Research Article Graph Operations and Neighbor Rupture Degree Saadet Kand Goksen Bacak-Turan,

advertisement
Hindawi Publishing Corporation
Journal of Applied Mathematics
Volume 2013, Article ID 836395, 7 pages
http://dx.doi.org/10.1155/2013/836395
Research Article
Graph Operations and Neighbor Rupture Degree
Saadet KandElcE,1 Goksen Bacak-Turan,2 and Refet Polat1
1
2
Department of Mathematics, Yasar University, 35100 Izmir, Turkey
Department of Mathematics, Celal Bayar University, 45140 Manisa, Turkey
Correspondence should be addressed to Goksen Bacak-Turan; goksen.turan@cbu.edu.tr
Received 25 March 2013; Revised 13 June 2013; Accepted 14 June 2013
Academic Editor: Frank Werner
Copyright © 2013 Saadet KandIΜ‡lcIΜ‡ et al. This is an open access article distributed under the Creative Commons Attribution License,
which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
In a communication network, the vulnerability parameters measure the resistance of the network to disruption of operation after
the failure of certain stations or communication links. A vertex subversion strategy of a graph 𝐺, say 𝑆, is a set of vertices in 𝐺 whose
closed neighborhood is removed from 𝐺. The survival subgraph is denoted by 𝐺/𝑆. The neighbor rupture degree of 𝐺, Nr(𝐺), is
defined to be Nr(𝐺) = max{𝑀(𝐺/𝑆) − |𝑆| − 𝑐(𝐺/𝑆) : 𝑆 ⊂ 𝑉(𝐺), 𝑀(𝐺/𝑆) ≥ 1}, where 𝑆 is any vertex subversion strategy of 𝐺, 𝑀(𝐺/𝑆) is
the number of connected components in 𝐺/𝑆 and 𝑐(𝐺/𝑆) is the maximum order of the components of 𝐺/𝑆 (G. Bacak Turan, 2010).
In this paper we give some results for the neighbor rupture degree of the graphs obtained by some graph operations.
1. Introduction
A network can be broke down completely or partially with
unexpected reasons. If the data is not transmitted to the
desired location that means there is a problem on the system.
This problem can block a treaty of billions of euros or make
a big problem for human’s life. In these days the reliability
and the vulnerability of networks are so important. For that
reason graphs are taken as a model in the research area of
reliability and vulnerability of the networks. Each network
center is taken as a vertex and the connections of these
vertices are edges of a graph.
A few questions can be asked at this point How can the
reliability and the vulnerability of a network be determined?
What are the factors of the reliability and the vulnerability?
For example, what can be done if there is a problem on the
way you are using every day to work? We have two choices;
we may give up going to work although we have the risk
of dismissal or we can look for another way to work. The
question “if there is another way to reach work” may come to
our minds. In other words “Has the link connection between
home and work completely broken down?”. To answer this
question, we must know the dimensions of the problem
between home and work. The vulnerability of the graph
which represents the way between home and work should be
searched. In graph theory some vulnerability parameters are
defined to measure the vulnerability value of graphs such as
connectivity [1], integrity [2], neighbor integrity [3], rupture
degree [4], and neighbor rupture degree [5].
Terminology and notation not defined in this paper can
be found in [5]. Let 𝐺 be a simple graph and let 𝑒 be any vertex
of 𝐺. The set 𝑁(𝑒) = {V ∈ 𝑉(𝐺) | V =ΜΈ 𝑒; V and 𝑒 are adjacent}
is the open neighborhood of 𝑒, and 𝑁[𝑒] = {𝑒} ∪ 𝑁(𝑒) is the
closed neighborhood of 𝑒. A vertex 𝑒 in 𝐺 is said to be subverted if the closed neighborhood of 𝑒 is removed from 𝐺. A
set of vertices 𝑆 = {𝑒1 , 𝑒2 , . . . , π‘’π‘š } is called a vertex subversion
strategy of 𝐺 if each of the vertices in 𝑆 has been subverted
from 𝐺. If 𝑆 has been subverted from the graph 𝐺, then the
remaining graph is called survival graph, denoted by 𝐺/𝑆.
2. Basic Results
In this paper the new vulnerability parameter neighbor
rupture degree was studied. The concept of neighbor rupture
degree was introduced by Bacak-Turan and KΔ±rlangΔ±c in 2011
[5]. The definition of neighbor rupture degree and some
results are given below.
2
Journal of Applied Mathematics
Definition 1 (see [6]). The neighbor rupture degree of a noncomplete connected graph 𝐺 is defined to be
let 𝑆 = 𝑆1 ∪ 𝑆2 ∪ ⋅ ⋅ ⋅ ∪ 𝑆𝑛 be a subversion strategy of 𝐺. Then
we obtain
Nr (𝐺)
Nr (𝐺) ≥ 𝑀 (
𝐺
𝐺
𝐺
= max {𝑀 ( ) − |𝑆| − 𝑐 ( ) : 𝑆 ⊂ 𝑉 (𝐺) , 𝑀 ( ) ≥ 1} ,
𝑆
𝑆
𝑆
(1)
where 𝑆 is any vertex subversion strategy of 𝐺, 𝑀(𝐺/𝑆) is the
number of connected components in 𝐺/𝑆, and 𝑐(𝐺/𝑆) is the
maximum order of the components of 𝐺/𝑆.
In particular, the neighbor rupture degree of a complete
graph 𝐾𝑛 is defined to be Nr(𝐾𝑛 ) = 1 − 𝑛. A set 𝑆 ⊂ 𝑉(𝐺) is
said to be Nr-𝑠𝑒𝑑 of 𝐺 if
𝐺
𝐺
Nr (𝐺) = 𝑀 ( ) − |𝑆| − 𝑐 ( ) .
𝑆
𝑆
(2)
Some known results are listed below.
Theorem 2 (see [6]). (a) Let 𝑃𝑛 be a path graph with n vertices
and 𝑛 ≥ 2,
0,
Nr (𝑃𝑛 ) = {
−1,
𝑛 ≡ 1 (mod 4)
𝑛 ≡ 0, 2, 3 (mod 4) .
(3)
−1, 𝑛 ≡ 0 (mod 4)
−2, 𝑛 ≡ 1, 2, 3 (mod 4) .
−1, 𝑛 ≡ 1 (mod 4)
−2, 𝑛 ≡ 0, 2, 3 (mod 4) .
≥ 𝑀(
𝐺
𝐺1
𝐺
󡄨 󡄨 󡄨 󡄨
) + 𝑀 ( 2 ) + ⋅ ⋅ ⋅ + 𝑀 ( 𝑛 ) − 󡄨󡄨󡄨𝑆1 󡄨󡄨󡄨 − 󡄨󡄨󡄨𝑆2 󡄨󡄨󡄨
𝑆1
𝑆2
𝑆𝑛
𝐺
𝐺
𝐺
󡄨 󡄨
− ⋅ ⋅ ⋅ 󡄨󡄨󡄨𝑆𝑛 󡄨󡄨󡄨 − 𝑐 ( 1 ) − 𝑐 ( 2 ) − ⋅ ⋅ ⋅ − 𝑐 ( 𝑛 )
𝑆1
𝑆2
𝑆𝑛
= Nr (𝐺1 ) + Nr (𝐺2 ) + Nr (𝐺3 ) + ⋅ ⋅ ⋅ + Nr (𝐺𝑛 ) .
(8)
Thus we have Nr(𝐺1 ∪ 𝐺2 ∪ ⋅ ⋅ ⋅ ∪ 𝐺𝑛 ) ≥ Nr(𝐺1 ) + Nr(𝐺2 ) +
⋅ ⋅ ⋅ + Nr(𝐺𝑛 ).
(5)
(6)
𝑛𝑖+1 − 𝑛𝑖 ≥ 2,
π‘›π‘š−π‘˜ ≥ 𝑛1 + 2 (π‘š − π‘˜ − 1)
(9)
(10)
= 2 − π‘š − 𝑛1 󳨐⇒ Nr ≤ 2 − π‘š − 𝑛1 .
∗
In this section some graph operations are operated on graphs
and their neighbor rupture degrees are evaluated.
Definition 3 (see [7]). The union graph 𝐺 = 𝐺1 ∪ 𝐺2 ∪ ⋅ ⋅ ⋅ ∪ 𝐺𝑛
has vertex set 𝑉(𝐺) = 𝑉(𝐺1 ) ∪ 𝑉(𝐺2 ) ∪ ⋅ ⋅ ⋅ ∪ 𝑉(𝐺𝑛 ) and edge
set 𝐸(𝐺) = 𝐸(𝐺1 )∪𝐸(𝐺2 )∪⋅ ⋅ ⋅∪𝐸(𝐺𝑛 ). If a graph 𝐺 consists of
π‘˜ (π‘˜ ≥ 2) disjoint copies of a graph 𝐻, then we write 𝐺 = π‘˜π».
Theorem 4. Let 𝐺1 , 𝐺2 , 𝐺3 , . . . , 𝐺𝑛 be connected graphs. Then
≥ Nr (𝐺1 ) + Nr (𝐺2 ) + ⋅ ⋅ ⋅ + Nr (𝐺𝑛 ) .
𝐺
𝐺
𝐺
󡄨 󡄨
− ⋅ ⋅ ⋅ 󡄨󡄨󡄨𝑆𝑛 󡄨󡄨󡄨 − max {𝑐 ( 1 ) , 𝑐 ( 2 ) , . . . , 𝑐 ( 𝑛 )}
𝑆1
𝑆2
𝑆𝑛
Proof. Let 𝑆 be a subversion strategy of 𝐾𝑛1 ∪ 𝐾𝑛2 ∪ ⋅ ⋅ ⋅ ∪ πΎπ‘›π‘š .
Since these are complete graphs, it is obvious that 𝑆 contains
at most one vertex from each 𝐾𝑛𝐼 Μ‡ .
If |𝑆| = π‘˜, then 𝑀((𝐾𝑛1 ∪ 𝐾𝑛2 ∪ ⋅ ⋅ ⋅ ∪ πΎπ‘›π‘š )/𝑆) = π‘š − π‘˜ and
𝑐((𝐾𝑛1 ∪𝐾𝑛2 ∪⋅ ⋅ ⋅∪πΎπ‘›π‘š )/𝑆) ≥ π‘›π‘š−π‘˜ . Thus we have 𝑀((𝐾𝑛1 ∪𝐾𝑛2 ∪
𝐾𝑛3 ∪ ⋅ ⋅ ⋅ ∪ πΎπ‘›π‘š )/𝑆) − |𝑆| − 𝑐((𝐾𝑛1 ∪ 𝐾𝑛2 ∪ 𝐾𝑛3 ∪ ⋅ ⋅ ⋅ ∪ πΎπ‘›π‘š )/𝑆) ≤
π‘š − 2π‘˜ − π‘›π‘š−π‘˜ ≤ π‘š − 2π‘˜ − 𝑛1 − 2(π‘š − π‘˜ − 1) since
3. Graph Operations and Neighbor
Rupture Degree
Nr (𝐺1 ∪ 𝐺2 ∪ ⋅ ⋅ ⋅ ∪ 𝐺𝑛 )
𝐺
𝐺
𝐺1
󡄨 󡄨 󡄨 󡄨
) + 𝑀 ( 2 ) + ⋅ ⋅ ⋅ + 𝑀 ( 𝑛 ) − 󡄨󡄨󡄨𝑆1 󡄨󡄨󡄨 − 󡄨󡄨󡄨𝑆2 󡄨󡄨󡄨
𝑆1
𝑆2
𝑆𝑛
Nr (𝐾𝑛1 ∪ 𝐾𝑛2 ∪ ⋅ ⋅ ⋅ ∪ πΎπ‘›π‘š ) = 2 − π‘š − 𝑛1 .
(d) Let π‘Šπ‘› be a wheel graph with 𝑛 vertices and 𝑛 ≥ 5,
Nr (π‘Šπ‘› ) = {
= 𝑀(
𝐺
)
(𝑆1 ∪ 𝑆2 ∪ ⋅ ⋅ ⋅ ∪ 𝑆𝑛 )
(4)
(c) Let 𝐾𝑛1 ,𝑛2 ,𝑛3 ,...,π‘›π‘˜ be a π‘˜-partite graph
Nr (𝐾𝑛1 ,𝑛2 ,...,π‘›π‘˜ ) = max {𝑛1 , 𝑛2 , 𝑛3 , . . . , π‘›π‘˜ } − 3.
− 𝑐(
Theorem 5. Let 𝐾𝑛1 , 𝐾𝑛2 , . . . , πΎπ‘›π‘š be complete graphs with
𝑛1 ≤ 𝑛2 ≤ π‘›π‘š where 𝑛𝑖+1 − 𝑛𝑖 ≥ 2; ∀𝑖 ∈ 𝑍+ . Then
(b) Let 𝐢𝑛 be a cycle graph with n vertices and 𝑛 ≥ 3,
Nr (𝐢𝑛 ) = {
𝐺
󡄨
󡄨
) − 󡄨󡄨󡄨𝑆1 ∪ 𝑆2 ∪ ⋅ ⋅ ⋅ ∪ 𝑆𝑛 󡄨󡄨󡄨
(𝑆1 ∪ 𝑆2 ∪ ⋅ ⋅ ⋅ ∪ 𝑆𝑛 )
(7)
Proof. Let 𝐺 = 𝐺1 ∪𝐺2 ∪⋅ ⋅ ⋅∪𝐺𝑛 be the union of 𝐺1 , 𝐺2 , . . . , 𝐺𝑛 .
Let 𝑆1 , 𝑆2 , . . . , 𝑆𝑛 be Nr-sets of 𝐺1 , 𝐺2 , . . . , 𝐺𝑛 respectively, and
There exist 𝑆 such that |𝑆∗ | = π‘š − 1, 𝑀((𝐾𝑛1 ∪ 𝐾𝑛2 ∪ ⋅ ⋅ ⋅ ∪
πΎπ‘›π‘š )/𝑆∗ ) = 1 and 𝑐((𝐾𝑛1 ∪ 𝐾𝑛2 ∪ ⋅ ⋅ ⋅ ∪ πΎπ‘›π‘š )/𝑆∗ ) = 𝑛1 . Then
we have
𝑀(
(𝐾𝑛1 ∪ 𝐾𝑛2 ∪ ⋅ ⋅ ⋅ ∪ πΎπ‘›π‘š )
𝑆∗
− 𝑐(
󡄨 󡄨
) − 󡄨󡄨󡄨𝑆∗ 󡄨󡄨󡄨
(𝐾𝑛1 ∪ 𝐾𝑛2 ∪ ⋅ ⋅ ⋅ ∪ πΎπ‘›π‘š )
𝑆∗
)
(11)
= 2 − π‘š − 𝑛1
󳨐⇒ Nr ≥ 2 − π‘š − 𝑛1 .
From (10) and (11) we obtain Nr(𝐾𝑛1 ∪ 𝐾𝑛2 ∪ ⋅ ⋅ ⋅ ∪ πΎπ‘›π‘š ) =
2 − π‘š − 𝑛1 .
Journal of Applied Mathematics
3
The following theorem’s proof is very similar to that of
Theorem 5.
Theorem 6. Let 𝐾𝑛1 , 𝐾𝑛2 , 𝐾𝑛3 , . . . , πΎπ‘›π‘š be complete graphs
with 𝑛1 ≤ 𝑛2 ≤ 𝑛3 ⋅ ⋅ ⋅ ≤ π‘›π‘š where 𝑛𝑖+1 − 𝑛𝑖 ≤ 2; for all 𝑖 ∈ 𝑍+ .
Then
Nr (𝐾𝑛1 ∪ 𝐾𝑛2 ∪ 𝐾𝑛3 ∪ ⋅ ⋅ ⋅ ∪ πΎπ‘›π‘š ) = π‘š − π‘›π‘š .
(12)
Corollary 7. Let
2 − 𝑛, 2 > 𝑛 − π‘š,
Nr (𝐾𝑛 ∪ πΎπ‘š ) = {
−π‘š,
otherwise.
Theorem 10. Let 𝐺1 , 𝐺2 , and 𝐺3 be connected graphs. Then
the neighbor rupture degree of sequential join of 𝐺1 , 𝐺2 , and
𝐺3 is
Nr (𝐺1 + 𝐺2 + 𝐺3 ) = max {Nr (𝐺1 ∪ 𝐺3 ) , Nr (𝐺2 )} .
Corollary 11. If 𝐺2 ≅ 𝐾𝑛 , then
Nr (𝐺1 + 𝐺2 + 𝐺3 ) ≥ Nr (𝐺1 ) + Nr (𝐺3 ) .
Nr (𝐾𝑛1 + 𝐾𝑛2 + 𝐾𝑛3 ) = −𝑛3 .
(13)
Theorem 9. Let 𝐺1 and 𝐺2 be two connected graphs. Then
(14)
Proof. Let 𝑆 be a subversion strategy of 𝐺1 + 𝐺2 . There are
three cases according to the elements of 𝑆.
Case 1. Let 𝑆 = 𝑆1 ⊂ 𝑉(𝐺1 ) be the Nr-set of 𝐺1 such that
𝑀(𝐺1 /𝑆1 )−|𝑆1 |−𝑐(𝐺1 /𝑆1 ) = Nr(𝐺1 ). Since any elements from
𝐺1 are adjacent to every element of 𝐺2 in 𝐺1 + 𝐺2 , we have
𝐺 + 𝐺2
𝐺1 + 𝐺2
󡄨 󡄨
) − 󡄨󡄨󡄨𝑆1 󡄨󡄨󡄨 − 𝑐 ( 1
)
𝑆1
𝑆1
𝐺
𝐺
󡄨 󡄨
= 𝑀 ( 1 ) − 󡄨󡄨󡄨𝑆1 󡄨󡄨󡄨 − 𝑐 ( 1 ) = Nr (𝐺1 ) .
𝑆1
𝑆1
(15)
Case 2. Let 𝑆 = 𝑆2 ⊂ 𝑉(𝐺2 ) be the Nr-set of 𝐺2 such that
𝑀(𝐺2 /𝑆2 )−|𝑆2 |−𝑐(𝐺2 /𝑆2 ) = Nr(𝐺2 ). Since any elements from
𝐺2 are adjacent to every element of 𝐺1 in 𝐺1 + 𝐺2 , we have
𝑀(
𝐺 + 𝐺2
𝐺1 + 𝐺2
󡄨 󡄨
) − 󡄨󡄨󡄨𝑆2 󡄨󡄨󡄨 − 𝑐 ( 1
)
𝑆2
𝑆2
𝐺
𝐺
󡄨 󡄨
= 𝑀 ( 2 ) − 󡄨󡄨󡄨𝑆2 󡄨󡄨󡄨 − 𝑐 ( 2 ) = Nr (𝐺2 ) .
𝑆2
𝑆2
(19)
Definition 13 (see [9]). The complement of a simple graph 𝐺
is obtained by taking the vertices of 𝐺 and joining two of them
whenever they are not joined in 𝐺 and denoted by 𝐺𝑐 .
Theorem 14. Let 𝑃𝑛 be a path graph of order 𝑛. Then
In this part, neighbor rupture degree of join of some
graphs is given.
𝑀(
(18)
Corollary 12. If 𝑛1 ≤ 𝑛2 ≤ 𝑛3 , then
Definition 8 (see [7]). The join graph 𝐺 = 𝐺1 + 𝐺2 has vertex
set 𝑉(𝐺) = 𝑉(𝐺1 ) ∪ 𝑉(𝐺2 ) and edge set 𝐸(𝐺) = 𝐸(𝐺1 ) ∪
𝐸(𝐺2 ) ∪ {𝑒V | 𝑒 ∈ 𝑉(𝐺1 ) and V ∈ 𝑉(𝐺2 )}.
Nr (𝐺1 + 𝐺2 ) = max {Nr (𝐺1 ) , Nr (𝐺2 )} .
(17)
Nr (𝑃𝑛𝑐 ) = −1.
(20)
Proof. Let 𝑆 be a subversion strategy of 𝑃𝑛𝑐 and let 𝑆 = {𝑒}
where 𝑒 ∈ 𝑉(𝑃𝑛 ).
Case 1. If deg(𝑒) = 1 in 𝑃𝑛 , then 𝑒 is adjacent to all vertices
in 𝑃𝑛𝑐 except its neighbor in 𝑃𝑛 . It means |𝑁[𝑒]| = 𝑛 − 1 in 𝑃𝑛𝑐 ,
then we have
𝑀(
𝑃𝑐
𝑃𝑛𝑐
) − |𝑆| − 𝑐 ( 𝑛 ) = 1 − 1 − 1 = −1.
𝑆
𝑆
(21)
Case 2. If deg(𝑒) = 2 in 𝑃𝑛 , then 𝑒 is adjacent to all vertices
in 𝑃𝑛𝑐 except its neighbors in 𝑃𝑛 . It means |𝑁[𝑒]| = 𝑛 − 2 in 𝑃𝑛𝑐
where the remaining two vertices are adjacent. Therefore,
𝑀(
𝑃𝑛𝑐
𝑃𝑐
) − |𝑆| − 𝑐 ( 𝑛 ) = 1 − 1 − 2 = −2.
𝑆
𝑆
(22)
On the other hand, if we assume 𝑆 is a subversion strategy
with |𝑆| ≥ 2, then the remaining graph is empty. Therefore it
contradicts to the definition of neighbor rupture degree.
From (21) and (22) we have Nr(𝑃𝑛𝑐 ) = −1.
The following theorem’s proof is very similar to that of
Theorem 14.
(16)
Case 3. Let 𝑆 ⊂ 𝑉(𝐺1 ) ∪ 𝑉(𝐺2 ). Since 𝑆 contains at least one
vertex of 𝑉(𝐺1 ) which is adjacent to all the vertices of 𝑉(𝐺2 )
and 𝑆 contains at least one vertex of 𝑉(𝐺2 ) which is adjacent to
all the vertices of 𝑉(𝐺1 ) in 𝐺1 + 𝐺2 , then (𝐺1 + 𝐺2 )/𝑆 is empty.
It contradicts to the definition of neighbor rupture degree.
By (15) and (16) Nr(𝐺1 +𝐺2 ) = max{Nr(𝐺1 ), Nr(𝐺2 )}.
For three or more disjoint graphs 𝐺1 , 𝐺2 , 𝐺3 , . . . , 𝐺𝑛
sequential join 𝐺1 + 𝐺2 + ⋅ ⋅ ⋅ + 𝐺𝑛 is the graph (𝐺1 + 𝐺2 ) ∪
(𝐺2 + 𝐺3 ) ∪ ⋅ ⋅ ⋅ ∪ (𝐺𝑛−1 + 𝐺𝑛 ) [8].
The following theorem’s proof is very similar to that of
Theorem 9.
Theorem 15. Let π‘Š1,𝑛 be a wheel graph of order 𝑛 + 1. Then
𝑐
) = −1.
Nr (π‘Š1,𝑛
(23)
Theorem 16. Let πΎπ‘š,𝑛 be a complete bipartite graph. Then
𝑐
)={
Nr (πΎπ‘š,𝑛
2 − 𝑛, 2 > 𝑛 − π‘š,
−π‘š,
otherwise.
(24)
𝑐
= πΎπ‘š ∪ 𝐾𝑛 .
Proof. It is obvious that πΎπ‘š,𝑛
According to Corollary 7 we get the result.
Corollary 17. Let 𝐾1,𝑛 be a star graph of order 𝑛 + 1. Then
𝑐
) = −1.
Nr (𝐾1,𝑛
(25)
4
Journal of Applied Mathematics
Definition 18 (see [7]). The cartesian product 𝐺 = 𝐺1 ×𝐺2 has
𝑉(𝐺) = 𝑉(𝐺1 ) × π‘‰(𝐺2 ), and two vertices (𝑒1 , 𝑒2 ) and (V1 , V2 )
of 𝐺 are adjacent if and only if either
𝑒1 = V1 ,
𝑒2 V2 ∈ 𝐸 (𝐺2 )
(26)
𝑒2 = V2 ,
𝑒1 V1 ∈ 𝐸 (𝐺1 ) .
(27)
or
Theorem 20. Let 𝑃2 ×𝑃3π‘Ž+1 be a cartesian product with π‘Ž ∈ 𝑍+ .
Then
Nr (𝑃2 × π‘ƒ3π‘Ž+1 ) = π‘Ž − 2.
(34)
Theorem 21. Let 𝑃2 × π‘ƒ3π‘Ž+2 be a cartesian product with π‘Ž ∈
𝑍+ . Then
Nr (𝑃2 × π‘ƒ3π‘Ž+2 ) = π‘Ž − 1.
(35)
Theorem 19. Let 𝑃2 × π‘ƒ3π‘Ž be a cartesian product with π‘Ž ∈ 𝑍+ .
Then
Theorem 22. Let πΎπ‘š and 𝐾𝑛 be two complete graphs with
(π‘š ≤ 𝑛). Then
Nr (𝑃2 × π‘ƒ3π‘Ž ) = π‘Ž − 1.
Nr (πΎπ‘š × πΎπ‘› ) = 1 − 𝑛.
(28)
Proof. Let 𝑆 be a subversion strategy of 𝑃2 × π‘ƒ3π‘Ž and |𝑆| = π‘Ÿ.
There are two cases according to the number of elements in
𝑆.
Case 1. Let 1 ≤ π‘Ÿ ≤ π‘Ž. Then 𝑁[𝑆] ≤ 4π‘Ÿ and 𝑀 ≤ 2π‘Ÿ.
Since 𝑐((𝑃2 × π‘ƒ3π‘Ž )/𝑆) ≥ (|𝑉(𝑆)| − |𝑁(𝑆)|)/𝑀 ≥ ((2.(3π‘Ž) −
4π‘Ÿ)/2π‘Ÿ) = 3π‘Ž/π‘Ÿ − 2 and
𝑃 × π‘ƒ3π‘Ž
𝑃 × π‘ƒ3π‘Ž
𝑀( 2
) − |𝑆| − 𝑐 ( 2
)
𝑆
𝑆
3π‘Ž
≤ 2π‘Ÿ − π‘Ÿ − ( − 2)
π‘Ÿ
=π‘Ÿ+2−
(29)
(30)
Case 2. Let π‘Ž ≤ π‘Ÿ ≤ |𝑉(𝑃2 × π‘ƒ3π‘Ž )|. Then 𝑐((𝑃2 × π‘ƒ3π‘Ž )/𝑆) ≥ 1 and
𝑀((𝑃2 × π‘ƒ3π‘Ž )/𝑆) ≤ 2(3π‘Ž) − 4π‘Ž − (π‘Ÿ − π‘Ž) = 3π‘Ž − π‘Ÿ, thus we obtain
𝑀((𝑃2 ×𝑃3π‘Ž )/𝑆)−|𝑆|−𝑐((𝑃2 ×𝑃3π‘Ž )/𝑆) ≤ 3π‘Ž−π‘Ÿ−π‘Ÿ−1 = 3π‘Ž−2π‘Ÿ−1.
Let 𝑓(π‘Ÿ) = 3π‘Ž − 2π‘Ÿ − 1. Since 𝑓󸀠 < 0, 𝑓 is a decreasing
function, so it takes its maximum value at π‘Ÿ = π‘Ž. Then 𝑓(π‘Ž) =
3π‘Ž − 2π‘Ž − 1 = π‘Ž − 1
(31)
From (30) and (31) we have
Nr (𝑃2 × π‘ƒ3π‘Ž ) ≤ π‘Ž − 1.
𝑀(
πΎπ‘š × πΎπ‘›
𝐾 × πΎπ‘›
) − |𝑆| − 𝑐 ( π‘š
)
𝑆
𝑆
(37)
Let 𝑓(π‘Ÿ) = 1−π‘Ÿ−π‘šπ‘› + (π‘š+𝑛)π‘Ÿ−π‘Ÿ2 . Since 𝑓(π‘Ÿ) is an increasing
function in (0, π‘š − 1), it takes its maximum value at π‘Ÿ = π‘š − 1
and 𝑓(π‘š − 1) = 1 − 𝑛. Thus we get
(38)
Case 2. If π‘š − 1 ≤ π‘Ÿ ≤ (π‘š − 1)(𝑛 − 1), then 𝑀((πΎπ‘š × πΎπ‘› )/𝑆) = 1
and 𝑐((πΎπ‘š × πΎπ‘› )/𝑆) ≥ 𝑛 − π‘š + 1. So we have 𝑀((πΎπ‘š × πΎπ‘› )/𝑆) −
|𝑆| − 𝑐((πΎπ‘š × πΎπ‘› )/𝑆) ≤ 1 − π‘Ÿ − (𝑛 − π‘š + 1) = π‘š − 𝑛 − π‘Ÿ.
Let 𝑓(π‘Ÿ) = π‘š − 𝑛 − π‘Ÿ. Since 𝑓(π‘Ÿ) is a decreasing function,
it takes its maximum value at π‘Ÿ = π‘š − 1 and 𝑓(π‘š − 1) = 1 − 𝑛.
Thus we get
Nr (πΎπ‘š × πΎπ‘› ) ≤ 1 − 𝑛.
(39)
From (38) and (39) we have
Nr ≤ 1 − 𝑛.
(40)
There exist 𝑆∗ such that π‘Ÿ = π‘š − 1, 𝑀((πΎπ‘š × πΎπ‘› )/𝑆∗ ) = 1 and
𝑐((πΎπ‘š × πΎπ‘› )/𝑆∗ ) = 𝑛 − π‘š + 1, thus we have
Nr ≥ 1 − 𝑛.
(41)
From (40) and (41) we get Nr = 1 − 𝑛.
(32)
It is obvious that there exist 𝑆∗ such that |𝑆∗ | = π‘Ž, 𝑀((𝑃2 ×
𝑃3π‘Ž )/𝑆∗ ) = 2π‘Ž and 𝑐((𝑃2 × π‘ƒ3π‘Ž )/𝑆∗ ) = 1 so
Nr (𝑃2 × π‘ƒ3π‘Ž ) ≥ π‘Ž − 1.
Case 1. If 0 ≤ π‘Ÿ < π‘š − 1, then 𝑀((πΎπ‘š × πΎπ‘› )/𝑆) = 1 and
𝑐((πΎπ‘š × πΎπ‘› )/𝑆) ≥ (π‘š − π‘Ÿ)(𝑛 − π‘Ÿ), so we have
Nr (πΎπ‘š × πΎπ‘› ) ≤ 1 − 𝑛.
Let 𝑓(π‘Ÿ) = π‘Ÿ + 2 − 3π‘Ž/π‘Ÿ. 𝑓 is an increasing function since
𝑓󸀠 (π‘Ÿ) = 1 + 3π‘Ž/π‘Ÿ2 > 0. So it takes its maximum value at π‘Ÿ = π‘Ž.
Then 𝑓(π‘Ž) = π‘Ž − 3π‘Ž/π‘Ž + 2 = π‘Ž − 1. Hence,
Nr (𝑃2 × π‘ƒ3π‘Ž ) ≤ π‘Ž − 1.
Proof. Let 𝑆 be a subversion strategy of πΎπ‘š ×𝐾𝑛 and let |𝑆| = π‘Ÿ.
We have two cases according to the cardinality of 𝑆.
≤ 1 − π‘Ÿ − (π‘š − π‘Ÿ) (𝑛 − π‘Ÿ) .
3π‘Ž
.
π‘Ÿ
Nr (𝑃2 × π‘ƒ3π‘Ž ) ≤ π‘Ž − 1.
(36)
(33)
From (32) and (33) we have Nr(𝑃2 × π‘ƒ3π‘Ž ) = π‘Ž − 1.
The following theorems’ proofs are very similar to that of
Theorem 19.
Definition 23 (see [9]). The tensor product 𝐺1 ⊗ 𝐺2 of two
simple graphs 𝐺1 and 𝐺2 is the graph with 𝑉(𝐺1 ⊗ 𝐺2 ) = 𝑉1 ×
𝑉2 and where in (𝑒1 , 𝑒2 ) and (V1 , V2 ) are adjacent in 𝐺1 ⊗ 𝐺2
if, and only if, 𝑒1 is adjacent to V1 in 𝐺1 and 𝑒2 is adjacent to
V2 in 𝐺2 .
Theorem 24. Let 𝑃3 ⊗ 𝑃𝑛 be a tensor product of 𝑃3 and 𝑃𝑛 and
𝑛 ≡ 0 (mod 4). Then
Nr (𝑃3 ⊗ 𝑃𝑛 ) = 𝑛 − 1.
(42)
Journal of Applied Mathematics
5
Proof. Let 𝑆 be a subversion strategy of 𝑃3 ⊗ 𝑃𝑛 and |𝑆| = π‘Ÿ be
the number of removing vertices from 𝑃3 ⊗ 𝑃𝑛 . There are two
cases according to the number of elements in 𝑆.
Case 1. If 0 ≤ π‘Ÿ ≤ (𝑛/2), then 𝑀((𝑃3 ⊗ 𝑃𝑛 )/𝑆) ≤ 𝑛 + π‘Ÿ and
𝑐((𝑃3 ⊗ 𝑃𝑛 )/𝑆) ≥ 1. Thus we have
𝑀(
𝑃3 ⊗ 𝑃𝑛
𝑃 ⊗ 𝑃𝑛
) − |𝑆| − 𝑐 ( 3
) ≤ 𝑛 − 1.
𝑆
𝑆
(43)
Case 2. If (𝑛/2) ≤ π‘Ÿ ≤ 3𝑛, then 𝑀((𝑃3 ⊗ 𝑃𝑛 )/𝑆) ≤ 𝑛 + (𝑛/2) −
((π‘Ÿ − (𝑛/2)) = 2𝑛 − π‘Ÿ and 𝑐((𝑃3 ⊗ 𝑃𝑛 )/𝑆) ≥ 1. Thus we have
𝑃 ⊗ 𝑃𝑛
𝑃 ⊗ 𝑃𝑛
) − |𝑆| − 𝑐 ( 3
) ≤ 2𝑛 − 2π‘Ÿ − 1.
𝑀( 3
𝑆
𝑆
(44)
Definition 27 (see [10]). The composition of simple graphs 𝐺
and 𝐻 is the simple graph 𝐺[𝐻] with vertex set 𝑉(𝐺) × π‘‰(𝐻),
in which (𝑒, V) is adjacent (𝑒󸀠 , VσΈ€  ) if and only if either 𝑒𝑒󸀠 ∈
𝐸(𝐺) or 𝑒 = 𝑒󸀠 and VVσΈ€  ∈ 𝐸(𝐻).
Theorem 28. Let 𝑃3 [𝑃𝑛 ] be the composition of 𝑃3 and 𝑃𝑛 with
𝑛 ≥ 5. Then neighbor rupture degree of 𝑃3 [𝑃𝑛 ] is
1,
Nr (𝑃3 [𝑃𝑛 ]) = {
0,
𝑛
𝑓 ( ) = 𝑛 − 1.
2
···
Pni
···
Pnii
···
Pniii
(45)
From (43) and (45) we get
Nr (𝑃3 ⊗ 𝑃𝑛 ) ≤ 𝑛 − 1.
(46)
There exist 𝑆∗ such that |𝑆∗ | = (𝑛/2), 𝑀((𝑃3 ⊗𝑃𝑛 )/𝑆) = 𝑛+(𝑛/2)
and 𝑐((𝑃3 ⊗ 𝑃𝑛 )/𝑆) ≥ 1 thus we have
Nr (𝑃3 ⊗ 𝑃𝑛 ) ≥ 𝑛 − 1.
(47)
From (46) and (47) we get Nr(𝑃3 ⊗ 𝑃𝑛 ) = 𝑛 − 1.
The following theorem’s proof is very similar to that of
Theorem 24.
Theorem 25. Let 𝑃3 ⊗ 𝑃𝑛 be a tensor product of 𝑃3 and 𝑃𝑛 and
𝑛 =ΜΈ 0 (mod 4). Then
(𝑛 + 1)
⌉ − 1.
Nr (𝑃3 ⊗ 𝑃𝑛 ) = 2𝑛 − 2 ⌈
2
(48)
Theorem 26. Let the tensor product of πΎπ‘š and 𝐾𝑛 is πΎπ‘š ⊗ 𝐾𝑛 .
Then
Nr (πΎπ‘š ⊗ 𝐾𝑛 ) = Nr (πΎπ‘š−1,𝑛−1 ) − 1 = max {π‘š − 5, 𝑛 − 5} .
(49)
Proof. Let (π‘Ž, 𝑏) be any vertex of πΎπ‘š ⊗ 𝐾𝑛 such that π‘Ž ∈ πΎπ‘š
and 𝑏 ∈ 𝐾𝑛 . The only vertices that are not adjacent to (π‘Ž, 𝑏)
in (πΎπ‘š ⊗ 𝐾𝑛 ) are (π‘Ž, 𝑐𝑗 ) with (𝑗 = 1, 2, . . . , 𝑛) and (𝑑𝑖 , 𝑏) with
(𝑖 = 1, 2, . . . , π‘š), where 𝑐𝑗 ∈ 𝑉(𝐾𝑛 ) and 𝑑𝑖 ∈ 𝑉(πΎπ‘š ).
The vertices (π‘Ž, 𝑐𝑗 ) are not adjacent to each other, neither
do the vertices (𝑑𝑖 , 𝑏). But these are adjacent to each other, so
(πΎπ‘š ⊗ 𝐾𝑛 )
≅ πΎπ‘š−1,𝑛−1 ,
{π‘Ž, 𝑏}
Nr (πΎπ‘š ⊗ 𝐾𝑛 ) = Nr (πΎπ‘š−1,𝑛−1 ) − 1
= max {π‘š − 4, 𝑛 − 4} − 1
= max {π‘š − 5, 𝑛 − 5} .
(50)
(51)
Proof. Let the vertex set of 𝑃3 [𝑃𝑛 ] be labeled as 𝑃𝑛𝑖 , 𝑃𝑛𝑖𝑖 , and
𝑃𝑛𝑖𝑖𝑖 .
Let 𝑓(π‘Ÿ) = 2𝑛 − 2π‘Ÿ − 1 since 𝑓󸀠 (π‘Ÿ) < 0 the function 𝑓(π‘Ÿ) is a
decreasing function so it takes its maximum value at
𝑛
π‘Ÿ = ( ),
2
𝑛 ≡ 1 (mod 4) ,
𝑛 ≡ 0, 2, 3 (mod 4) .
(52)
It can be easily seen that 𝑃3 [𝑃𝑛 ] is the sequential join of
three disjoint path graphs, 𝑃3 [𝑃𝑛 ] ≅ 𝑃𝑛 + 𝑃𝑛 + 𝑃𝑛 . Then,
according to the Theorem 10 we get
Nr (𝑃3 [𝑃𝑛 ]) = Nr (𝑃𝑛 + 𝑃𝑛 + 𝑃𝑛 )
= max {Nr (𝑃𝑛 ∪ 𝑃𝑛 ) , Nr (𝑃𝑛 )} .
(53)
By Theorem 2, we have
0,
Nr (𝑃𝑛 ) = {
−1,
𝑛 ≡ 1 (mod 4) ,
𝑛 ≡ 0, 2, 3 (mod 4) .
(54)
To conclude the proof we need to find Nr(𝑃𝑛 ∪𝑃𝑛 ). Let 𝑆 be
a subversion strategy of 𝑃𝑛 ∪𝑃𝑛 . Since 𝑃𝑛 ∪𝑃𝑛 has two identical
disjoint path graphs, let π‘₯ denote the number of removing
vertices of each 𝑃𝑛 and let |𝑆| = 2π‘₯.
Case 1. If π‘₯ ≤ ⌊(𝑛 − 1)/4⌋, 𝑀((𝑃𝑛 ∪ 𝑃𝑛 ) \ 𝑆) ≤ 2π‘₯ + 2 and
𝑐((𝑃𝑛 ∪ 𝑃𝑛 ) \ 𝑆) ≥ ⌈(2𝑛 − 6π‘₯)/(2π‘₯ + 2)⌉ = ⌈(𝑛 − 3π‘₯)/(π‘₯ + 1)⌉,
then we get
𝑀 ((𝑃𝑛 ∪ 𝑃𝑛 ) \ 𝑆) − |𝑆| − 𝑐 ((𝑃𝑛 ∪ 𝑃𝑛 ) \ 𝑆)
≤2−⌈
𝑛 − 3π‘₯
⌉.
π‘₯+1
(55)
Let 𝑓(π‘₯) = 2 − (𝑛 − 3π‘₯)/(π‘₯ + 1), since 𝑓(π‘₯) is an increasing
function it takes its maximum value at π‘₯ = ⌊(𝑛−1)/4⌋. 𝑓(⌊(𝑛−
1)/4⌋) = 5 − (𝑛 + 3)/(⌊(𝑛 − 1)/4⌋ + 1). Since neighbor rupture
degree has to be an integer, we have Nr(𝑃𝑛 ∪ 𝑃𝑛 ) ≤ ⌈5 − (𝑛 +
3)/(⌊(𝑛 − 1)/4⌋ + 1)⌉ and we get
Nr (𝑃𝑛 ∪ 𝑃𝑛 ) ≤ {
1, 𝑛 ≡ 1 (mod 4) ,
0, 𝑛 ≡ 0, 2, 3 (mod 4) .
(56)
Case 2. If π‘₯ ≥ ⌊(𝑛 − 1)/4⌋, 𝑀((𝑃𝑛 ∪ 𝑃𝑛 ) \ 𝑆) ≤ 2π‘₯, and 𝑐((𝑃𝑛 ∪
𝑃𝑛 ) \ 𝑆) ≥ 1, thus we get
Nr (𝑃𝑛 ∪ 𝑃𝑛 ) ≤ −1.
(57)
6
Journal of Applied Mathematics
Theorem 31. Neighbor rupture degree of 𝑃𝑛2 (𝑛 > 6) is
From (56) and (57) we have
Nr (𝑃𝑛 ∪ 𝑃𝑛 ) ≤ {
1, 𝑛 ≡ 1 (mod 4) ,
0, 𝑛 ≡ 0, 2, 3 (mod 4) .
There exist 𝑆∗ such that |𝑆∗ | = 2⌊(𝑛 − 1)/4⌋, 𝑀((𝑃𝑛 ∪ 𝑃𝑛 ) \ 𝑆) =
(2⌊(𝑛−1)/4⌋+1) and 𝑐((𝑃𝑛 ∪𝑃𝑛 )\𝑆) = 2 for 𝑛 ≡ 0, 2, 3( mod 4),
𝑐((𝑃𝑛 ∪ 𝑃𝑛 ) \ 𝑆) = 1 for 𝑛 ≡ 1(mod 4).
Thus we have
Nr (𝑃𝑛 ∪ 𝑃𝑛 ) ≥ {
Nr (𝑃𝑛2 ) = {
(58)
1, 𝑛 ≡ 1 (mod 4) ,
0, 𝑛 ≡ 0, 2, 3 (mod 4) .
(59)
Case 1. If 0 ≤ π‘Ÿ ≤ ⌈𝑛/6⌉ − 1, then 𝑀(𝑃𝑛2 /𝑆) ≤ π‘Ÿ + 1, 𝑐(𝑃𝑛2 /𝑆) ≥
(𝑛 − 5π‘Ÿ)/(π‘Ÿ + 1); then we get
𝑀(
1, 𝑛 ≡ 1 (mod 4) ,
0, 𝑛 ≡ 0, 2, 3 (mod 4) .
Nr (πΎπ‘š [𝐺]) = Nr (𝐺) .
(61)
𝑓 (π‘Ÿ) = 6 −
𝑀(
(62)
𝑃𝑛2
𝑃2
) − |𝑆| − 𝑐 ( 𝑛 )
𝑆
𝑆
(68)
Case 3. If ⌈𝑛/6⌉ + 1 ≤ π‘Ÿ ≤ 𝑛, then 𝑀(𝑃𝑛2 /𝑆) ≤ π‘Ÿ−1, 𝑐(𝑃𝑛2 /𝑆) ≥ 1;
then we get
𝑀(
𝐺m
𝑃𝑛2
) − |𝑆| − 𝑐 (𝑃𝑛2 \ 𝑆)
𝑆
≤π‘Ÿ−1−π‘Ÿ−1
Let 𝑆 be a subversion strategy of πΎπ‘š [𝐺]. We have two cases
according to the elements of 𝑆.
𝑖
Case 1. Let we choose one element from any vertex set 𝐺 (𝑖 =
1, 2, . . . , π‘š); if 𝑒 ∈ 𝑉(𝐺𝑖 ) and 𝑆 = {𝑒}, then it removes all of
other vertex sets. So it depends on only 𝐺𝑖 which we choose
one element. Then we have
(63)
Case 2. Let we choose two elements from any vertex set
𝐺𝑖 (𝑖 = 1, 2, . . . , π‘š) and 𝐺𝑗 (𝑗 = 1, 2, . . . , π‘š) with 𝑖 =ΜΈ 𝑗. Then
(πΎπ‘š [𝐺])/𝑆 is empty set. It contradicts to the definition of
neighbor rupture degree. Thus we obtain
Nr (πΎπ‘š [𝐺]) = Nr (𝐺) .
(67)
= −1 therefore Nr ≤ −1.
𝐺 ii
Nr (πΎπ‘š [𝐺]) = Nr (𝐺𝑖 ) = Nr (𝐺) .
𝑛 ≡ 1 (mod 6) ,
otherwise.
≤π‘Ÿ−π‘Ÿ−1
i
..
.
···
0,
𝑛+5
={
< 0,
π‘Ÿ+1
Case 2. If = ⌈𝑛/6⌉, then 𝑀(𝑃𝑛2 /𝑆) ≤ π‘Ÿ, 𝑐(𝑃𝑛2 /𝑆) ≥ 1; then we
get
Proof. Let the vertex set of πΎπ‘š [𝐺] be labeled as,
𝐺𝑖 , 𝐺𝑖𝑖 , . . . , πΊπ‘š ,
···
(66)
Let
Theorem 29. Neighbor rupture degree of composition of πΎπ‘š
and any graph 𝐺 is
𝐺
𝑃𝑛2
) − |𝑆| − 𝑐 (𝑃𝑛2 \ 𝑆)
𝑆
𝑛 − 5π‘Ÿ
𝑛+5
≤π‘Ÿ+1−π‘Ÿ−
=6−
.
π‘Ÿ+1
π‘Ÿ+1
(60)
By (54) and (60) we conclude the proof.
···
(65)
Proof. Let 𝑆 be a subversion strategy of 𝑃𝑛2 and let |𝑆| = π‘Ÿ.
There are two cases according to the number of elements of
𝑆.
From (58) and (59) we get
Nr (𝑃𝑛 ∪ 𝑃𝑛 ) = {
0,
𝑛 ≡ 1 (mod 6) ,
−1, otherwise.
(64)
Definition 30 (see [11]). An 𝑛th power of a graph 𝐺 is formed
by adding an edge between all pairs of vertices of 𝐺 with
distance at most 𝑛. If 𝑛 = 2 then it is called a second power
of a graph also called a square.
(69)
= −2 therefore Nr ≤ −2.
According to (67), (68), and (69) we have
Nr (𝑃𝑛2 ) ≤ {
0,
𝑛 ≡ 1 (mod 6) ,
−1, otherwise.
(70)
There exist 𝑆∗ such that |𝑆∗ | = ⌈(𝑛 − 1)/6⌉, 𝑀(𝑃𝑛2 /𝑆∗ ) = ⌈𝑛/6⌉,
𝑐(𝑃𝑛2 /𝑆∗ ) = 1; then
𝑀(
𝑃𝑛2
𝑃𝑛2
0, 𝑛 ≡ 1 (mod 6) ,
󡄨󡄨 ∗ 󡄨󡄨
−
𝑐
(
𝑆
)
−
)= {
󡄨
󡄨
󡄨
󡄨
∗
∗
1, otherwise.
𝑆
𝑆
(71)
By (70) and (71) we get the result,
Nr (
𝑃𝑛2
𝑃2
𝑃2
) = max {𝑀 ( 𝑛 ) − |𝑆| − 𝑐 ( 𝑛 )}
𝑆
𝑆
𝑆
(72)
0,
={
1,
𝑛 ≡ 1 (mod 6) ,
otherwise.
Journal of Applied Mathematics
4. Conclusion
In this study, we investigate the neighbor rupture degree of
graphs obtained by graph operations. The graph operations
are used to obtain new graphs. Union, join, complement,
composition, power, cartesian product, and tensor product
are taken into consideration in this work. These operations
are performed to various graphs and their neighbor rupture
degrees were determined.
References
[1] F. Harary, Graph Theory, Addison-Wesley, New York, NY, USA,
1969.
[2] C. A. Barefoot and H. R. Entringer, “Vulnerability in graphs: a
comparative survey,” Journal of Combinatorial Mathematics and
Combinatorial Computing, pp. 25–33, 1987.
[3] M. B. Cozzens and S.-S. Y. Wu, “Vertex-neighbor-integrity of
powers of cycles,” Ars Combinatoria, vol. 48, pp. 257–270, 1998.
[4] Y. Li, S. Zhang, and X. Li, “Rupture degree of graphs,” International Journal of Computer Mathematics, vol. 82, no. 7, pp. 793–
803, 2005.
[5] G. Bacak-Turan and A. Kirlangic, “Neighbor rupture degree and
the relations between other parameters,” Ars Combinatoria, vol.
102, pp. 333–352, 2011.
[6] G. Bacak Turan, Vulnerability parameters in graphs [Ph.D. thesis], Ege University, 2010.
[7] G. Chartrand and L. Lesniak, Graphs and Digraphs, Chapman
& Hall, Orange, Calif, USA, 3rd edition, 1996.
[8] F. Buckley and F. Harary, Distance in Graphs, 1990.
[9] R. Balakrishan and K. Ranganathan, A Textbook of Graph Theory, 1999.
[10] J. A. Bondy and U. S. R. Murty, Graph Theory with Applications,
Macmillan Press, London, UK, 1976.
[11] Handbook of Graph Theory, Discrete Mathematics and its Applications (Boca Raton), CRC Press, Boca Raton, Fla, USA, 2004.
7
Advances in
Operations Research
Hindawi Publishing Corporation
http://www.hindawi.com
Volume 2014
Advances in
Decision Sciences
Hindawi Publishing Corporation
http://www.hindawi.com
Volume 2014
Mathematical Problems
in Engineering
Hindawi Publishing Corporation
http://www.hindawi.com
Volume 2014
Journal of
Algebra
Hindawi Publishing Corporation
http://www.hindawi.com
Probability and Statistics
Volume 2014
The Scientific
World Journal
Hindawi Publishing Corporation
http://www.hindawi.com
Hindawi Publishing Corporation
http://www.hindawi.com
Volume 2014
International Journal of
Differential Equations
Hindawi Publishing Corporation
http://www.hindawi.com
Volume 2014
Volume 2014
Submit your manuscripts at
http://www.hindawi.com
International Journal of
Advances in
Combinatorics
Hindawi Publishing Corporation
http://www.hindawi.com
Mathematical Physics
Hindawi Publishing Corporation
http://www.hindawi.com
Volume 2014
Journal of
Complex Analysis
Hindawi Publishing Corporation
http://www.hindawi.com
Volume 2014
International
Journal of
Mathematics and
Mathematical
Sciences
Journal of
Hindawi Publishing Corporation
http://www.hindawi.com
Stochastic Analysis
Abstract and
Applied Analysis
Hindawi Publishing Corporation
http://www.hindawi.com
Hindawi Publishing Corporation
http://www.hindawi.com
International Journal of
Mathematics
Volume 2014
Volume 2014
Discrete Dynamics in
Nature and Society
Volume 2014
Volume 2014
Journal of
Journal of
Discrete Mathematics
Journal of
Volume 2014
Hindawi Publishing Corporation
http://www.hindawi.com
Applied Mathematics
Journal of
Function Spaces
Hindawi Publishing Corporation
http://www.hindawi.com
Volume 2014
Hindawi Publishing Corporation
http://www.hindawi.com
Volume 2014
Hindawi Publishing Corporation
http://www.hindawi.com
Volume 2014
Optimization
Hindawi Publishing Corporation
http://www.hindawi.com
Volume 2014
Hindawi Publishing Corporation
http://www.hindawi.com
Volume 2014
Download