SlideShare a Scribd company logo
ISSN: 1694-2507 (Print)
ISSN: 1694-2108 (Online)
International Journal of Computer Science
and Business Informatics
(IJCSBI.ORG)
VOL 15, NO 2
MARCH 2015
Table of Contents VOL 15, NO 2 MARCH 2015
Enhancing AODV Routing Protocol to Eliminate Black Hole Attack in MANET.......................................1
Ei Ei Khin and Thandar Phyu
Adaptive Search Information Technology in the University Library ........................................................ 15
Andriy Andrukhiv and Dmytro Tarasov
Educational Data Mining: Performance Evaluation of Decision Tree and Clustering Techniques Using
WEKA Platform........................................................................................................................................... 26
Ritika Saxena
Hamiltonian cycle in graphs šˆ4 ≄ šŸn....................................................................................................... 38
Nguyen Huu Xuan Truong and Vu Dinh Hoa
IJCSBI.ORG
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 1
Enhancing AODV Routing
Protocol to Eliminate Black Hole
Attack in MANET
Ei Ei Khin
Faculty of Information and Communication Technology
University of Technology (Yatanarpon Cyber City)
Pyin Oo Lwin, Myanmar
Thandar Phyu
Department of Advanced Science and Technology
Ministry of Science and Technology
Nay Pyi Taw, Myanmar
ABSTRACT
MANET is an open wireless system that includes several mobile nodes to form an arbitrary
and temporary network. As the lack of infrastructure network, the mobile nodes send the
routing packets to each other in the network when they want to communicate. So, the nodes
use the routing protocols. However, as the lack of security mechanism of the routing
protocols, MANETs are facing various severe attacks. Black hole attack is such types of
attacks and can carry great damage to the network. As a result, an efficient and simple
routing algorithm for MANET is very important. This paper presented a simple approach to
find and eliminate the black hole attack for MANET. The proposed system slightly
modifies ad hoc on-demand distance vector (AODV) routing protocol by adding two tables
and packet type alarm. The proposed mechanism removes the malicious node and chooses
the reliable node by using these tables. When the malicious node is detected, the proposed
system is automatically sending out the alarm packets to all nodes in the network.
Keywords
MANET, AODV, Black Hole, Two Tables, Alarm.
1. INTRODUCTION
MANETs are the wireless network that consists of dynamic mobile nodes.
The mobile nodes may be personal digital assistance (PDA), laptop, mobile
phone and any devices that are mobile. The mobile device or node can
easily join and leave to the network and can design dynamic topologies for
the network based on their connectivity. They have the ability to configure
themselves without needing any infrastructure. When the nodes want to
communicate with each other via a wireless channel, they give the
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 2
connectivity by sending the packets among themselves. So, these nodes may
be router or host or both at the same time.
MANET have the basic characteristics such as open medium, self-
organization, dynamic mobile nodes and topology, limited resources, lack of
infrastructure network and lack of defense mechanisms. Because of these
factors, MANET often suffers from various security attacks [2]. Moreover,
the mobile nodes in the MANET communicate with one another based on
the mutual trust. The mobile nodes exist during the range of wireless
channel may be overhear and participate to the network. The wireless
channel causes MANET more prone to various attacks.
So, the security of transmission and communication in MANET is a
challenge and important issue. To get secure communication and
transmission in networks, the attacks type and their impacts on the MANET
is understanding. There are different types of attacks to harm MANET.
They are wormhole attack, selfish node misbehaving attack, routing table
overflow attack, flooding attack, black hole attack, sybil attack,
impersonation attack, denial of service (DoS) attack and so forth.
In the black hole operation, the intruder node sends the false reply with high
sequence number. When it is received the data packets, it discards all. So, it
disturbs the network and makes great damage to this network. In this paper,
the defense mechanism is presented to identify and remove this attack and
the feasible solution is proposed to get a reliable route to the destination.
The rest of this paper is arranged such as: Section 2 describes an overview
of black hole attack and AODV routing protocol. Section 3 reviews some
researches about defense mechanism. Section 4 presents the proposed
detection and prevention mechanism. The simulation results are described in
section 5. Then, section 6 makes a conclusion about this paper.
2. BACKGROUND STUDY
2.1 Overview of AODV Routing Protocol
AODV is widely used routing protocol for MANETs [7, 9]. It is an
extension of destination sequenced distance vector routing protocol[8] and it
gives dynamic link conditions, low network utilization, low control message
overhead, low memory overhead, and so on. There are two processes in
AODV routing protocol. They are route discovery and route maintenance
processes.
In the AODV protocol, when the nodes need to communicate with each
other to send the data packets, firstly a node find an already route in its
routing table. If it is an active or fresh route to the destination, the source
node uses this route. If it has no route or it is not fresh route, the source node
starts the route discovery process. So, it sends Route Request (RREQ)
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 3
packet to all neighbors and the neighbor nodes send back Route Reply
(RREP) packet if it’s the destination itself or it has a fresh route. Otherwise,
they forward the RREQ message. When the source node is received RREP,
it can communicate with the destination vice versa.
In the route maintenance process, whenever there is a link failure or link
broken down during the operation, the Route Error (RERR) packet is sent to
the nodes in an active link. The Hello message is periodically sent for
maintaining the route information. Although AODV is a well known
reactive routing protocol for MANET, there is no security mechanism
against the types of attack [1]. Thus, the malicious nodes makes the AODV
protocol is defenseless various types of attacks.
2.2 Black Hole Attack
It is one type of DoS attacks and active attack [10] in MANET. In the black
hole attack [11, 12], the malicious node declares to the nodes that it is the
best route to the destination with false route reply message. It is always used
the highest sequence number value and the lowest hop count value.
However, when it is received the data packets, it discards all packets.
For example, the following scenario in Figure 1 is considered. In this figure,
it is assumed that ā€˜S’, ā€˜D’ and ā€˜M’ are the source, the destination and the
malicious node respectively. When ā€˜S’ wants to communicate with ā€˜D’, it
first sends Route Request packet to all neighbor nodes. Thus, ā€˜F’, ā€˜E’ and
ā€˜M’ receive it. As ā€˜M’ is a black hole, it immediately sends back a Route
Reply packet with high sequence number. When ā€˜S’ receives Route Reply
packet from ā€˜M’, it is assumed this route is fresh enough route. Then, it
communicates with the destination through this way. However, ā€˜M’ does
not forward any data packet anywhere and discards all them.
Figure 1. AODV protocol with black hole attack
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 4
3. RELATED WORKS
There are various defense mechanisms in the literature to protect black hole
attacks. Some of the research papers are reviewed in this regard.
Mohammad Abu Obaida et al. [3] has presented lots of modules such as
Threshold Tester, Packet Classifier, RREP sequence number Tester,
Extractor, Alarm Broadcaster and Blacklist Tester. This mechanism
modifies the format of Route Reply packet and uses a new packet type
Alarm. The router calculates the range of the accepted sequence numbers
and gives the threshold value. When any node is exceeding the threshold
values for many times, this node is identified as attacker. But, the
calculation of the threshold value is bit overwhelming. So, it has the
network delay. Although the calculation of correct threshold prevent black
hole node, the wrong calculation may disgrace an authentic node as a black
hole.
Himral, Vig and Chand [5] have defined a mechanism to eliminate the
malicious nodes in the MANET and to discover the reliable paths to the
intended node by checking the sequence number difference between the
source and intermediate node. In AODV protocol, the destination sequence
number is very important. It is 32-bit integer value and is used to determine
the fresh enough route or not. The larger destination sequence number, the
better the route. So, in this paper, the proposed system is assumed that the
malicious node sends the first RREP packet with high sequence number to
the source node. Then, the source node stores it as the first RREP in the
table and compares it with its sequence number. If there is very different,
the node is surely the attacker and eliminates this entry from table.
However, the proposed method cannot find multiple black hole nodes.
Nital Mistry et al. [4] modifies the original AODV routing protocol by using
a new field Mali_node, a MOS_WAIT_TIME timer and a Cmg_RREP_Tab
table. The time period that the source node waits for the Route Replies is
defined as RREP_WAIT_TIME. The half of RREP_WAIT_TIME is
defined as MOS_WAIT_TIME. Route Reply packets are kept in the
Cmg_RREP_Tab table and Mali_node is stored the ID of attacker node. The
source node analyzes and discards Route Replies with very high sequence
number from the Cmg_RREP_Tab table. The experimental results
demonstrate that this method has a good packet delivery ratio than the
original AODV protocol. However, it has high processing delay and the
end-to-end delay is increasing.
Jalil, Ahmad and Manan [6] have proposed an ERDA mechanism that
modifies the existing route discovery mechanism recvReply() function of
AODV routing protocol. The new elements are mali_list to store the ID of
malicious nodes, rrep_table to keep RREP packets from other nodes and
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 5
rt_upd to do the update operation of routing table. The source node stores
RREP packets in the rrep_tab table and then updates its routing table with
first Route Reply of the malicious node from the rrep_tab table. However,
the source node updated again the routing table with the next Route Reply
packet from other node although it has a lower sequence number because
the value of rt_upd is true. If the value rt_upd is false, the source node stops
the update operation of routing table. The source node set the value of
rt_upd as false when it receives Route Reply from the destination. ERDA
mechanism removes the false Route Reply entry by replacing the later entry.
However, it has high processing delay.
4. IMPLEMENTATION OF DETECTION AND PREVENTION
MECHANISM
In this module, the detection and prevention algorithm for black hole attack
on the context of AODV protocol (MAODV) is implemented to isolate the
black hole nodes and to discover a safe route from source to destination in
MANET.
3.1 Route Reply Record Table and Malicious Node Table
The proposed system modifies the procedure of source node by introducing
two tables and alarm packet into existing AODV protocol. These tables are
Route Reply (RREP) Record Table (RRT) and Malicious Node Table
(MNT). The RRT table stores all RREP packets from the neighbor’s node
and the MNT table stores the information of malicious node. The examples
of these two tables are shown in Table 1 and Table 2. The RRT table is
stored only by the source node and the MNT table is stored by all nodes in
MANET to eliminate the black hole node.
Table 1. Route reply (RREP) record table (RRT)
Time
Dest
Node
ID
Dest
Node
Seqno
Next
Hop
Hop
Count
Reply
Source
Address
Lifeti-
me
Timesta
-mp
5.203 C 100 M 1 M 9 20.4855
5.247 C 12 E 2 A 10 20.4855
5.301 C 10 D 3 B 9 20.4855
5.302 C 11 G 1 H 9 20.4855
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 6
Table 2. Malicious node table (MNT)
Node ID Time
P 5.0143
M 10.6542
T 50.4968
3.2 Threshold Value Calculation
It is the value of averaging the difference between the destination sequence
numbers from RRT table and routing table in each time interval (t) for
destination. This value is used for detecting and removing the attacker node
in the network. β is control parameter and variable. The value of β is
different from the number of node, the number of connection, the network
area, the mobility speed and the pause time. β is used to avoid the authentic
node disgrace to be a malicious node.
š‘‡ā„Žš‘Ÿš‘’š‘ ā„Žš‘œš‘™š‘‘ =
āˆ‘(š‘…š‘…šøš‘ƒš‘†š‘’š‘žš‘›š‘œ š‘”
āˆ’ š‘…š‘‡š‘†š‘’š‘žš‘›š‘œ š‘”
)
š‘‡š‘œš‘”š‘Žš‘™ š‘š‘¢š‘šš‘š‘’š‘Ÿ š‘œš‘“ š‘ƒš‘Žš‘š‘˜š‘’š‘”š‘ 
+ š›½
3.3 Extension to Routing Table
The proposed system has implemented to yield a strong method for
detecting and preventing black hole attack. For the design of our scheme,
the routing table field of AODV protocol is modified as follows. The reply
initiator filed is added to the routing table and is used to store the ID of node
that the route reply sends initially. When the malicious node is detected
comparing with the threshold value, we can find the malicious node ID by
seeing this field. So, the fields of the routing table of our proposed protocol
are below:
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 7
3.4 Alarm Packet
In the original AODV protocol, it uses four different types of packets to
communicate with each other. They are:
RREQ packet and RREP packet are used for route discovery process to
discover a route to the destination. RERR packet is used for route
maintenance process in order to notify earlier nodes down the path of such a
breakage when a link failure occurs. The HELLO packet is used to maintain
the connectivity of the neighbor nodes.
In the proposed system, the ALARM packet is added to the packet types of
AODV protocol. The ALARM packet is used to notify all neighboring
nodes in the network about the black hole node and the format of ALARM
packet type is shown in Table 3.
Table 3. ALARM packet format
Type Reserved Hop Count
Broadcast ID
Malicious Node IP Address
Originator IP Address
3.5 Detection and Prevention Algorithm
The following terms are used to express the proposed algorithm.
The proposed detection and prevention algorithm are as follows:
Begin
1. SN broadcasts RREQ to neighbors.
2. Store RREPs into RRT when SN receives RREP from IN until the
waiting time.
3. Retrieve the Seqno from RRT and calculate the Threshold value.
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 8
4. Detect and remove the malicious node from RRT.
while ( RRT is not NULL)
if (( rep_seqno – rt_seqno) > Threshold ), then
assume IN is MN
remove entry from RRT and store this IN as MN to
MNT
send Alarm message
end
end
5. Select the reliable packet from the rest packets and continue the normal
operation of AODV protocol.
6. Flush the RRT after completing step 4-5.
End
3.6 Working Principle of the Proposed System
When the source node needs to communicate with the destination to send
the data packets, it sends RREQ packet to all neighbors. In original AODV
protocol, the source node accepts the first fresh RREP form the neighbor
node. Thus, the malicious node always sends the route reply with high
destination sequence number ahead of other neighbor node to the source
node. As compared, in this paper, the source node keeps all RREP from
neighbor nodes in RRT until the waiting time. The waiting time is a timer
that the source node waits other RREPs after getting the first RREP. We
used 0.1 second as the value of waiting time.
Then, the source node retrieve the destination sequence number from RRT
table and routing table and calculate Threshold value using the above
equation. To detect the malicious node, we calculate the difference of
sequence number from routing table and RRT. If the value of the difference
is greater than Threshold, this intermediate node is assumed as the black
hole node. The source node stores this malicious node ID in MNT and
discards that entry from the RRT table and broadcasts ALARM message to
all nodes in the network to notify about this attack node. Then, the source
node chooses the reliable node from the resting node and continues the
normal operation of AODV protocol. After choosing the reliable node and
removing the malicious node, the RRT table must be clear all data.
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 9
5. SIMULATION RESULTS
We have implemented the black hole attack behavior in AODV protocol
using Network Simulator (NS-2.34) [13]. The main traffic generator used in
this simulation is the Constant Bit Rate (CBR) and the overall simulation
parameters are presented in Table 4. The performance of the AODV
protocol and the proposed protocol with the black hole attack are analyzed
and evaluated. The following metrics are used to analyze the results of our
solution.
End-to-End Delay: It is the average delay of sending and receiving data
packet between the source and the destination. It is measured in
milliseconds
Packet Delivery Ratio (PDR): It is the ratio of total number of data packets
transmitted by the sources and received by the destinations. Higher value
means the better results [14].
Routing Overhead: It is the ratio of total number of control packet
generated to the data packets transmitted. .
Table 4. Simulation parameters
Parameter Value
Simulator NS-2.34
Area 800m x 800m
Routing Protocol AODV, BlackholeAODV, MAODV
Simulation time 200s
Application Traffic CBR
Number of Nodes 50-200
Malicious Node 1-4
Pause time 2s
Packet Size 512 bytes
Transmission rate 2 packets/s
Mobility speed 10 m/s
No of Connections 20-40
Movement Model Random Waypoint
5.1 Performance Analysis on Variation of Malicious Node
We have created a network by using simulation parameters shown in Table
4. Figure 2 illustrates the effect of malicious nodes on PDR in MANET. The
numbers of malicious nodes for simulation are used randomly from one to
four. It can be seen that AODV heavily suffers from the black hole attack. In
Figure 2, when the number of malicious node in the network increases, the
PDR of AODV protocol decreases. On the other hand, the experimental
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 10
results show that the PDR of MAODV protocol is above 95% even though
the malicious node is increased. MAODV has higher average packet
delivery than AODV. This is due to the fact that the proposed protocol can
prevent the black hole attack that occurs in the network.
The impact of malicious nodes to the routing overhead and the average end-
to-end delay are presented in Figure 3 and Figure 4. In AODV under attack,
the routing overhead is very high comparing to MAODV protocol. The
delay of MAODV is higher than the AODV protocol under attack due to the
additional waiting time for route replies. There is decrease in the delay of
the AODV protocol with black hole attack as the immediate reply of
malicious node without checking its routing table.
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 11
5.2 Performance Analysis on Variation of Node
The performance results of all protocols are shown in Figure 5 to Figure 7
when the network size is increasing. When the number of nodes in the
network increases, the PDR of AODV also decreases in Figure 5. It is due to
the larger the number of intermediate nodes on an active route, the more
increases the route failure. The PDR of AODV with attack decrease even
more due to the probability that the malicious node become an intermediate
node. On the other hand, the PDR of MAODV is greater than AODV with
attack because our detection approach is able to identify and eliminate the
malicious node which greatly increases the network PDR.
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 12
The routing overhead over number of nodes is depicted in Figure 6. The
routing overhead for all protocols increases as the network size is growth.
The routing overhead of the blackholeAODV protocol is greater than the
normal AODV and MAODV protocol since the black hole node is present.
The overhead of MAODV is the same as the normal AODV except 200
node scenario. This is the proposed protocol generate any additional
requests for discovering secure routes. The impact of number of nodes on
delay is shown in Figure 7. The delay of the proposed protocol increases at
100 node scenario since it has to avoid the malicious node.
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 13
6. CONCLUSIONS
In this paper, a simple approach for eliminating the black hole attack for
MANET is proposed. The proposed mechanism can apply to remove black
hole node and to find a reliable route form source to destination in the
MANET. In this mechanism, the process of source node in AODV protocol
is modified by introducing two tables and alarm packet type. These tables
are Route Reply Record Table (RRT) to store Route Reply from neighbor’s
nodes and Malicious Node Table (MNT) to store the information about the
malicious nodes. The black hole node can be removed and the reliable node
can be chosen by using these tables. The alarm packet type is also proposed
to inform the intruder node to all neighboring nodes when the black hole
node is detected.
To evaluate the applicability of this routing algorithm, we simulated
different scenarios using AODV protocol and proposed protocol with the
black bole node. We considered the performance metrics such as routing
overhead, PDR and delay on different scenarios with number of nodes and
number of malicious nodes as variable parameters. The experimental results
present that the proposed system performs better than the AODV protocol.
However, the proposed system assumed that the route reply comes from
more than one node within the waiting time. If the source node receives the
only one route reply from the black hole node or the route replies from all
the black hole nodes during the waiting time, the malicious node can enter
the network.
REFERENCES
[1] Ramaswami, S. S., and Upadhyaya, S. Smart Handling of Colluding Black Hole
Attacks in MANETs and Wireless Sensor Networks using Multipath Routing.
Proceedings of the 2006 IEEE Workshop on Information Assurance, 2006.
[2] Luo, J., Fan, M., and Ye, D. Black Hole Attack Prevention Based on Authentication
Mechanism. IEEE, 2008.
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 14
[3] Obaida, M. A., Faisal, S. A., Horaira, M. A., and Roy, T. K. AODV Robust (AODVR):
An Analytic Approach to Shield Ad-hoc Networks from Black Holes. International
Journal of Advanced Computer Sciences and Applications, 2, 8 (2011), pp. 97-102.
[4] Mistry, N., Jinwala, D. C., and Zaveri, M. Improving AODV Protocol against Black
Hole Attacks. International Multi Conference of Engineers and Computer Scientists, 2,
(2010).
[5] Himral, L., Vig, V., and Chand, N. Preventing AODV Routing Protocol from Black
Hole Attack. International Journal of Engineering Science and Technology, 3, 5
(2011).
[6] Jalil, K. A., Ahmad, Z., and Manan, J. A. Mitigation of Black Hole Attacks for AODV
Routing Protocol. Society of Digital Information and Wireless Communications, 1, 2
(2011).
[7] Perkins, C. E., Royer, E. B., and Das, S. Ad-Hoc on Demand Distance Vector (AODV)
Routing. IETF RFC 3561, 2003.
[8] Perkins, C. E., and Bhagwat, P. Highly Dynamic Destination-Sequenced Distance-
Vector Routing (DSDV) for Mobile Computers. ACM SIGCOMM’94 Conference on
Communications Architectures, Protocols and Applications, (1994), pp. 231–241.
[9] Ochola, E., and Eloff, M. A Review of Black Hole Attack on AODV Routing in
MANET. http://icsa.cs.up.ac.za/issa/2011/Proceedings/Research/Ochola_Eloff.pdf.
[10]Shurman, M. A., Yoo, S. M., and Park, S. Black hole Attack in Mobile Ad Hoc
Networks. Proceedings of the 42nd
Annual Southeast Regional Conference ACM-SE
42, (2004), pp. 96-97.
[11]Deng, H., Li, W., and Agarwal, D. P. Routing Security in Wireless Ad Hoc Networks.
IEEE Communications Magazine, 40, 10 (2002).
[12]Sandhu, G., and Dasgupta, M. Impact of Black Hole Attack in MANET. International
Journal of Recent Trends in Engineering and Technology, 3, 2(2010).
[13]Fall, K., and Varadhan, K. The NS Manual. (November 2011),
http://www.isi.edu/nsnam/ns/doc/index.html.
[14]Jaafar, M. A., and Zukarnain, Z. A. Performance Comparisons of AODV, Secure
AODV and Adaptive Secure AODV Routing Protocols in Free Attack Simulation
Environment. European Journal of Scientific Research, 32, 3(2009), pp. 430-443.
This paper may be cited as:
Khin, E. E., and Phyu, T., 2015. Enhancing AODV Routing Protocol to
Eliminate Black Hole Attack in MANET. International Journal of
Computer Science and Business Informatics, Vol. 15, No.2, pp.1-14.
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 15
Adaptive Search Information
Technology in the University Library
AndriyAndrukhiv and DmytroTarasov
Social Communications and Information Activity Department,
Lviv Polytechnic National University, Ukraine, Lviv, 12 Bandera Str.
ABSTRACT
Information provision of the educational process in the university is aimed at implementing
of new information technologies and software into all spheres of university academic
activity in order to provide students with qualitative educational material. Forming of new
information society, development of Internet network and growing number of electronic
resources caused new conditions for research libraries that traditionally are guides in
information environment. Modern library user demands new standards of services to satisfy
information needs during one’s studies. Simultaneously, university management sets the
goal to increase education quality through organization of work on information support of
educational process scientific methodic literature. Consequently, research on information
support of educational process in higher educational institution would allow organization of
qualitative collaboration between the library and subdivisions of higher educational
institution, and consequently improve book supply for educational process and optimize
funds necessary to buy new materials. The article describes the algorithm of literature
recommendation to academic courses. The algorithm improves the information support of
students during course study and enables academic teachers to form recommended
literature list in automated way. The algorithm work is a basis for information system
introduced in Lviv Politechnic National University, Ukraine.
Keywords
Library information system; OPAC; web-based library systems; e-learning materials,
educational process.
1. INTRODUCTION
The problem of online access to scientific and education information is a
vital issue nowadays. A few years ago, the center of access to scientific
information was the library, but with the development of information
technologies the Internet took library’s place[1,6]. This change was caused
by late development of information technologies in Ukrainian libraries.
Ancient and traditional role of library as an institution of acquiring,
organizing, preserving, retrieving and disseminating information to users
has changed. In current information society, libraries are trying to stay
influential institutions via providing access to Internet resources. However,
due to global commercialization of scientific resources, the Internet may not
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 16
always provide all the necessary information. Taking into account the
tendency of scientific community to turn to electronic documents and the
expansion of the range of services, libraries have to organize their work in
the way to satisfy user information requirements as soon and as well as
possible.
To solve this problem, the automation of library processes is being
conducted. This involves:
- computerization of workplaces;
- creation of a data center for storing and processing the large-scale data
sets;
- selection/development of own and support of appropriate hardware and
software;
 alteration of the principles of library management, taking into
consideration new forms of service, etc.
Solution of one of library informatization problems leads to a range
of other problems[3]. For example, computerization of a workplace
involves:
 computer equipment maintenance (repair, software updates and
technical support);
 equipping the workplace (desk, chair, peripheral devices, etc.);
 access to network resources (connection to the local area network and
electric power supply network);
 selection and purchase of software;
 managing occupational health and safety and health requirements
(organization of appropriate lighting, safe work with the computer, air-
conditioning, heating, choice of room for installing computer, etc.)
 training staff to work with the computer;
All-inclusive library automation is a difficult task to implement in the field
of information technologies. It requires enrollment of skilled librarians,
systems analysts, linguists and programmers.
2. THE ACTUALITY OF THE RESEARCH
Reformation of educational system in Ukraine and implementation of new
educational technologies provided by the Bologna process significantly
increase the role of libraries in information support of academic, learning
and research activity of the university. Library must consider an information
flowthat is constantlybeing increased and find new ways and possibilities to
collaborate with university departments as with subjects ofnewinformation
andeducational environment in order to stay needed and essential institution.
Everyone is interested in improving the information provision of students:
library will have its service user, academic department will be given
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 17
accreditation and students will have qualitative sources of information for
studies. Therefore, information support of education process is one of the
key goals of university and its library.
3. WEB-TOOLS OF INFORMATION SEARCH IN THE
UNIVERSITY LIBRARY
Informatization of the Scientific Library of Lviv Polytechnic National
University started in 2007 and a large amount of work has been done by
now. The Scientific Library proposes the following services: library
website, institutional repository[2], electronic catalogue (OPAC) and several
new special web-based services for our users such as form to find UDC,
Ask-a-librarian, literature recommendation system for studying academic
disciplines in our university (see Fig.1).
Library
web-
services
Web site
Institutional
repository
OPAC
Special
information
search
services
Form to find UDC Ask-a-librarian
ā€œLiterature
recommendation
systemā€
Fig. 1. The Scientific Library user-oriented web services.
Let us briefly and comprehensively dwell upon each information resource.
1. Library website (http://library.lp.edu.ua) plays a significant role in the
life of the library, as it is the primary resource of library events
representation on the Internet. The website has been built with the help
of Drupal 7 CMS. We use Drupal 7 because there are a lot of different
modules that give us opportunity to integrate library services with web-
site. We analyze web-site each year quarter and get average
statistics:statistics:
 About 5 000 visits per month;
 About 750 pages indexed in Google;
 Links to web site – 57 200;
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 18
2. Lviv Polytechnic National University Institutional Repository
(http://ena.lp.edu.ua) was created on May 15, 2010. Currently the
repository contains more than 25 000 items. It has been built with the
help of Dspace software.
3. OPAC (Online Public Access Catalogues) is an important part of many
digital library collections. It allows users to search for the bibliographic
records within library collections. Nowadays, some OPACs also
provide access to electronic resources and databases, in addition to the
traditional bibliographic records. Our OPAC was created in 2008 by the
IT Department of Scientific Library
(http://library.lp.edu.ua/en/it_department). This solution gave us
opportunity to connect google-analytics to the OPAC and create own
thematic statistic system. So we know two main points of visiting
statistics: number of users and kind of literature they are looking for.
So, we have 396212 records in OPAC and about 500 visits per month.
The next figure shows what kind of literature users are looking for.
Fig. 2. Thematic searches in OPAC
In spite of that, we know that the most popular literature in OPAC is
scientific literature – about 60 percent of search queries, literature for
students – 37%, and 3% – other literature.
4. Special web-based services for users are:
ļ‚· form to find UDC;
ļ‚· Ask-a-librarian;
ļ‚· literature recommendation system for studying academic
courses in our university.
Technical
65%
other
6%
Humanities
25%
Sociology
4%
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 19
4. NEW SPECIAL INFORMATION SYSTEM ā€œLITERATURE
RECOMMENDATION SYSTEMā€
The new service for library users is service that selects literature needed to
study academic discipline from the library collection. In Ukraine, the
official document that defines the qualitative and quantitative characteristics
of the process of discipline study is course program. One of the sections of
this document includes book list, which student must work out to learn the
material well. To perform the task of qualitative and complete formation of
literature and reference list for the course teacher must be aware of the
available literature in the library and be able to find this literature and
constantly keep up with new materials within one’s research field.
Information system that recommends above named literature to academic
teacher would significantly ease one’s work. Teacher would only make
decisions whether to include or not include this or that position from course
program to the recommended literature list. Moreover, when the list is
formed on the base of library collection it improves up to date information
support of educational process.
In Lviv Polytechnic National University there is information system for
recommended literature selection developed and introduced. Algorithm of
its functioning is shown on the Fig. 3.
Course
programs
Selection of
book authors
Selection of
book titles
Selection of
UDC values
Search through the
library collection
by author
Search through the
library collection
by book title
Changing
of UDC values
to certain form
Search through the
library collection
by UDC
Consolidation of search results
1
1
1
2 3 4
5 6
8
7
Ranking of search results
9
Fig. 3. The algorithm of formation of literature list for the course
where
1. Bibliographic records from recommended literature list for the
course;
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 20
2. Tuple of book authors from recommended literature list;
3. Tuple of book titles from recommended literature list;
4. Tuple of UDC from recommended literature list;
5. Results of search by author through the library collection
includes all book sof authors from recommended literature list;
6. Results of search by title through the library collection includes
all book titles from recommended literature list;
7. Tuple of UDC adapted into form suitable for next iterations;
8. Results of book search through the library collection includes
positions with certain UDC;
9. Combined book list from different iterations.
The next step after list formation is list ranking. Ranking of selected
search results will be done based on multi-criteria estimation of the
relevance of found documents taking into account the following criteria:
– author and title of a book;
– factor of research technical bookaging (year of publication);
– statistical data on book demands;
– number of book pages.
Algorithm work is shown on the Fig. 4.
We divide the mentioned criteria into two groups: main and specified. Main
criteria are autonomous criteria that are used to find relevant results.
Specified criteria are to increase the pertinence of relevant results received
after using the main criteria. In our case main criteria include the title and
author of a book and specified criteria include factor of research technical
book aging, statistical data on book demands and number of book pages.
4.1 Criterion of Book Author and Title
The below given presumptions are based on the thesis that if an expert (staff
member) has chosen books of one author, other books by the same author
may also be valuable for the same expert. Researchers commonly publish
their works within a specific research field and quite rarely bounce to
another one. For example, if an author works in building and architecture
then this person will rather not write next papers on computer processors. In
practice, it means that authors from recommended literature list have to be
the same as these from library collection. The similar situation is also with
book titles.
4.2 Factor of Research Technical Book Aging
Factor of research technical book aging is important because documents
with flow of time last their value as information source; consequently, they
are being used less and less. American researchers Burton R.E. and
Kebler[5] R.W. proposed the term ―half-life‖ to describe literature
obsolescence.
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 21
Forming a set of options
Forming a criteria set
Evaluation criteria
determines the group of
experts
Evaluation criteria determines
the programmers
Evaluation criteria
determines the user
Define variant
Formula (2)
The standardization of criteria
values by the formula (1)
Formula (3)
Determination of criteria importance
The calculation of the integral criterion by formula (4)
min
max
Sorting by a combined criterion
For criterion "book age" defines the class to
which the discipline define
Determination of the age limit for book,
depending on the class
Fig.4. Evaluation of literature search results. Ranking algorithm
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 22
This number means period of time during which a half of all published
papers in some branch of science is out of use. For instance, they found that
the half-life of journal articles in physics is only 4.6 years, in chemistry it is
8.1 years, in mathematics this number is 10.5 years and in physiology it is
7.2 years. It must be emphasized that, by the aging process we understand a
process of information obsolescence, but not physical aging of the
information carrier. According to the study 62% of users are turning to
journals, whose age does not exceed 1.5 years; 31% use journals aged 1,5-5
years and 7% count on publications older than 10 years. Thus, we can claim
that the document age is clearly connected with the intensity of its use and
therefore can be used in ranking.
4.3 Statistical Data on Book Demands
In order to improve the effective reader service and library collection
management we use the analysis of statistical data on loaned and requested
books[4].
Data on library book use is an important criterion in ranking. Analysis of
information needs and requests can show current reader trends and
dynamics of reader interests. If the book is popular among users then it is
valuable for them and satisfies their information needs. The level of demand
is measured in number of books loaned by readers. These data are kept in
Library Information System (ALIS). In this case we do not take into account
time aspect (number of books loaned during certain period of time), because
not all books were registered in catalogue at once. Consequently, book
could not be found, because it was not in catalogue in the moment when
user needed it. Statistical data have to be analyzed before using in order to
remove splashes of activity caused by the period of exams. In classical tasks
of decision-making theory, normalizing coefficient that lies in the area of
feasible solutions is introduced.
Statistical data on literature demands are subjective. They show some
aspects of book’s value from the point of view of reader, but do not mirror
real level of reader’s information satisfaction. Students are major users of
university library and they use books recommended by academic teacher.
That is why books recommended by teacher would be highly demanded
while others would be undemanded.
4.4 Number of Book Pages
This criterion appeared as a consequence of library collection peculiarity on
the step of transferring information from library collection to electronic
catalogue. Some libraries’ definition of ―book‖ includes guidelines for
laboratory or term papers, promotional materials, etc. This is to simplify the
library work. The distinctive peculiarity of academic textbooks is huge
number of pages. There were selected 2,000 guidelines for laboratory and
term papers, lectures and brochures for our study from the collection of
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 23
Scientific Library of Lviv Polytechnic National University. It has been
found that 1910 (or 96 percent) of these documents does not exceed two
publishing sheets. Therefore, it is advisable to analyze books containing
more than 50 pages.
Problem of multi-criteria optimization plays key role in decision-making
theory. To solve this problem, partial criteria must be merged in one integer
criterion and then its minimum or maximum found. There are few types of
generalized criteria depending on the way of partial criteria combination:
maximin, multiplicative, additive (or linear convolution). To solve the
problem of ranking of bibliographic description list it is needed to build the
objective function that combines partial criteria. With this function we can
determine the relevance of each bibliographic description. For ranking of
found literature we use the algorithm of multiplicative criterion using above
mentioned criteria.
5. RESULTS
The literature recommendation system was developed via
PHP+Apache+MySQL by the Library’s IT Department of Lviv Polytechnic
National University Library. Data in this sytem are synchronized daily
according to ALIS through ODBC protocol. The peculiarity of this system
is that user is given an opportunity to fill feedback form (see Fig.6), find
details of system functioning and ways to implement defined books in
educational process.
The algorithm which is described in this article is the basis of an
information system which is available on http://library.lp.edu.ua/ttp/. It is a
separate webpage, where the user is offered to look for the necessary subject
and review recommended references.
If user thinks that the available references have to be changed, the form is
offered, where user can enter one’s requisites and list of reference changes.
On the same webpage user can operate the function of literature
recommendation for a certain course.
The generated list is analyzed by the teacher. The marked literature that can
be attached to the subject goes to the librarian, who analyzes it and makes
changes (Fig.5).
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 24
Fig. 5. An example of literature recommendations for the course of
ā€œ Foreign languagesā€.
Fig. 6. An example of literature recommendations feedback form
For processing and permanent storage of the results of a web module
work person may use:
 regular automatic data export in the ALIS (for users’ profiles updates in
the ALIS, literature ranking for rank forming in the electronic catalogue
of the ALIS);
 sending automatic information to library staff via e-mail (for the
function of feedback).
6. CONCLUSIONS
The article describes a new service that the library offers for its users. It will
allow the university to improve the quality of information support of
educational and management processes, and provides automated solution of
formation of recommended literature lists and making updates to them. The
teacher receives a number of integration benefits: formation of
recommended literature lists, designed according to the current
bibliographic standards, intelligent algorithms of automatic selection of
literature for the courses, and notification about new books related to the
course.
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 25
7. REFERENCES
[1] Kanamadi, S., & Kumbar, B.D., 2006 . Web-based services expected from libraries: A
case study of management institutes in Mumbai city, Webology, 3 (2), Article 26.
Available at: http://www.webology.org/2006/v3n2/a26.html
[2] Tarasov D., Andrukhiv A., 2012 . Analysis of the development of Ukrainian
repositories, Modern Problems of Radio Engineering, Telecommunications and
Computer Science: Proceeding of the National University ―Lviv Polytechnic‖, p. 383.,
Ukraine
[3] Andrukhiv A., Sokil M., Fedushko S., 2014, Integrating new library services into the
University Information System, Library management, 1 (6), Proceedings of the Institute
of Polish Language and Literature, pp. 79-88, Poland
[4] Bhatnagar A., 2012, Web-based library services. Available at:
http://ir.inflibnet.ac.in/dxml/handle/1944/1418
[5] Burton R.E. and Kebler R.W., 1960, The "half-life" of some scientific and technical
literatures., American Documentation, pp. 98—109.
[6] Sannella, M. J., 1994, Constraint Satisfaction and Debugging for Interactive User
Interfaces. Ph.D. Thesis, University of Washington, Seattle, WA,
This paper may be cited as:
Andrukhiv, A. and Tarasov, D., 2015. Adaptive Search Information
Technology in the University Library. International Journal of Computer
Science and Business Informatics, Vol. 15, No. 2, pp. 15-25.
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 26
Educational Data Mining: Performance
Evaluation of Decision Tree and Clustering
Techniques Using WEKA Platform
Ritika Saxena
(M.Tech, Software Engineering (CSE))
BBD University, Lucknow.
ABSTRACT
Data Mining plays a vital role in information management technology. It is a
computational process of finding patterns from large databases. It mainly focuses on
extracting knowledge from the given or the available data. Different knowledge extracting
tools are used. This tool is most common among every sector be it educational,
organizational etc. Educational Sector can take advantage out of these tools in order to
increase the quality of education. But the sad part is still in present educational systems are
not using it. Higher education Institutions needs to know which student will enrol in which
course, which student needs more assistance. In data mining users are facing the problem
when database consists of large number of features and instances. These kinds of
problem[s] could not be handled using decision trees alone or clustering technique alone.
Because, decision trees depend upon the dataset used and the configuration of the trees.
Similarly, clustering alone doesnā€Ÿt work for all kind of patterns. So in order to find that
which technique is most suitable, in this paper we have evaluated the performance of both
the algorithms. Educational data is mined and the algorithms are applied to it so as to
predict the results.
Keywords
Weka, EDM, Decision Trees, Clustering, KDD.
1. INTRODUCTION
Data mining is widely used in diverse areas. Data Mining is the process
through which we can analyse the different type of data and further extract
the useful information. Data Mining is sometimes known as KD i.e.
Knowledge Data. Data Mining is one of the tools which help in analyzing the
data. It helps in analyzing the data from different angles, categorising them
and hence summarize the relationships identified. Therefore, data mining is
the process through which we can find different relations and patterns
generated among different fields of databases. Educational Data Mining is a
different research field with the application of data mining, machine leaning
and statistics to information generated from educational settings. The main
goals of educational data mining are predicting studentā€Ÿs future learning
behaviour, advancing scientific knowledge, effects of educational support. In
this research paper we are using data mining methodologies in order to
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 27
understand studentā€Ÿs performance using the two commonly used techniques
of data mining. Data mining helps in studying the performance of students
based on their past records. In this paper, we are using two techniques of data
mining that is clustering and decision trees so as to get the results of the
inputs provided by us and compare those results as to which of the
techniques is more preferable and gives the better results .
2. BACKGROUND STUDY
Data Mining is the analysis step of KDD (Knowledge Discovery Database).
Data mining tasks are semi automatic or automatic based on the quantity of
the data available. Data collection, preparation, interpretation and reporting
are not the part of data mining whereas they are the part of KDD. Data
Mining could be performed using different tools some of the tools are listed
below. Different Phases in Data Mining include;
Data Mining Phases
The data in the educational institutions that is stored in electronic form has
seen a dramatic increase. Historical as well as organisational data is stored in
the databases. It is really cumbersome to manage such data manually.
Different relations have to be produced out of the stored data in the database.
The categorization of the students according to their academic result is the
important task for the institutions in order to increase the credibility of their
Data
Exploration
Problem
Definition
Data
Data
Preparation
Deployment Modelling
Evaluation
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 28
institution. There is no assurance whether there are predictors that can
determine or predict whether the student is academic is below average,
average or a genius student. In present day of the educational system, a
studentā€Ÿs performance is determined by the combination of primary results,
secondary results, internal assessments, tests, assignments and attendance
etc.Therefore, in this research paper we are analyzing the results as to which
algorithm is more efficient and predictable.
3. RELATED WORK
Lakshmi et al[1] describes the studentā€Ÿs performance . They used ID3
algorithm in order to classify the students performance and according to
which they will be allotted the area for their master. ID3 algorithm is the
classification algorithm through which we can construct decision trees using
top down, bottom up and greedy search methodologies. In order to select the
attribute which is most useful for the classification of the datasets, metric-
information gain is used.
Ali [2], also describes that how data mining could be used in educational
sector. As the information is collected by the students at the time of
admission and saved in the computer this provides benefit for business point
of view. He used data mining to classify and cluster the information based on
psychographic, behavioural and demographic variables. Therefore, it helps in
describing about the studentā€Ÿs profile whether they are successful or
unsuccessful based on their percentage or GPA secured during secondary
examination and semesters.
Sembiring [6], created a model based on psychometric analysis of the
students using data mining techniques. He created a rule model of the
studentā€Ÿs performance based on their psychometric behaviour. The predictor
variables used are- Interest, Believe, Family Time, Study Behaviour. The
model developed here uses the two main methodologies i.e. kernel k-means
clustering and support vector machine (SVM) classification. As it could be
used on large as well as high dimensional data that are non–linearly
separable.
Bhullar [7], describes a data mining tool that helps to find out the student that
are weak in academics and need assistance. He used Weka classification
algorithms that provide stability between precision, speed and interpretability
of results. J48 algorithm is used which helps in classifying similarly as the
decision trees.
Baradwaj [8], collected the information of the 200 students from VBS
Purvanchal University, Jaunpur(U.P) such as their previous semester marks
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 29
(PSM), class test grade (CTG), Seminar performance(SEM), General
Proficiency(GP),Attendence(ATT) and Lab Work(LW) . Using this record
he used the classification technique in order to cluster them based upon the
percentage and good, average, poor. He also measured entropy so as to check
the impurity.
Romero [9], in his survey described the different studies carried out in this
field. He described different types of used techniques and educational
environments and also the similar work that is done related to educational
data mining. Data mining tools are normally designed in their flexibility
rather than their simplicity. He explains both the aspects where on the one
hand the user has to select the algorithm to carry out with the given data and
on the other hand the algorithm has to be configured before its execution.
XML, PMML, OWL, RDF, SCORM are some of the current data mining
tools.
Calders [11], presents their works in which there are four EDM different
paper that represent a crosscut of different applications areas of data mining.
M. Abu Tair [12], in their research work presented a case study to improve
the studentsā€Ÿ performance mining the data. They extracted the useful
knowledge from the database and after preprocessing the data applied mining
techniques such as association, outlier detection rules and classification.
4. METHODOLOGY
In this paper we have used Weka 3.7 as a comparison tool. Weka contains
the collection of machine learning algorithms. We can perform classification,
clustering, association rules, pre-processing and visualization of the data. In
our work we have created a dataset containing 7 attributes in excel file using
CSV file format. The process that is carried out in this paper is described
below.
Data Mining Process:
The data sets used in this study is obtained from the database of the studentā€Ÿs
from one of the educational institutions. Initially the marks of the students
are stored such as their 10th
percentage, 12th
percentage, semester marks.
First of all the marks are collected of different students in table and then the
processing is carried on. Using Weka 3.7 we can classify and cluster the data
available in our dataset. Weka 3.7 is one of the most efficient comparison
tool when itā€Ÿs related to data mining techniques. The results can be tabulated
very fast and accurate through this tool. When we perform such tasks
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 30
manually without any involvement of tools then it becomes cumbersome to
reach to the desired results as well as the tasks becomes time taking.
In the first phase, clustering technique → k-means clustering is used through
the Weka 3.7. From the given options in the Weka 3.7 tool we choose the
simple k-means algorithm and then through parameterise option we allot the
number of clusters to be formed.
In the second phase, classification technique → decision tree is used through
Weka 3.7. It helps in visualizing the tree structure of the input dataset.
Then the results of both the algorithms are analyzed and the results are
predicted as to which algorithm is more efficient and preferable.
Figure 1. Data Collected through Students Database
The above shown is the dataset collected from the universityā€Ÿs database. The
excel file is saved using csv extension; csv denotes comma separated
values which will be used as an input file. Benefit of using this extension is
that data is automatically tabulated as the separated values while the
processing in the Weka 3.7 tool.
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 31
4.1. CLUSTERING
A clustering is a method in which clusters or groups are formed. It helps in
grouping or collecting the elements of the same kind in one class or group.
These elements are of same type and pattern and are different to those that
belong to different groupings. This can be said as one of the main tasks of
data mining and also a common technique for statistical data analysis. It is
used in many different fields such as machine learning, pattern recognition,
bioinformatics, image analysis and information retrieval. There are many
types of clustering algorithms such as hierarchical clustering, k-means
algorithm, Expectation maximization algorithm (EM), Density-Based Spatial
Clustering Of Applications With Noise (DBSCAN) , Biclustering algorithm,
Fuzzy clustering.
K-Means Clustering:
The term ā€žk-meansā€Ÿ was first coined by James MacQueen in 1967. It uses an
iterative refinement technique. In simple words , it is the algorithm that is
used to classify or collect the group of objects that is based or classified
according to K number of attributes, here there are 7 attributes according to
which clustering is done. This grouping is done by calculating the sum of
square of distances between the given data and cluster centroid and the
elements having the minimum distance are grouped together.
The basic steps of k-means are following:
ļ‚§ Find the centroid.
ļ‚§ Calculate the distance of each objects to the determined centroid.
ļ‚§ Group the objects based on the minimum distance, i.e. the closest
centroid.
Figure 2. Pre-processing the input .csv file
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 32
Firstly, we pre-process the data before being clustered using Weka 3.7 tool.
It helps in to transform the unmanaged data to the understandable format. It
also helps in preparing data for further processing. The steps that data
undergo during pre-processing are: data cleaning, integration,
transformation, reduction and discretion.
After this we apply K-means Clustering through Weka in which the input is
the dataset collected.
Figure 3. K-means applied using 3 clusters
We parameterise number of clusters equal to 3. And then the results are
tabulated. In Weka 3.7 the default clusters are 2 but in this processing 3
clusters are formed that could be related to Grade A, B, C. That is, here we
parameterise the number of clusters into which we want our data to be
clustered.
Figure 4. Clusters 0, 1, 2 are formed after applying algorithm
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 33
Therefore we can see that 3 clusters are formed shown within the circle.
(0,1,2) [Figure 4]. Cluster 0 contains 24 elements, Cluster 1 contains 26
elements and lastly Cluster 2 contains 9 elements. From the following figure
we can see the cluster visualization for our input dataset provided . We can
also parametrise the data using x axis and y axis values. Accordingly to
which the data can be visualized.
Figure 5. Cluster Visualization
From the tool we can access that in this the percentage of errors are
17.792%.
4.2. DECISION TREES
After clustering all the datasets given, we will perform the decision tree
algorithm on the same dataset. In decision trees the data is categorised in the
form of the tree where at the end i.e. the leaf nodes, depict the classes which
contain the datasets. It is one of the most simple and precise technique so as
to mine the data and get the result efficiently. Thus, this study will also help
the students in order to improve their performance for the future grades.
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 34
Figure 6. Decision Tree Implementation
Figure 7. Decision Tree Visualization
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 35
As in this case all the datasets were initially classified and then the results
are passed through the decision trees algorithm and hence the results are
tabulated through visualizing the tree.
As in decision tree we can see that an accuracy of 87.751% is achieved
5. RESULTS
When we perform clustering after the datasets are clustered accordingly to
their relevant classes the numbers of iteration to form 3 clusters were 5. The
root mean squared error value is 17.793. As lower the number of mean
squared value will be the more efficient the algorithm will be.
Figure 8. Results generated after clustering algorithm analysis
Thereafter, performing the second technique of data mining i.e.
classification through decision trees algorithm. Here we have used J48
algorithm, J48 algorithm is the implementation of ID3 algorithm. It helps in
creating univariate decision trees. The results retrieved after the algorithm
implementation is shown below,
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 36
Figure 9. Results generated after Decision trees algorithm implementation
From the above decision tree algorithm results we can see that the root
mean squared error in this is equal to 0.216, which is much less than that of
clustering algorithm.
From the above results we can deduce that decision tree algorithm i.e.
classification technique is more preferable over clustering.
6. CONCLUSION
In this paper, two algorithms are used so as to predict the performance of
both the algorithms. They are applied on the marks of the student retrieved
from the database of the university so as to grade the students based on their
up to date performances. Here we have used the technique of clustering,
decision trees in order to mine the data as the huge amount of data is
available in the university containing the students record so it is required to
refine the data so that the results could be used for the future evaluation.
First of all we evaluated the performance of the clustering algorithm and
then secondly we evaluated the performance of decision trees algorithm and
then the judgement is made as to which algorithm performance is suitable.
And after performing both the techniques it is concluded that decision tree
using J48 algorithm is more efficient than clustering k-means technique.
The accuracy achieved through decision tree is much more than that
achieved through clustering. So it is concluded that classification techniques
are preferable than the clustering techniques.
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 37
REFERENCES
1. LAKSHMI ,D.BHU., . ARUNDATHI , S. and DR.JAGADEESH, ā€œData Mining: A
prediction for Student's Performance Using Decision Tree ID3 Methodā€, July 2014.
2. Ali ,Mohd. Maqsood., ā€œRole Of Data Mining In Education Sectorā€, April 2013.
3. DeLaFayette Winters, Titus.,ā€ Educational Data Mining: Collection and Analysis of
Score Matrices for Outcomes-Based Assessmentā€, June 2006.
4. Torre ,Javier., Rodriguez ,Alejandro., Colomo, Ricardo., Jimenez ,Enrique. and Alor,
Giner.,ā€ Improving Accuracy of Decision Trees Using Clustering Techniquesā€,
February 2013.
5. Ranganathan ,Sindhuja., ā€œImprovements To K-Means Clusteringā€, August 2013.
6. Sembiring ,Sajadin. ,ā€ An Application Of Predicting Student Performance Using
Kernel K-Means And Smooth Support Vector Machineā€, August 2012.
7. Singh Bhullar , Manpreet., Member IAENG, ā€œ Use of Data Mining in Education
Sectorā€, October 2012.
8. Kumar Baradwaj , Brijesh. , ā€œMining Educational Data to Analyze Students
Performanceā€,2011.
9. Romero ,Cristobel. ,, ā€œEducational Data Mining: A Review of the State-of-the-
Artā€,Member, IEEE, Sebastian Ventura, Senior Member, IEEE2010.
10. Patel ,Ketul B. , Chauhan , Jignesh A. and Patel, Jigar D. , ā€œWeb Mining in E-
Commerce: Pattern Discovery, Issues and Applicationsā€, 2011.
11. Calders ,Toon . and Pechenziky ,Mysoka.,ā€Introduction to Special Section On
Educational Data Miningā€, Volume 13 Issue 2.2013.
12. Tair , Mohammad M.Abu . and El-Halees, Alaa M. , ā€œMining Educational Data to
Improve Studentsā€Ÿ Performance: A Case Studyā€, International Journal of Information
and Communication Technology Research, Volume 2 No. 2, February 2012.
13. Huebner, Richard A., Norwich University, ā€œA survey of educational data mining
researchā€, Research in Higher Education Journal.
14. Baker , Ryan SJD. and Yacef, Kalina., ā€œThe State of Educational Data Mining in
2009: A Review and Future Visionsā€, Journal of Educational Data Mining, Article 1,
Vol 1, No 1, Fall 2009.
This paper may be cited as:
Saxena, R., 2015. Educational Data Mining: Performance Evaluation of
Decision Tree and Clustering Techniques Using WEKA Platform.
International Journal of Computer Science and Business Informatics, Vol.
15, No. 2, pp. 26-37.
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 38
Hamiltonian cycle in graphs
šˆ šŸ’ ≄ šŸš’
Nguyen Huu Xuan Truong
Department of Economic Information System,
Academy of Finance, Vietnam
Vu Dinh Hoa
Department of Information Technology,
HaNoi National University of Education, Vietnam
ABSTRACT
Given a simple undirected graph šŗ with š‘› vertices, we denote by šœŽš‘˜ the minimum value of
the degree sum of any š‘˜ pairwise nonadjacent vertices. The graph šŗ is said to be
hamiltonian if it contains a hamiltonian cycle (a cycle passing all vertices of šŗ). The
problem š»š¶ (Hamiltonian Cycle) is well-known a š‘š‘ƒš¶-problem. A lot of authors have
been studied Hamiltonian Cycles in graphs with large degree sums šœŽš‘˜ , but only for
š‘˜ = 1, 2, 3. In this paper, we study the structure of nonhamiltonian graphs satisfying
šœŽ4 ≄ 2š‘›, and we prove that the problem š»š¶ for the graphs satisfying šœŽ4 ≄ 2š‘›š‘” is š‘š‘ƒš¶ for
š‘” < 1 and is š‘ƒ for š‘” ≄ 1.
Keywords
hamiltonian cycle, š‘š‘ƒš¶, šœŽ4.
1. INTRODUCTION
In this paper, we use definitions and notations in [4] with exception for š¾š‘›
the complete graph on š‘› vertices. We consider only simple undirected
graphs. Given a graph šŗ = (š‘‰, šø) on š‘› vertices with the vertex set š‘‰ and the
edge set šø. A set š“ āŠ† š‘‰(šŗ) is independent if no two of its elements are
adjacent. The independent number of šŗ, denoted by š›¼(šŗ), is defined by
setting š›¼ šŗ = š‘šš‘Žš‘„ā”{ š¼ : š¼ āŠ† š‘‰(šŗ) is independent}. We use šœ”(šŗ) to denote
the number of connected components of šŗ. The graph šŗ is tough (or 1-
tough) if šœ”(šŗ āˆ’ š‘†) ≤ š‘† for every nonempty subset š‘† āŠ‚ š‘‰(šŗ).
For two disjoint graphs šŗ1 and šŗ2, we denote by šŗ1 āˆ— šŗ2 the graph with the
vertex set š‘‰(šŗ1) ∪ š‘‰(šŗ2) and the edge set šø(šŗ1) ∪ šø(šŗ2) ∪ {š‘„š‘¦ | š‘„ ∈
š‘‰ šŗ1 , š‘¦ ∈ š‘‰ šŗ2 }. For example, š¾2 āˆ— š¾3 = š¾5. For a positive integer
š‘˜ ≤ š›¼, we define šœŽš‘˜ šŗ = š‘šš‘–š‘›ā”{ š‘‘ š‘„š‘–
š‘˜
š‘–=1 : š‘„1, š‘„2, … , š‘„ š‘˜ is
independent}. In the case š‘˜ > š›¼, set šœŽš‘˜(šŗ) = š‘˜(š‘› āˆ’ š›¼). Instead of šœŽš‘˜(šŗ),
sometimes we simply write šœŽš‘˜.
If šŗ contains a hamiltonian cycle (a cycle passing all vertices of šŗ), then šŗ
is called hamiltonian; otherwise, šŗ is nonhamiltonian. A graph šŗ with a
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 39
hamiltonian path (a path passing all vertices of šŗ) is said to be traceable.
Let š¶š‘˜ be the cycle of length š‘˜. The graph šŗ is said to be š‘˜-connected if
šŗ āˆ’ š‘‹ is connected for any š‘‹ āŠ† š‘‰ with š‘‹ < š‘˜ < š‘›. Note that a tough
graph is 2-connected, and toughness is a necessary condition for the
existence of a hamiltonian cycle in a graph [6]. There is a polynomial
algorithm š‘‚ š‘›3
time to recognize 2-connected graph.
The problem š»š‘ƒ, š»š¶ are well-known š‘š‘ƒš¶-problem [1] [10].
š‘Æš‘· (HAMILTONIAN PATH)
Instance: Graph šŗ.
Question: Is šŗ traceable?
š‘Æš‘Ŗ (HAMILTONIAN CYCLE)
Instance: Graph šŗ.
Question: Is šŗ hamiltonian?
A lot of authors have been studied Hamiltonian Cycles in graphs with large
degree sums šœŽš‘˜, but only for š‘˜ = 1, 2, 3, (see [3] [5] [9], etc).
For a positive integer š‘˜, we state the problem š»š¶š‘˜ as follow:
š‘Æš‘Ŗš’Œ
Instance: Given a real š‘” > 0 and a graph šŗ satisfying šœŽš‘˜ ≄
š‘˜š‘›
2
š‘”.
Question: Is šŗ hamiltonian?
In [7], [8], we prove that:
Theorem 1.1 [7]. š»š¶2(š‘” < 1) is š‘š‘ƒš¶ and š»š¶2(š‘” ≄ 1) is š‘ƒ.
Theorem 1.2 [8]. š»š¶3(š‘” < 1) is š‘š‘ƒš¶ and š»š¶3(š‘” ≄ 1) is š‘ƒ.
In this paper, we study the class of graphs satisfying šœŽ4 ≄ 2š‘› for the
problem š»š¶4.
2. RESULTS
The following Theorem will be proved in Section 5.
Theorem 2.1. Let šŗ be 2-connected graph with šœŽ4 ≄ 2š‘›. If šŗ is
nonhamiltonian then š›¼ šŗ = 3 and šŗ belongs to one of the following three
classes of graphs:
1. Class ℱ1 of 2-connected graphs šŗ with š›¼ šŗ = 3 such that there exists
a subset š‘† āŠ† š‘‰ šŗ , š‘† = 2 so that šŗ āˆ’ š‘† = š¾š‘›1
∪ š¾š‘›2
∪ š¾š‘›3
.
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 40
Figure 1. Class š“• šŸ.
2. Class ℱ2 of 2-connected graphs šŗ with š›¼ šŗ = 3 such that there exists
three disjoint complete graphs š¾š‘›1
, š¾š‘›2
, š¾š‘›3
āŠ† šŗ and a vertex š‘„ ∈ š‘‰(šŗ)
and š‘¦1 ∈ š¾š‘›1
, š‘¦2 ∈ š¾š‘›2
, š‘¦3 ∈ š¾š‘›3
so that šŗ āˆ’ š‘„ = (š¾š‘›1
∪ š¾š‘›2
∪
š¾š‘›3
) + š‘¦1 š‘¦2, š‘¦2 š‘¦3, š‘¦3 š‘¦1 . Moreover, there exists three vertices
š‘§1 ∈ š¾š‘›1
āˆ’ š‘¦1 , š‘§2 ∈ š¾š‘›2
āˆ’ š‘¦2 , š‘§3 ∈ š¾š‘›3
āˆ’ š‘¦3 such that š‘§1, š‘§2, š‘§3 ∈
š‘(š‘„) and š‘„ can possibly be adjacent to the another vertices.
Figure 2. Class š“• šŸ.
3. Class ℱ3 of 2-connected graphs šŗ with š›¼ šŗ = 3 such that there exists
three disjoint complete graphs š¾š‘›1
, š¾š‘›2
, š¾š‘›3
āŠ† šŗ ( š¾š‘›1
, š¾š‘›2
, š¾š‘›3
≄
3) and distinct vertices š‘¦š‘–, š‘§š‘– ∈ š¾š‘› š‘–
for š‘– = 1, 2, 3 so that šŗ = š¾š‘›1
∪
š¾š‘›2
∪ š¾š‘›3
+ š‘¦1 š‘¦2, š‘¦2 š‘¦3, š‘¦3 š‘¦1 + š‘§1 š‘§2, š‘§2 š‘§3, š‘§3 š‘§1 .
Figure 3. Class š“• šŸ‘.
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 41
Note that the graph šŗš‘› = š¾1 āˆ— š¾1 āˆ— (š¾3 āˆ— š¾š‘›āˆ’5) with š‘› ≄ 11 satisfies
šœŽ4 ≄ 2š‘› and is not 2-connected. In Section 3, we give polynomial
algorithms to recognize whether a given graph belongs to ℱ1 ∪ ℱ2 ∪ ℱ3.
From Theorem 2.1, we conclude the following corollary.
Corollary 2.1. Every 2-connected graph with š›¼ ≄ 4 and šœŽ4 ≄ 2š‘› is
hamiltonian.
For š‘” < 1, we prove the following Theorem:
Theorem 2.2. š»š¶4 (š‘” < 1) is š‘š‘ƒš¶.
Proof. The š»š¶4 is a subproblem of š»š¶, so it belongs to š‘š‘ƒ. In order to
prove š»š¶4 (š‘” < 1) is š‘š‘ƒš¶, we will construct a polynomial transformation
from the problem š»š‘ƒ to it.
For any graph šŗ1 with š‘›1 vertices, we choose a positive integer š‘š ≄
š‘šš‘Žš‘„
š‘” š‘›1āˆ’1
2(1āˆ’š‘”)
, 5 . Then we construct a graph šŗ2 from šŗ1 by adding new
vertex set š‘1, š‘2, … , š‘ š‘š ∪ š‘ž1, š‘ž2, … , š‘ž š‘šāˆ’1 and the edges joining each
vertex of š‘1, š‘2, … , š‘ š‘š to all other vertices. In this way, we obtain the
graph šŗ2 = šŗ1 ∪ š¾ š‘šāˆ’1 āˆ— š¾ š‘š . This construction can be proceeded with the
Turing machine in polynomial time.
We observe that the graph šŗ2 has š‘›2 = š‘›1 + 2š‘š āˆ’ 1 vertices and šœŽ4 šŗ2 =
4š‘š. Because of š‘š ≄
š‘” š‘›1āˆ’1
2(1āˆ’š‘”)
, so 2š‘š ≄ š‘”(š‘›1 + 2š‘š āˆ’ 1), it implies that
šœŽ4 šŗ2 ≄ 2š‘›2 š‘”.
Now we prove that šŗ2 has a hamiltonian cycle if and only if šŗ1 has a
hamiltonian path. Indeed, if šŗ1 has a hamiltonian path š» then š¶ =
(š», š‘1, š‘ž1, š‘2, š‘ž2, … , š‘ š‘šāˆ’1, š‘ž š‘šāˆ’1, š‘ š‘š ) is a hamiltonian cycle in šŗ2.
If šŗ2 has a hamiltonian cycle š¶. Observe that š‘žš‘– (š‘– = 1. . š‘š āˆ’ 1) has only
neighbor š‘š‘— (š‘— = 1. . š‘š), so all vertices in š‘ž1, š‘ž2, … , š‘ž š‘šāˆ’1 are only
adjacent to all the vertices in š‘1, š‘2, … , š‘ š‘š . Then, if we remove all vertices
in š‘1, š‘2, … , š‘ š‘š then we obtain š‘š connected components, which are
š‘ž1 , š‘ž2 , … , . š‘ž š‘šāˆ’1 and šŗ1, each of the connected components has a
hamiltonian path (the rest of š¶ after removing š‘1, š‘2, … , š‘ š‘š ). Therefore,
šŗ1 has a hamiltonian path.
Thus, we have a polynomial transformation from š»š‘ƒ to š»š¶4(š‘” < 1). Since
š»š¶4(š‘” < 1) ∈ š‘š‘ƒ and š»š‘ƒ ∈ š‘š‘ƒš¶, it implies that š»š¶4 (š‘” < 1) ∈ š‘š‘ƒš¶.
Theorem 2.3. š»š¶4 (š‘” ≄ 1) is š‘ƒ.
Proof. Assume that šŗ satisfies šœŽ4 ≄ 2š‘›š‘” with š‘” ≄ 1. First, we check
whether šŗ is 2-connected or not (it can be done in polynomial time).
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 42
If šŗ is not 2-connected then šŗ is nonhamiltonian.
If šŗ is 2-connected, then by Theorem 2.1, either šŗ is hamiltonian or šŗ
belongs to ℱ1 ∪ ℱ2 ∪ ℱ3 which can be recognize in polynomial time (see
Section 3). Thus, š»š¶4 (š‘” ≄ 1) is š‘ƒ.
3. POLYNOMIAL ALGORITHMS RECOGNIZING THE CLASSES
š“• šŸ, š“• šŸ, š“• šŸ‘
Assume that š‘† āŠ† š‘‰(šŗ) and š»1, š»2, … . , š»š‘˜ are connected components of
šŗ āˆ’ š‘†. Note that the problem ā€œGiven a vertex set š‘† in a graph šŗ, determine
šœ” šŗ āˆ’ š‘† and whether every connected component of šŗ āˆ’ š‘† is completeā€
can be solved in polynomial time by an algorithm š‘‚(š‘›2
). Following, we
design the polynomial algorithms recognizing the classes ℱ1, ℱ2, ℱ3.
3.1. Algorithm recognizing the class š“• šŸ
Every graph šŗ in class ℱ1 is not 1-tough. If we remove š‘†, then we get three
connected components which are complete.
Input: graph šŗ with šœŽ4 ≄ 2š‘›.
Output: Is_Graph_ℱ1 return True if šŗ ∈ ℱ1, else return False.
Algorithm:
Function Boolean Is_Graph_š“• šŸ
Begin
If šŗ is not 2-connected Then Return False;
For each š‘† in š‘‰(šŗ)2
do
If (šœ” šŗ āˆ’ š‘† = 3) and (the connected components
š»1, š»2, š»3 are complete) Then Return True;
Return False;
End;
Checking šŗ is not 2-connected can be done by š‘‚(š‘›2
) time. Next, there are
š¶š‘›
2
iterations, each iteration requires š‘‚(š‘›2
) time. Thus the overall time
required by algorithm Is_Graph_ℱ1 is š‘‚(š‘›4
).
3.2. Algorithm recognizing the class š“• šŸ
For each graph šŗ in class ℱ2, if we remove š‘† = {š‘„, š‘¦1, š‘¦2, š‘¦3}, then we get
three connected components š»1, š»2, š»3 which are complete.
Input: graph šŗ with šœŽ4 ≄ 2š‘›.
Output: Is_Graph_ℱ2 return True if šŗ ∈ ℱ2, else return False.
Algorithm:
Function Boolean Is_Graph_š“• šŸ;
Begin
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 43
For each š‘† in š‘‰(šŗ)4
do
If (šœ” šŗ āˆ’ š‘† = 3) and (the connected components
š»1, š»2, š»3 are complete) Then
If there exists š‘„ ∈ š‘† and š‘† āˆ’ š‘„ = {š‘¦1, š‘¦2, š‘¦3} such
that:
( š‘ š»1
(š‘„) , š‘ š»2
(š‘„) , š‘ š»3
(š‘„) ≄ 1) and
( š‘¦1 š‘¦2, š‘¦2 š‘¦3, š‘¦3 š‘¦1 āŠ† šø(šŗ)) and
(š»1 + š‘¦1 , š»2 + š‘¦2 , š»3 + š‘¦3 are complete)
Then Return True;
Return False;
End;
There are š¶š‘›
4
iterations, each iteration requires š‘‚(š‘›2
) time, so the overall
time required by algorithm Is_Graph_ℱ2 is š‘‚(š‘›6
).
3.3. Algorithm recognizing the class š“• šŸ‘
For each graph šŗ in class ℱ3, if we remove š‘† = {š‘¦1, š‘¦2, š‘¦3, š‘§1, š‘§2, š‘§3}, then
we get three connected components š»1, š»2, š»3 which are complete.
Input: graph šŗ with šœŽ4 ≄ 2š‘›.
Output: Is_Graph_ℱ3 return True if šŗ ∈ ℱ3, else return False.
Algorithm:
Function Boolean Is_Graph_š“• šŸ‘
Begin
For each š‘† in š‘‰(šŗ)6
do
If (šœ” šŗ āˆ’ š‘† = 3) and (the connected components
š»1, š»2, š»3 are complete graphs) Then
If there exists š‘¦1, š‘¦2, š‘¦3 ∈ š‘† and š‘† āˆ’ š‘¦1, š‘¦2, š‘¦3 =
{š‘§1, š‘§2, š‘§3} such that:
( š‘¦1 š‘¦2, š‘¦2 š‘¦3, š‘¦3 š‘¦1, š‘§1 š‘§2, š‘§2 š‘§3, š‘§3 š‘§1 āŠ† šø(šŗ)) and
(š»1 + š‘¦1, š‘§1 , š»2 + š‘¦2, š‘§2 , š»3 + š‘¦3, š‘§3 are complete)
Then Return True;
Return False;
End;
There are š¶š‘›
6
iterations, each iteration requires š‘‚(š‘›2
) time, so the overall
time required by algorithm Is_Graph_ℱ3 is š‘‚(š‘›8
).
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 44
4. PRELIMINARIES
For what follows we assume that š¶ is a longest cycle of šŗ. On š¶ (š¶ with a
given orientation), we denote the predecessor and successor (along š¶ ) by
š‘„āˆ’
, š‘„+
, and š‘„++
= (š‘„+
)+
, š‘„āˆ’āˆ’
= (š‘„āˆ’
)āˆ’
. In general, for a positive integer š‘–,
š‘„+š‘–
= (š‘„+ š‘–āˆ’1
)+
and š‘„āˆ’š‘–
= (š‘„āˆ’ š‘–āˆ’1
)āˆ’
. Moreover, for a vertex set š“ āŠ†
š‘‰(š¶), we wirte š“+
= š‘„+
: š‘„ ∈ š“ and š“āˆ’
= š‘„āˆ’
: š‘„ ∈ š“ . The path joining
two vertices š‘„ and š‘¦ of š¶, along š¶ , is denoted by š‘„š¶ š‘¦, and the same path
in reverse order are given by š‘¦š¶ š‘„.
In this paper, we consider the paths and cycles as vertex sets. If š‘„, š‘¦ are the
end vertices of a path š‘ƒ, sometimes we write š‘„š‘ƒš‘¦ instead of š‘ƒ.
Assume that š» is a connected component of šŗ āˆ’ š¶ and š‘š¶(š») is the set of
neighbors in š¶ of all vertices in š». A edge sequence is a path joining two
vertices on š¶ and its inner vertices belong to šŗ āˆ’ š¶ āˆ’ š». In particular, an
edge joining 2 non-consecutive vertices on š¶ is also a edge sequence.
Lemma 4.1. Let šŗ be a 2-connected graph. If šŗ is nonhamiltonian and š» is
a connected component of šŗ āˆ’ š¶ then
(a) š‘š¶ š» ∩ š‘š¶ š» +
= š‘š¶ š» ∩ š‘š¶ š» āˆ’
= āˆ….
(b) There is no edge sequence joining 2 vertices of š‘š¶(š»)+
. Similarly, there
is no edge sequence joining 2 vertices of š‘š¶(š»)āˆ’
.
(c) If š‘£š‘–, š‘£š‘— ∈ š‘š¶(š») for š‘– ≠ š‘— then there is no vertex š‘§ ∈ š‘£š‘–
+
š¶ š‘£š‘— such that
{š‘£š‘–
+
š‘§+
, š‘£š‘—
+
š‘§} āŠ† šø(šŗ). Similarly, there is no vertex š‘§ ∈ š‘£š‘—
+
š¶ š‘£š‘– such that
{š‘£š‘—
+
š‘§+
, š‘£š‘–
+
š‘§} āŠ† šø(šŗ).
(d) For any š‘„ ∈ š» and for any š‘£š‘– ∈ š‘š¶(š»), š‘‘ š‘„ + š‘‘ š‘£š‘–
+
≤ š‘› āˆ’ 1.
Proof. (a), (b), (c) are presented in [2], so we will prove (d). For any š‘„ ∈ š»,
š‘‘ š‘„ = š‘ š»(š‘„) + š‘š¶(š‘„) ≤ š» āˆ’ 1 + š‘š¶(š») . By (a) and (b), š‘‘ š‘£š‘–
+
≤
šŗ āˆ’ š» āˆ’ š‘š¶ š» +
= šŗ āˆ’ š» āˆ’ š‘š¶(š») , so š‘‘ š‘„ + š‘‘ š‘£š‘–
+
≤ š» āˆ’
1 + š‘š¶ š» + šŗ āˆ’ š» āˆ’ š‘š¶ š» = šŗ āˆ’ 1 = š‘› āˆ’ 1.
Lemma 4.2 [2]. Assume that š‘¢, š‘£ are nonadjacent vertices and š‘‘ š‘¢ +
š‘‘(š‘£) ≄ š‘›. Then šŗ is hamiltonian if and only if šŗ + š‘¢š‘£ is hamiltonian.
We conclude the following Lemma from Lemma 4.2.
Lemma 4.3. Assume that šŗāˆ—
āŠ‡ šŗ such that š‘‰ šŗāˆ—
= š‘‰(šŗ) and š‘‘ šŗ š‘¢ +
š‘‘ šŗ(š‘£) ≄ š‘› for any edge š‘¢š‘£ ∈ šø šŗāˆ—
āˆ’ šø(šŗ). Then šŗ is hamiltonian if and
only if šŗāˆ—
is hamiltonian.
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 45
5. PROOFS OF THEOREM 2.1
For what follows, we assume that šŗ is nonhamiltonian. Because šŗ is 2-
connected, so šŗ is cycleable. Let š»1, š»2, … , š» š‘š be the connected
components of šŗ āˆ’ š¶. Clearly, š‘š¶(š»š‘–) ≄ 2 for any š‘– = 1. . š‘š.
Proposition 5.1. š»1, š»2, … , š» š‘š are complete graphs.
Proof. We consider a connected component š»š‘” (š‘” = 1. . š‘š). Because šŗ is 2-
connected, so š‘š¶(š»š‘”) ≄ 2 and there are at least two vertices š‘£š‘–, š‘£š‘— ∈
š‘š¶(š»š‘”). If š»š‘” is not complete then there are two distinct vertices š‘„, š‘¦ ∈ š»š‘”
such that š‘„š‘¦ āˆ‰ šø(šŗ). By Lemma 4.1 (a, b), š‘„, š‘¦, š‘£š‘–
+
, š‘£š‘—
+
is an independent
vertex set, therefore by šœŽ4 ≄ 2š‘›, š‘‘ š‘„ + š‘‘ š‘¦ + š‘‘ š‘£š‘–
+
+ š‘‘(š‘£š‘—
+
) ≄ 2š‘›.
However, by Lemma 4.1 (d), š‘‘ š‘„ + š‘‘ š‘£š‘–
+
≤ š‘› āˆ’ 1 and š‘‘ š‘¦ + š‘‘(š‘£š‘—
+
) ≤
š‘› āˆ’ 1, it implies that š‘‘ š‘„ + š‘‘ š‘¦ + š‘‘ š‘£š‘–
+
+ š‘‘(š‘£š‘—
+
) ≤ 2š‘› āˆ’ 2, a
contradiction. Thus, š»š‘” is complete, and we have š»1, š»2, … , š» š‘š are
complete graphs.
Proposition 5.2. š‘š¶(š»š‘”) ≤
š¶
2
for every š‘” = 1. . š‘š.
Proof. By Lemma 4.1 (a), š‘š¶ š»š‘” ∩ š‘š¶ š»š‘”
+
= āˆ…, therefore š¶ ≄
š‘š¶ š»š‘” ∪ š‘š¶ š»š‘”
+
= 2 š‘š¶ š»š‘” , it implies that š‘š¶(š»š‘”) ≤
š¶
2
.
Proposition 5.3. š‘š = 1.
Proof. We consider the case of š‘š as follow:
a) š‘š ≄ 4.
Let š‘„š‘– ∈ š»š‘– for each š‘– = 1. .4. Clearly, the vertex set š‘„1, š‘„2, š‘„3, š‘„4 is
independent, by šœŽ4 ≄ 2š‘› we have š‘‘ š‘„1 + š‘‘ š‘„2 + š‘‘ š‘„3 + š‘‘(š‘„4) ≄ 2š‘›.
Moreover, by Proposition 5.2 and š‘š ≄ 4, š‘‘ š‘„š‘– ≤ š»š‘– āˆ’ 1 + š‘š¶ š»š‘– ≤
š»š‘– āˆ’ 1 +
š¶
2
, so š‘‘ š‘„1 + š‘‘ š‘„2 + š‘‘ š‘„3 + š‘‘ š‘„4 ≤ š»1 + š»2 + š»3 +
š»4 + 2 š¶ āˆ’ 4 ≤ š‘› + š¶ āˆ’ 4, therefore š‘› + š¶ āˆ’ 4 ≄ 2š‘›, it implies that
š¶ ≄ š‘› + 4, a contradiction.
Thus, the case š‘š ≄ 4 does not happen.
b) š‘š = 3.
Let š‘„ ∈ š»1, š‘¦ ∈ š»2, š‘§ ∈ š»3 and we consider each vertex š‘£š‘– ∈ š‘š¶(š»1).
Claim 5.1. š‘£š‘–
+
∈ š‘(š‘¦) ∪ š‘(š‘§).
Proof. Assume to the contrary that š‘£š‘–
+
āˆ‰ š‘(š‘¦) ∪ š‘(š‘§), then the vertex
set š‘„, š‘¦, š‘§, š‘£š‘–
+
is independent, by šœŽ4 ≄ 2š‘› we have š‘‘ š‘„ + š‘‘ š‘¦ +
š‘‘ š‘§ + š‘‘(š‘£š‘–
+
) ≄ 2š‘›. By Lemma 4.1 (d), š‘‘ š‘„ + š‘‘ š‘£š‘–
+
≤ š‘› āˆ’ 1.
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 46
Moreover, by Proposition 5.2 we have š‘‘(š‘¦) ≤ š»2 āˆ’ 1 +
š¶
2
and
š‘‘(š‘§) ≤ š»3 āˆ’ 1 +
š¶
2
. Therefore, š‘‘ š‘„ + š‘‘ š‘¦ + š‘‘ š‘§ + š‘‘ š‘£š‘–
+
≤ š‘› āˆ’
3 + š»2 + š»3 + š¶ < 2š‘› āˆ’ 3, a contradiction.
Claim 5.2. š‘š¶(š»1) = š‘š¶(š»2) = š‘š¶(š»3) = 2.
Proof. If š‘š¶(š»1) ≄ 3 then by Claim 5.1, there are at least two vertices
š‘£š‘–, š‘£š‘— ∈ š‘š¶(š»1) such that š‘£š‘–
+
, š‘£š‘—
+
∈ š‘(š‘¦) or š‘£š‘–
+
, š‘£š‘—
+
∈ š‘(š‘§), therefore
there exists an edge sequence joining š‘£š‘–
+
, š‘£š‘—
+
, which contradicts to
Lemma 4.1 (b). Thus, š‘š¶(š»1) = 2. Similarly, we have š‘š¶(š»2) =
š‘š¶(š»3) = 2.
Claim 5.3. 5 ≤ š¶ ≤ 6.
Proof. If there exists š‘£ ∈ š¶ such that š‘£ āˆ‰ š‘š¶(š»1) ∪ š‘š¶(š»2) ∪ š‘š¶(š»3),
then the vertex set š‘„, š‘¦, š‘§, š‘£ is independent, by šœŽ4 ≄ 2š‘› we have
š‘‘ š‘„ + š‘‘ š‘¦ + š‘‘ š‘§ + š‘‘(š‘£) ≄ 2š‘›. However, š‘‘ š‘„ ≤ š»1 āˆ’ 1 +
š‘š¶ š»1 = š»1 + 1, š‘‘ š‘¦ ≤ š»2 + 1, š‘‘ š‘§ ≤ š»3 + 1, š‘‘ š‘£ ≤ š¶ āˆ’
1, so š‘‘ š‘„ + š‘‘ š‘¦ + š‘‘ š‘§ + š‘‘ š‘£ ≤ š»1 + š»2 + š»3 + š¶ + 2 =
š‘› + 2. It implies that š‘› + 2 ≄ 2š‘› and š‘› ≤ 2, a contradiction. Therefore,
š‘š¶ š»1 ∪ š‘š¶ š»2 ∪ š‘š¶ š»3 = š¶ , and by Claim 5.2, š¶ ≤ 6.
Moreover, by Lemma 4.1 (a), š¶ ≄ 4. If š¶ = 4 then by Lemma 4.1 (a)
and Claim 5.1, there exists an edge sequence joining two vertices in
š‘š¶ š»1
+
, which contradicts Lemma 4.1 (b). Thus, we have 5 ≤ š¶ ≤ 6.
If š¶ = 5, so š¶ = (š‘£1, š‘£2, š‘£3, š‘£4, š‘£5). Without loss of generality, by Lemma
4.1 (a, b) and Claim 5.1, we assume that š‘£1, š‘£3 ∈ š‘š¶(š»1), š‘£2 ∈ š‘š¶(š»2),
š‘£4 ∈ š‘š¶(š»3). Then, š‘£5 ∈ š‘š¶(š»2) and š‘š¶ š»2
+
= š‘£1, š‘£3 . It implies that
there exists an edge sequence joining two vertices in š‘š¶ š»2
+
, which
contradicts Lemma 4.1 (b). Therefore, by Claim 5.3, š¶ = 6, so š¶ =
(š‘£1, š‘£2, š‘£3, š‘£4, š‘£5, š‘£6) and by Claim 5.2, š‘š¶ š»1 ∩ š‘š¶ š»2 = š‘š¶ š»2 ∩
š‘š¶ š»3 = š‘š¶ š»1 ∩ š‘š¶ š»3 = āˆ…. Without loss of generality, by Lemma
4.1 (a, b) and Claim 5.1, there are two possible case as follow:
(1) Case š‘£1, š‘£3 ∈ š‘š¶(š»1), š‘£2 ∈ š‘š¶(š»2), š‘£4 ∈ š‘š¶(š»3). Observe that
š‘£6 ∈ š‘š¶(š»3) and š‘£5 ∈ š‘š¶(š»2). Let š‘Š1, š‘Š2, š‘Š3 be the paths in
š»1, š»2, š»3 joining the pair of vertices š‘£1, š‘£3 , š‘£2, š‘£5 , š‘£4, š‘£6
respectively. Then, we have š¶ā€²
= (š‘£1 š‘Š1 š‘£3 š‘£2 š‘Š2 š‘£5 š‘£4 š‘Š3 š‘£6 š‘£1) is longer
than š¶, which contradicts the fact that š¶ is a longest cycle of šŗ.
(2) Case š‘£1, š‘£4 ∈ š‘š¶(š»1), š‘£2 ∈ š‘š¶(š»2), š‘£5 ∈ š‘š¶(š»3). Observe that
š‘£6 ∈ š‘š¶(š»2) and š‘£3 ∈ š‘š¶(š»3). Let š‘Š1, š‘Š2, š‘Š3 be the paths in
š»1, š»2, š»3 joining the pair of vertices š‘£1, š‘£4 , š‘£2, š‘£6 , š‘£3, š‘£5
respectively. The, we have š¶ā€²
= (š‘£1 š‘Š1 š‘£4, š‘£3 š‘Š3 š‘£5, š‘£6 š‘Š2 š‘£2, š‘£1) is
longer than š¶, a contradiction.
Thus, the case š‘š = 3 does not happen.
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 47
c) š‘š = 2.
Without loss of generality, assume that š»1 + š‘š¶(š»1) ≄ š»2 +
š‘š¶(š»2) .
Claim 5.4. š‘š¶(š»1) = 2.
Proof. By š‘š¶(š»1) ≄ 2, assume to contrary that š‘š¶(š»1) ≄ 3. Let
š‘„ ∈ š»1, š‘¦ ∈ š»2. By Lemma 4.1 (b) there exists two vertices š‘£š‘–
+
, š‘£š‘—
+
∈
š‘š¶ š»1
+
āˆ’ š‘š¶(š»2). By Lemma 4.1 (a, b), the vertex set š‘„, š‘¦, š‘£š‘–
+
, š‘£š‘—
+
is
independent, so š‘‘ š‘„ + š‘‘ š‘¦ + š‘‘ š‘£š‘–
+
+ š‘‘(š‘£š‘—
+
) ≄ 2š‘›. By Lemma 4.1
(d), š‘‘ š‘„ + š‘‘ š‘£š‘–
+
≤ š‘› āˆ’ 1. Moreover, š‘‘ š‘¦ ≤ š»2 āˆ’ 1 + š‘š¶ š»2 ≤
š»1 āˆ’ 1 + š‘š¶(š»1) , š‘‘(š‘£š‘—
+
) ≤ š‘› āˆ’ š»1 āˆ’ š‘š¶(š»1) . Therefore š‘‘ š‘„ +
š‘‘ š‘¦ + š‘‘ š‘£š‘–
+
+ š‘‘(š‘£š‘—
+
) ≤ 2š‘› āˆ’ 2, a contradiction. Thus, š‘š¶(š»1) = 2.
Claim 5.5. š‘š¶(š»2) = 2.
Proof. Assume to contrary that š‘š¶(š»2) ≄ 3. Arguing similarly the
proof of Claim 5.4, there exists two vertices š‘£š‘–
+
, š‘£š‘—
+
∈ š‘š¶ š»2
+
āˆ’
š‘š¶(š»1). Let š‘„ ∈ š»1, š‘¦ ∈ š»2. By Lemma 4.1 (a, b), the vertex set
š‘„, š‘¦, š‘£š‘–
+
, š‘£š‘—
+
is independent, so š‘‘ š‘„ + š‘‘ š‘¦ + š‘‘ š‘£š‘–
+
+ š‘‘(š‘£š‘—
+
) ≄ 2š‘›.
By Lemma 4.1 (b) and by š‘£š‘–
+
āˆ‰ š‘(š»1) ∪ š‘(š»2), š‘‘ š‘£š‘–
+
≤ š¶ āˆ’
š‘š¶(š»2) . Moreover, š‘‘ š‘„ ≤ š»1 āˆ’ 1 + š‘š¶ š»1 = š»1 + 1, š‘‘ š‘¦ ≤
š»2 āˆ’ 1 + š‘š¶ š»2 , š‘‘(š‘£š‘—
+
) ≤ š¶ āˆ’ š‘š¶ š»2 ≤ š¶ āˆ’ 2 ≤ š‘› āˆ’ 4.
Therefore, š‘‘ š‘„ + š‘‘ š‘¦ + š‘‘ š‘£š‘–
+
+ š‘‘(š‘£š‘—
+
) ≤ š»1 + š»2 + š¶ + š‘› āˆ’
4 = 2š‘› āˆ’ 4, a contradiction. Thus, š‘š¶(š»2) = 2.
By arguing similarly above, observe that š‘š¶(š»1)+
∩ š‘š¶(š»2) = 1 =
š‘š¶(š»2)+
∩ š‘š¶(š»1) . Without loss of generality, we assume that š‘š¶ š»2 =
š‘£š‘–, š‘£š‘–
+2
, š‘š¶ š»1 = š‘£š‘— , š‘£š‘–
+
with š‘£š‘— ≠ š‘£š‘–
+3
and š‘£š‘—
+
≠ š‘£š‘–. Because šŗ is 2-
connected and š¶ is a longest cycle of šŗ, so š»2 = 1, i.e š»2 = š‘¦ . Let
š‘„ ∈ š»1 and š‘Š1 be the path in š»1 joining š‘£š‘–
+
to š‘£š‘— .
Figure 4. Illustrating the proofs of part c), Proposition 5.3.
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 48
If š‘£š‘–
+3
š‘£š‘—
+
∈ šø(šŗ) then š¶ā€²
= (š‘£š‘– š‘¦š‘£š‘–
+2
š‘£š‘–
+
š‘Š1 š‘£š‘— š¶ š‘£š‘–
+3
š‘£š‘—
+
š¶ š‘£š‘–) is longer than š¶,
a contradiction. Therefore, š‘£š‘–
+3
š‘£š‘—
+
āˆ‰ šø(šŗ) and the vertex set š‘„, š‘¦, š‘£š‘–
+3
, š‘£š‘—
+
is independent, so š‘‘ š‘„ + š‘‘ š‘¦ + š‘‘(š‘£š‘–
+3
) + š‘‘(š‘£š‘—
+
) ≄ 2š‘›. However, by
Lemma 4.1 (d), š‘‘ š‘¦ + š‘‘(š‘£š‘–
+3
) ≤ š‘› āˆ’ 1 and š‘„ + š‘‘(š‘£š‘—
+
) ≤ š‘› āˆ’ 1, it
implies that š‘‘ š‘„ + š‘‘ š‘¦ + š‘‘(š‘£š‘–
+3
) + š‘‘(š‘£š‘—
+
) ≤ 2š‘› āˆ’ 2, a contradiction.
Thus, the case š‘š = 2 does not happen.
By these case a), b), c) do not happen, we finish the proof that š‘š = 1. Then
šŗ āˆ’ š¶ has only one connected component. For what follows, let š» be the
connected component of šŗ āˆ’ š¶. The fact that š» = šŗ āˆ’ š¶. By Proposition
5.1, š» is complete.
Proposition 5.4. š‘š¶(š») = 2.
Proof. Clearly, š‘š¶(š») ≄ 2 by šŗ is 2-connected. Assume that š‘š¶(š») ≄
3. For any two vertices š‘£š‘–, š‘£š‘— ∈ š‘š¶ š» , let š‘£ š‘˜ ∈ š‘š¶ š» āˆ’ š‘£š‘–, š‘£š‘— and š‘„ ∈
š», then by Lemma 4.1 (b) the vertex set š‘„, š‘£š‘–
+
, š‘£š‘—
+
, š‘£ š‘˜
+
is independent. So
š‘‘ š‘„ + š‘‘ š‘£š‘–
+
+ š‘‘(š‘£š‘—
+
) + š‘‘(š‘£ š‘˜
+
) ≄ 2š‘›. However, by Lemma 4.1 (d),
š‘„ + š‘‘ š‘£ š‘˜
+
≤ š‘› āˆ’ 1, it implies that š‘‘ š‘£š‘–
+
+ š‘‘(š‘£š‘—
+
) ≄ š‘› + 1.
By šŗ is 2-connected and š» is complete, there exists two vertices š‘£š‘–0
, š‘£š‘—0
∈
š‘š¶(š») and a hamiltonian path š‘Š in š» joining š‘£š‘–0
to š‘£š‘—0
. Then š¶ā€²
=
(š‘£š‘–0
š‘Šš‘£š‘—0
š¶ š‘£š‘–0
+
š‘£š‘—0
+
š¶ š‘£š‘–0
) is a hamiltonian cycle of graph šŗā€²
= šŗ + š‘£š‘–0
+
š‘£š‘—0
+
, i.e.
šŗā€² is hamiltonian. By Lemma 4.2, šŗ is hamiltonian if and only if šŗā€²
is
hamiltonian, therefore šŗ is hamiltonian, which contradicts to the assumption
that šŗ is nonhamiltonian. Thus, š‘š¶(š») = 2.
For what follows, let š‘£š‘–, š‘£š‘— be two vertices of š‘š¶(š») and let š‘Š be the
hamiltonian path of š» joining š‘£š‘–, š‘£š‘— .
Proposition 5.5. š‘ š‘£š‘–
+
∪ š‘(š‘£š‘—
+
) = š¶ āˆ’ š‘£š‘–
+
, š‘£š‘—
+
.
Proof. Assume to the contrary that there exists š‘£ š‘˜ ∈ š¶ āˆ’ š‘£š‘–
+
, š‘£š‘—
+
such that
š‘£ š‘˜ āˆ‰ š‘(š‘£š‘–
+
) ∪ š‘(š‘£š‘—
+
). Clearly, š‘£ š‘˜ āˆ‰ š‘£š‘–, š‘£š‘— . Let š‘„ ∈ š», then by Lemma
4.1 (b), the vertex set š‘„, š‘£š‘–
+
, š‘£š‘—
+
, š‘£ š‘˜ is independent, so š‘‘ š‘„ + š‘‘ š‘£š‘–
+
+
š‘‘(š‘£š‘—
+
) + š‘‘(š‘£ š‘˜) ≄ 2š‘›. However, š‘‘ š‘„ ≤ š» + 1, š‘‘ š‘£ š‘˜ ≤ š¶ āˆ’ 3, it
implies that š‘‘ š‘£š‘–
+
+ š‘‘(š‘£š‘—
+
) ≄ 2š‘› āˆ’ š» āˆ’ š¶ + 2 = š‘› + 2. Therefore, by
Lemma 4.2, šŗ is hamiltonian if and only if šŗā€²
= šŗ + š‘£š‘–
+
š‘£š‘—
+
is hamiltonian.
Observe that š¶ā€²
= (š‘£š‘– š‘Šš‘£š‘— š¶ š‘£š‘–
+
š‘£š‘—
+
š¶ š‘£š‘–) is a hamiltonian cycle of šŗā€², i.e šŗā€²
is hamiltonian, it implies that šŗ is hamiltonian, a contradiction.
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 49
Now we consider two case of toughness of šŗ.
I. š‘® is not 1-tough
By šŗ is not 1-tough, there exists a vertex set š‘† ≠ āˆ… such that šŗ āˆ’ š‘† has at
least S + 1 connected components. By šŗ is 2-connected, š‘† ≄ 2. Since
š‘› āˆ’ š‘† ≄ šœ” šŗ āˆ’ š‘† ≄ š‘† + 1 so 2 š‘† ≤ š‘› āˆ’ 1.
Claim 5.6. š‘† ∩ š» = āˆ….
Proof. Observe that šŗ āˆ’ š» = š¶ is 1-tough, if š» āˆ’ š‘† = āˆ… then šœ” šŗ āˆ’
š‘† = šœ” š¶ āˆ’ š‘† ≤ š‘† , which contradicts to the fact that šœ” šŗ āˆ’ š‘† ≄
š‘† + 1. Therefore, š» āˆ’ š‘† ≠ āˆ…. Let š‘† ∩ š» = š‘† š», š‘† ∩ š¶ = š‘† š¶. If š‘† š» ≄ 1
then šœ” šŗ āˆ’ š‘† ≤ 1 + šœ” š¶ āˆ’ š‘† š¶ ≤ 1 + š‘† š¶ ≤ š‘† , a contradiction.
Thus, š‘† š» = 0, i.e š‘† ∩ š» = āˆ….
Observe that š‘£š‘–, š‘£š‘— ∈ š‘†, otherwise šœ” šŗ āˆ’ š‘† ≤ šœ”(š¶ āˆ’ š‘†) ≤ š‘† , a
contradiction. Therefore, š» is a connected component of šŗ āˆ’ š‘†. Let
š», š‘‡1, š‘‡2, … , š‘‡š‘˜ (š‘˜ ≄ š‘† ) be the connected components of šŗ āˆ’ š‘†.
Claim 5.7. š‘˜ = š‘† = 2
Proof. Assume that š‘˜ ≄ 3. Let š‘„ ∈ š», š‘¦1 ∈ š‘‡1, š‘¦2 ∈ š‘‡2, š‘¦3 ∈ š‘‡3, then the
vertex set š‘„, š‘¦1, š‘¦2, š‘¦3 is independent, so š‘‘ š‘„ + š‘‘ š‘¦1 + š‘‘ š‘¦2 +
š‘‘(š‘¦3) ≄ 2š‘›. Observe that š‘‘ š‘„ ≤ š» + 1 and š‘‘ š‘¦š‘– ≤ š‘‡š‘– āˆ’ 1 + š‘†
for any š‘– = 1, 2, 3. Therefore, š‘‘ š‘„ + š‘‘ š‘¦1 + š‘‘ š‘¦2 + š‘‘ š‘¦3 ≤ š» +
š‘‡1 + š‘‡2 + š‘‡3 + 3 š‘† āˆ’ 2 ≤ 2 š‘† āˆ’ 2 + š‘› āˆ’ š‘˜ + 3 = 2 š‘† + š‘› āˆ’
š‘˜ + 1. It implies that 2 š‘† + š‘› āˆ’ š‘˜ + 1 ≄ 2š‘›, i.e 2 š‘† ≄ š‘› + š‘˜ āˆ’ 1 ≄
š‘› + 2 (by š‘˜ ≄ 3), which contradicts to the fact that 2 S ≤ n āˆ’ 1.
Therefore k ≤ 2. By š‘˜ ≄ š‘† ≄ 2, we have š‘˜ = š‘† = 2.
By Claim 5.7 and by š‘£š‘–, š‘£š‘— ∈ š‘† we have š‘† = š‘£š‘–, š‘£š‘— and šŗ āˆ’ š‘† has three
connected components, such as š», š‘‡1, š‘‡2. By Proposition 5.5, š‘‡1 = ( š‘£š‘–
+
∪
š‘ š‘£š‘–
+
āˆ’ š‘£š‘–, š‘£š‘— and š‘‡2 = ( š‘£š‘—
+
∪ š‘(š‘£š‘—
+
) āˆ’ š‘£š‘–, š‘£š‘— .
Claim 5.8. š‘‡1, š‘‡2 is complete.
Proof. Assume that š‘‡1 is not complete. Then there exists pair of
nonadjacent vertices š‘¦, š‘§ ∈ š‘‡1. Let š‘„ ∈ š», then the vertex set š‘„, š‘¦, š‘§, š‘£š‘—
+
is independent, so š‘‘ š‘„ + š‘‘ š‘¦ + š‘‘ š‘§ + š‘‘(š‘£š‘—
+
) ≄ 2š‘›. However,
š‘‘ š‘„ ≤ š» + 1, š‘‘(š‘£š‘—
+
) ≤ š‘‡2 + 1, š‘‘(š‘¦) ≤ š‘‡1 , š‘‘(š‘§) ≤ š‘‡1 . Therefore
š‘‘ š‘„ + š‘‘ š‘¦ + š‘‘ š‘§ + š‘‘(š‘£š‘—
+
) ≤ š» + 2 š‘‡1 + š‘‡2 + 2 = š‘› + š‘‡1 . It
implies that š‘› + š‘‡1 ≄ 2š‘›, i.e š‘‡1 ≄ š‘›, a contradiction. Thus, š‘‡1 is
complete. Similarly, we have š‘‡2 is complete.
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 50
Figure 5. Graph š‘® belongs to class š“• šŸ.
Clearly, 3 ≤ š›¼(šŗ) ≤ 5. If š›¼ šŗ ≄ 4, there exists a independent set of four
vertices, whose elements are š‘„ ∈ š», š‘¦ ∈ š‘‡1, š‘§ ∈ š‘‡2 and a vertex in S
(without loss of generality, assume that the vertex in š‘† is š‘£š‘–). By šœŽ4 ≄ 2š‘›,
we have š‘‘ š‘„ + š‘‘ š‘¦ + š‘‘ š‘§ + š‘‘ š‘£š‘– ≄ 2š‘›. However, š‘‘ š‘„ ≤ š» + 1,
š‘‘ š‘£š‘– ≤ š‘› āˆ’ 4, š‘‘(š‘¦) ≤ š‘‡1 , š‘‘(š‘§) ≤ š‘‡2 . It implies that š‘‘ š‘„ + š‘‘ š‘¦ +
š‘‘ š‘§ + š‘‘ š‘£š‘– ≤ š» + š‘‡1 + š‘‡2 + š‘› āˆ’ 3 = 2š‘› āˆ’ 5, a contradiction. Thus,
š›¼ šŗ = 3.
Conclude that in this Case šŗ is not 1-tough, šŗ belongs to class ℱ1.
II. š‘® is 1-tough
Let š‘ƒ1 = š‘ š‘£š‘–
+
∪ š‘£š‘–
+
, š‘ƒ2 = š‘(š‘£š‘—
+
) ∪ š‘£š‘—
+
. By Lemma 4.1 (c) and Proposition
5.5, we have š‘ƒ1, š‘ƒ2 are two paths on š¶ satisfying š‘£š‘–, š‘£š‘–
+
, š‘£š‘–
+2
āŠ† š‘ƒ1,
š‘£š‘— , š‘£š‘—
+
, š‘£š‘—
+2
āŠ† š‘ƒ2, š‘ƒ1 ∪ š‘ƒ2 = š¶ and if š‘£ ∈ š‘ƒ1 ∩ š‘ƒ2 then š‘£ is an end vertex of both
š‘ƒ1, š‘ƒ2.
Let š“1 = š‘ƒ1 āˆ’ š‘£š‘– , š“2 = š‘ƒ2 āˆ’ š‘£š‘— . Clearly, š“1 ∩ š“2 ≤ 2. We consider three
case of š“1 ∩ š“2 .
Case 1. š“1 ∩ š“2 = āˆ….
Figure 6. Illustrating the Case 1.
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 51
Observe that there exists an edge joining a vertex š‘£ š‘˜ ∈ š“1 to a vertex
š‘£š‘” ∈ š“2, otherwise šœ” šŗ āˆ’ š‘£š‘–, š‘£š‘— = 3, which contradicts to the fact that šŗ
is 1-tough.
If there exists pair of nonadjacent vertices š‘£š‘–1
, š‘£š‘–2
∈ š“1, let š‘„ ∈ š», then the
vertex set š‘„, š‘£š‘–1
, š‘£š‘–2
, š‘£š‘—
+
is independent, so š‘‘ š‘„ + š‘‘(š‘£š‘–1
) + š‘‘(š‘£š‘–2
) +
š‘‘(š‘£š‘—
+
) ≄ 2š‘›. By Lemma 4.1 (d), š‘‘ š‘„ + š‘‘(š‘£š‘—
+
) ≤ š‘› āˆ’ 1, we have š‘‘(š‘£š‘–1
) +
š‘‘(š‘£š‘–2
) ≄ š‘› + 1. By Lemma 4.2, šŗ is hamiltonian if and only if šŗā€²
= šŗ +
š‘£š‘–1
š‘£š‘–2
is hamiltonian.
Arguing similarly, for any pair of nonadjacent vertices š‘£š‘—1
, š‘£š‘—2
∈ š“2, we
have š‘‘(š‘£š‘—1
) + š‘‘(š‘£š‘—2
) ≄ š‘› + 1 and šŗ is hamiltonian if and only if šŗā€²ā€²
= šŗ +
š‘£š‘—1
š‘£š‘—2
is hamiltonian.
Let šŗāˆ—
be the graph obtain from šŗ by adding new edges joining all pair of
nonadjacent vertices in the same set š“1, respectively in A2. By Lemma 4.3,
šŗ is hamiltonian if and only if šŗāˆ—
is hamiltonian. We consider graph šŗāˆ—
,
let š‘Š1 be the hamiltonian path of š“1 joining š‘£š‘–
+
to š‘£ š‘˜, and let š‘Š2 be the
hamiltonian path of š“2 joining š‘£š‘” to š‘£š‘—
+
. Then, we have
š¶ā€²
= (š‘£š‘– š‘£š‘–
+
š‘Š1 š‘£ š‘˜ š‘£š‘” š‘Š2 š‘£š‘—
+
š‘£š‘— š‘Šš‘£š‘–) is a hamiltonian cycle in šŗāˆ—
, i.e šŗāˆ—
is
hamiltonian. Therefore, šŗ is hamiltonian, a contradiction.
Thus, the Case 1 does not happen.
Case 2. š“1 ∩ š“2 = 1.
Let š“1 ∩ š“2 = š‘£ š‘˜ . Without loss of generality, assume that š‘£ š‘˜ ∈ š‘£š‘–
+2
š¶ š‘£š‘—
āˆ’
(š‘£š‘–
+2
≠ š‘£š‘— ).
Figure 7. Illustrating the Case 2.
Case 2.1. š‘£ š‘˜ ≔ š‘£š‘–
+2
.
If š» > 1 then š¶ā€²
= (š‘£š‘– š‘Šš‘£š‘— š¶ š‘£ š‘˜ š‘£š‘—
+
š¶ š‘£š‘–) is longer than š¶. Therefore,
š» = 1, let š» = š‘„ . If š‘£š‘–
āˆ’
∈ š‘(š‘£š‘–
+
) then š¶ā€²
= (š‘£š‘– š‘„š‘£š‘— š¶ š‘£ š‘˜ š‘£š‘—
+
š¶ š‘£š‘–
āˆ’
š‘£š‘–
+
š‘£š‘–) is
a hamiltonian cycle in šŗ a contradiction. Therefore, š‘£š‘–
āˆ’
āˆ‰ š‘(š‘£š‘–
+
), and by
Proposition 5.5, š‘£š‘–
āˆ’
∈ š‘(š‘£š‘—
+
) and š‘‘ š‘£š‘–
+
= 2.
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 52
We consider subgraph šµ2 = š“2 āˆ’ š‘£ š‘˜ = š‘£ š‘˜ š¶ š‘£š‘–
āˆ’
āˆ’ š‘£ š‘˜, š‘£š‘— . If there exists
pair of nonadjacent vertices š‘£š‘”1
, š‘£š‘”2
∈ šµ2 then the vertex set š‘„, š‘£š‘–
+
, š‘£š‘”1
, š‘£š‘”2
is independent, so š‘‘ š‘„ + š‘‘ š‘£š‘–
+
+ š‘‘(š‘£š‘”1
) + š‘‘(š‘£š‘”2
) ≄ 2š‘›. However,
š‘‘ š‘„ = š‘‘ š‘£š‘–
+
= 2 and š‘‘(š‘£š‘”1
), š‘‘(š‘£š‘”2
) ≤ š¶ āˆ’ 3 = š‘› āˆ’ 4, therefore
š‘‘ š‘„ + š‘‘ š‘£š‘–
+
+ š‘‘(š‘£š‘”1
) + š‘‘(š‘£š‘”2
) ≤ 2š‘› āˆ’ 4, a contradiction. Thus, šµ2 is
complete.
If š‘£š‘—
āˆ’
≠ š‘£ š‘˜ then š‘£š‘–
āˆ’
, š‘£š‘—
āˆ’
∈ šµ2, so š‘£š‘–
āˆ’
š‘£š‘—
āˆ’
∈ šø(šŗ), which contradicts to
Lemma 4.1 (b). Therefore š‘£š‘—
āˆ’
≔ š‘£ š‘˜ .
Because šŗ is 1-tough, nonhamiltonian, so š‘› ≄ 7 and š‘£š‘–
āˆ’
≠ š‘£š‘—
+
. If there
exists a vertex š‘£š‘” ∈ š‘£š‘—
+2
š¶ š‘£š‘–
āˆ’
is adjacent to š‘£š‘— then we have š¶ā€²
=
(š‘£š‘– š‘„š‘£š‘— š‘£š‘” š¶ š‘£š‘–
āˆ’
š‘£š‘”
āˆ’
š¶ š‘£š‘—
+
š‘£ š‘˜ š‘£š‘–
+
š‘£š‘–) is a hamiltonian cycle in šŗ, a contradiction.
Therefore, š‘£š‘— is not adjacent to all vertices in š‘£š‘—
+2
š¶ š‘£š‘–
āˆ’
.
Similarly, if there exists a vertex š‘£š‘” ∈ š‘£š‘—
+2
š¶ š‘£š‘–
āˆ’
is adjacent to š‘£ š‘˜ then we
have š¶ā€²
= (š‘£š‘– š‘„š‘£š‘— š¶ š‘£š‘”
āˆ’
š‘£š‘–
āˆ’
š¶ š‘£š‘” š‘£ š‘˜ š‘£š‘–
+
š‘£š‘–) is a hamiltonian cycle in šŗ, a
contradiction. Therefore, š‘£ š‘˜ is not adjacent to all vertices in š‘£š‘—
+2
š¶ š‘£š‘–
āˆ’
.
Conclude that the graph šŗ is shown in Figure 8, š‘£š‘– can possibly be adjacent
to another vertices:
Figure 8. Graph š‘® belongs to class š“• šŸ.
Clearly, š›¼ šŗ = 3 and šŗ belongs to class ℱ2.
Case 2.2. š‘£ š‘˜ ≠ š‘£š‘–
+2
and š‘£ š‘˜ ≔ š‘£š‘—
āˆ’
.
Clearly, š‘£ š‘˜
āˆ’
≠ š‘£š‘–
+
. If š‘£š‘–
āˆ’
š‘£ š‘˜
āˆ’
∈ šø(šŗ), then š¶ā€²
= (š‘£š‘– š‘Šš‘£š‘— š‘£ š‘˜ š‘£š‘—
+
š¶ š‘£š‘–
āˆ’
š‘£ š‘˜
āˆ’
š¶ š‘£š‘–) is
a hamiltonian cycle of šŗ, a contradiction. Therefore, š‘£š‘–
āˆ’
š‘£ š‘˜
āˆ’
āˆ‰ šø(šŗ). By
š‘£ š‘˜ ≔ š‘£š‘—
āˆ’
and by Lemma 4.1 (b), š‘£š‘–
āˆ’
š‘£ š‘˜ āˆ‰ šø(šŗ), so š‘£š‘–
āˆ’
≠ š‘£š‘—
+
by š‘£ š‘˜ ∈ š‘(š‘£š‘—
+
).
We have the following Claims.
Claim 5.9. š‘£š‘–
āˆ’
∈ š“2 āˆ’ š“1.
Proof. Assume that š‘£š‘–
āˆ’
∈ š“1. Let š‘„ ∈ š», then the vertex set
š‘„, š‘£š‘—
+
, š‘£š‘–
āˆ’
, š‘£ š‘˜
āˆ’
is independent, so š‘‘ š‘„ + š‘‘(š‘£š‘—
+
) + š‘‘(š‘£š‘–
āˆ’
) + š‘‘(š‘£ š‘˜
āˆ’
) ≄
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 53
2š‘›. By Lemma 4.1 (d), š‘‘ š‘„ + š‘‘(š‘£š‘—
+
) ≤ š‘› āˆ’ 1 and š‘‘ š‘£š‘–
āˆ’
+ š‘‘ š‘£ š‘˜
āˆ’
≄
š‘› + 1. Therefore, by Lemma 4.2, šŗ is hamiltonian if and only if šŗā€²
=
šŗ + š‘£š‘–
āˆ’
š‘£ š‘˜
āˆ’
is hamiltonian. Observe that š¶ā€²
= (š‘£š‘– š‘Šš‘£š‘— š‘£ š‘˜ š‘£š‘—
+
š¶ š‘£š‘–
āˆ’
š‘£ š‘˜
āˆ’
š¶ š‘£š‘–)
is a hamiltonian cycle of šŗā€², so šŗā€²
and šŗ are hamiltonian, a contradiction.
Thus, š‘£š‘–
āˆ’
āˆ‰ š“1, and by š‘ƒ1 ∪ š‘ƒ2 = š¶ we have š‘£š‘–
āˆ’
∈ š“2 āˆ’ š“1.
Figure 9. Illustrating the Claim 5.9.
Let šµ1 = š“1 āˆ’ š‘£ š‘˜ = š‘£š‘–
+
š¶ š‘£ š‘˜
āˆ’
, šµ2 = š“2 āˆ’ š‘£ š‘˜ = š‘£š‘—
+
š¶ š‘£š‘–
āˆ’
. By š‘£š‘–
āˆ’
≠ š‘£š‘—
+
and by š‘£ š‘˜
āˆ’
≠ š‘£š‘–
+
we have šµ1 , šµ2 ≄ 2. Arguing similarly, for any pair of
nonadjacent vertices (š‘¦, š‘§) in the same set šµ1, respectively in šµ2, we have
š‘‘ š‘¦ + š‘‘(š‘§) ≄ š‘› + 1.
Claim 5.10. There are no edges joining a vertex in šµ1 to a vertex in šµ2.
Proof. Assume to the contrary that there exists an edge joining š‘£š‘”1
∈ šµ1
to š‘£š‘”2
∈ šµ2. Clearly, š‘£š‘”1
≠ š‘£š‘–
+
, š‘£š‘”2
≠ š‘£š‘—
+
. Let šŗāˆ—
be the graph obtain
from šŗ by adding new edges joining all pair of nonadjacent vertices in
the same set šµ1, respectively in šµ2. By Lemma 4.3, šŗ is hamiltonian if
and only if šŗāˆ—
is hamiltonian.
We consider graph šŗāˆ—
, observe that šµ1, šµ2 are complete. Let š‘Š1 be the
hamiltonian path in šµ1 joining š‘£š‘”1
to š‘£š‘–
+
and let š‘Š2 be the path in šµ2
joining š‘£š‘—
+
to š‘£š‘”2
. Then, š¶ā€²
= (š‘£š‘– š‘Šš‘£š‘— š‘£ š‘˜ š‘£š‘—
+
š‘Š2 š‘£š‘”2
š‘£š‘”1
š‘Š1 š‘£š‘–
+
š‘£š‘–) is a
hamiltonian cycle of šŗāˆ—
, i.e šŗāˆ—
is hamiltonian, it implies that šŗ is
hamiltonian, a contradiction.
Claim 5.11. šµ1, šµ2 are complete.
Proof. Assume that there exists a pair of nonadjacent vertices š‘£š‘–1
, š‘£š‘–2
∈
šµ1. Let š‘„ ∈ š», then the vertex set š‘„, š‘£š‘–1
, š‘£š‘–2
, š‘£š‘—
+
is independent, so
š‘‘ š‘„ + š‘‘(š‘£š‘–1
) + š‘‘(š‘£š‘–2
) + š‘‘(š‘£š‘—
+
) ≄ 2š‘›. However, š‘‘ š‘„ ≤ š» + 1,
š‘‘(š‘£š‘—
+
) ≤ šµ2 + 2 and š‘‘(š‘£š‘–1
), š‘‘(š‘£š‘–2
) ≤ šµ1 + 1, therefore š‘‘ š‘„ +
š‘‘(š‘£š‘–1
) + š‘‘(š‘£š‘–2
) + š‘‘(š‘£š‘—
+
) ≤ š» + 2 šµ1 + šµ2 + 5 = š‘› + šµ1 + 2. It
implies that šµ1 ≄ š‘› āˆ’ 2, a contradiction. Thus, šµ1 is complete.
Similarly, we have šµ2 is complete.
Claim 5.12. š‘£ š‘˜ , š‘£š‘— are not adjacent to any vertex in šµ2 āˆ’ š‘£š‘—
+
.
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 54
Proof. Assume that š‘£ š‘˜ is adjacent to a vertex š‘£š‘ ∈ šµ2 āˆ’ š‘£š‘—
+
. By Claim
5.11, let š‘Š1 be the hamiltonian path of šµ1 joining š‘£ š‘˜
āˆ’
to š‘£š‘–
+
, and let š‘Š2
be the hamiltonian path of šµ2 joining š‘£š‘—
+
to š‘£š‘. Then,
š¶ā€²
= (š‘£š‘– š‘Šš‘£š‘— š‘£š‘—
+
š‘Š2 š‘£š‘ š‘£ š‘˜ š‘£ š‘˜
āˆ’
š‘Š1 š‘£š‘–
+
š‘£š‘–) is a hamiltonian cycle of šŗ, a
contradiction. Similarly, if š‘£š‘— is adjacent to a vertex š‘£š‘ž ∈ šµ2 āˆ’ š‘£š‘—
+
, let
š‘Š2
āˆ—
be the hamiltonian path of šµ2 joining š‘£š‘ž to š‘£š‘—
+
, then š¶ā€²
=
(š‘£š‘– š‘Šš‘£š‘— š‘£š‘ž š‘Š2
āˆ—
š‘£š‘—
+
š‘£ š‘˜ š‘£ š‘˜
āˆ’
š‘Š1 š‘£š‘–
+
š‘£š‘–) is a hamiltonian cycle of šŗ, a
contradiction. Thus, š‘£ š‘˜, š‘£š‘— are not adjacent to any vertex in šµ2 āˆ’ š‘£š‘—
+
.
Claim 5.13. š‘£š‘— is not adjacent to any vertex in šµ1.
Proof. Assume to the contrary that š‘£š‘— is adjacent to a vertex š‘£š‘ ∈ šµ1. Let
š‘Š2 be the hamiltonian path of šµ2 joining š‘£š‘—
+
to š‘£š‘–
āˆ’
. It happens as one of
two following case:
(1) Case š‘£š‘ ≠ š‘£š‘–
+
: Let š‘Š1 be the hamiltonian path of šµ1 joining š‘£š‘ to š‘£š‘–
+
,
we have š¶ā€²
= (š‘£š‘– š‘Šš‘£š‘— š‘£š‘ š‘Š1 š‘£š‘–
+
š‘£ š‘˜ š‘£š‘—
+
š‘Š2 š‘£š‘–
āˆ’
š‘£š‘–) is a hamiltonian cycle
of šŗ, a contradiction.
(2) Case š‘£š‘ ≔ š‘£š‘–
+
: Let š‘Š1 be the hamiltonian path of šµ1 joining š‘£š‘ to š‘£ š‘˜
āˆ’
,
we have š¶ā€²
= (š‘£š‘– š‘Šš‘£š‘— š‘£š‘ š‘Š1 š‘£ š‘˜
āˆ’
š‘£ š‘˜ š‘£š‘—
+
š‘Š2 š‘£š‘–
āˆ’
š‘£š‘–) is a hamiltonian cycle
of šŗ, a contradiction.
Claim 5.14. š‘£š‘— is adjacent to all vertices in š».
Proof. Assume to the contrary that š‘£š‘— is not adjacent to a vertex š‘„ ∈ š».
Let š‘£š‘”1
∈ šµ1, š‘£š‘”2
∈ šµ2 āˆ’ š‘£š‘—
+
, then by Claims 5.10, 5.12, 5.13, the
vertex set š‘„, š‘£š‘— , š‘£š‘”1
, š‘£š‘”2
is independent, so š‘‘ š‘„ + š‘‘(š‘£š‘— ) + š‘‘(š‘£š‘”1
) +
š‘‘(š‘£š‘”2
) ≄ 2š‘›. However, š‘‘ š‘„ ≤ š» , š‘‘(š‘£š‘— ) ≤ š» + 2, š‘‘(š‘£š‘”1
) ≤ šµ1 +
1, š‘‘(š‘£š‘”2
) ≤ šµ2 . Therefore, 2š‘› ≤ š‘‘ š‘„ + š‘‘(š‘£š‘— ) + š‘‘(š‘£š‘”1
) + š‘‘(š‘£š‘”2
) ≤
2 š» + šµ1 + šµ2 + 3 = š‘› + š» , it implies that š» ≄ š‘›, a
contradiction.
Claim 5.15. š‘£ š‘˜ is adjacent to all vertices in šµ1.
Proof. Assume to the contrary that š‘£ š‘˜ is not a vertex š‘£š‘”1
∈ šµ1. Let š‘„ ∈ š»
and š‘£š‘”2
∈ šµ2 āˆ’ š‘£š‘—
+
. Then by Claim 5.10 and by Claim 5.12, the vertex
set š‘„, š‘£ š‘˜, š‘£š‘”1
, š‘£š‘”2
is independent, so š‘‘ š‘„ + š‘‘(š‘£ š‘˜) + š‘‘(š‘£š‘”1
) +
š‘‘(š‘£š‘”2
) ≄ 2š‘›. However, š‘‘ š‘„ ≤ š» + 1, š‘‘ š‘£ š‘˜ ≤ šµ1 + 2, š‘‘(š‘£š‘”1
) ≤
šµ1 , š‘‘(š‘£š‘”2
) ≤ šµ2 . Therefore, š‘‘ š‘„ + š‘‘(š‘£ š‘˜) + š‘‘(š‘£š‘”1
) + š‘‘(š‘£š‘”2
) ≤
š» + 2 šµ1 + šµ2 + 3 = š‘› + šµ1 , it implies that šµ1 ≄ š‘›, a
contradiction.
Let š»1 = š» + š‘£š‘— , by Claim 5.14, š»1 is complete. By Claim 5.15, š“1 =
šµ1 + š‘£ š‘˜ is complete. The graph šŗ is shown in Figure 10, in which,
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 55
š»1, š“1, šµ2 are complete and š»1 , š“1 , šµ2 ≄ 2. Moreover, the vertex š‘£š‘– can
possibly be adjacent to another vertices.
Figure 10. Graph š‘® belongs to class š“• šŸ.
Clearly, 3 ≤ š›¼(šŗ) ≤ 4. If š›¼ šŗ = 4, then there exists š‘„ ∈ š»1, š‘¦ ∈ š“1, š‘§ ∈
šµ2 such that the vertex set š‘„, š‘¦, š‘§, š‘£š‘– is independent, so š‘‘ š‘„ + š‘‘ š‘¦ +
š‘‘ š‘§ + š‘‘(š‘£š‘–) ≄ 2š‘›. However, š‘‘ š‘„ + š‘‘ š‘¦ + š‘‘ š‘§ ≤ š»1 + š“1 + š“2 āˆ’
1 = š‘› āˆ’ 2, therefore š‘‘ š‘£š‘– ≄ š‘› + 2, a contradiction. Thus š›¼ šŗ = 3.
Conclude that in this Case 2.2, šŗ belongs to class ℱ2.
Case 2.3. š‘£ š‘˜ ≠ š‘£š‘–
+2
and š‘£ š‘˜ ≠ š‘£š‘—
āˆ’
.
Arguing similarly the proofs of Case 2.2, let šµ1 = š“1 āˆ’ š‘£ š‘˜ and šµ2 = š“2 āˆ’
š‘£ š‘˜ , then for any pair of nonadjacent vertices (š‘¦, š‘§) together in šµ1 or šµ2,
we have š‘‘ š‘¦ + š‘‘(š‘§) ≄ š‘› + 1. Observe that š‘£š‘–
+
≠ š‘£ š‘˜
āˆ’
∈ šµ1 and š‘£š‘— , š‘£š‘—
+
≠
š‘£ š‘˜
+
∈ šµ2.
Let šŗāˆ—
be the graph obtain from šŗ by adding new edges joining all pair of
nonadjacent vertices in the same set šµ1, respectively in šµ2. By Lemma 4.3,
šŗ is hamiltonian if and only if šŗāˆ—
is hamiltonian. We consider graph šŗāˆ—
, let
š‘Š1 be the hamiltonian path of šµ1 joining š‘£ š‘˜
āˆ’
to š‘£š‘–
+
, and let š‘Š2 be the
hamiltonian path of šµ2 joining š‘£š‘—
+
to š‘£ š‘˜
+
. Then, we have
š¶ā€²
= (š‘£š‘– š‘Šš‘£š‘— š‘£š‘—
+
š‘Š2 š‘£ š‘˜
+
š‘£ š‘˜ š‘£ š‘˜
āˆ’
š‘Š1 š‘£š‘–
+
š‘£š‘–) is a hamiltonian cycle of šŗāˆ—
, i.e šŗāˆ—
is
hamiltonian. Therefore, šŗ is hamiltonian, a contradiction.
Thus, the Case 2.3 does not happen.
Case 3. š“1 ∩ š“2 = 2.
Let š“1 ∩ š“2 = š‘£ š‘˜, š‘£š‘” . Without loss of generality, we assume that š‘£ š‘˜ ∈
š‘£š‘–
+2
š¶ š‘£š‘—
āˆ’
(š‘£š‘–
+2
≠ š‘£š‘— ) and š‘£š‘” ∈ š‘£š‘—
+2
š¶ š‘£š‘–
āˆ’
(š‘£š‘—
+2
≠ š‘£š‘–). Let šµ1 = š“1 āˆ’ š‘£ š‘˜, š‘£š‘” ,
šµ2 = š“2 āˆ’ š‘£ š‘˜, š‘£š‘” . Arguing similarly the proofs of Case 2.2, for any pair of
nonadjacent vertices (š‘¦, š‘§) in the same set šµ1, respectively in šµ2, we get
š‘‘ š‘¦ + š‘‘(š‘§) ≄ š‘› + 1.
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 56
Figure 11. Illustrating the Case 3.
Case 3.1. š‘£ š‘˜ ≔ š‘£š‘–
+2
or š‘£š‘” ≔ š‘£š‘—
+2
.
Without loss of generality, assume that š‘£ š‘˜ ≔ š‘£š‘–
+2
. If š‘£š‘–
āˆ’
∈ š‘(š‘£š‘–
+
) then we
have š¶ā€²
= (š‘£š‘– š‘Šš‘£š‘— š¶ š‘£ š‘˜ š‘£š‘—
+
š¶ š‘£š‘–
āˆ’
š‘£š‘–
+
š‘£š‘–) is a hamiltonian cycle of šŗ, a
contradiction. Therefore š‘£š‘–
āˆ’
āˆ‰ š‘(š‘£š‘–
+
), i.e š‘£š‘–
āˆ’
āˆ‰ š“1 and š‘£š‘–
āˆ’
∈ š“2. It implies
that there is no vertex š‘£š‘” ∈ š‘£š‘—
+2
š¶ š‘£š‘–
āˆ’
such that š‘£š‘” ∈ š“1 ∩ š“2, a
contradiction.
Thus, the Case 3.1 does not happen.
Case 3.2. (š‘£ š‘˜ ≠ š‘£š‘–
+2
and š‘£ š‘˜ ≔ š‘£š‘—
āˆ’
) or (š‘£š‘” ≠ š‘£š‘—
+2
and š‘£š‘” ≔ š‘£š‘–
āˆ’
).
Without loss of generality, assume that š‘£ š‘˜ ≠ š‘£š‘–
+2
and š‘£ š‘˜ ≔ š‘£š‘—
āˆ’
. We have the
following Claims:
Claim 5.16. š‘£š‘” ≔ š‘£š‘–
āˆ’
.
Proof. Assume to the contrary that š‘£š‘” ≠ š‘£š‘–
āˆ’
. Arguing similarly the proofs
of Case 2.2, we have š‘£š‘–
āˆ’
š‘£ š‘˜
āˆ’
āˆ‰ šø(šŗ) and š‘‘ š‘£š‘–
āˆ’
+ š‘‘ š‘£ š‘˜
āˆ’
≄ š‘› + 1. By
Lemma 4.2, šŗ is hamiltonian if and only if šŗā€²
= šŗ + š‘£š‘–
āˆ’
š‘£ š‘˜
āˆ’
is
hamiltonian. Observe that š¶ā€²
= (š‘£š‘– š‘Šš‘£š‘— š‘£ š‘˜ š‘£š‘—
+
š¶ š‘£š‘–
āˆ’
š‘£ š‘˜
āˆ’
š¶ š‘£š‘–) is a
hamiltonian cycle of šŗā€², i.e šŗā€² is hamiltoniania. It implies that šŗ is
hamiltonian, a contradiction.
Claim 5.17. šµ1 , šµ2 ≄ 2. Moreover, š‘£š‘–
āˆ’2
∈ šµ2 āˆ’ {š‘£š‘—
+
}.
Proof. Because of š‘£š‘–
+
, š‘£ š‘˜
āˆ’
∈ šµ1, so šµ1 ≄ 2. If š‘£š‘–
āˆ’2
≔ š‘£š‘—
+
, then š¶ā€² =
(š‘£š‘– š‘Šš‘£š‘— š‘£š‘—
+
š‘£ š‘˜ š¶ š‘£š‘–
+
š‘£š‘–
āˆ’
š‘£š‘–) is a hamiltonian cycle of šŗ, a contradiction.
Therefore, š‘£š‘–
āˆ’2
≠ š‘£š‘—
+
. By Claim 5.16 we have š‘£š‘–
āˆ’2
∈ šµ2 āˆ’ {š‘£š‘—
+
} and
šµ2 ≄ 2.
Claim 5.18. There are no edges joining a vertex in šµ1 to a vertex in šµ2.
Proof. Assume to the contrary that there exists š‘£š‘”1
∈ šµ1, š‘£š‘”2
∈ šµ2 such
that š‘£š‘”1
š‘£š‘”2
∈ šø(šŗ). Observe that š‘£š‘”1
≠ š‘£š‘–
+
and š‘£š‘”2
≠ š‘£š‘—
+
. Let šŗāˆ—
be the
graph obtain from šŗ by adding new edges joining all pair of nonadjacent
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 57
vertices in the same set šµ1, respectively in šµ2 (note that their degree sum
is greater than š‘› + 1). By Lemma 4.3, šŗ is hamiltonian if and only if šŗāˆ—
is hamiltonian. We consider the graph šŗāˆ—
, let š‘Š1 be the hamiltonian path
of šµ1 joining š‘£š‘–
+
to š‘£š‘”1
, and let š‘Š2 be the hamiltonian path of šµ2 joining
š‘£š‘”2
to š‘£š‘—
+
. Then š¶ā€²
= (š‘£š‘– š‘Šš‘£š‘— š‘£ š‘˜ š‘£š‘–
+
š‘Š1 š‘£š‘”1
š‘£š‘”2
š‘Š2 š‘£š‘—
+
š‘£š‘–
āˆ’
š‘£š‘–) is a hamiltonian
cycle of šŗāˆ—
, i.e šŗāˆ—
is hamiltonian. It implies that šŗ is hamiltonian, a
contradiction.
Claim 5.19. šµ1, šµ2 are complete.
Proof. Assume that there exists a pair of nonadjacent vertices š‘£š‘, š‘£š‘ž ∈
šµ1. Let š‘„ ∈ š», then the vertex set š‘„, š‘£š‘, š‘£š‘ž , š‘£š‘—
+
is independent, so
š‘‘ š‘„ + š‘‘(š‘£š‘) + š‘‘(š‘£š‘ž ) + š‘‘(š‘£š‘—
+
) ≄ 2š‘›. However, š‘‘ š‘„ ≤ š» + 1,
š‘‘(š‘£š‘—
+
) ≤ šµ2 + 2 and š‘‘(š‘£š‘), š‘‘(š‘£š‘ž ) ≤ šµ1 + 2. Therefore, š‘‘ š‘„ +
š‘‘(š‘£š‘) + š‘‘(š‘£š‘ž ) + š‘‘(š‘£š‘—
+
) ≤ š» + 2 šµ1 + šµ2 + 7 = š‘› + šµ1 + 3. It
implies that šµ1 ≄ š‘› āˆ’ 3, a contradiction. Thus, šµ1 is complete.
Similarly, šµ2 is complete.
Claim 5.20. š‘£š‘– is not adjacent to all vertices in šµ1 āˆ’ š‘£š‘–
+
.
Proof. Assume to the contrary that š‘£š‘– is adjacent to š‘£š‘”1
∈ šµ1 āˆ’ š‘£š‘–
+
. By
Claim 5.19, let š‘Š1 be the hamiltonian path of šµ1 joining š‘£š‘–
+
to š‘£š‘”1
. We
have š¶ā€²
= (š‘£š‘– š‘Šš‘£š‘— š‘£ š‘˜ š‘£š‘—
+
š¶ š‘£š‘–
āˆ’
š‘£š‘–
+
š‘Š1 š‘£š‘”1
š‘£š‘–) is a hamiltonian cycle of šŗ, a
contradiction.
Claim 5.21. š‘£š‘– is not adjacent to all vertices in šµ2.
Proof. Assume to the contrary that š‘£š‘– is adjacent to š‘£š‘”2
∈ šµ2. Observe
that š‘£š‘”2
≠ š‘£š‘—
+
, otherwise š¶ā€²
= (š‘£š‘– š‘Šš‘£š‘— š¶ š‘£š‘–
+
š‘£š‘–
āˆ’
š¶ š‘£š‘—
+
š‘£š‘–) is a hamiltonian
cycle of šŗ, a contradiction. Let š‘Š2 be the hamiltonian path of šµ2 joining
š‘£š‘—
+
to š‘£š‘”2
. Then, š¶ā€²
= (š‘£š‘– š‘Šš‘£š‘— š‘£ š‘˜ š¶ š‘£š‘–
+
š‘£š‘–
āˆ’
š‘£š‘—
+
š‘Š2 š‘£š‘”2
š‘£š‘–) is a hamiltonian
cycle of šŗ, a contradiction.
Figure 12. Illustrating the proof of Claim 5.21.
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 58
Similarly the proofs of Claim 5.20 and Claim 5.21, we have:
Claim 5.22. š‘£š‘— is not adjacent to all vertices in šµ1 ∪ (šµ2 āˆ’ š‘£š‘—
+
).
Claim 5.23. š‘£š‘–, š‘£š‘— are adjacent to all vertices in š».
Proof. Assume that š‘£š‘– is not adjacent to š‘„ ∈ š». Let š‘£š‘ ∈ šµ1 āˆ’ š‘£š‘–
+
,
š‘£š‘ž ∈ šµ2 āˆ’ š‘£š‘—
+
. Then by Claims 5.18, 5.20, 5.21, the vertex set
š‘„, š‘£š‘–, š‘£š‘ , š‘£š‘ž is independent, so š‘‘ š‘„ + š‘‘ š‘£š‘– + š‘‘(š‘£š‘) + š‘‘(š‘£š‘ž ) ≄ 2š‘›.
However, š‘‘(š‘„) ≤ š» , š‘‘ š‘£š‘– ≤ š» + 3, š‘‘(š‘£š‘) ≤ šµ1 + 1, š‘‘(š‘£š‘ž ) ≤
šµ2 + 1, therefore š‘‘ š‘„ + š‘‘ š‘£š‘– + š‘‘(š‘£š‘) + š‘‘(š‘£š‘ž ) ≤ 2 š» + šµ1 +
šµ2 + 5 = š‘› + š» + 1. It implies that š» ≄ š‘› āˆ’ 1, a contradiction.
Thus, š‘£š‘– is adjacent to all vertices in š». Similarly, š‘£š‘— is adjacent to all
vertices in š».
Claim 5.24. š‘£ š‘˜ is not adjacent to all vertices in š‘£š‘– ∪ (šµ2 āˆ’ š‘£š‘—
+
).
Proof. Assume that š‘£ š‘˜ is adjacent to š‘£š‘”2
∈ šµ2 āˆ’ š‘£š‘—
+
. Let š‘Š1 be the
hamiltonian path of šµ1 joining š‘£ š‘˜
āˆ’
to š‘£š‘–
+
, and let š‘Š2 be the hamiltonian
path of šµ2 joining š‘£š‘—
+
to š‘£š‘”2
. Then, we have
š¶ā€²
= (š‘£š‘– š‘Šš‘£š‘— š‘£š‘—
+
š‘Š2 š‘£š‘”2
š‘£ š‘˜ š‘£ š‘˜
āˆ’
š‘Š1 š‘£š‘–
+
š‘£š‘–
āˆ’
š‘£š‘–) is a hamiltonian cycle of šŗ, a
contradiction. Therefore, š‘£ š‘˜ is not adjacent to all vertices in šµ2 āˆ’ š‘£š‘—
+
.
Moreover, if š‘£ š‘˜ is adjacent to š‘£š‘–, by Claim 5.17, let W2
′
be the
hamiltonian path of šµ2 joining š‘£š‘—
+
to š‘£š‘–
āˆ’2
. Then,
š¶ā€²
= (š‘£š‘– š‘Šš‘£š‘— š‘£š‘—
+
š‘Š2
′
š‘£š‘–
āˆ’2
š‘£š‘–
āˆ’
š‘£š‘–
+
š‘Š1 š‘£ š‘˜
āˆ’
š‘£ š‘˜ š‘£š‘–) is a hamiltonian cycle of šŗ, a
contradiction. Thus, š‘£ š‘˜ is not adjacent to š‘£š‘–.
Claim 5.25. š‘£ š‘˜ is adjacent to all vertices in šµ1.
Proof. Assume to the contrary that š‘£ š‘˜ is not adjacent to š‘£š‘”1
∈ šµ1. Let
š‘„ ∈ š», š‘£š‘”2
∈ šµ2 āˆ’ š‘£š‘—
+
, then by Claim 5.18 and by Claim 5.24, the
vertex set š‘„, š‘£ š‘˜ , š‘£š‘”1
, š‘£š‘”2
is independent, so š‘‘ š‘„ + š‘‘(š‘£ š‘˜) + š‘‘(š‘£š‘”1
) +
š‘‘(š‘£š‘”2
) ≄ 2š‘›. However, š‘‘ š‘„ ≤ š» + 1, š‘‘ š‘£ š‘˜ ≤ šµ1 + 2, š‘‘(š‘£š‘”1
) ≤
šµ1 , š‘‘(š‘£š‘”2
) ≤ šµ2 . Therefore, š‘‘ š‘„ + š‘‘(š‘£ š‘˜) + š‘‘(š‘£š‘”1
) + š‘‘(š‘£š‘”2
) ≤
2 šµ1 + šµ2 + š» + 3 = š‘› + šµ1 āˆ’ 1. It implies that šµ1 ≄ š‘› + 1, a
contradiction.
Arguing similarly the proofs of Claim 5.24 and Claim 5.25, we have:
Claim 5.26. š‘£š‘–
āˆ’
is not adjacent to all vertices in {š‘£š‘— } ∪ (šµ1 āˆ’ š‘£š‘–
+
).
Claim 5.27. š‘£š‘–
āˆ’
is adjacent to all vertices in šµ2.
Observe that š‘£ š‘˜ , š‘£š‘–
āˆ’
∈ š‘š¶(š»)āˆ’
, by Lemma 4.1 (b) we have:
Claim 5.28. š‘£ š‘˜ š‘£š‘–
āˆ’
āˆ‰ šø(šŗ).
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 59
Claim 5.29. š‘£š‘– š‘£š‘— ∈ šø(šŗ).
Proof. Assume to the contrary that š‘£š‘– š‘£š‘— āˆ‰ šø(šŗ). Let š‘£š‘”1
∈ šµ1 āˆ’ š‘£š‘–
+
,
š‘£š‘”2
∈ šµ2 āˆ’ š‘£š‘—
+
. Then by Claims 5.18, 5.20. 5.21 and 5.22, the vertex
set š‘£š‘–, š‘£š‘— , š‘£š‘”1
, š‘£š‘”2
is independent, so š‘‘ š‘£š‘– + š‘‘(š‘£š‘— ) + š‘‘(š‘£š‘”1
) +
š‘‘(š‘£š‘”2
) ≄ 2š‘›. However, š‘‘ š‘£š‘– ≤ š» + 2, š‘‘(š‘£š‘— ) ≤ š» + 2, š‘‘(š‘£š‘”1
) ≤
šµ1 , š‘‘(š‘£š‘”2
) ≤ šµ2 . Therefore, š‘‘ š‘£š‘– + š‘‘(š‘£š‘— ) + š‘‘(š‘£š‘”1
) + š‘‘(š‘£š‘”2
) ≤
2 š» + šµ1 + šµ2 + 4 = š‘› + š» . It implies that š» ≄ š‘›, a
contradiction.
By Claim 5.25, š¶1 = šµ1 + š‘£ š‘˜ is complete. By Claim 5.27, š¶2 = šµ2 +
š‘£š‘–
āˆ’
is complete. Moreover, by Claim 5.17, š¶1 , š¶2 ≄ 3. By Claim 5.23
and Claim 5.29, š»1 = š» + š‘£š‘–, š‘£š‘— is complete and š»1 ≄ 3. Conclude that
šŗ is shown in Figure 13, in which š»1, š¶1, š¶2 are complete and
š¶1 , š¶2 , š»1 ≄ 3.
Figure 13. Graph š‘® belongs to class š“• šŸ‘.
Clearly, š›¼ šŗ = 3 and šŗ belongs to class ℱ3.
Case 3.3. š‘£ š‘˜ ≠ š‘£š‘–
+2
, š‘£ š‘˜ ≠ š‘£š‘—
āˆ’
and š‘£š‘” ≠ š‘£š‘—
+2
, š‘£š‘” ≠ š‘£š‘–
āˆ’
.
Observe that š‘£š‘”
+
, š‘£ š‘˜
āˆ’
∈ šµ1 āˆ’ š‘£š‘–
+
and š‘£š‘”
āˆ’
, š‘£ š‘˜
+
∈ šµ2 āˆ’ {š‘£š‘—
+
}. Let šŗāˆ—
be the
graph obtain from šŗ by adding new edges joining all pair of nonadjacent
vertices in the same set šµ1, respectively in šµ2 (note that their degree sum is
greater than š‘› + 1). By Lemma 4.3, šŗ is hamiltonian if and only if šŗāˆ—
is
hamiltonian.
We consider the graph šŗāˆ—
. Let š‘Š1 be the hamiltonian path of šµ1 joining š‘£ š‘˜
āˆ’
to š‘£š‘–
+
, and let š‘Š2 be the hamiltonian path of šµ2 āˆ’ š‘£š‘—
+
joining š‘£š‘”
āˆ’
to š‘£ š‘˜
+
.
Then, we have š¶ā€²
= (š‘£š‘– š‘Šš‘£š‘— š‘£š‘—
+
š‘£š‘” š‘£š‘”
āˆ’
š‘Š2 š‘£ š‘˜
+
š‘£ š‘˜ š‘£ š‘˜
āˆ’
š‘Š1 š‘£š‘–
+
š‘£š‘–) is a hamiltonian
cycle of šŗāˆ—
, i.e šŗāˆ—
is hamiltonian, therefore šŗ is hamiltonian, a
contradiction.
Thus, the Case 3.3 does not happen.
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 60
6. ACKNOWLEDGEMENTS
This research was supported by Vietnam National Foundation for Science and
Technology Development grant 102.01-2012.29.
REFERENCES
[1] Alan, G. Algorithmic Graph Theory. Cambridge University Press. Published June 27th
1985.
[2] Bondy, J. A., and ChvƔtal, V. A Method in Graph Theory. Discrete Math. 15 (1976),
pp 111-135.
[3] Cuckler, B., and Kahn, J. Hamiltonian cycles in Dirac graphs. Combinatorica, 29,
(2009), pp 299-326.
[4] Diestel, R. Graph Theory. Springer. Third Edition (2005).
[5] Ferrara, M., Jacobson, M. S., and Harris, A. Cycle lengths in a Hamiltonian Graphs
with a pair of vertices having large degree sum. Graphs and Combinatorics, 26 (2010),
pp 215-223.
[6] Jung, H. A. On maximal circuits in finite graphs. Ann. Discrete Math., 3 (1978), pp.
129-144.
[7] Hoa, V. D., and Truong, N. H. X. Hamilton cycle of graphs šœŽ2
āˆ—
≄ š‘›. Journal Of
Computer Science And Cybernetics., 28, No.2 (2012), pp 153-160.
[8] Hoa, V. D., and Truong, N. H. X. Hamiltonian in graphs šœŽ3 ≄
3
2
š‘› āˆ’ 1. In Proceedings
of the 7th
National Conference on Fundamental and Applied Information Technology
Research (FAIR’7) (Thai Nguyen, Vietnam, June 19-20, 2014). Vietnam Academy of
Science and Technology Press, Hanoi, 2014, pp 60-67.
[9] Krivelevich, M., Lee, C., and Sudakov, B. Long paths and cycle in random subgraphs
of graphs with large minimum degree. Random Structure & Algorithm, volume 46,
Issue 2, pp. 320–345, March 2015.
[10]Nishiyama, H., Kobayashi, Y., Yamauchi, Y., Kijima, S., & Yamashita, M. (2015).
The Parity Hamiltonian Cycle Problem. arXiv preprint arXiv:1501.06323.
This paper may be cited as:
Truong, N. H. X. and Hoa, V. D., 2015. Hamiltonian cycle in graphs σ4≄2n.
International Journal of Computer Science and Business Informatics,
Vol.15, No. 2, pp. 38-60.

More Related Content

PDF
E0392031034
ijceronline
Ā 
PDF
Detection and Removal of Blackhole Attack Using Handshake Mechanism in MANET ...
IOSR Journals
Ā 
PDF
E41022938
IJERA Editor
Ā 
PDF
Analysis of Blackhole Attack in AODV and DSR
IJECEIAES
Ā 
PDF
S IMULATION B ASED S TUDY OF C OOPERATIVE B LACK H OLE A TTACK R ESOLU...
pijans
Ā 
PDF
A survey on mitigation methods to black hole attack on aodv routing protocol
Alexander Decker
Ā 
PDF
A novel defence scheme against selfish Node attack in manet
ijcsa
Ā 
PDF
Gu2412131219
IJERA Editor
Ā 
E0392031034
ijceronline
Ā 
Detection and Removal of Blackhole Attack Using Handshake Mechanism in MANET ...
IOSR Journals
Ā 
E41022938
IJERA Editor
Ā 
Analysis of Blackhole Attack in AODV and DSR
IJECEIAES
Ā 
S IMULATION B ASED S TUDY OF C OOPERATIVE B LACK H OLE A TTACK R ESOLU...
pijans
Ā 
A survey on mitigation methods to black hole attack on aodv routing protocol
Alexander Decker
Ā 
A novel defence scheme against selfish Node attack in manet
ijcsa
Ā 
Gu2412131219
IJERA Editor
Ā 

What's hot (20)

PDF
Black Hole Attack Detection using Fuzzy Logic
International Journal of Science and Research (IJSR)
Ā 
PDF
Fc3110291035
IJERA Editor
Ā 
PDF
Derivative threshold actuation for single phase wormhole detection with reduc...
ijdpsjournal
Ā 
PDF
He3413241328
IJERA Editor
Ā 
PDF
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
IJNSA Journal
Ā 
PDF
Comparison of the performance of trsaodv with aodv under blackhole attack in ...
eSAT Journals
Ā 
PDF
560 229-237
idescitation
Ā 
PDF
Ijcatr04041022
Editor IJCATR
Ā 
PDF
Placate packet dropping attack using secure routing protocol and incentive ba...
eSAT Publishing House
Ā 
PDF
A dynamic approach for improving performance of intrusion detection system ov...
IAEME Publication
Ā 
PDF
disruption of black hole attacks in manet
INFOGAIN PUBLICATION
Ā 
PDF
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
IJTET Journal
Ā 
PDF
Mlrt an mysterious location based efficient routing protocol in manets
eSAT Publishing House
Ā 
PDF
An mysterious location based efficient routing protocol in manets
eSAT Journals
Ā 
PDF
10.1.1.150.595
Ali Azarnia
Ā 
PDF
R44089799
IJERA Editor
Ā 
PDF
Paper id 71201999
IJRAT
Ā 
PDF
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...
ijsptm
Ā 
PDF
Paper id 42201621
IJRAT
Ā 
PPTX
A data mining tool for the detection of suicide in social networks
Yassine Bensaoucha
Ā 
Black Hole Attack Detection using Fuzzy Logic
International Journal of Science and Research (IJSR)
Ā 
Fc3110291035
IJERA Editor
Ā 
Derivative threshold actuation for single phase wormhole detection with reduc...
ijdpsjournal
Ā 
He3413241328
IJERA Editor
Ā 
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
IJNSA Journal
Ā 
Comparison of the performance of trsaodv with aodv under blackhole attack in ...
eSAT Journals
Ā 
560 229-237
idescitation
Ā 
Ijcatr04041022
Editor IJCATR
Ā 
Placate packet dropping attack using secure routing protocol and incentive ba...
eSAT Publishing House
Ā 
A dynamic approach for improving performance of intrusion detection system ov...
IAEME Publication
Ā 
disruption of black hole attacks in manet
INFOGAIN PUBLICATION
Ā 
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
IJTET Journal
Ā 
Mlrt an mysterious location based efficient routing protocol in manets
eSAT Publishing House
Ā 
An mysterious location based efficient routing protocol in manets
eSAT Journals
Ā 
10.1.1.150.595
Ali Azarnia
Ā 
R44089799
IJERA Editor
Ā 
Paper id 71201999
IJRAT
Ā 
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...
ijsptm
Ā 
Paper id 42201621
IJRAT
Ā 
A data mining tool for the detection of suicide in social networks
Yassine Bensaoucha
Ā 
Ad

Similar to Vol 15 No 2 - March 2015 (20)

PDF
Impact of Black Hole Attack on AODV Routing Protocol
Zac Darcy
Ā 
PDF
Impact of black hole attack on aodv routing protocol
Zac Darcy
Ā 
PDF
Impact of Black Hole Attack on AODV Routing Protocol
Zac Darcy
Ā 
PDF
Impact of Black Hole Attack on AODV Routing Protocol
Zac Darcy
Ā 
PDF
A novel approach for preventing black hole
ijasa
Ā 
PDF
Simulation Based Study of Cooperative Black Hole Attack Resolution using Cros...
pijans
Ā 
PDF
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
ijceronline
Ā 
PDF
Ijarcet vol-2-issue-4-1318-1321
Editor IJARCET
Ā 
PDF
Ab26180184
IJERA Editor
Ā 
PDF
New Scheme for Secured Routing in MANET
IJCSEA Journal
Ā 
PDF
Black Hole Attack Prevention Using Random Dispersive Routing for Mobile Adhoc...
pijans
Ā 
PDF
A Survey of various Methods of Preventing and Detecting Attacks on AODV-based...
IJERD Editor
Ā 
PDF
A NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETS
Fransiskeran
Ā 
PDF
A Novel Intrusion Detection System for Detecting Black-Hole Nodes in MANETS
GiselleginaGloria
Ā 
PDF
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...
IJERD Editor
Ā 
PDF
Hu3114871491
IJERA Editor
Ā 
PDF
ENHANCED ALGORITHM FOR REDUCTION OF BLACKHOLE’S RE-JUDGMENT DELAY FOR REALTIM...
IJNSA Journal
Ā 
PDF
K1803036872
IOSR Journals
Ā 
PDF
black hole attack
Dr. Somnath Sinha
Ā 
PDF
AN ANALYSIS ON COOPERATIVE ATTACKS IN MANETS
IAEME Publication
Ā 
Impact of Black Hole Attack on AODV Routing Protocol
Zac Darcy
Ā 
Impact of black hole attack on aodv routing protocol
Zac Darcy
Ā 
Impact of Black Hole Attack on AODV Routing Protocol
Zac Darcy
Ā 
Impact of Black Hole Attack on AODV Routing Protocol
Zac Darcy
Ā 
A novel approach for preventing black hole
ijasa
Ā 
Simulation Based Study of Cooperative Black Hole Attack Resolution using Cros...
pijans
Ā 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
ijceronline
Ā 
Ijarcet vol-2-issue-4-1318-1321
Editor IJARCET
Ā 
Ab26180184
IJERA Editor
Ā 
New Scheme for Secured Routing in MANET
IJCSEA Journal
Ā 
Black Hole Attack Prevention Using Random Dispersive Routing for Mobile Adhoc...
pijans
Ā 
A Survey of various Methods of Preventing and Detecting Attacks on AODV-based...
IJERD Editor
Ā 
A NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETS
Fransiskeran
Ā 
A Novel Intrusion Detection System for Detecting Black-Hole Nodes in MANETS
GiselleginaGloria
Ā 
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...
IJERD Editor
Ā 
Hu3114871491
IJERA Editor
Ā 
ENHANCED ALGORITHM FOR REDUCTION OF BLACKHOLE’S RE-JUDGMENT DELAY FOR REALTIM...
IJNSA Journal
Ā 
K1803036872
IOSR Journals
Ā 
black hole attack
Dr. Somnath Sinha
Ā 
AN ANALYSIS ON COOPERATIVE ATTACKS IN MANETS
IAEME Publication
Ā 
Ad

More from ijcsbi (20)

PDF
Vol 17 No 2 - July-December 2017
ijcsbi
Ā 
PDF
Vol 17 No 1 - January June 2017
ijcsbi
Ā 
PDF
Vol 16 No 2 - July-December 2016
ijcsbi
Ā 
PDF
Vol 16 No 1 - January-June 2016
ijcsbi
Ā 
PDF
Vol 15 No 6 - November 2015
ijcsbi
Ā 
PDF
Vol 15 No 5 - September 2015
ijcsbi
Ā 
PDF
Vol 15 No 4 - July 2015
ijcsbi
Ā 
PDF
Vol 15 No 3 - May 2015
ijcsbi
Ā 
PDF
Vol 15 No 1 - January 2015
ijcsbi
Ā 
PDF
Vol 14 No 3 - November 2014
ijcsbi
Ā 
PDF
Vol 14 No 2 - September 2014
ijcsbi
Ā 
PDF
Vol 14 No 1 - July 2014
ijcsbi
Ā 
PDF
Vol 13 No 1 - May 2014
ijcsbi
Ā 
PDF
Vol 12 No 1 - April 2014
ijcsbi
Ā 
PDF
Vol 11 No 1 - March 2014
ijcsbi
Ā 
PDF
Vol 10 No 1 - February 2014
ijcsbi
Ā 
PDF
Vol 9 No 1 - January 2014
ijcsbi
Ā 
PDF
Vol 8 No 1 - December 2013
ijcsbi
Ā 
PDF
Vol 7 No 1 - November 2013
ijcsbi
Ā 
PDF
Vol 6 No 1 - October 2013
ijcsbi
Ā 
Vol 17 No 2 - July-December 2017
ijcsbi
Ā 
Vol 17 No 1 - January June 2017
ijcsbi
Ā 
Vol 16 No 2 - July-December 2016
ijcsbi
Ā 
Vol 16 No 1 - January-June 2016
ijcsbi
Ā 
Vol 15 No 6 - November 2015
ijcsbi
Ā 
Vol 15 No 5 - September 2015
ijcsbi
Ā 
Vol 15 No 4 - July 2015
ijcsbi
Ā 
Vol 15 No 3 - May 2015
ijcsbi
Ā 
Vol 15 No 1 - January 2015
ijcsbi
Ā 
Vol 14 No 3 - November 2014
ijcsbi
Ā 
Vol 14 No 2 - September 2014
ijcsbi
Ā 
Vol 14 No 1 - July 2014
ijcsbi
Ā 
Vol 13 No 1 - May 2014
ijcsbi
Ā 
Vol 12 No 1 - April 2014
ijcsbi
Ā 
Vol 11 No 1 - March 2014
ijcsbi
Ā 
Vol 10 No 1 - February 2014
ijcsbi
Ā 
Vol 9 No 1 - January 2014
ijcsbi
Ā 
Vol 8 No 1 - December 2013
ijcsbi
Ā 
Vol 7 No 1 - November 2013
ijcsbi
Ā 
Vol 6 No 1 - October 2013
ijcsbi
Ā 

Recently uploaded (20)

PPTX
Artificial Intelligence in Gastroentrology: Advancements and Future Presprec...
AyanHossain
Ā 
PDF
2.Reshaping-Indias-Political-Map.ppt/pdf/8th class social science Exploring S...
Sandeep Swamy
Ā 
PDF
RA 12028_ARAL_Orientation_Day-2-Sessions_v2.pdf
Seven De Los Reyes
Ā 
PPTX
Software Engineering BSC DS UNIT 1 .pptx
Dr. Pallawi Bulakh
Ā 
PPTX
Information Texts_Infographic on Forgetting Curve.pptx
Tata Sevilla
Ā 
PPTX
How to Apply for a Job From Odoo 18 Website
Celine George
Ā 
PPTX
HISTORY COLLECTION FOR PSYCHIATRIC PATIENTS.pptx
PoojaSen20
Ā 
PDF
Review of Related Literature & Studies.pdf
Thelma Villaflores
Ā 
PDF
Health-The-Ultimate-Treasure (1).pdf/8th class science curiosity /samyans edu...
Sandeep Swamy
Ā 
DOCX
pgdei-UNIT -V Neurological Disorders & developmental disabilities
JELLA VISHNU DURGA PRASAD
Ā 
PPTX
TEF & EA Bsc Nursing 5th sem.....BBBpptx
AneetaSharma15
Ā 
PDF
BƀI Tįŗ¬P TEST Bį»” TRỢ THEO TỪNG CHỦ ĐỀ CỦA TỪNG UNIT KƈM BƀI Tįŗ¬P NGHE - TIįŗ¾NG A...
Nguyen Thanh Tu Collection
Ā 
PDF
The-Invisible-Living-World-Beyond-Our-Naked-Eye chapter 2.pdf/8th science cur...
Sandeep Swamy
Ā 
PDF
The Minister of Tourism, Culture and Creative Arts, Abla Dzifa Gomashie has e...
nservice241
Ā 
PPTX
CARE OF UNCONSCIOUS PATIENTS .pptx
AneetaSharma15
Ā 
PDF
Biological Classification Class 11th NCERT CBSE NEET.pdf
NehaRohtagi1
Ā 
PPTX
BASICS IN COMPUTER APPLICATIONS - UNIT I
suganthim28
Ā 
PPTX
HEALTH CARE DELIVERY SYSTEM - UNIT 2 - GNM 3RD YEAR.pptx
Priyanshu Anand
Ā 
PPTX
Basics and rules of probability with real-life uses
ravatkaran694
Ā 
PPTX
Five Point Someone – Chetan Bhagat | Book Summary & Analysis by Bhupesh Kushwaha
Bhupesh Kushwaha
Ā 
Artificial Intelligence in Gastroentrology: Advancements and Future Presprec...
AyanHossain
Ā 
2.Reshaping-Indias-Political-Map.ppt/pdf/8th class social science Exploring S...
Sandeep Swamy
Ā 
RA 12028_ARAL_Orientation_Day-2-Sessions_v2.pdf
Seven De Los Reyes
Ā 
Software Engineering BSC DS UNIT 1 .pptx
Dr. Pallawi Bulakh
Ā 
Information Texts_Infographic on Forgetting Curve.pptx
Tata Sevilla
Ā 
How to Apply for a Job From Odoo 18 Website
Celine George
Ā 
HISTORY COLLECTION FOR PSYCHIATRIC PATIENTS.pptx
PoojaSen20
Ā 
Review of Related Literature & Studies.pdf
Thelma Villaflores
Ā 
Health-The-Ultimate-Treasure (1).pdf/8th class science curiosity /samyans edu...
Sandeep Swamy
Ā 
pgdei-UNIT -V Neurological Disorders & developmental disabilities
JELLA VISHNU DURGA PRASAD
Ā 
TEF & EA Bsc Nursing 5th sem.....BBBpptx
AneetaSharma15
Ā 
BƀI Tįŗ¬P TEST Bį»” TRỢ THEO TỪNG CHỦ ĐỀ CỦA TỪNG UNIT KƈM BƀI Tįŗ¬P NGHE - TIįŗ¾NG A...
Nguyen Thanh Tu Collection
Ā 
The-Invisible-Living-World-Beyond-Our-Naked-Eye chapter 2.pdf/8th science cur...
Sandeep Swamy
Ā 
The Minister of Tourism, Culture and Creative Arts, Abla Dzifa Gomashie has e...
nservice241
Ā 
CARE OF UNCONSCIOUS PATIENTS .pptx
AneetaSharma15
Ā 
Biological Classification Class 11th NCERT CBSE NEET.pdf
NehaRohtagi1
Ā 
BASICS IN COMPUTER APPLICATIONS - UNIT I
suganthim28
Ā 
HEALTH CARE DELIVERY SYSTEM - UNIT 2 - GNM 3RD YEAR.pptx
Priyanshu Anand
Ā 
Basics and rules of probability with real-life uses
ravatkaran694
Ā 
Five Point Someone – Chetan Bhagat | Book Summary & Analysis by Bhupesh Kushwaha
Bhupesh Kushwaha
Ā 

Vol 15 No 2 - March 2015

  • 1. ISSN: 1694-2507 (Print) ISSN: 1694-2108 (Online) International Journal of Computer Science and Business Informatics (IJCSBI.ORG) VOL 15, NO 2 MARCH 2015
  • 2. Table of Contents VOL 15, NO 2 MARCH 2015 Enhancing AODV Routing Protocol to Eliminate Black Hole Attack in MANET.......................................1 Ei Ei Khin and Thandar Phyu Adaptive Search Information Technology in the University Library ........................................................ 15 Andriy Andrukhiv and Dmytro Tarasov Educational Data Mining: Performance Evaluation of Decision Tree and Clustering Techniques Using WEKA Platform........................................................................................................................................... 26 Ritika Saxena Hamiltonian cycle in graphs šˆ4 ≄ šŸn....................................................................................................... 38 Nguyen Huu Xuan Truong and Vu Dinh Hoa IJCSBI.ORG
  • 3. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 1 Enhancing AODV Routing Protocol to Eliminate Black Hole Attack in MANET Ei Ei Khin Faculty of Information and Communication Technology University of Technology (Yatanarpon Cyber City) Pyin Oo Lwin, Myanmar Thandar Phyu Department of Advanced Science and Technology Ministry of Science and Technology Nay Pyi Taw, Myanmar ABSTRACT MANET is an open wireless system that includes several mobile nodes to form an arbitrary and temporary network. As the lack of infrastructure network, the mobile nodes send the routing packets to each other in the network when they want to communicate. So, the nodes use the routing protocols. However, as the lack of security mechanism of the routing protocols, MANETs are facing various severe attacks. Black hole attack is such types of attacks and can carry great damage to the network. As a result, an efficient and simple routing algorithm for MANET is very important. This paper presented a simple approach to find and eliminate the black hole attack for MANET. The proposed system slightly modifies ad hoc on-demand distance vector (AODV) routing protocol by adding two tables and packet type alarm. The proposed mechanism removes the malicious node and chooses the reliable node by using these tables. When the malicious node is detected, the proposed system is automatically sending out the alarm packets to all nodes in the network. Keywords MANET, AODV, Black Hole, Two Tables, Alarm. 1. INTRODUCTION MANETs are the wireless network that consists of dynamic mobile nodes. The mobile nodes may be personal digital assistance (PDA), laptop, mobile phone and any devices that are mobile. The mobile device or node can easily join and leave to the network and can design dynamic topologies for the network based on their connectivity. They have the ability to configure themselves without needing any infrastructure. When the nodes want to communicate with each other via a wireless channel, they give the
  • 4. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 2 connectivity by sending the packets among themselves. So, these nodes may be router or host or both at the same time. MANET have the basic characteristics such as open medium, self- organization, dynamic mobile nodes and topology, limited resources, lack of infrastructure network and lack of defense mechanisms. Because of these factors, MANET often suffers from various security attacks [2]. Moreover, the mobile nodes in the MANET communicate with one another based on the mutual trust. The mobile nodes exist during the range of wireless channel may be overhear and participate to the network. The wireless channel causes MANET more prone to various attacks. So, the security of transmission and communication in MANET is a challenge and important issue. To get secure communication and transmission in networks, the attacks type and their impacts on the MANET is understanding. There are different types of attacks to harm MANET. They are wormhole attack, selfish node misbehaving attack, routing table overflow attack, flooding attack, black hole attack, sybil attack, impersonation attack, denial of service (DoS) attack and so forth. In the black hole operation, the intruder node sends the false reply with high sequence number. When it is received the data packets, it discards all. So, it disturbs the network and makes great damage to this network. In this paper, the defense mechanism is presented to identify and remove this attack and the feasible solution is proposed to get a reliable route to the destination. The rest of this paper is arranged such as: Section 2 describes an overview of black hole attack and AODV routing protocol. Section 3 reviews some researches about defense mechanism. Section 4 presents the proposed detection and prevention mechanism. The simulation results are described in section 5. Then, section 6 makes a conclusion about this paper. 2. BACKGROUND STUDY 2.1 Overview of AODV Routing Protocol AODV is widely used routing protocol for MANETs [7, 9]. It is an extension of destination sequenced distance vector routing protocol[8] and it gives dynamic link conditions, low network utilization, low control message overhead, low memory overhead, and so on. There are two processes in AODV routing protocol. They are route discovery and route maintenance processes. In the AODV protocol, when the nodes need to communicate with each other to send the data packets, firstly a node find an already route in its routing table. If it is an active or fresh route to the destination, the source node uses this route. If it has no route or it is not fresh route, the source node starts the route discovery process. So, it sends Route Request (RREQ)
  • 5. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 3 packet to all neighbors and the neighbor nodes send back Route Reply (RREP) packet if it’s the destination itself or it has a fresh route. Otherwise, they forward the RREQ message. When the source node is received RREP, it can communicate with the destination vice versa. In the route maintenance process, whenever there is a link failure or link broken down during the operation, the Route Error (RERR) packet is sent to the nodes in an active link. The Hello message is periodically sent for maintaining the route information. Although AODV is a well known reactive routing protocol for MANET, there is no security mechanism against the types of attack [1]. Thus, the malicious nodes makes the AODV protocol is defenseless various types of attacks. 2.2 Black Hole Attack It is one type of DoS attacks and active attack [10] in MANET. In the black hole attack [11, 12], the malicious node declares to the nodes that it is the best route to the destination with false route reply message. It is always used the highest sequence number value and the lowest hop count value. However, when it is received the data packets, it discards all packets. For example, the following scenario in Figure 1 is considered. In this figure, it is assumed that ā€˜S’, ā€˜D’ and ā€˜M’ are the source, the destination and the malicious node respectively. When ā€˜S’ wants to communicate with ā€˜D’, it first sends Route Request packet to all neighbor nodes. Thus, ā€˜F’, ā€˜E’ and ā€˜M’ receive it. As ā€˜M’ is a black hole, it immediately sends back a Route Reply packet with high sequence number. When ā€˜S’ receives Route Reply packet from ā€˜M’, it is assumed this route is fresh enough route. Then, it communicates with the destination through this way. However, ā€˜M’ does not forward any data packet anywhere and discards all them. Figure 1. AODV protocol with black hole attack
  • 6. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 4 3. RELATED WORKS There are various defense mechanisms in the literature to protect black hole attacks. Some of the research papers are reviewed in this regard. Mohammad Abu Obaida et al. [3] has presented lots of modules such as Threshold Tester, Packet Classifier, RREP sequence number Tester, Extractor, Alarm Broadcaster and Blacklist Tester. This mechanism modifies the format of Route Reply packet and uses a new packet type Alarm. The router calculates the range of the accepted sequence numbers and gives the threshold value. When any node is exceeding the threshold values for many times, this node is identified as attacker. But, the calculation of the threshold value is bit overwhelming. So, it has the network delay. Although the calculation of correct threshold prevent black hole node, the wrong calculation may disgrace an authentic node as a black hole. Himral, Vig and Chand [5] have defined a mechanism to eliminate the malicious nodes in the MANET and to discover the reliable paths to the intended node by checking the sequence number difference between the source and intermediate node. In AODV protocol, the destination sequence number is very important. It is 32-bit integer value and is used to determine the fresh enough route or not. The larger destination sequence number, the better the route. So, in this paper, the proposed system is assumed that the malicious node sends the first RREP packet with high sequence number to the source node. Then, the source node stores it as the first RREP in the table and compares it with its sequence number. If there is very different, the node is surely the attacker and eliminates this entry from table. However, the proposed method cannot find multiple black hole nodes. Nital Mistry et al. [4] modifies the original AODV routing protocol by using a new field Mali_node, a MOS_WAIT_TIME timer and a Cmg_RREP_Tab table. The time period that the source node waits for the Route Replies is defined as RREP_WAIT_TIME. The half of RREP_WAIT_TIME is defined as MOS_WAIT_TIME. Route Reply packets are kept in the Cmg_RREP_Tab table and Mali_node is stored the ID of attacker node. The source node analyzes and discards Route Replies with very high sequence number from the Cmg_RREP_Tab table. The experimental results demonstrate that this method has a good packet delivery ratio than the original AODV protocol. However, it has high processing delay and the end-to-end delay is increasing. Jalil, Ahmad and Manan [6] have proposed an ERDA mechanism that modifies the existing route discovery mechanism recvReply() function of AODV routing protocol. The new elements are mali_list to store the ID of malicious nodes, rrep_table to keep RREP packets from other nodes and
  • 7. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 5 rt_upd to do the update operation of routing table. The source node stores RREP packets in the rrep_tab table and then updates its routing table with first Route Reply of the malicious node from the rrep_tab table. However, the source node updated again the routing table with the next Route Reply packet from other node although it has a lower sequence number because the value of rt_upd is true. If the value rt_upd is false, the source node stops the update operation of routing table. The source node set the value of rt_upd as false when it receives Route Reply from the destination. ERDA mechanism removes the false Route Reply entry by replacing the later entry. However, it has high processing delay. 4. IMPLEMENTATION OF DETECTION AND PREVENTION MECHANISM In this module, the detection and prevention algorithm for black hole attack on the context of AODV protocol (MAODV) is implemented to isolate the black hole nodes and to discover a safe route from source to destination in MANET. 3.1 Route Reply Record Table and Malicious Node Table The proposed system modifies the procedure of source node by introducing two tables and alarm packet into existing AODV protocol. These tables are Route Reply (RREP) Record Table (RRT) and Malicious Node Table (MNT). The RRT table stores all RREP packets from the neighbor’s node and the MNT table stores the information of malicious node. The examples of these two tables are shown in Table 1 and Table 2. The RRT table is stored only by the source node and the MNT table is stored by all nodes in MANET to eliminate the black hole node. Table 1. Route reply (RREP) record table (RRT) Time Dest Node ID Dest Node Seqno Next Hop Hop Count Reply Source Address Lifeti- me Timesta -mp 5.203 C 100 M 1 M 9 20.4855 5.247 C 12 E 2 A 10 20.4855 5.301 C 10 D 3 B 9 20.4855 5.302 C 11 G 1 H 9 20.4855
  • 8. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 6 Table 2. Malicious node table (MNT) Node ID Time P 5.0143 M 10.6542 T 50.4968 3.2 Threshold Value Calculation It is the value of averaging the difference between the destination sequence numbers from RRT table and routing table in each time interval (t) for destination. This value is used for detecting and removing the attacker node in the network. β is control parameter and variable. The value of β is different from the number of node, the number of connection, the network area, the mobility speed and the pause time. β is used to avoid the authentic node disgrace to be a malicious node. š‘‡ā„Žš‘Ÿš‘’š‘ ā„Žš‘œš‘™š‘‘ = āˆ‘(š‘…š‘…šøš‘ƒš‘†š‘’š‘žš‘›š‘œ š‘” āˆ’ š‘…š‘‡š‘†š‘’š‘žš‘›š‘œ š‘” ) š‘‡š‘œš‘”š‘Žš‘™ š‘š‘¢š‘šš‘š‘’š‘Ÿ š‘œš‘“ š‘ƒš‘Žš‘š‘˜š‘’š‘”š‘  + š›½ 3.3 Extension to Routing Table The proposed system has implemented to yield a strong method for detecting and preventing black hole attack. For the design of our scheme, the routing table field of AODV protocol is modified as follows. The reply initiator filed is added to the routing table and is used to store the ID of node that the route reply sends initially. When the malicious node is detected comparing with the threshold value, we can find the malicious node ID by seeing this field. So, the fields of the routing table of our proposed protocol are below:
  • 9. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 7 3.4 Alarm Packet In the original AODV protocol, it uses four different types of packets to communicate with each other. They are: RREQ packet and RREP packet are used for route discovery process to discover a route to the destination. RERR packet is used for route maintenance process in order to notify earlier nodes down the path of such a breakage when a link failure occurs. The HELLO packet is used to maintain the connectivity of the neighbor nodes. In the proposed system, the ALARM packet is added to the packet types of AODV protocol. The ALARM packet is used to notify all neighboring nodes in the network about the black hole node and the format of ALARM packet type is shown in Table 3. Table 3. ALARM packet format Type Reserved Hop Count Broadcast ID Malicious Node IP Address Originator IP Address 3.5 Detection and Prevention Algorithm The following terms are used to express the proposed algorithm. The proposed detection and prevention algorithm are as follows: Begin 1. SN broadcasts RREQ to neighbors. 2. Store RREPs into RRT when SN receives RREP from IN until the waiting time. 3. Retrieve the Seqno from RRT and calculate the Threshold value.
  • 10. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 8 4. Detect and remove the malicious node from RRT. while ( RRT is not NULL) if (( rep_seqno – rt_seqno) > Threshold ), then assume IN is MN remove entry from RRT and store this IN as MN to MNT send Alarm message end end 5. Select the reliable packet from the rest packets and continue the normal operation of AODV protocol. 6. Flush the RRT after completing step 4-5. End 3.6 Working Principle of the Proposed System When the source node needs to communicate with the destination to send the data packets, it sends RREQ packet to all neighbors. In original AODV protocol, the source node accepts the first fresh RREP form the neighbor node. Thus, the malicious node always sends the route reply with high destination sequence number ahead of other neighbor node to the source node. As compared, in this paper, the source node keeps all RREP from neighbor nodes in RRT until the waiting time. The waiting time is a timer that the source node waits other RREPs after getting the first RREP. We used 0.1 second as the value of waiting time. Then, the source node retrieve the destination sequence number from RRT table and routing table and calculate Threshold value using the above equation. To detect the malicious node, we calculate the difference of sequence number from routing table and RRT. If the value of the difference is greater than Threshold, this intermediate node is assumed as the black hole node. The source node stores this malicious node ID in MNT and discards that entry from the RRT table and broadcasts ALARM message to all nodes in the network to notify about this attack node. Then, the source node chooses the reliable node from the resting node and continues the normal operation of AODV protocol. After choosing the reliable node and removing the malicious node, the RRT table must be clear all data.
  • 11. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 9 5. SIMULATION RESULTS We have implemented the black hole attack behavior in AODV protocol using Network Simulator (NS-2.34) [13]. The main traffic generator used in this simulation is the Constant Bit Rate (CBR) and the overall simulation parameters are presented in Table 4. The performance of the AODV protocol and the proposed protocol with the black hole attack are analyzed and evaluated. The following metrics are used to analyze the results of our solution. End-to-End Delay: It is the average delay of sending and receiving data packet between the source and the destination. It is measured in milliseconds Packet Delivery Ratio (PDR): It is the ratio of total number of data packets transmitted by the sources and received by the destinations. Higher value means the better results [14]. Routing Overhead: It is the ratio of total number of control packet generated to the data packets transmitted. . Table 4. Simulation parameters Parameter Value Simulator NS-2.34 Area 800m x 800m Routing Protocol AODV, BlackholeAODV, MAODV Simulation time 200s Application Traffic CBR Number of Nodes 50-200 Malicious Node 1-4 Pause time 2s Packet Size 512 bytes Transmission rate 2 packets/s Mobility speed 10 m/s No of Connections 20-40 Movement Model Random Waypoint 5.1 Performance Analysis on Variation of Malicious Node We have created a network by using simulation parameters shown in Table 4. Figure 2 illustrates the effect of malicious nodes on PDR in MANET. The numbers of malicious nodes for simulation are used randomly from one to four. It can be seen that AODV heavily suffers from the black hole attack. In Figure 2, when the number of malicious node in the network increases, the PDR of AODV protocol decreases. On the other hand, the experimental
  • 12. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 10 results show that the PDR of MAODV protocol is above 95% even though the malicious node is increased. MAODV has higher average packet delivery than AODV. This is due to the fact that the proposed protocol can prevent the black hole attack that occurs in the network. The impact of malicious nodes to the routing overhead and the average end- to-end delay are presented in Figure 3 and Figure 4. In AODV under attack, the routing overhead is very high comparing to MAODV protocol. The delay of MAODV is higher than the AODV protocol under attack due to the additional waiting time for route replies. There is decrease in the delay of the AODV protocol with black hole attack as the immediate reply of malicious node without checking its routing table.
  • 13. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 11 5.2 Performance Analysis on Variation of Node The performance results of all protocols are shown in Figure 5 to Figure 7 when the network size is increasing. When the number of nodes in the network increases, the PDR of AODV also decreases in Figure 5. It is due to the larger the number of intermediate nodes on an active route, the more increases the route failure. The PDR of AODV with attack decrease even more due to the probability that the malicious node become an intermediate node. On the other hand, the PDR of MAODV is greater than AODV with attack because our detection approach is able to identify and eliminate the malicious node which greatly increases the network PDR.
  • 14. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 12 The routing overhead over number of nodes is depicted in Figure 6. The routing overhead for all protocols increases as the network size is growth. The routing overhead of the blackholeAODV protocol is greater than the normal AODV and MAODV protocol since the black hole node is present. The overhead of MAODV is the same as the normal AODV except 200 node scenario. This is the proposed protocol generate any additional requests for discovering secure routes. The impact of number of nodes on delay is shown in Figure 7. The delay of the proposed protocol increases at 100 node scenario since it has to avoid the malicious node.
  • 15. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 13 6. CONCLUSIONS In this paper, a simple approach for eliminating the black hole attack for MANET is proposed. The proposed mechanism can apply to remove black hole node and to find a reliable route form source to destination in the MANET. In this mechanism, the process of source node in AODV protocol is modified by introducing two tables and alarm packet type. These tables are Route Reply Record Table (RRT) to store Route Reply from neighbor’s nodes and Malicious Node Table (MNT) to store the information about the malicious nodes. The black hole node can be removed and the reliable node can be chosen by using these tables. The alarm packet type is also proposed to inform the intruder node to all neighboring nodes when the black hole node is detected. To evaluate the applicability of this routing algorithm, we simulated different scenarios using AODV protocol and proposed protocol with the black bole node. We considered the performance metrics such as routing overhead, PDR and delay on different scenarios with number of nodes and number of malicious nodes as variable parameters. The experimental results present that the proposed system performs better than the AODV protocol. However, the proposed system assumed that the route reply comes from more than one node within the waiting time. If the source node receives the only one route reply from the black hole node or the route replies from all the black hole nodes during the waiting time, the malicious node can enter the network. REFERENCES [1] Ramaswami, S. S., and Upadhyaya, S. Smart Handling of Colluding Black Hole Attacks in MANETs and Wireless Sensor Networks using Multipath Routing. Proceedings of the 2006 IEEE Workshop on Information Assurance, 2006. [2] Luo, J., Fan, M., and Ye, D. Black Hole Attack Prevention Based on Authentication Mechanism. IEEE, 2008.
  • 16. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 14 [3] Obaida, M. A., Faisal, S. A., Horaira, M. A., and Roy, T. K. AODV Robust (AODVR): An Analytic Approach to Shield Ad-hoc Networks from Black Holes. International Journal of Advanced Computer Sciences and Applications, 2, 8 (2011), pp. 97-102. [4] Mistry, N., Jinwala, D. C., and Zaveri, M. Improving AODV Protocol against Black Hole Attacks. International Multi Conference of Engineers and Computer Scientists, 2, (2010). [5] Himral, L., Vig, V., and Chand, N. Preventing AODV Routing Protocol from Black Hole Attack. International Journal of Engineering Science and Technology, 3, 5 (2011). [6] Jalil, K. A., Ahmad, Z., and Manan, J. A. Mitigation of Black Hole Attacks for AODV Routing Protocol. Society of Digital Information and Wireless Communications, 1, 2 (2011). [7] Perkins, C. E., Royer, E. B., and Das, S. Ad-Hoc on Demand Distance Vector (AODV) Routing. IETF RFC 3561, 2003. [8] Perkins, C. E., and Bhagwat, P. Highly Dynamic Destination-Sequenced Distance- Vector Routing (DSDV) for Mobile Computers. ACM SIGCOMM’94 Conference on Communications Architectures, Protocols and Applications, (1994), pp. 231–241. [9] Ochola, E., and Eloff, M. A Review of Black Hole Attack on AODV Routing in MANET. http://icsa.cs.up.ac.za/issa/2011/Proceedings/Research/Ochola_Eloff.pdf. [10]Shurman, M. A., Yoo, S. M., and Park, S. Black hole Attack in Mobile Ad Hoc Networks. Proceedings of the 42nd Annual Southeast Regional Conference ACM-SE 42, (2004), pp. 96-97. [11]Deng, H., Li, W., and Agarwal, D. P. Routing Security in Wireless Ad Hoc Networks. IEEE Communications Magazine, 40, 10 (2002). [12]Sandhu, G., and Dasgupta, M. Impact of Black Hole Attack in MANET. International Journal of Recent Trends in Engineering and Technology, 3, 2(2010). [13]Fall, K., and Varadhan, K. The NS Manual. (November 2011), http://www.isi.edu/nsnam/ns/doc/index.html. [14]Jaafar, M. A., and Zukarnain, Z. A. Performance Comparisons of AODV, Secure AODV and Adaptive Secure AODV Routing Protocols in Free Attack Simulation Environment. European Journal of Scientific Research, 32, 3(2009), pp. 430-443. This paper may be cited as: Khin, E. E., and Phyu, T., 2015. Enhancing AODV Routing Protocol to Eliminate Black Hole Attack in MANET. International Journal of Computer Science and Business Informatics, Vol. 15, No.2, pp.1-14.
  • 17. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 15 Adaptive Search Information Technology in the University Library AndriyAndrukhiv and DmytroTarasov Social Communications and Information Activity Department, Lviv Polytechnic National University, Ukraine, Lviv, 12 Bandera Str. ABSTRACT Information provision of the educational process in the university is aimed at implementing of new information technologies and software into all spheres of university academic activity in order to provide students with qualitative educational material. Forming of new information society, development of Internet network and growing number of electronic resources caused new conditions for research libraries that traditionally are guides in information environment. Modern library user demands new standards of services to satisfy information needs during one’s studies. Simultaneously, university management sets the goal to increase education quality through organization of work on information support of educational process scientific methodic literature. Consequently, research on information support of educational process in higher educational institution would allow organization of qualitative collaboration between the library and subdivisions of higher educational institution, and consequently improve book supply for educational process and optimize funds necessary to buy new materials. The article describes the algorithm of literature recommendation to academic courses. The algorithm improves the information support of students during course study and enables academic teachers to form recommended literature list in automated way. The algorithm work is a basis for information system introduced in Lviv Politechnic National University, Ukraine. Keywords Library information system; OPAC; web-based library systems; e-learning materials, educational process. 1. INTRODUCTION The problem of online access to scientific and education information is a vital issue nowadays. A few years ago, the center of access to scientific information was the library, but with the development of information technologies the Internet took library’s place[1,6]. This change was caused by late development of information technologies in Ukrainian libraries. Ancient and traditional role of library as an institution of acquiring, organizing, preserving, retrieving and disseminating information to users has changed. In current information society, libraries are trying to stay influential institutions via providing access to Internet resources. However, due to global commercialization of scientific resources, the Internet may not
  • 18. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 16 always provide all the necessary information. Taking into account the tendency of scientific community to turn to electronic documents and the expansion of the range of services, libraries have to organize their work in the way to satisfy user information requirements as soon and as well as possible. To solve this problem, the automation of library processes is being conducted. This involves: - computerization of workplaces; - creation of a data center for storing and processing the large-scale data sets; - selection/development of own and support of appropriate hardware and software;  alteration of the principles of library management, taking into consideration new forms of service, etc. Solution of one of library informatization problems leads to a range of other problems[3]. For example, computerization of a workplace involves:  computer equipment maintenance (repair, software updates and technical support);  equipping the workplace (desk, chair, peripheral devices, etc.);  access to network resources (connection to the local area network and electric power supply network);  selection and purchase of software;  managing occupational health and safety and health requirements (organization of appropriate lighting, safe work with the computer, air- conditioning, heating, choice of room for installing computer, etc.)  training staff to work with the computer; All-inclusive library automation is a difficult task to implement in the field of information technologies. It requires enrollment of skilled librarians, systems analysts, linguists and programmers. 2. THE ACTUALITY OF THE RESEARCH Reformation of educational system in Ukraine and implementation of new educational technologies provided by the Bologna process significantly increase the role of libraries in information support of academic, learning and research activity of the university. Library must consider an information flowthat is constantlybeing increased and find new ways and possibilities to collaborate with university departments as with subjects ofnewinformation andeducational environment in order to stay needed and essential institution. Everyone is interested in improving the information provision of students: library will have its service user, academic department will be given
  • 19. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 17 accreditation and students will have qualitative sources of information for studies. Therefore, information support of education process is one of the key goals of university and its library. 3. WEB-TOOLS OF INFORMATION SEARCH IN THE UNIVERSITY LIBRARY Informatization of the Scientific Library of Lviv Polytechnic National University started in 2007 and a large amount of work has been done by now. The Scientific Library proposes the following services: library website, institutional repository[2], electronic catalogue (OPAC) and several new special web-based services for our users such as form to find UDC, Ask-a-librarian, literature recommendation system for studying academic disciplines in our university (see Fig.1). Library web- services Web site Institutional repository OPAC Special information search services Form to find UDC Ask-a-librarian ā€œLiterature recommendation systemā€ Fig. 1. The Scientific Library user-oriented web services. Let us briefly and comprehensively dwell upon each information resource. 1. Library website (http://library.lp.edu.ua) plays a significant role in the life of the library, as it is the primary resource of library events representation on the Internet. The website has been built with the help of Drupal 7 CMS. We use Drupal 7 because there are a lot of different modules that give us opportunity to integrate library services with web- site. We analyze web-site each year quarter and get average statistics:statistics:  About 5 000 visits per month;  About 750 pages indexed in Google;  Links to web site – 57 200;
  • 20. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 18 2. Lviv Polytechnic National University Institutional Repository (http://ena.lp.edu.ua) was created on May 15, 2010. Currently the repository contains more than 25 000 items. It has been built with the help of Dspace software. 3. OPAC (Online Public Access Catalogues) is an important part of many digital library collections. It allows users to search for the bibliographic records within library collections. Nowadays, some OPACs also provide access to electronic resources and databases, in addition to the traditional bibliographic records. Our OPAC was created in 2008 by the IT Department of Scientific Library (http://library.lp.edu.ua/en/it_department). This solution gave us opportunity to connect google-analytics to the OPAC and create own thematic statistic system. So we know two main points of visiting statistics: number of users and kind of literature they are looking for. So, we have 396212 records in OPAC and about 500 visits per month. The next figure shows what kind of literature users are looking for. Fig. 2. Thematic searches in OPAC In spite of that, we know that the most popular literature in OPAC is scientific literature – about 60 percent of search queries, literature for students – 37%, and 3% – other literature. 4. Special web-based services for users are: ļ‚· form to find UDC; ļ‚· Ask-a-librarian; ļ‚· literature recommendation system for studying academic courses in our university. Technical 65% other 6% Humanities 25% Sociology 4%
  • 21. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 19 4. NEW SPECIAL INFORMATION SYSTEM ā€œLITERATURE RECOMMENDATION SYSTEMā€ The new service for library users is service that selects literature needed to study academic discipline from the library collection. In Ukraine, the official document that defines the qualitative and quantitative characteristics of the process of discipline study is course program. One of the sections of this document includes book list, which student must work out to learn the material well. To perform the task of qualitative and complete formation of literature and reference list for the course teacher must be aware of the available literature in the library and be able to find this literature and constantly keep up with new materials within one’s research field. Information system that recommends above named literature to academic teacher would significantly ease one’s work. Teacher would only make decisions whether to include or not include this or that position from course program to the recommended literature list. Moreover, when the list is formed on the base of library collection it improves up to date information support of educational process. In Lviv Polytechnic National University there is information system for recommended literature selection developed and introduced. Algorithm of its functioning is shown on the Fig. 3. Course programs Selection of book authors Selection of book titles Selection of UDC values Search through the library collection by author Search through the library collection by book title Changing of UDC values to certain form Search through the library collection by UDC Consolidation of search results 1 1 1 2 3 4 5 6 8 7 Ranking of search results 9 Fig. 3. The algorithm of formation of literature list for the course where 1. Bibliographic records from recommended literature list for the course;
  • 22. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 20 2. Tuple of book authors from recommended literature list; 3. Tuple of book titles from recommended literature list; 4. Tuple of UDC from recommended literature list; 5. Results of search by author through the library collection includes all book sof authors from recommended literature list; 6. Results of search by title through the library collection includes all book titles from recommended literature list; 7. Tuple of UDC adapted into form suitable for next iterations; 8. Results of book search through the library collection includes positions with certain UDC; 9. Combined book list from different iterations. The next step after list formation is list ranking. Ranking of selected search results will be done based on multi-criteria estimation of the relevance of found documents taking into account the following criteria: – author and title of a book; – factor of research technical bookaging (year of publication); – statistical data on book demands; – number of book pages. Algorithm work is shown on the Fig. 4. We divide the mentioned criteria into two groups: main and specified. Main criteria are autonomous criteria that are used to find relevant results. Specified criteria are to increase the pertinence of relevant results received after using the main criteria. In our case main criteria include the title and author of a book and specified criteria include factor of research technical book aging, statistical data on book demands and number of book pages. 4.1 Criterion of Book Author and Title The below given presumptions are based on the thesis that if an expert (staff member) has chosen books of one author, other books by the same author may also be valuable for the same expert. Researchers commonly publish their works within a specific research field and quite rarely bounce to another one. For example, if an author works in building and architecture then this person will rather not write next papers on computer processors. In practice, it means that authors from recommended literature list have to be the same as these from library collection. The similar situation is also with book titles. 4.2 Factor of Research Technical Book Aging Factor of research technical book aging is important because documents with flow of time last their value as information source; consequently, they are being used less and less. American researchers Burton R.E. and Kebler[5] R.W. proposed the term ―half-life‖ to describe literature obsolescence.
  • 23. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 21 Forming a set of options Forming a criteria set Evaluation criteria determines the group of experts Evaluation criteria determines the programmers Evaluation criteria determines the user Define variant Formula (2) The standardization of criteria values by the formula (1) Formula (3) Determination of criteria importance The calculation of the integral criterion by formula (4) min max Sorting by a combined criterion For criterion "book age" defines the class to which the discipline define Determination of the age limit for book, depending on the class Fig.4. Evaluation of literature search results. Ranking algorithm
  • 24. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 22 This number means period of time during which a half of all published papers in some branch of science is out of use. For instance, they found that the half-life of journal articles in physics is only 4.6 years, in chemistry it is 8.1 years, in mathematics this number is 10.5 years and in physiology it is 7.2 years. It must be emphasized that, by the aging process we understand a process of information obsolescence, but not physical aging of the information carrier. According to the study 62% of users are turning to journals, whose age does not exceed 1.5 years; 31% use journals aged 1,5-5 years and 7% count on publications older than 10 years. Thus, we can claim that the document age is clearly connected with the intensity of its use and therefore can be used in ranking. 4.3 Statistical Data on Book Demands In order to improve the effective reader service and library collection management we use the analysis of statistical data on loaned and requested books[4]. Data on library book use is an important criterion in ranking. Analysis of information needs and requests can show current reader trends and dynamics of reader interests. If the book is popular among users then it is valuable for them and satisfies their information needs. The level of demand is measured in number of books loaned by readers. These data are kept in Library Information System (ALIS). In this case we do not take into account time aspect (number of books loaned during certain period of time), because not all books were registered in catalogue at once. Consequently, book could not be found, because it was not in catalogue in the moment when user needed it. Statistical data have to be analyzed before using in order to remove splashes of activity caused by the period of exams. In classical tasks of decision-making theory, normalizing coefficient that lies in the area of feasible solutions is introduced. Statistical data on literature demands are subjective. They show some aspects of book’s value from the point of view of reader, but do not mirror real level of reader’s information satisfaction. Students are major users of university library and they use books recommended by academic teacher. That is why books recommended by teacher would be highly demanded while others would be undemanded. 4.4 Number of Book Pages This criterion appeared as a consequence of library collection peculiarity on the step of transferring information from library collection to electronic catalogue. Some libraries’ definition of ―book‖ includes guidelines for laboratory or term papers, promotional materials, etc. This is to simplify the library work. The distinctive peculiarity of academic textbooks is huge number of pages. There were selected 2,000 guidelines for laboratory and term papers, lectures and brochures for our study from the collection of
  • 25. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 23 Scientific Library of Lviv Polytechnic National University. It has been found that 1910 (or 96 percent) of these documents does not exceed two publishing sheets. Therefore, it is advisable to analyze books containing more than 50 pages. Problem of multi-criteria optimization plays key role in decision-making theory. To solve this problem, partial criteria must be merged in one integer criterion and then its minimum or maximum found. There are few types of generalized criteria depending on the way of partial criteria combination: maximin, multiplicative, additive (or linear convolution). To solve the problem of ranking of bibliographic description list it is needed to build the objective function that combines partial criteria. With this function we can determine the relevance of each bibliographic description. For ranking of found literature we use the algorithm of multiplicative criterion using above mentioned criteria. 5. RESULTS The literature recommendation system was developed via PHP+Apache+MySQL by the Library’s IT Department of Lviv Polytechnic National University Library. Data in this sytem are synchronized daily according to ALIS through ODBC protocol. The peculiarity of this system is that user is given an opportunity to fill feedback form (see Fig.6), find details of system functioning and ways to implement defined books in educational process. The algorithm which is described in this article is the basis of an information system which is available on http://library.lp.edu.ua/ttp/. It is a separate webpage, where the user is offered to look for the necessary subject and review recommended references. If user thinks that the available references have to be changed, the form is offered, where user can enter one’s requisites and list of reference changes. On the same webpage user can operate the function of literature recommendation for a certain course. The generated list is analyzed by the teacher. The marked literature that can be attached to the subject goes to the librarian, who analyzes it and makes changes (Fig.5).
  • 26. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 24 Fig. 5. An example of literature recommendations for the course of ā€œ Foreign languagesā€. Fig. 6. An example of literature recommendations feedback form For processing and permanent storage of the results of a web module work person may use:  regular automatic data export in the ALIS (for users’ profiles updates in the ALIS, literature ranking for rank forming in the electronic catalogue of the ALIS);  sending automatic information to library staff via e-mail (for the function of feedback). 6. CONCLUSIONS The article describes a new service that the library offers for its users. It will allow the university to improve the quality of information support of educational and management processes, and provides automated solution of formation of recommended literature lists and making updates to them. The teacher receives a number of integration benefits: formation of recommended literature lists, designed according to the current bibliographic standards, intelligent algorithms of automatic selection of literature for the courses, and notification about new books related to the course.
  • 27. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 25 7. REFERENCES [1] Kanamadi, S., & Kumbar, B.D., 2006 . Web-based services expected from libraries: A case study of management institutes in Mumbai city, Webology, 3 (2), Article 26. Available at: http://www.webology.org/2006/v3n2/a26.html [2] Tarasov D., Andrukhiv A., 2012 . Analysis of the development of Ukrainian repositories, Modern Problems of Radio Engineering, Telecommunications and Computer Science: Proceeding of the National University ―Lviv Polytechnic‖, p. 383., Ukraine [3] Andrukhiv A., Sokil M., Fedushko S., 2014, Integrating new library services into the University Information System, Library management, 1 (6), Proceedings of the Institute of Polish Language and Literature, pp. 79-88, Poland [4] Bhatnagar A., 2012, Web-based library services. Available at: http://ir.inflibnet.ac.in/dxml/handle/1944/1418 [5] Burton R.E. and Kebler R.W., 1960, The "half-life" of some scientific and technical literatures., American Documentation, pp. 98—109. [6] Sannella, M. J., 1994, Constraint Satisfaction and Debugging for Interactive User Interfaces. Ph.D. Thesis, University of Washington, Seattle, WA, This paper may be cited as: Andrukhiv, A. and Tarasov, D., 2015. Adaptive Search Information Technology in the University Library. International Journal of Computer Science and Business Informatics, Vol. 15, No. 2, pp. 15-25.
  • 28. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 26 Educational Data Mining: Performance Evaluation of Decision Tree and Clustering Techniques Using WEKA Platform Ritika Saxena (M.Tech, Software Engineering (CSE)) BBD University, Lucknow. ABSTRACT Data Mining plays a vital role in information management technology. It is a computational process of finding patterns from large databases. It mainly focuses on extracting knowledge from the given or the available data. Different knowledge extracting tools are used. This tool is most common among every sector be it educational, organizational etc. Educational Sector can take advantage out of these tools in order to increase the quality of education. But the sad part is still in present educational systems are not using it. Higher education Institutions needs to know which student will enrol in which course, which student needs more assistance. In data mining users are facing the problem when database consists of large number of features and instances. These kinds of problem[s] could not be handled using decision trees alone or clustering technique alone. Because, decision trees depend upon the dataset used and the configuration of the trees. Similarly, clustering alone doesnā€Ÿt work for all kind of patterns. So in order to find that which technique is most suitable, in this paper we have evaluated the performance of both the algorithms. Educational data is mined and the algorithms are applied to it so as to predict the results. Keywords Weka, EDM, Decision Trees, Clustering, KDD. 1. INTRODUCTION Data mining is widely used in diverse areas. Data Mining is the process through which we can analyse the different type of data and further extract the useful information. Data Mining is sometimes known as KD i.e. Knowledge Data. Data Mining is one of the tools which help in analyzing the data. It helps in analyzing the data from different angles, categorising them and hence summarize the relationships identified. Therefore, data mining is the process through which we can find different relations and patterns generated among different fields of databases. Educational Data Mining is a different research field with the application of data mining, machine leaning and statistics to information generated from educational settings. The main goals of educational data mining are predicting studentā€Ÿs future learning behaviour, advancing scientific knowledge, effects of educational support. In this research paper we are using data mining methodologies in order to
  • 29. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 27 understand studentā€Ÿs performance using the two commonly used techniques of data mining. Data mining helps in studying the performance of students based on their past records. In this paper, we are using two techniques of data mining that is clustering and decision trees so as to get the results of the inputs provided by us and compare those results as to which of the techniques is more preferable and gives the better results . 2. BACKGROUND STUDY Data Mining is the analysis step of KDD (Knowledge Discovery Database). Data mining tasks are semi automatic or automatic based on the quantity of the data available. Data collection, preparation, interpretation and reporting are not the part of data mining whereas they are the part of KDD. Data Mining could be performed using different tools some of the tools are listed below. Different Phases in Data Mining include; Data Mining Phases The data in the educational institutions that is stored in electronic form has seen a dramatic increase. Historical as well as organisational data is stored in the databases. It is really cumbersome to manage such data manually. Different relations have to be produced out of the stored data in the database. The categorization of the students according to their academic result is the important task for the institutions in order to increase the credibility of their Data Exploration Problem Definition Data Data Preparation Deployment Modelling Evaluation
  • 30. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 28 institution. There is no assurance whether there are predictors that can determine or predict whether the student is academic is below average, average or a genius student. In present day of the educational system, a studentā€Ÿs performance is determined by the combination of primary results, secondary results, internal assessments, tests, assignments and attendance etc.Therefore, in this research paper we are analyzing the results as to which algorithm is more efficient and predictable. 3. RELATED WORK Lakshmi et al[1] describes the studentā€Ÿs performance . They used ID3 algorithm in order to classify the students performance and according to which they will be allotted the area for their master. ID3 algorithm is the classification algorithm through which we can construct decision trees using top down, bottom up and greedy search methodologies. In order to select the attribute which is most useful for the classification of the datasets, metric- information gain is used. Ali [2], also describes that how data mining could be used in educational sector. As the information is collected by the students at the time of admission and saved in the computer this provides benefit for business point of view. He used data mining to classify and cluster the information based on psychographic, behavioural and demographic variables. Therefore, it helps in describing about the studentā€Ÿs profile whether they are successful or unsuccessful based on their percentage or GPA secured during secondary examination and semesters. Sembiring [6], created a model based on psychometric analysis of the students using data mining techniques. He created a rule model of the studentā€Ÿs performance based on their psychometric behaviour. The predictor variables used are- Interest, Believe, Family Time, Study Behaviour. The model developed here uses the two main methodologies i.e. kernel k-means clustering and support vector machine (SVM) classification. As it could be used on large as well as high dimensional data that are non–linearly separable. Bhullar [7], describes a data mining tool that helps to find out the student that are weak in academics and need assistance. He used Weka classification algorithms that provide stability between precision, speed and interpretability of results. J48 algorithm is used which helps in classifying similarly as the decision trees. Baradwaj [8], collected the information of the 200 students from VBS Purvanchal University, Jaunpur(U.P) such as their previous semester marks
  • 31. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 29 (PSM), class test grade (CTG), Seminar performance(SEM), General Proficiency(GP),Attendence(ATT) and Lab Work(LW) . Using this record he used the classification technique in order to cluster them based upon the percentage and good, average, poor. He also measured entropy so as to check the impurity. Romero [9], in his survey described the different studies carried out in this field. He described different types of used techniques and educational environments and also the similar work that is done related to educational data mining. Data mining tools are normally designed in their flexibility rather than their simplicity. He explains both the aspects where on the one hand the user has to select the algorithm to carry out with the given data and on the other hand the algorithm has to be configured before its execution. XML, PMML, OWL, RDF, SCORM are some of the current data mining tools. Calders [11], presents their works in which there are four EDM different paper that represent a crosscut of different applications areas of data mining. M. Abu Tair [12], in their research work presented a case study to improve the studentsā€Ÿ performance mining the data. They extracted the useful knowledge from the database and after preprocessing the data applied mining techniques such as association, outlier detection rules and classification. 4. METHODOLOGY In this paper we have used Weka 3.7 as a comparison tool. Weka contains the collection of machine learning algorithms. We can perform classification, clustering, association rules, pre-processing and visualization of the data. In our work we have created a dataset containing 7 attributes in excel file using CSV file format. The process that is carried out in this paper is described below. Data Mining Process: The data sets used in this study is obtained from the database of the studentā€Ÿs from one of the educational institutions. Initially the marks of the students are stored such as their 10th percentage, 12th percentage, semester marks. First of all the marks are collected of different students in table and then the processing is carried on. Using Weka 3.7 we can classify and cluster the data available in our dataset. Weka 3.7 is one of the most efficient comparison tool when itā€Ÿs related to data mining techniques. The results can be tabulated very fast and accurate through this tool. When we perform such tasks
  • 32. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 30 manually without any involvement of tools then it becomes cumbersome to reach to the desired results as well as the tasks becomes time taking. In the first phase, clustering technique → k-means clustering is used through the Weka 3.7. From the given options in the Weka 3.7 tool we choose the simple k-means algorithm and then through parameterise option we allot the number of clusters to be formed. In the second phase, classification technique → decision tree is used through Weka 3.7. It helps in visualizing the tree structure of the input dataset. Then the results of both the algorithms are analyzed and the results are predicted as to which algorithm is more efficient and preferable. Figure 1. Data Collected through Students Database The above shown is the dataset collected from the universityā€Ÿs database. The excel file is saved using csv extension; csv denotes comma separated values which will be used as an input file. Benefit of using this extension is that data is automatically tabulated as the separated values while the processing in the Weka 3.7 tool.
  • 33. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 31 4.1. CLUSTERING A clustering is a method in which clusters or groups are formed. It helps in grouping or collecting the elements of the same kind in one class or group. These elements are of same type and pattern and are different to those that belong to different groupings. This can be said as one of the main tasks of data mining and also a common technique for statistical data analysis. It is used in many different fields such as machine learning, pattern recognition, bioinformatics, image analysis and information retrieval. There are many types of clustering algorithms such as hierarchical clustering, k-means algorithm, Expectation maximization algorithm (EM), Density-Based Spatial Clustering Of Applications With Noise (DBSCAN) , Biclustering algorithm, Fuzzy clustering. K-Means Clustering: The term ā€žk-meansā€Ÿ was first coined by James MacQueen in 1967. It uses an iterative refinement technique. In simple words , it is the algorithm that is used to classify or collect the group of objects that is based or classified according to K number of attributes, here there are 7 attributes according to which clustering is done. This grouping is done by calculating the sum of square of distances between the given data and cluster centroid and the elements having the minimum distance are grouped together. The basic steps of k-means are following: ļ‚§ Find the centroid. ļ‚§ Calculate the distance of each objects to the determined centroid. ļ‚§ Group the objects based on the minimum distance, i.e. the closest centroid. Figure 2. Pre-processing the input .csv file
  • 34. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 32 Firstly, we pre-process the data before being clustered using Weka 3.7 tool. It helps in to transform the unmanaged data to the understandable format. It also helps in preparing data for further processing. The steps that data undergo during pre-processing are: data cleaning, integration, transformation, reduction and discretion. After this we apply K-means Clustering through Weka in which the input is the dataset collected. Figure 3. K-means applied using 3 clusters We parameterise number of clusters equal to 3. And then the results are tabulated. In Weka 3.7 the default clusters are 2 but in this processing 3 clusters are formed that could be related to Grade A, B, C. That is, here we parameterise the number of clusters into which we want our data to be clustered. Figure 4. Clusters 0, 1, 2 are formed after applying algorithm
  • 35. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 33 Therefore we can see that 3 clusters are formed shown within the circle. (0,1,2) [Figure 4]. Cluster 0 contains 24 elements, Cluster 1 contains 26 elements and lastly Cluster 2 contains 9 elements. From the following figure we can see the cluster visualization for our input dataset provided . We can also parametrise the data using x axis and y axis values. Accordingly to which the data can be visualized. Figure 5. Cluster Visualization From the tool we can access that in this the percentage of errors are 17.792%. 4.2. DECISION TREES After clustering all the datasets given, we will perform the decision tree algorithm on the same dataset. In decision trees the data is categorised in the form of the tree where at the end i.e. the leaf nodes, depict the classes which contain the datasets. It is one of the most simple and precise technique so as to mine the data and get the result efficiently. Thus, this study will also help the students in order to improve their performance for the future grades.
  • 36. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 34 Figure 6. Decision Tree Implementation Figure 7. Decision Tree Visualization
  • 37. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 35 As in this case all the datasets were initially classified and then the results are passed through the decision trees algorithm and hence the results are tabulated through visualizing the tree. As in decision tree we can see that an accuracy of 87.751% is achieved 5. RESULTS When we perform clustering after the datasets are clustered accordingly to their relevant classes the numbers of iteration to form 3 clusters were 5. The root mean squared error value is 17.793. As lower the number of mean squared value will be the more efficient the algorithm will be. Figure 8. Results generated after clustering algorithm analysis Thereafter, performing the second technique of data mining i.e. classification through decision trees algorithm. Here we have used J48 algorithm, J48 algorithm is the implementation of ID3 algorithm. It helps in creating univariate decision trees. The results retrieved after the algorithm implementation is shown below,
  • 38. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 36 Figure 9. Results generated after Decision trees algorithm implementation From the above decision tree algorithm results we can see that the root mean squared error in this is equal to 0.216, which is much less than that of clustering algorithm. From the above results we can deduce that decision tree algorithm i.e. classification technique is more preferable over clustering. 6. CONCLUSION In this paper, two algorithms are used so as to predict the performance of both the algorithms. They are applied on the marks of the student retrieved from the database of the university so as to grade the students based on their up to date performances. Here we have used the technique of clustering, decision trees in order to mine the data as the huge amount of data is available in the university containing the students record so it is required to refine the data so that the results could be used for the future evaluation. First of all we evaluated the performance of the clustering algorithm and then secondly we evaluated the performance of decision trees algorithm and then the judgement is made as to which algorithm performance is suitable. And after performing both the techniques it is concluded that decision tree using J48 algorithm is more efficient than clustering k-means technique. The accuracy achieved through decision tree is much more than that achieved through clustering. So it is concluded that classification techniques are preferable than the clustering techniques.
  • 39. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 37 REFERENCES 1. LAKSHMI ,D.BHU., . ARUNDATHI , S. and DR.JAGADEESH, ā€œData Mining: A prediction for Student's Performance Using Decision Tree ID3 Methodā€, July 2014. 2. Ali ,Mohd. Maqsood., ā€œRole Of Data Mining In Education Sectorā€, April 2013. 3. DeLaFayette Winters, Titus.,ā€ Educational Data Mining: Collection and Analysis of Score Matrices for Outcomes-Based Assessmentā€, June 2006. 4. Torre ,Javier., Rodriguez ,Alejandro., Colomo, Ricardo., Jimenez ,Enrique. and Alor, Giner.,ā€ Improving Accuracy of Decision Trees Using Clustering Techniquesā€, February 2013. 5. Ranganathan ,Sindhuja., ā€œImprovements To K-Means Clusteringā€, August 2013. 6. Sembiring ,Sajadin. ,ā€ An Application Of Predicting Student Performance Using Kernel K-Means And Smooth Support Vector Machineā€, August 2012. 7. Singh Bhullar , Manpreet., Member IAENG, ā€œ Use of Data Mining in Education Sectorā€, October 2012. 8. Kumar Baradwaj , Brijesh. , ā€œMining Educational Data to Analyze Students Performanceā€,2011. 9. Romero ,Cristobel. ,, ā€œEducational Data Mining: A Review of the State-of-the- Artā€,Member, IEEE, Sebastian Ventura, Senior Member, IEEE2010. 10. Patel ,Ketul B. , Chauhan , Jignesh A. and Patel, Jigar D. , ā€œWeb Mining in E- Commerce: Pattern Discovery, Issues and Applicationsā€, 2011. 11. Calders ,Toon . and Pechenziky ,Mysoka.,ā€Introduction to Special Section On Educational Data Miningā€, Volume 13 Issue 2.2013. 12. Tair , Mohammad M.Abu . and El-Halees, Alaa M. , ā€œMining Educational Data to Improve Studentsā€Ÿ Performance: A Case Studyā€, International Journal of Information and Communication Technology Research, Volume 2 No. 2, February 2012. 13. Huebner, Richard A., Norwich University, ā€œA survey of educational data mining researchā€, Research in Higher Education Journal. 14. Baker , Ryan SJD. and Yacef, Kalina., ā€œThe State of Educational Data Mining in 2009: A Review and Future Visionsā€, Journal of Educational Data Mining, Article 1, Vol 1, No 1, Fall 2009. This paper may be cited as: Saxena, R., 2015. Educational Data Mining: Performance Evaluation of Decision Tree and Clustering Techniques Using WEKA Platform. International Journal of Computer Science and Business Informatics, Vol. 15, No. 2, pp. 26-37.
  • 40. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 38 Hamiltonian cycle in graphs šˆ šŸ’ ≄ šŸš’ Nguyen Huu Xuan Truong Department of Economic Information System, Academy of Finance, Vietnam Vu Dinh Hoa Department of Information Technology, HaNoi National University of Education, Vietnam ABSTRACT Given a simple undirected graph šŗ with š‘› vertices, we denote by šœŽš‘˜ the minimum value of the degree sum of any š‘˜ pairwise nonadjacent vertices. The graph šŗ is said to be hamiltonian if it contains a hamiltonian cycle (a cycle passing all vertices of šŗ). The problem š»š¶ (Hamiltonian Cycle) is well-known a š‘š‘ƒš¶-problem. A lot of authors have been studied Hamiltonian Cycles in graphs with large degree sums šœŽš‘˜ , but only for š‘˜ = 1, 2, 3. In this paper, we study the structure of nonhamiltonian graphs satisfying šœŽ4 ≄ 2š‘›, and we prove that the problem š»š¶ for the graphs satisfying šœŽ4 ≄ 2š‘›š‘” is š‘š‘ƒš¶ for š‘” < 1 and is š‘ƒ for š‘” ≄ 1. Keywords hamiltonian cycle, š‘š‘ƒš¶, šœŽ4. 1. INTRODUCTION In this paper, we use definitions and notations in [4] with exception for š¾š‘› the complete graph on š‘› vertices. We consider only simple undirected graphs. Given a graph šŗ = (š‘‰, šø) on š‘› vertices with the vertex set š‘‰ and the edge set šø. A set š“ āŠ† š‘‰(šŗ) is independent if no two of its elements are adjacent. The independent number of šŗ, denoted by š›¼(šŗ), is defined by setting š›¼ šŗ = š‘šš‘Žš‘„ā”{ š¼ : š¼ āŠ† š‘‰(šŗ) is independent}. We use šœ”(šŗ) to denote the number of connected components of šŗ. The graph šŗ is tough (or 1- tough) if šœ”(šŗ āˆ’ š‘†) ≤ š‘† for every nonempty subset š‘† āŠ‚ š‘‰(šŗ). For two disjoint graphs šŗ1 and šŗ2, we denote by šŗ1 āˆ— šŗ2 the graph with the vertex set š‘‰(šŗ1) ∪ š‘‰(šŗ2) and the edge set šø(šŗ1) ∪ šø(šŗ2) ∪ {š‘„š‘¦ | š‘„ ∈ š‘‰ šŗ1 , š‘¦ ∈ š‘‰ šŗ2 }. For example, š¾2 āˆ— š¾3 = š¾5. For a positive integer š‘˜ ≤ š›¼, we define šœŽš‘˜ šŗ = š‘šš‘–š‘›ā”{ š‘‘ š‘„š‘– š‘˜ š‘–=1 : š‘„1, š‘„2, … , š‘„ š‘˜ is independent}. In the case š‘˜ > š›¼, set šœŽš‘˜(šŗ) = š‘˜(š‘› āˆ’ š›¼). Instead of šœŽš‘˜(šŗ), sometimes we simply write šœŽš‘˜. If šŗ contains a hamiltonian cycle (a cycle passing all vertices of šŗ), then šŗ is called hamiltonian; otherwise, šŗ is nonhamiltonian. A graph šŗ with a
  • 41. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 39 hamiltonian path (a path passing all vertices of šŗ) is said to be traceable. Let š¶š‘˜ be the cycle of length š‘˜. The graph šŗ is said to be š‘˜-connected if šŗ āˆ’ š‘‹ is connected for any š‘‹ āŠ† š‘‰ with š‘‹ < š‘˜ < š‘›. Note that a tough graph is 2-connected, and toughness is a necessary condition for the existence of a hamiltonian cycle in a graph [6]. There is a polynomial algorithm š‘‚ š‘›3 time to recognize 2-connected graph. The problem š»š‘ƒ, š»š¶ are well-known š‘š‘ƒš¶-problem [1] [10]. š‘Æš‘· (HAMILTONIAN PATH) Instance: Graph šŗ. Question: Is šŗ traceable? š‘Æš‘Ŗ (HAMILTONIAN CYCLE) Instance: Graph šŗ. Question: Is šŗ hamiltonian? A lot of authors have been studied Hamiltonian Cycles in graphs with large degree sums šœŽš‘˜, but only for š‘˜ = 1, 2, 3, (see [3] [5] [9], etc). For a positive integer š‘˜, we state the problem š»š¶š‘˜ as follow: š‘Æš‘Ŗš’Œ Instance: Given a real š‘” > 0 and a graph šŗ satisfying šœŽš‘˜ ≄ š‘˜š‘› 2 š‘”. Question: Is šŗ hamiltonian? In [7], [8], we prove that: Theorem 1.1 [7]. š»š¶2(š‘” < 1) is š‘š‘ƒš¶ and š»š¶2(š‘” ≄ 1) is š‘ƒ. Theorem 1.2 [8]. š»š¶3(š‘” < 1) is š‘š‘ƒš¶ and š»š¶3(š‘” ≄ 1) is š‘ƒ. In this paper, we study the class of graphs satisfying šœŽ4 ≄ 2š‘› for the problem š»š¶4. 2. RESULTS The following Theorem will be proved in Section 5. Theorem 2.1. Let šŗ be 2-connected graph with šœŽ4 ≄ 2š‘›. If šŗ is nonhamiltonian then š›¼ šŗ = 3 and šŗ belongs to one of the following three classes of graphs: 1. Class ℱ1 of 2-connected graphs šŗ with š›¼ šŗ = 3 such that there exists a subset š‘† āŠ† š‘‰ šŗ , š‘† = 2 so that šŗ āˆ’ š‘† = š¾š‘›1 ∪ š¾š‘›2 ∪ š¾š‘›3 .
  • 42. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 40 Figure 1. Class š“• šŸ. 2. Class ℱ2 of 2-connected graphs šŗ with š›¼ šŗ = 3 such that there exists three disjoint complete graphs š¾š‘›1 , š¾š‘›2 , š¾š‘›3 āŠ† šŗ and a vertex š‘„ ∈ š‘‰(šŗ) and š‘¦1 ∈ š¾š‘›1 , š‘¦2 ∈ š¾š‘›2 , š‘¦3 ∈ š¾š‘›3 so that šŗ āˆ’ š‘„ = (š¾š‘›1 ∪ š¾š‘›2 ∪ š¾š‘›3 ) + š‘¦1 š‘¦2, š‘¦2 š‘¦3, š‘¦3 š‘¦1 . Moreover, there exists three vertices š‘§1 ∈ š¾š‘›1 āˆ’ š‘¦1 , š‘§2 ∈ š¾š‘›2 āˆ’ š‘¦2 , š‘§3 ∈ š¾š‘›3 āˆ’ š‘¦3 such that š‘§1, š‘§2, š‘§3 ∈ š‘(š‘„) and š‘„ can possibly be adjacent to the another vertices. Figure 2. Class š“• šŸ. 3. Class ℱ3 of 2-connected graphs šŗ with š›¼ šŗ = 3 such that there exists three disjoint complete graphs š¾š‘›1 , š¾š‘›2 , š¾š‘›3 āŠ† šŗ ( š¾š‘›1 , š¾š‘›2 , š¾š‘›3 ≄ 3) and distinct vertices š‘¦š‘–, š‘§š‘– ∈ š¾š‘› š‘– for š‘– = 1, 2, 3 so that šŗ = š¾š‘›1 ∪ š¾š‘›2 ∪ š¾š‘›3 + š‘¦1 š‘¦2, š‘¦2 š‘¦3, š‘¦3 š‘¦1 + š‘§1 š‘§2, š‘§2 š‘§3, š‘§3 š‘§1 . Figure 3. Class š“• šŸ‘.
  • 43. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 41 Note that the graph šŗš‘› = š¾1 āˆ— š¾1 āˆ— (š¾3 āˆ— š¾š‘›āˆ’5) with š‘› ≄ 11 satisfies šœŽ4 ≄ 2š‘› and is not 2-connected. In Section 3, we give polynomial algorithms to recognize whether a given graph belongs to ℱ1 ∪ ℱ2 ∪ ℱ3. From Theorem 2.1, we conclude the following corollary. Corollary 2.1. Every 2-connected graph with š›¼ ≄ 4 and šœŽ4 ≄ 2š‘› is hamiltonian. For š‘” < 1, we prove the following Theorem: Theorem 2.2. š»š¶4 (š‘” < 1) is š‘š‘ƒš¶. Proof. The š»š¶4 is a subproblem of š»š¶, so it belongs to š‘š‘ƒ. In order to prove š»š¶4 (š‘” < 1) is š‘š‘ƒš¶, we will construct a polynomial transformation from the problem š»š‘ƒ to it. For any graph šŗ1 with š‘›1 vertices, we choose a positive integer š‘š ≄ š‘šš‘Žš‘„ š‘” š‘›1āˆ’1 2(1āˆ’š‘”) , 5 . Then we construct a graph šŗ2 from šŗ1 by adding new vertex set š‘1, š‘2, … , š‘ š‘š ∪ š‘ž1, š‘ž2, … , š‘ž š‘šāˆ’1 and the edges joining each vertex of š‘1, š‘2, … , š‘ š‘š to all other vertices. In this way, we obtain the graph šŗ2 = šŗ1 ∪ š¾ š‘šāˆ’1 āˆ— š¾ š‘š . This construction can be proceeded with the Turing machine in polynomial time. We observe that the graph šŗ2 has š‘›2 = š‘›1 + 2š‘š āˆ’ 1 vertices and šœŽ4 šŗ2 = 4š‘š. Because of š‘š ≄ š‘” š‘›1āˆ’1 2(1āˆ’š‘”) , so 2š‘š ≄ š‘”(š‘›1 + 2š‘š āˆ’ 1), it implies that šœŽ4 šŗ2 ≄ 2š‘›2 š‘”. Now we prove that šŗ2 has a hamiltonian cycle if and only if šŗ1 has a hamiltonian path. Indeed, if šŗ1 has a hamiltonian path š» then š¶ = (š», š‘1, š‘ž1, š‘2, š‘ž2, … , š‘ š‘šāˆ’1, š‘ž š‘šāˆ’1, š‘ š‘š ) is a hamiltonian cycle in šŗ2. If šŗ2 has a hamiltonian cycle š¶. Observe that š‘žš‘– (š‘– = 1. . š‘š āˆ’ 1) has only neighbor š‘š‘— (š‘— = 1. . š‘š), so all vertices in š‘ž1, š‘ž2, … , š‘ž š‘šāˆ’1 are only adjacent to all the vertices in š‘1, š‘2, … , š‘ š‘š . Then, if we remove all vertices in š‘1, š‘2, … , š‘ š‘š then we obtain š‘š connected components, which are š‘ž1 , š‘ž2 , … , . š‘ž š‘šāˆ’1 and šŗ1, each of the connected components has a hamiltonian path (the rest of š¶ after removing š‘1, š‘2, … , š‘ š‘š ). Therefore, šŗ1 has a hamiltonian path. Thus, we have a polynomial transformation from š»š‘ƒ to š»š¶4(š‘” < 1). Since š»š¶4(š‘” < 1) ∈ š‘š‘ƒ and š»š‘ƒ ∈ š‘š‘ƒš¶, it implies that š»š¶4 (š‘” < 1) ∈ š‘š‘ƒš¶. Theorem 2.3. š»š¶4 (š‘” ≄ 1) is š‘ƒ. Proof. Assume that šŗ satisfies šœŽ4 ≄ 2š‘›š‘” with š‘” ≄ 1. First, we check whether šŗ is 2-connected or not (it can be done in polynomial time).
  • 44. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 42 If šŗ is not 2-connected then šŗ is nonhamiltonian. If šŗ is 2-connected, then by Theorem 2.1, either šŗ is hamiltonian or šŗ belongs to ℱ1 ∪ ℱ2 ∪ ℱ3 which can be recognize in polynomial time (see Section 3). Thus, š»š¶4 (š‘” ≄ 1) is š‘ƒ. 3. POLYNOMIAL ALGORITHMS RECOGNIZING THE CLASSES š“• šŸ, š“• šŸ, š“• šŸ‘ Assume that š‘† āŠ† š‘‰(šŗ) and š»1, š»2, … . , š»š‘˜ are connected components of šŗ āˆ’ š‘†. Note that the problem ā€œGiven a vertex set š‘† in a graph šŗ, determine šœ” šŗ āˆ’ š‘† and whether every connected component of šŗ āˆ’ š‘† is completeā€ can be solved in polynomial time by an algorithm š‘‚(š‘›2 ). Following, we design the polynomial algorithms recognizing the classes ℱ1, ℱ2, ℱ3. 3.1. Algorithm recognizing the class š“• šŸ Every graph šŗ in class ℱ1 is not 1-tough. If we remove š‘†, then we get three connected components which are complete. Input: graph šŗ with šœŽ4 ≄ 2š‘›. Output: Is_Graph_ℱ1 return True if šŗ ∈ ℱ1, else return False. Algorithm: Function Boolean Is_Graph_š“• šŸ Begin If šŗ is not 2-connected Then Return False; For each š‘† in š‘‰(šŗ)2 do If (šœ” šŗ āˆ’ š‘† = 3) and (the connected components š»1, š»2, š»3 are complete) Then Return True; Return False; End; Checking šŗ is not 2-connected can be done by š‘‚(š‘›2 ) time. Next, there are š¶š‘› 2 iterations, each iteration requires š‘‚(š‘›2 ) time. Thus the overall time required by algorithm Is_Graph_ℱ1 is š‘‚(š‘›4 ). 3.2. Algorithm recognizing the class š“• šŸ For each graph šŗ in class ℱ2, if we remove š‘† = {š‘„, š‘¦1, š‘¦2, š‘¦3}, then we get three connected components š»1, š»2, š»3 which are complete. Input: graph šŗ with šœŽ4 ≄ 2š‘›. Output: Is_Graph_ℱ2 return True if šŗ ∈ ℱ2, else return False. Algorithm: Function Boolean Is_Graph_š“• šŸ; Begin
  • 45. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 43 For each š‘† in š‘‰(šŗ)4 do If (šœ” šŗ āˆ’ š‘† = 3) and (the connected components š»1, š»2, š»3 are complete) Then If there exists š‘„ ∈ š‘† and š‘† āˆ’ š‘„ = {š‘¦1, š‘¦2, š‘¦3} such that: ( š‘ š»1 (š‘„) , š‘ š»2 (š‘„) , š‘ š»3 (š‘„) ≄ 1) and ( š‘¦1 š‘¦2, š‘¦2 š‘¦3, š‘¦3 š‘¦1 āŠ† šø(šŗ)) and (š»1 + š‘¦1 , š»2 + š‘¦2 , š»3 + š‘¦3 are complete) Then Return True; Return False; End; There are š¶š‘› 4 iterations, each iteration requires š‘‚(š‘›2 ) time, so the overall time required by algorithm Is_Graph_ℱ2 is š‘‚(š‘›6 ). 3.3. Algorithm recognizing the class š“• šŸ‘ For each graph šŗ in class ℱ3, if we remove š‘† = {š‘¦1, š‘¦2, š‘¦3, š‘§1, š‘§2, š‘§3}, then we get three connected components š»1, š»2, š»3 which are complete. Input: graph šŗ with šœŽ4 ≄ 2š‘›. Output: Is_Graph_ℱ3 return True if šŗ ∈ ℱ3, else return False. Algorithm: Function Boolean Is_Graph_š“• šŸ‘ Begin For each š‘† in š‘‰(šŗ)6 do If (šœ” šŗ āˆ’ š‘† = 3) and (the connected components š»1, š»2, š»3 are complete graphs) Then If there exists š‘¦1, š‘¦2, š‘¦3 ∈ š‘† and š‘† āˆ’ š‘¦1, š‘¦2, š‘¦3 = {š‘§1, š‘§2, š‘§3} such that: ( š‘¦1 š‘¦2, š‘¦2 š‘¦3, š‘¦3 š‘¦1, š‘§1 š‘§2, š‘§2 š‘§3, š‘§3 š‘§1 āŠ† šø(šŗ)) and (š»1 + š‘¦1, š‘§1 , š»2 + š‘¦2, š‘§2 , š»3 + š‘¦3, š‘§3 are complete) Then Return True; Return False; End; There are š¶š‘› 6 iterations, each iteration requires š‘‚(š‘›2 ) time, so the overall time required by algorithm Is_Graph_ℱ3 is š‘‚(š‘›8 ).
  • 46. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 44 4. PRELIMINARIES For what follows we assume that š¶ is a longest cycle of šŗ. On š¶ (š¶ with a given orientation), we denote the predecessor and successor (along š¶ ) by š‘„āˆ’ , š‘„+ , and š‘„++ = (š‘„+ )+ , š‘„āˆ’āˆ’ = (š‘„āˆ’ )āˆ’ . In general, for a positive integer š‘–, š‘„+š‘– = (š‘„+ š‘–āˆ’1 )+ and š‘„āˆ’š‘– = (š‘„āˆ’ š‘–āˆ’1 )āˆ’ . Moreover, for a vertex set š“ āŠ† š‘‰(š¶), we wirte š“+ = š‘„+ : š‘„ ∈ š“ and š“āˆ’ = š‘„āˆ’ : š‘„ ∈ š“ . The path joining two vertices š‘„ and š‘¦ of š¶, along š¶ , is denoted by š‘„š¶ š‘¦, and the same path in reverse order are given by š‘¦š¶ š‘„. In this paper, we consider the paths and cycles as vertex sets. If š‘„, š‘¦ are the end vertices of a path š‘ƒ, sometimes we write š‘„š‘ƒš‘¦ instead of š‘ƒ. Assume that š» is a connected component of šŗ āˆ’ š¶ and š‘š¶(š») is the set of neighbors in š¶ of all vertices in š». A edge sequence is a path joining two vertices on š¶ and its inner vertices belong to šŗ āˆ’ š¶ āˆ’ š». In particular, an edge joining 2 non-consecutive vertices on š¶ is also a edge sequence. Lemma 4.1. Let šŗ be a 2-connected graph. If šŗ is nonhamiltonian and š» is a connected component of šŗ āˆ’ š¶ then (a) š‘š¶ š» ∩ š‘š¶ š» + = š‘š¶ š» ∩ š‘š¶ š» āˆ’ = āˆ…. (b) There is no edge sequence joining 2 vertices of š‘š¶(š»)+ . Similarly, there is no edge sequence joining 2 vertices of š‘š¶(š»)āˆ’ . (c) If š‘£š‘–, š‘£š‘— ∈ š‘š¶(š») for š‘– ≠ š‘— then there is no vertex š‘§ ∈ š‘£š‘– + š¶ š‘£š‘— such that {š‘£š‘– + š‘§+ , š‘£š‘— + š‘§} āŠ† šø(šŗ). Similarly, there is no vertex š‘§ ∈ š‘£š‘— + š¶ š‘£š‘– such that {š‘£š‘— + š‘§+ , š‘£š‘– + š‘§} āŠ† šø(šŗ). (d) For any š‘„ ∈ š» and for any š‘£š‘– ∈ š‘š¶(š»), š‘‘ š‘„ + š‘‘ š‘£š‘– + ≤ š‘› āˆ’ 1. Proof. (a), (b), (c) are presented in [2], so we will prove (d). For any š‘„ ∈ š», š‘‘ š‘„ = š‘ š»(š‘„) + š‘š¶(š‘„) ≤ š» āˆ’ 1 + š‘š¶(š») . By (a) and (b), š‘‘ š‘£š‘– + ≤ šŗ āˆ’ š» āˆ’ š‘š¶ š» + = šŗ āˆ’ š» āˆ’ š‘š¶(š») , so š‘‘ š‘„ + š‘‘ š‘£š‘– + ≤ š» āˆ’ 1 + š‘š¶ š» + šŗ āˆ’ š» āˆ’ š‘š¶ š» = šŗ āˆ’ 1 = š‘› āˆ’ 1. Lemma 4.2 [2]. Assume that š‘¢, š‘£ are nonadjacent vertices and š‘‘ š‘¢ + š‘‘(š‘£) ≄ š‘›. Then šŗ is hamiltonian if and only if šŗ + š‘¢š‘£ is hamiltonian. We conclude the following Lemma from Lemma 4.2. Lemma 4.3. Assume that šŗāˆ— āŠ‡ šŗ such that š‘‰ šŗāˆ— = š‘‰(šŗ) and š‘‘ šŗ š‘¢ + š‘‘ šŗ(š‘£) ≄ š‘› for any edge š‘¢š‘£ ∈ šø šŗāˆ— āˆ’ šø(šŗ). Then šŗ is hamiltonian if and only if šŗāˆ— is hamiltonian.
  • 47. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 45 5. PROOFS OF THEOREM 2.1 For what follows, we assume that šŗ is nonhamiltonian. Because šŗ is 2- connected, so šŗ is cycleable. Let š»1, š»2, … , š» š‘š be the connected components of šŗ āˆ’ š¶. Clearly, š‘š¶(š»š‘–) ≄ 2 for any š‘– = 1. . š‘š. Proposition 5.1. š»1, š»2, … , š» š‘š are complete graphs. Proof. We consider a connected component š»š‘” (š‘” = 1. . š‘š). Because šŗ is 2- connected, so š‘š¶(š»š‘”) ≄ 2 and there are at least two vertices š‘£š‘–, š‘£š‘— ∈ š‘š¶(š»š‘”). If š»š‘” is not complete then there are two distinct vertices š‘„, š‘¦ ∈ š»š‘” such that š‘„š‘¦ āˆ‰ šø(šŗ). By Lemma 4.1 (a, b), š‘„, š‘¦, š‘£š‘– + , š‘£š‘— + is an independent vertex set, therefore by šœŽ4 ≄ 2š‘›, š‘‘ š‘„ + š‘‘ š‘¦ + š‘‘ š‘£š‘– + + š‘‘(š‘£š‘— + ) ≄ 2š‘›. However, by Lemma 4.1 (d), š‘‘ š‘„ + š‘‘ š‘£š‘– + ≤ š‘› āˆ’ 1 and š‘‘ š‘¦ + š‘‘(š‘£š‘— + ) ≤ š‘› āˆ’ 1, it implies that š‘‘ š‘„ + š‘‘ š‘¦ + š‘‘ š‘£š‘– + + š‘‘(š‘£š‘— + ) ≤ 2š‘› āˆ’ 2, a contradiction. Thus, š»š‘” is complete, and we have š»1, š»2, … , š» š‘š are complete graphs. Proposition 5.2. š‘š¶(š»š‘”) ≤ š¶ 2 for every š‘” = 1. . š‘š. Proof. By Lemma 4.1 (a), š‘š¶ š»š‘” ∩ š‘š¶ š»š‘” + = āˆ…, therefore š¶ ≄ š‘š¶ š»š‘” ∪ š‘š¶ š»š‘” + = 2 š‘š¶ š»š‘” , it implies that š‘š¶(š»š‘”) ≤ š¶ 2 . Proposition 5.3. š‘š = 1. Proof. We consider the case of š‘š as follow: a) š‘š ≄ 4. Let š‘„š‘– ∈ š»š‘– for each š‘– = 1. .4. Clearly, the vertex set š‘„1, š‘„2, š‘„3, š‘„4 is independent, by šœŽ4 ≄ 2š‘› we have š‘‘ š‘„1 + š‘‘ š‘„2 + š‘‘ š‘„3 + š‘‘(š‘„4) ≄ 2š‘›. Moreover, by Proposition 5.2 and š‘š ≄ 4, š‘‘ š‘„š‘– ≤ š»š‘– āˆ’ 1 + š‘š¶ š»š‘– ≤ š»š‘– āˆ’ 1 + š¶ 2 , so š‘‘ š‘„1 + š‘‘ š‘„2 + š‘‘ š‘„3 + š‘‘ š‘„4 ≤ š»1 + š»2 + š»3 + š»4 + 2 š¶ āˆ’ 4 ≤ š‘› + š¶ āˆ’ 4, therefore š‘› + š¶ āˆ’ 4 ≄ 2š‘›, it implies that š¶ ≄ š‘› + 4, a contradiction. Thus, the case š‘š ≄ 4 does not happen. b) š‘š = 3. Let š‘„ ∈ š»1, š‘¦ ∈ š»2, š‘§ ∈ š»3 and we consider each vertex š‘£š‘– ∈ š‘š¶(š»1). Claim 5.1. š‘£š‘– + ∈ š‘(š‘¦) ∪ š‘(š‘§). Proof. Assume to the contrary that š‘£š‘– + āˆ‰ š‘(š‘¦) ∪ š‘(š‘§), then the vertex set š‘„, š‘¦, š‘§, š‘£š‘– + is independent, by šœŽ4 ≄ 2š‘› we have š‘‘ š‘„ + š‘‘ š‘¦ + š‘‘ š‘§ + š‘‘(š‘£š‘– + ) ≄ 2š‘›. By Lemma 4.1 (d), š‘‘ š‘„ + š‘‘ š‘£š‘– + ≤ š‘› āˆ’ 1.
  • 48. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 46 Moreover, by Proposition 5.2 we have š‘‘(š‘¦) ≤ š»2 āˆ’ 1 + š¶ 2 and š‘‘(š‘§) ≤ š»3 āˆ’ 1 + š¶ 2 . Therefore, š‘‘ š‘„ + š‘‘ š‘¦ + š‘‘ š‘§ + š‘‘ š‘£š‘– + ≤ š‘› āˆ’ 3 + š»2 + š»3 + š¶ < 2š‘› āˆ’ 3, a contradiction. Claim 5.2. š‘š¶(š»1) = š‘š¶(š»2) = š‘š¶(š»3) = 2. Proof. If š‘š¶(š»1) ≄ 3 then by Claim 5.1, there are at least two vertices š‘£š‘–, š‘£š‘— ∈ š‘š¶(š»1) such that š‘£š‘– + , š‘£š‘— + ∈ š‘(š‘¦) or š‘£š‘– + , š‘£š‘— + ∈ š‘(š‘§), therefore there exists an edge sequence joining š‘£š‘– + , š‘£š‘— + , which contradicts to Lemma 4.1 (b). Thus, š‘š¶(š»1) = 2. Similarly, we have š‘š¶(š»2) = š‘š¶(š»3) = 2. Claim 5.3. 5 ≤ š¶ ≤ 6. Proof. If there exists š‘£ ∈ š¶ such that š‘£ āˆ‰ š‘š¶(š»1) ∪ š‘š¶(š»2) ∪ š‘š¶(š»3), then the vertex set š‘„, š‘¦, š‘§, š‘£ is independent, by šœŽ4 ≄ 2š‘› we have š‘‘ š‘„ + š‘‘ š‘¦ + š‘‘ š‘§ + š‘‘(š‘£) ≄ 2š‘›. However, š‘‘ š‘„ ≤ š»1 āˆ’ 1 + š‘š¶ š»1 = š»1 + 1, š‘‘ š‘¦ ≤ š»2 + 1, š‘‘ š‘§ ≤ š»3 + 1, š‘‘ š‘£ ≤ š¶ āˆ’ 1, so š‘‘ š‘„ + š‘‘ š‘¦ + š‘‘ š‘§ + š‘‘ š‘£ ≤ š»1 + š»2 + š»3 + š¶ + 2 = š‘› + 2. It implies that š‘› + 2 ≄ 2š‘› and š‘› ≤ 2, a contradiction. Therefore, š‘š¶ š»1 ∪ š‘š¶ š»2 ∪ š‘š¶ š»3 = š¶ , and by Claim 5.2, š¶ ≤ 6. Moreover, by Lemma 4.1 (a), š¶ ≄ 4. If š¶ = 4 then by Lemma 4.1 (a) and Claim 5.1, there exists an edge sequence joining two vertices in š‘š¶ š»1 + , which contradicts Lemma 4.1 (b). Thus, we have 5 ≤ š¶ ≤ 6. If š¶ = 5, so š¶ = (š‘£1, š‘£2, š‘£3, š‘£4, š‘£5). Without loss of generality, by Lemma 4.1 (a, b) and Claim 5.1, we assume that š‘£1, š‘£3 ∈ š‘š¶(š»1), š‘£2 ∈ š‘š¶(š»2), š‘£4 ∈ š‘š¶(š»3). Then, š‘£5 ∈ š‘š¶(š»2) and š‘š¶ š»2 + = š‘£1, š‘£3 . It implies that there exists an edge sequence joining two vertices in š‘š¶ š»2 + , which contradicts Lemma 4.1 (b). Therefore, by Claim 5.3, š¶ = 6, so š¶ = (š‘£1, š‘£2, š‘£3, š‘£4, š‘£5, š‘£6) and by Claim 5.2, š‘š¶ š»1 ∩ š‘š¶ š»2 = š‘š¶ š»2 ∩ š‘š¶ š»3 = š‘š¶ š»1 ∩ š‘š¶ š»3 = āˆ…. Without loss of generality, by Lemma 4.1 (a, b) and Claim 5.1, there are two possible case as follow: (1) Case š‘£1, š‘£3 ∈ š‘š¶(š»1), š‘£2 ∈ š‘š¶(š»2), š‘£4 ∈ š‘š¶(š»3). Observe that š‘£6 ∈ š‘š¶(š»3) and š‘£5 ∈ š‘š¶(š»2). Let š‘Š1, š‘Š2, š‘Š3 be the paths in š»1, š»2, š»3 joining the pair of vertices š‘£1, š‘£3 , š‘£2, š‘£5 , š‘£4, š‘£6 respectively. Then, we have š¶ā€² = (š‘£1 š‘Š1 š‘£3 š‘£2 š‘Š2 š‘£5 š‘£4 š‘Š3 š‘£6 š‘£1) is longer than š¶, which contradicts the fact that š¶ is a longest cycle of šŗ. (2) Case š‘£1, š‘£4 ∈ š‘š¶(š»1), š‘£2 ∈ š‘š¶(š»2), š‘£5 ∈ š‘š¶(š»3). Observe that š‘£6 ∈ š‘š¶(š»2) and š‘£3 ∈ š‘š¶(š»3). Let š‘Š1, š‘Š2, š‘Š3 be the paths in š»1, š»2, š»3 joining the pair of vertices š‘£1, š‘£4 , š‘£2, š‘£6 , š‘£3, š‘£5 respectively. The, we have š¶ā€² = (š‘£1 š‘Š1 š‘£4, š‘£3 š‘Š3 š‘£5, š‘£6 š‘Š2 š‘£2, š‘£1) is longer than š¶, a contradiction. Thus, the case š‘š = 3 does not happen.
  • 49. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 47 c) š‘š = 2. Without loss of generality, assume that š»1 + š‘š¶(š»1) ≄ š»2 + š‘š¶(š»2) . Claim 5.4. š‘š¶(š»1) = 2. Proof. By š‘š¶(š»1) ≄ 2, assume to contrary that š‘š¶(š»1) ≄ 3. Let š‘„ ∈ š»1, š‘¦ ∈ š»2. By Lemma 4.1 (b) there exists two vertices š‘£š‘– + , š‘£š‘— + ∈ š‘š¶ š»1 + āˆ’ š‘š¶(š»2). By Lemma 4.1 (a, b), the vertex set š‘„, š‘¦, š‘£š‘– + , š‘£š‘— + is independent, so š‘‘ š‘„ + š‘‘ š‘¦ + š‘‘ š‘£š‘– + + š‘‘(š‘£š‘— + ) ≄ 2š‘›. By Lemma 4.1 (d), š‘‘ š‘„ + š‘‘ š‘£š‘– + ≤ š‘› āˆ’ 1. Moreover, š‘‘ š‘¦ ≤ š»2 āˆ’ 1 + š‘š¶ š»2 ≤ š»1 āˆ’ 1 + š‘š¶(š»1) , š‘‘(š‘£š‘— + ) ≤ š‘› āˆ’ š»1 āˆ’ š‘š¶(š»1) . Therefore š‘‘ š‘„ + š‘‘ š‘¦ + š‘‘ š‘£š‘– + + š‘‘(š‘£š‘— + ) ≤ 2š‘› āˆ’ 2, a contradiction. Thus, š‘š¶(š»1) = 2. Claim 5.5. š‘š¶(š»2) = 2. Proof. Assume to contrary that š‘š¶(š»2) ≄ 3. Arguing similarly the proof of Claim 5.4, there exists two vertices š‘£š‘– + , š‘£š‘— + ∈ š‘š¶ š»2 + āˆ’ š‘š¶(š»1). Let š‘„ ∈ š»1, š‘¦ ∈ š»2. By Lemma 4.1 (a, b), the vertex set š‘„, š‘¦, š‘£š‘– + , š‘£š‘— + is independent, so š‘‘ š‘„ + š‘‘ š‘¦ + š‘‘ š‘£š‘– + + š‘‘(š‘£š‘— + ) ≄ 2š‘›. By Lemma 4.1 (b) and by š‘£š‘– + āˆ‰ š‘(š»1) ∪ š‘(š»2), š‘‘ š‘£š‘– + ≤ š¶ āˆ’ š‘š¶(š»2) . Moreover, š‘‘ š‘„ ≤ š»1 āˆ’ 1 + š‘š¶ š»1 = š»1 + 1, š‘‘ š‘¦ ≤ š»2 āˆ’ 1 + š‘š¶ š»2 , š‘‘(š‘£š‘— + ) ≤ š¶ āˆ’ š‘š¶ š»2 ≤ š¶ āˆ’ 2 ≤ š‘› āˆ’ 4. Therefore, š‘‘ š‘„ + š‘‘ š‘¦ + š‘‘ š‘£š‘– + + š‘‘(š‘£š‘— + ) ≤ š»1 + š»2 + š¶ + š‘› āˆ’ 4 = 2š‘› āˆ’ 4, a contradiction. Thus, š‘š¶(š»2) = 2. By arguing similarly above, observe that š‘š¶(š»1)+ ∩ š‘š¶(š»2) = 1 = š‘š¶(š»2)+ ∩ š‘š¶(š»1) . Without loss of generality, we assume that š‘š¶ š»2 = š‘£š‘–, š‘£š‘– +2 , š‘š¶ š»1 = š‘£š‘— , š‘£š‘– + with š‘£š‘— ≠ š‘£š‘– +3 and š‘£š‘— + ≠ š‘£š‘–. Because šŗ is 2- connected and š¶ is a longest cycle of šŗ, so š»2 = 1, i.e š»2 = š‘¦ . Let š‘„ ∈ š»1 and š‘Š1 be the path in š»1 joining š‘£š‘– + to š‘£š‘— . Figure 4. Illustrating the proofs of part c), Proposition 5.3.
  • 50. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 48 If š‘£š‘– +3 š‘£š‘— + ∈ šø(šŗ) then š¶ā€² = (š‘£š‘– š‘¦š‘£š‘– +2 š‘£š‘– + š‘Š1 š‘£š‘— š¶ š‘£š‘– +3 š‘£š‘— + š¶ š‘£š‘–) is longer than š¶, a contradiction. Therefore, š‘£š‘– +3 š‘£š‘— + āˆ‰ šø(šŗ) and the vertex set š‘„, š‘¦, š‘£š‘– +3 , š‘£š‘— + is independent, so š‘‘ š‘„ + š‘‘ š‘¦ + š‘‘(š‘£š‘– +3 ) + š‘‘(š‘£š‘— + ) ≄ 2š‘›. However, by Lemma 4.1 (d), š‘‘ š‘¦ + š‘‘(š‘£š‘– +3 ) ≤ š‘› āˆ’ 1 and š‘„ + š‘‘(š‘£š‘— + ) ≤ š‘› āˆ’ 1, it implies that š‘‘ š‘„ + š‘‘ š‘¦ + š‘‘(š‘£š‘– +3 ) + š‘‘(š‘£š‘— + ) ≤ 2š‘› āˆ’ 2, a contradiction. Thus, the case š‘š = 2 does not happen. By these case a), b), c) do not happen, we finish the proof that š‘š = 1. Then šŗ āˆ’ š¶ has only one connected component. For what follows, let š» be the connected component of šŗ āˆ’ š¶. The fact that š» = šŗ āˆ’ š¶. By Proposition 5.1, š» is complete. Proposition 5.4. š‘š¶(š») = 2. Proof. Clearly, š‘š¶(š») ≄ 2 by šŗ is 2-connected. Assume that š‘š¶(š») ≄ 3. For any two vertices š‘£š‘–, š‘£š‘— ∈ š‘š¶ š» , let š‘£ š‘˜ ∈ š‘š¶ š» āˆ’ š‘£š‘–, š‘£š‘— and š‘„ ∈ š», then by Lemma 4.1 (b) the vertex set š‘„, š‘£š‘– + , š‘£š‘— + , š‘£ š‘˜ + is independent. So š‘‘ š‘„ + š‘‘ š‘£š‘– + + š‘‘(š‘£š‘— + ) + š‘‘(š‘£ š‘˜ + ) ≄ 2š‘›. However, by Lemma 4.1 (d), š‘„ + š‘‘ š‘£ š‘˜ + ≤ š‘› āˆ’ 1, it implies that š‘‘ š‘£š‘– + + š‘‘(š‘£š‘— + ) ≄ š‘› + 1. By šŗ is 2-connected and š» is complete, there exists two vertices š‘£š‘–0 , š‘£š‘—0 ∈ š‘š¶(š») and a hamiltonian path š‘Š in š» joining š‘£š‘–0 to š‘£š‘—0 . Then š¶ā€² = (š‘£š‘–0 š‘Šš‘£š‘—0 š¶ š‘£š‘–0 + š‘£š‘—0 + š¶ š‘£š‘–0 ) is a hamiltonian cycle of graph šŗā€² = šŗ + š‘£š‘–0 + š‘£š‘—0 + , i.e. šŗā€² is hamiltonian. By Lemma 4.2, šŗ is hamiltonian if and only if šŗā€² is hamiltonian, therefore šŗ is hamiltonian, which contradicts to the assumption that šŗ is nonhamiltonian. Thus, š‘š¶(š») = 2. For what follows, let š‘£š‘–, š‘£š‘— be two vertices of š‘š¶(š») and let š‘Š be the hamiltonian path of š» joining š‘£š‘–, š‘£š‘— . Proposition 5.5. š‘ š‘£š‘– + ∪ š‘(š‘£š‘— + ) = š¶ āˆ’ š‘£š‘– + , š‘£š‘— + . Proof. Assume to the contrary that there exists š‘£ š‘˜ ∈ š¶ āˆ’ š‘£š‘– + , š‘£š‘— + such that š‘£ š‘˜ āˆ‰ š‘(š‘£š‘– + ) ∪ š‘(š‘£š‘— + ). Clearly, š‘£ š‘˜ āˆ‰ š‘£š‘–, š‘£š‘— . Let š‘„ ∈ š», then by Lemma 4.1 (b), the vertex set š‘„, š‘£š‘– + , š‘£š‘— + , š‘£ š‘˜ is independent, so š‘‘ š‘„ + š‘‘ š‘£š‘– + + š‘‘(š‘£š‘— + ) + š‘‘(š‘£ š‘˜) ≄ 2š‘›. However, š‘‘ š‘„ ≤ š» + 1, š‘‘ š‘£ š‘˜ ≤ š¶ āˆ’ 3, it implies that š‘‘ š‘£š‘– + + š‘‘(š‘£š‘— + ) ≄ 2š‘› āˆ’ š» āˆ’ š¶ + 2 = š‘› + 2. Therefore, by Lemma 4.2, šŗ is hamiltonian if and only if šŗā€² = šŗ + š‘£š‘– + š‘£š‘— + is hamiltonian. Observe that š¶ā€² = (š‘£š‘– š‘Šš‘£š‘— š¶ š‘£š‘– + š‘£š‘— + š¶ š‘£š‘–) is a hamiltonian cycle of šŗā€², i.e šŗā€² is hamiltonian, it implies that šŗ is hamiltonian, a contradiction.
  • 51. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 49 Now we consider two case of toughness of šŗ. I. š‘® is not 1-tough By šŗ is not 1-tough, there exists a vertex set š‘† ≠ āˆ… such that šŗ āˆ’ š‘† has at least S + 1 connected components. By šŗ is 2-connected, š‘† ≄ 2. Since š‘› āˆ’ š‘† ≄ šœ” šŗ āˆ’ š‘† ≄ š‘† + 1 so 2 š‘† ≤ š‘› āˆ’ 1. Claim 5.6. š‘† ∩ š» = āˆ…. Proof. Observe that šŗ āˆ’ š» = š¶ is 1-tough, if š» āˆ’ š‘† = āˆ… then šœ” šŗ āˆ’ š‘† = šœ” š¶ āˆ’ š‘† ≤ š‘† , which contradicts to the fact that šœ” šŗ āˆ’ š‘† ≄ š‘† + 1. Therefore, š» āˆ’ š‘† ≠ āˆ…. Let š‘† ∩ š» = š‘† š», š‘† ∩ š¶ = š‘† š¶. If š‘† š» ≄ 1 then šœ” šŗ āˆ’ š‘† ≤ 1 + šœ” š¶ āˆ’ š‘† š¶ ≤ 1 + š‘† š¶ ≤ š‘† , a contradiction. Thus, š‘† š» = 0, i.e š‘† ∩ š» = āˆ…. Observe that š‘£š‘–, š‘£š‘— ∈ š‘†, otherwise šœ” šŗ āˆ’ š‘† ≤ šœ”(š¶ āˆ’ š‘†) ≤ š‘† , a contradiction. Therefore, š» is a connected component of šŗ āˆ’ š‘†. Let š», š‘‡1, š‘‡2, … , š‘‡š‘˜ (š‘˜ ≄ š‘† ) be the connected components of šŗ āˆ’ š‘†. Claim 5.7. š‘˜ = š‘† = 2 Proof. Assume that š‘˜ ≄ 3. Let š‘„ ∈ š», š‘¦1 ∈ š‘‡1, š‘¦2 ∈ š‘‡2, š‘¦3 ∈ š‘‡3, then the vertex set š‘„, š‘¦1, š‘¦2, š‘¦3 is independent, so š‘‘ š‘„ + š‘‘ š‘¦1 + š‘‘ š‘¦2 + š‘‘(š‘¦3) ≄ 2š‘›. Observe that š‘‘ š‘„ ≤ š» + 1 and š‘‘ š‘¦š‘– ≤ š‘‡š‘– āˆ’ 1 + š‘† for any š‘– = 1, 2, 3. Therefore, š‘‘ š‘„ + š‘‘ š‘¦1 + š‘‘ š‘¦2 + š‘‘ š‘¦3 ≤ š» + š‘‡1 + š‘‡2 + š‘‡3 + 3 š‘† āˆ’ 2 ≤ 2 š‘† āˆ’ 2 + š‘› āˆ’ š‘˜ + 3 = 2 š‘† + š‘› āˆ’ š‘˜ + 1. It implies that 2 š‘† + š‘› āˆ’ š‘˜ + 1 ≄ 2š‘›, i.e 2 š‘† ≄ š‘› + š‘˜ āˆ’ 1 ≄ š‘› + 2 (by š‘˜ ≄ 3), which contradicts to the fact that 2 S ≤ n āˆ’ 1. Therefore k ≤ 2. By š‘˜ ≄ š‘† ≄ 2, we have š‘˜ = š‘† = 2. By Claim 5.7 and by š‘£š‘–, š‘£š‘— ∈ š‘† we have š‘† = š‘£š‘–, š‘£š‘— and šŗ āˆ’ š‘† has three connected components, such as š», š‘‡1, š‘‡2. By Proposition 5.5, š‘‡1 = ( š‘£š‘– + ∪ š‘ š‘£š‘– + āˆ’ š‘£š‘–, š‘£š‘— and š‘‡2 = ( š‘£š‘— + ∪ š‘(š‘£š‘— + ) āˆ’ š‘£š‘–, š‘£š‘— . Claim 5.8. š‘‡1, š‘‡2 is complete. Proof. Assume that š‘‡1 is not complete. Then there exists pair of nonadjacent vertices š‘¦, š‘§ ∈ š‘‡1. Let š‘„ ∈ š», then the vertex set š‘„, š‘¦, š‘§, š‘£š‘— + is independent, so š‘‘ š‘„ + š‘‘ š‘¦ + š‘‘ š‘§ + š‘‘(š‘£š‘— + ) ≄ 2š‘›. However, š‘‘ š‘„ ≤ š» + 1, š‘‘(š‘£š‘— + ) ≤ š‘‡2 + 1, š‘‘(š‘¦) ≤ š‘‡1 , š‘‘(š‘§) ≤ š‘‡1 . Therefore š‘‘ š‘„ + š‘‘ š‘¦ + š‘‘ š‘§ + š‘‘(š‘£š‘— + ) ≤ š» + 2 š‘‡1 + š‘‡2 + 2 = š‘› + š‘‡1 . It implies that š‘› + š‘‡1 ≄ 2š‘›, i.e š‘‡1 ≄ š‘›, a contradiction. Thus, š‘‡1 is complete. Similarly, we have š‘‡2 is complete.
  • 52. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 50 Figure 5. Graph š‘® belongs to class š“• šŸ. Clearly, 3 ≤ š›¼(šŗ) ≤ 5. If š›¼ šŗ ≄ 4, there exists a independent set of four vertices, whose elements are š‘„ ∈ š», š‘¦ ∈ š‘‡1, š‘§ ∈ š‘‡2 and a vertex in S (without loss of generality, assume that the vertex in š‘† is š‘£š‘–). By šœŽ4 ≄ 2š‘›, we have š‘‘ š‘„ + š‘‘ š‘¦ + š‘‘ š‘§ + š‘‘ š‘£š‘– ≄ 2š‘›. However, š‘‘ š‘„ ≤ š» + 1, š‘‘ š‘£š‘– ≤ š‘› āˆ’ 4, š‘‘(š‘¦) ≤ š‘‡1 , š‘‘(š‘§) ≤ š‘‡2 . It implies that š‘‘ š‘„ + š‘‘ š‘¦ + š‘‘ š‘§ + š‘‘ š‘£š‘– ≤ š» + š‘‡1 + š‘‡2 + š‘› āˆ’ 3 = 2š‘› āˆ’ 5, a contradiction. Thus, š›¼ šŗ = 3. Conclude that in this Case šŗ is not 1-tough, šŗ belongs to class ℱ1. II. š‘® is 1-tough Let š‘ƒ1 = š‘ š‘£š‘– + ∪ š‘£š‘– + , š‘ƒ2 = š‘(š‘£š‘— + ) ∪ š‘£š‘— + . By Lemma 4.1 (c) and Proposition 5.5, we have š‘ƒ1, š‘ƒ2 are two paths on š¶ satisfying š‘£š‘–, š‘£š‘– + , š‘£š‘– +2 āŠ† š‘ƒ1, š‘£š‘— , š‘£š‘— + , š‘£š‘— +2 āŠ† š‘ƒ2, š‘ƒ1 ∪ š‘ƒ2 = š¶ and if š‘£ ∈ š‘ƒ1 ∩ š‘ƒ2 then š‘£ is an end vertex of both š‘ƒ1, š‘ƒ2. Let š“1 = š‘ƒ1 āˆ’ š‘£š‘– , š“2 = š‘ƒ2 āˆ’ š‘£š‘— . Clearly, š“1 ∩ š“2 ≤ 2. We consider three case of š“1 ∩ š“2 . Case 1. š“1 ∩ š“2 = āˆ…. Figure 6. Illustrating the Case 1.
  • 53. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 51 Observe that there exists an edge joining a vertex š‘£ š‘˜ ∈ š“1 to a vertex š‘£š‘” ∈ š“2, otherwise šœ” šŗ āˆ’ š‘£š‘–, š‘£š‘— = 3, which contradicts to the fact that šŗ is 1-tough. If there exists pair of nonadjacent vertices š‘£š‘–1 , š‘£š‘–2 ∈ š“1, let š‘„ ∈ š», then the vertex set š‘„, š‘£š‘–1 , š‘£š‘–2 , š‘£š‘— + is independent, so š‘‘ š‘„ + š‘‘(š‘£š‘–1 ) + š‘‘(š‘£š‘–2 ) + š‘‘(š‘£š‘— + ) ≄ 2š‘›. By Lemma 4.1 (d), š‘‘ š‘„ + š‘‘(š‘£š‘— + ) ≤ š‘› āˆ’ 1, we have š‘‘(š‘£š‘–1 ) + š‘‘(š‘£š‘–2 ) ≄ š‘› + 1. By Lemma 4.2, šŗ is hamiltonian if and only if šŗā€² = šŗ + š‘£š‘–1 š‘£š‘–2 is hamiltonian. Arguing similarly, for any pair of nonadjacent vertices š‘£š‘—1 , š‘£š‘—2 ∈ š“2, we have š‘‘(š‘£š‘—1 ) + š‘‘(š‘£š‘—2 ) ≄ š‘› + 1 and šŗ is hamiltonian if and only if šŗā€²ā€² = šŗ + š‘£š‘—1 š‘£š‘—2 is hamiltonian. Let šŗāˆ— be the graph obtain from šŗ by adding new edges joining all pair of nonadjacent vertices in the same set š“1, respectively in A2. By Lemma 4.3, šŗ is hamiltonian if and only if šŗāˆ— is hamiltonian. We consider graph šŗāˆ— , let š‘Š1 be the hamiltonian path of š“1 joining š‘£š‘– + to š‘£ š‘˜, and let š‘Š2 be the hamiltonian path of š“2 joining š‘£š‘” to š‘£š‘— + . Then, we have š¶ā€² = (š‘£š‘– š‘£š‘– + š‘Š1 š‘£ š‘˜ š‘£š‘” š‘Š2 š‘£š‘— + š‘£š‘— š‘Šš‘£š‘–) is a hamiltonian cycle in šŗāˆ— , i.e šŗāˆ— is hamiltonian. Therefore, šŗ is hamiltonian, a contradiction. Thus, the Case 1 does not happen. Case 2. š“1 ∩ š“2 = 1. Let š“1 ∩ š“2 = š‘£ š‘˜ . Without loss of generality, assume that š‘£ š‘˜ ∈ š‘£š‘– +2 š¶ š‘£š‘— āˆ’ (š‘£š‘– +2 ≠ š‘£š‘— ). Figure 7. Illustrating the Case 2. Case 2.1. š‘£ š‘˜ ≔ š‘£š‘– +2 . If š» > 1 then š¶ā€² = (š‘£š‘– š‘Šš‘£š‘— š¶ š‘£ š‘˜ š‘£š‘— + š¶ š‘£š‘–) is longer than š¶. Therefore, š» = 1, let š» = š‘„ . If š‘£š‘– āˆ’ ∈ š‘(š‘£š‘– + ) then š¶ā€² = (š‘£š‘– š‘„š‘£š‘— š¶ š‘£ š‘˜ š‘£š‘— + š¶ š‘£š‘– āˆ’ š‘£š‘– + š‘£š‘–) is a hamiltonian cycle in šŗ a contradiction. Therefore, š‘£š‘– āˆ’ āˆ‰ š‘(š‘£š‘– + ), and by Proposition 5.5, š‘£š‘– āˆ’ ∈ š‘(š‘£š‘— + ) and š‘‘ š‘£š‘– + = 2.
  • 54. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 52 We consider subgraph šµ2 = š“2 āˆ’ š‘£ š‘˜ = š‘£ š‘˜ š¶ š‘£š‘– āˆ’ āˆ’ š‘£ š‘˜, š‘£š‘— . If there exists pair of nonadjacent vertices š‘£š‘”1 , š‘£š‘”2 ∈ šµ2 then the vertex set š‘„, š‘£š‘– + , š‘£š‘”1 , š‘£š‘”2 is independent, so š‘‘ š‘„ + š‘‘ š‘£š‘– + + š‘‘(š‘£š‘”1 ) + š‘‘(š‘£š‘”2 ) ≄ 2š‘›. However, š‘‘ š‘„ = š‘‘ š‘£š‘– + = 2 and š‘‘(š‘£š‘”1 ), š‘‘(š‘£š‘”2 ) ≤ š¶ āˆ’ 3 = š‘› āˆ’ 4, therefore š‘‘ š‘„ + š‘‘ š‘£š‘– + + š‘‘(š‘£š‘”1 ) + š‘‘(š‘£š‘”2 ) ≤ 2š‘› āˆ’ 4, a contradiction. Thus, šµ2 is complete. If š‘£š‘— āˆ’ ≠ š‘£ š‘˜ then š‘£š‘– āˆ’ , š‘£š‘— āˆ’ ∈ šµ2, so š‘£š‘– āˆ’ š‘£š‘— āˆ’ ∈ šø(šŗ), which contradicts to Lemma 4.1 (b). Therefore š‘£š‘— āˆ’ ≔ š‘£ š‘˜ . Because šŗ is 1-tough, nonhamiltonian, so š‘› ≄ 7 and š‘£š‘– āˆ’ ≠ š‘£š‘— + . If there exists a vertex š‘£š‘” ∈ š‘£š‘— +2 š¶ š‘£š‘– āˆ’ is adjacent to š‘£š‘— then we have š¶ā€² = (š‘£š‘– š‘„š‘£š‘— š‘£š‘” š¶ š‘£š‘– āˆ’ š‘£š‘” āˆ’ š¶ š‘£š‘— + š‘£ š‘˜ š‘£š‘– + š‘£š‘–) is a hamiltonian cycle in šŗ, a contradiction. Therefore, š‘£š‘— is not adjacent to all vertices in š‘£š‘— +2 š¶ š‘£š‘– āˆ’ . Similarly, if there exists a vertex š‘£š‘” ∈ š‘£š‘— +2 š¶ š‘£š‘– āˆ’ is adjacent to š‘£ š‘˜ then we have š¶ā€² = (š‘£š‘– š‘„š‘£š‘— š¶ š‘£š‘” āˆ’ š‘£š‘– āˆ’ š¶ š‘£š‘” š‘£ š‘˜ š‘£š‘– + š‘£š‘–) is a hamiltonian cycle in šŗ, a contradiction. Therefore, š‘£ š‘˜ is not adjacent to all vertices in š‘£š‘— +2 š¶ š‘£š‘– āˆ’ . Conclude that the graph šŗ is shown in Figure 8, š‘£š‘– can possibly be adjacent to another vertices: Figure 8. Graph š‘® belongs to class š“• šŸ. Clearly, š›¼ šŗ = 3 and šŗ belongs to class ℱ2. Case 2.2. š‘£ š‘˜ ≠ š‘£š‘– +2 and š‘£ š‘˜ ≔ š‘£š‘— āˆ’ . Clearly, š‘£ š‘˜ āˆ’ ≠ š‘£š‘– + . If š‘£š‘– āˆ’ š‘£ š‘˜ āˆ’ ∈ šø(šŗ), then š¶ā€² = (š‘£š‘– š‘Šš‘£š‘— š‘£ š‘˜ š‘£š‘— + š¶ š‘£š‘– āˆ’ š‘£ š‘˜ āˆ’ š¶ š‘£š‘–) is a hamiltonian cycle of šŗ, a contradiction. Therefore, š‘£š‘– āˆ’ š‘£ š‘˜ āˆ’ āˆ‰ šø(šŗ). By š‘£ š‘˜ ≔ š‘£š‘— āˆ’ and by Lemma 4.1 (b), š‘£š‘– āˆ’ š‘£ š‘˜ āˆ‰ šø(šŗ), so š‘£š‘– āˆ’ ≠ š‘£š‘— + by š‘£ š‘˜ ∈ š‘(š‘£š‘— + ). We have the following Claims. Claim 5.9. š‘£š‘– āˆ’ ∈ š“2 āˆ’ š“1. Proof. Assume that š‘£š‘– āˆ’ ∈ š“1. Let š‘„ ∈ š», then the vertex set š‘„, š‘£š‘— + , š‘£š‘– āˆ’ , š‘£ š‘˜ āˆ’ is independent, so š‘‘ š‘„ + š‘‘(š‘£š‘— + ) + š‘‘(š‘£š‘– āˆ’ ) + š‘‘(š‘£ š‘˜ āˆ’ ) ≄
  • 55. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 53 2š‘›. By Lemma 4.1 (d), š‘‘ š‘„ + š‘‘(š‘£š‘— + ) ≤ š‘› āˆ’ 1 and š‘‘ š‘£š‘– āˆ’ + š‘‘ š‘£ š‘˜ āˆ’ ≄ š‘› + 1. Therefore, by Lemma 4.2, šŗ is hamiltonian if and only if šŗā€² = šŗ + š‘£š‘– āˆ’ š‘£ š‘˜ āˆ’ is hamiltonian. Observe that š¶ā€² = (š‘£š‘– š‘Šš‘£š‘— š‘£ š‘˜ š‘£š‘— + š¶ š‘£š‘– āˆ’ š‘£ š‘˜ āˆ’ š¶ š‘£š‘–) is a hamiltonian cycle of šŗā€², so šŗā€² and šŗ are hamiltonian, a contradiction. Thus, š‘£š‘– āˆ’ āˆ‰ š“1, and by š‘ƒ1 ∪ š‘ƒ2 = š¶ we have š‘£š‘– āˆ’ ∈ š“2 āˆ’ š“1. Figure 9. Illustrating the Claim 5.9. Let šµ1 = š“1 āˆ’ š‘£ š‘˜ = š‘£š‘– + š¶ š‘£ š‘˜ āˆ’ , šµ2 = š“2 āˆ’ š‘£ š‘˜ = š‘£š‘— + š¶ š‘£š‘– āˆ’ . By š‘£š‘– āˆ’ ≠ š‘£š‘— + and by š‘£ š‘˜ āˆ’ ≠ š‘£š‘– + we have šµ1 , šµ2 ≄ 2. Arguing similarly, for any pair of nonadjacent vertices (š‘¦, š‘§) in the same set šµ1, respectively in šµ2, we have š‘‘ š‘¦ + š‘‘(š‘§) ≄ š‘› + 1. Claim 5.10. There are no edges joining a vertex in šµ1 to a vertex in šµ2. Proof. Assume to the contrary that there exists an edge joining š‘£š‘”1 ∈ šµ1 to š‘£š‘”2 ∈ šµ2. Clearly, š‘£š‘”1 ≠ š‘£š‘– + , š‘£š‘”2 ≠ š‘£š‘— + . Let šŗāˆ— be the graph obtain from šŗ by adding new edges joining all pair of nonadjacent vertices in the same set šµ1, respectively in šµ2. By Lemma 4.3, šŗ is hamiltonian if and only if šŗāˆ— is hamiltonian. We consider graph šŗāˆ— , observe that šµ1, šµ2 are complete. Let š‘Š1 be the hamiltonian path in šµ1 joining š‘£š‘”1 to š‘£š‘– + and let š‘Š2 be the path in šµ2 joining š‘£š‘— + to š‘£š‘”2 . Then, š¶ā€² = (š‘£š‘– š‘Šš‘£š‘— š‘£ š‘˜ š‘£š‘— + š‘Š2 š‘£š‘”2 š‘£š‘”1 š‘Š1 š‘£š‘– + š‘£š‘–) is a hamiltonian cycle of šŗāˆ— , i.e šŗāˆ— is hamiltonian, it implies that šŗ is hamiltonian, a contradiction. Claim 5.11. šµ1, šµ2 are complete. Proof. Assume that there exists a pair of nonadjacent vertices š‘£š‘–1 , š‘£š‘–2 ∈ šµ1. Let š‘„ ∈ š», then the vertex set š‘„, š‘£š‘–1 , š‘£š‘–2 , š‘£š‘— + is independent, so š‘‘ š‘„ + š‘‘(š‘£š‘–1 ) + š‘‘(š‘£š‘–2 ) + š‘‘(š‘£š‘— + ) ≄ 2š‘›. However, š‘‘ š‘„ ≤ š» + 1, š‘‘(š‘£š‘— + ) ≤ šµ2 + 2 and š‘‘(š‘£š‘–1 ), š‘‘(š‘£š‘–2 ) ≤ šµ1 + 1, therefore š‘‘ š‘„ + š‘‘(š‘£š‘–1 ) + š‘‘(š‘£š‘–2 ) + š‘‘(š‘£š‘— + ) ≤ š» + 2 šµ1 + šµ2 + 5 = š‘› + šµ1 + 2. It implies that šµ1 ≄ š‘› āˆ’ 2, a contradiction. Thus, šµ1 is complete. Similarly, we have šµ2 is complete. Claim 5.12. š‘£ š‘˜ , š‘£š‘— are not adjacent to any vertex in šµ2 āˆ’ š‘£š‘— + .
  • 56. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 54 Proof. Assume that š‘£ š‘˜ is adjacent to a vertex š‘£š‘ ∈ šµ2 āˆ’ š‘£š‘— + . By Claim 5.11, let š‘Š1 be the hamiltonian path of šµ1 joining š‘£ š‘˜ āˆ’ to š‘£š‘– + , and let š‘Š2 be the hamiltonian path of šµ2 joining š‘£š‘— + to š‘£š‘. Then, š¶ā€² = (š‘£š‘– š‘Šš‘£š‘— š‘£š‘— + š‘Š2 š‘£š‘ š‘£ š‘˜ š‘£ š‘˜ āˆ’ š‘Š1 š‘£š‘– + š‘£š‘–) is a hamiltonian cycle of šŗ, a contradiction. Similarly, if š‘£š‘— is adjacent to a vertex š‘£š‘ž ∈ šµ2 āˆ’ š‘£š‘— + , let š‘Š2 āˆ— be the hamiltonian path of šµ2 joining š‘£š‘ž to š‘£š‘— + , then š¶ā€² = (š‘£š‘– š‘Šš‘£š‘— š‘£š‘ž š‘Š2 āˆ— š‘£š‘— + š‘£ š‘˜ š‘£ š‘˜ āˆ’ š‘Š1 š‘£š‘– + š‘£š‘–) is a hamiltonian cycle of šŗ, a contradiction. Thus, š‘£ š‘˜, š‘£š‘— are not adjacent to any vertex in šµ2 āˆ’ š‘£š‘— + . Claim 5.13. š‘£š‘— is not adjacent to any vertex in šµ1. Proof. Assume to the contrary that š‘£š‘— is adjacent to a vertex š‘£š‘ ∈ šµ1. Let š‘Š2 be the hamiltonian path of šµ2 joining š‘£š‘— + to š‘£š‘– āˆ’ . It happens as one of two following case: (1) Case š‘£š‘ ≠ š‘£š‘– + : Let š‘Š1 be the hamiltonian path of šµ1 joining š‘£š‘ to š‘£š‘– + , we have š¶ā€² = (š‘£š‘– š‘Šš‘£š‘— š‘£š‘ š‘Š1 š‘£š‘– + š‘£ š‘˜ š‘£š‘— + š‘Š2 š‘£š‘– āˆ’ š‘£š‘–) is a hamiltonian cycle of šŗ, a contradiction. (2) Case š‘£š‘ ≔ š‘£š‘– + : Let š‘Š1 be the hamiltonian path of šµ1 joining š‘£š‘ to š‘£ š‘˜ āˆ’ , we have š¶ā€² = (š‘£š‘– š‘Šš‘£š‘— š‘£š‘ š‘Š1 š‘£ š‘˜ āˆ’ š‘£ š‘˜ š‘£š‘— + š‘Š2 š‘£š‘– āˆ’ š‘£š‘–) is a hamiltonian cycle of šŗ, a contradiction. Claim 5.14. š‘£š‘— is adjacent to all vertices in š». Proof. Assume to the contrary that š‘£š‘— is not adjacent to a vertex š‘„ ∈ š». Let š‘£š‘”1 ∈ šµ1, š‘£š‘”2 ∈ šµ2 āˆ’ š‘£š‘— + , then by Claims 5.10, 5.12, 5.13, the vertex set š‘„, š‘£š‘— , š‘£š‘”1 , š‘£š‘”2 is independent, so š‘‘ š‘„ + š‘‘(š‘£š‘— ) + š‘‘(š‘£š‘”1 ) + š‘‘(š‘£š‘”2 ) ≄ 2š‘›. However, š‘‘ š‘„ ≤ š» , š‘‘(š‘£š‘— ) ≤ š» + 2, š‘‘(š‘£š‘”1 ) ≤ šµ1 + 1, š‘‘(š‘£š‘”2 ) ≤ šµ2 . Therefore, 2š‘› ≤ š‘‘ š‘„ + š‘‘(š‘£š‘— ) + š‘‘(š‘£š‘”1 ) + š‘‘(š‘£š‘”2 ) ≤ 2 š» + šµ1 + šµ2 + 3 = š‘› + š» , it implies that š» ≄ š‘›, a contradiction. Claim 5.15. š‘£ š‘˜ is adjacent to all vertices in šµ1. Proof. Assume to the contrary that š‘£ š‘˜ is not a vertex š‘£š‘”1 ∈ šµ1. Let š‘„ ∈ š» and š‘£š‘”2 ∈ šµ2 āˆ’ š‘£š‘— + . Then by Claim 5.10 and by Claim 5.12, the vertex set š‘„, š‘£ š‘˜, š‘£š‘”1 , š‘£š‘”2 is independent, so š‘‘ š‘„ + š‘‘(š‘£ š‘˜) + š‘‘(š‘£š‘”1 ) + š‘‘(š‘£š‘”2 ) ≄ 2š‘›. However, š‘‘ š‘„ ≤ š» + 1, š‘‘ š‘£ š‘˜ ≤ šµ1 + 2, š‘‘(š‘£š‘”1 ) ≤ šµ1 , š‘‘(š‘£š‘”2 ) ≤ šµ2 . Therefore, š‘‘ š‘„ + š‘‘(š‘£ š‘˜) + š‘‘(š‘£š‘”1 ) + š‘‘(š‘£š‘”2 ) ≤ š» + 2 šµ1 + šµ2 + 3 = š‘› + šµ1 , it implies that šµ1 ≄ š‘›, a contradiction. Let š»1 = š» + š‘£š‘— , by Claim 5.14, š»1 is complete. By Claim 5.15, š“1 = šµ1 + š‘£ š‘˜ is complete. The graph šŗ is shown in Figure 10, in which,
  • 57. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 55 š»1, š“1, šµ2 are complete and š»1 , š“1 , šµ2 ≄ 2. Moreover, the vertex š‘£š‘– can possibly be adjacent to another vertices. Figure 10. Graph š‘® belongs to class š“• šŸ. Clearly, 3 ≤ š›¼(šŗ) ≤ 4. If š›¼ šŗ = 4, then there exists š‘„ ∈ š»1, š‘¦ ∈ š“1, š‘§ ∈ šµ2 such that the vertex set š‘„, š‘¦, š‘§, š‘£š‘– is independent, so š‘‘ š‘„ + š‘‘ š‘¦ + š‘‘ š‘§ + š‘‘(š‘£š‘–) ≄ 2š‘›. However, š‘‘ š‘„ + š‘‘ š‘¦ + š‘‘ š‘§ ≤ š»1 + š“1 + š“2 āˆ’ 1 = š‘› āˆ’ 2, therefore š‘‘ š‘£š‘– ≄ š‘› + 2, a contradiction. Thus š›¼ šŗ = 3. Conclude that in this Case 2.2, šŗ belongs to class ℱ2. Case 2.3. š‘£ š‘˜ ≠ š‘£š‘– +2 and š‘£ š‘˜ ≠ š‘£š‘— āˆ’ . Arguing similarly the proofs of Case 2.2, let šµ1 = š“1 āˆ’ š‘£ š‘˜ and šµ2 = š“2 āˆ’ š‘£ š‘˜ , then for any pair of nonadjacent vertices (š‘¦, š‘§) together in šµ1 or šµ2, we have š‘‘ š‘¦ + š‘‘(š‘§) ≄ š‘› + 1. Observe that š‘£š‘– + ≠ š‘£ š‘˜ āˆ’ ∈ šµ1 and š‘£š‘— , š‘£š‘— + ≠ š‘£ š‘˜ + ∈ šµ2. Let šŗāˆ— be the graph obtain from šŗ by adding new edges joining all pair of nonadjacent vertices in the same set šµ1, respectively in šµ2. By Lemma 4.3, šŗ is hamiltonian if and only if šŗāˆ— is hamiltonian. We consider graph šŗāˆ— , let š‘Š1 be the hamiltonian path of šµ1 joining š‘£ š‘˜ āˆ’ to š‘£š‘– + , and let š‘Š2 be the hamiltonian path of šµ2 joining š‘£š‘— + to š‘£ š‘˜ + . Then, we have š¶ā€² = (š‘£š‘– š‘Šš‘£š‘— š‘£š‘— + š‘Š2 š‘£ š‘˜ + š‘£ š‘˜ š‘£ š‘˜ āˆ’ š‘Š1 š‘£š‘– + š‘£š‘–) is a hamiltonian cycle of šŗāˆ— , i.e šŗāˆ— is hamiltonian. Therefore, šŗ is hamiltonian, a contradiction. Thus, the Case 2.3 does not happen. Case 3. š“1 ∩ š“2 = 2. Let š“1 ∩ š“2 = š‘£ š‘˜, š‘£š‘” . Without loss of generality, we assume that š‘£ š‘˜ ∈ š‘£š‘– +2 š¶ š‘£š‘— āˆ’ (š‘£š‘– +2 ≠ š‘£š‘— ) and š‘£š‘” ∈ š‘£š‘— +2 š¶ š‘£š‘– āˆ’ (š‘£š‘— +2 ≠ š‘£š‘–). Let šµ1 = š“1 āˆ’ š‘£ š‘˜, š‘£š‘” , šµ2 = š“2 āˆ’ š‘£ š‘˜, š‘£š‘” . Arguing similarly the proofs of Case 2.2, for any pair of nonadjacent vertices (š‘¦, š‘§) in the same set šµ1, respectively in šµ2, we get š‘‘ š‘¦ + š‘‘(š‘§) ≄ š‘› + 1.
  • 58. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 56 Figure 11. Illustrating the Case 3. Case 3.1. š‘£ š‘˜ ≔ š‘£š‘– +2 or š‘£š‘” ≔ š‘£š‘— +2 . Without loss of generality, assume that š‘£ š‘˜ ≔ š‘£š‘– +2 . If š‘£š‘– āˆ’ ∈ š‘(š‘£š‘– + ) then we have š¶ā€² = (š‘£š‘– š‘Šš‘£š‘— š¶ š‘£ š‘˜ š‘£š‘— + š¶ š‘£š‘– āˆ’ š‘£š‘– + š‘£š‘–) is a hamiltonian cycle of šŗ, a contradiction. Therefore š‘£š‘– āˆ’ āˆ‰ š‘(š‘£š‘– + ), i.e š‘£š‘– āˆ’ āˆ‰ š“1 and š‘£š‘– āˆ’ ∈ š“2. It implies that there is no vertex š‘£š‘” ∈ š‘£š‘— +2 š¶ š‘£š‘– āˆ’ such that š‘£š‘” ∈ š“1 ∩ š“2, a contradiction. Thus, the Case 3.1 does not happen. Case 3.2. (š‘£ š‘˜ ≠ š‘£š‘– +2 and š‘£ š‘˜ ≔ š‘£š‘— āˆ’ ) or (š‘£š‘” ≠ š‘£š‘— +2 and š‘£š‘” ≔ š‘£š‘– āˆ’ ). Without loss of generality, assume that š‘£ š‘˜ ≠ š‘£š‘– +2 and š‘£ š‘˜ ≔ š‘£š‘— āˆ’ . We have the following Claims: Claim 5.16. š‘£š‘” ≔ š‘£š‘– āˆ’ . Proof. Assume to the contrary that š‘£š‘” ≠ š‘£š‘– āˆ’ . Arguing similarly the proofs of Case 2.2, we have š‘£š‘– āˆ’ š‘£ š‘˜ āˆ’ āˆ‰ šø(šŗ) and š‘‘ š‘£š‘– āˆ’ + š‘‘ š‘£ š‘˜ āˆ’ ≄ š‘› + 1. By Lemma 4.2, šŗ is hamiltonian if and only if šŗā€² = šŗ + š‘£š‘– āˆ’ š‘£ š‘˜ āˆ’ is hamiltonian. Observe that š¶ā€² = (š‘£š‘– š‘Šš‘£š‘— š‘£ š‘˜ š‘£š‘— + š¶ š‘£š‘– āˆ’ š‘£ š‘˜ āˆ’ š¶ š‘£š‘–) is a hamiltonian cycle of šŗā€², i.e šŗā€² is hamiltoniania. It implies that šŗ is hamiltonian, a contradiction. Claim 5.17. šµ1 , šµ2 ≄ 2. Moreover, š‘£š‘– āˆ’2 ∈ šµ2 āˆ’ {š‘£š‘— + }. Proof. Because of š‘£š‘– + , š‘£ š‘˜ āˆ’ ∈ šµ1, so šµ1 ≄ 2. If š‘£š‘– āˆ’2 ≔ š‘£š‘— + , then š¶ā€² = (š‘£š‘– š‘Šš‘£š‘— š‘£š‘— + š‘£ š‘˜ š¶ š‘£š‘– + š‘£š‘– āˆ’ š‘£š‘–) is a hamiltonian cycle of šŗ, a contradiction. Therefore, š‘£š‘– āˆ’2 ≠ š‘£š‘— + . By Claim 5.16 we have š‘£š‘– āˆ’2 ∈ šµ2 āˆ’ {š‘£š‘— + } and šµ2 ≄ 2. Claim 5.18. There are no edges joining a vertex in šµ1 to a vertex in šµ2. Proof. Assume to the contrary that there exists š‘£š‘”1 ∈ šµ1, š‘£š‘”2 ∈ šµ2 such that š‘£š‘”1 š‘£š‘”2 ∈ šø(šŗ). Observe that š‘£š‘”1 ≠ š‘£š‘– + and š‘£š‘”2 ≠ š‘£š‘— + . Let šŗāˆ— be the graph obtain from šŗ by adding new edges joining all pair of nonadjacent
  • 59. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 57 vertices in the same set šµ1, respectively in šµ2 (note that their degree sum is greater than š‘› + 1). By Lemma 4.3, šŗ is hamiltonian if and only if šŗāˆ— is hamiltonian. We consider the graph šŗāˆ— , let š‘Š1 be the hamiltonian path of šµ1 joining š‘£š‘– + to š‘£š‘”1 , and let š‘Š2 be the hamiltonian path of šµ2 joining š‘£š‘”2 to š‘£š‘— + . Then š¶ā€² = (š‘£š‘– š‘Šš‘£š‘— š‘£ š‘˜ š‘£š‘– + š‘Š1 š‘£š‘”1 š‘£š‘”2 š‘Š2 š‘£š‘— + š‘£š‘– āˆ’ š‘£š‘–) is a hamiltonian cycle of šŗāˆ— , i.e šŗāˆ— is hamiltonian. It implies that šŗ is hamiltonian, a contradiction. Claim 5.19. šµ1, šµ2 are complete. Proof. Assume that there exists a pair of nonadjacent vertices š‘£š‘, š‘£š‘ž ∈ šµ1. Let š‘„ ∈ š», then the vertex set š‘„, š‘£š‘, š‘£š‘ž , š‘£š‘— + is independent, so š‘‘ š‘„ + š‘‘(š‘£š‘) + š‘‘(š‘£š‘ž ) + š‘‘(š‘£š‘— + ) ≄ 2š‘›. However, š‘‘ š‘„ ≤ š» + 1, š‘‘(š‘£š‘— + ) ≤ šµ2 + 2 and š‘‘(š‘£š‘), š‘‘(š‘£š‘ž ) ≤ šµ1 + 2. Therefore, š‘‘ š‘„ + š‘‘(š‘£š‘) + š‘‘(š‘£š‘ž ) + š‘‘(š‘£š‘— + ) ≤ š» + 2 šµ1 + šµ2 + 7 = š‘› + šµ1 + 3. It implies that šµ1 ≄ š‘› āˆ’ 3, a contradiction. Thus, šµ1 is complete. Similarly, šµ2 is complete. Claim 5.20. š‘£š‘– is not adjacent to all vertices in šµ1 āˆ’ š‘£š‘– + . Proof. Assume to the contrary that š‘£š‘– is adjacent to š‘£š‘”1 ∈ šµ1 āˆ’ š‘£š‘– + . By Claim 5.19, let š‘Š1 be the hamiltonian path of šµ1 joining š‘£š‘– + to š‘£š‘”1 . We have š¶ā€² = (š‘£š‘– š‘Šš‘£š‘— š‘£ š‘˜ š‘£š‘— + š¶ š‘£š‘– āˆ’ š‘£š‘– + š‘Š1 š‘£š‘”1 š‘£š‘–) is a hamiltonian cycle of šŗ, a contradiction. Claim 5.21. š‘£š‘– is not adjacent to all vertices in šµ2. Proof. Assume to the contrary that š‘£š‘– is adjacent to š‘£š‘”2 ∈ šµ2. Observe that š‘£š‘”2 ≠ š‘£š‘— + , otherwise š¶ā€² = (š‘£š‘– š‘Šš‘£š‘— š¶ š‘£š‘– + š‘£š‘– āˆ’ š¶ š‘£š‘— + š‘£š‘–) is a hamiltonian cycle of šŗ, a contradiction. Let š‘Š2 be the hamiltonian path of šµ2 joining š‘£š‘— + to š‘£š‘”2 . Then, š¶ā€² = (š‘£š‘– š‘Šš‘£š‘— š‘£ š‘˜ š¶ š‘£š‘– + š‘£š‘– āˆ’ š‘£š‘— + š‘Š2 š‘£š‘”2 š‘£š‘–) is a hamiltonian cycle of šŗ, a contradiction. Figure 12. Illustrating the proof of Claim 5.21.
  • 60. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 58 Similarly the proofs of Claim 5.20 and Claim 5.21, we have: Claim 5.22. š‘£š‘— is not adjacent to all vertices in šµ1 ∪ (šµ2 āˆ’ š‘£š‘— + ). Claim 5.23. š‘£š‘–, š‘£š‘— are adjacent to all vertices in š». Proof. Assume that š‘£š‘– is not adjacent to š‘„ ∈ š». Let š‘£š‘ ∈ šµ1 āˆ’ š‘£š‘– + , š‘£š‘ž ∈ šµ2 āˆ’ š‘£š‘— + . Then by Claims 5.18, 5.20, 5.21, the vertex set š‘„, š‘£š‘–, š‘£š‘ , š‘£š‘ž is independent, so š‘‘ š‘„ + š‘‘ š‘£š‘– + š‘‘(š‘£š‘) + š‘‘(š‘£š‘ž ) ≄ 2š‘›. However, š‘‘(š‘„) ≤ š» , š‘‘ š‘£š‘– ≤ š» + 3, š‘‘(š‘£š‘) ≤ šµ1 + 1, š‘‘(š‘£š‘ž ) ≤ šµ2 + 1, therefore š‘‘ š‘„ + š‘‘ š‘£š‘– + š‘‘(š‘£š‘) + š‘‘(š‘£š‘ž ) ≤ 2 š» + šµ1 + šµ2 + 5 = š‘› + š» + 1. It implies that š» ≄ š‘› āˆ’ 1, a contradiction. Thus, š‘£š‘– is adjacent to all vertices in š». Similarly, š‘£š‘— is adjacent to all vertices in š». Claim 5.24. š‘£ š‘˜ is not adjacent to all vertices in š‘£š‘– ∪ (šµ2 āˆ’ š‘£š‘— + ). Proof. Assume that š‘£ š‘˜ is adjacent to š‘£š‘”2 ∈ šµ2 āˆ’ š‘£š‘— + . Let š‘Š1 be the hamiltonian path of šµ1 joining š‘£ š‘˜ āˆ’ to š‘£š‘– + , and let š‘Š2 be the hamiltonian path of šµ2 joining š‘£š‘— + to š‘£š‘”2 . Then, we have š¶ā€² = (š‘£š‘– š‘Šš‘£š‘— š‘£š‘— + š‘Š2 š‘£š‘”2 š‘£ š‘˜ š‘£ š‘˜ āˆ’ š‘Š1 š‘£š‘– + š‘£š‘– āˆ’ š‘£š‘–) is a hamiltonian cycle of šŗ, a contradiction. Therefore, š‘£ š‘˜ is not adjacent to all vertices in šµ2 āˆ’ š‘£š‘— + . Moreover, if š‘£ š‘˜ is adjacent to š‘£š‘–, by Claim 5.17, let W2 ′ be the hamiltonian path of šµ2 joining š‘£š‘— + to š‘£š‘– āˆ’2 . Then, š¶ā€² = (š‘£š‘– š‘Šš‘£š‘— š‘£š‘— + š‘Š2 ′ š‘£š‘– āˆ’2 š‘£š‘– āˆ’ š‘£š‘– + š‘Š1 š‘£ š‘˜ āˆ’ š‘£ š‘˜ š‘£š‘–) is a hamiltonian cycle of šŗ, a contradiction. Thus, š‘£ š‘˜ is not adjacent to š‘£š‘–. Claim 5.25. š‘£ š‘˜ is adjacent to all vertices in šµ1. Proof. Assume to the contrary that š‘£ š‘˜ is not adjacent to š‘£š‘”1 ∈ šµ1. Let š‘„ ∈ š», š‘£š‘”2 ∈ šµ2 āˆ’ š‘£š‘— + , then by Claim 5.18 and by Claim 5.24, the vertex set š‘„, š‘£ š‘˜ , š‘£š‘”1 , š‘£š‘”2 is independent, so š‘‘ š‘„ + š‘‘(š‘£ š‘˜) + š‘‘(š‘£š‘”1 ) + š‘‘(š‘£š‘”2 ) ≄ 2š‘›. However, š‘‘ š‘„ ≤ š» + 1, š‘‘ š‘£ š‘˜ ≤ šµ1 + 2, š‘‘(š‘£š‘”1 ) ≤ šµ1 , š‘‘(š‘£š‘”2 ) ≤ šµ2 . Therefore, š‘‘ š‘„ + š‘‘(š‘£ š‘˜) + š‘‘(š‘£š‘”1 ) + š‘‘(š‘£š‘”2 ) ≤ 2 šµ1 + šµ2 + š» + 3 = š‘› + šµ1 āˆ’ 1. It implies that šµ1 ≄ š‘› + 1, a contradiction. Arguing similarly the proofs of Claim 5.24 and Claim 5.25, we have: Claim 5.26. š‘£š‘– āˆ’ is not adjacent to all vertices in {š‘£š‘— } ∪ (šµ1 āˆ’ š‘£š‘– + ). Claim 5.27. š‘£š‘– āˆ’ is adjacent to all vertices in šµ2. Observe that š‘£ š‘˜ , š‘£š‘– āˆ’ ∈ š‘š¶(š»)āˆ’ , by Lemma 4.1 (b) we have: Claim 5.28. š‘£ š‘˜ š‘£š‘– āˆ’ āˆ‰ šø(šŗ).
  • 61. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 59 Claim 5.29. š‘£š‘– š‘£š‘— ∈ šø(šŗ). Proof. Assume to the contrary that š‘£š‘– š‘£š‘— āˆ‰ šø(šŗ). Let š‘£š‘”1 ∈ šµ1 āˆ’ š‘£š‘– + , š‘£š‘”2 ∈ šµ2 āˆ’ š‘£š‘— + . Then by Claims 5.18, 5.20. 5.21 and 5.22, the vertex set š‘£š‘–, š‘£š‘— , š‘£š‘”1 , š‘£š‘”2 is independent, so š‘‘ š‘£š‘– + š‘‘(š‘£š‘— ) + š‘‘(š‘£š‘”1 ) + š‘‘(š‘£š‘”2 ) ≄ 2š‘›. However, š‘‘ š‘£š‘– ≤ š» + 2, š‘‘(š‘£š‘— ) ≤ š» + 2, š‘‘(š‘£š‘”1 ) ≤ šµ1 , š‘‘(š‘£š‘”2 ) ≤ šµ2 . Therefore, š‘‘ š‘£š‘– + š‘‘(š‘£š‘— ) + š‘‘(š‘£š‘”1 ) + š‘‘(š‘£š‘”2 ) ≤ 2 š» + šµ1 + šµ2 + 4 = š‘› + š» . It implies that š» ≄ š‘›, a contradiction. By Claim 5.25, š¶1 = šµ1 + š‘£ š‘˜ is complete. By Claim 5.27, š¶2 = šµ2 + š‘£š‘– āˆ’ is complete. Moreover, by Claim 5.17, š¶1 , š¶2 ≄ 3. By Claim 5.23 and Claim 5.29, š»1 = š» + š‘£š‘–, š‘£š‘— is complete and š»1 ≄ 3. Conclude that šŗ is shown in Figure 13, in which š»1, š¶1, š¶2 are complete and š¶1 , š¶2 , š»1 ≄ 3. Figure 13. Graph š‘® belongs to class š“• šŸ‘. Clearly, š›¼ šŗ = 3 and šŗ belongs to class ℱ3. Case 3.3. š‘£ š‘˜ ≠ š‘£š‘– +2 , š‘£ š‘˜ ≠ š‘£š‘— āˆ’ and š‘£š‘” ≠ š‘£š‘— +2 , š‘£š‘” ≠ š‘£š‘– āˆ’ . Observe that š‘£š‘” + , š‘£ š‘˜ āˆ’ ∈ šµ1 āˆ’ š‘£š‘– + and š‘£š‘” āˆ’ , š‘£ š‘˜ + ∈ šµ2 āˆ’ {š‘£š‘— + }. Let šŗāˆ— be the graph obtain from šŗ by adding new edges joining all pair of nonadjacent vertices in the same set šµ1, respectively in šµ2 (note that their degree sum is greater than š‘› + 1). By Lemma 4.3, šŗ is hamiltonian if and only if šŗāˆ— is hamiltonian. We consider the graph šŗāˆ— . Let š‘Š1 be the hamiltonian path of šµ1 joining š‘£ š‘˜ āˆ’ to š‘£š‘– + , and let š‘Š2 be the hamiltonian path of šµ2 āˆ’ š‘£š‘— + joining š‘£š‘” āˆ’ to š‘£ š‘˜ + . Then, we have š¶ā€² = (š‘£š‘– š‘Šš‘£š‘— š‘£š‘— + š‘£š‘” š‘£š‘” āˆ’ š‘Š2 š‘£ š‘˜ + š‘£ š‘˜ š‘£ š‘˜ āˆ’ š‘Š1 š‘£š‘– + š‘£š‘–) is a hamiltonian cycle of šŗāˆ— , i.e šŗāˆ— is hamiltonian, therefore šŗ is hamiltonian, a contradiction. Thus, the Case 3.3 does not happen.
  • 62. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 15, No. 2. MARCH 2015 60 6. ACKNOWLEDGEMENTS This research was supported by Vietnam National Foundation for Science and Technology Development grant 102.01-2012.29. REFERENCES [1] Alan, G. Algorithmic Graph Theory. Cambridge University Press. Published June 27th 1985. [2] Bondy, J. A., and ChvĆ”tal, V. A Method in Graph Theory. Discrete Math. 15 (1976), pp 111-135. [3] Cuckler, B., and Kahn, J. Hamiltonian cycles in Dirac graphs. Combinatorica, 29, (2009), pp 299-326. [4] Diestel, R. Graph Theory. Springer. Third Edition (2005). [5] Ferrara, M., Jacobson, M. S., and Harris, A. Cycle lengths in a Hamiltonian Graphs with a pair of vertices having large degree sum. Graphs and Combinatorics, 26 (2010), pp 215-223. [6] Jung, H. A. On maximal circuits in finite graphs. Ann. Discrete Math., 3 (1978), pp. 129-144. [7] Hoa, V. D., and Truong, N. H. X. Hamilton cycle of graphs šœŽ2 āˆ— ≄ š‘›. Journal Of Computer Science And Cybernetics., 28, No.2 (2012), pp 153-160. [8] Hoa, V. D., and Truong, N. H. X. Hamiltonian in graphs šœŽ3 ≄ 3 2 š‘› āˆ’ 1. In Proceedings of the 7th National Conference on Fundamental and Applied Information Technology Research (FAIR’7) (Thai Nguyen, Vietnam, June 19-20, 2014). Vietnam Academy of Science and Technology Press, Hanoi, 2014, pp 60-67. [9] Krivelevich, M., Lee, C., and Sudakov, B. Long paths and cycle in random subgraphs of graphs with large minimum degree. Random Structure & Algorithm, volume 46, Issue 2, pp. 320–345, March 2015. [10]Nishiyama, H., Kobayashi, Y., Yamauchi, Y., Kijima, S., & Yamashita, M. (2015). The Parity Hamiltonian Cycle Problem. arXiv preprint arXiv:1501.06323. This paper may be cited as: Truong, N. H. X. and Hoa, V. D., 2015. Hamiltonian cycle in graphs σ4≄2n. International Journal of Computer Science and Business Informatics, Vol.15, No. 2, pp. 38-60.