{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T16:39:40Z","timestamp":1740155980025,"version":"3.37.3"},"reference-count":44,"publisher":"Wiley","license":[{"start":{"date-parts":[[2024,4,18]],"date-time":"2024-04-18T00:00:00Z","timestamp":1713398400000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100007613","name":"Majmaah University","doi-asserted-by":"publisher","award":["R-2024-1050"],"award-info":[{"award-number":["R-2024-1050"]}],"id":[{"id":"10.13039\/501100007613","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Advances in Operations Research"],"published-print":{"date-parts":[[2024,4,18]]},"abstract":"<jats:p>Let G\u2009=\u2009(V, E) be a connected, basic, and finite graph. A subset <jats:inline-formula><a:math xmlns:a=\"http:\/\/www.w3.org\/1998\/Math\/MathML\" id=\"M1\"><a:mi>T<\/a:mi><a:mo>=<\/a:mo><a:mfenced open=\"{\" close=\"}\" separators=\"|\"><a:mrow><a:msub><a:mrow><a:mi>u<\/a:mi><\/a:mrow><a:mrow><a:mn>1<\/a:mn><\/a:mrow><\/a:msub><a:mo>,<\/a:mo><a:msub><a:mrow><a:mi>u<\/a:mi><\/a:mrow><a:mrow><a:mn>2<\/a:mn><\/a:mrow><\/a:msub><a:mo>,<\/a:mo><a:mo>\u2026<\/a:mo><a:mo>,<\/a:mo><a:msub><a:mrow><a:mi>u<\/a:mi><\/a:mrow><a:mrow><a:mi>k<\/a:mi><\/a:mrow><\/a:msub><\/a:mrow><\/a:mfenced><\/a:math><\/jats:inline-formula> of V(G) is said to be a resolving set if for any y\u2009\u2208\u2009V(G), the code of y with regards to T, represented by <jats:inline-formula><f:math xmlns:f=\"http:\/\/www.w3.org\/1998\/Math\/MathML\" id=\"M2\"><f:msub><f:mrow><f:mi>C<\/f:mi><\/f:mrow><f:mrow><f:mi>T<\/f:mi><\/f:mrow><\/f:msub><f:mfenced open=\"(\" close=\")\" separators=\"|\"><f:mrow><f:mi>y<\/f:mi><\/f:mrow><\/f:mfenced><\/f:math><\/jats:inline-formula>, which is defined as <jats:inline-formula><k:math xmlns:k=\"http:\/\/www.w3.org\/1998\/Math\/MathML\" id=\"M3\"><k:msub><k:mrow><k:mi>C<\/k:mi><\/k:mrow><k:mrow><k:mi>T<\/k:mi><\/k:mrow><\/k:msub><k:mfenced open=\"(\" close=\")\" separators=\"|\"><k:mrow><k:mi>y<\/k:mi><\/k:mrow><\/k:mfenced><k:mo>=<\/k:mo><k:mi>d<\/k:mi><k:mfenced open=\"(\" close=\")\" separators=\"|\"><k:mrow><k:msub><k:mrow><k:mi>u<\/k:mi><\/k:mrow><k:mrow><k:mn>1<\/k:mn><\/k:mrow><\/k:msub><k:mo>,<\/k:mo><k:mi>y<\/k:mi><\/k:mrow><\/k:mfenced><k:mo>,<\/k:mo><k:mi>d<\/k:mi><k:mfenced open=\"(\" close=\")\" separators=\"|\"><k:mrow><k:msub><k:mrow><k:mi>u<\/k:mi><\/k:mrow><k:mrow><k:mn>2<\/k:mn><\/k:mrow><\/k:msub><k:mo>,<\/k:mo><k:mi>y<\/k:mi><\/k:mrow><\/k:mfenced><k:mo>,<\/k:mo><k:mo>\u2026<\/k:mo><k:mo>,<\/k:mo><k:mi>d<\/k:mi><k:mrow><k:mfenced open=\"(\" close=\")\" separators=\"|\"><k:mrow><k:msub><k:mrow><k:mi>u<\/k:mi><\/k:mrow><k:mrow><k:mi>k<\/k:mi><\/k:mrow><\/k:msub><k:mo>,<\/k:mo><k:mi>y<\/k:mi><\/k:mrow><\/k:mfenced><\/k:mrow><\/k:math><\/jats:inline-formula>, is different for various y. The dimension of G is the smallest cardinality of a resolving set and is denoted by dim(G). If, for any t\u2009 \u2208\u2009 V \u2013 S, there exists r\u2009\u2208\u2009S such that <jats:inline-formula><y:math xmlns:y=\"http:\/\/www.w3.org\/1998\/Math\/MathML\" id=\"M4\"><y:mfenced open=\"(\" close=\")\" separators=\"|\"><y:mrow><y:mi>S<\/y:mi><y:mo>\u2013<\/y:mo><y:mrow><y:mfenced open=\"{\" close=\"}\" separators=\"|\"><y:mrow><y:mi>r<\/y:mi><\/y:mrow><\/y:mfenced><\/y:mrow><\/y:mrow><\/y:mfenced><y:mo>\u222a<\/y:mo><y:mfenced open=\"{\" close=\"}\" separators=\"|\"><y:mrow><y:mi>t<\/y:mi><\/y:mrow><\/y:mfenced><\/y:math><\/jats:inline-formula> is a resolving set, then the resolving set S is secure. The secure metric dimension of \ud835\udc3a is the cardinal number of the minimum secure resolving set. Determining the secure metric dimension of any given graph is an NP-complete problem. In addition, there are several uses for the metric dimension in a variety of fields, including image processing, pattern recognition, network discovery and verification, geographic routing protocols, and combinatorial optimization. In this paper, we determine the secure metric dimension of special graphs such as a globe graph <jats:inline-formula><jb:math xmlns:jb=\"http:\/\/www.w3.org\/1998\/Math\/MathML\" id=\"M5\"><jb:mi>G<\/jb:mi><jb:msub><jb:mrow><jb:mi>l<\/jb:mi><\/jb:mrow><jb:mrow><jb:mi>n<\/jb:mi><\/jb:mrow><\/jb:msub><\/jb:math><\/jats:inline-formula>, flag graph <jats:inline-formula><lb:math xmlns:lb=\"http:\/\/www.w3.org\/1998\/Math\/MathML\" id=\"M6\"><lb:mi>F<\/lb:mi><lb:msub><lb:mrow><lb:mi>l<\/lb:mi><\/lb:mrow><lb:mrow><lb:mi>n<\/lb:mi><\/lb:mrow><\/lb:msub><\/lb:math><\/jats:inline-formula>, H- graph of path <jats:inline-formula><nb:math xmlns:nb=\"http:\/\/www.w3.org\/1998\/Math\/MathML\" id=\"M7\"><nb:msub><nb:mrow><nb:mi>P<\/nb:mi><\/nb:mrow><nb:mrow><nb:mi>n<\/nb:mi><\/nb:mrow><\/nb:msub><\/nb:math><\/jats:inline-formula>, a bistar graph <jats:inline-formula><pb:math xmlns:pb=\"http:\/\/www.w3.org\/1998\/Math\/MathML\" id=\"M8\"><pb:msubsup><pb:mrow><pb:mi>B<\/pb:mi><\/pb:mrow><pb:mrow><pb:mi>n<\/pb:mi><pb:mo>,<\/pb:mo><pb:mi>n<\/pb:mi><\/pb:mrow><pb:mrow><pb:mn>2<\/pb:mn><\/pb:mrow><\/pb:msubsup><\/pb:math><\/jats:inline-formula>, and tadpole graph <jats:inline-formula><rb:math xmlns:rb=\"http:\/\/www.w3.org\/1998\/Math\/MathML\" id=\"M9\"><rb:msub><rb:mrow><rb:mi>T<\/rb:mi><\/rb:mrow><rb:mrow><rb:mn>3<\/rb:mn><rb:mo>,<\/rb:mo><rb:mi>m<\/rb:mi><\/rb:mrow><\/rb:msub><\/rb:math><\/jats:inline-formula>. Finally, we derive the explicit formulas for the secure metric dimension of tadpole graph <jats:inline-formula><tb:math xmlns:tb=\"http:\/\/www.w3.org\/1998\/Math\/MathML\" id=\"M10\"><tb:msub><tb:mrow><tb:mi>T<\/tb:mi><\/tb:mrow><tb:mrow><tb:mi>n<\/tb:mi><tb:mo>,<\/tb:mo><tb:mi>m<\/tb:mi><\/tb:mrow><\/tb:msub><\/tb:math><\/jats:inline-formula>, subdivision of tadpole graph <jats:inline-formula><vb:math xmlns:vb=\"http:\/\/www.w3.org\/1998\/Math\/MathML\" id=\"M11\"><vb:mi>S<\/vb:mi><vb:mfenced open=\"(\" close=\")\" separators=\"|\"><vb:mrow><vb:msub><vb:mrow><vb:mi>T<\/vb:mi><\/vb:mrow><vb:mrow><vb:mn>3<\/vb:mn><vb:mo>,<\/vb:mo><vb:mi>m<\/vb:mi><\/vb:mrow><\/vb:msub><\/vb:mrow><\/vb:mfenced><\/vb:math><\/jats:inline-formula>, and subdivision of tadpole graph <jats:inline-formula><ac:math xmlns:ac=\"http:\/\/www.w3.org\/1998\/Math\/MathML\" id=\"M12\"><ac:mi>S<\/ac:mi><ac:mfenced open=\"(\" close=\")\" separators=\"|\"><ac:mrow><ac:msub><ac:mrow><ac:mi>T<\/ac:mi><\/ac:mrow><ac:mrow><ac:mi>n<\/ac:mi><ac:mo>,<\/ac:mo><ac:mi>m<\/ac:mi><\/ac:mrow><\/ac:msub><\/ac:mrow><\/ac:mfenced><\/ac:math><\/jats:inline-formula>.<\/jats:p>","DOI":"10.1155\/2024\/3084976","type":"journal-article","created":{"date-parts":[[2024,4,18]],"date-time":"2024-04-18T19:35:08Z","timestamp":1713468908000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["The Secure Metric Dimension of the Globe Graph and the Flag Graph"],"prefix":"10.1155","volume":"2024","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2050-5236","authenticated-orcid":true,"given":"Sultan","family":"Almotairi","sequence":"first","affiliation":[{"name":"Department of Computer Science, Faculty of College of Computer and Information Sciences, Majmaah University, Al Majmaah 11952, Saudi Arabia"}]},{"given":"Olayan","family":"Alharbi","sequence":"additional","affiliation":[{"name":"Department of Information Systems, College of Computer and Information Sciences, Majmaah University, Al Majmaah 11952, Saudi Arabia"}]},{"given":"Zaid","family":"Alzaid","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Faculty of Computer and Information Systems, Islamic University of Madinah, Madinah 42351, Saudi Arabia"}]},{"given":"Badr","family":"Almutairi","sequence":"additional","affiliation":[{"name":"Department of Information Technology, College of Computer Sciences and Information Technology College, Majmaah University, Al Majmaah 11952, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7009-6912","authenticated-orcid":true,"given":"Basma","family":"Mohamed","sequence":"additional","affiliation":[{"name":"Mathematics and Computer Science Department, Faculty of Science, Menoufia University, Shibin El Kom 32511, Egypt"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/s0166-218x(00)00198-0"},{"first-page":"549","article-title":"Leaves of trees","author":"P. J. Slater","key":"2"},{"issue":"4","key":"3","first-page":"445","article-title":"Dominating and reference sets in a graph","volume":"22","author":"P. J. Slater","year":"1988","journal-title":"Journal of Mathematical and Physical Sciences"},{"issue":"191-195","key":"4","first-page":"1","article-title":"On the metric dimension of a graph","volume":"2","author":"F. Harary","year":"1976","journal-title":"Ars combin"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1287\/moor.1030.0070"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.11648\/j.acm.20231201.12"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.32604\/iasc.2023.032930"},{"key":"8","first-page":"125","article-title":"The metric dimension of circulant graphs and Cayley hypergraphs","volume":"106","author":"A. Borchert","year":"2018","journal-title":"Utilitas Mathematica"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/access.2018.2883556"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2019.05.042"},{"issue":"3","key":"11","first-page":"2386","article-title":"The complement metric dimension of graphs and its operations","volume":"10","author":"L. Susilowati","year":"2019","journal-title":"International Journal of Civil Engineering & Technology"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1142\/s1793830921500105"},{"issue":"2","key":"13","first-page":"155","article-title":"On the metric dimension of corona product of graphs","volume":"52","author":"H. Iswadi","year":"2011","journal-title":"Far East Journal of Mathematical Sciences"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.11648\/j.acm.20231202.12"},{"issue":"2","key":"15","first-page":"201","article-title":"The local metric dimension of cyclic split graph","volume":"8","author":"J. A. Cynthia","year":"2014","journal-title":"Annals of Pure and Applied Mathematics"},{"issue":"3","key":"16","first-page":"417","article-title":"The metric dimension of the circulant graph C(n, \u00b1{1, 2, 3, 4})","volume":"69","author":"C. Grigorious","year":"2017","journal-title":"Australasian Journal Of Combinatorics"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1016\/j.ajmsc.2019.04.002"},{"key":"18","first-page":"87","article-title":"Secure domination, weak Roman domination and forbidden subgraphs","volume":"39","author":"E. J. Cockayne","year":"2003","journal-title":"Bulletin of the Institute of Combinatorics and its Applications"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.3390\/sym10100439"},{"key":"20","article-title":"The metric dimension of comb product graphs","volume":"10","author":"S. W. Saputro","year":"2013","journal-title":"Graph Theory Conference in Honor of Egawa\u2019s 60th Birthday, September"},{"key":"21","first-page":"33","article-title":"On the metric dimension of joins of two graphs","volume":"5","author":"A. T. Shahida","year":"2014","journal-title":"International Journal of Scientific Engineering and Research"},{"key":"22","unstructured":"KhullerS.RaghavachariB.RosenfeldA.Localization in Graphs1998College Park, MD, USAUniversity of Maryland at College ParkTechnical Report CS-TR-3326"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.5121\/jgraphoc.2015.7301"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.4504670"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.11648\/j.ijtam.20230901.11"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1016\/0734-189x(84)90051-3"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.20965\/jaciii.2020.p0003"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.5614\/ejgta.2014.2.2.5"},{"issue":"5","key":"29","first-page":"751","article-title":"An overview applications of graph theory in real field","volume":"2","author":"B. Mondal","year":"2017","journal-title":"International Journal of Scientific Research in Computer Science, Engineering and Information Technology"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.14445\/22315373\/ijmtt-v47p521"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1016\/0166-218x(95)00106-2"},{"volume-title":"Computers and Intractability: A Guide to the Theory of Np-Completeness","year":"1997","author":"M. R. Garey","key":"32"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2008.09.021"},{"key":"34","first-page":"185","article-title":"Application of dominating sets in wireless sensor networks","volume":"7","author":"A. H. Karbasi","year":"2013","journal-title":"International Journal of Security and Its Applications"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.3390\/sym15030708"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1142\/s1793557123501942"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.11648\/j.mlr.20230801.12"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.32604\/iasc.2023.031947"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1007\/s40840-019-00816-7"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1142\/s179383092250152x"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1016\/j.aml.2011.09.008"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1007\/s00214-023-02985-y"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.52846\/ami.v50i1.1644"},{"first-page":"950","article-title":"VEA-bility security metric: a network security analysis tool","author":"M. Tupper","key":"44"}],"container-title":["Advances in Operations Research"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/aor\/2024\/3084976.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/aor\/2024\/3084976.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/aor\/2024\/3084976.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,18]],"date-time":"2024-04-18T19:35:29Z","timestamp":1713468929000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/aor\/2024\/3084976\/"}},"subtitle":[],"editor":[{"given":"Bikash Koli","family":"Dey","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2024,4,18]]},"references-count":44,"alternative-id":["3084976","3084976"],"URL":"https:\/\/doi.org\/10.1155\/2024\/3084976","relation":{},"ISSN":["1687-9155","1687-9147"],"issn-type":[{"type":"electronic","value":"1687-9155"},{"type":"print","value":"1687-9147"}],"subject":[],"published":{"date-parts":[[2024,4,18]]}}}