Skip to main content

Compute the Approximate Minimum Dominating Set for undirected graph encoded in DIMACS format.

Project description

Furones: Approximate Dominating Set Solver

In Loving Memory of Asia Furones (The Grandmother I Never Knew)

This work builds upon The Furones Algorithm.


Overview of the Minimum Dominating Set (MDS)

Definition:

A dominating set in a graph $G = (V, E)$ is a subset $D \subseteq V$ such that every vertex not in $D$ is adjacent to at least one vertex in $D$. The minimum dominating set (MDS) is the smallest possible dominating set in terms of the number of vertices.

Key Concepts:

  1. Graph Representation:

    • $V$: Set of vertices.
    • $E$: Set of edges connecting the vertices.
  2. Dominating Set:

    • A set $D$ where for every vertex $v \in V$, either $v \in D$ or $v$ is adjacent to some vertex in $D$.
  3. Minimum Dominating Set:

    • The dominating set with the smallest cardinality (i.e., the fewest number of vertices).

Applications:

  • Network Design: Ensuring coverage in wireless sensor networks.
  • Social Networks: Identifying influential nodes.
  • Game Theory: Strategies in certain types of games.
  • Biology: Modeling protein-protein interaction networks.

Computational Complexity:

  • NP-Hard: Finding the minimum dominating set is computationally intensive for large graphs.
  • Approximation Algorithms: Used to find near-optimal solutions in polynomial time.

Algorithms:

  1. Greedy Algorithm:

    • Iteratively selects the vertex that covers the most uncovered vertices.
    • Provides a logarithmic approximation ratio.
  2. Integer Linear Programming (ILP):

    • Formulates the problem as an optimization problem.
    • Solvable using ILP solvers for exact solutions, though computationally expensive.
  3. Heuristics and Metaheuristics:

    • Genetic algorithms, simulated annealing, etc., for large-scale problems.

Challenges:

  • Scalability: Exact algorithms are infeasible for very large graphs.
  • Dynamic Graphs: Maintaining a minimum dominating set in graphs that change over time.

Research Directions:

  • Parallel Algorithms: Leveraging multi-core processors and distributed computing.
  • Machine Learning: Using learning-based approaches to predict dominating sets.
  • Hybrid Methods: Combining exact and heuristic methods for better performance.

Conclusion:

The minimum dominating set problem is a fundamental issue in graph theory with wide-ranging applications. While it is computationally challenging, various algorithms and heuristics provide practical solutions for different scenarios. Ongoing research continues to improve the efficiency and applicability of these methods.


Problem Statement

Input: A Boolean Adjacency Matrix $M$.

Answer: Find a Minimum Dominating Set.

Example Instance: 5 x 5 matrix

c1 c2 c3 c4 c5
r1 0 0 1 0 1
r2 0 0 0 1 0
r3 1 0 0 0 1
r4 0 1 0 0 0
r5 1 0 1 0 0

The input for undirected graph is typically provided in DIMACS format. In this way, the previous adjacency matrix is represented in a text file using the following string representation:

p edge 5 4
e 1 3
e 1 5
e 2 4
e 3 5

This represents a 5x5 matrix in DIMACS format such that each edge $(v,w)$ appears exactly once in the input file and is not repeated as $(w,v)$. In this format, every edge appears in the form of

e W V

where the fields W and V specify the endpoints of the edge while the lower-case character e signifies that this is an edge descriptor line.

Example Solution:

Dominating Set Found 4, 5: Nodes 4 and 5 constitute an optimal solution.


Compile and Environment

Prerequisites

  • Python ≥ 3.10

Installation

pip install furones

Execution

  1. Clone the repository:

    git clone https://github.com/frankvegadelgado/furones.git
    cd furones
    
  2. Run the script:

    asia -i ./benchmarks/testMatrix1
    

    utilizing the asia command provided by Furones's Library to execute the Boolean adjacency matrix furones\benchmarks\testMatrix1. The file testMatrix1 represents the example described herein. We also support .xz, .lzma, .bz2, and .bzip2 compressed text files.

    Example Output:

    testMatrix1: Dominating Set Found 4, 5
    

    This indicates nodes 4, 5 form a Dominating Set.


Dominating Set Size

Use the -c flag to count the nodes in the Dominating Set:

asia -i ./benchmarks/testMatrix2 -c

Output:

testMatrix2: Dominating Set Size 2

Command Options

Display help and options:

asia -h

Output:

usage: asia [-h] -i INPUTFILE [-a] [-b] [-c] [-v] [-l] [--version]

Solve the Approximate Minimum Dominating Set for undirected graph encoded in DIMACS format.

options:
  -h, --help            show this help message and exit
  -i INPUTFILE, --inputFile INPUTFILE
                        input file path
  -a, --approximation   enable comparison with a polynomial-time approximation approach within a logarithmic factor
  -b, --bruteForce      enable comparison with the exponential-time brute-force approach
  -c, --count           calculate the size of the Dominating Set
  -v, --verbose         anable verbose output
  -l, --log             enable file logging
  --version             show program's version number and exit

Batch Execution

Batch execution allows you to asia multiple graphs within a directory consecutively.

To view available command-line options for the batch_asia command, use the following in your terminal or command prompt:

batch_asia -h

This will display the following help information:

usage: batch_asia [-h] -i INPUTDIRECTORY [-a] [-b] [-c] [-v] [-l] [--version]

Solve the Approximate Minimum Dominating Set for all undirected graphs encoded in DIMACS format and stored in a directory.

options:
  -h, --help            show this help message and exit
  -i INPUTDIRECTORY, --inputDirectory INPUTDIRECTORY
                        Input directory path
  -a, --approximation   enable comparison with a polynomial-time approximation approach within a logarithmic factor
  -b, --bruteForce      enable comparison with the exponential-time brute-force approach
  -c, --count           calculate the size of the Dominating Set
  -v, --verbose         anable verbose output
  -l, --log             enable file logging
  --version             show program's version number and exit

Testing Application

A command-line utility named test_asia is provided for evaluating the Algorithm using randomly generated, large sparse matrices. It supports the following options:

usage: test_asia [-h] -d DIMENSION [-n NUM_TESTS] [-s SPARSITY] [-a] [-b] [-c] [-w] [-v] [-l] [--version]

The Furones Testing Application using randomly generated, large sparse matrices.

options:
  -h, --help            show this help message and exit
  -d DIMENSION, --dimension DIMENSION
                        an integer specifying the dimensions of the square matrices
  -n NUM_TESTS, --num_tests NUM_TESTS
                        an integer specifying the number of tests to run
  -s SPARSITY, --sparsity SPARSITY
                        sparsity of the matrices (0.0 for dense, close to 1.0 for very sparse)
  -a, --approximation   enable comparison with a polynomial-time approximation approach within a logarithmic factor
  -b, --bruteForce      enable comparison with the exponential-time brute-force approach
  -c, --count           calculate the size of the Dominating Set
  -w, --write           write the generated random matrix to a file in the current directory
  -v, --verbose         anable verbose output
  -l, --log             enable file logging
  --version             show program's version number and exit

Code

  • Python implementation by Frank Vega.

Complexity

+ We present a linear-time algorithm for MDS, providing strong evidence that P = NP by efficiently solving a computationally hard problem with near-optimal solutions.

License

  • MIT License.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

furones-0.1.5.tar.gz (18.9 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

furones-0.1.5-py3-none-any.whl (18.9 kB view details)

Uploaded Python 3

File details

Details for the file furones-0.1.5.tar.gz.

File metadata

  • Download URL: furones-0.1.5.tar.gz
  • Upload date:
  • Size: 18.9 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.12

File hashes

Hashes for furones-0.1.5.tar.gz
Algorithm Hash digest
SHA256 c8ea6eed049bc8e0c187b40b5cdef45c2ce2988ef7e5632ee37a0890783a4e05
MD5 04ddaa3ff94924b6ffe78fc1b3ab602d
BLAKE2b-256 cad3025e31d0ed6bdde0ddeb1ebd664d604ae7f35b3ae8ae214c753f50a07f14

See more details on using hashes here.

Provenance

The following attestation bundles were made for furones-0.1.5.tar.gz:

Publisher: publish.yml on frankvegadelgado/furones

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file furones-0.1.5-py3-none-any.whl.

File metadata

  • Download URL: furones-0.1.5-py3-none-any.whl
  • Upload date:
  • Size: 18.9 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.12

File hashes

Hashes for furones-0.1.5-py3-none-any.whl
Algorithm Hash digest
SHA256 c16f9a47a3848c55cb82956aa0db8a102ef76fa466b0390d03c966ab1b64d2ef
MD5 aed1966cc33688b80aeccdbf3997c969
BLAKE2b-256 2bd0da6bf28238aa0e2b763e67597f733c4e0027d931c0c84845ccd61bdfa1f0

See more details on using hashes here.

Provenance

The following attestation bundles were made for furones-0.1.5-py3-none-any.whl:

Publisher: publish.yml on frankvegadelgado/furones

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page