نتایج جستجو برای: l-connectivity and tenacity

تعداد نتایج: 16952653  

Journal: :journal of algorithms and computation 0
mahmood shabankhah university of tehran, college of engineering, department of engineering science

many graph theoretical parameters have been used to describe the vulnerability of communication networks, including toughness, binding number, rate of disruption, neighbor-connectivity, integrity, mean integrity, edgeconnectivity vector, l-connectivity and tenacity. in this paper we discuss integrity and its properties in vulnerability calculation. the integrity of a graph g, i(g), is defined t...

In this paper we discuss about tenacity and its properties in stability calculation. We indicate relationships between tenacity and connectivity, tenacity and binding number, tenacity and toughness. We also give good lower and upper bounds for tenacity.

Journal: :journal of algorithms and computation 0
dara moazzami university of tehran, college of engineering, department of engineering science

if we think of the graph as modeling a network, the vulnerability measure the resistance of the network to disruption of operation after the failure of certain stations or communication links. many graph theoretical parameters have been used to describe the vulnerability of communication networks, including connectivity, integrity, toughness, binding number and tenacity.in this paper we discuss...

Journal: :journal of algorithms and computation 0
peyman nasehpour department of algorithms and computation, faculty of engineering science, university of tehran

in this paper we discuss about tenacity and its properties in stability calculation. we indicate relationships between tenacity and connectivity, tenacity and binding number, tenacity and toughness. we also give good lower and upper bounds for tenacity.

In this paper we discuss about tenacity and its properties in stability calculation. We indicate relationships between tenacity and connectivity, tenacity and binding number, tenacity and toughness. We also give good lower and upper bounds for tenacity. Since we are primarily interested in the case where disruption of the graph is caused by the removal of a vertex or vertices (and the resulting...

Many graph theoretical parameters have been used to describe the vulnerability of communication networks, including toughness, binding number, rate of disruption, neighbor-connectivity, integrity, mean integrity, edgeconnectivity vector, l-connectivity and tenacity. In this paper we discuss Integrity and its properties in vulnerability calculation. The integrity of a graph G, I(G), is defined t...

The tenacity of a graph G, T(G), is dened by T(G) = min{[|S|+τ(G-S)]/[ω(G-S)]}, where the minimum is taken over all vertex cutsets S of G. We dene τ(G - S) to be the number of the vertices in the largest component of the graph G - S, and ω(G - S) be the number of components of G - S.In this paper a lower bound for the tenacity T(G) of a graph with genus γ(G) is obtained using the graph's connec...

If we think of the graph as modeling a network, the vulnerability measure the resistance of the network to disruption of operation after the failure of certain stations or communication links. Many graph theoretical parameters have been used to describe the vulnerability of communication networks, including connectivity, integrity, toughness, binding number and tenacity.In this paper we discuss...

Journal: :journal of algorithms and computation 0
hamid doost hosseini university of tehran, college of engineering, school of civil engineering

the tenacity of a graph g, t(g), is de ned by t(g) = min{[|s|+τ(g-s)]/[ω(g-s)]}, where the minimum is taken over all vertex cutsets s of g. we de ne τ(g - s) to be the number of the vertices in the largest component of the graph g - s, and ω(g - s) be the number of components of g - s.in this paper a lower bound for the tenacity t(g) of a graph with genus γ(g) is obtained using the graph's...

Journal: :journal of algorithms and computation 0
mahmood shabankhah university of tehran, college of engineering, faculty of engineering science

the analysis of vulnerability in networks generally involves some questions about how the underlying graph is connected. one is naturally interested in studying the types of disruption in the network that maybe caused by failures of certain links or nodes. in terms of a graph, the concept of connectedness is used in di erent forms to study many of the measures of vulnerability. when certain ver...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید