Human-computer interaction using artificial intelligence-based expert prioritization and neuro quantum fuzzy picture rough sets for identity management choices of non-fungible tokens in the Metaverse Gang Kou Southwestern University of Finance and Economics Hasan Dinçer Istanbul Medipol University Dragan Pamucar ( 

[email protected]

) University of Belgrade Serhat Yüksel Istanbul Medipol University Muhammet Deveci Turkish Naval Academy, National Defence University Gabriela Oana Olaru Istanbul Medipol University Serkan Eti IMU Vocational School, İstanbul Medipol University Research Article Keywords: artificial intelligence, non-fungible tokens, Metaverse, Quantum picture fuzzy rough sets, M-SWARA Posted Date: January 31st, 2024 DOI: https://doi.org/10.21203/rs.3.rs-3906458/v1 License:   This work is licensed under a Creative Commons Attribution 4.0 International License. Read Full License Additional Declarations: No competing interests reported. Page 1/24 Abstract Necessary improvements should be made to increase the effectiveness of non-fungible tokens on the Metaverse platform without having extra costs. For the purpose of handing this process more efficiently, there is a need to determine the most important factors for a more successful integration of nonfungible tokens into this platform. Accordingly, this study aims to determine the appropriate the identity management choices of non-fungible tokens in the Metaverse. There are three different stages in the proposed novel fuzzy decision-making model. The first stage includes prioritizing the expert choices with artificial intelligence-based decision-making methodology. Secondly, the criteria sets for managing non-fungible tokens are weighted by using Quantum picture fuzzy rough sets-based M-SWARA methodology. Finally, the identity management choices regarding non-fungible tokens in the Metaverse are ranked with Quantum picture fuzzy rough sets oriented VIKOR. The main contribution of this study is that artificial intelligence methodology is integrated to the fuzzy decision-making modelling to differentiate the experts. With the help of this situation, it can be possible to create clusters for the experts. Hence, the opinions of experts outside this group may be excluded from the scope. It has been determined that security must be ensured first to increase the use of non-fungible tokens on the Metaverse platform. Similarly, technological infrastructure must also be sufficient to achieve this objective. Moreover, biometrics for unique identification has the best ranking performance among the alternatives. Privacy with authentication plays also critical role for the effectiveness of this process. 1. Introduction Non-fungible token is a type of crypto asset developed on blockchain technology. One of the most important features of these tokens is that they are immutable and unique. In other words, each token has its own unique digital content. This provides some benefits for increasing the efficiency of transactions to be carried out in the metaverse (Behl et al., 2024). Thanks to these tokens, it is possible to customize digital assets on the Metaverse platform. This significantly contributes to reducing the uncertainty in the process. Investors who have more confidence in the process pay more attention to this area. Thus, it is possible to increase investments. On the other hand, non-fungible tokens secure digital property rights within the metaverse. This significantly helps to increase investors' confidence in the process. Moreover, it is possible to determine the value of digital assets on the Metaverse platform by using these tokens (Lee et al., 2024). This situation supports increasing the trade volume in the process. Similarly, non-fungible tokens can be backed by smart contracts. This situation contributes to increasing the transaction volume on the Metaverse platform. The development of non-fungible tokens is crucial to the effectiveness of the metaverse platform. First, user convenience must be ensured to increase the use of these tokens. Users want to use these tokens easily and quickly. In this context, interfaces must be designed in a user-friendly manner. In this context, it would be appropriate to provide some training to use these tokens effectively (Davies et al., 2024). Ensuring the security of the process is also very important in this context. Thanks to a secure platform, users' anxiety about using these tokens is reduced. Investors who feel safer will make more transactions on this platform. Thus, it is possible to increase the effectiveness of the metaverse platform. In this context, some actions need to be taken to ensure account confidentiality and payment security. To increase the use of non-fungible tokens on the Metaverse platform, sufficient technological infrastructure must be provided (Brickman et al., 2024). Owing to the use of advanced technologies, the blockchain system can be more successfully integrated into the metaverse platform. This practice can also significantly increase the effectiveness of the process. To increase the effectiveness of non-fungible tokens on the Metaverse platform, necessary improvements must be made regarding these issues. However, these improvements also cause costs to increase. This situation emerges as the most important barrier in the improvement process. Therefore, making too many improvements will put businesses in a very difficult financial situation. To manage this problem effectively, improvements on more important issues must be made first. Therefore, it is necessary to identify the factors that are most important in this process. However, there are a limited number of studies focusing on this issue in the literature. This can be considered as one of the important deficiencies in the literature. In other words, a new study is needed to determine the most important factors for a more successful integration of non-fungible tokens into this platform. Accordingly, this study aims to determine the appropriate the identity management choices of non-fungible tokens in the Metaverse. There are three different stages in the proposed novel fuzzy decision-making model. The first stage includes prioritizing the expert choices with artificial intelligence-based decision-making methodology. Secondly, the criteria sets for managing non-fungible tokens are weighted by using Quantum picture fuzzy rough sets-based M-SWARA methodology. Finally, the identity management choices regarding non-fungible tokens in the Metaverse are ranked with Quantum picture fuzzy rough sets oriented VIKOR. The main motivation of making this study is the strong need for a new fuzzy decision-making model. The main reason is that most of the existing models in the literature do not consider expert differentiation (Ecer et al., 2024; Mikhaylov et al., 2024). However, the qualifications of the experts can be different based on their demographic characteristics. Hence, a new model is needed to consider this situation to reach more appropriate results. The main contributions of this study are demonstrated below. (i) Artificial intelligence methodology is integrated to the fuzzy decision-making modelling to differentiate the experts. With the help of this situation, it can be possible to create clusters for the experts. Hence, the opinions of experts outside this group may be excluded from the scope. This situation allows to reach more realistic analysis results. On the other side, this condition has a powerful contribution to increase methodological originality. (ii) M-SWARA methodology is preferred to weight the determinants. Owing to this issue, the causal directions among these items can be considered. The classical SWARA approach cannot create impact relation map of the criteria. Due to this situation, MSWARA methodology is generated in the previous studies while making some improvements. As a result, the causal directions of the determinants can be identified. The influencing factors of managing non-fungible tokens may have an impact on each other. Thus, to reach more essential items, causal relationship among them should be considered. Because of this condition, M-SWARA is the most appropriate methodology in this framework. Page 2/24 Literature review is given in the next step. The following step consists of the details of the proposed methodology. Analysis results are explained in the fourth step. The final sections include discussion and conclusion. 