Professional Documents
Culture Documents
Domination Integrity and Efficient Fuzzy Graphs: Neural Computing and Applications July 2020
Domination Integrity and Efficient Fuzzy Graphs: Neural Computing and Applications July 2020
net/publication/336819700
CITATIONS READS
7 724
4 authors:
All content following this page was uploaded by R. Sundareswaran on 12 March 2022.
ORIGINAL ARTICLE
Abstract
In this paper, domination integrity of fuzzy graph and efficient fuzzy graph concepts is introduced with examples. An
algorithm is developed to find whether an arc is strong or not. If it is strong, another algorithm will classify it as a strong arc
and b strong arc. The next algorithm is used to find whether the given fuzzy graph is a fuzzy tree or not. Domination and
integrity are two different parameters used to define the stability of a graph in various situations. Using the strong arc
concept a new parameter, domination integrity is defined and lower and upper bounds are found. This paper discusses the
domination integrity for standard graphs such as path, cycle and complete graph. The domination integrity for Cartesian
product of fuzzy graphs is also discussed. Finally, the new class of fuzzy graph, efficient fuzzy graph, is introduced.
Efficient fuzzy graph is a special type of fuzzy graph that has the same dominating set, other than vertex set V, for both
fuzzy graph and its underlying crisp graph.
123
Neural Computing and Applications
Integrity results of total graphs, middle graphs and hub vertex set into vertex subsets with some properties. Clus-
integrity are found in [8–10]. Other vulnerability parame- tering using neighborhood information and weighted
ters such as edge integrity [11], rupture [12], scattering MUSE for subgraph pattern are discussed in [50, 51]. But
number [13], tenacity [14] and toughness [15] play a vital the algorithms developed in this paper classify the edges as
role in analyzing the stability of network. strong edges, and using these strong edges, domination
Domination integrity was defined by Sundareswaran property is defined. With these dominating sets, integrity
et al. in [16]. They developed the domination integrity property is discussed.
concepts in middle graphs [17], in trees [18], in powers of Probabilistic graph models are graph with probability
cycles [19] and in gear graphs [20]. The global domination values as edge membership values and vertex membership
number was introduced by Sampathkumar in [21], and the values need not be less than one. But in fuzzy graphs, both
global domination integrity was introduced and further edge membership value and vertex membership value
discussed by Sultan Senan Mahde et al. in [22]. should be less than one, satisfying the condition that the
Basic fuzzy concepts like fuzzy sets and fuzzy relations edge membership value must be less than or equal to the
were introduced in 1965 in [23] by Zadeh. He proved basic membership values of the incident vertices. Reducing some
theorems and defined fuzzy tree, connectedness, bridges edges has a high impact on the stability of the graphs. Such
and cut nodes. Rosenfeld developed fuzzy graphs from edges which affect the stability of the graph are discussed
fuzzy relations in [24]. Bhutani and Rosenfeld defined in the name of strong edges in fuzzy graphs.
strong arcs and fuzzy end nodes in [25] and discussed some
basic properties. These strong arcs are further classified as 1.1 Motivation
alpha, beta and gamma arcs in [26] by Mathew and Suni-
tha. The fuzzy domination theory was introduced by In crisp graph, every edge and every vertex have equal
Somasundaram and Somasundaram [27]. They developed importance. But in fuzzy graph, every vertex and every edge
the fuzzy domination theory by using effective edge. This have their own importance in terms of fuzziness. The fuzzified
concept was extended to union, join and composition of arcs are classified as strong and non-strong arcs. There are
fuzzy graph by Somasundaram in [28]. This concept was many interesting results found in [25, 26] using strong arcs.
redefined by Nagoorgani in [29, 30] by means of strong But still there is no algorithm to identify strong arcs in a fuzzy
arcs and strong neighborhood. Some results in [27] were graph. This paper attempts to frame an algorithm to identify
modified by Sunitha in [31]. Metrics in fuzzy graphs are whether an arc is strong or not. Also there is no algorithm to
found in [32]. OT Manjusha et al. define strong domination classify a fuzzy graph as fuzzy tree or not. This paper tries to
by using strong arcs in [33]. In [34], the fuzzy vertex bring out an algorithm to find fuzzy tree. Any connectivity
integrity concept was introduced and the vertex integrity parameter dealt in graph does not consider the stability of the
value of some standard graphs was discussed. Edge network. The stability of a network is guaranteed by the
integrity of fuzzy graphs was found in [35]. Vertex integ- vulnerability parameter and integrity. The domination integ-
rity and edge integrity values of join, union and Cartesian rity is a new parameter that deals with the stability of the graph
product of fuzzy graph are discussed in [36]. The appli- and also the domination property.
cation of power domination in electrical network is found
in [37]. 1.2 Organization of the paper
Special types of fuzzy graphs such as fuzzy planar
graphs, k-competition fuzzy graphs and p-competition This paper deals with fuzzy domination integrity, which
fuzzy graphs, m-step fuzzy competition graphs and bipolar provides the reliability of the graph and also covers other
fuzzy hypergraphs were discussed by Samanta, Pal in vertices by means of dominating set. Section 1 introduces
[38–41]. Interval-valued fuzzy graph, antipodal interval- the concept of the paper. Section 2 lists out all the basic
valued fuzzy graphs and irregular interval-valued fuzzy definitions in fuzzy graphs. Section 3 discusses the algo-
graphs were discussed by H. Rashmanlou, M. Pal in rithm to find strong arcs, classification of strong arcs and
[42–44]. fuzzy tree in fuzzy graph. Section 4 gives the formal def-
Node strength sequence of fuzzy graph is defined and its inition for domination integrity in fuzzy graph with
properties are studied in [45]. An another sequence such as example. It also discusses the basic results in domination
graphic integer sequence in graph integrity was found in integrity for standard graphs like path, cycle, complete
[46]. Dominating sets are needed to observe the domination graph, bipartite graph and Cartesian product of K2 with Pn .
integrity parameter. Fuzzy planar graphs are discussed in Section 5 deals with efficient fuzzy graph. Formal defini-
[47]. Clustering techniques are different from domination tion and explanation are given with examples. Section 6
integrity parameter. Density-based clustering techniques gives a practical situation dealing with domination integrity
[48], a maximal clique sets [49], are decomposing the in fuzzy graph.
123
Neural Computing and Applications
2 Preliminaries—fuzzy graphs where ai;j , which is a upper triangular matrix, defines the
connectedness between the vertices ui and uj . That is,
Let G : ðr; lÞ be a fuzzy graph with a pair of functions
CONNðui ; uj Þ; i[j
defined as r : V ! ½0; 1 and l : V V ! ½0; 1 such that ai;j ¼
; otherwise:
lðx; yÞ minðrðxÞ; rðyÞÞ; ð¼ rðxÞ ^ rðyÞÞ for all x, y in V.
The underlying crisp graph is denoted by G : ðV; EÞ, It is clear that the last row of the matrix does not have
where V is the vertex of G and E V V. The fuzzy any values. Ignoring the last row, the order of the matrix is
graph H : ðs; tÞ is a subgraph of G : ðr; lÞ if sðuÞ rðuÞ n 1 n.
and tðu; vÞ lðu; vÞ for all u, v in V. The fuzzy subgraph
Definition 4 Connectivity adjacency matrix
Hðs; tÞ spans the fuzzy graph G ¼ ðr; lÞ if sðuÞ ¼ rðuÞ for
In the connectivity matrix C(G), every value is associ-
all u in V. A path Pn is a sequence of n distinct nodes
ated with an edge membership value of some edge. If the
u1 ; u2 ; u3 ; . . .; un such that lðui1 ; ui Þ [ 0, 1 i n. The
corresponding edge is not adjacent to that vertex, then
length of the path is defined as the number of edges in that
ignore that value. This modified matrix is known as
path. The strength of path is defined as the membership
connectivity adjacency matrix, denoted by CA(G). In this
value of weakest edges in that path. If any two nodes of the
matrix, finding the maximum via column and then by row
fuzzy graph G is connected by a path, then G is a connected
gives the strong arcs of the fuzzy graph G.
