Edge-Neighbor-Rupture Degree of Graphs

0 downloads 0 Views 2MB Size Report
Aug 3, 2013 - Turgutlu Vocational Training School, Celal Bayar University, Turgutlu, 45400 Manisa, Turkey. Correspondence should be addressed to ErsinΒ ...
Hindawi Publishing Corporation Journal of Applied Mathematics Volume 2013, Article ID 783610, 5 pages http://dx.doi.org/10.1155/2013/783610

Research Article Edge-Neighbor-Rupture Degree of Graphs Ersin Aslan Turgutlu Vocational Training School, Celal Bayar University, Turgutlu, 45400 Manisa, Turkey Correspondence should be addressed to Ersin Aslan; [email protected] Received 22 April 2013; Accepted 3 August 2013 Academic Editor: Frank Werner Copyright Β© 2013 Ersin Aslan. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. The edge-neighbor-rupture degree of a connected graph 𝐺 is defined to be ENR(𝐺) = max{πœ”(𝐺 βˆ’ 𝑆) βˆ’ |𝑆| βˆ’ π‘š(𝐺 βˆ’ 𝑆) : 𝑆 βŠ† 𝐸(𝐺), πœ”(𝐺 βˆ’ 𝑆) β‰₯ 1}, where 𝑆 is any edge-cut-strategy of 𝐺, πœ”(𝐺 βˆ’ 𝑆) is the number of the components of 𝐺 βˆ’ 𝑆, and π‘š(𝐺 βˆ’ 𝑆) is the maximum order of the components of πΊβˆ’π‘†. In this paper, the edge-neighbor-rupture degree of some graphs is obtained and the relations between edge-neighbor-rupture degree and other parameters are determined.

1. Introduction In a communication network, the vulnerability measures the resistance of the network to disruption of operation after the failure of certain stations or communication links. To measure the vulnerability we have some parameters which are connectivity [1], integrity [2], scattering number [3], and rupture degree [4]. A spy network can be modeled by a graph whose vertices represent the stations and whose edges represent the lines of communication. If a station is destroyed, the adjacent stations will be betrayed so that the betrayed stations become useless to network as a whole [5]. Therefore, instead of considering the stability of a communication network in standard sense, some new graph parameters such as vertex-neighbor-connectivity [6] and edge-neighborconnectivity [7], vertex-neighbor-integrity [8] and edgeneighbor-integrity [9], vertex-neighbor-scattering number [10] and edge-neighbor-scattering number [11], and vertexneighbor-rupture degree [12] were introduced to measure the stability of communication networks in β€œneighbor” sense. We use Bondy and Murty [1] for terminology and notation not defined here and consider only finite simple connected graphs. Let 𝐺 = (𝑉, 𝐸) be a graph and 𝑒 any edge in 𝐺. The diameter of 𝐺, denoted by diam(𝐺), is the maximum distance over all pairs of vertices in 𝐺. 𝑁(𝑒) = {𝑓 ∈ 𝐸(𝐺) | 𝑓 =ΜΈ 𝑒; 𝑒 and𝑓are adjacent} is the open-edge-neighborhood of 𝑒, and 𝑁[𝑒] = 𝑁(𝑒) βˆͺ {𝑒} is the closed-edge-neighborhood of 𝑒. An edge 𝑒 in 𝐺 is said to be

subverted when 𝑁[𝑒] is deleted from 𝐺. In other words, if 𝑒 = [𝑒, V], 𝐺 βˆ’ 𝑁[𝑒] = 𝐺 βˆ’ {𝑒, V}. A set of edges 𝑆 is called an edge subversion strategy of 𝐺 if each of the edges in 𝑆 has been subverted from 𝐺. The survival subgraph is denoted by 𝐺 βˆ’ 𝑆. An edge subversion strategy 𝑆 is called an edge-cut-strategy of 𝐺 if the survival subgraph πΊβˆ’π‘† is disconnected or is a single vertex or the empty graph [13]. The edge-neighbor-connectivity of 𝐺, Ξ›(𝐺), is the minimum size of all edge-cut-strategies of 𝐺. A graph 𝐺 is m-edgeneighbor-connected if Ξ›(𝐺) = π‘š [7]. The edge-neighbor-integrity of a graph 𝐺, ENI(𝐺), is defined to be ENI (𝐺) = min {|𝑆| + π‘š (𝐺 βˆ’ 𝑆)} , π‘†βŠ†πΈ(𝐺)

(1)

where 𝑆 is any edge subversion strategy of 𝐺 and π‘š(𝐺 βˆ’ 𝑆) is maximum order of the components of 𝐺 βˆ’ 𝑆 [9]. The edge-neighbor-scattering number of 𝐺, ENS(𝐺), is defined as ENS (𝐺) = max {πœ” (𝐺 βˆ’ 𝑆) βˆ’ |𝑆|} , π‘†βŠ†πΈ(𝐺)

(2)

where 𝑆 is any edge-cut-strategy of 𝐺 and πœ”(𝐺 βˆ’ 𝑆) is the number of the components of 𝐺 βˆ’ 𝑆 [11]. The known parameters concerning the neighborhoods do not deal with the number of the removing edges, the number of the components, and the number of the vertices in the largest component of the remaining graph in a disrupted network simultaneously. In order to fill this void

2

Journal of Applied Mathematics

G1

G2

(a)

(b)

Figure 1: The graphs 𝐺1 and 𝐺2 .

in the literature, the current study proposes a definition of edge-neighbor-rupture degree which is a new parameter concerning these three values. Additionally, this study also analyzes the relations between edge-neighbor-rupture degree and some other parameters and obtains edge-neighborrupture degree of some graphs. The edge-neighbor-rupture degree of a connected graph 𝐺 is defined to be ENR (𝐺) = max {πœ” (𝐺 βˆ’ 𝑆) βˆ’ |𝑆| βˆ’ π‘š (𝐺 βˆ’ 𝑆) : 𝑆 βŠ† 𝐸 (𝐺) , πœ” (𝐺 βˆ’ 𝑆) β‰₯ 1} , (3) where 𝑆 is any edge-cut-strategy of 𝐺, πœ”(𝐺 βˆ’ 𝑆) is the number of the components of 𝐺 βˆ’ 𝑆, and π‘š(𝐺 βˆ’ 𝑆) is the maximum order of the components of πΊβˆ’π‘†. A set π‘†βˆ— βŠ† 𝐸(𝐺) is said to be the ENR-set of 𝐺 if ENR(𝐺) = πœ”(𝐺 βˆ’ π‘†βˆ— ) βˆ’ | π‘†βˆ— | βˆ’ π‘š(𝐺 βˆ’ π‘†βˆ— ). The edge-neighbor-rupture degree differs from edgeneighbor-connectivity, edge-neighbor-integrity, and edgeneighbor-scattering number in showing the vulnerability of networks. For example, consider the graphs 𝐺1 and 𝐺2 in Figure 1. It can be easily seen that the edge-neighbor-connectivity, edge-neighbor-integrity, and edge-neighbor-scattering number of these graphs are equal: Ξ› (𝐺1 ) = Ξ› (𝐺2 ) = 1, ENI (𝐺1 ) = ENI (𝐺2 ) = 4,

On the other hand, the edge-neighbor-rupture degrees of 𝐺1 and 𝐺2 are different:

ENR (𝐺2 ) = 2.

In this section some lower and upper bounds are given for the edge-neighbor-rupture degree of a graph using different graph parameters. Theorem 1. Let 𝐺 be a connected graph of order 𝑛. Then, ENR (𝐺) ≀ 𝑛 βˆ’ 4.

(5)

Hence, the edge-neighbor-rupture degree is a better parameter for distinguishing vulnerability of graphs 𝐺1 and 𝐺2 .

(6)

Proof. Let 𝑆 be an edge-cut-strategy of 𝐺 and |𝑆| = π‘Ÿ. If π‘Ÿ β‰₯ 1, then πœ”(𝐺 βˆ’ 𝑆) ≀ 𝑛 βˆ’ 2 and π‘š(𝐺 βˆ’ 𝑆) β‰₯ 1. Therefore, πœ” (𝐺 βˆ’ 𝑆) βˆ’ |𝑆| βˆ’ π‘š (𝐺 βˆ’ 𝑆) ≀ 𝑛 βˆ’ 2 βˆ’ 1 βˆ’ 1.

(7)

Hence we have ENR (𝐺) ≀ 𝑛 βˆ’ 4.

(8)

The proof is completed. Theorem 2. Let 𝐺 be a connected graph of order 𝑛, and let 𝛼(𝐺), Ξ›(𝐺) be the independent number and edge-neighborconnectivity of 𝐺, respectively. Then, ENR (𝐺) ≀ 𝛼 (𝐺) βˆ’ Ξ› (𝐺) βˆ’ 1.

(9)

Proof. Let 𝑆 be an edge-cut-strategy of 𝐺. For any 𝑆 of 𝐺, |𝑆| β‰₯ Ξ›(𝐺), πœ”(𝐺 βˆ’ 𝑆) ≀ 𝛼(𝐺), and π‘š(𝐺 βˆ’ 𝑆) β‰₯ 1. Hence we get ENR (𝐺) ≀ 𝛼 (𝐺) βˆ’ Ξ› (𝐺) βˆ’ 1.

(4)

ENS (𝐺1 ) = ENS (𝐺2 ) = 4.

ENR (𝐺1 ) = 1,

2. Bounds for Edge-Neighbor-Rupture Degree

(10)

The proof is completed. Theorem 3. Let 𝐺 be a connected graph of order 𝑛 β‰₯ 3. If ENR(𝐺) = 𝑛 βˆ’ 4; then diam(𝐺) ≀ 3. Proof. Assume that diam(𝐺) β‰₯ 4; then 𝐺 contains a path 𝑃5 . Thus for any edge 𝑒 in 𝐺, πœ”(𝐺 βˆ’ 𝑆) ≀ 𝑛 βˆ’ 2, π‘š(𝐺 βˆ’ {𝑒}) β‰₯ 2, and for any two edges 𝑒1 and 𝑒2 in 𝐺, πœ”(𝐺 βˆ’ 𝑒) ≀ 𝑛 βˆ’ 2, π‘š(𝐺 βˆ’ {𝑒𝑙 , 𝑒2 }) β‰₯ 1. Therefore ENR (𝐺) ≀ 𝑛 βˆ’ 5, a contradiction. Hence diam(𝐺) ≀ 3. The proof is completed.

(11)

Journal of Applied Mathematics

3

Theorem 4. Let 𝐺 be a connected graph of order 𝑛 and 𝛼󸀠 (𝐺) edge independence number of 𝐺. Then, ENR (𝐺) ≀ 𝑛 βˆ’ 3𝛼󸀠 (𝐺) βˆ’ 1.

Proof. Let 𝑆 be an edge-cut-strategy of 𝐢𝑛 and |𝑆| = π‘Ÿ. If π‘Ÿ ≀ βŒŠπ‘›/3βŒ‹, then πœ”(𝐢𝑛 βˆ’ 𝑆) ≀ π‘Ÿ and π‘š(𝐢𝑛 βˆ’ 𝑆) β‰₯ ⌈(𝑛 βˆ’ 2π‘Ÿ)/π‘ŸβŒ‰. Thus

(12)

πœ” (𝐢𝑛 βˆ’ 𝑆) βˆ’ |𝑆| βˆ’ π‘š (𝐢𝑛 βˆ’ 𝑆) ≀ π‘Ÿ βˆ’ π‘Ÿ βˆ’ ⌈

Proof. Let 𝑆 be an edge-cut-strategy of 𝐺. If |𝑆| = 𝛼󸀠 (𝐺), then 𝐺 βˆ’ 𝑆 contains 𝑛 βˆ’ 2𝛼󸀠 (𝐺) isolated vertices and π‘š(𝐺 βˆ’ 𝑆) β‰₯ 1. From the definition of edge neighbor rupture degree we have

𝑛 βˆ’ 2π‘Ÿ ENR (𝐢𝑛 ) ≀ max {⌈ βŒ‰} , π‘Ÿ π‘Ÿ

ENR (𝐺) ≀ 𝑛 βˆ’ 3𝛼󸀠 (𝐺) βˆ’ 1.

(13)

The proof is completed.

In this section, we consider the edge-neighbor-rupture degree of some graphs. Theorem 5. Let 𝑃𝑛 be a path with order 𝑛(β‰₯ 4). Then ENR (𝑃𝑛 ) = {

0, βˆ’ 1,

𝑛 ≑ 1 (mod 3) , 𝑛 ≑ 0, 2 (mod 3) .

Proof. Let 𝑆 be an edge-cut-strategy of 𝑃𝑛 and |𝑆| = π‘Ÿ. If π‘Ÿ ≀ ⌊(𝑛 βˆ’ 1)/3βŒ‹, then πœ”(𝑃𝑛 βˆ’ 𝑆) ≀ π‘Ÿ + 1 and π‘š(𝑃𝑛 βˆ’ 𝑆) β‰₯ ⌈(𝑛 βˆ’ 2π‘Ÿ)/(π‘Ÿ + 1)βŒ‰. Thus 𝑛 βˆ’ 2π‘Ÿ βŒ‰ πœ” (𝑃𝑛 βˆ’ 𝑆) βˆ’ |𝑆| βˆ’ π‘š (𝑃𝑛 βˆ’ 𝑆) ≀ π‘Ÿ + 1 βˆ’ π‘Ÿ βˆ’ ⌈ π‘Ÿ+1 {1 βˆ’ ⌈ ENR (𝑃𝑛 ) ≀ max π‘Ÿ

𝑛 βˆ’ 2π‘Ÿ βŒ‰} , π‘Ÿ+1

(15)

the function 𝑓(π‘Ÿ) takes its maximum value at π‘Ÿ = ⌊(𝑛 βˆ’ 1)/3βŒ‹, and we get ENR(𝑃𝑛 ) ≀ βˆ’1 where 𝑛 ≑ 0, 2 (Mod 3) and ENR(𝑃𝑛 ) ≀ 0 where 𝑛 ≑ 1 (Mod 3). So, we have 0, 𝑛 ≑ 1 (mod 3) , ENR (𝑃𝑛 ) ≀ { βˆ’1, 𝑛 ≑ 0, 2 (mod 3) .

(16)

On the other hand, if π‘Ÿ β‰₯ ⌊(𝑛 βˆ’ 1)/3βŒ‹ + 1, then we have πœ”(𝑃𝑛 βˆ’ 𝑆) ≀ π‘Ÿ and π‘š(𝑃𝑛 βˆ’ 𝑆) β‰₯ 1. Hence πœ” (𝑃𝑛 βˆ’ 𝑆) βˆ’ |𝑆| βˆ’ π‘š (𝑃𝑛 βˆ’ 𝑆) ≀ π‘Ÿ βˆ’ π‘Ÿ βˆ’ 1, ENR (𝑃𝑛 ) ≀ βˆ’1.

(17)

It can be easily seen that there is an edge-cut-strategy π‘†βˆ— of 𝑃𝑛 such that |π‘†βˆ— | = ⌊(π‘›βˆ’1)/3βŒ‹, πœ”(𝑃𝑛 βˆ’π‘†βˆ— ) = ⌊(π‘›βˆ’1)/3βŒ‹+1, and π‘š(𝑃𝑛 βˆ’ π‘†βˆ— ) = 2 where 𝑛 ≑ 0, 2 (Mod 3) and π‘š(𝑃𝑛 βˆ’ π‘†βˆ— ) = 1 where 𝑛 ≑ 1 (Mod 3). Therefore, ENR (𝑃𝑛 ) = {

0, 𝑛 ≑ 1 (mod 3) , βˆ’1, 𝑛 ≑ 0, 2 (mod 3) .

(18)

Theorem 6. Let 𝐢𝑛 be a cycle with order 𝑛(β‰₯ 6). Then 𝑛 ≑ 0 (mod 3) , 𝑛 ≑ 1, 2 (mod 3) .

(21)

On the other hand, if π‘Ÿ β‰₯ βŒŠπ‘›/3βŒ‹ + 1, then we have πœ”(𝐢𝑛 βˆ’ 𝑆) ≀ π‘Ÿ βˆ’ 1 and π‘š(𝐢𝑛 βˆ’ 𝑆) β‰₯ 1. Hence πœ” (𝐢𝑛 βˆ’ 𝑆) βˆ’ |𝑆| βˆ’ π‘š (𝐢𝑛 βˆ’ 𝑆) ≀ π‘Ÿ βˆ’ 1 βˆ’ π‘Ÿ βˆ’ 1

(22)

It can be easily seen that there is an edge-cut-strategy π‘†βˆ— of 𝐢𝑛 such that |π‘†βˆ— | = βŒŠπ‘›/3βŒ‹, πœ”(𝐢𝑛 βˆ’ π‘†βˆ— ) = βŒŠπ‘›/3βŒ‹, and π‘š(𝐢𝑛 βˆ’ π‘†βˆ— ) = 2 where 𝑛 ≑ 1, 2 (Mod 3) and π‘š(𝐢𝑛 βˆ’ π‘†βˆ— ) = 1 where 𝑛 ≑ 0 (Mod 3). Therefore ENR (𝐢𝑛 ) = {

βˆ’1, 𝑛 ≑ 0 (mod 3) , βˆ’2, 𝑛 ≑ 1, 2 (mod 3) .

(23)

The proof is completed by (21), (22), and (23). Lemma 7 (see [7]). For any graph 𝐺 with order 𝑛, Ξ›(𝐺) ≀ βŒŠπ‘›/2βŒ‹. Theorem 8. Let 𝐾𝑛 be a complete graph with order 𝑛. Then 𝑛 ENR (𝐾𝑛 ) = βˆ’ ⌊ βŒ‹ . 2

(24)

Proof. Let 𝑆 be an edge-cut-strategy of 𝐾𝑛 and |𝑆| = π‘Ÿ. By Lemma 7 we know Ξ›(𝐾𝑛 ) = βŒŠπ‘›/2βŒ‹. If π‘Ÿ β‰₯ βŒŠπ‘›/2βŒ‹, then πœ”(𝐾𝑛 βˆ’ 𝑆) ≀ 1 and π‘š(𝐾𝑛 βˆ’ 𝑆) β‰₯ 1. Hence, 𝑛 πœ” (𝐾𝑛 βˆ’ 𝑆) βˆ’ |𝑆| βˆ’ π‘š (𝐾𝑛 βˆ’ 𝑆) ≀ 1 βˆ’ ⌊ βŒ‹ βˆ’ 1, 2 𝑛 ENR (𝐾𝑛 ) ≀ βˆ’ ⌊ βŒ‹ . 2

(25)

It can be easily seen that there is an edge set π‘†βˆ— of 𝐾𝑛 such that |π‘†βˆ— | = βŒŠπ‘›/2βŒ‹, then we have πœ”(𝐾𝑛 βˆ’π‘†) = 1 and π‘š(𝐾𝑛 βˆ’π‘†) = 1. From the definition of edge-neighbor-rupture degree we have 𝑛 (26) ENR (𝐾𝑛 ) = βˆ’ ⌊ βŒ‹ . 2 The proof is completed.

The proof is completed by (16), (17), and (18).

βˆ’1, ENR (𝐢𝑛 ) = { βˆ’2,

βˆ’1, 𝑛 ≑ 0 (mod 3) , βˆ’2, 𝑛 ≑ 1, 2 (mod 3) .

ENR (𝐢𝑛 ) ≀ βˆ’2. (14)

(20)

the function 𝑓(π‘Ÿ) takes its maximum value at π‘Ÿ = βŒŠπ‘›/3βŒ‹, and we get ENR(𝐢𝑛 ) ≀ βˆ’1 where 𝑛 ≑ 0 (Mod 3) and ENR(𝐢𝑛 ) ≀ βˆ’2 where 𝑛 ≑ 1, 2 (Mod 3). So, we have ENR (𝐢𝑛 ) ≀ {

3. Edge-Neighbor-Rupture Degree of Some Graphs

𝑛 βˆ’ 2π‘Ÿ βŒ‰, π‘Ÿ

(19)

Definition 9. We also call 𝐾1,𝑛 a star with 𝑛 + 1 vertices. Let DS(𝑛𝑙 , 𝑛2 ) be a double star with {𝑛𝑙 , 𝑛2 } end-vertices, where 𝑛1 β‰₯ 0 and 𝑛2 β‰₯ 0, and a common edge [𝑒, V], as shown in Figure 2. Note that if either 𝑛1 or 𝑛2 is 0, then the double star DS(𝑛𝑙 , 𝑛2 ) is a star.

4

Journal of Applied Mathematics

n1 vertices

. . .

u



. . .

n2 vertices

u

Figure 2: DS(𝑛𝑙 , 𝑛2 ). Figure 3: The wheel graph π‘Š6 .

Theorem 10. Let 𝑇 be a tree of order 𝑛 β‰₯ 4. Then ENR(𝑇) = 𝑛 βˆ’ 4 if and only if 𝑇 is either a star 𝐾1,π‘›βˆ’1 or a double star DS(𝑛𝑙 , 𝑛2 ), where 𝑛1 β‰₯ 1, 𝑛2 β‰₯ 1, and 𝑛1 + 𝑛2 = 𝑛 βˆ’ 2. Proof. If 𝑇 is a tree of order 𝑛 β‰₯ 3 and ENR(𝑇) = 𝑛 βˆ’ 4, then by Theorem 3 we have either diam(𝑇) = 2 or diam(𝑇) = 3. If diam(𝑇) = 2, then 𝑇 is a star 𝐾1,π‘›βˆ’1 . If diam(𝑇) = 3, then 𝑇 is a double star DS(𝑛𝑙 , 𝑛2 ), where 𝑛1 > 0, 𝑛2 > 0, and 𝑛1 + 𝑛2 = 𝑛 βˆ’ 2. Conversely, let 𝑇 be either a star 𝐾1,π‘›βˆ’1 with the order 𝑛 β‰₯ 4 or a double star DS(𝑛𝑙 , 𝑛2 ), where 𝑛1 β‰₯ 1, 𝑛2 β‰₯ 1, and 𝑛1 + 𝑛2 + 2 = 𝑛 β‰₯ 4. If 𝑆 is an edge-cut-strategy of 𝐾1,π‘›βˆ’1 and |𝑆| = 1, then we have π‘›βˆ’2 isolated vertices. Therefore we have πœ”(π‘‡βˆ’π‘†) = π‘›βˆ’2 and π‘š(𝑇 βˆ’ 𝑆) = 1. So πœ” (𝐾1,π‘›βˆ’1 βˆ’ 𝑆) βˆ’ |𝑆| βˆ’ π‘š (𝐾1,π‘›βˆ’1 βˆ’ 𝑆) = 𝑛 βˆ’ 2 βˆ’ 1 βˆ’ 1 ENR (𝐾1,π‘›βˆ’1 ) = 𝑛 βˆ’ 4.

(27)

It can be easily seen that there is an edge-cut-strategy π‘†βˆ— of DS(𝑛𝑙 , 𝑛2 ) such that |π‘†βˆ— | = 1; then we have πœ”(DS(𝑛𝑙 , 𝑛2 ) βˆ’ π‘†βˆ— ) = 𝑛 βˆ’ 2 and π‘š(DS(𝑛𝑙 , 𝑛2 ) βˆ’ π‘†βˆ— ) = 1. So 󡄨 󡄨 πœ” (DS (𝑛𝑙 , 𝑛2 ) βˆ’ π‘†βˆ— ) βˆ’ σ΅„¨σ΅„¨σ΅„¨π‘†βˆ— 󡄨󡄨󡄨 βˆ’ π‘š (DS (𝑛𝑙 , 𝑛2 ) βˆ’ π‘†βˆ— ) = 𝑛 βˆ’ 2 βˆ’ 1 βˆ’ 1,

(28)

ENR (DS (𝑛𝑙 , 𝑛2 )) = 𝑛 βˆ’ 4. If 𝑆 is an edge set of DS(𝑛𝑙 , 𝑛2 ) and |𝑆| > 1, then we have πœ”(DS(𝑛𝑙 , 𝑛2 ) βˆ’ 𝑆) = 1 and π‘š(DS(𝑛𝑙 , 𝑛2 ) βˆ’ 𝑆) β‰₯ 2. The proof is completed. Theorem 11. Let πΎπ‘š,𝑛 be a complete bipartite graph with |π‘š βˆ’ 𝑛| β‰₯ 1. Then π‘š βˆ’ 2𝑛 βˆ’ 1, ENR (πΎπ‘š,𝑛 ) = { 𝑛 βˆ’ 2π‘š βˆ’ 1,

𝑖𝑓 π‘š > 𝑛, 𝑖𝑓 π‘š < 𝑛.