2. Literature Review NFTs, digital representations of items stored in the blockchain that cannot be exchanged with each other, feature uniqueness by utilizing smart contracts (Bonnet & Teuteberg, 2023). The development and expansion of NFT applications are directly linked to blockchain and Metaverse innovations. In this context, structural innovations in blockchain technologies are carried out on the axis of data collection, storage, sharing, interoperability, and privacy protection (Huynh-The et al., 2023). For example, Wu L. et al. (2023) developed a waste material passport as NFT, which allows cross-border trade of construction waste materials using blockchain infrastructure. With these suggestions, they aimed to ensure that waste materials have a digital and unique identity, to ensure information transparency, to increase trade efficiency, and to ensure the security of transaction records. On the other hand, Rani et al. (2023) developed an innovative blockchain-based NFT payment system for academic payment systems. In this way, an online payment model has been introduced to increase security by eliminating the lack of transparency and traceability in traditional payment methods. Ko et al. (2023) emphasize ongoing research on developing innovative NFT technologies, especially fractional NFTs, non-transferable and soul bound tokens. Security is another issue that will increase the effectiveness of Blockchain and Non-Fungible Tokens. With the increase in its use and value, the concern that NFTs can be used to launder illegal revenues has also increased (Mosna & Soana, 2023). As a matter of fact, Rahman and Jin (2023) suggested establishing tax control to develop the Chinese NFT market and eliminate tax irregularities. They emphasized that in this way, the legality of the transactions will be ensured, as well as their security. Schlatt et al. (2023) emphasized that research on the cyber security of blockchain applications focuses on the technical infrastructure, but it is also essential to investigate the socio-technical aspects. On the other hand, since blockchain-based NFT applications provide security, they can be integrated into production processes in many different sectors. For example, Alkhader et al. (2023) found that these applications resist security attacks in their study investigating the use of blockchain and NFTs in digital production systems. Furthermore, Delgadovon-Eitzen et al. (2024) have presented a proposal for publishing and verifying academic information by the General Data Protection Regulation by taking advantage of NFTs' unique and secure structures. Increasing the infrastructure efficiency of Non-Fungible Tokens is not enough on its own. It is a process that proceeds in parallel with the strategic establishment of business models and achieving profitability to increase innovations in this field. Thanks to NFTs, new business models can be developed focusing on digital ownership, digital assets that can be moved and combined, and decentralized communities (Li &Chen, 2023). At this point, as stated by Cohan and Paschen (2023), marketing professionals need to be guided in persuading consumers to increase their interest in NFTs. Belk et al. (2022) contributed to the field by theorizing new forms of ownership so that NFT and web 3.0 applications can become widespread, especially in the art world, and artists can earn money. Similarly, Mancuso et al. (2023) presented a framework for companies to create added value by supporting their investments in Metaverse and Web 3.0 technologies with new business models. On the other hand, Lee et al. (2024) evaluated the effectiveness of the opportunities provided by the platforms in their research on the effect of NFT use on customer loyalty. Accordingly, they emphasized that customer loyalty increases thanks to the opportunities provided by NFT platforms and that it is essential to design a user-centered experience. As mentioned above, another criterion that increases the effectiveness of NFTs is user experience. Ali et al. (2023) stated that these tools will be adopted more as the interfaces of NFT platforms are designed to be user-friendly. For instance, Lee (2023) investigated the factors affecting users' adoption of NFTs. Accordingly, usability is among the technical factors that affect users. Moreover, the research conducted by Sun (2023) revealed that one of the leading reasons for choosing NFT platforms is ease of use. However, Wu C. et al. (2023) emphasized in their research on end NFT users that usability is one of the biggest challenges of current applications. Finally, Meyns and Dalipi (2022) investigated the concerns of end NFT users about the platform in their research. According to research findings, users are concerned about access to NFT platforms by special invitation, verification processes, restricting account access, or removing their own NFTs. As a result, eliminating access barriers and usage concerns of end users is one of the crucial criteria for increasing NFT effectiveness. The diversity and effectiveness of Web 3.0 applications is increasing day by day. It is seen that these technologies change the way different sectors do business. Blockchain-based NFT applications are among the most frequently emphasized and researched investments in recent years. In this respect, it is essential to understand and develop NFT technology, which also appeals to end consumers with its structures and the opportunities it offers. Therefore, developing technical infrastructure and blockchain technology ensures NFT activity. Various model and system suggestions for these technologies, used in different sectors such as education, construction, and health, are shared above. On the other hand, security and compliance are also issues that NFTs offer and that users may still have concerns about. Among the prominent issues are ensuring tax control, introducing a socio-technical perspective on cyber security issues, using it as a security tool in digital production systems, and verifying personal information. Diffusion of innovations is possible by integrating them into corporate strategies and business models. At this point, issues such as developing business models specific to NFT technology and adapting them to the system as an active income source also come to the fore. Finally, the literature research showed that user experience also plays a role in NFT activity. Providing convenience to the user experience, addressing user concerns, and providing ease of system use may increase NFT activity. No studies have evaluated the prominent criteria for making NFT activity more effective by integrating other Web 3.0 technologies. In other words, it has been determined that a model is needed to evaluate the prominent criteria in studies to increase NFT effectiveness. To address this gap in the literature, a model proposal has been developed that helps identify critical factors for increasing NFT activity. 