fuzzy graph. Pn is called fuzzy cycle if u1 ¼ un , n 3, and
it contains more than one weak arc. The connectedness of u Example 1 Consider the fuzzy graph G ¼ ðr; lÞ, with 5
and v is defined as the maximum strength of all paths vertices, V ¼ a; b; c; d; e with lða; bÞ ¼ 0:2, lðb; cÞ ¼ 0:3,
between u and v, and it is denoted by CONNG ðu; vÞ. The lðc; dÞ ¼ 0:2, lðd; eÞ ¼ 0:4, lðe; aÞ ¼ 0:5 as shown in
vertex cardinality of S ð VÞ is sum of vertex membership Fig. 1. Since the definition of strong arc is independent of
values of S. The complement G ¼ ðr; lÞ of G ¼ ðr; lÞ is vertex membership values, we may assign any value so that
defined as r ¼ r, lðu; vÞ ¼ rðuÞ ^ rðvÞ lðu; vÞ for all u, it does not affect the definition of fuzzy graph G.
v in V. The edge cardinality of S ð EÞ is sum of edge The connectivity matrix of fuzzy graph, in Fig. 1, is
membership values in S. Order of the fuzzy graph is total 0 1
sum of all vertex membership values of G and size of the 0:2 0:2 0:4 0:5
B 0:3 0:2 0:2 C
fuzzy graph is total sum of all edge membership values of B C
CMðGÞ ¼ B C:
G. @ 0:2 0:2 A
0:4
3 Algorithm for classification of strong arcs The (1, 4) value of the matrix is 0.4 which associates
and fuzzy tree CONN(a, d), corresponds to the edge (d, e) and is not
adjacent to vertex a. So, ignore the value. Proceeding in a
Definition 1 An arc (u,v) of a fuzzy graph G : ðr; lÞ is similar manner with all the entries in the matrix, the con-
called strong arc if lðu; vÞ CONNGðu;vÞ ðGÞ [25]. nectivity matrix CM(G) becomes connectivity adjacency
matrix,
Definition 2 A strong arc (u, v) is called a strong arc if its
weight is greater than the connectedness of u, v when it is
deleted.
A strong arc (u, v) is called b strong arc if its weight is
equal to the connectedness of u, v when it is deleted.
All the remaining arcs are known as d-arc of fuzzy graph
G [26].
123
Neural Computing and Applications
123
Neural Computing and Applications
123
Neural Computing and Applications
Example 5 Consider the fuzzy graph G : ðr; l) with ver- Theorem 3 Let G : ðr; lÞ be a fuzzy graph. DI f ðGÞ ¼ p if
tices V ¼ fa; b; c; dg having rðaÞ ¼ 0:3, rðbÞ ¼ 0:4, and only if G is either complete fuzzy graph or complement
rðcÞ ¼ 0:7, rðdÞ ¼ 0:65, lða; bÞ ¼ 0:3, lða; dÞ ¼ 0:3, of complete fuzzy graph.
lðb; cÞ ¼ 0:2, lðc; dÞ ¼ 0:65, lðb; dÞ ¼ 0:3.
Proof Let G : ðr; lÞ be a complete fuzzy graph. Then any
In this graph, shown in Fig. 5, the arcs subset of V is dominating set of G. Eliminating any subset
(a, b), (a, d), (c, d), (b, d) are strong arcs. The dominating of V, the remaining graph is a single component consisting
sets are S1 ¼ V, S2 ¼ fa; cg and S3 ¼ fb; dg. The domi- of all the remaining vertices. So, domination integrity of G
nation number is cðGÞ ¼ minfjS1 j; jS2 j; jS3 jg ¼ is nothing but order of G. Suppose G is complement of the
minf2:05; 1; 1:05g ¼ 1, which corresponds to S2 . DI f ðGÞ ¼ complete fuzzy graph. Then G is the graph with set of
minf2:05 þ 0; 1 þ 1:05; 1:05 þ 0:7g ¼ 1:75 which corre- isolated vertices; thus, NðuÞ ¼ ; for all u in V. The whole
sponds to the set S3 . Thus, the minimal domination integ- vertex set is the only dominating set of G. For this domi-
rity set is S3 . nating set S, mðG SÞ is zero. Hence, domination integrity
of G is nothing but order of G. Thus, the only dominating
f ðGÞ.
