Next Article in Journal
Multiple-Attribute Decision Making Based on the Probabilistic Dominance Relationship with Fuzzy Algebras
Previous Article in Journal
Investigation of the Structural Dependence of the Cyclical Thermal Aging of Low-Voltage PVC-Insulated Cables
Previous Article in Special Issue
A Novel Problem for Solving Permuted Cordial Labeling of Graphs
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Vulnerability Measure of k-Uniform Linear Hypergraphs

1
School of Computer, Qinghai Normal University, Xining 810000, China
2
School of Mathematics and Statistics, Qinghai Minzu University, Xining 810007, China
*
Author to whom correspondence should be addressed.
Symmetry 2023, 15(6), 1187; https://doi.org/10.3390/sym15061187
Submission received: 20 April 2023 / Revised: 29 May 2023 / Accepted: 30 May 2023 / Published: 2 June 2023
(This article belongs to the Special Issue Graph Algorithms and Graph Theory II)

Abstract

:
Vulnerability refers to the ability of a network to continue functioning when part of the network is either naturally damaged or targeted for attack. In this paper, the rupture degree of graphs is employed to measure the vulnerability of uniform linear hypergraphs. First, we discuss the bounds of the rupture degrees of k-uniform linear hypergraphs. Then, we give a recursive algorithm for computing the rupture degree of k-uniform hypertrees.

1. Introduction

Many complex structures resembling a network in real life are modeled as hypergraphs, which is a generalization of graphs, see [1,2,3].
Symmetry is a significant feature in hypergraph theory, especially in uniform hypergraph theory. Recent research on the open support of hypergraphs [4], the symmetric Lagrangian function of linear three-uniform hypergraphs [5], the embeddability of hypertrees and unicyclic hypergraphs [6], and the Laplacian energy of r-uniform hypergraphs [7] have been extensively studied. These results of hypergraphs are deeply dependent on the symmetric structure.
For a hypergraph H = ( V , E ) , V = { v 1 , v 2 , , v n } is a set of elements called vertices, and E = { e 1 , e 2 , , e m } is a set of nonempty subsets of V called edges. A hypergraph with only one vertex is called a trivial hypergraph. If | e i | = k for i = 1 , 2 , , m , then H is called a k-uniform hypergraph. Clearly, ordinary graphs are referred to as two-uniform hypergraphs. A vertex v i V is said to be incident to an edge e j E if v i e j . Two vertices are said to be adjacent if they are contained in one edge, and two edges are said to be adjacent if their intersection is not empty. For a vertex v i V , its degree d ( v i ) is defined as d ( v i ) = | { e j : v i e j E } | . An edge e j E is called a pendant edge of a k-uniform hypergraph if e j contains exactly k 1 vertices of degree one. Otherwise, it is called a nonpendant edge. A hypergraph H = ( V , E ) is called a sub-hypergraph of H = ( V , E ) , denoted as H H , if V V and E E . For X V , we use H [ X ] to denote the hypergraph induced by X, where V ( H [ X ] ) = X and E ( H [ X ] ) = { e E ( H ) : e X } . H X is the hypergraph induced by V ( H ) X . For A E , we use H A to denote the sub-hypergraph of H which is obtained by deleting all edges in A and keeping vertices. Given a hypergraph H, a walk W in H is a finite alternating sequence v 1 e 1 v 2 e q v q + 1 of vertices and edges of H such that: v i V ( H ) for i = 1 , 2 , , q + 1 ; e i E ( H ) for i = 1 , 2 , , q ; and v i , v i + 1 e i for i = 1 , 2 , , q . If q > 1 and v q + 1 = v 1 , then W is called a circuit. A walk of H is called a path if no vertices and edges are repeated. A circuit W is called a cycle if no vertices and edges are repeated except v 1 = v q + 1 . A hypergraph H is connected if for any pair of vertices u , v V ( H ) , there is a path connecting u and v, otherwise H is disconnected. A component of hypergraph H is a maximal connected sub-hypergraph of H. A subset X V ( H ) is called a cut set of H if H X is disconnected. A hypergraph H is a hypertree if H is connected and acyclic. A k-uniform hypergraph H is call a k-uniform linear hypergraph if every two edges have at most one common vertex in H. Clearly, a k-uniform hypertree is a k-uniform linear hypergraph. Let G = ( V , E ) be an ordinary graph and k ( 3 ) be an integer. For any edge e = { v e , 1 , v e , k } E ( G ) , by adding k 2 new vertices v e , 2 , v e , 3 , , v e , k 1 into edge e, we obtain a hypergraph in which each edge possesses k vertices, which is called a k-uniform hypergraph that underlies graph G (k-power of graph G) and denoted by G k = ( V k , E k ) . Clearly, V k = V ( e E { v e , 2 , v e , 3 , , v e , k 1 } ) and edge set E k = { e { v e , 2 , v e , 3 , , v e , k 1 } : e E } . Clearly, G k is a k-uniform linear hypergraph.
In real life, we are becoming more and more dependent on networks, which makes it easy for us to fall into a crisis caused by a vulnerability of the network. For example, assume we have ten electronic components as vertices. If several electronic components work together to form an electronic module, then this electronic module is considered as a hyperedge with these electronic components as vertices. Based on their structural relationships, an integrated module network has been formed. The integrated module network can be seen as a hypergraph H = ( V , E ) with vertex set V and hyperedge set E. Let V = { v 1 , v 2 , , v 10 } be a set of electronic components, E = { e 1 , e 2 , , e 5 } be a set of electronic modules; see Figure 1. Obviously, if one of electronic components v i V is damaged, the electronic modules which contain v i V would be damaged and thus affect the overall function of the whole integrated module network H. In addition, we also find that if there are different electronic components or different numbers of electronic components damaged, the damage to network H is different. For example, if only one electronic component (vertex) v 1 is damaged, it will cause damage to electronic module (hyperedge) e 1 , but the other electronic modules e i ( i = 2 , 3 , 4 , 5 ) remain normal. If electronic component (vertex) v 3 is damaged, then electronic modules (hyperedges) e 1 and e 2 are damaged and electronic modules e j ( j = 3 , 4 , 5 ) are normal. In order to make all the electronic modules e i ( i = 1 , 2 , , 5 ) damaged, it is easiest to understand that all the electronic components v j ( j = 1 , 2 , , 10 ) are damaged. In fact, for network H, as long as the electronic components v 1 , v 7 , and v 10 are damaged, then all the electronic modules e i ( i = 1 , 2 , 5 ) are damaged. That is, the whole network H is completely paralyzed in this case. Therefore, how and at which cost can one restructure the network such that it becomes more robust against malicious attacks? For this purpose, many network vulnerability parameters have been proposed and studied, such as toughness [8], integrity [9], tenacity [10,11,12], scattering number [13], rupture degree, etc. These parameters are composed of some or all of the following three quantities: the number of elements that are not functioning, the number of remaining connected subnetworks, and the size of the largest remaining group within which mutual communication can still occur. Indeed, the above quantities play a key role in the robustness of networks. Although a large number of significant research works have been carried out on these parameters, all of them focus on the networks modeled by ordinary graphs, and there is still a gap in the research on the vulnerability of hypernetworks.
The concept of the rupture degree of a graph was introduced in [14], which has been well used to measure the vulnerability of networks (see [15,16,17,18,19]). In this paper, we employ this parameter to measure the vulnerability of hypergraph.
Let H = ( V , E ) be a connected hypergraph, the rupture degree of hypergraph H is defined as
r ( H ) = max { ω ( H X ) | X | τ ( H X ) : X V ( H ) , ω ( H X ) > 1 } ,
where X V ( H ) is a cut set of H, and ω ( H X ) and τ ( H X ) denote the number of components and the order of the largest component in H X , respectively. The score of X is defined as s c ( X ) = ω ( H X ) | X | τ ( H X ) . A set X V ( H ) is called an r-set of H if s c ( X ) = r ( H ) .
By the definition of the rupture degree, we focus on a graph G and its four-uniform hypergraph G 4 , which is obtained by adding two vertices to each edge of G. A example is shown in Figure 2. Obviously, { v } is an r-set of G, but not an r-set of G 4 , which has an r-set that is { u 1 , u 2 , u 3 , u 4 } . This means that it is interesting and meaningful to discuss the vulnerability by determining the rupture degree of a hypergraph.
In this paper, we first give the bounds of the rupture degree of k-uniform linear hypergraph G k that underlies graph G in Section 2. In Section 3, we discuss the problem for computing the rupture degree of k-uniform hypertree H. In Section 4, we propose a recursive algorithm for computing the r-set of k-uniform hypertree H.
Throughout this paper, by x we denote the largest integer not larger than x and by x , the smallest integer not smaller than x. Any undefined terminology and notations can be found in [20,21].

2. The Rupture Degree of k-Uniform Linear Hypergraphs

In this section, we bound the rupture degree of k-uniform linear hypergraph G k that underlies graph G with n vertices and m edges.
Lemma 1.
Let X be an r-set of k-uniform linear hypergraph G k that underlies a connected graph G. Then, τ ( G k X ) = 1 .
Proof. 
Let X be an r-set of G k , we show that τ ( G k X ) = 1 . If not, by the structure of G k , then τ ( G k X ) k . Suppose C 1 , C 2 , , C p are components of G k X such that | C i | = τ ( G k X ) k . Now, let v i C i and X * = X { v i } for 1 i p . Clearly, ω ( G k X * ) ω ( G k X ) + p ( k 2 ) and τ ( G k X * ) τ ( G k X ) ( k 1 ) . Consider k 3 and p 1 ; then,
S c ( X * ) S c ( X ) = ω ( T k X * ) τ ( G k X * ) | X * | [ ω ( T k X ) τ ( G k X ) | X | ] p ( k 2 ) p + ( k 1 ) = p ( k 3 ) + ( k 1 ) > 0 .
This contradicts the choice of X. Thus, τ ( G k X ) = 1 . □
Given a graph G = ( V , E ) , an independent set of G is a subset of vertices which contains no pair of neighbors. The independence number α ( G ) of graph G is the size of the largest independent set in G. A set of vertices S V is a vertex cover of G if every edge has at least one vertex in S. The vertex cover number of G is the minimum cardinality of a vertex cover set of G, denote by β ( G ) .
Lemma 2.
Let X be an r-set of k-uniform linear hypergraph G k that underlies connected graph G. Then, | X | = β ( G ) .
Proof. 
Let X be an r-set of k-uniform linear hypergraph G k that underlies a connected graph G. By Lemma 1, we obtain τ ( G k X ) = 1 . This means X is a vertex cover set of graph G, and thus | X | β ( G ) . Vice versa, if X is a vertex cover set of graph G, then each edge of G has at least one end vertex belonging to X. Thus, τ ( G k X ) = 1 . By the definition of β ( G ) , consider β ( G ) = | X | . It follows that X is an r-set of G k . □
By Lemmas 1 and 2, considering | V ( G k ) | = m ( k 2 ) + n , we directly obtain the rupture degree of G k in terms of the vertex cover number β ( G ) of G.
Theorem 1.
Let G k be a k-uniform linear hypergraph that underlies connected graph G with n vertices and m edges. Then,
r ( G k ) = m ( k 2 ) + n 2 β ( G ) 1 .
Unfortunately, the problem of computing the minimum vertex cover (MVC) is NPC [22]. In [23,24], the authors gave some exact algorithms for the MVC. However, all of them took an exponential time and so were not suited for practical use in large graphs. Therefore, it is interesting to discuss the bound of the r ( G k ) of k-uniform linear hypergraph G k .
In [25], Harant bounded the independence number α ( G ) of G with n vertices and m edges.
Proposition 1.
Let G be a connected graph on n vertices with m edges [25]. Then,
( 2 m + n + 1 ) ( 2 m + n + 1 ) 2 4 n 2 2 α ( G ) 1 2 + 1 4 + n ( n 1 ) 2 m .
Combine the famous formula α ( G ) + β ( G ) = n for a connected graph G with order n, we obtain the following corollary.
Corollary 1.
Let G be a connected graph on n vertices with m edges. Then,
n 1 2 1 4 + n ( n 1 ) 2 m β ( G ) ( 2 m + n + 1 ) 2 4 n 2 2 m + n 1 2 .
By Theorem 1 and Corollary 1, we directly give a bound for the rupture degree of G k as follows.
Theorem 2.
Let G k be a k-uniform linear hypergraph that underlies connected graph G with n vertices and m edges. Then,
m k ( 2 m + n + 1 ) 2 4 n 2 r ( G k ) m ( k 2 ) n + 2 1 4 + n ( n 1 ) 2 m .
Remark 1.
The bounds in Theorem 2 are the best possible ones. The upper bound can meet at k-uniform linear hypergraph K 1 , n 1 k that underlies star graph K 1 , n 1 . The lower bound can meet at k-uniform linear hypergraph K n k that underlies complete graph K n .
Clearly, if we let m = n 1 in Theorem 2, then we can obtain the bounds for the rupture degree of k-uniform hypertree T k .
Corollary 2.
Let T k be a k-uniform hypertree that underlies a tree T with order n. Then,
( n 1 ) k ( 5 n 1 ) ( n 1 ) r ( T k ) ( n 1 ) ( k 2 ) + n 1 .
Remark 2.
The bounds in Corollary 2 are also best possible. The upper bound can meet at k-uniform linear hypergraph K 1 , n 1 k that underlies star graph K 1 , n 1 . The lower bound can meet at k-uniform linear hypergraph K 2 k that underlies K 2 .
Notice that n 1 m n ( n 1 ) 2 for any connected graph G, we also obtain the following result.
Corollary 3.
Let G k be a k-uniform linear hypergraph that underlies connected graph G with order n. Then,
( n 1 ) ( k 2 ) ( n 1 ) 2 r ( G k ) n ( n 1 ) 2 ( k 2 ) + n 3 .

3. The Rupture Degree of k-Uniform Hypertrees

In this section, we discuss the rupture degree of k-uniform hypertree H. For k-uniform hypertree H, if X is an r-set of H, then we easily obtain the same result as in Lemma 1.
Lemma 3.
Let H = ( V , E ) be a k-uniform hypertree. If X is an r-set of H, then τ ( H X ) = 1 .
Lemma 4.
Let H = ( V , E ) be a k-uniform hypertree with n vertices and m edges. Then, n = m ( k 1 ) + 1 .
Proof. 
We show how to proceed by induction on m. It is clear that the conclusion holds for m = 0 , 1 . Assume the conclusion holds for m p . Now, we consider the case for m = p + 1 ; suppose e E ( H ) and H 1 , H 2 , , H k are components of H e . By the induction hypothesis, for every component H i = ( V i , E i ) and n i = | V i | , m i = | E i | for 1 i k , i · e · , V i = | E i | ( k 1 ) + 1 . Thus, we have
| V | = i = 1 k | V i | = i = 1 k ( | E i | ( k 1 ) + 1 ) = m 1 ( k 1 ) + 1 + m 2 ( k 1 ) + 1 + + m k ( k 1 ) + 1 = ( m 1 ) ( k 1 ) + k = m ( k 1 ) + 1 .
The proof is completed. □
Lemma 5.
Let H = ( V , E ) be a hypertree with | E | 2 [26]. Then, H has at least two pendant edges.
Theorem 3.
Let H = ( V , E ) be a k-uniform hypertree and X be the r-set of H. Then, r ( H ) = n 2 | X | 1 .
Proof. 
Suppose X is an r-set of k-uniform hypertree H; by Lemma 3, we have τ ( H X ) = 1 . Denote | E | = m and | V | = n ; by the structure properties of a k-uniform hypertree, we have
ω ( H X ) = m k v V X ( d ( v ) 1 ) e E ( | e X | ) .
Thus,
r ( H ) = m k v V X ( d ( v ) 1 ) e E ( | e X | ) | X | 1 = m k [ m k v X d ( v ) n + | X | ] e E ( | e X | ) | X | 1 = v X d ( v ) + n e E ( | e X | ) 2 | X | 1 .
Note that v X d ( v ) = e E ( | e X | ) , and we obtain r ( H ) = n 2 | X | 1 . □
Lemma 6.
Let H = ( V , E ) be a k-uniform hypertree with | V | = n , | E | = m , and X be the r-set of H. Then,
1 | X | m m 1 k .
Proof. 
Let X be an r-set of k-uniform hypertree H. It is easy to know that | X | 1 . On the other hand, by Theorem 3, we know that r ( H ) = ω ( H X ) | X | τ ( H X ) = n 2 | X | 1 . In order to let the value of | X | be as large as possible, it suffices that the number of components of H X increases at most k 1 when | X | adds one. This means | X | ( k 1 ) + | X | n . Consider n = m ( k 1 ) + 1 ; we have
m ( k 1 ) + 1 = n | X | k .
Thus,
| X | m m 1 k .
Because | X | is a positive integer,
| X | m m 1 k .
The proof is completed. □
Base on Theorem 3 and Lemma 6, we give the bounds of the rupture degree of k-uniform hypertree H as follows.
Theorem 4.
Let H = ( V , E ) be a k-uniform hypertree with | V | = n , | E | = m . Then,
m ( k 3 ) + 2 m 1 k r ( H ) m ( k 1 ) 2 .
Remark 3.
The bounds in Theorem 3 are best possible. The upper bound can meet at k-uniform linear hypertree K 1 , n 1 k that underlies star graph K 1 , n 1 . The lower bound can meet at k-uniform linear hypertree H, which is shown in Figure 3.

4. A Recursive Algorithm for Computing the r-Set of k-Uniform Hypertrees

Lemma 3 and Theorem 3 show that we can determine the rupture degree of k-uniform hypertree H by finding minimal cut set X to let τ ( H X ) = 1 . Here, we provide a method to obtain such vertex cut set X.
Let H be a k-uniform hypertree and e = { v 1 , v 2 , , v k } be an arbitrary edge of H. By π ( e ) = { d 1 , d 2 , , d k } , we denote the nondecreasing degree sequence of edge e with d 1 d 2 d k . For convenience, { 1 , 1 , , 1 k 1 , d } is often simplified as { 1 ( k 1 ) , d } for d 2 .
A contraction of an edge e = { v 1 , v 2 , , v k } is an operation that identifies that vertices v 1 , v 2 , , v k 1 are merged into the vertex v k and the edges incident to these vertices are transformed into the edges incident to the vertex v k in H. The resulting graph is denoted as H · e . Clearly, H · e is also a k-uniform hypertree. Similarly, by H · e 1 · e 2 we denote the graph obtained by contracting edges e 1 , e 2 in H.
Lemma 7.
Let e 1 , e 2 , , e t 1 be t 1 pendant edges of k-uniform hypertree H such that π ( e i ) = { 1 ( k 1 ) , t } for i = 1 , 2 , , t 1 . Let e be an edge with π ( e ) = { 1 ( k 2 ) , t , d } such that e 1 e 2 e t 1 e = v with d ( v ) = t . Let t , d be integer number great than 1. If X and X are an r-set of k-uniform hypertree H and H · e · e 1 · e 2 · , , · e t 1 , respectively, then X = X { v } .
Proof. 
Let X be an r-set of H · e · e 1 · e 2 · , , · e t 1 and e 1 e 2 e t 1 e = v . It follows that X { v } is an r-set of H. In fact, note that H · e · e 1 · e 2 · , , · e t 1 is also a k-uniform hypertree. Thus, by Lemma 1, we know that τ ( H · e · e 1 · e 2 · , , · e t 1 X ) = 1 . It is not difficult to check that X { v } is an r-set of H. Thus, we have X = X { v } . □
Lemma 8.
Let e 1 , e 2 , , e t 1 be t 1 pendant edges of k-uniform hypertree H such that π ( e i ) = { 1 ( k 1 ) , t } for i = 1 , 2 , , t 1 . Let e be an edge with π ( e ) = { t , d 1 , d 2 , , d k 1 } such that e 1 e 2 e t 1 e = v with d ( v ) = t 2 . Let t , d j be an integer number for j = 1 , 2 , , k 1 and at least two of d 1 , d 2 , , d k 1 are great than one. If X and X are r-sets of k-uniform hypertree H and H · e 1 · e 2 · , , · e t 1 , respectively, then X = X { v } .
Proof. 
Let X be an r-set of H · e 1 · e 2 · , , · e t 1 . Similar to Lemma 7, we know that X { v } is an r-set of H. Thus, we have X = X { v } . □
Based on Lemmas 7 and 8, we provide a recursive algorithm for computing the cardinality | X | of an r-set of k-uniform hypertree H. Let d i ( 2 ) be integer numbers for i = 1 , 2 , 3 .
Recursive algorithm:
Step 1: Set | X | = 0 .
Step 2: If H is a trivial hyperraph, go to step 10. Otherwise, go to step 3.
Step 3: For k-uniform hypertree H = ( V , E ) and set
P = { e : e E , π ( e ) = ( 1 ( k 1 ) , d 1 ) } ; Q = { e : e E , π ( e ) = ( 1 ( k 2 ) , d 2 , d 3 ) } ; U = { e : e E ( P Q ) } .
Step 4: If P Q = Ø , then let | X | | X | + 1 , go to step 10. Otherwise, go to step 5.
Step 5: If Q Ø , go to step 6. Otherwise, go to step 8.
Step 6: For each edge e i Q , if there exist e j P such that e i e j = v i j and d ( v i j ) = | { e : v i j e , e P } | + 1 , go to step 7. Otherwise, go to step 8.
Step 7: Let | X | | X | + | { v i j : v i j e , e Q } | and set H H · N [ e i ] , where N [ e i ] denote the edge set of all edges which are incident to vertex v i j in H; go to step 2.
Step 8: If U Ø , go to step 9. Otherwise, let | X | | X | + 1 , and go to step 10.
Step 9: For each edge e s U , if there exists e t P such that e s e t = v s t and d ( v s t ) = | { e : v s t e , e P } | + 1 , then let | X | | X | + | { v s t : v s t e , e U } | and H H · N [ e s ] , where N [ e s ] denote the edge set of all edges which incident to vertex v s t in H; go to step 2.
Step 10: Output the value of | X | .
Example 1.
Let T 4 be a four-uniform hypertree with | E | = 25 that underlies tree T. Using the above algorithm, we get the cardinality | X | of the r-set X of T 4 . The details of the algorithm execution are shown in Figure 4.
1. 
X { u 1 , u 2 , u 6 , u 9 , u 10 } ;
2. 
X { u 1 , u 2 , u 6 , u 9 , u 10 } { u 3 , u 8 } ;
3. 
X { u 1 , u 2 , u 6 , u 9 , u 10 , u 3 , u 8 } { u 4 , u 7 } ;
4. 
X { u 1 , u 2 , u 6 , u 9 , u 10 , u 3 , u 8 , u 4 , u 7 } { u 5 } .
Thus, X = { u 1 , u 2 , u 3 , u 4 , u 5 , u 6 , u 7 , u 8 , u 9 , u 10 } . By Lemma 4 and Theorem 3, we obtain that the rupture degree of four-uniform hypertree T 4 is r ( T 4 ) = 55 .
Example 2.
Let H be a four-uniform hypertree with | E | = 20 . Using the above algorithm, we obtain that the cardinality | X | of the r-set X of H. The details of the algorithm execution are shown in Figure 5.
(1) 
X { 1 , 9 } ;
(2) 
X { 1 , 9 } { 2 , 3 , 4 , 6 , 7 , 10 , 11 } ;
(3) 
X { 1 , 9 , 2 , 3 , 4 , 6 , 7 , 10 , 11 } { 5 , 8 } .
Thus, we have X = { 1 , 2 , 3 , 4 , 5 , 6 , 7 , 8 , 9 , 10 , 11 } . By Lemma 4 and Theorem 3, we obtain that the rupture degree of four-uniform hypertree H is r ( H ) = 38 .

5. Conclusions

The rupture degree is an important parameter measuring the vulnerability of a network. However, there are few results on the vulnerability of hypernetworks. In this paper, the parameter rupture degree was used to measure the vulnerability of uniform linear hypergraphs. In fact, many parameters of vulnerability remain unexplored for hypergraphs, and they can be explored in nonuniform or nonlinear hypergraphs. Our work may stimulate more research in this field.

Author Contributions

Supervision, H.Z.; visualization, N.Z.; writing—original draft preparation, N.Z., H.Z. and Y.L.; writing—review and editing, N.Z., H.Z. and Y.L. All authors have read and agreed to the published version of the manuscript.

Funding

This research was supported by the National Natural Science Foundation of China (grant nos. 12261071, 11661066), by the Natural Science Foundation of Qinghai Province (grant no. 2022-ZJ-924), by the National Key Research and Development Program of China (grant no. 2020YFC1523300).

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
MVCMinimum vertex cover
NPCNP-complete

References

  1. Konstantinova, E.V.; Skorobogatov, V.A. Application of hypergraph theory in chemistry. Discret. Math. 2001, 235, 365–383. [Google Scholar] [CrossRef] [Green Version]
  2. Young, J.G.; Petri, G.; Peixoto, T.P. Hypergraph reconstruction from network data. Commun. Phys. 2021, 4, 135. [Google Scholar] [CrossRef]
  3. Wang, L.; Egorova, E.K.; Mokryakov, A.V. Development of Hypergraph Theory. J. Comput. Syst. Sci. Int. 2018, 57, 109–114. [Google Scholar] [CrossRef]
  4. Wu, S.; Wang, M. Open Support of Hypergraphs under Addition. Symmetry 2022, 14, 669. [Google Scholar] [CrossRef]
  5. Hu, S.; Wu, B. A Note on the Lagrangian of Linear 3-Uniform Hypergraphs. Symmetry 2022, 14, 1402. [Google Scholar] [CrossRef]
  6. Wang, G.; Chen, L.; Xiong, Z. The l1-Embeddability of Hypertrees and Unicyclic Hypergraphs. Symmetry 2022, 14, 2260. [Google Scholar] [CrossRef]
  7. Yalcin, N.F. On Laplacian Energy of r-Uniform Hypergraphs. Symmetry 2023, 15, 382. [Google Scholar] [CrossRef]
  8. Chvátal, V. Tough graphs and Hamiltonian circuits. Discret. Math. 1973, 5, 215–228. [Google Scholar] [CrossRef] [Green Version]
  9. Barefoot, C.A.; Entringer, R.; Swart, H. Vulnerability in graphs—A comparative survey. J. Comb. Math. Comb. Comput. 1987, 1, 13–21. [Google Scholar]
  10. Choudum, S.A.; Priya, N. Tenacity of complete graph product and grids. Networks 1999, 34, 192–196. [Google Scholar] [CrossRef]
  11. Piazza, B.L.; Roberts, F.S.; Stueckle, S.K. Edge tenacious networks. Networks 1995, 25, 7–17. [Google Scholar] [CrossRef]
  12. Cozzen, M.; Moazzami, D.; Stueckle, S. The tenacity of a graph. In Seventh International Conference on the Theory and Applications of Graphs; Wiley: New York, NY, USA, 1995; pp. 1111–1122. [Google Scholar]
  13. Zhang, S.G.; Wang, Z.G. Scattering number in graphs. Networks 2001, 37, 102–106. [Google Scholar] [CrossRef]
  14. Li, Y.K.; Zhang, S.G.; Li, X.L. Rupture degree of graphs. Int. J. Comput. Math. 2005, 82, 793–803. [Google Scholar] [CrossRef]
  15. Li, F.; Li, X.L. Computing the rupture degrees of graphs. ISPAN 2004, 1, 368–373. [Google Scholar]
  16. Li, Y.K. The rupture degree of trees. Int. J. Comput. Math. 2008, 85, 1629–1635. [Google Scholar] [CrossRef]
  17. Wang, Z.; Wang, Z. Relationships between rupture degree and other parameters. Int. J. Comput. Math. 2006, 83, 793–803. [Google Scholar] [CrossRef]
  18. Kirlangic, A. The rupture degree and gear graphs. Bull. Malays. Math. Sci. Soc. 2009, 7, 73–80. [Google Scholar]
  19. Li, F.; Ye, Q.; Li, X. Tenacity and rupture degree of permutation graphs of complete bipartite graphs. Bull. Malays. Math. Sci. Soc. 2011, 2, 173–180. [Google Scholar]
  20. Berge, C. Graphs and Hypergraphs, 2nd ed.; North-Holland: Amsterdam, The Netherlands, 1976; Volume 6. [Google Scholar]
  21. Bondy, J.A.; Murty, U.S.R. Graph Theory; Springer: New York, NY, USA, 2008. [Google Scholar]
  22. Cook, S. The P versus NP Problem; Clay Mathematics Institute: Peterborough, NH, USA, 2000. [Google Scholar]
  23. Akiba, T.; Iwata, Y. Branch-and-reduce exponential/FPT algorithms in practice: A case study of vertex cover. Theor. Comput. Sci. 2016, 609, 211–225. [Google Scholar] [CrossRef]
  24. Delbot, F.; Laforest, C.; Phan, R. New approximation algorithms for the vertex cover problem. In International Workshop on Combinatorial Algorithms; Springer: Berlin/Heidelberg, Germany, 2013; pp. 438–442. [Google Scholar]
  25. Harant, J.; Schiermeyer, I. On the independence number of a graph in terms of order and size. Discrete. Math. 2001, 232, 131–138. [Google Scholar] [CrossRef] [Green Version]
  26. Mao, J.Z. On the Tree of Hypergraph: Hypertree. J. Cent. China Norm. Univ. 1982, 48–52. [Google Scholar]
Figure 1. The integrated module network H.
Figure 1. The integrated module network H.
Symmetry 15 01187 g001
Figure 2. Graph G and 4-uniform hypergraph G 4 that underlies graph G.
Figure 2. Graph G and 4-uniform hypergraph G 4 that underlies graph G.
Symmetry 15 01187 g002
Figure 3. A k-uniform hypertree with a minimum rupture degree.
Figure 3. A k-uniform hypertree with a minimum rupture degree.
Symmetry 15 01187 g003
Figure 4. Computing the rupture degree of 4-uniform hypertree T 4 by our recursive algorithm.
Figure 4. Computing the rupture degree of 4-uniform hypertree T 4 by our recursive algorithm.
Symmetry 15 01187 g004
Figure 5. Rupture degree of 4-uniform hypertree H obtained by our recursive algorithm.
Figure 5. Rupture degree of 4-uniform hypertree H obtained by our recursive algorithm.
Symmetry 15 01187 g005
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Zhao, N.; Zhao, H.; Li, Y. A Vulnerability Measure of k-Uniform Linear Hypergraphs. Symmetry 2023, 15, 1187. https://doi.org/10.3390/sym15061187

AMA Style

Zhao N, Zhao H, Li Y. A Vulnerability Measure of k-Uniform Linear Hypergraphs. Symmetry. 2023; 15(6):1187. https://doi.org/10.3390/sym15061187

Chicago/Turabian Style

Zhao, Ning, Haixing Zhao, and Yinkui Li. 2023. "A Vulnerability Measure of k-Uniform Linear Hypergraphs" Symmetry 15, no. 6: 1187. https://doi.org/10.3390/sym15061187

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop