{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T17:10:14Z","timestamp":1760029814100,"version":"build-2065373602"},"reference-count":39,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2025,3,21]],"date-time":"2025-03-21T00:00:00Z","timestamp":1742515200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>Robustness in networks plays a vital role in mitigating the effects of failures caused by nodes or links, which can disrupt essential services. Among the various vulnerability parameters in graph theory, such as connectivity and integrity, their applications to fuzzy graphs remain underexplored, despite fuzzy graphs being a powerful tool for modeling uncertainty. In this paper, we introduce the parameter \u2019fuzzy node integrity\u2019, which considers both the number of disrupted elements and the strength of residual connections. We derive general formulas for different types of symmetric and asymmetric fuzzy graph structures, including cycle graphs, wheel graphs, and star graphs, to systematically demonstrate the utility of this parameter. The proposed parameter is then applied to a military logistics problem to gain insights into the identification of critical nodes and route optimization under uncertainty. This study bridges an important gap in fuzzy graph theory by redefining node integrity through the inclusion of connection strength, offering a promising tool for assessing network vulnerability. These findings lay the foundation not only for theoretical research but also for practical improvements in transportation, disaster management, and communication networks.<\/jats:p>","DOI":"10.3390\/sym17040474","type":"journal-article","created":{"date-parts":[[2025,3,21]],"date-time":"2025-03-21T07:25:00Z","timestamp":1742541900000},"page":"474","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A New Graph Vulnerability Parameter: Fuzzy Node Integrity"],"prefix":"10.3390","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0569-4147","authenticated-orcid":false,"given":"Ferhan Nihan","family":"Murater","sequence":"first","affiliation":[{"name":"Department of Mathematics, Manisa Celal Bayar University, Manisa 45140, Turkey"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6935-4841","authenticated-orcid":false,"given":"Goksen","family":"Bacak-Turan","sequence":"additional","affiliation":[{"name":"Department of Mathematics, Manisa Celal Bayar University, Manisa 45140, Turkey"}]}],"member":"1968","published-online":{"date-parts":[[2025,3,21]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Harary, F. (1969). Graph Theory, Addison-Wesley Publishing Company Inc.","DOI":"10.21236\/AD0705364"},{"key":"ref_2","first-page":"13","article-title":"Vulnerability in graphs\u2014a comparative survey","volume":"1","author":"Barefoot","year":"1987","journal-title":"J. Comb. Math. Comb. Comput."},{"key":"ref_3","unstructured":"Alavi, Y., and Allen, S. (1995). The tenacity of a graph. Graph Theory, Combinatorics, and Algorithms, Wiley."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1016\/0012-365X(73)90138-6","article-title":"Tough graphs and Hamiltonian circuits","volume":"5","year":"1973","journal-title":"Discret. Math."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"793","DOI":"10.1080\/00207160412331336062","article-title":"Rupture degree of a graph","volume":"82","author":"Li","year":"2005","journal-title":"Int. J. Comput. Math."},{"key":"ref_6","unstructured":"Rosenfeld, A. (1975). Fuzzy graphs. Fuzzy Sets and Their Applications to Cognitive and Decision Processes, Academic Press."},{"key":"ref_7","unstructured":"Yeh, R.T., and Bang, S.Y. (1975). Fuzzy relations, fuzzy graphs and their applications to clustering analysis. Fuzzy Sets and Their Applications to Cognitive and Decision Processes, Academic Press."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"338","DOI":"10.1016\/S0019-9958(65)90241-X","article-title":"Fuzzy sets","volume":"8","author":"Zadeh","year":"1965","journal-title":"Inf. Control"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"2169","DOI":"10.1007\/s12190-024-02046-y","article-title":"Cubic directed graphs with application","volume":"70","author":"Ahmad","year":"2024","journal-title":"J. Appl. Math. Comput."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"2425","DOI":"10.1007\/s00500-022-07795-1","article-title":"Domination in rough fuzzy digraphs with application","volume":"27","author":"Ahmad","year":"2023","journal-title":"Soft Comput."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1007\/s41066-024-00455-9","article-title":"Pythagorean fuzzy incidence graphs with application in one-way toll road network","volume":"9","author":"Muhammad","year":"2024","journal-title":"Granul. Comput."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"2073","DOI":"10.3233\/JIFS-210736","article-title":"Hyper-Wiener index for fuzzy graph and its application in share market","volume":"41","author":"Islam","year":"2021","journal-title":"J. Intell. Fuzzy Syst."},{"key":"ref_13","first-page":"119","article-title":"Second Zagreb index for fuzzy graphs and its application in mathematical chemistry","volume":"20","author":"Islam","year":"2023","journal-title":"Iran. J. Fuzzy Syst."},{"key":"ref_14","first-page":"920","article-title":"Hyper-connectivity index for fuzzy graph with application","volume":"13","author":"Islam","year":"2023","journal-title":"Twms J. Appl. Eng. Math."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1007\/s40010-023-00868-2","article-title":"Multiplicative version of first Zagreb index in fuzzy graph and its application in crime analysis","volume":"94","author":"Islam","year":"2024","journal-title":"Proc. Natl. Acad. Sci. India Sect. A Phys. Sci."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"2043","DOI":"10.1007\/s40747-022-00896-2","article-title":"An investigation of edge F-index on fuzzy graphs and application in molecular chemistry","volume":"9","author":"Islam","year":"2023","journal-title":"Complex Intell. Syst."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"101844","DOI":"10.1016\/j.swevo.2025.101844","article-title":"A reinforcement learning-based ranking teaching-learning-based optimization algorithm for parameters estimation of photovoltaic models","volume":"93","author":"Wang","year":"2025","journal-title":"Swarm Evol. Comput."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"121857","DOI":"10.1016\/j.ins.2024.121857","article-title":"Advanced fuzzy connectivity metrics for enhancing security in dynamic network environments","volume":"700","author":"Sujithra","year":"2025","journal-title":"Inf. Sci."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Dhanya, C.M., Mathew, S., and Mordeson, J.N. (2025). Connectivity in Cartesian products of fuzzy graphs: Application to decision making. J. Appl. Math. Comput.","DOI":"10.1007\/s12190-025-02389-0"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"108909","DOI":"10.1016\/j.fss.2024.108909","article-title":"Generalized cycle connectivity in fuzzy graphs","volume":"482","author":"Prabhath","year":"2024","journal-title":"Fuzzy Sets Syst."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1016\/j.fss.2020.05.014","article-title":"Fuzzy edge connectivity and fuzzy local edge connectivity with applications to communication networks","volume":"410","author":"Ma","year":"2021","journal-title":"Fuzzy Sets Syst."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"1367","DOI":"10.1007\/s00500-022-07636-1","article-title":"Fuzzy average edge connectivity with its application to communication networks","volume":"27","author":"Ma","year":"2023","journal-title":"Soft Comput."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"2619","DOI":"10.3233\/JIFS-213189","article-title":"Strong domination integrity in graphs and fuzzy graphs","volume":"43","author":"Ganesan","year":"2022","journal-title":"J. Intell. Fuzzy Syst."},{"key":"ref_24","first-page":"160","article-title":"A study on regular fuzzy graphs and integrity of fuzzy graphs","volume":"10","author":"Saravanan","year":"2015","journal-title":"Int. J. Appl. Eng. Res."},{"key":"ref_25","first-page":"89","article-title":"Integrity of fuzzy graphs","volume":"6","author":"Saravanan","year":"2016","journal-title":"Bull. Int. Math. Virtual Inst."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"519","DOI":"10.1016\/j.ins.2009.10.006","article-title":"Node connectivity and arc connectivity in fuzzy graphs","volume":"180","author":"Mathew","year":"2010","journal-title":"Inf. Sci."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1016\/j.fss.2018.06.007","article-title":"Connectivity index of a fuzzy graph and its application to human trafficking","volume":"360","author":"Binu","year":"2019","journal-title":"Fuzzy Sets Syst."},{"key":"ref_28","first-page":"316","article-title":"Bulan\u0131k \u00e7izgelerde zedelenebilirlik parametreleri: Bulan\u0131k tepe kararl\u0131l\u0131k de\u011feri","volume":"15","author":"Murater","year":"2025","journal-title":"J. Inst. Sci. Technol."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"2","DOI":"10.62476\/jmte9102","article-title":"Fuzzy node connectivity of some classes of graphs","volume":"9","author":"Murater","year":"2024","journal-title":"J. Mod. Technol. Eng."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"1760","DOI":"10.1016\/j.ins.2009.01.003","article-title":"Types of arcs in a fuzzy graph","volume":"179","author":"Mathew","year":"2009","journal-title":"Inf. Sci."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Mordeson, J.N., and Nair, P.S. (2000). Fuzzy Graphs and Fuzzy Hypergraphs, Physica-Verlag.","DOI":"10.1007\/978-3-7908-1854-3"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1016\/S0020-0255(02)00411-5","article-title":"Strong arcs in fuzzy graphs","volume":"152","author":"Bhutani","year":"2003","journal-title":"Inf. Sci."},{"key":"ref_33","first-page":"57","article-title":"On degrees of end nodes and cut nodes in fuzzy graphs","volume":"1","author":"Bhutani","year":"2004","journal-title":"Iran. J. Fuzzy Syst."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1016\/S0020-0255(03)00078-1","article-title":"Fuzzy end nodes in fuzzy graphs","volume":"152","author":"Bhutani","year":"2003","journal-title":"Inf. Sci."},{"key":"ref_35","unstructured":"Altundag, F.N. (2021). Vulnerability Parameters of Fuzzy Graphs. [PhD Thesis, Manisa Celal Bayar University]."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"717","DOI":"10.1016\/j.ins.2012.07.026","article-title":"Menger\u2019s theorem for fuzzy graphs","volume":"222","author":"Mathew","year":"2013","journal-title":"Inf. Sci."},{"key":"ref_37","first-page":"33","article-title":"On regular fuzzy graphs","volume":"12","author":"Gani","year":"2008","journal-title":"J. Phys. Sci."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"214","DOI":"10.1186\/s40064-015-0935-5","article-title":"Strong sum distance in fuzzy graphs","volume":"4","author":"Tom","year":"2015","journal-title":"SpringerPlus"},{"key":"ref_39","first-page":"21","article-title":"Application of fuzzy graph models for finding rational routes","volume":"10","author":"Lytvynenko","year":"2016","journal-title":"Adv. Mil. Technol."}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/17\/4\/474\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T16:57:43Z","timestamp":1760029063000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/17\/4\/474"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,21]]},"references-count":39,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2025,4]]}},"alternative-id":["sym17040474"],"URL":"https:\/\/doi.org\/10.3390\/sym17040474","relation":{},"ISSN":["2073-8994"],"issn-type":[{"type":"electronic","value":"2073-8994"}],"subject":[],"published":{"date-parts":[[2025,3,21]]}}}