Next Article in Journal
The Second Critical Exponent for a Time-Fractional Reaction-Diffusion Equation
Previous Article in Journal
Case-Based Deduction for Entailment Tree Generation
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Tightness of Harary Graphs

1
Department of Algorithms and Computation, School of Engineering Sciences, College of Engineering, University of Tehran, 16 Azar, Tehran 1417614411, Iran
2
Machine Learning and Drone Laboratory, Electrical and Computer Engineering Department, Utah Valley University, Orem, UT 84058, USA
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Mathematics 2024, 12(18), 2894; https://doi.org/10.3390/math12182894
Submission received: 5 August 2024 / Revised: 6 September 2024 / Accepted: 7 September 2024 / Published: 17 September 2024

Abstract

:
In the design of real-world networks, researchers evaluate various structural parameters to assess vulnerability, including connectivity, toughness, and tenacity. Recently, the tightness metric has emerged as a potentially superior vulnerability measure, although many related theorems remain unknown due to its novelty. Harary graphs, known for their maximum connectivity, are an important class of graph models for network design. Prior work has evaluated the vulnerability of three types of Harary graphs using different parameters, but the tightness metric has not been thoroughly explored. This article aims to calculate the tightness values for all three types of Harary graphs. First, it will attempt to calculate the lower bound for the value of the tightness parameter in Harary graphs using existing lemmas and theorems. Then, by presenting new lemmas and theorems, we will try to find the exact value or upper bound for this parameter in Harary graphs. For the first type of Harary graph, the tightness is precisely determined, while for the second and third types, upper bounds are provided due to structural complexity. The lemmas, theorems, and proof methods presented in this research may be used to calculate other graph and network parameters. However, the newness of the tightness parameter means that further research is needed to fully characterize its properties.

1. Introduction

The concept of networks is prevalent across many scientific fields, and analyzing network characteristics is crucial. Parameters such as minimum and maximum degree, diameter, connectivity, clustering coefficient, and vulnerability level are commonly used to analyze networks modeled as graphs. Among these parameters, graph vulnerability parameters are particularly important. Vulnerability parameters aim to mathematically evaluate a graph or network’s weakest points by optimizing an objective function. This allows researchers to identify potential points of failure or instability within a network model. The analysis of network vulnerability is essential for designing robust and resilient real-world systems, whether in fields like communications, transportation, power grids, or social networks.

