Preprint
Article

This version is not peer-reviewed.

Single, Double, Triple, Quadruple, Quintuple-valued IndetermSoft Set

Submitted:

30 September 2025

Posted:

01 October 2025

You are already at the latest version

Abstract
Soft sets are parameterized families of subsets of a universe, where each parameter selects elements relevant under a condition. This paper develops IndetermSoft sets, a class designed to treat indeterminacy explicitly through structured value slices. We define five variants: (i) Single-valued, mapping each attribute value to one subset capturing undirected indeterminacy; (ii) Double-valued, splitting into truth-leaning and falsity-leaning slices; (iii) Triple-valued, adding a neutral slice; (iv) Quadruple-valued, refining polarity by distinguishing strong and ordinary truth/falsity leanings; and (v) Quintuple-valued, further introducing a central neutral band between the two strengths. These constructions yield a uniform framework for modeling ambiguous evidence, conflicts, and missing context.
Keywords: 
;  ;  ;  ;  ;  

1. Preliminaries

We collect the basic terminology and notation used in what follows. The definitions in this paper are assumed to be finite.

1.1. Soft Set and IndetermSoft Set

The definitions of the Soft Set and the IndetermSoft Set are provided below. Soft Set is a parameterized family of subsets where each parameter selects relevant elements from a universe for decision modeling [1,2,3].
Definition 1
(Soft Set). [1] Let U be a universal set and E a set of parameters. A soft set over U is defined as an ordered pair ( F , E ) , where F is a mapping from E to the power set P ( U ) :
F : E P ( U ) .
For each parameter e E , F ( e ) U represents the set of e-approximate elements in U, with ( F , E ) forming a parameterized family of subsets of U.
Example 1
(Soft Set — Apartment Search by Parameters). A renter filters apartments using simple binary conditions. Let the universe be the set of available listings
U = { u 1 , u 2 , u 3 , u 4 , u 5 , u 6 , u 7 , u 8 } .
Let the parameter set be
E = { near _ subway , pet _ friendly , balcony , under $ 1500 , new _ build } .
Define a soft set ( F , E ) with F : E P ( U ) :
F ( near _ subway ) = { u 1 , u 2 , u 5 , u 6 , u 8 } , F ( pet _ friendly ) = { u 2 , u 3 , u 6 , u 7 } , F ( balcony ) = { u 1 , u 3 , u 4 , u 6 } , F ( under $ 1500 ) = { u 2 , u 4 , u 5 , u 7 } , F ( new _ build ) = { u 1 , u 5 , u 8 } .
Each F ( e ) U collects listings relevant under parameter e.
Concrete queries with explicit computations.
( i ) near _ subway & under $ 1500 : F ( near _ subway ) F ( under $ 1500 ) = { u 1 , u 2 , u 5 , u 6 , u 8 } { u 2 , u 4 , u 5 , u 7 } = { u 2 , u 5 } , | · | = 2 . ( ii ) pet _ friendly or balcony : F ( pet _ friendly ) F ( balcony ) = { u 2 , u 3 , u 6 , u 7 } { u 1 , u 3 , u 4 , u 6 } = { u 1 , u 2 , u 3 , u 4 , u 6 , u 7 } , | · | = 6 . ( iii ) new _ build & balcony : F ( new _ build ) F ( balcony ) = { u 1 , u 5 , u 8 } { u 1 , u 3 , u 4 , u 6 } = { u 1 } , | · | = 1 .
These set-theoretic combinations show how a soft set supports multi-constraint filtering with exact results.
Single-valued IndetermSoft Set maps each attribute value to one subset capturing undirected, non-unique indeterminacy over H; domain/codomain may be indeterminate [4,5,6,7,8].
Definition 2 ((Single-valued) IndetermSoft set)). [9,10,11,12] Let U be a universe of discourse, H U a non-empty subset, and P ( H ) the powerset of H. Let A be the set of attribute values for an attribute a. A function F : A P ( H ) is called an IndetermSoft Set if at least one of the following conditions holds:
  • A has some indeterminacy.
  • P ( H ) has some indeterminacy.
  • There exists at least one v A such that F ( v ) is indeterminate (unclear, uncertain, or not unique).
  • Any two or all three of the above conditions.
An IndetermSoft Set is represented mathematically as:
F : A H ( , , , ¬ ) ,
where H ( , , , ¬ ) represents a structure closed under the IndetermSoft operators.
Example 2 ((Single-valued) IndetermSoft Set — Identity Verification Queue). Context. A hiring team triages applicants whose identity documents have quality issues. Let the review subset be
H = { a 1 , a 2 , a 3 , a 4 , a 5 , a 6 , a 7 } U ,
and let the attribute be “document condition” with values
A = { low _ light _ photo , partial _ scan , metadata _ mismatch } .
We define a single-valued IndetermSoft mapping F : A P ( H ) , where F ( v ) collects cases with undirected indeterminacy under v (neither truth- nor falsity-leaning).
Determinately specified slices.
F ( low _ light _ photo ) = { a 1 , a 3 , a 6 } , | F | = 3 , F ( partial _ scan ) = { a 2 , a 4 } , | F | = 2 .
Indeterminate slice (explicit non-uniqueness).  For v = metadata _ mismatch , conflicting HR and ATS logs produce two admissible subsets:
S 1 = { a 5 } ( only the strict mismatch ) , S 2 = { a 5 , a 7 } ( strict + borderline timestamp drift ) .
Hence F ( v ) is not uniquely determined:
F ( metadata _ mismatch ) S 1 , S 2 = { a 5 } , { a 5 , a 7 } .
This satisfies condition (3) of the IndetermSoft definition (indeterminate image).
Let the determinate union be
L : = F ( low _ light _ photo ) F ( partial _ scan ) = { a 1 , a 2 , a 3 , a 4 , a 6 } .
Including the indeterminate value yields an upper bound
U : = L F ( metadata _ mismatch ) L S 1 , L S 2 = { a 1 , a 2 , a 3 , a 4 , a 5 , a 6 } , { a 1 , a 2 , a 3 , a 4 , a 5 , a 6 , a 7 } .
Therefore the review queue size is bounded as
| L | = 5 | U | { 6 , 7 } .
This concrete non-uniqueness of F ( v ) exemplifies a (single-valued) IndetermSoft set: one subset per value, with explicit indeterminacy captured by alternative admissible images.

1.2. Double-Valued Neutrosophic Set

Neutrosophic Set assigns to each element independent degrees of truth, indeterminacy, and falsity, enabling nuanced uncertainty modeling beyond fuzzy sets [13,14,15]. Double-Valued Neutrosophic Set records truth, truth-leaning indeterminacy, falsity-leaning indeterminacy, and falsity degrees for each element, capturing polarized ambiguous evidence effectively[16,17,18]. We consider Double-Valued Neutrosophic Logic, as outlined below (cf. [16,18,19]). Related concepts, such as the Multi-Valued Neutrosophic Set [20,21], are also well known.
Definition 3
(Double-Valued Neutrosophic Set). [16] Let X be a space of points (or objects) where each x X represents an element. A Double-Valued Neutrosophic Set (DVNS) A is characterized by:
A = { ( x , T A ( x ) , I T ( x ) , I F ( x ) , F A ( x ) ) : x X } ,
where:
  • T A ( x ) [ 0 , 1 ] is the truth membership value,
  • I T ( x ) [ 0 , 1 ] is the indeterminacy leaning towards truth,
  • I F ( x ) [ 0 , 1 ] is the indeterminacy leaning towards falsity,
  • F A ( x ) [ 0 , 1 ] is the falsity membership value.
These values satisfy the condition:
0 T A ( x ) + I T ( x ) + I F ( x ) + F A ( x ) 4 .
Example 3
(Double-Valued Neutrosophic Set — Phishing Email Screening). Universe and target. Let X be the set of incoming emails and let A [ 0 , 1 ] 4 encode a DVNS for the concept LegitimateMail. For each email x X we assign
T A ( x ) , I T ( x ) , I F ( x ) , F A ( x ) ,
where T A is truth (legitimate), F A is falsity (phishing), I T leans toward legitimacy, and I F leans toward phishing.
Signals.  We aggregate authentication (SPF/DKIM/DMARC), sender reputation, URL/attachment analysis, and writing-style features. Ambiguous signals (e.g., one pass and one fail) contribute to I T or I F ; consistent evidence contributes to T A or F A .
Concrete assignments (three emails).
email T A I T I F F A e 1 0.72 0.14 0.06 0.08 e 2 0.38 0.20 0.22 0.20 e 3 0.10 0.08 0.27 0.55
Justification. e 1 : known domain, DMARC pass ⇒ large T A ; single shortened URL ⇒ small I F . e 2 : mixed signals (fresh domain, but no payload) ⇒ comparable I T and I F . e 3 : macro-enabled attachment and domain spoof patterns ⇒ large F A .
Numerical verification.  Row sums:
e 1 : 0.72 + 0.14 + 0.06 + 0.08 = 1.00 4 , e 2 : 0.38 + 0.20 + 0.22 + 0.20 = 1.00 4 , e 3 : 0.10 + 0.08 + 0.27 + 0.55 = 1.00 4 .
Thus each quadruple satisfies the DVNS constraint 0 T A + I T + I F + F A 4 .

1.3. Triple-Valued Neutrosophic Set (TVNS)

A Triple-Valued Neutrosophic Set assigns each element degrees for truth, truth-leaning indeterminacy, neutral indeterminacy, falsity-leaning indeterminacy, and falsity, within limits. In this subsection, we examine the concept of the Triple-Valued Neutrosophic Set (TVNS) [22,23,24].
Definition 4 (Triple-Valued Neutrosophic Set (TVNS)). [24] A Triple-Valued Neutrosophic Set A on X is defined as
A = x , T A ( x ) , I T ( x ) , I N ( x ) , I F ( x ) , F A ( x ) : x X ,
where
  • T A ( x ) [ 0 , 1 ] is the truth membership degree,
  • I T ( x ) [ 0 , 1 ] is the indeterminacy leaning towards truth,
  • I N ( x ) [ 0 , 1 ] is the neutral indeterminacy (i.e., completely indeterminate, neither leaning towards truth nor falsity),
  • I F ( x ) [ 0 , 1 ] is the indeterminacy leaning towards falsity,
  • F A ( x ) [ 0 , 1 ] is the falsity membership degree.
For each x X , we have
0 T A ( x ) + I T ( x ) + I N ( x ) + I F ( x ) + F A ( x ) 5 .
Example 4
(Triple-Valued Neutrosophic Set — Loan Approval Under Missing Evidence). Universe and target. Let X be the set of loan applications and consider the TVNS for the concept Creditworthy. For each applicant x X we assign
T A ( x ) , I T ( x ) , I N ( x ) , I F ( x ) , F A ( x ) ,
where I N is neutral indeterminacy due to missing or non-informative evidence.
Evidence channels.  Credit score and repayment history (push T A ), soft positives such as stable address (push I T ), missing employer verification or frozen bureau file (push I N ), soft negatives like recent inquiries (push I F ), and hard negatives such as charge-offs (push F A ).
Concrete assignments (three applicants).
applicant T A I T I N I F F A a 1 0.55 0.15 0.10 0.08 0.12 a 2 0.32 0.18 0.30 0.10 0.10 a 3 0.12 0.08 0.20 0.25 0.35
Justification. a 1 : strong score and verified income ⇒ larger T A ; a minor document issue ⇒ small I N . a 2 : acceptable score but employer response pending ⇒ elevated I N ; mixed soft signals split between I T and I F . a 3 : prior delinquency and high utilization ⇒ large F A ; some uncollected data adds to I N .
Numerical verification.  Row sums:
a 1 : 0.55 + 0.15 + 0.10 + 0.08 + 0.12 = 1.00 5 , a 2 : 0.32 + 0.18 + 0.30 + 0.10 + 0.10 = 1.00 5 , a 3 : 0.12 + 0.08 + 0.20 + 0.25 + 0.35 = 1.00 5 .
Hence each quintuple satisfies the TVNS constraint 0 T A + I T + I N + I F + F A 5 .

1.4. Quadruple-Valued Neutrosophic Set (QVNS)

A Quadruple-Valued Neutrosophic Set assigns each element truth, strongly truth-leaning indeterminacy, truth-leaning indeterminacy, falsity-leaning indeterminacy, strongly falsity-leaning indeterminacy, and falsity. The definition of the Quadruple-Valued Neutrosophic Set (QnVNS) is provided below [24,25].
Definition 5 (Quadruple-Valued Neutrosophic Set (QVNS)). [24] Let X be a universe of discourse. A Quadruple-Valued Neutrosophic Set A on X is defined as
A = x , T A ( x ) , I T s ( x ) , I T ( x ) , I F ( x ) , I F s ( x ) , F A ( x ) : x X ,
where:
  • T A ( x ) [ 0 , 1 ] is the truth membership degree,
  • I T s ( x ) [ 0 , 1 ] is the indeterminacy strongly leaning towards truth,
  • I T ( x ) [ 0 , 1 ] is the indeterminacy leaning towards truth,
  • I F ( x ) [ 0 , 1 ] is the indeterminacy leaning towards falsity,
  • I F s ( x ) [ 0 , 1 ] is the indeterminacy strongly leaning towards falsity,
  • F A ( x ) [ 0 , 1 ] is the falsity membership degree.
For each x X , it holds that
0 T A ( x ) + I T s ( x ) + I T ( x ) + I F ( x ) + I F s ( x ) + F A ( x ) 6 .
Example 5
(Quadruple-Valued Neutrosophic Set — E-commerce Product Authenticity). Universe and target. Let X be items listed on a marketplace. Consider the QVNS for the concept AuthenticItem . For each item x X we assign
T A ( x ) , I T s ( x ) , I T ( x ) , I F ( x ) , I F s ( x ) , F A ( x ) ,
where T A / F A are truth/falsity memberships (authentic vs. counterfeit), and I T s , I T , I F , I F s are indeterminacy slices (strong/ordinary truth- or falsity-leaning).
Evidence channels.  Manufacturer serial check (pushes I T s or T A when strongly positive), invoice validation (pushes I T ), packaging/label anomalies (push I F ), known counterfeit patterns (push I F s ), and third-party lab confirmation (boosts T A or F A ).
Concrete assignments (three items).
item T A I T s I T I F I F s F A i 1 0.60 0.15 0.10 0.05 0.03 0.07 i 2 0.30 0.05 0.20 0.25 0.10 0.10 i 3 0.08 0.02 0.10 0.25 0.35 0.20
Justification. i 1 : serial verified and lab spot-check ⇒ large T A , some I T s ; a minor label scuff ⇒ small I F . i 2 : mixed invoice and seller history ⇒ comparable I T and I F ; moderate T A . i 3 : hallmark counterfeit indicators ⇒ large I F s and F A .
Numerical verification.  For each row,
i 1 : 0.60 + 0.15 + 0.10 + 0.05 + 0.03 + 0.07 = 1.00 6 , i 2 : 0.30 + 0.05 + 0.20 + 0.25 + 0.10 + 0.10 = 1.00 6 , i 3 : 0.08 + 0.02 + 0.10 + 0.25 + 0.35 + 0.20 = 1.00 6 .
Thus each sextuple satisfies 0 T A + I T s + I T + I F + I F s + F A 6 .

1.5. Quintuple-Valued Neutrosophic Set (QnVNS)

A Quintuple-Valued Neutrosophic Set assigns each element truth; strong truth-leaning, truth-leaning, neutral, falsity-leaning, strong falsity-leaning indeterminacies; and falsity, with bounds. The definition of the Quintuple-Valued Neutrosophic Set (QnVNS) is provided below. [24]
Definition 6 (Quintuple-Valued Neutrosophic Set (QnVNS)). [24] Let X be a universe of discourse. A Quintuple-Valued Neutrosophic Set A on X is defined as
A = x , T A ( x ) , I T s ( x ) , I T ( x ) , I N ( x ) , I F ( x ) , I F s ( x ) , F A ( x ) : x X ,
where:
  • T A ( x ) [ 0 , 1 ] is the truth membership degree,
  • I T s ( x ) [ 0 , 1 ] is the indeterminacy strongly leaning towards truth,
  • I T ( x ) [ 0 , 1 ] is the indeterminacy leaning towards truth,
  • I N ( x ) [ 0 , 1 ] represents neutral indeterminacy(i.e., completely indeterminate, neither leaning towards truth nor falsity),
  • I F ( x ) [ 0 , 1 ] is the indeterminacy leaning towards falsity,
  • I F s ( x ) [ 0 , 1 ] is the indeterminacy strongly leaning towards falsity,
  • F A ( x ) [ 0 , 1 ] is the falsity membership degree.
For each x X , it holds that
0 T A ( x ) + I T s ( x ) + I T ( x ) + I N ( x ) + I F ( x ) + I F s ( x ) + F A ( x ) 7 .
Example 6
(Quintuple-Valued Neutrosophic Set — Product Recall Impact Assessment). Universe and target. Let X be purchased product units. Consider the QnVNS for the concept AffectedByRecall. For each unit x X we assign
T A ( x ) , I T s ( x ) , I T ( x ) , I N ( x ) , I F ( x ) , I F s ( x ) , F A ( x ) ,
where I N is neutral indeterminacy (e.g., missing batch code).
Evidence channels.  Lot/batch match (push I T s / T A ), weak cues such as packaging date proximity (push I T ), missing or unreadable label (push I N ), retailer confirmation of safe lot (push I F ), and manufacturer certificate of unaffected series (push I F s / F A ).
Concrete assignments (three units).
unit T A I T s I T I N I F I F s F A b 1 0.55 0.20 0.10 0.05 0.05 0.02 0.03 b 2 0.20 0.05 0.15 0.30 0.15 0.05 0.10 b 3 0.08 0.02 0.10 0.10 0.20 0.25 0.25
Justification. b 1 : exact lot match and vendor alert ⇒ large T A and I T s . b 2 : label unreadable ⇒ elevated I N ; weak context on both sides. b 3 : certificate proves different series ⇒ higher I F s and F A .
Numerical verification.  For each row,
b 1 : 0.55 + 0.20 + 0.10 + 0.05 + 0.05 + 0.02 + 0.03 = 1.00 7 , b 2 : 0.20 + 0.05 + 0.15 + 0.30 + 0.15 + 0.05 + 0.10 = 1.00 7 , b 3 : 0.08 + 0.02 + 0.10 + 0.10 + 0.20 + 0.25 + 0.25 = 1.00 7 .
Hence each septuple satisfies 0 T A + I T s + I T + I N + I F + I F s + F A 7 .

1.6. Double-Valued Indetermsoft Set

Double-valued Indetermsoft Set maps each attribute value to two subsets: truth-leaning indeterminacy and falsity-leaning indeterminacy within a universe, allowing overlaps. The definition of the Double-valued Indetermsoft Set is provided below. [24]
Definition 7
(Double-valued Indetermsoft Set). [24] Let U be a universe of discourse, H U a non-empty subset, and P ( H ) the power set of H. Let A be a set of attribute values associated with a specific attribute a. A function
F : A P ( H ) × P ( H )
is called a Double-valued Indetermsoft Set if any of the following conditions hold:
  • The set A exhibits some degree of indeterminacy.
  • The power set P ( H ) exhibits some level of indeterminacy.
  • There exists at least one attribute value v A such that the ordered pair
    F ( v ) = F T ( v ) , F F ( v )
    is indeterminate, in the sense that either F T ( v ) or F F ( v ) (or both) is unclear, uncertain, or not uniquely defined.
  • Any combination of the above conditions holds.
Here, for each v A ,
  • F T ( v ) H represents the indeterminacy leaning towards truth associated with v, and
  • F F ( v ) H represents the indeterminacy leaning towards falsity associated with v.
Example 7
(Double-valued Indetermsoft Set — Warranty Claims Triage). Let the universe H be a finite set of consumer-electronics warranty claims
H = { c 1 , c 2 , c 3 , c 4 , c 5 , c 6 , c 7 } .
Fix an attribute “document reliability,” with attribute values
A = { blurred _ receipt , third _ party _ repair , serial _ OCR _ error } .
Define a Double-valued Indetermsoft Set F : A P ( H ) × P ( H ) by
F ( blurred _ receipt ) = F T , F F = { c 1 , c 2 , c 5 } , { c 3 } , F ( third _ party _ repair ) = { c 5 } , { c 4 , c 6 } , F ( serial _ OCR _ error ) = { c 2 , c 6 } , { c 7 } .
Interpretation.
  • F T ( v ) (truth-leaning indeterminacy): claims whose evidence likely supports validity under v, but is still indeterminate (e.g., other documents corroborate a blurred receipt).
  • F F ( v ) (falsity-leaning indeterminacy): claims whose evidence likely undermines validity under v (e.g., non-authorized third-party repair), yet not conclusively.
Concrete checks (cardinalities and overlaps across different v):
| F T ( blurred _ receipt ) | = 3 , | F F ( blurred _ receipt ) | = 1 , F T F F = 4 , | F T ( third _ party _ repair ) | = 1 , | F F ( third _ party _ repair ) | = 2 , F T F F = 3 , | F T ( serial _ OCR _ error ) | = 2 , | F F ( serial _ OCR _ error ) | = 1 , F T F F = 3 .
Cross-attribute tension is visible: for instance, c 6 F F ( third _ party _ repair ) but c 6 F T ( serial _ OCR _ error ) , capturing conflicting indeterminate signals that motivate a second-stage manual review.

2. Main Results

In this section, we present the main contributions of this paper, focusing on the concepts of ContraSoft Set and ContraRough Set.

2.1. Triple-Valued Indetermsoft Set

Triple-valued Indetermsoft Set maps each attribute value to three subsets: truth-leaning, neutral, and falsity-leaning indeterminacy over a universe, allowing overlaps.
Definition 8 (Triple-valued Indetermsoft Set (TV-ISS)). Let U be a universe, H U nonempty, and A a set of attribute values. A TV-ISS is a mapping
G : A P ( H ) 3 , G ( v ) = G T ( v ) , G N ( v ) , G F ( v ) ,
with the following intended semantics for each v A :
  • G T ( v ) H : indeterminacy leaning to truth,
  • G N ( v ) H : neutral indeterminacy (neither leaning to truth nor to falsity),
  • G F ( v ) H : indeterminacy leaning to falsity.
No exclusivity is imposed a priori; intersections are allowed if the application dictates. When needed, one may assume G T ( v ) , G N ( v ) , G F ( v ) are pairwise disjoint to model a partition of the indeterminate region.
Example 8
(Concrete TV-ISS, its projection, and the embedding). Let the finite universe and attribute-values be
H = { h 1 , h 2 , h 3 , h 4 } , A = { easy , hard } .
Define a TV-ISS G : A P ( H ) 3 by
G ( easy ) = { h 1 , h 2 } , { h 3 } , { h 4 } , G ( hard ) = { h 1 } , { h 2 , h 3 } , { h 4 } .
Cardinalities are
| G T ( easy ) | = 2 , | G N ( easy ) | = 1 , | G F ( easy ) | = 1 , | G T ( hard ) | = 1 , | G N ( hard ) | = 2 , | G F ( hard ) | = 1 .
The canonical DV-ISS projection Π ( G ) and upper envelope Π ¯ ( G ) are
Π ( G ) ( easy ) = { h 1 , h 2 } , { h 4 } , Π ¯ ( G ) ( easy ) = { h 1 , h 2 , h 3 } , { h 3 , h 4 } , Π ( G ) ( hard ) = { h 1 } , { h 4 } , Π ¯ ( G ) ( hard ) = { h 1 , h 2 , h 3 } , { h 2 , h 3 , h 4 } ,
and one checks the coordinatewise inclusions
Π ( G ) Π ¯ ( G ) ,
since, for instance, { h 1 , h 2 } { h 1 , h 2 , h 3 } and { h 4 } { h 3 , h 4 } at v = easy .
Now apply the DV→TV embedding ι to the DV-ISS F : = Π ( G ) :
ι ( F ) ( easy ) = { h 1 , h 2 } , , { h 4 } , ι ( F ) ( hard ) = { h 1 } , , { h 4 } .
By construction,
( Π ι ) ( F ) = F
holds pointwise and componentwise, e.g.,
( Π ι ) ( F ) ( easy ) = Π { h 1 , h 2 } , , { h 4 } = { h 1 , h 2 } , { h 4 } = F ( easy ) .
This verifies, with explicit sets and equalities, the identity Π ι = id from Theorem 1.
Example 9
(Triple-valued Indetermsoft Set — Hiring Degree Verification). Let the universe H be a finite set of applicants
H = { a 1 , a 2 , a 3 , a 4 , a 5 , a 6 } .
Consider the attribute “credential verification,” with attribute values
A = { degree _ email _ unreplied , transcript _ low _ quality } .
Define a Triple-valued Indetermsoft Set G : A P ( H ) 3 by
G ( degree _ email _ unreplied ) = G T , G N , G F = { a 1 , a 3 } , { a 2 , a 5 } , { a 6 } , G ( transcript _ low _ quality ) = { a 3 , a 4 } , { a 5 } , { a 2 } .
Semantics for each v A :
  • G T ( v ) : truth-leaning indeterminacy (signals suggest the claim is likely true but not definitive yet; e.g., alumni registry hints).
  • G N ( v ) : neutral indeterminacy (insufficient information; e.g., awaiting registrar reply).
  • G F ( v ) : falsity-leaning indeterminacy (signals suggest likely false; e.g., domain mismatch, inconsistent graduation dates).
Concrete verifications (sizes and disjointness here by design):
| G T ( degree _ email _ unreplied ) | = 2 , | G N | = 2 , | G F | = 1 , G T G N G F = 5 , | G T ( transcript _ low _ quality ) | = 2 , | G N | = 1 , | G F | = 1 , G T G N G F = 4 .
If one wishes to compare with a Double-valued view, the canonical projection that discards the neutral slice is
F ( v ) : = G T ( v ) , G F ( v ) ,
so, for example, F ( degree _ email _ unreplied ) = ( { a 1 , a 3 } , { a 6 } ) , which is ready for two-queue downstream handling (provisional accept vs. provisional reject) while cases in G N await additional evidence.
Theorem 1
(TV-ISS generalizes DV-ISS). There exist mappings
ι : ISS 2 ( A , H ) ISS 3 ( A , H ) , Π : ISS 3 ( A , H ) ISS 2 ( A , H )
defined pointwise by
ι ( F ) ( v ) : = F T ( v ) , , F F ( v ) , Π ( G ) ( v ) : = G T ( v ) , G F ( v ) ,
such that
Π ι = id ISS 2 ( A , H ) .
Consequently, ISS 2 ( A , H ) is isomorphic to the sub-class
ISS 3 ( 0 ) ( A , H ) : = G ISS 3 ( A , H ) : G N ( v ) = for all v A ISS 3 ( A , H ) ,
and every DV-ISS is a special case of a TV-ISS (obtained by taking all neutral slices empty).
Proof. 
Fix F ISS 2 ( A , H ) . By definition,
F : A P ( H ) × P ( H ) , v F T ( v ) , F F ( v ) .
Define ι ( F ) : A P ( H ) 3 by ι ( F ) ( v ) = F T ( v ) , , F F ( v ) . This lies in ISS 3 ( A , H ) since P ( H ) .
Next, for G ISS 3 ( A , H ) with G ( v ) = ( G T ( v ) , G N ( v ) , G F ( v ) ) , define Π ( G ) ( v ) = ( G T ( v ) , G F ( v ) ) . Then Π ( G ) ISS 2 ( A , H ) .
We compute the composition explicitly, for each v A :
( Π ι ) ( F ) ( v ) = Π ι ( F ) ( v ) = Π F T ( v ) , , F F ( v ) = F T ( v ) , F F ( v ) = F ( v ) .
Hence Π ι = id ISS 2 ( A , H ) .
Injectivity of ι : if ι ( F ) = ι ( F ) , then for every v,
F T ( v ) , , F F ( v ) = F T ( v ) , , F F ( v ) ,
whence F T ( v ) = F T ( v ) and F F ( v ) = F F ( v ) , so F = F .
Moreover, the image of ι is precisely ISS 3 ( 0 ) ( A , H ) . Indeed, for any G ISS 3 ( 0 ) ( A , H ) one has G N ( v ) = for all v, and setting F ( v ) = ( G T ( v ) , G F ( v ) ) yields G = ι ( F ) .
Therefore DV-ISS is canonically identified with the neutral-empty sub-class of TV-ISS, so TV-ISS strictly generalizes DV-ISS. □

2.2. Quadruple-Valued Indetermsoft Set

Quadruple-valued Indetermsoft Set assigns four indeterminacy slices per attribute value, mirroring Quadruple-valued Neutrosophic:
( strong truth - leaning ) , truth - leaning , falsity - leaning , strong falsity - leaning .
Definition 9 (Quadruple-valued Indetermsoft Set (QV-ISS)). Let U be a universe, H U nonempty, and A a set of attribute values. A QV-ISS is a mapping
Q : A P ( H ) 4 , Q ( v ) = Q T s ( v ) , Q T ( v ) , Q F ( v ) , Q F s ( v ) ,
where, for each v A :
  • Q T s ( v ) H :  strong truth-leaning indeterminacy  (very strong evidence toward truth, yet not fully resolved),
  • Q T ( v ) H :  truth-leaning indeterminacy  (moderate evidence toward truth, still inconclusive),
  • Q F ( v ) H :  falsity-leaning indeterminacy  (moderate evidence toward falsity, still inconclusive),
  • Q F s ( v ) H :  strong falsity-leaning indeterminacy  (very strong evidence toward falsity, yet not fully resolved).
Theorem 2
(QV-ISS generalizes TV-ISS). Define maps
ι : ( P ( H ) 3 ) A ( P ( H ) 4 ) A , ι ( G ) ( v ) : = , G T ( v ) G N ( v ) , G F ( v ) G N ( v ) , ,
and
Π : ( P ( H ) 4 ) A ( P ( H ) 3 ) A , Π ( Q ) ( v ) : = T ( v ) , N ( v ) , F ( v ) ,
where, writing S T ( v ) : = Q T s ( v ) Q T ( v ) and S F ( v ) : = Q F s ( v ) Q F ( v ) ,
T ( v ) : = S T ( v ) S F ( v ) , N ( v ) : = S T ( v ) S F ( v ) , F ( v ) : = S F ( v ) S T ( v ) .
Then for every TV-ISS G in partition form, one has
( Π ι ) ( G ) = G .
Consequently, TV-ISS embeds injectively into QV-ISS; hence QV-ISS (canonically) generalizes TV-ISS.
Proof. 
Fix G and v A . By definition of ι ,
Q T s = , Q T = G T G N , Q F = G F G N , Q F s = .
Hence
S T = Q T s Q T = G T G N , S F = Q F s Q F = G F G N .
Using the pairwise disjointness G T G N = G N G F = G T G F = , we compute:
T = S T S F = ( G T G N ) ( G F G N ) = G T ( G F G N ) ( G N ( G F G N ) ) = = G T , N = S T S F = ( G T G N ) ( G F G N ) = ( G T G F ) = ( G T G N ) = ( G N G F ) = G N = G N , F = S F S T = ( G F G N ) ( G T G N ) = G F ( G T G N ) ( G N ( G T G N ) ) = = G F .
Therefore ( Π ι ) ( G ) ( v ) = ( G T ( v ) , G N ( v ) , G F ( v ) ) = G ( v ) for every v A , i.e., ( Π ι ) ( G ) = G . Since Π ι = id on TV-ISS, ι is injective, providing an embedding of TV-ISS into QV-ISS. □

2.3. Quintuple-Valued Indetermsoft Set

Quintuple-valued Indetermsoft Set assigns five indeterminacy slices per value, mirroring Quintuple-valued Neutrosophic:
( strong truth - leaning ) , truth - leaning , neutral , falsity - leaning , ( strong falsity - leaning ) .
Definition 10 (Quintuple-valued Indetermsoft Set (5V-ISS)). A 5V-ISS is a mapping
R : A P ( H ) 5 , R ( v ) = R T s ( v ) , R T ( v ) , R N ( v ) , R F ( v ) , R F s ( v ) ,
with semantics, for each v A :
  • R T s ( v ) H :  strong truth-leaning indeterminacy,
  • R T ( v ) H :  truth-leaning indeterminacy,
  • R N ( v ) H :  neutral indeterminacy  (neither leaning toward truth nor falsity),
  • R F ( v ) H :  falsity-leaning indeterminacy,
  • R F s ( v ) H strong falsity-leaning indeterminacy.
Theorem 3
(5V-ISS generalizes QV-ISS). Define the maps
ι : ISS 4 ( A , H ) ISS 5 ( A , H ) , ι ( Q ) ( v ) : = Q T s ( v ) , Q T ( v ) , , Q F ( v ) , Q F s ( v ) ,
Π : ISS 5 ( A , H ) ISS 4 ( A , H ) , Π ( R ) ( v ) : = R T s ( v ) , R T ( v ) , R F ( v ) , R F s ( v ) .
Then
Π ι = id ISS 4 ( A , H ) .
Consequently, ISS 4 ( A , H ) is canonically isomorphic to the subclass
ISS 5 ( 0 ) ( A , H ) : = R ISS 5 ( A , H ) : R N ( v ) = for all v A ISS 5 ( A , H ) ,
hence 5V-ISS strictly extends QV-ISS whenever some R N ( v ) .
Proof. 
Let Q ISS 4 ( A , H ) and v A . By definition of ι and Π ,
( Π ι ) ( Q ) ( v ) = Π Q T s ( v ) , Q T ( v ) , , Q F ( v ) , Q F s ( v ) = Q T s ( v ) , Q T ( v ) , Q F ( v ) , Q F s ( v ) = Q ( v ) .
Thus Π ι = id pointwise and componentwise. Injectivity of ι : if ι ( Q ) = ι ( Q ) , then for every v
( Q T s , Q T , , Q F , Q F s ) = ( Q T s , Q T , , Q F , Q F s ) ,
which forces Q = Q . The image of ι is exactly ISS 5 ( 0 ) ( A , H ) because R ISS 5 ( A , H ) belongs to ISS 5 ( 0 ) ( A , H ) iff R N , in which case R = ι ( Q ) with Q ( v ) = ( R T s ( v ) , R T ( v ) , R F ( v ) , R F s ( v ) ) . To see the extension is strict, fix any h H and v A and define R ISS 5 ( A , H ) by R N ( v ) = { h } and the remaining coordinates as in ι ( Q ) for some Q; then R ISS 5 ( 0 ) ( A , H ) , so R is not in the image of ι . □
Example 10
(Concrete embedding and equality check with counts). Let
H = { h 1 , h 2 , h 3 , h 4 , h 5 } , A = { easy , hard } .
Define a QV-ISS Q ISS 4 ( A , H ) by
Q ( easy ) = { h 1 } , { h 2 } , { h 4 } , { h 5 } , Q ( hard ) = { h 1 , h 3 } , { h 2 } , { h 4 } , { h 5 } .
Cardinalities:
| Q T s ( easy ) | = 1 , | Q T ( easy ) | = 1 , | Q F ( easy ) | = 1 , | Q F s ( easy ) | = 1 ; | Q T s ( hard ) | = 2 , | Q T ( hard ) | = 1 , | Q F ( hard ) | = 1 , | Q F s ( hard ) | = 1 .
Embed via ι to obtain a 5V-ISS R : = ι ( Q ) :
R ( easy ) = { h 1 } , { h 2 } , , { h 4 } , { h 5 } , R ( hard ) = { h 1 , h 3 } , { h 2 } , , { h 4 } , { h 5 } .
Project back:
Π ( R ) ( easy ) = { h 1 } , { h 2 } , { h 4 } , { h 5 } = Q ( easy ) , Π ( R ) ( hard ) = { h 1 , h 3 } , { h 2 } , { h 4 } , { h 5 } = Q ( hard ) .
Hence ( Π ι ) ( Q ) = Q withliteralset equality in all coordinates. To witness strict extension, define R by taking R N ( easy ) = { h 3 } and all other coordinates equal to R; then R ISS 5 ( 0 ) ( A , H ) , so there is no Q with R = ι ( Q ) .

3. Conclusions

In this paper, we defined five variants: (i) Single-valued, mapping each attribute value to one subset capturing undirected indeterminacy; (ii) Double-valued, splitting into truth-leaning and falsity-leaning slices; (iii) Triple-valued, adding a neutral slice; (iv) Quadruple-valued, refining polarity by distinguishing strong and ordinary truth/falsity leanings; and (v) Quintuple-valued, further introducing a central neutral band between the two strengths. For clarity, the overall summary of the IndetermSoft sets discussed in this paper is presented in Table 1.
In the future, we intend to extend the concepts developed in this paper by employing HyperSoft Sets [26,27,28], SuperHyperSoft Sets [29,30,31], TreeSoft Sets [32,33], ForestSoft Sets [34,35,36], HyperNeutrosophic Sets [37], Plithogenic Sets [38,39,40], Graphs [41], HyperGraphs [42,43], and SuperHyperGraphs [44,45].

Author Contributions

Conceptualization, Takaaki Fujita; Investigation, Takaaki Fujita; Methodology, Takaaki Fujita; Writing – original draft, Takaaki Fujita; Writing – review & editing, All authors.

Funding

This study did not receive any financial or external support from organizations or individuals.

Institutional Review Board Statement

As this research is entirely theoretical in nature and does not involve human participants or animal subjects, no ethical approval is required.

Data Availability Statement

This research is purely theoretical, involving no data collection or analysis. We encourage future researchers to pursue empirical investigations to further develop and validate the concepts introduced here.

Use of Artificial Intelligence

I use generative AI and AI-assisted tools for tasks such as English grammar checking, and I do not employ them in any way that violates ethical standards.

Acknowledgments

We extend our sincere gratitude to everyone who provided insights, inspiration, and assistance throughout this research. We particularly thank our readers for their interest and acknowledge the authors of the cited works for laying the foundation that made our study possible. We also appreciate the support from individuals and institutions that provided the resources and infrastructure needed to produce and share this paper. Finally, we are grateful to all those who supported us in various ways during this project.

Conflicts of Interest

The authors confirm that there are no conflicts of interest related to the research or its publication.

References

  1. Maji, P.K.; Biswas, R.; Roy, A.R. Soft set theory. Computers & mathematics with applications 2003, 45, 555–562. [Google Scholar]
  2. Fujita, T.; Smarandache, F. An introduction to advanced soft set variants: Superhypersoft sets, indetermsuperhypersoft sets, indetermtreesoft sets, bihypersoft sets, graphicsoft sets, and beyond. Neutrosophic Sets and Systems 2025, 82, 817–843. [Google Scholar]
  3. Jose, J.; George, B.; Thumbakara, R.K. Soft directed graphs, their vertex degrees, associated matrices and some product operations. New Mathematics and Natural Computation 2023, 19, 651–686. [Google Scholar] [CrossRef]
  4. Marfetan, V.d.R.M.; Chicaiza, L.G.T.; Chicaiza, S.A.P.; Sanchez, E.M.O. Classification of cases of animal abuse in Ecuador using IndetermSoft and C4. 5 algorithms. Neutrosophic Sets and Systems 2025, 92, 121–133. [Google Scholar]
  5. Caballero, E.G.; Moscoso-Paucarchuco, K.M.; Hernandez, N.B.; Torres, L.J.C.; Leyva, M.; Rodríguez, V.G.G. Algorithms of Designing Decision Trees From Indeterm Soft Sets. In Neutrosophic and Plithogenic Inventory Models for Applied Mathematics; IGI Global Scientific Publishing, 2025; pp. 561–586. [Google Scholar]
  6. Wei, W.; Peng, P. Weighted IndetermSoft Set for Prioritized Decision-Making with Indeterminacy and Its Application to Green Competitiveness Evaluation in Equipment Manufacturing Enterprises. Neutrosophic Sets and Systems 2025, 85, 1018–1026. [Google Scholar]
  7. Yang, H.; Lin, C. A Recursive IndetermTree Soft Set (RIT-Soft Set) for Dynamic and Uncertain Performance Evaluation in College Competitive Sports. Neutrosophic Sets and Systems 2025, 85, 874–886. [Google Scholar]
  8. Shen, T.; Mao, C. Sustainability Impact of Online Consumption Behavior from the Perspective of Digital Empowerment: IndetermSoft Set with Application. Neutrosophic Sets and Systems 2025, 82, 24. [Google Scholar]
  9. Smarandache, F. New Types of Soft Sets: HyperSoft Set, IndetermSoft Set, IndetermHyperSoft Set, and TreeSoft Set. International Journal of Neutrosophic Science 2023. [Google Scholar] [CrossRef]
  10. Krishnamurthy, B.; Shiva, S.G. Indetermsoft-Set-Based D* Extra Lite Framework for Resource Provisioning in Cloud Computing. Algorithms 2024, 17, 479. [Google Scholar] [CrossRef]
  11. Smarandache, F. Introduction to the n-SuperHyperGraph-the most general form of graph today; Infinite Study, 2022. [Google Scholar]
  12. Smarandache, F. New types of soft sets “hypersoft set, indetermsoft set, indetermhypersoft set, and treesoft set”: an improved version; Infinite Study, 2023.
  13. Wang, H.; Smarandache, F.; Zhang, Y.; Sunderraman, R. Single valued neutrosophic sets; Infinite study, 2010.
  14. Broumi, S.; Talea, M.; Bakali, A.; Smarandache, F. Single valued neutrosophic graphs. Journal of New theory, 2016; 86–101. [Google Scholar]
  15. Broumi, S.; Bakali, A.; Bahnasse, A. Neutrosophic sets: An overview. Infinite Study 2018. [Google Scholar]
  16. Kandasamy, I. Double-valued neutrosophic sets, their minimum spanning trees, and clustering algorithm. Journal of Intelligent systems 2018, 27, 163–182. [Google Scholar] [CrossRef]
  17. Lin, L. Double-Valued Neutrosophic Offset for Enhancing Humanistic Competence: An Effectiveness Study of Humanities Instruction in Vocational College Students. Neutrosophic Sets and Systems 2025, 88, 680–689. [Google Scholar]
  18. Du, K.; Du, Y. Research on performance evaluation of intangible assets operation and management in sports events with double-valued neutrosophic sets. J. Intell. Fuzzy Syst. 2023, 45, 2813–2822. [Google Scholar] [CrossRef]
  19. Guo, Y. Enhancing DVNN-WCSM Technique for Double-Valued Neutrosophic Multiple-Attribute Decision-Making in Digital Economy: A Case Study on Enhancing the Quality of Development of Henan’s Cultural and Tourism Industry. Neutrosophic Sets and Systems 2025, 75, 391–407. [Google Scholar]
  20. Peng, H.g.; Zhang, H.y.; Wang, J.q. Probability multi-valued neutrosophic sets and its application in multi-criteria group decision-making problems. Neural Computing and Applications 2018, 30, 563–583. [Google Scholar] [CrossRef]
  21. Peng, J.j.; Wang, J.q. Multi-valued neutrosophic sets and its application in multi-criteria decision-making problems. Neutrosophic Sets and Systems 2015, 10, 6. [Google Scholar] [CrossRef]
  22. Wang, H. Professional Identity Formation in Traditional Chinese Medicine Students: An Educational Perspective using Triple-Valued Neutrosophic Set. Neutrosophic Sets and Systems 2025, 88, 83–92. [Google Scholar]
  23. Fujita, T. Triple-, Quadruple-, and Quintuple-Valued Neutrosophic Offsets: Extended Models for Off Uncertainty Representation 2025.
  24. Fujita, T. Triple-Valued Neutrosophic Set, Quadruple-Valued Neutrosophic Set, Quintuple-Valued Neutrosophic Set, and Double-valued Indetermsoft Set. Neutrosophic Systems with Applications 2025, 25, 3. [Google Scholar] [CrossRef]
  25. Meng, W. Quintuple-Valued Neutrosophic Offset for Quality Evaluation of Cross-Border E-Commerce Talent Training Based on Artificial Intelligence. Neutrosophic Sets and Systems 2025, 88, 834–844. [Google Scholar]
  26. Smarandache, F. Extension of soft set to hypersoft set, and then to plithogenic hypersoft set. Neutrosophic sets and systems 2018, 22, 168–170. [Google Scholar]
  27. Ihsan, M.; Rahman, A.U.; Saeed, M.H. Hypersoft Expert Set With Application in Decision Making for Recruitment Process. 2021.
  28. Musa, S.Y.; Asaad, B.A. Topological structures via bipolar hypersoft sets. Journal of Mathematics 2022, 2022, 2896053. [Google Scholar] [CrossRef]
  29. Salamai, A.A. A SuperHyperSoft Framework for Comprehensive Risk Assessment in Energy Projects. Neutrosophic Sets and Systems 2025, 77, 614–624. [Google Scholar]
  30. Mohamed, M.; AbdelMouty, A.M.; Mohamed, K.; Smarandache, F. SuperHyperSoft-Driven Evaluation of Smart Transportation in Centroidous-Moosra: Real-World Insights for the UAV Era. Neutrosophic Sets and Systems 2025, 78, 149–163. [Google Scholar]
  31. Smarandache, F. Foundation of the SuperHyperSoft Set and the Fuzzy Extension SuperHyperSoft Set: A New Vision. Neutrosophic Systems with Applications 2023, 11, 48–51. [Google Scholar] [CrossRef]
  32. Myvizhi, M.; A Metwaly, A.; Ali, A.M. TreeSoft Approach for Refining Air Pollution Analysis: A Case Study. Neutrosophic Sets and Systems 2024, 68, 17. [Google Scholar]
  33. Smarandache, F. TreeSoft Set vs. HyperSoft Set and Fuzzy-Extensions of TreeSoft Sets. HyperSoft Set Methods in Engineering 2024. [Google Scholar] [CrossRef]
  34. Song, L.; Liu, J.; Ding, H.; Zhang, W. ForestSoft Set for Mechanical Automation Production Control Systems Analysis Based on an Intelligent Manufacturing Environment. Neutrosophic Sets and Systems 2025, 85, 229–254. [Google Scholar]
  35. Luo, H. ForestSoft Set Approach for Estimating Innovation and Entrepreneurship Education in Universities through a Hierarchical and Uncertainty-Aware Analytical Framework. Neutrosophic Sets and Systems 2025, 86, 332–342. [Google Scholar]
  36. Jin, H. Valuation of Building Facade Design Effects Using ForestSoft Hypergraphs and Virtual Simulation Technology. Neutrosophic Sets and Systems 2025, 86, 171–183. [Google Scholar]
  37. Fujita, T. Advancing Uncertain Combinatorics through Graphization, Hyperization, and Uncertainization: Fuzzy, Neutrosophic, Soft, Rough, and Beyond; Biblio Publishing, 2025. [Google Scholar]
  38. Smarandache, F. Plithogenic set, an extension of crisp, fuzzy, intuitionistic fuzzy, and neutrosophic sets-revisited; Infinite study, 2018.
  39. Azeem, M.; Rashid, H.; Jamil, M.K.; Gütmen, S.; Tirkolaee, E.B. Plithogenic fuzzy graph: A study of fundamental properties and potential applications. Journal of Dynamics and Games 2024. [Google Scholar] [CrossRef]
  40. Kandasamy, W.V.; Ilanthenral, K.; Smarandache, F. Plithogenic Graphs; Infinite Study, 2020.
  41. Diestel, R. Graph theory; Springer (print edition); Reinhard Diestel (eBooks), 2024.
  42. Berge, C. Hypergraphs: combinatorics of finite sets; Vol. 45, Elsevier, 1984.
  43. Bretto, A. Hypergraph theory. An introduction. Mathematical Engineering. Cham: Springer 2013, 1.
  44. Smarandache, F. Extension of HyperGraph to n-SuperHyperGraph and to Plithogenic n-SuperHyperGraph, and Extension of HyperAlgebra to n-ary (Classical-/Neutro-/Anti-) HyperAlgebra; Infinite Study, 2020.
  45. Hamidi, M.; Smarandache, F.; Davneshvar, E. Spectrum of superhypergraphs via flows. Journal of Mathematics 2022, 2022, 9158912. [Google Scholar] [CrossRef]
Table 1. Overview of IndetermSoft Set variants (per attribute value)
Table 1. Overview of IndetermSoft Set variants (per attribute value)
Variant Mapping Indeterminacy slices Notes / Generalization
Single-valued F : A P ( H ) undirected Minimal form: one subset capturing ambiguity without truth/falsity polarity.
Double-valued F : A P ( H ) 2 T-leaning; F-leaning Splits ambiguity by polarity; allows intersections for conflicting signals.
Triple-valued G : A P ( H ) 3 T-leaning; neutral; F-leaning Extends Double by adding a neutral band; projects to Double by dropping neutral.
Quadruple-valued Q : A P ( H ) 4 strong-T; T; F; strong-F Refines polarity strength; recovers Triple by merging strong/ordinary on each side.
Quintuple-valued R : A P ( H ) 5 strong-T; T; neutral; F; strong-F Strict extension of Quadruple; inserts neutral between strengths for finer control.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
Copyright: This open access article is published under a Creative Commons CC BY 4.0 license, which permit the free download, distribution, and reuse, provided that the author and preprint are cited in any reuse.
Prerpints.org logo

Preprints.org is a free preprint server supported by MDPI in Basel, Switzerland.

Subscribe

Disclaimer

Terms of Use

Privacy Policy

Privacy Settings

© 2025 MDPI (Basel, Switzerland) unless otherwise stated