Published: 15 July 2024

Secure metric dimension of new classes of graphs

Iqbal M. Batiha1
Basma Mohamed2
Iqbal H. Jebril3
1Nonlinear Dynamics Research Center (NDRC), Ajman University, Ajman 346, United Arab Emirates
1, 3Department of Mathematics, Al Zaytoonah University of Jordan, Amman, 11733, Jordan
2Giza Higher Institute for Managerial Sciences, Tomah, Egypt
Corresponding Author:
Iqbal M. Batiha
Views 81
Reads 49
Downloads 119

Abstract

The metric representation of a vertex v of a graph G is a finite vector representing distances of v with respect to vertices of some ordered subset SV (G). If no suitable subset of S provides separate representations for each vertex of V(G), then the set S is referred to as a minimal resolving set. The metric dimension of G is the cardinality of the smallest (with respect to its cardinality) minimal resolving set. A resolving set S is secure if for any vVS, there exists xS such that (S{x}){v} is a resolving set. For various classes of graphs, the value of the secure resolving number is determined and defined. The secure metric dimension of the graph classes is being studied in this work. The results show that different graph families have different metric dimensions.

Highlights

  • Determining and defining the value of the secure resolving number of a resolving set for various classes of graph.
  • Studying the secure metric dimension of the graph classes.
  • Demonstrating how various graph families can have varying metric dimensions.

1. Introduction

Let G=(V, E) be a connected, simple, finite graph. On which the ordering (x1, x2,..., xk) is imposed, let S-={x1, x2,..., xk}. The metric description of b with regard to S- is defined as the ordered k-tuples r(b |S-)=(d(x1, b), d(x2, b),..., d(xk, b)) for each bV(G). If r(x| S-)=r (b|S-) implies x=b for every x, bV(G), then the set S- is referred to as a resolving set of G. A minimal resolving set, also known as a basis, is a resolving set of G with minimum cardinality. The dimension of G, represented by dim(G), is the cardinality of a minimum resolving set [1].

There is previous study in the literature on the location of sets in a connected graph [2, 3]. Nearly forty years ago, Slater introduced the idea of finding sets (resolving sets) and a reference set (metric dimension). Afterwards, the aforementioned theory [4] was independently discovered by Harary and Melter. They started referring to location numbers as metric dimensions. On resolving sets, resolving dominating sets, independent resolving sets, etc., many papers have been composed. In a graph, the concept of security is linked to many kinds of sets. A dominating set D of G is a secure set, for instance, if there is an xD such that (D-{u}){v} is a dominating set for any vV-D [5, 6]. Farooq et al. [7] studied the metric dimension of the line graph of the Bakelite network and subdivided the Bakelite network. According to [8], a path graph is the only graph with a metric dimension of 1. For n3, the metric dimension of the cycle graph is 2. This idea is especially helpful for applications including chemistry and space routing. For instance, in space routing, the objective is to assign the smallest number of robots feasible to certain vertices so that they can visit each vertex exactly once. The problem can be resolved by applying the idea of metric dimension. The minimal landmarks needed for the hexagonal network HX(n) and the honeycomb network HC(n) are three and six, respectively, according to research by Abbas et al. [9]. The local metric dimension of a number of specific line graphs was examined by Yang et al. [10]. Jothi et al. [11] investigated the relation between the metric dimension of a bipartite graph and its projections. Additionally, they provided some realization results for the bounds on the metric dimension of a bipartite graph. The dominant metric dimension of the generalized Petersen graph was examined by Susilowati et al. [12]. Mazidah et al. [13] examined the resolving independent domination number of path graph, cycle graph, friendship graph, helm graph and fan graph. The maximum number of vertices in a bipartite graph with a particular diameter and metric dimension was computed by Dankelmann et al. [14]. Additional details can be discovered in the literature [15-19].

Our main aim in this paper is to compute the secure resolving set of some graphs, including the join of (m, n) Kite graph, the 1-join of square of path Pn2 graph, coconut tree CT(m, n) and extended jewel graph.

Definition 1.1 The basis of the graph is the resolving set with the least vertices [7].

Definition 1.2 [20]: A (m, n) Kite graph is made up of a cycle of length m with n edges and a path connected to one of the cycle's vertices.

Definition 1.3 [21]: A Coconut tree CT(m, n): for any positive integers n and m2 is derived from the path Pm by attaching n additional pendant edges at an end vertex of Pm.

Illustration 1.3. Consider 5, for which R={u1, u4}. Then, R is resolving, and for any uV-R, there exists vR such that (R-{v}){u}) is a resolving set of 5. It can be easily seen that sdim (5)=2.

Fig. 1An example on a Kite graph

An example on a Kite graph

2. Secure resolving dimension for several known graphs [5, 6]

1. sdim(Kn)=n-1=dim(Kn).

2. sdim(K1, n)=n>dim(K1, n).

3. sdim Km,n=m+n-2=dimKm,n, (m, n2).

4. sdim Pn=2>dim Pn=1, (n3).

5. sdim(Cn)=2=dim(Cn).

6. For Trapezoid graph Trn, dim(Trn)=2 and sdim(Trn)=2, for all n6.

7. For Z-(Pn) graph, dim(Z-(Pn))=2 and sdim(Z-(Pn))=2.

8. For Tortoise graph Ton, dim (Ton)=2 and sdim(Ton)=2.

9. sdim(P2nPn)=2=dim(P2nPn).

3. Main results

Here, we demonstrate that the secure metric dimension of including the join of (m, n) Kite graph, the 1-join of square of path Pn2 graph, coconut tree CT(m, n) and extended jewel graph. We also derive the explicit formulas for the secure metric dimension of shadow graph of path D2(Pn), Jelly fish Jn,n, Lilly graph Ln, Twig graph Tgn, Joint sum of two copies of Cn, quadrilateral graphs Qn and subdividing all the edges of PnʘK1.

Theorem 3.1: Let G is Join of (m, n) Kite graph Km,n with n vertices and {v1,vn/2+3} be a secure metric basis of G, then sdim(Km,n)=2.

Fig. 2Join of (m, n) Kite graph Km,n

Join of (m, n) Kite graph Km,n

Proof. The secure resolving set in general form is S-={v1,vm+3}V(G). The following are representations of the vertices viV(G) with respect to S-:

r(vi|S-)=0,n2, i=1,1,n2,i=2,i-2,m-i+2, 3im+1,m,1, i=m+2,m,0, i=m+3,i-3,i-m-3,m+4i n.

Since all vertices have unique representations, we obtain sdim(Km,n)=2.

Theorem 3.2: Let G is 1-join of square of path Pn2 with n vertices and {v1,vn/2+3} be a secure metric basis of G, then sdim(Pn2)=2.

Fig. 31-join of square of path Pn2

1-join of square of path Pn2

Proof. We label the 1-join of square of path Pn2 as shown in Fig. 2 such that n is the vertices number. It is clear that |V(G)| is n=k+4. Let S -={v2,vn-1}.

Begin

d(v1, S-)=1,n2,dv2,S-=0,n2-1

for (i=3; i<=n2; i=i+2)

d(vi, S-)=i-12,n-i+12

end

for (i=4; i<=n2-1; i=i+2)

d(vi, S-)=i2,n-i+22

end

for (i=n2+1; i<=n; i=i+2)

dvi, S-=i2,n-i2

end

for (i=n2+2; i<=n-1; i=i+2)

dvi, S-=i+12,n-i+12

end

end

This completes the proof.

Theorem 3.3: If CT(m, n), n2, m4 is coconut tree, then sdim(CT(m, n))=m.

Proof. The secure resolving set in general form is S -={v1,v2,vm-1,vn }V(CT(m, n)). The representations of vertices viV(CT(m, n)) in regard to S -are as follow.

We choose a subset S -={v1,v2, v3,,vm-1,vn}, and we must demonstrate that sdim (CT (m, n))=m for m4 and n3. We obtained the representations of vertices in graph CT(m, n) with respect to S -are:

r(v1|S -)=(0, 2, 2, ,2, m+2)

r(v2|S -)=(2, 0, 2, , 2, m+2)

r(v3|S -)=(2, 2, 0,, 2, m+2)

r(vm|S -)=(2, 2, 2,,2, m+2)

r(vm+1|S-)=(1, 1, 1, ,1,m+1)

r(vm+2|S -)=(i-m, i-m, ,i-m, 2m-i+2)

r(vn|S -)=(i-m, i-m, , 2m-i+2)

Fig. 4Coconut tree CT(m, n)

Coconut tree CT(m, n)

The representations of vertices in graph CT (m, n) are distinct as seen above. This implies that S- is secure resolving set, but this does not prove that it is the lower bound. As a result, the upper bound is sdim(CT(m, n))m. Now, we demonstrate that sdim(CT(m,n))m. Let S -={v1,v2,v3,,vm-1,vn} be a secure resolving set with |S -|=m. Assume that S1- is another minimal resolving set, or |S1-|<m.

If we select an ordered set S1-S --{vi,vj}, 1i, jm, ij, so that there exist two vertices vi,vjCT(m, n) such that r(vi|S -)=r(vj|S -)=(i-m, i-m, . . . , i-m). S1-is not a secure resolving set, which is contrary to assumption. As a result, sdim(CT(m, n))m is the lower bound. From the above proving, we conclude that sdim(CT(m, n))=m.

Theorem 3.4: If E (jn), n7, is extended jewel graph, then sdim(E(jn))=n-4.

Proof. We choose a subset S -={v1,v2,v3,,vn-5,vn}, and we must demonstrate that sdim(E(jn))=n-4 for n7. We obtained the representations of vertices in graph E(jn) with respect to S -are:

r(v1|S -)=(0, 2, 2,,2, 2)

r(v2|S -)=(2, 0, 2, , 2, 2)

r(v3|S -)=(2, 2, 0,, 2, 2)

r(vn-5|S -)=(2, 2, 2,,2, 0,2)

r(vn-4|S -)=(2, 2, 2, ,2,2)

r(vn-3|S -)=(3,1,,1, 1)

r(vn-2|S -)=(1,3,1,,1, 1)

r(vn-1|S -)=(1,1,3, 3,,3, 3)

r(vn|S -)=(2, 2, , 2,0)

The representations of vertices in graph E(jn) are distinct as seen above. This implies that S - is secure resolving set, but this does not prove that it is the lower bound. As a result, the upper bound is sdim(E(jn))n-4. Now, we demonstrate that sdim(E(jn))n-4. Let S -={v1,v2, v3,,vn-5,vn} be a secure resolving set with |S -|=n-4. Assume that S1- is another minimal resolving set, or |S1-|<n-4.

If we select an ordered set S1-S --{vi,vj}, 1i, jm, ij, so that there exist two vertices vi,vjE(jn) such that r(vi|S -)=r(vj|S -)=(2, 2, . . . , 2). It should be noted that S1-is not a secure resolving set, which is contrary to assumption. As a result, sdim(E (jn))n-4 is the lower bound. From the above proving, we conclude that sdim(E(jn))=n-4.

Fig. 5Extended jewel graph E(jn )

Extended jewel graph E(jn )

4. Secure resolving dimension for special classes of graphs

Corollary 4.1 If G is a shadow graph of path D2(Pn) of order n3, then sdim(D2(Pn))=n2.

Corollary 4.2 If G is Jelly fish Jn,n of order n3, then sdim(Jn,n)=n-5.

Corollary 4.3 If G is Lilly graph Ln, n5, then sdim(Ln)=n+12.

Corollary 4.4 If G is Twig graph Tgn, n4, then sdim(Tgn)=n+43.

Corollary 4.5 If G is Joint sum of two copies of Cn,n4, then sdim (G)=2.

Corollary 4.6 If G is quadrilateral graphs Qn, n6, then sdim (Qn)=n-22.

Corollary 4.7 If G is subdividing all the edges of PnʘK1, n7, then sdim(G)=2.

5. Conclusions

The secure metric dimension of a graph is an NP-complete problem. The present study starts with the task of finding the secure metric dimension of new graph types. The secure metric dimensions of the join of the (m,n) kite graph and the 1-join of the square of the path graph have the same secure metric dimensions. The secure metric dimension of the coconut tree and the extended jewel graph have different secure metric dimensions. Additionally, we deduced the exact formulas for the joint total of two copies of Cn, quadrilateral graphs Qn, Jelly fish Jn,n, Lilly graph Ln, Twig graph Tgn, and subdividing all the edges of PnʘK1.

In the future, we plan to determine the secure metric dimension of many graphs, such as subdivisions of crown graphs, twig graph, Lilly graph and jelly fish graph. Many other ideas can be inspired from the references [22-25].

References

  • G. Chartrand, L. Eroh, M. A. Johnson, and O. R. Oellermann, “Resolvability in graphs and the metric dimension of a graph,” Discrete Applied Mathematics, Vol. 105, No. 1-3, pp. 99–113, Oct. 2000, https://doi.org/10.1016/s0166-218x(00)00198-0
  • P. J. Slater, “Domination and location in acyclic graphs,” Networks, Vol. 17, No. 1, pp. 55–64, Oct. 2006, https://doi.org/10.1002/net.3230170105
  • S. J. Seo and P. J. Slater, “Open neighborhood locating dominating sets,” Australasian Journal of Combinatorics, Vol. 46, pp. 109–119, 2010.
  • R. C. Brigham, G. Chartrand, R. D. Dutton, and P. Zhang, “Resolving domination in graphs,” Mathematica Bohemica, Vol. 128, No. 1, pp. 25–36, Jan. 2003, https://doi.org/10.21136/mb.2003.133935
  • B. Mohamed and M. Amin, “Domination number and secure resolving sets in cyclic networks,” Applied and Computational Mathematics, Vol. 12, No. 2, pp. 42–45, May 2023, https://doi.org/10.11648/j.acm.20231202.12
  • H. Subramanian and S. Arasappan, “Secure resolving sets in a graph,” Symmetry, Vol. 10, No. 10, p. 439, Sep. 2018, https://doi.org/10.3390/sym10100439
  • M. U. Farooq, A. U. Rehman, T. Q. Ibrahim, M. Hussain, A. H. Ali, and B. Rashwani, “Metric dimension of line graphs of Bakelite and subdivided Bakelite network,” Discrete Dynamics in Nature and Society, Vol. 2023, pp. 1–6, Aug. 2023, https://doi.org/10.1155/2023/7656214
  • I. Javaid, M. T. Rahim, and K. Ali, “Families of regular graphs with constant metric dimension,” Utilitas Mathematica, Vol. 75, No. 1, pp. 21–33, 2008.
  • S. Abbas, Z. Raza, N. Siddiqui, F. Khan, and T. Whangbo, “Edge metric dimension of honeycomb and hexagonal networks for IoT,” Computers, Materials and Continua, Vol. 71, No. 2, pp. 2683–2695, Jan. 2022, https://doi.org/10.32604/cmc.2022.023003
  • C. Yang, X. Deng, and W. Li, “On the local metric dimension of line graphs,” Journal of Interconnection Networks, Vol. 2023, p. 23500, Oct. 2023, https://doi.org/10.1142/s0219265923500263
  • M. Anandha Jothi and K. Sankar, “On the metric dimension of bipartite graphs,” AKCE International Journal of Graphs and Combinatorics, Vol. 20, No. 3, pp. 287–290, Sep. 2023, https://doi.org/10.1080/09728600.2023.2223248
  • L. Susilowati, I. W. Mufidah, and N. Estuningsih, “The dominant metric dimension of generalized Petersen graph,” in 4th International Scientific Conference of Alkafeel University (ISCKU 2022), Vol. 2975, No. 1, p. 02000, Jan. 2023, https://doi.org/10.1063/5.0181076
  • T. Mazidah, Dafik, Slamin, I. H. Agustin, and R. Nisviasari, “Resolving independent domination number of some special graphs,” Journal of Physics: Conference Series, Vol. 1832, No. 1, p. 012022, Mar. 2021, https://doi.org/10.1088/1742-6596/1832/1/012022
  • P. Dankelmann, J. Morgan, and E. Rivett-Carnac, “Metric dimension and diameter in bipartite graphs,” Discussiones Mathematicae Graph Theory, Vol. 43, No. 2, p. 487, Jan. 2020, https://doi.org/10.7151/dmgt.2382
  • B. Mohamed, L. Mohaisen, and M. Amin, “Binary Archimedes optimization algorithm for computing dominant metric dimension problem,” Intelligent Automation and Soft Computing, Vol. 38, No. 1, pp. 19–34, Jan. 2023, https://doi.org/10.32604/iasc.2023.031947
  • I. M. Batiha and B. Mohamed, “Binary rat swarm optimizer algorithm for computing independent domination metric dimension problem,” Mathematical Models in Engineering, Vol. 10, No. 3, p. 13, Apr. 2024, https://doi.org/10.21595/mme.2024.24037
  • D. A. Mojdeh, I. Peterin, B. Samadi, and I. G. Yero, “On three outer-independent domination related parameters in graphs,” Discrete Applied Mathematics, Vol. 294, pp. 115–124, May 2021, https://doi.org/10.1016/j.dam.2021.01.027
  • B. Mohamed and M. Amin, “A hybrid optimization algorithms for solving metric dimension problem,” SSRN Electronic Journal, Vol. 2023, pp. 1–10, Jan. 2023, https://doi.org/10.2139/ssrn.4504670
  • B. Mohamed and M. Amin, “The metric dimension of subdivisions of Lilly graph, tadpole graph and special trees,” Applied and Computational Mathematics, Vol. 12, No. 1, pp. 9–14, Mar. 2023, https://doi.org/10.11648/j.acm.20231201.12
  • S. Sriram and R. Govindarajan, “Permutation labeling of joins of Kite graph,” International Journal of Computer Engineering and Technology, Vol. 10, No. 3, pp. 1–8, May 2019, https://doi.org/10.34218/ijcet.10.3.2019.001
  • S. M. and V. K., “Vertex edge neighborhood prime labeling of some graphs,” Malaya Journal of Matematik, Vol. 7, No. 4, pp. 775–785, Jan. 2019, https://doi.org/10.26637/mjm0704/0024
  • M. I. Batiha, M. Amin, B. Mohamed, and H. I. Jebril, “Connected metric dimension of the class of ladder graphs,” Mathematical Models in Engineering, Vol. 10, No. 2, Apr. 2024, https://doi.org/10.21595/mme.2024.23934
  • H. Al-Zoubi, H. Alzaareer, A. Zraiqat, T. Hamadneh, and W. Al-Mashaleh, “On ruled surfaces of coordinate finite type,” WSEAS Transactions on Mathematics, Vol. 21, pp. 765–769, Nov. 2022, https://doi.org/10.37394/23206.2022.21.87
  • I. M. Batiha, S. A. Njadat, R. M. Batyha, A. Zraiqat, A. Dababneh, and S. Momani, “Design fractional-order PID controllers for single-joint robot arm model,” International Journal of Advances in Soft Computing and its Applications, Vol. 14, No. 2, pp. 97–114, Aug. 2022, https://doi.org/10.15849/ijasca.220720.07
  • I. M. Batiha et al., “Tuning the fractional-order PID-Controller for blood glucose level of diabetic patients,” International Journal of Advances in Soft Computing and its Applications, Vol. 13, No. 2, pp. 1–10, 2021.

About this article

Received
21 April 2024
Accepted
31 May 2024
Published
15 July 2024
Keywords
secure metric dimension
classes of graphs
Acknowledgements

The authors have not disclosed any funding.

Data Availability

The datasets generated during and/or analyzed during the current study are available from the corresponding author on reasonable request.

Author Contributions

Iqbal M. Batiha: conceptualization, validation, data curation. Basma Mohamed: methodology, formal analysis, software, investigation. Iqbal H. Jebril: resources, visualization, supervision.

Conflict of interest

The authors declare that they have no conflict of interest.