Preprint
Article

This version is not peer-reviewed.

MetaStructures and Iterated MetaStructures: Extensions to Ontology, Computing, Puzzle, Logic, Ethics, Data and Governance

Submitted:

29 August 2025

Posted:

03 September 2025

You are already at the latest version

Abstract
In this work, a Structure is interpreted broadly as a mathematical system that may originate in Set Theory, Logic, Social Science, Business Management, Probability and Statistics, Algebra, Geometry, and related areas. A MetaStructure is conceived as a higher-level framework in which collections of mathematical structures are treated as single objects governed by uniform meta-operations. An Iterated MetaStructure is obtained by repeatedly applying the MetaStructure construction, thereby generating successive layers in which “structures of structures” form a hierarchical tower. This paper investigates whether concepts such as Ontology, Computing, Puzzle, Logic, Ethics, Data, and Governance can be systematically extended within the framework of MetaStructures and Iterated MetaStructures.
Keywords: 
;  ;  ;  ;  ;  ;  ;  ;  

1. Preliminaries

We first collect the basic notions and notation used throughout the paper. Unless explicitly stated otherwise, all sets and structures considered here are finite.

1.1. Classical Structure

In this work, a Structure is understood broadly as a mathematical system that may arise in Set Theory, Logic, Probability and Statistics, Algebra, Geometry, and related domains.
Definition 1
(Classical Structure). (cf. [1,2]) A  Classical Structure   C is a mathematical object originating from a traditional area (e.g., Set Theory, Logic, Probability, Statistics, Algebra, Geometry, Graph Theory, Automata Theory, or Game Theory). Formally, write
C = H , { # ( m ) } m I ,
where:
  • H is a nonempty carrier (universe);
  • for each m I Z > 0 , there is an m-ary operation
    # ( m ) : H m H ,
    subject to axioms appropriate to the intended structure (e.g., associativity, commutativity, identities, inverses).
The family { # ( m ) } m I specifies the type of C . Illustrative instances include:
  • Set ( S , ) : a pure carrier possibly with designated elements/relations but no operations [3,4].
  • Logic ( L , , , ¬ ) : binary connectives , and a unary connective ¬, validating the usual logical laws [5].
  • Probability space ( Ω , F , P ) : a probability measure P : F [ 0 , 1 ] on a σ-algebra F P ( Ω ) [6,7].
  • Statistical model ( X , A , θ ) : data space X, σ-algebra A , and parameter mapping/selector θ [8,9].
  • Algebraic structures :
    Group ( G , * ) : * : G × G G with associativity, identity, and inverses [10,11].
    Ring ( R , + , × ) : two binary operations satisfying the ring axioms [12,13].
    Vector space ( V , + , · ) over a field F : scalar action · : F × V V with the usual axioms [14,15,16].
  • Metric structure ( X , dist ) with dist : X × X R a metric.
  • Graph ( V , E ) : for undirected graphs E { { u , v } u , v V } ; for directed graphs E V × V [17,18,19,20].
  • Automaton ( Q , Σ , δ , q 0 , F ) : states Q, input alphabet Σ , transition function δ : Q × Σ Q , start state q 0 Q , and accepting set F Q [21,22].
  • Game ( N , { A i } i N , { u i } i N ) : players N, action sets A i , and payoff functions u i : j N A j R [23,24].
Two closely related generalizations, the HyperStructure [25,26,27,28] and the SuperHyperStructure [29,30,31,32], have also been the focus of recent investigations.

1.2. MetaStructure (Structure of a Structure)

Fix a single–sorted, finitary signature
Σ = Func , Rel , ar Func , ar Rel ,
where Func and Rel are the sets of function and relation symbols, and ar records arities. A (single–sorted) Σ -structure is a tuple
C = H , ( f C ) f Func , ( R C ) R Rel ,
with nonempty carrier H , interpretations f C : H m H for each f of arity m , and relations R C H r for each R of arity r . Let Str Σ denote the class of all such structures.
Definition 2
(MetaStructure over a fixed signature). (cf. [33]) A MetaStructure (i.e., a “structure of structures”) is a pair
M = U , ( Φ ) Λ ,
where:
  • U Str Σ is a nonempty collection of Σ -structures (level–0 objects);
  • for each label Λ with meta–arity k N , the meta–operation
    Φ : U k U
    is specified uniformly by constructors acting on carriers and symbol interpretations:
    Γ ( C 1 , , C k ) = H ( carrier built by A functorial recipe ) ; f Func : f Φ ( C 1 , , C k ) = Λ f f C 1 , , f C k ; R Rel : R Φ ( C 1 , , C k ) = Ξ R R C 1 , , R C k ,
    where Λ f and Ξ R depend only on f , R , and produce the corresponding output interpretations over H .
Each Φ is isomorphism–invariant (natural): given isomorphisms α i : C i D i for 1 i k , there is an induced isomorphism
Φ ( α 1 , , α k ) : Φ ( C 1 , , C k ) Φ ( D 1 , , D k ) ,
compatible with all function and relation symbols of Σ.

1.3. Iterated MetaStructure (Structure of Structure of ⋯ of Structure)

An Iterated MetaStructure arises by repeatedly applying the MetaStructure construction, producing successive levels where “structures of structures” form a hierarchical tower (cf. [33,34,35,36]).
Definition 3
(Iterated MetaStructure of depth t ). (cf. [33]) For t N , an Iterated MetaStructure of depth tover Σ is a MetaStructure M ( t ) obtained by t successive applications of a lifting procedure. If s < t , lift a height–s MetaStructure M ( s ) = ( U ( s ) , { i } , { S j } ) to height t via
ι s t : U ( s ) U Σ t s U ( t ) : = U Σ t s U ( s ) ,
and, for each meta–operation i : ( E Σ m i ) k i P n i ( E Σ n i ) , define its lift by
i : E Σ m i + t s k i P n i E Σ n i + t s , i U Σ t s ( x 1 ) , , U Σ t s ( x k i ) : = U Σ t s i ( x 1 , , x k i ) ,
and similarly for relations, S j : = U Σ t s × j ( S j ) .

2. Main Results: Some Iterated MetaStructure

In this section, we present the main contributions of this paper, namely the formulation of Some Iterated MetaStructure.

2.1. Iterated-MetaOntology (Ontology of ... of Ontology)

An ontology is a formal system specifying entities, their kinds, and relations, thereby providing a structured representation of existence within a logical framework [37,38]. A MetaOntology is a higher–level structure that treats ontologies themselves as objects, studying their commitments, fundamentality orders, and interrelations across different domains [39,40,41]. An Iterated MetaOntology is a recursive generalization in which the meta-level construction is reapplied, forming hierarchical structures of ontologies of ontologies, rigorously captured by the theory of Iterated MetaStructures.
Definition 4 (MetaOntology (Ontology of Ontologies)).  Fix a first–order two–sorted language Σ with sorts Ont (ontologies) and Kind (entity kinds). The nonlogical symbols are:
Ont × Ont , K Ont × Kind , F Ont × Kind × Kind .
Intended readings: O O (“ O is at least as strong as O”), K ( O , e ) (“ontology O is committed to kind e” in the Quinean sense), and F ( O , e , e ) (“in O, e is no more fundamental than e ”).
A MetaOntology (literally, an ontology of ontologies) is an L –structure
M = U , E ; , K , F ,
where U is a set of ontologies (elements of sort Ont ), E is a set of entity kinds (elements of sort Kind ), and the following axioms (the theory T ) hold:
1. 
( U , ) is a preorder: O ( O O ) and O , O , O ( O O O O ) O O .
2. 
For each fixed O U , F ( O , · , · ) is a preorder on E: e F ( O , e , e ) and e , e , e F ( O , e , e ) F ( O , e , e ) F ( O , e , e ) .
3. 
Monotonicity of ontological commitment: O , O U , e E ,
O O K ( O , e ) K ( O , e ) .
When concrete ontologies O = ( Σ O , T O ) U and a defining family Δ = { φ e ( x ) } e E are given, one may define  K ( O , e ) by
K ( O , e ) iff T O x φ e ( x ) ,
so that K records Quinean ontological commitments, while F captures a neo-Aristotelian fundamentality preorder per O.
Example 1
(Real-world MetaOntology: Retail product ontologies). Fix the kind universe
E = { Person ( e 1 ) , Product ( e 2 ) , Device ( e 3 ) , Disease ( e 4 ) } .
Consider three concrete retail ontologies (base-level objects)
O A , O B , O C U ,
with Quinean commitments K ( O , · ) encoded as 0–1 row vectors χ K O = ( k 1 , k 2 , k 3 , k 4 ) { 0 , 1 } 4 in the order ( e 1 , e 2 , e 3 , e 4 ) :
χ K O A = ( 1 , 1 , 1 , 0 ) , χ K O B = ( 0 , 1 , 1 , 0 ) , χ K O C = ( 1 , 1 , 1 , 1 ) .
Define the strength preorder O O by componentwise inclusion χ K O χ K O (i.e., k i k i for all i). Then
O B O A O C since ( 0 , 1 , 1 , 0 ) ( 1 , 1 , 1 , 0 ) ( 1 , 1 , 1 , 1 ) .
For each O { O A , O B , O C } , specify a fundamentality preorder F ( O , · , · ) on E via its (Boolean) adjacency matrix R O { 0 , 1 } 4 × 4 , where R O ( i , j ) = 1 abbreviates F ( O , e i , e j ) (“ e i no more fundamental than e j ”). Take (always) reflexivity R O ( i , i ) = 1 , and add the following domain-motivated relations:
R O A ( e 3 , e 2 ) = 1 ( Device Product ) , R O B ( e 3 , e 2 ) = 1 , R O C ( e 4 , e 1 ) = 1 ( Disease Person ) .
Transitivity holds because with Boolean matrix product ( , ) we have
( R O A R O A ) ( 3 , 2 ) = R O A ( 3 , 2 ) R O A ( 2 , 2 ) R O A ( 3 , 3 ) R O A ( 3 , 2 ) = 1 1 = 1 R O A ( 3 , 2 ) ,
and similarly for all coordinates (diagonal reflexivity is preserved, off-diagonal arrows only compose to existing ones), hence each F ( O , · , · ) is a preorder.
Finally, MetaOntology axiom (commitment monotonicity) is verified numerically: if O O and K ( O , e i ) = 1 , then k i k i forces K ( O , e i ) = 1 . For instance, along O B O A , since K ( O B , e 3 ) = 1 (commitment toDevice), we get K ( O A , e 3 ) = 1 . Thus M = ( U , E ; , K , F ) with U = { O A , O B , O C } is a valid MetaOntology in the sense of Definition 4.
Definition 5 (Iterated-MetaOntology (Ontology of … of Ontology)).  Let O be a nonempty class of (base) ontologies O = ( Σ O , T O ) , and let E be a fixed set of entity kinds. Let ( 1 ) O × O , K ( 1 ) O × E , and F ( 1 ) O × E × E be relations satisfying the axioms in Definition 4 (preorder, commitment monotonicity, and per-kind fundamentality).
Inductively for t 2 , a depth- t Iterated-MetaOntology is a structure
M ( t ) : = U ( t ) , E ; ( t ) , K ( t ) , F ( t )
defined from a nonempty set U ( t ) of depth- ( t 1 ) Iterated-MetaOntologies
X U ( t ) X = U X , E ; X , K X , F X with U X U ( t 1 ) ,
and with the level-t relations lifted from level t 1 as follows:
( Order lift ) X ( t ) Y : f : U X U Y s . t . O U X , O ( t 1 ) f ( O ) .
( Commitment lift ) K ( t ) ( X , e ) : O U X with K ( t 1 ) ( O , e ) .
( Fundamentality lift ) F ( t ) ( X , e , e ) : O U X , F ( t 1 ) ( O , e , e ) .
Example 2 (Real-world Iterated-MetaOntology: Cross-domain data governance (Retail ⇒ Healthcare)).  Keep the same kind universe E = { e 1 = Person , e 2 = Product , e 3 = Device , e 4 = Disease } . Form two level-1 MetaOntologies (each as in Example 1):
Retail layer M ret ( 1 ) with
U ret = { O A , O B } , χ K O A = ( 1 , 1 , 1 , 0 ) , χ K O B = ( 0 , 1 , 1 , 0 ) , R O A ( 3 , 2 ) = R O B ( 3 , 2 ) = 1 .
Healthcare layer M hlth ( 1 ) with base ontologies H A , H B specified by
χ K H A = ( 1 , 0 , 1 , 1 ) , χ K H B = ( 1 , 1 , 1 , 1 ) ,
and fundamentality preorders (besides reflexivity) given by
R H A ( 4 , 1 ) = 1 ( Disease Person ) , R H B ( 3 , 2 ) = 1 , R H B ( 4 , 1 ) = 1 .
Within each layer we use the same strength preorder (componentwise inclusion), so O B O A and H A H B .
Depth-2 objects and their lifted relations. Define the depth-2 Iterated-MetaOntologies
X : = M ret ( 1 ) , Y : = M hlth ( 1 ) .
By Definition 5, the level-2 commitment and fundamentality are:
K ( 2 ) ( X , e i ) O U ret : K ( 1 ) ( O , e i ) , F ( 2 ) ( X , e i , e j ) O U ret : F ( 1 ) ( O , e i , e j ) ,
and analogously for Y .
Concretely, using Boolean OR/AND across the layer:
Commitment (OR over bases).
χ K ( 2 ) X = χ K O A χ K O B = ( 1 , 1 , 1 , 0 ) , χ K ( 2 ) Y = χ K H A χ K H B = ( 1 , 1 , 1 , 1 ) .
Fundamentality (AND over bases). For X , both O A and O B have R ( 3 , 2 ) = 1 , hence
R X ( 2 ) ( 3 , 2 ) = 1 , and R X ( 2 ) is reflexive ( identity on all e i ) .
For Y , R H A ( 3 , 2 ) = 0 while R H B ( 3 , 2 ) = 1 , hence
R Y ( 2 ) ( 3 , 2 ) = 0 ( AND ) , R Y ( 2 ) ( 4 , 1 ) = 1 ( present in both ) .
In both cases, R ( 2 ) is a preorder (reflexivity by construction; transitivity holds since Boolean composition of reflexive relations with only these off-diagonal arrows does not create new arrows absent in all bases).
Order lift (witness map). Define f : U ret U hlth by
f ( O A ) = H B , f ( O B ) = H B .
Then for each O U ret we have χ K O χ K H B :
( 1 , 1 , 1 , 0 ) ( 1 , 1 , 1 , 1 ) , ( 0 , 1 , 1 , 0 ) ( 1 , 1 , 1 , 1 ) ,
so O ( 1 ) f ( O ) . By (1), this proves
X ( 2 ) Y .
Level-2 commitment monotonicity (numerical check). Take e 2 = Product . Since K ( 2 ) ( X , e 2 ) = 1 (because K ( 1 ) ( O A , e 2 ) = 1 ), and X ( 2 ) Y via f, we have K ( 1 ) f ( O A ) , e 2 = K ( 1 ) ( H B , e 2 ) = 1 , hence
K ( 2 ) ( Y , e 2 ) = 1 ,
as required by the lifted monotonicity in Lemma 1.
Therefore, the pair M ret ( 1 ) , M hlth ( 1 ) , with the above computations of K ( 2 ) and F ( 2 ) and the witness f, constitutes a concrete Iterated MetaOntology of depth 2 that models cross-domain data governance: retail ontologies feeding into healthcare governance while preserving commitment monotonicity and maintaining well-formed fundamentality preorders at the meta-level.
Proposition 1
(Generalization of MetaOntology). Depth t = 1 recovers Definition 4. In particular, M ( 1 ) = ( U ( 1 ) , E ; ( 1 ) , K ( 1 ) , F ( 1 ) ) with U ( 1 ) = O is precisely a (first-level) MetaOntology; for t = 0 one is left with base ontologies only.
Proof. 
By construction, the t = 1 case uses exactly the relations ( 1 ) , K ( 1 ) , F ( 1 ) postulated for MetaOntology, with underlying domain U ( 1 ) = O (the sort Ont ). No lifting occurs, so the axioms coincide. For t = 0 there is no meta-level structure: only the objects of O remain.    □
Lemma 1
(Axioms are preserved by lifting). Fix t 2 . If ( t 1 ) is a preorder on U ( t 1 ) , if each F ( t 1 ) ( O , · , · ) is a preorder on E, and if
O , O U ( t 1 ) , e E : O ( t 1 ) O K ( t 1 ) ( O , e ) K ( t 1 ) ( O , e ) , (∗)
then ( t ) is a preorder on U ( t ) , each F ( t ) ( X , · , · ) is a preorder on E, and the level-t monotonicity
X ( t ) Y K ( t ) ( X , e ) K ( t ) ( Y , e )
holds for all X , Y U ( t ) and e E .
Proof.(Preorder for ( t ) ). Reflexivity: take X U ( t ) and choose f = id U X in (1); since O ( t 1 ) O for all O , we get X ( t ) X .
Transitivity: suppose X ( t ) Y via f : U X U Y and Y ( t ) Z via g : U Y U Z . Then for all O U X ,
O ( t 1 ) f ( O ) ( t 1 ) g f ( O ) ,
so by transitivity of ( t 1 ) , O ( t 1 ) ( g f ) ( O ) , and (1) yields X ( t ) Z .
(Preorder for F ( t ) ( X , · , · ) ). Reflexivity: for all e E and all O U X , F ( t 1 ) ( O , e , e ) , hence (3) gives F ( t ) ( X , e , e ) .
Transitivity: if F ( t ) ( X , e , e ) and F ( t ) ( X , e , e ) , then for all O U X we have F ( t 1 ) ( O , e , e ) and F ( t 1 ) ( O , e , e ) ; by transitivity at level t 1 , F ( t 1 ) ( O , e , e ) , hence (3) yields F ( t ) ( X , e , e ) .
(Monotonicity of K ( t ) ). Assume X ( t ) Y via f and K ( t ) ( X , e ) . Then there exists O U X with K ( t 1 ) ( O , e ) by (2). From (1) we have O ( t 1 ) f ( O ) , so by (∗), K ( t 1 ) f ( O ) , e . Since f ( O ) U Y , (2) gives K ( t ) ( Y , e ) .    □
Theorem 1
(Iterated-MetaOntology as an Iterated MetaStructure). There exists a single–sorted signature Σ MO and a family of lifts U Σ MO such that the tower M ( t ) t 1 from Definition 5 forms an Iterated MetaStructure in the sense of Definition 3. Moreover, depth t = 1 coincides with MetaOntology and the lifts are isomorphism–invariant.
Proof. Step 1 (Many–sorted to single–sorted coding). Let Σ MO have unary predicates O ( x ) , E ( x ) distinguishing “ontology–points’’ and “kind–points’’, and relation symbols
Pre ( x , y ) , KRel ( x , y ) , FRel ( x , y , z ) .
A two–sorted structure U , E ; , K , F is represented by a single–sorted Σ MO –structure A whose carrier is U E (tagged disjoint union), interpreting O , E as the tags and the relations by restriction to the intended sorts. This standard reduction is definitional and reversible.
Step 2 (Choose the MetaStructure data). Let U ( 1 ) be the class of all Σ MO –structures encoding MetaOntologies over the fixed E and base O , and let the meta–operations be empty. Take as meta–relations exactly Pre , KRel , FRel . This yields a MetaStructure M ( 1 ) = ( U ( 1 ) , { } , { Pre , KRel , FRel } ) .
Step 3 (Define the lift U Σ MO ). Given any depth- ( t 1 ) object A = U ( t 1 ) , E ; ( t 1 ) , K ( t 1 ) , F ( t 1 ) , define U Σ MO ( A ) to be the Σ MO –structure whose “ontology–points’’ are the elements of U ( t ) (i.e., all depth- ( t 1 ) Iterated-MetaOntologies), whose “kind–points’’ are still E , and with relations given by the lifted clauses (1)–(3). This is exactly the lifting recipe of Definition 3 specialized to relations (no function symbols).
Step 4 (Verification of the Iterated MetaStructure axioms). By Lemma 1, the three axioms of Definition 4 are preserved by the lift from level t 1 to t ; hence the class U ( t ) equipped with the lifted relations again forms a valid MetaOntology object. The isomorphism–invariance required in Definition 2 holds because each lifted relation depends only on the images of elements under set–maps f and on universal/existential quantification over the isomorphism classes of lower–level elements; if α : O O at level t 1 , then O ( t 1 ) f ( O ) iff O ( t 1 ) f ( O ) etc., so the truth values are preserved.
Step 5 (Depth t = 1 ). When t = 1 there is no lifting; thus the construction reproduces Definition 4 verbatim, proving the claimed coincidence and hence the generalization property of Proposition 1.    □
Corollary 1
(Sound tower). For every t 1 , M ( t ) is well defined, and M ( s ) s = 1 t forms an Iterated MetaStructure with relations { Pre , KRel , FRel } obtained by repeated application of the lift U Σ MO .
Proof. 
Immediate by induction on t using Lemma 1 and Theorem 1.    □

2.2. Iterated-Metacomputing (Computing of ... of Computing)

Metacomputing studies computings as objects, applying computable transformations to their descriptions, optimizing performance and costs—thus “computing of computings (cf.[42,43,44,45]). Iterated Metacomputing repeatedly re-applies metacomputation, producing hierarchical layers where transformations optimize not only computings but entire metacomputing structures.
Definition 6
(Computing, extensional equality). Let Comp be a nonempty class of computings, each a tuple
C = ( I , O , Π , R ) ,
with input space I, output space O, a (partial) computable map Π : I O (the extensional semantics), and a resource profile R (e.g., time, space, energy budgets). Two computings C , C Comp are extensionally equal , written C C , if Π = Π as partial functions I O (after identifying domains/codomains in the obvious way).
Definition 7
(Descriptions and metacomputations). Fix an effective encoder Desc : Comp X into a set X of descriptions (programs, circuits, schedules, architectures, ...). A metacomputation is any computable functional M : X X . Its extensional lifting
M ^ : Comp Comp
is required to satisfy M ^ ( C ) C with Desc ( C ) = M ( Desc ( C ) ) (semantics preservation). Fix global evaluation functionals
J : Comp R 0 ( performance ) , C cost : X R 0 ( design / engineering cos t ) ,
and let β 0 be a tradeoff parameter.
Definition 8 (Metacomputing structure (level 1)).  A Metacomputing structure is a pair
C ( 1 ) = ( U , MSet ) ,
where U Comp is nonempty and MSet is a nonempty set of metacomputations on X . Define the improvement relation (w.r.t. β) on U by
Imp β C ( 1 ) ( C , C ) : M MSet : C = M ^ ( C ) J ( C ) + β C cost M ( Desc ( C ) ) J ( C ) + β C cost Desc ( C ) .
Write the capability predicate  Cap ( C ( 1 ) , f ) for a partial function f to mean C U with Π C = f . We induce a preorder on level 1 objects by
C ( 1 ) ( 1 ) D ( 1 ) : C U C U with C C and Imp β D ( 1 ) ( C , C ) .
Remark 1.
Definition 8 generalizes the “single-operator” presentation ( Metacomputing (Computing of Computings) in the prompt): choosing MSet = { M } recovers that setting and the same objective J ( M ^ ( C ) ) + β C cost ( M ( Desc ( C ) ) ) .
(level 1): Top- k service in an e-commerce backend).Example 3 (Real-world Metacomputing  Task. A REST endpoint returns the top-k products by score from an input list. Let the computing be
C 0 = ( I , O , Π 0 , R 0 ) Comp , I = { ( a , k ) a R n , 1 k n } , O = R k .
Π 0 maps ( a , k ) to the subsequence of the k largest entries of a in nonincreasing order. (We assume stable ordering for ties; outputs are exact, not approximate.) The resource profile R 0 tracks average latency (ms) at a fixed input mix.
Description and objective. Fix an encoder Desc : Comp X . For C, write J ( C ) for the (lower-is-better) average latency (ms), and C cost ( Desc ( C ) ) for an engineering cost proxy (nonnegative units). Choose β = 5 (ms per cost unit). The scalar objective is
Φ β ( C ) : = J ( C ) + β C cost ( Desc ( C ) ) .
Baseline. Suppose for C 0 we measured
J ( C 0 ) = 420 ms , C cost ( Desc ( C 0 ) ) = 10 , Φ β ( C 0 ) = 420 + 5 · 10 = 470 .
Metacomputations. Consider two computable, semantics-preserving description-level transforms:
(M1) 
Selection-then-partial-sort: rewrite the implementation to usenth_element followed by a partial sort on the top-k window. As a functional on descriptions, M 1 : X X .
(M2) 
SIMD kernel fusion : fuse adjacent passes and employ vectorized comparisons for the partition step; functional M 2 .
Each M i preserves extensional semantics (same top-k with the same stable tie-breaking), so M i ^ ( C ) C for every C in scope.
After (M1). Let C 1 : = M 1 ^ ( C 0 ) , with empirical
J ( C 1 ) = 120 ms , C cost ( Desc ( C 1 ) ) = 14 ,
hence
Φ β ( C 1 ) = 120 + 5 · 14 = 190 .
Numeric verification of improvement:
Φ β ( C 1 ) = 190 Φ β ( C 0 ) = 470 ,
so by Definition 8, Imp β C ( 1 ) ( C 0 , C 1 ) holds for any C ( 1 ) whose MSet contains M 1 .
After (M2) on top of (M1). Let C 2 : = M 2 ^ ( C 1 ) . Suppose
J ( C 2 ) = 90 ms , C cost ( Desc ( C 2 ) ) = 17 , Φ β ( C 2 ) = 90 + 5 · 17 = 175 .
Again Φ β ( C 2 ) Φ β ( C 1 ) , so Imp β C ( 1 ) ( C 1 , C 2 ) . By transitivity of ≤, also Imp β C ( 1 ) ( C 0 , C 2 ) .
A level-1 Metacomputing structure. Let U = { C 0 } and MSet = { M 1 , M 2 } . Then C ( 1 ) = ( U , MSet ) is a valid level-1 object and the above inequalities prove concrete instances of Imp β C ( 1 ) .
Definition 9 (Iterated-Metacomputing (depth t)).  For t 2 , a depth- t Iterated-Metacomputing structure is a pair
C ( t ) : = ( U ( t ) , MSet ( t ) ) ,
where U ( t ) is a nonempty set of depth- ( t 1 ) structures and MSet ( t ) is a nonempty set of metacomputations (acting on the common description space X ). Define the lifted improvement between level- ( t 1 ) objects inside two level-t structures by
Imp β C ( t ) D ( t ) ( X , Y ) : ϕ : U X U Y C U X Imp β D ( t ) C , ϕ ( C ) ,
where Imp β D ( t ) abbreviates Imp β D ( t ) applied to underlying computings . Set the level-t preorder by
C ( t ) ( t ) D ( t ) : X U ( t ) Y U ( t ) Imp β C ( t ) D ( t ) ( X , Y ) .
Lift the capability predicate to level t by
Cap ( t ) C ( t ) , f : X U ( t ) Cap ( t 1 ) ( X , f ) ,
with the base clause Cap ( 1 ) Cap from Definition 8.
Example 4 (Iterated-Metacomputing (depth 2): Company-wide CI/CD + runtime unification).  Setting. Two product teams own separate services:
Image service A : C A 0 U A , Search service B : C B 0 U B .
Each service already has its own level-1 Metacomputing structure:
C A ( 1 ) = ( U A , MSet A ) , C B ( 1 ) = ( U B , MSet B ) ,
where MSet A includes kernel fusion and tiling passes, and MSet B includes index-layout rewrites and query-plan normalizations. All transforms are semantics-preserving for their services.
Numbers at level 1. With the same objective Φ β ( C ) = J ( C ) + β C cost ( Desc ( C ) ) and β = 10 :
Service A : J ( C A 0 ) = 85 ms , C cost = 6 Φ β ( C A 0 ) = 85 + 10 · 6 = 145 , M MSet A : C A 1 = M ^ ( C A 0 ) , J ( C A 1 ) = 70 ms , C cost = 8 Φ β ( C A 1 ) = 70 + 10 · 8 = 150 . Service B : J ( C B 0 ) = 230 ms , C cost = 9 Φ β ( C B 0 ) = 230 + 10 · 9 = 320 , M MSet B : C B 1 = M ^ ( C B 0 ) , J ( C B 1 ) = 190 ms , C cost = 11 Φ β ( C B 1 ) = 190 + 10 · 11 = 300 .
Here, C A 1 does not improve the scalar objective (145 → 150), so Imp β C A ( 1 ) ( C A 0 , C A 1 ) fails . By contrast, Imp β C B ( 1 ) ( C B 0 , C B 1 ) holds (320 → 300).
A level-2 initiative (cross-cutting metacomputations). Define a depth-2 structure
D ( 2 ) = ( U ( 2 ) , MSet ( 2 ) ) , U ( 2 ) = { C A ( 1 ) , C B ( 1 ) } .
Let MSet ( 2 ) contain computable functionals acting on descriptions across services :
(T1) 
LTO-unified toolchain : enforce link-time optimization and PGO across all C/C++ components;
(T2) 
Allocator standardization : replace per-service allocators with a shared slab allocator tuned for the joint workload;
(T3) 
CI cache coherence : unify build cache keys and artifact promotion across repos to reduce engineering overhead.
Each ( T i ) induces a semantics-preserving map on every underlying computing and has a well-defined design-cost impact via Desc .
Lifted improvements. We must witness (Definition 9) that for each level-1 object in U ( 2 ) there is an improved counterpart inside D ( 2 ) . Pick a single cross-cutting transformation T MSet ( 2 ) that applies (T1)+(T2)+(T3) jointly.
Define ϕ : U C A ( 1 ) U C B ( 1 ) U C A ( 1 ) U C B ( 1 ) by
ϕ ( C ) : = T ^ ( C ) for each underlying C .
Concretely:
C A 2 : = ϕ ( C A 0 ) , C B 2 : = ϕ ( C B 0 ) .
Assume measured post- T figures:
Service A ( post - T ) : J ( C A 2 ) = 72 ms , C cost = 6 Φ β ( C A 2 ) = 72 + 10 · 6 = 132 , Service B ( post - T ) : J ( C B 2 ) = 185 ms , C cost = 10 Φ β ( C B 2 ) = 185 + 10 · 10 = 285 .
Numeric verification (per-object):
Φ β ( C A 2 ) = 132 145 = Φ β ( C A 0 ) , Φ β ( C B 2 ) = 285 320 = Φ β ( C B 0 ) .
Therefore, for every C U C A ( 1 ) U C B ( 1 ) we have Imp β D ( 2 ) ( C , ϕ ( C ) ) , so by Definition 9
Imp β C ( 2 ) D ( 2 ) ( C A ( 1 ) , C A ( 1 ) ) , Imp β C ( 2 ) D ( 2 ) ( C B ( 1 ) , C B ( 1 ) )
hold (taking the codomain objects to be themselves but post- T ). Hence, with U ( 2 ) = { C A ( 1 ) , C B ( 1 ) } on both sides,
C ( 2 ) ( 2 ) D ( 2 )
is certified by the witness ϕ.
Capability monotonicity at depth 2 (worked check). Let f thumb be the exact “thumbnail → JPEG” map realized by some C U C A ( 1 ) . Since Cap ( 2 ) ( C ( 2 ) , f thumb ) holds (witness C), and C ( 2 ) ( 2 ) D ( 2 ) , Lemma 2(2) ensures Cap ( 2 ) ( D ( 2 ) , f thumb ) . Indeed, ϕ ( C ) = T ^ ( C ) computes the same partial function, so Π ϕ ( C ) = f thumb extensionally.
Interpretation. Level 1 optimizes each service locally via its own MSet . Level 2 introduces organization-wide metacomputations that act across description spaces, yielding uniform runtime/toolchain improvements that strictly reduce the scalar objective for every underlying computing—thereby establishing the level-2 preorder and preserving capabilities.
Example 5 (Iterated-Metacomputing (depth 2): AutoML training pipelines over tasks). Base tasks (computings). For datasets D 1 , D 2 , let
C 1 , 0 = ( I 1 , O 1 , Π 1 , 0 , R 1 , 0 ) , C 2 , 0 = ( I 2 , O 2 , Π 2 , 0 , R 2 , 0 )
be training pipelines that map hyperparameters to trained models and metrics ( Π i , 0 returns the same validation metric as the rewritten pipeline; we freeze the metric definition to ensure extensional equality). Take J ( C i ) as epoch-time × epochs-to-target, and C cost as GPU-engineering overhead units; choose β = 0.2 (hours per cost unit).
Level 1 AutoML metacomputations. Each task has MSet i including: ( a ) static-graph rewrites, ( b ) kernel autotuning, ( c ) input pipeline fusion. Suppose
J ( C 1 , 0 ) = 18 h , C cost = 8 Φ β = 18 + 0.2 · 8 = 19.6 , M MSet 1 : C 1 , 1 = M ^ ( C 1 , 0 ) , J ( C 1 , 1 ) = 12 h , C cost = 10 Φ β = 12 + 0.2 · 10 = 14 . J ( C 2 , 0 ) = 30 h , C cost = 7 Φ β = 31.4 , M MSet 2 : C 2 , 1 = M ^ ( C 2 , 0 ) , J ( C 2 , 1 ) = 22 h , C cost = 9 Φ β = 23.8 .
Thus Imp β C 1 ( 1 ) ( C 1 , 0 , C 1 , 1 ) and Imp β C 2 ( 1 ) ( C 2 , 0 , C 2 , 1 ) hold.
Depth 2 (portfolio-level metacomputations). Define
C ( 2 ) = ( { C 1 ( 1 ) , C 2 ( 1 ) } , MSet ( 2 ) ) ,
where MSet ( 2 ) contains:
  • Unified mixed-precision policy: standardize AMP levels, loss-scaling, and BF16/FP16 toggles across tasks;
  • Checkpoint/IO harmonization: align shard sizes and prefetch depths across all tasks.
Let T MSet ( 2 ) apply both. For i { 1 , 2 } define C i , 2 : = T ^ ( C i , 1 ) with measured
J ( C 1 , 2 ) = 10.5 h , C cost = 10 Φ β = 10.5 + 0.2 · 10 = 12.5 14 ,
J ( C 2 , 2 ) = 20.0 h , C cost = 9 Φ β = 20.0 + 0.2 · 9 = 21.8 23.8 .
Thus for each underlying computing C i , 1 there is an improved ϕ ( C i , 1 ) = C i , 2 with Imp β D ( 2 ) ( C i , 1 , C i , 2 ) , certifying C ( 2 ) ( 2 ) D ( 2 ) in the sense of Definition 9.
Proposition 2
(Reduction to Metacomputing). Depth t = 1 in Definition 9 is exactly Definition 8. Hence Iterated-Metacomputing generalizes Metacomputing.
Proof. 
At t = 1 there is no nesting: U ( 1 ) Comp and MSet ( 1 ) X X . All lifted clauses in Definition 9 collapse to those of Definition 8.    □
Lemma 2
(Preorder and capability monotonicity are preserved). For every t 1 :
1. 
( t ) is a preorder on the class of depth-t structures.
2. 
If C ( t ) ( t ) D ( t ) and Cap ( t ) ( C ( t ) , f ) , then Cap ( t ) ( D ( t ) , f ) .
Proof. (1) Reflexivity: take ϕ = id in the definition of Imp β C ( t ) C ( t ) and note that Imp β C ( t ) ( C , C ) holds by choosing M = id and using J ( C ) + β C cost ( Desc ( C ) ) itself.
Transitivity: suppose C ( t ) ( t ) D ( t ) via witnesses X Y and D ( t ) ( t ) E ( t ) via Y Z . Compose the witnessing maps and use the transitivity of (non-strict) ≤ on the scalar objective J ( · ) + β C cost ( · ) to obtain C ( t ) ( t ) E ( t ) .
(2) If Cap ( t ) ( C ( t ) , f ) , choose X U ( t ) with Cap ( t 1 ) ( X , f ) . By C ( t ) ( t ) D ( t ) there exists Y U ( t ) with Imp β C ( t ) D ( t ) ( X , Y ) , which in particular provides, for some C U X realizing f , a C U Y with C C ; hence Cap ( t 1 ) ( Y , f ) and therefore Cap ( t ) ( D ( t ) , f ) .    □
Theorem 2
(Iterated-Metacomputing as an Iterated MetaStructure). There exists a single–sorted signature Σ MC and a lift U Σ MC such that the tower C ( t ) t 1 of Definition 9 forms an Iterated MetaStructure in the sense of Definition 3. Moreover, depth t = 1 coincides with Metacomputing (Definition 8), and the lift is isomorphism–invariant.
Proof. Step 1 (Coding many–sorted data in one sort). Let Σ MC contain unary predicates S ( x ) and C ( x ) , intended to tag structures vs. computings , and binary/ternary relations:
Pre ( x , y ) , Imp β ( x , y ) , Cap ( x , z ) ,
where the third argument z ranges over a fixed universe of partial computable functions (we can represent such z by Gödel codes). Any pair ( U , MSet ) at some level t is encoded by a Σ MC –structure A ( t ) whose carrier is U X U U X (finite nesting as needed), with S , C indicating the tags and with Pre , Imp β , Cap interpreted exactly by ( t ) , Imp β ( · ) , and Cap ( t ) .
Step 2 (Define the lift U Σ MC ). Given A ( t 1 ) , let U Σ MC ( A ( t 1 ) ) be the Σ MC –structure whose S –elements are all depth- ( t 1 ) objects, whose C –elements are the computings they contain, and whose relations are the lifted ones from Definition 9. This is the purely relational instance of Definition 3 (no function symbols are needed).
Step 3 (Iterated MetaStructure axioms). By Lemma 2(1), each Pre –slice is a preorder; by Lemma 2(2) the monotonicity of Cap along Pre holds. These properties are preserved under the lift by construction (the clauses only use existential witnesses and composition of witnessing maps), hence the tower A ( t ) t 1 is an Iterated MetaStructure.
Step 4 (Isomorphism–invariance). If α : A ( t 1 ) B ( t 1 ) is a bijection that preserves S , C and the three relations, then the truth of the lifted clauses is preserved under α because they are defined by bounded first–order formulas using only ∃/∀ over the underlying sets and composition of witnessing maps; hence U Σ MC ( α ) is an isomorphism at level t .
Step 5 (Depth t = 1 ). When t = 1 , A ( 1 ) encodes exactly the data of Definition 8, so level 1 coincides with Metacomputing.    □
Corollary 2
(Soundness of the tower). For every t 1 , the object C ( t ) is well defined and the family { C ( s ) } s = 1 t forms an Iterated MetaStructure under U Σ MC , with preorder ( s ) and capability predicate Cap ( s ) at each level.
Proof. 
Immediate by induction on t using Lemma 2 and Theorem 2.    □

2.3. Iterated-Metapuzzle (Puzzle of ... of Puzzle)

A puzzle is a constraint satisfaction problem: variables have finite domains, constraints restrict assignments, and solutions minimize objectives(cf.[46,47]). A Metapuzzle treats multiple puzzles as components, enforcing meta-constraints across their solutions, optionally optimizing a higher-level objective [48]. An Iterated Metapuzzle recursively re-applies this construction, forming hierarchical layers where meta-constraints and objectives operate over metasolutions themselves.
Definition 10
(Puzzle and solution). Let V = { v 1 , , v n } be a finite set of variables with finite domains D ( v i ) and write D : = i = 1 n D ( v i ) . Let C = { φ j } j = 1 m be predicates φ j : D { 0 , 1 } and let f : D R ¯ : = R { + } be an (optional) objective (when no objective is intended, take f 0 ). The feasible set and solution set are
Feas ( P ) : = x D j , φ j ( x ) = 1 , Sol ( P ) : = arg min x Feas ( P ) f ( x ) .
A puzzle is the tuple P = ( V , D , C ; f ) .
Definition 11 (Metapuzzle level 1): puzzle of puzzles).  Let P = ( P i ) i = 1 k be a finite family of puzzles, and abbreviate S i : = Sol ( P i ) . A metapuzzle is a pair
M ( 1 ) = P , ( Ψ ) = 1 r ; F ,
where each meta-constraint Ψ : i = 1 k S i { 0 , 1 } couples base solutions, and F : i = 1 k S i R ¯ is a meta-objective (set F 0 if not given). Define
Feas ( M ( 1 ) ) : = x i S i | , Ψ ( x ) = 1 , Sol ( M ( 1 ) ) : = arg min x Feas ( M ( 1 ) ) F ( x ) .
Example 6 (Real-world Metapuzzle (level 1): E-commerce packing & courier choice).  Setting. A single customer order must be (i) packed into shipping boxes and (ii) dispatched by a courier. Packing and routing are modeled as two base puzzles; meta-constraints couple their solutions.
Base puzzle P pack (bin-packing with costs). Items have volumes v = ( 6 , 5 , 4 ) and weights w = ( 3 , 2 , 2 ) , so v i = 15 and w i = 7 . Available boxes:
S : ( cap = 10 , cost = 1.5 ) , M : ( cap = 15 , cost = 3.0 ) .
Variables: choose a multiset of boxes and an assignment of items so that box capacities are not exceeded. Objective f pack : total box cost. Two feasible optimal packings (both attain cost 3.0 ):
x 1 pack ̲ = 1 × M holding ( 6 , 5 , 4 ) , x 2 pack ̲ = 2 × S with ( 6 , 4 ) & ( 5 ) .
Hence Sol ( P pack ) = { x 1 pack , x 2 pack } with
# boxes ( x 1 pack ) = 1 , usesM ( x 1 pack ) = 1 ; # boxes ( x 2 pack ) = 2 , usesM ( x 2 pack ) = 0 .
Base puzzle P route (courier choice). Couriers:
Bike : ( cap = 8 , time = 30 , cost = 5 ) , Van : ( cap = 20 , time = 20 , cost = 8 ) .
Variable: choose r { Bike , Van } such that cap ( r ) w i = 7 (both satisfy). Objective f route : delivery time T ( r ) (we will combine cost at the meta-level).
Level-1 metapuzzle M ( 1 ) = ( { P pack , P route } , { Ψ 1 , Ψ 2 } ; F ) . For any pair ( x pack , r ) Sol ( P pack ) × Sol ( P route ) define the meta-constraints:
Ψ 1 : # boxes ( x pack ) > 1 ( r = Van ) ,
Ψ 2 : usesM ( x pack ) = 1 ( r = Van ) .
These encode handling and size restrictions (multiple boxes or any M requires a van). Define the meta-objective with tradeoff parameter λ = 2 :
F ( x pack , r ) : = T ( r ) + λ · f pack ( x pack ) + cost ( r ) .
Feasibility and enumeration. The two candidate packings force r = Van by Ψ 1 / Ψ 2 :
( x 1 pack , Van ) is feasible , ( x 2 pack , Van ) is feasible .
Pairs with Bike are infeasible: for x 1 pack by Ψ 2 , for x 2 pack by Ψ 1 .
Numerical minimization. Compute
F ( x 1 pack , Van ) = 20 + 2 · ( 3.0 + 8 ) = 20 + 22 = 42 ,
F ( x 2 pack , Van ) = 20 + 2 · ( 3.0 + 8 ) = 42 .
Thus
Feas ( M ( 1 ) ) = { ( x 1 pack , Van ) , ( x 2 pack , Van ) } , Sol ( M ( 1 ) ) = { ( x 1 pack , Van ) , ( x 2 pack , Van ) } .
Either meta-solution attains the optimal meta-objective value 42 and satisfies both Ψ 1 and Ψ 2 .
Definition 12 (Iterated-Metapuzzle (depth t )).  Inductively define depth-t objects for t 2 by taking a finite family X ( t 1 ) = ( X i ( t 1 ) ) i = 1 k of depth- ( t 1 ) metapuzzles and setting
S i ( t 1 ) : = Sol X i ( t 1 ) .
A depth- t metapuzzle is a pair
M ( t ) = X ( t 1 ) , ( Ψ ( t ) ) = 1 r ; F ( t ) ,
with meta-constraints Ψ ( t ) : i = 1 k S i ( t 1 ) { 0 , 1 } and objective F ( t ) : i = 1 k S i ( t 1 ) R ¯ . Define
Feas ( M ( t ) ) : = x i S i ( t 1 ) | , Ψ ( t ) ( x ) = 1 , Sol ( M ( t ) ) : = arg min x Feas ( M ( t ) ) F ( t ) ( x ) .
Example 7 (Iterated-Metapuzzle (depth 2): Two orders with pooled routing at the meta-level).  Setting. Two independent customer orders, A and B, are each solved by the level-1 metapuzzle of Example 6. Order A uses the data ( v A = ( 6 , 5 , 4 ) , w A = ( 3 , 2 , 2 ) ) and Order B uses ( v B = ( 7 , 6 ) , w B = ( 4 , 4 ) ) . Boxes and couriers are the same as before. Thus each order has the level-1 metasolution set
S A = Sol ( M A ( 1 ) ) = { ( x 1 pack , A , Van ) , ( x 2 pack , A , Van ) } ,
S B = Sol ( M B ( 1 ) ) = { ( x 1 pack , B , Van ) , ( x 2 pack , B , Van ) } ,
where for each order the subscript 1 denotes “1×M” (one M box) and 2 denotes “2×S” (two S boxes). All level-1 pairs already use Van by Ψ 1 / Ψ 2 .
Depth-2 metapuzzle M ( 2 ) = ( { M A ( 1 ) , M B ( 1 ) } , { Ψ ( 2 ) } ; F ( 2 ) ) . For any tuple x = ( s A , s B ) S A × S B with
s A = ( x pack , A , Van ) , s B = ( x pack , B , Van ) ,
define summary statistics
b A = # boxes ( x pack , A ) { 1 , 2 } , b B = # boxes ( x pack , B ) { 1 , 2 } , W A = w i A = 7 , W B = w i B = 8 .
Meta-constraint (pooled-trip admissibility):
Ψ ( 2 ) ( x ) = 1 : ( b A + b B 3 ) ( W A + W B 20 ) ( both couriers are Van ) .
By construction W A + W B = 15 20 and both use Van , so the decisive condition is b A + b B 3 .
Meta-objective F ( 2 ) applies a synergy when pooling is admissible:
F ( 2 ) ( x ) : = 30 + λ · f pack ( x pack , A ) + f pack ( x pack , B ) + 10 , if Ψ ( 2 ) ( x ) = 1 ( one pooled van trip ) , ( 20 + 20 ) + λ · f pack ( x pack , A ) + f pack ( x pack , B ) + 8 + 8 , if Ψ ( 2 ) ( x ) = 0 ( two separate van trips ) ,
with the same λ = 2 as in Example 6. Recall f pack ( x pack , · ) = 3.0 for all four packings under consideration.
Feasibility and numeric evaluation. Enumerate the four combinations ( b A , b B ) { 1 , 2 } 2 :
( b A , b B ) Ψ ( 2 ) ( x ) time F ( 2 ) ( x ) ( 1 , 1 ) 1 ( 2 3 ) 30 30 + 2 · ( 3 + 3 + 10 ) = 30 + 2 · 16 = 30 + 32 = 62 ( 1 , 2 ) 1 ( 3 3 ) 30 30 + 2 · ( 3 + 3 + 10 ) = 62 ( 2 , 1 ) 1 ( 3 3 ) 30 30 + 2 · ( 3 + 3 + 10 ) = 62 ( 2 , 2 ) 0 ( 4 > 3 ) 40 40 + 2 · ( 3 + 3 + 8 + 8 ) = 40 + 2 · 22 = 40 + 44 = 84
Therefore
Feas ( M ( 2 ) ) = { x S A × S B ( b A , b B ) ( 2 , 2 ) } ,
and every feasible x with b A + b B 3 attains the optimal value
min x Feas ( M ( 2 ) ) F ( 2 ) ( x ) = 62 ,
for instance the explicit choice
s A = ( x 1 pack , A , Van ) , s B = ( x 1 pack , B , Van )
has ( b A , b B ) = ( 1 , 1 ) and yields F ( 2 ) = 62 .
Discussion. Level 1 solves two coupled puzzles per order (packing + courier) under handling constraints, with a latency–cost objective. Level 2 couples the two orders via a pooled-routing admissibility constraint and realizes a quantifiable synergy when admissible. This instantiates Definitions 11–12 with explicit domains, constraints, and numeric optimality checks.
Proposition 3
(Generalization). Depth t = 1 in Definition 12 reproduces Metapuzzle (Definition 11). In particular, S i ( 0 ) = Sol ( P i ) and the constructions of Feas and Sol coincide.
Proof. 
For t = 1 we have X ( 0 ) = P , S i ( 0 ) = Sol ( P i ) , and the admissible meta-constraints/objective act on i S i , exactly as in Definition 11; the two minimizations are identical by definition.    □
Lemma 3
(Product/isomorphism invariance). Let ( α i : S i S i ) i = 1 k be bijections and define α : = i α i : i S i i S i . For any family ( Ψ ) and objective F, set
Ψ : = Ψ α 1 , F : = F α 1 .
Then α restricts to a bijection Feas ( M ) Feas ( M ) and carries Sol ( M ) onto Sol ( M ) .
Proof. 
By construction, for all x i S i , Ψ ( x ) = 1 Ψ ( α 1 x ) = 1 . Hence x Feas ( M ) α 1 x Feas ( M ) ; this is the first claim. For minimizers, F ( x ) = F ( α 1 x ) , so x minimizes F over Feas ( M ) iff α 1 x minimizes F over Feas ( M ) .    □
Theorem 3
(Iterated-Metapuzzle as an Iterated MetaStructure). There exists a single–sorted signature Σ MP and a lift U Σ MP such that the tower { M ( t ) } t 1 of Definitions 11–12 forms an Iterated MetaStructure (Definition 3). Moreover, depth t = 1 coincides with Metapuzzle and the lift is isomorphism–invariant.
Proof. 
Step 1 (Choose Σ MP and the universe U ). Let Σ MP have: (i) a unary relation symbol Feas ( · ) and (ii) a unary function symbol F : _ R ¯ . A Σ MP –structure S consists of a carrier set S (intended as a product of solution sets), an interpretation Feas S , and a function F : S R ¯ . Let U be the class of all such structures.
Step 2 (Encode metapuzzles as Σ MP –structures). Given M ( t ) with factors S 1 ( t 1 ) , , S k ( t 1 ) , set S : = i S i ( t 1 ) and interpret
Feas ( x ) Ψ ( t ) ( x ) = 1 , F ( x ) : = F ( t ) ( x ) .
Then Sol ( M ( t ) ) = arg min x S : Feas ( x ) F ( x ) .
Step 3 (Define the meta–operation and the lift). For each finite index set size k and each choice of ( Ψ ( t ) , F ( t ) ) , define a meta–operation
Φ k , Ψ , F : U k U
by
Φ k , Ψ , F S 1 , , S k : = S 1 × × S k , Feas ( x ) : = Ψ ( t ) ( x ) , F : = F ( t ) ,
where S i is the carrier of S i . This constructor only depends on the carriers (and the chosen ( Ψ , F ) label), not on representatives; it is therefore isomorphism–invariant.
Define U Σ MP by replacing each S i with the carrier of the encoded lower–level solution set, i.e., for depth t take inputs from depth t 1 and apply Φ k , Ψ , F to their carriers. This is exactly the “lift” of Definition 3: carriers are functorially built by product, the feasible predicate is the conjunction of meta–constraints, and the objective is copied as prescribed.
Step 4 (Verification). By construction, U is nonempty and closed under Φ k , Ψ , F . Naturality (isomorphism–invariance) follows from the Lemma. Since Definition 3 requires that meta–operations be given by uniform recipes on carriers and on symbol interpretations, and our Φ k , Ψ , F does precisely that (product on carriers; conjunction for Feas ; copy of F ), the tower obtained by iterating U Σ MP is an Iterated MetaStructure. When t = 1 , this recovers Definition 11.    □

2.4. Iterated-Metabibliography (Bibliography of Bibliography)

A bibliography is a finite collection of bibliographic records, each describing works by authors, year, title, venue, and identifiers[49,50,51]. A Metabibliography merges multiple bibliographies: canonicalizes records, deduplicates overlaps, and orders results, producing a single coherent reference list [52]. An Iterated Metabibliography applies this process recursively, merging metabibliographies into higher-level structures, ensuring consistent canonicalization, deduplication, ordering, and stability across layers.
Definition 13
(Canonical records, equality). Let R be the universe of raw bibliographic records and norm : R R ˜ a canonicalization (e.g., case-folding, punctuation stripping, normalized author lists). Assume an identifier map id : R I { } ( I collects DOI/ISBN/arXiv ids). Define r r iff
id ( r ) = id ( r ) id ( r ) = id ( r ) or norm ( r ) = norm ( r ) .
A canonical record is an element r ˜ R ˜ that represents a ∼-class. We henceforth regard equality on canonical records as: r ˜ = r ˜ iff they represent the same ∼-class.
Definition 14
(Bibliography and its canonical set). A (finite) bibliography is a finite multiset B ms R . Its canonical, deduplicated set is
CanonSet ( B ) : = norm ( r ) : r B R ˜ .
Definition 15
(Key and order). Fix a total key map
Key : R ˜ K Z × N × Strings
(e.g., Key ( r ˜ ) = ( year , first author index , title ) ) and let lex be the usual lexicographic order on K. For H R ˜ , define a total order H by
x , y H : x H y Key ( x ) lex Key ( y ) .
Definition 16 (MB-structure (a metabibliographic structure, level 1)).  A metabibliographic structure is a pair
S = ( H , H ) ,
where H R ˜ is finite and H is as in Definition 15. Given a bibliography B, its associated level-1 structure is
Base ( B ) : = CanonSet ( B ) , CanonSet ( B ) .
Given ( S i ) i = 1 m with S i = ( H i , H i ) , define the merge operator
Merge ( S 1 , , S m ) : = H , H , H : = i = 1 m H i , H from Definition 15 .
The output list of S is the sequence obtained by sorting H under H .
Definition 17 (Metabibliography (Bibliography of Bibliographies, level 1)).  Given bibliographies B = ( B i ) i = 1 m , the metabibliography is the MB-structure
MB ( 1 ) ( B ) : = Merge Base ( B 1 ) , , Base ( B m ) .
Its output list coincides with the canonize–deduplicate–order pipeline of the Definitions.
Example 8 (Metabibliography (level 1): Lab & course lists merged into one canon). Inputs (three everyday bibliographies).
B 1 = { ( Zadeh , 1965 , Fuzzy Sets ) , ( Pawlak , 1982 , Rough Sets ) , ( Goodfellow et al . , 2016 , Deep Learning ) } , B 2 = { ( L . A . Zadeh , 1965 , Fuzzy Sets in Information and Control ) , ( Molodtsov , 1999 , Soft Set Theory ) , ( Goodfellow Bengio Courville , 2016 , Deep Learning ) } , B 3 = { ( Jaynes , 2003 , Probability Theory ) , ( Pawlak , 1982 , Rough Sets ) } .
Base extraction (normalize fields).
Base ( B i ) = records with normalized author surnames , year , title .
Canonical keys (examples).
Key ( Zadeh , 1965 , · ) = [ Zadeh 1965 ] ,
Key ( Pawlak , 1982 , · ) = [ Pawlak 1982 ] ,
Key ( Goodfellow et al . , 2016 , · ) = [ Goodfellow 2016 ] ,
Key ( Molodtsov , 1999 , · ) = [ Molodtsov 1999 ] , Key ( Jaynes , 2003 , · ) = [ Jaynes 2003 ] .
Metabibliography merge (Def. 17).
MB ( 1 ) ( B 1 , B 2 , B 3 ) : = Merge Base ( B 1 ) , Base ( B 2 ) , Base ( B 3 ) = CanonSet sorted by Key .
Deduplicated output (5 unique items from 8 inputs).
[ Goodfellow 2016 ] Goodfellow , Bengio , Courville ( 2016 ) Deep Learning . [ Jaynes 2003 ] Jaynes ( 2003 ) Probability Theory . [ Molodtsov 1999 ] Molodtsov ( 1999 ) Soft Set Theory . [ Pawlak 1982 ] Pawlak ( 1982 ) Rough Sets . [ Zadeh 1965 ] Zadeh ( 1965 ) Fuzzy Sets .
Everyday reading: a lab, a collaborator, and a course syllabus collapse into one clean, de-duplicated, consistently ordered bibliography ready for a paper or website.
Definition 18 (Iterated-Metabibliography (depth t 2 )).  Let S ( t 1 ) = ( S i ( t 1 ) ) i = 1 m be a finite family of depth- ( t 1 ) MB-structures, each S i ( t 1 ) = ( H i ( t 1 ) , H i ( t 1 ) ) . Define the depth- t metabibliography by
MB ( t ) S ( t 1 ) : = Merge S 1 ( t 1 ) , , S m ( t 1 ) .
Equivalently, its carrier is H ( t ) = i H i ( t 1 ) with the order induced by Key.
Example 9
(Iterated-Metabibliography (level 2): Department → School consolidation). Two level–1 metabibliographies (already merged inside each unit).
MB AI ( 1 ) = H AI ( 1 ) , , H AI ( 1 ) = { [ Zadeh 1965 ] , [ Goodfellow 2016 ] , [ Molodtsov 1999 ] } , MB DS ( 1 ) = H DS ( 1 ) , , H DS ( 1 ) = { [ Jaynes 2003 ] , [ Pawlak 1982 ] , [ Goodfellow 2016 ] } .
School-wide consolidation (Def. 18).
MB ( 2 ) MB AI ( 1 ) , MB DS ( 1 ) : = Merge MB AI ( 1 ) , MB DS ( 1 ) ,
so its carrier and order are
H ( 2 ) = H AI ( 1 ) H DS ( 1 ) = { [ Goodfellow 2016 ] , [ Jaynes 2003 ] , [ Molodtsov 1999 ] , [ Pawlak 1982 ] , [ Zadeh 1965 ] }
(sorted by Key; the duplicate[Goodfellow2016] appears once).Counts. Input size = 3 + 3 = 6 , unique output size = 5 .
Everyday outcome: a school library or website shows one unified canon drawn from departmental metabibliographies, automatically deduplicated and consistently ordered.
Proposition 4
(Generalization of Metabibliography). Depth t = 1 of Definition 18 reproduces the (one-shot) Metabibliography:
MB ( 1 ) ( B ) = Dedup { Canon ( r ) r i B i } , ,
where ≤ is the total order induced by Key. In particular, the ordered output equals sorting the aggregate deduplicated set under Key.
Proof. 
By Definition 16,
MB ( 1 ) ( B ) = Merge CanonSet ( B 1 ) , , CanonSet ( B m ) = i CanonSet ( B i ) , .
Because CanonSet ( B i ) already quotients by ∼, multiset union across raw B i followed by canonicalization/dedup equals set union across the CanonSet ( B i ) :
Dedup { Canon ( r ) : r i B i } = i CanonSet ( B i ) .
The order is by Key in both constructions, hence the outputs coincide. □
Lemma 4
(Idempotence, commutativity, associativity of merge). For finite MB-structures S i = ( H i , H i ) we have
Merge ( S ) = S , Merge ( S 1 , S 2 ) = Merge ( S 2 , S 1 ) , Merge Merge ( S 1 , S 2 ) , S 3 = Merge ( S 1 , S 2 , S 3 ) .
Proof. 
All three equalities are immediate from set-theoretic identities on carriers ( H H = H , H 1 H 2 = H 2 H 1 , ( H 1 H 2 ) H 3 = H 1 ( H 2 H 3 ) ), while the order is always the one induced by the fixed Key on the resulting carrier. □
Lemma 5
(Isomorphism invariance). Let α i : H i H i be bijections with Key α i = Key (i.e., they only rename canonical representatives within equal keys). Then
Merge ( S 1 , , S m ) Merge ( H 1 , H 1 ) , , ( H m , H m ) ,
via α : = i α i (well-defined on disjoint copies), and the sorted output lists coincide.
Proof. 
The carrier is preserved up to the bijection α , and since Key α = Key , the induced total order is preserved; therefore α is an order isomorphism and sorting commutes with α . □
Theorem 4
(Iterated-Metabibliography as an Iterated MetaStructure). There exists a single–sorted signature Σ MB and a lift U Σ MB such that the tower MB ( t ) t 1 forms an Iterated MetaStructure (Definition 3). Moreover, depth t = 1 coincides with Metabibliography and the lift is isomorphism–invariant.
Proof. Signature and objects. Let Σ MB have a carrier sort with: (i) a unary function symbol Key ( · ) with codomain K (fixed), (ii) a binary relation symbol ( · , · ) . A Σ MB –structure is a pair ( H , H ) where H is a finite subset of R ˜ and H is the total order induced by Key (Definition 15); the function Key is interpreted as the fixed map restricted to H .
Meta-operation (merge). For each arity m 1 , define Φ m : U m U on the class U of all finite Σ MB –structures by
Φ m ( H 1 , H 1 ) , , ( H m , H m ) : = i = 1 m H i , i H i .
This recipe depends only on the carriers and the fixed Key; by Lemma 5 it is isomorphism–invariant (naturality).
Iterated lift. Define the “base constructor’’ Base (Definition 16) that sends a raw bibliography B to Σ MB –structure Base ( B ) . For t = 1 set MB ( 1 ) : = Φ m Base ( B 1 ) , , Base ( B m ) as in Definition 17. For t 2 , take inputs that are already Σ MB –structures and apply Φ m , which is exactly the lift U Σ MB in the sense of Definition 3:
U Σ MB ( H 1 , H 1 ) , , ( H m , H m ) = Φ m ( H 1 , H 1 ) , , ( H m , H m ) .
Verification. Closure: U is closed under Φ m since finite unions of finite subsets of R ˜ are finite, and ≤ is induced by the fixed Key. Associativity/commutativity/idempotence of Φ m follow from Lemma 4, ensuring that iterated applications are well formed and independent of bracketing. Isomorphism–invariance holds by Lemma 5. Therefore the tower { MB ( t ) } t 1 obtained by repeated application of U Σ MB is an Iterated MetaStructure. The t = 1 case agrees with Proposition 4, i.e., the standard Metabibliography. □
Corollary 3
(Sound tower and stable outputs). For all t 1 , MB ( t ) is well defined; moreover, isomorphic changes of inputs do not affect the (ordered) output list at level t.
Proof. 
Induction on t using Theorem 4 and Lemma 5. □

