Hindawi Publishing Corporation Journal of Applied Mathematics Volume 2013, Article ID 836395, 7 pages http://dx.doi.org/10.1155/2013/836395 Research Article Graph Operations and Neighbor Rupture Degree Saadet KandElcE,1 Goksen Bacak-Turan,2 and Refet Polat1 1 2 Department of Mathematics, Yasar University, 35100 Izmir, Turkey Department of Mathematics, Celal Bayar University, 45140 Manisa, Turkey Correspondence should be addressed to Goksen Bacak-Turan; goksen.turan@cbu.edu.tr Received 25 March 2013; Revised 13 June 2013; Accepted 14 June 2013 Academic Editor: Frank Werner Copyright © 2013 Saadet KandIΜlcIΜ et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. In a communication network, the vulnerability parameters measure the resistance of the network to disruption of operation after the failure of certain stations or communication links. A vertex subversion strategy of a graph πΊ, say π, is a set of vertices in πΊ whose closed neighborhood is removed from πΊ. The survival subgraph is denoted by πΊ/π. The neighbor rupture degree of πΊ, Nr(πΊ), is defined to be Nr(πΊ) = max{π€(πΊ/π) − |π| − π(πΊ/π) : π ⊂ π(πΊ), π€(πΊ/π) ≥ 1}, where π is any vertex subversion strategy of πΊ, π€(πΊ/π) is the number of connected components in πΊ/π and π(πΊ/π) is the maximum order of the components of πΊ/π (G. Bacak Turan, 2010). In this paper we give some results for the neighbor rupture degree of the graphs obtained by some graph operations. 1. Introduction A network can be broke down completely or partially with unexpected reasons. If the data is not transmitted to the desired location that means there is a problem on the system. This problem can block a treaty of billions of euros or make a big problem for human’s life. In these days the reliability and the vulnerability of networks are so important. For that reason graphs are taken as a model in the research area of reliability and vulnerability of the networks. Each network center is taken as a vertex and the connections of these vertices are edges of a graph. A few questions can be asked at this point How can the reliability and the vulnerability of a network be determined? What are the factors of the reliability and the vulnerability? For example, what can be done if there is a problem on the way you are using every day to work? We have two choices; we may give up going to work although we have the risk of dismissal or we can look for another way to work. The question “if there is another way to reach work” may come to our minds. In other words “Has the link connection between home and work completely broken down?”. To answer this question, we must know the dimensions of the problem between home and work. The vulnerability of the graph which represents the way between home and work should be searched. In graph theory some vulnerability parameters are defined to measure the vulnerability value of graphs such as connectivity [1], integrity [2], neighbor integrity [3], rupture degree [4], and neighbor rupture degree [5]. Terminology and notation not defined in this paper can be found in [5]. Let πΊ be a simple