Theorem 1 For any fuzzy graph G : ðr; lÞ, cðGÞ DI
set is V. Therefore, cðGÞ ¼ DI f ðGÞ ¼ p.
Proof The domination number of fuzzy graph depends Conversely, let us assume that domination integrity
only on the fuzzy cardinality of the dominating set. But the number equals order of G. Let S be the dominating set of G.
domination integrity number depends upon the dominating If G S contains more than one component, then sum of
set S and the corresponding maximum order of the com- cardinality of S and mðG SÞ must be less than order of G.
ponent of G S. This implies cðGÞ\ DI f ðGÞ. Equality So, G S must be a single connected component. This is
holds for the fuzzy graph with isolated vertices only. For true for all dominating set, in particular for any singleton
the graph with only isolated vertices, the whole vertex set vertex set. Thus, this singleton vertex sets dominates all the
is the only dominating set. For this set, mðG SÞ ¼ 0 remaining vertices of G. This implies G is a complete fuzzy
f ðGÞ. Hence, cðGÞ DI
implies cðGÞ ¼ DI f ðGÞ. h graph. h
Theorem 2 The domination integrity parameter in fuzzy Definition 12 Complete bipartiate fuzzy graph
graph is a monotonically increasing parameter. A bipartite fuzzy graph G : ðr; lÞ is a fuzzy graph
having non-empty vertex set partition V1 and V2 such that
Let G : ðr; lÞ be a fuzzy graph and H be a subgraph of lðu; vÞ ¼ 0 if u; v 2 V1 or u; v 2 V2
G. Using induction principle, we can easily verify A complete bipartite fuzzy graph G : ðr; lÞ is a bipartite
f ðHÞ DI
DI f ðGÞ. The equality holds, if G and H have same fuzzy graph with lðu; vÞ ¼ rðuÞ ^ rðvÞ for all u 2 V1 and
strong arc edge set and same vertex set. For all the other v 2 V2 [27].
cases, we get the inequality.
Theorem 4 Let G : ðr; lÞ be a complete bipartite fuzzy
f ðGÞ p, where p is the order of fuzzy
Remark 1 cðGÞ DI graph Kr1 ;r2 . The domination integrity of G is
graph. f ðGÞ ¼ minfjV1 j þ maxðr2 ðVÞÞ; jV2 j þ maxðr1 ðVÞÞg
DI
Remark 2 For any fuzzy graph Proof Let G be a complete bipartite fuzzy graph with the
f ðGÞ þ DI
G : ðr; lÞ; DI f ðGÞ
2p. The inequality is trivial bipartion V1 and V2 . By Proposition 4.8 in [36], the dom-
and the equality holds for complete fuzzy graph and its ination set S of G is either V1 or V2 or one vertex from V1
complement and V2 . If S is V1 , then ðG SÞ is a collection of isolated
vertices of V2 Therefore, mðG SÞ ¼ max frðV2 Þg. Simi-
larly, if S is V2 , then ðG SÞ is a collection of isolated
vertices of V1 which implies mðG SÞ ¼ max frðV1 Þg. If
S has one vertex from V1 and other form V2 , then G S
remains a single connected component. Considering the
0.3 0.4 minimum value for the above three dominating sets, we
0.3
a b may ignore the dominating set S, having one vertex in V1
and another one from V2 . Thus, DI f ðGÞ ¼ minfjV1 j þ
0.3 0.2
0.3 maxðr2 ðVÞÞ; jV2 j þ maxðr1 ðVÞÞg. h
123
Neural Computing and Applications
123
Neural Computing and Applications
0.3 0.5 0.4 0.5 Definition 16 An efficient fuzzy graph is a fuzzy graph
a b c d e f that has same domination set as its crisp graph, other than
0.7 0.5 0.6 0.4 0.8 0.63 V.
(a) G1 = (σ1 , μ1 ) (b) G2 = (σ2 , μ2 )
Remark 3 Every fuzzy graph is not an efficient fuzzy
0.4 0.5 graph.
0.4 a,d a,e a,f
0.7
For, consider the fuzzy graph G : ðr; lÞ with VðGÞ ¼
0.63
0.3 0.3 0.3 fa; b; c; dg having membership values rðaÞ ¼ 0:7,
rðbÞ ¼ 0:5, rðcÞ ¼ 0:6, rðdÞ ¼ 0:6, lða; bÞ ¼ 0:3,
0.4 0.5 lðb; cÞ ¼ 0:4, lðc; dÞ ¼ 0:2, lðd; aÞ ¼ 0:1, lðb; dÞ ¼ 0:1.
0.4 b,d b,e b,f
0.5 0.5 The arcs (a, b), (b,c), (c,d) are a strong arcs. It is clear
0.4 0.5 0.5 that fbg and fdg are the domination sets of G*.
But Ns ðbÞ ¼ fa; b; cg and Ns ðdÞ ¼ fc; dg. Therefore,
0.4 0.5 fbg and fdg are not domination sets of G. Hence, G is not
0.4 c,d c,e c,f
0.5 0.5 an efficient fuzzy graph (Fig. 7).
(c) G = G1 × G2 : (σ1 × σ2 , μ1 × μ2 )
Theorem 12 Let G : ðr; lÞ be a fuzzy graph with G as
path Pn . Then G is an efficient fuzzy graph
Fig. 6 Cartesian product of fuzzy graphs
123
Neural Computing and Applications
0.7 0.5 same dominating set. Hence, every strong fuzzy graph is an
0.3 efficient graph. h
a b
6 Application
0.1 0.4
0.1 Suppose we need to cover a group of villages by mobile
phone network towers. Let us assume that every village has
at least one tower. This problem can be modeled into a
d c
0.2 graph theory problem as follows: Every village is denoted
0.6 0.6
by vertex. If the tower placed in a village covers nearby
Fig. 7 Example of not efficient fuzzy graph villages, then it is linked by an edge. Now this problem
turns to finding dominating set. But we cannot assure this
dominating set gives a best model. At the time of natural
Proof Let G : ðr; lÞ be a fuzzy graph with G is a path Pn . disaster, everyone faces network failure. Even though some
If all the arcs are effective arcs, then G and its underlying of the tower fail, it is necessary to cover maximum area.
crisp graph G have same vertex set and edge set. There- Hence, the network provider must consider the network
fore, they have same dominating set. Hence, G is an effi- group which covers the maximum area. This concept is
cient fuzzy graph. Suppose all the arcs are not efficient, it is developed as integrity of graph. Our new parameter con-
necessary to prove that all the arcs which are not efficient siders both integrity and domination. So a domination
are strong arcs. Clearly there exists a unique path between integrity set (set of towers) gives a full coverage and also
any two vertices in Pn . Therefore, deleting any edge dis- assures a better stable network, which covers the maximum
connects the graph and hence reduces the connectedness area. In real-time situations, more than one tower is
between the adjacent vertices. Hence, that edge must be a required at a single place, depending upon the need. So the
strong edge. Thus, the arcs which are not effective are coverage in a particular village is not equal. Considering
strong arcs in Pn . Therefore, G is an efficient graph. h the network coverage in village (vertex) and normalizing to
Theorem 13 Every complete fuzzy graph is an efficient one, the crisp graph is converted into fuzzy graph. There-
fuzzy graph. fore, the domination integrity in fuzzy graph is needed.
The network consists of five villages with mobile tow-
Proof In a complete graph, every vertex set is a domi- ers. In each village, every vertex denotes a tower placed
nating set of G. Since the given fuzzy graph G is complete area. The vertex membership values define the maximum
fuzzy graph, every edge in G is a strong arc. Hence, G and capacity of a tower unit. The edge membership values
G have same edge and vertex set. Hence, they have same denote the network signal strength between two areas
dominating set. Therefore, every complete fuzzy graph is nodes. The problem of failure of some of the towers can be
an efficient fuzzy graph. h addressed using fuzzy graphs. The fuzzy graph G : ðl; rÞ,
Theorem 14 Every fuzzy graph with constant l value is an corresponding to the mobile network, is shown in Fig. 8. It
efficient fuzzy graph. consists of five vertices V ¼ fa; b; c; d; eg having mem-
berships, rðaÞ ¼ 0:6, rðbÞ ¼ 0:6, rðcÞ ¼ 0:7, rðdÞ ¼ 0:9,
Proof By the definition of strong arc, if all the arc values rðeÞ ¼ 0:8, lða; bÞ ¼ 0:4, lða; dÞ ¼ 0:2, lðb; cÞ ¼ 0:5,
are equal then the arcs are b strong arcs. Thus, all the arcs lðb; dÞ ¼ 0:3 , lðc; dÞ ¼ 0:7, lðc; eÞ ¼ 0:2, lðd; eÞ ¼ 0:8.
are become strong arcs. So closed neighborhood set of
every vertex is same for crisp graph G and fuzzy graph G.
Hence, both G and G have same dominating set, making G 0.4
0.6 a b 0.6
an efficient fuzzy graph. h
Theorem 15 Every strong fuzzy graph is an efficient fuzzy 0.2 0.5
graph. 0.3
123
Neural Computing and Applications
Table 1 Domination integrity of fuzzy graph This work further can be extended in bipolar fuzzy
S G–S m (G–S) |S|?m(G–S)
graphs, intuitionistic fuzzy graphs and interval-valued
fuzzy graphs.
fa; dg b–c–e 2.1 3.6
fb; dg {a}, c–e 1.5 3 Acknowledgements The authors thank the Management and the
fb; eg a–d–c 2.2 3.6 Principal, SSN College of Engineering, OMR, Chennai, and Mannar
Thirumalai Naicker College, Pasumalai, Madurai.
fa; b; dg c–e 1.5 3.6
fa; c; dg {b}, {e} 0.8 3
Compliance with ethical standards
fa; e; dg b–c 1.3 3.6
fb; d; eg fag, fcg 0.7 3 Conflict of interest The authors declare that they have no conflict of
fa; b; eg c–d 1.6 3.6 interest.
fb; c; eg a–d 1.5 3.6
fa; b; c; dg feg 0.8 3.6
fa; b; c; eg {d} 0.9 3.6
References
fa; b; d; eg fcg 0.7 3.6
1. Ore O (1962) Theory of graphs. American Mathematical Society,
fa; c; d; eg fbg 0.6 3.6 Providence
fb; c; d; eg fag 0.6 3.6 2. Barefoot CA, Entringer R, Swart H (1987) Vulnerability in
fa; b; c; d; eg ; 0 3.6 graphs—a comparative survey. J Combin Math Combin Comput
1:12–22
3. Barefoot CA, Entringer R, Swart H (1987) Integrity of trees and
powers of cycles. Congr Numer 58:103–114
4. Goddard W (1989) On the vulnerability of graphs, Ph.D. Thesis,
University of Natal, Durban, SA
In this fuzzy graph, the arcs (a, b), (b, c), (c, d), (d, e) are 5. Goddard W, Swart HC (1990) Integrity in graphs: bounds and
strong arcs. The dominating set S, G S, mðG SÞ values basics. J Combin Math Combin 7:139–151
are given in Table 1. In this minfjSj þ mðG SÞg ¼ 3, 6. Goddard W, Swart HC (1988) On the integrity of combinations of
which corresponds to domination set fb; dg; fa; c; dg; graphs. J Combin Math Combin Comput 4:3–18
7. Bagga KS, Beineke LW, Goddard WD, Lipman MJ, Pipert RE
fb; d; eg. Therefore, these sets assure the reliability and (1992) A survey of integrity. Discret Appl Math 37(38):13–28
domination property of the network. Thus, the tower placed 8. Dundar P, Aytac A (2004) Integrity of total graphs via certain
in these nodes gives better coverage even in natural dis- parameters. Math Notes 75(5):665–672
asters, when compared with other nodes. 9. Mamut A, Vumar E (2007) A note on the integrity of middle