3. Methodology Page 3/24 The aim of the study is to determine the most appropriate strategy in choosing identity management for NFT in Metaverse. For this purpose, first, criteria for NFT management need to be determined and weighted. The criteria determined in the literature review are weighted with the M-SWARA method. In the second stage of the study, strategies are evaluated based on the criteria. This evaluation is carried out by the VIKOR method. The two-stage proposed method is carried out based on expert opinions. Therefore, it is recommended to consider fuzzy numbers in order to include uncertainty in linguistic expressions in the analysis. Therefore, QPFR numbers have been integrated into these two methods. The most current version for QPFR numbers is the form in which the golden ratio is used. In this way, it will be possible to handle uncertainty in the most realistic way. In addition, since the selection of experts and their equal importance is a matter criticized in the literature, artificial intelligence-based expert selection is recommended. The details of the proposed model are shown in Fig. 1. 3.1. AI-based decision-making for expert prioritization In the dynamics of decision-making process, diversity in the demographic information and experience of experts has become important in recent years to be taken into account in the analysis process. However, difficulty in prioritizing experts and diversity also create complexity of analysis. The proposed solution for this complexity is the AI-based k-means clustering algorithm. Clusters are created based on basic demographic characteristics of experts such as education, salary, age and sector. In determining the optimal number of clusters, the elbow method is preferred. The elbow method is a strategic visualization technique in finding the effective point in determining the effectiveness of the model. After this, the weights of the clusters are defined. These weights reflect the sizes and diversity of the clusters. Finally, the weights of individual experts in each cluster are calculated proportionally based on their proximity to the cluster centre. With an artificial intelligence-based methodology, an innovative approach to expert prioritization is achieved. Artificial intelligence-based expert prioritization steps are presented below. In the Step 1, the number of optimal clusters are determined using the elbow method. The elbow method, an important component of methodology of study, serves as a guidance for defining the optimal number of clusters in decision-maker grouping (Liu et al, 2024). According to plotting the Within-Cluster Sum of Squares (WCSS) against the number of clusters (k), this method systematically reveals the point at which additional clusters cease to significantly increase the effectiveness of the model, elbow-shaped in the graph. On the basis, the elbow technique enables us to reconcile the granularity of clustering with the declining rewards of further complexity by serving as a strategic navigator (Costantiello and Leogrande, 2024). This ensures that the selected number of clusters encapsulates the essential patterns within the demographic data, providing a robust foundation for subsequent steps in our prioritization methodology. In Step 2, the Within-Cluster Sum of Squares (WCSS) is computed for the different values of k using Eq. (1). k WCSS = ∑ ∑ d(x i, c j) 2 j = 1 xi ∈ C j 1 Where k is the number of clusters, C j is the set of data points in cluster j, x i is a data point, c j is the cluster center of cluster j, and d(x i, c j) is the Euclidean distance between x i and c j. The elbow is determined as an optimal k value where the reduction in WCSS slows down by plotting the values of WCSS and k. In the Step 3 of the AI-based expert prioritization, the K-means clustering algorithm is used for clustering decision makers. The optimal k value is applied for initial cluster centres as c 1, c 2, . . . , c k and each data point x i to the nearest cluster center is assigned to define the cluster assignments with Eq. (2). d(x i, x j) = √ n ∑ (x il − x jl) 2 l=1 2 Where n represents the number of dimensions of the data. The cluster assignment of each data point x i is denoted by a i, where a i = j is that x i belongs to cluster j (Yang, 2024; Kong et al, 2024). Cluster centers are updated by taking the average of data points in each cluster by Eq. (3). cj = 1 ∑ xi ∣ C j∣ xi ∈ C j 3 where C j means the set of data points in cluster j, and ∣C j∣ is the number of data points in cluster j. Eqs. (2) and (3) are applied iteratively until no data point changes its cluster assignment, or until a maximum number of iterations is reached. In Step 4, the weights of the decision makers are calculated by considering the cluster weights of the decision makers. The mean standard deviations of each cluster are computed with the help of Equations (4)-(6). Page 4/24 sj = 1 n ∑ σjl n l=1 4 σ jl = √ ′ 1 ∑ (x il − x jl) 2 ∣C ∣ j x ∈C i j 5 ′ x jl = 1 ∑ x il ∣ C j∣ xi ∈ C j 6 where, s j is the standard deviation of cluster j. n is the number of features or dimensions of the data, and σ jl is the standard deviation of feature l in cluster ′ j. x jl is the mean of feature l in cluster j. Then, the cluster weights w j are obtained with Eq. (7). w j =∣ C j ∣ × s j 7 where ∣C j∣ is the magnitude of cluster j (Lee, 2024). The weights of the decision makers are calculated with Eq. (8). w tj = wj 1 ∣ C j∣ ∑ w ∈ C w j j j 8 where, t means the number of decision makers w tj represents the weight of decision maker t in cluster j. 3.2. Neuro Computing with Facial expressions Facial expressions such as anger, happiness and sadness are important elements in human communication. For decision makers, this is also an effective factor in their decision making. The network of facial muscles forms our judgments about individuals based on their emotional expressions. Neuro Decision Making Concept is a new decision-making methodology for classifying facial expressions and emotions (Göller et al, 2024). The basis of the neurodecision-making method lies in Darwin's research on the non-verbal display of emotions. Facial action coding system (FACS) is a classification algorithm consisting of 46 different action units developed in the 1970s (Rahadian et al, 2024). The FACS algorithm is used as a reliable and valid method in areas requiring nonverbal behavior and social interaction (Westermann et al, 2024; Cakir and Arica, 2024). 3.3. Modelling Uncertainty with Quantum picture fuzzy rough sets with golden cuts Quantum picture fuzzy rough sets with gold dashes are used to determine the lower and upper limits in the subjective evaluations of experts. Quantum mechanics and the golden ratio are used in the boundary determination process used here. Quantum mechanics is the branch of physics that investigates matter and energy at the subatomic level. The theory takes into account wave functions, quantum states (Du et al, 2024; Hou, 2024). Additionally, fuzzy number sets in mathematics are one of the set theories that take uncertainty into account. Fuzzy sets can create structures that contain uncertainty in analysis by defining the belonging of the elements with numbers between 0 and 1. In quantum mechanics, the uncertainty in the position of a massless particle is integrated into fuzzy number systems. The particle's ownership of momentum is proportional to the size of the wave function (Kou et al, 2023; Fan et al, 2023). The algorithm combining quantum mechanics, golden ratio and fuzzy numbers is given by Equations (9)-(11). Q(|u > ) = ϕejθ 9 |C > = {|u1 > , |u2 > , …, |un > } 10 ∑ |Q(|u > )| = 1 | u >⊆ | C > 11 Page 5/24 | In Equations (9)–(11), C represents a collection of exhaustive events represented with u i > . The squared magnitude of the wave function, |Q(|u > )| = ϕ 2, provides the amplitude-based result for the probability of occurrence of event |u > as determined. The value of ϕ 2 must lie within the | | range of 0 to 1, and θ 2 represents the phase angle of event |u > . Furthermore, ϕ 1 2 serves as the degree of belief in event |u > , with θ representing its phase angle, which can range from 0 to 360 degrees (Carayannis et al, 2023). Picture fuzzy sets (PFSs) is one of fuzzy sets and the intuitionistic fuzzy sets are determined in 1980s (Rani et al, 2024). This method is determined by Cuong and his colleague in the last decade to provide more compherensive fuzzy-based evaluations for the complex decision-making problems (Ahmad et al, 2024). For this purpose, PFSs considers the positive, netural, negative, refusal membership degrees of the fuzzy sets on a universe. The conventional fuzzy sets in Eq. (12) include the membership function. { A = ⟨x, μ A(x)⟩|x ∈ X } 12 Where A isa fuzzy set, X is a universe of discourse and μ A represents the membership degree of x in the fuzzy set A. μ A : X → [0,1]. However, intuitionistic fuzzy sets in Eq. (13) are formulated with membership and non-membership functions. { A = ⟨x, μ A(x), v A(x)⟩|x ∈ X } 13 Where v A is the non-membership function of fuzzy set, 0 ≤ μ A(x) + v A(x) ≤ 1, ∀x ∈ X. Picture fuzzy sets are shown in Eq. (14). The sets are by considering the additional function parameters of the universe X with the following statement. { A = ⟨x, μ A(x), nA(x), v A(x), hA(x)⟩|x ∈ X } 14 Where n A represents the neutral and h A means the refusal degrees of membership function of x in A. μ A(x) + n A(x) + v (x) + h A(x) = 1, ∀x ∈ X. A Picture fuzzy sets also answers the complex models including several types of expert opinions entitled the membership value μ A for ‘yes’, neutral value n A for ‘abstain’, non-membership value v A for ‘no’, the refusal value h A for ‘ignoring’. So that, it is possible to obtain results that are more consistent with the real world (Kahraman, 2024). Some operations of picture fuzzy set A and B are shown with Equations (15)-(19). A ⊆ B if μ A(x) ≤ μ B(x) and nA(x) ≤ nB(x) and v A(x) ≥ v B(x), ∀x ∈ X (15) A = B if A ⊆ B and B ⊆ A (16) A∪B= {(x, max (μ A(x), μ B(x) ), min (nA(x), nB(x) ), min (vA(x), vB(x) ))|x ∈ X} A∩B= {(x, min (μ A(x), μ B(x) ), min (nA(x), nB(x) ), max (vA(x), vB(x) ))|x ∈ X} 17 18 − coA = A = {(x, vA(x), nA(x), μ A(x) )|x ∈ X} 19 The purpose of the rough number scope is to reduce the subjective and ambiguous assessments of decision-making analysis. It comprises a rough boundary interval, upper and lower bounds. Lower ( ( )) Apr C i ( ( )) ¯ , upper _ Apr C i approximation, and boundary region presented in Equations (20)-(22). ( ) = ∪ {Y ∈ X / R(Y) ≤ Ci} Apr C i _ 20 Page 6/24 (Bnd (Ci )) of Ci are ¯ ( ) = ∪ {Y ∈ X / R(Y) ≥ Ci} Apr C i 21 ( ) = ∪ {Y ∈ X / R(Y) ≠ Ci} Bnd C i 22 Where Y means an arbitrary object of the universe X, R is the set of N classes (C 1, . . C N). C represents the objects in X. ∀Y ∈ X, C i ∈ R. However, lower ( _ ) ( ) ¯ ( ) , upper Lim (Ci ) limits and the rough number (RN (Ci )) of Ci are given by Equations (23)-(25). Lim C i NL ( ) = √ ∏ iN= 1Y ∈ Apr (C i ) _ _ L Lim C i 23 NU ¯ ¯ NU ( ) = √ ∏ i = 1Y ∈ Apr (Ci ) Lim C i 24 ¯ ( ) = ⌈Lim (Ci ), Lim (Ci )⌋ _ RN C i 25 ¯ ( ) and Apr (Ci ). In this study, golden-cut fuzzy rough numbers based on quantum mechanics Where N L and N U are the number of objects for Apr C i _ are proposed to obtain more comprehensive and consistent results than classical fuzzy-based modelling. One of the important advantages of these numbers is that they can take into account both the evaluations of different experts and the opinions of experts with specific characteristics. Quantum picture fuzzy rough sets (QPFRS) represent the degree of membership of an element by a complex number. Formulations of membership value are expressed by Equations (26)-(44). { |CA > = ( ) ⟨u, (⌈Lim C iμ _ ¯ ( ) A ¯ ( ) , Lim C iμ ( ) ( ) ⌋(u), ⌈Lim C in A _ ¯ ( ) A ¯ ( ) , Lim C in ( ) | A ⌋(u), ⌈Lim C iv , Lim C iv ⌋(u), ⌈Lim C ih , Lim C ih ⌋(u)) u ∈ 2 | C A > A A A A _ _ } 26 Where, C iμ defines the membership, C in gives information about the neutral degree, C iv is about the non-membership, and C ih explains the refusal A A A A degrees and their definitions in the picture fuzzy rough numbers are given as follows ( ) Lim C iμ _ A = 1 N Lμ N Lμ A ( ) ∑ Y ∈ Apr CiμA A i=1 _ 27 ( ) Lim C in _ A = 1 N Ln N Ln A ( ) ∑ Y ∈ Apr CinA A i=1 _ 28 ( ) Lim C iv _ A = 1 N Lv N Lv A ( ) ∑ Y ∈ Apr CivA A i=1 29 Page 7/24 _ ( ) Lim C ih _ A = N Lπ 1 N Lπ A ( ) ∑ Y ∈ Apr CihA _ A i=1 30 ¯ ( ) Lim C iμ A = N Uμ 1 N Uμ A ¯ ( ) ¯ ( ) ¯ ( ) ¯ ( ) ∑ Y ∈ Apr CiμA A i=1 31 ¯ ( ) Lim C in A = N Un 1 N Un A ∑ Y ∈ Apr CinA A i=1 32 ¯ ( ) Lim C iv A = N Uv 1 N Uv A ∑ Y ∈ Apr CivA A i=1 33 ¯ ( ) Lim C ih A = N Uπ 1 N Uπ A ∑ Y ∈ Apr CihA A i=1 34 ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) Where N Lμ ,N Ln , N Lv , N Lh are the number of elements in Apr C iμ , Apr C in , Apr C iv , Apr C ih respectively while N Uμ ,N Un , N Uv , A A A A A A A A A A A ¯ N Uh are defined for Apr C iμ A ¯ A , Apr C in _ ¯ ¯ A , Apr C iv A _ , Apr C ih _ . { ∼ ( ) = ∪ Y ∈ X / R (Y) ≤ C iμ ( ) = ∪ Y ∈ X / R (Y) ≤ C in ( ) = ∪ Y ∈ X / R (Y) ≤ C iv ( ) = ∪ Y ∈ X / R (Y) ≤ C ih ( ) = ∪ Y ∈ X / R (Y) ≤ C iμ ( ) = ∪ Y ∈ X / R (Y) ≤ C in Apr C iμ A _ A _ } A 35 Apr C in A _ { ∼ { ∼ } A 36 Apr C iv A _ } A 37 Apr C ih A _ { } ∼ A 38 ¯ Apr C iμ A { ∼ { ∼ } A 39 ¯ Apr C in A Page 8/24 } A 40 ¯ { ∼ { ∼ ( ) = ∪ Y ∈ X / R (Y) ≤ C iv ( ) = ∪ Y ∈ X / R (Y) ≤ C ih Apr C iv A } A 41 ¯ Apr C ih A } A 42 ∼ Where C i = ( C iμ , C in , C iv , C ih A A A A ) { ∼ ∼ ∼ ∼ } ∼ and R is the collection of C 1, C 2, …, C n . C iμ , C in , C iv , C ih are the picture fuzzy sets of class C i. However, A A A A the general formulation of the quantum picture fuzzy sets (QPFSs) with the amplitude and the angle results of event is presented below. C= [C . e μ j2π . α, C . ej2π . γ , C . ej2π . β, C . ej2π . T n v h ] 43 | (|ui > )| ϕ2 = Cμ 44 The amplitudes of quantum membership, neutral, non-membership, and refusal degrees, symbolized by C μ, C n, C v and C h respectively, are given with terms of phase angles α, γ, β, T. The amplitude of the membership value C μ of QFS’s is symbolized by ϕ 2. The utilization of the golden ratio in multiobjective optimization problems allows for a harmonious balance between two opposing objectives, such as maximizing profit while minimizing risk. The golden ratio is approximately 1.618 and the value is symbolized by φ (phi). In the context of the membership and non-membership degrees, the golden ratio can be utilized to establish the ideal weighting between these two objectives. Therefore, a compromise is achieved between the components of fuzzy sets. The representation of the degrees by the golden ratio could be expressed through amplitude with Equations (45) and (46). Cn = Cμ G 45 Ch = Cv G 46 In conclusion, the phase angle for the suggested sets is obtained. The phase angle of the membership in realm of QPFS’s is symbolized by the symbol α with the Equations (47)-(49). | (|ui > )| α = Cμ 47 γ= α G T= β G 48 49 Page 9/24 ∼ ∼ X1 and X2 mean two universes, and A c and B c, respectively represented by ( ( ¯ ( ) _ ( ) ∼ ( ) ¯ ( ) ¯ ( ) ¯ j2π . ⌈ ⌈Lim C μ _ ∼ ( ) B ( ) ( ) j2π . ⌈ , Lim C μ ⌋e B _ 2π _A 2π _ B 2π ∼ _B 2π ⌋ ¯ ( ) _ ( )( ) ( )( ) ( )( ) ( )( ) ∼ βA , 2π ⌋ ( ) ∼ ( ) ¯ ∼ ( ) ¯ , 2π ⌋ ( ) ¯ , ⌈Lim C n _ B ( ) ∼ B ∼ 2π ⌋ _ ( ) ∼ 2π TA ⌋ 2π γB 2π ⌋ , ∼ , 2π ) ) , ¯ _B j2π . ⌈ , ∼ , T∼ , ⌈Lim C h , Lim C h ⌋e B B ∼ ⌋ ¯ _B ¯ βB , , γ∼ ⌋e 2π ∼ _A 2π j2π . ⌈ γA ¯ T∼ ( ) , Lim C n ∼ , 2π ¯ αB ∼ _A j2π . ⌈ , ⌈Lim C h ∼ , Lim C h ∼ ⌋ej2π . ⌈ A A _ ¯ γ∼ , ⌈Lim C n , Lim C n ⌋e A A ∼ ¯ β∼ ⌈Lim C v , Lim C v ⌋e B B ∼ 2π ∼ αA , α∼ j2π . ⌈ ∼ _ A β∼ ⌈Lim C v ∼ , Lim C v ∼ ⌋ej2π . ⌈ A A _ ( )( ) ( )( ) ( )( ) ( )( ) ¯ α∼ ⌈Lim C μ , Lim C μ ⌋e A A ∼ TB 2π ⌋ and, they are two QPFRS’s derived from the universes of discourse X1 and X2. The operations of QPFR numbers are detailed with Equations (50)-(53). { ∼ ( ) ¯ ( ) ¯ ( ) A 2π ( ) λ ⌋ , ⌈Lim _ ( ) ¯ ( ) ¯ ( ) C n ∼ λ, Lim C n ∼ λ⌋ej2π . ⌈ A _A β ∼A λ, 2π 2π λ ⌋ , ⌈Lim A _ ( ) C h ∼ λ, Lim C h ∼ A A ()() ()() ¯ γ∼ ¯ β∼ λ⌋ej2π . ⌈ ⌈Lim C v ∼ λ, Lim C v ∼ A A α ∼A λ, 2π A λ ∗ Ac = _ ( )( ) ()() _ A ⌈Lim C μ ∼ λ, Lim C μ ∼ λ⌋ej2π . ⌈ _ ¯ α∼ _A γ ∼A λ, 2π 2π ¯ T∼ λ⌋ej2π . ⌈ _A T ∼A λ, 2π 2π λ⌋ , λ>0 50 ∼ λ { ( ) ⌈Lim C μ ∼ A _ ¯ λ ( ) λ ( ) λ , Lim C μ ∼ A ⌋e Ac = ( ) ⌈Lim C v ∼ A _ λ ¯ , Lim C v ∼ A ⌋e ()( ) ()() α∼ j2π . ⌈ _A 2π ∼ , 2π β∼ j2π . ⌈ ¯ λ _ A 2π ¯ λ ⌋ ( ) , ⌈Lim C n ∼ A _ λ ¯ ( ) , Lim C n ∼ A βA 2π ⌋ ( ) , ⌈Lim C h ∼ A _ , λ>0 51 Page 10/24 λ ¯ ⌋e ( ) , Lim C h ∼ A λ ⌋e ()() ()() γ∼ λ j2π . ⌈ λ ∼ , λ αA _A 2π ∼ , 2π T∼ j2π . ⌈ ¯ λ _A 2π ¯ λ ∼ , λ γA TA 2π ⌋ } , λ ⌋ } λ⌋, , ( ( ) ( ) ( ) ( )) ( ( ) ( ) ( ) ( )) ( ( ) ( ) ( ) ( )) ( ( ) ( ) ( ) ( )) ( ( ) ( ) ( ) ( )) ( ( ) ( ) ( ) ( )) ( ( ) ( ) ( ) ( )) ( ( ) ( ) ( ) ( )) α∼ ∼ ∼ { ⌈min Lim C μ ∼ ej2π . A _ _ A 2π ⌈min Lim C n ∼ Lim C v ∼ ej2π . Lim C h ej2π . A _ Ac ∪ Bc = , Lim C μ ∼ ej2π . B 2π 2π , Lim C n ∼ B ej2π . , Lim C v ∼ B ej2π . , Lim C h B ej2π . 2π _ ∼ A 2π 2π ∼ , max A Lim C v ∼ A , Lim C μ ∼ ej2π . B ej2π . ej2π . , max _ Lim C h ∼ ¯ γ ∼A 2π ¯ , Lim C n ∼ B ej2π . γ ∼B 2π ¯ ej2π . , Lim C v ∼ B β ∼B 2π A T ∼A 2π ⌋, ¯ ¯ , Lim C h B ∼ } ⌋, 2π ¯ β ∼A ej2π . ⌋, 2π ¯ ¯ _B 2π 2π ¯ α ∼B ¯ ¯ T∼ _A Lim C n ∼ ¯ _B _ T∼ ⌈min , max β∼ _A A ¯ _B 2π Lim C μ ∼ ej2π . α ∼A ¯ γ∼ _A _ A _ , max _ β∼ ⌈min ¯ _ B γ∼ ej2π . ¯ α∼ T ∼B ej2π . 2π ⌋ 52 ( ( ) ( ) ( ) ( )) ( ( ) ( ) ( ) ( )) ( ( ) ( ) ( ) ( )) ( ( ) ( ) ( ) ( )) ( ( ) ( ) ( ) ( )) ( ( ) ( ) ( ) ( )) ( ( ) ( ) ( ) ( )) ( ( ) ( ) ( ) ( )) α∼ ∼ ∼ { Ac ∩ Bc = ⌈max Lim C μ ∼ ej2π . Lim C n ∼ ej2π . Lim C v ej2π . A _ 2π , Lim C μ ∼ B ej2π . , Lim C n ∼ B ej2π . _ A , Lim C v ej2π . ⌈max _ A 2π 2π 2π ∼ B A _A 2π , min _ B α ∼A 2π ¯ ¯ , Lim C μ ∼ B A ej2π . , min Lim C v ∼ A ej2π . , min Lim C h ∼ ej2π . A ⌋, 2π ¯ γ ∼A 2π ¯ , Lim C n ∼ B ej2π . γ ∼B 2π ¯ , Lim C v ∼ B ej2π . T ∼A 2π β ∼B 2π ⌋, ¯ ¯ , Lim C h ∼ ej2π . B } ⌋, 2π ¯ β ∼A ¯ ¯ α ∼B ej2π . ¯ _B 2π Lim C n ∼ ¯ T∼ , Lim C h ∼ ej2π . A ej2π . ¯ _B 2π Lim C μ ∼ ¯ _B β∼ _A _ Lim C h ∼ ej2π . _ , min _ T∼ ⌈max 2π γ∼ _A β∼ ∼ ¯ _ B _ γ∼ ⌈max ¯ α∼ _ A T ∼B 2π ⌋ 53 3.4. M-SWARA with Quantum picture fuzzy rough sets SWARA method is referred to as the progressive weighting method in the multi-criterion decision-making literature. The basis of the SWARA method is the establishment of a hierarchical proportional structure in the evaluation of criteria. M-SWARA is an extension of the SWARA method, and its details are presented under this title (Rahadian et al, 2024; Mikhaylov et al, 2024). Step 5 covers defining the criteria set for NFT management. Criteria affecting NFT management are defined from literature. In Step 6, dependency degrees between the criteria are defined from experts. Linguistic opinion is obtained to create relation matrix. Step 7 involves constructing QPFMs for the relationship matrix. Quantum picture fuzzy rough relation matrix is formulated by considering the linguistic evaluations of decision makers and the quantum spherical fuzzy numbers. C μ ∼ C = A [Cij ]n × n are the relationship each criterion. Cij is about influence value of i-criterion over the j-criterion. The detail of matrix is given by Eq. (54). Page 11/24 [ Ck = 0 C 12 ⋯ ⋯ C 1n C 21 0 ⋯ ⋯ C 2n ⋮ ⋮ ⋱ ⋯ ⋯ ⋮ ⋮ ⋮ ⋱ ⋮ C n1 C n2 ⋯ ⋯ 0 ( ) ¯ ] 54 Where C determines QPFR direct relation matrix. C ij = ( ( ) ⌈Lim C μ _ ij ( ) , Lim C μ ¯ ( ) ( )( ) ( )( ) ij _ ij ⌋ej2π . ⌈ _ α ij , 2π 2π ( ) ⌋ , ⌈Lim C n _ ij _ ij βij , 2π 2π ⌋ ( ) , Lim C n ( ) ij _ ij ⌋ej2π . ⌈ _ γ ij , 2π 2π ¯ ( ) ⌋ , ¯ T _ ij , ⌈Lim C h , Lim C h ⌋ej2π . ⌈ ij ij ) ¯ γ ¯ β ⌈Lim C v , Lim C v ⌋ej2π . ⌈ ij ij ( )( ) ( )( ) ¯ α ¯ T ij , 2π 2π ⌋ , and k is the number of decision makers.Step 8 is about defining QPFRS’s for the relationship matrix. The C matrix of the experts is calculated with QPFR numbers in Eq. (55). ( C= ( ( )) ( ( )) k ⌈min i = 1 ( ( )) ( ( )) k ⌈min i = 1 ( ( )) ( ( )) j2π . ⌈ minki= 1 k ⌈min i = 1 ( ( )) ( ( )) j2π . ⌈ minki= 1 Lim C μ _ ij Lim C n _ Lim C v _ ij ij Lim C h _ k , max i = 1 k , max i = 1 k , max i = 1 ij k , max i = 1 ¯ Lim C μ ⌋e ij ¯ Lim C n ⌋e ij _ ij 2π _ ij _ ij 2π 2π ⌋ , γ ij 2π ⌋ , ⌋ , ) ¯ , max ki= 1 2π () () () () α ij ¯ , max ki= 1 βij 2π ¯ T ¯ Lim C h 2π , max ki= 1 β ⌋e ij _ ij γ ¯ Lim C v j2π . ⌈ minki= 1 k ⌋ej2π . ⌈ min i = 1 ij () () () () ¯ α k ⌈min i = 1 , max ki= 1 T ij 2π ⌋ 55 In Step 9, defuzzified values are calculated. The Defc of QPFRS’s are calculated with Eq. (56). ( ( ) ( ) ( ) (( ) ( )) ( ) ( ) ( ) ( ( ) ( ) ) ( ) ( ) ( ) (( ) ( )) ( ) Lim C μ _ ¯ i Lim C μ Defc i = ( ) − Lim C n _ i ¯ i − Lim C n i ( )( ( ) + Lim C μ . Lim C v ¯ ¯ i _ + Lim C μ . i _ i Lim C v ( )) − Lim C h _ i + ¯ i − Lim C h i + α γ α β _ ij _ ij _ ij _ ij 2π − 2π + 2π . T 2π − _ ij 2π ¯ ¯ ¯ ¯ ¯ α ij γ ij α ij β ij T ij 2π − 2π + 2π . 2π − + 2π 2 56 In Step 10, the normalized relationship matrix is obtained. Then, in Step 11, it continues with the calculation ofs j, k j, q j,and w j values for the relationship value of each criterion. Page 12/24 ) { 1j = 1 k j = s + 1j > 1 j 57 qj = { 1j = 1 qj − 1 kj j>1 58 Ifs j − 1 = s j, q j − 1 = q j; Ifs j = 0, k j − 1 = k j wj = qj ∑n k = 1q k 59 s j means the comparative importance rate by QPFRS’s and provides the importance value of the criterion c j on the following criterion c j + 1.k j represents the coefficient value of the s j and q j defines the recalculated weight of k j. w j gives knowledge about the weights of the criteria in the fuzzy sets. The values are sorted. Step 12 involves constructing the relation matrix and the directions between the criteria. Stable values of relation matrix with the values of w j is obtained by transposing and limiting the matrix to the power of 2t+1. t is an arbitrarily biggest. Thus, the weighting results of w j are obtained with the stabilization process in the M-SWARA method. Impact-relation degrees of the criteria are constructed by the threshold value that is the average value of relation matrix. Greater values than the threshold in the column is influenced by the criteria in the row (Mikhaylov et al, 2023). So, the impact directions of the criteria can be showed properly. 3.5. VIKOR with Quantum picture fuzzy rough sets VIKOR is a decision-making method based on closeness to the ideal solution through consensus. The VIKOR method aims to rank the alternatives, considering the criteria. Compromise solution in the VIKOR method implies consensus with mutual concessions (Hu et al, 2024; Razzaque et al, 2024). The step of the extended VIKOR method is given below. In Step 13, emotional expressions are collected for the alternatives. Linguistic evaluation is obtained. In Step 14 is about constructing the QPFNs for the decision matrix. In Step 15, QPFRS sets are determined for the decision matrix. The decision matrix is defined as X, with Xij representing the alternative i with respect to criterion j based on the QPFRNs-based linguistic opinions of experts. The matrix is illustrated by Eq. (60). Xk = [ 0 X12 ⋯ ⋯ X1m X21 0 ⋯ ⋯ X2m ⋮ ⋮ ⋱ ⋯ ⋯ ⋮ ⋮ ⋮ ⋱ ⋮ ⋯ ⋯ 0 Xn1 Xn2 ] 60 Step 16 involves computing the defuzzified decision values. The defuzzified of the QSFS’s for the decision matrix are obtained with the help of Eq. (56). In ∼* ∼− Step 17, Si, Ri and Qi values are constructed. First, fj values need to be calculated. The best f J and worst f j values for each criterion function are calculated by formula (61). ∼* ∼ ∼− ∼ f J = max x ij, and f j = min x ij, i i 61 The mean group utility and maximal regret are calculated with Equations (62)–(63). Page 13/24 ∼ Si = ∑ ∼ n i = 1w j (| (| ∼ * ∼ f j − x ij ∼ * |) |) ∼ − fj − fj 62 ∼ (| [ (| ∼ * ∼ f j − x ij ∼ R i = max j wj ∼ * |) ]|) ∼ − fj − fj 63 The final scores of alternatives is obtained using Eq. (64). ∼ ( )( ∼ ∼* Qi = v S i − S / ∼− S ∼* −S ) ( )( ∼ ∼* + (1 − v) R i − R / ∼− R ∼* −R ) 64 The weight of the strategy of maximum group utility is v = 0.5. The weight of individual regret means (1 – v). Each case is considered. The final ranking of alternatives requires the fulfillment of two requirements once the values of S, R, and Q are sorted. Condition 1 is calculated with Eq. (65). The situation considers the second position of the alternatives ranked according to Q value. Next condition requires that the alternative must be ranked by either S or R, or both. ( Q A ( 2) ) − Q (A ) ≥ 1 /(j − 1) ( 1) 65 If any of these conditions are not met, a compromise solution is preferred. These alternatives are preferred based on their close ranking scores. It is calculated with the maximum value of M (Yue, 20024). In Step 18, comparative raking values are calculated for consistency of results with sensitivity analysis. 4. Analysis In this section, the findings obtained in determining strategies for NFT management in the Metaverse are presented under subtitles. 4.1. Prioritizing the expert choices with AI-based decision-making method Five experts with academic or industry experience are determined. Artificial intelligence is used to determine the people to be included in the analysis among these experts. Firstly, in Step 1, the demographic information of the experts is defined. The demographic information of the experts is displayed in Table 1. Table 1 Specifications of the decision makers Decision Maker Education Experience (year) Salary (USD) Age Industry DM1 1 (Bachelor) 24 3000 46 1 (Service) DM2 2 (Master) 20 4000 53 2 (Production) DM3 3 (PhD) 17 4500 42 3 (Education) DM4 3 (PhD) 15 4000 44 3 (Education) DM5 2 (Master) 15 2500 46 2 (Production) Page 14/24 In Step 2, the optimal k value is calculated for cluster analysis using Eq. (1). The values of the WCSS are computed for the different number of clusters. In this case, the number of cluster is 5, from 1 to 5, the set of WCSS values are presented for the different k values as seen in Table A1. Also, the elbow point is defined for selecting the optimal number of clusters for the dataset. Accordingly, Fig. 2 illustrate the plot of the values of WCSS against the number of k. According to the results, for K = 3, the WCSS value is minimized and optimized as adding more clusters will not significantly reduce the WCSS value. In Step 3, k-means clustering algorithm is applied for decision makers with Equations (2)-(3). The optimal value for K number is applied for defining the clusters of decision makers. In this example, the optimal value of K is 3. The iteration results of different 3 clusters are given in Table A2. As seen in Table A2, the cluster assignment results are same with initial cluster centers and average of data points for iteration 1. So, the cluster of the decision makers is considered as DM1 and DM5 are considered in cluster 1; DM2 and DM4 are listed in cluster 2; DM3 is stated in cluster 3. In Step 4, the weights of the decision makers are computed by considering the cluster weights of the decision makers in Table A3. The weights of the decision are calculated with the help of Equations (4)-(8). The weights of the decision makers for expert prioritization are given in Table 2. Table 2 Weights of the decision makers Decision Maker Weights DM1 .48 DM2 .02 DM3 .00 DM4 .02 DM5 .48 In Table 2, it is seen that DM1 and DM5 have the best priorities with the value of 0.48 as DM2 and DM4 have relatively the weakest priorities among the decision makers. However, DM3 has no priority in the expert team. Thus, in the decision-making process, the decision makers excluding DM3 are considered for collecting their linguistic evaluations for assessing the criteria and alternatives. 4.2. Weighting the criteria set for managing Non-Fungible Tokens with QPFR-M-SWARA Step 5 is about defining the criteria set for NFT management. As a result of the literature review, four criteria that are effective on managing NFT are determined. The determined criteria are given in Table 3. Table 3 Criteria set for managing Non-Fungible Tokens Criteria Code C1: User Experience EXP C2: Security and Compliance SEC C3: Monetization and Business Strategy MBS C4: Technical and Blockchain Infrastructure TBI Step 6 involves collecting emotional expressions for the criteria. In this process, opinions are taken from determined experts. The emotional expressions are shown in Table A4. Action unit combinations is shown in Table 4. Page 15/24 Table 4 Observed action unit combinations of emotional expressions DM1 EXP EXP SEC MBS TBI (5,25) (7,25) (1,12) (7,25) (5,25) SEC (5,25) MBS (7,5) (7,25) TBI (7,5) (5,25) (14,6) EXP SEC MBS TBI (1,12) (5,25) (5,25) (7,25) (5,25) (1,12) DM2 EXP SEC (5,25) MBS (7,5) (7,25) TBI (14,6) (1,12) (14,6) EXP SEC MBS TBI (5,25) (7,25) (7,25) (7,5) (5,25) (1,12) DM4 EXP SEC (1,12) MBS (7,5) (7,5) TBI (7,5) (5,25) (7,25) EXP SEC MBS TBI (5,25) (7,25) (5,25) (7,25) (6,26) (14,6) DM5 EXP SEC (6,26) MBS (14,6) (14,6) TBI (7,25) (1,12) (1,12) (7,25) In Step 7, QPFN for the relation matrix is constructed using Eq. (54). The detail of result is given in Table A5. In Step 8, the quantum picture fuzzy rough sets for the relation matrix are determined with Eq. (55). Table A6 presents the relevant results. Step 9 is the step defuzzified the values for the criteria using Eq. (56). The defuzzified values is shown in Table A7. In Step 10, the relationship matrix is normalized with Equations (57)-(59). The results are exhibited in Table A8. In Step 11, sj, kj, qj, and wj values are calculated. The values are given in Table A9. In Step 12, relation matrix and the directions among the criteria are constructed. The details of results are presented in Table A10. Finally, the matrix is stabilized. The result is shown in Table 5. Table 5 Stable Matrix EXP SEC MBS TBI EXP .233 .233 .233 .233 SEC .275 .274 .275 .275 MBS .231 .231 .231 .231 TBI .261 .261 .261 .261 According to Table 5, the most important criterion is SEC, while the second most important criterion is TBI. Because the Stable matrix values of these two criteria are the highest. In the order of importance of the criteria, MBS ranks last. Page 16/24 4.3. Ranking the identity management choices for Non-Fungible Tokens in the Metaverse with QPFR-VIKOR In Step 13, emotional expressions for the alternatives are collected. For this purpose, alternatives are determined first. The alternatives considered in the study are presented with their codes in Table 6. Table 6 Strategies of managing NFT in Metaverse Alternatives Codes A1: Biometrics for unique identification BIO A2: User verification using real identities VER A3: Decentralization by removing central authorities DEC A4: Privacy with authentication PRI Then, the observed unit combinations of emotional expressions for the alternatives are obtained using Eq. (60). The obtained values are presented in Table 7. Page 17/24 Table 7 Observed action unit combinations of emotional expressions for the alternatives DM1 EXP SEC MBS TBI BIO (6,12) (27,26) (7,6) (1,2) VER (27,26) (2,25) (7,6) (15,1) DEC (1,2) (15,1) (15,1) (14,27) PRI (2,25) (2,25) (1,2) (27,26) EXP SEC MBS TBI BIO (2,25) (27,26) (14,25) (1,2) VER (2,25) (27,26) (7,6) (1,2) DEC (7,6) (14,27) (14,27) (15,1) PRI (1,25) (27,26) (14,25) (7,6) EXP SEC MBS TBI BIO (1,25) (27,26) (27,26) (1,2) VER (2,25) (2,25) (14,25) (14,27) DEC (7,6) (7,6) (14,27) (15,27) PRI (1,2) (1,2) (1,2) (1,2) EXP SEC MBS TBI BIO (6,12) (27,26) (1,2) (1,2) VER (2,25) (27,26) (14,25) (1,2) DEC (2,25) (7,6) (1,2) (7,6) PRI (1,25) (2,25) (1,2) (27,26) DM2 DM4 DM5 In Step 14, QPFN for the decision matrix is constructed in Table A11. Step 15 involves determining the quantum picture fuzzy rough sets for the decision matrix. The set is given in Table A12. With Step 16, the defuzzified decision values in Table A13 are calculated. In Step 17, S, R and Q values are constructed using Equations (61)-(65). The value is given in Table A14. Step 18 is about comparison of results with sensitivity analysis. In this step, the results of two methods are compared with four different cases. The results obtained are shared in Table 8. Page 18/24 Table 8 Comparative ranking values with sensitivity analysis Extended VIKOR (v:0.5) Case 1 Case 2 Case 3 Case 4 BIO 1 1 1 1 VER 3 3 3 3 DEC 4 4 4 4 PRI 2 2 2 2 Case 1 Case 2 Case 3 Case 4 BIO 1 1 1 1 VER 3 3 3 3 DEC 4 4 4 4 PRI 2 2 2 2 Extended TOPSIS In case of maximum group utility, veto, and consensus, biometrics for unique identification has the best ranking performance among the alternatives. Privacy with authentication plays also critical role for the effectiveness of this process. 5. Discussion It has been determined that security must be ensured first to increase the use of non-fungible tokens on the Metaverse platform. A secure platform allows users to feel safe regarding these tokens. In other words, if personal data can be securely protected, investors' anxiety will decrease, and they will prefer this platform more. Moreover, non-fungible tokens can represent assets of very high value. Thanks to the security of the platform, the risk of theft of these assets can be minimized. In addition, these tokens also contribute to ensuring payment security. These issues allow investors to prefer this platform more. In this context, it is appropriate to take some precautions to increase security. For example, authentication methods need to be strengthened to ensure the security of user accounts. Cruz et al. (2024) mentioned that the application of a double control system helps minimize the risks in the process. On the other hand, Lekhi (2024) underlined that security audits should be performed on the system at regular intervals. As a result of the findings obtained in these inspections, more effective security measures should be designed. Similarly, Kizza (2024) identified that educating users on security issues raises awareness about these measures. This situation helps to significantly reduce security problems. It is also identified that the technological infrastructure must be sufficient to increase the use of non-fungible tokens on the Metaverse platform. High technological infrastructure allows faster solutions to possible problems. On the other hand, businesses must have sufficient technological infrastructure so that many people can operate smoothly on this platform. Moreover, the development of technological infrastructure helps to implement transactions on the blockchain system more securely. This allows the trading volume on the platform to be increased. Due to these issues, businesses need to take some actions to improve the technological infrastructure. In this context, Messina et al. (2024) concluded that performance analysis should be carried out by performing regular checks on the platform. As a result of these analyses, necessary steps can be taken to use more up-to-date technology. Additionally, Alt et al. (2024) and Pineda et al. (2024) stated that appropriate mobile applications should be developed so that users can access the platform via mobile devices. This situation allows more investors to trade on this platform. 6. Conclusion In this study, it is aimed to identify the appropriate the identity management choices of non-fungible tokens in the Metaverse. There are three different stages in the proposed novel fuzzy decision-making model. The first stage includes prioritizing the expert choices with artificial intelligence-based decisionmaking methodology. In the second stage, the criteria sets for managing non-fungible tokens are weighted by using Quantum picture fuzzy rough setsbased M-SWARA methodology. Thirdly, the identity management choices regarding non-fungible tokens in the Metaverse are ranked with Quantum picture fuzzy rough sets oriented VIKOR. It is concluded that security must be ensured first to increase the use of non-fungible tokens on the Metaverse platform. Furthermore, technological infrastructure must also be sufficient to achieve this objective. Moreover, biometrics for unique identification has the best ranking performance among the alternatives. Privacy with authentication plays also critical role for the effectiveness of this process. The main contribution of this study is that artificial intelligence methodology is integrated to the fuzzy decision-making modelling to differentiate the experts. With the help of this situation, it can be possible to create clusters for the experts. Hence, the opinions of experts outside this group may be excluded from the scope. Similarly, M-SWARA methodology is preferred to weight the determinants. Owing to this issue, the causal directions among these Page 19/24 items can be considered. The main limitation of this study is making a general evaluation with respect to the effectiveness of the non-fungible tokens in Metaverse platform. Thus, in the following studies, an industry-specific examination can also be performed. With the help of these analysis results, more specific strategies can be presented for these industries. On the other side, there are also some limitations in the proposed model. In this study, artificial intelligence methodology is integrated to the fuzzy decision-making modelling to differentiate experts. However, the weights of these experts are not calculated. Therefore, for the future research direction, these weights can also be identified by considering artificial intelligence theory. Declarations Conflict of Interest About the publication of this manuscript the authors declare that they have no conflict of interest. Ethics Declaration Statement The authors state that this is their original work and it is neither submitted nor under consideration in any other journal simultaneously. Human and Animal Participants: This article does not contain any studies with human participants or animals performed by any of the authors. Funding Statement No funding is received for this submission. Author Contribution Gang Kou: Conceptualization, Investigation, Methodology, Software, Validation, Formal analysis, Visualization, Data Curation, Writing - Original Draft, Review & Editing. Hasan Dinçer: Investigation, Project administration, Writing - Original Draft, Review & Editing. Dragan Pamucar: Visualization, Data Curation, Writing - Original Draft, Review & Editing. Serhat Yüksel: Resources, Visualization, Writing - Original Draft, Review & Editing. Muhammet Deveci: Investigation, Project administration, Writing - Original Draft, Review & Editing.Gabriela Oana Olaru: Resources, Visualization, Writing - Original Draft, Review & Editing. Serkan Eti: Investigation, Project administration, Writing - Original Draft, Review & Editing. Data Availability The data will be available on reasonable request. References 1. Ahmad U, Khan A, Shhazadi S (2024) Extended ELECTRE I method for decision-making based on 2-tuple linguistic q-rung picture fuzzy sets. Soft Comput, 1–42 2. Ali O, Momin M, Shrestha A, Das R, Alhajj F, Dwivedi YK (2023) A review of the key challenges of non-fungible tokens. Technol Forecast Soc Chang 187:122248 3. Alkhader W, Jayaraman R, Salah K, Sleptchenko A, Antony J, Omar M (2023) Leveraging blockchain and NFTs for quality 4.0 implementation in digital manufacturing. J Manuf Technol Manage 34(7):1208–1234 4. Alt R, Fridgen G, Chang Y (2024) The future of fintech—Towards ubiquitous financial services. Electron Markets 34(1):3 5. Behl A, Pereira V, Nigam A, Wamba S, Sindhwani R (2024) Knowledge development in non-fungible tokens (NFT): a scoping review. J Knowl Manage 28(1):232–267 6. Belk R, Humayun M, Brouard M (2022) Money, possessions, and ownership in the Metaverse: NFTs, cryptocurrencies, Web3 and Wild Markets. J Bus Res 153:198–205 7. Bonnet S, Teuteberg F (2023) Impact of blockchain and distributed ledger technology for the management of the intellectual property life cycle: A multiple case study analysis. Comput Ind 144:103789 8. Brickman A, Baykara Y, Carabaño M, Hacking SM (2024) Whole slide images as non-fungible tokens: A decentralized approach to secure, scalable data storage and access. J Pathol Inf 15:100350 9. Cakir D, Arica N (2024) Boosting Facial Action Unit Detection with CGAN-Based Data Augmentation. Decision Making in Healthcare Systems. Springer International Publishing, Cham, pp 323–335 Page 20/24 10. Carayannis E, Kostis P, Dinçer H, Yüksel S (2023) Quality Function Deployment-Oriented Strategic Outlook to Sustainable Energy Policies Based on Quintuple Innovation Helix. J Knowl Econ, 1–19 11. Chohan R, Paschen J (2023) NFT marketing: How marketers can use nonfungible tokens in their campaigns. Bus Horiz 66(1):43–50 12. Costantiello A, Leogrande A (2024) The regulatory quality in the light of environmental, social and governance framework at world level. Discover Global Society 2(1):1–20 13. Cruz G, Guimarães T, Santos MF, Machado J (2024) Decentralize Healthcare Marketplace. Procedia Comput Sci 231:439–444 14. Davies J, Sharifi H, Lyons A, Forster R, Elsayed OKSM (2024) Non-fungible tokens: The missing ingredient for sustainable supply chains in the metaverse age? Transp Res E 182:103412 15. Delgado-von-Eitzen C, Anido-Rifón L, Fernández-Iglesias MJ (2024) NFTs for the Issuance and Validation of Academic Information That Complies with the GDPR. 14(2):706Applied Sciences 16. Du P, Zhou B, Yang M (2024) Carbon emission reduction contribution analysis of electricity enterprises in urban green development: A quantum spherical fuzzy sets-based decision framework. Technol Forecast Soc Chang 200:123181 17. Ecer F, Murat T, Dinçer H, Yüksel S (2024) A fuzzy BWM and MARCOS integrated framework with Heronian function for evaluating cryptocurrency exchanges: a case study of Türkiye. Financial Innov 10(1):31 18. Fan Y, Wei Y, Xu L, Chen X, Liang X (2023) The special issue:Financial innovation for Emission Trading Scheme. Financial Innov 9(1):58 19. Göller PJ, Reicherts P, Lautenbacher S, Kunz M (2024) Vicarious facilitation of facial responses to pain. Eur J Pain 28(1):133–143 20. Hou D (2024) Music photonic signal analysis based health monitoring system using classification by quantum machine learning techniques. Opt Quant Electron 56(3):338 21. Hu BQ, Yiu KFC (2024) A bipolar-valued fuzzy set is an intersected interval-valued fuzzy set. Inf Sci 657:119980 22. Huynh-The T, Gadekallu TR, Wang W, Yenduri G, Ranaweera P, Pham QV, Liyanage M (2023) Blockchain for the metaverse: A Review. Future Generation Computer Systems 23. Kahraman C (2024) Proportional picture fuzzy sets and their AHP extension: Application to waste disposal site selection. Expert Syst Appl 238:122354 24. Kizza JM (2024) Blockchains, Cryptocurrency, and Smart Contracts Technologies: Security Considerations. Guide to Computer Network Security. Springer International Publishing, Cham, pp 575–600 25. Ko K, Jeong T, Woo J, Hong JWK (2023) Survey on blockchain-based non‐fungible tokens: History, technologies, standards, and open challenges. Int J Network Manage, e2245 26. Kong G, Ma Y, Xing Z, Xin X (2024) Multi-view K-means clustering algorithm based on redundant and sparse feature learning. Physica A 633:129405 27. Kou G, Dinçer H, Yüksel S, Deveci M (2023) Synergistic integration of digital twins and sustainable industrial internet of things for new generation energy investments. J Adv Res. 28. Lee CT, Shen YC, Li Z, Xie HH (2024) The effects of non-fungible token platform affordances on customer loyalty: A Buyer–Creator duality perspective. Comput Hum Behav 151:108013 29. Lee CT, Shen YC, Li Z, Xie HH (2024) The effects of non-fungible token platform affordances on customer loyalty: A Buyer–Creator duality perspective. Comput Hum Behav 151:108013 30. Lee SS (2024) Satellite constellation method for ground targeting optimized with K-means clustering and genetic algorithm. Eng Appl Artif Intell 129:107509 31. Lee WJ (2023) Extended model to explain customer attitude toward NFT and moderating effect of technology optimism. China Finance Review International. (ahead-of-print) 32. Lekhi P (2024) Megatrends and Innovations Shaping the Future of Finance. Innovation, Sustainability, and Technological Megatrends in the Face of Uncertainties: Core Developments and Solutions. Springer Nature Switzerland, Cham, pp 41–53 33. Li S, Chen Y (2023) How nonfungible tokens empower business model innovation. Bus Horiz 66(4):543–554 34. Liu L, Hu X, Chen J, Wu R, Chen F (2024) Embedded Scenario Clustering for Wind and Photovoltaic Power, and Load Based on Multi-Head SelfAttention. Prot Control Mod Power Syst 9(1):122–132 35. Mancuso I, Petruzzelli AM, Panniello U (2023) Digital business model innovation in metaverse: How to approach virtual economy opportunities. Inf Process Manag 60(5):103457 36. Messina M, Keller D, Freitas B, Simurra I, Gómez C, Aliel L (2024) Disruptions, technologically convergent factors and creative activities: defining and delineating musical stuff. Digit Creativity, 1–18 37. Meyns SC, Dalipi F (2022) What users tweet on NFTs: mining Twitter to understand NFT-related concerns using a topic modeling approach. IEEE Access 10:117658–117680 38. Mikhaylov A, Bhatti IM, Dinçer H, Yüksel S (2024) Integrated decision recommendation system using iteration-enhanced collaborative filtering, golden cut bipolar for analyzing the risk-based oil market spillovers. Comput Econ 63(1):305–338 39. Mikhaylov A, Bhatti IM, Dinçer H, Yüksel S (2024) Integrated decision recommendation system using iteration-enhanced collaborative filtering, golden cut bipolar for analyzing the risk-based oil market spillovers. Comput Econ 63(1):305–338 40. Mikhaylov A, Dinçer H, Yüksel S, Pinter G, Shaikh ZA (2023) Bitcoin mempool growth and trading volumes: Integrated approach based on QROF MultiSWARA and aggregation operators. J Innov Knowl 8(3):100378 Page 21/24 41. Mosna A, Soana G (2023) NFTs and the virtual yet concrete art of money laundering. Comput Law Secur Rev 51:105874 42. Pineda M, Jabba D, Nieto-Bernal W (2024) Blockchain Architectures for the Digital Economy: Trends and Opportunities. Sustainability 16(1):442 43. Rahadian D, Firli A, Dinçer H, Yüksel S, Mikhaylov A, Ecer F (2024) A hybrid neuro fuzzy decision-making approach to the participants of derivatives market for fintech investors in emerging economies. Financial Innov 10(1):37 44. Rahman J, Jin Y (2023) The control of tax corruption: evidence from nonfungible token market in China. Journal of Money Laundering Control 45. Rani P, Chen SM, Mishra AR (2024) Multi-attribute decision-making based on similarity measure between picture fuzzy sets and the MARCOS method. Inf Sci 658:119990 46. Rani P, Sachan RK, Kukreja S (2023) Academic Payment Tokenization: An Online Payment System for Academia Utilizing Non-Fungible Tokens and Permissionless Blockchain. Procedia Comput Sci 230:347–356 47. Razzaque H, Ashraf S, Naeem M, Chu YM (2024) The Spherical q-Linear Diophantine Fuzzy Multiple-Criteria Group Decision-Making Based on Differential Measure. CMES-Computer Model Eng Sci, 138(2) 48. Schlatt V, Guggenberger T, Schmid J, Urbach N (2023) Attacking the trust machine: Developing an information systems research agenda for blockchain cybersecurity. Int J Inf Manag 68:102470 49. Sun F (2023) Continuous Use of NFT Trading Platforms: A Perspective Integrating the Expectation Confirmation Model and the Information Systems Success Model. IEEE Access 50. Westermann JF, Schäfer R, Nordmann M, Richter P, Müller T, Franz M (2024) Measuring facial mimicry: Affdex vs. EMG. PLoS ONE, 19(1), e0290569 51. Wu CH, Liu CY, Weng TS (2023) Critical Factors and Trends in NFT Technology Innovations. Sustainability 15(9):7573 52. Wu L, Lu W, Peng Z, Webster C (2023) A blockchain non-fungible token-enabled ‘passport’for construction waste material cross-jurisdictional trading. Autom Constr 149:104783 53. Yang W (2024) Analysis and Application of Big Data Feature Extraction Based on Improved k-means Algorithm. Scalable Computing: Practice and Experience 25(1):137–145 54. Yue C (2024) A software trustworthiness evaluation methodology for cloud services with picture fuzzy information. Appl Soft Comput, 111205 Figures Page 22/24 Figure 1 The flowchart of hybrid model Figure 2 Page 23/24 The plot of the WCSS values and k numbers Supplementary Files This is a list of supplementary files associated with this preprint. Click to download. Appendix.docx Page 24/24