Please use this identifier to cite or link to this item:
https://hdl.handle.net/11499/46879
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Aytac, Vecdi | - |
dc.contributor.author | Turaci, Tufan | - |
dc.date.accessioned | 2023-01-09T21:16:39Z | - |
dc.date.available | 2023-01-09T21:16:39Z | - |
dc.date.issued | 2023 | - |
dc.identifier.issn | 0129-0541 | - |
dc.identifier.issn | 1793-6373 | - |
dc.identifier.uri | https://doi.org/10.1142/S0129054122500162 | - |
dc.identifier.uri | https://hdl.handle.net/11499/46879 | - |
dc.description.abstract | In several different applications and contexts, networks are essential frameworks and appear.Vulnerability value is a measure of the network's durability in the face of damage that may lead to a reduction or complete loss of the network's particular functionality. The domination number and it's types can be used network vulnerability parameters. Recently, the disjunctive total domination number has been defined by Henning and Naicker. In this paper, the disjunctive total domination numbers of the transformation graph G(++z )when z = {+, -} of some graphs G have been obtained. Furthermore, some new general results have been given for the parameter mentioned above. | en_US |
dc.language.iso | en | en_US |
dc.publisher | World Scientific Publ Co Pte Ltd | en_US |
dc.relation.ispartof | International Journal Of Foundations Of Computer Science | en_US |
dc.rights | info:eu-repo/semantics/closedAccess | en_US |
dc.subject | Vulnerability | en_US |
dc.subject | domination number | en_US |
dc.subject | distance | en_US |
dc.subject | disjunctive total domination number | en_US |
dc.subject | transformation graphs | en_US |
dc.subject | Total Domination | en_US |
dc.subject | Number | en_US |
dc.title | Analysis of Vulnerability of Some Transformation Networks | en_US |
dc.type | Article | en_US |
dc.identifier.doi | 10.1142/S0129054122500162 | - |
dc.relation.publicationcategory | Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı | en_US |
dc.authorscopusid | 56636135000 | - |
dc.authorscopusid | 57823869200 | - |
dc.identifier.scopus | 2-s2.0-85135165470 | en_US |
dc.identifier.wos | WOS:000849387800002 | en_US |
dc.identifier.scopusquality | Q3 | - |
item.cerifentitytype | Publications | - |
item.languageiso639-1 | en | - |
item.openairetype | Article | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.fulltext | No Fulltext | - |
item.grantfulltext | none | - |
crisitem.author.dept | 10.10. Computer Engineering | - |
Appears in Collections: | Mühendislik Fakültesi Koleksiyonu Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection WoS İndeksli Yayınlar Koleksiyonu / WoS Indexed Publications Collection |
CORE Recommender
Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.