Search results for: WEAKLY CONVEX DOMINATING SET - Bridge of Knowledge

Search

Search results for: WEAKLY CONVEX DOMINATING SET

Search results for: WEAKLY CONVEX DOMINATING SET

  • Non-isolating bondage in graphs

    A dominating set of a graph $G = (V,E)$ is a set $D$ of vertices of $G$ such that every vertex of $V(G) \setminus D$ has a neighbor in $D$. The domination number of a graph $G$, denoted by $\gamma(G)$, is the minimum cardinality of a dominating set of $G$. The non-isolating bondage number of $G$, denoted by $b'(G)$, is the minimum cardinality among all sets of edges $E' \subseteq E$ such that $\delta(G-E') \ge 1$ and $\gamma(G-E')...

    Full text available to download

  • Certified domination

    Publication

    Imagine that we are given a set D of officials and a set W of civils. For each civil x ∈ W, there must be an official v ∈ D that can serve x, and whenever any such v is serving x, there must also be another civil w ∈ W that observes v, that is, w may act as a kind of witness, to avoid any abuse from v. What is the minimum number of officials to guarantee such a service, assuming a given social network? In this paper, we introduce...

    Full text available to download

  • Complexity Issues on of Secondary Domination Number

    Publication

    - ALGORITHMICA - Year 2023

    In this paper we study the computational complexity issues of the problem of secondary domination (known also as (1, 2)-domination) in several graph classes. We also study the computational complexity of the problem of determining whether the domination and secondary domination numbers are equal. In particular, we study the influence of triangles and vertices of degree 1 on these numbers. Also, an optimal algorithm for finding...

    Full text available to download

  • Scattering and Propagation Analysis for the Multilayered Structures Based on Field Matching Technique

    Publication

    A semi-analytical method is employed to the analysis of scattering and guiding problems in multilayer dielectric structures. The approach allows to investigate objects with arbitrary convex cross section and is based on the direct field matching technique involving the usage of the field projection at the boundary on a fixed set of orthogonal basis functions. For the scattering problems the scattered field in the far zone is calculated...

    Full text available to download

  • Common Independence in Graphs

    Publication

    - Symmetry-Basel - Year 2021

    Abstract: The cardinality of a largest independent set of G, denoted by α(G), is called the independence number of G. The independent domination number i(G) of a graph G is the cardinality of a smallest independent dominating set of G. We introduce the concept of the common independence number of a graph G, denoted by αc(G), as the greatest integer r such that every vertex of G belongs to some independent subset X of VG with |X|...

    Full text available to download

  • Corrosion degradation monitoring of ship stiffened plates using guided wave phase velocity and constrained convex optimization method

    The study presents an experimental investigation on the corrosion degradation level assessment using nondestructive wave-based methods. The degradation level of ship structural elements has been assessed in two different ways. The first one is based on the spectral decomposition and zero-crossing incorporated reconstruction of the dispersion curve approach of the antisymmetric Lamb wave mode and the best matching of the theoretical...

    Full text available to download

  • INFLUENCE OF A VERTEX REMOVING ON THE CONNECTED DOMINATION NUMBER – APPLICATION TO AD-HOC WIRELESS NETWORKS

    Publication

    - Year 2015

    A minimum connected dominating set (MCDS) can be used as virtual backbone in ad-hoc wireless networks for efficient routing and broadcasting tasks. To find the MCDS is an NP- complete problem even in unit disk graphs. Many suboptimal algorithms are reported in the literature to find the MCDS using local information instead to use global network knowledge, achieving an important reduction in complexity. Since a wireless network...

    Full text to download in external service

  • Strategic balance in graphs

    For a given graph G, a nonempty subset S contained in V ( G ) is an alliance iff for each vertex v ∈ S there are at least as many vertices from the closed neighbourhood of v in S as in V ( G ) − S. An alliance is global if it is also a dominating set of G. The alliance partition number of G was defined in Hedetniemi et al. (2004) to be the maximum number of sets in a partition of V ( G ) such that each set is an alliance. Similarly,...

    Full text available to download

  • Modele i algorytmy dla grafowych struktur defensywnych

    Publication

    - Year 2023

    W niniejszej pracy przeprowadzono analizę złożoności istnienia struktur defensywnych oraz równowag strategicznych w grafach. W przypadku struktur defensywnych badano modele koalicji defensywnych, zbiorów defensywnych i koalicji krawędziowych – każdy z nich w wersji globalnej, tj. z wymogiem dominacji całego grafu. W przypadku modeli równowagi strategicznej badano równowagę strategiczną koalicji defensywnych, równowagę strategiczną...

    Full text available to download

  • On the size of identifying codes in triangle-free graphs

    Publication

    - DISCRETE APPLIED MATHEMATICS - Year 2012

    In an undirected graph G, a subset C⊆V(G) such that C is a dominating set of G, and each vertex in V(G) is dominated by a distinct subset of vertices from C, is called an identifying code of G. The concept of identifying codes was introduced by Karpovsky, Chakrabarty and Levitin in 1998. For a given identifiable graph G, let gammaID(G) be the minimum cardinality of an identifying code in G. In this paper, we show that for any connected...

    Full text available to download

  • Numerical Analysis of Recharge Rates and Contaminant Travel Time in Layered Unsaturated Soils

    Publication

    This study focused on the estimation of groundwater recharge rates and travel time of conservative contaminants between ground surface and aquifer. Numerical simulations of transient water flow and solute transport were performed using the SWAP computer program for 10 layered soil profiles, composed of materials ranging from gravel to clay. In particular, sensitivity of the results to the thickness and position of weakly permeable...

    Full text available to download

  • Global defensive secure structures

    Publication

    Let S ⊂ V (G) for a given simple non-empty graph G. We define for any nonempty subset X of S the predicate SECG,S(X) = true iff |NG[X]∩S| ≥ |NG[X]\S|. Let H be a non-empty family of graphs such that for each vertex v ∈ V (G) there is a subgraph H of G containing v and isomorphic to a member of H. We introduce the concept of H-alliance extending the concept of global defensive secure structures. By an H-alliance in a graph G we...

    Full text to download in external service

  • Amplifying the Randomness of Weak Sources Correlated With Devices

    Publication

    - IEEE TRANSACTIONS ON INFORMATION THEORY - Year 2017

    The problem of device-independent randomness amplification against no-signaling adversaries has so far been studied under the assumption that the weak source of randomness is uncorrelated with the (quantum) devices used in the amplification procedure. In this paper, we relax this assumption, and reconsider the original protocol of Colbeck and Renner using a Santha-Vazirani (SV) source. To do so, we introduce an SV-like condition...

    Full text to download in external service

  • Nutrient loss from three small-size watersheds in the southern Baltic Sea in relation to agricultural practices and policy

    Agriculture is the major contributor of waterborne nutrient fluxes into the Baltic Sea, one of the world’s most eutrophication-sensitive areas. Poland, as a large, densely populated state ohf the Baltic Region, with dominating agricultural land use, largely contributes to riverborne loads of N and P. The aim of our study was to examine the input of nutrients from three small first-order agricultural watersheds (Bladzikowski Stream,...

    Full text available to download