2012
DOI: 10.7494/opmath.2012.32.4.715
|View full text |Cite
|
Sign up to set email alerts
|

A note on the independent Roman domination in unicyclic graphs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
9
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 15 publications
(9 citation statements)
references
References 5 publications
0
9
0
Order By: Relevance
“…Since at least two elements from V ∪ E are required to dominate any five consecutive vertices on a path, and these two elements dominate at most 5 consecutive edges, it is straightforward to check that γ * R (P n ) is at least 2 n 5 + i if n ≡ i (mod 5) for i ∈ {0, 1, 2, 4} and is at least 2 n 5 + 2 if n ≡ 3 (mod 5). Simplifying, we have that γ * R (P n ) is bounded below by 4n−2 5 + 1 if n ≡ 4 (mod 5) and 4n−2 5 , otherwise.…”
Section: Proposition 10 For a Non-trivial P N mentioning
confidence: 98%
See 1 more Smart Citation
“…Since at least two elements from V ∪ E are required to dominate any five consecutive vertices on a path, and these two elements dominate at most 5 consecutive edges, it is straightforward to check that γ * R (P n ) is at least 2 n 5 + i if n ≡ i (mod 5) for i ∈ {0, 1, 2, 4} and is at least 2 n 5 + 2 if n ≡ 3 (mod 5). Simplifying, we have that γ * R (P n ) is bounded below by 4n−2 5 + 1 if n ≡ 4 (mod 5) and 4n−2 5 , otherwise.…”
Section: Proposition 10 For a Non-trivial P N mentioning
confidence: 98%
“…Roman domination was introduced by Cockayne et al [8] in 2004 and was inspired by the work of ReVelle and Rosing [15] and Stewart [16]. Since this introduction, Roman domination and its variations have been studied in the literature, see for example [1,[4][5][6]9,13].…”
Section: Introductionmentioning
confidence: 99%
“…1g is an independent set. The independent Roman domination number i R (G) is the minimum weight of an IRDF on G. The concept of independent Roman dominating function was first defined by Cockayne et al in [8] and has been studied by several authors [7,19].…”
Section: Introductionmentioning
confidence: 99%
“…Dominating theory provides a fancy tool to satisfy the safe requirements of many applications in security environments. The finite model would like to be controlled by lowest cost and energy [9]- [15], [17]. These types of networks are modeled as graphs.…”
Section: Introductionmentioning
confidence: 99%