Discrete Mathematics
|
|
- Jean Chapman
- 5 years ago
- Views:
Transcription
1 Outline Applied Mathematics Division Department of Mathematical Sciences University of Stellenbosch, South Africa Hons Program Presentation October 10, 2011
2 Outline Outline
3 Outline
4 Some of the Topics Trees and Searching Algorithms Vertex Traversal and Hamiltonian Graphs Edge Traversl and Eulerian Graphs Planar Graphs Scheduling and Graph Colouring Tournaments
5 Outline
6 in Classical Problems The Travelling Salesman Problem The Chinese Postman Problem Selected Topics Genetic Algorithms Greedy Algorithms Simulated Annealing Tabu Search Genetic Algorithms
7 Outline
8 Encryption/Decryption How do I encrypt a message so that only the receiver is able to understand it? How do I decipher a message that I intercept? Application of Number Theory Content Block Ciphers Stream Ciphers Public Key Systems
9 Outline
10 Error Correction Designing of error-correcting codes to ensure the integrity of information An application of vector spaces over finite fields
11 Outline
12 Grobler The appearance of Fibonacci numbers in the arrangement of leaves and florets of plants The existence and designing of Mutually Orthogonal Latin Squares Benecke A survey and development of algorithmic methods for graph domination problems An analysis and solution to the Guess Who Problem
13 The Cartesian Product Definition The Cartesian product of two graphs G and H, V(G) = {v 1, v 2,..., v m }, V(H) = {w 1, w 2,..., w n } Denoted G H V(G H) = {(v i, w j ) : i = 1, 2,..., m, j = 1, 2,..., n} (v i, w j )(v k, w l ) E(G H) if and only if j = l and v i v k E(G), or i = k and w j w l E(H)
14 Example Consider G = P 3 and H = C 3 (v 1, w 1 ) (v 1, w 2 ) (v 1, w 3 ) Definition v 1 Vertex set V(G H) = {(v i, w j ) : i = 1, 2,..., m, j = 1, 2,..., n} (v i, w j )(v k, w l ) E(G H) iff j = l and v i v k E(G), or i = k and w j w l E(H) v 2 v 3G (v 2, w 1 ) (v 3, w 1 ) H (v 2, w 2 ) (v 3, w 2 ) w 1 w 2 (v 2, w 3 ) (v 3, w 3 ) w 3
15 Domination Definition A subset D V(G) is a dominating set if any vertex u D is adjacent to some vertex v D. The domination number γ(g) is the minimum cardinality over all dominating sets D of G.
16 Domination Algorithms Project Survey best algorithms to determine the domination number of the Cartesian product graph Study and implement the method by Livingston & Stout, as described by Benecke & Mynhardt Survey best algorithms for and investigate application to other graph products and/or other domination parameters Content Programming
17 The Guess Who Game Questions Generalize classic game to k 1 mystery people. What is the best strategy? What is the best question at any stage? How does one design a balanced game board? Under which conditions can the game always be resolved? Content Game Theory Probability Theory Programming
18 References A MENEZES, P VAN OORSCHOT AND S VANSTONE, Handbook of Applied Cryptography, CRC Press, JA BONDY AND USR MURTY, Graduate Texts in Mathematics -, Springer, Z MICHALEWICZ AND DB FOGEL, How to Solve it: Modern Heuristics, Springer, 2000.
19
20
21
Graph Theory(I): استاذ الماده: أ.م.د. أكرم برزان عطار
استاذ الماده: أ.م.د. أكرم برزان عطار Graph Theory(I): 1. An introduction to Graphs: The Definition of Graphs - Graphs as Models - Matrix Degree - Subgraphs- Paths and Cycles - the Matrix Representation
More informationRelations between edge removing and edge subdivision concerning domination number of a graph
arxiv:1409.7508v1 [math.co] 26 Sep 2014 Relations between edge removing and edge subdivision concerning domination number of a graph Magdalena Lemańska 1, Joaquín Tey 2, Rita Zuazua 3 1 Gdansk University
More informationTowards a measure of vulnerability, tenacity of a Graph
Journal of Algorithms and Computation journal homepage: http://jacutacir Towards a measure of vulnerability, tenacity of a Graph Dara Moazzami 1 1 University of Tehran, College of Engineering, Department
More informationEvery 3-connected, essentially 11-connected line graph is Hamiltonian
Journal of Combinatorial Theory, Series B 96 (26) 571 576 www.elsevier.com/locate/jctb Every 3-connected, essentially 11-connected line graph is Hamiltonian Hong-Jian Lai a, Yehong Shao b, Hehui Wu a,
More informationAn Explicit Construction of Optimal Dominating and [1, 2] Dominating Sets in Grid
An Explicit Construction of Optimal Dominating and [ 2] Dominating Sets in Grid P. Sharifani 1, M.R. Hooshmandasl 2, M. Alambardar Meybodi 3 3 Department of Computer Science, Yazd University, Yazd, Iran.
More informationMy brief introduction to cryptography
My brief introduction to cryptography David Thomson dthomson@math.carleton.ca Carleton University September 7, 2013 introduction to cryptography September 7, 2013 1 / 28 Outline 1 The general framework
More informationThe P versus NP Problem. Ker-I Ko. Stony Brook, New York
The P versus NP Problem Ker-I Ko Stony Brook, New York ? P = NP One of the seven Millenium Problems The youngest one A folklore question? Has hundreds of equivalent forms Informal Definitions P : Computational
More informationA Characterization of the Cactus Graphs with Equal Domination and Connected Domination Numbers
International Journal of Contemporary Mathematical Sciences Vol. 12, 2017, no. 7, 275-281 HIKARI Ltd, www.m-hikari.com https://doi.org/10.12988/ijcms.2017.7932 A Characterization of the Cactus Graphs with
More informationAlgorithms and Theory of Computation. Lecture 22: NP-Completeness (2)
Algorithms and Theory of Computation Lecture 22: NP-Completeness (2) Xiaohui Bei MAS 714 November 8, 2018 Nanyang Technological University MAS 714 November 8, 2018 1 / 20 Set Cover Set Cover Input: a set
More informationEvery 4-connected line graph of a quasi claw-free graph is hamiltonian connected
Discrete Mathematics 308 (2008) 532 536 www.elsevier.com/locate/disc Note Every 4-connected line graph of a quasi claw-free graph is hamiltonian connected Hong-Jian Lai a, Yehong Shao b, Mingquan Zhan
More informationInduced Cycles of Fixed Length
Induced Cycles of Fixed Length Terry McKee Wright State University Dayton, Ohio USA terry.mckee@wright.edu Cycles in Graphs Vanderbilt University 31 May 2012 Overview 1. Investigating the fine structure
More informationAbout Vigenere cipher modifications
Proceedings of the Workshop on Foundations of Informatics FOI-2015, August 24-29, 2015, Chisinau, Republic of Moldova About Vigenere cipher modifications Eugene Kuznetsov Abstract TheaimofthisworkisamodificationoftheclassicalVigenere
More informationAlgorithms and Complexity theory
Algorithms and Complexity theory Thibaut Barthelemy Some slides kindly provided by Fabien Tricoire University of Vienna WS 2014 Outline 1 Algorithms Overview How to write an algorithm 2 Complexity theory
More informationHans Delfs & Helmut Knebl: Kryptographie und Informationssicherheit WS 2008/2009. References. References
Hans Delfs & Helmut Knebl: Kryptographie und Informationssicherheit WS 2008/2009 Die Unterlagen sind ausschliesslich zum persoenlichen Gebrauch der Vorlesungshoerer bestimmt. Die Herstellung von elektronischen
More informationThis article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and
This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and education use, including for instruction at the authors institution
More informationHamiltonian Cycle. Zero Knowledge Proof
Hamiltonian Cycle Zero Knowledge Proof Hamiltonian cycle Hamiltonian cycle - A path that visits each vertex exactly once, and ends at the same point it started Example Hamiltonian cycle - A path that visits
More informationSemester 3 MULTIVARIATE CALCULUS AND INTEGRAL TRANSFORMS
PC 11 Semester 3 MT03C11 MULTIVARIATE CALCULUS AND INTEGRAL TRANSFORMS Text 1: Tom APOSTOL, Mathematical Analysis, Second edition, Narosa Publishing House. Text 2: WALTER RUDIN, Principles of Mathematical
More informationNP-complete problems. CSE 101: Design and Analysis of Algorithms Lecture 20
NP-complete problems CSE 101: Design and Analysis of Algorithms Lecture 20 CSE 101: Design and analysis of algorithms NP-complete problems Reading: Chapter 8 Homework 7 is due today, 11:59 PM Tomorrow
More information8.3 Hamiltonian Paths and Circuits
8.3 Hamiltonian Paths and Circuits 8.3 Hamiltonian Paths and Circuits A Hamiltonian path is a path that contains each vertex exactly once A Hamiltonian circuit is a Hamiltonian path that is also a circuit
More informationA Class of Vertex Transitive Graphs
Volume 119 No. 16 2018, 3137-3144 ISSN: 1314-3395 (on-line version) url: http://www.acadpubl.eu/hub/ http://www.acadpubl.eu/hub/ A Class of Vertex Transitive Graphs 1 N. Murugesan, 2 R. Anitha 1 Assistant
More informationEvery 3-connected, essentially 11-connected line graph is hamiltonian
Every 3-connected, essentially 11-connected line graph is hamiltonian Hong-Jian Lai, Yehong Shao, Hehui Wu, Ju Zhou October 2, 25 Abstract Thomassen conjectured that every 4-connected line graph is hamiltonian.
More informationMATH 363: Discrete Mathematics
MATH 363: Discrete Mathematics Learning Objectives by topic The levels of learning for this class are classified as follows. 1. Basic Knowledge: To recall and memorize - Assess by direct questions. The
More informationAlgorithm Design Strategies V
Algorithm Design Strategies V Joaquim Madeira Version 0.0 October 2016 U. Aveiro, October 2016 1 Overview The 0-1 Knapsack Problem Revisited The Fractional Knapsack Problem Greedy Algorithms Example Coin
More informationSome results on incidence coloring, star arboricity and domination number
AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 54 (2012), Pages 107 114 Some results on incidence coloring, star arboricity and domination number Pak Kiu Sun Wai Chee Shiu Department of Mathematics Hong
More informationGraph Theory and Interconnection Networks
Graph Theory and Interconnection Networks Lih-Hsing Hsu and Cheng-Kuan Lin @ CRC Press Taylor & Francis Group Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Group, an informa
More informationGRAPHS & DIGRAPHS 5th Edition. Preface to the fifth edition
GRAPHS & DIGRAPHS 5th Edition Gary Chartrand Western Michigan University Linda Lesniak Drew University Ping Zhang Western Michigan University Preface to the fifth edition Since graph theory was considered
More informationComputers and Mathematics with Applications
Computers and Mathematics with Applications 61 (2011) 1261 1265 Contents lists available at ScienceDirect Computers and Mathematics with Applications journal homepage: wwwelseviercom/locate/camwa Cryptanalysis
More informationAlgorithms Design & Analysis. Approximation Algorithm
Algorithms Design & Analysis Approximation Algorithm Recap External memory model Merge sort Distribution sort 2 Today s Topics Hard problem Approximation algorithms Metric traveling salesman problem A
More informationHamiltonian Graphs Graphs
COMP2121 Discrete Mathematics Hamiltonian Graphs Graphs Hubert Chan (Chapter 9.5) [O1 Abstract Concepts] [O2 Proof Techniques] [O3 Basic Analysis Techniques] 1 Hamiltonian Paths and Circuits [O1] A Hamiltonian
More informationData Structures and Algorithms (CSCI 340)
University of Wisconsin Parkside Fall Semester 2008 Department of Computer Science Prof. Dr. F. Seutter Data Structures and Algorithms (CSCI 340) Homework Assignments The numbering of the problems refers
More informationABHELSINKI UNIVERSITY OF TECHNOLOGY
Approximation Algorithms Seminar 1 Set Cover, Steiner Tree and TSP Siert Wieringa siert.wieringa@tkk.fi Approximation Algorithms Seminar 1 1/27 Contents Approximation algorithms for: Set Cover Steiner
More informationA DPA attack on RSA in CRT mode
A DPA attack on RSA in CRT mode Marc Witteman Riscure, The Netherlands 1 Introduction RSA is the dominant public key cryptographic algorithm, and used in an increasing number of smart card applications.
More informationThe minimum G c cut problem
The minimum G c cut problem Abstract In this paper we define and study the G c -cut problem. Given a complete undirected graph G = (V ; E) with V = n, edge weighted by w(v i, v j ) 0 and an undirected
More informationCycle Double Cover Conjecture
Cycle Double Cover Conjecture Paul Clarke St. Paul's College Raheny January 5 th 2014 Abstract In this paper, a proof of the cycle double cover conjecture is presented. The cycle double cover conjecture
More informationHamilton Index and Its Algorithm of Uncertain Graph
Hamilton Index and Its Algorithm of Uncertain Graph Bo Zhang 1 Jin Peng 1 School of Mathematics and Statistics Huazhong Normal University Hubei 430079 China Institute of Uncertain Systems Huanggang Normal
More informationSPANNING TREES WITH A BOUNDED NUMBER OF LEAVES. Junqing Cai, Evelyne Flandrin, Hao Li, and Qiang Sun
Opuscula Math. 37, no. 4 (017), 501 508 http://dx.doi.org/10.7494/opmath.017.37.4.501 Opuscula Mathematica SPANNING TREES WITH A BOUNDED NUMBER OF LEAVES Junqing Cai, Evelyne Flandrin, Hao Li, and Qiang
More informationREU 2015: Complexity Across Disciplines. Introduction to Cryptography
REU 2015: Complexity Across Disciplines Introduction to Cryptography Symmetric Key Cryptosystems Iterated Block Ciphers Definition Let KS : K K s be a function that produces a set of subkeys k i K, 1 i
More informationOverview of some Combinatorial Designs
Bimal Roy Indian Statistical Institute, Kolkata. Outline of the talk 1 Introduction 2 3 4 5 6 7 Outline of the talk 1 Introduction 2 3 4 5 6 7 Introduction Design theory: Study of combinatorial objects
More informationThe construction of a regular graph
The construction of a regular graph Ryosuke MIZUNO Department of Physics Kyoto University Yawara ISHIDA Research Institute for Mathematical Science Kyoto University Graphs of Diameter=2 in Graph Golf (Order,Degree)=(64,16)
More informationPrime Factorization in the Generalized Hierarchical Product
Prime Factorization in the Generalized Hierarchical Product Sarah Anderson and Kirsti Wash Clemson University sarah5,kirstiw@clemson.edu January 18, 2014 Background Definition A graph G = (V, E) is a set
More informationScheduling and Optimization Course (MPRI)
MPRI Scheduling and optimization: lecture p. /6 Scheduling and Optimization Course (MPRI) Leo Liberti LIX, École Polytechnique, France MPRI Scheduling and optimization: lecture p. /6 Teachers Christoph
More informationCryptanalysis of a Message Authentication Code due to Cary and Venkatesan
Cryptanalysis of a Message Authentication Code due to Cary and Venkatesan Simon R. Blackburn and Kenneth G. Paterson Department of Mathematics Royal Holloway, University of London Egham, Surrey, TW20 0EX,
More informationCS 320, Fall Dr. Geri Georg, Instructor 320 NP 1
NP CS 320, Fall 2017 Dr. Geri Georg, Instructor georg@colostate.edu 320 NP 1 NP Complete A class of problems where: No polynomial time algorithm has been discovered No proof that one doesn t exist 320
More informationLongest paths in strong spanning oriented subgraphs of strong semicomplete multipartite digraphs
Longest paths in strong spanning oriented subgraphs of strong semicomplete multipartite digraphs Gregory Gutin Department of Mathematical Sciences Brunel, The University of West London Uxbridge, Middlesex,
More informationSupereulerian planar graphs
Supereulerian planar graphs Hong-Jian Lai and Mingquan Zhan Department of Mathematics West Virginia University, Morgantown, WV 26506, USA Deying Li and Jingzhong Mao Department of Mathematics Central China
More informationGraphs with large maximum degree containing no odd cycles of a given length
Graphs with large maximum degree containing no odd cycles of a given length Paul Balister Béla Bollobás Oliver Riordan Richard H. Schelp October 7, 2002 Abstract Let us write f(n, ; C 2k+1 ) for the maximal
More informationLecture 1: Perfect Secrecy and Statistical Authentication. 2 Introduction - Historical vs Modern Cryptography
CS 7880 Graduate Cryptography September 10, 2015 Lecture 1: Perfect Secrecy and Statistical Authentication Lecturer: Daniel Wichs Scribe: Matthew Dippel 1 Topic Covered Definition of perfect secrecy One-time
More informationOn the Classification of Splitting (v, u c, ) BIBDs
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 18, No 5 Special Thematic Issue on Optimal Codes and Related Topics Sofia 2018 Print ISSN: 1311-9702; Online ISSN: 1314-4081
More informationQuantum Algorithms for Graph Traversals and Related Problems
Quantum Algorithms for Graph Traversals and Related Problems Sebastian Dörn Institut für Theoretische Informatik, Universität Ulm, 89069 Ulm, Germany sebastian.doern@uni-ulm.de Abstract. We study the complexity
More informationA path that visits each vertex exactly once is a Hamiltonian path. A circuit that visits each vertex exactly once is a Hamiltonian circuit.
(c) Epstein 2013 Chapter 2: usiness Efficiency Page 1 CHAPTER 2: USINESS EFFICIENCY 2.1 Hamiltonian Circuits A path that visits each vertex exactly once is a Hamiltonian path. A circuit that visits each
More informationCS 350 Algorithms and Complexity
CS 350 Algorithms and Complexity Winter 2019 Lecture 15: Limitations of Algorithmic Power Introduction to complexity theory Andrew P. Black Department of Computer Science Portland State University Lower
More informationCS 350 Algorithms and Complexity
1 CS 350 Algorithms and Complexity Fall 2015 Lecture 15: Limitations of Algorithmic Power Introduction to complexity theory Andrew P. Black Department of Computer Science Portland State University Lower
More informationElliptic Curve Cryptography
Areas for Discussion Elliptic Curve Cryptography Joseph Spring Department of Computer Science 7COM1027 - Distributed Systems Security Lecture - Elliptic Curves 1 1 Motivation Elliptic Curves Security of
More informationEvery line graph of a 4-edge-connected graph is Z 3 -connected
European Journal of Combinatorics 0 (2009) 595 601 Contents lists available at ScienceDirect European Journal of Combinatorics journal homepage: www.elsevier.com/locate/ejc Every line graph of a 4-edge-connected
More informationNP-Complete Problems and Approximation Algorithms
NP-Complete Problems and Approximation Algorithms Efficiency of Algorithms Algorithms that have time efficiency of O(n k ), that is polynomial of the input size, are considered to be tractable or easy
More informationSolution of a conjecture of Volkmann on the number of vertices in longest paths and cycles of strong semicomplete multipartite digraphs
Solution of a conjecture of Volkmann on the number of vertices in longest paths and cycles of strong semicomplete multipartite digraphs Gregory Gutin Department of Computer Science Royal Holloway University
More informationMatroids. Start with a set of objects, for example: E={ 1, 2, 3, 4, 5 }
Start with a set of objects, for example: E={ 1, 2, 3, 4, 5 } Start with a set of objects, for example: E={ 1, 2, 3, 4, 5 } The power set of E is the set of all possible subsets of E: {}, {1}, {2}, {3},
More informationMathematics Masters Examination
Mathematics Masters Examination OPTION 4 Fall 2015 MATHEMATICAL COMPUTER SCIENCE NOTE: Any student whose answers require clarification may be required to submit to an oral examination. Each of the twelve
More informationISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 1, July 2013
A Matrix Approach for Information Security Based ECC using Mealy Machine and Fibonacci Q-Matrix Fatima Amounas*, El Hassan El Kinani**, Moha Hajar*** * R.O.I Group, Computer Sciences Department Moulay
More informationFinal Exam Math 105: Topics in Mathematics Cryptology, the Science of Secret Writing Rhodes College Tuesday, 30 April :30 11:00 a.m.
Final Exam Math 10: Topics in Mathematics Cryptology, the Science of Secret Writing Rhodes College Tuesday, 0 April 2002 :0 11:00 a.m. Instructions: Please be as neat as possible (use a pencil), and show
More informationA Piggybank Protocol for Quantum Cryptography
Piggybank Protocol for Quantum Cryptography Navya Chodisetti bstract This paper presents a quantum mechanical version of the piggy-bank cryptography protocol. The basic piggybank cryptography idea is to
More informationNP and Computational Intractability
NP and Computational Intractability 1 Review Basic reduction strategies. Simple equivalence: INDEPENDENT-SET P VERTEX-COVER. Special case to general case: VERTEX-COVER P SET-COVER. Encoding with gadgets:
More informationFactors in Graphs With Multiple Degree Constraints
Factors in Graphs With Multiple Degree Constraints Richard C. Brewster, Morten Hegner Nielsen, and Sean McGuinness Thompson Rivers University Kamloops, BC V2C0C8 Canada October 4, 2011 Abstract For a graph
More informationLattice Reduction on Low-Exponent RSA
Lattice Reduction on Low-Exponent RSA Jason Dyer August 2002 1 Preliminaries to Coppersmith s Algorithm Coppersmith s algorithm relies on a simple flaw in the RSA algorithm when messages are small compared
More informationLecture 2: Perfect Secrecy and its Limitations
CS 4501-6501 Topics in Cryptography 26 Jan 2018 Lecture 2: Perfect Secrecy and its Limitations Lecturer: Mohammad Mahmoody Scribe: Mohammad Mahmoody 1 Introduction Last time, we informally defined encryption
More informationUnit 1A: Computational Complexity
Unit 1A: Computational Complexity Course contents: Computational complexity NP-completeness Algorithmic Paradigms Readings Chapters 3, 4, and 5 Unit 1A 1 O: Upper Bounding Function Def: f(n)= O(g(n)) if
More informationarxiv: v2 [math.co] 29 Oct 2017
arxiv:1404.3385v2 [math.co] 29 Oct 2017 A proof for a conjecture of Gyárfás, Lehel, Sárközy and Schelp on Berge-cycles G.R. Omidi Department of Mathematical Sciences, Isfahan University of Technology,
More informationOn the Fractional Chromatic Index of a Graph and its Complement
On the Fractional Chromatic Index of a Graph and its Complement David Avis, 1 Caterina De Simone 2 and Bruce Reed 1 School of Computer Science, McGill University, 3480 University Street, Montreal, Canada,
More informationCombinatorial optimization problems
Combinatorial optimization problems Heuristic Algorithms Giovanni Righini University of Milan Department of Computer Science (Crema) Optimization In general an optimization problem can be formulated as:
More informationarxiv: v1 [math.co] 4 Jan 2018
A family of multigraphs with large palette index arxiv:80.0336v [math.co] 4 Jan 208 M.Avesani, A.Bonisoli, G.Mazzuoccolo July 22, 208 Abstract Given a proper edge-coloring of a loopless multigraph, the
More informationDomination in Fuzzy Graph: A New Approach
International Journal of Computational Science and Mathematics. ISSN 0974-3189 Volume 2, Number 3 (2010), pp. 101 107 International Research Publication House http://www.irphouse.com Domination in Fuzzy
More informationTUTORIAL: HYPER-HEURISTICS AND COMPUTATIONAL INTELLIGENCE
TUTORIAL: HYPER-HEURISTICS AND COMPUTATIONAL INTELLIGENCE Nelishia Pillay School of Mathematics, Statistics and Computer Science University of KwaZulu-Natal South Africa TUTORIAL WEBSITE URL: http://titancs.ukzn.ac.za/ssci2015tutorial.aspx
More informationMinimum degree conditions for the existence of fractional factors in planar graphs
AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 72(3) (2018), Pages 536 548 Minimum degree conditions for the existence of fractional factors in planar graphs P. Katerinis Department of Informatics, Athens
More informationMathematics Without Calculations It s a Beautiful Thing!
Sacred Heart University DigitalCommons@SHU Mathematics Faculty Publications Mathematics Department 8-4-2016 Mathematics Without Calculations It s a Beautiful Thing! Jason J. Molitierno Sacred Heart University,
More informationCYCLES CONTAINING SPECIFIED EDGES IN A GRAPH CYKLE ZAWIERAJĄCE WYBRANE KRAWĘDZIE GRAFU
GRZEGORZ GANCARZEWICZ CYCLES CONTAINING SPECIFIED EDGES IN A GRAPH CYKLE ZAWIERAJĄCE WYBRANE KRAWĘDZIE GRAFU A b s t r a c t The aim of this paper is to prove that if s 1 and G is a graph of order n 4s
More informationGraphs and Combinatorics
Graphs and Combinatorics (2005) 21:469 474 Digital Object Identifier (DOI) 10.1007/s00373-005-0625-0 Graphs and Combinatorics Springer-Verlag 2005 On Group Chromatic Number of Graphs Hong-Jian Lai 1 and
More informationAS 1 Math Structure for BSc (Ed) (Primary 2 CS Track) AS 1 Math Structure for BSc (Ed) (Secondary)
ACADEMIC SUBJECT: MATHEMATICS Table 1: AS 1 Math Structure for BSc (Ed) (Primary 2 CS Track) AS 1 Math Structure for BSc (Ed) (Secondary) Year 1 2 3 4 Course Code Title Course Category No. of AUs Prerequisites
More informationCS 301: Complexity of Algorithms (Term I 2008) Alex Tiskin Harald Räcke. Hamiltonian Cycle. 8.5 Sequencing Problems. Directed Hamiltonian Cycle
8.5 Sequencing Problems Basic genres. Packing problems: SET-PACKING, INDEPENDENT SET. Covering problems: SET-COVER, VERTEX-COVER. Constraint satisfaction problems: SAT, 3-SAT. Sequencing problems: HAMILTONIAN-CYCLE,
More informationPractice Final Solutions. 1. Consider the following algorithm. Assume that n 1. line code 1 alg(n) { 2 j = 0 3 if (n = 0) { 4 return j
Practice Final Solutions 1. Consider the following algorithm. Assume that n 1. line code 1 alg(n) 2 j = 0 3 if (n = 0) 4 return j } 5 else 6 j = 2n+ alg(n 1) 7 return j } } Set up a recurrence relation
More informationCyclic Path Covering Number of Euler Graphs
Global Journal of Mathematical Sciences: Theory and Practical. ISSN 0974-3200 Volume 4, Number 4 (2012), pp. 465 473 International Research Publication House http://www.irphouse.com Cyclic Path Covering
More informationRainbow domination in the lexicographic product of graphs
Rainbow domination in the lexicographic product of graphs Tadeja Kraner Šumenjak Douglas F. Rall Aleksandra Tepeh Abstract A k-rainbow dominating function of a graph G is a map f from V(G) to the set of
More informationCS Analysis of Recursive Algorithms and Brute Force
CS483-05 Analysis of Recursive Algorithms and Brute Force Instructor: Fei Li Room 443 ST II Office hours: Tue. & Thur. 4:30pm - 5:30pm or by appointments lifei@cs.gmu.edu with subject: CS483 http://www.cs.gmu.edu/
More informationCycle Double Covers and Semi-Kotzig Frame
Cycle Double Covers and Semi-Kotzig Frame Dong Ye and Cun-Quan Zhang arxiv:1105.5190v1 [math.co] 26 May 2011 Department of Mathematics, West Virginia University, Morgantown, WV 26506-6310 Emails: dye@math.wvu.edu;
More informationWriting: Algorithms, Mathematics, Definitions
Writing: Algorithms, Mathematics, Definitions Javier Larrosa UPC Barcelona Tech. Javier Larrosa (UPC Barcelona Tech) Writing. 1 / 31 Algorithms In CS we often write algorithms (that we have previously
More information8.5 Sequencing Problems
8.5 Sequencing Problems Basic genres. Packing problems: SET-PACKING, INDEPENDENT SET. Covering problems: SET-COVER, VERTEX-COVER. Constraint satisfaction problems: SAT, 3-SAT. Sequencing problems: HAMILTONIAN-CYCLE,
More informationMathematical Thinking Exam 2 20 November 2017
Mathematical Thinking Exam 2 20 November 2017 Name: Instructions: Be sure to read each problem s directions. Write clearly during the exam and fully erase or mark out anything you do not want graded. You
More informationA lower bound on the order of the largest induced linear forest in triangle-free planar graphs
A lower bound on the order of the largest induced linear forest in triangle-free planar graphs François Dross a, Mickael Montassier a, and Alexandre Pinlou b a Université de Montpellier, LIRMM b Université
More informationResistance distance in wheels and fans
Resistance distance in wheels and fans R B Bapat Somit Gupta February 4, 009 Abstract: The wheel graph is the join of a single vertex and a cycle, while the fan graph is the join of a single vertex and
More informationApplied Integer Programming: Modeling and Solution
Applied Integer Programming: Modeling and Solution Chen, Batson, Dang Section 6. - 6.3 Blekinge Institute of Technology April 5, 05 Modeling Combinatorical Optimization Problems II Traveling Salesman Problem
More informationCSC 421: Algorithm Design & Analysis. Spring 2018
CSC 421: Algorithm Design & Analysis Spring 2018 Complexity & Computability complexity theory tractability, decidability P vs. NP, Turing machines NP-complete, reductions approximation algorithms, genetic
More informationOn Annihilator Small Intersection Graph
International Journal of Contemporary Mathematical Sciences Vol. 12, 2017, no. 7, 283-289 HIKARI Ltd, www.m-hikari.com https://doi.org/10.12988/ijcms.2017.7931 On Annihilator Small Intersection Graph Mehdi
More informationChapter 10 Combinatorial Designs
Chapter 10 Combinatorial Designs BIBD Example (a,b,c) (a,b,d) (a,c,e) (a,d,f) (a,e,f) (b,c,f) (b,d,e) (b,e,f) (c,d,e) (c,d,f) Here are 10 subsets of the 6 element set {a, b, c, d, e, f }. BIBD Definition
More informationPrivate Key Cryptography. Fermat s Little Theorem. One Time Pads. Public Key Cryptography
Fermat s Little Theorem Private Key Cryptography Theorem 11 (Fermat s Little Theorem): (a) If p prime and gcd(p, a) = 1, then a p 1 1 (mod p). (b) For all a Z, a p a (mod p). Proof. Let A = {1, 2,...,
More informationDatabase Theory VU , SS Ehrenfeucht-Fraïssé Games. Reinhard Pichler
Database Theory Database Theory VU 181.140, SS 2018 7. Ehrenfeucht-Fraïssé Games Reinhard Pichler Institut für Informationssysteme Arbeitsbereich DBAI Technische Universität Wien 15 May, 2018 Pichler 15
More informationChapter 2. Business Efficiency. Chapter Outline. Chapter Summary
Chapter 2 Business Efficiency Chapter Outline Introduction Section 2.1 Hamiltonian Circuits Section 2.2 Traveling Salesman Problem Section 2.3 Helping Traveling Salesmen Section 2.4 Critical-Path Analysis
More informationYEAR 12 A-LEVEL FURTHER MATHS CONTENT. Matrices: Add/subtract, multiply by scalar, matrix multiplication, zero and identity matrix (CP1 Ch 6)
YEAR 12 A-LEVEL FURTHER MATHS CONTENT Matrices: Add/subtract, multiply by scalar, matrix multiplication, zero and identity matrix (CP1 Ch 6) Complex Numbers: Real and imaginary numbers, adding/subtracting/multiplying
More informationThis article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and
This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and education use, including for instruction at the authors institution
More informationProper connection number and 2-proper connection number of a graph
Proper connection number and 2-proper connection number of a graph arxiv:1507.01426v2 [math.co] 10 Jul 2015 Fei Huang, Xueliang Li, Shujing Wang Center for Combinatorics and LPMC-TJKLC Nankai University,
More informationA Separator Theorem for Graphs with an Excluded Minor and its Applications
A Separator Theorem for Graphs with an Excluded Minor and its Applications Noga Alon IBM Almaden Research Center, San Jose, CA 95120,USA and Sackler Faculty of Exact Sciences, Tel Aviv University, Tel
More information(This is a sample cover image for this issue. The actual cover is not yet available at this time.)
(This is a sample cover image for this issue. The actual cover is not yet available at this time.) This article appeared in a journal published by Elsevier. The attached copy is furnished to the author
More information