• Tidak ada hasil yang ditemukan

Bounds on the Identifying Codes in Trees

N/A
N/A
Protected

Academic year: 2024

Membagikan "Bounds on the Identifying Codes in Trees"

Copied!
11
0
0

Teks penuh

(1)

https://doi.org/10.1007/s00373-019-02018-1 O R I G I N A L P A P E R

Bounds on the Identifying Codes in Trees

Hadi Rahbani1·Nader Jafari Rad2·Seyed Masoud MirRezaei3

Received: 12 February 2017 / Revised: 27 August 2018 / Published online: 20 February 2019

© Springer Japan KK, part of Springer Nature 2019

Abstract

In this paper, we continue the study of identifying codes in graphs, introduced by Karpovsky et al. (IEEE Trans Inf Theory 44:599–611,1998). A subsetSof vertices in a graphGis anidentifying codeif for every pair of verticesxandyofG, the sets N[x] ∩SandN[y] ∩Sare non-empty and different. The minimum cardinality of an identifying code in Gis denoted by M(G). We show that for a treeT withn ≥ 3 vertices,ℓleaves andssupport vertices,(2ns+3)/4≤M(T)≤(3n+2ℓ−1)/5.

Moreover, we characterize all trees achieving equality for these bounds.

Keywords Identifying code·Tree Mathematics Subject Classification 05C69

1 Introduction

For notation and graph theory terminology in general we follow [10]. We consider finite, undirected, and simple graphs G with vertex set V = V(G) and edge set E =E(G). The number of vertices|V(G)|of a graphGis called theorderofGand is denoted byn=n(G).Theopen neighborhoodof a vertexv∈V, denoted byN(v) (or NG(v)to refer it toG), is the set{uV |uv∈ E}and thedegreeofv, denoted by deg(v)(or degG(v)to refer toG), is the cardinality of its open neighborhood. A leaf of a tree T is a vertex of degree one, while a support vertex ofT is a vertex

B

Nader Jafari Rad [email protected] Hadi Rahbani

[email protected] Seyed Masoud MirRezaei [email protected]

1 Department of Mathematics, Shahrood University of Technology, Shahrood, Iran 2 Department of Mathematics, Shahed University, Tehran, Iran

3 Department of Electrical Engineering, Shahrood University of Technology, Shahrood, Iran

(2)

adjacent to a leaf. Astrong support vertexis a support vertex adjacent to at least two leaves, and aweak support vertexis a support vertex adjacent to precisely one leaf.

We denote the set of all support vertices of a treeT byS(T)and the set of leaves by L(T). We always denoteℓ=ℓ(T)= |L(T)|, ands =s(T)= |S(T)|. Whenever a treeT(orT′′, …) is introduced, we letn, ℓ(orn′′, ℓ′′,…) be its order, and number of leaves, respectively. A rooted treeT distinguishes one vertexucalled the root. For each vertexv=uofT we denote byTvthe sub-rooted tree rooted atv.

We also denote byℓvthe number of leaves adjacent to a support vertexv. We denote a path of ordern by Pn(or Pn :v1v2. . . vn, whereV(Pn)= {v1, . . . , vn}andvi is adjacent tovi+1fori =1,2, . . . ,n−1). Thedistance d(x,y)between two vertices xandyis the length of a shortest path fromxtoy. Thediameter di am(G)of a graph Gis the maximum distance over all pairs of vertices ofG. For a rooted treeT and a vertexv, we denote byTvthe sub-rooted tree, rooted atv. Asubdivisionof an edgeuv is obtained by replacing the edgeuvwith a pathuwv, wherewis a new vertex. The subdivision graphof a graphGis the graph obtained fromGby subdividing each edge ofG. The subdivision tree of a tree of order at least three, is called ahealthy spider. A wounded spideris the graph formed by removing at least one leaf of a healthy spider.

Aspideris a tree which is either a healthy spider or a wounded spider.

A subsetDof vertices in a graphGis anidentifying codeif for every two verticesx andyofG, the setsN[x]∩DandN[y]∩Dare non-empty and different. The minimum cardinality of an identifying code inGis denoted byM(G). Any identifying code with M(G)elements is called aM(G)-set. Identifying codes were defined in [12] to model fault diagnosis in multiprocessor systems. In these systems, it may happen that some of the processors become faulty, in some sense that depends on the purpose of the system, and we wish to detect and replace such processors, so that the system can work properly. This concept was further studied in, for example, [1–3,5–9]. Bertrand et al. [2] obtained the minimum cardinality of an identifying code in a path.

Theorem 1 (Bertrand et al. [2])For a path Pn, M(Pn)=(n+1)/2if n≥1is odd, and M(Pn)=(n+2)/2if n≥4is even.

Blidia et al. [3] obtained the following lower bound for the minimum cardinality of an identifying code of a tree.

Theorem 2 (Blidia et al. [3])If T is a tree of order n ≥ 4, then M(T) ≥ 3(n+ℓ

s+1)/7, and this bond is sharp for infinitely many values of n.

In this paper we show that for a treeT withn ≥3 vertices,lleaves andssupport vertices,(2ns+3)/4≤M(T)≤(3n+2ℓ−1)/5. Moreover, we characterize all trees achieving these bounds. With our lower bound, the bound given in Theorem2 is improved for trees of ordern withℓleaves andssupport vertices, where 2n+9

≥12ℓ−5s. The following is useful.

Observation 3 (Blidia et al. [3])If C is a M(T)-set in a tree T , then at most one vertex of Lxis not in C for each support vertex x, where Lxis the set consisting x and all of its leaves. Moreover, C contains at leastvertices of L(T)∪S(T).

We end this section by stating a variant of domination, namelydifferentiating-total dominating setwhich is similar to an identifying code. Atotal dominating setof a graph

(3)

Gwith no isolated vertex is a setSof vertices such that every vertex ofGis adjacent to a vertex inS. A total dominating setSof a graphGis adifferentiating-total dominating set if for every pair of distinct verticesuandvinV(G),N[u] ∩S = N[v] ∩S. Let γtD(G)be the minimum cardinality of a differentiating-total dominating set ofG. This variant has been introduced by Haynes, Henning and Howard [11], and further studied, for example in, [4,13]. The following follows immediately from the definition.

Observation 4 Any differentiating-total dominating set in a graph is an identifying code.

2 Lower Bound

In this section we give a lower bound on the identifying code of a tree, and characterize all trees achieving equality of the lower bound. Thecoronaof two graphsG1andG2, denoted byG1G2, is a graph obtained by taking one copy ofG1and|V(G1)|copies ofG2, and then joining each vertex of thei-th copy ofG2to thei-th vertex ofG1, where 1≤i ≤ |V(G1)|. IfG2=K1, then we denoteG1G2bycor(G1).

Theorem 5 If T is a tree of order n ≥ 4 with s support vertices, then M(T)

≥(2ns+3)/4, with equality if and only if T =P3or T =cor(P3).

Proof We proceed by induction on the ordern. If 3≤ n ≤ 5, then it can be easily checked thatM(T)≥(2ns+3)/4, and equality holds if and only ifT =P3. These are sufficient for the base step of the induction. Assume that the result holds for any treeTof ordern<n. Now consider the treeTof ordern≥6. LetCbe aM(T)-set that contains as few leaves ofTas possible. Assume thatu, v∈VCanduv∈ E(T).

LetTuandTvbe the components ofTuvwithuV(Tu)andv∈V(Tv). Assume thatw ∈ V(Tu)∩C, then N(w)−N(u) = ∅. Hence|V(Tu)| ≥ |N(w)| ≥ 3 and similarly|V(Tv)| ≥ 3. Sinceu ∈/ C, the setCV(Tu)is an identifying code for Tu and also the setCV(Tv)is an identifying code ofTv. Hence by the induction hypothesis, we have

|C| = |CV(Tu)| + |CV(Tv)|

≥(2|V(Tu)| − |S(Tu)| +3)/4+(2|V(Tv)| − |S(Tv)| +3)/4

≥(2n−(s+2)+6)/4> (2ns+3)/4.

ThusVCis an independent set.

Now assume that there exists a vertexw ∈ VC, such that deg(w) ≥ 3. Let {x,y,z} ⊆ N(w). SinceVC is an independent set, we have {x,y,z} ⊆ C. Let Tx andTwbe the components ofTxwwithxV(Tx)andw∈ V(Tw). Clearly CV(Tx)is an identifying code forTxandCV(Tw)is an identifying code forTw. By the inductive hypothesis,

|C| = |CV(Tx)| + |CV(Tw)|

≥(2|V(Tx)| − |S(Tx)| +3)/4+(2|V(Tw)| − |S(Tw)| +3)/4

≥(2n−(s+1)+6)/4> (2ns+3)/4.

(4)

Thus we assume for the next that deg(w)≤2 for every vertexw∈VC.

Assume thatT[C]is connected. Then deg(w)=1 for every vertexw ∈ VC, and soV −(LS)⊆C. By Observation3,C contains at leastℓvertices ofLS.

Thus|C| ≥ |V−(LS)| + |C∩(LS)| ≥ |V−(LS)| +l=ns. Ifℓ≥4, then 2n≥2ℓ+2s≥3s+ℓ≥3s+4 and soM(T)≥ns> (2ns+3)/4, as desired.

Thus we may assume thatℓ≤3. Ifℓ >s, thenl=3 ands=2, sincen≥6. Hence 2n≥2ℓ+2s≥10 and thusM(T)≥ns=n−2> (2n+1)/4=(2ns+3)/4, as desired. Thus we may assume thatℓ=s. Similarly, we may assume thatn=ℓ+s.

Ifℓ=2, thenn =4, a contradiction. Thus assume thatℓ=3. Then T = cor(P3) andM(T)=3=(2ns+3)/4.

Next assume thatT[C]is not connected. LetC1be a largest component ofT[C].

If|V(C1)| = 1, then C is independent, LC and deg(w) = 2 for every vertex w ∈ VC. We show thatn = 2|C| −1. LetT be the graph of order|C| with V(T)= C such thatuv ∈ E(T)if and only if there exists a vertexw ∈ VC withNT(u)∩NT(v)= {w}. Then|E(T)| = |VC|and sinceT is a tree, by the construction ofT, it follows thatTis a tree. Therefore we have,n= |C| + |VC|

= |C| + |E(T)| = |C| + |C| −1 =2|C| −1. Now, sinceT is not a star, we have

|C| =(n+1)/2 > (2ns+3)/4,as desired. Thus, assume that|V(C1)| ≥2. If

|V(C1)| =2 andC1= {x,y}, thenN(x)∩C= {x,y} =N(v)∩C, a contradiction.

Hence|V(C1)| ≥3. Letv ∈ V(C1)be a vertex such that N(v)−V(C1)= ∅, and w ∈ N(v)−V(C1)be a vertex with deg(w)=2. Let N(w)= {u, v}. SinceT[C1] is connected, we find thatu ∈/ C1. Assume that deg(v)=2. LetT =T −wu, and Tw andTube the components ofT −wuwithw ∈ V(Tw)anduV(Tu). Clearly CV(Tw)is an identifying code forTwandCV(Tu)is an identifying code forTu. By the inductive hypothesis, we can easily obtain that|C| = |CV(Tw)| + |CV(Tu)|

≥(2|V(Tw)| − |S(Tw)| +3)/4+(2|V(Tu)| − |S(Tu)| +3)/4> (2ns+3)/4. Thus we may assume that deg(v)≥3.

Assume that N(u)∩C = ∅. If deg(u) =2, then the result follows as before by lettingT=T−wv. Thus assume that deg(u)≥3. LetTvandTube the components ofT−wwithv∈V(Tv)anduV(Tu). As before,CV(Tv)is an identifying code forTvandCV(Tu)is an identifying code forTu. By the inductive hypothesis, we have|C| = |CV(Tu)| + |CV(Tv)| ≥(2|V(Tu)| − |S(Tu)| +3)/4+(2|V(Tv)|

− |S(Tv)| +3)/4 ≥(2ns+6)/4 > (2ns+3)/4.Thus we may assume that N(u)∩C = ∅. LetTu andTv be the components ofT −w, defined as before. If

|V(Tu)| =1, thenC =(C− {u})∪ {w}is aM(T)-set with|LC|<|LC|, a contradiction by the choice ofC ( sinceC is aM(T)-set that contains as few leaves ofT as possible.) Thus,|V(Tu)| ≥2, and so we obtain that|V(Tu)| ≥3. IfTuis a path, then by Theorem1, we have,

M(T)= |CV(Tu)| + |CV(Tv)| ≥ M(Tu)+ |Cv|

≥(nu+1)/2+(2nvsv+3)/4

> (2nusu+3)/4+(2nvsv+3)/4

=(2(nu+nv)−(su+sv)+6)/4

=(2(n−1)−(s+1)+6)/4=(2ns+3)/4.

(5)

Thus we assume thatTuis not a path. LetuV(Tu)be a vertex such that deg(u)

≥ 3 and every internal vertex in the(u,u)-path has degree two. Letd = d(u,u) andP be the(u,u)-path. Let P : x0x1. . .xd, wherex0 =u andxd =u. Assume that |N(xi)∩C| = 1 for some i ∈ {0,1, . . . ,d −1}. Without loss of generality, assume that xi−1N(xi)∩(VC). Then the result follows easily as before by letting T = Txi−1xi−2. Thus we may assume that N(xi)∩C = ∅ for every i = 0,1, . . . ,d −1. Since VC is independent and uC, we have x2jC for j = 0,1, . . . ,⌊d/2⌋. Since xd = uC, we find thatd is even. We deduce that |C ∩(V(P)− {u})| = d/2. Assume that Tv,Tu are the two components of (T −(V(P)∪ {w}))∪ {u}, withv∈V(Tv)anduV(Tu). As before,CV(Tv) is an identifying code forTv andCV(Tu)is an identifying code forTu. By the inductive hypothesis,

|C| = |CV(Tu)| + |CV(Tv)| +d/2

≥(2|V(Tu)| − |S(Tu)| +3)/4+(2|V(Tv)| − |S(Tv)| +3)/4+d/2

=(2(nd−1)−s+6)/4+d/2> (2ns+3)/4.

This completes the proof. ⊓⊔

We note that if 2n+9 ≥12ℓ−5s, then the lower bound of Theorem5is better than the bound given in Theorem2.

3 Upper Bound

We begin this section with the following.

Theorem 6 (Ning et al. [13])If T is a tree of order n ≥3withleaves, thenγtD(T)

≤3(n+ℓ)/5, with equality if and only if T =P3, or T ∈F.

As noted in Observation4, any differentiating-total dominating set is an identifying code, as well. Thus for any graphG,M(G)≤γtD(G). Now from Theorem6, we obtain the following upper bound.

Corollary 7 For any tree T of order n≥4, M(T)≤3(n+ℓ)/5.

Our aim in this section is to improve Corollary7for any tree T of ordern ≥ 3.

We show that for any treeT of ordern≥3 withℓleaves,M(T)≤(3n+2ℓ−1)/5, and characterize all trees achieving equality for this bound. We first present some necessary lemmas. The following is easily verified.

Lemma 8 If T is a tree obtained from a tree Tof order n≥3by adding a leaf to T, then M(T)≤M(T)+1.

Proof Assume thatTis a tree of ordern≥3 andT is obtained fromTby adding a new vertexwtoTwith edgewv, wherev∈V(T). LetCbe aM(T)-set. Ifv /∈C, thenC∪ {w}is an identifying code forT, and soM(T)≤ M(T)+1. Thus assume

(6)

thatv∈ C. IfNT(v)∩C= ∅, thenC∪ {w}is an identifying code forT, and so the result follows. Thus assume thatNT(v)∩C= ∅. LetuNT(v). ThenC∪ {u} is an identifying code forT, and soM(T)≤M(T)+1. ⊓⊔ Lemma 9 Let Tbe a spider tree with central vertexwsuch thatdeg(w)≥2, and T be an arbitrary tree. Let T be a tree obtained from Tand Tby joiningwto a vertex v∈V(T), and T′′=T−v. Ifdeg(v)≥3and M(T)≤(3n(T)+2ℓ(T)−1)/5 or deg(v) = 2 and M(T′′) ≤ (3n(T′′)+2ℓ(T′′)−1)/5, then M(T) < (3n(T) +2ℓ(T)−1)/5.

Proof Each vertex of N(w)is a leaf or a support vertex of degree two, sinceTis a spider tree. Letr1 be the number of leaves of T at distance one fromwandr2

be the number of leaves of T at distance two fromw. LetC be a M(T)-set. If deg(v)≥3, thenC=CNT[w]is an identifying code forT. Thus we obtain that M(T)≤M(T)+r2+r1+1≤(3n+2ℓ−1)/5+r2+r1+1< (3n+2ℓ−1)/5, sincen = n−2r2r1−1 andℓ = ℓ−r1r2. Thus assume that deg(v)= 2.

IfC′′is a M(T′′)-set, thenC = C′′NT[w]is an identifying code forT. Hence M(T)≤M(T′′)+r2+r1+1≤(3n′′+2ℓ′′−1)/5+r2+r1+1< (3n+2ℓ−1)/5, sincen′′=n−2r2r1−2 andℓ′′≤ℓ−r1r2+1. ⊓⊔ Lemma 10 Let Tbe an arbitrary tree andv ∈ V(T)be a vertex withdeg(v)≥ 2, and T be a tree obtained from T by joining v to a leaf of a path P3. If M(T)

≤(3n(T)+2ℓ(T)−1)/5, then M(T) < (3n(T)+2ℓ(T)−1)/5.

Proof Assume that T is obtained from T by joining v to the leaf w of a path P3 = wzy. Let C be a M(T)−set. If v ∈ C, then C ∪ {w,z} is an identifying code for T and if v /∈ C, then C ∪ {w,y} is an identifying code for T. Hence M(T) ≤ M(T) + 2 ≤ (3n(T) + 2ℓ(T) − 1)/5 + 2

≤(3(n−3)+2(ℓ−1)−1)/5+2< (3n+2ℓ−1)/5. ⊓⊔ We are now ready to present the main result of this section.

Theorem 11 For any tree T , of order n≥3withleaves, M(T)≤(3n+2ℓ−1)/5.

Equality holds if and only if T = P4.

Proof We use an induction on the ordern ofT to prove the upper bound. The base step is obvious forn =3 andn =4. Assume that for any treeTof ordern <n, withlleaves,M(T)≤(3n+2ℓ−1)/5. Now consider the treeT of ordern >4.

Assume that T has a strong support vertex. Letv be a strong support vertex, and u be a leaf adjacent tov. Let T = Tu. By Lemma 8, M(T) ≤ M(T)+1.

By the inductive hypothesis, M(T)≤ M(T)+1 ≤(3n(T)+2ℓ(T)−1)/5+1

=(3(n−1)+2(ℓ−1)−1)/5+1=(3n+2ℓ−1)/5. Thus we may assume for the next thatT has no strong support vertex.

Letd =di am(T). Sincen>4 andT has no strong support vertex, we haved≥4.

We rootT at a leafx0of a diametrical pathx0x1. . .xdfromx0to a leafxdfarthest fromx0. Thus, deg(xd−1)=deg(x1)=2.

