Structure connectivity and substructure connectivity of twisted hypercubes
|
|
- Esmond Gaines
- 5 years ago
- Views:
Transcription
1 arxiv: v1 [math.co] Mar 018 Structure connectivity and substructure connectivity of twisted hypercubes Dong Li, Xiaolan Hu, Huiqing Liu Abstract Let G be a graph and T a certain connected subgraph of G. The T -structure connectivity κ(g; T ) (or resp., T -substructure connectivity κ s (G; T )) of G is the minimum number of a set of subgraphs F = {T 1, T,..., T m } (or resp., F = {T 1, T,..., T m}) such that T i is isomorphic to T (or resp., T i is a connected subgraph of T ) for every 1 i m, and F s removal will disconnect G. The twisted hypercube H n is a new variant of hypercubes with asymptotically optimal diameter introduced by X.D. Zhu. In this paper, we will determine both κ(h n ; T ) and κ s (H n ; T ) for T {K 1,r, P k }, respectively, where 3 r 4 and 1 k n. Keywords: Twisted hypercube; T -structure connectivity; T -substructure connectivity 1 Introduction Interconnection networks play an important role in parallel and distributed systems. An interconnection network can be represented by an undirected graph G = (V, E), where each vertex in V corresponds to a processor, and every edge in E corresponds to a communication link. The neighborhood N G (v) of a vertex v in a graph G = (V, E) is the set of vertices adjacent to v. For S V (G), the neighborhood N G (S) of S in G is defined as N G (S) = ( v S N G (v)) S. We use P k = v 1, v,..., v k and C k = v 1, v,..., v k, v 1 to denote a path and a cycle of order k, respectively. For S V (G), we use G[S] to denote the subgraph of G induced by S. For a subgraph H of a graph G, we use G H to denote the subgraph of Hubei Key Laboratory of Applied Mathematics, Faculty of Mathematics and Statistic, Hubei University, Wuhan 43006, PR China School of Mathematics and Statistics & Hubei Key Laboratory of Mathematical Sciences, Central China Normal University, Wuhan , PR China 1
2 G induced by V (G) V (H). For a set F = {T 1, T,..., T m }, where each T i is isomorphic to a connected subgraph of G, we use G F to denote the subgraph of G induced by V (G) V (T 1 ) V (T ) V (T m ). For graph definition and notation not mentioned here we follow [1]. The connectivity κ(g) of a graph G is the minimum number of vertices whose removal leaves the remaining graph disconnected or trivial. The connectivity is one of the most important parameters to measure the reliability and fault tolerance of an interconnection network [3], [4], [6], [7], [16]. The larger the connectivity is, more reliable the interconnection network is. However, this parameter has a deficiency. That is, it tacitly assumes that all vertices adjacent to the same vertex of G could fail at the same time, which is highly unlikely for large-scale systems. To compensate for this shortcoming, Fábrega [5] proposed the concept of g-extra connectivity. The g-extra connectivity of a graph G, denoted by κ g (G), is the minimum number of vertices of G whose deletion disconnects G and every remaining component has more than g vertices. Some recent results on the g-extra connectivity of graphs see [], [8], [17], [18]. Instead of considering the effect of vertices becoming faulty, Lin et al. [9] considered the effect caused by some structures becoming faulty, and introduced the concept of structure connectivity and substructure connectivity of graphs. Let T be a connected subgraph of a graph G, and F a set of subgraphs of G such that every element in F is isomorphic to T. Then F is called a T -structure-cut if G F is disconnected. The T -structure connectivity κ(g; T ) of G is defined as the cardinality of a minimum T -structure-cut of G. Similarly, let F be a set of subgraphs of G such that every element in F is isomorphic to a connected subgraph of T. Then F is called a T -substructure-cut if G F is disconnected. The T -substructure connectivity κ s (G; T ) of G is defined as the cardinality of a minimum T -substructure-cut of G. By definition, κ s (G; T ) κ(g; T ). Note that K 1 -structure connectivity and K 1 -substructure connectivity are exactly the classical vertex connectivity. Lin et al. [9] determined κ(q n ; T ) and κ s (Q n ; T ) for the hypercube Q n and T {K 1,1, K 1,, K 1,3, C 4 }, respectively. Sabir and Meng [14] generalized their results and established κ(q n ; T ) and κ s (Q n ; T ) for T {P k, C k, K 1,4 }, where 3 k n, they also determined κ(f Q n ; T ) and κ s (F Q n ; T ) for the folded hypercube F Q n and T {P k, C k, K 1,3 }, where n 7 and k n. Moreover, Mane [1] determined κ(q n ; Q m ) with m n and established the upper bound of κ(q n ; C k ) with k n 1. Recently, Lv et al. [11] explored κ(q k n; T ) and κ s (Q k n; T ) for the k-ary n-cube Q k n and T {K 1, K 1,1, K 1,, K 1,3 }. The interconnection network considered in this study is the twisted hypercube H n, which is a hypercube-like network with asymptotically optimal diameter introduced by Zhu [19].
3 H n has many attractive properties, such as low vertex degree, strong connectivity and super connectivity. Qi and Zhu [13] considered the fault-diameter and wide-diameter of the twisted hypercubes. Liu et al. [10] determined the R g -vertex-connectivity and established the g-good neighbor conditional diagnosability of the twisted hypercubes under the PMC model and MM model, respectively. In this paper, we establish both κ(h n ; T ) and κ s (H n ; T ) for T {K 1,r, P k }, where 3 r 4 and 1 k n. The rest of the paper is organized as follows. In Section, we introduce the definition of the n-dimensional twisted hypercube H n and provide preliminaries for our results. In Section 3, we determine κ(h n ; K 1,r ) and κ s (H n ; K 1,r ) for 3 r 4. In Section 4, we determine κ(h n ; P k ) and κ s (H n ; P k ) for 1 k n. Our conclusions are given in Section 5. Preliminaries In this section, we first introduce the definition of the n-dimensional twisted hypercube H n, then present some properties of H n. Denote by Z n the set of binary strings of length n. For x, y Z n, x y denotes the sum of x and y in the group Z n, i.e., (x y) i = x i + y i (mod ) (for x Z n, x i denotes the ith bit of x). If x is a binary string of length n 1 and y is a binary string of length n, then xy is the concatenation of x and y, which is a binary string of length n 1 + n. If Z is a set of binary strings, then let xz = {xy : y Z}. For x Z n, and for 1 i < j n, denote by x[i, j] the binary string x i x i+1... x j. We first present an integer function κ(n). Definition.1 Let κ be the integer function defined as the following: { 0, if n = 1, κ(n) = max{1, log n log log n }, otherwise. Next, a permutation φ of binary strings is given as follows. Definition. Assume x Z n. Then φ(x) Z n is the binary string such that φ(x)[1, κ(n)] = x[1, κ(n)] x[n κ(n) + 1, n], φ(x)[κ(n) + 1, n] = x[κ(n) + 1, n]. Note that the restriction of φ to Z n is indeed a permutation of Z n, with φ (x) = x. Now we give a recursive definition of the twisted hypercubes. 3
4 Definition.3 Set H 1 := K, with vertices 0 and 1. For n, H n is obtained from two copies of H n 1, 0H n 1 and 1H n 1, by adding edges connecting 0x and 1φ(x) for all x H n 1. The vertex set of H n is Z n. It follows from the definition that H 1 = K, H = C 4, H 3 and H 4 are depicted in Figure 1. H3 H4 Figure 1. H3 and H4 By the definition of Hn, the following lemma is straightforward. Lemma.4 Hn is triangle-free. It is seen that Hn is a kind of n-dimensional hypercube-like networks. Then Hn is a n-regular graph with connectivity n. Furthermore, Hn has the following properties. Lemma.5 [10] For any u, v V (Hn), u and v have at most two common neighbors. Lemma.6 [15] κ1(hn) = n, where n 3. Lemma.7 [] κ(hn) = 3n 5, where n 5. Let a {0, 1} be an integer and a the complement of a, i.e., a = 1 a. Let u = u1u un V (Hn). By the definition of the twisted hypercubes, u has only one neighbor u1φ(uu3 un) in u1hn 1, and n 1 neighbors in u1hn 1. For every neighbor w = w1w wn of u in u1hn 1, there exists some q (1 q n 1) such that wi = ui for 1 i q. We use u i to denote the neighbor of u with the same first i 1 bits as that of u, and u i is called the (i)-neighbor of u, where 1 i n. That is, u i = u1 ui 1uiφ(ui+1 un) = u1 ui 1ui(ui+1 un κ+1)(ui+ un κ+) (ui+κ un)ui+κ+1 un, where κ = κ(n i). 4
5 Note that there are n i neighbors of u i in u 1 u i 1 u i H n i, we use u i,j to denote the neighbor of u i with the same first i+j 1 bits as that of u i, and u i,j is called the (i, j)-neighbor of u, where 1 j n i. Denote κ i = κ(n i). Then u i [1, i](u i+1 u n κi +1) (u i+j 1 u n κi +j 1)(u i+j u n κi +j)φ(u i [i + j + 1, n]), u i,j if 1 j κ i, = u i [1, i](u i+1 u n κi +1) (u i+κi u n )u i+κi +1 u i+j 1 u i+j φ(u i+j+1 u n ), if κ i + 1 j n i. Specially, u i,1 = u 1 u i 1 u i (u i+1 u n )(u i+ u n )u i+3 u n, if κ i = κ i+1 = 1, u 1 u i 1 u i (u i+1 u n κ+1 )(u i+ u n κ+ u n κ+1 ) (u i+κ u n u n 1 )(u i+κ+1 u n )u i+κ+ u n, if κ i = κ i+1 = κ, u 1 u i 1 u i (u i+1 u n κ+1 )u i+ u n, if κ i = κ i = κ. Similarly, there are n i j neighbors of u i,j in u 1 u i 1 u i (u i+1 u n κi +1) (u i+j 1 u n κi +j 1)(u i+j u n κi +j)h n i j if 1 j κ i, in u 1 u i 1 u i (u i+1 u n κi +1) (u i+κi u n )u i+κi +1 u i+j 1 u i+j H n i j if κ i + 1 j n i. We use u i,j,k to denote the neighbor of u i,j with the same first i+j +k 1 bits as that of u i,j, and u i,j,k is called the (i, j, k)-neighbor of u, where 1 k n i j. Specially, u 1 u i 1 u i (u i+1 u n )(u i+ u n )φ(u i+3 u n ), if κ i = κ i+1 = 1, u 1 u i 1 u i (u i+1 u n 1 )(u i+ u n u n 1 )φ((u i+3 u n )u i+4 u n ), u i,1,1 if κ i = κ i+1 =, = u 1 u i 1 u i (u i+1 u n κ+1 )(u i+ u n κ+ u n κ+1 )φ(u i,1 [i + 3, n]), if κ = κ i = κ i+1 3, u 1 u i 1 u i (u i+1 u n κ+1 )u i+ φ(u i+3 u n ), if κ i = κ i = κ. At the same time, u 1 u i 1 u i (u i+1 u n )(u i+ u n )u i+3 φ(u i+4 u n ), if κ i = κ i+1 = 1, u 1 u i 1 u i (u i+1 u n 1 )(u i+ u n u n 1 )(u i+3 u n )φ(u i+4 u n ), if κ i = κ i+1 =, u 1 u i 1 u i (u i+1 u n )(u i+ u n 1 u n )(u i+3 u n u n 1 )φ(u i,1 [i + 4, n]), u i,1, = if κ i = κ i+1 = 3, u 1 u i 1 u i (u i+1 u n κ+1 )(u i+ u n κ+ u n κ+1 )(u i+3 u n κ+3 u n κ+ ) φ((u i+4 u n κ+4 u n κ+3 ) (u i+κ u n u n 1 )(u i+κ+1 u n )u i+κ+ u n ), if κ = κ i = κ i+1 4, u 1 u i 1 u i (u i+1 u n κ+1 )u i+ u i+3 φ(u i+4 u n ), if κ i = κ i = κ. 5
6 Let u h( ) be a vertex of H n. If the first i bits of u h( ) is u 1 u u i, then u h( ) has exactly one neighbor in u 1 u u i 1 u i H n i, and we denote this neighbor u h( ),i. For example, let u = 0010 H 4, then u 1 = 1010, u = 0110, u 3 = 0000, u 4 = 0011, u 1,1 = u,1 = 1110, u,1 = 0100, u 3,1 = 0001, u 3,1 = 1000, u 4,1 = 1111, u,1,1 = 1100, u 3,1,1 = Figure illustrates the neighbors of u. Figure. Some neighbors related to a vertex u of H n Note that u i+1 = u 1 u u i u i+1 φ(u i+ u i+3 u n ). Then u 1 u i 1 u i (u i+1 u n )(u i+ u n )u i+3 u n, if κ i = κ i+1 = 1, u u i+1,i 1 u i 1 u i (u i+1 u n κ+1 )(u i+ u n κ+1 u n κ+ ) = (u i+κ u n 1 u n )(u i+κ+1 u n )u i+κ+ u n, if κ i = κ i+1 = κ, u 1 u i 1 u i (u i+1 u n κ+1 )u i+ u n, if κ i = κ i = κ. It is seen that u i+1,i = u i,1. Then u i,1 is a common neighbor of u i and u i+1. Note that u is also a common neighbor of u i and u i+1. By Lemma.5, any two vertices have at most two common neighbors. So we have the following proposition. Proposition.8 Let u = u 1 u u n be any vertex of H n and N Hn (u) = {u 1, u,..., u n }. Then N Hn (u i ) N Hn (u i+1 ) = {u, u i,1 }, where 1 i n 1. 6
7 Recall that for u = u 1 u n V (H n ), u n = u 1 u n 1 u n, u n 1 = u 1 u n u n 1 u n and u n 1,1 = u 1 u u n u n 1 u n, we have u n,i = u 1 u i 1 u i φ(u i+1 u n 1 u n ), u n 1,1,1 = u 1 φ(u u n u n 1 u n ), u n 1,1, = u 1 u φ(u 3 u n u n 1 u n ). The following two propositions are straightforward. Proposition.9 For any u = u 1 u... u n V (H n ), N Hn (u) = {u 1, u,..., u n }, Then (a) u i,1 u j,1 for 1 i j n 1. (b) u n 1,1,1 u 1,1, u n 1,1,1 u 1,1,1 and u n 1,1,1 u 1,1,. (c) u n 1,1, u,1, u n 1,1, u,1,1 and u n 1,1, u,1,. (d) u n,i u i,1, u n,i u i,1,1 and u n,i u i,1,, where 1 i n 3. Proposition.10 For any u = u 1 u... u n V (H n ), N Hn (u) = {u 1, u,..., u n }, then u n,(n ) u n,1, u n,(n ),(n 3) u n 3,1,. u n,(n ),(n 3),..., u,1, u n,(n ),(n 3),...,,1 u 1,1. By Lemma.4 and Proposition.8, we have following proposition. Proposition.11 For any u = u 1 u... u n V (H n ), N Hn (u) = {u 1, u,..., u n }, we have (a) H n [{u i, u i,1, u i+1, u i,1,1 }] is a K 1,3 with center u i,1, where 1 i n. (b) H n [{u n, u n 1,1, u n,1, u n, }] is a K 1,3 with center u n. (c) H n [{u n 1, u n 1,1, u n, u n 1,1,1 }] is a K 1,3 with center u n 1,1. (d) H n [{u i, u i,1, u i+1, u i,1,1, u i,1, }] is a K 1,4 with center u i,1, where 1 i n 3. (e) H n [{u n, u n 1,1, u n,1, u n,, u n,3 }] is a K 1,4 with center u n. (f) H n [{u n 1, u n 1,1, u n, u n 1,1,1, u n 1,1, }] is a K 1,4 with center u n 1,1. (g) H n [{u n, u n,1, u n 1, u n,1,1, u n,1,1 }] is a K 1,4 with center u n,1. 7
8 3 κ(h n ; K 1,r ) and κ s (H n ; K 1,r ) for r {3, 4} In this section, we first show some properties of H n related to stars, then explore the T - structure connectivity and T -substructure connectivity of H n for T = K 1,3 and T = K 1,4, respectively. Lemma 3.1 Let K 1,r be a star in H n. If u is a vertex of H n K 1,r, then N Hn (u) V (K 1,r ). Proof. Let x be the center of the star K 1,r. If (x, u) E(H n ), then N Hn (u) V (K 1,r ) = {x} by Lemma.4. That is, N Hn (u) V (K 1,r ) = 1. If (x, u) / E(H n ), then N Hn (u) V (K 1,r ) as u and x have at most two common neighbors by Lemma.5. Lemma 3. Let K 1,3 be a star in H n. If u and v are two adjacent vertices of H n K 1,3, then N Hn ({u, v}) V (K 1,3 ) 3. Proof. Let V (K 1,3 ) = {x, x 1, x, x 3 } and E(K 1,3 ) = {(x, x 1 ), (x, x ), (x, x 3 )}. If (x, u) E(H n ), then N Hn (u) V (K 1,3 ) = {x} by Lemma.4. That is, N Hn (u) V (K 1,3 ) = 1. By Lemma 3.1, N Hn (v) V (K 1,3 ). Then N Hn ({u, v}) V (K 1,3 ) 3. Therefore (x, u) / E(H n ). By the symmetry of u and v, (x, v) / E(H n ). Then N Hn ({u, v}) V (K 1,3 ) {x 1, x, x 3 } and thus N Hn ({u, v}) V (K 1,3 ) 3. Lemma 3.3 Let K 1,r be a star in H n with center x. If u and v are two adjacent vertices of H n K 1,r, then N Hn ({u, v}) V (K 1,r ) 4. Moreover, if N Hn ({u, v}) V (K 1,r ) = 4, then (u, x), (v, x) / E(H n ) and u, v, x V (ah n 1 ) for some a {0, 1}. Proof. By Lemma 3.1, N Hn (u) V (K 1,r ) and N Hn (v) V (K 1,r ). Then N Hn ({u, v}) V (K 1,r ) 4. Suppose that N Hn ({u, v}) V (K 1,r ) = 4, in the following, we show that u, v, x V (ah n 1 ) for some a {0, 1}. Note that N Hn (u) V (K 1,r ) = and N Hn (v) V (K 1,r ) =, then (u, x), (v, x) / E(H n ). If u V (0H n 1 ) and v V (1H n 1 ), then x and v have at most one common neighbor if x V (0H n 1 ), and x and u have at most one common neighbor if x V (1H n 1 ), a contradiction. Therefore u, v V (ah n 1 ) for some a {0, 1}. If x V (ah n 1 ), then N Hn ({u, v}) N Hn (x) {u 1, v 1, x 1 }, i.e, N Hn ({u, v}) V (K 1,r ) 3, a contradiction. Therefore x V (ah n 1 ). Lemma 3.4 Let F 1, F,..., F n/ 1 be n 1 stars in H n. If u and v are two adjacent vertices of H n n/ 1 i=1 V (F i ), then N Hn ({u, v}) ( n/ 1 i=1 V (F i )) n 3. 8
9 Proof. Note that N Hn ({u, v}) = n, suppose to the contrary that N Hn ({u, v}) ( n/ 1 i=1 V (F i )) = n. By Lemma 3.3, N Hn ({u, v}) V (K 1,r ) 4, then n = N Hn ({u, v}) ( n/ 1 i=1 V (F i )) 4( n 1). Thus n is odd, N H n ({u, v}) V (F i ) = 4 for 1 i n/ 1 and N Hn ({u, v}) ( n/ i=1 V (F i)) = N Hn ({u, v}). Let x i be the center of F i, then (u, x i ), (v, x i ) / E(H n ) and u, v, x i V (ah n 1 ) for some a {0, 1} by Lemma 3.3. Assume, without loss of generality, that u 1 F 1. Then u 1 x 1 as (u, x 1 ) / E(H n ). On the other hand, (u 1, x 1 ) E(H n ), which implies x 1 V (ah n 1 ), a contradiction. Lemma 3.5 κ s (H n ; K 1,r ) n for 3 r 4 and n 4. Proof. Let F = {P 1,..., P }{{} 1, P,..., P, P }{{} 3,..., P 3, K }{{} 1,3,..., K 1,3 } if r = 3, and F = }{{} x 1 x x 3 x 4 {P 1,..., P }{{} 1, P,..., P, P }{{} 3,..., P 3, K }{{} 1,3,..., K 1,3, K }{{} 1,4,..., K 1,4 } if r = 4, where x }{{} i 0 and x 1 x x 3 x 4 x 5 1 i r + 1. Then F = r+1 i=1 x i. Suppose to the contrary that F n 1 and H n F is disconnected, then H n F has at least two components. Let C be the smallest component of H n F. We consider the following three cases. Case 1. V (C) = 1. In this case, C is an isolated vertex w. Note that N Hn (w) = n. By Lemmas.4 and 3.1, every element in F contains at most two neighbors of w, then F N Hn (w). Thus, ( n 1) n, a contradiction. Case. V (C) =. In this case, C is an edge (u, v). Note that N Hn ({u, v}) = n. If r = 3, every element in F contains at most three neighbors of {u, v} by Lemmas.4 and 3., then 3 F N Hn ({u, v}). Thus 3( n 1) n, a contradiction. Therefore r = 4. By Lemma 3.4, all elements in F contains at most n 3 neighbors of {u, v}, a contradiction. Case 3. V (C) 3. Note that F n 1 and every element in F contains at most five vertices, then V (F) 5( n 1). If n = 4, then V (F) 5. By Lemma.6, κ 1(H n ) = n = 6, which implies that we have to delete at least 6 vertices to separate C from H 4, a contradiction. Therefore n 5. By Lemma.7, κ (H n ) = 3n 5, which implies that we have to delete at least 3n 5 > 5( n 1) vertices to separate C from H n, a contradiction. Thus, κ s (H n ; K 1,3 ) n. 9
10 3.1 κ(h n ; K 1,3 ) and κ s (H n ; K 1,3 ) Lemma 3.6 κ(h n ; K 1,3 ) n for n 4. Proof. For any u = u 1 u n V (H n ), N Hn (u) = {u 1,..., u n }. Let T i be the subgraph induced by {u i, u i,1, u i+1, u i,1,1 } for 1 i n. If n is odd, we let T n be the subgraph induced by {u n, u n 1,1, u n,1, u n, }; and if n is even, let T n 1 the subgraph induced by {u n 1, u n 1,1, u n, u n 1,1,1 }. Then T i is a K 1,3 by Proposition.11(a-c) for 1 i n, and V (T i ) V (T j ) = by Proposition.9 for 1 i j n. Set S = {T 1, T 3,..., T n, T n } if n is odd; and S = {T 1, T 3,..., T n 3, T n 1 } if n is even. Then, in either case, H n S is disconnected, one component is {u} and S = n. Thus, κ(h n ; K 1,3 ) n. Note that κ s (H n ; K 1,3 ) κ(h n ; K 1,3 ), and thus, by Lemmas 3.5 and 3.6, we have the following result. Theorem 3.7 κ(h n ; K 1,3 ) = κ s (H n ; K 1,3 ) = n for n κ(h n ; K 1,4 ) and κ s (H n ; K 1,4 ) Lemma 3.8 κ(h n ; K 1,4 ) n for n 4. Proof. For any u V (H n ), N Hn (u) = {u 1,..., u n }. Let T i be the subgraph induced by {u i, u i,1, u i+1, u i,1,1, u i,1, } for 1 i n 3. If n is odd, we let T n be the subgraph induced by {u n, u n,1, u n 1, u n,1,1, u n,1,1 } and T n the subgraph induced by {u n, u n 1,1, u n,1, u n,, u n,3 }; and if n is even, let T n 1 be the subgraph induced by {u n 1, u n 1,1, u n, u n 1,1,1, u n 1,1, }. Then T i is a K 1,4 by Proposition.11(d-g) for 1 i n, and V (T i ) V (T j ) = by Proposition.9 for 1 i j n. Set S = {T 1, T 3,..., T n 4, T n, T n } if n is odd; and S = {T 1, T 3,..., T n 3, T n 1 } if n is even. Then, in either case, H n S is disconnected, one component is {u} and S = n. Thus, κ(h n ; K 1,4 ) n and κs (H n ; K 1,4 ) n. Note that κ s (H n ; K 1,4 ) κ(h n ; K 1,4 ), and hence, by Lemmas 3.5 and 3.8, we have the following result. Theorem 3.9 κ(h n ; K 1,4 ) = κ s (H n ; K 1,4 ) = n for n 4. 4 κ(h n ; P k ) and κ s (H n ; P k ) Recall that κ(h n ; P 1 ) = κ s (H n ; P 1 ) = κ(h n ) = n for n 3. So we assume k. 10
11 4.1 κ(h n ; P ) and κ s (H n ; P ) Lemma 4.1 If κ(n 1), then H n does not consists of n 1 quadrilaterals sharing a common edge. Proof. For any u = u 1 u... u n V (H n ), we show that for any 1 i n, u i and u n have no other common neighbors other than u, and u n 1 and u 1 have no other common neighbors other than u. Recall that u i = u 1 u i 1 u i (u i+1 u n κi +1) (u i+κi u n )u i+κi +1 u n 1 u n, where κ i = κ(n i). First we assume i n. We only need to show that (u i ) j (u n ) k for 1 j i n and 1 k n 1. If 1 j i n 1, then (u i ) j [n] = u n u n = (u n ) k [n], thus (u i ) j (u n ) k. Therefore j = n. If i k, then (u i ) n [i] (u n ) k [i]; and if i = k, then (u i ) n [i + κ i ] = u i+κi u n u i+κi u n = (u n ) i [i + κ i ]. Thus (u i ) n (u n ) k. Now we assume i = n 1. We only need to show that (u 1 ) p (u n 1 ) q for p n and 1 q n 1 n. If p n, then (u 1 ) p [n 1, n] = u n 1 u n u n 1 u n = (u n 1 ) q [n 1, n] for 1 q n and (u 1 ) p [n 1, n] = u n 1 u n u n 1 u n = (u n 1 ) n [n 1, n], and thus (u 1 ) p (u n 1 ) q. If p = n, then (u 1 ) n [n 1, n] = u n 1 u n u n 1 u n = (u n 1 ) q [n 1, n] for 1 q n and (u 1 ) n [n 1, n] = u n 1 u n u n 1 u n = (u n 1 ) n [n 1, n], and thus (u 1 ) n (u n 1 ) q. Therefore p = n 1. If q 1, then (u 1 ) n 1 [1] (u n 1 ) q [1]; and if q = 1, then (u n 1 ) 1 = u 1 (u u n κ1 +1) (u κ1 1 u n )(u κ1 u n 1 )(u κ1 +1 u n )u κ1 + u n u n 1 u n as κ 1 = κ(n 1) and thus (u 1 ) n 1 [κ 1 ] = (u κ1 u n 1 ) (u κ1 u n 1 ) = (u n 1 ) 1 [κ 1 ]. Hence (u 1 ) n 1 (u n 1 ) q. Lemma 4. κ(h n ; P ) n 1 if κ(n 1) = 1 and κ(h n ; P ) n if κ(n 1). Proof. we distinguish cases pertaining to the value of κ(n) in the following. Case 1. κ(n 1) = 1. In this case, we set u = Then u i = 0 0u i 0 0, where u i = 1, 1 i n. Let v = u n 1 = 0 010, then v i = 0 0v i 0 010, where v i = 1, 1 i n ; v n = Note that if κ(n 1) = 1, then (u i, v i ) E(H n ); and hence C 4 = u, u i, v i, v, u is a cycle of length 4. Set S = {u i v i : 1 i n and i n 1}. Then, H n S is disconnected, one component is {u, v} and S = n 1. Thus, κ(h n ; P ) n 1. Case. κ(n 1). 11
12 In this case, for any u = u 1 u... u n V (H n ), N Hn (u) = {u 1, u,..., u n }. By Lemma 4.1, H n does not consists of n 1 quadrilaterals sharing a common edge. So we can set that T i be the subgraph induced by {u i, u i,1 } for 1 i n 1, then T i is isomorphic to P. Set S = {T 1, T,..., T n 1, T n }, where T n is the subgraph induced by {u n, u n,1 }. Then, H n S is disconnected, one component is {u} and S = n. Thus, κ(h n ; P ) n. Lemma 4.3 κ s (H n ; P ) n 1 if κ(n 1) = 1 and κ s (H n ; P ) n if κ(n 1). Proof. we distinguish cases pertaining to the value of κ(n) in the following. Case 1. κ(n 1) = 1. Let F = {P 1,..., P }{{} 1, P,..., P } and F = x }{{} 1 + x n for x 1, x 0. Suppose to x 1 x the contrary that H n F is disconnected, then H n F has at least two components. Let C be the smallest component of H n F. We consider following two cases. Subcase 1.1. V (C) = 1. In this subcase, we set V (C) = {w}. Note that N Hn (w) = n. By Lemma.4, every element in F contains at most one neighbor of w. Thus, we have to delete at least n elements of F to isolate C. But it is impossible since F n < n. Subcase 1.. V (C). In this subcase, by Lemma.6, κ 1 (H n ) = n. This implies that we have to delete at least n vertices to isolate C. Since F n, we have V (F) (n ) = n 4 < n, a contradiction. Thus, κ s (H n ; P ) n 1 and κ(h n ; P ) n 1. Case. κ(n 1). In this case, n > 5. Let F = {P 1,..., P }{{} 1, P,..., P } and F = x }{{} 1 + x n 1 for x 1 x x 1, x 0. Suppose to the contrary that H n F is disconnected, then H n F has at least two components. Let C be the smallest component of H n F. We consider following three cases. Subcase.1. V (C) = 1. In this subcase, we set V (C) = {w}. Note that N Hn (w) = n. By Lemma.4, every element in F contains at most one neighbor of w. Thus, we have to delete at least n elements of F to isolate C. But it is impossible since F n 1 < n. Subcase.. V (C) =. 1
13 In this subcase, C is an edge of H n and N Hn (C) = n. By Lemma.6 and Lemma 4.1, we have to delete at least n +1 = n elements of F to separate C. However, F n 1 < n, a contradiction. Subcase.3. V (C) 3. In this subcase, by Lemma.7, κ (H n ) = 3n 5. This implies that we have to delete at least 3n 5 vertices to isolate C. Since F n 1, we have V (F) (n 1) = n < 3n 5, a contradiction with n > 5. Thus, κ s (H n ; P ) n and κ(h n ; P ) n. Note that κ s (H n ; P ) κ(h n ; P ), and hence, by Lemmas 4. and 4.3, we have the following result. Theorem 4.4 κ(h n ; P ) = κ s (H n ; P ) = n 1 if κ(n 1) = 1; κ(h n ; P ) = κ s (H n ; P ) = n if κ(n 1). 4. κ(h n ; P k ) and κ s (H n ; P k ) with k 3 Lemma 4.5 Let P k be a path of order k in H n with 1 k n. If v is a vertex of H n P k, then N Hn (v) V (P k ) k. Proof. By Lemma.4, v can be adjacent to at most one vertex of any two consecutive vertices on P k. Thus, the lemma follows. Lemma 4.6 Let P k be a path of order k in H n with 3 k n. If u and v are two adjacent vertices of H n P k, then N Hn ({u, v}) V (P k ) k + (k(mod 3)). Moreover, 3 N Hn ({u, v}) V (P k ) k 1. Proof. Let P k = v 1, v,..., v k. We first show that N Hn ({u, v}) {v i 1, v i, v i+1 } for i k 1. ( ) Otherwise, we suppose that N Hn ({u, v}) {v i 1, v i, v i+1 } 3 for some i ( i k 1). Without loss of generality, we assume that N Hn (u) {v i 1, v i, v i+1 }. By Lemma.4, we have uv i 1, uv i+1 E(H n ), and uv i / E(H n ). Moreover, N Hn (u) {v i 1, v i, v i+1 } =. Then N Hn (v) {v i 1, v i, v i+1 } 1 and vv i 1, vv i+1 / E(H n ) by Lemma.4. So vv i E(H n ), and thus {v, v i 1, v i+1 } N(u) N(v i ), a contradiction with Lemma.5. Now we prove this lemma by induction on k. For k = 3, by the above proof, N Hn ({u, v}) V (P 3 ). In the induction step, assume that the lemma is true for 3 k l. When k = l + 1, N Hn (v l+1 ) {u, v} 1 by Lemma.4, and then N Hn ({u, v}) V (P l+1 ) N Hn ({u, v}) V (P l ) + 1 l + (l(mod 3)) + 1 by the inductive hypothesis. 3 13
14 Note that if (l + 1)(mod 3) = 1 or, then (l + 1)(mod 3) = l(mod 3) + 1 and l = l+1, 3 3 and hence l l+1 + (l(mod 3)) + 1 = + ((l + 1)(mod 3)). So, in the following, we assume 3 3 that l 5 and (l+1)(mod 3) = 0. Then (l )(mod 3) = 0. By ( ), N Hn ({u, v}) V (P l+1 ) N Hn ({u, v}) V (P l ) + l l+1 + =. 3 3 Therefore the proof of the lemma is complete. Lemma 4.7 Let 3 k n. Then κ(h n ; P k ) n k+1 if k is odd and κ(h n; P k ) n k if k is even. Proof. For any u = u 1 u... u n V (H n ), N Hn (u) = {u 1, u,..., u n }, we distinguish cases pertaining to the parity of k in the following. Case 1. k is odd. In this case, we denote t := k+1. Let n = qt + r for some nonnegative integers q and r with 0 r k 1. Since n k, we have q 1. Subcase 1.1. r = 0. In this subcase, we set P 1 = u 1, u 1,1, u,..., u t 1, u t 1,1, u t, P = u t+1, u t+1,1, u t+,..., u k, u k,1, u k+1,. P q = u n t+1, u n t+1,1, u n t+,..., u n 1, u n 1,1, u n. Then V (P i ) V (P j ) = by Proposition.10 for 1 i j q, and then F = {P 1, P,..., P q } forms a P k -structure-cut of H n, one component of H n F is {u} and F = n k+1. Subcase r k 1. In this subcase, we set P 1 = u 1, u 1,1, u,..., u t 1, u t 1,1, u t, P = u t+1, u t+1,1, u t+,..., u k, u k,1, u k+1,. P q = u n r t+1, u n r t+1,1, u n r t+,..., u n r 1, u n r 1,1, u n r, P (q+1) = u n r+1, u n r+1,1, u n r+,..., u n, u n,(n ),..., u n,(n ),...,(n k+r ). Then V (P i ) V (P j ) = by Proposition.10 for 1 i j q + 1, and then F = {P 1, P,..., P q, P (q+1) } forms a P k -structure-cut of H n, one component of H n F is {u} and F = n k+1. Thus, in either subcase, κ(h n ; P k ) n k+1. Case. k is even. 14
15 In this case, we denote a := k. Let n = qa + r for some nonnegative integers q and r with 0 r k. Since n k, we have q 1. Subcase.1. r = 0. In this subcase, we set P 1 = u 1, u 1,1, u,..., u a, u a,1, P = u a+1, u a+1,1, u a+,..., u k, u k,1,. P q = u n a+1, u n a+1,1, u n a+,..., u n, u n,1. Then V (P i ) V (P j ) = by Proposition.10 for 1 i j q, and then F = {P 1, P,..., P q } forms a P k -structure-cut of H n, one component of H n F is {u} and F = n k. Subcase.. 1 r k. In this subcase, we set P 1 = u 1, u 1,1, u,..., u a, u a,1, P = u a+1, u a+1,1, u a+,..., u k, u k,1,. P q = u n r a+1, u n r a+1,1, u n r a+,..., u n r, u n r,1, P (q+1) = u n r+1, u n r+1,1, u n r+,..., u n, u n,(n ),..., u n,(n ),...,(n k+r ). Then V (P i ) V (P j ) = by Proposition.10 for 1 i j q + 1, and then F = {P 1, P,..., P q, P (q+1) } forms a P k -structure-cut of H n, one component of H n F is {u} and F = n k. Thus, κ(h n ; P k ) n k. The proof of the lemma is now complete. Lemma 4.8 Let 3 k n. Then κ s (H n ; P k ) n k+1 if k is odd and κs (H n ; P k ) n k if k is even. Proof. If no confusion should arise, we use F = {P 1,..., P }{{} 1, P,..., P }{{} x 1 x,..., P k,..., P }{{} k } to x k denote a set of connected subgraphs of P k with F = k i=1 x i for x i 0. If 3 n 4, then k = 3 or k = 4 as 3 k n. So in either case, it suffices to show that H n F is connected whenever F 1. If x k = 0, then H n P i is connected for 1 i k 1 since κ(h n ) = n k. Hence, we may assume that x k = 1, and consequently x 1 = = x k 1 = 0. That is, F = {P k }. Assume that H n P k is disconnected, then each component of H n P k contains at least two vertices as H n is n-regular and triangle-free. On the other hand, by Lemma.6, κ 1 (H n ) = n > k = V (P k ), a contradiction. 15
16 So, in the following, we may assume that n 5. We proceed this by contradiction. Case 1. k is odd. Suppose to the contrary that F n k+1 1 and H n F is disconnected, then H n F has at least two components. Without loss of generality, let C be the smallest component of H n F. We consider the following two cases. Case 1.1. V (C) = 1. In this subcase, C is an isolated vertex. Let V (C) = {w}, then N Hn (w) = n. By Lemma 4.5, every element in F contains at most k+1 neighbors of w. Thus, k+1 F n, i.e. k+1 n ( 1) n, a contradiction. k+1 Case 1.. V (C). In this subcase, C contains at least one edge. By Lemma.6, κ 1 (H n ) = n. This implies that we have to delete at least n vertices to separate C from H n. However, from the assumption F n k k+1 k+1 (n ) < n, a contradiction. Case. k is even. n n+k 1 1, we infer that V (F) k( 1) k( 1) = k+1 k+1 Suppose to the contrary that F n k 1 with H n F being disconnected, and let C be the smallest component of H n F. Consider the following three cases. Case.1. V (C) = 1. In this subcase, C is an isolated vertex. Let V (C) = {w}, then N Hn (w) = n. By Lemma 4.5, every element in F contains at most k k ( n 1) n, a contradiction. k Case.. V (C) =. neighbors of w. Thus, k F n, i.e. In this subcase, C is an edge of H n. Suppose that V (C) = {u, v}, then N Hn ({u, v}) = n. By Lemma.6, every element in F contains at most k 1 neighbors of {u, v}. It means that we have to delete at least n vertices of F to separate C. However, k 1 F n 1 n+k 1 = n < n, a contradiction. k k k k 1 Case.3. V (C) 3. In this subcase, V (F) k( n 1) from the assumption F n 1. On the other k k hand, κ (H n ) = 3n 5 by Lemma.7, which implied that we have to delete at least 3n 5 vertices to separate C from H n. However, it is easily to check that V (F) k( n k 1) < 3n 5 for n 5, a contradiction. Therefore we complete the proof of Lemma 4.8. Recall that κ s (H n ; P k ) κ(h n ; P k ), and hence, by Lemmas 4.7 and 4.8, we have the 16
17 following result. Theorem 4.9 Let 3 k n. Then κ(h n ; P k ) = κ s (H n ; P k ) = n if k is odd; κ(h k+1 n; P k ) = κ s (H n ; P k ) = n if k is even. k 5 Conclusions In this paper, we consider the T -structure connectivity and T -substructure connectivity of the twisted hypercube H n for T {K 1,r, P k } and show that κ(h n ; K 1,r ) = κ s (H n ; K 1,r ) = n for n 4 and 3 r 4; n, if k = 1, n 1, if k = and κ(n 1) = 1, κ(h n ; P k ) = κ s (H n ; P k ) = n, if k = and κ(n 1), n, k+1 if 3 k n and k is odd, n, k if 4 k n and k is even. However, determining the K 1,r -structure connectivity and K 1,r -substructure connectivity of H n with r 5 remain open. To explore κ(h n ; C k ) and κ s (H n ; C k ), the approach used in this paper is invalid as H n is a nonbipartite graph. But one may explore the structure connectivity and substructure connectivity of other interconnection networks by the approach used in this paper. Acknowledgments Xiaolan Hu is partially supported by NNSFC under grant number and NSF of Hubei Province under grant number 016CFB146. Huiqing Liu is partially supported by NNSFC under grant numbers and References [1] J.A. Bondy, U.S.R. Murty, Graph Theory, Springer, 008. [] N.W. Chang, S.Y. Hsieh, {, 3}-extraconnectivities of hypercube-like networks, J. Comput. System Sci. 79(5)(013) [3] Y.C. Chen, J.J.M. Tan, L.H. Hsu, Super connectivity and super-edge-connectivity for some interconnection networks, Appl. Math. Comput. 140()(003)
18 [4] A.H. Esfahanian, Generalized measures of fault tolerance with application to n-cube networks, IEEE Trans. Comput. 38(11)(1989) [5] J. Fábrega, M.A. Fiol, On the extraconnectivity of graphs, Discrete Math. 155(1-3)(1996) [6] J.X. Fan, L.Q. He, BC interconnection networks and their properties, Chinese J. Comput. 6(1)(003) 1-7. [7] F. Harary, J.P. Hayes, H.J. Wu, A survey of the theory of hypercube graphs, Comput. Math. Appl. 15(4)(1988) [8] S.Y. Hsieh, Y.H. Chang, Extraconnectivity of k-ary n-cube networks, Theoret. Comput. Sci. 443(0)(01) [9] C.K. Lin, L.L. Zhang, J.X. Fan, D.J. Wang, Structure connectivity and substructure connectivity of hypercubes, Theoret. Comput. Sci. 634(016) [10] H.Q. Liu, X.L. Hu, S. Gao, The g-good neighbor conditional diagnosability of twisted hypercubes under the PMC and MM model, Appl. Math. Comp. to appear. [11] Y.L. Lv, J.X. Fan, D.F. Hsu, C.K. Lin, Structure connectivity and substructure connectivity of k-ary n-cube networks, Inform. Sci (018) [1] S.A. Mane, Structure connectivity of hypercubes, AKCE International Journal of Graphs and Combinatorics, [13] H. Qi, X.D. Zhu, The fault-diameter and wide-diameter of twisted hypercubes, Discrete Appl. Math. 35(018) [14] E. Sabir, J. Meng, Structure fault tolerance of hypercubes and folded hypercubes, Theoret. Comput. Sci. 711(018) [15] J.M. Xu, J.W. Wang, W.W. Wang, On super and restricted connectivity of some interconnection networks, Ars Combin. 94(010). [16] J.M. Xu, Q. Zhu, M. Xu, Fault-tolerant analysis of a class of networks, Inform. Process. Lett. 103(6)(007) -6. [17] W.H. Yang, J.X. Meng, Extraconnectivity of hypercubes, Appl. Math. Lett. (6)(009)
19 [18] Q. Zhu, J.M. Xu, X.M. Hou, M. Xu, On reliability of the folded hypercubes, Inform. Sci. 177(8)(007) [19] X. Zhu, A hypercube variant with small diameter, Journal of Graph Theory 85(3)(017)
Applied Mathematics Letters
Applied Mathematics Letters 23 (2010) 286 290 Contents lists available at ScienceDirect Applied Mathematics Letters journal homepage: wwwelseviercom/locate/aml The number of spanning trees of a graph Jianxi
More informationON THE MAXIMUM AND MINIMUM SIZES OF A GRAPH
Discussiones Mathematicae Graph Theory 37 (2017) 623 632 doi:10.7151/dmgt.1941 ON THE MAXIMUM AND MINIMUM SIZES OF A GRAPH WITH GIVEN k-connectivity Yuefang Sun Department of Mathematics Shaoxing University
More informationRealizability of n-vertex Graphs with Prescribed Vertex Connectivity, Edge Connectivity, Minimum Degree, and Maximum Degree
Realizability of n-vertex Graphs with Prescribed Vertex Connectivity, Edge Connectivity, Minimum Degree, and Maximum Degree Lewis Sears IV Washington and Lee University 1 Introduction The study of graph
More informationThe generalized 3-connectivity of Cartesian product graphs
The generalized 3-connectivit of Cartesian product graphs Hengzhe Li, Xueliang Li, Yuefang Sun To cite this version: Hengzhe Li, Xueliang Li, Yuefang Sun. The generalized 3-connectivit of Cartesian product
More informationA relation on 132-avoiding permutation patterns
Discrete Mathematics and Theoretical Computer Science DMTCS vol. VOL, 205, 285 302 A relation on 32-avoiding permutation patterns Natalie Aisbett School of Mathematics and Statistics, University of Sydney,
More informationVariations on a theme by Weetman
Variations on a theme by Weetman A.E. Brouwer Abstract We show for many strongly regular graphs, and for all Taylor graphs except the hexagon, that locally graphs have bounded diameter. 1 Locally graphs
More informationA Combinatorial Proof for the Circular Chromatic Number of Kneser Graphs
A Combinatorial Proof for the Circular Chromatic Number of Kneser Graphs Daphne Der-Fen Liu Department of Mathematics California State University, Los Angeles, USA Email: dliu@calstatela.edu Xuding Zhu
More informationStrong Subgraph k-connectivity of Digraphs
Strong Subgraph k-connectivity of Digraphs Yuefang Sun joint work with Gregory Gutin, Anders Yeo, Xiaoyan Zhang yuefangsun2013@163.com Department of Mathematics Shaoxing University, China July 2018, Zhuhai
More informationOn the Prime Labeling of Generalized Petersen Graphs P (n, 3) 1
Int. J. Contemp. Math. Sciences, Vol., 0, no., - 00 On the Prime Labeling of Generalized Petersen Graphs P (n, ) Kh. Md. Mominul Haque Department of Computer Science and Engineering Shahjalal University
More informationDistributed Function Calculation via Linear Iterations in the Presence of Malicious Agents Part I: Attacking the Network
8 American Control Conference Westin Seattle Hotel, Seattle, Washington, USA June 11-13, 8 WeC34 Distributed Function Calculation via Linear Iterations in the Presence of Malicious Agents Part I: Attacking
More informationFractional Graphs. Figure 1
Fractional Graphs Richard H. Hammack Department of Mathematics and Applied Mathematics Virginia Commonwealth University Richmond, VA 23284-2014, USA rhammack@vcu.edu Abstract. Edge-colorings are used to
More informationA survey on the generalized connectivity of graphs arxiv: v2 [math.co] 11 Sep 2012
A survey on the generalized connectivity of graphs arxiv:107.1838v [math.co] 11 Sep 01 Xueliang Li, Yaping Mao Center for Combinatorics and LPMC-TJKLC Nankai University, Tianjin 300071, P.R. China E-mails:
More informationarxiv: v1 [math.co] 31 Mar 2009
A BIJECTION BETWEEN WELL-LABELLED POSITIVE PATHS AND MATCHINGS OLIVIER BERNARDI, BERTRAND DUPLANTIER, AND PHILIPPE NADEAU arxiv:0903.539v [math.co] 3 Mar 009 Abstract. A well-labelled positive path of
More informationAlain Hertz 1 and Sacha Varone 2. Introduction A NOTE ON TREE REALIZATIONS OF MATRICES. RAIRO Operations Research Will be set by the publisher
RAIRO Operations Research Will be set by the publisher A NOTE ON TREE REALIZATIONS OF MATRICES Alain Hertz and Sacha Varone 2 Abstract It is well known that each tree metric M has a unique realization
More informationCollinear Triple Hypergraphs and the Finite Plane Kakeya Problem
Collinear Triple Hypergraphs and the Finite Plane Kakeya Problem Joshua Cooper August 14, 006 Abstract We show that the problem of counting collinear points in a permutation (previously considered by the
More informationPermutation Factorizations and Prime Parking Functions
Permutation Factorizations and Prime Parking Functions Amarpreet Rattan Department of Combinatorics and Optimization University of Waterloo Waterloo, ON, Canada N2L 3G1 arattan@math.uwaterloo.ca June 10,
More informationGUESSING MODELS IMPLY THE SINGULAR CARDINAL HYPOTHESIS arxiv: v1 [math.lo] 25 Mar 2019
GUESSING MODELS IMPLY THE SINGULAR CARDINAL HYPOTHESIS arxiv:1903.10476v1 [math.lo] 25 Mar 2019 Abstract. In this article we prove three main theorems: (1) guessing models are internally unbounded, (2)
More informationBrouwer, A.E.; Koolen, J.H.
Brouwer, A.E.; Koolen, J.H. Published in: European Journal of Combinatorics DOI: 10.1016/j.ejc.008.07.006 Published: 01/01/009 Document Version Publisher s PDF, also known as Version of Record (includes
More informationAlgebra homework 8 Homomorphisms, isomorphisms
MATH-UA.343.005 T.A. Louis Guigo Algebra homework 8 Homomorphisms, isomorphisms For every n 1 we denote by S n the n-th symmetric group. Exercise 1. Consider the following permutations: ( ) ( 1 2 3 4 5
More informationLaurence Boxer and Ismet KARACA
THE CLASSIFICATION OF DIGITAL COVERING SPACES Laurence Boxer and Ismet KARACA Abstract. In this paper we classify digital covering spaces using the conjugacy class corresponding to a digital covering space.
More informationCOMBINATORICS OF REDUCTIONS BETWEEN EQUIVALENCE RELATIONS
COMBINATORICS OF REDUCTIONS BETWEEN EQUIVALENCE RELATIONS DAN HATHAWAY AND SCOTT SCHNEIDER Abstract. We discuss combinatorial conditions for the existence of various types of reductions between equivalence
More informationLaurence Boxer and Ismet KARACA
SOME PROPERTIES OF DIGITAL COVERING SPACES Laurence Boxer and Ismet KARACA Abstract. In this paper we study digital versions of some properties of covering spaces from algebraic topology. We correct and
More informationThe Real Numbers. Here we show one way to explicitly construct the real numbers R. First we need a definition.
The Real Numbers Here we show one way to explicitly construct the real numbers R. First we need a definition. Definitions/Notation: A sequence of rational numbers is a funtion f : N Q. Rather than write
More informationThe Limiting Distribution for the Number of Symbol Comparisons Used by QuickSort is Nondegenerate (Extended Abstract)
The Limiting Distribution for the Number of Symbol Comparisons Used by QuickSort is Nondegenerate (Extended Abstract) Patrick Bindjeme 1 James Allen Fill 1 1 Department of Applied Mathematics Statistics,
More informationSublinear Time Algorithms Oct 19, Lecture 1
0368.416701 Sublinear Time Algorithms Oct 19, 2009 Lecturer: Ronitt Rubinfeld Lecture 1 Scribe: Daniel Shahaf 1 Sublinear-time algorithms: motivation Twenty years ago, there was practically no investigation
More informationIN GRAPHS. Hamideh Aram. Department of Mathematics Gareziaeddin Center, Khoy Branch Islamic Azad University, Khoy, Iran
Discussiones Mathematicae Graph Theory 38 (018) 991 1006 doi:10.7151/dmgt.054 ETERNAL m-security BONDAGE NUMBERS IN GRAPHS Hamideh Aram Department of Mathematics Gareziaeddin Center, Khoy Branch Islamic
More informationAnalysis of Link Reversal Routing Algorithms for Mobile Ad Hoc Networks
Analysis of Link Reversal Routing Algorithms for Mobile Ad Hoc Networks Costas Busch Rensselaer Polytechnic Inst. Troy, NY 12180 buschc@cs.rpi.edu Srikanth Surapaneni Rensselaer Polytechnic Inst. Troy,
More informationStructural Induction
Structural Induction Jason Filippou CMSC250 @ UMCP 07-05-2016 Jason Filippou (CMSC250 @ UMCP) Structural Induction 07-05-2016 1 / 26 Outline 1 Recursively defined structures 2 Proofs Binary Trees Jason
More informationTwo-lit trees for lit-only sigma-game
Two-lit trees for lit-only sigma-game Hau-wen Huang July 24, 2018 arxiv:1010.5846v3 [math.co] 14 Aug 2012 Abstract A configuration of the lit-only σ-game on a finite graph Γ is an assignment of one of
More informationThe skew-rank of oriented graphs
The skew-rank of oriented graphs Xueliang Li a, Guihai Yu a,b, a Center for Combinatorics and LPMC-TJKLC arxiv:14047230v1 [mathco] 29 Apr 2014 Nankai University, Tianjin 300071, China b Department of Mathematics
More informationEssays on Some Combinatorial Optimization Problems with Interval Data
Essays on Some Combinatorial Optimization Problems with Interval Data a thesis submitted to the department of industrial engineering and the institute of engineering and sciences of bilkent university
More informationHyperidentities in (xx)y xy Graph Algebras of Type (2,0)
Int. Journal of Math. Analysis, Vol. 8, 2014, no. 9, 415-426 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ijma.2014.312299 Hyperidentities in (xx)y xy Graph Algebras of Type (2,0) W. Puninagool
More informationSome Explicit Formulae of NAF and its Left-to-Right Analogue
Some Explicit Formulae of NAF and its Left-to-Right Analogue Dong-Guk Han, Tetsuya Izu, and Tsuyoshi Takagi FUTURE UNIVERSITY-HAKODATE, 6- Kamedanakano-cho, Hakodate, Hokkaido, 4-8655, Japan {christa,takagi}@funacjp
More informationYunfeng Jia a,, Lixin Tian a,b
ISSN 1749-3889 (print), 1749-3897 (online) International Journal of Nonlinear Science Vol.23(217) No.3, pp.151-156 Dynamical Features of International Natural Gas Future Price and Spot Price in Different
More informationarxiv: v3 [cs.gt] 12 Apr 2017
Multi-Player Diffusion Games on Graph Classes arxiv:1412.2544v3 [cs.gt] 12 Apr 2017 Laurent Bulteau 1, Vincent Froese 2, and Nimrod Talmon 3 1 IGM-LabInfo, CNRS UMR 8049, Université Paris-Est Marne-la-Vallée,
More informationNOTES ON FIBONACCI TREES AND THEIR OPTIMALITY* YASUICHI HORIBE INTRODUCTION 1. FIBONACCI TREES
0#0# NOTES ON FIBONACCI TREES AND THEIR OPTIMALITY* YASUICHI HORIBE Shizuoka University, Hamamatsu, 432, Japan (Submitted February 1982) INTRODUCTION Continuing a previous paper [3], some new observations
More informationLossy compression of permutations
Lossy compression of permutations The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters. Citation As Published Publisher Wang, Da, Arya Mazumdar,
More informationCrash-tolerant Consensus in Directed Graph Revisited
Crash-tolerant Consensus in Directed Graph Revisited Ashish Choudhury Gayathri Garimella Arpita Patra Divya Ravi Pratik Sarkar Abstract Fault-tolerant distributed consensus is a fundamental problem in
More informationCSE 21 Winter 2016 Homework 6 Due: Wednesday, May 11, 2016 at 11:59pm. Instructions
CSE 1 Winter 016 Homework 6 Due: Wednesday, May 11, 016 at 11:59pm Instructions Homework should be done in groups of one to three people. You are free to change group members at any time throughout the
More informationAn Application of Ramsey Theorem to Stopping Games
An Application of Ramsey Theorem to Stopping Games Eran Shmaya, Eilon Solan and Nicolas Vieille July 24, 2001 Abstract We prove that every two-player non zero-sum deterministic stopping game with uniformly
More informationAn Optimal Algorithm for Calculating the Profit in the Coins in a Row Game
An Optimal Algorithm for Calculating the Profit in the Coins in a Row Game Tomasz Idziaszek University of Warsaw idziaszek@mimuw.edu.pl Abstract. On the table there is a row of n coins of various denominations.
More informationNotes on the symmetric group
Notes on the symmetric group 1 Computations in the symmetric group Recall that, given a set X, the set S X of all bijections from X to itself (or, more briefly, permutations of X) is group under function
More informationCS134: Networks Spring Random Variables and Independence. 1.2 Probability Distribution Function (PDF) Number of heads Probability 2 0.
CS134: Networks Spring 2017 Prof. Yaron Singer Section 0 1 Probability 1.1 Random Variables and Independence A real-valued random variable is a variable that can take each of a set of possible values in
More informationLecture 6. 1 Polynomial-time algorithms for the global min-cut problem
ORIE 633 Network Flows September 20, 2007 Lecturer: David P. Williamson Lecture 6 Scribe: Animashree Anandkumar 1 Polynomial-time algorithms for the global min-cut problem 1.1 The global min-cut problem
More informationOn the Number of Permutations Avoiding a Given Pattern
On the Number of Permutations Avoiding a Given Pattern Noga Alon Ehud Friedgut February 22, 2002 Abstract Let σ S k and τ S n be permutations. We say τ contains σ if there exist 1 x 1 < x 2
More informationECE 586GT: Problem Set 1: Problems and Solutions Analysis of static games
University of Illinois Fall 2018 ECE 586GT: Problem Set 1: Problems and Solutions Analysis of static games Due: Tuesday, Sept. 11, at beginning of class Reading: Course notes, Sections 1.1-1.4 1. [A random
More informationPalindromic Permutations and Generalized Smarandache Palindromic Permutations
arxiv:math/0607742v2 [mathgm] 8 Sep 2007 Palindromic Permutations and Generalized Smarandache Palindromic Permutations Tèmítópé Gbóláhàn Jaíyéọlá Department of Mathematics, Obafemi Awolowo University,
More informationOrthogonality to the value group is the same as generic stability in C-minimal expansions of ACVF
Orthogonality to the value group is the same as generic stability in C-minimal expansions of ACVF Will Johnson February 18, 2014 1 Introduction Let T be some C-minimal expansion of ACVF. Let U be the monster
More informationComputing Unsatisfiable k-sat Instances with Few Occurrences per Variable
Computing Unsatisfiable k-sat Instances with Few Occurrences per Variable Shlomo Hoory and Stefan Szeider Department of Computer Science, University of Toronto, shlomoh,szeider@cs.toronto.edu Abstract.
More informationAlain Hertz 1 and Sacha Varone 2
RAIRO Operations Research RAIRO Oper Res (2007) 6 66 DOI: 005/ro:2007028 A NOTE ON TREE REALIZATIONS OF MATRICES Alain Hertz and Sacha Varone 2 Abstract It is well known that each tree metric M has a unique
More informationInversion Formulae on Permutations Avoiding 321
Inversion Formulae on Permutations Avoiding 31 Pingge Chen College of Mathematics and Econometrics Hunan University Changsha, P. R. China. chenpingge@hnu.edu.cn Suijie Wang College of Mathematics and Econometrics
More informationarxiv: v1 [math.lo] 24 Feb 2014
Residuated Basic Logic II. Interpolation, Decidability and Embedding Minghui Ma 1 and Zhe Lin 2 arxiv:1404.7401v1 [math.lo] 24 Feb 2014 1 Institute for Logic and Intelligence, Southwest University, Beibei
More informationTWIST UNTANGLE AND RELATED KNOT GAMES
#G04 INTEGERS 14 (2014) TWIST UNTANGLE AND RELATED KNOT GAMES Sandy Ganzell Department of Mathematics and Computer Science, St. Mary s College of Maryland, St. Mary s City, Maryland sganzell@smcm.edu Alex
More informationCumulants and triangles in Erdős-Rényi random graphs
Cumulants and triangles in Erdős-Rényi random graphs Valentin Féray partially joint work with Pierre-Loïc Méliot (Orsay) and Ashkan Nighekbali (Zürich) Institut für Mathematik, Universität Zürich Probability
More informationREMARKS ON K3 SURFACES WITH NON-SYMPLECTIC AUTOMORPHISMS OF ORDER 7
REMARKS ON K3 SURFACES WTH NON-SYMPLECTC AUTOMORPHSMS OF ORDER 7 SHNGO TAK Abstract. n this note, we treat a pair of a K3 surface and a non-symplectic automorphism of order 7m (m = 1, 3 and 6) on it. We
More informationTug of War Game. William Gasarch and Nick Sovich and Paul Zimand. October 6, Abstract
Tug of War Game William Gasarch and ick Sovich and Paul Zimand October 6, 2009 To be written later Abstract Introduction Combinatorial games under auction play, introduced by Lazarus, Loeb, Propp, Stromquist,
More informationTHE NUMBER OF UNARY CLONES CONTAINING THE PERMUTATIONS ON AN INFINITE SET
THE NUMBER OF UNARY CLONES CONTAINING THE PERMUTATIONS ON AN INFINITE SET MICHAEL PINSKER Abstract. We calculate the number of unary clones (submonoids of the full transformation monoid) containing the
More informationGlobal Joint Distribution Factorizes into Local Marginal Distributions on Tree-Structured Graphs
Teaching Note October 26, 2007 Global Joint Distribution Factorizes into Local Marginal Distributions on Tree-Structured Graphs Xinhua Zhang Xinhua.Zhang@anu.edu.au Research School of Information Sciences
More informationSy D. Friedman. August 28, 2001
0 # and Inner Models Sy D. Friedman August 28, 2001 In this paper we examine the cardinal structure of inner models that satisfy GCH but do not contain 0 #. We show, assuming that 0 # exists, that such
More informationAn Optimal Odd Unimodular Lattice in Dimension 72
An Optimal Odd Unimodular Lattice in Dimension 72 Masaaki Harada and Tsuyoshi Miezaki September 27, 2011 Abstract It is shown that if there is an extremal even unimodular lattice in dimension 72, then
More informationSpecial M-Hyperidentities in Triregular Leftmost without Loop and Reverse Arc Graph Varieties of Type (2,0)
International Mathematical Forum, Vol. 7, 2012, no. 39, 1925-1940 Special M-Hyperidentities in Triregular Leftmost without Loop and Reverse Arc Graph Varieties of Type (2,0) Apinant Anantpinitwatna and
More informationMAT 4250: Lecture 1 Eric Chung
1 MAT 4250: Lecture 1 Eric Chung 2Chapter 1: Impartial Combinatorial Games 3 Combinatorial games Combinatorial games are two-person games with perfect information and no chance moves, and with a win-or-lose
More informationLecture 2: The Simple Story of 2-SAT
0510-7410: Topics in Algorithms - Random Satisfiability March 04, 2014 Lecture 2: The Simple Story of 2-SAT Lecturer: Benny Applebaum Scribe(s): Mor Baruch 1 Lecture Outline In this talk we will show that
More informationOn the h-vector of a Lattice Path Matroid
On the h-vector of a Lattice Path Matroid Jay Schweig Department of Mathematics University of Kansas Lawrence, KS 66044 jschweig@math.ku.edu Submitted: Sep 16, 2009; Accepted: Dec 18, 2009; Published:
More informationarxiv: v2 [math.lo] 13 Feb 2014
A LOWER BOUND FOR GENERALIZED DOMINATING NUMBERS arxiv:1401.7948v2 [math.lo] 13 Feb 2014 DAN HATHAWAY Abstract. We show that when κ and λ are infinite cardinals satisfying λ κ = λ, the cofinality of the
More informationDiscrete Mathematics for CS Spring 2008 David Wagner Final Exam
CS 70 Discrete Mathematics for CS Spring 2008 David Wagner Final Exam PRINT your name:, (last) SIGN your name: (first) PRINT your Unix account login: Your section time (e.g., Tue 3pm): Name of the person
More informationOn the Optimality of a Family of Binary Trees Techical Report TR
On the Optimality of a Family of Binary Trees Techical Report TR-011101-1 Dana Vrajitoru and William Knight Indiana University South Bend Department of Computer and Information Sciences Abstract In this
More informationIntroduction to Greedy Algorithms: Huffman Codes
Introduction to Greedy Algorithms: Huffman Codes Yufei Tao ITEE University of Queensland In computer science, one interesting method to design algorithms is to go greedy, namely, keep doing the thing that
More informationarxiv: v1 [math.co] 6 Oct 2009
THE DESCENT STATISTIC OVER 123-AVOIDING PERMUTATIONS arxiv:0910.0963v1 [math.co] 6 Oct 2009 MARILENA BARNABEI, FLAVIO BONETTI, AND MATTEO SILIMBANI Abstract We exploit Krattenthaler s bijection between
More informationAmerican Option Pricing Formula for Uncertain Financial Market
American Option Pricing Formula for Uncertain Financial Market Xiaowei Chen Uncertainty Theory Laboratory, Department of Mathematical Sciences Tsinghua University, Beijing 184, China chenxw7@mailstsinghuaeducn
More informationCONGRUENCES AND IDEALS IN A DISTRIBUTIVE LATTICE WITH RESPECT TO A DERIVATION
Bulletin of the Section of Logic Volume 42:1/2 (2013), pp. 1 10 M. Sambasiva Rao CONGRUENCES AND IDEALS IN A DISTRIBUTIVE LATTICE WITH RESPECT TO A DERIVATION Abstract Two types of congruences are introduced
More informationOn Packing Densities of Set Partitions
On Packing Densities of Set Partitions Adam M.Goyt 1 Department of Mathematics Minnesota State University Moorhead Moorhead, MN 56563, USA goytadam@mnstate.edu Lara K. Pudwell Department of Mathematics
More informationCartesian Product of Two S-Valued Graphs
Global Journal of Mathematical Sciences: Theory and Practical. ISSN 0974-3200 Volume 9, Number 3 (2017), pp. 347-355 International Research Publication House http://www.irphouse.com Cartesian Product of
More informationOn the Pentagon Relations of Valued Quivers
International Journal of Algebra, Vol. 9, 2015, no. 8, 355-369 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ija.2015.5745 On the Pentagon Relations of Valued Quivers Yousuf A. Alkhezi Public
More informationSome Remarks on Finitely Quasi-injective Modules
EUROPEAN JOURNAL OF PURE AND APPLIED MATHEMATICS Vol. 6, No. 2, 2013, 119-125 ISSN 1307-5543 www.ejpam.com Some Remarks on Finitely Quasi-injective Modules Zhu Zhanmin Department of Mathematics, Jiaxing
More informationYao s Minimax Principle
Complexity of algorithms The complexity of an algorithm is usually measured with respect to the size of the input, where size may for example refer to the length of a binary word describing the input,
More informationA NEW NOTION OF TRANSITIVE RELATIVE RETURN RATE AND ITS APPLICATIONS USING STOCHASTIC DIFFERENTIAL EQUATIONS. Burhaneddin İZGİ
A NEW NOTION OF TRANSITIVE RELATIVE RETURN RATE AND ITS APPLICATIONS USING STOCHASTIC DIFFERENTIAL EQUATIONS Burhaneddin İZGİ Department of Mathematics, Istanbul Technical University, Istanbul, Turkey
More informationA note on the number of (k, l)-sum-free sets
A note on the number of (k, l)-sum-free sets Tomasz Schoen Mathematisches Seminar Universität zu Kiel Ludewig-Meyn-Str. 4, 4098 Kiel, Germany tos@numerik.uni-kiel.de and Department of Discrete Mathematics
More informationA Theory of Value Distribution in Social Exchange Networks
A Theory of Value Distribution in Social Exchange Networks Kang Rong, Qianfeng Tang School of Economics, Shanghai University of Finance and Economics, Shanghai 00433, China Key Laboratory of Mathematical
More informationOn Toponogov s Theorem
On Toponogov s Theorem Viktor Schroeder 1 Trigonometry of constant curvature spaces Let κ R be given. Let M κ be the twodimensional simply connected standard space of constant curvature κ. Thus M κ is
More informationA Theory of Value Distribution in Social Exchange Networks
A Theory of Value Distribution in Social Exchange Networks Kang Rong, Qianfeng Tang School of Economics, Shanghai University of Finance and Economics, Shanghai 00433, China Key Laboratory of Mathematical
More informationarxiv: v1 [math.lo] 27 Mar 2009
arxiv:0903.4691v1 [math.lo] 27 Mar 2009 COMBINATORIAL AND MODEL-THEORETICAL PRINCIPLES RELATED TO REGULARITY OF ULTRAFILTERS AND COMPACTNESS OF TOPOLOGICAL SPACES. V. PAOLO LIPPARINI Abstract. We generalize
More informationTWO-PERIODIC TERNARY RECURRENCES AND THEIR BINET-FORMULA 1. INTRODUCTION
TWO-PERIODIC TERNARY RECURRENCES AND THEIR BINET-FORMULA M. ALP, N. IRMAK and L. SZALAY Abstract. The properties of k-periodic binary recurrences have been discussed by several authors. In this paper,
More informationThe Probabilistic Method - Probabilistic Techniques. Lecture 7: Martingales
The Probabilistic Method - Probabilistic Techniques Lecture 7: Martingales Sotiris Nikoletseas Associate Professor Computer Engineering and Informatics Department 2015-2016 Sotiris Nikoletseas, Associate
More informationarxiv: v1 [cs.dm] 4 Jan 2012
COPS AND INVISIBLE ROBBERS: THE COST OF DRUNKENNESS ATHANASIOS KEHAGIAS, DIETER MITSCHE, AND PAWE L PRA LAT arxiv:1201.0946v1 [cs.dm] 4 Jan 2012 Abstract. We examine a version of the Cops and Robber (CR)
More informationNo-arbitrage theorem for multi-factor uncertain stock model with floating interest rate
Fuzzy Optim Decis Making 217 16:221 234 DOI 117/s17-16-9246-8 No-arbitrage theorem for multi-factor uncertain stock model with floating interest rate Xiaoyu Ji 1 Hua Ke 2 Published online: 17 May 216 Springer
More informationStudy of Monotonicity of Trinomial Arcs M(p, k, r, n) when 1 <α<+
International Journal of Algebra, Vol. 1, 2007, no. 10, 477-485 Study of Monotonicity of Trinomial Arcs M(p, k, r, n) when 1
More informationThe Binomial Theorem and Consequences
The Binomial Theorem and Consequences Juris Steprāns York University November 17, 2011 Fermat s Theorem Pierre de Fermat claimed the following theorem in 1640, but the first published proof (by Leonhard
More informationAn Optimal Algorithm for Finding All the Jumps of a Monotone Step-Function. Stutistics Deportment, Tel Aoio Unioersitv, Tel Aoiu, Isrue169978
An Optimal Algorithm for Finding All the Jumps of a Monotone Step-Function REFAEL HASSIN AND NIMROD MEGIDDO* Stutistics Deportment, Tel Aoio Unioersitv, Tel Aoiu, Isrue169978 Received July 26, 1983 The
More informationKIER DISCUSSION PAPER SERIES
KIER DISCUSSION PAPER SERIES KYOTO INSTITUTE OF ECONOMIC RESEARCH http://www.kier.kyoto-u.ac.jp/index.html Discussion Paper No. 657 The Buy Price in Auctions with Discrete Type Distributions Yusuke Inami
More informationOptimal Allocation of Policy Limits and Deductibles
Optimal Allocation of Policy Limits and Deductibles Ka Chun Cheung Email: kccheung@math.ucalgary.ca Tel: +1-403-2108697 Fax: +1-403-2825150 Department of Mathematics and Statistics, University of Calgary,
More informationLATTICE EFFECT ALGEBRAS DENSELY EMBEDDABLE INTO COMPLETE ONES
K Y BERNETIKA VOLUM E 47 ( 2011), NUMBER 1, P AGES 100 109 LATTICE EFFECT ALGEBRAS DENSELY EMBEDDABLE INTO COMPLETE ONES Zdenka Riečanová An effect algebraic partial binary operation defined on the underlying
More informationLecture l(x) 1. (1) x X
Lecture 14 Agenda for the lecture Kraft s inequality Shannon codes The relation H(X) L u (X) = L p (X) H(X) + 1 14.1 Kraft s inequality While the definition of prefix-free codes is intuitively clear, we
More informationComputing Unsatisfiable k-sat Instances with Few Occurrences per Variable
Computing Unsatisfiable k-sat Instances with Few Occurrences per Variable Shlomo Hoory and Stefan Szeider Abstract (k, s)-sat is the propositional satisfiability problem restricted to instances where each
More information0/1 knapsack problem knapsack problem
1 (1) 0/1 knapsack problem. A thief robbing a safe finds it filled with N types of items of varying size and value, but has only a small knapsack of capacity M to use to carry the goods. More precisely,
More informationTHE TRAVELING SALESMAN PROBLEM FOR MOVING POINTS ON A LINE
THE TRAVELING SALESMAN PROBLEM FOR MOVING POINTS ON A LINE GÜNTER ROTE Abstract. A salesperson wants to visit each of n objects that move on a line at given constant speeds in the shortest possible time,
More informationCONSTRUCTION OF CODES BY LATTICE VALUED FUZZY SETS. 1. Introduction. Novi Sad J. Math. Vol. 35, No. 2, 2005,
Novi Sad J. Math. Vol. 35, No. 2, 2005, 155-160 CONSTRUCTION OF CODES BY LATTICE VALUED FUZZY SETS Mališa Žižović 1, Vera Lazarević 2 Abstract. To every finite lattice L, one can associate a binary blockcode,
More informationOn the Distribution and Its Properties of the Sum of a Normal and a Doubly Truncated Normal
The Korean Communications in Statistics Vol. 13 No. 2, 2006, pp. 255-266 On the Distribution and Its Properties of the Sum of a Normal and a Doubly Truncated Normal Hea-Jung Kim 1) Abstract This paper
More informationA No-Arbitrage Theorem for Uncertain Stock Model
Fuzzy Optim Decis Making manuscript No (will be inserted by the editor) A No-Arbitrage Theorem for Uncertain Stock Model Kai Yao Received: date / Accepted: date Abstract Stock model is used to describe
More informationContinuous images of closed sets in generalized Baire spaces ESI Workshop: Forcing and Large Cardinals
Continuous images of closed sets in generalized Baire spaces ESI Workshop: Forcing and Large Cardinals Philipp Moritz Lücke (joint work with Philipp Schlicht) Mathematisches Institut, Rheinische Friedrich-Wilhelms-Universität
More information