• Keine Ergebnisse gefunden

Computing the Edge-Neighbour-Scattering Number of Graphs

N/A
N/A
Protected

Academic year: 2022

Aktie "Computing the Edge-Neighbour-Scattering Number of Graphs"

Copied!
6
0
0

Wird geladen.... (Jetzt Volltext ansehen)

Volltext

(1)

Computing the Edge-Neighbour-Scattering Number of Graphs

Zongtian Weia, Nannan Qib, and Xiaokui Yuec

a School of Science, Xi’an University of Architecture and Technology, Xi’an, Shaanxi 710055, P.R. China

b Science and Technology on EO-Control Laboratory, Luoyang Institute of Electro-Optic Equipment, Luoyang, Henan 471009, P.R. China

c School of Astronautics, Northwestern Polytechnical University, Xi’an, Shaanxi 710072, P.R. China

Reprint requests to Z. W.; E-mail:wzt6481@163.com

Z. Naturforsch.68a,599 – 604 (2013) / DOI: 10.5560/ZNA.2013-0059

Received January 10, 2013 / revised April 7, 2013 / published online October 2, 2013

A set of edgesXis subverted from a graphGby removing the closed neighbourhoodN[X]fromG.

We denote the survival subgraph byG/X. An edge-subversion strategyXis called an edge-cut strat- egy ofGifG/Xis disconnected, a single vertex, or empty. The edge-neighbour-scattering number of a graphGis defined asENS(G) =max{ω(G/X)− |X|:Xis an edge-cut strategy ofG}, where ω(G/X)is the number of components ofG/X. This parameter can be used to measure the vulnerabil- ity of networks when some edges are failed, especially spy networks and virus-infected networks. In this paper, we prove that the problem of computing the edge-neighbour-scattering number of a graph isNP-complete and give some upper and lower bounds for this parameter.

Key words:Vulnerability of Networks; Edge-Neighbour-Scattering Number; Computational Complexity;NP-Complete; Bounds.

1. Introduction

In this paper, we use [1] and [2] for terminology and notations not defined here and consider finite, simple, and undirected graphs only.

The concept of spy network was introduced by Gunther and Hartnell [3,4]. They modelled a spy net- work by a graph whose vertices represent the stations and whose edges represent the lines of communica- tion. The most important property of spy networks is that, if a station is destroyed, the adjacent sta- tions will be betrayed and so the betrayed stations be- come useless to the network as a whole. Therefore, instead of considering the vulnerability or invulnera- bility of a network in the classic sense, a number of other related parameters were introduced to deal with this circumstance, including vertex-neighbour connec- tivity [4], edge-neighbour connectivity [5], vertex- neighbour integrity [6], edge-neighbour integrity [7], vertex-neighbour-scattering number [8], and edge- neighbour-scattering number [9]. The common ground of these parameters is that, when removing some

vertices (or edges) from a graph, all of their adja- cent vertices (or edges) are removed. It is shown that these parameters have theoretical as well as applied significance in the design and analysis of networks such as spy networks and virus-infected networks, see [8,9].

LetG= (V,E)be a graph ande=uvbe an edge of G. The edgeeis said to besubvertedif the edgee, all of its incident edges, and the two ends ofe,uandv, are removed fromG[10]. A set of edgesXEis called an edge-subversion strategyofGif each of the edges inX has been subverted. The survival subgraph is denoted byG/X. An edge-subversion strategy X is called an edge-cut strategyofGifG/Xis disconnected, a single vertex, or empty.

LetG be a graph. The edge-neighbour connectiv- ityofG, denoted byΛ(G), is the minimum size of all edge-cut strategies ofG. Anedge-dominating set Dof Gis a set of edges such that every edge not inDis ad- jacent to an edge inD. Theedge-domination number ofGis defined to beγ0(G) =min{|D|:Dis an edge- dominating set ofG}.

© 2013 Verlag der Zeitschrift f¨ur Naturforschung, T¨ubingen·http://znaturforsch.com

(2)

The edge-neighbour-scattering number of a graph Gis defined as

ENS(G) =max{ω(G/X)− |X|:

Xis an edge-cut strategy ofG}, where ω(G/X) stands for the number of compo- nents ofG/X. We callXE(G)anedge-neighbour- scattering set(ENS-set) ofGifENS(G) =ω(G/X)−

|X|.

The concept of edge-neighbour-scattering number was introduced in [9]. Some properties of this param- eter as well as some of its applications were discussed there when it is used to measure the vulnerability of networks. In this paper, we prove that the problem of computing the edge-neighbour-scattering number of a graph isNP-complete and give some upper and lower bounds of edge-neighbour-scattering number via some other well-known graphic parameters.

2. Computing Edge-Neighbour-Scattering Number is NP-Complete

It is of prime importance to determine the edge- neighbour-scattering number of a graph. In this sec- tion, we will investigate the complexity for computing the edge-neighbour-scattering number of a graph.

Problem 1. EDGE-NEIGHBOUR-SCATTERING NUMBER

Instance:A graphG; and an integerk.

Question:Does there exist an edge-cut strategyXofG such thatω(G/X)− |X| ≥k?

We solve this complexity problem by considering the following

Problem 2.EDGE-DOMINATION NUMBER Instance:A bipartite graphG; and a positive integerd.

Question:Does there exist an edge-dominating setD ofGsuch that|D| ≤d?

It was proved by Yannakakis and Gavril [11] that the problem EDGE-DOMINATION NUMBER isNP- complete. Based on this conclusion, we prove that the problem EDGE-NEIGHBOUR-SCATTERING NUM- BER is alsoNP-complete.

Theorem 1. EDGE-NEIGHBOUR-SCATTERING NUMBER isNP-complete.

Proof. LetG= (V,E)be a bipartite graph with ordern.

DenoteV ={v1,v2, . . . ,vn}. Replace each vertexviV by a copy of a complete graphKn, and denote this copy byGi. Select a vertex fromGi, and denote it by vi (i=1,2, . . . ,n). Add edgesvivjifvivjE. Denote the resulting graph byG(An example ofGandGin casen=5 is shown in Figure1).

For convenience, denote the subgraph induced by {v1,v2, . . . ,vn} in G as G0. Obviously, G0∼=G. As- sume that X is an ENS-set of G, i.e., ENS(G) = ω(G/X)− |X|, andDis a smallest edge dominat- ing set ofG.

Clearly, EDGE-NEIGHBOUR-SCATTERING NUMBER is in the class NP. We now prove that ENS(G) = n− |D|. By the construction of G, and the NP-completeness of EDGE-DOMINATION NUMBER, this is sufficient for the conclusion.

Claim 1.Ifeis an edge inGiwhich is not incident with vi, thene6∈X,i=1,2, . . . ,n.

Proof. Otherwise, denoteX∗∗=X\ {e}. Notice that Gi/{e}=Kn−2andvi is still inGi/{e}. So we have ω(G/X) =ω(G/X∗∗). But |X∗∗|=|X| −1, thus ω(G/X∗∗)− |X∗∗|>ω(G/X)− |X|. This is con- tradictory to thatXis anENS-set ofG.

Claim 2.LetEi={e:eE(Gi)andeis incident with vi}. Then|EiX| ≤1 fori=1,2, . . . ,n.

Proof. Suppose that, for somei,|EiX| ≥2. With- out loss of generality, assume thate,fEiX and e6= f. Denote X∗∗ =X\ {e}. Since Gi/{e,f}= Kn−3 and Gi/{f} = Kn−2, we have ω(G/X)≤ ω(G/X∗∗). But |X∗∗| = |X| −1, thus we have ω(G/X∗∗)− |X∗∗|>ω(G/X)− |X|. This is con- tradictory to thatXis anENS-set ofG.

v1 v2

v3 v4 v5

G

G

v1 v2

v3 v4 v5

K5 K5

K5 K5 K5

Fig. 1. GraphsGandG.

(3)

Claim 3.There exists an ENS-setX of Gsuch that E(G/X)∩E(G0) =/0 andXE(G0).

Proof. Suppose thatXis anENS-set ofGsuch that E(G/X)∩E(G0)6= /0. Without loss of generality, we assumevivjE(G/X)∩E(G0). Then any edge which is incident withvi orvjis not inX. By Claim 1, any edge of E(Gi)∪E(Gj)is not in X. Therefore, Gi,Gj andvivj belong to one component of G/X. LetX∗∗=X∪ {vivj}. Then we have

ω(G/X∗∗)≥ω(G/X) +1 and

ω(G/X∗∗)− |X∗∗| ≥ω(G/X) +1−(|X|+1)

=ω(G/X)− |X|.

On the other hand, sinceX∗∗is an edge-cut strategy of G, we have

ω(G/X∗∗)− |X∗∗| ≤ω(G/X)− |X|.

Thus

ω(G/X∗∗)− |X∗∗|=ω(G/X)− |X|=ENS(G).

This implies thatX∗∗is also anENS-set ofG. There- fore, if we add all the edges ofE(G/X)∩E(G0)toX, we then get anENS-setX ofGsuch thatE(G/X)∩ E(G0) =/0. In other words, there always exists anENS- setX ofG such that all the edges ofG0are in X or adjacent to some edges ofX.

Let X be an ENS-set of G. By Claims 1 and 2, we then need only to prove that EiX=/0 for i=1,2, . . . ,n. Suppose that EiX6=/0 for some i.

AssumeeiEiX. Then any edge inE(G0)which is incident with vi must be not inX. Otherwise, let X∗∗=X\ {ei}. Then we have

ω(G/X) =ω(G/X∗∗),|X∗∗|=|X| −1 and

ω(G/X∗∗)− |X∗∗|>ω(G/X)− |X|.

This is contradictory to thatXis anENS-set ofG. Claim 3 implies that, there exists an ENS-set X of Gsuch thatX is also an edge dominating set of G0. Thus we have ω(G/X) =n, i.e., ENS(G) = ω(G/X)− |X|=n− |X|.

Note thatDis a smallest edge dominating set ofG andG0∼=G. So, the edge set corresponding toDinG0 is also a smallest edge dominating set ofG0. Therefore,

|X| ≥ |D|. We have

ENS(G) =n− |X| ≤n− |D|.

On the other hand, sinceDis a smallest edge dominat- ing set ofG, the edge set corresponding toDinG0is an edge-cut strategy ofGandω(G/X) =n. Thus we have

ENS(G)≥ω(G/D)− |D|=n− |D|.

Therefore, we haveENS(G) =n− |D|. The proof is complete.

3. Lower and Upper Bounds for Edge-Neighbour-Scattering Number

In this section, we give some lower and upper bounds for edge-neighbour-scattering number in terms of other well-known graphic parameters.

Theorem 2. Let G be a connected graph with order n>5, and M be a maximum but not perfect matching of G. Denote the set of the unsaturated vertices on M as V, and assume that δ=minv∈V{dG(v)}. Then ENS(G)≥2−δ.

Proof. Letw be a vertex inVsuch thatd(w) =δ. DenoteN(w) ={u1,u2, . . . ,uδ}and|M|=m. It is ob- vious thatm≥1. LetM={e:eM andeis inci- dent with at least one vertex inN(w)}. We then have

|M| ≤δ.

It is easy to know that|V| ≥1. For any edgeuvM and x,yV, it is impossible that both of xuE and vyE hold at the same time. Otherwise, there exists an M-augmenting path xuvy in G, i.e., M0= M\ {uv} ∪ {xu,yv}, which is a matching ofGgreater thanM, a contradiction.

On the other hand, no two vertices inVare adja- cent. If not, letxandybe two vertices inVsuch that xyE. ThenM∪ {xy}is a matching ofGgreater than M, contradicting to the choice ofM. In other words, every vertex ofN(w)is incident with one of the edges inMandMis an edge-cut strategy ofG.

We distinguish two cases forVas follows.

Case 1.|V| ≥2.

(4)

Obviously,ω(G/M)≥2. So we have ENS(G)≥ω(G/M)− |M| ≥2−δ.

Case 2.|V|=1.

Case 2.1.δ>m.

It is not difficult to know thatMis an edge-cut strat- egy ofG, so we have

ENS(G)≥ω(G/M)− |M|=1−m≥2−δ. Case 2.2.δm.

Case 2.2.1.M6=M.

Sincen>5, we haveω(G/M)≥2 and ENS(G)≥ω(G/M)− |M| ≥2−δ. Case 2.2.2.M=M.

In this case, every vertex of N(w)is incident with exactly one edge of M, and vise versa. Therefore, d(w) =δ=m. It follows fromn>5 thatd(w)≥3.

Denote V0 =V(G)\N[w] ={v1,v2, . . . ,vm} and the subgraph induced byV0inGasG[V0].

Case 2.2.2.1.G[V0]is not a complete graph.

There exist two edges inM, sayuiviandujvjsuch thatuiN(w),ujN(w)andvivj6∈E. DenoteM∗∗= (M\ {uivi,ujvj})∪ {wui,wuj}. Then we have|M∗∗|= mandω(G/M∗∗) =2. ThusENS(G)≥2−δholds.

Case 2.2.2.2.G[V0]is a complete graph.

Denote M ={u1v1,u2v2, . . . ,umvm}. If there exist two verticesuiandvjsuch thati6=janduivjE. Let M0=M∪ {uivj} \ {uivi}. Then|M0|=δandG/M0is a subgraph ofGwhich consists of two isolated vertices viandw. So we have

ENS(G)≥ω(G/M0)− |M0|=2−m=2−δ. If for anyi6= j,uivj6∈E. Suppose that there exist two vertices in N(w), sayuianduj, such thatuiuj6∈

E. LetX0=M\ {uivi,ujvj} ∪ {vivj,wuk}, wherek6=i andk6= j. Then |X0|=mandG/X0 is a subgraph of G which consists of two isolated vertices ui and uj. Therefore, we have

ENS(G)≥ω(G/X0)− |X0|=2−m=2−δ.

Suppose that any two vertices in N(w) are adja- cent. Denote bm2c=k. When m is even, let X00 = {u1u2,u3u4, . . . ,um−1um}. We have|X00|=k=m2 and ω(G/X00) =2. Therefore,

ENS(G)≥ω(G/X00)− |X00|=2−k>2−δ. When m is odd, let X00 = {u1u2,u3u4, . . . , u2k−1u2k,umvm}. We haveω(G/X00) =2 and|X00|<m.

Therefore,

ENS(G)≥ω(G/X00)− |X00|>2−m>2−δ. The proof is complete.

Remark 1. The lower bound in Theorem2is best pos- sible. For example, whenn≥7 andnis odd, we have δ=2 andENS(Cn) =0.

Theorem 3. Let G be a graph with order n≥3 and γ0(G) be the edge domination number of G. Then ENS(G)≥max{1−γ0(G),n−3γ0(G)}.

Proof. The cases n=3, 4 are trivial. Suppose that n≥5 and Dis a smallest edge dominating set of G.

Obviously,D is an edge-cut strategy of G. Let G[D]

be the subgraph induced byDinG. Then|V(G[D])| ≤ 2γ0(G). By the definition of edge-dominating set, we know thatG/Dis empty or consists of isolated ver- tices.

Case 1.G/D6=/0.

It is easy to see that there are at least n−2γ0(G) isolated vertices inG/D. So we have

ENS(G)≥ω(G/D)− |D| ≥n−2γ0(G)−γ0(G)

=n−3γ0(G).

On the other hand, ifG/D6=/0, thenω(G/D)≥1. Thus ENS(G)≥ω(G/D)− |D| ≥1−γ0(G).

So we have

ENS(G)≥max{1−γ0(G),n−3γ0(G)}. Case 2.G/D=/0.

Each vertex ofV(G)is incident with an edge ofD.

Assume that uvD. Then it is impossible that both uandvare incident with some edges ofDexceptuv.

Otherwise, D\ {uv} is an edge-dominating set of G

(5)

smaller thanD, a contradiction. Sincen≥3, there must exist an edgeeDsuch thatN(e)∩(E(G)\D)6=/0. Let D= (D\ {e})∪ {f}, where f is an arbitrary edge of N(e)∩(E(G)\D). Then|D|=γ0(G)andG/Dis an isolated vertex. So we have

ENS(G)≥ω(G/D)− |D|=1−γ0(G).

On the other hand, sinceG[D]is a spanning subgraph ofG, we have|V(G[D])|=n≤2γ0(G). Therefore

1−γ0(G)−(n−3γ0(G)) =2γ0(G)−n+1>0. Therefore,

ENS(G)≥1−γ0(G) =max{1−γ0(G),n−3γ0(G)}. The proof is complete.

Remark 2. The lower boundn−3γ0(G)in Theorem3 is best possible. LetCnbe the cycle with ordern(≥6) and n ≡0 (mod 3). Then we have γ0(Cn) = n3 and ENS(Cn) =0=n−3γ0(Cn). On the other hand, al- thoughC3 attains the bound 1−γ0(G), we have not found general examples to illustrate that this bound is best possible.

Theorem 4. Let G be a connected graph with order n and α0(G) be the matching number of G. Then ENS(G)n−3α0(G).

Proof. Assume thatM is a maximum matching ofG.

ThenMis an edge-cut strategy ofG. IfGhas a perfect matching, then we have

|M|=α0(G) =n

2, G/M=/0, and

ENS(G)≥ω(G/M)− |M|=−α0(G) =−n 2. The conclusion holds.

IfGhas no perfect matchings, thenG/Mconsists of only isolated vertices, andω(G/M) =n−2α0(G). We have

ENS(G)≥ω(G/M)− |M|=n−2α0(G)−α0(G)

=n−3α0(G). The proof is complete.

Remark 3. The lower bound in Theorem4is best pos- sible. For example, the complete graphs with odd order achieve this bound.

In the following, we give two upper bounds for the edge-neighbour-scattering number.

Theorem 5. Let G be a connected graph with order n andΛ(G)be the edge-neighbour-connectivity of G.

Then ENS(G)n−1−2Λ(G).

Proof. Let X be an edge-cut strategy ofG. Since X subverted fromGmeans deleting at least|X|+1 ver- tices ofG, we have

ENS(G)n−(|X|+1)− |X| ≤n−1−2Λ(G).

Corollary 1. Let G be a connected graph with order n≥3. Then ENS(G)≤n−3.

Remark 4. The upper bound in Theorem 5 is best possible. The stars and double stars can achieve this bound.

4. Conclusions and Future Research

In this paper, we prove that the problem of comput- ing the edge-neighbour-scattering number of a graph is NP-complete and give some upper and lower bounds for this parameter. Here we list some other related in- teresting research problems.

Harary [12] determined the maximum and mini- mum connectivity of graphs with given order and size and also constructed corresponding extremal graphs, which are now widely known as the Harary graphs.

Since then, finding the maximum or minimum value of graphic parameters with given order and size has become an attractive topic in graph theory. The oppo- site problem is finding the maximum or minimum size (order) when some parameters are given. It is natural to consider these two types of problems for the edge- neighbour-scattering number.

A Nordhaus–Gaddum type result is a (tight) lower or upper bound for the sum or product of the val- ues of a parameter for a graph and its complement.

Since Nordhaus and Gaddum [13] got the first result of this type on the chromatic number of graphs, many other similar results have been obtained (see [14] for a survey). It is interesting to investigate the Nordhaus–

(6)

Gaddum type result for the edge-neighbour-scattering number.

As we have shown, the problem of computing the edge-neighbour-scattering number of a graph is NP- complete, so it is interesting to consider whether we can find polynomial algorithms for computing this pa- rameter of some special classes of graphs.

Acknowledgements

This work was supported by NSRP (Grant No.

2012JC2-03) and ESF (Grant No. 12JK0888). The au- thors are grateful to the anonymous referees for valu- able comments and suggestions on the earlier versions of this article.

[1] R. Diestel, Graph Theory, Graduate Texts in Mathemat- ics, Springer-Verlag, New York, third edition 2005.

[2] C. H. Papadimitriou and K. Steiglitz, Combinatorial Optimization: Algorithms and Complexity, Prentice- Hall, Inc., Englewood Cliffs, NJ 1982.

[3] G. Gunther and B. L. Hartnell, On Minimizing the Ef- fects of Betrayals in a Resistance Movement, Proc.

English Manitoba Conference on Numerical Mathe- matics and Computing, pp. 285 – 306, 1978.

[4] G. Gunther, Discrete Appl. Math.11, 233 (1985).

[5] M. B. Cozzens and S.-S. Y. Wu, Ars Combinatoria39, 199 (1995).

[6] M. B. Cozzens and S.-S. Y. Wu, Ars Combinatoria43, 169 (1996).

[7] M. B. Cozzens and S.-S. Y. Wu, Australasian J. Combi- natorics10, 163 (1994).

[8] Z. Wei, A. Mai, and M. Zhai, Ars Combinatoria102, 417 (2011).

[9] Z. Wei, Y. Li, and J. Zhang, Ars Combinatoria85, 271 (2007).

[10] M. B. Cozzens and S.-S. Y. Wu, Australasian J. Comm- binatorics15, 71 (1997).

[11] M. Yannakakis and F. Gavril, SIAM J. Discrete Math.

38, 364 (1993).

[12] F. Harary, P. Natl. Acad. Sci. USA48, 1142 (1962).

[13] E. A. Nordhaus and J. W. Gaddum, Am. Math. Mon.

63, 175 (1956).

[14] M. Aouchiche and P. Hansen, Discrete Appl. Math.

161, 466 (2013).

Referenzen

ÄHNLICHE DOKUMENTE

Entdecken Branchen Fallstudien Geschäftspartner 5G und Edge-Computing schnell erklärt.. IBM 5G- und Edge- Computing-Lösungen Legen

[r]

To address the three challenges of (i) the large-scale and spatial–temporal evolutional characteristic of IoT networks, (ii) unstable data gathering network topology and

Parity binomial edge ideals of complete graphs do not have a linear resolution and their Betti numbers have no obvious explanation.. Example 1.1 The package B inomial E dgE i dEals

darin, dass sich einige Gay Edger, ähnlich wie Straight Edger mit dem schwarzen X, mit einem schwarzen Winkel auf dem Handrücken selbst kennzeichnen und damit nicht nur ihre

Hingegen konnte festgestellt werden, dass die Fachexperten aus dem Industriekonsor- tium bereits über ein grundlegendes Verständnis von EC verfügen. Besonders bei den mög-

Four separated and disassembled sound from one original sound play through four speakers, When four sound are played at the same time, you can find one sound you are used

Like the displaced, marginalised European immigrants in Haneke‟s films, the characters of Turkish background in The Edge of Heaven are shown at a distance from German