SlideShare a Scribd company logo
1 of 10
Download to read offline
Applied Mathematics and Sciences: An International Journal (MathSJ ), Vol. 5, No. 1/2/3, September 2018
DOI : 10.5121/mathsj.2018.5301 1
EDGE-NEIGHBOR RUPTURE DEGREE ON GRAPH
OPERATIONS
Saadet Eskiizmirliler 1
, Zeynep Örs Yorgan cioğlu2
, Refet Polat3
And Mehmet Ümit Gürsoy4
1,3
Department of Mathematics, Faculty of Science, Yasar University, Izmir, Turkey,
2
Maritime and Port Management Program, Vocational School,
Yasar University, Izmir, Turkey,
4
Izmir, Turkey,
ABSTRACT
Vulnerability and reliability parameters measure the resistance of the network to disruption of operation
after the failure of certain stations or communication links in a communication network. An edge
subversion strategy of a graph , say , is a set of edge(s) in whose adjacent vertices which is incident
with the removal edge(s) are removed from . The survival subgraph is denoted by − . The edge-
neighbor-rupture degree of connected graph , , is defined to be = − −
| | − − : ⊆ , − ≥ 1 where is any edge-cut-strategy of , − is the number
of the components of − , and − is the maximum order of the components of − . In this paper
we give some results for the edge-neighbor-rupture degree of the graph operations and Thorny graph types
are examined.
KEYWORDS
Edge-neighbor-rupture degree, Thorny graphs, Vulnerability, Reliability.
1. INTRODUCTION
A communication network can be brokedown to pieces partially or completely from unexpected
factors. This situation can prevent data transmit so there would be a big problem on the system to
perform it’s task. Therefore, the vulnerability and the reliability measure the resistance of the
network disturbance of operations after the failure of certain stations. To measure the
vulnerability and the reliability we have some parameters which are connectivity [7,11,12],
integrity [3], scattering number [8], rupture degree [9], neighbor-rupture degree [1] and edge-
neighbor-rupture degree [2].
Terminology and notations are not defined in this paper but it can be found [4,5]. Let =
, be a simple graph and let e be any edge of . The set,
= ∈ | ≠ ; 	 	 	 	 ! " is the open neighborhood of e, and [e] = {e}
∪ (e) is the closed neighborhood of e. An edge e in is said to be subverted if the closed
neighborhood of e is removed from . In other words, if = $, % than − &e( = − $, % . A
set of edges = ), *, … , , is called an edge subversion strategy of if each of the edges in
has been subverted from . If has been subverted from the graph , then the remaining graph is
called survival graph, denoted by − . An edge subversion strategy is called an edge-cut-
strategy of if the survival subgraph − is disconnected or is a single vertex or the empty graph
Applied Mathematics and Sciences: An International Journal (MathSJ ), Vol. 5, No. 1/2/3, September 2018
2
[10]. is any edge-cut-strategy of , ( − ) is the number of the components of − , and
( − ) is the maximum order of the components of − .
The definition of edge-neighbor-rupture degree of a connected graph is
= − − | | − − : ⊆ , − ≥ 1 .
Definition 1.1: ∈ -
and ∀% ∈ V for each vertex of , if deg % = than is called r-
regular graph [4].
Definition 1.2: ) and * graphs have disjoint vertex sets ) and * and edge sets ) and *
respectively. The join operation of two ) and * graphs is denoted by ) + * and consist of
) ∪ *which is union of two ) and * graphs and all edges joining ) and *[4].
Definition 1.3:Let 3), 3*, … , 34be non-negative integers. The Thorny Graph of the graph , with
parameters3), 3*, … , 34,is obtained by attaching 35 new vertices of degree one to the vertex$5 of
the graph , 6 = 1,2, … , .
The Thorny graph of the graph is denoted by ⋆
, or if the respectiveparameters need to be
specified, by ⋆ 3), 3*, … , 34 [6].
Definition 1.4:Forthree or more disjoint graphs ), *, … , 4 , the sequential join
) + * + ⋯ + 4
is the graph
) + * ∪ * + : ∪ … ∪ 4;) + 4 [4].
Definition 1.5: Connectivity < is the minimum number of vertices that need to be removed in
order to disconnect a graph [4].
Definition 1.6: The integrity of a graph = , is defined by = = 6 | | + −
; 	 ⊂ where − denotes the order of largest component in − [3].
Definition 1.7: The rupture degree of a non-complete connected graph is defined by	 =
	 − − | | − − :	 ⊂ , − 	˃	1 where − denotes the
number of components in the graph − and − is the order of the largest component of
− [9].
Definition 1.8: The neighbor integrity of a graph is defined by
= = 6 | | + ! − : ⊂ where is any vertex subversion strategy of and
! − is the order of the largest component of − [10].
Definition 1.9: The neighbor rupture degree of a non-complete connected graph is defined to
be = − − | | − ! − :	 ⊂ , − ≥ 1 where is any vertex
subversion strategy of , − is the number of connected components in − and
! − is the maximum order of the components of − [13].
Definition 1.10: The edge-neighbor-rupture degree of a connected graph is defined to be
= − − | | − − ∶ ⊆ , − ≥ 1 , where is any edge-
Applied Mathematics and Sciences: An International Journal (MathSJ ), Vol. 5, No. 1/2/3, September 2018
3
cut-strategy of , 	 − 	 is the number of the components of − , and − is the
maximum order of the components of − .
Example:Let's give an exampleof
the calculation of the edge-neighbor-
rupture-degree.
− = 1
| | = 0
− = 19
− − | | − −
= 1 − 0 − 19 = −18
Figure 1.1
− = 6
| | = 3
− = 7
− − | | − − = 6 − 3 − 7
= −4
Figure 1.2
− = 8
| | = 5
− = 2
− − | | − − = 8 − 5 − 2
= 1
Figure 1.3
− = 9
| | = 5
− = 1
− − | | − − = 9 − 5 − 1
= 3
Figure 1.4
− = 9
| | = 5
− = 1
− − | | − − = 9 − 5 −
1 = 3
Figure 1.5
Applied Mathematics and Sciences: An International Journal (MathSJ ), Vol. 5, No. 1/2/3, September 2018
4
As shown, figure 1.1, figure 1.2,figure 1.3,figure 1.4 and figure 1.5
= −18, −4,1,3,3
= 3.
In this paper, the edge-neighbor-rupture degree of some graphs is obtained and the relations
between edge-neighbor-rupture degree and other parameters are determined [2].
2. EDGE-NEIGHBOR-RUPTURE DEGREE ON GRAPH OPERATIONS
In this section some theorems are given for edge-neighbor-rupture degree on the graph
operations. Connected, undirected, simple graphs are examined.
Theorem 2.1:Let be a regular graph and ⋆
is a thorny graph of (adding a vertex to any
vertex of a graph). Then the edge-neighbor-rupture degree of is,
⋆
= + 1.
Proof:Since is regular graph, you can start from any edge to delete. There are two cases.
Case 1: If we start to delete an edge that is incident to an added vertex, while Sedge-cut-
strategynumber is not changing,( − ) numbers of components are increased 1. So the result is
increased 1.
Case 2:If we start to delete an edge that is not incident to an added vertex, while Sedge-cut-
strategy number and the number of the components are not changed, maximum order of the
components are increased. So the result is increased.
The result takes maximum value in case 1. So the proof is completed.■
Theorem 2.2: Edge-neighbor-rupture degree of thorny of regular graph (adding i vertices
equally to every vertex of a graph for1 ≤ 6 ≤ ) is,
⋆
= 6 − J
4
*
K − 1.
Proof: Let S be anedge-cut-strategyof ⋆
and let | | = . There are two cases for the elements of
.
Case 1: If 0 ≤ < J
4
*
K, then ⋆
− ≤ 2 6 + 1 and ⋆
− ≥ 6 + 1, so we have
⋆
− − | | − ⋆
− ≤ 2 6 + 1 − − 6 + 1 = 2 6 − − 6.
Let’s = 2 6 − − 6 . Since is an increasing function in 0 ≤ < J
4
*
K, it takes its maximum
value at MJ
4
*
K − 1N, and
MJ
2
K − 1N = 2 MJ
2
K − 1N 6 − J
2
K − 6.
Applied Mathematics and Sciences: An International Journal (MathSJ ), Vol. 5, No. 1/2/3, September 2018
5
Thus we get ⋆
≤ 2 MJ
4
*
K − 1N 6 − J
4
*
K − 6 .
Case 2: If J
4
*
K ≤ ≤
:4P;4
*
, then ⋆
− ≤ 6and ⋆
− ≥ 1, so we have
⋆
− − | | − ⋆
− ≤ 6 − − 1.
Let’s = 6 − − 1.Since is a decreasing function in 0 ≤ < J
4
*
K, it takes its maximum
value at J
4
*
K, and 	 MJ
4
*
KN = 6 − J
4
*
K − 1.
Thus we get ⋆
≤ 6 − J
4
*
K − 1.
From Case1 and Case 2 we have
⋆
≤ 6 − J
4
*
K − 1. (1)
There exist ∗
such that
	 = J
4
*
K, ⋆
− ∗
= 6 and ⋆
− ∗
= 1, thus we have
⋆ ≥ 6 − J
4
*
K − 1. (2)
From (1) and (2) we get
⋆
= 6 − J
4
*
K − 1. ■
Corollary 2.1: LetR4
⋆
is a Thorny graph of R4 (adding i vertices equally to every vertex of a
graph for2 ≤ 6 ≤ ). Then the edge-neighbor-rupture degree of R4
⋆
is,
R4
⋆
= 6 − J
4
*
K − 1.
Proof: It is the same as proof of Theorem 2.2 ■
Corollary 2.2: LetS4
⋆
is a Thorny graph of S4 (adding i vertices equally to every vertex of a
graph for2 ≤ 6 ≤ ). Then the edge-neighbor-rupture degree of S4
⋆
is,
S4
⋆
= 6 − J
4
*
K − 1.
Proof: It is the same as proof of Theorem 2.2. ■
Theorem 2.3: Edge-neighbor-rupture degree of Thorny graphof 4 is 6 ≥ 2 ,
4
⋆
= 6 − .
Proof: Let S be an edge-cut-strategyof 4
⋆
and let | | = . There are two cases for the elements of
.
Applied Mathematics and Sciences: An International Journal (MathSJ ), Vol. 5, No. 1/2/3, September 2018
6
Case 1: If 0 ≤ < − 1, then 4
⋆
− ≤ 6 + 1 and 4
⋆
− ≥ 6 + 1, so we have
4
⋆
− − | | − 4
⋆
− ≤ 6 + 1 − − 6 + 1 = 6 − − 6.
Let = 6 − − 6 . Since is an increasing function in 0 ≤ < − 1, it takes its
maximum value − 2 and − 2 = − 2 6 − 1 − 6.
Thus we get 4
⋆
≤ 6 − − 36 + 2.
Case 2: If − 1 ≤ ≤ * + − 1 then 4
⋆ − ≤ 6 and 4
⋆ − ≥ 1, so we have
4
⋆
− − | | − 4
⋆
− ≤ 6 − − 1.
Let = 6 − − 1.Since is a decreasing function in − 1 ≤ ≤ *
+ − 1it takes its
maximum value at − 1 and
− 1 = 6 − + 1 − 1 = 6 − .
Thus we get 4
⋆
≤ 	 6 − .
From Case1 and Case 2 we have
4
⋆
≤ 6 − . (3)
There exist ∗
such that
= − 1, 4
⋆
− ∗
= 6 and 4
⋆
− ∗
= 1, thus we have
4
⋆
≥ 6 − . (4)
From (3) and (4) we get 4
⋆
= 6 − . ■
Theorem 2.4: Let R4,R, is a path of order and respectively. The edge-neighbor-rupture
degree of addition of R4 and	R, is,
R4 + R, = T
R, −
2
, 	6U	 %
R,;) − J
2
K , 	6U	V
W , <
Proof:
Case 1:If we select an edge-cut-strategy fromR4, we needed
4
*
edges to delete all the edges of R4
soR,is remained. Therefore,
R4 + R, = T
R, −
2
, 	6U	 %
R,;) − J
2
K , 	6U	V
W
Case 2: If we select an edge-cut-strategy from combining edges of R4 and R,, We get,
R4 + R, = R,;4 − .
Applied Mathematics and Sciences: An International Journal (MathSJ ), Vol. 5, No. 1/2/3, September 2018
7
Case 3:If we select an edge-cut-strategy fromR,, we need
4
*
edges to delete all the edges of
R,soR4 is remained. Therefore,
R4 + R, = T
R4 −
2
, 	6U	 %
R4;) − J
2
K , 	6U	V
W
The results take maximum value in case 1. So the proof is completed.
Corollary 2.3: The edge-neighbor-rupture degree of R*+R4 is,
R* + R, = R4 − 1 .
Theorem 2.5: Let ), *, … , 4be connected graphs then,
) ∪ * ∪ … ∪ 4 ≥ ) + * + ⋯ + 4
Proof: Let = ) ∪ * ∪ … ∪ 4be union of ), *, … , 4. Let = ), *, … , 4 be an edge Nr-
set of ), *, … , 4 respectively and let = ) ∪ * ∪ … ∪ 4be an edge-subversion strategy of .
Then we obtain,
≥ − − | | − −
= & ) − ) + * − * + ⋯ + 4 − 4 ( − &| )| + | *| + ⋯ + | 4|(
− & ) − ) + * − * + ⋯ + 4 − 4 (
= ) − ) − | )| − ) − ) + * − * − | *| − * − * + ⋯ + 4 − 4
− | 4| − 4 − 4
) + * + ⋯ + 4 . ■
Theorem 2.6: Let be a connected graph, then the edge-neighbor-rupture degree of is,
≥ − X
2
Y.
Proof: For the minimum value of , − must be the smallest, | | and −
must be the greatest.
Let S be an edge-cut-strategy of and | | = . There are two cases for the elements of .
Case 1: If ≤ X
4;)
*
Ythen − = 1 and − ≥ − 2 .
So we have
− − | | − − ≤ 1 − − − 2 				= 1 + − = .
This equality takes maximum value for = X
4;)
*
Y.
There are two conditions:
Case i: If n is odd;
Applied Mathematics and Sciences: An International Journal (MathSJ ), Vol. 5, No. 1/2/3, September 2018
8
= 1 +
− 1
2
− = −
− 1
2
= − X
2
Y.
Case ii: If n is even;
= 1 +
− 2
2
− = −
2
Case 2: If
4 4;)
*
> > X
4;)
*
Y then		 − ≤ 1and − ≥ 1.
− − | | − − ≤ 1 − − 1 = − .
This equality takes the maximum value for	 = X
4
*
Y.
From all cases, we obtain, ≥ − X
4
*
Y. ■
Corollary 2.4: Let be a connected graph, then the edge-neighbor-rupture degree of is,
− X
4
*
Y ≤ ≤ − 4.
Proof: From Theorem 2.6 and [2], the proof is complete. ■
3. COMPUTING EDGE-NEIGHBOR-RUPTURE DEGREE OF A GRAPH
In this section, an algorithm is proposed in order to calculate the edge-neighbor-rupture degreefor
any simple finite undirected graph without loops and multiple edges by using the findENR
function.
Algorithm Edge Neighbor Rupture (ENR)
Output: ENR value for given any graph G
Begin
ENR←-∞;
for all edge subsets [ ⊆ do
if findENR( , [)> ENRthen
ENR=findENR( , [);
end
end
end.
The function below,find ENR, returns the ENR value for the edge subset for the graph.
function findENR( , [);
Input: Graph , , edgesubset [
Output:ENR value for given an [edge subset of .
Begin
 : vertex set incident with [ edges.
for all $ ∈ do
removeu from 6. .		 − 
end
Applied Mathematics and Sciences: An International Journal (MathSJ ), Vol. 5, No. 1/2/3, September 2018
9
Componentnumber ← find the number of components of − 
MaxCompVertexnum ← find the vertex number of maximum component of − 
findENR←{Component number – number of ( [) – MaxCompVertexnum }
end
4. CONCLUSION
In this study, we investigate the edge-neighbor rupture degree of graphs obtained by graph
operations. The graph operations are used to obtain new graphs. Union, join and mostly thorny
operations are taken into consideration in this work. These operations are performed to various
graphs and their edge-neighbor rupture degrees were determined.
REFERENCES
[1] S. Kandilci, G. Bacak-Turan&R. Polat, (2013), “Graph Operations and Neighbor Rupture Degree”,
Journal of Applied Mathematics, Hindawi Publishing Corporation, Article ID 836395,
http://dx.doi.org/10.1155/2013/836395.
[2] E.Aslan, (2013), “Edge-Neighbor-Rupture Degree of Graphs”, Journal of Applied
Mathematics,Hindawi Publishing Corporation.Article ID 783610.
[3] C.A. Barefoot, R. Entringer&H. Swart, (1987), “Vulnerability in graphs -Acomparative survey”,
Journal of Combinatorial Mathematics and Combinatorial Computing, vol1,pp 13-22.
[4] F. Buckley & F. Harary, (1990), Distance in Graphs, Addision-Wesley Press.
[5] G. Chartrand & L. Lesniak, (2005), Graphs & Digraphs, Chapman & Hall/CRC Press.
[6] I. Gutman, (1998), “Distance of Thorny Graphs”, Publ. Institut Math. Nouvelle serie, vol63,pp 31-36.
[7] J. A. Bondy & U. S. R.Murty, (1976), GraphTheory with Applications, The Macmillan Press.
[8] H. A. Jung, (1978), “On a class of posets and the corresponding comparability graphs”,Journal of
Combinatorial Theory B, vol 24,pp 125–133.
[9] Y. Li, S. Zhang & X. Li, (2005), Rupture degree of graphs, International Journal of Computer
Mathematics, vol 82,pp 793–803.
[10] M. B. Cozzens & S. S.Y. Wu, (1998), “Vertex-neighbor-integrity ofpowers of cycles”,Ars
Combinatoria, vol 48, pp257–270.
[11] M. Saheli, H. Saati&A. R. Ashrafi,(2010), “The eccentric connectivity index of one pentagonal
carbon nanocones”, Optoelectronics and Advanced Materials–Rapid Communications, vol4,pp 896–
897.
[12] M. Ghorbani,(2010), “GA Index of TUC4C8(R) Nanotube”, Optoelectronics and Advanced Materials
– Rapid Communications,vol 4, pp261–263.
[13] G. Bacak Turan & A. Kırlangıc, (2010), “Vulnerability Parameters in Graphs” 1st International
Symposium onComputing in Science and Engineering, Turkey.
[14] M.Ü. Gürsoy,R. Polat, S. Eskiizmirliler&Z.Ö. Yorgancıoğlu (2014), “Edge-Neighbor-Rupture-Degree
on graph operations”,9th AnkaraMath days, Atılım University, Ankara, Turkey.
Applied Mathematics and Sciences: An International Journal (MathSJ ), Vol. 5, No. 1/2/3, September 2018
10
AUTHORS
Saadet Eskiizmirliler She was graduated fromYaşar University Mathematics
department in 2010, she had got master degree in 2012 fromYaşar University Math
department and she has been doing doktorate at Yaşar University Math department
at applied mathematics since 2014. She has been working at Yasar University since
2014.
Zeynep Örs Yorgancioğlu She was graduated from Ege University Mathematics
department in 2003, she had got master degree in 2010 from Ege University Math
department and she had got Ph. D degree in 2015 from Ege University Math
department at applied Mathematics. She has been working at Yasar University
since 2007.
Refet Polat Achieved his BSc degree in mathematics majoring in computer science
at Ege University in 2000. He received his MSc and PhD degrees in applied
mathematics at Ege University in 2003 and 2009. His research interests focus on
applied mathematics, graph theory, ordinary differential equations, numerical
methods, and artificial intelligence in education
Mehmet Ümit Gürsoy He was graduated from Ege University Mathematics
department in 2000, he had got master degree in 2005 from Ege University Math
department and he had got Ph.D degree in 2014 from Ege University Math
department at applied mathematics.

More Related Content

What's hot

Btech_II_ engineering mathematics_unit5
Btech_II_ engineering mathematics_unit5Btech_II_ engineering mathematics_unit5
Btech_II_ engineering mathematics_unit5Rai University
 
31350052 introductory-mathematical-analysis-textbook-solution-manual
31350052 introductory-mathematical-analysis-textbook-solution-manual31350052 introductory-mathematical-analysis-textbook-solution-manual
31350052 introductory-mathematical-analysis-textbook-solution-manualMahrukh Khalid
 
Numerical solution of system of linear equations
Numerical solution of system of linear equationsNumerical solution of system of linear equations
Numerical solution of system of linear equationsreach2arkaELECTRICAL
 
On the 1-2-3-edge weighting and Vertex coloring of complete graph
On the 1-2-3-edge weighting and Vertex coloring of complete graphOn the 1-2-3-edge weighting and Vertex coloring of complete graph
On the 1-2-3-edge weighting and Vertex coloring of complete graphijcsa
 
BSC_COMPUTER _SCIENCE_UNIT-2_DISCRETE MATHEMATICS
BSC_COMPUTER _SCIENCE_UNIT-2_DISCRETE MATHEMATICSBSC_COMPUTER _SCIENCE_UNIT-2_DISCRETE MATHEMATICS
BSC_COMPUTER _SCIENCE_UNIT-2_DISCRETE MATHEMATICSRai University
 
Diploma_Semester-II_Advanced Mathematics_Definite Integration
Diploma_Semester-II_Advanced Mathematics_Definite IntegrationDiploma_Semester-II_Advanced Mathematics_Definite Integration
Diploma_Semester-II_Advanced Mathematics_Definite IntegrationRai University
 
Introductory Mathematical Analysis for Business Economics International 13th ...
Introductory Mathematical Analysis for Business Economics International 13th ...Introductory Mathematical Analysis for Business Economics International 13th ...
Introductory Mathematical Analysis for Business Economics International 13th ...Leblancer
 
INVERSION OF MATRIX BY GAUSS ELIMINATION METHOD
INVERSION OF MATRIX BY GAUSS ELIMINATION METHODINVERSION OF MATRIX BY GAUSS ELIMINATION METHOD
INVERSION OF MATRIX BY GAUSS ELIMINATION METHODreach2arkaELECTRICAL
 
BSC_Computer Science_Discrete Mathematics_Unit-I
BSC_Computer Science_Discrete Mathematics_Unit-IBSC_Computer Science_Discrete Mathematics_Unit-I
BSC_Computer Science_Discrete Mathematics_Unit-IRai University
 
Btech_II_ engineering mathematics_unit4
Btech_II_ engineering mathematics_unit4Btech_II_ engineering mathematics_unit4
Btech_II_ engineering mathematics_unit4Rai University
 
Trial kedah 2014 spm add math k1 skema
Trial kedah 2014 spm add math k1 skemaTrial kedah 2014 spm add math k1 skema
Trial kedah 2014 spm add math k1 skemaCikgu Pejal
 
B.tech ii unit-5 material vector integration
B.tech ii unit-5 material vector integrationB.tech ii unit-5 material vector integration
B.tech ii unit-5 material vector integrationRai University
 
Trial penang 2014 spm matematik tambahan k1 k2 skema [scan]
Trial penang 2014 spm matematik tambahan k1 k2 skema [scan]Trial penang 2014 spm matematik tambahan k1 k2 skema [scan]
Trial penang 2014 spm matematik tambahan k1 k2 skema [scan]Cikgu Pejal
 
Numerical solutions for linear system of equations
Numerical solutions for linear system of equationsNumerical solutions for linear system of equations
Numerical solutions for linear system of equationsMohamed Mohamed El-Sayed
 
FURTHER RESULTS ON ODD HARMONIOUS GRAPHS
FURTHER RESULTS ON ODD HARMONIOUS GRAPHSFURTHER RESULTS ON ODD HARMONIOUS GRAPHS
FURTHER RESULTS ON ODD HARMONIOUS GRAPHSgraphhoc
 
system of algebraic equation by Iteration method
system of algebraic equation by Iteration methodsystem of algebraic equation by Iteration method
system of algebraic equation by Iteration methodAkhtar Kamal
 

What's hot (17)

Btech_II_ engineering mathematics_unit5
Btech_II_ engineering mathematics_unit5Btech_II_ engineering mathematics_unit5
Btech_II_ engineering mathematics_unit5
 
31350052 introductory-mathematical-analysis-textbook-solution-manual
31350052 introductory-mathematical-analysis-textbook-solution-manual31350052 introductory-mathematical-analysis-textbook-solution-manual
31350052 introductory-mathematical-analysis-textbook-solution-manual
 
Numerical solution of system of linear equations
Numerical solution of system of linear equationsNumerical solution of system of linear equations
Numerical solution of system of linear equations
 
On the 1-2-3-edge weighting and Vertex coloring of complete graph
On the 1-2-3-edge weighting and Vertex coloring of complete graphOn the 1-2-3-edge weighting and Vertex coloring of complete graph
On the 1-2-3-edge weighting and Vertex coloring of complete graph
 
BSC_COMPUTER _SCIENCE_UNIT-2_DISCRETE MATHEMATICS
BSC_COMPUTER _SCIENCE_UNIT-2_DISCRETE MATHEMATICSBSC_COMPUTER _SCIENCE_UNIT-2_DISCRETE MATHEMATICS
BSC_COMPUTER _SCIENCE_UNIT-2_DISCRETE MATHEMATICS
 
Diploma_Semester-II_Advanced Mathematics_Definite Integration
Diploma_Semester-II_Advanced Mathematics_Definite IntegrationDiploma_Semester-II_Advanced Mathematics_Definite Integration
Diploma_Semester-II_Advanced Mathematics_Definite Integration
 
Introductory Mathematical Analysis for Business Economics International 13th ...
Introductory Mathematical Analysis for Business Economics International 13th ...Introductory Mathematical Analysis for Business Economics International 13th ...
Introductory Mathematical Analysis for Business Economics International 13th ...
 
INVERSION OF MATRIX BY GAUSS ELIMINATION METHOD
INVERSION OF MATRIX BY GAUSS ELIMINATION METHODINVERSION OF MATRIX BY GAUSS ELIMINATION METHOD
INVERSION OF MATRIX BY GAUSS ELIMINATION METHOD
 
BSC_Computer Science_Discrete Mathematics_Unit-I
BSC_Computer Science_Discrete Mathematics_Unit-IBSC_Computer Science_Discrete Mathematics_Unit-I
BSC_Computer Science_Discrete Mathematics_Unit-I
 
Btech_II_ engineering mathematics_unit4
Btech_II_ engineering mathematics_unit4Btech_II_ engineering mathematics_unit4
Btech_II_ engineering mathematics_unit4
 
Trial kedah 2014 spm add math k1 skema
Trial kedah 2014 spm add math k1 skemaTrial kedah 2014 spm add math k1 skema
Trial kedah 2014 spm add math k1 skema
 
Tugas 2 turunan
Tugas 2 turunanTugas 2 turunan
Tugas 2 turunan
 
B.tech ii unit-5 material vector integration
B.tech ii unit-5 material vector integrationB.tech ii unit-5 material vector integration
B.tech ii unit-5 material vector integration
 
Trial penang 2014 spm matematik tambahan k1 k2 skema [scan]
Trial penang 2014 spm matematik tambahan k1 k2 skema [scan]Trial penang 2014 spm matematik tambahan k1 k2 skema [scan]
Trial penang 2014 spm matematik tambahan k1 k2 skema [scan]
 
Numerical solutions for linear system of equations
Numerical solutions for linear system of equationsNumerical solutions for linear system of equations
Numerical solutions for linear system of equations
 
FURTHER RESULTS ON ODD HARMONIOUS GRAPHS
FURTHER RESULTS ON ODD HARMONIOUS GRAPHSFURTHER RESULTS ON ODD HARMONIOUS GRAPHS
FURTHER RESULTS ON ODD HARMONIOUS GRAPHS
 
system of algebraic equation by Iteration method
system of algebraic equation by Iteration methodsystem of algebraic equation by Iteration method
system of algebraic equation by Iteration method
 

Similar to EDGE-NEIGHBOR RUPTURE DEGREE ON GRAPH OPERATIONS

Solucao_Marion_Thornton_Dinamica_Classic (1).pdf
Solucao_Marion_Thornton_Dinamica_Classic (1).pdfSolucao_Marion_Thornton_Dinamica_Classic (1).pdf
Solucao_Marion_Thornton_Dinamica_Classic (1).pdfFranciscoJavierCaedo
 
Strong convergence of an algorithm about strongly quasi nonexpansive mappings
Strong convergence of an algorithm about strongly quasi nonexpansive mappingsStrong convergence of an algorithm about strongly quasi nonexpansive mappings
Strong convergence of an algorithm about strongly quasi nonexpansive mappingsAlexander Decker
 
1 illustrating limit of a function
1 illustrating limit of a function1 illustrating limit of a function
1 illustrating limit of a functionJRCatador
 
Fractional integration and fractional differentiation of the product of m ser...
Fractional integration and fractional differentiation of the product of m ser...Fractional integration and fractional differentiation of the product of m ser...
Fractional integration and fractional differentiation of the product of m ser...Alexander Decker
 
GRAPH - DISCRETE STRUCTURE AND ALGORITHM
GRAPH - DISCRETE STRUCTURE AND ALGORITHMGRAPH - DISCRETE STRUCTURE AND ALGORITHM
GRAPH - DISCRETE STRUCTURE AND ALGORITHMhimanshumishra19dec
 
Module 5 (Part 3-Revised)-Functions and Relations.pdf
Module 5 (Part 3-Revised)-Functions and Relations.pdfModule 5 (Part 3-Revised)-Functions and Relations.pdf
Module 5 (Part 3-Revised)-Functions and Relations.pdfGaleJean
 
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHS
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHSDISTANCE TWO LABELING FOR MULTI-STOREY GRAPHS
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHSgraphhoc
 
Odd Harmonious Labelings of Cyclic Snakes
Odd Harmonious Labelings of Cyclic SnakesOdd Harmonious Labelings of Cyclic Snakes
Odd Harmonious Labelings of Cyclic SnakesGiselleginaGloria
 
Section 6.4 Logarithmic Equations and Inequalities, from Coll.docx
Section 6.4 Logarithmic Equations and Inequalities, from Coll.docxSection 6.4 Logarithmic Equations and Inequalities, from Coll.docx
Section 6.4 Logarithmic Equations and Inequalities, from Coll.docxbagotjesusa
 
Unit-1 Basic Concept of Algorithm.pptx
Unit-1 Basic Concept of Algorithm.pptxUnit-1 Basic Concept of Algorithm.pptx
Unit-1 Basic Concept of Algorithm.pptxssuser01e301
 
Application of Integration
Application of IntegrationApplication of Integration
Application of IntegrationRaymundo Raymund
 
An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles
An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles  An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles
An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles graphhoc
 
B.tech ii unit-4 material vector differentiation
B.tech ii unit-4 material vector differentiationB.tech ii unit-4 material vector differentiation
B.tech ii unit-4 material vector differentiationRai University
 
Graph Analytics and Complexity Questions and answers
Graph Analytics and Complexity Questions and answersGraph Analytics and Complexity Questions and answers
Graph Analytics and Complexity Questions and answersAnimesh Chaturvedi
 
Complex differentiation contains analytic function.pptx
Complex differentiation contains analytic function.pptxComplex differentiation contains analytic function.pptx
Complex differentiation contains analytic function.pptxjyotidighole2
 

Similar to EDGE-NEIGHBOR RUPTURE DEGREE ON GRAPH OPERATIONS (20)

Solucao_Marion_Thornton_Dinamica_Classic (1).pdf
Solucao_Marion_Thornton_Dinamica_Classic (1).pdfSolucao_Marion_Thornton_Dinamica_Classic (1).pdf
Solucao_Marion_Thornton_Dinamica_Classic (1).pdf
 
Strong convergence of an algorithm about strongly quasi nonexpansive mappings
Strong convergence of an algorithm about strongly quasi nonexpansive mappingsStrong convergence of an algorithm about strongly quasi nonexpansive mappings
Strong convergence of an algorithm about strongly quasi nonexpansive mappings
 
MATRICES-MATHED204.pptx
MATRICES-MATHED204.pptxMATRICES-MATHED204.pptx
MATRICES-MATHED204.pptx
 
1 illustrating limit of a function
1 illustrating limit of a function1 illustrating limit of a function
1 illustrating limit of a function
 
Fractional integration and fractional differentiation of the product of m ser...
Fractional integration and fractional differentiation of the product of m ser...Fractional integration and fractional differentiation of the product of m ser...
Fractional integration and fractional differentiation of the product of m ser...
 
GRAPH - DISCRETE STRUCTURE AND ALGORITHM
GRAPH - DISCRETE STRUCTURE AND ALGORITHMGRAPH - DISCRETE STRUCTURE AND ALGORITHM
GRAPH - DISCRETE STRUCTURE AND ALGORITHM
 
On Cubic Graceful Labeling
On Cubic Graceful LabelingOn Cubic Graceful Labeling
On Cubic Graceful Labeling
 
Module 5 (Part 3-Revised)-Functions and Relations.pdf
Module 5 (Part 3-Revised)-Functions and Relations.pdfModule 5 (Part 3-Revised)-Functions and Relations.pdf
Module 5 (Part 3-Revised)-Functions and Relations.pdf
 
Mathematics
MathematicsMathematics
Mathematics
 
Mathematics
MathematicsMathematics
Mathematics
 
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHS
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHSDISTANCE TWO LABELING FOR MULTI-STOREY GRAPHS
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHS
 
Odd Harmonious Labelings of Cyclic Snakes
Odd Harmonious Labelings of Cyclic SnakesOdd Harmonious Labelings of Cyclic Snakes
Odd Harmonious Labelings of Cyclic Snakes
 
Section 6.4 Logarithmic Equations and Inequalities, from Coll.docx
Section 6.4 Logarithmic Equations and Inequalities, from Coll.docxSection 6.4 Logarithmic Equations and Inequalities, from Coll.docx
Section 6.4 Logarithmic Equations and Inequalities, from Coll.docx
 
Matrix
MatrixMatrix
Matrix
 
Unit-1 Basic Concept of Algorithm.pptx
Unit-1 Basic Concept of Algorithm.pptxUnit-1 Basic Concept of Algorithm.pptx
Unit-1 Basic Concept of Algorithm.pptx
 
Application of Integration
Application of IntegrationApplication of Integration
Application of Integration
 
An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles
An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles  An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles
An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles
 
B.tech ii unit-4 material vector differentiation
B.tech ii unit-4 material vector differentiationB.tech ii unit-4 material vector differentiation
B.tech ii unit-4 material vector differentiation
 
Graph Analytics and Complexity Questions and answers
Graph Analytics and Complexity Questions and answersGraph Analytics and Complexity Questions and answers
Graph Analytics and Complexity Questions and answers
 
Complex differentiation contains analytic function.pptx
Complex differentiation contains analytic function.pptxComplex differentiation contains analytic function.pptx
Complex differentiation contains analytic function.pptx
 

More from mathsjournal

OPTIMIZING SIMILARITY THRESHOLD FOR ABSTRACT SIMILARITY METRIC IN SPEECH DIAR...
OPTIMIZING SIMILARITY THRESHOLD FOR ABSTRACT SIMILARITY METRIC IN SPEECH DIAR...OPTIMIZING SIMILARITY THRESHOLD FOR ABSTRACT SIMILARITY METRIC IN SPEECH DIAR...
OPTIMIZING SIMILARITY THRESHOLD FOR ABSTRACT SIMILARITY METRIC IN SPEECH DIAR...mathsjournal
 
A POSSIBLE RESOLUTION TO HILBERT’S FIRST PROBLEM BY APPLYING CANTOR’S DIAGONA...
A POSSIBLE RESOLUTION TO HILBERT’S FIRST PROBLEM BY APPLYING CANTOR’S DIAGONA...A POSSIBLE RESOLUTION TO HILBERT’S FIRST PROBLEM BY APPLYING CANTOR’S DIAGONA...
A POSSIBLE RESOLUTION TO HILBERT’S FIRST PROBLEM BY APPLYING CANTOR’S DIAGONA...mathsjournal
 
A Positive Integer 𝑵 Such That 𝒑𝒏 + 𝒑𝒏+𝟑 ~ 𝒑𝒏+𝟏 + 𝒑𝒏+𝟐 For All 𝒏 ≥ 𝑵
A Positive Integer 𝑵 Such That 𝒑𝒏 + 𝒑𝒏+𝟑 ~ 𝒑𝒏+𝟏 + 𝒑𝒏+𝟐 For All 𝒏 ≥ 𝑵A Positive Integer 𝑵 Such That 𝒑𝒏 + 𝒑𝒏+𝟑 ~ 𝒑𝒏+𝟏 + 𝒑𝒏+𝟐 For All 𝒏 ≥ 𝑵
A Positive Integer 𝑵 Such That 𝒑𝒏 + 𝒑𝒏+𝟑 ~ 𝒑𝒏+𝟏 + 𝒑𝒏+𝟐 For All 𝒏 ≥ 𝑵mathsjournal
 
A POSSIBLE RESOLUTION TO HILBERT’S FIRST PROBLEM BY APPLYING CANTOR’S DIAGONA...
A POSSIBLE RESOLUTION TO HILBERT’S FIRST PROBLEM BY APPLYING CANTOR’S DIAGONA...A POSSIBLE RESOLUTION TO HILBERT’S FIRST PROBLEM BY APPLYING CANTOR’S DIAGONA...
A POSSIBLE RESOLUTION TO HILBERT’S FIRST PROBLEM BY APPLYING CANTOR’S DIAGONA...mathsjournal
 
Moving Target Detection Using CA, SO and GO-CFAR detectors in Nonhomogeneous ...
Moving Target Detection Using CA, SO and GO-CFAR detectors in Nonhomogeneous ...Moving Target Detection Using CA, SO and GO-CFAR detectors in Nonhomogeneous ...
Moving Target Detection Using CA, SO and GO-CFAR detectors in Nonhomogeneous ...mathsjournal
 
OPTIMIZING SIMILARITY THRESHOLD FOR ABSTRACT SIMILARITY METRIC IN SPEECH DIAR...
OPTIMIZING SIMILARITY THRESHOLD FOR ABSTRACT SIMILARITY METRIC IN SPEECH DIAR...OPTIMIZING SIMILARITY THRESHOLD FOR ABSTRACT SIMILARITY METRIC IN SPEECH DIAR...
OPTIMIZING SIMILARITY THRESHOLD FOR ABSTRACT SIMILARITY METRIC IN SPEECH DIAR...mathsjournal
 
The Impact of Allee Effect on a Predator-Prey Model with Holling Type II Func...
The Impact of Allee Effect on a Predator-Prey Model with Holling Type II Func...The Impact of Allee Effect on a Predator-Prey Model with Holling Type II Func...
The Impact of Allee Effect on a Predator-Prey Model with Holling Type II Func...mathsjournal
 
A POSSIBLE RESOLUTION TO HILBERT’S FIRST PROBLEM BY APPLYING CANTOR’S DIAGONA...
A POSSIBLE RESOLUTION TO HILBERT’S FIRST PROBLEM BY APPLYING CANTOR’S DIAGONA...A POSSIBLE RESOLUTION TO HILBERT’S FIRST PROBLEM BY APPLYING CANTOR’S DIAGONA...
A POSSIBLE RESOLUTION TO HILBERT’S FIRST PROBLEM BY APPLYING CANTOR’S DIAGONA...mathsjournal
 
Moving Target Detection Using CA, SO and GO-CFAR detectors in Nonhomogeneous ...
Moving Target Detection Using CA, SO and GO-CFAR detectors in Nonhomogeneous ...Moving Target Detection Using CA, SO and GO-CFAR detectors in Nonhomogeneous ...
Moving Target Detection Using CA, SO and GO-CFAR detectors in Nonhomogeneous ...mathsjournal
 
OPTIMIZING SIMILARITY THRESHOLD FOR ABSTRACT SIMILARITY METRIC IN SPEECH DIAR...
OPTIMIZING SIMILARITY THRESHOLD FOR ABSTRACT SIMILARITY METRIC IN SPEECH DIAR...OPTIMIZING SIMILARITY THRESHOLD FOR ABSTRACT SIMILARITY METRIC IN SPEECH DIAR...
OPTIMIZING SIMILARITY THRESHOLD FOR ABSTRACT SIMILARITY METRIC IN SPEECH DIAR...mathsjournal
 
Modified Alpha-Rooting Color Image Enhancement Method on the Two Side 2-D Qua...
Modified Alpha-Rooting Color Image Enhancement Method on the Two Side 2-D Qua...Modified Alpha-Rooting Color Image Enhancement Method on the Two Side 2-D Qua...
Modified Alpha-Rooting Color Image Enhancement Method on the Two Side 2-D Qua...mathsjournal
 
A Study on L-Fuzzy Normal Subl-GROUP
A Study on L-Fuzzy Normal Subl-GROUPA Study on L-Fuzzy Normal Subl-GROUP
A Study on L-Fuzzy Normal Subl-GROUPmathsjournal
 
An Application of Assignment Problem in Laptop Selection Problem Using MATLAB
An Application of Assignment Problem in Laptop Selection Problem Using MATLABAn Application of Assignment Problem in Laptop Selection Problem Using MATLAB
An Application of Assignment Problem in Laptop Selection Problem Using MATLABmathsjournal
 
ON β-Normal Spaces
ON β-Normal SpacesON β-Normal Spaces
ON β-Normal Spacesmathsjournal
 
Cubic Response Surface Designs Using Bibd in Four Dimensions
Cubic Response Surface Designs Using Bibd in Four DimensionsCubic Response Surface Designs Using Bibd in Four Dimensions
Cubic Response Surface Designs Using Bibd in Four Dimensionsmathsjournal
 
Quantum Variation about Geodesics
Quantum Variation about GeodesicsQuantum Variation about Geodesics
Quantum Variation about Geodesicsmathsjournal
 
Approximate Analytical Solution of Non-Linear Boussinesq Equation for the Uns...
Approximate Analytical Solution of Non-Linear Boussinesq Equation for the Uns...Approximate Analytical Solution of Non-Linear Boussinesq Equation for the Uns...
Approximate Analytical Solution of Non-Linear Boussinesq Equation for the Uns...mathsjournal
 
Common Fixed Point Theorems in Compatible Mappings of Type (P*) of Generalize...
Common Fixed Point Theorems in Compatible Mappings of Type (P*) of Generalize...Common Fixed Point Theorems in Compatible Mappings of Type (P*) of Generalize...
Common Fixed Point Theorems in Compatible Mappings of Type (P*) of Generalize...mathsjournal
 
A Probabilistic Algorithm for Computation of Polynomial Greatest Common with ...
A Probabilistic Algorithm for Computation of Polynomial Greatest Common with ...A Probabilistic Algorithm for Computation of Polynomial Greatest Common with ...
A Probabilistic Algorithm for Computation of Polynomial Greatest Common with ...mathsjournal
 
Table of Contents - September 2022, Volume 9, Number 2/3
Table of Contents - September 2022, Volume 9, Number 2/3Table of Contents - September 2022, Volume 9, Number 2/3
Table of Contents - September 2022, Volume 9, Number 2/3mathsjournal
 

More from mathsjournal (20)

OPTIMIZING SIMILARITY THRESHOLD FOR ABSTRACT SIMILARITY METRIC IN SPEECH DIAR...
OPTIMIZING SIMILARITY THRESHOLD FOR ABSTRACT SIMILARITY METRIC IN SPEECH DIAR...OPTIMIZING SIMILARITY THRESHOLD FOR ABSTRACT SIMILARITY METRIC IN SPEECH DIAR...
OPTIMIZING SIMILARITY THRESHOLD FOR ABSTRACT SIMILARITY METRIC IN SPEECH DIAR...
 
A POSSIBLE RESOLUTION TO HILBERT’S FIRST PROBLEM BY APPLYING CANTOR’S DIAGONA...
A POSSIBLE RESOLUTION TO HILBERT’S FIRST PROBLEM BY APPLYING CANTOR’S DIAGONA...A POSSIBLE RESOLUTION TO HILBERT’S FIRST PROBLEM BY APPLYING CANTOR’S DIAGONA...
A POSSIBLE RESOLUTION TO HILBERT’S FIRST PROBLEM BY APPLYING CANTOR’S DIAGONA...
 
A Positive Integer 𝑵 Such That 𝒑𝒏 + 𝒑𝒏+𝟑 ~ 𝒑𝒏+𝟏 + 𝒑𝒏+𝟐 For All 𝒏 ≥ 𝑵
A Positive Integer 𝑵 Such That 𝒑𝒏 + 𝒑𝒏+𝟑 ~ 𝒑𝒏+𝟏 + 𝒑𝒏+𝟐 For All 𝒏 ≥ 𝑵A Positive Integer 𝑵 Such That 𝒑𝒏 + 𝒑𝒏+𝟑 ~ 𝒑𝒏+𝟏 + 𝒑𝒏+𝟐 For All 𝒏 ≥ 𝑵
A Positive Integer 𝑵 Such That 𝒑𝒏 + 𝒑𝒏+𝟑 ~ 𝒑𝒏+𝟏 + 𝒑𝒏+𝟐 For All 𝒏 ≥ 𝑵
 
A POSSIBLE RESOLUTION TO HILBERT’S FIRST PROBLEM BY APPLYING CANTOR’S DIAGONA...
A POSSIBLE RESOLUTION TO HILBERT’S FIRST PROBLEM BY APPLYING CANTOR’S DIAGONA...A POSSIBLE RESOLUTION TO HILBERT’S FIRST PROBLEM BY APPLYING CANTOR’S DIAGONA...
A POSSIBLE RESOLUTION TO HILBERT’S FIRST PROBLEM BY APPLYING CANTOR’S DIAGONA...
 
Moving Target Detection Using CA, SO and GO-CFAR detectors in Nonhomogeneous ...
Moving Target Detection Using CA, SO and GO-CFAR detectors in Nonhomogeneous ...Moving Target Detection Using CA, SO and GO-CFAR detectors in Nonhomogeneous ...
Moving Target Detection Using CA, SO and GO-CFAR detectors in Nonhomogeneous ...
 
OPTIMIZING SIMILARITY THRESHOLD FOR ABSTRACT SIMILARITY METRIC IN SPEECH DIAR...
OPTIMIZING SIMILARITY THRESHOLD FOR ABSTRACT SIMILARITY METRIC IN SPEECH DIAR...OPTIMIZING SIMILARITY THRESHOLD FOR ABSTRACT SIMILARITY METRIC IN SPEECH DIAR...
OPTIMIZING SIMILARITY THRESHOLD FOR ABSTRACT SIMILARITY METRIC IN SPEECH DIAR...
 
The Impact of Allee Effect on a Predator-Prey Model with Holling Type II Func...
The Impact of Allee Effect on a Predator-Prey Model with Holling Type II Func...The Impact of Allee Effect on a Predator-Prey Model with Holling Type II Func...
The Impact of Allee Effect on a Predator-Prey Model with Holling Type II Func...
 
A POSSIBLE RESOLUTION TO HILBERT’S FIRST PROBLEM BY APPLYING CANTOR’S DIAGONA...
A POSSIBLE RESOLUTION TO HILBERT’S FIRST PROBLEM BY APPLYING CANTOR’S DIAGONA...A POSSIBLE RESOLUTION TO HILBERT’S FIRST PROBLEM BY APPLYING CANTOR’S DIAGONA...
A POSSIBLE RESOLUTION TO HILBERT’S FIRST PROBLEM BY APPLYING CANTOR’S DIAGONA...
 
Moving Target Detection Using CA, SO and GO-CFAR detectors in Nonhomogeneous ...
Moving Target Detection Using CA, SO and GO-CFAR detectors in Nonhomogeneous ...Moving Target Detection Using CA, SO and GO-CFAR detectors in Nonhomogeneous ...
Moving Target Detection Using CA, SO and GO-CFAR detectors in Nonhomogeneous ...
 
OPTIMIZING SIMILARITY THRESHOLD FOR ABSTRACT SIMILARITY METRIC IN SPEECH DIAR...
OPTIMIZING SIMILARITY THRESHOLD FOR ABSTRACT SIMILARITY METRIC IN SPEECH DIAR...OPTIMIZING SIMILARITY THRESHOLD FOR ABSTRACT SIMILARITY METRIC IN SPEECH DIAR...
OPTIMIZING SIMILARITY THRESHOLD FOR ABSTRACT SIMILARITY METRIC IN SPEECH DIAR...
 
Modified Alpha-Rooting Color Image Enhancement Method on the Two Side 2-D Qua...
Modified Alpha-Rooting Color Image Enhancement Method on the Two Side 2-D Qua...Modified Alpha-Rooting Color Image Enhancement Method on the Two Side 2-D Qua...
Modified Alpha-Rooting Color Image Enhancement Method on the Two Side 2-D Qua...
 
A Study on L-Fuzzy Normal Subl-GROUP
A Study on L-Fuzzy Normal Subl-GROUPA Study on L-Fuzzy Normal Subl-GROUP
A Study on L-Fuzzy Normal Subl-GROUP
 
An Application of Assignment Problem in Laptop Selection Problem Using MATLAB
An Application of Assignment Problem in Laptop Selection Problem Using MATLABAn Application of Assignment Problem in Laptop Selection Problem Using MATLAB
An Application of Assignment Problem in Laptop Selection Problem Using MATLAB
 
ON β-Normal Spaces
ON β-Normal SpacesON β-Normal Spaces
ON β-Normal Spaces
 
Cubic Response Surface Designs Using Bibd in Four Dimensions
Cubic Response Surface Designs Using Bibd in Four DimensionsCubic Response Surface Designs Using Bibd in Four Dimensions
Cubic Response Surface Designs Using Bibd in Four Dimensions
 
Quantum Variation about Geodesics
Quantum Variation about GeodesicsQuantum Variation about Geodesics
Quantum Variation about Geodesics
 
Approximate Analytical Solution of Non-Linear Boussinesq Equation for the Uns...
Approximate Analytical Solution of Non-Linear Boussinesq Equation for the Uns...Approximate Analytical Solution of Non-Linear Boussinesq Equation for the Uns...
Approximate Analytical Solution of Non-Linear Boussinesq Equation for the Uns...
 
Common Fixed Point Theorems in Compatible Mappings of Type (P*) of Generalize...
Common Fixed Point Theorems in Compatible Mappings of Type (P*) of Generalize...Common Fixed Point Theorems in Compatible Mappings of Type (P*) of Generalize...
Common Fixed Point Theorems in Compatible Mappings of Type (P*) of Generalize...
 
A Probabilistic Algorithm for Computation of Polynomial Greatest Common with ...
A Probabilistic Algorithm for Computation of Polynomial Greatest Common with ...A Probabilistic Algorithm for Computation of Polynomial Greatest Common with ...
A Probabilistic Algorithm for Computation of Polynomial Greatest Common with ...
 
Table of Contents - September 2022, Volume 9, Number 2/3
Table of Contents - September 2022, Volume 9, Number 2/3Table of Contents - September 2022, Volume 9, Number 2/3
Table of Contents - September 2022, Volume 9, Number 2/3
 

Recently uploaded

Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonJericReyAuditor
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 

Recently uploaded (20)

Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lesson
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 

EDGE-NEIGHBOR RUPTURE DEGREE ON GRAPH OPERATIONS

  • 1. Applied Mathematics and Sciences: An International Journal (MathSJ ), Vol. 5, No. 1/2/3, September 2018 DOI : 10.5121/mathsj.2018.5301 1 EDGE-NEIGHBOR RUPTURE DEGREE ON GRAPH OPERATIONS Saadet Eskiizmirliler 1 , Zeynep Örs Yorgan cioğlu2 , Refet Polat3 And Mehmet Ümit Gürsoy4 1,3 Department of Mathematics, Faculty of Science, Yasar University, Izmir, Turkey, 2 Maritime and Port Management Program, Vocational School, Yasar University, Izmir, Turkey, 4 Izmir, Turkey, ABSTRACT Vulnerability and reliability parameters measure the resistance of the network to disruption of operation after the failure of certain stations or communication links in a communication network. An edge subversion strategy of a graph , say , is a set of edge(s) in whose adjacent vertices which is incident with the removal edge(s) are removed from . The survival subgraph is denoted by − . The edge- neighbor-rupture degree of connected graph , , is defined to be = − − | | − − : ⊆ , − ≥ 1 where is any edge-cut-strategy of , − is the number of the components of − , and − is the maximum order of the components of − . In this paper we give some results for the edge-neighbor-rupture degree of the graph operations and Thorny graph types are examined. KEYWORDS Edge-neighbor-rupture degree, Thorny graphs, Vulnerability, Reliability. 1. INTRODUCTION A communication network can be brokedown to pieces partially or completely from unexpected factors. This situation can prevent data transmit so there would be a big problem on the system to perform it’s task. Therefore, the vulnerability and the reliability measure the resistance of the network disturbance of operations after the failure of certain stations. To measure the vulnerability and the reliability we have some parameters which are connectivity [7,11,12], integrity [3], scattering number [8], rupture degree [9], neighbor-rupture degree [1] and edge- neighbor-rupture degree [2]. Terminology and notations are not defined in this paper but it can be found [4,5]. Let = , be a simple graph and let e be any edge of . The set, = ∈ | ≠ ; ! " is the open neighborhood of e, and [e] = {e} ∪ (e) is the closed neighborhood of e. An edge e in is said to be subverted if the closed neighborhood of e is removed from . In other words, if = $, % than − &e( = − $, % . A set of edges = ), *, … , , is called an edge subversion strategy of if each of the edges in has been subverted from . If has been subverted from the graph , then the remaining graph is called survival graph, denoted by − . An edge subversion strategy is called an edge-cut- strategy of if the survival subgraph − is disconnected or is a single vertex or the empty graph
  • 2. Applied Mathematics and Sciences: An International Journal (MathSJ ), Vol. 5, No. 1/2/3, September 2018 2 [10]. is any edge-cut-strategy of , ( − ) is the number of the components of − , and ( − ) is the maximum order of the components of − . The definition of edge-neighbor-rupture degree of a connected graph is = − − | | − − : ⊆ , − ≥ 1 . Definition 1.1: ∈ - and ∀% ∈ V for each vertex of , if deg % = than is called r- regular graph [4]. Definition 1.2: ) and * graphs have disjoint vertex sets ) and * and edge sets ) and * respectively. The join operation of two ) and * graphs is denoted by ) + * and consist of ) ∪ *which is union of two ) and * graphs and all edges joining ) and *[4]. Definition 1.3:Let 3), 3*, … , 34be non-negative integers. The Thorny Graph of the graph , with parameters3), 3*, … , 34,is obtained by attaching 35 new vertices of degree one to the vertex$5 of the graph , 6 = 1,2, … , . The Thorny graph of the graph is denoted by ⋆ , or if the respectiveparameters need to be specified, by ⋆ 3), 3*, … , 34 [6]. Definition 1.4:Forthree or more disjoint graphs ), *, … , 4 , the sequential join ) + * + ⋯ + 4 is the graph ) + * ∪ * + : ∪ … ∪ 4;) + 4 [4]. Definition 1.5: Connectivity < is the minimum number of vertices that need to be removed in order to disconnect a graph [4]. Definition 1.6: The integrity of a graph = , is defined by = = 6 | | + − ; ⊂ where − denotes the order of largest component in − [3]. Definition 1.7: The rupture degree of a non-complete connected graph is defined by = − − | | − − : ⊂ , − ˃ 1 where − denotes the number of components in the graph − and − is the order of the largest component of − [9]. Definition 1.8: The neighbor integrity of a graph is defined by = = 6 | | + ! − : ⊂ where is any vertex subversion strategy of and ! − is the order of the largest component of − [10]. Definition 1.9: The neighbor rupture degree of a non-complete connected graph is defined to be = − − | | − ! − : ⊂ , − ≥ 1 where is any vertex subversion strategy of , − is the number of connected components in − and ! − is the maximum order of the components of − [13]. Definition 1.10: The edge-neighbor-rupture degree of a connected graph is defined to be = − − | | − − ∶ ⊆ , − ≥ 1 , where is any edge-
  • 3. Applied Mathematics and Sciences: An International Journal (MathSJ ), Vol. 5, No. 1/2/3, September 2018 3 cut-strategy of , − is the number of the components of − , and − is the maximum order of the components of − . Example:Let's give an exampleof the calculation of the edge-neighbor- rupture-degree. − = 1 | | = 0 − = 19 − − | | − − = 1 − 0 − 19 = −18 Figure 1.1 − = 6 | | = 3 − = 7 − − | | − − = 6 − 3 − 7 = −4 Figure 1.2 − = 8 | | = 5 − = 2 − − | | − − = 8 − 5 − 2 = 1 Figure 1.3 − = 9 | | = 5 − = 1 − − | | − − = 9 − 5 − 1 = 3 Figure 1.4 − = 9 | | = 5 − = 1 − − | | − − = 9 − 5 − 1 = 3 Figure 1.5
  • 4. Applied Mathematics and Sciences: An International Journal (MathSJ ), Vol. 5, No. 1/2/3, September 2018 4 As shown, figure 1.1, figure 1.2,figure 1.3,figure 1.4 and figure 1.5 = −18, −4,1,3,3 = 3. In this paper, the edge-neighbor-rupture degree of some graphs is obtained and the relations between edge-neighbor-rupture degree and other parameters are determined [2]. 2. EDGE-NEIGHBOR-RUPTURE DEGREE ON GRAPH OPERATIONS In this section some theorems are given for edge-neighbor-rupture degree on the graph operations. Connected, undirected, simple graphs are examined. Theorem 2.1:Let be a regular graph and ⋆ is a thorny graph of (adding a vertex to any vertex of a graph). Then the edge-neighbor-rupture degree of is, ⋆ = + 1. Proof:Since is regular graph, you can start from any edge to delete. There are two cases. Case 1: If we start to delete an edge that is incident to an added vertex, while Sedge-cut- strategynumber is not changing,( − ) numbers of components are increased 1. So the result is increased 1. Case 2:If we start to delete an edge that is not incident to an added vertex, while Sedge-cut- strategy number and the number of the components are not changed, maximum order of the components are increased. So the result is increased. The result takes maximum value in case 1. So the proof is completed.■ Theorem 2.2: Edge-neighbor-rupture degree of thorny of regular graph (adding i vertices equally to every vertex of a graph for1 ≤ 6 ≤ ) is, ⋆ = 6 − J 4 * K − 1. Proof: Let S be anedge-cut-strategyof ⋆ and let | | = . There are two cases for the elements of . Case 1: If 0 ≤ < J 4 * K, then ⋆ − ≤ 2 6 + 1 and ⋆ − ≥ 6 + 1, so we have ⋆ − − | | − ⋆ − ≤ 2 6 + 1 − − 6 + 1 = 2 6 − − 6. Let’s = 2 6 − − 6 . Since is an increasing function in 0 ≤ < J 4 * K, it takes its maximum value at MJ 4 * K − 1N, and MJ 2 K − 1N = 2 MJ 2 K − 1N 6 − J 2 K − 6.
  • 5. Applied Mathematics and Sciences: An International Journal (MathSJ ), Vol. 5, No. 1/2/3, September 2018 5 Thus we get ⋆ ≤ 2 MJ 4 * K − 1N 6 − J 4 * K − 6 . Case 2: If J 4 * K ≤ ≤ :4P;4 * , then ⋆ − ≤ 6and ⋆ − ≥ 1, so we have ⋆ − − | | − ⋆ − ≤ 6 − − 1. Let’s = 6 − − 1.Since is a decreasing function in 0 ≤ < J 4 * K, it takes its maximum value at J 4 * K, and MJ 4 * KN = 6 − J 4 * K − 1. Thus we get ⋆ ≤ 6 − J 4 * K − 1. From Case1 and Case 2 we have ⋆ ≤ 6 − J 4 * K − 1. (1) There exist ∗ such that = J 4 * K, ⋆ − ∗ = 6 and ⋆ − ∗ = 1, thus we have ⋆ ≥ 6 − J 4 * K − 1. (2) From (1) and (2) we get ⋆ = 6 − J 4 * K − 1. ■ Corollary 2.1: LetR4 ⋆ is a Thorny graph of R4 (adding i vertices equally to every vertex of a graph for2 ≤ 6 ≤ ). Then the edge-neighbor-rupture degree of R4 ⋆ is, R4 ⋆ = 6 − J 4 * K − 1. Proof: It is the same as proof of Theorem 2.2 ■ Corollary 2.2: LetS4 ⋆ is a Thorny graph of S4 (adding i vertices equally to every vertex of a graph for2 ≤ 6 ≤ ). Then the edge-neighbor-rupture degree of S4 ⋆ is, S4 ⋆ = 6 − J 4 * K − 1. Proof: It is the same as proof of Theorem 2.2. ■ Theorem 2.3: Edge-neighbor-rupture degree of Thorny graphof 4 is 6 ≥ 2 , 4 ⋆ = 6 − . Proof: Let S be an edge-cut-strategyof 4 ⋆ and let | | = . There are two cases for the elements of .
  • 6. Applied Mathematics and Sciences: An International Journal (MathSJ ), Vol. 5, No. 1/2/3, September 2018 6 Case 1: If 0 ≤ < − 1, then 4 ⋆ − ≤ 6 + 1 and 4 ⋆ − ≥ 6 + 1, so we have 4 ⋆ − − | | − 4 ⋆ − ≤ 6 + 1 − − 6 + 1 = 6 − − 6. Let = 6 − − 6 . Since is an increasing function in 0 ≤ < − 1, it takes its maximum value − 2 and − 2 = − 2 6 − 1 − 6. Thus we get 4 ⋆ ≤ 6 − − 36 + 2. Case 2: If − 1 ≤ ≤ * + − 1 then 4 ⋆ − ≤ 6 and 4 ⋆ − ≥ 1, so we have 4 ⋆ − − | | − 4 ⋆ − ≤ 6 − − 1. Let = 6 − − 1.Since is a decreasing function in − 1 ≤ ≤ * + − 1it takes its maximum value at − 1 and − 1 = 6 − + 1 − 1 = 6 − . Thus we get 4 ⋆ ≤ 6 − . From Case1 and Case 2 we have 4 ⋆ ≤ 6 − . (3) There exist ∗ such that = − 1, 4 ⋆ − ∗ = 6 and 4 ⋆ − ∗ = 1, thus we have 4 ⋆ ≥ 6 − . (4) From (3) and (4) we get 4 ⋆ = 6 − . ■ Theorem 2.4: Let R4,R, is a path of order and respectively. The edge-neighbor-rupture degree of addition of R4 and R, is, R4 + R, = T R, − 2 , 6U % R,;) − J 2 K , 6U V W , < Proof: Case 1:If we select an edge-cut-strategy fromR4, we needed 4 * edges to delete all the edges of R4 soR,is remained. Therefore, R4 + R, = T R, − 2 , 6U % R,;) − J 2 K , 6U V W Case 2: If we select an edge-cut-strategy from combining edges of R4 and R,, We get, R4 + R, = R,;4 − .
  • 7. Applied Mathematics and Sciences: An International Journal (MathSJ ), Vol. 5, No. 1/2/3, September 2018 7 Case 3:If we select an edge-cut-strategy fromR,, we need 4 * edges to delete all the edges of R,soR4 is remained. Therefore, R4 + R, = T R4 − 2 , 6U % R4;) − J 2 K , 6U V W The results take maximum value in case 1. So the proof is completed. Corollary 2.3: The edge-neighbor-rupture degree of R*+R4 is, R* + R, = R4 − 1 . Theorem 2.5: Let ), *, … , 4be connected graphs then, ) ∪ * ∪ … ∪ 4 ≥ ) + * + ⋯ + 4 Proof: Let = ) ∪ * ∪ … ∪ 4be union of ), *, … , 4. Let = ), *, … , 4 be an edge Nr- set of ), *, … , 4 respectively and let = ) ∪ * ∪ … ∪ 4be an edge-subversion strategy of . Then we obtain, ≥ − − | | − − = & ) − ) + * − * + ⋯ + 4 − 4 ( − &| )| + | *| + ⋯ + | 4|( − & ) − ) + * − * + ⋯ + 4 − 4 ( = ) − ) − | )| − ) − ) + * − * − | *| − * − * + ⋯ + 4 − 4 − | 4| − 4 − 4 ) + * + ⋯ + 4 . ■ Theorem 2.6: Let be a connected graph, then the edge-neighbor-rupture degree of is, ≥ − X 2 Y. Proof: For the minimum value of , − must be the smallest, | | and − must be the greatest. Let S be an edge-cut-strategy of and | | = . There are two cases for the elements of . Case 1: If ≤ X 4;) * Ythen − = 1 and − ≥ − 2 . So we have − − | | − − ≤ 1 − − − 2 = 1 + − = . This equality takes maximum value for = X 4;) * Y. There are two conditions: Case i: If n is odd;
  • 8. Applied Mathematics and Sciences: An International Journal (MathSJ ), Vol. 5, No. 1/2/3, September 2018 8 = 1 + − 1 2 − = − − 1 2 = − X 2 Y. Case ii: If n is even; = 1 + − 2 2 − = − 2 Case 2: If 4 4;) * > > X 4;) * Y then − ≤ 1and − ≥ 1. − − | | − − ≤ 1 − − 1 = − . This equality takes the maximum value for = X 4 * Y. From all cases, we obtain, ≥ − X 4 * Y. ■ Corollary 2.4: Let be a connected graph, then the edge-neighbor-rupture degree of is, − X 4 * Y ≤ ≤ − 4. Proof: From Theorem 2.6 and [2], the proof is complete. ■ 3. COMPUTING EDGE-NEIGHBOR-RUPTURE DEGREE OF A GRAPH In this section, an algorithm is proposed in order to calculate the edge-neighbor-rupture degreefor any simple finite undirected graph without loops and multiple edges by using the findENR function. Algorithm Edge Neighbor Rupture (ENR) Output: ENR value for given any graph G Begin ENR←-∞; for all edge subsets [ ⊆ do if findENR( , [)> ENRthen ENR=findENR( , [); end end end. The function below,find ENR, returns the ENR value for the edge subset for the graph. function findENR( , [); Input: Graph , , edgesubset [ Output:ENR value for given an [edge subset of . Begin : vertex set incident with [ edges. for all $ ∈ do removeu from 6. . − end
  • 9. Applied Mathematics and Sciences: An International Journal (MathSJ ), Vol. 5, No. 1/2/3, September 2018 9 Componentnumber ← find the number of components of − MaxCompVertexnum ← find the vertex number of maximum component of − findENR←{Component number – number of ( [) – MaxCompVertexnum } end 4. CONCLUSION In this study, we investigate the edge-neighbor rupture degree of graphs obtained by graph operations. The graph operations are used to obtain new graphs. Union, join and mostly thorny operations are taken into consideration in this work. These operations are performed to various graphs and their edge-neighbor rupture degrees were determined. REFERENCES [1] S. Kandilci, G. Bacak-Turan&R. Polat, (2013), “Graph Operations and Neighbor Rupture Degree”, Journal of Applied Mathematics, Hindawi Publishing Corporation, Article ID 836395, http://dx.doi.org/10.1155/2013/836395. [2] E.Aslan, (2013), “Edge-Neighbor-Rupture Degree of Graphs”, Journal of Applied Mathematics,Hindawi Publishing Corporation.Article ID 783610. [3] C.A. Barefoot, R. Entringer&H. Swart, (1987), “Vulnerability in graphs -Acomparative survey”, Journal of Combinatorial Mathematics and Combinatorial Computing, vol1,pp 13-22. [4] F. Buckley & F. Harary, (1990), Distance in Graphs, Addision-Wesley Press. [5] G. Chartrand & L. Lesniak, (2005), Graphs & Digraphs, Chapman & Hall/CRC Press. [6] I. Gutman, (1998), “Distance of Thorny Graphs”, Publ. Institut Math. Nouvelle serie, vol63,pp 31-36. [7] J. A. Bondy & U. S. R.Murty, (1976), GraphTheory with Applications, The Macmillan Press. [8] H. A. Jung, (1978), “On a class of posets and the corresponding comparability graphs”,Journal of Combinatorial Theory B, vol 24,pp 125–133. [9] Y. Li, S. Zhang & X. Li, (2005), Rupture degree of graphs, International Journal of Computer Mathematics, vol 82,pp 793–803. [10] M. B. Cozzens & S. S.Y. Wu, (1998), “Vertex-neighbor-integrity ofpowers of cycles”,Ars Combinatoria, vol 48, pp257–270. [11] M. Saheli, H. Saati&A. R. Ashrafi,(2010), “The eccentric connectivity index of one pentagonal carbon nanocones”, Optoelectronics and Advanced Materials–Rapid Communications, vol4,pp 896– 897. [12] M. Ghorbani,(2010), “GA Index of TUC4C8(R) Nanotube”, Optoelectronics and Advanced Materials – Rapid Communications,vol 4, pp261–263. [13] G. Bacak Turan & A. Kırlangıc, (2010), “Vulnerability Parameters in Graphs” 1st International Symposium onComputing in Science and Engineering, Turkey. [14] M.Ü. Gürsoy,R. Polat, S. Eskiizmirliler&Z.Ö. Yorgancıoğlu (2014), “Edge-Neighbor-Rupture-Degree on graph operations”,9th AnkaraMath days, Atılım University, Ankara, Turkey.
  • 10. Applied Mathematics and Sciences: An International Journal (MathSJ ), Vol. 5, No. 1/2/3, September 2018 10 AUTHORS Saadet Eskiizmirliler She was graduated fromYaşar University Mathematics department in 2010, she had got master degree in 2012 fromYaşar University Math department and she has been doing doktorate at Yaşar University Math department at applied mathematics since 2014. She has been working at Yasar University since 2014. Zeynep Örs Yorgancioğlu She was graduated from Ege University Mathematics department in 2003, she had got master degree in 2010 from Ege University Math department and she had got Ph. D degree in 2015 from Ege University Math department at applied Mathematics. She has been working at Yasar University since 2007. Refet Polat Achieved his BSc degree in mathematics majoring in computer science at Ege University in 2000. He received his MSc and PhD degrees in applied mathematics at Ege University in 2003 and 2009. His research interests focus on applied mathematics, graph theory, ordinary differential equations, numerical methods, and artificial intelligence in education Mehmet Ümit Gürsoy He was graduated from Ege University Mathematics department in 2000, he had got master degree in 2005 from Ege University Math department and he had got Ph.D degree in 2014 from Ege University Math department at applied mathematics.