Skip to main content

Showing 1–5 of 5 results for author: Arumugam, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2401.02765  [pdf, ps, other

    math.CO cs.DM

    An improved upper bound for the domination number of a graph

    Authors: Subramanian Arumugam, Suresh Manjanath Hegde, Shashanka Kulamarva

    Abstract: Let $G$ be a graph of order $n$. A classical upper bound for the domination number of a graph $G$ having no isolated vertices is $\lfloor\frac{n}{2}\rfloor$. However, for several families of graphs, we have $γ(G) \le \lfloor\sqrt{n}\rfloor$ which gives a substantially improved upper bound. In this paper, we give a condition necessary for a graph $G$ to have $γ(G) \le \lfloor\sqrt{n}\rfloor$, and s… ▽ More

    Submitted 16 January, 2024; v1 submitted 5 January, 2024; originally announced January 2024.

    MSC Class: 05C69

  2. arXiv:2002.00713  [pdf, ps, other

    cs.DM cs.CC math.CO

    Algorithmic Complexity of Secure Connected Domination in Graphs

    Authors: Jakkepalli Pavan Kumar, P. Venkata Subba Reddy, S. Arumugam

    Abstract: Let $G = (V,E)$ be a simple, undirected and connected graph. A connected (total) dominating set $S \subseteq V$ is a secure connected (total) dominating set of $G$, if for each $ u \in V \setminus S$, there exists $v \in S$ such that $uv \in E$ and $(S \setminus \lbrace v \rbrace) \cup \lbrace u \rbrace $ is a connected (total) dominating set of $G$. The minimum cardinality of a secure connected (… ▽ More

    Submitted 3 February, 2020; originally announced February 2020.

    MSC Class: 05C69; 68Q25

  3. arXiv:1808.09556  [pdf, other

    cs.IT

    Embedding Covert Information in Broadcast Communications

    Authors: Keerthi Suria Kumar Arumugam, Matthieu R. Bloch

    Abstract: We analyze a two-receiver binary-input discrete memoryless broadcast channel, in which the transmitter communicates a common message simultaneously to both receivers and a covert message to only one of them. The unintended recipient of the covert message is treated as an adversary who attempts to detect the covert transmission. This model captures the problem of embedding covert messages in an inn… ▽ More

    Submitted 28 August, 2018; originally announced August 2018.

  4. arXiv:1803.06007  [pdf, other

    cs.IT

    Covert Communication over a K-User Multiple Access Channel

    Authors: Keerthi Suria Kumar Arumugam, Matthieu R. Bloch

    Abstract: We consider a scenario in which $K$ transmitters attempt to communicate covert messages reliably to a legitimate receiver over a discrete memoryless MAC while simultaneously esca** detection from an adversary who observes their communication through another discrete memoryless MAC. We assume that each transmitter may use a secret key that is shared only between itself and the legitimate receiver… ▽ More

    Submitted 7 June, 2019; v1 submitted 15 March, 2018; originally announced March 2018.

  5. arXiv:1001.5359  [pdf, other

    cs.CV

    Threshold Based Indexing of Commercial Shoe Print to Create Reference and Recovery Images

    Authors: S. Rathinavel, S. Arumugam

    Abstract: One of the important evidence in a crime scene that is normally overlooked but very important evidence is shoe print as the criminal is normally unaware of the mask for this. In this paper we use image processing technique to process reference shoe images to make it index-able for a search from the database the shoe print impressions available in the commercial market. This is achieved first by… ▽ More

    Submitted 29 January, 2010; originally announced January 2010.

    Comments: 4 pages, 8 figures

    Journal ref: InterJRI Computer Science and Networking, Volume 1, pp 49-52, 2009