首页> 外文学位 >On neighbor component order edge connectivity.
【24h】

On neighbor component order edge connectivity.

机译:在邻居组件顺序边缘连接。

获取原文
获取原文并翻译 | 示例

摘要

If a spy network is modeled as an undirected graph in which the nodes represent the spies and the edges are the communication links between spies, then consider the scenario where the interception of a link gives up both endnode spies. In graph-theoretic terms, edges fail and nodes do not, but when they do, the endnodes are subverted, i.e., removed, from the graph. Given k > 0, we say that upon the failure of some edges, the surviving subgraph is an operating state if it has at least one component of order ≥ k, and is a failure state otherwise. The neighbor component order edge connectivity, lambda( k)nc, is the minimum number of edge failures required to produce a failure state. We present some fundamental properties of this vulnerability parameter and determine its value for several well-known graphs. We also compare it with previously established vulnerability parameters. The complexity of calculating the neighbor component order edge connectivity of an arbitrary graph is equivalent to calculating an edge covering of the nodes for k = 1, and thus, is polynomial. However, the complexity becomes NP-hard for k = 2 as it is equivalent to calculating the edge domination number of a graph. Hence, we provide several polynomial time algorithms, including weighted trees and weighted cycles, as well as arbitrary trees and arbitrary unicycles. Finally, we study the unreliability of graphs, where edges can fail independently, with equal probability rho for 0 < rho < 1. A graph G is said to be uniformly most reliable if it has the smallest unreliability over all graphs in its class for all values of rho, and uniformly least reliable if it has the largest unreliability over all graphs in its class for all values of rho. We present results for the existence of uniformly most reliable and uniformly least reliable graphs for trees and unicycles.
机译:如果将间谍网络建模为无向图,其中节点代表间谍,而边缘是间谍之间的通信链接,则请考虑截取链接放弃两个端节点间谍的情况。用图论的术语来说,边缘会失效而节点不会失效,但是当边缘失效时,端节点被颠倒,即从图中移除。给定k> 0,我们说在某些边缘发生故障时,如果生存的子图具有至少一个≥k阶的分量,则该工作状态为工作状态,否则为故障状态。邻居组件顺序边缘连接性lambda(k)nc是产生故障状态所需的最小边缘故障数。我们介绍了此漏洞参数的一些基本属性,并确定了它在多个知名图中的价值。我们还将其与以前建立的漏洞参数进行比较。计算任意图的相邻分量阶边缘连通性的复杂度等于计算k = 1时节点的边缘覆盖度,因此是多项式。但是,复杂度对于k = 2变得很困难,因为它等同于计算图的边支配数。因此,我们提供了几种多项式时间算法,包括加权树和加权周期,以及任意树和任意单周期。最后,我们研究图的不可靠性,其中边可以独立失效,当0

著录项

  • 作者

    Heinig, Monika M.;

  • 作者单位

    Stevens Institute of Technology.;

  • 授予单位 Stevens Institute of Technology.;
  • 学科 Mathematics.
  • 学位 Ph.D.
  • 年度 2016
  • 页码 170 p.
  • 总页数 170
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号