Assume thatd = 4. Note that deg(x3) =2. If deg(x2) = 2, thenT = P5, and M(T)=3< (3n+2ℓ−1)/5. Thus assume that deg(x2) >2. Ifx2is a support vertex,

(7)

thenThas deg(x2)−1 support vertices of degree two. ThenN[x2]−Lis an identifying code forT, implying thatM(T)≤deg(x2) < (3n+2ℓ−1)/5, sincen =2 deg(x2) andℓ =deg(x2). Thus assume thatx2is not a support vertex. ThenT has deg(x2) support vertices of degree two, and we can see thatN[x2]is an identifying code for T, implying thatM(T)≤deg(x2)+1< (3n+2ℓ−1)/5, sincen =2 deg(x2)+1 andℓ=deg(x2).

Assume next that d = 5. Note that deg(x4) = 2. Assume that deg(x3) = 2. If deg(x2)= 2, thenT = P6, and M(T)= 4 < (3n+2ℓ−1)/5. Thus assume that deg(x2) >2. Sinced =5, any vertex of N(x2)− {x3}is a leaf or a support vertex of degree two. Assume thatx2is a support vertex. There is a unique leaf adjacent to x2. ThenS(T)∪ {x3}is an identifying code forT, implying thatM(T)≤ |S(T)| +1

= deg(x2)+1 < (3n +2ℓ−1)/5, since n = 2 deg(x2)+1 and ℓ = deg(x2).

Thus assume thatx2is not a support vertex. ThenS(T)∪ {x2,x3}is an identifying code forT, implying that M(T)≤ |S(T)| +2 =deg(x2)+2 < (3n+2ℓ−1)/5, since n = 2 deg(x2)+2 andℓ = deg(x2). Thus assume that deg(x3) ≥ 3, and similarly, deg(x2)≥3. SinceT has no strong support vertex, any child ofx3is a leaf or a support vertex of degree two. Letr1be the number of leaves ofTx3 at distance one from x3 andr2 be the number of leaves of Tx3 at distance two fromx3. Note that deg(x3) =r1+r2+1. LetT = TTx3, thenn = nr1−2r2−1 and ℓ=ℓ−r1r2. IfCis aM(T)-set, thenC =CNTx

3[x3]is an identifying code for T. Hence M(T)≤ M(T)+r2+r1+1 ≤ (3n+2ℓ−1)/5+r2+r1+1

=(3n+2ℓ−3r2+1)/5< (3n+2ℓ−1)/5, sincer2≥1.

Thus assume that d ≥ 6. If deg(xd−2) ≥ 3, then by the inductive hypothesis and Lemma9,M(T) < (3n+2ℓ−1)/5, sinceTxd−2 is a spider. Thus assume that deg(xd−2)=2. If deg(xd−3)≥3, then from the inductive hypothesis and Lemma10, we obtainM(T) < (3n+2ℓ−1)/5. We thus assume that deg(xd−3)=2.

We next proceed according to the value of deg(xd−4). First assume that deg(xd−4)

=2. Assume that deg(xd−5)≥3. LetT=TTxd−4, andCbe aM(T)−set. Then C∪ {xd−1,xd−2,xd−3}is an identifying code for T. By the inductive hypothesis, M(T)≤ M(T)+3 ≤ (3(n−5)+2(ℓ−1)−1)/5+3 < (3n+2ℓ−2)/5. We thus assume that deg(xd−5) = 2. Assume that deg(xd−6) ≥ 3. Let y0′′ be a leaf of Txd−6− {xd,xd−1, . . . ,xd−5}at maximum distance fromxd−6, andy0′′y1′′. . .yt′′xd−6 be the shortest path fromy0′′toxd−6inTxd−6− {xd,xd−1, . . . ,xd−5}. Clearlyt ≤5.

With a similar argument as before, we can assume thatt ∈ {0,3,5}, and deg(yi′′)=2 fori =1, . . . ,t−1 ift ∈ {3,5}. LetAbe the set vertices ofTxd−6 at even distance fromxd−6. LetT=TTxd−6, andCbe aM(T)-set. ThenCA∪ {xd−6,xd−5} is an identifying code forT. Letribe the number of leaves ofTxd−6at distanceifrom xd−6fori ∈ {1,4,6}. By the inductive hypothesis,

M(T)≤ M(T)+ |A| +2

= M(T)+3r6+2r4+2

≤(3(n−6r6−4r4r1−1)+2(ℓ−r6r4r1+1)−1)/5+3r6+2r4+2

< (3n+2ℓ−2)/5.

(8)

We thus assume that deg(xd−6) = 2. IfT = P8 or T = P9, then M(T) = 5

< (3n +2ℓ−1)/5. Thusn > 9. LetT = TTxd−6, and C be a M(T)-set.

Ifxd−7C, then C∪ {xd−1,xd−2,xd−3,xd−5}is an identifying code ofT, and if xd−7 ∈/ C, then C∪ {xd,xd−2,xd−4,xd−6}is a identifying code of treeT. By the inductive hypothesis, M(T) ≤ M(T)+4 ≤ (3(n −7)+2ℓ−1)/5+4 <

(3n+2ℓ−1)/5.

Next assume that deg(xd−4)≥3. Lety0be a leaf ofTxd−4− {xd,xd−1,xd−2,xd−3} at maximum distance from(xd−4), and y0y1. . .yqxd−4be the shortest path fromy0 toxd−4. Clearlyq ≤3.

Assume that q = 3. Since y0 plays the same role of xd, we may assume that deg(yi) = 2 fori = 1,2,3. By Lemmas9and10, we may assume thatTxd−4 has no leaf at distance 3 from xd−4. Assume thatTxd−4 has a leafb at distance 2 from xd−4, and let a be the support vertex adjacent tob. Evidently, deg(a) = 2. Let T

=T − {xd,xd−1,xd−2,xd−3}, andCbe aM(T)-set. Ifxd−4∈/C, thenN(a)∩C

=N(b)∩C, a contradiction. Hencexd−4Cand soC∪{xd,xd−2}is an identifying code forT. Then by the inductive hypothesis, we obtainM(T) ≤ |C| +2 ≤(3(n

−4)+2(ℓ−1)−1)/5+2< (3n+2ℓ−1)/5. We thus assume thatTxd−4has no leaf at distance 2 fromxd−4. Letr1be the number of leaves ofTxd−4adjacent toxd−4, and r4be the number of leaves ofTxd−4at distance four fromxd−4. Note thatr1≤1. LetA be the set of all vertices ofTxd−4at distance 2 or 4 fromxd−4. Assume thatr1=1. Let T=TTxd−4. IfCis aM(T)-set, thenCA∪ {xd−3,xd−4}is an identifying code forT. Then by the inductive hypothesis,M(T)≤ M(T)+ |A| +2≤(3(n−4r4−2) +2(ℓ−r4)−1)/5+2r4+2=((3n+2ℓ−2)−4r4−3r1+7)/5< (3n+2ℓ−2)/5, since r4≥2. Thus assume thatr1=0. If deg(xd−5)≥2, then the result follows as before by lettingT = TTxd−4. Thus assume that deg(xd−5)=2. LetT = TTxd−5, andC be aM(T)-set. Then(CA)∪ {xd−3,xd−4}is an identifying code forT. ThenM(T)≤ M(T)+ |A| +2≤(3(n−4r4−2)+2(ℓ−r4+1)−1)/5+2r4+2

=((3n+2ℓ−2)−4r4+6)/5< (3n+2ℓ−2)/5.

Assume next thatq = 2. Then deg(y1) =2. If deg(y2)≥ 3, then the inductive hypothesis and Lemma9imply that,M(T) < (3n+2ℓ−1)/5. Thus assume that deg(y2) = 2. Then by the inductive hypothesis and Lemma10, we have M(T) <

(3n+2ℓ−1)/5.

Now assume thatq =1. Then deg(y1)=2. LetT=T− {xd,xd−1,xd−2,xd−3}, andCbe aM(T)−set. Ifxd−4∈/C, thenN(y0)∩C=N(y1)∩C, a contradiction.

Hencexd−4Cand soC∪ {xd,xd−2}is an identifying code forT. ThenM(T)

M(T)+2≤(3(n−4)+2(ℓ−1)−1)/5+2< (3n+2ℓ−2)/5.

It remains to assume that q = 0. Observe thatxd−4 is a weak support vertex.

Furthermore, deg(xd−4) = 3. Assume that deg(xd−5) ≥ 3. LetT = TTxd−4, andC be aM(T)-set. Clearlyn(T) ≥ 3. ThenC∪ {xd−1,xd−2,xd−3,xd−4}is an identifying code forT, and so by the inductive hypothesis, M(T)≤ M(T)+4

≤(3n(T)+2ℓ(T)−1)/5+4< (3n+2ℓ−2)/5, sincen(T)=n−6 andℓ(T)= ℓ−2. Thus assume that deg(xd−5)=2. Ifd =6, thenT is a tree obtained from the pathP7:x0x1. . .x6by adding a leaf tox2, and note thatM(T)=5< (3n+2ℓ−1)/5.

We thus assume thatd ≥7.

Assume that deg(xd−6) = 2. If d = 7, then T is obtained from a path P8 : x0x1. . .x7 by adding a leaf to x3, and so we can see that M(T) ≤ 6

(9)

< (3n+1ℓ−2)/5. Ifd=8, then deg(x2)=2, sincex0can plays the same role ofxd. SoTis obtained from a pathP9:x0x1. . .x8by adding a leaf tox4, and we observe that M(T)≤6< (3n+1ℓ−2)/5. Thus assume thatd ≥9. LetT=TTxd−6, and letC be aM(T)-set. ThenC∪ {xd−1,xd−2,xd−3,xd−4,xd−5}is an identifying code for T. By the inductive hypothesis,M(T)≤ M(T)+5≤(3n(T)+2ℓ(T)−1)/5+4

< (3n+2ℓ−2)/5, sincen(T)=n−8 andℓ(T)≤ℓ−1.

Thus assume that deg(xd−6)≥3. LetT =TTxd−5, andCbe aM(T)-set. If xd−6C, thenC∪ {xd,xd−2,xd−4,xd−5}is an identifying code forT, and by the

inductive hypothesis, M(T) ≤ M(T) + 4

≤ (3n(T)+2ℓ(T)−1)/5+4 < (3n +2ℓ−2)/5, sincen(T) = n −7 and ℓ(T)=ℓ−2. Thus we assume thatxd−6∈/ C. Hencexd−6does not have a child which is a support vertex of degree two.

Let y0be a leaf ofTxd−6 − {y0,xd,xd−1, . . . ,xd−5}at maximum distance from xd−6, and y0y1. . .ytxd−6be the shortest path from y0 toxd−6. Clearly,t ≤ 5. As noted earlier,t =1. We proceed depending ont.

Assume that t = 5. Since y0 plays the same role of xd, we may assume that deg(yi) = 2 for i = 1,2,3,5, and y4 is a support vertex of degree three. Let T = TTy

5, and C be a M(T)-set. If xd−6 ∈/ C, then |C ∪ {xd,xd−1,xd−2,xd−3,xd−4,xd−5,y0}| ≥5. ThenC′′=(C−{xd,xd−1,xd−2,xd−3, xd−4,xd−5,y0})∪ {xd,xd−2,xd−4,xd−5,xd−6}is aM(T)-set. Thus we may assume that xd−6C. ThenC = C∪ {y1,y2,y3,y4}is an identifying code for T. By the inductive hypothesis, M(T)≤ M(T)+4 ≤ (3n(T)+2ℓ(T)−1)/5+4 ≤ (3(n−7)+2(ℓ−2)−1)/5+4< (3n+2ℓ−2)/5.

If t = 4, then by Lemmas 9 and 10we may assume that deg(y1) = deg(y2)

=deg(y3)=2. Assume that deg(y4)=2. LetT=TTy

4, andCbe aM(T)−set.

ThenC∪ {y1,y2,y3}is an identifying code forT, and by the inductive hypothesis, M(T)≤M(T)+3≤(3n(T)+2ℓ(T)−1)/5+3=(3(n−5)+2(ℓ−1)−1)/5+3

< (3n+2ℓ−2)/5. Thus assume that deg(y4)≥3. By Lemmas9and10, we may assume that there is no leaf inTy

4 at distance 3 fromy4. Thus any leaf ofTy

4 is at distance 1,2 or 4 from y4. Letri be the number of leaves ofTy

4 at distancei from y4fori =1,2,4. SinceT has no strong support vertex,r1≤ 1. Note that for every leafxofTy

4at distance 2 or 4 fromy4, any internal vertexwof the path fromxtoy4 (w /∈ {x,y4}) has degree two. Let Abe the set of verticesTy

4at distance 2 or 4 from y4. LetT=TTy

4, andCbe aM(T)-set. ThenCA∪ {y3,y4}is an identifying code forT. Thus by the inductive hypothesis,

M(T)≤M(T)+ |A| +2

= M(T)+2r4+r2+2

≤(3n(T)+2ℓ(T)−1)/5+2r4+2

≤(3(n−4r4−2r2r1−1)+2(ℓ−r4r2r1)−1)/5+2r4+r2+r1+1

≤(3n+2ℓ−1+(−4r4−3r2−5r1+7))/5

< (3n+2ℓ−1))/5.

(10)

Next assume that t = 3. By Lemmas 9 and 10, we may assume that deg(y1)

=deg(y2)=deg(y3)=2. LetT =TTy

3 andCbe aM(T)-set. Ifxd−6∈/C, then clearly |C ∪ {xd,xd−1,xd−2,xd−3,xd−4,xd−5,y0}| ≥ 5, and so C′′ = (C

− {xd,xd−1,xd−2,xd−3,xd−4,xd−5,y0})∪ {xd,xd−2,xd−4,xd−5,xd−6}is aM(T)- set. Thus we may assume thatxd−6C. ThenC =C∪ {y0,y2}is an identifying code forT. By the inductive hypothesis,M(T)≤ M(T)+2 ≤ (3n(T)+2ℓ(T)

−1)/5+3=(3(n−4)+2(ℓ−1)−1)/5+2< (3n+2ℓ−2)/5.

Next assume thatt =2. We may assume that deg(y1)=2. Now the result follows by the inductive hypothesis and Lemmas9and10. Sincexd−6does not have a child which is a support vertex of degree two, we havet =1.

Hencet = 0. Thenxd−6is a support vertex of degree 3. Let T = TTxd−6. Ifn(T) = 1, thenn = 10, and{xd,xd−2,xd−4,xd−5,xd−6,y0}is an identifying code for T, and so M(T) = 6 < (3n+2ℓ−1)/5. Ifn(T) = 2, then n = 11, and{xd,xd−2,xd−4,xd−5,xd−6,xd−7}is an identifying code forT, and so M(T)

= 6 < (3n+2ℓ−1)/5. Thus we assume thatn(T)≥ 3. LetC be a M(T)-set.

ThenC∪ {xd,xd−2,xd−4,xd−5,xd−6}is an identifying code forT. By the inductive hypothesis,M(T)≤M(T)+5≤(3n(T)+2ℓ(T)−1)/5+4< (3n+2ℓ−2)/5.

Thus the upper bound is proved.

Now we prove the second part of the theorem. LetT be a tree of ordern≥3, with M(T)=(3n+2ℓ−1)/5. Suppose thatdi am(T)≥ 4. IfT has no strong support vertex, then as it is seen above,M(T) < (3n+2ℓ−1)/5, a contradiction. Thus assume thatT has some strong support vertex. LetTbe a tree obtained fromT by removing ℓv−1 leaves of every strong support vertexv. ClearlyThas no strong support vertex, and as before,M(T) < (3n(T)+2ℓ(T)−1)/5=(3(n−ℓ+s)+2s−1)/5. By Lemma8,M(T)≤M(T)+ℓ−s< (3(n−ℓ+s)+2s−1)/5+ℓ−s=(3n+2ℓ−1)/5, a contradiction. We deduce thatdi am(T)≤3. Ifdi am(T)=2, thenT is a star, and thusM(T)=n−1< (3n+2ℓ−1)/5. Thusdi am(T)=3. ThenT is a double-star.

Now it can be easily seen that the assumptionM(T)=(3n+2ℓ−1)/5 implies that

T =P4. The converse is obvious. ⊓⊔

Acknowledgements The authors would like to thank both referees for their careful review and many helpful comments.

References

1. Balbuena, C., Foucaud, F., Hansberg, A.: Locating-dominating sets and identifying codes in graphs of girth at least 5. Electron. J. Combin.22(2), P2.15 (2015)

2. Bertrand, N., Charon, I., Hudry, O., Lobstein, A.: Identifying and locating-dominating codes on chains and cycles. Eur. J. Combin.25, 969–987 (2004)

3. Blidia, M., Chellali, M., Maffray, F., Moncel, J., Semri, A.: Locating-domination and identifying codes in trees. Australas. J. Combin.39, 219–232 (2007)

4. Chellali, M.: On locating and differentiating-total domination in trees. Discuss. Math. Graph Theory 28, 383–392 (2008)

5. Chen, X.-G., Sohn, M.Y.: Bounds on the locating-total domination number of a tree. Discrete Appl.

Math.159, 769–773 (2011)

6. Foucaud, F., Henning, M.A.: Location-domination in line graphs. Discrete Math.340, 3140–3153 (2017)

(11)

7. Foucaud, F., Perarnau, G.: Bounds for identifying codes in terms of degree parameters. Electron. J.

Combin.19(1), P32 (2012)

8. Foucaud, F., Klasing, R., Kosowski, A., Raspaud, A.: On the size of identifying codes in triangle-free graphs. Discrete Appl. Math.160, 1532–1546 (2012)

9. Foucaud, F., Gravier, S., Naserasr, R., Parreau, A., Valicov, P.: Identifying codes in line graphs. J.

Graph Theory73, 425–448 (2013)

10. Haynes, T.W., Hedetniemi, S.T., Slater, P.J.: Fundamentals of Domination in Graphs. Marcel Dekker, New York (1998)

11. Haynes, T.W., Henning, M.A., Howard, J.: Locating and total dominating sets in trees. Discrete Appl.

Math.154, 1293–1300 (2006)

12. Karpovsky, M.G., Chakrabarty, K., Levitin, L.B.: On a new class of codes for identifying vertices in graphs. IEEE Trans. Inf. Theory44, 599–611 (1998)

13. Ning, W., Lu, M., Guo, J.: Bounds on the differentiating-total domination number of a tree. Discrete Appl. Math.200, 153–160 (2016)

Publisher’s Note Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Referensi

Dokumen terkait

http://www.hrpub.org Civil Engineering and Architecture 91: 52-73, 2021 DOI: 10.13189/cea.2021.090105 The Empirical Analysis Model on Identifying Sick Building Syndrome in Hot

According to Aquino 2005 as cited in Peñalba et al., 2007, the factors that constrained technology adoption included the following: slow conversion of conventional farms to organic

However, the tamarisk and lote tree still provides many benefits to human beings Hossain et al., 2016; Marwat et al., 2009 even though they belong to plants that are associated with

Volume7432019, Pages 460–475 Bounds on the fair total domination number in trees and unicyclic graphs Majid Hajian Department of Mathematics Shahrood University of Technology

A prospective study by Aya et al., found that the risk of hypotension following spinal anaesthesia in preeclamptic patients was significantly lower than the risk among healthy-term

In fact, based on the writer’s experience, the fourth semester students still have low proficiency in reading comprehension, especially their problems in identifying the types of

Setting of Space Utilization Signifier and Signified around the Banyan Tree in Case 3 Source: Wijaya, 2019 The elements forming the sekala space around the banyan tree are: a Fixed

IDENTIFYING TEACHER PROFESSIONAL IDENTITY IN THE CONTENT OF PRE-SERVICE TEACHERS’ REFLECTION ON TEACHER’S TEACHING PRACTICUM Martina Mulyani English Education Study Program,