Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Article type: Research Article
Authors: D, Mary Jinya | Navamani, G.b | Shanmugapriya, R.c | Kumar, Ramand | Stević, Željkoe; f; * | Kumar, Rajenderg | Kumar, Sandeeph
Affiliations: [a] Department of Mathematics, Saveetha School of Engineering, SIMATS, Chennai, Tamilnadu, India | [b] Department of Mathematics, Saveetha School of Engineering, Saveetha Institute of Medical and Technical Sciences, SIMATS, Chennai, Tamilnadu, India | [c] Department of Mathematics, Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology, Avadi, Chennai, Tamil Nadu, India | [d] Department of Mechanical and Production Engineering, Guru Nanak Dev Engineering College, Ludhiana, Punjab, India | [e] University of East Sarajevo, Faculty of Transport and Traffic Engineering, Bosnia and Herzegovina | [f] Department of Industrial and Management Engineering, Korea University, Seoul, Korea | [g] University Centre for Research and Development, University School of Business, Chandigarh University, Gharuan, Mohali, Punjab, India | [h] Centre of Research Impact and Outcome, Chitkara University, Rajpura, Punjab, India
Correspondence: [*] Corresponding author: Željko Stević, University of East Sarajevo, Faculty of Transport and Traffic Engineering, Vojvode Mišića 52, 74000 Doboj, Bosnia and Herzegovina. E-mail: [email protected].
Abstract: The eternal 1-secure set, strategically protects graphical structures against attacks by placing sentinels within dominating sets. This study adapts this concept to real-world scenarios, like emergency response systems, by addressing challenges such as roadblocks and traffic congestion. We introduce the secure set and the eternal 1-secure set for fuzzy graphs based on edge membership levels J. Our analysis examines the relationship between the security number of a fuzzy graph G at level J and the domination number of its spanning subgraph at level J, demonstrating the potential of the eternal 1-secure set to enhance security measures in dynamic environments.
Keywords: Fuzzy graph, fuzzy domination number, eternal 1-security number, fuzzy path, fuzzy cycle
DOI: 10.3233/KES-240290
Journal: International Journal of Knowledge-based and Intelligent Engineering Systems, vol. Pre-press, no. Pre-press, pp. 1-13, 2024
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]