1. Introduction
Gunther and Hartnell [
1] introduced the idea of modeling a spy network by a graph whose vertices represent the spies and whose edges represent their connection. If a spy is arrested, the spies who are in direct contact with them are unreliable; therefore, some new graphical parameters such as vertex neighbor connectivity [
1] and edge neighbor connectivity [
2] were introduced to measure the invulnerability of networks under the “neighbor” case.
Observing that the behavior of spies in a spy network is similar to the spread of biological viruses in social networks, we introduced edge neighbor scattering number (ENS) [
3] and vertex neighbor scattering number (VNS) [
4]. It is shown that they are alternative invulnerability measures of the above networks. Since removing some vertices (or edges) from a graph, all of their adjacent vertices (or edges) are removed simultaneously, we call ENS and VNS neighbor invulnerability parameters.
Let be a graph and . The open-edge neighborhood of e is defined and f are adjacent}. The closed-edge neighborhood of e is . An edge e is said to be subverted when and the two endvertices of e are deleted from G. We call S an edge subversion strategy of G if and each of the edges in S is subverted from G. The survival subgraph is denoted by . An edge subversion strategy S is called an edge cut strategy of G if is disconnected, or is a single vertex, or is.
The
edge neighbor scattering number of a connected graph
G is defined as [
3]
, where
S is any edge cut strategy of
G, and
is the number of the components of
. We call
a
-set of
G if
.
Inspired by the definitions of vertex neighbor connectivity and toughness, we define edge neighbor toughness(ENT) of a connected graph G as , where S is any edge cut strategy of G, and is the number of the components of . We call an -set of G if .
In this paper, we prove that the computation problem of edge neighbor toughness of a graph is
-complete. We also give a polynomial algorithm of the ENT of trees, which is a class of special and important graphs. Throughout this paper, we consider the simple, undirected graphs, and use Bondy and Murty [
5] for terminologies and notations not defined here.
2. Preliminaries
Clearly, it is of prime importance to determine the edge neighbor toughness of a graph when this parameter is used to measure the neighbor invulnerability of a network. In this section, we give the edge neighbor toughness of several basic graphs.
Theorem 1. Let be a path of order . Then Proof. The case is trivial. When , for any edge cut strategy S, . We thus have Let be a function of variate x, where . When , reaches its minimum value . So, we have .
On the other hand, let be an edge of such that . Then is an edge cut strategy of and . By the definition of ENT, we have
Therefore, . □
Theorem 2. Let be a cycle of order . Then Proof. is trivial. When , for any edge cut strategy S of , , we have
On the other hand, there must exist two edges such that is an edge cut strategy of and . By the definition of ENT, we have
Therefore, . □
Theorem 3. Let be a complete graph of order . Then .
Proof. Observe that for any
,
. Cozzens [
6] proved that the edge neighbor connectivity of
is
; therefore, if
S is an edge cut strategy of
, then
, and
. By the definition of ENT, we have
.
On the other hand, if n is even, let be a maximum matching of . Replace by , denote . Then . By the definition of ENT, we have . If n is odd, then there exists a maximum matching M in such that and is an isolated vertex. So we have , too.
Therefore, . □
Theorem 4. Let be a complete p-partite graph with vertex partition . Assume , and . Then where is the matching number of .
Proof. For convenience, denote as G. Obviously, for any edge cut strategy, S, of G, if , then there exists some i such that all the vertices of are included in . Let be a -set of G. It is not difficult to know that and such that .
Let be a maximum matching of (that is, ), and be the unsaturated vertex set under . Then is a -set of G, where are arbitrary k vertices in . Since the unsaturated vertex number in is , we have □
Remark 1. If has a perfect matching, then , where and .
Example 1. Let be a star of order n. Then .
A comet, denoted by , is a graph by coinciding an end vertex of path with the center vertex of a star , where and . The order of comet is n, and the center of is called the center of
Theorem 5. Let be a comet, where and . Then .
Proof. Let , and be the center of . Obviously, if S is an edge cut strategy of , then . Moreover, for any edge cut strategy S, and the function is decreased with x, we then have .
On the other hand, since is an edge cut strategy of , and , by the definition of ENT, we have .
Therefore, , and we complete the proof. □
3. The Main Result
In this section, we consider the computational problems of ENT. We prove that the problem of computing the edge neighbor toughness is -complete and give a polynomial algorithm for computing the edge neighbor toughness of trees.
Problem 1.EDGE NEIGHBOR TOUGHNESS
Instance: An undirected graph G; a positive rational number t.
Question: Does there exist an edge cut strategy S of G such that ?
We solve this problem by considering the following
Problem 2.EDGE DOMINATION SET
Instance: A bipartite graph G; a positive integer d.
Question: Does there exist an edge dominating set D of G such that ?
It was proved by Yannakakis and Gavril [
7] that Problem 2 is
NP-complete. Based on this conclusion, we prove that Problem 1 is
NP-complete by reducing Problem 2 to a special case of Problem 1.
Theorem 6. EDGE NEIGHBOR TOUGHNESS isNP-complete.
Proof. Clearly, EDGE NEIGHBOR TOUGHNESS is in the class NP, since a nondeterministic algorithm need only guess an edge cut strategy and check in polynomial time that .
Let be a bipartite graph of order n. Denote . Replace each vertex by a copy of the complete graph , denote this copy by . Choose a vertex from , , add edges if , . Denote the resulting graph by .
Denote the subgraph induced by
in
as
. Obviously,
. Let
D be a smallest edge dominating set of
G and
be an
-set of
. In [
8], we proved the following claims.
Fact 1.If e is an edge in , which is not incident with , then , .
Fact 2.Let and e be incident with }. Then , .
Fact 3.There exists a -set S of such that and .
From the above claims, we conclude that . By the construction of and the -completeness of Problem 2, this is sufficient for the conclusion. □
Theorem 7. Let T be a tree with order n (≥4). Then , where
Proof. Let
such that
Since
,
is an edge cut strategy of
T and
. Assume that
is any nonempty edge cut strategy of
T. By the selection of
, we have
Therefore, by the definition of ENT, is a -set of T, and .
The proof is completed. □
Let T be a tree of order , and be its incident matrix. Then .
Based on the above results, we give an algorithm for the problem of computing the ENT of trees.
Input A tree .
Output and the corresponding -set.
Step 1. Compute the degree for each vertex ;
Step 2. Compute for each edge ;
Step 3. Search an edge satisfying , output and a -set .
A graph-theoretic algorithm is good if the number of computational steps for its implementation on any graph is bounded above by a polynomial in the order and the size of the graph [
5]. We show that the above algorithm is good by the following complexity analysis.
Computing the degree for each vertex requires additions, so the computations involved in step 1 require additions. Computing for an edge requires 1 additions only. Since T is a tree, , step 2 requires additions. To find the edge , it is sufficient to sort the number ; therefore, step 3, in the worst case, requires comparisons (Quick Sort Algorithm).
It is well known that a comparison or an addition is a basic computational unit. So, the total number of computations of this algorithm is approximately , and thus is of order .
Remark 2. If the adjacency list is used instead of the incidence matrix, the complexity can be lowered to .
5. Conclusions
The above two examples also show that the parameters ENT and ENS have their own characteristics and advantages when measuring the neighbor invulnerability of networks. Network invulnerability is an important problem in graph theory. Many parameters have been introduced to measure the relationship of invulnerability and structure of networks; however, there exist a lot of unresolved problems about the parameters computing [
3,
9,
10]. Since trees have special structure and wide range of applications [
11,
12], the polynomial algorithm of ENT of trees has a certain theoretical and practical significance.
Observing the conclusion of Theorem 4, it is easy to know that the matching number of the complete p-partite graph is determined by the numbers ; therefore, to find a maximum matching of is equivalent to divide into two nonempty subset and such that is as small as possible. Later, we will consider this integer programming and related problems. Furthermore, the algorithm and the bound of ENT for graphs of general structure are also worth considering.