graphs. Lect Notes Comput Sci 4381:130–134
10. Mahde SS, Mathad V, Sahal AM (2015) Hub-integrity of graphs.
Bull Int Math Virtual Inst 5:57–64
7 Conclusion 11. Bagga KS, Beineke LW, Lipman MJ, Pippert RE (1994) Edge-
integrity: a survey. Discret Math 124:3–12
12. Li Y, Zhang S, Li X (2005) Rupture degree of graphs. Int J
This paper is aimed to discuss an algorithm to find out the Comput Math 82(7):793–803
strong arcs and to classify the strong arcs as a; b; d arcs in 13. Jung HA (1978) On a class of posets and the corresponding
fuzzy graphs. A new algorithmic procedure is presented to comparability graphs. J Combin Theory Ser B 24(2):125–133
find whether the given fuzzy graph, is a fuzzy tree or not. A 14. Cozzens M, Moazzami D, Stueckle S (1992) The tenacity of a
graph. Graph theory, combinatorics, and algorithms, vol 1, 2.
new vulnerability parameter, domination integrity of fuzzy Wiley, New York, pp 1111–1122
graph is defined to study the stability and domination 15. Bauer D, Broersma H, Schmeichel E (2006) Toughness in graphs:
property of fuzzy graphs. The domination integrity of a survey. Graphs Combin 22:1–35. https://doi.org/10.1007/
cycle, path and complete bipartite fuzzy graph is calcu- s00373-006-0649-0
16. Sundareswaran R, Swaminathan V (2009) Domination integrity
lated. The necessary and sufficient conditions for complete in graphs. Proc Int Conf Math Exp Phys Prague 3–8:46–57
fuzzy graph and complement of complete fuzzy graph are 17. Sundareswaran R, Swaminathan V (2010) Domination integrity
provided. The upper and lower bounds for Cartesian pro- of middle graphs. In: Chelvam T, Somasundaram S, Kala R (eds)
duct of G1 G2 with G1 is K2 . Finally, a new class of Algebra, graph theory and their applications. Narosa Publishing
House, New Delhi, pp 88–92
fuzzy graph, efficient fuzzy graph, is introduced. Fuzzy 18. Sundareswaran R, Swaminathan V (2010) Domination integrity
graph and efficient fuzzy graph are distinguished. It is in trees. Bull Int Math Virtual Inst 2:153–161
established that complete fuzzy graph and strong fuzzy 19. Sundareswaran R, Swaminathan V (2011) Domination integrity
graph are efficient fuzzy graphs. Basic theorems in efficient of powers of cycles. Int J Math Res 3(3):257–265
20. Sundareswaran R, Swaminathan V (2016) Integrity and domi-
fuzzy graphs and the application of these concepts are nation integrity of gear graphs. J Appl Eng Math 6(1):54–64
illustrated for a mobile tower coverage problem discussed. 21. Sampathkumar E (1989) The global domination number of a
graph. J Math Phys Sci 23:377–385
123
Neural Computing and Applications
22. Mahde SS, Mathad V (2017) Global domination integrity of 40. Samanta S, Pal M (2012) Bipolar fuzzy hypergraphs. Int J Fuzzy
graphs. Math Sci Lett 6:263–269 Logic Syst 2(1):17–28
23. Zadeh LA (1965) Fuzzy sets. Inf Control 8(3):338–353 41. Samanta S, Akram M, Pal M (2015) m-step fuzzy competition
24. Rosenfeld A (1975) Fuzzy graphs. In: Zadeh LA, Fu KS, Shimura graphs. J Appl Math Comput 47:461–472. https://doi.org/10.
M (eds) Fuzzy sets and their applications. Academic press, New 1007/s12190-014-0785-2
york, pp 77–95 42. Rashmanlou H, Pal M (2013) Isometry on interval-valued fuzzy
25. Bhutani KR, Rosenfeld A (2003) Strong arcs in fuzzy graphs. Inf graphs. Int J Fuzzy Math Arch 3:28–35
Sci 152:319–322 43. Rashmanlou H, Pal M (2013) Antipodal interval-valued fuzzy
26. Mathew S, Sunitha MS (2009) Types of arcs in a fuzzy graphs. graphs. Int J Appl Fuzzy Sets Artif Intell 3:107–130
Inf Sci 179:1760–1768 44. Pal M, Rashmanlou H (2013) Irregular interval—valued fuzzy
27. Somasundaram A, Somasundaram S (1998) Domination in fuzzy graphs. Ann Pure Appl Math 3(1):56–66
graphs-I. Pattern Recognit Lett 19:787–791 45. Mathew S, Sunitha MS (2010) Node connectivity and arc con-
28. Somasundaram A (2005) Domination in fuzzy graphs—II. nectivity of a fuzzy graph. Inf Sci 180(4):519–531
J Fuzzy Math 13(2):281–288 46. Sensarma D, Sen Sarma S (2019) Role of graphic integer
29. Nagoorgani A, Chandrasekaran VT (2006) Domination in fuzzy sequence in the determination of graph integrity. Mathematics
graph. Adv Fuzzy Sets Syst I(1):17–26 7:261
30. Nagoorgani A, Vijayalakshmi P (2011) Insensitive arc in domi- 47. Kalathian S, Ramalingam S, Srinivasan N, Raman S, Broumi S
nation of fuzzy graph. Int J Contemp Math Sci 6(26):1303–1309 (2019) Embedding of fuzzy graphs on topological surfaces.
31. Manjusha OT, Sunitha MS (2014) Notes on domination in fuzzy Neural computing and applications. Springer, New York, pp 1–11
graphs. J Intell Fuzzy Syst 27(6):3205–3212. https://doi.org/10. 48. Halim Z, Khattak JH (2018) Density-based clustering of big
3233/IFS-141277 probabilistic graphs. Evolving systems. Springer, New York,
32. Kalathodi S, Sunitha MS (2012) Distance in fuzzy graphs. LAP pp 1–18
LAMBERT Academic Publishing, New York 49. Rashid A, Kamran M, Halim Z (2019) A top down approach to
33. Manjusha OT, Sunitha MS (2015) Strong domination in fuzzy enumerate a-maximal cliques in uncertain graphs. J Intell Fuzzy
graphs. Fuzzy Int Eng 7:369–377 Syst 1–13 (Preprint)
34. Saravanan M, Sujatha R, Sundareswaran R (2016) Integrity of 50. Halim Z, Waqas M, Baig AR, Rashid A (2017) Efficient clus-
fuzzy graphs. Bull Int Math Virtual Inst 6:89–96 tering of large uncertain graphs using neighborhood information.
35. Saravanan M, Sujatha R, Sundareswaran R (2015) A study of Int J Approx Reason 90:274–291
regular fuzzy graphs and integrity of fuzzy graphs. Int J Appl Eng 51. Jamil S, Khan A, Halim Z, Baig AR (2011) Weighted muse for
Res 10(82):160–164 frequent sub-graph pattern finding in uncertain DBLP data. In:
36. Saravanan M, Sujatha R, Sundareswaran R (2018) Concept of 2011 international conference on internet technology and appli-
integrity and its result in fuzzy graphs. J Intell Fuzzy Syst cations, IEEE, pp 1–6
34(4):2429–2439 52. Sunitha MS, Vijayakumar A (1999) A characterization of fuzzy
37. Mariappan S, Ramalingam S, Raman S, Muthuselvan B (2018) trees. Inf Sci 113:293–300
Application of domination integrity of graphs in PMU placement 53. Tom M, Sunitha MS (2015) Strong sum distance in fuzzy graphs.
in electric power networks. Turk J Electric Eng Comput Sci Springerplus 4:214. https://doi.org/10.1186/s40064-015-0935-5
26(4):2066–2076
38. Samanta S, Pal M (2015) Fuzzy planar graphs. IEEE Trans Fuzzy Publisher’s Note Springer Nature remains neutral with regard to
Syst 23(6):1936–1942. https://doi.org/10.1109/TFUZZ.2014. jurisdictional claims in published maps and institutional affiliations.
2387875
39. Samanta S, Pal M (2013) Fuzzy k-competition graphs and
p-competition fuzzy graphs. Fuzzy Inf Eng 5(5):191–204. https://
doi.org/10.1007/s12543-013-0140-6S
123