Novel Concepts On Domination in Neutrosophic Incidence Graphs With Some Applications
Novel Concepts On Domination in Neutrosophic Incidence Graphs With Some Applications
p0837
Research Paper:
In graph theory, the concept of domination is essen- and geometry, graphs are commonly utilized as a tool for
tial in a variety of domains. It has broad applications addressing combinatorial issues, and their importance in
in diverse fields such as coding theory, computer net- computer science is well known. Weighted graphs rep-
work models, and school bus routing and facility lo- resent the strength of links between the vertices, and can
cation problems. If a fuzzy graph fails to obtain ac- be utilized to define any model that consists of points and
ceptable results, neutrosophic sets and neutrosophic lines. The concept of domination was first established for
graphs can be used to model uncertainty correlated the game of chess in the 1850s. Several chess players in
with indeterminate and inconsistent information in ar- Europe debated the matter of deciding the least number
bitrary real-world scenario. In this study, we consider of queens that could be substituted on a chessboard to en-
the concept of domination as it relates to single-valued sure that all of the squares were occupied by a queen. As
neutrosophic incidence graphs (SVNIGs). Given the a solution to this problem, Ore [1] and Berge [2] first pro-
importance of domination and its utilization in numer- posed the concept of domination in graphs in 1962.
ous fields, we propose the application of dominating In graph theory, domination may be utilized to model a
sets in SVNIG with valid edges. We present some rel- wide variety of systems, such as in abstract formalizations
evant definitions such as those of valid edges, cardi- like the facility location problem, social network analy-
nality, and isolated vertices in SVNIG along with some sis, and problems in matching and coding theory, as well
examples. Furthermore, we also show a few signifi- as the operation of real technologies such as communica-
cant sets connected to the dominating set in an SVNIG tion networks, security systems, clutters, and block cut-
such as independent and irredundant sets. We also in- ters. For example, it aims to address problems about fa-
vestigate a relationship between the concepts of dom- cility location problems in which the number of facilities
inating sets and domination numbers as well as irre- such as police stations, fire stations, hospitals, and super-
dundant and independence sets in SVNIGs. Finally, a markets, and to shorten the routes that travelers must take
real-life deployment of domination in SVNIGs is inves- to reach the nearest facility. In abstract terms, if the max-
tigated in relation to COVID-19 vaccination locations imum distance to a facility is defined and efforts to lower
as a practical application. the number of facilities required to accommodate every-
one are made, similar situations may be expected to de-
velop. Furthermore, the concept of domination has been
Keywords: dominating set, domination number, neutro- considered in applications such as in monitoring commu-
sophic graph, single-valued neutrosophic incidence graph nication or electrical networks, finding sets of representa-
tives, and surveying land.
If vertices are considered to symbolize different cities,
1. Introduction edges can indicate roads that link them. The result of this
arrangement is a fuzzy graph (FG) that depicts the volume
In recent decades, graph theory has been increasingly of traffic from one city to another. Here, the city with the
considered important as a branch of applied mathemat- most residents will have the most entrance ramps. If A
ics, generally referred to as combinatorics. In fields as di- and B are two cities and AB denotes the road that connects
verse as topology, number theory, algebra, optimization, them, we can consider that (A, AB) can display a ramp
Vol.27 No.5, 2023 Journal of Advanced Computational Intelligence and Intelligent Informatics 837
© Fuji Technology Press Ltd. Creative Commons CC BY-ND: This is an Open Access article distributed under the terms of
the Creative Commons Attribution-NoDerivatives 4.0 InternationalLicense (https://creativecommons.org/licenses/by-nd/4.0/)
Mohamad, S. N. F., Hasni, R., and Smarandache, F.
the relevant literature on incidence graphs in fuzzy and Ore [1] and Berge [2] began researching DSs in graphs
neutrosophic environments, and present the concepts of in 1962. Cockayne and Hedetniemi [29] subsequently de-
domination in FGs as well as in FIGs and NGs. Section 3 rived irredundant numbers, independent domination, and
offers a brief introduction to graphs and NSs as used in the concept of domination. A. Somasundaram and S.
this work. In Section 4, we formulate the concept of dom- Somasundaram [30] were the first to establish the con-
ination in SVNIGs and derive some key aspects. In Sec- cept of domination in FGs. They utilized effective edges
tion 5, we implement the proposed approach to construct a to identify domination and total DNs (TDNs) for various
model of the optimal locations for COVID-19 vaccination classes in FGs. Subsequently, Somasundaram [31] found
administration centers (CVACs). Finally, in Section 6, we domination in the product of two graphs and investigated
summarize our findings and conclude with a discussion their domination parameter, as well as many FG opera-
of the limitations of this work along with some suggested tions such as Cartesian product, composition, joining, and
avenues for further research. union. Additionally, Gani and Ahamed [32] pioneered the
concepts of weak and strong domination in FGs and de-
scribed their various characteristics.
