Preprint
Article

Tightness of Harary Graphs

This version is not peer-reviewed.

Submitted:

14 August 2024

Posted:

16 August 2024

You are already at the latest version

A peer-reviewed article of this preprint also exists.

Abstract
In the design of real-world networks, researchers evaluate various structural parameters to assess vulnerability, including connectivity, toughness, and tenacity. Recently, the tightness metric has emerged as a potentially superior vulnerability measure, although many related theorems remain unknown due to its novelty. Harary graphs, known for their maximum connectivity, are an important class of graph models for network design. Prior work has evaluated the vulnerability of three types of Harary graphs using different parameters, but the tightness metric has not been thoroughly explored. This article aims to calculate the tightness values for all three types of Harary graphs. First, it will attempt to calculate the lower bound for the value of the tightness parameter in Harary graphs using existing lemmas and theorems. Then, by presenting new lemmas and theorems, we will try to find the exact value or upper bound for this parameter in Harary graphs. For the first type of Harary graph, the tightness is precisely determined, while for the second and third types, upper bounds are provided due to structural complexity. The lemmas, theorems, and proof methods presented in this research may be used to calculate other graph and network parameters. However, the newness of the tightness parameter means that further research is needed to fully characterize its properties.
Keywords: 
Subject: 
Computer Science and Mathematics  -   Applied Mathematics

1. Introduction

The concept of networks is prevalent across many scientific fields, and analyzing network characteristics is crucial. Parameters such as minimum and maximum degree, diameter, connectivity, clustering coefficient, and vulnerability level are commonly used to analyze networks modeled as graphs. Among these parameters, graph vulnerability parameters are particularly important. Vulnerability parameters aim to mathematically evaluate a graph or network’s weakest points by optimizing an objective function. This allows researchers to identify potential points of failure or instability within a network model. The analysis of network vulnerability is essential for designing robust and resilient real-world systems, whether in fields like communications, transportation, power grids, or social networks.
Some widely studied vulnerability parameters include: Connectivity ( κ ) [13,18,21,22], Toughness (t) [1,5,8,12,20], Tenacity (T) [2,17,19], Integrity (I) [6,7,17], Binding number (b) [1,4,23], and Scattering number (s) [14,16,17]. These parameters examine vulnerability from different perspectives. For example, toughness considers the number of cutting vertices and resulting components, while tenacity also incorporates the size of the largest remaining component.
The mathematical formulations of these vulnerability parameters are typically presented in both vertex-based and edge-based forms, depending on whether vertex cuts or edge cuts are being evaluated. Equations (1) and (2) respectively show the relationships of toughness and tenacity parameters in vertex mode, where ω ( G C ) is the number of components and τ ( G C ) is the largest component in ( G C ) . Understanding and quantifying the vulnerability of networks using these graph theoretic parameters is crucial for designing robust real-world networks across various domains. The diversity of vulnerability metrics highlights the complexity of assessing network resilience.
t ( G ) = min C V ( G ) C ω ( G C )
T ( G ) = min C V ( G ) C + τ ( G C ) ω ( G C )
Evaluating the effectiveness of graph and network vulnerability parameters is a critical step in understanding their practical usefulness. Javan et al. [10] outlined several desirable characteristics that an effective vulnerability metric should possess. Drawing on this framework, they introduced a novel parameter called "tightness" that aims to embody these ideal properties as closely as possible.
The mathematical formulations for tightness in both the vertex-based and edge-based contexts are provided in Equations (3) and (4), respectively. These expressions leverage the ratio of the cut set size ( C ) to the number of removed paths, quantified as the difference between the total number of graph paths ν 2 and the sum of the path counts within each disconnected component i s i 2 . This ratio reflects the cost-to-benefit tradeoff, where the numerator represents the cost of the cut and the denominator encapsulates the benefit in terms of disrupted paths.
Additionally, the inclusion of the total number of graph edges ( ε ) enhances the distinguishability of the tightness metric. Moreover, the incorporation of normalization coefficients (2, ν , ν 1 , where ν is the graph order) ensures that the metric exhibits desirable properties such as normality, comparability, monotonicity, unambiguity, and high distinguishability for connected graphs [10].
J ( G ) = min C V ( G ) 2 ε C ν ν 2 i = 1 ω ( G C ) s i 2
J e ( G ) = min C E ( G ) 2 ε C ν ( ν 1 ) ν 2 i = 1 ω ( G C ) s i 2
By considering the constant values of ε = E ( G ) and ν = V ( G ) , and the function f ( G , C ) as defined in relation (5), we can simplify the mathematical formulations. Specifically, relations (3) and (4) can be rewritten as the more concise expressions (6) and (7), respectively. With these streamlined representations, the objective becomes minimizing the function f ( G , C ) , which captures the ratio of the cut set size C to the number of disrupted paths in ( G C ) . This optimization problem reflects the fundamental tradeoff between the cost of the cut and the benefit of the resulting connectivity disruption.
f ( G , C ) = C ν 2 i = 1 ω ( G C ) s i 2
J ( G ) = 2 ε ν × min C V ( G ) f ( G , C )
J e ( G ) = 2 ε ν ( ν 1 ) × min C E ( G ) f ( G , C )
In the design of real-world networks, assessing the vulnerability of those networks is of paramount importance. As such, calculating and comparing vulnerability parameters is a fundamental requirement when working with network models and graph structures.
To this end, researchers have extensively analyzed the vulnerability metrics across a diverse range of named graphs, including Harary [3,9,15], Cayley [11], bipartite [5], barbell [22], fuzzy [21], Kneser [20], and even random graphs [8].
Notably, Harary graphs have emerged as a crucial tool for vulnerability analysis. These graphs, denoted as H ( n , m ) , represent a specific class of m-connected graphs with n vertices that possess the minimum possible number of edges [9]. This structural property makes Harary graphs an important model for studying vulnerability in real-world networks.These graphs are classified into three distinct types, depending on the number of vertices and the desired connectivity level (m). The edges in each Harary graph type is characterized by the following expressions, where the addition of indices is performed modulo n:
  • Type (a)m is even:
    E ( H a ( n , m ) ) = i = 0 n 1 j = 1 m / 2 ( v i , v i + j )
  • Type (b)m is odd and n is even:
    E ( H b ( n , m ) ) = i = 0 n 1 j = 1 m / 2 ( v i , v i + j ) i = 0 ( n 2 ) / 2 ( v i , v i + n / 2 )
  • Type (c)m is odd and n is odd:
    E ( H c ( n , m ) ) = i = 0 n 1 j = 1 m / 2 ( v i , v i + j ) i = 0 ( n 1 ) / 2 ( v i , v i + ( n + 1 ) / 2 )
Figure 1 shows three example of these types of Harary graphs.
This study attempts to quantify the tightness parameter for three distinct classifications of Harary graphs. For this purpose, Section 2 uses relevant lemmas and results to derive upper bounds, lower bounds, and as accurate as possible values of this important parameter in three types of Harary graphs. Finally, the Conclusion section synthesizes the findings of this work and provides a comprehensive perspective on the significance and implications of our analysis. The obtained results may be used extensively in the design of real-world networks. Additionally, the methodologies presented could be valuable in proving related theorems in the field of graph theory.

2. Tightness of Harary Graphs

In this section, we will focus on different methods for evaluating the vulnerability of Harary graphs using the tightness parameter. Due to the varying structures of the three Harary graph types, distinct approaches will be required to calculate the tightness parameter values.
The lemmas, corollaries, and methodologies presented in this section may have broader applications beyond the specific context of Harary graphs. They could potentially be useful in solving other graph-theoretic problems and expanding the understanding of the tightness metric and its relationships with other graph parameters.
First, we will examine practical lemmas for finding the limits of tightness in Harary graphs. Lemma 1 shows the comparability property of the tightness parameter, as demonstrated in [10].
Lemma 1.
If G is a spanning subgraph of H, then J ( H ) J ( G ) , J e ( H ) J e ( G ) .
Theorem 1 also shows the value of tightness for cycle graphs [10].
Theorem 1.
If C n is a cycle graph with n vertices ( n > 3 ) then:
J ( C n ) = 4 n 2 n 2 2 2 n 2 2 2
Based on Lemma 1 and Theorem 1 the Corollary 1 can be derived.
Corollary 1.
If G is Hamiltonian, then:
J ( G ) 4 n 2 n 2 2 2 n 2 2 2
Harary graphs are Hamiltonian for n > m 2 . Therefore, Corollary 1 holds for Harary graphs and can be writen as Corollary 2.
Corollary 2.
If H ( m , n ) is a Harary graph with n vertices and connectivity m, then:
J H ( m , n ) 4 n 2 n 2 2 2 n 2 2 2
The calculation of more accurate bounds can also be achieved by using the relationship between tightness and the rest of the graph parameters. For example, the connectivity of Harary graphs is equal to m. This problem shows that in order to divide the graph into two parts, we need to remove at least m vertices. Therefore, to find the upper limit, it is possible to establish a relationship between tightness and connectivity. Theorem 2 shows the relationship between tightness and connectivity.
Theorem 2.
If H ( m , n ) is a Harary graph with n vertices and connectivity m, then:
J H ( n , m ) 2 m 2 2 n m m 2 + 2 n 3 m 2
Proof. 
The connectivity of Harary graphs is m. Therefore, by removing m vertices from these types of graphs, the graph can be divided into smaller components. Increasing the number of components causes the loss of more paths in the graph and reduces the objective function of the tightness parameter. Thus, to find an reliable upper bound, we consider the worst case of this division. Therefore, we consider that two components created by removing m vertices from the Harary graphs as s i and s j . With this method, the objective function can be expressed as Equation (11), where C = m and s i + s j = n m .
f ( H ( n , m ) , C ) = m n 2 s i 2 + s j 2 = 2 m n 2 n s i 2 + s i s j 2 + s j = 2 m n 2 n s i 2 + s i ( n m s i ) 2 + ( n m s i ) = 2 m 2 n m m 2 m + 2 s i ( n m s i )
Considering fixed values for n and m, the maximum value of the objective function in relation (11) occurs when the denominator of the fraction has its smallest value.
The minimum value of the denominator of the Equation (11) also occurs when 2 s i ( n m s i ) becomes minimum. The minimum value for 2 s i ( n m s i ) also occurs when s i = 1 or s i = n m 1 . As shown below, the value of the objective function will be the same for any initialization of s i .
s i = 1 2 s i ( n m s i ) = 2 ( n m 1 ) s i = n m 1 2 s i ( n m s i ) = 2 ( n m 1 )
Therefore, the upper bound for the objective function f H ( n , m ) and J H ( n , m ) can be expressed by Equations (12) and (13), respectively.
f ( H ( n , m ) , C ) 2 m 2 n m m 2 + 2 n 3 m 2
J ( H ( n , m ) ) 2 m 2 2 n m m 2 + 2 n 3 m 2
In this section, the upper and lower bounds for tightness of Harary graphs were calculated approximately. In the following, we will take a closer look at tightness values for these types of graphs.

2.1. Tightness of Harary Graphs Type (a)

In our analysis of Harary graphs of type (a), we consider the scenario where certain sets of vertices, denoted as C i , are removed in order to calculate the value of the tightness parameter J ( G ) . Correspondingly, other sets of vertices, denoted as S j , remain in the graph as connected components. For the sake of simplicity, we assume that the indices of the vertices within each deleted set C i and each remaining component S j are consecutive. The validity of this approach will be established through a series of rigorous lemmas and corollaries presented in the subsequent sections. Consequently, we can define a set S comprising all the vertices belonging to the remaining components S j , as well as a cut set C encompassing all the deleted vertex sets C i . With this vertex cut in place, we can further partition the paths removed from the Harary graph of type (a) into three distinct categories: P ( C , C ) , P ( C , S ) , and P ( S , S ) . The value P ( C , C ) represents the deleted paths connecting vertices within the cut set C, P ( C , S ) denotes the deleted paths between vertices in the cut set C and the vertices in the remaining components S, and P ( S , S ) corresponds to the deleted paths between vertices within the components S.
Moreover, for the removal of a set of vertices in the Harary graphs of type (a) to successfully separate two components, the cardinality of each cut set C i must be greater than or equal to m / 2 , where m is the desired connectivity for Harary graph.
Equations (14) through (17) provide the mathematical formulations of these variables, where c i = C i , s i = S i , c = C , s = S , and k is the number of remaining components.
C = i = 1 k C i , S = i = 1 k S i
P ( C , C ) = c 2 = c 2 c 2
P ( C , S ) = c s
P ( S , S ) = i = 1 k 1 j = i + 1 k s i s j
To determine the tightness of Harary graphs of type (a), we will seek to minimize the objective function denoted as f ( G , C ) . This objective function can be expressed in terms of the previously defined sets C and S, as shown in Equation (18).
f ( H a ( n , m ) , C ) = C P ( C , C ) + P ( C , S ) + P ( S , S ) = c ( c 2 c ) / 2 + c s + i = 1 k 1 j = i + 1 k s i s j
To determine the minimum value of the function f ( G , C ) , we must first establish several foundational lemmas. Lemma 2 will demonstrate that the size of the components must be sufficiently small in order to minimize the values of f ( G , C ) . The proof of this key lemma will illuminate the underlying structure and properties of the function f ( G , C ) , providing crucial insights that will guide us towards the global minimum.
Lemma 2.
If, after identifying the vertex cut set C in Harary graphs of type (a), we obtain f ( G , C ) = a / b , then the value of f ( G , C ) is not at its minimum if the size of the largest component is greater than b / a + 1 .
Proof. 
Suppose that a vertex v is removed from a component S i . The number of new deleted paths will be at least s i 1 , where s i = S i . If v is a cut vertex, then the number of new deleted paths will be greater than s i 1 . Therefore, to maximize the number of deleted paths, it is optimal to select this vertex from the largest component. Consequently, the ratio of the number of deleted vertices to the number of deleted paths will be equal to 1 / ( s m a x 1 ) , where S m a x is the largest component of ( G C ) and s m a x = S m a x .
Given that s m a x > b / a + 1 , and denoting P = P ( C , C ) + P ( C , S ) + P ( S , S ) and c = C , using relations (19) ,we can conclude that the value of objective function f ( G , C ) is not at its minimum.
s m a x > b a + 1 s m a x 1 > b a = P c ( s m a x 1 ) c > P ( s m a x 1 ) c + P c > P + P c c ( P + s m a x 1 ) > P ( c + 1 ) c P > c + 1 P + s m a x 1 f ( G , C ) > f ( G , C + v )
Therefore, by repeatedly removing vertices from the largest component of Harary graphs type (a), when the size of the component exceeds the desired limit, we can reduce the value of the objective function.
This repetition may causes large components to be divided into smaller components. The vertices removed from this component, if they create a cut, in addition to the removed paths between C vertices, they also destroy the path between some S m a x vertices. This will lead to a decrease in the value of f ( G , C ) . Although Lemma 2 does not give us a general view of the optimal tightness value, it can be used for a superficial examination of the results obtained from the calculations.
According to Lemma 2, after reducing the objective function f ( G , C ) , if there is a cut vertex within any component S i , the cut vertex can be replaced with its right or left vertex and this can be done until the index of the cut vertices as well as the index of the components became consecutive. Thus, the following corollary can be derived:
