Zobrazit minimální záznam

dc.contributor.authorKumaran, Narayanan
dc.contributor.authorMeenakshi, Annamalai
dc.contributor.authorMahdal, Miroslav
dc.contributor.authorPrakash, Jayavelu Udaya
dc.contributor.authorGuráš, Radek
dc.date.accessioned2024-02-08T07:58:13Z
dc.date.available2024-02-08T07:58:13Z
dc.date.issued2023
dc.identifier.citationMathematics. 2023, vol. 11, issue 10, art. no. 2258.cs
dc.identifier.issn2227-7390
dc.identifier.urihttp://hdl.handle.net/10084/152009
dc.description.abstractLet Heff (Veff, Eeff) be a finite simple connected graph of order m with vertex set Veff and edge set Eeff. A dominating set Sds ⊆ Ve f f is called an efficiently dominating set if, for every vertex ua ∈ VG, |NG[ua] ∩ Sds| = 1—where NG [ua] denotes the closed neighborhood of the vertex ua. Using efficient domination techniques and labelling, we constructed the fuzzy network. An algorithm has been framed to encrypt and decrypt the secret information present in the network, and furthermore, the algorithm has been given in pseudocode. The mathematical modelling of a strong fuzzy network is defined and constructed to elude the burgeoning intruder. Using the study of the efficient domination of fuzzy graphs, this domination parameter plays a nuanced role in encrypting and decrypting the framed network. One of the main purposes of fuzzy networks is encryption, so one of our contributions to this research is to build a novel combinatorial technique to encrypt and decode the built-in fuzzy network with a secret number utilizing effective domination. An illustration with an appropriate secret message is provided along with the encryption and decryption algorithms. Furthermore, we continued this study in intuitionistic fuzzy networks.cs
dc.language.isoencs
dc.publisherMDPIcs
dc.relation.ispartofseriesMathematicscs
dc.relation.urihttps://doi.org/10.3390/math11102258cs
dc.rights© 2023 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution.cs
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/cs
dc.subjectefficient dominationcs
dc.subjectfuzzy networkcs
dc.subjectintuitionisticcs
dc.subjectgraphcs
dc.subjectencryption and decryptioncs
dc.titleApplication of fuzzy network using efficient dominationcs
dc.typearticlecs
dc.identifier.doi10.3390/math11102258
dc.rights.accessopenAccesscs
dc.type.versionpublishedVersioncs
dc.type.statusPeer-reviewedcs
dc.description.sourceWeb of Sciencecs
dc.description.volume11cs
dc.description.issue10cs
dc.description.firstpageart. no. 2258cs
dc.identifier.wos000997207500001


Soubory tohoto záznamu

Tento záznam se objevuje v následujících kolekcích

Zobrazit minimální záznam

© 2023 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution.
Kromě případů, kde je uvedeno jinak, licence tohoto záznamu je © 2023 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution.