphs of the ESSG on a cycle of order 7 for Regions A, B and C of the \((S,T)\)-phase plane, shown in Figure 3. The remainder of the material in this paper is partitioned into sections according to the three phase plane regions.

Figure 2. The \((S,T)\)-phase plane of the ESSG on a cycle.

Figure 3. State graphs for the ESSG on a cycle of order 7 for (a) Region A, (b) Region B and (c) Region C of the \((S,T)\)-phase plane depicted in Figure 2. A solid vertex represents a player playing the strategy of cooperation, while an open vertex represents a player playing the strategy of defection.

4. Game analysis in Region A

In Region A of the \((S,T)\)-phase plane in Figure 2, the payoffs of players adhere to the inequality chain \(0< 2S< S+1< T< 2< 2T\). In this region, the only payoffs obtainable by cooperators that beat payoffs of defectors, are \(S+1>2S>0\), which is better than the payoff of a defector adjacent to two defectors, and \(2>T\) obtained by a cooperator adjacent to two cooperators. A cooperator adjacent to a defector receives a smaller payoff than the defector because the smallest payoff of a defector adjacent to a cooperator is \(T\), while the largest payoff of a cooperator adjacent to a defector is \(S+1\). This means that there can be no growth in length of a cooperation run from one state of the ESSG in Region A to the next. There may, however, be stationary cooperation runs that allow for cooperators to coexist together with defectors indefinitely.

Note that the point in Region A where \(S=0\) lies on the boundary of the region and only violates the inequality \(2S>0\), which is a comparison of the payoffs of a defector adjacent to two defectors and of a cooperator adjacent to two defectors. Such a comparison is only realised in the partial state \(DDDCD\) and the violated inequality plays no role as the third defector obtains a payoff of \(T\) while the cooperator obtains a payoff of \(2S< T\). All defectors therefore retain their strategy and the cooperator adopts the strategy of defection during the following round of the game.

Moreover, the study of the evolutionary spatial prisoner’s dilemma on a cycle in [11] is applicable to the ESSG in Region A. That study took place in a region of a \((P,T)\)-phase plane in which \(T+P\leq 2\), with \(1< T< 2\) and \(0< P< 1\), and so setting \(P=0\) would not alter their game either as the only requirement for the region in question was that \(T+P< 2\), which still holds if \(P=0\). The dynamics of the two games are equivalent in the regions cited because their update rules are identical and their payoff matrices can both be reduced to the form

\Pi= \kbordermatrix{ ~ & C & D \cr C & 1 & 0 \cr D & T & 0 \cr}.
(2)
The results of [11] therefore also hold for Region A of the ESSG on a cycle. For the sake of completeness, the characterisation of steady states, and the probability of persistent cooperation resulting from a randomly generated initial game state are recounted from Burger et al., [11] in the remainder of this section. Bounds on the previously unstudied notion of a fixation probability in the context of the ESSG on a cycle are finally established.

4.1. The probability of persistent cooperation in Region A

The following characterisation of game states that lead to some form of persistent cooperation is due to Burger et al., [11].

Theorem 1(Requirements for persistent cooperation, restated from [11]). In the ESSG on a cycle of order \(n\geq 5\) with the payoff values satisfying \(2S< S+1< T< 2\), a game state leads to persistent cooperation if and only if it contains at least one of the substates \(CCCCC\), \(DDCCCDD\), or \(DDCCCCD\).

Burger et al., [11] used the result of Theorem 1 to establish the probability of persistent cooperation resulting from a randomly generated game state, as follows.

Theorem 2 (Probability of persistent cooperation, restated from [11]). In the ESSG on a cycle of order \(n\) with payoff parameters \(S\) and \(T\), satisfying \(2S< S+1< T\), the probability that a random distribution of strategies will lead to persistent cooperation is given by

\begin{equation} P_A(n)=1-\frac{a_n}{2^n}, \end{equation}
(3)
where the value of \(a_n\) is defined by the recurrence relation
\begin{equation}\label{Rec:A} a_n=a_{n-1}+a_{n-2}+a_{n-3}+a_{n-4}-a_{n-6}-a_{n-7} \end{equation}
(4)
with seed values \(a_{1}^{*}=1\), \(a_{2}^{*}=3\), \(a_{3}^{*}=7\), \(a_{4}^{*}=15\), \(a_5^{*}=26\), \(a_{6}^{*}=45\), and \(a_{7}^{*}=99\).

The values of \(a_n\) and \(2^n\) are tabulated in Table 2 for \(n\in \{8,\ldots,16\}\) and the probability of persistent cooperation \(P_A(n)\) is illustrated graphically in Figure 4 for \(n\in\{8,\ldots,30\}\).

Table 1.Values of \(a_n\) in (4) and \(2^n\) for \(n\in\{8,\ldots,16\}\) used to compute the probability \(P_A(n)=1-a_n / 2^n\) of persistent cooperation resulting from a randomly generated initial game state for the ESSG on a cycle of order \(n\), with payoff parameter values satisfying \(2S< S+1< T\).
\(n\) 8 9 10 11 12 13 14 15 16
\(a_n\) 183 349 668 1288 2469 4720 9061 17372 33303
\(2^n\) 256 512 1024 2048 4096 8192 16348 32768 65536

Figure 4. The probability \(P_A(n)=1-{a_n}/{2^n}\) of persistent cooperation in the ESSG on a cycle of order \(n\) in Region A of the \((S,T)\)-phase plane, as a function of \(n\).

Closer inspection of the sequence \((a_n)_{n=8,9,10,\ldots}\) and the recurrence relation which defines it, as well as a comparison thereof with the sequence \((2^n)_{n=8,9,10,\ldots}\) yields the final result recounted in this section --- the limit of the probability of persistent cooperation as the order of the underlying cycle grows.

Theorem 3 (Limiting probability of persistent cooperation, restated from [11]). In the ESSG on a cycle of order \(n\) with payoff parameters \(S\) and \(T\), satisfying \(2S< S+1< T\), the probability \(P_A(n)\) of persistent cooperation satisfies \(\lim_{n\to\infty} P_A(n) = 1\).

Although the extent of a cooperation run cannot grow in Region A of the \((S,T)\)-phase plane, the strategy of cooperation would seem to be somewhat resilient in view of the above result.

4.2. Fixation probabilities in Region A

The traditional notion of a fixation probability in the deterministic setting of the ESSG on a cycle, as considered in this paper, is augmented by the requirements of both establishment and growth of the mutant strategy. A subpopulation of mutant cooperators can never fix an entire population of defectors because of the growth requirement (recall that there are no instances in which a defector adopts the strategy of cooperation in parameter Region A). This fact is formalised in the following observation.

Observation 1 (Fixation probability of the strategy of cooperation). In the ESSG on a cycle of order \(n\) with payoff parameters \(S\) and \(T\), satisfying \(2S < S+1< T\), the fixation probability \(F_A^C(n,k)\) of a subpopulation of \(k\) mutant cooperators among a population of \(n-k\) defectors is zero.

A lower bound on the fixation probability of a subpopulation of mutant defectors is established in the next observation.

Observation 2 (Fixation probability of the strategy of defection). In the ESSG on a cycle of order \(n\) with payoff parameters \(S\) and \(T\), satisfying \(2S < S+1< T\), the fixation probability \(F_A^D(n,k)\) of a subpopulation of \(k\) mutant defectors among a population of \(n-k\) cooperators satisfies

\begin{equation} F_A^D(n,k) \geq\frac{{n-k \choose k}}{{n-1 \choose k}}. \end{equation}
(5)

Proof. Recall that once a player has adopted the strategy of defection it will not return to the strategy of cooperation during any subsequent game round. This shows that a subpopulation of mutant defectors will certainly establish itself.

Consider the likelihood that the mutating defectors are distributed in such a manner that there are no defection runs of length at least 2 during the round in which the mutation occurs. This means that each mutant defector is a singleton and so all cooperators adjacent to mutants adopt the strategy of defection during the following game round because of the defectors' payoff value of \(2T\) each, the highest obtainable in the game. After the initial mutation, at least \(k\) cooperators will therefore adopt the strategy of defection during the following round in such a scenario (each initially mutated defector is adjacent to two possibly overlapping cooperators). The number of ways in which the \(k\) mutant defectors may be positioned as described above is \({n-k \choose k}\). The total number of arrangements of the \(k\) mutants among the \(n-k\) cooperating players is \({n-k+k-1\choose k}={n-1 \choose k}\). The probability of the scenario described above is therefore \({{n-k \choose k}}/{{n-1 \choose k}}\). This is, however, only a lower bound on the fixation probability of defection because in truth there only needs to be one such singleton defector for growth of the mutant strategy to occur.

The results of Observations 1 and 2 demonstrate that the strategy of defection is favoured above the strategy of cooperation in the ESSG on cycle in Region A. This claim would seem intuitive as there is never any growth in length of cooperation runs while defection runs are able to exhibit growth in some instances. It remains true that the probability of persistent cooperation in the ESSG on a cycle in Region A of the \((S,T)\)-phase plane is high and therefore cooperation is rarely eradicated entirely on large cycles, indicating that population structure is an enabler of cooperation.

5. Game analysis in Region B

In Region B of the \((S,T)\)-phase plane in Figure 2, the payoffs of players satisfy the inequality chain \(0< 2S< T< S+1< 2< 2T\). In this region, a cooperator playing against a defector receives a larger payoff than the defector if and only if it is also adjacent to a cooperator and the defector in question is adjacent to another defector (CCDD) because of the inequality \(S+1>T\). If the cooperator were instead adjacent to another defector (DCDD), its payoff of \(2S< T\) would not be sufficient to retain its strategy of cooperation, and if the defector were instead adjacent to another cooperator instead of a defector (CCDC), its payoff of \(2T>S+1\) would be the largest achievable. If each cooperation run and each defection run has length at least 2, the growth in length of each cooperation run will continue as long as the defection runs each has length at least 2.

5.1. Characterisation of game states leading to persistent cooperation

In this section, we characterise game states that lead to end states in Region B of the \((S,T)\)-phase plane containing the strategy of cooperation. By definition, steady states are end states in which no player updates its strategy from one round to the next and therefore the game remains in the same automorphism class indefinitely. There are, of course, two trivial steady states, the all-defector state and the all-cooperator state, in which no player updates its strategy as there is no opportunity for ''learning.'' This observation, in fact, also holds for players in the interior of any run of cooperation or defection.

Two other types of steady states may potentially exist, ones arising from ties between adjacent players of opposite strategies, and ones arising from a pair of players straddling the boundary between two runs, each retaining its strategy because either its own payoff is the larger of the two, or because its neighbour in the interior of the same run obtains a payoff even larger than the neighbour in the adjacent run. The following lemma, however, answers the question of the existence of such steady states in the negative.

Lemma 4(Stand-offs are not possible). In the ESSG on a cycle of order \(n\geq 4\) with payoff parameters \(S\) and \(T\), satisfying \(2S< T< S+1\), at least one player adjacent to the boundary between two adjacent runs of (different) strategies changes its strategy during the next game round.

Proof. By contradiction. Consider the partial game state \(X_{\ell}CDX_r\). The four players adopting these strategies are referred to as the left-most player, the cooperator, the defector and the right-most player, from left to right. For a stand-off to occur between the two central players, the cooperator and the defector, one of the following cases must occur:

  1. The payoff of the cooperator equals that of the defector. This is a contradiction, because no two payoff parameters are equal in Region B of the \((S,T)\)-phase plane.
  2. \(X_r=D\) and the payoff of the defector is smaller than that of the cooperator which is, in turn, smaller than that of the right-most player. In this case, the payoff of the right-most player is at most \(T\), because this player is adjacent to at least one other defector. Furthermore, the payoff of the cooperator is \(S+1\), since its payoff is larger than that of the defector. But then the payoff of the right-most player is \(2T\), a contradiction.
  3. \(X_{\ell}=C\) and the payoff of the cooperator is smaller than that of the defector which is, in turn, smaller than that of the left-most player. In this case, the cooperator is adjacent to a defector and another cooperator, and so its payoff is \(S+1\). Furthermore, the payoff of the defector is \(2T\), and its payoff is greater than that of the cooperator. But then the payoff of the left-most player is more than \(2T\), a contradiction, because the largest payoff obtainable by a cooperator is \(2\).

Therefore, there can be no steady states other than the all-defector state and the all-cooperator state. That leaves only limit cycles and transient states as end state candidates. The nature of the ESSG in Region B of the \((S,T)\)-phase plane is such that cooperation runs grow and defection runs diminish in length under certain conditions. In order to establish these conditions, we first consider the situation in which there is only one defection run. The asymptotic game behaviour in this special case is formalised in the following lemma.

Lemma 5(The existence of oscillation clusters). In the ESSG on a cycle of order \(n\geq 4\) with payoff parameters \(S\) and \(T\), satisfying \(2S < T< S+1\), a game state consisting of a single defection run D of length \(d\geq 2\) and a single cooperation run C of length \(n-d\geq 2\), leads to the situation where the cooperation run grows in length by two during each round while the defection run diminishes in length by two until either the all-cooperator state is reached or a singleton defector remains. In the latter case, the defection run oscillates indefinitely between having length \(d=1\) and length \(d=3\) from round to round.

Proof. The payoff \(S+1\) of the two cooperators along the boundaries of the runs trumps the payoff \(T\) obtained by the two defectors on these boundaries. These defectors therefore cooperate during the subsequent round. Two cases are considered:

Case 1: The original length of the defection run \(d\) is even. In this case, the cooperation run continues to grow in length by two during each round until it encompasses the entire cycle.

Case 2: The original length of the defection run \(d\) is odd. In this case the cooperation run continues to grow by two until a singleton defector remains during some round \(t\). This defector obtains a payoff of \(2T\), while each adjacent cooperator obtains a payoff of \(S+1< 2T\), and so the adjacent cooperators defect during round \(t+1\). During round \(t+1\), the defection run again has length 3, so that the cooperation run again grows in length by two during round \(t+2\), yielding a singleton defector yet again. This situation is repeated indefinitely, and the set of three players centered on the singleton defector is said to form an oscillation cluster.

The above lemma establishes the existence of oscillation clusters in Region B of the \((S,T)\)-phase plane, which form an integral part of describing limit cycles and sets of transient states of the game in this region. Clearly, if the entire cycle consists of sufficiently long cooperation runs with oscillation clusters between them, the resulting state would form a limit cycle of length 2, as the game will return to that state during every second subsequent round. In such a limit cycle, the oscillation clusters will have length 1 or 3, and we accommodate this feature by referring to the phase of the oscillation cluster. One phase pertains to rounds during which the defection run has length 1 while the other phase pertains to rounds during which the defection run has length 3. The following lemma establishes the behaviour of singleton players on the cycle.

Lemma 6 (The behaviour of singleton players). In the ESSG on a cycle of order \(n \ge 3\) and with payoff parameters \(S\) and \(T\), satisfying \(2S < T < S+1\), any combination (possibly overlapping) of only the substates \(CDC\) and \(DCD\) necessarily results in the entire ensemble defecting during the next game round.

Proof. In each instance of the substate \(CDC\), each cooperator obtains a payoff of at most \(S+1\) while the defector obtains a payoff of \(2T\). The cooperators therefore necessarily defect during the next game round while the defector retains its strategy.

Similarly, in any instance of the substate \(DCD\), the cooperator obtains a payoff of \(2S\) while the defectors each obtains a payoff of at least \(T\). The cooperator therefore defects during the following game round. Two cases are finally considered to show that the defectors in the substate \(DCD\) do not change their strategy to cooperation during the following game round:

Case 1: Such a defector is adjacent to a cooperator outside of the substate \(DCD\). In this case, the payoff obtained by the defector in question is the largest payoff achievable, namely \(2T\), and so the defector retains its strategy.

Case 2: Such a defector is adjacent to a defector outside the substate \(DCD\). In this case, the payoff of the defector in question remains \(T\), while the only cooperator adjacent to it achieves a payoff of \(2S < T\). Therefore, the defector retains its strategy during the following round.

Sufficient conditions for the formation of oscillation clusters and subsequently sufficient conditions for game states being absorbed into limit cycles or sets of transient states are established next.

Lemma 7 (Sufficient conditions for the persistence of cooperation). In the ESSG on a cycle of order \(n\geq 4\) with payoff parameters \(S\) and \(T\), satisfying \(2S < T< S+1\), each game state containing at least one of the substates \(CCDD\) or \(CCCC\) eventually leads to a limit cycle or the all-cooperator steady state and, therefore, all defection is either eradicated or remains only in the form of oscillation clusters.

Proof. Every player contained in (possibly overlapping) substates of the form \(CDC\) or \(DCD\), or a substate of the form

\begin{equation}\label{eq:CDDsCD} DC\underbrace{DD\cdots D}_{\mbox{\(k\) players}}CD \end{equation}
(6)
during round \(t\) defects during round \(t+1\) --- in the substate \(CDC\), both cooperators adopt the strategy of defection and the defector retains its strategy by Lemma 6. In the substate \(CDCCCDC\), the cooperators adjacent to defectors defect during round \(t+1\) by Lemma 6, causing a formation of the substate \(DDDCDDD\), in which the cooperator and the two adjacent defectors form the substate \(DCD\) and so this cooperator defects during round \(t+2\), again by Lemma 6. Therefore, every player contained in neither the substate \(CCDD\) nor the substate \(CCCC\) will have been absorbed into a defection run of length at least 2 by round \(t+3\) at the latest, unless it already formed part of an oscillation cluster.

The substates \(CCDD\) and \(CCCC\) do not lead to defection runs, because in the former case the cooperator on the boundary between the two runs obtains a payoff \(S+1>T\) and so the defection run shrinks by one in length on that side, while in the latter case the partial state transitions to \(DCCD\) in a worst-case scenario during the next round. This worst-case scenario only occurs if singleton defectors are adjacent to the cooperation run, obtaining payoffs of \(2T>S+1\) (in the subsequent state, which features two instances of the substate \(CCDD\), the cooperation run grows in length).

By the latest during round \(t+2\), therefore, all cooperation runs will either have been eradicated or have length at least 2, while all of the defection runs already form part of oscillation clusters or have length \(d\geq2\) and so each defection run shrinks by two in length during in each round until it is either eradicated or forms an oscillation cluster.

As a result of the above lemma, each initial state either reaches the all-defector state, the all-cooperator state, or else a limit cycle or a set of transient states consisting of cooperation runs interspersed with oscillation clusters.

We now characterise those game states that lead to persistent cooperation in Region B of the \((S,T)\)-phase plane by showing that the sufficient conditions in Lemma 7 for the near-eradication of the defection strategy are, indeed, also necessary for the persistence of cooperation.

Theorem 8 (Characterisation of states leading to persistent cooperation). In the ESSG on a cycle of order \(n\geq 5\) with payoff parameters \(S\) and \(T\), satisfying \(2S < T< S+1\), a game state leads to an end state containing the strategy of cooperation if and only if it contains at least one of the substates \(CCDD\) and/or \(CCCC\).

Proof. It follows from Lemma 6 that any game state consisting only of combinations of the substates \(CDC\) and \(DCD\) (possibly with overlapping) leads to the all-defector state. Game states not consisting solely of combinations of the substates \(CDC\) and \(DCD\) (possibly with overlapping) necessarily contain one or more of the following substates:

  1. \(CCDD\),
  2. a run of at least four cooperators,
  3. a run of three cooperators flanked by singleton defectors, or
  4. a run of at least three defectors flanked by singleton cooperators.
Cases 1 and 2 above have already been shown to lead to persistent cooperation in Lemma 7.

In case 3 above, the game state contains the substate \(CDCCCDC\) during some round \(t\). In this substate, there are two instances of the substate \(CDC\) with an additional cooperator between them. By Lemma 6, each member of the substates \(CDC\) defects, while the internal cooperator retains its strategy of cooperation during round \(t+1\). This leads to the substate \(DDDCDDD\) during round \(t+1\). By Lemma 6, the cooperator defects during round \(t+2\).

In case 4 above, the game state contains the substate in (6) for some \(k \ge 3\) (this case is impossible for \(n=5\), while for \(n=6\) the substate in (6) is realised in the game state \(DCDDDC\) in which both cooperators are singletons which share an adjacent defector) during some round \(t\). By Lemma 7 all of the players in the substate will form a defection run of length \(k+4\) (length \(k+3\) for \(n=6\)) during round \(t+1.\)

5.2. Probability of persistent cooperation

The transfer matrix method may be used to enumerate the number of states that do not lead to persistent cooperation by Theorem 8, by constructing a digraph \(D_1\) on the vertex set \(\{v_1,\ldots,v_8\}\) in which each vertex represents one of the possible binary strings of length 3 from the alphabet \(\{C,D\}\). Moreover, vertex \(v_i\), representing the string \(s_1 s_2 s_3\), is incident to vertex \(v_j\), representing the string \(s_2 s_3 s_4\), if and only if the string \(s_1 s_2 s_3 s_4\) is neither of the substates \(CCDD\) nor \(CCCC\) required for persistent cooperation in the characterisation of Theorem 8. The digraph \(D_1\) is represented graphically in Figure 5.

Figure 5. A digraph, \(D_1\), required during the enumeration of states of length \(n\) that contain neither of the substates \(CCDD\) nor \(CCCC\) in the characterisation of Theorem 8.

The adjacency matrix of \(D_1\) is

\begin{equation} B= \begin{bmatrix} 0 & 1 & 0 & 0 & 0 & 0 & 0 & 0\\ 0 & 0 & 0 & 1 & 0 & 0 & 0 & 0\\ 1 & 1 & 0 & 0 & 0 & 0 & 0 & 0\\ 0 & 0 & 1 & 0 & 1 & 0 & 0 & 0\\ 0 & 0 & 0 & 1 & 0 & 0 & 1 & 0\\ 0 & 0 & 0 & 0 & 1 & 0 & 0 & 0\\ 0 & 0 & 0 & 0 & 0 & 1 & 0 & 1\\ 0 & 0 & 0 & 0 & 0 & 1 & 0 & 1\\ \end{bmatrix}. \end{equation}
(7)
Since the determinant \(T(x)=\det(I-xB)\) is \(1-x-x^2-x^3+x^5+x^6+x^7\), where \(I\) is the identity matrix of order \(8\), it follows by the transfer matrix method [14], that the number \(b_n\) of initial game states that contain neither of the substates required for persistent cooperation on a cycle of order \(n\), as characterised in Theorem 8, satisfies the recurrence relation
\begin{equation}\label{recB} b_n = b_{n-1}+b_{n-2}+b_{n-3}-b_{n-5}-b_{n-6}-b_{n-7}. \end{equation}
(8)
This recurrence relation requires seed values \(b_1^*,\dots,b_7^*\) in order to facilitate calculation of the values \(b_8\), \(b_9\), \(b_{10}\), \(\dots\) These seed values are the coefficients of the Maclaurin expansion of
\begin{equation} \frac{xT'(x)}{T(x)}=-x\frac{-1-2x-3x^2+5x^4+6x^5+7x^6}{1-x-x^2-x^3+x^5+x^6+x^7}, \end{equation}
(9)
given by
\begin{equation} x+3x^2+7x^3+11x^4+16x^5+27x^6+48x^7+75x^8 +\dots \end{equation}
(10)
The seed values for (8) are therefore \(b_1 ^* = 1\), \(b_2 ^* =3\), \(b_3 ^* = 7\), \(b_4 ^* =11\), \(b_5 ^* = 16\), \(b_6 ^* =27\) and \(b_7 ^* = 48\). Note that these values are not the numbers of initial states that lead to the all-defection steady states of the ESSG on cycles of orders not exceeding \(7\), but are simply seed values for the recursive expression of \(b_n\) for \(n\geq 8\).

Using these seed values in conjunction with the recursive expression (8), numerical values for \(b_8\), \(b_9\), \(b_{10}\), \(\dots\) may be determined. Considering that \(b_n\) denotes the number of possible initial states of the ESSG on a cycle of order \(n\) that lead to the all-defector steady state, and that the total number of possible initial states is \(2^n\), the probability of all players eventually defecting from a randomly generated game state is \(\frac{b_n}{2^n}\). Taking the complement, the probability of persistent cooperation in the ESSG on a cycle of order \(n\) in Region B of the \((S,T)\)-phase plane of Figure 2, is given by

\begin{equation} P_B(n) = 1- \frac{b_n}{2^n}. \end{equation}
(11)
This probability is plotted against \(n\), the order of the underlying cycle, in Figure 6. It can be seen in the figure that this probability is increasing.

Figure 6. The probability \(P_B(n)=1- {b_n}/{2^n}\) of persistent cooperation in the ESSG on a cycle of order \(n\) in Region B of the \((S,T)\)-phase plane, as a function of \(n\).

Table 3 contains the values of \(b_n\) and \(2^n\) for \(n \in\{1, \dots, 13\}\), from which it would seem that the values of \(b_n\) are increasing in \(n\), an observation which is not immediately obvious from the recurrence relation (8). The following lemma clarifies that the sequence \(b_n\) is indeed increasing.

Table 3. Values of \(b_n\) and \(2^n\) used to compute the probability \(P_B(n)=1-b_n / 2^n\) of persistent cooperation resulting from a randomly generated initial game state of the ESSG on a cycle of order \(n\), with payoff parameter values satisfying \(2S< T< S+1\).
\(n\) 1 2 3 4 5 6 7 8 9 10 11 12 13
\(b_n\) 1 3 7 11 16 27 48 80 134 228 388 659 1120
\(2^n\) 2 4 8 16 32 64 128 256 512 1024 2048 4096 8192

Lemma 9. The sequence \(b_1, b_2, b_{3}, \dots \) satisfying the recurrence relation (8) with seed values \(b_1 = 1\), \(b_2 =3\), \(b_3= 7\), \(b_4 =11\), \(b_5 = 16\), \(b_6 =27\) and \(b_7= 48\), is strictly increasing.

Proof. It is shown by the strong form of induction that \(b_n \geq \frac{6}{5} b_{n-1}\) for any natural number \(n\geq 2\). Note, as induction base case, that the statement is true for the seed values \(b_2,\dots, b_7\) and assume, as induction hypothesis, that it holds for all \(n\in \{2,\dots, k\}\), where \(k\) is some integer. Note also that \(b_n\geq0\) for all \(n\in \{2,\dots, k-1\}\) by the induction hypothesis since \(b_1=1\). It follows from (8) and repeated use of the inequality \(-b_{n-1}\geq -\frac{6}{5}b_n\) for \(n\leq k\) that \begin{equation} \begin{split} b_{k+1} &= b_{k}+b_{k-1}+b_{k-2}-b_{k-4}-b_{k-5}-b_{k-6}\\ &\geq b_k + b_{k-1}+b_{k-2}-b_{k-4}-b_{k-5}-\frac{b_{k-5}}{a}\\ &\geq b_k + b_{k-1}+b_{k-2}-b_{k-4}-\frac{a+1}{a^2}b_{k-4}\\ &\geq b_k + b_{k-1}+b_{k-2}-\frac{a^2+a+1}{a^3}b_{k-3}\\ &\geq b_k + b_{k-1}+b_{k-2}-\frac{a^2+a+1}{a^4}b_{k-2}\\ &\geq b_k + b_{k-1}-\frac{-a^4+a^2+a+1}{a^5}b_{k-1}\\ &\geq b_k-\frac{-a^5-a^4+a^2+a+1}{a^6}b_{k}\\ &= -\frac{-a^6-a^5-a^4+a^2+a+1}{a^6}b_{k}.\\ \end{split}\nonumber \end{equation} Therefore,

\begin{equation}\label{eq:finalBineq} b_{k+1} \geq \frac{(\frac{6}{5})^6+(\frac{6}{5})^5+(\frac{6}{5})^4-(\frac{6}{5})^2-(\frac{6}{5})-1}{(\frac{6}{5})^6}b_{k}. \end{equation}
(12)
Since the coefficient on the right-hand side of (12) is larger than \(6/5\), it follows that \(b_{k+1} \geq \frac{6}{5}b_k\), completing the induction process.

The fact that the sequence \(P_B (1)\), \(P_B (2)\), \(P_B (3),\ldots\) is increasing may be leveraged to show that the limit of \(P_B(n)\) as \(n \to \infty\) is unity.

Theorem 10. The probability \(P_B(n)\) that a randomly generated initial state of the ESSG on a cycle of order \(n\) with payoff parameters \(S\) and \(T\), satisfying \(2S < T< S+1\), results in some form of persistent cooperation satisfies \[\lim_{n \to \infty} P_B(n) = \lim_{n \to \infty} \left(1 - \frac{b_n}{2^n}\right) = 1.\]

Proof. Setting \(L_n = b_{n-2}+b_{n-3}-b_{n-5}-b_{n-6}-b_{n-7}\) yields \(b_n = b_{n-1}+L_n\). Subtracting \(L_n\) from \(b_{n-1}\) therefore gives \begin{align*} b_{n-1} - L_n =& \ b_{n-2}+b_{n-3}+b_{n-4}-b_{n-6}-b_{n-7}-b_{n-8}- (b_{n-2}+b_{n-3}-b_{n-5}-b_{n-6}-b_{n-7})\\ =& \ b_{n-4} + b_{n-5} - b_{n-8}. \end{align*} It follows from Lemma 9 that \(b_{n-4} + b_{n-5} - b_{n-8}> 0\) and hence that \(b_{n-1} > L_n\). This means that \(0< b_n < 2b_{n-1}\). Dividing this inequality chain right through by \(2^n\) yields \[0< \frac{b_n}{2^n} < \frac{b_{n-1}}{2^{n-1}},\] from which it follows that the sequence \(\frac{b_8}{2^8}\), \(\frac{b_9}{2^9}\), \(\frac{b_{10}}{2^{10}}\), \(\dots\) remains positive and is strictly decreasing. The Monotonic Sequence Theorem [15] guarantees convergence of the sequence under these conditions.

Having established that the sequence converges, denote its limiting value by

\begin{equation} \lim_{n \to \infty} \frac{b_n}{2^n} = V. \end{equation}
(13)
It then follows from (8) that \begin{align*} V =& \lim_{n \to \infty} \frac{b_{n-1}+b_{n-2}+b_{n-3}-b_{n-5}-b_{n-6}-b_{n-7}}{2^n} \\ =& \lim_{n \to \infty} \frac{b_{n-1}}{2^n} + \lim_{n \to \infty} \frac{b_{n-2}}{2^n}+ \lim_{n \to \infty} \frac{b_{n-3}}{2^n} - \lim_{n \to \infty} \frac{b_{n-5}}{2^n}- \lim_{n \to \infty} \frac{b_{n-6}}{2^n} - \lim_{n \to \infty} \frac{b_{n-7}}{2^n} \\ =& \ \frac{1}{2}\lim_{n \to \infty} \frac{b_{n-1}}{2^{n-1}} + \frac{1}{2^2}\lim_{n \to \infty} \frac{b_{n-2}}{2^{n-2}}+ \frac{1}{2^3}\lim_{n \to \infty} \frac{b_{n-3}}{2^{n-3}} - \frac{1}{2^5}\lim_{n \to \infty} \frac{b_{n-5}}{2^{n-5}}- \frac{1}{2^6}\lim_{n \to \infty} \frac{b_{n-6}}{2^{n-6}} - \frac{1}{2^7}\lim_{n \to \infty} \frac{b_{n-7}}{2^{n-7}} \\ =& \left(\frac{1}{2}+ \frac{1}{2^2}+ \frac{1}{2^3} -\frac{1}{2^5}-\frac{1}{2^6}-\frac{1}{2^7}\right)\lim_{n \to \infty} \frac{b_n}{2^n}.\\ =&\left(\frac{1}{2}+ \frac{1}{2^2}+ \frac{1}{2^3} -\frac{1}{2^5}-\frac{1}{2^6}-\frac{1}{2^7}\right)V, \end{align*} which implies that \(V=0\) and consequently that \(\lim_{n \to \infty} P_B(n) = 1 - 0 = 1.\)

5.3. Fixation probabilities

The long-term asymptotic limiting nature of states of the ESSG on a cycle is investigated in this section for region B of the \((S,T)\)-phase plane in the context of a small subpopulation (size \(k\)) of players playing strategy A, being introduced into a population (size \(n-k\)) of players playing strategy B. Fixation occurs for strategy A, if the number of players playing strategy A grows considerably and is not eradicated over successive game rounds.

From Lemma 7 it is clear that instances of persistent cooperation coincide with the situation in which the strategy of defection is largely eradicated, with the possible exception of oscillation clusters remaining. Should this situation stem from a small subpopulation of cooperators being introduced into a population of defectors, we have a form of "fixation." Moreover, a small subpopulation of defectors being introduced into a population of cooperators may possibly establish themselves securely but in a situation of persistent cooperation, their existence may be limited to oscillation clusters, which does not constitute widespread growth. Therefore, "fixation" of the strategy of defection coincides with the much more stringent requirement of no persistent cooperation. As a result, we define the probability of fixation for the strategies of cooperation and defection as follows: The probability of fixation of the strategy of cooperation (defection, respectively), upon introduction of a subpopulation of \(k\) mutant cooperators (mutant defectors, respectively) into a population of \(n-k\) defectors (cooperators, respectively), is denoted by \(F_B^C(n,k)\) (\(F_B^D(n,k)\), respectively) and is the probability of persistent cooperation emerging (the probability of subsequently eradicating the strategy of cooperation, respectively). We first establish a lower bound on the fixation probability of cooperation.

Theorem 11 (Lower bound on the fixation probability of cooperation). In the ESSG on a cycle of order \(n\geq 5\) with payoff parameters \(S\) and \(T\), satisfying \(2S < T< S+1\), the fixation probability of a subpopulation of \(k< n/2\) mutant cooperators satisfies

\begin{equation} F_B^C(n,k) \geq 1-\frac{\sum_{i=0}^{n-k}(-1)^i{n-k\choose i}{n-4i-1\choose k-4i}}{{n-1 \choose k}}. \end{equation}
(14)

Proof. An occurrence of the substate \(CCCC\) guarantees persistent cooperation by Theorem 8. It also guarantees that the game results in either the all-cooperator steady state or a limit cycle involving oscillation clusters. An occurrence of the substate \(CCCC\) therefore guarantees fixation of the strategy of cooperation.

In order to determine the probability of at least one occurrence of the substate \(CCCC\), when placing \(k\) cooperators randomly among a cycle of \(n-k\) defectors, consider the probability of no run of at least four cooperators resulting. This probability may be computed by considering the generating function for the number of non-negative integer solutions to the equation

\begin{equation}\label{eq:genfunFixCRegB} x_1+x_2+x_3+\cdots+x_{n-k}=k, \end{equation}
(15)
with \(x_1,\dots,x_{n-k}\leq3\). The generating function for this quantity is given by
\begin{equation}\label{genfun:fixprobCRegB} (1-z^4)^{n-k}\Big(\frac{1}{1-z}\Big)^{n-k}. \end{equation}
(16)
For all \(n\) and \(k\), the coefficient of the term \(z^k\) in the expansion of (16) is the number of non-negative integer solutions to (15). This coefficient is
\begin{equation} \sum_{i=0}^{n-k}(-1)^i{n-k\choose i}{n-4i-1\choose k-4i}. \end{equation}
(17)
The probability of not having any run of at least four cooperators is this term divided by the number of distributions of \(k\) cooperators among \(n-k\) positions with replacement --- that is,
\begin{equation}\label{fixprobQuantLB} \frac{\sum_{i=0}^{n-k}(-1)^i{n-k\choose i}{n-4i-1\choose k-4i}}{{n-1 \choose k}}. \end{equation}
(18)
The complement of the quantity in (18) is the probability that there is at least one run of at least four cooperators.

Consider next the probability of no persistent cooperation resulting from the introduction of a small number, \(k\), of defectors into a population of \(n-k\) cooperators, with \(k< n/2\).

Theorem 12(The fixation probability of defection for small \(k\)). In the ESSG on a cycle of order \(n\geq 5\) with payoff parameters \(S\) and \(T\), satisfying \(2S < T< S+1\), the fixation probability of a subpopulation of \(k< n/4\) mutant defectors is zero.

Proof. For fixation of the strategy of defection, each defector adjacent to a pair of cooperators has to be a singleton in order to avoid the substate \(CCDD\) and similarly each cooperator adjacent to a pair of defectors has to be a singleton. The minimum number of defectors required to meet these conditions is \(n/4\), as exemplified by states of the form \(CCCDCCCD\cdots CCCD\), in which there is one defector for each triple of adjacent cooperators and for which fixation of the strategy of defection will occur by the third round. For \(k\in\{1,\ldots,n/4-1\}\), however, it follows from the pigeonhole principle there will be at least one cooperation run of length at least 4, resulting in the strategy of cooperation remaining ubiquitous, with the possible exception of the formation of oscillation clusters, by Theorem 7.

The probability of fixation resulting from the introduction of a large number of defectors into a population of cooperators is considered next.

Theorem 13(Upper bound on the fixation probability of defection for large \(k\)). In the ESSG on a cycle of order \(n\geq 5\) with payoff parameters \(S\) and \(T\), satisfying \(2S < T< S+1\), the fixation probability of a subpopulation of \(k>n/4\) mutant defectors satisfies

\begin{equation} F_B^D(n,k)\leq \frac{\sum_{i=0}^{k}(-1)^i{k\choose i}{n-4i-1\choose k-1}}{{n-1 \choose n-k}}. \end{equation}
(19)

Proof. Consider placing \(n-k\) cooperators at \(k\) vertex locations along a cycle of order \(n\) (one to the right of each defector) and identifying the number of ways in which this may be achieved so that each cooperation run has length at most 3. This number is also the number of non-negative integer solutions to the equation \begin{equation} x_1+x_2+x_3+\cdots+x_{k}=n-k\nonumber \end{equation} in which \(x_1,\dots,x_k\leq3\), which is the coefficient of the term \(z^{n-k}\) in the generating function \begin{equation} (1-z^4)^{k}\Big(\frac{1}{1-z}\Big)^{k}.\nonumber \end{equation} This coefficient is \begin{equation} c_{n,k}=\sum_{i=0}^{k}(-1)^i{k\choose i}{n-4i-1\choose k-1}.\nonumber \end{equation} In order to obtain an upper bound on the desired fixation probability, the quantity \(c_{n,k}\) is divided by the total number of placements of \(n-k\) cooperators at \(k\) vertex locations along a cycle of order \(n\) with replacement, which is \({n-1 \choose n-k}\). This quotient is merely an upper bound on the fixation probability \(F_B^D(n,k)\) as there are instances which satisfy the aforementioned condition in which no cooperation run has length at least 4, and for which the fixation of defection is not guaranteed, such as, for example, instances containing the substate \(CCDD\).

By comparing the lower bound on the fixation probability of cooperation and the upper bound on the fixation probability of defection, it may be verified that the fixation probability of cooperation is greater than that of defection for all values of \(n\) and \(k< n/2\). The strategy of cooperation is therefore favoured above that of defection in Region B of the \((S,T)\)-phase plane in the ESSG on a cycle of order \(n\). The aforementioned bounds are plotted in Figure 7.

Figure 7. Fixation probability bounds for the strategies of cooperation and defection. The upper bound on the fixation probability of defection is plotted in red, while the lower bound on the fixation probability of cooperation is plotted in blue.

6. Game analysis in Region C

In Region C of the \((S,T)\)-phase plane, the inequality chain \(0< T< 2S< S+1< 2< 2T\) is satisfied, and so it is clear that a singleton cooperator can now beat an adjacent defector if the defector in question is adjacent to another defector, because \(T< 2S\). This means that singleton cooperators can only be eliminated if they are flanked on both sides by singleton defectors. Should one of the defectors be adjacent to another defector, the former defector will adopt the strategy of cooperation during the following game round. In fact, the only defectors who can retain their strategy in Region C of the phase plane are defectors in the interiors of defection runs and defectors flanked by cooperators on both sides.

6.1. Characterisation of game states leading to persistent cooperation

As was the case for Region B, it can be shown in a manner akin to the proof of Lemma 4 that there also cannot be stand-offs in Region C. This means that the only steady states are again the all-defector state and the all-cooperator state. The following lemma establishes the existence of oscillation clusters in Region C.

Lemma 14(The formation of oscillation clusters). In the ESSG on a cycle of order \(n\geq4\) with payoff parameters \(S\) and \(T\), satisfying \(T < 2S < S+1\), defection runs of length at least 3 shrink by two in length during each game round until they disappear or reach length 1 and subsequently form an oscillation cluster which alternates between having length 1 and length 3.

Proof. By definition, each defection run of length at least 3 in any state other than the all-defector state is flanked on both sides by at least one cooperator (possibly the same one in the case of \(n=4\)). Defection runs of length at least 3 thus exhibit instances of the substate \(CDD\) in which the defector adjacent to the cooperator adopts the strategy of cooperation during the next game round as a result of the inequality \(T< S+1\). Each defection run of length at least 3 therefore shrinks by 2 in length during each game round until it disappears (if its original length was even) or until it has length 1 (if its original length was odd). Furthermore, the remaining defection runs of length 1 during any game round \(t\) are flanked by at least two cooperators on each side, as a cooperator was induced on each side when the defection run shrank from length 3 to length 1. Such singleton defectors obtain the largest payoff achievable, causing the defection run to grow in length to 3 during game round \(t+1\). Again by the inequality \(T< S+1\), the resulting defection run in the newly formed substate \(CDDDC\) reduces to length 1 during game round \(t+2\), and so the three central defectors of the substate form an oscillation cluster in which the length of the defection run indefinitely alternates between having length 1 and length 3.

The next result establishes the fact that there are no end states of the ESSG on a cycle in Region C of the \((S,T)\)-phase plane other than the all-defector state, the all-cooperator state and limit cycles (or sets of transient states) exhibiting oscillation clusters of the kind described in Lemma 14.

Lemma 15(Sufficient conditions for the persistence of cooperation). In the ESSG on a cycle of order \(n\geq3\) with payoff parameters \(S\) and \(T\), satisfying \(T < 2S < S+1\), a game state containing instances of the substates \(CCC\) and/or \(CDD\) leads either to the all-cooperator state or to a limit cycle or set of transient states in which all defection runs form part of oscillation clusters.

Proof. Any portion of a state not forming part of instances of the substates \(CCC\) or \(CDD\) is either a large defection run (the ends of which exhibit instances of the substate \(CDD\)) or comprises (possibly overlapping) instances of the substate \(CDC\).

In any instance of the substate \(CDC\) during some round \(t\), the defector obtains a payoff of \(2T\), the largest payoff achievable, and therefore retains its strategy while the adjacent cooperators both adopt the strategy of defection during round \(t+1\). This results in a defection run of length at least 3 flanked on both sides by cooperators (these cooperators are guaranteed at some point along the cycle due to the presence of the substates \(CCC\) and/or \(CDD\), both of which leave at least one cooperator during the following game round). During round \(t+1\), the game state is such that all defection runs have length at least 3 (except those that had length 3 or 4 during round \(t\), and have therefore already shrunk in length to 1 or 2 by round \(t+1\)). Moreover, there exists at least one cooperation run during round \(t+1\). From round \(t+1\) onwards, each defection run either already forms part of an oscillation cluster or shrinks in length by 2 during each subsequent round until it disappears or forms an oscillation cluster, by Lemma 14. If all defection runs disappear, the all-cooperator state is reached while if at least one oscillation cluster is formed, a limit cycle of length 2 or a set of transient states of cardinality 2 is reached, defined by the number, positions and phases of the oscillation clusters.

Note that the strategy of cooperation will persist in some form under the conditions of Lemma 15. We now characterise those game states that lead to persistent cooperation in Region C of the \((S,T)\)-phase plane by showing that the sufficient conditions in Lemma 15 for the persistence of cooperation are, in fact, also necessary conditions for such persistence.

Theorem 16(Characterisation of states leading to persistent cooperation). In the ESSG on a cycle of order \(n\geq 3\) with payoff parameters \(S\) and \(T\), satisfying \(T < 2S < S+1\), an end state is reached which contains the strategy of cooperation if and only if the initial state contains the substates \(CCC\) and/or \(CDD\).

Proof. Cooperation persists from one game round to the next under the conditions of the theorem, by Lemma 15. This establishes the sufficiency of these conditions. In order to establish the necessity of the conditions, note that the conditions are not satisfied only if the game state is the all-defector state or consists of portions of alternating strategies of the form \(D \alpha_1 D \alpha_2 D \cdots D \alpha_k\) where \(\alpha_i\in\{C,CC\}\) for all \(i\in\{1,\ldots,k\}\) and any natural number \(k\). Each defector therefore appears as a singleton, and so its payoff is \(2T\), strictly the largest payoff achievable. Moreover, each cooperator is adjacent to at least one defector. All cooperators therefore change their strategy to defection within a single game round.

6.2. Probability of persistent cooperation

In this section we establish the probability of persistent cooperation from a randomly generated initial game state by enumerating all possible initial states that do not lead to persistent cooperation (i.e. states that do not contain either of the substates \(CCC\) or \(CDD\) according to Theorem 16).

The directed graph \(D_2\), shown in Figure 8, contains four vertices, each representing a possible binary string of length 2. In this digraph, a vertex \(v_i\), representing the string \(s_1 s_2\), is adjacent to another vertex \(v_j\), representing the string \(s_2 s_3\), if and only if the string \(s_1 s_2 s_3\) contains neither of the substates \(CCC\) nor \(CDD\) required for persistent cooperation.

Figure 8. A directed graph \(D_2\) used to calculate the number of binary strings of length \(n\) that do not contain the substates mentioned in Theorem 16.

The adjacency matrix of \(D_2\) is
\begin{equation}C= \begin{bmatrix} 0 & 1 & 0 & 0 \\ 1 & 0 & 1 & 0 \\ 1 & 0 & 0 & 0 \\ 0 & 0 & 0 & 1 \end{bmatrix}. \end{equation}
(20)
Since \(D_2\) has two components, one of which represents the all-defector state for each \(n\), the digraph can be simplified by considering only the vertices \(v_1\), \(v_2\) and \(v_3\), thus counting the other initial states that do not lead to persistent cooperation and adding one to this tally at a later stage. The adjacency matrix of this simplified digraph, denoted by \(D^{*}_2\), is
\begin{equation}C^{*}=\begin{bmatrix} 0 & 1 & 0 \\ 1 & 0 & 1 \\ 1 & 0 & 0 \end{bmatrix}. \end{equation}
(21)
Now det(\(I-xC^{*}) = 1-x^2 -x^3\), where \(I\) is the \(3\times3\) identity matrix. Let \(c_n\) denote the number of initial states (other than the all-defector state) for the ESSG on a cycle of order \(n\) that do not lead to persistent cooperation. Then
\begin{equation}\label{walks} \sum_{n=1}^{\infty} c_n x^n = \frac{-x(-2x-3x^2)}{1-x^2 -x^3} \end{equation}
(22)
is a generating function for the sequence \(c_1\), \(c_2\), \(c_3\), \(\dots\) Furthermore, the recurrence relation
\begin{equation}\label{recC} c_n = c_{n-2} + c_{n-3} \end{equation}
(23)
may be used to calculate the value of \(c_n\) for all \(n\geq 4\). The seed values for this recurrence relation may be determined by the Maclaurin series expansion
\begin{equation} \frac{-x(-2x-3x^2)}{1-x^2 -x^3} = 2x^2 + 3x^3 + 2x^4 + \dots \end{equation}
(24)
of the right-hand side of (22). The seed values to the recurrence relation (23) are therefore \(c_1 ^* = 0\), \(c_2 ^* =2\) and \(c_3 ^* = 3\). Note, therefore, that the actual number of initial states which do not lead to persistent cooperation is given by \(c_n +1\), including the all-defector state. Having established the number of possible initial states that do not lead to persistent cooperation, it follows that the number of states that do indeed allow for persistent cooperation is the complement \(2^n-c_n-1\). The probability of persistent cooperation resulting from a randomly generated assignment of strategies on a cycle of order \(n\) within the context of the ESSG in Region C is therefore
\begin{equation} P_C (n)=1-\frac{(c_n+1)}{2^n}. \end{equation}
(25)
Intuitively, a sequence defined as the sum of two previous, non-negative terms in the sequence is expected to be increasing, yet the fourth term of the sequence is smaller than the third, as shown in Table 4. Moreover, the sixth term is equal to the fifth.
Table 4. Values of \(c_n\) and \(2^n\) for \(n\in\{1,\ldots,10\}\) appearing in the probability expression \(P_C(n)=1-(c_n+1)/ 2^n\) of persistent cooperation resulting from a randomly generated initial state in the ESSG on a cycle of order \(n\), with payoff parameter values satisfying \(T< 2S< S+1\).
\(n \to \) 1 2 3 4 5 6 7 8 9 10
\(c_n + 1\) 1 3 4 2 5 5 7 10 12 17
\(2^n\) 2 4 8 16 32 64 128 256 512 1024
We show that the sequence is strictly increasing from the sixth term onwards.

Lemma 17. The sub-sequence \(c_6, c_7, c_8, \dots \) satisfying (23), with seed values \(c_1 = 0\), \(c_2 =2\) and \(c_3 = 3\), is strictly increasing.

Proof. By the strong form of induction over \(n\). Observe, as induction base case, that \(c_7>c_6>0\) in Table 4. Assume, as induction hypothesis, that \(c_n > c_{n-1} > 0\) for all \(n \leq k\). Finally, observe as induction step that \begin{equation} \begin{split} c_{k+1}-c_{k} &= (c_{k-1}+c_{k-2})-(c_{k-2}+c_{k-3})\\ &= c_{k-1}-c_{k-3}>0 \end{split}\nonumber \end{equation} because \(c_{k-1}>c_{k-2}>c_{k-3}\) by the induction assumption.

The probability of persistent cooperation in the ESSG on a cycle of order \(n\) in Region C of the \((S,T)\)-phase plane is plotted in Figure 9 as a function of \(n\).

Figure 9. The probability \(P_C(n)=1-c_n / 2^n\) of persistent cooperation in the ESSG on a cycle of order \(n\) in Region C of the \((S,T)\)-phase plane, as a function of \(n\).

The fact that the sequence \(P_C (6)\), \(P_C (7)\), \(P_C (8),\ldots\) is increasing may be leveraged to show that the limit of \(P_C(n)\) as \(n \to \infty\) is unity.

Theorem 18. The probability \(P_C(n)\) that a randomly generated initial state of the ESSG on a cycle of order \(n\) with payoff parameters \(S\) and \(T\), satisfying \( T < 2S < S+1\), results in some form of persistent cooperation satisfies \[ \lim_{n \to \infty} P_C(n) = \lim_{n \to \infty} \left(1 - \frac{c_n+1}{2^n} \right)= 1. \]

Proof. Setting \(J_n = c_{n-3}\) yields \(J_n = c_{n-5} + c_{n-6}\) and \(c_n = c_{n-2} + J_{n}\) by (23). Therefore,

\begin{equation} c_{n-2} - J_n = c_{n-4} + c_{n-5} - (c_{n-5} + c_{n-6}), \end{equation}
(26)
which simplifies to \[ c_{n-2} - J_n = c_{n-4} - c_{n-6}. \] It follows from Lemma 17 that \(c_{n-4} - c_{n-6}> 0\) and hence that \(c_{n-2} > J_n\). This means that \(0< c_n < 2c_{n-2}\) and so, by Lemma 17, \(2c_{n-1}>2c_{n-2}\). Therefore, \(0< c_n < 2c_{n-1}\). Dividing the latter inequality chain right through by \(2^n\) yields \[ 0< \frac{c_n}{2^n} < \frac{c_{n-1}}{2^{n-1}}, \] from which it follows that the sequence \(\frac{c_6}{2^6}\), \(\frac{c_7}{2^7}\), \(\frac{c_8}{2^8}\), \(\dots\) remains positive and is strictly decreasing. The Monotonic Sequence Theorem [15] therefore guarantees convergence of the sequence.

Having established that the sequence converges, denote its limiting value by

\begin{equation} \lim_{n \to \infty} \frac{c_n}{2^n} = W. \end{equation}
(27)
It then follows from (23) that \begin{equation*} W= \lim_{n \to \infty} \frac{c_{n-2} + c_{n-3}}{2^n} = \lim_{n \to \infty} \frac{c_{n-2}}{2^n} + \lim_{n \to \infty} \frac{c_{n-3}}{2^n} = \frac{1}{2^2}\lim_{n \to \infty}\frac{c_{n-2}}{2^{n-2}} + \frac{1}{2^3}\lim_{n \to \infty} \frac{c_{n-3}}{2^{n-3}} = \left(\frac{1}{2^2}+ \frac{1}{2^3}\right)\lim_{n \to \infty} \frac{c_n}{2^n} = \left(\frac{1}{2^2}+ \frac{1}{2^3}\right)W, \end{equation*} implying that \(W=0\) and, consequently, that \(\lim_{n \to \infty} P_C(n)=1-0=1\).

This shows that the strategy of cooperation becomes more robust as the size of the population grows in the context of the ESSG on a cycle in Region C of the \((S,T)\)-phase plane.

6.3. Fixation probabilities

As in Region B, the nature of the game dynamics in Region C is such that an investigation into the traditional notion of fixation probability makes little sense. This is because complete eradication of the strategy of defection is conditioned on the lengths of defection runs which decrease as the game progresses and end either by vanishing completely or by forming oscillation clusters. The definitions of the notions of fixation probabilities of cooperation and defection in §5.3 are are therefore again adopted in the investigation of this section pertaining to Region C of the \((S,T)\)-phase plane.

Lemma 15 describes in what sense the strategy of defection remains in situations of persistent cooperation, namely within oscillation clusters. This makes it clear that in instances of persistent cooperation, the strategy of defection, although not eradicated completely, is diminished substantially. This again leads to the points of investigation: The fixation of the strategy of cooperation is examined as the probability of persistent cooperation in the context of a subpopulation of \(k\) mutant cooperators entering a population of \(n-k\) defectors. The fixation of the strategy of defection, on the other hand, is investigated as the probability of no persistent cooperation in the context of \(k< n/2\) mutant defectors being introduced into a population of \(n-k\) cooperators.

Our first result pertains to the fixation probability of the strategy of cooperation.

Theorem 19 (Fixation probability of the strategy of cooperation). In the ESSG on a cycle of order \(n\) with payoff parameters \(S\) and \(T\), satisfying \(T < 2S < S+1\), the fixation probability \(F_C^C(n,k)\) of an entering subpopulation of \(k< n/2\) mutant cooperators among a population of \(n-k\) defectors is \(F_C^C(n,k)=1\).

Proof. Arranging the players along the cycle may be thought of as placing the \(k\) cooperators and considering each of them to be holding a container on its right-hand side. The \(n-k\) defectors then have to be distributed among the \(k\) containers. For \(k< n/2\), it follows that \(n-k>k\) and so by the pigeonhole principle, there is at least one container into which at least two defectors are placed, forming an instance of the substate \(CDD\). By Lemma 15, the game will therefore result in either the all-cooperator steady state or a limit cycle of game states in which defection is only present in the form of oscillation clusters. The presence of the substate \(CDD\) consequently guarantees fixation of the strategy of cooperation.

The following theorem provides two lower bounds on the fixation probability of the strategy of defection. These bounds are achieved by disallowing the presence of the substates \(CDD\) and \(CCC\), respectively.

Theorem 20 (Fixation probability of the strategy of defection). In the ESSG on a cycle of order \(n\) with payoff parameters \(S\) and \(T\), satisfying \(T < 2S < S+1\), the fixation probability \(F_C^D(n,k)\) of an entering subpopulation of \(k< n/2\) mutant defectors among a population of \(n-k\) cooperators satisfies

\begin{equation}\label{UB:def:dd} F_C^D(n,k)\leq \frac{{n-k \choose k}}{{n-1 \choose k}} \end{equation}
(28)
and
\begin{equation}\label{UB:def:ccc} F_C^D(n,k)\leq \frac{\sum_{i=0}^{k}(-1)^i{k\choose i}{n-3i-1\choose k-1}}{{n-1 \choose n-k}}. \end{equation}
(29)

Proof. The upper bound in (28) is the probability of no occurrences of the substate \(DD\), which is the same as occurrences of the substate \(CDD\) as the defection run containing \(DD\) must at some point be broken by a cooperation run. This probability is the number of distributions \({n-k \choose k}\) of \(k\) defectors among \(n-k\) containers along the cycle, one to the right of each cooperator, without replacement, divided by the number \({n-1 \choose k}\) of distributions (including occurrences of the substate \(DD\)) of \(k\) defectors among \(n-k\) containers along the cycle with replacement.

The upper bound in (29) is the probability of no occurrences of the substate \(CCC\). This is the number of ways in which \(n-k\) cooperators are distributed among \(k\) containers along the cycle, one to the right of each defector, without ever placing at least three cooperators in the same container, divided by the total number of ways of placing these cooperators without restriction. The number of ways of thus distributing these cooperators is number of integer solutions to the equation

\begin{equation} x_1+x_2+x_3+\dots +x_k=n-k\nonumber \end{equation} in which \(x_1\ldots,x_k\leq2\). This number is also the coefficient of \(z^{n-k}\) in the generating function
\begin{equation}\label{cccGenFun} (1-z^2)^k\left(\frac{1}{1-z}\right)^k. \end{equation}
(30)
The coefficient is
\begin{equation} d_{n,k}=\sum_{i=0}^{k}(-1)^i{k\choose i}{n-3i-1\choose k-1}. \end{equation}
(31)
This number is divided by \({k+n-k-1 \choose n-k}={n-1 \choose n-k}\), the number of distributions of \(n-k\) cooperators among \(k\) containers with replacement to yield the probability of no occurrences of the substate \(CCC\).

The upper bounds in (28) and (29) on the fixation probability of the strategy of defection are plotted in Figure 7 for \(n\in\{20,\ldots,50\}\) and \(k\in\{4,\ldots,20\}\). Note that each of the upper bounds dominates in a different region of the \((n,k)\)-plane, together forcing the fixation probability to be very small everywhere --- certainly smaller than 1, which means that the strategy of cooperation is favoured over the strategy of defection in Region C.

Figure 10. Upper bounds on the fixation probability of \(k\) defectors among \(n-k\) cooperators in the ESSG on a cycle of order \(n\) in Region C. The upper bound in (28) is plotted in cyan and the upper bound in (29) is plotted in purple.

7. Conclusion

In this paper, we analysed the long-term asymptotic behaviour of the ESSG on a cycle in respect of convergence towards particular end states of the state graph. It was found that in Region A, the behaviour of the game is identical to that of the evolutionary spatial prisoner's dilemma on a cycle of the same order, in which all end states are steady states.

The remaining two regions of the \((S,T)\)-phase plane, Regions B and C, exhibit the property that no stand-offs are possible and hence there are only two steady states, namely those in which all players play the same strategy. The remaining end states either appear as limit cycles of length 2 or else as sets of transient states of cardinality 2. A set of transient states is similar to a limit cycle in appearance, but its members are both members of the same automorphism class of game states. An emergence of limit cycles and sets of transient states involving oscillation clusters in Regions B and C is interesting (Region \(A\) does not admit limit cycles). The convergence of game states towards these limit cycles or sets of transient states is characterised by a decline in length of defection runs up to the point where all the initial defectors cooperate, or singleton defectors remain which form the centres of oscillation clusters, each containing three players.

The game dynamics were fully characterised in the context of strong and global selection dynamics (previous authors focused almost entirely on weak selection or adopted a simulated approach). The results line up particularly closely with those of Eshel et al.,[9]. The differences in the methods of analysis are, however, worth noting. The update rule adopted by Burger et al., [13] was that players directly imitate the best performing player in their own neighbourhoods, rather than those of the average payoff of cooperators and defectors, respectively. This rule is simpler as it does not require the computation of a mean. The investigation we have conducted covers three payoff parameter regions in the context of the snowdrift game, while theirs took place in the context of a prisoner's dilemma and their payoff parameters were chosen on an isocline in the payoff parameter plane. The context in which Eshel et al., [9] studied mutation is richer than ours, however, as they included mutation throughout their imitation dynamics while we have included only one chance for mutation (as is usual in the study of fixation probabilities). We thus see our investigation as complementary to the work of Eshel et al., [9], and indeed note the inherent beauty in the similarity between results for the prisoner's dilemma with an average-based imitation update rule and for the snowdrift game with an update rule based on imitating the best performing player.

The investigation culminated in an analysis of the probability of persistent cooperation in the context of a random initial assignment of strategies to the players along the cycle. These probabilities were shown to tend to unity as the order of the underlying cycle increases, indicating that in larger instances of the game, some form of cooperation is almost certain to prevail, requiring only small groups of cooperators in the initial state to overcome the defectors. The investigation then turned to the context of a small subpopulation of players playing strategy \(A\) entering a population of players playing strategy \(B\) at random locations on the cycle. In this context, attention was afforded to a variation on the notion of fixation probability adapted for deterministic update rules. In Region A it was shown that the strategy of defection is favoured, while in Regions B and C, the strategy of cooperation is favoured --- this is due to the possibility of cooperation growth. The strategy of cooperation appears to be fairly robust in this setting, exhibiting resilience in respect of near-eradication and in some instances even exhibiting growth behaviour.

Alternative underlying graph structures on which to apply the same ESSG update rule, such as ladder graphs or toroidal grids, may also be of interest, especially if the graph allows for a higher degree of clustering than is possible in cycles.

Author Contributions

All authors contributed equally to the writing of this paper. All authors read and approved the final manuscript.

Conflicts of Interest

''The authors declare no conflict of interest.''

References

  1. Maynard Smith, J. (1974). The theory of games and the evolution of animal conflicts. Journal of Theoretical Biology, 47, 209-221. [Google Scholor]
  2. Axelrod, R. (1984). The Evolution of Cooperation. Basic Books. [Google Scholor]
  3. Maynard Smith, J., & Price, G. R. (1973). The logic of animal conflict. Nature, 246, 15-18. [Google Scholor]
  4. Broom, M., & Krivan, V. (2018). Handbook of dynamic game theory, ch. Biology and Evolutionary games. Springer, 1039-1077. [Google Scholor]
  5. Cressman, R., & Apaloo, J. (2016). Handbook of dynamic game theory, ch. Evolutionary game theory. Springer, 461-510. [Google Scholor]
  6. Nowak, M., & May, R. (1992). Evolutionary games and spatial chaos. Nature, 359, 826-829.[Google Scholor]
  7. Hauert, C & Doebeli, M. (2004). Spatial structure often inhibits the evolution of cooperation in the snowdrift game. Nature, 428, 643-646. [Google Scholor]
  8. Roca, C. P., Cuesta, J. A. & Sánchez, A. (2009). Effect of spatial structure on the evolution of cooperation. Physical Review E, 4(2), https://doi.org/10.1103/PhysRevE.80.046106. [Google Scholor]
  9. Eshel, I., Samuelson, L., & Shaked, A. (1998). Altruists, egoists, and hooligans in a local interaction model. The American Economic Review, 88(1), 157-179. [Google Scholor]
  10. Ohtsuki, H., & Nowak, M. (2006). Evolutionary games on cycles. Proceedings of the Royal Society B: Biological Sciences, 73, 229-2256. [Google Scholor]
  11. Burger, A. P., van der Merwe, M., & van Vuuren, J. H. (2013). The evolutionary spatial prisoner's dilemma on a cycle. ORiON, 29(1), 1-16. [Google Scholor]
  12. Laird, R. A. (2013). Static cooperator-defector patterns in models of the snowdrift game played on cycle graphs. Physical Review E, 88(1), https://doi.org/10.1103/PhysRevE.88.012105. [Google Scholor]
  13. Burger, A. P., van der Merwe, M., & van Vuuren, J. H. (2012). An asymptotic analysis of the evolutionary spatial prisoner's dilemma on a path. Discrete Applied Mathematics, 160(15),2075-2088. [Google Scholor]
  14. Stanley, R. (2012). Enumerative Combinatorics. Cambridge University Press, 573-580.[Google Scholor]
  15. Stewart, J. (2008). Calculus. Bob Pirtle, 719. [Google Scholor]
]]>
On characteristic polynomial and energy of Sombor matrix https://old.pisrt.org/psr-press/journals/odam-vol-4-issue-3-2021/on-characteristic-polynomial-and-energy-of-sombor-matrix/ Sun, 31 Oct 2021 10:53:47 +0000 https://old.pisrt.org/?p=6046
ODAM-Vol. 4 (2021), Issue 3, pp. 29 - 35 Open Access Full-Text PDF
Gowtham Kalkere Jayanna, Ivan Gutman
Abstract:Let \(G\) be a simple graph with vertex set \(V=\{v_1,v_2,\ldots,v_n \}\), and let \(d_i\) be the degree of the vertex \(v_i\). The Sombor matrix of \(G\) is the square matrix \(\mathbf A_{SO}\) of order \(n\), whose \((i,j)\)-element is \(\sqrt{d_i^2+d_j^2}\) if \(v_i\) and \(v_j\) are adjacent, and zero otherwise. We study the characteristic polynomial, spectrum, and energy of \(\mathbf A_{SO}\). A few results for the coefficients of the characteristic polynomial, and bounds for the energy of \(\mathbf A_{SO}\) are established.
]]>

Open Journal of Discrete Applied Mathematics

On characteristic polynomial and energy of Sombor matrix

Gowtham Kalkere Jayanna, Ivan Gutman\(^1\)
Department of Mathematics, University College of Science, Tumkur University, Tumakuru, India.; (G.K.J)
Faculty of Science, University of Kragujevac, 34000 Kragujevac, Serbia.; (I.G)
\(^{1}\)Corresponding Author: gutman@kg.ac.rs

Abstract

Let \(G\) be a simple graph with vertex set \(V=\{v_1,v_2,\ldots,v_n \}\), and let \(d_i\) be the degree of the vertex \(v_i\). The Sombor matrix of \(G\) is the square matrix \(\mathbf A_{SO}\) of order \(n\), whose \((i,j)\)-element is \(\sqrt{d_i^2+d_j^2}\) if \(v_i\) and \(v_j\) are adjacent, and zero otherwise. We study the characteristic polynomial, spectrum, and energy of \(\mathbf A_{SO}\). A few results for the coefficients of the characteristic polynomial, and bounds for the energy of \(\mathbf A_{SO}\) are established.

Keywords:

Sombor index; Sombor matrix; Energy (of Sombor matrix); Characteristic polynomial (of Sombor matrix); Degree (of vertex).

1. Introduction

The Sombor index \(SO\) is a recently introduced vertex-degree-based topological index [1]. It promptly attracted much attention and its mathematical properties and chemical applications became a topic of a remarkably large number of studies, e.g., [2,3,4,5,6,7,8,9]. Also promptly, the concept of Sombor index was extended to linear algebra, by defining the Sombor matrix, which then led to the investigation of its spectrum and various spectrum-based properties [10,11,12,13,14]. In particular, the energy of the Sombor matrix was much examined [11,12,13,14]. In the present paper we report a few additional results on this matter, with emphasis on the characteristic polynomial and energy.

In this paper, we considered simple, finite, undirected, and connected graphs. Let \(G\) be such a graph, with vertex set \(\mathbf V(G)\) and edge set \(\mathbf E(G)\). If two vertices have a common edge then they are said to be adjacent. If the vertices \(u\) and \(v\) are adjacent, then the edge connecting them is denoted by \(uv\). The number of edges incident to a vertex \(v\) is called the degree of that vertex \(v\), and is denoted by \(d_v\).

In the mathematical and chemical literature, a great number of vertex-degree-based graph invariants of the form

\begin{equation} \label{eq1} TI = TI(G) = \sum_{uv \in \mathbf E(G)} \varphi(d_u,d_v) \end{equation}
(1)
have been considered, where \(\varphi\) is a suitably chosen function, with property \(\varphi(x,y)=\varphi(y,x)\). These invariants are usually referred to as topological indices. Among them are the forgotten topological index [15] \[ F(G)=\sum_{uv\in \mathbf E(G)} \big( d_u^2+d_v^2 \big) = \sum_{u\in \mathbf V(G)} d_u^3, \] the Sombor index [1] \[ SO(G) = \sum_{uv\in \mathbf E(G)} \sqrt{ d_u^2+d_v^2}, \] and many other [16,17].

The adjacency matrix \(\mathbf A(G)=(a_{ij})_{n \times n}\) of the graph \(G\) with vertex set \(\mathbf V(G)=\{v_1,v_2,\dots,v_n\}\), is the symmetric matrix of order \(n\), whose elements are defined as [18]:

\begin{equation} \label{eq2} a_{ij} = \left\{ \begin{array}{lcl} 1 & \hspace{5mm} & \mbox{if \(v_iv_j \in \mathbf E(G)\)} \\ 0 && \mbox{if \(v_iv_j \not \in \mathbf E(G)\)} \\ 0 && \mbox{if \(i=j\)}\,. \end{array} \right. \end{equation}
(2)
The characteristic polynomial of \(\mathbf A(G)\) is \(\phi(G,\lambda) = \det \big[\lambda\,\mathbf I_n - \mathbf A(G) \big]\), where \(\mathbf I_n\) is the unit matrix of order \(n\) [18]. The eigenvalues \(\lambda_1,\lambda_2,\ldots,\lambda_n\) of \(\mathbf A(G)\) form the spectrum of the graph \(G\) [18]. Recall that these eigenvalues coincide with the zeros of \(\phi(G,\lambda)\).

The energy of the graph \(G\) is defined as [19]:

\[ En(G) = \sum_{i=1}^n |\lambda_i|\,. \] The theory of graph spectra, including the theory of graph energy, is nowadays a well elaborated part of discrete mathematics. In parallel with the above specified graph-spectral concepts, we now introduce their Sombor-index-related counterparts. The following definition is an application to the Sombor index of the general spectral theory of matrices associated with vertex-degree-based topological indices of the form (1) [20,21,22].

Definition 1.

  • (1) The Sombor matrix \(\mathbf A_{SO}(G)=(so_{ij})_{n \times n}\) of the graph \(G\) with vertex set \(\mathbf V(G)=\{v_1,v_2,\dots,v_n\}\), is the symmetric matrix of order \(n\), whose elements are
    \begin{equation} \label{eq3} so_{ij} = \left\{ \begin{array}{ccl} \sqrt{d_{v_i}^2+d_{v_j}^2} & \hspace{5mm} & \mbox{if \(v_iv_j \in \mathbf E(G)\)} \\ 0 && \mbox{if \(v_iv_j \not \in \mathbf E(G)\)} \\ 0 && \mbox{if \(i=j\)}\,. \end{array} \right. \end{equation}
    (3)
  • (2) The Sombor characteristic polynomial of the graph \(G\) is \(\phi_{SO}(G,\lambda) = \det \big[\lambda\,\mathbf I_n - \mathbf A_{SO}(G) \big]\). We will write it in the form \[ \phi_{SO}(G,\lambda) = \sum_{k \geq 0} so(G,k)\,\lambda^{n-k}\,. \]
  • (3) The eigenvalues \(\sigma_1,\sigma_2,\ldots,\sigma_n\) of the Sombor matrix \(\mathbf A_{SO}(G)\) form the Sombor spectrum of the graph \(G\).
  • (4) The Sombor energy of the graph \(G\) is
    \begin{equation} \label{eq6} En_{SO}(G) = \sum_{i=1}^n |\sigma_i|\,. \end{equation}
    (4)

Since \(\mathbf A_{SO}(G)\) is a real symmetric matrix, all its eigenvalues, i.e., all roots of \(\phi_{SO}(G,\lambda)=0\), are real. Thus, they can be arranged as \(\sigma_1 \geq \sigma_2 \geq \cdots \geq \sigma_n\).

Remark 1. Comparing Equations (2) and (3), we see that the Sombor matrix can be viewed as the ordinary adjacency matrix of a graph with weighted edges, such that the weight of the edge \(v_iv_j\) is \(\sqrt{d_{v_i}^2+d_{v_j}^2}\). This observation allows us to apply to the Sombor matrix and its spectrum the standard methods of graph spectral theory [18], in particular the Sachs coefficient theorem [23].

2. Preliminaries

The following elementary spectral properties of the Sombor matrix were recognized in several earlier studies [10,11,12,13,14].

Lemma 1. Let \(G\) be a graph with Sombor eigenvalues \(\sigma_1, \sigma_2,\ldots,\sigma_n\). Then \begin{align*} \sum_{i=1}^n \sigma_i = & 0,\;\;\;\;\;\;\;\;\;\;\;\;\;\;\; \nonumber \end{align*}

\begin{align} \sum_{i=1}^n \sigma_i^2 = & 2F(G) \label{eq4a}, \end{align}
(5)
\begin{align} \sum_{i=1}^n \sigma_i^3 = & 6\,\sum_{\Delta} \prod_{uv\in \mathbf E(\Delta)} \sqrt{d_u^2+d_v^2} \label{eq4}, \end{align}
(6)
or, equivalently, \begin{align*} so(G,1) & = 0 ,\\ so(G,2) & = -F(G), \\ so(G,3) & = -2\,\sum_{\Delta} \prod_{uv\in \mathbf E(\Delta)} \sqrt{d_u^2+d_v^2}, \end{align*} where \(\sum_\Delta\) indicates summation over all triangles contained in the graph \(G\).

Formula (6) can be generalized as follows:

Lemma 2. Let \(p\) be the size of smallest odd cycle contained in the graph \(G\), and let \(\sum_{C_p}\) indicate summation over all cycles of size \(p\) contained in \(G\). Then for \(q=1,3,\ldots,p-2\),

\begin{equation} \label{eq5} \sum_{i=1}^n \sigma_i^q = 0 \end{equation}
(7)
whereas \[ \sum_{i=1}^n \sigma_i^p = 2p\,\sum_{C_p} \prod_{uv \in \mathbf E(C_p)} \sqrt{d_u^2+d_v^2} \] or, equivalently, \[ so(G,p) = -2\,\sum_{C_p} \prod_{uv \in \mathbf E(C_p)} \sqrt{d_u^2+d_v^2}\,. \] If \(G\) does not possess odd cycles, i.e., if \(G\) is bipartite, then relations (7) and \(so(G,q)=0\) hold for all odd values of \(q\).

Proof. Take into account Remark 1, and use the analogous result for ordinary graphs [18].

Lemma 3. [24,25] Suppose that \(a_i\) and \(b_i\) are non negative real numbers for \(1\leq i \leq n\). Then, \[ \left( \sum_{i=1}^n a_i^2\right) \left( \sum_{i=1}^n b_i^2\right) \leq \dfrac{1}{4}\left( \sqrt{\dfrac{M_1\,M_2}{m_1\,m_2}} + \sqrt{\dfrac{m_1\,m_2}{M_1\,M_2}}\right)^2 \left(\sum_{i=1}^n a_i\,b_i \right)^2 \] where \(M_1=\max\limits_{1\leq i \leq n} a_i\)  ,\(M_2=\max\limits_{1\leq i \leq n} b_i\),   \(m_1=\min\limits_{1\leq i \leq n}a_i\) ,  and \(m_2=\min\limits_{1\leq i \leq n}b_i\) .

Lemma 4. [24,25] Using the same notation as in Lemma 3, \[ \left( \sum_{i=1}^n a_i^2\right) \left( \sum_{i=1}^n b_i^2\right) - \left(\sum_{i=1}^n a_i\,b_i \right)^2 \leq \dfrac{n^2}{4}\left( M_1\,M_2-m_1\,m_2\right)^2\,. \]

3. New bounds for Sombor energy

Various lower and upper bounds for Sombor energy were already reported in [10,11,12,13]. In this section we establish a few more.

We first recall a result by Lin and Miao [13], that can be stated in terms of traces of the Sombor matrix. It should be compared with the below Theorem 2. The upper bound was obtained also in [12]. Note that \(tr(\mathbf A_{SO}(G)^2)=2F(G)\) follows from Equation (5).

Theorem 1. [13] Denote the trace of a square matrix \(\mathbf M\) by \(tr(\mathbf M)\). Let \(G\) be a graph on \(n\) vertices. Then \[ \sqrt{tr(\mathbf A_{SO}(G)^2)} \leq En_{SO}(G) \leq \sqrt{n\,tr(\mathbf A_{SO}(G)^2)} \] i.e., \[ \sqrt{2F(G)} \leq En_{SO}(G) \leq \sqrt{2n\,F(G)}\,. \]

Theorem 2. Let \(G\) be a non-trivial graph. Then \[ En_{SO}(G) \geq \sqrt{\dfrac{\big[tr(\mathbf A_{SO}(G)^2)\big]^3}{tr(\mathbf A_{SO}(G)^4)}}\,. \]

Proof. By the Hölder inequality, \[ \sum_{i=1}^n a_i\,b_i \leq \left( \sum_{i=1}^n a_i^p \right)^{1/p} \left( \sum_{i=1}^n b_i^q \right)^{1/q} \] where, \(a_i,b_i \in \mathbf{R}^+\), \((i=1,2,3\dots,n)\). Setting \(a_i=|\sigma_i|^{2/3}\), \(b_i=|\sigma_i|^{4/3}\), \(p=3/2\), and \(q=3\), we get \[ \sum_{i=1}^n |\sigma_i|^2 \leq \left( \sum_{i=1}^n |\sigma_i| \right)^{2/3} \left(\sum_{i=1}^n |\sigma_i|^4 \right)^{1/3} \] which by Equation (4), and bearing in mind that since \(G\) is not an empty graph and thus \(\sum_{i=1}^n|\sigma_i|^4\neq0\), yields Theorem 2.

Theorem 3. If \(\sigma_1\) is the greatest Sombor eigenvalue, then \(En_{SO}(G) \leq 2\sigma_1\). For connected graphs, equality holds if and only if \(G\) is a complete bipartite graph.

Proof. Bearing in mind Equation (4), \[ En_{SO}(G) = |\sigma_1|+\sum_{i=2}^n |\sigma_i| \geq |\sigma_1|+ \left| \sum_{i=2}^n \sigma_i\right|\,. \] On the other hand, \[ \sum_{i=1}^n \sigma_i=0 \ \ \ \ \implies \ \ \ \ \sigma_1=-\sum_{i=2}^n \sigma_i \ \ \ \ \text{and so} \ \ \ \ |\sigma_1|=\left| \sum_{i=2}^n \sigma_i\right|\,. \] Equality holds if \(\sigma_1\) and \(\sigma_n\) are the only non-zero eigenvalues. In view of Remark 1, this happens only if \(G\) is a complete bipartite graph.

Theorem 4. Let \(G\) be a graph with \(n\) vertices. If no Sombor eigenvalue of \(G\) is equal to zero, then \[ En_{SO}(G) \geq \sqrt{\dfrac{8n\,F(G)\,\sigma_\ell\,\sigma_s}{|\sigma_\ell|+|\sigma_s|}} \] where, \(|\sigma_\ell|\) and \(|\sigma_s|\) are, respectively, the largest and smallest absolute values of the eigenvalues in the Sombor spectrum of \(G\). Of course, \(|\sigma_\ell|=\sigma_1\).

Proof. Setting in Lemma 3, \(a_i=|\sigma_i|\) and \(b_i=1\) for \(1\leq i \leq n\), we get \[ \left(\sum_{i=1}^n |\sigma_i|^2 \right) \left( \sum_{i=1}^n 1\right) \leq \dfrac{1}{4}\left( \sqrt{\dfrac{|\sigma_\ell|}{|\sigma_s|}} + \sqrt{\dfrac{|\sigma_s|}{|\sigma_\ell|}}\right)^2 \left(\sum_{i=1}^n |\sigma_i| \right)^2, \] where \(|\sigma_\ell| = \max\limits_{1\leq i \leq n}\{|\sigma_i|\}\) and \(|\sigma_s| = \min\limits_{1\leq i \leq n}\{|\sigma_i|\}\). Then \[ 2F(G)\,n \leq \dfrac{1}{4}\left( \sqrt{\dfrac{|\sigma_\ell|}{|\sigma_s|}} + \sqrt{\dfrac{|\sigma_s|}{|\sigma_\ell|}}\right)^2 \left(\sum_{i=1}^n |\sigma_i| \right)^2 \] and thus \[ \sqrt{8n\,F(G)} \leq \left(\dfrac{|\sigma_\ell|+|\sigma_s|}{\sqrt{\sigma_\ell\,\sigma_s}} \right) En_{SO}(G) \] which straightforwardly leads to Theorem 4.

Theorem 5. Let \(G\) be a connected graph with \(n\) vertices, and \(\sigma_\ell\,,\,\sigma_s\) same as in Theorem 4. Then \[ En_{SO}(G)\geq \sqrt{2n\,F(G)-\dfrac{n^2}{4}(|\sigma_\ell|-|\sigma_s|)} \]

Proof. Setting in Lemma 4, \(a_i=|\sigma_i|\) and \(b_i=1\) for \(1\leq i \leq n\), we get \[ \left( \sum_{i=1}^{n} |\sigma_i|^2\right) \left( \sum_{i=1}^{n} 1\right)-\left(\sum_{i=1}^{n} |\sigma_i| \right)^2 \leq \dfrac{n^2}{4}\left( |\sigma_\ell|-|\sigma_s|\right)^2, \] implying \[ 2F(G)\,n -En_{SO}(G)^2 \leq \dfrac{n^2}{4}(|\sigma_\ell|-|\sigma_s|)^2\,. \] Theorem 5 follows.

4. On Sombor energy of trees

In this section we focus our attention to trees. Let \(T\) be a tree on \(n\) vertices, \(n \geq 2\). The main result in the spectral theory of trees is the formula [18,26,27]
\begin{equation} \label{tpoly} \phi(T,\lambda) = \lambda^n + \sum_{k \geq 1} (-1)^k\,m(T,k)\,\lambda^{n-2k} \end{equation}
(8)
where \(m(T,k)\) stands for the number of \(k\)-matchings (= selections of \(k\) mutually independent edges) in the tree \(T\). By definition, \(m(T,1)=n-1\).

As explained in Remark 1, the matrix \(\mathbf A_{SO}(G)\) can be viewed as the adjacency matrix of a graph with weighted edges. This, of course, applies also to trees.

According to the Sachs coefficient theorem [18,23], for the Sombor characteristic polynomial of a tree \(T\), an expression analogous to Equation (8) would hold, namely

\begin{equation} \label{5a} \phi_{SO}(T,\lambda) = \lambda^n + \sum_{k \geq 1} (-1)^k\,m_{SO}(T,k)\,\lambda^{n-2k}\,. \end{equation}
(9)
The coefficient \(m_{SO}(T,k)\) is equal to the sum of weights coming from all \(k\)-matchings of \(T\). Each particular \(k\)-matching contributes to \(m_{SO}(T,k)\) by the product of the squares of the terms \(\sqrt{d_u^2+d_v^2}\), pertaining to the edges contained in that matching [23]. Thus, let \(M\) be a distinct \(k\)-matching of \(T\), and let \(\mathcal M(k)\) be the set of all such \(k\)-matchings. Then for \(k \geq 1\), \(\mathcal M(k)\) consists of \(m(T,k)\) elements, i.e., \(|\mathcal M(k)| = m(T,k)\).

The weight of a single matching \(M\) is equal to \(\prod\limits_{uv \in M} \big(d_u^2+d_v^2 \big)\) and therefore

\begin{equation} \label{5} m_{SO}(T,k) = \sum_{M \in \mathcal M(k)}\, \prod\limits_{uv \in M} \big(d_u^2+d_v^2 \big) \end{equation}
(10)
provided \(\mathcal M(k) \neq \emptyset\). If, on the other hand, \(\mathcal M(k) = \emptyset\), then \(m_{SO}(T,k)=0\).

We thus see that the coefficients \(m_{SO}(T,k)\) are positive if \(m(T,k)>0\) and are equal to zero if \(m(T,k)=0\). This implies:

Theorem 6. The inertia of the Sombor matrix and of the ordinary adjacency matrix of any tree coincide.

The energy of a tree can be computed from its matching polynomial as [28]:
\begin{equation} \label{CIF} En(T) = \frac{2}{\pi}\,\int\limits_0^\infty \frac{dx}{x^2}\,\ln \left[ 1 + \sum_{k \geq 1} m(T,k)\,x^{2k}\right] dx\,. \end{equation}
(11)
The analogous expression for the Sombor energy is
\begin{equation} \label{tCIF} En_{SO}(T) = \frac{2}{\pi}\,\int\limits_0^\infty \frac{dx}{x^2}\,\ln \left[1 + \sum_{k \geq 1} m_{SO}(T,k)\,x^{2k}\right] dx \end{equation}
(12)
and can be obtained in the exactly same manner as Equation (11) [28,29].

Since, evidently, \(m_{SO}(T,k) > m(T,k)\) holds whenever the tree \(T\) has at least one \(k\)-matching, by comparing Equations (11) and (12), we immediately arrive at:

Theorem 7. For any tree \(T\), \(En_{SO}(T) > En(T)\).

Author Contributions

All authors contributed equally to the writing of this paper. All authors read and approved the final manuscript.

Conflicts of Interest

''The authors declare no conflict of interest.''

References

  1. Gutman, I. (2021). Geometric approach to degree-based topological indices: Sombor indices. MATCH Communications in Mathematical and in Compututer Chemistry, 86, 11-16. [Google Scholor]
  2. Aguilar-Sánchez, R., Méndez-Bermúdez, J. A., Rodríguez, J. M., & Sigarreta, J. M. (2021). Normalized Sombor indices as complexity measures of random graphs. Entropy, 23(8), Article No. 976, https://doi.org/10.3390/e23080976. [Google Scholor]
  3. Cruz, R., Rada, J., & Sigarreta, J. M. (2021). Sombor index of trees with at most three branch vertices. Applied Mathematics and Computation, 409, Article No. 126414, https://doi.org/10.1016/j.amc.2021.126414. [Google Scholor]
  4. Das, K. C., & Gutman, I. (2022). On Sombor index of trees. Applied Mathematics and Computation, 412, Article No. 126525, https://doi.org/10.1016/j.amc.2021.126575. [Google Scholor]
  5. Das, K. C., & Shang, Y. (2021). Some extremal graphs with respect to Sombor index. Mathematics, 9(11), Article No. 1202, https://doi.org/10.3390/math9111202. [Google Scholor]
  6. Gutman, I. (2021). Some basic properties of Sombor indices. Open Journal of Discrete Applied Mathematics, 4(1), 1-3.[Google Scholor]
  7. Rada, J., Rodríguez, J. M., & Sigarreta, J. M. (2021). General properties on Sombor indices. Discrete Applied Mathematics, 299, 87-97. [Google Scholor]
  8. Redžepovic, I. (2021). Chemical applicability of Sombor indices. Journal of the Serbian Chemical Society, 86, 445-457. [Google Scholor]
  9. Réti, T., Došlic, T., & Ali, A. (2021). On the Sombor index of graphs. Contributions to Mathematics, 3, 11-18. [Google Scholor]
  10. Ghanbari, B. (2021). On the Sombor characteristic polynomial and Sombor energy of a graph. arXiv, arXiv:2108.08552. [Google Scholor]
  11. Gowtham, K. J., & Swamy, N. N. (2021). On Sombor energy of graphs. Nanosystems: Physics, Chemistry, Mathematics, 12, 411-417. [Google Scholor]
  12. Gutman, I. (2021). Spectrum and energy of the Sombor matrix. Milirary Technical Courier, 69, 551-561. [Google Scholor]
  13. Lin, Z., & Miao, L. (2021). On the spectral radius, energy and Estrada index of the Sombor matrix of graphs. arXiv, arXiv: 2102.03960. [Google Scholor]
  14. Wang, Z., Mao, Y., Gutman, I., Wu, J., & Ma, Q. (2022). Spectral radius and energy of Sombor matrix of graphs. Filomat, In Press. [Google Scholor]
  15. Furtula, B., & Gutman, I. (2015). A forgotten topological index. Journal of Mathematical Chemistry, 53, 1184-1190. [Google Scholor]
  16. Kulli, V. R. (2020). Graph indices, in: Pal, M., Samanta, S., & Pal A. (Eds.). Handbook of Research of Advanced Applications of Graph Theory in Modern Society. Hershey: Global, pp. 66-91. [Google Scholor]
  17. Vukicevic, D., & Gašperov, M. (2010). Bond additive modeling 1. Adriatic indices. Croatica Chemica Acta, 83, 243-260. [Google Scholor]
  18. Cvetkovic, D., Rowlinson, P., Simic, S. K. (2010). An Introduction to the Theory of Graph Spectra. Cambridge: Cambridge University Press. [Google Scholor]
  19. Li, X., Shi, Y., & Gutman, I. (2012). Graph Energy. New York: Springer. [Google Scholor]
  20. Li, X., & Wang, Z. (2021). Trees with extremal spectral radius of weighted adjacency matrices among trees weighted by degree-based indices. Linear Algebra and Its Applications, 620, 61-75. [Google Scholor]
  21. Das, K. C., Gutman, I., Milovanovic, I., Milovanovic, E., & Furtula, B. (2018). Degree-based energies of graphs. Linear Algebra and Its Applications, 554, 185-204. [Google Scholor]
  22. Shao, Y., Gao, Y., Gao, W., & Zhao, X. (2021). Degree-based energies of trees. Linear Algebra and Its Applications, 621, (2021) 18-28. [Google Scholor]
  23. Sachs, H. (1964). Beziehungen zwischen den in einem Graphen enthaltenen Kreisen und seinem charakteristischen Polynom. Publicationes Mathematica (Debrecen), 11, 119-134. [Google Scholor]
  24. Mitrinovic, D. S., & Vasic, P. M. (1970). Analytic Inequalities. Berlin: Springer.[Google Scholor]
  25. Ozeki, N. (1968). On the estimation of inequalities by maximum and minimum values. Journal of the College of Arts and Science Chiba University, 5, 199-203. [Google Scholor]
  26. Godsil, C. D., & Gutman, I. (1981). On the theory of the matching polynomial. Journal of Graph Theory, 5, 137-144. [Google Scholor]
  27. Godsil, C. D., & Royle, G. (2001). Algebraic Graph Theory. New York: Springer. [Google Scholor]
  28. Gutman, I. (1977). Acyclic systems with extremal Hückel \(\pi\)-electron energy. Theoretica Chimica Acta, 45, 79-87. [Google Scholor]
  29. Mateljevic, M., Božin, V., & Gutman, I. (2010). Energy of a polynomial and the Coulson integral formula. Journal of Mathematical Chemistry, 48, 1062-1068. [Google Scholor]
]]>
A note: Characterization of star, helm, flower and complete graphs by total vertex stress https://old.pisrt.org/psr-press/journals/odam-vol-4-issue-3-2021/a-note-characterization-of-star-helm-flower-and-complete-graphs-by-total-vertex-stress/ Sun, 31 Oct 2021 10:40:20 +0000 https://old.pisrt.org/?p=6044
ODAM-Vol. 4 (2021), Issue 3, pp. 24 - 28 Open Access Full-Text PDF
Johan Kok
Abstract:This note presents the characterization of the families of star, helm, flower and complete graphs by total vertex stress. The note does not present results for many families of graphs but, it highlights important philosophical (math. phil.) aspects for further research. In particular the novelty concepts of forgiven contradictions denoted by, iff\(_f\) as well as iffness and \(f\)-statements are introduced. The author suggests that the characterization of other families of graphs by total vertex stress is possible.
]]>

Open Journal of Discrete Applied Mathematics

A note: Characterization of star, helm, flower and complete graphs by total vertex stress

Johan Kok
Independent Mathematics Researcher, City of Tshwane, South Africa & Visiting Faculty at CHRIST (Deemed to be a University), Bangalore, India.; jacotype@gmail.com; johan.kok@christuniversity.in; Tel.: +27646547285

Abstract

This note presents the characterization of the families of star, helm, flower and complete graphs by total vertex stress. The note does not present results for many families of graphs but, it highlights important philosophical (math. phil.) aspects for further research. In particular the novelty concepts of forgiven contradictions denoted by, iff\(_f\) as well as iffness and \(f\)-statements are introduced. The author suggests that the characterization of other families of graphs by total vertex stress is possible.

Keywords:

Forgiven contradictions; f-statements; Iffness; Total vertex stress.

1. Introduction

Only, finite, undirected and connected simple graphs are considered. It is assumed that the reader is familiar with the basic notions and notation of graph theory. However, useful definitions will be recalled as is necessary. Unless stated otherwise, reference to vertices \(u,v \in V(G)\) will mean that \(u\) and \(v\) are distinct vertices. When required, the vertices of a graph \(G\) of order \(n \in \mathbb{N}\) will be label as \(v_i\), \(1 \leq i \leq n\). For clarity with regards to notation or undefined concepts in graph theory the reader is referred to [1].

The notion of vertex stress in a graph \(G\) denoted by, \(\mathcal{S}_G(v)\), \(v\in V(G)\) was introduced by the researcher Alfonso Shimbel [2]. The vertex stress of vertex \(v\in V(G)\) is the number of times \(v\) is contained as an internal vertex in all shortest paths between all pairs of distinct vertices in \(V(G)\backslash \{v\}\). Formally stated, \(\mathcal{S}_G(v) = \sum\limits_{u\neq w\neq v\neq u}\sigma(v)\) with \(\sigma(v)\) the number of shortest paths between vertices \(u\), \(w\) which contain \(v\) as an internal vertex. Such a shortest \(uw\)-path is also called a \(uw\)-distance path, see [2,3]. The total vertex stress of \(G\) is given by \(\mathcal{S}(G) = \sum\limits_{v\in V(G)}\mathcal{S}_G(v)\), [4]. Suggested reading which is strongly related to total vertex stress can be found in [3,5,6].

Certain graphs are often grouped as a family of graphs. A family of graphs is defined as those graphs which share a well-defined structural property or a parameter property or other. It is permissible to establish a family of graphs such that, all graphs in the family share a combination of structural and parameter (or invariant) or other properties. For example, all trees are a family of graphs. The structural properties which define this family are: a tree is an undirected graph in which each pair of vertices is connected by exactly one path. However, the family of trees of order \(n \geq 2\) is also a proper subfamily (also referred to as a subset) of the family of \(2\)-colorable graphs. Furthermore, the reader might be familiar with subfamilies (families in their own right). For example, the family of paths and the family of stars are subfamilies of trees. The cycle \(C_3\) belongs to the family of complete graphs and it belongs to the family of cycles and to the family of \(3\)-colorable graphs and to the family of geodetic graphs and others. On the other hand the cycle \(C_5\) does not belong to the family of complete graphs but it belongs to the family of cycles and the family of \(3\)-colorable graphs and the family of geodetic graphs.

Consider two families of graphs denoted by \(\mathcal{F}_1\) and \(\mathcal{F}_2\). Assume an invariant of graphs say, \(\sigma(G)\) is expressed as closed formula in respect of the order \(n\) of the graphs in a specific family of graphs. Let \(\sigma(G) = f_1(n),~\forall n \in \mathbb{N}\), \(G \in \mathcal{F}_1\) and \(\sigma(H) = f_2(n),~\forall n \in \mathbb{N}\), \(H \in \mathcal{F}_2\). It is possible that some graphs of specific order (not all) belong to both \(\mathcal{F}_1\) and \(\mathcal{F}_2\). This means that for specific order i.e. \(n\) for which \(f_1(n) = f_2(n)\). For the purpose of characterization the observation that \(\mathcal{F}_1 \cap \mathcal{F}_2 \neq \emptyset\) could be viewed as contradiction of proof.

If \(\sigma(G) = f_1(n),~\forall n \in \mathbb{N}\), \(G \in \mathcal{F}_1\) is unique to \(\mathcal{F}_1\) on the strict requirement: "for all n" and \(\sigma(H) = f_2(n),~\forall n \in \mathbb{N}\), \(H \in \mathcal{F}_2\) is unique to \(\mathcal{F}_2\) on the strict requirement: "for all n" then the cases where \(f_1(n) = f_2(n)\) are said to be forgiven contradictions. Hence, if \(\sigma(G) = f_1(n),~\forall n \in \mathbb{N}\) is the closed formula for the family of graphs \(\mathcal{F}_1\) on the strict requirement: "for all n" then the statement: \begin{equation}G \in \mathcal{F}_1 iff_f \sigma(G) = f_1(n),~\forall n \in \mathbb{N}, \end{equation} is valid. Note that iff\(_f\) denotes that forgiven contradictions may exist. We state an important lemma;

Lemma 1. For any connected graph \(G\) of order \(n\), a connected predecessor graph \(H\) of order \(n-1\) exists from which \(G\) can be obtained by adding 1 vertex say, \(v_n\) with an appropriate number of well-defined edges with each edge having the vertex \(v_n\) as an end-vertex.

Proof. It is known that a connected graph has at least two vertices which are not cut-vertices, see [1]. Without loss of generality let vertices \(u,v\) be such vertices in a connected graph \(G\). Then graph \(G-u\) or \(G-v\) suffices to be a connected predecessor graph (for brevity, predecessor graph) of \(G\).

2. Characterization of star graphs by total vertex stress

A star graph (for brevity, a star) is a tree which has a central vertex \(v_0\) with \(m \geq 0\) pendent vertices (or leafs) attached to \(v_0\). The star is denoted by \(S_{1,m}\) and let the family of stars be \(\mathcal{F}_1\). Therefore, \(S_{1,0} \cong K_1 \cong P_1\). The star \(S_{1,1} \cong K_2 \cong P_2\) and \(S_{1,2} \cong P_3\). It is known that \(\mathcal{S}(S_{1,m}) = \frac{m(m-1)}{2}\), \(\forall m \in \mathbb{N}_0\).

Theorem 1. A tree \(T \in \mathcal{F}_1\) (or \(T \cong S_{1,m}\)) for some \(m \in \mathbb{N}_0\) iff\(_f\) \(\mathcal{S}(T) = \frac{(n-1)(n-2)}{2}\), \(n = m+1\).

Proof. It is known that in terms of the order \(n = m+1\) of a star, \(\mathcal{S}(S_{1,m}) = \frac{(n-1)(n-2)}{2}\), \(\forall m \in \mathbb{N}_0\). We only have to proof the converse.

It is known that \(\mathcal{S}(K_1) = 0 = \frac{(1-1)(1-2)}{2}\) and \(K_1 \cong S_{1,0}\). All connected graphs of order 1 are accounted for. It is known that \(\mathcal{S}(P_2) = 0 = \frac{(2-1)(2-2)}{2}\) and \(P_2 \cong S_{1,1}\). All connected graphs of order 2 are accounted for. Let \(G = S_{1,1}\) be the predecessor graph from which all possible connected graphs of order 3 can be obtained by adding one vertex with appropriate edges. Also minimize the number of such graphs of order 3 by isomorphism. Hence, the graphs \(S_{1,2}\) or \(C_3\) can be obtained. It is known that \(\mathcal{S}(S_{1,2}) = 1 = \frac{(3-1)(3-2)}{2}\) and \(\mathcal{S}(C_3) = 0 \neq \frac{(3-1)(3-2)}{2}\), \(C_3 \ncong S_{1,2}\). Furthermore, \(C_3\) is not a tree. All connected graphs of order 3 are accounted for. There are six connected graphs of order 4. From the source graphclasses.org/smallgraphs.html\#4nodes we consider each graph.

  • (i) The complete graph \(K_4\) has \(\mathcal{S}(K_4) = 0 \neq \frac{(4-1)(4-2)}{2}\), \(K_4 \ncong S_{1,3}\). Also, the predecessor graph is cycle \(C_3\). Furthermore, \(K_4\) is not a tree.
  • (ii) The diamond \(D\) has \(\mathcal{S}(D) = 2 \neq \frac{(4-1)(4-2)}{2}\), \(D \ncong S_{1,3}\). Also, the predecessor graph is either \(S_{1,2}\) or \(C_3\). Furthermore, \(D\) is not a tree.
  • (iii) The paw (or pan) \(G\) has \(\mathcal{S}(G) = 2 \neq \frac{(4-1)(4-2)}{2}\), \(G \ncong S_{1,3}\). Also, the predecessor graph is either \(S_{1,2}\) or \(C_3\). Furthermore, a paw \(G\) is not a tree.
  • (iv) The cycle \(C_4\) has \(\mathcal{S}(C_4) = 4 \neq \frac{(4-1)(4-2)}{2}\), \(C_4 \ncong S_{1,3}\). Also, the predecessor graph is \(S_{1,2}\). Furthermore, \(C_4\) is not a tree.
  • (v) The path \(P_4\) has \(\mathcal{S}(P_4) = 4 \neq \frac{(4-1)(4-2)}{2}\), \(P_4 \ncong S_{1,3}\). Also, the predecessor graph is \(S_{1,2}\).
  • (vi) The star \(S_{1,3}\) has \(\mathcal{S}(S_{1,3}) = 3 = \frac{(4-1)(4-2)}{2}\). Also, the predecessor graph is \(S_{1,2}\).
For a star \(S_{1,n}\) the predecessor graph is uniquely the star \(S_{1,n-1}\). Clearly the result holds for all trees of order 1, 2, 3 and 4. Assume that the result that, for the family of trees of order \(k\) it holds true that if \(\mathcal{S}(T) = \frac{(k-1)(k-2)}{2}\) then \(T \cong S_{1,k-1}\). Consider a tree \(T\) of order \(k+1\) which by Lemma 1 is obtained from a predecessor graph of order \(k\). Since, \begin{equation} \frac{[(k+1)-1][(k+1)-2]}{2} - \frac{(k-1)(k-2)}{2} = k-1 \end{equation} it implies that each shortest path from say, \(v_k\) to vertices \(v_i\), \(i=1,2,3,\dots,k-1\) accounts for vertex stress equal to 1 and for a neighbor say, \(v_0\) of \(v_k\) the vertex stress count is 0. This is only possible if \(T \cong S_{1,k}\). It is known from [4] that for paths \(\mathcal{S}(P_n) = \frac{n(n-1)(n-2)}{6}\). Utilizing forgiven contradictions for \(n = 1,2,3\) to meet the strict requirement: "for all n" the result \begin{equation} T \in \mathcal{F}_1 (\  or \  T \cong S_{1,m}) \  for \  some \  m \  \in \  \mathbb{N}_0 \  iff_f \  \mathcal{S}(T) = \frac{(n-1)(n-2)}{2}, n = m+1, \end{equation} is settled through induction.

Observe that the forgiven contradictions related to Theorem 1 stem from the fact that:

Case 1: Let \(\mathcal{F}_1 = \{\)stars\(\}\) and \(\mathcal{F}_2 = \{\)paths\(\}\). Then;

\begin{equation} \mathcal{F}_1 \cap \mathcal{F}_2 \neq \emptyset \  and \  neither \  \mathcal{F}_1 \subset \mathcal{F}_2 \  nor \  \mathcal{F}_2 \subset \mathcal{F}_1. \  However; f_1 = f_2 \  for \  some \  n. \end{equation} Furthermore, Theorem 1 is valid for trees of order greater or equal to 1. It is known from [4] that for the family of wheels \(W_n\), \(n \geq 4\) obtained from cycles \(C_n\), \(n \geq 4\) hence, for wheels of order greater or equal to 5, the total vertex stress is given by \(\mathcal{S}(W_n) = \frac{n(n-1)}{2}\). It implies that if connected graphs in general are considered then infinitely many forgiven contradictions exist for Theorem 1 to be viewed valid. The forgiven contradictions stem from the fact that:

Case 2: Let \(\mathcal{F}_1 = \{\)stars\(\}\) and \(\mathcal{F}_2 = \{\)wheels, \(n \geq 4\}\). Then;

\begin{equation} \mathcal{F}_1 \cap \mathcal{F}_2 = \emptyset \  and\  ; f_1 = f_2 \forall n \geq 4. \end{equation} Herein lies the subtlety of the notion of iff\(_f\). Eliminating the infinitely forgiven contradictions can be achieved by an alternative formulation of Theorem 1.

Theorem 2.(Alternative) For a connected graph \(G\) it follows that, \(G \cong S_{1,m}\) or \(W_{m\geq 4}\) for some \(m \in \mathbb{N}_0\) iff\(_f\) \(\mathcal{S}(G) = \frac{(n-1)(n-2)}{2}\), \(n = m+1\).

The proof of Theorem 2 is straight foreword is left for the reader.

In some instances the definition of a graphical structure for conditional \(n \in \mathbb{N}\) say, \(n \geq k\) (or similar), has the inherent property of ambiguousity. It implies that certain graphs may belong to more than one family of graphs. An example is that the path \(P_3\) is also a tree and a star namely, \(S_{1,2}\). On the other hand some definitions of graphical structure has the provisional property of iffness. Iffness means that if the definition is applied, a graph within a specific family is obtained and vice versa. However, iffness is not necessarily absolute and is measured against all known families of graphs. An example of such family of graphs is the helm graphs. Recall that a helm graph (or helm for brevity) is obtained from a wheel by attaching a leaf (pendent vertex) to each rim vertex. Note that a helm graph denoted by \(H_n\) is defined for \(n \geq 3\). The claim is that, measured against all known families of graphs a connected graph \(G\) obtained from the definition of a helm graph as stated, yields a and only a helm graph. Therefore \(G \cong H_n\) for some \(n \geq 3\) and vice versa. For \(n \geq 4\) the result from [4] is that \(\mathcal{S}(H_n) = n(4n+1)\). Since, another unknown family of graphs might be defined in future such that total vertex stress equals \(n(4n+1)\), only an \(f\)-proposition is permissible. Therefore, a \(f\)-statement is stronger than a conjecture in that, it relies on a provisional property. Specialization of a \(f\)-statement might be required in future as was the case with Theorems 1 and 2.

f-Proposition 1. For a connected graph \(G\) of order \(n \geq 4\) it follows that, \(G \cong H_n\) iff\(_f\) \(\mathcal{S}(G) = n(4n+1)\).

Proof. From [4] it is known that \(\mathcal{S}(H_3) = 15\). Since the vertex stress value 15 is not unique it will be excluded. For \(n \geq 4\) the result from [4] is that \(\mathcal{S}(H_n) = n(4n+1)\). The converse follows from the proof of the result in [4]. Because the proof is strictly dependent on a structural analysis of a helm graph, it follows that the result \(\mathcal{S}(H_n) = n(4n+1)\) is strictly structural dependent. Because the definition yields a and only ahelm graph, the result follows from a and only a helm graph. This settles the proof.

By the formal definition of the family of flower graphs (see [4]) it can simply be said that a flower graph \(Fl_n\), \(n \geq 4\) is obtained by adding an edge between each pendent vertex and the central vertex of the corresponding helm graph. An immediate corollary follows;

f-Corollary 1. For a connected graph \(G\) of order \(n \geq 4\) it follows that, \(G \cong Fl_n\) iff\(_f\) \(\mathcal{S}(G) = 2n^2\).

Proof. The result follows by similar reasoning to that in the proof of f-Proposition 1.

In some instances characterization can be stated stronger than an \(f\)-statement despite forgiven contradictions.

Theorem 3. For a connected graph \(G\) of order \(n \geq 1\) it follows that \(G \cong K_n\) iff\(_f\) \(\mathcal{S}(G) = 0\).

Proof. It is known that \(\mathcal{S}(K_n) = 0\), \(n \geq 1\). The inverse follows from the fact that if \(\mathcal{S}(G) = 0\) then, either no shortest path exists or each shortest path is only an edge in \(G\). Hence, \(G\) must be complete.

Forgiven contradictions stem from the fact that \(K_1\) also represents the singleton family (set) containing the trivial graph. The paths \(P_1\) and \(P_2\) serve to show that, \(\{\)complete graphs\(\} \cap \{\)paths\(\} \neq \emptyset\).

Theorem 4. (Thole's theorem)\(^1\) For \(n \geq 3\), let \(\mathcal{F}_2\) be the family of \(K_n-e\), (\(e\) any edge) and \(\mathcal{F}_3\) be the family of \(K_{n-1}(v_i)\multimap v_n\) where \(\multimap v_n\) denotes a single pendent vertex attached to \(K_{n-1}\), (attached to \(v_i\)). It follows that, \[\mathcal{S}(K_n-e) = \mathcal{S}(K_{n-1}\multimap v_n) = n-2 \leq \mathcal{S}(G),\] where \(G\) is a non-complete, connected graph of order \(n\).

Proof. Since \(G\) is connected there exist at least \(\binom{n}{2}\) shortest \(v_iv_j\)-paths in \(G\) with \(v_i,v_j \in V(G) = \{v_k:1\leq k \leq n\}\). The minimum number of shortest \(v_iv_j\)-paths is exactly \(\binom{n}{2}\). Since \(G\) is non-complete it follows that \(\mathcal{S}(G) > 0\), (or put differently, \(\mathcal{S}(G) \geq 1\)). Hence, minimization of total stress requires to have only \(n-2\) shortest paths in \(G\), each of which induces vertex stress of 1. All other shortest paths must be edges in \(G\). It is trivial to state that the only families of graphical embodiments which meet the requirements are \(\mathcal{F}_2\) and \(\mathcal{F}_3\). From the definition of total vertex stress it follows that, \(\mathcal{S}(K_n-e) = \mathcal{S}(K_{n-1}\multimap v_n) = n-2\). Finally, since total vertex stress for non-complete, connected graphs has been minimized it follows that \(\mathcal{S}(G) \geq n-2\).

3. Conclusion

This note introduced the notions of forgiven contradictions, iffness and \(f\)-statements to characterize the family of star, helm, flower and complete graphs by total vertex stress. The concept of iffness is used as a (perhaps vague) qualitative property of graph theoretical definitions and requires deeper debate amongst scholars. Similarly, a deeper understanding of the idea of \(f\)-statements is needed.

Closed formula for the total vertex stress for a number of families of graphs are known, see [3,4,5,6] . Therefore, a wide scope for research exists to characterize other families of graphs by total vertex stress. Furthermore, numerous graph parameters have been studied. The characterization technique can be researched for other graph parameters. Such research could pave the way for parametric characterization of graphs.

3.1. Example: Chromatic characterization

Let \(\mathcal{F}_4\) be the family of complete graphs. With regards to the chromatic number of complete graphs the next chromatic characterization is presented.

Theorem 5. A graph \(G\) of order \(n\) has \(\chi(G) = n\) iff\(_f\) \(G \in \mathcal{F}_4\), (or \(G \cong K_n\)).

Proof. It is known that \(\chi(K_n) = n\). We only proof the converse.

Let \(G\) be of order \(n \in \mathbb{N}\) and let \(\chi(G) = n\). Let \(c(v_i) = c_k\), \(k \in \{1,2,3,\dots,n\}\). From the definition of a proper coloring it follows that since \(c(v_i) = c_k\), a vertex \(v_j \in N_G(v_i)\) has \(c(v_j) \neq c_k\). Moreover, since \(c(v_i)\) cannot be recolored \(c_s\), \(s \in \{c_1,c_2,\dots, c_{k-1}, c_{k+1},\dots, c_n\}\) (else, \(\chi(G) \leq n-1\)) it implies that, \(deg_G(v_i) = n-1\). Therefore, \(deg_G(v_t) = n-1\), \(\forall~v_t \in V(G)\). That settles the result, \(G \in \mathcal{F}_4\), (or \(G \cong K_n\)).

With regards to Theorem 5 another subtlety exists i.e. that no forgiven contradictions exist. Hence, "iff\(_f\)" is as strict as the conventional "iff". Therefore, Theorem 5 is equivalent to the statement: A graph \(G\) of order \(n\) has \(\chi(G) = n\) iff \(G \cong K_n\).

Acknowledgments

The author would like to thank the anonymous referees for their constructive comments, which helped to improve on the elegance of this paper.

Conflicts of Interest

''The author declares no conflict of interest.''

References

  1. Bondy, J. A., & Murty, U. S. R. (1976). Graph Theory with Applications. Macmillan Press, London. [Google Scholor]
  2. Kok, J., & Shiny, J., & Ajitha, V. (2020). Total vertex stress alteration in cycle related graphs, Matematichki Bilten, 44(LXX)2, 149-162. [Google Scholor]
  3. Shimbel, A. (1953). Structural parameters of communication networks, The Bulletin of Mathematical Biophysics, 15(4), 501-507. [Google Scholor]
  4. Shiny, J., & Ajitha, V. (2020). Stress regular graphs, Malaya Journal of Matematik, 8(3), 1152-1154. [Google Scholor]
  5. Shiny, J. (2021). Induced stress of some graph operations, Malaya Journal of Matematik, 9(1), 259-261. [Google Scholor]
  6. Shiny, J., & Kok, J., & Ajitha, V. (2021). Total induced vertex stress in barbell-like graphs, Journal of the Indonesian Mathematical Society, 27(2), 150-157. [Google Scholor]
]]>
Some new operators for Fermatean fuzzy matrices https://old.pisrt.org/psr-press/journals/odam-vol-4-issue-3-2021/some-new-operators-for-fermatean-fuzzy-matrices/ Wed, 06 Oct 2021 12:05:38 +0000 https://old.pisrt.org/?p=5964
ODAM-Vol. 4 (2021), Issue 3, pp. 10 - 23 Open Access Full-Text PDF
I. Silambarasan
Abstract:In this paper, we define some new operators \([(A \$ B),(A \# B),(A\ast B),(A \rightarrow B) ]\) of Fermatean fuzzy matrices and investigate their algebraic properties. Further, the necessity and possibility operators of Fermatean fuzzy matrices are proved. Finally, we have identified and proved several of these properties, particularly those involving the operator \(A\rightarrow B\) defined as Fermatean fuzzy implication with other operators.
]]>

Open Journal of Discrete Applied Mathematics

Some new operators for Fermatean fuzzy matrices

I. Silambarasan
Department of Mathematics, Sri Manakula Vinayagar Engineering College, Madagadipet, Puducherry-605107, India.; sksimbuking@gmail.com

Abstract

In this paper, we define some new operators \([(A \$ B),(A \# B),(A\ast B),(A \rightarrow B) ]\) of Fermatean fuzzy matrices and investigate their algebraic properties. Further, the necessity and possibility operators of Fermatean fuzzy matrices are proved. Finally, we have identified and proved several of these properties, particularly those involving the operator \(A\rightarrow B\) defined as Fermatean fuzzy implication with other operators.

Keywords:

Fermatean fuzzy matrix; Algebraic sum; Algebraic product; Implication operator

1. Introduction

The concept of an intuitionistic fuzzy matrix (IFM) was introduced by Khan et al., [1] and simultaneously Im et al., [2] to generalize the concept of Thomason's [3] fuzzy matrix. Since the IFM was proposed, it has received a lot of attention in many fields, such as pattern recognition, medical diagnosis, and so on. But if the sum of the membership degree and the nonmembership degree is greater than 1, the IFM is no longer applicable. In [4] using IFM theory, we developed the Pythagorean fuzzy matrix (PFM) \(A=\left[\left\langle \zeta_{a_{ij}},\delta_{a_{ij}}\right\rangle\right]\), where the squared sum of its membership degree \(\zeta_{a_{ij}}\in [0,1]\) and nonmembership degree \(\delta_{a_{ij}}\in [0,1]\) is less than or equal to 1.

Since the PFM was brought up, it has been widely applied in different fields, such as investment decision making, service quality of domestic airline, collaborative-based recommender systems, and so on. Although the PFM generalizes the IFM, it cannot describe the following decision information. A panel of experts were invited to give their opinions about the feasibility of an investment plan, and they were divided into two independent groups to make a decision. One group considered the degree of the feasibility of the investment plan as 0.8, while the other group considered the nonmembership degree as 0.7. It was clearly seen that \(0.8+0.7>1,(0.8)^2+(0.7)^2>1\), and thus it could not be described by IFM and PFM.

After the IFM and PFM theory, many researchers attempted the important role in this theory, [5,6,7,8,9,10,11,12,13,14,15,16,17]. To describe such evaluation information, we have developed Fermatean fuzzy matrix (FFM) \(A=\left[\left\langle \zeta_{a_{ij}},\delta_{a_{ij}}\right\rangle\right]\), where represent the \(\zeta_{a_{ij}}\in [0,1]\) membership degree and \(\delta_{a_{ij}}\in [0,1]\) the non-membership degree for all \(i,j\), respectively, and \(0\leq \zeta^3_{a_{ij}}+\delta^3_{a_{ij}}\leq 1\) [18]. It was clearly seen that \(0.8+0.7>1,(0.8)^2+(0.7)^2>1,(0.8)^3+(0.7)^3\leq 1\). Then we defined some Fermatean fuzzy operators \(\boxplus_{F}, \boxtimes_{F}, @, \cap, \cup\) and properties are considered. In this paper we have developed some new operators for Fermatean fuzzy matrices and discussed several properties.

2. Preliminaries

In this section, some basic concepts related to the fuzzy matrix (FM), intuitionistic fuzzy matrix (IFM) and Pythagorean fuzzy matrix (PFM) have been given.

Definition 1. [3] A fuzzy matrix of \(A\) of order \(m\times n\) is defined as \(A=(a_{ij})\), where \(a_{ij}\in [0,1].\)

Definition 2. [1] An intuitionistic fuzzy matrix (IFM) is a pair \(A=\Big[\left\langle \zeta_{a_{ij}}, \delta_{a_{ij}}\right\rangle\Big]\) of a non negative real numbers \(\zeta_{a_{ij}}, \delta_{a_{ij}}\in [0,1]\) satisfying \(0\leq \zeta_{a_{ij}}+\delta_{a_{ij}}\leq 1\) for all \(i,j.\)

Definition 3. [4] A Pythagorean fuzzy matrix (PFM) is a pair \(A=\Big[\left\langle \zeta_{a_{ij}}, \delta_{a_{ij}}\right\rangle\Big]\) of non negative real numbers \(\zeta_{a_{ij}}, \delta_{a_{ij}}\in [0,1]\) satisfying the condition \(0\leq\zeta^2_{a_{ij}}+\delta^2_{a_{ij}}\leq 1\), for all \(i,j\). Where \(\zeta_{a_{ij}}\in[0,1]\) is called the degree of membership and \(\delta_{a_{ij}}\in[0,1]\) is called the degree of non-membership.

Definition 4. [18] A Fermatean fuzzy matrix (FFM) is a pair \(A=\Big[\left\langle \zeta_{a_{ij}}, \delta_{a_{ij}}\right\rangle\Big]\) of non negative real numbers \(\zeta_{a_{ij}}, \delta_{a_{ij}}\in [0,1]\) satisfying the condition \(0\leq\zeta^3_{a_{ij}}+\delta^3_{a_{ij}}\leq 1\), for all \(i,j\). Where \(\zeta_{a_{ij}}\in[0,1]\) is called the degree of membership and \(\delta_{a_{ij}}\in[0,1]\) is called the degree of non-membership.

Definition 5. [18] Let \(F_{m \times n}\) denote the family of all \(FFMs\) for all \(i,j\), and \(A,B\in F_{m \times n}\) be given as \[A=\left[\left\langle\zeta_{a_{ij}},\delta_{a_{ij}}\right\rangle\right]\ \ \ \text{and}\ \ \ B=\left[\left\langle\zeta_{b_{ij}},\delta_{b_{ij}}\right\rangle\right]\] then

  • (i) \(A\vee B=\left[\left\langle\max\left\{\zeta_{a_{ij}},\zeta_{b_{ij}}\right\},\min\left\{\delta_{a_{ij}},\delta_{b_{ij}}\right\}\right\rangle\right]\),
  • (ii) \(A\wedge B=\left[\left\langle\min\left\{\zeta_{a_{ij}},\zeta_{b_{ij}}\right\},\max\left\{\delta_{a_{ij}},\delta_{b_{ij}}\right\}\right\rangle\right]\),
  • (iii) \(A^C=\left[\left\langle(\delta_{a_{ij}}),(\zeta_{a_{ij}})\right\rangle\right]\),
  • (iv) \(A\boxplus_{F} B=\left[\left\langle \sqrt[3]{\zeta^3_{a_{ij}}+\zeta^3_{b_{ij}}-\zeta^3_{a_{ij}}\zeta^3_{b_{ij}}}, \delta_{a_{ij}}\delta_{b_{ij}}\right\rangle\right]\),
  • (v) \( A\boxtimes_{F} B=\left[\left\langle \zeta_{a_{ij}}\zeta_{b_{ij}},\sqrt[3]{\delta^3_{a_{ij}}+\delta^3_{b_{ij}}-\delta^3_{a_{ij}}\delta^3_{b_{ij}}}\right\rangle\right] \),
  • (vi) \(A @ B=\left[\left\langle \sqrt[3]{\dfrac{\zeta^3_{a_{ij}}+\zeta^3_{b_{ij}}}{2}},\sqrt[3]{\dfrac{\delta^3_{a_{ij}}+\delta^3_{b_{ij}}}{2}}\right\rangle\right]\).

3. New operators for Fermatean fuzzy matrices

In this section, we define the new operators for Fermatean fuzzy matrices and investigates the several algebraic properties.

Definition 6. Let \(F_{m \times n}\) denote the family of all \(FFMs\) for all \(i,j\), and let \(A,B\in F_{m \times n}\) be given as

  • (i) \(A\$ B=\left[\left\langle \sqrt[3]{\zeta_{a_{ij}}\zeta_{b_{ij}}},\sqrt[3]{\delta_{a_{ij}}\delta_{b_{ij}}}\right\rangle\right]\),
  • (ii) \(A\# B=\left[\left\langle \dfrac{\sqrt[3]{2}\zeta_{a_{ij}}\zeta_{b_{ij}}}{\sqrt[3]{\zeta^3_{a_{ij}}+\zeta^3_{b_{ij}}}}, \dfrac{\sqrt[3]{2}\delta_{a_{ij}}\delta_{b_{ij}}}{\sqrt[3]{\delta^3_{a_{ij}}+\delta^3_{b_{ij}}}}\right\rangle\right]\).
For which we shall accept that if \(\zeta_{a_{ij}}=\zeta_{b_{ij}}=0\) then \(\dfrac{\zeta_{a_{ij}}\zeta_{b_{ij}}}{\zeta_{a_{ij}}+\zeta_{b_{ij}}}=0\) and if \(\delta_{a_{ij}}=\delta_{b_{ij}}=0\), then \(\dfrac{\delta_{a_{ij}}\delta_{b_{ij}}}{\delta_{a_{ij}}+\delta_{b_{ij}}}=0\).
  • (iii) \(A\ast B =\left[\left\langle\sqrt[3]{\dfrac{\zeta^3_{a_{ij}}+\zeta^3_{b_{ij}}}{2(\zeta^3_{a_{ij}}+\zeta^3_{b_{ij}}+1)}},\sqrt[3]{\dfrac{\delta^3_{a_{ij}}+\delta^3_{b_{ij}}}{2(\delta^3_{a_{ij}}+\delta^3_{b_{ij}}+1)}} \right\rangle\right]\),
  • (iv) \(A\rightarrow B=\left[\left\langle\max\left\{\delta_{a_{ij}},\zeta_{b_{ij}}\right\},\min\left\{\zeta_{a_{ij}},\delta_{b_{ij}}\right\}\right\rangle\right]\).

Remark 1. Clearly, for each two FFMs A and B, \([(A @ B),(A \$ B),(A \# B),(A\ast B),(A\rightarrow B)]\) are as yet an FFM. Some basic representations are appear as follows:

  • For (i), \(0\leq \left(\sqrt[3]{\dfrac{\zeta^3_{a_{ij}}+\zeta^3_{b_{ij}}}{2}}\right)^3+\left(\sqrt[3]{\dfrac{\delta^3_{a_{ij}}+\delta^3_{b_{ij}}}{2}}\right)^3=\dfrac{\zeta^3_{a_{ij}}+\delta^3_{a_{ij}}}{2}+\dfrac{\zeta^3_{b_{ij}}+\delta^3_{b_{ij}}}{2} \leq \dfrac{1}{2}+\dfrac{1}{2}=1.\)
  • For (ii), if \(\delta_{a_{ij}}\geq \zeta_{b_{ij}}\) and \(\zeta_{a_{ij}}\geq \delta_{b_{ij}}\), then \(0\leq \max\left\{ \delta^3_{a_{ij}},\zeta^3_{b_{ij}}\right\}+\min\left\{\zeta^3_{a_{ij}},\delta^3_{b_{ij}}\right\}\leq \delta^3_{a_{ij}}+\zeta^3_{a_{ij}}\leq 1.\)

    If \(\delta_{a_{ij}}\geq \zeta_{b_{ij}}\) and \(\zeta_{a_{ij}}\leq \delta_{b_{ij}}\), then \(0\leq \max\left\{ \delta^3_{a_{ij}},\zeta^3_{b_{ij}}\right\}+\min\left\{\zeta^3_{a_{ij}},\delta^3_{b_{ij}}\right\}\leq \delta^3_{a_{ij}}+\zeta^3_{a_{ij}}\leq 1.\)

    If \(\delta_{a_{ij}}\leq \zeta_{b_{ij}}\) and \(\zeta_{a_{ij}}\geq \delta_{b_{ij}}\), then \(0\leq \max\left\{ \delta^3_{a_{ij}},\zeta^3_{b_{ij}}\right\}+\min\left\{\zeta^3_{a_{ij}},\delta^3_{b_{ij}}\right\}\leq \delta^3_{b_{ij}}+\zeta^3_{b_{ij}}\leq 1.\)

    If \(\delta_{a_{ij}}\leq \zeta_{b_{ij}}\) and \(\zeta_{a_{ij}}\leq \delta_{b_{ij}}\), then \(0\leq \max\left\{ \delta^3_{a_{ij}},\zeta^3_{b_{ij}}\right\}+\min\left\{\zeta^3_{a_{ij}},\delta^3_{b_{ij}}\right\}\leq \delta^3_{b_{ij}}+\zeta^3_{b_{ij}}\leq 1.\)

  • For (iii), \(0\leq \left(\sqrt[3]{\zeta_{a_{ij}}\zeta_{b_{ij}}}\right)^3+\left(\sqrt[3]{\delta_{a_{ij}}\delta_{b_{ij}}}\right)^3=\zeta_A(x)\zeta_B(x)+\delta_A(x)\delta_B(x)=\dfrac{\zeta^3_{a_{ij}}+\delta^3_{a_{ij}}}{2}+\dfrac{\zeta^3_{b_{ij}}+\delta^3_{b_{ij}}}{2}\leq \dfrac{1}{2}+\dfrac{1}{2}=1.\)
  • For (iv), \(0\leq \left(\dfrac{\sqrt[3]{2}\zeta_{a_{ij}}\zeta_{b_{ij}}}{\sqrt[3]{\zeta^3_{a_{ij}}+\zeta^3_{b_{ij}}}}\right)^3+\left( \dfrac{\sqrt[3]{2}\delta_{a_{ij}}\delta_{b_{ij}}}{\sqrt[3]{\delta^3_{a_{ij}}+\delta^3_{b_{ij}}}}\right)^3=\dfrac{2\zeta^3_{a_{ij}}\zeta^3_{b_{ij}}}{\zeta^3_{a_{ij}}+\zeta^3_{b_{ij}}}+ \dfrac{2\delta^3_{a_{ij}}\delta^3_{b_{ij}}}{\delta^3_{a_{ij}}+\delta^3_{b_{ij}}}\leq 1.\)
  • For (v), \(0\leq \left(\sqrt[3]{\dfrac{\zeta^3_{a_{ij}}+\zeta^3_{b_{ij}}}{2(\zeta^3_{a_{ij}}+\zeta^3_{b_{ij}}+1)}}\right)^3+\left(\sqrt[3]{\dfrac{\delta^3_{a_{ij}}+\delta^3_{b_{ij}}}{2(\delta^3_{a_{ij}}+\delta^3_{b_{ij}}+1)}}\right)^3={\dfrac{\zeta^3_{a_{ij}}+\zeta^3_{b_{ij}}}{2(\zeta^3_{a_{ij}}+\zeta^3_{b_{ij}}+1)}},{\dfrac{\delta^3_{a_{ij}}+\delta^3_{b_{ij}}}{2(\delta^3_{a_{ij}}+\delta^3_{b_{ij}}+1)}}\leq 1.\)

Lemma 1.[6] For any two numbers \(a,b\in [0,1]\), then \[a.b\leq \min\left\{a,b\right\}\leq \dfrac{2(a.b)}{a+b}\leq \sqrt{a.b}\leq \max\left\{a,b\right\}\leq a+b-a.b,\] and \[a.b\leq \dfrac{a+b}{2(a+b+1)}\leq \dfrac{a+b}{2}.\]

Theorem 1. For \(A,B\in F_{m \times n}\), we have

  • (i) \( A @ B=B @ A=(A^C @ B^C)^C\),
  • (ii) \( A\$ B=B\$ A=(A^C \$ B^C)^C\),
  • (iii) \( A\# B=B\# A=(A^C\# B^C)^C\),
  • (iv) \( A\ast B=B\ast A=(A^C\ast B^C)^C\).

Proof. Here, we prove only (i). Others can be proved similarly.

Let A and B be two given FFMs, then

\begin{align*}A @ B &=\left[\left\langle \sqrt[3]{\dfrac{\zeta^3_{a_{ij}}+\zeta^3_{b_{ij}}}{2}},\sqrt[3]{\dfrac{\delta^3_{a_{ij}}+\delta^3_{b_{ij}}}{2}}\right\rangle\right]=\left[\left\langle \sqrt[3]{\dfrac{\zeta^3_{b_{ij}}+\zeta^3_{a_{ij}}}{2}},\sqrt[3]{\dfrac{\delta^3_{b_{ij}}+\delta^3_{a_{ij}}}{2}}\right\rangle\right]=B@A,\\ A^C @ B^C&=\left[\left\langle \sqrt[3]{\dfrac{\delta^3_{a_{ij}}+\delta^3_{b_{ij}}}{2}},\sqrt[3]{\dfrac{\zeta^3_{a_{ij}}+\zeta^3_{b_{ij}}}{2}}\right\rangle\right],\\ (A^C @ B^C)^C&=\left[\left\langle \sqrt[3]{\dfrac{\zeta^3_{a_{ij}}+\zeta^3_{b_{ij}}}{2}},\sqrt[3]{\dfrac{\delta^3_{a_{ij}}+\delta^3_{b_{ij}}}{2}}\right\rangle\right]=A@B.\end{align*} Hence, \( A@B=B@A=(A^C@B^C)^C.\)

The following theorems are obvious:

Theorem 2. For \(A,B,C\in F_{m \times n}\), we have

  • (i)  \( (A\wedge B)@ C=(A@C)\wedge(B@C)\),
  • (ii)   \((A\vee B)@ C=(A@C)\vee(B@C)\),
  • (iii)   \( (A\wedge B)\$ C=(A\$ C)\wedge(B\$ C),\)
  • (iv)   \((A\vee B)\$ C=(A\$ C)\vee(B\$ C),\)
  • (v)   \( (A\wedge B)\# C=(A\# C)\wedge(B\# C),\)
  • (vi)   \( (A\vee B)\# C=(A\# C)\vee(B\# C),\)
  • (vii)   \( (A\wedge B)\ast C=(A\ast C)\wedge(B\ast C),\)
  • (viii)   \( (A\vee B)\ast C=(A\ast C)\vee(B\ast C).\)

Theorem 3. For \(A,B,C\in F_{m \times n}\), we have

  • (i) \( (A\boxplus_{F} B)@ C\leq(A @ C)\boxplus_{F}(B@ C),\)
  • (ii)   \( (A\boxtimes_{F} B)@ C\geq(A @ C)\boxtimes_{F}(B@ C),\)
  • (iii)  \( (A\boxplus_{F} B)\$ C\leq(A \$ C)\boxplus_{F}(B\$ C),\)
  • (vi)   \( (A\boxtimes_{F} B)\$ C\geq(A \$ C)\boxtimes_{F}(B\$ C),\)
  • (v)   \( (A\boxplus_{F} B)\ast C\leq(A \ast C)\boxplus_{F}(B\ast C),\)
  • (vi)   \( (A\boxtimes_{F} B)\ast C\geq(A \ast C)\boxtimes_{F}(B\ast C)\).

Theorem 4.For \(A,B,C\in F_{m \times n}\), we have

  • (i)   \( (A@ B)\boxplus_{F} C=(A \boxplus_{F} C)@(B\boxplus_{F} C),\)
  • (ii)  \( (A@ B)\boxtimes_{F} C=(A \boxtimes_{F} C)@(B\boxtimes_{F} C),\)
  • (iii)   \( (A\$ B)\boxplus_{F} C\leq(A \boxplus_{F} C)\$(B\boxplus_{F} C),\)
  • (iv)   \( (A\$ B)\boxtimes_{F} C\geq (A \boxtimes_{F} C)\$(B\boxtimes_{F} C),\)
  • (v)   \( (A\# B)\boxplus_{F} C\leq(A \boxplus_{F} C)\#(B\boxplus_{F} C),\)
  • (vi)   \( (A\# B)\boxtimes_{F} C\geq (A \boxtimes_{F} C)\#(B\boxtimes_{F} C),\)
  • (vii)  \( (A\ast B)\boxplus_{F} C\leq(A \boxplus_{F} C)\ast(B\boxplus_{F} C),\)
  • (viii)  \( (A\ast B)\boxtimes_{F} C\geq (A \boxtimes_{F} C)\ast(B\boxtimes_{F} C)\).

4. Necessity and possibility operators on Fermatean fuzzy matrices

In this section, we prove the necessity and possibility operators of Fermatean fuzzy matrices. Then we compile some relevent properties of these operators are discussed.

Definition 7. [18] The necessity and possibility operators on a Fermatean fuzzy matrix A is denoted by \(\Box A , \Diamond A\) and is \(\Box A =\left[\left\langle \zeta_{a_{ij}}, \sqrt[3]{1-\zeta^3_{a_{ij}}} \right\rangle\right], \Diamond A =\left[\left\langle \sqrt[3]{1-\delta^3_{a_{ij}}},\delta_{a_{ij}} \right\rangle\right]\).

Theorem 5. For \(A,B \in F_{m \times n}\), we have

  • (i)   \( \Box A @ \Box B=\Box(A@B)\leq \Diamond A @ \Diamond B=\Diamond(A@B),\)
  • (ii)   \( \Box(A \$ B)\leq \Box A \$ \Box B\leq \Diamond A \$ \Diamond B\leq \Diamond(A\$ B),\)
  • (iii)  \( \Box(A \# B)\leq \Box A \# \Box B\leq \Diamond A \# \Diamond B\leq \Diamond(A\# B),\)
  • (iv)   \( ~\Box(A \ast B)\leq \Box A \ast \Box B\leq \Diamond A \ast \Diamond B\leq \Diamond(A\ast B).\)

Proof. Here we prove (i) and (iii). (ii) and (iv) can be proved similarly.

  • (i)  Since \[\Box A @ \Box B=\left[\left\langle \sqrt[3]{\dfrac{\zeta^3_{a_{ij}}+\zeta^3_{b_{ij}}}{2}},\sqrt[3]{\dfrac{1-\zeta^3_{a_{ij}}+1-\zeta^3_{b_{ij}}}{2}}\right\rangle\right]=\Box(A@B),\] and \[\Diamond A @ \Diamond B=\left[\left\langle \sqrt[3]{\dfrac{1-\delta^3_{a_{ij}}+1-\delta^3_{b_{ij}}}{2}},\sqrt[3]{\dfrac{\delta^3_{a_{ij}}+\delta^3_{b_{ij}}}{2}}\right\rangle\right]=\Diamond(A@B).\] So, \[\Box A @ \Box B=\Box(A@B)\leq \Diamond A @ \Diamond B=\Diamond(A@B).\]
  • (iii)   Since \[ ~\Box A \# \Box B=\left[\left\langle \dfrac{\sqrt[3]{2}\zeta_{a_{ij}}\zeta_{b_{ij}}}{\sqrt[3]{\zeta^3_{a_{ij}}+\zeta^3_{b_{ij}}}}, \dfrac{\sqrt[3]{2}\sqrt[3]{1-\zeta^3_{a_{ij}}}\sqrt[3]{1-\zeta^3_{b_{ij}}}}{\sqrt[3]{1-\zeta^3_{a_{ij}}+1-\zeta^3_{b_{ij}}}}\right\rangle\right]\leq \Box(A \# B),\] and \[\Diamond A \# \Diamond B=\Bigg[\left\langle \dfrac{\sqrt[3]{2}\sqrt[3]{1-\delta^3_{a_{ij}}}\sqrt[3]{1-\delta^3_{b_{ij}}}}{\sqrt[3]{1-\delta^3_{a_{ij}}+1-\delta^3_{b_{ij}}}},\dfrac{\sqrt[3]{2}\delta_{a_{ij}}\delta_{b_{ij}}}{\sqrt[3]{\delta^3_{a_{ij}}+\delta^3_{b_{ij}}}}\right\rangle\Bigg]\leq \Diamond(A \# B).\] So, \[\Box(A \# B)\leq \Box A \# \Box B\leq \Diamond A \# \Diamond B\leq \Diamond(A\# B).\]

The following theorems are obvious:

Theorem 6. For \(A,B \in F_{m \times n}\), we have

  • (i)   \( \Box \left[\left(\Diamond A @ \Diamond B \right)^C \right]=\left[\Diamond (A @ B) \right]^C,\)
  • (ii)   \( \Diamond \left[\left(\Box A @ \Box B \right)^C \right]=\left[\Box (A @ B) \right]^C,\)
  • (iii)   \( \Box \left[\left(\Diamond A \$ \Diamond B \right)^C \right]=\left[\Diamond (A \$ B) \right]^C,\)
  • (vi)   \( \Diamond \left[\left(\Box A \$ \Box B \right)^C \right]=\left[\Box (A \$ B) \right]^C,\)
  • (v)   \(\Box \left[\left(\Diamond A \# \Diamond B \right)^C \right]=\left[\Diamond (A \# B) \right]^C,\)
  • (vi)   \( \Diamond \left[\left(\Box A \# \Box B \right)^C \right]=\left[\Box (A \# B) \right]^C,\)
  • (vii)   \( \Box \left[\left(\Diamond A \ast \Diamond B \right)^C \right]=\left[\Diamond (A \ast B) \right]^C,\)
  • (viii)   \( \Diamond \left[\left(\Box A \ast \Box B \right)^C \right]=\left[\Box (A \ast B) \right]^C\).

Theorem 7. For \(A,B \in F_{m \times n}\), we have

  • (i)   \(\left[\left(\Box A \boxplus_{F} \Diamond B \right)^C @ ((\Box A)^C \boxtimes_{F} \Diamond B) \right]\vee (\Box A)^C=(\Box A)^C,\)
  • (ii)   \(\left[\left(\Box A \boxtimes_{F} \Diamond B \right)^C @ ((\Box A)^C \boxplus_{F} \Diamond B) \right]\wedge (\Box A)^C=(\Box A)^C,\)
  • (iii)   \( \left[\left(\Box A \boxplus_{F} \Diamond B \right)^C \$ ((\Box A)^C \boxtimes_{F} \Diamond B) \right]\vee (\Box A)^C=(\Box A)^C,\)
  • (iv)   \( \left[\left(\Box A \boxtimes_{F} \Diamond B \right)^C \$ ((\Box A)^C \boxplus_{F} \Diamond B) \right]\wedge (\Box A)^C=(\Box A)^C,\)
  • (v)   \( \left[\left(\Box A \boxplus_{F} \Diamond B \right)^C \# ((\Box A)^C \boxtimes_{F} \Diamond B) \right]\vee (\Box A)^C=(\Box A)^C,\)
  • (vi)  \( \left[\left(\Box A \boxtimes_{F} \Diamond B \right)^C \# ((\Box A)^C \boxplus_{F} \Diamond B) \right]\wedge (\Box A)^C=(\Box A)^C,\)
  • (vii)  \( \left[\left(\Diamond A \boxplus_{F} \Box B \right)^C @ ((\Box A)^C \boxtimes_{F} \Diamond B) \right]\vee (\Diamond A)^C=(\Diamond A)^C,\)
  • (viii)  \( \left[\left(\Diamond A \boxplus_{F} \Box B \right)^C \$ ((\Box A)^C \boxtimes_{F} \Diamond B) \right]\vee (\Diamond A)^C=(\Diamond A)^C,\)
  • (ix)  \( \left[\left(\Diamond A \boxplus_{F} \Box B \right)^C \# ((\Box A)^C \boxtimes_{F} \Diamond B) \right]\vee (\Diamond A)^C=(\Diamond A)^C,\)
  • (x)   \(\left[\left(\Diamond A \boxplus_{F} \Box B \right)^C @ ((\Diamond A)^C \boxtimes_{F} \Box B) \right]\vee (\Diamond A)^C=(\Diamond A),\)
  • (xi)   \( \left[\left(\Diamond A \boxplus_{F} \Box B \right)^C \$ ((\Diamond A)^C \boxtimes_{F} \Box B)\right]\vee (\Diamond A)^C=(\Diamond A),\)
  • (xii)  \( \left[\left(\Diamond A \boxplus_{F} \Box B \right)^C \# ((\Diamond A)^C \boxtimes_{F} \Box B) \right]\vee (\Diamond A)^C=(\Diamond A).\)

In the next section, we state and prove some new results involving implication operator with other FFM operators

5. Some results of FFMs based on implication operator

In this section, the proofs of the following theorems and corollaries follows from the Definitions 5, 6 and Lemma 1.

Theorem 8. For \(A,B \in F_{m \times n}\), we have

  • (i)   \(\left( A^C\rightarrow B\right)@\left(A \rightarrow B^C\right)^C=\left(A @ B\right),\)
  • (ii)   \(\left( A^C\rightarrow B\right) \boxplus_{F} \left(A \rightarrow B^C\right)^C=\left(A \boxplus_{F} B\right),\)
  • (iii)  \(\left( A^C\rightarrow B\right) \boxtimes_{F} \left(A \rightarrow B^C\right)^C=\left(A \boxtimes_{F} B\right)\),
  • (iv)   \(\left( A^C\rightarrow B\right) \$ \left(A \rightarrow B^C\right)^C=\left(A \$ B\right),\)
  • (v)   \(\left( A^C\rightarrow B\right) \#\left(A \rightarrow B^C\right)^C=\left(A \# B\right),\)
  • (vi)   \(\left( A\rightarrow B\right)^C \boxplus_{F}\left(B \rightarrow A\right)=\left(A \boxplus_{F} B^C\right),\)
  • (vii)  \(\left( A\rightarrow B\right)^C @\left(B \rightarrow A\right)=\left(A @ B^C\right),\)
  • (viii)   \(\left( A\rightarrow B\right)^C \boxtimes_{F}\left(B \rightarrow A\right)=\left(A \boxtimes_{F} B^C\right),\)
  • (ix)   \(\left( A\rightarrow B\right)^C \$ \left(B \rightarrow A\right)=\left(A \$ B^C\right),\)
  • (x)   \(\left( A\rightarrow B\right)^C \# \left(B \rightarrow A\right)=\left(A \# B^C\right).\)

Proof. We prove only (i) and (vi) and remaining can be proved analogously.

  • (i) \begin{align*} \left( A^C\rightarrow B\right)&@\left(A \rightarrow B^C\right)^C\\ &=\left[ \sqrt[3]{\dfrac{\max\left\{\zeta^3_{a_{ij}},\zeta^3_{b_{ij}}\right\}+\min\left\{\zeta^3_{a_{ij}},\zeta^3_{b_{ij}}\right\}}{2}}, \sqrt[3]{\dfrac{\min\left\{\delta^3_{a_{ij}},\delta^3_{b_{ij}}\right\}+\max\left\{\delta^3_{a_{ij}},\delta^3_{b_{ij}}\right\}}{2}} \right]\\ &=\left[\left\langle \sqrt[3]{\dfrac{\zeta^3_{a_{ij}}+\zeta^3_{b_{ij}}}{2}},\sqrt[3]{\dfrac{\delta^3_{a_{ij}}+\delta^3_{b_{ij}}}{2}}\right\rangle\right]\\ &=(A @ B).\end{align*}
  • (vi) \begin{align*}&\left( A\rightarrow B\right)^C \boxplus_{F}\left(B \rightarrow A\right)\\ &=\left[\sqrt[3]{\min\left\{\zeta^3_{a_{ij}},\delta^3_{b_{ij}}\right\}+\max\left\{\delta^3_{b_{ij}},\zeta^3_{a_{ij}}\right\} - \min\left\{\zeta^3_{a_{ij}},\delta^3_{b_{ij}}\right\}\max\left\{\delta^3_{b_{ij}},\zeta^3_{a_{ij}}\right\}}, \max\left\{\delta_{a_{ij}},\zeta_{b_{ij}}\right\}\min\left\{\zeta_{b_{ij}},\delta_{a_{ij}}\right\}\right]\\ &=\left[\left\langle \sqrt[3]{\zeta^3_{a_{ij}}+\delta^3_{b_{ij}}-\zeta^3_{a_{ij}}\delta^3_{b_{ij}}},\delta_{a_{ij}}\zeta_{b_{ij}}\right\rangle\right]\\ &=(A\boxplus_{F} B^C).\end{align*}

Theorem 9. For \(A,B\in F_{m \times n}\), we have

  • (i)  \(\left((A\boxplus_{F} B)\rightarrow(A @ B)^C\right)^C=\left((A @ B)\rightarrow(A \boxplus_{F} B)^C\right)^C=(A @ B),\)
  • (ii)  \(\left((A\boxplus_{F} B)^C\rightarrow (A @ B)\right)=\left((A @ B)^C\rightarrow (A \boxplus_{F} B)\right)=(A\boxplus_{F} B),\)
  • (iii)  \(\left((A\boxtimes_{F} B)\rightarrow(A @ B)^C\right)^C=\left((A @ B)\rightarrow(A \boxtimes_{F} B)^C\right)^C=(A \boxtimes_{F} B),\)
  • (iv)  \(\left((A\boxtimes_{F} B)^C\rightarrow (A @ B)\right)=\left((A @ B)^C\rightarrow (A \boxtimes_{F} B)\right)=(A @ B),\)
  • (v)  \(\left((A\boxplus_{F} B)\rightarrow(A \# B)^C\right)^C=\left((A \# B)\rightarrow(A \boxplus_{F} B)^C\right)^C=(A \# B),\)
  • (vi)  \(\left((A\boxplus_{F} B)^C\rightarrow (A \# B)\right)=\left((A \# B)^C\rightarrow (A \boxplus_{F} B)\right)=(A\boxplus_{F} B),\)
  • (vii)  \(\left((A\boxtimes_{F} B)\rightarrow(A \# B)^C\right)^C=\left((A \# B)\rightarrow(A \boxtimes_{F} B)^C\right)^C=(A \boxtimes_{F} B),\)
  • (viii)   \(\left((A\boxtimes_{F} B)^C\rightarrow (A \# B)\right)=\left((A \# B)^C\rightarrow (A \boxtimes_{F} B)\right)=(A \# B),\)
  • (ix)  \(\left((A\boxplus_{F} B)\rightarrow(A \$ B)^C\right)^C=\left((A \$ B)\rightarrow(A \boxplus_{F} B)^C\right)^C=(A \$ B),\)
  • (x)  \(\left((A\boxplus_{F} B)^C\rightarrow (A \$ B)\right)=\left((A \$ B)^C\rightarrow (A \boxplus_{F} B)\right)=(A\boxplus_{F} B),\)
  • (xi)  \(\left((A\boxtimes_{F} B)\rightarrow(A \$ B)^C\right)^C=\left((A \$ B)\rightarrow(A \boxtimes_{F} B)^C\right)^C=(A \boxtimes_{F} B),\)
  • (xii)  \(\left((A\boxtimes_{F} B)^C\rightarrow (A \$ B)\right)=\left((A \$ B)^C\rightarrow (A \boxtimes_{F} B)\right)=(A \$ B),\)
  • (xiii)  \(\left((A\boxplus_{F} B)\rightarrow(A \boxtimes_{F} B)^C\right)^C=\left((A \boxtimes_{F} B)\rightarrow(A \boxplus_{F} B)^C\right)^C=(A \boxtimes_{F} B),\)
  • (xiv)   \(\left((A\boxtimes_{F} B)^C\rightarrow (A \boxplus_{F} B)\right)=\left((A \boxplus_{F} B)^C\rightarrow (A \boxtimes_{F} B)\right)=(A \boxplus_{F} B).\)

Proof. Here, we prove (i), (iii), (v), (vii), (ix) and (xiii). Others can be proved analogously.

  • (i)   Since \begin{align*} \left((A\boxplus_{F} B)\rightarrow(A @ B)^C\right)^C &=\left[ \min\left\{\sqrt[3]{\zeta^3_{a_{ij}}+\zeta^3_{a_{ij}}-\zeta^3_{a_{ij}}\zeta^3_{a_{ij}}},\sqrt[3]{\dfrac{\zeta^3_{a_{ij}}+\zeta^3_{b_{ij}}}{2}}\right\}, \max\left\{\delta_{a_{ij}}\delta_{b_{ij}},\sqrt[3]{\dfrac{\delta^3_{a_{ij}}+\delta^3_{b_{ij}}}{2}}\right\}\right]\\ &=\left[\left\langle \sqrt[3]{\dfrac{\zeta^3_{a_{ij}}+\zeta^3_{b_{ij}}}{2}},\sqrt[3]{\dfrac{\delta^3_{a_{ij}}+\delta^3_{b_{ij}}}{2}}\right\rangle\right]\\ &=A @ B,\end{align*} and \begin{align*} \left((A @ B)\rightarrow(A \boxplus_{F} B)^C\right)^C &=\left[ \min\left\{\sqrt[3]{\dfrac{\zeta^3_{a_{ij}}+\zeta^3_{b_{ij}}}{2}},\sqrt[3]{\zeta^3_{a_{ij}}+\zeta^3_{a_{ij}}-\zeta^3_{a_{ij}}\zeta^3_{a_{ij}}}\right\}, \max\left\{\sqrt[3]{\dfrac{\delta^3_{a_{ij}}+\delta^3_{b_{ij}}}{2}} ,\delta_{a_{ij}}\delta_{b_{ij}}\right\}\right]\\ &=\left[\left\langle \sqrt[3]{\dfrac{\zeta^3_{a_{ij}}+\zeta^3_{b_{ij}}}{2}},\sqrt[3]{\dfrac{\delta^3_{a_{ij}}+\delta^3_{b_{ij}}}{2}}\right\rangle\right]\\ &=A @ B.\end{align*} So, \[\left((A\boxplus_{F} B)\rightarrow(A @ B)^C\right)^C=\left((A @ B)\rightarrow(A \boxplus_{F} B)^C\right)^C=(A @ B).\]
  • (iii)   Since \begin{align*} \left((A\boxtimes_{F} B)\rightarrow (A @ B)^C\right)^C &=\left[ \min\left\{\zeta_{a_{ij}}\zeta_{b_{ij}},\sqrt[3]{\dfrac{\zeta^3_{a_{ij}}+\zeta^3_{b_{ij}}}{2}}\right\}, \max \left\{\sqrt[3]{\delta^3_{a_{ij}}+\delta^3_{b_{ij}}-\delta^3_{a_{ij}}\delta^3_{b_{ij}}},\sqrt[3]{\dfrac{\delta^3_{a_{ij}}+\delta^3_{b_{ij}}}{2}}\right\}\right]\\ &=\left[\left\langle \zeta_{a_{ij}}\zeta_{b_{ij}},\sqrt[3]{\delta^3_{a_{ij}}+\delta^3_{b_{ij}}-\delta^3_{a_{ij}}\delta^3_{b_{ij}}}\right\rangle\right]\\ &=A\boxtimes_{F} B,\end{align*} and \begin{align*} \left((A @ B)\rightarrow(A \boxtimes_{F} B)^C\right)^C &=\left[ \min\left\{\sqrt[3]{\dfrac{\zeta^3_{a_{ij}}+\zeta^3_{b_{ij}}}{2}},\zeta_{a_{ij}}\zeta_{b_{ij}}\right\}, ~\max \left\{\sqrt[3]{\dfrac{\delta^3_{a_{ij}}+\delta^3_{b_{ij}}}{2}},\sqrt[3]{\delta^3_{a_{ij}}+\delta^3_{b_{ij}}-\delta^3_{a_{ij}}\delta^3_{b_{ij}}}\right\}\right]\\ &=\left[\left\langle \zeta_{a_{ij}}\zeta_{b_{ij}},\sqrt[3]{\delta^3_{a_{ij}}+\delta^3_{a_{ij}}-\delta^3_{a_{ij}}\delta^3_{a_{ij}}}\right\rangle\right]\\ &=A\boxtimes_{F} B.\end{align*} So, \[\left((A\boxtimes_{F} B)\rightarrow(A @ B)^C\right)^C=\left((A @ B)\rightarrow(A \boxtimes_{F} B)^C\right)^C=(A \boxtimes_{F} B).\]
  • (v) Since \begin{align*} \left((A\boxplus_{F} B)\rightarrow(A \# B)^C\right)^C &=\left[ \min\left\{\sqrt[3]{\zeta^3_{a_{ij}}+\zeta^3_{b_{ij}}-\zeta^3_{a_{ij}}\zeta^3_{b_{ij}}},\dfrac{\sqrt[3]{2}\zeta_{a_{ij}}\zeta_{b_{ij}}}{\sqrt[3]{\zeta^3_{a_{ij}}+\zeta^3_{b_{ij}}}}\right\}, \max\left\{\delta_{a_{ij}}\delta_{b_{ij}},\dfrac{\sqrt[3]{2}\delta_{a_{ij}}\delta_{b_{ij}}}{\sqrt[3]{\delta^3_{a_{ij}}+\delta^3_{b_{ij}}}}\right\}\right]\\ &=\left[\left\langle \dfrac{\sqrt[3]{2}\zeta_{a_{ij}}\zeta_{b_{ij}}}{\sqrt[3]{\zeta^3_{a_{ij}}+\zeta^3_{b_{ij}}}}, \dfrac{\sqrt[3]{2}\delta_{a_{ij}}\delta_{b_{ij}}}{\sqrt[3]{\delta^3_{a_{ij}}+\delta^3_{b_{ij}}}}\right\rangle\right]\\ &=A\# B,\end{align*} and \begin{align*} \left((A \# B)\rightarrow(A \boxplus_{F} B)^C\right)^C &=\left[ \min\left\{\dfrac{\sqrt[3]{2}\zeta_{a_{ij}}\zeta_{b_{ij}}}{\sqrt[3]{\zeta^3_{a_{ij}}+\zeta^3_{b_{ij}}}},\sqrt[3]{\zeta^3_{a_{ij}}+\zeta^3_{b_{ij}}-\zeta^3_{a_{ij}}\zeta^3_{b_{ij}}}\right\}, \max\left\{\dfrac{\sqrt[3]{2}\delta_{a_{ij}}\delta_{b_{ij}}}{\sqrt[3]{\delta^3_{a_{ij}}+\delta^3_{b_{ij}}}},\delta_{a_{ij}}\delta_{b_{ij}}\right\}\right]\\ &=\left[\left\langle \dfrac{\sqrt[3]{2}\zeta_{a_{ij}}\zeta_{b_{ij}}}{\sqrt[3]{\zeta^3_{a_{ij}}+\zeta^3_{b_{ij}}}}, \dfrac{\sqrt[3]{2}\delta_{a_{ij}}\delta_{b_{ij}}}{\sqrt[3]{\delta^3_{a_{ij}}+\delta^3_{b_{ij}}}}\right\rangle\right]\\ &=A\# B.\end{align*} So, \[\left((A\boxplus_{F} B)\rightarrow(A \# B)^C\right)^C=\left((A \# B)\rightarrow(A \boxplus_{F} B)^C\right)^C=(A \# B).\]
  • (vii)   Since \begin{align*}\left((A\boxtimes_{F} B)\rightarrow(A \# B)^C\right)^C& =\left[ x,\min\left\{\zeta_{a_{ij}}\zeta_{b_{ij}},\dfrac{\sqrt[3]{2}\zeta_{a_{ij}}\zeta_{b_{ij}}}{\sqrt[3]{\delta^3_{a_{ij}}+\delta^3_{b_{ij}}}}\right\}, \max \left\{\sqrt[3]{\delta^3_{a_{ij}}+\delta^3_{b_{ij}}-\delta^3_{a_{ij}}\delta^3_{b_{ij}}},\dfrac{\sqrt[3]{2}\delta_{a_{ij}}\delta_{b_{ij}}}{\sqrt[3]{\delta^3_{a_{ij}}+\delta^3_{b_{ij}}}}\right\}\right]\\ &=\left[\left\langle \zeta_{a_{ij}}\zeta_{b_{ij}},\sqrt[3]{\delta^3_{a_{ij}}+\delta^3_{b_{ij}}-\delta^3_{a_{ij}}\delta^3_{b_{ij}}}\right\rangle\right]\\ &=A\boxtimes_{F} B,\end{align*} and \begin{align*} \left((A \# B)\rightarrow(A \boxtimes_{F} B)^C\right)^C &=\left[ x,\min\left\{\dfrac{\sqrt[3]{2}\zeta_{a_{ij}}\zeta_{b_{ij}}}{\sqrt[3]{\delta^3_{a_{ij}}+\delta^3_{b_{ij}}}},\zeta_{a_{ij}}\zeta_{b_{ij}}\right\}, \max \left\{\dfrac{\sqrt[3]{2}\delta_{a_{ij}}\delta_{b_{ij}}}{\sqrt[3]{\delta^3_{a_{ij}}+\delta^3_{b_{ij}}}},\sqrt[3]{\delta^3_{a_{ij}}+\delta^3_{b_{ij}}-\delta^3_{a_{ij}}\delta^3_{b_{ij}}}\right\}\right]\\ &=\left[\left\langle \zeta_{a_{ij}}\zeta_{b_{ij}},\sqrt[3]{\delta^3_{a_{ij}}+\delta^3_{b_{ij}}-\delta^3_{a_{ij}}\delta^3_{b_{ij}}}\right\rangle\right]\\ &=A\boxtimes_{F} B.\end{align*} So, \[\left((A\boxtimes_{F} B)\rightarrow(A \# B)^C\right)^C=\left((A \# B)\rightarrow(A \boxtimes_{F} B)^C\right)^C=(A \boxtimes_{F} B).\]
  • (ix) Since \begin{align*}\left((A\boxplus_{F} B)\rightarrow(A \$ B)^C\right)^C &=\left[ \min\left\{\sqrt[3]{\zeta^3_{a_{ij}}+\zeta^3_{b_{ij}}-\zeta^3_{a_{ij}}\zeta^3_{b_{ij}}},\sqrt[3]{\zeta_{a_{ij}}\zeta_{b_{ij}}}\right\}, \max\left\{\delta_{a_{ij}}\delta_{b_{ij}},\sqrt[3]{\delta_{a_{ij}}\delta_{b_{ij}}}\right\}\right]\\ &=\left[\left\langle \sqrt[3]{\zeta_{a_{ij}}\zeta_{b_{ij}}},\sqrt[3]{\delta_{a_{ij}}\delta_{b_{ij}}}\right\rangle\right]\\ &=A\$ B,\end{align*} and \begin{align*} \left((A \$ B)\rightarrow(A \boxplus_{F} B)^C\right)^C &=\left[x, \min\left\{\sqrt[3]{\zeta_{a_{ij}}\zeta_{b_{ij}}},\sqrt[3]{\zeta^3_{a_{ij}}+\zeta^3_{a_{ij}}-\zeta^3_{a_{ij}}\zeta^3_{a_{ij}}}\right\}, \max\left\{\sqrt[3]{\delta_{a_{ij}}\delta_{b_{ij}}},\delta_{a_{ij}}\delta_{b_{ij}}\right\}\right]\\ &=\left[\left\langle \sqrt[3]{\zeta_{a_{ij}}\zeta_{b_{ij}}},\sqrt[3]{\delta_{a_{ij}}\delta_{b_{ij}}}\right\rangle\right]\\ &=A\$ B.\end{align*} So, \[\left((A\boxplus_{F} B)\rightarrow(A \$ B)^C\right)^C=\left((A \$ B)\rightarrow(A \boxplus_{F} B)^C\right)^C=(A \$ B).\]
  • (xi) Since \begin{align*} \left((A\boxtimes_{F} B)\rightarrow(A \$ B)^C\right)^C &=\left[\min\left\{\zeta_{a_{ij}}\zeta_{b_{ij}},\sqrt[3]{\zeta_{a_{ij}}\zeta_{b_{ij}}}\right\}, \max\left\{\sqrt[3]{\delta^3_{a_{ij}}+\delta^3_{a_{ij}}-\delta^3_{a_{ij}}\delta^3_{a_{ij}}},\sqrt[3]{\delta_{a_{ij}}\delta_{b_{ij}}}\right\}~\right]\\ &=\left[\left\langle \zeta_{a_{ij}}\zeta_{b_{ij}},\sqrt[3]{\delta^3_{a_{ij}}+\delta^3_{a_{ij}}-\delta^3_{a_{ij}}\delta^3_{a_{ij}}}\right\rangle\right]\\ &=A\boxtimes_{F} B,\end{align*} and \begin{align*} \left((A \$ B)\rightarrow(A \boxtimes_{F} B)^C\right)^C &=\left[\min\left\{\sqrt[3]{\zeta_{a_{ij}}\zeta_{b_{ij}}},\zeta_{a_{ij}}\zeta_{b_{ij}}\right\}, \max\left\{\sqrt[3]{\delta_{a_{ij}}\delta_{b_{ij}}},\sqrt[3]{\delta^3_{a_{ij}}+\delta^3_{b_{ij}}-\delta^3_{a_{ij}}\delta^3_{b_{ij}}}\right\}\right]\\ &=\left[\left\langle \zeta_{a_{ij}}\zeta_{b_{ij}},\sqrt[3]{\delta^3_{a_{ij}}+\delta^3_{b_{ij}}-\delta^3_{a_{ij}}\delta^3_{b_{ij}}}\right\rangle\right]\\ &=A\boxtimes_{F} B.\end{align*} So, \[\left((A\boxtimes_{F} B)\rightarrow(A \$ B)^C\right)^C=\left((A \$ B)\rightarrow(A \boxtimes_{F} B)^C\right)^C=(A \boxtimes_{F} B).\]
  • (xiii) Since \begin{align*} \left((A\boxplus_{F} B)\rightarrow(A \boxtimes_{F} B)^C\right)^C &=\left[ \min\left\{\sqrt[3]{\zeta^3_{a_{ij}}+\zeta^3_{b_{ij}}-\zeta^3_{a_{ij}}\zeta^3_{b_{ij}}},\zeta_{a_{ij}}\zeta_{b_{ij}}\right\}, \max\left\{\delta_{a_{ij}}\delta_{b_{ij}},\sqrt[3]{\delta^3_{a_{ij}}+\delta^3_{b_{ij}}-\delta^3_{a_{ij}}\delta^3_{b_{ij}}}\right\}~\right]\\ &=\left[\left\langle \zeta_{a_{ij}}\zeta_{b_{ij}},\sqrt[3]{\delta^3_{a_{ij}}+\delta^3_{b_{ij}}-\delta^3_{a_{ij}}\delta^3_{b_{ij}}}\right\rangle\right]\\ &=A\boxtimes_{F} B,\end{align*} and \begin{align*} \left((A \boxtimes_{F} B)\rightarrow(A \boxplus_{F} B)^C\right)^C &=\left[ \min\left\{\zeta_{a_{ij}}\zeta_{b_{ij}},\sqrt[3]{\zeta^3_{a_{ij}}+\zeta^3_{b_{ij}}-\zeta^3_{a_{ij}}\zeta^3_{b_{ij}}}\right\}, \max\left\{\sqrt[3]{\delta^3_{a_{ij}}+\delta^3_{b_{ij}}-\delta^3_{a_{ij}}\delta^3_{b_{ij}}},\delta_{a_{ij}}\delta_{b_{ij}}\right\}~\right]\\ &=\left[\left\langle \zeta_{a_{ij}}\zeta_{b_{ij}},\sqrt[3]{\delta^3_{a_{ij}}+\delta^3_{b_{ij}}-\delta^3_{a_{ij}}\delta^3_{b_{ij}}}\right\rangle\right]\\ &=A\boxtimes_{F} B.\end{align*} So, \[\left((A\boxplus_{F} B)\rightarrow(A \boxtimes_{F} B)^C\right)^C=\left((A \boxtimes_{F} B)\rightarrow(A \boxplus_{F} B)^C\right)^C=(A \boxtimes_{F} B).\]

The proof of the following Corollaries follows from Theorem 9.

Corollary 10. For \(A, B \in F_{m \times n},\) we have \(\left((A\boxtimes_{F} B)\rightarrow(A @ B)^C\right)^C=\left((A @ B)\rightarrow(A \boxtimes_{F} B)^C\right)^C= \left((A\boxtimes_{F} B)\rightarrow(A \# B)^C\right)^C=\) \(\left((A \# B)\rightarrow(A \boxtimes_{F} B)^C\right)^C=\left((A\boxtimes_{F} B)\rightarrow(A \$ B)^C\right)^C=\left((A \$ B)\rightarrow(A \boxtimes_{F} B)^C\right)^C =\left((A\boxplus_{F} B)\rightarrow(A \boxtimes_{F} B)^C\right)^C=\left((A \boxtimes_{F} B)\rightarrow(A \boxplus_{F} B)^C\right)^C =(A \boxtimes_{F} B)\).

Corollary 11. For \(A, B \in F_{m \times n},\) we have \(\left((A\boxplus_{F} B)^C\rightarrow (A @ B)\right)=\left((A @ B)^C\rightarrow (A \boxplus_{F} B)\right) =\left((A\boxplus_{F} B)^C\rightarrow (A \# B)\right)=\)\(\left((A \# B)^C\rightarrow (A \boxplus_{F} B)\right) =\left((A\boxplus_{F} B)^C\rightarrow (A \$ B)\right)=\left((A \$ B)^C\rightarrow (A \boxplus_{F} B)\right) =\left((A\boxtimes_{F} B)^C\rightarrow (A \boxplus_{F} B)\right)=\left((A \boxplus_{F} B)^C\rightarrow (A \boxtimes_{F} B)\right) =(A \boxplus_{F} B)\).

Theorem 12. For \(A, B \in F_{m \times n},\) we have \(\left[\left(A^C\rightarrow B\right)\boxplus_{F}\left(A\rightarrow B^C\right)^C\right]@ \left[\left(A^C\rightarrow B\right)\boxtimes_{F}\left(A\rightarrow B^C\right)^C\right]=\left(A @ B\right)\).

Proof. Since \[\left[\left(A^C\rightarrow B\right)\boxplus_{F}\left(A\rightarrow B^C\right)^C\right]=\left[\left\langle \sqrt[3]{\zeta^3_{a_{ij}}+\zeta^3_{b_{ij}}-\zeta^3_{a_{ij}}\zeta^3_{b_{ij}}},\delta_{a_{ij}}\delta_{b_{ij}}\right\rangle\right],\] and \[\left[\left(A^C\rightarrow B\right)\boxtimes_{F}\left(A\rightarrow B^C\right)^C\right]=\left[\left\langle \zeta_{a_{ij}}\zeta_{b_{ij}},\sqrt[3]{\delta^3_{a_{ij}}+\delta^3_{b_{ij}}-\delta^3_{a_{ij}}\delta^3_{b_{ij}}}\right\rangle\right].\] So, \begin{align*} \left[\left(A^C\rightarrow B\right)\right.&\left.\boxplus_{F}\left(A\rightarrow B^C\right)^C\right]@ \left[\left(A^C\rightarrow B\right)\boxtimes_{F}\left(A\rightarrow B^C\right)^C\right]\\ &=\left[ \sqrt[3]{\dfrac{\left(\sqrt[3]{\zeta^3_{a_{ij}}+\zeta^3_{b_{ij}}-\zeta^3_{a_{ij}}\zeta^3_{b_{ij}}}\right)^3+\zeta^3_{a_{ij}}\zeta^3_{b_{ij}}}{2}}, \sqrt[3]{\dfrac{\delta^3_{a_{ij}}\delta^3_{b_{ij}}+\left(\sqrt[3]{\delta^3_{a_{ij}}+\delta^3_{b_{ij}}-\delta^3_{a_{ij}}\delta^3_{b_{ij}}}\right)^3}{2}}~\right]\\ &=\left[\left\langle \sqrt[3]{\dfrac{\zeta^3_{a_{ij}}+\zeta^3_{b_{ij}}}{2}},\sqrt[3]{\dfrac{\delta^3_{a_{ij}}+\delta^3_{b_{ij}}}{2}}\right\rangle\right]\\ &=(A @ B).\end{align*}

Theorem 13. For \(A, B \in F_{m \times n},\) we have\begin{align*} \left[\left(\left(A^C\rightarrow B\right)\right.\right.&\left.\left.\boxplus_{F}\left(A\rightarrow B^C\right)^C\right)\bigcap \left(\left(A^C\rightarrow B\right)\boxtimes_{F}\left(A\rightarrow B^C\right)^C\right)\right]\\ &@ \left[\left(\left(A^C\rightarrow B\right)\boxplus_{F}\left(A\rightarrow B^C\right)^C\right)\bigcup \left(\left(A^C\rightarrow B\right)\boxtimes_{F}\left(A\rightarrow B^C\right)^C\right)\right]=(A @ B).\end{align*}

Proof. Since \begin{align*}\left[\left(\left(A^C\rightarrow B\right)\right.\right.&\left.\left.\boxplus_{F}\left(A\rightarrow B^C\right)^C\right)\bigcap \left(\left(A^C\rightarrow B\right)\boxtimes_{F}\left(A\rightarrow B^C\right)^C\right)\right]\\ &=\left[ \min\left\{\sqrt[3]{\zeta^3_{a_{ij}}+\zeta^3_{b_{ij}}-\zeta^3_{a_{ij}}\zeta^3_{b_{ij}}},\zeta_{a_{ij}}\zeta_{b_{ij}}\right\}, \max\left\{\delta_{a_{ij}}\delta_{a_{ij}},\sqrt[3]{\delta^3_{a_{ij}}+\delta^3_{b_{ij}}-\delta^3_{a_{ij}}\delta^3_{b_{ij}}}\right\}~\right]\\ &=\left[\left\langle \zeta_{a_{ij}}\zeta_{b_{ij}},\sqrt[3]{\delta^3_{a_{ij}}+\delta^3_{b_{ij}}-\delta^3_{a_{ij}}\delta^3_{b_{ij}}}\right\rangle\right],\end{align*} and \begin{align*} \left[\left(\left(A^C\rightarrow B\right)\right.\right.&\left.\left.\boxplus_{F}\left(A\rightarrow B^C\right)^C\right)\bigcup \left(\left(A^C\rightarrow B\right)\boxtimes_{F}\left(A\rightarrow B^C\right)^C\right)\right]\\ &=\left[ \max\left\{\sqrt[3]{\zeta^3_{a_{ij}}+\zeta^3_{b_{ij}}-\zeta^3_{a_{ij}}\zeta^3_{b_{ij}}},\zeta_{a_{ij}}\zeta_{b_{ij}}\right\}, \min\left\{\delta_{a_{ij}}\delta_{b_{ij}},\sqrt[3]{\delta^3_{a_{ij}}+\delta^3_{b_{ij}}-\delta^3_{a_{ij}}\delta^3_{b_{ij}}}\right\}~\right]\\ &=\left[\left\langle \sqrt[3]{\zeta^3_{a_{ij}}+\zeta^3_{b_{ij}}-\zeta^3_{a_{ij}}\zeta^3_{b_{ij}}},\delta_{a_{ij}}\delta_{b_{ij}}\right\rangle\right].\end{align*} Hence \begin{align*} \left[\left(\left(A^C\rightarrow B\right)\right.\right.&\left.\left.\boxplus_{F}\left(A\rightarrow B^C\right)^C\right)\bigcap \left(\left(A^C\rightarrow B\right)\boxtimes_{F}\left(A\rightarrow B^C\right)^C\right)\right]\\ &@ \left[\left(\left(A^C\rightarrow B\right)\boxplus_{F}\left(A\rightarrow B^C\right)^C\right)\bigcup \left(\left(A^C\rightarrow B\right)\boxtimes_{F}\left(A\rightarrow B^C\right)^C\right)\right]\\ =&\left[ \sqrt[3]{\dfrac{\left(\sqrt[3]{\zeta^3_{a_{ij}}+\zeta^3_{b_{ij}}-\zeta^3_{a_{ij}}\zeta^3_{b_{ij}}}\right)^3+\zeta^3_{a_{ij}}\zeta^3_{b_{ij}}}{2}}, \sqrt[3]{\dfrac{\delta^3_{a_{ij}}\delta^3_{b_{ij}}+\left(\sqrt[3]{\delta^3_{a_{ij}}+\delta^3_{b_{ij}}-\delta^3_{a_{ij}}\delta^3_{b_{ij}}}\right)^3}{2}}\right]\\ =&\left[\left\langle \sqrt[3]{\dfrac{\zeta^3_{a_{ij}}+\zeta^3_{b_{ij}}}{2}},\sqrt[3]{\dfrac{\delta^3_{a_{ij}}+\delta^3_{b_{ij}}}{2}}\right\rangle\right]\\ =&A @ B.\end{align*}

Theorem 14. For \(A, B \in F_{m \times n},\) we have \(\left[\left((A\boxplus_{F} B)\rightarrow(A @ B)^C\right)^C \bigcup \left((A\boxtimes_{F} B)\rightarrow(A @ B)^C\right)^C\right] \bigcup \left[\left((A\boxplus_{F} B)\rightarrow(A @ B)^C\right)^C \bigcap \left((A\boxtimes_{F} B)\rightarrow(A @ B)^C\right)^C\right] =A @ B.\)

Proof. From Theorem 9, we have \[\left((A\boxplus_{F} B)\rightarrow(A @ B)^C\right)^C=\left[\left\langle \sqrt[3]{\dfrac{\zeta^3_{a_{ij}}+\zeta^3_{b_{ij}}}{2}},\sqrt[3]{\dfrac{\delta^3_{a_{ij}}+\delta^3_{b_{ij}}}{2}}\right\rangle\right],\] and \[\left((A\boxtimes_{F} B)\rightarrow(A @ B)^C\right)^C=\left[\left\langle \zeta_{a_{ij}}\zeta_{b_{ij}},\sqrt[3]{\delta^3_{a_{ij}}+\delta^3_{a_{ij}}-\delta^3_{a_{ij}}\delta^3_{a_{ij}}}\right\rangle\right].\] So, \begin{align*} \left[\left((A\boxplus_{F} B)\right.\right.&\left.\left.\rightarrow(A @ B)^C\right)^C \bigcup \left((A\boxtimes_{F} B)\rightarrow(A @ B)^C\right)^C\right]\\ &=\left[ \max\left\{\sqrt[3]{\dfrac{\zeta^3_{a_{ij}}+\zeta^3_{b_{ij}}}{2}},(\zeta_{a_{ij}}\zeta_{b_{ij}})\right\}, \min\left\{\sqrt[3]{\dfrac{\delta^3_{a_{ij}}+\delta^3_{b_{ij}}}{2}},\sqrt[3]{\delta^3_{a_{ij}}+\delta^3_{b_{ij}}-\delta^3_{a_{ij}}\delta^3_{b_{ij}}}\right\}\right]\\ &=\left[\left\langle \sqrt[3]{\dfrac{\zeta^3_{a_{ij}}+\zeta^3_{b_{ij}}}{2}},\sqrt[3]{\dfrac{\delta^3_{a_{ij}}+\delta^3_{b_{ij}}}{2}}\right\rangle\right],\end{align*} and \begin{align*} \left[\left((A\boxplus_{F} B)\right.\right.&\left.\left.rightarrow(A @ B)^C\right)^C \bigcap \left((A\boxtimes_{F} B)\rightarrow(A @ B)^C\right)^C\right]\\ &=\left[ \min\left\{\sqrt[3]{\dfrac{\zeta^3_{a_{ij}}+\zeta^3_{b_{ij}}}{2}},(\zeta_{a_{ij}}\zeta_{b_{ij}})\right\}, \max\left\{\sqrt[3]{\dfrac{\delta^3_{a_{ij}}+\delta^3_{b_{ij}}}{2}},\sqrt[3]{\delta^3_{a_{ij}}+\delta^3_{b_{ij}}-\delta^3_{a_{ij}}\delta^3_{b_{ij}}}\right\}\right]\\ &=\left[\left\langle \zeta_{a_{ij}}\zeta_{b_{ij}},\sqrt[3]{\delta^3_{a_{ij}}+\delta^3_{b_{ij}}-\delta^3_{a_{ij}}\delta^3_{b_{ij}}}\right\rangle\right].\end{align*} Hence \begin{align*}&\left[\left((A\boxplus_{F} B)\rightarrow(A @ B)^C\right)^C \bigcup \left((A\boxtimes_{F} B)\rightarrow(A @ B)^C\right)^C\right] \left[\left((A\boxplus_{F} B)\rightarrow(A @ B)^C\right)^C \bigcap \left((A\boxtimes_{F} B)\rightarrow(A @ B)^C\right)^C\right]\\ &=\left[ \max\left\{\sqrt[3]{\dfrac{\zeta^3_{a_{ij}}+\zeta^3_{b_{ij}}}{2}},(\zeta_{a_{ij}}\zeta_{b_{ij}})\right\}, \min\left\{\sqrt[3]{\dfrac{\delta^3_{a_{ij}}+\delta^3_{b_{ij}}}{2}},\sqrt[3]{\delta^3_{a_{ij}}+\delta^3_{b_{ij}}-\delta^3_{a_{ij}}\delta^3_{b_{ij}}}\right\}\right]\\ &=\left[\left\langle \sqrt[3]{\dfrac{\zeta^3_{a_{ij}}+\zeta^3_{b_{ij}}}{2}},\sqrt[3]{\dfrac{\delta^3_{a_{ij}}+\delta^3_{b_{ij}}}{2}}\right\rangle\right]=A @ B.\end{align*}

Theorem 15. For \(A, B \in F_{m \times n},\) we have \(\left[\left((A\boxplus_{F} B)\rightarrow(A @ B)^C\right)^C \bigcup \left((A\boxtimes_{F} B)\rightarrow(A @ B)^C\right)^C\right] \bigcap \left[\left((A\boxplus_{F} B)\rightarrow(A @ B)^C\right)^C \bigcap \left((A\boxtimes_{F} B)\rightarrow(A @ B)^C\right)^C\right]=A \boxtimes_{F} B.\)

Proof. The proof is similar to that of Theorem 14.

Theorem 16. For \(A, B \in F_{m \times n},\) we have \(\left((A \boxplus_{F} B)^C\rightarrow (A @ B)\right)@\left((A \boxtimes_{F} B)\rightarrow (A @ B)^C\right)^C=(A @ B)\).

Proof. Since \[\left((A \boxplus_{F} B)^C\rightarrow (A @ B)\right)=\left[\left\langle \sqrt[3]{\zeta^3_{a_{ij}}+\zeta^3_{b_{ij}}-\zeta^3_{a_{ij}}\zeta^3_{b_{ij}}},\delta_{a_{ij}}\delta_{b_{ij}}\right\rangle\right],\] and \[\left((A \boxtimes_{F} B)\rightarrow (A @ B)^C\right)^C=\left[\left\langle \zeta_{a_{ij}}\zeta_{b_{ij}},\sqrt[3]{\delta^3_{a_{ij}}+\delta^3_{b_{ij}}-\delta^3_{a_{ij}}\delta^3_{b_{ij}}}\right\rangle\right].\] So, \begin{align*} \left((A \boxplus_{F} B)^C\right.&\left.\rightarrow (A @ B)\right)@\left((A \boxtimes_{F} B)\rightarrow (A @ B)^C\right)^C\\ &=\left[ \sqrt[3]{\dfrac{\left(\sqrt[3]{\zeta^3_{a_{ij}}+\zeta^3_{b_{ij}}-\zeta^3_{a_{ij}}\zeta^3_{b_{ij}}}\right)^3+(\zeta_{a_{ij}}\zeta_{b_{ij}})^3}{2}}, \sqrt[3]{\dfrac{(\delta_{a_{ij}}\delta_{b_{ij}})^3+\left(\sqrt[3]{\delta^3_{a_{ij}}+\delta^3_{b_{ij}}-\delta^3_{a_{ij}}\delta^3_{b_{ij}}}\right)^3}{2}}~\right]\end{align*} \begin{align*} &=\left[\left\langle \sqrt[3]{\dfrac{\zeta^3_{a_{ij}}+\zeta^3_{b_{ij}}}{2}},\sqrt[3]{\dfrac{\delta^3_{a_{ij}}+\delta^3_{b_{ij}}}{2}}\right\rangle\right]=A @ B.\end{align*}

Theorem 17. For \(A, B \in F_{m \times n},\) we have \(\left((A \boxplus_{F} B)^C\rightarrow (A \# B)\right)@\left((A \boxtimes_{F} B)\rightarrow (A \# B)^C\right)^C=(A @ B)\).

Proof. Since \[\left((A \boxplus_{F} B)^C\rightarrow (A \# B)\right)=\left[\left\langle \sqrt[3]{\zeta^3_{a_{ij}}+\zeta^3_{b_{ij}}-\zeta^3_{a_{ij}}\zeta^3_{b_{ij}}},\delta_{a_{ij}}\delta_{b_{ij}}\right\rangle\right],\] and \[\left((A \boxtimes_{F} B)\rightarrow (A \# B)^C\right)^C=\left[\left\langle \zeta_{a_{ij}}\zeta_{b_{ij}},\sqrt[3]{\delta^3_{a_{ij}}+\delta^3_{b_{ij}}-\delta^3_{a_{ij}}\delta^3_{b_{ij}}}\right\rangle\right].\] So, \begin{align*} \left((A \boxplus_{F} B)^C\right.&\left.\rightarrow (A \# B)\right)@\left((A \boxtimes_{F} B)\rightarrow (A \# B)^C\right)^C\\ &=\left[ \sqrt[3]{\dfrac{\left(\sqrt[3]{\zeta^3_{a_{ij}}+\zeta^3_{b_{ij}}-\zeta^3_{a_{ij}}\zeta^3_{b_{ij}}}\right)^3+(\zeta_{a_{ij}}\zeta_{b_{ij}})^3}{2}}, \sqrt[3]{\dfrac{(\delta_{a_{ij}}\delta_{b_{ij}})^3+\left(\sqrt[3]{\delta^3_{a_{ij}}+\delta^3_{b_{ij}}-\delta^3_{a_{ij}}\delta^3_{b_{ij}}}\right)^3}{2}}~\right]\\ &=\left[\left\langle \sqrt[3]{\dfrac{\zeta^3_{a_{ij}}+\zeta^3_{b_{ij}}}{2}},\sqrt[3]{\dfrac{\delta^3_{a_{ij}}+\delta^3_{b_{ij}}}{2}}\right\rangle\right]\\ &=A @ B.\end{align*}

Theorem 18. For \(A, B \in F_{m \times n},\) we have \(\left((A \boxplus_{F} B)^C\rightarrow (A \$ B)\right)@\left((A \boxtimes_{F} B)\rightarrow (A \$ B)^C\right)^C=(A @ B)\).

Proof. Since \[\left((A \boxplus_{F} B)^C\rightarrow (A \$ B)\right)=\left[\left\langle \sqrt[3]{\zeta^3_{a_{ij}}+\zeta^3_{b_{ij}}-\zeta^3_{a_{ij}}\zeta^3_{b_{ij}}},\delta_{a_{ij}}\delta_{b_{ij}}\right\rangle\right],\] and \[\left((A \boxtimes_{F} B)\rightarrow (A \$ B)^C\right)^C=\left[\left\langle \zeta_{a_{ij}}\zeta_{b_{ij}},\sqrt[3]{\delta^3_{a_{ij}}+\delta^3_{b_{ij}}-\delta^3_{a_{ij}}\delta^3_{b_{ij}}}\right\rangle\right].\] So, \begin{align*}\left((A \boxplus_{F} B)^C\right.&\left.\rightarrow (A \$ B)\right)@\left((A \boxtimes_{F} B)\rightarrow (A \$ B)^C\right)^C\\ &=\left[ \sqrt[3]{\dfrac{\left(\sqrt[3]{\zeta^3_{a_{ij}}+\zeta^3_{b_{ij}}-\zeta^3_{a_{ij}}\zeta^3_{b_{ij}}}\right)^3+(\zeta_{a_{ij}}\zeta_{b_{ij}})^3}{2}}, \sqrt[3]{\dfrac{(\delta_{a_{ij}}\delta_{b_{ij}})^3+\left(\sqrt[3]{\delta^3_{a_{ij}}+\delta^3_{b_{ij}}-\delta^3_{a_{ij}}\delta^3_{b_{ij}}}\right)^3}{2}}~\right]\\ &=\left[\left\langle \sqrt[3]{\dfrac{\zeta^3_{a_{ij}}+\zeta^3_{b_{ij}}}{2}},\sqrt[3]{\dfrac{\delta^3_{a_{ij}}+\delta^3_{b_{ij}}}{2}}\right\rangle\right]\\ &=A @ B.\end{align*}

Theorem 19. For \(A, B \in F_{m \times n},\) we have \(\left((A \boxtimes_{F} B)^C\rightarrow (A \boxplus_{F} B)\right)@\left((A \boxplus_{F} B)\rightarrow (A \boxtimes_{F} B)^C\right)^C=(A @ B)\).

Proof. Since \[ \left((A \boxtimes_{F} B)^C\rightarrow (A \boxplus_{F} B)\right)=\left[\left\langle \sqrt[3]{\zeta^3_{a_{ij}}+\zeta^3_{b_{ij}}-\zeta^3_{a_{ij}}\zeta^3_{b_{ij}}},\delta_{a_{ij}}\delta_{b_{ij}}\right\rangle\right],\] and \[ \left((A \boxplus_{F} B)\rightarrow (A \boxtimes_{F} B)^C\right)^C=\left[\left\langle \zeta_{a_{ij}}\zeta_{b_{ij}},\sqrt[3]{\delta^3_{a_{ij}}+\delta^3_{b_{ij}}-\delta^3_{a_{ij}}\delta^3_{b_{ij}}}\right\rangle\right].\] So, \begin{align*} \left((A \boxtimes_{F} B)^C\right.&\left.\rightarrow (A \boxplus_{F} B)\right)\left((A \boxplus_{F} B)\rightarrow (A \boxtimes_{F} B)^C\right)^C\\ &=\left[ \sqrt[3]{\dfrac{\left(\sqrt[3]{\zeta^3_{a_{ij}}+\zeta^3_{b_{ij}}-\zeta^3_{a_{ij}}\zeta^3_{b_{ij}}}\right)^3+(\zeta_{a_{ij}}\zeta_{b_{ij}})^3}{2}}, \sqrt[3]{\dfrac{(\delta_{a_{ij}}\delta_{b_{ij}})^3+\left(\sqrt[3]{\delta^3_{a_{ij}}+\delta^3_{b_{ij}}-\delta^3_{a_{ij}}\delta^3_{b_{ij}}}\right)^3}{2}}~\right]\\ &=\left[\left\langle \sqrt[3]{\dfrac{\zeta^3_{a_{ij}}+\zeta^3_{b_{ij}}}{2}},\sqrt[3]{\dfrac{\delta^3_{a_{ij}}+\delta^3_{b_{ij}}}{2}}\right\rangle\right]\\ &=A @ B.\end{align*}

6. Conclusion and future scope

In this paper, some new operators \([(A \$ B),(A \# B),(A\ast B),(A\rightarrow B)]\) of Fermatean fuzzy matrices are defined and investigated their several algebraic properties. Further, the necessity and possibility operators of Fermatean fuzzy matrices are proved. Finally, we have identified and proved several of these properties, particularly those involving the operator \(A\rightarrow B\) defined as Fermatean fuzzy implication with other operators. In further research, we may apply these operators in the field of different areas, for example, dynamic decision and consensus , business and marketing management, design, engineering and manufacturing, information technology and networking applications, human resources management, military applications, energy management, geographic information system applications etc.

Conflicts of Interest

The author declares no conflict of interest.

References

  1. Khan, S.K, Pal, M., & Shyamal, A.K. (2002). Intuitionistic Fuzzy Matrices. Notes on Intuitionistic Fuzzy Sets, 8(2), 51-62. [Google Scholor]
  2. Im, Y.P. Lee, F.B., & Park, S.W. (2001). The determinant of square intuitionistic fuzzy matrices. Far East Journal of Mathematical Science, 3(5), 789-796. [Google Scholor]
  3. Thomason, M.G. (1977). Convergence of powers of Fuzzy matrix. Journal of Mathematical Analysis and Applications, 57 (2), 476-480. [Google Scholor]
  4. Silambarasan, I., & Sriram, S.(2018). Algebraic operations on Pythagorean fuzzy matrices. Mathematical Sciences International Research Journal, 7(2), 406-414.[Google Scholor]
  5. Pal, P. (2001). Intuitionistic fuzzy determinant. V.U.J. Physical Sciences, 7, 87-93. [Google Scholor]
  6. Khan, S.K., & Pal, M. (2006). Some operations on Intuitionistic Fuzzy Matrices. Acta Ciencia Indica, 32, 515-524. [Google Scholor]
  7. Mondal, S., & Pal, M. (2013). Similarity relations, invertibility and eigenvalues of IFM. Fuzzy Information and Engineering, 5(4), 431-443. [Google Scholor]
  8. Emam, E.G., & Fndh, M.A. (2016). Some results associated with the max-min and min-max compositions of bifuzzy matrices. Journal of the Egyption Mathematical Society, 24(4), 515-521. [Google Scholor]
  9. Muthuraji,T., Sriram, S., & Murugadas, P. (2016). Decomposition of intuitionistic fuzzy matrices. Fuzzy Information and Engineering, 8(3), 345-354. [Google Scholor]
  10. Sriram, S., & Boobalan, J. (2016). Monoids of intuitionistic fuzzy matrices. Annals of fuzzy Mathematics and Informatics, 11(3), 505-510. [Google Scholor]
  11. Muthuraji, T., & Sriram, S. (2017). Representation and decomposition of an intuitionistic fuzzy matrix using some \((\alpha,\alpha')\) cuts. Applications and Applied Mathematics , 12(1), 241-258. [Google Scholor]
  12. Silambarasan, I., & Sriram, S. (2019). New Operations for Pythagorean Fuzzy Matrices. Indian Journal of Science and Technology, 12(20), 1-7. [Google Scholor]
  13. Silambarasan, I., & Sriram, S. (2019). Implication operator on Pythagorean Fuzzy Set. International Journal of Scientific & Technology Research, 8 (8), 1505-1509. [Google Scholor]
  14. Silambarasan, I., & Sriram, S. (2020). Some operations over Pythagorean fuzzy matrices based on Hamacher operations. Applications and Applied Mathematics, 15(1), 353-371. [Google Scholor]
  15. Silambarasan, I.(2020). New operators for Fermatean fuzzy sets. Annals of Communications in Mathematics, 3(2), 116-131. [Google Scholor]
  16. Silambarasan, I., & Sriram, S. (2021). Some operations over intuitionistic fuzzy matrices based on Hamacher t-norm and t-conorm. TWMS Journal of Applied and Engineering Mathematics, 11(2), 541-551. [Google Scholor]
  17. Silambarasan, I. (2021). Some new operations and their properties on q-rung orthopair fuzzy matrices. Asia Mathematika, 5 (1), 119-133. [Google Scholor]
  18. Silambarasan, I. (2020). Fermatean fuzzy matrices. TWMS Journal of Applied and Engineering Mathematics. Accepted. [Google Scholor]
  19. Ali, Z., & Mahmood, T. (2020). Maclaurin symmetric mean operators and their applications in the environment of complex q-rung orthopair fuzzy sets. Computational and Applied Mathematics, 39, 1-27. [Google Scholor]
  20. Ali Z., Mahmood T., & Yang M-S.(2020). TOPSIS method based on complex spherical fuzzy sets with Bonferroni mean operators. Mathematics, 8 (10), 1739. https://doi.org/10.3390/math8101739 [Google Scholor]
  21. Ali Z, Mahmood T., & Yang M-S.(2020). Complex T-spherical fuzzy aggregation operators with application to multi-attribute decision making. Symmetry, 12(8), 1311. https://doi.org/10.3390/sym12081311 [Google Scholor]
  22. Mahmood, T. (2020). A novel approach towards bipolar soft sets and their applications. Journal of Mathematics, 2020, Article ID 4690808, https://doi.org/10.1155/2020/4690808. [Google Scholor]
]]>
\(S\)-norms on anti \(Q\)-fuzzy subgroups https://old.pisrt.org/psr-press/journals/odam-vol-4-issue-3-2021/s-norms-on-anti-q-fuzzy-subgroups/ Wed, 06 Oct 2021 11:42:22 +0000 https://old.pisrt.org/?p=5959
ODAM-Vol. 4 (2021), Issue 3, pp. 1 - 9 Open Access Full-Text PDF
Rasul Rasuli
Abstract:In this paper, by using \(S\)-norms, we defined anti fuzzy subgroups and anti fuzzy normal subgroups which are new notions and considered their fundamental properties and also made an attempt to study the characterizations of them. Next we investigated image and pre image of them under group homomorphisms. Finally, we introduced the direct sum of them and proved that direct sum of any family of them is also anti fuzzy subgroups and anti fuzzy normal subgroups under \(S\)-norms, respectively.
]]>

Open Journal of Discrete Applied Mathematics

\(S\)-norms on anti \(Q\)-fuzzy subgroups

Rasul Rasuli
Department of Mathematics, Payame Noor University (PNU), Tehran, Iran.; rasulirasul@yahoo.com

Abstract

In this paper, by using \(S\)-norms, we defined anti fuzzy subgroups and anti fuzzy normal subgroups which are new notions and considered their fundamental properties and also made an attempt to study the characterizations of them. Next we investigated image and pre image of them under group homomorphisms. Finally, we introduced the direct sum of them and proved that direct sum of any family of them is also anti fuzzy subgroups and anti fuzzy normal subgroups under \(S\)-norms, respectively.

Keywords:

Fuzzy groups; \(S\)-norms; Homomorphisms; Direct sum.

1. Introduction

Most lectures on group theory actually start with the definition of what is a group. It may be worth though spending a few lines to mention how mathematicians came up with such a concept. Around 1770, Lagrange initiated the study of permutations in connection with the study of the solution of equations. He was interested in understanding solutions of polynomials in several variables, and got this idea to study the behaviour of polynomials when their roots are permuted. It is Galois (1811-1832) who is considered by many as the founder of group theory. He was the first to use the term "group" in a technical sense, though to him it meant a collection of permutations closed under multiplication. Galois theory will be discussed much later in these notes.

Fuzzy set theory, proposed by Zadeh [1], has been extensively applied to many scientific fields. In fact, the field grew enormously, and applications were found in areas by many authors [2,3] as diverse as washing machines to handwriting recognition and other applications. Following the discovery of fuzzy sets, much attention has been paid to generalize the basic concepts of classical algebra in a fuzzy framework, and thus developing a theory of fuzzy algebras. In recent years, much interest is shown to generalize algebraic structures of groups, rings, modules, etc. The triangular norm, \( S \)-norm, originated from the studies of probabilistic metric spaces in which triangular inequalities were extended using the theory of \( S \)-norm. Later, Hohle [4], Alsina et al., [5] introduced the \( S \) norm into fuzzy set theory and suggested that the \( S \)-norm be used for the intersection and union of fuzzy sets. Since then, many other researchers have presented various types of \( S \)-norms for particular purposes [6,7].

In practice, Zadeh's conventional \( S \)-norm,\( \bigvee\), have been used in almost every design for fuzzy logic controllers and even in the modelling of other decision-making processes. However, some theoretical and experimental studies seem to indicate that other types of \( S \)-norms may work better in some situations, especially in the context of decision making processes. The author by using norms, investigated some properties of fuzzy algebraic structures [8,9,10,11].

The main purpose of the article is as follows: In Section 2, by using \(s\)-norms, we introduce anti fuzzy subgroups of group \(G.\) Next we prove that the union of them is also anti fuzzy subgroup and obtain some properties of them. Later, we define the composion between them and we prove that some results about them. Also we introduce anti fuzzy normal subgroups of group \(G\) under \(s\)-norms and we show that the union of any family of them is also anti fuzzy normal subgroup. Finally, we define normal subgroup between two anti fuzzy normal subgroups under \(s\)-norms and we investigate some basic properties of them. In Section 3, we investigate group bhomomorphisms and by using \(s\)-norms, we prove that image and pre image of anti fuzzy subgroups, anti fuzzy normal subgroups and normal subgroup between two anti fuzzy normal subgroups is also anti fuzzy subgroups, anti fuzzy normal subgroups and normal subgroup between two anti fuzzy normal subgroups, respectively. In Section 4, we define direct sum of anti fuzzy subgroups and anti fuzzy normal subgroups under \(s\)-norms and we prove that direct sum of any family of anti fuzzy subgroups and anti fuzzy normal subgroups under \(s\)-norms is also anti fuzzy subgroups and anti fuzzy normal subgroups under \(s\)-norms, respectively.

2. \(S\)-norms over anti fuzzy subgroups and anti fuzzy normal subgroups

Definition 1.[12] Let \(G\) be an arbitrary group with a multiplicative binary operation and identity \(e\). A fuzzy subset of \(G\), we mean a function from \(G\) into \( [0,1]\). The set of all fuzzy subsets of \(G\) is called the \( [0,1]\)-power set of \(G\) and is denoted \( [0,1]^G.\)

Definition 2.[13] An \(s\)-norm \(S\) is a function \(S : [0,1]\times [0,1] \to [0,1]\) having the following four properties:

  • (1) \(S(x,0)=x\),
  • (2) \(S(x,y)\leq S(x,z)\) if \(y\leq z\),
  • (3) \(S(x,y)= S(y,x)\),
  • (4) \( S(x,S(y,z))=S(S(x,y),z)\),
for all \(x,y,z \in [0,1].\)

We say that \(S\) is idempotent if for all \(x \in [0,1]\),\(S(x, x) =x.\)

Example 1. The basic \(S\)-norms are \[S_m(x,y) = \max \{ x,y \},\] \[S_b(x,y) = \min\{1, x+y \}\] and \[S_p(x, y) = x+y-xy \] for all \(x,y \in [0,1].\) (\(S_m\) is standard union, \(S_b\) is bounded sum, \(S_p\) is algebraic sum.)

Now we define anti fuzzy subgroup of \(G\) under an \(s\)-norm \(S.\)

Definition 3. Let \(\mu\) be a fuzzy subset of a group \(G.\) Define \(\mu\) is an anti fuzzy subgroup of \(G\) under an \(s\)-norm \(S\) iff

  • (1) \(\mu(xy) \leq S(\mu(x),\mu(y)),\)
  • (2) \(\mu(x^{-1}) \leq\mu (x),\)
for all \(x,y\in G.\)

Denote by \(AFS(G)\), the set of all anti fuzzy subgroups of \(G\) under an \(s\)-norm \(S.\)

Example 2. Let \(\mathbb{Z}\) be a set of integer and \( G=(\mathbb{Z},+) \) be an additive group. Define \( \mu:G \to [0,1] \) as \begin{equation*} \mu_{A}(z) = \left\{ \begin{array}{rl} 0.9 &\text{if } z\in 2\mathbb{Z};\\ 0.8 &\text{if } z\in \lbrace 2\mathbb{Z}-1 \rbrace, \end{array} \right. \end{equation*} and let \(S_p(x, y) = x+y-xy \) be an algebraic sum \(s\)-norm for all \(x,y \in [0,1].\) Then \( \mu \in AFS(G).\)

Proposition 1. Let \(\mu\) be a fuzzy subset of a finite group \(G\) and \(S\) be idempotent. \(\mu\) satisfies condition (1) of Definition 3, then \(\mu\in AFS(G).\)

Proof. Let \(x\in G,x\neq e.\) Since \(G\) is finite, \(x\) has finite order, say \(n> 1.\) So \(x^n=e\) and \(x^{-1}=x^{n-1}.\) Now by using Definition 3(1) repeatedly, we have \[\mu (x^{-1})=\mu (x^{n-1})= S(x^{n-2}x) \leq ُ(\mu (x^{n-1}),\mu(x)) \leq S(\underbrace{\mu(x),\mu(x),...,\mu(x)}_{n})= \mu(x).\] Then \(\mu\in AFS(G).\)

In the following we define the union of two anti fuzzy subgroups of \(G\) under an \(s\)-norm \(S.\)

Definition 4. Let \(\mu_1,\mu_2\in AFS(G).\) We define

  • (1) \(\mu_1\subseteq\mu_2\) iff \(\mu_1(x)\leq \mu_2(x),\)
  • (2) \(\mu_1 = \mu_2\) iff \(\mu_1(x)=\mu_2(x),\)
  • (3) \((\mu_1\cup\mu_2)(x)=S(\mu_1(x),\mu_2(x))\),
for all \(x \in G.\)

Proposition 2. Let \(\mu_{1} , \mu_{2} \in AFS(G)\), Then \(\mu_{1} \cup \mu_{2} \in AFS(G).\)

Proof. Let \( x,y \in G. \) Then \begin{align*} (\mu_1\cup \mu_2)(xy)&=S(\mu_1(xy),\mu_2(xy))\\ &\leq S(S(\mu_1(x),\mu_1(y)),S(\mu_2(x),\mu_2(y)))\\&=S(S(\mu_1(x),\mu_2(x)),S(\mu_1(y),\mu_2(y))) \\& = S((\mu_1 \cup\mu_2)(x),(\mu_1 \cup \mu_2)(y)). \end{align*} And \begin{align*} (\mu_1\cup \mu_2)(x^{-1})&=S(\mu_1(x^{-1}),\mu_2(x^{-1}))\\ &\leq S(\mu_1(x),\mu_2(x)) =(\mu_1\cup \mu_2)(x). \end{align*} Thus \(\mu_{1} \cup \mu_{2} \in AFS(G)\).

Corollary 1. Let \(I_{n}=\{1,2,...,n\}.\) If \(\{\mu_{i}\hspace{0.1cm} | \hspace{0.1cm} i\in I_{n}\} \subseteq AFS(G)\), then \(\mu=\cup_{i\in I_{n}}\mu_{i}\in AFS(G).\)

Lemma 1. Let \(\mu\in AFS(G).\) If \(S\) be idempotent \(s\)-norm, then for all \(x \in G \), and \(n\geq 1,\) we have

  • (1) \(\mu(e) \leq \mu(x),\)
  • (2) \(\mu(x^n)\leq \mu(x),\)
  • (3) \(\mu(x)=\mu(x^{-1}).\)

Proof. Let \(x \in G \) and \(n\geq 1.\) Then

  • (1) \(\mu(e)=\mu(xx^{-1}) \leq S(\mu(x),\mu(x^{-1}))\leq S(\mu(x),\mu(x))=\mu(x).\)
  • (2) \(\mu(x^n)=\mu(\underbrace{xx...x}_{n})\leq S(\underbrace{\mu(x),\mu(x),...,\mu(x)}_{n})= \mu(x).\)
  • (3) \(\mu(x)=\mu((x^{-1}))^{-1} \leq \mu(x^{-1}) \leq \mu(x)=\mu(x ^{-1})\) and so \(\mu(x)=\mu(x^{-1}).\)

Proposition 3. Let \(\mu \in AFS(G)\) and \(x\in G\) and \(S\) be idempotent \(s\)-norm. Then \(\mu (xy)=\mu(y)\) for all \(y \in G\) if and only if \(\mu (x)=\mu(e). \)

Proof. Suppose that \(\mu(xy)= \mu(y)\) for all \(y \in G.\) Then by letting \(y=e\), we get that \(\mu (x)=\mu(e). \) Conversely, suppose that \(\mu (x)=\mu(e). \) By Lemma 1 we get that \(\mu(x )\leq\mu (xy)\) and \(\mu(x )\leq \mu(y).\) Now we have \[\mu(xy) \leq S(\mu(x),\mu(y)) \leq S(\mu(y),\mu(y))=\mu(y)=\mu(x^{-1}xy)\leq S(\mu(x),\mu(xy)) \leq S(\mu(xy),\mu(xy)) =\mu(xy).\] Thus \(\mu(xy)=\mu(y).\)

Now we define the composition of two anti fuzzy subgroups of \(G\) under an \(s\)-norm \(S.\)

Definition 5. Let \(G\) be a set and let \(\mu,\nu\) be two fuzzy sets in \(G.\) Then \( \mu o \nu\) is defined by \begin{equation*} (\mu o \nu)(x) = \left\{ \begin{array}{rl} \inf_{x=ab}S((\mu(a),\nu(b)) &\text{if } x=ab,\\ 0 &\text{if } x\neq ab. \end{array} \right. \end{equation*}

Proposition 4. Let \(\mu^{-1}\) be the inverse of \(\mu\) such that \(\mu^{-1}(x)=\mu (x^{-1}).\) Then \(\mu\in AFS(G)\) if and only if \(\mu\) satisfies the following conditions:

  • (1) \(\mu o\mu \supseteq \mu;\)
  • (2) \(\mu^{-1}=\mu.\)

Proof. Let \(\mu\in AFS(G)\) and \(x,y,z \in G\) such that \(x=yz.\) Then \[ \mu (x)=\mu (yz) \leq S(\mu(y),\mu(z))=(\mu o\mu)(x)\,,\] so \(\mu o\mu \supseteq \mu.\) Also \(\mu^{-1}=\mu\) comes from Lemma 1(3).

Conversely, let \(\mu\) satisfies the condition (1) and (2). Then

\[\mu(yz)=\mu(x) \leq (\mu o\mu)(x)=\inf_{x=yz}S(\mu(y),\mu(z))\leq S(\mu(y),\mu(z)).\] Therefore \(\mu\in AFS(G).\)

Corollary 2. Let \(\mu,\nu \in AFS(G)\) and \(G\) be commutative group. Then \(\mu o \nu \in AFS(G)\) if and only if \(\mu o \nu = \nu o \mu.\)

Proof. If \(\mu,\nu, \mu o \nu \in AFS(G)\), then from Proposition 3 we get that \(\mu^{-1}=\mu, \nu^{-1}=\nu \) and \((\mu o \nu)^{-1}=(\mu o \nu).\) Then \(\mu o \nu = \mu^{-1} o \nu^{-1}=(\nu o \mu)^{-1}=\nu o \mu.\)

Conversely, since \(\mu o \nu = \nu o \mu\) we have

\[(\mu o \nu)^{-1} =( \nu o \mu)^{-1}=\mu^{-1}o \nu^{-1}=\mu o \nu.\] Also \[(\mu o\nu)o(\mu o\nu)=\mu o (\nu o \mu)o \nu= \mu o (\mu o \nu) o \nu= (\mu o \mu) o (\nu o \nu)\subseteq \mu o \nu.\] Now Proposition 3 gives us that \(\mu o \nu \in AFS(G).\)

In the following we define anti fuzzy normal subgroups of \(G\) under an \(s\)-norm \(S.\)

Definition 6. We say that \(\mu\in AFS(G)\) is a normal if for all \(x,y\in G\), \(\mu(xyx^{-1}) = \mu (y).\) Also we denote by \(AFNS(G)\) the set of all anti fuzzy normal subgroups of \(G\) under an \(s\)-norm \(S.\)

Proposition 5. Let \(\mu_{1},\mu_{2}\in AFNS(G).\) Then \(\mu_{1} \cup \mu_{2} \in AFNS(G).\)

Proof. Let \(x,y,\in G.\) Then \[(\mu_{1}\cup \mu_{2})(xyx^{-1})=S(\mu_{1}(xyx^{-1}),\mu_{2}(xyx^{-1})) =S(\mu_{1}(y),\mu_{2}(y))=(\mu_{1} \cup \mu_{2})(y).\] Therefore \(\mu_{1} \cup \mu_{2} \in AFNS(G).\)

Corollary 3. Let \(I_{n}=\{1,2,...,n\}.\) If \(\{\mu_{i}\hspace{0.1cm} | \hspace{0.1cm}i\in I_{n}\} \subseteq AFNS(G).\) Then \(\mu=\cup_{i\in I_{n}}\mu_{i}\in AFNS(G).\)

In the following we define the normal subgroups between two anti fuzzy subgroups of \(G\) under an \(s\)-norm \(S.\)

Definition 7. Let \(\mu,\nu \in AFS(G)\) and \(\mu\subseteq \nu.\) Then \(\mu\) is called a normal subgroup of the subgroup \(\nu\), written \(\mu \unrhd \nu\), if for all \(x,y\in G\) we have that \(\mu(xyx^{-1})\leq S(\mu(y), \nu(x)).\)

Proposition 6.

  • (1) If \(G_{1}\) and \(G_{2}\) are subgroups of \(G\) and \(G_{1}\) is a normal subgroup of \(G_{2},\) then \(1_{G_{1}} \unrhd 1_{G_{2}}.\)
  • (2) If \(S\) be idempotent \(s\)-norm, then every anti fuzzy subgroup under an \(s\)-norm \(S\) is an anti fuzzy normal subgroup of itself under an \(s\)-norm \(S.\)

Proof.

  • (1) Let \(x\in G_{2}\) and \(y\in G_{1}.\) If \({G_{1}} \unrhd {G_{2}}\), then \(xyx^{-1}\in G_{1}\) and we have \[1_{G_{1}}(xyx^{-1})=1 \leq 1=S(1,1)=S(1_{G_{1}}(y),1_{G_{2}}(x)).\] Thus \(1_{G_{1}} \unrhd 1_{G_{2}}.\)
  • (2) Let \(\mu\in AFS(G)\) and \(x,y\in G.\) Then \[\mu (xyx^{-1})\leq S(\mu (xy),\mu (x^{-1})) \leq S(S(\mu(x),\mu(y)),\mu(x)) = S(S(\mu(x),\mu(x)),\mu(y)) =S(\mu(x),\mu(y)).\] Therefore \(\mu \unrhd \mu.\)

Proposition 7. Let \(S\) be idempotent \(s\)-norm. If \(\mu\in AFNS(G)\) and \(\nu\in AFS(G)\), then \(\mu \cup \nu \unrhd \nu.\)

Proof. Proposition 1 gives us \((\mu\cup \nu)\in AFS(G).\) Now for all \(x,y\in G\) we have \begin{align*} (\mu\cup \nu)(xyx^{-1})&=S(\mu(xyx^{-1}),\nu(xyx^{-1})) \\&=S(\mu(y),\nu(xyx^{-1})) \\&\leq S(\mu(y),S(\nu(xy)),\nu(x^{-1}))) \\&\leq S(\mu(y),S(\nu(xy)),\nu(x))) \\&\leq S(\mu(y),S(S(\nu(x),\nu(y)),\nu(x)))\\&=S(\mu(y),S(S(\nu(x),\nu(x)),\nu(y)))\\&=S(\mu(y),S(\nu(x),\nu(y)))\\&=S(S(\mu(y),\nu(y)),\nu(x))\\&=S((\mu \cup \nu)(y) ,\nu(x)). \end{align*} Hence \(\mu\cup\nu \unrhd \nu.\)

Lemma 2.[14] Let \(S\) be an \(s\)-norm. Then \[S(S(x,y),S(w,z))= S(S(x,w),S(y,z)),\] for all \(x,y,w,z\in [0,1].\)

Proposition 8. Let \(S\) be idempotent \(s\)-norm and \(\mu_{1},\mu_{2},\xi \in AFS(G).\) If \(\mu_{1},\mu_{2} \unrhd \xi\), then \(\mu_{1} \cup\mu_{2} \unrhd \xi.\)

Proof. By Proposition 2 we have that \(\mu_{1} \cup\mu _{2} \in AFS(G).\) If \(x,y\in G\), then \begin{align*} (\mu_{1} \cup \mu_{2})(xyx^{-1})&= S(\mu_{1}(xyx^{-1}),\mu_{2}(xyx^{-1}))\\&\leq S(S(\mu_{1}(y),\xi(x)),S(\mu_{2}(y),\xi(x)))\\&=S(S(\mu_{1}(y),\mu_{2}(y)),S(\xi(x),\xi(x)))\\&=S(S(\mu_{1}(y),\mu_{2}(y)),\xi(x))\\&=S((\mu_{1} \cup \mu_{2})(y),\xi(x)). \end{align*} Therefore, \(\mu_{1} \cup \mu_{2} \unrhd \xi.\)

Corollary 4. Let \(I_{n}=\{1,2,...,n\}\) and \(\{\mu_{i}\hspace{0.1cm} | \hspace{0.1cm}i\in I_{n}\} \subseteq AFS(G)\) such that \(\{\mu_{i}\hspace{0.1cm} | \hspace{0.1cm}i\in I_{n}\} \unrhd \xi.\) Then \(\mu=\cup_{i\in I_{n}}\mu_{i}\unrhd \xi.\)

3. Image and pre image of anti fuzzy subgroups and anti fuzzy normal subgroups w.r. \(s\)-norms under group homomorphisms

Definition 8.[7] Let \(f\) be a mapping from \(G\) into \(H,\) \(\mu\in [0,1]^G\) and \(\nu\in [0,1]^H.\) Define \(f(\mu)\in[0,1]^H\) and \(f^{-1}(\nu)\in[0,1]^G\) as \begin{equation*} f(\mu)(y) = \left\{ \begin{array}{rl} \inf \{ \mu(x) \hspace{0.1cm}|\hspace{0.1cm} x\in G,f(x)=y\} &\text{if } f^{-1}(y)\neq\emptyset,\\ 0 &\text{if } f^{-1}(y)=\emptyset. \end{array} \right. \end{equation*} and \(f^{-1}(\nu)(x)=\nu(f(x))\) for all \( x \in G \) and \(y \in H.\)

Proposition 9. Let \(\mu\in AFS(G)\) and H be a group. Suppose that \(f\) is a homomorphism of \(G\) into \(H.\) Then \(f(\mu)\in AFS(H).\)

Proof. Let \(u,v\in H\) and \(x,y \in G\) such that \(u=f(x)\) and \(v=f(y).\) Now \begin{align*} f(\mu)(uv)&=\inf \{\mu(xy)\hspace{0.1cm} |\hspace{0.1cm} u=f(x),v=f(y)\} \\&\leq \inf \{S(\mu(x),\mu(y))\hspace{0.1cm} | \hspace{0.1cm} u=f(x),v=f(y)\}\\&=S(\inf \{\mu(x)\hspace{0.1cm} |\hspace{0.1cm} u=f(x)\},\inf \{\mu(y) \hspace{0.1cm}|\hspace{0.1cm} v=f(y)\})\\&=S(f(\mu)(u),f(\mu)(v)).\end{align*} Also since \(\mu\in AFS(G)\) we have \begin{align*} f(\mu)(u^{-1})&=\inf \{\mu(x^{-1})\hspace{0.1cm}|\hspace{0.1cm} x^{-1} \in G, f(x^{-1})=u^{-1}\} \\ & \leq \inf \{\mu(x)\hspace{0.1cm}|\hspace{0.1cm} x \in G, f^{-1}(x)=u^{-1}\}\\ &=\inf \{\mu(x)\hspace{0.1cm}|\hspace{0.1cm} x \in G, f(x)=u\}=f(\mu)(u). \end{align*} Thus \(f(\mu)\in AFS(H).\)

Proposition 10. Let H be a group and \(\nu \in AFS(H).\) If \(f\) be a homomorphism of \(G\) into \(H\), then \(f^{-1}(\nu)\in AFS(G).\)

Proof. Let \(x,y\in G.\) Then \(f^{-1}(\nu)(xy)=\nu(f(xy))=\nu(f(x)f(y) \leq S(\nu(f(x)),\nu(f(y)))=S(f^{-1}(\nu)(x),f^{-1}(\nu)(y)).\) Also \[f^{-1}(\nu)(x^{-1})=\nu(f(x^{-1})) = \nu(f(x^{-1})) =\nu(f^{-1}(x)) \leq \nu(f(x)) =f^{-1}(\nu)(x).\] Thus \(f^{-1}(\nu)\in AFS(G).\)

Proposition 11. Let \(\mu \in AFNS(G)\) and \(H\) be a group. Suppose that \(f\) is an epimorphism of \(G\) onto \(H.\) Then \(f(\mu)\in AFNS(H).\)

Proof. From Proposition 10 we have \(f(\mu)\in AFS(H).\) Let \(x,y\in H.\) Since \(f\) is a surjection, \(f(u)=x\) for some \(u\in G.\) Then \begin{align*} f(\mu)(xyx^{-1})&= \inf \{\mu(w)\hspace{0.1cm}|\hspace{0.1cm} w\in G, f(w)=xyx^{-1}\}\\ &=\inf \{\mu(u^{-1}wu)\hspace{0.1cm}| \hspace{0.1cm}w\in G, f(u^{-1}wu)=y\}=\inf \{\mu(w)\hspace{0.1cm}|\hspace{0.1cm} w\in G,f(w)=y\}\\ &=f(\mu)(y).\end{align*} Then \(f(\mu)\in AFNS(H).\)

Proposition 12. Let \(H\) be a group and \(\nu\in AFNS(H).\) Suppose that \(f\) is a homomorphism of \(G\) into \(H.\) Then \(f^{-1}(\nu)\in AFNS(G).\)

Proof. By Proposition 11 we obtain that \(f^{-1}(\nu)\in AFS(G).\) Now for any \(x,y\in G\), we have \[f^{-1}(\nu)(xyx^{-1})=\nu(f(xyx^{-1}))=\nu(f(x)f(y)f(x^{-1})) =\nu(f(x)f(y)f^{-1}(x))=\nu(f(y))=f^{-1}(\nu)(y).\] Hence \(f^{-1}(\nu)\in AFNS(G).\)

Proposition 13. Let \(\mu,\nu\in AFS(G)\) and \(\mu \unrhd \nu.\) Let \(H\) be a group and \(f\) a homomorphism from \(G\) into \(H.\) Then \(f(\mu)\unrhd f(\nu).\)

Proof. As Proposition 10 we have \(f(\mu), f(\nu)\in AFS(H).\) Let \(x,y\in H\) and \(u,v \in G.\) Then, \begin{align*} f(\mu)(xyx^{-1})&= \inf \{\mu(z)\hspace{0.1cm}|\hspace{0.1cm} z\in G, f(z)=xyx^{-1}\}\\ & = \inf \{\mu(uvu^{-1})\hspace{0.1cm}|\hspace{0.1cm} u,v\in G, f(u)=x,f(v)=y\}\\ & \leq \inf \{S(\mu(v),\nu(u))\hspace{0.1cm}|\hspace{0.1cm} f(u)=x,f(v)=y\}\\ &=S(\inf \{\mu(v)\hspace{0.1cm} |\hspace{0.1cm} y=f(v)\},\inf \{\nu(u) \hspace{0.1cm}|\hspace{0.1cm} x=f(u)\})\\ &=S(f(\mu)(y),f(\nu)(x)).\end{align*} Hence \(f(\mu)\unrhd f(\nu).\)

Proposition 14. Let \(H\) be a group. Let \(\mu,\nu\in AFS(H)\) and \(\mu \unrhd \nu.\) If \(f\) be a homomorphism from \(G\) into \(H\), then \(f^{-1}(\mu)\unrhd f^{-1}(\nu).\)

Proof. Using Proposition 11 we have \(f^{-1}(\mu),f^{-1}(\nu)\in AFS(G).\) Let \(x,y\in G.\) Now \[f^{-1}(\mu)(xyx^{-1})=\mu(f(xyx^{-1}))=\mu(f(x)f(y)f^{-1}(x)) \leq S(\mu(f(y)),\nu(f(x)))= S(f^{-1}(\mu)(y),f^{-1}(\nu)(x)).\] Hence \(f^{-1}(\mu)\unrhd f^{-1}(\nu).\)

4. Direct sum of anti fuzzy subgroups and anti fuzzy normal subgroups under \(s\)-norms

Definition 9. Let \(\mu\) and \(\nu\) be anti fuzzy subgroups of the groups \(G\) and \(H\), respectively under an \(s\)-norm \(S.\) The direct sum of \(\mu\) and \(\nu\), denoted by \(\mu\oplus \nu\), is the function defined by setting for all \(x\) in \(G\) and \(y\) in \(H\),\((\mu\oplus \nu)(x,y)=S(\mu(x) ,\nu(y)).\)

Proposition 15. Let \(\mu_{i}\in AFS(G_{i})\) for \(i=1,2.\) Then \(\mu_{1} \oplus \mu_{2}\in AFS(G_{1} \oplus G_{2}).\)

Proof. Let \((a_{1},b_{1}),(a_{2},b_{2})\in G_{1} \oplus G_{2}.\) Then \begin{align*} (\mu_{1} \oplus \mu_{2})((a_{1},b_{1})(a_{2},b_{2}))&=(\mu_{1} \oplus \mu_{2})(a_{1}a_{2},b_{1}b_{2}) \\&=S(\mu_{1}(a_{1}a_{2}),\mu_{2}(b_{1}b_{2})) \\&\leq S(S(\mu_{1}(a_{1}),\mu_{1}(a_{2})),S(\mu_{2}(b_{1}),\mu_{2}(b_{2})))\\&=S(S(\mu_{1}(a_{1}),\mu_{2}(b_{1}),S(\mu_{1}(a_{2}),\mu_{2}(b_{2}))\\&=S((\mu_{1}\oplus \mu_{2})(a_{1},b_{1}),(\mu_{1} \oplus \mu_{2})(a_{2},b_{2})).\end{align*} Also \[(\mu_{1} \oplus \mu_{2})(a_{1},b_{1})^{-1}= (\mu_{1} \oplus \mu_{2})(a_{1}^{-1},b_{1}^{-1})= S(\mu_{1}(a_{1}^{-1}),\mu_{2}(b_{1}^{-1})) \leq S(\mu_{1}(a_{1}),\mu_{2}(b_{1})).\] Hence \(\mu_{1} \oplus \mu_{2}\in AFS(G_{1} \oplus G_{2}).\)

Corollary 5. Let \(\mu\in AFS(G)\) and \(\nu\in TF(H).\) Then \(\mu \oplus 1_{H},1_{G} \oplus \nu \in AFS(G \oplus H).\)

Corollary 6. Let \(\mu_{i}\in AFS(G_{i})\) for \(i=1,2,...,n\). Then \(\mu_{1} \oplus \mu_{2} \oplus... \oplus \mu_{n} \in AFS(G_{1} \oplus G_{2} \oplus... \oplus G_{n}).\)

Proposition 16. Let \(\mu_{i}\in AFNS(G_{i})\) for \(i=1,2.\) Then \(\mu_{1} \oplus \mu_{2}\in AFNS(G_{1} \oplus G_{2}).\)

Proof. Let \((a_{1},b_{1}),(a_{2},b_{2})\in G_{1} \oplus G_{2}.\) Then \begin{align*} (\mu_{1} \oplus \mu_{2})((a_{1},b_{1})(a_{2},b_{2})(a_{1},b_{1})^{-1})&=(\mu_{1} \oplus \mu_{2})((a_{1},b_{1})(a_{2},b_{2})(a_{1}^{-1},b_{1}^{-1}))\\&=(\mu_{1} \oplus \mu_{2})(a_{1}a_{2}a_{1}^{-1},b_{1}b_{2}b_{1}^{-1})\\&=S(\mu_{1}(a_{1}a_{2}a_{1}^{-1}),\mu_{2}(b_{1}b_{2}b_{1}^{-1}))\\&= S(\mu_{1}(a_{2}),\mu_{2}(b_{2}))\\&= (\mu_{1} \oplus \mu_{2})(a_{2},b_{2}).\end{align*} Therefore \(\mu_{1} \oplus \mu_{2}\in AFNS(G_{1} \oplus G_{2}).\)

Corollary 7. Let \(\mu_{i}\in AFNS(G_{i})\) for \(i=1,2,...,n\). Then \(\mu_{1}\oplus \mu_{2} \oplus... \oplus \mu_{n} \in AFNS(G_{1} \oplus G_{2} \oplus... \oplus G_{n}).\)

Proposition 17. Let \(\mu_{i},\nu_{i} \in AFS(G_{i})\) and \(\mu_{i}\subseteq \nu_{i}\) for \(i=1,2.\) If \(\mu_{i} \unrhd \nu_{i}\), then \(\mu_{1} \oplus \mu_{2} \unrhd \nu_{1} \oplus \nu_{2}.\)

Proof. Let \((a_{1},b_{1}),(a_{2},b_{2})\in G_{1}\oplus G_{2}.\) Then \begin{align*} (\mu_{1} \oplus \mu_{2})((a_{1},b_{1})(a_{2},b_{2})(a_{1},b_{1})^{-1})&=(\mu_{1} \oplus \mu_{2})((a_{1},b_{1})(a_{2},b_{2})(a_{1}^{-1},b_{1}^{-1}))\\&=(\mu_{1} \oplus \mu_{2})(a_{1}a_{2}a_{1}^{-1},b_{1}b_{2}b_{1}^{-1}) \\&=S(\mu_{1}(a_{1}a_{2}a_{1}^{-1}),\mu_{2}(b_{1}b_{2}b_{1}^{-1}))\\&\leq S(S(\mu_{1}(a_{2}),\nu_{1}(a_{1})),S(\mu_{2}(b_{2}),\nu_{2}(b_{1})))\\&=S(S(\mu_{1}(a_{2}), \mu_{2}(b_{2})),S(\nu_{1}(a_{1}),\nu_{2}(b_{1})))\\&=S((\mu_{1} \oplus \mu_{2})(a_{2},b_{2}),(\nu_{1} \oplus \nu_{2})(a_{1},b_{1})).\end{align*} Thus \(\mu_{1} \oplus \mu_{2} \unrhd \nu_{1} \oplus \nu_{2}.\)

Corollary 8. Let \(\mu_{i} \unrhd \nu_{i}\) for \(i=1,2,...,n\). Then \(\mu_{1}\oplus \mu_{2} \oplus... \oplus \mu_{n} \unrhd \nu_{1}\oplus \nu_{2}\oplus... \oplus \nu_{n}.\)

5. Conclusion

As using \(S\)-norms, anti fuzzy subgroups and anti fuzzy normal subgroups were defined which are new notions and were considered their fundamental properties and also was made an attempt to study the characterizations of them. Next image and pre image of them were investigated under group homomorphisms. Finally, the direct sum of them was introduced and was proved that direct sum of any familly of them be also anti fuzzy subgroups and anti fuzzy normal subgroups under \(S\)-norms, respectively.

Acknowledgments

The author would like to thank the referees for carefully reading the manuscript and making several helpful comments to increase the quality of the paper.

Conflicts of Interest

The author declares no conflict of interest.

References

  1. Zadeh, L. A. (1996). Fuzzy sets. In Fuzzy Sets, Fuzzy Logic, and Fuzzy Systems: Selected Papers by Lotfi A Zadeh (pp. 394-432). [Google Scholor]
  2. Ahsan, J., Mordeson, J. N., & Shabir, M. (2012). Fuzzy Semirings with Applications to Automata Theory (Vol. 278, pp. 18-43). Berlin: Springer. [Google Scholor]
  3. Xie, X. Y.(2004). Fuzzy Theory of Semigroups. Science Press.
  4. Hohle, U.(1978). Probabilistic uniformization of fuzzy topologies. Fuzzy Sets and Systems, 1, 311-332. [Google Scholor]
  5. Alsina, C., Trillas, E., & Valverde, L. (1983). On some logical connectives for fuzzy sets theory. Journal of Mathematical Analysis and Applications, 93(1), 15-26. [Google Scholor]
  6. Gupta, M. M., & Qi, J. (1991). Theory of T-norms and fuzzy inference methods. Fuzzy Sets and Systems, 40(3), 431-450. [Google Scholor]
  7. Yandong, Y. (1985). Triangular norms and TNF-sigma-algebras. Fuzzy Sets and Systems, 16(3), 251-264. [Google Scholor]
  8. Rasuli, R.(2020). Anti complex fuzzy subgroups under s-norms. Engineering and Applied Science Letters, 3(4), 1-10. [Google Scholor]
  9. Rasuli, R.(2021). Fuzzy congruence on product lattices under T-norms. Journal of Information and Optimization Sciences, 42, 333-343. [Google Scholor]
  10. Rasuli, R.(2021). Intuitionistic fuzzy congruences on product lattices under norms. Journal of Interdisciplinary Mathematics, 24, 1-24. [Google Scholor]
  11. Rasuli, R.(2021). Conorms over level subsets and translations of anti Q-fuzzy Subgroups. International Journal of Mathematics and Computation, 32, 55-67. [Google Scholor]
  12. Malik, D. S., Mordeson, J. N., & Sen, M. K. (1995). The cartesian composition of fuzzy finite state machines. Kybernetes, 24(4), 98-110. [Google Scholor]
  13. Buckley, J. J., & Eslami, E.(2002). An Introduction to Fuzzy Logic and Fuzzy Sets. Springer-Verlag Berlin Heidelberg. [Google Scholor]
  14. Abu Osman, M. T.(1987). On some products of fuzzy subgroups. Fuzzy Sets and Systems, 24, 79-86. [Google Scholor]
]]>