Affiliation:
1. Department of Computer Science and Engineering , National Institute of Technology , Warangal , Telangana , India .
Abstract
Abstract
A set S ⊆ V is a dominating set in G if for every u ∈ V \ S, there exists v ∈ S such that (u, v) ∈ E, i.e., N[S] = V . A dominating set S is an isolate dominating set (IDS) if the induced subgraph G[S] has at least one isolated vertex. It is known that Isolate Domination Decision problem (IDOM) is NP-complete for bipartite graphs. In this paper, we extend this by showing that the IDOM is NP-complete for split graphs and perfect elimination bipartite graphs, a subclass of bipartite graphs. A set S ⊆ V is an independent set if G[S] has no edge. A set S ⊆ V is a secure dominating set of G if, for each vertex u ∈ V \ S, there exists a vertex v ∈ S such that (u, v) ∈ E and (S \ {v}) ∪ {u} is a dominating set of G. In addition, we initiate the study of a new domination parameter called, independent secure domination. A set S ⊆ V is an independent secure dominating set (InSDS) if S is an independent set and a secure dominating set of G. The minimum size of an InSDS in G is called the independent secure domination number of G and is denoted by γ
is
(G). Given a graph G and a positive integer k, the InSDM problem is to check whether G has an independent secure dominating set of size at most k. We prove that InSDM is NP-complete for bipartite graphs and linear time solvable for bounded tree-width graphs and threshold graphs, a subclass of split graphs. The MInSDS problem is to find an independent secure dominating set of minimum size, in the input graph. Finally, we show that the MInSDS problem is APX-hard for graphs with maximum degree 5.
Reference18 articles.
1. [1] A.A. Bertossi, Dominating sets for split and bipartite graphs. Information Processing Letters, 19 (1984), no. 1, pp.37-40.
2. [2] M. Chlebík and J. Chlebíkov, The complexity of combinatorial optimization problems on d-dimensional boxes. SIAM Journal on Discrete Mathematics, 21 (2007), no. 1, pp.158-169.
3. [3] E.J. Cockayne, P.J.P. Grobler, W.R. Grundlingh, J. Munganga, and J.H. van Vuuren, Protection of a graph, Utilitas Mathematica, 67 (2005), pp. 19-32.
4. [4] D.G. Corneil, and Y. Perl, Clustering and domination in perfect graphs, Discrete Applied Mathematics, 9 (1984), pp. 27-39.
5. [5] B. Courcelle, The monadic second-order logic of graphs. I. Recognizable sets of finite graphs, Inform. and Comp. 85(1) (1990) 64-75.
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Algorithmic Aspects of Outer-Independent Double Roman Domination in Graphs;International Journal of Foundations of Computer Science;2024-03-28
2. Application of ID3 Decision Tree Classification Algorithm in Mathematical data Analysis;2023 International Conference on Integrated Intelligence and Communication Systems (ICIICS);2023-11-24
3. Algorithmic aspects of 2-secure domination in graphs;Journal of Combinatorial Optimization;2021-04-16