Please use this identifier to cite or link to this item:
https://www.um.edu.mt/library/oar/handle/123456789/101364
Title: | Security in graphs |
Authors: | Fenech, Kyra (2022) |
Keywords: | Graph theory Linear programming Algorithms |
Issue Date: | 2022 |
Citation: | Fenech, K. (2022). Security in graphs (Bachelor’s dissertation). |
Abstract: | Alliances are associations which are created for the mutual benefit of the parties involved. These can take the form of formal agreements between nations to cooperate for some purpose, or, in general, collaboration contracts agreed between “communities” (of any type, such as people, businesses, computers, web-pages, molecules, species, etc.) operating in the same environment. Such alliances can be studied mathematically by reducing each alliance to a graph-theoretical problem, where objects are represented by vertices while edges represent the corresponding relationship between objects. The study of alliances in graphs was initiated by Kristiansen et al. (2004). One particular type of alliance is called a “defensive alliance”. For any subset S of vertices of a graph G, a defensive alliance is one whereby, for any x ∈ S, there are at least as many defenders (that is, vertices in the closed neighbourhood of x which are in S) as there are attackers (that is, vertices in the neighbourhood of x which are not in S). In such an instance, any attack on a single vertex in a defensive alliance can be thwarted. However, in more authentic settings, alliances are created so that an attack on any subset of the alliance can be defended, and not only an attack on a single member of the alliance. This generalisation of defensive alliances was introduced by Brigham et al. (2007) through the definition of the concept of “secure sets”. Loosely speaking, a set S of vertices of a graph G is secure if any subset X ⊆ S can be defended from an attack from outside S, under an appropriate definition of what such a defense implies. The security number s(G) of G is the size of a smallest secure set. In this project we find, collate, review and analyse the main results on secure sets dispersed in literature. |
Description: | B.Sc. (Hons)(Melit.) |
URI: | https://www.um.edu.mt/library/oar/handle/123456789/101364 |
Appears in Collections: | Dissertations - FacSci - 2022 Dissertations - FacSciMat - 2022 |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
22BSCMATH003.pdf Restricted Access | 1.49 MB | Adobe PDF | View/Open Request a copy |
Items in OAR@UM are protected by copyright, with all rights reserved, unless otherwise indicated.