2. Literature Review Furthermore, Natarajan and Ayyaswamy [33] devel-
oped the idea of strong (weak) domination in FGs, ex-
Brualdi and Massey [19] first presented the concept of plaining several intriguing findings for this new parameter
an incidence graph in their work on incidence and in- in FGs. In addition, Vimala and Sathya [34] considered
cidence chromatic numbers. Such incidence graphs can FG point set DNs and utilized the FGs neighborhood de-
typically be depicted as a triplet, in which one aspect rep- grees to acquire some limitations. Besides that, Manjusha
resents a fine set of vertices, a second denotes a finite and Sunitha [35–40] have provided some proofs on dom-
set of edges, and a third refers to an incidence function. ination in FGs. Moreover, Ponnappan et al. [41] estab-
Dinesh [3] further developed the theory for unordered lished the concept of the total edge DN, the edge DN,
pairs of vertices that are not incident with end vertices. total edge domination, and edge domination for various
In contrast, fuzzy incidence depicts the relationships be- types of FGs. In addition, Dharmalingam and Rani [42]
tween vertices and offers data on the effect of the vertex suggested the concepts of fuzzy equitable independent
on edges’ influence. Subsequently, Dinesh [20] expanded sets in equitable FGs, fuzzy equitable independent sets,
on the idea of FIGs and introduced some additional con- strong (weak) fuzzy equitable DSs, minimal fuzzy eq-
cepts related to this body of knowledge. uitable DSs, and fuzzy equitable DSs. They presented
Furthermore, Mathew and Mordeson [21] also exam- several remarkable insights for this new parameter. Ac-
ined concepts of connectivity in FIGs. In interconnected cordingly, Dharmalingam and Nithya [43, 44] established
networks with influenced flows, connectivity is crucial. the concepts of excellent and very excellent domination
Hence, investigating the connectivity qualities of graphs in FGs. Here, the notion of a DS was proposed by
is important. The theory of FIGs was then explored Bozhenyuk et al. [45] as an invariant of an intuitionistic
by Malik et al. [22] to address human trafficking prob- FG (IFG).
lems. They argued that the importance of this work is its Nazeer et al. [46] utilized a new concept of domina-
quantification of a country’s vulnerability and of govern- tion in FIGs developed in their previous work and ap-
ments’ actions in response to human trafficking. Simi- plied it to the choice of an adequate medical lab among
larly, Mathew et al. [23] investigated certain connectivity a range of laboratories. Then, Nazeer et al. [47] expand
and incidence cuts properties in FIGs. In graphs modeling on the idea of domination idea by combining FIGs with
human trafficking networks, incidence is used to model strong pairings and applying it to diverse nations’ trading
flows. Finally, Mathew and Moderson [24] described systems. Subsequently, Afsharmanesh and Borzooei [17]
fuzzy incidence blocks (FIBs) and discussed their appli- utilized incidence valid edges to establish DSs in FIGs
cation to the problem of illegal migration. They applied and examined numerous significant sets pertaining to DS,
FIBs to prevent a network’s susceptible linkages from be- such as irredundant and independent sets. Rao et al. [18]
ing ignored, utilizing FIGs as a non-deterministic net- expanded the concept of domination concept in FIGs to
work model with supporting links. Subsequently, Akram VIGs, utilizing valid edges and applying their approach
et al. [25] extended FIGs to a neutrosophic environ- to the optimal locations of COVID-19 testing facilities in
ment, and presented the concept of SVNIGs and exam- another investigation.
ined their connectivity. Building on this research, Akram
et al. [26] investigated the application of bipolar NSs to
incidence graphs and developed a few relevant features. 3. Preliminaries
Subsequently, the theory of neutrosophic vague incidence
graphs (VIGs) was then developed by Hussain et al. [27], In this section, we recall some fundamental definitions
who formulated pair, vertex, and edge connectivity in with respect to SVNSs, FIGs, and domination. In this
neutrosophic VIGs. Furthermore, Mohamad et al. [28] study, maximum and minimum operators are represented
applied the concept of innovative interval-valued neutro- by ∨ or max, and ∧ or min, respectively.
sophic incidence graphs to the safe root travelling prob- Definition 1— [48]: An FG G = (σ , μ ) is a pair of
lem. functions together with an underlying set of vertices V and
1 + TA (x) + IA (x) − FA (x)
|A| = ∑ =P
x∈V 2
+ (xy) + (xy) − (xy)
1 T I F
|B| = ∑
B B B
=Q
xy∈E 2
+ (v, + (v, − (v,
1 T xy) I xy) F xy)
|C| = ∑
C C C
= R.
(v,xy)∈I 2
Example 2: In Fig. 2, it may be clearly observed that
ab and bc are single-valued neutrosophic incidence valid
edges, from which we obtain
1 + 0.1 + 0.3 − 0.5 1 + 0.2 + 0.3 − 0.4
|A| = +
2 2
1 + 0.3 + 0.4 − 0.5 1 + 0.4 + 0.6 − 0.5
+ +
Fig. 2. SVNIG ξ in Examples 1 and 2. 2 2
= 0.45 + 0.55 + 0.60 + 0.75
= 2.35,
1 + 0.1 + 0.3 − 0.5 1 + 0.2 + 0.3 − 0.5
Definition 8: The SVNIG ξ = (A, B,C) support is |B| = +
sup(ξ ) = (sup(A), sup(B), sup(C)) such that 2 2
1 + 0.2 + 0.3 − 0.8 1 + 0.3 + 0.4 − 0.8
sup(A) = {x|TA (x) > 0, IA(x) > 0, FA (x) > 0} , + +
2 2
sup(B) = {xy|TB (xy) > 0, IB (xy) > 0, FB (xy) > 0} , 1 + 0.1 + 0.3 − 0.9
sup(C) = {(v, xy)|TB (v, xy) > 0, IB (v, xy) > 0, +
2
FB (v, xy) > 0}. = 0.45 + 0.50 + 0.35 + 0.45 + 0.25
Definition 9: Let ξ = (A, B,C) be denoted as = 2.00,
an SVNIG. Thus, H = (Ã, B̃, C̃) denotes as an 1 + 0.1 + 0.3 − 0.5 1 + 0.1 + 0.3 − 0.5
SVNI-subgraph of ξ provided that à ⊆ A, B̃ ⊆ B, |C| = +
2 2
as well as C̃ ⊆ C.
