1,902 research outputs found
Algorithmic complexity of isolate secure domination in graphs
A dominating set S is an Isolate Dominating Set (IDS) if the induced subgraph G[S] has at least one isolated vertex. In this paper, we initiate the study of new domination parameter called, isolate secure domination. An isolate dominating set S subset of V is an isolate secure dominating set (ISDS), if for each vertex u is an element of V \ S, there exists a neighboring vertex v of u in S such that (S \ {v}) boolean OR {u} is an IDS of G. The minimum cardinality of an ISDS of G is called as an isolate secure domination number, and is denoted by gamma(0s) (G). We give isolate secure domination number of path and cycle graphs. Given a graph G = (V, E) and a positive integer k, the ISDM problem is to check whether G has an isolate secure dominating set of size at most k. We prove that ISDM is NP-complete even when restricted to bipartite graphs and split graphs. We also show that ISDM can be solved in linear time for graphs of bounded tree-width.Publisher's Versio
Algorithmic aspects of disjunctive domination in graphs
For a graph , a set is called a \emph{disjunctive
dominating set} of if for every vertex , is either
adjacent to a vertex of or has at least two vertices in at distance
from it. The cardinality of a minimum disjunctive dominating set of is
called the \emph{disjunctive domination number} of graph , and is denoted by
. The \textsc{Minimum Disjunctive Domination Problem} (MDDP)
is to find a disjunctive dominating set of cardinality .
Given a positive integer and a graph , the \textsc{Disjunctive
Domination Decision Problem} (DDDP) is to decide whether has a disjunctive
dominating set of cardinality at most . In this article, we first propose a
linear time algorithm for MDDP in proper interval graphs. Next we tighten the
NP-completeness of DDDP by showing that it remains NP-complete even in chordal
graphs. We also propose a -approximation
algorithm for MDDP in general graphs and prove that MDDP can not be
approximated within for any unless NP
DTIME. Finally, we show that MDDP is
APX-complete for bipartite graphs with maximum degree
Algorithmic Aspects of Secure Connected Domination in Graphs
Let be a simple, undirected and connected graph. A connected
dominating set is a secure connected dominating set of , if
for each , there exists such that
and the set is a connected dominating set
of . The minimum size of a secure connected dominating set of denoted by
, is called the secure connected domination number of .
Given a graph and a positive integer the Secure Connected Domination
(SCDM) problem is to check whether has a secure connected dominating set
of size at most In this paper, we prove that the SCDM problem is
NP-complete for doubly chordal graphs, a subclass of chordal graphs. We
investigate the complexity of this problem for some subclasses of bipartite
graphs namely, star convex bipartite, comb convex bipartite, chordal bipartite
and chain graphs. The Minimum Secure Connected Dominating Set (MSCDS) problem
is to find a secure connected dominating set of minimum size in the input
graph. We propose a - approximation algorithm for MSCDS,
where is the maximum degree of the input graph and prove
that MSCDS cannot be approximated within for any unless even for
bipartite graphs. Finally, we show that the MSCDS is APX-complete for graphs
with
Guarding Networks Through Heterogeneous Mobile Guards
In this article, the issue of guarding multi-agent systems against a sequence
of intruder attacks through mobile heterogeneous guards (guards with different
ranges) is discussed. The article makes use of graph theoretic abstractions of
such systems in which agents are the nodes of a graph and edges represent
interconnections between agents. Guards represent specialized mobile agents on
specific nodes with capabilities to successfully detect and respond to an
attack within their guarding range. Using this abstraction, the article
addresses the problem in the context of eternal security problem in graphs.
Eternal security refers to securing all the nodes in a graph against an
infinite sequence of intruder attacks by a certain minimum number of guards.
This paper makes use of heterogeneous guards and addresses all the components
of the eternal security problem including the number of guards, their
deployment and movement strategies. In the proposed solution, a graph is
decomposed into clusters and a guard with appropriate range is then assigned to
each cluster. These guards ensure that all nodes within their corresponding
cluster are being protected at all times, thereby achieving the eternal
security in the graph.Comment: American Control Conference, Chicago, IL, 201
- …