Secure Weakly Connected Domination in the Join of Graphs

Similar documents
Secure Weakly Convex Domination in Graphs

Restrained Weakly Connected Independent Domination in the Corona and Composition of Graphs

Restrained Independent 2-Domination in the Join and Corona of Graphs

Secure Connected Domination in a Graph

Locating-Dominating Sets in Graphs

p-liar s Domination in a Graph

On Pairs of Disjoint Dominating Sets in a Graph

Another Look at p-liar s Domination in Graphs

1-movable Restrained Domination in Graphs

Double Total Domination on Generalized Petersen Graphs 1

Induced Cycle Decomposition of Graphs

1-movable Independent Outer-connected Domination in Graphs

More on Tree Cover of Graphs

Inverse Closed Domination in Graphs

Edge Fixed Steiner Number of a Graph

Double Total Domination in Circulant Graphs 1

Independent Transversal Equitable Domination in Graphs

A Characterization of the Cactus Graphs with Equal Domination and Connected Domination Numbers

On Regular Prime Graphs of Solvable Groups

Rainbow Connection Number of the Thorn Graph

The Rainbow Connection of Windmill and Corona Graph

On Domination Critical Graphs with Cutvertices having Connected Domination Number 3

Some Properties of D-sets of a Group 1

Locating Chromatic Number of Banana Tree

Axioms of Countability in Generalized Topological Spaces

Graceful Labeling for Complete Bipartite Graphs

Regular Generalized Star b-continuous Functions in a Bigeneralized Topological Space

On Disjoint Restrained Domination in Graphs 1

A Generalization of p-rings

Relations between edge removing and edge subdivision concerning domination number of a graph

Root Square Mean Labeling of Some More. Disconnected Graphs

ON THE NUMBERS OF CUT-VERTICES AND END-BLOCKS IN 4-REGULAR GRAPHS

Mappings of the Direct Product of B-algebras

Generalized Boolean and Boolean-Like Rings

Approximations to the t Distribution

Observation 4.1 G has a proper separation of order 0 if and only if G is disconnected.

Hamiltonian problem on claw-free and almost distance-hereditary graphs

Ring Sums, Bridges and Fundamental Sets

Observation 4.1 G has a proper separation of order 0 if and only if G is disconnected.

Finite Groups with ss-embedded Subgroups

Solving Homogeneous Systems with Sub-matrices

Note on Strong Roman Domination in Graphs

Alternate Locations of Equilibrium Points and Poles in Complex Rational Differential Equations

Diophantine Equations. Elementary Methods

ACG M and ACG H Functions

Qualitative Theory of Differential Equations and Dynamics of Quadratic Rational Functions

An Abundancy Result for the Two Prime Power Case and Results for an Equations of Goormaghtigh

On Annihilator Small Intersection Graph

A Note of the Strong Convergence of the Mann Iteration for Demicontractive Mappings

Diameter of the Zero Divisor Graph of Semiring of Matrices over Boolean Semiring

Integration over Radius-Decreasing Circles

Order-theoretical Characterizations of Countably Approximating Posets 1

H Paths in 2 Colored Tournaments

ALL GRAPHS WITH PAIRED-DOMINATION NUMBER TWO LESS THAN THEIR ORDER. Włodzimierz Ulatowski

Prime and Semiprime Bi-ideals in Ordered Semigroups

ON DOMINATING THE CARTESIAN PRODUCT OF A GRAPH AND K 2. Bert L. Hartnell

Fuzzy Sequences in Metric Spaces

Direct Product of BF-Algebras

International Mathematical Forum, Vol. 9, 2014, no. 36, HIKARI Ltd,

Caristi-type Fixed Point Theorem of Set-Valued Maps in Metric Spaces

The g-extra Conditional Diagnosability of Folded Hypercubes

A Short Note on Universality of Some Quadratic Forms

Symmetric Properties for the (h, q)-tangent Polynomials

Devaney's Chaos of One Parameter Family. of Semi-triangular Maps

On a Principal Ideal Domain that is not a Euclidean Domain

β Baire Spaces and β Baire Property

Strongly chordal and chordal bipartite graphs are sandwich monotone

On (m,n)-ideals in LA-Semigroups

Remarks on Fuglede-Putnam Theorem for Normal Operators Modulo the Hilbert-Schmidt Class

A Direct Proof of Caristi s Fixed Point Theorem

On Symmetric Bi-Multipliers of Lattice Implication Algebras

Inverse and Disjoint Restrained Domination in Graphs

Domination in Cayley Digraphs of Right and Left Groups

Regular Weakly Star Closed Sets in Generalized Topological Spaces 1

Small Cycle Cover of 2-Connected Cubic Graphs

µs p -Sets and µs p -Functions

Some Properties of a Semi Dynamical System. Generated by von Forester-Losata Type. Partial Equations

Some Results on Paths and Cycles in Claw-Free Graphs

On the Union of Graphs Ramsey Numbers

r-ideals of Commutative Semigroups

arxiv: v2 [math.co] 19 Aug 2015

On Some Distance-Based Indices of Trees With a Given Matching Number

A characterization of diameter-2-critical graphs with no antihole of length four

A Generalization of Generalized Triangular Fuzzy Sets

Formula for Lucas Like Sequence of Fourth Step and Fifth Step

Finite Codimensional Invariant Subspace and Uniform Algebra

Unit Group of Z 2 D 10

On the Upper Chromatic Number of Uniform Hypergraphs

Equiblocking Sets in K 2,2 -Designs and in K 3,3 -Designs

Classes of Universal Graphs Definable by Universal Graph Algebra Quasi-Identities

Prime Factorization and Domination in the Hierarchical Product of Graphs

On a Certain Representation in the Pairs of Normed Spaces

On a Type of Para-Kenmotsu Manifold

Common Fixed Point Theorems for Compatible Mappings in Dislocated Metric Space

Symmetric Properties for Carlitz s Type (h, q)-twisted Tangent Polynomials Using Twisted (h, q)-tangent Zeta Function

Left R-prime (R, S)-submodules

The Generalized Viscosity Implicit Rules of Asymptotically Nonexpansive Mappings in Hilbert Spaces

arxiv: v4 [math.co] 12 Nov 2015

A Family of Optimal Multipoint Root-Finding Methods Based on the Interpolating Polynomials

The anti-ramsey number of perfect matching.

Transcription:

International Journal of Mathematical Analysis Vol. 9, 2015, no. 14, 697-702 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ijma.2015.519 Secure Weakly Connected Domination in the Join of Graphs Rene E. Leonida, Rendon A. Dela Cruz, Emmylou M. Aujero, Marchelle A. Deleverio and Nimfa L. Bodegas Mathematics Department College of Natural Sciences and Mathematics Mindanao State University General Santos City, Philippines Copyright c 2015 Rene E. Leonida et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Abstract In this paper, we take a look at the secure weakly connected domination in the join of graphs. In particular, we obtain the bounds for the secure weakly connected domination number of the join and, give necessary and sufficient conditions for the join to have secure weakly connected domination number equal to 1, 2 and 3. Mathematics Subject Classification: 05C69 Keywords: domination, secure domination, weakly connected domination, secure weakly connected domination, join 1 Introduction Let G = (V (G), E(G)) be a connected undirected graph. For any vertex v V (G), the open neighborhood of v is the set N(v) = {u V (G) : uv E(G)} and the closed neighborhood of v is the set N[v] = N(v) {v}. For a set X V (G), the open neighborhood of X is N(X) = v X N(v) and the closed neighborhood of X is N[X] = v X N[v]. The subgraph C of G induced by C is the graph having vertex-set C and

698 Rene E. Leonida whose edge set consists of those edges of G incident with two elements of C. A graph is called connected if every two vertices are joined by a path; otherwise, it is disconnected. A set S is a dominating set of G if for every v V (G)\S, there exists u S such that uv E(G). The domination number of G, denoted by γ(g), is the smallest cardinality of a dominating set of G. A dominating set C V (G) is called a weakly connected dominating set of G if the subgraph C w = (N G [C], E w ) weakly induced by C is connected, where E w is the set of all edges with at least one vertex in C. The weakly connected domination number of G, denoted by γ w (G), is the smallest cardinality of a weakly connected dominating set of G. A set S is a secure dominating set of G if S is a dominating set of G and for every u V (G)\S, there exists v S such that uv E(G) and (S\{v}) {u} is a dominating set of G. The secure domination number of G, denoted by γ s (G), is the smallest cardinality of a secure dominating set of G. A set S is a secure weakly connected dominating set of G if S is a weakly connected dominating set of G and for every u V (G)\S, there exists v S such that uv E(G) and (S\{v}) {u} is a weakly connected dominating set of G. The secure weakly connected domination number of G, denoted by γ sw (G), is the smallest cadinality of a secure weakly connected dominating set of G. The concept of weakly connected domination is discussed in [2] [3], and [4]. Another domination parameter is the secure domination which was discussed in [1] and [5]. A combination of these two concepts give rise to a new variant of domination called secure weakly connected domination. The join of two graphs G and H, denoted by G + H, is the graph with vertex-set V (G + H) = V (G) V (H) and edge-set E(G + H) = E(G) E(H) {uv : u V (G), v V (H)}. 2 Results Remark 2.1 Let G be a graph of order n. Then γ sw (G) = 1 if and only if G = K n. If G and H are complete graphs, then G + H is a complete graph. The next corollary follows from Remark 2.1. Corollary 2.2 Let G and H be a graphs. Then γ sw (G + H) = 1 if and only if G and H are complete graphs. Lemma 2.3 Let G and H be non-complete graphs. Then 2 γ sw (G+H) 4. Proof : Let S = {u, v, x, y}, where u, v V (G) and x, y V (H). Then S is a weakly connected dominating set of G + H. Let w V (G + H)\S. Then

Secure weakly connected domination in the join of graphs 699 w V (G) or w V (H). Assume that w V (G). Then wx E(G + H) and (S\{x} {w} = {u, v, w, y} is a weakly connected dominating set of G+H. Hence, S is a secure weakly connected dominating set of G+H. Thus, γ sw (G + H) S = 4. Since V (G + H) > 2, 2 γ sw (G + H). Therefore, 2 γ sw (G + H) 4. Theorem 2.4 Let G and H be non-complete graphs. Then γ sw (G + H) = 2 if and only if one of the following holds: (i) γ s (G) = 2 or γ s (H) = 2. (ii) γ(g) = 1 and γ s (H) = 1. (iii) γ s (G) = 1 and there exists v V (H) such that V (H)\N H [v] is complete. (iv) γ s (H) = 1 and there exists u V (G) such that V (G)\N G [u] is complete. (v) There exists u V (G) and v V (H) such that V (G)\N G [u] and V (H)\N H [v] are complete subgraphs of G and H, respectively. Proof : Suppose γ sw (G + H) = 2. Let S = {u, v} be a secure weakly connected dominating set of G + H. Consider the following cases: Case 1. S V (G). Clearly S is a secure dominating set of G. Thus, γ s (G) S = 2. Since G is non-complete, γ s (G) 1. Hence, γ s (G) = 2. Case 2. S V (H). This is similar to Case 1. Thus, γ s (H) = 2. Case 3. u V (G) and v V (H). Consider the following subcases: Subcase 3.1. u is a dominating vertex of G and v is a dominating vertex of H. Then γ(g) = 1 and γ(h) = 1. Subcase 3.2. u is a dominating vertex of G and v is not a dominating vertex of H. Then γ(g) = 1 and V (H)\N H [v]. Suppose V (H)\N H [v] is not complete. Then there exists x, y V (H)\N H [v] such that xy / E(H). Since ux E(G+H) and vx / E(G+H, (S\{u}) {x} = {v, x} is not a dominating set of G + H. This contradicts the assumption. Hence, V (H)\N H [v] is complete. Subcase 3.3. u is not a dominating vertex of G and v is a dominating vertex of H. As in Subcase 3.2, γ s (H) = 1 and there exists u V (G) such that V (G)\N G [u] is complete. Subcase 3.4 u is not a dominating vertex of G and v is not a dominating vertex of H.

700 Rene E. Leonida From the proof of Subcase 3.2, it follows that V (G)\N H [u] and V (H)\N H [v] are complete subgraphs of G and H, respectively. For the converse, suppose first that γ s (G) = 2. Let S = {x, y} be a secure dominating set of G. By definition of G + H, S is a secure dominating set of G + H. Suppose xy / E(G). Pick z V (H). Then z N G+H [S] and [x, z, y] is a path in S W. Thus, S is weakly connected. Let w V (G + H)\S. If w V (G), then since S is a secure dominating set of G, either xw E(G) or yw E(G). Suppose xw E(G). Then (S\{x}) {w} = {y, w} is a weakly connected set of G + H. If w V (H), then xw, yw E(G + H). Hence, (S\{x}) {w} = {y, w} is a weakly connected set of G + H. Thus, S is a secure weakly connected dominating set of G + H. Similarly, if γ s (H) = 2, then S is a secure weakly connected dominating set of G + H. Secondly, suppose that γ(g) = 1 and γ(g) = 1. Let S = {a, b}, where a and b are dominating vertices of G and H, respectively. Clearly, S is a secure weakly connected dominating set of G + H. Thirdly, suppose γ(g) = 1 and there exists v V (H) such that V (H)\N H [v] is complete. Let S = {u, v}. Then S is a weakly connected dominating set of G + H. Let w V (G + H)\S. Consider the following cases: Case 1. w N G (u). Then uw E(G+H) and hence, (S\{u}) {w} = {v, w} is a weakly connected dominating set of G + H. Case 2. w V (H)\S. If w N H (v), then vw E(G + H) and hence, (S\{v}) {w} = {u, w} is a weakly connected dominating set of G + H. Suppose that w V (H)\N H [v]. Since uw E(G + H), (S\{u}) {w} = {v, w}. Since V (H)\N H [v] is complete, {w} is a weakly connected dominating set of V (H)\N H [v]. Also, {v} is a weakly connected dominating set of N G+H [v]. Hence, S is a weakly connected dominating set of G + H. Thus, S is a secure weakly connected dominating set of G + H. Finally, suppose there exists u V (G) and v V (H) such that V (G)\N G [u] and V (H)\N H [v] are complete subgraphs of G and H, respectively. Let S = {u, v}. Then S is a weakly connected dominating set of G + H. Let z V (G + H)\S. Then either z V (G)\{u} or z V (H)\{v}. Suppose z V (G)\{u}. If z N G (u), then (S\{u}) {z} = {z, v} is a weakly connected dominating set of G + H. If z V (G)\N G [u], then (S\{v}) {z} = {u, z}. Since V (G)\N G [u] is complete, {z} is a weakly connected dominating set of V (G)\N G [u]. Thus, S is a weakly connected dominating set of G + H. Similarly, if z V (H)\{v}, then S S is a weakly connected dominating set of G + H. Hence, S is a secure weakly connected dominating set of G + H. Since G + H is non-complete, γ sw (G + H) = S = 2. Theorem 2.5 Let G and H be non-complete graphs and suppose that γ sw (G+ H) 2. Then γ sw (G + H) = 3 if and only if one of the following holds:

Secure weakly connected domination in the join of graphs 701 (i) γ s (G) = 3 or γ s (H) = 3. (ii) γ(g) = 2 or γ(h) = 2. (iii) There exists D 1 V (G) with D 1 = 2 such that V (G)\N G [D 1 ] is complete or there exists D 2 V (H) with D 2 = 2 such that V (H)\N H [D 2 ] is complete. Proof : Suppose γ sw (G + H) = 3. Let S = {u, v, w} be a secure weakly connected dominating set of G + H. Consider the following cases: Case 1. S V (G) or S V (H). Suppose S V (G). Clearly S is a secure dominating set of G. Thus, γ s (G) S = 3. Since γ sw (G + H) 2, γ s (G + H) 2 by Theorem 2.4. Hence, γ s (G) = 3. Similarly, γ s (H) = 3. Case 2. S V (G) = 2 or S V (H) = 2. Assume that S V (G) = 2, say u, v V (G). Then w V (H). Let D 1 = {u, v}. If D 1 is a dominating set of G, then γ(g) = 2 and (ii) holds. If D 1 is not a dominating set of G, then V (G)\N G [D 1 ]. Suppose V (G)\N G [D 1 ] is not complete. Then there exists x, y V (G)\N G [D 1 ] such that xy / E(G + H). Since x, y H G+H (w), (S\{w}) {x} = {u, v, x} is not a dominating set of G + H. This contradicts the assumption that S is a secure weakly connected dominating set of G + H. Hence, V (G)\N G [D 1 ] is complete and (iii) holds. For the converse, suppose first that (i) holds, say γ s (G) = 3. Let S = {a, b, c} be a secure dominating set of G. Clearly, S is a weakly connected dominating set of G + H. Let z V (G + H)\S. If z V (G)\S, since S is a secure dominating set of G, there exist, say a S, such that az E(G) and (S\{a}) {z} = {z, b, c} is a dominating set of G. Hence, (S\{a}) {z} = {z, b, c} is a secure weakly connected dominating set of G + H. Thus, γ sw (G + H) S = 3. Since γ sw (G + H) 2, γ sw (G + H) = 3. Next, suppose that (ii) holds, say γ(g) = 2. Let {x, y} be a dominating set of G. Choose z V (H) and let S = {x, y, z}. Then S is a secure weakly connected dominating set of G + H. Thus, γ sw (G + H) = 3. Finally, suppose there exists D 1 V (G) with D 1 = 2 such that V (G)\N G [D 1 ] is complete. Let D 1 = {u, v}. Pick w V (H) and let S = {u, v, w}. Then S is a weakly connected dominating set of G + H. Let z V (G + H)\S. Consider the following cases: Case 1. z V (H)\{w}. Then uz E(G + H) and (S\{u}) {z} = {z, v, w} is a weakly connected dominating set of G + H. Case 2. z N G (S). Then there exists, say u S, such that uz E(G+H) and (S\{u}) {z} = {z, v, w} is a weakly connected dominating set of G + H.

702 Rene E. Leonida Case 3. z V (G)\N G [D 1 ]. Then wz E(G + H and (S\{w}) {z} = {u, v, z}. Since V (G)\N G [D 1 ] is complete, {z} is a weakly connected dominating set of V (G)\N G [D 1 ]. Also, D 1 = {u, v} is a weakly connected dominating set of N G+H [D 1 ]. Thus, (S\{w}) {z} = {u, v, z} is a weakly connected dominating set of G + H. Hence, S is a secure weakly connected dominating set of G + H. Therefore, γ sw (G + H) = 3. Remark 2.6 Let m 4 and n 4 be integers. Then γ sw (K m,n ) = 4. References [1] B.H. Arriola and S.R. Canoy, Jr., Secure Doubly Connected Domination in Graphs, Int. Journal of Math. Analysis, 8(2014), 1571-1580. http://dx.doi.org/10.12988/ijma.2014.46175 [2] R.E. Leonida, Weakly Connected Independent Dominations in the Join of Graphs, International Math. Forum, 8(2013), 1767-1771. http://dx.doi.org/10.12988/imf.2013.39170 [3] R.E. Leonida and S.R. Canoy, Jr., Weakly Convex and Weakly Connected Independent Dominations in the Corona of Graphs, International Math. Forum, 8(2013), 1515-1522. http://dx.doi.org/10.12988/imf.2013.37131 [4] E.P. Sandueta and S.R. Canoy, Jr., Weakly Connected Domination in Graphs Resulting from Some Graph Operations, International Math. Forum, 6(2011), 1031-1035. [5] R.A.L. Ugbinada, E.C. Castillano, and S.R. Canoy, Jr., Secure Domination in the Joins of Graphs. Applied Mathematical Sciences, 8(2014), 5203-5211. http://dx.doi.org/10.12988/ams.2014.47519 Received: January 21, 2015; Published: March 14, 2015