Next Article in Journal
Neimark–Sacker Bifurcation of a Discrete-Time Predator–Prey Model with Prey Refuge Effect
Next Article in Special Issue
Sustainable Supplier Selection and Order Allocation Using an Integrated ROG-Based Type-2 Fuzzy Decision-Making Approach
Previous Article in Journal
Robust Graph Structure Learning with Virtual Nodes Construction
Previous Article in Special Issue
Fuzzy Portfolio Selection in the Risk Attitudes of Dimension Analysis under the Adjustable Security Proportions
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Integrity on m-Polar Fuzzy Graphs and Its Application

by
Ghulam Muhiuddin
1,*,†,
Tanmoy Mahapatra
2,†,
Madhumangal Pal
2,†,
Ohoud Alshahrani
1,† and
Ahsan Mahboob
3,†
1
Department of Mathematics, Faculty of Science, University of Tabuk, P.O. Box 741, Tabuk 71491, Saudi Arabia
2
Department of Applied Mathematics with Oceanology and Computer Programming, Vidyasagar University, Midnapore 721102, India
3
Department of Mathematics, Madanapalle Institute of Technology & Science, Madanapalle 517325, India
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Mathematics 2023, 11(6), 1398; https://doi.org/10.3390/math11061398
Submission received: 3 February 2023 / Revised: 5 March 2023 / Accepted: 7 March 2023 / Published: 14 March 2023

Abstract

:
Integrity for crisp graph theory is a well-defined topic. However, the integrity concept for fuzzy graphs has only recently been defined and extensively researched. However, in m-polar fuzzy graphs (mPFG), each node as well as edges has m components. So, defining integrity in the mPF environment needs a new concept. As in the m-polar fuzzy environment, each node and edge has m components, so we have more flexibility to address the uncertainty rather than fuzzy as well as other uncertain environments. In this article, we developed a brand-new idea known as node integrity on mPFG and went in-depth on a few of their related properties. We have thoroughly covered some of their related properties as well as a brand-new idea called dominating integrity on mPFG. Different types of integrity on mPFG such as node integrity, dominating integrity, and edge integrity are discussed thoroughly along with some of its interesting facts have been introduced. Under isomorphism, their properties have also been studied. We also discussed the interrelation between them. A new type of mPFG called efficient mPFG which is directly related to dominating integrity concept has also been introduced. Several facts about efficient mPFG have also been studied here along with details descriptions. Finally, a real-world mobile network application that is directly related to the integrity of the mPFG concept has been discussed.

1. Introduction

1.1. Research Background and Related Works

In technical development, fuzzy graph (FG) theory has an important role. The way of many rule-based expert systems for engineers have been made from FG theory. It is seen in the maximum time that graph theory is found as an essential part of connectivity in some fields of geometry, algebra, topology, number theory, computer science, operations research and optimization. In real life, many problems have been solved using data that come from different origins or sources. This type of data collection represents multi-polarity. In this type of polarity, we can not be structured well by the conception of fuzzy models or bipolar fuzzy models. For example, if we consider a mobile networking model which assures minimum installations of towers to cover the whole area so that no loss of signal throughout the area. For this, we assign the node membership value (MV) based on the situation of the mobile towers as (maximum capacity of a tower unit, distance covered for signaling systems, and material used for installation of a mobile tower). In nature, these terms are uncertain. To represent this situation, we need to use the 3-polar fuzzy model. Using a fuzzy model or an intuitionistic fuzzy model, or a bipolar fuzzy model, this situation can not be handled.
To address uncertainty and fuzziness, Zadeh [1] introduced fuzzy sets. From that point forward, the hypothesis of fuzzy sets has become a space of exploration in different orders. In 1994, Zhang [2,3] expanded the thought of fuzzy sets to bipolar fuzzy sets, which have numerous applications in mathematical speculations just as real-life problems. The set concept in a m-dimension fuzzy environment was then introduced by Chen et al. [4] as an extension of bipolar fuzzy sets. Utilizing Zadeh’s procedure, Kauffman [5] fostered an incredible strategy of fuzzy graph theory in 1973. After that, Rosenfeld [6] gave another explained idea of a fuzzy graph. Several concepts on fuzzy graphs have been investigated on [7,8,9,10,11]. In 2014, the influential thought of the m-PFS was proposed by Chen et al. [4], which is an augmentation of bipolar fuzzy sets to manage these sorts of properties of algebraic and graphical models. Some basic properties on mPFG has been inspected by Ghorai and Pal [12,13]. Different properties of graphs under m-polar fuzzy environment have been studied by Akram et al. [14,15,16]. The conception of domination integrity and efficient FG was initiated by Mariappan et al. [17]. The conception of Concept of integrity as well as its value of FGs was introduced by Saravanana et al. [18]. They also developed a study on regular FGs and the integrity of FG [19]. Next, Mahapatra et al. [20,21] presented coloring on different uncertainty environments.
In real life, many problems have been solved using data that come from different origins or sources. This type of data collection represents multi-polarity. In this type of polarity, we can not be structured well by the conception of fuzzy models or bipolar fuzzy models. For example, we consider a mobile networking model which assures minimum installations of the tower to cover the whole area so that no loss of signal throughout the area. For this, we assign the node membership value (MV) based on the situation of the mobile towers as (maximum capacity of a tower unit, distance covered for signaling systems, and material used for installation of the mobile tower). In nature, these terms are uncertain. To represent this situation, we need to use the 3-polar fuzzy model. Using a fuzzy model or an intuitionistic fuzzy model, or a bipolar fuzzy model, this situation can not be handled. Thus, the integrity concept on FGs is not appropriate for operation in these kinds of situations. To overcome this situation, we are interested in working using the concepts of integrity concept in a m-polar fuzzy environment. Anyone can analyze the MVs in a multi-polar fuzzy environment in a certain way. Since in our consideration, we consider three components for each node as well as edges, therefore we can not handle this type of situation using a fuzzy model as there is a single component for this concept. Again, we can not apply a bipolar or intuitionistic fuzzy graph model as each edge or node have just two components. Thus, these mPFG models give more efficient fuzziness results than another fuzzy model. Furthermore, it is very interesting to develop and analyze such types of mPFGs with examples and related theorems. These definitions and theorems are definitely improving the existing concepts of mPFGs and are more reliable for solving any complicated real-life problem.

1.2. Contribution of This Study

The formation of this article is as follows: Section 2 mentions some useful concepts which are essential for this article. In Section 3, we have defined the different types of integrity on mPFG and provided some theorems on their aspect. In Section 3.1, Node integrity on mPFG is a brand-new idea that we have introduced along with some of its related properties. In Section 3.2, We have thoroughly covered some of their related properties as well as a brand-new idea called dominating integrity on mPFG. Here, we also investigated some relations between dominating integrity and node integrity. In Section 3.3, we have introduced a new concept called node integrity on mPFG and also discussed some of their related properties thoroughly. We investigated some features based on the above conception. In Section 4, we have discussed new types of mPFG called efficient mPFG along with its details description. In Section 5, we have discussed an application based on a mobile networking problem. In Section 7, we have discussed the advantages and limitations of the proposed model. Finally, the conclusion of the study has been presented in Section 8.

2. Preliminaries

Here, we briefly call again some definitions connected to mPFG, such as complete mPFG, strong mPFG, and path in mPFG.
Throughout this article p i : [ 0 , 1 ] m [ 0 , 1 ] indicated ith material of projection mapping. Furthermore, i = 1 ( 1 ) m indicates that i = 1 , 2 , , m .
Definition 1
([13]). An mPFG Γ = ( A ˜ , σ , μ ) having underlying crisp graph (UCG) Γ * = ( A ˜ , B ˜ ) , where σ : A ˜ [ 0 , 1 ] m and μ : A ˜ × A ˜ ˜ [ 0 , 1 ] m indicate an mPFS of A ˜ and A ˜ × A ˜ ˜ , respectively, and which follows the relation such that for all i = 1 ( 1 ) m , p i μ ( b , c ) { p i σ ( b ) p i σ ( c ) } for all ( b , c ) A ˜ × A ˜ ˜ as well as μ ( b , c ) = 0 for all ( b , c ) ( A ˜ × A ˜ ˜ B ˜ ) .
Definition 2
([22]). Γ = ( V , σ , μ ) is conferred as complete mPFG provided p i μ ( b , d ) = { p i σ ( b ) p i σ ( d ) } , i = 1 ( 1 ) m , b , d V .
Definition 3
([13]). Γ = ( V , σ , μ ) is conferred as a mPF strong graph if
p i μ ( b , d ) = { p i σ ( b ) p i σ ( d ) } ,
i = 1 ( 1 ) m , ( b , d ) E .
Definition 4
([15]). Let Γ = ( V , σ , μ ) is an mPFG as well as P : b 1 , b 2 , , b k be a path in G. S ( P ) indicates the strength of P, defined as S ( P ) = ( min 1 i < j k p 1 μ ( b i , b j ) , min 1 i < j k p 2 μ ( b i , b j ) , , min 1 i < j k p m μ ( b i , b j ) ) = ( μ 1 n ( b i , b j ) , μ 2 n ( b i , b j ) , , μ m n ( b i , b j ) ) .
The strength of connectedness (SC) of the path in between b 1 and b k is given in the following way: C O N N G ( b 1 , b k ) = ( p 1 μ ( b i , b j ) , p 2 μ ( b i , b j ) , , p m μ ( b i , b j ) ) , where ( p i μ ( b i , b j ) ) = max n N ( μ i n ( b i , b j ) ) .
Definition 5
([20]). An edge ( b , d ) , b , d V is regarded as independently strong for an mPFG Γ = ( V , σ , μ ) if 1 2 { p i σ ( b ) p i σ ( d ) } p i μ ( b , d ) , i = 1 ( 1 ) m . It is considered weak independently if not. In order to determine how strong the edge ( b , d ) is,
p i I ( b , d ) = p i μ ( b , d ) p i σ ( b ) p i σ ( d ) , i = 1 ( 1 ) m .
Definition 6
([22]). Consider Γ and Γ be two mPFGs of the UCG Γ * = ( A ˜ , B ˜ ) and Γ * = ( A ˜ , B ˜ ) , respectively. A bijective mapping is an isomorphism between Γ and Γ is f : A ˜ A ˜ which satisfies
p i σ ( t ) = p i σ ( f ( t ) ) and p i μ ( t , u ) = p i μ ( f ( t ) , f ( u ) )
t , u A ˜ and every i = 1 ( 1 ) m . Then Γ is called to be isomorphic with Γ .

3. Differents Types of Integrity on m-Polar Fuzzy Graph

Here, we will discuss a new concept of mPFGs such as node integrity, edge integrity, and dominating integrity such that they fulfill a specific criterion on the node set or edge set or dominating set (DS).

3.1. Node Integrity on m-Polar Fuzzy Graph

In this subsection, we will discuss a new idea of mPFGs node integrity such that they fulfill a specific criterion on the node set.
Definition 7.
Let Γ be an mPFG having UGC Γ * = ( V , E ) . Suppose A V is the set of node bumps whose omission disconnects Γ * . Now, p i m ( Γ A ) indicates the set of the order of the topmost element in the graph V A . Then the node integrity of Γ is indicated by I ˜ ( Γ ) and is conferred by p i I ˜ ( Γ ) = min A V { p i | A | + p i m ( Γ A ) } , i = 1 ( 1 ) m .
Example 1.
Let Γ be a 3PFG displayed in Figure 1. The set of nodes V = { a , b , c , d } such that σ ( a ) = ( 0.5 , 0.4 , 0.3 ) , σ ( b ) = ( 0.3 , 0.3 , 0.4 ) , σ ( c ) = ( 0.3 , 0.5 , 0.2 ) , σ ( d ) = ( 0.6 , 0.5 , 0.2 ) with μ ( a , b ) = ( 0.1 , 0.1 , 0.05 ) , μ ( b , c ) = ( 0.3 , 0.3 , 0.2 ) , μ ( c , d ) = ( 0.3 , 0.5 , 0.2 ) , μ ( d , a ) = ( 0.5 , 0.4 , 0.2 ) , μ ( b , d ) = ( 0.3 , 0.3 , 0.2 ) .
The node integrity value in 3PFG Γ, shown in Figure 1 is I ˜ V ( Γ ) = ( 1.4 , 1.3 , 0.9 ) and integrity set I ˜ V of Γ is { b , d } which disconnects the graph Γ.
Theorem 1.
Let P be an mPF subgraph of Γ. Then I ˜ ( P ) I ˜ ( Γ ) .
Proof. 
Assume P is a full mPF subgraph of Γ . Then there is a node, let us say a, of P that has a lower MV than the MV of Γ ; otherwise, P has fewer nodes than Γ . Consequently | P | < | Γ | . However, for any mPFG P, I ˜ ( P ) | P | < | Γ | . Let an integrity set A of P be such that I ˜ ( Γ ) I ˜ ( P ) . As a result, p i I ˜ ( P ) = { p i | A | + p i m ( P A ) } , for all i = 1 ( 1 ) m . As a result, p i I ˜ ( P ) { p i | A | p i m ( P A ) } , for all i = 1 ( 1 ) m . If A is also an integrity set of Γ , then p i m ( P A ) p i m ( Γ A ) , for all i = 1 ( 1 ) m , which is not feasible, as P is subset of Γ . If A is without integrity set of Γ then p i I ˜ ( Γ ) p i | A | p i m ( Γ A ) , for all i = 1 ( 1 ) m , which is a contradictory. Hence, the theorem. □
Theorem 2.
Node integrity is invariant under isomorphism between two mPFG.
Proof. 
Let Γ 1 and Γ 2 be two mPFG and ϕ : Γ 1 Γ 2 be the isomorphism, that is, i = 1 ( 1 ) m .
  • p i σ 1 ( b ) = p i σ 2 ( ϕ ( b ) ) , a V 1 .
  • p i μ 1 ( b , d ) = p i μ 2 ( ϕ ( b ) , ϕ ( d ) ) , ( b , d ) V 1 × V 1 ˜ .
Suppose, A 1 be set in Γ 1 such that p i I ˜ ( Γ 1 ) = min A 1 V { p i | A 1 | + p i m ( G A 1 ) } . Since Γ 1 and Γ 2 are isomorphic therefore from Equations ( i ) and ( i i ) its preserves the node and edge MVs. Hence, clearly p i I ˜ ( Γ 2 ) = min ϕ ( A 1 ) V { p i | ϕ ( A 1 ) | + p i m ( Γ 2 ϕ ( A 1 ) ) } holds for ϕ ( A 1 ) . Therefore, Γ 2 is also a node integrity. □
Theorem 3.
Node integrity of a complete mPFG is its order.
Proof. 
Let Γ be the full mPFG. Every node is then adjacent to the rest of the remaining nodes. Removing any number of p nodes from Γ yields a single component graph with many n p nodes. Therefore, for each subset A, the value of { p i | A | + p i m ( Γ A ) } , i = 1 ( 1 ) m remains fixed as well as equals to the total MV of the node. Thus, the node integrity of Γ is the same as the order of Γ . □
Theorem 4.
An integrity of a star mPFG K 1 , n is equal to the m a x p i σ ( a ) + p i σ ( c ) , for each i = 1 ( 1 ) m and ( a , c ) E .
Proof. 
Each edge of Γ is connected to an intermediate node on the star diagram. So removing this intermediate node leaves all other nodes isolated. So, according to Theorem 3, the maximum value of the remaining nodes MV defines the maximum degree of the remaining graph. Summing this with the MVs of the intermediate nodes gives the completeness of the star graph K 1 , n . Since this central node is linked to this node, it is defined as the integrity of the star graph K 1 , n is equal to the m a x p i σ ( a ) + p i σ ( d ) , i = 1 ( 1 ) m and ( a , d ) E . □

3.2. Dominating Integrity on m-Polar Fuzzy Graph

In this section, we’ll talk about a novel notion of mPFGs dominating integrity by meeting a particular DS criterion.
Definition 8.
Let us assume that Γ be an mPFG having UGC Γ * = ( V , E ) . Assume that A V is a DS. The set of the largest component’s order in the graph Γ A is now indicated by the expression m ( Γ A ) . Then the dominating integrity (DI) of Γ is indicated by D I ˜ ( Γ ) and is conferred by p i D I ˜ ( Γ ) = min A V { p i | A | + p i m ( Γ A ) } , i = 1 ( 1 ) m .
Definition 9.
If every node in V A has at least one strong nbd in A, then the set A is said to be the DS of an mPFG Γ. The minimal cardinality of such a DS is the dominance number of Γ denoted by γ ( Γ ) , and such a set is called minimal dominance.
Definition 10.
Any subset of A of V ( Γ ) that is an integrity set I ˜ -set of Γ if p i D I ˜ ( Γ ) = { p i | A | + p i m ( Γ A ) } , i = 1 ( 1 ) m .
Example 2.
Let Γ be a 3PFG depcited in Figure 2. The set of nodes V = { a , b , c , d } such that σ ( a ) = ( 0.5 , 0.4 , 0.3 ) , σ ( b ) = ( 0.3 , 0.3 , 0.4 ) , σ ( c ) = ( 0.3 , 0.5 , 0.2 ) , σ ( d ) = ( 0.6 , 0.5 , 0.2 ) with μ ( a , b ) = ( 0.1 , 0.1 , 0.05 ) , μ ( b , c ) = ( 0.3 , 0.3 , 0.2 ) , μ ( c , d ) = ( 0.3 , 0.5 , 0.2 ) , μ ( d , a ) = ( 0.5 , 0.4 , 0.2 ) , μ ( b , d ) = ( 0.3 , 0.3 , 0.2 ) .
Clearly, the arcs ( a , d ) , ( b , d ) , ( b , c ) and ( c , d ) are strong. The DS A, Γ A , m ( Γ A ) , | A | and | A | + m ( Γ A ) all are given in Table 1.
From Table 1, we see that m i n ( | A | + m ( Γ A ) ) = ( 1.4 , 1.3 , 0.9 ) , which corresponds to the domination set { b , d } . As a result, { b , d } is the minimal DI set of 3PFG Γ.
Theorem 5.
For any mPFG G, p i γ ( G ) p i D I ˜ ( G ) , for i = 1 ( 1 ) m .
Proof. 
Only the cardinality of DS affects the dominance of mPFG. The dominance number, on the other hand, is influenced by DS A and the greatest order of the corresponding components, G S . From this p i γ ( G ) p i D I ˜ ( G ) , for i = 1 ( 1 ) m . Equality holds for the mPFG with isolated nodes only. Equality applies only to mPFG with isolated nodes. The entire set of nodes is the only DS in graphs with isolated nodes. For this set p i m ( G * A ) = 0 , for i = 1 ( 1 ) m . □
Remark 1.
The integrity of G is equal to the maximum MV of G nodes if an mPFG G is null.
Theorem 6.
DI is invariant under isomorphism between two mPFG.
Proof. 
Let Γ 1 and Γ 2 be two mPFG and ϕ : Γ 1 Γ 2 be the isomorphism, that is, i = 1 ( 1 ) m
  • p i σ 1 ( b ) = p i σ 2 ( ϕ ( b ) ) , a V 1 .
  • p i μ 1 ( b , d ) = p i μ 2 ( ϕ ( b ) , ϕ ( d ) ) , ( b , d ) V 1 × V 1 ˜ .
Suppose, A 1 be a DS in Γ 1 such that p i D I ˜ ( Γ 1 ) = min A 1 V { p i | A 1 | + p i m ( Γ 1 A 1 ) } . Since Γ 1 and Γ 2 are isomorphic therefore from Equations ( i ) and ( i i ) its preserves the node and edge MVs. Hence, clearly p i D I ˜ ( Γ 2 ) = min ϕ ( A 1 ) V { p i | ϕ ( A 1 ) | + p i m ( Γ 1 ϕ ( A 1 ) ) } holds for ϕ ( A 1 ) . Therefore, Γ 2 is also a DI. □
Theorem 7.
Let Γ be an mPFG. p i D I ˜ ( Γ ) = t , for i = 1 ( 1 ) m iff Γ is either complete mPFG or Γ ¯ , where ( t , t , , t ) is the order of the mPFG.
Proof. 
Let Γ be the complete mPFG. Any dominating subset V of Γ , and all that is left of the graph is a single component made up of all the remaining nodes. As a result, the DI of Γ is only the order of Γ . Assume that the entire mPFG is complemented by Γ . Then, the graph with a set of isolated nodes is indicated as G. Thus, N ( a ) = ϕ ; for all a V . The total node set is the only DS of Γ . For this DS A, is p i m ( Γ A ) = 0 , for i = 1 ( 1 ) m . DI of Γ is therefore nothing more than Γ order. Thus, the only DS is V. As a result, p i D I ˜ ( Γ ) = t , for i = 1 ( 1 ) m .
Consider, however, that A is the DS of Γ and that the order of Γ is the DI number. Since the sum of the MV of A as well as m ( Γ A ) is not greater than the order of Γ , if Γ A has more than one connected component, then Γ A must only have one connected component. This holds for all DS, but especially for any set of singletons. Given that this singleton node set controls all of Γ ’s other nodes, it is possible that Γ is a full mPFG. □
Theorem 8.
Let Γ be a complete bi-partiated mPFG K { σ 1 , σ 2 } . Then
p i D I ˜ ( Γ ) = m i n { p i | V 1 | + p i m a x | σ 2 | , p i | V 2 | + p i m a x | σ 1 | } ,
where V = V 1 V 2 .
Proof. 
Since Γ is a bi-partiated mPFG, therefore its node set can be partitioned into V 1 , V 2 . Suppose Γ 1 and Γ 2 . Let A be a DS in Γ . Then three cases may arise which are discussed as follows:
Case 1:
Suppose A V 1 . The collection of all isolated nodes in V 2 is then called ( Γ A ) . Hence, p i m ( Γ A ) = p i m a x | σ 2 ( V 2 ) | .
Case 2:
Suppose A V 2 . The collection of all isolated nodes in V 1 is then called ( Γ A ) . Hence, p i m ( Γ A ) = p i m a x | σ 1 ( V 1 ) | .
Case 3:
If A is a DS with a node from V 1 and the remainder from V 2 , Γ A will still be the only connected component. With one node from V 1 and the remaining nodes from V 2 , we can disregard the DS A by taking into account the minimum value for the three DSs mentioned above.
Combining all these cases we get
p i D I ˜ ( Γ ) = m i n { p i | V 1 |   +   p i m a x | σ 2 | , p i | V 2 |   +   p i m a x | σ 1 | } ,
where V = V 1 V 2 . □
Theorem 9.
Assume that Γ is a strong mPFG and that Γ ¯ is Γs complement. When Γ and Γ ¯ are united, the node integrity of the union equals the order of the complete mPFG on Γ.
Proof. 
As Γ is a strong mPFG, according to the Definition of complement of mPFG, Γ ¯ also qualifies as a strong mPFG. Each node in the resulting graph is next to every other node and has an edge MV that is lower than the MVs of its neighbors. As a result, we know that the order of the mPFG determines the integrity of the mPFG produced by the union of Γ and its complement. As a result, the order of the entire mPFG form in Γ is the integrity of the union of Γ and its complement. □

3.3. Edge Integrity on m-Polar Fuzzy Graph

In this subsection, we will discuss a new idea of mPFGs edge integrity such that they fulfill a specific criterion on the edge set.
Definition 11.
Let us assume that Γ is a mPFG with UGC Γ * = ( V , E ) . Assume that A E is an edge set that, if removed, would render Γ * as disconnected. The set of the order of the largest component in the graph Γ A is now indicated by p i m ( Γ A ) . Then the edge integrity of Γ is indicated by I E ˜ ( Γ ) and granted by p i I E ˜ ( Γ ) = min A E { p i | A | + p i m ( Γ A ) } , i = 1 ( 1 ) m .
Example 3.
Let Γ be a 3PFG depicted in Figure 3. The nodes sets V = { a , b , c , d } such that σ ( a ) = ( 0.2 , 0.5 , 0.3 ) , σ ( b ) = ( 0.6 , 0.4 , 0.2 ) , σ ( c ) = ( 0.5 , 0.3 , 0.2 ) , σ ( d ) = ( 0.2 , 0.3 , 0.2 ) with μ ( a , b ) = ( 0.2 , 0.4 , 0.1 ) , μ ( b , c ) = ( 0.5 , 0.3 , 0.2 ) , μ ( c , d ) = ( 0.2 , 0.3 , 0.2 ) , μ ( d , a ) = ( 0.1 , 0.2 , 0.2 ) , μ ( a , c ) = ( 0.2 , 0.3 , 0.2 ) .
Let B 1 = { ( a , d ) , ( a , c ) , ( b , c ) } and B 2 = { ( d , c ) , ( a , c ) , ( a , b ) } be two subsets of edge set of G which disconnect the graph G. Now, | B 1 | = ( 0.8 , 0.8 , 0.6 ) , | B 2 | = ( 0.6 , 1 , 0.5 ) , m ( G B 1 ) = ( 0.2 , 0.4 , 0.2 ) and m ( G B 2 ) = ( 0.5 , 0.3 , 0.2 ) . For the set B 1 , the edge integrity of G is I ˜ B 1 ( G ) = ( 1 , 1.2 , 0.8 ) and for B 2 is I ˜ B 2 ( G ) = ( 1.1 , 1.3 , 0.7 ) . Thus, the edge integrity value of the 3PFG G is I ˜ E ( G ) = ( 1 , 1.2 , 0.7 ) and the integrity sets are B 1 = { ( a , d ) , ( a , c ) , ( b , c ) } and B 2 = { ( d , c ) , ( a , c ) , ( a , b ) } .
Theorem 10.
Let Γ be a complete mPFG. m a x { p i σ ( v ) } v s . V is the edge integrity of complement of the complete mPFG, v s . V .
Proof. 
Complement of complete mPFGs is, obviously, a mPFG without edges. As a result, Γ ¯ = ( V , σ ¯ , μ ¯ ) is a set of nodes without edges. Maximum node MV in Γ ¯ = ( V , σ ¯ , μ ¯ ) determines the edge integrity of this graph. Thus, for all I E ( Γ ) ˜ = m a x { p i σ ( v ) } , v V . □
Theorem 11.
The edge integrity of a complete mPFG is its order.
Proof. 
Let Γ be the full mPFG. Each node is then connected to the rest of the other nodes. Removing any number of p nodes from Γ yields a single component graph with many n p nodes. Therefore, for each subset A, the value of { p i | A | + p i m ( Γ A ) } , i = 1 ( 1 ) m remains fixed as well as equals to the total value of node MV. As a result, the order of Γ is equal to the edge integrity of Γ . □
Theorem 12.
Let us have a strong mPFG Γ. Order of the entire mPFG formed in Γ is the edge integrity of the union of Γ as well as Γ ¯ .
Proof. 
The union of Γ and Γ ¯ is understood to be a complete mPFG. Theorem 11 establishes the order of the edge integrity of the entire mPFG. As a result, the edge integrity of the union of Γ as well as Γ ¯ depends on the order of the entire mPFG created in Γ . □

4. Efficient m-Polar Fuzzy Graph

Each UCG is undeniably a member of a unique class of mPFG. A mPFG becomes a crisp graph if the σ and μ values are the same for each node and edge. The possibility of the DSs of the mPFG and the UCG being identical is an intriguing discovery. We create the effective mPFG class of mPFGs as a result.
Definition 12.
An efficient mPFG is an mPFG that shares equal DS as its crisp graph, other than V.
Example 4.
Assume that Γ is the 3PFG depicted in Figure 4. The collection of nodes is V = { a , b , c } where σ ( a ) = ( 0.3 , 0.5 , 0.4 ) , σ ( b ) = ( 0.2 , 0.3 , 0.5 ) , σ ( c ) = ( 0.6 , 0.5 , 0.3 ) with μ ( a , b ) = ( 0.2 , 0.2 , 0.3 ) , μ ( b , c ) = ( 0.2 , 0.3 , 0.3 ) , μ ( c , a ) = ( 0.3 , 0.5 , 0.2 ) .
Each arc of Γ is strong. There is no doubt that the sets { a } , { b } , { c } , { a , b } , { b , c } , { c , a } are the domination sets of Γ * . Now, N A ( a ) = { b , c } , N A ( b ) = { c , a } , N A ( c ) = { a , b } , N A ( { a , b } ) = { c } , N A ( { b , c } ) = { a } , N A ( { c , a } ) = { b } , which are also the DSs of Γ. Therefore the DSs of Γ * and Γ are the same. Hence Γ is an efficient 3PFG.
Remark 2.
If we take the arc ( a , b ) in Figure 4 which is not strong, then the set { a } and { b } can not dominate the whole graph Γ. So { a } and { b } are not DS s of Γ but they are also DS s of Γ * . In this case, Γ is not an efficient 3PFG.
Theorem 13.
Every complete mPFG is an efficient mPFG.
Proof. 
Every node set in a complete graph is a DS of Γ . Every edge in the given mPFG Γ is a strong arc since it is a complete mPFG. The edge and node sets of Γ and Γ * are identical. As a result, they share a DS. Therefore, each complete mPFG is an efficient mPFG. □
Theorem 14.
Every mPFG with a constant μ value is a mPFG that works effectively.
Proof. 
According to the idea of a strong arc, arcs are β strong if all of their MV same. All of the arcs are strengthened as a result. Therefore, both the crisp graph and the mPFG graph have the same closed nbd set for each node. As a result of Γ and Γ * sharing the same DS, Γ is an efficient mPFG. □
Theorem 15.
Let Γ be a mPFG having UCG as a path P n . Then it is efficient.
Proof. 
Since Γ is an mPFG having UCG a path. Therefore we get two cases:-
Case 1:
Every arc is an effective arc Hence, Γ and UCG Γ * share equal node sets and edge sets. Therefore, they contain equal DS. Hence, Γ is an efficient mPFG.
Case 2:
Let us say all the arcs are ineffective. Here, we need to demonstrate that all non-efficient arcs must also be strong arcs. In P n , there is unquestionably one and only one path connecting any two nodes. The graph becomes disconnected when an edge is removed. Therefore, between adjacent nodes, the SC will decrease. Therefore, the edge needs to be strong. Therefore, the strong arcs in P n are the ineffective arcs. As a result, Γ is an effective graph. □

5. Application

The mPFG is a key mathematical framework for visualizing interconnected real-world phenomena, where nodes and edges are represented by mPF information. In this section, we have illustrated a mobile network installation issue using the idea of integrity on mPFG.

5.1. Model Construction

Suppose you need to cover a group of villages on your mobile phone Telephone network tower. Let us say every village has at least one tower. The graph theory problem looks like this: Every village is a landmark. Villages are connected by edges if the tower installed in the village is close by. Now the issue is identifying the dominant group. However, we cannot guarantee that the best models are produced by a dominant set. Everyone is at risk of network failure during a natural disaster. You will need to cover the biggest area, even if some of the towers fail. As a result, network providers need to think about their networks. A team that covers the most ground. As a graph consistency, this idea came into existence. Both honesty and dominance are taken into consideration by the new parameters. The advantage of the integrity set (set of towers) is that it ensures complete coverage and a more stable network with the widest possible coverage area. The situation with multiple towers in real time
Here, we use the seven villages a , b , c , d , e , f , g as the installation nodes for mobile towers. If the mobile network covers the signal from the closest mobile towers, there will be an edge between two nodes. To solve the allocation issue in this case, dominating integrity in 3PFG G = ( V , σ , μ ) is used. Three factors are taken into account when calculating the node MVs. Those criteria are as follows: {maximum capacity of a tower unit, distance covered for signaling systems, material used for installation of mobile tower}. Three factors are taken into account when calculating the edge MV. These are listed below: {signal strength between two towers, internet speed, hazards occurrence due to unavoidable circumstances}. The 3PFG model is displayed in Figure 5.

5.2. Illustration of Membership Value

Clearly, the arcs ( e , g ) , ( g , d ) , ( e , d ) , ( b , c ) , ( d , c ) , ( e , f ) and ( a , e ) are strong arcs. The DS A, G A , m ( G A ) , | A | and | A | + m ( G A ) all are given in Table 2.

5.3. Decision Making

From Table 2, we see that m i n ( | A | + m ( G A ) ) = ( 2 , 1.7 , 1.4 ) , which corresponds to the domination set { e , g , b } . Hence { e , g , b } is the minimal dominating integrity set of 3PFG G. As a result, these sets are trustworthy and dominant in the network. The way the tower was constructed. Compared to other nodes, these nodes offer better protection even during natural disasters.
Through the discussion above, we can conclude that dominating integrity on mPFG actually plays a significant role in this kind of allocation problem. Furthermore, we acknowledge that in the allocation problem, dominating integrity on mPFG is more applicable than dominating integrity on FG.

6. Comparative Study

At first Saravanan et al. [19] introduced an integrity idea for fuzzy graph theory. Next, Mariappan et al. [17] studied the integrity concept and its value in fuzzy graphs. Mariappan et al. [18] then also discussed dominating integrity and efficient fuzzy graph concept. So, all the results discussed earlier are not applicable when the model is considered in another environment like in m-polar fuzzy sets. If we consider a mobile networking model which assures minimum installations of towers to cover the whole area so that no loss of signal throughout the area. For this, we assign the node membership value (MV) based on the situation of the mobile towers as (maximum capacity of a tower unit, distance covered for signaling systems, and material used for installation of the mobile tower). In nature, these terms are uncertain. To represent this situation, we need to use the 3-polar fuzzy model. Using a fuzzy model or an intuitionistic fuzzy model, or a bipolar fuzzy model, this situation can not be handled. Thus, the integrity concept of FGs is not appropriate for operating in these kinds of situations. To overcome this situation, we are interested in working using the concepts of integrity concept in a m-polar fuzzy environment. This is why the proposed model in this paper plays a significant role in such situations to give better results.

7. Advantages and Limitations of the Proposed Work

Some of the advantages of the proposed are as follows:
  • This work mainly depends on m-polar fuzzy logic network system.
  • Many important definitions and theorems are presented in this study which is very useful.
  • A real application of m-polar fuzzy integrity is presented on a resource power controlling system.
Some of the limitations of this study are given as follows:
  • This work mainly focuses on m-polar fuzzy graph.
  • If the membership value of the characters is given in different interval-valued m-polar fuzzy environment, then m-polar fuzzy integrity graph cannot be used.
  • This type of proposed work mains used in control systems.

8. Conclusions

In this article, we developed a brand-new idea known as node integrity on mPFG and went in-depth on a few of their related properties. We have thoroughly covered some of their related properties as well as a brand-new idea called dominating integrity on mPFG. Here, we also investigated some relations between dominating integrity and node integrity. We investigated some features based on the above conception. We studied a new type of mPFG called efficient mPFG along with its details description. A new type of mPFG called efficient mPFG which is directly related to dominating integrity concept has also been introduced. Several facts about efficient mPFG have also been studied here. Finally, a real-world mobile network application that is directly related to the integrity of the mPFG concept has been discussed. We will extend our research work on a more generalized mPFG concept.

Author Contributions

Conceptualization, G.M. and M.P.; Methodology, T.M. and A.M.; Software, O.A.; Validation, T.M.; Investigation, A.M.; Data curation, T.M., A.M. and O.A.; Writing—original draft, G.M.; Visualization, M.P. All authors have read and agreed to the published version of the manuscript.

Funding

The authors extend their appreciation to the Deanship of Scientific Research at University of Tabuk for funding this work through Research no. S-0136-1443.

Data Availability Statement

Not applicable.

Acknowledgments

The authors would like to express their sincere thanks to the anonymous reviewers for their valuable comments and helpful suggestions which greatly improved the quality of this paper. The authors extend their appreciation to the Deanship of Scientific Research at University of Tabuk for funding this work through Research no. S-0136-1443.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Zadeh, L.A. Fuzzy sets. Inf. Control 1965, 8, 338–353. [Google Scholar] [CrossRef] [Green Version]
  2. Zhang, R.W. Bipolar fuzzy sets and relations:a computational fremework for cognitive modeling and multiagent decision analysis. In Proceedings of the First International Joint Conference of the North American Fuzzy Information Processing Society Biannual Conference—The Industrial Fuzzy Control and Intellige, San Antonio, TX, USA, 18–21 December 1994; pp. 305–309. [Google Scholar]
  3. Zhang, R.W. Bipolar fuzzy sets. In Proceedings of the 1998 IEEE International Conference on Robotics and Automation, Washington, DC, USA, 20–20 May 1998; pp. 835–840. [Google Scholar]
  4. Chen, J.; Li, S.; Ma, S.; Wang, X. m-Polar fuzzy sets: An extension of bipolar fuzzy sets. Hindwai Publ. Corp. Sci. World J. 2014, 2014, 416530. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  5. Kauffman, A. Introduction a la Theorie des Sous-Emsembles Flous; Mansson: Paris, France, 1973. [Google Scholar]
  6. Rosenfeld, A. Fuzzy Graphs, Fuzzy Sets and Their Application; Academic Press: New York, NY, USA, 1975; pp. 77–95. [Google Scholar]
  7. Mathew, S.; Sunitha, M.S. Fuzzy Graphs: Basics, Concepts and Applications; Lap Lambert Academic Publishing: Saarbruecken, Germany, 2012. [Google Scholar]
  8. Mordeson, J.N.; Nair, P.S. Fuzzy Graph and Fuzzy Hypergraphs; Physica-Verlag: Heidelberg, Germany, 2000. [Google Scholar]
  9. Nair, P.S.; Cheng, S.C. Cliques and fuzzy cliques in fuzzy graphs. In Proceedings of the IFSA World Congress and 20th NAFIPS International Conference, Vancouver, BC, Canada, 25–28 July 2001; Volume 4, pp. 2277–2280. [Google Scholar]
  10. Muhiuddin, G.; Hameed, S.; Rasheed, A.; Ahmad, U. Cubic Planar Graphs with Application to Road Network. Math. Probl. Eng. 2022, 2022, 5251627. [Google Scholar] [CrossRef]
  11. Muhiuddin, G.; Takallo, M.M.; Jun, Y.B.; Borzooei, R.A. Cubic graphs and their application to a traffic flow problem. Int. J. Comput. Intell. Syst. 2020, 13, 1265–1280. [Google Scholar] [CrossRef]
  12. Pal, M.; Samanta, S.; Ghorai, G. Modern Trends in Fuzzy Graph Theory; Springer: Berlin/Heidelberg, Germany, 2020. [Google Scholar]
  13. Ghorai, G.; Pal, M. Some properties of m-polar fuzzy graphs. Pac. Sci. Rev. Nat. Sci. Eng. 2016, 18, 38–46. [Google Scholar] [CrossRef] [Green Version]
  14. Akram, M.; Adeel, A. m-Polar fuzzy graphs and m-polar fuzzy line graphs. J. Discret. Math. Sci. Cryptogr. 2017, 20, 1597–1617. [Google Scholar] [CrossRef]
  15. Akram, M.; Wassem, N.; Dudek, W.A. Certain types of edge m-polar fuzzy graph. Iran. J. Fuzzy Syst. 2016, 14, 27–50. [Google Scholar]
  16. Akram, M. m-Polar Fuzzy Graphs, Theory, Methods, Application; Springer International Publishing: Berlin/Heidelberg, Germany, 2019. [Google Scholar] [CrossRef]
  17. Mariappan, S.; Sujatha, R.; Sundareswaran, R.; Sahoo, S.; Pal, M. Concept of integrity and its value of fuzzy graphs. J. Intell. Fuzzy Syst. 2018, 34, 2429–2439. [Google Scholar]
  18. Mariappan, S.; Ramalingam, S.; Raman, S.; Bacak-Turan, G. Domination integrity and efficient fuzzy graphs. Neural Comput. Appl. 2020, 32, 10263–10273. [Google Scholar] [CrossRef]
  19. Saravanan, M.; Sujatha, R.; Sundareswaran, R. A study on regular FGs and integrity of FG. Int. J. Appl. Eng. Res. 2015, 10, 160–164. [Google Scholar]
  20. Mahapatra, T.; Pal, M. Fuzzy colouring of m-polar fuzzy graph and its application. J. Intell. Fuzzy Syst. 2018, 35, 6379–6391. [Google Scholar] [CrossRef]
  21. Mahapatra, T.; Ghorai, G.; Pal, M. Competition graphs under interval-valued m-polar fuzzy environment and its application. Comp. Appl. Math 2022, 41, 285. [Google Scholar] [CrossRef]
  22. Ghorai, G.; Pal, M. On some operations and density of m-polar fuzzy graphs. Pac. Sci. Rev. Nat. Sci. Eng. 2015, 17, 14–22. [Google Scholar] [CrossRef] [Green Version]
Figure 1. Node integrity of 3PFG Γ .
Figure 1. Node integrity of 3PFG Γ .
Mathematics 11 01398 g001
Figure 2. Domination integrity of 3PFG Γ .
Figure 2. Domination integrity of 3PFG Γ .
Mathematics 11 01398 g002
Figure 3. Edge integrity of 3PFG Γ .
Figure 3. Edge integrity of 3PFG Γ .
Mathematics 11 01398 g003
Figure 4. Efficient 3PFG Γ .
Figure 4. Efficient 3PFG Γ .
Mathematics 11 01398 g004
Figure 5. Domination integrity of 3PFG G.
Figure 5. Domination integrity of 3PFG G.
Mathematics 11 01398 g005
Table 1. Domination integrity of 3PFG Γ .
Table 1. Domination integrity of 3PFG Γ .
A Γ A m ( Γ A ) | A | | A | + m ( Γ A )
{ d } a b c ( 1.1 , 1.2 , 0.9 ) ( 0.6 , 0.5 , 0.2 ) ( 1.7 , 1.7 , 1.1 )
{ a , b } d c ( 0.9 , 1 , 0.4 ) ( 0.8 , 0.7 , 0.7 ) ( 1.7 , 1.7 , 1.1 )
{ a , c } d b ( 0.9 , 0.8 , 0.6 ) ( 0.8 , 0.9 , 0.5 ) ( 1.7 , 1.7 , 1.1 )
{ a , d } b c ( 0.6 , 0.8 , 0.6 ) ( 1.1 , 0.9 , 0.5 ) ( 1.7 , 1.7 , 1.1 )
{ c , d } b a ( 0.8 , 0.7 , 0.7 ) ( 0.9 , 1 , 0.4 ) ( 1.7 , 1.7 , 1.1 )
{ b , d } { a } , { c } ( 0.5 , 0.5 , 0.3 ) ( 0.9 , 0.8 , 0.6 ) ( 1.4 , 1.3 , 0.9 )
{ a , b , c } { d } ( 0.6 , 0.5 , 0.2 ) ( 1.1 , 1.2 , 0.9 ) ( 1.7 , 1.7 , 1.1 )
{ a , c , d } { b } ( 0.3 , 0.3 , 0.4 ) ( 1.4 , 1.4 , 0.7 ) ( 1.7 , 1.7 , 1.1 )
{ b , c , d } { a } ( 0.5 , 0.4 , 0.3 ) ( 1.2 , 1.3 , 0.8 ) ( 1.7 , 1.7 , 1.1 )
{ a , b , d } { c } ( 0.3 , 0.5 , 0.2 ) ( 1.4 , 1.2 , 0.9 ) ( 1.7 , 1.7 , 1.1 )
{ a , b , c , d } ϕ ( 0 , 0 , 0 ) ( 1.7 , 1.7 , 1.1 ) ( 1.7 , 1.7 , 1.1 )
Table 2. Model 3PF domination integrity graph G.
Table 2. Model 3PF domination integrity graph G.
A G A m ( G A ) | A | | A | + m ( G A )
{ e , b , d } a f g , { c } ( 1.1 , 1 , 1.1 ) ( 1.4 , 1.5 , 1.1 ) ( 2.5 , 2.5 , 2.2 )
{ e , d , c } f a g b ( 1.6 , 1.4 , 1.4 ) ( 1.5 , 1.3 , 1.1 ) ( 3.1 , 2.7 , 2.5 )
{ e , g , b } a f , d c ( 1.3 , 0.7 , 0.7 ) ( 0.7 , 1 , 0.7 ) ( 2 , 1.7 , 1.4 )
{ e , g , c } f a b d ( 1.7 , 1.5 , 1.3 ) ( 1.4 , 1.2 , 1.2 ) ( 3.1 , 2.7 , 2.3 )
{ a , b , g , f } e d c ( 1.5 , 1.3 , 1.1 ) ( 1.6 , 1.4 , 1.4 ) ( 3.1 , 2.7 , 2.5 )
{ f , e , g , b } { a } , d c ( 1.3 , 0.7 , 0.7 ) ( 1.6 , 1.6 , 1.5 ) ( 2.9 , 2.3 , 2.2 )
{ a , g , e , c } b d , { f } ( 1.2 , 0.9 , 0.7 ) ( 1.6 , 1.6 , 1.5 ) ( 2.8 , 2.5 , 2.2 )
{ f , e , d , c } a g b ( 1.3 , 1 , 0.7 ) ( 1.8 , 1.5 , 1.4 ) ( 3.1 , 2.5 , 2.1 )
{ f , a , b , c } e g d ( 1.5 , 1.5 , 1.3 ) ( 1.6 , 1.2 , 1.2 ) ( 3.1 , 2.7 , 2.5 )
{ a , c , d , e } b g , { f } ( 1.1 , 0.8 , 0.8 ) ( 1.7 , 1.7 , 1.4 ) ( 2.8 , 2.5 , 2.2 )
{ b , c , d , e } f a g ( 1.1 , 1 , 1.1 ) ( 2 , 1.7 , 1.4 ) ( 3.1 , 2.7 , 2.5 )
{ b , d , e , f } a g , { c } ( 0.8 , 0.8 , 0.8 ) ( 1.7 , 1.7 , 1.4 ) ( 2.5 , 2.5 , 2.2 )
{ a , b , c , d , e } { f } , { g } ( 0.6 , 0.4 , 0.5 ) ( 2.2 , 2.1 , 1.7 ) ( 2.8 , 2.5 , 2.3 )
{ a , c , d , e , f } b g ( 1.1 , 0.8 , 0.8 ) ( 2 , 1.9 , 1.7 ) ( 3.1 , 2.7 , 2.5 )
{ a , d , e , f , g } b c ( 1.1 , 0.6 , 0.6 ) ( 2 , 2.1 , 1.9 ) ( 3.1 , 2.7 , 2.5 )
{ b , c , d , e , f } a g ( 0.8 , 0.8 , 0.8 ) ( 2.3 , 1.9 , 1.7 ) ( 3.1 , 2.7 , 2.5 )
{ b , d , e , f , g } { a } , { c } ( 0.6 , 0.4 , 0.3 ) ( 2.3 , 2.1 , 1.9 ) ( 2.9 , 2.5 , 2.2 )
{ c , d , e , f , g } a b ( 0.7 , 0.8 , 0.6 ) ( 2.4 , 1.9 , 1.9 ) ( 3.1 , 2.7 , 2.5 )
{ a , b , c , d , e , f } { g } ( 0.6 , 0.4 , 0.5 ) ( 2.5 , 2.3 , 2 ) ( 3.1 , 2.7 , 2.5 )
{ a , c , d , e , f , g } { b } ( 0.5 , 0.4 , 0.3 ) ( 2.4 , 2.3 , 2.2 ) ( 2.9 , 2.7 , 2.5 )
{ b , c , d , e , f , g } { a } ( 0.2 , 0.4 , 0.3 ) ( 2.7 , 2.3 , 2.2 ) ( 2.9 , 2.7 , 2.5 )
V ϕ ( 0 , 0 , 0 ) ( 2.9 , 2.7 , 2.5 ) ( 2.9 , 2.7 , 2.5 )
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Muhiuddin, G.; Mahapatra, T.; Pal, M.; Alshahrani, O.; Mahboob, A. Integrity on m-Polar Fuzzy Graphs and Its Application. Mathematics 2023, 11, 1398. https://doi.org/10.3390/math11061398

AMA Style

Muhiuddin G, Mahapatra T, Pal M, Alshahrani O, Mahboob A. Integrity on m-Polar Fuzzy Graphs and Its Application. Mathematics. 2023; 11(6):1398. https://doi.org/10.3390/math11061398

Chicago/Turabian Style

Muhiuddin, Ghulam, Tanmoy Mahapatra, Madhumangal Pal, Ohoud Alshahrani, and Ahsan Mahboob. 2023. "Integrity on m-Polar Fuzzy Graphs and Its Application" Mathematics 11, no. 6: 1398. https://doi.org/10.3390/math11061398

APA Style

Muhiuddin, G., Mahapatra, T., Pal, M., Alshahrani, O., & Mahboob, A. (2023). Integrity on m-Polar Fuzzy Graphs and Its Application. Mathematics, 11(6), 1398. https://doi.org/10.3390/math11061398

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop