ON THE DOMINATION AND INDEPENDENT SETS OF G^M_{m,n} GRAPH
نویسندگان
چکیده
In graph theory, the theory of domination has several applications in various fields science and technology, which is considered as a turn up field research. real life, it extremely important like network desigh, wireless sensor networks,logistics, mobile computing, telecommunication others, Problems with facility location, communication or electrical monitoring can lead to dominance. Undirected graphs one most excellent models connection distributed computation parellel processing. A set $S\subset V$ said be dominating $G$ if every vertex $ V-S adjacent atleast $S$. The number $\gamma{(G)}$ G minimum cardinality $. An independent S \subset V exists no edges induced subgraph $\langle \rangle$ $\gamma_i(G)$ an this paper, some results on sets $\uppercase{G}^{M}_{m,n}$ finite sebset natural numbers are presented obtained for values $m,n$.
منابع مشابه
On exponential domination and graph operations
An exponential dominating set of graph $G = (V,E )$ is a subset $Ssubseteq V(G)$ such that $sum_{uin S}(1/2)^{overline{d}{(u,v)-1}}geq 1$ for every vertex $v$ in $V(G)-S$, where $overline{d}(u,v)$ is the distance between vertices $u in S$ and $v in V(G)-S$ in the graph $G -(S-{u})$. The exponential domination number, $gamma_{e}(G)$, is the smallest cardinality of an exponential dominating set....
متن کاملIndependent Sets with Domination Constraints
A ρ-independent set S in a graph is parameterized by a set ρ of non-negative integers that constrains how the independent set S can dominate the remaining vertices (∀v 6∈ S : |N(v) ∩ S| ∈ ρ.) For all values of ρ, we classify as either NP-complete or polynomial-time solvable the problems of deciding if a given graph has a ρ-independent set. We complement this with approximation algorithms and in...
متن کاملMaximal Independent Sets for the Pixel Expansion of Graph Access Structure
Abstract : A visual cryptography scheme based on a given graph G is a method to distribute a secret image among the vertices of G, the participants, so that a subset of participants can recover the secret image if they contain an edge of G, by stacking their shares, otherwise they can obtain no information regarding the secret image. In this paper a maximal independent sets of the graph G was ...
متن کاملMAXIMAL INDEPENDENT SETS FOR THE PIXEL EXPANSION OF GRAPH ACCESS STRUCTURE
Given a graph G, a visual cryptography scheme based on the graph G is a method to distribute a secret image among the vertices of G, the participants, so that a subset of participants can recover the secret image if they contain an edge of G, by stacking their shares, otherwise they can obtain no information regarding the secret image. In this paper we apply maximal independent sets of the grap...
متن کاملBounds on the restrained Roman domination number of a graph
A {em Roman dominating function} on a graph $G$ is a function$f:V(G)rightarrow {0,1,2}$ satisfying the condition that everyvertex $u$ for which $f(u) = 0$ is adjacent to at least one vertex$v$ for which $f(v) =2$. {color{blue}A {em restrained Roman dominating}function} $f$ is a {color{blue} Roman dominating function if the vertices with label 0 inducea subgraph with no isolated vertex.} The wei...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Advances in Mathematics
سال: 2022
ISSN: ['1857-8365', '1857-8438']
DOI: https://doi.org/10.37418/amsj.11.10.2