DOI QR코드

DOI QR Code

SECURE DOMINATION PARAMETERS OF HALIN GRAPH WITH PERFECT K-ARY TREE

  • R. ARASU (Department of Mathematics, College of Engineering and Technology, SRM Institute of Science and Technology) ;
  • N. PARVATHI (Department of Mathematics, College of Engineering and Technology, SRM Institute of Science and Technology)
  • 투고 : 2022.11.10
  • 심사 : 2023.03.13
  • 발행 : 2023.07.30

초록

Let G be a simple undirected graph. A planar graph known as a Halin graph(HG) is characterised by having three connected and pendent vertices of a tree that are connected by an outer cycle. A subset S of V is said to be a dominating set of the graph G if each vertex u that is part of V is dominated by at least one element v that is a part of S. The domination number of a graph is denoted by the γ(G), and it corresponds to the minimum size of a dominating set. A dominating set S is called a secure dominating set if for each v ∈ V\S there exists u ∈ S such that v is adjacent to u and S1 = (S\{v}) ∪ {u} is a dominating set. The minimum cardinality of a secure dominating set of G is equal to the secure domination number γs(G). In this article we found the secure domination number of Halin graph(HG) with perfet k-ary tree and also we determined secure domination of rooted product of special trees.

키워드

과제정보

We would like to thank the unknown referees for their comments and suggestions on the manuscript in improving from an earlier version. The authors R. Arasu and N. Parvathi are very much thankful to the management, SRM Institute of Science and Technology for their continuous support and encouragement.

참고문헌

  1. T. Araki, R. Yamanaka, Secure domination in cographs, Discrete Applied Mathematics 262 (2019), 179-184. https://doi.org/10.1016/j.dam.2019.02.043
  2. T. Araki, H. Miyazaki, Secure domination in proper interval graphs, Discrete Applied Mathematics 247 (2018), 70-76. https://doi.org/10.1016/j.dam.2018.03.040
  3. B. Newman, E.T. Liu, Perspective on BRCA1, Breast Disease 10 (1998), 3-10. https://doi.org/10.3233/BD-1998-101-203
  4. D.F. Pilkey, Happy conservation laws, Neural Stresses (1995), 332-391.
  5. T.W. Haynes, S. Hedetniemi, P. Slater Fundamentals of Domination in Graphs, CRC Press, 2013.
  6. E.C. Castillano, R.A.L. Ugbinada, Secure Domination in the Joins of Graphs, Applied Mathematical Sciences 8 (2014), 5203-5211.
  7. P.J.P. Grobler, C.M. Mynhardt, Secure domination critical graphs, Discrete Mathematics 309 (2009), 5820-5827. https://doi.org/10.1016/j.disc.2008.05.050
  8. C.M. Mynhardt, H.C. Swart and E. Ungerer, Excellent trees and secure domination, Util. Math. 67 (2005), 255-267.
  9. A. Kisek, S. Klavzar, Correcting the algorithm for the secure domination number of cographs by Jha, Pradhan, and Banerjee, Information Processing Letters 172 (2021), 106-155.
  10. D. Anandhababu, N. Parvathi. Construction of Halin graph with perfect k-ary tree and its independent domination number, Journal of Discrete Mathematical Sciences and Cryptography 22 (2019), 1101-1106. https://doi.org/10.1080/09720529.2019.1689607
  11. E.J. Cockayne, P.J.P. Grobler, W.R. Grundlingh, J. Munganga, J.H. Van Vuuren, Protection of a graph, Utilitas Mathematica 67 (2004), 19-32.
  12. A.P. Burger, M.A. Henning, J.H. van Vuuren, Vertex covers and secure domination in graphs, Quaest. Math. 31 (2008), 163-171. https://doi.org/10.2989/QM.2008.31.2.5.477
  13. W.F. Klostermeyer, C.M. Mynhardt, Secure domination and secure total domination in graphs, Discussiones Mathematicae Graph Theory 28 (2008), 267-284. https://doi.org/10.7151/dmgt.1405
  14. A. Mohamed Ali, S. Rajkumar, Some results on secure domination in zero-divisor graphs, J. Math. Comput. Sci. 11 (2021), 4799-4809.
  15. H.B. Merouane, M. Chellali, On Secure Domination in Graphs, Information Processing Letters bf 115 (2014), 786-790.
  16. D. Kuziak, M. Lema'nska, I.G. Yero, Domination-related parameters in rooted product graphs, Bulletin of the Malaysian Mathematical Sciences Society bf 39 (2016), 199-217. https://doi.org/10.1007/s40840-015-0182-5
  17. Z. Li, J. Xu, A characterization of trees with equal independent domination and secure domination numbers, Information Processing Letters 119 (2017), 14-18. https://doi.org/10.1016/j.ipl.2016.11.004