SlideShare a Scribd company logo
1 of 6
Download to read offline
International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks 
(GRAPH-HOC) Vol.6, No.3, September 2014 
EQUIVALENT CONDITION AND TWO 
ALGORITHMS FOR HAMILTONIAN GRAPHS 
A.Z.Abdian, , Hosseinhatami, F.Shahamiri 
Department of mathematics, college of science Lorestanuniversity, Lorestan, Iran 
ABSTRACT: 
In this paper we present a necessary and sufficient condition for Hamiltonian graphs and also 
twoalgorithms and two examples in another part. 
KEYWORDS: 
Hamiltonian Graph; Finite Sequence; Algorithm, Spanning graph, Edge Induced, Chord. 
1. INTRODUCTION 
We consider finite and simple graphs in this paper; undefined notations and terminology can be 
found in[1]. A Hamiltonian graph is a graph with a spanning cycle, also called a Hamiltonian 
cycle [2]. We note thatthe spanning cycle is not unique. Now suppose that E' is a nonempty 
subset of E. The sub graph of G where vertex set is the set of ends of edges in E' and whose edge 
set is E' is called the sub graph of G induced by E'and is denoted by G[E']; G[E'] is an edge-induced 
sub graph of G[1] . A chord of a cycle C is an edgenot in Cwhere endpoints put in G[2]. 
 = {  : is a cycle, such that it has an edge it ofE(G)}. 
We note that including the edge i th is not unique. In this paper we suppose that    , then G 
has a cycle at least.Let 	
  be cycles, if and
, with i
1are intersected, we call
a sequence of cycles.Also spanning sequence S is a sequence of cycles, which 
V[G]=V[S]. 
 
If	 and  are cycles of graph G such that V(	)  V() then we say that Extends	 . So 
C is a minimal cycle, if there is not a cycle  , where C extends  . 
2. MAIN RESULTS 
Theorem 2.1. If G is a graph of order n, then G is Hamiltonian if and only if G satisfies in the 
following condition (* ); 
(* ) There is a finite sequence of members, where this sequence is an edge-induced and spanning 
Sub graph (with initial cycle ), and only for every i that i 
1,
and  intersect in i, which i 
is an edge ofE(G). 
DOI:10.5121/jgraphoc.2014.6301 1
International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks 
(GRAPH-HOC) Vol.6, No.3, September 2014 
Proof (Necessity). We suppose that G is Hamiltonian, then G has at least one spanning cycle C, 
with sequence of distinct vertices
. If G = C, then we must consider C as a 
single sequence.But if G C, so complement of C in G has a finite number of edge (chord), 
which it is introduced by .We prove by induction on number of the chord i.e.  =  , the 
existence of sequence. 
But for k=2 , i.e. if there are two chords and , we will have two case. The first, for i j s t, 
there exists by Figure (2)  
2 
Remark 2.2. Indeed we give to make this sequence a finite number ofmembers. 
Basis step: if k=1 , this is obvious (look at the graph in Figure 1). 
 
 . In the second, if i j t s, according to the graph in Figure 3, 
we deleteone of the chords, and so by k=1 , there are two cycles. This is straightforward to 
understand that there isnot any case. 
''Figure(1), graph of k=1'' 
''Figure(2), graph of the first mode in k=2'' 
 
'' Figure(3), graph second mode in of the second mode in k=2' 
Induction step: We suppose that claim holds for all values less than m,also length of sequence is 
t .Now by adding chord m th, we establish the existence a spanning sequence of members, where 
only for every i with i
1, and are common in one edge i. If the chord m is in two distinct cycles 
and , such that g-h=r with r
1, i.e. endpoints are not just lied in one cycle. We give these cycles 
( r +1cycles) as two new cycle. Therefore a spanning sequence is found and the statement is

More Related Content

What's hot

Physics Research Summer2009
Physics Research Summer2009Physics Research Summer2009
Physics Research Summer2009Ryan Melvin
 
Novel analysis of transition probabilities in randomized k sat algorithm
Novel analysis of transition probabilities in randomized k sat algorithmNovel analysis of transition probabilities in randomized k sat algorithm
Novel analysis of transition probabilities in randomized k sat algorithmijfcstjournal
 
Asymptotic analysis
Asymptotic analysisAsymptotic analysis
Asymptotic analysisNisha Soms
 
Chapter 2 laplace transform
Chapter 2 laplace transformChapter 2 laplace transform
Chapter 2 laplace transformLenchoDuguma
 
Laplace transforms
Laplace transformsLaplace transforms
Laplace transformsKarnav Rana
 
My presentation minimum spanning tree
My presentation minimum spanning treeMy presentation minimum spanning tree
My presentation minimum spanning treeAlona Salva
 
The Laplace Transform of Modeling of a Spring-Mass-Damper System
The Laplace Transform of Modeling of a Spring-Mass-Damper System The Laplace Transform of Modeling of a Spring-Mass-Damper System
The Laplace Transform of Modeling of a Spring-Mass-Damper System Mahmoud Farg
 
Chapter 2 Laplace Transform
Chapter 2 Laplace TransformChapter 2 Laplace Transform
Chapter 2 Laplace TransformZakiah Saad
 
Integral Transform
Integral  TransformIntegral  Transform
Integral TransformSheharBano31
 
Marginal Deformations and Non-Integrability
Marginal Deformations and Non-IntegrabilityMarginal Deformations and Non-Integrability
Marginal Deformations and Non-IntegrabilityRene Kotze
 
Applications Of Laplace Transforms
Applications Of Laplace TransformsApplications Of Laplace Transforms
Applications Of Laplace TransformsKetaki_Pattani
 

What's hot (20)

Physics Research Summer2009
Physics Research Summer2009Physics Research Summer2009
Physics Research Summer2009
 
Novel analysis of transition probabilities in randomized k sat algorithm
Novel analysis of transition probabilities in randomized k sat algorithmNovel analysis of transition probabilities in randomized k sat algorithm
Novel analysis of transition probabilities in randomized k sat algorithm
 
Chap 2 discrete
Chap 2 discreteChap 2 discrete
Chap 2 discrete
 
Asymptotic analysis
Asymptotic analysisAsymptotic analysis
Asymptotic analysis
 
Chapter 2 laplace transform
Chapter 2 laplace transformChapter 2 laplace transform
Chapter 2 laplace transform
 
Laplace transforms
Laplace transformsLaplace transforms
Laplace transforms
 
25 String Matching
25 String Matching25 String Matching
25 String Matching
 
My presentation minimum spanning tree
My presentation minimum spanning treeMy presentation minimum spanning tree
My presentation minimum spanning tree
 
19 Minimum Spanning Trees
19 Minimum Spanning Trees19 Minimum Spanning Trees
19 Minimum Spanning Trees
 
Inverse Laplace Transform
Inverse Laplace TransformInverse Laplace Transform
Inverse Laplace Transform
 
The Laplace Transform of Modeling of a Spring-Mass-Damper System
The Laplace Transform of Modeling of a Spring-Mass-Damper System The Laplace Transform of Modeling of a Spring-Mass-Damper System
The Laplace Transform of Modeling of a Spring-Mass-Damper System
 
Chapter 2 Laplace Transform
Chapter 2 Laplace TransformChapter 2 Laplace Transform
Chapter 2 Laplace Transform
 
Laplace transform
Laplace transformLaplace transform
Laplace transform
 
Integral Transform
Integral  TransformIntegral  Transform
Integral Transform
 
Laplace transforms
Laplace transformsLaplace transforms
Laplace transforms
 
Laplace transforms
Laplace transformsLaplace transforms
Laplace transforms
 
Inverse laplace transforms
Inverse laplace transformsInverse laplace transforms
Inverse laplace transforms
 
Marginal Deformations and Non-Integrability
Marginal Deformations and Non-IntegrabilityMarginal Deformations and Non-Integrability
Marginal Deformations and Non-Integrability
 
Applications Of Laplace Transforms
Applications Of Laplace TransformsApplications Of Laplace Transforms
Applications Of Laplace Transforms
 
Laplace
LaplaceLaplace
Laplace
 

Viewers also liked

METRIC DIMENSION AND UNCERTAINTY OF TRAVERSING ROBOTS IN A NETWORK
METRIC DIMENSION AND UNCERTAINTY OF TRAVERSING ROBOTS IN A NETWORKMETRIC DIMENSION AND UNCERTAINTY OF TRAVERSING ROBOTS IN A NETWORK
METRIC DIMENSION AND UNCERTAINTY OF TRAVERSING ROBOTS IN A NETWORKgraphhoc
 
One modulo n gracefulness of
One modulo n gracefulness ofOne modulo n gracefulness of
One modulo n gracefulness ofgraphhoc
 
Graph Theory Application - Not Only for Engineering Problems
Graph Theory Application - Not Only for Engineering ProblemsGraph Theory Application - Not Only for Engineering Problems
Graph Theory Application - Not Only for Engineering ProblemsSociety of Women Engineers
 
the bike map - a look into a practical application of graph theory
the bike map - a look into a practical application of graph theorythe bike map - a look into a practical application of graph theory
the bike map - a look into a practical application of graph theoryCharlie Hsu
 
Application of graph theory in drug design
Application of graph theory in drug designApplication of graph theory in drug design
Application of graph theory in drug designReihaneh Safavi
 
Interesting applications of graph theory
Interesting applications of graph theoryInteresting applications of graph theory
Interesting applications of graph theoryTech_MX
 

Viewers also liked (6)

METRIC DIMENSION AND UNCERTAINTY OF TRAVERSING ROBOTS IN A NETWORK
METRIC DIMENSION AND UNCERTAINTY OF TRAVERSING ROBOTS IN A NETWORKMETRIC DIMENSION AND UNCERTAINTY OF TRAVERSING ROBOTS IN A NETWORK
METRIC DIMENSION AND UNCERTAINTY OF TRAVERSING ROBOTS IN A NETWORK
 
One modulo n gracefulness of
One modulo n gracefulness ofOne modulo n gracefulness of
One modulo n gracefulness of
 
Graph Theory Application - Not Only for Engineering Problems
Graph Theory Application - Not Only for Engineering ProblemsGraph Theory Application - Not Only for Engineering Problems
Graph Theory Application - Not Only for Engineering Problems
 
the bike map - a look into a practical application of graph theory
the bike map - a look into a practical application of graph theorythe bike map - a look into a practical application of graph theory
the bike map - a look into a practical application of graph theory
 
Application of graph theory in drug design
Application of graph theory in drug designApplication of graph theory in drug design
Application of graph theory in drug design
 
Interesting applications of graph theory
Interesting applications of graph theoryInteresting applications of graph theory
Interesting applications of graph theory
 

Similar to Hamiltonian Graph Algorithm Conditions Cycles

EQUIVALENT CONDITION AND TWO ALGORITHMS FOR HAMILTONIAN GRAPHS
EQUIVALENT CONDITION AND TWO ALGORITHMS FOR HAMILTONIAN GRAPHSEQUIVALENT CONDITION AND TWO ALGORITHMS FOR HAMILTONIAN GRAPHS
EQUIVALENT CONDITION AND TWO ALGORITHMS FOR HAMILTONIAN GRAPHSFransiskeran
 
Comparative Report Ed098
Comparative Report Ed098Comparative Report Ed098
Comparative Report Ed098mikebrowl
 
A Detailed Comparative Study between Reduced Order Cumming Observer & Reduced...
A Detailed Comparative Study between Reduced Order Cumming Observer & Reduced...A Detailed Comparative Study between Reduced Order Cumming Observer & Reduced...
A Detailed Comparative Study between Reduced Order Cumming Observer & Reduced...IJERD Editor
 
EM_II_Project_London_Julia
EM_II_Project_London_JuliaEM_II_Project_London_Julia
EM_II_Project_London_JuliaJulia London
 
A Route to Chaos for the Physical Double Pendulum by
A Route to Chaos for the Physical Double Pendulum by A Route to Chaos for the Physical Double Pendulum by
A Route to Chaos for the Physical Double Pendulum by Daniel Berkowitz
 
Xtc a practical topology control algorithm for ad hoc networks (synopsis)
Xtc a practical topology control algorithm for ad hoc networks (synopsis)Xtc a practical topology control algorithm for ad hoc networks (synopsis)
Xtc a practical topology control algorithm for ad hoc networks (synopsis)Mumbai Academisc
 
Cs6702 graph theory and applications Anna University question paper apr may 2...
Cs6702 graph theory and applications Anna University question paper apr may 2...Cs6702 graph theory and applications Anna University question paper apr may 2...
Cs6702 graph theory and applications Anna University question paper apr may 2...appasami
 
ON ALGORITHMIC PROBLEMS CONCERNING GRAPHS OF HIGHER DEGREE OF SYMMETRY
ON ALGORITHMIC PROBLEMS CONCERNING GRAPHS OF HIGHER DEGREE OF SYMMETRYON ALGORITHMIC PROBLEMS CONCERNING GRAPHS OF HIGHER DEGREE OF SYMMETRY
ON ALGORITHMIC PROBLEMS CONCERNING GRAPHS OF HIGHER DEGREE OF SYMMETRYFransiskeran
 
An Optimal Solution For The Channel-Assignment Problem
An Optimal Solution For The Channel-Assignment ProblemAn Optimal Solution For The Channel-Assignment Problem
An Optimal Solution For The Channel-Assignment ProblemSarah Morrow
 
A COUNTEREXAMPLE TO THE FORWARD RECURSION IN FUZZY CRITICAL PATH ANALYSIS UND...
A COUNTEREXAMPLE TO THE FORWARD RECURSION IN FUZZY CRITICAL PATH ANALYSIS UND...A COUNTEREXAMPLE TO THE FORWARD RECURSION IN FUZZY CRITICAL PATH ANALYSIS UND...
A COUNTEREXAMPLE TO THE FORWARD RECURSION IN FUZZY CRITICAL PATH ANALYSIS UND...Wireilla
 

Similar to Hamiltonian Graph Algorithm Conditions Cycles (20)

EQUIVALENT CONDITION AND TWO ALGORITHMS FOR HAMILTONIAN GRAPHS
EQUIVALENT CONDITION AND TWO ALGORITHMS FOR HAMILTONIAN GRAPHSEQUIVALENT CONDITION AND TWO ALGORITHMS FOR HAMILTONIAN GRAPHS
EQUIVALENT CONDITION AND TWO ALGORITHMS FOR HAMILTONIAN GRAPHS
 
Comparative Report Ed098
Comparative Report Ed098Comparative Report Ed098
Comparative Report Ed098
 
Siegel
SiegelSiegel
Siegel
 
Feedback Vertex Set
Feedback Vertex SetFeedback Vertex Set
Feedback Vertex Set
 
A Detailed Comparative Study between Reduced Order Cumming Observer & Reduced...
A Detailed Comparative Study between Reduced Order Cumming Observer & Reduced...A Detailed Comparative Study between Reduced Order Cumming Observer & Reduced...
A Detailed Comparative Study between Reduced Order Cumming Observer & Reduced...
 
EM_II_Project_London_Julia
EM_II_Project_London_JuliaEM_II_Project_London_Julia
EM_II_Project_London_Julia
 
64 66
64 6664 66
64 66
 
A Route to Chaos for the Physical Double Pendulum by
A Route to Chaos for the Physical Double Pendulum by A Route to Chaos for the Physical Double Pendulum by
A Route to Chaos for the Physical Double Pendulum by
 
ON SUB RIEMANNIAN STRUCTURES AND RELATED MECHANICS
ON SUB RIEMANNIAN STRUCTURES AND RELATED MECHANICSON SUB RIEMANNIAN STRUCTURES AND RELATED MECHANICS
ON SUB RIEMANNIAN STRUCTURES AND RELATED MECHANICS
 
5. Rao Li.pdf
5. Rao Li.pdf5. Rao Li.pdf
5. Rao Li.pdf
 
5. Rao Li.pdf
5. Rao Li.pdf5. Rao Li.pdf
5. Rao Li.pdf
 
graphs
graphsgraphs
graphs
 
Shm 1
Shm 1Shm 1
Shm 1
 
Xtc a practical topology control algorithm for ad hoc networks (synopsis)
Xtc a practical topology control algorithm for ad hoc networks (synopsis)Xtc a practical topology control algorithm for ad hoc networks (synopsis)
Xtc a practical topology control algorithm for ad hoc networks (synopsis)
 
Cs6702 graph theory and applications Anna University question paper apr may 2...
Cs6702 graph theory and applications Anna University question paper apr may 2...Cs6702 graph theory and applications Anna University question paper apr may 2...
Cs6702 graph theory and applications Anna University question paper apr may 2...
 
ON ALGORITHMIC PROBLEMS CONCERNING GRAPHS OF HIGHER DEGREE OF SYMMETRY
ON ALGORITHMIC PROBLEMS CONCERNING GRAPHS OF HIGHER DEGREE OF SYMMETRYON ALGORITHMIC PROBLEMS CONCERNING GRAPHS OF HIGHER DEGREE OF SYMMETRY
ON ALGORITHMIC PROBLEMS CONCERNING GRAPHS OF HIGHER DEGREE OF SYMMETRY
 
group 9 sec c3 .docx
group 9 sec  c3 .docxgroup 9 sec  c3 .docx
group 9 sec c3 .docx
 
An Optimal Solution For The Channel-Assignment Problem
An Optimal Solution For The Channel-Assignment ProblemAn Optimal Solution For The Channel-Assignment Problem
An Optimal Solution For The Channel-Assignment Problem
 
DAA_Presentation - Copy.pptx
DAA_Presentation - Copy.pptxDAA_Presentation - Copy.pptx
DAA_Presentation - Copy.pptx
 
A COUNTEREXAMPLE TO THE FORWARD RECURSION IN FUZZY CRITICAL PATH ANALYSIS UND...
A COUNTEREXAMPLE TO THE FORWARD RECURSION IN FUZZY CRITICAL PATH ANALYSIS UND...A COUNTEREXAMPLE TO THE FORWARD RECURSION IN FUZZY CRITICAL PATH ANALYSIS UND...
A COUNTEREXAMPLE TO THE FORWARD RECURSION IN FUZZY CRITICAL PATH ANALYSIS UND...
 

More from graphhoc

ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFER...
ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFER...ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFER...
ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFER...graphhoc
 
The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...
The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...
The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...graphhoc
 
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHS
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHSDISTANCE TWO LABELING FOR MULTI-STOREY GRAPHS
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHSgraphhoc
 
Impact of Mobility for Qos Based Secure Manet
Impact of Mobility for Qos Based Secure Manet  Impact of Mobility for Qos Based Secure Manet
Impact of Mobility for Qos Based Secure Manet graphhoc
 
A Transmission Range Based Clustering Algorithm for Topology Control Manet
A Transmission Range Based Clustering Algorithm for Topology Control ManetA Transmission Range Based Clustering Algorithm for Topology Control Manet
A Transmission Range Based Clustering Algorithm for Topology Control Manetgraphhoc
 
A Battery Power Scheduling Policy with Hardware Support In Mobile Devices
A Battery Power Scheduling Policy with Hardware Support In Mobile Devices A Battery Power Scheduling Policy with Hardware Support In Mobile Devices
A Battery Power Scheduling Policy with Hardware Support In Mobile Devices graphhoc
 
A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...
 A Review of the Energy Efficient and Secure Multicast Routing Protocols for ... A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...
A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...graphhoc
 
Case Study On Social Engineering Techniques for Persuasion Full Text
Case Study On Social Engineering Techniques for Persuasion   Full Text Case Study On Social Engineering Techniques for Persuasion   Full Text
Case Study On Social Engineering Techniques for Persuasion Full Text graphhoc
 
Breaking the Legend: Maxmin Fairness notion is no longer effective
Breaking the Legend: Maxmin Fairness notion is no longer effective  Breaking the Legend: Maxmin Fairness notion is no longer effective
Breaking the Legend: Maxmin Fairness notion is no longer effective graphhoc
 
I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...
I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...
I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...graphhoc
 
Fault tolerant wireless sensor mac protocol for efficient collision avoidance
Fault tolerant wireless sensor mac protocol for efficient collision avoidanceFault tolerant wireless sensor mac protocol for efficient collision avoidance
Fault tolerant wireless sensor mac protocol for efficient collision avoidancegraphhoc
 
Enhancing qo s and qoe in ims enabled next generation networks
Enhancing qo s and qoe in ims enabled next generation networksEnhancing qo s and qoe in ims enabled next generation networks
Enhancing qo s and qoe in ims enabled next generation networksgraphhoc
 
Simulated annealing for location area planning in cellular networks
Simulated annealing for location area planning in cellular networksSimulated annealing for location area planning in cellular networks
Simulated annealing for location area planning in cellular networksgraphhoc
 
Secure key exchange and encryption mechanism for group communication in wirel...
Secure key exchange and encryption mechanism for group communication in wirel...Secure key exchange and encryption mechanism for group communication in wirel...
Secure key exchange and encryption mechanism for group communication in wirel...graphhoc
 
Simulation to track 3 d location in gsm through ns2 and real life
Simulation to track 3 d location in gsm through ns2 and real lifeSimulation to track 3 d location in gsm through ns2 and real life
Simulation to track 3 d location in gsm through ns2 and real lifegraphhoc
 
Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...
Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...
Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...graphhoc
 
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...graphhoc
 
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...graphhoc
 
An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles
An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles  An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles
An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles graphhoc
 
ACTOR GARBAGE COLLECTION IN DISTRIBUTED SYSTEMS USING GRAPH TRANSFORMATION
ACTOR GARBAGE COLLECTION IN DISTRIBUTED SYSTEMS USING GRAPH TRANSFORMATIONACTOR GARBAGE COLLECTION IN DISTRIBUTED SYSTEMS USING GRAPH TRANSFORMATION
ACTOR GARBAGE COLLECTION IN DISTRIBUTED SYSTEMS USING GRAPH TRANSFORMATIONgraphhoc
 

More from graphhoc (20)

ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFER...
ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFER...ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFER...
ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFER...
 
The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...
The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...
The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...
 
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHS
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHSDISTANCE TWO LABELING FOR MULTI-STOREY GRAPHS
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHS
 
Impact of Mobility for Qos Based Secure Manet
Impact of Mobility for Qos Based Secure Manet  Impact of Mobility for Qos Based Secure Manet
Impact of Mobility for Qos Based Secure Manet
 
A Transmission Range Based Clustering Algorithm for Topology Control Manet
A Transmission Range Based Clustering Algorithm for Topology Control ManetA Transmission Range Based Clustering Algorithm for Topology Control Manet
A Transmission Range Based Clustering Algorithm for Topology Control Manet
 
A Battery Power Scheduling Policy with Hardware Support In Mobile Devices
A Battery Power Scheduling Policy with Hardware Support In Mobile Devices A Battery Power Scheduling Policy with Hardware Support In Mobile Devices
A Battery Power Scheduling Policy with Hardware Support In Mobile Devices
 
A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...
 A Review of the Energy Efficient and Secure Multicast Routing Protocols for ... A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...
A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...
 
Case Study On Social Engineering Techniques for Persuasion Full Text
Case Study On Social Engineering Techniques for Persuasion   Full Text Case Study On Social Engineering Techniques for Persuasion   Full Text
Case Study On Social Engineering Techniques for Persuasion Full Text
 
Breaking the Legend: Maxmin Fairness notion is no longer effective
Breaking the Legend: Maxmin Fairness notion is no longer effective  Breaking the Legend: Maxmin Fairness notion is no longer effective
Breaking the Legend: Maxmin Fairness notion is no longer effective
 
I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...
I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...
I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...
 
Fault tolerant wireless sensor mac protocol for efficient collision avoidance
Fault tolerant wireless sensor mac protocol for efficient collision avoidanceFault tolerant wireless sensor mac protocol for efficient collision avoidance
Fault tolerant wireless sensor mac protocol for efficient collision avoidance
 
Enhancing qo s and qoe in ims enabled next generation networks
Enhancing qo s and qoe in ims enabled next generation networksEnhancing qo s and qoe in ims enabled next generation networks
Enhancing qo s and qoe in ims enabled next generation networks
 
Simulated annealing for location area planning in cellular networks
Simulated annealing for location area planning in cellular networksSimulated annealing for location area planning in cellular networks
Simulated annealing for location area planning in cellular networks
 
Secure key exchange and encryption mechanism for group communication in wirel...
Secure key exchange and encryption mechanism for group communication in wirel...Secure key exchange and encryption mechanism for group communication in wirel...
Secure key exchange and encryption mechanism for group communication in wirel...
 
Simulation to track 3 d location in gsm through ns2 and real life
Simulation to track 3 d location in gsm through ns2 and real lifeSimulation to track 3 d location in gsm through ns2 and real life
Simulation to track 3 d location in gsm through ns2 and real life
 
Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...
Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...
Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...
 
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
 
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...
 
An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles
An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles  An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles
An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles
 
ACTOR GARBAGE COLLECTION IN DISTRIBUTED SYSTEMS USING GRAPH TRANSFORMATION
ACTOR GARBAGE COLLECTION IN DISTRIBUTED SYSTEMS USING GRAPH TRANSFORMATIONACTOR GARBAGE COLLECTION IN DISTRIBUTED SYSTEMS USING GRAPH TRANSFORMATION
ACTOR GARBAGE COLLECTION IN DISTRIBUTED SYSTEMS USING GRAPH TRANSFORMATION
 

Recently uploaded

UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIkoyaldeepu123
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture designssuser87fa0c1
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 

Recently uploaded (20)

UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture design
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 

Hamiltonian Graph Algorithm Conditions Cycles

  • 1. International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks (GRAPH-HOC) Vol.6, No.3, September 2014 EQUIVALENT CONDITION AND TWO ALGORITHMS FOR HAMILTONIAN GRAPHS A.Z.Abdian, , Hosseinhatami, F.Shahamiri Department of mathematics, college of science Lorestanuniversity, Lorestan, Iran ABSTRACT: In this paper we present a necessary and sufficient condition for Hamiltonian graphs and also twoalgorithms and two examples in another part. KEYWORDS: Hamiltonian Graph; Finite Sequence; Algorithm, Spanning graph, Edge Induced, Chord. 1. INTRODUCTION We consider finite and simple graphs in this paper; undefined notations and terminology can be found in[1]. A Hamiltonian graph is a graph with a spanning cycle, also called a Hamiltonian cycle [2]. We note thatthe spanning cycle is not unique. Now suppose that E' is a nonempty subset of E. The sub graph of G where vertex set is the set of ends of edges in E' and whose edge set is E' is called the sub graph of G induced by E'and is denoted by G[E']; G[E'] is an edge-induced sub graph of G[1] . A chord of a cycle C is an edgenot in Cwhere endpoints put in G[2]. = { : is a cycle, such that it has an edge it ofE(G)}. We note that including the edge i th is not unique. In this paper we suppose that , then G has a cycle at least.Let be cycles, if and
  • 2. , with i 1are intersected, we call
  • 3. a sequence of cycles.Also spanning sequence S is a sequence of cycles, which V[G]=V[S]. If and are cycles of graph G such that V( ) V() then we say that Extends . So C is a minimal cycle, if there is not a cycle , where C extends . 2. MAIN RESULTS Theorem 2.1. If G is a graph of order n, then G is Hamiltonian if and only if G satisfies in the following condition (* ); (* ) There is a finite sequence of members, where this sequence is an edge-induced and spanning Sub graph (with initial cycle ), and only for every i that i 1,
  • 4. and intersect in i, which i is an edge ofE(G). DOI:10.5121/jgraphoc.2014.6301 1
  • 5. International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks (GRAPH-HOC) Vol.6, No.3, September 2014 Proof (Necessity). We suppose that G is Hamiltonian, then G has at least one spanning cycle C, with sequence of distinct vertices
  • 6. . If G = C, then we must consider C as a single sequence.But if G C, so complement of C in G has a finite number of edge (chord), which it is introduced by .We prove by induction on number of the chord i.e. = , the existence of sequence. But for k=2 , i.e. if there are two chords and , we will have two case. The first, for i j s t, there exists by Figure (2) 2 Remark 2.2. Indeed we give to make this sequence a finite number ofmembers. Basis step: if k=1 , this is obvious (look at the graph in Figure 1). . In the second, if i j t s, according to the graph in Figure 3, we deleteone of the chords, and so by k=1 , there are two cycles. This is straightforward to understand that there isnot any case. ''Figure(1), graph of k=1'' ''Figure(2), graph of the first mode in k=2'' '' Figure(3), graph second mode in of the second mode in k=2' Induction step: We suppose that claim holds for all values less than m,also length of sequence is t .Now by adding chord m th, we establish the existence a spanning sequence of members, where only for every i with i 1, and are common in one edge i. If the chord m is in two distinct cycles and , such that g-h=r with r 1, i.e. endpoints are not just lied in one cycle. We give these cycles ( r +1cycles) as two new cycle. Therefore a spanning sequence is found and the statement is
  • 7. International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks (GRAPH-HOC) Vol.6, No.3, September 2014 established by induction hypothesis. But if this chord is only in one cycle as . The cycle decomposes into two smaller cycles. Hence there is a spanning sequence of members in , that its length is t or t + 1, as claimed. Proof (sufficiency). Let G be a graph that satisfies the (* ). Since this sequence contains all the vertices of G, we must achieve by removing the edges shared between any two consecutive cycles a spanning cycle. Therefore G is Hamiltonian. Algorithm2.5. According to the Theorem 2.1, we consider an initial cycle that is denoted by firstly. Afterwards we give as a new cycle of G, which and are common in only one edge, and is too. With doing the same process (this process) we achieve a basic algorithm. 3 Remark2.3. In the necessity proof of Theorem 2.1, we show a sequence with respect to (* ). and the Growing process of sequence is not denoted.We use Theorem 2.1. Example2.6. Note to Figure (5-a). We know already this graph is Hamiltonian. ''Figure(5-a), dodecahedron'' ''Figure(5-b) sequence with the equivalent condition of theorem 2.1'
  • 8. International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks (GRAPH-HOC) Vol.6, No.3, September 2014 4 In Figure (5-b), sequence is taken, such that: : ! #$%%'%(%)% *: + + , -:+ , ++ .$'()%%%' /: ! Which it has the initial cycle . At each step, we mark by a little straight line the edge shared of two consecutive cycle. As you have understand so far, providing the conditions of Theorem 2.1, is required to test cycles Dependent to single-edges(the same members). Thus for the design of more advanced algorithm Respect to the Algorithm 2.5, you must select the with restrictions. One of these ways we denote the following. Algorithm2.7. Firstly we define a set A; A = { : is a minimal cycle, that it has an edge ith of E(G)} Remark2.8. We note that A , and every element of A is not unique . Also every element of can be Considered as a Hamiltonian graph on its vertices set, which if this cycle has chords, we must consider it as a sequence of smaller cycles with Algorithm 2.5. By doing the same process, a sequence of A members must be achieved for the smaller cycles. Continue of the Algorithm2.7. Now, we study the equivalent condition of Theorem 2.1 over members of A. If a spanning sequence of A is found, then G is Hamiltonian. If not, let S be a maximum sequence and C is a generated cycle by method of Algorithm 2.5 in S. Afterwards C is a member of A too, by deleting chords of C. At present, we study again the condition (* ) over members of the redefined collection A and we use the above method. Finally either a spanning cycle is found by doing this process, and so G is a Hamiltonian graph, or a longest cycle where it is not spanning. This is obvious, if G is a Hamiltonian graph, we can find a spanning cycle by method of Algorithm 2.7, but we must verify the following theorem. Theorem2.9. If C is the longest and not spanning cycle of G, which it is built by the method of Algorithm 2.7, then G is not Hamiltonian. Proof. By contradiction, let G be a Hamiltonian graph. Thus it has a spanning cycle as , and this cycle is not built by the method of Algorithm 2.7. Therefore has at least one chord (because C is notspanning). Now we give a sequence of the A members, as in the method of Algorithm 2.5.
  • 9. International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks (GRAPH-HOC) Vol.6, No.3, September 2014 Afterwards with the second part of Remark 2.8, G has a cycle, which it is built as in the method of Algorithm 2.7. This is contrary to the primary assumption. Result2.10. If we may not prove that G is Hamiltonian as in the method of Algorithm 2.7, then G is not Hamiltonian. 5 Proof. This clear. ''Figure(6), Hershel graph and two of the most longest sequence with length 4''
  • 10. International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks (GRAPH-HOC) Vol.6, No.3, September 2014 Example2.11. Note to the Figure (6), that it has a Herschel graph G (already we know that it is not Hamiltonian) and three of the longest sequences, but these sequences are not spanning, then G is not Hamiltonian by the Algorithm 2.7. And so G is not Hamiltonian with Result 2.10. Explanation2.12. Clearly finding the longest sequence is the most important section of the method of Remark 2.7. [1] A.J. Bondy, U.S.R. Murty, Graph Theory with Applications, American Elsevier, New York, 1976. [2] Douglas B.West, Introduction to Graph Theory, University of Illinois Urbana, First Indian Reprint, 6 REFERENCES 2002. [3] Kewen Zhao, Hong-Jian Lai, Yehong Shao, New sufficient condition for Hamiltonian graphs, Applied Mathematics Letters 20 (2007) 116 122.