Corollary 3.
In Harary graphs of type (a), the indices of the vertices of each component S i and each cut set C i can be considered consecutive to find the minimum value of f ( G , C ) .
Figure 2 shows a desirable partition for Harary graphs type (a) based on mentioned lemmas and corollaries.
Considering the fixed number of cutting vertices, to minimize the objective function f ( H a ( n , m ) , C ) , P ( S , S ) must be maximized. To maximize P ( S , S ) , the size difference of the generated components should be minimized. In other words, the size difference of all created components must be at most 1. This issue has been studied under Lemma 3.
Lemma 3.
With a constant number of cutting vertices in H a ( n , m ) , the minimized value of f ( H a ( n , m ) , C ) occurs when 1 i , j k : s i s j 1 , where k is the number of remaining components after the cut, and s i and s j are the sizes of the i-th and j-th components, respectively.
Proof. 
To minimize the objective function f ( H a ( n , m ) , C ) , P ( S , S ) must be maximized. Suppose there are two components S p and S q with sizes s p and s q , respectively, where s p s q > 1 . Without loss of generality, suppose that s p > ( s q + 1 ) or ( s p s q 1 ) > 0 .
By removing a vertex from the larger component and adding a vertex to the smaller component, we actually shift the vertices between them (cut sets and components) by one vertex towards the larger component. With this, the value of P ( S , S ) changes in the form of Equation (20), which indicates the increase of this value.
P n e w ( S , S ) = i = 1 k 1 j = i + 1 k s i s j = i = 1 i p i q k 1 j = i + 1 i p i q k s i s j + ( s p 1 ) i = 1 i p i q k s i + ( s q + 1 ) j = 1 j p j q k s j + ( s p 1 ) ( s q + 1 ) = i = 1 i p i q k 1 j = i + 1 i p i q k s i s j + s p i = 1 i p i q k s i + s q j = 1 j p j q k s j + s p s q + ( s p s q 1 ) = P ( S , S ) + ( s p s q 1 ) > P ( S , S )
By repeating the operation of removing a vertex from the largest component and adding it to the smallest one, the upward trend of P ( S , S ) will continue. This operation can be done until the size of the components are almost balanced, or in other words, 1 i , j k : s i s j 1 . This ensures the minimization of the size difference between the components, which in turn maximizes P ( S , S ) and minimizes the objective function f ( H a ( n , m ) , C ) . □
Using Lemma 3, and assuming continuous values for c, s, and k, the Equation (18) can be written as Equation (21).
f C o n t i n u o u s ( H a ( n , m ) , C ) = c ( c 2 c ) / 2 + c s + i = 1 k 1 j = i + 1 k ( s k ) 2 = c ( c 2 c ) / 2 + c s + ( ( k 2 k ) / 2 ) ( s k ) 2 = 2 c c 2 c + 2 c s + ( k 2 k ) ( s k ) 2
Given the fact that c + s = n , the Equation (21) can be rewritten in terms of c as Equation (22).
f C o n t i n u o u s ( H a ( n , m ) , C ) = 2 c c 2 c + 2 c ( n c ) + ( k 1 ) ( n c ) 2 k = 2 c 2 n c c 2 c + k 1 k n c 2
By differentiating the continuous function in Equation (22) with respect to the variable c ( d f c o n t i n u o u s / d c = 0 ), the extremum value is obtained as c = ± n 1 k . However, these obtained values are not acceptable while k > 1 . Therefore, the continuous function in Equation (22) will be either ascending or descending.
Assigning 0 and n to the variable c, the obtained values are 0 and 2 / ( n 1 ) , respectively. Thus, to minimize the value of the function in Equation (22), the value of c must be minimized. Additionally, the minimum value of c is achieved when the cut occurs, i.e., c = m . Furthermore, the minimum value of c = m makes the value of k equal to 2. Therefore, the continuous function in Equation (22) can be written as Equation (23).
f C o n t i n u o u s ( H a ( n , m ) , C ) = 2 m 2 n m m 2 m + 1 2 n m 2
Although the calculations of the tightness value of Herary graphs type (a) have been done accurately and by mathematical relations, we can still use Lemma 2 to re-examine the results. The size of the largest component with this cut will be s m a x = ( n m ) / 2 , and ( n m ) / 2 1 / f Continuous ( H a ( n , m ) , C ) + 1 . Therefore, based on Lemma 2, there is no need to add a new vertex to the cut set.
Accordingly, to calculate the tightness of Harary graphs type (a), two components, as large as possible, with minimum different sizes have to be created after cutting. Therefore, based on the previous lemmas and corollaries, having ν = n and ε = n m / 2 , f ( H a ( n , m ) , C ) and J ( H a ( n , m ) ) can be written as Equations (24) and (25) in the discrete space, respectively. Figure 3 shows an optimal cut for calculating J ( H ( 9 , 4 ) ) .
min C V ( H a ( n , m ) ) { f ( H a ( n , m ) , C ) } = 2 m 2 n m m 2 m + 2 n m 2 × n m 2 )
J ( H a ( n , m ) ) = n m n × 2 m 2 n m m 2 m + 2 n m 2 × n m 2 = 2 m 2 2 n m m 2 m + 2 n m 2 × n m 2

2.2. Tightness of Harary Graphs Types (b) and (c)

Calculating the tightness value of Harary graphs type (a) required intricate mathematical relationships and theorems. In contrast, Harary graphs types (b) and (c) possess more complex structures, suggesting that determining their tightness values would be far more arduous. As illustrated in Figure 4, obtaining an optimal vertex cut is exceptionally challenging for these two graph types, as each vertex is connected to its opposite counterpart. This cut can be executed in two ways: by either completely removing the opposite vertices, as shown in Figure 4a, resulting in a consecutiveness vertices index for the component, or by partially removing them, as depicted in Figure 4b, leading to a non-consecutiveness vertices index for the component. Both approaches increase the complexity of the problem significantly.
Therefore, in this section, we will endeavor to provide a suitable upper bound for the tightness value of Harary graphs types (b) and (c). Based on the calculated tightness for Harary graphs type (a), it can be concluded that this parameter does not increase the number of components in the graph.
Accordingly, to find a good upper bound for the tightness parameter in Harary graphs types (b) and (c), suppose we want to split the graph into two components. Therefore, separating one component from the graph makes the rest of the graph contain at least one other component. So, to calculate a good upper bound, we will focus on isolating a component from the graph.
Figure 5 shows the general state of this separation, in which the set of vertices S represents the desired component, while the sets of vertices C R , C L , and C F are the cut vertices on the right, left, and opposite sides of the desired component, respectively.
By removing the cut vertices C R , C L , and C F , the removed paths are divided into three sections: P ( C , C ) , P ( C , S R ) , and P ( S , R ) , where C = C R C L C F , S is the component, and R is the remaining vertices after cutting, or R = V ( G ) C S . In the continuation of the process of finding the upper bound for the tightness of Harary graphs types (b) and (c), we will assume that R are connected, or in other words, P ( R , R ) = 0 .
Suppose that s = S m , then C F s , and to decrease the number of cut vertices ( C ) we can assume that C F = s . Note that the value of s > m allows us to add a part of the cutting vertices of C F to reduce the number of cutting vertices to the set of S. This state is shown in Figure 4.
In addition, to minimize the number of cutting vertices, the values of C L and C R must be equal to ( m 1 ) / 2 . With these explanations, the values of P ( C , C ) , P ( C , R S ) , and P ( S , R ) can be written as Equations (26), (27), and (28), respectively.
P ( C , C ) = m 1 + s 2 = ( m + s 1 ) ( m + s 2 ) 2
P ( C , R S ) = ( m + s 1 ) ( n m + 1 s )
P ( S , R ) = s ( n m 2 s + 1 )
Therefore, the objective function can be expressed as Equation (29).
f ( H b ( n , m ) , C ) = C P ( C , C ) + P ( C , R S ) + P ( S , R ) = m + s 1 ( m + s 1 ) ( m + s 2 ) / 2 + ( m + s 1 ) ( n m + 1 s ) + s ( n m 2 s + 1 ) = 2 ( m + s 2 ) + 2 ( n m + 1 s ) + 2 s ( n m 2 s + 1 ) / ( m + s 1 ) = 2 2 n 3 s m + 2 s ( n s ) / ( m + s 1 )
The values of n and m in relation (29) are constant. Therefore, it is possible to find the extremum point by differentiating the objective function f ( G , C ) with respect to s, if it exists. By this method, the extremum point will be as Equation (30). Thus, an extremum point for f ( H b ( n , m ) , C ) and an upper bound for J ( H b ( n , m ) ) can be achieved using the rounded value of s e x t and Equation (29).
s e x t = 10 ( m 1 ) ( m + n 1 ) 5 m + 1
To find an upper bound of tightness for Harary graphs type (c), the results obtained for Harary graphs type (b) can be used because these results were calculated in continuous space. For this purpose, it is enough consider the condition v 0 S . Figure 6 shows an example of the desired component S and cutting vertices C = { C L C R C F } for H ( 9 , 3 ) and H ( 10 , 3 ) .

3. Conclusion

In this work, we sought to analyze the vulnerability of Harary graphs using the tightness metric as the primary parameter. Different methodologies were employed to calculate the tightness values for three distinct types of Harary graphs. The lower and upper bounds of the tightness values for Harary graphs were presented using existing lemmas and theorems, relying on the fact that Harary graphs are Hamiltonian. Additionally, the tightness values were accurately calculated for Harary graphs of type (a). For types (b) and (c), an acceptable upper bound was obtained due to the complexity of the graph structure. Given the novelty of the tightness parameter, there is still limited information available about its properties and applications. This gap in the current understanding presents an opportunity for future research to further explore and expand the knowledge surrounding this graph vulnerability measure.

References

  1. An M. "Harary index, binding number and toughness of graphs", Kuwait Journal of Science, 51, pp. 100176 (2024). [CrossRef]
  2. . [CrossRef]
  3. Baldoni R., Bonomi S., Querzoni L., Piergiovanni S.T. "Investigating the existence and the regularity of logarithmic harary graphs", Theoretical computer science, 410, pp. 2110-2121 (2009). [CrossRef]
  4. Bauer D., Kahl N., Schmeichel E., Woodall D.R., Yatauro M. "Toughness and binding number", Discrete Applied Mathematics, 165, pp. 60-68 (2014). [CrossRef]
  5. Chen Y., Fan D., Lin H. "Factors, spectral radius and toughness in bipartite graphs", Discrete Applied Mathematics, 355, pp. 223-231 (2024). [CrossRef]
  6. Dunkum M., Lanphier D. "Edge integrity of nearest neighbor graphs and separator theorems", Discrete Mathematics, 342, pp. 2664-2679 (2019). [CrossRef]
  7. Fujita S., Furuya M. "Safe number and integrity of graphs", Discrete Applied Mathematics, 247, pp. 398-406 (2018). [CrossRef]
  8. Gu X. "Toughness in pseudo-random graphs", European Journal of Combinatorics, 92, 103255 (2021). [CrossRef]
  9. Harary F. "Graph Theory". Massachusetts: Addison-Wesley Publication Company. Inc. 1st, (1969). [CrossRef]
  10. Javan A., Javan M., Jafarpour M., Moazzami D., Moeini A. "On the J-Tightness of graphs", Journal of Algorithms and Computation. 53, pp. 57-74 (2021). [CrossRef]
  11. Jin Q., Li S., Xie M. "3-path-connectivity of Cayley graphs generated by transposition trees", Discrete Applied Mathematics, 339, pp. 292-299 (2023). [CrossRef]
  12. Katona G. Y., Khan H. "Minimally tough chordal graphs with toughness at most 1/2", Discrete Mathematics, 000, pp. 1-7 (2023). [CrossRef]
  13. Liang J, Liu X., Lou D., Zhang Z.B., Qin Z. "Cyclic edge and cyclic vertex connectivity of (4,5,6)-fullerene graphs", Discrete Applied Mathematics, 351, pp. 94-104 (2024). [CrossRef]
  14. Li F., Zhang X., Broersma H. "A polynomial algorithm for weighted scattering number in interval graphs", Discrete Applied Mathematics, 264, pp. 118-124 (2019). [CrossRef]
  15. Liu Q., Huang X., Zhang Z. "Optimally restricted edge connected elementary Harary graphs". Theoretical Computer Science. 29, pp. 131-138 (2013). [CrossRef]
  16. Li Y., Gu R. "Bounds for scattering number and rupture degree of graphs with genus", Applied Mathematics and Computation, 337, pp. 329-334 (2018). [CrossRef]
  17. Li Y., Shi Y., Gu X. "Spectrum bounds for the scattering number, integrity, tenacity of regular graphs", Future Gen. Comp. Sys., 83, pp. 450-453 (2018). [CrossRef]
  18. Milojevic A. "Connectivity of old and new models of friends-and-strangers graphs", Advances in Applied Mathematics, 155, 102668 (2024). [CrossRef]
  19. Moazzami D. "Tenacity of a graph with maximum connectivity", Discrete Applied Mathematics, 159, pp. 367-380 (2011). [CrossRef]
  20. Park D., Ostuni A., Hayes N., Banerjee A., Wakhare T., Wong W. "The toughness of Kneser graphs", Discrete Mathematics, 334, pp. 112484 (2021). [CrossRef]
  21. Prabhath A., Mathew S., Mordeson J.N. "Generalized cycle connectivity in fuzzy graphs", Fuzzy Sets and Systems, 482, 108909 (2024). [CrossRef]
  22. Song X., Zhang S., Chen X., Gao S. "The algebraic connectivity of barbell graphs", Discrete Mathematics, 347, 114027 (2024). [CrossRef]
  23. Zhou S. "Binding numbers and restricted fractional (g,f)-factors in graphs", Discrete Applied Mathematics, 305, pp. 350-356 (2021). [CrossRef]
Figure 1. Three examples of different types of Harary graphs
Figure 1. Three examples of different types of Harary graphs
Preprints 115299 g001
Figure 2. Harary graphs type (a) desirable cut
Figure 2. Harary graphs type (a) desirable cut
Preprints 115299 g002
Figure 3. Optimal cut for calculating tightness of H(9,4), J ( H ( 9 , 4 ) ) = 0 . 5
Figure 3. Optimal cut for calculating tightness of H(9,4), J ( H ( 9 , 4 ) ) = 0 . 5
Preprints 115299 g003
Figure 4. Two different cuts for Harary graphs types (b) and (c)
Figure 4. Two different cuts for Harary graphs types (b) and (c)
Preprints 115299 g004
Figure 5. Harary graphs type (b) sample first cut
Figure 5. Harary graphs type (b) sample first cut
Preprints 115299 g005
Figure 6. Two upper bound cuts for Harary graphs types (b) and (c)
Figure 6. Two upper bound cuts for Harary graphs types (b) and (c)
Preprints 115299 g006
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
Copyright: This open access article is published under a Creative Commons CC BY 4.0 license, which permit the free download, distribution, and reuse, provided that the author and preprint are cited in any reuse.
Alerts
Prerpints.org logo

Preprints.org is a free preprint server supported by MDPI in Basel, Switzerland.

Subscribe

© 2025 MDPI (Basel, Switzerland) unless otherwise stated