graph and let π’ be any vertex of πΊ. The set π(π’) = {V ∈ π(πΊ) | V =ΜΈ π’; V and π’ are adjacent} is the open neighborhood of π’, and π[π’] = {π’} ∪ π(π’) is the closed neighborhood of π’. A vertex π’ in πΊ is said to be subverted if the closed neighborhood of π’ is removed from πΊ. A set of vertices π = {π’1 , π’2 , . . . , π’π } is called a vertex subversion strategy of πΊ if each of the vertices in π has been subverted from πΊ. If π has been subverted from the graph πΊ, then the remaining graph is called survival graph, denoted by πΊ/π. 2. Basic Results In this paper the new vulnerability parameter neighbor rupture degree was studied. The concept of neighbor rupture degree was introduced by Bacak-Turan and KΔ±rlangΔ±c in 2011 [5]. The definition of neighbor rupture degree and some results are given below. 2 Journal of Applied Mathematics Definition 1 (see [6]). The neighbor rupture degree of a noncomplete connected graph πΊ is defined to be let π = π1 ∪ π2 ∪ ⋅ ⋅ ⋅ ∪ ππ be a subversion strategy of πΊ. Then we obtain Nr (πΊ) Nr (πΊ) ≥ π€ ( πΊ πΊ πΊ = max {π€ ( ) − |π| − π ( ) : π ⊂ π (πΊ) , π€ ( ) ≥ 1} , π π π (1) where π is any vertex subversion strategy of πΊ, π€(πΊ/π) is the number of connected components in πΊ/π, and π(πΊ/π) is the maximum order of the components of πΊ/π. In particular, the neighbor rupture degree of a complete graph πΎπ is defined to be Nr(πΎπ ) = 1 − π. A set π ⊂ π(πΊ) is said to be Nr-π ππ‘ of πΊ if πΊ πΊ Nr (πΊ) = π€ ( ) − |π| − π ( ) . π π (2) Some known results are listed below. Theorem 2 (see [6]). (a) Let ππ be a path graph with n vertices and π ≥ 2, 0, Nr (ππ ) = { −1, π ≡ 1 (mod 4) π ≡ 0, 2, 3 (mod 4) . (3) −1, π ≡ 0 (mod 4) −2, π ≡ 1, 2, 3 (mod 4) . −1, π ≡ 1 (mod 4) −2, π ≡ 0, 2, 3 (mod 4) . ≥ π€( πΊ πΊ1 πΊ σ΅¨ σ΅¨ σ΅¨ σ΅¨ ) + π€ ( 2 ) + ⋅ ⋅ ⋅ + π€ ( π ) − σ΅¨σ΅¨σ΅¨π1 σ΅¨σ΅¨σ΅¨ − σ΅¨σ΅¨σ΅¨π2 σ΅¨σ΅¨σ΅¨ π1 π2 ππ πΊ πΊ πΊ σ΅¨ σ΅¨ − ⋅ ⋅ ⋅ σ΅¨σ΅¨σ΅¨ππ σ΅¨σ΅¨σ΅¨ − π ( 1 ) − π ( 2 ) − ⋅ ⋅ ⋅ − π ( π ) π1 π2 ππ = Nr (πΊ1 ) + Nr (πΊ2 ) + Nr (πΊ3 ) + ⋅ ⋅ ⋅ + Nr (πΊπ ) . (8) Thus we have Nr(πΊ1 ∪ πΊ2 ∪ ⋅ ⋅ ⋅ ∪ πΊπ ) ≥ Nr(πΊ1 ) + Nr(πΊ2 ) + ⋅ ⋅ ⋅ + Nr(πΊπ ). (5) (6) ππ+1 − ππ ≥ 2, ππ−π ≥ π1 + 2 (π − π − 1) (9) (10) = 2 − π − π1 σ³¨⇒ Nr ≤ 2 − π − π1 . ∗ In this section some graph operations are operated on graphs and their neighbor rupture degrees are evaluated. Definition 3 (see [7]). The union graph πΊ = πΊ1 ∪ πΊ2 ∪ ⋅ ⋅ ⋅ ∪ πΊπ has vertex set π(πΊ) = π(πΊ1 ) ∪ π(πΊ2 ) ∪ ⋅ ⋅ ⋅ ∪ π(πΊπ ) and edge set πΈ(πΊ) = πΈ(πΊ1 )∪πΈ(πΊ2 )∪⋅ ⋅ ⋅∪πΈ(πΊπ ). If a graph πΊ consists of π (π ≥ 2) disjoint copies of a graph π», then we write πΊ = ππ». Theorem 4. Let πΊ1 , πΊ2 , πΊ3 , . . . , πΊπ be connected graphs. Then ≥ Nr (πΊ1 ) + Nr (πΊ2 ) + ⋅ ⋅ ⋅ + Nr (πΊπ ) . πΊ πΊ πΊ σ΅¨ σ΅¨ − ⋅ ⋅ ⋅ σ΅¨σ΅¨σ΅¨ππ σ΅¨σ΅¨σ΅¨ − max {π ( 1 ) , π ( 2 ) , . . . , π ( π )} π1 π2 ππ Proof. Let π be a subversion strategy of πΎπ1 ∪ πΎπ2 ∪ ⋅ ⋅ ⋅ ∪ πΎππ . Since these are complete graphs, it is obvious that π contains at most one vertex from each πΎππΌ Μ . If |π| = π, then π€((πΎπ1 ∪ πΎπ2 ∪ ⋅ ⋅ ⋅ ∪ πΎππ )/π) = π − π and π((πΎπ1 ∪πΎπ2 ∪⋅ ⋅ ⋅∪πΎππ )/π) ≥ ππ−π . Thus we have π€((πΎπ1 ∪πΎπ2 ∪ πΎπ3 ∪ ⋅ ⋅ ⋅ ∪ πΎππ )/π) − |π| − π((πΎπ1 ∪ πΎπ2 ∪ πΎπ3 ∪ ⋅ ⋅ ⋅ ∪ πΎππ )/π) ≤ π − 2π − ππ−π ≤ π − 2π − π1 − 2(π − π − 1) since 3. Graph Operations and Neighbor Rupture Degree Nr (πΊ1 ∪ πΊ2 ∪ ⋅ ⋅ ⋅ ∪ πΊπ ) πΊ πΊ πΊ1 σ΅¨ σ΅¨ σ΅¨ σ΅¨ ) + π€ ( 2 ) + ⋅ ⋅ ⋅ + π€ ( π ) − σ΅¨σ΅¨σ΅¨π1 σ΅¨σ΅¨σ΅¨ − σ΅¨σ΅¨σ΅¨π2 σ΅¨σ΅¨σ΅¨ π1 π2 ππ Nr (πΎπ1 ∪ πΎπ2 ∪ ⋅ ⋅ ⋅ ∪ πΎππ ) = 2 − π − π1 . (d) Let ππ be a wheel graph with π vertices and π ≥ 5, Nr (ππ ) = { = π€( πΊ ) (π1 ∪ π2 ∪ ⋅ ⋅ ⋅ ∪ ππ ) (4) (c) Let πΎπ1 ,π2 ,π3 ,...,ππ be a π-partite graph Nr (πΎπ1 ,π2 ,...,ππ ) = max {π1 , π2 , π3 , . . . , ππ } − 3. − π( Theorem 5. Let πΎπ1 , πΎπ2 , . . . , πΎππ be complete graphs with π1 ≤ π2 ≤ ππ where ππ+1 − ππ ≥ 2; ∀π ∈ π+ . Then (b) Let πΆπ be a cycle graph with n vertices and π ≥ 3, Nr (πΆπ ) = { πΊ σ΅¨ σ΅¨ ) − σ΅¨σ΅¨σ΅¨π1 ∪ π2 ∪ ⋅ ⋅ ⋅ ∪ ππ σ΅¨σ΅¨σ΅¨ (π1 ∪ π2 ∪ ⋅ ⋅ ⋅ ∪ ππ ) (7) Proof. Let πΊ = πΊ1 ∪πΊ2 ∪⋅ ⋅ ⋅∪πΊπ be the union of πΊ1 , πΊ2 , . . . , πΊπ . Let π1 , π2 , . . . , ππ be Nr-sets of πΊ1 , πΊ2 , . . . , πΊπ respectively, and There exist π such that |π∗ | = π − 1, π€((πΎπ1 ∪ πΎπ2 ∪ ⋅ ⋅ ⋅ ∪ πΎππ )/π∗ ) = 1 and π((πΎπ1 ∪ πΎπ2 ∪ ⋅ ⋅ ⋅ ∪ πΎππ )/π∗ ) = π1 . Then we have π€( (πΎπ1 ∪ πΎπ2 ∪ ⋅ ⋅ ⋅ ∪ πΎππ ) π∗ − π( σ΅¨ σ΅¨ ) − σ΅¨σ΅¨σ΅¨π∗ σ΅¨σ΅¨σ΅¨ (πΎπ1 ∪ πΎπ2 ∪ ⋅ ⋅ ⋅ ∪ πΎππ ) π∗ ) (11) = 2 − π − π1 σ³¨⇒ Nr ≥ 2 − π − π1 . From (10) and (11) we obtain Nr(πΎπ1 ∪ πΎπ2 ∪ ⋅ ⋅ ⋅ ∪ πΎππ ) = 2 − π − π1 . Journal of Applied Mathematics 3 The following theorem’s proof is very similar to that of Theorem 5. Theorem 6. Let πΎπ1 , πΎπ2 , πΎπ3 , . . . , πΎππ be complete graphs with π1 ≤ π2 ≤ π3 ⋅ ⋅ ⋅ ≤ ππ where ππ+1 − ππ ≤ 2; for all π ∈ π+ . Then Nr (πΎπ1 ∪ πΎπ2 ∪ πΎπ3 ∪ ⋅ ⋅ ⋅ ∪ πΎππ ) = π − ππ . (12) Corollary 7. Let 2 − π, 2 > π − π, Nr (πΎπ ∪ πΎπ ) = { −π, otherwise. Theorem 10. Let πΊ1 , πΊ2 , and πΊ3 be connected graphs. Then the neighbor rupture degree of sequential join of πΊ1 , πΊ2 , and πΊ3 is Nr (πΊ1 + πΊ2 + πΊ3 ) = max {Nr (πΊ1 ∪ πΊ3 ) , Nr (πΊ2 )} . Corollary 11. If πΊ2 ≅ πΎπ , then Nr (πΊ1 + πΊ2 + πΊ3 ) ≥ Nr (πΊ1 ) + Nr (πΊ3 ) . Nr (πΎπ1 + πΎπ2 + πΎπ3 ) = −π3 . (13) Theorem 9. Let πΊ1 and πΊ2 be two connected graphs. Then (14) Proof. Let π be a subversion strategy of πΊ1 + πΊ2 . There are three cases according to the elements of π. Case 1. Let π = π1 ⊂ π(πΊ1 ) be the Nr-set of πΊ1 such that π€(πΊ1 /π1 )−|π1 |−π(πΊ1 /π1 ) = Nr(πΊ1 ). Since any elements from πΊ1 are adjacent to every element of πΊ2 in πΊ1 + πΊ2 , we have πΊ + πΊ2 πΊ1 + πΊ2 σ΅¨ σ΅¨ ) − σ΅¨σ΅¨σ΅¨π1 σ΅¨σ΅¨σ΅¨ − π ( 1 ) π1 π1 πΊ πΊ σ΅¨ σ΅¨ = π€ ( 1 ) − σ΅¨σ΅¨σ΅¨π1 σ΅¨σ΅¨σ΅¨ − π ( 1 ) = Nr (πΊ1 ) . π1 π1 (15) Case 2. Let π = π2 ⊂ π(πΊ2 ) be the Nr-set of πΊ2 such that π€(πΊ2 /π2 )−|π2 |−π(πΊ2 /π2 ) = Nr(πΊ2 ). Since any elements from πΊ2 are adjacent to every element of πΊ1 in πΊ1 + πΊ2 , we have π€( πΊ + πΊ2 πΊ1 + πΊ2 σ΅¨ σ΅¨ ) − σ΅¨σ΅¨σ΅¨π2 σ΅¨σ΅¨σ΅¨ − π ( 1 ) π2 π2 πΊ πΊ σ΅¨ σ΅¨ = π€ ( 2 ) − σ΅¨σ΅¨σ΅¨π2 σ΅¨σ΅¨σ΅¨ − π ( 2 ) = Nr (πΊ2 ) . π2 π2 (19) Definition 13 (see [9]). The complement of a simple graph πΊ is obtained by taking the vertices of πΊ and joining two of them whenever they are not joined in πΊ and denoted by πΊπ . Theorem 14. Let ππ be a path graph of order π. Then In this part, neighbor rupture degree of join of some graphs is given. π€( (18) Corollary 12. If π1 ≤ π2 ≤ π3 , then Definition 8 (see [7]). The join graph πΊ = πΊ1 + πΊ2 has vertex set π(πΊ) = π(πΊ1 ) ∪ π(πΊ2 ) and edge set πΈ(πΊ) = πΈ(πΊ1 ) ∪ πΈ(πΊ2 ) ∪ {π’V | π’ ∈ π(πΊ1 ) and V ∈ π(πΊ2 )}. Nr (πΊ1 + πΊ2 ) = max {Nr (πΊ1 ) , Nr (πΊ2 )} . (17) Nr (πππ ) = −1. (20) Proof. Let π be a subversion strategy of πππ and let π = {π’} where π’ ∈ π(ππ ). Case 1. If deg(π’) = 1 in ππ , then π’ is adjacent to all vertices in πππ except its neighbor in ππ . It means |π[π’]| = π − 1 in πππ , then we have π€( ππ πππ ) − |π| − π ( π ) = 1 − 1 − 1 = −1. π π (21) Case 2. If deg(π’) = 2 in ππ , then π’ is adjacent to all vertices in πππ except its neighbors in ππ . It means |π[π’]| = π − 2 in πππ where the remaining two vertices are adjacent. Therefore, π€( πππ ππ ) − |π| − π ( π ) = 1 − 1 − 2 = −2. π π (22) On the other hand, if we assume π is a subversion strategy with |π| ≥ 2, then the remaining graph is empty. Therefore it contradicts to the definition of neighbor rupture degree. From (21) and (22) we have Nr(πππ ) = −1. The following theorem’s proof is very similar to that of Theorem 14. (16) Case 3. Let π ⊂ π(πΊ1 ) ∪ π(πΊ2 ). Since π contains at least one vertex of π(πΊ1 ) which is adjacent to all the vertices of π(πΊ2 ) and π contains at least one vertex of π(πΊ2 ) which is adjacent to all the vertices of π(πΊ1 ) in πΊ1 + πΊ2 , then (πΊ1 + πΊ2 )/π is empty. It contradicts to the definition of neighbor rupture degree. By (15) and (16) Nr(πΊ1 +πΊ2 ) = max{Nr(πΊ1 ), Nr(πΊ2 )}. For three or more disjoint graphs πΊ1 , πΊ2 , πΊ3 , . . . , πΊπ sequential join πΊ1 + πΊ2 + ⋅ ⋅ ⋅ + πΊπ is the graph (πΊ1 + πΊ2 ) ∪ (πΊ2 + πΊ3 ) ∪ ⋅ ⋅ ⋅ ∪ (πΊπ−1 + πΊπ ) [8]. The following theorem’s proof is very similar to that of Theorem 9. Theorem 15. Let π1,π be a wheel graph of order π + 1. Then π ) = −1. Nr (π1,π (23) Theorem 16. Let πΎπ,π be a complete bipartite graph. Then π )={ Nr (πΎπ,π 2 − π, 2 > π − π, −π, otherwise. (24) π = πΎπ ∪ πΎπ . Proof. It is obvious that πΎπ,π According to Corollary 7 we get the result. Corollary 17. Let πΎ1,π be a star graph of order π + 1. Then π ) = −1. Nr (πΎ1,π (25) 4 Journal of Applied Mathematics Definition 18 (see [7]). The cartesian product πΊ = πΊ1 ×πΊ2 has π(πΊ) = π(πΊ1 ) × π(πΊ2 ), and two vertices (π’1 , π’2 ) and (V1 , V2 ) of πΊ are adjacent if and only if either π’1 = V1 , π’2 V2 ∈ πΈ (πΊ2 ) (26) π’2 = V2 , π’1 V1 ∈ πΈ (πΊ1 ) . (27) or Theorem 20. Let π2 ×π3π+1 be a cartesian product with π ∈ π+ . Then Nr (π2 × π3π+1 ) = π − 2. (34) Theorem 21. Let π2 × π3π+2 be a cartesian product with π ∈ π+ . Then Nr (π2 × π3π+2 ) = π − 1. (35) Theorem 19. Let π2 × π3π be a cartesian product with π ∈ π+ . Then Theorem 22. Let πΎπ and πΎπ be two complete graphs with (π ≤ π). Then Nr (π2 × π3π ) = π − 1. Nr (πΎπ × πΎπ ) = 1 − π. (28) Proof. Let π be a subversion strategy of π2 × π3π and |π| = π. There are two cases according to the number of elements in π. Case 1. Let 1 ≤ π ≤ π. Then π[π] ≤ 4π and π€ ≤ 2π. Since π((π2 × π3π )/π) ≥ (|π(π)| − |π(π)|)/π€ ≥ ((2.(3π) − 4π)/2π) = 3π/π − 2 and π × π3π π × π3π π€( 2 ) − |π| − π ( 2 ) π π 3π ≤ 2π − π − ( − 2) π =π+2− (29) (30) Case 2. Let π ≤ π ≤ |π(π2 × π3π )|. Then π((π2 × π3π )/π) ≥ 1 and π€((π2 × π3π )/π) ≤ 2(3π) − 4π − (π − π) = 3π − π, thus we obtain π€((π2 ×π3π )/π)−|π|−π((π2 ×π3π )/π) ≤ 3π−π−π−1 = 3π−2π−1. Let π(π) = 3π − 2π − 1. Since πσΈ < 0, π is a decreasing function, so it takes its maximum value at π = π. Then π(π) = 3π − 2π − 1 = π − 1 (31) From (30) and (31) we have Nr (π2 × π3π ) ≤ π − 1. π€( πΎπ × πΎπ πΎ × πΎπ ) − |π| − π ( π ) π π (37) Let π(π) = 1−π−ππ + (π+π)π−π2 . Since π(π) is an increasing function in (0, π − 1), it takes its maximum value at π = π − 1 and π(π − 1) = 1 − π. Thus we get (38) Case 2. If π − 1 ≤ π ≤ (π − 1)(π − 1), then π€((πΎπ × πΎπ )/π) = 1 and π((πΎπ × πΎπ )/π) ≥ π − π + 1. So we have π€((πΎπ × πΎπ )/π) − |π| − π((πΎπ × πΎπ )/π) ≤ 1 − π − (π − π + 1) = π − π − π. Let π(π) = π − π − π. Since π(π) is a decreasing function, it takes its maximum value at π = π − 1 and π(π − 1) = 1 − π. Thus we get Nr (πΎπ × πΎπ ) ≤ 1 − π. (39) From (38) and (39) we have Nr ≤ 1 − π. (40) There exist π∗ such that π = π − 1, π€((πΎπ × πΎπ )/π∗ ) = 1 and π((πΎπ × πΎπ )/π∗ ) = π − π + 1, thus we have Nr ≥ 1 − π. (41) From (40) and (41) we get Nr = 1 − π. (32) It is obvious that there exist π∗ such that |π∗ | = π, π€((π2 × π3π )/π∗ ) = 2π and π((π2 × π3π )/π∗ ) = 1 so Nr (π2 × π3π ) ≥ π − 1. Case 1. If 0 ≤ π < π − 1, then π€((πΎπ × πΎπ )/π) = 1 and π((πΎπ × πΎπ )/π) ≥ (π − π)(π − π), so we have Nr (πΎπ × πΎπ ) ≤ 1 − π. Let π(π) = π + 2 − 3π/π. π is an increasing function since πσΈ (π) = 1 + 3π/π2 > 0. So it takes its maximum value at π = π. Then π(π) = π − 3π/π + 2 = π − 1. Hence, Nr (π2 × π3π ) ≤ π − 1. Proof. Let π be a subversion strategy of πΎπ ×πΎπ and let |π| = π. We have two cases according to the cardinality of π. ≤ 1 − π − (π − π) (π − π) . 3π . π Nr (π2 × π3π ) ≤ π − 1. (36) (33) From (32) and (33) we have Nr(π2 × π3π ) = π − 1. The following theorems’ proofs are very similar to that of Theorem 19. Definition 23 (see [9]). The tensor product πΊ1 ⊗ πΊ2 of two simple graphs πΊ1 and πΊ2 is the graph with π(πΊ1 ⊗ πΊ2 ) = π1 × π2 and where in (π’1 , π’2 ) and (V1 , V2 ) are adjacent in πΊ1 ⊗ πΊ2 if, and only if, π’1 is adjacent to V1 in πΊ1 and π’2 is adjacent to V2 in πΊ2 . Theorem 24. Let π3 ⊗ ππ be a tensor product of π3 and ππ and π ≡ 0 (mod 4). Then Nr (π3 ⊗ ππ ) = π − 1. (42) Journal of Applied Mathematics 5 Proof. Let π be a subversion strategy of π3 ⊗ ππ and |π| = π be the number of removing vertices from π3 ⊗ ππ . There are two cases according to the number of elements in π. Case 1. If 0 ≤ π ≤ (π/2), then π€((π3 ⊗ ππ )/π) ≤ π + π and π((π3 ⊗ ππ )/π) ≥ 1. Thus we have π€( π3 ⊗ ππ π ⊗ ππ ) − |π| − π ( 3 ) ≤ π − 1. π π (43) Case 2. If (π/2) ≤ π ≤ 3π, then π€((π3 ⊗ ππ )/π) ≤ π + (π/2) − ((π − (π/2)) = 2π − π and π((π3 ⊗ ππ )/π) ≥ 1. Thus we have π ⊗ ππ π ⊗ ππ ) − |π| − π ( 3 ) ≤ 2π − 2π − 1. π€( 3 π π (44) Definition 27 (see [10]). The composition of simple graphs πΊ and π» is the simple graph πΊ[π»] with vertex set π(πΊ) × π(π»), in which (π’, V) is adjacent (π’σΈ , VσΈ ) if and only if either π’π’σΈ ∈ πΈ(πΊ) or π’ = π’σΈ and VVσΈ ∈ πΈ(π»). Theorem 28. Let π3 [ππ ] be the composition of π3 and ππ with π ≥ 5. Then neighbor rupture degree of π3 [ππ ] is 1, Nr (π3 [ππ ]) = { 0, π π ( ) = π − 1. 2 ··· Pni ··· Pnii ··· Pniii (45) From (43) and (45) we get Nr (π3 ⊗ ππ ) ≤ π − 1. (46) There exist π∗ such that |π∗ | = (π/2), π€((π3 ⊗ππ )/π) = π+(π/2) and π((π3 ⊗ ππ )/π) ≥ 1 thus we have Nr (π3 ⊗ ππ ) ≥ π − 1. (47) From (46) and (47) we get Nr(π3 ⊗ ππ ) = π − 1. The following theorem’s proof is very similar to that of Theorem 24. Theorem 25. Let π3 ⊗ ππ be a tensor product of π3 and ππ and π =ΜΈ 0 (mod 4). Then (π + 1) ⌉ − 1. Nr (π3 ⊗ ππ ) = 2π − 2 ⌈ 2 (48) Theorem 26. Let the tensor product of πΎπ and πΎπ is πΎπ ⊗ πΎπ . Then Nr (πΎπ ⊗ πΎπ ) = Nr (πΎπ−1,π−1 ) − 1 = max {π − 5, π − 5} . (49) Proof. Let (π, π) be any vertex of πΎπ ⊗ πΎπ such that π ∈ πΎπ and π ∈ πΎπ . The only vertices that are not adjacent to (π, π) in (πΎπ ⊗ πΎπ ) are (π, ππ ) with (π = 1, 2, . . . , π) and (ππ , π) with (π = 1, 2, . . . , π), where ππ ∈ π(πΎπ ) and ππ ∈ π(πΎπ ). The vertices (π, ππ ) are not adjacent to each other, neither do the vertices (ππ , π). But these are adjacent to each other, so (πΎπ ⊗ πΎπ ) ≅ πΎπ−1,π−1 , {π, π} Nr (πΎπ ⊗ πΎπ ) = Nr (πΎπ−1,π−1 ) − 1 = max {π − 4, π − 4} − 1 = max {π − 5, π − 5} . (50) (51) Proof. Let the vertex set of π3 [ππ ] be labeled as πππ , ππππ , and πππππ . Let π(π) = 2π − 2π − 1 since πσΈ (π) < 0 the function π(π) is a decreasing function so it takes its maximum value at π π = ( ), 2 π ≡ 1 (mod 4) , π ≡ 0, 2, 3 (mod 4) . (52) It can be easily seen that π3 [ππ ] is the sequential join of three disjoint path graphs, π3 [ππ ] ≅ ππ + ππ + ππ . Then, according to the Theorem 10 we get Nr (π3 [ππ ]) = Nr (ππ + ππ + ππ ) = max {Nr (ππ ∪ ππ ) , Nr (ππ )} . (53) By Theorem 2, we have 0, Nr (ππ ) = { −1, π ≡ 1 (mod 4) , π ≡ 0, 2, 3 (mod 4) . (54) To conclude the proof we need to find Nr(ππ ∪ππ ). Let π be a subversion strategy of ππ ∪ππ . Since ππ ∪ππ has two identical disjoint path graphs, let π₯ denote the number of removing vertices of each ππ and let |π| = 2π₯. Case 1. If π₯ ≤ ⌊(π − 1)/4⌋, π€((ππ ∪ ππ ) \ π) ≤ 2π₯ + 2 and π((ππ ∪ ππ ) \ π) ≥ ⌈(2π − 6π₯)/(2π₯ + 2)⌉ = ⌈(π − 3π₯)/(π₯ + 1)⌉, then we get π€ ((ππ ∪ ππ ) \ π) − |π| − π ((ππ ∪ ππ ) \ π) ≤2−⌈ π − 3π₯ ⌉. π₯+1 (55) Let π(π₯) = 2 − (π − 3π₯)/(π₯ + 1), since π(π₯) is an increasing function it takes its maximum value at π₯ = ⌊(π−1)/4⌋. π(⌊(π− 1)/4⌋) = 5 − (π + 3)/(⌊(π − 1)/4⌋ + 1). Since neighbor rupture degree has to be an integer, we have Nr(ππ ∪ ππ ) ≤ ⌈5 − (π + 3)/(⌊(π − 1)/4⌋ + 1)⌉ and we get Nr (ππ ∪ ππ ) ≤ { 1, π ≡ 1 (mod 4) , 0, π ≡ 0, 2, 3 (mod 4) . (56) Case 2. If π₯ ≥ ⌊(π − 1)/4⌋, π€((ππ ∪ ππ ) \ π) ≤ 2π₯, and π((ππ ∪ ππ ) \ π) ≥ 1, thus we get Nr (ππ ∪ ππ ) ≤ −1. (57) 6 Journal of Applied Mathematics Theorem 31. Neighbor rupture degree of ππ2 (π > 6) is From (56) and (57) we have Nr (ππ ∪ ππ ) ≤ { 1, π ≡ 1 (mod 4) , 0, π ≡ 0, 2, 3 (mod 4) . There exist π∗ such that |π∗ | = 2⌊(π − 1)/4⌋, π€((ππ ∪ ππ ) \ π) = (2⌊(π−1)/4⌋+1) and π((ππ ∪ππ )\π) = 2 for π ≡ 0, 2, 3( mod 4), π((ππ ∪ ππ ) \ π) = 1 for π ≡ 1(mod 4). Thus we have Nr (ππ ∪ ππ ) ≥ { Nr (ππ2 ) = { (58) 1, π ≡ 1 (mod 4) , 0, π ≡ 0, 2, 3 (mod 4) . (59) Case 1. If 0 ≤ π ≤ ⌈π/6⌉ − 1, then π€(ππ2 /π) ≤ π + 1, π(ππ2 /π) ≥ (π − 5π)/(π + 1); then we get π€( 1, π ≡ 1 (mod 4) , 0, π ≡ 0, 2, 3 (mod 4) . Nr (πΎπ [πΊ]) = Nr (πΊ) . (61) π (π) = 6 − π€( (62) ππ2 π2 ) − |π| − π ( π ) π π (68) Case 3. If ⌈π/6⌉ + 1 ≤ π ≤ π, then π€(ππ2 /π) ≤ π−1, π(ππ2 /π) ≥ 1; then we get π€( πΊm ππ2 ) − |π| − π (ππ2 \ π) π ≤π−1−π−1 Let π be a subversion strategy of πΎπ [πΊ]. We have two cases according to the elements of π. π Case 1. Let we choose one element from any vertex set πΊ (π = 1, 2, . . . , π); if π’ ∈ π(πΊπ ) and π = {π’}, then it removes all of other vertex sets. So it depends on only πΊπ which we choose one element. Then we have (63) Case 2. Let we choose two elements from any vertex set πΊπ (π = 1, 2, . . . , π) and πΊπ (π = 1, 2, . . . , π) with π =ΜΈ π. Then (πΎπ [πΊ])/π is empty set. It contradicts to the definition of neighbor rupture degree. Thus we obtain Nr (πΎπ [πΊ]) = Nr (πΊ) . (67) = −1 therefore Nr ≤ −1. πΊ ii Nr (πΎπ [πΊ]) = Nr (πΊπ ) = Nr (πΊ) . π ≡ 1 (mod 6) , otherwise. ≤π−π−1 i .. . ··· 0, π+5 ={ < 0, π+1 Case 2. If = ⌈π/6⌉, then π€(ππ2 /π) ≤ π, π(ππ2 /π) ≥ 1; then we get Proof. Let the vertex set of πΎπ [πΊ] be labeled as, πΊπ , πΊππ , . . . , πΊπ , ··· (66) Let Theorem 29. Neighbor rupture degree of composition of πΎπ and any graph πΊ is πΊ ππ2 ) − |π| − π (ππ2 \ π) π π − 5π π+5 ≤π+1−π− =6− . π+1 π+1 (60) By (54) and (60) we conclude the proof. ··· (65) Proof. Let π be a subversion strategy of ππ2 and let |π| = π. There are two cases according to the number of elements of π. From (58) and (59) we get Nr (ππ ∪ ππ ) = { 0, π ≡ 1 (mod 6) , −1, otherwise. (64) Definition 30 (see [11]). An πth power of a graph πΊ is formed by adding an edge between all pairs of vertices of πΊ with distance at most π. If π = 2 then it is called a second power of a graph also called a square. (69) = −2 therefore Nr ≤ −2. According to (67), (68), and (69) we have Nr (ππ2 ) ≤ { 0, π ≡ 1 (mod 6) , −1, otherwise. (70) There exist π∗ such that |π∗ | = ⌈(π − 1)/6⌉, π€(ππ2 /π∗ ) = ⌈π/6⌉, π(ππ2 /π∗ ) = 1; then π€( ππ2 ππ2 0, π ≡ 1 (mod 6) , σ΅¨σ΅¨ ∗ σ΅¨σ΅¨ − π ( π ) − )= { σ΅¨ σ΅¨ σ΅¨ σ΅¨ ∗ ∗ 1, otherwise. π π (71) By (70) and (71) we get the result, Nr ( ππ2 π2 π2 ) = max {π€ ( π ) − |π| − π ( π )} π π π (72) 0, ={ 1, π ≡ 1 (mod 6) , otherwise. Journal of Applied Mathematics 4. Conclusion In this study, we investigate the neighbor rupture degree of graphs obtained by graph operations. The graph operations are used to obtain new graphs. Union, join, complement, composition, power, cartesian product, and tensor product are taken into consideration in this work. These operations are performed to various graphs and their neighbor rupture degrees were determined. References [1] F. Harary, Graph Theory, Addison-Wesley, New York, NY, USA, 1969. [2] C. A. Barefoot and H. R. Entringer, “Vulnerability in graphs: a comparative survey,” Journal of Combinatorial Mathematics and Combinatorial Computing, pp. 25–33, 1987. [3] M. B. Cozzens and S.-S. Y. Wu, “Vertex-neighbor-integrity of powers of cycles,” Ars Combinatoria, vol. 48, pp. 257–270, 1998. [4] Y. Li, S. Zhang, and X. Li, “Rupture degree of graphs,” International Journal of Computer Mathematics, vol. 82, no. 7, pp. 793– 803, 2005. [5] G. Bacak-Turan and A. Kirlangic, “Neighbor rupture degree and the relations between other parameters,” Ars Combinatoria, vol. 102, pp. 333–352, 2011. [6] G. Bacak Turan, Vulnerability parameters in graphs [Ph.D. thesis], Ege University, 2010. [7] G. Chartrand and L. Lesniak, Graphs and Digraphs, Chapman & Hall, Orange, Calif, USA, 3rd edition, 1996. [8] F. Buckley and F. Harary, Distance in Graphs, 1990. [9] R. Balakrishan and K. Ranganathan, A Textbook of Graph Theory, 1999. [10] J. A. Bondy and U. S. R. Murty, Graph Theory with Applications, Macmillan Press, London, UK, 1976. [11] Handbook of Graph Theory, Discrete Mathematics and its Applications (Boca Raton), CRC Press, Boca Raton, Fla, USA, 2004. 7 Advances in Operations Research Hindawi Publishing Corporation http://www.hindawi.com Volume 2014 Advances in Decision Sciences Hindawi Publishing Corporation http://www.hindawi.com Volume 2014 Mathematical Problems in Engineering Hindawi Publishing Corporation http://www.hindawi.com Volume 2014 Journal of Algebra Hindawi Publishing Corporation http://www.hindawi.com Probability and Statistics Volume 2014 The Scientific World Journal Hindawi Publishing Corporation http://www.hindawi.com Hindawi Publishing Corporation http://www.hindawi.com Volume 2014 International Journal of Differential Equations Hindawi Publishing Corporation http://www.hindawi.com Volume 2014 Volume 2014 Submit your manuscripts at http://www.hindawi.com International Journal of Advances in Combinatorics Hindawi Publishing Corporation http://www.hindawi.com Mathematical Physics Hindawi Publishing Corporation http://www.hindawi.com Volume 2014 Journal of Complex Analysis Hindawi Publishing Corporation http://www.hindawi.com Volume 2014 International Journal of Mathematics and Mathematical Sciences Journal of Hindawi Publishing Corporation http://www.hindawi.com Stochastic Analysis Abstract and Applied Analysis Hindawi Publishing Corporation http://www.hindawi.com Hindawi Publishing Corporation http://www.hindawi.com International Journal of Mathematics Volume 2014 Volume 2014 Discrete Dynamics in Nature and Society Volume 2014 Volume 2014 Journal of Journal of Discrete Mathematics Journal of Volume 2014 Hindawi Publishing Corporation http://www.hindawi.com Applied Mathematics Journal of Function Spaces Hindawi Publishing Corporation http://www.hindawi.com Volume 2014 Hindawi Publishing Corporation http://www.hindawi.com Volume 2014 Hindawi Publishing Corporation http://www.hindawi.com Volume 2014 Optimization Hindawi Publishing Corporation http://www.hindawi.com Volume 2014 Hindawi Publishing Corporation http://www.hindawi.com Volume 2014