Skip to main content

Compute the Approximate Minimum Dominating Set for undirected graph encoded in DIMACS format.

Project description

Furones: Approximate Dominating Set Solver

In Loving Memory of Asia Furones (The Grandmother I Never Knew)

This work builds upon The Furones Algorithm.


Overview of the Minimum Dominating Set (MDS)

Definition:

A dominating set in a graph $G = (V, E)$ is a subset $D \subseteq V$ such that every vertex not in $D$ is adjacent to at least one vertex in $D$. The minimum dominating set (MDS) is the smallest possible dominating set in terms of the number of vertices.

Key Concepts:

  1. Graph Representation:

    • $V$: Set of vertices.
    • $E$: Set of edges connecting the vertices.
  2. Dominating Set:

    • A set $D$ where for every vertex $v \in V$, either $v \in D$ or $v$ is adjacent to some vertex in $D$.
  3. Minimum Dominating Set:

    • The dominating set with the smallest cardinality (i.e., the fewest number of vertices).

Applications:

  • Network Design: Ensuring coverage in wireless sensor networks.
  • Social Networks: Identifying influential nodes.
  • Game Theory: Strategies in certain types of games.
  • Biology: Modeling protein-protein interaction networks.

Computational Complexity:

  • NP-Hard: Finding the minimum dominating set is computationally intensive for large graphs.
  • Approximation Algorithms: Used to find near-optimal solutions in polynomial time.

Algorithms:

  1. Greedy Algorithm:

    • Iteratively selects the vertex that covers the most uncovered vertices.
    • Provides a logarithmic approximation ratio.
  2. Integer Linear Programming (ILP):

    • Formulates the problem as an optimization problem.
    • Solvable using ILP solvers for exact solutions, though computationally expensive.
  3. Heuristics and Metaheuristics:

    • Genetic algorithms, simulated annealing, etc., for large-scale problems.

Challenges:

  • Scalability: Exact algorithms are infeasible for very large graphs.
  • Dynamic Graphs: Maintaining a minimum dominating set in graphs that change over time.

Research Directions:

  • Parallel Algorithms: Leveraging multi-core processors and distributed computing.
  • Machine Learning: Using learning-based approaches to predict dominating sets.
  • Hybrid Methods: Combining exact and heuristic methods for better performance.

Conclusion:

The minimum dominating set problem is a fundamental issue in graph theory with wide-ranging applications. While it is computationally challenging, various algorithms and heuristics provide practical solutions for different scenarios. Ongoing research continues to improve the efficiency and applicability of these methods.


Problem Statement

Input: A Boolean Adjacency Matrix $M$.

Answer: Find a Minimum Dominating Set.

Example Instance: 5 x 5 matrix

c1 c2 c3 c4 c5
r1 0 0 1 0 1
r2 0 0 0 1 0
r3 1 0 0 0 1
r4 0 1 0 0 0
r5 1 0 1 0 0

The input for undirected graph is typically provided in DIMACS format. In this way, the previous adjacency matrix is represented in a text file using the following string representation:

p edge 5 4
e 1 3
e 1 5
e 2 4
e 3 5

This represents a 5x5 matrix in DIMACS format such that each edge $(v,w)$ appears exactly once in the input file and is not repeated as $(w,v)$. In this format, every edge appears in the form of

e W V

where the fields W and V specify the endpoints of the edge while the lower-case character e signifies that this is an edge descriptor line.

Example Solution:

Dominating Set Found 2, 3: Nodes 2 and 3 constitute an optimal solution.


Compile and Environment

Prerequisites

  • Python ≥ 3.10

Installation

pip install furones

Execution

  1. Clone the repository:

    git clone https://github.com/frankvegadelgado/furones.git
    cd furones
    
  2. Run the script:

    asia -i ./benchmarks/testMatrix1
    

    utilizing the asia command provided by Furones's Library to execute the Boolean adjacency matrix furones\benchmarks\testMatrix1. The file testMatrix1 represents the example described herein. We also support .xz, .lzma, .bz2, and .bzip2 compressed text files.

    Example Output:

    testMatrix1: Dominating Set Found 2, 3
    

    This indicates nodes 2, 3 form a Dominating Set.


Dominating Set Size

Use the -c flag to count the nodes in the Dominating Set:

asia -i ./benchmarks/testMatrix2 -c

Output:

testMatrix2: Dominating Set Size 2

Command Options

Display help and options:

asia -h

Output:

usage: asia [-h] -i INPUTFILE [-a] [-b] [-c] [-v] [-l] [--version]

Solve the Approximate Minimum Dominating Set for undirected graph encoded in DIMACS format.

options:
  -h, --help            show this help message and exit
  -i INPUTFILE, --inputFile INPUTFILE
                        input file path
  -a, --approximation   enable comparison with a polynomial-time approximation approach within a logarithmic factor
  -b, --bruteForce      enable comparison with the exponential-time brute-force approach
  -c, --count           calculate the size of the Dominating Set
  -v, --verbose         anable verbose output
  -l, --log             enable file logging
  --version             show program's version number and exit

Batch Execution

Batch execution allows you to asia multiple graphs within a directory consecutively.

To view available command-line options for the batch_asia command, use the following in your terminal or command prompt:

batch_asia -h

This will display the following help information:

usage: batch_asia [-h] -i INPUTDIRECTORY [-a] [-b] [-c] [-v] [-l] [--version]

Solve the Approximate Minimum Dominating Set for all undirected graphs encoded in DIMACS format and stored in a directory.

options:
  -h, --help            show this help message and exit
  -i INPUTDIRECTORY, --inputDirectory INPUTDIRECTORY
                        Input directory path
  -a, --approximation   enable comparison with a polynomial-time approximation approach within a logarithmic factor
  -b, --bruteForce      enable comparison with the exponential-time brute-force approach
  -c, --count           calculate the size of the Dominating Set
  -v, --verbose         anable verbose output
  -l, --log             enable file logging
  --version             show program's version number and exit

Testing Application

A command-line utility named test_asia is provided for evaluating the Algorithm using randomly generated, large sparse matrices. It supports the following options:

usage: test_asia [-h] -d DIMENSION [-n NUM_TESTS] [-s SPARSITY] [-a] [-b] [-c] [-w] [-v] [-l] [--version]

The Furones Testing Application using randomly generated, large sparse matrices.

options:
  -h, --help            show this help message and exit
  -d DIMENSION, --dimension DIMENSION
                        an integer specifying the dimensions of the square matrices
  -n NUM_TESTS, --num_tests NUM_TESTS
                        an integer specifying the number of tests to run
  -s SPARSITY, --sparsity SPARSITY
                        sparsity of the matrices (0.0 for dense, close to 1.0 for very sparse)
  -a, --approximation   enable comparison with a polynomial-time approximation approach within a logarithmic factor
  -b, --bruteForce      enable comparison with the exponential-time brute-force approach
  -c, --count           calculate the size of the Dominating Set
  -w, --write           write the generated random matrix to a file in the current directory
  -v, --verbose         anable verbose output
  -l, --log             enable file logging
  --version             show program's version number and exit

Code

  • Python implementation by Frank Vega.

Complexity

+ We present a polynomial-time algorithm for MDS, providing strong evidence that P = NP by efficiently solving a computationally hard problem with near-optimal solutions.

License

  • MIT License.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

furones-0.2.2.tar.gz (32.9 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

furones-0.2.2-py3-none-any.whl (33.0 kB view details)

Uploaded Python 3

File details

Details for the file furones-0.2.2.tar.gz.

File metadata

  • Download URL: furones-0.2.2.tar.gz
  • Upload date:
  • Size: 32.9 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.12

File hashes

Hashes for furones-0.2.2.tar.gz
Algorithm Hash digest
SHA256 2cb3a51771e5a34eb3cd8da69999c8ad75e39c2f15fbc664545afc40cfdf551f
MD5 4f02fcfdb0e2c12218e6a95c7e24d1d3
BLAKE2b-256 d7b1160b884aab112a61f17c9fbf20cc71a282f8f2e18f1517d830903220c868

See more details on using hashes here.

Provenance

The following attestation bundles were made for furones-0.2.2.tar.gz:

Publisher: publish.yml on frankvegadelgado/furones

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file furones-0.2.2-py3-none-any.whl.

File metadata

  • Download URL: furones-0.2.2-py3-none-any.whl
  • Upload date:
  • Size: 33.0 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.12

File hashes

Hashes for furones-0.2.2-py3-none-any.whl
Algorithm Hash digest
SHA256 82036a849a7f9ccb1e19aa0fe08b758908a306350a935c487fabeb482eef0f4a
MD5 c8cc52b25207a0a6202321fd90a6745d
BLAKE2b-256 4a1a9e7502190d7b281ededdb9b739d8cd42ada66149378ba38c29ec95c197ca

See more details on using hashes here.

Provenance

The following attestation bundles were made for furones-0.2.2-py3-none-any.whl:

Publisher: publish.yml on frankvegadelgado/furones

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page