SlideShare a Scribd company logo
Applied Mathematics and Sciences: An International Journal (MathSJ ), Vol. 5, No. 1/2/3, September 2018
DOI : 10.5121/mathsj.2018.5301 1
EDGE-NEIGHBOR RUPTURE DEGREE ON GRAPH
OPERATIONS
Saadet Eskiizmirliler 1
, Zeynep Örs Yorgan cioğlu2
, Refet Polat3
And Mehmet Ümit Gürsoy4
1,3
Department of Mathematics, Faculty of Science, Yasar University, Izmir, Turkey,
2
Maritime and Port Management Program, Vocational School,
Yasar University, Izmir, Turkey,
4
Izmir, Turkey,
ABSTRACT
Vulnerability and reliability parameters measure the resistance of the network to disruption of operation
after the failure of certain stations or communication links in a communication network. An edge
subversion strategy of a graph , say , is a set of edge(s) in whose adjacent vertices which is incident
with the removal edge(s) are removed from . The survival subgraph is denoted by − . The edge-
neighbor-rupture degree of connected graph , , is defined to be = − −
| | − − : ⊆ , − ≥ 1 where is any edge-cut-strategy of , − is the number
of the components of − , and − is the maximum order of the components of − . In this paper
we give some results for the edge-neighbor-rupture degree of the graph operations and Thorny graph types
are examined.
KEYWORDS
Edge-neighbor-rupture degree, Thorny graphs, Vulnerability, Reliability.
1. INTRODUCTION
A communication network can be brokedown to pieces partially or completely from unexpected
factors. This situation can prevent data transmit so there would be a big problem on the system to
perform it’s task. Therefore, the vulnerability and the reliability measure the resistance of the
network disturbance of operations after the failure of certain stations. To measure the
vulnerability and the reliability we have some parameters which are connectivity [7,11,12],
integrity [3], scattering number [8], rupture degree [9], neighbor-rupture degree [1] and edge-
neighbor-rupture degree [2].
Terminology and notations are not defined in this paper but it can be found [4,5]. Let =
, be a simple graph and let e be any edge of . The set,
= ∈ | ≠ ; 	 	 	 	 ! " is the open neighborhood of e, and [e] = {e}
∪ (e) is the closed neighborhood of e. An edge e in is said to be subverted if the closed
neighborhood of e is removed from . In other words, if = $, % than − &e( = − $, % . A
set of edges = ), *, … , , is called an edge subversion strategy of if each of the edges in
has been subverted from . If has been subverted from the graph , then the remaining graph is
called survival graph, denoted by − . An edge subversion strategy is called an edge-cut-
strategy of if the survival subgraph − is disconnected or is a single vertex or the empty graph
Applied Mathematics and Sciences: An International Journal (MathSJ ), Vol. 5, No. 1/2/3, September 2018
2
[10]. is any edge-cut-strategy of , ( − ) is the number of the components of − , and
( − ) is the maximum order of the components of − .
The definition of edge-neighbor-rupture degree of a connected graph is
= − − | | − − : ⊆ , − ≥ 1 .
Definition 1.1: ∈ -
and ∀% ∈ V for each vertex of , if deg % = than is called r-
regular graph [4].
Definition 1.2: ) and * graphs have disjoint vertex sets ) and * and edge sets ) and *
respectively. The join operation of two ) and * graphs is denoted by ) + * and consist of
) ∪ *which is union of two ) and * graphs and all edges joining ) and *[4].
Definition 1.3:Let 3), 3*, … , 34be non-negative integers. The Thorny Graph of the graph , with
parameters3), 3*, … , 34,is obtained by attaching 35 new vertices of degree one to the vertex$5 of
the graph , 6 = 1,2, … , .
The Thorny graph of the graph is denoted by ⋆
, or if the respectiveparameters need to be
specified, by ⋆ 3), 3*, … , 34 [6].
Definition 1.4:Forthree or more disjoint graphs ), *, … , 4 , the sequential join
) + * + ⋯ + 4
is the graph
) + * ∪ * + : ∪ … ∪ 4;) + 4 [4].
Definition 1.5: Connectivity < is the minimum number of vertices that need to be removed in
order to disconnect a graph [4].
Definition 1.6: The integrity of a graph = , is defined by = = 6 | | + −
; 	 ⊂ where − denotes the order of largest component in − [3].
Definition 1.7: The rupture degree of a non-complete connected graph is defined by	 =
	 − − | | − − :	 ⊂ , − 	˃	1 where − denotes the
number of components in the graph − and − is the order of the largest component of
− [9].
Definition 1.8: The neighbor integrity of a graph is defined by
= = 6 | | + ! − : ⊂ where is any vertex subversion strategy of and
! − is the order of the largest component of − [10].
Definition 1.9: The neighbor rupture degree of a non-complete connected graph is defined to
be = − − | | − ! − :	 ⊂ , − ≥ 1 where is any vertex
subversion strategy of , − is the number of connected components in − and
! − is the maximum order of the components of − [13].
Definition 1.10: The edge-neighbor-rupture degree of a connected graph is defined to be
= − − | | − − ∶ ⊆ , − ≥ 1 , where is any edge-
Applied Mathematics and Sciences: An International Journal (MathSJ ), Vol. 5, No. 1/2/3, September 2018
3
cut-strategy of , 	 − 	 is the number of the components of − , and − is the
maximum order of the components of − .
Example:Let's give an exampleof
the calculation of the edge-neighbor-
rupture-degree.
− = 1
| | = 0
− = 19
− − | | − −
= 1 − 0 − 19 = −18
Figure 1.1
− = 6
| | = 3
− = 7
− − | | − − = 6 − 3 − 7
= −4
Figure 1.2
− = 8
| | = 5
− = 2
− − | | − − = 8 − 5 − 2
= 1
Figure 1.3
− = 9
| | = 5
− = 1
− − | | − − = 9 − 5 − 1
= 3
Figure 1.4
− = 9
| | = 5
− = 1
− − | | − − = 9 − 5 −
1 = 3
Figure 1.5
Applied Mathematics and Sciences: An International Journal (MathSJ ), Vol. 5, No. 1/2/3, September 2018
4
As shown, figure 1.1, figure 1.2,figure 1.3,figure 1.4 and figure 1.5
= −18, −4,1,3,3
= 3.
In this paper, the edge-neighbor-rupture degree of some graphs is obtained and the relations
between edge-neighbor-rupture degree and other parameters are determined [2].
2. EDGE-NEIGHBOR-RUPTURE DEGREE ON GRAPH OPERATIONS
In this section some theorems are given for edge-neighbor-rupture degree on the graph
operations. Connected, undirected, simple graphs are examined.
Theorem 2.1:Let be a regular graph and ⋆
is a thorny graph of (adding a vertex to any
vertex of a graph). Then the edge-neighbor-rupture degree of is,
⋆
= + 1.
Proof:Since is regular graph, you can start from any edge to delete. There are two cases.
Case 1: If we start to delete an edge that is incident to an added vertex, while Sedge-cut-
strategynumber is not changing,( − ) numbers of components are increased 1. So the result is
increased 1.
Case 2:If we start to delete an edge that is not incident to an added vertex, while Sedge-cut-
strategy number and the number of the components are not changed, maximum order of the
components are increased. So the result is increased.
The result takes maximum value in case 1. So the proof is completed.■
Theorem 2.2: Edge-neighbor-rupture degree of thorny of regular graph (adding i vertices
equally to every vertex of a graph for1 ≤ 6 ≤ ) is,
⋆
= 6 − J
4
*
K − 1.
Proof: Let S be anedge-cut-strategyof ⋆
and let | | = . There are two cases for the elements of
.
Case 1: If 0 ≤ < J
4
*
K, then ⋆
− ≤ 2 6 + 1 and ⋆
− ≥ 6 + 1, so we have
⋆
− − | | − ⋆
− ≤ 2 6 + 1 − − 6 + 1 = 2 6 − − 6.
Let’s = 2 6 − − 6 . Since is an increasing function in 0 ≤ < J
4
*
K, it takes its maximum
value at MJ
4
*
K − 1N, and
MJ
2
K − 1N = 2 MJ
2
K − 1N 6 − J
2
K − 6.
Applied Mathematics and Sciences: An International Journal (MathSJ ), Vol. 5, No. 1/2/3, September 2018
5
Thus we get ⋆
≤ 2 MJ
4
*
K − 1N 6 − J
4
*
K − 6 .
Case 2: If J
4
*
K ≤ ≤
:4P;4
*
, then ⋆
− ≤ 6and ⋆
− ≥ 1, so we have
⋆
− − | | − ⋆
− ≤ 6 − − 1.
Let’s = 6 − − 1.Since is a decreasing function in 0 ≤ < J
4
*
K, it takes its maximum
value at J
4
*
K, and 	 MJ
4
*
KN = 6 − J
4
*
K − 1.
Thus we get ⋆
≤ 6 − J
4
*
K − 1.
From Case1 and Case 2 we have
⋆
≤ 6 − J
4
*
K − 1. (1)
There exist ∗
such that
	 = J
4
*
K, ⋆
− ∗
= 6 and ⋆
− ∗
= 1, thus we have
⋆ ≥ 6 − J
4
*
K − 1. (2)
From (1) and (2) we get
⋆
= 6 − J
4
*
K − 1. ■
Corollary 2.1: LetR4
⋆
is a Thorny graph of R4 (adding i vertices equally to every vertex of a
graph for2 ≤ 6 ≤ ). Then the edge-neighbor-rupture degree of R4
⋆
is,
R4
⋆
= 6 − J
4
*
K − 1.
Proof: It is the same as proof of Theorem 2.2 ■
Corollary 2.2: LetS4
⋆
is a Thorny graph of S4 (adding i vertices equally to every vertex of a
graph for2 ≤ 6 ≤ ). Then the edge-neighbor-rupture degree of S4
⋆
is,
S4
⋆
= 6 − J
4
*
K − 1.
Proof: It is the same as proof of Theorem 2.2. ■
Theorem 2.3: Edge-neighbor-rupture degree of Thorny graphof 4 is 6 ≥ 2 ,
4
⋆
= 6 − .
Proof: Let S be an edge-cut-strategyof 4
⋆
and let | | = . There are two cases for the elements of
.
Applied Mathematics and Sciences: An International Journal (MathSJ ), Vol. 5, No. 1/2/3, September 2018
6
Case 1: If 0 ≤ < − 1, then 4
⋆
− ≤ 6 + 1 and 4
⋆
− ≥ 6 + 1, so we have
4
⋆
− − | | − 4
⋆
− ≤ 6 + 1 − − 6 + 1 = 6 − − 6.
Let = 6 − − 6 . Since is an increasing function in 0 ≤ < − 1, it takes its
maximum value − 2 and − 2 = − 2 6 − 1 − 6.
Thus we get 4
⋆
≤ 6 − − 36 + 2.
Case 2: If − 1 ≤ ≤ * + − 1 then 4
⋆ − ≤ 6 and 4
⋆ − ≥ 1, so we have
4
⋆
− − | | − 4
⋆
− ≤ 6 − − 1.
Let = 6 − − 1.Since is a decreasing function in − 1 ≤ ≤ *
+ − 1it takes its
maximum value at − 1 and
− 1 = 6 − + 1 − 1 = 6 − .
Thus we get 4
⋆
≤ 	 6 − .
From Case1 and Case 2 we have
4
⋆
≤ 6 − . (3)
There exist ∗
such that
= − 1, 4
⋆
− ∗
= 6 and 4
⋆
− ∗
= 1, thus we have
4
⋆
≥ 6 − . (4)
From (3) and (4) we get 4
⋆
= 6 − . ■
Theorem 2.4: Let R4,R, is a path of order and respectively. The edge-neighbor-rupture
degree of addition of R4 and	R, is,
R4 + R, = T
R, −
2
, 	6U	 %
R,;) − J
2
K , 	6U	V
W , <
Proof:
Case 1:If we select an edge-cut-strategy fromR4, we needed
4
*
edges to delete all the edges of R4
soR,is remained. Therefore,
R4 + R, = T
R, −
2
, 	6U	 %
R,;) − J
2
K , 	6U	V
W
Case 2: If we select an edge-cut-strategy from combining edges of R4 and R,, We get,
R4 + R, = R,;4 − .
Applied Mathematics and Sciences: An International Journal (MathSJ ), Vol. 5, No. 1/2/3, September 2018
7
Case 3:If we select an edge-cut-strategy fromR,, we need
4
*
edges to delete all the edges of
R,soR4 is remained. Therefore,
R4 + R, = T
R4 −
2
, 	6U	 %
R4;) − J
2
K , 	6U	V
W
The results take maximum value in case 1. So the proof is completed.
Corollary 2.3: The edge-neighbor-rupture degree of R*+R4 is,
R* + R, = R4 − 1 .
Theorem 2.5: Let ), *, … , 4be connected graphs then,
) ∪ * ∪ … ∪ 4 ≥ ) + * + ⋯ + 4
Proof: Let = ) ∪ * ∪ … ∪ 4be union of ), *, … , 4. Let = ), *, … , 4 be an edge Nr-
set of ), *, … , 4 respectively and let = ) ∪ * ∪ … ∪ 4be an edge-subversion strategy of .
Then we obtain,
≥ − − | | − −
= & ) − ) + * − * + ⋯ + 4 − 4 ( − &| )| + | *| + ⋯ + | 4|(
− & ) − ) + * − * + ⋯ + 4 − 4 (
= ) − ) − | )| − ) − ) + * − * − | *| − * − * + ⋯ + 4 − 4
− | 4| − 4 − 4
) + * + ⋯ + 4 . ■
Theorem 2.6: Let be a connected graph, then the edge-neighbor-rupture degree of is,
≥ − X
2
Y.
Proof: For the minimum value of , − must be the smallest, | | and −
must be the greatest.
Let S be an edge-cut-strategy of and | | = . There are two cases for the elements of .
Case 1: If ≤ X
4;)
*
Ythen − = 1 and − ≥ − 2 .
So we have
− − | | − − ≤ 1 − − − 2 				= 1 + − = .
This equality takes maximum value for = X
4;)
*
Y.
There are two conditions:
Case i: If n is odd;
Applied Mathematics and Sciences: An International Journal (MathSJ ), Vol. 5, No. 1/2/3, September 2018
8
= 1 +
− 1
2
− = −
− 1
2
= − X
2
Y.
Case ii: If n is even;
= 1 +
− 2
2
− = −
2
Case 2: If
4 4;)
*
> > X
4;)
*
Y then		 − ≤ 1and − ≥ 1.
− − | | − − ≤ 1 − − 1 = − .
This equality takes the maximum value for	 = X
4
*
Y.
From all cases, we obtain, ≥ − X
4
*
Y. ■
Corollary 2.4: Let be a connected graph, then the edge-neighbor-rupture degree of is,
− X
4
*
Y ≤ ≤ − 4.
Proof: From Theorem 2.6 and [2], the proof is complete. ■
3. COMPUTING EDGE-NEIGHBOR-RUPTURE DEGREE OF A GRAPH
In this section, an algorithm is proposed in order to calculate the edge-neighbor-rupture degreefor
any simple finite undirected graph without loops and multiple edges by using the findENR
function.
Algorithm Edge Neighbor Rupture (ENR)
Output: ENR value for given any graph G
Begin
ENR←-∞;
for all edge subsets [ ⊆ do
if findENR( , [)> ENRthen
ENR=findENR( , [);
end
end
end.
The function below,find ENR, returns the ENR value for the edge subset for the graph.
function findENR( , [);
Input: Graph , , edgesubset [
Output:ENR value for given an [edge subset of .
Begin
 : vertex set incident with [ edges.
for all $ ∈ do
removeu from 6. .		 − 
end
Applied Mathematics and Sciences: An International Journal (MathSJ ), Vol. 5, No. 1/2/3, September 2018
9
Componentnumber ← find the number of components of − 
MaxCompVertexnum ← find the vertex number of maximum component of − 
findENR←{Component number – number of ( [) – MaxCompVertexnum }
end
4. CONCLUSION
In this study, we investigate the edge-neighbor rupture degree of graphs obtained by graph
operations. The graph operations are used to obtain new graphs. Union, join and mostly thorny
operations are taken into consideration in this work. These operations are performed to various
graphs and their edge-neighbor rupture degrees were determined.
REFERENCES
[1] S. Kandilci, G. Bacak-Turan&R. Polat, (2013), “Graph Operations and Neighbor Rupture Degree”,
Journal of Applied Mathematics, Hindawi Publishing Corporation, Article ID 836395,
http://dx.doi.org/10.1155/2013/836395.
[2] E.Aslan, (2013), “Edge-Neighbor-Rupture Degree of Graphs”, Journal of Applied
Mathematics,Hindawi Publishing Corporation.Article ID 783610.
[3] C.A. Barefoot, R. Entringer&H. Swart, (1987), “Vulnerability in graphs -Acomparative survey”,
Journal of Combinatorial Mathematics and Combinatorial Computing, vol1,pp 13-22.
[4] F. Buckley & F. Harary, (1990), Distance in Graphs, Addision-Wesley Press.
[5] G. Chartrand & L. Lesniak, (2005), Graphs & Digraphs, Chapman & Hall/CRC Press.
[6] I. Gutman, (1998), “Distance of Thorny Graphs”, Publ. Institut Math. Nouvelle serie, vol63,pp 31-36.
[7] J. A. Bondy & U. S. R.Murty, (1976), GraphTheory with Applications, The Macmillan Press.
[8] H. A. Jung, (1978), “On a class of posets and the corresponding comparability graphs”,Journal of
Combinatorial Theory B, vol 24,pp 125–133.
[9] Y. Li, S. Zhang & X. Li, (2005), Rupture degree of graphs, International Journal of Computer
Mathematics, vol 82,pp 793–803.
[10] M. B. Cozzens & S. S.Y. Wu, (1998), “Vertex-neighbor-integrity ofpowers of cycles”,Ars
Combinatoria, vol 48, pp257–270.
[11] M. Saheli, H. Saati&A. R. Ashrafi,(2010), “The eccentric connectivity index of one pentagonal
carbon nanocones”, Optoelectronics and Advanced Materials–Rapid Communications, vol4,pp 896–
897.
[12] M. Ghorbani,(2010), “GA Index of TUC4C8(R) Nanotube”, Optoelectronics and Advanced Materials
– Rapid Communications,vol 4, pp261–263.
[13] G. Bacak Turan & A. Kırlangıc, (2010), “Vulnerability Parameters in Graphs” 1st International
Symposium onComputing in Science and Engineering, Turkey.
[14] M.Ü. Gürsoy,R. Polat, S. Eskiizmirliler&Z.Ö. Yorgancıoğlu (2014), “Edge-Neighbor-Rupture-Degree
on graph operations”,9th AnkaraMath days, Atılım University, Ankara, Turkey.
Applied Mathematics and Sciences: An International Journal (MathSJ ), Vol. 5, No. 1/2/3, September 2018
10
AUTHORS
Saadet Eskiizmirliler She was graduated fromYaşar University Mathematics
department in 2010, she had got master degree in 2012 fromYaşar University Math
department and she has been doing doktorate at Yaşar University Math department
at applied mathematics since 2014. She has been working at Yasar University since
2014.
Zeynep Örs Yorgancioğlu She was graduated from Ege University Mathematics
department in 2003, she had got master degree in 2010 from Ege University Math
department and she had got Ph. D degree in 2015 from Ege University Math
department at applied Mathematics. She has been working at Yasar University
since 2007.
Refet Polat Achieved his BSc degree in mathematics majoring in computer science
at Ege University in 2000. He received his MSc and PhD degrees in applied
mathematics at Ege University in 2003 and 2009. His research interests focus on
applied mathematics, graph theory, ordinary differential equations, numerical
methods, and artificial intelligence in education
Mehmet Ümit Gürsoy He was graduated from Ege University Mathematics
department in 2000, he had got master degree in 2005 from Ege University Math
department and he had got Ph.D degree in 2014 from Ege University Math
department at applied mathematics.

More Related Content

What's hot

Btech_II_ engineering mathematics_unit5
Btech_II_ engineering mathematics_unit5Btech_II_ engineering mathematics_unit5
Btech_II_ engineering mathematics_unit5
Rai University
 
31350052 introductory-mathematical-analysis-textbook-solution-manual
31350052 introductory-mathematical-analysis-textbook-solution-manual31350052 introductory-mathematical-analysis-textbook-solution-manual
31350052 introductory-mathematical-analysis-textbook-solution-manual
Mahrukh Khalid
 
Numerical solution of system of linear equations
Numerical solution of system of linear equationsNumerical solution of system of linear equations
Numerical solution of system of linear equations
reach2arkaELECTRICAL
 
On the 1-2-3-edge weighting and Vertex coloring of complete graph
On the 1-2-3-edge weighting and Vertex coloring of complete graphOn the 1-2-3-edge weighting and Vertex coloring of complete graph
On the 1-2-3-edge weighting and Vertex coloring of complete graph
ijcsa
 
BSC_COMPUTER _SCIENCE_UNIT-2_DISCRETE MATHEMATICS
BSC_COMPUTER _SCIENCE_UNIT-2_DISCRETE MATHEMATICSBSC_COMPUTER _SCIENCE_UNIT-2_DISCRETE MATHEMATICS
BSC_COMPUTER _SCIENCE_UNIT-2_DISCRETE MATHEMATICS
Rai University
 
Diploma_Semester-II_Advanced Mathematics_Definite Integration
Diploma_Semester-II_Advanced Mathematics_Definite IntegrationDiploma_Semester-II_Advanced Mathematics_Definite Integration
Diploma_Semester-II_Advanced Mathematics_Definite Integration
Rai University
 
Introductory Mathematical Analysis for Business Economics International 13th ...
Introductory Mathematical Analysis for Business Economics International 13th ...Introductory Mathematical Analysis for Business Economics International 13th ...
Introductory Mathematical Analysis for Business Economics International 13th ...
Leblancer
 
INVERSION OF MATRIX BY GAUSS ELIMINATION METHOD
INVERSION OF MATRIX BY GAUSS ELIMINATION METHODINVERSION OF MATRIX BY GAUSS ELIMINATION METHOD
INVERSION OF MATRIX BY GAUSS ELIMINATION METHOD
reach2arkaELECTRICAL
 
BSC_Computer Science_Discrete Mathematics_Unit-I
BSC_Computer Science_Discrete Mathematics_Unit-IBSC_Computer Science_Discrete Mathematics_Unit-I
BSC_Computer Science_Discrete Mathematics_Unit-I
Rai University
 
Btech_II_ engineering mathematics_unit4
Btech_II_ engineering mathematics_unit4Btech_II_ engineering mathematics_unit4
Btech_II_ engineering mathematics_unit4
Rai University
 
Trial kedah 2014 spm add math k1 skema
Trial kedah 2014 spm add math k1 skemaTrial kedah 2014 spm add math k1 skema
Trial kedah 2014 spm add math k1 skema
Cikgu Pejal
 
Tugas 2 turunan
Tugas 2 turunanTugas 2 turunan
Tugas 2 turunan
Monica ROselina
 
B.tech ii unit-5 material vector integration
B.tech ii unit-5 material vector integrationB.tech ii unit-5 material vector integration
B.tech ii unit-5 material vector integration
Rai University
 
Trial penang 2014 spm matematik tambahan k1 k2 skema [scan]
Trial penang 2014 spm matematik tambahan k1 k2 skema [scan]Trial penang 2014 spm matematik tambahan k1 k2 skema [scan]
Trial penang 2014 spm matematik tambahan k1 k2 skema [scan]
Cikgu Pejal
 
Numerical solutions for linear system of equations
Numerical solutions for linear system of equationsNumerical solutions for linear system of equations
Numerical solutions for linear system of equations
Mohamed Mohamed El-Sayed
 
FURTHER RESULTS ON ODD HARMONIOUS GRAPHS
FURTHER RESULTS ON ODD HARMONIOUS GRAPHSFURTHER RESULTS ON ODD HARMONIOUS GRAPHS
FURTHER RESULTS ON ODD HARMONIOUS GRAPHS
graphhoc
 
system of algebraic equation by Iteration method
system of algebraic equation by Iteration methodsystem of algebraic equation by Iteration method
system of algebraic equation by Iteration method
Akhtar Kamal
 

What's hot (17)

Btech_II_ engineering mathematics_unit5
Btech_II_ engineering mathematics_unit5Btech_II_ engineering mathematics_unit5
Btech_II_ engineering mathematics_unit5
 
31350052 introductory-mathematical-analysis-textbook-solution-manual
31350052 introductory-mathematical-analysis-textbook-solution-manual31350052 introductory-mathematical-analysis-textbook-solution-manual
31350052 introductory-mathematical-analysis-textbook-solution-manual
 
Numerical solution of system of linear equations
Numerical solution of system of linear equationsNumerical solution of system of linear equations
Numerical solution of system of linear equations
 
On the 1-2-3-edge weighting and Vertex coloring of complete graph
On the 1-2-3-edge weighting and Vertex coloring of complete graphOn the 1-2-3-edge weighting and Vertex coloring of complete graph
On the 1-2-3-edge weighting and Vertex coloring of complete graph
 
BSC_COMPUTER _SCIENCE_UNIT-2_DISCRETE MATHEMATICS
BSC_COMPUTER _SCIENCE_UNIT-2_DISCRETE MATHEMATICSBSC_COMPUTER _SCIENCE_UNIT-2_DISCRETE MATHEMATICS
BSC_COMPUTER _SCIENCE_UNIT-2_DISCRETE MATHEMATICS
 
Diploma_Semester-II_Advanced Mathematics_Definite Integration
Diploma_Semester-II_Advanced Mathematics_Definite IntegrationDiploma_Semester-II_Advanced Mathematics_Definite Integration
Diploma_Semester-II_Advanced Mathematics_Definite Integration
 
Introductory Mathematical Analysis for Business Economics International 13th ...
Introductory Mathematical Analysis for Business Economics International 13th ...Introductory Mathematical Analysis for Business Economics International 13th ...
Introductory Mathematical Analysis for Business Economics International 13th ...
 
INVERSION OF MATRIX BY GAUSS ELIMINATION METHOD
INVERSION OF MATRIX BY GAUSS ELIMINATION METHODINVERSION OF MATRIX BY GAUSS ELIMINATION METHOD
INVERSION OF MATRIX BY GAUSS ELIMINATION METHOD
 
BSC_Computer Science_Discrete Mathematics_Unit-I
BSC_Computer Science_Discrete Mathematics_Unit-IBSC_Computer Science_Discrete Mathematics_Unit-I
BSC_Computer Science_Discrete Mathematics_Unit-I
 
Btech_II_ engineering mathematics_unit4
Btech_II_ engineering mathematics_unit4Btech_II_ engineering mathematics_unit4
Btech_II_ engineering mathematics_unit4
 
Trial kedah 2014 spm add math k1 skema
Trial kedah 2014 spm add math k1 skemaTrial kedah 2014 spm add math k1 skema
Trial kedah 2014 spm add math k1 skema
 
Tugas 2 turunan
Tugas 2 turunanTugas 2 turunan
Tugas 2 turunan
 
B.tech ii unit-5 material vector integration
B.tech ii unit-5 material vector integrationB.tech ii unit-5 material vector integration
B.tech ii unit-5 material vector integration
 
Trial penang 2014 spm matematik tambahan k1 k2 skema [scan]
Trial penang 2014 spm matematik tambahan k1 k2 skema [scan]Trial penang 2014 spm matematik tambahan k1 k2 skema [scan]
Trial penang 2014 spm matematik tambahan k1 k2 skema [scan]
 
Numerical solutions for linear system of equations
Numerical solutions for linear system of equationsNumerical solutions for linear system of equations
Numerical solutions for linear system of equations
 
FURTHER RESULTS ON ODD HARMONIOUS GRAPHS
FURTHER RESULTS ON ODD HARMONIOUS GRAPHSFURTHER RESULTS ON ODD HARMONIOUS GRAPHS
FURTHER RESULTS ON ODD HARMONIOUS GRAPHS
 
system of algebraic equation by Iteration method
system of algebraic equation by Iteration methodsystem of algebraic equation by Iteration method
system of algebraic equation by Iteration method
 

Similar to EDGE-NEIGHBOR RUPTURE DEGREE ON GRAPH OPERATIONS

Solucao_Marion_Thornton_Dinamica_Classic (1).pdf
Solucao_Marion_Thornton_Dinamica_Classic (1).pdfSolucao_Marion_Thornton_Dinamica_Classic (1).pdf
Solucao_Marion_Thornton_Dinamica_Classic (1).pdf
FranciscoJavierCaedo
 
Strong convergence of an algorithm about strongly quasi nonexpansive mappings
Strong convergence of an algorithm about strongly quasi nonexpansive mappingsStrong convergence of an algorithm about strongly quasi nonexpansive mappings
Strong convergence of an algorithm about strongly quasi nonexpansive mappings
Alexander Decker
 
MATRICES-MATHED204.pptx
MATRICES-MATHED204.pptxMATRICES-MATHED204.pptx
MATRICES-MATHED204.pptx
ChristopherMaldicas
 
1 illustrating limit of a function
1 illustrating limit of a function1 illustrating limit of a function
1 illustrating limit of a function
JRCatador
 
Fractional integration and fractional differentiation of the product of m ser...
Fractional integration and fractional differentiation of the product of m ser...Fractional integration and fractional differentiation of the product of m ser...
Fractional integration and fractional differentiation of the product of m ser...
Alexander Decker
 
GRAPH - DISCRETE STRUCTURE AND ALGORITHM
GRAPH - DISCRETE STRUCTURE AND ALGORITHMGRAPH - DISCRETE STRUCTURE AND ALGORITHM
GRAPH - DISCRETE STRUCTURE AND ALGORITHM
himanshumishra19dec
 
On Cubic Graceful Labeling
On Cubic Graceful LabelingOn Cubic Graceful Labeling
On Cubic Graceful Labeling
rahulmonikasharma
 
Module 5 (Part 3-Revised)-Functions and Relations.pdf
Module 5 (Part 3-Revised)-Functions and Relations.pdfModule 5 (Part 3-Revised)-Functions and Relations.pdf
Module 5 (Part 3-Revised)-Functions and Relations.pdf
GaleJean
 
Mathematics
MathematicsMathematics
Mathematics
MathematicsMathematics
Mathematics
jiteshtuteja
 
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHS
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHSDISTANCE TWO LABELING FOR MULTI-STOREY GRAPHS
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHS
graphhoc
 
Odd Harmonious Labelings of Cyclic Snakes
Odd Harmonious Labelings of Cyclic SnakesOdd Harmonious Labelings of Cyclic Snakes
Odd Harmonious Labelings of Cyclic Snakes
GiselleginaGloria
 
Section 6.4 Logarithmic Equations and Inequalities, from Coll.docx
Section 6.4 Logarithmic Equations and Inequalities, from Coll.docxSection 6.4 Logarithmic Equations and Inequalities, from Coll.docx
Section 6.4 Logarithmic Equations and Inequalities, from Coll.docx
bagotjesusa
 
Matrix
MatrixMatrix
Unit-1 Basic Concept of Algorithm.pptx
Unit-1 Basic Concept of Algorithm.pptxUnit-1 Basic Concept of Algorithm.pptx
Unit-1 Basic Concept of Algorithm.pptx
ssuser01e301
 
Application of Integration
Application of IntegrationApplication of Integration
Application of Integration
Raymundo Raymund
 
An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles
An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles  An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles
An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles
graphhoc
 
B.tech ii unit-4 material vector differentiation
B.tech ii unit-4 material vector differentiationB.tech ii unit-4 material vector differentiation
B.tech ii unit-4 material vector differentiation
Rai University
 
Graph Analytics and Complexity Questions and answers
Graph Analytics and Complexity Questions and answersGraph Analytics and Complexity Questions and answers
Graph Analytics and Complexity Questions and answers
Animesh Chaturvedi
 
Complex differentiation contains analytic function.pptx
Complex differentiation contains analytic function.pptxComplex differentiation contains analytic function.pptx
Complex differentiation contains analytic function.pptx
jyotidighole2
 

Similar to EDGE-NEIGHBOR RUPTURE DEGREE ON GRAPH OPERATIONS (20)

Solucao_Marion_Thornton_Dinamica_Classic (1).pdf
Solucao_Marion_Thornton_Dinamica_Classic (1).pdfSolucao_Marion_Thornton_Dinamica_Classic (1).pdf
Solucao_Marion_Thornton_Dinamica_Classic (1).pdf
 
Strong convergence of an algorithm about strongly quasi nonexpansive mappings
Strong convergence of an algorithm about strongly quasi nonexpansive mappingsStrong convergence of an algorithm about strongly quasi nonexpansive mappings
Strong convergence of an algorithm about strongly quasi nonexpansive mappings
 
MATRICES-MATHED204.pptx
MATRICES-MATHED204.pptxMATRICES-MATHED204.pptx
MATRICES-MATHED204.pptx
 
1 illustrating limit of a function
1 illustrating limit of a function1 illustrating limit of a function
1 illustrating limit of a function
 
Fractional integration and fractional differentiation of the product of m ser...
Fractional integration and fractional differentiation of the product of m ser...Fractional integration and fractional differentiation of the product of m ser...
Fractional integration and fractional differentiation of the product of m ser...
 
GRAPH - DISCRETE STRUCTURE AND ALGORITHM
GRAPH - DISCRETE STRUCTURE AND ALGORITHMGRAPH - DISCRETE STRUCTURE AND ALGORITHM
GRAPH - DISCRETE STRUCTURE AND ALGORITHM
 
On Cubic Graceful Labeling
On Cubic Graceful LabelingOn Cubic Graceful Labeling
On Cubic Graceful Labeling
 
Module 5 (Part 3-Revised)-Functions and Relations.pdf
Module 5 (Part 3-Revised)-Functions and Relations.pdfModule 5 (Part 3-Revised)-Functions and Relations.pdf
Module 5 (Part 3-Revised)-Functions and Relations.pdf
 
Mathematics
MathematicsMathematics
Mathematics
 
Mathematics
MathematicsMathematics
Mathematics
 
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHS
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHSDISTANCE TWO LABELING FOR MULTI-STOREY GRAPHS
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHS
 
Odd Harmonious Labelings of Cyclic Snakes
Odd Harmonious Labelings of Cyclic SnakesOdd Harmonious Labelings of Cyclic Snakes
Odd Harmonious Labelings of Cyclic Snakes
 
Section 6.4 Logarithmic Equations and Inequalities, from Coll.docx
Section 6.4 Logarithmic Equations and Inequalities, from Coll.docxSection 6.4 Logarithmic Equations and Inequalities, from Coll.docx
Section 6.4 Logarithmic Equations and Inequalities, from Coll.docx
 
Matrix
MatrixMatrix
Matrix
 
Unit-1 Basic Concept of Algorithm.pptx
Unit-1 Basic Concept of Algorithm.pptxUnit-1 Basic Concept of Algorithm.pptx
Unit-1 Basic Concept of Algorithm.pptx
 
Application of Integration
Application of IntegrationApplication of Integration
Application of Integration
 
An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles
An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles  An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles
An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles
 
B.tech ii unit-4 material vector differentiation
B.tech ii unit-4 material vector differentiationB.tech ii unit-4 material vector differentiation
B.tech ii unit-4 material vector differentiation
 
Graph Analytics and Complexity Questions and answers
Graph Analytics and Complexity Questions and answersGraph Analytics and Complexity Questions and answers
Graph Analytics and Complexity Questions and answers
 
Complex differentiation contains analytic function.pptx
Complex differentiation contains analytic function.pptxComplex differentiation contains analytic function.pptx
Complex differentiation contains analytic function.pptx
 

More from mathsjournal

OPTIMIZING SIMILARITY THRESHOLD FOR ABSTRACT SIMILARITY METRIC IN SPEECH DIAR...
OPTIMIZING SIMILARITY THRESHOLD FOR ABSTRACT SIMILARITY METRIC IN SPEECH DIAR...OPTIMIZING SIMILARITY THRESHOLD FOR ABSTRACT SIMILARITY METRIC IN SPEECH DIAR...
OPTIMIZING SIMILARITY THRESHOLD FOR ABSTRACT SIMILARITY METRIC IN SPEECH DIAR...
mathsjournal
 
A POSSIBLE RESOLUTION TO HILBERT’S FIRST PROBLEM BY APPLYING CANTOR’S DIAGONA...
A POSSIBLE RESOLUTION TO HILBERT’S FIRST PROBLEM BY APPLYING CANTOR’S DIAGONA...A POSSIBLE RESOLUTION TO HILBERT’S FIRST PROBLEM BY APPLYING CANTOR’S DIAGONA...
A POSSIBLE RESOLUTION TO HILBERT’S FIRST PROBLEM BY APPLYING CANTOR’S DIAGONA...
mathsjournal
 
A Positive Integer 𝑵 Such That 𝒑𝒏 + 𝒑𝒏+𝟑 ~ 𝒑𝒏+𝟏 + 𝒑𝒏+𝟐 For All 𝒏 ≥ 𝑵
A Positive Integer 𝑵 Such That 𝒑𝒏 + 𝒑𝒏+𝟑 ~ 𝒑𝒏+𝟏 + 𝒑𝒏+𝟐 For All 𝒏 ≥ 𝑵A Positive Integer 𝑵 Such That 𝒑𝒏 + 𝒑𝒏+𝟑 ~ 𝒑𝒏+𝟏 + 𝒑𝒏+𝟐 For All 𝒏 ≥ 𝑵
A Positive Integer 𝑵 Such That 𝒑𝒏 + 𝒑𝒏+𝟑 ~ 𝒑𝒏+𝟏 + 𝒑𝒏+𝟐 For All 𝒏 ≥ 𝑵
mathsjournal
 
A POSSIBLE RESOLUTION TO HILBERT’S FIRST PROBLEM BY APPLYING CANTOR’S DIAGONA...
A POSSIBLE RESOLUTION TO HILBERT’S FIRST PROBLEM BY APPLYING CANTOR’S DIAGONA...A POSSIBLE RESOLUTION TO HILBERT’S FIRST PROBLEM BY APPLYING CANTOR’S DIAGONA...
A POSSIBLE RESOLUTION TO HILBERT’S FIRST PROBLEM BY APPLYING CANTOR’S DIAGONA...
mathsjournal
 
Moving Target Detection Using CA, SO and GO-CFAR detectors in Nonhomogeneous ...
Moving Target Detection Using CA, SO and GO-CFAR detectors in Nonhomogeneous ...Moving Target Detection Using CA, SO and GO-CFAR detectors in Nonhomogeneous ...
Moving Target Detection Using CA, SO and GO-CFAR detectors in Nonhomogeneous ...
mathsjournal
 
OPTIMIZING SIMILARITY THRESHOLD FOR ABSTRACT SIMILARITY METRIC IN SPEECH DIAR...
OPTIMIZING SIMILARITY THRESHOLD FOR ABSTRACT SIMILARITY METRIC IN SPEECH DIAR...OPTIMIZING SIMILARITY THRESHOLD FOR ABSTRACT SIMILARITY METRIC IN SPEECH DIAR...
OPTIMIZING SIMILARITY THRESHOLD FOR ABSTRACT SIMILARITY METRIC IN SPEECH DIAR...
mathsjournal
 
The Impact of Allee Effect on a Predator-Prey Model with Holling Type II Func...
The Impact of Allee Effect on a Predator-Prey Model with Holling Type II Func...The Impact of Allee Effect on a Predator-Prey Model with Holling Type II Func...
The Impact of Allee Effect on a Predator-Prey Model with Holling Type II Func...
mathsjournal
 
A POSSIBLE RESOLUTION TO HILBERT’S FIRST PROBLEM BY APPLYING CANTOR’S DIAGONA...
A POSSIBLE RESOLUTION TO HILBERT’S FIRST PROBLEM BY APPLYING CANTOR’S DIAGONA...A POSSIBLE RESOLUTION TO HILBERT’S FIRST PROBLEM BY APPLYING CANTOR’S DIAGONA...
A POSSIBLE RESOLUTION TO HILBERT’S FIRST PROBLEM BY APPLYING CANTOR’S DIAGONA...
mathsjournal
 
Moving Target Detection Using CA, SO and GO-CFAR detectors in Nonhomogeneous ...
Moving Target Detection Using CA, SO and GO-CFAR detectors in Nonhomogeneous ...Moving Target Detection Using CA, SO and GO-CFAR detectors in Nonhomogeneous ...
Moving Target Detection Using CA, SO and GO-CFAR detectors in Nonhomogeneous ...
mathsjournal
 
OPTIMIZING SIMILARITY THRESHOLD FOR ABSTRACT SIMILARITY METRIC IN SPEECH DIAR...
OPTIMIZING SIMILARITY THRESHOLD FOR ABSTRACT SIMILARITY METRIC IN SPEECH DIAR...OPTIMIZING SIMILARITY THRESHOLD FOR ABSTRACT SIMILARITY METRIC IN SPEECH DIAR...
OPTIMIZING SIMILARITY THRESHOLD FOR ABSTRACT SIMILARITY METRIC IN SPEECH DIAR...
mathsjournal
 
Modified Alpha-Rooting Color Image Enhancement Method on the Two Side 2-D Qua...
Modified Alpha-Rooting Color Image Enhancement Method on the Two Side 2-D Qua...Modified Alpha-Rooting Color Image Enhancement Method on the Two Side 2-D Qua...
Modified Alpha-Rooting Color Image Enhancement Method on the Two Side 2-D Qua...
mathsjournal
 
A Study on L-Fuzzy Normal Subl-GROUP
A Study on L-Fuzzy Normal Subl-GROUPA Study on L-Fuzzy Normal Subl-GROUP
A Study on L-Fuzzy Normal Subl-GROUP
mathsjournal
 
An Application of Assignment Problem in Laptop Selection Problem Using MATLAB
An Application of Assignment Problem in Laptop Selection Problem Using MATLABAn Application of Assignment Problem in Laptop Selection Problem Using MATLAB
An Application of Assignment Problem in Laptop Selection Problem Using MATLAB
mathsjournal
 
ON β-Normal Spaces
ON β-Normal SpacesON β-Normal Spaces
ON β-Normal Spaces
mathsjournal
 
Cubic Response Surface Designs Using Bibd in Four Dimensions
Cubic Response Surface Designs Using Bibd in Four DimensionsCubic Response Surface Designs Using Bibd in Four Dimensions
Cubic Response Surface Designs Using Bibd in Four Dimensions
mathsjournal
 
Quantum Variation about Geodesics
Quantum Variation about GeodesicsQuantum Variation about Geodesics
Quantum Variation about Geodesics
mathsjournal
 
Approximate Analytical Solution of Non-Linear Boussinesq Equation for the Uns...
Approximate Analytical Solution of Non-Linear Boussinesq Equation for the Uns...Approximate Analytical Solution of Non-Linear Boussinesq Equation for the Uns...
Approximate Analytical Solution of Non-Linear Boussinesq Equation for the Uns...
mathsjournal
 
Common Fixed Point Theorems in Compatible Mappings of Type (P*) of Generalize...
Common Fixed Point Theorems in Compatible Mappings of Type (P*) of Generalize...Common Fixed Point Theorems in Compatible Mappings of Type (P*) of Generalize...
Common Fixed Point Theorems in Compatible Mappings of Type (P*) of Generalize...
mathsjournal
 
A Probabilistic Algorithm for Computation of Polynomial Greatest Common with ...
A Probabilistic Algorithm for Computation of Polynomial Greatest Common with ...A Probabilistic Algorithm for Computation of Polynomial Greatest Common with ...
A Probabilistic Algorithm for Computation of Polynomial Greatest Common with ...
mathsjournal
 
Table of Contents - September 2022, Volume 9, Number 2/3
Table of Contents - September 2022, Volume 9, Number 2/3Table of Contents - September 2022, Volume 9, Number 2/3
Table of Contents - September 2022, Volume 9, Number 2/3
mathsjournal
 

More from mathsjournal (20)

OPTIMIZING SIMILARITY THRESHOLD FOR ABSTRACT SIMILARITY METRIC IN SPEECH DIAR...
OPTIMIZING SIMILARITY THRESHOLD FOR ABSTRACT SIMILARITY METRIC IN SPEECH DIAR...OPTIMIZING SIMILARITY THRESHOLD FOR ABSTRACT SIMILARITY METRIC IN SPEECH DIAR...
OPTIMIZING SIMILARITY THRESHOLD FOR ABSTRACT SIMILARITY METRIC IN SPEECH DIAR...
 
A POSSIBLE RESOLUTION TO HILBERT’S FIRST PROBLEM BY APPLYING CANTOR’S DIAGONA...
A POSSIBLE RESOLUTION TO HILBERT’S FIRST PROBLEM BY APPLYING CANTOR’S DIAGONA...A POSSIBLE RESOLUTION TO HILBERT’S FIRST PROBLEM BY APPLYING CANTOR’S DIAGONA...
A POSSIBLE RESOLUTION TO HILBERT’S FIRST PROBLEM BY APPLYING CANTOR’S DIAGONA...
 
A Positive Integer 𝑵 Such That 𝒑𝒏 + 𝒑𝒏+𝟑 ~ 𝒑𝒏+𝟏 + 𝒑𝒏+𝟐 For All 𝒏 ≥ 𝑵
A Positive Integer 𝑵 Such That 𝒑𝒏 + 𝒑𝒏+𝟑 ~ 𝒑𝒏+𝟏 + 𝒑𝒏+𝟐 For All 𝒏 ≥ 𝑵A Positive Integer 𝑵 Such That 𝒑𝒏 + 𝒑𝒏+𝟑 ~ 𝒑𝒏+𝟏 + 𝒑𝒏+𝟐 For All 𝒏 ≥ 𝑵
A Positive Integer 𝑵 Such That 𝒑𝒏 + 𝒑𝒏+𝟑 ~ 𝒑𝒏+𝟏 + 𝒑𝒏+𝟐 For All 𝒏 ≥ 𝑵
 
A POSSIBLE RESOLUTION TO HILBERT’S FIRST PROBLEM BY APPLYING CANTOR’S DIAGONA...
A POSSIBLE RESOLUTION TO HILBERT’S FIRST PROBLEM BY APPLYING CANTOR’S DIAGONA...A POSSIBLE RESOLUTION TO HILBERT’S FIRST PROBLEM BY APPLYING CANTOR’S DIAGONA...
A POSSIBLE RESOLUTION TO HILBERT’S FIRST PROBLEM BY APPLYING CANTOR’S DIAGONA...
 
Moving Target Detection Using CA, SO and GO-CFAR detectors in Nonhomogeneous ...
Moving Target Detection Using CA, SO and GO-CFAR detectors in Nonhomogeneous ...Moving Target Detection Using CA, SO and GO-CFAR detectors in Nonhomogeneous ...
Moving Target Detection Using CA, SO and GO-CFAR detectors in Nonhomogeneous ...
 
OPTIMIZING SIMILARITY THRESHOLD FOR ABSTRACT SIMILARITY METRIC IN SPEECH DIAR...
OPTIMIZING SIMILARITY THRESHOLD FOR ABSTRACT SIMILARITY METRIC IN SPEECH DIAR...OPTIMIZING SIMILARITY THRESHOLD FOR ABSTRACT SIMILARITY METRIC IN SPEECH DIAR...
OPTIMIZING SIMILARITY THRESHOLD FOR ABSTRACT SIMILARITY METRIC IN SPEECH DIAR...
 
The Impact of Allee Effect on a Predator-Prey Model with Holling Type II Func...
The Impact of Allee Effect on a Predator-Prey Model with Holling Type II Func...The Impact of Allee Effect on a Predator-Prey Model with Holling Type II Func...
The Impact of Allee Effect on a Predator-Prey Model with Holling Type II Func...
 
A POSSIBLE RESOLUTION TO HILBERT’S FIRST PROBLEM BY APPLYING CANTOR’S DIAGONA...
A POSSIBLE RESOLUTION TO HILBERT’S FIRST PROBLEM BY APPLYING CANTOR’S DIAGONA...A POSSIBLE RESOLUTION TO HILBERT’S FIRST PROBLEM BY APPLYING CANTOR’S DIAGONA...
A POSSIBLE RESOLUTION TO HILBERT’S FIRST PROBLEM BY APPLYING CANTOR’S DIAGONA...
 
Moving Target Detection Using CA, SO and GO-CFAR detectors in Nonhomogeneous ...
Moving Target Detection Using CA, SO and GO-CFAR detectors in Nonhomogeneous ...Moving Target Detection Using CA, SO and GO-CFAR detectors in Nonhomogeneous ...
Moving Target Detection Using CA, SO and GO-CFAR detectors in Nonhomogeneous ...
 
OPTIMIZING SIMILARITY THRESHOLD FOR ABSTRACT SIMILARITY METRIC IN SPEECH DIAR...
OPTIMIZING SIMILARITY THRESHOLD FOR ABSTRACT SIMILARITY METRIC IN SPEECH DIAR...OPTIMIZING SIMILARITY THRESHOLD FOR ABSTRACT SIMILARITY METRIC IN SPEECH DIAR...
OPTIMIZING SIMILARITY THRESHOLD FOR ABSTRACT SIMILARITY METRIC IN SPEECH DIAR...
 
Modified Alpha-Rooting Color Image Enhancement Method on the Two Side 2-D Qua...
Modified Alpha-Rooting Color Image Enhancement Method on the Two Side 2-D Qua...Modified Alpha-Rooting Color Image Enhancement Method on the Two Side 2-D Qua...
Modified Alpha-Rooting Color Image Enhancement Method on the Two Side 2-D Qua...
 
A Study on L-Fuzzy Normal Subl-GROUP
A Study on L-Fuzzy Normal Subl-GROUPA Study on L-Fuzzy Normal Subl-GROUP
A Study on L-Fuzzy Normal Subl-GROUP
 
An Application of Assignment Problem in Laptop Selection Problem Using MATLAB
An Application of Assignment Problem in Laptop Selection Problem Using MATLABAn Application of Assignment Problem in Laptop Selection Problem Using MATLAB
An Application of Assignment Problem in Laptop Selection Problem Using MATLAB
 
ON β-Normal Spaces
ON β-Normal SpacesON β-Normal Spaces
ON β-Normal Spaces
 
Cubic Response Surface Designs Using Bibd in Four Dimensions
Cubic Response Surface Designs Using Bibd in Four DimensionsCubic Response Surface Designs Using Bibd in Four Dimensions
Cubic Response Surface Designs Using Bibd in Four Dimensions
 
Quantum Variation about Geodesics
Quantum Variation about GeodesicsQuantum Variation about Geodesics
Quantum Variation about Geodesics
 
Approximate Analytical Solution of Non-Linear Boussinesq Equation for the Uns...
Approximate Analytical Solution of Non-Linear Boussinesq Equation for the Uns...Approximate Analytical Solution of Non-Linear Boussinesq Equation for the Uns...
Approximate Analytical Solution of Non-Linear Boussinesq Equation for the Uns...
 
Common Fixed Point Theorems in Compatible Mappings of Type (P*) of Generalize...
Common Fixed Point Theorems in Compatible Mappings of Type (P*) of Generalize...Common Fixed Point Theorems in Compatible Mappings of Type (P*) of Generalize...
Common Fixed Point Theorems in Compatible Mappings of Type (P*) of Generalize...
 
A Probabilistic Algorithm for Computation of Polynomial Greatest Common with ...
A Probabilistic Algorithm for Computation of Polynomial Greatest Common with ...A Probabilistic Algorithm for Computation of Polynomial Greatest Common with ...
A Probabilistic Algorithm for Computation of Polynomial Greatest Common with ...
 
Table of Contents - September 2022, Volume 9, Number 2/3
Table of Contents - September 2022, Volume 9, Number 2/3Table of Contents - September 2022, Volume 9, Number 2/3
Table of Contents - September 2022, Volume 9, Number 2/3
 

Recently uploaded

Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 

Recently uploaded (20)

Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 

EDGE-NEIGHBOR RUPTURE DEGREE ON GRAPH OPERATIONS

  • 1. Applied Mathematics and Sciences: An International Journal (MathSJ ), Vol. 5, No. 1/2/3, September 2018 DOI : 10.5121/mathsj.2018.5301 1 EDGE-NEIGHBOR RUPTURE DEGREE ON GRAPH OPERATIONS Saadet Eskiizmirliler 1 , Zeynep Örs Yorgan cioğlu2 , Refet Polat3 And Mehmet Ümit Gürsoy4 1,3 Department of Mathematics, Faculty of Science, Yasar University, Izmir, Turkey, 2 Maritime and Port Management Program, Vocational School, Yasar University, Izmir, Turkey, 4 Izmir, Turkey, ABSTRACT Vulnerability and reliability parameters measure the resistance of the network to disruption of operation after the failure of certain stations or communication links in a communication network. An edge subversion strategy of a graph , say , is a set of edge(s) in whose adjacent vertices which is incident with the removal edge(s) are removed from . The survival subgraph is denoted by − . The edge- neighbor-rupture degree of connected graph , , is defined to be = − − | | − − : ⊆ , − ≥ 1 where is any edge-cut-strategy of , − is the number of the components of − , and − is the maximum order of the components of − . In this paper we give some results for the edge-neighbor-rupture degree of the graph operations and Thorny graph types are examined. KEYWORDS Edge-neighbor-rupture degree, Thorny graphs, Vulnerability, Reliability. 1. INTRODUCTION A communication network can be brokedown to pieces partially or completely from unexpected factors. This situation can prevent data transmit so there would be a big problem on the system to perform it’s task. Therefore, the vulnerability and the reliability measure the resistance of the network disturbance of operations after the failure of certain stations. To measure the vulnerability and the reliability we have some parameters which are connectivity [7,11,12], integrity [3], scattering number [8], rupture degree [9], neighbor-rupture degree [1] and edge- neighbor-rupture degree [2]. Terminology and notations are not defined in this paper but it can be found [4,5]. Let = , be a simple graph and let e be any edge of . The set, = ∈ | ≠ ; ! " is the open neighborhood of e, and [e] = {e} ∪ (e) is the closed neighborhood of e. An edge e in is said to be subverted if the closed neighborhood of e is removed from . In other words, if = $, % than − &e( = − $, % . A set of edges = ), *, … , , is called an edge subversion strategy of if each of the edges in has been subverted from . If has been subverted from the graph , then the remaining graph is called survival graph, denoted by − . An edge subversion strategy is called an edge-cut- strategy of if the survival subgraph − is disconnected or is a single vertex or the empty graph
  • 2. Applied Mathematics and Sciences: An International Journal (MathSJ ), Vol. 5, No. 1/2/3, September 2018 2 [10]. is any edge-cut-strategy of , ( − ) is the number of the components of − , and ( − ) is the maximum order of the components of − . The definition of edge-neighbor-rupture degree of a connected graph is = − − | | − − : ⊆ , − ≥ 1 . Definition 1.1: ∈ - and ∀% ∈ V for each vertex of , if deg % = than is called r- regular graph [4]. Definition 1.2: ) and * graphs have disjoint vertex sets ) and * and edge sets ) and * respectively. The join operation of two ) and * graphs is denoted by ) + * and consist of ) ∪ *which is union of two ) and * graphs and all edges joining ) and *[4]. Definition 1.3:Let 3), 3*, … , 34be non-negative integers. The Thorny Graph of the graph , with parameters3), 3*, … , 34,is obtained by attaching 35 new vertices of degree one to the vertex$5 of the graph , 6 = 1,2, … , . The Thorny graph of the graph is denoted by ⋆ , or if the respectiveparameters need to be specified, by ⋆ 3), 3*, … , 34 [6]. Definition 1.4:Forthree or more disjoint graphs ), *, … , 4 , the sequential join ) + * + ⋯ + 4 is the graph ) + * ∪ * + : ∪ … ∪ 4;) + 4 [4]. Definition 1.5: Connectivity < is the minimum number of vertices that need to be removed in order to disconnect a graph [4]. Definition 1.6: The integrity of a graph = , is defined by = = 6 | | + − ; ⊂ where − denotes the order of largest component in − [3]. Definition 1.7: The rupture degree of a non-complete connected graph is defined by = − − | | − − : ⊂ , − ˃ 1 where − denotes the number of components in the graph − and − is the order of the largest component of − [9]. Definition 1.8: The neighbor integrity of a graph is defined by = = 6 | | + ! − : ⊂ where is any vertex subversion strategy of and ! − is the order of the largest component of − [10]. Definition 1.9: The neighbor rupture degree of a non-complete connected graph is defined to be = − − | | − ! − : ⊂ , − ≥ 1 where is any vertex subversion strategy of , − is the number of connected components in − and ! − is the maximum order of the components of − [13]. Definition 1.10: The edge-neighbor-rupture degree of a connected graph is defined to be = − − | | − − ∶ ⊆ , − ≥ 1 , where is any edge-
  • 3. Applied Mathematics and Sciences: An International Journal (MathSJ ), Vol. 5, No. 1/2/3, September 2018 3 cut-strategy of , − is the number of the components of − , and − is the maximum order of the components of − . Example:Let's give an exampleof the calculation of the edge-neighbor- rupture-degree. − = 1 | | = 0 − = 19 − − | | − − = 1 − 0 − 19 = −18 Figure 1.1 − = 6 | | = 3 − = 7 − − | | − − = 6 − 3 − 7 = −4 Figure 1.2 − = 8 | | = 5 − = 2 − − | | − − = 8 − 5 − 2 = 1 Figure 1.3 − = 9 | | = 5 − = 1 − − | | − − = 9 − 5 − 1 = 3 Figure 1.4 − = 9 | | = 5 − = 1 − − | | − − = 9 − 5 − 1 = 3 Figure 1.5
  • 4. Applied Mathematics and Sciences: An International Journal (MathSJ ), Vol. 5, No. 1/2/3, September 2018 4 As shown, figure 1.1, figure 1.2,figure 1.3,figure 1.4 and figure 1.5 = −18, −4,1,3,3 = 3. In this paper, the edge-neighbor-rupture degree of some graphs is obtained and the relations between edge-neighbor-rupture degree and other parameters are determined [2]. 2. EDGE-NEIGHBOR-RUPTURE DEGREE ON GRAPH OPERATIONS In this section some theorems are given for edge-neighbor-rupture degree on the graph operations. Connected, undirected, simple graphs are examined. Theorem 2.1:Let be a regular graph and ⋆ is a thorny graph of (adding a vertex to any vertex of a graph). Then the edge-neighbor-rupture degree of is, ⋆ = + 1. Proof:Since is regular graph, you can start from any edge to delete. There are two cases. Case 1: If we start to delete an edge that is incident to an added vertex, while Sedge-cut- strategynumber is not changing,( − ) numbers of components are increased 1. So the result is increased 1. Case 2:If we start to delete an edge that is not incident to an added vertex, while Sedge-cut- strategy number and the number of the components are not changed, maximum order of the components are increased. So the result is increased. The result takes maximum value in case 1. So the proof is completed.■ Theorem 2.2: Edge-neighbor-rupture degree of thorny of regular graph (adding i vertices equally to every vertex of a graph for1 ≤ 6 ≤ ) is, ⋆ = 6 − J 4 * K − 1. Proof: Let S be anedge-cut-strategyof ⋆ and let | | = . There are two cases for the elements of . Case 1: If 0 ≤ < J 4 * K, then ⋆ − ≤ 2 6 + 1 and ⋆ − ≥ 6 + 1, so we have ⋆ − − | | − ⋆ − ≤ 2 6 + 1 − − 6 + 1 = 2 6 − − 6. Let’s = 2 6 − − 6 . Since is an increasing function in 0 ≤ < J 4 * K, it takes its maximum value at MJ 4 * K − 1N, and MJ 2 K − 1N = 2 MJ 2 K − 1N 6 − J 2 K − 6.
  • 5. Applied Mathematics and Sciences: An International Journal (MathSJ ), Vol. 5, No. 1/2/3, September 2018 5 Thus we get ⋆ ≤ 2 MJ 4 * K − 1N 6 − J 4 * K − 6 . Case 2: If J 4 * K ≤ ≤ :4P;4 * , then ⋆ − ≤ 6and ⋆ − ≥ 1, so we have ⋆ − − | | − ⋆ − ≤ 6 − − 1. Let’s = 6 − − 1.Since is a decreasing function in 0 ≤ < J 4 * K, it takes its maximum value at J 4 * K, and MJ 4 * KN = 6 − J 4 * K − 1. Thus we get ⋆ ≤ 6 − J 4 * K − 1. From Case1 and Case 2 we have ⋆ ≤ 6 − J 4 * K − 1. (1) There exist ∗ such that = J 4 * K, ⋆ − ∗ = 6 and ⋆ − ∗ = 1, thus we have ⋆ ≥ 6 − J 4 * K − 1. (2) From (1) and (2) we get ⋆ = 6 − J 4 * K − 1. ■ Corollary 2.1: LetR4 ⋆ is a Thorny graph of R4 (adding i vertices equally to every vertex of a graph for2 ≤ 6 ≤ ). Then the edge-neighbor-rupture degree of R4 ⋆ is, R4 ⋆ = 6 − J 4 * K − 1. Proof: It is the same as proof of Theorem 2.2 ■ Corollary 2.2: LetS4 ⋆ is a Thorny graph of S4 (adding i vertices equally to every vertex of a graph for2 ≤ 6 ≤ ). Then the edge-neighbor-rupture degree of S4 ⋆ is, S4 ⋆ = 6 − J 4 * K − 1. Proof: It is the same as proof of Theorem 2.2. ■ Theorem 2.3: Edge-neighbor-rupture degree of Thorny graphof 4 is 6 ≥ 2 , 4 ⋆ = 6 − . Proof: Let S be an edge-cut-strategyof 4 ⋆ and let | | = . There are two cases for the elements of .
  • 6. Applied Mathematics and Sciences: An International Journal (MathSJ ), Vol. 5, No. 1/2/3, September 2018 6 Case 1: If 0 ≤ < − 1, then 4 ⋆ − ≤ 6 + 1 and 4 ⋆ − ≥ 6 + 1, so we have 4 ⋆ − − | | − 4 ⋆ − ≤ 6 + 1 − − 6 + 1 = 6 − − 6. Let = 6 − − 6 . Since is an increasing function in 0 ≤ < − 1, it takes its maximum value − 2 and − 2 = − 2 6 − 1 − 6. Thus we get 4 ⋆ ≤ 6 − − 36 + 2. Case 2: If − 1 ≤ ≤ * + − 1 then 4 ⋆ − ≤ 6 and 4 ⋆ − ≥ 1, so we have 4 ⋆ − − | | − 4 ⋆ − ≤ 6 − − 1. Let = 6 − − 1.Since is a decreasing function in − 1 ≤ ≤ * + − 1it takes its maximum value at − 1 and − 1 = 6 − + 1 − 1 = 6 − . Thus we get 4 ⋆ ≤ 6 − . From Case1 and Case 2 we have 4 ⋆ ≤ 6 − . (3) There exist ∗ such that = − 1, 4 ⋆ − ∗ = 6 and 4 ⋆ − ∗ = 1, thus we have 4 ⋆ ≥ 6 − . (4) From (3) and (4) we get 4 ⋆ = 6 − . ■ Theorem 2.4: Let R4,R, is a path of order and respectively. The edge-neighbor-rupture degree of addition of R4 and R, is, R4 + R, = T R, − 2 , 6U % R,;) − J 2 K , 6U V W , < Proof: Case 1:If we select an edge-cut-strategy fromR4, we needed 4 * edges to delete all the edges of R4 soR,is remained. Therefore, R4 + R, = T R, − 2 , 6U % R,;) − J 2 K , 6U V W Case 2: If we select an edge-cut-strategy from combining edges of R4 and R,, We get, R4 + R, = R,;4 − .
  • 7. Applied Mathematics and Sciences: An International Journal (MathSJ ), Vol. 5, No. 1/2/3, September 2018 7 Case 3:If we select an edge-cut-strategy fromR,, we need 4 * edges to delete all the edges of R,soR4 is remained. Therefore, R4 + R, = T R4 − 2 , 6U % R4;) − J 2 K , 6U V W The results take maximum value in case 1. So the proof is completed. Corollary 2.3: The edge-neighbor-rupture degree of R*+R4 is, R* + R, = R4 − 1 . Theorem 2.5: Let ), *, … , 4be connected graphs then, ) ∪ * ∪ … ∪ 4 ≥ ) + * + ⋯ + 4 Proof: Let = ) ∪ * ∪ … ∪ 4be union of ), *, … , 4. Let = ), *, … , 4 be an edge Nr- set of ), *, … , 4 respectively and let = ) ∪ * ∪ … ∪ 4be an edge-subversion strategy of . Then we obtain, ≥ − − | | − − = & ) − ) + * − * + ⋯ + 4 − 4 ( − &| )| + | *| + ⋯ + | 4|( − & ) − ) + * − * + ⋯ + 4 − 4 ( = ) − ) − | )| − ) − ) + * − * − | *| − * − * + ⋯ + 4 − 4 − | 4| − 4 − 4 ) + * + ⋯ + 4 . ■ Theorem 2.6: Let be a connected graph, then the edge-neighbor-rupture degree of is, ≥ − X 2 Y. Proof: For the minimum value of , − must be the smallest, | | and − must be the greatest. Let S be an edge-cut-strategy of and | | = . There are two cases for the elements of . Case 1: If ≤ X 4;) * Ythen − = 1 and − ≥ − 2 . So we have − − | | − − ≤ 1 − − − 2 = 1 + − = . This equality takes maximum value for = X 4;) * Y. There are two conditions: Case i: If n is odd;
  • 8. Applied Mathematics and Sciences: An International Journal (MathSJ ), Vol. 5, No. 1/2/3, September 2018 8 = 1 + − 1 2 − = − − 1 2 = − X 2 Y. Case ii: If n is even; = 1 + − 2 2 − = − 2 Case 2: If 4 4;) * > > X 4;) * Y then − ≤ 1and − ≥ 1. − − | | − − ≤ 1 − − 1 = − . This equality takes the maximum value for = X 4 * Y. From all cases, we obtain, ≥ − X 4 * Y. ■ Corollary 2.4: Let be a connected graph, then the edge-neighbor-rupture degree of is, − X 4 * Y ≤ ≤ − 4. Proof: From Theorem 2.6 and [2], the proof is complete. ■ 3. COMPUTING EDGE-NEIGHBOR-RUPTURE DEGREE OF A GRAPH In this section, an algorithm is proposed in order to calculate the edge-neighbor-rupture degreefor any simple finite undirected graph without loops and multiple edges by using the findENR function. Algorithm Edge Neighbor Rupture (ENR) Output: ENR value for given any graph G Begin ENR←-∞; for all edge subsets [ ⊆ do if findENR( , [)> ENRthen ENR=findENR( , [); end end end. The function below,find ENR, returns the ENR value for the edge subset for the graph. function findENR( , [); Input: Graph , , edgesubset [ Output:ENR value for given an [edge subset of . Begin : vertex set incident with [ edges. for all $ ∈ do removeu from 6. . − end
  • 9. Applied Mathematics and Sciences: An International Journal (MathSJ ), Vol. 5, No. 1/2/3, September 2018 9 Componentnumber ← find the number of components of − MaxCompVertexnum ← find the vertex number of maximum component of − findENR←{Component number – number of ( [) – MaxCompVertexnum } end 4. CONCLUSION In this study, we investigate the edge-neighbor rupture degree of graphs obtained by graph operations. The graph operations are used to obtain new graphs. Union, join and mostly thorny operations are taken into consideration in this work. These operations are performed to various graphs and their edge-neighbor rupture degrees were determined. REFERENCES [1] S. Kandilci, G. Bacak-Turan&R. Polat, (2013), “Graph Operations and Neighbor Rupture Degree”, Journal of Applied Mathematics, Hindawi Publishing Corporation, Article ID 836395, http://dx.doi.org/10.1155/2013/836395. [2] E.Aslan, (2013), “Edge-Neighbor-Rupture Degree of Graphs”, Journal of Applied Mathematics,Hindawi Publishing Corporation.Article ID 783610. [3] C.A. Barefoot, R. Entringer&H. Swart, (1987), “Vulnerability in graphs -Acomparative survey”, Journal of Combinatorial Mathematics and Combinatorial Computing, vol1,pp 13-22. [4] F. Buckley & F. Harary, (1990), Distance in Graphs, Addision-Wesley Press. [5] G. Chartrand & L. Lesniak, (2005), Graphs & Digraphs, Chapman & Hall/CRC Press. [6] I. Gutman, (1998), “Distance of Thorny Graphs”, Publ. Institut Math. Nouvelle serie, vol63,pp 31-36. [7] J. A. Bondy & U. S. R.Murty, (1976), GraphTheory with Applications, The Macmillan Press. [8] H. A. Jung, (1978), “On a class of posets and the corresponding comparability graphs”,Journal of Combinatorial Theory B, vol 24,pp 125–133. [9] Y. Li, S. Zhang & X. Li, (2005), Rupture degree of graphs, International Journal of Computer Mathematics, vol 82,pp 793–803. [10] M. B. Cozzens & S. S.Y. Wu, (1998), “Vertex-neighbor-integrity ofpowers of cycles”,Ars Combinatoria, vol 48, pp257–270. [11] M. Saheli, H. Saati&A. R. Ashrafi,(2010), “The eccentric connectivity index of one pentagonal carbon nanocones”, Optoelectronics and Advanced Materials–Rapid Communications, vol4,pp 896– 897. [12] M. Ghorbani,(2010), “GA Index of TUC4C8(R) Nanotube”, Optoelectronics and Advanced Materials – Rapid Communications,vol 4, pp261–263. [13] G. Bacak Turan & A. Kırlangıc, (2010), “Vulnerability Parameters in Graphs” 1st International Symposium onComputing in Science and Engineering, Turkey. [14] M.Ü. Gürsoy,R. Polat, S. Eskiizmirliler&Z.Ö. Yorgancıoğlu (2014), “Edge-Neighbor-Rupture-Degree on graph operations”,9th AnkaraMath days, Atılım University, Ankara, Turkey.
  • 10. Applied Mathematics and Sciences: An International Journal (MathSJ ), Vol. 5, No. 1/2/3, September 2018 10 AUTHORS Saadet Eskiizmirliler She was graduated fromYaşar University Mathematics department in 2010, she had got master degree in 2012 fromYaşar University Math department and she has been doing doktorate at Yaşar University Math department at applied mathematics since 2014. She has been working at Yasar University since 2014. Zeynep Örs Yorgancioğlu She was graduated from Ege University Mathematics department in 2003, she had got master degree in 2010 from Ege University Math department and she had got Ph. D degree in 2015 from Ege University Math department at applied Mathematics. She has been working at Yasar University since 2007. Refet Polat Achieved his BSc degree in mathematics majoring in computer science at Ege University in 2000. He received his MSc and PhD degrees in applied mathematics at Ege University in 2003 and 2009. His research interests focus on applied mathematics, graph theory, ordinary differential equations, numerical methods, and artificial intelligence in education Mehmet Ümit Gürsoy He was graduated from Ege University Mathematics department in 2000, he had got master degree in 2005 from Ege University Math department and he had got Ph.D degree in 2014 from Ege University Math department at applied mathematics.