SlideShare a Scribd company logo
1 of 2
Download to read offline
International Journal of Engineering Research and Development
eISSN : 2278-067X, pISSN : 2278-800X, www.ijerd.com
Volume 2, Issue 2 (July 2012), PP. 42-43

                       Efficient dominating sets in ladder graphs
                                      Z.Mostaghim1, A.Sayed Khalkhali2
                     1,2
                           School of Mathematics, Iran University of Science and Technology, Tehran, Iran



Abstract––An independent set 𝑺 of vertices in a graph is an efficient dominating set when each vertex not in 𝑺
is adjacent to exactly one vertex in 𝑺. In this note, we prove that a ladder graph 𝑳 𝒏 has an efficient dominating set
if and only if 𝒏 be a multiple of 4. Also we determine the domination number of a ladder graph 𝑳 𝒏.

Keywords––Efficient dominating set, Perfect code, Domination number,Ladder graph,Sphere packing

                                                I.       INTRODUCTION
           LetΓ = 𝑉, 𝐸 be a finite undirected graph with no loops and multiple edges. We follow the terminology of [2] and
[3]. Given 𝑆 ⊆ 𝑉, let the open neighbourhood 𝑁(𝑆) of 𝑆in Γ be the subset of vertices in 𝑉𝑆 adjacent to some vertex in 𝑆,
and let the corresponding closed neighbourhood be 𝑁[𝑆] = 𝑁 𝑆 ⋃𝑆. A set 𝑆 ⊂ 𝑉 is a dominating set if 𝑁 𝑆 = 𝑉, that is,
every vertex in 𝑉𝑆 is adjacent to some vertex in 𝑆. The domination number 𝛾 Γ is the minimum cardinality of a dominating
set inΓ. If the dominating set 𝑆 is a stable set of Γ, then 𝑆 is an independent dominating set. Also, when every vertex in 𝑉𝑆
is adjacent to exactly one vertex in 𝑆, then 𝑆 is a perfect dominating set. A dominating set 𝑆 which is both independent and
perfect is an efficient dominating set. In what follows we may refer to an efficient dominating set as an 𝐸-set. Given the
graph Γ = 𝑉, 𝐸 , we call any subset 𝐶 of 𝑉 a code in Γ.

          We say that 𝐶 corrects 𝑡 errors if and only if the sets 𝑆 𝑐 ={𝑢|𝑢𝜖𝑉, 𝑑(𝑢, 𝑐) ≤ 𝑡} are pairwise disjoint. Morever we
call 𝐶 a 𝑡-perfect code if and only if these sets form a partition of 𝑉. A 𝑡-perfect code 𝐶 is called nontrivial if and only if
𝑡 > 0 and 𝑐𝑎𝑟𝑑 𝐶 > 1.

             𝐸-sets correspond to perfect 1-correcting codes in Γ,as treated by Biggs[1] and Kratochvil[4]. Equivalently, they
provide a perfect packing of Γ by balls of radius 1. When Γ is r-regular, the so-called sphere packing condition
                                                           𝑉 = 𝑟 + 1 |𝐶|
is trivially a necessary condition for 𝐶 to be an 𝐸-set of Γ.

           We need the following two results from [3]. We recall that the maximum degrees of vertices of Γ is denoted by
Δ Γ .

Theorem 1.1For any graph Γ of order n,
                                                       𝑛
                                                             ≤ 𝛾(Γ) ≤ 𝑛 − Δ(Γ)
                                                     1+Δ Γ

Theorem 1.2 If Γhas an efficient dominating set, then the cardinality of any efficient dominating set equals the domination
number 𝛾 Γ . In particular, all efficient dominating sets of Γhave the same cardinality.

                                             II.       THE MAIN RESULTS
We use the following remark in the sequel

Remark. Suppose that 𝑛(> 1)be a natural number, the dihedral group 𝐷2𝑛 of order 2𝑛 is defined by thepresentation
                                             𝐷2𝑛 =< 𝑥, 𝑦|𝑥 𝑛 = 𝑦 2 = 𝑥𝑦 2 = 1 >.
Then the distinct elements of 𝐷2𝑛 are as follows:
                                                 1, 𝑥, … , 𝑥 𝑛−1 , 𝑦, 𝑥𝑦, … , 𝑥 𝑛−1 𝑦 .
The Cayley graph 𝐶(𝐷2𝑛 , 𝑋) of 𝐷2𝑛 with respect to the generating set𝑋 = {𝑥, 𝑥 −1,y} is a ladder graph 𝐿 𝑛 .

Theorem 2.1 Let 𝐿 𝑛 be a ladder graph of order 2𝑛. Then the domination number of 𝐿 𝑛 is determined as follows:
                                                             𝑛
                                                            2        4|𝑛
                                                          𝑛
                                              𝛾 𝐿𝑛 =        + 1 𝑖𝑓2|𝑛 , 4 ∤ 𝑛
                                                         2
                                                          𝑛         2∤ 𝑛
                                                             +1
                                                         2




                                                               42
Efficient dominating sets in ladder graphs
Proof.If 4|𝑛, then 𝑛 = 4𝑘for some natural number𝑘.Let𝑆 = {1, 𝑥 4 , 𝑥 8 , … , 𝑥 4𝑘−4 , 𝑥 2 𝑦,𝑥 6 𝑦, … , 𝑥 4𝑘−2 𝑦}. We show that 𝑆 is a
                                          𝑛
dominating set. It is easy to see that 𝑆 = = 2𝑘.Since𝐿 𝑛 ≅ 𝐶(𝐷2𝑛 ,𝑋) then for all 𝑖, 2 ≤ 𝑖 ≤ 𝑛 − 1, a vertex 𝑥 𝑖 is adjacent
                                              2
to three vertices 𝑥 𝑖+1 , 𝑥 𝑖−1 and 𝑥 𝑖 𝑦. There are 3 cases.
If 4|𝑖, then 𝑥 𝑖 ∈ 𝑆.
If 2|𝑖and4 ∤ 𝑖,then𝑥 𝑖 𝑦 ∈ 𝑆.
If 2 ∤ 𝑖, then 𝑖 = 4𝑚 − 1 or 𝑖 = 4𝑚 + 1 for some natural number𝑚.
If 𝑖 = 4𝑚 − 1, then 𝑥 𝑖+1 ∈ 𝑆 and if 𝑖 = 4𝑚 + 1, then 𝑥 𝑖−1 ∈ 𝑆.
Similarly, for all 𝑖, 1 ≤ 𝑖 ≤ 𝑛 − 1, a vertex 𝑥 𝑖 𝑦 is adjacent to some vertex in 𝑆. For three vertices 1, 𝑥 𝑛−1 , 𝑦, we have 1 ∈ 𝑆
and 𝑦, 𝑥 𝑛−1 are adjacent to 1. So 𝑆 is a dominating set. Since𝐿 𝑛 is a 3-regular graph, it follows from sphere packing
condition that
                                                                                   𝑛
                                                                       𝛾(𝐿 𝑛 ) ≥
                                                                                  2
                                                          𝑛                                  𝑛
Also 𝑆 is a dominating set of 𝐿 𝑛 which 𝑆 = . Hence it follows that 𝛾 𝐿 𝑛 = ; 𝑛 = 4𝑘 .
                                                          2                                  2
If 𝑛be odd, then we have 2 cases.
Case1:𝑛 = 4𝑘 + 1 for some natural number 𝑘.
In this case, let 𝑆 = 1, 𝑥 4 , 𝑥 8 , … , 𝑥 4𝑘 , 𝑥 2 𝑦, 𝑥 6 𝑦, … 𝑥 4𝑘−2 𝑦 ,then
                                                                                 4𝑘 + 1
                                                              𝑆 = 2𝑘 + 1 =              + 1.
                                                                                    2
                                                                               𝑛                  𝑛
It is easy to see that 𝑆 is a dominating set, and by theorem 1.1,                 +1 ≤ 𝛾 𝐿𝑛 ≤ 𝑆 =   + 1.
                                                                       2                        2
                        𝑛
Therefore, 𝛾 𝐿 𝑛 = 2 + 1;(n=4k+1).
Case2:𝑛 = 4𝑘 − 1 for some natural number 𝑘.
Let 𝑆 = 1, 𝑥 4 , 𝑥 8 , … , 𝑥 4𝑘−4 , 𝑥 2 𝑦, 𝑥 6 𝑦, … 𝑥 4𝑘−2 𝑦 , then
                                                                      4𝑘−1     𝑛
                                                            𝑆 = 2𝑘 = [ 2 ]+1=[ 2 ] + 1.
                                       𝑛
It is similar to case1. So 𝛾 𝐿 𝑛 = 2 + 1; (𝑛 = 4𝑘 − 1).
If 2|𝑛and 4 ∤ 𝑛, then 𝑛 = 2𝑘 such that 𝑘 is an odd number. Let
                                       𝑆 = 1, 𝑥 4 , 𝑥 8 , … , 𝑥 2𝑘−2 , 𝑥 2 𝑦, 𝑥 6 𝑦, … , 𝑥 2𝑘−4 𝑦, 𝑥 2𝑘−1 .
                                                                        𝑛
It is easy to see that 𝑆 is a dominating set and 𝑆 = 𝑘 + 1 = 2 + 1.
By theorem 1.1,
                                                         𝑛                          𝑛
                                                           ≤ 𝛾 𝐿 𝑛 ≤ 𝑆 = + 1.
                                                       2                           2
                                                    𝑛                                                       𝑛
We show that the domination number𝛾 𝐿 𝑛 ≠ 2 . It follows from the proof of theorem 1.1, that 𝛾 Γ = 1+Δ                 if and only ifΓ
                                                                                                                   Γ
has a𝛾 −set(dominating set of minimum cardinality) 𝑆 such that 𝑁 𝑢 ⋂𝑁 𝑣 = ∅ for all 𝑢, 𝑣 ∈ 𝑆 and 𝑁 𝑣 = Δ Γ for all
                    𝑛
 𝑣 ∈ 𝑆. If 𝛾 𝐿 𝑛 = 2 , then 𝐿 𝑛 has a 𝛾 −set 𝑆such that 𝑁 𝑢 ⋂𝑁 𝑣 = ∅ for all 𝑢, 𝑣 ∈ 𝑆. Since 𝑁 𝑆 = 𝑉 𝐿 𝑛 , therefore
                                               3𝑘 = 𝑁 𝑆 = 𝑉 𝐿 𝑛 = 2n = 4k
                                 𝑛
is a contradition. So 𝛾 𝐿 𝑛 ≠ 2 . █

Remark.If the ladder graph𝐿 𝑛 ,which is a 3-regular graph has an efficient dominating set 𝑆, then by the sphere packing
                        𝑛
condition we have 𝑆 = 2 . Therefore, only the ladder graph with even order has an efficient dominating set.

Theorem 2.2 The ladder graph 𝐿 𝑛 of order 2𝑛, has an efficient dominating set if and only if 4|𝑛.

Proof. By remark and this fact that 𝑆 = 𝛾 𝐿 𝑛 , the ladder graph has an E-set if 4|𝑛 . Also if 4|𝑛, then we show that the set
                                           𝑆 = {1, 𝑥 4 , 𝑥 8 , … , 𝑥 4𝑘−4 , 𝑥 2 𝑦,𝑥 6 𝑦, … , 𝑥 4𝑘−2 𝑦}
is a dominating set. It is easy to see that 𝑆 is an independent and perfect set. Therefore 𝑆 is an E-set of ladder graph 𝐿 𝑛 . █

                                                          REFERENCES
  [1].     N.Biggs, Perfect Codes in Graphs,J.Combin.TheorySer B 15(1973) 288-296.
  [2].     I.J.Dejter, O.Serra, Efficient dominating sets in Cayleygraphs,Discrete Appl.Math.129(2003)319-328.
  [3].     T.W.Haynes,S.t.Hedetniemi,P.J.Slater,Fundamentals of Domination in Graphs, Marcel Dekker,NewYork (1998).
  [4].     J.Kratochvil,Perfect Codes over Graphs,J.Combin.TheorySerB 40(1986)224-228.




                                                                    43

More Related Content

What's hot

Ta 2018-1-2404-24109 algebra lineal
Ta 2018-1-2404-24109 algebra linealTa 2018-1-2404-24109 algebra lineal
Ta 2018-1-2404-24109 algebra linealjhonatanVsquezArriag
 
Btech_II_ engineering mathematics_unit3
Btech_II_ engineering mathematics_unit3Btech_II_ engineering mathematics_unit3
Btech_II_ engineering mathematics_unit3Rai University
 
Quadratic form and functional optimization
Quadratic form and functional optimizationQuadratic form and functional optimization
Quadratic form and functional optimizationJunpei Tsuji
 
Further Results On The Basis Of Cauchy’s Proper Bound for the Zeros of Entire...
Further Results On The Basis Of Cauchy’s Proper Bound for the Zeros of Entire...Further Results On The Basis Of Cauchy’s Proper Bound for the Zeros of Entire...
Further Results On The Basis Of Cauchy’s Proper Bound for the Zeros of Entire...IJMER
 
BSC_COMPUTER _SCIENCE_UNIT-2_DISCRETE MATHEMATICS
BSC_COMPUTER _SCIENCE_UNIT-2_DISCRETE MATHEMATICSBSC_COMPUTER _SCIENCE_UNIT-2_DISCRETE MATHEMATICS
BSC_COMPUTER _SCIENCE_UNIT-2_DISCRETE MATHEMATICSRai University
 
Analisis Rill Tugas 3.5
Analisis Rill Tugas 3.5Analisis Rill Tugas 3.5
Analisis Rill Tugas 3.5Ayu Nitasari
 
Ordinary Differential Equations: Variable separation method
Ordinary Differential Equations: Variable separation method  Ordinary Differential Equations: Variable separation method
Ordinary Differential Equations: Variable separation method AMINULISLAM439
 
Btech_II_ engineering mathematics_unit5
Btech_II_ engineering mathematics_unit5Btech_II_ engineering mathematics_unit5
Btech_II_ engineering mathematics_unit5Rai University
 
ANALISIS RIIL 1 3.3 dan 3.4 ROBERT G BARTLE
ANALISIS RIIL 1 3.3 dan 3.4 ROBERT G BARTLEANALISIS RIIL 1 3.3 dan 3.4 ROBERT G BARTLE
ANALISIS RIIL 1 3.3 dan 3.4 ROBERT G BARTLEMuhammad Nur Chalim
 
Homogeneous Linear Differential Equations
 Homogeneous Linear Differential Equations Homogeneous Linear Differential Equations
Homogeneous Linear Differential EquationsAMINULISLAM439
 

What's hot (14)

Ta 2018-1-2404-24109 algebra lineal
Ta 2018-1-2404-24109 algebra linealTa 2018-1-2404-24109 algebra lineal
Ta 2018-1-2404-24109 algebra lineal
 
Btech_II_ engineering mathematics_unit3
Btech_II_ engineering mathematics_unit3Btech_II_ engineering mathematics_unit3
Btech_II_ engineering mathematics_unit3
 
Quadratic form and functional optimization
Quadratic form and functional optimizationQuadratic form and functional optimization
Quadratic form and functional optimization
 
Further Results On The Basis Of Cauchy’s Proper Bound for the Zeros of Entire...
Further Results On The Basis Of Cauchy’s Proper Bound for the Zeros of Entire...Further Results On The Basis Of Cauchy’s Proper Bound for the Zeros of Entire...
Further Results On The Basis Of Cauchy’s Proper Bound for the Zeros of Entire...
 
BSC_COMPUTER _SCIENCE_UNIT-2_DISCRETE MATHEMATICS
BSC_COMPUTER _SCIENCE_UNIT-2_DISCRETE MATHEMATICSBSC_COMPUTER _SCIENCE_UNIT-2_DISCRETE MATHEMATICS
BSC_COMPUTER _SCIENCE_UNIT-2_DISCRETE MATHEMATICS
 
Analisis Rill Tugas 3.5
Analisis Rill Tugas 3.5Analisis Rill Tugas 3.5
Analisis Rill Tugas 3.5
 
Periodic Solutions for Non-Linear Systems of Integral Equations
Periodic Solutions for Non-Linear Systems of Integral EquationsPeriodic Solutions for Non-Linear Systems of Integral Equations
Periodic Solutions for Non-Linear Systems of Integral Equations
 
Runge Kutta Method
Runge Kutta MethodRunge Kutta Method
Runge Kutta Method
 
Ordinary Differential Equations: Variable separation method
Ordinary Differential Equations: Variable separation method  Ordinary Differential Equations: Variable separation method
Ordinary Differential Equations: Variable separation method
 
doc
docdoc
doc
 
Ppt 1.1 and 1.2
Ppt 1.1 and 1.2Ppt 1.1 and 1.2
Ppt 1.1 and 1.2
 
Btech_II_ engineering mathematics_unit5
Btech_II_ engineering mathematics_unit5Btech_II_ engineering mathematics_unit5
Btech_II_ engineering mathematics_unit5
 
ANALISIS RIIL 1 3.3 dan 3.4 ROBERT G BARTLE
ANALISIS RIIL 1 3.3 dan 3.4 ROBERT G BARTLEANALISIS RIIL 1 3.3 dan 3.4 ROBERT G BARTLE
ANALISIS RIIL 1 3.3 dan 3.4 ROBERT G BARTLE
 
Homogeneous Linear Differential Equations
 Homogeneous Linear Differential Equations Homogeneous Linear Differential Equations
Homogeneous Linear Differential Equations
 

Similar to IJERD (www.ijerd.com) International Journal of Engineering Research and Development

MATRICES AND CALCULUS.pptx
MATRICES AND CALCULUS.pptxMATRICES AND CALCULUS.pptx
MATRICES AND CALCULUS.pptxmassm99m
 
equivalence and countability
equivalence and countabilityequivalence and countability
equivalence and countabilityROHAN GAIKWAD
 
Tutorial 9 mth 3201
Tutorial 9 mth 3201Tutorial 9 mth 3201
Tutorial 9 mth 3201Drradz Maths
 
Lecture-1-Mech.pptx . .
Lecture-1-Mech.pptx                   . .Lecture-1-Mech.pptx                   . .
Lecture-1-Mech.pptx . .happycocoman
 
Maths-MS_Term2 (1).pdf
Maths-MS_Term2 (1).pdfMaths-MS_Term2 (1).pdf
Maths-MS_Term2 (1).pdfAnuBajpai5
 
nth Derivatives.pptx
nth Derivatives.pptxnth Derivatives.pptx
nth Derivatives.pptxSoyaMathew1
 
Комплекс тоо цуврал хичээл-2
Комплекс тоо цуврал хичээл-2Комплекс тоо цуврал хичээл-2
Комплекс тоо цуврал хичээл-2Март
 
Definition of statistical efficiency
Definition of statistical efficiencyDefinition of statistical efficiency
Definition of statistical efficiencyRuhulAmin339
 
Matrix Transformations on Some Difference Sequence Spaces
Matrix Transformations on Some Difference Sequence SpacesMatrix Transformations on Some Difference Sequence Spaces
Matrix Transformations on Some Difference Sequence SpacesIOSR Journals
 
Strong convexity on gradient descent and newton's method
Strong convexity on gradient descent and newton's methodStrong convexity on gradient descent and newton's method
Strong convexity on gradient descent and newton's methodSEMINARGROOT
 
Lesson 1a_Sequence.pptx
Lesson 1a_Sequence.pptxLesson 1a_Sequence.pptx
Lesson 1a_Sequence.pptxBaldonMarcelo1
 
C222529
C222529C222529
C222529irjes
 
Laurents & Taylors series of complex numbers.pptx
Laurents & Taylors series of complex numbers.pptxLaurents & Taylors series of complex numbers.pptx
Laurents & Taylors series of complex numbers.pptxjyotidighole2
 

Similar to IJERD (www.ijerd.com) International Journal of Engineering Research and Development (20)

MATRICES AND CALCULUS.pptx
MATRICES AND CALCULUS.pptxMATRICES AND CALCULUS.pptx
MATRICES AND CALCULUS.pptx
 
lec19.ppt
lec19.pptlec19.ppt
lec19.ppt
 
equivalence and countability
equivalence and countabilityequivalence and countability
equivalence and countability
 
HERMITE SERIES
HERMITE SERIESHERMITE SERIES
HERMITE SERIES
 
Tutorial 9 mth 3201
Tutorial 9 mth 3201Tutorial 9 mth 3201
Tutorial 9 mth 3201
 
Lecture-1-Mech.pptx . .
Lecture-1-Mech.pptx                   . .Lecture-1-Mech.pptx                   . .
Lecture-1-Mech.pptx . .
 
Maths-MS_Term2 (1).pdf
Maths-MS_Term2 (1).pdfMaths-MS_Term2 (1).pdf
Maths-MS_Term2 (1).pdf
 
Inequalities list-2
Inequalities list-2Inequalities list-2
Inequalities list-2
 
lec18.ppt
lec18.pptlec18.ppt
lec18.ppt
 
nth Derivatives.pptx
nth Derivatives.pptxnth Derivatives.pptx
nth Derivatives.pptx
 
Комплекс тоо цуврал хичээл-2
Комплекс тоо цуврал хичээл-2Комплекс тоо цуврал хичээл-2
Комплекс тоо цуврал хичээл-2
 
Definition of statistical efficiency
Definition of statistical efficiencyDefinition of statistical efficiency
Definition of statistical efficiency
 
Matrix Transformations on Some Difference Sequence Spaces
Matrix Transformations on Some Difference Sequence SpacesMatrix Transformations on Some Difference Sequence Spaces
Matrix Transformations on Some Difference Sequence Spaces
 
Interpolation
InterpolationInterpolation
Interpolation
 
Plano numerico
Plano numericoPlano numerico
Plano numerico
 
Strong convexity on gradient descent and newton's method
Strong convexity on gradient descent and newton's methodStrong convexity on gradient descent and newton's method
Strong convexity on gradient descent and newton's method
 
Lesson 1a_Sequence.pptx
Lesson 1a_Sequence.pptxLesson 1a_Sequence.pptx
Lesson 1a_Sequence.pptx
 
C222529
C222529C222529
C222529
 
Examen presencial 1
Examen presencial 1Examen presencial 1
Examen presencial 1
 
Laurents & Taylors series of complex numbers.pptx
Laurents & Taylors series of complex numbers.pptxLaurents & Taylors series of complex numbers.pptx
Laurents & Taylors series of complex numbers.pptx
 

More from IJERD Editor

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEIJERD Editor
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignIJERD Editor
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationIJERD Editor
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string valueIJERD Editor
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingIJERD Editor
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart GridIJERD Editor
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
 

More from IJERD Editor (20)

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACE
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding Design
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and Verification
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive Manufacturing
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string value
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF Dxing
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart Grid
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powder
 

IJERD (www.ijerd.com) International Journal of Engineering Research and Development

  • 1. International Journal of Engineering Research and Development eISSN : 2278-067X, pISSN : 2278-800X, www.ijerd.com Volume 2, Issue 2 (July 2012), PP. 42-43 Efficient dominating sets in ladder graphs Z.Mostaghim1, A.Sayed Khalkhali2 1,2 School of Mathematics, Iran University of Science and Technology, Tehran, Iran Abstract––An independent set 𝑺 of vertices in a graph is an efficient dominating set when each vertex not in 𝑺 is adjacent to exactly one vertex in 𝑺. In this note, we prove that a ladder graph 𝑳 𝒏 has an efficient dominating set if and only if 𝒏 be a multiple of 4. Also we determine the domination number of a ladder graph 𝑳 𝒏. Keywords––Efficient dominating set, Perfect code, Domination number,Ladder graph,Sphere packing I. INTRODUCTION LetΓ = 𝑉, 𝐸 be a finite undirected graph with no loops and multiple edges. We follow the terminology of [2] and [3]. Given 𝑆 ⊆ 𝑉, let the open neighbourhood 𝑁(𝑆) of 𝑆in Γ be the subset of vertices in 𝑉𝑆 adjacent to some vertex in 𝑆, and let the corresponding closed neighbourhood be 𝑁[𝑆] = 𝑁 𝑆 ⋃𝑆. A set 𝑆 ⊂ 𝑉 is a dominating set if 𝑁 𝑆 = 𝑉, that is, every vertex in 𝑉𝑆 is adjacent to some vertex in 𝑆. The domination number 𝛾 Γ is the minimum cardinality of a dominating set inΓ. If the dominating set 𝑆 is a stable set of Γ, then 𝑆 is an independent dominating set. Also, when every vertex in 𝑉𝑆 is adjacent to exactly one vertex in 𝑆, then 𝑆 is a perfect dominating set. A dominating set 𝑆 which is both independent and perfect is an efficient dominating set. In what follows we may refer to an efficient dominating set as an 𝐸-set. Given the graph Γ = 𝑉, 𝐸 , we call any subset 𝐶 of 𝑉 a code in Γ. We say that 𝐶 corrects 𝑡 errors if and only if the sets 𝑆 𝑐 ={𝑢|𝑢𝜖𝑉, 𝑑(𝑢, 𝑐) ≤ 𝑡} are pairwise disjoint. Morever we call 𝐶 a 𝑡-perfect code if and only if these sets form a partition of 𝑉. A 𝑡-perfect code 𝐶 is called nontrivial if and only if 𝑡 > 0 and 𝑐𝑎𝑟𝑑 𝐶 > 1. 𝐸-sets correspond to perfect 1-correcting codes in Γ,as treated by Biggs[1] and Kratochvil[4]. Equivalently, they provide a perfect packing of Γ by balls of radius 1. When Γ is r-regular, the so-called sphere packing condition 𝑉 = 𝑟 + 1 |𝐶| is trivially a necessary condition for 𝐶 to be an 𝐸-set of Γ. We need the following two results from [3]. We recall that the maximum degrees of vertices of Γ is denoted by Δ Γ . Theorem 1.1For any graph Γ of order n, 𝑛 ≤ 𝛾(Γ) ≤ 𝑛 − Δ(Γ) 1+Δ Γ Theorem 1.2 If Γhas an efficient dominating set, then the cardinality of any efficient dominating set equals the domination number 𝛾 Γ . In particular, all efficient dominating sets of Γhave the same cardinality. II. THE MAIN RESULTS We use the following remark in the sequel Remark. Suppose that 𝑛(> 1)be a natural number, the dihedral group 𝐷2𝑛 of order 2𝑛 is defined by thepresentation 𝐷2𝑛 =< 𝑥, 𝑦|𝑥 𝑛 = 𝑦 2 = 𝑥𝑦 2 = 1 >. Then the distinct elements of 𝐷2𝑛 are as follows: 1, 𝑥, … , 𝑥 𝑛−1 , 𝑦, 𝑥𝑦, … , 𝑥 𝑛−1 𝑦 . The Cayley graph 𝐶(𝐷2𝑛 , 𝑋) of 𝐷2𝑛 with respect to the generating set𝑋 = {𝑥, 𝑥 −1,y} is a ladder graph 𝐿 𝑛 . Theorem 2.1 Let 𝐿 𝑛 be a ladder graph of order 2𝑛. Then the domination number of 𝐿 𝑛 is determined as follows: 𝑛 2 4|𝑛 𝑛 𝛾 𝐿𝑛 = + 1 𝑖𝑓2|𝑛 , 4 ∤ 𝑛 2 𝑛 2∤ 𝑛 +1 2 42
  • 2. Efficient dominating sets in ladder graphs Proof.If 4|𝑛, then 𝑛 = 4𝑘for some natural number𝑘.Let𝑆 = {1, 𝑥 4 , 𝑥 8 , … , 𝑥 4𝑘−4 , 𝑥 2 𝑦,𝑥 6 𝑦, … , 𝑥 4𝑘−2 𝑦}. We show that 𝑆 is a 𝑛 dominating set. It is easy to see that 𝑆 = = 2𝑘.Since𝐿 𝑛 ≅ 𝐶(𝐷2𝑛 ,𝑋) then for all 𝑖, 2 ≤ 𝑖 ≤ 𝑛 − 1, a vertex 𝑥 𝑖 is adjacent 2 to three vertices 𝑥 𝑖+1 , 𝑥 𝑖−1 and 𝑥 𝑖 𝑦. There are 3 cases. If 4|𝑖, then 𝑥 𝑖 ∈ 𝑆. If 2|𝑖and4 ∤ 𝑖,then𝑥 𝑖 𝑦 ∈ 𝑆. If 2 ∤ 𝑖, then 𝑖 = 4𝑚 − 1 or 𝑖 = 4𝑚 + 1 for some natural number𝑚. If 𝑖 = 4𝑚 − 1, then 𝑥 𝑖+1 ∈ 𝑆 and if 𝑖 = 4𝑚 + 1, then 𝑥 𝑖−1 ∈ 𝑆. Similarly, for all 𝑖, 1 ≤ 𝑖 ≤ 𝑛 − 1, a vertex 𝑥 𝑖 𝑦 is adjacent to some vertex in 𝑆. For three vertices 1, 𝑥 𝑛−1 , 𝑦, we have 1 ∈ 𝑆 and 𝑦, 𝑥 𝑛−1 are adjacent to 1. So 𝑆 is a dominating set. Since𝐿 𝑛 is a 3-regular graph, it follows from sphere packing condition that 𝑛 𝛾(𝐿 𝑛 ) ≥ 2 𝑛 𝑛 Also 𝑆 is a dominating set of 𝐿 𝑛 which 𝑆 = . Hence it follows that 𝛾 𝐿 𝑛 = ; 𝑛 = 4𝑘 . 2 2 If 𝑛be odd, then we have 2 cases. Case1:𝑛 = 4𝑘 + 1 for some natural number 𝑘. In this case, let 𝑆 = 1, 𝑥 4 , 𝑥 8 , … , 𝑥 4𝑘 , 𝑥 2 𝑦, 𝑥 6 𝑦, … 𝑥 4𝑘−2 𝑦 ,then 4𝑘 + 1 𝑆 = 2𝑘 + 1 = + 1. 2 𝑛 𝑛 It is easy to see that 𝑆 is a dominating set, and by theorem 1.1, +1 ≤ 𝛾 𝐿𝑛 ≤ 𝑆 = + 1. 2 2 𝑛 Therefore, 𝛾 𝐿 𝑛 = 2 + 1;(n=4k+1). Case2:𝑛 = 4𝑘 − 1 for some natural number 𝑘. Let 𝑆 = 1, 𝑥 4 , 𝑥 8 , … , 𝑥 4𝑘−4 , 𝑥 2 𝑦, 𝑥 6 𝑦, … 𝑥 4𝑘−2 𝑦 , then 4𝑘−1 𝑛 𝑆 = 2𝑘 = [ 2 ]+1=[ 2 ] + 1. 𝑛 It is similar to case1. So 𝛾 𝐿 𝑛 = 2 + 1; (𝑛 = 4𝑘 − 1). If 2|𝑛and 4 ∤ 𝑛, then 𝑛 = 2𝑘 such that 𝑘 is an odd number. Let 𝑆 = 1, 𝑥 4 , 𝑥 8 , … , 𝑥 2𝑘−2 , 𝑥 2 𝑦, 𝑥 6 𝑦, … , 𝑥 2𝑘−4 𝑦, 𝑥 2𝑘−1 . 𝑛 It is easy to see that 𝑆 is a dominating set and 𝑆 = 𝑘 + 1 = 2 + 1. By theorem 1.1, 𝑛 𝑛 ≤ 𝛾 𝐿 𝑛 ≤ 𝑆 = + 1. 2 2 𝑛 𝑛 We show that the domination number𝛾 𝐿 𝑛 ≠ 2 . It follows from the proof of theorem 1.1, that 𝛾 Γ = 1+Δ if and only ifΓ Γ has a𝛾 −set(dominating set of minimum cardinality) 𝑆 such that 𝑁 𝑢 ⋂𝑁 𝑣 = ∅ for all 𝑢, 𝑣 ∈ 𝑆 and 𝑁 𝑣 = Δ Γ for all 𝑛 𝑣 ∈ 𝑆. If 𝛾 𝐿 𝑛 = 2 , then 𝐿 𝑛 has a 𝛾 −set 𝑆such that 𝑁 𝑢 ⋂𝑁 𝑣 = ∅ for all 𝑢, 𝑣 ∈ 𝑆. Since 𝑁 𝑆 = 𝑉 𝐿 𝑛 , therefore 3𝑘 = 𝑁 𝑆 = 𝑉 𝐿 𝑛 = 2n = 4k 𝑛 is a contradition. So 𝛾 𝐿 𝑛 ≠ 2 . █ Remark.If the ladder graph𝐿 𝑛 ,which is a 3-regular graph has an efficient dominating set 𝑆, then by the sphere packing 𝑛 condition we have 𝑆 = 2 . Therefore, only the ladder graph with even order has an efficient dominating set. Theorem 2.2 The ladder graph 𝐿 𝑛 of order 2𝑛, has an efficient dominating set if and only if 4|𝑛. Proof. By remark and this fact that 𝑆 = 𝛾 𝐿 𝑛 , the ladder graph has an E-set if 4|𝑛 . Also if 4|𝑛, then we show that the set 𝑆 = {1, 𝑥 4 , 𝑥 8 , … , 𝑥 4𝑘−4 , 𝑥 2 𝑦,𝑥 6 𝑦, … , 𝑥 4𝑘−2 𝑦} is a dominating set. It is easy to see that 𝑆 is an independent and perfect set. Therefore 𝑆 is an E-set of ladder graph 𝐿 𝑛 . █ REFERENCES [1]. N.Biggs, Perfect Codes in Graphs,J.Combin.TheorySer B 15(1973) 288-296. [2]. I.J.Dejter, O.Serra, Efficient dominating sets in Cayleygraphs,Discrete Appl.Math.129(2003)319-328. [3]. T.W.Haynes,S.t.Hedetniemi,P.J.Slater,Fundamentals of Domination in Graphs, Marcel Dekker,NewYork (1998). [4]. J.Kratochvil,Perfect Codes over Graphs,J.Combin.TheorySerB 40(1986)224-228. 43