Skip to main content
Advertisement
Browse Subject Areas
?

Click through the PLOS taxonomy to find articles in your field.

For more information about PLOS Subject Areas, click here.

  • Loading metrics

Cyclic connectivity index of fuzzy incidence graphs with applications in the highway system of different cities to minimize road accidents and in a network of different computers

  • Irfan Nazeer ,

    Roles Conceptualization, Data curation, Formal analysis, Funding acquisition, Investigation, Methodology, Writing – original draft, Writing – review & editing

    irfannazir779@gmail.com

    Affiliation Department of Mathematics, University of Management and Technology, Lahore, Pakistan

  • Tabasam Rashid,

    Roles Conceptualization, Formal analysis, Investigation, Project administration, Resources, Supervision, Validation, Visualization, Writing – review & editing

    Affiliation Department of Mathematics, University of Management and Technology, Lahore, Pakistan

  • Muhammad Tanveer Hussain

    Roles Conceptualization, Formal analysis, Investigation, Project administration, Supervision, Validation, Visualization

    Affiliation Department of Mathematics, University of Management and Technology, Lahore, Pakistan

Abstract

A parameter is a numerical factor whose values help us to identify a system. Connectivity parameters are essential in the analysis of connectivity of various kinds of networks. In graphs, the strength of a cycle is always one. But, in a fuzzy incidence graph (FIG), the strengths of cycles may vary even for a given pair of vertices. Cyclic reachability is an attribute that decides the overall connectedness of any network. In graph the cycle connectivity (CC) from vertex a to vertex b and from vertex b to vertex a is always one. In fuzzy graph (FG) the CC from vertex a to vertex b and from vertex b to vertex a is always same. But if someone is interested in finding CC from vertex a to an edge ab, then graphs and FGs cannot answer this question. Therefore, in this research article, we proposed the idea of CC for FIG. Because in FIG, we can find CC from vertex a to vertex b and also from vertex a to an edge ab. Also, we proposed the idea of CC of fuzzy incidence cycles (FICs) and complete fuzzy incidence graphs (CFIGs). The fuzzy incidence cyclic cut-vertex, fuzzy incidence cyclic bridge, and fuzzy incidence cyclic cut pair are established. A condition for CFIG to have fuzzy incidence cyclic cut-vertex is examined. Cyclic connectivity index and average cyclic connectivity index of FIG are also investigated. Three different types of vertices, such as cyclic connectivity increasing vertex, cyclically neutral vertex and, cyclic connectivity decreasing vertex, are also defined. The real-life applications of CC of FIG in a highway system of different cities to minimize road accidents and a computer network to find the best computers among all other computers are also provided.

1 Introduction

Graphs are convenient tools to explain associations between different types of entities under examination. Vertices or nodes denote entities, and edges or arcs explain the vertices’ connections. A mathematical structure to describe unpredictability and equivocacy in daily life circumstances was first addressed by Zadeh. He presented the perception of the fuzzy set (FS) [1]. He aimed to develop a mathematical theory to tackle unreliability and inexactness. The major difference between sets and FSs is that the sets classified the universal set (US) into two values: members and non-members. On the other hand, FS designates a sequence of membership values to elements of the US from [0, 1] closed interval. Also, FSs are beneficial to learn about quality variables, including reasoning, prettiness, uniformity, etc. There is a deficiency in describing the entities and their association, and we need to draw a FG model. Rosenfeld [2] was the first who proposed the crucial idea of FGs after the revolutionary work of Zadeh’s on FSs.

FGs can be expressed as the strength of relationships between objects. The study of FGs plays an essential role for many students as well as mathematicians to take part in this field, such as Bhutani and Rosenfeld [3] suggested the notion of geodesics in FGs. An arc of a fuzzy graph is called strong if its weight is at least as great as the strength of connectedness of its end nodes when it is deleted; this idea was provided by Bhutani and Rosenfeld [4]. The notion of fuzzy end nodes in FGs was presented by Bhutani and Rosenfeld [5]. Gani and Ahamad [6] presented a way to compute different types of degrees, order, and size of FGs and compare the relationship among degree, order, and size of FGs. Bhutani et al. [7] explained degrees of end nodes and cut-nodes in FGs. Al-Hawary [8] described different kinds of operations on FGs. Moreover, he introduced and studied the notion of balanced FG and gave necessary and sufficient conditions for the preceding products of two fuzzy balanced graphs to be balanced. Al-Hawary and Horani [9] provided three new products on product FGs and gave sufficient conditions for each one of them to be strong. They also discussed balanced and co-balanced product FGs. Al-Hawary [10] investigated several classes of FGs and provided two new operations on FGs, such as parallel connection and series connection. He also showed that parallel connection and series connection of balanced FGs need not be balanced. Woznaik et al. [11] presented electronic modules, infrastructure, and fuzzy rules control model with implemented software for new generation home environment. Zielonka et al. [12] presented IoT convection installation for a small house with the developed remote platform control system. Connectivity analysis of cyclically balanced FGs was a fascinating idea provided by Jicy, and Mathew [13]. Binu et al. [14, 15] gave the idea to calculate the connectivity index and Wiener index of a FG and its applications to human trafficking and illegal immigration networks, respectively. The concept of CC of a FG, CC of fuzzy trees, fuzzy cycles, and complete FGs was examined by Mathew and Sunitha [16]. They also initiated the idea of cyclic cut nodes and cyclic bridges in FGs. Mathew and Sunitha [17] provided the concept of node-strength sequence, fuzzy node connectivity, and fuzzy arc connectivity. They also furnished a new clustering technique based on fuzzy arc connectivity. The criterion for connectivity of a FG and the structure of the complement of a fuzzy cycle was investigated by Narayan and Sunitha [18]. Bipolar FGs, various methods of their construction, the idea of isomorphism of bipolar FGs, and some of their key properties were proposed by Akram [19]. Akram and Alshehri [20] proposed an idea of intuitionistic fuzzy cycles and intuitionistic fuzzy trees. Depending on the strength of an arc, Mathew and Sunitha [21] classified arcs of a FG into three different types, namely α-strong, β-strong, and δ-arc. Mathew and Sunitha [22] initiated the idea of the strongest strong cycle and θ-FGs. Different kinds of operations, including Cartesian product, composition, union, and join in FGs, were given by Mordeson and Chang-Shyh [23]. Fuzzy tolerance, fuzzy tolerance graph, fuzzy bounded tolerance graph, fuzzy interval containment graph and regular representation of fuzzy tolerance graph, fuzzy unit tolerance graph, and proper tolerance graph were discussed by Samanta and Pal [24]. A fuzzy planar graph is a very important subclass of FG that was presented by Samanta and Pal [25]. Mordeson and Nair [26] brought the idea of fuzzy hypergraphs. Three kinds of operations, including direct product, semi-strong product, and strong product for interval-valued FGs was provided by Rashmanlou, and Jun [27]. Sunitha and Vijayakumar [28] defined complement of a FG. Mordeson and Nair [29] introduced and examined the concepts of chords, twigs, 1-chains with boundary zero, cycle vectors, coboundary, and cocycles for FGs. They have also shown that although the set of cycle vectors, fuzzy cycle vectors, cocycles, and fuzzy cocycles do not necessarily form vector spaces over the field Z2 of integers modulo 2, they nearly do. Later on, different mathematicians participated in the development of graphs and FGs. Their achievements can be seen in [3035].

There is a flaw in FGs because they do not give any clue of the impact of a vertex on edge. This lack of FGs become the fundamental cause to establish the scheme of FIG. The proposal of FIGs was first initiated by Dinesh [36]. For example, in a highway system, if vertices represent various cites and edges serve as highways, introducing the degree of connection between city L and the highway LM joining cities L and M permits a profound analysis of the highway system. This connection could be the ramp system joining L and LM. We indicate this relationship by the ordered pair (L, LM). Malik et al. [37] applied FIGs in different types of applications. Mathew and Mordeson [38] proposed the idea of cut pairs and fuzzy incidence trees in FIGs. They also discussed some vital properties of FIGs. Three different types of nodes, including fuzzy incidence connectivity enhancing node, fuzzy incidence connectivity reducing node, and fuzzy incidence connectivity neutral node in FIGs was introduced by Fang et al. [39]. Like node and edge connectivity in graphs, Mathew et al. [40] discussed these concepts for FIGs. Mordeson and Mathew [41] developed fuzzy end nodes and fuzzy incidence cut vertices in FIGs. Nazeer et al. [42] presented the idea of intuitionistic fuzzy incidence graphs (IFIGs) as a generalization of FIGs along with their certain properties. They introduced a variety of operations in IFIGs. They also provided a fascinating application of the product of IFIGs. The idea of order, size, domination, strong fuzzy incidence domination, and weak fuzzy incidence domination in FIGs was proposed by Nazeer et al. [43]. Nazeer and Rashid [44] presented the idea of picture FIGs. They introduced picture fuzzy cut-vertices, picture fuzzy bridges, picture fuzzy incidence cut pairs, and picture fuzzy incidence cut-vertices. More extensive and comprehensive work on FIGs, can be seen [4548].

Connectivity parameters are connectivity measures of any system. In graphs, the connectivity between any two vertices is 1, and in FGs, it is from closed interval [0, 1]. There are certain motives to propose the concept of CC in FIGs. Firstly, in FGs, we can only compute the CC from vertex l to vertex m and from vertex m to the vertex l but if someone is interested in examining the CC from vertex l to an edge lm, then FGs are not enough to answer this question. Therefore, we propose the concept of CC in FIGs because FIGs permit us to find the CC from vertex l to an edge lm due to the presence of an incidence pair in FIGs. Secondly, in FIGs, the CC from vertex l to an edge lm and vertex m to an edge lm may or may not be the same. Thirdly, we cannot apply graphs and FGs to the applications of the highway systems of different cities and networks of different computers provided in Section 5 due to the non-availability of the influence of a vertex on and edge. Fourthly, the objective to introduce these ideas to FIGs is that Mathew and Sunitha [16] initiated the notion of CC in FGs. Later, Binu et al. [49] initiated an idea of cyclic connectivity index (CCI) and average cyclic connectivity index (ACCI) of FGs. We extended their work for FIGs. This paper establishes CC, CCI and ACCI of FIGs.

The other part of this article is constructed as follows. Section 2 consists of some introductory outcomes essential to comprehend the remaining portion of the article. CC, fuzzy incidence cyclic cut-vertex (FICCV), fuzzy incidence cyclic bridge (FICB) and fuzzy incidence cyclic cut pair (FICCP) of FIG are explained in Section 3. The formula to determine CCI, the way to manipulate ACCI of FIG, and three different types of vertices, namely, cyclic connectivity increasing vertex (CCIV), cyclically neutral vertex (CNV), and cyclic connectivity decreasing vertex (CCDV) are described in Section 4. The real-life applications of CC of a FIG in a highway system of different cities to reduce road accidents and a computer network to find the best computers sharing the maximum amount of data among all other computers are discussed in Section 5. A comparative analysis of our study with the existing study is provided in Section 6. Section 7 carries some conclusions and future directions.

2 Preliminaries

This section carries some elementary and rudimentary definitions and results of FIGs. These will be useful to understand the contents of the article. ∧ indicates the minimum operator, and ∨ denotes the maximum operator in this article.

Definition 1. [41] A fuzzy subset (FSS) of a set is a function of the set into the closed interval [0, 1]. A FG on (V, E) is a pair (σ, τ), where σ is a FSS of V and τ is a FSS of E such that for every l, mV, τ(lm) ≤ σ(l) ∧ σ(m).

Definition 2. [41, Definition 2.1] Let G = (V, E, I), where IV × E. Then G is called an incidence graph (IG).

Definition 3. [41] Let G = (V, E, I) be an IG. A sequence of distinct vertices P1: k0, (k0, k0 k1), k0 k1, (k1, k0 k1), k1, …, kn−1, (kn−1, kn−1 kn), kn−1 kn, (kn, kn−1 kn), kn is called an incidence path and vertices k0 and kn are said to be connected. The incidence strength (Is) of P1 is defined as η(k0, k0 k1) ∧ η(k1, k0 k1) ∧ … ∧ η(kn−1, kn−1 kn) and is expressed by . A sequence P2: k0, (k0, k0 k1), k0 k1, (k1, k0 k1), k1, …, kn−1, (kn−1, kn−1 kn), kn−1 kn, (kn, kn−1 kn), kn, (kn, kn kn+1), kn kn+1 is another incidence path between k0 and kn kn+1. The Is of P2 is defined as η(k0, k0 k1) ∧ η(k1, k0 k1) ∧ … ∧ η(kn, kn kn+1). Let l, mVE. We define to be the Is of the strongest path from l to m.

Definition 4. [41, Definition 2.9] Let G = (σ, τ), where σ is a FSS of V and τ is a FSS of E. If η is a fuzzy incidence of G, then is said to be a FIG.

Example 1. In Fig 1 a FIG is shown with σ* = {a, b, c, d, e, f} and σ(a) = 0.5, σ(b) = 0.6, σ(c) = 0.9, σ(d) = 0.3, σ(e) = 0.5, σ(f) = 0.4τ(ab) = 0.4, τ(ac) = 0.4, τ(bc) = 0.6, τ(cd) = 0.3, τ(de) = 0.2, τ(ef) = 0.2; η(a, ab) = 0.3, η(b, ab) = 0.4, η(a, ac) = 0.03, η(c, ac) = 0.05, η(b, bc) = 0.5, η(c, bc) = 0.3, η(c, cd) = 0.2, η(d, cd) = 0.1, η(d, de) = 0.07, η(e, de) = 0.05, η(e, ef) = 0, η(f, ef) = 0. There are two possible incidence paths from vertex a to d namely, P1: a, (a, ab), ab, (b, ab), b, (b, bc), bc, (c, bc), c, (c, cd), cd, (d, cd), d and P2: a, (a, ac), ac, (c, ac), c, (c, cd), cd, (d, cd), d with . Similarly, and the strength of the strongest path from a to d is .

Definition 5. [38] Any lV is said to be in the support of σ (Supp(σ)) if σ(l) > 0, lmE is said to be in the support of τ (Supp(τ)) if τ(lm) > 0 and (l, lm) ∈ V × E is said to be in the support of η (Supp(η)) if η(l, lm) > 0. The σ*, τ* and η* are indicating the support of σ, τ and η respectively. Any edge lm is an edge of the FIG if lmτ*. Similarly, any (l, lm) is a incidence pair (Ip) of if (l, lm) ∈ η*.

Definition 6. [41, Definition 2.11] Let be a FIG. Then an IG is known as partial fuzzy incidence subgraph (PFISG) of if ισ, κτ and . is named as fuzzy incidence subgraph (FISG) of if ι = σ, κ = τ and .

Definition 7. [38, Definition 3] If (σ*, τ*, η*) is a cycle then the FIG is a cycle. If (σ*, τ*, η*) is a cycle anda single lmτ* such that τ(lm) = ∧{τ(uv)|uvτ*} then the FIG is a fuzzy cycle. The FIG is a fuzzy incidence cycle (FIC), anda single (l, lm) ∈ η* such that η(l, lm) = ∧{η(u, uv)|(u, uv) ∈ η*}.

Definition 8. [38, Definition 7] Consider a FIG . Then an Ip (l, lm) is said to be a strong incidence pair if where indicates the maximum incidence strength of llm. Particularly, it is said to be if and if . A pair is said to be if it is either or .

Definition 9. [38, Definition 8] Consider a FIG . If then (l, lm) is called δ-incidence pair (δIPr).

Proposition 1. [38, Proposition 1] Each FIC is a strong cycle.

Definition 10. [38] If η(l, lm) = σ(l) ∧ τ(lm) for each (l, lm) ∈ η* then a FIG is named as a CFIG.

Proposition 2. [38, Proposition 9] A CFIG has no δIPr.

3 Cycle connectivity of fuzzy incidence graphs

In this section, we present the novel idea of connectivity named as CC of a FIG. The CC of any FIG is denoted by Ω. The idea of Ω of a FIC is also illuminated. It is also proved that the Ω of a FIC is equal to the Is of . We have also introduced three innovative ideas, namely FICCV, FICB, and FICCP. On deleting the FICCV, FICB, and FICCP from the FIG, there will be an effect in the connectivity and Ω of a FIG. For easiness, in the coming sections, we will take σ(a) = 1 for every aσ* unless otherwise specifies.

Definition 11. Assume is a FIC. The Is of FIC is the lowest η value of all Ip in it.

Definition 12. Let be a FIG. Then for any two vertices l and m of , there associated a set say ν(l, m) named the νestimation of l and m and is defined as ν(l, m) = {χ: χ ∈ (0, 1]} where χ is the Is of a FIC passing through l and m.

Definition 13. Consider a FIG . Then Ω between l and m is defined as ∨{χ: χν(l, m)|l, mσ*} and it is indicated by .

Remark 1. If ν(l, m) = ∅ for some pair of vertices l and m, then .

Example 2. In Fig 2 a FIG is shown with σ* = {a, b, c, d} and τ(ab) = 0.7, τ(ac) = 0.3, τ(ad) = 0.3, τ(bc) = 0.3, τ(cd) = 0.9; η(a, ab) = 0.6, η(b, ab) = 0.5, η(a, ac) = 0.2, η(c, ac) = 0.2, η(a, ad) = 0.2, η(d, ad) = 0.2, η(b, bc) = 0.3, η(c, bc) = 0.2, η(c, cd) = 0.9, η(d, cd) = 0.8 a FIG. Here in , abca, abcda and adca are all FICs. There are three FICs passing through a and c comprising, abca, adca and abcda with Is = ∧{η(a, ab) = 0.6, η(b, ab) = 0.5, η(b, bc) = 0.3, η(c, bc) = 0.2, η(c, ac) = 0.2, η(a, ac) = 0.2} = 0.2; = ∧{η(a, ad) = 0.2, η(d, ad) = 0.2, η(d, cd) = 0.8, η(c, cd) = 0.9, η(c, ac) = 0.2, η(a, ac) = 0.2} = 0.2; = ∧{η(a, ab) = 0.6, η(b, ab) = 0.5, η(b, bc) = 0.3, η(c, bc) = 0.2, η(c, cd) = 0.9, η(d, cd) = 0.8, η(d, ad) = 0.2, η(a, ad) = 0.2} = 0.2, respectively. Thus ν(a, c) = ∨{0.2, 0.2, 0.2} = 0.2, this implies that .

Definition 14. Let be a FIG. Then the Ω of is defined as

That is Ω of a FIG is defined as the largest Ω of different pairs of vertices of .

Example 3. Assume is a FIG given in Fig 2 with σ* = {a, b, c, d} and τ(ab) = 0.7, τ(ac) = 0.3, τ(ad) = 0.3, τ(bc) = 0.3, τ(cd) = 0.9; η(a, ab) = 0.6, η(b, ab) = 0.5, η(a, ac) = 0.2, η(c, ac) = 0.2, η(a, ad) = 0.2, η(d, ad) = 0.2, η(b, bc) = 0.3, η(c, bc) = 0.2, η(c, cd) = 0.9, η(d, cd) = 0.8. Then and . Hence .

Next, we will propose a fascinating result related to FIC in the form of a proposition. We can easily calculate the Ω of any FIC by just applying this result. This proposition will help us to save time and energy. Also, this will be helpful to avoid very long calculations.

Proposition 3. The Ω of a FIC is the Is of .

Proof. It follows by Proposition 1 that each Ip is a in a FIC. Therefore, the Ω of a FIC is the Is of .

Now, we are going to introduce an actual result in the form of a theorem. With the help of this theorem, we will be able to compute Ω of any CFIG. By applying this theorem, we do not have to need to do complicated calculations. We have to use the theorem and get the required result.

Theorem 2. Let be a CFIG with vertices h1, h2, …, hn such that σ(hi) = ji and j1j2 ≤ …jn−2jn−1jn with τ(xy) = σ(x) ∧ σ(y) for each x, yσ*. Then .

Proof. Suppose the conditions of the Theorem. Since any three vertices of are adjacent because is a CFIG also any three vertices are in 3 vertices FIC. Since is a CFIG, by Proposition 2 all Ip are in CFIG. Therefore, to calculate the smallest Is of FIC in , it is enough to calculate the smallest Is of every 3 vertices FIC in . Since is a CFIG therefore to examine a 4 vertices FIC, C = abcda in (it is notable that the case is same for n vertices FIC) there will be parts of two 3 vertices FIC in C, namely C1 = abca and C2 = acda. Let the Is(C) = j. For all Ip (x, xy) in C, η(x, xy) ≥ j. Particularly, η(a, ab) ≥ j and η(b, bc) ≥ j. Since is a CFIG, then by Proposition 2, does not have any δIPr. This means η(a, ac) ≥ ∧{η(a, ab), η(b, bc)} ≥ j. Thus η(a, ac) ≥ j.

Consider, η(a, ac) = j, then Is(C1) = Is(C2) = Is(C) = j. Suppose η(a, ac) > j, since Is(C) = j then either C1 or C2 will have Is equal to j. Now, Is(C) = ∧{Is(C1), Is(C2)}. Thus the Is of a 4 vertices FIC is same as the Is of a 3 vertices FIC in . From all 3 vertices FIC, the 3 vertices FIC devised by three vertices with largest vertices strength will have the greatest strength. Therefore, the FIC C = hn−2, (hn−2, hn−2 hn−1), hn−2 hn−1, (hn−1, hn−2 hn−1), hn−1, (hn−1, hn−1 hn), hn−1 hn, (hn, hn−1 hn), hn, (hn, hn hn−2), hn hn−2, (hn−2, hn hn−2), hn−2 is a FIC with largest Is in . Also Is of C = jn−2jn−1jn = jn−2. Hence .

Example 4. Assume is a CFIG as shown in Fig 3 with σ* = {a, b, c, d} and τ(ab) = 0.3, τ(ac) = 0.3, τ(ad) = 0.3, τ(bc) = 0.5, τ(bd) = 0.5, τ(cd) = 0.7; η(a, ab) = 0.3, η(b, ab) = 0.3, η(a, ac) = 0.3, η(c, ac) = 0.3, η(a, ad) = 0.3, η(d, ad) = 0.3, η(b, bc) = 0.5, η(c, bc) = 0.5, η(b, bd) = 0.5, η(d, bd) = 0.5, η(c, cd) = 0.7, η(d, cd) = 0.7. Then and . Hence . Theorem 2 is verified.

Definition 15. A vertex l in a FIG s said to be a FICCV if

Definition 16. An edge (l, m) in a FIG is said to be a FICB if

Definition 17. A pair (l, lm) in a FIG is said to be a FICCP if

Definition 18. A FIG is called cyclically balanced if is without FICCV, FICB and FICCP.

Example 5. Assume is a FIG as provided in Fig 4 with σ* = {a, b, c, d, e, f} and τ(ab) = 0.2, τ(ac) = 0.2, τ(af) = 0.5, τ(bc) = 0.3, τ(cd) = 0.1, τ(ce) = 0.1, τ(de) = 0.2, τ(ef) = 0.1; η(a, ab) = 0.07, η(b, ab) = 0.15, η(a, ac) = 0.07, η(c, ac) = 0.1, η(a, af) = 0.4, η(f, af) = 0.3, η(c, cd) = 0.1, η(d, cd) = 0.09, η(c, ce) = 0.06, η(e, ce) = 0.1, η(d, de) = 0.06, η(e, de) = 0.2, η(e, ef) = 0.06, η(f, ef) = 0.1. Now, and . Hence . Since . Therefore, a, b and c are FICCV. In the same way, therefore edges (a, b), (a, c) and (b, c) re FICBs. Similarly, (a, ab), (b, ab), (a, ac), (c, ac), (b, bc) and (c, bc) are FICCPs.

Proposition 4. If an edge (l, m) in a FIG is an FICB, then both the vertices l and m are FICCVs.

Proof. Let be a FIG and (l, m) be a FICB in . Then by definition of FICB, . Hence and . This implies that both vertices l and m are FICCVs.

Now, we are going to establish a handy result for CFIG. With the help of this result, we can easily find the FICCV in any CFIG.

Theorem 3. Let be a CFIG with |σ*| ≥ 4. Let h1, h2, …, hnσ* and σ(hi) = ki for i = 1, 2, …, n, and k1k2 ≤ … ≤ kn. Then has a FICCV if and only if kn−3 < kn−2.

Proof. Let h1, h2, …, hnσ* and σ(hi) = ki for i = 1, 2, …, n, and k1k2 ≤ … ≤ kn. Assume that has a FICCV say l. Then by definition of FICCV, . That is l belongs to a distinctive FIC C. Suppose Is of FIC, C = λ > Is of C′ for any other FIC, C′ in . Since k1k2 ≤ … ≤ kn, it means that the Is of the FIC hn−2 hn−1 hn−3 is λ. Hence l ∈ {hn−2, hn−1, hn−3}.

To show that kn−3 < kn−2. Assume that kn−3 = kn−2. Then C1 = hn hn−1 hn−2 and C2 = hn hn−1 hn−3 have the equal Is, and hence the deleting of hn−2, hn−1 or hn−3 will not lessen . This contradiction shows that kn−3 < kn−2.

Conversely, assume that kn−3 < kn−2. Now, we have to show that has a FICCV. Since kn−2kn−1 ≤ … ≤ kn and kn−3 < kn−2, all FICs of have Is less than that of Is of hn−2 hn−1 hn−3. Hence the removal of hn−1, hn−2 or hn−3 will become the cause of reduction of therefore, has a FICCV.

4 Average cyclic connectivity index of fuzzy incidence graph

Now, we are going to initiate a new idea of CCI and ACCI of a FIG. The CCI of any FIG is denoted by ΩI. In this section, we formulate the formula to compute the ΩI of a FIG. It is also shown that ΩI of any PFISG is always ≤ to ΩI of any strong fuzzy incidence graph (SFIG) . A lower and upper bound of ΩI of a CFIG is also provided.

Definition 19. In a FIG , the ΩI is defined as where is the Ω between vertices l and m in .

Example 6. Fig 5 is indicating the FIG with σ* = {a, b, c, d, e, f, g} and τ(ab) = 0.2, τ(ac) = 0.2, τ(af) = 0.5, τ(ag) = 0.2, τ(bc) = 0.3, τ(cd) = 0.1, τ(ce) = 0.1, τ(cg) = 0.2, τ(de) = 0.2, τ(ef) = 0.1, τ(fg) = 0.2; η(a, ab) = 0.07, η(b, ab) = 0.15, η(a, ac) = 0.07, η(c, ac) = 0.1, η(a, af) = 0.4, η(f, af) = 0.3, η(a, ag) = 0.2, η(g, ag) = 0.3, η(b, bc) = 0.3, η(c, bc) = 0.2, η(c, cd) = 0.1, η(d, cd) = 0.09, η(c, ce) = 0.06, η(e, ce) = 0.1, η(c, cg) = 0.01, η(g, cg) = 0.01, η(d, de) = 0.06, η(e, de) = 0.2, η(e, ef) = 0.06, η(f, ef) = 0.1, η(f, fg) = 0.03, η(g, fg) = 0.03. Thus by computing, and . Hence .

Remark 4. Assume is a FIG with vertex set t. Then .

Definition 20. A FIG is called SFIG if each of its Ip is a .

Proposition 5. Let be a SFIG. Then PFISG of , .

Proof. Assume is a SFIG and let be a PFISG of . Let l, mι*. Then by the definition of PFISG ι(l) ≤ σ(l) and ν-estimation of l and m fulfills the relation . This implies and

Hence,

Example 7. Assume is a PFISG shown in Fig 6 of FIG provided in Fig 5 with ι* = {a, b, c, f, g} and τ(ab) = 0.2, τ(af) = 0.5, τ(ag) = 0.2, τ(bc) = 0.3, τ(cg) = 0.2, τ(gf) = 0.2; η(a, ab) = 0.07, η(b, ab) = 0.15, η(a, af) = 0.4, η(f, af) = 0.3, η(a, ag) = 0.2, η(g, ag) = 0.3, η(b, bc) = 0.3, η(c, bc) = 0.2, η(c, cg) = 0.01, η(g, cg) = 0.01, η(g, gf) = 0.03, η(f, gf) = 0.03. Now, and . Hence .

Proposition 6. In any FIG , , where l is a FICCV of .

Proof. Consider that l is a FICCV of . Consequently deletion of l will lessen . Also . If , then the statement is true otherwise it is not true. On the contrary, if , then for each mσ*∖{l}. This means l is not a part of any FIC in but this is impossible because l is a FICCV of . Hence we may come to an end that now this implies .

Now, we are going to discuss lower and upper bounds of ΩI of a CFIG. For this, we have presented two fundamental theorems. With the help of these theorems, we can quickly know about the ΩI of a CFIG.

Theorem 5. Assume is a CFIG having |σ*| = n ≥ 3, σ(hi) = ki for i = 1, 2, …, n and 0 < σ(hi) < 1. Then .

Proof. Since is a CFIG with |σ*| = n ≥ 3 therefore by Proposition 2 does not have any δIPr. This means all Ip in are and according to Proposition 1 each FIC is a strong FIC in . Suppose l and m are any two vertices of then we have to calculate Is of all FICs contain vertices l and m. After this, we have to compute Ω which is the maximum value of Is of all FICs containing pair of vertices l and m. Similarly, we have to compute Ω up to n (total number of vertices) and take the minimum value of all Ω of the CFIG . It is clear that can never be exceed the maximum membership value of all the vertices by definition of . Also, multiplication of all Ω to the membership values of the corresponding vertices and addition of all these Ω of the graph provide the less than ∨{σ(hi)}. This implies that .

Example 8. Assume is a CFIG as given in Fig 7 with σ* = {a, b, c, d, e} and σ(a) = 0.2, σ(b) = 0.05, σ(c) = 0.09, σ(d) = 0.3, σ(e) = 0.01; τ(ab) = 0.03, τ(ac) = 0.03, τ(ad) = 0.03, τ(ae) = 0.01, τ(bc) = 0.04, τ(bd) = 0.04, τ(be) = 0.01, τ(cd) = 0.07, τ(ce) = 0.01, τ(de) = 0.01; η(a, ab) = 0.03, η(b, ab) = 0.03, η(a, ac) = 0.03, η(c, ac) = 0.03, η(a, ad) = 0.03, η(d, ad) = 0.03, η(a, ae) = 0.01, η(e, ae) = 0.01, η(b, bc) = 0.04, η(c, bc) = 0.04, η(b, bd) = 0.04, η(d, bd) = 0.04, η(b, be) = 0.01, η(e, be) = 0.01η(c, cd) = 0.07, η(d, cd) = 0.07, η(c, ce) = 0.01, η(e, ce) = 0.01, η(d, de) = 0.01, η(e, de)0.01. Then .

Theorem 6. Let be a CFIG having |σ*| = n ≥ 3, σ(hi) = ki for i = 1, 2, …, n. Then

Proof. By given statement of theorem. is a CFIG with |σ*| = n ≥ 3 therefore Proposition 2 yields that will be without any δIPr. This means all Ip in are and as stated in Proposition 1 every FIC is a strong FIC in . Suppose l and m are any two vertices of then we have to calculate Is of all FICs contain vertices l and m. After this, we have to compute Ω which is the maximum value of Is of all FICs containing pair of vertices l and m. Similarly, we have to compute Ω up to n (total number of vertices) and take the minimum value of all Ω of the CFIG . Also, the total number of edges for a CFIG is always equal to . Since therefore, can never be exceed than the . This implies, (1)

Now, by definition of it can be seen that will always remains less than or equal to the . This means (2)

Hence from Eqs (1) and (2) it can be concluded that

Example 9. A CFIG is shown in Fig 7 with σ* = {a, b, c, d, e} and σ(a) = 0.2, σ(b) = 0.05, σ(c) = 0.09, σ(d) = 0.3, σ(e) = 0.01; τ(ab) = 0.03, τ(ac) = 0.03, τ(ad) = 0.03, τ(ae) = 0.01, τ(bc) = 0.04, τ(bd) = 0.04, τ(be) = 0.01, τ(cd) = 0.07, τ(ce) = 0.01, τ(de) = 0.01; η(a, ab) = 0.03, η(b, ab) = 0.03, η(a, ac) = 0.03, η(c, ac) = 0.03, η(a, ad) = 0.03, η(d, ad) = 0.03, η(a, ae) = 0.01, η(e, ae) = 0.01, η(b, bc) = 0.04, η(c, bc) = 0.04, η(b, bd) = 0.04, η(d, bd) = 0.04, η(b, be) = 0.01, η(e, be) = 0.01η(c, cd) = 0.07, η(d, cd) = 0.07, η(c, ce) = 0.01, η(e, ce) = 0.01, η(d, de) = 0.01, η(e, de)0.01. Then .

Here, we are going to present a very foundational concept of ACCI of a FIG. In enormous networks, the sturdy flow among different vertices is mandatory to sustain trustability and devotedness. To guarantee the firmness of the exchange of data in the complete or portion of the network, measuring the average value of the cyclic data exchange is vital. Therefore, we discuss the ACCI of a FIG. The ACCI of any FIG is denoted by ΩAI. Also, we define three different types of vertices.

Definition 21. Assume a FIG . Then the ΩAI is defined by where t is the number of vertices in .

Definition 22. Consider a FIG . Then a vertex y is known as CCIV if . If , then y is said to be CNV. If then y is named as CCDV.

In a FIG an isolated vertex is always a CNV.

Example 10. In Fig 8 a FIG is provided with σ* = {a, b, c, d} and τ(ab) = 0.7, τ(ad) = 0.3, τ(bc) = 0.2, τ(bd) = 0.3, τ(cd) = 0.2; η(a, ab) = 0.5, η(b, ab) = 0.6, η(a, ad) = 0.07, η(d, ad) = 0.05, η(b, bc) = 0.2, η(c, bc) = 0.1, η(b, bd) = 0.2, η(d, bd) = 0.05, η(c, cd) = 0.03, η(d, cd) = 0.03. There are three FICs in namely, C1: a, b, d, a, C2: b, c, d, c and C3: a, b, c, d, a with Is are 0.05, 0.03 and 0.03 respectively. Now, and . Therefore, . Also . Also after calculation , and . Now, a, b and d are CCDV and c is a CCIV.

Now, we are going to present an essential proposition. With the help of this proposition, we will be able to find CNV, CCIV, and CCDV of FIG.

Proposition 7. Let be a FIG havingσ*∣ = t ≥ 3 and assume xσ*. Let and . Then x is said to be a CNV if and only if s = r, x is named as CCIV if and only if r < s and x is called CCDV if and only if r > s.

Proof. Consider a FIG having ∣σ*∣ = t ≥ 3 and consider xσ*. Suppose that x is a CCIV, then by definition of CCIV, the . Clearly, and also we have . Thus, . If and , then r < s. Converse part is trivial. Therefore, x is CCIV if and only if r < s. Remaining cases may be proved in a similar way.

5 Real-life applications of cycle connectivity

In daily life, Ω has various uses. Here, we have proposed two critical real-life applications of Ω of FIGs. In the first application, we have taken a highway system of different cities and apply the idea of Ω of FIG to find the roads which are becoming the leading cause of maximum accidents. In the second application, we have taken a network of different computers sharing data. We have applied the idea of Ω to the network of different computers and find which computer/computers are transferring the maximum amount of data to other computers.

5.1 Application of cycle connectivity in highway system

Due to the huge traffic on roads, the percentage of accidents is increasing day by day. To minimize these accidents government should take some serious steps to lessen the percentage of road accidents. Here, we are presenting a graphical model of FIG to tackle this problem. This can be done by calculating the Ω between each pair of vertices of FIG. The roads having a maximum Ω are the roads of maximum traffic flow and become a source of the highest road accidents. Government can work on these roads by making speed breakers, speed bumps and deploying more traffic wardens to minimize road accidents. Here, we include an application of Ω of FIG in a highway system of different cities. As an explanatory case, consider a network of FIG consisting of eight vertices expressing different cities c1, c2, c3, c4, c5, c6, c7 and c8, edges are indicating the roads joining these cities and Ip are expressing flow of traffic from one city to another city. For example, an Ip (c1, c1 c2) is showing the flow of traffic from city c1 to city c2 and an Ip (c2, c1 c2) is proclaiming the flow of traffic from city c2 to city c1 through road c1 c2. The membership value (MSV) of the edges is showing the traffic flow (bikes, cars, vehicles, heavy vehicles) among different cities and the MSV of (c1, c1 c2) is specifying the flow of traffic from city c1 to city c2 and the MSV of (c2, c1 c2) is proclaiming the flow of traffic from city c2 to city c1 through road c1 c2.

Assume is a FIG as shown in Fig 9 representing a highway system with σ* = {c1, c2, c3, c4, c5, c6, c7, c8} and τ(c1 c2) = 0.7, τ(c1 c8) = 0.9, τ(c2 c3) = 0.3, τ(c2 c8) = 0.7, τ(c3 c4) = 0.6, τ(c3 c6) = 0.5, τ(c4 c5) = 0.5, τ(c5 c6) = 0.8, τ(c6 c7) = 0.8, τ(c7 c8) = 0.3; η(c1, c1 c2) = 0.5, η(c2, c1 c2) = 0.7, η(c1, c1 c8) = 0.5, η(c8, c1 c8) = 0.9, η(c2, c2 c3) = 0.2, η(c3, c2 c3) = 0.25, η(c2, c2 c8) = 0.3, η(c8, c2 c8) = 0.3, η(c3, c3 c4) = 0.2, η(c4, c3 c4) = 0.4, η(c3, c3 c6) = 0.1, η(c6, c3 c6) = 0.1, η(c4, c4 c5) = 0.5, η(c5, c4 c5) = 0.3, η(c5, c5 c6) = 0.6, η(c6, c5 c6) = 0.5, η(c6, c6 c7) = 0.8, η(c7, c6 c7) = 0.3, η(c7, c7 c8) = 0.3, η(c8, c7 c8) = 0.2. There are eight FICs in namely, C1: c1, c2, c8, c1, C2: c1, c2, c3, c6, c7, c8, c1, C3: c1, c2, c3, c4, c5, c6, c7, c8, c1, C4: c3, c4, c5, c6, c3, C5: c3, c4, c5, c6, c7, c8, c2, c3, C6: c3, c4, c5, c6, c7, c8, c1, c2, c3, C7: c3, c6, c7, c8, c2, c3, and C8: c3, c6, c7, c8, c1, c2, c3. Then and . Hence . Thus is representing that the roads joining cities c1 c2, c1 c8 and c2 c8 are the main roads which are becoming a main cause of highest percentage of road accidents. So, the government should focus on these roads by making more speed breakers, speed bumps and deploying more traffic wardens on these roads. In this way, they can minimize the percentage of road accidents.

We have used FIGs in our application. The FIGs are more instrumental and effective than graphs. We cannot use graphs to explain the above phenomenon because graphs do not show the impact of a vertex on an edge. Another thing, in graphs, the Ω between each pair of vertices is always equal to 1, and we are unable to find which roads are becoming the main cause of maximum road accidents, but in FIGs, the Ω between each pair of vertices will be different. Therefore, FIGs are more helpful and useful than graphs.

5.2 Application of cycle connectivity in a computer network

In a network of different computers, computers are sharing data with each other. We want to find which computer/computers are best in performance among all other computers and sharing maximum data with all other computers in a network. This can be done by computing Ω between each pair of computers in a network. The pair of computers which have a maximum Ω will be the required computers transferring maximum data to all other computers in a network. Here, we are presenting a graphical model of FIG to explain this phenomenon. As an example, assume a network of FIG comprising of eight vertices. The vertices are showing the eight distinct computers in a network. The MSV of the vertices is indicating data store in each of these computers, the MSV of the edges is demonstrating the total amount of data that can be transferred from one computer to another computer and the MSV of the Ip is representing the amount of data which one computer is transferring to another computer. For example, an Ip (a, ab) is indicating the transfer of data from computer a to computer b and an Ip (b, ab) is showing the transfer of data from computer b to computer a.

Let be a FIG as shown in Fig 10 representing a network of different computers with σ(a) = 0.5, σ(b) = 0.2, σ(c) = 0.7, σ(d) = 0.3, σ(e) = 0.05, σ(f) = 0.1, σ(g) = 1, σ(h) = 0.8; τ(ab) = 0.2, τ(ag) = 0.4, τ(ah) = 0.4, τ(bc) = 0.2, τ(bh) = 0.2, τ(cd) = 0.05, τ(ch) = 0.6, τ(de) = 0.04, τ(ef) = 0.04, τ(eh) = 0.04, τ(fg) = 0.06, τ(gh) = 0.5; η(a, ab) = 0.15, η(b, ab) = 0.1, η(a, ag) = 0.2, η(g, ag) = 0.3, η(a, ah) = 0.4, η(h, ah) = 0.2, η(b, bc) = 0.1, η(c, bc) = 0.2, η(b, bh) = 0.1, η(h, bh) = 0.1, η(c, cd) = 0.04, η(d, cd) = 0.05, η(c, ch) = 0.6, η(h, ch) = 0.5, η(d, de) = 0.04, η(e, de) = 0.04, η(e, ef) = 0.01, η(f, ef) = 0.01, η(e, eh) = 0.02, η(h, eh) = 0.02, η(f, fg) = 0.05, η(g, fg) = 0.06, η(g, gh) = 0.4, η(h, gh) = 0.5. Now, by computing Ω between each pair of vertices we get and . Thus is representing the maximum Ω between computers g and h. Therefore, computers g and h are best computers in performance among all other computers and sharing maximum data with all other computers in a network.

6 Comparative analysis

Here, we are going to compare our model with the existing model. In Fig 9 a FIG is indicating a highway system of eight different cities c1, c2, c3, c4, c5, c6, c7 and c8 in which the edges are indicating the roads joining these cities and Ip are expressing flow of traffic from one city to another city. For example, an Ip (c1, c1 c2) is showing the flow of traffic from city c1 to city c2 and an Ip (c2, c1 c2) is showing the flow of traffic from city c2 to city c1 through road c1 c2. The MSV of the edges is showing the traffic flow (bikes, cars, vehicles, heavy vehicles) among different cities and the MSV of (c1, c1 c2) is specifying the flow of traffic from city c1 to city c2 and (c2, c1 c2) is proclaiming the flow of traffic from city c2 to city c1 through road c1 c2. Now, if we assign MSVs to all the edges and all Ip of FIG provided in Fig 9 is equal to 1 we get a graph. In the case of graph the Ω between each pair of vertices is . Since in case of graph the Ω between each pair of vertices is equal to 1. Therefore, we are unable to find the roads which are becoming a main reason of maximum accidents. Hence our model is better than the previous one.

Similarly, in Fig 10 a FIG is representing a network of different computers. Computers are sharing data. We want to find which computer/computers are best in performance among all other computers and sharing maximum data with all other computers in a network. This can be done by computing Ω between each pair of computers in a network. The pair of computers which have a maximum Ω will be the required computers transferring maximum data to all other computers in a network. The vertices are showing the eight distinct computers in a network. The MSV of the vertices is indicating data store in each of these computers, the MSV of the edges is demonstrating the total amount of data that can be transferred from one computer to another computer and the MSV of the Ip is representing the amount of data which one computer is transferring to another computer. For example, an Ip (a, ab) is indicating the transfer of data from computer a to computer b and an Ip (b, ab) is showing the transfer of data from computer b to computer a.

Now, if we assign MSVs to all the edges and all Ip of the FIG shown in Fig 10 we get a graph. In the case of graph the Ω between each pair of vertices is and . Therefore, pervious model is not helpful to find which computer/computers are transferring maximum amount of data. Thus, our model is more effective and beneficial than the previous one.

7 Conclusion

In this article, we advanced the theory of FIGs. The notion of connectivity is indivisible from the theory of FIGs. There are a variety of parameters that command the connectivity of a network. In this article, the authors attempted to make up a new connectivity idea named as Ω, FICCV, FICB, and FICCP in FIGs. Ω of various FIG theoretic structures are examined. As the number of FICs grows, the cyclic accessibility from one vertex to another vertex enhances. This benefits to upgrading the trustability of any network. The formula to compute ΩI of any FIG is discussed with a variety of examples. The ΩI and ΩAI of FIGs are two frameworks associated with the cyclic accessibility of networks. ΩAI represents the average strength of the cyclic flow in a network. CCIV, CNV, and CCDV three different types of vertices are also introduced. The criterion to check CCIV, CNV, and CCDV is developed. An application of Ω of FIG in highway systems of different cities to reduce road accidents and in a computer network to find the best computers among all other computers in a network is also provided. A comparative analysis of our study with the existing study is also provided. More related ideas will be contemplated in the upcoming papers.

Acknowledgments

We are thankful to the reviewers for their valuable comments and suggestions to improve the quality of our manuscript.

References

  1. 1. Zadeh L. A. Fuzzy sets. Information and Control. 1965;8(3): 338–353.
  2. 2. Rosenfeld A. Fuzzy graphs. Fuzzy sets and their applications to cognitive and decision processes. Elsevier. 1975;77–95.
  3. 3. Bhutani K. R., Rosenfeld A. Geodesies in fuzzy graphs. Electronic Notes in Discrete Mathematics. 2003;15: 49–52.
  4. 4. Bhutani K. R., Rosenfeld A. Strong arcs in fuzzy graphs. Information Sciences. 2003;152: 319–322.
  5. 5. Bhutani K. R., Rosenfeld A. Fuzzy end nodes in fuzzy graphs. Information Sciences. 2003;152: 323–326.
  6. 6. Gani A. N., Ahamed M. B. Order and size in fuzzy graphs. Bulletin of Pure and Applied Sciences. 2003;22(1): 145–148.
  7. 7. Bhutani K. R., Mordeson J., Rosenfeld A. On degrees of end nodes and cut nodes in fuzzy graphs. Iranian Journal of Fuzzy Systems. 2004;1(1): 57–64.
  8. 8. Al-Hawary T. Complete fuzzy graphs. International Journal of Mathematical Combinatorics. 2011;4: 26–34.
  9. 9. Al-Hawary T., Horani B. On product fuzzy graphs. Annals of Fuzzy Mathematics and Informatics. 2016;12(2): 279–294.
  10. 10. Al-Hawary T. A. Certain classes of fuzzy graphs. European Journal of Pure and Applied Mathematics. 2017;10(3): 552–560.
  11. 11. Wozniak M., Zielonka A., Sikora A., Piran Md. J., Alamri A. 6G-Enabled IoT home environment control using fuzzy rules. IEEE Internet of Things Jouranl. 2021;8(7): 5442–5452.
  12. 12. Zielonka A., Sikora , Wozniak M., Wei W., Ke Q., Bai Z., et al. Intelligent internet of things system for smart home optimal convection. IEEE Transactions on Industrial Informatics. 2021;17(6): 4308–4317.
  13. 13. Jicy N., Mathew S. Connectivity analysis of cyclically balanced fuzzy graphs. Fuzzy Information and Engineering. 2015;7(2): 245–255.
  14. 14. Binu M., Mathew S., Mordeson J. N. Connectivity index of a fuzzy graph and its application to human trafficking. Fuzzy Sets and Systems. 2019;360: 117–136.
  15. 15. Binu M., Mathew S., Mordeson J. N. Wiener index of a fuzzy graph and application to illegal immigration networks. Fuzzy Sets and Systems. 2020;384: 132–147.
  16. 16. Mathew S., Sunitha M. Cycle connectivity in fuzzy graphs. Journal of Intelligent and Fuzzy Systems. 2013;24(3): 549–554.
  17. 17. Mathew S., Sunitha M. Node connectivity and arc connectivity in fuzzy graphs. Information Sciences. 2010;180: 519–531.
  18. 18. Narayan K. S., Sunitha M. Connectivity in a fuzzy graph and its complement. Gen. Math. Notes. 2012;9(1): 38–43.
  19. 19. Akram M. Bipolar fuzzy graphs. Information Sciences. 2011;181(24): 5548–5564.
  20. 20. Akram M., Alshehri N. Intuitionistic fuzzy cycles and intuitionistic fuzzy trees. The Scientific World Journal. 2014;1–11.
  21. 21. Mathew S., Sunitha M. Types of arcs in a fuzzy graph. Information Sciences. 2009;179(11): 1760–1768.
  22. 22. Mathew S., Sunitha M. Strongest Strong Cycles and θ-Fuzzy Graphs. IEEE Transactions on Fuzzy Systems. 2013;21(6): 1096–1104.
  23. 23. Mordeson J. N., Chang-Shyh P. Operations on fuzzy graphs. Information Sciences. 1994;79(3-4): 159–170.
  24. 24. Samanta S., Pal M. Fuzzy tolerance graphs. International Journal of Latest Trends in Mathematics. 2011;1(2): 57–67.
  25. 25. Samanta S., Pal M. Fuzzy planar graphs. IEEE Transactions on Fuzzy Systems. 2015;23(6): 1936–1942.
  26. 26. Mordeson J. N., Nair P. S. Fuzzy graphs and fuzzy hypergraphs, Physica. 2012;46.
  27. 27. Rashmanlou H., Jun Y. B. Complete interval-valued fuzzy graphs. Annals of Fuzzy Mathematics and Informatics. 2031;6(3): 677–687.
  28. 28. Sunitha M., Vijayakumar A. Complement of a fuzzy graph. Indian Journal of Pure and Applied Mathematics. 2002;33(9): 1451–1464.
  29. 29. Mordeson J. N., Nair P. S. Cycles and cocycles of fuzzy graphs. Information Sciences. 1996;90(1-4): 39–49.
  30. 30. Alon N., Yuster R., Zwick U. Finding and counting given length cycles. Algorithmica. 1997;17(3): 209–223.
  31. 31. Goyal S., Garg P., Mishra V. N. New composition of graphs and their Wiener indices. Applied Mathematics and Nonlinear Sciences. 2019;4(1): 175–180.
  32. 32. Jicy N., Mathew S. Some new connectivity parameters for weighted graphs. Journal of Uncertainty in Mathematics Science. 2014;1–9.
  33. 33. Liu D., Wang C., Wang Z. Hamilton-connectivity of interconnection networks modeled by a product of graphs. Applied Mathematics and Nonlinear Sciences. 2018;3(2): 419–426.
  34. 34. Mathew S., Sunitha M. Bonds in graphs and fuzzy graphs. Advances in Fuzzy Sets and Systems. 2010;6(2): 107–119.
  35. 35. Zadeh L. A. Is there a need for fuzzy logic? Information Sciences. 2008;178(13): 2751–2779.
  36. 36. Dinesh T. Fuzzy incidence graph-an introduction. Advances in Fuzzy Sets and Systems. 2016;21(1): 33.
  37. 37. Malik D. S., Mathew S., Mordeson J. N. Fuzzy incidence graphs: Applications to human trafficking. Information Sciences. 2018;447: 244–255.
  38. 38. Mathew S., Mordeson J. N. Connectivity concepts in fuzzy incidence graphs. Information Sciences. 2017;382: 326–333.
  39. 39. Fang J., Nazeer I., Rashid T., Liu J. B. Connectivity and Wiener index of fuzzy incidence graphs. Mathematical Problems in Engineering. 2021;Article ID 6682966, 1–7.
  40. 40. Mathew S., Mordeson J., Yang H. L. Incidence cuts and connectivity in fuzzy incidence graphs. Iranian Journal of Fuzzy Systems. 2019;16(2): 31–43.
  41. 41. Mordeson J. N., Mathew S. Fuzzy end nodes in fuzzy incidence graphs. New Mathematics and Natural Computation. 2017;13(01): 13–20.
  42. 42. Nazeer I., Rashid T., Keikha A. An application of product of intuitionistic fuzzy incidence graphs in textile industry. Complexity. 2021;Article ID 5541125: 1–16.
  43. 43. Nazeer I., Rashid T., Guirao J. L. G. Domination of fuzzy incidence graphs with the algorithm and application for the selection of a medical lab. Mathematical Problems in Engineering. 2021;Article ID 6682502: 1–11.
  44. 44. Nazeer I., Rashid T. Picture fuzzy incidence graphs with application. Punjab University Journal of Mathematics. 2021;53(7):435–458.
  45. 45. Akram M., Sayed S., Smarandache F. Neutrosophic incidence graphs with application. Axioms. 2018;7(3): 1–47.
  46. 46. Mordeson J. N., Mathew S., Borzooei R. A. Vulnerability and government response to human trafficking: vague fuzzy incidence graphs. New Mathematics and Natural Computation. 2018;14(02): 203–219.
  47. 47. Mordeson J. N., Mathew S., Malik D.S. Fuzzy Graph Theory with Applications to Human Trafficking. Springer. 2018;87–137.
  48. 48. Nazeer I., Rashid T., Hussain M. T., Guirao J. L. G. Domination in join of fuzzy incidence graphs using strong pairs with application in trading system of different countries. Symmetry. 2021;13(7): 1–15.
  49. 49. Binu M., S. Mathew, J. N. Mordeson. Cyclic connectivity index of fuzzy graphs. IEEE Transactions on Fuzzy Systems.