(29)

Proof. Assume π‘š > 𝑛. Let 𝑆 be an edge-cut-strategy of πΎπ‘š,𝑛 and |𝑆| = π‘Ÿ. If π‘Ÿ β‰₯ 𝑛, then πœ”(πΎπ‘š,𝑛 βˆ’ 𝑆) ≀ π‘š βˆ’ 𝑛 and π‘š(πΎπ‘š,𝑛 βˆ’ 𝑆) β‰₯ 1. Hence, πœ” (πΎπ‘š,𝑛 βˆ’ 𝑆) βˆ’ |𝑆| βˆ’ π‘š (πΎπ‘š,𝑛 βˆ’ 𝑆) ≀ π‘š βˆ’ 𝑛 βˆ’ π‘Ÿ βˆ’ 1,

(30)

the function 𝑓(π‘Ÿ) is a decreasing function and takes its maximum value at π‘Ÿ = 𝑛, and we get ENR (πΎπ‘š,𝑛 ) ≀ π‘š βˆ’ 2𝑛 βˆ’ 1.

(31)

It can be easily seen that there is an edge set π‘†βˆ— of πΎπ‘š,𝑛 such that |π‘†βˆ— | = 𝑛; then we have πœ”(πΎπ‘š,𝑛 βˆ’ 𝑆) = π‘š βˆ’ 𝑛 and π‘š(πΎπ‘š,𝑛 βˆ’π‘†) = 1. From the definition of edge neighbor rupture degree we have ENR (πΎπ‘š,𝑛 ) = π‘š βˆ’ 2𝑛 βˆ’ 1.

(32)

Similarly, we obtain ENR(πΎπ‘š,𝑛 ) = π‘›βˆ’2π‘šβˆ’1 when 𝑛 > π‘š. Finally, we have π‘š βˆ’ 2𝑛 βˆ’ 1, ENR (πΎπ‘š,𝑛 ) = { 𝑛 βˆ’ 2π‘š βˆ’ 1,

if π‘š > 𝑛, if π‘š < 𝑛.

(33)

The proof is completed. Definition 12. The wheel graph with 𝑛 spokes, π‘Šπ‘› , is the graph that consists of an n-cycle and one additional vertex, say 𝑒, that is adjacent to all the vertices of the cycle. In Figure 3, we display π‘Š6 . Theorem 13. Let π‘Šπ‘› be a wheel graph with order 𝑛(β‰₯ 5). Then βˆ’1, ENR (π‘Šπ‘› ) = { βˆ’2,

𝑛 ≑ 2 (mod 3) , 𝑛 ≑ 0, 1 (mod 3) .

(34)

Proof. The graph π‘Šπ‘› has subgraphs 𝐢𝑛 and 𝐾1,𝑛 . Let 𝑒 be any one edge of 𝐾1,𝑛 . If 𝑒 ∈ 𝑆 and |𝑆| = 1, then we get πœ”(π‘Šπ‘› βˆ’ 𝑆) = π‘ƒπ‘›βˆ’1 . So, ENR (π‘Šπ‘› ) = ENR (π‘ƒπ‘›βˆ’1 ) βˆ’ 1.

(35)

If 𝑒 βˆ‰ 𝑆 and |𝑆| = 1, then πœ”(π‘Šπ‘› βˆ’π‘†) = 1 and π‘š(π‘Šπ‘› βˆ’π‘†) β‰₯ 2. Hence, ENR (π‘Šπ‘› ) ≀ πœ” (π‘Šπ‘› βˆ’ 𝑆) βˆ’ |𝑆| βˆ’ π‘š (π‘Šπ‘› βˆ’ 𝑆) ≀ 1 βˆ’ 1βˆ’2 = βˆ’2. (36) If 𝑒 βˆ‰ 𝑆 and |𝑆| β‰₯ 2, then πœ”(π‘Šπ‘› βˆ’π‘†) = 1 and π‘š(π‘Šπ‘› βˆ’π‘†) β‰₯ 1. Thus, ENR (π‘Šπ‘› ) ≀ πœ” (π‘Šπ‘› βˆ’ 𝑆) βˆ’ |𝑆| βˆ’ π‘š (π‘Šπ‘› βˆ’ 𝑆) ≀ 1 βˆ’ 2βˆ’1 = βˆ’2. (37) The proof is completed by (35), (36), and (37).

References [1] J. A. Bondy and U. S. R. Murty, Graph Theory with Applications, The Macmillan Press, 1976.

Journal of Applied Mathematics [2] C. A. Barefoot, R. Entringer, and H. Swart, β€œVulnerability in graphsβ€”a comparative survey,” Journal of Combinatorial Mathematics and Combinatorial Computing, vol. 1, pp. 13–22, 1987. [3] H. A. Jung, β€œOn a class of posets and the corresponding comparability graphs,” Journal of Combinatorial Theory B, vol. 24, no. 2, pp. 125–133, 1978. [4] Y. Li, S. Zhang, and X. Li, β€œRupture degree of graphs,” International Journal of Computer Mathematics, vol. 82, no. 7, pp. 793– 803, 2005. [5] S. S. Y. Wu and M. B. Cozzens, β€œThe minimum size of critically m-neighbour-connected graphs,” Ars Combinatoria, vol. 29, pp. 149–160, 1990. [6] G. Gunther, β€œNeighbour-connectivity in regular graphs,” Discrete Applied Mathematics, vol. 11, no. 3, pp. 233–243, 1985. [7] M. B. Cozzens and S. S. Y. Wu, β€œExtreme values of the edgeneighbor-connectivity,” Ars Combinatoria, vol. 39, pp. 199–210, 1995. [8] M. B. Cozzens and S. S.Y. Wu, β€œVertex-neighbor-integrity of trees,” Ars Combinatoria, vol. 43, pp. 169–180, 1996. [9] M. B. Cozzens and S. S. Y. Wu, β€œEdge-neighbor-integrity of trees,” The Australasian Journal of Combinatorics, vol. 10, pp. 163–174, 1994. [10] Z. Wei, A. Mai, and M. Zhai, β€œVertex-neighbor-scattering number of graphs,” Ars Combinatoria, vol. 102, pp. 417–426, 2011. [11] Z. Wei, Y. Li, and J. Zhang, β€œEdge-neighbor-scattering number of graphs,” Ars Combinatoria, vol. 85, pp. 271–277, 2007. [12] G. Bacak-Turan and A. KΔ±rlangΔ±cΒΈ, β€œNeighbor rupture degree and the relations between other parameters,” Ars Combinatoria, vol. 102, pp. 333–352, 2011. [13] M. B. Cozzens and S. S.Y. Wu, β€œVertex-neighbor-integrity of powers of cycles,” Ars Combinatoria, vol. 48, pp. 257–270, 1998.

5

Advances in

Operations Research Hindawi Publishing Corporation http://www.hindawi.com

Volume 2014

Advances in

Decision Sciences Hindawi Publishing Corporation http://www.hindawi.com

Volume 2014

Journal of

Applied Mathematics

Algebra

Hindawi Publishing Corporation http://www.hindawi.com

Hindawi Publishing Corporation http://www.hindawi.com

Volume 2014

Journal of

Probability and Statistics Volume 2014

The Scientific World Journal Hindawi Publishing Corporation http://www.hindawi.com

Hindawi Publishing Corporation http://www.hindawi.com

Volume 2014

International Journal of

Differential Equations Hindawi Publishing Corporation http://www.hindawi.com

Volume 2014

Volume 2014

Submit your manuscripts at http://www.hindawi.com International Journal of

Advances in

Combinatorics Hindawi Publishing Corporation http://www.hindawi.com

Mathematical Physics Hindawi Publishing Corporation http://www.hindawi.com

Volume 2014

Journal of

Complex Analysis Hindawi Publishing Corporation http://www.hindawi.com

Volume 2014

International Journal of Mathematics and Mathematical Sciences

Mathematical Problems in Engineering

Journal of

Mathematics Hindawi Publishing Corporation http://www.hindawi.com

Volume 2014

Hindawi Publishing Corporation http://www.hindawi.com

Volume 2014

Volume 2014

Hindawi Publishing Corporation http://www.hindawi.com

Volume 2014

Discrete Mathematics

Journal of

Volume 2014

Hindawi Publishing Corporation http://www.hindawi.com

Discrete Dynamics in Nature and Society

Journal of

Function Spaces Hindawi Publishing Corporation http://www.hindawi.com

Abstract and Applied Analysis

Volume 2014

Hindawi Publishing Corporation http://www.hindawi.com

Volume 2014

Hindawi Publishing Corporation http://www.hindawi.com

Volume 2014

International Journal of

Journal of

Stochastic Analysis

Optimization

Hindawi Publishing Corporation http://www.hindawi.com

Hindawi Publishing Corporation http://www.hindawi.com

Volume 2014

Volume 2014