Discrete Mathematics

Size: px
Start display at page:

Download "Discrete Mathematics"

Transcription

1 Outline Applied Mathematics Division Department of Mathematical Sciences University of Stellenbosch, South Africa Hons Program Presentation October 10, 2011

2 Outline Outline

3 Outline

4 Some of the Topics Trees and Searching Algorithms Vertex Traversal and Hamiltonian Graphs Edge Traversl and Eulerian Graphs Planar Graphs Scheduling and Graph Colouring Tournaments

5 Outline

6 in Classical Problems The Travelling Salesman Problem The Chinese Postman Problem Selected Topics Genetic Algorithms Greedy Algorithms Simulated Annealing Tabu Search Genetic Algorithms

7 Outline

8 Encryption/Decryption How do I encrypt a message so that only the receiver is able to understand it? How do I decipher a message that I intercept? Application of Number Theory Content Block Ciphers Stream Ciphers Public Key Systems

9 Outline

10 Error Correction Designing of error-correcting codes to ensure the integrity of information An application of vector spaces over finite fields

11 Outline

12 Grobler The appearance of Fibonacci numbers in the arrangement of leaves and florets of plants The existence and designing of Mutually Orthogonal Latin Squares Benecke A survey and development of algorithmic methods for graph domination problems An analysis and solution to the Guess Who Problem

13 The Cartesian Product Definition The Cartesian product of two graphs G and H, V(G) = {v 1, v 2,..., v m }, V(H) = {w 1, w 2,..., w n } Denoted G H V(G H) = {(v i, w j ) : i = 1, 2,..., m, j = 1, 2,..., n} (v i, w j )(v k, w l ) E(G H) if and only if j = l and v i v k E(G), or i = k and w j w l E(H)

14 Example Consider G = P 3 and H = C 3 (v 1, w 1 ) (v 1, w 2 ) (v 1, w 3 ) Definition v 1 Vertex set V(G H) = {(v i, w j ) : i = 1, 2,..., m, j = 1, 2,..., n} (v i, w j )(v k, w l ) E(G H) iff j = l and v i v k E(G), or i = k and w j w l E(H) v 2 v 3G (v 2, w 1 ) (v 3, w 1 ) H (v 2, w 2 ) (v 3, w 2 ) w 1 w 2 (v 2, w 3 ) (v 3, w 3 ) w 3

15 Domination Definition A subset D V(G) is a dominating set if any vertex u D is adjacent to some vertex v D. The domination number γ(g) is the minimum cardinality over all dominating sets D of G.

16 Domination Algorithms Project Survey best algorithms to determine the domination number of the Cartesian product graph Study and implement the method by Livingston & Stout, as described by Benecke & Mynhardt Survey best algorithms for and investigate application to other graph products and/or other domination parameters Content Programming

17 The Guess Who Game Questions Generalize classic game to k 1 mystery people. What is the best strategy? What is the best question at any stage? How does one design a balanced game board? Under which conditions can the game always be resolved? Content Game Theory Probability Theory Programming

18 References A MENEZES, P VAN OORSCHOT AND S VANSTONE, Handbook of Applied Cryptography, CRC Press, JA BONDY AND USR MURTY, Graduate Texts in Mathematics -, Springer, Z MICHALEWICZ AND DB FOGEL, How to Solve it: Modern Heuristics, Springer, 2000.

19

20

21

Graph Theory(I): استاذ الماده: أ.م.د. أكرم برزان عطار

Graph Theory(I): استاذ الماده: أ.م.د. أكرم برزان عطار استاذ الماده: أ.م.د. أكرم برزان عطار Graph Theory(I): 1. An introduction to Graphs: The Definition of Graphs - Graphs as Models - Matrix Degree - Subgraphs- Paths and Cycles - the Matrix Representation

More information

Relations between edge removing and edge subdivision concerning domination number of a graph

Relations between edge removing and edge subdivision concerning domination number of a graph arxiv:1409.7508v1 [math.co] 26 Sep 2014 Relations between edge removing and edge subdivision concerning domination number of a graph Magdalena Lemańska 1, Joaquín Tey 2, Rita Zuazua 3 1 Gdansk University

More information

Towards a measure of vulnerability, tenacity of a Graph

Towards a measure of vulnerability, tenacity of a Graph Journal of Algorithms and Computation journal homepage: http://jacutacir Towards a measure of vulnerability, tenacity of a Graph Dara Moazzami 1 1 University of Tehran, College of Engineering, Department

More information

Every 3-connected, essentially 11-connected line graph is Hamiltonian

Every 3-connected, essentially 11-connected line graph is Hamiltonian Journal of Combinatorial Theory, Series B 96 (26) 571 576 www.elsevier.com/locate/jctb Every 3-connected, essentially 11-connected line graph is Hamiltonian Hong-Jian Lai a, Yehong Shao b, Hehui Wu a,

More information

An Explicit Construction of Optimal Dominating and [1, 2] Dominating Sets in Grid

An Explicit Construction of Optimal Dominating and [1, 2] Dominating Sets in Grid An Explicit Construction of Optimal Dominating and [ 2] Dominating Sets in Grid P. Sharifani 1, M.R. Hooshmandasl 2, M. Alambardar Meybodi 3 3 Department of Computer Science, Yazd University, Yazd, Iran.

More information

My brief introduction to cryptography

My brief introduction to cryptography My brief introduction to cryptography David Thomson dthomson@math.carleton.ca Carleton University September 7, 2013 introduction to cryptography September 7, 2013 1 / 28 Outline 1 The general framework

More information

The P versus NP Problem. Ker-I Ko. Stony Brook, New York

The P versus NP Problem. Ker-I Ko. Stony Brook, New York The P versus NP Problem Ker-I Ko Stony Brook, New York ? P = NP One of the seven Millenium Problems The youngest one A folklore question? Has hundreds of equivalent forms Informal Definitions P : Computational

More information

A Characterization of the Cactus Graphs with Equal Domination and Connected Domination Numbers

A Characterization of the Cactus Graphs with Equal Domination and Connected Domination Numbers International Journal of Contemporary Mathematical Sciences Vol. 12, 2017, no. 7, 275-281 HIKARI Ltd, www.m-hikari.com https://doi.org/10.12988/ijcms.2017.7932 A Characterization of the Cactus Graphs with

More information

Algorithms and Theory of Computation. Lecture 22: NP-Completeness (2)

Algorithms and Theory of Computation. Lecture 22: NP-Completeness (2) Algorithms and Theory of Computation Lecture 22: NP-Completeness (2) Xiaohui Bei MAS 714 November 8, 2018 Nanyang Technological University MAS 714 November 8, 2018 1 / 20 Set Cover Set Cover Input: a set

More information

Every 4-connected line graph of a quasi claw-free graph is hamiltonian connected

Every 4-connected line graph of a quasi claw-free graph is hamiltonian connected Discrete Mathematics 308 (2008) 532 536 www.elsevier.com/locate/disc Note Every 4-connected line graph of a quasi claw-free graph is hamiltonian connected Hong-Jian Lai a, Yehong Shao b, Mingquan Zhan

More information

Induced Cycles of Fixed Length

Induced Cycles of Fixed Length Induced Cycles of Fixed Length Terry McKee Wright State University Dayton, Ohio USA terry.mckee@wright.edu Cycles in Graphs Vanderbilt University 31 May 2012 Overview 1. Investigating the fine structure

More information

About Vigenere cipher modifications

About Vigenere cipher modifications Proceedings of the Workshop on Foundations of Informatics FOI-2015, August 24-29, 2015, Chisinau, Republic of Moldova About Vigenere cipher modifications Eugene Kuznetsov Abstract TheaimofthisworkisamodificationoftheclassicalVigenere

More information

Algorithms and Complexity theory

Algorithms and Complexity theory Algorithms and Complexity theory Thibaut Barthelemy Some slides kindly provided by Fabien Tricoire University of Vienna WS 2014 Outline 1 Algorithms Overview How to write an algorithm 2 Complexity theory

More information

Hans Delfs & Helmut Knebl: Kryptographie und Informationssicherheit WS 2008/2009. References. References

Hans Delfs & Helmut Knebl: Kryptographie und Informationssicherheit WS 2008/2009. References. References Hans Delfs & Helmut Knebl: Kryptographie und Informationssicherheit WS 2008/2009 Die Unterlagen sind ausschliesslich zum persoenlichen Gebrauch der Vorlesungshoerer bestimmt. Die Herstellung von elektronischen

More information

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and education use, including for instruction at the authors institution

More information

Hamiltonian Cycle. Zero Knowledge Proof

Hamiltonian Cycle. Zero Knowledge Proof Hamiltonian Cycle Zero Knowledge Proof Hamiltonian cycle Hamiltonian cycle - A path that visits each vertex exactly once, and ends at the same point it started Example Hamiltonian cycle - A path that visits

More information

Semester 3 MULTIVARIATE CALCULUS AND INTEGRAL TRANSFORMS

Semester 3 MULTIVARIATE CALCULUS AND INTEGRAL TRANSFORMS PC 11 Semester 3 MT03C11 MULTIVARIATE CALCULUS AND INTEGRAL TRANSFORMS Text 1: Tom APOSTOL, Mathematical Analysis, Second edition, Narosa Publishing House. Text 2: WALTER RUDIN, Principles of Mathematical

More information

NP-complete problems. CSE 101: Design and Analysis of Algorithms Lecture 20

NP-complete problems. CSE 101: Design and Analysis of Algorithms Lecture 20 NP-complete problems CSE 101: Design and Analysis of Algorithms Lecture 20 CSE 101: Design and analysis of algorithms NP-complete problems Reading: Chapter 8 Homework 7 is due today, 11:59 PM Tomorrow

More information

8.3 Hamiltonian Paths and Circuits

8.3 Hamiltonian Paths and Circuits 8.3 Hamiltonian Paths and Circuits 8.3 Hamiltonian Paths and Circuits A Hamiltonian path is a path that contains each vertex exactly once A Hamiltonian circuit is a Hamiltonian path that is also a circuit

More information

A Class of Vertex Transitive Graphs

A Class of Vertex Transitive Graphs Volume 119 No. 16 2018, 3137-3144 ISSN: 1314-3395 (on-line version) url: http://www.acadpubl.eu/hub/ http://www.acadpubl.eu/hub/ A Class of Vertex Transitive Graphs 1 N. Murugesan, 2 R. Anitha 1 Assistant

More information

Every 3-connected, essentially 11-connected line graph is hamiltonian

Every 3-connected, essentially 11-connected line graph is hamiltonian Every 3-connected, essentially 11-connected line graph is hamiltonian Hong-Jian Lai, Yehong Shao, Hehui Wu, Ju Zhou October 2, 25 Abstract Thomassen conjectured that every 4-connected line graph is hamiltonian.

More information

MATH 363: Discrete Mathematics

MATH 363: Discrete Mathematics MATH 363: Discrete Mathematics Learning Objectives by topic The levels of learning for this class are classified as follows. 1. Basic Knowledge: To recall and memorize - Assess by direct questions. The

More information

Algorithm Design Strategies V

Algorithm Design Strategies V Algorithm Design Strategies V Joaquim Madeira Version 0.0 October 2016 U. Aveiro, October 2016 1 Overview The 0-1 Knapsack Problem Revisited The Fractional Knapsack Problem Greedy Algorithms Example Coin

More information

Some results on incidence coloring, star arboricity and domination number

Some results on incidence coloring, star arboricity and domination number AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 54 (2012), Pages 107 114 Some results on incidence coloring, star arboricity and domination number Pak Kiu Sun Wai Chee Shiu Department of Mathematics Hong

More information

Graph Theory and Interconnection Networks

Graph Theory and Interconnection Networks Graph Theory and Interconnection Networks Lih-Hsing Hsu and Cheng-Kuan Lin @ CRC Press Taylor & Francis Group Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Group, an informa

More information

GRAPHS & DIGRAPHS 5th Edition. Preface to the fifth edition

GRAPHS & DIGRAPHS 5th Edition. Preface to the fifth edition GRAPHS & DIGRAPHS 5th Edition Gary Chartrand Western Michigan University Linda Lesniak Drew University Ping Zhang Western Michigan University Preface to the fifth edition Since graph theory was considered

More information

Computers and Mathematics with Applications

Computers and Mathematics with Applications Computers and Mathematics with Applications 61 (2011) 1261 1265 Contents lists available at ScienceDirect Computers and Mathematics with Applications journal homepage: wwwelseviercom/locate/camwa Cryptanalysis

More information

Algorithms Design & Analysis. Approximation Algorithm

Algorithms Design & Analysis. Approximation Algorithm Algorithms Design & Analysis Approximation Algorithm Recap External memory model Merge sort Distribution sort 2 Today s Topics Hard problem Approximation algorithms Metric traveling salesman problem A

More information

Hamiltonian Graphs Graphs

Hamiltonian Graphs Graphs COMP2121 Discrete Mathematics Hamiltonian Graphs Graphs Hubert Chan (Chapter 9.5) [O1 Abstract Concepts] [O2 Proof Techniques] [O3 Basic Analysis Techniques] 1 Hamiltonian Paths and Circuits [O1] A Hamiltonian

More information

Data Structures and Algorithms (CSCI 340)

Data Structures and Algorithms (CSCI 340) University of Wisconsin Parkside Fall Semester 2008 Department of Computer Science Prof. Dr. F. Seutter Data Structures and Algorithms (CSCI 340) Homework Assignments The numbering of the problems refers

More information

ABHELSINKI UNIVERSITY OF TECHNOLOGY

ABHELSINKI UNIVERSITY OF TECHNOLOGY Approximation Algorithms Seminar 1 Set Cover, Steiner Tree and TSP Siert Wieringa siert.wieringa@tkk.fi Approximation Algorithms Seminar 1 1/27 Contents Approximation algorithms for: Set Cover Steiner

More information

A DPA attack on RSA in CRT mode

A DPA attack on RSA in CRT mode A DPA attack on RSA in CRT mode Marc Witteman Riscure, The Netherlands 1 Introduction RSA is the dominant public key cryptographic algorithm, and used in an increasing number of smart card applications.

More information

The minimum G c cut problem

The minimum G c cut problem The minimum G c cut problem Abstract In this paper we define and study the G c -cut problem. Given a complete undirected graph G = (V ; E) with V = n, edge weighted by w(v i, v j ) 0 and an undirected

More information

Cycle Double Cover Conjecture

Cycle Double Cover Conjecture Cycle Double Cover Conjecture Paul Clarke St. Paul's College Raheny January 5 th 2014 Abstract In this paper, a proof of the cycle double cover conjecture is presented. The cycle double cover conjecture

More information

Hamilton Index and Its Algorithm of Uncertain Graph

Hamilton Index and Its Algorithm of Uncertain Graph Hamilton Index and Its Algorithm of Uncertain Graph Bo Zhang 1 Jin Peng 1 School of Mathematics and Statistics Huazhong Normal University Hubei 430079 China Institute of Uncertain Systems Huanggang Normal

More information

SPANNING TREES WITH A BOUNDED NUMBER OF LEAVES. Junqing Cai, Evelyne Flandrin, Hao Li, and Qiang Sun

SPANNING TREES WITH A BOUNDED NUMBER OF LEAVES. Junqing Cai, Evelyne Flandrin, Hao Li, and Qiang Sun Opuscula Math. 37, no. 4 (017), 501 508 http://dx.doi.org/10.7494/opmath.017.37.4.501 Opuscula Mathematica SPANNING TREES WITH A BOUNDED NUMBER OF LEAVES Junqing Cai, Evelyne Flandrin, Hao Li, and Qiang

More information

REU 2015: Complexity Across Disciplines. Introduction to Cryptography

REU 2015: Complexity Across Disciplines. Introduction to Cryptography REU 2015: Complexity Across Disciplines Introduction to Cryptography Symmetric Key Cryptosystems Iterated Block Ciphers Definition Let KS : K K s be a function that produces a set of subkeys k i K, 1 i

More information

Overview of some Combinatorial Designs

Overview of some Combinatorial Designs Bimal Roy Indian Statistical Institute, Kolkata. Outline of the talk 1 Introduction 2 3 4 5 6 7 Outline of the talk 1 Introduction 2 3 4 5 6 7 Introduction Design theory: Study of combinatorial objects

More information

The construction of a regular graph

The construction of a regular graph The construction of a regular graph Ryosuke MIZUNO Department of Physics Kyoto University Yawara ISHIDA Research Institute for Mathematical Science Kyoto University Graphs of Diameter=2 in Graph Golf (Order,Degree)=(64,16)

More information

Prime Factorization in the Generalized Hierarchical Product

Prime Factorization in the Generalized Hierarchical Product Prime Factorization in the Generalized Hierarchical Product Sarah Anderson and Kirsti Wash Clemson University sarah5,kirstiw@clemson.edu January 18, 2014 Background Definition A graph G = (V, E) is a set

More information

Scheduling and Optimization Course (MPRI)

Scheduling and Optimization Course (MPRI) MPRI Scheduling and optimization: lecture p. /6 Scheduling and Optimization Course (MPRI) Leo Liberti LIX, École Polytechnique, France MPRI Scheduling and optimization: lecture p. /6 Teachers Christoph

More information

Cryptanalysis of a Message Authentication Code due to Cary and Venkatesan

Cryptanalysis of a Message Authentication Code due to Cary and Venkatesan Cryptanalysis of a Message Authentication Code due to Cary and Venkatesan Simon R. Blackburn and Kenneth G. Paterson Department of Mathematics Royal Holloway, University of London Egham, Surrey, TW20 0EX,

More information

CS 320, Fall Dr. Geri Georg, Instructor 320 NP 1

CS 320, Fall Dr. Geri Georg, Instructor 320 NP 1 NP CS 320, Fall 2017 Dr. Geri Georg, Instructor georg@colostate.edu 320 NP 1 NP Complete A class of problems where: No polynomial time algorithm has been discovered No proof that one doesn t exist 320

More information

Longest paths in strong spanning oriented subgraphs of strong semicomplete multipartite digraphs

Longest paths in strong spanning oriented subgraphs of strong semicomplete multipartite digraphs Longest paths in strong spanning oriented subgraphs of strong semicomplete multipartite digraphs Gregory Gutin Department of Mathematical Sciences Brunel, The University of West London Uxbridge, Middlesex,

More information

Supereulerian planar graphs

Supereulerian planar graphs Supereulerian planar graphs Hong-Jian Lai and Mingquan Zhan Department of Mathematics West Virginia University, Morgantown, WV 26506, USA Deying Li and Jingzhong Mao Department of Mathematics Central China

More information

Graphs with large maximum degree containing no odd cycles of a given length

Graphs with large maximum degree containing no odd cycles of a given length Graphs with large maximum degree containing no odd cycles of a given length Paul Balister Béla Bollobás Oliver Riordan Richard H. Schelp October 7, 2002 Abstract Let us write f(n, ; C 2k+1 ) for the maximal

More information

Lecture 1: Perfect Secrecy and Statistical Authentication. 2 Introduction - Historical vs Modern Cryptography

Lecture 1: Perfect Secrecy and Statistical Authentication. 2 Introduction - Historical vs Modern Cryptography CS 7880 Graduate Cryptography September 10, 2015 Lecture 1: Perfect Secrecy and Statistical Authentication Lecturer: Daniel Wichs Scribe: Matthew Dippel 1 Topic Covered Definition of perfect secrecy One-time

More information

On the Classification of Splitting (v, u c, ) BIBDs

On the Classification of Splitting (v, u c, ) BIBDs BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 18, No 5 Special Thematic Issue on Optimal Codes and Related Topics Sofia 2018 Print ISSN: 1311-9702; Online ISSN: 1314-4081

More information

Quantum Algorithms for Graph Traversals and Related Problems

Quantum Algorithms for Graph Traversals and Related Problems Quantum Algorithms for Graph Traversals and Related Problems Sebastian Dörn Institut für Theoretische Informatik, Universität Ulm, 89069 Ulm, Germany sebastian.doern@uni-ulm.de Abstract. We study the complexity

More information

A path that visits each vertex exactly once is a Hamiltonian path. A circuit that visits each vertex exactly once is a Hamiltonian circuit.

A path that visits each vertex exactly once is a Hamiltonian path. A circuit that visits each vertex exactly once is a Hamiltonian circuit. (c) Epstein 2013 Chapter 2: usiness Efficiency Page 1 CHAPTER 2: USINESS EFFICIENCY 2.1 Hamiltonian Circuits A path that visits each vertex exactly once is a Hamiltonian path. A circuit that visits each

More information

CS 350 Algorithms and Complexity

CS 350 Algorithms and Complexity CS 350 Algorithms and Complexity Winter 2019 Lecture 15: Limitations of Algorithmic Power Introduction to complexity theory Andrew P. Black Department of Computer Science Portland State University Lower

More information

CS 350 Algorithms and Complexity

CS 350 Algorithms and Complexity 1 CS 350 Algorithms and Complexity Fall 2015 Lecture 15: Limitations of Algorithmic Power Introduction to complexity theory Andrew P. Black Department of Computer Science Portland State University Lower

More information

Elliptic Curve Cryptography

Elliptic Curve Cryptography Areas for Discussion Elliptic Curve Cryptography Joseph Spring Department of Computer Science 7COM1027 - Distributed Systems Security Lecture - Elliptic Curves 1 1 Motivation Elliptic Curves Security of

More information

Every line graph of a 4-edge-connected graph is Z 3 -connected

Every line graph of a 4-edge-connected graph is Z 3 -connected European Journal of Combinatorics 0 (2009) 595 601 Contents lists available at ScienceDirect European Journal of Combinatorics journal homepage: www.elsevier.com/locate/ejc Every line graph of a 4-edge-connected

More information

NP-Complete Problems and Approximation Algorithms

NP-Complete Problems and Approximation Algorithms NP-Complete Problems and Approximation Algorithms Efficiency of Algorithms Algorithms that have time efficiency of O(n k ), that is polynomial of the input size, are considered to be tractable or easy

More information

Solution of a conjecture of Volkmann on the number of vertices in longest paths and cycles of strong semicomplete multipartite digraphs

Solution of a conjecture of Volkmann on the number of vertices in longest paths and cycles of strong semicomplete multipartite digraphs Solution of a conjecture of Volkmann on the number of vertices in longest paths and cycles of strong semicomplete multipartite digraphs Gregory Gutin Department of Computer Science Royal Holloway University

More information

Matroids. Start with a set of objects, for example: E={ 1, 2, 3, 4, 5 }

Matroids. Start with a set of objects, for example: E={ 1, 2, 3, 4, 5 } Start with a set of objects, for example: E={ 1, 2, 3, 4, 5 } Start with a set of objects, for example: E={ 1, 2, 3, 4, 5 } The power set of E is the set of all possible subsets of E: {}, {1}, {2}, {3},

More information

Mathematics Masters Examination

Mathematics Masters Examination Mathematics Masters Examination OPTION 4 Fall 2015 MATHEMATICAL COMPUTER SCIENCE NOTE: Any student whose answers require clarification may be required to submit to an oral examination. Each of the twelve

More information

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 1, July 2013

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 1, July 2013 A Matrix Approach for Information Security Based ECC using Mealy Machine and Fibonacci Q-Matrix Fatima Amounas*, El Hassan El Kinani**, Moha Hajar*** * R.O.I Group, Computer Sciences Department Moulay

More information

Final Exam Math 105: Topics in Mathematics Cryptology, the Science of Secret Writing Rhodes College Tuesday, 30 April :30 11:00 a.m.

Final Exam Math 105: Topics in Mathematics Cryptology, the Science of Secret Writing Rhodes College Tuesday, 30 April :30 11:00 a.m. Final Exam Math 10: Topics in Mathematics Cryptology, the Science of Secret Writing Rhodes College Tuesday, 0 April 2002 :0 11:00 a.m. Instructions: Please be as neat as possible (use a pencil), and show

More information

A Piggybank Protocol for Quantum Cryptography

A Piggybank Protocol for Quantum Cryptography Piggybank Protocol for Quantum Cryptography Navya Chodisetti bstract This paper presents a quantum mechanical version of the piggy-bank cryptography protocol. The basic piggybank cryptography idea is to

More information

NP and Computational Intractability

NP and Computational Intractability NP and Computational Intractability 1 Review Basic reduction strategies. Simple equivalence: INDEPENDENT-SET P VERTEX-COVER. Special case to general case: VERTEX-COVER P SET-COVER. Encoding with gadgets:

More information

Factors in Graphs With Multiple Degree Constraints

Factors in Graphs With Multiple Degree Constraints Factors in Graphs With Multiple Degree Constraints Richard C. Brewster, Morten Hegner Nielsen, and Sean McGuinness Thompson Rivers University Kamloops, BC V2C0C8 Canada October 4, 2011 Abstract For a graph

More information

Lattice Reduction on Low-Exponent RSA

Lattice Reduction on Low-Exponent RSA Lattice Reduction on Low-Exponent RSA Jason Dyer August 2002 1 Preliminaries to Coppersmith s Algorithm Coppersmith s algorithm relies on a simple flaw in the RSA algorithm when messages are small compared

More information

Lecture 2: Perfect Secrecy and its Limitations

Lecture 2: Perfect Secrecy and its Limitations CS 4501-6501 Topics in Cryptography 26 Jan 2018 Lecture 2: Perfect Secrecy and its Limitations Lecturer: Mohammad Mahmoody Scribe: Mohammad Mahmoody 1 Introduction Last time, we informally defined encryption

More information

Unit 1A: Computational Complexity

Unit 1A: Computational Complexity Unit 1A: Computational Complexity Course contents: Computational complexity NP-completeness Algorithmic Paradigms Readings Chapters 3, 4, and 5 Unit 1A 1 O: Upper Bounding Function Def: f(n)= O(g(n)) if

More information

arxiv: v2 [math.co] 29 Oct 2017

arxiv: v2 [math.co] 29 Oct 2017 arxiv:1404.3385v2 [math.co] 29 Oct 2017 A proof for a conjecture of Gyárfás, Lehel, Sárközy and Schelp on Berge-cycles G.R. Omidi Department of Mathematical Sciences, Isfahan University of Technology,

More information

On the Fractional Chromatic Index of a Graph and its Complement

On the Fractional Chromatic Index of a Graph and its Complement On the Fractional Chromatic Index of a Graph and its Complement David Avis, 1 Caterina De Simone 2 and Bruce Reed 1 School of Computer Science, McGill University, 3480 University Street, Montreal, Canada,

More information

Combinatorial optimization problems

Combinatorial optimization problems Combinatorial optimization problems Heuristic Algorithms Giovanni Righini University of Milan Department of Computer Science (Crema) Optimization In general an optimization problem can be formulated as:

More information

arxiv: v1 [math.co] 4 Jan 2018

arxiv: v1 [math.co] 4 Jan 2018 A family of multigraphs with large palette index arxiv:80.0336v [math.co] 4 Jan 208 M.Avesani, A.Bonisoli, G.Mazzuoccolo July 22, 208 Abstract Given a proper edge-coloring of a loopless multigraph, the

More information

Domination in Fuzzy Graph: A New Approach

Domination in Fuzzy Graph: A New Approach International Journal of Computational Science and Mathematics. ISSN 0974-3189 Volume 2, Number 3 (2010), pp. 101 107 International Research Publication House http://www.irphouse.com Domination in Fuzzy

More information

TUTORIAL: HYPER-HEURISTICS AND COMPUTATIONAL INTELLIGENCE

TUTORIAL: HYPER-HEURISTICS AND COMPUTATIONAL INTELLIGENCE TUTORIAL: HYPER-HEURISTICS AND COMPUTATIONAL INTELLIGENCE Nelishia Pillay School of Mathematics, Statistics and Computer Science University of KwaZulu-Natal South Africa TUTORIAL WEBSITE URL: http://titancs.ukzn.ac.za/ssci2015tutorial.aspx

More information

Minimum degree conditions for the existence of fractional factors in planar graphs

Minimum degree conditions for the existence of fractional factors in planar graphs AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 72(3) (2018), Pages 536 548 Minimum degree conditions for the existence of fractional factors in planar graphs P. Katerinis Department of Informatics, Athens

More information

Mathematics Without Calculations It s a Beautiful Thing!

Mathematics Without Calculations It s a Beautiful Thing! Sacred Heart University DigitalCommons@SHU Mathematics Faculty Publications Mathematics Department 8-4-2016 Mathematics Without Calculations It s a Beautiful Thing! Jason J. Molitierno Sacred Heart University,

More information

CYCLES CONTAINING SPECIFIED EDGES IN A GRAPH CYKLE ZAWIERAJĄCE WYBRANE KRAWĘDZIE GRAFU

CYCLES CONTAINING SPECIFIED EDGES IN A GRAPH CYKLE ZAWIERAJĄCE WYBRANE KRAWĘDZIE GRAFU GRZEGORZ GANCARZEWICZ CYCLES CONTAINING SPECIFIED EDGES IN A GRAPH CYKLE ZAWIERAJĄCE WYBRANE KRAWĘDZIE GRAFU A b s t r a c t The aim of this paper is to prove that if s 1 and G is a graph of order n 4s

More information

Graphs and Combinatorics

Graphs and Combinatorics Graphs and Combinatorics (2005) 21:469 474 Digital Object Identifier (DOI) 10.1007/s00373-005-0625-0 Graphs and Combinatorics Springer-Verlag 2005 On Group Chromatic Number of Graphs Hong-Jian Lai 1 and

More information

AS 1 Math Structure for BSc (Ed) (Primary 2 CS Track) AS 1 Math Structure for BSc (Ed) (Secondary)

AS 1 Math Structure for BSc (Ed) (Primary 2 CS Track) AS 1 Math Structure for BSc (Ed) (Secondary) ACADEMIC SUBJECT: MATHEMATICS Table 1: AS 1 Math Structure for BSc (Ed) (Primary 2 CS Track) AS 1 Math Structure for BSc (Ed) (Secondary) Year 1 2 3 4 Course Code Title Course Category No. of AUs Prerequisites

More information

CS 301: Complexity of Algorithms (Term I 2008) Alex Tiskin Harald Räcke. Hamiltonian Cycle. 8.5 Sequencing Problems. Directed Hamiltonian Cycle

CS 301: Complexity of Algorithms (Term I 2008) Alex Tiskin Harald Räcke. Hamiltonian Cycle. 8.5 Sequencing Problems. Directed Hamiltonian Cycle 8.5 Sequencing Problems Basic genres. Packing problems: SET-PACKING, INDEPENDENT SET. Covering problems: SET-COVER, VERTEX-COVER. Constraint satisfaction problems: SAT, 3-SAT. Sequencing problems: HAMILTONIAN-CYCLE,

More information

Practice Final Solutions. 1. Consider the following algorithm. Assume that n 1. line code 1 alg(n) { 2 j = 0 3 if (n = 0) { 4 return j

Practice Final Solutions. 1. Consider the following algorithm. Assume that n 1. line code 1 alg(n) { 2 j = 0 3 if (n = 0) { 4 return j Practice Final Solutions 1. Consider the following algorithm. Assume that n 1. line code 1 alg(n) 2 j = 0 3 if (n = 0) 4 return j } 5 else 6 j = 2n+ alg(n 1) 7 return j } } Set up a recurrence relation

More information

Cyclic Path Covering Number of Euler Graphs

Cyclic Path Covering Number of Euler Graphs Global Journal of Mathematical Sciences: Theory and Practical. ISSN 0974-3200 Volume 4, Number 4 (2012), pp. 465 473 International Research Publication House http://www.irphouse.com Cyclic Path Covering

More information

Rainbow domination in the lexicographic product of graphs

Rainbow domination in the lexicographic product of graphs Rainbow domination in the lexicographic product of graphs Tadeja Kraner Šumenjak Douglas F. Rall Aleksandra Tepeh Abstract A k-rainbow dominating function of a graph G is a map f from V(G) to the set of

More information

CS Analysis of Recursive Algorithms and Brute Force

CS Analysis of Recursive Algorithms and Brute Force CS483-05 Analysis of Recursive Algorithms and Brute Force Instructor: Fei Li Room 443 ST II Office hours: Tue. & Thur. 4:30pm - 5:30pm or by appointments lifei@cs.gmu.edu with subject: CS483 http://www.cs.gmu.edu/

More information

Cycle Double Covers and Semi-Kotzig Frame

Cycle Double Covers and Semi-Kotzig Frame Cycle Double Covers and Semi-Kotzig Frame Dong Ye and Cun-Quan Zhang arxiv:1105.5190v1 [math.co] 26 May 2011 Department of Mathematics, West Virginia University, Morgantown, WV 26506-6310 Emails: dye@math.wvu.edu;

More information

Writing: Algorithms, Mathematics, Definitions

Writing: Algorithms, Mathematics, Definitions Writing: Algorithms, Mathematics, Definitions Javier Larrosa UPC Barcelona Tech. Javier Larrosa (UPC Barcelona Tech) Writing. 1 / 31 Algorithms In CS we often write algorithms (that we have previously

More information

8.5 Sequencing Problems

8.5 Sequencing Problems 8.5 Sequencing Problems Basic genres. Packing problems: SET-PACKING, INDEPENDENT SET. Covering problems: SET-COVER, VERTEX-COVER. Constraint satisfaction problems: SAT, 3-SAT. Sequencing problems: HAMILTONIAN-CYCLE,

More information

Mathematical Thinking Exam 2 20 November 2017

Mathematical Thinking Exam 2 20 November 2017 Mathematical Thinking Exam 2 20 November 2017 Name: Instructions: Be sure to read each problem s directions. Write clearly during the exam and fully erase or mark out anything you do not want graded. You

More information

A lower bound on the order of the largest induced linear forest in triangle-free planar graphs

A lower bound on the order of the largest induced linear forest in triangle-free planar graphs A lower bound on the order of the largest induced linear forest in triangle-free planar graphs François Dross a, Mickael Montassier a, and Alexandre Pinlou b a Université de Montpellier, LIRMM b Université

More information

Resistance distance in wheels and fans

Resistance distance in wheels and fans Resistance distance in wheels and fans R B Bapat Somit Gupta February 4, 009 Abstract: The wheel graph is the join of a single vertex and a cycle, while the fan graph is the join of a single vertex and

More information

Applied Integer Programming: Modeling and Solution

Applied Integer Programming: Modeling and Solution Applied Integer Programming: Modeling and Solution Chen, Batson, Dang Section 6. - 6.3 Blekinge Institute of Technology April 5, 05 Modeling Combinatorical Optimization Problems II Traveling Salesman Problem

More information

CSC 421: Algorithm Design & Analysis. Spring 2018

CSC 421: Algorithm Design & Analysis. Spring 2018 CSC 421: Algorithm Design & Analysis Spring 2018 Complexity & Computability complexity theory tractability, decidability P vs. NP, Turing machines NP-complete, reductions approximation algorithms, genetic

More information

On Annihilator Small Intersection Graph

On Annihilator Small Intersection Graph International Journal of Contemporary Mathematical Sciences Vol. 12, 2017, no. 7, 283-289 HIKARI Ltd, www.m-hikari.com https://doi.org/10.12988/ijcms.2017.7931 On Annihilator Small Intersection Graph Mehdi

More information

Chapter 10 Combinatorial Designs

Chapter 10 Combinatorial Designs Chapter 10 Combinatorial Designs BIBD Example (a,b,c) (a,b,d) (a,c,e) (a,d,f) (a,e,f) (b,c,f) (b,d,e) (b,e,f) (c,d,e) (c,d,f) Here are 10 subsets of the 6 element set {a, b, c, d, e, f }. BIBD Definition

More information

Private Key Cryptography. Fermat s Little Theorem. One Time Pads. Public Key Cryptography

Private Key Cryptography. Fermat s Little Theorem. One Time Pads. Public Key Cryptography Fermat s Little Theorem Private Key Cryptography Theorem 11 (Fermat s Little Theorem): (a) If p prime and gcd(p, a) = 1, then a p 1 1 (mod p). (b) For all a Z, a p a (mod p). Proof. Let A = {1, 2,...,

More information

Database Theory VU , SS Ehrenfeucht-Fraïssé Games. Reinhard Pichler

Database Theory VU , SS Ehrenfeucht-Fraïssé Games. Reinhard Pichler Database Theory Database Theory VU 181.140, SS 2018 7. Ehrenfeucht-Fraïssé Games Reinhard Pichler Institut für Informationssysteme Arbeitsbereich DBAI Technische Universität Wien 15 May, 2018 Pichler 15

More information

Chapter 2. Business Efficiency. Chapter Outline. Chapter Summary

Chapter 2. Business Efficiency. Chapter Outline. Chapter Summary Chapter 2 Business Efficiency Chapter Outline Introduction Section 2.1 Hamiltonian Circuits Section 2.2 Traveling Salesman Problem Section 2.3 Helping Traveling Salesmen Section 2.4 Critical-Path Analysis

More information

YEAR 12 A-LEVEL FURTHER MATHS CONTENT. Matrices: Add/subtract, multiply by scalar, matrix multiplication, zero and identity matrix (CP1 Ch 6)

YEAR 12 A-LEVEL FURTHER MATHS CONTENT. Matrices: Add/subtract, multiply by scalar, matrix multiplication, zero and identity matrix (CP1 Ch 6) YEAR 12 A-LEVEL FURTHER MATHS CONTENT Matrices: Add/subtract, multiply by scalar, matrix multiplication, zero and identity matrix (CP1 Ch 6) Complex Numbers: Real and imaginary numbers, adding/subtracting/multiplying

More information

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and education use, including for instruction at the authors institution

More information

Proper connection number and 2-proper connection number of a graph

Proper connection number and 2-proper connection number of a graph Proper connection number and 2-proper connection number of a graph arxiv:1507.01426v2 [math.co] 10 Jul 2015 Fei Huang, Xueliang Li, Shujing Wang Center for Combinatorics and LPMC-TJKLC Nankai University,

More information

A Separator Theorem for Graphs with an Excluded Minor and its Applications

A Separator Theorem for Graphs with an Excluded Minor and its Applications A Separator Theorem for Graphs with an Excluded Minor and its Applications Noga Alon IBM Almaden Research Center, San Jose, CA 95120,USA and Sackler Faculty of Exact Sciences, Tel Aviv University, Tel

More information

(This is a sample cover image for this issue. The actual cover is not yet available at this time.)

(This is a sample cover image for this issue. The actual cover is not yet available at this time.) (This is a sample cover image for this issue. The actual cover is not yet available at this time.) This article appeared in a journal published by Elsevier. The attached copy is furnished to the author

More information