Text this: Strong incidence domination in some operations of fuzzy incidence graphs and application in security allocation