Applications of Dominating Set of Graph in Computer Networks

Abstract

 The aim of the paper is to impart the importance of graph theoretical concepts and the applications of domination in graphs to various real life situations in the areas of science and engineering. In a graph G = (V, E), a set S āŠ† V(G) is said to be a dominating set of G if every vertex in Vā€“S is adjacent to atleast one vertex in S. A set S āŠ† V(G) is said to be a connected dominating set of G if S is dominating set and also the subgraph <S> induced by S is connected. The research has been carried out extensively in various types of dominating sets. This paper explores mainly on the applications of dominating sets in computer networks.

Authors and Affiliations

A. Sasireka

Keywords

Related Articles

 Waste Generation Perspective of Gorakhpur City and Related Waste Treatment Techniques

 It will be every beautifull effort to exercise the waste to energy conversion for small cities like Gorakhpur. The present paper basically a small effort to familiarize some thermochemical processes for such citie...

 Microcontroller Based Weather Data Logger

 Data logger periodically measures various real-time meteorological parameters and stores for future use. The Microcontroller based automatic weather Data Logger is arranged that it can automatically operate unatte...

DETECTION OF BLACK HOLE ATTACK USING CONTACT-BASED WATCHDOG

MANET (Mobile Ad-hoc network) is group of mobile nodes interconnection .MANET depends on the nodes cooperation for working properly. MANET basically assumes that nodes participate honestly in packet forwarding. But som...

 Performance of Biomass Adsorber Column for Competitive Removal Pb(II), Cr(III) and Cd(II) ions from Synthetic Wastewater

 The adsorption of Pb(II), Cr(III) and Cd(II) onto dead anaerobic biomass (DAB) in single, binary and ternary system was studied using fixed bed adsorber. A general rate multi- component model (GRM) was utilized to...

 SECRET DATA HIDING IN ENCRYPTED COMPRESSED VIDEO BITSTREAMS USING CHAOS CRYPTO SYSTEM

 Early research works have been done on image. Due to few features of images, such as high correlation among pixels and bulk data capacity , previous encryption algorithms are not suitable. Cloud computing has beco...

Download PDF file
  • EP ID EP117255
  • DOI -
  • Views 91
  • Downloads 0

How To Cite

A. Sasireka (30).  Applications of Dominating Set of Graph in Computer Networks. International Journal of Engineering Sciences & Research Technology, 3(1), 170-173. https://europub.co.uk/articles/-A-117255