SlideShare a Scribd company logo
1 of 8
Download to read offline
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.5, No.2, March 2015
DOI:10.5121/ijfcst.2015.5203 29
EDGE-TENACITY IN CYCLES AND COMPLETE
GRAPHS
Abolfazl Javan, Mina Akhavan, Ali Moeini and Dara Moazzami
Department of Algorithms and Computation, Faculty of Engineering Science, School of
Engineering, University of Tehran, Tehran, Iran
ABSTRACT
It is well known that the tenacity is a proper measure for studying vulnerability and reliability in graphs.
Here, a modified edge-tenacity of a graph is introduced based on the classical definition of tenacity.
Properties and bounds for this measure are introduced; meanwhile edge-tenacity is calculated for cycle
graphs and also for complete graphs.
KEYWORDS
Graph, Edge Tenacity
1. INTRODUCTION
Since that network components may be destroyed, it is necessary to study networks vulnerability.
So far various criteria have been presented to measure the vulnerability and reliability of
networks [9]. All measures have been based on that how the loss of part of the graph (vertices or
edges) will affect the graph structure in the worst case. For example, vertex-connectivity is the
minimum number of vertices whose removal disconnects the graph and edge-connectivity is the
smallest number of edges whose removal disconnects the graph. Integrity [7] and Toughness [8]
is two other measures for calculating network vulnerability.
For the first time graph tenacity is studied by Cozzens, Moazzami and Stueckle [2, 3]. Cozzens et
al. introduced two measures of network vulnerability. One of them is the tenacity (T(G)) that is
introduced for studying vertex vulnerability. The other is the measure that is called mix-tenacity
by Moazzami and has been used for studying edge vulnerability. In [4] Moazzami studied
integrity, connectivity, toughness and tenacity in some graphs. His results showed that tenacity is
a better measure for studying vulnerability and reliability in the most graphs.
The vertex tenacity of a graph called Tv(G) is defined as:
Vertex Tenacity: }
)
(
)
(
{
min
)
(
)
( A
G
A
G
A
G
T
G
V
A
v




 

(1)
where A is a subset V(G) the set of all vertices of the graph G, τ(G − A) is the number of vertices
in the largest component of (G − A) and ω(G − A) is the number of components of (G − A). Also
mix-tenacity is defined as:
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.5, No.2, March 2015
30
Mixed Tenacity: }
)
(
)
(
{
min
)
(
)
( A
G
A
G
A
G
T
G
E
A
m




 

(2)
where A is a subset of E(G), the set of all edges of the graph G, τ(G − A) is the number of
vertices in the largest component of G-A and ω(G − A) is the number of components of (G − A).
In [5, 6] Piazza et al. used (2) as edge-tenacity but this vulnerability measure is the combination
of edges subset ( )
(G
E
A  ) and the number of vertices in the largest component (τ (G − A)). It
is visible that in Tm (Mix-tenacity) the number of removed edges is added to the number of
vertices in a largest component of the remaining graph. In this definition both edges and vertices
are involved which is not rational. To eliminate this weakness, Moazzami and Salehian [1]
presented a new measure and named it edge-tenacity that in new one just edges are involved.
Edge-tenacity is defined as:
Edge Tenacity: }
)
(
)
(
{
min
)
(
)
( A
G
A
G
A
G
T
G
E
A
e




 

(3)
where A is a subset of E(G), the set of all edges of the graph G, τ(G − A) is the number of edges
in the largest component of (G − A) and ω(G − A) is the number of components of (G − A).
2. EDGE-TENACITY OF SOME SPECIAL GRAPHS
Here, we calculate precisely the edge-tenacity for complete graphs and cycle graphs based on (3).
Theorem 1: If Cn be the cycle graph with n vertices, then
.
Proof: Suppose that the number of edges and vertices in Cn are |E|=m and |V|=n respectively. We
know that the number of edges and vertices in Cn are equal (m=n). Also it can be easily
understood that with removing ω edges, (ω >0), ω components remain in the graph, where ω is a
constant. Based on (3) to determine the minimum value of Te, the numerator of the fraction ω +
τ(G − ω) must become minimum. Since τ(G − ω) is the number of edges in the largest component
then for getting the minimum value of Te, it is necessary to distribute |E| − ω edges between ω
components equally. Therefore Te is as:
}.
1
min
}
min
)
(
1
1



















 





















 





 








m
m
C
T
m
m
n
e (4)
Since |E|=m is constant, it needs that ω changes between 1 to m. Based on (4) one easily conclude
that in this range, the minimum value of Te will achieve when ω is maximum, namely n (m=n).
Therefore, Te is calculated as:
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.5, No.2, March 2015
31
1
1
1
)
( 





 







 


n
n
n
n
m
m
m
m
C
T n
e .
(5)
Theorem 2: If Kn is a complete graph with n vertices, then
.
2
1
)
(


n
K
T n
e (6)
For calculation of the edge-tenacity in a complete graph, we first prove some lemmas and then
edge-tenacity is calculated.
Lemma 1: The edge-tenacity for the complete graph Kn is calculated in the case that the
generated components after removing edges are all complete subgarphs.
Proof: The proof is based on contradiction. Suppose that the edge-tenacity for the complete graph
is calculated in the case that at least one of the generated components is not a complete subgraph.
Therefore, this component has at least one edge less than the complete graph. By adding this edge
to the component if the component is the largest component of the graph, the number of removed
edges will be one less and the number of edges of the largest component will be one more that
finally does not have any effect on obtaining the edge-tenacity. Also, by adding the removed edge
to the component if the component is not the largest one in the graph, the number of removed
edges is decreased by one. It means the new value of edge-tenacity is less than the assumed value
which contradicts with the assumption of the theorem. Therefore, we can conclude that in order to
calculate the edge-tenacity of a complete graph, all generated components of it, after removing
edges, can be considered complete.
Lemma 2: Assume that it is supposed to distribute n vertices between ω complete components.
The ith
component has ci vertices so that

 



 n
c
c
c ,
...
0 2
1 (7)
Where ci is the number of allocated vertices to ith
component that 1≤i≤ ω. The maximum value of
the total number of edges for all complete components which can be stated by the following
equation









1
2
i
i
c
, (8)
Occurs when the following conditions are satisfied:
1
,
1
1
,
1 





 
  n
c
i
ci (9)
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.5, No.2, March 2015
32
(Note that 





2
i
c
is the number of edges of ith
complete component and therefore (8) is the total
number of edges for all complete components)
Proof: The proof is based on contradiction. Suppose that there exists an integer called k which
makes the value in expression (8) maximum such that ck>1, k< ω.
It is known that
2
2
)
1
(
2
)
1
(
2
2
2
2




 c
c
c
c
c
c
c
c
c
c k
k
k
k
k





















, (10)
If ck>1 then due to (7) cω>1 and in consequence we have
0
)
1
)(
1
( 

 k
c
c (11)
By inserting the above in (10) we have
.
2
1
2
)
2
)(
1
(
2
2
2
2
2
)
1
)(
1
(
2
2
2
2
2
2
2
2
2
2





 







































k
k
k
k
k
k
k
k
k
k
k
k
k
c
c
c
c
c
c
c
c
c
c
c
c
c
c
c
c
c
c
c
c
c
c
c
c
c
c













(12)
Rearranging (8) using (12) yields
.
2
1
2
1
2
2
2
2
2
2
2
1
1
1
1
1
1
1
1
1












 




































































































c
c
c
c
c
c
c
c
c
k
j
j
k
i
i
k
j
j
k
k
i
i
i
i
(13)
The right side of (13) is the total number of edges for all complete components in the case that
pick (ck−1) vertices from kth
component and place them to ωth
component. Therefore, the number
of edges of kth
component will be 





2
1 and the number of edges of ωth
component will be





 

2
1

 c
c
. In other word, picking (ck−1) vertices from kth
component and placing them to ωth
component makes (8) greater. So (13) contradicts with the assumption that (8) reaches to its
maximum value with the above k. Finally, it can be concluded that the maximum value of (8)
occurs when the condition (9) is satisfied.
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.5, No.2, March 2015
33
Lemma 3: Assume that it is supposed to distribute n vertices between ω complete components.
The ith
component has ci vertices so that

 



 n
c
c
c ,
...
0 2
1 (14)
Where ci is the number of allocated vertices to ith
component that 1≤i≤ ω.
Therefore the minimum value of (15)




























2
2
2 1


c
c
n
i
i
(15)
Occurs when vertices are placed based on (16).































1
)
2
,
mod(
2
1
,
1
,
2
3
,
2
1
0
)
2
,
mod(
2
1
,
1
,
2
2
1
1











n
if
i
c
n
c
n
c
n
if
i
c
n
c
c
i
i
(16)
Proof: Rearranging (15) yields
,
2
2
2
2
2
1
1
1
















































i
i
i
i c
n
c
c
n
(17)
Where n is constant. To minimize (17), the value of 








1
1
2

i
i
c
should be maximum. According to
Lemma 3, this occurs when vertices are placed based on the following arrangement.
1
)
1
(
)
(
,
2
1
,
1 1 







  
 
 c
n
c
i
ci . (18)
To maximize the value of 








1
1
2

i
i
c
, cω-1 should be maximum. It is assumed that n and ω are
constants. So, cω, which must satisfy (14), should be minimal. Therefore, each of the ,
1

i
c
,
2
1 

 
i must take one vertex and the remaining vertices distribute almost equally between
cω-1 and cω. If n+ω is even, then the number of remaining vertices namely n−ω+2 is even too.
Because (n+ω) + (n−ω+2) = 2n+2 is even. In this case, cω-1 and cω should take the same value. If
n+ω is odd, then the value of cω should be one more than cω-1.
Now we return to the proof of Theorem 2.
Proof: First, it is assumed that ω be the number of generated components. To minimize the edge-
tenacity with respect to ω, it is enough to minimize the numerator of the fraction of (3).
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.5, No.2, March 2015
34
Based on Lemma 1, the numerator of (3) can be rearranged as follows:


























 

2
2
2
)
(
1



c
c
n
f
i
i
(19)
Based on lemma 3, we have ,
1

i
c 2
1 

 
i . Therefore, (19) can be written in a simpler
form as follows:













 
2
2
)
( 1


c
n
f . (20)
If n+ω is even, then based on (16) edge tenacity will be calculated as follows:
.
4
1
8
8
6
3
8
2
2
2
4
4
2
)
)(
2
(
4
1
)
1
(
2
2
2
2
)
,
(
2
2
2
2

























 









n
n
n
n
n
n
n
n
n
n
n
n
n
n
K
T n
e











 (21)
We are looking for the proper value of ω to minimize )
,
( 
n
e K
T . We note in (21) that the value
of n
n 6
3 2
 is positive for all value of n where n>1, so by increasing the value of ω, )
,
( 
n
e K
T
will decrease. Therefore, )
,
( 
n
e K
T will be minimal where ω achieves its maximum value. It
should be noted that the maximum value of ω is n. Therefore, the edge-tenacity is as follows:
  .
2
1
2
)
,
(
min
)
(










n
n
n
K
T
K
T n
e
n
e 

(22)
If n+ω is odd, based on (16) the edge-tenacity will be calculated as follows:
.
4
8
8
1
4
3
8
1
2
4
4
2
)
1
)(
1
(
4
1
)
1
(
2
2
1
2
)
,
(
2
2
2
2
n
n
n
n
n
n
n
n
n
n
n
n
n
K
T n
e

























 



















 (23)
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.5, No.2, March 2015
35
We are looking for the proper value of ω to minimize )
,
( 
n
e K
T . We note in (23) that the value
of 1
4
3 2

 n
n is positive for all value of n where n>1, so, by increasing the value of ω,
)
,
( 
n
e K
T will decrease. Therefore, )
,
( 
n
e K
T will be minimal where ω achieves its maximum
value. It should be noted that the maximum value of ω is n. By considering ω=n, the value of ω+n
will be even and we can use the result value of (22) which is
2
1

n
.
3. CONCLUSION
In this paper, edge-tenacities of two classes of graphs are calculated. For calculating the edge
tenacity of these classes, first the function in conventional edge-tenacity formula, which is
supposed to be minimized, is calculated for constant number of components. Second a function
with respect to the number of components and the size of components. It is shown that the size of
components is a constant value and the above function may be considered as a one-variable
function. This variable is just the number of components. Finding minimum of this one-variable
function is well known. Our approach may be useful for calculation of tenacity and toughness in
various classes of graphs.
REFERENCES
[1] D. Moazzami, B. Salehian, On the Edge-Tenacity of Graphs, International Mathematical Forum, 3,
(2008), no. 19, 929 – 936.
[2] M.B. Cozzens, D. Moazzami, S. Stueckle, The tenacity of the Harary Graphs, J. Combin. Math.
Combin. Comput. 16 (1994), 33-56.
[3] M.B. Cozzens, D. Moazzami, S. Stueckle, The tenacity of a graph, Graph Theory, Combinatorics, and
Algorithms (Yousef Alavi and Allen Schwenkeds.) Wiley, New York, (1995), 1111-1112.
[4] D. Moazzami, Vulnerability in Graphs - a Comparative Survey, J. Combin. Math. Combin. Comput.
30, (1999), 23-31.
[5] B. Piazza, F. Roberts, S. Stueckle, Edge-tenacious networks, Networks 25, (1995), no. 1, 7-17.
[6] B. Piazza, S. Stueckle, A lower bound for edge-tenacity, Proceedings of the thirtieth Southeastern
International Conference on Combinatorics, Graph Theory, and Computing (Boca Raton, FL, 1999)
Congr. Numer. 137, (1999), 193-196.
[7] K. S. Baggas, L. W. Beineke,W.D. Goddard, M. J. Lipman and R. E. Pippert, a survey of integrity,
Discrete Applied Math. 37/38, 1992, 13-28.
[8] W. D. Goddard and Henda C. Swart, On the toughness of a graph, Quaestiones Mathematicae 13
(1990), 217-232.
[9] C. A. Barefoot, R. Entringer and H. Swart, Vulnerability in graphs - A comparative survey, J.
Combin. Math. Combin. Comput. 1, 1987, 13-22.
Authors
Abolfazl Javan:
He received his B.Sc. in Software Engineering from Ferdowsi University of Mashhad, Mashhad, Iran, and
M.Sc. degree in Algorithms and Computation from University of Tehran, Tehran, Iran. He is currently a
research assistant at University of Tehran. His research interests include Graphs Theory, Randomized
Algorithms, Approximation Algorithms, and Bioinformatics.
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.5, No.2, March 2015
36
Mina Akhavan:
She received her B.Sc. in Software Engineering from Shahid Beheshti University, Tehran, Iran, and M.Sc.
degree in Algorithms and Computation from University of Tehran, Tehran, Iran. Her research interests
include Graphs Theory, Cloud Computing, and Bioinformatics.
Ali Moeini:
He received his Ph.D. in Nonlinear Systems at the University of Sussex, UK, in 1997. He is an Associate
Professor of Electrical & Computer Engineering at Faculty of Engineering Science, School of Engineering,
the University of Tehran, and ad joint Professor at Department of Information Technology Management,
Faculty of Management, the University of Tehran in Iran. His research interests include Formal Methods in
Knowledge and Software Engineering and Knowledge Management, Soft computing Methods,
Randomized Algorithms, Approximation Algorithms, and Bioinformatics. He has published many papers
in Journals and Conferences on the above mentioned topics.
Dara Moazzami:
He is a theoretical computer scientist, Professor of Mathematics at University of Tehran. He received a
PhD in Applied Mathematics from the University of Northeastern- Boston MA. U.S.A. in 1992, and a B.Sc.
in Pure Mathematics in 1976, and M.Sc. in Applied Mathematics in 1978, from University of Quebec–
Montreal Canada. He has been on the faculty of University of Tehran since 1993, Deputy of Undergraduate
and Graduate studies, Department of Engineering Basic Science in 2006-2008, and Chairman of
Department of Engineering Science, 2009-present. He is Editor-in-Chief Journal of Algorithms and
Computation. His research area is in algorithms and complexity theory, specifically Vulnerability in
Networks and tenacity parameter.

More Related Content

Similar to EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHS

On algorithmic problems concerning graphs of higher degree of symmetry
On algorithmic problems concerning graphs of higher degree of symmetryOn algorithmic problems concerning graphs of higher degree of symmetry
On algorithmic problems concerning graphs of higher degree of symmetrygraphhoc
 
COMPARATIVE STUDY ON BENDING LOSS BETWEEN DIFFERENT S-SHAPED WAVEGUIDE BENDS ...
COMPARATIVE STUDY ON BENDING LOSS BETWEEN DIFFERENT S-SHAPED WAVEGUIDE BENDS ...COMPARATIVE STUDY ON BENDING LOSS BETWEEN DIFFERENT S-SHAPED WAVEGUIDE BENDS ...
COMPARATIVE STUDY ON BENDING LOSS BETWEEN DIFFERENT S-SHAPED WAVEGUIDE BENDS ...cscpconf
 
Simulation of geometrical cross
Simulation of geometrical crossSimulation of geometrical cross
Simulation of geometrical crossprjpublications
 
IRJET- An Efficient Reverse Converter for the Three Non-Coprime Moduli Set {4...
IRJET- An Efficient Reverse Converter for the Three Non-Coprime Moduli Set {4...IRJET- An Efficient Reverse Converter for the Three Non-Coprime Moduli Set {4...
IRJET- An Efficient Reverse Converter for the Three Non-Coprime Moduli Set {4...IRJET Journal
 
Large variance and fat tail of damage by natural disaster
Large variance and fat tail of damage by natural disasterLarge variance and fat tail of damage by natural disaster
Large variance and fat tail of damage by natural disasterHang-Hyun Jo
 
METRIC DIMENSION AND UNCERTAINTY OF TRAVERSING ROBOTS IN A NETWORK
METRIC DIMENSION AND UNCERTAINTY OF TRAVERSING ROBOTS IN A NETWORKMETRIC DIMENSION AND UNCERTAINTY OF TRAVERSING ROBOTS IN A NETWORK
METRIC DIMENSION AND UNCERTAINTY OF TRAVERSING ROBOTS IN A NETWORKgraphhoc
 
METRIC DIMENSION AND UNCERTAINTY OF TRAVERSING ROBOTS IN A NETWORK
METRIC DIMENSION AND UNCERTAINTY OF TRAVERSING ROBOTS IN A NETWORKMETRIC DIMENSION AND UNCERTAINTY OF TRAVERSING ROBOTS IN A NETWORK
METRIC DIMENSION AND UNCERTAINTY OF TRAVERSING ROBOTS IN A NETWORKFransiskeran
 
International journal of applied sciences and innovation vol 2015 - no 1 - ...
International journal of applied sciences and innovation   vol 2015 - no 1 - ...International journal of applied sciences and innovation   vol 2015 - no 1 - ...
International journal of applied sciences and innovation vol 2015 - no 1 - ...sophiabelthome
 
Serr calculation
Serr calculationSerr calculation
Serr calculationvlpham
 
OTP, Phishing, QR code, Shares, Visual Cryptography.
OTP, Phishing, QR code, Shares, Visual Cryptography.OTP, Phishing, QR code, Shares, Visual Cryptography.
OTP, Phishing, QR code, Shares, Visual Cryptography.IJERA Editor
 
Ds31568573
Ds31568573Ds31568573
Ds31568573IJMER
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
FEM 7 Beams and Plates.ppt
FEM 7 Beams and Plates.pptFEM 7 Beams and Plates.ppt
FEM 7 Beams and Plates.pptPraveen Kumar
 
cis98010
cis98010cis98010
cis98010perfj
 
Algorithm for Edge Antimagic Labeling for Specific Classes of Graphs
Algorithm for Edge Antimagic Labeling for Specific Classes of GraphsAlgorithm for Edge Antimagic Labeling for Specific Classes of Graphs
Algorithm for Edge Antimagic Labeling for Specific Classes of GraphsCSCJournals
 
Aircraft Loads 5 Report
Aircraft Loads 5 ReportAircraft Loads 5 Report
Aircraft Loads 5 ReportLee Ramsay
 

Similar to EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHS (20)

On algorithmic problems concerning graphs of higher degree of symmetry
On algorithmic problems concerning graphs of higher degree of symmetryOn algorithmic problems concerning graphs of higher degree of symmetry
On algorithmic problems concerning graphs of higher degree of symmetry
 
COMPARATIVE STUDY ON BENDING LOSS BETWEEN DIFFERENT S-SHAPED WAVEGUIDE BENDS ...
COMPARATIVE STUDY ON BENDING LOSS BETWEEN DIFFERENT S-SHAPED WAVEGUIDE BENDS ...COMPARATIVE STUDY ON BENDING LOSS BETWEEN DIFFERENT S-SHAPED WAVEGUIDE BENDS ...
COMPARATIVE STUDY ON BENDING LOSS BETWEEN DIFFERENT S-SHAPED WAVEGUIDE BENDS ...
 
J1304036065
J1304036065J1304036065
J1304036065
 
Simulation of geometrical cross
Simulation of geometrical crossSimulation of geometrical cross
Simulation of geometrical cross
 
IRJET- An Efficient Reverse Converter for the Three Non-Coprime Moduli Set {4...
IRJET- An Efficient Reverse Converter for the Three Non-Coprime Moduli Set {4...IRJET- An Efficient Reverse Converter for the Three Non-Coprime Moduli Set {4...
IRJET- An Efficient Reverse Converter for the Three Non-Coprime Moduli Set {4...
 
Large variance and fat tail of damage by natural disaster
Large variance and fat tail of damage by natural disasterLarge variance and fat tail of damage by natural disaster
Large variance and fat tail of damage by natural disaster
 
Cdc18 dg lee
Cdc18 dg leeCdc18 dg lee
Cdc18 dg lee
 
METRIC DIMENSION AND UNCERTAINTY OF TRAVERSING ROBOTS IN A NETWORK
METRIC DIMENSION AND UNCERTAINTY OF TRAVERSING ROBOTS IN A NETWORKMETRIC DIMENSION AND UNCERTAINTY OF TRAVERSING ROBOTS IN A NETWORK
METRIC DIMENSION AND UNCERTAINTY OF TRAVERSING ROBOTS IN A NETWORK
 
METRIC DIMENSION AND UNCERTAINTY OF TRAVERSING ROBOTS IN A NETWORK
METRIC DIMENSION AND UNCERTAINTY OF TRAVERSING ROBOTS IN A NETWORKMETRIC DIMENSION AND UNCERTAINTY OF TRAVERSING ROBOTS IN A NETWORK
METRIC DIMENSION AND UNCERTAINTY OF TRAVERSING ROBOTS IN A NETWORK
 
International journal of applied sciences and innovation vol 2015 - no 1 - ...
International journal of applied sciences and innovation   vol 2015 - no 1 - ...International journal of applied sciences and innovation   vol 2015 - no 1 - ...
International journal of applied sciences and innovation vol 2015 - no 1 - ...
 
Serr calculation
Serr calculationSerr calculation
Serr calculation
 
OTP, Phishing, QR code, Shares, Visual Cryptography.
OTP, Phishing, QR code, Shares, Visual Cryptography.OTP, Phishing, QR code, Shares, Visual Cryptography.
OTP, Phishing, QR code, Shares, Visual Cryptography.
 
B33004007
B33004007B33004007
B33004007
 
B33004007
B33004007B33004007
B33004007
 
Ds31568573
Ds31568573Ds31568573
Ds31568573
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
FEM 7 Beams and Plates.ppt
FEM 7 Beams and Plates.pptFEM 7 Beams and Plates.ppt
FEM 7 Beams and Plates.ppt
 
cis98010
cis98010cis98010
cis98010
 
Algorithm for Edge Antimagic Labeling for Specific Classes of Graphs
Algorithm for Edge Antimagic Labeling for Specific Classes of GraphsAlgorithm for Edge Antimagic Labeling for Specific Classes of Graphs
Algorithm for Edge Antimagic Labeling for Specific Classes of Graphs
 
Aircraft Loads 5 Report
Aircraft Loads 5 ReportAircraft Loads 5 Report
Aircraft Loads 5 Report
 

More from ijfcstjournal

A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLES
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLESA COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLES
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLESijfcstjournal
 
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...ijfcstjournal
 
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...ijfcstjournal
 
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...ijfcstjournal
 
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...ijfcstjournal
 
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDINGAN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDINGijfcstjournal
 
EAGRO CROP MARKETING FOR FARMING COMMUNITY
EAGRO CROP MARKETING FOR FARMING COMMUNITYEAGRO CROP MARKETING FOR FARMING COMMUNITY
EAGRO CROP MARKETING FOR FARMING COMMUNITYijfcstjournal
 
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEM
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEMCOMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEM
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEMijfcstjournal
 
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMSPSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMSijfcstjournal
 
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...ijfcstjournal
 
A MUTATION TESTING ANALYSIS AND REGRESSION TESTING
A MUTATION TESTING ANALYSIS AND REGRESSION TESTINGA MUTATION TESTING ANALYSIS AND REGRESSION TESTING
A MUTATION TESTING ANALYSIS AND REGRESSION TESTINGijfcstjournal
 
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...ijfcstjournal
 
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCHA NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCHijfcstjournal
 
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKS
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKSAGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKS
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKSijfcstjournal
 
International Journal on Foundations of Computer Science & Technology (IJFCST)
International Journal on Foundations of Computer Science & Technology (IJFCST)International Journal on Foundations of Computer Science & Technology (IJFCST)
International Journal on Foundations of Computer Science & Technology (IJFCST)ijfcstjournal
 
AN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESAN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESijfcstjournal
 
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...ijfcstjournal
 
A STATISTICAL COMPARATIVE STUDY OF SOME SORTING ALGORITHMS
A STATISTICAL COMPARATIVE STUDY OF SOME SORTING ALGORITHMSA STATISTICAL COMPARATIVE STUDY OF SOME SORTING ALGORITHMS
A STATISTICAL COMPARATIVE STUDY OF SOME SORTING ALGORITHMSijfcstjournal
 
A LOCATION-BASED MOVIE RECOMMENDER SYSTEM USING COLLABORATIVE FILTERING
A LOCATION-BASED MOVIE RECOMMENDER SYSTEM USING COLLABORATIVE FILTERINGA LOCATION-BASED MOVIE RECOMMENDER SYSTEM USING COLLABORATIVE FILTERING
A LOCATION-BASED MOVIE RECOMMENDER SYSTEM USING COLLABORATIVE FILTERINGijfcstjournal
 
BIN PACKING PROBLEM: TWO APPROXIMATION ALGORITHMS
BIN PACKING PROBLEM: TWO APPROXIMATION ALGORITHMSBIN PACKING PROBLEM: TWO APPROXIMATION ALGORITHMS
BIN PACKING PROBLEM: TWO APPROXIMATION ALGORITHMSijfcstjournal
 

More from ijfcstjournal (20)

A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLES
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLESA COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLES
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLES
 
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...
 
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
 
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
 
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
 
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDINGAN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
 
EAGRO CROP MARKETING FOR FARMING COMMUNITY
EAGRO CROP MARKETING FOR FARMING COMMUNITYEAGRO CROP MARKETING FOR FARMING COMMUNITY
EAGRO CROP MARKETING FOR FARMING COMMUNITY
 
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEM
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEMCOMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEM
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEM
 
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMSPSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
 
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...
 
A MUTATION TESTING ANALYSIS AND REGRESSION TESTING
A MUTATION TESTING ANALYSIS AND REGRESSION TESTINGA MUTATION TESTING ANALYSIS AND REGRESSION TESTING
A MUTATION TESTING ANALYSIS AND REGRESSION TESTING
 
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...
 
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCHA NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
 
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKS
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKSAGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKS
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKS
 
International Journal on Foundations of Computer Science & Technology (IJFCST)
International Journal on Foundations of Computer Science & Technology (IJFCST)International Journal on Foundations of Computer Science & Technology (IJFCST)
International Journal on Foundations of Computer Science & Technology (IJFCST)
 
AN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESAN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMES
 
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
 
A STATISTICAL COMPARATIVE STUDY OF SOME SORTING ALGORITHMS
A STATISTICAL COMPARATIVE STUDY OF SOME SORTING ALGORITHMSA STATISTICAL COMPARATIVE STUDY OF SOME SORTING ALGORITHMS
A STATISTICAL COMPARATIVE STUDY OF SOME SORTING ALGORITHMS
 
A LOCATION-BASED MOVIE RECOMMENDER SYSTEM USING COLLABORATIVE FILTERING
A LOCATION-BASED MOVIE RECOMMENDER SYSTEM USING COLLABORATIVE FILTERINGA LOCATION-BASED MOVIE RECOMMENDER SYSTEM USING COLLABORATIVE FILTERING
A LOCATION-BASED MOVIE RECOMMENDER SYSTEM USING COLLABORATIVE FILTERING
 
BIN PACKING PROBLEM: TWO APPROXIMATION ALGORITHMS
BIN PACKING PROBLEM: TWO APPROXIMATION ALGORITHMSBIN PACKING PROBLEM: TWO APPROXIMATION ALGORITHMS
BIN PACKING PROBLEM: TWO APPROXIMATION ALGORITHMS
 

Recently uploaded

Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 

Recently uploaded (20)

Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 

EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHS

  • 1. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.5, No.2, March 2015 DOI:10.5121/ijfcst.2015.5203 29 EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHS Abolfazl Javan, Mina Akhavan, Ali Moeini and Dara Moazzami Department of Algorithms and Computation, Faculty of Engineering Science, School of Engineering, University of Tehran, Tehran, Iran ABSTRACT It is well known that the tenacity is a proper measure for studying vulnerability and reliability in graphs. Here, a modified edge-tenacity of a graph is introduced based on the classical definition of tenacity. Properties and bounds for this measure are introduced; meanwhile edge-tenacity is calculated for cycle graphs and also for complete graphs. KEYWORDS Graph, Edge Tenacity 1. INTRODUCTION Since that network components may be destroyed, it is necessary to study networks vulnerability. So far various criteria have been presented to measure the vulnerability and reliability of networks [9]. All measures have been based on that how the loss of part of the graph (vertices or edges) will affect the graph structure in the worst case. For example, vertex-connectivity is the minimum number of vertices whose removal disconnects the graph and edge-connectivity is the smallest number of edges whose removal disconnects the graph. Integrity [7] and Toughness [8] is two other measures for calculating network vulnerability. For the first time graph tenacity is studied by Cozzens, Moazzami and Stueckle [2, 3]. Cozzens et al. introduced two measures of network vulnerability. One of them is the tenacity (T(G)) that is introduced for studying vertex vulnerability. The other is the measure that is called mix-tenacity by Moazzami and has been used for studying edge vulnerability. In [4] Moazzami studied integrity, connectivity, toughness and tenacity in some graphs. His results showed that tenacity is a better measure for studying vulnerability and reliability in the most graphs. The vertex tenacity of a graph called Tv(G) is defined as: Vertex Tenacity: } ) ( ) ( { min ) ( ) ( A G A G A G T G V A v        (1) where A is a subset V(G) the set of all vertices of the graph G, τ(G − A) is the number of vertices in the largest component of (G − A) and ω(G − A) is the number of components of (G − A). Also mix-tenacity is defined as:
  • 2. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.5, No.2, March 2015 30 Mixed Tenacity: } ) ( ) ( { min ) ( ) ( A G A G A G T G E A m        (2) where A is a subset of E(G), the set of all edges of the graph G, τ(G − A) is the number of vertices in the largest component of G-A and ω(G − A) is the number of components of (G − A). In [5, 6] Piazza et al. used (2) as edge-tenacity but this vulnerability measure is the combination of edges subset ( ) (G E A  ) and the number of vertices in the largest component (τ (G − A)). It is visible that in Tm (Mix-tenacity) the number of removed edges is added to the number of vertices in a largest component of the remaining graph. In this definition both edges and vertices are involved which is not rational. To eliminate this weakness, Moazzami and Salehian [1] presented a new measure and named it edge-tenacity that in new one just edges are involved. Edge-tenacity is defined as: Edge Tenacity: } ) ( ) ( { min ) ( ) ( A G A G A G T G E A e        (3) where A is a subset of E(G), the set of all edges of the graph G, τ(G − A) is the number of edges in the largest component of (G − A) and ω(G − A) is the number of components of (G − A). 2. EDGE-TENACITY OF SOME SPECIAL GRAPHS Here, we calculate precisely the edge-tenacity for complete graphs and cycle graphs based on (3). Theorem 1: If Cn be the cycle graph with n vertices, then . Proof: Suppose that the number of edges and vertices in Cn are |E|=m and |V|=n respectively. We know that the number of edges and vertices in Cn are equal (m=n). Also it can be easily understood that with removing ω edges, (ω >0), ω components remain in the graph, where ω is a constant. Based on (3) to determine the minimum value of Te, the numerator of the fraction ω + τ(G − ω) must become minimum. Since τ(G − ω) is the number of edges in the largest component then for getting the minimum value of Te, it is necessary to distribute |E| − ω edges between ω components equally. Therefore Te is as: }. 1 min } min ) ( 1 1                                                            m m C T m m n e (4) Since |E|=m is constant, it needs that ω changes between 1 to m. Based on (4) one easily conclude that in this range, the minimum value of Te will achieve when ω is maximum, namely n (m=n). Therefore, Te is calculated as:
  • 3. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.5, No.2, March 2015 31 1 1 1 ) (                    n n n n m m m m C T n e . (5) Theorem 2: If Kn is a complete graph with n vertices, then . 2 1 ) (   n K T n e (6) For calculation of the edge-tenacity in a complete graph, we first prove some lemmas and then edge-tenacity is calculated. Lemma 1: The edge-tenacity for the complete graph Kn is calculated in the case that the generated components after removing edges are all complete subgarphs. Proof: The proof is based on contradiction. Suppose that the edge-tenacity for the complete graph is calculated in the case that at least one of the generated components is not a complete subgraph. Therefore, this component has at least one edge less than the complete graph. By adding this edge to the component if the component is the largest component of the graph, the number of removed edges will be one less and the number of edges of the largest component will be one more that finally does not have any effect on obtaining the edge-tenacity. Also, by adding the removed edge to the component if the component is not the largest one in the graph, the number of removed edges is decreased by one. It means the new value of edge-tenacity is less than the assumed value which contradicts with the assumption of the theorem. Therefore, we can conclude that in order to calculate the edge-tenacity of a complete graph, all generated components of it, after removing edges, can be considered complete. Lemma 2: Assume that it is supposed to distribute n vertices between ω complete components. The ith component has ci vertices so that        n c c c , ... 0 2 1 (7) Where ci is the number of allocated vertices to ith component that 1≤i≤ ω. The maximum value of the total number of edges for all complete components which can be stated by the following equation          1 2 i i c , (8) Occurs when the following conditions are satisfied: 1 , 1 1 , 1           n c i ci (9)
  • 4. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.5, No.2, March 2015 32 (Note that       2 i c is the number of edges of ith complete component and therefore (8) is the total number of edges for all complete components) Proof: The proof is based on contradiction. Suppose that there exists an integer called k which makes the value in expression (8) maximum such that ck>1, k< ω. It is known that 2 2 ) 1 ( 2 ) 1 ( 2 2 2 2      c c c c c c c c c c k k k k k                      , (10) If ck>1 then due to (7) cω>1 and in consequence we have 0 ) 1 )( 1 (    k c c (11) By inserting the above in (10) we have . 2 1 2 ) 2 )( 1 ( 2 2 2 2 2 ) 1 )( 1 ( 2 2 2 2 2 2 2 2 2 2                                               k k k k k k k k k k k k k c c c c c c c c c c c c c c c c c c c c c c c c c c              (12) Rearranging (8) using (12) yields . 2 1 2 1 2 2 2 2 2 2 2 1 1 1 1 1 1 1 1 1                                                                                                                   c c c c c c c c c k j j k i i k j j k k i i i i (13) The right side of (13) is the total number of edges for all complete components in the case that pick (ck−1) vertices from kth component and place them to ωth component. Therefore, the number of edges of kth component will be       2 1 and the number of edges of ωth component will be         2 1   c c . In other word, picking (ck−1) vertices from kth component and placing them to ωth component makes (8) greater. So (13) contradicts with the assumption that (8) reaches to its maximum value with the above k. Finally, it can be concluded that the maximum value of (8) occurs when the condition (9) is satisfied.
  • 5. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.5, No.2, March 2015 33 Lemma 3: Assume that it is supposed to distribute n vertices between ω complete components. The ith component has ci vertices so that        n c c c , ... 0 2 1 (14) Where ci is the number of allocated vertices to ith component that 1≤i≤ ω. Therefore the minimum value of (15)                             2 2 2 1   c c n i i (15) Occurs when vertices are placed based on (16).                                1 ) 2 , mod( 2 1 , 1 , 2 3 , 2 1 0 ) 2 , mod( 2 1 , 1 , 2 2 1 1            n if i c n c n c n if i c n c c i i (16) Proof: Rearranging (15) yields , 2 2 2 2 2 1 1 1                                                 i i i i c n c c n (17) Where n is constant. To minimize (17), the value of          1 1 2  i i c should be maximum. According to Lemma 3, this occurs when vertices are placed based on the following arrangement. 1 ) 1 ( ) ( , 2 1 , 1 1               c n c i ci . (18) To maximize the value of          1 1 2  i i c , cω-1 should be maximum. It is assumed that n and ω are constants. So, cω, which must satisfy (14), should be minimal. Therefore, each of the , 1  i c , 2 1     i must take one vertex and the remaining vertices distribute almost equally between cω-1 and cω. If n+ω is even, then the number of remaining vertices namely n−ω+2 is even too. Because (n+ω) + (n−ω+2) = 2n+2 is even. In this case, cω-1 and cω should take the same value. If n+ω is odd, then the value of cω should be one more than cω-1. Now we return to the proof of Theorem 2. Proof: First, it is assumed that ω be the number of generated components. To minimize the edge- tenacity with respect to ω, it is enough to minimize the numerator of the fraction of (3).
  • 6. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.5, No.2, March 2015 34 Based on Lemma 1, the numerator of (3) can be rearranged as follows:                              2 2 2 ) ( 1    c c n f i i (19) Based on lemma 3, we have , 1  i c 2 1     i . Therefore, (19) can be written in a simpler form as follows:                2 2 ) ( 1   c n f . (20) If n+ω is even, then based on (16) edge tenacity will be calculated as follows: . 4 1 8 8 6 3 8 2 2 2 4 4 2 ) )( 2 ( 4 1 ) 1 ( 2 2 2 2 ) , ( 2 2 2 2                                     n n n n n n n n n n n n n n K T n e             (21) We are looking for the proper value of ω to minimize ) , (  n e K T . We note in (21) that the value of n n 6 3 2  is positive for all value of n where n>1, so by increasing the value of ω, ) , (  n e K T will decrease. Therefore, ) , (  n e K T will be minimal where ω achieves its maximum value. It should be noted that the maximum value of ω is n. Therefore, the edge-tenacity is as follows:   . 2 1 2 ) , ( min ) (           n n n K T K T n e n e   (22) If n+ω is odd, based on (16) the edge-tenacity will be calculated as follows: . 4 8 8 1 4 3 8 1 2 4 4 2 ) 1 )( 1 ( 4 1 ) 1 ( 2 2 1 2 ) , ( 2 2 2 2 n n n n n n n n n n n n n K T n e                                                (23)
  • 7. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.5, No.2, March 2015 35 We are looking for the proper value of ω to minimize ) , (  n e K T . We note in (23) that the value of 1 4 3 2   n n is positive for all value of n where n>1, so, by increasing the value of ω, ) , (  n e K T will decrease. Therefore, ) , (  n e K T will be minimal where ω achieves its maximum value. It should be noted that the maximum value of ω is n. By considering ω=n, the value of ω+n will be even and we can use the result value of (22) which is 2 1  n . 3. CONCLUSION In this paper, edge-tenacities of two classes of graphs are calculated. For calculating the edge tenacity of these classes, first the function in conventional edge-tenacity formula, which is supposed to be minimized, is calculated for constant number of components. Second a function with respect to the number of components and the size of components. It is shown that the size of components is a constant value and the above function may be considered as a one-variable function. This variable is just the number of components. Finding minimum of this one-variable function is well known. Our approach may be useful for calculation of tenacity and toughness in various classes of graphs. REFERENCES [1] D. Moazzami, B. Salehian, On the Edge-Tenacity of Graphs, International Mathematical Forum, 3, (2008), no. 19, 929 – 936. [2] M.B. Cozzens, D. Moazzami, S. Stueckle, The tenacity of the Harary Graphs, J. Combin. Math. Combin. Comput. 16 (1994), 33-56. [3] M.B. Cozzens, D. Moazzami, S. Stueckle, The tenacity of a graph, Graph Theory, Combinatorics, and Algorithms (Yousef Alavi and Allen Schwenkeds.) Wiley, New York, (1995), 1111-1112. [4] D. Moazzami, Vulnerability in Graphs - a Comparative Survey, J. Combin. Math. Combin. Comput. 30, (1999), 23-31. [5] B. Piazza, F. Roberts, S. Stueckle, Edge-tenacious networks, Networks 25, (1995), no. 1, 7-17. [6] B. Piazza, S. Stueckle, A lower bound for edge-tenacity, Proceedings of the thirtieth Southeastern International Conference on Combinatorics, Graph Theory, and Computing (Boca Raton, FL, 1999) Congr. Numer. 137, (1999), 193-196. [7] K. S. Baggas, L. W. Beineke,W.D. Goddard, M. J. Lipman and R. E. Pippert, a survey of integrity, Discrete Applied Math. 37/38, 1992, 13-28. [8] W. D. Goddard and Henda C. Swart, On the toughness of a graph, Quaestiones Mathematicae 13 (1990), 217-232. [9] C. A. Barefoot, R. Entringer and H. Swart, Vulnerability in graphs - A comparative survey, J. Combin. Math. Combin. Comput. 1, 1987, 13-22. Authors Abolfazl Javan: He received his B.Sc. in Software Engineering from Ferdowsi University of Mashhad, Mashhad, Iran, and M.Sc. degree in Algorithms and Computation from University of Tehran, Tehran, Iran. He is currently a research assistant at University of Tehran. His research interests include Graphs Theory, Randomized Algorithms, Approximation Algorithms, and Bioinformatics.
  • 8. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.5, No.2, March 2015 36 Mina Akhavan: She received her B.Sc. in Software Engineering from Shahid Beheshti University, Tehran, Iran, and M.Sc. degree in Algorithms and Computation from University of Tehran, Tehran, Iran. Her research interests include Graphs Theory, Cloud Computing, and Bioinformatics. Ali Moeini: He received his Ph.D. in Nonlinear Systems at the University of Sussex, UK, in 1997. He is an Associate Professor of Electrical & Computer Engineering at Faculty of Engineering Science, School of Engineering, the University of Tehran, and ad joint Professor at Department of Information Technology Management, Faculty of Management, the University of Tehran in Iran. His research interests include Formal Methods in Knowledge and Software Engineering and Knowledge Management, Soft computing Methods, Randomized Algorithms, Approximation Algorithms, and Bioinformatics. He has published many papers in Journals and Conferences on the above mentioned topics. Dara Moazzami: He is a theoretical computer scientist, Professor of Mathematics at University of Tehran. He received a PhD in Applied Mathematics from the University of Northeastern- Boston MA. U.S.A. in 1992, and a B.Sc. in Pure Mathematics in 1976, and M.Sc. in Applied Mathematics in 1978, from University of Quebec– Montreal Canada. He has been on the faculty of University of Tehran since 1993, Deputy of Undergraduate and Graduate studies, Department of Engineering Basic Science in 2006-2008, and Chairman of Department of Engineering Science, 2009-present. He is Editor-in-Chief Journal of Algorithms and Computation. His research area is in algorithms and complexity theory, specifically Vulnerability in Networks and tenacity parameter.