1.1. Network Vulnerability Parameters

Some widely studied vulnerability parameters include connectivity ( κ ) [1], toughness (t) [2,3,4,5], tenacity (T) [6,7], integrity (I) [6,8,9], binding number (b) [10], scattering number (s) [6,11,12], and burning number ( b n ) [13,14]. These parameters examine vulnerability from different perspectives. The mathematical formulations of these vulnerability parameters are typically presented in both vertex-based and edge-based forms, depending on whether vertex cuts or edge cuts are being evaluated.
Connectivity is a fundamental graph theory parameter, defined as the minimum number of vertices or edges, denoted as C, that must be removed to separate the remaining nodes into two or more components. This relationship is mathematically expressed as κ ( G ) = min { C : ω ( G C ) > 1 } , where ( G C ) represents the graph obtained by removing the vertices or edges in C from G, and ω ( G C ) indicates the number of remaining components in ( G C ) .
The Binding Number assesses the vulnerability of a graph by examining the ratio of the neighbors of a set of vertices, | N ( C ) | , to the number of vertices in C. The mathematical expression for this parameter is b ( G ) = min { N ( C ) / C : N ( C ) V ( G ) } , where | N ( C ) | represents the number of neighbors of C.
The Scattering Number evaluates network vulnerability by counting the number of components created. This parameter is defined as s ( G ) = max { ω ( G C ) C : ω ( G C ) > 1 } .
Integrity measures a network’s vulnerability by considering the size of the largest remaining component in ( G C ) . This approach is based on the premise that a network’s weakest point lies where the removal of a component leads to the formation of smaller fragments. The mathematical formulation is given by I ( G ) = min { C + τ ( G C ) } where τ ( G C ) denotes the size of the largest component in ( G C ) .
Toughness also evaluates network vulnerability by considering the number of components formed in the graph, similar to the Scattering Number but represents this value as a fraction. Its mathematical relationship is t ( G ) = min { C / ω ( G C ) : ω ( G C ) > 1 } .
The Tenacity parameter combines the criteria of Toughness and Integrity, utilizing both the number of components resulting from cuts and the size of the largest component. Its formulation is expressed as T ( G ) = min { ( C + τ ( G C ) ) / ω ( G C ) : ω ( G C ) > 1 } .
Finally, the Burning Number is a novel metric related to network vulnerability. It operates by categorizing vertices as either burned or unburned, with each step allowing the burning of an unburned vertex, which then ignites its neighbors. If a vertex is burned at step t, all its neighbors will ignite at step t + 1 . This process continues until all vertices are burned. The Burning Number represents the minimum number of steps required to burn all vertices in the graph. Although this metric initially seems to depend on the graph’s diameter, a higher graph density actually reduces the Burning Number. For example, in a complete graph with n vertices ( K n ), the Burning Number is 1, whereas in an empty graph with n vertices ( K n ¯ ), it is n. Consequently, a lower network vulnerability typically corresponds to a lower Burning Number. However, the inverse is not always true; for instance, a star graph exhibits high vulnerability but a low Burning Number.
Evaluating the effectiveness of graph and network vulnerability parameters is a critical step in understanding their practical usefulness. Javan et al. [15] outlined several desirable characteristics that an effective vulnerability metric should possess. Drawing on this framework, they introduced a novel parameter called “Tightness” that aims to embody these ideal properties as closely as possible. The mathematical formulations for tightness in both the vertex-based and edge-based contexts are provided in Equations (1) and (2), respectively. These expressions leverage the ratio of the cut set size ( C ) to the number of removed paths, quantified as the difference between the total number of graph paths ν 2 and the sum of the path counts within each disconnected component i s i 2 in ( G C ) , where ( G C ) is the graph resulting from removing the vertices/edges C from G. This ratio reflects the cost-to-benefit tradeoff, where the numerator represents the cost of the cut, and the denominator encapsulates the benefit in terms of disrupted paths. Additionally, the inclusion of the total number of graph edges ( ε ) enhances the distinguishability of the tightness metric. Moreover, the incorporation of normalization coefficients (2, ν , ν 1 , where ν is the graph order) ensures that the metric exhibits desirable properties such as normality, comparability, monotonicity, unambiguity, and high distinguishability for connected graphs [15]:
J ( G ) = min C V ( G ) 2 ε C ν ν 2 i = 1 ω ( G C ) s i 2
J e ( G ) = min C E ( G ) 2 ε C ν ( ν 1 ) ν 2 i = 1 ω ( G C ) s i 2
By considering the constant values of ε = E ( G ) and ν = V ( G ) , and the function f ( G , C ) as defined in relation (3), we can simplify the mathematical formulations. Specifically, relations (1) and (2) can be rewritten as the more concise expressions (4) and (5), respectively. With these streamlined representations, the objective becomes minimizing the function f ( G , C ) , which captures the ratio of the cut set size C to the number of disrupted paths in ( G C ) . This optimization problem reflects the fundamental tradeoff between the cost of the cut and the benefit of the resulting connectivity disruption:
f ( G , C ) = C ν 2 i = 1 ω ( G C ) s i 2
J ( G ) = 2 ε ν × min C V ( G ) { f ( G , C ) }
J e ( G ) = 2 ε ν ( ν 1 ) × min C E ( G ) { f ( G , C ) }
Understanding and quantifying the vulnerability of networks using these graph theoretic parameters is crucial for designing robust real-world networks across various domains. The diversity of vulnerability metrics highlights the complexity of assessing network resilience. In the design of real-world networks, assessing the vulnerability of those networks is of paramount importance. As such, calculating and comparing vulnerability parameters is a fundamental requirement when working with network models and graph structures. To this end, researchers have extensively analyzed the vulnerability metrics across a diverse range of named graphs, including Harary [4,7], bipartite [2], Kneser [5], Generalized Petersen [16], and even random graphs [3].

1.2. Harary Graphs

Notably, Harary graphs have emerged as a crucial tool for vulnerability analysis. These graphs, denoted as H ( n , m ) , represent a specific class of m-connected graphs with n vertices that possess the minimum possible number of edges [4,7,17]. This structural property makes Harary graphs an important model for studying vulnerability in real-world networks. These graphs are classified into three distinct types, depending on the number of vertices and the desired connectivity level (m). The edges in each Harary graph type are characterized by the following expressions, where the addition of indices is performed modulo n:
  • Type (a) m is even:
    E ( H a ( n , m ) ) = i = 0 n 1 j = 1 m / 2 ( v i , v i + j )
  • Type (b) m is odd and n is even:
    E ( H b ( n , m ) ) = i = 0 n 1 j = 1 ( m 1 ) / 2 ( v i , v i + j ) i = 0 ( n 2 ) / 2 { ( v i , v i + n / 2 ) }
  • Type (c) m is odd and n is odd:
    E ( H c ( n , m ) ) = i = 0 n 1 j = 1 ( m 1 ) / 2 ( v i , v i + j ) i = 0 ( n 1 ) / 2 { ( v i , v i + ( n + 1 ) / 2 ) }
Figure 1 shows three example of these types of Harary graphs.
This study attempts to quantify the tightness parameter for three distinct classifications of Harary graphs. For this purpose, Section 2 uses relevant lemmas and results to derive the upper bounds and lower bounds, and, as accurately as possible, the values of this important parameter in three types of Harary graphs. Finally, the Conclusion section synthesizes the findings of this work and provides a comprehensive perspective on the significance and implications of our analysis. The obtained results may be used extensively in the design of real-world networks. Additionally, the methodologies presented could be valuable in proving related theorems in the field of graph theory.

2. Tightness of Harary Graphs

In this section, we will focus on different methods for evaluating the vulnerability of Harary graphs using the tightness parameter. Due to the varying structures of the three Harary graph types, distinct approaches will be required to calculate the tightness parameter values. The lemmas, corollaries, and methodologies presented in this section may have broader applications beyond the specific context of Harary graphs. They could potentially be useful in solving other graph-theoretic problems and expanding the understanding of the tightness metric and its relationships with other graph parameters.
First, we will examine practical lemmas for finding the limits of tightness in Harary graphs. Lemma 1 shows the comparability property of the tightness parameter as demonstrated in [15].
Lemma 1.
If G is a spanning subgraph of H, then J ( H ) J ( G ) , J e ( H ) J e ( G ) .
Theorem 1 also shows the value of tightness for cycle graphs [15].
Theorem 1.
If C n is a cycle graph with n vertices ( n > 3 ), then
J ( C n ) = 4 n 2 n 2 2 2 n 2 2 2
Based on Lemma 1 and Theorem 1 the Corollary 1 can be derived.
Corollary 1.
If G is Hamiltonian, then
J ( G ) 4 n 2 n 2 2 2 n 2 2 2
Harary graphs are Hamiltonian for n > m 2 . Therefore, Corollary 1 holds for Harary graphs and can be written as Corollary 2.
Corollary 2.
If H ( n , m ) is a Harary graph with n vertices and connectivity m, then
J H ( n , m ) 4 n 2 n 2 2 2 n 2 2 2
The calculation of more accurate bounds can also be achieved by using the relationship between tightness and the rest of the graph parameters. For example, the connectivity of Harary graphs is equal to m. This problem shows that in order to divide the graph into two parts, we need to remove at least m vertices. Therefore, to find the upper limit, it is possible to establish a relationship between tightness and connectivity. Theorem 2 shows the relationship between tightness and connectivity.
Theorem 2.
If H ( n , m ) is a Harary graph with n vertices and connectivity m, then
J H ( n , m ) 2 m 2 2 n m m 2 + 2 n 3 m 2
Proof. 
The connectivity of Harary graphs is m. Therefore, by removing m vertices from these types of graphs, the graph can be divided into smaller components. Increasing the number of components causes the loss of more paths in the graph and reduces the objective function of the tightness parameter. Thus, to find an reliable upper bound, we consider the worst case of this division. Therefore, we consider the two components created by removing m vertices from the Harary graphs as s i and s j . With this method, the objective function can be expressed as Equation (9), where C = m and s i + s j = n m :
f ( H ( n , m ) , C ) = m n 2 s i 2 + s j 2 = 2 m n 2 n s i 2 + s i s j 2 + s j = 2 m n 2 n s i 2 + s i ( n m s i ) 2 + ( n m s i ) = 2 m 2 n m m 2 m + 2 s i ( n m s i )
Considering fixed values for n and m, the maximum value of the objective function in relation (9) occurs when the denominator of the fraction has its smallest value. The minimum value of the denominator of the Equation (9) also occurs when 2 s i ( n m s i ) becomes the minimum. The minimum value for 2 s i ( n m s i ) also occurs when s i = 1 or s i = n m 1 . As shown below, the value of the objective function will be the same for any initialization of s i :
s i = 1 2 s i ( n m s i ) = 2 ( n m 1 ) s i = n m 1 2 s i ( n m s i ) = 2 ( n m 1 )
Therefore, the upper bound for the objective function f H ( n , m ) and J H ( n , m ) can be expressed by Equations (10) and (11), respectively:
f ( H ( n , m ) , C ) 2 m 2 n m m 2 + 2 n 3 m 2
J ( H ( n , m ) ) 2 m 2 2 n m m 2 + 2 n 3 m 2
In this section, the upper and lower bounds for the tightness of Harary graphs were calculated approximately. In the following, we will take a closer look at tightness values for these types of graphs.

2.1. Tightness of Harary Graphs Type (a)

In our analysis of Harary graphs of type (a), we consider the scenario where certain sets of vertices, denoted as C i , are removed in order to calculate the value of the tightness parameter J ( G ) . Correspondingly, other sets of vertices, denoted as S j , remain in the graph as connected components. For the sake of simplicity, we assume that the indices of the vertices within each deleted set C i and each remaining component S j are consecutive. The validity of this approach will be established through a series of rigorous lemmas and corollaries presented in the subsequent sections. Consequently, we can define a set S comprising all the vertices belonging to the remaining components S j , as well as a cut set C encompassing all the deleted vertex sets C i . With this vertex cut in place, we can further partition the paths removed from the Harary graph of type (a) into three distinct categories: P ( C , C ) , P ( C , S ) , and P ( S , S ) . The value P ( C , C ) represents the deleted paths connecting vertices within the cut set C, P ( C , S ) denotes the deleted paths between vertices in the cut set C and the vertices in the remaining components S, and P ( S , S ) corresponds to the deleted paths between vertices within the components S. Moreover, for the removal of a set of vertices in the Harary graphs of type (a) to successfully separate two components, the cardinality of each cut set C i must be greater than or equal to m / 2 , where m is the desired connectivity for the Harary graph. Equations (12) through (15) provide the mathematical formulations of these variables, where c i = C i , s i = S i , c = C , s = S , and k is the number of remaining components:
C = i = 1 k C i , S = i = 1 k S i
P ( C , C ) = c 2 = c 2 c 2
P ( C , S ) = c s
P ( S , S ) = i = 1 k 1 j = i + 1 k s i s j
To determine the tightness of Harary graphs of type (a), we will seek to minimize the objective function denoted as f ( G , C ) . This objective function can be expressed in terms of the previously defined sets C and S as shown in Equation (16):
f ( H a ( n , m ) , C ) = C P ( C , C ) + P ( C , S ) + P ( S , S ) = c ( c 2 c ) / 2 + c s + i = 1 k 1 j = i + 1 k s i s j
To determine the minimum value of the function f ( G , C ) , we must first establish several foundational lemmas. Lemma 2 will demonstrate that the size of the components must be sufficiently small in order to minimize the values of f ( G , C ) . The proof of this key lemma will illuminate the underlying structure and properties of the function f ( G , C ) , providing crucial insights that will guide us towards the global minimum.
Lemma 2.
If, after identifying the vertex cut set C in Harary graphs of type (a), we obtain f ( G , C ) = a / b , then the value of f ( G , C ) is not at its minimum if the size of the largest component is greater than b / a + 1 .
Proof. 
Suppose that a vertex v is removed from a component S i . The number of new deleted paths will be at least s i 1 , where s i = S i . If v is a cut vertex, then the number of new deleted paths will be greater than s i 1 . Therefore, to maximize the number of deleted paths, it is optimal to select this vertex from the largest component. Consequently, the ratio of the number of deleted vertices to the number of deleted paths will be equal to 1 / ( s m a x 1 ) , where S m a x is the largest component of ( G C ) and s m a x = S m a x .
Given that s m a x > b / a + 1 , and denoting P = P ( C , C ) + P ( C , S ) + P ( S , S ) and c = C , using relations (17), we can conclude that the value of objective function f ( G , C ) is not at its minimum:
s m a x > b a + 1 s m a x 1 > b a = P c ( s m a x 1 ) c > P   ( s m a x 1 ) c + P c > P + P c c ( P + s m a x 1 ) > P ( c + 1 )   c P > c + 1 P + s m a x 1 f ( G , C ) > f ( G , C + v )
Therefore, by repeatedly removing vertices from the largest component of Harary graphs type (a), when the size of the component exceeds the desired limit, we can reduce the value of the objective function. This repetition may causes large components to be divided into smaller components. The vertices removed from this component, if they create a cut, in addition to the removed paths between C vertices, they will also destroy the path between some S m a x vertices. This will lead to a decrease in the value of f ( G , C ) . Although Lemma 2 does not give us a general view of the optimal tightness value, it can be used for a superficial examination of the results obtained from the calculations. According to Lemma 2, after reducing the objective function f ( G , C ) , if there is a cut vertex within any component S i , the cut vertex can be replaced with its right or left vertex, and this can be performed until the index of the cut vertices as well as the index of the components becomes consecutive. Thus, the following corollary can be derived.
Corollary 3.
In Harary graphs of type (a), the indices of the vertices of each component S i and each cut set C i can be considered consecutive to find the minimum value of f ( G , C ) .
Figure 2 shows a desirable partition for Harary graphs type (a) based on the mentioned lemmas and corollaries.
Considering the fixed number of cutting vertices, to minimize the objective function f ( H a ( n , m ) , C ) , P ( S , S ) must be maximized. To maximize P ( S , S ) , the size difference of the generated components should be minimized. In other words, the size difference of all created components must be at most 1. This issue has been studied under Lemma 3.
Lemma 3.
With a constant number of cutting vertices in H a ( n , m ) , the minimized value of f ( H a ( n , m ) , C ) occurs when 1 i , j k : s i s j   1 , where k is the number of remaining components after the cut, and s i and s j are the sizes of the i-th and j-th components, respectively.
Proof. 
To minimize the objective function f ( H a ( n , m ) , C ) , P ( S , S ) must be maximized. Suppose there are two components S p and S q with sizes s p and s q , respectively, where s p s q > 1 . Without loss of generality, suppose that s p > ( s q + 1 ) or ( s p s q 1 ) > 0 .
By removing a vertex from the larger component and adding a vertex to the smaller component, we actually shift the vertices between them (cut sets and components) by one vertex towards the larger component. With this, the value of P ( S , S ) changes in the form of Equation (18), which indicates the increase in this value:
P n e w ( S , S ) = i = 1 k 1 j = i + 1 k s i s j = i = 1 i p i q k 1 j = i + 1 i p i q k s i s j + ( s p 1 ) i = 1 i p i q k s i + ( s q + 1 ) j = 1 j p j q k s j + ( s p 1 ) ( s q + 1 ) = i = 1 i p i q k 1 j = i + 1 i p i q k s i s j + s p i = 1 i p i q k s i + s q j = 1 j p j q k s j + s p s q + ( s p s q 1 ) = P ( S , S ) + ( s p s q 1 ) > P ( S , S )
By repeating the operation of removing a vertex from the largest component and adding it to the smallest one, the upward trend of P ( S , S ) will continue. This operation can be performed until the size of the components is almost balanced, or in other words, 1 i , j k   :   s i s j 1 . This ensures the minimization of the size difference between the components, which in turn maximizes P ( S , S ) and minimizes the objective function f ( H a ( n , m ) , C ) . □
Using Lemma 3, and assuming continuous values for c, s, and k, Equation (16) can be written as Equation (19):
f C o n t i n u o u s ( H a ( n , m ) , C ) = c ( c 2 c ) / 2 + c s + i = 1 k 1 j = i + 1 k ( s k ) 2 = c ( c 2 c ) / 2 + c s + ( ( k 2 k ) / 2 ) ( s k ) 2 = 2 c c 2 c + 2 c s + ( k 2 k ) ( s k ) 2
Given the fact that c + s = n , Equation (19) can be rewritten in terms of c as Equation (20):
f C o n t i n u o u s ( H a ( n , m ) , C ) = 2 c c 2 c + 2 c ( n c ) + ( k 1 ) ( n c ) 2 k = 2 c 2 n c c 2 c + k 1 k n c 2
By differentiating the continuous function in Equation (20) with respect to the variable c ( d f c o n t i n u o u s / d c = 0 ), the extremum value is obtained as c = ± n 1 k . However, these obtained values are not acceptable while k > 1 . Therefore, the continuous function in Equation (20) will be either ascending or descending. Assigning 0 and n to the variable c, the obtained values are 0 and 2 / ( n 1 ) , respectively. Thus, to minimize the value of the function in Equation (20), the value of c must be minimized. Additionally, the minimum value of c is achieved when the cut occurs, i.e., c = m . Furthermore, the minimum value of c = m makes the value of k equal to 2. Therefore, the continuous function in Equation (20) can be written as Equation (21):
f C o n t i n u o u s ( H a ( n , m ) , C ) = 2 m 2 n m m 2 m + 1 2 n m 2
Although the calculations of the tightness value of Herary graphs type (a) have been performed accurately and by mathematical relations, we can still use Lemma 2 to re-examine the results. The size of the largest component with this cut will be s m a x = ( n m ) / 2 , and ( n m ) / 2 1 / f Continuous ( H a ( n , m ) , C ) + 1 . Therefore, based on Lemma 2, there is no need to add a new vertex to the cut set. Accordingly, to calculate the tightness of Harary graphs type (a), two components, as large as possible, with minimum different sizes have to be created after cutting. Therefore, based on the previous lemmas and corollaries, having ν = n and ε = n m / 2 , f ( H a ( n , m ) , C ) and J ( H a ( n , m ) ) can be written as Equations (22) and (23) in the discrete space, respectively. Figure 3 shows an optimal cut for calculating J ( H ( 9 , 4 ) ) :
min C V ( H a ( n , m ) ) { f ( H a ( n , m ) , C ) } = 2 m 2 n m m 2 m + 2 n m 2 × n m 2 )
J ( H a ( n , m ) ) = n m n × 2 m 2 n m m 2 m + 2 n m 2 × n m 2 = 2 m 2 2 n m m 2 m + 2 n m 2 × n m 2

2.2. Tightness of Harary Graphs Types (b) and (c)

Calculating the tightness value of Harary graphs type (a) requires intricate mathematical relationships and theorems. In contrast, Harary graphs types (b) and (c) possess more complex structures, suggesting that determining their tightness values would be far more arduous. As illustrated in Figure 4, obtaining an optimal vertex cut is exceptionally challenging for these two graph types, as each vertex is connected to its opposite counterpart. This cut can be executed in two ways: by either completely removing the opposite vertices as shown in Figure 4a, resulting in a consecutiveness vertices index for the component, or by partially removing them as depicted in Figure 4b, leading to a non-consecutiveness vertices index for the component. Both approaches increase the complexity of the problem significantly.
Therefore, in this section, we will endeavor to provide a suitable upper bound for the tightness value of Harary graphs types (b) and (c). Based on the calculated tightness for Harary graphs type (a), it can be concluded that this parameter does not increase the number of components in the graph. Accordingly, to find a good upper bound for the tightness parameter in Harary graphs types (b) and (c), suppose we want to split the graph into two components. Therefore, separating one component from the graph makes the rest of the graph contain at least one other component. So, to calculate a good upper bound, we will focus on isolating a component from the graph.
Figure 5 shows the general state of this separation, in which the set of vertices S represents the desired component, while the sets of vertices C R , C L , and C F are the cut vertices on the right, left, and opposite sides of the desired component, respectively.
By removing the cut vertices C R , C L , and C F , the removed paths are divided into three sections, P ( C , C ) , P ( C , S R ) , and P ( S , R ) , where C = C R C L C F , S is the component, and R is the remaining vertices after cutting, or R = V ( G ) C S . In the continuation of the process of finding the upper bound for the tightness of Harary graphs types (b) and (c), we will assume that R is connected, or in other words, P ( R , R ) = 0 . Suppose that s = S m , then C F s , and to decrease the number of cut vertices ( C ), we can assume that C F = s . Note that the value of s > m allows us to add a part of the cutting vertices of C F to reduce the number of cutting vertices to the set of S. This state is shown in Figure 4b. In addition, to minimize the number of cutting vertices, the values of C L and C R must be equal to ( m 1 ) / 2 . With these explanations, the values of P ( C , C ) , P ( C , R S ) , and P ( S , R ) can be written as Equations (24), (25) and (26), respectively:
P ( C , C ) = m 1 + s 2 = ( m + s 1 ) ( m + s 2 ) 2
P ( C , R S ) = ( m + s 1 ) ( n m + 1 s )
P ( S , R ) = s ( n m 2 s + 1 )
Therefore, the objective function can be expressed as Equation (27):
f ( H b ( n , m ) , C ) = C P ( C , C ) + P ( C , R S ) + P ( S , R ) = m + s 1 ( m + s 1 ) ( m + s 2 ) / 2 + ( m + s 1 ) ( n m + 1 s ) + s ( n m 2 s + 1 ) = 2 ( m + s 2 ) + 2 ( n m + 1 s ) + 2 s ( n m 2 s + 1 ) / ( m + s 1 ) = 2 2 n 3 s m + 2 s ( n s ) / ( m + s 1 )
The values of n and m in relation (27) are constant. Therefore, it is possible to find the extremum point by differentiating the objective function f ( G , C ) with respect to s, if it exists. By this method, the extremum point will be as Equation (28). Thus, an extremum point for f ( H b ( n , m ) , C ) and an upper bound for J ( H b ( n , m ) ) can be achieved using the rounded value of s e x t and Equation (27):
s e x t = 10 ( m 1 ) ( m + n 1 ) 5 m + 1
To find an upper bound of tightness for Harary graphs type (c), the results obtained for Harary graphs type (b) can be used because these results are calculated in continuous space. For this purpose, it is enough to consider the condition v 0 S . Figure 6 shows an example of the desired component S and cutting vertices C = { C L C R C F } for H ( 9 , 3 ) and H ( 10 , 3 ) .

3. Conclusions

In this work, we sought to analyze the vulnerability of Harary graphs using the tightness metric as the primary parameter. Different methodologies were employed to calculate the tightness values for three distinct types of Harary graphs. The lower and upper bounds of the tightness values for Harary graphs were presented using existing lemmas and theorems, relying on the fact that Harary graphs are Hamiltonian. Additionally, the tightness values were accurately calculated for Harary graphs of type (a). For types (b) and (c), an acceptable upper bound was obtained due to the complexity of the graph structure. Given the novelty of the tightness parameter, there is still limited information available about its properties and applications. This gap in the current understanding presents an opportunity for future research to further explore and expand the knowledge surrounding this graph vulnerability measure.

Author Contributions

Conceptualization, A.J. and A.M.; methodology, A.J.; software, A.J. and A.M.; validation, A.M. and A.M.; formal analysis, A.J. and A.M.; investigation, A.J. and A.M.; resources, M.S.; data curation, A.J. and A.M.; writing—original draft preparation, A.J.; writing—review and editing, A.M. and M.S.; visualization, A.J.; supervision, A.M.; project administration, A.M.; funding acquisition, M.S. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

No new data were created or analyzed in this study. Data sharing is not applicable to this article.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Milojevic, A. Connectivity of old and new models of friends-and-strangers graphs. Adv. Appl. Math. 2024, 155, 102668. [Google Scholar] [CrossRef]
  2. Chen, Y.; Fan, D.; Lin, H. Factors, spectral radius and toughness in bipartite graphs. Discret. Appl. Math. 2024, 355, 223–231. [Google Scholar] [CrossRef]
  3. Gu, X. Toughness in pseudo-random graphs. Eur. J. Comb. 2021, 92, 103255. [Google Scholar] [CrossRef]
  4. Moazzami, D. Toughness of the Networks with Maximum Connectivity. J. Algorithms Comput. 2015, 46, 51–71. [Google Scholar] [CrossRef]
  5. Park, D.; Ostuni, A.; Hayes, N.; Banerjee, A.; Wakhare, T.; Wong, W. The toughness of Kneser graphs. Discret. Math. 2021, 334, 112484. [Google Scholar] [CrossRef]
  6. Li, Y.; Shi, Y.; Gu, X. Spectrum bounds for the scattering number, integrity, tenacity of regular graphs. Future Gener. Comput. Syst. 2018, 83, 450–453. [Google Scholar] [CrossRef]
  7. Moazzami, D. Tenacity of a graph with maximum connectivity. Discret. Appl. Math. 2011, 159, 367–380. [Google Scholar] [CrossRef]
  8. Dunkum, M.; Lanphier, D. Edge integrity of nearest neighbor graphs and separator theorems. Discret. Math. 2019, 342, 2664–2679. [Google Scholar] [CrossRef]
  9. Fujita, S.; Furuya, M. Safe number and integrity of graphs. Discret. Appl. Math. 2018, 247, 398–406. [Google Scholar] [CrossRef]
  10. Bauer, D.; Kahl, N.; Schmeichel, E.; Woodall, D.R.; Yatauro, M. Toughness and binding number. Discret. Appl. Math. 2014, 165, 60–68. [Google Scholar] [CrossRef]
  11. Li, F.; Zhang, X.; Broersma, H. A polynomial algorithm for weighted scattering number in interval graphs. Discret. Appl. Math. 2019, 264, 118–124. [Google Scholar] [CrossRef]
  12. Li, Y.; Gu, R. Bounds for scattering number and rupture degree of graphs with genus. Appl. Math. Comput. 2018, 337, 329–334. [Google Scholar] [CrossRef]
  13. Bessy, S.; Bonato, A.; Janssen, J.; Rautenbach, D.; Roshanbin, E. Burning a graph is hard. Discret. Appl. Math. 2017, 232, 73–87. [Google Scholar] [CrossRef]
  14. Tan, T.S.; Teh, W.C. Graph burning: Tight bounds on the burning numbers of path forests and spiders. Appl. Math. Comput. 2020, 385, 125447. [Google Scholar] [CrossRef]
  15. Javan, A.; Javan, M.; Jafarpour, M.; Moazzami, D.; Moeini, A. On the J-Tightness of graphs. J. Algorithms Comput. 2021, 53, 57–74. [Google Scholar] [CrossRef]
  16. Khoshnood, A.; Moazzami, D.; Ghodousian, A. The Tenacity of Generalized Petersen Graphs. Sci. Iran. 2024, 32. [Google Scholar] [CrossRef]
  17. Baldoni, R.; Bonomi, S.; Querzoni, L.; Piergiovanni, S.T. Investigating the existence and the regularity of logarithmic Harary graphs. Theor. Comput. Sci. 2009, 410, 2110–2121. [Google Scholar] [CrossRef]
Figure 1. Three examples of different types of Harary graphs.
Figure 1. Three examples of different types of Harary graphs.
Mathematics 12 02894 g001
Figure 2. Desirable cut for Harary graphs type (a). The dashed lines show the cut set.
Figure 2. Desirable cut for Harary graphs type (a). The dashed lines show the cut set.
Mathematics 12 02894 g002
Figure 3. Optimal cut for tightness of H(9,4), J ( H ( 9 , 4 ) ) = 0.5 . The dashed lines show the cut set.
Figure 3. Optimal cut for tightness of H(9,4), J ( H ( 9 , 4 ) ) = 0.5 . The dashed lines show the cut set.
Mathematics 12 02894 g003
Figure 4. Two different cuts for Harary graphs types (b) and (c). The dashed lines show the cut set.
Figure 4. Two different cuts for Harary graphs types (b) and (c). The dashed lines show the cut set.
Mathematics 12 02894 g004
Figure 5. Sample first cut for Harary graphs type (b). The dashed lines show the cut set.
Figure 5. Sample first cut for Harary graphs type (b). The dashed lines show the cut set.
Mathematics 12 02894 g005
Figure 6. Upper bounds cut for Harary graph types (b) and (c). The dashed lines show the cut set.
Figure 6. Upper bounds cut for Harary graph types (b) and (c). The dashed lines show the cut set.
Mathematics 12 02894 g006
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Javan, A.; Moeini, A.; Shekaramiz, M. Tightness of Harary Graphs. Mathematics 2024, 12, 2894. https://doi.org/10.3390/math12182894

AMA Style

Javan A, Moeini A, Shekaramiz M. Tightness of Harary Graphs. Mathematics. 2024; 12(18):2894. https://doi.org/10.3390/math12182894

Chicago/Turabian Style

Javan, Abolfazl, Ali Moeini, and Mohammad Shekaramiz. 2024. "Tightness of Harary Graphs" Mathematics 12, no. 18: 2894. https://doi.org/10.3390/math12182894

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop