Volume 56 (2024)
Volume 55 (2023)
Volume 54 (2022)
Volume 53 (2021)
Volume 52 (2020)
Volume 51 (2019)
Volume 50 (2018)
Volume 49 (2017)
Volume 48 (2016)
Volume 47 (2016)
Volume 46 (2015)
Volume 45 (2014)
Volume 44 (2013)
Volume 43 (2009)
Volume 42 (2008)
Volume 41 (2007)
A Survey on Tenacity Parameter\\Part II

Dara Moazzami; Asieh Khoshnood

Volume 54, Issue 1 , June 2022, , Pages 47-72

https://doi.org/10.22059/jac.2022.88027

Abstract
  In this paper, we study the edge tenacity of graphs. We will be primarilyinterested in edge-tenacious graphs, which can be considered very stable and are somewhat analogous in edge tenacityto honest graphs in edge-integrity. We show several results about edge-tenacious graphs as well asfind numerous ...  Read More

On the J-Tightness of Graphs

Abolfazl Javan; Majid Javan; M. Jafarpour; Dara Moazzami; Ali Moieni

Volume 53, Issue 2 , December 2021, , Pages 57-74

https://doi.org/10.22059/jac.2021.85198

Abstract
  We introduce a new invariant vulnerability parameter named “J-Tightness” or “J(G)” for graphs. As a stability measure, its properties along with comparisons to other parameters of a graph are proposed. We show how it is calculated for complete graphs and cycles. We show that J-Tightness ...  Read More

A Survey on Tenacity Parameter\\Part I

Asieh Khoshnood; Dara Moazzami

Volume 53, Issue 1 , June 2021, , Pages 181-196

https://doi.org/10.22059/jac.2021.81721

Abstract
  If we think of the graph as modeling a network, the vulnerability measurethe resistance of the network to disruption of operation after the failure of certainstations or communication links. In assessing the "vulnerability"of a graph one determines the extent to which the graph retains certainproperties ...  Read More

A note on the approximability of the tenacity of graphs

Vahid Heidari; Dara Moazzami

Volume 52, Issue 2 , December 2020, , Pages 149-157

https://doi.org/10.22059/jac.2020.79270

Abstract
  In this paper we show that, if $NP\neq ZPP$, for any $\epsilon > 0$, the tenacity of graphwith $n$ vertices is not approximable in polynomial time within a factor of$\frac{1}{2} \left( \frac{n-1}{2} \right) ^{1-\epsilon}$.  Read More

Edge-Tenacity

.Dara Moazzami

Volume 52, Issue 1 , June 2020, , Pages 175-182

https://doi.org/10.22059/jac.2020.76696

Abstract
  The edge-tenacity $T_e(G)$ of a graph G was defined as\begin{center} $T_e(G)=\displaystyle \min_{F\subset E(G)}\{\frac{\mid F\mid +\tau(G-F)}{\omega(G-F)}\}$\end{center}where the minimum is taken over all edge cutset F of G. We defineG-F to be the graph induced by the edges of $E(G)-F$, $\tau(G-F)$is ...  Read More

Tenacious Graph is NP-hard

Dara Moazzami

Volume 51, Issue 2 , December 2019, , Pages 127-134

https://doi.org/10.22059/jac.2019.75276

Abstract
  The tenacity of a graph $G$, $T(G)$, is defined by$T(G) = min\{\frac{\mid S\mid +\tau(G-S)}{\omega(G-S)}\}$, where theminimum is taken over all vertex cutsets $S$ of $G$. We define$\tau(G - S)$ to be the number of the vertices in the largestcomponent of the graph $G-S$, and $\omega(G-S)$ be the number ...  Read More

Tenacity and rupture degree parameters for trapezoid graphs

Dara Moazzami

Volume 51, Issue 1 , June 2019, , Pages 157-164

https://doi.org/10.22059/jac.2019.71927

Abstract
  Reliability of networks is an important issue in the field of graph and network. Computation of network vulnerability parameters is NP-complete for popular network topologies such as tree, Mesh, Cube, etc.In this paper, we will show that the tenacity and rupture degree parameters for trapezoid graphs ...  Read More

Tenacity and some other Parameters of Interval Graphs can be computed in polynomial time

Dara Moazzami; Niloofar Vahdat

Volume 50, issue 2 , December 2018, , Pages 81-87

https://doi.org/10.22059/jac.2018.69783

Abstract
  In general, computation of graph vulnerability parameters is NP-complete. In past, some algorithms were introduced to prove that computation of toughness, scattering number, integrity and weighted integrity parameters of interval graphs are polynomial. In this paper, two different vulnerability parameters ...  Read More

Vulnerability in Networks - A Survey

Dara Moazzami

Volume 50, Issue 1 , June 2018, , Pages 109-118

https://doi.org/10.22059/jac.2018.68367

Abstract
  The analysis of vulnerability in networks generally involves some questionsabout how the underlying graph is connected. One is naturally interestedin studying the types of disruption in the network that maybe causedby failures of certain links or nodes. In terms of a graph, the concept ofconnectedness ...  Read More

Vulnerability Measure of a Network - a Survey

Dara Moazzami

Volume 49, Issue 2 , December 2017, , Pages 33-40

https://doi.org/10.22059/jac.2017.7975

Abstract
  In this paper we discuss about tenacity and its properties in stability calculation. We indicate relationships between tenacity and connectivity, tenacity and binding number, tenacity and toughness. We also give good lower and upper bounds for tenacity. Since we are primarily interested in the case where ...  Read More

Normalized Tenacity and Normalized Toughness of Graphs

A. Javan; M. Jafarpour; D. Moazzami; A. Moieni

Volume 49, Issue 2 , December 2017, , Pages 141-159

https://doi.org/10.22059/jac.2017.67083

Abstract
  In this paper, we introduce the novel parameters indicating Normalized Tenacity ($T_N$) and Normalized Toughness ($t_N$) by a modification on existing Tenacity and Toughness parameters.  Using these new parameters enables the graphs with different orders be comparable with each other regarding their ...  Read More

Edge-tenacity in Networks

Dara Moazzami

Volume 49, Issue 1 , June 2017, , Pages 45-53

https://doi.org/10.22059/jac.2017.7980

Abstract
  Numerous networks as, for example, road networks, electrical networks and communication networks can be modeled by a graph. Many attempts have been made to determine how well such a network is "connected" or stated differently how much effort is required to break down communication in the system between ...  Read More

Tenacity and some related results

Dara Moazzami

Volume 49, Issue 1 , June 2017, , Pages 83-91

https://doi.org/10.22059/jac.2017.7986

Abstract
  Conceptually graph vulnerability relates to the study of graphintactness when some of its elements are removed. The motivation forstudying vulnerability measures is derived from design and analysisof networks under hostile environment. Graph tenacity has been anactive area of research since the the concept ...  Read More

On the tenacity of cycle permutation graph

D. Jelodar; D. Moazzami; P. Nasehpour

Volume 48, Issue 1 , December 2016, , Pages 37-44

https://doi.org/10.22059/jac.2016.7938

Abstract
  A special class of cubic graphs are the cycle permutation graphs. A cycle permutation graph Pn( α) is defined by taking two vertex-disjoint cycles on n vertices and adding a matching between the vertices of the two cycles.In this paper we determine a good upper bound for tenacity of cycle permutation ...  Read More

An Optimization Model for Epidemic Mitigation and Some Theoretical and Applied Generalizations

Sima Ranjbarfard; Amin Ghodousian; D. Moazzami

Volume 48, Issue 1 , December 2016, , Pages 99-116

https://doi.org/10.22059/jac.2016.7945

Abstract
  In this paper, we present a binary-linear optimization model to prevent the spread of an infectious disease in a community. The model is based on the remotion of some connections in a contact network in order to separate infected nodes from the others. By using this model we nd an exact optimal solution ...  Read More

Towards a measure of vulnerability, tenacity of a Graph

Dara Moazzami

Volume 48, Issue 1 , December 2016, , Pages 149-153

https://doi.org/10.22059/jac.2016.7953

Abstract
  If we think of the graph as modeling a network, the vulnerability measure the resistance of the network to disruption of operation after the failure of certain stations or communication links. Many graph theoretical parameters have been used to describe the vulnerability of communication networks, including ...  Read More

Online Scheduling of Jobs for D-benevolent instances On Identical Machines

I. Mohammadi; Dara Moazzami

Volume 47, Issue 1 , June 2016, , Pages 27-36

https://doi.org/10.22059/jac.2016.7933

Abstract
  We consider online scheduling of jobs with speci c release time on m identical machines. Each job has a weight and a size; the goal is maximizing total weight of completed jobs. At release time of a job it must immediately be scheduled on a machine or it will be rejected. It is also allowed during execution ...  Read More

Heuristic and exact algorithms for Generalized Bin Covering Problem

S. Jabari; Dara Moazzami; A. Ghodousian

Volume 47, Issue 1 , June 2016, , Pages 53-62

https://doi.org/10.22059/jac.2016.7936

Abstract
  In this paper, we study the Generalized Bin Covering problem. For this problem an exact algorithm is introduced which can nd optimal solution for small scale instances. To nd a solution near optimal for large scale instances, a heuristic algorithm has been proposed. By computational experiments, the ...  Read More

Randomized Algorithm For 3-Set Splitting Problem and it's Markovian Model

Mahdi Heidari; Ali Golshani; D. Moazzami; Ali Moeini

Volume 47, Issue 1 , June 2016, , Pages 79-92

https://doi.org/10.22059/jac.2016.7944

Abstract
  In this paper we restrict every set splitting problem to the special case in which every set has just three elements. This restricted version is also NP-complete. Then, we introduce a general conversion from any set splitting problem to 3-set splitting. Then we introduce a randomize algorithm, and we ...  Read More

A Cellular Automaton Based Algorithm for Mobile Sensor Gathering

S. Saadatmand; D. Moazzami; A. Moeini

Volume 47, Issue 1 , June 2016, , Pages 93-99

https://doi.org/10.22059/jac.2016.7947

Abstract
  In this paper we proposed a Cellular Automaton based local algorithm to solve the autonomously sensor gathering problem in Mobile Wireless Sensor Networks (MWSN). In this problem initially the connected mobile sensors deployed in the network and goal is gather all sensors into one location. The sensors ...  Read More

Toughness of the Networks with Maximum Connectivity

D. Moazzami

Volume 46, Issue 1 , December 2015, , Pages 51-71

https://doi.org/10.22059/jac.2015.7925

Abstract
  The stability of a communication network composed of processing nodes and communication links is of prime importance to network designers. As the network begins losing links or nodes, eventually there is a loss in its effectiveness. Thus, communication networks must be constructed ...  Read More