Preprint
Article

This version is not peer-reviewed.

Plithgoenic Fuzzy Risk Management and Plithgoenic Fuzzy IT Service Management

Submitted:

27 September 2025

Posted:

29 September 2025

You are already at the latest version

Abstract
Plithogenic sets represent elements through attribute–driven memberships together with a contradiction map over attribute values [1–3]. Upside-Down Logic reverses truth and falsity under a structured transformation, flipping evaluations while preserving internal consistency across logical contexts. Risk management is the process of identifying, assessing, and mitigating potential losses to minimize the impact on organizational objectives [4–6]. IT service management (ITSM) is the process of designing, delivering, managing, and improving IT services to meet business needs effectively, efficiently, and consistently [7–9]. In this paper, we formally introduce Plithogenic Fuzzy Risk Management and Plithogenic Fuzzy IT Service Management and investigate their structural properties.
Keywords: 
;  ;  ;  ;  
Contents
 
1.  Preliminaries.............................................................................................................. 1
1.1.  Upside-Down Logic............................................................................................................................................... 1
1.2. Plithogenic Set................................................................................................................................................. 3
1.3. Upside-Down Logic in Plithogenic Fuzzy Set with Contradiction Reset............................................................ 5
1.4. Fuzzy Risk Management........................................................................................................................................... 6
1.5. Fuzzy IT Service Management..................................................................................................................................... 8
 
2.  Main Results.............................................................................................................. 10
2.1. Plithogenic Fuzzy Risk Management............................................................................................................................... 10
2.2. Upside-Down Logic in Plithogenic Fuzzy Risk Management.......................................................................................... 13
2.3. Plithogenic Fuzzy IT Service Management......................................................................................................................... 16
2.4. Upside-Down Logic in Plithogenic Fuzzy IT Service Management .............................................................................. 19
3.  Conclusion............................................................................. 22
4.  References............................................................................. 23

1. Preliminaries

This section gathers the background notions and notation required for the main results.

1.1. Upside-Down Logic

We formalize Upside-Down Logic: under suitable contextual transformations, truth and falsity of lemmas are interchanged, providing a framework to capture reversals and contextual ambiguity in reasoning systems (see, e.g., [10,11,12,13,14,15,16]).
Definition 1.1
(Context). [11,12] A context   C is a collection of parameters or conditions under which lemmas are to be evaluated; typical components may be spatial, temporal, semantic, or interpretive in nature.
Definition 1.2
(Logical System). (cf. [17]) A logical system is a structure
M = ( P , V , v ) ,
where P is the set of lemmas (formulas) in a formal language L , V is a set of truth values (e.g., { True , False } in the classical case), and v : P V is a valuation assigning to each lemma a truth value. Optionally, M may specify a set of axioms A P and a collection of inference rules I .
Notation 1.3.
Given a set of lemmas P and a family of contexts C , we write
T : P × C { True , False , Indeterminate }
for the context-sensitive truth assignment that evaluates each lemma–context pair. We also fix a formal language L and a logical system M = ( P , V , v ) as above.
Definition 1.4
(Upside-Down Logic). [11,12] An Upside-Down Logic is obtained from a logical system M by equipping it with a transformation U acting on lemmas and/or on contexts, thereby producing a system M such that for every lemma A P and context C :
  • (Truth → Falsity) If v ( A ) = True in C , then v U ( A ) = False in U ( C ) .
  • (Falsity → Truth) If v ( A ) = False in C , then v U ( A ) = True in U ( C ) .
Moreover, U is required to be well posed and internally consistent within M .
Example 1.5
(Threshold–comparator flip on the same context). Let the language contain atomic statements of the form
A θ : x θ ( θ R ) ,
and let the context be the parameter value C θ : = { θ } . Fix a valuation v so that v ( A θ ) = True in C θ iff the designated real x satisfies x θ .
Define the Upside–Down transform U by
U ( A θ ) : = ( x < θ ) , U ( C θ ) : = C θ .
Then:
  • (Truth → Falsity) If v ( A θ ) = True in C θ , then x θ , hence x < θ is false in the same context, i.e., v U ( A θ ) = False in U ( C θ ) .
  • (Falsity → Truth) If v ( A θ ) = False in C θ , then x < θ , so v U ( A θ ) = True in U ( C θ ) .
Moreover, U is involutive on formulas:
U U ( A θ ) = U ( x < θ ) = ( x θ ) = A θ ,
hence well posed and internally consistent on M obtained by adding U.
Example 1.6
(Set–membership flip with complemented context). Fix a nonempty universe X and a designated element x X . For any subset E X let the lemma be
A E : x E , and the context C E : = E .
Let v ( A E ) = True in C E precisely when x E .
Define the Upside–Down transform U by
U ( A E ) : = ( x E c ) , U ( C E ) : = E c ( complement in X ) .
Then:
  • (Truth → Falsity) If v ( A E ) = True in C E , then x E . Evaluating U ( A E ) in U ( C E ) = E c yields x E c , which is false because x E . Thus v U ( A E ) = False in U ( C E ) .
  • (Falsity → Truth) If v ( A E ) = False in C E , then x E , hence x E c . Therefore v U ( A E ) = True in U ( C E ) .
Finally, U is an involution on both lemmas and contexts:
U U ( A E ) = A E , U U ( C E ) = C E ,
so the induced system M is coherent and stable under repeated application of U.

1.2. Plithogenic Set

A plithogenic set [1,2,3] represents elements via membership driven by explicit attributes together with a contradiction mapping between attribute values, thereby subsuming and extending the frameworks of fuzzy [18,19], intuitionistic [20,21], hesitant fuzzy sets [22,23], HyperFuzzy sets [24,25], and neutrosophic sets [26,27].
Definition 1.7
(Fuzzy Set). [18,28] A Fuzzy set τ in a non-empty universe Y is a mapping τ : Y [ 0 , 1 ] . A fuzzy relation on Y is a fuzzy subset δ in Y × Y . If τ is a fuzzy set in Y and δ is a fuzzy relation on Y, then δ is called a fuzzy relation on τ if
δ ( y , z ) min { τ ( y ) , τ ( z ) } for all y , z Y .
Definition 1.8
(Plithogenic Set). [1,29] Let S be a universe and P S a nonempty subset. A plithogenic set is a 5–tuple
P S = ( P , v , P v , p d f , p C F ) ,
with the following ingredients:
  • v — a chosen attribute;
  • P v — the value domain of v;
  • p d f : P × P v [ 0 , 1 ] s — the degree of appurtenance (DAF);1
  • p C F : P v × P v [ 0 , 1 ] t — the degree of contradiction (DCF).
For every a , b P v , the DCF satisfies
reflexivity : p C F ( a , a ) = 0 , symmetry : p C F ( a , b ) = p C F ( b , a ) .
Here s , t N are, respectively, the appurtenance and contradiction dimensions.
Example 1.9 (Concrete instance of a Plithogenic Set (vector–valued appurtenance and contradiction)). Let the universe be S = { d 1 , d 2 , d 3 } (devices), and take the plithogenic support P = { d 1 , d 3 } S . Choose the attribute v = “service facet” with value domain
P v = { Perf , Energy , Maint } .
We set the appurtenance dimension to s = 2 (e.g., “optimistic” and “pessimistic” degrees) and the contradiction dimension to t = 2 (e.g., “short–term” and “long–term” contradiction components).
Appurtenance (DAF). Define p d f : P × P v [ 0 , 1 ] 2 by the table
Perf Energy Maint d 1 ( 0.85 , 0.70 ) ( 0.60 , 0.45 ) ( 0.75 , 0.55 ) d 3 ( 0.40 , 0.30 ) ( 0.90 , 0.80 ) ( 0.50 , 0.40 )
so that, for instance, p d f ( d 1 , Perf ) = ( 0.85 , 0.70 ) [ 0 , 1 ] 2 .
Contradiction (DCF). Define p C F : P v × P v [ 0 , 1 ] 2 as the symmetric, reflexive–zero matrix of 2–vectors
p C F ( a , b ) a , b P v = ( 0 , 0 ) ( 0.20 , 0.35 ) ( 0.10 , 0.25 ) ( 0.20 , 0.35 ) ( 0 , 0 ) ( 0.30 , 0.40 ) ( 0.10 , 0.25 ) ( 0.30 , 0.40 ) ( 0 , 0 ) .
Clearly p C F ( a , a ) = ( 0 , 0 ) (reflexivity) and p C F ( a , b ) = p C F ( b , a ) (symmetry). Hence P S = ( P , v , P v , p d f , p C F ) is a valid plithogenic set with ( s , t ) = ( 2 , 2 ) .
Definition 1.10 (Plithogenic Fuzzy Set ( s = 1 , t = 1 )). [1,31,32] A plithogenic fuzzy set is a plithogenic set P S = ( P , v , P v , p d f , p C F ) in which
p d f : P × P v [ 0 , 1 ] , p C F : P v × P v [ 0 , 1 ] .
For x P and a P v , write
μ P ( x a ) : = p d f ( x , a ) [ 0 , 1 ] ,
the (single–component) fuzzy membership of x under attribute value a. The contradiction between two attribute values is the scalar
c ( a , b ) : = p C F ( a , b ) [ 0 , 1 ] , c ( a , a ) = 0 , c ( a , b ) = c ( b , a ) .
Example 1.11 (Concrete instance of a Plithogenic Fuzzy Set ( s = t = 1 )). Let P = { s web , s email , s storage } be three IT services. Take the attribute v = “evaluation facet” with
P v = { Q , U , R } ,
standing for Quality, Utility, and Reliability. Since s = t = 1 , the DAF and DCF are scalar–valued.
Memberships. Define p d f : P × P v [ 0 , 1 ] by
Q U R s web 0.82 0.76 0.91 s email 0.75 0.88 0.86 s storage 0.80 0.72 0.94
so μ P ( s web R ) = p d f ( s web , R ) = 0.91 .
Contradiction. Let c ( a , b ) : = p C F ( a , b ) [ 0 , 1 ] be the symmetric, reflexive–zero matrix
c ( a , b ) a , b P v = 0 0.60 0.30 0.60 0 0.50 0.30 0.50 0 .
Then c ( Q , Q ) = 0 , c ( U , R ) = c ( R , U ) = 0.50 , etc. Therefore P S = ( P , v , P v , p d f , p C F ) is a plithogenic fuzzy set with scalar membership and scalar contradiction.

1.3. Upside-Down Logic in Plithogenic Fuzzy Set with Contradiction Reset

We formalize an upside–down transformation for plithogenic fuzzy sets in which membership grades are complemented whenever the contradiction with a chosen anchor exceeds a prescribed threshold; immediately afterward, the involved contradiction is forced to zero to stabilize the context (cf. [16,33]).
Definition 1.12
(Upside–down transform with contradiction reset for a Plithogenic Fuzzy Set). (cf. [16,33]) Let P S = ( P , v , P v , p d f , p C F ) be a plithogenic fuzzy set. Write
μ P ( x a ) : = p d f ( x , a ) [ 0 , 1 ] , c ( a , b ) : = p C F ( a , b ) [ 0 , 1 ] ,
with c ( a , a ) = 0 and c ( a , b ) = c ( b , a ) for all a , b P v . Fix an anchor attribute b P v and a threshold τ [ 0 , 1 ] . Define the activation locus
A τ ( b ) : = { a P v : c ( a , b ) τ } .
The upside–down transform with contradiction reset produces a new plithogenic fuzzy set
P S U b , τ : = ( P , v , P v , p d f U b , τ , p C F U b , τ )
whose components are given, for every x P and a P v , by
p d f U b , τ ( x , a ) : = 1 μ P ( x a ) , if a A τ ( b ) , μ P ( x a ) , if a A τ ( b ) ,
and the updated contradiction map p C F U b , τ : P v × P v [ 0 , 1 ] defined for all u , v P v as
p C F U b , τ ( u , v ) : = 0 , if { u , v } = { a , b } for some a A τ ( b ) , p C F ( u , v ) , otherwise .
Informally, whenever an attribute value a is flipped due to high contradiction with the anchor b, the post–transform structure sets the contradiction between a and b to 0, preventing immediate reactivation at the same threshold.
Example 1.13
(A concrete Upside–Down transform with contradiction reset). Let
P S = ( P , v , P v , p d f , p C F )
be a plithogenic fuzzy set as in Definition 1.12. Consider the finite universe and attribute domain
P = { x 1 , x 2 , x 3 } , P v = { A , B , C } ,
where A , B , C are three evaluation facets. The initial (facetwise) memberships μ P ( x a ) : = p d f ( x , a ) are given by
A B C x 1 0.20 0.60 0.70 x 2 0.90 0.40 0.50 x 3 0.30 0.80 0.20
and the symmetric contradiction function c ( · , · ) : = p C F ( · , · ) is
c ( a , b ) a , b { A , B , C } = 0 0.30 0.80 0.30 0 0.40 0.80 0.40 0 .
Fix the anchor facet b = C and the threshold τ = 0.7 . Then the activation locus from Definition 1.12 is
A τ ( C ) = a { A , B , C } : c ( a , C ) 0.7 = { A } ,
since c ( A , C ) = 0.80 while c ( B , C ) = 0.40 and c ( C , C ) = 0 .
Membership update. By Definition 1.12, we complement exactly the memberships corresponding to the activated facet A and leave the others unchanged:
p d f U C , 0.7 ( x , a ) = 1 μ P ( x A ) , a = A , μ P ( x a ) , a { B , C } .
Hence the transformed table is
A B C x 1 1 0.20 = 0.80 0.60 0.70 x 2 1 0.90 = 0.10 0.40 0.50 x 3 1 0.30 = 0.70 0.80 0.20
Contradiction reset. For the unique activated pair { A , C } , the post–transform contradiction is reset to 0; all other entries are preserved:
p C F U C , 0.7 ( u , v ) = 0 , { u , v } = { A , C } , p C F ( u , v ) , otherwise .
Thus
c U C , 0.7 ( a , b ) a , b { A , B , C } = 0 0.30 0 0.30 0 0.40 0 0.40 0 .
The transform preserves p d f U C , 0.7 ( · , · ) [ 0 , 1 ] and yields a symmetric, reflexive–zero contradiction function p C F U C , 0.7 . Moreover, because c U C , 0.7 ( A , C ) = 0 < τ , the specific flip just performed cannot be immediately re–triggered at the same threshold, illustrating the stabilization role of the contradiction reset.

1.4. Fuzzy Risk Management

Risk Management is the process of identifying, assessing, and mitigating potential losses to minimize the impact on organizational objectives [4,5,6]. The integration of fuzzy logic with risk management has been extensively examined in various research studies [34,35,36].
Definition 1.14
(Mathematical Framework for Fuzzy Risk Management). [37] Let ( Ω , F , P ) be a probability space and D R n a nonempty closed convex decision set. Let
L : D L ( Ω , F , P ) , x L ( x )
be the mapping which assigns to each decision x D its (essentially bounded) loss random variable L ( x ) . Let
ρ : L ( Ω , F , P ) R
be a (coherent) risk measure as in the crisp framework. Finally, let
Φ : R [ 0 , 1 ]
be a continuous, strictly decreasing “satisfaction–risk” mapping (e.g. Φ ( r ) = e λ r for some λ > 0 ). Then we define the fuzzy decision set
A = ( x , μ A ( x ) ) x D ,
where the membership function μ A : D [ 0 , 1 ] is
μ A ( x ) = Φ ρ L ( x ) .
The fuzzy risk management problem is to choose
x * arg max x D μ A ( x ) ,
equivalently min x D ρ L ( x ) with gradual preference captured by Φ.
Example 1.15
(A scenario–based portfolio under Fuzzy Risk Management). Let the decision set be the interval of portfolio weights
D = [ 0 , 1 ] , x D is the fraction invested in a risky asset ,
with the remaining 1 x invested in a risk–free asset of return r f = 0.02 . Assume the risky asset has three scenarios on a finite probability space
( Ω , F , P ) , R ( ω ) { 0.20 , 0.05 , 0.12 } with P = { 0.2 , 0.5 , 0.3 } .
The (random) portfolio return is
Ret ( x ) = x R + ( 1 x ) r f = r f + x ( R r f ) ,
and the loss is L ( x ) : = Ret ( x ) . Explicitly, for the three scenarios,
1 ( x ) = 0.02 + 0.22 x , 2 ( x ) = 0.02 0.03 x , 3 ( x ) = 0.02 0.10 x ,
with respective probabilities 0.2 , 0.5 , 0.3 . We take as risk measure the Conditional Value-at-Risk (Expected Shortfall) at level α = 0.9 , denoted ρ ( L ) = CVaR 0.9 ( L ) . Because the worst-loss scenario 1 ( x ) alone has probability 0.2 > 1 α = 0.1 , the Rockafellar–Uryasev formula yields
CVaR 0.9 L ( x ) = 1 ( x ) = 0.02 + 0.22 x for all x [ 0 , 1 ] .
We map risk to a fuzzy acceptance by a strictly decreasing logistic:
Φ ( r ) : = 1 1 + e λ r ( λ > 0 ) ,
and fix λ = 20 . The fuzzy membership of decision x is
μ A ( x ) = Φ CVaR 0.9 ( L ( x ) ) = 1 1 + exp 20 ( 0.02 + 0.22 x ) ( 0 , 1 ) .
Evaluating a few illustrative choices of x gives
x 0 0.5 1 CVaR 0.9 ( L ( x ) ) 0.020 0.090 0.200 μ A ( x ) 0.599 0.142 0.018
(slightly rounded). Since 0.02 + 0.22 x is strictly increasing in x, μ A ( x ) is strictly decreasing; hence the fuzzy-optimal decision is
x = arg max x [ 0 , 1 ] μ A ( x ) = 0 ,
i.e., fully risk–free in this parameterization.

1.5. Fuzzy IT Service Management

IT Service Management (ITSM) is the process of designing, delivering, managing, and improving IT services to meet business needs effectively, efficiently, and consistently [7,8,9,38]. Well-known best practices for ITSM include ITIL (Information Technology Infrastructure Library) (cf. [39,40,41,42,43]) and SIAM (Service Integration and Management) (cf. [44,45]), both of which are widely applied in business contexts. We present the definition of the Fuzzy IT Service Management Framework, along with a concrete example.
Definition 1.16
(Mathematical Framework for Fuzzy IT Service Management). [46] The Fuzzy IT Service Management (FITSM) framework extends the conventional IT Service Management (ITSM) framework by incorporating fuzzy uncertainty into key evaluation functions. This extension allows us to better capture real–world uncertainty in service performance, cost, and reliability. Formally, we model the FITSM system as a tuple
FITSM = ( S , I , P , M , Q ˜ , U ˜ , R ˜ , C , φ , ψ ) ,
with the following components:
  • S:  A finite set of IT services provided by an organization. For example, S = { s email , s web , s storage } .
  • I:  A finite set of IT infrastructure components, such as servers, routers, storage devices, etc. Each component i I has associated attributes:
    Reliability r ( i ) [ 0 , 1 ] : the probability that component i operates without failure.
    Operating cost c ( i ) R + : the cost to maintain or run component i.
  • P: A finite set of IT management processes (for instance, Incident Management, Change Management, Problem Management). Each process p P is characterized by service level agreements (SLAs) and a compliance function
    ψ : P × S { 0 , 1 } ,
    where ψ ( p , s ) = 1 indicates that process p meets the requirements for service s.
  • M: An allocation mapping that assigns to each service s S a subset of infrastructure components and management processes:
    M : S 2 I × 2 P .
    If M ( s ) = ( I s , P s ) , then I s I is the set of components supporting s, and P s P is the set of processes associated with s.
  • C: A set of cost parameters, which may include overall budget constraints, or cost multipliers applied to specific components or processes.
  • φ : An aggregation function, used to synthesize the reliability or availability of a collection of infrastructure components; for instance, φ : 2 I [ 0 , 1 ] can be defined so that the availability of a service is an aggregation of the reliability of its components.
  • Q ˜ : A fuzzy quality function,
    Q ˜ : S P ˜ ( R + ) ,
    that assigns to each service a fuzzy number (or a fuzzy set of performance scores) representing uncertainty in quality measurements. For example, rather than a single quality score, service quality might be expressed as a set such as { 200.65 , 201.00 , 200.30 } .
  • U ˜ : A fuzzy utility function,
    U ˜ : S P ˜ ( R ) ,
    that captures uncertainty in economic evaluations such as revenue and cost. This function reflects variation in expected revenue or fluctuating operational expenses.
  • R ˜ : A fuzzy reliability function,
    R ˜ : S P ˜ ( [ 0 , 1 ] ) ,
    assigning to each service a fuzzy measure of its overall reliability.
In this framework, the fuzzy functions Q ˜ , U ˜ , and R ˜ map each service to a set of possible values rather than a single crisp value, thereby capturing the inherent uncertainty in real–world IT service evaluations. This added flexibility means that the FITSM framework inherently exhibits the structure of a fuzzy set.
Example 1.17
(Service portfolio with fuzzy quality, utility, and reliability). We instantiate the FITSM tuple FITSM = ( S , I , P , M , Q ˜ , U ˜ , R ˜ , C , φ , ψ ) from Definition FITSM as follows.
Services. S = { s email , s web , s storage } .
Infrastructure. I = { i 1 , , i 5 } with component reliabilities r ( i ) [ 0 , 1 ] and costs c ( i ) R + :
ID Name r ( i ) c ( i ) i 1 Mail Server 0.985 4.0 i 2 Web Server 0.970 3.5 i 3 Shared DB 0.990 5.0 i 4 Firewall 0.995 2.0 i 5 Storage Array 0.980 4.5
Processes. P = { Incident , Change , Problem } . We use a simple compliance map ψ : P × S { 0 , 1 } with ψ ( p , s ) = 1 for all p , s (all processes are in place for each service).
Allocation. The mapping M : S 2 I × 2 P is
M ( s email ) = { i 1 , i 3 , i 4 } , P , M ( s web ) = { i 2 , i 3 , i 4 } , P , M ( s storage ) = { i 5 , i 4 } , P .
Component aggregation φ . Assuming series composition inside each service, we set
φ ( I s ) : = i I s r ( i ) [ 0 , 1 ] .
Hence the crisp service availabilities are
A email = φ ( { i 1 , i 3 , i 4 } ) = 0.985 · 0.990 · 0.995 0.9703 , A web = φ ( { i 2 , i 3 , i 4 } ) = 0.970 · 0.990 · 0.995 0.9555 , A storage = φ ( { i 5 , i 4 } ) = 0.980 · 0.995 0.9751 .
Fuzzy quality, utility, reliability. We model P ˜ ( · ) using triangular fuzzy numbers x ˜ = ( , m , u ) with centroid defuzzification C ( x ˜ ) : = ( + m + u ) / 3 .
Quality Q ˜ : S P ˜ ( [ 0 , 1 ] ) (e.g. SLA compliance as a proportion):
Q ˜ ( s email ) = ( 0.88 , 0.93 , 0.97 ) , Q ˜ ( s web ) = ( 0.80 , 0.87 , 0.93 ) , Q ˜ ( s storage ) = ( 0.85 , 0.90 , 0.94 ) .
Utility U ˜ : S P ˜ ( [ 0 , 1 ] ) (e.g. normalized business value):
U ˜ ( s email ) = ( 0.60 , 0.70 , 0.80 ) , U ˜ ( s web ) = ( 0.70 , 0.80 , 0.90 ) , U ˜ ( s storage ) = ( 0.50 , 0.65 , 0.75 ) .
Reliability R ˜ : S P ˜ ( [ 0 , 1 ] ) (fuzzified from A s by a ± 0.02 band):
R ˜ ( s email ) = ( 0.9503 , 0.9703 , 0.9903 ) , R ˜ ( s web ) = ( 0.9355 , 0.9555 , 0.9755 ) , R ˜ ( s storage ) = ( 0.9551 , 0.9751 , 0.9951 ) .
Illustrative ranking (optional). To obtain a single score per service, we combine centroids with weights w Q = 0.4 , w U = 0.3 , w R = 0.3 :
Score ( s ) : = w Q C ( Q ˜ ( s ) ) + w U C ( U ˜ ( s ) ) + w R C ( R ˜ ( s ) ) .
Centroids are
C ( Q ˜ ) C ( U ˜ ) C ( R ˜ ) s email 0.9267 0.7000 0.9703 s web 0.8667 0.8000 0.9555 s storage 0.8967 0.6333 0.9751
and thus
Score ( s email ) 0.4 · 0.9267 + 0.3 · 0.7000 + 0.3 · 0.9703 0.8718 , Score ( s web ) 0.4 · 0.8667 + 0.3 · 0.8000 + 0.3 · 0.9555 0.8733 , Score ( s storage ) 0.4 · 0.8967 + 0.3 · 0.6333 + 0.3 · 0.9751 0.8412 .
With these illustrative weights and fuzzy inputs the ranking is s web s email s storage . Different weights or fuzzifications naturally reflect alternative business priorities (e.g., reliability-centric vs. value-centric selection).

2. Main Results

In this section, we present and explain the results of this paper.

2.1. Plithogenic Fuzzy Risk Management

We now allow multiple risk facets (attribute values) and an explicit contradiction among them, and we aggregate facetwise fuzzy acceptances by a plithogenic operator that is modulated by contradiction.
Definition 2.1
(Plithogenic Fuzzy Risk Management). A Plithogenic Fuzzy Risk Management (PFRM) instance is a tuple
PFRM = D , v , P v , p d f , p C F , Agg ,
whose components are:
  • D R n a nonempty decision set.
  • v the (fixed) attribute “risk facet”, with value domain P v (finite or countable). Elements a P v stand for facets such as likelihood, impact, detectability, regulatory exposure, scenario, stakeholder view, etc.
  • For each a P v :
    a loss map L a : D L ( Ω , F , P ) ,
    a (coherent) risk measure ρ a : L R ,
    a continuous, strictly decreasing satisfaction map Φ a : R [ 0 , 1 ] .
    The facetwise fuzzy acceptance (plithogenic appurtenance) is
    p d f ( x , a ) : = Φ a ρ a ( L a ( x ) ) [ 0 , 1 ] , ( x , a ) D × P v .
  • A contradiction function p C F : P v × P v [ 0 , 1 ] that is symmetric and reflexive-zero:
    p C F ( a , b ) = p C F ( b , a ) , p C F ( a , a ) = 0 .
    Intuitively, p C F ( a , b ) quantifies the “conflict” between facets a and b.
  • A plithogenic aggregator Agg that combines the facetwise memberships { p d f ( x , a ) } a P v into a single overall membership μ ¯ ( x ) [ 0 , 1 ] while using p C F to modulate between a fixed t-norm T : [ 0 , 1 ] 2 [ 0 , 1 ] and a fixed t-conorm S : [ 0 , 1 ] 2 [ 0 , 1 ] .2 Concretely, for two facets a , b we set
    T p C F ( p , q ; a , b ) : = ( 1 p C F ( a , b ) ) T ( p , q ) + p C F ( a , b ) S ( p , q ) ,
    and extend to | P v | > 2 by any associative fold (e.g. fixed ordering or a dominant facet first). The overall membership is
    μ ¯ ( x ) : = Agg { p d f ( x , a ) } a P v , p C F [ 0 , 1 ] .
Given PFRM , the plithogenic fuzzy risk management problem is
x arg max x D μ ¯ ( x ) .
Example 2.2
(Mitigation Strategy Selection with Three Risk Facets). Decisions and facets. Let the decision set be D = { x A , x B , x C } , representing three risk–mitigation strategies. We use three risk facets P v = { L , I , D } : L = likelihood, I = impact, D = detectability (large detectability score means poor detectability).
Facetwise loss, risk measure, and satisfaction. For each facet a P v and decision x D , let L a ( x ) be a (bounded) loss random variable. In this illustrative instance we take each L a ( x ) to be a constant random variable equal to a score r x , a [ 0 , 10 ] . We choose the risk measure ρ a to be the identity and the satisfaction map Φ a ( r ) = max { 0 , min { 1 , 1 r / 10 } } (linearly decreasing in the risk score). Thus the plithogenic appurtenance (facetwise fuzzy acceptance) is
p d f ( x , a ) = Φ a ρ a ( L a ( x ) ) = 1 r x , a 10 [ 0 , 1 ] .
We also write μ ( x a ) : = p d f ( x , a ) .
Facet scores and induced memberships.
r x , L r x , I r x , D x A 4 6 3 x B 5 5 6 x C 3 7 5 μ ( x L ) μ ( x I ) μ ( x D ) x A 0.6 0.4 0.7 x B 0.5 0.5 0.4 x C 0.7 0.3 0.5
Contradiction map. Let p C F : P v × P v [ 0 , 1 ] be symmetric with p C F ( a , a ) = 0 . We use (nonzero entries listed)
p C F ( L , I ) = 0.5 , p C F ( I , D ) = 0.3 , p C F ( L , D ) = 0.2 .
Plithogenic aggregation. Fix a t-norm T ( p , q ) = p q and a t-conorm S ( p , q ) = p + q p q . For a pair of facets ( a , b ) and inputs p , q [ 0 , 1 ] set
T p C F ( p , q ; a , b ) : = ( 1 p C F ( a , b ) ) T ( p , q ) + p C F ( a , b ) S ( p , q ) .
We fold associatively in the order π = ( L , I , D ) :
μ ¯ 1 ( x ) : = μ ( x L ) , μ ¯ 2 ( x ) : = T p C F μ ¯ 1 ( x ) , μ ( x I ) ; L , I ,
μ ¯ 3 ( x ) : = T p C F μ ¯ 2 ( x ) , μ ( x D ) ; I , D , μ ¯ ( x ) : = μ ¯ 3 ( x ) [ 0 , 1 ] .
Step-by-step aggregation (exact arithmetic shown). Recall the identity
T p C F ( p , q ; a , b ) = ( 1 c ) p q + c ( p + q p q )
= p q product + c p conorm part + c q conorm part 2 c p q double - count adj , c = p C F ( a , b ) .
x A : μ L = 0.6 , μ I = 0.4 , μ D = 0.7 .
μ ¯ 2 = T p C F ( 0.6 , 0.4 ; L , I ) , c = 0.5 : p q = 0.24 , c p = 0.30 , c q = 0.20 , 2 c p q = 0.24 μ ¯ 2 = 0.50 .
μ ¯ = T p C F ( 0.50 , 0.70 ; I , D ) , c = 0.3 : p q = 0.35 , c p = 0.15 , c q = 0.21 , 2 c p q = 0.21 μ ¯ ( x A ) = 0.50 .
x B : μ L = 0.5 , μ I = 0.5 , μ D = 0.4 .
μ ¯ 2 = T p C F ( 0.5 , 0.5 ; L , I ) , c = 0.5 : p q = 0.25 , c p = 0.25 , c q = 0.25 , 2 c p q = 0.25 μ ¯ 2 = 0.50 .
μ ¯ = T p C F ( 0.50 , 0.40 ; I , D ) , c = 0.3 : p q = 0.20 , c p = 0.15 , c q = 0.12 , 2 c p q = 0.12 μ ¯ ( x B ) = 0.35 .
x C : μ L = 0.7 , μ I = 0.3 , μ D = 0.5 .
μ ¯ 2 = T p C F ( 0.7 , 0.3 ; L , I ) , c = 0.5 : p q = 0.21 , c p = 0.35 , c q = 0.15 , 2 c p q = 0.21 μ ¯ 2 = 0.50 .
μ ¯ = T p C F ( 0.50 , 0.50 ; I , D ) , c = 0.3 : p q = 0.25 , c p = 0.15 , c q = 0.15 , 2 c p q = 0.15 μ ¯ ( x C ) = 0.40 .
Decision. The overall memberships are
μ ¯ ( x A ) = 0.50 , μ ¯ ( x C ) = 0.40 , μ ¯ ( x B ) = 0.35 ,
hence the PFRM rule selects x A D as the preferred mitigation strategy.
Remark 2.3
(Design freedom and well-posedness). The construction is flexible yet mathematically well-posed: (i) p d f ( x , a ) [ 0 , 1 ] by definition of Φ a and ρ a ; (ii) the convex mixture ( 1 c ) T + c S stays in [ 0 , 1 ] whenever T , S are standard t-(co)norms and c [ 0 , 1 ] ; (iii) μ ¯ : D [ 0 , 1 ] is thus well-defined. Existence of an optimizer follows under standard compactness/continuity assumptions on D and on the maps x p d f ( x , a ) .
Theorem 2.4
(Reduction to classical FRM). Let PFRM = ( D , v , P v , p d f , p C F , Agg ) be as in Definition 2.1. Suppose P v = { a 0 } is a singleton and p C F 0 . Then
μ ¯ ( x ) = p d f ( x , a 0 ) = Φ a 0 ρ a 0 ( L a 0 ( x ) ) , x D ,
and the PFRM problem max x D μ ¯ ( x ) coincides with the classical FRM problem with data ( L , ρ , Φ ) = ( L a 0 , ρ a 0 , Φ a 0 ) .
Proof. 
With | P v | = 1 , the aggregator Agg receives a single input p d f ( x , a 0 ) , hence μ ¯ ( x ) = p d f ( x , a 0 ) by definition of a fold. Because p C F ( a 0 , a 0 ) = 0 the modulation is vacuous. The stated identity follows from the definition of p d f . Therefore maximizing μ ¯ is exactly maximizing Φ a 0 ( ρ a 0 ( L a 0 ( x ) ) ) , which is the FRM objective. □
Theorem 2.5
(Plithogenic fuzzy set structure). For any PFRM = ( D , v , P v , p d f , p C F , Agg ) as in Definition 2.1, the tuple
P S : = ( P , v , P v , p d f , p C F ) , P : = D ,
is a plithogenic fuzzy set (single appurtenance component and scalar contradiction), i.e.,
(a)
p d f : P × P v [ 0 , 1 ] is well-defined by p d f ( x , a ) = Φ a ( ρ a ( L a ( x ) ) ) ,
(b)
p C F : P v × P v [ 0 , 1 ] is symmetric with p C F ( a , a ) = 0 .
Proof. (a) For each a, ρ a ( L a ( x ) ) R and Φ a maps R continuously into [ 0 , 1 ] , hence p d f ( x , a ) [ 0 , 1 ] for all ( x , a ) . (b) By assumption, p C F is symmetric and reflexive-zero. These are exactly the axioms required for the contradiction function in the definition of a plithogenic fuzzy set with one-dimensional appurtenance and contradiction components. Therefore ( P , v , P v , p d f , p C F ) is a plithogenic fuzzy set. □

2.2. Upside-Down Logic in Plithogenic Fuzzy Risk Management

In this subsection we endow the Plithogenic Fuzzy Risk Management (PFRM) model (Definition 2.1) with a mathematically precise Upside-Down operator that flips facetwise acceptability whenever a chosen anchor facet is in strong contradiction with other facets. We then show that, under natural truth-valuation at the mid-cut, this operator realizes the abstract axioms of Upside-Down Logic (truth ↔ falsity) on the elementary acceptance statements.
Notation 2.6
(Facetwise membership). For a PFRM instance PFRM = ( D , v , P v , p d f , p C F , Agg ) we write
μ ( x a ) : = p d f ( x , a ) [ 0 , 1 ] ( x D , a P v ) ,
and we abbreviate c ( a , b ) : = p C F ( a , b ) [ 0 , 1 ] with c ( a , a ) = 0 and c ( a , b ) = c ( b , a ) .
Definition 2.7
(Anchor–threshold activated Upside-Down operator on PFRM). Fix an anchor facet b P v and a contradiction threshold τ [ 0 , 1 ] . Define the activation locus
A τ ( b ) : = { a P v : c ( a , b ) τ } .
The Upside-Down transform U b , τ of the instance PFRM is the new instance
PFRM U b , τ = D , v , P v , p d f U b , τ , p C F U b , τ , Agg U b , τ
with
p d f U b , τ ( x , a ) : = 1 μ ( x a ) , a A τ ( b ) , μ ( x a ) , a A τ ( b ) , p C F U b , τ ( u , v ) : = 0 , { u , v } = { a , b } for some a A τ ( b ) , p C F ( u , v ) , otherwise ,
and where Agg U b , τ is obtained from Agg by replacing p d f , p C F with p d f U b , τ , p C F U b , τ (the underlying t-norm/t-conorm and folding policy are unchanged). Informally, large contradiction to the anchor triggers a membership complement and then resets that specific contradiction to zero to stabilize the post-transform context.
Example 2.8
(Regulated Medical Device Go-To-Market Risk). Decisions and facets. Let D = { x A , x B } be two launch plans for a regulated medical device. Let P v = { S , L , D , C , R } denote facets: Safety impact ( S ), Likelihood ( L ), Detectability ( D ), Cost pressure ( C ), and Regulatory exposure ( R ). Facetwise fuzzy acceptances μ ( x a ) [ 0 , 1 ] are:
Plan μ ( · S ) μ ( · L ) μ ( · D ) μ ( · C ) μ ( · R ) x A 0.92 0.60 0.70 0.80 0.75 x B 0.85 0.70 0.60 0.90 0.60
Contradiction & aggregation. Use a symmetric p C F with p C F ( a , a ) = 0 . The (relevant) entries used below are
p C F ( S , L ) = 0.30 , p C F ( L , D ) = 0.30 , p C F ( D , C ) = 0.40 , p C F ( C , R ) = 0.90 .
Choose T ( p , q ) = p q , S ( p , q ) = p + q p q , and fold in the order π = ( S , L , D , C , R ) via
T p C F ( p , q ; a , b ) = ( 1 p C F ( a , b ) ) p q + p C F ( a , b ) ( p + q p q ) .
Pre-transform overall memberships. For x A :
μ ¯ 1 = 0.92 , μ ¯ 2 = T p C F ( 0.92 , 0.60 ; S , L ) = 0.676800 , μ ¯ 3 = T p C F ( 0.676800 , 0.70 ; L , D ) = 0.602544 , μ ¯ 4 = T p C F ( 0.602544 , 0.80 ; D , C ) = 0.65742464 , μ ¯ 5 = T p C F ( 0.65742464 , 0.75 ; C , R ) = 0.872227392 .
For x B :
μ ¯ ( x B ) = 0.827523432 .
Thus, before the transform, x A is preferred.
Anchor–threshold Upside-Down. Let the anchor be R (regulatory), with τ = 0.8 . Then A τ ( R ) = { C } because p C F ( C , R ) = 0.90 τ . Apply U R , τ :
μ U ( x C ) = 1 μ ( x C ) , p C F U ( C , R ) = 0 .
Hence μ U ( x A C ) = 0.20 , μ U ( x B C ) = 0.10 .
Post-transform overall memberships. Re-fold (same order; only the flipped facet and the reset pair differ):
μ ¯ U ( x A ) = 0.258839520 , μ ¯ U ( x B ) = 0.165024240 .
The transform penalizes cost-driven acceptance under strict regulatory anchoring, yet preserves the ranking x A x B (now with a larger margin).
Example 2.9 (Hospital Disaster-Recovery (DR) Strategy Selection). Decisions and facets. Let D = { x AA , x CB } be two DR strategies: Active–Active ( x AA ) vs. Cold Backup ( x CB ). Use facets P v = { S , L , B , R } : Safety-critical impact ( S ), Likelihood ( L ), Budget adequacy ( B ), Regulatory/contractual compliance ( R ). Facet memberships:
Strategy μ ( · S ) μ ( · L ) μ ( · B ) μ ( · R ) x AA 0.90 0.85 0.20 0.60 x CB 0.70 0.60 0.90 0.50
Contradiction & aggregation. Nonzero (relevant) contradictions for the fold order π = ( S , L , B , R ) are
p C F ( S , L ) = 0.20 , p C F ( L , B ) = 0.50 , p C F ( B , R ) = 0.30 , p C F ( S , B ) = 0.80 .
Again take T ( p , q ) = p q , S ( p , q ) = p + q p q and fold via T p C F .
Pre-transform overall memberships. A direct computation yields
μ ¯ ( x AA ) = 0.452430 , μ ¯ ( x CB ) = 0.503000 ,
so before anchoring, Cold Backup is preferred.
Anchor–threshold Upside-Down. Let the anchor be S (patient safety), with τ = 0.75 . Then A τ ( S ) = { B } because p C F ( S , B ) = 0.80 τ . Apply U S , τ :
μ U ( x B ) = 1 μ ( x B ) , p C F U ( S , B ) = 0 .
Thus μ U ( x AA B ) = 0.80 and μ U ( x CB B ) = 0.10 .
Post-transform overall memberships. Refolding with the flipped B gives
μ ¯ U ( x AA ) = 0.614430 , μ ¯ U ( x CB ) = 0.303000 .
Hence, after safety anchoring, the preference reverses to Active–Active, reflecting a policy where strong safety priority turns budget-friendly options into low-acceptance ones when they conflict with safety.
Lemma 2.10
(Well-posedness). PFRM U b , τ is a valid PFRM instance: for all ( x , a ) , p d f U b , τ ( x , a ) [ 0 , 1 ] ; the map p C F U b , τ remains symmetric with ( p C F U b , τ ) ( a , a ) = 0 ; consequently Agg U b , τ produces an overall membership μ ¯ U b , τ : D [ 0 , 1 ] .
Proof. 
The complement 1 μ ( x a ) lies in [ 0 , 1 ] because μ ( · a ) [ 0 , 1 ] . The definition of p C F U b , τ preserves symmetry and zeros on the diagonal. Since the t-norm/t-conorm mixture used by Agg is continuous and bounded in [ 0 , 1 ] , the overall output remains in [ 0 , 1 ] after substitution. □
Definition 2.11.
Let L be the set of elementary acceptance statements
Acc 1 / 2 ( x , a ) “decision x is acceptable on facet a at the mid - cut” .
For a PFRM instance PFRM , define the mid-cut valuation v b , τ by
v b , τ Acc 1 / 2 ( x , a ) : = True , μ ( x a ) 1 2 , False , μ ( x a ) < 1 2 .
After applying U b , τ , we evaluate with the same predicate over p d f U b , τ , obtaining v b , τ .
Theorem 2.12
(Upside-Down property on elementary acceptances). Let PFRM be a PFRM instance and fix ( b , τ ) . For every x D and a P v with μ ( x a ) 1 2 ,
a A τ ( b ) v b , τ Acc 1 / 2 ( x , a ) = ¬ v b , τ Acc 1 / 2 ( x , a ) , a A τ ( b ) v b , τ Acc 1 / 2 ( x , a ) = v b , τ Acc 1 / 2 ( x , a ) .
Proof. 
If a A τ ( b ) then p d f U b , τ ( x , a ) = μ ( x a ) and the valuation is unchanged.
Assume a A τ ( b ) . Then p d f U b , τ ( x , a ) = 1 μ ( x a ) . If μ ( x a ) > 1 2 we have 1 μ ( x a ) < 1 2 and therefore v b , τ ( Acc 1 / 2 ( x , a ) ) = True while v b , τ ( Acc 1 / 2 ( x , a ) ) = False . If instead μ ( x a ) < 1 2 then 1 μ ( x a ) > 1 2 , so the truth values swap in the opposite direction. The only non-flipping boundary case μ ( x a ) = 1 2 is excluded by assumption. □
Corollary 2.13
(Instantiation of Upside-Down Logic). Let the context be the pair C = ( b , τ ) , let the Upside-Down operator act on instances by U ( PFRM ; C ) = PFRM U b , τ , and keep the language L fixed. Then for every lemma A L of the form Acc 1 / 2 ( x , a ) with μ ( x a ) 1 2 ,
v C ( A ) = True v U ( C ) A = False , v C ( A ) = False v U ( C ) A = True .
Hence ( L , { v C } , U ) satisfies the defining truth–falsity inversion axioms of Upside-Down Logic on the activated facets.
Proof. 
This is an immediate reformulation of Theorem 2.12. □

2.3. Plithogenic Fuzzy IT Service Management

We enrich FITSM with plithogenic structure: explicit risk/performance facets (attribute values) and a contradiction map modulating the fusion of facetwise memberships.
Definition 2.14
(Plithogenic Fuzzy IT Service Management). A P–FITSM instance is a tuple
PFITSM = S , I , P , M , Q ˜ , U ˜ , R ˜ , C , φ , ψ ; v , P v , p d f , p C F , Agg ,
with the following additional components beyond FITSM :
  • v is the attribute “service evaluation facet” and P v its (finite or countable) value domain. The canonical choice is P v = { Q , U , R } , but extra facets (e.g. security, compliance, sustainability) may be added.
  • p d f : S × P v [ 0 , 1 ] (plithogenic appurtenance) assigns a membership degree to each ( s , a ) as
    p d f ( s , a ) = μ Q ( s ) , a = Q , μ U ( s ) , a = U , μ R ( s ) , a = R , F a X ˜ a ( s ) , for any extra facet a ,
    where each extra facet a has its fuzzy score X ˜ a : S P ˜ ( R ) and a monotone scoring functional F a : P ˜ ( R ) [ 0 , 1 ] .
  • p C F : P v × P v [ 0 , 1 ] is the contradiction function, symmetric with p C F ( a , a ) = 0 for all a P v ; it quantifies the conflict between facets.
  • Agg is a plithogenic aggregator that fuses the vector { p d f ( s , a ) } a P v into an overall service membership   μ ¯ ( s ) [ 0 , 1 ] by mixing a fixed t-norm T and a fixed t-conorm S using p C F . For two facets a , b P v and inputs p , q [ 0 , 1 ] define
    T p C F ( p , q ; a , b ) : = ( 1 p C F ( a , b ) ) T ( p , q ) + p C F ( a , b ) S ( p , q ) .
    For | P v | > 2 we fix once and for all a total order π on P v and fold associatively:
    μ ¯ 1 ( s ) : = p d f ( s , π 1 ) , μ ¯ k + 1 ( s ) : = T p C F μ ¯ k ( s ) , p d f ( s , π k + 1 ) ; π k , π k + 1 ,
    and set μ ¯ ( s ) : = μ ¯ | P v | ( s ) .
The P–FITSM decision problem is to select s arg max s S μ ¯ ( s ) or, more generally, to use μ ¯ within portfolio/optimization constraints.
Example 2.15
(PFITSM for Managed Database Selection). We consider a small portfolio of managed database services
S = { DB - Alpha , DB - Beta , DB - Gamma } .
We focus on the plithogenic evaluation layer of Definition 2.14; the infrastructural and process tuples ( I , P , M , Q ˜ , U ˜ , R ˜ , C , φ , ψ ) are present but not used explicitly below.
Let the attribute be the service evaluation facet v with value domain
P v = { Q , U , R , Sec , Sus } ,
standing for Quality, Utility (economic benefit/cost), Reliability, Security, and Sustainability. From normalized KPI measurements we obtain the facetwise fuzzy memberships μ Q , μ U , μ R , μ Sec , μ Sus : S [ 0 , 1 ] , which directly play the role of p d f ( s , a ) (cf. Definition 2.14):
Service μ Q μ U μ R μ Sec μ Sus DB - Alpha 0.82 0.65 0.97 0.90 0.55 DB - Beta 0.78 0.80 0.88 0.72 0.70 DB - Gamma 0.70 0.55 0.92 0.85 0.90
We use a symmetric contradiction map p C F : P v × P v [ 0 , 1 ] with p C F ( a , a ) = 0 . Table 1 lists the nontrivial (upper triangular) entries used in the fold order below; symmetry fills the lower triangular part.
Fix a total order π = ( R , Sec , Q , U , Sus ) on P v for associative folding. Choose the product t-norm T ( p , q ) = p q and the probabilistic sum t-conorm S ( p , q ) = p + q p q . For two adjacent facets ( a , b ) we use the standard plithogenic mixer
T p C F ( p , q ; a , b ) : = ( 1 p C F ( a , b ) ) T ( p , q ) + p C F ( a , b ) S ( p , q ) .
For any s S , define the fold recursively by
μ ¯ 1 ( s ) : = p d f ( s , π 1 ) ,
μ ¯ k + 1 ( s ) : = T p C F μ ¯ k ( s ) , p d f ( s , π k + 1 ) ; π k , π k + 1 ,
and set μ ¯ ( s ) : = μ ¯ | P v | ( s ) [ 0 , 1 ] .
Step-by-step computation for DB−Alpha.
With π = ( R , Sec , Q , U , Sus ) we obtain
μ ¯ 1 = μ R = 0.97 , μ ¯ 2 = T p C F 0.97 , 0.90 ; R , Sec = ( 1 0.20 ) ( 0.97 · 0.90 ) + 0.20 0.97 + 0.90 0.97 · 0.90 = 0.8 · 0.873 + 0.2 · 0.997 = 0.8978 , μ ¯ 3 = T p C F 0.8978 , 0.82 ; Sec , Q = ( 1 0.10 ) ( 0.8978 · 0.82 ) + 0.10 0.8978 + 0.82 0.8978 · 0.82 = 0.9 · 0.736196 + 0.1 · 0.981604 = 0.7607368 , μ ¯ 4 = T p C F 0.7607368 , 0.65 ; Q , U = ( 1 0.30 ) ( 0.7607368 · 0.65 ) + 0.30 0.7607368 + 0.65 0.7607368 · 0.65 = 0.7 · 0.49447892 + 0.3 · 0.91625788 = 0.621012608 , μ ¯ 5 = T p C F 0.621012608 , 0.55 ; U , Sus = ( 1 0.50 ) ( 0.621012608 · 0.55 ) + 0.50 0.621012608 + 0.55 0.621012608 · 0.55 = 0.5 · 0.3415569344 + 0.5 · 0.8294556736 = 0.585506304 .
The same fold yields the overall plithogenic memberships
μ ¯ ( DB - Alpha ) = 0.5855 , μ ¯ ( DB - Beta ) = 0.6513 , μ ¯ ( DB - Gamma ) = 0.6920 ,
where we display 4 significant digits for readability.3 Therefore, the PFITSM selection is
s arg max s S μ ¯ ( s ) = { DB - Gamma } .
Because contradiction levels modulate between conjunctive (T) and disjunctive (S) behaviour facet by facet, the method transparently captures trade-offs such as “utility vs. security” ( p C F ( U , Sec ) = 0.80 ) and “utility vs. reliability” ( p C F ( U , R ) = 0.70 ), while keeping near-compatible pairs (e.g. Sec vs. Q with 0.10 ) largely conjunctive. This example demonstrates how PFITSM generalizes the fuzzy ITSM scoring by adding an explicit, mathematically controlled contradiction layer and a plithogenic fusion operator.
Remark 2.16 (Well-posedness). Since T , S : [ 0 , 1 ] 2 [ 0 , 1 ] and p C F [ 0 , 1 ] , the convex mixture T p C F maps [ 0 , 1 ] 2 to [ 0 , 1 ] . Thus each μ ¯ k ( s ) [ 0 , 1 ] and μ ¯ : S [ 0 , 1 ] is well-defined. If T and S are nondecreasing in each argument (standard for t-(co)norms), then T p C F and the fold are nondecreasing in each input membership, hence μ ¯ is monotone in every p d f ( s , a ) .
To formalize the reduction, fix any associative, nondecreasing fusion A FITSM : [ 0 , 1 ] m [ 0 , 1 ] used in the baseline FITSM to combine the normalized facet scores (e.g. a t-norm product, min, or a weighted geometric/Archimedean t-norm). Define the (derived) overall FITSM membership
μ FITSM ( s ) : = A FITSM μ Q ( s ) , μ U ( s ) , μ R ( s ) , [ 0 , 1 ] .
Theorem 2.17 (Reduction to FITSM). Consider PFITSM with the following specializations:
  • p C F 0 on P v ;
  • T is chosen so that the fold coincides with A FITSM on the ordered list { μ ( s ) } a P v (e.g. T = min for conjunctive FITSM, or T ( p , q ) = p q for multiplicative FITSM);
  • S is arbitrary (unused when p C F 0 ).
Then for all s S , μ ¯ ( s ) = μ FITSM ( s ) . In particular, the P–FITSM decision rule arg max s S μ ¯ ( s ) coincides with the baseline FITSM rule arg max s S μ FITSM ( s ) .
Proof. If p C F 0 , then T p C F ( p , q ; a , b ) = T ( p , q ) for all pairs. By the choice of T and the fixed order π , the fold computes exactly A FITSM on the sequence ( μ Q ( s ) , μ U ( s ) , μ R ( s ) , ) . Hence μ ¯ ( s ) = μ FITSM ( s ) for every s S , and the maximizers agree. □
Theorem 2.18 (Plithogenic fuzzy set structure of P–FITSM). Let PFITSM be as in Definition 2.14. Set P : = S and retain the same ( v , P v , p d f , p C F ) . Then
P S : = ( P , v , P v , p d f , p C F )
is a plithogenic fuzzy set.
Proof. By Definition 2.14, p d f ( s , a ) [ 0 , 1 ] for all ( s , a ) , and p C F is symmetric with p C F ( a , a ) = 0 . These are precisely the axioms required for a plithogenic fuzzy set in the single appurtenance/contradiction component case. Therefore P S is a plithogenic fuzzy set. □

2.4. Upside-Down Logic in Plithogenic Fuzzy IT Service Management

We formalize an Upside-Down operator for the Plithogenic Fuzzy IT Service Management (PFITSM) framework and prove that, under a natural truth valuation on acceptance statements, it realizes the defining truth↔falsity inversion of Upside-Down Logic.
Notation 2.19 (PFITSM instance and facetwise memberships). Let a PFITSM instance be given by
PFITSM = ( S , v , P v , p d f , p C F , Agg , ) ,
where S is the (finite) set of services, v is the fixed attribute (“service facet”), P v is its value domain (e.g., availability, cost, customer satisfaction, SLA compliance), p d f : S × P v [ 0 , 1 ] is the appurtenance (facetwise fuzzy acceptance), p C F : P v × P v [ 0 , 1 ] is the symmetric contradiction map with p C F ( a , a ) = 0 , and Agg aggregates { p d f ( s , a ) } a P v into a global membership μ ¯ ( s ) [ 0 , 1 ] . We write
μ ( s a ) : = p d f ( s , a ) [ 0 , 1 ] , c ( a , b ) : = p C F ( a , b ) [ 0 , 1 ] .
When needed, we assume Agg is built from a t-norm T and t-conorm S via the contradiction-modulated mixer
T c ( p , q ; a , b ) : = ( 1 c ( a , b ) ) T ( p , q ) + c ( a , b ) S ( p , q ) ,
folded associatively over all facets.
Definition 2.20 (Anchor–threshold Upside-Down operator on PFITSM). Fix an anchor facet b P v and acontradiction threshold τ [ 0 , 1 ] . Set the activation locus
A τ ( b ) : = { a P v : c ( a , b ) τ } .
The Upside-Down transform U b , τ produces a new PFITSM instance
PFITSM U b , τ = ( S , v , P v , p d f U b , τ , p C F U b , τ , Agg U b , τ , )
with
p d f U b , τ ( s , a ) : = 1 μ ( s a ) , a A τ ( b ) , μ ( s a ) , a A τ ( b ) , p C F U b , τ ( u , v ) : = 0 , { u , v } = { a , b } for some a A τ ( b ) , p C F ( u , v ) , otherwise ,
and where Agg U b , τ is obtained from Agg by substituting p d f U b , τ and p C F U b , τ (the underlying t-(co)norms and folding policy are unchanged).
Example 2.21 (Cost-anchored FinOps pivot for a cloud email service). Service and facets. Let S = { s email } denote a managed cloud email service. Consider the facet set
P v = { Ava , Sec , Lat , CS , Cost } ,
standing for Availability, Security compliance, Latency, Customer Satisfaction, and Budget Adherence (Cost), respectively. Let b = Cost and set the contradiction threshold τ = 0.7 .
Contradictions to the anchor.. Assume (symmetrically extended) contradiction levels with the anchor
c ( Ava , Cost ) = 0.85 , c ( Sec , Cost ) = 0.75 , c ( Lat , Cost ) = 0.60 ,
c ( CS , Cost ) = 0.50 , c ( Cost , Cost ) = 0 .
Hence the activation locus is
A τ ( b ) = { Ava , Sec } .
Baseline facetwise memberships. Suppose the current (facetwise) fuzzy acceptances are
μ ( s email Ava ) = 0.97 , μ ( s email Sec ) = 0.92 , μ ( s email Lat ) = 0.88 ,
μ ( s email CS ) = 0.90 , μ ( s email Cost ) = 0.35 .
Upside-Down transform and reset. By Definition 2.20, for the activated facets we complement the memberships, and we reset the contradiction with the anchor:
p d f U b , τ ( s email , a ) = 1 μ ( s email a ) , a { Ava , Sec } , μ ( s email a ) , a { Lat , CS , Cost } ,
p C F U b , τ ( Ava , Cost ) = 0 , p C F U b , τ ( Sec , Cost ) = 0 ,
and p C F U b , τ ( u , v ) = p C F ( u , v ) otherwise.
Numerical result.
Ava : 1 0.97 = 0.03 , Sec : 1 0.92 = 0.08 , Lat : 0.88 ( unchanged ) , CS : 0.90 ( unchanged ) , Cost : 0.35 ( unchanged ) .
Interpretation. In a FinOps review where Budget Adherence is the anchor and high-contradiction facets are activated, the acceptance of availability and security is inverted: what used to be strong pros (high μ) are now strong cons (low p d f U ) relative to the cost-driven context. This focuses decision-making on cost relief even at the expense of premium availability/security options; the contradiction reset prevents immediate re-triggering at the same threshold.
Example 2.22 (Privacy-first shift for an AI chatbot platform). Service and facets. Let S = { s chatbot } be an AI chatbot service. Consider
P v = { GDPR , Pers , Telem , Perf , DevVel } ,
with GDPR Compliance, Personalization, Telemetry/Logging, Performance, and Developer Velocity. Choose the privacy anchor b = GDPR and set τ = 0.8 .
Contradictions to the anchor. Assume (symmetrically extended) levels
c ( Pers , GDPR ) = 0.90 , c ( Telem , GDPR ) = 0.85 , c ( Perf , GDPR ) = 0.40 ,
c ( DevVel , GDPR ) = 0.30 , c ( GDPR , GDPR ) = 0 .
Thus the activation locus is
A τ ( b ) = { Pers , Telem } .
Baseline facetwise memberships. Suppose the current acceptances are
μ ( s chatbot Pers ) = 0.86 , μ ( s chatbot Telem ) = 0.80 , μ ( s chatbot Perf ) = 0.82 ,
μ ( s chatbot DevVel ) = 0.75 , μ ( s chatbot GDPR ) = 0.45 .
Upside-Down transform and reset. Applying U b , τ :
p d f U b , τ ( s chatbot , a ) = 1 μ ( s chatbot a ) , a { Pers , Telem } , μ ( s chatbot a ) , a { Perf , DevVel , GDPR } ,
p C F U b , τ ( Pers , GDPR ) = 0 , p C F U b , τ ( Telem , GDPR ) = 0 ,
and p C F U b , τ ( u , v ) = p C F ( u , v ) otherwise.
Numerical result.
Pers : 1 0.86 = 0.14 , Telem : 1 0.80 = 0.20 , Perf : 0.82 ( unchanged ) , DevVel : 0.75 ( unchanged ) , GDPR : 0.45 ( unchanged ) .
Interpretation. In a privacy-first audit (anchor = GDPR) with a strict threshold, the high-contradiction facets Personalization and Telemetry invert: formerly attractive capabilities are now liabilities relative to regulatory compliance. The reset p C F U between each activated facet and the anchor stabilizes the transformed context for subsequent analysis (e.g., re-aggregation or optimization under the new priorities).
Lemma 2.23 (Well-posedness). PFITSM U b , τ is a valid PFITSM instance: for all ( s , a ) , p d f U b , τ ( s , a ) [ 0 , 1 ] ; p C F U b , τ remains symmetric with p C F U b , τ ( a , a ) = 0 ; consequently the aggregated μ ¯ U b , τ : S [ 0 , 1 ] is well-defined.
Proof. Since μ ( · a ) [ 0 , 1 ] , its complement lies in [ 0 , 1 ] . The definition of p C F U b , τ preserves symmetry and diagonal zeros. Standard t-(co)norm based mixers map [ 0 , 1 ] 2 to [ 0 , 1 ] and are continuous, hence the fold yields μ ¯ U b , τ [ 0 , 1 ] . □
Notation 2.24. Let L contain elementary acceptance statements
Acc 1 / 2 ( s , a ) service s is acceptable on facet a at mid - cut .
Given a PFITSM instance, define the mid-cut valuation
v b , τ Acc 1 / 2 ( s , a ) : = True , μ ( s a ) 1 2 , False , μ ( s a ) < 1 2 .
After applying U b , τ we evaluate with p d f U b , τ , obtaining v b , τ .
Theorem 2.25 (Upside-Down property on facetwise acceptances). Fix ( b , τ ) and let s S , a P v with μ ( s a ) 1 2 . Then
a A τ ( b ) v b , τ Acc 1 / 2 ( s , a ) = ¬ v b , τ Acc 1 / 2 ( s , a ) ,
a A τ ( b ) v b , τ Acc 1 / 2 ( s , a ) = v b , τ Acc 1 / 2 ( s , a ) .
Proof. If a A τ ( b ) then p d f U b , τ ( s , a ) = μ ( s a ) and truth is preserved. If a A τ ( b ) then p d f U b , τ ( s , a ) = 1 μ ( s a ) , which is on the opposite side of 1 2 whenever μ ( s a ) 1 2 , so truth and falsity swap. □

3. Conclusion

In this paper, we formally introduced Plithogenic Fuzzy Risk Management and Plithogenic Fuzzy IT Service Management and investigate their structural properties. In future work, we expect further studies on extensions of these concepts employing Graphs[47,48], HyperFuzzy Sets[49,50], SuperHyperFuzzy Sets[51], HyperGraphs[52,53,54], and SuperHyperGraphs [55,56,57,58].

Funding

This study was conducted without any financial support from external organizations or grants.

Acknowledgments

We would like to express our sincere gratitude to everyone who provided valuable insights, support, and encouragement throughout this research. We also extend our thanks to the readers for their interest and to the authors of the referenced works, whose scholarly contributions have greatly influenced this study. Lastly, we are deeply grateful to the publishers and reviewers who facilitated the dissemination of this work.

Data Availability Statement

Since this research is purely theoretical and mathematical, no empirical data or computational analysis was utilized. Researchers are encouraged to expand upon these findings with data-oriented or experimental approaches in future studies.

Conflicts of Interest

The authors declare that they have no conflicts of interest related to the content or publication of this paper.

Use of Artificial Intelligence

I use generative AI and AI-assisted tools for tasks such as English grammar checking, and I do not employ them in any way that violates ethical standards.

Ethical Statement

As this study does not involve experiments with human participants or animals, no ethical approval was required.

Code Availability

No code or software was developed for this study.

Clinical Trial

This study did not involve any clinical trials.

Consent to Participate

Not applicable.

Disclaimer

This work presents theoretical ideas and frameworks that have not yet been empirically validated. Readers are encouraged to explore practical applications and further refine these concepts. Although care has been taken to ensure accuracy and appropriate citations, any errors or oversights are unintentional. The perspectives and interpretations expressed herein are solely those of the authors and do not necessarily reflect the viewpoints of their affiliated institutions.
1
In the literature, DAF is modeled in several equivalent ways (e.g., powerset–valued or vector–valued). We adopt the standard [ 0 , 1 ] s form; see [30].
2
Typical choices are T ( p , q ) = min { p , q } or p q , and S ( p , q ) = max { p , q } or p + q p q .
3
Exact values: 0.585506304 , 0.6513239104 , and 0.69196112 , respectively.

References

  1. Florentin Smarandache. Plithogenic set, an extension of crisp, fuzzy, intuitionistic fuzzy, and neutrosophic sets-revisited. Infinite study, 2018.
  2. Fazeelat Sultana, Muhammad Gulistan, Mumtaz Ali, Naveed Yaqoob, Muhammad Khan, Tabasam Rashid, and Tauseef Ahmed. A study of plithogenic graphs: applications in spreading coronavirus disease (covid-19) globally. Journal of ambient intelligence and humanized computing, 14(10):13139–13159, 2023. [CrossRef]
  3. Florentin Smarandache. Extension of HyperGraph to n-SuperHyperGraph and to Plithogenic n-SuperHyperGraph, and Extension of HyperAlgebra to n-ary (Classical-/Neutro-/Anti-) HyperAlgebra. Infinite Study, 2020.
  4. Michael Power. The risk management of everything. The Journal of Risk Finance, 5(3):58–65, 2004. [CrossRef]
  5. René M Stulz. Rethinking risk management. In Corporate risk management, pages 87–120. Columbia University Press, 2008.
  6. Jens Rasmussen. Risk management in a dynamic society: a modelling problem. Safety science, 27(2-3):183–213, 1997. [CrossRef]
  7. Stuart D Galup, Ronald Dattero, Jim J Quan, and Sue Conger. An overview of it service management. Communications of the ACM, 52(5):124–127, 2009. [CrossRef]
  8. Christian Grönroos. Service management and marketing, volume 27. Lexington books Lexington, MA, 1990.
  9. Jon Iden and Tom Roar Eikebrokk. Implementing it service management: A systematic literature review. International journal of information management, 33(3):512–523, 2013. [CrossRef]
  10. Antonios Paraskevas, Michael Madas, Florentin Smarandache, and Takaaki Fujita. Utility-based upside-down logic: A neutrosophic decision-making framework under uncertainty. Journal of Decisions and Operations Research, 2025.
  11. Takaaki Fujita and Florentin Smarandache. Introduction to upside-down logic: Its deep relation to neutrosophic logic and applications. Advancing Uncertain Combinatorics through Graphization, Hyperization, and Uncertainization: Fuzzy, Neutrosophic, Soft, Rough, and Beyond (Third Volume), 2024.
  12. Florentin Smarandache. Upside-Down Logics: Falsification of the Truth and Truthification of the False. Infinite Study, 2024.
  13. Lihua Gu and Ming Lei. A neutrosophic framework for nursing education quality analysis using upside-down logics and narrative factor. Neutrosophic Sets and Systems, 87:362–378, 2025.
  14. Qingde Li and Xiangheng Kong. A mathematical neutrosophic offset framework with upside down logics for quality evaluation of multi-sensor intelligent vehicle environment perception systems. Neutrosophic Sets and Systems, 87:1014–1023, 2025.
  15. Yantao Bu. An upside-down logic-based neutrosophic methodology: Assessment of online marketing effectiveness in e-commerce enterprises. Neutrosophic Sets and Systems, 85:801–813, 2025.
  16. Takaaki Fujita and Arif Mehmood. A study on the effectiveness of contradiction values in upside-down logic and de-plithogenication within plithogenic sets. Neutrosophic Computing and Machine Learning, 40(1):28–65, 2025.
  17. Richard Kaye. Models of Peano Arithmetic. Clarendon Press, Oxford, 1991.
  18. Lotfi A Zadeh. Fuzzy sets. Information and control, 8(3):338–353, 1965. [CrossRef]
  19. Talal Al-Hawary. Complete fuzzy graphs. International Journal of Mathematical Combinatorics, 4:26, 2011.
  20. Krassimir T Atanassov. Circular intuitionistic fuzzy sets. Journal of Intelligent & Fuzzy Systems, 39(5):5981–5986, 2020.
  21. Muhammad Akram, Bijan Davvaz, and Feng Feng. Intuitionistic fuzzy soft k-algebras. Mathematics in Computer Science, 7:353–365, 2013. [CrossRef]
  22. Vicenç Torra and Yasuo Narukawa. On hesitant fuzzy sets and decision. In 2009 IEEE international conference on fuzzy systems, pages 1378–1382. IEEE, 2009.
  23. Vicenç Torra. Hesitant fuzzy sets. International journal of intelligent systems, 25(6):529–539, 2010. [CrossRef]
  24. Yong Lin Liu, Hee Sik Kim, and J. Neggers. Hyperfuzzy subsets and subgroupoids. J. Intell. Fuzzy Syst., 33:1553–1562, 2017. [CrossRef]
  25. Z Nazari and B Mosapour. The entropy of hyperfuzzy sets. Journal of Dynamical Systems and Geometric Theories, 16(2):173–185, 2018. [CrossRef]
  26. Haibin Wang, Florentin Smarandache, Yanqing Zhang, and Rajshekhar Sunderraman. Single valued neutrosophic sets. Infinite study, 2010.
  27. Said Broumi, Mohamed Talea, Assia Bakali, and Florentin Smarandache. Single valued neutrosophic graphs. Journal of New theory, (10):86–101, 2016.
  28. Lotfi A Zadeh. Fuzzy logic, neural networks, and soft computing. In Fuzzy sets, fuzzy logic, and fuzzy systems: selected papers by Lotfi A Zadeh, pages 775–782. World Scientific, 1996.
  29. Florentin Smarandache. Plithogeny, plithogenic set, logic, probability, and statistics. arXiv preprint arXiv:1808.03948, 2018.
  30. S Sudha, Nivetha Martin, and Florentin Smarandache. Applications of Extended Plithogenic Sets in Plithogenic Sociogram. Infinite Study, 2023.
  31. Raúl González Salas, Jhael Mikaela Gómez Ashqui, and Marco Paúl Medina Valencia. Assessing viral susceptibility in tilapia species using plithogenic fuzzy soft set: a multi-expert approach for tilv. Neutrosophic Sets and Systems, 89:185–196, 2025.
  32. Nivetha Martin, Seyyed Ahmad Edalpathnath, Florentin Smarandache, et al. Extended plithogenic hypersoft sets in decision making on electric vehicle charging infrastructure. Journal of Fuzzy Extension and Applications, page e226517, 2025.
  33. Takaaki Fujita. Plithogenic fuzzy natural language and its upside-down logic: A framework for contradiction-aware reasoning. 2025.
  34. Farnad Nasirzadeh, Abbas Afshar, Mostafa Khanzadi, and Susan Howick. Integrating system dynamics and fuzzy logic modelling for construction risk management. Construction management and economics, 26(11):1197–1212, 2008. [CrossRef]
  35. P Zlateva, D Velev, and L Raeva. A fuzzy logic method for assessment of risk management capability. International Journal of Innovation, Management and Technology, 6(4):260, 2015. [CrossRef]
  36. Laszlo Pokoradi. Fuzzy logic-based risk assessment. 2002.
  37. Takaaki Fujita, Arif Mehmood, and Arkan A Ghaib. A reconsideration note of the mathematical frameworks for fuzzy and neutrosophic risk management. Management Science Advances, 2(1):223–238, 2025.
  38. Takaaki Fujita. A proposed mathematical framework for fuzzy it service management (F-ITSM) and neutrosophic it service management (N-ITSM). Neutrosophic Systems with Applications, 25(6), 2025. Article 2. [CrossRef]
  39. Rob Addy. Effective IT service management: to ITIL and beyond!, volume 29. Springer, 2007.
  40. BC Potgieter, JH Botha, and C Lew. Evidence that use of the itil framework is effective. In 18th Annual conference of the national advisory committee on computing qualifications, Tauranga, NZ. Citeseer, 2005.
  41. Norita Ahmad and Zulkifli M Shamsudin. Systematic approach to successful implementation of itil. Procedia computer science, 17:237–244, 2013. [CrossRef]
  42. Lohana Lema, José-Antonio Calvo-Manzano, Ricardo Colomo-Palacios, and Magdalena Arcilla. Itil in small to medium-sized enterprises software companies: towards an implementation sequence. Journal of software: evolution and process, 27(8):528–538, 2015. [CrossRef]
  43. Aileen Cater-Steel, Mark Toleman, and Wui-Gee Tan. Transforming it service management-the itil impact. In proceedings of the 17th Australasian Conference on Information Systems (ACIS 2006), 2006.
  44. Dave Armes, Niklas Engelhart, Peter McKenzie, and Peter Wiggers. SIAM: Principles and practices for service integration and management. Van Haren, 2015.
  45. Otso Virri. Service integration and management (siam) practices and four case studies of finnish companies. 2017.
  46. Takaaki Fujita. A proposed framework for fuzzy and neutrosophic extensions of service integration and management (siam) and itil-based models. Journal of Intelligent Decision Making and Granular Computing, 1(1):161–198, 2025.
  47. Reinhard Diestel. Graph theory. Springer (print edition); Reinhard Diestel (eBooks), 2024.
  48. Jonathan L Gross, Jay Yellen, and Mark Anderson. Graph theory and its applications. Chapman and Hall/CRC, 2018.
  49. Young Bae Jun, Kul Hur, and Kyoung Ja Lee. Hyperfuzzy subalgebras of bck/bci-algebras. Annals of Fuzzy Mathematics and Informatics, 2017.
  50. Jayanta Ghosh and Tapas Kumar Samanta. Hyperfuzzy sets and hyperfuzzy group. Int. J. Adv. Sci. Technol, 41:27–37, 2012.
  51. Takaaki Fujita. Advancing Uncertain Combinatorics through Graphization, Hyperization, and Uncertainization: Fuzzy, Neutrosophic, Soft, Rough, and Beyond. Biblio Publishing, 2025.
  52. Yue Gao, Zizhao Zhang, Haojie Lin, Xibin Zhao, Shaoyi Du, and Changqing Zou. Hypergraph learning: Methods and practices. IEEE Transactions on Pattern Analysis and Machine Intelligence, 44(5):2548–2566, 2020. [CrossRef]
  53. Alain Bretto. Hypergraph theory. An introduction. Mathematical Engineering. Cham: Springer, 1, 2013.
  54. Song Feng, Emily Heath, Brett Jefferson, Cliff Joslyn, Henry Kvinge, Hugh D Mitchell, Brenda Praggastis, Amie J Eisfeld, Amy C Sims, Larissa B Thackray, et al. Hypergraph models of biological networks to identify genes critical to pathogenic viral response. BMC bioinformatics, 22(1):287, 2021. [CrossRef]
  55. Salomón Marcos Berrocal Villegas, Willner Montalvo Fritas, Carmen Rosa Berrocal Villegas, María Yissel Flores Fuentes Rivera, Roberto Espejo Rivera, Laura Daysi Bautista Puma, and Dante Manuel Macazana Fernández. Using plithogenic n-superhypergraphs to assess the degree of relationship between information skills and digital competencies. Neutrosophic Sets and Systems, 84(1):41, 2025.
  56. Ehab Roshdy, Marwa Khashaba, and Mariam Emad Ahmed Ali. Neutrosophic super-hypergraph fusion for proactive cyberattack countermeasures: A soft computing framework. Neutrosophic Sets and Systems, 94:232–252, 2025.
  57. Eduardo Martín Campoverde Valencia, Jessica Paola Chuisaca Vásquez, and Francisco Ángel Becerra Lois. Multineutrosophic analysis of the relationship between survival and business growth in the manufacturing sector of azuay province, 2020–2023, using plithogenic n-superhypergraphs. Neutrosophic Sets and Systems, 84(1):28, 2025.
  58. José Luis Agreda Oña, Andrés Sebastián Moreno Ávila, and Matius Rodolfo Mendoza Poma. Study of sound pressure levels through the creation of noise maps in the urban area of latacunga city using plithogenic n-superhypergraphs. Neutrosophic Sets and Systems, 74:119–127, 2024.
Table 1. Selected contradiction degrees p C F ( a , b ) among facets.
Table 1. Selected contradiction degrees p C F ( a , b ) among facets.
p C F ( a , b ) Q U R Sec Sus
Q 0 0.30 0.20 0.10 0.20
U 0 0.70 0.80 0.50
R 0 0.20 0.30
Sec 0 0.20
Sus 0
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
Copyright: This open access article is published under a Creative Commons CC BY 4.0 license, which permit the free download, distribution, and reuse, provided that the author and preprint are cited in any reuse.
Prerpints.org logo

Preprints.org is a free preprint server supported by MDPI in Basel, Switzerland.

Subscribe

Disclaimer

Terms of Use

Privacy Policy

Privacy Settings

© 2025 MDPI (Basel, Switzerland) unless otherwise stated