Next Article in Journal
Context-Aware Dynamic Integration for Scene Recognition
Previous Article in Journal
Regularity of Generalized Mean-Field G-SDEs
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Uncertainty-Driven Stability Analysis of Minimum Spanning Tree Under Multiple Risk Variations

1
Centre for Information Technologies and Applied Mathematics, University of Nova Gorica, 5000 Nova Gorica, Slovenia
2
School of Engineering and Management, University of Nova Gorica, 5000 Nova Gorica, Slovenia
Mathematics 2025, 13(19), 3100; https://doi.org/10.3390/math13193100
Submission received: 4 September 2025 / Revised: 18 September 2025 / Accepted: 21 September 2025 / Published: 27 September 2025
(This article belongs to the Section E: Applied Mathematics)

Abstract

The Minimum Spanning Tree (MST) problem addresses the challenge of identifying optimal network pathways for critical infrastructure systems, including transportation grids, communication backbones, power distribution networks, and reliability optimization frameworks. However, inherent uncertainties stemming from disruptive events demand robust analytical models for effective decision-making. This research introduces an uncertainty-theoretic framework to assess MST stability in uncertain network environments through novel constructs: lower set tolerance (LST) and dual lower set tolerance (DLST). Both LST and DLST provide quantifiable measures characterizing the resilience of element sets relative to edge-weighted MST configurations. LST captures the maximum simultaneous risk variation preserving current MST optimality, while DLST identifies the minimal variation required to invalidate it. We evaluate MST robustness by integrating uncertain reliability measures and risk factors, with emphasis on computational methods for set tolerance determination. To overcome computational hurdles in set tolerance derivation, we establish bounds and exact formulations within an uncertainty programming paradigm, offering enhanced efficiency compared with conventional re-optimization techniques.
MSC:
90B15; 90C05; 90C27; 90C70; 90C90

1. Introduction

1.1. Background and Problem Context

The Minimum Spanning Tree (MST) problem is a cornerstone of network optimization, aiming to identify a tree that connects all vertices in a network while minimizing the total weight of edges. This problem is pivotal in fields such as logistics, telecommunications, power grids, computer networks, and transportation infrastructure. However, disruptions like natural disasters introduce uncertainties that compromise network reliability and stability, leading to unpredictable performance and high variability in network parameters. In contexts like communication or power networks, where edges represent failure probabilities (risk factors), the goal shifts to maximizing overall network reliability, often by minimizing cumulative system risk. When precise information about edge functionality is unavailable, relying on probability distributions becomes problematic. Parameters are often expressed as ’belief degrees’ derived from expert judgment, but using probability or fuzzy theory to model these can lead to misleading outcomes due to the occurrence of unlikely events, resulting in greater variance than observed frequencies. Uncertainty theory has emerged as an effective framework to address these challenges [1,2,3].
This study advances the analysis of MST stability in uncertain networks by proposing a novel uncertainty-based model. The model facilitates stability analysis of edge-weighted MSTs under uncertainty by integrating risk factors associated with network edges. Specifically, it addresses the uncertain MST problem by evaluating the robustness of MST solutions against network uncertainties. Central to this approach is the concept of lower set tolerance (LST), defined as the maximum simultaneous risk variation across multiple uncertain elements that preserves the optimality of the current MST. Additionally, we introduce the dual lower set tolerance (DLST), which measures the minimum risk variation across a set of elements that renders the current MST non-optimal. These metrics gauge the sensitivity of an optimal MST to risk changes in multiple edges, with low LST or DLST values indicating that small changes can disrupt optimality. Such insights are critical for decision-makers and network planners to monitor vulnerable edge sets.
This study is the first to focus on the stability of uncertain MSTs without relying on probability distributions or fuzzy membership functions. Although computing set tolerances precisely can be challenging, we demonstrate that they are mathematically well-defined and provide computational formulations using uncertainty programming to efficiently compute or bound them. We derive bounds and exact formulas for LST and DLST, leveraging their relationships with single tolerance counterparts, and compare the results of regular and dual lower set tolerances.
The paper is organized as follows. Section 1.2 reviews relevant literature, highlighting research gaps and the motivation for this study. Section 2 defines the uncertain MST problem and introduces the programming model for α -MST. Section 3 presents a tolerance-based stability analysis of the uncertain MST, including bounds and exact formulas for LST and DLST. Section 4 summarizes key findings and proposes directions for future research. Appendix A provides foundational concepts and an overview of uncertainty theory.

1.2. Motivation and Research Contributions

The notions of tolerances and sensitivity play instrumental roles in refining local search heuristics and resolving network-centric difficulties in network architecture and transportation cybernetics. Tolerance-driven methodologies have demonstrated efficacy in enhancing optimization techniques like branch-and-bound for combinatorial challenges, including MST, traveling salesman problem (TSP), shortest path identification, and widest path determination [4,5,6,7,8,9,10].
Building upon recent progress in single tolerances for post-disaster transport networks—which established minimum and maximum cost variations preserving solution optimality for individual elements—we present two novel metrics, lower set tolerance (LST) and dual lower set tolerance (DLST), as network stability gauges. These set-based tolerance measures prove particularly advantageous in scenarios featuring uncertain change distributions but known aggregate estimations, exemplified by transportation networks where traversal times fluctuate unpredictably across connections without certainty regarding affected edges. We mathematically formalize LST and DLST under uncertainty, deduce their properties, and illustrate their utility in uncovering structural characteristics of optimal MST solutions, including identification of elements common to all optima and detection of alternative solution existence. Furthermore, we institute methodologies to compute or bound these set tolerances, frequently leveraging single tolerances, and recognize shared attributes (e.g., independence from selected optimal solution and positive values indicating unique optima) alongside distinctions (e.g., interpretation of infinite values).
This research progresses sensitivity analysis under uncertainty, a critical concentration in operations research, particularly for appraising network functionality during crisis scenarios [11,12,13,14,15,16]. A primary objective has involved evaluating network robustness and pinpointing critical constituents, with diverse frameworks employing metrics to investigate reliability [17]. However, most methodologies depend on probabilistic or fuzzy theoretical foundations [3,18,19], which prove inadequate when network parameters, such as edge functionality, lack sufficient data for reliable probability distribution formation, as witnessed during earthquake emergencies. Various analytical and modeling frameworks have surfaced to explore network reliability utilizing diverse metrics. Within the domain of road network reliability, prevailing studies predominantly concentrate on three fundamental domains: (1) connectivity reliability, (2) travel time reliability, and (3) capacity reliability [20,21,22,23,24,25,26]. Ref. [11] pioneered the modeling of network travel time reliability under stochastic demand, offering one of the earliest methodological foundations for quantifying travel-time variability in congested networks. Ref. [20] introduced a matrix-exponential approach for network reliability analysis, providing an exact probabilistic framework suitable for evaluating large-scale systems with complex failure distributions. Ref. [26] proposed an evaluation framework for carrying capacity reliability in regional rail transit systems, highlighting the importance of reserve capacity and operational resilience in modern rail networks. Ref. [21] analyzed the interaction between travel time reliability and route choice behavior using a generalized Bayesian traffic model, bridging behavioral responses with network reliability outcomes. Ref. [22] presented a comprehensive review of methodological developments in travel time reliability, summarizing advances in measurement, modeling, and integration into traffic assignment. Ref. [25] examined connectivity analysis of transportation networks by incorporating bridges and pavements under uncertainty, offering a practical framework for assessing infrastructure-dependent reliability. Ref. [24] focused on seaborne crude oil networks, proposing a methodology for connectivity reliability evaluation and the selection of most reliable shipping routes, relevant for maritime logistics planning. Ref. [27] applies uncertainty modeling for travel times in distribution logistics, using Monte Carlo and collocation methods to capture variability in travel times and analyze its impact on routing and scheduling decisions. Ref. [23] investigated resilience in flood-disrupted dynamic transportation networks, characterizing link reliability and stability to capture system performance under cascading hazards. Ref. [16] studied max-type reliability in post-disaster networks using sensitivity and stability analysis, extending uncertain network models to capture performance under extreme disruptions. Ref. [12] analyzed connectivity reliability in uncertain networks through stability analysis, providing theoretical foundations closely aligned with uncertainty-driven reliability measures. Ref. [14] developed robustness assessment methods for urban road networks under multiple hazard events, integrating hazard exposure with network structure to evaluate vulnerability. Ref. [15] offered a comprehensive review of transportation system resilience concepts, consolidating definitions, frameworks, and evaluation methods for infrastructure and operational resilience. Ref. [13] investigated the connectivity of intercity passenger transportation in China using a multi-modal network approach, illustrating the significance of integration across transport modes for accessibility and reliability.
However, we note that expert-derived “belief degrees” for edge dependability, when modeled probabilistically, can generate untrustworthy outcomes. To address this limitation, uncertainty theory, pioneered by [1,2], supplies a rigorous framework for managing human-induced uncertainties in network reliability assessment. We propose an innovative approach integrating MST, sensitivity examination, and set tolerances within uncertainty theory. Here, edge reliabilities are represented as uncertain variables—neither fuzzy nor stochastic—enabling precise characterization in data-deficient situations. We investigate how modifications in edge reliabilities influence MST stability, introducing LST and DLST as pivotal metrics in uncertain settings. Employing uncertainty theory, we develop systematic procedures to compute these set tolerances, strengthening network resilience assessment. This investigation contributes to the broader exploration of uncertain network challenges [2,16,28,29,30,31,32,33,34,35,36]. Numerous recent studies have extended uncertainty theory to diverse network design and optimization contexts. Recent works further illustrate how uncertainty can be systematically incorporated into network reliability and optimization models. For instance, Wang and Sheng [37] address both uncertain edge weights and uncertain topology, employing conditional uncertain variables to model networks where edges may or may not exist under uncertainty. Ref. [38] develop an Uncertainty Reliability Indicator (URI) for structural systems under epistemic uncertainty, defining safety-cost trade-offs using uncertain variables. Ref. [10] propose a reliability certification framework for supply chain networks subject to uncertain failures and demand, emphasizing robust design under uncertainty. Hosseini and Wadbro [12] analyzed connectivity reliability in uncertain networks, a direction closely related to our MST stability framework. Ref. [34] incorporated uncertain flows into the p-hub location problem, and Veresnikov et al. [35] applied uncertain programming to technical system design. Ref. [39] modeled environmental supply chain networks under uncertainty, demonstrating applicability in sustainability contexts. In graph optimization, Gao and Jia [40] studied the degree-constrained MST with uncertain edge weights, while [31] extended uncertain multilevel programming to vehicle routing. Ref. [30] provided a bibliometric overview of uncertainty theory applications in supply chains, highlighting future research avenues. More recently, Hosseini [16] explored max-type reliability in post-disaster networks. Guo et al. [28] addressed procurement and routing strategies under uncertain environments, and Wang [29] proposed mixed-uncertainty modeling for coal transportation costs. Together, these contributions illustrate the growing role of uncertainty theory in addressing complex reliability and optimization problems across transportation and supply chain systems. These works collectively demonstrate that uncertainty theory is maturing as a serious alternative to probabilistic/fuzzy methods for modeling human-induced or data-scarce reliability, and they strongly motivate the development of LST and DLST in uncertain network environments.
This work establishes a substantive foundation for analyzing the stability of uncertain minimum spanning trees through LST and DLST applications, effectively merging theoretical progress with practical applicability. As uncertainty increasingly impacts critical infrastructure, demand for such analytical frameworks will escalate, rendering this research a timely and valuable disciplinary contribution. In summary, this investigation delivers three principal contributions: (1) a methodological framework for incorporating “belief degrees” in tolerance-based stability assessment of uncertain MSTs, addressing constraints of probabilistic and fuzzy approaches; (2) verification that LST and DLST are well-defined, solvable, and computable in polynomial time and (3) efficient computational procedures for LST and DLST outperforming iterative re-optimization methods.

2. Modelling and Formulation: Uncertain MST

Consider N = ( V , E ) denoting a network where V represents the node set and E V × V the edge set. Let n = | V | and m = | E | indicate node and edge (or link) counts, respectively. Unique edges represent connections between node pairs. A spanning tree T = V , E T constitutes a sub-network of N structured as a tree containing n 1 edges. Assuming each edge possesses an associated cost, an MST represents a spanning tree minimizing cumulative cost/weight across all spanning trees. We designate Ω as the complete set of spanning trees in N. Specifically, we define subset Ω ( i , j ) + as spanning trees containing edge ( i , j ) , and Ω ( i , j ) as those excluding edge ( i , j ) .
Each edge ( i , j ) features an associated reliability measure r i j ( 0 , 1 ) quantifying its functional probability. Naturally, we seek a spanning tree T = V , E T maximizing aggregate reliability. Thus, we maximize ( i , j ) T r i j over the complete spanning tree set Ω . For computational convenience, we transform this maximization into a minimization problem through reliability factor inversion, representing transformed factors as r i j : = r i j 1 (termed risk factors). Consequently, we approach the reformulated network problem as an MST formulation employing risk factors r i j ( 0 , + ) as edge weights.
The problem now constitutes a standard MST formulation—the minimal risk spanning tree problem. We define the risk R ( T ) of spanning tree T Ω as the summation of edge risks within T. Hence, the MST formulation is expressible as follows:
min T Ω R ( T ) = min T Ω ( i , j ) T r i j = min T Ω ( i , j ) E r i j x i j T ,
where x i j T = 1 indicates edge ( i , j ) belongs to T and 0 otherwise.
Accordingly, R ( Ω ) : = min T Ω R ( T ) designates the objective function value for the MST problem—the risk value of an MST within the network. In a similar way, we let R Ω ( i , j ) + and R Ω ( i , j ) denote the risk value of the MST within Ω ( i , j ) + and Ω ( i , j ) , respectively.

MST in Uncertain Settings

Diverging from conventional MST formulations, we examine scenarios featuring an uncertain measure M , with uncertain risk variables associated with edges (Appendix A). Specifically, for each edge ( i , j ) E , there exists an uncertain risk variable ξ ( i , j ) = ξ i j . This permits MST analysis under uncertain conditions where edge risks exhibit extreme variability. A spanning tree T with uncertain risk variables constitutes an uncertain family denoted ξ T = ξ i j ( i , j ) T . The uncertain risk variable linked to this tree manifests as the combined edge risks:
f ξ T = ( i , j ) T ξ i j = ( i , j ) E ξ i j x i j T .
Expression (1) specifies the minimization objective (over T Ω ) for the uncertain MST problem, targeting identification of minimal-risk spanning trees under uncertain conditions:
min T Ω ( i , j ) T ξ i j = min T Ω ( i , j ) E ξ i j x i j T .
The value of f ξ T remains uncertain; consequently, we must clarify the interpretation of ‘min’ in (2).
Owing to limitations in traditional deterministic or probabilistic approaches for handling uncertain variables, alternative methods must be investigated for addressing the uncertain MST challenge via uncertainty programming techniques. This necessitates the development of comparable models. In contrast to real numbers, the uncertain domain lacks inherent ordering. A fundamental challenge involves establishing a ranking methodology for uncertain variables. To address this, ref. [36] employed the critical value concept (specifically, the pessimistic value) of an uncertain variable. Uncertainty programming incorporating this critical value principle constitutes chance-constrained programming.
Assuming N = ( V , E ) is a network, T a spanning tree, and α ( 0 , 1 ] a predetermined confidence level (user-specified), the α -critical value (here, the α-pessimistic value) associated with the uncertain spanning tree ξ T is defined as
ξ T α = inf r M { f ( ξ T ) r } α .
An uncertain spanning tree ξ T * qualifies as an α -MST if for any alternative tree ξ T we have ξ T * α ξ T α . We observe that for any predetermined confidence level α ( 0 , 1 ] , the α -pessimistic value associated with an uncertain spanning tree ξ T and the α -pessimistic value of any uncertain risk variable ξ i j constitute increasing, left-continuous functions of α . Therefore, the α -MST programming model for the uncertain MST formulation is structured as an r-minimization:
min r R , T Ω r , subject to M ( i , j ) T ξ i j r α .
To advance, let network N ( α ) signify the transformed version of an uncertain network N, where uncertain risk variables ξ i j are replaced by their α -pessimistic values ξ i j α for specified confidence level α . The subsequent theorem establishes that the α -MST can be acquired by solving a standard MST problem in this auxiliary network N ( α ) .
Theorem 1
([36]). Assume α constitutes a predetermined confidence level and N = ( V , E ) an uncertain network. Furthermore, assume uncertain risk variables { ξ i j ( i , j ) E } exhibit independence and possess regular distributions { Φ i j ( i , j ) E } . If Ψ 1 symbolizes the inverse uncertainty distribution of the uncertain MST, then Ψ 1 exists as a continuous, strictly increasing function of α. Additionally, it is established that the α-MST formulation can be equivalently expressed as
min T Ω ( i , j ) T ξ i j α = min T Ω ( i , j ) E ξ i j α x i j T ,
where ξ i j α designates the α-pessimistic value of variable ξ i j and it is defined as
ξ i j α = inf r M { ξ i j r } α .
Given that uncertain risk variables ξ i j are mutually independent with regular distribution functions, we delineate a method for calculating the inverse uncertainty distribution Ψ 1 of the uncertain MST in such networks. Specifically, for any α ( 0 , 1 ) , Ψ 1 ( α ) is determinable. Iterating this process enables numerical acquisition of uncertainty distribution Ψ ( x ) to the decision-maker-specified precision. This empowers decision-makers to compute maximally reliable MSTs across risk levels and comprehend network performance under diverse uncertainty scenarios.
Example 1.
The proposed methodology is applied to dual instances corresponding to distinct planning zones within the street network illustrated in Figure 1. Each network edge is associated with an independent uncertain risk variable, reflecting inherent system uncertainty. We let Ψ denote the uncertainty distribution of the uncertain MST, governing MST behavior under uncertainty. By evaluating Ψ, we analyze uncertain MST evolution as a function of network-wide uncertain risk variables.
Our example employs varied confidence level α values. Primarily, we apply Linear and Zigzag uncertainty distributions to links (Appendix A). Constructing these distributions required parameter estimation. Certain parameters (e.g., a, b, c in Definitions A3 and A4) for link distributions were randomly selected from uniform distributions within user-defined bounds. Users also specified uncertainty variable types assigned per link. Once the confidence level α ( 0 , 1 ) is fixed, inverse uncertainty distributions for all ξ i j are computed. The α -MST within N ( α ) is subsequently derived using an MST algorithm (e.g., see [4]).
For a clearer understanding of the network topologies, the risk variables for a bunch of edges, as well as their corresponding α -pessimistic values ξ i j α , are displayed in Table 1. This provides insight into the variability and risk associated with specific links within the network, offering a foundation for further analysis of their stability and reliability. We remark that for any link ξ i j with a constant risk parameter c, we can set ξ i j = ξ i j α = c for all values of α [1,2].
The corresponding objective function optima for the α -MST formulation appear in Figure 2. Note that uncertain MST objective optima originate from the inverse distribution of the uncertain MST; i.e., min T Ω ( i , j ) T ξ i j α .
Through incremental α adjustment within ( 0 , 1 ) , we efficiently compute both inverse distribution Ψ 1 and overall distribution Ψ for the uncertain MST, furnishing a comprehensive behavioral representation under varying confidence levels. This process enables graphical depiction of the relationship between uncertain MST distribution and uncertainty levels, as illustrated in Figure 2.

3. Sensitivity Analysis Based on Lower Set Tolerances

3.1. Single Lower Tolerances

This section introduces and formalizes tolerance-based sensitivity analysis for the uncertain MST. The analysis hinges on the α -MST concept, where tolerances are computed as confidence level functions. As the confidence level α varies, both MST and tolerances dynamically adapt. Tolerance formulas are presented, demonstrating their variation relative to confidence level. For general uncertain MST formulations, lower tolerances illuminate how optimal spanning trees are affected by edge risk factor modifications. Specifically, lower tolerance quantifies risk factor reduction impacts. Computing these tolerances constitutes a combinatorial challenge, further complicated in uncertain networks where analysis involves uncertain variables rather than deterministic factors.
Remark 1.
Our exposition demonstrated that any uncertain MST formulation on N is convertible to an α-MST formulation on modified network N ( α ) for given α. In this auxiliary network N ( α ) , risk variables cease to be ‘uncertain’; they are replaced by definite α-pessimistic values. Consequently, we simply implement variable transformations ξ i j ( i , j ) E then apply MST algorithms (e.g., Kruskal) to identify an MST in N ( α ) . Assuming ξ i j α represents α-pessimistic values for variables ξ i j in network N, we substitute all ξ i j in the uncertain network with ξ i j α . Edge transformation initialization consumes O ( m ) time; thus, algorithm complexity is typically O m log m where m is the edge count. Utilizing efficient disjoint-set data structures (e.g., Union-Find) reduces time complexity to O m log n , where n is node count [4].
Definition 1
( λ -Network). Denote by N ( i , j ) λ ( α ) the network N ( α ) for λ R 0 , where edge ( i , j ) value ξ i j α (denoted ξ ( i , j ) α ) is replaced by ξ i j α λ , with other values unchanged:
ξ ( i , j ) α = ξ i j α if ( i , j ) ( i , j ) , ξ i j α λ if ( i , j ) = ( i , j ) .
Assuming α is a specified confidence level and T * is an α -MST (i.e., MST in N ( α ) ), lower tolerance is defined as the supremum λ permitting link weight reduction—typically within the α -MST—while maintaining spanning tree α -MST status, with other factors invariant. Thus, we formalize the single lower tolerance for a link relative to T * as
l T * α ( i , j ) = sup λ 0 , ξ i j α λ T * is MST for N ( i , j ) λ ( α ) = inf λ 0 , ξ i j α λ T * is not MST for N ( i , j ) λ ( α ) .
For technical analysis, the function R N ( α ) proves particularly useful. It signifies the minimal objective function value for the MST formulation in N ( α ) without ξ i j α perturbations. Specifically, it provides the uncertain MST value in N for preset α :
R N ( α ) = min T Ω ( α ) R ( T ) ,
where Ω ( α ) is the spanning tree set in N ( α ) . We also note that set Ω ( α ) in N ( α ) is identical to set Ω in N.
It is established [36] that for given confidence level α and T 1 , T 2 Ω , and for any edge ( i , j ) E / ( T 1 T 2 ) :
  • (a1) if R T 1 = R T 2 then λ : R N ( i , j ) λ ( α ) T 1 = R N ( i , j ) λ ( α ) T 2 ,
  • (a2) if R T 1 R T 2 then λ : R N ( i , j ) λ ( α ) T 1 R N ( i , j ) λ ( α ) T 2 .
Consequently, we deduce that when lower tolerances exist, full edge set examination is unnecessary. Instead, we only consider edges in E excluded from T * ; i.e., ( i , j ) E T * . Thus, lower tolerance existence for edge ( i , j ) implies ( i , j ) E T * for some α -MST T * . Namely, for every α -MST pair T * and T * * in Ω , for any edge ( i , j ) E ( T * T * * ) we have
l T * α ( i , j ) = l T * * α ( i , j ) .
This implies that for any fixed α , lower tolerances are independent of any specific α -MST. Therefore, we now reference tolerances without explicit α -MST specification. This generalization facilitates broader comprehension of edge tolerances in uncertain networks, enabling more flexible and comprehensive tolerance-based analysis.
Lemma 1
([36]). Let α be a predetermined confidence level for an uncertain network N = ( V , E ) . If some α-MST excludes ( i , j ) , then lower tolerance l i j α is obtainable via the following:
l i j α = R N ( i , j ) + ( α ) R N ( α ) ,
where R N ( i , j ) + ( α ) signifies the α-MST value in N ( α ) containing edge ( i , j ) , calculable as
R N ( i , j ) + ( α ) = R N ( i , j ) M ( α ) + M , w h e r e M max ( i , j ) E ξ i j α .

