Next Article in Journal
Analysis of the Total Leakage Characteristics of Finger Seal Considering Fractal Wear and Fractal Porous Media Seepage Effects
Next Article in Special Issue
Discrete q-Exponential Limit Order Cancellation Time Distribution
Previous Article in Journal
Dynamical Behaviour, Control, and Boundedness of a Fractional-Order Chaotic System
Previous Article in Special Issue
A Non-Local Problem for the Fractional-Order Rayleigh–Stokes Equation
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Fractional Factor Model for Data Transmission in Real-Time Monitoring Network

1
Key Laboratory of Education Informatization for Nationalities, Ministry of Education, Yunnan Normal University, Kunming 650500, China
2
Yunnan Key Laboratory of Smart Education, Yunnan Normal University, Kunming 650500, China
3
School of Information Science and Technology, Yunnan Normal University, Kunming 650500, China
*
Author to whom correspondence should be addressed.
Fractal Fract. 2023, 7(7), 493; https://doi.org/10.3390/fractalfract7070493
Submission received: 26 May 2023 / Revised: 18 June 2023 / Accepted: 20 June 2023 / Published: 22 June 2023
(This article belongs to the Special Issue Feature Papers for Mathematical Physics Section)

Abstract

:
Modeling data transmission problems in graph theory is internalized to the existence of fractional flows, and thus can be surrogated to be characterized by a fractional factor in diversified settings. We study the fractional factor framework in the network environment when some sites are damaged. The setting we focus on refers to the lower and upper fractional degrees described by two functions on the vertex set. It is determined that G is fractional ( g , f , n ) critical if δ ( G ) a 2 + b 2 + 2 a b + 2 a + 2 b 3 4 a + n and I ( G ) > n + ( a + b 1 ) 2 2 a + 2 b 1 a 2 , where 1 a b and b 2 .

1. Introduction

The graphs we discuss in this article are undirected, finite, and simple. We denote i ( G ) as the cardinality of the isolated vertex set in G. The operator ∨ in H 1 H 2 means adding edges for all pairs of vertices between H 1 and H 2 . For a subgraph H of graph G, H ( · ) denotes the graph function, which is restricted to H. Throughout the entire paper, a , b , k N with 1 a b and b 2 , and h: E ( G ) [ 0 , 1 ] is the fractional indicator function (FIF). The standard graph notations and terminologies can be referred to in [1].

1.1. Data Transmission in Real-Time Monitoring Network

In traditional graph theory, data transmission (DT) between vertices is accomplished through the shortest path. However, in communication networks, this naive idea is not feasible due to the conflict between large data size and the limit of channel capacity. In real data transmission networks, a large data packet is divided into several small data packets, transmitted via different channels, and finally assembled at the target site. The feasibility of DT is quantified by fractional flow, which is represented by the existence of the fractional factor (FF) in the idealized state. We say a graph G (corresponding to a specific network) admits a fractional k-factor (FkF) if FIF exists such that d G h ( x ) = x N ( x ) h ( x x ) = k for each x V ( G ) , where d G h ( x ) is the fractional degree (FD) of vertex x. Obviously, the traditional k-factor is a specific setting of FkF if h becomes binary.
It is noteworthy that the constraint condition on the fractional degree is too strict for the communication network application, which inquires its value to be equal to k for each vertex. The fractional [ a , b ] factor (F a b F) is introduced to relax the original fractional k factor, which requires the fractional degree of each vertex to fall into the interval [ a , b ] , i.e., a d G h ( x ) b . FkF is apparently a special version of F a b F when interval [ a , b ] collapses into a real number k.
However, F a b F is not applicable to real networks since it treats all sites equally. In a real network, each site has its own computability and throughput based on its status, which leads to the fractional degree of each site not being the same. To cope with this problem, fractional ( g , f ) factors are utilized. Let g and f be two integer-valued functions on the vertex set satisfying 0 g ( x ) f ( x ) for arbitrary vertex x. A fractional ( g , f ) -factor (F g f F) is a spanning subgraph consisting of edge set E h = { e E ( G ) | h ( e ) > 0 } such that
g ( x ) d G h ( x ) = x N ( x ) h ( x x ) f ( x )
for any x V ( G ) . A graph G admits a F g f F if FIF satisfies (1). Again, F a b F is an extreme situation of F g f F if both g and f are constant functions.
Unfortunately, even F g f F cannot be directly applied to real networks. Imagine that many stations send data to external stations simultaneously. Due to the limitation of the channel capacity, parts of stations and channels will be congested. Or in the scenario of a network attack, parts of the sites under attack will be unable to be used. In this spirit, the entire network needs to have a monitoring ability to promptly label sites in congested, damaged, or maintenance status. In real-time data transmission, it is necessary to delete these specially annotated sites and query the availability of DT in the remaining subnetworks, that is, to determine the existence of FFs in the remaining subgraph. The network with real-time monitoring action is called the self-definition network (SDN), and its difference from traditional networks is similar to the difference between buses and private cars. In traditional networks, the transmission path of segmented data packets is determined by algorithm implementation in advance, which cannot be changed. In self-definition networks, in terms of the real-time monitoring of data, algorithms can temporarily change transmission paths to avoid congested or damaged sites. The foregoing circumstances can be characterized by fractional critical graphs. For n N , G is a fractional ( g , f , n ) -critical graph (F g f n CG) if deleting any n vertices from G, and the resulting subgraph still admits a F g f F. Liu [2] determined that G is a F g f n CG if and only if
f ( S ) g ( T ) + x T d G S ( x ) max { f ( U ) : U S , | U | = n }
for any disjoint subsets S and T of V ( G ) with | S | n .
The fractional ( a , b , n ) -critical graph (F a b n CG) and fractional ( k , n ) -critical graph (F k n CG) can be regarded as the special case of F g f n CG when ( g ( x ) , f ( x ) ) = ( a , b ) and ( g ( x ) , f ( x ) ) = ( k , k ) for all vertices in G, respectively.

1.2. Network Stability Based on Graph Parameter

As a salient graph-theoretic variable, isolated toughness (IT) is introduced by [3] which is formulated by
I ( G ) = min | S | i ( G S ) | S V ( G ) , i ( G S ) > 1 ,
and specifically I ( G ) = + for complete graphs since no S satisfies the constraint condition. In computer networks, isolated toughness is utilized to quantify the stability of the network. The greater the isolated toughness, the more robust the network, and the network is more vulnerable to intrusion, on the contrary. For the network corresponding to the non-complete graph, the target sites of the network attack are stated by S, which minimizes the ratio | S | / i ( G S ) . From this perspective, analyzing the isolated toughness of the network is beneficial to identify the target sites for network attacks.

1.3. Motivation

It is well known that the more robust the network, the higher the construction costs. In the real network, it is not necessary to build a fully connected network topology, and actually, most networks present sparse structures. Network designers often struggle with the issue of finding a balance between budget and network performance, and it is a crux to simultaneously balance the stability and the feasibility of DT in networks. Thankfully, the theoretical results show isolated toughness pertinent to the fractional factor, and it becomes an intriguing topic both in graph theory and computer networks.
In the early years, Ma and Liu [4] determined the sharp IT bound for a graph G, admitting a FkF. Nevertheless, the study has stagnated for a long time since 2006. Gao and Wang [5] argued that G is a F g f n CG if I ( G ) b 2 + b n b + a a and δ ( G ) b n a + ( b + 2 ) 2 4 a + b 1 (i.e., δ ( G ) b n a + ( b + 2 ) 2 4 a + b 1 ), where a and b are the lower bound of g and upper bound of f, respectively. However, the counterexample only shows that the I ( G ) bound is tight in a very special case (i.e., g ( x ) = f ( x ) , which equals to a constant for each vertex x). Recently, there has been a dramatic breakthrough in the isolation toughness bound of fractional critical graphs. Gao et al. [6] proposed the sharp IT bound for F k n CGs. This conclusion was extended by Gao et al. [7], i.e., G is a F a b n CG if δ ( G ) a + n and I ( G ) > a 1 + n + 1 n a , b , where 2 a b and n a , b 2 is an integer satisfying ( n a , b 1 ) a b n a , b a 1 .
Wei et al. [8] investigated the existence of FF from high-dimensional space, and the results for the corresponding H -factors are characterized in surface forms. Dimitrov and Hosam [9] proposed the independent set neighborhood union bound for FF in a specific setting. Zhou [10] determined a generalized binding number bound for fractional ID-factor-critical graphs, where the deleted vertex subset is an independent set of the graph. More recent results on factor in graphs can be referred to in [11,12,13].
The optimal isolated toughness condition in the fractional critical setting has cardinal engineering significance. It tells network designers that in order to ensure that the remaining subnetwork data transmission is still feasible under a certain degree of network attack (where n sites are simultaneously destroyed), large isolated toughness parameter values are needed. At the same time, this threshold value also provides the lowest budget for building the corresponding network.
Since the fractional [ a , b ] -factor is only an extreme circumstance of F g f F when both g and f are constant functions on V ( G ) , it is natural to ask the following question (raised by Gao et al. [7]):
  • What is the sharp IT bound for F g f n CGs?
In addition, to pursue the optimal topology structure parameter, the following intuitive problem on minimum degree is proposed:
  • Can the minimum degree bound δ ( G ) b n a + ( b + 2 ) 2 4 a + b 1 of Gao and Wang [5] be strengthened or not?

1.4. Main Result and Counterexamples

Motivated by the aforementioned questions, in this contribution, we determine the tight IT bound for F g f n CGs, which both improves the previous bound in [5] and answers the open question raised by [7].
Theorem 1.
Let G be a graph, and a , b , n be positive integers with 1 a b and b 2 . Let g and f be integer-valued functions on V ( G ) such that a g ( x ) f ( x ) b for all x V ( G ) . If δ ( G ) a 2 + b 2 + 2 a b + 2 a + 2 b 3 4 a + n and I ( G ) > n + ( a + b 1 ) 2 2 a + 2 b 1 a 2 , then G is a F g f n CG.
Theorem 1 has explicitly guiding significance in network designing, where the tight IT bound provides the characteristics that a network topology needs to possess under specific network vulnerability conditions. Specifically, the network is not necessary to be fully connected. As long as the IT parameter meets the lower bound requirement, theoretically, data transmission services can be maintained when a specific number of sites are attacked.
For shorthand notation, we define
Θ : = a 2 + b 2 + 2 a b + 2 a + 2 b 3 ,
and
Φ : = ( a + b 1 ) 2 .
In the following four counterexamples (from G 1 to G 4 ), for given S and T, we assume f ( x ) = g ( x ) = a for all x S and f ( x ) = g ( x ) = b for all x T , and these graphs are not F g f n CGs, which are assessed by (2).
It is identified that b n a + ( b + 2 ) 2 4 a + b 1 > Θ 4 a + n , which reveals that the minimum degree condition improves the previous bound stated by Gao and Wang [5]. We now show that δ ( G ) Θ 4 a + n is tight to ensure a meaningful I ( G ) bound. If a b (mod2), then focusing on G 1 = K b 2 a 2 + 2 b 3 4 a + n ( K a + b + 1 2 K t ) with δ ( G 1 ) = a 2 + b 2 + 2 a b 2 a + 2 b 3 4 a + n , and t is a large number. Clearly, the value of I ( G 1 ) can be taken to be arbitrarily large since t is a large number. Set S = V ( K b 2 a 2 + 2 b 3 4 a + n ) and T = V ( K a + b + 1 2 ) , then
f ( S ) g ( T ) + x T d G 1 S ( x ) max { f ( U ) : U S , | U | = n } = a b 2 a 2 + 2 b 3 4 a ( a + b + 1 ) b 2 + a + b + 1 2 a + b 1 2 a b 2 a 2 + 2 b 3 4 a a + b + 1 2 b a + 1 2 = 1 ,
which implies that G 1 is not a F g f n CG. If a b (mod2), then considering G 2 = ( K a + b 2 K t ) K b 2 a 2 + 2 a + 2 b 3 4 a + n with δ ( G 2 ) = a 2 + b 2 + 2 a b 2 a + 2 b 3 4 a + n , and t is a large number. Obviously, the value of I ( G 2 ) can be taken to be arbitrarily large since t is a large number. Set S = V ( K b 2 a 2 + 2 a + 2 b 3 4 a + n ) and T = V ( K a + b 2 ) , then
f ( S ) g ( T ) + x T d G 2 S ( x ) max { f ( U ) : U S , | U | = n } = a b 2 a 2 + 2 a + 2 b 3 4 a ( a + b ) b 2 + a + b 2 a + b 2 2 a b 2 a 2 + 2 a + 2 b 3 4 a a + b 2 b a + 2 2 = 3 4 ,
which reveals that G 2 is not a F g f n CG.
The sharpness of the IT bound in Theorem 1 is showcased by considering the following instances. If b a (mod2), then consider G 3 = K n + Φ 2 a + 2 b 1 a ( a + b 1 ) ( 2 K a + b + 1 2 ) , where b a 1 and b 2 are integers. We directly obtain (for δ ( G 3 ) part, it can be identified by checking b = a + 1 and b a + 2 , respectively)
δ ( G 3 ) = n + Φ 2 a + 2 b 1 a ( a + b 1 ) + a + b 1 2 Θ 4 a + n
and
I ( G 3 ) = n + Φ 2 a + 2 b 1 a ( a + b 1 ) + 2 a + b 1 2 2 = n + Φ 2 a + 2 b 1 a 2 .
Set S = V ( K n + Φ 2 a + 2 b 1 a ( a + b 1 ) ) and T = V ( 2 K a + b + 1 2 ) , then
f ( S ) g ( T ) + x T d G 3 S ( x ) max { f ( U ) : U S , | U | = n } = a Φ 2 a + 2 b 1 a a ( a + b 1 ) 2 b a + b + 1 2 + 2 a + b + 1 2 ( a + b + 1 2 1 ) a ( Φ 2 a + 2 b 1 a ) a ( a + b 1 ) ( a + b + 1 ) ( b + 1 a ) 2 = 1 .
Thus, G 3 is not a F g f n CG.
If b a (mod2), then consider G 4 = K n + Φ 2 a + 2 b 1 a ( a + b 2 ) ( 2 K a + b 2 ) where b a 1 and b 2 are integers. We directly obtain
δ ( G 4 ) = n + Φ 2 a + 2 b 1 a ( a + b 2 ) + a + b 2 2 Θ 4 a + n
and
I ( G 4 ) = n + Φ 2 a + 2 b 1 a ( a + b 2 ) + 2 a + b 2 2 2 = n + Φ 2 a + 2 b 1 a 2 .
Set S = V ( K n + Φ 2 a + 2 b 1 a ( a + b 2 ) ) and T = V ( 2 K a + b 2 ) , then
f ( S ) g ( T ) + x T d G 4 S ( x ) max { f ( U ) : U S , | U | = n } = a Φ 2 a + 2 b 1 a a ( a + b 2 ) 2 b a + b 2 + 2 a + b 2 ( a + b 2 1 ) a ( Φ 2 a + 2 b 1 a ) a ( a + b 2 ) ( a + b ) ( b a 2 + 1 ) = 1 2 .
Thus, G 4 is not a F g f n CG.
Remark 1.
By observation, it can be seen that the sharp IT bound for F g f n CGs cannot directly derive the tight IT condition for F a b n CGs determined by Gao et al. [7]. We explain its intrinsic mechanism. In the setting of the F a b n CG, the feasible interval of FD for each vertex is [ a , b ] . Nevertheless, from the above counterexample, in the extreme F g f n CG setting, g ( x ) = f ( x ) = a for some vertices, while g ( x ) = f ( x ) = b for other parts of vertices. It is well-known that F g f F degenerates to F a b F iff ( g ( x ) , f ( x ) ) = ( a , b ) for all vertices. The extreme setting of the g and f functions mentioned in the above counterexample makes it impossible to bespeak the characteristic in a fractional [ a , b ] factor setting.
Remark 2.
The celebrated Lemma 2.2 in Liu and Zhang [14] has by now become an invaluable tool in the study of subgraphs in special divisions, and its slightly improved version is used in the next section.
The detailed proof of Theorem 1 is presented in the subsequent section.

2. Proof of Theorem 1

We only consider that G is not complete because the result for the complete graph can be immediately obtained by δ ( G ) Θ 4 a + n . Assume that G satisfies the hypothesis of Theorem 1 but is not a F g f n CG. According to the sufficient and necessary condition stated in Liu [2], there exist disjoint subsets S and T of V ( G ) with | S | n satisfying
a ( | S | n ) b | T | + x T d G S ( x ) f ( S ) g ( T ) + x T d G S ( x ) max { f ( U ) : U S , | U | = n } 1 .
We choose S and T with the smallest value of | T | . Thus, | T | 1 , and d G S ( x ) b 1 for any x T .
Let l be the number of the K b components in H = G [ T ] and let T 0 be the set of vertices in H , whose degree is zero in G S . Let H be the subgraph obtained from H by deleting T 0 and K b components. Let S be a set of vertices that contains exactly b 1 vertices in each component of K b in H .
If | V ( H ) | = 0 , then in view of (3), δ ( G ) Θ 4 a + n b + n + b 1 a (verify separately for three scenarios: b = a , b = a + 1 , and b a + 2 ), we yield
n + 1 + b 1 a = b + n + b 1 a ( b 1 ) Θ 4 a + n ( b 1 ) | S | b ( | T 0 | + l ) 1 a + n ,
i.e., b = a + a ( b 1 a a 1 a ) a + a b 1 a b ( | T 0 | + l ) 1 which implies i ( G S S ) = | T 0 | + l 2 . With the aid of the definition of IT, we deduce
I ( G ) | S S | i ( G S S ) b ( | T 0 | + l ) 1 a + n + l ( b 1 ) | T 0 | + l ( b 1 + b a ) ( | T 0 | + l ) + n 1 a | T 0 | + l = b 1 + n + b ( | T 0 | + l ) 1 a | T 0 | + l .
Let b ( | T 0 | + l ) 1 = m a + c , where m and c { 0 , , a 1 } . Then, by 1 a c + 1 a 1 and n 1 , we infer
b 1 + max { n + b ( | T 0 | + l ) 1 a | T 0 | + l } = b 1 + max { n + b ( | T 0 | + l ) 1 a c a | T 0 | + l } = b 1 + b a + max { n c + 1 a | T 0 | + l } ,
which implies that b 1 + n + b ( | T 0 | + l ) 1 a | T 0 | + l reaches the maximum value when | T 0 | + l reaches its lower bound 2. Hence,
I ( G ) b 1 + n + 2 b 1 a 2 ,
which contradicts I ( G ) > n + Φ 2 a + 2 b 1 a 2 and b 1 Φ 4 a .
Hence, we have V ( H ) . Let H = H 1 H 2 , where H 1 is the union of components of H, which satisfies that d G S ( v ) = b 1 for each vertex v V ( H 1 ) and H 2 = H H 1 . Assume that I i and C i = V ( H i ) I i are the maximum independent set and the covering set of H i , where i { 1 , 2 } . Furthermore, denote I ( i ) = { v I 1 , d H 1 ( v ) = b i } for 1 i b and i = 1 b | I ( i ) | = | I 1 | . Using the definition of H and H 2 , we verify that each component of H 2 has a vertex of degree at most b 2 in G S . Clearly, if H 2 , then b 3 , and I 2 can be selected by the algorithm in [6].
Set W = V ( G ) S T and U = S S N G S ( I 1 ) N G S ( I 2 ) . The subsequent derivation is divided into two situations.
Case 1.  | T 0 |   +   l 1 .
First, we analyze the circumstances if H 1 = or H 2 = .
Claim 1.
If | T 0 |   +   l 1 , then | I 2 |   0 .
Proof. 
Suppose | I 2 | = 0 . Then | I 1 |   0 by | V ( H ) | > 0 . Hence, | T 0 | +   l   + | I 1 | 2 .
We partition I 1 into two subsets.
I 11 : v I 11 if there exists v I 1 { v } such that N G S ( v ) N G S ( v ) ;
I 12 : v I 12 if there is no intersection between N G S ( v ) and N G S ( I 1 { v } ) .
In light of Lemma 2.2 in Liu and Zhang [14], we yield
a ( | S | n ) | V ( H 1 ) | + b | T 0 | + l b 1 ( b 1 2 ) | I 11 | + ( b 1 ) | I 12 | + b ( | T 0 | + l ) 1
and
| S | ( b a 1 2 a ) | I 11 | + b 1 a | I 12 | 1 a + b ( | T 0 | + l ) a + n .
Moreover,
| S S N G S ( I 1 ) | ( b a 1 2 a ) | I 11 | + b 1 a | I 12 | 1 a + b ( | T 0 | + l ) a + n + l ( b 1 ) + ( b 1 1 2 ) | I 11 | + ( b 1 ) | I 12 | = ( b 1 + b a a + 1 2 a ) | I 11 | + ( b 1 + b 1 a ) | I 12 | + b a | T 0 | + ( b 1 + b a ) l + n 1 a ( b 1 + b a ) ( | T 0 | + l ) + ( b 1 + b a 1 a ) | I 1 | + n 1 a ( b 1 + b a ) ( | I 1 | + | T 0 | + l ) + n 2 a ,
and thus
I ( G ) | S S N G S ( I 1 ) | i ( G S S N G S ( I 1 ) ) ( b 1 + b a ) ( | I 1 | + | T 0 | + l ) + n 2 a | I 1 | + l + | T 0 | = b 1 + b ( | I 1 | + l + | T 0 | ) 2 a + n | I 1 | + l + | T 0 | .
Let b ( | I 1 | + l + | T 0 | ) 2 = m 1 a + c 1 , where m 1 and c 1 { 0 , , a 1 } . Then, we obtain
b 1 + max { b ( | I 1 | + l + | T 0 | ) 2 a + n | I 1 | + l + | T 0 | } = b 1 + max { b ( | I 1 | + l + | T 0 | ) 2 c 1 a + n | I 1 | + l + | T 0 | } = b 1 + b a + max { n 2 + c 1 a | I 1 | + l + | T 0 | } .
If n = 1 and c 1 = a 1 , then n 2 + c 1 a | I 1 | + l + | T 0 | is negative, thus I ( G ) < b 1 + b a , which contradicts I ( G ) > n + Φ 2 a + 2 b 1 a 2 b 1 + n + 2 b 1 a 2 b 1 + 1 + ( 2 b 1 a a 1 a ) 2 = b 1 + b a . Hence, n 2 + c 1 a | I 1 | + l + | T 0 | is a non-negative term and it reaches the maximum value when | T 0 | + l + | I 1 | reaches its lower bound. Therefore,
I ( G ) b 1 + 2 b 2 a + n 2 ,
which contradicts the hypothesis of I ( G ) > n + Φ 2 a + 2 b 1 a 2 and the truth that b 1 Φ 4 a . □
Remark 3.
It can be concluded that we always check that I ( G ) reaches the maximum value when | T 0 | + l + | I 1 | + | I 2 | (some terms may become zero in a special setting) arrives at the lower bound. In the following arguments, the trick is the same as the aforementioned discussion, and we will skip the illustration of these details.
Claim 2.
If | T 0 |   +   l 1 , then | I 1 |   0 .
Proof. 
If | I 1 |   = 0 . We yield | I 2 |   0 by V ( H ) , and hence b 3 and | T 0 | +   l   + | I 2 | 2 .
Let v 1 , v 2 , , v | I 2 | be vertices in I 2 such that d G S ( v 1 ) b 2 and d G S ( v 1 ) d G S ( v 2 ) d G S ( v | I 2 | ) . Then | V ( T ) | = | V ( H 2 ) | + | T 0 | + b l ,
a ( | S | n ) b | T | d G S ( T ) 1 b | T 0 | + b l + i = 1 | I 2 | ( d G S ( v i ) + 1 ) ( b d G S ( v i ) ) 1 ,
and
| S | b ( | T 0 | + l ) a + i = 1 | I 2 | ( d G S ( v i ) + 1 ) ( b d G S ( v i ) ) a + n 1 a .
We infer i ( G U ) 2 where U = S S N G S ( I 2 ) and
| U | | S | + | S | + | N G S ( I 2 ) | b ( | T 0 | + l ) a + i = 1 | I 2 | ( d G S ( v i ) + 1 ) ( b d G S ( v i ) ) a + n 1 a + l ( b 1 ) + i = 1 | I 2 | d G S ( v i ) = b | T 0 | a + l ( b 1 + b a ) + i = 1 | I 2 | ( d G S 2 ( v i ) a + a + b 1 a d G S ( v i ) + b a ) + n 1 a b | T 0 | a + l ( b 1 + b a ) + | I 2 | ( ( a + b 1 2 ) 2 a + a + b 1 a a + b 1 2 + b a ) + n 1 a = b | T 0 | a + l ( b 1 + b a ) + ( Φ 4 a + b a ) | I 2 | + n 1 a ( Φ 4 a + b a ) ( | T 0 | + l + | I 2 | ) + n 1 a .
According to the definition of IT, we verify
I ( G ) | U | i ( G U ) ( Φ 4 a + b a ) ( | T 0 | + l + | I 2 | ) + n 1 a | I 2 | + | T 0 | + l 2 ( Φ 4 a + b a ) + n 1 a 2 = n + Φ 2 a + 2 b 1 a 2 ,
a contradiction. □
From Claims 1 and 2, we check | I 1 | > 0 , | I 2 | > 0 and b 3 .
Denote v 1 , v 2 , , v | I 2 | as vertices in I 2 . Then | V ( T ) | = | V ( H 1 ) | + | V ( H 2 ) | + | T 0 | + b l ,
a ( | S | n ) b ( | T 0 | + l ) + ( b 1 2 ) | I 11 | + ( b 1 ) | I 12 | + i = 1 | I 2 | ( d G S ( v i ) + 1 ) ( b d G S ( v i ) ) 1 ,
and
| S | b a ( | T 0 | + l ) + ( b a 1 2 a ) | I 11 | + b 1 a | I 12 | + i = 1 | I 2 | ( d G S ( v i ) + 1 ) ( b d G S ( v i ) ) a + n 1 a .
We acquire i ( G U ) 3 , where U = S S N G S ( I 1 ) N G S ( I 2 ) ,
| U | | S | + | S | + | C 1 | + | N G ( I 1 ) W | + | N G S ( I 2 ) | b a ( | T 0 | + l ) + ( b a 1 2 a ) | I 11 | + b 1 a | I 12 | + i = 1 | I 2 | ( d G S ( v i ) + 1 ) ( b d G S ( v i ) ) a + n 1 a + l ( b 1 ) + ( b 1 2 1 ) | I 11 | + ( b 1 ) | I 12 | + i = 1 | I 2 | d G S ( v i ) b a | T 0 | + l ( b 1 + b a ) + ( b 1 + b a 1 a ) | I 1 | + ( Φ 4 a + b a ) | I 2 | + n 1 a ( | T 0 | + l + | I 1 | + | I 2 | ) ( Φ 4 a + b a ) + n 1 a ,
and hence
I ( G ) | U | i ( G U ) ( Φ 4 a + b a ) ( | T 0 | + l + | I 1 | + | I 2 | ) + n 1 a | I 1 | + | I 2 | + | T 0 | + l 2 ( Φ 4 a + b a ) + n 1 a 2 = n + Φ 2 a + 2 b 1 a 2 ,
which contradicts I ( G ) > n + Φ 2 a + 2 b 1 a 2 and n 1 .
Case 2.  | T 0 |   +   l = 0 .
Similar to Case 1, we cope with the circumstances if one of H 1 and H 2 is empty.
Claim 3.
If | T 0 |   +   l = 0 , then | I 2 |   0 .
Proof. 
Suppose | I 2 |   = 0 , then we obtain | I 1 |   0 , | V ( T ) | = | V ( H 1 ) | and a ( | S | n ) b | T | d G S ( T ) 1 = | T | 1 .
If | I 1 |   = 1 , then | T | b 1 , | S | | T | + a n 1 a n + b 2 a , and
a 2 + b 2 + 2 a b 2 a + 2 b 2 4 a + n = Θ 4 a 4 a 1 4 a + n Θ 4 a + n δ ( G ) | S | + b 1 n + b 2 a + b 1 ,
a contradiction (identified by three cases: b = a , b = a + 1 and b a + 2 ). Hence, | I 1 | 2 .
In this case, i ( G U )   | I 1 |   2 , where U = S N G S ( I 1 ) , and using the deduction in Claim 1, we obtain
| S | ( b a 1 2 a ) | I 11 | + b 1 a | I 12 | 1 a + n < b | I 1 | a + n ,
| U | | S | + | C 1 | + i = 1 k ( i 1 ) | I ( i ) | ( b 1 + b a ) | I 1 | + n 3 a .
Hence,
I ( G ) | U | i ( G U ) ( b 1 + b a ) | I 1 | + n 3 a | I 1 | b 1 + n + 2 b 3 a 2 ,
which contradicts the hypothesis of isolated toughness and b 1 Φ 4 a . □
Claim 4.
If | T 0 |   +   l = 0 , then | I 1 |   0 .
Proof. 
Suppose | I 1 |   = 0 , then | I 2 |   0 and hence b 3 .
If | I 2 |   = 1 , then we set d m i n = min { d G S ( v ) | v H 2 } and z V ( H 2 ) such that d G S ( z ) = d m i n , thus d m i n { 1 , , b 2 } . Hence, we deduce
a ( | S | n ) b | T | d G S ( T ) 1 | T | ( b d m i n ) 1 ,
| S | | T | ( b d m i n ) + a n 1 a ( d m i n + 1 ) ( b d m i n ) 1 a + n ,
and
δ ( G ) d m i n + | S | d m i n + ( d m i n + 1 ) ( b d m i n ) 1 a + n = d m i n 2 a + ( b + a 1 ) d m i n a + b 1 a + n ( a + b 1 2 ) 2 a + ( b + a 1 ) a + b 1 2 a + b 1 a + n = a 2 + b 2 + 2 a b 2 a + 2 b 3 4 a + n ,
which reveals
δ ( G ) a 2 + b 2 + 2 a b 2 a + 2 b 3 4 a + n = Θ 4 a + n 1 .
A contradiction to the hypothesis of δ ( G ) .
Hence, we obtain | I 2 |   2 . Let v 1 , v 2 , , v | I 2 | be vertices in I 2 . We have | V ( T ) | = | V ( H 2 ) | , and
| S | i = 1 | I 2 | ( d G S ( v i ) + 1 ) ( b d G S ( v i ) ) a + n 1 a .
We infer i ( G U )   | I 2 |   2 where U = S N G S ( I 2 ) , and in view of the discussion in Claim 2, we yield
| U | | S | + | N G S ( I 2 ) | ( Φ 4 a + b a ) | I 2 | + n 1 a .
Using the same fashion as presented before, we obtain
I ( G ) | U | i ( G U ) ( Φ 4 a + b a ) | I 2 | + n 1 a | I 2 | 2 ( Φ 4 a + b a ) + n 1 a 2 = n + Φ 2 a + 2 b 1 a 2 ,
which contradicts I ( G ) > n + Φ 2 a + 2 b 1 a 2 . □
It is verified from Claims 3 and 4 that | I 1 |   1 , | I 2 |   1 and b 3 . We verify that i ( G U ) 2 , where U = S N G S ( I 1 ) N G S ( I 2 ) ,
| U | ( Φ 4 a + b a ) ( | I 1 | + | I 2 | ) + n 1 a ,
and
I ( G ) | U | i ( G U ) ( Φ 4 a + b a ) ( | I 1 | + | I 2 | ) + n 1 a | I 1 | + | I 2 | 2 ( Φ 4 a + b a ) + n 1 a 2 = n + Φ 2 a + 2 b 1 a 2 ,
which contradicts I ( G ) > n + Φ 2 a + 2 b 1 a 2 .
Therefore, contradictions are derived in all situations, and Theorem 1 follows. □

3. Future Works

The main contribution of our article provides an IT bound for a graph to be a F g f n CG and demonstrates its optimality in light of counterexamples. However, there is still a significant gap between the theoretical results and practical applications. The following intriguing issues are related to the network applications and can be considered future research topics:
  • Is there a linear (quadratic) complexity approximation algorithm to calculate the IT value of a given graph?
  • The existence proof in this article cannot elaborate on FF. However, in practical applications, assume the network graph G is known to have a FF; to pave the way for application, an effective algorithm needs to be designed to obtain the specific FF, i.e., input (sub)graph G and output the FIF h.
  • It is imperative to demystify the mechanism that determines the specific forms of functions g and f. For instance, assuming that we obtain the computing ability and throughput of each site in the network, how can we reasonably identify g and f?

Author Contributions

Writing—original draft preparation, J.Z.; investigation, W.G.; writing—review and editing, H.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This work has been partially supported by National Science Foundation of China (No. 12161094).

Data Availability Statement

No data were generated during this study.

Acknowledgments

We thank the reviewers for their constructive comments in improving the quality of this paper.

Conflicts of Interest

The authors declare no competing interest.

References

  1. Bondy, J.A.; Murty, U.S.R. Graph Theory; Springer: Berlin, Germany, 2008. [Google Scholar]
  2. Liu, S. On toughness and fractional (g,f,n)-critical graphs. Inform. Process. Lett. 2010, 110, 378–382. [Google Scholar] [CrossRef]
  3. Yang, J.; Ma, Y.; Liu, G. Fractional (g,f)-factors in graphs. Appl. Math. J. Chin. Univ. Ser. A 2001, 16, 385–390. [Google Scholar]
  4. Ma, Y.; Liu, G. Fractional factors and isolated toughness of graphs. Math. Appl. 2006, 19, 188–194. [Google Scholar]
  5. Gao, W.; Wang, W. New isolated toughness condition for fractional (g,f,n)-critical graphs. Colloq. Math. 2017, 147, 55–65. [Google Scholar] [CrossRef]
  6. Gao, W.; Wang, W.; Chen, Y. Tight isolated toughness bound for fractional (k,n)-critical graphs. Discret. Appl. Math. 2022, 322, 194–202. [Google Scholar] [CrossRef]
  7. Gao, W.; Wang, W.; Chen, Y. Isolated toughness and fractional (a,b,n)-critical graphs. Connect. Sci. 2023, 35, 2181482. [Google Scholar] [CrossRef]
  8. Wei, W.; Shen, J.; Telikani, A.; Fahmideh, M.; Gao, W. Feasibility analysis of data transmission in partially damaged IoT networks of vehicles. IEEE Trans. Intell. Transp. Syst. 2023, 24, 4577–4588. [Google Scholar] [CrossRef]
  9. Dimitrov, D.; Hosam, A. Tight independent set neighborhood union condition for fractional critical deleted graphs and ID deleted graphs. Discret. Contin. Dyn. Syst.-S 2019, 12, 711–721. [Google Scholar] [CrossRef] [Green Version]
  10. Zhou, S. A note of generalization of fractional ID-factor-critical graphs. Fund. Inform. 2022, 187, 61–69. [Google Scholar] [CrossRef]
  11. Zhou, S.; Liu, H.; Xu, Y. A note on fractional ID-[a,b]-factor-critical covered graphs. Discret. Appl. Math. 2022, 319, 511–516. [Google Scholar] [CrossRef]
  12. Zhou, S.; Wu, J.; Bian, Q. On path-factor critical deleted (or covered) graphs. Aequationes Math. 2022, 96, 795–802. [Google Scholar] [CrossRef]
  13. Zhou, S.; Wu, J.; Xu, Y. Toughness, isolated toughness and path factors in graphs. Bull. Aust. Math. Soc. 2022, 106, 195–202. [Google Scholar] [CrossRef]
  14. Liu, G.; Zhang, L. Toughness and the existence of fractional k-factors of graphs. Discret. Math. 2008, 308, 1741–1748. [Google Scholar] [CrossRef] [Green Version]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Zhou, J.; Gao, W.; Zhang, H. Fractional Factor Model for Data Transmission in Real-Time Monitoring Network. Fractal Fract. 2023, 7, 493. https://doi.org/10.3390/fractalfract7070493

AMA Style

Zhou J, Gao W, Zhang H. Fractional Factor Model for Data Transmission in Real-Time Monitoring Network. Fractal and Fractional. 2023; 7(7):493. https://doi.org/10.3390/fractalfract7070493

Chicago/Turabian Style

Zhou, Juxiang, Wei Gao, and Hainan Zhang. 2023. "Fractional Factor Model for Data Transmission in Real-Time Monitoring Network" Fractal and Fractional 7, no. 7: 493. https://doi.org/10.3390/fractalfract7070493

Article Metrics

Back to TopTop