Abstract
A new graph parameter, edge neighbor toughness is introduced to measure how difficult it is for a graph to be broken into many components through the deletion of the closed neighborhoods of a few edges. Let be a graph. An edge e is said to be subverted when its neighborhood and the two endvertices are deleted from G. An edge set is called an edge cut-strategy if all the edges in S has been subverted from G and the survival subgraph, denoted by , is disconnected, or is a single vertex, or is. The edge neighbor toughness of a graph G is defined to be , where S is any edge cut strategy of G, is the number of the components of . In this paper, the properties of this parameter are investigated, and the proof of the computation problem of edge neighbor toughness is -complete; finally, a polynomial algorithm for computing the edge neighbor toughness of trees is given.
MSC:
05C85; 68R10
1. Introduction
Gunther and Hartnell [1] introduced the idea of modeling a spy network by a graph whose vertices represent the spies and whose edges represent their connection. If a spy is arrested, the spies who are in direct contact with them are unreliable; therefore, some new graphical parameters such as vertex neighbor connectivity [1] and edge neighbor connectivity [2] were introduced to measure the invulnerability of networks under the “neighbor” case.
Observing that the behavior of spies in a spy network is similar to the spread of biological viruses in social networks, we introduced edge neighbor scattering number (ENS) [3] and vertex neighbor scattering number (VNS) [4]. It is shown that they are alternative invulnerability measures of the above networks. Since removing some vertices (or edges) from a graph, all of their adjacent vertices (or edges) are removed simultaneously, we call ENS and VNS neighbor invulnerability parameters.
Let be a graph and . The open-edge neighborhood of e is defined and f are adjacent}. The closed-edge neighborhood of e is . An edge e is said to be subverted when and the two endvertices of e are deleted from G. We call S an edge subversion strategy of G if and each of the edges in S is subverted from G. The survival subgraph is denoted by . An edge subversion strategy S is called an edge cut strategy of G if is disconnected, or is a single vertex, or is.
The edge neighbor scattering number of a connected graph G is defined as [3] , where S is any edge cut strategy of G, and is the number of the components of . We call a -set of G if .
Inspired by the definitions of vertex neighbor connectivity and toughness, we define edge neighbor toughness(ENT) of a connected graph G as , where S is any edge cut strategy of G, and is the number of the components of . We call an -set of G if .
In this paper, we prove that the computation problem of edge neighbor toughness of a graph is -complete. We also give a polynomial algorithm of the ENT of trees, which is a class of special and important graphs. Throughout this paper, we consider the simple, undirected graphs, and use Bondy and Murty [5] for terminologies and notations not defined here.
2. Preliminaries
Clearly, it is of prime importance to determine the edge neighbor toughness of a graph when this parameter is used to measure the neighbor invulnerability of a network. In this section, we give the edge neighbor toughness of several basic graphs.
Theorem 1.
Let be a path of order . Then
Proof.
The case is trivial. When , for any edge cut strategy S, . We thus have Let be a function of variate x, where . When , reaches its minimum value . So, we have .
On the other hand, let be an edge of such that . Then is an edge cut strategy of and . By the definition of ENT, we have
Therefore, . □
Theorem 2.
Let be a cycle of order . Then
Proof.
is trivial. When , for any edge cut strategy S of , , we have
On the other hand, there must exist two edges such that is an edge cut strategy of and . By the definition of ENT, we have
Therefore, . □
Theorem 3.
Let be a complete graph of order . Then .
Proof.
Observe that for any , . Cozzens [6] proved that the edge neighbor connectivity of is ; therefore, if S is an edge cut strategy of , then , and . By the definition of ENT, we have .
On the other hand, if n is even, let be a maximum matching of . Replace by , denote . Then . By the definition of ENT, we have . If n is odd, then there exists a maximum matching M in such that and is an isolated vertex. So we have , too.
Therefore, . □
Theorem 4.
Let be a complete p-partite graph with vertex partition . Assume , and . Then
where is the matching number of .
Proof.
For convenience, denote as G. Obviously, for any edge cut strategy, S, of G, if , then there exists some i such that all the vertices of are included in . Let be a -set of G. It is not difficult to know that and such that .
Let be a maximum matching of (that is, ), and be the unsaturated vertex set under . Then is a -set of G, where are arbitrary k vertices in . Since the unsaturated vertex number in is , we have □
Remark 1.
If has a perfect matching, then , where and .
Example 1.
Let be a star of order n. Then .
A comet, denoted by , is a graph by coinciding an end vertex of path with the center vertex of a star , where and . The order of comet is n, and the center of is called the center of
Theorem 5.
Let be a comet, where and . Then .
Proof.
Let , and be the center of . Obviously, if S is an edge cut strategy of , then . Moreover, for any edge cut strategy S, and the function is decreased with x, we then have .
On the other hand, since is an edge cut strategy of , and , by the definition of ENT, we have .
Therefore, , and we complete the proof. □
3. The Main Result
In this section, we consider the computational problems of ENT. We prove that the problem of computing the edge neighbor toughness is -complete and give a polynomial algorithm for computing the edge neighbor toughness of trees.
Problem 1.EDGE NEIGHBOR TOUGHNESS
Instance: An undirected graph G; a positive rational number t.
Question: Does there exist an edge cut strategy S of G such that ?
We solve this problem by considering the following
Problem 2.EDGE DOMINATION SET
Instance: A bipartite graph G; a positive integer d.
Question: Does there exist an edge dominating set D of G such that ?
It was proved by Yannakakis and Gavril [7] that Problem 2 is NP-complete. Based on this conclusion, we prove that Problem 1 is NP-complete by reducing Problem 2 to a special case of Problem 1.
Theorem 6.
EDGE NEIGHBOR TOUGHNESS isNP-complete.
Proof.
Clearly, EDGE NEIGHBOR TOUGHNESS is in the class NP, since a nondeterministic algorithm need only guess an edge cut strategy and check in polynomial time that .
Let be a bipartite graph of order n. Denote . Replace each vertex by a copy of the complete graph , denote this copy by . Choose a vertex from , , add edges if , . Denote the resulting graph by .
Denote the subgraph induced by in as . Obviously, . Let D be a smallest edge dominating set of G and be an -set of . In [8], we proved the following claims.
Fact 1.If e is an edge in , which is not incident with , then , .
Fact 2.Let and e be incident with }. Then , .
Fact 3.There exists a -set S of such that and .
From the above claims, we conclude that . By the construction of and the -completeness of Problem 2, this is sufficient for the conclusion. □
Theorem 7.
Let T be a tree with order n (≥4). Then , where
Proof.
Let such that Since , is an edge cut strategy of T and . Assume that is any nonempty edge cut strategy of T. By the selection of , we have
Therefore, by the definition of ENT, is a -set of T, and .
The proof is completed. □
Let T be a tree of order , and be its incident matrix. Then .
Based on the above results, we give an algorithm for the problem of computing the ENT of trees.
Input A tree .
Output and the corresponding -set.
Step 1. Compute the degree for each vertex ;
Step 2. Compute for each edge ;
Step 3. Search an edge satisfying , output and a -set .
A graph-theoretic algorithm is good if the number of computational steps for its implementation on any graph is bounded above by a polynomial in the order and the size of the graph [5]. We show that the above algorithm is good by the following complexity analysis.
Computing the degree for each vertex requires additions, so the computations involved in step 1 require additions. Computing for an edge requires 1 additions only. Since T is a tree, , step 2 requires additions. To find the edge , it is sufficient to sort the number ; therefore, step 3, in the worst case, requires comparisons (Quick Sort Algorithm).
It is well known that a comparison or an addition is a basic computational unit. So, the total number of computations of this algorithm is approximately , and thus is of order .
Remark 2.
If the adjacency list is used instead of the incidence matrix, the complexity can be lowered to .
4. Invulnerability Analysis Based on ENT
Observe the definition of the neighbor invulnerability parameters such as ENS, VNS, and VNT, they all measure the state of a network after being most severely damaged. That is, the subversion strategy must be a cut strategy. Based on this common characteristic, we replace the subtraction in ENS by division to define the concept of ENT. By definition, the larger the ENT is, the more resilient the network is.
The following examples illustrate that the parameters ENT and ENS are independent, so they are well defined.
Example 2.
Consider the comet and (see Figure 1a). They have the equal order 10, vertex neighbor connectivity 1, edge neighbor connectivity 1, and ENT ; however, , . Furthermore, is a -set of but is not an -set; is an -set of but is not a -set of .
Figure 1.
Two graphs with order 10.
Example 3.
Consider the Petersen graph (see Figure 1b) and the path . They have the equal order 10 and ENS 1, but , . The edge set is both of a -set and an -set of .
5. Conclusions
The above two examples also show that the parameters ENT and ENS have their own characteristics and advantages when measuring the neighbor invulnerability of networks. Network invulnerability is an important problem in graph theory. Many parameters have been introduced to measure the relationship of invulnerability and structure of networks; however, there exist a lot of unresolved problems about the parameters computing [3,9,10]. Since trees have special structure and wide range of applications [11,12], the polynomial algorithm of ENT of trees has a certain theoretical and practical significance.
Observing the conclusion of Theorem 4, it is easy to know that the matching number of the complete p-partite graph is determined by the numbers ; therefore, to find a maximum matching of is equivalent to divide into two nonempty subset and such that is as small as possible. Later, we will consider this integer programming and related problems. Furthermore, the algorithm and the bound of ENT for graphs of general structure are also worth considering.
Author Contributions
Conceptualization, methodology, original draft preparation, X.F., Z.W.; review and editing, Y.Y. All authors have read and agreed to the published version of the manuscript.
Funding
This work was funded by the Natural Science Foundation of China (No.61902304).
Institutional Review Board Statement
Not applicable.
Informed Consent Statement
Not applicable.
Data Availability Statement
Not applicable.
Conflicts of Interest
The authors declare no conflict of interest.
References
- Gunther, G. On the Neighbor-Connectivity in Regular Graphs. Discret. Appl. Math. 1985, 11, 233–243. [Google Scholar] [CrossRef]
- Cozzens, M.B.; Wu, S.-S.Y. Extreme Values of the Edge Neighbor-Connectivity. Ars Comb. 1995, 39, 199–210. [Google Scholar]
- Wei, Z.; Li, Y.; Zhang, J. Edge Neighbor-Scattering Number of Graphs. Ars Comb. 2007, 85, 271–277. [Google Scholar]
- Wei, Z.; Mai, A.; Zhai, M. Vertex Neighbor-Scattering Number of Graphs. Ars Comb. 2011, 102, 417–426. [Google Scholar] [CrossRef]
- Bondy, J.A.; Murty, U.S.R. Graph Theory with Applications; Macmillan: London, UK; Elsevier: New York, NY, USA, 1976. [Google Scholar]
- Cozzens, M.B.; Wu, S.-S.Y. Edge-neighbour-integrity of trees. Australas. J. Combin. 1994, 10, 163–174. [Google Scholar]
- Yannakakis, M.; Gavril, F. Edge Dominating Sets in Graphs. SIAM J. Discret. Math. 1993, 38, 364–372. [Google Scholar] [CrossRef]
- Wei, Z.; Yuan, X.; Qi, N. Computing the Edge Neighbour-Scattering Number of Graphs. Z. Naturforschung A 2013, 68, 599–604. [Google Scholar] [CrossRef][Green Version]
- Ma, J.; Shi, Y.; Wang, Z.; Yue, J. On Wiener Polarity Index of Bicyclic Networks. Sci. Rep. 2016, 6, 19066. [Google Scholar] [CrossRef] [PubMed]
- Shi, Y. Note on Two Generalizations of the Randic Index. Appl. Math. Comput. 2015, 265, 1019–1025. [Google Scholar] [CrossRef]
- Chen, L.; Shi, Y. Maximal Matching Energy of Tricyclic Graphs. MATCH Commun. Math. Comput. Chem. 2015, 73, 105–119. [Google Scholar]
- Li, X.; Mao, Y. Generalized Connectivity of Graphs; Springer: New York, NY, USA, 2016. [Google Scholar]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).