Introduction

Clustering, data mining, image capture, picture segmentation, and networking are just a few of the many uses of graph theory in computer science. For example, a data structure, perhaps constructed in the shape of a tree, and the corresponding network topologies can be modeled by adopting graph ideas. The uttermost graph coloring idea is used in system’s resource allotment and scheduling. The graph theory ideas of walks, paths, and circuits are employed in the database design principles, traveling salesman problem, and resource networking. This results in the creation of novel methods and theorems that may be utilized in a wide range of applications. In recent times, we have aided in the development of multi-hop wireless networks. With diverse capacities, features, and intended applications such as environmental chores or terrain surveillance. These types of networks are self-organized and are made up the vast majority of spatially distributed autonomous nodes with limited assets (computing ability, transmission potentiality, cache, ...) that broadcast perceptional information to the base station (BS) or sink. The major restrictions faced in these types of networks are frequently connected to the energy problem. Despite this, numerous methods and protocols have been created to bypass these constraints. The majority of them seek to make the best use of the scanty energy available at one and all node, each of two for collecting tasks or for data aggregation and path finding.

The fuzzy set (FS), presented by Zadeh [51] in 1965, is a concept that has an impact on graph theory. Graph theory in fuzzy environment is gaining more utilization in designing real-time situations where the quantity of data intrinsic in the structure fluctuates with varying measures of accuracy. Fuzzy models are gaining popularity as they attempt to reduce the disparities among classical digital prototypes used in engineering, technology, and research and symbolic prototypes used in expert systems [23, 26, 30, 33, 44, 47, 53, 54].

Zadeh’s fuzzy relations [52] served as the foundation for Kaufmann’s original concept of a fuzzy graph [25]. Rosenfeld [42] established the fuzzy analogues of numerous fundamental graph-theoretical notions, including as cut vertices, bridges, cycles, and trees. Bhattacharya [11] discussed fuzzy graphs (FG), fuzzy trees where defined by Sunitha and Vijayakumar [45]. Bhutani and Rosenfeld [12] established the ideas of strong edges, fuzzy end vertices, and geodesics in fuzzy graphs (FG) describes the many forms of edges in a FG. Atanassov [10] defined intuitionistic fuzzy graphs (IFG) along with intuitionistic fuzzy relations. In this paper, Parvathi et al. [34, 36] investigated IFGs and intuitionistic fuzzy shortest hyperpaths in a network. Arcs in IFGs have been described by Karunambigai et al. [24]. Many topics have been explored by Akram et al. [1, 2, 4], including strong IFGs, intuitionistic fuzzy hypergraphs, and metric features of IFG. Later, in 2013 and 2014, Yager et al. [49, 50] defined the notion of Pythagorean fuzzy sets (PyFS) as a useful technique for dealing with/modeling uncertainty or ambiguous information in real-world settings. Verma et al. [48] in 2018 defined the concept of Pythagorean fuzzy graph which got several researchers to work in this field [3, 5, 6].

A graph is used to represent the key MST issues. Thus, the vertices of the network represent the objects (points) where the users who require the facility are located, and the arcs indicate the presence of a specific relationship between the vertices (for instance, roads joining cities). In general, classical graphs depict consistent circumstances in which the objects of demand (points) and the relations (links) connecting them are precisely known. The traditional graph model does not adequately depict issues if there is ambiguity in the characterization of the items or in the associations between the items, or in both. To set out those uncertain issues, the fuzzy graph [17, 43] is more exact, adaptable, and compatible. Fuzzy graphs are used in a variety of applications, including the shortest path issue, traffic light control, computer networks, pattern recognition, graph coloring, decision making, automata, and expert systems. Many researchers have investigated a variety of topics in order to build an efficient method for the basic MST issue. MSTs are also used in more sophisticated applications such as data storage, statistical cluster analysis, voice recognition, and image processing Because of the tremendous expansion of telecommunication networks over the last few decades, network applications of MSTs have secured a substantial deal of recognition. The MST issue, for example, can mimic the transmitting issue, in which the identical message must be delivered to all nodes in the network (one to all). In distributed situations, the MST is also the minimal routing tree for message aggregation (all to one). Furthermore, in some multi-cast routing protocols [14, 41], the MST is an efficient and dependable method of multi-casting data from a start node to a set of destination nodes. In most situations, the arc costs are believed to be fixed, however this assumption may be incorrect in real-world applications and the arc weights vary with time indeed For example, network connectivity may be impacted by interferences, congestions, collisions, or other causes. As a result, the bandwidths of these links, represented by arc lengths in the communication network graph, are non deterministic, i.e., unpredictable. Although the costs of the arcs in an MST issue are assumed to be real values in traditional graph theory, in practice they are not, however, parameters that are not inherently precise (i.e., demands, capacities, costs, time). Almost every application of the MST problem has uncertainty. In general, uncertainty is inextricably linked to the measurement of arc weights that are not precisely known. To deal with the uncertainty of the arc weights, several studies [7, 31] employed random variables. The stochastic minimal spanning tree problem is the name given to this sort of MST problem. The main issue with such stochastic minimal spanning tree methods is that they are only useful if the probability distribution function of the arc weight is known. While this may not be the case in practical implementations of the MST problem. In these circumstances, using fuzzy variables to describe the MST issue is perfectly acceptable, and the fuzzy minimal spanning tree (FMST) problem emerges naturally.

The FMST has been the subject of several publications [15, 55]. Chang and Lee [13] then proposed three techniques for ranking fuzzy arc weights of spanning trees hinge on the global survival ranking indicator. Almeida et al. [15] defined the fuzzy parametrized MST and developed an rigorous method to solve it. Researchers also presented an evolutionary method for determining the MST issue with fuzzy parameters that is based on probability theory and fuzzy set theory. Liu [27, 28] presented the credibility theory as a fuzzy ranking technique, which included credibility measure, pessimistic value, and anticipated value. Gao and Lu [21] investigated the fuzzy quadratic MST issue using credibility theory and structured it as an anticipated value model, dependent-chance programming, and chance-constrained programming based on distinct decision criteria.

Ranking of fuzzy numbers (FN) is a key component in the MST issue in a fuzzy environment. Because FNs reflect unknown numeric values, there is inherent ambiguity in comparing FNs, i.e., it is extremely difficult to determine if a FN is larger or smaller than others. Numerous scholars [8, 37] have investigated the ranking of FNs. For ranking the FNs, we employ canonical representation of operations on triangular fuzzy numbers (TFNs) based on the graded mean integration representation technique. Each FN, as well as the result of addition and multiplication of two FNs, may be expressed as a crisp (real) number using this approach. This approach is used in a variety of applications, including portfolio selection, airline service quality evaluation, product adoption, fuzzy shortest path issue, and efficient network selection in heterogeneous wireless networks.

Linear Diophantine fuzzy sets are introduced by Riaz and Hashmi et al. in [38, 40] which are the generalization of FSs [51] and IFSs [9]. The linear Diophantine fuzzy sets has umpteen number of applications in automata theory, computer science, engineering, graph theory, life sciences, management sciences, medical field and robotics. Recently in 2021, Riaz et al. [39] extended their study in linear Diophantine fuzzy graph (LDFG) theory. Linear Diophantine fuzzy graphs has got several applications in information technology such as clustering, network analysis, and image segmentation problems. In this paper we introduced the concepts of LDF-bridges, LDF-cycles, LDF-trees, and LDF-MST section on the basis of cost of arc relativity.

Motivation and Objective: The order, size, and degree of FG were discussed, which has got a boom in the recent times. The order, size and degree of IFG was discussed by Gani [20]. Cycles and co-cycles was introduced and investigated by Mordeson and Nair [32]. Sunitha and Vijaykumar [46, 47] also introduced the definition of complement of a FG, and also investigated the properties of fuzzy tree, fuzzy bridges, and fuzzy cut vertex and procured several applications in metric spaces.

One of the uttermost significant and acclaimed combinatorial inflation issues in classical graph theory is the minimal spanning problem (MST). It may be found in a wide range of applications, including cluster analysis, communications, image processing, logistics, transportation, telecommunication, and wireless networks. This motivated us to propose the current research work. Many of the approaches cited above got a universal limitation from the motion controller viewpoint: the parametrization helps us to overcome these limitations. Hence we introduced and studied the characteristics of LDF-Tree. Furthermore, we studied LDF-MST via linear Diophantine fuzzy Prim’s algorithm has been studied with an application in mobile robot charging system in this work.

The proposed technique enables vertices (nodes) to harvest a certain amount of energy based on their location in the LDF-MST and the number of packets they send or receive into the network. This energy may then be delivered to the nodes by a robot that passes through all of the nodes and transmits this additional energy utilizing wireless charging technology.

The main objectives of this manuscript are as follows:

  1. (1)

    Along with its stunning characteristic of a widespread portrayal space for admissible pairs, Linear Diophantine fuzzy set (LDFS) theory outperforms intuitionistic fuzzy set (IFS), Pythagorean fuzzy set (PyFS), and q-rung orthopair fuzzy set (q-ROFS) theories in a vast area of ambiguous and imprecise information via reference parameters.

  2. (2)

    The satisfaction and dissatisfaction grades in decision analysis are insufficient for analyzing things in the universe. The provision of reference parameters gives decision-makers more leeway in picking satisfaction and dissatisfaction grades. The LDFS, together with the accompanying reference parameters, provides a reliable method for modeling uncertainty.

  3. (3)

    The minimal spanning tree (MST) issue for linear Diophantine fuzzy graphs is codified.

  4. (4)

    The weights associated with arcs are represented by linear Diophantine fuzzy numbers (LDFNs).

  5. (5)

    The primary goal of the presented work is to provide a solution approach for directed systematic methodology using linear Diophantine fuzzy (LDF) optimization problem restrictions.

  6. (6)

    The values of separate paths are then determined using an enhanced scoring function (SF) with LDFNs representing the arc lengths.

  7. (7)

    We present special forms of linear Diophantine fuzzy bridges, cut-vertices, cycles, trees, forests, and introduce some of their characteristics. Also, one of the most researched issues in linear Diophantine fuzzy sets (LDFS) and systems is the minimum spanning tree (MST) problem, where the arc costs have linear Diophantine fuzzy (LDF) values.

  8. (8)

    Relying on these improved score functions and 11 optimal control constraints, the classic Prim’s algorithm is further updated to estimate the arc weights of linear Diophantine fuzzy minimum spanning tree (LDF-MST) and the distance of the LDF-MST.

  9. (9)

    A comparison with current methodologies is performed to demonstrate the value of the proposed technique. Furthermore, a small-scale wireless charging network, by considering a mobile charger vehicle that travels across the sensor network on a regular basis, charging the batteries of each sensor node is given to demonstrate the potential application of the suggested approach.

Wireless Charging System (WCS):

A technique that allows electrical energy to be distributed without the usage of is called hardware Wireless charging. This method is meant to be utilized for supplying difficult-to-reach areas. It is based on an electromagnetic field that is used to transfer energy from a transmitter to a receiver. The procedure entails transferring energy to an electrical device through inductive coupling. This energy may subsequently be used to recharge the batteries or even to power the device. This energy may then be used by the gadget to recharge the batteries or even to power the device. WCSs are rapidly being investigated by researchers, and consumer uses, such as charging mobile phones, have emerged in recent years. There are several methods for wireless power transmission, including magnetic inductive coupling, radiative transfer, and strong magnetic coupling.

In this study, we propose a mobile robot charger that travels regularly inside the sensor network region and wirelessly charges each sensor node’s battery.

The rest of this paper is organized as follows: Sect. 2 contains some Preliminary Notes of FSs, IFSs, LDFSs, LDF operations, LDFGs and Wireless Charging System. Section 3 introduces the concept of LDF-tree, LDF-cycle, LDF-bridges, LDF-cut-vertices, and LDF-forests and a few significant operations with some fundamental properties. Section 4 is dedicated to the construction of an algorithm for LDF-MST. Section 5 we propose the concept of LDF-MST to pick an appropriate optimal solution for mobile robot charger system, with the aid of proposed linear Diophantine fuzzy Prim’s algorithm. Finally, Sect. 6 summarizes the result of the study and future research scope directions.

Preliminary notes

This section presents a brief review from [29, 38, 39, 49, 50] of intuitionistic fuzzy sets, Pythagorean fuzzy sets, linear Diophantine fuzzy sets, and linear Diophantine fuzzy graphs which will be used in sequel.

Definition 1

[29] A IFS \({\mathfrak {I}}\) on the universe \({\mathfrak {Q}}\) is defined by:

$$\begin{aligned} {\mathfrak {I}}=\{\zeta , {\mathfrak {m}}(\zeta ),{\mathfrak {n}}(\zeta )|\zeta \in {\mathfrak {Q}}\} \end{aligned}$$

where \({\mathfrak {m}}, {\mathfrak {n}} : {\mathfrak {Q}} \rightarrow [0, 1]\) are the membership grade (MG) and non-membership grade (NMG) respectively. The condition for a IFS is that \({\mathfrak {m}}+ {\mathfrak {n}}\le 1\). A doublet set \( ({\mathfrak {m}}, {\mathfrak {n}} )\) is said to be an intuitionistic fuzzy number (IFN).

Definition 2

[49, 50] A PyFS \({\mathfrak {P}}\) on the universe \({\mathfrak {U}}\) is defined by:

$$\begin{aligned} {\mathfrak {P}}=\{\zeta , {\mathfrak {m}}(\zeta ),{\mathfrak {n}}(\zeta )|\zeta \in {\mathfrak {P}}\} \end{aligned}$$

where \({\mathfrak {m}}, {\mathfrak {n}} : {\mathfrak {P}} \rightarrow [0, 1]\) are the MG and NMG respectively. The constraint for a PyFS is that \({\mathfrak {m}}^2+ {\mathfrak {n}}^2\le [0, 1]\). A doublet set \( ({\mathfrak {m}}, {\mathfrak {n}} )\) is said to e a Pythagorean fuzzy number (PyFN).

Definition 3

[38] A LDFS \({\mathfrak {L}}\) is an object on the non-empty reference set \({\mathfrak {Q}}\) of the form:

$$\begin{aligned} \mathfrak {L_D}=\{(\zeta ,\langle \mathfrak {m_D}(\zeta ),\mathfrak {n_D}(\zeta )\rangle ,\langle \alpha _{\mathfrak {D}}(\zeta ),\beta _{\mathfrak {D}}(\zeta ) \rangle ):\zeta \in {\mathfrak {Q}}\} \end{aligned}$$

where,\(\mathfrak {m_D}(\zeta )\in [0,1]\) is the satisfaction grade, \(\mathfrak {n_D}(\zeta )\in [0,1]\) is the dis-satisfaction grade, \(\alpha _{\mathfrak {D}}(\zeta )\in [0,1]\) is the satisfaction grade reference parameter, and \(\beta _{\mathfrak {D}}(\zeta )\in [0,1]\) is the dis-satisfaction grade reference parameter. The grades satisfy the constraint \(0 \le \alpha _{\mathfrak {D}}(\zeta )\mathfrak {m_D}(\zeta )+\beta _{\mathfrak {D}}(\zeta )\mathfrak {n_D}(\zeta )\le 1\) for all \(\zeta \in {\mathfrak {Q}}\) and with \(0\le \alpha _{\mathfrak {D}}(\zeta )+\beta _{\mathfrak {D}}(\zeta )\le 1\).

In describing or classifying a specific system, these comparison parameters will help. By moving the physical perception of these parameters, we can categorize the system. They expand the space used in LDFS for grades and lift limitations on them. The refusal grade is defined as \( \gamma _{\mathfrak {D}}(\zeta ) \pi _{\mathfrak {D}}(\zeta ) = 1 - (\alpha _{\mathfrak {D}}(\zeta )\mathfrak {m_D}(\zeta ) + \beta _{\mathfrak {D}}(\zeta )\mathfrak {n_D}(\zeta ))\), where \(\gamma _{\mathfrak {D}}(\zeta )\) is the refusal reference parameter. linear Diophantine fuzzy number (LDFN) is defined as \(\mathfrak {T_D}=(\langle \mathfrak {m_D},\mathfrak {n_D}\rangle ,\langle \alpha _{\mathfrak {D}},\beta _{\mathfrak {D}}\rangle ) \) with \( 0\le \alpha _{\mathfrak {D}}+\beta _{\mathfrak {D}}\le 1\) and \(0\le \alpha _{\mathfrak {D}}\mathfrak {m_D}+\beta _{\mathfrak {D}}\mathfrak {n_D}\le 1\).

Definition 4

[38] A LDFS on \({\mathfrak {Q}}\) is said to be

  1. (i)

    absolute LDFS, if it is of the form \(\mathfrak {L_D^1}=\{\zeta ,(\langle 1,0\rangle , \langle 1,0\rangle ):\zeta \in {\mathfrak {Q}}\}\).

  2. (ii)

    null or empty LDFS, if it is of the form \(\mathfrak {L_D^1}=\{\zeta ,(\langle 0,1\rangle ,\langle 0,1\rangle ):\zeta \in {\mathfrak {Q}}\}\).

Definition 5

[38] Let \(\mathfrak {T_D}=(\langle \mathfrak {m_D},\mathfrak {n_D}\rangle ,\langle \alpha \mathfrak {_D},\beta \mathfrak {_D}\rangle ) \) be a LDFN, then

  1. (i)

    The score function (SF) on \({\mathfrak {D}}\) can be defined by

    $$\begin{aligned} \mathfrak {S{(T_D)}}=\frac{1}{2}[(\mathfrak {m_D}-\mathfrak {n_D})+(\alpha \mathfrak {_D}-\beta \mathfrak {_D})], \end{aligned}$$

    where \(\mathfrak {S{(T_D)}}\in [-1,1]\).

  2. (ii)

    The accuracy function (AF) on \({\mathfrak {D}}\) can be defined by

    $$\begin{aligned} \mathfrak {A{(T_D)}}=\frac{1}{2}[\frac{(\mathfrak {m_D}+\mathfrak {n_D})}{2}+(\alpha \mathfrak {_D}+\beta \mathfrak {_D})], \end{aligned}$$

    where \(\mathfrak {A{(T_D)}}\in [0,1]\).

where \(\mathfrak {T_D(Q)}\) is the assembling of all LDFNs on \({\mathfrak {Q}}\)

Definition 6

[38] Let \(\mathfrak {T_{D_i}}=(\langle \mathfrak {m_{D_i}},\mathfrak {n_{D_i}}\rangle ,\langle \alpha _{D_i},\beta _{D_i}\rangle )\) for \({\mathfrak {i}}\in \Delta \) be an assembling of LDFNs on \({\mathfrak {Q}}\) and \({\mathfrak {X}}>0\) then

  1. (i)

    \(\mathfrak {T_{D_1}^c}=(\langle \mathfrak {n_{D_1}},\mathfrak {m_{D_1}}\rangle ,\langle \beta _{D_1},\alpha _{D_1}\rangle )\)

  2. (ii)

    \(\mathfrak {T_{D_1}}=\mathfrak {T_{D_2}}\Leftrightarrow \mathfrak {m_{D_1}}=\mathfrak {m_{D_2}},\mathfrak {n_{D_1}}=\mathfrak {n_{D_2}}, \alpha _{D_1}=\alpha _{D_2},\beta _{D_1}=\beta _{D_2}\)

  3. (iii)

    \(\mathfrak {T_{D_1}}\subseteq \mathfrak {T_{D_2}} \text{ if } \mathfrak {m_{D_1}}\le \mathfrak {m_{D_2}},\mathfrak {n_{D_1}}\ge \mathfrak {n_{D_2}}, \alpha _{D_1}\le \alpha _{D_2},\beta _{D_1}\ge \beta _{D_2}\)

  4. (iv)

    \(\mathfrak {T_{D_1}}\oplus \mathfrak {T_{D_2}}=(\langle \mathfrak {m_{D_1}}+\mathfrak {m_{D_2}}-\mathfrak {m_{D_1}}\mathfrak {m_{D_2}},\mathfrak {n_{D_1}}\mathfrak {n_{D_2}}\rangle , \langle \alpha _{D_1}+\alpha _{D_2}-\alpha _{D_1}\alpha _{D_2},\beta _{D_1}\beta _{D_2} \rangle ) \)

  5. (v)

    \(\mathfrak {T_{D_1}}\otimes \mathfrak {T_{D_2}}=(\langle \mathfrak {m_{D_1}}\mathfrak {m_{D_2}},\mathfrak {n_{D_1}}+\mathfrak {n_{D_2}}-\mathfrak {n_{D_1}}\mathfrak {n_{D_2}}\rangle , \langle \alpha _{D_1}\alpha _{D_2},\beta _{D_1}+\beta _{D_2}-\beta _{D_1}\beta _{D_2} \rangle ) \)

  6. (vi)

    \(\mathfrak {XT_{D_1}}=(\langle (1-(1-\mathfrak {m_{D_1}})^\mathfrak {X}),\mathfrak {n_{D_1}^X}\rangle , \langle (1-(1-{{\alpha }_\mathfrak {{D_1}}})^\mathfrak {X}),{\beta _\mathfrak {{D_1}}^\mathfrak {X}}\rangle ) \)

  7. (vii)

    \(\mathfrak {T_{D_1}^X}=(\langle \mathfrak {m_{D_1}^X},(1-(1-\mathfrak {n_{D_1}})^\mathfrak {X})\rangle , \langle {\alpha _\mathfrak {{D_1}}^\mathfrak {X}},(1-(1-{\beta _\mathfrak {{D_1}}})^\mathfrak {X})\rangle ) \)

  8. (viii)

    \(\mathfrak {T_{D_1}}\cup \mathfrak {T_{D_2}}=(\langle \mathfrak {m_{D_1}}\vee \mathfrak {m_{D_2}},\mathfrak {n_{D_1}}\wedge \mathfrak {n_{D_2}}\rangle ,\langle \alpha _{D_1}\vee \alpha _{D_2},\beta _{D_1}\wedge \beta _{D_2} \rangle ) \)

  9. (ix)

    \(\mathfrak {T_{D_1}}\cap \mathfrak {T_{D_2}}=(\langle \mathfrak {m_{D_1}}\wedge \mathfrak {m_{D_2}},\mathfrak {n_{D_1}}\vee \mathfrak {n_{D_2}}\rangle ,\langle \alpha _{D_1}\wedge \alpha _{D_2},\beta _{D_1}\vee \beta _{D_2} \rangle ) \)

Definition 7

[38] Let two LDFNs be \(\mathfrak {T_{D_1}}\) and \(\mathfrak {T_{D_2}}\) then by finding the values of SF and AF we can effortlessly compare these two LDFNs as:

  1. (i)

    \(\mathfrak {T_{D_1}}>\mathfrak {T_{D_2}}\) if \(\mathfrak {S(T_{D_1})}>\mathfrak {S(T_{D_2})}\)

  2. (ii)

    \(\mathfrak {T_{{D_1}}}<\mathfrak {T_{D_2}}\) if \(\mathfrak {S(T_{D_1})}<\mathfrak {S(T_{D_2})}\)

  3. (iii)

    If \(\mathfrak {S(T_{D_1})}=\mathfrak {S(T_{D_2})}\), then

    1. (a)

      \(\mathfrak {T_{D_1}}>\mathfrak {T_{D_2}}\) if \(\mathfrak {A(T_{D_1})}>\mathfrak {A(T_{D_2})}\)

    2. (b)

      \(\mathfrak {T_{D_1}}<\mathfrak {T_{D_2}}\) if \(\mathfrak {A(T_{D_1})}<\mathfrak {A(T_{D_2})}\)

    3. (c)

      \(\mathfrak {T_{D_1}}=\mathfrak {T_{D_2}}\) if \(\mathfrak {A(T_{D_1})}=\mathfrak {A(T_{D_2})}\)

Definition 8

[39] A pair \({\mathfrak {G}} = ({\mathfrak {M}},{\mathfrak {N}})\) is called a linear Diophantine fuzzy graph (LDFG) on an underlying set \({\mathfrak {V}}\), where \({\mathfrak {M}}\) is a linear Diophantine fuzzy set in \({\mathfrak {V}}\) and \({\mathfrak {N}}\) is a linear Diophantine fuzzy relation on \({\mathfrak {V}}\times {\mathfrak {V}}\) such that

\(\mathfrak {m_N}({\mathfrak {a}}{\mathfrak {b}})\le min\{\mathfrak {m_M(a)},\mathfrak {m_M(b)}\} , \alpha _{\mathfrak {M}}\mathfrak {(ab)}\le min\{\alpha _{\mathfrak {M}}\mathfrak {(a)},\alpha _{\mathfrak {M}}\mathfrak {(b)}\} \)

\(\mathfrak {n_N}({\mathfrak {a}}{\mathfrak {b}})\le max\{\mathfrak {n_M(a)},\mathfrak {n_M(b)}\} , \beta _{\mathfrak {N}}\mathfrak {(ab)}\le max\{\beta _{\mathfrak {M}}\mathfrak {(a)},\beta _{\mathfrak {M}}\mathfrak {(b)}\} \)

where \({\mathfrak {m}}\) is known as the satisfaction grade, \({\mathfrak {n}}\) is known as the dissatisfaction grade and \(\alpha , \beta \) are the reference parameters fulfills the condition \(0\le \alpha _{\mathfrak {M}}+\beta _{\mathfrak {M}}\le 1\) and \(0\le \alpha _{\mathfrak {N}}\mathfrak {(ab)}\mathfrak {m_N}({\mathfrak {a}}{\mathfrak {b}})+\beta _{\mathfrak {N}}\mathfrak {(ab)}\mathfrak {n_N}({\mathfrak {a}}{\mathfrak {b}})\le 1\) for all \({\mathfrak {a}},{\mathfrak {b}}\in {\mathfrak {V}}\), where \({\mathfrak {M}}\) is a LDF node (vertex) set and \({\mathfrak {N}}\) is a LDF arc(edge) set of \({\mathfrak {G}}\).

Linear Diophantine fuzzy bridges and linear Diophantine fuzzy cutnodes

In path and network concerns, the principle of connection plays an important role, we present the rudimentary approach of LDF-bridge, LDF-cycle, LDF-cut vertex, and LDF-tree in linear Diophantine fuzzy graph here.

Definition 9

Let \(\mathfrak {T_D}=(\langle \mathfrak {m_D},\mathfrak {n_D}\rangle ,\langle \alpha _{\mathfrak {D}},\beta _{\mathfrak {D}}\rangle ) \) be a LDFS. The support of \(\mathfrak {T_D}\)is denoted and defined by

$$\begin{aligned}&supt(\mathfrak {T_D}) = \left( \langle supt(\mathfrak {m_D})\cup supt(\mathfrak {n_D})\rangle ,\right. \\&\quad \left. \langle supt(\alpha _{\mathfrak {D}})\cup supt(\beta _{\mathfrak {D}})\rangle \right) ; \end{aligned}$$

where

$$\begin{aligned}&\quad supt(\mathfrak {m_D})=\{\zeta : \zeta \in X; \mathfrak {m_D}(\zeta )>0\},\\&\quad supt(\alpha _{\mathfrak {D}})=\{\zeta : \zeta \in X; \alpha _{\mathfrak {D}}(\zeta )>0\}, \\&\quad supt(\mathfrak {n_D})=\{\zeta : \zeta \in X; \mathfrak {n_D}(\zeta )>0, \\&\quad supt(\beta _{\mathfrak {D}})=\{\zeta : \zeta \in X; \beta _{\mathfrak {D}}(\zeta )>0\}. \end{aligned}$$

Definition 10

Let \(\mathfrak {T_D}=(\langle \mathfrak {m_D},\mathfrak {n_D}\rangle ,\langle \alpha _{\mathfrak {D}},\beta _{\mathfrak {D}}\rangle ) \) be a LDFS. The \(\xi =(\xi _1,\xi _2,\xi _3,\xi _4)\)-level subset of \(\mathfrak {T_D}\) denoted and defined by

$$\begin{aligned} \mathfrak {T_D}^{\xi } = \left( \langle \mathfrak {m_D}^{\xi _1}\cup \mathfrak {n_D}^{\xi _2}\rangle ,\langle \alpha _{\mathfrak {D}}^{\xi _3}\cup \beta _{\mathfrak {D}}^{\xi _4}\rangle \right) ; \end{aligned}$$

where

$$\begin{aligned}&\mathfrak {m_D}^{\xi _1}=\{\zeta : \zeta \in X; \mathfrak {m_D}(\zeta )>\xi _1\},\\&\quad \alpha _{\mathfrak {D}}^{\xi _3}=\{\zeta : \zeta \in X; \alpha _{\mathfrak {D}}(\zeta )>\xi _3\}, \\&\mathfrak {n_D}^{\xi _2}=\{\zeta : \zeta \in X; \mathfrak {m_D}(\zeta )<\xi _2\},\\&\quad \beta _{\mathfrak {D}}^{\xi _4}=\{\zeta : \zeta \in X; \beta _{\mathfrak {D}}(\zeta )<\xi _4\}. \end{aligned}$$

Definition 11

Let \(\mathfrak {T_D}=(\langle \mathfrak {m_D},\mathfrak {n_D}\rangle ,\langle \alpha _{\mathfrak {D}},\beta _{\mathfrak {D}}\rangle ) \) be a LDFS. The height of \(\mathfrak {T_D}\) denoted and defined by

$$\begin{aligned} h(\mathfrak {T_D}) = \left( \langle h(\mathfrak {m_D}), h(\mathfrak {n_D})\rangle ,\langle h(\alpha _{\mathfrak {D}}), h(\beta _{\mathfrak {D}})\rangle \right) ; \end{aligned}$$

where

$$\begin{aligned}&h(\mathfrak {m_D})=sup\{ \mathfrak {m_D}(\zeta ): \zeta \in X\},\\&h(\alpha _{\mathfrak {D}})=sup\{\alpha _{\mathfrak {D}}(\zeta ) : \zeta \in X\}, \\&h(\mathfrak {n_D})=inf\{ \mathfrak {n_D}(\zeta ): \zeta \in X\},\\&h(\beta _{\mathfrak {D}})=inf\{\beta _{\mathfrak {D}}(\zeta ) : \zeta \in X\}. \end{aligned}$$

Definition 12

Let \(\mathfrak {T_D}=(\langle \mathfrak {m_D},\mathfrak {n_D}\rangle ,\langle \alpha _{\mathfrak {D}},\beta _{\mathfrak {D}}\rangle ) \) be a LDFS. The depth of \(\mathfrak {T_D}\) denoted and defined by

$$\begin{aligned} d(\mathfrak {T_D}) = \left( \langle d(\mathfrak {m_D}), d(\mathfrak {n_D})\rangle ,\langle d(\alpha _{\mathfrak {D}}), d(\beta _{\mathfrak {D}})\rangle \right) ; \end{aligned}$$

where

$$\begin{aligned}&d(\mathfrak {m_D})=inf\{ \mathfrak {m_D}(\zeta ): \zeta \in X\},\\&d(\alpha _{\mathfrak {D}})=inf\{\alpha _{\mathfrak {D}}(\zeta ) : \zeta \in X\},\\&d(\mathfrak {n_D})=sup\{ \mathfrak {n_D}(\zeta ): \zeta \in X\},\\&d(\beta _{\mathfrak {D}})=sup\{\beta _{\mathfrak {D}}(\zeta ) : \zeta \in X\}. \end{aligned}$$

Definition 13

Let \({\mathfrak {G}} = ({\mathfrak {M}}; {\mathfrak {N}})\) be the LDFG of the crisp graph \({\mathfrak {G}}^*=({\mathfrak {A}}^*; {\mathfrak {B}}^*)\), where \({\mathfrak {M}}^*=supt({\mathfrak {M}})\) and \({\mathfrak {N}}^*=supt({\mathfrak {N}})\). Let \({\mathfrak {G}}^\xi =({\mathfrak {M}}^\xi ; {\mathfrak {N}}^\xi )\), where \(\xi \in [0,1]\),

$$\begin{aligned}&{\mathfrak {M}}^\xi =\{{\mathfrak {a}}:{\mathfrak {a}}\in {\mathfrak {V}},(\langle \mathfrak {m_M}({\mathfrak {a}})\ge \xi _1,\mathfrak {n_M}({\mathfrak {a}})\le \xi _2\rangle ,\\&\langle \alpha _{\mathfrak {M}}({\mathfrak {a}})\ge \xi _3, \beta _{\mathfrak {M}}({\mathfrak {a}})\le \xi _4\rangle )\} \end{aligned}$$

is the \(\xi \)-level subset of \({\mathfrak {M}}\) and

$$\begin{aligned}&{\mathfrak {M}}^\xi =\{\mathfrak {ab}:\mathfrak {ab}\in {\mathfrak {E}},(\langle \mathfrak {m_N}(\mathfrak {ab})\ge \xi _1,\mathfrak {n_N}(\mathfrak {ab})\le \xi _2\rangle ,\\&\quad \langle \alpha _{\mathfrak {N}}(\mathfrak {ab})\ge \xi _3, \beta _{\mathfrak {N}}(\mathfrak {ab})\le \xi _4\rangle )\} \end{aligned}$$

is the \(\xi \)-level subset of \({\mathfrak {N}}\)

Definition 14

A LDFG \({\mathfrak {G}} = ({\mathfrak {M}};{\mathfrak {N}})\) is called a

  1. (i)

    \(({\mathfrak {m}},\alpha )\)-bridge, if we take off the arc \(\mathfrak {ab}\) decreases the connectivity of some two nodes by \(({\mathfrak {m}},\alpha )\)-strength.

  2. (ii)

    \(({\mathfrak {n}},\beta )\)-bridge, if we take off the arc \(\mathfrak {ab}\) increases the connectivity of some two nodes by \(({\mathfrak {n}},\beta )\)-strength.

  3. (iii)

    LDF-bridge if it is has both \(({\mathfrak {m}},\alpha )\)-bridge and \(({\mathfrak {n}},\beta )\)-bridge.

Example 1

Let \({\mathfrak {G}}^* = ({\mathfrak {V}}; {\mathfrak {E}})\) be a crisp graph and \({\mathfrak {G}} = ({\mathfrak {M}}; {\mathfrak {N}})\) be a connected LDFG, where \({\mathfrak {M}}\) and \({\mathfrak {N}}\) respectively are defined in Table 1 and be LDFSs of \({\mathfrak {V}} =\{\mathfrak {v_1}, \mathfrak {v_2}, \mathfrak {v_3}\}\) and \({\mathfrak {E}} =\{\mathfrak {v_1v_2}, \mathfrak {v_2v_3}, \mathfrak {v_3v_1}\}\). We see that the LDFG has no bridges of any of five types.

Table 1 LDFSs of LDFG without LDF-bridges

Example 2

Let \({\mathfrak {G}}^* = ({\mathfrak {V}}; {\mathfrak {E}})\) be a crisp graph and \({\mathfrak {G}} = ({\mathfrak {M}}; {\mathfrak {N}})\) be a connected LDFG, where \({\mathfrak {M}}\) and \({\mathfrak {N}}\) respectively are defined in Table 2 and be LDFSs of \({\mathfrak {V}} =\{\mathfrak {v_1}, \mathfrak {v_2}, \mathfrak {v_3}, \mathfrak {v_4}\}\) and \({\mathfrak {E}} =\{\mathfrak {v_1v_2}, \mathfrak {v_2v_3}, \mathfrak {v_3v_4}, \mathfrak {v_4v_1}\}\). Then, \(d({\mathfrak {N}}) = (\langle 0.2, 0.6\rangle ,\langle 0.2,0.6\rangle )\) and \(h({\mathfrak {N}}) = (\langle 0.9, 0.2\rangle , \langle 0.9,0.2\rangle )\): Thus \(\xi =(\xi _1,\xi _2,\xi _3,\xi _4)\in (0,h({\mathfrak {N}})]\) which means that for \(0<\xi _1<0.2, 0<\xi _2<0.6,0<\xi _3<0.2,0<\xi _4<0.6\), we get \({\mathfrak {G}}^\xi =({\mathfrak {V}},\{\mathfrak {v_1v_2},\mathfrak {v_2v_3}, \mathfrak {v_3v_4}, \mathfrak {v_4v_1}\})\) for \(0.2<\xi _1<0.9, 0<\xi _2<0.2,0.2<\xi _3<0.9,0<\xi _4<0.2\) we get \({\mathfrak {G}}^\xi =({\mathfrak {V}},\{\mathfrak {v_2v_3}, \mathfrak {v_4v_1}\})\) \(\mathfrak {v_2v_3}\) is a full LDF-bridge and \(\mathfrak {v_4v_1}\) is a partial LDF-bridge but not full LDF-bridge.

Table 2 LDFSs of LDFG without full LDF-bridges

Definition 15

Let \({\mathfrak {G}} = ({\mathfrak {M}};{\mathfrak {N}})\) be a LDFG of the crisp graph \({\mathfrak {G}}^*= ({\mathfrak {V}};{\mathfrak {E}})\);

  1. (i)

    the \(({\mathfrak {m}},\alpha )\)-strength of connectedness allying \({\mathfrak {a}}\) and \({\mathfrak {b}}\) in \({\mathfrak {V}}\) is

    $$\begin{aligned}&({\mathfrak {m}},\alpha )_{\mathfrak {N}}^\infty (\mathfrak {ab})=Sup\{ ({\mathfrak {m}}^{\mathfrak {k}}_{\mathfrak {N}}(\mathfrak {ab}),\alpha ^{\mathfrak {k}}_{\mathfrak {N}}(\mathfrak {ab})):\\&{\mathfrak {k}}= 1, 2,\ldots , n\} \end{aligned}$$

    \(({\mathfrak {m}},\alpha )_{\mathfrak {N}}^\infty (\mathfrak {ab})=Sup\{ ({\mathfrak {m}}_{\mathfrak {N}}^{\mathfrak {k}}(\mathfrak {av_1})\wedge {\mathfrak {m}}_{\mathfrak {N}}^{\mathfrak {k}}(\mathfrak {v_1v_2})\wedge ...\wedge {\mathfrak {m}}_{\mathfrak {N}}^{\mathfrak {k}}(\mathfrak {v_{{\mathfrak {k}}-1}b}),\alpha _{\mathfrak {N}}^{\mathfrak {k}}(\mathfrak {av_1})\wedge \alpha _{\mathfrak {N}}^{\mathfrak {k}}(\mathfrak {v_1v_2})\wedge ...\wedge \alpha _{\mathfrak {N}}^{\mathfrak {k}}(\mathfrak {v_{{\mathfrak {k}}-1}b})):{\mathfrak {a}}, \mathfrak {v_1}, \mathfrak {v_2},\ldots ,\mathfrak {v_{k-1}}, {\mathfrak {b}}\in {\mathfrak {V}}, {\mathfrak {k}}= 1, 2,\ldots , n\}\)

  2. (ii)

    the \(({\mathfrak {n}},\beta )\)-strength of connectedness allying \({\mathfrak {a}}\) and \({\mathfrak {b}}\) in \({\mathfrak {V}}\) is

    $$\begin{aligned} ({\mathfrak {n}},\beta )_{\mathfrak {N}}^\infty (\mathfrak {ab})=Sup\{ ({\mathfrak {n}}^{\mathfrak {k}}_{\mathfrak {N}}(\mathfrak {ab}),\beta ^{\mathfrak {k}}_{\mathfrak {N}}(\mathfrak {ab})):{\mathfrak {k}}= 1, 2,\ldots , n\} \end{aligned}$$

    \(({\mathfrak {n}},\beta )_{\mathfrak {N}}^\infty (\mathfrak {ab})=Sup\{ ({\mathfrak {n}}_{\mathfrak {N}}^{\mathfrak {k}}(\mathfrak {av_1})\vee {\mathfrak {n}}_{\mathfrak {N}}^{\mathfrak {k}}(\mathfrak {v_1v_2})\vee ...\vee {\mathfrak {n}}_{\mathfrak {N}}^{\mathfrak {k}}(\mathfrak {v_{{\mathfrak {k}}-1}b}),\beta _{\mathfrak {N}}^{\mathfrak {k}}(\mathfrak {av_1})\vee \beta _{\mathfrak {N}}^{\mathfrak {k}}(\mathfrak {v_1v_2})\vee ...\vee \beta _{\mathfrak {N}}^{\mathfrak {k}}(\mathfrak {v_{{\mathfrak {k}}-1}b})):{\mathfrak {a}}, \mathfrak {v_1}, \mathfrak {v_2},\ldots ,\mathfrak {v_{k-1}}, {\mathfrak {b}}\in {\mathfrak {V}},{\mathfrak {k}}= 1, 2,\ldots , n\}\).

The \(({\mathfrak {n}},\beta )\)-strength, and \(({\mathfrak {n}},\beta )\)-strength allying \({\mathfrak {a}}\) and \({\mathfrak {b}}\) in \({\mathfrak {G}}\) is represented as \(({\mathfrak {m}},\alpha )^\infty _{\mathfrak {G}}(\mathfrak {ab})\) and \(({\mathfrak {n}},\beta )^\infty _{\mathfrak {G}}(\mathfrak {ab})\) respectively. \(({\mathfrak {m}},\alpha )'^\infty _{\mathfrak {G}}(\mathfrak {ab})\) and \(({\mathfrak {n}},\beta )'^\infty _{\mathfrak {G}}(\mathfrak {ab})\) denote \(({\mathfrak {m}},\alpha )^\infty _\mathfrak {G-\{ab\}}(\mathfrak {ab})\) and \(({\mathfrak {n}},\beta )^\infty _\mathfrak {G-\{ab\}}(\mathfrak {ab})\) where \(\mathfrak {G-\{ab\}}\) is obtained from \({\mathfrak {G}}\) by cutting off the edge \(\mathfrak {\{ab\}}\).

Definition 16

On the crisp graph \({\mathfrak {G}}^*= ({\mathfrak {V}};{\mathfrak {E}})\), there exist a LDFG \({\mathfrak {G}} = ({\mathfrak {M}};{\mathfrak {N}})\), such that

  1. (i)

    \(\mathfrak {ab}\in {\mathfrak {E}}\) is said to be a bridge if \(\mathfrak {ab}\) is a bridge of \({\mathfrak {G}}^*= ({\mathfrak {M}}^*;{\mathfrak {N}}^*)\)

  2. (ii)

    \(\mathfrak {ab}\in {\mathfrak {E}}\) is said to be a LDF-bridge if \({\mathfrak {m}}'^\infty _{\mathfrak {G}}(\mathfrak {ab})<{\mathfrak {m}}^\infty _{\mathfrak {G}}(\mathfrak {ab})\), \({\mathfrak {n}}'^\infty _{\mathfrak {G}}(\mathfrak {ab})>{\mathfrak {n}}^\infty _{\mathfrak {G}}(\mathfrak {ab})\), \(\alpha '^\infty _{\mathfrak {G}}(\mathfrak {ab})<\alpha ^\infty _{\mathfrak {G}}(\mathfrak {ab})\), \(\beta '^\infty _{\mathfrak {G}}(\mathfrak {ab})>\beta ^\infty _{\mathfrak {G}}(\mathfrak {ab})\) for some \(\mathfrak {ab}\in {\mathfrak {E}}\); where \({\mathfrak {m}}', {\mathfrak {n}}',\alpha ',\beta '\) are \({\mathfrak {m}}, {\mathfrak {n}},\alpha ,\beta \) confined to \({\mathfrak {V}}\times {\mathfrak {V}}-\{\mathfrak {xy},\mathfrak {yx}\}\)

  3. (iii)

    \(\mathfrak {ab}\in {\mathfrak {E}}\) is said to be a weak LDF-bridge if \(\exists \) \(\xi \in (0,h({\mathfrak {N}})]\) such that \(\mathfrak {ab}\) is a bridge of \({\mathfrak {G}}^\xi \), where \(0=(\langle 0,0\rangle ,\langle 0,0\rangle )\)

  4. (iv)

    \(\mathfrak {ab}\in {\mathfrak {E}}\) is said to be a full LDF-bridge if \(\mathfrak {ab}\) is a bridge for \({\mathfrak {G}}^\xi \), \(\forall \xi \in (0,h({\mathfrak {N}})]\), where \(0=(\langle 0,0\rangle ,\langle 0,0\rangle )\).

  5. (v)

    \(\mathfrak {ab}\in {\mathfrak {E}}\) is said to be a partial LDF-bridge if \(\mathfrak {ab}\) is a bridge for every \(\xi \in (d({\mathfrak {N}}),h({\mathfrak {N}})]\cup \{h({\mathfrak {N}})\}\) such that \(\mathfrak {ab}\) is a bridge of \({\mathfrak {G}}^\xi \), where \(0=(\langle 0,0\rangle ,\langle 0,0\rangle )\)

Remark 1

Let \({\mathfrak {G}}^*= ({\mathfrak {V}};{\mathfrak {E}})\) be a crisp graph and let \(\mathfrak {ab}\) be a bridge in \({\mathfrak {G}}^*\) then

  1. (i)

    \(\mathfrak {ab}\) is a LDF-bridge iff \(\mathfrak {ab}\) is not weakest bridge of any cycle.

  2. (ii)

    \(\mathfrak {ab}\) is a LDF-bridge iff \({\mathfrak {m}}_{\mathfrak {G}}(\mathfrak {ab})>{\mathfrak {m}}'^\infty _{\mathfrak {G}}(\mathfrak {ab})\), \({\mathfrak {n}}_{\mathfrak {G}}(\mathfrak {ab})<{\mathfrak {n}}'^\infty _{\mathfrak {G}}(\mathfrak {ab})\), \(\alpha _{\mathfrak {G}}(\mathfrak {ab})>\alpha '^\infty _{\mathfrak {G}}(\mathfrak {ab})\), \(\beta _{\mathfrak {G}}(\mathfrak {ab})<\beta '^\infty _{\mathfrak {G}}(\mathfrak {ab})\).

Theorem 1

The edge \(\mathfrak {ab}\) is a LDF-bridge iff \(\mathfrak {ab}\) is bridge for \({\mathfrak {G}}^*\) and \({\mathfrak {m}}_{\mathfrak {N}}(\mathfrak {ab})=h({\mathfrak {m}}_{\mathfrak {N}})\), \({\mathfrak {n}}_{\mathfrak {N}}(\mathfrak {ab})=h({\mathfrak {n}}_{\mathfrak {N}})\), \(\alpha _{\mathfrak {N}}(\mathfrak {ab})=h(\alpha _{\mathfrak {N}})\), \(\beta _{\mathfrak {N}}(\mathfrak {ab})=h(\beta _{\mathfrak {N}})\).

Proof

Presume that \(\mathfrak {ab}\) is a full bridge then \(\mathfrak {ab}\) is a bridge of \({\mathfrak {G}}^\xi \), \(\forall \) \(\xi \in (0, h({\mathfrak {N}})]=(0, h(\mathfrak {m_N})]\times (0, h(\mathfrak {n_N})]\times (0, h(\alpha \mathfrak {_N})]\times (0, h(\beta _{\mathfrak {N}})]\). This implies \(\mathfrak {ab}\in {\mathfrak {N}}^{h({\mathfrak {N}})}\) and so \({\mathfrak {m}}_{\mathfrak {N}}(\mathfrak {ab})=h({\mathfrak {m}}_{\mathfrak {N}})\), \({\mathfrak {n}}_{\mathfrak {N}}(\mathfrak {ab})=h({\mathfrak {n}}_{\mathfrak {N}})\), \(\alpha _{\mathfrak {N}}(\mathfrak {ab})=h(\alpha _{\mathfrak {N}})\), \(\beta _{\mathfrak {N}}(\mathfrak {ab})=h(\beta _{\mathfrak {N}})\). since \(\mathfrak {ab}\) is bridge for \({\mathfrak {G}}^\xi \) for all \(\xi \in (0, h({\mathfrak {N}})]\). It will be subsequent to \(\mathfrak {ab}\) is bridge for \({\mathfrak {G}}^*\). In view of \({\mathfrak {V}} = {\mathfrak {M}}^{d({\mathfrak {N}})}\) and \({\mathfrak {E}} = {\mathfrak {N}}^{d({\mathfrak {N}})}\).

Contrarily: hypothesize \(\mathfrak {ab}\) is bridge for \({\mathfrak {G}}^*\) and \({\mathfrak {m}}_{\mathfrak {N}}(\mathfrak {ab})=h({\mathfrak {m}}_{\mathfrak {N}})\), \({\mathfrak {n}}_{\mathfrak {N}}(\mathfrak {ab})=h({\mathfrak {n}}_{\mathfrak {N}})\), \(\alpha _{\mathfrak {N}}(\mathfrak {ab})=h(\alpha _{\mathfrak {N}})\), \(\beta _{\mathfrak {N}}(\mathfrak {ab})=h(\beta _{\mathfrak {N}})\). Then \(\mathfrak {ab}\in {\mathfrak {N}}^\xi \) for all \(\xi \in (0, h({\mathfrak {N}})]\), thus since \(\mathfrak {ab}\) is bridge for \({\mathfrak {G}}^*\) is bridge for \({\mathfrak {G}}^*\) for all \(\xi \in (0, h({\mathfrak {N}})]\), since each \({\mathfrak {G}}^\xi \) is subgraph of \({\mathfrak {G}}^*\). Hence \(\mathfrak {ab}\) is a full LDF-bridge.

\(\square \)

Theorem 2

If the cycle of crisp graph \({\mathfrak {G}}^*\) does not contains the edge \(\mathfrak {ab}\), then the circumstances listed below are comparable.

  1. (i)

    \({\mathfrak {m}}_{\mathfrak {N}}(\mathfrak {ab})=h({\mathfrak {m}}_{\mathfrak {N}})\), \({\mathfrak {n}}_{\mathfrak {N}}(\mathfrak {ab})=h({\mathfrak {n}}_{\mathfrak {N}})\), \(\alpha _{\mathfrak {N}}(\mathfrak {ab})=h(\alpha _{\mathfrak {N}})\), \(\beta _{\mathfrak {N}}(\mathfrak {ab})=h(\beta _{\mathfrak {N}})\).

  2. (ii)

    \(\mathfrak {ab}\) is a partial LDF-bridge.

  3. (iii)

    \(\mathfrak {ab}\) is a full LDF-bridge.

Proof

For an edge \(\mathfrak {ab}\) is bridge of \({\mathfrak {G}}^*\) and \(\mathfrak {ab}\notin \) a cycle of \({\mathfrak {G}}^*\). Thence by theorem 3.1, (i) \(\Rightarrow \) (iii) and (iii) \(\Rightarrow \) (ii) are evident. consequent, if (ii) holds, then \(\mathfrak {ab}\) is bridge for \({\mathfrak {G}}^\xi \), \(\forall \) \(\xi \in (d({\mathfrak {N}}), h({\mathfrak {N}})]\) and thus \(\mathfrak {ab}\in {\mathfrak {N}}^{h({\mathfrak {N}})}\). Thus \({\mathfrak {m}}_{\mathfrak {N}}(\mathfrak {ab})=h({\mathfrak {m}}_{\mathfrak {N}})\), \({\mathfrak {n}}_{\mathfrak {N}}(\mathfrak {ab})=h({\mathfrak {n}}_{\mathfrak {N}})\), \(\alpha _{\mathfrak {N}}(\mathfrak {ab})=h(\alpha _{\mathfrak {N}})\), \(\beta _{\mathfrak {N}}(\mathfrak {ab})=h(\beta _{\mathfrak {N}})\), thus (i) holds. \(\square \)

Theorem 3

In a graph \({\mathfrak {G}}\) we consider an arc \(\mathfrak {ab}\), \(\mathfrak {ab}\) is a LDF-bridge iff \(\mathfrak {ab}\) is a weak LDF-bridge.

Proof

Presume that \(\mathfrak {ab}\) is a weak LDF-bridge, then \(\exists \) \(\xi \in (0; h({\mathfrak {N}})]\) so that \(\mathfrak {ab}\) is bridge for \({\mathfrak {G}}^\xi \). Thence by cutting off \(\mathfrak {ab}\) it disconnects \({\mathfrak {G}}^\xi \), so either path from \({\mathfrak {a}}\) to \({\mathfrak {b}}\) in \({\mathfrak {G}}\) acquire an arc \(\mathfrak {uv}\) with \({\mathfrak {m}}_{\mathfrak {N}}(\mathfrak {uv})<\xi _1\), \({\mathfrak {n}}_{\mathfrak {N}}(\mathfrak {uv})>\xi _2\), \(\alpha _{\mathfrak {N}}(\mathfrak {uv})<\xi _3\), \(\beta _{\mathfrak {N}}(\mathfrak {uv})>\xi _4\). Hence by the removal of the arc \(\mathfrak {ab}\) implies that \({\mathfrak {m}}'^\infty _{\mathfrak {N}}(\mathfrak {ab})<\xi _1\le {\mathfrak {m}}^\infty _{\mathfrak {N}}(\mathfrak {ab})\), \({\mathfrak {n}}'^\infty _{\mathfrak {N}}(\mathfrak {ab})>\xi _2\ge {\mathfrak {n}}^\infty _{\mathfrak {N}}(\mathfrak {ab})\), \(\alpha '^\infty _{\mathfrak {N}}(\mathfrak {ab})<\xi _3\le \alpha ^\infty _{\mathfrak {N}}(\mathfrak {ab})\), \(\beta '^\infty _{\mathfrak {N}}(\mathfrak {ab})>\xi _4\ge \beta ^\infty _{\mathfrak {N}}(\mathfrak {ab})\). Hence \(\mathfrak {ab}\) is a LDF-bridge.

Contrarily: hypothesize that \(\mathfrak {ab}\) is a LDF-bridge, then \(\exists \) an edge \(\mathfrak {uv}\) so that by cutting off \(\mathfrak {ab}\) \(\Rightarrow \) \({\mathfrak {m}}'^\infty _{\mathfrak {N}}(\mathfrak {ab})<{\mathfrak {m}}^\infty _{\mathfrak {N}}(\mathfrak {ab})\), \({\mathfrak {n}}'^\infty _{\mathfrak {N}}(\mathfrak {ab})>{\mathfrak {n}}^\infty _{\mathfrak {N}}(\mathfrak {ab})\), \(\alpha '^\infty _{\mathfrak {N}}(\mathfrak {ab})<\alpha ^\infty _{\mathfrak {N}}(\mathfrak {ab})\), \(\beta '^\infty _{\mathfrak {N}}(\mathfrak {ab})>\beta ^\infty _{\mathfrak {N}}(\mathfrak {ab})\). Hence \(\mathfrak {ab}\) is on all strongest path connecting \({\mathfrak {u}}\) and \({\mathfrak {v}}\) and in fact \(\mathfrak {ab}\) implies that \({\mathfrak {m}}_{\mathfrak {N}}(\mathfrak {uv})\le \xi _1\), \({\mathfrak {n}}_{\mathfrak {N}}(\mathfrak {uv})\ge \xi _2\), \(\alpha _{\mathfrak {N}}(\mathfrak {uv})\le \xi _3\), \(\beta _{\mathfrak {N}}(\mathfrak {uv})\ge \xi _4\), this value. Thus there does not exist a path other than \(\mathfrak {ab}\) connecting \({\mathfrak {a}}\) and \({\mathfrak {b}}\) in \({\mathfrak {G}}^{({\mathfrak {m}}_{\mathfrak {N}}(\mathfrak {ab}),{\mathfrak {n}}_{\mathfrak {N}}(\mathfrak {ab}),\alpha _{\mathfrak {N}}(\mathfrak {ab}),\beta _{\mathfrak {N}}(\mathfrak {ab}))}\), else this other path without \(\mathfrak {ab}\) would be of strength \(\le {\mathfrak {m}}_{\mathfrak {N}}(\mathfrak {ab})\), \(\ge {\mathfrak {n}}_{\mathfrak {N}}(\mathfrak {ab})\), \(\le \alpha _{\mathfrak {N}}(\mathfrak {ab})\), \(\ge \beta _{\mathfrak {N}}(\mathfrak {ab})\) would be part of a path joining \({\mathfrak {u}}\) and \({\mathfrak {v}}\) of strongest length, inimical to fact that \(\mathfrak {ab}\) is on every such path. So \(\mathfrak {ab}\) is on every such path. Hence \(\mathfrak {ab}\) is a bridge of \({\mathfrak {G}}^{({\mathfrak {m}}_{\mathfrak {N}}(\mathfrak {ab}),{\mathfrak {n}}_{\mathfrak {N}}(\mathfrak {ab}),\alpha _{\mathfrak {N}}(\mathfrak {ab}),\beta _{\mathfrak {N}}(\mathfrak {ab}))}\) and \(0<{\mathfrak {m}}_{\mathfrak {N}}(\mathfrak {ab})\le h({\mathfrak {m}}_{\mathfrak {N}})\), \(0<{\mathfrak {n}}_{\mathfrak {N}}(\mathfrak {ab})\le h({\mathfrak {n}}_{\mathfrak {N}})\), \(0<\alpha _{\mathfrak {N}}(\mathfrak {ab})\le h(\alpha _{\mathfrak {N}})\), \(0<\beta _{\mathfrak {N}}(\mathfrak {ab})\le h(\beta _{\mathfrak {N}})\). Thus \((\langle {\mathfrak {m}}_{\mathfrak {N}}(\mathfrak {ab}), {\mathfrak {n}}_{\mathfrak {N}}(\mathfrak {ab})\rangle ,\langle \alpha _{\mathfrak {N}}(\mathfrak {ab}),\beta _{\mathfrak {N}}(\mathfrak {ab})\rangle )\) are the desired \(\xi =(\xi _1,\xi _2,\xi _3,\xi _4)\). \(\square \)

Definition 17

A vertex (node) \({\mathfrak {a}}\in {\mathfrak {V}}\) in \({\mathfrak {G}}\) is called a

  1. (i)

    \({\mathfrak {m}}\)-cut node if by eliminating it drops off the \({\mathfrak {m}}\)-strength of connectivity between some pair of nodes.

  2. (ii)

    \({\mathfrak {n}}\)-cut node if by eliminating it builds up the \({\mathfrak {n}}\)-strength of connectivity between some pair of nodes.

  3. (iii)

    \(\alpha \)-cut node if by eliminating it drops off the \(\alpha \)-strength of connectivity between some pair of nodes.

  4. (iv)

    \(\beta \)-cut node if by eliminating it builds up the \(\beta \)-strength of connectivity between some pair of nodes.

Definition 18

Let \({\mathfrak {a}}\in {\mathfrak {V}}\),

  1. (i)

    The node \({\mathfrak {a}}\in {\mathfrak {V}}\) is said to be a cut node, if \({\mathfrak {a}}\) is a cut node of \({\mathfrak {G}}^*= ({\mathfrak {M}}^*;{\mathfrak {N}}^*)\).

  2. (ii)

    The node \({\mathfrak {a}}\in {\mathfrak {V}}\) is called LDF-cut node if \({\mathfrak {m}}'^\infty _{\mathfrak {N}}\mathfrak {(uv)}<{\mathfrak {m}}^\infty _{\mathfrak {N}}\mathfrak {(uv)}\), \({\mathfrak {n}}'^\infty _{\mathfrak {N}}\mathfrak {(uv)}>{\mathfrak {n}}^\infty _{\mathfrak {N}}\mathfrak {(uv)}\), \(\alpha '^\infty _{\mathfrak {N}}\mathfrak {(uv)}<\alpha ^\infty _{\mathfrak {N}}\mathfrak {(uv)}\), \(\beta '^\infty _{\mathfrak {N}}\mathfrak {(uv)}>\beta ^\infty _{\mathfrak {N}}\mathfrak {(uv)}\), where \(\mathfrak {uv}\in {\mathfrak {V}}\), \({\mathfrak {m}}',{\mathfrak {n}}',\alpha ',\beta '\) are \({\mathfrak {m}},{\mathfrak {n}},\alpha ,\beta \) are restricted to \({\mathfrak {V}}\times {\mathfrak {V}}-\{\mathfrak {ac}, \mathfrak {ca}:{\mathfrak {c}}\in {\mathfrak {V}}\}\).

  3. (iii)

    The node \({\mathfrak {a}}\in {\mathfrak {V}}\) is called a partial linear Diophantine fuzzy cut node if \({\mathfrak {a}}\) is a cut node for \({\mathfrak {G}}^\xi \) for every \(\xi \in (d({\mathfrak {N}}),h({\mathfrak {N}})]\cup \{h({\mathfrak {N}})\}\).

  4. (iv)

    The node \({\mathfrak {a}}\in {\mathfrak {V}}\) is called a weak LDF-cut node if there exists \(\xi \in (0,h({\mathfrak {N}})]\). such that \({\mathfrak {a}}\) is a cut node of \({\mathfrak {G}}^\xi \).

  5. (v)

    The node \({\mathfrak {a}}\in {\mathfrak {V}}\) is called a full LDF-cut node if \({\mathfrak {a}}\) is a cut node for \({\mathfrak {G}}^\xi \) if there exists \(\xi \in (0,h({\mathfrak {N}})]\).

Remark 2

For a \({\mathfrak {G}}\), the following holds

  1. (i)

    If \({\mathfrak {c}}\in {\mathfrak {V}}\) is a identical node of no less than two LDF-bridges, then \({\mathfrak {c}}\) is a LDF cut node.

  2. (ii)

    If \({\mathfrak {G}}\) is a complete LDFG, then

    • it has no LDF-cut node.

    • \({\mathfrak {m}}^\infty _{\mathfrak {N}}\mathfrak {(uv)}={\mathfrak {m}}_{\mathfrak {N}}\mathfrak {(uv)}\), \({\mathfrak {n}}^\infty _{\mathfrak {N}}\mathfrak {(uv)}={\mathfrak {n}}_{\mathfrak {N}}\mathfrak {(uv)}\), \(\alpha ^\infty _{\mathfrak {N}}\mathfrak {(uv)}=\alpha _{\mathfrak {N}}\mathfrak {(uv)}\), \(\beta ^\infty _{\mathfrak {N}}\mathfrak {(uv)}=\beta _{\mathfrak {N}}\mathfrak {(uv)}\)

Definition 19

A LDFG \({\mathfrak {G}}=({\mathfrak {M}},{\mathfrak {N}})\) is called a LDF-tree if there is a LDF-spanning subgraph \({\mathfrak {H}} = ({\mathfrak {M}},{\mathfrak {O}})\) which is a tree, where \(\forall \) edges \(\mathfrak {ab}\) \(\notin \) \({\mathfrak {H}}\) fulfilling \({\mathfrak {m}}_{\mathfrak {N}}\mathfrak {(ab)}<{\mathfrak {m}}^\infty _{\mathfrak {N}}\mathfrak {(ab)}\), \({\mathfrak {n}}_{\mathfrak {N}}\mathfrak {(ab)}>{\mathfrak {n}}^\infty _{\mathfrak {N}}\mathfrak {(ab)}\), \(\alpha _{\mathfrak {N}}\mathfrak {(ab)}<\alpha ^\infty _{\mathfrak {N}}\mathfrak {(ab)}\), \(\beta _{\mathfrak {N}}\mathfrak {(ab)}>\beta ^\infty _{\mathfrak {N}}\mathfrak {(ab)}\)

Definition 20

  1. (i)

    The LDFG \({\mathfrak {G}}\) is said to be a forest if \({\mathfrak {G}}^*\) is a forest.

  2. (ii)

    The LDFG \({\mathfrak {G}}=({\mathfrak {M}},{\mathfrak {N}})\) is called a LDF-forest if \({\mathfrak {G}}\) has a LDF-spanning subgraph forest \({\mathfrak {H}}=({\mathfrak {M}},{\mathfrak {O}})\), where all edges \(\mathfrak {uv}\in \mathfrak {E- W}\); fulfilling \({\mathfrak {m}}_{\mathfrak {N}}\mathfrak {(uv)}<{\mathfrak {m}}^\infty _{\mathfrak {N}}\mathfrak {(uv)}\), \({\mathfrak {n}}_{\mathfrak {N}}\mathfrak {(uv)}>{\mathfrak {n}}^\infty _{\mathfrak {N}}\mathfrak {(uv)}\), \(\alpha _{\mathfrak {N}}\mathfrak {(uv)}<\alpha ^\infty _{\mathfrak {N}}\mathfrak {(uv)}\), \(\beta _{\mathfrak {N}}\mathfrak {(uv)}>\beta ^\infty _{\mathfrak {N}}\mathfrak {(uv)}\).

  3. (iii)

    The LDFG \({\mathfrak {G}}\) is called a weak LDF-forest if \(\exists \) \(\xi \in (0,h({\mathfrak {N}})]\) such that \(\mathfrak {ab}\) is a forest of \({\mathfrak {G}}^\xi \).

  4. (iv)

    The LDFG \({\mathfrak {G}}\) is called a full LDF-forest if \(\mathfrak {ab}\) is a forest for \({\mathfrak {G}}^\xi \), \(\forall \xi \in (0,h({\mathfrak {N}})]\).

  5. (v)

    The LDFG \({\mathfrak {G}}\) is called a partial LDF-forest if \(\mathfrak {ab}\) is a forest for every \(\xi \in (d({\mathfrak {N}}),h({\mathfrak {N}})]\cup \{h({\mathfrak {N}})\}\).

Theorem 4

The LDFG \({\mathfrak {G}}\) is a full LDF-forest if and only if \({\mathfrak {G}}\) is forest.

Proof

If the LDFG \({\mathfrak {G}}\) is a full LDF-forest, then \({\mathfrak {G}}^*\) is a forest.

contrarily, if \({\mathfrak {G}}\) is forest, then \({\mathfrak {G}}^*\) is a forest this implies that \({\mathfrak {G}}^\xi \), \(\forall \xi \in (0,h({\mathfrak {N}})]\), considering the condition that each \({\mathfrak {G}}^\xi \) is a subgraph of \({\mathfrak {G}}^*\), hence it is proved. \(\square \)

Theorem 5

If \({\mathfrak {G}}\) is a LDF-forest, the edges of \({\mathfrak {H}}\) are just LDF-bridges of \({\mathfrak {G}}\).

Proof

An arc \(\mathfrak {ab}\notin {\mathfrak {H}}\) is assuredly not a LDF-bridge. By reason of \({\mathfrak {m}}_{\mathfrak {N}}\mathfrak {(ab)}<{\mathfrak {m}}^\infty _{\mathfrak {N}}\mathfrak {(ab)}\), \({\mathfrak {n}}_{\mathfrak {N}}\mathfrak {(ab)}>{\mathfrak {n}}^\infty _{\mathfrak {N}}\mathfrak {(ab)}\), \(\alpha _{\mathfrak {N}}\mathfrak {(ab)}<\alpha ^\infty _{\mathfrak {N}}\mathfrak {(ab)}\), \(\beta _{\mathfrak {N}}\mathfrak {(ab)}>\beta ^\infty _{\mathfrak {N}}\mathfrak {(ab)}\) hence if part is proved.

Conversely, let us take \(\mathfrak {ab}\) be an edge in \({\mathfrak {H}}\). If it is not a LDF-bridge, we have a path from \({\mathfrak {a}}\) to \({\mathfrak {b}}\), not presume \(\mathfrak {ab}\), of strength \(\ge \mathfrak {m(ab)}\),\(\le \mathfrak {n(ab)}\), \(\ge \alpha \mathfrak {(ab)}\), \(\le \beta \mathfrak {(ab)}\). This path must involve arcs not in \({\mathfrak {H}}\). Since \({\mathfrak {H}}\) is a LDF-forest and has no cycles. Nevertheless, by definition, either such arc \((\mathfrak {u_1v_1})\) can be restored by a path \(\mathfrak {p_1}\) in \({\mathfrak {H}}\) of strength \(\ge \mathfrak {m(uv)}\),\(\le \mathfrak {n(uv)}\), \(\ge \alpha \mathfrak {(uv)}\), \(\le \beta \mathfrak {(uv)}\). Now \({\mathfrak {p}}\) cannot involve \(\mathfrak {(ab)}\). Following all its arcs are strictly stronger than \({\mathfrak {m}}_{\mathfrak {N}}\mathfrak {(uv)}<{\mathfrak {m}}^\infty _{\mathfrak {N}}\mathfrak {(ab)}\), \({\mathfrak {n}}_{\mathfrak {N}}\mathfrak {(uv)}>{\mathfrak {n}}^\infty _{\mathfrak {N}}\mathfrak {(ab)}\), \(\alpha _{\mathfrak {N}}\mathfrak {(uv)}<\alpha ^\infty _{\mathfrak {N}}\mathfrak {(ab)}\), \(\beta _{\mathfrak {N}}\mathfrak {(uv)}>\beta ^\infty _{\mathfrak {N}}\mathfrak {(ab)}\). Hence by restoring every arc \((\mathfrak {u_1v_1})\) with \(\mathfrak {p_1}\) . We can put up a path in \({\mathfrak {H}}\) from \({\mathfrak {a}}\) to \({\mathfrak {b}}\) that have not yet presume \(\mathfrak {ab}\) giving us a cycle in \({\mathfrak {H}}\), which is a conflict. \(\square \)

Theorem 6

The LDF \({\mathfrak {G}}\) have not yet consist of a cycle whose arcs are of strength \(h\mathfrak {(N)}\) if and only if \({\mathfrak {G}}\) is weak LDF-forest.

