On Some Bounds of Fuzzy Secure Domination Number
DOI:
https://doi.org/10.26713/cma.v16i3.3205Keywords:
Fuzzy graphs, Fuzzy secure domination, Fuzzy secure total domination, Fuzzy secure total domination numberAbstract
In a fuzzy graph \(G_f(\rho, \eta)\) with vertex set \(V\), a subset \(D \subseteq V\) is called a dominating set if each vertex in the graph is either a member of \(D\) or has at least one strong neighbor in \(D\). A secure dominating set \(S\) is a dominating set with the additional property that every vertex outside \(S\) has a strong neighbor in \(S\), that can swap places with it and still maintain domination. The minimum fuzzy cardinality of such secure dominating sets is called the secure domination number, denoted \(\gamma_{sc}(G_f)\). This paper explores bounds for the fuzzy secure domination number and examines its relationship with the domination number, independence number, and matching number.
Downloads
References
E. J. Cockayne and S. T. Hedetniemi, Towards a theory of domination in graphs, Networks 7(3) (1977), 247 – 261, DOI: 10.1002/net.3230070305.
E. J. Cockayne, P. J. P. Grobler, W. R. Grundlingh, J. Munganga and J. V. Vuuren, Protection of a graph, Utilitas Mathematica 67 (2005), URL: https://utilitasmathematica.com/index.php/Index/article/view/370.
L. Euler, Solutio problematis ad geometriam situs pertinentis, Commentarii academiae scientiarum Petropolitanae, (1741), 128 – 140, URL: https://scholarlycommons.pacific.edu/cgi/viewcontent.cgi?article=1052&context=euler-works.
T. W. Haynes, S. Hedetniemi and P. Slater, Fundamentals of Domination in Graphs, 1st edition, CRC Press, Boca Raton, 464 pages (2013), DOI: 10.1201/9781482246582.
M. C. Joy and P. Isaac, Secure domination in fuzzy graph using strong arcs, Bulletin of Kerala Mathematical Association 17(2) (2023), 103 – 108.
M. G. Karunambigai, S. Sivasankar and K. Palanivel, Secure domination in fuzzy graphs and intuitionistic fuzzy graphs, Annals of Fuzzy Mathematics and Informatics 14(4) (2017), 419 – 431, URL: https://www.kci.go.kr/kciportal/landing/article.kci?arti_id=ART002275036.
W. Klostermeyer and C. M. Mynhardt, Secure domination and secure total domination in graphs, Discussiones Mathematicae Graph Theory 28(2) (2008), 267 – 284, DOI: 10.7151/dmgt.1405.
S. Mathew, J. N. Mordeson and D. S. Malik, Fuzzy Graph Theory, Springer Cham., xvii + 320 pages, 2018, DOI: 10.1007/978-3-319-71407-3.
H. B. Merouane and M. Chellali, On secure domination in graphs, Information Processing Letters 115(10) (2015), 786 – 790, DOI: 10.1016/j.ipl.2015.05.006.
A. Nagoorgani and V. T. Chandrasekaran, Domination in fuzzy graph, Advances in Fuzzy Sets and Systems 1(1) (2006), 17 – 26.
O. Ore, Theory of Graphs, Vol. 38, American Mathematical Society, Providence, Rhode Island, x + 270 pages (1962).
A. Rosenfeld, Fuzzy graphs, in Fuzzy Sets and their Applications to Cognitive and Decision Processes, Academic Press, pp. 77–95 (1975), DOI: 10.1016/B978-0-12-775260-0.50008-6.
A. Somasundaram and S. Somasundaram, Domination in fuzzy graphs – I, Pattern Recognition Letters 19(9) (1998), 787 – 791, DOI: 10.1016/S0167-8655(98)00064-6.
R. T. Yeh and S. Y. Bang, Fuzzy relations, fuzzy graphs, and their applications to clustering analysis, in Fuzzy Sets and their Applications to Cognitive and Decision Processes, Academic Press, pp. 125 – 149 (1975), DOI: 10.1016/B978-0-12-775260-0.50010-4.
L. A. Zadeh, Fuzzy sets, Information and Control 8(3) (1965), 338 – 353, DOI: 10.1016/S0019-9958(65)90241-X.
Downloads
Published
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a CCAL that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.