3.2. Set-Based Lower Tolerances

The single lower tolerance concept extends to scenarios where risk factors for edge sets are perturbed by constants, yielding lower set tolerances. Thus, as a tolerance extension, we introduce a generalized tolerance analysis problem, set tolerance analysis, where multiple elements vary concurrently and independently over predefined sets to evaluate how such variations impact current MST optimality. To this end, we posit that A E is the edge set (collection) undergoing modification, and λ is a collection of non-negative real-valued perturbation variables λ i j R 0 for ( i , j ) A . Henceforth, given network N = ( V , E ) , we denote by N A λ the network N = ( V , E ) where edge ( i , j ) factor is perturbed by λ i j ( i , j ) A , and ( i , j ) A λ i j = λ .
Assuming α is a specified confidence level and T * is an α -MST, we define the lower set tolerance of A relative to T * as the supremum λ such that risks for all edges ( i , j ) A remain non-increasing with total reduction λ and T * retains optimality, provided risks for all other edges ( i , j ) E A are unaltered.
L T * α A = sup λ R 0 λ ( i , j ) A λ i j = λ , λ i j 0 , ξ i j α , T * is MST in N A λ ( α ) .
For a lower set tolerance, the corresponding infimum definition is non-equivalent to the supremum definition. Therefore, we define the dual lower set tolerance as follows:
L ¯ T * α A = inf λ R 0 λ ( i , j ) A λ i j = λ , λ i j 0 , ξ i j α , T * is not MST in N A λ ( α ) .
L ¯ T * α ( A ) identifies a pathway—potentially an α -MST post-perturbation—achievable with minimal effort/reduction.
Remark 2.
Consider N ( α ) as the transformed version of N = ( V , E ) for a preset confidence level α, T * an α-MST, and A E the edge set undergoing modification. If lower and dual lower set tolerances exist, the complete set A need not be considered. For (dual) lower set tolerance computation, we only examine elements of A E excluded from T * , i.e., ( i , j ) A T * . Consequently, whenever discussing (dual) lower set tolerance for set A , it implies the existence of α-MST T * such that ( i , j ) A T * ( i , j ) A .
Remark 3.
Assuming R N A λ ( α ) T 1 and R N A λ ( α ) T 2 represent risk values of T 1 and T 2 in the perturbed network N A λ ( α ) , then for any edge set A E ( T 1 T 2 ) :
  • (a) if R T 1 = R T 2 then vector λ : R N A λ ( α ) T 1 = R N A λ ( α ) T 2 ,
  • (b) if R T 1 R T 2 then vector λ : R N A λ ( α ) T 1 R N A λ ( α ) T 2 .
Lemma 2.
For any uncertain network and confidence level α, lower set tolerances are independent of α-MST—for every α-MST pair T * and T * * and any edge set A E ( T * T * * ) :
L T * α ( A ) = L T * * α ( A ) ,
L ¯ T * α ( A ) = L ¯ T * * α ( A ) .
Proof. 
Consider A A ( T * T * * ) and perturbation vector λ . Note that T * and T * * are dual α -MSTs in N ( α ) . Hence, R ( T * ) and R ( T * * ) are identical. Therefore, for any perturbation vector λ , Remark 3 implies
R N A λ ( α ) T * = R N A λ ( α ) T * * .
Finally, lower set tolerance and dual lower set tolerance definitions (14) and (15) establish the results. □
Per Lemma 2 results, (dual) lower set tolerances for any set A are independent of α -MST. Consequently, we henceforth denote set tolerances without specific α -MST indication. Additionally, examining LST and DLST definitions (14) and (15) reveals that for any α -MST T * :
L ¯ α A L α A edge set A E ,
L ¯ α A = L α A = l i j α singleton edge A = { ( i , j ) E } ,
where lower tolerance l i j α is obtainable via Lemma 1.
Lemma 3.
Consider an uncertain network N = ( V , E ) and a predetermined confidence level α. Let A E be the edge set undergoing changes. Then the following statements are equivalent.
(a) 
A E T Ω T
(b) 
L ¯ α A = ,
(c) 
min ( i , j ) A l i j α = .
Proof. 
Note that the spanning tree set Ω ( α ) in N ( α ) is identical to Ω in N for any α .
(a) ⇒ (b): Since A is a subset of no spanning tree, reducing the risk of edge ( i , j ) ( i , j ) A leaves spanning tree risks unchanged. Thus, optimal solutions ( α -MSTs) in N ( α ) remain optimal for N A λ ( α ) . Consequently, L ¯ α ( A ) = .
(a) ⇐ (b): Assume L ¯ α ( A ) = and T * is α -MST in N ( α ) with A E T * . Suppose a spanning tree T Ω exists with A E T . Thus, at least one edge ( k , t ) A belongs to T. Define perturbation vector λ with components:
λ i j = λ , ( i , j ) = ( k , t ) , 0 , ( i , j ) ( k , t ) ,
where ( i , j ) A and λ > R N ( α ) ( T ) R N ( α ) T * . Then,
R N A λ ( α ) ( T ) = R N ( α ) ( T ) λ < R N ( α ) T * = R N A λ ( α ) T * ,
where R N A λ ( α ) ( T ) and R N ( α ) ( T ) denote T’s risk values in the perturbed network N A λ ( α ) and N ( α ) , respectively. Here, T * cannot be α -MST for N A λ ( α ) . Therefore, L ¯ α ( A ) λ , contradicting L ¯ α ( A ) = . Thus, A E T Ω T holds.
(a) ⇔ (c): Since A is a subset of no spanning tree T Ω , ( i , j ) T Ω T ( i , j ) A . Thus, any edge ( i , j ) is excluded from every spanning tree, and reducing ( i , j ) ’s risk leaves spanning tree risk values unchanged. Hence, α -MSTs persist as optimal, justifying l i j α = ( i , j ) A , establishing the result. Finally, (a) ⇐ (c) follows from the equivalence of expressions. □
Lemma 4.
Consider uncertain network N = ( V , E ) , predetermined confidence level α, and A E (with defined lower set tolerance) as the edge set subject to changes. Let vector λ R 0 (components λ i j ) with λ = ( i , j ) A λ i j be a perturbation vector satisfying λ > L α ( A ) . Then, set A intersects every α-MST in N A λ ( α ) .
Proof. 
First, since A E has defined a lower set tolerance, some α -MST T * in N ( α ) satisfies A E T * . Proof by contradiction: suppose not, i.e., some α -MST T exists in N A λ ( α ) with A E T . Since spanning tree set Ω ( α ) in N ( α ) matches that of N A λ ( α ) for any α , T is a feasible spanning tree in N ( α ) , so R ( T * ) R ( T ) . As A E ( T * T ) , Remark 3 implies
R ( T * ) = R N A λ ( α ) ( T * ) R N A λ ( α ) ( T ) = R ( T ) .
By lower set tolerance definition and λ > L α ( A ) , T * cannot be α -MST for N A λ ( α ) . Alternatively, T also cannot be α -MST for N A λ ( α ) . This contradicts T’s optimality, hence A intersects every α -MST in N A λ ( α ) . □
Theorem 2.
Consider uncertain network N = ( V , E ) , predetermined confidence level α, and A E as the modifying edge set. The following bounds for lower and dual lower set tolerances hold.
(a) 
L ¯ α A L α A ,
(b) 
max ( i , j ) A l i j α L α A ( i , j ) A l i j α ,
(c) 
L ¯ α A = min ( i , j ) A l i j α .
Proof. 
(a): This inequality follows directly from definitions (14) and (15).
(b): Assume T * is α -MST in N ( α ) with A E T * . For the first inequality, assume the contrary: max ( i , j ) A l i j α > L α ( A ) . Thus, for at least one edge ( k , t ) A , l k t α = max ( i , j ) A l i j α . Define β satisfying L α ( A ) < β < l k t α . Define specific perturbation vector λ with components:
λ i j = L α ( A ) + β 2 , ( i , j ) = ( k , t ) , 0 , ( i , j ) ( k , t ) .
By lower set tolerance definition, for all λ = ( i , j ) A λ i j with L α ( A ) < λ < β , T * is not MST for N A λ ( α ) . Since L α A + β 2 < β < l k t α , this contradicts the lower tolerance definition (14).
For the second inequality, assume the contrary: ( i , j ) A l i j α < L α ( A ) . Define β satisfying ( i , j ) A l i j α < β < L α ( A ) and λ with β < λ < L α ( A ) . Define perturbation vector λ (components λ i j ) with λ = ( i , j ) A λ i j such that T * is α -MST of N A λ ( α ) . Therefore, some spanning tree T and edge ( k , t ) A satisfy
λ k t > l k t α ,
implying
R N A λ ( α ) ( T ) < R N A λ ( α ) T * ,
contradicting T * ’s optimality in N A λ ( α ) .
(c): First show L ¯ α ( A ) min ( i , j ) A l i j α . Assume the contrary: L ¯ α ( A ) > min ( i , j ) A l i j α . Some edge ( k , t ) A satisfies l k t α = min ( i , j ) A l i j α . Define β satisfying l k t α < β < L ¯ α ( A ) . Define perturbation vector λ with components:
λ i j = l k t α + β 2 , ( i , j ) = ( k , t ) , 0 , ( i , j ) ( k , t ) .
By dual lower set tolerance definition (15), for all λ = ( i , j ) A λ i j with 0 < λ < β , T * is not α -MST for N A λ ( α ) . This yields a contradiction since l k t α < 1 2 ( β + l k t α ) .
Now prove L ¯ α ( A ) min ( i , j ) A l i j α . Assume the contrary: L ¯ α ( A ) < min ( i , j ) A l i j α . Considethe r perturbation vector λ (components λ i j ) with
L ¯ α ( A ) < λ < min ( i , j ) A l i j α < min ( i , j ) A ξ i j α
such that T * is not α -MST in N A λ ( α ) . Thus, some spanning tree T satisfies
R N A λ ( α ) ( T ) < R N A λ ( α ) ( T * ) .
Case 1: If A E T , Remark 3 implies
R ( T * ) = R N A λ ( α ) ( T * ) R N A λ ( α ) ( T ) = R ( T ) ,
contradicting the inequality.
Case 2: If A E T , then at least one edge ( k , t ) A satisfies ( k , t ) T . Select the edge ( k , t ) with ξ k t α = min ( i , j ) A T ξ i j α . We immediately derive
R N ( i , j ) + ( α ) R N ( α ) ( T ) < R N A λ ( α ) T * + ξ k t α R N ( α ) ( T ) + l k t α ,
contradicting Lemma 1. □
Corollary 1.
Consider an uncertain network N = ( V , A ) and a predetermined confidence level α. Let A E be the modifying edge set. Then the following statements are equivalent.
(a) 
A E T Ω T
(b) 
L α A = ,
(c) 
max ( i , j ) A l i j α = .
Corollary 2.
Uncertain network instances exist where for certain MSTs and a given confidence level α, the following cases occur:
(a) 
max ( i , j ) A l i j α = L α A ,
(b) 
max ( i , j ) A l i j α < L α A < ( i , j ) A l i j α ,
(c) 
L α A = ( i , j ) A l i j α .
Lemma 5.
Consider uncertain network N = ( V , E ) , predetermined confidence level α, Ω * the complete set of α-MSTs in N, and A E the modifying edge set. Then
(a) 
A E T * Ω * T * L ¯ α ( A ) > 0 ,
(b) 
A E T * Ω * T * L α ( A ) > 0 .
Proof. 
(a): Since A E P * P * T * , for any edge ( i , j ) A , ( i , j ) T * Ω * T * . Thus, by single lower tolerance definition and Lemma 1 computation, l i j α > 0 ( i , j ) A . Consequently,
min ( i , j ) A l i j α > 0 and max ( i , j ) A l i j α > 0 .
Finally, Theorem 2(b,c) establishes L ¯ α ( A ) > 0 and L α A > 0 . The reverse direction in (a) follows from expression equivalence. Note that (b)’s reverse direction generally fails. □
Corollary 3.
Consider an uncertain network N = ( V , E ) , a predetermined confidence level α. Then the following statements are equivalent.
(a) 
Exactly one α-MST T * exists in N ( α ) .
(b) 
L ¯ α ( A ) > 0 A E T * .
(c) 
L α ( A ) > 0 A E T * .
In this section, we have developed a practical toolkit to assess how much risk can shift in a network before its Minimum Spanning Tree (MST) loses optimality. The foundation is Lemma 1, which provides a formula for the single lower tolerance l i j α , quantifying how much risk an edge ( i , j ) can lose before the α -MST changes. This gives network managers a quick metric to gauge individual edge stability. Building on this, Lemma 2 proves that these tolerances are independent of the specific α -MST chosen, ensuring reliable results across different network configurations.
Scaling up, Theorem 2 delivers two critical tools: lower set tolerance (LST) and dual lower set tolerance (DLST). LST, as shown in Theorem 2(b), measures the maximum total risk reduction a set of edges A can sustain while keeping the α -MST intact, with bounds max ( i , j ) A l i j α L α ( A ) ( i , j ) A l i j α . These bounds allow quick assessment of network resilience without intensive computations. Meanwhile, Theorem 2(c) defines DLST as L ¯ α ( A ) = min ( i , j ) A l i j α , pinpointing the smallest risk drop—computed via Lemma 1—that disrupts the MST. Network managers can use DLST to identify and reinforce critical edges, such as vulnerable power lines or shipping routes, to prevent failures during disruptions.
The uniqueness of the α -MST is addressed in Corollary 3, which states that if only one α -MST exists, then L ¯ α ( A ) > 0 for any set A E T * . This signals that the network can tolerate some risk reductions without shifting the MST. If multiple MSTs exist, low tolerances from Lemma 1 on non-MST edges warn of potential instability, prompting preemptive action. Managers can test this by computing l i j α for non-MST edges to spot weak points.
Computationally, these tools are efficient. Single tolerances from Lemma 1 are calculated in polynomial time, and Theorem 2’s bounds avoid costly re-optimization. For large networks, like logistics systems with thousands of routes, LST and DLST can be mapped in real time. Use Theorem 2(b) for a fast resilience check, then apply Theorem 2(c) to prioritize critical edge reinforcements before disruptions, such as storms, hit. This approach ensures networks stay operational with minimal overhead.

3.3. Analysis of Tolerances for Network Planning

The single-edge tolerances ( l i j ) and set tolerances (LST, DLST) provide a quantitative basis for a multi-scale assessment of network robustness. They precisely measure the susceptibility of the current optimal solution ( T * ) to improvements in alternative connections.

3.3.1. Interpreting Single-Edge Tolerances

Consider a non-tree edge  ( i , j ) T * from Example 1 with a relatively low single-edge tolerance ( l i j ) of 1.8 , for, e.g., α = 0.2 This indicates that the weight (or risk) ξ i j needs to be reduced by only 1.8 units before the edge becomes cost-effective enough to enter a new optimal MST, displacing an existing tree edge. In practical terms, this alternative edge is a highly competitive threat; the current network configuration is highly vulnerable to even minor improvements along this route. A network planner might see this as an opportunity for a low-cost intervention or as a risk if a competitor were to upgrade this link.
Conversely, consider another non-tree edge  ( k , t ) T * from Example 1 (for, e.g., α = 0.2 ) with a high single-edge tolerance ( l k t ) of 8.4 signifies that the weight ξ k t must be reduced significantly (by 8.4 units) before it becomes a viable alternative. The current tree T * is highly robust to improvements on this specific link. A planner might deprioritize investment here, as a large effort is required to make this alternative competitive.

3.3.2. Interpreting Set Tolerances for Coordinated Planning

The true power of the framework is revealed when analyzing sets of edges. Consider a set A = { ( a , b ) , ( c , d ) } E T * representing edges in a zone slated for development. The LST of A , bounded by max ( l a b , l c d ) = 8.8 and ( l a b , l c d ) = 16.6 , quantifies the collective investment required to make the set disruptive.
  • A narrow gap between these bounds implies the set’s impact is capped by its single most competitive member; coordinated investment offers little synergistic advantage.
  • A wide gap, as in this example, suggests strong potential synergy. A coordinated upgrade across the entire set could be far more effective at shifting the optimal network solution than improving edges individually, providing a compelling rationale for area-wide projects.

3.3.3. Computational Feasibility and Practical Implementation

A key advantage of this framework is its computational tractability. The methods developed herein calculate these tolerance metrics—either exactly or within tight bounds—in polynomial time, making them applicable to realistic network problems. This efficiency is further scalable through parallel computing architectures. These tools enable a shift from deterministic planning to risk-aware design. Planners can now make decisions explicitly aligned with their risk tolerance, leading to the design of more robust infrastructure and more precise risk assessments. This is particularly critical in disaster management, where the reliability of an evacuation route hinges on the dependability of its links. A path from an uncertain MST, though potentially longer, offers a higher guarantee of functionality under duress. Prioritizing high-tolerance routes ensures that rescue operations prioritize probability of arrival over nominal distance.
To fully realize this potential in large-scale applications, integration with Geographic Information Systems (GIS) is a critical next step. Embedding our computational framework within a GIS would allow the direct incorporation of spatial data—elevation, hazard maps, land use—into the uncertainty model. This would enable not only the calculation of tolerances but also the spatial visualization of critical corridors and the optimal siting of emergency facilities, thereby bridging the gap between theoretical network robustness and actionable spatial planning.

4. Discussion and Conclusions

This paper has tackled the challenge of evaluating stability in Minimum Spanning Trees (MSTs) within uncertain networks, a problem critical to applications such as transportation, communication, power networks, and reliability optimization. We introduced two novel concepts—lower set tolerance (LST) and dual lower set tolerance (DLST)—to assess how simultaneous changes in risk factors across multiple network elements impact the optimality of MST solutions. LST represents the supremum decrease in risk that preserves the current MST’s optimality, while DLST measures the infimum decrease required to render it non-optimal. By embedding these measures within an uncertainty programming framework, we have developed an efficient alternative to traditional re-optimization approaches, providing exact formulas and bounds to compute set tolerances and enhance decision-making under uncertainty. While our methods provide efficient computational solutions for LST and DLST, their complexity warrants deeper investigation, presenting an opportunity to optimize performance in large-scale applications.
The significance of this research lies in its demonstration that uncertainty programming can effectively address combinatorial optimization problems like the MST. By incorporating uncertain reliability and risk factors, our framework advances theoretical insights into network stability while offering practical tools for fields such as transportation, logistics, network design, and cybernetics. The ability to analyze multiple cost changes simultaneously through LST and DLST not only strengthens sensitivity analysis but also supports optimization algorithms by evaluating the consequences of including or excluding network elements, making it highly relevant to real-world scenarios where disruptions are common.
Integrating Travel Time and Capacity. One promising direction for future research is exploring uncertain travel time reliability in post-crisis transportation networks, where obtaining reliable travel time distribution data poses a significant challenge. Further enhancements could involve integrating edge reliability and capacity into our models to address more complex network dynamics.
Dynamic and Sequential Frameworks. A fundamental assumption of our model is the static nature of the network and its uncertainties. A highly impactful direction for future research involves extending the LST and DLST concepts to dynamic settings. Real-world networks evolve over time, and disruptions often trigger sequential recovery decisions. A dynamic version of this framework could model time-dependent uncertain weights ξ i j ( t ) and analyze how tolerances evolve throughout a disruption event or recovery process. Integrating our robustness measures with multi-stage stochastic programming or Markov Decision Processes could provide powerful tools for designing optimal adaptive policies for network monitoring, hardening, and recovery. This would transform the static robustness measures presented here into dynamic indicators for sequential decision-making under deep uncertainty.
Computation of Exact Set Tolerances. We also note that while the bounds max ( i , j ) A l i j and ( i , j ) A l i j provide polynomial-time computable estimates for the LST of set A, the problem of computing the exact value LST ( A ) is a non-linear optimization problem over the space of perturbation vectors λ . The gap between the upper and lower bounds can be significant, particularly in dense graphs where multiple edges in A can tolerate non-zero perturbations concurrently without violating the optimality conditions of T * . Closing this computational gap presents an interesting problem for future work. Potential approaches include the development of approximation algorithms or heuristic methods. One promising heuristic might involve an iterative greedy procedure: initialize λ based on the single-edge tolerances and then sequentially attempt to redistribute perturbation within A while continuously verifying the optimality of T * through efficient MST verification routines. A more rigorous approach could involve formulating the problem as a bilinear program or leveraging column generation techniques. The exploration of these methods will be essential for applying set tolerance concepts to very large-scale networks.
Dependent Uncertainties. A key limitation of our current framework is the assumption that uncertain variables ξ i j are independent. This is often unrealistic in practice, as the failure risk or cost of one network element can be highly correlated with others (e.g., edges sharing a common physical resource or geographical location). Extending the LST and DLST concepts to model such dependencies presents a substantial but valuable challenge. The primary difficulty lies in redefining the perturbation mechanism. Under independence, the perturbation λ i j applies only to edge ( i , j ) . Under dependence, perturbing one edge’s uncertainty distribution may inherently alter the distributions of others. This means the feasible set of perturbations is no longer a simple Cartesian product of intervals but a complex, constrained space defined by a joint uncertainty distribution (e.g., via a copula) or a correlated uncertainty set. We leave the formalization and computational exploration of these ideas for future research. Future work could explore two potential paradigms:
  • A distributional approach using vine copulas or other flexible dependence models to define the joint law of ξ , though computing tolerances would likely require sophisticated Monte Carlo methods; or
  • A set-based approach within robust optimization, where uncertainties reside in a correlated set U (e.g., { ξ : ( ξ ξ ¯ ) Σ 1 ( ξ ξ ¯ ) Ψ 2 } ), and the tolerance becomes the maximum scaling factor α such that the MST remains optimal for all ξ α U .
In summary, this work establishes a robust foundation for stability analysis in uncertain MSTs using LST and DLST, blending theoretical innovation with practical utility. As uncertainties increasingly influence critical infrastructure, the need for such frameworks will continue to grow, positioning this research as a timely and impactful contribution to the field.

Funding

This research was carried out with the support of ARIS: Slovenian Research And Innovation Agency (Javna agencija za znanstvenoraziskovalno in inovacijsko dejavnost Republike Slovenije) through the research core funding for the program Knowledge Technologies (No. P2-0103).

Data Availability Statement

The original contributions presented in this study are included in the article. Further inquiries can be directed to the corresponding author.

Acknowledgments

We are profoundly grateful to the Editor and the anonymous Reviewers for their invaluable time and expertise. Their insightful comments and constructive criticisms were instrumental in significantly improving the quality, clarity, and impact of this manuscript. The thoughtful engagement with our work challenged us to refine our theoretical contributions and, crucially, to better articulate the implications of our framework for network planning under uncertainty.

Conflicts of Interest

There are no conflicts of interest or competing interests.

Appendix A. An Overview on Key Concepts of Uncertainty Theory

This section presents the essential concepts and foundational principles of uncertainty theory. For a comprehensive introduction, we recommend the seminal works by Liu [1,2]. A common challenge arises when reliable data are insufficient, rendering accurate estimation of probability distributions unfeasible. In such cases, uncertainty must be characterized through uncertain variables. The available data often reflect belief degrees provided by domain experts. However, addressing belief degrees using fuzzy or probability theory can lead to inconsistencies, as these degrees may exhibit greater variability than actual frequencies. Unlike belief degrees, which evolve with knowledge, frequency—a cornerstone of probability theory—remains a stable, observable property. This distinction underscores the need for a distinct approach to managing belief degrees. Liu [2] introduced uncertainty theory, establishing a formal system to model human decision-making under uncertainty, complete with key concepts and operational rules. Both theoretical and practical studies have validated the effectiveness of uncertainty theory in handling non-deterministic data, particularly in subjective estimations.
To manage belief degrees systematically, let Γ be a non-empty universal set and L a σ -algebra over Γ . The pair ( Γ , L ) forms a measurable space, while the triplet ( Γ , L , M ) constitutes an uncertainty space. Each E L is a measurable set, termed an event. To axiomatically define an uncertain measure, we assign a value M { E } to any E L , representing the degree to which E is expected to occur. This assignment, M , is a set function. If it satisfies the following axioms, it qualifies as an uncertain measure.
M { Γ } = 1 for the universal set Γ , M { E } + M { E c } = 1 for any event E L , M { E 1 } M { E 2 } for any events E 1 E 2 , M i = 1 E i i = 1 M { E i } for any sequence of events { E i E i L } , M i = 1 n E i = min i { 1 , , n } M i { E i } for uncertainty spaces ( Γ i , L i , M i ) and E i L i .
The probability measure, while satisfying the first four axioms, cannot be considered a subset of uncertainty theory, as the product probability measure fails to meet the fifth axiom’s requirements. Based on the principles of normality and self-duality, the uncertain measure of the empty set is zero. Thus, for any event E L , the uncertain measure ranges from 0 M { E } 1 . Unlike frequency-based probability, the uncertain measure reflects a subjective belief about an event’s likelihood, shaped by an individual’s knowledge and understanding.
Definition A1.
An uncertain variable ξ is termed a non-negative variable if M { ξ < 0 } = 0 , and a positive variable if M { ξ 0 } = 0 . More information can be found in Liu [1,2].
Definition A2.
The uncertainty distribution of ξ is defined as a function Φ ( x ) = M { ξ x } for any real number x. It is considered regular if it is a continuous and strictly increasing function of x, satisfying the following:
  • Φ ( x 1 ) Φ ( x 2 ) if x 1 > x 2 ,
  • Φ ( x 1 ) > Φ ( x 2 ) if x 1 > x 2 .
Observation A1
(Liu [1,2]). For any uncertain variable ξ with a regular uncertainty distribution Φ ( x ) , there exists a well-defined, continuous, and strictly increasing inverse uncertainty distribution Φ 1 ( α ) over the open interval ( 0 , 1 ) such that M { ξ Φ 1 ( α ) } = α .
Theorem A1
(Liu [1,2]). Let Φ : R [ 0 , 1 ] be a function. It is an uncertainty distribution if and only if it is monotonically increasing, excluding cases where Φ ( x ) is constantly 0 or 1. Additionally, a function Φ 1 : ( 0 , 1 ) R is an inverse uncertainty distribution if and only if it is continuous and strictly increasing.
Theorem A2
(Liu [1,2]). Let ξ 1 , ξ 2 , , ξ n be independent uncertain variables with regular uncertainty distributions Φ 1 , Φ 2 , , Φ n . If the new variable ξ = f ( ξ 1 , ξ 2 , , ξ n ) is strictly increasing with respect to ξ 1 , ξ 2 , , ξ m and strictly decreasing with respect to ξ m + 1 , ξ m + 2 , , ξ n , then ξ is also an uncertain variable with an inverse uncertainty distribution given by
Ψ 1 ( α ) = f ( Φ 1 1 ( α ) , , Φ m 1 ( α ) , Φ m + 1 1 ( 1 α ) , , Φ n 1 ( 1 α ) ) .
Furthermore, the (chance) constraint M { f ( x , ξ 1 , ξ 2 , , ξ n ) 0 } α is equivalent to
f ( x , Φ 1 1 ( α ) , , Φ m 1 ( α ) , Φ m + 1 1 ( 1 α ) , , Φ n 1 ( 1 α ) ) 0 .
Definition A3
(Zigzag Uncertainty Distribution). We denote ξ Z ( a , b , c ) as Zigzag (with parameters a, b, c where a < b < c ) if it has the following uncertainty distribution Φ ( x ) . The Zigzag distribution is regular, with an inverse distribution Φ 1 ( α ) as follows:
Φ ( x ) = 0 if x a , x a 2 ( b a ) if a x b , x + c 2 b 2 ( c b ) if b x c , 1 if x c , Φ 1 ( α ) = ( 2 α 1 ) a + 2 ( 1 α ) b if α 1 2 , 2 α b + ( 1 2 α ) c if α < 1 2 .
Definition A4
(Linear Uncertainty Distribution). We denote ξ L ( a , b ) as Linear (with parameters a and b) if it has the following uncertainty distribution Φ ( x ) . The Linear distribution is regular, with an inverse distribution Φ 1 ( α ) as follows:
Φ ( x ) = 0 if x a , x a b a if a x b , 1 if x b , Φ 1 ( α ) = ( 1 α ) a + α b .

References

  1. Liu, B. Uncertainty Theory: A Branch of Mathematics for Modeling Human Uncertainty; Springer: Berlin, Germany, 2010. [Google Scholar]
  2. Liu, B. Uncertainty Theory, 5th ed.; Uncertainty Theory Laboratory: Beijing, China, 2015. [Google Scholar]
  3. Wang, J.; Zhu, J.; Yang, H. Reliable path selection problem in uncertain traffic network after natural disaster. Math. Probl. Eng. 2013, 2013, 413034. [Google Scholar] [CrossRef]
  4. Ahuja, R.; Magnanti, T.; Orlin, J. Network flows: Theory, Algorithms, and Applications; Prentice Hall: Upper Saddle River, NJ, USA, 1993. [Google Scholar]
  5. Gal, T. Sensitivity Analysis, Parametric Programming, and Related Topics: Degeneracy, Multicriteria Decision Making Redundancy; Walter de Gruyter: Berlin, Germany, 1995. [Google Scholar]
  6. Punnen, A. Postoptimal Analysis, Parametric Programming, and Related Topics: Degeneracy, Multicriteria Decision Making, Redundancy; De Gruyter: Berlin, Germany, 1997. [Google Scholar]
  7. Mathwieser, C.; Çela, E. Special Cases of the Minimum Spanning Tree Problem under Explorable Edge and Vertex Uncertainty. Networks 2024, 83, 587–604. [Google Scholar] [CrossRef]
  8. Ramaswamy, R.; Orlin, J.; Chakravarti, N. Sensitivity analysis for shortest path problems and maximum capacity path problems in undirected graphs. Math. Program. 2005, 102, 355–369. [Google Scholar] [CrossRef]
  9. Pettie, S. Sensitivity analysis of minimum spanning trees in sub-inverse-Ackermann time. In Proceedings of the International Symposium on Algorithms and Computation, Sanya, China, 19—21 December 2005; Springer: Berlin/Heidelberg, Germany, 2005; pp. 964–973. [Google Scholar]
  10. Chandra, A.; Kim, J. Reliability Certification of Supply Chain Networks under Uncertain Failures and Demand. Ann. Oper. Res. 2025. [Google Scholar] [CrossRef]
  11. Clark, S.; Watling, D. Modelling network travel time reliability under stochastic demand. Transp. Res. Part B Methodol. 2005, 39, 119–140. [Google Scholar] [CrossRef]
  12. Hosseini, A.; Wadbro, E. Connectivity reliability in uncertain networks with stability analysis. Expert Syst. Appl. 2016, 57, 337–344. [Google Scholar] [CrossRef]
  13. Zhu, Z.; Zhang, A.; Zhang, Y. Connectivity of intercity passenger transportation in china: A multi-modal and network approach. J. Transp. Geogr. 2018, 71, 263–276. [Google Scholar] [CrossRef]
  14. Zhou, Y.; Sheu, J.; Wang, J. Robustness assessment of urban road network with consideration of multiple hazard events. Risk Anal. 2017, 37, 1477–1494. [Google Scholar] [CrossRef]
  15. Zhou, Y.; Wang, J.; Yang, H. Resilience of transportation systems: Concepts and comprehensive review. IEEE Trans. Intell. Transp. Syst. 2019, 20, 4262–4276. [Google Scholar] [CrossRef]
  16. Hosseini, A. Max-type reliability in uncertain post-disaster networks through the lens of sensitivity and stability analysis. Expert Syst. Appl. 2024, 241, 122486. [Google Scholar] [CrossRef]
  17. Xing, T.; Zhou, X. Finding the most reliable path with and without edge travel time correlation: A lagrangian substitution based approach. Transp. Res. Part B Methodol. 2011, 45, 1660–1689. [Google Scholar] [CrossRef]
  18. Ma, W.; Tang, S.; Ke, W. Competitive analysis for the most reliable path problem with on-line and fuzzy uncertainties. Int. J. Pattern Recognit. Artif. Intell. 2008, 11, 195–206. [Google Scholar] [CrossRef]
  19. Lee, D.; Kim, D.; Jung, J. An algorithm for acquiring reliable path in abnormal traffic condition. In Proceedings of the 2008 International Conference on Convergence and Hybrid Information Technology, Daejeon, Republic of Korea, 28–29 August 2008; pp. 682–686. [Google Scholar]
  20. Alkaff, A.; Qomarudin, M.N.; Bilfaqih, Y. Network reliability analysis: Matrix-exponential approach. Reliab. Eng. Syst. Saf. 2020, 204, 107192. [Google Scholar] [CrossRef]
  21. Zhu, Z.; Mardan, A.; Zhu, S.; Yang, H. Capturing the interaction between travel time reliability and route choice behavior based on the generalized Bayesian traffic model. Transp. Res. Part B Methodol. 2021, 143, 48–64. [Google Scholar] [CrossRef]
  22. Zang, Z.; Xu, X.; Qu, K.; Chen, R.; Chen, A. Travel time reliability in transportation networks: A review of methodological developments. Transp. Res. Part C Emerg. Technol. 2022, 143, 103866. [Google Scholar] [CrossRef]
  23. Dong, S.; Gao, X.; Mostafavi, A.; Gao, J.; Gangwal, U. Characterizing resilience of flood-disrupted dynamic transportation network through the lens of link reliability and stability. Reliab. Eng. Syst. Saf. 2023, 232, 109071. [Google Scholar] [CrossRef]
  24. Wang, S.; Wang, Y.; Lai, C. Connectivity reliability evaluation and most reliable shipping route choice in a seaborne crude oil network. Heliyon 2024, 10, e36295. [Google Scholar] [CrossRef]
  25. Xin, J.; Frangopol, D.M.; Akiyama, M.; Han, X. Connectivity analysis of transportation networks incorporating bridges and pavements under uncertainty. In Bridge Maintenance, Safety, Management, Digitalization and Sustainability; CRC Press: Boca Raton, FL, USA, 2024; pp. 1916–1921. [Google Scholar]
  26. Chen, Y.; Ju, Y.; Yin, J.; Jiang, D. Evaluation of Carrying Capacity Reliability for Regional Rail Transit System. Transp. Res. Rec. 2025, 2679, 03611981251337463. [Google Scholar] [CrossRef]
  27. Ait Mamoun, K.; Hammadi, L.; El Ballouti, A.; Novaes, A.; Souza de Cursi, E. Modeling Uncertain Travel Times in Distribution Logistics. Appl. Sci. 2023, 13, 11242. [Google Scholar] [CrossRef]
  28. Guo, F.; Liang, J.; Niu, R.; Huang, Z.; Liu, Q. Robust optimization of a procurement and routing strategy for multiperiod multimodal transport in an uncertain environment. Eur. J. Oper. Res. 2025, 327, 115–135. [Google Scholar] [CrossRef]
  29. Wang, X. Coal Transportation Cost Prediction under Mixed Uncertainty Based on Graph Attention Networks. Int. J. High Speed Electron. Syst. 2025, 34, 2540348. [Google Scholar] [CrossRef]
  30. Chen, L.; Wang, Y.; Peng, J.; Xiao, Q. Supply chain management based on uncertainty theory: A bibliometric analysis and future prospects. Fuzzy Optim. Decis. Mak. 2024, 23, 599–636. [Google Scholar] [CrossRef]
  31. Gao, R.; Ma, Y.; Ralescu, D. Uncertain multilevel programming with application to omni-channel vehicle routing problem. J. Ambient Intell. Humaniz. Comput. 2023, 14, 9159–9171. [Google Scholar] [CrossRef]
  32. Hosseini, A. Time-dependent optimization of a multi-item uncertain supply chain network: A hybrid approximation algorithm. Discret. Optim. 2015, 18, 150–167. [Google Scholar] [CrossRef]
  33. Guo, H.; Wang, X.; Zhou, S. A transportation problem with uncertain costs and random supplies. Int. J. E-Navig. Marit. Econ. 2015, 2, 1–11. [Google Scholar] [CrossRef]
  34. Qin, Z.; Gao, Y. Uncapacitated p-hub location problem with fixed costs and uncertain flows. J. Intell. Manuf. 2017, 28, 705–716. [Google Scholar] [CrossRef]
  35. Veresnikov, G.; Pankova, L.; Pronina, V. Uncertain programming in preliminary design of technical systems with uncertain parameters. Procedia Comput. Sci. 2017, 103, 36–43. [Google Scholar] [CrossRef]
  36. Hosseini, A. Uncertainty modeling and stability assessment of minimum spanning trees in network design. Mathematics 2024, 12, 3812. [Google Scholar] [CrossRef]
  37. Wang, J.; Sheng, Y. The MST Problem in Network with Uncertain Edge Weights and Uncertain Topology. Soft Comput. 2023, 27, 13825–13834. [Google Scholar] [CrossRef]
  38. Zhou, S.; Zhang, J.; Zhang, Q.; Huang, Y.; Wen, M. Uncertainty Theory-Based Structural Reliability Analysis and Design Optimization under Epistemic Uncertainty. Appl. Sci. 2022, 12, 2846. [Google Scholar] [CrossRef]
  39. Shen, J. An environmental supply chain network under uncertainty. Phys. A Stat. Mech. Its Appl. 2019, 542, 123478. [Google Scholar] [CrossRef]
  40. Gao, X.; Jia, L. Degree-constrained minimum spanning tree problem with uncertain edge weights. Appl. Soft Comput. 2017, 56, 580–588. [Google Scholar] [CrossRef]
Figure 1. Street network configurations based on natural roads in our sample.
Figure 1. Street network configurations based on natural roads in our sample.
Mathematics 13 03100 g001
Figure 2. Inverse uncertainty distribution Ψ 1 ( α ) and uncertainty distribution Ψ ( x ) associated with networks 1-2.
Figure 2. Inverse uncertainty distribution Ψ 1 ( α ) and uncertainty distribution Ψ ( x ) associated with networks 1-2.
Mathematics 13 03100 g002aMathematics 13 03100 g002b
Table 1. The α -pessimistic values for uncertain risk variables across selected edges at characteristic confidence levels α .
Table 1. The α -pessimistic values for uncertain risk variables across selected edges at characteristic confidence levels α .
α = 0.2 α = 0.5 α = 0.8 α = 0.9
ξ ij ξ ij α = Φ ij 1 ( α ) ξ ij ξ ij α = Φ ij 1 ( α ) ξ ij ξ ij α = Φ ij 1 ( α ) ξ ij ξ ij α = Φ ij 1 ( α )
L(1,5)1.8L(1,5)3L(2,5)4.4L(2,5)4.7
L(2,8)3.2L(2,8)5L(6,9)8.4L(6,9)8.7
Z(3,7,10)4.6Z(3,7,10)7Z(1,7,10)8.8Z(1,7,10)9.4
Z(3,4,9)3.4Z(3,4,9)4Z(2,6,9)7.8Z(2,6,9)8.4
9999Z(3,3,3)3Z(3,3,3)3
L(8,10)8.4L(8,10)9L(4,8)7.2L(4,8)7.6
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Hosseini, A. Uncertainty-Driven Stability Analysis of Minimum Spanning Tree Under Multiple Risk Variations. Mathematics 2025, 13, 3100. https://doi.org/10.3390/math13193100

AMA Style

Hosseini A. Uncertainty-Driven Stability Analysis of Minimum Spanning Tree Under Multiple Risk Variations. Mathematics. 2025; 13(19):3100. https://doi.org/10.3390/math13193100

Chicago/Turabian Style

Hosseini, Ahmad. 2025. "Uncertainty-Driven Stability Analysis of Minimum Spanning Tree Under Multiple Risk Variations" Mathematics 13, no. 19: 3100. https://doi.org/10.3390/math13193100

APA Style

Hosseini, A. (2025). Uncertainty-Driven Stability Analysis of Minimum Spanning Tree Under Multiple Risk Variations. Mathematics, 13(19), 3100. https://doi.org/10.3390/math13193100

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop