SlideShare a Scribd company logo
1 of 48
Distance domination, guarding
and covering of maximal
outerplanar graphs
Santiago Canales, Gregorio Hernández,
Mafalda Martins, Inês Matos
Discrete Applied Mathematics 181
(2015) 41–49
報告者:陳政謙
Outline
• Relationship between distance guarding, distance
domination and distance covering on triangulation
graphs
• 2d-guarding and 2d-domination of maximal
outerplanar graphs
• 2d-covering of maximal outerplanar graphs
Triangulations
The kd-visible
• Given a triangulation T = (V, E), we say that a bounded face Ti
of T (i.e., a triangle) is kd-visible from a vertex p V, if there
is a vertex x Ti such that distT(x, p) ≤ k − 1.
k = 1
k = 2
k = 3
The kd-guarding set
• A kd-guarding set for T is a subset F V such that every
triangle of T is kd-visible from an element of F (we designate
the elements of F by kd-guards).
k = 2
The 2d-guarding number is 1.
The kd-dominating set
• A kd-dominating set for T is a subset D V such that each
vertex u V − D, distT(u, v) ≤ k for some v D.
The 2d-domination number is 1.
k = 2
Lemma 2.1
• If C is a kd-guarding set for a triangulation T, then C is a kd-
dominating set for T.
k = 2
This is a 2d-guarding set. This is a 2d-dominating set.
Lemma 2.1
• If C is a kd-guarding set for a triangulation T, then C is a kd-
dominating set for T.
k = 2
This is not a 2d-guarding set.This is a 2d-dominating set.
The kd-vertex-cover
• A kd-vertex-cover of T is a subset C V such that for each
edge e E there is a path of length at most k, which contains e
and a vertex of C.
The 2d-covering number is 1.
k = 2
Lemma 2.2
• If C is a kd-vertex-cover of a triangulation T, then C is a kd-
guarding set and a kd-dominating set for T.
k = 2
This is a 2d-guarding set.This is a 2d-vertex-cover. This is a 2d-dominating set.
Lemma 2.2
• If C is a kd-vertex-cover of a triangulation T, then C is a kd-
guarding set and a kd-dominating set for T.
k = 2
This is a 2d-guarding set. This is not a 2d-vertex-cover.
Lemma 2.2
• If C is a kd-vertex-cover of a triangulation T, then C is a kd-
guarding set and a kd-dominating set for T.
k = 2
This is not a 2d-vertex-cover.This is a 2d-dominating set.
Theorem 2.3
• Given a triangulation T, the minimum cardinality gkd(T) of any
kd-guarding set for T verifies γkd(T) ≤ gkd(T) ≤ βkd(T), where
γkd(T) is the kd-domination number, gkd(T) is the kd-guarding
number and βkd(T) is the kd-covering number.
• This theorem is proved by previous lemmas.
Outerplanar graphs
• A graph is outerplanar if it has a crossing-free embedding in
the plane such that all vertices are on the boundary of its outer
face (the unbounded face).
Outer face Inner face
Outerplanar graphs
• A graph is outerplanar if it has a crossing-free embedding in
the plane such that all vertices are on the boundary of its outer
face (the unbounded face).
Maximal outerplanar graphs
• An outerplanar graph is said to be maximal outerplanar if
adding an edge removes its outerplanarity.
Maximal outerplanar graphs –
Property 1
• For n ≥ 3, every maximal outerplanar graph with n vertices has
a cycle which all of the edges are on the boundary of the outer
face.
Maximal outerplanar graphs –
Property 2
• Every bounded face of maximal outerplanar graphs is a
triangle.
Maximal outerplanar graphs –
Property 3
• Every maximal outerplanar graph with n vertices has exactly
2n − 3 edges.
n = 8
2n - 3 = 13
m = 6
f(m) 2d-guards
• f(m) 2d-guards are always sufficient to guard any maximal
outerplanar graph with m vertices.
f(6) 2d-guards = 1
m = 10
f(m) 2d-guards
• f(m) 2d-guards are always sufficient to guard any maximal
outerplanar graph with m vertices.
f(10) 2d-guards = 2
…
Lemma 3.1
• If G is an arbitrary maximal outerplanar graph with two 2d-
guards placed at any two adjacent of its m vertices, then f(m −
2) additional 2d-guards are sufficient to guard G.
m = 8
f(6) additional 2d-guards are sufficient
to guard G.
Lemma 3.2
• If G is an arbitrary maximal outerplanar graph with one 2d-
guard placed at any one of its m vertices, then f(m − 1)
additional 2d-guards are sufficient to guard G.
m = 7
f(6) additional 2d-guards are sufficient
to guard G.
Lemma 3.3 ([13])
• Let G be a maximal outerplanar graph with n ≥ 2k vertices.
There is an interior edge e in G that separates off a minimum
number m of exterior edges, where k ≤ m ≤ 2k − 2. Therefore,
the edge e partitions G into two pieces, one of which contains
m exterior edges of G.
n = 6
6 ≥ 6
3 ≤ m ≤ 4
k = 3
m = 3 m = 4
Lemma 3.3 ([13])
• Let G be a maximal outerplanar graph with n ≥ 2k vertices.
There is an interior edge e in G that separates off a minimum
number m of exterior edges, where k ≤ m ≤ 2k − 2. Therefore,
the edge e partitions G into two pieces, one of which contains
m exterior edges of G.
n = 8
8 ≥ 8
4 ≤ m ≤ 6
k = 4
m = 4 m = 5 m = 6
Lemma 3.4
• Every n-vertex maximal outerplanar graph, with 5 ≤ n ≤ 14,
can be 2d-guarded with guards.
n = 6
= 1
Lemma 3.4
• Every n-vertex maximal outerplanar graph, with 5 ≤ n ≤ 14,
can be 2d-guarded with guards.
n = 10
…
The proof of Lemma 3.4
• n = 5
Trivial. A 2d-guard can be placed at any vertex.
The proof of Lemma 3.4
• n = 6
Trivial. A 2d-guard can be placed at any vertex with degree greater than 2.
The proof of Lemma 3.4
• n = 7
• Total edges = 2n – 3 = 11
• Total degree = 11 x 2 = 22
The proof of Lemma 3.4
• n = 8
0
1 2
3
4
56
7
The proof of Lemma 3.4
• n = 9
• By Lemma 3.3 with k = 4, there is an interior edge e that
separates off a minimum number m of exterior edges, where m
= 4, 5 or 6.
m = 4
0
1
2 3
4
5
6
7
8
m = 5
0
1
2 3
4
5
6
7
8
m = 6
0
1
2 3
4
5
6
7
8
The proof of Lemma 3.4
• 10 ≤ n ≤ 14
• The proof is like the previous case.
Theorem 3.5
• Every n-vertex maximal outerplanar graph, with n ≥ 5, can be
2d-guarded by guards.
The proof of Theorem 3.5
• The proof is done by induction on n.
• By Lemma 3.4 the result is true for 5 ≤ n ≤ 14.
• Assume that n ≥ 15, and the theorem holds for n′ < n.
• Lemma 3.3 with k = 6 guarantees the existence of an interior
edge e that divides G into maximal outerplanar graphs G1 and
G2, such that G1 has m exterior edges of G with 6 ≤ m ≤ 10.
Thus G1 and G2 together can be 2d-guarded by guards.
n - m + 1 ≤ n – 5, by the induction hypothesis, G2 can be 2d-guarded by
guards.
The proof of Theorem 3.5
• 6 ≤ m ≤ 8
0
12
m - 2
m - 1 m m + 1
m + 2
n - 2
n - 1
e
m + 1 ≤ 9, thus G1 can be 2d-guarded by one guard.
G1 G2
The proof of Theorem 3.5
• m = 9
The pentagon (5,6,7,8,9) can be 2d-guarded by placing
one guard arbitrarily.
To 2d-guard the hexagon (0,1,2,3,4,5), we cannot place
a 2d-guard at any vertex. We will consider two separate
cases.
The proof of Theorem 3.5
• m = 9
(a) The internal edge (0,4) is not present.
If a guard is placed at vertex 5, then G1 is 2d-guarded.
Since G2 has n − 8 edges, the induction hypothesis can
be applied and therefore G2 can be 2d-guarded by
guards.
The proof of Theorem 3.5
• m = 9
(b) The internal edge (0,4) is present.
If a 2d-guard is placed at vertex 0, then G1 is 2d-
guarded unless the triangle (6,7,8) is present in the
triangulation.
In any case, two 2d-guards placed at vertices 0 and 9
guard G1.
By the induction hypothesis,
guards suffice to 2d-guard G2.
By Lemma 3.1 the two 2d-guards placed at vertices
0 and 9 allow the remainder of G2 to be guarded by f
(n−8−2) = f (n−10) additional 2d-guards.
The proof of Theorem 3.5
• m = 10
(a) The vertices 0 and 10 have degree 2 in
hexagons (0,1,2,3,4,5) and (5,6,7,8,9,10),
respectively.
Then one 2d-guard placed at vertex 5
guards G1.
By the induction hypothesis, G2 can be 2d-guarded
by guards.
Thus G can be 2d-guarded by guards.
The proof of Theorem 3.5
• m = 10
(b) The vertex 0 has degree greater than 2 in
hexagon (0,1,2,3,4,5).
We place a guard at vertex 0 and another guard at any
vertex of the hexagon (5,6,7,8,9,10) whose degree is
greater than 2.
These two guards 2d-guard G1.
By Lemma 3.2 the guard placed at vertex 0 permits
the remainder of G2 to be 2d-guarded by f (n−9−1) =
f (n−10) additional guards.
By the induction hypothesis,
guards suffice to 2d-guard G2.
Theorem 3.6
• Every n-vertex maximal outerplanar graph with n ≥ 5 can be
2d-guarded (and 2d-dominated) by guards. This bound is
tight.
According to Theorem 2.3, γ2d(G) ≤ g2d(G), so ≤ g2d(G),
where γ2d(G) is the 2d-domination number, g2d(G) is the 2d-guarding number.
The proof of Theorem 3.6
The 2d-domination number is .
Lemma 4.1 ([17])
• The vertices of a maximal outerplanar graph G can be 4-
colored such that every cycle of length four in G has all four
colors.
Theorem 4.2
• Every n-vertex maximal outerplanar graph, with n ≥ 4, can be
2d-covered by vertices and this bound is tight.
n = 5
= 1
The proof of Theorem 4.2
• First, we show that every maximal outerplanar graph has a 2d-
covering with vertices.
• By Lemma 4.1, we can color the vertices of G such that every
cycle of length four is 4-colored.
……....…..
The proof of Theorem 4.2
• Now, we will prove that this upper bound is tight.
β2d(G) ≥ , where β2d(G) is the 2d-covering number.
References

More Related Content

What's hot

Exercicios de integrais
Exercicios de integraisExercicios de integrais
Exercicios de integraisRibeij2
 
Non Split Edge Domination in Fuzzy Graphs
Non Split Edge Domination in Fuzzy GraphsNon Split Edge Domination in Fuzzy Graphs
Non Split Edge Domination in Fuzzy Graphspaperpublications3
 
Applications of Integrations
Applications of IntegrationsApplications of Integrations
Applications of Integrationsitutor
 
A common fixed point of integral type contraction in generalized metric spacess
A  common fixed point of integral type contraction in generalized metric spacessA  common fixed point of integral type contraction in generalized metric spacess
A common fixed point of integral type contraction in generalized metric spacessAlexander Decker
 
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHS
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHSDISTANCE TWO LABELING FOR MULTI-STOREY GRAPHS
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHSgraphhoc
 
Strong (Weak) Triple Connected Domination Number of a Fuzzy Graph
Strong (Weak) Triple Connected Domination Number of a Fuzzy GraphStrong (Weak) Triple Connected Domination Number of a Fuzzy Graph
Strong (Weak) Triple Connected Domination Number of a Fuzzy Graphijceronline
 
Consolidated.m2-satyabama university
Consolidated.m2-satyabama universityConsolidated.m2-satyabama university
Consolidated.m2-satyabama universitySelvaraj John
 
Bresenham derivation
Bresenham derivationBresenham derivation
Bresenham derivationKumar
 
Emat 213 final fall 2005
Emat 213 final fall 2005Emat 213 final fall 2005
Emat 213 final fall 2005akabaka12
 
The rules of indices
The rules of indicesThe rules of indices
The rules of indicesYu Kok Hui
 
Asymptotes | WORKING PRINCIPLE OF ASYMPTOTES
Asymptotes | WORKING PRINCIPLE OF ASYMPTOTESAsymptotes | WORKING PRINCIPLE OF ASYMPTOTES
Asymptotes | WORKING PRINCIPLE OF ASYMPTOTESNITESH POONIA
 
On the Covering Radius of Codes Over Z6
On the Covering Radius of Codes Over Z6 On the Covering Radius of Codes Over Z6
On the Covering Radius of Codes Over Z6 ijitjournal
 
On the stability and accuracy of finite difference method for options pricing
On the stability and accuracy of finite difference method for options pricingOn the stability and accuracy of finite difference method for options pricing
On the stability and accuracy of finite difference method for options pricingAlexander Decker
 
Gaussian Integration
Gaussian IntegrationGaussian Integration
Gaussian IntegrationReza Rahimi
 
Numerical_Methods_Simpson_Rule
Numerical_Methods_Simpson_RuleNumerical_Methods_Simpson_Rule
Numerical_Methods_Simpson_RuleAlex_5991
 

What's hot (20)

Exercicios de integrais
Exercicios de integraisExercicios de integrais
Exercicios de integrais
 
Non Split Edge Domination in Fuzzy Graphs
Non Split Edge Domination in Fuzzy GraphsNon Split Edge Domination in Fuzzy Graphs
Non Split Edge Domination in Fuzzy Graphs
 
Applications of Integrations
Applications of IntegrationsApplications of Integrations
Applications of Integrations
 
Gentle intro to SVM
Gentle intro to SVMGentle intro to SVM
Gentle intro to SVM
 
A common fixed point of integral type contraction in generalized metric spacess
A  common fixed point of integral type contraction in generalized metric spacessA  common fixed point of integral type contraction in generalized metric spacess
A common fixed point of integral type contraction in generalized metric spacess
 
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHS
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHSDISTANCE TWO LABELING FOR MULTI-STOREY GRAPHS
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHS
 
Strong (Weak) Triple Connected Domination Number of a Fuzzy Graph
Strong (Weak) Triple Connected Domination Number of a Fuzzy GraphStrong (Weak) Triple Connected Domination Number of a Fuzzy Graph
Strong (Weak) Triple Connected Domination Number of a Fuzzy Graph
 
Consolidated.m2-satyabama university
Consolidated.m2-satyabama universityConsolidated.m2-satyabama university
Consolidated.m2-satyabama university
 
Bresenham derivation
Bresenham derivationBresenham derivation
Bresenham derivation
 
Emat 213 final fall 2005
Emat 213 final fall 2005Emat 213 final fall 2005
Emat 213 final fall 2005
 
The rules of indices
The rules of indicesThe rules of indices
The rules of indices
 
Sol83
Sol83Sol83
Sol83
 
Integration
IntegrationIntegration
Integration
 
Asymptotes | WORKING PRINCIPLE OF ASYMPTOTES
Asymptotes | WORKING PRINCIPLE OF ASYMPTOTESAsymptotes | WORKING PRINCIPLE OF ASYMPTOTES
Asymptotes | WORKING PRINCIPLE OF ASYMPTOTES
 
Metric k center
Metric k centerMetric k center
Metric k center
 
On the Covering Radius of Codes Over Z6
On the Covering Radius of Codes Over Z6 On the Covering Radius of Codes Over Z6
On the Covering Radius of Codes Over Z6
 
Bayes gauss
Bayes gaussBayes gauss
Bayes gauss
 
On the stability and accuracy of finite difference method for options pricing
On the stability and accuracy of finite difference method for options pricingOn the stability and accuracy of finite difference method for options pricing
On the stability and accuracy of finite difference method for options pricing
 
Gaussian Integration
Gaussian IntegrationGaussian Integration
Gaussian Integration
 
Numerical_Methods_Simpson_Rule
Numerical_Methods_Simpson_RuleNumerical_Methods_Simpson_Rule
Numerical_Methods_Simpson_Rule
 

Viewers also liked

Worldwiderecipe
WorldwiderecipeWorldwiderecipe
WorldwiderecipeAjay Kumar
 
Peninsula Foster Grandparent Program Annual Report 2015
Peninsula Foster Grandparent Program Annual Report 2015Peninsula Foster Grandparent Program Annual Report 2015
Peninsula Foster Grandparent Program Annual Report 2015Cindy/Cynthia Kane
 
XXL MAGAZINE CONTENTS PAGE ANALYSIS
XXL MAGAZINE CONTENTS PAGE ANALYSISXXL MAGAZINE CONTENTS PAGE ANALYSIS
XXL MAGAZINE CONTENTS PAGE ANALYSISkeshialavallsmith
 
XXL MAGAZINE FRONT COVER ANALYSIS
XXL MAGAZINE FRONT COVER ANALYSISXXL MAGAZINE FRONT COVER ANALYSIS
XXL MAGAZINE FRONT COVER ANALYSISkeshialavallsmith
 
Reta email blast anthem
Reta email blast anthemReta email blast anthem
Reta email blast anthemamason04
 
Personal pronouns
Personal pronounsPersonal pronouns
Personal pronounsJody67894
 
300TH PORT BATH SOUVENIR 5.5.15 PRINTERS PROOF
300TH PORT BATH SOUVENIR 5.5.15 PRINTERS PROOF300TH PORT BATH SOUVENIR 5.5.15 PRINTERS PROOF
300TH PORT BATH SOUVENIR 5.5.15 PRINTERS PROOFGillian H. Jones MBA MPH
 
Rs paper akshay vgec
Rs paper akshay vgecRs paper akshay vgec
Rs paper akshay vgecAKSHAY GANDHI
 
Media evaluation question 3
Media evaluation question 3Media evaluation question 3
Media evaluation question 3Sophie Rudd
 
Stuart Gates Resume 2
Stuart Gates Resume 2Stuart Gates Resume 2
Stuart Gates Resume 2Stuart gates
 
Jeffrey Minor resume
Jeffrey Minor resumeJeffrey Minor resume
Jeffrey Minor resumeJeff Minor
 

Viewers also liked (14)

Worldwiderecipe
WorldwiderecipeWorldwiderecipe
Worldwiderecipe
 
Peninsula Foster Grandparent Program Annual Report 2015
Peninsula Foster Grandparent Program Annual Report 2015Peninsula Foster Grandparent Program Annual Report 2015
Peninsula Foster Grandparent Program Annual Report 2015
 
Denny's Campaign Book
Denny's Campaign BookDenny's Campaign Book
Denny's Campaign Book
 
NABCE 2015
NABCE 2015NABCE 2015
NABCE 2015
 
XXL MAGAZINE CONTENTS PAGE ANALYSIS
XXL MAGAZINE CONTENTS PAGE ANALYSISXXL MAGAZINE CONTENTS PAGE ANALYSIS
XXL MAGAZINE CONTENTS PAGE ANALYSIS
 
XXL MAGAZINE FRONT COVER ANALYSIS
XXL MAGAZINE FRONT COVER ANALYSISXXL MAGAZINE FRONT COVER ANALYSIS
XXL MAGAZINE FRONT COVER ANALYSIS
 
Reta email blast anthem
Reta email blast anthemReta email blast anthem
Reta email blast anthem
 
Personal pronouns
Personal pronounsPersonal pronouns
Personal pronouns
 
wateL
wateLwateL
wateL
 
300TH PORT BATH SOUVENIR 5.5.15 PRINTERS PROOF
300TH PORT BATH SOUVENIR 5.5.15 PRINTERS PROOF300TH PORT BATH SOUVENIR 5.5.15 PRINTERS PROOF
300TH PORT BATH SOUVENIR 5.5.15 PRINTERS PROOF
 
Rs paper akshay vgec
Rs paper akshay vgecRs paper akshay vgec
Rs paper akshay vgec
 
Media evaluation question 3
Media evaluation question 3Media evaluation question 3
Media evaluation question 3
 
Stuart Gates Resume 2
Stuart Gates Resume 2Stuart Gates Resume 2
Stuart Gates Resume 2
 
Jeffrey Minor resume
Jeffrey Minor resumeJeffrey Minor resume
Jeffrey Minor resume
 

Similar to Distance domination, guarding and covering of maximal outerplanar graphs

Bounds on double domination in squares of graphs
Bounds on double domination in squares of graphsBounds on double domination in squares of graphs
Bounds on double domination in squares of graphseSAT Publishing House
 
Treewidth and Applications
Treewidth and ApplicationsTreewidth and Applications
Treewidth and ApplicationsASPAK2014
 
SigmaXi SugraPresentation
SigmaXi SugraPresentationSigmaXi SugraPresentation
SigmaXi SugraPresentationiacoman
 
Bounds on double domination in squares of graphs
Bounds on double domination in squares of graphsBounds on double domination in squares of graphs
Bounds on double domination in squares of graphseSAT Journals
 
Characterization of trees with equal total edge domination and double edge do...
Characterization of trees with equal total edge domination and double edge do...Characterization of trees with equal total edge domination and double edge do...
Characterization of trees with equal total edge domination and double edge do...Alexander Decker
 
Restrained lict domination in graphs
Restrained lict domination in graphsRestrained lict domination in graphs
Restrained lict domination in graphseSAT Publishing House
 
Trees amd properties slide for presentaton
Trees amd properties slide for presentatonTrees amd properties slide for presentaton
Trees amd properties slide for presentatonSHARANSASI1
 
Bidimensionality
BidimensionalityBidimensionality
BidimensionalityASPAK2014
 
New Classes of Odd Graceful Graphs - M. E. Abdel-Aal
New Classes of Odd Graceful Graphs - M. E. Abdel-AalNew Classes of Odd Graceful Graphs - M. E. Abdel-Aal
New Classes of Odd Graceful Graphs - M. E. Abdel-AalGiselleginaGloria
 
Best Approximation in Real Linear 2-Normed Spaces
Best Approximation in Real Linear 2-Normed SpacesBest Approximation in Real Linear 2-Normed Spaces
Best Approximation in Real Linear 2-Normed SpacesIOSR Journals
 
NCERT Solutions for Gravitation Class 11 Physics Study material pdf download
NCERT Solutions for Gravitation Class 11 Physics Study material pdf downloadNCERT Solutions for Gravitation Class 11 Physics Study material pdf download
NCERT Solutions for Gravitation Class 11 Physics Study material pdf downloadVivekanand Anglo Vedic Academy
 
SUPER MAGIC CORONATIONS OF GRAPHS
SUPER MAGIC CORONATIONS OF GRAPHS SUPER MAGIC CORONATIONS OF GRAPHS
SUPER MAGIC CORONATIONS OF GRAPHS IAEME Publication
 
Complex analysis notes
Complex analysis notesComplex analysis notes
Complex analysis notesPrakash Dabhi
 

Similar to Distance domination, guarding and covering of maximal outerplanar graphs (20)

Bounds on double domination in squares of graphs
Bounds on double domination in squares of graphsBounds on double domination in squares of graphs
Bounds on double domination in squares of graphs
 
X4102188192
X4102188192X4102188192
X4102188192
 
Treewidth and Applications
Treewidth and ApplicationsTreewidth and Applications
Treewidth and Applications
 
1452 86301000013 m
1452 86301000013 m1452 86301000013 m
1452 86301000013 m
 
SigmaXi SugraPresentation
SigmaXi SugraPresentationSigmaXi SugraPresentation
SigmaXi SugraPresentation
 
2-rankings of Graphs
2-rankings of Graphs2-rankings of Graphs
2-rankings of Graphs
 
Bounds on double domination in squares of graphs
Bounds on double domination in squares of graphsBounds on double domination in squares of graphs
Bounds on double domination in squares of graphs
 
Characterization of trees with equal total edge domination and double edge do...
Characterization of trees with equal total edge domination and double edge do...Characterization of trees with equal total edge domination and double edge do...
Characterization of trees with equal total edge domination and double edge do...
 
Restrained lict domination in graphs
Restrained lict domination in graphsRestrained lict domination in graphs
Restrained lict domination in graphs
 
Sol35
Sol35Sol35
Sol35
 
Sol35
Sol35Sol35
Sol35
 
Trees amd properties slide for presentaton
Trees amd properties slide for presentatonTrees amd properties slide for presentaton
Trees amd properties slide for presentaton
 
Network Theory
Network TheoryNetwork Theory
Network Theory
 
Bidimensionality
BidimensionalityBidimensionality
Bidimensionality
 
64 66
64 6664 66
64 66
 
New Classes of Odd Graceful Graphs - M. E. Abdel-Aal
New Classes of Odd Graceful Graphs - M. E. Abdel-AalNew Classes of Odd Graceful Graphs - M. E. Abdel-Aal
New Classes of Odd Graceful Graphs - M. E. Abdel-Aal
 
Best Approximation in Real Linear 2-Normed Spaces
Best Approximation in Real Linear 2-Normed SpacesBest Approximation in Real Linear 2-Normed Spaces
Best Approximation in Real Linear 2-Normed Spaces
 
NCERT Solutions for Gravitation Class 11 Physics Study material pdf download
NCERT Solutions for Gravitation Class 11 Physics Study material pdf downloadNCERT Solutions for Gravitation Class 11 Physics Study material pdf download
NCERT Solutions for Gravitation Class 11 Physics Study material pdf download
 
SUPER MAGIC CORONATIONS OF GRAPHS
SUPER MAGIC CORONATIONS OF GRAPHS SUPER MAGIC CORONATIONS OF GRAPHS
SUPER MAGIC CORONATIONS OF GRAPHS
 
Complex analysis notes
Complex analysis notesComplex analysis notes
Complex analysis notes
 

More from 政謙 陳

Introduction to vim
Introduction to vimIntroduction to vim
Introduction to vim政謙 陳
 
On sum edge coloring of regular, bipartite and split graphs
On sum edge coloring of regular,  bipartite and split graphsOn sum edge coloring of regular,  bipartite and split graphs
On sum edge coloring of regular, bipartite and split graphs政謙 陳
 
Independent domination in finitely defined classes of graphs polynomial algor...
Independent domination in finitely defined classes of graphs polynomial algor...Independent domination in finitely defined classes of graphs polynomial algor...
Independent domination in finitely defined classes of graphs polynomial algor...政謙 陳
 
Approximation algorithms for clique transversals on some graph classes
Approximation algorithms for clique transversals on some graph classesApproximation algorithms for clique transversals on some graph classes
Approximation algorithms for clique transversals on some graph classes政謙 陳
 
A tabu search algorithm for the min max k-chinese postman problem
A tabu search algorithm for the min max k-chinese postman problemA tabu search algorithm for the min max k-chinese postman problem
A tabu search algorithm for the min max k-chinese postman problem政謙 陳
 
A short proof of konigs matching theorem
A short proof of konigs matching theoremA short proof of konigs matching theorem
A short proof of konigs matching theorem政謙 陳
 

More from 政謙 陳 (6)

Introduction to vim
Introduction to vimIntroduction to vim
Introduction to vim
 
On sum edge coloring of regular, bipartite and split graphs
On sum edge coloring of regular,  bipartite and split graphsOn sum edge coloring of regular,  bipartite and split graphs
On sum edge coloring of regular, bipartite and split graphs
 
Independent domination in finitely defined classes of graphs polynomial algor...
Independent domination in finitely defined classes of graphs polynomial algor...Independent domination in finitely defined classes of graphs polynomial algor...
Independent domination in finitely defined classes of graphs polynomial algor...
 
Approximation algorithms for clique transversals on some graph classes
Approximation algorithms for clique transversals on some graph classesApproximation algorithms for clique transversals on some graph classes
Approximation algorithms for clique transversals on some graph classes
 
A tabu search algorithm for the min max k-chinese postman problem
A tabu search algorithm for the min max k-chinese postman problemA tabu search algorithm for the min max k-chinese postman problem
A tabu search algorithm for the min max k-chinese postman problem
 
A short proof of konigs matching theorem
A short proof of konigs matching theoremA short proof of konigs matching theorem
A short proof of konigs matching theorem
 

Recently uploaded

React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
software engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxsoftware engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxnada99848
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 

Recently uploaded (20)

React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
software engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxsoftware engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptx
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 

Distance domination, guarding and covering of maximal outerplanar graphs

  • 1. Distance domination, guarding and covering of maximal outerplanar graphs Santiago Canales, Gregorio Hernández, Mafalda Martins, Inês Matos Discrete Applied Mathematics 181 (2015) 41–49 報告者:陳政謙
  • 2. Outline • Relationship between distance guarding, distance domination and distance covering on triangulation graphs • 2d-guarding and 2d-domination of maximal outerplanar graphs • 2d-covering of maximal outerplanar graphs
  • 4. The kd-visible • Given a triangulation T = (V, E), we say that a bounded face Ti of T (i.e., a triangle) is kd-visible from a vertex p V, if there is a vertex x Ti such that distT(x, p) ≤ k − 1. k = 1 k = 2 k = 3
  • 5. The kd-guarding set • A kd-guarding set for T is a subset F V such that every triangle of T is kd-visible from an element of F (we designate the elements of F by kd-guards). k = 2 The 2d-guarding number is 1.
  • 6. The kd-dominating set • A kd-dominating set for T is a subset D V such that each vertex u V − D, distT(u, v) ≤ k for some v D. The 2d-domination number is 1. k = 2
  • 7. Lemma 2.1 • If C is a kd-guarding set for a triangulation T, then C is a kd- dominating set for T. k = 2 This is a 2d-guarding set. This is a 2d-dominating set.
  • 8. Lemma 2.1 • If C is a kd-guarding set for a triangulation T, then C is a kd- dominating set for T. k = 2 This is not a 2d-guarding set.This is a 2d-dominating set.
  • 9. The kd-vertex-cover • A kd-vertex-cover of T is a subset C V such that for each edge e E there is a path of length at most k, which contains e and a vertex of C. The 2d-covering number is 1. k = 2
  • 10. Lemma 2.2 • If C is a kd-vertex-cover of a triangulation T, then C is a kd- guarding set and a kd-dominating set for T. k = 2 This is a 2d-guarding set.This is a 2d-vertex-cover. This is a 2d-dominating set.
  • 11. Lemma 2.2 • If C is a kd-vertex-cover of a triangulation T, then C is a kd- guarding set and a kd-dominating set for T. k = 2 This is a 2d-guarding set. This is not a 2d-vertex-cover.
  • 12. Lemma 2.2 • If C is a kd-vertex-cover of a triangulation T, then C is a kd- guarding set and a kd-dominating set for T. k = 2 This is not a 2d-vertex-cover.This is a 2d-dominating set.
  • 13. Theorem 2.3 • Given a triangulation T, the minimum cardinality gkd(T) of any kd-guarding set for T verifies γkd(T) ≤ gkd(T) ≤ βkd(T), where γkd(T) is the kd-domination number, gkd(T) is the kd-guarding number and βkd(T) is the kd-covering number. • This theorem is proved by previous lemmas.
  • 14. Outerplanar graphs • A graph is outerplanar if it has a crossing-free embedding in the plane such that all vertices are on the boundary of its outer face (the unbounded face). Outer face Inner face
  • 15. Outerplanar graphs • A graph is outerplanar if it has a crossing-free embedding in the plane such that all vertices are on the boundary of its outer face (the unbounded face).
  • 16. Maximal outerplanar graphs • An outerplanar graph is said to be maximal outerplanar if adding an edge removes its outerplanarity.
  • 17. Maximal outerplanar graphs – Property 1 • For n ≥ 3, every maximal outerplanar graph with n vertices has a cycle which all of the edges are on the boundary of the outer face.
  • 18. Maximal outerplanar graphs – Property 2 • Every bounded face of maximal outerplanar graphs is a triangle.
  • 19. Maximal outerplanar graphs – Property 3 • Every maximal outerplanar graph with n vertices has exactly 2n − 3 edges. n = 8 2n - 3 = 13
  • 20. m = 6 f(m) 2d-guards • f(m) 2d-guards are always sufficient to guard any maximal outerplanar graph with m vertices. f(6) 2d-guards = 1
  • 21. m = 10 f(m) 2d-guards • f(m) 2d-guards are always sufficient to guard any maximal outerplanar graph with m vertices. f(10) 2d-guards = 2 …
  • 22. Lemma 3.1 • If G is an arbitrary maximal outerplanar graph with two 2d- guards placed at any two adjacent of its m vertices, then f(m − 2) additional 2d-guards are sufficient to guard G. m = 8 f(6) additional 2d-guards are sufficient to guard G.
  • 23. Lemma 3.2 • If G is an arbitrary maximal outerplanar graph with one 2d- guard placed at any one of its m vertices, then f(m − 1) additional 2d-guards are sufficient to guard G. m = 7 f(6) additional 2d-guards are sufficient to guard G.
  • 24. Lemma 3.3 ([13]) • Let G be a maximal outerplanar graph with n ≥ 2k vertices. There is an interior edge e in G that separates off a minimum number m of exterior edges, where k ≤ m ≤ 2k − 2. Therefore, the edge e partitions G into two pieces, one of which contains m exterior edges of G. n = 6 6 ≥ 6 3 ≤ m ≤ 4 k = 3 m = 3 m = 4
  • 25. Lemma 3.3 ([13]) • Let G be a maximal outerplanar graph with n ≥ 2k vertices. There is an interior edge e in G that separates off a minimum number m of exterior edges, where k ≤ m ≤ 2k − 2. Therefore, the edge e partitions G into two pieces, one of which contains m exterior edges of G. n = 8 8 ≥ 8 4 ≤ m ≤ 6 k = 4 m = 4 m = 5 m = 6
  • 26. Lemma 3.4 • Every n-vertex maximal outerplanar graph, with 5 ≤ n ≤ 14, can be 2d-guarded with guards. n = 6 = 1
  • 27. Lemma 3.4 • Every n-vertex maximal outerplanar graph, with 5 ≤ n ≤ 14, can be 2d-guarded with guards. n = 10 …
  • 28. The proof of Lemma 3.4 • n = 5 Trivial. A 2d-guard can be placed at any vertex.
  • 29. The proof of Lemma 3.4 • n = 6 Trivial. A 2d-guard can be placed at any vertex with degree greater than 2.
  • 30. The proof of Lemma 3.4 • n = 7 • Total edges = 2n – 3 = 11 • Total degree = 11 x 2 = 22
  • 31. The proof of Lemma 3.4 • n = 8 0 1 2 3 4 56 7
  • 32. The proof of Lemma 3.4 • n = 9 • By Lemma 3.3 with k = 4, there is an interior edge e that separates off a minimum number m of exterior edges, where m = 4, 5 or 6. m = 4 0 1 2 3 4 5 6 7 8 m = 5 0 1 2 3 4 5 6 7 8 m = 6 0 1 2 3 4 5 6 7 8
  • 33. The proof of Lemma 3.4 • 10 ≤ n ≤ 14 • The proof is like the previous case.
  • 34. Theorem 3.5 • Every n-vertex maximal outerplanar graph, with n ≥ 5, can be 2d-guarded by guards.
  • 35. The proof of Theorem 3.5 • The proof is done by induction on n. • By Lemma 3.4 the result is true for 5 ≤ n ≤ 14. • Assume that n ≥ 15, and the theorem holds for n′ < n. • Lemma 3.3 with k = 6 guarantees the existence of an interior edge e that divides G into maximal outerplanar graphs G1 and G2, such that G1 has m exterior edges of G with 6 ≤ m ≤ 10.
  • 36. Thus G1 and G2 together can be 2d-guarded by guards. n - m + 1 ≤ n – 5, by the induction hypothesis, G2 can be 2d-guarded by guards. The proof of Theorem 3.5 • 6 ≤ m ≤ 8 0 12 m - 2 m - 1 m m + 1 m + 2 n - 2 n - 1 e m + 1 ≤ 9, thus G1 can be 2d-guarded by one guard. G1 G2
  • 37. The proof of Theorem 3.5 • m = 9 The pentagon (5,6,7,8,9) can be 2d-guarded by placing one guard arbitrarily. To 2d-guard the hexagon (0,1,2,3,4,5), we cannot place a 2d-guard at any vertex. We will consider two separate cases.
  • 38. The proof of Theorem 3.5 • m = 9 (a) The internal edge (0,4) is not present. If a guard is placed at vertex 5, then G1 is 2d-guarded. Since G2 has n − 8 edges, the induction hypothesis can be applied and therefore G2 can be 2d-guarded by guards.
  • 39. The proof of Theorem 3.5 • m = 9 (b) The internal edge (0,4) is present. If a 2d-guard is placed at vertex 0, then G1 is 2d- guarded unless the triangle (6,7,8) is present in the triangulation. In any case, two 2d-guards placed at vertices 0 and 9 guard G1. By the induction hypothesis, guards suffice to 2d-guard G2. By Lemma 3.1 the two 2d-guards placed at vertices 0 and 9 allow the remainder of G2 to be guarded by f (n−8−2) = f (n−10) additional 2d-guards.
  • 40. The proof of Theorem 3.5 • m = 10 (a) The vertices 0 and 10 have degree 2 in hexagons (0,1,2,3,4,5) and (5,6,7,8,9,10), respectively. Then one 2d-guard placed at vertex 5 guards G1. By the induction hypothesis, G2 can be 2d-guarded by guards. Thus G can be 2d-guarded by guards.
  • 41. The proof of Theorem 3.5 • m = 10 (b) The vertex 0 has degree greater than 2 in hexagon (0,1,2,3,4,5). We place a guard at vertex 0 and another guard at any vertex of the hexagon (5,6,7,8,9,10) whose degree is greater than 2. These two guards 2d-guard G1. By Lemma 3.2 the guard placed at vertex 0 permits the remainder of G2 to be 2d-guarded by f (n−9−1) = f (n−10) additional guards. By the induction hypothesis, guards suffice to 2d-guard G2.
  • 42. Theorem 3.6 • Every n-vertex maximal outerplanar graph with n ≥ 5 can be 2d-guarded (and 2d-dominated) by guards. This bound is tight.
  • 43. According to Theorem 2.3, γ2d(G) ≤ g2d(G), so ≤ g2d(G), where γ2d(G) is the 2d-domination number, g2d(G) is the 2d-guarding number. The proof of Theorem 3.6 The 2d-domination number is .
  • 44. Lemma 4.1 ([17]) • The vertices of a maximal outerplanar graph G can be 4- colored such that every cycle of length four in G has all four colors.
  • 45. Theorem 4.2 • Every n-vertex maximal outerplanar graph, with n ≥ 4, can be 2d-covered by vertices and this bound is tight. n = 5 = 1
  • 46. The proof of Theorem 4.2 • First, we show that every maximal outerplanar graph has a 2d- covering with vertices. • By Lemma 4.1, we can color the vertices of G such that every cycle of length four is 4-colored. ……....…..
  • 47. The proof of Theorem 4.2 • Now, we will prove that this upper bound is tight. β2d(G) ≥ , where β2d(G) is the 2d-covering number.