1 + 0.2 + 0.3 − 0.5 1 + 0.2 + 0.3 − 0.5
Definition 10: Let ξ = (A, B,C) denote an SVNIG. + +
Following from there, a single-valued neutrosophic inci- 2 2
dence edge xy of ξ is known as a single-valued neutro- 1 + 0.2 + 0.3 − 0.8 1 + 0.2 + 0.3 − 0.9
+ +
sophic incidence valid edge provided that 2 2
TB (xy) 1 + 0.3 + 0.4 − 0.8 1 + 0.3 + 0.4 − 0.9
≥ 0.5, + +
min (TA (x), TA (y)) 2 2
1 + 0.1 + 0.3 − 0.9 1 + 0.1 + 0.3 − 0.9
TC (x, xy) > 0, TC (y, xy) > 0, + +
2 2
IB (xy) = 0.45 + 0.45 + 0.5 + 0.5 + 0.35 + 0.3
≥ 0.5,
min (IA (x), IA(y))
+0.45 + 0.4 + 0.25 + 0.25
IC (x, xy) > 0, IC (y, xy) > 0,
= 3.90.
FB (xy) Example 3: Consider an SVNIG ξ = (A, B,C) such
≤ 0.5,
1 + max(FA (x), FA (y)) that V = {e, f , g, h, j}, E = {ef , fg, gh, hj, ej}, and
FC (x, xy) > 0, FC (y, xy) > 0. I = {(e, ef ), ( f , ef ), ( f , fg), (g, fg), (g, gh),
In another way, it is considered as a single-valued neutro- (h, gh), (h, hj), ( j, hj), (e, ej), ( j, ej)},
sophic incidence invalid edge. as shown in Fig. 3. By routine calculation, the edges ef ,
Definition 11: Consider ξ = (A, B,C) as an SVNIG. Its fg, and hg are the single-valued neutrosophic incidence
cardinality is expressed by valid edges.
1 + TA (v) + IA (v) − FA (v) Definition 12: The SVNIG ξ = (A, B,C) is considered
|ξ | = ∑ to be complete provided that
x∈V 2
TB (xy) = min (TA (x), TA (y)) ,
1 + TB (xy) + IB (xy) − FB (xy)
IB (xy) = min (IA (x), IA (y)) ,
+ ∑
xy∈E 2 FB (xy) = max (FA (x), FA (y)) ,
1 + TC (v, xy) + IC (v, xy) − FC (v, xy) TC (v, xy) = min (TA (v), TB (xy)) ,
+ ∑ . IC (v, xy) = min (IA (v), IB (xy)) ,
(v,xy)∈I 2
Also, we have the vertex cardinality |A|, edge cardinal- FC (v, xy) = max (FA (v), FB (xy)) ,
ity |B|, and incidence cardinality |C| expressed by ∀v ∈ V, xy ∈ E.
Definition 13: Let ξ = (A, B,C) denote an SVNIG. Definition 15: Let ξ = (A, B,C) denote an SVNIG
Thus, of G̃. Then,
i. a single-valued incidence valid neighborhood of x is 1. x ∈ V incidentally dominates y ∈ V in ξ , provided
expressed by Nsvniv (x) = {y ∈ V |xy is a single-valued that y ∈ Nsvniv [x].
neutrosophic incidence valid edge}.
2. a non-empty set of vertices D ⊆ V denotes a single-
Note that Nsvniv [x] = Nv (x) ∪ {x} denotes a closed valued neutrosophic incidence DS (SVNIDS) in an
single-valued neutrosophic incidence valid neigh- SVNIG ξ , provided that there exists y ∈ D when-
borhood of x. For non-empty set D ⊆ V , we now ever x incidentally dominates y. In other words,
have V = Nsvniv [D], ∀x ∈ V − D.
Nsvniv (D) = {Nsvniv (x)|x ∈ D}, 3. The minimum cardinality of SVNIDS in an SVNIG
Nsvniv [D] = Nsvniv (D) ∪ D. of G̃ is expressed as a single-valued neutrosophic
incidence DN (SVNIDN) of ξ , which is expressed
ii. the single-valued neutrosophic incidence valid by γIDN (ξ ). Clearly, γIDN (ξ ) ≤ P.
neighborhood degree of vertex x is expressed by 4. A set with the minimum single-valued neutrosophic
cardinality of γIDN (ξ ) is denoted as an γIDN -set or
dNsvniv(x) = ∑ TA (y), ∑ IA (y), minimal SVNIDS.
Example 5: Consider ξ = (A, B,C) to be denoted as an
y∈Nsvniv (x) y∈Nsvniv (x)
SVNIG as shown in Fig. 4. By routine calculations, the
∑ FA (y) . edges jk, kl, kn, and mn are single-valued neutrosophic
incidence valid edges. The sets
y∈Nsvniv (x)
D1 = {k, m}, D2 = {k, n}, D3 = { j, l, m}, D4 = { j, l, n}
The maximum and minimum, and cardinality single- are SVNIDSs. By calculating the cardinalities, we obtain
1 + 0.4 + 0.4 − 0.5 1 + 0.2 + 0.4 − 0.3
valued neutrosophic incidence valid neighborhood |D1 | = +
degrees of ξ are expressed by ΔIVN and δIVN , accord- 2 2
ingly. = 0.65 + 0.65 = 1.30,
Definition 14: Consider ξ = (A, B,C) to be denoted as 1 + 0.4 + 0.4 − 0.5 1 + 0.1 + 0.3 − 0.5
an SVNIG. Then, the vertex cardinality of S ⊆ V is ex- |D2 | = +
2 2
pressed as
1 + T (x) + I (x) − F (x) = 0.65 + 0.45 = 1.10,
|S| = ∑
A A A
. 1 + 0.3 + 0.5 − 0.4 1 + 0.2 + 0.6 − 0.5
x∈S 2 |D3 | = +
2 2
Example 4: Let SVNIG ξ as shown in Fig. 4. Then,
1 + 0.2 + 0.4 − 0.3
Nsvniv (e) = { f }, Nsvniv ( f ) = {e, g}, +
2
Nsvniv (g) = { f , h}, Nsvniv (h) = {g},
= 0.7 + 0.65 + 0.65 = 2.00,
Nsvniv ( j) = 0.
/
1 + 0.3 + 0.5 − 0.4 1 + 0.2 + 0.6 − 0.5
Thus, |D4 | = +
dNsvniv (e) = (0.3, 0.4, 0.5), dNsvniv( f ) = (0.4, 0.9, 0.9), 2 2
dNsvniv (g) = (0.5, 0.9, 0.8), dNsvniv(h) = (0.1, 0.4, 0.5). 1 + 0.1 + 0.3 − 0.5
+
Therefore, by routine calculation, it is obvious that 2
δIVN = (0.1, 0.4, 0.5) and ΔIVN = (0.5, 0.9, 0.8). = 0.7 + 0.65 + 0.45 = 1.80.
Hence, γIDN (ξ ) = 1.10 and D2 = {k, n} is a γIDN -set. 4.2. Irredundant Sets in an SVNIG
Theorem 1: In any SVNIG ξ = (A, B,C), γIDN (ξ ) ≤ Definition 19: Consider ξ = (A, B,C) to be denoted as
P − ΔIVN . an SVNIG, S ⊆ V as well as x ∈ S. The vertex y is
Proof: Let x ∈ V in an SVNIG ξ = (A, B,C). Assume known as a single-valued neutrosophic incidence valid
that dNsvniv (x) = ΔIVN . Then, V − Nsvniv (x) is an SVNIDS private neighborhood (SVNIPN) of x into S provided that
of ξ , such that Nsvniv [x] ∩ S = {x}. In addition, we express the SVNIPN
γIDN (ξ ) ≤ |V − Nsvniv (x)| = P − ΔIVN . of x into S by PN svniv (x, S). This expresses
PN svniv (x, S) = Nsvniv [x] − Nsvniv [y]
y∈S−{x}
Note that D denotes an incidence DS of the SVNIG ξ =
(A, B,C) as well as D1 ⊆ V provided that D1 ⊇ D. Thus, = Nsvniv [x] − Nsvniv [S − {x}].
D1 also denotes an incidence DS. Subsequently, any sub- Clearly, provided that x ∈ PN svniv (x, S), x is isolated
set D2 of D is not required to be an incidence DS. There- in S .
fore, we are inclined to consider an SVNIG’s minimal in- Definition 20: Let ξ = (A, B,C) denote an SVNIG as
cidence DSs. well as 0/ = S ⊆ V .
Definition 16: An SVNIDS D of the SVNIG ξ = 1. S is a single-valued neutrosophic incidence irredun-
(A, B,C) is denoted as a minimal SVNIDS provided that dant set (SVNIIRS) provided that for any x ∈ S,
any proper subset of D is not included in an SVNIDS of ξ . PN svniv (x, S) = 0.
/
The upper SVNIDN ΓIDN equals the maximum cardi-
nality of the minimal SVNIDS in ξ . Obviously, γIDN de- 2. S is considered a maximal SVNIIRS provided that,
notes the minimum cardinality of the minimal SVNIDS for any x ∈ V − S, the set S ∪ {x} is not an SVNIIRS,
in ξ . which explains that there exists at least one ver-
Example 6: In Example 3, the sets tex y ∈ S ∪{x} where it does not possess an SVNIPN.
D1 = {h, j, e}, D2 = {g, j, e}, 3. The minimum cardinality among all maximal-
D3 = {h, j, f }, D4 = { f , j, g} SVNIIRSs is considered as a single-valued neutro-
resemble the minimal SVNIDSs. Thus, ΓIDN = 2 and sophic incidence irredundant number (SVNIIRN)
γIDN = 1.7. and expressed by irN (ξ ).
Definition 17: The vertex’s valid degree x ∈ V in an 4. The maximum cardinality among all maximal-
SVNIG ξ = (A, B,C) is expressed to denote the sum of SVNIIRSs is known as an upper SVNIIRN and ex-
the falsity membership, indeterminacy membership, and pressed by IrN (ξ ). Hence, it may be easily noted
true membership degree of the single-valued neutrosophic that irN (ξ ) ⊆ IrN (ξ ).
incidence valid edges (SVNIVE) incident at vertex x ∈ V , Theorem 3: Let SVNIG ξ = (A, B,C) with vertex car-
which is expressed as dsvniv (x). The maximum and min- dinality P and minimum cardinality single-valued neu-
imum valid degree cardinalities of ξ = (A, B,C) are de- trosophic incidence valid neighborhood (SVNIVN) de-
noted as Δsvniv and δsvniv , respectively. gree δIVN . Then,
Definition 18: Let the SVNIG ξ = (A, B,C), a ver- IrN (ξ ) ≤ P − δIVN .
tex x ∈ V is denoted as an isolated vertex provided that Proof: Let S denote an SVNIIRS in ξ with x ∈ S. Con-
Nsvniv (x) = 0./ This implies that, for any y ∈ V , where clude that x resembles a valid neighborhood to k vertices
y = x, xy is not a SVNIVE. in S. Here, given that the degree of x denotes at least δIVN ,
Example 7: As may be clearly observed from Fig. 4, x must be valid neighborhood to at least δIVN − dN k ver-
j denotes an isolated vertex due to Nsvniv ( j) = 0.
