scholarly journals Multiple Petersen Subdivisions in Permutation Graphs

10.37236/2239 ◽  
2013 ◽  
Vol 20 (1) ◽  
Author(s):  
Tomáš Kaiser ◽  
Jean-Sébastien Sereni ◽  
Zelealem B. Yilma

A permutation graph is a cubic graph admitting a 1-factor $M$ whose complement consists of two chordless cycles. Extending results of Ellingham and of Goldwasser and Zhang, we prove that if $e$ is an edge of $M$ such that every 4-cycle containing an edge of $M$ contains $e$, then $e$ is contained in a subdivision of the Petersen graph of a special type. In particular, if the graph is cyclically 5-edge-connected, then every edge of $M$ is contained in such a subdivision. Our proof is based on a characterization of cographs in terms of twin vertices. We infer a linear lower bound on the number of Petersen subdivisions in a permutation graph with no 4-cycles, and give a construction showing that this lower bound is tight up to a constant factor.

10.37236/8945 ◽  
2020 ◽  
Vol 27 (1) ◽  
Author(s):  
Fuliang Lu ◽  
Xing Feng ◽  
Yan Wang

A brick is a  non-bipartite matching covered graph without non-trivial tight cuts. Bricks are building blocks of matching covered graphs. We say that an edge $e$ in a brick $G$ is $b$-invariant if $G-e$ is matching covered and a tight cut decomposition of $G-e$ contains exactly one brick. A 2-edge-connected cubic graph is essentially 4-edge-connected if it does not contain nontrivial 3-cuts. A brick $G$ is near-bipartite if it has a pair of edges $\{e_1, e_2\}$ such that $G-\{e_1,e_2\}$ is bipartite and matching covered. Kothari, de Carvalho, Lucchesi  and Little proved that each essentially 4-edge-connected cubic non-near-bipartite brick $G$, distinct from the Petersen graph, has at least $|V(G)|$ $b$-invariant edges. Moreover, they made a conjecture: every essentially 4-edge-connected cubic near-bipartite brick $G$, distinct from $K_4$, has at least $|V(G)|/2$ $b$-invariant edges. We confirm the conjecture in this paper. Furthermore, all the essentially 4-edge-connected cubic near-bipartite bricks, the numbers of $b$-invariant edges of which attain the lower bound, are presented.


1987 ◽  
Vol 30 (2) ◽  
pp. 193-199 ◽  
Author(s):  
J. A. Bondy ◽  
Glenn Hopkins ◽  
William Staton

AbstractIf G is a connected cubic graph with ρ vertices, ρ > 4, then G has a vertex-induced forest containing at least (5ρ - 2)/8 vertices. In case G is triangle-free, the lower bound is improved to (2ρ — l)/3. Examples are given to show that no such lower bound is possible for vertex-induced trees.


1986 ◽  
Vol 23 (04) ◽  
pp. 1038-1044
Author(s):  
A. P. Basu ◽  
S. N. U. A. Kirmani

A characterization of the exponential distribution in the class of all distributions which are HNBUE or HNWUE is proved. An upper (a lower) bound is obtained on the renewal function of a renewal process when the underlying distribution is HNBUE (HNWUE).


2009 ◽  
Vol 10 (03) ◽  
pp. 205-217 ◽  
Author(s):  
WEIZHEN GU ◽  
KIRSTI WASH

For a graph G with n vertices and a permutation α on V(G), a permutation graph Pα(G) is obtained from two identical copies of G by adding an edge between v and α(V) for any v ϵ V(G). Let γ(G) be the domination number of a graph G. It has been shown that γ(G) ≤ γ(Pα(G) ≤ 2γ(G) for any permutation α on V(G). In this paper, we investigate specific graphs for which there exists a permutation α such that γ(Pα(G)) ≻ γ(G) in terms of the domination number of G or the maximum degree of G. Additionally, we construct a class of graphs for which the domination number of any permutation graph is twice the domination number of the original graph, as well as explore finding a specific graph G and permutation α for any two positive integers a and b with a ≤ b ≤ 2a, to have γ(G) = a and γ(Pα(G)) = b.


2017 ◽  
Vol 09 (01) ◽  
pp. 1750009 ◽  
Author(s):  
Eunjeong Yi

Let [Formula: see text] be a graph with vertex set [Formula: see text] and edge set [Formula: see text]. If [Formula: see text] has no isolated vertex, then a disjunctive total dominating set (DTD-set) of [Formula: see text] is a vertex set [Formula: see text] such that every vertex in [Formula: see text] is adjacent to a vertex of [Formula: see text] or has at least two vertices in [Formula: see text] at distance two from it, and the disjunctive total domination number [Formula: see text] of [Formula: see text] is the minimum cardinality overall DTD-sets of [Formula: see text]. Let [Formula: see text] and [Formula: see text] be two disjoint copies of a graph [Formula: see text], and let [Formula: see text] be a bijection. Then, a permutation graph [Formula: see text] has the vertex set [Formula: see text] and the edge set [Formula: see text]. For any connected graph [Formula: see text] of order at least three, we prove the sharp bounds [Formula: see text]; we give an example showing that [Formula: see text] can be arbitrarily large. We characterize permutation graphs for which [Formula: see text] holds. Further, we show that [Formula: see text] when [Formula: see text] is a cycle, a path, and a complete [Formula: see text]-partite graph, respectively.


2015 ◽  
Vol 13 (03) ◽  
pp. 1550023 ◽  
Author(s):  
Paulo E. M. F. Mendonça ◽  
Marcelo A. Marchiolli ◽  
Gerard J. Milburn

For every N-qubit density matrix written in the computational basis, an associated "X-density matrix" can be obtained by vanishing all entries out of the main- and anti-diagonals. It is very simple to compute the genuine multipartite (GM) concurrence of this associated N-qubit X-state, which, moreover, lower bounds the GM-concurrence of the original (non-X) state. In this paper, we rely on these facts to introduce and benchmark a heuristic for estimating the GM-concurrence of an arbitrary multiqubit mixed state. By explicitly considering two classes of mixed states, we illustrate that our estimates are usually very close to the standard lower bound on the GM-concurrence, being significantly easier to compute. In addition, while evaluating the performance of our proposed heuristic, we provide the first characterization of GM-entanglement in the steady states of the driven Dicke model at zero temperature.


2018 ◽  
Vol 58 (5) ◽  
pp. 285 ◽  
Author(s):  
Jan Legerský

Parallel addition, i.e., addition with limited carry propagation has been so far studied for complex bases and integer alphabets. We focus on alphabets consisting of integer combinations of powers of the base. We give necessary conditions on the alphabet allowing parallel addition. Under certain assumptions, we prove the same lower bound on the size of the generalized alphabet that is known for alphabets consisting of consecutive integers. We also extend the characterization of bases allowing parallel addition to numeration systems with non-integer alphabets.


10.37236/3771 ◽  
2014 ◽  
Vol 21 (1) ◽  
Author(s):  
Bence Csajbók

In a projective plane $\Pi_q$ of order $q$, a non-empty point set $\mathcal{S}_t$ is a $t$-semiarc if the number of tangent lines to $\mathcal{S}_t$ at each of its points is $t$. If $\mathcal{S}_t$ is a $t$-semiarc in $\Pi_q$, $t<q$, then each line intersects $\mathcal{S}_t$ in at most $q+1-t$ points. Dover proved that semiovals (semiarcs with $t=1$) containing $q$ collinear points exist in $\Pi_q$ only if $q\leq 3$. We show that if $t>1$, then $t$-semiarcs with $q+1-t$ collinear points exist only if $t\geq \sqrt{q-1}$. In $\mathrm{PG}(2,q)$ we prove the lower bound $t\geq(q-1)/2$, with equality only if $\mathcal{S}_t$ is a blocking set of Rédei type of size $3(q+1)/2$.We call the symmetric difference of two lines, with $t$ further points removed from each line, a $V_t$-configuration. We give conditions ensuring a $t$-semiarc to contain a $V_t$-configuration and give the complete characterization of such $t$-semiarcs in $\mathrm{PG}(2,q)$.


Author(s):  
Patrick Derbez ◽  
Pierre-Alain Fouque ◽  
Baptiste Lambin ◽  
Victor Mollimard

The Feistel construction is one of the most studied ways of building block ciphers. Several generalizations were then proposed in the literature, leading to the Generalized Feistel Network, where the round function first applies a classical Feistel operation in parallel on an even number of blocks, and then a permutation is applied to this set of blocks. In 2010 at FSE, Suzaki and Minematsu studied the diffusion of such construction, raising the question of how many rounds are required so that each block of the ciphertext depends on all blocks of the plaintext. They thus gave some optimal permutations, with respect to this diffusion criteria, for a Generalized Feistel Network consisting of 2 to 16 blocks, as well as giving a good candidate for 32 blocks. Later at FSE’19, Cauchois et al. went further and were able to propose optimal even-odd permutations for up to 26 blocks.In this paper, we complete the literature by building optimal even-odd permutations for 28, 30, 32, 36 blocks which to the best of our knowledge were unknown until now. The main idea behind our constructions and impossibility proof is a new characterization of the total diffusion of a permutation after a given number of rounds. In fact, we propose an efficient algorithm based on this new characterization which constructs all optimal even-odd permutations for the 28, 30, 32, 36 blocks cases and proves a better lower bound for the 34, 38, 40 and 42 blocks cases. In particular, we improve the 32 blocks case by exhibiting optimal even-odd permutations with diffusion round of 9. The existence of such a permutation was an open problem for almost 10 years and the best known permutation in the literature had a diffusion round of 10. Moreover, our characterization can be implemented very efficiently and allows us to easily re-find all optimal even-odd permutations for up to 26 blocks with a basic exhaustive search


2014 ◽  
Vol 25 (07) ◽  
pp. 823-835 ◽  
Author(s):  
DANIEL GOČ ◽  
ALEXANDROS PALIOUDAKIS ◽  
KAI SALOMAA

The language [Formula: see text] consists of first halfs of strings in L. Many other variants of a proportional removal operation have been considered in the literature and a characterization of removal operations that preserve regularity is known. We consider the nondeterministic state complexity of the operation [Formula: see text] and, more generally, of polynomial removals as defined by Domaratzki (J. Automata, Languages and Combinatorics 7(4), 2002). We give an O(n2) upper bound for the nondeterministic state complexity of polynomial removals and a matching lower bound in cases where the polynomial is a sum of a monomial and a constant, or when the polynomial has rational roots.


Sign in / Sign up

Export Citation Format

Share Document