Gelişmiş Arama

Basit öğe kaydını göster

dc.contributor.authorBasavanagoud, Bommanahalen_US
dc.contributor.authorPolicepatil, Shrutien_US
dc.date.accessioned2024-01-04T17:22:32Z
dc.date.available2024-01-04T17:22:32Z
dc.date.issued2024-01
dc.identifier.citationBasavanagoud, B. & Policepatil, S. (2024). Inverse domination integrity of graphs. TWMS Journal Of Applied And Engineering Mathematics, 14(1), 103-112.en_US
dc.identifier.issn2146-1147en_US
dc.identifier.issn2587-1013en_US
dc.identifier.urihttp://belgelik.isikun.edu.tr/xmlui/handle/iubelgelik/5852
dc.identifier.urihttps://jaem.isikun.edu.tr/web/index.php/archive/123-vol14no1/1158
dc.description.abstractWith the growing demand for information transport, networks and network architecture have grown increasingly vital. Nodes and the connections that connect them make up a communication network. When the communication network’s nodes or links are destroyed, the network’s efficiency reduces. If a network is modeled by a graph, then there are various graph theoretical parameters used to express the vulnerability of communication networks such as connectivity, integrity, weak integrity, neighbor integrity, hub integrity, domination integrity, toughness, tenacity etc. In this paper, we introduce a new vulnerability parameter known as an inverse domination integrity which is defined as IDI(G) = min S?V (G) {|S| + m(G ? S)}, where S is an inverse dominating set and m(G ? S) denotes the order of largest component of G ? S. We derive few bounds of an inverse domination integrity of graphs. Also, we determine an inverse domination integrity of some families of graphs. Finally, we compute different types of measures of vulnerabilities of probabilistic neural network which are useful in classification and pattern recognition problems.en_US
dc.language.isoenen_US
dc.publisherIşık University Pressen_US
dc.relation.ispartofTWMS Journal Of Applied And Engineering Mathematicsen_US
dc.rightsinfo:eu-repo/semantics/openAccessen_US
dc.rightsAttribution-NonCommercial-NoDerivs 3.0 United States*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/3.0/us/*
dc.subjectCommunication networken_US
dc.subjectNetwork vulnerabilityen_US
dc.subjectIntegrityen_US
dc.subjectInverse domination integrityen_US
dc.titleInverse domination integrity of graphsen_US
dc.typeArticleen_US
dc.description.versionPublisher's Versionen_US
dc.identifier.volume14
dc.identifier.issue1
dc.identifier.startpage103
dc.identifier.endpage112
dc.peerreviewedYesen_US
dc.publicationstatusPublisheden_US
dc.relation.publicationcategoryMakale - Uluslararası Hakemli Dergi - Başka Kurum Yazarıen_US
dc.indekslendigikaynakScopusen_US
dc.indekslendigikaynakEmerging Sources Citation Index (ESCI)en_US


Bu öğenin dosyaları:

Thumbnail

Bu öğe aşağıdaki koleksiyon(lar)da görünmektedir.

Basit öğe kaydını göster

info:eu-repo/semantics/openAccess
Aksi belirtilmediği sürece bu öğenin lisansı: info:eu-repo/semantics/openAccess