SlideShare une entreprise Scribd logo
1  sur  2
Integrated Intelligent Research (IIR) International Journal of Computing Algorithm
Volume: 03 Issue: 03 December 2014 Pages: 246-247
ISSN: 2278-2397
246
Application of Domination Set for Fixing
Surveillance Cameras
T. Henson 1
, S. Rajendiran 2
1,2
PG and Research Department of Mathematics
St. Joseph’s College of Arts & Science(Autonomous),Cuddalore,India.
Email: thenson1967@gmail.com , rajsujai12@gmail.com
Abstract- Graphs are both natural and human made structures.
This paper is about the introduction of a new method for fixing
a minimum number of surveillance cameras in any place by
using the concept of domination sets.
Keywords: Domination set, Minimum domination set.
I. INTRODUCTION
The main aim of this paper is to present the importance of
graph theoretical ideas in various areas of Science &
Engineering for researches that they can use Domination in
graph theoretical concepts for the research. Domination in
graphs has been an extensively researched branch of graph
theory. It is clearly established from the exclusive coverage of
the “Topics on domination in graph” in the 86th issue of the
Journal of Discrete mathematics (1990), that the theory of
domination is a very popular area for research activity in graph
theory. In 1958, Berge defined the concept of the domination
number of a graph, calling this as “coefficient of External
Stability”. In 1962, Ore used the name “dominating set‟ and
“domination number‟ for the same concept. They have used
the notation (G) for the domination number of a graph, which
has become very popular in real life.
II. DEFINITIONS
Domination set: In graph theory, a dominating set for a graph
G=(V,E) is a subset D of V such that every vertex not in D
(every vertex in V-D) is joined to at least one member of D by
some edge.
(i.e.) A set D of vertices in a graph G is called a domination set
of G if every vertex in V-D is adjacent to some vertex in D.
Eg: In the following graph G, the set D=(A,B,E,H) is one of
the dominating set
Minimum Dominating set: A dominating set D is said to be
minimum dominating set if D consist of minimum number of
vertices among the all dominating sets.
Eg: Consider the following graph G
Domination number: The domination number is the number of
vertices in a smallest dominating set for G. ( The cardinality of
minimum dominating set)
Eg: Consider the following graph G
Minimal dominating set: A dominating set D is called minimal
dominating set if no proper subset of D is a dominating set.
Eg: Consider the following graph G
Integrated Intelligent Research (IIR) International Journal of Computing Algorithm
Volume: 03 Issue: 03 December 2014 Pages: 246-247
ISSN: 2278-2397
247
III. SOME APPLICATIONS OF DOMINATION SET
1. School Bus Routing
2. Computer Communication Networks
3. Locate TV and Mobile communication towers
4. Land surveying
5. Assignment Problem
IV. DESCRIPTION OF NETWORK MODEL
Let ‘n’ be the vertices of a General graph.
(i.e) n=1,2,3,4,5,6......
Now, (i) consider n=18.
Let us take a largest area, and we convert that area to be a
Graph V. Let us assume that{ v1,v2,v3,v4.................v18} be the
sub areas in V.
Let us show that,we can fix a minimum number of surveillance
camera in V
Eg:(i)
(i) Net work Model
Now, Let V={v1,v2,.........,v18}
Using domination set, we can find a subset which satisfies a
minimum number of domination set.
V={v1,v2,v3,v4,.........v18}
S1={v1,v2,v3,v4,v5,v6,v10,v18}
S2={v1,v2,v3,v5,v6,v8,v12,v14,v17}
S3={v4,v8,v13,v12,v11,v14,v18}
(ii) consider n=13
Eg:(ii)
(ii) Net work Model
Now, Let V={v1,v2,.........,v13}
Similarly,Using domination set, we can find a subset which
satisfies a minimum number of domination set.
V={v1,v2,v3,v4,.........v13}
S1={v1,v2,v3,v4,v5,v6}
S2={v1,v2,v3,v5,v6,v8,v12}
S3={v4,v8,v13,v12,v11}
From the Example (i) and (ii), we have many subset
S1,S2,S3,etc.,. In these subsets, S3 satisfies the minimum
number of domination set. So, Finally we can fix surveillance
in S3 area and also we can reduce the cost.
V. CONCLUSION
In this paper, by using domination set, the minimum number of
surveillance cameras can be fixed and it results in the reduction
of cost.
REFERENCES
[1] C. Berge, “Theory of Graphs and its Applications”, Methuen, London,
(1962).
[2] T.W. Haynes and P. J. Slater, “Paired Domination in graphs”, Networks,
32 (1998) 199-206
[3] V. R. Kulli, “Theory of domination in graph”,Vishwa
Internat.Publications,2010.
[4] T. W. Haynes, S. T. Hedetniemi, and P. J. Slater (eds), “Domination in
Graphs: Advanced Topics”, Marcel Dekker, Inc. New York, 1 998.
[5] T. W. Haynes, S. T. Hedetniemi, and P. J. Slater (Eds), “Fundamentals
of Domination in Graphs”, Marcel Dekker, Inc. New York, 1998.

Contenu connexe

Similaire à Minimum Surveillance Cameras Using Domination Sets

Embedding of Poly Honeycomb Networks and the Metric dimension of Star of Davi...
Embedding of Poly Honeycomb Networks and the Metric dimension of Star of Davi...Embedding of Poly Honeycomb Networks and the Metric dimension of Star of Davi...
Embedding of Poly Honeycomb Networks and the Metric dimension of Star of Davi...GiselleginaGloria
 
Prim's Algorithm on minimum spanning tree
Prim's Algorithm on minimum spanning treePrim's Algorithm on minimum spanning tree
Prim's Algorithm on minimum spanning treeoneous
 
An application of gd
An application of gdAn application of gd
An application of gdgraphhoc
 
AN APPLICATION OF Gd -METRIC SPACES AND METRIC DIMENSION OF GRAPHS
AN APPLICATION OF Gd -METRIC SPACES AND METRIC DIMENSION OF GRAPHSAN APPLICATION OF Gd -METRIC SPACES AND METRIC DIMENSION OF GRAPHS
AN APPLICATION OF Gd -METRIC SPACES AND METRIC DIMENSION OF GRAPHSFransiskeran
 
Global Domination Set in Intuitionistic Fuzzy Graph
Global Domination Set in Intuitionistic Fuzzy GraphGlobal Domination Set in Intuitionistic Fuzzy Graph
Global Domination Set in Intuitionistic Fuzzy Graphijceronline
 
To find a non-split strong dominating set of an interval graph using an algor...
To find a non-split strong dominating set of an interval graph using an algor...To find a non-split strong dominating set of an interval graph using an algor...
To find a non-split strong dominating set of an interval graph using an algor...IOSR Journals
 
An algorithm for generating new mandelbrot and julia sets
An algorithm for generating new mandelbrot and julia setsAn algorithm for generating new mandelbrot and julia sets
An algorithm for generating new mandelbrot and julia setsAlexander Decker
 
Equi independent equitable domination number of cycle and bistar related graphs
Equi independent equitable domination number of cycle and bistar related graphsEqui independent equitable domination number of cycle and bistar related graphs
Equi independent equitable domination number of cycle and bistar related graphsiosrjce
 
Dynamic Parameterized Problems - Algorithms and Complexity
Dynamic Parameterized Problems - Algorithms and ComplexityDynamic Parameterized Problems - Algorithms and Complexity
Dynamic Parameterized Problems - Algorithms and Complexitycseiitgn
 
Results on Linear Algebra
Results on Linear AlgebraResults on Linear Algebra
Results on Linear Algebraijtsrd
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
CS 354 More Graphics Pipeline
CS 354 More Graphics PipelineCS 354 More Graphics Pipeline
CS 354 More Graphics PipelineMark Kilgard
 
Aplicaciones de espacios y subespacios vectoriales en la carrera de tecnologi...
Aplicaciones de espacios y subespacios vectoriales en la carrera de tecnologi...Aplicaciones de espacios y subespacios vectoriales en la carrera de tecnologi...
Aplicaciones de espacios y subespacios vectoriales en la carrera de tecnologi...ERIKAMARIAGUDIOSANTA
 
Lec 9 05_sept [compatibility mode]
Lec 9 05_sept [compatibility mode]Lec 9 05_sept [compatibility mode]
Lec 9 05_sept [compatibility mode]Palak Sanghani
 
04 greedyalgorithmsii 2x2
04 greedyalgorithmsii 2x204 greedyalgorithmsii 2x2
04 greedyalgorithmsii 2x2MuradAmn
 
An Efficient Convex Hull Algorithm for a Planer Set of Points
An Efficient Convex Hull Algorithm for a Planer Set of PointsAn Efficient Convex Hull Algorithm for a Planer Set of Points
An Efficient Convex Hull Algorithm for a Planer Set of PointsKasun Ranga Wijeweera
 

Similaire à Minimum Surveillance Cameras Using Domination Sets (20)

Embedding of Poly Honeycomb Networks and the Metric dimension of Star of Davi...
Embedding of Poly Honeycomb Networks and the Metric dimension of Star of Davi...Embedding of Poly Honeycomb Networks and the Metric dimension of Star of Davi...
Embedding of Poly Honeycomb Networks and the Metric dimension of Star of Davi...
 
Prim's Algorithm on minimum spanning tree
Prim's Algorithm on minimum spanning treePrim's Algorithm on minimum spanning tree
Prim's Algorithm on minimum spanning tree
 
An application of gd
An application of gdAn application of gd
An application of gd
 
AN APPLICATION OF Gd -METRIC SPACES AND METRIC DIMENSION OF GRAPHS
AN APPLICATION OF Gd -METRIC SPACES AND METRIC DIMENSION OF GRAPHSAN APPLICATION OF Gd -METRIC SPACES AND METRIC DIMENSION OF GRAPHS
AN APPLICATION OF Gd -METRIC SPACES AND METRIC DIMENSION OF GRAPHS
 
Global Domination Set in Intuitionistic Fuzzy Graph
Global Domination Set in Intuitionistic Fuzzy GraphGlobal Domination Set in Intuitionistic Fuzzy Graph
Global Domination Set in Intuitionistic Fuzzy Graph
 
B0620510
B0620510B0620510
B0620510
 
To find a non-split strong dominating set of an interval graph using an algor...
To find a non-split strong dominating set of an interval graph using an algor...To find a non-split strong dominating set of an interval graph using an algor...
To find a non-split strong dominating set of an interval graph using an algor...
 
Vertex cover Problem
Vertex cover ProblemVertex cover Problem
Vertex cover Problem
 
An algorithm for generating new mandelbrot and julia sets
An algorithm for generating new mandelbrot and julia setsAn algorithm for generating new mandelbrot and julia sets
An algorithm for generating new mandelbrot and julia sets
 
Equi independent equitable domination number of cycle and bistar related graphs
Equi independent equitable domination number of cycle and bistar related graphsEqui independent equitable domination number of cycle and bistar related graphs
Equi independent equitable domination number of cycle and bistar related graphs
 
Dynamic Parameterized Problems - Algorithms and Complexity
Dynamic Parameterized Problems - Algorithms and ComplexityDynamic Parameterized Problems - Algorithms and Complexity
Dynamic Parameterized Problems - Algorithms and Complexity
 
Results on Linear Algebra
Results on Linear AlgebraResults on Linear Algebra
Results on Linear Algebra
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
CS 354 More Graphics Pipeline
CS 354 More Graphics PipelineCS 354 More Graphics Pipeline
CS 354 More Graphics Pipeline
 
Aplicaciones de espacios y subespacios vectoriales en la carrera de tecnologi...
Aplicaciones de espacios y subespacios vectoriales en la carrera de tecnologi...Aplicaciones de espacios y subespacios vectoriales en la carrera de tecnologi...
Aplicaciones de espacios y subespacios vectoriales en la carrera de tecnologi...
 
Lec 9 05_sept [compatibility mode]
Lec 9 05_sept [compatibility mode]Lec 9 05_sept [compatibility mode]
Lec 9 05_sept [compatibility mode]
 
wzhu_paper
wzhu_paperwzhu_paper
wzhu_paper
 
04 greedyalgorithmsii 2x2
04 greedyalgorithmsii 2x204 greedyalgorithmsii 2x2
04 greedyalgorithmsii 2x2
 
An Efficient Convex Hull Algorithm for a Planer Set of Points
An Efficient Convex Hull Algorithm for a Planer Set of PointsAn Efficient Convex Hull Algorithm for a Planer Set of Points
An Efficient Convex Hull Algorithm for a Planer Set of Points
 

Plus de MangaiK4

Application of Ancient Indian Agricultural Practices in Cloud Computing Envir...
Application of Ancient Indian Agricultural Practices in Cloud Computing Envir...Application of Ancient Indian Agricultural Practices in Cloud Computing Envir...
Application of Ancient Indian Agricultural Practices in Cloud Computing Envir...MangaiK4
 
A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...
A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...
A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...MangaiK4
 
High Speed Low-Power Viterbi Decoder Using Trellis Code Modulation
High Speed Low-Power Viterbi Decoder Using Trellis Code ModulationHigh Speed Low-Power Viterbi Decoder Using Trellis Code Modulation
High Speed Low-Power Viterbi Decoder Using Trellis Code ModulationMangaiK4
 
Relation Extraction using Hybrid Approach and an Ensemble Algorithm
Relation Extraction using Hybrid Approach and an Ensemble AlgorithmRelation Extraction using Hybrid Approach and an Ensemble Algorithm
Relation Extraction using Hybrid Approach and an Ensemble AlgorithmMangaiK4
 
Saturation Throughput and Delay Aware Asynchronous Noc Using Fuzzy Logic
Saturation Throughput and Delay Aware Asynchronous Noc Using Fuzzy LogicSaturation Throughput and Delay Aware Asynchronous Noc Using Fuzzy Logic
Saturation Throughput and Delay Aware Asynchronous Noc Using Fuzzy LogicMangaiK4
 
Image Based Password using RSA Algorithm
Image Based Password using RSA AlgorithmImage Based Password using RSA Algorithm
Image Based Password using RSA AlgorithmMangaiK4
 
A Framework for Desktop Virtual Reality Application for Education
A Framework for Desktop Virtual Reality Application for EducationA Framework for Desktop Virtual Reality Application for Education
A Framework for Desktop Virtual Reality Application for EducationMangaiK4
 
Smart Security For Data Sharing In Cloud Computing
Smart Security For Data Sharing In Cloud ComputingSmart Security For Data Sharing In Cloud Computing
Smart Security For Data Sharing In Cloud ComputingMangaiK4
 
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining Approach
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining ApproachBugLoc: Bug Localization in Multi Threaded Application via Graph Mining Approach
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining ApproachMangaiK4
 
Motion Object Detection Using BGS Technique
Motion Object Detection Using BGS TechniqueMotion Object Detection Using BGS Technique
Motion Object Detection Using BGS TechniqueMangaiK4
 
Encroachment in Data Processing using Big Data Technology
Encroachment in Data Processing using Big Data TechnologyEncroachment in Data Processing using Big Data Technology
Encroachment in Data Processing using Big Data TechnologyMangaiK4
 
Performance Evaluation of Hybrid Method for Securing and Compressing Images
Performance Evaluation of Hybrid Method for Securing and Compressing ImagesPerformance Evaluation of Hybrid Method for Securing and Compressing Images
Performance Evaluation of Hybrid Method for Securing and Compressing ImagesMangaiK4
 
A Review on - Data Hiding using Cryptography and Steganography
A Review on - Data Hiding using Cryptography and SteganographyA Review on - Data Hiding using Cryptography and Steganography
A Review on - Data Hiding using Cryptography and SteganographyMangaiK4
 
Modeling Originators for Event Forecasting Multi-Task Learning in Mil Algorithm
Modeling Originators for Event Forecasting Multi-Task Learning in Mil AlgorithmModeling Originators for Event Forecasting Multi-Task Learning in Mil Algorithm
Modeling Originators for Event Forecasting Multi-Task Learning in Mil AlgorithmMangaiK4
 
quasi-uniform theta graph
quasi-uniform theta graphquasi-uniform theta graph
quasi-uniform theta graphMangaiK4
 
The Relationship of Mathematics to the Performance of SHCT it Students in Pro...
The Relationship of Mathematics to the Performance of SHCT it Students in Pro...The Relationship of Mathematics to the Performance of SHCT it Students in Pro...
The Relationship of Mathematics to the Performance of SHCT it Students in Pro...MangaiK4
 
A Tentative analysis of Liver Disorder using Data Mining Algorithms J48, Deci...
A Tentative analysis of Liver Disorder using Data Mining Algorithms J48, Deci...A Tentative analysis of Liver Disorder using Data Mining Algorithms J48, Deci...
A Tentative analysis of Liver Disorder using Data Mining Algorithms J48, Deci...MangaiK4
 
Marine Object Recognition using Blob Analysis
Marine Object Recognition using Blob AnalysisMarine Object Recognition using Blob Analysis
Marine Object Recognition using Blob AnalysisMangaiK4
 
Implementation of High Speed OFDM Transceiver using FPGA
Implementation of High Speed OFDM Transceiver using FPGAImplementation of High Speed OFDM Transceiver using FPGA
Implementation of High Speed OFDM Transceiver using FPGAMangaiK4
 
Renewable Energy Based on Current Fed Switched Inverter for Smart Grid Applic...
Renewable Energy Based on Current Fed Switched Inverter for Smart Grid Applic...Renewable Energy Based on Current Fed Switched Inverter for Smart Grid Applic...
Renewable Energy Based on Current Fed Switched Inverter for Smart Grid Applic...MangaiK4
 

Plus de MangaiK4 (20)

Application of Ancient Indian Agricultural Practices in Cloud Computing Envir...
Application of Ancient Indian Agricultural Practices in Cloud Computing Envir...Application of Ancient Indian Agricultural Practices in Cloud Computing Envir...
Application of Ancient Indian Agricultural Practices in Cloud Computing Envir...
 
A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...
A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...
A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...
 
High Speed Low-Power Viterbi Decoder Using Trellis Code Modulation
High Speed Low-Power Viterbi Decoder Using Trellis Code ModulationHigh Speed Low-Power Viterbi Decoder Using Trellis Code Modulation
High Speed Low-Power Viterbi Decoder Using Trellis Code Modulation
 
Relation Extraction using Hybrid Approach and an Ensemble Algorithm
Relation Extraction using Hybrid Approach and an Ensemble AlgorithmRelation Extraction using Hybrid Approach and an Ensemble Algorithm
Relation Extraction using Hybrid Approach and an Ensemble Algorithm
 
Saturation Throughput and Delay Aware Asynchronous Noc Using Fuzzy Logic
Saturation Throughput and Delay Aware Asynchronous Noc Using Fuzzy LogicSaturation Throughput and Delay Aware Asynchronous Noc Using Fuzzy Logic
Saturation Throughput and Delay Aware Asynchronous Noc Using Fuzzy Logic
 
Image Based Password using RSA Algorithm
Image Based Password using RSA AlgorithmImage Based Password using RSA Algorithm
Image Based Password using RSA Algorithm
 
A Framework for Desktop Virtual Reality Application for Education
A Framework for Desktop Virtual Reality Application for EducationA Framework for Desktop Virtual Reality Application for Education
A Framework for Desktop Virtual Reality Application for Education
 
Smart Security For Data Sharing In Cloud Computing
Smart Security For Data Sharing In Cloud ComputingSmart Security For Data Sharing In Cloud Computing
Smart Security For Data Sharing In Cloud Computing
 
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining Approach
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining ApproachBugLoc: Bug Localization in Multi Threaded Application via Graph Mining Approach
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining Approach
 
Motion Object Detection Using BGS Technique
Motion Object Detection Using BGS TechniqueMotion Object Detection Using BGS Technique
Motion Object Detection Using BGS Technique
 
Encroachment in Data Processing using Big Data Technology
Encroachment in Data Processing using Big Data TechnologyEncroachment in Data Processing using Big Data Technology
Encroachment in Data Processing using Big Data Technology
 
Performance Evaluation of Hybrid Method for Securing and Compressing Images
Performance Evaluation of Hybrid Method for Securing and Compressing ImagesPerformance Evaluation of Hybrid Method for Securing and Compressing Images
Performance Evaluation of Hybrid Method for Securing and Compressing Images
 
A Review on - Data Hiding using Cryptography and Steganography
A Review on - Data Hiding using Cryptography and SteganographyA Review on - Data Hiding using Cryptography and Steganography
A Review on - Data Hiding using Cryptography and Steganography
 
Modeling Originators for Event Forecasting Multi-Task Learning in Mil Algorithm
Modeling Originators for Event Forecasting Multi-Task Learning in Mil AlgorithmModeling Originators for Event Forecasting Multi-Task Learning in Mil Algorithm
Modeling Originators for Event Forecasting Multi-Task Learning in Mil Algorithm
 
quasi-uniform theta graph
quasi-uniform theta graphquasi-uniform theta graph
quasi-uniform theta graph
 
The Relationship of Mathematics to the Performance of SHCT it Students in Pro...
The Relationship of Mathematics to the Performance of SHCT it Students in Pro...The Relationship of Mathematics to the Performance of SHCT it Students in Pro...
The Relationship of Mathematics to the Performance of SHCT it Students in Pro...
 
A Tentative analysis of Liver Disorder using Data Mining Algorithms J48, Deci...
A Tentative analysis of Liver Disorder using Data Mining Algorithms J48, Deci...A Tentative analysis of Liver Disorder using Data Mining Algorithms J48, Deci...
A Tentative analysis of Liver Disorder using Data Mining Algorithms J48, Deci...
 
Marine Object Recognition using Blob Analysis
Marine Object Recognition using Blob AnalysisMarine Object Recognition using Blob Analysis
Marine Object Recognition using Blob Analysis
 
Implementation of High Speed OFDM Transceiver using FPGA
Implementation of High Speed OFDM Transceiver using FPGAImplementation of High Speed OFDM Transceiver using FPGA
Implementation of High Speed OFDM Transceiver using FPGA
 
Renewable Energy Based on Current Fed Switched Inverter for Smart Grid Applic...
Renewable Energy Based on Current Fed Switched Inverter for Smart Grid Applic...Renewable Energy Based on Current Fed Switched Inverter for Smart Grid Applic...
Renewable Energy Based on Current Fed Switched Inverter for Smart Grid Applic...
 

Dernier

Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 

Dernier (20)

Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 

Minimum Surveillance Cameras Using Domination Sets

  • 1. Integrated Intelligent Research (IIR) International Journal of Computing Algorithm Volume: 03 Issue: 03 December 2014 Pages: 246-247 ISSN: 2278-2397 246 Application of Domination Set for Fixing Surveillance Cameras T. Henson 1 , S. Rajendiran 2 1,2 PG and Research Department of Mathematics St. Joseph’s College of Arts & Science(Autonomous),Cuddalore,India. Email: thenson1967@gmail.com , rajsujai12@gmail.com Abstract- Graphs are both natural and human made structures. This paper is about the introduction of a new method for fixing a minimum number of surveillance cameras in any place by using the concept of domination sets. Keywords: Domination set, Minimum domination set. I. INTRODUCTION The main aim of this paper is to present the importance of graph theoretical ideas in various areas of Science & Engineering for researches that they can use Domination in graph theoretical concepts for the research. Domination in graphs has been an extensively researched branch of graph theory. It is clearly established from the exclusive coverage of the “Topics on domination in graph” in the 86th issue of the Journal of Discrete mathematics (1990), that the theory of domination is a very popular area for research activity in graph theory. In 1958, Berge defined the concept of the domination number of a graph, calling this as “coefficient of External Stability”. In 1962, Ore used the name “dominating set‟ and “domination number‟ for the same concept. They have used the notation (G) for the domination number of a graph, which has become very popular in real life. II. DEFINITIONS Domination set: In graph theory, a dominating set for a graph G=(V,E) is a subset D of V such that every vertex not in D (every vertex in V-D) is joined to at least one member of D by some edge. (i.e.) A set D of vertices in a graph G is called a domination set of G if every vertex in V-D is adjacent to some vertex in D. Eg: In the following graph G, the set D=(A,B,E,H) is one of the dominating set Minimum Dominating set: A dominating set D is said to be minimum dominating set if D consist of minimum number of vertices among the all dominating sets. Eg: Consider the following graph G Domination number: The domination number is the number of vertices in a smallest dominating set for G. ( The cardinality of minimum dominating set) Eg: Consider the following graph G Minimal dominating set: A dominating set D is called minimal dominating set if no proper subset of D is a dominating set. Eg: Consider the following graph G
  • 2. Integrated Intelligent Research (IIR) International Journal of Computing Algorithm Volume: 03 Issue: 03 December 2014 Pages: 246-247 ISSN: 2278-2397 247 III. SOME APPLICATIONS OF DOMINATION SET 1. School Bus Routing 2. Computer Communication Networks 3. Locate TV and Mobile communication towers 4. Land surveying 5. Assignment Problem IV. DESCRIPTION OF NETWORK MODEL Let ‘n’ be the vertices of a General graph. (i.e) n=1,2,3,4,5,6...... Now, (i) consider n=18. Let us take a largest area, and we convert that area to be a Graph V. Let us assume that{ v1,v2,v3,v4.................v18} be the sub areas in V. Let us show that,we can fix a minimum number of surveillance camera in V Eg:(i) (i) Net work Model Now, Let V={v1,v2,.........,v18} Using domination set, we can find a subset which satisfies a minimum number of domination set. V={v1,v2,v3,v4,.........v18} S1={v1,v2,v3,v4,v5,v6,v10,v18} S2={v1,v2,v3,v5,v6,v8,v12,v14,v17} S3={v4,v8,v13,v12,v11,v14,v18} (ii) consider n=13 Eg:(ii) (ii) Net work Model Now, Let V={v1,v2,.........,v13} Similarly,Using domination set, we can find a subset which satisfies a minimum number of domination set. V={v1,v2,v3,v4,.........v13} S1={v1,v2,v3,v4,v5,v6} S2={v1,v2,v3,v5,v6,v8,v12} S3={v4,v8,v13,v12,v11} From the Example (i) and (ii), we have many subset S1,S2,S3,etc.,. In these subsets, S3 satisfies the minimum number of domination set. So, Finally we can fix surveillance in S3 area and also we can reduce the cost. V. CONCLUSION In this paper, by using domination set, the minimum number of surveillance cameras can be fixed and it results in the reduction of cost. REFERENCES [1] C. Berge, “Theory of Graphs and its Applications”, Methuen, London, (1962). [2] T.W. Haynes and P. J. Slater, “Paired Domination in graphs”, Networks, 32 (1998) 199-206 [3] V. R. Kulli, “Theory of domination in graph”,Vishwa Internat.Publications,2010. [4] T. W. Haynes, S. T. Hedetniemi, and P. J. Slater (eds), “Domination in Graphs: Advanced Topics”, Marcel Dekker, Inc. New York, 1 998. [5] T. W. Haynes, S. T. Hedetniemi, and P. J. Slater (Eds), “Fundamentals of Domination in Graphs”, Marcel Dekker, Inc. New York, 1998.