/ tices in V − S in which dN k resembles the cardinality of k
Theorem 2: In an SVNIG ξ = (A, B,C) possess no valid neighborhood vertices x in S.
isolated vertices. Provided that D denotes the minimal Provided that dN k = 0, δIVN ≤ |V − S|, i.e., |S| ≤ P −
SVNIDS in ξ , V − D thus resembles an SVNIDS. δIVN as needed.
Proof: Let D resemble any minimal SVNIDS of ξ . Provided that dN k > 0, each valid neighborhood of x
Meanwhile, the vertex x ∈ D incidentally is not dominated in S must possess a valid private neighborhood in V − S
by any vertex in V − D. Provided that ξ possesses no and k must be distinct.
isolated vertices, x is incidentally dominated by at least Therefore,
one vertex in D−{x}. Thus, D−{x} denotes an SVNIDS,
which contradicts the minimality of D. Hence, any vertex (δIVN − dN k ) + dN k ≤ |V − S|,
in D is incidentally dominated by at least one vertex in δIVN ≤ |V − S|,
V − D. Therefore, V − D resembles an SVNIDS.
Corollary 1: For an SVNIG ξ = (A, B,C) with no iso- where
lated vertex, we now have γIDN ≤ P/2. |S| ≤ P − δIVN ,
Proof: Provided that D denotes a minimal SVNIDS IrN (ξ ) ≤ P − δIVN .
of ξ , so does V − D. Therefore, P = |V | = |D| + |V − D|.
Hence, at least one of the sets D or V − D has a cardinality
P/2 or less. Theorem 4: An SVNIDS in an SVNIG ξ = (A, B,C) is
a minimal SVNIDS provided that it is an SVNIIRS.
Proof: Let S denote a minimal SVNIDS in ξ . Then, thus D ∪ {x} denotes SVNIIDS of ξ , violating the max-
for any vertex x ∈ S, there exists a vertex z ∈ V − (S − {x}) imality of D. Interchangeably, provided that D denotes
that is not dominated by S − {x}. Thus, for any x ∈ S, independent SVNIDS, for any x ∈ / D, D ∪ {x} is not an
PN svniv [x, S] = 0.
/ Hence, any vertex x ∈ S possesses at SVNIIDS. Thus, D resembles a maximal SVNIIDS.
least one incidence valid private neighborhood. There- Theorem 7: Every maximal SVNIIDS of ξ denotes a
fore, S is both an SVNIIRS and an SVNIDS. minimal SVNIDS of ξ .
Therefore, provided that the set S is not a minimal Proof: Proof. Let D be a maximal SVNIIDS of ξ .
SVNIDS, there exists an x ∈ S given that S − {x} is an Then, by Theorem 6, D is an SVNIDS of ξ . Therefore, we
SVNIDS. Because S is an SVNIIRS, PN svniv [x, S] = 0. / must determine whether D is a minimal SVNIDS. If not,
Given that z ∈ PN svniv [x, S], z is not a valid neighborhood there exists at least one vertex x ∈ D in which D − {x} is
for any vertex in S − {x}. Provided that S − {x} is not an an SVNIDS. Interchangeably, provided that D−{x} dom-
SVNIDS, this leads to a contradiction. inates x, at least one vertex in D − {x} must be SVNIVN
Theorem 5: Every minimal SVNIDS in an SVNIG ξ = of x, which contradicts D and resembles an SVNIIDS
(A, B,C) is a maximal SVNIIRS. of ξ . Moreover, D must be a minimal SVNIDS.
Proof: By Theorem 4, any minimal SVNIDS is an Corollary 3: Each SVNIIDS of ξ is a minimal
SVNIIRS. Thus, we need to show that S is a maximal SVNIDS of ξ .
SVNIIRS provided that S is not maximal. Thus, there ex- Proof: Let S be an SVNIIDS of ξ . Then, Theorem 6
ists a vertex x ∈ V − S in which S ∪ {x} is an SVNIIRS. resembles a maximal independent set and Theorem 7 re-
This shows that PN svniv [x, S ∪ {x}] = 0.
/ Thus, there exists sembles a minimal SVNIDS.
at least one vertex y that is a valid private neighborhood The converse of Corollary 3 may not be accurate in gen-
of x into S ∪ {x}. Ultimately, no vertex in S is a neighbor- eral, as shown in the example given below.
hood to y. This contradicts S being an SVNIDS. Corollary 4: For any SVNIG ξ = (A, B,C), we have
Corollary 2: For any SVNIG ξ = (A, B,C), γIDN (ξ ) ≤ αIDS (ξ ) ≤ βIDS (ξ ) ≤ ΓIDN (ξ ).
irN (ξ ) ≤ γIDN (ξ ) ≤ ΓIDN (ξ ) ≤ IrN (ξ ). Proof: By Theorem 7, any maximal SVNIIDS D of ξ
Proof: By Theorem 5, every minimal SVNIDS in ξ = is a minimal SVNIDS of ξ . Then, the result is straightfor-
(A, B,C) is a maximal SVNIIRS in ξ . Thus, the result is ward.
straightforward. By Corollaries 2 and 4, we obtain the following result.
Theorem 8: For any SVNIG ξ = (A, B,C), irN (ξ ) ≤
γIDN (ξ ) ≤ αIDS (ξ ) ≤ βIDS (ξ ) ≤ ΓIDN (ξ ) ≤ IrN (ξ ).
4.3. Independent Sets in an SVNIG
Definition 21: Let ξ = (A, B,C) denote an SVNIG.
Then, 5. An Application of SVNIGs to Determining
Optimal Locations of CVACs
1. The vertices y and x are incidentally independent in ξ
provided that the edge xy is not an SVNIVE. The COVID-19 pandemic is a global outbreak of se-
vere acute respiratory syndrome (SARS-CoV-2). Vacci-
2. The subset S of V is a single-valued neutrosophic in-
nation is one of the most promising techniques to miti-
cidence independent set (SVNIIDS) of ξ provided
gate the impacts of the pandemic. Since the beginning of
that any two vertices of S are incidentally indepen-
the outbreak, many initiatives have been conducted world-
dent. This shows that all of the vertices of S are
wide to create COVID-19 vaccines. The Special Com-
isolated.
mittee for Ensuring Access to COVID-19 Vaccine Sup-
3. S is referred to as a maximal SVNIIDS in which ply (JKJAV), co-chaired by Malaysian Ministers of Health
for any x ∈ V − S the set S ∪ {x} is not incidence- and Science, Technology, and Innovation was formed to
independent. assure the country’s immediate access to COVID-19 vac-
cine supplies. The government’s objective is to guaran-
4. The maximum cardinality among all maximal tee as many Malaysians as possible attain vaccination to
SVNIIDS is referred to as a single-valued neutro- minimize the mortality and morbidity of the disease as
sophic incidence-independent number (SVNIIDN) quickly as possible. Universities, community halls, con-
of ξ given by βIDS (ξ ). vention centers, stadiums, and other suitable venues will
be established as temporary vaccine administration cen-
5. The minimum cardinality among all maximal ters depending on demand. However, the issue of where to
SVNIIDS is a lower SVNIIDN of ξ given locate these temporary vaccination administration centers
by αIDS (ξ ). is very important. To reduce costs, the government must
Theorem 6: Let ξ = (A, B,C) be an SVNIG. Then, choose the smallest number of cities that are the most ap-
SVNIIDS denotes a maximal provided that it is an pealing so that the remaining cities are connected to at
SVNIDS. most one city with available vaccines by a usable travel-
Proof: Let D be a maximal SVNIIDS of ξ . Then, ing route for better accessibility.
D must be an SVNIDS of ξ . If not, there exists a ver- Therefore, in this section, we attempted to identify the
tex x ∈ V − D that incidentally is not dominated by D, and most suitable cities to construct CVACs using SVNIGs
Because D2 has a minimum scalar cardinality among
SVNIDSs, we conclude that C2 , C3 , and C5 can be se-
lected as the preferred cities in which to construct the
CVACs. Considering the facilities and equipment in all
the cities, these locations are most well supplied and
equipped. Thus, we conclude that the government must
allocate sufficient funds to these cities and provide more
health officers and volunteers to established CVACs in or-
der for our country to attain greater immunity as soon as
possible.
[4] L. A. Zadeh, “Fuzzy Sets,” Inf. Control, Vol.8, No.3, pp. 338-353, [29] E. J. Cockayne and S. T. Hedetniemi, “Towards a Theory of Dom-
1965. https://doi.org/10.1016/S0019-9958(65)90241-X ination in Graphs,” Networks, Vol.7, No.3, pp. 247-261, 1977.
[5] A. Rosenfeld, “Fuzzy Graphs,” L. A. Zadeh et al. (Eds.), “Fuzzy https://doi.org/10.1002/net.3230070305
Sets and Their Applications to Cognitive and Dexision Processes,” [30] A. Somasundaram and S. Somasundaram, “Domination in Fuzzy
pp. 77-95, Academic Press, 1975. https://doi.org/10.1016/B978-0- Graphs – I,” Pattern Recognit. Lett., Vol.19, No.9, pp. 787-791,
12-775260-0.50008-6 1998. https://doi.org/10.1016/S0167-8655(98)00064-6
[6] A. Kaufmann, “Introduction to the Theory of Fuzzy Subsets,” Aca- [31] A. Somasundaram, “Domination in Products of Fuzzy Graphs.” Int.
demic Press, 1975. J. Uncertain. Fuzziness Knowl.-Based Syst., Vol.13, No.2, pp. 195-
[7] F. Smarandache, “Neutrosophy: Neutrosophic Probability, Set, and 204, 2005. https://doi.org/10.1142/S0218488505003394
Logic: Analytic Synthesis & Synthetic Analysis,” American Re- [32] A. N. Gani and M. B. Ahamed, “Strong and Weak Domination in
search Press, 1998. Fuzzy Graphs,” East Asian Math. J., Vol.23, No.1, pp. 1-8, 2007.
[8] H. Wang et al., “Single Valued Neutrosophic Sets,” F. Smarandache [33] C. Natarajan and S. K. Ayyaswamy, “On Strong (Weak) Domination
(Ed.), “Multispace & Multistructure: Neutrosophic Transdisci- in Fuzzy Graphs,” Int. J. Math Comput. Sci., Vol.4, No.7, pp. 1035-
plinarity (100 Collected Papers of Sciences), Vol.4,” pp. 410-413, 1037, 2010.
North-European Scientific Publishers, 2010. [34] S. Vimala and J. S. Sathya, “Some Results on Point Set Domination
[9] M. Akram and S. Shahzadi, “Neutrosophic Soft Graphs with Ap- of Fuzzy Graphs,” Cybern. Inf. Technol., Vol.13, No.2, pp. 58-62,
plication,” J. Intell. Fuzzy Syst., Vol.32, No.1, pp. 841-858, 2017. 2013. https://doi.org/10.2478/cait-2013-0014
https://doi.org/10.3233/JIFS-16090 [35] O. T. Manjusha and M. S. Sunitha, “Total Domination in Fuzzy
[10] S. Broumi et al., “Interval Valued Pentapartitioned Neutrosophic Graphs Using Strong Arcs,” Ann. Pure Appl. Math., Vol.9, No.1,
Graphs with an Application to MCDM,” Oper. Res. Eng. Sci.: The- pp. 23-33, 2014.
ory Appl., Vol.5, No.3, pp. 68-91, 2022. https://doi.org/10.31181/ [36] O. T. Manjusha and M. S. Sunitha, “Notes on Domination in Fuzzy
oresta031022031b Graphs,” J. Intell. Fuzzy Syst., Vol.27, No.6, pp. 3205-3212, 2014.
[11] S. Broumi et al., “Interval-Valued Fermatean Neutrosophic https://doi.org/10.3233/IFS-141277
Graphs,” Decision Making: Application in Management and Engi- [37] O. T. Manjusha and M. S. Sunitha, “Strong Domination in Fuzzy
neering, Vol.5, No.2, pp. 176-200, 2022. https://doi.org/10.31181/ Graphs,” Fuzzy Inf. Eng., Vol.7, No.3, pp. 369-377, 2015. https:
dmame0311072022b //doi.org/10.1016/j.fiae.2015.09.007
[12] S. Broumi et al., “Complex Fermatean Neutrosophic Graph and [38] O. T. Manjusha and M. S. Sunitha, “Connected Domination in
Application to Decision Making,” Decis. Mak.: Appl. Manag. Fuzzy Graphs Using Strong Arcs,” Ann. Fuzzy Math. Inform.,
Eng., Vol.6, No.1, pp. 474-501, 2023. https://doi.org/10.31181/ Vol.10, No.6, pp. 979-994, 2015.
dmame24022023b [39] O. T. Manjusha and M. S. Sunitha, “The Strong Domination Al-
[13] S. S. Hussain et al., “Domination Number in Neutrosophic Soft teration Sets in Fuzzy Graphs,” Int. J. Math. Appl., Vol.4, No.2-D,
Graphs,” Neutrosophic Sets Syst., Vol.28, pp. 228-244, 2019. https: pp. 109-123, 2016.
//doi.org/10.5281/zenodo.3382548 [40] O. T. Manjusha and M. S. Sunitha, “Coverings, Matchings and
[14] R. N. Devi, “Minimal Domination via Neutrosophic Over Graphs,” Paired Domination in Fuzzy Graphs Using Strong Arcs,” Iran. J.
AIP Conf. Proc., Vol.2277, Article No.100019, 2020. https://doi. Fuzzy Syst., Vol.16, No.1, pp. 145-157, 2019. https://doi.org/10.
org/10.1063/5.0025568 22111/ijfs.2019.4490
[15] M. Mullai and S. Broumi, “Dominating Energy in Neutrosophic [41] C. Y. Ponnappan, S. B. Ahamed, and P. Surulinathan, “Edge Domi-
Graphs,” Int. J. Neutrosophic Sci., Vol.5, No.1, pp. 38-58, 2020. nation in Fuzzy Graphs – New Approach,” Int. J. IT Eng. Appl. Sci.
https://doi.org/10.54216/IJNS.050104 Res., Vol.4, No.1, pp. 14-17, 2015.
[16] S. U. Khan et al., “Graphical Analysis of Covering and Paired Dom- [42] K. M. Dharmalingam and M. Rani, “Equitable Domination in Fuzzy
ination in the Environment of Neutrosophic Information,” Math. Graphs,” Int. J. Pure Appl. Math., Vol.94, No.5, pp. 661-667, 2014.
Probl. Eng., Vol.2021, Article No.5518295, 2021. https://doi.org/ https://doi.org/10.12732/ijpam.v94i5.3
10.1155/2021/5518295 [43] K. M. Dharmalingam and P. Nithya, “Excellent Domination in
[17] S. Afsharmanesh and R. A. Borzooei, “Domination in Fuzzy In- Fuzzy Graphs,” Bull. Int. Math. Virtual Inst., Vol.7, No.2, pp. 257-
cidence Graphs Based on Valid Edges,” J. Appl. Math. Comput., 266, 2017. https://doi.org/10.7251/BIMVI1702257D
Vol.68, No.1, pp. 101-124, 2022. https://doi.org/10.1007/s12190- [44] P. Nithya and K. M. Dharmalingam, “Very Excellent Domination in
021-01510-3 Fuzzy Graphs,” Int. J. Comput. Appl. Math., Vol.12, No.1, pp. 313-
[18] Y. Rao et al., “A Study on Domination in Vague Incidence Graph 326, 2017.
and its Application in Medical Sciences,” Symmetry, Vol.12, No.11, [45] A. Bozhenyuk, S. Belyakov, M. Knyazeva, and I. Rozenberg, “On
Article No.1885, 2020. https://doi.org/10.3390/sym12111885 Computing Domination Set in Intuitionistic Fuzzy Graph,” Int. J.
[19] R. A. Brualdi and J. J. Q. Massey, “Incidence and Strong Edge Comput. Intell. Syst., Vol.14, No.1, pp. 617-624, 2021. https://doi.
Colorings of Graphs,” Discrete Math., Vol.122, Nos.1-3, pp. 51-58, org/10.2991/ijcis.d.210114.002
1993. https://doi.org/10.1016/0012-365X(93)90286-3 [46] I. Nazeer et al., “Domination of Fuzzy Incidence Graphs with the
[20] T. Dinesh, “Fuzzy Incidence Graph – An Introduction,” Adv. Fuzzy Algorithm and Application for the Selection of a Medical Lab,”
Sets Syst., Vol.21, No.1, pp. 33-48, 2016. https://doi.org/10.17654/ Math. Probl. Eng., Vol.2021, Article No.6682502, 2021. https:
FS021010033 //doi.org/10.1155/2021/6682502
[21] S. Mathew and J. N. Mordeson, “Connectivity Concepts in Fuzzy [47] I. Nazeer et al., “Domination in Join of Fuzzy Incidence Graphs
Incidence Graphs,” Inf. Sci., Vols.382-383, pp. 326-333, 2017. Using Strong Pairs with Application in Trading System of Different
https://doi.org/10.1016/j.ins.2016.12.020 Countries,” Symmetry, Vol.13, No.7, Article No.1279, 2021. https:
[22] D. S. Malik, S. Mathew, and J. N. Mordeson, “Fuzzy Incidence //doi.org/10.3390/sym13071279
Graphs: Applications to Human Trafficking,” Inf. Sci., Vol.447, [48] P. Bhattacharya, “Some Remarks on Fuzzy Graphs,” Pattern Recog-
pp. 244-255, 2018. https://doi.org/10.1016/j.ins.2018.03.022 nit. Lett., Vol.6, No.5, pp. 297-302, 1987. https://doi.org/10.1016/
[23] S. Mathew, J. Mordeson, and H.-L. Yang, “Incidence Cuts and Con- 0167-8655(87)90012-2
nectivity in Fuzzy Incidence Graphs,” Iran. J. Fuzzy Syst., Vol.16, [49] S. Broumi et al., “Single Valued Neutrosophic Graphs,” J. New The-
No.2, pp. 31-43, 2019. https://doi.org/10.22111/ijfs.2019.4540 ory, Vol.10, pp. 86-101, 2016.
[24] S. Mathew and J. N. Mordeson, “Fuzzy Incidence Blocks and [50] M. Akram, “Single-Valued Neutrosophic Graphs,” Springer, 2018.
their Applications in Illegal Migration Problems,” New Math. Nat.
Comput., Vol.13, No.3, pp. 245-260, 2017. https://doi.org/10.1142/
S1793005717400099
[25] M. Akram, S. Sayed, and F. Smarandache, “Neutrosophic Incidence
Graphs with Application,” Axioms, Vol.7, No.3, Article No.47,
2018. https://doi.org/10.3390/axioms7030047
[26] M. Akram et al., “Application of Bipolar Neutrosophic Sets to Inci-
dence Graphs,” Neutrosophic Sets Syst., Vol.27, pp. 180-200, 2019.
https://doi.org/10.5281/zenodo.3275595
[27] S. S. Hussain, R. J. Hussain, and M. V. Babu, “Neutrosophic Vague
Incidence Graph,” Int. J. Neutrosophic Sci., Vol.12, No.1, pp. 29-
38, 2021. https://doi.org/10.54216/IJNS.120104
[28] S. N. F. Mohamad et al., “Novel Concept of Interval-Valued
Neutrosophic Incidence Graphs with Application,” Neutrosophic
Sets Syst., Vol.43, pp. 61-81, 2021. https://doi.org/10.5281/zenodo.
4914813
Name: Name:
Siti Nurul Fitriah Mohamad Florentin Smarandache
ORCID:
Affiliation: 0000-0002-5560-5926
College of Computing, Informatics and Mathe-
matics, Universiti Teknologi MARA Affiliation:
Mathematics & Science Department, The Uni-
versity of New Mexico
Address: Address:
Machang, Kelantan 18500, Malaysia 705 Gurley Avenue, Gallup, New Mexico 87301, USA
Brief Biographical History: Brief Biographical History:
2010 Received B.Sc. degree in Mathematical Science from Universiti 2008- Professor of Mathematics, The University of New Mexico
Sains Malaysia (USM) 2009 Postdoctoral Researcher, Air Force Research Laboratory
2011 Received M.Sc. degree in Mathematical Science from USM 2010 Postdoctoral Researcher, École nationale supérieure de techniques
Main Works: avancées Bretagne
• Neutrosophic graph theory. 2013-2014 Postdoctoral Researcher, Okayama University of Science
2014 Postdoctoral Researcher, Guangdong University of Technology
Main Works:
• Neutrosophic set.
Name:
Roslan Hasni
ORCID:
0000-0003-3695-2145
Affiliation:
Special Interest Group on Modeling and Data
Analytics, Faculty of Ocean Engineering Tech-
nology and Informatics, Universiti Malaysia
Terengganu
Address:
Kuala Nerus, Terengganu 21300, Malaysia
Brief Biographical History:
1998 Received B.Sc. degree in Education (Mathematics) from Universiti
Sains Malaysia
2000 Received M.Sc. degree in Mathematics from Universiti Kebangsaan
Malaysia
2005 Received Ph.D. degree in Mathematics from Universiti Putra
Malaysia
2012- Associates Professor, Universiti Malaysia Terengganu
Main Works:
• Graph theory.