Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (40)

Search Parameters:
Keywords = edge-disjoint

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
14 pages, 3988 KB  
Article
Edge Fault-Tolerant Strong Menger Edge Connectivity of Folded Crossed Cubes
by Huanshen Jia and Jianguo Qian
Axioms 2025, 14(9), 654; https://doi.org/10.3390/axioms14090654 - 23 Aug 2025
Viewed by 332
Abstract
A graph is called strongly Menger-edge connected (SME-connected) if any two vertices are connected by as many edge-disjoint paths as their smaller degree. For positive integers t and r, a graph G is called t-edge-fault-tolerant SME-connected (t-EFT-SME-connected) of order [...] Read more.
A graph is called strongly Menger-edge connected (SME-connected) if any two vertices are connected by as many edge-disjoint paths as their smaller degree. For positive integers t and r, a graph G is called t-edge-fault-tolerant SME-connected (t-EFT-SME-connected) of order r if GF is SME-connected for any set F of edges in G with |F|t and δ(GF)r. We show that the n-dimensional folded crossed cube is (n1)-EFT-SME-connected of order 1 and (3n5)-EFT-SME-connected of order 2. Let p(G,f) and pM(G,f) be the probabilities that G is connected and SME-connected when f edges are faulted randomly, respectively. We perform a numerical simulation on p(G,f) and pM(G,f) for a five-dimensional folded crossed cube and folded hypercube. The numerical results show that, in addition to their same edge connectivity and SME connectivity, these two graphs have almost the same values of p(G,f) and pM(G,f) for every f. This hints that, although the ‘edge-cross’ pattern in a hypercube-based graph can shorten the mean vertex distance, the ‘edge-cross’ is not a necessary pattern for strengthening the connectivity of the graph. Full article
Show Figures

Figure 1

31 pages, 423 KB  
Article
The Behavior of Tree-Width and Path-Width Under Graph Operations and Graph Transformations
by Frank Gurski and Robin Weishaupt
Algorithms 2025, 18(7), 386; https://doi.org/10.3390/a18070386 - 25 Jun 2025
Viewed by 1177
Abstract
Tree-width and path-width are well-known graph parameters. Many NP-hard graph problems admit polynomial-time solutions when restricted to graphs of bounded tree-width or bounded path-width. In this work, we study the behavior of tree-width and path-width under various unary and binary graph transformations. For [...] Read more.
Tree-width and path-width are well-known graph parameters. Many NP-hard graph problems admit polynomial-time solutions when restricted to graphs of bounded tree-width or bounded path-width. In this work, we study the behavior of tree-width and path-width under various unary and binary graph transformations. For considered transformations, we provide upper and lower bounds for the tree-width and path-width of the resulting graph in terms of those of the initial graphs or argue why such bounds are impossible to specify. Among the studied unary transformations are vertex addition, vertex deletion, edge addition, edge deletion, subgraphs, vertex identification, edge contraction, edge subdivision, minors, powers of graphs, line graphs, edge complements, local complements, Seidel switching, and Seidel complementation. Among the studied binary transformations, we consider the disjoint union, join, union, substitution, graph product, 1-sum, and corona of two graphs. Full article
(This article belongs to the Special Issue Graph and Hypergraph Algorithms and Applications)
Show Figures

Figure 1

14 pages, 259 KB  
Article
The Vertex-Disjoint and Edge-Disjoint Ramsey Numbers of a Set of Graphs
by Emma Jent and Ping Zhang
Axioms 2025, 14(7), 486; https://doi.org/10.3390/axioms14070486 - 21 Jun 2025
Viewed by 871
Abstract
The Ramsey number R(F) of a graph F without isolated vertices is the smallest positive integer n such that every red–blue coloring of Kn produces a subgraph isomorphic to F all of whose edges are colored the same. Let  [...] Read more.
The Ramsey number R(F) of a graph F without isolated vertices is the smallest positive integer n such that every red–blue coloring of Kn produces a subgraph isomorphic to F all of whose edges are colored the same. Let F be a set of graphs without isolated vertices. For a positive integer t, the vertex-disjoint Ramsey number VRt(F) is the smallest positive integer n such that every red–blue coloring of the complete graph Kn of order n results in at least t pairwise vertex-disjoint monochromatic graphs in F; while the edge-disjoint Ramsey number ERt(F) is the smallest positive integer n such that every red–blue coloring of Kn produces at least t pairwise edge-disjoint monochromatic graphs in F. If t=1 and F consists of a single graph F, then VR1(F)=ER1(F)=R(F) is the Ramsey number of the graph F. Thus, the concepts of vertex-disjoint and edge-disjoint Ramsey numbers provide a generalization of the standard Ramsey number. Upper and lower bounds for VRt(F) and ERt(F) are established for sets F of graphs without isolated vertices and the sharpness of these bounds is discussed. The primary goal of this paper is to investigate the values of VRt(F) and ERt(F) for sets F of graphs of size 2 or 3 without isolated vertices. The exact values of VRt(F) are determined for all such sets F and all integers t2. The exact values of ERt(F) of certain such sets F with prescribed conditions for all integers t2 are determined. For some special sets F of graphs of size 2 or 3 without isolated vertices, the exact values of ERt(F) are determined for 2t4. Additional results, problems, and conjectures are also presented dealing with these two Ramsey concepts for graphs in general. Full article
22 pages, 9695 KB  
Article
DAENet: A Deep Attention-Enhanced Network for Cropland Extraction in Complex Terrain from High-Resolution Satellite Imagery
by Yushen Wang, Mingchao Yang, Tianxiang Zhang, Shasha Hu and Qingwei Zhuang
Agriculture 2025, 15(12), 1318; https://doi.org/10.3390/agriculture15121318 - 19 Jun 2025
Viewed by 591
Abstract
Prompt and precise cropland mapping is indispensable for safeguarding food security, enhancing land resource utilization, and advancing sustainable agricultural practices. Conventional approaches faced difficulties in complex terrain marked by fragmented plots, pronounced elevation differences, and non-uniform field borders. To address these challenges, we [...] Read more.
Prompt and precise cropland mapping is indispensable for safeguarding food security, enhancing land resource utilization, and advancing sustainable agricultural practices. Conventional approaches faced difficulties in complex terrain marked by fragmented plots, pronounced elevation differences, and non-uniform field borders. To address these challenges, we propose DAENet, a novel deep learning framework designed for accurate cropland extraction from high-resolution GaoFen-1 (GF-1) satellite imagery. DAENet employs a novel Geometric-Optimized and Boundary-Restrained (GOBR) Block, which combines channel attention, multi-scale spatial attention, and boundary supervision mechanisms to effectively mitigate challenges arising from disjointed cropland parcels, topography-cast shadows, and indistinct edges. We conducted comparative experiments using 8 mainstream semantic segmentation models. The results demonstrate that DAENet achieves superior performance, with an Intersection over Union (IoU) of 0.9636, representing a 4% improvement over the best-performing baseline, and an F1-score of 0.9811, marking a 2% increase. Ablation analysis further validated the indispensable contribution of GOBR modules in improving segmentation precision. Using our approach, we successfully extracted 25,556.98 hectares of cropland within the study area, encompassing a total of 67,850 individual blocks. Additionally, the proposed method exhibits robust generalization across varying spatial resolutions, underscoring its effectiveness as a high-accuracy solution for agricultural monitoring and sustainable land management in complex terrain. Full article
(This article belongs to the Section Artificial Intelligence and Digital Agriculture)
Show Figures

Figure 1

12 pages, 283 KB  
Article
Extending Ramsey Numbers for Connected Graphs of Size 3
by Emma Jent, Sawyer Osborn and Ping Zhang
Symmetry 2024, 16(8), 1092; https://doi.org/10.3390/sym16081092 - 22 Aug 2024
Cited by 1 | Viewed by 1499
Abstract
It is well known that the famous Ramsey number R(K3,K3)=6. That is, the minimum positive integer n for which every red-blue coloring of the edges of the complete graph Kn results in [...] Read more.
It is well known that the famous Ramsey number R(K3,K3)=6. That is, the minimum positive integer n for which every red-blue coloring of the edges of the complete graph Kn results in a monochromatic triangle K3 is 6. It is also known that every red-blue coloring of K6 results in at least two monochromatic triangles, which need not be vertex-disjoint or edge-disjoint. This fact led to an extension of Ramsey numbers. For a graph F and a positive integer t, the vertex-disjoint Ramsey number VRt(F) is the minimum positive integer n such that every red-blue coloring of the edges of the complete graph Kn of order n results in t pairwise vertex-disjoint monochromatic copies of subgraphs isomorphic to F, while the edge-disjoint Ramsey number ERt(F) is the corresponding number for edge-disjoint subgraphs. Since VR1(F) and ER1(F) are the well-known Ramsey numbers of F, these new Ramsey concepts generalize the Ramsey numbers and provide a new perspective for this classical topic in graph theory. These numbers have been investigated for the two connected graphs K3 and the path P3 of order 3. Here, we study these numbers for the remaining connected graphs, namely, the path P4 and the star K1,3 of size 3. We show that VRt(P4)=4t+1 for every positive integer t and VRt(K1,3)=4t for every integer t2. For t4, the numbers ERt(K1,3) and ERt(P4) are determined. These numbers provide information towards the goal of determining how the numbers VRt(F) and ERt(F) increase as t increases for each graph F{K1,3,P4}. Full article
(This article belongs to the Special Issue Symmetry in Graph Algorithms and Graph Theory III)
Show Figures

Figure 1

13 pages, 266 KB  
Article
Maximizing Closeness in Bipartite Networks: A Graph-Theoretic Analysis
by Fazal Hayat and Daniele Ettore Otera
Mathematics 2024, 12(13), 2039; https://doi.org/10.3390/math12132039 - 30 Jun 2024
Cited by 2 | Viewed by 1598
Abstract
A fundamental aspect of network analysis involves pinpointing nodes that hold significant positions within the network. Graph theory has emerged as a powerful mathematical tool for this purpose, and there exist numerous graph-theoretic parameters for analyzing the stability of the system. Within this [...] Read more.
A fundamental aspect of network analysis involves pinpointing nodes that hold significant positions within the network. Graph theory has emerged as a powerful mathematical tool for this purpose, and there exist numerous graph-theoretic parameters for analyzing the stability of the system. Within this framework, various graph-theoretic parameters contribute to network analysis. One such parameter used in network analysis is the so-called closeness, which serves as a structural measure to assess the efficiency of a node’s ability to interact with other nodes in the network. Mathematically, it measures the reciprocal of the sum of the shortest distances from a node to all other nodes in the network. A bipartite network is a particular type of network in which the nodes can be divided into two disjoint sets such that no two nodes within the same set are adjacent. This paper mainly studies the problem of determining the network that maximize the closeness within bipartite networks. To be more specific, we identify those networks that maximize the closeness over bipartite networks with a fixed number of nodes and one of the fixed parameters: connectivity, dissociation number, cut edges, and diameter. Full article
(This article belongs to the Special Issue Geometry and Topology with Applications)
Show Figures

Figure 1

12 pages, 4497 KB  
Article
The Generalized 3-Connectivity of Exchanged Folded Hypercubes
by Wantao Ning and Hao Li
Axioms 2024, 13(3), 194; https://doi.org/10.3390/axioms13030194 - 14 Mar 2024
Viewed by 1313
Abstract
For SV(G),κG(S) denotes the maximum number k of edge disjoint trees T1,T2,,Tk in G, such that [...] Read more.
For SV(G),κG(S) denotes the maximum number k of edge disjoint trees T1,T2,,Tk in G, such that V(Ti)V(Tj)=S for any i,j{1,2,,k} and ij. For an integer 2r|V(G)|, the generalized r-connectivity of G is defined as κr(G)=min{κG(S)|SV(G)and|S|=r}. In fact, κ2(G) is the traditional connectivity of G. Hence, the generalized r-connectivity is an extension of traditional connectivity. The exchanged folded hypercube EFH(s,t), in which s1 and t1 are positive integers, is a variant of the hypercube. In this paper, we find that κ3(EFH(s,t))=s+1 with 3st. Full article
Show Figures

Figure 1

23 pages, 1470 KB  
Article
Progressive Multiple Alignment of Graphs
by Marcos E. González Laffitte and Peter F. Stadler
Algorithms 2024, 17(3), 116; https://doi.org/10.3390/a17030116 - 11 Mar 2024
Cited by 2 | Viewed by 3288
Abstract
The comparison of multiple (labeled) graphs with unrelated vertex sets is an important task in diverse areas of applications. Conceptually, it is often closely related to multiple sequence alignments since one aims to determine a correspondence, or more precisely, a multipartite matching between [...] Read more.
The comparison of multiple (labeled) graphs with unrelated vertex sets is an important task in diverse areas of applications. Conceptually, it is often closely related to multiple sequence alignments since one aims to determine a correspondence, or more precisely, a multipartite matching between the vertex sets. There, the goal is to match vertices that are similar in terms of labels and local neighborhoods. Alignments of sequences and ordered forests, however, have a second aspect that does not seem to be considered for graph comparison, namely the idea that an alignment is a superobject from which the constituent input objects can be recovered faithfully as well-defined projections. Progressive alignment algorithms are based on the idea of computing multiple alignments as a pairwise alignment of the alignments of two disjoint subsets of the input objects. Our formal framework guarantees that alignments have compositional properties that make alignments of alignments well-defined. The various similarity-based graph matching constructions do not share this property and solve substantially different optimization problems. We demonstrate that optimal multiple graph alignments can be approximated well by means of progressive alignment schemes. The solution of the pairwise alignment problem is reduced formally to computing maximal common induced subgraphs. Similar to the ambiguities arising from consecutive indels, pairwise alignments of graph alignments require the consideration of ambiguous edges that may appear between alignment columns with complementary gap patterns. We report a simple reference implementation in Python/NetworkX intended to serve as starting point for further developments. The computational feasibility of our approach is demonstrated on test sets of small graphs that mimimc in particular applications to molecular graphs. Full article
(This article belongs to the Special Issue Graph Algorithms and Graph Labeling)
Show Figures

Figure 1

17 pages, 2384 KB  
Article
Enhanced FRER Mechanism in Time-Sensitive Networking for Reliable Edge Computing
by Shaoliu Hu, Yueping Cai, Shengkai Wang and Xiao Han
Sensors 2024, 24(6), 1738; https://doi.org/10.3390/s24061738 - 7 Mar 2024
Cited by 3 | Viewed by 3109
Abstract
Time-Sensitive Networking (TSN) and edge computing are promising networking technologies for the future of the Industrial Internet. TSN provides a reliable and deterministic low-latency communication service for edge computing. The Frame Replication and Elimination for Reliability (FRER) mechanism is important for improving the [...] Read more.
Time-Sensitive Networking (TSN) and edge computing are promising networking technologies for the future of the Industrial Internet. TSN provides a reliable and deterministic low-latency communication service for edge computing. The Frame Replication and Elimination for Reliability (FRER) mechanism is important for improving the network reliability of TSN. It achieves high reliability by transmitting identical frames in parallel on two disjoint paths, while eliminating duplicated frames at the destination node. However, there are two problems with the FRER mechanism. One problem is that it does not consider the path reliability, and the other one is that it is difficult to find two completely disjoint path pairs in some cases. To solve the above problems, this paper proposes a method to find edge-disjoint path pairs considering path reliability for FRER in TSN. The method includes two parts: one is building a reliability model for paths, and the other one is computing a working path and a redundant path with the Edge-Disjoint Path Pairs Selection (EDPPS) algorithm. Theoretical and simulation results show that the proposed method effectively improves path reliability while reducing the delay jitter of frames. Compared with the traditional FRER mechanism, the proposed method reduces delay jitter by 15.6% when the network load is 0.9. Full article
(This article belongs to the Special Issue Advanced Mobile Edge Computing in 5G Networks)
Show Figures

Figure 1

10 pages, 349 KB  
Article
The Structural Properties of (2, 6)-Fullerenes
by Rui Yang and Mingzhu Yuan
Symmetry 2023, 15(11), 2078; https://doi.org/10.3390/sym15112078 - 17 Nov 2023
Cited by 1 | Viewed by 1196
Abstract
A (2,6)-fullerene F is a 2-connected cubic planar graph whose faces are only 2-length and 6-length. Furthermore, it consists of exactly three 2-length faces by Euler’s formula. The (2,6)-fullerene comes [...] Read more.
A (2,6)-fullerene F is a 2-connected cubic planar graph whose faces are only 2-length and 6-length. Furthermore, it consists of exactly three 2-length faces by Euler’s formula. The (2,6)-fullerene comes from Došlić’s (k,6)-fullerene, a 2-connected 3-regular plane graph with only k-length faces and hexagons. Došlić showed that the (k,6)-fullerenes only exist for k=2, 3, 4, or 5, and some of the structural properties of (k,6)-fullerene for k=3, 4, or 5 were studied. The structural properties, such as connectivity, extendability, resonance, and anti−Kekulé number, are very useful for studying the number of perfect matchings in a graph, and thus for the study of the stability of the molecular graphs. In this paper, we study the properties of (2,6)-fullerene. We discover that the edge-connectivity of (2,6)-fullerenes is 2. Every (2,6)-fullerene is 1-extendable, but not 2-extendable (F is called n-extendable (|V(F)|2n+2) if any matching of n edges is contained in a perfect matching of F). F is said to be k-resonant (k1) if the deleting of any i (0ik) disjoint even faces of F results in a graph with at least one perfect matching. We have that every (2,6)-fullerene is 1-resonant. An edge set, S, of F is called an anti−Kekulé set if FS is connected and has no perfect matchings, where FS denotes the subgraph obtained by deleting all edges in S from F. The anti−Kekulé number of F, denoted by ak(F), is the cardinality of a smallest anti−Kekulé set of F. We have that every (2,6)-fullerene F with |V(F)|>6 has anti−Kekulé number 4. Further we mainly prove that there exists a (2,6)-fullerene F having fF hexagonal faces, where fF is related to the two parameters n and m. Full article
(This article belongs to the Special Issue Symmetry in Algorithmic Graph Theory and Interconnection Networks)
Show Figures

Figure 1

12 pages, 311 KB  
Article
Ramsey Chains in Linear Forests
by Gary Chartrand, Ritabrato Chatterjee and Ping Zhang
Axioms 2023, 12(11), 1019; https://doi.org/10.3390/axioms12111019 - 29 Oct 2023
Viewed by 3696
Abstract
Every red–blue coloring of the edges of a graph G results in a sequence G1, G2, , G of pairwise edge-disjoint monochromatic subgraphs Gi (1i) of size i, such [...] Read more.
Every red–blue coloring of the edges of a graph G results in a sequence G1, G2, , G of pairwise edge-disjoint monochromatic subgraphs Gi (1i) of size i, such that Gi is isomorphic to a subgraph of Gi+1 for 1i1. Such a sequence is called a Ramsey chain in G, and ARc(G) is the maximum length of a Ramsey chain in G, with respect to a red–blue coloring c. The Ramsey index AR(G) of G is the minimum value of ARc(G) among all the red–blue colorings c of G. If G has size m, then k+12m<k+22 for some positive integer k. It has been shown that there are infinite classes S of graphs, such that for every graph G of size m in S, AR(G)=k if and only if k+12m<k+22. Two of these classes are the matchings mK2 and paths Pm+1 of size m. These are both subclasses of linear forests (a forest of which each of the components is a path). It is shown that if F is any linear forest of size m with k+12<m<k+22, then AR(F)=k. Furthermore, if F is a linear forest of size k+12, where k4, that has at most k12 components, then AR(F)=k, while for each integer t with k12<t<k+12 there is a linear forest F of size k+12 with t components, such that AR(F)=k1. Full article
(This article belongs to the Section Algebra and Number Theory)
Show Figures

Figure 1

11 pages, 299 KB  
Article
More Variations on Shuffle Squares
by Jarosław Grytczuk, Bartłomiej Pawlik and Mariusz Pleszczyński
Symmetry 2023, 15(11), 1982; https://doi.org/10.3390/sym15111982 - 26 Oct 2023
Cited by 1 | Viewed by 2056
Abstract
We study an abstract variant of squares (and shuffle squares) defined by a constraint graph G, specifying which pairs of words form a square. So, a shuffle G-square is a word that can be split into two disjoint subwords U and W (of [...] Read more.
We study an abstract variant of squares (and shuffle squares) defined by a constraint graph G, specifying which pairs of words form a square. So, a shuffle G-square is a word that can be split into two disjoint subwords U and W (of the same length), which are joined by an edge. This setting generalizes a recently introduced model of shuffle squares based on word symmetry and permutations. By using the probabilistic method, we provide a sufficient condition for a constraint graph G guaranteeing the avoidability of shuffle G-squares. By a more-elementary method (known as Rosenfeld counting), we prove that G-squares are avoidable over an alphabet of size 4α, α>1, provided that the degree of every word of length n in G is at most αn. We also introduce the concept of the cutting distance between words and state several conjectures involving this notion and various kinds of shuffle squares. We suspect that, for every k2, there is a constant ck such that every even word can be turned into a shuffle square by cutting it in at most ck places and rearranging the resulting pieces. We present some computational, as well as theoretical evidence in favor of this conjecture. Full article
(This article belongs to the Special Issue Symmetry in Combinatorics and Discrete Mathematics)
19 pages, 3536 KB  
Article
Enhancing Network Availability: An Optimization Approach
by Yaser Al Mtawa
Computation 2023, 11(10), 202; https://doi.org/10.3390/computation11100202 - 9 Oct 2023
Cited by 3 | Viewed by 2425
Abstract
High availability is vital for network operators to ensure reliable services. Network faults can disrupt functionality and require quick recovery. Multipath networking enhances availability through load balancing and optimal link utilization. However, equal-cost multipath (ECMP) routing has limitations in effectively using multipaths, decreasing [...] Read more.
High availability is vital for network operators to ensure reliable services. Network faults can disrupt functionality and require quick recovery. Multipath networking enhances availability through load balancing and optimal link utilization. However, equal-cost multipath (ECMP) routing has limitations in effectively using multipaths, decreasing network availability. This paper proposes a three-phase disjoint-path framework that improves availability by directing traffic flows through separate paths. The framework provides effective load balancing and meets various service requirements. It includes the Optimization phase for identifying optimal multipath solutions, the Path Separation phase for dividing the multipath into working and backup sets, and the Quality Assessment phase for evaluating the robustness of both sets using topological metrics and micro-based characteristics. The simulations demonstrate the proposed framework’s validation and effectiveness in enhancing network availability. Full article
(This article belongs to the Section Computational Engineering)
Show Figures

Figure 1

14 pages, 536 KB  
Article
Towards Privacy-Preserving Federated Neuromorphic Learning via Spiking Neuron Models
by Bing Han, Qiang Fu and Xinliang Zhang
Electronics 2023, 12(18), 3984; https://doi.org/10.3390/electronics12183984 - 21 Sep 2023
Cited by 4 | Viewed by 2300
Abstract
Federated learning (FL) has been broadly adopted in both academia and industry in recent years. As a bridge to connect the so-called “data islands”, FL has contributed greatly to promoting data utilization. In particular, FL enables disjoint entities to cooperatively train a shared [...] Read more.
Federated learning (FL) has been broadly adopted in both academia and industry in recent years. As a bridge to connect the so-called “data islands”, FL has contributed greatly to promoting data utilization. In particular, FL enables disjoint entities to cooperatively train a shared model, while protecting each participant’s data privacy. However, current FL frameworks cannot offer privacy protection and reduce the computation overhead at the same time. Therefore, its implementation in practical scenarios, such as edge computing, is limited. In this paper, we propose a novel FL framework with spiking neuron models and differential privacy, which simultaneously provides theoretically guaranteed privacy protection and achieves low energy consumption. We model the local forward propagation process in a discrete way similar to nerve signal travel in the human brain. Since neurons only fire when the accumulated membrane potential exceeds a threshold, spiking neuron models require significantly lower energy compared to traditional neural networks. In addition, to protect sensitive information in model gradients, we add differently private noise in both the local training phase and server aggregation phase. Empirical evaluation results show that our proposal can effectively reduce the accuracy of membership inference attacks and property inference attacks, while maintaining a relatively low energy cost. blueFor example, the attack accuracy of a membership inference attack drops to 43% in some scenarios. As a result, our proposed FL framework can work well in large-scale cross-device learning scenarios. Full article
(This article belongs to the Special Issue Data Privacy and Cybersecurity in Mobile Crowdsensing)
Show Figures

Figure 1

9 pages, 577 KB  
Article
Embedding Spanning Disjoint Cycles in Hypercube Networks with Prescribed Edges in Each Cycle
by Weiyan Wu and Eminjan Sabir
Axioms 2023, 12(9), 861; https://doi.org/10.3390/axioms12090861 - 7 Sep 2023
Cited by 5 | Viewed by 1829
Abstract
One of the important issues in evaluating an interconnection network is to study the hamiltonian cycle embedding problems. A graph G is spanning k-edge-cyclable if for any k independent edges e1,e2,,ek of G [...] Read more.
One of the important issues in evaluating an interconnection network is to study the hamiltonian cycle embedding problems. A graph G is spanning k-edge-cyclable if for any k independent edges e1,e2,,ek of G, there exist k vertex-disjoint cycles C1,C2,,Ck in G such that V(C1)V(C2)V(Ck)=V(G) and eiE(Ci) for all 1ik. According to the definition, the problem of finding hamiltonian cycle focuses on k=1. The notion of spanning edge-cyclability can be applied to the problem of identifying faulty links and other related issues in interconnection networks. In this paper, we prove that the n-dimensional hypercube Qn is spanning k-edge-cyclable for 1kn1 and n2. This is the best possible result, in the sense that the n-dimensional hypercube Qn is not spanning n-edge-cyclable. Full article
Show Figures

Figure 1

Back to TopTop