Next Article in Journal
Resource Allocation in Multi-Objective Epidemic Management: An Axiomatic Analysis
Previous Article in Journal
A New Generalization of mth-Order Laguerre-Based Appell Polynomials Associated with Two-Variable General Polynomials
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Fuzzy Graph Hyperoperations and Path-Based Algebraic Structures

by
Antonios Kalampakas
College of Engineering and Technology, American University of the Middle East, Egaila 54200, Kuwait
Mathematics 2025, 13(13), 2180; https://doi.org/10.3390/math13132180
Submission received: 28 May 2025 / Revised: 27 June 2025 / Accepted: 2 July 2025 / Published: 3 July 2025
(This article belongs to the Special Issue Advances in Hypercompositional Algebra and Its Fuzzifications)

Abstract

This paper introduces a framework of hypercompositional algebra on fuzzy graphs by defining and analyzing fuzzy path-based hyperoperations. Building on the notion of strongest strong paths (paths that are both strength-optimal and composed exclusively of strong edges, where each edge achieves maximum connection strength between its endpoints), we define two operations: a vertex-based fuzzy path hyperoperation and an edge-based variant. These operations generalize classical graph hyperoperations to the fuzzy setting while maintaining compatibility with the underlying topology. We prove that the vertex fuzzy path hyperoperation is associative, forming a fuzzy hypersemigroup, and establish additional properties such as reflexivity and monotonicity with respect to α -cuts. Structural features such as fuzzy strong cut vertices and edges are examined, and a fuzzy distance function is introduced to quantify directional connectivity strength. We define an equivalence relation based on mutual full-strength reachability and construct a quotient fuzzy graph that reflects maximal closed substructures under the vertex fuzzy path hyperoperation. Applications are discussed in domains such as trust networks, biological systems, and uncertainty-aware communications. This work aims to lay the algebraic foundations for further exploration of fuzzy hyperstructures that support modeling, analysis, and decision-making in systems governed by partial and asymmetric relationships.
MSC:
05C72; 20N20; 08A72; 16Y80

1. Introduction

Graphs are powerful tools for modeling relationships and dependencies across diverse fields, including network analysis [1,2], transport optimization [3,4], natural language processing [5,6], pattern recognition [7,8,9,10], knowledge representation [11,12,13], liver disease analysis [14,15], neuroscience [16,17,18], and the construction of bioinformatics networks [19,20,21,22]. Algebraic hyperstructures were introduced by Marty in 1934 as a generalization of classical algebraic structures [23]. They were extensively explored by Corsini [24,25,26], and later by other authors [27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42]. The connection between algebraic hyperstructures and binary relations has been rigorously investigated [43,44,45,46,47,48,49,50,51,52,53,54], establishing a framework for representing and analyzing graph properties through hyperstructures [55,56,57,58,59,60,61,62,63,64]. In this direction, the introduction and investigation of algebraic hyperoperations deriving from directed graphs offer an integration of hypercompositional algebra with graph theory [65,66]. These graph hyperoperations exhibit characteristics dictated by the structure of their underlying graphs, which, in turn, define corresponding graph classes. This synergy provides novel insights and methodologies for analyzing complex graph properties [67,68,69], further enriching the study of graph theory through the lens of algebraic hyperstructures.
In this paper, we extend these ideas by examining fuzzy graph hyperoperations. The concept of fuzzy graphs, first introduced by Rosenfeld in 1975 [70], extends classical graph theory by incorporating fuzzy set theory to model uncertainty and imprecision in complex systems. A fuzzy graph is typically defined as a pair consisting of a fuzzy set of vertices and a fuzzy set of edges, with the constraint that the membership value of an edge cannot exceed the membership values of its connecting vertices [71,72]. By associating fuzzy membership values with nodes and edges, fuzzy graphs provide a robust framework for analyzing systems where interactions and elements exhibit inherent vagueness or ambiguity. This allows fuzzy graphs to represent partially connected vertices and varying strengths of relationships, making them particularly valuable in applications where traditional graph models fail to capture underlying complexities [73,74,75,76].
Fuzzy graphs have been applied across diverse domains, including social network analysis, bioinformatics, transportation systems, and more. In social network analysis, they model relationships with varying strength or certainty, such as trust or influence [77,78,79,80,81]. In medical diagnosis, fuzzy graphs help identify uncertain symptom-disease correlations [82]. In transportation systems, they facilitate traffic optimization by modeling routes with varying congestion levels or reliability [83]. Additionally, fuzzy graphs have been used in pattern recognition to identify complex structures [84,85] and in disease spread modeling to address uncertainties in transmission dynamics [86].
In this paper, we introduce hypercompositional structures on fuzzy graphs by extending classical path-based hyperoperations to a fuzzy framework. Building on the notion of strongest strong paths—those that are both strength-optimal and composed exclusively of strong edges—we define two types of fuzzy hyperoperations: a vertex-based and an edge-based fuzzy path hyperoperation. These operations generalize classical crisp hyperoperations and are compatible with fuzzy graph topology. The proposed framework allows us to reason algebraically about fuzzy connectivity and uncertainty-aware navigation in networks, providing a rich theoretical foundation for applications in social systems, biological regulation, communication networks, and medical diagnostics [74,75,76,77,78,79,81,82,86].
While classical fuzzy graph models typically focus on scalar-valued connectivity—such as determining the degree of reachability between two nodes using relational composition or α -cut-based adjacency—they often do not preserve intermediate structural information, nor do they support compositional reasoning over sets of paths or substructures. In contrast, the vertex-based and edge-based fuzzy path hyperoperations introduced in this paper generate fuzzy subsets of vertices or edges lying on strongest strong paths, enabling the algebraic manipulation of connectivity regions rather than scalar summaries. This set-valued perspective permits the formalization of algebraic operations that are closed, associative, and structurally meaningful, thereby integrating fuzzy graph theory with hypercompositional algebra. Additionally, our framework supports the construction of quotient graphs that preserve directional strength semantics and admit interpretation as condensed fuzzy systems, offering advantages in modular analysis and abstraction. These features distinguish the proposed model from traditional fuzzy connectivity approaches and motivate its development as a foundational tool for uncertainty-aware reasoning in complex networks.
In the introduced framework, we develop a comprehensive set of structural and algebraic properties for the associated fuzzy hyperoperations. In particular, for the vertex fuzzy path hyperoperation, we prove associativity, thereby establishing a fuzzy hypersemigroup over the vertex set. We demonstrate reflexivity and α -cut monotonicity, enabling threshold-sensitive reasoning. We characterize fuzzy strong cut vertices and edges, introduce a fuzzy distance function quantifying path strength, and analyze how these features behave under equivalence relations derived from mutual full-strength connectivity. By constructing quotient fuzzy graphs and establishing the closure properties of their equivalence classes, we derive coarse-grained models that preserve key connectivity semantics.
The paper is organized as follows. Section 2 reviews algebraic hyperstructures and classical graph hyperoperations. Section 3 extends these ideas to fuzzy graphs, defining fuzzy paths, strongest paths, and strongest strong paths. Section 4 introduces vertex- and edge-based fuzzy path hyperoperations and proves their key algebraic properties. Section 5 defines the mutual full-strength connectivity relation R V and studies the quotient fuzzy graph. Section 6 introduces a fuzzy distance function and examines its behavior on both the original and quotient graphs. Section 7 presents application scenarios, including trust networks and biological systems. Section 8 concludes the paper with a summary and future research directions.

2. Algebraic Background and Classical Graph Hyperoperations

We start with some necessary notions from hypercompositional algebra. Given a nonempty set V, a hyperoperation (hyperproduct) on V is a mapping
: V × V P ( V )
where P ( V ) denotes the powerset of V. As usual we set
( u , w ) u w .
We define the hyperproduct between two subsets U , W P ( V ) by
U W = u U , w W u w .
A hypergroupoid is a pair ( V , ) , where ★ is a hyperoperation on the set V. Following [37], a hypergroupoid ( V , ) is called
  • Nonpartial: If the hyperproduct u v is nonempty for all u , v V .
  • Degenerative: If u v = for all u , v V .
  • Weakly degenerative: If u v = for all u , v V , with u v .
  • Total: If u v = V for all u , v V .
  • Commutative: If, for all u , v V , it holds that u v = v u .
  • Weakly commutative: If, for all u , v V , it holds that u v v u .
A directed crisp graph (or simply graph) G = ( V , E ) consists of a set of vertices (nodes) V and a set of edges E V × V . A subgraph of such a graph G is a graph H = ( V H , E H ) with V H V and E H E , such that every edge in E H has both endpoints in V H .
Given a graph G = ( V , E ) , a path P inside G from a vertex v 0 to a vertex v m is a sequence of edges:
( v 0 , v 1 ) , ( v 1 , v 2 ) , , ( v m 1 , v m ) ,
such that for every i, it holds that ( v i , v i + 1 ) E . In this case, we say that the path has length m, and that the nodes v 0 , v 1 , , v m lie on the path P and similarly for the edges in the sequence. Note that nodes and edges may appear more than once in a path. Given a path P, we write v P and ( v i , v j ) P to express that vertex v and edge ( v i , v j ) lie on P, respectively. We denote a path P from v 0 to v m by
P : v 0 v m .
If all nodes appear at most once in a path, the path is called simple. A cycle is a path that starts and ends at the same node. The empty sequence ϵ is a cycle from u to itself, containing only u.
The set of all nodes that lie in a path from v 0 to v m is denoted by
p a t h ( v 0 , v m ) = { x x lies on a path from v 0 to v m } .
A graph G is called strongly connected if, for any two nodes v 1 and v 2 , there exists at least one path from v 1 to v 2 . A strongly connected subgraph of a graph G is called a Strongly Connected Component of G.
Given a graph G = ( V , E ) , the path hyperoperation (see [65,66,67,68,69]) is a mapping
G : V × V P ( V )
defined by
u G w = { v V v lies on a path between u and w } .
The hyperstructure ( V , G ) is called the path hypergroupoid corresponding to G.

3. Fuzzy Graphs and Strongest Strong Paths

In this section we extend the definition of directed graphs to introduce fuzzy directed graphs, which incorporate the concept of partial membership for nodes and edges.
Fuzzy sets generalize traditional (crisp) sets, which allow only binary membership values of 0 or 1—an element either entirely belongs to the set or does not belong at all. By contrast, fuzzy sets capture a continuum of membership, enabling the representation of uncertain or imprecise data.
Formally, a fuzzy set  A μ is defined as a nonempty crisp set A paired with a function μ : A [ 0 , 1 ] , known as membership function. For every element s A , the value μ ( s ) represents the membership grade of s in the fuzzy set. This grade indicates the degree to which the element belongs to the set, where μ ( s ) = 0 implies no membership, μ ( s ) = 1 implies full membership, and intermediate values reflect partial membership. From this definition it is clear that crisp sets are a special case of fuzzy sets.
If A μ is a fuzzy set and B A , then B μ denotes the fuzzy set obtained by taking the restriction of μ to B. Given a finite universal set A = { x 1 , , x n } , the fuzzy set A μ can be denoted as
{ μ ( x 1 ) / x 1 , , μ ( x n ) / x n } .
The set of all fuzzy sets that can be defined on a universe set A is denoted by Φ ( A ) . The support of a fuzzy set A μ is defined as the crisp subset of A containing all elements with a non-zero membership grade. Formally, the support of A μ , denoted as supp ( A μ ) , is given by
supp ( A μ ) = { s A μ ( s ) > 0 } .
In other words, the support of a fuzzy set includes all elements of the universe A that have a positive degree of membership.
The α -cut (or α -level set) of a fuzzy set A μ is a crisp subset of A containing all elements whose membership grades are greater than or equal to a given threshold α , where α [ 0 , 1 ] . The α -cut is a fundamental concept in fuzzy set theory, providing a way to analyze and approximate fuzzy sets using crisp subsets. It is particularly useful in applications where decision-making or reasoning is based on threshold levels. Formally, the α -cut of A μ , denoted as A μ α , is defined as
A μ α = { s A μ ( s ) α } .
and the strict  α -cut of A μ , denoted as A μ α ̲ , is
A μ α ̲ = { s A μ ( s ) > α } .
For α = 0 , the strict α -cut corresponds to the support of the fuzzy set, i.e.,
A μ 0 ̲ = supp ( A μ ) .
For any a , b [ 0 , 1 ] , we denote by a b the minimum of a and b and by a b their maximum.
A fuzzy directed graph (or simply fuzzy graph) [71] is a generalization of a directed crisp graph, where the nodes and the edges are characterized by membership functions that represent the degree of membership. Formally, a fuzzy graph is defined as a pair F = ( V μ , λ ) where
-
V is the set of vertices (nodes) of the graph.
-
μ : V [ 0 , 1 ] is the vertex membership function, which assigns to each vertex v V a membership grade μ ( v ) , indicating the degree to which v belongs to the graph.
-
λ : V × V [ 0 , 1 ] is the edge membership function, which assigns to each pair of vertices ( u , v ) V × V a membership grade λ ( u , v ) , indicating the degree of connectivity between u and v.
In addition, the following condition is required:
λ ( u , v ) min ( μ ( u ) , μ ( v ) ) u , v V ,
ensuring that the degree of membership of an edge cannot exceed the membership grades of its endpoints. Given a fuzzy graph F = ( V μ , λ ) , the set V × V together with the edge membership function λ , is called the edge set of F and is denoted by E λ .
Given a fuzzy graph F = ( V μ , λ ) , the underlying crisp graph of F is the graph F c = ( V c , E c ) , where V c = V is the underlying crisp vertex set and
E c = { ( x , y ) V × V λ ( x , y ) > 0 } ,
is the underlying crisp edge set. A fuzzy graph F = ( V μ , λ ) is called complete if λ ( x , y ) = μ ( x ) μ ( y ) for every x , y V .
Now we introduce the concept of a fuzzy path within a fuzzy graph. Given a fuzzy graph F = ( V μ , λ ) and two nodes v 0 , v k V , a fuzzy path P of length k, from the node v 0 to the node v k , is a sequence of edges
( v 0 , v 1 ) ( v 1 , v 2 ) ( v k 1 , v k ) ,
such that λ ( u i , u i + 1 ) > 0 for every i = 0 , , k 1 . We say that the vertices v 0 , , v k and the edges ( v 0 , v 1 ) , ( v 1 , v 2 ) , , ( v k 1 , v k ) belong to the fuzzy path P or, equivalently, that F contains them. The set of all fuzzy paths from v to u, inside a fuzzy graph F, is denoted by F p ( v , w ) . For every vertex u V , the empty sequence ε is a path from u to itself, containing only the vertex u and no edges.
Given a fuzzy graph F = ( V μ , λ ) and a set S V , a path in F S is path in F that does not contain any vertices from S, and similarly, given a set E V × V , a path in F E does not contain any edges from E.
The strength of a path P inside a fuzzy graph F = ( V μ , λ ) is denoted by s ( P ) , and it is the minimum membership grade among all of the edges of P, i.e.,
s ( P ) = i = 0 k 1 λ ( v i , v i + 1 ) .
The strength of connectedness between two nodes u and v of a fuzzy graph F is defined as the maximum of the strengths of all paths P F p ( u , v ) and is denoted by C o n F ( u , v ) . If no path exists between u and v, we set C o n F ( u , v ) = 0 .
A path P F p ( u , v ) of a fuzzy graph F is called a strongest path of F if s ( P ) = C o n F ( u , v ) . Equivalently, P is a strongest fuzzy path of F if and only if
s ( P ) s ( P ) , for all P F p ( u , v ) .
A fuzzy graph F = ( V μ , λ ) is strongly connected if for every u , v V c , it holds that C o n F ( u , v ) > 0 . An edge ( u , v ) is called strong if λ ( u , v ) = C o n F ( u , v ) . A path consisting entirely of strong edges is called a strong path. In general, a path may be the strongest without being strong and vice versa. Fuzzy paths that admit both properties are called strongest strong paths (see [72]). Formally we have
s s F ( u , v ) = { P F p ( u , v ) s ( P ) = Con F ( u , v ) and all edges in P are strong . }
Intuitively, the strongest strong paths represent the most reliable routes in a fuzzy network, combining the optimal overall strength with the local edge optimality. The set of all strongest strong paths from u to v inside a fuzzy graph F is denoted by s s F ( u , v ) .
Fuzzy strong cuts were introduced for undirected fuzzy graphs in [87] by employing the strongest strong paths. We define them in a similar way for directed fuzzy graphs as follows. Consider a fuzzy graph F = ( V μ , λ ) with an underlying crisp graph F c = ( V c , E c ) . A subset M V c is called a fuzzy strong vertex cut set if for some vertices u , v V c M , there exists P s s F ( u , v ) , but there exists no strongest strong path from u to v in F M . In other words, this means that there is a strongest strong path P from u to v inside F if and only if we allow P to go through the vertices of M. If M = { u } , then u is called a fuzzy strong cut vertex of F. A subset E E c is called a fuzzy strong edge cut set if for some vertices u , v V c there exists P s s F ( u , v ) but there exists no strongest strong path from u to v in G E . If E = { ( x , y ) } , then ( x , y ) is called a fuzzy strong cut edge of F.
Example 1.
Consider the directed fuzzy graph F 1 = ( V μ , λ ) of Figure 1, with vertices V = { a , b , c , d , e } , vertex membership function
μ ( a ) = 1.0 , μ ( b ) = 0.8 , μ ( c ) = 0.9 , μ ( d ) = 0.7 , μ ( e ) = 0.9
and edge membership function:
λ ( a , b ) = 0.6 , λ ( a , c ) = 0.4 , λ ( c , b ) = 0.6 , λ ( b , d ) = 0.7
λ ( c , d ) = 0.5 , λ ( b , e ) = 0.6 , λ ( d , e ) = 0.6 .
The fuzzy paths from a to e are
  • P 1 : a b e with strength s ( P 1 ) = 0.6
  • P 2 : a b d e with strength s ( P 2 ) = 0.6
  • P 3 : a c d e with strength s ( P 3 ) = 0.4
  • P 4 : a c b e with strength s ( P 4 ) = 0.4
  • P 5 : a c b d e with strength s ( P 5 ) = 0.4
The strength of connectedness between a and e is C o n F ( a , e ) = 0.6 ; hence, the strongest paths from a to e are P 1 and P 2 . From these two only P 2 is strong. The path P 1 is not strong since it includes the edge ( b , e ) , which is not strong because it holds C o n F 1 ( b , e ) = 0.7 λ ( b , e ) = 0.6 . Thus, the only strongest strong path from a to e is P 2 . From this we can see that b and d are fuzzy strong cut vertices and that the edges ( a , b ) , ( b , d ) , ( d , e ) are fuzzy strong cut edges of F 1 .
Figure 1. The fuzzy graph F 1 of Example 1, with vertex memberships and edge weights shown.
Figure 1. The fuzzy graph F 1 of Example 1, with vertex memberships and edge weights shown.
Mathematics 13 02180 g001

4. Fuzzy Hyperoperations and Structural Properties

A fuzzy hypergroupoid is a pair ( V , ) , where V is a nonempty set and ★ is a binary fuzzy hyperoperation
: V × V Φ ( V ) .
Given a fuzzy graph F = ( V μ , λ ) , we define a binary and a unary fuzzy hyperoperation as follows. The vertex fuzzy path hyperoperation
F : V × V Φ ( V )
is defined by setting
v F u = w V | P s s F ( v , u ) such that w P μ
Hence, v F u is a fuzzy subset of V with membership function μ ( w ) if w V lies on some P s s F ( v , u ) , and 0 otherwise. Note that v F u yields a fuzzy subset where membership grades reflect the original vertex reliabilities of nodes participating in optimal signal transmission paths.
Intuitively, the vertex fuzzy path hyperoperation F captures all nodes that lie on strongest strong paths from vertices v to u. It produces a fuzzy subset of vertices weighted by their original credibility scores μ ( w ) , thereby modeling the spread or support of optimal communication under full-strength constraints. This operation generalizes binary connectivity to a graded, path-based relation central to our fuzzy algebraic framework.
The edge fuzzy path hyperoperation is a unary hyperoperation on the set V × V
F : V × V Φ ( V × V )
defined by
v F u = ( x , y ) V × V | P s s F ( v , u ) such that ( x , y ) P λ
Hence, v F u is a fuzzy subset of V × V with membership function λ ( x , y ) if ( x , y ) V × V lies on some P s s F ( v , u ) , and 0 otherwise.
Remark 1.
Although the domain of the edge fuzzy path hyperoperation F is formally V × V , which would suggest a binary operation in the classical sense, we interpret F as a unary hyperoperation over the edge universe V × V . This perspective aligns with the structural analogy to the vertex-based fuzzy path hyperoperation F , which acts on the vertex set V. In this framework, the set V × V serves as the domain and codomain of the hyperoperation, thereby justifying its classification as unary within the context of edge-based fuzzy algebraic structures.
The proposed fuzzy hyperoperations generalize classical graph hyperoperations while preserving their structure when applied to crisp graphs. The following proposition formally establishes this by showing that the vertex fuzzy path hyperoperation coincides with the classical path hyperoperation when all memberships are binary.
Proposition 1.
The path hyperoperation and the vertex fuzzy path hyperoperation coincide for crisp graphs.
Proof. 
Let G = ( V , E ) be a directed crisp graph. The path hyperoperation G is defined as
u G v = { w V w lies on a path between u and v } .
Now consider the corresponding fuzzy graph F = ( V μ , λ ) where
μ ( w ) = 1 for all w V , and λ ( x , y ) = 1 if ( x , y ) E , 0 otherwise .
That is, F is a crisp graph viewed as a fuzzy graph with binary membership functions. In this case, every existing path P from u to v consists entirely of edges with membership 1. Therefore, each such path has strength s ( P ) = 1 , the maximum possible and since s ( P ) = Con F ( u , v ) , all such paths are strongest.
To determine whether these paths are also strong, recall that an edge ( x , y ) is called strong if
λ ( x , y ) = Con F ( x , y ) .
For all ( x , y ) E , we have λ ( x , y ) = 1 = Con F ( x , y ) . Thus, all edges in the graph are strong, and every path composed of such edges is also strong. Therefore, every path in the crisp graph is both strongest and strong, which means
ss F ( u , v ) = { P P is a path from u to v in G } .
The vertex fuzzy path hyperoperation is defined by
u F v = { w V w lies on some P ss F ( u , v ) } μ .
Since μ ( w ) = 1 for all w V , this reduces to the crisp set
u F v = { w V w lies on a path from u to v } .
Thus, u F v = u G v . □
Given a fuzzy graph F = ( V μ , λ ) and a set M V , the strongest fuzzy subgraph of F generated by M is the fuzzy graph S F ( M ) = ( V μ M , λ M ) , where
μ M ( w ) = μ ( w ) , if w s u p p ( v F u ) for some v , u M 0 , otherwise .
and
λ M ( x , y ) = λ ( x , y ) , if ( x , y ) s u p p ( v F u ) for some v , u M 0 , otherwise .
A graph F = ( V μ , λ ) is called strongest if F = S F ( V ) . We now give an example showing that even if a graph is strongest, not every path is a strongest strong path.
Example 2.
Let F 2 = ( V μ , λ ) be the fuzzy graph of Figure 2, with a vertex set V = { v 0 , v 1 , v 2 , v 3 } and uniform vertex membership μ ( v i ) = 1 for all i . Let the non-zero edge membership values be
λ ( v 0 , v 1 ) = 0.6 , λ ( v 1 , v 3 ) = 0.6 ,
λ ( v 0 , v 2 ) = 0.9 , λ ( v 2 , v 3 ) = 0.9 .
The graph F 2 is strongest since each edge ( x , y ) in the graph satisfies
λ ( x , y ) = Con F 2 ( x , y ) .
The paths
P = ( v 0 , v 1 , v 3 ) , and Q = ( v 0 , v 2 , v 3 ) ,
have strengths
s ( P ) = 0.6 and s ( Q ) = 0.9 .
Therefore, even though P is a path in a strongest graph, it is not a strongest strong path between v 0 and v 3 .
Figure 2. The fuzzy graph F 2 of Example 2, illustrating that not every path in a strongest graph is a strongest strong path.
Figure 2. The fuzzy graph F 2 of Example 2, illustrating that not every path in a strongest graph is a strongest strong path.
Mathematics 13 02180 g002
The following proposition provides a precise characterization of fuzzy strong cut edges by identifying them as those edges that appear in every strongest strong path between a given pair of vertices.
Proposition 2.
Let F = ( V μ , λ ) be a strongest fuzzy graph. An edge ( x , y ) supp ( λ ) is a fuzzy strong cut edge if and only if it appears in every strongest strong path between some pair of vertices u , v V .
Proof. 
(⇒) Suppose that ( x , y ) is a fuzzy strong cut edge. By definition, there exist vertices u , v V such that
(i)
s s F ( u , v ) ,
(ii)
s s F ( u , v ) = , where F = F { ( x , y ) } .
This means that every strongest strong path from u to v in F must contain the edge ( x , y ) . Otherwise, if there existed a path P s s F ( u , v ) that did not include ( x , y ) , then P would still be present in F , contradicting the assumption that s s F ( u , v ) = .
(⇐) Conversely, suppose that ( x , y ) appears in every strongest strong path from u to v. Then, removing ( x , y ) from F eliminates all such paths. That is, in the graph F = F { ( x , y ) } , we have s s F ( u , v ) = . Hence, by definition, ( x , y ) is a fuzzy strong cut edge. □
We now turn to a fundamental structural behavior of strongest strong paths in fuzzy graphs. In many practical contexts, especially in decision-making and network resilience, it is important to understand how the set of available paths changes as we impose stricter constraints on the strength of connections. This motivates the following proposition, which formalizes the monotonicity of the α -cuts of the vertex fuzzy path hyperoperation.
Proposition 3.
Let F = ( V μ , λ ) be a fuzzy graph, and let u , v V . If 0 α β 1 , then
u F v β u F v α ,
where u F v γ denotes the γ-cut of the fuzzy set u F v , for any γ [ 0 , 1 ] .
Proof. 
By definition, the vertex fuzzy path hyperoperation u F v is a fuzzy subset of V, with membership function
μ u F v ( w ) = μ ( w ) , if w lies on a path P s s F ( u , v ) , 0 , otherwise .
The α -cut of this fuzzy set is defined by
u F v α = { w V μ u F v ( w ) α } .
Now suppose 0 α β 1 , and let w u F v β . Then
μ u F v ( w ) β α ,
which implies w u F v α . Therefore, u F v β u F v α .
An identity property of the vertex fuzzy path hyperoperation can be established on the diagonal.
Proposition 4.
Let F = ( V μ , λ ) be a fuzzy directed graph. If F is acyclic, then for every v V , we have
v F v = { v } μ ,
i.e., the fuzzy set resulting from the vertex fuzzy path hyperoperation on the diagonal contains only the node v with its original membership grade.
Proof. 
Since F is acyclic, any path from v to v must be the trivial path ϵ , which is both strong and strongest by definition and, hence, belongs to s s F ( v , v ) . Since the only node appearing in ϵ is v, the fuzzy set v F v is { v } μ , as required. □
The following result highlights that the support of the fuzzy path hyperoperation is always contained within the classical path hyperoperation. In effect, the fuzzy vertex hyperoperation respects the topology of the underlying graph and supports hybrid models that combine both crisp and fuzzy structures.
Proposition 5.
Let F = ( V μ , λ ) be a fuzzy graph, and let G = ( V , E ) be its underlying crisp graph. Then, for any u , v V , we have
supp ( u F v ) u G v ,
where u G v denotes the classical path hyperoperation in G.
Proof. 
By definition, u F v is a fuzzy subset of V such that
μ u F v ( w ) = μ ( w ) , if w P for some P s s F ( u , v ) , 0 , otherwise .
Thus, the support of u F v is the set of all nodes lying on some strongest strong path from u to v in F:
supp ( u F v ) = { w V w P for some P s s F ( u , v ) } .
Since all paths in s s F ( u , v ) are also paths in the underlying crisp graph G, we have
w supp ( u F v ) w u G v .
Hence,
supp ( u F v ) u G v .
To assess the utility of a vertex in fuzzy connectivity without entirely removing it from the graph, we adopt a notion of structural removal. The following definition formalizes this operation.
Let F = ( V μ , λ ) be a fuzzy graph and let v V . We define the structural removal of v, denoted by F v = ( V μ , λ v ) , as the fuzzy graph obtained by removing all edges incident to v while keeping v in the vertex set. Formally,
λ v ( x , y ) = 0 , if x = v or y = v , λ ( x , y ) , otherwise .
The presence of fuzzy strong cut vertices influences the composition of strongest strong paths in a fuzzy graph. Specifically, if a vertex lies on every such path between two nodes, then it serves as a critical connector whose structural removal partitions the path space. Hence, these nodes effectively segment the network into components that are joined solely through them.
Theorem 1.
Let F = ( V μ , λ ) be a fuzzy graph and let v V be a fuzzy strong cut vertex. Then, there exist vertices u , w V such that
(i) 
s s F ( u , w ) ,
(ii) 
s s F v ( u , w ) = ,
(iii) 
v lies on every path in s s F ( u , w ) ,
(iv) 
The set s s F ( u , w ) is partitioned into components that are connected only through v.
Proof. 
By definition of a fuzzy strong cut vertex, there exist u , w V such that every path in s s F ( u , w ) contains v, and s s F v ( u , w ) = . Since each path in s s F ( u , w ) must pass through v, removing all edges incident to v (as in F v ) breaks the connectivity of each such path at the point that links these two components. □
We now establish a relationship between vertex and edge membership values along strongest strong paths. Specifically, the membership of any node appearing in such a path is bounded below by the minimal edge strength of that path.
Proposition 6.
Let F = ( V μ , λ ) be a fuzzy graph and let
P = ( ( v 0 , v 1 ) , ( v 1 , v 2 ) , , ( v k 1 , v k ) ) s s F ( u , v )
be a strongest strong path. Then, for any vertex v i that appears in P, we have
μ ( v i ) min { λ ( v j , v j + 1 ) 0 j < k } .
Proof. 
Let P = ( ( v 0 , v 1 ) , ( v 1 , v 2 ) , , ( v k 1 , v k ) ) s s F ( u , v ) , and let
α = min { λ ( v j , v j + 1 ) 0 j < k } = s ( P ) .
Since P is a strongest strong path, each edge ( v j , v j + 1 ) is strong, so
λ ( v j , v j + 1 ) = Con F ( v j , v j + 1 ) min { μ ( v j ) , μ ( v j + 1 ) } .
Thus, for every i, we have μ ( v i ) α . □
Remark 2.
This result ensures that fuzzy path hyperoperations preserve minimum reliability thresholds—if a signal can traverse a path of strength α, then all intermediate nodes have reliability of at least α.
Corollary 1.
Let F = ( V μ , λ ) be a fuzzy graph, and let
P = ( ( v 0 , v 1 ) , ( v 1 , v 2 ) , , ( v k 1 , v k ) ) s s F ( u , v )
be a strongest strong path of strength α. Then, for every vertex v i that appears in P, we have
μ ( v i ) α ,
i.e., v i V μ α .
We now prove that the vertex fuzzy path hyperoperation is associative.
Proposition 7.
Let F = ( V μ , λ ) be a fuzzy graph. Then, the vertex fuzzy path hyperoperation F is associative; i.e., for all u , v , w V ,
( u F v ) F w = u F ( v F w ) .
Proof. 
Recall that for any x , y V , the fuzzy set x F y is defined by
x F y = z V z P for some P s s F ( x , y ) μ .
Let us compute both sides of the identity and show that they yield the same fuzzy set.
Left-hand side: ( u F v ) F w . Let
A = u F v = P s s F ( u , v ) { x P } μ .
Then,
( u F v ) F w = x supp ( A ) x F w = x supp ( u F v ) Q s s F ( x , w ) { z Q } μ .
The above formula describes how to compute the left-hand side of the associativity identity using the definition of the vertex fuzzy path hyperoperation.
Here, A = u F v is the fuzzy set of all vertices lying on some strongest strong path from u to v, with membership values inherited from μ . The support supp ( u F v ) consists of all vertices that occur with positive membership in A.
For each such vertex x supp ( u F v ) , we compute x F w , which includes all vertices lying on some strongest strong path from x to w. Taking the union over all such x yields the fuzzy set of vertices that lie on some strongest strong path from u to v and then from x to w.
Since the family of strongest strong paths is closed under concatenation when intermediate vertices are shared, this construction recovers all vertices lying on some strongest strong path from u to w through v, preserving the membership structure. This justifies the associativity of the operation F .
Right-hand side: u F ( v F w ) . Let
B = v F w = Q s s F ( v , w ) { y Q } μ .
Then,
u F ( v F w ) = y supp ( B ) u F y = y supp ( v F w ) P s s F ( u , y ) { z P } μ .
In this case, for each y lying on a strongest strong path from v to w, we consider all strongest strong paths from u to y, and their union yields the same support and membership degrees as the LHS.
In both cases, the construction effectively accumulates all nodes lying on a strongest strong path from u to w. The union over all intermediate decompositions covers all such paths, and due to maximality in the strength selection of s s F , we do not introduce weaker paths. Hence,
( u F v ) F w = u F ( v F w ) .
Intuitively, this result reflects that fuzzy path composition is independent of grouping; hence, intermediate aggregation points do not affect the final reachability analysis.
The associativity of the vertex fuzzy path hyperoperation establishes a foundational algebraic structure over the fuzzy vertex set. Specifically, it ensures that ( V μ , F ) forms a fuzzy hypersemigroup, a hypercompositional analogue of semigroups in which the operation yields fuzzy subsets rather than single elements. This result provides a robust algebraic framework for modeling compositional reasoning in systems with uncertainty, where reachability and influence propagate through multiple layers of interaction. It also enables the application of tools from hyperstructure theory to analyze the dynamics and resilience of fuzzy networks in a mathematically rigorous manner.
Corollary 2.
Let F = ( V μ , λ ) be a fuzzy graph. Then, the structure ( V μ , F ) forms a fuzzy hypersemigroup.
This algebraic structure opens the door to applying tools from hyperalgebra and fuzzy semigroup theory in the analysis of fuzzy graphs. It also connects the proposed hyperoperation to a broader mathematical context, enabling generalizations to fuzzy hypermonoids or hypergroupoids when identity or inverse properties are explored.
The following proposition highlights a fundamental structural property of the vertex fuzzy path hyperoperation. Path decomposition reflects the internal coherence of the hyperoperation and enables localized analysis of fuzzy connectivity through intermediate nodes.
Proposition 8
(Path Decomposition). Consider a fuzzy graph F = ( V μ , λ ) and vertices u , v , w V . If w u F v , then
u F v ( u F w ) ( w F v ) .
Proof. 
Suppose x u F v . Then, by definition, x lies on a path P s s F ( u , v ) .
Since w P by assumption, the path P can be decomposed into two subpaths
P 1 : u w , P 2 : w v ,
each of which is a subpath of a strongest strong path. Because all edges in P are strong and the overall path is the strongest, both P 1 and P 2 are themselves strongest strong paths.
P 1 s s F ( u , w ) , P 2 s s F ( w , v ) .
Therefore, any vertex x P must either belong to P 1 or P 2 , implying
x u F w or x w F v .
Thus,
x ( u F w ) ( w F v ) ,
and since x was arbitrary in u F v , we conclude that
u F v ( u F w ) ( w F v ) .
The inclusion in the above proposition becomes an equality when the intermediate vertex is traversed by every strongest strong path between the two endpoints.
Proposition 9.
Let F = ( V μ , λ ) be a fuzzy graph, and let u , v , w V . If every path in s s F ( u , v ) contains w, then
u F v = ( u F w ) ( w F v ) .
Proof. 
From Proposition 8, we already know that
u F v ( u F w ) ( w F v ) .
To prove the reverse inclusion, let x ( u F w ) ( w F v ) . Then, either
(i)
x lies on a path P 1 s s F ( u , w ) , or
(ii)
x lies on a path P 2 s s F ( w , v ) .
By the hypothesis, every path in s s F ( u , v ) contains w. Let P be any such path; then, P can be decomposed as
P = P 1 P 2 ,
where P 1 is a strongest strong path from u to w, and P 2 is a strongest strong path from w to v. Since strongest strong paths from u to w and from w to v exist and include x in at least one of them, then x must lie on some P s s F ( u , v ) . Thus,
x u F v .
Therefore,
( u F w ) ( w F v ) u F v .
Combined with the earlier inclusion, this proves the equality
u F v = ( u F w ) ( w F v ) .
This result shows that under a strong centrality condition—where all strongest strong paths from u to v must pass through w—the fuzzy vertex path operation satisfies an exact decomposability property.
Proposition 10
(Edge Support Decomposition). Let F = ( V μ , λ ) be a fuzzy graph, and let u , v , w V . If for every P ss F ( u , v ) , it holds that w P , then,
supp ( u v ) supp ( u w ) supp ( w v ) ,
with equality if every P ss F ( u , v ) can be decomposed as P = P 1 P 2 with P 1 ss F ( u , w ) and P 2 ss F ( w , v ) .
Proof. 
Let ( x , y ) supp ( u v ) . Then, by definition, there exists a strongest strong path P ss F ( u , v ) such that ( x , y ) is an edge of P. By hypothesis, w lies on every such path P, so P contains w and can be written as the concatenation P = P 1 P 2 , where P 1 is a subpath from u to w, and P 2 is a subpath from w to v.
Since P is a strongest strong path and all of its subpaths are also strongest strong paths, we have P 1 ss F ( u , w ) and P 2 ss F ( w , v ) . Hence, the edge ( x , y ) must appear in either P 1 or P 2 , which implies that
( x , y ) supp ( u w ) supp ( w v ) ,
Therefore,
supp ( u v ) supp ( u w ) supp ( w v ) .
If, in addition, every P ss F ( u , v ) decomposes into a concatenation of paths in ss F ( u , w ) and ss F ( w , v ) , then the reverse inclusion holds, yielding equality. □
The following result formalizes the monotonicity of α -cuts in the context of the edge fuzzy path hyperoperation.
Proposition 11
(Monotonicity of α -Cuts of the Edge Fuzzy Path Hyperoperation). Let F = ( V μ , λ ) be a fuzzy graph, and let u , v V . For any 0 α β 1 , denote by ( u v ) γ the γ-cut of the fuzzy set u v , defined as
( u v ) γ = { ( x , y ) V × V λ ( x , y ) γ and ( x , y ) P ss F ( u , v ) } .
Then,
( u v ) β ( u v ) α .
Proof. 
Let ( x , y ) ( u v ) β . By definition, there exists a strongest strong path P ss F ( u , v ) such that ( x , y ) P and λ ( x , y ) β . Since α β , it follows that λ ( x , y ) α as well. Thus, ( x , y ) also belongs to the α -cut:
( x , y ) ( u v ) α .
Therefore, we conclude that
( u v ) β ( u v ) α .

5. Equivalence Classes, Quotient Graphs, and Connectivity Structures

We now introduce a relation on the vertex set of a fuzzy graph that captures mutual full-strength connectivity. Let F = ( V μ , λ ) be a fuzzy graph, we define the binary relation R V V × V by setting ( u , v ) R V if and only if there exists a path P from u to v and a path P from v to u such that s ( P ) = 1 and s ( P ) = 1 . Equivalently,
R V = ( u , v ) V × V | P : u v , P : v u , with s ( P ) = s ( P ) = 1 .
The following proposition shows that R V is an equivalence relation on the set V.
Proposition 12.
The relation R V is an equivalence relation on the vertex set V of the fuzzy graph F = ( V μ , λ ) .
Proof. 
We verify the three defining properties of an equivalence relation:
Reflexivity: For every u V , consider the trivial path ε from u to itself (i.e., a path of length zero). Since this path contains no edges, its strength is defined to be 1. Hence, ( u , u ) R V .
Symmetry: Suppose ( u , v ) R V . Then, by definition, there exists a path P : u v and a path P : v u such that both s ( P ) = 1 and s ( P ) = 1 . Therefore, by symmetry of the existence of such paths, ( v , u ) R V .
Transitivity: Suppose ( u , v ) R V and ( v , w ) R V . Then, there exist paths
  • P 1 : u v and P 2 : v u , both with strength 1,
  • Q 1 : v w and Q 2 : w v , both with strength 1.
Let R 1 = P 1 Q 1 be the concatenation of paths from u to v and then from v to w. Similarly, define R 2 = Q 2 P 2 , a path from w to v and then from v to u.
Since each edge in P 1 and Q 1 has a membership value of 1 (as their strengths are 1), all edges in R 1 have a membership value of 1, and thus s ( R 1 ) = 1 . The same applies to R 2 .
Therefore, there exists a path from u to w and from w to u, both of strength 1, and so ( u , w ) R V .
Hence, R V is reflexive, symmetric, and transitive, and it is, therefore, an equivalence relation. □
The equivalence relation R V partitions the vertex set V into disjoint subsets, each consisting of vertices that are mutually connected via paths of maximal edge strength. These equivalence classes can be viewed as the strongly connected components of the crisp digraph obtained by taking the α -cut of the fuzzy graph F = ( V μ , λ ) at level α = 1 .
Proposition 13.
Let F = ( V μ , λ ) be a fuzzy graph, and let G 1 = ( V , E 1 ) be the directed graph obtained by the α-cut at level α = 1 , where
E 1 = { ( u , v ) V × V λ ( u , v ) = 1 } .
Then, the equivalence classes of the relation R V coincide with the strongly connected components of the crisp digraph G 1 .
Proof. 
By definition, two vertices u , v V satisfy ( u , v ) R V if and only if there exist paths P : u v and P : v u in F such that s ( P ) = s ( P ) = 1 . This implies that every edge on these paths must have a membership value of 1, i.e., each edge belongs to E 1 . Therefore, u and v are connected by directed paths in both directions in the graph G 1 , which means they lie in the same strongly connected component of G 1 .
Conversely, if u and v lie in the same strongly connected component of G 1 , then there exist paths in G 1 from u to v and from v to u, consisting entirely of edges with a membership value of 1 in F, and, hence, of strength 1. Therefore, ( u , v ) R V .
Thus, the equivalence classes of R V are exactly the strongly connected components of G 1 . □
The following proposition shows that the equivalence classes determined by the relation R V are F -closed components.
Proposition 14.
Given a fuzzy graph F = ( V μ , λ ) , every equivalence class [ v ] under the relation R V is closed under F ; that is, for all u , w [ v ] , we have
u F w [ v ] .
Proof. 
Let u , w [ v ] and z u F w . By definition of the hyperoperation F , this means that z lies on some strongest strong path P from u to w, and the strength of P is Con F ( u , w ) .
Since u , w [ v ] , we have Con F ( u , w ) = Con F ( w , u ) = 1 by the definition of R V . Hence, the path P is a strongest strong path from u to w with strength 1. Therefore, every edge of P has a membership value of exactly 1.
Let P 1 be the subpath of P from u to z, and P 2 the subpath from z to w. Since all edges in P have a membership of 1, the same holds for P 1 and P 2 , and both have a strength of 1; hence,
Con F ( u , z ) = Con F ( z , w ) = 1 .
Since Con F ( w , u ) = 1 , there exists a strongest strong path Q from w to u of strength 1. Consider the concatenation of the paths P 2 and Q. This forms a path R from z to u, and all its edges have a membership of 1, i.e.,
Con F ( z , u ) = 1 .
Since Con F ( u , z ) = Con F ( z , u ) = 1 , we have z [ u ] . But u [ v ] and, hence, z [ v ] . It follows that
u F w [ v ] .
Corollary 3.
The vertex set of the quotient graph F / R V consists precisely of the maximal F -closed subsets of V. That is, each equivalence class under R V is a maximal subset of V that is closed under the hyperoperation F , and distinct classes are disjoint with respect to F .
Proof. 
By the previous proposition, each equivalence class [ v ] under R V is closed under F . To show maximality, suppose there exists u [ v ] such that u x F y for some x , y [ v ] . Then, by the definition of F , u lies on a strongest strong path of strength 1 between x and y. This implies Con F ( x , u ) = Con F ( u , x ) = 1 , so u [ v ] , contradicting the assumption. Hence, no element outside [ v ] can be generated by F from elements inside it, and the class is maximal.
Distinct classes are disjoint by the definition of R V , and since each is F -closed, the equivalence classes partition V into maximal F -closed subsets, which form the vertex set of F / R V . □
Remark 3.
The above corollary suggests that the quotient graph F / R V admits an interpretation as an algebraic reduction of the fuzzy graph F into its maximal F -closed components, and one may view the quotient as the base set for an induced hyperstructure.
The relation R V also admits a natural interpretation in terms of fuzzy connectivity measures. First, if u R V v , then there exist bidirectional paths of strength 1 between u and v, which implies that the connection strengths satisfy
Con F ( u , v ) = Con F ( v , u ) = 1 .
Moreover, in this case, any strongest strong path connecting u and v necessarily consists entirely of edges with membership value 1. As a result, every vertex lying on such a path inherits a membership of at least 1 under the vertex fuzzy path hyperoperation, and in fact retains its original membership value exactly. If no edge in the graph has a membership value of 1, then R V reduces to the identity relation. Conversely, if all edges have a membership value of 1, then R V coincides with classical strong connectivity. Therefore, R V captures the top tier of certainty in fuzzy connectivity and can be used to isolate fully reliable components within a fuzzy network.
Let F = ( V μ , λ ) be a fuzzy graph, and let R V be the equivalence relation on V defined by mutual full-strength connectivity. The quotient fuzzy graph of F with respect to R V , denoted F / R V , is the fuzzy graph ( W ν , Λ ) defined as follows:
-
The vertex set W is the set of equivalence classes of V under R V ; that is,
W = V / R V = { [ v ] v V } .
-
The fuzzy vertex membership function ν : W [ 0 , 1 ] is given by
ν ( [ v ] ) = max { μ ( u ) u [ v ] } .
-
The fuzzy edge membership function Λ : W × W [ 0 , 1 ] is defined by
Λ ( [ u ] , [ v ] ) = 0 , if [ u ] = [ v ] , max { λ ( x , y ) x [ u ] , y [ v ] } , if [ u ] [ v ] .
The equivalence relation R V identifies groups of vertices that are mutually reachable through strongest strong paths, i.e., fully reliable and symmetric fuzzy connections. The corresponding quotient fuzzy graph F / R V abstracts each equivalence class as a single node and preserves the strongest interclass connections. This reduction simplifies the structure of the fuzzy graph while retaining essential path-based connectivity information, making it easier to analyze large or modular fuzzy systems.
Proposition 15.
Let F = ( V μ , λ ) be a fuzzy graph; then, the quotient fuzzy graph F / R V = ( W ν , Λ ) is well-defined.
Proof. 
The vertex membership function ν ( [ v ] ) = max { μ ( u ) u [ v ] } is clearly well-defined since each equivalence class [ v ] is nonempty and μ : V [ 0 , 1 ] .
The edge membership function is also well-defined, since it considers all pairs ( x , y ) with x [ u ] , y [ v ] and selects the maximum of their membership grades:
Λ ( [ u ] , [ v ] ) = max { λ ( x , y ) x [ u ] , y [ v ] } .
We now verify that the fuzzy graph condition is preserved; that is,
Λ ( [ u ] , [ v ] ) min ( ν ( [ u ] ) , ν ( [ v ] ) ) .
Let x [ u ] and y [ v ] be such that Λ ( [ u ] , [ v ] ) = λ ( x , y ) . Since F = ( V μ , λ ) is a fuzzy graph, it satisfies
λ ( x , y ) min ( μ ( x ) , μ ( y ) ) .
But by the definition of ν , we have μ ( x ) ν ( [ u ] ) and μ ( y ) ν ( [ v ] ) ; hence,
λ ( x , y ) min ( μ ( x ) , μ ( y ) ) min ( ν ( [ u ] ) , ν ( [ v ] ) ) .
Therefore,
Λ ( [ u ] , [ v ] ) = λ ( x , y ) min ( ν ( [ u ] ) , ν ( [ v ] ) ) .
This shows that both ν and Λ are well-defined and satisfy the fuzzy graph condition. Hence, the quotient F / R V = ( W ν , Λ ) is a well-defined fuzzy graph. □
The quotient fuzzy graph F / R V = ( W ν , Λ ) can be interpreted as the condensation of the fuzzy graph F at strength level 1. Each vertex of F / R V represents a maximal subset of vertices of F that are mutually connected by paths of strength 1, that is, an equivalence class under R V . The internal structure within each R V -class is collapsed into a single node, and the edges between classes reflect the strongest possible fuzzy connections between different full-strength components. In this way, F / R V provides a simplified representation of the overall connectivity of F among its fully reliable substructures.
We illustrate the quotient fuzzy graph construction process using a flowchart in Figure 3. The diagram outlines the key computational steps, starting from a fuzzy graph F = ( V μ , λ ) , through the identification of mutual full-strength connectivity and equivalence classes to the construction of the resulting coarse-grained graph F / R V . Each step preserves directional trust semantics and fuzzy strength while simplifying the graph’s structure.
Corollary 4.
The quotient fuzzy graph F / R V = ( W ν , Λ ) is the condensation of the fuzzy graph F at strength level 1. Each vertex of F / R V corresponds to a maximal subset of vertices of F that are mutually connected by paths of strength 1, and the edges of F / R V represent the strongest fuzzy connections between different such subsets.
Remark 4.
If all edges of a fuzzy graph F = ( V μ , λ ) have a membership value of 1, that is, if λ ( u , v ) = 1 for all u , v V , then the relation R V becomes the universal relation on V. In this case, the quotient fuzzy graph F / R V consists of a single vertex representing the entire vertex set V and no edges. Thus, F / R V reduces to a fuzzy graph with one vertex whose membership is the maximum of all vertex memberships in F.
Example 3.
Consider the fuzzy graph F 3 = ( V μ , λ ) shown in Figure 4. The vertices { v 0 , v 1 , v 2 , v 3 } form a fully strongly connected component via full-strength paths and define an equivalence class under R V , denoted C 1 . The maximum vertex membership in this class is
μ ( C 1 ) = max { μ ( v i ) i = 0 , 1 , 2 , 3 } = 1 .
Similarly, { v 4 , v 5 } and { v 7 , v 8 } form strongly connected components, defining the classes C 2 and C 4 with μ ( C 2 ) = μ ( C 4 ) = 1 . The vertex v 6 , not reachable via any full-strength path from or to another vertex, forms its own singleton class C 3 = { v 6 } , with μ ( C 3 ) = 0.8 .
The quotient fuzzy graph F 3 / R V , shown in Figure 5, has a vertex set { C 1 , C 2 , C 3 , C 4 } . Each vertex is labeled with its corresponding membership value. An edge is drawn from C i to C j whenever there exists an edge from some vertex in C i to some vertex in C j in the original graph F 3 , and the membership of the edge in the quotient is defined as the maximum among those edges.
In this case, there is an edge from C 1 to C 2 of strength 0.8, coming from v 3 v 4 . An edge from C 2 to C 3 arises from v 5 v 6 , with strength 0.6. Finally, an edge from C 3 to C 4 comes from v 6 v 7 , with strength 0.9.
We now introduce a fuzzy distance function based on the strength of the strongest strong path between two vertices in a fuzzy graph. This measure reflects the reliability or certainty of connection between nodes, i.e., the stronger the path, the shorter the distance.
Let F = ( V μ , λ ) be a fuzzy graph. The fuzzy distance function d F : V × V [ 0 , 1 ] is defined by
d F ( u , v ) = 1 Con F ( u , v ) ,
where Con F ( u , v ) denotes the strength of the strongest strong path from u to v.
Proposition 16.
The function d F is a fuzzy semi-metric on V.
Proof. 
We verify the properties of a semi-metric.
(i)
Non-negativity and boundedness. For all u , v V , since 0 Con F ( u , v ) 1 , we have
0 d F ( u , v ) = 1 Con F ( u , v ) 1 .
(ii)
Identity of indiscernibles. Since the strongest strong path from a vertex to itself is the trivial path with strength 1, we have
d F ( u , u ) = 1 Con F ( u , u ) = 1 1 = 0 .
However, d F ( u , v ) = 0 does not imply u = v ; it only implies that there exists a strongest strong path from u to v with maximum strength. Hence, the identity of indiscernibles holds only in one direction.
(iii)
Symmetry does not hold in general. In directed fuzzy graphs, it is possible that
Con F ( u , v ) Con F ( v , u ) ,
and, therefore,
d F ( u , v ) d F ( v , u ) .
Thus, d F is not symmetric unless F is symmetric.
This distance may be useful in applications where reliability or confidence of interaction is key, such as in fuzzy social networks, communication systems, and uncertain biological networks. Its inverse relation to connection strength makes it suitable for optimization, ranking, and clustering tasks in fuzzy environments.
The distance function d F on a fuzzy graph does not, in general, satisfy the identity of indiscernibles in the strong form. However, the quotient graph obtained by the equivalence relation R V admits this property. This is formalized in the following proposition.
Proposition 17.
Let F = ( V μ , λ ) be a fuzzy graph, and let F / R V = ( W ν , Λ ) . The fuzzy distance function d F / R V satisfies the identity of indiscernibles in the strong form:
d F / R V ( [ u ] , [ v ] ) = 0 [ u ] = [ v ] .
Proof. 
Assume [ u ] = [ v ] . Then, d F / R V ( [ u ] , [ v ] ) = 1 Con F / R V ( [ u ] , [ u ] ) = 1 1 = 0 , since the strongest strong path from a class to itself is trivially of strength 1.
Conversely, suppose [ u ] [ v ] . By the construction of the quotient graph, any edge from a vertex in [ u ] to a vertex in [ v ] must have a strength that is strictly less than 1; otherwise, u and v would belong to the same R V -class, contradicting the assumption. Therefore, every path from [ u ] to [ v ] in the quotient has a strength strictly less than 1, and, hence,
Con F / R V ( [ u ] , [ v ] ) < 1 d F / R V ( [ u ] , [ v ] ) > 0 .
Thus, d F / R V ( [ u ] , [ v ] ) = 0 implies [ u ] = [ v ] , completing the proof. □

6. Fuzzy Distance and Metric Interpretations

This interpretation extends naturally to the quotient graph F / R V , where each equivalence class represents a maximal hyperoperation-closed component. The quotient distance function d F / R V thus captures the separation between these structurally aggregated units, measuring how distant entire hyperoperation closures are from one another in terms of fuzzy connectivity.
The fuzzy distance function d F can be interpreted in terms of the vertex fuzzy path hyperoperation F . The value d F ( u , v ) = 1 Con F ( u , v ) quantifies the extent to which the vertex v is reachable from u via high-strength paths. When d F ( u , v ) = 0 , we have Con F ( u , v ) = 1 , so v u F v . If in addition, d F ( v , u ) = 0 , then u v F u , and the two vertices lie on mutual full-strength strongest strong paths. In that case, they belong to the same equivalence class under R V , which is closed under F .
In contrast, when d F ( u , v ) > 0 , a strongest strong path from u to v may still exist, but its strength is strictly less than 1. In this case, v may still belong to u F v , but mutual inclusion and equivalence are not guaranteed. Thus, the distance function reflects how close a pair of vertices is to being symmetrically and fully connected within a F -closed structure, and it provides a graded measure of deviation from this ideal.
Proposition 18.
Let F = ( V μ , λ ) be a fuzzy graph; then, for any vertices u , v V , the following are equivalent:
(i) 
d F ( u , v ) = 0 and d F ( v , u ) = 0 ,
(ii) 
Con F ( u , v ) = Con F ( v , u ) = 1 ,
(iii) 
v u F v and u v F u ,
(iv) 
u and v belong to the same equivalence class under R V .
Example 4.
Consider the fuzzy graph F 4 = ( V μ , λ ) shown in Figure 6, where each vertex is labeled by its fuzzy membership grade μ ( v ) , and each edge is labeled by its membership value λ ( u , v ) . Its equivalence classes with respect to R V are
C 1 = { v 1 , v 2 } , C 2 = { v 3 , v 4 , v 5 } , C 3 = { v 6 } , C 4 = { v 7 } , C 5 = { v 8 } .
The behavior of the vertex fuzzy path hyperoperation F confirms the structural coherence of the equivalence classes under R V . Proposition 14 guarantees that each class C i is closed under F . This aligns with the observation that within each class, all paths contributing to the hyperoperation closure are of full strength and remain entirely internal.
Furthermore, Corollary 3 implies that each equivalence class can be viewed as a F -closed component—meaning that C i = u F w w F u for all u , w C i .
The quotient graph F 4 / R V is shown in Figure 7. For instance, the cycle v 3 v 4 v 5 v 3 , composed entirely of edges with strength 1, becomes condensed into the single node C 2 , and the resulting quotient graph shows the directional relationship among the classes with appropriate edge strengths preserved.
The above example illustrates the interpretation of the fuzzy distance d F ; as established in Proposition 16, d F defines a fuzzy semi-metric on the vertex set V, capturing the loss of connectivity strength from one node to another. In the original graph, several pairs of distinct vertices u v satisfy d F ( u , v ) = 0 , indicating that there exists a strongest strong path of full strength from u to v, though not necessarily reciprocally. Thus, while d F quantifies directed closeness, it lacks full symmetry and fails the strong form of identity of indiscernibles.
However, as Proposition 17 confirms, the induced distance d F / R V on the quotient graph satisfies the identity of indiscernibles in its strong form. In the context of Example 4, this means that the distance between two quotient nodes is zero if and only if they correspond to the same equivalence class under R V . The quotient graph, therefore, provides a coarse-grained metric abstraction in which each node represents a maximal zero-distance component of the original graph.
In practice, this metric can be useful in applications such as information flow modeling, fault-tolerant communication networks, or biological regulatory analysis. The original distance function d F supports fine-grained ranking and uncertainty-aware navigation, while the quotient distance d F / R V supports cluster identification and top-level structural reasoning.

7. Applications of Fuzzy Connectivity Structures

The fuzzy hyperoperational framework introduced in this paper provides an algebraic foundation for analyzing systems with partial, asymmetric, or uncertain connectivity. By combining strongest strong path analysis with hypercompositional operations, the proposed model captures local and global properties of interaction networks.

7.1. Trust-Aware Social Systems

We illustrate a simulated trust network modeled as a fuzzy graph with directional fuzzy path analysis. Consider a distributed decision-making system consisting of eight agents V = { v 1 , v 2 , , v 8 } , where each agent v i is assigned a fuzzy credibility score μ ( v i ) [ 0 , 1 ] and directional fuzzy trust scores λ ( v i , v j ) [ 0 , 1 ] toward others based on prior collaborative experience.
The credibility scores (vertex membership values) are as follows:
μ ( v 1 ) = 0.9 , μ ( v 2 ) = 0.85 , μ ( v 3 ) = 0.8 , μ ( v 4 ) = 0.7 ,
μ ( v 5 ) = 0.8 , μ ( v 6 ) = 0.95 , μ ( v 7 ) = 0.9 , μ ( v 8 ) = 0.9 .
The directional trust scores (edge membership values) are as follows:
λ ( v 1 , v 2 ) = 0.8 , λ ( v 2 , v 3 ) = 0.8 , λ ( v 3 , v 1 ) = 0.8 , λ ( v 4 , v 5 ) = λ ( v 5 , v 4 ) = 0.7 , λ ( v 6 , v 7 ) = 0.9 , λ ( v 7 , v 8 ) = 0.85 , λ ( v 8 , v 6 ) = 0.9 , λ ( v 1 , v 6 ) = 0.6 .
The resulting fuzzy graph F 5 = ( V μ , λ ) respects the structural constraint
λ ( u , v ) min ( μ ( u ) , μ ( v ) ) for all u , v V ,
and is visualized in Figure 8. Using the vertex fuzzy path hyperoperation F , we compute the strongest strong paths and identify the equivalence classes under the mutual full-strength connectivity relation R V :
C 1 = { v 1 , v 2 , v 3 } , C 2 = { v 4 , v 5 } , C 3 = { v 6 , v 7 , v 8 } .
Each class C i forms a closed component under F , meaning that every pair of nodes within C i is mutually reachable via full-strength paths. The corresponding quotient fuzzy graph F 5 / R V , shown in Figure 9, has a vertex set { C 1 , C 2 , C 3 } . It includes a single inter-class edge from C 1 to C 3 , derived from the link v 1 v 6 of strength 0.6.
This abstraction highlights the formation of three coherent trust clusters, each internally robust in connectivity. The edge C 1 C 3 signifies a unidirectional trust influence from the first group toward the third. In applied contexts such as team formation or consensus protocols, the quotient graph offers a compact yet semantically meaningful representation, preserving the directionality and strength of trust dynamics in a coarse-grained manner.
The fuzzy distance function d F ( u i , u j ) = 1 Con F ( u i , u j ) can now be applied to the trust network F 5 to quantify the absence or weakness of strong trust pathways between agents. In this context, the distance metric helps identify pairs of agents lacking reliable directional influence, cluster users based on proximity in trust propagation, and detect structural gaps or bottlenecks across classes. For example, the edge from C 1 to C 3 in the quotient graph highlights a weak inter-cluster trust dependency that may warrant strategic reinforcement. Thus, fuzzy distance not only complements hyperoperation-based reasoning but also enables applications in trust evaluation, decision-making optimization, and network resilience analysis.

7.2. Communication Networks

In communication networks or transportation systems, connections often vary in reliability or capacity due to physical limitations, congestion, or failures. Fuzzy graphs provide a natural way to model such uncertainties by allowing both nodes (e.g., stations or routers) and edges (e.g., links or routes) to have membership values representing their operational reliability.
Consider a communication backbone connecting eight relay nodes { r 1 , r 2 , , r 8 } , where
μ ( r 1 ) = μ ( r 2 ) = 1.0 , μ ( r 3 ) = μ ( r 4 ) = μ ( r 5 ) = 0.95 ,
μ ( r 6 ) = 0.8 , μ ( r 7 ) = 0.7 , μ ( r 8 ) = 0.6 .
The edge membership values represent the current quality or bandwidth availability of the connection between two nodes:
λ ( r 1 , r 2 ) = λ ( r 2 , r 1 ) = 1.0 , λ ( r 2 , r 3 ) = 0.9 , λ ( r 3 , r 4 ) = λ ( r 4 , r 5 ) = λ ( r 5 , r 3 ) = 1 ,
λ ( r 5 , r 6 ) = 0.8 , λ ( r 6 , r 7 ) = 0.7 , λ ( r 7 , r 8 ) = λ ( r 8 , r 6 ) = 0.6 .
The vertex fuzzy path hyperoperation r i F r j yields the fuzzy set of relay nodes lying on strongest strong communication paths between r i and r j , respecting both the edge quality and node reliability. For instance, the strongest strong path from r 1 to r 6 traverses r 2 r 3 r 4 r 5 r 6 , with strength 0.8 , and the involved nodes all have μ 0.8 , as ensured by Proposition 6.
The equivalence relation R V reveals clusters of fully bidirectional, high-confidence communication, such as
C 1 = { r 1 , r 2 } , C 2 = { r 3 , r 4 , r 5 } , C 3 = { r 6 } , C 4 = { r 7 } , C 5 = { r 8 } .
The quotient graph F / R V abstracts the relay infrastructure into a smaller graph with well-defined inter-cluster bandwidths. For instance, the path r 2 r 3 of strength 0.9 becomes an edge from C 1 to C 2 , and the link r 5 r 6 induces an edge from C 2 to C 3 of strength 0.8.
The fuzzy distance function d F supports diagnosing degraded or failing paths, identifying redundant versus critical infrastructure and prioritizing high-strength relay chains for robust routing.

7.3. Biological Systems

In systems biology and epidemiology, the spread of signaling cascades, protein activation, or infectious agents through complex biological or social networks is often non-uniform and uncertain. Nodes (e.g., proteins, genes, or individuals) may differ in their activation readiness or susceptibility, while connections (e.g., reactions or interactions) vary in reliability or strength due to biological noise, mutation, or behavioral diversity. Fuzzy graphs offer a rigorous framework for capturing these graded interactions.
Consider a simplified biological network F 6 = ( V μ , λ ) representing signal transduction between nine molecular or cellular entities { v 1 , , v 9 } . Node memberships μ ( v i ) denote activation readiness or receptor density, and directed edge memberships λ ( u , v ) represent the likelihood or reliability of downstream activation from u to v. The graph is shown in Figure 10 and satisfies all fuzzy graph consistency constraints.
The vertex fuzzy path hyperoperation v i F 6 v j identifies all biological units participating in the strongest strong signal paths between components v i and v j , where both transmission fidelity and local reactivity are preserved. For example, the strongest strong paths, without repeating nodes, from v 5 to v 8 are
  • v 5 v 2 v 3 v 6 v 8
  • v 5 v 4 v 1 v 2 v 3 v 6 v 8
since they both achieve the maximum possible strength C o n F 6 ( v 5 , v 8 ) = 0.5 , and all edges in these paths are strong edges. Note also that all vertices lying in these paths have membership values μ 0.5 , complying with Proposition 6. The vertex fuzzy path hyperoperation v 5 F 6 v 8 yields the fuzzy set
v 5 F 6 v 8 = { v 1 / 1.0 , v 2 / 1.0 , v 3 / 1.0 , v 4 / 1.0 , v 5 / 0.7 , v 6 / 0.7 , v 8 / 0.6 }
where each vertex that appears in any of the strongest strong paths retains its original membership value from the fuzzy graph F 6 .
The equivalence relation R V captures bidirectional full-strength signaling loops. In this case, five equivalence classes emerge:
C 1 = { v 1 , v 2 , v 3 , v 4 } , C 2 = { v 5 } , C 3 = { v 6 } , C 4 = { v 8 } , C 5 = { v 7 , v 9 } .
These groups reflect integrated biological modules or compartments. The quotient fuzzy graph F 6 / R V shown in Figure 11 reduces the system to 5 aggregate components and reveals dominant signal routes between them. The quotient model facilitates analysis of cross-module influence, redundancy, and critical weak points in the network.
In the quotient graph F 6 / R V , the only strongest strong path from the class of v 5 to the class of v 8 , i.e., from C 2 to C 4 is
C 2 C 1 C 3 C 4 .
Therefore, the vertex fuzzy path hyperoperation C 2 F 6 / R V C 4 yields the fuzzy set
C 2 F 6 / R V C 4 = { C 1 / 1.0 , C 2 / 0.7 , C 3 / 0.7 , C 4 / 0.6 } .
This result captures the signal propagation pathway from the C 2 module (containing v 5 ) through the integrated C 1 module ( { v 1 , v 2 , v 3 , v 4 } ) and intermediate C 3 module ( v 6 ) to reach the target C 4 module ( v 8 ). In biological terms, this means that signal transmission from module C 2 to C 4 must pass through the integrated signaling hub C 1 and regulatory checkpoint C 3 , suggesting that these modules are critical for inter-compartment communication and represent potential therapeutic targets or regulatory control points in the biological system.
The introduced hyperoperational framework enables robust subsystem identification (via R V and F 6 / R V ), failure impact analysis using fuzzy strong cut vertices and edges, and signal strength-based reachability (via fuzzy distances d F 6 ). Such an approach supports targeted drug design, epidemiological intervention planning, and resilience testing in systems characterized by gradated structure and uncertain propagation.

8. Conclusions and Future Directions

In this paper, we introduce a novel framework of fuzzy graph hyperoperations based on the concept of strongest strong paths, which are both optimal in strength and entirely composed of strong edges. We define two key hyperoperations: the vertex-based fuzzy path hyperoperation F and the edge-based fuzzy path hyperoperation F , generalizing classical path-based operations in a fuzzy environment.
We prove that ( V μ , F ) forms a fuzzy hypersemigroup and establish fundamental properties such as reflexivity and α -cut monotonicity. These results allow for the analysis of fuzzy connectivity at varying levels of confidence. We also characterize structural features such as fuzzy strong cut vertices and edges, which identify points of vulnerability and resilience in fuzzy networks.
A fuzzy distance function d F ( u , v ) = 1 Con F ( u , v ) is introduced to quantify directional closeness between vertices. While this function does not satisfy the strong identity of indiscernibles in general, its induced counterpart d F / R V on the quotient graph respects this property. The construction of the quotient fuzzy graph F / R V , based on mutual full-strength connectivity, enables a semantically faithful abstraction that preserves the topology of the original graph.
To demonstrate the real-world relevance of the proposed framework, we present detailed examples from trust-aware social networks, communication infrastructures, and biological regulatory systems. These applications illustrate the interpretability and flexibility of our model in domains where uncertainty and asymmetric influence are intrinsic.
While the primary aim of this work is to establish a rigorous algebraic framework for fuzzy graph hyperoperations, it is important to consider their algorithmic realizability in applied settings. The construction of strongest strong paths and the evaluation of the fuzzy hyperoperations can be implemented using adaptations of fuzzy relation composition algorithms, particularly those relying on max–min and max–product transitive closures. For example, the equivalence classes under R V can be computed via a repeated composition of the fuzzy adjacency matrix until a fixed point is reached, with a worst-case time complexity of O ( n 3 ) , where n is the number of vertices. Once R V is derived, the construction of quotient graphs proceeds in polynomial time, with each inter-class edge determined via constrained maximum search.
Furthermore, computing the fuzzy distance function d F ( u , v ) for all vertex pairs can be achieved using a modified version of the Floyd–Warshall algorithm adapted for fuzzy conjunctions. These algorithmic pathways suggest that the proposed framework is not only mathematically elegant but also computationally tractable.
We envision extending this line of work by developing concrete implementations and integrating them into fuzzy trust modeling, social influence mapping, and graph-based neural architectures. Additional research directions merit further exploration, including developing efficient algorithms for large-scale fuzzy networks, extending to temporal fuzzy graphs where membership values evolve over time, formal development of fuzzy hypermonoid and fuzzy hypergroupoid structures, algorithmic implementations for the efficient computation of F and F , and exploring applications in machine learning where fuzzy hyperoperations could serve as novel graph neural network layers for uncertainty-aware deep learning architectures as well as application to recommendation systems, epidemic modeling, and robustness analysis in intelligent infrastructure.

Funding

This research received no external funding.

Data Availability Statement

Data is contained within the article.

Conflicts of Interest

The author declares no conflicts of interest.

References

  1. Broder, A.; Kumar, R.; Maghoul, F.; Raghavan, P.; Rajagopalan, S.; Stata, R.; Tomkins, A.; Wiener, J. Graph structure in the web. In Proceedings of the 9th International World Wide Web Conference, Amsterdam, The Netherlands, 15–19 May 2000; pp. 309–320. [Google Scholar]
  2. Newman, M.E. The structure and function of complex networks. SIAM Rev. 2003, 45, 167–256. [Google Scholar] [CrossRef]
  3. Kalampakas, A. Wardrop Optimal Networks. Eur. J. Pure Appl. Math. 2024, 17, 2448–2466. [Google Scholar] [CrossRef]
  4. Dong, J.; Zhang, D.; Nagurney, A. A supply chain network equilibrium model with random demands. Eur. J. Oper. Res. 2004, 156, 194–212. [Google Scholar] [CrossRef]
  5. Wu, L.; Chen, Y.; Shen, K.; Guo, X.; Gao, H.; Li, S.; Pei, J.; Long, B. Graph Neural Networks for Natural Language Processing: A Survey. Found. Trends Mach. Learn. 2023, 16, 119–328. [Google Scholar] [CrossRef]
  6. Mihalcea, R.; Tarau, P. Textrank: Bringing order into text. In Proceedings of the 2004 Conference on Empirical Methods in Natural Language Processing (EMNLP), Barcelona, Spain, 25–26 July 2004; pp. 404–411. [Google Scholar]
  7. Chen, X.; Pan, L. A Survey of Graph Cuts/Graph Search Based Medical Image Segmentation. IEEE Rev. Biomed. Eng. 2018, 11, 112–124. [Google Scholar] [CrossRef]
  8. Kalampakas, A. The Syntactic Complexity of Eulerian Graphs. In Algebraic Informatics, Proceedings of the Second International Conference, CAI 2007, Thessalonkik, Greece, 21–25 May 2007; Bozapalidis, S., Rahonis, G., Eds.; Springer: Berlin/Heidelberg, Germany, 2007; pp. 208–217. [Google Scholar]
  9. Papadopoulos, K. On the Recognition Capacity of Abelian Graph Automata. Eur. J. Pure Appl. Math. 2025, 18, 5850. [Google Scholar] [CrossRef]
  10. Kalampakas, A. Graph Automata and Graph Colorability. Eur. J. Pure Appl. Math. 2023, 16, 112–120. [Google Scholar] [CrossRef]
  11. Ji, S.; Pan, S.; Cambria, E.; Marttinen, P.; Yu, P.S. A Survey on Knowledge Graphs: Representation, Acquisition, and Applications. IEEE Trans. Neural Netw. Learn. Syst. 2022, 33, 494–514. [Google Scholar] [CrossRef]
  12. Hogan, A.; Blomqvist, E.; Cochez, M.; d’Amato, C.; de Melo, G.; Gutierrez, C.; Kirrane, S.; Neumaier, S.; Polleres, A.; Rula, A.; et al. Knowledge graphs. ACM Comput. Surv. (CSUR) 2021, 54, 1–37. [Google Scholar] [CrossRef]
  13. Zhong, L.; Wu, J.; Li, Q.; Peng, H.; Wu, X. A Comprehensive Survey on Automatic Knowledge Graph Construction. ACM Comput. Surv. 2023, 56, 94. [Google Scholar] [CrossRef]
  14. Hu, X.; Sun, L.; Zheng, R.; Xia, X.; Liu, M.; Chen, W.; Zhang, X.; Wang, C. Application of Graph Theory in Liver Research: A Review. Portal Hypertens. Cirrhosis 2024, 3, 234–248. [Google Scholar] [CrossRef]
  15. Shi, K.; Li, L.; Wang, Z.; Chen, H.; Chen, Z.; Fang, S. Identifying microbe-disease association based on graph convolutional attention network: Case study of liver cirrhosis and epilepsy. Front. Neurosci. 2023, 16, 1124315. [Google Scholar] [CrossRef]
  16. Bullmore, E.; Sporns, O. Complex brain networks: Graph theoretical analysis of structural and functional systems. Nat. Rev. Neurosci. 2009, 10, 186–198. [Google Scholar] [CrossRef]
  17. He, Y.; Evans, A. Graph Theoretical Modeling of Brain Connectivity. Curr. Opin. Neurol. 2010, 23, 341–350. [Google Scholar] [CrossRef]
  18. Lo, C.Y.; He, Y.; Lin, C.P. Graph Theoretical Analysis of Human Brain Structural Networks. Rev. Neurosci. 2011, 22, 551–563. [Google Scholar] [CrossRef]
  19. Paik, D.T.; Tian, L.; Williams, I.M.; Rhee, S.; Zhang, H.; Liu, C.; Mishra, R.; Wu, S.M.; Red-Horse, K.; Wu, J.C. Single-Cell RNA Sequencing Unveils Unique Transcriptomic Signatures of Organ-Specific Endothelial Cells. Circulation 2020, 142, 1848–1862. [Google Scholar] [CrossRef]
  20. Sun, H.; Wang, S. Network-based regularization for matched case-control analysis of high-dimensional DNA methylation data. Stat. Med. 2013, 32, 2127–2139. [Google Scholar] [CrossRef]
  21. Manian, V.; Orozco-Sandoval, J.; Diaz-Martinez, V. An Integrative Network Science and Artificial Intelligence Drug Repurposing Approach for Muscle Atrophy in Spaceflight Microgravity. Front. Cell Dev. Biol. 2021, 9, 732370. [Google Scholar] [CrossRef]
  22. Feng, J.; Wu, S.; Yang, H.; Ai, C.; Qiao, J.; Xu, J.; Guo, F. Microbe-bridged disease-metabolite associations identification by heterogeneous graph fusion. Briefings Bioinform. 2022, 23, bbac423. [Google Scholar] [CrossRef]
  23. Marty, F. Sur une généralisation de la notion de groupe. In Proceedings of the 8th Congress des Mathématiciens Scandinaves, Stockholm, Sweden, 14–18 August 1934; pp. 45–49. [Google Scholar]
  24. Corsini, P. Prolegomena of Hypergroup Theory; Aviani Editore: Tricesimo, Italy, 1993. [Google Scholar]
  25. Corsini, P. Hypergraphs and hypergroups. Algebra Universalis 1996, 35, 548–555. [Google Scholar] [CrossRef]
  26. Corsini, P.; Leoreanu, V. Applications of Hyperstructure Theory; Kluwer Academic Publishers: Boston, MA, USA; Dordrecht, The Netherlands; London, UK, 2002. [Google Scholar]
  27. Aghabozorgi, H.; Cristea, I.; Jafarpour, M. On Complementable Semihypergroups. Commun. Algebra 2016, 44, 1740–1753. [Google Scholar] [CrossRef]
  28. Spartalis, S. The hyperoperation relation and the Corsini’s partial or not-partial hypergroupoids (A classification). Ital. J. Pure Appl. Math. 2008, 24, 97–112. [Google Scholar]
  29. Mayerová, S.H.; Maturo, A. Hyperstructures in Social Sciences. AWERProcedia Inf. Technol. Comput. Sci. 2013, 3, 547–552. [Google Scholar]
  30. Konstantinidou, M.; Serafimidis, K. Sur les P-supertrillis. In New Frontiers in Hyperstructures and Related Algebras; Hadronic Press: Palm Harbor, FL, USA, 1996; pp. 139–148. [Google Scholar]
  31. Sonea, A.P.; Chiruță, C. Optimizing HX-Group Compositions Using C++: A Computational Approach to Dihedral Group Hyperstructures. Mathematics 2024, 12, 3492. [Google Scholar] [CrossRef]
  32. Cristea, I.; Kocijan, J.; Novák, M. Introduction to Dependence Relations and Their Links to Algebraic Hyperstructures. Mathematics 2019, 7, 885. [Google Scholar] [CrossRef]
  33. Linzi, A.; Cristea, I. Dependence Relations and Grade Fuzzy Set. Symmetry 2023, 15, 311. [Google Scholar] [CrossRef]
  34. Davvaz, B.; Leoreanu-Fotea, V. Hypergroup Theory; World Scientific: Singapore, 2022. [Google Scholar]
  35. Salvo, M.D.; Faro, J.L. A New Class of Hypergroupoids Associated to Binary Relations. Mult.-Valued Log. 2003, 9, 361–375. [Google Scholar]
  36. Feng, Y.; Corsini, P. On Fuzzy Corsini’s Hyperoperations. J. Appl. Math. 2012, 2012, 685681. [Google Scholar] [CrossRef]
  37. Vougiouklis, T. Hyperstructures and Their Representations; Hadronic Press: Palm Harbor, FL, USA, 1994. [Google Scholar]
  38. Vougiouklis, T. On Hv-rings and Hv-representations. Discret. Math. 1999, 208–209, 615–620. [Google Scholar] [CrossRef]
  39. Vougiouklis, T. Hypermatrix Representations of Finite Hv-groups. Eur. J. Comb. 2015, 44, 307–311. [Google Scholar] [CrossRef]
  40. Massouros, C.; Massouros, G. An Overview of the Foundations of the Hypergroup Theory. Mathematics 2021, 9, 1014. [Google Scholar] [CrossRef]
  41. Massouros, G.; Massouros, C. Hypercompositional Algebra, Computer Science and Geometry. Mathematics 2020, 8, 1338. [Google Scholar] [CrossRef]
  42. Chvalina, J.; Novak, M.; Smetana, B.; Stanek, D. Sequences of Groups, Hypergroups and Automata of Linear Ordinary Differential Operators. Mathematics 2021, 9, 319. [Google Scholar] [CrossRef]
  43. Cristea, I.; Stefanescu, M. Binary relations and reduced hypergroups. Discret. Math. 2008, 308, 3537–3544. [Google Scholar] [CrossRef]
  44. Cristea, I.; Stefanescu, M. Hypergroups and n-ary relations. Eur. J. Comb. 2010, 31, 780–789. [Google Scholar] [CrossRef]
  45. Cristea, I.; Stefanescu, M.; Anghluta, C. About the fundamental relations defined on the hypergroupoids associated with binary relations. Eur. J. Comb. 2011, 32, 72–81. [Google Scholar] [CrossRef]
  46. Spartalis, S. Hypergroupoids obtained from groupoids with binary relations. Ital. J. Pure Appl. Math. 2004, 16, 201–210. [Google Scholar]
  47. Spartalis, S.; Mamaloukas, C. On hyperstructures associated with binary relations. Comput. Math. Appl. 2006, 51, 41–50. [Google Scholar] [CrossRef]
  48. Rosenberg, I. Hypergroups and Join Spaces determined by Relations. Ital. J. Pure Appl. Math. 1998, 4, 93–101. [Google Scholar]
  49. Corsini, P. On the Hypergroups Associated with Binary Relations. Mult.-Valued Log. 2000, 5, 407–420. [Google Scholar]
  50. Corsini, P. Binary relations and hypergroupoids. Ital. J. Pure Appl. Math. 2000, 7, 11–18. [Google Scholar]
  51. Corsini, P.; Leoreanu, V. Hypergroups and Binary Relations. Algebra Universalis 2000, 43, 321–330. [Google Scholar] [CrossRef]
  52. Rasovic, S.J. On Hyperrings Associated with Binary Relations on Semihypergroup. Ital. J. Pure Appl. Math. 2013, 30, 279–288. [Google Scholar]
  53. Massouros, C.G.; Tsitouras, C. Enumeration of hypercompositional structures defined by binary relations. Ital. J. Pure Appl. Math 2011, 28, 43–54. [Google Scholar]
