COUNTING OCCURRENCES OF 132 IN AN EVEN PERMUTATION

Size: px
Start display at page:

Download "COUNTING OCCURRENCES OF 132 IN AN EVEN PERMUTATION"

Transcription

1 IJMMS 00:5, PII. S Hindawi Publishing Corp. COUNTING OCCURRENCES OF 13 IN AN EVEN PERMUTATION TOUFIK MANSOUR Received 9 April 003 We study the generating function for the number of even or odd) permutations on n letters containing exactly r 0 occurrences of a 13 pattern. It is shown that finding this function for a given r amounts to a routine check of all permutations in S r. 000 Mathematics Subject Classification: 05A05, 05A15, 05C Introduction. Let [n] ={1,,...,n} and let S n denote the set of all permutations of [n]. We will view permutations in S n as words with n distinct letters in [n]. A pattern is a permutation σ S k, and an occurrence of σ in a permutation π = π 1 π π n S n is a subsequence of π that is order equivalent to σ. For example, an occurrence of 13 is a subsequence π i π j π k 1 i<j<k n) ofπ such that π j <π i <π k.wedenote by τπ) the number of occurrences of τ in π, and we denote by s r σ n) the number of permutations π S n such that σπ)= r. In the last decade much attention has been paid to the problem of finding the numbers s r σ n) for a fixed r 0 and a given pattern τ see [1,, 3, 5, 6, 7, 10, 11, 1, 15, 16, 17, 18, 19]). Most of the authors consider only the case r = 0, thus studying permutations avoiding a given pattern. Only a few papers consider the case r>0, usually restricting themselves to patterns of length 3. Using two simple involutions reverse and complement) ons n, it is immediate that, with respect to being equidistributed, the six patterns of length three fall into the two classes {13,31} and {13,13,31,31}. Noonan [13] proved that s 1 13 n) = 3 n n. 1.1) n 3 Noonan and Zeilberger [1] suggested a general approach to the problem; they gave another proof of Noonan s result, and conjectured that s13 n) = 59n +117n+100 n, nn 1)n+5) n n 3 s13 1 n) =. n 3 The second conjecture was proved by Bóna in [6] and the first conjecture was proved by Fulmek [8]. Noonan and Zeilberger conjectured that s r σ n) is P-recursive in n for any r and τ. It was proved by Bóna [] forσ = 13. Mansour and Vainshtein [11] suggested a new approach to this problem in the case σ = 13, which allows one to get an explicit 1.)

2 1330 TOUFIK MANSOUR expression for s13 r n) for any given r. More precisely, they presented an algorithm that computes the generating function n 0 s13 r n)xn for any r 0. Let π be any permutation. The number of inversions of π is given by i π = {i,j) : π i >π j, i < j}. Thesignature of π is given by signπ) = 1) iπ.wesayπ is an even permutation resp., odd permutation) ifsignπ) = 1 resp., signπ) = 1). We denote by E n resp., O n ) the set of all even resp., odd) permutations in S n. Clearly, E n = O n =1/)n! for all n. We denote by eσ r n) resp., oσ r n)) the number of even resp., odd) permutations π E n resp., π O n ) such that σπ)= r. Apparently, for the first time the relation between even odd) permutations and pattern-avoidance problem was suggested by Simion and Schmidt in [16] forσ S 3.In particular, Simion and Schmidt [16] proved that e 0 13 n) = 1 n+1) o 0 13 n) = 1 n+1) n + 1 n n+1 n 1 n n+1 n 1 n 1 n 1 n 1 n 1 where = 0 and n is an even number. n 1)/ In this note, as a consequence of [1], we suggest a new approach to this problem in the case of even or odd) permutations where σ = 13, which allows one to get an explicit expression for e13 r n) for any given r. More precisely, we present an algorithm that computes the generating functions E r x) = n 0 e13 r n)xn and O r x) = n 0 o13 r n)xn for any r 0. To get the result for a given r, the algorithm performs certain routine checks for each element of the symmetric group S r. The algorithm has been implemented in C, and yields explicit results for 0 r 6. ), ), 1.3). Definitions and preliminary results. Recall the definitions kernel permutation, kernel cell decomposition, feasible cells, shapes, kernel shapes, and cells) and the notations s the size of the kernel, c the capacity of the kernel, and f the number of the feasible cells in the kernel cell decomposition) which are given in [1]. In this section we describe how the cell decomposition approach see [1]) can be determined by the generating function for the number of even permutations which contain the pattern 13 exactly r times. Let π be any permutation with a kernel permutation ρ, and assume that the feasible cells of the kernel cell decomposition associated with ρ are ordered linearly according to, C 1,C,...,C fρ) see [1, Lemma 3]). Let d j be the size of C j. For example, let π = with kernel permutation ρ = 13, then d 1 =, d = 1, d 3 = 0, and d = 1 see Figure.1). We denote by l j ρ) the number of the entries of ρ that lie to the north-west from C j or lie to the south-east from C j. For example, let ρ = 13, as on Figure.1, then l 1 ρ) = 3, l ρ) =, l 3 ρ) = 3, and l ρ) =. Clearly, l 1 ρ) = sρ) 1andl fρ) = sρ) for any nonempty kernel permutation ρ. Define signc) = 1) 1C) for any cell C.

3 COUNTING OCCURRENCES OF 13 IN AN EVEN PERMUTATION 1331 m C 3 l Figure.1. Kernel cell decomposition for π = S13). Lemma.1. For any permutation π with a kernel permutation ρ, signπ) = 1) 1 i j fρ) d id j + fρ) d j l j ρ)) signρ) fρ) sign C j)..1) Proof. To verify this formula, we count the number of occurrences of the pattern 1 in π. There are four possibilities for an occurrence of 1 in π. The first possibility is an occurrence in one of the cells C j, so in this case there are fρ) 1Cj ) occurrences. The second possibility is an occurrence in kerπ, so there are 1ρ) occurrences. The third possibility is an occurrence of two elements, of which the first belongs to kerπ and the second belongs to C i, so there are fρ) d jl j ρ) occurrences see [1, Lemmas and 5]). The fourth possibility is an occurrence of two elements, of which the first belongs to C i and the second belongs to C j where i<j see [1, Lemmas and 5]), so there are 1 i<j fρ)d i d j occurrences. Therefore, fρ) signπ) = 1) 1Cj ) 1) 1ρ) fρ) 1) d j l j ρ) 1) 1 i<j fρ) d id j,.) equivalently, signπ) = 1) 1 i j fρ) d id j + fρ) d j l j ρ)) signρ) fρ) signcj ). We say that the vector v = v 1,v,...,v n ) is a binary vector if v i {0,1} for all i, 1 i n. We denote the set of all binary vectors of length n by n. For any v n, we define v =v 1 + v + +v n. For example, ={0,0),0,1),1,0),1,1)} and 1,1,0,0,1) =3. For any kernel permutation ρ and for a =±1, we denote by X a ρ) resp., Y ρ a ) the set of all the binary vectors v fρ) such that 1) v +sρ) = a resp., 1) v = a). For any v fρ), we define 1 i<j fρ) z ρ v) = 1) v iv j + fρ) l j ρ)v j signρ)..3) Letting ρ be any kernel permutation and v = v 1,v,...,v fρ) ) fρ),wedenoteby Sρ;v) the set of all permutations of all sizes with kernel permutation ρ such that the

4 133 TOUFIK MANSOUR corresponding cells C j satisfy 1) d j = 1) v j ;insuchacontextv is called a length argument vector of ρ. By definitions, the following result holds immediately. Lemma.. For any kernel permutation ρ, Sρ) = Letting ρ be any kernel permutation and letting v fρ) Sρ;v)..) v = v 1,v,...,v fρ) ), u = u1,u,...,u fρ) ) fρ),.5) we denote by Sρ;v,u) the set of all permutations in Sρ;v) such that the corresponding cells C j satisfy signc j ) = 1 if and only if u j = 0; in such a context u is called a signature argument vector of ρ. By Lemma., the following result holds immediately. Lemma.3. For any kernel permutation ρ, Sρ) = v fρ) Sρ;v) = v fρ) u fρ) Sρ;v,u)..6) For any a,b {0,1} we define 1 Er x)+ 1) a E r x) ), if b = 0, H r a,b) = 1 Or x)+ 1) a O r x) ), if b = 1..7) By definitions, the following result holds immediately. Lemma.. Let a,b {0,1}. Then the generating function for all permutations π such that 13π) = r, 1) π = 1) a, and signπ) = 1) b is given by H r a,b), where π denotes the length of the permutation π. 3. Main theorem. The main result of this note can be formulated as follows. Denote by K the set of all kernel permutations, and by K t the set of all kernel shapes for permutations in S t. Letting ρ be any kernel permutation, for any a,b {0,1} and any r 1,...,r fρ), we define L ρ r 1,...,r fρ) a,b) = fρ) v X ρ 1) a u Y ρ 1) b zρ v) H rj vj,u j ). 3.1) Theorem 3.1. Let r 1. For any a,b {0,1}, H r a,b) = ρ K r +1 r 1 + +r fρ) =r cρ), r j 0 L ρ r 1,...,r fρ) a,b). 3.) Proof. We fix a kernel permutation ρ K r +1, a length argument vector v = v 1,..., v fρ) ) X 1) aρ), and a signature argument vector u = u 1,...,u fρ) ) Y fρ) 1) b z ρv).

5 COUNTING OCCURRENCES OF 13 IN AN EVEN PERMUTATION 1333 Recall that the kernel ρ of any π contains exactly cρ) occurrences of 13. The remaining r cρ) occurrences of 13 are distributed among the feasible cells of the kernel cell decomposition of π. By[1, Theorem ], each occurrence of 13 belongs entirely to one feasible cell, and the occurrences of 13 in different cells do not influence one another. Let π be any permutation such that 13π) = r,signπ) = 1) b, and 1) π = 1) a, together with a kernel permutation ρ, length argument vector v, and signature argument vector u. ThenbyLemma.3, the cells C j satisfy the following conditions: 1) v j = 0 if and only if d j is an even number, ) u j = 0 if and only if signc j ) = 1, 3) 1) v 1+ +v fρ) +sρ) = 1) a, ) 1) u 1+ +u fρ) z ρ v) = 1) b. Therefore, by Lemma., this contribution gives x sρ) fρ) r 1 + +r fρ) =r cρ), r j 0 H rj vj,u j ). 3.3) Hence by Lemma.3 and [1, Theorem 1], summing over all the kernel permutations ρ K r +1, length argument vectors v X 1) aρ), and signature argument vectors u Y fρ), then we get the desired result. 1) b z ρv) Theorem 3.1 provides a finite algorithm for finding E r x) and O r x) for any given r 0, since we only have to consider all permutations in S r +1 and to perform certain routine operations with all shapes found so far. Moreover, the amount of search can be decreased substantially due to the following theorem. Theorem 3.. The only kernel permutation of capacity r 1 and size r +1 is ρ = r 1,r +1,r 3,r,...,r j 3,r j,...,1,,. 3.) Its parameters are given by sρ) = r + 1, cρ) = r, fρ) = r +, signρ) = 1, and z ρ v 1,...,v r + ) = 1) 1+v r ++ 1 i<j r + v i v j ). Proof. The first part of the theorem holds by [1, Proposition]. Besides, by using the form of ρ we get sρ) = r + 1, cρ) = r, fρ) = r +, signρ) = 1, and l j ρ) = r for all j = 1,,...,r + 1andl r + ρ) = r + 1. Therefore, z ρ v 1,...,v r + ) = 1) 1+v r ++ 1 i<j r + v i v j ). By this theorem, it suffices to search only permutations in S r. Below we present several explicit calculations The case r = 0. Westartfromthecaser = 0. Observe that Theorem 3.1 remains valid for r = 0, provided that the left-hand side of 3.) fora = b = 0isreplaced by H r 0,0) 1 = 1/)E r x)+e r x)) 1; subtracting 1 here accounts for the empty permutation. So, we begin with finding kernel shapes for all permutations in S 1.

6 133 TOUFIK MANSOUR The only shape obtained is ρ 1 = 1, and it is easy to see that sρ 1 ) = 1, cρ 1 ) = 0, fρ 1 ) =, X 1 ρ1 = Y 1 = { 1,0),0,1) }, X 1 ρ1 = Y1 = { 0,0),1,1) }, z ρ1 0,0) = z ρ1 1,0) = z ρ1 1,1) = z ρ1 0,1) = ) Therefore, 3.) fora = b = 0gives 1 E0 x)+e 0 x) ) 1 = xh 0 1,0)H 0 0,0)+xH 0 1,1)H 0 0,1) +xh 0 1,0)H 0 0,1)+xH 0 1,1)H 0 0,0); 3.6) 3.) fora = 1 and b = 0gives 1 E0 x) E 0 x) ) = xh0 0,0)+xH 0 0,1)+xH 0 1,0)+xH 0 1,1); 3.7) 3.) fora = 0 and b = 1gives 1 O0 x)+o 0 x) ) = xh 0 1,1)H 0 0,0)+xH 0 1,0)H 0 0,1) +xh 0 0,0)H 0 1,0)+xH 0 0,1)H 0 1,1); 3.8) and 3.) fora = b = 1gives 1 O0 x) O 0 x) ) = xh 0 0,1)H 0 0,0)+xH 0 1,1)H 0 1,0). 3.9) Our present aim is to find explicitly E 0 x) and O 0 x), thus we need the following notation. We define for all r 0. Clearly, M r x) = E r x) O r x), F r x) = E r x)+o r x) 3.10) H r 0,0) H r 0,1) = 1 Mr x)+m r x) ), H r 0,0)+H r 0,1) = 1 Fr x)+f r x) ), H r 1,0) H r 1,1) = 1 Mr x) M r x) ), 3.11) H r 1,0)+H r 1,1) = 1 Fr x) F r x) ), for all r 0. Therefore, by subtracting resp., adding) 3.8) and 3.6), and by subtracting resp., adding) 3.9) and3.7), we get M 0 x)+m 0 x) =, M 0 x) M 0 x) = x M 0 x)+m 0 x)), F 0 x)+f 0 x) = +x F 0 x) F 0 x)), F 0 x) F 0 x) = x F 0 x)+f 0 x)). 3.1)

7 COUNTING OCCURRENCES OF 13 IN AN EVEN PERMUTATION 1335 Hence, M 0 x) = x x, F 0 x) = 1 1 x. 3.13) x Theorem 3.3. i) The generating function for the number of even permutations avoiding 13 is given by see [16]) E 0 x) = x x ) 1 x. 3.1) x ii) The generating function for the number of odd permutations avoiding 13 is given by see [16]) O 0 x) = x x 1 1 ) 1 x. 3.15) x iii) The generating function for the number of permutations avoiding 13 is given by see [9]) F 0 x) = 1 1 x. 3.16) x 3.. The case r = 1. Since permutations in S do not exhibit kernel shapes distinct from ρ 1, the only possible new shape is the exceptional one, ρ = 13. Calculation of the parameters of ρ gives sρ ) = 3, cρ ) = 1, fρ ) = 3, X 1 ρ = Y 1 = { 1,0,0),0,1,0),0,0,1),1,1,1) }, X 1 ρ = Y1 = { 0,0,0),1,1,0),1,0,1),1,1,0) }, z ρ 0,0,0) = z ρ 1,0,0) = z ρ 0,1,0) = z ρ 1,1,0) = 1, z ρ 0,0,1) = z ρ 1,0,1) = z ρ 0,1,1) = z ρ 1,1,1) = ) Therefore, by Theorem 3.1, we have H 1 0,0) H 1 0,1) ) = M 1 x)+m 1 x) = x3 M0 x) M 0 x) ) M0 x)+m 0 x)), H 1 1,0) H 1 1,1) ) = M 1 x) M 1 x) = x M 0 x)m 1 x)+m 0 x)m 1 x) ) 3.18) x3 M0 x)+m 0 x) ) M0 x)+m 0 x)). Using the expression for M 0 x) see the case r = 0) we get M 1 x) = 1 1+3x +x ) + 1 3x x +x 3 1 x ) 1/. 3.19)

8 1336 TOUFIK MANSOUR Similarly, considering the expressions for H 1 0,0) + H 1 0,1) and H 1 1,0) + H 1 1,1) we get F 1 x) = 1 1 3x x 1)+ 1 x) 1/. 3.0) Theorem 3.. i) The generating function for the number of even permutations containing 13 exactly once is given by E 1 x) = 1 1 x x ) + 1 3x 1 x) 1/ + 1 3x x +x 3 1 x ) 3.1) 1/. ii) The generating function for the number of odd permutations containing 13 exactly once is given by O 1 x) = 1 x +x ) + 1 3x 1 x) 1/ 1 3x x +x 3 1 x ) 1/. 3.) iii) The generating function for the number of permutations containing 13 exactly once is given by see [6]) F 1 x) = 1 1 3x x 1)+ 1 x) 1/. 3.3) 3.3. The case r =. We have to check the kernel shapes of permutations in S. Exhaustive search adds four new shapes to the previous list; these are 13, 13, 13, and 13; besides, there is the exceptional 351 S 5. Calculation of the parameters s, c, f, z, X a, Y a is straightforward, and we get the following theorem. Theorem 3.5. i) The generating function for the number of even permutations containing 13 exactly twice is given by E x) = 1 x x 3 +3x x 1 ) + 1 x x 3 +9x 15x + ) 1 x) 3/ 1 16x 7 8x 6 76x 5 +6x +36x 3 1x 5x + ) 1 x ) 3.) 3/. ii) The generating function for the number of odd permutations containing 13 exactly once is given by O x) = 1 x +3x 3 5x x + ) + 1 x x 3 +9x 15x + ) 1 x) 3/ 3.5) x 7 8x 6 76x 5 +6x +36x 3 1x 5x + ) 1 x ) 3/. iii) The generating function for the number of permutations containing 13 exactly twice is given by see [1]) F x) = 1 x +3x ) + 1 x x 3 +9x 15x + ) 1 x) 3/. 3.6)

9 COUNTING OCCURRENCES OF 13 IN AN EVEN PERMUTATION The cases r = 3,,5,6. Let r = 3,,5,6; exhaustive search in S 6, S 8, S 10, and S 1 reveals 0, 10, 503, and 576 new nonexceptional kernel shapes, respectively, and we get the following theorem. Theorem 3.6. Let r = 3,,5,6, then M r x) = 1 Ar x)+b r x) 1 x ) r +1/), F r x) = 1 Cr x)+d r x)1 x) r +1/), 3.7) where A 3 x) = x 6 +10x 5 x 30x 3 +3x +7x, A x) = x 8 +1x 7 6x 6 90x x +85x 3 x 8x +1, A 5 x) = x x 9 76x 8 198x x 6 +0x 5 355x 171x 3 +6x +10x, A 6 x) = 56x 13 6x 1 618x x 10 10x x 8 +10x 7 170x 6 130x x +30x 3 88x 15x +, B 3 x) = 6x 11 30x x x 8 +11x 7 97x 6 5x 5 +31x +100x 3 3x 7x +, B x) = 56x x x x x 11 +x x x 8 838x 7 +77x x 5 775x 197x 3 +56x +8x 1, B 5 x) = 10x x x x x x x x x x x x x x 6 780x x +351x 3 98x 10x +, B 6 x) = 588x x x 399x x x x x x x x x x x x x x x x x 5 353x 63x x +15x, C 3 x) = x 3 5x +7x, C x) = 5x 7x 3 +x +8x 3,

10 1338 TOUFIK MANSOUR C 5 x) = 1x 5 17x +x 3 16x +1x, C 6 x) = x 6 x 5 +5x +x 3 0x +19x, D 3 x) = x 6 106x 5 +9x 30x x 7x +, D x) = x 9 +18x x 7 175x x x, D 5 x) = 50x x x x 8 166x x x x 893x 3 +50x 50x +, D 6 x) = x 1 +80x x x x x x x x x x 790x x 107x ) Moreover, for r = 3,,5,6, E r x) = 1 Ar x)+c r x)+d r x)1 x) r +1/ +B r x) 1 x ) r +1/), O r x) = 1 Ar x) C r x)+d r x)1 x) r +1/ B r x) 1 x ) 3.9) r +1/).. Further results and open questions. First of all, we simplify the expression L ρ r 1,...,r fρ) a,0) L ρ r 1,...,r fρ) a,1),.1) where a = 0,1, r j 0 for all j. Lemma.1. Let v {0,1} n be any vector and let a {1, 1}. Then n n n H r vj,x j H r vj,y j = a g r j),.) x Y a y Y a where g r j) = H r v j,0) H r v j,1) = 1/)M r x)+ 1) v j M r x)) for all j. Proof. For any two vectors u,v n, define uv = 1ifu i = v i for all i j and u j + v j = 1, otherwise uv = 0. Using the standard reflected Gray code, with each of the standard Gray-code vectors reflected left-for-right for more details, see [0]), we get that there exists an arrangement of the binary vectors of n,say0,...,0) = u 1,u,...,u n, such that the first m vectors in the sequence, say v 1,...,v m, when restricted to their first m coordinates, satisfy that v j v j+1 = 1 for all j. In such a context this arrangement is called Gray-code arrangement. Now we are ready to prove the lemma. Without loss of generality we can assume that 0,0,...,0) Ya n which means a = 1); otherwise it is enough to replace a by a. Let x 1,...,x n be all the vectors of n with the Gray-code arrangement. Thus, using 0,0,...,0) Ya n, we get that x i 1 Ya n and x i Y a n for all i = 1,,..., n 1. Therefore,

11 for all i = 1,,..., n 1, COUNTING OCCURRENCES OF 13 IN AN EVEN PERMUTATION 1339 n 1 i=1 n H r v j,x i 1 = n 1 i=1 = g r 1) j ) n H r v j,x i n 1) i 1 g r 1) H r v j,x i 1 n i=1 j= n 1 H r ṽ j,y i 1 j j j H r ṽ j,y i, n 1 j.3) where y p = x p,...,xp n ) for all p = 1,,..., n 1,andṽ = v,v 3,...,v n ). The Gray-code arrangement for x 1,...,x n implies that the vectors y 1,...,y n 1 are arranged as Graycode arrangement in n 1. Hence, by induction on n by definitions, the lemma holds for n = 1), we get that the expression equals a n g r j). As a remark, the vector 0,...,0) Y ρ z ρv) if and only if z ρv) = 1 for any kernel permutation ρ and vector v. Therefore, by Theorem 3.1 and Lemma.1 we get the following theorem. Theorem.. Let a {0,1} and r 0. Then 1 Mr x)+ 1) a M r x) ) δ r +a,0 = ρ K r +1 x sρ) r 1,...,r fρ) =r cρ) v X 1) a ρ) fρ) z ρ v) fρ) Mrj x)+ 1) v j M rj x) )..) As a remark, the above theorem yields two equations for a = 0 and a = 1) that are linear on M r x) and M r x). So,Theorem. provides a finite algorithm for finding M r x) for any given r 0, since we have to consider all permutations in S r +1 and to perform certain routine operations with all shapes found so far. Moreover, the amount of search can be decreased substantially due to the following proposition which holds immediately by Theorems 3. and.. Proposition.3. Let r 1, a {0,1}, and ρ = r 1,r +1,r 3,r,...,r j 3,r j,...,1,,..5) Then the expression x sρ) r 1,...,r fρ) =r cρ), r j 0 v X 1) a ρ) fρ) z ρ v) fρ) Mrj x)+ 1) v j M rj x) ).6)

12 130 TOUFIK MANSOUR is given by [r +)/] r + 1) j a+1 r x r +1 M 0 x) M 0 x) ) j M0 x)+m 0 x) ) r + j. j +1 a j=a.7) By this proposition, it is sufficient to search only permutations in S r. Besides, using Theorem. and the case r = 0, together with induction on r, we get the following result. Theorem.. M r x) is a rational function on x and 1 x for any r 0. In view of our explicit results, we have an even stronger conjecture. Conjecture.5. For any r 1, there exist polynomials A r x), B r x), C r x), and D r x) with integer coefficients such that E r x) = 1 Ar x)+b r x) ) + 1 C r x)1 x) r +1/ + 1 D r x) 1 x ) r +1/, O r x) = 1 Ar x) B r x) ) + 1 C r x)1 x) r +1/ 1 D r x) 1 x ).8) r +1/. Acknowledgments. The author is grateful to the anonymous referees for their helpful comments. This research was financed by EC s IHRP Programme, within the Research Training Network Algebraic Combinatorics in Europe, Grant HPRN-CT References [1] N. Alon and E. Friedgut, On the number of permutations avoiding a given pattern, J. Combin. Theory Ser. A ), no. 1, [] M. D. Atkinson, Restricted permutations, Discrete Math ), no. 1 3, [3] M. Bóna, Exact enumeration of 13-avoiding permutations: a close link with labeled trees and planar maps, J. Combin. TheorySer. A ), no., [], The number of permutations with exactly r 13-subsequences is P-recursive in the size!, Adv. in Appl. Math ), no., [5], Permutations avoiding certain patterns: the case of length and some generalizations, Discrete Math ), no. 1 3, [6], Permutations with one or two 13-subsequences, Discrete Math ), no. 1 3, [7] T. Chow and J. West, Forbidden subsequences and Chebyshev polynomials, Discrete Math ), no. 1 3, [8] M. Fulmek, Enumeration of permutations containing a prescribed number of occurrences of a pattern of length three, Adv.inAppl.Math ), no., [9] D. E. Knuth,The Art of Computer Programming. Volume 3. Sorting and Searching, Addison- Wesley Series in Computer Science and Information Processing, Addison-Wesley Publishing, Massachusetts, [10] T. Mansour, Permutations containing and avoiding certain patterns, Formal Power Series and Algebraic Combinatorics Moscow, 000), Springer, Berlin, 000, pp [11] T. Mansour and A. Vainshtein, Restricted 13-avoiding permutations, Adv. in Appl. Math ), no. 3, [1], Counting occurrences of 13 in a permutation, Adv.inAppl.Math.8 00), no.,

13 COUNTING OCCURRENCES OF 13 IN AN EVEN PERMUTATION 131 [13] J. Noonan, The number of permutations containing exactly one increasing subsequence of length three, Discrete Math ), no. 1 3, [1] J. Noonan and D. Zeilberger, The enumeration of permutations with a prescribed number of forbidden patterns, Adv. inappl. Math ), no., [15] A. Robertson, Permutations containing and avoiding 13 and 13 patterns, Discrete Math. Theor. Comput. Sci ), no., [16] R. Simion and F. W. Schmidt, Restricted permutations, European J. Combin ), no., [17] Z. Stankova, Forbidden subsequences, Discrete Math ), no. 1 3, [18], Classification of forbidden subsequences of length, European J. Combin ), no. 5, [19] J. West, Generating trees and the Catalan and Schröder numbers, Discrete Math ), no. 1 3, 7 6. [0] H. S. Wilf, Combinatorial Algorithms: An Update, CBMS-NSF Regional Conference Series in Applied Mathematics, vol. 55, Society for Industrial and Applied Mathematics SIAM), Pennsylvania, Toufik Mansour: Department of Mathematics, Chalmers University of Technology, 196 Göteborg, Sweden address: toufik@math.chalmers.se

14 Journal of Applied Mathematics and Decision Sciences Special Issue on Intelligent Computational Methods for Financial Engineering Call for Papers As a multidisciplinary field, financial engineering is becoming increasingly important in today s economic and financial world, especially in areas such as portfolio management, asset valuation and prediction, fraud detection, and credit risk management. For example, in a credit risk context, the recently approved Basel II guidelines advise financial institutions to build comprehensible credit risk models in order to optimize their capital allocation policy. Computational methods are being intensively studied and applied to improve the quality of the financial decisions that need to be made. Until now, computational methods and models are central to the analysis of economic and financial decisions. However, more and more researchers have found that the financial environment is not ruled by mathematical distributions or statistical models. In such situations, some attempts have also been made to develop financial engineering models using intelligent computing approaches. For example, an artificial neural network ANN) is a nonparametric estimation technique which does not make any distributional assumptions regarding the underlying asset. Instead, ANN approach develops a model using sets of unknown parameters and lets the optimization routine seek the best fitting parameters to obtain the desired results. The main aim of this special issue is not to merely illustrate the superior performance of a new intelligent computational method, but also to demonstrate how it can be used effectively in a financial engineering environment to improve and facilitate financial decision making. In this sense, the submissions should especially address how the results of estimated computational models e.g., ANN, support vector machines, evolutionary algorithm, and fuzzy models) can be used to develop intelligent, easy-to-use, and/or comprehensible computational systems e.g., decision support systems, agent-based system, and web-based systems) This special issue will include but not be limited to) the following topics: Computational methods: artificial intelligence, neural networks, evolutionary algorithms, fuzzy inference, hybrid learning, ensemble learning, cooperative learning, multiagent learning Application fields: asset valuation and prediction, asset allocation and portfolio selection, bankruptcy prediction, fraud detection, credit risk management Implementation aspects: decision support systems, expert systems, information systems, intelligent agents, web service, monitoring, deployment, implementation Authors should follow the Journal of Applied Mathematics and Decision Sciences manuscript format described at the journal site Prospective authors should submit an electronic copy of their complete manuscript through the journal Manuscript Tracking System at according to the following timetable: Manuscript Due December 1, 008 First Round of Reviews March 1, 009 Publication Date June 1, 009 Guest Editors Lean Yu, AcademyofMathematicsandSystemsScience, Chinese Academy of Sciences, Beijing , China; Department of Management Sciences, City University of Hong Kong, Tat Chee Avenue, Kowloon, Hong Kong; yulean@amss.ac.cn Shouyang Wang, AcademyofMathematicsandSystems Science, Chinese Academy of Sciences, Beijing , China; sywang@amss.ac.cn K. K. Lai, Department of Management Sciences, City University of Hong Kong, Tat Chee Avenue, Kowloon, Hong Kong; mskklai@cityu.edu.hk Hindawi Publishing Corporation

Toufik Mansour 1. Department of Mathematics, Chalmers University of Technology, S Göteborg, Sweden

Toufik Mansour 1. Department of Mathematics, Chalmers University of Technology, S Göteborg, Sweden COUNTING OCCURRENCES OF 32 IN AN EVEN PERMUTATION Toufik Mansour Department of Mathematics, Chalmers University of Technology, S-4296 Göteborg, Sweden toufik@mathchalmersse Abstract We study the generating

More information

A NOTE ON THE HOMOMORPHISM THEOREM FOR HEMIRINGS

A NOTE ON THE HOMOMORPHISM THEOREM FOR HEMIRINGS Internal. J. Math. & Math. Sci. Vol. (1978)439-445 439 A NOTE ON THE HOMOMORPHISM THEOREM FOR HEMIRINGS D. M. OLSON Department of Mathematics Cameron University Lawton, Oklahoma 73501 U.S.A. (Recieved

More information

le2 { Re d(a, f)l de > (1.2) n=2ar, 01 < e 2 ON ALPHA-CLOSE-TO-CONVEX FUNCTIONS OF ORDER BETA functions. f(z) z + z a n Re (1 ) zf + (I + zf"(z)) do >

le2 { Re d(a, f)l de > (1.2) n=2ar, 01 < e 2 ON ALPHA-CLOSE-TO-CONVEX FUNCTIONS OF ORDER BETA functions. f(z) z + z a n Re (1 ) zf + (I + zf(z)) do > Internat. J. Math. & Math. Sci. Vol. 9 No. 3 (1986) 435-438 435 ON ALPHA-CLOSE-TO-CONVEX FUNCTIONS OF ORDER BETA M.A. NASR Faculty of Science University of Mansoura Mansoura, Egypt (Received January 9,

More information

ON THE CLASS OF QS-ALGEBRAS

ON THE CLASS OF QS-ALGEBRAS IJMMS 2004:49, 2629 2639 PII. S0161171204309154 http://ijmms.hindawi.com Hindawi Publishing Corp. ON THE CLASS OF QS-ALGEBRAS MICHIRO KONDO Received 19 September 2003 We consider some fundamental properties

More information

fix- gx x +0 ff x 0 and fgx- gfxl 2x" 0 if x 0 so that f and g are compatible on R with the usual metric.

fix- gx x +0 ff x 0 and fgx- gfxl 2x 0 if x 0 so that f and g are compatible on R with the usual metric. Internat. J. Math. & Math. Sci. VOL. Ii NO. 2 (1988) 285-288 285 COMPATIBLE MAPPINGS AND COMMON FIXED POINTS (2) GERALD JUNGCK Department of Mathematics Bradley University Peoria, Illinois 61625 (Received

More information

ON THE NORMALIZER OF A GROUP IN THE CAYLEY REPRESENTATION

ON THE NORMALIZER OF A GROUP IN THE CAYLEY REPRESENTATION Internat. J. Math. & Math. Sci. VOL. 12 NO. 3 (1989) 459-462 459 ON THE NORMALIZER OF A GROUP IN THE CAYLEY REPRESENTATION SURINDER K. SEHGAL Department of Mathematics The Ohio State University Columbus,

More information

JACK-KANG CHAN. Norden Systems. 75 Maxess Road. Melville, New York Ax -b (1) det[a ix...i.; b: j] j 1,...,n det[a" ix...

JACK-KANG CHAN. Norden Systems. 75 Maxess Road. Melville, New York Ax -b (1) det[a ix...i.; b: j] j 1,...,n det[a ix... Internat. J. Math. & Math. Sci. VOL. 15 NO. (1992) 41-46 41 A NOVEL INTERPRETATION OF LEAST SQUARES SOLUTION JACK-KANG CHAN Norden Systems 75 Maxess Road Melville, New York 11747 (Received March 5, 1991

More information

A New Heuristic for the Quadratic Assignment Problem

A New Heuristic for the Quadratic Assignment Problem JOURNAL OF APPLIED MATHEMATICS AND DECISION SCIENCES, 6(3), 143 153 Copyright c 2002, Lawrence Erlbaum Associates, Inc. A New Heuristic for the Quadratic Assignment Problem ZVI DREZNER zdrezner@fullerton.edu

More information

EQUIDISTRIBUTION AND SIGN-BALANCE ON 132-AVOIDING PERMUTATIONS. Toufik Mansour 1,2

EQUIDISTRIBUTION AND SIGN-BALANCE ON 132-AVOIDING PERMUTATIONS. Toufik Mansour 1,2 Séminaire Lotharingien de Combinatoire 5 (2004), Article B5e EQUIDISTRIBUTION AND SIGN-BALANCE ON 32-AVOIDING PERMUTATIONS Toufik Mansour,2 Department of Mathematics, Chalmers University of Technology

More information

1. Introduction

1. Introduction Séminaire Lotharingien de Combinatoire 49 (2002), Article B49a AVOIDING 2-LETTER SIGNED PATTERNS T. MANSOUR A AND J. WEST B A LaBRI (UMR 5800), Université Bordeaux, 35 cours de la Libération, 33405 Talence

More information

JOURNAL OF APPLIED MATHEMATICS AND DECISION SCIENCES, 5(3), Copyright c 2001, Lawrence Erlbaum Associates, Inc.

JOURNAL OF APPLIED MATHEMATICS AND DECISION SCIENCES, 5(3), Copyright c 2001, Lawrence Erlbaum Associates, Inc. JOURNAL OF APPLIED MATHEMATICS AND DECISION SCIENCES, 5(3), 193 Copyright c 1, Lawrence Erlbaum Associates, Inc. Classroom Note Fourier Method for Laplace Transform Inversion M. IQBAL miqbal@kfupm.edu.sa

More information

LINEAR RECURRENCES AND CHEBYSHEV POLYNOMIALS

LINEAR RECURRENCES AND CHEBYSHEV POLYNOMIALS LINEAR RECURRENCES AND CHEBYSHEV POLYNOMIALS Sergey Kitaev Matematik Chalmers tekniska högskola och Göteborgs universitet S-412 96 Göteborg Sweden e-mail: kitaev@math.chalmers.se Toufik Mansour Matematik

More information

UNSTABLE K-COHOMOLOGY ALGEBRA IS FILTERED λ-ring

UNSTABLE K-COHOMOLOGY ALGEBRA IS FILTERED λ-ring IJMMS 2003:10, 593 605 PII. S0161171203208012 http://ijmms.hindawi.com Hindawi Publishing Corp. UNSTABLE K-COHOMOLOGY ALGEBRA IS FILTERED λ-ring DONALD YAU Received 3 August 2002 Boardman, Johnson, and

More information

arxiv:math/ v1 [math.co] 11 Oct 2002

arxiv:math/ v1 [math.co] 11 Oct 2002 COUNTING THE OCCURRENCES OF GENERALIZED PATTERNS IN WORDS GENERATED BY A MORPHISM arxiv:math/0210170v1 [math.co] 11 Oct 2002 Sergey Kitaev and Toufik Mansour 1 Matematik, Chalmers tekniska högskola och

More information

THE FOURIER TRANSFORMS OF LIPSCHITZ FUNCTIONS ON CERTAIN DOMAINS

THE FOURIER TRANSFORMS OF LIPSCHITZ FUNCTIONS ON CERTAIN DOMAINS Internat. J. Math. & Math. Sci. VOL. 20 NO. 4 (1997) 817-822 817 THE FOURIER TRANSFORMS OF LISCHITZ FUNCTIONS ON CERTAIN DOMAINS M.S. YOUNIS Department of Mathematics Yarmouk University Irbid, JORDAN (Received

More information

Counting Permutations by their Rigid Patterns

Counting Permutations by their Rigid Patterns Counting Permutations by their Rigid Patterns A. N. Myers anmyers@math.upenn.edu University of Pennsylvania Philadelphia, PA 19104-6395 September 20, 2002 1 Abstract In how many permutations does the pattern

More information

Some statistics on permutations avoiding generalized patterns

Some statistics on permutations avoiding generalized patterns PUMA Vol 8 (007), No 4, pp 7 Some statistics on permutations avoiding generalized patterns Antonio Bernini Università di Firenze, Dipartimento di Sistemi e Informatica, viale Morgagni 65, 504 Firenze,

More information

arxiv:math/ v1 [math.co] 2 Oct 2002

arxiv:math/ v1 [math.co] 2 Oct 2002 PARTIALLY ORDERED GENERALIZED PATTERNS AND k-ary WORDS SERGEY KITAEV AND TOUFIK MANSOUR arxiv:math/020023v [math.co] 2 Oct 2002 Matematik, Chalmers tekniska högskola och Göteborgs universitet, S-42 96

More information

GLOBAL PROPERTIES OF THE THREE-DIMENSIONAL PREDATOR-PREY LOTKA-VOLTERRA SYSTEMS

GLOBAL PROPERTIES OF THE THREE-DIMENSIONAL PREDATOR-PREY LOTKA-VOLTERRA SYSTEMS () Journal of Applied Mathematics & Decision Sciences, 3(2), 155-162 (1999) Reprints Available directly from the Editor. Printed in New Zealand. GLOBAL PROPERTIES OF THE THREE-DIMENSIONAL PREDATOR-PREY

More information

arxiv:math/ v2 [math.co] 30 Jan 2003

arxiv:math/ v2 [math.co] 30 Jan 2003 COUNTING OCCURRENCES OF SOME SUBWORD PATTERNS arxiv:math/0204320v2 [mathco] 30 Jan 2003 ALEXANDER BURSTEIN AND TOUFIK MANSOUR Abstract We find generating functions for the number of strings (words) containing

More information

The sigma-sequence and occurrences of some patterns, subsequences and subwords

The sigma-sequence and occurrences of some patterns, subsequences and subwords AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 29 (2004), Pages 187 200 The sigma-sequence and occurrences of some patterns, subsequences and subwords Sergey Kitaev Matematik Chalmers tekniska högskola och

More information

ON MULTI-AVOIDANCE OF RIGHT ANGLED NUMBERED POLYOMINO PATTERNS

ON MULTI-AVOIDANCE OF RIGHT ANGLED NUMBERED POLYOMINO PATTERNS INTEGERS: ELECTRONIC JOURNAL OF COMBINATORIAL NUMBER THEORY 4 (2004), #A21 ON MULTI-AVOIDANCE OF RIGHT ANGLED NUMBERED POLYOMINO PATTERNS Sergey Kitaev Department of Mathematics, University of Kentucky,

More information

Pattern Popularity in 132-Avoiding Permutations

Pattern Popularity in 132-Avoiding Permutations Pattern Popularity in 132-Avoiding Permutations The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters. Citation As Published Publisher Rudolph,

More information

A New Shuffle Convolution for Multiple Zeta Values

A New Shuffle Convolution for Multiple Zeta Values January 19, 2004 A New Shuffle Convolution for Multiple Zeta Values Ae Ja Yee 1 yee@math.psu.edu The Pennsylvania State University, Department of Mathematics, University Park, PA 16802 1 Introduction As

More information

Two-boundary lattice paths and parking functions

Two-boundary lattice paths and parking functions Two-boundary lattice paths and parking functions Joseph PS Kung 1, Xinyu Sun 2, and Catherine Yan 3,4 1 Department of Mathematics, University of North Texas, Denton, TX 76203 2,3 Department of Mathematics

More information

Restricted Motzkin permutations, Motzkin paths, continued fractions, and Chebyshev polynomials

Restricted Motzkin permutations, Motzkin paths, continued fractions, and Chebyshev polynomials Discrete Mathematics 305 (2005) 70 89 wwwelseviercom/locate/disc Restricted Motzkin permutations, Motzkin paths, continued fractions, and Chebyshev polynomials Sergi Elizalde a, Toufik Mansour b a Department

More information

Excluded permutation matrices and the Stanley Wilf conjecture

Excluded permutation matrices and the Stanley Wilf conjecture Excluded permutation matrices and the Stanley Wilf conjecture Adam Marcus Gábor Tardos November 2003 Abstract This paper examines the extremal problem of how many 1-entries an n n 0 1 matrix can have that

More information

LEAN BUFFERING IN SERIAL PRODUCTION LINES WITH BERNOULLI MACHINES

LEAN BUFFERING IN SERIAL PRODUCTION LINES WITH BERNOULLI MACHINES LEAN BUFFERING IN SERIAL PRODUCTION LINES WITH BERNOULLI MACHINES A. B. HU AND S. M. MEERKOV Received 8 February 26; Accepted 7 April 26 Lean buffering is the smallest buffer capacity necessary to ensure

More information

A Combinatorial Interpretation of the Numbers 6 (2n)! /n! (n + 2)!

A Combinatorial Interpretation of the Numbers 6 (2n)! /n! (n + 2)! 1 2 3 47 6 23 11 Journal of Integer Sequences, Vol. 8 (2005), Article 05.2.3 A Combinatorial Interpretation of the Numbers 6 (2n)! /n! (n + 2)! Ira M. Gessel 1 and Guoce Xin Department of Mathematics Brandeis

More information

Words restricted by patterns with at most 2 distinct letters

Words restricted by patterns with at most 2 distinct letters Words restricted by patterns with at most 2 distinct letters Alexander Burstein Department of Mathematics Iowa State University Ames, IA 50011-2064 USA burstein@math.iastate.edu Toufik Mansour LaBRI, Université

More information

ENUMERATING PERMUTATIONS AVOIDING A PAIR OF BABSON-STEINGRíMSSON PATTERNS

ENUMERATING PERMUTATIONS AVOIDING A PAIR OF BABSON-STEINGRíMSSON PATTERNS ENUMERATING PERMUTATIONS AVOIDING A PAIR OF BABSON-STEINGRíMSSON PATTERNS ANDERS CLAESSON AND TOUFIK MANSOUR Abstract. Babson and Steingrímsson introduced generalized permutation patterns that allow the

More information

Enumeration Schemes for Words Avoiding Permutations

Enumeration Schemes for Words Avoiding Permutations Enumeration Schemes for Words Avoiding Permutations Lara Pudwell November 27, 2007 Abstract The enumeration of permutation classes has been accomplished with a variety of techniques. One wide-reaching

More information

On the mean connected induced subgraph order of cographs

On the mean connected induced subgraph order of cographs AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 71(1) (018), Pages 161 183 On the mean connected induced subgraph order of cographs Matthew E Kroeker Lucas Mol Ortrud R Oellermann University of Winnipeg Winnipeg,

More information

CENTER CONDITIONS FOR A SIMPLE CLASS OF QUINTIC SYSTEMS

CENTER CONDITIONS FOR A SIMPLE CLASS OF QUINTIC SYSTEMS IJMMS 29:11 2002) 625 632 PII. S0161171202012802 http://ijmms.hindawi.com Hindawi Publishing Corp. CENTER CONDITIONS FOR A SIMPLE CLASS OF QUINTIC SYSTEMS EVGENII P. VOLOKITIN Received 13 April 2001 and

More information

If(t-u) g(u) du. Department of Mathematics. (f*g)(t) KEY WORDS AND PHRASES. Abelian theorem, Boehmian, convolution, generalized

If(t-u) g(u) du. Department of Mathematics. (f*g)(t) KEY WORDS AND PHRASES. Abelian theorem, Boehmian, convolution, generalized Internat. J. Math. & Math. Sci. VOL. 17 NO. 3 (1994) 489-496 489 ABELIAN THEOREMS FOR TRANSFORMABLE BOEHMIANS DENNIS NEMZER Department of Mathematics California State University, Stanislaus Turlock, California

More information

arxiv:math/ v1 [math.co] 10 Nov 1998

arxiv:math/ v1 [math.co] 10 Nov 1998 A self-dual poset on objects counted by the Catalan numbers arxiv:math/9811067v1 [math.co] 10 Nov 1998 Miklós Bóna School of Mathematics Institute for Advanced Study Princeton, NJ 08540 April 11, 2017

More information

Hanoi Graphs and Some Classical Numbers

Hanoi Graphs and Some Classical Numbers Hanoi Graphs and Some Classical Numbers Sandi Klavžar Uroš Milutinović Ciril Petr Abstract The Hanoi graphs Hp n model the p-pegs n-discs Tower of Hanoi problem(s). It was previously known that Stirling

More information

Enumerating split-pair arrangements

Enumerating split-pair arrangements Journal of Combinatorial Theory, Series A 115 (28 293 33 www.elsevier.com/locate/jcta Enumerating split-pair arrangements Ron Graham 1, Nan Zang Department of Computer Science, University of California

More information

Reverse mathematics of some topics from algorithmic graph theory

Reverse mathematics of some topics from algorithmic graph theory F U N D A M E N T A MATHEMATICAE 157 (1998) Reverse mathematics of some topics from algorithmic graph theory by Peter G. C l o t e (Chestnut Hill, Mass.) and Jeffry L. H i r s t (Boone, N.C.) Abstract.

More information

EVALUATION OF A FAMILY OF BINOMIAL DETERMINANTS

EVALUATION OF A FAMILY OF BINOMIAL DETERMINANTS EVALUATION OF A FAMILY OF BINOMIAL DETERMINANTS CHARLES HELOU AND JAMES A SELLERS Abstract Motivated by a recent work about finite sequences where the n-th term is bounded by n, we evaluate some classes

More information

"Ixi. NONTRIVIAL ISOMETRIES ON Sp() llxll. Ip + I Ixi+I xi Ip" For i < p, p 2, 0 < a <, a # i, STEPHEN L. CAMPBELL. I nternat. J. Math. & Math. Sci.

Ixi. NONTRIVIAL ISOMETRIES ON Sp() llxll. Ip + I Ixi+I xi Ip For i < p, p 2, 0 < a <, a # i, STEPHEN L. CAMPBELL. I nternat. J. Math. & Math. Sci. I nternat. J. Math. & Math. Sci. Vol. 5 No. 2 (1982) 257-261 257 NONTRIVIAL ISOMETRIES ON S() STEHEN L. CAMBELL Deartment of Mathematics North Carolina State University Raleigh, North Carolina 27650 U.S.A.

More information

APPROXIMATING DISTRIBUTION FUNCTIONS BY ITERATED FUNCTION SYSTEMS

APPROXIMATING DISTRIBUTION FUNCTIONS BY ITERATED FUNCTION SYSTEMS APPROXIMATING DISTRIBUTION FUNCTIONS BY ITERATED FUNCTION SYSTEMS STEFANO MARIA IACUS AND DAVIDE LA TORRE Received 1 August 2003 and in revised form 24 January 2004 An iterated function system (IFS) on

More information

Permutation Statistics and q-fibonacci Numbers

Permutation Statistics and q-fibonacci Numbers Permutation Statistics and q-fibonacci Numbers Adam M Goyt and David Mathisen Mathematics Department Minnesota State University Moorhead Moorhead, MN 56562 Submitted: April 2, 2009; Accepted: August 2,

More information

A Simple Computational Approach to the Fundamental Theorem of Asset Pricing

A Simple Computational Approach to the Fundamental Theorem of Asset Pricing Applied Mathematical Sciences, Vol. 6, 2012, no. 72, 3555-3562 A Simple Computational Approach to the Fundamental Theorem of Asset Pricing Cherng-tiao Perng Department of Mathematics Norfolk State University

More information

LaCIM seminar, UQÀM. March 15, 2013

LaCIM seminar, UQÀM. March 15, 2013 (Valparaiso University) LaCIM seminar, UQÀM Montréal, Québec March 15, 2013 Conventions and Definitions s are written in one-line notation. e.g. S 3 = {123, 132, 213, 231, 312, 321} Conventions and Definitions

More information

REFINED RESTRICTED PERMUTATIONS AVOIDING SUBSETS OF PATTERNS OF LENGTH THREE

REFINED RESTRICTED PERMUTATIONS AVOIDING SUBSETS OF PATTERNS OF LENGTH THREE REFINED RESTRICTED PERMUTATIONS AVOIDING SUBSETS OF PATTERNS OF LENGTH THREE Toufik Mansour LaBRI, Université Bordeaux 1, 51 cours de la Libération 405 Talence Cedex, France toufik@labri.fr Aaron Robertson

More information

ASYMPTOTIC ENUMERATION OF PERMUTATIONS AVOIDING GENERALIZED PATTERNS

ASYMPTOTIC ENUMERATION OF PERMUTATIONS AVOIDING GENERALIZED PATTERNS ASYMPTOTIC ENUMERATION OF PERMUTATIONS AVOIDING GENERALIZED PATTERNS SERGI ELIZALDE Abstract. Motivated by the recent proof of the Stanley-Wilf conjecture, we study the asymptotic behavior of the number

More information

Central Groupoids, Central Digraphs, and Zero-One Matrices A Satisfying A 2 = J

Central Groupoids, Central Digraphs, and Zero-One Matrices A Satisfying A 2 = J Central Groupoids, Central Digraphs, and Zero-One Matrices A Satisfying A 2 = J Frank Curtis, John Drew, Chi-Kwong Li, and Daniel Pragel September 25, 2003 Abstract We study central groupoids, central

More information

Low Rank Co-Diagonal Matrices and Ramsey Graphs

Low Rank Co-Diagonal Matrices and Ramsey Graphs Low Rank Co-Diagonal Matrices and Ramsey Graphs Vince Grolmusz Department of Computer Science Eötvös University, H-1053 Budapest HUNGARY E-mail: grolmusz@cs.elte.hu Submitted: March 7, 000. Accepted: March

More information

Tight Approximation Ratio of a General Greedy Splitting Algorithm for the Minimum k-way Cut Problem

Tight Approximation Ratio of a General Greedy Splitting Algorithm for the Minimum k-way Cut Problem Algorithmica (2011 59: 510 520 DOI 10.1007/s00453-009-9316-1 Tight Approximation Ratio of a General Greedy Splitting Algorithm for the Minimum k-way Cut Problem Mingyu Xiao Leizhen Cai Andrew Chi-Chih

More information

Unbounded Regions of Infinitely Logconcave Sequences

Unbounded Regions of Infinitely Logconcave Sequences The University of San Francisco USF Scholarship: a digital repository @ Gleeson Library Geschke Center Mathematics College of Arts and Sciences 007 Unbounded Regions of Infinitely Logconcave Sequences

More information

WITH THE EFFECT OF GRAVITY

WITH THE EFFECT OF GRAVITY Internat. J. Math. & Math. Sci. VOL. 15 NO. 4 (1992) 795802 795 LAMB S PLANE PROBLEM IN A THERMOVISCOELASTIC MICROPOLAR MEDIUM WITH THE EFFECT OF GRAVITY PRAVANGSU SEKHAR OAS KTPP Township, Midnapore 721171,

More information

The commutation with ternary sets of words

The commutation with ternary sets of words The commutation with ternary sets of words Juhani Karhumäki Michel Latteux Ion Petre Turku Centre for Computer Science TUCS Technical Reports No 589, March 2004 The commutation with ternary sets of words

More information

An Application of Catalan Numbers on Cayley Tree of Order 2: Single Polygon Counting

An Application of Catalan Numbers on Cayley Tree of Order 2: Single Polygon Counting BULLETIN of the Malaysian Mathematical Sciences Society http://math.usm.my/bulletin Bull. Malays. Math. Sci. Soc. (2) 31(2) (2008), 175 183 An Application of Catalan Numbers on Cayley Tree of Order 2:

More information

Counting permutations by cyclic peaks and valleys

Counting permutations by cyclic peaks and valleys Annales Mathematicae et Informaticae 43 (2014) pp. 43 54 http://ami.ektf.hu Counting permutations by cyclic peaks and valleys Chak-On Chow a, Shi-Mei Ma b, Toufik Mansour c Mark Shattuck d a Division of

More information

The cocycle lattice of binary matroids

The cocycle lattice of binary matroids Published in: Europ. J. Comb. 14 (1993), 241 250. The cocycle lattice of binary matroids László Lovász Eötvös University, Budapest, Hungary, H-1088 Princeton University, Princeton, NJ 08544 Ákos Seress*

More information

The distribution of run lengths in integer compositions

The distribution of run lengths in integer compositions The distribution of run lengths in integer compositions Herbert S Wilf University of Pennsylvania Philadelphia PA 19104-6395, USA wilf@mathupennedu Submitted: Mar 7, 2010; Accepted: Oct 9, 2011; Published:

More information

KLEIN-FOUR COVERS OF THE PROJECTIVE LINE IN CHARACTERISTIC TWO

KLEIN-FOUR COVERS OF THE PROJECTIVE LINE IN CHARACTERISTIC TWO ALBANIAN JOURNAL OF MATHEMATICS Volume 1, Number 1, Pages 3 11 ISSN 1930-135(electronic version) KLEIN-FOUR COVERS OF THE PROJECTIVE LINE IN CHARACTERISTIC TWO DARREN GLASS (Communicated by T. Shaska)

More information

Pattern Avoidance in Ordered Set Partitions

Pattern Avoidance in Ordered Set Partitions Pattern Avoidance in Ordered Set Partitions arxiv:1212.2530v2 [math.co] 24 Mar 2013 Anant Godbole 1 Department of Mathematics and Statistics East Tennessee State University Johnson City, TN 37614, USA

More information

STRONG FORMS OF ORTHOGONALITY FOR SETS OF HYPERCUBES

STRONG FORMS OF ORTHOGONALITY FOR SETS OF HYPERCUBES The Pennsylvania State University The Graduate School Department of Mathematics STRONG FORMS OF ORTHOGONALITY FOR SETS OF HYPERCUBES A Dissertation in Mathematics by John T. Ethier c 008 John T. Ethier

More information

Maxima of the signless Laplacian spectral radius for planar graphs

Maxima of the signless Laplacian spectral radius for planar graphs Electronic Journal of Linear Algebra Volume 0 Volume 0 (2015) Article 51 2015 Maxima of the signless Laplacian spectral radius for planar graphs Guanglong Yu Yancheng Teachers University, yglong01@16.com

More information

Postorder Preimages. arxiv: v3 [math.co] 2 Feb Colin Defant 1. 1 Introduction

Postorder Preimages. arxiv: v3 [math.co] 2 Feb Colin Defant 1. 1 Introduction Discrete Mathematics and Theoretical Computer Science DMTCS vol. 19:1, 2017, #3 Postorder Preimages arxiv:1604.01723v3 [math.co] 2 Feb 2017 1 University of Florida Colin Defant 1 received 7 th Apr. 2016,

More information

The number of simple modules of a cellular algebra

The number of simple modules of a cellular algebra Science in China Ser. A Mathematics 2005 Vol.?? No. X: XXX XXX 1 The number of simple modules of a cellular algebra LI Weixia ( ) & XI Changchang ( ) School of Mathematical Sciences, Beijing Normal University,

More information

Isomorphisms between pattern classes

Isomorphisms between pattern classes Journal of Combinatorics olume 0, Number 0, 1 8, 0000 Isomorphisms between pattern classes M. H. Albert, M. D. Atkinson and Anders Claesson Isomorphisms φ : A B between pattern classes are considered.

More information

Pascal Ochem 1 and Elise Vaslet Introduction REPETITION THRESHOLDS FOR SUBDIVIDED GRAPHS AND TREES

Pascal Ochem 1 and Elise Vaslet Introduction REPETITION THRESHOLDS FOR SUBDIVIDED GRAPHS AND TREES Theoretical Informatics and Applications Informatique Théorique et Applications Will be set by the publisher REPETITION THRESHOLDS FOR SUBDIVIDED GRAPHS AND TREES Pascal Ochem 1 and Elise Vaslet 2 Abstract.

More information

Counting Peaks and Valleys in a Partition of a Set

Counting Peaks and Valleys in a Partition of a Set 1 47 6 11 Journal of Integer Sequences Vol. 1 010 Article 10.6.8 Counting Peas and Valleys in a Partition of a Set Toufi Mansour Department of Mathematics University of Haifa 1905 Haifa Israel toufi@math.haifa.ac.il

More information

k-protected VERTICES IN BINARY SEARCH TREES

k-protected VERTICES IN BINARY SEARCH TREES k-protected VERTICES IN BINARY SEARCH TREES MIKLÓS BÓNA Abstract. We show that for every k, the probability that a randomly selected vertex of a random binary search tree on n nodes is at distance k from

More information

AVOIDING PERMUTATIONS AND THE NARAYANA NUMBERS

AVOIDING PERMUTATIONS AND THE NARAYANA NUMBERS J Korean Math Soc 50 (2013, No 3, pp 529 541 http://dxdoiorg/104134/jkms2013503529 AVOIDING PERMUTATIONS AND THE NARAYANA NUMBERS Youngja Park and Seungkyung Park Abstract We study 132 avoiding permutations

More information

A Characterization of (3+1)-Free Posets

A Characterization of (3+1)-Free Posets Journal of Combinatorial Theory, Series A 93, 231241 (2001) doi:10.1006jcta.2000.3075, available online at http:www.idealibrary.com on A Characterization of (3+1)-Free Posets Mark Skandera Department of

More information

A basis for the non-crossing partition lattice top homology

A basis for the non-crossing partition lattice top homology J Algebr Comb (2006) 23: 231 242 DOI 10.1007/s10801-006-7395-5 A basis for the non-crossing partition lattice top homology Eliana Zoque Received: July 31, 2003 / Revised: September 14, 2005 / Accepted:

More information

Fighting Fish: enumerative properties. Enrica Duchi. Veronica Guerrini & Simone Rinaldi DIISM, Università di Siena.

Fighting Fish: enumerative properties. Enrica Duchi. Veronica Guerrini & Simone Rinaldi DIISM, Università di Siena. Fighting Fish: enumerative properties Enrica Duchi IRIF, Université Paris Diderot Veronica Guerrini & Simone Rinaldi DIISM, Università di Siena Gilles Schaeffer LIX, CNRS and École Polytechnique Séminaire

More information

QUADRANT MARKED MESH PATTERNS IN 132-AVOIDING PERMUTATIONS III

QUADRANT MARKED MESH PATTERNS IN 132-AVOIDING PERMUTATIONS III #A39 INTEGERS 5 (05) QUADRANT MARKED MESH PATTERNS IN 3-AVOIDING PERMUTATIONS III Sergey Kitaev Department of Computer and Information Sciences, University of Strathclyde, Glasgow, United Kingdom sergey.kitaev@cis.strath.ac.uk

More information

Graphs with few total dominating sets

Graphs with few total dominating sets Graphs with few total dominating sets Marcin Krzywkowski marcin.krzywkowski@gmail.com Stephan Wagner swagner@sun.ac.za Abstract We give a lower bound for the number of total dominating sets of a graph

More information

On certain combinatorial expansions of the Legendre-Stirling numbers

On certain combinatorial expansions of the Legendre-Stirling numbers On certain combinatorial expansions of the Legendre-Stirling numbers Shi-Mei Ma School of Mathematics and Statistics Northeastern University at Qinhuangdao Hebei, P.R. China shimeimapapers@163.com Yeong-Nan

More information

Graceful Tree Conjecture for Infinite Trees

Graceful Tree Conjecture for Infinite Trees Graceful Tree Conjecture for Infinite Trees Tsz Lung Chan Department of Mathematics The University of Hong Kong, Pokfulam, Hong Kong h0592107@graduate.hku.hk Wai Shun Cheung Department of Mathematics The

More information

ON A KINETIC MODEL OF THE INTERNET TRAFFIC

ON A KINETIC MODEL OF THE INTERNET TRAFFIC ON A KINETIC MODEL OF THE INTERNET TRAFFIC I. ANTONIOU, VICTOR V. IVANOV, VALERY V. IVANOV, YU. L. KALINOVSKY, AND P. V. ZRELOV Received 11 December 23 We present the modification of the Prigogine-Herman

More information

q-counting hypercubes in Lucas cubes

q-counting hypercubes in Lucas cubes Turkish Journal of Mathematics http:// journals. tubitak. gov. tr/ math/ Research Article Turk J Math (2018) 42: 190 203 c TÜBİTAK doi:10.3906/mat-1605-2 q-counting hypercubes in Lucas cubes Elif SAYGI

More information

SELECTIVELY BALANCING UNIT VECTORS AART BLOKHUIS AND HAO CHEN

SELECTIVELY BALANCING UNIT VECTORS AART BLOKHUIS AND HAO CHEN SELECTIVELY BALANCING UNIT VECTORS AART BLOKHUIS AND HAO CHEN Abstract. A set U of unit vectors is selectively balancing if one can find two disjoint subsets U + and U, not both empty, such that the Euclidean

More information

Counting Palindromes According to r-runs of Ones Using Generating Functions

Counting Palindromes According to r-runs of Ones Using Generating Functions 3 47 6 3 Journal of Integer Sequences, Vol. 7 (04), Article 4.6. Counting Palindromes According to r-runs of Ones Using Generating Functions Helmut Prodinger Department of Mathematics Stellenbosch University

More information

Some inequalities for sum and product of positive semide nite matrices

Some inequalities for sum and product of positive semide nite matrices Linear Algebra and its Applications 293 (1999) 39±49 www.elsevier.com/locate/laa Some inequalities for sum and product of positive semide nite matrices Bo-Ying Wang a,1,2, Bo-Yan Xi a, Fuzhen Zhang b,

More information

Paths, Permutations and Trees. Enumerating Permutations Avoiding Three Babson - Steingrímsson Patterns

Paths, Permutations and Trees. Enumerating Permutations Avoiding Three Babson - Steingrímsson Patterns Paths, Permutations and Trees Center for Combinatorics Nankai University Tianjin, February 5-7, 004 Enumerating Permutations Avoiding Three Babson - Steingrímsson Patterns Antonio Bernini, Elisa Pergola

More information

Pattern avoidance in compositions and multiset permutations

Pattern avoidance in compositions and multiset permutations Pattern avoidance in compositions and multiset permutations Carla D. Savage North Carolina State University Raleigh, NC 27695-8206 Herbert S. Wilf University of Pennsylvania Philadelphia, PA 19104-6395

More information

Combinatorial proofs of addition formulas

Combinatorial proofs of addition formulas Combinatorial proofs of addition formulas Xiang-Ke Chang Xing-Biao Hu LSEC, ICMSEC, Academy of Mathematics and Systems Science Chinese Academy of Sciences Beijing, China Hongchuan Lei College of Science

More information

EQUIDISTRIBUTION AND SIGN-BALANCE ON 321-AVOIDING PERMUTATIONS

EQUIDISTRIBUTION AND SIGN-BALANCE ON 321-AVOIDING PERMUTATIONS Séminaire Lotharingien de Combinatoire 51 (2004), Article B51d EQUIDISTRIBUTION AND SIGN-BALANCE ON 321-AVOIDING PERMUTATIONS RON M. ADIN AND YUVAL ROICHMAN Abstract. Let T n be the set of 321-avoiding

More information

Bulletin of the. Iranian Mathematical Society

Bulletin of the. Iranian Mathematical Society ISSN: 1017-060X (Print) ISSN: 1735-8515 (Online) Bulletin of the Iranian Mathematical Society Vol. 41 (2015), No. 3, pp. 581 590. Title: Volume difference inequalities for the projection and intersection

More information

THE NUMBER OF INDEPENDENT DOMINATING SETS OF LABELED TREES. Changwoo Lee. 1. Introduction

THE NUMBER OF INDEPENDENT DOMINATING SETS OF LABELED TREES. Changwoo Lee. 1. Introduction Commun. Korean Math. Soc. 18 (2003), No. 1, pp. 181 192 THE NUMBER OF INDEPENDENT DOMINATING SETS OF LABELED TREES Changwoo Lee Abstract. We count the numbers of independent dominating sets of rooted labeled

More information

An Evolution Strategy for the Induction of Fuzzy Finite-state Automata

An Evolution Strategy for the Induction of Fuzzy Finite-state Automata Journal of Mathematics and Statistics 2 (2): 386-390, 2006 ISSN 1549-3644 Science Publications, 2006 An Evolution Strategy for the Induction of Fuzzy Finite-state Automata 1,2 Mozhiwen and 1 Wanmin 1 College

More information

On zero-sum partitions and anti-magic trees

On zero-sum partitions and anti-magic trees Discrete Mathematics 09 (009) 010 014 Contents lists available at ScienceDirect Discrete Mathematics journal homepage: wwwelseviercom/locate/disc On zero-sum partitions and anti-magic trees Gil Kaplan,

More information

Combinatorial properties of the numbers of tableaux of bounded height

Combinatorial properties of the numbers of tableaux of bounded height Combinatorial properties of the numbers of tableaux of bounded height Marilena Barnabei, Flavio Bonetti, and Matteo Sibani Abstract We introduce an infinite family of lower triangular matrices Γ (s), where

More information

Linear transformations preserving the strong q-log-convexity of polynomials

Linear transformations preserving the strong q-log-convexity of polynomials Linear transformations preserving the strong q-log-convexity of polynomials Bao-Xuan Zhu School of Mathematics and Statistics Jiangsu Normal University Xuzhou, PR China bxzhu@jsnueducn Hua Sun College

More information

RANKS OF QUANTUM STATES WITH PRESCRIBED REDUCED STATES

RANKS OF QUANTUM STATES WITH PRESCRIBED REDUCED STATES RANKS OF QUANTUM STATES WITH PRESCRIBED REDUCED STATES CHI-KWONG LI, YIU-TUNG POON, AND XUEFENG WANG Abstract. Let M n be the set of n n complex matrices. in this note, all the possible ranks of a bipartite

More information

Inclusion Relationship of Uncertain Sets

Inclusion Relationship of Uncertain Sets Yao Journal of Uncertainty Analysis Applications (2015) 3:13 DOI 10.1186/s40467-015-0037-5 RESEARCH Open Access Inclusion Relationship of Uncertain Sets Kai Yao Correspondence: yaokai@ucas.ac.cn School

More information

Permutations Which Avoid 1243 and 2143, Continued Fractions, and Chebyshev Polynomials

Permutations Which Avoid 1243 and 2143, Continued Fractions, and Chebyshev Polynomials Permutations Which Avoid 1243 and 2143, Continued Fractions, and Chebyshev Polynomials arxiv:math/0208046v1 [math.co] 6 Aug 2002 Eric S. Egge Department of Mathematics Gettysburg College Gettysburg, PA

More information

Algorithms for pattern involvement in permutations

Algorithms for pattern involvement in permutations Algorithms for pattern involvement in permutations M. H. Albert Department of Computer Science R. E. L. Aldred Department of Mathematics and Statistics M. D. Atkinson Department of Computer Science D.

More information

Measuring Agent Intelligence via Hierarchies of Environments

Measuring Agent Intelligence via Hierarchies of Environments Measuring Agent Intelligence via Hierarchies of Environments Bill Hibbard SSEC, University of Wisconsin-Madison, 1225 W. Dayton St., Madison, WI 53706, USA test@ssec.wisc.edu Abstract. Under Legg s and

More information

Enumeration of subtrees of trees

Enumeration of subtrees of trees Enumeration of subtrees of trees Weigen Yan a,b 1 and Yeong-Nan Yeh b a School of Sciences, Jimei University, Xiamen 36101, China b Institute of Mathematics, Academia Sinica, Taipei 1159. Taiwan. Theoretical

More information

FRACTIONAL PACKING OF T-JOINS. 1. Introduction

FRACTIONAL PACKING OF T-JOINS. 1. Introduction FRACTIONAL PACKING OF T-JOINS FRANCISCO BARAHONA Abstract Given a graph with nonnegative capacities on its edges, it is well known that the capacity of a minimum T -cut is equal to the value of a maximum

More information

The spectrum of the edge corona of two graphs

The spectrum of the edge corona of two graphs Electronic Journal of Linear Algebra Volume Volume (1) Article 4 1 The spectrum of the edge corona of two graphs Yaoping Hou yphou@hunnu.edu.cn Wai-Chee Shiu Follow this and additional works at: http://repository.uwyo.edu/ela

More information

An Even Order Symmetric B Tensor is Positive Definite

An Even Order Symmetric B Tensor is Positive Definite An Even Order Symmetric B Tensor is Positive Definite Liqun Qi, Yisheng Song arxiv:1404.0452v4 [math.sp] 14 May 2014 October 17, 2018 Abstract It is easily checkable if a given tensor is a B tensor, or

More information

How Many Holes Can an Unbordered Partial Word Contain?

How Many Holes Can an Unbordered Partial Word Contain? How Many Holes Can an Unbordered Partial Word Contain? F. Blanchet-Sadri 1, Emily Allen, Cameron Byrum 3, and Robert Mercaş 4 1 University of North Carolina, Department of Computer Science, P.O. Box 6170,

More information