-
Locating-dominating partitions for some classes of graphs
Authors:
Florent Foucaud,
Paras Vinubhai Maniya,
Kaustav Paul,
Dinabandhu Pradhan
Abstract:
A dominating set of a graph $G$ is a set $D \subseteq V(G)$ such that every vertex in $V(G) \setminus D$ is adjacent to at least one vertex in $D$. A set $L\subseteq V(G)$ is a locating set of $G$ if every vertex in $V(G) \setminus L$ has pairwise distinct open neighborhoods in $L$. A set $D\subseteq V(G)$ is a locating-dominating set of $G$ if $D$ is a dominating set and a locating set of $G$. Th…
▽ More
A dominating set of a graph $G$ is a set $D \subseteq V(G)$ such that every vertex in $V(G) \setminus D$ is adjacent to at least one vertex in $D$. A set $L\subseteq V(G)$ is a locating set of $G$ if every vertex in $V(G) \setminus L$ has pairwise distinct open neighborhoods in $L$. A set $D\subseteq V(G)$ is a locating-dominating set of $G$ if $D$ is a dominating set and a locating set of $G$. The location-domination number of $G$, denoted by $γ_{LD}(G)$, is the minimum cardinality among all locating-dominating sets of $G$. A well-known conjecture in the study of locating-dominating sets is that if $G$ is an isolate-free and twin-free graph of order $n$, then $γ_{LD}(G)\le \frac{n}{2}$. Recently, Bousquet et al. [Discrete Math. 348 (2025), 114297] proved that if $G$ is an isolate-free and twin-free graph of order $n$, then $γ_{LD}(G)\le \lceil\frac{5n}{8}\rceil$ and posed the question whether the vertex set of such a graph can be partitioned into two locating sets. We answer this question affirmatively for twin-free distance-hereditary graphs, maximal outerplanar graphs, split graphs, and co-bipartite graphs. In fact, we prove a stronger result that for any graph $G$ without isolated vertices and twin vertices, if $G$ is a distance-hereditary graph or a maximal outerplanar graph or a split graph or a co-bipartite graph, then the vertex set of $G$ can be partitioned into two locating-dominating sets. Consequently, this also confirms the original conjecture for these graph classes.
△ Less
Submitted 15 June, 2025;
originally announced June 2025.
-
$4K_1$-free graph with the cop number $3$
Authors:
Arnab Char,
Paras Vinubhai Maniya,
Dinabandhu Pradhan
Abstract:
The game of cops and robber is a two-player turn-based game played on a graph where the cops try to capture the robber. The cop number of a graph $G$, denoted by $c(G)$ is the minimum number of cops required to capture the robber. For a given class of graphs ${\cal F}$, let $c({\cal F}):=\sup\{c(F)|F\in {\cal F}\}$, and let Forb$({\cal F})$ denote the class of ${\cal F}$-free graphs. We show that…
▽ More
The game of cops and robber is a two-player turn-based game played on a graph where the cops try to capture the robber. The cop number of a graph $G$, denoted by $c(G)$ is the minimum number of cops required to capture the robber. For a given class of graphs ${\cal F}$, let $c({\cal F}):=\sup\{c(F)|F\in {\cal F}\}$, and let Forb$({\cal F})$ denote the class of ${\cal F}$-free graphs. We show that the complement of the Shrikhande graph is $(4K_1,C_{\ell}$)-free for any $\ell \geq 6$ and has the cop number~$3$. This provides a counterexample for the conjecture proposed by Sivaraman (arxiv, 2019) which states that if $G$ is $C_{\ell}$-free for all $\ell\ge 6$, then $c(G)\le 2$. This also gives a negative answer to the question posed by Turcotte (Discrete Math. 345:112660 (2022)) 112660. to check whether $c($Forb$(pK_1))=p-2$. Turcotte also posed the question to check whether $c($Forb$(pK_1+K_2))\leq p+1$, for $p\geq 3$. We prove that this result indeed holds. We also generalize this result for Forb$(pK_1+qK_2)$. Motivated by the results of Baird et al. (Contrib. Discrete Math. 9:70--84 (2014)) and Turcotte and Yvon (Discrete Appl. Math. 301:74--98 (2021)), we define the upper threshold degree and lower threshold degree for a particular class of graphs and show some computational advantage to find the cop number using these.
△ Less
Submitted 21 May, 2025;
originally announced May 2025.
-
AI and Generative AI Transforming Disaster Management: A Survey of Damage Assessment and Response Techniques
Authors:
Aman Raj,
Lakshit Arora,
Sanjay Surendranath Girija,
Shashank Kapoor,
Dipen Pradhan,
Ankit Shetgaonkar
Abstract:
Natural disasters, including earthquakes, wildfires and cyclones, bear a huge risk on human lives as well as infrastructure assets. An effective response to disaster depends on the ability to rapidly and efficiently assess the intensity of damage. Artificial Intelligence (AI) and Generative Artificial Intelligence (GenAI) presents a breakthrough solution, capable of combining knowledge from multip…
▽ More
Natural disasters, including earthquakes, wildfires and cyclones, bear a huge risk on human lives as well as infrastructure assets. An effective response to disaster depends on the ability to rapidly and efficiently assess the intensity of damage. Artificial Intelligence (AI) and Generative Artificial Intelligence (GenAI) presents a breakthrough solution, capable of combining knowledge from multiple types and sources of data, simulating realistic scenarios of disaster, and identifying emerging trends at a speed previously unimaginable. In this paper, we present a comprehensive review on the prospects of AI and GenAI in damage assessment for various natural disasters, highlighting both its strengths and limitations. We talk about its application to multimodal data such as text, image, video, and audio, and also cover major issues of data privacy, security, and ethical use of the technology during crises. The paper also recognizes the threat of Generative AI misuse, in the form of dissemination of misinformation and for adversarial attacks. Finally, we outline avenues of future research, emphasizing the need for secure, reliable, and ethical Generative AI systems for disaster management in general. We believe that this work represents the first comprehensive survey of Gen-AI techniques being used in the field of Disaster Assessment and Response.
△ Less
Submitted 12 May, 2025;
originally announced May 2025.
-
Opportunities and Applications of GenAI in Smart Cities: A User-Centric Survey
Authors:
Ankit Shetgaonkar,
Dipen Pradhan,
Lakshit Arora,
Sanjay Surendranath Girija,
Shashank Kapoor,
Aman Raj
Abstract:
The proliferation of IoT in cities, combined with Digital Twins, creates a rich data foundation for Smart Cities aimed at improving urban life and operations. Generative AI (GenAI) significantly enhances this potential, moving beyond traditional AI analytics and predictions by processing multimodal content and generating novel outputs like text and simulations. Using specialized or foundational mo…
▽ More
The proliferation of IoT in cities, combined with Digital Twins, creates a rich data foundation for Smart Cities aimed at improving urban life and operations. Generative AI (GenAI) significantly enhances this potential, moving beyond traditional AI analytics and predictions by processing multimodal content and generating novel outputs like text and simulations. Using specialized or foundational models, GenAI's natural language abilities such as Natural Language Understanding (NLU) and Natural Language Generation (NLG) can power tailored applications and unified interfaces, dramatically lowering barriers for users interacting with complex smart city systems. In this paper, we focus on GenAI applications based on conversational interfaces within the context of three critical user archetypes in a Smart City - Citizens, Operators and Planners. We identify and review GenAI models and techniques that have been proposed or deployed for various urban subsystems in the contexts of these user archetypes. We also consider how GenAI can be built on the existing data foundation of official city records, IoT data streams and Urban Digital Twins. We believe this work represents the first comprehensive summarization of GenAI techniques for Smart Cities from the lens of the critical users in a Smart City.
△ Less
Submitted 12 May, 2025;
originally announced May 2025.
-
Explainable Artificial Intelligence Techniques for Software Development Lifecycle: A Phase-specific Survey
Authors:
Lakshit Arora,
Sanjay Surendranath Girija,
Shashank Kapoor,
Aman Raj,
Dipen Pradhan,
Ankit Shetgaonkar
Abstract:
Artificial Intelligence (AI) is rapidly expanding and integrating more into daily life to automate tasks, guide decision making, and enhance efficiency. However, complex AI models, which make decisions without providing clear explanations (known as the "black-box problem"), currently restrict trust and widespread adoption of AI. Explainable Artificial Intelligence (XAI) has emerged to address the…
▽ More
Artificial Intelligence (AI) is rapidly expanding and integrating more into daily life to automate tasks, guide decision making, and enhance efficiency. However, complex AI models, which make decisions without providing clear explanations (known as the "black-box problem"), currently restrict trust and widespread adoption of AI. Explainable Artificial Intelligence (XAI) has emerged to address the black-box problem of making AI systems more interpretable and transparent so stakeholders can trust, verify, and act upon AI-based outcomes. Researchers have developed various techniques to foster XAI in the Software Development Lifecycle. However, there are gaps in applying XAI techniques in the Software Engineering phases. Literature review shows that 68% of XAI in Software Engineering research is focused on maintenance as opposed to 8% on software management and requirements. In this paper, we present a comprehensive survey of the applications of XAI methods such as concept-based explanations, Local Interpretable Model-agnostic Explanations (LIME), SHapley Additive exPlanations (SHAP), rule extraction, attention mechanisms, counterfactual explanations, and example-based explanations to the different phases of the Software Development Life Cycle (SDLC), including requirements elicitation, design and development, testing and deployment, and evolution. To the best of our knowledge, this paper presents the first comprehensive survey of XAI techniques for every phase of the Software Development Life Cycle (SDLC). This survey aims to promote explainable AI in Software Engineering and facilitate the practical application of complex AI models in AI-driven software development.
△ Less
Submitted 11 May, 2025;
originally announced May 2025.
-
Adversarial Attacks in Multimodal Systems: A Practitioner's Survey
Authors:
Shashank Kapoor,
Sanjay Surendranath Girija,
Lakshit Arora,
Dipen Pradhan,
Ankit Shetgaonkar,
Aman Raj
Abstract:
The introduction of multimodal models is a huge step forward in Artificial Intelligence. A single model is trained to understand multiple modalities: text, image, video, and audio. Open-source multimodal models have made these breakthroughs more accessible. However, considering the vast landscape of adversarial attacks across these modalities, these models also inherit vulnerabilities of all the m…
▽ More
The introduction of multimodal models is a huge step forward in Artificial Intelligence. A single model is trained to understand multiple modalities: text, image, video, and audio. Open-source multimodal models have made these breakthroughs more accessible. However, considering the vast landscape of adversarial attacks across these modalities, these models also inherit vulnerabilities of all the modalities, and ultimately, the adversarial threat amplifies. While broad research is available on possible attacks within or across these modalities, a practitioner-focused view that outlines attack types remains absent in the multimodal world. As more Machine Learning Practitioners adopt, fine-tune, and deploy open-source models in real-world applications, it's crucial that they can view the threat landscape and take the preventive actions necessary. This paper addresses the gap by surveying adversarial attacks targeting all four modalities: text, image, video, and audio. This survey provides a view of the adversarial attack landscape and presents how multimodal adversarial threats have evolved. To the best of our knowledge, this survey is the first comprehensive summarization of the threat landscape in the multimodal world.
△ Less
Submitted 5 May, 2025;
originally announced May 2025.
-
Optimizing LLMs for Resource-Constrained Environments: A Survey of Model Compression Techniques
Authors:
Sanjay Surendranath Girija,
Shashank Kapoor,
Lakshit Arora,
Dipen Pradhan,
Aman Raj,
Ankit Shetgaonkar
Abstract:
Large Language Models (LLMs) have revolutionized many areas of artificial intelligence (AI), but their substantial resource requirements limit their deployment on mobile and edge devices. This survey paper provides a comprehensive overview of techniques for compressing LLMs to enable efficient inference in resource-constrained environments. We examine three primary approaches: Knowledge Distillati…
▽ More
Large Language Models (LLMs) have revolutionized many areas of artificial intelligence (AI), but their substantial resource requirements limit their deployment on mobile and edge devices. This survey paper provides a comprehensive overview of techniques for compressing LLMs to enable efficient inference in resource-constrained environments. We examine three primary approaches: Knowledge Distillation, Model Quantization, and Model Pruning. For each technique, we discuss the underlying principles, present different variants, and provide examples of successful applications. We also briefly discuss complementary techniques such as mixture-of-experts and early-exit strategies. Finally, we highlight promising future directions, aiming to provide a valuable resource for both researchers and practitioners seeking to optimize LLMs for edge deployment.
△ Less
Submitted 8 May, 2025; v1 submitted 4 May, 2025;
originally announced May 2025.
-
Disjunctive domination in maximal outerplanar graphs
Authors:
Michael A. Henning,
Paras Vinubhai Maniya,
Dinabandhu Pradhan
Abstract:
A disjunctive dominating set of a graph $G$ is a set $D \subseteq V(G)$ such that every vertex in $V(G)\setminus D$ has a neighbor in $D$ or has at least two vertices in $D$ at distance $2$ from it. The disjunctive domination number of $G$, denoted by $γ_2^d(G)$, is the minimum cardinality of a disjunctive dominating set of $G$. In this paper, we show that if $G$ is a maximal outerplanar graph of…
▽ More
A disjunctive dominating set of a graph $G$ is a set $D \subseteq V(G)$ such that every vertex in $V(G)\setminus D$ has a neighbor in $D$ or has at least two vertices in $D$ at distance $2$ from it. The disjunctive domination number of $G$, denoted by $γ_2^d(G)$, is the minimum cardinality of a disjunctive dominating set of $G$. In this paper, we show that if $G$ is a maximal outerplanar graph of order $n \ge 7$ with $k$ vertices of degree $2$, then $γ_2^d(G)\le \lfloor\frac{2}{9}(n+k)\rfloor$, and this bound is sharp.
△ Less
Submitted 9 April, 2025;
originally announced April 2025.
-
Secure domination in $P_5$-free graphs
Authors:
Paras Vinubhai Maniya,
Uttam K. Gupta,
Michael A. Henning,
Dinabandhu Pradhan
Abstract:
A dominating set of a graph $G$ is a set $S \subseteq V(G)$ such that every vertex in $V(G) \setminus S$ has a neighbor in $S$, where two vertices are neighbors if they are adjacent. A secure dominating set of $G$ is a dominating set $S$ of $G$ with the additional property that for every vertex $v \in V(G) \setminus S$, there exists a neighbor $u$ of $v$ in $S$ such that…
▽ More
A dominating set of a graph $G$ is a set $S \subseteq V(G)$ such that every vertex in $V(G) \setminus S$ has a neighbor in $S$, where two vertices are neighbors if they are adjacent. A secure dominating set of $G$ is a dominating set $S$ of $G$ with the additional property that for every vertex $v \in V(G) \setminus S$, there exists a neighbor $u$ of $v$ in $S$ such that $(S \setminus \{u\}) \cup \{v\}$ is a dominating set of $G$. The secure domination number of $G$, denoted by $γ_s(G)$, is the minimum cardinality of a secure dominating set of $G$. We prove that if $G$ is a $P_5$-free graph, then $γ_s(G) \le \frac{3}{2}α(G)$, where $α(G)$ denotes the independence number of $G$. We further show that if $G$ is a connected $(P_5, H)$-free graph for some $H \in \{ P_3 \cup P_1, K_2 \cup 2K_1, ~\text{paw},~ C_4\}$, then $γ_s(G)\le \max\{3,α(G)\}$. We also show that if $G$ is a $(P_3 \cup P_2)$-free graph, then $γ_s(G)\le α(G)+1$.
△ Less
Submitted 11 March, 2025;
originally announced March 2025.
-
A multiple k-means cluster ensemble framework for clustering citation trajectories
Authors:
Joyita Chakraborty,
Dinesh K. Pradhan,
Subrata Nandi
Abstract:
Citation maturity time varies for different articles. However, the impact of all articles is measured in a fixed window. Clustering their citation trajectories helps understand the knowledge diffusion process and reveals that not all articles gain immediate success after publication. Moreover, clustering trajectories is necessary for paper impact recommendation algorithms. It is a challenging prob…
▽ More
Citation maturity time varies for different articles. However, the impact of all articles is measured in a fixed window. Clustering their citation trajectories helps understand the knowledge diffusion process and reveals that not all articles gain immediate success after publication. Moreover, clustering trajectories is necessary for paper impact recommendation algorithms. It is a challenging problem because citation time series exhibit significant variability due to non linear and non stationary characteristics. Prior works propose a set of arbitrary thresholds and a fixed rule based approach. All methods are primarily parameter dependent. Consequently, it leads to inconsistencies while defining similar trajectories and ambiguities regarding their specific number. Most studies only capture extreme trajectories. Thus, a generalised clustering framework is required. This paper proposes a feature based multiple k means cluster ensemble framework. 1,95,783 and 41,732 well cited articles from the Microsoft Academic Graph data are considered for clustering short term (10 year) and long term (30 year) trajectories, respectively. It has linear run time. Four distinct trajectories are obtained Early Rise Rapid Decline (2.2%), Early Rise Slow Decline (45%), Delayed Rise No Decline (53%), and Delayed Rise Slow Decline (0.8%). Individual trajectory differences for two different spans are studied. Most papers exhibit Early Rise Slow Decline and Delayed Rise No Decline patterns. The growth and decay times, cumulative citation distribution, and peak characteristics of individual trajectories are redefined empirically. A detailed comparative study reveals our proposed methodology can detect all distinct trajectory classes.
△ Less
Submitted 10 September, 2023;
originally announced September 2023.
-
Singleton Coalition Graph Chains
Authors:
Davood Bakhshesh,
Michael A. Henning,
Dinabandhu Pradhan
Abstract:
Let $G$ be graph with vertex set $V$ and order $n=|V|$. A coalition in $G$ is a combination of two distinct sets, $A\subseteq V$ and $B\subseteq V$, which are disjoint and are not dominating sets of $G$, but $A\cup B$ is a dominating set of $G$. A coalition partition of $G$ is a partition $\mathcal{P}=\{S_1,\ldots,S_k\}$ of its vertex set $V$, where each set $S_i\in \mathcal{P}$ is either a domina…
▽ More
Let $G$ be graph with vertex set $V$ and order $n=|V|$. A coalition in $G$ is a combination of two distinct sets, $A\subseteq V$ and $B\subseteq V$, which are disjoint and are not dominating sets of $G$, but $A\cup B$ is a dominating set of $G$. A coalition partition of $G$ is a partition $\mathcal{P}=\{S_1,\ldots,S_k\}$ of its vertex set $V$, where each set $S_i\in \mathcal{P}$ is either a dominating set of $G$ with only one vertex, or it is not a dominating set but forms a coalition with some other set $S_j \in \mathcal{P}$. The coalition number $C(G)$ is the maximum cardinality of a coalition partition of $G$. To represent a coalition partition $\mathcal{P}$ of $G$, a coalition graph $\CG(G, \mathcal{P})$ is created, where each vertex of the graph corresponds to a member of $\mathcal{P}$ and two vertices are adjacent if and only if their corresponding sets form a coalition in $G$. A coalition partition $\mathcal{P}$ of $G$ is a singleton coalition partition if every set in $\mathcal{P}$ consists of a single vertex. If a graph $G$ has a singleton coalition partition, then $G$ is referred to as a singleton-partition graph. A graph $H$ is called a singleton coalition graph of a graph $G$ if there exists a singleton coalition partition $\mathcal{P}$ of $G$ such that the coalition graph $\CG(G,\mathcal{P})$ is isomorphic to $H$. A singleton coalition graph chain with an initial graph $G_1$ is defined as the sequence $G_1\rightarrow G_2\rightarrow G_3\rightarrow\cdots$ where all graphs $G_i$ are singleton-partition graphs, and $\CG(G_i,Γ_1)=G_{i+1}$, where $Γ_1$ represents a singleton coalition partition of $G_i$. In this paper, we address two open problems posed by Haynes et al. We characterize all graphs $G$ of order $n$ and minimum degree $δ(G)=2$ such that $C(G)=n$ and investigate the singleton coalition graph chain starting with graphs $G$ where $δ(G)\le 2$.
△ Less
Submitted 15 April, 2023;
originally announced April 2023.
-
List recoloring of planar graphs
Authors:
L. Sunil Chandran,
Uttam K. Gupta,
Dinabandhu Pradhan
Abstract:
A list assignment $L$ of a graph $G$ is a function that assigns to every vertex $v$ of $G$ a set $L(v)$ of colors. A proper coloring $α$ of $G$ is called an $L$-coloring of $G$ if $α(v)\in L(v)$ for every $v\in V(G)$. For a list assignment $L$ of $G$, the $L$-recoloring graph $\mathcal{G}(G,L)$ of $G$ is a graph whose vertices correspond to the $L$-colorings of $G$ and two vertices of…
▽ More
A list assignment $L$ of a graph $G$ is a function that assigns to every vertex $v$ of $G$ a set $L(v)$ of colors. A proper coloring $α$ of $G$ is called an $L$-coloring of $G$ if $α(v)\in L(v)$ for every $v\in V(G)$. For a list assignment $L$ of $G$, the $L$-recoloring graph $\mathcal{G}(G,L)$ of $G$ is a graph whose vertices correspond to the $L$-colorings of $G$ and two vertices of $\mathcal{G}(G,L)$ are adjacent if their corresponding $L$-colorings differ at exactly one vertex of $G$. A $d$-face in a plane graph is a face of length $d$. Dvořák and Feghali conjectured for a planar graph $G$ and a list assignment $L$ of $G$, that: (i) If $|L(v)|\geq 10$ for every $v\in V(G)$, then the diameter of $\mathcal{G}(G,L)$ is $O(|V(G)|)$. (ii) If $G$ is triangle-free and $|L(v)|\geq 7$ for every $v\in V(G)$, then the diameter of $\mathcal{G}(G,L)$ is $O(|V(G)|)$. In a recent paper, Cranston (European J. Combin. (2022)) has proved (ii). In this paper, we prove the following results. Let $G$ be a plane graph and $L$ be a list assignment of $G$.
$\bullet$ If for every $3$-face of $G$, there are at most two $3$-faces adjacent to it and $|L(v)|\geq 10$ for every $v\in V(G)$, then the diameter of $\mathcal{G}(G,L)$ is at most $190|V(G)|$.
$\bullet$ If for every $3$-face of $G$, there is at most one $3$-face adjacent to it and $|L(v)|\geq 9$ for every $v\in V(G)$, then the diameter of $\mathcal{G}(G,L)$ is at most $13|V(G)|$.
$\bullet$ If the faces adjacent to any $3$-face have length at least $6$ and $|L(v)|\geq 7$ for every $v\in V(G)$, then the diameter of $\mathcal{G}(G,L)$ is at most $242|V(G)|$. This result strengthens the Cranston's result on (ii).
△ Less
Submitted 29 November, 2022; v1 submitted 13 September, 2022;
originally announced September 2022.
-
On the coalition number of trees
Authors:
Davood Bakhshesh,
Michael A. Henning,
Dinabandhu Pradhan
Abstract:
Let $G$ be a graph with vertex set $V$ and of order $n = |V|$, and let $δ(G)$ and $Δ(G)$ be the minimum and maximum degree of $G$, respectively. Two disjoint sets $V_1, V_2 \subseteq V$ form a coalition in $G$ if none of them is a dominating set of $G$ but their union $V_1\cup V_2$ is. A vertex partition $Ψ=\{V_1,\ldots, V_k\}$ of $V$ is a coalition partition of $G$ if every set $V_i\in Ψ$ is eith…
▽ More
Let $G$ be a graph with vertex set $V$ and of order $n = |V|$, and let $δ(G)$ and $Δ(G)$ be the minimum and maximum degree of $G$, respectively. Two disjoint sets $V_1, V_2 \subseteq V$ form a coalition in $G$ if none of them is a dominating set of $G$ but their union $V_1\cup V_2$ is. A vertex partition $Ψ=\{V_1,\ldots, V_k\}$ of $V$ is a coalition partition of $G$ if every set $V_i\in Ψ$ is either a dominating set of $G$ with the cardinality $|V_i|=1$, or is not a dominating set but for some $V_j\in Ψ$, $V_i$ and $V_j$ form a coalition. The maximum cardinality of a coalition partition of $G$ is the coalition number $\mathcal{C}(G)$ of $G$. Given a coalition partition $Ψ= \{V_1, \ldots, V_k\}$ of $G$, a coalition graph $\CG(G, Ψ)$ is associated on $Ψ$ such that there is a one-to-one correspondence between its vertices and the members of $Ψ$, where two vertices of $\CG(G, Ψ)$ are adjacent if and only if the corresponding sets form a coalition in $G$. In this paper, we partially solve one of the open problems posed in Haynes et al. \cite{coal0} and we solve two open problems posed by Haynes et al. \cite{coal1}. We characterize all graphs $G$ with $δ(G) \le 1$ and $\mathcal{C}(G)=n$, and we characterize all trees $T$ with $\mathcal{C}(T)=n-1$. We determine the number of coalition graphs that can be defined by all coalition partitions of a given path. Furthermore, we show that there is no universal coalition path, a path whose coalition partitions defines all possible coalition graphs.
△ Less
Submitted 1 November, 2022; v1 submitted 17 November, 2021;
originally announced November 2021.
-
Cops and robber on subclasses of $P_5$-free graphs
Authors:
Uttam K. Gupta,
Suchismita Mishra,
Dinabandhu Pradhan
Abstract:
The game of cops and robber is a turn based vertex pursuit game played on a connected graph between a team of cops and a single robber. The cops and the robber move alternately along the edges of the graph. We say the team of cops win the game if a cop and the robber are at the same vertex of the graph. The minimum number of cops required to win in each component of a graph is called the cop numbe…
▽ More
The game of cops and robber is a turn based vertex pursuit game played on a connected graph between a team of cops and a single robber. The cops and the robber move alternately along the edges of the graph. We say the team of cops win the game if a cop and the robber are at the same vertex of the graph. The minimum number of cops required to win in each component of a graph is called the cop number of the graph. Sivaraman [Discrete Math. 342(2019), pp. 2306-2307] conjectured that for every $t\geq 5$, the cop number of a connected $P_t$-free graph is at most $t-3$, where $P_t$ denotes a path on $t$~vertices. Turcotte [Discrete Math. 345 (2022), pp. 112660] showed that the cop number of any $2K_2$-free graph is at most $2$, which was earlier conjectured by Sivaraman and Testa. Note that if a connected graph is $2K_2$-free, then it is also $P_5$-free. Liu showed that the cop number of a connected ($P_t$, $H$)-free graph is at most $t-3$, where $H$ is a cycle of length at most $t$ or a claw. So the conjecture of Sivaraman is true for ($P_5$, $H$)-free graphs, where $H$ is a cycle of length at most $5$ or a claw. In this paper, we show that the cop number of a connected ($P_5,H$)-free graph is at most $2$, where $H\in \{C_4$, $C_5$, diamond, paw, $K_4$, $2K_1\cup K_2$, $K_3\cup K_1$, $P_3\cup P_1\}$.
△ Less
Submitted 29 November, 2022; v1 submitted 11 November, 2021;
originally announced November 2021.
-
Algorithm and hardness results on neighborhood total domination in graphs
Authors:
Anupriya Jha,
D. Pradhan,
S. Banerjee
Abstract:
A set $D\subseteq V$ of a graph $G=(V,E)$ is called a neighborhood total dominating set of $G$ if $D$ is a dominating set and the subgraph of $G$ induced by the open neighborhood of $D$ has no isolated vertex. Given a graph $G$, \textsc{Min-NTDS} is the problem of finding a neighborhood total dominating set of $G$ of minimum cardinality. The decision version of \textsc{Min-NTDS} is known to be \te…
▽ More
A set $D\subseteq V$ of a graph $G=(V,E)$ is called a neighborhood total dominating set of $G$ if $D$ is a dominating set and the subgraph of $G$ induced by the open neighborhood of $D$ has no isolated vertex. Given a graph $G$, \textsc{Min-NTDS} is the problem of finding a neighborhood total dominating set of $G$ of minimum cardinality. The decision version of \textsc{Min-NTDS} is known to be \textsf{NP}-complete for bipartite graphs and chordal graphs. In this paper, we extend this \textsf{NP}-completeness result to undirected path graphs, chordal bipartite graphs, and planar graphs. We also present a linear time algorithm for computing a minimum neighborhood total dominating set in proper interval graphs. We show that for a given graph $G=(V,E)$, \textsc{Min-NTDS} cannot be approximated within a factor of $(1-\varepsilon)\log |V|$, unless \textsf{NP$\subseteq$DTIME($|V|^{O(\log \log |V|)}$)} and can be approximated within a factor of $O(\log Δ)$, where $Δ$ is the maximum degree of the graph $G$. Finally, we show that \textsc{Min-NTDS} is \textsf{APX}-complete for graphs of degree at most $3$.
△ Less
Submitted 14 October, 2019;
originally announced October 2019.
-
On Good and Bad Intentions behind Anomalous Citation Patterns among Journals in Computer Sciences
Authors:
Joyita Chakraborty,
Dinesh Pradhan,
Hridoy Sankar Dutta,
Subrata Nandi,
Tanmoy Chakraborty
Abstract:
Scientific journals are an important choice of publication venue for most authors. Publishing in prestigious journal plays a decisive role for authors in hiring and promotions. In last decade, citation pressure has become intact for all scientific entities more than ever before. Unethical publication practices has started to manipulate widely used performance metric such as "impact factor" for jou…
▽ More
Scientific journals are an important choice of publication venue for most authors. Publishing in prestigious journal plays a decisive role for authors in hiring and promotions. In last decade, citation pressure has become intact for all scientific entities more than ever before. Unethical publication practices has started to manipulate widely used performance metric such as "impact factor" for journals and citation based indices for authors. This threatens the integrity of scientific quality and takes away deserved credit of legitimate authors and their authentic publications.
In this paper we extract all possible anomalous citation patterns between journals from a Computer Science bibliographic dataset which contains more than 2,500 journals. Apart from excessive self-citations, we mostly focus on finding several patterns between two or more journals such as bi-directional mutual citations, chains, triangles, mesh, cartel relationships. On a macroscopic scale, the motivation is to understand the nature of these patterns by modeling how journals mutually interact through citations. On microscopic level, we differentiate between possible intentions (good or bad) behind such patterns. We see whether such patterns prevail for long period or during any specific time duration. For abnormal citation behavior, we study the nature of sudden inflation in impact factor of journals on a time basis which may occur due to addition of irrelevant and superfluous citations in such closed pattern interaction. We also study possible influences such as abrupt increase in paper count due to the presence of self-referential papers or duplicate manuscripts, author self-citation, author co-authorship network, author-editor network, publication houses etc. The entire study is done to question the reliability of existing bibliometrics, and hence, it is an urgent need to curtail their usage or redefine them.
△ Less
Submitted 27 July, 2018;
originally announced July 2018.
-
$C^3$-index: A PageRank based multi-faceted metric for authors' performance measurement
Authors:
Dinesh Pradhan,
Partha Sarathi Paul,
Umesh Maheswari,
Subrata Nandi,
Tanmoy Chakraborty
Abstract:
Ranking scientific authors is an important but challenging task, mostly due to the dynamic nature of the evolving scientific publications. The basic indicators of an author's productivity and impact are still the number of publications and the citation count (leading to the popular metrics such as h-index, g-index etc.). H-index and its popular variants are mostly effective in ranking highly-cited…
▽ More
Ranking scientific authors is an important but challenging task, mostly due to the dynamic nature of the evolving scientific publications. The basic indicators of an author's productivity and impact are still the number of publications and the citation count (leading to the popular metrics such as h-index, g-index etc.). H-index and its popular variants are mostly effective in ranking highly-cited authors, thus fail to resolve ties while ranking medium-cited and low-cited authors who are majority in number. Therefore, these metrics are inefficient to predict the ability of promising young researchers at the beginning of their career. In this paper, we propose $C^3$-index that combines the effect of citations and collaborations of an author in a systematic way using a weighted multi-layered network to rank authors. We conduct our experiments on a massive publication dataset of Computer Science and show that - (i) $C^3$-index is consistent over time, which is one of the fundamental characteristics of a ranking metric, (ii) $C^3$-index is as efficient as h-index and its variants to rank highly-cited authors, (iii) $C^3$-index can act as a conflict resolution metric to break ties in the ranking of medium-cited and low-cited authors, (iv) $C^3$-index can also be used to predict future achievers at the early stage of their career.
△ Less
Submitted 22 October, 2016;
originally announced October 2016.
-
$C^3$-index: Revisiting Authors' Performance Measure
Authors:
Dinesh Pradhan,
Partha Sarathi Paul,
Umesh Maheswari,
Subrata Nandi,
Tanmoy Chakraborty
Abstract:
Author performance indices (such as h-index and its variants) fail to resolve ties while ranking authors with low index values (majority in number) which includes the young researchers. In this work we leverage the citations as well as collaboration profile of an author in a novel way using a weighted multi-layered network and propose a variant of page-rank algorithm to obtain a new author perform…
▽ More
Author performance indices (such as h-index and its variants) fail to resolve ties while ranking authors with low index values (majority in number) which includes the young researchers. In this work we leverage the citations as well as collaboration profile of an author in a novel way using a weighted multi-layered network and propose a variant of page-rank algorithm to obtain a new author performance measure, $C^3$-index. Experiments on a massive publication dataset reveal several interesting characteristics of our metric: (i) we observe that $C^3$-index is consistent over time, (ii) $C^3$-index has high potential to break ties among low rank authors, (iii) $C^3$-index can effectively be used to predict future achievers at the early stage of their career.
△ Less
Submitted 8 April, 2016;
originally announced April 2016.
-
On the Discovery of Success Trajectories of Authors
Authors:
Dinesh Pradhan,
Tanmoy Chakraborty,
Saswata Pandit,
Subrata Nandi
Abstract:
Understanding the qualitative patterns of research endeavor of scientific authors in terms of publication count and their impact (citation) is important in order to quantify success trajectories. Here, we examine the career profile of authors in computer science and physics domains and discover at least six different success trajectories in terms of normalized citation count in longitudinal scale.…
▽ More
Understanding the qualitative patterns of research endeavor of scientific authors in terms of publication count and their impact (citation) is important in order to quantify success trajectories. Here, we examine the career profile of authors in computer science and physics domains and discover at least six different success trajectories in terms of normalized citation count in longitudinal scale. Initial observations of individual trajectories lead us to characterize the authors in each category. We further leverage this trajectory information to build a two-stage stratification model to predict future success of an author at the early stage of her career. Our model outperforms the baseline with an average improvement of 15.68% for both the datasets.
△ Less
Submitted 4 February, 2016;
originally announced February 2016.
-
Simulation Based: Study and Analysis of Routing Protocol in Vehicular Ad-hoc Network Environment
Authors:
Vaishali D. Khairnar,
Dr. S. N. Pradhan
Abstract:
A Vehicular Ad hoc Network consists of vehicles which communicate with each other and exchange data via wireless communication links available between the vehicles which are in communication ranges of vehicles to improve the road safety in city.The communication between vehicles is used to provide road safety, comfort and entertainment.The performance of communication depends on how better routing…
▽ More
A Vehicular Ad hoc Network consists of vehicles which communicate with each other and exchange data via wireless communication links available between the vehicles which are in communication ranges of vehicles to improve the road safety in city.The communication between vehicles is used to provide road safety, comfort and entertainment.The performance of communication depends on how better routing takes place in the network.Routing data between the source and destination vehicle depends on the routing protocols being used in vehicular adhoc network.In this simulation based study we investigated about different ad hoc routing protocols for vehicular adhoc network.The main goal of our study was to identify which ad hoc routing protocol has better performance in highly mobile environment of vehicular adhoc network.We have measured the performance of routing protocols using 802.11p in vehicular adhoc network in which we considered the scenario of city i.e. Route between Nerul and Vashi where we have taken 1200 different types of vehicles and checked their performance.Routing protocols are selected after the literature review.The selected protocols are then evaluated through simulation under 802.11p in terms of performance metrics i.e PDR & E2E delay.
△ Less
Submitted 24 March, 2014;
originally announced March 2014.
-
V2V communication survey wireless technology
Authors:
Mrs. Vaishali D. Khairnar,
Dr. S. N. Pradhan
Abstract:
This paper presents the specific application of wireless communication,automotive Wireless Communication also called as Vehicle to Vehicle Communication.It explains the technology used for automotive Wireless Communication along with the various automotive applications relying on wireless communication. Automotive Wireless Communication gives drivers a sixth sense to know whats going on around the…
▽ More
This paper presents the specific application of wireless communication,automotive Wireless Communication also called as Vehicle to Vehicle Communication.It explains the technology used for automotive Wireless Communication along with the various automotive applications relying on wireless communication. Automotive Wireless Communication gives drivers a sixth sense to know whats going on around them to help avoid accidents and improve traffic flow.The paper also describes VANETS (vehicular adhoc networks) and real world test network implementation.Finally,the paper is summarized.
△ Less
Submitted 17 March, 2014;
originally announced March 2014.
-
Building Internal Cloud at NIC : A Preview
Authors:
S. M. M. M Kalyan kumar,
Dr S C Pradhan
Abstract:
The most of computing environments in the IT support organization like NIC are designed to run in centralized datacentre. The centralized infrastructure of various development projects are used to deploy their services on it and connecting remotely to that datacentre from all the stations of organization. Currently these servers are mostly underutilized due to the static and conventional approache…
▽ More
The most of computing environments in the IT support organization like NIC are designed to run in centralized datacentre. The centralized infrastructure of various development projects are used to deploy their services on it and connecting remotely to that datacentre from all the stations of organization. Currently these servers are mostly underutilized due to the static and conventional approaches used for accessing and utilizing of these resources. The cloud patterns is much needful for optimizing resource utilization and reducing the investments on unnecessary costs. So, we build up and prototyped a private cloud system called nIC(NIC Internal Cloud) to leverage the benefits of cloud environment. For this system we adopted the combination of various techniques from open source software community. The user-base of nIC consists developers, web and database admins, service providers and desktop users from various projects in NIC. We can optimize the resource usage by customizing the user based template services on these virtualized infrastructure. It will also increases the flexibility of the managing and maintenance of the operations like archiving, disaster recovery and scaling of resources. The open-source approach is further decreases the enterprise costs. In this paper, we describe the design and analysis of implementing issues on internal cloud environments in NIC and similar organizations.
△ Less
Submitted 27 May, 2013;
originally announced May 2013.
-
NP-Completeness of Hamiltonian Cycle Problem on Rooted Directed Path Graphs
Authors:
B. S. Panda,
D. Pradhan
Abstract:
The Hamiltonian cycle problem is to decide whether a given graph has a Hamiltonian cycle. Bertossi and Bonuccelli (1986, Information Processing Letters, 23, 195-200) proved that the Hamiltonian Cycle Problem is NP-Complete even for undirected path graphs and left the Hamiltonian cycle problem open for directed path graphs. Narasimhan (1989, Information Processing Letters, 32, 167-170) proved tha…
▽ More
The Hamiltonian cycle problem is to decide whether a given graph has a Hamiltonian cycle. Bertossi and Bonuccelli (1986, Information Processing Letters, 23, 195-200) proved that the Hamiltonian Cycle Problem is NP-Complete even for undirected path graphs and left the Hamiltonian cycle problem open for directed path graphs. Narasimhan (1989, Information Processing Letters, 32, 167-170) proved that the Hamiltonian Cycle Problem is NP-Complete even for directed path graphs and left the Hamiltonian cycle problem open for rooted directed path graphs. In this paper we resolve this open problem by proving that the Hamiltonian Cycle Problem is also NP-Complete for rooted directed path graphs.
△ Less
Submitted 15 September, 2008;
originally announced September 2008.