Proof

If Suppose \({\mathfrak {G}}\) have not yet consist of a cycle whose arcs are of strength \(h\mathfrak {(N)}\); then \({\mathfrak {G}}^{h\mathfrak {(N)}}\) have not yet consist of a cycle and thus it is forest.

Conversely, assume that \({\mathfrak {G}}\) has a cycle whose arcs are of strength \(h\mathfrak {(N)}\); then \({\mathfrak {G}}^\xi \), \(\forall \xi \in (0,h({\mathfrak {N}})]\) that have this cycle and so is not a forest, hence \({\mathfrak {G}}\) is not a weak LDF-forest. \(\square \)

Definition 21

  1. (i)

    The LDFG \({\mathfrak {G}}\) is called a tree if \({\mathfrak {G}}^*\) is a tree.

  2. (ii)

    The LDFG \({\mathfrak {G}}=({\mathfrak {M}},{\mathfrak {N}})\) is called a LDF-tree if \({\mathfrak {G}}\) has a LDF-spanning subgraph tree \({\mathfrak {H}}=({\mathfrak {M}},{\mathfrak {O}})\), where all arcs \(\mathfrak {uv}\in \mathfrak {E- W}\); satisfying \({\mathfrak {m}}_{\mathfrak {N}}\mathfrak {(uv)}<{\mathfrak {m}}^\infty _{\mathfrak {N}}\mathfrak {(uv)}\), \({\mathfrak {n}}_{\mathfrak {N}}\mathfrak {(uv)}>{\mathfrak {n}}^\infty _{\mathfrak {N}}\mathfrak {(uv)}\), \(\alpha _{\mathfrak {N}}\mathfrak {(uv)}<\alpha ^\infty _{\mathfrak {N}}\mathfrak {(uv)}\), \(\beta _{\mathfrak {N}}\mathfrak {(uv)}>\beta ^\infty _{\mathfrak {N}}\mathfrak {(uv)}\).

  3. (iii)

    The LDFG \({\mathfrak {G}}\) is said to be a weak LDF-tree if there exist \(\xi \in (0,h({\mathfrak {N}})]\) such that \(\mathfrak {ab}\) is a tree of \({\mathfrak {G}}^\xi \).

  4. (iv)

    The LDFG \({\mathfrak {G}}\) is said to be a full LDF-tree if \(\mathfrak {ab}\) is a tree for \({\mathfrak {G}}^\xi \), \(\forall \xi \in (0,h({\mathfrak {N}})]\).

  5. (v)

    The LDFG \({\mathfrak {G}}\) is said to be a partial LDF-tree if \(\mathfrak {ab}\) is a tree for every \(\xi \in (d({\mathfrak {N}}),h({\mathfrak {N}})]\cup \{h({\mathfrak {N}})\}\).

Remark 3

If \({\mathfrak {G}}\) is a LDF-tree, then

  1. (i)

    the edges of spanning subgraph \({\mathfrak {H}}\) are the LDF-bridges of \({\mathfrak {G}}\).

  2. (ii)

    \({\mathfrak {G}}\) is not a complete LDFG.

  3. (iii)

    the internal vertices of spanning subgraph \({\mathfrak {H}}\) are the LDF-cut vertices of \({\mathfrak {G}}\).

  4. (iv)

    \(\mathfrak {ab}\) is LDF-bridge if and only if \({\mathfrak {m}}_{\mathfrak {N}}\mathfrak {(ab)}={\mathfrak {m}}^\infty _{\mathfrak {N}}\mathfrak {(ab)}\), \({\mathfrak {n}}_{\mathfrak {N}}\mathfrak {(ab)}={\mathfrak {n}}^\infty _{\mathfrak {N}}\mathfrak {(ab)}\), \(\alpha _{\mathfrak {N}}\mathfrak {(ab)}=\alpha ^\infty _{\mathfrak {N}}\mathfrak {(ab)}\), \(\beta _{\mathfrak {N}}\mathfrak {(ab)}=\beta ^\infty _{\mathfrak {N}}\mathfrak {(ab)}\).

LDF-minimum spanning tree

A spanning tree (ST) of a connected graph \({\mathfrak {G}}\) is a connected acyclic maximum subgraph that contains all of \({\mathfrak {G}}\)’s nodes. Every spanning tree contains precisely \(\mathfrak {n-1}\) arcs, where \({\mathfrak {n}}\) is the number of graph \({\mathfrak {G}}\) nodes. A minimal spanning tree (MST) problem is to find a spanning tree with the shortest sum of its arc lengths. The traditional MST issue takes into account the actual weights associated with the graph’s arcs. In real-world circumstances, however, the arc lengths may be inaccurate due to a lack of data or incompleteness.

LDF-MST Prim’s algorithm

Prim’s algorithm is a avaricious and well-known technique used to calculate the MST of a weighted linked undirected classical network. This technique encounters a subset of the arcs that form a tree that contains each-and-every node while minimizing the overall cost of all the arcs in the tree. In 1930, Czech mathematician Vojtech Jarnk [22] proposed this technique. Prim [35] found it separately in 1957, and Edsger Dijkstra [19] rediscovered it in 1959. As a result, it is also known as the Jarnk algorithm, the DJP algorithm, or the Prim Jarnk algorithm.

The technique gradually expands the size of a tree, one edge at a time, beginning with a single node and progressing until it encompasses all nodes.

Step 1. Set \({\mathfrak {V}}_{new}= \{{\mathfrak {a}}\}\), where \({\mathfrak {a}}\) is an random node (start node) from \({\mathfrak {V}}\) and \({\mathfrak {E}}_{new} = \{\phi \}\).

Step 2. Compute an edge \(({\mathfrak {a}};{\mathfrak {b}})\) with minimum weight such that \({\mathfrak {a}}\in {\mathfrak {V}}_{new}\) and \({\mathfrak {b}}\notin {\mathfrak {V}}_{new}\). If several arcs are with the identical weight, any one of them can be selected.

Step 3. Add \({\mathfrak {a}}\) to \({\mathfrak {V}}_{new}\) and \(({\mathfrak {a}};{\mathfrak {b}})\) to \({\mathfrak {E}}_{new}\).

Step 4. If \({\mathfrak {V}}-{\mathfrak {V}}_{new}=\{\phi \}\), then stop and return to \({\mathfrak {V}}_{new}\) and \({\mathfrak {E}}_{new}\). MST is described by \({\mathfrak {V}}_{new}\) and \({\mathfrak {E}}_{new}\). Otherwise, repeat the Steps 2 and 3.

Problem formulation for LDF-MST

Consider a linear Diophantine fuzzy graph as an appropriate approach to deal with these imprecision’s. Consider the following linear Diophantine fuzzy graph \({\mathfrak {G}}\). Taking into account of \({\mathfrak {n}}\) number of vertices (nodes) \({\mathfrak {V}}= \{\mathfrak {v_1}, \mathfrak {v_2}, \mathfrak {v_3},\ldots , \mathfrak {v_n}\}\) and a terminable \({\mathfrak {m}}\) number of set of edges (arcs) \({\mathfrak {E}}\subseteq {\mathfrak {V}}\times {\mathfrak {V}}\). Every edge of the graph \({\mathfrak {G}}\) is represented by \(\mathfrak {e_{ij}}=(\mathfrak {v_iv_j})\), where \(\mathfrak {v_i},\mathfrak {v_j}\in {\mathfrak {V}}\) and \({\mathfrak {i}}\ne {\mathfrak {j}}\). If the arc \(\mathfrak {e_{i}}\) is shown in the linear Diophantine fuzzy minimum spanning tree (LDF-MST) then \({\mathfrak {x}}_{\mathfrak {e_{ij}}}= 1\), otherwise \({\mathfrak {x}}_{\mathfrak {e_{ij}}}= 0\). The cost (or) distance (or) length of all the edges of \({\mathfrak {G}}\) is characterized by LDFN. We designated the MST of this linear Diophantine fuzzy graph as a linear Diophantine fuzzy minimum spanning tree (LDF-MST).

The LDF-MST is codified as the linear programming problem (LPP) as shown below.

$$\begin{aligned} min \sum \limits _{{\mathfrak {e}}\in {\mathfrak {E}}}\mathfrak {C_e}\mathfrak {a_e}, \end{aligned}$$
(1)

Subject to the constraint

$$\begin{aligned}&\sum \limits _{{\mathfrak {e}}\in {\mathfrak {E}}}\mathfrak {a_e} =\mathfrak {n-1}, \end{aligned}$$
(2)
$$\begin{aligned}&\sum \limits _{{\mathfrak {e}}\in \delta ({\mathfrak {s}})}\mathfrak {a_e} \ge {\mathfrak {1}}, \forall {\mathfrak {s}}\subset {\mathfrak {V}};\phi \ne {\mathfrak {s}}\ne {\mathfrak {V}}, \end{aligned}$$
(3)
$$\begin{aligned}&{\mathfrak {e}}\in [0,1] ; \forall {\mathfrak {e}}\in {\mathfrak {E}}, \end{aligned}$$
(4)

Here, \(\mathfrak {C_e}\) is a LDFN that expresses the length of the edge \({\mathfrak {e}}\) and \(\sum \) in Eq. (1) is the sum of LDFNs using score function and sum representation of LDFNs are defined in Definition 5 and Definition 6 respectively. Equation (2) assures that the number of edges in the LDF-MST is \(\mathfrak {n- 1}\). In Eq. (3), we utilize the cut-set of a subset of vertices of \({\mathfrak {s}}\), i.e., the edges that have one vertex in the set \({\mathfrak {s}}\) and the other vertex not in the set \({\mathfrak {s}}\). As a result, a ST must contain a minimum one edge in the cut set of any subset of vertices.

Proposed Prim’s algorithm for the LDF-MST and its cost

The Prim’s method is a well-known approach and works greedily for solving the minimal spanning tree (MST) problems. To handle MST in a linear Diophantine fuzzy environment, a LDF variant of Prim’s method is proposed in this section. In a linear Diophantine fuzzy context, we address the MST issue of each arc on a graph with arc length assigned by a linear Diophantine fuzzy integer. Because it involves LDFN comparison and addition, this issue differs from the traditional MST, which only accepts real values. The modified score function of LDFNs is utilized for LDFN comparison and addition. We provide an LDF variant of the traditional Prim’s algorithm to solve the MST problem using LDFNs based on the idea of the score function of LDF numbers.

In this algorithm, we use several variables that are required for clarification. An undirected connected LDFG \({\mathfrak {G}}=({\mathfrak {V}};{\mathfrak {E}})\), where \({\mathfrak {V}}\) and \({\mathfrak {E}}\) are the set of nodes and arcs, respectively. Let \({\mathfrak {n}}=|{\mathfrak {V}}|\) and \({\mathfrak {m}}=|{\mathfrak {E}}|\), hence we have the node set as \({\mathfrak {V}}=\{\mathfrak {v_1}, \mathfrak {v_2},\mathfrak {v_3},\ldots ,\mathfrak {v_n}\}\) and the arc set as \({\mathfrak {E}}=\{\mathfrak {e_1}, \mathfrak {e_2},\mathfrak {e_3},\ldots ,\mathfrak {e_m}\}\). The nodes, arcs and cost of the corresponding LDF-MST in LDFN are represented as \({\mathfrak {V}}_{new}\), \({\mathfrak {E}}_{new}\) and \(cost_{LDFN}\), respectively. The cost of LDF-MST \(cost_{LDFN}\) is indoctrinated into crisp number by using score function and sum function representation of LDFN and it is stored in \(cost_{exact}\). The weight of edge \(\mathfrak {e_i}\) is represented by \(cost(\mathfrak {e_i})\) and \(P(cost(\mathfrak {e_i}))\) denotes the score value of edge \(\mathfrak {e_i}\). The variable \(cost({\mathfrak {a}}; {\mathfrak {b}})\) is the distance intervening the two nodes \({\mathfrak {a}}\) and \({\mathfrak {b}}\).

A random node \(\mathfrak {v_1}\) is picked from the graph \({\mathfrak {G}}\). Using the score function representation of LDFNs, we calculate the \(P(cost(\mathfrak {e_i}))\) value for each edge \(\mathfrak {e_i}\), \({\mathfrak {i}}=1,2,3,\ldots ,|{\mathfrak {E}}|\) in the LDFG \({\mathfrak {G}}\). Begin with vertex \(\mathfrak {v_1}\) and work your way to its nearest neighbor, say \(\mathfrak {v_2}\). To locate the nearest neighbor, we must first locate all of the connecting edges with \(\mathfrak {v_1}\).

Then, amongst all of the connected edges of \(\mathfrak {v_1}\), choose the one with the minimum \(P (cost(\mathfrak {v_1}; \mathfrak {v_i} ))\) value, i.e., \((\mathfrak {v_1}; \mathfrak {v_i})\). Consequently, we apply the same approach to identify the nearest neighbor for additional graph vertices. Consider \(\mathfrak {v_1}\) and \(\mathfrak {v_2}\) as a single subgraph and connect it to its nearest neighbor. Let’s call this new node \(\mathfrak {v_k}\). Consider the tree with nodes \(\mathfrak {v_1}\), \(\mathfrak {v_i}\), and \(\mathfrak {v_k}\) as a single subgraph and repeat until all \({\mathfrak {n}}\) nodes are linked by \(\mathfrak {n-1}\) arcs. Algorithm 1 and Fig. 1 depicts the suggested linear Diophantine fuzzy Prim algorithm’s pseudo-code and flow diagram, respectively.

figure a
Fig. 1
figure 1

Flow chart for the proposed algorithm

To represent the LDFG in our proposed approach, we utilize an adjacency matrix. Based on the notion of score function representation of LDFN, the linear searching approach is applied to identify the least weight arc. The LDFNs addition procedure is used to calculate the cost of the MST. The suggested algorithm has a computational complexity of order \(O(|{\mathfrak {V}}|^2)\).

Numerical example

Previous research [15] have proposed some wireless charging methods for sensor networks. Our system will use the same approach and be made up of three primary components, as indicated in Fig. 2:

Fig. 2
figure 2

Sensor network

  • Mobile charger is a mobile robot that takes a wireless charger (MC).

  • Each node in a wireless sensor network is equipped with a wireless power receiver.

  • The energy station is placed in the base station and is responsible for calculating the necessary energy for each node and providing it to the robot along with their locations.

In our structure, sensor nodes not only execute their original function of sensing data from their surroundings, but they can also compute the tarrying residual energy of the energy and the battery required for transmission to the parent node. This data is subsequently sent to the sink and aggregated end route to save communication overhead. Data on sensor energy are then provided by the power station that is directly connected to the sink. This power station computes the network’s total remaining energy and compares it to a specified threshold. If the overall energy goes below this level, the station decides to deliver more energy to all nodes based on their MST locations. The MC is given the quantity of the extra energy for each node as well as the optimal path for energy distribution from the base station.

Before allocating energy to a sensor node, the base station must calculate how much energy the sensor node will require for subsequent broadcasts. This additional energy will be calculated based on the node’s position in the MST. In MST, position refers to the distance between a node and its parent, as well as the number of hops to the root. The key aim here is to minimize the cost but to maximize the energy allocated to node \({\mathfrak {i}}\) in order to maximize the number of transmissions, which can be written as a function of the node’s starting energy in terms of LDFN and the needed energy for each transmission are also in terms of LDFN.

Graphical representation of the wireless charging systems

The wireless charging system of the LDF-MST problem is given in this section to show the suggested approach. Take into account the LDF network in Fig. 2, which contains ten nodes and sixteen arcs. Figure 3 depicts the lengths of all arcs of the linear Diophantine fuzzy graph in the form of LDFNs (Table 3).

Fig. 3
figure 3

The linear Diophantine fuzzy graph (LDFDG)-\({\mathfrak {G}}\)

Table 3 Details of edges information in terms of LDFN
  • Iteration 0: The Initial node 1 is chosen at random from the vertex set of the graph \({\mathfrak {G}}\). Prim’s algorithm starts with the node 1. Originally, \({\mathfrak {V}}_{new} = \{1\}\), \({\mathfrak {E}}_{new} = \{\phi \}\) and \(cost_{LDFN} =(<0, 1>,<0, 1>)\).

  • Iteration 1: node 2, 4 and 5 can be accessed from the node 1. The corresponding arcs are \(\mathfrak {e_1}\), \(\mathfrak {e_2}\), and \(\mathfrak {e_3}\), respectively. In order to compare the weights of these arcs \((\langle 0.7, 0.6\rangle ,\langle 0.5, 0.3\rangle )\), \((\langle 0.4, 0.2 \rangle ,\langle 0.6, 0.4\rangle )\) and \((\langle 0.7, 0.8 \rangle ,\langle 0.5, 0.3 \rangle )\) we use score function as defined in Definition 5\(\mathfrak {S(e_1)}={\mathfrak {S}}(\langle 0.7, 0.6\rangle ,\langle 0.5, 0.3\rangle )=\frac{1}{2}[(0.7- 0.6)+(0.5- 0.3)]=0.15\) \(\mathfrak {S(e_2)}={\mathfrak {S}}(\langle 0.4, 0.2 \rangle ,\langle 0.6, 0.4\rangle ) =\frac{1}{2}[(0.4- 0.2)+(0.6- 0.4)]=0.2\) \(\mathfrak {S(e_3)}={\mathfrak {S}}(\langle 0.7, 0.8 \rangle ,\langle 0.5, 0.3 \rangle )=\frac{1}{2}[(0.7- 0.8)+(0.5- 0.3)]=0.05\) Since the score value (SV) of \(\mathfrak {e_3}\) is less than the SVs of \(\mathfrak {e_1}\) and \(\mathfrak {e_2}\). This cost of (1, 5) ,i.e., cost (1, 5) value is added with \(cost_{LDFN}\) using the addition operation of two LDFNs in Definition 6 (iv). Now, \({\mathfrak {V}}_{new} = 1, 5\), \({\mathfrak {E}}_{new}=(1,5)=\mathfrak {e_3}\) and \(cost_{LDFN}=(\langle 0.7, 0.8 \rangle ,\langle 0.5, 0.3 \rangle )\).

  • Iteration 2: node 4, 7 and 8 can be accessed from the node 5. The corresponding arcs are \(\mathfrak {e_8}\), \(\mathfrak {e_{11}}\), and \(\mathfrak {e_{12}}\), respectively. In order to compare the weights of these arcs \((\langle 0.9, 0.8 \rangle ,\langle 0.5, 0.3 \rangle )\), \((\langle 0.8, 0.7 \rangle ,\langle 0.4, 0.3\rangle )\) and \((\langle 0.9, 0.2 \rangle ,\langle 0.3, 0.1\rangle )\) we use the score values \(\mathfrak {S(e_8)}={\mathfrak {S}}(\langle 0.9, 0.8 \rangle ,\langle 0.5, 0.3 \rangle ) =\frac{1}{2}[(0.9- 0.8)+(0.5- 0.3)]=0.15\) \(\mathfrak {S(e_{11})}={\mathfrak {S}}(\langle 0.8, 0.7 \rangle ,\langle 0.4, 0.3\rangle ) =\frac{1}{2}[(0.8- 0.7)+(0.4- 0.3)]=0.1\) \(\mathfrak {S(e_{12})}={\mathfrak {S}}(\langle 0.9, 0.2 \rangle ,\langle 0.3, 0.1\rangle ) =\frac{1}{2}[(0.9- 0.2 )+(0.3- 0.1)]=0.45\) Since the SV of \(\mathfrak {e_{11}}\) is less than the SVs of \(\mathfrak {e_8}\) and \(\mathfrak {e_{12}}\). This cost of (5, 7) value is added with \(cost_{LDFN}\) using the addition operation of two LDFNs in Definition 6 (iv). Now, \({\mathfrak {V}}_{new} = 1, 5, 7\), \({\mathfrak {E}}_{new}=(1,5),(5,7)=\mathfrak {e_3},\mathfrak {e_{11}}\) and \(cost_{LDFN}=(\langle 0.7, 0.8 \rangle ,\langle 0.5, 0.3 \rangle )\oplus (\langle 0.8, 0.7 \rangle ,\langle 0.4, 0.3\rangle )=(\langle 0.94, 0.56 \rangle ,\langle 0.7, 0.09\rangle )\).

  • Iteration 3: node 4, 6, 8 and 9 can be accessed from the node 7. The corresponding arcs are \(\mathfrak {e_{10}}\), \(\mathfrak {e_{13}}\), \(\mathfrak {e_{15}}\), and \(\mathfrak {e_{16}}\), respectively. In order to compare the weights of these arcs \((\langle 0.9, 0.5 \rangle ,\langle 0.6, 0.3 \rangle )\), \((\langle 0.4, 0.3 \rangle ,\langle 0.5, 0.3\rangle )\), \((\langle 0.9, 0.4 \rangle ,\langle 0.6, 0.4\rangle )\) and \((\langle 0.5, 0.2 \rangle ,\langle 0.4, 0.3\rangle )\), the score values are \(\mathfrak {S(e_{10})}={\mathfrak {S}}(\langle 0.9, 0.5 \rangle ,\langle 0.6, 0.3 \rangle ) =0.35\) \(\mathfrak {S(e_{13})}={\mathfrak {S}}(\langle 0.4, 0.3 \rangle ,\langle 0.5, 0.3\rangle ) =0.15\) \(\mathfrak {S(e_{15})}={\mathfrak {S}}(\langle 0.9, 0.4 \rangle ,\langle 0.6, 0.4\rangle )=0.35\) \(\mathfrak {S(e_{16})}={\mathfrak {S}}(\langle 0.5, 0.2 \rangle ,\langle 0.4, 0.3\rangle ) =0.2\) Since the SV of \(\mathfrak {e_{13}}\) is less than the SVs of \(\mathfrak {e_{10}}\), \(\mathfrak {e_{15}}\), and \(\mathfrak {e_{16}}\). This cost of (6, 7) value is added with \(cost_{{ LDFN}}\). Now, \({\mathfrak {V}}_{{ new}} = 1, 5, 7, 6\), \({\mathfrak {E}}_{{ new}}=(1,5),(5,7), (6,7)=\mathfrak {e_3},\mathfrak {e_{11}},\mathfrak {e_{13}} \) and \(cost_{{ LDFN}}=(\langle 0.94, 0.56 \rangle ,\langle 0.7, 0.09\rangle ) \oplus (\langle 0.4, 0.3 \rangle , \langle 0.5, 0.3\rangle )=(\langle 0.964, 0.168 \rangle ,\langle 0.85, 0.027\rangle )\).

  • Iteration 4: node 3, 4, and 10 can be accessed from the node 6. The corresponding arcs are \(\mathfrak {e_{7}}\), \(\mathfrak {e_{9}}\), and \(\mathfrak {e_{14}}\), respectively. In order to compare the weights of these arcs \((\langle 0.8, 0.2 \rangle ,\langle 0.3, 0.2 \rangle )\), \((\langle 0.6, 0.5 \rangle ,\langle 0.4, 0.1 \rangle )\), and \((\langle 0.7, 0.5 \rangle ,\langle 0.2, 0.1\rangle )\), the SV are \(\mathfrak {S(e_{7})}={\mathfrak {S}}(\langle 0.8, 0.2 \rangle ,\langle 0.3, 0.2 \rangle ) =0.35\) \(\mathfrak {S(e_{9})}={\mathfrak {S}}(\langle 0.6, 0.5 \rangle ,\langle 0.4, 0.1 \rangle ) =0.2\) \(\mathfrak {S(e_{14})}={\mathfrak {S}}(\langle 0.7, 0.5 \rangle ,\langle 0.2, 0.1\rangle ) =0.15\) Since the SV of \(\mathfrak {e_{14}}\) is less than the SVs of \(\mathfrak {e_{7}}\), \(\mathfrak {e_{9}}\), and \(\mathfrak {e_{14}}\). This cost of (6, 10) value is added with \(cost_{LDFN}\). Now, \({\mathfrak {V}}_{new} = 1, 5, 7, 6,10\), \({\mathfrak {E}}_{new}=(1,5),(5,7), (6,7), (6,10)=\mathfrak {e_3},\mathfrak {e_{11}},\mathfrak {e_{13}} ,\mathfrak {e_{14}}\) and \(cost_{LDFN}=(\langle 0.964, 0.168 \rangle ,\langle 0.85, 0.027\rangle )\oplus (\langle 0.7, 0.5 \rangle ,\langle 0.2, 0.1\rangle ) = (\langle 0.9892, 0.084 \rangle , \langle 0.88, 0.0027\rangle ) \).

  • Iteration 5: Since \({\mathfrak {V}}-{\mathfrak {V}}_{new}\ne \phi \), and we select a node 2. node 1, 3, and 4 can be accessed from the node 2. The corresponding arcs are \(\mathfrak {e_{1}}\), \(\mathfrak {e_{4}}\), and \(\mathfrak {e_{5}}\), respectively. In order to compare the weights of these arcs \((\langle 0.7, 0.6\rangle ,\langle 0.5, 0.3\rangle )\), \((\langle 0.9, 0.7 \rangle ,\langle 0.6, 0.2\rangle )\), and \((\langle 0.6, 0.9 \rangle ,\langle 0.8, 0.2\rangle )\), the score values are \(\mathfrak {S(e_{1})}={\mathfrak {S}}(\langle 0.7, 0.6\rangle ,\langle 0.5, 0.3\rangle ) =0.15\) \(\mathfrak {S(e_{3})}={\mathfrak {S}}(\langle 0.9, 0.7 \rangle ,\langle 0.6, 0.2\rangle ) =0.3\) \(\mathfrak {S(e_{4})}={\mathfrak {S}}(\langle 0.6, 0.9 \rangle ,\langle 0.8, 0.2\rangle ) =0.15\) Since the SV of \(\mathfrak {e_{1}}\) and \(\mathfrak {e_{5}}\) are equal and is less than the score value of \(\mathfrak {e_{4}}\). Hence we randomly choose \(\mathfrak {e_{1}}\). This cost of (1, 2) value is added with \(cost_{LDFN}\). Now, \({\mathfrak {V}}_{new} = 1, 5, 7, 6, 10, 2\), \({\mathfrak {E}}_{new}=(1,5),(5,7), (6,7), (6,10),(1,2)=\mathfrak {e_3},\mathfrak {e_{11}},\mathfrak {e_{13}}, \mathfrak {e_{14}}, \mathfrak {e_{1}} \) and \(cost_{LDFN}= (\langle 0.9892, 0.084 \rangle ,\langle 0.88, 0.0027\rangle )\oplus (\langle 0.7, 0.6\rangle ,\langle 0.5, 0.3\rangle ) =(\langle 0.99676, 0.0504 \rangle ,\langle 0.94, 0.00081\rangle )\).

  • Iteration 6: Since \({\mathfrak {V}}-{\mathfrak {V}}_{new}\ne \phi \), and we select a node 3. node 2, 4, and 6 can be accessed from the node 3. The corresponding arcs are \(\mathfrak {e_{4}}\), \(\mathfrak {e_{6}}\), and \(\mathfrak {e_{7}}\), respectively. In order to compare the weights of these arcs \((\langle 0.9, 0.7 \rangle ,\langle 0.6, 0.2\rangle )\), \((\langle 0.8, 0.7\rangle ,\langle 0.4, 0.3 \rangle )\), and \((\langle 0.8, 0.2 \rangle ,\langle 0.3, 0.2 \rangle )\), the score values are \(\mathfrak {S(e_{4})}={\mathfrak {S}}(\langle 0.9, 0.7 \rangle ,\langle 0.6, 0.2\rangle ) =0.3\) \(\mathfrak {S(e_{6})}={\mathfrak {S}}(\langle 0.8, 0.7\rangle ,\langle 0.4, 0.3 \rangle ) =0.1\) \(\mathfrak {S(e_{7})}={\mathfrak {S}}(\langle 0.8, 0.2 \rangle ,\langle 0.3, 0.2 \rangle ) =0.35\) Since the score value of \(\mathfrak {e_{6}}\) is less than the SV of \(\mathfrak {e_{4}}\) and \(\mathfrak {e_{7}}\). Hence we choose \(\mathfrak {e_{6}}\). This cost of (3, 4) value is added with \(cost_{LDFN}\). Now, \({\mathfrak {V}}_{new} = 1, 5, 7, 6, 10, 2,3\), \({\mathfrak {E}}_{new}=(1,5),(5,7), (6,7), (6,10),(1,2),(3,4)=\mathfrak {e_3},\mathfrak {e_{11}},\mathfrak {e_{13}}, \mathfrak {e_{14}}, \mathfrak {e_{1}}, \mathfrak {e_{6}} \) and \(cost_{LDFN}=(\langle 0.99676, 0.0504 \rangle ,\langle 0.94, 0.00081\rangle )\oplus (\langle 0.8, 0.7\rangle ,\langle 0.4, 0.3 \rangle ) =(\langle 0.999352, 0.03528 \rangle ,\langle 0.964, 0.000243\rangle )\).

  • Iteration 7: We select a node 4. node 1, 2, 5, 6 and 7 can be accessed from the node 4. The corresponding arcs are \(\mathfrak {e_{2}}\), \(\mathfrak {e_{5}}\), \(\mathfrak {e_{8}}\), \(\mathfrak {e_{9}}\), and \(\mathfrak {e_{10}}\), respectively. In order to compare the weights of these arcs \((\langle 0.4, 0.2 \rangle ,\langle 0.6, 0.4\rangle )\), \((\langle 0.6, 0.9 \rangle ,\langle 0.8, 0.2\rangle )\), \((\langle 0.9, 0.8 \rangle ,\langle 0.5, 0.3 \rangle )\), \((\langle 0.6, 0.5 \rangle ,\langle 0.4, 0.1 \rangle )\), and \((\langle 0.9, 0.5 \rangle ,\langle 0.6, 0.3 \rangle )\), the SV are \(\mathfrak {S(\mathfrak {e_{2}})}={\mathfrak {S}} (\langle 0.4, 0.2 \rangle ,\langle 0.6, 0.4\rangle )=0.2\) \(\mathfrak {S(\mathfrak {e_{5}})}={\mathfrak {S}}(\langle 0.6, 0.9 \rangle ,\langle 0.8, 0.2\rangle )=0.15\) \(\mathfrak {S(\mathfrak {e_{8}})}={\mathfrak {S}}(\langle 0.9, 0.8 \rangle ,\langle 0.5, 0.3 \rangle )=0.15\) \(\mathfrak {S(\mathfrak {e_{9}})}={\mathfrak {S}}(\langle 0.6, 0.5 \rangle ,\langle 0.4, 0.1 \rangle )=0.2\) \(\mathfrak {S(\mathfrak {e_{10}})}={\mathfrak {S}}(\langle 0.9, 0.5 \rangle ,\langle 0.6, 0.3 \rangle )=0.35\) Since the score values of \(\mathfrak {e_{5}}\) and \(\mathfrak {e_{8}}\) are equal but \(\mathfrak {e_{5}}\) forms a cycle so we choose choose \(\mathfrak {e_{8}}\). This cost of (4, 5) value is added with \(cost_{LDFN}\). Now, \({\mathfrak {V}}_{new} = 1, 5, 7, 6, 10, 2,3,4\), \({\mathfrak {E}}_{new}=(1,5),(5,7), (6,7), (6,10),(1,2),(3,4),(4,5)=\mathfrak {e_3},\mathfrak {e_{11}},\mathfrak {e_{13}}, \mathfrak {e_{14}}, \mathfrak {e_{1}}, \mathfrak {e_{6}} , \mathfrak {e_{8}}\) and \(cost_{LDFN}=(\langle 0.999352, 0.03528 \rangle ,\langle 0.964, 0.000243\rangle )\oplus (\langle 0.9, 0.8 \rangle ,\langle 0.5, 0.3 \rangle ) =(\langle 0.9999352, 0.028224 \rangle ,\langle 0.982, 0.0000729\rangle )\).

  • Iteration 8: We select a node 8. node 5, 7, and 9 can be accessed from the node 8. The corresponding arcs are \(\mathfrak {e_{12}}\), \(\mathfrak {e_{15}}\), and \(\mathfrak {e_{17}}\), respectively. In order to compare the weights of these arcs \((\langle 0.9, 0.2 \rangle ,\langle 0.3, 0.1\rangle )\), \((\langle 0.9, 0.4 \rangle ,\langle 0.6, 0.4\rangle )\), and \((\langle 0.3, 0.2 \rangle ,\langle 0.6, 0.4\rangle )\), the score values are \(\mathfrak {S(\mathfrak {e_{12}})}={\mathfrak {S}} (\langle 0.9, 0.2 \rangle ,\langle 0.3, 0.1\rangle )=0.45\) \(\mathfrak {S(\mathfrak {e_{15}})}={\mathfrak {S}}(\langle 0.9, 0.4 \rangle ,\langle 0.6, 0.4\rangle )=0.35\) \(\mathfrak {S(\mathfrak {e_{17}})}={\mathfrak {S}}(\langle 0.3, 0.2 \rangle ,\langle 0.6, 0.4\rangle )=0.15\) Since the SV of \(\mathfrak {e_{17}}\) is the least one. This cost of (8, 9) value is added with \(cost_{LDFN}\). Now, \({\mathfrak {V}}_{new} = 1, 5, 7, 6, 10, 2,3,4,8\), \({\mathfrak {E}}_{new}=(1,5),(5,7), (6,7), (6,10),(1,2), (3,4),(4,5),(8,9)=\mathfrak {e_3},\mathfrak {e_{11}},\mathfrak {e_{13}}, \mathfrak {e_{14}}, \mathfrak {e_{1}}, \mathfrak {e_{6}} , \mathfrak {e_{8}}, \mathfrak {e_{17}}\) and \(cost_{LDFN}=(\langle 0.9999352, 0.028224 \rangle , \langle 0.982, 0.0000729\rangle )\oplus (\langle 0.3, 0.2 \rangle ,\langle 0.6, 0.4\rangle )= (\langle 0.99995464, 0.0056448 \rangle ,\langle 0.9928, 0.00002916\rangle )\).

  • Iteration 9: We select a node 9. node 7, and 10 can be accessed from the node 9. The corresponding arcs are \(\mathfrak {e_{16}}\), and \(\mathfrak {e_{18}}\), respectively. In order to compare the weights of these arcs \((\langle 0.5, 0.2 \rangle ,\langle 0.4, 0.3\rangle )\), and \((\langle 0.7, 0.3 \rangle ,\langle 0.5, 0.4\rangle )\), the score values are \(\mathfrak {S(\mathfrak {e_{16}})}={\mathfrak {S}} (\langle 0.5, 0.2 \rangle ,\langle 0.4, 0.3\rangle )=0.2\) \(\mathfrak {S(\mathfrak {e_{18}})}={\mathfrak {S}}(\langle 0.7, 0.3 \rangle ,\langle 0.5, 0.4\rangle )=0.25\) Since the SV of \(\mathfrak {e_{16}}\) is the least one. This cost of (7, 9) value is added with \(cost_{LDFN}\). Now, \({\mathfrak {V}}_{new} = 1, 5, 7, 6, 10, 2,3,4,8,9\), \({\mathfrak {E}}_{new}=(1,5),(5,7), (6,7), (6,10),(1,2), (3,4),(4,5),(8,9),(7,9)=\mathfrak {e_3},\mathfrak {e_{11}},\mathfrak {e_{13}}, \mathfrak {e_{14}}, \mathfrak {e_{1}}, \mathfrak {e_{6}} , \mathfrak {e_{8}}, \mathfrak {e_{17}},, \mathfrak {e_{16}}\) and \(cost_{LDFN}{=}(\langle 0.99995464, 0.0056448 \rangle ,\langle 0.9928, 0.00002916\rangle )\oplus (\langle 0.5, 0.2 \rangle , \langle 0.4, 0.3\rangle ){=}(\langle 0.99997732, 0.00112896 \rangle ,\langle 0.99568, 0.000008748\rangle )\).

Result

The iteration stops as \({\mathfrak {V}}-{\mathfrak {V}}_{new}=\phi \). Therefore, the final node set is \({\mathfrak {V}}_{new} = {\mathfrak {V}}\) and the final arc set is

$$\begin{aligned}&{\mathfrak {E}}_{new}=\{(1,2),(1,5),(3,4),(4,5),(5,7), (6,7),\\&\quad (6,10),(7,9),(8,9)\}=\{\mathfrak {e_{1}},\mathfrak {e_3}, \mathfrak {e_{6}} ,\\&\mathfrak {e_{8}},\mathfrak {e_{11}},\mathfrak {e_{13}}, \mathfrak {e_{14}}, \mathfrak {e_{16}},\mathfrak {e_{17}}\}. \end{aligned}$$

The distance value of the minimum spanning tree is

$$\begin{aligned}&{\mathfrak {S}}(\langle 0.99997732, 0.00112896 \rangle ,\\&\quad \langle 0.99568, 0.000008748\rangle )=0.9972598 \end{aligned}$$

The MSTG is shown in Fig. 4.

We can see that the LDF-MST influence of wireless charging on longevity by analyzing the simulation data. In fact, we presented a method using a mathematical prototypical model that is an up-gradation on prevailing wireless charging techniques. We have extended the life-time of a sensor network using this approach.

Fig. 4
figure 4

The linear Diophantine fuzzy graph (LDFDG)-\({\mathfrak {G}}\)

Contingent study

The examination of contingency for the proposed method with existing techniques is covered in this part. Table 4 shows a comparison of the outcomes obtained using the conventional and new techniques.

Table 4 Comparison of LDFS with crisp and related fuzzy models

Further discussion

The results of the work have been expanded to a linear Diophantine fuzzy environment. As an extension of fuzzy, intuitionistic fuzzy, Pythagorean fuzzy graphs, we proposed the notion of trees in the LDF environment. Linear Diophantine fuzzy graphical models provide the user greater precision, flexibility, and compatibility for representing uncertainty in a wide range of combinatorial scenarios. On linear Diophantine fuzzy graphs, we developed and proved a number of basic concepts such as bridges, cut vertices, cycles, trees, and forests.

However, in this work, we examined the linear Diophantine fuzzy graph-based operational rules to deal with the ambiguity in the data, which would reduce information loss throughout the analysis. Furthermore, the proposed LDF-Prim algorithm is capable of dealing with graph theory (minimum spanning tree) problems. Furthermore, the main factor of the vertex and edge sets is obtained from the SF measure for the LDFS elements, where the arc weights are expressed in terms of LDFN. Finally, it is studied from the representation of the LDF score function, LDF sum operations, and LDF-PA are the generalization of the existing operators and algorithms. As a result, the suggested theorems and techniques are more generic, consistent, and provide more information to address GT issues in an LDFS context. Furthermore, the study defined and illustrated the concept of isomorphism between Pythagorean fuzzy graphs using a numerical example. Furthermore, the study defined and illustrated the concept of Prim’s algorithm amongst linear Diophantine fuzzy graphs using a numerical example.

Conclusion

There are several applications for linear Diophantine fuzzy graphs in computer science, networks, and route problems. The edge connectivity idea in LDFG is a fundamental concept for comprehending the links of connectivity between two computer structure. The results of the work have been expanded to a linear Diophantine fuzzy environment. As an extension of fuzzy, intuitionistic fuzzy, Pythagorean fuzzy graphs, we proposed the notion of trees in the LDF environment. Linear Diophantine fuzzy graphical models provide the user greater precision, flexibility, and compatibility for representing uncertainty in a wide range of combinatorial scenarios. On linear Diophantine fuzzy graphs, we developed and proved a number of basic concepts such as bridges, cut vertices, cycles, trees, and forests. However, in this work, we examined the linear Diophantine fuzzy graph-based operational rules to deal with the ambiguity in the data, which would reduce information loss throughout the analysis. Furthermore, the proposed LDF-Prim algorithm is capable of dealing with graph theory (minimum spanning tree) problems. Furthermore, the main factor of the vertex and edge sets is obtained from the SF measure for the LDFS elements, where the arc weights are expressed in terms of LDFN. Finally, it is studied from the representation of the LDF score function, LDF sum operations, and LDF-PA are the generalization of the existing operators and algorithms. As a result, the suggested theorems and techniques are more generic, consistent, and provide more information to address GT issues in an LDFS context. we created an algorithm (LDF-PA) that allows us to give more energy to the sensor network while it is functioning. In reality, the primary objective was to increase the network lifespan, which is why a lifetime-effective architecture was required. We choose a minimally spanning tree. In our system, energy was delivered to the sensor nodes through a mobile robot outfitted with a Wi-Fi charger. In summary, we were able to analyze the suggested system’s performance, and our LDF Prim’s algorithm allowed us to increase the lifetime of the network, which was our initial objective for this work.

Other real-world issues will be solved using linear Diophantine Hesitant fuzzy tree, LDF-rough tree, LDF-graph coloring in the future. Other environmental studies may be expanded to use LDFT. We expect that our findings will be useful to scholars working in artificial intelligence, information fusion, machine learning, neural networks, media, pattern recognition, and robotics.