Lifetime prolongation of a wireless charging sensor network using a mobile robot via linear Diophantine fuzzy graph environment

Edge networking plays a major part in issues with computer networks and issues with the path. In this article, in linear Diophantine fuzzy (LDF) graphs, we present special forms of linear Diophantine fuzzy bridges, cut-vertices, cycles, trees, forests, and introduce some of their characteristics. Also, one of the most researched issues in linear Diophantine fuzzy sets (LDFS) and systems is the minimum spanning tree (MST) problem, where the arc costs have linear Diophantine fuzzy (LDF) values. In this work, we focus on an MST issue on a linear Diophantine fuzzy graph (LDFG), where each arc length is allocated a linear Diophantine fuzzy number (LDFG) rather than a real number. The LDFN can reflect the uncertainty in the LDFG’s arc costs. Two critical issues must be addressed in the MST problem with LDFG. One issue is determining how to compare the LDFNs, i.e., the cost of the edges. The other question is how to calculate the edge addition to determine the cost of the LDF-MST. To overcome these difficulties, the score function representation of LDFNs is utilized and Prim’s method is a well-known approach for solving the minimal spanning tree issue in which uncertainty is ignored, i.e., precise values of arc lengths are supplied. This technique works by providing more energy to nodes dependent on their position in the spanning tree. In addition, an illustrated example is provided to explain the suggested approach. By considering a mobile charger vehicle that travels across the sensor network on a regular basis, charging the batteries of each sensor node.


Introduction
Clustering, data mining, image capture, picture segmentation, and networking are just a few of the many uses of graph theory in computer science. For example, a data structure, perhaps constructed in the shape of a tree, and the corresponding network topologies can be modeled by adopting graph ideas. The uttermost graph coloring idea is used in system's resource allotment and scheduling. The graph theory ideas of walks, paths, and circuits are employed in the database design principles, traveling salesman problem, and resource networking. This results in the creation of novel methods and theorems that may be utilized in a wide range of applications. In recent times, we have aided in the development of multihop wireless networks. With diverse capacities, features, and intended applications such as environmental chores or terrain surveillance. These types of networks are self-organized and are made up the vast majority of spatially distributed autonomous nodes with limited assets (computing ability, transmission potentiality, cache, ...) that broadcast perceptional information to the base station (BS) or sink. The major restrictions faced in these types of networks are frequently connected to the energy problem. Despite this, numerous methods and protocols have been created to bypass these constraints. The majority of them seek to make the best use of the scanty energy available at one and all node, each of two for collecting tasks or for data aggregation and path finding.
The fuzzy set (FS), presented by Zadeh [51] in 1965, is a concept that has an impact on graph theory. Graph theory in fuzzy environment is gaining more utilization in designing real-time situations where the quantity of data intrinsic in the structure fluctuates with varying measures of accuracy. Fuzzy models are gaining popularity as they attempt to reduce the disparities among classical digital prototypes used in engineering, technology, and research and symbolic prototypes used in expert systems [23,26,30,33,44,47,53,54].
Zadeh's fuzzy relations [52] served as the foundation for Kaufmann's original concept of a fuzzy graph [25]. Rosenfeld [42] established the fuzzy analogues of numerous fundamental graph-theoretical notions, including as cut vertices, bridges, cycles, and trees. Bhattacharya [11] discussed fuzzy graphs (FG), fuzzy trees where defined by Sunitha and Vijayakumar [45]. Bhutani and Rosenfeld [12] established the ideas of strong edges, fuzzy end vertices, and geodesics in fuzzy graphs (FG) describes the many forms of edges in a FG. Atanassov [10] defined intuitionistic fuzzy graphs (IFG) along with intuitionistic fuzzy relations. In this paper, Parvathi et al. [34,36] investigated IFGs and intuitionistic fuzzy shortest hyperpaths in a network. Arcs in IFGs have been described by Karunambigai et al. [24]. Many topics have been explored by Akram et al. [1,2,4], including strong IFGs, intuitionistic fuzzy hypergraphs, and metric features of IFG. Later, in 2013 and 2014, Yager et al. [49,50] defined the notion of Pythagorean fuzzy sets (PyFS) as a useful technique for dealing with/modeling uncertainty or ambiguous information in real-world settings. Verma et al. [48] in 2018 defined the concept of Pythagorean fuzzy graph which got several researchers to work in this field [3,5,6].
A graph is used to represent the key MST issues. Thus, the vertices of the network represent the objects (points) where the users who require the facility are located, and the arcs indicate the presence of a specific relationship between the vertices (for instance, roads joining cities). In general, classical graphs depict consistent circumstances in which the objects of demand (points) and the relations (links) connecting them are precisely known. The traditional graph model does not adequately depict issues if there is ambiguity in the characterization of the items or in the associations between the items, or in both. To set out those uncertain issues, the fuzzy graph [17,43] is more exact, adaptable, and compatible. Fuzzy graphs are used in a variety of applications, including the shortest path issue, traffic light control, computer networks, pattern recognition, graph coloring, decision making, automata, and expert systems. Many researchers have investigated a variety of topics in order to build an efficient method for the basic MST issue. MSTs are also used in more sophisticated applications such as data storage, statistical cluster analysis, voice recognition, and image processing Because of the tremendous expansion of telecommunication networks over the last few decades, network applications of MSTs have secured a substantial deal of recognition. The MST issue, for example, can mimic the transmitting issue, in which the identical message must be delivered to all nodes in the network (one to all). In distributed situations, the MST is also the minimal routing tree for message aggregation (all to one). Furthermore, in some multi-cast routing protocols [14,41], the MST is an efficient and dependable method of multi-casting data from a start node to a set of destination nodes. In most situations, the arc costs are believed to be fixed, however this assumption may be incorrect in real-world applications and the arc weights vary with time indeed For example, network connectivity may be impacted by interferences, congestions, collisions, or other causes. As a result, the bandwidths of these links, represented by arc lengths in the communication network graph, are non deterministic, i.e., unpredictable. Although the costs of the arcs in an MST issue are assumed to be real values in traditional graph theory, in practice they are not, however, parameters that are not inherently precise (i.e., demands, capacities, costs, time). Almost every application of the MST problem has uncertainty. In general, uncertainty is inextricably linked to the measurement of arc weights that are not precisely known. To deal with the uncertainty of the arc weights, several studies [7,31] employed random variables. The stochastic minimal spanning tree problem is the name given to this sort of MST problem. The main issue with such stochastic minimal spanning tree methods is that they are only useful if the probability distribution function of the arc weight is known. While this may not be the case in practical implementations of the MST problem. In these circumstances, using fuzzy variables to describe the MST issue is perfectly acceptable, and the fuzzy minimal spanning tree (FMST) problem emerges naturally.
The FMST has been the subject of several publications [15,55]. Chang and Lee [13] then proposed three techniques for ranking fuzzy arc weights of spanning trees hinge on the global survival ranking indicator. Almeida et al. [15] defined the fuzzy parametrized MST and developed an rigorous method to solve it. Researchers also presented an evolutionary method for determining the MST issue with fuzzy parameters that is based on probability theory and fuzzy set theory. Liu [27,28] presented the credibility theory as a fuzzy ranking technique, which included credibility measure, pessimistic value, and anticipated value. Gao and Lu [21] investigated the fuzzy quadratic MST issue using credibility theory and structured it as an anticipated value model, dependent-chance programming, and chanceconstrained programming based on distinct decision criteria.
Ranking of fuzzy numbers (FN) is a key component in the MST issue in a fuzzy environment. Because FNs reflect unknown numeric values, there is inherent ambiguity in com-paring FNs, i.e., it is extremely difficult to determine if a FN is larger or smaller than others. Numerous scholars [8,37] have investigated the ranking of FNs. For ranking the FNs, we employ canonical representation of operations on triangular fuzzy numbers (TFNs) based on the graded mean integration representation technique. Each FN, as well as the result of addition and multiplication of two FNs, may be expressed as a crisp (real) number using this approach. This approach is used in a variety of applications, including portfolio selection, airline service quality evaluation, product adoption, fuzzy shortest path issue, and efficient network selection in heterogeneous wireless networks.
Linear Diophantine fuzzy sets are introduced by Riaz and Hashmi et al. in [38,40] which are the generalization of FSs [51] and IFSs [9]. The linear Diophantine fuzzy sets has umpteen number of applications in automata theory, computer science, engineering, graph theory, life sciences, management sciences, medical field and robotics. Recently in 2021, Riaz et al. [39] extended their study in linear Diophantine fuzzy graph (LDFG) theory. Linear Diophantine fuzzy graphs has got several applications in information technology such as clustering, network analysis, and image segmentation problems. In this paper we introduced the concepts of LDFbridges, LDF-cycles, LDF-trees, and LDF-MST section on the basis of cost of arc relativity.
Motivation and Objective: The order, size, and degree of FG were discussed, which has got a boom in the recent times. The order, size and degree of IFG was discussed by Gani [20]. Cycles and co-cycles was introduced and investigated by Mordeson and Nair [32]. Sunitha and Vijaykumar [46,47] also introduced the definition of complement of a FG, and also investigated the properties of fuzzy tree, fuzzy bridges, and fuzzy cut vertex and procured several applications in metric spaces.
One of the uttermost significant and acclaimed combinatorial inflation issues in classical graph theory is the minimal spanning problem (MST). It may be found in a wide range of applications, including cluster analysis, communications, image processing, logistics, transportation, telecommunication, and wireless networks. This motivated us to propose the current research work. Many of the approaches cited above got a universal limitation from the motion controller viewpoint: the parametrization helps us to overcome these limitations. Hence we introduced and studied the characteristics of LDF-Tree. Furthermore, we studied LDF-MST via linear Diophantine fuzzy Prim's algorithm has been studied with an application in mobile robot charging system in this work.
The proposed technique enables vertices (nodes) to harvest a certain amount of energy based on their location in the LDF-MST and the number of packets they send or receive into the network. This energy may then be delivered to the nodes by a robot that passes through all of the nodes and transmits this additional energy utilizing wireless charging technology.
The main objectives of this manuscript are as follows: (1) Along with its stunning characteristic of a widespread portrayal space for admissible pairs, Linear Diophantine fuzzy set (LDFS) theory outperforms intuitionistic fuzzy set (IFS), Pythagorean fuzzy set (PyFS), and qrung orthopair fuzzy set (q-ROFS) theories in a vast area of ambiguous and imprecise information via reference parameters. (2) The satisfaction and dissatisfaction grades in decision analysis are insufficient for analyzing things in the universe. The provision of reference parameters gives decision-makers more leeway in picking satisfaction and dissatisfaction grades. The LDFS, together with the accompanying reference parameters, provides a reliable method for modeling uncertainty. to demonstrate the value of the proposed technique. Furthermore, a small-scale wireless charging network, by considering a mobile charger vehicle that travels across the sensor network on a regular basis, charging the batteries of each sensor node is given to demonstrate the potential application of the suggested approach.

Wireless Charging System (WCS):
A technique that allows electrical energy to be distributed without the usage of is called hardware Wireless charging. This method is meant to be utilized for supplying difficultto-reach areas. It is based on an electromagnetic field that is used to transfer energy from a transmitter to a receiver. The procedure entails transferring energy to an electrical device through inductive coupling. This energy may subsequently be used to recharge the batteries or even to power the device. This energy may then be used by the gadget to recharge the batteries or even to power the device. WCSs are rapidly being investigated by researchers, and consumer uses, such as charging mobile phones, have emerged in recent years. There are several methods for wireless power transmission, including magnetic inductive coupling, radiative transfer, and strong magnetic coupling.
In this study, we propose a mobile robot charger that travels regularly inside the sensor network region and wirelessly charges each sensor node's battery.
The rest of this paper is organized as follows: Sect. 2 contains some Preliminary Notes of FSs, IFSs, LDFSs, LDF operations, LDFGs and Wireless Charging System. Section 3 introduces the concept of LDF-tree, LDF-cycle, LDF-bridges, LDF-cut-vertices, and LDF-forests and a few significant operations with some fundamental properties. Section 4 is dedicated to the construction of an algorithm for LDF-MST. Section 5 we propose the concept of LDF-MST to pick an appropriate optimal solution for mobile robot charger system, with the aid of proposed linear Diophantine fuzzy Prim's algorithm. Finally, Sect. 6 summarizes the result of the study and future research scope directions.

Preliminary notes
This section presents a brief review from [29,38,39,49,50] of intuitionistic fuzzy sets, Pythagorean fuzzy sets, linear Diophantine fuzzy sets, and linear Diophantine fuzzy graphs which will be used in sequel.
Definition 1 [29] A IFS I on the universe Q is defined by: where m, n : Q → [0, 1] are the membership grade (MG) and non-membership grade (NMG) respectively. The condition for a IFS is that m + n ≤ 1. A doublet set (m, n) is said to be an intuitionistic fuzzy number (IFN).
Definition 2 [49,50] A PyFS P on the universe U is defined by: where m, n : P → [0, 1] are the MG and NMG respectively. The constraint for a PyFS is that m 2 + n 2 ≤ [0, 1]. A doublet set (m, n) is said to e a Pythagorean fuzzy number (PyFN). Definition 3 [38] A LDFS L is an object on the non-empty reference set Q of the form: In describing or classifying a specific system, these comparison parameters will help. By moving the physical perception of these parameters, we can categorize the system. They expand the space used in LDFS for grades and lift limitations on them. The refusal grade is defined as Definition 5 [38] Let T D = ( m D , n D , α D , β D ) be a LDFN, then (i) The score function (SF) on D can be defined by The accuracy function (AF) on D can be defined by where T D (Q) is the assembling of all LDFNs on Q i ∈ be an assembling of LDFNs on Q and X > 0 then Definition 7 [38] Let two LDFNs be T D 1 and T D 2 then by finding the values of SF and AF we can effortlessly compare these two LDFNs as: is called a linear Diophantine fuzzy graph (LDFG) on an underlying set V, where M is a linear Diophantine fuzzy set in V and N is a linear Diophantine fuzzy relation on V × V such that where m is known as the satisfaction grade, n is known as the dissatisfaction grade and α, β are the reference parameters fulfills the condition 0 where M is a LDF node (vertex) set and N is a LDF arc(edge) set of G.

Linear Diophantine fuzzy bridges and linear Diophantine fuzzy cutnodes
In path and network concerns, the principle of connection plays an important role, we present the rudimentary approach of LDF-bridge, LDF-cycle, LDF-cut vertex, and LDF-tree in linear Diophantine fuzzy graph here.
The support of T D is denoted and defined by The height of T D denoted and defined by The depth of T D denoted and defined by  Table 1 and be LDFSs of We see that the LDFG has no bridges of any of five types.  Table 2 and be LDFSs of The

Theorem 1 The edge ab is a LDF-bridge iff ab is bridge for
Proof Presume that ab is a full bridge then ab is a bridge h(N)]. It will be subsequent to ab is bridge for G * . In Hence ab is a full LDF-bridge.

Theorem 2
If the cycle of crisp graph G * does not contains the edge ab, then the circumstances listed below are comparable.
Proof For an edge ab is bridge of G * and ab / ∈ a cycle of G * . Thence by theorem 3.1, (i) ⇒ (iii) and (iii) ⇒ (ii) are evident. consequent, if (ii) holds, then ab is bridge for G ξ ,

Theorem 3 In a graph G we consider an arc ab, ab is a LDF-bridge iff ab is a weak LDF-bridge.
Proof Presume that ab is a weak LDF-bridge, then ∃ ξ ∈ (0; h(N)] so that ab is bridge for G ξ . Thence by cutting off ab it disconnects G ξ , so either path from a to b in G acquire an arc uv with m N (uv) < ξ 1 , n N (uv) > ξ 2 , α N (uv) < ξ 3 , β N (uv) > ξ 4 . Hence by the removal of the arc ab implies that m ∞ Hence ab is a LDF-bridge. Contrarily: hypothesize that ab is a LDF-bridge, then ∃ an edge uv so that by cutting off ab ⇒ m ∞ Hence ab is on all strongest path connecting u and v and in fact ab implies that m N (uv) ≤ ξ 1 , n N (uv) ≥ ξ 2 , α N (uv) ≤ ξ 3 , β N (uv) ≥ ξ 4 , this value. Thus there does not exist a path other than ab connecting a and b in G (m N (ab),n N (ab),α N (ab),β N (ab)) , else this other path without ab would be of strength ≤ m N (ab), ≥ n N (ab), ≤ α N (ab), ≥ β N (ab) would be part of a path joining u and v of strongest length, inimical to fact that ab is on every such path. So ab is on every such path. Hence ab is a bridge of G (m N (ab),n N (ab),α N (ab),β N (ab)) and 0 (i) The node a ∈ V is said to be a cut node, if a is a cut node of G * = (M * ; N * ).
where uv ∈ V, m , n , α , β are m, n, α, β are restricted to V × V − {ac, ca : c ∈ V}. (iii) The node a ∈ V is called a partial linear Diophantine fuzzy cut node if a is a cut node for G ξ for every ξ ∈ (d(N), h(N)] ∪ {h(N)}. (iv) The node a ∈ V is called a weak LDF-cut node if there exists ξ ∈ (0, h(N)]. such that a is a cut node of G ξ . (v) The node a ∈ V is called a full LDF-cut node if a is a cut node for G ξ if there exists ξ ∈ (0, h(N)].

Remark 2
For a G, the following holds (i) If c ∈ V is a identical node of no less than two LDFbridges, then c is a LDF cut node. (ii) If G is a complete LDFG, then -it has no LDF-cut node.

Theorem 4 The LDFG G is a full LDF-forest if and only if G is forest.
Proof If the LDFG G is a full LDF-forest, then G * is a forest. contrarily, if G is forest, then G * is a forest this implies that G ξ , ∀ξ ∈ (0, h(N)], considering the condition that each G ξ is a subgraph of G * , hence it is proved.

Theorem 5 If G is a LDF-forest, the edges of H are just LDFbridges of G.
Proof An arc ab / ∈ H is assuredly not a LDF-bridge. By reason of m N (ab) < m ∞ N (ab), n N (ab) > n ∞ N (ab), α N (ab) < α ∞ N (ab), β N (ab) > β ∞ N (ab) hence if part is proved. Conversely, let us take ab be an edge in H. If it is not a LDF-bridge, we have a path from a to b, not presume ab, of strength ≥ m(ab),≤ n(ab), ≥ α(ab), ≤ β(ab). This path must involve arcs not in H. Since H is a LDF-forest and has no cycles. Nevertheless, by definition, either such arc (u 1 v 1 ) can be restored by a path p 1 in H of strength ≥ m(uv),≤ n(uv), ≥ α(uv), ≤ β(uv). Now p cannot involve (ab). Following all its arcs are strictly stronger than m N (uv) < m ∞ N (ab), n N (uv) > n ∞ N (ab), α N (uv) < α ∞ N (ab), β N (uv) > β ∞ N (ab). Hence by restoring every arc (u 1 v 1 ) with p 1 . We can put up a path in H from a to b that have not yet presume ab giving us a cycle in H, which is a conflict.

Theorem 6 The LDF G have not yet consist of a cycle whose arcs are of strength h(N) if and only if G is weak LDF-forest.
Proof If Suppose G have not yet consist of a cycle whose arcs are of strength h(N); then G h (N) have not yet consist of a cycle and thus it is forest. Conversely, assume that G has a cycle whose arcs are of strength h(N); then G ξ , ∀ξ ∈ (0, h(N)] that have this cycle and so is not a forest, hence G is not a weak LDF-forest.
Definition 21 (i) The LDFG G is called a tree if G * is a tree.
(ii) The LDFG G = (M, N) is called a LDF-tree if G has a LDF-spanning subgraph tree The LDFG G is said to be a weak LDF-tree if there exist ξ ∈ (0, h(N)] such that ab is a tree of G ξ . (iv) The LDFG G is said to be a full LDF-tree if ab is a tree for G ξ , ∀ξ ∈ (0, h(N)].

LDF-minimum spanning tree
A spanning tree (ST) of a connected graph G is a connected acyclic maximum subgraph that contains all of G's nodes. Every spanning tree contains precisely n − 1 arcs, where n is the number of graph G nodes. A minimal spanning tree (MST) problem is to find a spanning tree with the shortest sum of its arc lengths. The traditional MST issue takes into account the actual weights associated with the graph's arcs. In real-world circumstances, however, the arc lengths may be inaccurate due to a lack of data or incompleteness.

LDF-MST Prim's algorithm
Prim's algorithm is a avaricious and well-known technique used to calculate the MST of a weighted linked undirected classical network. This technique encounters a subset of the arcs that form a tree that contains each-and-every node while minimizing the overall cost of all the arcs in the tree. In 1930, Czech mathematician Vojtech Jarnk [22] proposed this technique. Prim [35] found it separately in 1957, and Edsger Dijkstra [19] rediscovered it in 1959. As a result, it is also known as the Jarnk algorithm, the DJP algorithm, or the Prim Jarnk algorithm. The technique gradually expands the size of a tree, one edge at a time, beginning with a single node and progressing until it encompasses all nodes.
Step 1. Set V new = {a}, where a is an random node (start node) from V and E new = {φ}.
Step 2. Compute an edge (a; b) with minimum weight such that a ∈ V new and b / ∈ V new . If several arcs are with the identical weight, any one of them can be selected.
Step 3 . Add a to V new and (a; b) to E new .
Step 4. If V − V new = {φ}, then stop and return to V new and E new . MST is described by V new and E new . Otherwise, repeat the Steps 2 and 3.

Problem formulation for LDF-MST
Consider a linear Diophantine fuzzy graph as an appropriate approach to deal with these imprecision's. Consider the following linear Diophantine fuzzy graph G. Tak Subject to the constraint e∈E a e = n − 1, Here, C e is a LDFN that expresses the length of the edge e and in Eq. (1) is the sum of LDFNs using score function and sum representation of LDFNs are defined in Definition 5 and Definition 6 respectively. Equation (2) assures that the number of edges in the LDF-MST is n − 1. In Eq. (3), we utilize the cut-set of a subset of vertices of s, i.e., the edges that have one vertex in the set s and the other vertex not in the set s. As a result, a ST must contain a minimum one edge in the cut set of any subset of vertices.

Proposed Prim's algorithm for the LDF-MST and its cost
The Prim's method is a well-known approach and works greedily for solving the minimal spanning tree (MST) problems. To handle MST in a linear Diophantine fuzzy environment, a LDF variant of Prim's method is proposed in this section. In a linear Diophantine fuzzy context, we address the MST issue of each arc on a graph with arc length assigned by a linear Diophantine fuzzy integer. Because it involves LDFN comparison and addition, this issue differs from the traditional MST, which only accepts real values. The modified score function of LDFNs is utilized for LDFN comparison and addition. We provide an LDF variant of the traditional Prim's algorithm to solve the MST problem using LDFNs based on the idea of the score function of LDF numbers.
In this algorithm, we use several variables that are required for clarification. An undirected connected LDFG G =  (a; b) is the distance intervening the two nodes a and b. A random node v 1 is picked from the graph G. Using the score function representation of LDFNs, we calculate the P(cost(e i )) value for each edge e i , i = 1, 2, 3, . . . , |E| in the LDFG G. Begin with vertex v 1 and work your way to its nearest neighbor, say v 2 . To locate the nearest neighbor, we must first locate all of the connecting edges with v 1 . Then, amongst all of the connected edges of v 1 , choose the one with the minimum P(cost(v 1 ; v i )) value, i.e., (v 1 ; v i ). Consequently, we apply the same approach to identify the nearest neighbor for additional graph vertices. Consider v 1 and v 2 as a single subgraph and connect it to its nearest neighbor. Let's call this new node v k . Consider the tree with nodes v 1 , v i , and v k as a single subgraph and repeat until all n nodes are linked by n − 1 arcs. Algorithm 1 and Fig. 1 depicts the suggested linear Diophantine fuzzy Prim algorithm's pseudo-code and flow diagram, respectively.
To represent the LDFG in our proposed approach, we utilize an adjacency matrix. Based on the notion of score function representation of LDFN, the linear searching approach is applied to identify the least weight arc. The LDFNs addition procedure is used to calculate the cost of the MST. The

Numerical example
Previous research [15] have proposed some wireless charging methods for sensor networks. Our system will use the same approach and be made up of three primary components, as indicated in Fig. 2: -Mobile charger is a mobile robot that takes a wireless charger (MC). -Each node in a wireless sensor network is equipped with a wireless power receiver. -The energy station is placed in the base station and is responsible for calculating the necessary energy for each node and providing it to the robot along with their locations.
In our structure, sensor nodes not only execute their original function of sensing data from their surroundings, but they can also compute the tarrying residual energy of the energy and the battery required for transmission to the parent node. This data is subsequently sent to the sink and aggregated end route to save communication overhead. Data on sensor energy are then provided by the power station that is directly connected to the sink. This power station computes the network's total remaining energy and compares it to a specified threshold. If the overall energy goes below this level, the station decides to deliver more energy to all nodes based on their MST locations. The MC is given the quantity of the extra energy for each node as well as the optimal path for energy distribution from the base station.
Before allocating energy to a sensor node, the base station must calculate how much energy the sensor node will require for subsequent broadcasts. This additional energy will be calculated based on the node's position in the MST. In MST, position refers to the distance between a node and its parent, Find an arc (a; b) with minimum P(cost(a; b)) value a ∈ V new and b / ∈ V new ; 7.
cost L DF N ← cost L DF N ⊕ cost(a; b);// as described in Definition 6. 8. as well as the number of hops to the root. The key aim here is to minimize the cost but to maximize the energy allocated to node i in order to maximize the number of transmissions, which can be written as a function of the node's starting energy in terms of LDFN and the needed energy for each transmission are also in terms of LDFN.

Graphical representation of the wireless charging systems
The wireless charging system of the LDF-MST problem is given in this section to show the suggested approach. Take into account the LDF network in Fig. 2, which contains ten nodes and sixteen arcs. Figure 3 depicts the lengths of all arcs  (Table 3).

Result
The iteration stops as V − V new = φ. Therefore, the final node set is V new = V and the final arc set is The MSTG is shown in Fig. 4. We can see that the LDF-MST influence of wireless charging on longevity by analyzing the simulation data. In fact, we presented a method using a mathematical prototypical model that is an up-gradation on prevailing wireless charging techniques. We have extended the life-time of a sensor network using this approach.

Contingent study
The examination of contingency for the proposed method with existing techniques is covered in this part. Table 4 shows a comparison of the outcomes obtained using the conventional and new techniques.

Further discussion
The results of the work have been expanded to a linear Diophantine fuzzy environment. As an extension of fuzzy, intuitionistic fuzzy, Pythagorean fuzzy graphs, we proposed the notion of trees in the LDF environment. Linear Diophantine fuzzy graphical models provide the user greater precision, flexibility, and compatibility for representing uncertainty in a wide range of combinatorial scenarios. On linear Diophantine fuzzy graphs, we developed and proved a number of basic concepts such as bridges, cut vertices, cycles, trees, and forests. However, in this work, we examined the linear Diophantine fuzzy graph-based operational rules to deal with the ambiguity in the data, which would reduce information loss throughout the analysis. Furthermore, the proposed LDF-Prim algorithm is capable of dealing with graph theory (minimum spanning tree) problems. Furthermore, the main factor of the vertex and edge sets is obtained from the SF measure for the LDFS elements, where the arc weights are expressed in terms of LDFN. Finally, it is studied from the representation of the LDF score function, LDF sum operations, and LDF-PA are the generalization of the existing operators and algorithms. As a result, the suggested theorems and techniques are more generic, consistent, and provide more information to address GT issues in an LDFS context. Furthermore, the study defined and illustrated the concept of isomorphism between Pythagorean fuzzy graphs using a numerical example. Furthermore, the study defined and illustrated the concept of Prim's algorithm amongst linear Diophantine fuzzy graphs using a numerical example.

Conclusion
There are several applications for linear Diophantine fuzzy graphs in computer science, networks, and route problems. The edge connectivity idea in LDFG is a fundamental concept for comprehending the links of connectivity between two computer structure. The results of the work have been expanded to a linear Diophantine fuzzy environment. As an extension of fuzzy, intuitionistic fuzzy, Pythagorean fuzzy graphs, we proposed the notion of trees in the LDF environment. Linear Diophantine fuzzy graphical models provide the user greater precision, flexibility, and compatibility for representing uncertainty in a wide range of combinatorial scenarios. On linear Diophantine fuzzy graphs, we developed and proved a number of basic concepts such as bridges, cut vertices, cycles, trees, and forests. However, in this work, we examined the linear Diophantine fuzzy graph-based operational rules to deal with the ambiguity in the data, which would reduce information loss throughout the analysis. Furthermore, the proposed LDF-Prim algorithm is capable of dealing with graph theory (minimum spanning tree) problems. Furthermore, the main factor of the vertex and edge sets is obtained from the SF measure for the LDFS elements, where the arc weights are expressed in terms of LDFN. Finally, it is studied from the representation of the LDF score function, LDF sum operations, and LDF-PA are the generalization of the existing operators and algorithms. As a result, the suggested theorems and techniques are more generic, consistent, and provide more information to address GT issues in an LDFS context. we created an algorithm (LDF-PA) that allows us to give more energy to the sensor network while it is functioning. In reality, the primary objective was to increase the network lifespan, which is why a lifetime-effective architecture was required. We choose a minimally spanning tree. In our system, energy was delivered to the sensor nodes through a mobile robot outfitted with a Wi-Fi charger. In summary, we were able to analyze the suggested system's performance, and our LDF Prim's algorithm allowed us to increase the lifetime of the network, which was our initial objective for this work.
Other real-world issues will be solved using linear Diophantine Hesitant fuzzy tree, LDF-rough tree, LDF-graph coloring in the future. Other environmental studies may be expanded to use LDFT. We expect that our findings will be useful to scholars working in artificial intelligence, information fusion, machine learning, neural networks, media, pattern recognition, and robotics.

Conflict of interest:
The authors declare that they have no conflicts of interest to report regarding the present study.
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecomm ons.org/licenses/by/4.0/.