2.5. Metapopulation (Population of Populations)

A population is a group of individuals in a habitat, modeled with dynamics of growth, mortality, migration, and reproduction (cf.[53]). A Metapopulation is a structured population system of populations across habitat patches, with colonization, extinction, and interpatch interactions[54,55,56,57]. An Iterated Metapopulation recursively aggregates metapopulations into higher-level superpopulations, using coarse-graining schemes preserving Levins-type dynamic structure.
Definition 19
(Metapopulation). Let P = { 1 , , m } be a finite set of habitat patches. Let e : P R 0 , i e i , be extinction rates and c : P × P R 0 , ( i , j ) c i j , be colonization influences (from j to i). The state is p : [ 0 , ) [ 0 , 1 ] P , t p ( t ) = ( p i ( t ) ) i P , evolving by the Levins–type system
d p i d t = 1 p i j P c i j p j e i p i , i P .
A metapopulation is the triple M = ( P , c , e ) equipped with the flow t p ( t ) governed by (4). (Existence/uniqueness holds by local Lipschitz continuity of the right-hand side on [ 0 , 1 ] P .)
Example 10 (Metapopulation (level 1): Urban pollinators in three patches). Real setting.Three city habitats for wild bees: P = { 1 = park , 2 = green roof , 3 = community garden } . Extinction rates e = ( 0.20 , 0.10 , 0.15 ) (per unit time). Colonization influences C = ( c i j ) (from j to i):
C = 0 0.60 0.20 0.30 0 0.50 0.20 0.40 0 .
Initial occupancies p ( 0 ) = ( 0.40 , 0.70 , 0.50 ) .
Levins dynamics (Def. 19). For i { 1 , 2 , 3 } , d p i d t = ( 1 p i ) j c i j p j e i p i . At t = 0 (numbers rounded to 10 3 ):
d p 1 d t | 0 = ( 1 0.40 ) 0.60 · 0.70 + 0.20 · 0.50 0.20 · 0.40 = 0.60 · ( 0.42 + 0.10 ) 0.08 = 0.312 0.08 = 0 . 232 , d p 2 d t | 0 = ( 1 0.70 ) 0.30 · 0.40 + 0.50 · 0.50 0.10 · 0.70 = 0.30 · ( 0.12 + 0.25 ) 0.07 = 0.111 0.07 = 0 . 041 , d p 3 d t | 0 = ( 1 0.50 ) 0.20 · 0.40 + 0.40 · 0.70 0.15 · 0.50 = 0.50 · ( 0.08 + 0.28 ) 0.075 = 0.180 0.075 = 0 . 105 .
Interpretation: all three patches are expected to increase occupancy initially, with the park ( i = 1 ) increasing fastest under the given flows.
Definition 20
(Coarse-graining schema). Let r = 1 k P ( r ) be a finite disjoint union of patch sets. A coarse-graining schema is a pair
G = ( π , w ) ,
where π : r P ( r ) Q is a surjection onto a finite superpatch set Q = { 1 , , q } and w = w i i r P ( r ) are nonnegative weights such that
a Q : i : π ( i ) = a w i = 1 .
We write i a as shorthand for π ( i ) = a .
Definition 21
(Aggregation of parameters). Given metapopulations M ( r ) = ( P ( r ) , c ( r ) , e ( r ) ) ( r = 1 , , k ) and a schema G = ( π , w ) on r P ( r ) , define aggregated rates on Q by
e a : = i a w i e i ( r ( i ) ) , a Q ,
c a b : = i a j b w i w j c i j ( r ( i ) ) , a , b Q ,
where r ( i ) is the index with i P ( r ( i ) ) . Define the coarse state q : [ 0 , ) [ 0 , 1 ] Q by weighted averages
q a ( t ) : = i a w i p i ( r ( i ) ) ( t ) .
Lemma 6
(Closure under aggregation). If each M ( r ) = ( P ( r ) , c ( r ) , e ( r ) ) is a metapopulation, then the aggregated triple M = ( Q , c , e ) satisfies c a b 0 , e a 0 , and has Levins–type dynamics
d q a d t = 1 q a b Q c a b q b e a q a ( a Q ) ,
provided the micro-to-macro closure
i a j b w i w j p i ( r ( i ) ) ( 1 p i ( r ( i ) ) ) c i j ( r ( i ) ) p j ( r ( j ) ) q a ( 1 q a ) c a b q b
holds (mean-field factorization). In particular, q ( · ) solves a Levins system with parameters (6)–(7).
Proof. 
Nonnegativity is immediate from (6)–(7). Differentiating (8) and using the base equations (4) for each p ( r ) ( · ) yields
d q a d t = i a w i ( 1 p i ) j c i j p j e i p i = b i a j b w i ( 1 p i ) c i j p j i a w i e i p i .
Insert 1 = j b w j / w j in the first term and apply the moment closure (10) to identify the first sum with ( 1 q a ) b c a b q b ; the second sum equals e a q a by (6)–(8). This is (9). □
Definition 22 (Iterated-Metapopulation (depth t )).  Depth 1 objects are metapopulations as in Definition 19. For t 2 , a depth- t Iterated-Metapopulation is obtained by:
take a finite family of depth- ( t 1 ) objects M t 1 ( r ) , choose a coarse-graining schema G on r P ( r ) , and output the aggregated metapopulation
M ( t ) : = Agg ( M t 1 ( r ) ) r , G : = Q , c , e
via (6)–(7).
Its state q ( · ) evolves by (9).
Example 11
(Iterated-Metapopulation (level 2): Two campuses aggregated to districts). Micro level (two campuses). North campus P ( 1 ) = { 1 , 2 } with e ( 1 ) = ( 0.12 , 0.18 ) and
C ( 1 ) = 0 0.50 0.40 0 .
South campus P ( 2 ) = { 3 , 4 } with e ( 2 ) = ( 0.10 , 0.16 ) and
C ( 2 ) = 0 0.60 0.30 0 .
Assume no cross-campus dispersal (off-block entries = 0 ). Initial occupancies: p 1 ( 0 ) = 0.60 , p 2 ( 0 ) = 0.40 , p 3 ( 0 ) = 0.30 , p 4 ( 0 ) = 0.70 .
Coarse-graining (Def. 20). Aggregate to districts Q = { A , B } with A = { 1 , 2 } , B = { 3 , 4 } and weights w 1 = w 2 = w 3 = w 4 = 1 2 .
Aggregated parameters (Def. 21).
e A = 1 2 ( 0.12 + 0.18 ) = 0 . 15 , e B = 1 2 ( 0.10 + 0.16 ) = 0 . 13 ,
c A A = i , j A 1 2 1 2 c i j ( 1 ) = 1 4 ( 0.50 + 0.40 ) = 0 . 225 , c B B = 1 4 ( 0.60 + 0.30 ) = 0 . 225 ,
c A B = c B A = 0 ( no cross - campus flow ) .
Coarse state and its initial change.
q A ( 0 ) = 1 2 ( 0.60 + 0.40 ) = 0 . 50 , q B ( 0 ) = 1 2 ( 0.30 + 0.70 ) = 0 . 50 .
Levins form (Lemma 6): d q a d t = ( 1 q a ) b c a b q b e a q a gives
d q A d t | 0 = ( 1 0.50 ) ( 0.225 · 0.50 ) 0.15 · 0.50 = 0.1125 0.075 = 0 . 01875 , d q B d t | 0 = ( 1 0.50 ) ( 0.225 · 0.50 ) 0.13 · 0.50 = 0.1125 0.065 = 0 . 00875 .
Interpretation: at district scale, both aggregated occupancies initially decline slightly because extinction averages outweigh within-district colonization; the construction realizes an Iterated-Metapopulation (Def. 22) with explicit e , c , q ( · ) .
Proposition 5
(Generalization of Metapopulation). Depth t = 1 of Definition 22 coincides with the (one-level) metapopulation of Definition 19. Equivalently, taking k = 1 , π = id P , w i = 1 gives Q = P , c = c , e = e , and (9) reduces to (4).
Proof. 
Immediate from the formulas: with π = id and w i = 1 , the sums (6), (7) collapse to e , c . □
Lemma 7
(Isomorphism invariance). If σ : P ( r ) P ( r ) is a bijection (relabeling patches) and we transport c ( r ) , e ( r ) by c σ ( i ) σ ( j ) ( r ) : = c i j ( r ) , e σ ( i ) ( r ) : = e i ( r ) , and replace π by π σ 1 and w by w σ 1 , then the aggregated parameters c , e are unchanged.
Proof. 
Both (6) and (7) are sums over fibers { i : π ( i ) = a } with weights w i ; the relabeling permutes the summation indices without changing the summands, hence the sums are identical. □
Theorem 5
(Iterated-Metapopulation as an Iterated MetaStructure). There exists a single–sorted signature Σ Pop and a lift U Σ Pop such that the tower M ( t ) t 1 from Definition 22 forms an Iterated MetaStructure (Definition 3). Moreover, depth t = 1 coincides with Metapopulation (Definition 19), and the lift is isomorphism–invariant.
Proof. Step 1 (Signature and objects). Let Σ Pop be relational with carrier P and nonlogical symbols
E ( · ) : P R 0 , C ( · , · ) : P × P R 0 .
A Σ Pop –structure is precisely a metapopulation ( P , C , E ) . The dynamics (4) depend functorially on ( P , C , E ) and need not be part of the signature.
Step 2 (Meta-operations). For each arity k and each coarse-graining schema G = ( π , w ) on r = 1 k P ( r ) , define the meta-operation
Φ G : r = 1 k U U
by the uniform recipes on carriers and symbols:
Γ G ( P ( 1 ) , , P ( k ) ) : = Q , E Φ G : = e of ( 6 ) , C Φ G : = c of ( 7 ) .
These depend only on ( π , w ) and the input interpretations ( C ( r ) , E ( r ) ) .
Step 3 (Isomorphism–invariance). If α r : ( P ( r ) , C ( r ) , E ( r ) ) ( P ( r ) , C ( r ) , E ( r ) ) are isomorphisms (relabelings), Lemma 7 shows that with π : = π ( r α r ) 1 and w : = w ( r α r ) 1 we get
Φ G ( P ( 1 ) , , P ( k ) ) Φ G ( P ( 1 ) , , P ( k ) ) ,
so Φ G is natural in the sense of Definition 2.
Step 4 (Iterated lift). Define U Σ Pop by: on a level- ( t 1 ) family, choose G and output Φ G ( · ) as in Step 2. By construction this matches the lift scheme of Definition 3: carriers are built by Γ G , and the symbol interpretations are given by fixed recipes ( Λ / Ξ ) (6)–(7).
Step 5 ( t = 1 ). Taking k = 1 and π = id P , w i = 1 yields the identity meta-operation, so level 1 objects are exactly Definition 19. □
Corollary 4
(Sound tower). For every t 1 , the Iterated-Metapopulation M ( t ) is well defined; the family { M ( s ) } s = 1 t forms an Iterated MetaStructure under U Σ Pop , and the dynamics at each level are of Levins type with aggregated parameters (6)–(7).
Proof. 
Induction on t , using Lemma 6 for well-posed Levins dynamics and Theorem 5 for the MetaStructure properties. □

2.6. Metalogic (Logic of Logics)

A logic is a formal system of formulas and consequence relations, capturing valid inference rules and reasoning principles. A Metalogic studies logics as mathematical objects, comparing strengths, defining translations, and organizing them into structured categories (cf.[58,59,60]). An Iterated Metalogic recursively treats metalogics as objects, lifting strength and translation relations into higher meta-levels systematically.
Definition 23 (Logics, translations, and Metalogic (level 1)).  Let a logic be a pair L = ( Fm L , Cn L ) , where Fm L is a set of formulas and Cn L : P ( Fm L ) P ( Fm L ) is a Tarskian consequence operator (extensive, monotone, idempotent). For logics with the same formula set, define the strength preorder
L ( 1 ) L : Γ Fm L Cn L ( Γ ) Cn L ( Γ ) .
A translation code is an element λ of a fixed set Λ equipped with a partial decoding map
dec ( λ ) : Fm L Fm L ( type - correct when the source / target match ) .
We write λ Tr ( 1 ) ( L , L ) iff dec ( λ ) is consequence-preserving:
Γ Fm L : dec ( λ ) Cn L ( Γ ) Cn L dec ( λ ) [ Γ ] .
Assume Λ carries typed identity codes  1 L Tr ( 1 ) ( L , L ) and a typed, associative composition operation
: Tr ( 1 ) ( L , L ) × Tr ( 1 ) ( L , L ) Tr ( 1 ) ( L , L )
compatible with function composition of decodings. A (level–1) Metalogic is the structure
L ( 1 ) : = U ( 1 ) , ( 1 ) , Tr ( 1 ) ,
where U ( 1 ) is a nonempty set of logics, ( 1 ) is the above preorder (on those pairs with equal formula sets), and Tr ( 1 ) is the typed family of translation codes closed under identities and composition.
Example 12 (Metalogic (level 1): Marketing vs. GDPR consent rules).  Setup. Let Fm be propositional formulas over atoms A (“adult”), C (“has consent”), S (“may send promo email”). For a finite axiom set T Fm , write Cn T ( Γ ) for classical propositional consequence from premises Γ T .
Two real-life logics on thesame  formula set  Fm .
L gdpr = ( Fm , Cn T gdpr ) , T gdpr = { C S } , L mkt = ( Fm , Cn T mkt ) , T mkt = { C S , A S } .
Strength check. Since T gdpr T mkt , by monotonicity of Cn ,
Γ Fm : Cn T gdpr ( Γ ) Cn T mkt ( Γ ) .
Hence L gdpr ( 1 ) L mkt (Def. 23).
A translation code (renaming to a notification platform). Let L notify = ( Fm , Cn T ) over atoms A, C, N with T = { C N , A N } . Define λ Λ with decoding dec ( λ ) : Fm Fm by the homomorphic renaming S N , A A , C C . Then
dec ( λ ) T mkt = { C N , A N } = T ,
so for all Γ Fm ,
dec ( λ ) Cn T mkt ( Γ ) Cn T dec ( λ ) [ Γ ] ,
i.e., λ Tr ( 1 ) L mkt , L notify . This models a real deployment: the same policy is transferred from “marketing logic” to a “notification system logic” by a safe symbol renaming.
Definition 24 (Iterated-Metalogic (depth t 2 )).  Assume level ( t 1 ) objects L ( t 1 ) = ( U ( t 1 ) , ( t 1 ) , Tr ( t 1 ) ) have been defined. A depth- t Metalogic is a triple
L ( t ) : = U ( t ) , ( t ) , Tr ( t ) ,
where U ( t ) is a nonempty set of level- ( t 1 ) metalogics. The level-t relations are lifted as follows:
(Lifted strength). For X , Y U ( t ) with carriers U X , U Y ,
X ( t ) Y : f : U X U Y A U X : A ( t 1 ) f ( A ) .
(Lifted translations). A level- t translation code from X to Y is a pair
( f , ( λ A ) A U X ) ,
where f : U X U Y and each λ A Tr ( t 1 ) A , f ( A ) . The set Tr ( t ) ( X , Y ) contains exactly these families. Define identities and composition by
1 X : = id U X , ( 1 A ) A U X , ( g , ( μ B ) ) ( f , ( λ A ) ) : = g f , ( μ f ( A ) λ A ) A U X .
Example 13
(Iterated-Metalogic (level 2): Company standardization across subsidiaries). Level 1 metalogics. Subsidiary A uses atoms { A , C , S } and maintains two logics
L gdpr A = ( Fm A , Cn { C S } ) , L mkt A = ( Fm A , Cn { C S , A S } ) ,
forming L A ( 1 ) = U A , ( 1 ) , Tr ( 1 ) with U A = { L gdpr A , L mkt A } . Subsidiary B adopts a company standard vocabulary { A D U L T , C O N S E N T , S E N D } and corresponding logics
L gdpr B = ( Fm B , Cn { C O N S E N T S E N D } ) , L mkt B = ( Fm B , Cn { C O N S E N T S E N D , A D U L T S E N D } ) ,
so L B ( 1 ) has carrier U B = { L gdpr B , L mkt B } .
Level 2 translation family (lifted). Define f : U A U B by f L gdpr A = L gdpr B and f L mkt A = L mkt B . For each A U A , choose a level-1 translation code λ A with decoding dec ( λ A ) : Fm A Fm B given by the homomorphic renaming
A A D U L T , C C O N S E N T , S S E N D .
Then λ L gdpr A Tr ( 1 ) L gdpr A , L gdpr B and λ L mkt A Tr ( 1 ) L mkt A , L mkt B because axioms map to axioms (e.g., C S becomes C O N S E N T S E N D ). Hence
f , ( λ A ) A U A Tr ( 2 ) L A ( 1 ) , L B ( 1 )
(Def. 24), and since each A ( 1 ) f ( A ) , we also have L A ( 1 ) ( 2 ) L B ( 1 ) by (11). Interpretation: a company-wide standardization lifts per-logic renamings to a uniform, family-wise translation between two subsidiaries’ policy logics.
Proposition 6
(Generalization). Depth t = 1 of Definition 24 coincides with Definition 23. Hence Iterated-Metalogic generalizes Metalogic.
Proof. 
At t = 1 we have U ( 1 ) consisting of logics, ( 1 ) the strength preorder, and Tr ( 1 ) the base translation family. No lifting occurs. □
Lemma 8
(Preorder and categorical laws lift). For every t 2 :
1. 
( t ) of (11) is a preorder on U ( t ) .
2. 
Tr ( t ) contains identities and is closed under composition; composition is associative and identities are two-sided units.
Proof. (1) Reflexivity holds by choosing f = id U X and using reflexivity at level ( t 1 ) . Transitivity: if X ( t ) Y via f and Y ( t ) Z via g , then for all A U X , A ( t 1 ) f ( A ) ( t 1 ) g ( f ( A ) ) , so X ( t ) Z via g f .
(2) Identities are by definition. If ( g , ( μ B ) ) Tr ( t ) ( Y , Z ) and ( f , ( λ A ) ) Tr ( t ) ( X , Y ) , then for each A the typed composition μ f ( A ) λ A Tr ( t 1 ) ( A , g ( f ( A ) ) ) , hence the family belongs to Tr ( t ) ( X , Z ) . Associativity and unit laws follow pointwise from those of level ( t 1 ) . □
Theorem 6
(Iterated-Metalogic as an Iterated MetaStructure). There exists a single–sorted signature Σ ML and a lift U Σ ML such that the tower { L ( t ) } t 1 in Definition 24 forms an Iterated MetaStructure in the sense of Definition 3. Moreover, depth t = 1 coincides with Metalogic and the lift is isomorphism–invariant.
Proof. Signature and coding. Let Σ ML be relational with carrier X and the following symbols:
Pre ( x , y ) X × X , Tr ( x , y , z ) X × X × Λ ,
where Λ is the fixed set of translation codes equipped with typed identities and composition. A Σ ML –structure A encodes a metalogic by taking X as its carrier, interpreting Pre as ⪯, and Tr as the binary–indexed family ( Tr ( · , · ) ) .
Meta-operations and lift. There are no function symbols; meta–operations act only on relations. Given a level ( t 1 ) structure A ( t 1 ) encoding U ( t 1 ) , ( t 1 ) , Tr ( t 1 ) , define U Σ ML ( A ( t 1 ) ) to be the structure whose carrier X ( t ) is the set U ( t ) of all level ( t 1 ) objects, with relations
Pre ( t ) ( X , Y ) X ( t ) Y by ( 11 ) ,
Tr ( t ) X , Y , ( f , ( λ A ) ) ( f , ( λ A ) ) Tr ( t ) ( X , Y ) .
By Lemma 8, Pre ( t ) is a preorder and Tr ( t ) is closed under the typed identities and composition provided by Λ ; thus the Σ ML –axioms (namely: “ Pre is a preorder” and “ Tr is a category over X ’’) hold at each level.
Naturality (isomorphism–invariance). An isomorphism of level ( t 1 ) structures is a bijection α : U ( t 1 ) U ( t 1 ) preserving Pre ( t 1 ) and Tr ( t 1 ) . The lifted carrier map α : U ( t ) U ( t ) sends a level ( t 1 ) object X to the pointwise transport α ( X ) ; the defining clauses for Pre ( t ) and Tr ( t ) are first–order formulas using only ∃/∀ over U ( t 1 ) and composition/identities in Λ , hence preserved by α . Therefore U Σ ML is natural.
Base level. For t = 1 , A ( 1 ) encodes exactly the data of Definition 23. Hence the tower { L ( t ) } t 1 is an Iterated MetaStructure and depth 1 coincides with Metalogic. □
Corollary 5
(Sound tower). For every t 1 , L ( t ) is well defined; the family { L ( s ) } s = 1 t forms an Iterated MetaStructure under U Σ ML , with a preorder of strength and a category of translations at each level.
Proof. 
By induction on t using Lemma 8 and Theorem 6. □

2.7. Meta-ethics (Ethics of Ethics)

An ethics is a normative system mapping situations to actions with statuses obligatory, permissible, or forbidden, constraining human behavior [61,62]. A Metaethics compares ethical systems themselves, ordering them by permissiveness and analyzing coherence, consistency, and higher-level normative principles [63]. An Iterated-Metaethics recursively treats metaethics structures as objects, lifting permissiveness preorders across multiple levels into hierarchical normative meta-systems.
Definition 25
(Ethical system and permissiveness). Let S be a set of situations and A a set of actions . An ethical system is a triple E = ( S , A , ν ) with a deontic map
ν : S × A { O , P , F }
such that for all s S , a A : (i) O P (obligatory implies permissible), (ii) ¬ ( O F ) (no action is both obligatory and forbidden), (iii) a A : ν ( s , a ) { O , P } (some action is permissible). Write
Perm E ( s ) : = { a A : ν ( s , a ) { O , P } } , Obl E ( s ) : = { a A : ν ( s , a ) = O } .
For two systems E , E on the same ( S , A ) , define the permissiveness preorder
E ( 1 ) E : s S : Perm E ( s ) Perm E ( s ) .
Definition 26 (Meta-ethics (level 1)).  Fix ( S , A ) once and for all. A (level–1) Meta-ethics structure is the pair
E ( 1 ) : = U ( 1 ) , ( 1 ) ,
where U ( 1 ) is a nonempty set of ethical systems on ( S , A ) and ( 1 ) is the permissiveness preorder from Definition 25. (Optionally, one may equip U ( 1 ) with consensus/union meta-operations E E and E E defined by Perm E E ( s ) = Perm E ( s ) Perm E ( s ) , Obl E E ( s ) = Obl E ( s ) Obl E ( s ) , and Perm E E ( s ) = Perm E ( s ) Perm E ( s ) , Obl E E ( s ) = Obl E ( s ) Obl E ( s ) ; these preserve the coherence axioms.)
Example 14 (Meta-ethics (level 1): Home vs. Workplace data-sharing rules).  Situations and actions. Let S = { s 1 = send vacation photos , s 2 = send customer list to vendor } and A = { a share , a encrypt , a refuse } .
Two ethical systems on ( S , A ) . Define E home = ( S , A , ν home ) and E work = ( S , A , ν work ) by the following deontic labels (O=obligatory, P=permissible, F=forbidden):
Home policy E home :
a share a encrypt a refuse s 1 P P P s 2 F F O
Work policy E work :
a share a encrypt a refuse s 1 F P P s 2 F F O
Permissiveness check. From Definition 25,
Perm E home ( s 1 ) = { a share , a encrypt , a refuse } , Perm E work ( s 1 ) = { a encrypt , a refuse } ,
Perm E home ( s 2 ) = { a refuse } , Perm E work ( s 2 ) = { a refuse } .
Hence for each s S , Perm E work ( s ) Perm E home ( s ) , i.e., E work ( 1 ) E home . All coherence axioms hold (no O F , and some action is always permissible).
Definition 27 (Iterated-Meta-ethics (depth t 2 )).  Assume level ( t 1 ) objects have been defined. A depth- t Meta-ethics structure is
E ( t ) : = U ( t ) , ( t ) ,
where U ( t ) is a nonempty set of level- ( t 1 ) Meta-ethics structures. The level-t preorder is lifted by
X ( t ) Y : f : U X U Y E U X : E ( t 1 ) f ( E ) ,
where U X denotes the carrier (set of objects) of X .
Example 15 (Iterated Meta-ethics (level 2): Policy update mapping old → new). Same S , A as above. Consider old and new versions of the two systems:
Old policies. E work old as in the previous example. E home old as in the previous example.
New policies (strictly more permissive or equal).
Preprints 174379 i001
(Practically: after adding vetted vendor channels, encrypted transfer becomes permitted.)
Level–1 inclusions. For each s S ,
Perm E work old ( s ) Perm E work new ( s ) , Perm E home old ( s ) Perm E home new ( s ) ,
so E work old ( 1 ) E work new and E home old ( 1 ) E home new .
Level–2 structures and witness. Let
X = U X , ( 1 ) , U X = { E work old , E home old } , Y = U Y , ( 1 ) , U Y = { E work new , E home new } .
Define f : U X U Y by f E work old = E work new and f E home old = E home new . Then for all E U X we have E ( 1 ) f ( E ) , hence by (12)
X ( 2 ) Y .
This models a real-life policy modernization : the level–2 object Y collects updated (more permissive but controlled) codes that uniformly extend the old ones.
Proposition 7
(Generalization of Meta-ethics). Depth t = 1 in Definition 27 reproduces Meta-ethics (Definition 26). Hence Iterated-Meta-ethics generalizes Meta-ethics.
Proof. 
For t = 1 there is no lifting and E ( 1 ) = ( U ( 1 ) , ( 1 ) ) is exactly Definition 26. □
Lemma 9
(The lifted relation is a preorder). For every t 2 , ( t ) defined in (12) is a preorder on U ( t ) .
Proof. 
Reflexivity: take f = id U X ; since ( t 1 ) is reflexive, X ( t ) X . Transitivity: if X ( t ) Y via f and Y ( t ) Z via g , then E ( t 1 ) f ( E ) ( t 1 ) g ( f ( E ) ) for all E U X ; thus X ( t ) Z via g f . □
Theorem 7
(Iterated-Meta-ethics as an Iterated MetaStructure). There exists a single–sorted signature Σ ME and a lift U Σ ME such that the tower E ( t ) t 1 forms an Iterated MetaStructure in the sense of Definition 3. Moreover, depth t = 1 coincides with Meta-ethics and the lift is isomorphism–invariant.
Proof. Signature and coding. Let Σ ME be relational with a single binary symbol Pre ( · , · ) . A Σ ME –structure A = ( X , Pre ) encodes a Meta-ethics structure by taking X as its carrier (set of objects at that level) and interpreting Pre as the corresponding preorder ⊑.
Lift. Given a level ( t 1 ) structure A ( t 1 ) = ( U ( t 1 ) , Pre ( t 1 ) ) , define U Σ ME ( A ( t 1 ) ) to be the structure A ( t ) = ( U ( t ) , Pre ( t ) ) whose carrier U ( t ) is the set of all level- ( t 1 ) objects and whose relation is the lifted preorder (12). By Lemma 9, Pre ( t ) is a preorder.
Isomorphism–invariance. Let α : ( U ( t 1 ) , Pre ( t 1 ) ) ( U ( t 1 ) , Pre ( t 1 ) ) be an isomorphism (a bijection preserving the preorder). Transporting witnesses f in (12) by α shows that α induces an isomorphism between the lifted structures U Σ ME ( A ( t 1 ) ) and U Σ ME ( A ( t 1 ) ) ; hence the lift is natural.
Base level. For t = 1 the encoding is exactly A ( 1 ) = ( U ( 1 ) , ( 1 ) ) , which is Meta-ethics (Definition 26). Therefore the tower { E ( t ) } t 1 is an Iterated MetaStructure with signature Σ ME . □
Corollary 6
(Sound tower). For every t 1 , E ( t ) is well defined and E ( s ) s = 1 t forms an Iterated MetaStructure under U Σ ME , with a (lifted) permissiveness preorder at each level.
Proof. 
Immediate by induction using Lemma 9 and Theorem 7. □

2.8. Metadata (Data of Data)

A Metadata is structured descriptive information about data objects, defined by schema, attributes, identifiers, and canonical assignments (cf.[64,65,66]). An Iterated-Metadata recursively applies metadata construction, lifting data–about–data into multiple hierarchical levels, preserving identifiers, schemas, and isomorphism invariance.
Definition 28 (Metadata (level 1)).  Let D be a (nonempty) set of data objects . A schema is a pair Σ = ( K , Typ ) where K is a finite set of attribute keys and Typ : K { sets } assigns to each k K a value domain Typ ( k ) . A Σ –record is a function r : K k K Typ ( k ) with r ( k ) Typ ( k ) for all k; write Rec ( Σ ) for the set of all such records.
Fix a distinguished reference key  k ref K and an identifier map id : D Typ ( k ref ) . A metadata assignment on ( D , Σ ) is a map
μ : D Rec ( Σ ) satisfying d D : μ ( d ) ( k ref ) = id ( d ) .
The triple M ( 1 ) = ( D , Σ , μ ) is called metadata on D.
Definition 29
(Isomorphisms of metadata). Two metadata triples M ( 1 ) = ( D , Σ , μ ) and M ( 1 ) = ( D , Σ , μ ) are isomorphic , written M ( 1 ) M ( 1 ) , if there exist bijections α : D D and ψ : K K such that
(a) 
Typ ( ψ ( k ) ) = Typ ( k ) for all k K and ψ ( k ref ) = k ref ,
(b) 
id ( α ( d ) ) = id ( d ) for all d D ,
(c) 
for every d D and k K , μ ( α ( d ) ) ψ ( k ) = μ ( d ) ( k ) .
(I.e. α renames data, ψ renames keys while preserving value domains and the aboutness key, and the records commute with these renamings.)
Definition 30
(Lift to metadata-of-metadata). Given M ( 1 ) = ( D , Σ , μ ) with Σ = ( K , Typ ) , define its lift Lift ( M ( 1 ) ) = M ( 2 ) = ( D , Σ , μ ) by:
D : = { ( d , μ ( d ) ) : d D } ( graph of μ ) ,
K : = K { k ref , k prev } , Typ K Typ , Typ ( k ref ) = Typ ( k ref ) , Typ ( k prev ) = Rec ( Σ ) ,
id : D Typ ( k ref ) , id ( d , μ ( d ) ) : = id ( d ) ,
μ : D Rec ( Σ ) , given by μ ( d , μ ( d ) ) ( k ) = μ ( d ) ( k ) , k K , μ ( d , μ ( d ) ) ( k ref ) = id ( d ) , μ ( d , μ ( d ) ) ( k prev ) = μ ( d ) .
Then M ( 2 ) is again metadata by Definition 28 (with reference key k ref and identifier id ).
Definition 31 (Iterated-Metadata (depth t )).  Let M ( 1 ) = ( D ( 1 ) , Σ ( 1 ) , μ ( 1 ) ) be metadata. Define inductively for t 2 :
M ( t ) : = Lift M ( t 1 ) = D ( t ) , Σ ( t ) , μ ( t ) ,
using (13)–() at level t 1 . We call M ( t ) Iterated-Metadata of depth t.
Example 16
(From file metadata to metadata-of-metadata). Level 1 (ordinary metadata). Let the data objects be two photos D = { d 1 , d 2 } . Use schema Σ = ( K , Typ ) with
K = { k ref = fileID , date , device , location } ,
Typ ( fileID ) = Str , Typ ( date ) = Date , Typ ( device ) = Str , Typ ( location ) = Str .
The identifier is id ( d ) = fileID of d . Define the metadata assignment μ : D Rec ( Σ ) by
μ ( d 1 ) : fileID = IMG _ 0001 . jpg , date = 2025 - 08 - 20 , device = iPhone 15 , location = Tokyo , μ ( d 2 ) : fileID = IMG _ 0002 . jpg , date = 2025 - 08 - 21 , device = Ricoh GR III , location = Yokohama .
Thus M ( 1 ) = ( D , Σ , μ ) is metadata in the sense of Definition 28.
Lift (metadata-of-metadata, Level 2). Apply Definition 30:
D = { ( d 1 , μ ( d 1 ) ) , ( d 2 , μ ( d 2 ) ) } ,
K = K { k ref = fileID , k prev } , Typ K = Typ , Typ ( k ref ) = Str , Typ ( k prev ) = Rec ( Σ ) .
The lifted identifier is id ( d , μ ( d ) ) = id ( d ) . The lifted assignment μ : D Rec ( Σ ) satisfies, for each ( d , μ ( d ) ) D ,
μ ( d , μ ( d ) ) ( k ) = μ ( d ) ( k ) ( k K ) , μ ( d , μ ( d ) ) ( k ref ) = id ( d ) , μ ( d , μ ( d ) ) ( k prev ) = μ ( d ) .
Concrete instance (for d 1 ).
μ ( d 1 , μ ( d 1 ) ) ( fileID ) = IMG _ 0001 . jpg , μ ( d 1 , μ ( d 1 ) ) ( date ) = 2025 - 08 - 20 , μ ( d 1 , μ ( d 1 ) ) ( device ) = iPhone 15 , μ ( d 1 , μ ( d 1 ) ) ( location ) = Tokyo , μ ( d 1 , μ ( d 1 ) ) ( fileID ) = IMG _ 0001 . jpg , μ ( d 1 , μ ( d 1 ) ) ( k prev ) = μ ( d 1 ) ( the entire Level 1 record above ) .
The case for d 2 is analogous. Intuitively, each Level 2 record keeps all Level 1 fields, plus (i) a copied identifier for stable linkage and (ii) a pointer to the previous metadata record (provenance). Hence M ( 2 ) is a simple, real-life “metadata-of-metadata” for a phone photo library.
Proposition 8
(Generalization of Metadata). Depth t = 1 of Definition 31 reproduces ordinary metadata (Definition 28). Hence Iterated-Metadata generalizes Metadata.
Proof. 
Trivial: by definition M ( 1 ) = ( D ( 1 ) , Σ ( 1 ) , μ ( 1 ) ) is exactly Definition 28. No lifting is applied at t = 1 . □
Lemma 10 (Naturality (isomorphism invariance) of the lift).  If M ( 1 ) M ( 1 ) via ( α , ψ ) as in Definition 29, then Lift ( M ( 1 ) ) Lift ( M ( 1 ) ) via
α : ( d , μ ( d ) ) α ( d ) , μ ( α ( d ) ) , ψ : = ψ { k ref k ref , k prev k prev } .
Proof. 
By (b)–(c) of Definition 29, μ ( α ( d ) ) ( ψ ( k ) ) = μ ( d ) ( k ) for k K , and id ( α ( d ) ) = id ( d ) . Therefore (16) commutes under ( α , ψ ) for all keys, including the two new ones, and (15) is preserved as well. □
Theorem 8
(Iterated-Metadata as an Iterated MetaStructure). There exists a single–sorted signature Σ MD and a lift U Σ MD such that the tower M ( t ) t 1 forms an Iterated MetaStructure (Definition 3). Moreover, depth t = 1 coincides with Metadata and the lift is isomorphism–invariant.
Proof. Signature and objects. Let Σ MD be relational over a single carrier X (tagged union of data, keys, and records) with symbols:
Data ( x ) , Key ( x ) , Val ( x , y ) ( x A record , y A value ) ,
Has ( x , k , v ) ( record x has key k with value v ) , RefKey ( k ) , Id ( d , v ) .
A Σ MD –structure A encodes a metadata triple M = ( D , Σ , μ ) by taking X = D K Rec ( Σ ) k Typ ( k ) , marking sorts with Data / Key , interpreting Has from μ , and RefKey / Id from k ref and id.
Meta–operation (the lift). Define a unary meta–operation Φ lift : U U on the class U of Σ MD –structures by performing the recipes (13)–(16) at the level of carriers and of the relations Has , RefKey , Id . Concretely: carriers are rebuilt by adding the graph pairs and the two fresh keys; Has is extended so that each lifted record inherits all original key–value pairs and additionally has entries for k ref (the old identifier) and k prev (the previous record).
Isomorphism–invariance. If α : A A is an isomorphism (in particular inducing a pair ( α , ψ ) as in Definition 29), then by Lemma 10 the assignments of all relation symbols in Φ lift ( A ) and Φ lift ( A ) agree through the transported ( α , ψ ) ; hence Φ lift is natural.
Iterated MetaStructure. Let U Σ MD be the functor that sends A to Φ lift ( A ) and acts on isomorphisms by transport as above. Iterating U Σ MD produces the tower { M ( t ) } t 1 of Definition 31. Depth t = 1 clearly coincides with ordinary metadata (no lifting applied). □
Corollary 7
(Sound tower). For every t 1 , M ( t ) is well defined, and the family { M ( s ) } s = 1 t forms an Iterated MetaStructure under the isomorphism–invariant lift U Σ MD .
Proof. 
Immediate by induction on t using Lemma 10 and Theorem 8. □

2.9. Meta-Governance (Governance of Governance)

A Governance system specifies how actors, decision rules, instruments, and processes interact to steer collective actions within institutions. A Meta-Governance structure organizes governance systems, redesigning their modes, instruments, and processes to coordinate failures and reweight steering mechanisms (cf.[67,68,69,70]). An Iterated-Meta-Governance recursively applies meta-governance, layering higher-level coordination over sets of governance structures, ensuring adaptive, hierarchical, multi-level institutional steering.
Definition 32
(Governance System). A governance system is a finite tuple
G = ( A , D , M , I , P ) ,
where
  • A is a nonempty finite set of actors;
  • D is a set of decision rules and procedures (e.g., voting rules, mandates);
  • M { hierarchy , market , network } lists the governance modes present;
  • I is a set of steering instruments partitioned as I = I auth I econ I info (authority, economic, informational instruments);
  • P is a set of institutionalized processes (forums, committees, contracts, etc.).
Let U denote a nonempty set of such governance systems. A (nonnegative) failure functional Φ : U R 0 quantifies coordination deficits, legitimacy problems, or outcome shortfalls.
Definition 33
(Meta-Governance (level 1)). Let G be the class of governance systems over the fixed ( A , O ) . A Meta-Governance structure is a pair
G ( 1 ) = U ( 1 ) ; ( 1 ) , Req ( 1 ) , Cov ( 1 ) , Comp ( 1 ) ,
where U ( 1 ) G is nonempty and
  • ( 1 ) is a preorder on U ( 1 ) defined componentwise by
    G ( 1 ) H : Req G Req H and Cov G Cov H ;
  • Req ( 1 ) ( G , a , o ) : = Req G ( a , o ) and Cov ( 1 ) ( G , a , o ) : = Cov G ( a , o ) ;
  • Comp ( 1 ) ( G , a ) is the compliance predicate of G from Definition .
This satisfies meta-monotonicity :
G ( 1 ) H Req ( 1 ) ( G , a , o ) Req ( 1 ) ( H , a , o ) , G ( 1 ) H Cov ( 1 ) ( G , a , o ) Cov ( 1 ) ( H , a , o ) ,
and in particular
G ( 1 ) H Comp ( 1 ) ( G , a ) Comp ( 1 ) ( H , a ) .
Example 17
(Concrete level-1 Meta-Governance with numbers). Let
A = { PII , Health }
,
O = { Enc , Consent , Retention }
. Write rows in the order ( PII , Health ) and columns ( Enc , Consent , Retention ) . Consider G 1 , G 2 G with
Req G 1 = 1 0 1 1 1 1 ,
Cov G 1 = 1 0 1 1 0 1 ,
r G 1 ( PII ) = 0.02 , r G 1 ( Health ) = 0.20 , κ G 1 = 3.0 ;
Req G 2 = 1 1 1 1 1 1 ,
Cov G 2 = 1 1 1 1 1 1 ,
r G 2 ( PII ) = 0.01 , r G 2 ( Health ) = 0.05 , κ G 2 = 4.5 .
Then Req G 1 Req G 2 and Cov G 1 Cov G 2 , hence G 1 ( 1 ) G 2 . Compliance:
Comp G 1 ( PII ) = 1 , Comp G 1 ( Health ) = 0 ;
Comp G 2 ( PII ) = Comp G 2 ( Health ) = 1 .
The risk profile respects (G1) and (G2): adding coverage (from G 1 to G 2 ) weakly decreases risk componentwise: 0.01 0.02 and 0.05 0.20 .
Definition 34
(Iterated-Meta-Governance (depth t )). For t 2 , a depth- t Iterated-Meta-Governance structure is a tuple
G ( t ) = U ( t ) ; ( t ) , Req ( t ) , Cov ( t ) , Comp ( t ) ,
where U ( t ) is a nonempty set of depth- ( t 1 ) objects and the lift is:
Order lift : X ( t ) Y : f : U X U Y G U X , G ( t 1 ) f ( G ) .
Requirement lift ( OR ) : Req ( t ) ( X , a , o ) : G U X : Req ( t 1 ) ( G , a , o ) .
Coverage lift ( AND ) : Cov ( t ) ( X , a , o ) : G U X : Cov ( t 1 ) ( G , a , o ) .
Set Comp ( t ) ( X , a ) by the same formula as at base level:
Comp ( t ) ( X , a ) : = o O , Req ( t ) ( X , a , o ) Cov ( t ) ( X , a , o ) .
Proposition 9
(Generalization of Meta-Governance). Depth t = 1 in Definition 34 reduces to Meta-Governance (Definition 33). For t = 0 one has only base governance systems.
Proof. 
At t = 1 the lifted clauses are identities: no f is required beyond f = id and (18)–(19) collapse to the base relations. For t = 0 , the meta-level disappears. □
Lemma 11
(Axioms preserved by the lift). Fix t 2 . If ( t 1 ) is a preorder and the meta-monotonicities of Definition 33 hold at depth t 1 , then:
(a) 
( t ) is a preorder;
(b) 
Req ( t ) is monotone along ( t ) ;
(c) 
Cov ( t ) is monotone along ( t ) ;
(d) 
Comp ( t ) is monotone along ( t ) .
Proof. (a) Reflexivity is witnessed by f = id . Transitivity: if X ( t ) Y via f and Y ( t ) Z via g , then g f witnesses X ( t ) Z because ( t 1 ) is transitive.
(b) Suppose X ( t ) Y via f and Req ( t ) ( X , a , o ) . Choose G U X with Req ( t 1 ) ( G , a , o ) . Then G ( t 1 ) f ( G ) and level- ( t 1 ) monotonicity give Req ( t 1 ) ( f ( G ) , a , o ) , hence by (18) we get Req ( t ) ( Y , a , o ) .
(c) Suppose X ( t ) Y via f and Cov ( t ) ( X , a , o ) . Then for all G U X , Cov ( t 1 ) ( G , a , o ) . By monotonicity at t 1 and G ( t 1 ) f ( G ) we have Cov ( t 1 ) ( f ( G ) , a , o ) for all G , so by (19), Cov ( t ) ( Y , a , o ) .
(d) Combine (b) and (c) with the definition of Comp ( t ) . □
Example 18
(Worked depth-2 check using Example 17). Let X be the level-1 object containing only G 1 and Y the one containing only G 2 . Then f ( G 1 ) = G 2 witnesses X ( 2 ) Y .
Lifted requirement (OR): Req ( 2 ) ( X , PII , Enc ) = 1 because Req ( 1 ) ( G 1 , PII , Enc ) = 1 ; likewise for Y .
Lifted coverage (AND): Cov ( 2 ) ( X , Health , Consent ) = 0 since Cov ( 1 ) ( G 1 , Health , Consent ) = 0 ; while Cov ( 2 ) ( Y , Health , Consent ) = 1 .
Lifted compliance: Comp ( 2 ) ( X , PII ) = 1 , Comp ( 2 ) ( X , Health ) = 0 , Comp ( 2 ) ( Y , PII ) = Comp ( 2 ) ( Y , Health ) = 1 . Thus compliance is monotone along X ( 2 ) Y , in line with Lemma 11(d).
Theorem 9
(Iterated Meta-Governance is an Iterated MetaStructure). There exists a single-sorted signature Σ MG and a lift U Σ MG such that the family { G ( t ) } t 1 of Definitions 33–34 forms an Iterated MetaStructure in the sense of Definition 3. Moreover, depth t = 1 coincides with Meta-Governance and the lift is isomorphism-invariant.
Proof. Coding. Let Σ MG have unary predicates G ( x ) , A ( x ) , O ( x ) tagging governance objects , assets , and obligations , and relation symbols
Pre ( x , y ) ( G × G ) , Req ( x , a , o ) ( G × A × O ) , Cov ( x , a , o ) ( G × A × O ) .
A Meta-Governance structure G ( t ) is represented by a Σ MG –structure whose carrier is the disjoint union of (tags of) U ( t ) , A , O , with Pre , Req , Cov interpreted as ( t ) , Req ( t ) , Cov ( t ) (compliance is definable from Req and Cov ).
Lift. Given a level- ( t 1 ) structure, define U Σ MG by replacing governance-points with depth- ( t 1 ) objects and interpreting Pre , Req , Cov by the lifted clauses (17)–(19). This is a purely relational instance of Definition 2.
Verification. By Lemma 11, Pre is a preorder and Req , Cov (hence Comp ) are monotone along Pre at every height; these properties are preserved by U Σ MG because the lift only composes witnessing maps f and quantifies over elements of U ( t ) (no choice of representatives is involved). Isomorphism-invariance follows since the definitions use only first-order formulas built from the relations and bounded quantifiers over the carriers, hence are stable under any isomorphism of the lower-level structures.
Depth 1. When t = 1 there is no lifting and the encoded structure is exactly Definition 33. □
Corollary 8
(Soundness of the governance tower). For every t 1 , the object G ( t ) is well defined and { G ( s ) } s = 1 t forms an Iterated MetaStructure under U Σ MG .
Proof. 
Immediate from Lemma 11 and Theorem 9 by induction on t . □

3. Conclusion

This paper examined whether concepts such as Ontology, Computing, Puzzle, Logic, Ethics, Data, and Governance can be systematically extended within the framework of MetaStructures and Iterated MetaStructures. Since the present work has been limited to theoretical considerations, it is hoped that future studies will carry out quantitative analyses employing these ideas.
In addition, we intend to explore further extensions using Rough Sets [71,72,73], Soft Sets [74,75,76], HyperSoft Sets [77,78,79], TreeSoft Sets [80,81,82], Fuzzy Sets [83,84,85,86], HyperFuzzy Sets [28,87,88], Intuitionistic Fuzzy Sets [89,90], Neutrosophic Sets [91,92,93], Quadripartitioned Neutrosophic Sets [94,95], Triple-Valued Neutrosophic Sets [96,97,98], and Plithogenic Sets [99,100], among others.

Funding

No external funding was received for this work.

Informed Consent Statement

This research did not involve human participants or animals, and therefore did not require ethical approval.

Data Availability Statement

This paper is theoretical and did not generate or analyze any empirical data. We welcome future studies that apply and test these concepts in practical settings. The author confirms that this manuscript is original, has not been published elsewhere, and is not under consideration by any other journal.

Use of Artificial Intelligence

We use generative AI and AI-assisted tools for tasks such as English grammar checking, and We do not employ them in any way that violates ethical standards. All proofs and derivations were performed manually; no computational software (e.g., Mathematica, SageMath, Coq) was used. No code or software was developed for this study.

Acknowledgments

We thank all colleagues, reviewers, and readers whose comments and questions have greatly improved this manuscript. We are also grateful to the authors of the works cited herein for providing the theoretical foundations that underpin our study. Finally, we appreciate the institutional and technical support that enabled this research.

Conflicts of Interest

The authors declare no conflicts of interest regarding the publication of this work. The ideas presented here are theoretical and have not yet been validated through empirical testing. While we have strived for accuracy and proper citation, inadvertent errors may remain. Readers should verify any referenced material independently. The opinions expressed are those of the authors and do not necessarily reflect the views of their institutions.

References

  1. Fujita, T.; Smarandache, F. A Unified Framework for U -Structures and Functorial Structure: Managing Super, Hyper, SuperHyper, Tree, and Forest Uncertain Over/Under/Off Models. Neutrosophic Sets and Systems 2025, 91, 337–380. [Google Scholar]
  2. Fujita, T. How to Represent A→ B →⋯→ Z: From Curried Functions and Hyperfunctions to Curried Structures and Hyperstructures, and More, 2025. [CrossRef]
  3. Hausdorff, F. Set theory ; Vol. 119, American Mathematical Soc., 2021.
  4. Jech, T. Set theory: The third millennium edition, revised and expanded ; Springer, 2003.
  5. Panti, G. Multi-valued logics. In Quantified representation of uncertainty and imprecision ; Springer, 1998; pp. 25–74.
  6. Jaynes, E.T.; Grandy, T.B.; Smith, R.; Loredo, T.; Tribus, M.; Skilling, J.; Bretthorst, G.L. Probability theory: the logic of science. The Mathematical Intelligencer 2005, 27, 83. [Google Scholar] [CrossRef]
  7. Kingman, J.F.C.; Feller, W. An Introduction to Probability Theory and its Applications. Biometrika 1958, 130, 430–430. [Google Scholar]
  8. Chen, J.; Ye, J.; Du, S. Scale Effect and Anisotropy Analyzed for Neutrosophic Numbers of Rock Joint Roughness Coefficient Based on Neutrosophic Statistics. Symmetry 2017, 9, 208. [Google Scholar] [CrossRef]
  9. Smarandache, F. Plithogeny, plithogenic set, logic, probability, and statistics. arXiv preprint arXiv:1808.03948 2018.
  10. Lenz, R.; Bovik, A.C. Group Theory. 2007.
  11. Burde, D. Group Theory. Computers, Rigidity, and Moduli 2019.
  12. Wisbauer, R. Foundations of module and ring theory; Routledge, 2018.
  13. Stenstrom, B. Rings of quotients: an introduction to methods of ring theory ; Vol. 217, Springer Science & Business Media, 2012.
  14. Dehghan, O.; Ameri, R.; Aliabadi, H.E. Some results on hypervector spaces. Italian Journal of Pure and Applied Mathematics 2019, 41, 23–41. [Google Scholar]
  15. Sameena, K.; et al. FUZZY MATROIDS FROM FUZZY VECTOR SPACES. South East Asian Journal of Mathematics and Mathematical Sciences 2021, 17, 381–390. [Google Scholar]
  16. Hatip, A.; Olgun, N.; et al. On the Concepts of Two-Fold Fuzzy Vector Spaces and Algebraic Modules. Journal of Neutrosophic and Fuzzy Systems 2023, 7, 46–52. [Google Scholar]
  17. Diestel, R. Graph theory 3rd ed. Graduate texts in mathematics 2005, 173, 12. [Google Scholar]
  18. Gross, J.L.; Yellen, J.; Anderson, M. Graph theory and its applications ; Chapman and Hall/CRC, 2018.
  19. Diestel, R. Graph theory ; Springer (print edition); Reinhard Diestel (eBooks), 2024.
  20. Smarandache, F. Extension of HyperGraph to n-SuperHyperGraph and to Plithogenic n-SuperHyperGraph, and Extension of HyperAlgebra to n-ary (Classical-/Neutro-/Anti-) HyperAlgebra ; Infinite Study, 2020.
  21. Hou, Z. Automata Theory and Formal Languages. Texts in Computer Science 2021. [Google Scholar]
  22. Bonakdarpour, B.; Sheinvald, S. Automata for hyperlanguages. arXiv preprint arXiv:2002.09877 2020.
  23. Kovach, N.; Gibson, A.S.; Lamont, G.B. Hypergame Theory: A Model for Conflict, Misperception, and Deception. 2015.
  24. House, J.T.; Cybenko, G.V. Hypergame theory applied to cyber attack and defense. In Proceedings of the Defense + Commercial Sensing, 2010.
  25. Oguz, G.; Davvaz, B. Soft topological hyperstructure. J. Intell. Fuzzy Syst. 2021, 40, 8755–8764. [Google Scholar] [CrossRef]
  26. Vougioukli, S. Helix hyperoperation in teaching research. Science & Philosophy 2020, 8, 157–163. [Google Scholar]
  27. Vougioukli, S. HELIX-HYPEROPERATIONS ON LIE-SANTILLI ADMISSIBILITY. Algebras Groups and Geometries 2023. [Google Scholar] [CrossRef]
  28. Fujita, T. Advancing Uncertain Combinatorics through Graphization, Hyperization, and Uncertainization: Fuzzy, Neutrosophic, Soft, Rough, and Beyond ; Biblio Publishing, 2025.
  29. Smarandache, F. Foundation of SuperHyperStructure & Neutrosophic SuperHyperStructure. Neutrosophic Sets and Systems 2024, 63, 21. [Google Scholar]
  30. Smarandache, F. SuperHyperFunction, SuperHyperStructure, Neutrosophic SuperHyperFunction and Neutrosophic SuperHyperStructure: Current understanding and future directions ; Infinite Study, 2023.
  31. Das, A.K.; Das, R.; Das, S.; Debnath, B.K.; Granados, C.; Shil, B.; Das, R. A Comprehensive Study of Neutrosophic SuperHyper BCI-Semigroups and their Algebraic Significance. Transactions on Fuzzy Sets and Systems 2025, 8, 80. [Google Scholar]
  32. Fujita, T. Chemical Hyperstructures, SuperHyperstructures, and SHv-Structures: Toward a Generalized Framework for Hierarchical Chemical Modeling. ChemRxiv 2025. [Google Scholar] [CrossRef]
  33. Fujita, T. MetaStructure, Meta-HyperStructure, and Meta-SuperHyperStructure, 2025. Preprint. [CrossRef]
  34. Fujita, T. MetaHyperGraphs, MetaSuperHyperGraphs, and Iterated MetaGraphs: Modeling Graphs of Graphs, Hypergraphs of Hypergraphs, Superhypergraphs of Superhypergraphs, and Beyond, 2025. [CrossRef]
  35. Fujita, T. Meta-Fuzzy Graph, Meta-Neutrosophic Graph, Meta-Digraph, and Meta-MultiGraph with some applications 2025.
  36. Fujita, T. MetaFuzzy, MetaNeutrosophic, MetaSoft, and MetaRough Set 2025.
  37. Smith, B. Ontology. In The furniture of the world ; Brill, 2012; pp. 47–68.
  38. Guarino, N.; Oberle, D.; Staab, S. What is an ontology? Handbook on ontologies 2009, pp. 1–17.
  39. Berto, F.; Plebani, M. Ontology and metaontology: A contemporary guide; Bloomsbury Publishing, 2015.
  40. Chalmers, D.; Manley, D.; Wasserman, R. Metametaphysics: New essays on the foundations of ontology ; Oxford University Press, 2009.
  41. Dodd, J. Adventures in the metaontology of art: local descriptivism, artefacts and dreamcatchers. Philosophical Studies 2013, 165, 1047–1068. [Google Scholar] [CrossRef]
  42. Smarr, L.; Catlett, C.E. Metacomputing. Communications of the ACM 1992, 35, 44–52. [Google Scholar] [CrossRef]
  43. Resch, M.M. Metacomputing in a high performance computing center. In Proceedings of the Proceedings 2000. International Workshop on Parallel Processing. IEEE, 2000, pp. 165–172.
  44. Foster, I.; Geisler, J.; Kesselman, C.; Tuecke, S. Multimethod communication for high-performance metacomputing applications. In Proceedings of the Proceedings of the 1996 ACM/IEEE Conference on Supercomputing, 1996, pp. 41–es.
  45. Eickermann, T.; Henrichs, J.; Resch, M.; Stoy, R.; Völpel, R. Metacomputing in gigabit environments: Networks, tools, and applications. Parallel Computing 1998, 24, 1847–1872. [Google Scholar] [CrossRef]
  46. Wolfson, H.; Schonberg, E.; Kalvin, A.; Lamdan, Y. Solving jigsaw puzzles by computer. Annals of Operations Research 1988, 12, 51–64. [Google Scholar] [CrossRef]
  47. Makridis, M.; Papamarkos, N. A new technique for solving puzzles. IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics) 2009, 40, 789–797. [Google Scholar] [CrossRef] [PubMed]
  48. Kirsner, J.B. Ulcerative Colitis: Puzzles within Puzzles, 1970.
  49. Netzer, A. An Annotated Bibliography ; Institute of Asian and African Studies, the Hebrew University of Jerusalem, 2004.
  50. McKenzie, D.F. Bibliography and the Sociology of Texts ; Cambridge University Press, 1999.
  51. Hendry, D.G.; Jenkins, J.; McCarthy, J.F. Collaborative bibliography. Information Processing & Management 2006, 42, 805–825. [Google Scholar] [CrossRef]
  52. Bond, D.F. A World Bibliography of Bibliographies and of Bibliographical Catalogues, Calendars, Abstracts, Digests, Indexes, and the Like, 1957.
  53. Turchin, P. Does population ecology have general laws? Oikos 2001, 94, 17–26. [Google Scholar] [CrossRef]
  54. Kritzer, J.P.; Sale, P.F. Marine metapopulations ; Elsevier, 2010.
  55. Grimm, V.; Reise, K.; Strasser, M. Marine metapopulations: a useful concept? Helgoland Marine Research 2003, 56, 222–228. [Google Scholar] [CrossRef]
  56. Keymer, J.E.; Galajda, P.; Muldoon, C.; Park, S.; Austin, R.H. Bacterial metapopulations in nanofabricated landscapes. Proceedings of the National Academy of Sciences 2006, 103, 17290–17295. [Google Scholar] [CrossRef]
  57. Janssen, A.; van Gool, E.; Lingeman, R.; Jacas, J.; van de Klashorst, G. Metapopulation dynamics of a persisting predator–prey system in the laboratory: time series analysis. Experimental & Applied Acarology 1997, 21, 415–430. [Google Scholar]
  58. Hunter, G. Metalogic: An introduction to the metatheory of standard first order logic ; Univ of California Press, 1973.
  59. Hunter, G. An Introduction to the Metatheory of Standard First Order Logic. Metalogic. Palgrave Macmillan UK, London 1971.
  60. Woleński, J. On the Relation of Logic to Metalogic. In Proceedings of the Philosophy of Logic and Mathematics: Proceedings of the 41st International Ludwig Wittgenstein Symposium. Walter de Gruyter GmbH & Co KG, 2019, Vol. 27, p. 91.
  61. Baofu, P. Beyond ethics to post-ethics: A preface to a new theory of morality and immorality ; IAP, 2011.
  62. Berggren, N. Does ethical subjectivism pose a challenge to classical liberalism? Reason Papers 2004, 27, 69–86. [Google Scholar]
  63. Couture, J.; Nielsen, K. Introduction: The ages of metaethics. Canadian Journal of Philosophy Supplementary Volume 1995, 21, 1–30. [Google Scholar] [CrossRef]
  64. Hayashi, T.; Ohsawa, Y. Understanding the structural characteristics of data platforms using metadata and a network approach. IEEE access 2020, 8, 35469–35481. [Google Scholar] [CrossRef]
  65. Li, Z.; Wen, J.; Zhang, X.; Wu, C.; Li, Z.; Liu, L. ClinData Express–a metadata driven clinical research data management system for secondary use of clinical data. In Proceedings of the AMIA annual symposium proceedings, 2012, Vol. 2012, p. 552.
  66. Kurokawa, S.; Iwaki, Y.; Miyaho, N. Study on the distributed data sharing mechanism with a mutual authentication and meta database technology. In Proceedings of the 2007 Asia-Pacific Conference on Communications. IEEE, 2007, pp. 215–218.
  67. Gjaltema, J.; Biesbroek, R.; Termeer, K. From government to governance… to meta-governance: a systematic literature review. Public management review 2020, 22, 1760–1780. [Google Scholar] [CrossRef]
  68. Jessop, B. From governance to governance failure and from multi-level governance to multi-scalar meta-governance. In The disoriented state: Shifts in governmentality, territoriality and governance ; Springer, 2009; pp. 79–98.
  69. Rayner, J. The past and future of governance studies: From governance to meta-governance? In Varieties of Governance: Dynamics, Strategies, Capacities ; Springer, 2015; pp. 235–254.
  70. Müller, R. From network governance to metagovernance. In Research Handbook on the Governance of Projects ; Edward Elgar Publishing, 2023; pp. 366–378.
  71. Pawlak, Z. Rough sets. International journal of computer & information sciences 1982, 11, 341–356. [Google Scholar]
  72. Pawlak, Z. Rough sets: Theoretical aspects of reasoning about data ; Vol. 9, Springer Science & Business Media, 2012.
  73. Broumi, S.; Smarandache, F.; Dhar, M. Rough neutrosophic sets. Infinite Study 2014, 32, 493–502. [Google Scholar]
  74. Jose, J.; George, B.; Thumbakara, R.K. Soft directed graphs, their vertex degrees, associated matrices and some product operations. New Mathematics and Natural Computation 2023, 19, 651–686. [Google Scholar] [CrossRef]
  75. Jose, J.; George, B.; Thumbakara, R.K. Soft Graphs: A Comprehensive Survey. New Mathematics and Natural Computation 2024, pp. 1–52.
  76. Molodtsov, D. Soft set theory-first results. Computers & mathematics with applications 1999, 37, 19–31. [Google Scholar]
  77. Salamai, A.A. A SuperHyperSoft Framework for Comprehensive Risk Assessment in Energy Projects. Neutrosophic Sets and Systems 2025, 77, 614–624. [Google Scholar]
  78. Smarandache, F. Extension of soft set to hypersoft set, and then to plithogenic hypersoft set. Neutrosophic sets and systems 2018, 22, 168–170. [Google Scholar]
  79. Musa, S.Y.; Mohammed, R.A.; Asaad, B.A. N-hypersoft sets: An innovative extension of hypersoft sets and their applications. Symmetry 2023, 15, 1795. [Google Scholar] [CrossRef]
  80. Myvizhi, M.; A Metwaly, A.; Ali, A.M. TreeSoft Approach for Refining Air Pollution Analysis: A Case Study. Neutrosophic Sets and Systems 2024, 68, 17. [Google Scholar]
  81. Fujita, T. Smarandache. Quantum-treesoft set and quantum-forestsoft set. Journal of Analysis and Applications 2025, 23, 87–116. [Google Scholar]
  82. Smarandache, F. TreeSoft Set vs. HyperSoft Set and Fuzzy-Extensions of TreeSoft Sets. HyperSoft Set Methods in Engineering 2024. [Google Scholar] [CrossRef]
  83. Zadeh, L.A. Fuzzy sets. Information and control 1965, 8, 338–353. [Google Scholar] [CrossRef]
  84. Al-Hawary, T. Complete fuzzy graphs. International Journal of Mathematical Combinatorics 2011, 4, 26. [Google Scholar]
  85. Mordeson, J.N.; Nair, P.S. Fuzzy graphs and fuzzy hypergraphs ; Vol. 46, Physica, 2012.
  86. Rosenfeld, A. Fuzzy graphs. In Fuzzy sets and their applications to cognitive and decision processes ; Elsevier, 1975; pp. 77–95.
  87. Ghosh, J.; Samanta, T.K. Hyperfuzzy sets and hyperfuzzy group. Int. J. Adv. Sci. Technol 2012, 41, 27–37. [Google Scholar]
  88. Jun, Y.B.; Song, S.Z.; Kim, S.J. Distances between hyper structures and length fuzzy ideals of BCK/BCI-algebras based on hyper structures. Journal of Intelligent & Fuzzy Systems 2018, 35, 2257–2268. [Google Scholar]
  89. Atanassov, K.T. Circular intuitionistic fuzzy sets. Journal of Intelligent & Fuzzy Systems 2020, 39, 5981–5986. [Google Scholar] [CrossRef]
  90. Das, S.; Kar, S. Intuitionistic multi fuzzy soft set and its application in decision making. In Proceedings of the Pattern Recognition and Machine Intelligence: 5th International Conference, PReMI 2013, Kolkata, India, December 10-14, 2013. Proceedings 5. Springer, 2013, pp. 587–592.
  91. Smarandache, F.; Jdid, M. An Overview of Neutrosophic and Plithogenic Theories and Applications 2023.
  92. Broumi, S.; Talea, M.; Bakali, A.; Smarandache, F. Single valued neutrosophic graphs. Journal of New theory 2016, 86–101. [Google Scholar]
  93. Zhu, S. Neutrosophic n-SuperHyperNetwork: A New Approach for Evaluating Short Video Communication Effectiveness in Media Convergence. Neutrosophic Sets and Systems 2025, 85, 1004–1017. [Google Scholar]
  94. Radha, R.; Mary, A.S.A.; Smarandache, F. Quadripartitioned neutrosophic pythagorean soft set. International Journal of Neutrosophic Science (IJNS) 2021, 14, 11. [Google Scholar] [CrossRef]
  95. Hussain, S.; Hussain, J.; Rosyida, I.; Broumi, S. Quadripartitioned neutrosophic soft graphs. In Handbook of Research on Advances and Applications of Fuzzy Sets and Logic ; IGI Global, 2022; pp. 771–795.
  96. Fujita, T. Triple-Valued Neutrosophic Set, Quadruple-Valued Neutrosophic Set, Quintuple-Valued Neutrosophic Set, and Double-valued Indetermsoft Set. Neutrosophic Systems with Applications 2025, 25, 3. [Google Scholar] [CrossRef]
  97. Wang, H. Professional Identity Formation in Traditional Chinese Medicine Students: An Educational Perspective using Triple-Valued Neutrosophic Set. Neutrosophic Sets and Systems 2025, 88, 83–92. [Google Scholar]
  98. Jia, J. Triple-Valued Neutrosophic Off for Public Digital Cultural Service Level Evaluation in Craft and Art Museums. Neutrosophic Sets and Systems 2025, 88, 690–698. [Google Scholar]
  99. Singh, P.K. Intuitionistic Plithogenic Graph ; Infinite Study, 2022.
  100. Sultana, F.; Gulistan, M.; Ali, M.; Yaqoob, N.; Khan, M.; Rashid, T.; Ahmed, T. A study of plithogenic graphs: applications in spreading coronavirus disease (COVID-19) globally. Journal of ambient intelligence and humanized computing 2023, 14, 13139–13159. [Google Scholar] [CrossRef] [PubMed]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
Copyright: This open access article is published under a Creative Commons CC BY 4.0 license, which permit the free download, distribution, and reuse, provided that the author and preprint are cited in any reuse.
Prerpints.org logo

Preprints.org is a free preprint server supported by MDPI in Basel, Switzerland.

Subscribe

Disclaimer

Terms of Use

Privacy Policy

Privacy Settings

© 2025 MDPI (Basel, Switzerland) unless otherwise stated