dc.contributor.author | Kumaran, Narayanan | |
dc.contributor.author | Meenakshi, Annamalai | |
dc.contributor.author | Mahdal, Miroslav | |
dc.contributor.author | Prakash, Jayavelu Udaya | |
dc.contributor.author | Guráš, Radek | |
dc.date.accessioned | 2024-02-08T07:58:13Z | |
dc.date.available | 2024-02-08T07:58:13Z | |
dc.date.issued | 2023 | |
dc.identifier.citation | Mathematics. 2023, vol. 11, issue 10, art. no. 2258. | cs |
dc.identifier.issn | 2227-7390 | |
dc.identifier.uri | http://hdl.handle.net/10084/152009 | |
dc.description.abstract | Let Heff (Veff, Eeff) be a finite simple connected graph of order m with vertex set Veff
and edge set Eeff. A dominating set Sds ⊆ Ve f f is called an efficiently dominating set if, for every
vertex ua ∈ VG, |NG[ua] ∩ Sds| = 1—where NG [ua] denotes the closed neighborhood of the vertex
ua. Using efficient domination techniques and labelling, we constructed the fuzzy network. An
algorithm has been framed to encrypt and decrypt the secret information present in the network, and
furthermore, the algorithm has been given in pseudocode. The mathematical modelling of a strong
fuzzy network is defined and constructed to elude the burgeoning intruder. Using the study of the
efficient domination of fuzzy graphs, this domination parameter plays a nuanced role in encrypting
and decrypting the framed network. One of the main purposes of fuzzy networks is encryption, so
one of our contributions to this research is to build a novel combinatorial technique to encrypt and
decode the built-in fuzzy network with a secret number utilizing effective domination. An illustration
with an appropriate secret message is provided along with the encryption and decryption algorithms.
Furthermore, we continued this study in intuitionistic fuzzy networks. | cs |
dc.language.iso | en | cs |
dc.publisher | MDPI | cs |
dc.relation.ispartofseries | Mathematics | cs |
dc.relation.uri | https://doi.org/10.3390/math11102258 | cs |
dc.rights | © 2023 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution. | cs |
dc.rights.uri | http://creativecommons.org/licenses/by/4.0/ | cs |
dc.subject | efficient domination | cs |
dc.subject | fuzzy network | cs |
dc.subject | intuitionistic | cs |
dc.subject | graph | cs |
dc.subject | encryption and decryption | cs |
dc.title | Application of fuzzy network using efficient domination | cs |
dc.type | article | cs |
dc.identifier.doi | 10.3390/math11102258 | |
dc.rights.access | openAccess | cs |
dc.type.version | publishedVersion | cs |
dc.type.status | Peer-reviewed | cs |
dc.description.source | Web of Science | cs |
dc.description.volume | 11 | cs |
dc.description.issue | 10 | cs |
dc.description.firstpage | art. no. 2258 | cs |
dc.identifier.wos | 000997207500001 | |