Closeness and Residual Closeness of Harary Graphs

08/21/2023
by   Hande Tuncel Golpek, et al.
0

Analysis of a network in terms of vulnerability is one of the most significant problems. Graph theory serves as a valuable tool for solving complex network problems, and there exist numerous graph-theoretic parameters to analyze the system's stability. Among these parameters, the closeness parameter stands out as one of the most commonly used vulnerability metric. Its definition has evolved over time to enhance ease of formulation and applicability to disconnected structures. Furthermore, based on the closeness parameter, residual closeness, which is a newer and more sensitive parameter compared to other existing parameters, has been introduced as a new graph vulnerability index by Dangalchev. In this study, the outcomes of the closeness and residual closeness parameters in Harary Graphs have been examined. Harary Graphs are well-known constructs that are distinguished by having n vertices that are k-connected with the least possible number of edges.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/26/2023

Link Residual Closeness of Harary Graphs

The study of networks characteristics is an important subject in differe...
research
06/02/2021

Stability of Special Graph Classes

Frei et al. [6] showed that the problem to decide whether a graph is sta...
research
05/03/2023

Frank number and nowhere-zero flows on graphs

An edge e of a graph G is called deletable for some orientation o if the...
research
11/24/2022

Cutting Medusa's Path – Tackling Kill-Chains with Quantum Computing

This paper embarks upon exploration of quantum vulnerability analysis. B...
research
02/20/2023

Kernelizing Temporal Exploration Problems

We study the kernelization of exploration problems on temporal graphs. A...
research
07/13/2023

Closeness Centralities of Lollipop Graphs

Closeness is one of the most studied characteristics of networks. Residu...
research
12/12/2019

Graph Theory and Metro Traffic Modelling

In this article we demonstrate how graph theory can be used to identify ...

Please sign up or login with your details

Forgot password? Click here to reset