SlideShare une entreprise Scribd logo
1  sur  8
Télécharger pour lire hors ligne
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.5, No.2, March 2015
DOI:10.5121/ijfcst.2015.5203 29
EDGE-TENACITY IN CYCLES AND COMPLETE
GRAPHS
Abolfazl Javan, Mina Akhavan, Ali Moeini and Dara Moazzami
Department of Algorithms and Computation, Faculty of Engineering Science, School of
Engineering, University of Tehran, Tehran, Iran
ABSTRACT
It is well known that the tenacity is a proper measure for studying vulnerability and reliability in graphs.
Here, a modified edge-tenacity of a graph is introduced based on the classical definition of tenacity.
Properties and bounds for this measure are introduced; meanwhile edge-tenacity is calculated for cycle
graphs and also for complete graphs.
KEYWORDS
Graph, Edge Tenacity
1. INTRODUCTION
Since that network components may be destroyed, it is necessary to study networks vulnerability.
So far various criteria have been presented to measure the vulnerability and reliability of
networks [9]. All measures have been based on that how the loss of part of the graph (vertices or
edges) will affect the graph structure in the worst case. For example, vertex-connectivity is the
minimum number of vertices whose removal disconnects the graph and edge-connectivity is the
smallest number of edges whose removal disconnects the graph. Integrity [7] and Toughness [8]
is two other measures for calculating network vulnerability.
For the first time graph tenacity is studied by Cozzens, Moazzami and Stueckle [2, 3]. Cozzens et
al. introduced two measures of network vulnerability. One of them is the tenacity (T(G)) that is
introduced for studying vertex vulnerability. The other is the measure that is called mix-tenacity
by Moazzami and has been used for studying edge vulnerability. In [4] Moazzami studied
integrity, connectivity, toughness and tenacity in some graphs. His results showed that tenacity is
a better measure for studying vulnerability and reliability in the most graphs.
The vertex tenacity of a graph called Tv(G) is defined as:
Vertex Tenacity: }
)(
)(
{min)(
)( AG
AGA
GT
GVA
v



 

(1)
where A is a subset V(G) the set of all vertices of the graph G, τ(G − A) is the number of vertices
in the largest component of (G − A) and ω(G − A) is the number of components of (G − A). Also
mix-tenacity is defined as:
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.5, No.2, March 2015
30
Mixed Tenacity: }
)(
)(
{min)(
)( AG
AGA
GT
GEA
m



 

(2)
where A is a subset of E(G), the set of all edges of the graph G, τ(G − A) is the number of
vertices in the largest component of G-A and ω(G − A) is the number of components of (G − A).
In [5, 6] Piazza et al. used (2) as edge-tenacity but this vulnerability measure is the combination
of edges subset ( )(GEA  ) and the number of vertices in the largest component (τ (G − A)). It
is visible that in Tm (Mix-tenacity) the number of removed edges is added to the number of
vertices in a largest component of the remaining graph. In this definition both edges and vertices
are involved which is not rational. To eliminate this weakness, Moazzami and Salehian [1]
presented a new measure and named it edge-tenacity that in new one just edges are involved.
Edge-tenacity is defined as:
Edge Tenacity: }
)(
)(
{min)(
)( AG
AGA
GT
GEA
e



 

(3)
where A is a subset of E(G), the set of all edges of the graph G, τ(G − A) is the number of edges
in the largest component of (G − A) and ω(G − A) is the number of components of (G − A).
2. EDGE-TENACITY OF SOME SPECIAL GRAPHS
Here, we calculate precisely the edge-tenacity for complete graphs and cycle graphs based on (3).
Theorem 1: If Cn be the cycle graph with n vertices, then
.
Proof: Suppose that the number of edges and vertices in Cn are |E|=m and |V|=n respectively. We
know that the number of edges and vertices in Cn are equal (m=n). Also it can be easily
understood that with removing ω edges, (ω >0), ω components remain in the graph, where ω is a
constant. Based on (3) to determine the minimum value of Te, the numerator of the fraction ω +
τ(G − ω) must become minimum. Since τ(G − ω) is the number of edges in the largest component
then for getting the minimum value of Te, it is necessary to distribute |E| − ω edges between ω
components equally. Therefore Te is as:
}.1min}min)(
11















 
















 


 







mm
CT
mm
ne (4)
Since |E|=m is constant, it needs that ω changes between 1 to m. Based on (4) one easily conclude
that in this range, the minimum value of Te will achieve when ω is maximum, namely n (m=n).
Therefore, Te is calculated as:
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.5, No.2, March 2015
31
111)( 



 




 

n
n
nn
m
m
mm
CT ne .
(5)
Theorem 2: If Kn is a complete graph with n vertices, then
.
2
1
)(


n
KT ne (6)
For calculation of the edge-tenacity in a complete graph, we first prove some lemmas and then
edge-tenacity is calculated.
Lemma 1: The edge-tenacity for the complete graph Kn is calculated in the case that the
generated components after removing edges are all complete subgarphs.
Proof: The proof is based on contradiction. Suppose that the edge-tenacity for the complete graph
is calculated in the case that at least one of the generated components is not a complete subgraph.
Therefore, this component has at least one edge less than the complete graph. By adding this edge
to the component if the component is the largest component of the graph, the number of removed
edges will be one less and the number of edges of the largest component will be one more that
finally does not have any effect on obtaining the edge-tenacity. Also, by adding the removed edge
to the component if the component is not the largest one in the graph, the number of removed
edges is decreased by one. It means the new value of edge-tenacity is less than the assumed value
which contradicts with the assumption of the theorem. Therefore, we can conclude that in order to
calculate the edge-tenacity of a complete graph, all generated components of it, after removing
edges, can be considered complete.
Lemma 2: Assume that it is supposed to distribute n vertices between ω complete components.
The ith
component has ci vertices so that
  nccc ,...0 21 (7)
Where ci is the number of allocated vertices to ith
component that 1≤i≤ ω. The maximum value of
the total number of edges for all complete components which can be stated by the following
equation







1
2i
ic
, (8)
Occurs when the following conditions are satisfied:
1,11,1    ncici (9)
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.5, No.2, March 2015
32
(Note that 





2
ic
is the number of edges of ith
complete component and therefore (8) is the total
number of edges for all complete components)
Proof: The proof is based on contradiction. Suppose that there exists an integer called k which
makes the value in expression (8) maximum such that ck>1, k< ω.
It is known that
22
)1(
2
)1(
22
22
 cccccccccc kkkkk

















, (10)
If ck>1 then due to (7) cω>1 and in consequence we have
0)1)(1(  kcc (11)
By inserting the above in (10) we have
.
2
1
2
)2)(1(
2
2222
)1)(1(
2222
22
2222





 





















k
kkkkkk
k
kkkkk
cc
cccccccccccc
cc
cccccccccc




(12)
Rearranging (8) using (12) yields
.
2
1
2
1
22
22222
1
1
1
1
1
1
1
11










 





















































































cccc
ccccc
kj
j
k
i
i
kj
jk
k
i
i
i
i
(13)
The right side of (13) is the total number of edges for all complete components in the case that
pick (ck−1) vertices from kth
component and place them to ωth
component. Therefore, the number
of edges of kth
component will be 





2
1 and the number of edges of ωth
component will be





 
2
1 cc
. In other word, picking (ck−1) vertices from kth
component and placing them to ωth
component makes (8) greater. So (13) contradicts with the assumption that (8) reaches to its
maximum value with the above k. Finally, it can be concluded that the maximum value of (8)
occurs when the condition (9) is satisfied.
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.5, No.2, March 2015
33
Lemma 3: Assume that it is supposed to distribute n vertices between ω complete components.
The ith
component has ci vertices so that
  nccc ,...0 21 (14)
Where ci is the number of allocated vertices to ith
component that 1≤i≤ ω.
Therefore the minimum value of (15)

























222 1


ccn
i
i
(15)
Occurs when vertices are placed based on (16).

















1)2,mod(21,1,
2
3
,
2
1
0)2,mod(21,1,
2
2
1
1






nific
n
c
n
c
nific
n
cc
i
i
(16)
Proof: Rearranging (15) yields
,
22222
1
11









































i
i
i
i cnccn
(17)
Where n is constant. To minimize (17), the value of 







1
1
2

i
ic
should be maximum. According to
Lemma 3, this occurs when vertices are placed based on the following arrangement.
1)1()(,21,1 1     cncici . (18)
To maximize the value of 







1
1
2

i
ic
, cω-1 should be maximum. It is assumed that n and ω are
constants. So, cω, which must satisfy (14), should be minimal. Therefore, each of the ,1ic
,21  i must take one vertex and the remaining vertices distribute almost equally between
cω-1 and cω. If n+ω is even, then the number of remaining vertices namely n−ω+2 is even too.
Because (n+ω) + (n−ω+2) = 2n+2 is even. In this case, cω-1 and cω should take the same value. If
n+ω is odd, then the value of cω should be one more than cω-1.
Now we return to the proof of Theorem 2.
Proof: First, it is assumed that ω be the number of generated components. To minimize the edge-
tenacity with respect to ω, it is enough to minimize the numerator of the fraction of (3).
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.5, No.2, March 2015
34
Based on Lemma 1, the numerator of (3) can be rearranged as follows:























 
222
)(
1



ccn
f
i
i
(19)
Based on lemma 3, we have ,1ic 21  i . Therefore, (19) can be written in a simpler
form as follows:











 
22)( 1

cnf . (20)
If n+ω is even, then based on (16) edge tenacity will be calculated as follows:
.
4
1
88
63
8
22244
2
))(2(
4
1
)1(2
2
2
2
),(
2222















 







nnnnnnnn
nnnn
n
n
KT ne







 (21)
We are looking for the proper value of ω to minimize ),( ne KT . We note in (21) that the value
of nn 63 2
 is positive for all value of n where n>1, so by increasing the value of ω, ),( ne KT
will decrease. Therefore, ),( ne KT will be minimal where ω achieves its maximum value. It
should be noted that the maximum value of ω is n. Therefore, the edge-tenacity is as follows:
  .
2
12
),(min)(









n
n
n
KTKT nene 

(22)
If n+ω is odd, based on (16) the edge-tenacity will be calculated as follows:
.
488
143
8
1244
2
)1)(1(
4
1
)1(2
2
1
2
),(
2222
nnnnnnn
nnnn
n
n
KT ne














 














 (23)
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.5, No.2, March 2015
35
We are looking for the proper value of ω to minimize ),( ne KT . We note in (23) that the value
of 143 2
 nn is positive for all value of n where n>1, so, by increasing the value of ω,
),( ne KT will decrease. Therefore, ),( ne KT will be minimal where ω achieves its maximum
value. It should be noted that the maximum value of ω is n. By considering ω=n, the value of ω+n
will be even and we can use the result value of (22) which is
2
1n
.
3. CONCLUSION
In this paper, edge-tenacities of two classes of graphs are calculated. For calculating the edge
tenacity of these classes, first the function in conventional edge-tenacity formula, which is
supposed to be minimized, is calculated for constant number of components. Second a function
with respect to the number of components and the size of components. It is shown that the size of
components is a constant value and the above function may be considered as a one-variable
function. This variable is just the number of components. Finding minimum of this one-variable
function is well known. Our approach may be useful for calculation of tenacity and toughness in
various classes of graphs.
REFERENCES
[1] D. Moazzami, B. Salehian, On the Edge-Tenacity of Graphs, International Mathematical Forum, 3,
(2008), no. 19, 929 – 936.
[2] M.B. Cozzens, D. Moazzami, S. Stueckle, The tenacity of the Harary Graphs, J. Combin. Math.
Combin. Comput. 16 (1994), 33-56.
[3] M.B. Cozzens, D. Moazzami, S. Stueckle, The tenacity of a graph, Graph Theory, Combinatorics, and
Algorithms (Yousef Alavi and Allen Schwenkeds.) Wiley, New York, (1995), 1111-1112.
[4] D. Moazzami, Vulnerability in Graphs - a Comparative Survey, J. Combin. Math. Combin. Comput.
30, (1999), 23-31.
[5] B. Piazza, F. Roberts, S. Stueckle, Edge-tenacious networks, Networks 25, (1995), no. 1, 7-17.
[6] B. Piazza, S. Stueckle, A lower bound for edge-tenacity, Proceedings of the thirtieth Southeastern
International Conference on Combinatorics, Graph Theory, and Computing (Boca Raton, FL, 1999)
Congr. Numer. 137, (1999), 193-196.
[7] K. S. Baggas, L. W. Beineke,W.D. Goddard, M. J. Lipman and R. E. Pippert, a survey of integrity,
Discrete Applied Math. 37/38, 1992, 13-28.
[8] W. D. Goddard and Henda C. Swart, On the toughness of a graph, Quaestiones Mathematicae 13
(1990), 217-232.
[9] C. A. Barefoot, R. Entringer and H. Swart, Vulnerability in graphs - A comparative survey, J.
Combin. Math. Combin. Comput. 1, 1987, 13-22.
Authors
Abolfazl Javan:
He received his B.Sc. in Software Engineering from Ferdowsi University of Mashhad, Mashhad, Iran, and
M.Sc. degree in Algorithms and Computation from University of Tehran, Tehran, Iran. He is currently a
research assistant at University of Tehran. His research interests include Graphs Theory, Randomized
Algorithms, Approximation Algorithms, and Bioinformatics.
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.5, No.2, March 2015
36
Mina Akhavan:
She received her B.Sc. in Software Engineering from Shahid Beheshti University, Tehran, Iran, and M.Sc.
degree in Algorithms and Computation from University of Tehran, Tehran, Iran. Her research interests
include Graphs Theory, Cloud Computing, and Bioinformatics.
Ali Moeini:
He received his Ph.D. in Nonlinear Systems at the University of Sussex, UK, in 1997. He is an Associate
Professor of Electrical & Computer Engineering at Faculty of Engineering Science, School of Engineering,
the University of Tehran, and ad joint Professor at Department of Information Technology Management,
Faculty of Management, the University of Tehran in Iran. His research interests include Formal Methods in
Knowledge and Software Engineering and Knowledge Management, Soft computing Methods,
Randomized Algorithms, Approximation Algorithms, and Bioinformatics. He has published many papers
in Journals and Conferences on the above mentioned topics.
Dara Moazzami:
He is a theoretical computer scientist, Professor of Mathematics at University of Tehran. He received a
PhD in Applied Mathematics from the University of Northeastern- Boston MA. U.S.A. in 1992, and a B.Sc.
in Pure Mathematics in 1976, and M.Sc. in Applied Mathematics in 1978, from University of Quebec–
Montreal Canada. He has been on the faculty of University of Tehran since 1993, Deputy of Undergraduate
and Graduate studies, Department of Engineering Basic Science in 2006-2008, and Chairman of
Department of Engineering Science, 2009-present. He is Editor-in-Chief Journal of Algorithms and
Computation. His research area is in algorithms and complexity theory, specifically Vulnerability in
Networks and tenacity parameter.

Contenu connexe

Tendances

Information Content of Complex Networks
Information Content of Complex NetworksInformation Content of Complex Networks
Information Content of Complex NetworksHector Zenil
 
Ijciras1101
Ijciras1101Ijciras1101
Ijciras1101zhendy94
 
Performance Assessment of Polyphase Sequences Using Cyclic Algorithm
Performance Assessment of Polyphase Sequences Using Cyclic AlgorithmPerformance Assessment of Polyphase Sequences Using Cyclic Algorithm
Performance Assessment of Polyphase Sequences Using Cyclic Algorithmrahulmonikasharma
 
Seismic Analysis of Structures - III
Seismic Analysis of Structures - IIISeismic Analysis of Structures - III
Seismic Analysis of Structures - IIItushardatta
 
Testing of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different ProcessorsTesting of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different ProcessorsEditor IJMTER
 
OpenSees: Seismic stability of nailed soil slopes
OpenSees: Seismic stability of nailed soil slopesOpenSees: Seismic stability of nailed soil slopes
OpenSees: Seismic stability of nailed soil slopesDhanaji Chavan
 
PERMUTATION LABELING OF JOINS OF KITE GRAPH
PERMUTATION LABELING OF JOINS OF KITE GRAPHPERMUTATION LABELING OF JOINS OF KITE GRAPH
PERMUTATION LABELING OF JOINS OF KITE GRAPHIAEME Publication
 
Response spectrum method
Response spectrum methodResponse spectrum method
Response spectrum method321nilesh
 
Dynamics of multiple degree of freedom linear systems
Dynamics of multiple degree of freedom linear systemsDynamics of multiple degree of freedom linear systems
Dynamics of multiple degree of freedom linear systemsUniversity of Glasgow
 
An application of gd
An application of gdAn application of gd
An application of gdgraphhoc
 
Response spectra
Response spectraResponse spectra
Response spectra321nilesh
 
Dynamic stiffness and eigenvalues of nonlocal nano beams
Dynamic stiffness and eigenvalues of nonlocal nano beamsDynamic stiffness and eigenvalues of nonlocal nano beams
Dynamic stiffness and eigenvalues of nonlocal nano beamsUniversity of Glasgow
 
Accelerating Pseudo-Marginal MCMC using Gaussian Processes
Accelerating Pseudo-Marginal MCMC using Gaussian ProcessesAccelerating Pseudo-Marginal MCMC using Gaussian Processes
Accelerating Pseudo-Marginal MCMC using Gaussian ProcessesMatt Moores
 
FINITE DIFFERENCE MODELLING FOR HEAT TRANSFER PROBLEMS
FINITE DIFFERENCE MODELLING FOR HEAT TRANSFER PROBLEMSFINITE DIFFERENCE MODELLING FOR HEAT TRANSFER PROBLEMS
FINITE DIFFERENCE MODELLING FOR HEAT TRANSFER PROBLEMSroymeister007
 
New Classes of Odd Graceful Graphs
New Classes of Odd Graceful GraphsNew Classes of Odd Graceful Graphs
New Classes of Odd Graceful Graphsgraphhoc
 

Tendances (19)

Information Content of Complex Networks
Information Content of Complex NetworksInformation Content of Complex Networks
Information Content of Complex Networks
 
Ijciras1101
Ijciras1101Ijciras1101
Ijciras1101
 
Performance Assessment of Polyphase Sequences Using Cyclic Algorithm
Performance Assessment of Polyphase Sequences Using Cyclic AlgorithmPerformance Assessment of Polyphase Sequences Using Cyclic Algorithm
Performance Assessment of Polyphase Sequences Using Cyclic Algorithm
 
Seismic Analysis of Structures - III
Seismic Analysis of Structures - IIISeismic Analysis of Structures - III
Seismic Analysis of Structures - III
 
Testing of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different ProcessorsTesting of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different Processors
 
OpenSees: Seismic stability of nailed soil slopes
OpenSees: Seismic stability of nailed soil slopesOpenSees: Seismic stability of nailed soil slopes
OpenSees: Seismic stability of nailed soil slopes
 
Program on Mathematical and Statistical Methods for Climate and the Earth Sys...
Program on Mathematical and Statistical Methods for Climate and the Earth Sys...Program on Mathematical and Statistical Methods for Climate and the Earth Sys...
Program on Mathematical and Statistical Methods for Climate and the Earth Sys...
 
PERMUTATION LABELING OF JOINS OF KITE GRAPH
PERMUTATION LABELING OF JOINS OF KITE GRAPHPERMUTATION LABELING OF JOINS OF KITE GRAPH
PERMUTATION LABELING OF JOINS OF KITE GRAPH
 
Response spectrum method
Response spectrum methodResponse spectrum method
Response spectrum method
 
Dynamics of multiple degree of freedom linear systems
Dynamics of multiple degree of freedom linear systemsDynamics of multiple degree of freedom linear systems
Dynamics of multiple degree of freedom linear systems
 
Fortran induction project. DGTSV DGESV
Fortran induction project. DGTSV DGESVFortran induction project. DGTSV DGESV
Fortran induction project. DGTSV DGESV
 
An application of gd
An application of gdAn application of gd
An application of gd
 
Program on Quasi-Monte Carlo and High-Dimensional Sampling Methods for Applie...
Program on Quasi-Monte Carlo and High-Dimensional Sampling Methods for Applie...Program on Quasi-Monte Carlo and High-Dimensional Sampling Methods for Applie...
Program on Quasi-Monte Carlo and High-Dimensional Sampling Methods for Applie...
 
Joint3DShapeMatching
Joint3DShapeMatchingJoint3DShapeMatching
Joint3DShapeMatching
 
Response spectra
Response spectraResponse spectra
Response spectra
 
Dynamic stiffness and eigenvalues of nonlocal nano beams
Dynamic stiffness and eigenvalues of nonlocal nano beamsDynamic stiffness and eigenvalues of nonlocal nano beams
Dynamic stiffness and eigenvalues of nonlocal nano beams
 
Accelerating Pseudo-Marginal MCMC using Gaussian Processes
Accelerating Pseudo-Marginal MCMC using Gaussian ProcessesAccelerating Pseudo-Marginal MCMC using Gaussian Processes
Accelerating Pseudo-Marginal MCMC using Gaussian Processes
 
FINITE DIFFERENCE MODELLING FOR HEAT TRANSFER PROBLEMS
FINITE DIFFERENCE MODELLING FOR HEAT TRANSFER PROBLEMSFINITE DIFFERENCE MODELLING FOR HEAT TRANSFER PROBLEMS
FINITE DIFFERENCE MODELLING FOR HEAT TRANSFER PROBLEMS
 
New Classes of Odd Graceful Graphs
New Classes of Odd Graceful GraphsNew Classes of Odd Graceful Graphs
New Classes of Odd Graceful Graphs
 

En vedette

Eagro crop marketing for farming
Eagro crop marketing for farmingEagro crop marketing for farming
Eagro crop marketing for farmingijfcstjournal
 
MULTI-HOP DISTRIBUTED ENERGY EFFICIENT HIERARCHICAL CLUSTERING SCHEME FOR HET...
MULTI-HOP DISTRIBUTED ENERGY EFFICIENT HIERARCHICAL CLUSTERING SCHEME FOR HET...MULTI-HOP DISTRIBUTED ENERGY EFFICIENT HIERARCHICAL CLUSTERING SCHEME FOR HET...
MULTI-HOP DISTRIBUTED ENERGY EFFICIENT HIERARCHICAL CLUSTERING SCHEME FOR HET...ijfcstjournal
 
The Global problem of water scarcity (Глобалният проблем с недостига на вода)
The Global problem of water scarcity (Глобалният проблем с недостига на вода)The Global problem of water scarcity (Глобалният проблем с недостига на вода)
The Global problem of water scarcity (Глобалният проблем с недостига на вода)Simona Nikolova
 
Digital case study vw people's car china
Digital case study vw people's car chinaDigital case study vw people's car china
Digital case study vw people's car chinaCohn & Wolfe
 
Apresentação WECOMPANY
Apresentação WECOMPANYApresentação WECOMPANY
Apresentação WECOMPANYWecompany
 
Bto Educational - Convocazione Assemblea Soci - 5 marzo 2011
Bto Educational - Convocazione Assemblea Soci - 5 marzo 2011Bto Educational - Convocazione Assemblea Soci - 5 marzo 2011
Bto Educational - Convocazione Assemblea Soci - 5 marzo 2011BTO Educational
 
Pardon the Interruption: Social Biz Hot Topics
Pardon the Interruption: Social Biz Hot TopicsPardon the Interruption: Social Biz Hot Topics
Pardon the Interruption: Social Biz Hot TopicsLouis Richardson
 
Estaciones del año
Estaciones del añoEstaciones del año
Estaciones del añomaripaqui5
 
21 Nagasasra dan Sabuk Inten_Singgih Hadi Mintardja
21 Nagasasra dan Sabuk Inten_Singgih Hadi Mintardja21 Nagasasra dan Sabuk Inten_Singgih Hadi Mintardja
21 Nagasasra dan Sabuk Inten_Singgih Hadi MintardjaSariyanti Palembang
 
Us Foreign Policy
Us Foreign PolicyUs Foreign Policy
Us Foreign Policyjaloisi
 
Chicago warehouse2011final
Chicago warehouse2011finalChicago warehouse2011final
Chicago warehouse2011finalMike Schaefer
 
Balo153 quan-3-balo-le-van-sy-mikkor editor kem
Balo153 quan-3-balo-le-van-sy-mikkor editor kemBalo153 quan-3-balo-le-van-sy-mikkor editor kem
Balo153 quan-3-balo-le-van-sy-mikkor editor kembalo153
 
A HYBRID COA/ε-CONSTRAINT METHOD FOR SOLVING MULTI-OBJECTIVE PROBLEMS
A HYBRID COA/ε-CONSTRAINT METHOD FOR SOLVING MULTI-OBJECTIVE PROBLEMSA HYBRID COA/ε-CONSTRAINT METHOD FOR SOLVING MULTI-OBJECTIVE PROBLEMS
A HYBRID COA/ε-CONSTRAINT METHOD FOR SOLVING MULTI-OBJECTIVE PROBLEMSijfcstjournal
 
Việt Ta Chúc _ Đàm Lan , PPS -TL Túy Phượng
Việt Ta Chúc _ Đàm Lan , PPS -TL Túy Phượng Việt Ta Chúc _ Đàm Lan , PPS -TL Túy Phượng
Việt Ta Chúc _ Đàm Lan , PPS -TL Túy Phượng Daklak Training College
 
Economic Crisis Affects American Well Being
Economic Crisis Affects American Well BeingEconomic Crisis Affects American Well Being
Economic Crisis Affects American Well BeingTaly Weiss
 
從數位公益出發的社會企業 - 網絡行動科技
從數位公益出發的社會企業 - 網絡行動科技從數位公益出發的社會企業 - 網絡行動科技
從數位公益出發的社會企業 - 網絡行動科技jimyhuang
 

En vedette (20)

Eagro crop marketing for farming
Eagro crop marketing for farmingEagro crop marketing for farming
Eagro crop marketing for farming
 
CLEANOFANT Katalog 2013
CLEANOFANT Katalog 2013CLEANOFANT Katalog 2013
CLEANOFANT Katalog 2013
 
MULTI-HOP DISTRIBUTED ENERGY EFFICIENT HIERARCHICAL CLUSTERING SCHEME FOR HET...
MULTI-HOP DISTRIBUTED ENERGY EFFICIENT HIERARCHICAL CLUSTERING SCHEME FOR HET...MULTI-HOP DISTRIBUTED ENERGY EFFICIENT HIERARCHICAL CLUSTERING SCHEME FOR HET...
MULTI-HOP DISTRIBUTED ENERGY EFFICIENT HIERARCHICAL CLUSTERING SCHEME FOR HET...
 
CCCW Presentation Good Growth Sept 2013
CCCW Presentation Good Growth Sept 2013CCCW Presentation Good Growth Sept 2013
CCCW Presentation Good Growth Sept 2013
 
The Global problem of water scarcity (Глобалният проблем с недостига на вода)
The Global problem of water scarcity (Глобалният проблем с недостига на вода)The Global problem of water scarcity (Глобалният проблем с недостига на вода)
The Global problem of water scarcity (Глобалният проблем с недостига на вода)
 
Digital case study vw people's car china
Digital case study vw people's car chinaDigital case study vw people's car china
Digital case study vw people's car china
 
Apresentação WECOMPANY
Apresentação WECOMPANYApresentação WECOMPANY
Apresentação WECOMPANY
 
Bto Educational - Convocazione Assemblea Soci - 5 marzo 2011
Bto Educational - Convocazione Assemblea Soci - 5 marzo 2011Bto Educational - Convocazione Assemblea Soci - 5 marzo 2011
Bto Educational - Convocazione Assemblea Soci - 5 marzo 2011
 
Pardon the Interruption: Social Biz Hot Topics
Pardon the Interruption: Social Biz Hot TopicsPardon the Interruption: Social Biz Hot Topics
Pardon the Interruption: Social Biz Hot Topics
 
Estaciones del año
Estaciones del añoEstaciones del año
Estaciones del año
 
21 Nagasasra dan Sabuk Inten_Singgih Hadi Mintardja
21 Nagasasra dan Sabuk Inten_Singgih Hadi Mintardja21 Nagasasra dan Sabuk Inten_Singgih Hadi Mintardja
21 Nagasasra dan Sabuk Inten_Singgih Hadi Mintardja
 
Us Foreign Policy
Us Foreign PolicyUs Foreign Policy
Us Foreign Policy
 
Chicago warehouse2011final
Chicago warehouse2011finalChicago warehouse2011final
Chicago warehouse2011final
 
Balo153 quan-3-balo-le-van-sy-mikkor editor kem
Balo153 quan-3-balo-le-van-sy-mikkor editor kemBalo153 quan-3-balo-le-van-sy-mikkor editor kem
Balo153 quan-3-balo-le-van-sy-mikkor editor kem
 
Ev 20141028 c03_en
Ev 20141028 c03_enEv 20141028 c03_en
Ev 20141028 c03_en
 
A HYBRID COA/ε-CONSTRAINT METHOD FOR SOLVING MULTI-OBJECTIVE PROBLEMS
A HYBRID COA/ε-CONSTRAINT METHOD FOR SOLVING MULTI-OBJECTIVE PROBLEMSA HYBRID COA/ε-CONSTRAINT METHOD FOR SOLVING MULTI-OBJECTIVE PROBLEMS
A HYBRID COA/ε-CONSTRAINT METHOD FOR SOLVING MULTI-OBJECTIVE PROBLEMS
 
Việt Ta Chúc _ Đàm Lan , PPS -TL Túy Phượng
Việt Ta Chúc _ Đàm Lan , PPS -TL Túy Phượng Việt Ta Chúc _ Đàm Lan , PPS -TL Túy Phượng
Việt Ta Chúc _ Đàm Lan , PPS -TL Túy Phượng
 
Economic Crisis Affects American Well Being
Economic Crisis Affects American Well BeingEconomic Crisis Affects American Well Being
Economic Crisis Affects American Well Being
 
從數位公益出發的社會企業 - 網絡行動科技
從數位公益出發的社會企業 - 網絡行動科技從數位公益出發的社會企業 - 網絡行動科技
從數位公益出發的社會企業 - 網絡行動科技
 
Happy New Year_ 2015 _ Thái Hà
Happy New Year_ 2015 _ Thái HàHappy New Year_ 2015 _ Thái Hà
Happy New Year_ 2015 _ Thái Hà
 

Similaire à Edge tenacity in cycles and complete

EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHS
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHSEDGE-TENACITY IN CYCLES AND COMPLETE GRAPHS
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHSijfcstjournal
 
STATE SPACE GENERATION FRAMEWORK BASED ON BINARY DECISION DIAGRAM FOR DISTRIB...
STATE SPACE GENERATION FRAMEWORK BASED ON BINARY DECISION DIAGRAM FOR DISTRIB...STATE SPACE GENERATION FRAMEWORK BASED ON BINARY DECISION DIAGRAM FOR DISTRIB...
STATE SPACE GENERATION FRAMEWORK BASED ON BINARY DECISION DIAGRAM FOR DISTRIB...csandit
 
STATE SPACE GENERATION FRAMEWORK BASED ON BINARY DECISION DIAGRAM FOR DISTRIB...
STATE SPACE GENERATION FRAMEWORK BASED ON BINARY DECISION DIAGRAM FOR DISTRIB...STATE SPACE GENERATION FRAMEWORK BASED ON BINARY DECISION DIAGRAM FOR DISTRIB...
STATE SPACE GENERATION FRAMEWORK BASED ON BINARY DECISION DIAGRAM FOR DISTRIB...cscpconf
 
A NEW PARALLEL ALGORITHM FOR COMPUTING MINIMUM SPANNING TREE
A NEW PARALLEL ALGORITHM FOR COMPUTING MINIMUM SPANNING TREEA NEW PARALLEL ALGORITHM FOR COMPUTING MINIMUM SPANNING TREE
A NEW PARALLEL ALGORITHM FOR COMPUTING MINIMUM SPANNING TREEijscmc
 
A NEW PARALLEL ALGORITHM FOR COMPUTING MINIMUM SPANNING TREE
A NEW PARALLEL ALGORITHM FOR COMPUTING MINIMUM SPANNING TREEA NEW PARALLEL ALGORITHM FOR COMPUTING MINIMUM SPANNING TREE
A NEW PARALLEL ALGORITHM FOR COMPUTING MINIMUM SPANNING TREEijscmcj
 
METRIC DIMENSION AND UNCERTAINTY OF TRAVERSING ROBOTS IN A NETWORK
METRIC DIMENSION AND UNCERTAINTY OF TRAVERSING ROBOTS IN A NETWORKMETRIC DIMENSION AND UNCERTAINTY OF TRAVERSING ROBOTS IN A NETWORK
METRIC DIMENSION AND UNCERTAINTY OF TRAVERSING ROBOTS IN A NETWORKFransiskeran
 
COMPARATIVE STUDY ON BENDING LOSS BETWEEN DIFFERENT S-SHAPED WAVEGUIDE BENDS ...
COMPARATIVE STUDY ON BENDING LOSS BETWEEN DIFFERENT S-SHAPED WAVEGUIDE BENDS ...COMPARATIVE STUDY ON BENDING LOSS BETWEEN DIFFERENT S-SHAPED WAVEGUIDE BENDS ...
COMPARATIVE STUDY ON BENDING LOSS BETWEEN DIFFERENT S-SHAPED WAVEGUIDE BENDS ...cscpconf
 
International journal of applied sciences and innovation vol 2015 - no 1 - ...
International journal of applied sciences and innovation   vol 2015 - no 1 - ...International journal of applied sciences and innovation   vol 2015 - no 1 - ...
International journal of applied sciences and innovation vol 2015 - no 1 - ...sophiabelthome
 
Comparative Report Ed098
Comparative Report Ed098Comparative Report Ed098
Comparative Report Ed098mikebrowl
 
Modelling Quantum Transport in Nanostructures
Modelling Quantum Transport in NanostructuresModelling Quantum Transport in Nanostructures
Modelling Quantum Transport in Nanostructuresiosrjce
 
Signature analysis of cracked cantilever beam
Signature analysis of cracked cantilever beamSignature analysis of cracked cantilever beam
Signature analysis of cracked cantilever beamiaemedu
 
Signature analysis of cracked cantilever beam
Signature analysis of cracked cantilever beamSignature analysis of cracked cantilever beam
Signature analysis of cracked cantilever beamiaemedu
 
An analysis between exact and approximate algorithms for the k-center proble...
An analysis between exact and approximate algorithms for the  k-center proble...An analysis between exact and approximate algorithms for the  k-center proble...
An analysis between exact and approximate algorithms for the k-center proble...IJECEIAES
 
Large variance and fat tail of damage by natural disaster
Large variance and fat tail of damage by natural disasterLarge variance and fat tail of damage by natural disaster
Large variance and fat tail of damage by natural disasterHang-Hyun Jo
 
OTP, Phishing, QR code, Shares, Visual Cryptography.
OTP, Phishing, QR code, Shares, Visual Cryptography.OTP, Phishing, QR code, Shares, Visual Cryptography.
OTP, Phishing, QR code, Shares, Visual Cryptography.IJERA Editor
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
ALEXANDER FRACTIONAL INTEGRAL FILTERING OF WAVELET COEFFICIENTS FOR IMAGE DEN...
ALEXANDER FRACTIONAL INTEGRAL FILTERING OF WAVELET COEFFICIENTS FOR IMAGE DEN...ALEXANDER FRACTIONAL INTEGRAL FILTERING OF WAVELET COEFFICIENTS FOR IMAGE DEN...
ALEXANDER FRACTIONAL INTEGRAL FILTERING OF WAVELET COEFFICIENTS FOR IMAGE DEN...sipij
 
Comparative study of results obtained by analysis of structures using ANSYS, ...
Comparative study of results obtained by analysis of structures using ANSYS, ...Comparative study of results obtained by analysis of structures using ANSYS, ...
Comparative study of results obtained by analysis of structures using ANSYS, ...IOSR Journals
 
cis98010
cis98010cis98010
cis98010perfj
 

Similaire à Edge tenacity in cycles and complete (20)

EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHS
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHSEDGE-TENACITY IN CYCLES AND COMPLETE GRAPHS
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHS
 
STATE SPACE GENERATION FRAMEWORK BASED ON BINARY DECISION DIAGRAM FOR DISTRIB...
STATE SPACE GENERATION FRAMEWORK BASED ON BINARY DECISION DIAGRAM FOR DISTRIB...STATE SPACE GENERATION FRAMEWORK BASED ON BINARY DECISION DIAGRAM FOR DISTRIB...
STATE SPACE GENERATION FRAMEWORK BASED ON BINARY DECISION DIAGRAM FOR DISTRIB...
 
STATE SPACE GENERATION FRAMEWORK BASED ON BINARY DECISION DIAGRAM FOR DISTRIB...
STATE SPACE GENERATION FRAMEWORK BASED ON BINARY DECISION DIAGRAM FOR DISTRIB...STATE SPACE GENERATION FRAMEWORK BASED ON BINARY DECISION DIAGRAM FOR DISTRIB...
STATE SPACE GENERATION FRAMEWORK BASED ON BINARY DECISION DIAGRAM FOR DISTRIB...
 
A NEW PARALLEL ALGORITHM FOR COMPUTING MINIMUM SPANNING TREE
A NEW PARALLEL ALGORITHM FOR COMPUTING MINIMUM SPANNING TREEA NEW PARALLEL ALGORITHM FOR COMPUTING MINIMUM SPANNING TREE
A NEW PARALLEL ALGORITHM FOR COMPUTING MINIMUM SPANNING TREE
 
A NEW PARALLEL ALGORITHM FOR COMPUTING MINIMUM SPANNING TREE
A NEW PARALLEL ALGORITHM FOR COMPUTING MINIMUM SPANNING TREEA NEW PARALLEL ALGORITHM FOR COMPUTING MINIMUM SPANNING TREE
A NEW PARALLEL ALGORITHM FOR COMPUTING MINIMUM SPANNING TREE
 
METRIC DIMENSION AND UNCERTAINTY OF TRAVERSING ROBOTS IN A NETWORK
METRIC DIMENSION AND UNCERTAINTY OF TRAVERSING ROBOTS IN A NETWORKMETRIC DIMENSION AND UNCERTAINTY OF TRAVERSING ROBOTS IN A NETWORK
METRIC DIMENSION AND UNCERTAINTY OF TRAVERSING ROBOTS IN A NETWORK
 
COMPARATIVE STUDY ON BENDING LOSS BETWEEN DIFFERENT S-SHAPED WAVEGUIDE BENDS ...
COMPARATIVE STUDY ON BENDING LOSS BETWEEN DIFFERENT S-SHAPED WAVEGUIDE BENDS ...COMPARATIVE STUDY ON BENDING LOSS BETWEEN DIFFERENT S-SHAPED WAVEGUIDE BENDS ...
COMPARATIVE STUDY ON BENDING LOSS BETWEEN DIFFERENT S-SHAPED WAVEGUIDE BENDS ...
 
International journal of applied sciences and innovation vol 2015 - no 1 - ...
International journal of applied sciences and innovation   vol 2015 - no 1 - ...International journal of applied sciences and innovation   vol 2015 - no 1 - ...
International journal of applied sciences and innovation vol 2015 - no 1 - ...
 
Comparative Report Ed098
Comparative Report Ed098Comparative Report Ed098
Comparative Report Ed098
 
E010632226
E010632226E010632226
E010632226
 
Modelling Quantum Transport in Nanostructures
Modelling Quantum Transport in NanostructuresModelling Quantum Transport in Nanostructures
Modelling Quantum Transport in Nanostructures
 
Signature analysis of cracked cantilever beam
Signature analysis of cracked cantilever beamSignature analysis of cracked cantilever beam
Signature analysis of cracked cantilever beam
 
Signature analysis of cracked cantilever beam
Signature analysis of cracked cantilever beamSignature analysis of cracked cantilever beam
Signature analysis of cracked cantilever beam
 
An analysis between exact and approximate algorithms for the k-center proble...
An analysis between exact and approximate algorithms for the  k-center proble...An analysis between exact and approximate algorithms for the  k-center proble...
An analysis between exact and approximate algorithms for the k-center proble...
 
Large variance and fat tail of damage by natural disaster
Large variance and fat tail of damage by natural disasterLarge variance and fat tail of damage by natural disaster
Large variance and fat tail of damage by natural disaster
 
OTP, Phishing, QR code, Shares, Visual Cryptography.
OTP, Phishing, QR code, Shares, Visual Cryptography.OTP, Phishing, QR code, Shares, Visual Cryptography.
OTP, Phishing, QR code, Shares, Visual Cryptography.
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
ALEXANDER FRACTIONAL INTEGRAL FILTERING OF WAVELET COEFFICIENTS FOR IMAGE DEN...
ALEXANDER FRACTIONAL INTEGRAL FILTERING OF WAVELET COEFFICIENTS FOR IMAGE DEN...ALEXANDER FRACTIONAL INTEGRAL FILTERING OF WAVELET COEFFICIENTS FOR IMAGE DEN...
ALEXANDER FRACTIONAL INTEGRAL FILTERING OF WAVELET COEFFICIENTS FOR IMAGE DEN...
 
Comparative study of results obtained by analysis of structures using ANSYS, ...
Comparative study of results obtained by analysis of structures using ANSYS, ...Comparative study of results obtained by analysis of structures using ANSYS, ...
Comparative study of results obtained by analysis of structures using ANSYS, ...
 
cis98010
cis98010cis98010
cis98010
 

Plus de ijfcstjournal

ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...
ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...
ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...ijfcstjournal
 
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLING
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLINGA SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLING
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLINGijfcstjournal
 
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLES
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLESA COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLES
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLESijfcstjournal
 
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...ijfcstjournal
 
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...ijfcstjournal
 
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...ijfcstjournal
 
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...ijfcstjournal
 
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDINGAN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDINGijfcstjournal
 
EAGRO CROP MARKETING FOR FARMING COMMUNITY
EAGRO CROP MARKETING FOR FARMING COMMUNITYEAGRO CROP MARKETING FOR FARMING COMMUNITY
EAGRO CROP MARKETING FOR FARMING COMMUNITYijfcstjournal
 
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEM
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEMCOMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEM
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEMijfcstjournal
 
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMSPSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMSijfcstjournal
 
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...ijfcstjournal
 
A MUTATION TESTING ANALYSIS AND REGRESSION TESTING
A MUTATION TESTING ANALYSIS AND REGRESSION TESTINGA MUTATION TESTING ANALYSIS AND REGRESSION TESTING
A MUTATION TESTING ANALYSIS AND REGRESSION TESTINGijfcstjournal
 
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...ijfcstjournal
 
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCHA NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCHijfcstjournal
 
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKS
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKSAGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKS
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKSijfcstjournal
 
International Journal on Foundations of Computer Science & Technology (IJFCST)
International Journal on Foundations of Computer Science & Technology (IJFCST)International Journal on Foundations of Computer Science & Technology (IJFCST)
International Journal on Foundations of Computer Science & Technology (IJFCST)ijfcstjournal
 
AN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESAN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESijfcstjournal
 
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...ijfcstjournal
 
A STATISTICAL COMPARATIVE STUDY OF SOME SORTING ALGORITHMS
A STATISTICAL COMPARATIVE STUDY OF SOME SORTING ALGORITHMSA STATISTICAL COMPARATIVE STUDY OF SOME SORTING ALGORITHMS
A STATISTICAL COMPARATIVE STUDY OF SOME SORTING ALGORITHMSijfcstjournal
 

Plus de ijfcstjournal (20)

ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...
ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...
ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...
 
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLING
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLINGA SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLING
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLING
 
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLES
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLESA COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLES
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLES
 
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...
 
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
 
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
 
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
 
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDINGAN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
 
EAGRO CROP MARKETING FOR FARMING COMMUNITY
EAGRO CROP MARKETING FOR FARMING COMMUNITYEAGRO CROP MARKETING FOR FARMING COMMUNITY
EAGRO CROP MARKETING FOR FARMING COMMUNITY
 
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEM
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEMCOMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEM
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEM
 
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMSPSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
 
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...
 
A MUTATION TESTING ANALYSIS AND REGRESSION TESTING
A MUTATION TESTING ANALYSIS AND REGRESSION TESTINGA MUTATION TESTING ANALYSIS AND REGRESSION TESTING
A MUTATION TESTING ANALYSIS AND REGRESSION TESTING
 
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...
 
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCHA NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
 
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKS
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKSAGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKS
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKS
 
International Journal on Foundations of Computer Science & Technology (IJFCST)
International Journal on Foundations of Computer Science & Technology (IJFCST)International Journal on Foundations of Computer Science & Technology (IJFCST)
International Journal on Foundations of Computer Science & Technology (IJFCST)
 
AN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESAN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMES
 
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
 
A STATISTICAL COMPARATIVE STUDY OF SOME SORTING ALGORITHMS
A STATISTICAL COMPARATIVE STUDY OF SOME SORTING ALGORITHMSA STATISTICAL COMPARATIVE STUDY OF SOME SORTING ALGORITHMS
A STATISTICAL COMPARATIVE STUDY OF SOME SORTING ALGORITHMS
 

Dernier

ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfRagavanV2
 
Vivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design SpainVivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design Spaintimesproduction05
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLManishPatel169454
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringmulugeta48
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICSUNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICSrknatarajan
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 

Dernier (20)

ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
Vivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design SpainVivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design Spain
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICSUNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 

Edge tenacity in cycles and complete

  • 1. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.5, No.2, March 2015 DOI:10.5121/ijfcst.2015.5203 29 EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHS Abolfazl Javan, Mina Akhavan, Ali Moeini and Dara Moazzami Department of Algorithms and Computation, Faculty of Engineering Science, School of Engineering, University of Tehran, Tehran, Iran ABSTRACT It is well known that the tenacity is a proper measure for studying vulnerability and reliability in graphs. Here, a modified edge-tenacity of a graph is introduced based on the classical definition of tenacity. Properties and bounds for this measure are introduced; meanwhile edge-tenacity is calculated for cycle graphs and also for complete graphs. KEYWORDS Graph, Edge Tenacity 1. INTRODUCTION Since that network components may be destroyed, it is necessary to study networks vulnerability. So far various criteria have been presented to measure the vulnerability and reliability of networks [9]. All measures have been based on that how the loss of part of the graph (vertices or edges) will affect the graph structure in the worst case. For example, vertex-connectivity is the minimum number of vertices whose removal disconnects the graph and edge-connectivity is the smallest number of edges whose removal disconnects the graph. Integrity [7] and Toughness [8] is two other measures for calculating network vulnerability. For the first time graph tenacity is studied by Cozzens, Moazzami and Stueckle [2, 3]. Cozzens et al. introduced two measures of network vulnerability. One of them is the tenacity (T(G)) that is introduced for studying vertex vulnerability. The other is the measure that is called mix-tenacity by Moazzami and has been used for studying edge vulnerability. In [4] Moazzami studied integrity, connectivity, toughness and tenacity in some graphs. His results showed that tenacity is a better measure for studying vulnerability and reliability in the most graphs. The vertex tenacity of a graph called Tv(G) is defined as: Vertex Tenacity: } )( )( {min)( )( AG AGA GT GVA v       (1) where A is a subset V(G) the set of all vertices of the graph G, τ(G − A) is the number of vertices in the largest component of (G − A) and ω(G − A) is the number of components of (G − A). Also mix-tenacity is defined as:
  • 2. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.5, No.2, March 2015 30 Mixed Tenacity: } )( )( {min)( )( AG AGA GT GEA m       (2) where A is a subset of E(G), the set of all edges of the graph G, τ(G − A) is the number of vertices in the largest component of G-A and ω(G − A) is the number of components of (G − A). In [5, 6] Piazza et al. used (2) as edge-tenacity but this vulnerability measure is the combination of edges subset ( )(GEA  ) and the number of vertices in the largest component (τ (G − A)). It is visible that in Tm (Mix-tenacity) the number of removed edges is added to the number of vertices in a largest component of the remaining graph. In this definition both edges and vertices are involved which is not rational. To eliminate this weakness, Moazzami and Salehian [1] presented a new measure and named it edge-tenacity that in new one just edges are involved. Edge-tenacity is defined as: Edge Tenacity: } )( )( {min)( )( AG AGA GT GEA e       (3) where A is a subset of E(G), the set of all edges of the graph G, τ(G − A) is the number of edges in the largest component of (G − A) and ω(G − A) is the number of components of (G − A). 2. EDGE-TENACITY OF SOME SPECIAL GRAPHS Here, we calculate precisely the edge-tenacity for complete graphs and cycle graphs based on (3). Theorem 1: If Cn be the cycle graph with n vertices, then . Proof: Suppose that the number of edges and vertices in Cn are |E|=m and |V|=n respectively. We know that the number of edges and vertices in Cn are equal (m=n). Also it can be easily understood that with removing ω edges, (ω >0), ω components remain in the graph, where ω is a constant. Based on (3) to determine the minimum value of Te, the numerator of the fraction ω + τ(G − ω) must become minimum. Since τ(G − ω) is the number of edges in the largest component then for getting the minimum value of Te, it is necessary to distribute |E| − ω edges between ω components equally. Therefore Te is as: }.1min}min)( 11                                               mm CT mm ne (4) Since |E|=m is constant, it needs that ω changes between 1 to m. Based on (4) one easily conclude that in this range, the minimum value of Te will achieve when ω is maximum, namely n (m=n). Therefore, Te is calculated as:
  • 3. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.5, No.2, March 2015 31 111)(              n n nn m m mm CT ne . (5) Theorem 2: If Kn is a complete graph with n vertices, then . 2 1 )(   n KT ne (6) For calculation of the edge-tenacity in a complete graph, we first prove some lemmas and then edge-tenacity is calculated. Lemma 1: The edge-tenacity for the complete graph Kn is calculated in the case that the generated components after removing edges are all complete subgarphs. Proof: The proof is based on contradiction. Suppose that the edge-tenacity for the complete graph is calculated in the case that at least one of the generated components is not a complete subgraph. Therefore, this component has at least one edge less than the complete graph. By adding this edge to the component if the component is the largest component of the graph, the number of removed edges will be one less and the number of edges of the largest component will be one more that finally does not have any effect on obtaining the edge-tenacity. Also, by adding the removed edge to the component if the component is not the largest one in the graph, the number of removed edges is decreased by one. It means the new value of edge-tenacity is less than the assumed value which contradicts with the assumption of the theorem. Therefore, we can conclude that in order to calculate the edge-tenacity of a complete graph, all generated components of it, after removing edges, can be considered complete. Lemma 2: Assume that it is supposed to distribute n vertices between ω complete components. The ith component has ci vertices so that   nccc ,...0 21 (7) Where ci is the number of allocated vertices to ith component that 1≤i≤ ω. The maximum value of the total number of edges for all complete components which can be stated by the following equation        1 2i ic , (8) Occurs when the following conditions are satisfied: 1,11,1    ncici (9)
  • 4. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.5, No.2, March 2015 32 (Note that       2 ic is the number of edges of ith complete component and therefore (8) is the total number of edges for all complete components) Proof: The proof is based on contradiction. Suppose that there exists an integer called k which makes the value in expression (8) maximum such that ck>1, k< ω. It is known that 22 )1( 2 )1( 22 22  cccccccccc kkkkk                  , (10) If ck>1 then due to (7) cω>1 and in consequence we have 0)1)(1(  kcc (11) By inserting the above in (10) we have . 2 1 2 )2)(1( 2 2222 )1)(1( 2222 22 2222                             k kkkkkk k kkkkk cc cccccccccccc cc cccccccccc     (12) Rearranging (8) using (12) yields . 2 1 2 1 22 22222 1 1 1 1 1 1 1 11                                                                                                  cccc ccccc kj j k i i kj jk k i i i i (13) The right side of (13) is the total number of edges for all complete components in the case that pick (ck−1) vertices from kth component and place them to ωth component. Therefore, the number of edges of kth component will be       2 1 and the number of edges of ωth component will be        2 1 cc . In other word, picking (ck−1) vertices from kth component and placing them to ωth component makes (8) greater. So (13) contradicts with the assumption that (8) reaches to its maximum value with the above k. Finally, it can be concluded that the maximum value of (8) occurs when the condition (9) is satisfied.
  • 5. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.5, No.2, March 2015 33 Lemma 3: Assume that it is supposed to distribute n vertices between ω complete components. The ith component has ci vertices so that   nccc ,...0 21 (14) Where ci is the number of allocated vertices to ith component that 1≤i≤ ω. Therefore the minimum value of (15)                          222 1   ccn i i (15) Occurs when vertices are placed based on (16).                  1)2,mod(21,1, 2 3 , 2 1 0)2,mod(21,1, 2 2 1 1       nific n c n c nific n cc i i (16) Proof: Rearranging (15) yields , 22222 1 11                                          i i i i cnccn (17) Where n is constant. To minimize (17), the value of         1 1 2  i ic should be maximum. According to Lemma 3, this occurs when vertices are placed based on the following arrangement. 1)1()(,21,1 1     cncici . (18) To maximize the value of         1 1 2  i ic , cω-1 should be maximum. It is assumed that n and ω are constants. So, cω, which must satisfy (14), should be minimal. Therefore, each of the ,1ic ,21  i must take one vertex and the remaining vertices distribute almost equally between cω-1 and cω. If n+ω is even, then the number of remaining vertices namely n−ω+2 is even too. Because (n+ω) + (n−ω+2) = 2n+2 is even. In this case, cω-1 and cω should take the same value. If n+ω is odd, then the value of cω should be one more than cω-1. Now we return to the proof of Theorem 2. Proof: First, it is assumed that ω be the number of generated components. To minimize the edge- tenacity with respect to ω, it is enough to minimize the numerator of the fraction of (3).
  • 6. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.5, No.2, March 2015 34 Based on Lemma 1, the numerator of (3) can be rearranged as follows:                          222 )( 1    ccn f i i (19) Based on lemma 3, we have ,1ic 21  i . Therefore, (19) can be written in a simpler form as follows:              22)( 1  cnf . (20) If n+ω is even, then based on (16) edge tenacity will be calculated as follows: . 4 1 88 63 8 22244 2 ))(2( 4 1 )1(2 2 2 2 ),( 2222                         nnnnnnnn nnnn n n KT ne         (21) We are looking for the proper value of ω to minimize ),( ne KT . We note in (21) that the value of nn 63 2  is positive for all value of n where n>1, so by increasing the value of ω, ),( ne KT will decrease. Therefore, ),( ne KT will be minimal where ω achieves its maximum value. It should be noted that the maximum value of ω is n. Therefore, the edge-tenacity is as follows:   . 2 12 ),(min)(          n n n KTKT nene   (22) If n+ω is odd, based on (16) the edge-tenacity will be calculated as follows: . 488 143 8 1244 2 )1)(1( 4 1 )1(2 2 1 2 ),( 2222 nnnnnnn nnnn n n KT ne                                (23)
  • 7. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.5, No.2, March 2015 35 We are looking for the proper value of ω to minimize ),( ne KT . We note in (23) that the value of 143 2  nn is positive for all value of n where n>1, so, by increasing the value of ω, ),( ne KT will decrease. Therefore, ),( ne KT will be minimal where ω achieves its maximum value. It should be noted that the maximum value of ω is n. By considering ω=n, the value of ω+n will be even and we can use the result value of (22) which is 2 1n . 3. CONCLUSION In this paper, edge-tenacities of two classes of graphs are calculated. For calculating the edge tenacity of these classes, first the function in conventional edge-tenacity formula, which is supposed to be minimized, is calculated for constant number of components. Second a function with respect to the number of components and the size of components. It is shown that the size of components is a constant value and the above function may be considered as a one-variable function. This variable is just the number of components. Finding minimum of this one-variable function is well known. Our approach may be useful for calculation of tenacity and toughness in various classes of graphs. REFERENCES [1] D. Moazzami, B. Salehian, On the Edge-Tenacity of Graphs, International Mathematical Forum, 3, (2008), no. 19, 929 – 936. [2] M.B. Cozzens, D. Moazzami, S. Stueckle, The tenacity of the Harary Graphs, J. Combin. Math. Combin. Comput. 16 (1994), 33-56. [3] M.B. Cozzens, D. Moazzami, S. Stueckle, The tenacity of a graph, Graph Theory, Combinatorics, and Algorithms (Yousef Alavi and Allen Schwenkeds.) Wiley, New York, (1995), 1111-1112. [4] D. Moazzami, Vulnerability in Graphs - a Comparative Survey, J. Combin. Math. Combin. Comput. 30, (1999), 23-31. [5] B. Piazza, F. Roberts, S. Stueckle, Edge-tenacious networks, Networks 25, (1995), no. 1, 7-17. [6] B. Piazza, S. Stueckle, A lower bound for edge-tenacity, Proceedings of the thirtieth Southeastern International Conference on Combinatorics, Graph Theory, and Computing (Boca Raton, FL, 1999) Congr. Numer. 137, (1999), 193-196. [7] K. S. Baggas, L. W. Beineke,W.D. Goddard, M. J. Lipman and R. E. Pippert, a survey of integrity, Discrete Applied Math. 37/38, 1992, 13-28. [8] W. D. Goddard and Henda C. Swart, On the toughness of a graph, Quaestiones Mathematicae 13 (1990), 217-232. [9] C. A. Barefoot, R. Entringer and H. Swart, Vulnerability in graphs - A comparative survey, J. Combin. Math. Combin. Comput. 1, 1987, 13-22. Authors Abolfazl Javan: He received his B.Sc. in Software Engineering from Ferdowsi University of Mashhad, Mashhad, Iran, and M.Sc. degree in Algorithms and Computation from University of Tehran, Tehran, Iran. He is currently a research assistant at University of Tehran. His research interests include Graphs Theory, Randomized Algorithms, Approximation Algorithms, and Bioinformatics.
  • 8. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.5, No.2, March 2015 36 Mina Akhavan: She received her B.Sc. in Software Engineering from Shahid Beheshti University, Tehran, Iran, and M.Sc. degree in Algorithms and Computation from University of Tehran, Tehran, Iran. Her research interests include Graphs Theory, Cloud Computing, and Bioinformatics. Ali Moeini: He received his Ph.D. in Nonlinear Systems at the University of Sussex, UK, in 1997. He is an Associate Professor of Electrical & Computer Engineering at Faculty of Engineering Science, School of Engineering, the University of Tehran, and ad joint Professor at Department of Information Technology Management, Faculty of Management, the University of Tehran in Iran. His research interests include Formal Methods in Knowledge and Software Engineering and Knowledge Management, Soft computing Methods, Randomized Algorithms, Approximation Algorithms, and Bioinformatics. He has published many papers in Journals and Conferences on the above mentioned topics. Dara Moazzami: He is a theoretical computer scientist, Professor of Mathematics at University of Tehran. He received a PhD in Applied Mathematics from the University of Northeastern- Boston MA. U.S.A. in 1992, and a B.Sc. in Pure Mathematics in 1976, and M.Sc. in Applied Mathematics in 1978, from University of Quebec– Montreal Canada. He has been on the faculty of University of Tehran since 1993, Deputy of Undergraduate and Graduate studies, Department of Engineering Basic Science in 2006-2008, and Chairman of Department of Engineering Science, 2009-present. He is Editor-in-Chief Journal of Algorithms and Computation. His research area is in algorithms and complexity theory, specifically Vulnerability in Networks and tenacity parameter.