• Sonuç bulunamadı

Vulnerability: integrity of a middle graph

N/A
N/A
Protected

Academic year: 2021

Share "Vulnerability: integrity of a middle graph"

Copied!
12
0
0

Yükleniyor.... (view fulltext now)

Tam metin

(1)

Selçuk J. Appl. Math. Selçuk Journal of Vol. 9. No.1. pp. 49-60 , 2008 Applied Mathematics

Vulnerability: Integrity of A Middle Graph Aysun Ataç1and ¸Sebnem Çelik2

1Department of Mathematics, Faculty of Science, Ege University, Bornova-˙Izmir, 35100,

Turkey;

e-mail: aysun.aytac@ ege.edu.tr

2Private Avni Akyol High School, Guzelbahce-˙Izmir,Turkey;

e-mail: scizm ir@ yahoo.com

Received : January 16, 2008

Summary. A communication network can be considered to be highly vulner-able to disruption if the destruction of a few elements can result in no member’s being able to communicate with very many others. This idea suggests the con-cept of the integrity of a graph. The vertex-integrity of a graph , denoted (), is defined by () = min

⊂ (){|| + ( − )} where ( − ) denotes

the maximum order of a component of  − . In this paper we consider the in-tegrity of middle graphs of specific families of graphs and combinations of these graphs.

Key words: Vulnerability, Graph Theory, Connectivity, Stability, Integrity, and Middle graph of a graph.

2000 AMS Classification: 05C99 Graph Theory, 05C40 Connectivity, 68R10 Graph Theory, 90C27 Combinatorial Optimization, 90C35 Programming in-volving graphs or networks, 90B12 Communication Networks.

1. Introduction

The stability of a communication network composed of processing nodes and communication links is of prime importance to network designers. As the net-work begins losing links or nodes, eventually there is a loss in its effectiveness. Thus, communication networks must be constructed to be as stable as possi-ble, not only with respect to the initial disruption, but also with respect to the possible reconstruction of the network. The communication network can be represented as an undirected graph. Tree, mesh, hypercube and star graph are popular communication networks. If we think of the graph as modeling a net-work, there are many graph theoretical parameters used in the past to describe

(2)

the stability of communication networks. Most notably, the vertex-connectivity and edge-connectivity have been frequently used. The best known measure of reliability of a graph is its vertex-connectivity () defined to be the minimum number of vertices whose deletion results in a disconnected or trivial graph. The difficulty with these parameters is that they do not take into account what remains after the graph is disconnected. Consequently, a number of other pa-rameters have recently been introduced in order to attempt to cope with this difficulty.

The concept of integrity was introduced as a measure of graph vulnerability in this sense. Formally, the vertex-integrity (frequently called just the integrity) is

() = min

⊂ (){|| + ( − )}

where () denotes the order of a largest component of H. This concept was introduced by Barefoot, Entringer and Swart, who discovered many of the early results on the subject [3-6, 8-10].

A few further comments on notation are appropriate here. The order of a graph , that is the number of vertices, will generally be denoted by n. As usual  () and () will denote respectively the sets of vertices and edges of , and  will denote a proper subset of  . As noted earlier, () equals the largest order among the components of .

Definition 1.1: [7, 13] An independent set of vertices of a graph  is a set of vertices of  whose elements are pair wise nonadjacent. The independence number () of G is the maximum cardinality among all independent sets of vertices of .

Definition 1.2: [7, 13]  vertex is said to cover each other in a graph  if it is incident in .  cover in  is a set of vertices that covers all edges of . The minimum cardinality of a cover in a graph  is called the covering number of  and denoted by ().

Theorem 1.1: [7, 13] For any graph  of order , () + () = 

The next section contains results on the integrity of specific families of graphs, on bounds for the integrity, on relationships between integrity and other para-meters. In Section 3 we formulize integrity values of middle graph of some basic graphs. Finally, we find integrity of middle graph of graphs that are obtained from cartesian product of some graphs.

In this work, the first integer larger than x is denoted by de, the first integer small than  is denoted by bc, and the absolute value of x is denoted by ||.

(3)

2. Basic Results

In this section we will review some of the known results about integrity: Theorem 2.1: [4] The integrity of

(a) complete graph  is () = ,

(b)the null graph is () = 1,

(c) the star is (1) = 2,

(d)the path is () =

§

2√ + 1¨− 2, (e) the cycle is () = d2√e − 1,

(f)the complete bipartite graph is () = 1 + min { }.

Theorem 2.2: [4] If, in graph , v is a vertex for which deg  ≥ ( − ), then () = 1 + ( − ).

Theorem 2.3: [4] For any graph , (a) () ≤ () + 1,

(b) () ≤ () + 1, where () denotes the minimum vertex degree, (c) () ≥ ( − ())() + ().

Theorem 2.4: [2] For  ≥ 3, let  =¥√ + 1¦and  =§2√ + 1¨. Then (2× ) =

½

2() − 1   + 1 ≤ ( −  −12)

2() 

Theorem 2.5: [2] For  ≥ 3, let  = bc and  = d2e. Then (2× ) = ½ 2() − 1   + 1 ≤ ( −  −12) 2()  Theorem 2.6: [8] If  ≤ , then (1× 1) = ½ 2 − 1   =  2  Theorem 2.7: [8] For 2 ≤  ≤ ,  (× ) =  − max 1≤≤ ¹  ( − )  º 

3. Integrity of Middle Graphs of Basic Graphs

In this section, firstly we define middle graph of a graph. Then we obtain the integrity of middle graph of basic graphs. Finally, we calculate the integrity

(4)

of middle graph of graphs that are obtained from cartesian product of some graphs.

Definition 3.1: [1, 11, 12] The middle graph  () of a graph is the graph obtained from  by inserting a new vertex into every edge of  and by joining edges those pairs of these new vertices which lie on adjacent edges of  (see Fig 3.1).

Figure 3.1

Theorem 3.1: Let  () be the middle graph of graph  of order  vertices.

Then

( ()) =

l

2√2m− 2 for every  ≥ 3.

Proof: Let  be a subset of  ( ()). For a graph  (), the number of

remaining components after removing || =  vertices is given in Table 3. 1.

Table 3.1

The number of the vertices of  () is 2 − 1. If r vertices is removed from

graph  (), then one of the remaining connected components has at least 2−1−

+1 vertices. So the number of vertices of largest remaining component is

( () − ) ≥ 2+1−1−. So ( ()) ≥ min  ½ +2 − 1 −   + 1 ¾ .

(5)

The function +2+1−1− takes its minimum value at  = −1 +√2. If we substitute the minimum value in the function, then we have

( ()) = 2

2 − 2 for every  ≥ 3.

Since the integrity is integer valued, we round this up to get a lower bound. So the integrity of  () is,

( ()) =

l

2√2m− 2 for every  ≥ 3. The proof is completed.

Theorem 3.2: Let  () be the middle graph of of order n vertices. Then

( ()) =

l

2√2m− 1 for every  ≥ 3.

Proof: Let S be a subset of  ( ()). For a graph  (), the number of

remaining components after removing || =  vertices is given in Table 3.2.

Table 3.2

Since the number of the vertices of  () is 2 and ( () − ) ≥ 2−,

we have ( ()) ≥ min{ +2−}. After making required elementary

arith-metical operations, we get

( ()) =

l

2√2m− 1. The proof is completed.

Now we consider the graph  (). Before we obtain the value ( ()),

we calculate the value ( (4)). This gives us the idea to obtain the value

( ()).

Example 3.1:  (4) be the middle graph of complete graph 4 . Then

( (4)) = 7.

Let  be a subset of  ( (4)). There are three cases to choose the set .

(6)

Figure 3.2

Case 1. In Figure 3.2 (a), if we choose the set  = {1 2 3 4}, then we have

( (4)) = 6. So ( (4)) = 4 + 6 = 10.

Case 2. In Figure 3.2 (b), if we choose the set  = {1 2 3 4 5}, then we

have ( (4) − ) = 3. So ((4)) = 5 + 3 = 8.

Case 3. In Figure 3.2 (c), if we choose the set  = {1 2}, then we have only

one component. This component is  (4). By ( (4)) = 5 from Theorem

3.2, we have ( (4)) = 7.

Theorem 3.3: Let  () be the middle graph of of order n vertices. Then

( ()) = ( − 3)

2 +

l

2√2m− 1

Proof: Since a complete graph with  vertices has (2−1) edges, the number of the vertices of  () is  + (2−1). The graph  () contain a subgraph

(7)

. If the proof is done for  vertices according to the above example, then we

choose all new vertices except for the new vertices adding to the edge of  as

the set  . In this case, if we remove the (2−1)−  vertices from (), then

we have only one component. This component is  (). So

( ()) = µ  ( − 1) 2 −  ¶ + ( ())

and from Theorem 3. 2, we have

( ()) = ( − 3)

2 +

l

2√2m− 1 The proof is completed.

Theorem 3.4: Let  (1) be the middle graph of 1 of order n vertices.

Then

( (1)) =  + 1

Proof: The number of the vertices of  (1) is 2 + 1. Any graph  (1)

contains a complete graph . If the vertices of  is removed from graph

 (1), then all  + 1 remaining components have one vertex. So

( (1)) =  + 1

( (1)) = 1 + () 

The proof is completed.

Now we consider the graph  (1). Before we obtain the value ( (1)),

we calculate the value ( (15)). This gives us the idea to obtain the value

( (1)).

Example 3.2: Let  (15) be the middle graph of wheel graph 15. Then

( (15)) = 10.

Let  be a subset of  ( (1)). There are three cases to choose the set .

(8)

Figure 3.4

If we choose the set  like in Figure 3.4, then we obtain ( (15)) = 5 +

 (5) = 11,( (15)) = 7 + 3 = 10 and ( (15)) = 10 + 2 = 12,

respec-tively.

Since the value obtained from Case 1 is always upper bound for ( (15)),

we say ( (15)) ≤ 5 + (()).

Theorem 3.5: Let  (1) be the middle graph of 1of order +1 vertices.

Then

( (1)) ≤  +

l

2√2m− 1

Proof: If the proof is done for  + 1 vertices according to the above example, then we choose the vertices which are put into edges of the maximum ordered vertices in graph 1. The number of these vertices is . If we remove 

vertices from  (1), then remaining component is only one. This component

is  (). So the integrity of  (1) is

( (1)) ≤  + (())

(9)

( (1)) ≤  +

l

2√2m− 1 The proof is completed.

Theorem 3.6: Let  (2) be the middle graph of 2×  of order 2

vertices. Then ( (2)) ≥ ¹ 30 − 3 −3 2 º for every   4

Proof: Let  be a subset of  ( (2)). For a graph  (2), number

of remaining components after removing vertices are given in Table 3.3.

Table 3.3

Since the number of the vertices of  (2) is 5−2 and ((2)−) ≥ 5−2− 2 3+1 , we have ( (2)) ≥ min n  +5−2− 2 3+1 o

. After making required elementary arithmetical operations, then we get

( (2)) ≥

¹

30 −32 º

for every   4 The proof is completed.

Remark 3.1: For every   4, integrity values are given in Table 3.4

Table 3.4

Theorem 3.7: Let  (2) be the middle graph of 2×  of order 2

vertices. Then

( (2)) 

§

(10)

Proof: Let  be a subset of  ( (2)). For a graph  (2), number

of remaining components after removing vertices are given in Table 3.5.

Table 3.5

If we remove  vertices from graph  (2), then the number of

remain-ing components is§23−1¨ for  ≤ 3 and, ¥23−1¦ for every   3. Since the number of the vertices of  (2) is 5 and ( (2) − ) ≥ 52−1−

3 , we have ( (2)) ≥ min n  + 52−1− 3 o

. After making required elementary arithmetical operations, we get

( (2)) 

§

−1 +√30 − 3¨ for every   3 The proof is completed.

Remark 3.2: For every  ≤ 3, the integrity values are given in Table 3.6.

Table 3.6

Theorem 3.8: Let  (2× 1) be the middle graph of 2× 1 of order

2( + 1) vertices. Then

( (2× 1)) = 2 + 3

Proof:The number of the vertices of  (2× 1) is 5 + 3. If we remove the

2 vertices which are on edges between ,  and other vertices from  (2×

1), then all remaining components have three vertices. If we choose the set

 like this, then the integrity of  (2× 1) is minimum. So the integrity of

 (21) is

( (2× 1)) = 2 + 3

The proof is completed.

By using integrity values in Theorem 3.6 and Theorem 3.7, the following results can be seen easily.

(11)

( (2× ) ≥ 2(()) + 1

Corollary 3.2: For every  ≥ 3, we have

( (2× ) ≥ 2(()) + 1

4. Conclusion

In this article the concept of integrity was studied as a one of measure of graph vulnerability. Vulnerability value helps people who are studying on networks about how the communication network can be constructed if any of lines or centers of network are damaged.

In this article graphs are taken as a model of network and it is thought that how it would become more stable and strong. For this purpose new vertices were inserted to graph. This operation was done by using definition of middle graph of a graph. New integrity values were calculated after removing vertices from this new graph.

The following table shows integrity values of any graphs and middle graphs of same kind of graphs. But we noticed to choose graphs such that both of them have same number of vertices.

Table 3.7

As it is seen in table, integrity of middle graphs are equal to or bigger than integrity values of graphs that have same structure. These results may help people who work on networks to choose suitable topology. It is obvious that middle graphs are more stable structures. Next search may be done by removing edges instead of vertices.

(12)

1. Akiyama, J., Hamada, T., Yoshimura, I. : On Characterization of the Middle Graphs, TRU Mathematics 11, 35-39p, 1975.

2. Atıcı, M., Kırlangıç, A. : Counterexamples to the Theorems of Integrity of Prism and Ladders, J. Combin. Math. Combin. Comp. 34, 119-127p, 2000.

3. Barefoot, C.A., Entringer, R., Swart, H.C. : Vulnerability in Graphs — A Compar-ative Survey, J. Combin. Math. Combin. Comp.1, 13-22p, 1987.

4. Bagga, K.S., Beineke, L.W., Goddard, W.D., Lipman, M.J., Pippert, R.E. : A survey of Integrity, Discreate Applied Mathematics 37/38 , 13-28p, 1992.

5. Bagga, K.S., Beineke, L.W., Lipman, M.J., Pippert, R.E. : The Integrity of the Prism (Preliminary Report), Abstracts Amer. Math. Soc. 10, 12p, 1989.

6. Barefoot, C.A., Entringer, R., Swart, H.C. : Integrity of Trees and Powers of Cycles, Congr. Numer. 58, 103-114p, 1987.

7. Chartrand, G., Lesniak, L. : Graphs and Digraphs, Second Edition, Wadsworth. Monterey, 1986.

8. Goddard, W.D., Swart, H.C. : On the Integrity of Combinations of Graphs, J. Commbin. Math. Combin. Comp. 4, 3-18p, 1988.

9. Goddard, W., Swart, H.C.: Integrity in Graphs, Bounds and Basics, J. Combin. Math. Combin. Comp. 7, 139-151p, 1990.

10. Goddard, W. : On the Vulnerability of Graphs, Ph.D. Thesis, University of Natal, Durban, S.A., 1989.

11. Nihei, M. : On the Cromatic Number of the Middle Graph of a Graph, Pi Mu Epsilon Jour. 10, 704-708p, 1998.

12. Nihei, M. : Algebric Connectivity of the Line Graph, the Middle Graph and Total Graph of a Regular Graph, Ars Combin. 69, 215-221p, 2003.

Referanslar

Benzer Belgeler

Tiirk N6ro~iriirji Dernegi olarak yaymlamakta oldugumuz "Tiirk N6ro~iriirji" ve Turkish Neurosurgery" dergileri elimizdeki sayllan ile birind cilderini

Şayet biz Türkiye’de sa­ nat kaygusuyla, sırf sanat endişesiyle çalışan bir he­ yet vücuda getirmek isti­ yorsak, şayet her medeni millet gibi biz de milli

men hâlâ harikalar

Şah İsmail tarafından Kızılbaş sufilere verilen itibar sayesinde bu inanç devlet ve toplumun her sahasında galip bir figür olarak ortaya çıkmış ise de artık Tahmasb

Uğurlu, ödülün kesintisiz olarak 17 yıldır ve­ rildiğini, bunda da Orhan Kemal ailesinin desteğinin ve seçici kurul üye­ lerinin özverisinin etkili olduğunu

Şair olarak, heccav olarak, öğretmen olarak, kültür sahibi bir insan olarak, müellif olarak onu ayrı ayrı aniatmaktansa, artist bir insan, daima dik­ katli,

Alevi ve Bektaşî edebiyatıyla ilgili antolojilerde, bu edebiyatın en büyük isimleri olan “yedi ulu”nun Viranî dışındaki altısında ve diğer Bektaşî şairlerde; kısaca

1304 de Ñafia nazırı Zihni paşa Üs­ küdar ve Kadıköy cihetinin suyunu temin maksadile bir su şirketi muka­ velesi hazırlamış ve Göksu vadisinde bendler tesis