Next Article in Journal
An Earthquake-Clustering Model in North Aegean Area (Greece)
Next Article in Special Issue
Total Rainbow Connection Number of Some Graph Operations
Previous Article in Journal
Exact Solutions of Nonlinear Partial Differential Equations via the New Double Integral Transform Combined with Iterative Method
Previous Article in Special Issue
Some New Bounds for the Inverse Sum Indeg Energy of Graphs
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Edge Neighbor Toughness of Graphs

1
School of Science, Xi’an University of Architecture and Technology, Xi’an 710055, China
2
Department of Digital Economy and Digital Technology, Shaanxi Youth Vocational College, Xi’an 710100, China
*
Author to whom correspondence should be addressed.
Axioms 2022, 11(6), 248; https://doi.org/10.3390/axioms11060248
Submission received: 27 April 2022 / Accepted: 22 May 2022 / Published: 25 May 2022
(This article belongs to the Special Issue Graph Theory with Applications)

Abstract

:
A new graph parameter, edge neighbor toughness is introduced to measure how difficult it is for a graph to be broken into many components through the deletion of the closed neighborhoods of a few edges. Let G = ( V , E ) be a graph. An edge e is said to be subverted when its neighborhood and the two endvertices are deleted from G. An edge set S E ( G ) is called an edge cut-strategy if all the edges in S has been subverted from G and the survival subgraph, denoted by G / S , is disconnected, or is a single vertex, or is. The edge neighbor toughness of a graph G is defined to be t E N ( G ) = min S E ( G ) { | S | c ( G / S ) } , where S is any edge cut strategy of G, c ( G / S ) is the number of the components of G / S . In this paper, the properties of this parameter are investigated, and the proof of the computation problem of edge neighbor toughness is N P -complete; finally, a polynomial algorithm for computing the edge neighbor toughness of trees is given.

1. Introduction

Gunther and Hartnell [1] introduced the idea of modeling a spy network by a graph whose vertices represent the spies and whose edges represent their connection. If a spy is arrested, the spies who are in direct contact with them are unreliable; therefore, some new graphical parameters such as vertex neighbor connectivity [1] and edge neighbor connectivity [2] were introduced to measure the invulnerability of networks under the “neighbor” case.
Observing that the behavior of spies in a spy network is similar to the spread of biological viruses in social networks, we introduced edge neighbor scattering number (ENS) [3] and vertex neighbor scattering number (VNS) [4]. It is shown that they are alternative invulnerability measures of the above networks. Since removing some vertices (or edges) from a graph, all of their adjacent vertices (or edges) are removed simultaneously, we call ENS and VNS neighbor invulnerability parameters.
Let G = ( V , E ) be a graph and e V ( G ) . The open-edge neighborhood of e is defined N ( e ) = { f E ( G ) | f e , e and f are adjacent}. The closed-edge neighborhood of e is N [ e ] = N ( e ) { e } . An edge e is said to be subverted when N [ e ] and the two endvertices of e are deleted from G. We call S an edge subversion strategy of G if S E ( G ) and each of the edges in S is subverted from G. The survival subgraph is denoted by G / S . An edge subversion strategy S is called an edge cut strategy of G if G / S is disconnected, or is a single vertex, or is.
The edge neighbor scattering number of a connected graph G is defined as [3] E N S ( G ) = max S E ( G ) { c ( G / S ) | S | } , where S is any edge cut strategy of G, and c ( G / S ) is the number of the components of G / S . We call S * E ( G ) a E N S -set of G if E N S ( G ) = c ( G / S * ) | S * | .
Inspired by the definitions of vertex neighbor connectivity and toughness, we define edge neighbor toughness(ENT) of a connected graph G as t E N ( G ) = min S E ( G ) { | S | c ( G / S ) } , where S is any edge cut strategy of G, and c ( G / X ) is the number of the components of G / S . We call S * ( E ( G ) ) an t E N -set of G if t E N ( G ) = | S * | c ( G / S * ) .
In this paper, we prove that the computation problem of edge neighbor toughness of a graph is N P -complete. We also give a polynomial algorithm of the ENT of trees, which is a class of special and important graphs. Throughout this paper, we consider the simple, undirected graphs, and use Bondy and Murty [5] for terminologies and notations not defined here.

2. Preliminaries

Clearly, it is of prime importance to determine the edge neighbor toughness of a graph when this parameter is used to measure the neighbor invulnerability of a network. In this section, we give the edge neighbor toughness of several basic graphs.
Theorem 1.
Let P n be a path of order n ( 3 ) . Then
t E N ( P n ) = 1 , i f n = 3 ; 1 2 , i f n 4 .
Proof. 
The case n = 3 is trivial. When n 4 , for any edge cut strategy S, c ( P n / S ) | S | + 1 . We thus have t E N ( P n ) | S | | S | + 1 . Let f ( x ) = x x + 1 be a function of variate x, where x Z + . When x = 1 , f ( x ) reaches its minimum value 1 2 . So, we have t E N ( P n ) 1 2 .
On the other hand, let e = u v be an edge of P n such that d ( u ) = d ( v ) = 2 . Then { e } is an edge cut strategy of P n and c ( P n / { e } ) = 2 . By the definition of ENT, we have t E N ( P n ) | { e } | c ( P n / { e } ) = 1 2 .
Therefore, t E N ( P n ) = 1 2 .  □
Theorem 2.
Let C n be a cycle of order n ( 3 ) . Then
t E N ( C n ) = 2 , i f n = 4 , 5 ; 1 , i f n = 3   o r   n 6 .
Proof. 
n = 3 , 4 , 5 is trivial. When n 6 , for any edge cut strategy S of C n , c ( C n / S ) | S | , we have t E N ( C n ) 1 .
On the other hand, there must exist two edges e , f V ( C n ) such that { e , f } is an edge cut strategy of C n and c ( C n / { e , f } ) = 2 . By the definition of ENT, we have t E N ( C n ) | { e , f } | c ( C n / { e , f } ) = 1 .
Therefore, t E N ( C n ) = 1 .  □
Theorem 3.
Let K n be a complete graph of order n ( 3 ) . Then t E N ( K n ) = n 2 .
Proof. 
Observe that for any e E ( K n ) , K n / { e } = K n 2 . Cozzens [6] proved that the edge neighbor connectivity of K n is n 2 ; therefore, if S is an edge cut strategy of K n , then | S | n 2 , and c ( K n / S ) 1 . By the definition of ENT, we have t E N ( K n ) | S | c ( K n / S ) n 2 .
On the other hand, if n is even, let M = { u 1 v 1 , u 2 v 2 , , u n 2 v n 2 } be a maximum matching of K n . Replace u 1 v 1 by u 1 v 2 , denote M = ( M { u 1 v 1 } ) { u 1 v 2 } . Then K n / M = v 1 . By the definition of ENT, we have t E N ( K n ) | M | c ( K n / M ) = n 2 . If n is odd, then there exists a maximum matching M in K n such that | M | = n 1 2 = n 2 and K n / M is an isolated vertex. So we have t E N ( K n ) n 2 , too.
Therefore, t E N ( K n ) = n 2 .  □
Theorem 4.
Let K n 1 , n 2 , , n p be a complete p-partite graph with vertex partition ( X 1 , X 2 , , X p ) . Assume | X i | = n i , i = 1 , 2 , , p , p 2 and n p n p 1 n 1 . Then
t V N ( K n 1 , n 2 , , n p ) = 1 n p ( i = 1 p 1 n i α ) .
where α is the matching number of K n 1 , n 2 , , n p 1 .
Proof. 
For convenience, denote K n 1 , n 2 , , n p as G. Obviously, for any edge cut strategy, S, of G, if G / S , then there exists some i such that all the vertices of G / S are included in N i . Let S * be a t E N -set of G. It is not difficult to know that c ( G / S * ) = n p and S * E ( G X p ) such that ( G X p ) / S * = .
Let M * be a maximum matching of G X p (that is, K n 1 , n 2 , , n p 1 ), and U = { u 1 , u 2 , , u k } be the unsaturated vertex set under M * . Then { u 1 v 1 , u 2 v 2 , , u k v k } M * is a t E N -set of G, where v 1 , v 2 , , v k are arbitrary k vertices in V ( G ) X p U . Since the unsaturated vertex number in G X p is i = 1 p 1 n i 2 | M * | , we have t V N ( K n 1 , n 2 , , n p ) = 1 n p ( i = 1 p 1 n i α ) .  □
Remark 1.
If K n 1 , n 2 , , n p 1 has a perfect matching, then t V N ( K n 1 , n 2 , , n p ) = n 2 n p 1 2 , where n = i = 1 p n i and n p n p 1 n 1 .
Example 1.
Let S 1 , n 1 be a star of order n. Then t E N ( S 1 , n 1 ) = 1 n 2 .
A comet, denoted by C n , k , is a graph by coinciding an end vertex of path P n k with the center vertex of a star S 1 , k , where 1 k n 2 and n 4 . The order of comet C n , k is n, and the center of S 1 , k is called the center of C n , k .
Theorem 5.
Let C n , k be a comet, where 1 k n 3 and n 4 . Then t E N ( C n , k ) = 1 k + 1 .
Proof. 
Let V ( P n k ) = { v 1 , v 2 , , v n k } , and v 1 be the center of C n , k . Obviously, if S is an edge cut strategy of C n , k , then | S | 1 . Moreover, for any edge cut strategy S, c ( C n , k / S ) k + | S | and the function f ( x ) = x x + k ( x Z + ) is decreased with x, we then have t E N ( C n , k ) 1 k + 1 .
On the other hand, since { v 1 v 2 } is an edge cut strategy of C n , k , and c ( C n , k / { v 1 v 2 } ) = k + 1 , by the definition of ENT, we have t E N ( C n , k ) 1 k + 1 .
Therefore, t E N ( C n , k ) = 1 k + 1 , and we complete the proof.   □

3. The Main Result

In this section, we consider the computational problems of ENT. We prove that the problem of computing the edge neighbor toughness is N P -complete and give a polynomial algorithm for computing the edge neighbor toughness of trees.
Problem 1.EDGE NEIGHBOR TOUGHNESS
Instance: An undirected graph G; a positive rational number t.
Question: Does there exist an edge cut strategy S of G such that | S | c ( G / S ) t ?
We solve this problem by considering the following
Problem 2.EDGE DOMINATION SET
Instance: A bipartite graph G; a positive integer d.
Question: Does there exist an edge dominating set D of G such that | D | d ?
It was proved by Yannakakis and Gavril [7] that Problem 2 is NP-complete. Based on this conclusion, we prove that Problem 1 is NP-complete by reducing Problem 2 to a special case of Problem 1.
Theorem 6.
EDGE NEIGHBOR TOUGHNESS isNP-complete.
Proof. 
Clearly, EDGE NEIGHBOR TOUGHNESS is in the class NP, since a nondeterministic algorithm need only guess an edge cut strategy S E ( G ) and check in polynomial time that | S | c ( G / S ) t .
Let G = ( V , E ) be a bipartite graph of order n. Denote V = { v 1 , v 2 , , v n } . Replace each vertex v i V by a copy of the complete graph K n , denote this copy by G i . Choose a vertex from G i , v i * , add edges v i * v j * if v i v j E , i = 1 , 2 , , n . Denote the resulting graph by G * .
Denote the subgraph induced by { v 1 * , v 2 * , , v n * } in G * as G . Obviously, G G . Let D be a smallest edge dominating set of G and S * be an E N S -set of G * . In [8], we proved the following claims.
Fact 1.If e is an edge in G i , which is not incident with v i * , then e S * , i = 1 , 2 , , n .
Fact 2.Let E i * = { e : e E ( G i ) and e be incident with v i * }. Then | E i * S * | 1 , i = 1 , 2 , , n .
Fact 3.There exists a t E N -set S of G * such that E ( G * / S ) E ( G ) = and S E ( G ) .
From the above claims, we conclude that t E N ( G * ) = | D | n . By the construction of G * and the N P -completeness of Problem 2, this is sufficient for the conclusion.  □
Theorem 7.
Let T be a tree with order n (≥4). Then t E N ( T ) = 1 d 2 , where d = max ( u , v ) E ( T ) { d ( u ) + d ( v ) } .
Proof. 
Let e * = u * v * E ( T ) such that d = d ( u * ) + d ( v * ) = max ( u , v ) E ( T ) { d ( u ) + d ( v ) } . Since n 4 , { e * } is an edge cut strategy of T and | { e * } | c ( T / { e * } ) = 1 d 2 . Assume that S E ( T ) is any nonempty edge cut strategy of T. By the selection of e * , we have
| S | c ( T / S ) | S | e S c ( T / { e } | S | | S | ω ( T / { e * } ) = 1 d 2 .
Therefore, by the definition of ENT, { e * } is a t E N -set of T, and t E N ( T ) = 1 d 2 .
The proof is completed. □
Let T be a tree of order n ( 4 ) , V ( T ) = { v 1 , v 2 , , v n } and M ( T ) = ( m i j ) n × ( n 1 ) be its incident matrix. Then d ( v i ) = j = 1 n 1 m i j , i = 1 , 2 , , n .
Based on the above results, we give an algorithm for the problem of computing the ENT of trees.
Input A tree T = ( V ; E ) .
Output t E N ( T ) and the corresponding t E N -set.
Step 1. Compute the degree d ( v ) for each vertex v V ( T ) ;
Step 2. Compute d e = d ( u ) + d ( v ) for each edge e = u v E ( T ) ;
Step 3. Search an edge e * = u * v * satisfying d = d ( u * ) + d ( v * ) = max e E ( T ) d e , output t E N ( T ) = 1 d 2 and a t E N -set { u * v * } .
A graph-theoretic algorithm is good if the number of computational steps for its implementation on any graph is bounded above by a polynomial in the order and the size of the graph [5]. We show that the above algorithm is good by the following complexity analysis.
Computing the degree for each vertex requires n 2 additions, so the computations involved in step 1 require n ( n 2 ) additions. Computing d e = d ( u ) + d ( v ) for an edge u v E ( T ) requires 1 additions only. Since T is a tree, m = n 1 , step 2 requires ( n 1 ) additions. To find the edge e * = u * v * , it is sufficient to sort the n 1 number d e ; therefore, step 3, in the worst case, requires ( n 1 ) log ( n 1 ) comparisons (Quick Sort Algorithm).
It is well known that a comparison or an addition is a basic computational unit. So, the total number of computations of this algorithm is approximately n ( n 2 ) + ( n 1 ) + ( n 1 ) log ( n 1 ) , and thus is of order n 2 .
Remark 2.
If the adjacency list is used instead of the incidence matrix, the complexity can be lowered to O ( n ) .

4. Invulnerability Analysis Based on ENT

Observe the definition of the neighbor invulnerability parameters such as ENS, VNS, and VNT, they all measure the state of a network after being most severely damaged. That is, the subversion strategy must be a cut strategy. Based on this common characteristic, we replace the subtraction in ENS by division to define the concept of ENT. By definition, the larger the ENT is, the more resilient the network is.
The following examples illustrate that the parameters ENT and ENS are independent, so they are well defined.
Example 2.
Consider the comet C 10 , 3 and G 1 (see Figure 1a). They have the equal order 10, vertex neighbor connectivity 1, edge neighbor connectivity 1, and ENT 1 4 ; however, E N S ( C 10 , 3 ) = 3 , E N S ( G 1 ) = 5 . Furthermore, { e } is a t E N -set of G 1 but is not an E N S -set; { e , f } is an E N S -set of G 1 but is not a t E N -set of G 1 .
Example 3.
Consider the Petersen graph P ( 5 , 2 ) (see Figure 1b) and the path P 10 . They have the equal order 10 and ENS 1, but t E N ( P ( 5 , 2 ) ) = 3 4 , t E N ( P 10 ) = 1 2 . The edge set { e , f , g } is both of a t E N -set and an E N S -set of P ( 5 , 2 ) .

5. Conclusions

The above two examples also show that the parameters ENT and ENS have their own characteristics and advantages when measuring the neighbor invulnerability of networks. Network invulnerability is an important problem in graph theory. Many parameters have been introduced to measure the relationship of invulnerability and structure of networks; however, there exist a lot of unresolved problems about the parameters computing [3,9,10]. Since trees have special structure and wide range of applications [11,12], the polynomial algorithm of ENT of trees has a certain theoretical and practical significance.
Observing the conclusion of Theorem 4, it is easy to know that the matching number of the complete p-partite graph K n 1 , n 2 , , n p is determined by the numbers n 1 , n 2 , , n p ; therefore, to find a maximum matching of K n 1 , n 2 , , n p is equivalent to divide { 1 , 2 , , p } into two nonempty subset N 1 and N 2 such that | i N 1 n i j N 2 n j | is as small as possible. Later, we will consider this integer programming and related problems. Furthermore, the algorithm and the bound of ENT for graphs of general structure are also worth considering.

Author Contributions

Conceptualization, methodology, original draft preparation, X.F., Z.W.; review and editing, Y.Y. All authors have read and agreed to the published version of the manuscript.

Funding

This work was funded by the Natural Science Foundation of China (No.61902304).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Gunther, G. On the Neighbor-Connectivity in Regular Graphs. Discret. Appl. Math. 1985, 11, 233–243. [Google Scholar] [CrossRef] [Green Version]
  2. Cozzens, M.B.; Wu, S.-S.Y. Extreme Values of the Edge Neighbor-Connectivity. Ars Comb. 1995, 39, 199–210. [Google Scholar]
  3. Wei, Z.; Li, Y.; Zhang, J. Edge Neighbor-Scattering Number of Graphs. Ars Comb. 2007, 85, 271–277. [Google Scholar]
  4. Wei, Z.; Mai, A.; Zhai, M. Vertex Neighbor-Scattering Number of Graphs. Ars Comb. 2011, 102, 417–426. [Google Scholar] [CrossRef]
  5. Bondy, J.A.; Murty, U.S.R. Graph Theory with Applications; Macmillan: London, UK; Elsevier: New York, NY, USA, 1976. [Google Scholar]
  6. Cozzens, M.B.; Wu, S.-S.Y. Edge-neighbour-integrity of trees. Australas. J. Combin. 1994, 10, 163–174. [Google Scholar]
  7. Yannakakis, M.; Gavril, F. Edge Dominating Sets in Graphs. SIAM J. Discret. Math. 1993, 38, 364–372. [Google Scholar] [CrossRef] [Green Version]
  8. Wei, Z.; Yuan, X.; Qi, N. Computing the Edge Neighbour-Scattering Number of Graphs. Z. Naturforschung A 2013, 68, 599–604. [Google Scholar] [CrossRef] [Green Version]
  9. Ma, J.; Shi, Y.; Wang, Z.; Yue, J. On Wiener Polarity Index of Bicyclic Networks. Sci. Rep. 2016, 6, 19066. [Google Scholar] [CrossRef] [PubMed]
  10. Shi, Y. Note on Two Generalizations of the Randic Index. Appl. Math. Comput. 2015, 265, 1019–1025. [Google Scholar] [CrossRef]
  11. Chen, L.; Shi, Y. Maximal Matching Energy of Tricyclic Graphs. MATCH Commun. Math. Comput. Chem. 2015, 73, 105–119. [Google Scholar]
  12. Li, X.; Mao, Y. Generalized Connectivity of Graphs; Springer: New York, NY, USA, 2016. [Google Scholar]
Figure 1. Two graphs with order 10.
Figure 1. Two graphs with order 10.
Axioms 11 00248 g001
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Feng, X.; Wei, Z.; Yang, Y. Edge Neighbor Toughness of Graphs. Axioms 2022, 11, 248. https://doi.org/10.3390/axioms11060248

AMA Style

Feng X, Wei Z, Yang Y. Edge Neighbor Toughness of Graphs. Axioms. 2022; 11(6):248. https://doi.org/10.3390/axioms11060248

Chicago/Turabian Style

Feng, Xin, Zongtian Wei, and Yucheng Yang. 2022. "Edge Neighbor Toughness of Graphs" Axioms 11, no. 6: 248. https://doi.org/10.3390/axioms11060248

APA Style

Feng, X., Wei, Z., & Yang, Y. (2022). Edge Neighbor Toughness of Graphs. Axioms, 11(6), 248. https://doi.org/10.3390/axioms11060248

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop