Next Article in Journal
Fractal Fractional Derivative Models for Simulating Chemical Degradation in a Bioreactor
Previous Article in Journal
Mathematical Models and Simulations
Previous Article in Special Issue
Some Connectivity Parameters of Interval-Valued Intuitionistic Fuzzy Graphs with Applications
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Novel Domination in Vague Influence Graphs with an Application

1
Institute of Computing Science and Technology, Guangzhou University, Guangzhou 510006, China
2
Department of Mathematics, University of Mazandaran, Babolsar 4741613534, Iran
3
School of Physics, Damghan University, Damghan 3671641167, Iran
4
School of Computer Science and Technology, Dalian Univerity of Technology, Dalian 116024, China
*
Author to whom correspondence should be addressed.
Axioms 2024, 13(3), 150; https://doi.org/10.3390/axioms13030150
Submission received: 13 January 2024 / Revised: 20 February 2024 / Accepted: 22 February 2024 / Published: 26 February 2024
(This article belongs to the Special Issue Fuzzy Graphs: Theory and Applications)

Abstract

:
Vague influence graphs (VIGs) are well articulated, useful and practical tools for managing the uncertainty preoccupied in all real-life difficulties where ambiguous facts, figures and explorations are explained. A VIG gives the information about the effect of a vertex on the edge. In this paper, we present the domination concept for VIG. Some issues and results of the domination in vague graphs (VGs) are also developed in VIGs. We defined some basic notions in the VIGs such as the walk, path, strength of I n -pair , strong I n -pair, I n -cut vertex, I n -cut pair (CP), complete VIG and strong pair domination number in VIG. Finally, an application of domination in illegal drug trade was introduced.

1. Introduction

Graphs are a common method to visually illustrate relationships in data. The purpose of a graph is to present data that are too numerous or complicated to be described adequately in the text and in less space. The fuzzy graph (FG) theory is an important area of research that is the backbone of representations of any network with ambiguity. Crisp graphs are not sufficient to capture the uncertainty of parameters in networks, for example, strong relationships and effective, influential or popular persons. Zadeh [1] introduced the subject of a fuzzy set (FS) in 1995. Rosenfeld [2] proposed the subject of FGs. The definitions of FGs from the Zadeh fuzzy relations in 1973 were presented by Kaufmann [3]. Bhutani and Rosenfeld [4] explained the concept of strong edge (SE) in FGs. FGs and their generalizations have played an essential role in dealing with real-life problems involving uncertainties. Gau and Buehrer [5] proposed the concept of a vague set (VS) by replacing the value of an element in a set with a sub interval of [0, 1]. Moreover, a VG can concentrate on determining the uncertainties coupled with the inconsistent and indeterminate information of any real-world problems where FGs may not lead to adequate results. Ramakrishna in [6] proposed a new concept of VGs, belonging to the FGs family, which had good capabilities when faced with problems that could not be expressed by FGs. The notion of a VG is a new mathematical attitude to model the ambiguity and uncertainty in decision-making issues. Study on VG and results from these graphs were introduced by Kosari et al. [7,8,9,10]. Furthermore, a review was carried out on different types of FGs, and the new results were studied [11,12,13]. In graph theory, a dominating set (DS) for a graph G is a subset D of its vertices, such that any vertex of G is either in D or has a neighbor in D. The domination number γ ( G ) is the number of vertices in a smallest DS for G. DSs are of practical interest in several areas. In wireless networking, DSs are used to find efficient routes within ad hoc mobile networks. They have also been used in document summarization and in designing secure systems for electrical grids. The concept of DS in FGs, both theoretically and practically, is very valuable. A DS in FGs is used for solving problems of different branches in applied sciences such as location problems. In this way, the study of new concepts such as DS is essential in FG. Domination in VGs has applications in several fields. Domination emerges in the facility location problems, where the number of facilities is fixed and one endeavors to minimize the distance that a person needs to travel to get to the closest facility. Selvam et al. [14] proposed the issue of domination in the join of FGs using SE. Domination in the join of incidence FGs using strong pairs was defined by Nazeer et al. [15]. Notes on domination and strong domination and total domination in FGs were introduced by Manjusha and Sunitha [16,17,18].
FGs are unable to give information about the impact of vertices on the edges. This shortage in FGs was the basic problem which is covered by I n -FGs. It was Dinesh who introduced the extension of FGs known as I n -FGs, which give information regarding the effect of vertices on the edges [19].
VIGs can represent natural flow networks with extra illegal flow conditions. They have been used in physical problems related to networking and trafficking. Through this paper, the connectivity thoughts in VIG are extended along with the study of several fundamental properties of such graphs. Special influence vertices are studied and the relationships between several influence parameters have been found.
Mathew et al. [20,21] expressed the notions of fuzzy end vertices for I n -FGs. Natarajan et al. [22] studied strong (weak) domination in FGs. Certain properties of domination in VG products were explained by Shi et al. [23]. New results on VG were reported by Akram et al. [24,25]. Borzooei et al. [26] explained the new definition of domination in VGs. Double domination in VGs was developed by Banitalebi [27]. Some properties of double domination in VGs were defined by [28]. New results of FGs were presented by Rashmanlou et al. [29,30]. The concept of a strong pair domination number in intuitionistic I n -FGs was introduced by Rehman et al. [31]. Poulik et al. [32] presented the Randic index in graphs.

1.1. Methodology and Importance of VIG

The idea of VIG is proposed for three reasons. First, FGs are not able to provide the effect of vertices on the edges, and this flaw is covered by I n -FGs, but they only provide the effect of a vertex on an edge and not on all the edges of the graph. The effect of vertices on any edge of the graph is given in VIGs. However, VIGs are incapable of intimating the degree of non-membership of the vertices, edges and I n -pairs. This is the main reason behind the idea of VIGs.
Second, it broadens the ideas of domination, minimal strong fuzzy in I n -pair DS and minimum strong I n -pair domination number in VIGs.
Third, there is a vertex m along with an edge n l , and they are not connected. Then, by using the influence theory, an I n -path can be generated between vertex m to vertices n , l and edge n l . Lastly, I n -FG shows the effect of a vertex on which vertices are connected with it only, whereas VIGs are capable of reflecting not only the impact of a vertex on any edge of the graph but also providing the effect of a vertex of a graph on the edge of the other graph. In the FG theory, there was no such concept .

1.2. Research Gaps and Motivation of Study

The following points influenced us to write this article:
  • Due to the enormous applications of domination in FGs, including domination for FGs in distinct decision-making problems, it seems advantageous to expand the notion of domination in VIG.
  • There are numerous applications of the domination in VIG in chemistry, computer science, psychology, and others.
  • Moreover, some basic notions related to domination such as walk, path, strength of I n -pair, strong I n -pair, and I n -cut vertex have not yet been discussed and studied in the literature, and therefore, we expanded the notion of domination of I n -FG to the domination of VIG, and the strong pair domination number is investigated.

1.3. Contribution of This Study

VGs provide tools for modeling different types of real-world networks. However, we should consider more relations, especially the relationship between edges with their corresponding vertices, which usually refer to incidences where external factors influence the real flow in a network. Then, VIGs may sometimes model certain real-world situations better. In this regard, we introduce dominating sets in VIGs by using influence edges due to the importance of the concept of domination and its application in various issues.
Domination in VG theory is one of the most widely used topics in other sciences, including psychology, computer science, nervous systems, artificial intelligence, decision-making theory, and combinations of them. VIGs are highly practical tools for the study of different computational intelligence and computer science domains. Dominations in VIGs have many applications, such as, in wireless networking, dominations are used to find efficient routes within networks. They have also been used in document summarization and in designing secure systems for electrical grids, ect.
Hence, in this study, we extended the I n -FG notion to the VIG and discussed the well-known problems of domination, walk, path, I n -pair, strong I n -pair and I n -cut vertex on VIG. Likewise, we introduced the new concepts of the strong pair domination number in VIGs. Finally, an application of domination in illegal drug trade was introduced.

2. Preliminaries

In this part, we study some essential definitions and notions of graphs. Such as, FGs, VGs and domination sets. Before stating the definitions, we fix some notations for graphs and sets.
Definition 1 
([33]). A graph G * is a pair ( X , E ) , where X is called the vertex set and E X × X is called the edge set.
Definition 2. 
Given a crisp graph G * = ( X , E ) , a subset of vertices D X is called a DS, if for every vertex u X D , there is a vertex v D such that ( u , v ) E .
Definition 3 
([34]). In graph theory, a path in a graph is a finite or infinite sequence of edges which joins a sequence of vertices which, by most definitions, are all distinct (and since the vertices are distinct, so are the edges). Paths are fundamental concepts of graph theory, described in the introductory sections of most graph theory texts.
Definition 4 
([33]). An FG G = ( ϕ , ψ ) is a pair of function ϕ : X [ 0 , 1 ] and ψ : X × X [ 0 , 1 ] such that, for all m , m X ,
ψ ( m n ) min { ϕ ( m ) , ϕ ( n ) } .
Definition 5. 
A path P of length l in an FG G = ( ϕ , ψ ) is a sequence of distinct vertices x 0 , x 1 , x 2 , , x l such that ψ ( x k 1 x k ) > 0 , k = 1 , 2 , 3 , , l . The degree of membership value (MV) of a weakest edge is defined as its strength. The strength of connectedness between two vertices m and n is defined as the maximum (MA) of the strength of all paths between m and n and is denoted by ψ ( m , n ) or C O N N G ( m , n ) .
An edge m n is called an SE if ψ ( m , n ) = ψ ( m n ) . If ψ ( m n ) = 0 for each m X , then n is named an isolated vertex. If m n is an SE, then its weight is at least as great as the strength of the connectedness of its end vertices when it is deleted. Note that, C O N N G m n ( m n ) is the strength of the connectedness between m and n in an FG obtained from G by deleting the edge m n .
Definition 6. 
Let G = ( ϕ , ψ ) be an FG. Any edge m n is called effective edge if ψ ( m n ) = min { ϕ ( m ) , ϕ ( n ) } .
Definition 7 
([5]). A vague set (VS) Q is a pair ( Q t , Q f ) on a set X, where Q t and Q f are real- valued functions which can be defined from X to [ 0 , 1 ] , so that Q t ( m ) + Q f ( m ) 1 , m X .
Definition 8 
([6]). A pair G = ( Q , Z ) is called a VG on graph G * = ( X , E ) , where Q = ( Q t , Q f ) is a VS on X and Z = ( Z t , Z f ) is a VS on E such that
Z t ( m n ) min { Q t ( m ) , Q t ( n ) } , Z f ( m n ) max { Q f ( m ) , Q f ( n ) } .
for all m n E . Note that Z is called a vague relation on Q . A VG G is named strong if
Z t ( m n ) = min { Q t ( m ) , Q t ( n ) } , Z f ( m n ) = max { Q f ( m ) , Q f ( n ) } ,
for all m n E .
Definition 9. 
Suppose G = ( Q , Z , R ) is a VG. Then,
(i) 
A path P : m = m 0 , m 1 , m 2 , , m q 1 , m q = n in G is a sequence of distinct vertices where Z t ( m k 1 m k ) > 0 , Z f ( m k 1 m k ) < 1 , k = 1 , 2 , 3 , , q . The length of P is q.
(ii) 
If P : m = m 0 , m 1 , m 2 , , m q 1 , s q = n is a path between m and n of length q, then ( Z t ( m n ) ) q = sup { Z t ( m m 1 ) Z t ( m 1 m 2 ) Z t ( m q 1 n ) } and ( Z f ( m n ) ) q = inf { Z f ( m m 1 ) Z f ( m 1 m 2 ) Z f ( m q 1 n ) } .
C O N N G ( m , n ) = ( C O N N G t ( m , n ) , C O N N G f ( m , n ) ) = ( Z t ( m n ) , Z f ( m n ) ) is named the strength of connectedness between any two vertices m and n in G where C O N N G t ( m , n ) = sup { ( Z t ( m n ) ) q } and C O N N G f ( m , n ) = inf { ( f Z ( m n ) ) q } , q = 1 , 2 , , .
Definition 10. 
Let G * = ( X , E ) be a crisp graph. Then, the triad G = ( X , E , K ) in which K X × E is called I n -graph. An element of K is called an I n -pair.
Definition 11. 
Let G * = ( X , E , K ) be an I n -graph. A triad G ˜ = ( ϕ , ψ , λ ) , where ϕ , ψ and λ are fuzzy subsets of X , E and K, respectively, is called an I n -FG of G * , if λ ( m , m n ) min { ϕ ( m ) , ψ ( m n ) } , m X , m n E . A vertex m and an edge m n are connected if there exists a path m , ( m , m n ) , m n between them. The vertices m , n are connected if there exists a path m , ( m , m n ) , m n , ( n , m n ) , n between them.
Example 1. 
Consider the I n -FG G ˜ = ( ϕ , ψ , λ ) presented in Figure 1. In this I n -FG, we have ϕ ( m ) = 0.4 , ϕ ( n ) = 0.5 , ϕ ( l ) = 0.6 and ψ ( m n ) = 0.4 , ψ ( m l ) = 0.4 , ψ ( l n ) = 0.5 and λ ( m , n m ) = λ ( n , n m ) = 0.3 , λ ( n , n l ) = λ ( l , n l ) = 0.4 . In this I n -FG, the vertices m , n are connected vertices because there exist a path m , ( m , m n ) , m n , ( n , m n ) , n between them.
Definition 12. 
An I n -FG G ˜ = ( ϕ , ψ , λ ) of an I n -graph G * = ( X , E , K ) is complete I n -FG, if λ ( m , n l ) = min { ϕ ( m ) , ψ ( n l ) } , ( m , n l ) K .
Definition 13. 
Let G = ( ϕ , ψ ) be an FG with any two vertices m and n. A vertex m dominates the vertex n if ψ ( m n ) min { ϕ ( m ) , ϕ ( n ) } . A subset S of the set X is called an SE DS if for every n X S , m S such that m dominates n. A DS S is called MIL DS if there is no proper subset of S that is DS. The effective edge domination number is the MIL fuzzy cardinality created from all MIL DS and is shown by α E E ( G ) , and the related set S is known as MIL effective edge DS.
List of abbreviations used throughout this paper.
  • F S stands for “Fuzzy Set”;
  • F G stands for “Fuzzy Graph”;
  • V S stands for “Vague Set”;
  • V G stands for “Vague Graph”;
  • V I G stands for “Vague influence Graph”;
  • i n stands for “Influence”;
  • D S stands for “Domination Set”;
  • S E stands for “Strong Edge”;
  • C P stands for “Cut Pair”;
  • M V stands for “Membership Value”;
  • M A stands for “Maximum”;
  • M I stands for “Minimum”;
  • M I L stands for “Minimal”.

3. Vague Influence Graphs

In this section, we study a new notion of the influence graph and influence pair domination set on VGs. Namely, we obtain the domination set on VIGs. Furthermore, some properties of VIGs are established.
Definition 14. 
A triad G = ( Q , Z , R ) is called a VIG on graph G * = ( X , E , K ) , where Q = ( Q t , Q f ) is a VS on X, and Z = ( Z t , Z f ) is a VS on E, and R = ( R t , R f ) is a VS on K, such that
R t ( m , n l ) min { Q t ( m ) , Z t ( n l ) } , R f ( m , n l ) max { Q f ( m ) , Z f ( n l ) }
for all m X , n l E .
Definition 15. 
Consider that G = ( Q , Z , R ) is a VIG. The vertex m and an edge n l are shown as connected if there exists a path of m , ( m , n l ) , n l between them.
Example 2. 
Consider a VIG G = ( Q , Z , R ) presented in Figure 2. In this VIG, we have Q ( m ) = ( 0.3 , 0.5 ) , Q ( n ) = ( 0.4 , 0.6 ) , Q ( l ) = ( 0.6 , 0.7 ) and Z ( m n ) = ( 0.3 , 0.6 ) , Z ( m l ) = ( 0.3 , 0.7 ) , Z ( l n ) = ( 0.4 , 0.7 ) and R ( m , n m ) = R ( n , n m ) = ( 0.3 , 0.6 ) , R ( n , n l ) = R ( l , n l ) = ( 0.3 , 0.8 ) , R ( m , n l ) = ( 0.2 , 0.8 ) . In this VIG, vertex m and an edge n l are shown as connected because there exists a path of m , ( m , n l ) , n l between them.
Definition 16. 
Let G = ( Q , Z , R ) be a VIG. If it involves an I n -pair then G is VIG. A sequence P : m , ( m , n l ) , n l , ( n , n l ) , l is a walk in G , and it is an I n ( m l ) path, whereas P : m , ( m , n l ) , n l is also an I n ( m n l ) path. Every two vertices in VIG are known to be connected if there exists any I n -pair between them. Here, ( m , n l ) is an I n -pair as m , n and l are distinct. This I n -pair shows the influence of vertex m on the edge n l .
Definition 17. 
Suppose G = ( Q , Z , R ) is a VIG. An I n -pair in G is named effective IP if
R t ( m , n l ) = min { Q t ( m ) , Z t ( n l ) } , R f ( m , n l ) = max { Q f ( m ) , Z f ( n l ) } .
Definition 18. 
Let G = ( Q , Z , R ) be a VIG. Then, the influence of path P indicated by I n ( P ) = ( I t n ( P ) , I f n ( P ) ) and is described as, I n t ( P ) = min { R t ( m , n l ) | ( m , n l ) P } , I n f ( P ) = max { R f ( m , n l ) | ( m , n l ) P } , where I n t and I n f show the MV and the non-MVs of I n -pair lies in the path exists between m to n l .
Definition 19. 
Let G = ( Q , Z , R ) be a VIG. An I n -pair ( m , n l ) is known as strong IP if R ( m , n l ) C O N N G ( m , n l ) ( m , n l ) . An I n -pair ( m , n l ) is known as the strongest In-pair if R ( m , n l ) > C O N N G ( m , n l ) ( m , n l ) . An I n -pair ( m , n l ) is known as weak IP if R ( m , n l ) < C O N N G ( m , n l ) ( m , n l ) .
Definition 20. 
Let G = ( Q , Z , R ) be a VIG. The greatest I n -strength between m and n l is the highest MV with lowest non-MV from all the I n -paths between m to n l which is represented by C O N N ( m , n l ) = ( C O N N t ( m , n l ) , C O N N f ( m , n l ) ) and is defined C O N N ( m , n l ) = max { C O N N t q ( m , n l ) | q = 1 , 2 , 3 , , } and C O N N ( m , n l ) = min { C O N N f q ( m , n l ) | q = 1 , 2 , 3 , , } .
Theorem 1. 
Let G = ( Q , Z , R ) be a VIG. If ( m , n l ) is a strong I n -pair, then G involves a strong I n -path P .
Proof. 
Suppose G = ( Q , Z , R ) is a VIG. Then, a pair ( m , n l ) is an effective I n -pair if R t ( m , n l ) = min { Q t ( m ) , Z t ( n l ) } and R f ( m , n l ) = max { Q f ( m ) , Z f ( n l ) } . Now, consider that m n l is an I n -path P : m , ( m , n l ) , n l . Any I n -pair incident from m to n l can not have I n -MV more than n l . Similarly, any I n -pair ( m , n l ) which is influenced at n l can not have I n -MV more than ( m , n l ) . It means that the I n -path P : m , ( m , n l ) , n l has I n -strength from MVs as min { Q ( m ) , Z ( n l ) } and I n -strength from non-MVs as max { Q ( m ) , Z ( n l ) } . Therefore, P becomes the strong I n -path with the effective I n -pair. □
Theorem 2. 
Let G = ( Q , Z , R ) be a VIG. If the I n -path P involves the alone I n -pair, then the I n -pair should be strong.
Proof. 
Suppose G = ( Q , Z , R ) is a VIG with an I n -pair ( m , n l ) and R ( m , n l ) = min { Q ( m ) , Z ( n l ) } . Suppose the I n -pair is not a strong I n -pair, then C O N N G ( m , n l ) ( m , n l ) > R ( m , n l ) , which is just possible if there exist any other I n -path that is a contradiction. Thus, if the I n -path P contains the alone I n -pair, then the I n -pair should be strong. □
Theorem 3. 
Let G = ( Q , Z , R ) be a VIG. If R ( m 0 , m 1 m 2 ) = max { R ( m 0 , m 1 m 2 ) : ( m 0 , m 1 m 2 ) R } , then ( m 0 , m 1 m 2 ) is known as strong I n -pair.
Proof. 
Suppose G = ( Q , Z , R ) is a VIG. Let the I n -pair ( m 0 , m 1 m 2 ) be not a strong I n -pair. Then, there is any I n -path P : m 0 , ( m 0 , m 1 m 2 ) , m 1 m 2 , , m 0 m n so that the highest I n -strength of P > R ( m 0 , m 1 m 2 ) . Clearly, there is R ( m i , m i + 1 m i + 2 ) > R ( m 0 , m 1 m 2 ) for every i = 1 , 2 , 3 , , n . This shows that there is any I n -pair that is a strong I n -pair, which is a contradiction. Therefore, if R ( m 0 , m 1 m 2 ) = max { R ( m 0 , m 1 m 2 ) : ( m 0 , m 1 m 2 ) R } , then ( m 0 , m 1 m 2 ) is known as a strong I n -pair. □
Theorem 4. 
Suppose G = ( Q , Z , R ) is a VIG having a strong I n -pair ( m , n l ) , then it must be a strong I n -pair.
Proof. 
Suppose G = ( Q , Z , R ) is a VIG having a strong I n -pair ( m , n l ) . Then, by using the definition of a strong I n -pair ( m , n l ) in G , we have R t ( m , n l ) = min { Q t ( m ) , Z t ( n l ) } and R f ( m , n l ) = max { Q f ( m ) , Z f ( n l ) } . Suppose Q t ( m ) Z t ( n l ) , then R t ( m , n l ) = Z t ( n l ) . So, for any I n -path P : m , ( m , n l ) , n l , the influence of P Z t ( n l ) . By using Theorem 1, the I n -path P involves the alone I n -pair, then the IP should be strong, and according to Theorem 2, the I n -pair having MA degree of MV should be a strong I n -pair. As the I n -pair is alone and has MA degree of MV, we have R t ( m , n l ) = Z t ( n l ) > C O N N G ( m , n l ) t ( m , n l ) . Now, suppose Q t ( m ) Z t ( n l ) , then R t ( m , n l ) = Q t ( m ) . So, for any I n -path P : m , ( m , n l ) , n l , the influence of P Q t ( m 0 ) . Again by using Theorems 1 and 2, we have R t ( m , n l ) = Q t ( m ) > C O N N G ( m , n l ) t ( m , n l ) . For non-MVs, consider Q f ( m ) Z f ( n l ) , then R f ( m , n l ) = Z f ( n l ) . So, for any I n -path P : m , ( m , n l ) , n l , the influence of P Z t ( n l ) . By using Theorems 1 and 2, we have R f ( m , n l ) = Q f ( m ) > C O N N G ( m , n l ) t ( m , n l ) . Now, suppose Q f ( m ) Z f ( n l ) , then R f ( m , n l ) = Q f ( m ) . So, for any I n -path P : m , ( m , n l ) , n l , the influence of P Q f ( m ) . Again, by using Theorems 1 and 2, we have R f ( m , n l ) = Q f ( m ) > C O N N G ( m , n l ) f ( m , n l ) . Therefore, ( m , n l ) is a strong I n -pair. □
Theorem 5. 
Let G = ( Q , Z , R ) be a VIG. Then, a vertex x Q is called an I n -cut vertex of G if C O N N G x ( m , n l ) < R ( m , n l ) for some m , n l Q Z .
Example 3. 
Consider that G = ( Q , Z , R ) is a VIG as shown in Figure 3. In this VIG, there are two I n -paths from a 0 to a 3 namely: P 1 : a 0 , ( a 0 , a 3 a 4 ) , a 3 a 4 , ( a 3 , a 3 a 4 ) , a 3 and P 2 : a 0 , ( a 0 , a 1 a 2 ) , a 1 a 2 , ( a 2 , a 1 a 2 ) , a 2 , ( a 2 , a 2 a 3 ) , a 2 a 3 , ( a 3 , a 2 a 3 ) , a 3 . For P 1 , C O N N G a 0 ( a 0 , a 3 a 4 ) = ( 0 , 0 ) < ( 0.1 , 0.6 ) = R ( a 0 , a 3 a 4 ) , and for P 2 , C O N N G a 0 ( a 0 , a 1 a 2 ) = ( 0 , 0 ) < ( 0.2 , 0.6 ) = R ( a 0 , a 1 a 2 ) .
Definition 21. 
Let G = ( Q , Z , R ) be a VIG. Then, G is described as VIG block if G does not involve any cut vertex.
Theorem 6. 
Suppose G = ( Q , Z , R ) is a VIG with an I n -pair ( m , n l ) . Then, the vertex deleted from the I n -pair is a cut vertex of G .
Proof. 
Suppose G = ( Q , Z , R ) is a VIG with an I n -pair ( m , n l ) . There is only one I n -path from m to n l namely m , ( m , n l ) , n l having C O N N G m ( m , n l ) < C O N N G ( m , n l ) . Therefore, m is a I n -cut vertex. □
Definition 22. 
Let G = ( Q , Z , R ) be a VIG. Then, an edge m j m j + 1 Z for each j = 1 , 2 , 3 , , q is called a bridge of G if C O N N G m j m j + 1 ( m 0 , m 1 m 2 ) < C O N N G ( m 0 , m 1 m 2 ) for some m 0 , m 1 m 2 Q Z .
Definition 23. 
Let G = ( Q , Z , R ) be a VIG. Then, G is bridgeless if it involves no bridge.
Definition 24. 
Let G = ( Q , Z , R ) be a VIG. Then, an I n -pair ( m , n l ) R is defined to be an I n -CP of G if C O N N G m ( m , n l ) < C O N N G ( m , n l ) for some m , n l Q Z .
Example 4. 
Consider that G = ( Q , Z , R ) is a VIG as shown in Figure 4. The MV and non-MV of pairs of VIG are shown in Table 1.
In this VIG, there is only one I n -path from a 1 to a 3 a 4 , namely a 1 , ( a 1 , a 3 a 4 ) , a 3 a 4 . If we delete the edge a 3 a 4 , we obtain ( 0 , 0 ) = C O N N G a 3 a 4 ( a 1 , a 3 a 4 ) < C O N N G ( a 1 , a 3 a 4 ) = ( 0.1 , 0.6 ) . Hence, a 3 a 4 is an influence bridge. If we delete the I n -pair ( a 1 , a 3 a 4 ) , we have ( 0 , 0 ) = C O N N G ( a 1 , a 3 a 4 ) ( a 1 , a 3 a 4 ) < C O N N G ( a 1 , a 3 a 4 ) = ( 0.1 , 0.6 ) . Hence, ( a 1 , a 3 a 4 ) is an I n -CP.
Definition 25. 
A VIG G = ( Q , Z , R ) is known as a complete VIG, if every vertex m has the influence on every edge n l with R t ( m , n l ) = min ( Q t ( m ) , Z t ( n l ) ) and R f ( m , n l ) = max ( Q f ( m ) , Z f ( n l ) ) .
Example 5. 
Consider that G = ( Q , Z , R ) is a complete VIG as shown in Figure 5. The MV and non-MV of pairs of VIG are shown in Table 1.
This is a complete VIG because m 1 has an influence on m 1 m 2 , m 1 m 3 , m 2 m 3 , m 3 m 4 and m 1 m 4 . Similarly, m 2 has an influence on m 1 m 2 , m 1 m 4 , m 2 m 4 , m 3 m 4 and m 2 m 3 . Furthermore, also, m 3 has an influence on m 3 m 2 , m 3 m 4 , m 3 m 1 , m 1 m 2 and m 1 m 4 . Lastly, m 4 has an influence on m 4 m 3 , m 4 m 1 , m 4 m 2 , m 2 m 3 and m 1 m 2 . This graph G also has a vague fuzzy influence cycle.
Definition 26. 
Let G = ( Q , Z , R ) be a VIG. Then, G is a cycle if G = ( Q * , Z * , R * ) is a cycle, while G is shown as a fuzzy cycle if G is a cycle and it does not contains a unique m 1 m 2 Z such that Z ( m 1 , m 2 ) = min Z ( m i m j ) | m i m j Z . The VIG G = ( Q , Z , R ) is known as a VIG cycle if it does not contains a unique I n -pair so that R t ( m 0 , m 1 m 2 ) = min { Q t ( m 0 ) , Z t ( m 1 m 2 ) } and R f ( m 0 , m 1 m 2 ) = max { Q f ( m 0 ) , Z f ( m 1 m 2 ) } .
Theorem 7. 
Let G = ( Q , Z , R ) be a VIG. If G is complete, then each I n -pair of G is a CP.
Proof. 
Let G = ( Q , Z , R ) be a complete VIG. If we remove any vertex from G , then it must reduce the I n -connectivity between two vertices or between the vertex and edge. Assume any three vertices m , n and l makes a complete VIG. If we remove a vertex m from G , we obtain C O N N G m ( m , n l ) < C O N N G ( m , n l ) . Therefore, if G is complete, then each pair of G is a CP. □
Theorem 8. 
Let G = ( Q , Z , R ) be a VIG. Then, a pair ( m , n l ) is an I n -pair CP if and only if the removal of the pair ( m , n l ) reduces the I n -connectivity between m and n l .
Proof. 
Let G = ( Q , Z , R ) be a VIG. Suppose ( m , n l ) is the I n -CP in G . Now, by using the definition, we have C O N N G ( m , n l ) ( m , n l ) < R ( m , n l ) . From all the I n -paths m n l , the path P : m , ( m , n l ) , n l will have the MA-influenced strength, namely R ( m , n l ) . So, it is clear that by removing the I n -pair , ( m , n l ) the I n -connectivity between m and n l will be reduced.
Conversely, if we have C O N N G ( m , n l ) ( m , n l ) < R ( m , n l ) , then by the definition, it shows that the pair ( m , n l ) is an I n -CP of G . □
Definition 27. 
Let G = ( Q , Z , R ) be a VIG with any three vertices m , n and l. A vertex m dominates the vertex l if R ( m , n l ) C O N N ( m , n l ) . A subset S of the set X is called a strong I n -pair DS, if for each l X S , m S such that m dominates l.
Definition 28. 
Let G = ( Q , Z , R ) be a VIG. Then, the degree of vertex m in G is represented by d e g ( m ) = ( d e g t ( m ) , d e g f ( m ) ) and is described as d e g t ( m ) = ( m , n l ) , ( m , n l ) R t , where m n l and d e g f ( m ) = m , n l ( m , n l ) , ( m , n l ) R f , where m n l .
Definition 29. 
Let G = ( Q , Z , R ) be a VIG. Then, the minimum(MI) degree of G is represented by ω ( G ) = ( ω t ( G ) , ω f ( G ) ) and is described as ω t ( G ) = min { d e g t ( m ) | m Q } , ω f ( G ) = max { d e g f ( m ) | m Q } .
Definition 30. 
Let G = ( Q , Z , R ) be a VIG. Then, the MA degree of G is represented by γ ( G ) = ( γ t ( G ) , γ f ( G ) ) and is described as γ t ( G ) = max { d e g t ( m ) | m Q } , γ f ( G ) = min { d e g f ( m ) | m Q } .
Definition 31. 
Let G = ( Q , Z , R ) be a VIG. Then, the order of G is shown by O ( G ) = ( O t ( G ) , O f ( G ) ) and is described as
O t ( G ) = m Q Q ( m ) , m O t , O f ( G ) = m Q Q ( m ) , m O f .
Definition 32. 
Let G = ( Q , Z , R ) be a VIG. Then, the size of G is shown by S ( G ) = ( S t ( G ) , S f ( G ) ) and is defined as S t ( G ) = ( m , n l ) , ( m , n l ) R t , where m n l and S f ( G ) = m , n l ( m , n l ) , ( m , n l ) R f , where m n l .
Definition 33. 
Let G = ( Q , Z , R ) be a VIG. A strong I n -pair DS S is known as a MIL strong I n -pair DS if no proper subset of S is a strong I n -pair DS.
Definition 34. 
Let G = ( Q , Z , R ) be a VIG. The MI strong I n -pair domination number obtained from all MIL strong I n -pair SDs and is represented by β ( G ) .
Definition 35. 
Let G = ( Q , Z , R ) be a VIG. Then, the MI number of elements in the MIL strong I n -pair DS is shown by M ( β ( G ) ) , where M ( β ( G ) ) = min { | S j | } , S j is a MIL strong I n -pair DS.
Theorem 9. 
Suppose that G = ( Q , Z , R ) is a VIG. If G is complete, then β ( G ) = min { Q ( m ) | m X } .
Proof. 
Suppose that S is a DS. Let m 0 S and m 1 X S . As G is a complete VIG, so each I n -pair is an effective I n -pair, then by using the Theorem 7, every I n -pair is a CP. Now, by using Theorem 8, every CP is a strong I n -pair as it decreases the I n -connectivity between m 0 and m 1 m 2 . It implies that m 0 dominates each m 1 X S . It shows that S = { m 0 } is a MIL strong I n -pair DS. Therefore, β ( G ) = min { Q ( m ) | m X } .  □

4. Application: Recognition of Companies Participating in Illegal Drug Trade

Graph theory has expanded greatly as a result of a wide variety of applications in optimization combinatorial issues, chemistry, physics and other fields. In this section, we describe a real-world application of VIGs.
Currently, the illegal drug trade is seen as a high-risk, high-reward dirty industry. It is estimated that arms, medicine, drugs, alcohol and tobacco are the five largest illegal businesses in the world. The drug trade is a big business that generates billions of dollars in illegal income. Criminals mostly design many creative methods of illegal drug transportation, focusing on buying and selling. It is hard to find hidden ways to enforce the law, so the police must be aware of the latest illegal trends. For the drug trading market, we can use VIG to highlight the safest path chosen by the dangerous international networks of illegal drug trade between two companies and can also announce its removal, which reduces the safety of that route.
Consider how many companies in the world take part illegal drug trade, which is a major threat to humans, in the following series: X = { C 1 , C 2 , C 3 , C 4 , C 5 , C 6 } (see in Figure 6). VIG Q defined on set X is presented in Table 2.
In Table 2, Q t shows law enforcement efforts of the company for illegal drug trade, Q f indicates the involvement of the company in organized illegal drug trade, and the neutral approach of the company to illegal drug trade can be considered as a degree of indeterminacy. We define VIG Z in Table 3. An element of VIG Z represents illegal drug trade between those two companies.
In Table 3, Z t shows the rate of illegal drug trade between companies, and Z f shows the rate of the world’s negative effect for that illegal drug trade.
Consider that R t ( C 1 , C 1 C 5 ) and R f ( C 1 , C 1 C 5 ) represent the degree of safety and degree of risk for illegal drug trade, respectively, to use C 1 as a source company, relationship on C 1 C 5 and arrive at destination company C 5 . Similarly, the MV and non-MV of the other pairs of VIG are shown in Table 4.
The interesting thing is that there are multiple I n -paths between every two vertices. Consider, we are finding the I n -paths from C 1 to C 3 , thus all possible C 1 C 3 C 4 are as follows:
  • P 1 : C 1 , ( C 1 , C 1 C 5 ) , C 1 C 5 , ( C 5 , C 1 C 5 ) , C 5 , ( C 5 , C 2 C 3 ) , C 2 C 3 , ( C 3 , C 2 C 3 ) , C 3 , ( C 3 , C 3 C 4 ) , C 3 C 4 .
  • P 2 : C 1 , ( C 1 , C 1 C 2 ) , C 1 C 2 , ( C 2 , C 1 C 2 ) , C 2 , ( C 2 , C 3 C 4 ) , C 3 C 4 .
  • P 3 : C 1 , ( C 1 , C 1 C 2 ) , C 1 C 2 , ( C 2 , C 1 C 2 ) , C 2 , ( C 2 , C 2 C 3 ) , C 2 C 3 , ( C 3 , C 2 C 3 ) , C 3 , ( C 3 , C 3 C 4 ) , C 3 C 4 .
  • P 4 : C 1 , ( C 1 , C 1 C 5 ) , C 1 C 5 , ( C 5 , C 1 C 5 ) , C 5 , ( C 5 , C 4 C 5 ) , C 4 C 5 , ( C 4 , C 4 C 5 ) , C 4 , ( C 4 , C 3 C 4 ) , C 3 C 4 , .
  • P 5 : C 1 , ( C 1 , C 1 C 6 ) , C 1 C 6 , ( C 6 , C 1 C 6 ) , C 6 , ( C 6 , C 5 C 6 ) , C 5 C 6 , ( C 5 , C 5 C 6 ) , C 5 , ( C 5 , C 2 C 3 ) , C 2 C 3 , ( C 3 , C 2 C 3 ) , C 3 , ( C 3 , C 3 C 4 ) , C 3 C 4 .
  • P 6 : C 1 , ( C 1 , C 1 C 6 ) , C 1 C 6 , ( C 6 , C 1 C 6 ) , C 6 , ( C 6 , C 5 C 6 ) , C 5 C 6 , ( C 5 , C 5 C 6 ) , C 5 , ( C 5 , C 4 C 5 ) , C 4 C 5 , ( C 4 , C 4 C 5 ) , C 4 , ( C 4 , C 3 C 4 ) , C 3 C 4 .
The I n strengths of these I n -pairs are given by
IP ( P 1 ) = ( 0.1 , 0.7 ) , IP ( P 2 ) = ( 0.2 , 0.7 ) , IP ( P 3 ) = ( 0.2 , 0.7 ) ,
IP ( P 4 ) = ( 0.1 , 0.7 ) , IP ( P 5 ) = ( 0.1 , 0.7 ) , IP ( P 6 ) = ( 0.1 , 0.7 ) .
The t- I n strength and f- I n strength of connectedness are given by
C O N N G t ( C 1 , C 3 C 4 ) = max { IP t ( P 1 , P 2 , P 3 , P 4 , P 5 , P 6 ) } = 0.2
C O N N G f ( C 1 , C 3 C 4 ) = min { IP f ( P 1 , P 2 , P 3 , P 4 , P 5 , P 6 ) } = 0.7
C O N N G ( C 1 , C 3 C 4 ) = ( C O N N G t ( C 1 , C 3 C 4 ) , C O N N G f ( C 1 , C 3 C 4 ) ) = ( 0.2 , 0.7 )
Here, we consider that if the connection between companies is reduced, the amount of illegal drug trade will decrease. Let us remove ( C 3 , C 2 C 3 ) and ( C 1 , C 1 C 2 ) of VIG G , as shown in Figure 7. Then, C O N N G ( C 3 , C 2 C 3 ) ( C 1 , C 3 C 4 ) = ( 0.1 , 0.7 ) . Therefore, the removal of ( C 3 , C 2 C 3 ) and ( C 1 , C 1 C 2 ) decreases the safety of the path.

Comparative Analysis

We want to eliminate the safest route through which the dangerous international drug trade networks between two companies conduct their interactions. Therefore, we need to check this application with the VIG graph. In this section, we considered six companies ( C 1 , C 2 , C 3 , C 4 , C 5 , C 6 ) that have the most illegal interactions with each other and that these companies have caused an increase in illegal drug trade due to their interactions with each other. Each of the paths shows the rate of illegal drug trade between companies and rate of the world’s negative effect for that illegal drug trade. Here, we consider that if the connection between companies is reduced, the amount of illegal drug trade will be reduced. First, we chose two companies C 1 and C 3 . There are several routes between these two companies that we are finding in the I n -paths from C 1 to C 3 . Then, we obtained the I n strength and strength of connectedness. By removing the route that had the most power of penetration and connection between the two companies, the safety of the route decreased, so by reducing the interactions between the companies, the amount of illegal drug trade can be prevented.

5. Conclusions

A VG, an extension of the basic notion of an FG, can be employed to deal with deeper aspects of uncertainty and imprecision for which the use of FGs would not fully succeed. VIGs are efficient tools for studying different computational intelligence and computer science domains. In this paper, we introduced the notion of domination in VIGs using a strong I n -pair. The concepts of the MI strong I n -pair DS and MI strong fuzzy I n -pair domination number are described for a VIG. The attributes of several specific values are given, including the I n -cut vertex, I n -bridges, I n -CPs, strong I n -pair with their mutual relationship in the VIGs, and some results are presented. Due to unforeseen circumstances, there is an area for broad theoretical and practical level interpretations of these subjects. In the future, we intend to broaden the scope of our research to include topological indices and the notion of energy in VIGs. There is a scope for extensive theoretical and practical-level analysis of these topics.

Author Contributions

X.S., R.C. and A.A.T.; methodology, R.C., M.M. and X.S.; validation, R.C. and A.A.T.; formal analysis, X.S., M.M. and C.L.; investigation, M.M., A.A.T., R.C. and C.L.; data curation, A.A.T., R.C. and X.S.; writing—original draft preparation, X.S. and A.A.T.; writing—review and editing, R.C., A.A.T., M.M. and C.L.; visualization, M.M., X.S. and R.C.; supervision, R.C. and C.L.; project administration, X.S. and A.A.T.; funding acquisition, X.S. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the National Key R and D Program of China (Grant 2019YFA0706402), and the National Natural Science Foundation of China under Grant 62172302, 62072129 and 61876047.

Data Availability Statement

Data are contained within the article.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Zadeh, L.A. Fuzzy set. Inf. Control 1965, 8, 338–353. [Google Scholar] [CrossRef]
  2. Rosenfeld, A. Fuzzy graphs. In Fuzzy Sets and Their Applications to Cognitive and Decision Processes; Elsevier: Amsterdam, The Netherlands, 1975; pp. 77–95. [Google Scholar]
  3. Kaufmann, A. Introduction a la Theorie des Sour-Ensembles Flous; Masson et Cie: Paris, France, 1973; Volume 1. [Google Scholar]
  4. Bhutani, K.R.; Rosenfeld, A. Strong arcs in fuzzy graphs. Inf. Sci. 2003, 152, 319–322. [Google Scholar] [CrossRef]
  5. Gau, W.M.L.; Buehrer, D.J. Vague sets. IEEE Trans. Syst. Man Cybern. 1993, 23, 610–614. [Google Scholar] [CrossRef]
  6. Ramakrishna, N. Vague graphs. Int. J. Cognit. Comput. 2009, 7, 51–58. [Google Scholar]
  7. Kosari, S.; Rap, Y.; Jiang, H.; Liu, X.; Wu, P.; Shao, Z. Vague graph structure with application in medical diagnosis. Symmetry 2020, 12, 1582. [Google Scholar] [CrossRef]
  8. Kou, Z.; Kosari, S.; Akhoundi, M. A Novel Description on Vague Graph with Application in Transportation Systems. Mathematics 2021, 11, 4800499. [Google Scholar] [CrossRef]
  9. Shao, Z.; Kosari, S.; Shoaib, M.; Rashmanlou, H. Certain Concepts of vague graphs with Applications to Medical diagnosis. Front. Phys. 2020, 8, 357. [Google Scholar] [CrossRef]
  10. Qiang, X.; Akhoundi, M.; Kou, Z.; Liu, X.; Kosari, S. Novel Concepts of Domination in Vague Graphs with Application in Medicine. Math. Probl. Eng. 2021, 10, 6121454. [Google Scholar] [CrossRef]
  11. Shao, Z.; Kosari, S.; Rashmanlou, H.; Shoaib, M. New concepts in intuitionistic fuzzy graph with application in water supplier systems. Mathematics 2020, 8, 1441. [Google Scholar] [CrossRef]
  12. Shi, X.; Kosari, S.; Talebi, A.A.; Sadati, S.H.; Rashmanlou, H. investigation of the main energies of picture fuzzy graph and its applications. Int. J. Comput. Intell. Syst. 2022, 15, 31. [Google Scholar] [CrossRef]
  13. Rao, Y.; Kosari, S.; Anitha, J.; Rajasingh, I.; Rashmanlou, H. Forcing parameters in fully connected cubic networks. Mathematics 2022, 10, 1263. [Google Scholar] [CrossRef]
  14. Selvam, A.; Ponnappan, C.Y. Domination in join of fuzzy graphs using strong arcs. Mater. Today Proc. 2021, 37, 67–70. [Google Scholar] [CrossRef]
  15. Nazeer, I.; Rashid, T.; Hussain, M.T.; GGuirao, J.L. Domination in Join of Fuzzy incidence Graphs Using Strong Pairs with Application in Trading System of Different Countries. Symmetry 2021, 13, 1279. [Google Scholar] [CrossRef]
  16. Manjusha, O.T.; Sunitha, M.S. Notes on domination in fuzzy graphs. J. Intell. Fuzzy Syst. 2014, 27, 3205–3212. [Google Scholar] [CrossRef]
  17. Manjusha, O.T.; Sunitha, M.S. Strong domination in fuzzy graphs. Fuzzy Inf. Eng. 2015, 7, 369–377. [Google Scholar] [CrossRef]
  18. Manjusha, O.T.; Sunitha, M.S. Total domination in fuzzy graphs using strong arcs. Ann. Pure Appl. Math. 2014, 9, 23–33. [Google Scholar]
  19. Dinesh, T. Fuzzy incidence graph-an introduction. Adv. Fuzzy Sets Syst. 2016, 21, 33–48. [Google Scholar] [CrossRef]
  20. Mathew, S.; Mordeson, J.N. Fuzzy end nodes in fuzzy incidence graphs. New Math. Nat. Comput. 2017, 13, 13–20. [Google Scholar]
  21. Mathew, S.; Mordeson, J.N. New Mathematics and Natural Computation. Fuzzy Influ. Graphs 2017, 13, 311–325. [Google Scholar]
  22. Natarajan, C.; Ayyaswamy, S.K. On strong (weak) domination in fuzzy graphs. Int. J. Math. Comput. Sci. 2010, 4, 1035–1037. [Google Scholar]
  23. Shi, X.; Kosari, S. Certain properties of domination in product vague graphs with an application in medicine. Front. Phys. 2021, 9, 680634. [Google Scholar] [CrossRef]
  24. Akram, M.; Dudek, W.A.; Murtaza Yousof, M. Regularity in vague intersection graphs and vague line graphs. Abstr. Appl. Anal. 2014, 10, 525389. [Google Scholar] [CrossRef]
  25. Akram, M.; Gani, A.N.; Saeid, A.B. Vague hypergraphs. J. Intell. Fuzzy Syst. 2014, 26, 647–653. [Google Scholar] [CrossRef]
  26. Borzooei, R.; Rashmanlou, H. Domination in vague graphs and its applications. J. Intell. Fuzzy Syst. 2015, 29, 1933–1940. [Google Scholar] [CrossRef]
  27. Banitalebi, S.; Borzooei, R.; Mohammaszadeh, A.E. 2-Domination in vague graphs. Algebr. Struct. Their Appl. 2021, 8, 203–222. [Google Scholar]
  28. Rao, Y.; Cai, R.; Talebi, A.A.; Mojahedfar, M. Some Properties of Double Domination in Vague Graphs with an Application. Symmetry 2023, 15, 1003. [Google Scholar] [CrossRef]
  29. Talebi, A.A.; Rashmanlou, H.; Sadati, S.H. New Concecpts on m-Polar interval-valued intuitionistic Fuzzy Graph. TWMS J. Appl. Eng. Math. 2020, 10, 806–818. [Google Scholar]
  30. Rashmanlou, H.; Borzooei, R.A. New concepts of interval-valued intuitionistic (S, T)-fuzzy graphs. J. Intell. Fuzzy Syst. 2016, 30, 1893–1901. [Google Scholar] [CrossRef]
  31. Rehman, F.U.; Hussain, M.T.; Rashid, T. Strong pair domination number in intuitionistic fuzzy influence graphs with application for the selection of hospital having the optimal medical facilities. Expert Syst. Appl. 2024, 238, 122169. [Google Scholar] [CrossRef]
  32. Poulik, S.; Ghorai, G.; Xin, Q. Explication of crossroads order based on Randic index of graph with fuzzy information. Soft Comput. 2024, 28, 1851–1864. [Google Scholar] [CrossRef]
  33. Shi, X.; Akhoundi, M.; Talebi, A.A.; Mojahedfar, M. A Study on Regular Domination in Vague Graphs with Application. Hindawi Adv. Math. Phys. 2023, 2023, 7098134. [Google Scholar] [CrossRef]
  34. Bondy, J.A.; Murty, U.S.R. Graph Theory with Application; Macmillan: London, UK, 1976; pp. 12–21. ISBN 0-444-19451-7. [Google Scholar]
Figure 1. An I n -FG G .
Figure 1. An I n -FG G .
Axioms 13 00150 g001
Figure 2. A VIG G .
Figure 2. A VIG G .
Axioms 13 00150 g002
Figure 3. A VIG G with cut vertex a 0 .
Figure 3. A VIG G with cut vertex a 0 .
Axioms 13 00150 g003
Figure 4. VIG G .
Figure 4. VIG G .
Axioms 13 00150 g004
Figure 5. A complete VIG G .
Figure 5. A complete VIG G .
Axioms 13 00150 g005
Figure 6. A VIG G .
Figure 6. A VIG G .
Axioms 13 00150 g006
Figure 7. A VIG G .
Figure 7. A VIG G .
Axioms 13 00150 g007
Table 1. VIG R .
Table 1. VIG R .
R MV and Non-MV of Pairs
( m 1 , m 1 m 2 ) (0.2, 0.6)
( m 3 , m 1 m 3 ) (0.3, 0.6)
( m 2 , m 1 m 2 ) (0.2, 0.6)
( m 1 , m 1 m 3 ) (0.3, 0.6)
( m 2 , m 2 m 3 ) (0.2, 0.5)
( m 1 , m 2 m 3 ) (0.2, 0.6)
( m 3 , m 2 m 2 ) (0.2, 0.5)
( m 1 , m 3 m 4 ) (0.2, 0.6)
( m 3 , m 3 m 4 ) (0.2, 0.4)
( m 2 , m 1 m 4 ) (0.2, 0.6)
( m 4 , m 3 m 4 ) (0.2, 0.4)
( m 2 , m 3 m 4 ) (0.2, 0.5)
( m 1 , m 1 m 4 ) (0.2, 0.6)
( m 4 , m 1 m 2 ) (0.2, 0.6)
( m 4 , m 1 m 4 ) (0.2, 0.6)
( m 4 , m 2 m 3 ) (0.2, 0.5)
( m 2 , m 2 m 4 ) (0.2, 0.5)
( m 3 , m 1 m 2 ) (0.2, 0.6)
( m 4 , m 2 m 4 ) (0.2, 0.5)
( m 3 , m 1 m 4 ) (0.2, 0.6)
Table 2. VIG Q on set X.
Table 2. VIG Q on set X.
CompanyLaw Enforcement Efforts of the Country for Illegal Drug TradeInvolvement of the Country in Organized Illegal Drug Trade
C 1 0.40.5
C 2 0.30.5
C 3 0.40.6
C 4 0.30.4
C 5 0.20.3
C 6 0.10.2
Table 3. VIG Z on set E.
Table 3. VIG Z on set E.
Z Rate of Illegal Drug TradeNegative Effect
C 1 C 2 0.30.5
C 2 C 3 0.30.6
C 3 C 4 0.30.6
C 4 C 5 0.20.4
C 5 C 1 0.20.5
C 1 C 6 0.10.5
C 5 C 6 0.10.3
Table 4. VIG R on set K.
Table 4. VIG R on set K.
R Degree of SafetyDegree of Risk
( C 1 , C 1 C 2 ) 0.20.6
( C 2 , C 1 C 2 ) 0.20.6
( C 2 , C 2 C 3 ) 0.20.7
( C 3 , C 2 C 3 ) 0.20.7
( C 3 , C 3 C 4 ) 0.20.7
( C 4 , C 3 C 4 ) 0.20.7
( C 4 , C 4 C 5 ) 0.10.5
( C 5 , C 4 C 5 ) 0.10.5
( C 5 , C 5 C 1 ) 0.10.6
( C 1 , C 1 C 5 ) 0.10.6
( C 2 , C 3 C 4 ) 0.20.7
( C 3 , C 4 C 5 ) 0.20.7
( C 5 , C 2 C 3 ) 0.10.6
( C 1 , C 1 C 6 ) 0.10.5
( C 6 , C 1 C 6 ) 0.10.5
( C 5 , C 5 C 6 ) 0.10.4
( C 6 , C 5 C 6 ) 0.10.4
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Shi, X.; Cai, R.; Talebi, A.A.; Mojahedfar, M.; Liu, C. A Novel Domination in Vague Influence Graphs with an Application. Axioms 2024, 13, 150. https://doi.org/10.3390/axioms13030150

AMA Style

Shi X, Cai R, Talebi AA, Mojahedfar M, Liu C. A Novel Domination in Vague Influence Graphs with an Application. Axioms. 2024; 13(3):150. https://doi.org/10.3390/axioms13030150

Chicago/Turabian Style

Shi, Xiaolong, Ruiqi Cai, Ali Asghar Talebi, Masomeh Mojahedfar, and Chanjuan Liu. 2024. "A Novel Domination in Vague Influence Graphs with an Application" Axioms 13, no. 3: 150. https://doi.org/10.3390/axioms13030150

APA Style

Shi, X., Cai, R., Talebi, A. A., Mojahedfar, M., & Liu, C. (2024). A Novel Domination in Vague Influence Graphs with an Application. Axioms, 13(3), 150. https://doi.org/10.3390/axioms13030150

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop