11 research outputs found

    An Abstraction of Whitney's Broken Circuit Theorem

    Full text link
    We establish a broad generalization of Whitney's broken circuit theorem on the chromatic polynomial of a graph to sums of type ASf(A)\sum_{A\subseteq S} f(A) where SS is a finite set and ff is a mapping from the power set of SS into an abelian group. We give applications to the domination polynomial and the subgraph component polynomial of a graph, the chromatic polynomial of a hypergraph, the characteristic polynomial and Crapo's beta invariant of a matroid, and the principle of inclusion-exclusion. Thus, we discover several known and new results in a concise and unified way. As further applications of our main result, we derive a new generalization of the maximums-minimums identity and of a theorem due to Blass and Sagan on the M\"obius function of a finite lattice, which generalizes Rota's crosscut theorem. For the classical M\"obius function, both Euler's totient function and its Dirichlet inverse, and the reciprocal of the Riemann zeta function we obtain new expansions involving the greatest common divisor resp. least common multiple. We finally establish an even broader generalization of Whitney's broken circuit theorem in the context of convex geometries (antimatroids).Comment: 18 page

    Beta Invariant and Chromatic Uniqueness of Wheels

    Get PDF
    A graph G is chromatically unique if its chromatic polynomial completely determines the graph. An n-spoked wheel, Wn, is shown to be chromatically unique when n ≥ 4 is even [S.-J. Xu and N.-Z. Li, The chromaticity of wheels, Discrete Math. 51 (1984) 207–212]. When n is odd, this problem is still open for n ≥ 15 since 1984, although it was shown by di erent researchers that the answer is no for n = 5, 7, yes for n = 3, 9, 11, 13, and unknown for other odd n. We use the beta invariant of matroids to prove that if M is a 3-connected matroid such that |E(M)| = |E(Wn)| and β (M) = β (M(Wn)), where β (M) is the beta invariant of M, then M ≅ M(Wn). As a consequence, if G is a 3-connected graph such that the chromatic (or flow) polynomial of G equals to the chromatic (or flow) polynomial of a wheel, then G is isomorphic to the wheel. The examples for n = 3, 5 show that the 3-connectedness condition may not be dropped. We also give a splitting formula for computing the beta invariants of general parallel connection of two matroids as well as the 3-sum of two binary matroids. This generalizes the corresponding result of Brylawski [A combinatorial model for series-parallel networks, Trans. Amer. Math. Soc. 154 (1971) 1–22]

    A tight relation between series--parallel graphs and bipartite distance hereditary graphs

    Get PDF
    Bandelt and Mulder’s structural characterization of bipartite distance hereditary graphs asserts that such graphs can be built inductively starting from a single vertex and by re17 peatedly adding either pendant vertices or twins (i.e., vertices with the same neighborhood as an existing one). Dirac and Duffin’s structural characterization of 2–connected series–parallel graphs asserts that such graphs can be built inductively starting from a single edge by adding either edges in series or in parallel. In this paper we give an elementary proof that the two constructions are the same construction when bipartite graphs are viewed as the fundamental graphs of a graphic matroid. We then apply the result to re-prove known results concerning bipartite distance hereditary graphs and series–parallel graphs and to provide a new class of polynomially-solvable instances for the integer multi-commodity flow of maximum valu

    Weighted interlace polynomials

    Full text link
    The interlace polynomials introduced by Arratia, Bollobas and Sorkin extend to invariants of graphs with vertex weights, and these weighted interlace polynomials have several novel properties. One novel property is a version of the fundamental three-term formula q(G)=q(G-a)+q(G^{ab}-b)+((x-1)^{2}-1)q(G^{ab}-a-b) that lacks the last term. It follows that interlace polynomial computations can be represented by binary trees rather than mixed binary-ternary trees. Binary computation trees provide a description of q(G)q(G) that is analogous to the activities description of the Tutte polynomial. If GG is a tree or forest then these "algorithmic activities" are associated with a certain kind of independent set in GG. Three other novel properties are weighted pendant-twin reductions, which involve removing certain kinds of vertices from a graph and adjusting the weights of the remaining vertices in such a way that the interlace polynomials are unchanged. These reductions allow for smaller computation trees as they eliminate some branches. If a graph can be completely analyzed using pendant-twin reductions then its interlace polynomial can be calculated in polynomial time. An intuitively pleasing property is that graphs which can be constructed through graph substitutions have vertex-weighted interlace polynomials which can be obtained through algebraic substitutions.Comment: 11 pages (v1); 20 pages (v2); 27 pages (v3); 26 pages (v4). Further changes may be made before publication in Combinatorics, Probability and Computin

    Domination Invariant of a Diameter Constrained Network Reliability Model

    Get PDF
    Let G=(V,E) be a digraph with a distinguished set of terminal vertices K in V and a vertex s in K. We define the s,K-diameter of G as the maximum distance between s and any of vertices of K. If the arcs fail randomly and independently with known probabilities (vertices are always operational), the Diameter-constrained s,K-terminal reliability of G, R_\{s,K\}(G,D) is defined as the probability that surviving arcs span a subgraph whose s,K-diameter does not exceed D. The Diameter-constrained network reliability is a special case of coherent system models, where the domination invariant has played an important role, both theoretically and for developing algorithms for reliability computation. In this work, we completely characterize the domination of diameter-constrained network models, giving a simple rule for computing its value: if the digraph either has an irrelevant edge, includes a dicycle or includes a dipath from ss to a node in K longer than D, its domination is 0; otherwise, its domination is -1 to the power |E|-|V|+1

    Applications of ordered weights in information transmission

    Get PDF
    This dissertation is devoted to a study of a class of linear codes related to a particular metric space that generalizes the Hamming space in that the metric function is defined by a partial order on the set of coordinates of the vector. We begin with developing combinatorial and linear-algebraic aspects of linear ordered codes. In particular, we define multivariate rank enumerators for linear codes and show that they form a natural set of invariants in the study of the duality of linear codes. The rank enumerators are further shown to be connected to the shape distributions of linear codes, and enable us to give a simple proof of a MacWilliams-like theorem for the ordered case. We also pursue the connection between linear codes and matroids in the ordered case and show that the rank enumerator can be thought of as an instance of the classical matroid invariant called the Tutte polynomial. Finally, we consider the distributions of support weights of ordered codes and their expression via the rank enumerator. Altogether, these results generalize a group of well-known results for codes in the Hamming space to the ordered case. Extending the research in the first part, we define simple probabilistic channel models that are in a certain sense matched to the ordered distance, and prove several results related to performance of linear codes on such channels. In particular, we define ordered wire-tap channels and establish several results related to the use of linear codes for reliable and secure transmission in such channel models. In the third part of this dissertation we study polar coding schemes for channels with nonbinary input alphabets. We construct a family of linear codes that achieve the capacity of a nonbinary symmetric discrete memoryless channel with input alphabet of size q=2^r, r=2,3,.... A new feature of the coding scheme that arises in the nonbinary case is related to the emergence of several extremal configurations for the polarized data symbols. We establish monotonicity properties of the configurations and use them to show that total transmission rate approaches the symmetric capacity of the channel. We develop these results to include the case of ``controlled polarization'' under which the data symbols polarize to any predefined set of extremal configurations. We also outline an application of this construction to data encoding in video sequences of the MPEG-2 and H.264/MPEG-4 standards

    Subject Index Volumes 1–200

    Get PDF

    Proceedings of the 10th Japanese-Hungarian Symposium on Discrete Mathematics and Its Applications

    Get PDF

    Malaysian bilateral trade relations and economic growth

    Get PDF
    This paper examines the structure and trends of Malaysian bilateral exports and imports and then investigates whether these bilateral exports and imports have caused Malaysian economic growth. Although the structure of Malaysia’s trade has changed quite significantly over the last three decades, the direction of Malaysia’s trade remains generally the same. Broadly, ASEAN, the EU, East Asia, the US and Japan continue to be the Malaysia’s major trading partners. The Granger causality tests have shown that it is the bilateral imports that have caused economic growth in Malaysia rather than the bilateral exports

    Exchange rate misalignments in ASEAN-5 countries

    Get PDF
    The purpose of this paper is to estimate the exchange rate misalignments for Indonesia, Malaysia, Philippines, Singapore and Thailand before the currency crisis. By employing the sticky-price monetary exchange rate model in the environment of vector error-correction, the results indicate that the Indonesia rupiah, Malaysian ringgit, Philippines peso and Singapore dollar were overvalued before the currency crisis while Thai baht was undervalued on the eve of the crisis. However, they suffered modest misalignment. Therefore, little evidence of exchange misalignment is found to exist in 1997:2. In particular, Indonesia rupiah, Malaysia ringgit, Philippines peso and Singapore dollar were only overvalued about 1 to 4 percent against US dollar while the Thai baht was only 2 percent undervalued against US dollar
    corecore