  54. Tsitouras, C.; Massouros, C. Enumeration of Rosenberg-type hypercompositional structures defined by binary relations. Eur. J. Comb. 2012, 33, 1777–1786. [Google Scholar] [CrossRef]
  55. Dzhabri, K.S.K.A.; Hamza, A.H.M.; Eissa, Y.S. On DG-topological spaces associated with directed graphs. J. Discret. Math. Sci. Cryptogr. 2020, 23, 1039–1046. [Google Scholar]
  56. Firouzkouhi, N.; Ameri, R.; Amini, A.; Bordbar, H. Semihypergroup-Based Graph for Modeling International Spread of COVID-19 in Social Systems. Mathematics 2022, 10, 4405. [Google Scholar] [CrossRef]
  57. Golmohamadian, M.; Zahedi, M.M. Color hypergroup and join space obtained by the vertex coloring of a graph. Filomat 2017, 31, 6501–6513. [Google Scholar] [CrossRef]
  58. Iranmanesh, M.; Jafarpour, M.; Cristea, I. The non-commuting graph of a non-central hypergroup. Open Math. 2019, 17, 1035–1044. [Google Scholar] [CrossRef]
  59. Taouktsoglou, A.; Spartalis, S. Precedence Hyperstructures and Graphs in Assembly Line Design. Ital. J. Pure Appl. Math. 2025, 53, 166–184. [Google Scholar]
  60. Spartalis, S.; Konstantinidou, M.; Taouktsoglou, A. C-hypergroupoids obtained by special binary relations. Comput. Math. Appl. 2010, 59, 2628–2635. [Google Scholar] [CrossRef]
  61. Leoreanu, V.; Leoreanu, L. Hypergroups Associated with Hypergraphs. Ital. J. Pure Appl. Math. 1998, 4, 119–126. [Google Scholar]
  62. Hamidi, M.; Cristea, I. Hyperideal-based zero-divisor graph of the general hyperring Zn. AIMS Math. 2024, 9, 15891–15910. [Google Scholar] [CrossRef]
  63. Golmohamadian, M.; Zahedi, M.M.; Soltankhah, N. Some algebraic hyperstructures related to zero forcing sets and forcing digraphs. J. Algebra Its Appl. 2019, 18, 1950192. [Google Scholar] [CrossRef]
  64. Massouros, G.G.; Massouros, C.G. State Machines and Hypergroups. Mathematics 2022, 10, 2427. [Google Scholar] [CrossRef]
  65. Kalampakas, A.; Spartalis, S.; Tsigkas, A. The Path Hyperoperation. Analele Științifice ale Univ. “Ovidius” Constanța Ser. Mat. 2014, 22, 141–153. [Google Scholar] [CrossRef]
  66. Kalampakas, A.; Spartalis, S. Path hypergroupoids: Commutativity and graph connectivity. Eur. J. Comb. 2015, 44, 257–264. [Google Scholar] [CrossRef]
  67. Bayat Tajvar, R.; Latifi, M. On the Path Hyperoperation and its Connections with Hypergraph Theory. J. Algebr. Syst. 2023, 10, 309–321. [Google Scholar]
  68. Kalampakas, A.; Spartalis, S. Hyperoperations on directed graphs. J. Discret. Math. Sci. Cryptogr. 2024, 27, 1011–1025. [Google Scholar] [CrossRef]
  69. Kalampakas, A. An Overview of Hypercompositional Algebra Applications on Graphs. Ital. J. Pure Appl. Math. 2025, 53, 92–103. [Google Scholar]
  70. Rosenfeld, A. Fuzzy Graphs. In Fuzzy Sets and Their Applications to Cognitive and Decision Processes; Academic Press: Cambridge, MA, USA, 1975; pp. 77–95. [Google Scholar]
  71. Mordeson, J.N.; Nair, P.S. Fuzzy Graphs and Fuzzy Hypergraphs; Studies in Fuzziness and Soft Computing; Physica: Ringwood, Australia, 2000; Volume 46. [Google Scholar]
  72. Mathew, S.; Mordeson, J.N.; Malik, D.S. Fuzzy Graph Theory; Springer: Berlin, Germany, 2018. [Google Scholar]
  73. Xu, X.; Xu, Z. Graph-Based Multi-Agent Decision Making. Int. J. Approx. Reason. 2012, 53, 502–512. [Google Scholar]
  74. Samanta, S.; Pal, M. Telecommunication System Based on Fuzzy Graphs. J. Telecommun. Syst. Manag. 2013, 3, 1–6. [Google Scholar] [CrossRef]
  75. Koczy, L.T. Fuzzy Graphs in the Evaluation and Optimization of Networks. Fuzzy Sets Syst. 1992, 4, 307–319. [Google Scholar] [CrossRef]
  76. Thakur, G.K.; Priya, B.; Kumar, S.P. A Novel Fuzzy Graph Theory-Based Approach for Image Representation and Segmentation Via Graph Coloring. J. Appl. Secur. Res. 2019, 14, 74–87. [Google Scholar] [CrossRef]
  77. Zareie, A.; Sakellariou, R. Centrality measures in fuzzy social networks. Inf. Syst. 2023, 114, 102–179. [Google Scholar] [CrossRef]
  78. Mahapatra, R.; Samanta, S.; Pal, M.; Allahviranloo, T.; Kalampakas, A. A Study on Linguistic Z-Graph and Its Application in Social Networks. Mathematics 2024, 12, 2898. [Google Scholar] [CrossRef]
  79. Raja, J.R.; Lee, J.G.; Dhotre, D.; Mane, P.; Rajankar, O.S.; Kalampakas, A.; Jambhekar, N.D.; Bhalke, D.G. Fuzzy graphs and their applications in finding the best route, dominant node and influence index in a network under the hesitant bipolar-valued fuzzy environment. Complex Intell. Syst. 2024, 10, 5195–5211. [Google Scholar] [CrossRef]
  80. Mahapatra, R.; Samanta, S.; Pal, M.; Xin, Q. RSM Index: A New Way of Link Prediction in Social Networks. J. Intell. Fuzzy Syst. 2019, 37, 2137–2151. [Google Scholar] [CrossRef]
  81. Alqahtani, M.; Keerthana, R.; Venkatesh, S.; Kaviyarasu, M. Hesitant Bipolar-Valued Intuitionistic Fuzzy Graphs for Identifying the Dominant Person in Social Media Groups. Symmetry 2024, 16, 1293. [Google Scholar] [CrossRef]
  82. Kosari, S.; Rao, Y.; Jiang, H.; Liu, X.; Wu, P.; Shao, Z. Vague Graph Structure with Application in Medical Diagnosis. Symmetry 2020, 12, 1582. [Google Scholar] [CrossRef]
  83. Gayathri, G.; Mathew, S.; Mordeson, J.N. Connectivity of directed fuzzy incidence graphs applied to traffic networks. J. Appl. Math. Comput. 2023, 69, 3317–3336. [Google Scholar] [CrossRef]
  84. Kalampakas, A.; Spartalis, S.; Iliadis, L. Syntactic recognizability of graphs with fuzzy attributes. Fuzzy Sets Syst. 2013, 229, 91–100. [Google Scholar] [CrossRef]
  85. Kalampakas, A.; Spartalis, S.; Iliadis, L.; Pimenidis, E. Fuzzy graphs: Algebraic structure and syntactic recognition. Artif. Intell. Rev. 2014, 42, 479–490. [Google Scholar] [CrossRef]
  86. Kalampakas, A.; Samanta, S.; Bera, J.; Das, K.C. A Fuzzy Logic Inference Model for the Evaluation of the Effect of Extrinsic Factors on the Transmission of Infectious Diseases. Mathematics 2024, 12, 648. [Google Scholar] [CrossRef]
  87. Ma, J.; Shen, L.; Li, L. A Characterization for Fuzzy Strong Cut Vertices and Fuzzy Strong Cut Edges. Sci. Rep. 2024, 14, 1234. [Google Scholar] [CrossRef]
Figure 3. Flowchart for constructing the quotient fuzzy graph F / R V .
Figure 3. Flowchart for constructing the quotient fuzzy graph F / R V .
Mathematics 13 02180 g003
Figure 4. The fuzzy graph F 3 of Example 3.
Figure 4. The fuzzy graph F 3 of Example 3.
Mathematics 13 02180 g004
Figure 5. The quotient fuzzy graph F 3 / R V . Each vertex C i / μ ( C i ) represents an equivalence class of mutually full-strength connected vertices in F 3 . Edge labels indicate the strongest interclass connection strength.
Figure 5. The quotient fuzzy graph F 3 / R V . Each vertex C i / μ ( C i ) represents an equivalence class of mutually full-strength connected vertices in F 3 . Edge labels indicate the strongest interclass connection strength.
Mathematics 13 02180 g005
Figure 6. The fuzzy graph F 4 of Example 4.
Figure 6. The fuzzy graph F 4 of Example 4.
Mathematics 13 02180 g006
Figure 7. The quotient graph F 4 / R V , where each node represents a class of mutually fully connected vertices, with vertex and edge membership values shown.
Figure 7. The quotient graph F 4 / R V , where each node represents a class of mutually fully connected vertices, with vertex and edge membership values shown.
Mathematics 13 02180 g007
Figure 8. The fuzzy trust network F 5 . Edge labels denote trust levels λ ( u , v ) ; vertex labels denote credibility μ ( v ) .
Figure 8. The fuzzy trust network F 5 . Edge labels denote trust levels λ ( u , v ) ; vertex labels denote credibility μ ( v ) .
Mathematics 13 02180 g008
Figure 9. Quotient fuzzy graph F 5 / R V with vertex classes C 1 , C 2 , C 3 . The inter-class trust path from C 1 C 3 has a strength of 0.6.
Figure 9. Quotient fuzzy graph F 5 / R V with vertex classes C 1 , C 2 , C 3 . The inter-class trust path from C 1 C 3 has a strength of 0.6.
Mathematics 13 02180 g009
Figure 10. Fuzzy graph F 6 representing a biological system. Vertex labels show membership values μ ( v i ) ; edge labels show connection strengths λ ( u , v ) . The critical bottleneck edge v 3 v 6 (strength 0.5) limits signal flow between modules.
Figure 10. Fuzzy graph F 6 representing a biological system. Vertex labels show membership values μ ( v i ) ; edge labels show connection strengths λ ( u , v ) . The critical bottleneck edge v 3 v 6 (strength 0.5) limits signal flow between modules.
Mathematics 13 02180 g010
Figure 11. Quotient fuzzy graph F 6 / R V capturing inter-module connectivity and dominant signal transmission routes.
Figure 11. Quotient fuzzy graph F 6 / R V capturing inter-module connectivity and dominant signal transmission routes.
Mathematics 13 02180 g011
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Kalampakas, A. Fuzzy Graph Hyperoperations and Path-Based Algebraic Structures. Mathematics 2025, 13, 2180. https://doi.org/10.3390/math13132180

AMA Style

Kalampakas A. Fuzzy Graph Hyperoperations and Path-Based Algebraic Structures. Mathematics. 2025; 13(13):2180. https://doi.org/10.3390/math13132180

Chicago/Turabian Style

Kalampakas, Antonios. 2025. "Fuzzy Graph Hyperoperations and Path-Based Algebraic Structures" Mathematics 13, no. 13: 2180. https://doi.org/10.3390/math13132180

APA Style

Kalampakas, A. (2025). Fuzzy Graph Hyperoperations and Path-Based Algebraic Structures. Mathematics, 13(13), 2180. https://doi.org/10.3390/math13132180

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop