A heuristic algorithm to find rupture degree in graphs

被引:3
作者
Durgut, Rafet [1 ]
Turaci, Tufan [2 ]
Kutucu, Hakan [1 ]
机构
[1] Karabuk Univ, Dept Comp Engn, Karabuk, Turkey
[2] Karabuk Univ, Dept Math, Karabuk, Turkey
关键词
Network design and communication; graph vulnerability; connectivity; rupture degree; heuristic algorithm; VULNERABILITY;
D O I
10.3906/elk-1903-29
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Since the problem of Konigsberg bridge was released in 1735, there have been many applications of graph theory in mathematics, physics, biology, computer science, and several fields of engineering. In particular, all communication networks can be modeled by graphs. The vulnerability is a concept that represents the reluctance of a network to disruptions in communication after a deterioration of some processors or communication links. Furthermore, the vulnerability values can be computed with many graph theoretical parameters. The rupture degree r(G) of a graph G = (V, E) is an important graph vulnerability parameter and defined as r(G) = max{omega(G - S) - vertical bar S vertical bar - m(G - S) : omega(G - S) >= 2, S subset of V}, where omega(G - S) and m(G - S) denote the number of connected components and the size of the largest connected component in the graph G - S, respectively. Recently, it has been proved that finding the rupture degree problem is NP- complete. In this paper, a heuristic algorithm to determine the rupture degree of a graph has been developed. Extensive computational experience on 88 randomly generated graphs ranging from 20% to 90% densities and from 100 to 200 vertices shows that the proposed algorithm is very effective.
引用
收藏
页码:3433 / 3441
页数:9
相关论文
共 50 条
  • [41] Flip Graphs of Bounded Degree Triangulations
    Aichholzer, Oswin
    Hackl, Thomas
    Orden, David
    Ramos, Pedro
    Rote, Gunter
    Schulz, Andre
    Speckmann, Bettina
    GRAPHS AND COMBINATORICS, 2013, 29 (06) : 1577 - 1593
  • [42] Relationships between rupture degree and other parameters
    Wang, Zhipang
    Wang, Zhongtuo
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2006, 83 (12) : 839 - 851
  • [43] Research of heuristic algorithm for flow shop
    Tang, Dan
    Huang, Jian
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2013, 42 (06): : 921 - 925
  • [44] A Heuristic Algorithm for Flowshop Scheduling Problem
    Tang, Dan
    Shu, Hong Ping
    MANUFACTURING ENGINEERING AND AUTOMATION II, PTS 1-3, 2012, 591-593 : 626 - 630
  • [45] A Heuristic Algorithm for the Band Collocation Problem
    Gursoy, Arif
    Kurt, Mehmet
    Kutucu, Hakan
    Nuriyev, Urfat
    2016 IEEE 10TH INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGIES (AICT), 2016, : 473 - 476
  • [46] HEURISTIC ALGORITHM FOR THE PIN CODE GENERATION
    Grondzak, Karol
    Kortis, Peter
    INTERNATIONAL JOURNAL ON INFORMATION TECHNOLOGIES AND SECURITY, 2010, 2 (01): : 53 - 58
  • [47] A new heuristic algorithm for rectangle packing
    Huang, Wenqi
    Chen, Duanbing
    Xu, Ruchu
    COMPUTERS & OPERATIONS RESEARCH, 2007, 34 (11) : 3270 - 3280
  • [49] An evolutionary heuristic algorithm for the assignment problem
    Ramadoss, Senthil Kumar
    Singh, Ajit Pal
    Mohiddin, Illauddin Kamaluddin Gulam
    OPSEARCH, 2014, 51 (04) : 589 - 602
  • [50] A heuristic algorithm for the strip packing problem
    Jianli Chen
    Wenxing Zhu
    Zheng Peng
    Journal of Heuristics, 2012, 18 : 677 - 697