SlideShare a Scribd company logo
1 of 6
Download to read offline
International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962
Volume-10, Issue-3 (June 2020)
www.ijemr.net https://doi.org/10.31033/ijemr.10.3.18
115 This work is licensed under Creative Commons Attribution 4.0 International License.
Fair Secure Dominating Set in the Corona of Graphs
Lorelyn P. Gomez1
and Enrico L. Enriquez2
1
Faculty, Don Gerardo Ll. Ouano Memorial National High School, Mandaue City, PHILIPPINES
2
Faculty, Department of Computer, Information Science and Mathematics, University of San Carlos, Cebu City 6000,
PHILIPPINES
1
Corresponding Author: gomezkatelor@gmail.com
ABSTRACT
In this paper, we extend the concept of fair secure
dominating sets by characterizing the corona of two nontrivial
connected graphs and give some important results.
Keywords— Fair Dominating Set, Secure Dominating Set,
Fair Secure Dominating Set, Corona, Cartesian Product
I. INTRODUCTION
A graph is a pair where is a
finite nonempty set called the vertex-set of and is a
set of unordered pairs (or simply ) of distinct
elements from called the edge-set of The elements
of are called vertices and the cardinality of
is the order of The elements of are called
edges and the cardinality of is the size of If
then is called a trivial graph. If
then is called an empty graph. The open neighborhood of
a vertex is the set
The elements of are called neighbors
of The closed neighborhood of is the set
If the open
neighborhood of in is the set
The closed neighborhood of in is the set
When no confusion arises,
[resp. will be denoted by [resp.
For the general terminology in graph theory, readers may
refer to [1].
Domination in graph was introduced by Claude
Berge in 1958 and Oystein Ore in 1962 [2]. A subset
of is a dominating set of if for every
there exists such that , i.e.
The domination number of is the smallest
cardinality of a dominating set of Related studies on
domination in graphs were found in the papers
[3,4,5,6,7,8,9,10,11,12].
In 2011, Caro, Hansberg and Henning [13]
introduced fair domination and -fair domination in graphs.
A dominating subset of is a fair dominating set in
if all the vertices not in are dominated by the same
number of vertices from that is,
for every two distinct vertices and from and
a subset of is a -fair dominating set in if for
every vertex , The minimum
cardinality of a fair dominating set of , denoted by
is called the fair domination number of A fair
dominating set of cardinality is called -set.
Related studies on fair domination in graphs were found in
the papers [14,15,16,17,18].
Other variant of domination is the secure
domination in graphs. A dominating set of is a
secure dominating set of if for each there
exists such that and the set
is a dominating set of . The minimum cardinality of a
secure dominating set of , denoted by , is called the
secure domination number of A secure dominating set of
cardinality is called a -set of Secure dominating
set was introduced by E.J. Cockayne et.al [19]. Secure
dominating sets can be applied as protection strategies by
minimizing the number of guards to secure a system so as
to be cost effective as possible. Some variants of secure
domination in graphs were found in the papers
[20,22,23,24,25,26,27,28,29].
A fair dominating set is a fair secure
dominating set if for each there exists
such that and the set ( is a
dominating set of . The minimum cardinality of a fair
secure dominating set of denoted by is called the
fair secure domination number of A fair secure
dominating set of cardinality is called -set. In
this paper, we extend the study of fair secure dominating set
by giving the characterization of a fair secure dominating
set in the corona of two nontrivial connected graphs and
give some important results.
II. RESULTS
The following known results are needed in this
paper.
Remark 2.1 [13] If
then where the
minimum is taken over all integers where
International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962
Volume-10, Issue-3 (June 2020)
www.ijemr.net https://doi.org/10.31033/ijemr.10.3.18
116 This work is licensed under Creative Commons Attribution 4.0 International License.
Example 2.2 Consider the graph in Figure 1. The sets
, and
are fair secure dominating sets of . Thus
or is a minimum fair secure dominating set of . Hence,
Remark 2.3 [15] A fair secure dominating set of a graph
is a fair dominating set and a secure dominating set of .
Remark 2.4 [15] Let be any connected graph of order
Then
and
Remark 2.5 [15] Let . The .
We need the following results for the
characterization of the fair secure dominating set resulting
from the corona of two graphs.
Lemma 2.6 Let where is a nontrivial
connected graph. If is a dominating set of where
then is a secure dominating set
of
Proof : Suppose is a dominating set of . Let
Then is a dominating set of Since
, let . Then for every
there exists such that Let
If v = x, then
Since is a dominating set of , it is a
dominating set of Thus, is a dominating set of If
, then because Thus,
Since is a dominating set of , it follows that
is a dominating set of Accordingly, S is a secure
dominating set of .
Lemma 2.7 Let where is a nontrivial
connected graph. If is a secure dominating set of where
, then is a secure dominating set of
Proof : Suppose that is a secure dominating set of
where Then is a dominating set of
Let Then there exists
such that If then
. Since is a dominating set of , is
also a dominating set of . If then
. Since S is a secure dominating set of ,
is a dominating set of H and hence a
dominating set of . Therefore, is a secure
dominating set of
The next result shows the characterization of a fair
secure dominating set of a graph
Theorem 2.8 Let where is a nontrivial
connected graph. Then a nonempty subset of is a
fair secure dominating set if and only if one of the following
is satisfied:
(i) and is complete.
(ii) where is fair dominating set of
(iii) where is a secure -fair dominating set
of or
Proof : Suppose that a nonempty subset of is a fair
secure dominating set. Consider the following cases:
Case 1. Suppose that . Let In view of
Remark 2.5, must be a complete graph. Hence
is complete. This proves statement (i).
Case 2. Suppose that . First, if , then let
where is a nonempty proper subset of
If is complete, then is also complete, that is,
by Remark 2.5. Thus, is a fair
dominating set of If is non-complete, then is also
non-complete. Let Suppose to the contrary is not
a fair dominating set of . Since is non-complete
connected graph, . Let
with such that . Thus,
for every
This implies that is not a fair dominating set of
contrary to our assumption. Hence, must be a fair
dominating set of This proves statement Next, if
, then let where is a nonempty subset of
If then we are done with the proof of
statement . Suppose that Then is a
nonempty proper subset of . Further, is a fair
dominating set of (since and hence a fair
dominating set of . Suppose is not an -fair
dominating set of Then . Clearly,
. Let Then
International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962
Volume-10, Issue-3 (June 2020)
www.ijemr.net https://doi.org/10.31033/ijemr.10.3.18
117 This work is licensed under Creative Commons Attribution 4.0 International License.
, since
, since
Thus, where
. This is contrary to our assumption that is a fair
dominating set of . Hence, must be an -fair
dominating set of proving statement
For the converse, suppose that statement is
satisfied. Then and is complete. This implies
that is complete. By Remark 2.5, is a fair
secure dominating set of
Next, suppose that is satisfied. Then
where is fair dominating set of Since is
nontrivial connected graph, . If ,
then let . Clearly, the set is a fair
secure dominating set of . Suppose that . Let
. Then .
Thus, for every
,
since
This implies that is a fair dominating set of .
Since is a dominating set of , it follows that
is a secure dominating set of by Lemma 2.6.
Accordingly, is a fair secure dominating set of
Finally, suppose that is satisfied. Then
where is an -fair secure dominating set
of or Consider that
Clearly, is a fair secure dominating set of
. Consider that is an -fair dominating set of .
Let . Then Clearly,
. Let Then
, since
, since
Thus, where
. This means that is a fair dominating set of .
Since is a secure dominating set of it follows that is a
secure dominating set of by Lemma 2.7.
Accordingly, is a fair secure dominating set of
We need the following definition and remark for
the characterization of a fair secure dominating set in the
corona of two graphs.
Definition 2.9 Let and be graphs of order and ,
respectively. The corona of two graphs and is the
graph obtained by taking one copy of and copies
of , and then joining the vertex of to every vertex of
the copy of The join of vertex of and a copy
of in the corona of and is denoted by
Remark 2.10 Let and be nontrivial connected graphs.
Then |.
The following result is the characterization of the
fair secure dominating set resulting from the corona of two
graphs.
Theorem 2.11 Let and be nontrivial connected graphs.
Then a nonempty subset of is a fair secure
dominating set if and only if one of the following is
satisfied:
and is complete.
where and is fair dominating set of
where is an -fair secure
dominating set of or
Proof : Suppose that a nonempty subset of is a
fair secure dominating set. Consider the following cases.
Case 1. Suppose that By Remark 2.10 and
Remark 2.4, This
means that
First, consider that . Let . Since
is a fair secure dominating set of , must be a fair
secure dominating set of . This implies that for each
, is complete by Theorem 2.8. Thus,
and is complete, proving statement
Next, consider that Then Let
and for all . If then
Thus
Since is nontrivial connected graph, .
Suppose that . Clearly, is a fair dominating
set of for all . Suppose that . Then
. Let for all
Since is a fair dominating set of ,
for all . Thus, for all
International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962
Volume-10, Issue-3 (June 2020)
www.ijemr.net https://doi.org/10.31033/ijemr.10.3.18
118 This work is licensed under Creative Commons Attribution 4.0 International License.
.
This implies that
for all . Hence, is a fair dominating set of
for all . Thus, where
and is fair dominating set of Similarly, if
then
where and is fair dominating set of
This complete the proofs of statement .
Case 2. Suppose that Let
where . If for all , then
the proofs of statement is done. Suppose that
for all Then for all
Clearly, if then is an -fair secure
dominating set of . Suppose that Then
Let for all Since
is a fair dominating set of ,
for all . Thus, for all
.
This implies that is a fair dominating set of
for all Let . Since is a secure
dominating set of there exists such that
and is a dominating
set of . Now, , there
exists such that and
is dominating set of for each
. This implies that is a fair secure dominating set of
for all . Further, for all Let
. Then
.
.
This implies that is an is an -fair secure
dominating set of . This complete the proofs of
statement
For the converse, suppose that statement is
satisfied. Then and is complete. Let .
Then is a fair secure dominating set of by
Theorem 2.8 . Clearly, is a fair
secure dominating set of .
Thus, is a fair secure dominating set of .
Suppose that statement is satisfied. Then
where
and is fair dominating set of If
then is a fair secure dominating set of
for all where is fair dominating set of
by Theorem 2.8 . Clearly,
is a fair secure dominating set of
. Similarly, if , then
is a fair
secure dominating set of
Suppose that statement is satisfied. Then
where is an -fair secure dominating
set of or If then by
Theorem 2.8 is a fair secure dominating set of
for all . Clearly, is a
fair secure dominating set of .
If is an -fair secure dominating set of then is
a fair secure dominating set of by Theorem
2.8 . Clearly, is a fair secure
dominating set of .
The following result is an immediate consequence
of Theorem 2.11.
Corollary 2.12 Let and be nontrivial connected
graphs. Then
secure dominating set of
Proof: If is complete, then by Theorem 2.11 ,
is a fair secure dominating set of . This implies that
In view of the Remark 2.10 and
Remark 2.4, This
shows that
If is an -fair secure dominating set of for
all , then is a fair secure
dominating set of by Theorem 2.11
If is complete, then by Remark 2.5, is
a fair secure dominating set of Thus,
Since , it follows that
.
Suppose that is non-complete. Then
for all . Thus,
.
Suppose is a minimum fair secure dominating
set of Then
Thus,
International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962
Volume-10, Issue-3 (June 2020)
www.ijemr.net https://doi.org/10.31033/ijemr.10.3.18
119 This work is licensed under Creative Commons Attribution 4.0 International License.
where is a minimum -fair secure
dominating set of for all . Accordingly,
.
III. CONCLUSION AND
RECOMMENDATIONS
In this work, we extend the concept of the fair
secure domination of graphs. The fair secure domination in
the corona of two connected nontrivial graphs was
characterized. The exact fair secure domination number
resulting from the corona of two connected nontrivial
graphs was computed. This study will guide us to new
research such bounds and other binary operations of two
connected graphs. Other parameters relating the fair secure
domination in graphs may also be explored. Finally, the
characterization of a fair secure domination in graphs and
its bounds is a promising extension of this study.
REFERENCES
[1] G. Chartrand & P. Zhang. (2012). A first course in
graph theory. New York: Dover Publication, Inc.
[2] O. Ore. (1962). Theory of graphs. American
Mathematical Society Colloquium Publications, 38.
(American Mathematical Society, Providence, RI).
[3] D.P. Salve & E.L. Enriquez. (2016). Inverse perfect
domination in the composition and cartesian product of
graphs. Global Journal of Pure and Applied Mathematics,
2(1), 1-10.
[4] C. M. Loquias, E. L. Enriquez, & J. Dayap. (2017).
Inverse clique domination in graphs. Recoletos
Multidisciplinary Research Journal, 4(2), 23-34.
[5] E.L. Enriquez & S.R. Canoy, Jr. (2015). On a variant of
convex domination in a graph. International Journal of
Mathematical Analysis, 9(32), 1585-1592.
[6] J.A. Dayap & Enriquez. (2020). Outer-convex
domination in graphs. Discrete Mathematics, Algorithms
and Applications, 12(01), 2050008. Available at:
https://doi.org/10.1142/S1793830920500081.
[7] E.L. Enriquez & S.R. Canoy, Jr. (2015). Restrained
convex dominating sets in the corona and the products of
graphs. Applied Mathematical Sciences, 9(78), 3867-3873.
[8] T.J. Punzalan & E.L. Enriquez. (2016). Inverse
restrained domination in graphs. Global Journal of Pure
and Applied Mathematics, 3, 1-6.
[9] R.C. Alota & E.L. Enriquez. (2016). On disjoint
restrained domination in graphs. Global Journal of Pure
and Applied Mathematics, 12(3), 2385-2394.
[10] E.L. Enriquez. (2018). Super restrained domination in
the corona of graphs. International Journal of Latest
Engineering Research and Applications, 3(5), 1-6.
[11] J.A. Dayap & E.L. Enriquez. (2019). Outer-convex
domination in the composition and cartesian product of
graphs. Journal of Global Research in Mathematical
Archives, 6(3), 34-42.
[12] G.M. Estrada, C.M. Loquias, E.L. Enriquez, & C.S.
Baraca. (2019). Perfect doubly connected domination in the
join and corona of graphs. International Journal of Latest
Engineering Research and Applications, 4(7), 17-21.
[13] Caro, Y., Hansberg, A., & Henning, M. (2011). Fair
domination in graphs. University of Haifa, pp. 1-7.
[14] E.L. Enriquez. (2020). Fair restrained domination in
graphs. International Journal of Mathematics Trends and
Technology, 66(1), 229-235.
[15] E.L. Enriquez. (2020). Fair secure domination in
graphs. International Journal of Mathematics Trends and
Technology, 66(2), 49-57.
[16] E.L. Enriquez. (2019). Super fair dominating set in
graphs. Journal of Global Research in Mathematical
Archives, 6(2), 8-14.
[17] E.L. Enriquez & G.T. Gemina. (2020). Super fair
domination in the corona and lexicographic product of
graphs. International Journal of Mathematics Trends and
Technology, 66(4), 203-210.
[18] G.T. Gemina & E.L. Enriquez. (2020). Super fair
dominating set in the cartesian product of graphs.
International Journal of Engineering and Management
Research, 10(3), 7-11.
[19] E.J. Cockayne, O. Favaron & C.M. Mynhardt. (2003).
Secure domination, weak Roman domination and forbidden
subgraphs. Bull. Inst. Combin. Appl., 39, 87-100.
[20] E.L. Enriquez & S.R. Canoy, Jr. (2015). Secure convex
domination in a graph. International Journal of
Mathematical Analysis, 9(7), 317-325.
[21] E.L. Enriquez. & S.R. Canoy, Jr. (2015). Secure
convex dominating sets in products of graphs.
Applied Mathematical Sciences, 9(56), 2769-2777.
[22] M.P. Baldado, Jr. & E.L. Enriquez. (2017). Super
secure domination in graphs. International Journal of
Mathematical Archive, 8(12), 145-149.
[23] E.L. Enriquez & E.M. Kiunisala. (2016). Inverse
secure domination in graphs. Global Journal of Pure and
Applied Mathematics, 12(1), 147-155.
[24] E.M. Kiunisala & E.L. Enriquez. (2016). On clique
secure domination in graphs. Global Journal of Pure and
Applied Mathematics, 12(3), 2075-2084.
[25] E.L. Enriquez. (2015). Secure convex dominating sets
in corona of graphs. Applied Mathematical Sciences,
9(120), 5961-5967.
[26] C.M. Loquias & E.L. Enriquez. (2016). On secure
convex and restrained convex domination in graphs.
International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962
Volume-10, Issue-3 (June 2020)
www.ijemr.net https://doi.org/10.31033/ijemr.10.3.18
120 This work is licensed under Creative Commons Attribution 4.0 International License.
International Journal of Applied Engineering Research,
11(7), 4707-4710.
[27] E.L. Enriquez. (2017). Secure restrained convex
domination in graphs. International Journal of
Mathematical Archive, 8(7), 1-5.
[28] E.M. Kiunisala & E.L. (2016). Enriquez, inverse
secure restrained domination in the join and corona of
graphs. International Journal of Applied Engineering
Research, 11(9), 6676-6679.
[29] E.L. Enriquez & Evelyn Samper-Enriquez. (2019).
Convex secure domination in the join and cartesian product
of graphs. Journal of Global Research in Mathematical
Archives, 6(5), 1-7.

More Related Content

What's hot

Senior Research Final Draft3
Senior Research Final Draft3Senior Research Final Draft3
Senior Research Final Draft3
Coleman Gorham
 
Simplified proof of kruskal’s tree theorem
Simplified proof of kruskal’s tree theoremSimplified proof of kruskal’s tree theorem
Simplified proof of kruskal’s tree theorem
Alexander Decker
 

What's hot (8)

SPLIT BLOCK SUBDIVISION DOMINATION IN GRAPHS
SPLIT BLOCK SUBDIVISION DOMINATION IN GRAPHSSPLIT BLOCK SUBDIVISION DOMINATION IN GRAPHS
SPLIT BLOCK SUBDIVISION DOMINATION IN GRAPHS
 
Deep learning networks
Deep learning networksDeep learning networks
Deep learning networks
 
Senior Research Final Draft3
Senior Research Final Draft3Senior Research Final Draft3
Senior Research Final Draft3
 
Inference rulesproofmethods
Inference rulesproofmethodsInference rulesproofmethods
Inference rulesproofmethods
 
02 The Math for Analysis of Algorithms
02 The Math for Analysis of Algorithms02 The Math for Analysis of Algorithms
02 The Math for Analysis of Algorithms
 
Simplified proof of kruskal’s tree theorem
Simplified proof of kruskal’s tree theoremSimplified proof of kruskal’s tree theorem
Simplified proof of kruskal’s tree theorem
 
Proof By Contradictions
Proof By ContradictionsProof By Contradictions
Proof By Contradictions
 
Feasible Combinatorial Matrix Theory - LICS2013 presentation
Feasible Combinatorial Matrix Theory - LICS2013 presentationFeasible Combinatorial Matrix Theory - LICS2013 presentation
Feasible Combinatorial Matrix Theory - LICS2013 presentation
 

Similar to Fair Secure Dominating Set in the Corona of Graphs

Jarrar.lecture notes.aai.2011s.ch7.p logic
Jarrar.lecture notes.aai.2011s.ch7.p logicJarrar.lecture notes.aai.2011s.ch7.p logic
Jarrar.lecture notes.aai.2011s.ch7.p logic
PalGov
 

Similar to Fair Secure Dominating Set in the Corona of Graphs (20)

Fuzzy α^m-Separation Axioms
Fuzzy α^m-Separation AxiomsFuzzy α^m-Separation Axioms
Fuzzy α^m-Separation Axioms
 
paper publication
paper publicationpaper publication
paper publication
 
Simplified proof of kruskal’s tree theorem
Simplified proof of kruskal’s tree theoremSimplified proof of kruskal’s tree theorem
Simplified proof of kruskal’s tree theorem
 
Composition of soft set relations and construction of transitive
Composition of soft set relations and construction of transitiveComposition of soft set relations and construction of transitive
Composition of soft set relations and construction of transitive
 
Jarrar.lecture notes.aai.2011s.ch7.p logic
Jarrar.lecture notes.aai.2011s.ch7.p logicJarrar.lecture notes.aai.2011s.ch7.p logic
Jarrar.lecture notes.aai.2011s.ch7.p logic
 
International Journal of Mathematics and Statistics Invention (IJMSI)
International Journal of Mathematics and Statistics Invention (IJMSI)International Journal of Mathematics and Statistics Invention (IJMSI)
International Journal of Mathematics and Statistics Invention (IJMSI)
 
Common Fixed Point Theorem for Weakly Compatible Maps in Intuitionistic Fuzzy...
Common Fixed Point Theorem for Weakly Compatible Maps in Intuitionistic Fuzzy...Common Fixed Point Theorem for Weakly Compatible Maps in Intuitionistic Fuzzy...
Common Fixed Point Theorem for Weakly Compatible Maps in Intuitionistic Fuzzy...
 
The h-Integrability and the Weak Laws of Large Numbers for Arrays
The h-Integrability and the Weak Laws of Large Numbers for ArraysThe h-Integrability and the Weak Laws of Large Numbers for Arrays
The h-Integrability and the Weak Laws of Large Numbers for Arrays
 
The Minimum Hamming Distances of the Irreducible Cyclic Codes of Length
The Minimum Hamming Distances of the Irreducible Cyclic Codes of Length The Minimum Hamming Distances of the Irreducible Cyclic Codes of Length
The Minimum Hamming Distances of the Irreducible Cyclic Codes of Length
 
Optimization Of Fuzzy Bexa Using Nm
Optimization Of Fuzzy Bexa Using NmOptimization Of Fuzzy Bexa Using Nm
Optimization Of Fuzzy Bexa Using Nm
 
Safety-first model with investor’s view under distribution ambiguity
Safety-first model with investor’s view under distribution ambiguitySafety-first model with investor’s view under distribution ambiguity
Safety-first model with investor’s view under distribution ambiguity
 
Bayesian system reliability and availability analysis under the vague environ...
Bayesian system reliability and availability analysis under the vague environ...Bayesian system reliability and availability analysis under the vague environ...
Bayesian system reliability and availability analysis under the vague environ...
 
Bayesian system reliability and availability analysis underthe vague environm...
Bayesian system reliability and availability analysis underthe vague environm...Bayesian system reliability and availability analysis underthe vague environm...
Bayesian system reliability and availability analysis underthe vague environm...
 
Bachelor's Thesis
Bachelor's ThesisBachelor's Thesis
Bachelor's Thesis
 
Random variables
Random variablesRandom variables
Random variables
 
Fss
FssFss
Fss
 
A survey on different definitions of soft points: limitations, comparisons and...
A survey on different definitions of soft points: limitations, comparisons and...A survey on different definitions of soft points: limitations, comparisons and...
A survey on different definitions of soft points: limitations, comparisons and...
 
International journal of engineering issues vol 2015 - no 2 - paper5
International journal of engineering issues   vol 2015 - no 2 - paper5International journal of engineering issues   vol 2015 - no 2 - paper5
International journal of engineering issues vol 2015 - no 2 - paper5
 
16928_5302_1.pdf
16928_5302_1.pdf16928_5302_1.pdf
16928_5302_1.pdf
 
Common Fixed Point Theorem in Menger Space through weak Compatibility
Common Fixed Point Theorem in Menger Space through weak CompatibilityCommon Fixed Point Theorem in Menger Space through weak Compatibility
Common Fixed Point Theorem in Menger Space through weak Compatibility
 

More from Dr. Amarjeet Singh

An Analytical Study on Ratios Influencing Profitability of Selected Indian Au...
An Analytical Study on Ratios Influencing Profitability of Selected Indian Au...An Analytical Study on Ratios Influencing Profitability of Selected Indian Au...
An Analytical Study on Ratios Influencing Profitability of Selected Indian Au...
Dr. Amarjeet Singh
 
Theoretical Estimation of CO2 Compression and Transport Costs for an hypothet...
Theoretical Estimation of CO2 Compression and Transport Costs for an hypothet...Theoretical Estimation of CO2 Compression and Transport Costs for an hypothet...
Theoretical Estimation of CO2 Compression and Transport Costs for an hypothet...
Dr. Amarjeet Singh
 
Awareness of Disaster Risk Reduction (DRR) among Student of the Catanduanes S...
Awareness of Disaster Risk Reduction (DRR) among Student of the Catanduanes S...Awareness of Disaster Risk Reduction (DRR) among Student of the Catanduanes S...
Awareness of Disaster Risk Reduction (DRR) among Student of the Catanduanes S...
Dr. Amarjeet Singh
 
Haryana's Honour Killings: A Social and Legal Point of View
Haryana's Honour Killings: A Social and Legal Point of ViewHaryana's Honour Killings: A Social and Legal Point of View
Haryana's Honour Killings: A Social and Legal Point of View
Dr. Amarjeet Singh
 

More from Dr. Amarjeet Singh (20)

Total Ionization Cross Sections due to Electron Impact of Ammonia from Thresh...
Total Ionization Cross Sections due to Electron Impact of Ammonia from Thresh...Total Ionization Cross Sections due to Electron Impact of Ammonia from Thresh...
Total Ionization Cross Sections due to Electron Impact of Ammonia from Thresh...
 
A Case Study on Small Town Big Player – Enjay IT Solutions Ltd., Bhilad
A Case Study on Small Town Big Player – Enjay IT Solutions Ltd., BhiladA Case Study on Small Town Big Player – Enjay IT Solutions Ltd., Bhilad
A Case Study on Small Town Big Player – Enjay IT Solutions Ltd., Bhilad
 
Effect of Biopesticide from the Stems of Gossypium Arboreum on Pink Bollworm ...
Effect of Biopesticide from the Stems of Gossypium Arboreum on Pink Bollworm ...Effect of Biopesticide from the Stems of Gossypium Arboreum on Pink Bollworm ...
Effect of Biopesticide from the Stems of Gossypium Arboreum on Pink Bollworm ...
 
Artificial Intelligence Techniques in E-Commerce: The Possibility of Exploiti...
Artificial Intelligence Techniques in E-Commerce: The Possibility of Exploiti...Artificial Intelligence Techniques in E-Commerce: The Possibility of Exploiti...
Artificial Intelligence Techniques in E-Commerce: The Possibility of Exploiti...
 
Factors Influencing Ownership Pattern and its Impact on Corporate Performance...
Factors Influencing Ownership Pattern and its Impact on Corporate Performance...Factors Influencing Ownership Pattern and its Impact on Corporate Performance...
Factors Influencing Ownership Pattern and its Impact on Corporate Performance...
 
An Analytical Study on Ratios Influencing Profitability of Selected Indian Au...
An Analytical Study on Ratios Influencing Profitability of Selected Indian Au...An Analytical Study on Ratios Influencing Profitability of Selected Indian Au...
An Analytical Study on Ratios Influencing Profitability of Selected Indian Au...
 
A Study on Factors Influencing the Financial Performance Analysis Selected Pr...
A Study on Factors Influencing the Financial Performance Analysis Selected Pr...A Study on Factors Influencing the Financial Performance Analysis Selected Pr...
A Study on Factors Influencing the Financial Performance Analysis Selected Pr...
 
An Empirical Analysis of Financial Performance of Selected Oil Exploration an...
An Empirical Analysis of Financial Performance of Selected Oil Exploration an...An Empirical Analysis of Financial Performance of Selected Oil Exploration an...
An Empirical Analysis of Financial Performance of Selected Oil Exploration an...
 
A Study on Derivative Market in India
A Study on Derivative Market in IndiaA Study on Derivative Market in India
A Study on Derivative Market in India
 
Theoretical Estimation of CO2 Compression and Transport Costs for an hypothet...
Theoretical Estimation of CO2 Compression and Transport Costs for an hypothet...Theoretical Estimation of CO2 Compression and Transport Costs for an hypothet...
Theoretical Estimation of CO2 Compression and Transport Costs for an hypothet...
 
Analytical Mechanics of Magnetic Particles Suspended in Magnetorheological Fluid
Analytical Mechanics of Magnetic Particles Suspended in Magnetorheological FluidAnalytical Mechanics of Magnetic Particles Suspended in Magnetorheological Fluid
Analytical Mechanics of Magnetic Particles Suspended in Magnetorheological Fluid
 
Techno-Economic Aspects of Solid Food Wastes into Bio-Manure
Techno-Economic Aspects of Solid Food Wastes into Bio-ManureTechno-Economic Aspects of Solid Food Wastes into Bio-Manure
Techno-Economic Aspects of Solid Food Wastes into Bio-Manure
 
Crypto-Currencies: Can Investors Rely on them as Investment Avenue?
Crypto-Currencies: Can Investors Rely on them as Investment Avenue?Crypto-Currencies: Can Investors Rely on them as Investment Avenue?
Crypto-Currencies: Can Investors Rely on them as Investment Avenue?
 
Awareness of Disaster Risk Reduction (DRR) among Student of the Catanduanes S...
Awareness of Disaster Risk Reduction (DRR) among Student of the Catanduanes S...Awareness of Disaster Risk Reduction (DRR) among Student of the Catanduanes S...
Awareness of Disaster Risk Reduction (DRR) among Student of the Catanduanes S...
 
Role of Indians in the Battle of 1857
Role of Indians in the Battle of 1857Role of Indians in the Battle of 1857
Role of Indians in the Battle of 1857
 
Haryana's Honour Killings: A Social and Legal Point of View
Haryana's Honour Killings: A Social and Legal Point of ViewHaryana's Honour Killings: A Social and Legal Point of View
Haryana's Honour Killings: A Social and Legal Point of View
 
Optimization of Digital-Based MSME E-Commerce: Challenges and Opportunities i...
Optimization of Digital-Based MSME E-Commerce: Challenges and Opportunities i...Optimization of Digital-Based MSME E-Commerce: Challenges and Opportunities i...
Optimization of Digital-Based MSME E-Commerce: Challenges and Opportunities i...
 
Modal Space Controller for Hydraulically Driven Six Degree of Freedom Paralle...
Modal Space Controller for Hydraulically Driven Six Degree of Freedom Paralle...Modal Space Controller for Hydraulically Driven Six Degree of Freedom Paralle...
Modal Space Controller for Hydraulically Driven Six Degree of Freedom Paralle...
 
Capacity Expansion Banes in Indian Steel Industry
Capacity Expansion Banes in Indian Steel IndustryCapacity Expansion Banes in Indian Steel Industry
Capacity Expansion Banes in Indian Steel Industry
 
Metamorphosing Indian Blockchain Ecosystem
Metamorphosing Indian Blockchain EcosystemMetamorphosing Indian Blockchain Ecosystem
Metamorphosing Indian Blockchain Ecosystem
 

Recently uploaded

HIV AND INFULENZA VIRUS PPT HIV PPT INFULENZA VIRUS PPT
HIV AND INFULENZA VIRUS PPT HIV PPT  INFULENZA VIRUS PPTHIV AND INFULENZA VIRUS PPT HIV PPT  INFULENZA VIRUS PPT

Recently uploaded (20)

ABHISHEK ANTIBIOTICS PPT MICROBIOLOGY // USES OF ANTIOBIOTICS TYPES OF ANTIB...
ABHISHEK ANTIBIOTICS PPT MICROBIOLOGY  // USES OF ANTIOBIOTICS TYPES OF ANTIB...ABHISHEK ANTIBIOTICS PPT MICROBIOLOGY  // USES OF ANTIOBIOTICS TYPES OF ANTIB...
ABHISHEK ANTIBIOTICS PPT MICROBIOLOGY // USES OF ANTIOBIOTICS TYPES OF ANTIB...
 
An Overview of Active and Passive Targeting Strategies to Improve the Nano-Ca...
An Overview of Active and Passive Targeting Strategies to Improve the Nano-Ca...An Overview of Active and Passive Targeting Strategies to Improve the Nano-Ca...
An Overview of Active and Passive Targeting Strategies to Improve the Nano-Ca...
 
GBSN - Biochemistry (Unit 8) Enzymology
GBSN - Biochemistry (Unit 8) EnzymologyGBSN - Biochemistry (Unit 8) Enzymology
GBSN - Biochemistry (Unit 8) Enzymology
 
Classification of Kerogen, Perspective on palynofacies in depositional envi...
Classification of Kerogen,  Perspective on palynofacies in depositional  envi...Classification of Kerogen,  Perspective on palynofacies in depositional  envi...
Classification of Kerogen, Perspective on palynofacies in depositional envi...
 
NuGOweek 2024 programme final FLYER short.pdf
NuGOweek 2024 programme final FLYER short.pdfNuGOweek 2024 programme final FLYER short.pdf
NuGOweek 2024 programme final FLYER short.pdf
 
EU START PROJECT. START-Newsletter_Issue_4.pdf
EU START PROJECT. START-Newsletter_Issue_4.pdfEU START PROJECT. START-Newsletter_Issue_4.pdf
EU START PROJECT. START-Newsletter_Issue_4.pdf
 
A Scientific PowerPoint on Albert Einstein
A Scientific PowerPoint on Albert EinsteinA Scientific PowerPoint on Albert Einstein
A Scientific PowerPoint on Albert Einstein
 
HIV AND INFULENZA VIRUS PPT HIV PPT INFULENZA VIRUS PPT
HIV AND INFULENZA VIRUS PPT HIV PPT  INFULENZA VIRUS PPTHIV AND INFULENZA VIRUS PPT HIV PPT  INFULENZA VIRUS PPT
HIV AND INFULENZA VIRUS PPT HIV PPT INFULENZA VIRUS PPT
 
Heads-Up Multitasker: CHI 2024 Presentation.pdf
Heads-Up Multitasker: CHI 2024 Presentation.pdfHeads-Up Multitasker: CHI 2024 Presentation.pdf
Heads-Up Multitasker: CHI 2024 Presentation.pdf
 
Introduction and significance of Symbiotic algae
Introduction and significance of  Symbiotic algaeIntroduction and significance of  Symbiotic algae
Introduction and significance of Symbiotic algae
 
PARENTAL CARE IN FISHES.pptx for 5th sem
PARENTAL CARE IN FISHES.pptx for 5th semPARENTAL CARE IN FISHES.pptx for 5th sem
PARENTAL CARE IN FISHES.pptx for 5th sem
 
PHOTOSYNTHETIC BACTERIA (OXYGENIC AND ANOXYGENIC)
PHOTOSYNTHETIC BACTERIA  (OXYGENIC AND ANOXYGENIC)PHOTOSYNTHETIC BACTERIA  (OXYGENIC AND ANOXYGENIC)
PHOTOSYNTHETIC BACTERIA (OXYGENIC AND ANOXYGENIC)
 
Costs to heap leach gold ore tailings in Karamoja region of Uganda
Costs to heap leach gold ore tailings in Karamoja region of UgandaCosts to heap leach gold ore tailings in Karamoja region of Uganda
Costs to heap leach gold ore tailings in Karamoja region of Uganda
 
TransientOffsetin14CAftertheCarringtonEventRecordedbyPolarTreeRings
TransientOffsetin14CAftertheCarringtonEventRecordedbyPolarTreeRingsTransientOffsetin14CAftertheCarringtonEventRecordedbyPolarTreeRings
TransientOffsetin14CAftertheCarringtonEventRecordedbyPolarTreeRings
 
FORENSIC CHEMISTRY ARSON INVESTIGATION.pdf
FORENSIC CHEMISTRY ARSON INVESTIGATION.pdfFORENSIC CHEMISTRY ARSON INVESTIGATION.pdf
FORENSIC CHEMISTRY ARSON INVESTIGATION.pdf
 
Adaptive Restore algorithm & importance Monte Carlo
Adaptive Restore algorithm & importance Monte CarloAdaptive Restore algorithm & importance Monte Carlo
Adaptive Restore algorithm & importance Monte Carlo
 
Efficient spin-up of Earth System Models usingsequence acceleration
Efficient spin-up of Earth System Models usingsequence accelerationEfficient spin-up of Earth System Models usingsequence acceleration
Efficient spin-up of Earth System Models usingsequence acceleration
 
GBSN - Biochemistry (Unit 3) Metabolism
GBSN - Biochemistry (Unit 3) MetabolismGBSN - Biochemistry (Unit 3) Metabolism
GBSN - Biochemistry (Unit 3) Metabolism
 
Terpineol and it's characterization pptx
Terpineol and it's characterization pptxTerpineol and it's characterization pptx
Terpineol and it's characterization pptx
 
Technical english Technical english.pptx
Technical english Technical english.pptxTechnical english Technical english.pptx
Technical english Technical english.pptx
 

Fair Secure Dominating Set in the Corona of Graphs

  • 1. International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962 Volume-10, Issue-3 (June 2020) www.ijemr.net https://doi.org/10.31033/ijemr.10.3.18 115 This work is licensed under Creative Commons Attribution 4.0 International License. Fair Secure Dominating Set in the Corona of Graphs Lorelyn P. Gomez1 and Enrico L. Enriquez2 1 Faculty, Don Gerardo Ll. Ouano Memorial National High School, Mandaue City, PHILIPPINES 2 Faculty, Department of Computer, Information Science and Mathematics, University of San Carlos, Cebu City 6000, PHILIPPINES 1 Corresponding Author: gomezkatelor@gmail.com ABSTRACT In this paper, we extend the concept of fair secure dominating sets by characterizing the corona of two nontrivial connected graphs and give some important results. Keywords— Fair Dominating Set, Secure Dominating Set, Fair Secure Dominating Set, Corona, Cartesian Product I. INTRODUCTION A graph is a pair where is a finite nonempty set called the vertex-set of and is a set of unordered pairs (or simply ) of distinct elements from called the edge-set of The elements of are called vertices and the cardinality of is the order of The elements of are called edges and the cardinality of is the size of If then is called a trivial graph. If then is called an empty graph. The open neighborhood of a vertex is the set The elements of are called neighbors of The closed neighborhood of is the set If the open neighborhood of in is the set The closed neighborhood of in is the set When no confusion arises, [resp. will be denoted by [resp. For the general terminology in graph theory, readers may refer to [1]. Domination in graph was introduced by Claude Berge in 1958 and Oystein Ore in 1962 [2]. A subset of is a dominating set of if for every there exists such that , i.e. The domination number of is the smallest cardinality of a dominating set of Related studies on domination in graphs were found in the papers [3,4,5,6,7,8,9,10,11,12]. In 2011, Caro, Hansberg and Henning [13] introduced fair domination and -fair domination in graphs. A dominating subset of is a fair dominating set in if all the vertices not in are dominated by the same number of vertices from that is, for every two distinct vertices and from and a subset of is a -fair dominating set in if for every vertex , The minimum cardinality of a fair dominating set of , denoted by is called the fair domination number of A fair dominating set of cardinality is called -set. Related studies on fair domination in graphs were found in the papers [14,15,16,17,18]. Other variant of domination is the secure domination in graphs. A dominating set of is a secure dominating set of if for each there exists such that and the set is a dominating set of . The minimum cardinality of a secure dominating set of , denoted by , is called the secure domination number of A secure dominating set of cardinality is called a -set of Secure dominating set was introduced by E.J. Cockayne et.al [19]. Secure dominating sets can be applied as protection strategies by minimizing the number of guards to secure a system so as to be cost effective as possible. Some variants of secure domination in graphs were found in the papers [20,22,23,24,25,26,27,28,29]. A fair dominating set is a fair secure dominating set if for each there exists such that and the set ( is a dominating set of . The minimum cardinality of a fair secure dominating set of denoted by is called the fair secure domination number of A fair secure dominating set of cardinality is called -set. In this paper, we extend the study of fair secure dominating set by giving the characterization of a fair secure dominating set in the corona of two nontrivial connected graphs and give some important results. II. RESULTS The following known results are needed in this paper. Remark 2.1 [13] If then where the minimum is taken over all integers where
  • 2. International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962 Volume-10, Issue-3 (June 2020) www.ijemr.net https://doi.org/10.31033/ijemr.10.3.18 116 This work is licensed under Creative Commons Attribution 4.0 International License. Example 2.2 Consider the graph in Figure 1. The sets , and are fair secure dominating sets of . Thus or is a minimum fair secure dominating set of . Hence, Remark 2.3 [15] A fair secure dominating set of a graph is a fair dominating set and a secure dominating set of . Remark 2.4 [15] Let be any connected graph of order Then and Remark 2.5 [15] Let . The . We need the following results for the characterization of the fair secure dominating set resulting from the corona of two graphs. Lemma 2.6 Let where is a nontrivial connected graph. If is a dominating set of where then is a secure dominating set of Proof : Suppose is a dominating set of . Let Then is a dominating set of Since , let . Then for every there exists such that Let If v = x, then Since is a dominating set of , it is a dominating set of Thus, is a dominating set of If , then because Thus, Since is a dominating set of , it follows that is a dominating set of Accordingly, S is a secure dominating set of . Lemma 2.7 Let where is a nontrivial connected graph. If is a secure dominating set of where , then is a secure dominating set of Proof : Suppose that is a secure dominating set of where Then is a dominating set of Let Then there exists such that If then . Since is a dominating set of , is also a dominating set of . If then . Since S is a secure dominating set of , is a dominating set of H and hence a dominating set of . Therefore, is a secure dominating set of The next result shows the characterization of a fair secure dominating set of a graph Theorem 2.8 Let where is a nontrivial connected graph. Then a nonempty subset of is a fair secure dominating set if and only if one of the following is satisfied: (i) and is complete. (ii) where is fair dominating set of (iii) where is a secure -fair dominating set of or Proof : Suppose that a nonempty subset of is a fair secure dominating set. Consider the following cases: Case 1. Suppose that . Let In view of Remark 2.5, must be a complete graph. Hence is complete. This proves statement (i). Case 2. Suppose that . First, if , then let where is a nonempty proper subset of If is complete, then is also complete, that is, by Remark 2.5. Thus, is a fair dominating set of If is non-complete, then is also non-complete. Let Suppose to the contrary is not a fair dominating set of . Since is non-complete connected graph, . Let with such that . Thus, for every This implies that is not a fair dominating set of contrary to our assumption. Hence, must be a fair dominating set of This proves statement Next, if , then let where is a nonempty subset of If then we are done with the proof of statement . Suppose that Then is a nonempty proper subset of . Further, is a fair dominating set of (since and hence a fair dominating set of . Suppose is not an -fair dominating set of Then . Clearly, . Let Then
  • 3. International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962 Volume-10, Issue-3 (June 2020) www.ijemr.net https://doi.org/10.31033/ijemr.10.3.18 117 This work is licensed under Creative Commons Attribution 4.0 International License. , since , since Thus, where . This is contrary to our assumption that is a fair dominating set of . Hence, must be an -fair dominating set of proving statement For the converse, suppose that statement is satisfied. Then and is complete. This implies that is complete. By Remark 2.5, is a fair secure dominating set of Next, suppose that is satisfied. Then where is fair dominating set of Since is nontrivial connected graph, . If , then let . Clearly, the set is a fair secure dominating set of . Suppose that . Let . Then . Thus, for every , since This implies that is a fair dominating set of . Since is a dominating set of , it follows that is a secure dominating set of by Lemma 2.6. Accordingly, is a fair secure dominating set of Finally, suppose that is satisfied. Then where is an -fair secure dominating set of or Consider that Clearly, is a fair secure dominating set of . Consider that is an -fair dominating set of . Let . Then Clearly, . Let Then , since , since Thus, where . This means that is a fair dominating set of . Since is a secure dominating set of it follows that is a secure dominating set of by Lemma 2.7. Accordingly, is a fair secure dominating set of We need the following definition and remark for the characterization of a fair secure dominating set in the corona of two graphs. Definition 2.9 Let and be graphs of order and , respectively. The corona of two graphs and is the graph obtained by taking one copy of and copies of , and then joining the vertex of to every vertex of the copy of The join of vertex of and a copy of in the corona of and is denoted by Remark 2.10 Let and be nontrivial connected graphs. Then |. The following result is the characterization of the fair secure dominating set resulting from the corona of two graphs. Theorem 2.11 Let and be nontrivial connected graphs. Then a nonempty subset of is a fair secure dominating set if and only if one of the following is satisfied: and is complete. where and is fair dominating set of where is an -fair secure dominating set of or Proof : Suppose that a nonempty subset of is a fair secure dominating set. Consider the following cases. Case 1. Suppose that By Remark 2.10 and Remark 2.4, This means that First, consider that . Let . Since is a fair secure dominating set of , must be a fair secure dominating set of . This implies that for each , is complete by Theorem 2.8. Thus, and is complete, proving statement Next, consider that Then Let and for all . If then Thus Since is nontrivial connected graph, . Suppose that . Clearly, is a fair dominating set of for all . Suppose that . Then . Let for all Since is a fair dominating set of , for all . Thus, for all
  • 4. International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962 Volume-10, Issue-3 (June 2020) www.ijemr.net https://doi.org/10.31033/ijemr.10.3.18 118 This work is licensed under Creative Commons Attribution 4.0 International License. . This implies that for all . Hence, is a fair dominating set of for all . Thus, where and is fair dominating set of Similarly, if then where and is fair dominating set of This complete the proofs of statement . Case 2. Suppose that Let where . If for all , then the proofs of statement is done. Suppose that for all Then for all Clearly, if then is an -fair secure dominating set of . Suppose that Then Let for all Since is a fair dominating set of , for all . Thus, for all . This implies that is a fair dominating set of for all Let . Since is a secure dominating set of there exists such that and is a dominating set of . Now, , there exists such that and is dominating set of for each . This implies that is a fair secure dominating set of for all . Further, for all Let . Then . . This implies that is an is an -fair secure dominating set of . This complete the proofs of statement For the converse, suppose that statement is satisfied. Then and is complete. Let . Then is a fair secure dominating set of by Theorem 2.8 . Clearly, is a fair secure dominating set of . Thus, is a fair secure dominating set of . Suppose that statement is satisfied. Then where and is fair dominating set of If then is a fair secure dominating set of for all where is fair dominating set of by Theorem 2.8 . Clearly, is a fair secure dominating set of . Similarly, if , then is a fair secure dominating set of Suppose that statement is satisfied. Then where is an -fair secure dominating set of or If then by Theorem 2.8 is a fair secure dominating set of for all . Clearly, is a fair secure dominating set of . If is an -fair secure dominating set of then is a fair secure dominating set of by Theorem 2.8 . Clearly, is a fair secure dominating set of . The following result is an immediate consequence of Theorem 2.11. Corollary 2.12 Let and be nontrivial connected graphs. Then secure dominating set of Proof: If is complete, then by Theorem 2.11 , is a fair secure dominating set of . This implies that In view of the Remark 2.10 and Remark 2.4, This shows that If is an -fair secure dominating set of for all , then is a fair secure dominating set of by Theorem 2.11 If is complete, then by Remark 2.5, is a fair secure dominating set of Thus, Since , it follows that . Suppose that is non-complete. Then for all . Thus, . Suppose is a minimum fair secure dominating set of Then Thus,
  • 5. International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962 Volume-10, Issue-3 (June 2020) www.ijemr.net https://doi.org/10.31033/ijemr.10.3.18 119 This work is licensed under Creative Commons Attribution 4.0 International License. where is a minimum -fair secure dominating set of for all . Accordingly, . III. CONCLUSION AND RECOMMENDATIONS In this work, we extend the concept of the fair secure domination of graphs. The fair secure domination in the corona of two connected nontrivial graphs was characterized. The exact fair secure domination number resulting from the corona of two connected nontrivial graphs was computed. This study will guide us to new research such bounds and other binary operations of two connected graphs. Other parameters relating the fair secure domination in graphs may also be explored. Finally, the characterization of a fair secure domination in graphs and its bounds is a promising extension of this study. REFERENCES [1] G. Chartrand & P. Zhang. (2012). A first course in graph theory. New York: Dover Publication, Inc. [2] O. Ore. (1962). Theory of graphs. American Mathematical Society Colloquium Publications, 38. (American Mathematical Society, Providence, RI). [3] D.P. Salve & E.L. Enriquez. (2016). Inverse perfect domination in the composition and cartesian product of graphs. Global Journal of Pure and Applied Mathematics, 2(1), 1-10. [4] C. M. Loquias, E. L. Enriquez, & J. Dayap. (2017). Inverse clique domination in graphs. Recoletos Multidisciplinary Research Journal, 4(2), 23-34. [5] E.L. Enriquez & S.R. Canoy, Jr. (2015). On a variant of convex domination in a graph. International Journal of Mathematical Analysis, 9(32), 1585-1592. [6] J.A. Dayap & Enriquez. (2020). Outer-convex domination in graphs. Discrete Mathematics, Algorithms and Applications, 12(01), 2050008. Available at: https://doi.org/10.1142/S1793830920500081. [7] E.L. Enriquez & S.R. Canoy, Jr. (2015). Restrained convex dominating sets in the corona and the products of graphs. Applied Mathematical Sciences, 9(78), 3867-3873. [8] T.J. Punzalan & E.L. Enriquez. (2016). Inverse restrained domination in graphs. Global Journal of Pure and Applied Mathematics, 3, 1-6. [9] R.C. Alota & E.L. Enriquez. (2016). On disjoint restrained domination in graphs. Global Journal of Pure and Applied Mathematics, 12(3), 2385-2394. [10] E.L. Enriquez. (2018). Super restrained domination in the corona of graphs. International Journal of Latest Engineering Research and Applications, 3(5), 1-6. [11] J.A. Dayap & E.L. Enriquez. (2019). Outer-convex domination in the composition and cartesian product of graphs. Journal of Global Research in Mathematical Archives, 6(3), 34-42. [12] G.M. Estrada, C.M. Loquias, E.L. Enriquez, & C.S. Baraca. (2019). Perfect doubly connected domination in the join and corona of graphs. International Journal of Latest Engineering Research and Applications, 4(7), 17-21. [13] Caro, Y., Hansberg, A., & Henning, M. (2011). Fair domination in graphs. University of Haifa, pp. 1-7. [14] E.L. Enriquez. (2020). Fair restrained domination in graphs. International Journal of Mathematics Trends and Technology, 66(1), 229-235. [15] E.L. Enriquez. (2020). Fair secure domination in graphs. International Journal of Mathematics Trends and Technology, 66(2), 49-57. [16] E.L. Enriquez. (2019). Super fair dominating set in graphs. Journal of Global Research in Mathematical Archives, 6(2), 8-14. [17] E.L. Enriquez & G.T. Gemina. (2020). Super fair domination in the corona and lexicographic product of graphs. International Journal of Mathematics Trends and Technology, 66(4), 203-210. [18] G.T. Gemina & E.L. Enriquez. (2020). Super fair dominating set in the cartesian product of graphs. International Journal of Engineering and Management Research, 10(3), 7-11. [19] E.J. Cockayne, O. Favaron & C.M. Mynhardt. (2003). Secure domination, weak Roman domination and forbidden subgraphs. Bull. Inst. Combin. Appl., 39, 87-100. [20] E.L. Enriquez & S.R. Canoy, Jr. (2015). Secure convex domination in a graph. International Journal of Mathematical Analysis, 9(7), 317-325. [21] E.L. Enriquez. & S.R. Canoy, Jr. (2015). Secure convex dominating sets in products of graphs. Applied Mathematical Sciences, 9(56), 2769-2777. [22] M.P. Baldado, Jr. & E.L. Enriquez. (2017). Super secure domination in graphs. International Journal of Mathematical Archive, 8(12), 145-149. [23] E.L. Enriquez & E.M. Kiunisala. (2016). Inverse secure domination in graphs. Global Journal of Pure and Applied Mathematics, 12(1), 147-155. [24] E.M. Kiunisala & E.L. Enriquez. (2016). On clique secure domination in graphs. Global Journal of Pure and Applied Mathematics, 12(3), 2075-2084. [25] E.L. Enriquez. (2015). Secure convex dominating sets in corona of graphs. Applied Mathematical Sciences, 9(120), 5961-5967. [26] C.M. Loquias & E.L. Enriquez. (2016). On secure convex and restrained convex domination in graphs.
  • 6. International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962 Volume-10, Issue-3 (June 2020) www.ijemr.net https://doi.org/10.31033/ijemr.10.3.18 120 This work is licensed under Creative Commons Attribution 4.0 International License. International Journal of Applied Engineering Research, 11(7), 4707-4710. [27] E.L. Enriquez. (2017). Secure restrained convex domination in graphs. International Journal of Mathematical Archive, 8(7), 1-5. [28] E.M. Kiunisala & E.L. (2016). Enriquez, inverse secure restrained domination in the join and corona of graphs. International Journal of Applied Engineering Research, 11(9), 6676-6679. [29] E.L. Enriquez & Evelyn Samper-Enriquez. (2019). Convex secure domination in the join and cartesian product of graphs. Journal of Global Research in Mathematical Archives, 6(5), 1-7.