Next Article in Journal
Research on Control Strategy of Electro-Hydraulic Lifting System Based on AMESim and MATLAB
Next Article in Special Issue
Multiple-Attribute Decision Making Based on Intuitionistic Hesitant Fuzzy Connection Set Environment
Previous Article in Journal
Coincidence Theorems under Generalized Nonlinear Relational Contractions
Previous Article in Special Issue
A Novel GDMD-PROMETHEE Algorithm Based on the Maximizing Deviation Method and Social Media Data Mining for Large Group Decision Making
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Fermatean Fuzzy CODAS Approach with Topology and Its Application to Sustainable Supplier Selection

1
Department of Mathematics, University of the Punjab, Lahore 54590, Pakistan
2
Department of Mathematics, College of Science, King Khalid University, P.O. Box 9004, Abha 61413, Saudi Arabia
*
Author to whom correspondence should be addressed.
Symmetry 2023, 15(2), 433; https://doi.org/10.3390/sym15020433
Submission received: 2 January 2023 / Revised: 30 January 2023 / Accepted: 1 February 2023 / Published: 6 February 2023
(This article belongs to the Special Issue Research on Fuzzy Logic and Mathematics with Applications II)

Abstract

:
A Fermatean fuzzy set (FFS) is a reliable method for representing uncertainty in “multi-criteria decision-making” (MCDM). This research seeks to examine the topological properties of FFSs and to establish the notion of “Fermatean fuzzy topology” (FFT). An FFT is the generalisation of existing fuzzy topologies. Several aspects of FFT are examined and various novel concepts are proposed, which include Fermatean fuzzy α -continuity between FFTSs and Fermatean fuzzy connectedness. To deal multiple challenges in sustainable supply chain management, a Fermatean fuzzy “combinative distance-based assessment” (CODAS) method was developed. The proposed FF CODAS technique involves various key features for MCDM. Firstly, a known reputation vector or equal expert weights is determined based on the reputation, experience and qualifications of the experts. Secondly, the Fermatean fuzzy direct rating approach is used to establish the relative relevance of criteria based on the expert group’s evaluation preferences. Thirdly, the Fermatean fuzzy CODAS approach is used to construct alternative orderings based on their assessment scores. Finally, an application is developed to show the benefit of the suggested supplier selection approach. Additionally, the symmetry of an optimal decision in application is carried out by a comparison analysis of the suggested models with some existing models.

1. Introduction

In computational intelligence challenges, inferring topological and geometrical information from data can provide a novel perspective in mathematical modelling. Methods for “topological data analysis” (TDA) are rapidly expanding methodologies for inferring the permanent and essential characteristics for potentially complicated data. TDA can be utilised autonomously or in tandem with other information-processing and analytical instructional methods. In modern data science, topological methods have been utilised to evaluate the structural aspects of big data, leading to additional information analysis. Utilising a variety of mathematical techniques, topology and geometry are natural instruments for evaluating big datasets. Traditional and basic analysis in a range of computer intelligence domains are inspired by topology and big data. In addition, topology is the link between geographical structures and characteristics, and it may be utilised to explain certain spatial functions and create datasets with a greater level of dependability and integrity. Topological notions such as continuity, convergence and homeomorphisms have a solid geometrical interpretation.
Researchers have investigated a lot of key features in classical set theory and classical topology. Nevertheless, traditional approaches cannot handle ambiguous and unclear information. To solve these concerns, Zadeh [1] developed the concept of “fuzzy set” (FS) theory and “membership function” (MSF), Pawlak [2] proposed rough set theory and approximation spaces, and Molodtsov [3] developed soft set theory and parameterisation. Chang [4] expanded the concept of FSs to fuzzy topological space (TS) and studied several essential features, including open set, closed set, compactness, and continuity in terms of FS theory. Lowen presented a different notion of fuzzy TSs [5,6]. Atanassov [7] further revealed the notion of an “intuitionistic fuzzy set” (IFS) using MSF and “non-membership function” (NMSF). Later, Coker established the concept of intuitionistic fuzzy TS and researched the equivalent versions of traditional topology concepts such as continuity and compactness [8,9]. Additional results on intuitionistic fuzzy TSs are defined in [10,11]. Fuzzy metric spaces provided solutions to the topics concerning distance-like functions, etc. [12]. Thus, instead of particular fixed components, the idea of topology incorporates the MSF structure of fuzziness. The concepts of open and alpha open maps in terms of fuzzy and continuous functions were introduced by Singal and Rajvanshi [13]. Ajmal and Kohli [14] developed the idea of “connectedness in fuzzy TSs” and Chaudhuri and Das [15] initiated the notion of “some fuzzy connected sets in fuzzy TSs”. Olgun et al. [16] introduced the “Pythagorean fuzzy TSs”, Turkarslan et al. [17] proposed some sort of “q-rung orthopair fuzzy TSs”, Joseline and Ajay [18] gave the idea of “Pythagorean fuzzy α -continuity”. Haydar defined connectedness for the fuzzy Pythagorean TS [19].
In the modern scientific era, modelling uncertainty as part of MCDM approaches is essential for addressing problems that occur in the actual world. In order to determine how reliable human judgments are, many MCDM techniques have been devised. These procedures include comparing a group of potential outcomes to a set of criteria and rating each possibility accordingly. The gathering and synthesis of information is essential to the operation of a wide variety of technological processes, including machine learning, pattern classification, photogrammetry, and selection. In a general sense, the process of aggregation involves the combination of a great deal of data in order to obtain a conclusion. It was also shown that fundamental data processing algorithms that are based on crisp integers cannot be used to accurately reflect the operating circumstances of human cognitive processes. Because of these strategies, “decision makers” (DMs) are left with confusing facts and judgements that are difficult to understand. As a consequence of this, in order to cope with the ambiguous and fuzzy situations that are present in the world, DMs look for new philosophies that will enable them to understand confusing data values and preserve their judgement demands in response to a variety of settings.
Fuzzy logic is a sort of multi-valued logic in which variable values might vary between 0 and 1. The premise of fuzzy logic is that individuals make judgments based on confusing and non-numerical information. Fuzzy sets are mathematical representations of ambiguity and inaccurate information. They are commonly known as fuzzy models. It is a word used to explain the concept of partial truth, according to which the truth value might vary between false and true. Zadeh proposed a formal framework for making decisions based on imprecise data representations. This concept is based on the fuzzy set, which is a set with no obvious bounds and can only contain things to a given degree; in other words, elements can only be members to a certain degree. Researchers have noticed that the structure of the membership grades is a big concern when utilising fuzzy sets as a result of this. The uncertainty associated with giving an exact numerical membership value to each element in the supplied fuzzy collection is the source of the difficulty. Yager introduced the “Pythagorean fuzzy set” (PFS) [20,21,22] as well as the “q-rung orthopair fuzzy set” [23]. Senapati and Yager [24] developed the concept of FFSs.
Data processing is crucial for decision making in business, government, sociology, science, intellectual, cognitive, and autonomous systems. In general, awareness of the alternatives has been regarded as a numerical or verbal quantity. Unfortunately, the data cannot easily be amalgamated with regard to ambiguity. Xu et al. [25,26] established geometric and averaging AOs for IFS. Akram et al. [27] proposed the idea of complex Fermatean fuzzy N-soft sets as a hybrid model of N-soft set, FFS, and complex FS. They developed a new hybrid method for decision making with regard to the terrific capability problem based on the Fermatean fuzzy TOPSIS technique approach. A robust work related to the proposed work can be seen in [28].
Riaz et al. [29] developed “linear Diophantine fuzzy prioritised AOs” and Iampan et al. [30] proposed Einstein AOs for LDFSs. Ashraf and Abdullah [31] proposed some mathematical modelling for COVID-19 under a spherical fuzzy set. Some extensive work related to AOs can be seen in [32,33,34,35,36,37]. Peng et al. [38] introduced some AOs for a “single-valued neutrosophic number” (SVNN). Liu et al. [39] developed some AOs for SVNNs based on “Hamacher operations”. Farid and Riaz [40] proposed Einstein interactive AOs for SVNNs. Some extensive work related to operational science in a fuzzy framework was given in [41,42,43,44]. The main goals of this study are given as follows:
  • To define the topological structure of FSSs and to propose the concept of fuzzy Fermatean topology;
  • To address the characterisation of Fermatean fuzzy TSs, such as interior, closure, and boundary, etc.;
  • Examining noteworthy results regarding images and inverse images of FFSs under Fermatean fuzzy mapping;
  • To define Fermatean fuzzy α -continuity between FFTSs and Fermatean fuzzy connectedness;
  • Modelling uncertain information in MCDM with Fermatean fuzzy CODAS methods.
  • Data analysis with Fermatean fuzzy CODAS approach for supplier selection and supply chain. A numerical example is illustrated to explain FF CODAS for supplier selection.
The remaining sections of the paper are structured as follows. Section 2 covers the fundamental FFS ideas. In Section 3, the concept of FFT is defined and associated findings are examined. In Section 4, the idea of FF α -continuity is introduced. Section 5 provides basic ideas pertaining to FF connectivity, whereas Section 6 suggests a CODAS structure under the FFSs. Section 7 provides an application regarding the selection of suppliers. Section 8 provides a summary of the planned outcomes, techniques, findings, and their benefits. This section also includes future directions.

2. Fundamental Concepts

In this section of the manuscript, we will review some of the fundamental notions.
Definition 1
([24]). Assume FFS ℏ in ¯ is defined as
= { ρ , μ η ( ρ ) , ν η ( ρ ) : ρ ¯ }
where μ η , ν η : ¯ [ 0 , 1 ] denotes the MSF and NMSF of the alternative ρ ¯ and ρ , so we have
0 μ η 3 ( ρ ) + ν η 3 ( ρ ) 1 .
Furthermore, π ( ρ ) = 1 μ η 3 ( ρ ) ν η 3 ( ρ ) 3 is called the “indeterminacy degree” of ρ to ℏ.
Definition 2
([24]). Let δ ˜ 1 = μ η 1 , ν η 1 and δ ˜ 2 = μ η 2 , ν η 2 be FFNs. Since σ > 0 , then
(1) ( δ ˜ 1 ) c = ν η 1 , μ η 1
(2) δ ˜ 1 δ ˜ 2 = max { μ η 1 , ν η 1 } , min { μ η 2 , ν η 2 }
(3) δ ˜ 1 δ ˜ 2 = min { μ η 1 , ν η 1 } , max { μ η 2 , ν η 2 }
(4) δ ˜ 1 δ ˜ 2 = μ η 1 3 + μ η 2 3 μ η 1 3 μ η 2 3 3 , ν η 1 ν η 2
(5) δ ˜ 1 δ ˜ 2 = μ η 1 μ η 2 , ν η 1 3 + ν η 2 3 ν η 1 3 ν η 2 3 3
(6) σ δ ˜ 1 = 1 ( 1 μ η 1 3 ) σ 3 , ν η 1 σ
(7) ( δ ˜ 1 ) σ = μ η 1 σ , 1 ( 1 ν η 1 3 ) σ 3
Definition 3
([24]). Let δ ˜ = μ η , ν η be the FFN, and the “score function” (SF) S of δ ˜ is defined as
S ( δ ˜ ) = μ η 3 ν η 3
S ( δ ˜ ) [ 1 , 1 ] . The FFN score will determine its ranking, with the greatest score dictating the FFN’s top priority. In other instances, however, the SF is not favourable for FFN. Consequently, using the SF to examine FFNs is inadequate. We are introducing a new function, namely the “accuracy function” (AF).
Definition 4
([24]). Let δ ˜ = μ η , ν η be the FFN, then an AF L ˘ of δ ˜ is defined as
L ˘ ( δ ˜ ) = μ η 3 + ν η 3
L ˘ ( δ ˜ ) [ 0 , 1 ] .
Definition 5.
Consider δ ˜ = μ η δ ˜ , ν η δ ˜ and ˘ = μ η ˘ , ν η ˘ as two FFN, and S ( δ ˜ ) , S ( ˘ ) are the SF of δ ˜ and ˘ , and L ˘ ( δ ˜ ) , L ˘ ( ˘ ) are the AFs of δ ˜ and ˘ , respectively, then:
(a) 
If S ( δ ˜ ) > S ( ˘ ) , then δ ˜ > ˘ ;
(b) 
If S ( δ ˜ ) = S ( ˘ ) then;
  • If L ˘ ( δ ˜ ) > L ˘ ( ˘ ) then δ ˜ > ˘ ;
  • If L ˘ ( δ ˜ ) = L ˘ ( ˘ ) , then δ ˜ = ˘ .
Definition 6
([45]). Considering δ ˜ 1 = μ η 1 , ν η 1 and δ ˜ 2 = μ η 2 , ν η 2 as FFNs, we define the subtraction and division of FFNs as
  • δ ˜ 1 δ ˜ 2 = μ η 1 3 μ η 2 3 1 μ η 2 3 3 , ν η 1 ν η 2 , if μ η 1 μ η 2 , ν η 1 min ν η 2 , ν η 2 π 1 π 2
  • δ ˜ 1 δ ˜ 2 = μ η 1 μ η 2 , ν η 1 3 ν η 2 3 1 ν η 2 3 3 if ν η 1 ν η 2 , μ η 1 min μ η 2 , μ η 2 π 1 π 2

3. Main Results

In this section, the concept of Fermatean fuzzy topology (FFT) and numerous related results are proposed.
Definition 7.
Let ¯ be the universe and be the assemblage of FF subsets of ¯ . If satisfies the axioms:
T1 
0 ¯ , 1 ¯ ;
T2 
For any χ ζ 1 , χ ζ 2 , we have χ ζ 1 χ ζ 2 ;
T3 
For any χ ζ i i I , we have i I χ ζ i .
Then, is called an FFT on ¯ and the pair ( ¯ , ) is said to be an FFTS. Each member of is called an FF open set (FFOS). The complement of an FF open set is called an FF closed set (FFCS).
Remark 1.
Each IFS and PFS may be considered as an FFS, leading to the conclusion that any IFS topology and PFS topology is an FFT. However, the converse fails to hold.
Example 1.
Let ¯ = α ˘ 1 γ , α ˘ 2 γ , α ˘ 3 γ . Consider the following family of FF subsets = 0 ¯ , 1 ¯ , χ ζ 1 , , χ ζ 4 , where
χ ζ 1 = α ˘ 1 γ , 0.58 , 0.78 , α ˘ 2 γ , 0.67 , 0.58 , α ˘ 3 γ , 0.28 , 0.18 , χ ζ 2 = α ˘ 1 γ , 0.60 , 0.76 , α ˘ 2 γ , 0.72 , 0.53 , α ˘ 3 γ , 0.30 , 0.16 , χ ζ 3 = α ˘ 1 γ , 0.64 , 0.72 , α ˘ 2 γ , 0.74 , 0.48 , α ˘ 3 γ , 0.34 , 0.14 , χ ζ 4 = α ˘ 1 γ , 0.71 , 0.67 , α ˘ 2 γ , 0.80 , 0.43 , α ˘ 3 γ , 0.44 , 0.10 .
One can see that ( ¯ , ) is an FFTS.
Moreover, 1 = 0 ¯ , 1 ¯ , χ ζ 1 , 2 = 0 ¯ , 1 ¯ , χ ζ 2 , 3 = 0 ¯ , 1 ¯ , χ ζ 3 , 4 = 0 ¯ , 1 ¯ , χ ζ 4 , 5 = 0 ¯ , 1 ¯ , χ ζ 1 , χ ζ 2 , 6 = 0 ¯ , 1 ¯ , χ ζ 1 , χ ζ 3 , 7 = 0 ¯ , 1 ¯ , χ ζ 1 , χ ζ 4 , 8 = 0 ¯ , 1 ¯ , χ ζ 2 , χ ζ 3 , 9 = 0 ¯ , 1 ¯ , χ ζ 2 , χ ζ 4 , 10 = 0 ¯ , 1 ¯ , χ ζ 3 , χ ζ 4 , 11 = 0 ¯ , 1 ¯ , χ ζ 1 , χ ζ 2 , χ ζ 3   12 = 0 ¯ , 1 ¯ , χ ζ 1 , χ ζ 3 , χ ζ 4 are also FFTSs.
Definition 8.
Let ¯ and ⨿ ˘ be two non-empty sets, let : ¯ ⨿ ˘ be a mapping, and let D ˘ and F ˜ be FF subsets of ¯ and ⨿ ˘ , respectively. The image of D ˘ under mapping ℶ is denoted by [ D ˘ ] . Then, the MSF and NMSF of the image set [ D ˘ ] are defined by
μ η [ D ˘ ] ( y ) = sup z 1 ( y ) μ η D ˘ ( z ) , if 1 ( y ) 0 , otherwise
and
ν η [ D ˘ ] ( y ) = inf z 1 ( y ) ν η D ˘ ( z ) , if 1 ( y ) 0 , otherwise
respectively. The MSF and NMSF of the pre-image of F ˜ with respect to ℶ that is denoted by 1 [ F ˜ ] are defined by
μ η 1 [ F ˜ ] ( x ) = μ η F ˜ ( ( x ) ) and ν η 1 [ F ˜ ] ( x ) = ν η F ˜ ( ( x ) ) respectively .
which show that the μ η [ D ˘ ] 3 + ν η [ D ˘ ] 3 1 FF membership condition is provided for the FF image and pre-image.
Proposition 1.
Let ¯ and ⨿ ˘ be two non-empty sets and : ¯ ⨿ ˘ be an FF mapping. Then, we have
1. 1 F ˜ c = 1 [ F ˜ ] c for any FF subset F ˜ of ⨿ ˘ ;
2. ( [ D ˘ ] ) c D ˘ c for any FF subset D ˘ of ¯ ;
3. If F ˜ 1 F ˜ 2 , then 1 F ˜ 1 1 F ˜ 2 where F ˜ 1 and F ˜ 2 are FF subsets of ⨿ ˘ ;
4. If D ˘ 1 D ˘ 2 then D ˘ 1 D ˘ 2 where D ˘ 1 and D ˘ 2 are FF subsets of ¯ ;
5. 1 [ F ˜ ] F ˜ for any FF subset F ˜ of ⨿ ˘ ;
6. D ˘ 1 [ [ D ˘ ] ] for any FF subset D ˘ of ¯ .
Definition 9.
Let χ ζ i = ˘ , μ η χ ζ i ( ˘ ) , ν η χ ζ i ( ˘ ) : ˘ ¯ i I be the assemblage of FF sets over ¯ . Then,
i I χ ζ i = ˘ , μ η χ ζ i ( ˘ ) , sup ν η χ ζ i ( ˘ ) : ˘ ¯ ,
i I χ ζ i = ˘ , sup μ η χ ζ i ( ˘ ) , ν η χ ζ i ( ˘ ) : ˘ ¯ .
Note that i I χ ζ i and i I χ ζ i are FF sets over ¯ . We shall i I χ ζ i define i I χ ζ i = ˘ , α i , β i I χ ζ i : ˘ ¯ such that α n χ ζ i = μ η χ ζ i ( ˘ ) and β i I χ ζ i = sup ν η χ ζ i ( ˘ ) . In order to for i I χ ζ i to be an FF set, we must have that α i I 3 χ ζ i ( ˘ ) + β i I 3 χ ζ i ( ˘ ) 1 . We see since β i I 3 χ ζ i ( ˘ ) = sup ν η χ ζ i 3 ( ˘ ) , then
β I 3 χ ζ i ( ˘ ) = sup ν η χ ζ i 3 ( ˘ ) = sup r i 3 μ η χ ζ i 3 , r i 3 ν η χ ζ i 3 sup r i 3 μ η χ ζ i 3 , ν η χ ζ i 3 , r i 3 μ η χ ζ i 3 , ν η χ ζ i 3 β i I 3 ( ˘ ) sup 1 μ η χ ζ i 3 , ν η χ ζ i 3 , 1 μ η χ ζ i 3 , ν η χ ζ i 3 1 μ η χ ζ i 3 , ν η χ ζ i 3
where μ η χ ζ i 3 + ν η χ ζ i 3 = r i 3 for every i I . From this, we see that α I 3 χ ζ i ( ˘ ) + β I 3 χ ζ i ( ˘ ) μ η χ ζ i 3 , ν η χ ζ i 3 + 1 μ η χ ζ i 3 , ν η χ ζ i 3 1 . Thus, i I χ ζ i is an FF set.
The proof is trivial for i I χ ζ i .
Theorem 1.
Let χ ζ i = ˘ , μ η χ ζ i ( ˘ ) , ν η χ ζ i ( ˘ ) : ˘ ¯ i I be the assemblage of FF sets over ¯ . Then,
1.
i I χ ζ i ¯ = i I χ ζ i ¯ ;
2.
i I χ ζ i ¯ = i I χ ζ i ¯ .
Proof. 
(1) We have i I χ ζ i = ˘ , μ η χ ζ i ( ˘ ) , sup ν η χ ζ i ( ˘ ) : ˘ ¯ . Then,
i I χ ζ i ¯ = ˘ , sup ν η χ ζ i ( ˘ ) , μ η χ ζ i ( ˘ ) : ˘ ¯
and χ ζ i ¯ = ˘ , ν η χ ζ i ( ˘ ) , μ η χ ζ i ( ˘ ) : ˘ ¯ and so u ¯ i I χ ζ i ¯ = ˘ , sup ν η χ ζ i ( ˘ ) , μ η χ ζ i ( ˘ ) : ˘ ¯ . That is, i I χ ζ i ¯ = i I χ ζ i ¯ .
(2) It is proven similar to (1). □
Definition 10.
Let ( ¯ , ) be an FFTS and χ ζ = ˘ , μ η χ ζ ( ˘ ) , ν η χ ζ ( ˘ ) : ˘ ¯ be an FFS over ¯ . Then, the FF interior, FF closure, and FF boundary of χ ζ are defined by:
1.
I n t ( χ ζ ) = { G : G is an FFOS in ¯ and G χ ζ } ;
2.
C l ( χ ζ ) = { K : K is an FFCS in ¯ and χ ζ K } ;
3.
F r ( χ ζ ) = C l ( χ ζ ) C l χ ζ c ;
4.
E x t ( χ ζ ) = I n t ( χ ζ c ) .
It is clear that:
(a) 
Int ( χ ζ ) is the largest FFOS containing χ ζ ;
(b) 
C l ( χ ζ ) is the smallest FFCS containing χ ζ .
Example 2.
Assume ¯ = α ˘ 1 γ , α ˘ 2 γ , α ˘ 3 γ . Consider the family of FFSs
= 1 ¯ , 0 ¯ , χ ζ 1 , χ ζ 2 , χ ζ 3 , χ ζ 4 , ,
where
χ ζ 1 = α ˘ 1 γ , 0.58 , 0.78 , α ˘ 2 γ , 0.67 , 0.58 , α ˘ 3 γ , 0.28 , 0.18 , χ ζ 2 = α ˘ 1 γ , 0.60 , 0.76 , α ˘ 2 γ , 0.72 , 0.53 , α ˘ 3 γ , 0.30 , 0.16 , χ ζ 3 = α ˘ 1 γ , 0.64 , 0.72 , α ˘ 2 γ , 0.74 , 0.48 , α ˘ 3 γ , 0.34 , 0.14 , χ ζ 4 = α ˘ 1 γ , 0.71 , 0.67 , α ˘ 2 γ , 0.80 , 0.43 , α ˘ 3 γ , 0.44 , 0.10 .
It is clear that ( ¯ , ) is an FF TS. Now, assume that
= α ˘ 1 γ , 0.78 , 0.48 , α ˘ 2 γ , 0.88 , 0.28 , α ˘ 3 γ , 0.57 , 0.08
is an FF subset over ¯ . Then,
I n t ( ) = 0 ¯ χ ζ 1 χ ζ 2 χ ζ 3 χ ζ 4 = χ ζ 4 = α ˘ 1 γ , 0.71 , 0.67 , α ˘ 2 γ , 0.80 , 0.43 , α ˘ 3 γ , 0.44 , 0.10
In fact, I n t ( ) is the largest FFOS contained in FFS ℸ.
On the other hand, in order to find the FF closure of χ ζ , it necessary to determine the FFCSs over ¯ . Then,
χ ζ 1 c = α ˘ 1 γ , 0.78 , 0.58 , α ˘ 2 γ , 0.58 , 0.67 , α ˘ 3 γ , 0.18 , 0.28 , χ ζ 2 c = α ˘ 1 γ , 0.76 , 0.60 , α ˘ 2 γ , 0.53 , 0.72 , α ˘ 3 γ , 0.16 , 0.30 , χ ζ 3 c = α ˘ 1 γ , 0.72 , 0.64 , α ˘ 2 γ , 0.48 , 0.74 , α ˘ 3 γ , 0.14 , 0.34 , χ ζ 4 c = α ˘ 1 γ , 0.67 , 0.71 , α ˘ 2 γ , 0.43 , 0.80 , α ˘ 3 γ , 0.10 , 0.44 .
Now, we obtain
c = α ˘ 1 γ , 0.48 , 0.78 , α ˘ 2 γ , 0.28 , 0.88 , α ˘ 3 γ , 0.08 , 0.57
The computations for C l ( ) , F r ( ) , and E x t ( ) are as follows,
C l ( ) = 1 ¯ ( 1 ¯ i s o n l y c l o s e d s u p e r s e t o f ) C l c = 1 ¯ χ ζ 1 c χ ζ 2 c χ ζ 3 c χ ζ 4 c = χ ζ 4 c ( χ ζ 4 c i s t h e s m a l l e s t c l o s e d s u p e r s e t o f ) F r ( ) = C l ( ) C l c = 1 ¯ χ ζ 4 c = χ ζ 4 c ( χ ζ 4 c 1 ¯ ) E x t ( ) = I n t ( c ) = 0 ¯
Remark 2.
In addition, we analyse why certain findings that hold in crisp topology fail in FFT. The results of crisp topology and FFT are shown in Table 1.
Proposition 2.
Let ( ¯ , ) be an FFTS and χ ζ , χ ζ 1 , χ ζ 2 be FFSs over ¯ . Then, the following properties hold.
1.
I n t ( χ ζ ) χ ζ ;
2.
I n t ( I n t ( χ ζ ) ) = I n t ( χ ζ ) ;
3.
χ ζ 1 χ ζ 2 I n t χ ζ 1 I n t χ ζ 2 ;
4.
I n t χ ζ 1 χ ζ 2 = I n t χ ζ 1 I n t χ ζ 2 ;
5.
I n t 1 ¯ = 1 ¯ , I n t 0 ¯ = 0 ¯ ;
6.
I n t χ ζ 1 χ ζ 2 I n t χ ζ 1 I n t χ ζ 2 .
Proof. 
We can see that (1), (2), (3), and (5) are readily available from the FF interior description.
For (4), we obtain
I n t χ ζ 1 χ ζ 2 I n t χ ζ 1 Int χ ζ 2 from I n t χ ζ 1 χ ζ 2 I n t χ ζ 1 and I n t χ ζ 1 χ ζ 2 I n t χ ζ 2 . On the other hand, from the facts I n t χ ζ 1 χ ζ 1 and I n t χ ζ 2 χ ζ 2 I n t χ ζ 1 I n t χ ζ 2 χ ζ 1 χ ζ 2 and I n t χ ζ 1 I n t χ ζ 2 , we have I n t χ ζ 1 I n t χ ζ 2 I n t χ ζ 1 χ ζ 2 . Thus, the proof of the axioms (4) is obtained from these two inequalities. □
Theorem 2.
Let P ξ : F F S ( ¯ ) F F S ( ¯ ) be a mapping. The family = { χ ζ F F S ( ¯ ) : P ξ ( χ ζ ) = χ ζ } is an FF topology over ¯ , if the mapping P ξ satisfies the following conditions:
(i) 
P ξ ( χ ζ ) χ ζ ;
(ii) 
P ξ 1 ¯ = 1 ¯ ;
(iii) 
P ξ ( P ξ ( χ ζ ) ) = P ξ ( χ ζ ) ;
(iv) 
P ξ χ ζ 1 χ ζ 2 = P ξ χ ζ 1 P ξ χ ζ 2 . P ξ ( χ ζ ) = I n t ( χ ζ ) for each FF set χ ζ in this FF TS.
Proposition 3.
Let ( ¯ , ) be an FFTS and χ ζ , χ ζ 1 , χ ζ 2 be FFSs over ¯ . Then, the following properties hold.
1.
χ ζ C l ( χ ζ ) ;
2.
C l ( C l ( χ ζ ) ) = C l ( χ ζ ) ;
3.
χ ζ 1 χ ζ 2 C l χ ζ 1 C l χ ζ 2 ;
4.
C l χ ζ 1 χ ζ 2 = C l χ ζ 1 C l χ ζ 2 ;
5.
C l 1 ¯ = 1 ¯ , C l 0 ¯ = 0 ¯ .
Proof. 
Here, (1), (2), (3) and (5) can be easily obtained from the definition of the FF closure.
For (4), we obtain C l χ ζ 1 C l χ ζ 2 C l χ ζ 1 χ ζ 2 from C l χ ζ 1 C l χ ζ 1 χ ζ 2 and C l χ ζ 2 C l χ ζ 1 χ ζ 2 . On the other hand, from the facts χ ζ 1 C l χ ζ 1 and χ ζ 2 C l χ ζ 2 χ ζ 1 χ ζ 2 C l χ ζ 1 C l χ ζ 2 and C l χ ζ 1 C l χ ζ 2 χ ζ , we have C l χ ζ 1 χ ζ 2 C l χ ζ 1 C l χ ζ 2 . Thus, the proof of the axioms (4) is obtained from these two inequalities. □
Theorem 3.
Let C : F F S ( ¯ ) F F S ( ¯ ) be a mapping. The family = χ ζ F F S ( ¯ ) : C χ ζ c = χ ζ c is an FF topology over ¯ if the mapping C satisfies the following conditions:
1.
χ ζ C ( χ ζ ) ;
2.
C 0 ¯ = 0 ¯ ;
3.
C ( C ( χ ζ ) ) = C ( χ ζ ) ;
4.
C χ ζ 1 χ ζ 2 = C χ ζ 1 C χ ζ 2 .
Furthermore, C ( χ ζ ) = C l ( χ ζ ) for each FF set χ ζ in this FF TS.
Theorem 4.
Let ( ¯ , ) be an F F T S and χ ζ be an F F S over ¯ . Then,
(a) 
C l χ ζ c = ( I n t ( χ ζ ) ) c ;
(b) 
I n t χ ζ c = ( C l ( χ ζ ) ) c .
Proof. 
(a) Let χ ζ = ˘ , μ η χ ζ ( ˘ ) , ν η χ ζ ( ˘ ) : ˘ ¯ and assume that the family of FFSs contained in χ ζ are indexed by the family χ ζ i = ˘ , μ η χ ζ i ( ˘ ) , ν η χ ζ i ( ˘ ) : ˘ ¯ i I . Then, we see that I n t ( χ ζ ) = ˘ , sup μ η χ ζ i ( ˘ ) , ν η χ ζ i ( ˘ ) : ˘ ¯ and hence ( I n t ( χ ζ ) ) c = ˘ , ν η χ ζ i ( ˘ ) , sup μ η χ ζ i ( ˘ ) : ˘ ¯ . Since χ ζ c = ˘ , ν η χ ζ ( ˘ ) , μ η χ ζ ( ˘ ) : ˘ ¯ and μ η χ ζ i ( ˘ ) μ η χ ζ ( ˘ ) , ν η χ ζ i ( ˘ ) ν η χ ζ ( ˘ ) for each i I , we obtain that χ ζ i = ˘ , μ η χ ζ i ( ˘ ) , ν η χ ζ i ( ˘ ) : ˘ ¯ i I is the family of F F S s containing χ ζ c , i.e., C l χ ζ c = ˘ , ν η χ ζ i ( ˘ ) , sup μ η χ ζ i ( ˘ ) : ˘ ¯ . Therefore, C l χ ζ c = ( I n t ( χ ζ ) ) c immediately.
(b) This is analogous to (a). □
Definition 11.
A Fermatean fuzzy number (FFN) or Fermatean fuzzy point (FF point) = ( μ η , ν η ) is said to be contained in FFS K
K = { ρ , μ η K ( ρ ) , ν η K ( ρ ) : ρ ¯ }
written as K , if μ η μ η K and if ν η ν η K , ρ ¯ .
Definition 12.
An FFN = ( μ η , ν η ) contained in an FFS K is said to be an FF interior point if there exists FFOS U such that, U K . Then, K is called an FF neighbourhood of FFN ℵ.
Note that ℵ in the FF interior point of FFS K if and only if K is an FF neighbourhood of FFN ℵ.
Theorem 5.
Let ( ¯ , ) be an FFTS.
(i) If ϕ and φ are the neighbourhoods of FFN ℵ, then ϕ φ and ϕ φ are also neighbourhoods of ℵ.
(ii) If ψ is a neighbourhood of FFN ℵ, then each FF superset δ of ψ is also a neighbourhood of ℵ.
Proposition 4.
Let ¯ , 1 and ¯ , 2 be two F F T S s and : ¯ ⨿ ˘ be an FF mapping. Then, the following are equivalent to each other:
a 
ℶ is FF continuous mapping;
b 
[ C l ( χ ζ ) ] C l ( [ χ ζ ] ) for each F F S χ ζ in ¯ ;
c 
C l 1 [ K ] 1 [ C l ( K ) ] for each F F S K in ⨿ ˘ ;
d 
1 [ I n t ( K ) ] I n t 1 [ K ] for each F F S K in ⨿ ˘ .
Proof. 
(a) (b) Let : ¯ ⨿ ˘ be FF continuous mapping and χ ζ be an FFS over ¯ . Then, [ χ ζ ] C l ( [ χ ζ ] ) and χ ζ 1 [ C l ( [ χ ζ ] ) ] . Since C l ( [ χ ζ ] ) is an FFCS in ⨿ ˘ and is FF continuous mapping, 1 [ C l ( [ χ ζ ] ) ] is an FFCS in ¯ . On the other hand, if C l ( χ ζ ) is the smallest FFCS containing χ ζ , then C l ( χ ζ ) 1 [ C l ( [ χ ζ ] ) ] and so, [ C l ( χ ζ ) ] C l ( [ χ ζ ] ) .
(b) ⇒ (c) Suppose that χ ζ = 1 [ K ] . From (b), [ C l ( χ ζ ) ] = C l 1 [ K ] C l ( [ χ ζ ] ) = C l 1 [ K ] C l ( K ) . Then, C l 1 [ K ] = C l ( χ ζ ) 1 [ [ C l ( χ ζ ) ] ] 1 [ C l ( K ) ] .
(c) ⇒ (d) Since Int ( K ) = C l K c c , then C l 1 [ K ] = C l ( χ ζ ) 1 [ [ C l ( χ ζ ) ] ] 1 [ C l ( K ) ] .
Assume that G is an FFOS in ⨿ ˘ . Then, Int ( G ) = G . From (d), 1 [ G ] = 1 [ I n t ( G ) ] I n t 1 [ G ] 1 [ G ] . Therefore, is an FF continuous mapping. □
Definition 13.
Let ( ¯ , ) be an FFTS.
(i) A subfamily Γ of is called an FF basis (FFB) for if for each χ ζ , there exists Γ Γ such that χ ζ = Γ .
(ii) A collection Φ of some FFSs on ¯ is called an FF subbase (FFSB) for some FFT if the finite intersections of members of Φ form an FF basis for .
Theorem 6.
¯ , 1 and ¯ , 2 are two FFTSs and : ¯ ⨿ ˘ is an FF mapping. Then,
1.
ℶ is an FF continuous mapping iff for each F ˜ Γ , we have 1 [ F ˜ ] as an FF open subset of ¯ such that Γ is an FF basis for 2 .
2.
ℶ is an FF continuous mapping iff for each K χ ζ , we have 1 [ K ] as an FF open subset of ¯ such that Φ is an FF subbase for 2 .
Proof. 
(i) Let be an FF continuous mapping. Since each F ˜ Γ 2 and is an FF continuous mapping, then 1 [ F ˜ ] 1 .
Conversely, suppose that Γ is an FF basis for 2 and 1 [ F ˜ ] 1 for each F ˜ Γ . Then, for an arbitrary FFOS χ ζ 2 ,
1 [ χ ζ ] = 1 F ˜ Γ F ˜ = F ˜ Γ 1 [ F ˜ ] 1 .
That is, is an FF continuous mapping.
(ii) Let be an FF continuous mapping. Since each K Φ 2 and is an FF continuous mapping, then 1 [ K ] 1 .
Conversely, assume that Φ is an FF subbase for 2 and 1 [ K ] 1 for each K Φ . Then, for an arbitrary FFOS χ ζ 2 ,
1 [ χ ζ ] = 1 i j I K i 1 K i 2 K i n = i j I 1 K i 1 1 K i 2 1 K i n 1
That is, is an FF continuous mapping. □
Definition 14.
Let ¯ , 1 and ¯ , 2 be two FFTSs and : ¯ ⨿ ˘ be an FF mapping. Then:
(i) ℶ is called an FF open function if [ χ ζ ] is an FFOS over ⨿ ˘ for every FFOS χ ζ over ¯ . (ii) ℶ is called an FF closed function if [ K ] is an FFCS over ⨿ ˘ for every FFCS K over ¯ .
Example 3.
Let ¯ = α ˘ 1 γ , α ˘ 2 γ , α ˘ 3 γ and ⨿ ˘ = y 1 , y 2 , y 3 . Consider the following families of FF sets 1 = 0 ¯ , 1 ¯ , χ ζ 1 , χ ζ 2 , χ ζ 3 , χ ζ 4 and 2 = 0 ⨿ ˘ , 1 ⨿ ˘ , S 1 , S 2 , S 3 , S 4 where
χ ζ 1 = α ˘ 1 γ , 0.27 , 0.43 , α ˘ 2 γ , 0.57 , 0.17 , α ˘ 3 γ , 0.57 , 0.47 χ ζ 2 = α ˘ 1 γ , 0.57 , 0.47 , α ˘ 2 γ , 0.77 , 0.27 , α ˘ 3 γ , 0.67 , 0.57 χ ζ 3 = α ˘ 1 γ , 0.57 , 0.38 , α ˘ 2 γ , 0.77 , 0.17 , α ˘ 3 γ , 0.67 , 0.47 χ ζ 4 = α ˘ 1 γ , 0.27 , 0.40 , α ˘ 2 γ , 0.57 , 0.27 , α ˘ 3 γ , 0.57 , 0.57
S 1 = y 1 , 0.57 , 0.17 , y 2 , 0.27 , 0.43 , y 3 , 0.57 , 0.47 , S 2 = y 1 , 0.77 , 0.27 , y 2 , 0.57 , 0.47 , y 3 , 0.67 , 0.57 , S 3 = y 1 , 0.77 , 0.17 , y 2 , 0.57 , 0.38 , y 3 , 0.67 , 0.47 , S 4 = y 1 , 0.57 , 0.27 , y 2 , 0.27 , 0.40 , y 3 , 0.57 , 0.57 ,
It is clear that ¯ , 1 and ¯ , 2 are FFTSs. If FF mapping : ¯ ⨿ ˘ is defined as
α ˘ 1 γ = y 2 α ˘ 2 γ = y 1 α ˘ 3 γ = y 3
Then ℶ is an FF open function. However, ℶ is not an FF closed function on FFTSs ¯ , 1 .
Theorem 7.
Let ¯ , 1 and ¯ , 2 be two FFTSs and : ¯ ⨿ ˘ be an FF mapping. Then:
1.
ℶ is an FF open function if [ I n t ( χ ζ ) ] I n t ( [ χ ζ ] ) for each FF set χ ζ over ¯ .
2.
ℶ is an FF closed function if C l ( [ χ ζ ] ) [ C l ( χ ζ ) ] for each FF set χ ζ over ¯ .
Proof. 
(1) Let be an FF open function and χ ζ be an F F S over ¯ . Then, I n t ( χ ζ ) is an FFOS and I n t ( χ ζ ) χ ζ . Since is an FF open function, [ I n t ( χ ζ ) ] is an FFOS over ⨿ ˘ and [ I n t ( χ ζ ) ] [ χ ζ ] . Thus, [ I n t ( χ ζ ) ] I n t ( [ χ ζ ] ) is obtained.
Conversely, suppose that χ ζ is any FFOS over ¯ . Then, χ ζ = I n t ( χ ζ ) . From the condition of theorem, we have [ I n t ( χ ζ ) ] I n t ( [ χ ζ ] ) . Then, [ χ ζ ] = [ I n t ( χ ζ ) ] I n t ( [ χ ζ ] ) [ χ ζ ] . This implies that [ χ ζ ] = I n t ( [ χ ζ ] ) . That is, is an FF open function.
(2) Let be an FF closed function and χ ζ be a F F S over ¯ . Since is an FF closed function, then [ C l ( χ ζ ) ] is an FFCS over ⨿ ˘ and [ χ ζ ] [ C l ( χ ζ ) ] . Thus, C l ( [ χ ζ ] ) [ C l ( χ ζ ) ] is obtained.
Conversely, assume that χ ζ is any FFCS over ¯ . Then, χ ζ = C l ( χ ζ ) . From the condition of theorem, we have C l ( [ χ ζ ] ) [ C l ( χ ζ ) ] = [ χ ζ ] C l ( [ χ ζ ] ) . This means that, C l ( [ χ ζ ] ) = [ χ ζ ] . That is, is an FF closed function. □
Definition 15.
Let ¯ , 1 and ¯ , 2 be two FFTSs and : ¯ ⨿ ˘ be an FF mapping. Then, ℶ is a called an FF homeomorphism if:
(i) ℶ is a bijective mapping;
(ii) ℶ is an FF continuous mapping;
(iii) 1 is an FF continuous mapping.
Theorem 8.
Let ¯ , 1 and ¯ , 2 be two FFTSs and : ¯ ⨿ ˘ be an FF mapping. Then, the following conditions are equivalent:
(a) ℶ is an FF homeomorphism;
(b) ℶ is an FF continuous mapping and FF open function; (c) ℶ is an FF continuous mapping and FF closed function.
Proof. 
The proof can be easily obtained by using the previous theorems on continuity, openness and closedness are omitted. □

4. Ff Connectedness

In this section, we define the generalised concept of IF-connected TS and provide the related results with illustrations.
Definition 16.
Let A be an FF subset in ( ¯ , ¯ ) .
(a) If there exist FFOSs U ς and V τ in ¯ satisfying the following properties, then A ζ is called FF C i -disconnected ( i = 1 , 2 , 3 , 4 ) :
C 1
A ζ U ς V τ , U ς V τ A ζ c , A ζ U ς 0 x , A ζ V τ 0 x ;
C 2
A ζ U ς V τ , A ζ U ς V τ 0 x , A ζ U ς 0 x , A ζ V τ 0 x ;
C 3
A ζ U ς V τ , U ς V τ A ζ c , U ς A ζ c , V τ A ζ c ;
C 4
A ζ U ς V τ , A ζ U ς V τ 0 x , U ς A ζ c , V τ A ζ c .
(b) A ζ is said to be FF C i -connected ( i = 1 , 2 , 3 , 4 ) if A ζ is not FF C i -disconnected i = 1 , 2 , 3 , 4 .
It is clear that, in FFTSs, we have the following implications:
C 1 - connectedness C 2 - connectedness C 3 - connectedness C 4 - connectedness .
Example 4.
Let ¯ = α ˘ 1 γ , α ˘ 2 γ , α ˘ 3 γ . Consider the following family of FF sets
χ ζ 1 = α ˘ 1 γ , 0.50 , 0.20 , α ˘ 2 γ , 0.50 , 0.40 , α ˘ 3 γ , 0.40 , 0.40 , χ ζ 2 = α ˘ 1 γ , 0.40 , 0.50 , α ˘ 2 γ , 0.60 , 0.30 , α ˘ 3 γ , 0.20 , 0.30 , χ ζ 3 = α ˘ 1 γ , 0.50 , 0.20 , α ˘ 2 γ , 0.60 , 0.30 , α ˘ 3 γ , 0.40 , 0.30 , χ ζ 4 = α ˘ 1 γ , 0.40 , 0.50 , α ˘ 2 γ , 0.50 , 0.40 , α ˘ 3 γ , 0.20 , 0.40 .
Then, = 1 ¯ , 0 ¯ , χ ζ 1 , χ ζ 2 , χ ζ 3 , χ ζ 4 is an FFTS on ¯ , and consider the FFSE given below
E = α ˘ 1 γ , 0.60 , 0.20 , α ˘ 2 γ , 0.50 , 0.20 , α ˘ 3 γ , 0.40 , 0.30 ,
in ¯ . Then, E is FF C 1 -connected, and E is also FF C 2 -connected, FF C 3 -connected, and FF C 4 -connected.
Example 5.
Consider the FFTS ( ¯ , ¯ ) given in Example 4 and consider the FFS F given below
F = α ˘ 1 γ , 0.20 , 0.40 , α ˘ 2 γ , 0.30 , 0.60 , α ˘ 3 γ , 0.20 , 0.40 ,
One can verify whether F is FF C 1 -disconnected and hence not FF C 1 -connected.
Definition 17.
Let ( ¯ , ¯ ) be an FFTS:
(i) ¯ is said to be FF C 5 -disconnected if there exists an FFOS and FFCS G such that G 1 x and G 0 x .
(ii) ¯ is said to be FF C 5 -connected if it is not FF C 5 -disconnected.
Example 6.
Let ¯ = { 1 , 2 } and define the FF subsets A ζ , S ς , C , a n d D as follows;
Let ¯ = α ˘ 1 γ , α ˘ 2 γ , α ˘ 3 γ . Consider the following family of FF sets:
χ ζ 1 = α ˘ 1 γ , 0.40 , 0.30 , α ˘ 2 γ , 0.20 , 0.70 , χ ζ 2 = α ˘ 1 γ , 0.30 , 0.40 , α ˘ 2 γ , 0.70 , 0.20 , χ ζ 3 = α ˘ 1 γ , 0.30 , 0.40 , α ˘ 2 γ , 0.20 , 0.70 , χ ζ 4 = α ˘ 1 γ , 0.40 , 0.30 , α ˘ 2 γ , 0.70 , 0.20 ,
Then, the family = 1 ¯ , 0 ¯ , χ ζ 1 , χ ζ 2 , χ ζ 3 , χ ζ 4 is an FFTS on ¯ and ( ¯ , ) is an FF C 5 -disconnected, since A ζ is a nonzero FFOS and FFCS in ¯ .
Definition 18.
Let ( ¯ , ¯ ) be an FFTS:
(i) ¯ is called FF disconnected if there exist FFOSs A ζ 0 x and S ς 0 x such that A ζ U ς S ς = 1 x and A ζ S ς = 0 x .
(ii) ¯ is called FF connected if ¯ is not FF disconnected.
Proposition 5.
FF C 5 -connectedness implies FF connectedness.
Proposition 6.
Let ¯ a n d 1 , ⨿ ˘ , 2 be two FFTSs and let f : ¯ ⨿ ˘ be an FF continuous surjection. If ¯ , 1 is FF connected, then so is ⨿ ˘ , 2 .
Proof. 
On the contrary, suppose that ⨿ ˘ , 2 is FF disconnected. Then, there exist FFOSs A ζ 0 ⨿ ˘ , S ς 0 ⨿ ˘ in ⨿ ˘ such that A ζ U ς S ς = 1 y , A ζ S ς = 0 ⨿ ˘ . Now, we see that U ς = f 1 ( A ζ ) , V τ = f 1 ( S ς ) are FFOSs in ¯ since f is FF continuous. From A ζ 0 ⨿ ˘ , we obtain U ς = f 1 ( A ζ ) 0 x . Similarly, V τ 0 x . Hence, A ζ U ς S ς = 1 y = > f 1 ( A ζ ) f 1 ( S ς ) = f 1 1 y = 1 x = > U u ς V τ = 1 ¯ ; A ζ S ς = 0 ⨿ ˘ f 1 ( A ζ ) f 1 ( S ς ) = f 1 0 ⨿ ˘ = 0 ¯ U ς S ς = 0 ⨿ ˘ f 1 ( A ζ ) f 1 ( S ς ) = f 1 0 ⨿ ˘ = 0 ¯ U ς
Corollary 1.
Let ¯ , 1 , ⨿ ˘ , 2 be two FFTSs and let f : ¯ ⨿ ˘ be an FF continuous surjection. If ¯ , 1 is FF C 5 -connected, then so is ⨿ ˘ , 2 .
Definition 19.
An FFTS ( ¯ , ) is said to be FF strongly connected, if there exists nonzero FFCSs A ζ and S ς such that μ η A ζ + μ η S ς 1 and ϑ A ζ + ϑ S ς 1 .
Proposition 7.
Let ¯ , 1 , ⨿ ˘ , 2 be two FFTSs and let f : ¯ ⨿ ˘ be an FF continuous surjection. If ¯ , 1 is FF strongly connected, then so is ⨿ ˘ , 2 .
Proof. 
This is analogous to the proof of Proposition 6. It is clear that, in FFTSs, strong FF connectedness does not imply FF C 5 -connectedness, and the same is true for its converse. □

5. Fermatean Fuzzy α -Continuity

Definition 20.
An FFS χ ζ = < x , μ η χ ζ , γ χ ζ > of an FFTS ( ¯ , ) is called an FF α open set if χ ζ I n t ( C l ( I n t ( χ ζ ) ) ) . An FFS whose complement is an FF α open set (FFαOS) is called an FF α closed set (FFαCS).
Proposition 8.
Let ( ¯ , ) be an FFTS. Then, the arbitrary union of FFαOS is an FFαOS and an arbitrary intersection of FFαCSs is FFαCS.
Proof. 
Let { χ ζ i = x , μ η χ ζ , γ χ ζ > | i I } be a family of FF α OSs. Then, for each i I , χ ζ i I n t ( C l ( Int ( χ ζ i ) ) ) . Thus, χ ζ i I n t ( ( C l ( Int ( χ ζ i ) ) ) ) I n t ( C l ( Int ( χ ζ i ) ) ) ) I n t ( C l ( I n t ( χ ζ i ) ) ) ) I n t ( C l ( I n t ( χ ζ i ) ) ) ) Hence, χ ζ i is an FF α OS set. If we take the complement of this part, the following will be proven (i.e., the arbitrary intersection of FF α OS is also an FF α OS).
Every FFOS is an FF α OS and every FFCS is an FF α CS but the converse is not true. □
Definition 21.
The FF α closure of an FFS χ ζ in an FFTS ( ¯ ; ) represented as C l α ( χ ζ ) and defined by C l α ( χ ζ ) = { C i | C i is an FF α C set and χ ζ C i }
Proposition 9.
In an FFTS ( ¯ , ) , an FFS χ ζ is F F α C if and only if χ ζ = C l α ( χ ζ ) .
Proof. 
Assume that χ ζ is an F F α C set. Then,
χ ζ C i | C i is a F F α C set and χ ζ C i , so χ ζ = C i | C i is a F F α C and χ ζ C i
= C l α ( χ ζ ) .
Conversely, consider χ ζ = C l α ( χ ζ ) ,
χ ζ C i | C i is a F F α C set and χ ζ C i
Thus, χ ζ is an FF α -closed set. □
Proposition 10.
In an FFTS ( ¯ , ) , the following hold for q-ROα-closure:
(1) C l α ( 0 ̲ ) = 0 ̲ ;
(2) C l α ( χ ζ ) is a q-RO α C in ( ¯ , ) for every FFS χ ζ in ¯ ;
(3) C l α ( χ ζ ) C l α ( R ) whenever χ ζ R for every χ ζ and R in ¯ ;
(4) C l α C l α ( χ ζ ) = C l α ( χ ζ ) for every FFS χ ζ in ¯ .
Proof. 
(1) The proof is obvious;
(2) By preposition, χ ζ is FF α C iff the χ ζ = C l α ( χ ζ ) we obtain C l α ( χ ζ ) is an FF α C for every χ ζ in ¯ .
(3) By the same preposition, we obtain χ ζ = C l α ( χ ζ ) and R = C l α ( R ) . whenever χ ζ R , we have C l α ( χ ζ ) C l α ( R ) .
(4) Let χ ζ be an FFFS in ¯ . We know that χ ζ = C l α ( χ ζ ) ,
C l α ( χ ζ ) = C l α C l α ( χ ζ ) . Thus, C l α C l α ( χ ζ ) = C l α ( χ ζ ) for every χ ζ in ¯ . □
Definition 22.
Let ¯ , ¯ and ⨿ ˘ , ⨿ ˘ be FFTSs. A mapping : ¯ ⨿ ˘ is named FFα-continuous ( F F α C N ) if the inverse image of each FFOS of ⨿ ˘ is an FF α O set in ¯ .
Theorem 9.
Let : ¯ , ¯ ⨿ ˘ , ⨿ ˘ be a mapping from a F F T S ¯ , ¯ to an F F T S ⨿ ˘ , ⨿ ˘ . If is FF α -continues, then:
(1) ( C l ( I n t ( C l ( χ ζ ) ) ) ) C l ( ( χ ζ ) ) for all FFS χ ζ in ¯ .
(2) C l I n t 1 ( F ˜ ) 1 ( C l ( F ˜ ) ) for all F ˜ in ⨿ ˘ .

6. Fermatean Fuzzy Codas Approach

Combinative distance-based assessment (CODAS) is a method for evaluating the similarity between two sets of data. This method is particularly useful in applications where the datasets are complex and may not be easily compared using traditional methods such as Euclidean distance. One of the main advantages of CODAS is its ability to handle data with missing or incomplete values. This is important because, in many real-world applications, data are often missing or incomplete due to various reasons such as errors in data collection or missing information. CODAS can handle such data using a combination of different distance measures which can be customised based on the needs of the application. CODAS is also highly flexible and can be applied to a wide range of data types, including numerical, categorical, and ordinal data. This makes it an ideal method for applications where datasets may contain a mix of different data types.
The CODAS method is a useful tool for evaluating the similarity between two sets of data, particularly when the data are complex or contain missing or incomplete values. It is flexible and can be applied to a wide range of data types, making it a valuable tool for many different applications.
The fundamental task in general MCDM problems is that of selecting one or even more options from a set of available alternatives based on numerous criteria. The CODAS method is a comparatively recent MCDM method introduced by Ghorabaee et al. [46] in 2016. Ghorabaee et al. [47] also extended the CODAS approach to the fuzzy set. We extended the CODAS approach to FFSs with an application to supplier selection. To begin, in contrast to the vast majority of existing group decision-making techniques, which assume either a known reputation vector or equal expert weights, the experts’ reputation is determined by their qualifications and experience. Second, the Fermatean fuzzy direct rating approach is used to establish the relative relevance of criteria based on the expert group’s evaluation preferences. Thirdly, the Fermatean fuzzy CODAS approach is used to construct alternative orderings based on their assessment scores. Assume that there are n alternatives given as = 1 , , i , , n ( n 2 ) and = 1 , , j , , m ( m 2 ) is the finite set of m criteria. Suppose that = 1 , , e , , z ( z 2 ) constitute the assemblage of invited DMs. The FF-CODAS approach consists of the following steps.
  • Step 1: Determine the reputation of the experts:
    Δ ^ e = avg Θ e ( 1 ) , Θ e ( 2 ) = μ η Θ e ( 1 ) + μ η Θ e ( 2 ) 2 , ν η Θ e ( 1 ) + ν η Θ e ( 2 ) 2 , e = 1 , 2 , , z
    here, Δ ^ e indicates the FF average reputation of the invited DM e . Θ e ( 1 ) and Θ e ( 2 ) are FFNs that express the education and expertise of the invited DM e , respectively. Table 2 shows an FF linguistic scale that can be used to distinguish specialists based on their credentials and expertise.
  • Step 2: Normalise the importance of the DMs:
    e = score P Δ ^ e t = 1 z score P Δ ^ t = 1 + μ η Δ ^ e 3 ν η Δ ^ e 3 t = 1 z 1 + μ η Δ ^ t 3 ν η Δ ^ t 3 , e = 1 , , z
    here, = 1 , , e , , z T is the importance vector of the DMs, with e [ 0 , 1 ] and e = 1 z e = 1 .
  • Step 3: Evaluate the criteria importance matrices V e = V j e m × 1 :
    1 ( μ η V 1 e , ν η V 1 e ) [ t ] 2 ( μ η V 2 e , ν η V 2 e ) m ( μ η V m e , ν η V m e ) [ b ]
    where V j e = μ η V j e , ν η V j e ( j = 1 , , m ; e = 1 , , z ) is an FFN representing the important assessment of the criterion j provided by the DM e . It is defined by utilising an FF linguistic importance scale, which is shown in Table 3 and can be used to offer expert criteria importance preferences.
  • Step 4: Compute the consolidated criterion significance matrix:
    W ^ = W ^ j m × 1 : W ^ j = μ η W ^ j , ν η W ^ j = F F W G V j 1 , , V j e , , V j z = e = 1 z V j e e
    = e = 1 z μ η V j e e , 1 e = 1 z 1 ν η V j e 3 e 3 , j = 1 , , m
    where W ^ j = μ η W ^ j , ν η W ^ j is the FF aggregated importance evaluation of the criterion j given by the DMs.
  • Step 5: Normalise the aggregated criteria importance:
    j = score P W ^ j l = 1 m score P W ^ l = 1 + μ η W ^ j 3 ν η W ^ j 3 l = 1 m 1 + μ η W ^ l 3 ν η W ^ l 3
    where = 1 , , j , , m T is the importance vector of the criteria, with j [ 0 , 1 ] ( j = 1 , , n ) and j = 1 n j = 1 .
  • Step 6: Obtain the decision matrices Γ e = Γ i j e n × m : where Γ i j e = μ η Γ i j e , ν η Γ i j e ( i = 1 , , n ; j = 1 , , m ; e = 1 , , z ) is an FFN that represents the assessment of the alternative i with respect to the criterion j given by the invited expert e . It is defined using a Fermatean fuzzy linguistic assessment scale. The nine-point Fermatean fuzzy linguistic scale presented in Table 4 can be used to present the alternative assessment preferences of experts.
  • Step 7: Determine the aggregated decision matrix G = G i j n × m :
    G i j = FFWG Γ i j 1 , , Γ ^ i j e , , Γ i j k = e = 1 z μ η Γ i j e e , 1 e = 1 z 1 ν η Γ i j e e 3
    where the aggregation is determined by applying the “Fermatean fuzzy weighted geometric (FFWG) operator” [48] and G i j = μ η G i j , ν η G i j is the Fermatean fuzzy aggregated assessment of the alternative i with respect to the criterion j given by the experts.
  • Step 8: Determine the normalised decision matrix R ^ = R ^ i j n × m :
    R ^ i j = G i j c ; j C G i j ; j C + .
    where R ^ i j = μ η R ^ i j , ν η R ^ i j denotes the FF normalised assessment of the alternative i with respect to the criterion j given by the experts, C + C is the set of benefit criteria, C C is the set of cost criteria, and C + C = C . Only alternative assessments with respect to cost criteria are transformed by utilising the complement operation.
  • Step 9: Determine the Fermatean fuzzy negative-ideal solution (FFNIS).
    S ^ j = μ η S ^ j , ν η S ^ j = R j ^ score R j ^ = min 1 i n score R i j , j = 1 , , m
    S ^ = S 1 ^ , , S j ^ , , S ^ m is a collection of FFNs that represent the FFNIS and R ^ j is an FFN with the lowest score function value of alternatives with respect to the criterion j .
  • Step 10: Calculate the weighted Euclidean distance ( H i ) and weighted Hamming distance ( E i ) of the alternatives from the FFNIS given in Equations (6) and (7), respectively.
    H i i , S ^ = 1 2 j = 1 n ω j μ η R ^ i j 3 μ η R ^ j 3 + ν η R ^ i j 3 ν η S ^ j 3 + π R ^ i j 3 π S ^ j 3
    E i i , S ^ = 1 2 j = 1 n ω j μ η R ^ i j 3 μ η R ^ j 3 2 + ν η R ^ i j 3 ν η S ^ j 3 2 + π R ^ i j 3 π S ^ j 3 2
  • Step 11: Construct the relative assessment matrix P = P i t n × n :
    P i t = E i i , S ^ E t t , S ^ + Φ i t E i i , S ^ E t t , S ^ · H i i , S ^ H t t , S ^
    i , t = 1 , , n , where Φ is a threshold function to recognise the equality of Euclidean distance measures of two alternatives. It is defined as follows
    Φ i t E i i , S ^ E t t , S ^ = 1 ϕ | E i i , S ^ E t t , S ^ 0 ϕ > | E i i , S ^ E t t , S ^
    where ϕ is the threshold parameter.
  • Step 12: Calculate the assessment scores and rank the alternatives:
    R i = t = 1 n P i t , i = 1 , 2 , , n
    where R i represents the assessment scores of the alternative i . The alternatives are ranked according to the decreasing values of their assessment score. The highest score is the most desirable alternative.

7. Case Study

Sustainable supplier selection (SSS) is the process of evaluating and choosing suppliers based on their ability to meet the needs of an organisation while also considering the environmental and social impact of their practices. This approach to sourcing is becoming increasingly important as organisations recognise the need to minimise their environmental footprint and promote ethical business practices.
There are several reasons for which SSS is important. Firstly, it helps organisations meet their sustainability goals and reduce their environmental impact. By choosing suppliers that are committed to sustainability, organisations can minimise the environmental impact of their supply chain and reduce their greenhouse gas emissions. This can help organisations meet their sustainability targets and reduce their carbon footprint. Secondly, SSS can help organisations reduce their risk. By choosing suppliers that are committed to sustainability, organisations can reduce the risk of supply chain disruptions caused by environmental disasters or social unrest. This is particularly important for organisations that rely on global supply chains, as these may be vulnerable to risks such as natural disasters or political instability. Thirdly, SSS can help organisations build and maintain a positive reputation. Consumers and other stakeholders are increasingly concerned about the environmental and social impact of the products and services they consume, and are more likely to choose companies that are transparent about their supply chain practices and that have a strong commitment to sustainability. By choosing sustainable suppliers, organisations can demonstrate their commitment to sustainability and build trust among their stakeholders.
There are several approaches that organisations can take to implementing SSS. One approach is to incorporate sustainability criteria into the supplier selection process. This can involve evaluating suppliers based on their environmental performance, labour practices, and social impact. Organisations can use tools such as sustainability assessment frameworks or rating systems to evaluate suppliers based on these criteria.
Another approach is to work with suppliers to improve their sustainability practices. This can involve setting sustainability targets for suppliers and providing them with support to meet these targets. Organisations can also work with suppliers to implement sustainability initiatives, such as reducing waste or increasing the use of renewable energy. SSS is often approached as an MCDM problem, as it involves the evaluation of multiple criteria such as cost, quality, delivery performance, and sustainability. MCDM methods are used to weigh these criteria and determine the most suitable supplier based on the organisation’s specific needs and priorities.
SSS is an important aspect of corporate responsibility and can be approached as a MCDM problem. By choosing suppliers that are committed to sustainability and incorporating sustainability criteria into the supplier selection process, organisations can minimise their environmental impact, reduce risk, and build a positive reputation. Using MCDM methods, organisations can evaluate multiple criteria and choose suppliers that best meet their needs while also considering the environmental and social impacts of their practices.
Supplier selection is a critical process for firms to conduct in order to maintain a competitive edge and achieve their supply chain objectives. According to industry statistics, manufacturers spend up to 70% of their total product costs on products and services, while high-technology businesses spend up to 80% of their total product costs on goods and services. To properly manage this strategically critical purchasing function, it is crucial to choose the most appropriate strategy and parameters for the situation. In today’s dynamic business environment, all the aspects of delivering goods must be considered, including reliability, versatility, and fast response, through the successful structure and implementation of the distribution chain. Vendor assessment is a critical part of the supply network, as it has an impact on the organisation’s long objectives and productivity. Manufacturers have a variety of qualities and shortcomings that must be carefully evaluated by purchasers before they are ranked according to certain criteria. As a result, each choice must be integrated by weighing the performance of various suppliers at each supply chain level.
The problem becomes much more acute in manufacturing plants because considerable amounts of effort and money are spent on acquiring. Reliable vendors assist organisations in achieving the highest levels of their manufacturing strategy while also supplying practitioners with the greatest number of benefits. Supplier selection is regarded as a challenging task due to the high number of variables and the interactions among them. In general, the supply chain supplier selection problem is a group decision-making problem with a large number of criteria that must be met. Because group decision making involves human judgement, precise facts are insufficient to convey these judgments, which are based on human preferences. The more pragmatic approach is to make judgments based on language rather than numerical qualities. As a result, linguistic variables are utilised to assess the grades and weights given to the problem’s criteria.
Supplier selection is an MCDM dilemma that is influenced by a number of competing considerations, including cost, reliability, and execution. Dickson conducted a study questionnaire-based distributed to 273 purchasing professionals, which resulted in the identification of 23 different regularly utilised criteria for the supplier selection problem. Dickson came to the conclusion that quality, delivery, and performance history are the most essential criteria out of the 23 elements considered [49]. Numerous strategies have been developed over the years to efficiently handle the challenge. In the literature, methods such as “analytic hierarchy process” (AHP), “analytic network process” (ANP), “linear programming” (LP), “mathematical programming”, “multi-objective programming”, “data envelopment analysis” (DEA), “neural networks” (NN), “case-based reasoning” (CBR), and “fuzzy set theory” (FST) have been used [50]. Additionally, the integration of many approaches has been developed by academics, and the integration capitalises on the strengths of each method while compensating for its flaws.

7.1. Criterion for SSS

There are several criteria that organisations can use to evaluate the sustainability of their suppliers. These criteria can be grouped into three main categories: environmental, social, and economic.

7.1.1. Environmental Criteria

  • Carbon emissions: Organisations can evaluate suppliers based on their carbon emissions and the steps they are taking to reduce them. This can include evaluating the energy efficiency of their facilities, their use of renewable energy sources, and their transportation practices.
  • Resource use: Organisations can evaluate suppliers based on their use of natural resources such as water and raw materials and their efforts to conserve these resources.
  • Waste reduction: Organisations can evaluate suppliers based on their waste reduction efforts, including the recycling of materials and the implementation of zero waste initiatives.
  • Environmental compliance: Organisations can evaluate suppliers based on their compliance with environmental regulations and their efforts to minimise the environmental impact of their operations.

7.1.2. Social Criteria

  • Labour practices: Organisations can evaluate suppliers based on their treatment of employees, including their working conditions, wages, and benefits. This can also include evaluating the suppliers’ policies on issues such as diversity, equity, and inclusion.
  • Community involvement: Organisations can evaluate suppliers based on their involvement in and impact on the local community, including their charitable activities and efforts to address community needs.
  • Human rights: Organisations can evaluate suppliers based on their respect for human rights and their efforts to prevent human rights abuses in their operations.

7.1.3. Economic Criteria

  • Cost: Organisations can evaluate suppliers based on the cost of their products or services and the value they provide.
  • Quality: Organisations can evaluate suppliers based on the quality of their products or services and their ability to meet the needs of the organisation.
  • Delivery performance: Organisations can evaluate suppliers based on their ability to deliver products or services on time and in the required quantities.
  • Innovation: Organisations can evaluate suppliers based on their ability to bring innovative products or services into the market and their willingness to collaborate on new product development.
There are several criteria that organisations can use to evaluate the sustainability of their suppliers. These criteria can be grouped into environmental, social, and economic categories and can be customised based on the specific needs and priorities of the organisation.

7.2. Decision-Making Application

A high-tech industrial business wishes to find an appropriate material supplier from whom to procure critical components for future products. Following preliminary screening, five candidates ( 1 , 2 , 3 , 4 , and 5 ) will be evaluated further. To pick the best acceptable supplier, a committee of four DMs, 1 , 2 , 3 , and 4 , has been constituted. Seven criteria are taken into account, as given in Table 5.
  • Step 1: Four DMs participated in the provided case study. The five-point FF linguistic scale was applied to various DMs given in Table 6. The table contains FFNs that denote the experts’ credentials and expertise. Then, utilising Equation (1) and the related FFNs, a Fermatean fuzzy average distinction of an expert is calculated, as given in Table 7.
  • Step 2: The FF average reputations of DMs are normalised using Equation 2. Because a DM cannot have a negative reputation value, the positive score algorithm is employed to obtain a crisp average result. The obtained reputation vector of the DMs is = ( 0.2021 , 0.2112 , 0.2732 , 0.3135 ) .
  • Step 3: The seven-point FF linguistic scale shown in Table 3 is used to determine the relative relevance of criteria. DMs examine predefined factors that influence the supplier evaluation process. Table 8 contains the ratings of the criteria’s linguistic significance. Table 9 has seven matrices of criterion importance, one for each DM. These are generated using the matching FF linguistic importance scale and linguistic evaluations gathered from the field.
  • Step 4: Equation (3) aggregates the FF significance ratings of the parameters by taking into account the DMs’ repute vector. Table 10 contains the calculated value.
  • Step 5: In this step, we normalise the FF aggregated importance evaluations of the criteria. Because criteria cannot have a negative significance, the positive score function is used to calculate the crisp aggregated values. Normalised values are given in Table 10.
  • Step 6: The alternatives are evaluated using the nine-point FF linguistic scale listed in Table 4. Table 11 contains the linguistic assessments of the options in relation to four DMs’ decision criteria. Table 12 contains the initial decision matrices. These were designed using the FF linguistic assessment scale as a guide.
  • Step 7: Four decision matrices are aggregated using the FFWG operator specified in Equation (4), which take the DMs’ reputational vector into consideration. Table 13 contains the derived FF aggregated assessments of the alternatives in relation to the criteria specified by four DMs.
  • Step 8:Table 14 contains the normalised decision matrix. Equation (5) is used to determine it based on the aggregated decision matrix. The complement operation is used solely for the cost type attributes. Here, 4 and 6 are the cost-type attributes.
  • Step 9: To begin, the values of the FF normalised assessments’ score functions are determined using the formulation of the FFNs’ score function. Then, the FFNIS is calculated and provided as
    { 0.473 , 0.584 , 0.182 , 0.948 , 0.336 , 0.809 , 0.462 , 0.677 , 0.417 , 0.714 ,
    0.258 , 0.851 , 0.659 , 0.536 } .
  • Step 10: Evaluate the weighted Euclidean distances and weighted Hamming distances using Equations (6) and (7), given in Table 15.
  • Step 11: Construct the relative assessment matrix, which is given in Table 16. In the base case scenario, the threshold parameter ϕ > 0 is set to 0.40.
  • Step 12: Calculate assessment scores and rank the alternatives using Equation (9) given in Table 17.

7.3. Comparison Analysis

We compare our findings to existing models to confirm their veracity and validity, as shown in Table 18.

8. Conclusions

Numerous practitioners and academics have emphasised the benefits of supply chain management. Many organisations have learned that a well-managed supply chain system is a vital instrument for strengthening their competitive edge. Under these circumstances, establishing strong and long-term connections between customers and suppliers is important to the supply chain system’s performance. As a result, the issue of supplier selection becomes the key concern when developing an effective supply chain system. We invented the Fermatean fuzzy “Combinative Distance-based Assessment” CODAS approach for the selection of optimum provider. To begin, in contrast to the overwhelming majority of existing group decision-making systems, which assume either a known reputation vector or equal expert weights, experts’ reputation is established by their qualifications and experience. Second, the Fermatean fuzzy direct rating approach is utilised to establish the relative significance of criteria based on the expert group’s evaluation preferences. Thirdly, the Fermatean fuzzy CODAS technique is utilised to generate alternative orderings based on their assessment scores. Topological data analysis (TDA) techniques are quickly gaining traction as methods for managing massive amounts of data. Moreover, numerous concepts relevant to FFTSs are explored in this paper. Examples are supplied for the FF interior, FF closure, and FF border of any FFS. The notions of FF base, FF subbase, FF continuous mapping, FF homeomorphism, FF open function, and FF closed function are also introduced, along with several crucial proofs. Furthermore, the novel idea of “Fermatean fuzzy α -continuous mapping” between FFTSs and “Fermatean fuzzy connectedness” is introduced and studied.

Author Contributions

M.B.: Methodology, Formal analysis, Writing—review & editing. H.M.A.F.: Methodology, Formal analysis, Writing—review & editing. M.R.: Investigation, Methodology, Supervision. N.J.: Methodology, Investigation. All authors made a significant scientific contribution to the research in the manuscript. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data used to support the findings of the study are included within the article.

Acknowledgments

The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University, Abha, Saudi Arabia, for funding this work through a research group program under grant number R.G.P. 2/217/43.

Conflicts of Interest

The authors declare that they have no conflict of interest.

References

  1. Zadeh, L.A. Fuzzy sets. Inf. Control 1965, 8, 338–353. [Google Scholar] [CrossRef]
  2. Pawlak, Z. Rough sets. Int. J. Inf. Comput. Sci. 1982, 11, 341–356. [Google Scholar] [CrossRef]
  3. Molodtsov, D. Soft set theory-first results. Comput. Math. Appl. 1999, 37, 19–31. [Google Scholar] [CrossRef]
  4. Chang, C.L. Fuzzy topological spaces. J. Math. Anal. Appl. 1968, 24, 182–190. [Google Scholar] [CrossRef]
  5. Lowen, R. Fuzzy topological spaces and fuzzy compactness. J. Math. Anal. Appl. 1976, 56, 621–633. [Google Scholar] [CrossRef]
  6. Lowen, R. Initial and final fuzzy topologies and the fuzzy Tychonoff theorem. J. Math. Anal. Appl. 1977, 58, 11–21. [Google Scholar] [CrossRef]
  7. Atanassov, K.T. Intuitionistic fuzzy sets. Fuzzy Sets Ans Syst. 1986, 20, 87–96. [Google Scholar] [CrossRef]
  8. Coker, D. An introduction to intuitionistic fuzzy topological spaces. Fuzzy Sets Syst. 1997, 88, 81–89. [Google Scholar] [CrossRef]
  9. Coker, D.; Haydar, E.A. On fuzzy compactness in intuitionistic fuzzy topological spaces. J. Fuzzy Math. 1995, 3, 899–910. [Google Scholar]
  10. Turanli, N.; Coker, D. Fuzzy connectedness in intuitionistic fuzzy topological spaces. Fuzzy Sets Syst. 2000, 116, 369–375. [Google Scholar] [CrossRef]
  11. Ozcag, S.; Coker, D. On connectedness in intuitionistic fuzzy special topological spaces. Int. J. Math. Math. Sci. 1998, 21, 33–40. [Google Scholar] [CrossRef]
  12. Kramosil, I.; Michalek, J. Fuzzy metrics and statistical metric spaces. Kybernetika 1975, 11, 336–344. [Google Scholar]
  13. Singal, M.K.; Rajvanshi, N. Fuzzy alpha-sets and alpha-continuous maps. Fuzzy Sets Syst. 1992, 483, 383–390. [Google Scholar] [CrossRef]
  14. Ajmal, N.; Kohli, J.K. Connectedness in fuzzy topological spaces. Fuzzy Sets Syst. 1989, 31, 369–388. [Google Scholar] [CrossRef]
  15. Chaudhuri, A.K.; Das, P. Fuzzy connected sets in fuzzy topological spaces. Fuzzy Sets Syst. 1992, 49, 223–229. [Google Scholar] [CrossRef]
  16. Olgun, M.; Unver, M.; Yardymcy, P. Pythagorean fuzzy topological spaces. Complex Intell. Syst. 2019, 5, 177–183. [Google Scholar] [CrossRef]
  17. Turkarslan, E.; Unver, M.; Olgun, M. q-Rung orthopair fuzzy topological spaces. Lobachevskii J. Math. 2021, 42, 470–478. [Google Scholar] [CrossRef]
  18. Charisma, J.; Ajay, D. Pythagorean fuzzy α-continuity. J. Comput. Math. 2020, 4, 10–15. [Google Scholar]
  19. Haydar, A. Connectedness in Pythagorean fuzzy topological spaces. Int. J. Math. Trends Technol. 2019, 65, 110–116. [Google Scholar] [CrossRef]
  20. Yager, R.R.; Abbasov, A.M. Pythagorean membership grades, complex numbers, and decision making. Int. J. Intell. Syst. 2013, 28, 436–452. [Google Scholar] [CrossRef]
  21. Yager, R.R. Pythagorean fuzzy subsets. In Proceedings of the 2013 Joint IFSA World Congress, NAFIPS Annual Meeting (IFSA/NAFIPS), Edmonton, Canada, 24–28 June 2013; pp. 57–61. [Google Scholar]
  22. Yager, R.R. Pythagorean membership grades in multi criteria decision-making. IEEE Trans. Fuzzy Syst. 2014, 22, 958–965. [Google Scholar] [CrossRef]
  23. Yager, R.R. Generalized orthopair fuzzy sets. IEEE Trans. Fuzzy Syst. 2017, 25, 1222–1230. [Google Scholar] [CrossRef]
  24. Senapati, T.; Yager, R.R. Fermatean fuzzy sets. J. Ambient. Intell. Humaniz. Comput. 2020, 11, 663–674. [Google Scholar] [CrossRef]
  25. Xu, Z.S. Intuitionistic fuzzy aggregation operators. IEEE Transections Fuzzy Syst. 2007, 15, 1179–1187. [Google Scholar]
  26. Xu, Z.S.; Yager, R.R. Some geometric aggregation operators based on intuitionistic fuzzy sets. Int. J. Gen. Syst. 2006, 35, 417–433. [Google Scholar] [CrossRef]
  27. Akram, M.; Amjad, U.; Alcantud, J.C.R.; Garcia, G.S. Complex fermatean fuzzy N-soft sets: a new hybrid model with applications. J. Ambient. Intell. Humaniz. Comput. 2022. [Google Scholar] [CrossRef]
  28. Feng, F.; Zheng, Y.; Sun, B.; Akram, M. Novel score functions of generalized orthopair fuzzy membership grades with application to multiple attribute decision making. , Granul. Comput. 2022, 7, 95–111. [Google Scholar] [CrossRef]
  29. Riaz, M.; Farid, H.M.A.; Aslam, M.; Pamucar, D.; Bozanic, D. Novel approach for third-party reverse logistic provider selection process under linear Diophantine fuzzy prioritized aggregation operators. Symmetry 2021, 13, 1152. [Google Scholar] [CrossRef]
  30. Iampan, A.; Garcia, G.S.; Riaz, M.; Farid, H.M.A.; Chinram, R. Linear Diophantine fuzzy Einstein aggregation operators for multi-criteria decision-making problems. J. Math. 2021, 2021, 5548033. [Google Scholar] [CrossRef]
  31. Ashraf, S.; Abdullah, S. Emergency decision support modeling for COVID-19 based on spherical fuzzy information. Int. J. Intell. Syst. 2020, 35, 1–45. [Google Scholar] [CrossRef]
  32. Saha, A.; Dutta, D.; Kar, S. Some new hybrid hesitant fuzzy weighted aggregation operators based on Archimedean and Dombi operations for multi-attribute decision making. Neural Comput. Appl. 2021, 33, 8753–8776. [Google Scholar] [CrossRef]
  33. Saha, A.; Majumder, P.; Dutta, D.; Debnath, B.K. Multi-attribute decision making using q-rung orthopair fuzzy weighted fairly aggregation operators. J. Ambient. Intell. Humaniz. Comput. 2021, 12, 8149–8171. [Google Scholar] [CrossRef]
  34. Wei, G.; Zhang, Z. Some single-valued neutrosophic bonferroni power aggregation operators in multiple attribute decision making. J. Ambient. Intell. Humaniz. Comput. 2019, 10, 863–882. [Google Scholar] [CrossRef]
  35. Wei, G.; Wei, Y. Some single-valued neutrosophic dombi prioritized weighted aggregation operators in multiple attribute decision making. J. Intell. Fuzzy Syst. 2018, 35, 2001–2013. [Google Scholar] [CrossRef]
  36. Garg, H. Multi-attribute group decision-making process based on possibility degree and operators for intuitionistic multiplicative set. Complex Intell. Syst. 2021, 7, 1099–1121. [Google Scholar] [CrossRef]
  37. Naeem, K.; Riaz, M.; Peng, X.; Afzal, D. Pythagorean m-polar fuzzy topology with TOPSIS approach in exploring most effectual method for curing from COVID-19. Int. J. Biomath. 2020, 13, 2050075. [Google Scholar] [CrossRef]
  38. Peng, J.J.; Wang, J.Q.; Wang, J.; Zhang, H.Y.; Chen, Z.H. Simplified neutrosophic sets and their applications in multi-criteria group decision-making problems. Int. J. Syst. Sci. 2016, 47, 2342–2358. [Google Scholar] [CrossRef]
  39. Liu, P.; Chu, Y.; Li, Y.; Chen, Y. Some generalized neutrosophic number Hamacher aggregation operators and their application to group decision making. Int. J. Fuzzy Syst. 2014, 16, 242–255. [Google Scholar]
  40. Farid, H.M.A.; Riaz, M. Single-valued neutrosophic Einstein interactive aggregation operators with applications for material selection in engineering design: case study of cryogenic storage tank. Complex Intell. Syst. 2022, 8, 2131–2149. [Google Scholar] [CrossRef]
  41. Lin, M.; Huang, C.; Xu, Z.; Chen, R. Evaluating IoT Platforms Using Integrated Probabilistic Linguistic MCDM Method. IEEE Internet Things J. 2020, 7, 11195–11208. [Google Scholar] [CrossRef]
  42. Huang, C.; Lin, M.; Xu, Z. Pythagorean fuzzy MULTIMOORA method based on distance measure and score function: its application in multicriteria decision making process. Knowl. Inf. Syst. 2020, 62, 4373–4406. [Google Scholar] [CrossRef]
  43. Lin, M.; Huang, C.; Xu, Z. TOPSIS Method Based on Correlation Coefficient and Entropy Measure for Linguistic Pythagorean Fuzzy Sets and Its Application to Multiple Attribute Decision Making. Complexity 2019, 2019, 6967390. [Google Scholar] [CrossRef]
  44. Lin, M.; Li, X.; Chen, R.; Fujita, H.; Lin, J. Picture fuzzy interactional partitioned Heronian mean aggregation operators: an application to MADM process. Artif. Intell. Rev. 2022, 55, 1171–1208. [Google Scholar] [CrossRef]
  45. Senapati, T.; Yager, R.R. Some new operations over Fermatean fuzzy numbers and application of fermatean fuzzy WPM in multiple criteria decision making. Informatica 2019, 30, 391–412. [Google Scholar] [CrossRef]
  46. Ghorabaee, M.K.; Zavadskas, E.K.; Turskis, Z.; Antucheviciene, J. A new combinative distance-based assessment (CODAS) method for multi-criteria decision-making. Econ. Comput. Econ. Cybern. Stud. Res. 2016, 50, 25–44. [Google Scholar]
  47. Ghorabaee, M.K.; Amiri, M.; Zavadskas, E.K.; Hooshmand, R.; Antuchevieiene, J. Fuzzy extension of the CODAS method for multi-criteria market segment evaluation. Journal Of Bus. Econ. Manag. 2017, 18, 1–19. [Google Scholar]
  48. Ghorabaee, M.K.; Amiri, M.; Tabatabaei, M.H.; Zavadskas, E.K.; Kaklauskas, A. A new decision-making approach based on Fermatean fuzzy sets and WASPAS for green construction supplier evaluation. Mathematics 2020, 8, 2202. [Google Scholar] [CrossRef]
  49. Dickson, G.W. An analysis of vendor selection systems and decisions. J. Purch. 1966, 2, 5–17. [Google Scholar] [CrossRef]
  50. Guneri, A.F.; Yucel, A.; Ayyildiz, G. An integrated fuzzy-lp approach for a supplier selection problem in supply chain management. Expert Syst. Appl. 2009, 36, 9223–9228. [Google Scholar] [CrossRef]
  51. Aydemir, S.B.; Gunduz, S.Y. Fermatean Fuzzy TOPSIS Method with Dombi Aggregation Operators and Its Application in Multi-criteria Decision Making. J. Intell. Fuzzy Syst. 2020, 39, 851–869. [Google Scholar] [CrossRef]
  52. Gül, S. Fermatean fuzzy set extensions of SAW, ARAS, and VIKOR with applications in COVID-19 testing laboratory selection problem. Expert Syst. 2021, 38, 12769. [Google Scholar] [CrossRef] [PubMed]
  53. Simic, V.; Gokasar, I.; Deveci, M.; Isik, M. Fermatean Fuzzy Group Decision-Making Based CODAS Approach for Taxation of Public Transit Investments. IEEE Trans. Eng. Manag. 2021. [Google Scholar] [CrossRef]
Table 1. Comparison of some results of crisp topology and FFT.
Table 1. Comparison of some results of crisp topology and FFT.
Crisp TopologyFermatean Fuzzy Topology
I n t ( ) E x t ( ) F r ( ) = ¯ I n t ( ) E x t ( ) F r ( ) 1 ¯
I n t ( ) E x t ( ) = I n t ( ) E x t ( ) 0 ¯
E x t ( ) F r ( ) = E x t ( ) F r ( ) 0 ¯
I n t ( ) F r ( ) = I n t ( ) F r ( ) 0 ¯
Table 2. FF linguistic scale to distinct DMs.
Table 2. FF linguistic scale to distinct DMs.
QualificationsExperience (Years)FFNs
F.Sc. (Higher Secondary) [ 6.5 , 10 ) ( 0.150 , 0.900 )
B.Sc. (Graduate) [ 10 , 15.5 ) ( 0.250 , 0.700 )
M.Sc. (Master’s) [ 15.5 , 20 ) ( 0.500 , 0.500 )
M.S./M.Phil. (Postgraduate) [ 20 , 35 ) ( 0.700 , 0.250 )
Ph.D. (Doctorate) 35 ( 0.900 , 0.150 )
Table 3. FF linguistic scale to evaluate criteria importance.
Table 3. FF linguistic scale to evaluate criteria importance.
Linguistic TermFFN
Extremely unimportant (EU) ( 0.100 , 0.975 )
Not important (NI) ( 0.200 , 0.850 )
Slightly important (SI) ( 0.350 , 0.700 )
Moderately important (MI) ( 0.550 , 0.500 )
Important (I) ( 0.700 , 0.350 )
Very important (VI) ( 0.850 , 0.200 )
Extremely important (EI) ( 0.975 , 0.100 )
Table 4. FF linguistic scale to evaluate alternatives.
Table 4. FF linguistic scale to evaluate alternatives.
Linguistic TermFFNs
Inadequate (I) ( 0.100 , 0.975 )
Very poor (VP) ( 0.200 , 0.900 )
Poor (P) ( 0.300 , 0.800 )
Medium poor (MP) ( 0.400 , 0.650 )
Medium (M) ( 0.550 , 0.500 )
Medium good (MG) ( 0.650 , 0.400 )
Good (G) ( 0.800 , 0.300 )
Very good (VG) ( 0.900 , 0.200 )
Exceptional (E) ( 0.975 , 0.100 )
Table 5. Criterion for the assessment.
Table 5. Criterion for the assessment.
Criteria
1 Quality
2 Technical support
3 Performance history
4 Cost
5 Reputation in industry
6 Risk factor
7 Professionalism
Table 6. Information about the DMs.
Table 6. Information about the DMs.
DMsQualificationsExperience (Years)Gender
1 Ph.D.15Male
2 M.S.19Female
3 Ph.D.23Male
4 Ph.D.35Male
Table 7. Information about the DMs in terms of FFNs.
Table 7. Information about the DMs in terms of FFNs.
DMsQualificationsExperience (Years)AveragePositive Score
1 ( 0.900 , 0.150 ) ( 0.250 , 0.700 ) ( 0.575 , 0.425 ) 1.113
2 ( 0.700 , 0.250 ) ( 0.500 , 0.500 ) ( 0.600 , 0.375 ) 1.163
3 ( 0.900 , 0.150 ) ( 0.700 , 0.250 ) ( 0.800 , 0.200 ) 1.504
4 ( 0.900 , 0.150 ) ( 0.900 , 0.150 ) ( 0.900 , 0.150 ) 1.726
Table 8. DM evaluations of the criteria using linguistic terms.
Table 8. DM evaluations of the criteria using linguistic terms.
CriterionDMs
1 2 3 4
1 EIVIMII
2 VIIVIMI
3 IMIVII
4 VIVIMIVI
5 MIIVIMI
6 IMIEIVI
7 EIIVIMI
Table 9. DM evaluations of the criteria in terms of corresponding FFNs.
Table 9. DM evaluations of the criteria in terms of corresponding FFNs.
CriterionDMs
1 2 3 4
1 ( 0.975 , 0.100 ) ( 0.850 , 0.200 ) ( 0.550 , 0.500 ) ( 0.700 , 0.350 )
2 ( 0.850 , 0.200 ) ( 0.700 , 0.350 ) ( 0.850 , 0.200 ) ( 0.550 , 0.500 )
3 ( 0.700 , 0.350 ) ( 0.550 , 0.500 ) ( 0.850 , 0.200 ) ( 0.700 , 0.350 )
4 ( 0.850 , 0.200 ) ( 0.850 , 0.200 ) ( 0.550 , 0.500 ) ( 0.850 , 0.200 )
5 ( 0.550 , 0.500 ) ( 0.700 , 0.350 ) ( 0.850 , 0.200 ) ( 0.550 , 0.500 )
6 ( 0.700 , 0.350 ) ( 0.550 , 0.500 ) ( 0.975 , 0.100 ) ( 0.850 , 0.200 )
7 ( 0.975 , 0.100 ) ( 0.700 , 0.350 ) ( 0.850 , 0.200 ) ( 0.550 , 0.500 )
Table 10. Aggregated FFNs for the criteria.
Table 10. Aggregated FFNs for the criteria.
CriterionImportance
Aggregated FFNsPositive ScoreNormalised
1 ( 0.730090 , 0.370315 ) 1.338380.1440
2 ( 0.711773 , 0.376696 ) 1.307150.1407
3 ( 0.701479 , 0.372318 ) 1.293570.1392
4 ( 0.754690 , 0.346039 ) 1.388400.1494
5 ( 0.651828 , 0.425725 ) 1.199790.2150
6 ( 0.773977 , 0.339312 ) 1.424580.1533
7 ( 0.731785 , 0.373507 ) 1.339770.1442
Table 11. DM evaluations for the alternatives in linguistic terms.
Table 11. DM evaluations for the alternatives in linguistic terms.
ExpertsAlternativesCriterion
1 2 3 4 5 6 7
1 1 VGGMGGVGVGG
2 MPMGMGVGPG
3 MGIGMPMVGP
4 GIMPVGMGMP
5 PMPGVGMVGMP
2 1 VGVGGMGVGGMG
2 MGMPVGMPG
3 MPIVGMPMPVG
4 MMPVPGMVGG
5 GMMPPMPPVG
3 1 VGGVGGGMGG
2 MPMVGPMPMPMG
3 GVGMPPVGVGMG
4 MIGMPVPGVG
5 MMPPVPVGIG
4 1 VGVGGMGVGGMG
2 MGMPVGMPG
3 MPIVGMPMPVG
4 MMPVPGMVGG
5 GMMPPMPPVG
Table 12. DM evaluations for the alternative terms of the corresponding FFNs.
Table 12. DM evaluations for the alternative terms of the corresponding FFNs.
ExpertsAlternativesCriterion
1 2 3 4 5 6 7
1 1 (0.900, 0.200)(0.800, 0.300)(0.650, 0.400)(0.800, 0.300)(0.900, 0.200)(0.900, 0.200)(0.800, 0.300)
2 (0.400, 0.650)(0.550, 0.500)(0.800, 0.300)(0.650, 0.400)(0.900, 0.200)(0.300, 0.800)(0.800, 0.300)
3 (0.650, 0.400)(0.100, 0.975)(0.800, 0.300)(0.400, 0.650)(0.550, 0.500)(0.900, 0.200)(0.300, 0.800)
4 (0.800, 0.300)(0.100, 0.975)(0.400, 0.650)(0.900, 0.200)(0.550, 0.500)(0.800, 0.300)(0.400, 0.650)
5 (0.300, 0.800)(0.400, 0.650)(0.800, 0.300)(0.900, 0.200)(0.550, 0.500)(0.900, 0.200)(0.400, 0.650)
2 1 (0.900, 0.200)(0.900, 0.200)(0.800, 0.300)(0.650, 0.400)(0.900, 0.200)(0.800, 0.300)(0.650, 0.400)
2 (0.550, 0.500)(0.800, 0.300)(0.400, 0.650)(0.900, 0.200)(0.550, 0.500)(0.300, 0.800)(0.800, 0.300)
3 (0.400, 0.650)(0.100, 0.975)(0.900, 0.200)(0.400, 0.650)(0.550, 0.500)(0.300, 0.800)(0.900, 0.200)
4 (0.550, 0.500)(0.400, 0.650)(0.200, 0.900)(0.800, 0.300)(0.550, 0.500)(0.900, 0.200)(0.800, 0.300)
5 (0.800, 0.300)(0.550, 0.500)(0.400, 0.650)(0.300, 0.800)(0.400, 0.650)(0.300, 0.800)(0.900, 0.200)
3 1 (0.900, 0.200)(0.800, 0.300)(0.900, 0.200)(0.800, 0.300)(0.800, 0.300)(0.650, 0.400)(0.800, 0.300)
2 (0.400, 0.650)(0.550, 0.500)(0.900, 0.200)(0.300, 0.800)(0.400, 0.650)(0.400, 0.650)(0.650, 0.400)
3 (0.800, 0.300)(0.900, 0.200)(0.400, 0.650)(0.300, 0.800)(0.900, 0.200)(0.900, 0.200)(0.650, 0.400)
4 (0.550, 0.500)(0.100, 0.975)(0.800, 0.300)(0.400, 0.650)(0.200, 0.900)(0.800, 0.300)(0.900, 0.200)
5 (0.550, 0.500)(0.400, 0.650)(0.300, 0.800)(0.200, 0.900)(0.900, 0.200)(0.100, 0.975)(0.800, 0.300)
4 1 (0.900, 0.200)(0.900, 0.200)(0.800, 0.300)(0.650, 0.400)(0.900, 0.200)(0.800, 0.300)(0.650, 0.400)
2 (0.550, 0.500)(0.800, 0.300)(0.400, 0.650)(0.900, 0.200)(0.550, 0.500)(0.300, 0.800)(0.800, 0.300)
3 (0.400, 0.650)(0.100, 0.975)(0.900, 0.200)(0.400, 0.650)(0.550, 0.500)(0.300, 0.800)(0.900, 0.200)
4 (0.550, 0.500)(0.400, 0.650)(0.200, 0.900)(0.800, 0.300)(0.550, 0.500)(0.900, 0.200)(0.800, 0.300)
5 (0.800, 0.300)(0.550, 0.500)(0.400, 0.650)(0.300, 0.800)(0.400, 0.650)(0.300, 0.800)(0.900, 0.200)
Table 13. FF aggregated assessments of the alternatives.
Table 13. FF aggregated assessments of the alternatives.
CriterionAlternatives
1 2 3 4 5
1 (0.900, 0.200)(0.473, 0.584)(0.533, 0.557)(0.593, 0.473)(0.592, 0.562)
2 (0.851, 0.258)(0.669, 0.421)(0.182, 0.948)(0.207, 0.911)(0.473, 0.584)
3 (0.792, 0.309)(0.574, 0.545)(0.704, 0.459)(0.336, 0.809)(0.425, 0.676)
4 (0.717, 0.360)(0.624, 0.577)(0.369, 0.693)(0.677, 0.462)(0.335, 0.804)
5 (0.872, 0.236)(0.557, 0.528)(0.629, 0.455)(0.417, 0.714)(0.532, 0.563)
6 (0.774, 0.322)(0.325, 0.769)(0.506, 0.681)(0.851, 0.258)(0.277, 0.872)
7 (0.717, 0.359)(0.755, 0.333)(0.659, 0.536)(0.718, 0.428)(0.740, 0.419)
Table 14. Normalised assessment matrix.
Table 14. Normalised assessment matrix.
CriterionAlternatives
1 2 3 4 5
1 (0.900, 0.200)(0.473, 0.584)(0.533, 0.557)(0.593, 0.473)(0.592, 0.562)
2 (0.851, 0.258)(0.669, 0.421)(0.182, 0.948)(0.207, 0.911)(0.473, 0.584)
3 (0.792, 0.309)(0.574, 0.545)(0.704, 0.459)(0.336, 0.809)(0.425, 0.676)
4 (0.360, 0.717)(0.577, 0.624)(0.693, 0.369)(0.462, 0.677)(0.804, 0.335)
5 (0.872, 0.236)(0.557, 0.528)(0.629, 0.455)(0.417, 0.714)(0.532, 0.563)
6 (0.322, 0.774)(0.769, 0.325)(0.681, 0.506)(0.258, 0.851)(0.872, 0.277)
7 (0.717, 0.359)(0.755, 0.333)(0.659, 0.536)(0.718, 0.428)(0.740, 0.419)
Table 15. Weighted Euclidean distances and weighted Hamming distances.
Table 15. Weighted Euclidean distances and weighted Hamming distances.
Distance MeasureAlternatives
1 2 3 4 5
Weighted Euclidean0.3726460.2661230.2115590.04209820.278918
Weighted Hamming0.5995260.4780710.3645250.10121200.493522
Table 16. Relative assessment matrix.
Table 16. Relative assessment matrix.
Alternatives 1 2 3 4 5
1 00.1065230.1610870.3305480.093728
2 0.10652300.0545640.224025−0.012795
3 −0.161087−0.05456400.169461−0.067359
4 −0.330548−0.224025−0.1694610−0.236820
5 −0.0937280.0127950.067359−0.2368200
Table 17. Assessment scores and final ranking.
Table 17. Assessment scores and final ranking.
AlternativesAssessment ScoreRank
1 0.6918861
2 0.3723172
3 −0.1135494
4 −0.9608545
5 0.2503943
Table 18. Comparison analysis.
Table 18. Comparison analysis.
MethodsAuthorsTop Ranking
TOPSIS methodAydemir and Gunduz [51] 1
VIKOR methodGül [52] 1
CODAS methodSimic et. al. [53] 1
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Farid, H.M.A.; Bouye, M.; Riaz, M.; Jamil, N. Fermatean Fuzzy CODAS Approach with Topology and Its Application to Sustainable Supplier Selection. Symmetry 2023, 15, 433. https://doi.org/10.3390/sym15020433

AMA Style

Farid HMA, Bouye M, Riaz M, Jamil N. Fermatean Fuzzy CODAS Approach with Topology and Its Application to Sustainable Supplier Selection. Symmetry. 2023; 15(2):433. https://doi.org/10.3390/sym15020433

Chicago/Turabian Style

Farid, Hafiz Muhammad Athar, Mohamed Bouye, Muhammad Riaz, and Nimra Jamil. 2023. "Fermatean Fuzzy CODAS Approach with Topology and Its Application to Sustainable Supplier Selection" Symmetry 15, no. 2: 433. https://doi.org/10.3390/sym15020433

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop