Skip to main content

Compute the Approximate Minimum Dominating Set for undirected graph encoded in DIMACS format.

Project description

Furones: Approximate Dominating Set Solver

In Loving Memory of Asia Furones (The Grandmother I Never Knew)

This work builds upon The Furones Algorithm.


Overview of the Minimum Dominating Set (MDS)

Definition:

A dominating set in a graph $G = (V, E)$ is a subset $D \subseteq V$ such that every vertex not in $D$ is adjacent to at least one vertex in $D$. The minimum dominating set (MDS) is the smallest possible dominating set in terms of the number of vertices.

Key Concepts:

  1. Graph Representation:

    • $V$: Set of vertices.
    • $E$: Set of edges connecting the vertices.
  2. Dominating Set:

    • A set $D$ where for every vertex $v \in V$, either $v \in D$ or $v$ is adjacent to some vertex in $D$.
  3. Minimum Dominating Set:

    • The dominating set with the smallest cardinality (i.e., the fewest number of vertices).

Applications:

  • Network Design: Ensuring coverage in wireless sensor networks.
  • Social Networks: Identifying influential nodes.
  • Game Theory: Strategies in certain types of games.
  • Biology: Modeling protein-protein interaction networks.

Computational Complexity:

  • NP-Hard: Finding the minimum dominating set is computationally intensive for large graphs.
  • Approximation Algorithms: Used to find near-optimal solutions in polynomial time.

Algorithms:

  1. Greedy Algorithm:

    • Iteratively selects the vertex that covers the most uncovered vertices.
    • Provides a logarithmic approximation ratio.
  2. Integer Linear Programming (ILP):

    • Formulates the problem as an optimization problem.
    • Solvable using ILP solvers for exact solutions, though computationally expensive.
  3. Heuristics and Metaheuristics:

    • Genetic algorithms, simulated annealing, etc., for large-scale problems.

Challenges:

  • Scalability: Exact algorithms are infeasible for very large graphs.
  • Dynamic Graphs: Maintaining a minimum dominating set in graphs that change over time.

Research Directions:

  • Parallel Algorithms: Leveraging multi-core processors and distributed computing.
  • Machine Learning: Using learning-based approaches to predict dominating sets.
  • Hybrid Methods: Combining exact and heuristic methods for better performance.

Conclusion:

The minimum dominating set problem is a fundamental issue in graph theory with wide-ranging applications. While it is computationally challenging, various algorithms and heuristics provide practical solutions for different scenarios. Ongoing research continues to improve the efficiency and applicability of these methods.


Problem Statement

Input: A Boolean Adjacency Matrix $M$.

Answer: Find a Minimum Dominating Set.

Example Instance: 5 x 5 matrix

c1 c2 c3 c4 c5
r1 0 0 1 0 1
r2 0 0 0 1 0
r3 1 0 0 0 1
r4 0 1 0 0 0
r5 1 0 1 0 0

The input for undirected graph is typically provided in DIMACS format. In this way, the previous adjacency matrix is represented in a text file using the following string representation:

p edge 5 4
e 1 3
e 1 5
e 2 4
e 3 5

This represents a 5x5 matrix in DIMACS format such that each edge $(v,w)$ appears exactly once in the input file and is not repeated as $(w,v)$. In this format, every edge appears in the form of

e W V

where the fields W and V specify the endpoints of the edge while the lower-case character e signifies that this is an edge descriptor line.

Example Solution:

Dominating Set Found 2, 3: Nodes 2 and 3 constitute an optimal solution.


Compile and Environment

Prerequisites

  • Python ≥ 3.10

Installation

pip install furones

Execution

  1. Clone the repository:

    git clone https://github.com/frankvegadelgado/furones.git
    cd furones
    
  2. Run the script:

    asia -i ./benchmarks/testMatrix1
    

    utilizing the asia command provided by Furones's Library to execute the Boolean adjacency matrix furones\benchmarks\testMatrix1. The file testMatrix1 represents the example described herein. We also support .xz, .lzma, .bz2, and .bzip2 compressed text files.

    Example Output:

    testMatrix1: Dominating Set Found 2, 3
    

    This indicates nodes 2, 3 form a Dominating Set.


Dominating Set Size

Use the -c flag to count the nodes in the Dominating Set:

asia -i ./benchmarks/testMatrix2 -c

Output:

testMatrix2: Dominating Set Size 2

Command Options

Display help and options:

asia -h

Output:

usage: asia [-h] -i INPUTFILE [-a] [-b] [-c] [-v] [-l] [--version]

Solve the Approximate Minimum Dominating Set for undirected graph encoded in DIMACS format.

options:
  -h, --help            show this help message and exit
  -i INPUTFILE, --inputFile INPUTFILE
                        input file path
  -a, --approximation   enable comparison with a polynomial-time approximation approach within a logarithmic factor
  -b, --bruteForce      enable comparison with the exponential-time brute-force approach
  -c, --count           calculate the size of the Dominating Set
  -v, --verbose         anable verbose output
  -l, --log             enable file logging
  --version             show program's version number and exit

Batch Execution

Batch execution allows you to asia multiple graphs within a directory consecutively.

To view available command-line options for the batch_asia command, use the following in your terminal or command prompt:

batch_asia -h

This will display the following help information:

usage: batch_asia [-h] -i INPUTDIRECTORY [-a] [-b] [-c] [-v] [-l] [--version]

Solve the Approximate Minimum Dominating Set for all undirected graphs encoded in DIMACS format and stored in a directory.

options:
  -h, --help            show this help message and exit
  -i INPUTDIRECTORY, --inputDirectory INPUTDIRECTORY
                        Input directory path
  -a, --approximation   enable comparison with a polynomial-time approximation approach within a logarithmic factor
  -b, --bruteForce      enable comparison with the exponential-time brute-force approach
  -c, --count           calculate the size of the Dominating Set
  -v, --verbose         anable verbose output
  -l, --log             enable file logging
  --version             show program's version number and exit

Testing Application

A command-line utility named test_asia is provided for evaluating the Algorithm using randomly generated, large sparse matrices. It supports the following options:

usage: test_asia [-h] -d DIMENSION [-n NUM_TESTS] [-s SPARSITY] [-a] [-b] [-c] [-w] [-v] [-l] [--version]

The Furones Testing Application using randomly generated, large sparse matrices.

options:
  -h, --help            show this help message and exit
  -d DIMENSION, --dimension DIMENSION
                        an integer specifying the dimensions of the square matrices
  -n NUM_TESTS, --num_tests NUM_TESTS
                        an integer specifying the number of tests to run
  -s SPARSITY, --sparsity SPARSITY
                        sparsity of the matrices (0.0 for dense, close to 1.0 for very sparse)
  -a, --approximation   enable comparison with a polynomial-time approximation approach within a logarithmic factor
  -b, --bruteForce      enable comparison with the exponential-time brute-force approach
  -c, --count           calculate the size of the Dominating Set
  -w, --write           write the generated random matrix to a file in the current directory
  -v, --verbose         anable verbose output
  -l, --log             enable file logging
  --version             show program's version number and exit

Code

  • Python implementation by Frank Vega.

Complexity

+ We present a polynomial-time algorithm for MDS, providing strong evidence that P = NP by efficiently solving a computationally hard problem with near-optimal solutions.

License

  • MIT License.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

furones-0.2.4.tar.gz (32.2 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

furones-0.2.4-py3-none-any.whl (32.2 kB view details)

Uploaded Python 3

File details

Details for the file furones-0.2.4.tar.gz.

File metadata

  • Download URL: furones-0.2.4.tar.gz
  • Upload date:
  • Size: 32.2 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.12

File hashes

Hashes for furones-0.2.4.tar.gz
Algorithm Hash digest
SHA256 6b9f2032e1e510519b8aafc94a203d5925fb19c5525a3431af10df2677dbfc01
MD5 696873487bff5fb7c77a1054ede62f7c
BLAKE2b-256 7e703b215bccdd1b29b7d47e1fc93dea594a7381a3d702155bf0e5023905719a

See more details on using hashes here.

Provenance

The following attestation bundles were made for furones-0.2.4.tar.gz:

Publisher: publish.yml on frankvegadelgado/furones

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file furones-0.2.4-py3-none-any.whl.

File metadata

  • Download URL: furones-0.2.4-py3-none-any.whl
  • Upload date:
  • Size: 32.2 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.12

File hashes

Hashes for furones-0.2.4-py3-none-any.whl
Algorithm Hash digest
SHA256 80ea22b84b492ddf1d9ca78d2e3779ad3805f21002bd84bf99b64900d3ecce52
MD5 5adb6ba2e8beb794070651bc7a65c2b8
BLAKE2b-256 e6cbf0474747b3235c1b87e9cca9b84a2e1f9c80bfbdfb73fcecf56a840d01d9

See more details on using hashes here.

Provenance

The following attestation bundles were made for furones-0.2.4-py3-none-any.whl:

Publisher: publish.yml on frankvegadelgado/furones

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page