• Title/Summary/Keyword: Connected Dominating Set

Search Result 29, Processing Time 0.023 seconds

Maximum Degree Vertex Domatic Set Algorithm for Domatic Number Problem (도메틱 수 문제에 관한 최대차수 정점 지배집합 알고리즘)

  • Lee, Sang-Un
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.2
    • /
    • pp.63-70
    • /
    • 2015
  • In the absence of a polynomial time algorithm capable of obtaining the exact solutions to it, the domatic number problem (DNP) of dominating set (DS) has been regarded as NP-complete. This paper suggests polynomial-time complexity algorithm about DNP. In this paper, I select a vertex $v_i$ of the maximum degree ${\Delta}(G)$ as an element of a dominating set $D_i,i=1,2,{\cdots},k$, compute $D_{i+1}$ from a simplified graph of $V_{i+1}=V_i{\backslash}D_i$, and verify that $D_i$ is indeed a dominating set through $V{\backslash}D_i=N_G(D_i)$. When applied to 15 various graphs, the proposed algorithm has succeeded in bringing about exact solutions with polynomial-time complexity O(kn). Therefore, the proposed domatic number algorithm shows that the domatic number problem is in fact a P-problem.

Power of a Defer Timer for the design of broadcasting protocol in Wireless Sensor Networks

  • Kim, Bo-Nam;Lee, In-Sung;Yang, Jun-Mo;Lee, Jin-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.470-473
    • /
    • 2007
  • Wireless Sensor Networks (WSNs) have merged to become one of the most promising applications of wireless ad hoc networks. A defer timer has been used in some of existing network protocols to solve a set of problems in WSNs. We first investigate the use of a defer timer to fully take the advantage of it in WSNs. We demonstrate that by properly setting up the defer timers, many difficult issues in sensor networks, such as power limitation, the broadcast storm problem, and the construction of the virtual backbone, can be easily tackled with only the help of simple localized information at each node. In this paper, we present the power of a defer timer in the design of dominating set construction protocol for broadcasting. The ns 2 computer simulations are carried out for performance study.

  • PDF

Energy-Efficient Quorum-Based MAC Protocol for Wireless Sensor Networks

  • Annabel, L. Sherly Puspha;Murugan, K.
    • ETRI Journal
    • /
    • v.37 no.3
    • /
    • pp.480-490
    • /
    • 2015
  • The reliability of sensor networks is generally dependent on the battery power of the sensor nodes that it employs; hence it is crucial for the sensor nodes to efficiently use their battery resources. This research paper presents a method to increase the reliability of sensor nodes by constructing a connected dominating tree (CDT), which is a subnetwork of wireless sensor networks. It detects the minimum number of dominatees, dominators, forwarder sensor nodes, and aggregates, as well as transmitting data to the sink. A new medium access control (MAC) protocol, called Homogenous Quorum-Based Medium Access Control (HQMAC), is also introduced, which is an adaptive, homogenous, asynchronous quorum-based MAC protocol. In this protocol, certain sensor nodes belonging to a network will be allowed to tune their wake-up and sleep intervals, based on their own traffic load. A new quorum system, named BiQuorum, is used by HQMAC to provide a low duty cycle, low network sensibility, and a high number of rendezvous points when compared with other quorum systems such as grid and dygrid. Both the theoretical results and the simulation results proved that the proposed HQMAC (when applied to a CDT) facilitates low transmission latency, high delivery ratio, and low energy consumption, thus extending the lifetime of the network it serves.

Double Domination in the Cartesian and Tensor Products of Graphs

  • CUIVILLAS, ARNEL MARINO;CANOY, SERGIO R. JR.
    • Kyungpook Mathematical Journal
    • /
    • v.55 no.2
    • /
    • pp.279-287
    • /
    • 2015
  • A subset S of V (G), where G is a graph without isolated vertices, is a double dominating set of G if for each $x{{\in}}V(G)$, ${\mid}N_G[x]{\cap}S{\mid}{\geq}2$. This paper, shows that any positive integers a, b and n with $2{\leq}a<b$, $b{\geq}2a$ and $n{\geq}b+2a-2$, can be realized as domination number, double domination number and order, respectively. It also characterize the double dominating sets in the Cartesian and tensor products of two graphs and determine sharp bounds for the double domination numbers of these graphs. In particular, it show that if G and H are any connected non-trivial graphs of orders n and m respectively, then ${\gamma}_{{\times}2}(G{\square}H){\leq}min\{m{\gamma}_2(G),n{\gamma}_2(H)\}$, where ${\gamma}_2$, is the 2-domination parameter.

Minimum number of Vertex Guards Algorithm for Art Gallery Problem (화랑 문제의 최소 정점 경비원 수 알고리즘)

  • Lee, Sang-Un
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.6
    • /
    • pp.179-186
    • /
    • 2011
  • This paper suggests the minimum number of vertex guards algorithm. Given n rooms, the exact number of minimum vertex guards is proposed. However, only approximation algorithms are presented about the maximum number of vertex guards for polygon and orthogonal polygon without or with holes. Fisk suggests the maximum number of vertex guards for polygon with n vertices as follows. Firstly, you can triangulate with n-2 triangles. Secondly, 3-chromatic vertex coloring of every triangulation of a polygon. Thirdly, place guards at the vertices which have the minority color. This paper presents the minimum number of vertex guards using dominating set. Firstly, you can obtain the visibility graph which is connected all edges if two vertices can be visible each other. Secondly, you can obtain dominating set from visibility graph or visibility matrix. This algorithm applies various art galley problems. As a results, the proposed algorithm is simple and can be obtain the minimum number of vertex guards.

ON DOMINATION IN ZERO-DIVISOR GRAPHS OF RINGS WITH INVOLUTION

  • Nazim, Mohd;Nisar, Junaid;Rehman, Nadeem ur
    • Bulletin of the Korean Mathematical Society
    • /
    • v.58 no.6
    • /
    • pp.1409-1418
    • /
    • 2021
  • In this paper, we study domination in the zero-divisor graph of a *-ring. We first determine the domination number, the total domination number, and the connected domination number for the zero-divisor graph of the product of two *-rings with componentwise involution. Then, we study domination in the zero-divisor graph of a Rickart *-ring and relate it with the clique of the zero-divisor graph of a Rickart *-ring.

Towards Evolutionary Approach for Thermal Aware In Vivo Sensor Networks

  • Kamal, Rossi;Hong, Choong-Seon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06d
    • /
    • pp.369-371
    • /
    • 2012
  • Wireless sensor networks have taken immense interest in healthcare systems in recent years. One example of it is in an in vivo sensor that is deployed in critical and sensitive healthcare applications like artificial retina, cardiac pacemaker, drug delivery, blood pressure, internal heat calculation, glucosemonitoring etc. In vivo sensor nodes exhibit temperature that may be very dangerous for human tissues. However, existing in vivo thermal aware routing approaches suffer from hotspot creation, delay, and computational complexity. These limitations motivate us toward an in vivo virtual backbone, a small subset of nodes, connected to all other nodes and involved in routing of all nodes, -based solution. A virtual backbone is lightweight and its fault-tolerant version allows in vivo sensor nodes to disconnect hotspot paths and to use alternative paths. We have formulated the problem as m-connected k-dominating set problem with minimum temperature cost in in vivo sensor network. This is a combinatorial optimization problem and we have been motivated to use evolutionary approach to solve the problem.

Performance evaluation between node-based CDS and energy-based CDS (노드 기준과 에너지 기준의 CDS 구성에 따른 성능 비교)

  • Ha, Deok-kyu;Song, Young-jun;Kim, Dong-woo;Lee, In-sung
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2009.05a
    • /
    • pp.851-855
    • /
    • 2009
  • Constructing CDS in wireless ad-hoc network, it is necessary to make more efficient algorithm that is fast, simple and has low power consumption. It is worried about losing data which brought a bottleneck state from confliction and delay when the nodes are concentrated or CDS is reconstructed. So, after constructing most efficient CDS, It is better not to reconstruct CDS in moveless wireless ad-hoc network. In this paper, we compared and estimated the performance in each situation of a CDS construction algorithm based on Node degree and Energy level.

  • PDF

Constructing κ-redundant Data Delivery Structure for Multicast in a Military Hybrid Network (군 하이브리드 네트워크에서 생존성 향상을 위한 다중 경로 멀티캐스팅)

  • Bang, June-Ho;Cho, Young-Jong;Kang, Kyungran
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.15 no.6
    • /
    • pp.770-778
    • /
    • 2012
  • In this paper, we propose a multi-path construction scheme to improve the survivability of a multicast session in military hybrid networks. A military hybrid network consists of a static backbone network and multiple mobile stub networks where some nodes are frequently susceptible to be disconnected due to link failure and node mobility. To improve the survivability of multicast sessions, we propose a construction scheme of ${\kappa}$ redundant multi-paths to each receiver. In order to take account of different characteristics of static and mobile networks, we propose quite different multi-path setup approaches for the backbone and stub networks, respectively, and combine them at the boundary point called gateway. We prove that our proposed scheme ensures that each receiver of a multicast session has ${\kappa}$ redundant paths to the common source. Through simulations, we evaluate the performance of the proposed schemes from three aspects : network survivability, recovery cost, and end-to-end delay.