Applications of Dominating Set of Graph in Computer Networks
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 3, Issue 1
Abstract
The aim of the paper is to impart the importance of graph theoretical concepts and the applications of domination in graphs to various real life situations in the areas of science and engineering. In a graph G = (V, E), a set S ā V(G) is said to be a dominating set of G if every vertex in VāS is adjacent to atleast one vertex in S. A set S ā V(G) is said to be a connected dominating set of G if S is dominating set and also the subgraph <S> induced by S is connected. The research has been carried out extensively in various types of dominating sets. This paper explores mainly on the applications of dominating sets in computer networks.
Authors and Affiliations
A. Sasireka
Waste Generation Perspective of Gorakhpur City and Related Waste Treatment Techniques
It will be every beautifull effort to exercise the waste to energy conversion for small cities like Gorakhpur. The present paper basically a small effort to familiarize some thermochemical processes for such citie...
Microcontroller Based Weather Data Logger
Data logger periodically measures various real-time meteorological parameters and stores for future use. The Microcontroller based automatic weather Data Logger is arranged that it can automatically operate unatte...
DETECTION OF BLACK HOLE ATTACK USING CONTACT-BASED WATCHDOG
MANET (Mobile Ad-hoc network) is group of mobile nodes interconnection .MANET depends on the nodes cooperation for working properly. MANET basically assumes that nodes participate honestly in packet forwarding. But som...
Performance of Biomass Adsorber Column for Competitive Removal Pb(II), Cr(III) and Cd(II) ions from Synthetic Wastewater
The adsorption of Pb(II), Cr(III) and Cd(II) onto dead anaerobic biomass (DAB) in single, binary and ternary system was studied using fixed bed adsorber. A general rate multi- component model (GRM) was utilized to...
SECRET DATA HIDING IN ENCRYPTED COMPRESSED VIDEO BITSTREAMS USING CHAOS CRYPTO SYSTEM
Early research works have been done on image. Due to few features of images, such as high correlation among pixels and bulk data capacity , previous encryption algorithms are not suitable. Cloud computing has beco...