Next Article in Journal
Confocal Families of Hyperbolic Conics via Quadratic Differentials
Next Article in Special Issue
Equitable Coloring of IC-Planar Graphs with Girth g ≥ 7
Previous Article in Journal
Self-Improving Properties of Continuous and Discrete Muckenhoupt Weights: A Unified Approach
Previous Article in Special Issue
Spanning k-Ended Tree in 2-Connected Graph
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

An Approximation Algorithm for a Variant of Dominating Set Problem

1
State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing 210023, China
2
School of Mathematical Science & Institute of Mathematics, Nanjing Normal University, Nanjing 210023, China
*
Author to whom correspondence should be addressed.
Axioms 2023, 12(6), 506; https://doi.org/10.3390/axioms12060506
Submission received: 12 March 2023 / Revised: 19 May 2023 / Accepted: 20 May 2023 / Published: 23 May 2023
(This article belongs to the Special Issue Recent Advances in Graph Theory with Applications)

Abstract

:
In this paper, we consider a variant of dominating set problem, i.e., the total dominating set problem. Given an undirected graph G = ( V , E ) , a subset of vertices T V is called a total dominating set if every vertex in V is adjacent to at least one vertex in T. Based on LP relaxation techniques, this paper gives a distributed approximation algorithm for the total dominating set problem in general graphs. The presented algorithm obtains a fractional total dominating set that is, at most, k ( 1 + Δ 1 k ) Δ 1 k times the size of the optimal solution to this problem, where k is a positive integer and Δ is the maximum degree of G. The running time of this algorithm is constant communication rounds under the assumption of a synchronous communication model.

1. Introduction

A subset D V of vertices is called a dominating set of G if every vertex in V D is adjacent to at least one vertex in D. Domination is one of the central problems in the theoretical study of network design and is a widely used class of combinatorial optimization problems with applications in surveillance communications [1], coding theory [2], cryptography [3,4], complex ecosystems [5], electric power networks [6], etc. More practical applications and theoretical results can be found in [7,8,9,10].
A dominating set can be used to optimize the number and location of servers in a network. It is also used in some routing protocols for ad hoc networks [11,12], when it satisfies certain specific properties (weakly connected or connected). In a dominating set, the vertices represent the servers in a network, which can provide essential services to the users. However, when a server is attacked or suddenly crashes, the service provided will be affected. As each server is adjacent to another server in a total dominating set, it can provide greater fault tolerance and serve as a backup when a server crashes. Because each vertex is dominated by another vertex in the total dominating set, this special domination property is precisely adapted to peer-to-peer networks [13]. A total dominating set is a variant of dominating sets; Cockayne introduced its definition in [14]. In a network graph G = ( V , E ) , a subset T V of vertices of G is called a total dominating set (TDS) if each vertex in V is adjacent to at least one vertex in T. For a TDS T of G, if no proper subset of T is a TDS of G, T is called minimal. The minimum total dominating set (MTDS) problem is to find a total dominating set of the minimum size.
In this paper, we present a distributed approximation algorithm for this MTDS problem based on LP relaxation techniques. The algorithm obtains a fractional total dominating set that is, at most, k ( 1 + Δ 1 k ) Δ 1 k times the size of the optimal solution for the TDS problem in general graphs, where k is a positive integer and Δ is the maximum degree. The key to designing this algorithm is to use the maximum dynamic degree in the second neighborhood of the vertex, where the dynamic degree is the number of white vertices in the open neighborhood of a vertex at a given time. The communication model used in this paper is synchronous [15]. That is to say, in each communication round, every vertex can send a message to each of its neighbors in the given graph; the time complexity of the algorithm is to compute the number of communication rounds. In this paper, the number of communication rounds for our algorithm is a constant. Unlike the existing distributed algorithms, the algorithms in [16,17] focus on special graphs (planar graphs without three or four cycles), while this paper is concerned with general graphs. The self-stabilizing distributed algorithm designed in [13] can obtain a minimal total dominating set in polynomial time O ( m n ) (m is the number of edges in the graph and n is the number of vertices in the graph) in general graphs. Comparatively, the distributed algorithm designed in this paper, under a synchronous communication model, can obtain a non-trivial approximation ratio in general graphs with a constant number of rounds. The time complexity of our algorithm is O ( k 2 ) , where k is a positive integer.
The paper is organized as follows. We first give some complexity and algorithmic results on the TDS problem in Section 2. Section 3 introduces some necessary notations and presents the linear programming relaxation of the TDS problem. In Section 4, based on LP relaxation techniques and the definition of the maximum dynamic degree in the second neighborhood of the vertex, we design a distributed approximation algorithm for the TDS problem. In Section 5, we summarize this paper and introduce some future work.

2. Related Work

The concept of total domination in graphs was introduced in [14], and has been extensively studied in [18,19,20,21]. Garey et al. showed that the problem of finding an MTDS is NP-hard for general graphs [22] and is also MAX SNP-hard [23,24,25]. Laskar et al. [26] gave a linear time algorithm to compute the total domination number in a tree and showed that it is NP-complete to find an MTDS in undirected path graphs.
Henning et al. [27] proposed a heuristic algorithm to find a TDS whose size is at most n ( 1 + ln δ ) / ln δ , where n is the number of vertices in G and δ 2 is the minimum degree. An ( H Δ 1 2 )-approximation algorithm was presented in [28], where H i = h = 1 i 1 h is the i-th harmonic number. In [28], they also showed that there exist two constants, a 3 and b > 0 , such that, for each Δ a , it is NP-hard to approximate MTDS within factor ln Δ b ln ln Δ in bipartite graphs. Zhu [29] designed a greedy algorithm for the TDS problem; the performance ratio of the algorithm, ln ( Δ 0.5 ) + 1.5 , showed that it is NP-hard to approximate MTDS within factor ( 1 ε ) ln | V | ( ε > 0 ) in sparse graphs, unless N P D T I M E ( | V | O ( log log | V | ) ) , within factor 391/390 for three-bounded degree graphs, within factor 681/680 for three-regular graphs, and within factor 250/249 for four-regular graphs. More complexity results can be found in [20].
Schaudt et al. [30] showed that it is NP-hard to seek for a TDS T such that the subgraph G [ T ] belongs to a member of a given graph class, such as perfect graphs, bipartite graphs, asteroidal-triple-free graphs, interval graphs, unicyclic graphs, etc. By integrating a genetic algorithm and local search, Yuan et al. [31] designed a hybrid evolutionary algorithm for the TDS problem.
In a planar graph without three cycles, a 16-approximation algorithm was presented in [16] for the TDS problem. Alipour and Jafari [17] presented a 9-approximation algorithm for the TDS problem in a planar graph without four cycles. Bahadir [32] provided an algorithm to determine whether a graph satisfies γ t ( G ) = 2 γ ( G ) or not, where γ t ( G ) is the total domination number and γ ( G ) is the domination number of a graph G. Hu et al. [33] designed an improved local search framework to deal with the TDS problem by analyzing the algorithm in [31]. In [34], Jana and Das first showed that it is NP-complete to find an MTDS in a given geometric unit disk graph. Next, they presented an 8-approximation algorithm for the TDS problem in the geometric unit disk graphs, with the running time of the algorithm as O ( n log k ) , where k is the size of the output result of their algorithm. By using the shifting strategy technique in [35], a polynomial time approximation scheme (PTAS) was given in [34] for the TDS problem in the geometric unit disk graphs.
In a network, a scheduler is called fair if a continuously enabled node will eventually be selected by the scheduler. Otherwise, an unfair scheduler can only guarantee the progress of the global system [13]. For the minimal TDS problem, Goddard et al. [36] presented a self-stabilizing algorithm whose running time is exponential under the unfair central scheduler, i.e., only one enabled node performs a move step at a time. Belhoul et al. [13] designed another self-stabilizing algorithm under the unfair distributed scheduler (any non-empty subset of enabled nodes will be selected to perform the move step); however, the running time of its algorithm is polynomial time.

3. Preliminaries

Firstly, we introduce some notations. Given a graph G = ( V , E ) , for the sake of discussion, we assume that V = { v 1 , v 2 , , v n } . For a vertex v i V , let N ( v i ) = { v j V | v i v j E } denote the open neighborhood of v i . Denote the degree of v i in graph by δ ( v i ) , which is the number of vertices in the neighborhood N ( v i ) , i.e., δ ( v i ) = | N ( v i ) | . Let Δ denote the maximum degree of all vertices in G. Denote the maximum degree of v i in N ( v i ) by δ ( 1 ) ( v i ) : = max v j N ( v i ) δ ( v j ) , and the maximum degree of v i in the second neighborhood by δ ( 2 ) ( v i ) : = max v j N ( v i ) δ ( 1 ) ( v j ) .
Secondly, we give the linear programming relaxation for the total dominating set problem. Given an undirected graph G = ( V , E ) , T V is a total dominating set of G if each vertex v V satisfies N ( v i ) T . For each vertex v i V , we assign a corresponding binary variable x i . If x i is set to 1 if and only if v i is a member of the total dominating set T, i.e., v i T . Hence, T is called a total dominating set of G if, and only if, it satisfies v j N ( v i ) x j 1 for every vertex v i V . Denote the adjacency matrix for G by N. The MTDS problem can be formulated as the following integer linear programming ( I L P M T D S ):
minimize i = 1 n x i s . t . N · x ¯ 1 ¯ x ¯ { 0 , 1 } n ,
where the first constraint indicates that if the vertex v i satisfies v j N ( v i ) x j 1 , then the vertex v i is a member of the total dominating set.
By relaxing the constraints, we can obtain the linear programming relaxation ( L P M T D S ) of I L P M T D S :
minimize i = 1 n x i s . t . N · x ¯ 1 ¯ x ¯ 0 ¯ .
The dual programming ( D L P M T D S ) of L P M T D S is
maximize i = 1 n y i s . t . N · y ¯ 1 ¯ y ¯ 0 ¯ ,
where the first constraint indicates that if we introduce a positive value y i for every vertex v i , then y i of all vertices in N ( v i ) of every vertex v i is at most 1. This means that the sum of the corresponding x i in N ( v i ) of every vertex v i is at least 1.

4. Algorithm for the TDS Problem

In this section, based on the LP relaxation techniques and the definition of the maximum dynamic degree in the second neighborhood of the vertex, we present a distributed approximation algorithm for the TDS problem by integrating the techniques in [37,38].
Similarly to the assumption about dominating sets in [39,40], for each vertex v i , if the vertex satisfies v j N ( v i ) x j 1 , we say that the vertex is covered, and it will be colored black. Initially all vertices are colored white. Denote the dynamic degree of a vertex v i by δ ˜ ( v i ) , and use it to compute the number of white vertices in N ( v i ) . Hence, when the algorithm starts, we have δ ˜ ( v i ) = δ ( v i ) .
Before analyzing our algorithm, we give a brief description of the algorithm. We introduce a variable x i to every vertex v i , x i is initialized as 0, as the algorithm runs, it gradually increases. The outer loop iteration is mainly to reduce δ ˜ ( v i ) . In the outer loop iteration of the algorithm, let τ ( 1 ) ( v i ) and τ ( 2 ) ( v i ) denote the maximum dynamic degree in N ( v i ) and the second neighborhood of v i , respectively. In each inner loop iteration, only the vertices that satisfy δ ˜ ( v i ) τ ( 2 ) ( v i ) + 1 increase the corresponding x i . We call these vertices active. For a white vertex v i , denote the number of active vertices in N ( v i ) by a ( v i ) . If the vertex v i is colored black, let a ( v i ) = 0 . For each vertex v j N ( v i ) , let a ( 1 ) ( v i ) denote the maximum a ( v j ) . The key to solving the total dominating set problem in this paper is how to use the maximum dynamic degree in the second neighborhood of the vertex to design Algorithm 1.
First, we illustrate the execution of Algorithm 1 with an example in Figure 1, where k = 5 and Δ = 5 . Figure 1a is the topology graph of the network with n = 12 , the δ ˜ ( v i ) of each vertex is marked on the graph, initial values of variables x i , δ ˜ ( v i ) , τ ( 2 ) ( v i ) are shown in Table 1. In Figure 1b, when = k 1 = 4 and m = 4 , v 6 , v 8 satisfy δ ˜ ( v i ) τ ( 2 ) ( v i ) + 1 , v 6 , v 8 are active vertices, hence v 6 , v 8 are selected, then the corresponding x 6 , x 8 of v 6 , v 8 are changed from 0 to a ( 1 ) ( v i ) m m + 1 0.57 . According to lines 20–22 of Algorithm 1, v 7 satisfies v j N ( v 7 ) x j 1 , hence v 7 is colored black and we need to update δ ˜ ( v i ) . New values of variables τ ( 2 ) ( v i ) + 1 , a ( v i ) , a ( 1 ) ( v i ) , x i , δ ˜ ( v i ) are shown in Table 1. When m = 3 , new values of variables a ( v i ) , a ( 1 ) ( v i ) , x i , δ ˜ ( v i ) are shown in Table 1, we continue to execute the algorithm, and v 4 , v 5 , v 11 , v 12 are colored black in Figure 1c. When m : 2 0 , the dynamic degrees δ ˜ ( v i ) of all vertices are less than the corrsponding τ ( 2 ) ( v i ) 4 5 , so the outer iteration = 4 ends, and we update τ ( 2 ) ( v i ) in Table 1. By continuing to execute Algorithm 1, when : 3 0 and m : 4 0 , the coloring process of all vertices and the changes in δ ˜ ( v i ) are shown in Figure 1d–f. Initially, all x i = 0 . By executing the algorithm, the final x i of all vertices is shown in Figure 1g. So, we can determine that the size of the output solution of Algorithm 1 is i = 1 12 x i = 4 + 0.57 = 4.57 .
The optimal TDS for this example is shown in Figure 2. Hence, we can see that the optimal TDS in this case is { v 4 , v 6 , v 8 , v 9 } , so its size is 4. The performance ratio of Algorithm 1 is 4.57 4 1.14 in this case.
Second, we give some lemmas that will be used to analyze the approximation ratio of Algorithm 1.
Algorithm 1 Approximating L P M T D S
Input: Given a graph G = ( V , E ) , a positive integer k.
Output: A feasible solution x ¯ for L P M T D S .
 1:
initially x i : = 0 , δ ˜ ( v i ) : = δ ( v i ) , V : = V ;
 2:
calculate δ ( 2 ) ( v i ) , set τ ( 2 ) ( v i ) : = δ ( 2 ) ( v i ) ;
 3:
for  : = k 1 to 0 by −1 do
 4:
  ( δ ˜ ( v i ) , set z i : = 0 )
 5:
  for  m : = k 1 to 0 by −1 do
 6:
   if  δ ˜ ( v i ) τ ( 2 ) ( v i ) + 1 , v i V  then
 7:
    send ’active vertex’ to all neighbors
 8:
   end if
 9:
   calculate a ( v i ) : = | { v j N ( v i ) | t h e v e r t e x v j i s a c t i v e v e r t e x } |
10:
   if the vertex v i is colored ’black’ then
11:
     a ( v i ) : = 0
12:
   end if
13:
   send a ( v i ) to all vertices in N ( v i ) ;
14:
   calculate a ( 1 ) ( v i ) : = max j N ( v i ) { a ( v j ) } ;
15:
   ( a ( v i ) , a ( 1 ) ( v i ) )
16:
   if  δ ˜ ( v i ) τ ( 2 ) ( v i ) + 1 , v i V  then
17:
     x i : = max { x i , a ( 1 ) ( v i ) m m + 1 }
18:
   end if
19:
   send x i to all vertices in N ( v i ) ;
20:
   if  v j N ( v i ) x j 1  then
21:
    the vertex v i is colored ’black’
22:
   end if
23:
   send the color of vertex v i to all vertices in N ( v i ) ;
24:
   update δ ˜ ( v i ) : = | { v j N ( v i ) | t h e v e r t e x v j i s w h i t e } |
25:
  end for
26:
  ( z i )
27:
  send δ ˜ ( v i ) to all vertices in N ( v i ) ;
28:
  calculate τ ( 1 ) ( v i ) : = max j N ( v i ) { δ ˜ ( v j ) } ;
29:
  send τ ( 1 ) ( v i ) to all vertices in N ( v i ) ;
30:
  update τ ( 2 ) ( v i ) : = max j N ( v i ) { τ ( 1 ) ( v j ) } ;
31:
  if  δ ˜ ( v i ) = τ ( 2 ) ( v i ) = 0  then
32:
    V = : V { v i }
33:
  end if
34:
  if  V  then
35:
   continue to execute the algorithm
36:
  end if
37:
end for
Lemma 1.
When each outer loop iteration ℏ starts, for each vertex  v i V , we can obtain
δ ˜ ( v i ) Δ + 1 k .
Proof of Lemma 1.
We prove it by using induction.
Firstly, when = k 1 , the condition Δ + 1 k = Δ . Due to δ ˜ ( v i ) being the dynamic degree in N ( v i ) and Δ being the maximum degree, it is clear that δ ˜ ( v i ) Δ .
Secondly, in order to prove that the other iterations also hold, we use the algorithm in [37] to approximate L P M T D S (the modified algorithm will be available in Appendix A), where all vertices know Δ in their algorithm. Thus, similar to their algorithmic analysis, in the last step ( m = 0 ) of the preceding outer loop iteration + 1 , the x i of all vertices with δ ˜ ( v i ) Δ + 1 k is changed to 1. Hence, all vertices in N ( v i ) will be colored black, so δ ˜ ( v i ) will be changed to 0. Thus, the dynamic degrees of all vertices with δ ˜ ( v i ) Δ + 1 k is changed to 0, and the dynamic degrees of the other vertices clearly satisfy this inequality δ ˜ ( v i ) Δ + 1 k . Therefore, by using the algorithm in [37], we can verify that δ ˜ ( v i ) Δ + 1 k holds when each outer loop iteration starts. Hence, for our algorithm, we only need to show that the x i of all vertices with δ ˜ ( v i ) Δ k is changed to 1 when each inner loop iteration ends ( m = 0 ). According to lines 17–19 of Algorithm 1, we can see that the x i of all vertices with δ ˜ ( v i ) τ ( 2 ) ( v i ) + 1 are changed to 1 when m = 0 . Therefore, we only need to prove that τ ( 2 ) ( v i ) + 1 Δ k for each vertex v i .
Based on the induction hypothesis, we can obtain, for each vertex v i , δ ˜ ( v i ) Δ + 1 k in each outer loop iteration start. As τ ( 2 ) ( v i ) is the maximum dynamic degree in the second neighborhood of v i , we can obtain τ ( 2 ) ( v i ) Δ + 1 k for each vertex v i . Hence, we have
τ ( 2 ) ( v i ) + 1 Δ + 1 k · + 1 = Δ k .
We complete the proof. □
Lemma 2.
Before assigning a new x i to v i , for each vertex v i V , we can obtain
a ( v i ) Δ m + 1 k .
Proof of Lemma 2.
We also prove it by using induction.
Firstly, when m = k 1 , Δ m + 1 k = Δ . According to the definitions of a ( v i ) and Δ , it is clear that a ( v i ) Δ .
Secondly, when m k 1 , we need to prove that all vertices v i with a ( v i ) > Δ m k are colored black when the inner loop iteration ends. We apply the induction hypothesis to the other inner loop iterations, so we can obtain a ( v i ) Δ m + 1 k for each vertex v i . Hence, the x j of each active vertex v j is assigned in line 17 as
x j a ( 1 ) ( v j ) m m + 1 1 Δ m + 1 k · m m + 1 = 1 Δ m k .
If each vertex v i has more than Δ m k active vertices in N ( v i ) , v i will be covered. So, the conclusion holds. □
Then, we analyze all the increased x i in the inner loop iterations. It is difficult to directly compute the sum of all the increased x i . Therefore, for each vertex v i , we introduce a new variable z i . All x i is initialized as 0 in line 4 of Algorithm 1. When the vertex v i increases the x i over time, the increased x i is equally distributed to the z j of the vertices in { v j N ( v i ) v j which is colored white before the increment of x i at line 17}. Hence, we can obtain that z j is equal to the sum of all the increased x i in each outer loop iteration. So, we only need to show that all z i are bounded, as then all the increased x i are also bounded.
Lemma 3.
For each vertex v i V , we can obtain z i 1 + Δ 1 / k τ ( 1 ) ( v i ) + 1 when each outer loop iteration ends.
Proof of Lemma 3.
Due to all z i = 0 in line 4, we only need to analyze a single outer loop iteration . From the execution of the algorithm, we know that all x i are increased in line 17. Therefore, z i can only be increased there if the vertex v i is white. For each white vertex v i , we need to discuss two cases during the current outer loop . The first case is that, when all inner loop iterations end, v i is still white. The second case is that, when the remaining inner loop iterations end, the vertex v i is or becomes black.
For the first case, we can easily obtain v j N ( v i ) x j 1 . Since all the increased x are distributed among at least τ ( 2 ) ( v j ) + 1 z i , we can obtain
z i v j N ( v i ) x j τ ( 2 ) ( v j ) + 1 1 τ ( 1 ) ( v i ) + 1 ,
where the second inequality holds because τ ( 1 ) ( v i ) and τ ( 2 ) ( v j ) denote the maximum dynamic degree δ ˜ ( v i ) in N ( v i ) and the second neighborhood of v i , respectively, so we have τ ( 2 ) ( v j ) τ ( 1 ) ( v i ) .
In the second case, we can see that only white vertices can increase their z. Since the δ ˜ ( v i ) will become smaller over time, these active vertices v j N ( v i ) become active in the previous iterations. Hence, we can see that each active vertex x j contributes to the z i at most
x j δ ˜ ( v i ) 1 τ ( 1 ) ( v i ) + 1 · a ( 1 ) ( v j ) m m + 1 .
Due to v i having a ( v i ) active vertices in N ( v i ) , the upper bound of the increased z i is
1 τ ( 1 ) ( v i ) + 1 · 1 a ( 1 ) ( v j ) m m + 1 · a ( v i ) 1 τ ( 1 ) ( v i ) + 1 · 1 a ( v i ) m m + 1 · a ( v i ) = a ( v i ) 1 m + 1 τ ( 1 ) ( v i ) + 1 ,
where the first inequality follows from a ( v i ) a ( 1 ) ( v j ) .
Combining these results with Lemma 2, by adding (1) and (2), we can obtain
z i 1 τ ( 1 ) ( v i ) + 1 + a ( v i ) 1 m + 1 τ ( 1 ) ( v i ) + 1 1 + ( Δ m + 1 k ) 1 m + 1 τ ( 1 ) ( v i ) + 1 = 1 + Δ 1 / k τ ( 1 ) ( v i ) + 1 .
We complete the proof. □
Based on the two lemmas, we will analyze the correctness, approximation ratio, and time complexity of Algorithm 1 in the following. Firstly, we show that the algorithm outputs a feasible solution to the linear programming relaxation of the minimum total dominating set problem.
Theorem 1.
The output result  x ¯  of Algorithm 1 is a feasible solution to linear programming relaxation of minimum total dominating set problem  L P M T D S .
Proof of Theorem 1.
According to the execution of Algorithm 1, v i will be colored ’black’ only when the vertex v i satifies v j N ( v i ) x j 1 , i.e., x i belongs to the feasible solution of L P M T D S . For each vertex v i , we can obtain δ ˜ ( v i ) = 0 and τ ( 2 ) ( v i ) = 0 at the end of the iteration ( = 0 , m = 0 ), so the algorithm will terminate and all vertices are colored ’black’. Hence, the output result x ¯ of Algorithm 1 is a feasible solution for L P M T D S . □
Secondly, we analyze the approximation ratio of Algorithm 1.
Theorem 2.
For a given network graph G and a positive integer k, Algorithm 1 is a k ( 1 + Δ 1 k ) Δ 1 k -approximation for the minimum total dominating set problem in G.
Proof of Theorem 2.
According to the above description of z j , z j is equal to the sum of all the increased x i in each outer loop iteration of Algorithm 1. From Lemma 3, we know that the z j of all vertices satisfy z j 1 + Δ 1 / k τ ( 1 ) ( v j ) + 1 when each outer loop iteration ends. So, for each vertex v i , the sum of the z j in N ( v i ) of the vertex v i in the outer loop iteration is at most
v j N ( v i ) z j 1 + Δ 1 / k τ ( 1 ) ( v j ) + 1 · δ ˜ ( v i ) 1 + Δ 1 / k δ ˜ ( v i ) + 1 · δ ˜ ( v i ) = ( 1 + Δ 1 / k ) · δ ˜ ( v i ) 1 + 1 ( 1 + Δ 1 k ) · Δ 1 k ,
where the second inequality holds because τ ( 1 ) ( v j ) is the maximum dynamic degree δ ˜ ( v i ) in N ( v j ) , v i N ( v j ) , hence τ ( 1 ) ( v j ) δ ˜ ( v i ) . The fourth inequality follows from Lemma 1, δ ˜ ( v i ) Δ + 1 k .
Next, for each vertex v j , if we let y j : = z j ( 1 + Δ 1 k ) Δ 1 k , then we can see that v j N ( v i ) y j 1 holds for each vertex v i V ; hence, the y ¯ is a feasible solution of D L P M T D S . According to the weak duality theorem of linear programming, we can see that y j is a lower bound of an optimal TDS ( T D S O P T ). Therefore, for each outer loop iteration, we can obtain
j = 1 n z j ( 1 + Δ 1 k ) · Δ 1 k · | T D S O P T | .
On the other hand, there are k iterations in the outer loop. So, we can obtain
i = 1 n x i k ( 1 + Δ 1 k ) · Δ 1 k · | T D S O P T | .
We complete the proof. □
Finally, we analyze the running time of Algorithm 1.
Theorem 3.
The number of communication rounds for Algorithm 1 is  4 k 2 + O ( k ) .
Proof of Theorem 3.
Firstly, it can be seen from the execution of the algorithm that every inner loop iteration needs to send four messages to all its neighbors in the algorithm, and there are k inner loop iterations, so it takes 4 k communication rounds. Secondly, every outer loop iteration needs to send two messages to all neighbors in the algorithm; hence, it takes 4 k + 2 communication rounds for each outer loop iteration. There are k outer loop iterations, so it takes k ( 4 k + 2 ) communication rounds for all outer loop iterations. Finally, we need to calculate some values before the outer loop iteration starts, which takes O ( k ) communication rounds. Hence, we can see that the number of communication rounds in the algorithm is k ( 4 k + 2 ) + O ( k ) = 4 k 2 + O ( k ) . □

5. Conclusions

In this paper, we present a distributed approximation algorithm for the total dominating set problem by using the maximum dynamic degree in the second neighborhood of the vertex and LP relaxation techniques. Our algorithm obtained only a relaxed solution; further considerations can be given on how to design a random rounding algorithm to obtain an integer TDS from the relaxed solution. It is interesting to consider this problem in wireless networks so that we can take advantage of the specificity of wireless networks to improve the performance of the algorithm. In practical applications, if the vertices in a graph are weighted, additional considerations could include how to design an approximation algorithm to solve the minimum total dominating set problem.

Author Contributions

Conceptualization, L.W.; methodology, L.W.; validation, L.W. and W.W.; formal analysis, L.W. and W.W.; investigation, L.W. and W.W.; writing—review and editing, L.W.; project administration, L.W. All authors have read and agreed to the published version of the manuscript.

Funding

The first author is supported by NSFC (No. 62272215).

Institutional Review Board Statement

Not applicable.

Data Availability Statement

This manuscript has no associated data.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
LPLinear programming
TDSTotal dominating set
MTDSMinimum total dominating set
I L P M T D S Integer linear programming of minimum total dominating set problem
L P M T D S Linear programming relaxation of minimum total dominating set problem
D L P M T D S Dual linear programming of minimum total dominating set problem
T D S O P T Optimal total dominating set

Appendix A

Algorithm A1 Approximating L P M T D S
Input:  G = ( V , E ) , a positive integer k and maximum degree Δ .
Output: A feasible solution x ¯ for L P M T D S .
 1:
initially x i : = 0 , δ ˜ ( v i ) : = δ ( v i ) ;
 2:
for  : = k 1 to 0 by −1 do
 3:
  set z i : = 0 ; a ( v i ) : = 0
 4:
  for  m : = k 1 to 0 by −1 do
 5:
   send the color of node v i to all nodes in N ( v i ) ;
 6:
   update δ ˜ ( v i ) : = | { v j N ( v i ) | t h e n o d e v j i s w h i t e } | ;
 7:
   if  δ ˜ ( v i ) Δ k  then
 8:
     x i : = max { x i , 1 Δ m k } ;
 9:
   end if
10:
   send x i to all nodes in N ( v i ) ;
11:
   update the color of node v i and the values z i , a ( v i ) ;
12:
  end for
13:
end for

References

  1. Jiang, P.; Liu, J.; Wu, F.; Wang, J.; Xue, A. Node deployment algorithm for underwater sensor networks based on connected dominating set. Sensors 2016, 16, 388. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  2. Chen, J.; He, K.; Du, R.; Zheng, M.; Xiang, Y.; Yuan, Q. Dominating set and network coding-based routing in wireless mesh networks. IEEE Trans. Parallel Distrib. Syst. 2013, 26, 423–433. [Google Scholar] [CrossRef]
  3. Fellows, M.R.; Koblitz, N. Combinatorially based cryptography for children (and adults). Congr. Numer. 1994, 99, 9–41. [Google Scholar]
  4. Kwon, S.; Kang, J.S.; Yeom, Y. Analysis of public-key cryptography using a 3-regular graph with a perfect dominating set. In Proceedings of the IEEE Region 10 Symposium (TENSYMP), Grand Hyatt Jeju, Republic of Korea, 23–25 August 2021; pp. 1–6. [Google Scholar]
  5. Allesina, S.; Bodini, A. Who dominates whom in the ecosystem? Energy flow bottlenecks and cascading extinctions. J. Theor. Biol. 2004, 230, 351–358. [Google Scholar] [CrossRef]
  6. Haynes, T.W.; Hedetniemi, S.M.; Hedetniemi, S.T.; Henning, M.A. Domination in graphs applied to electric power networks. SIAM J. Discret. Math. 2002, 15, 519–529. [Google Scholar] [CrossRef]
  7. Haynes, T.W.; Hedetniemi, S.; Slater, P. Fundamentals of Domination in Graphs; CRC Press: Boca Raton, FL, USA, 2013. [Google Scholar]
  8. Haynes, T.W. Domination in Graphs: Volume 2: Advanced Topics; Routledge: London, UK, 2017. [Google Scholar]
  9. Haynes, T.W.; Hedetniemi, S.; Henning, M.A. Topics in Domination in Graphs; Springer Nature: Berlin/Heidelberg, Germany, 2020. [Google Scholar]
  10. Haynes, T.W.; Hedetniemi, S.; Henning, M.A. Structures of Domination in Graphs; Springer: Cham, Switzerland, 2021. [Google Scholar]
  11. Alzoubi, K.M.; Wan, P.J.; Frieder, O. Maximal independent set, weakly-connected dominating set, and induced spanners in wireless ad hoc networks. Int. J. Found. Comput. Sci. 2003, 14, 287–303. [Google Scholar] [CrossRef]
  12. Das, B.; Bharghavan, V. Routing in ad-hoc networks using minimum connected dominating sets. In Proceedings of the ICC’97-International Conference on Communications, Montreal, QC, Canada, 8–12 June 1997; pp. 376–380. [Google Scholar]
  13. Belhoul, Y.; Yahiaoui, S.; Kheddouci, H. Efficient self-stabilizing algorithms for minimal total k-dominating sets in graphs. Inf. Process. Lett. 2014, 114, 339–343. [Google Scholar] [CrossRef]
  14. Cockayne, E.J.; Dawes, R.M.; Hedetniemi, S.T. Total domination in graphs. Networks 1980, 10, 211–219. [Google Scholar] [CrossRef]
  15. Awerbuch, B.; Goldberg, A.V.; Luby, M.; Plotkin, S.A. Network decomposition and locality in distributed computation. In Proceedings of the 30th Annual IEEE Symposium on Foundations of Computer Science, Research Triangle Park, NC, USA, 30 October–1 November 1989; pp. 364–369. [Google Scholar]
  16. Alipour, S.; Futuhi, E.; Karimi, S. On distributed algorithms for minimum dominating set problem, from theory to application. arXiv 2020, arXiv:2012.04883. [Google Scholar] [CrossRef]
  17. Alipour, S.; Jafari, A. A local constant approximation factor algorithm for minimum dominating set of certain planar graphs. In Proceedings of the 32nd ACM Symposium on Parallelism in Algorithms and Architectures, Virtual, 15–17 July 2020; pp. 501–502. [Google Scholar]
  18. Haynes, T.W.; Hedetniemi, S.T.; Slater, P.J. Fundamentals of Domination in Graphs; Chapman and Hall/CRC: New York, NY, USA, 1998. [Google Scholar]
  19. Haynes, T.W.; Hedetniemi, S.T.; Slater, P.J. Domination in Graphs: Advanced Topics; Chapman and Hall/CRC Pure and Applied Mathematics Series; Marcel Dekker: New York, NY, USA, 1998; Volume 209. [Google Scholar]
  20. Henning, M.A. A survey of selected recent results on total domination in graphs. Discret. Math. 2009, 309, 32–63. [Google Scholar] [CrossRef] [Green Version]
  21. Henning, M.A.; Yeo, A. Total Domination in Graphs; Springer: New York, NY, USA, 2013. [Google Scholar]
  22. Garey, M.R.; Johnson, D.S. Computers and Intractability: A Guide to the Theory of NP-Completeness; Freeman: San Francisco, CA, USA, 1978. [Google Scholar]
  23. Khanna, S.; Motwani, R.; Sudan, M.; Vazirani, U. On syntactic versus computational views of approximability. SIAM J. Comput. 1998, 28, 164–191. [Google Scholar] [CrossRef] [Green Version]
  24. Papademitriou, C.; Yannakakis, M. Optimization, approximation and complexity classes. In Proceeding of the 20th Annual ACM Symposium on Theory of Computing, Chicago, IL, USA, 2–4 May 1988; pp. 229–234. [Google Scholar]
  25. Crescenzi, P.; Kann, V. A Compendium of NP Optimization Problems; Technical Report SI/RR-95/02; Department of Computer Science, University of Rome “La Sapienza”: Rome, Italy, 1995. [Google Scholar]
  26. Laskar, R.; Pfaff, J.; Hedetniemi, S.M.; Hedetniemi, S.T. On the algorithmic complexity of total domination. SIAM J. Algebr. Discret. Methods 1984, 5, 420–425. [Google Scholar] [CrossRef]
  27. Henning, M.A.; Yeo, A. A transition from total domination in graphs to transversals in hypergraphs. Quaest. Math. 2007, 30, 417–436. [Google Scholar] [CrossRef]
  28. Chlebík, M.; Chlebíková, J. Approximation hardness of dominating set problems in bounded degree graphs. Inf. Comput. 2008, 206, 1264–1275. [Google Scholar] [CrossRef] [Green Version]
  29. Zhu, J. Approximation for minimum total dominating set. In Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human, Seoul, Republic of Korea, 24–26 November 2009; Association for Computing Machinery: New York, NY, USA, 2009; pp. 119–124. [Google Scholar]
  30. Schaudt, O.; Schrader, R. The complexity of connected dominating sets and total dominating sets with specified induced subgraphs. Inf. Process. Lett. 2012, 112, 953–957. [Google Scholar] [CrossRef]
  31. Yuan, F.; Li, C.; Gao, X.; Yin, M.; Wang, Y. A novel hybrid algorithm for minimum total dominating set problem. Mathematics 2019, 7, 222. [Google Scholar] [CrossRef] [Green Version]
  32. Bahadir, S. An algorithm to check the equality of total domination number and double of domination number in graphs. Turk. J. Math. 2020, 44, 1701–1707. [Google Scholar] [CrossRef]
  33. Hu, S.; Liu, H.; Wang, Y.; Li, R.; Yin, M.; Yang, N. Towards efficient local search for the minimum total dominating set problem. Appl. Intell. 2021, 51, 8753–8767. [Google Scholar] [CrossRef]
  34. Jena, S.K.; Das, G.K. Total domination in geometric unit disk graphs. In Proceeding of the 33rd Canadian Conference on Computational Geometry (CCCG), Halifax, NS, Canada, 10–12 August 2021; pp. 219–227. [Google Scholar]
  35. Hochbaum, D.S.; Maass, W. Approximation schemes for covering and packing problems in image processing and VLSI. J. ACM (JACM) 1985, 32, 130–136. [Google Scholar] [CrossRef] [Green Version]
  36. Goddard, W.; Hedetniemi, S.T.; Jacobs, D.P.; Srimani, P.K. A self-stabilizing distributed algorithm for minimal total domination in an arbitrary system graph. In Proceedings of the International Parallel and Distributed Processing Symposium, Nice, France, 22–26 April 2003. [Google Scholar]
  37. Elkin, M. Distributed approximation: A survey. ACM SIGACT News 2004, 35, 40–57. [Google Scholar] [CrossRef]
  38. Kuhn, F.; Wattenhofer, R. Constant-time distributed dominating set approximation. Distrib. Comput. 2005, 17, 303–310. [Google Scholar] [CrossRef] [Green Version]
  39. Jia, L.; Rajaraman, R.; Suel, T. An efficient distributed algorithm for constructing small dominating sets. Distrib. Comput. 2002, 15, 193–205. [Google Scholar] [CrossRef]
  40. Guha, S.; Khuller, S. Approximation algorithms for connected dominating sets. Algorithmica 1998, 20, 374–387. [Google Scholar] [CrossRef] [Green Version]
Figure 1. An illustration of Algorithm 1, in which k = 5 and Δ = 5 . (a) is the topology graph, δ ˜ ( v i ) of each vertex is marked on the graph. (b) When = k 1 = 4 and m = 4 , v 7 is colored black and we update δ ˜ ( v i ) . (c) When = k 1 = 4 and m : 3 0 , v 4 , v 5 , v 11 , v 12 are colored black and we update δ ˜ ( v i ) . (d) When = k 2 = 3 and m : 4 0 , v 3 , v 6 , v 10 are colored black and we update δ ˜ ( v i ) . (e) When = k 3 = 2 and m : 4 0 , v 8 , v 9 are colored black and we update δ ˜ ( v i ) . (f) When = k 4 = 1 and m : 4 0 , v 1 , v 2 are colored black and we update δ ˜ ( v i ) . By executing the algorithm, the final x i of all vertices is shown in (g).
Figure 1. An illustration of Algorithm 1, in which k = 5 and Δ = 5 . (a) is the topology graph, δ ˜ ( v i ) of each vertex is marked on the graph. (b) When = k 1 = 4 and m = 4 , v 7 is colored black and we update δ ˜ ( v i ) . (c) When = k 1 = 4 and m : 3 0 , v 4 , v 5 , v 11 , v 12 are colored black and we update δ ˜ ( v i ) . (d) When = k 2 = 3 and m : 4 0 , v 3 , v 6 , v 10 are colored black and we update δ ˜ ( v i ) . (e) When = k 3 = 2 and m : 4 0 , v 8 , v 9 are colored black and we update δ ˜ ( v i ) . (f) When = k 4 = 1 and m : 4 0 , v 1 , v 2 are colored black and we update δ ˜ ( v i ) . By executing the algorithm, the final x i of all vertices is shown in (g).
Axioms 12 00506 g001
Figure 2. The optimal total dominating set, in which k = 5 and Δ = 5 .
Figure 2. The optimal total dominating set, in which k = 5 and Δ = 5 .
Axioms 12 00506 g002
Table 1. Initial and new values of some variables.
Table 1. Initial and new values of some variables.
v 1 v 2 v 3 v 4 v 5 v 6 v 7 v 8 v 9 v 10 v 11 v 12
x i 000000000000
initial δ ˜ ( v i ) 111215343232
τ ( 2 ) ( v i ) 445554554455
τ ( 2 ) ( v i ) 4 5 3.033.033.623.623.623.033.623.623.033.033.623.62
= 4 a ( v i ) 010110201111
a ( 1 ) ( v i ) 101002121121
m = 4 x i 000000.5700.570000
δ ˜ ( v i ) 111214333222
a ( v i ) 000110000011
= 4 a ( 1 ) ( v i ) 001001100011
x i 00000100.570000
m = 3 δ ˜ ( v i ) 110210233211
2 m 0 τ ( 2 ) ( v i ) 332223333332
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Wang, L.; Wang, W. An Approximation Algorithm for a Variant of Dominating Set Problem. Axioms 2023, 12, 506. https://doi.org/10.3390/axioms12060506

AMA Style

Wang L, Wang W. An Approximation Algorithm for a Variant of Dominating Set Problem. Axioms. 2023; 12(6):506. https://doi.org/10.3390/axioms12060506

Chicago/Turabian Style

Wang, Limin, and Wenqi Wang. 2023. "An Approximation Algorithm for a Variant of Dominating Set Problem" Axioms 12, no. 6: 506. https://doi.org/10.3390/axioms12060506

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop