53 research outputs found

    Fourientations and the Tutte polynomial

    Get PDF
    A fourientation of a graph is a choice for each edge of the graph whether to orient that edge in either direction, leave it unoriented, or biorient it. Fixing a total order on the edges and a reference orientation of the graph, we investigate properties of cuts and cycles in fourientations which give trivariate generating functions that are generalized Tutte polynomial evaluations of the form (k + m)[superscript n−1](k + l)[superscript gT](αk + βl + m/k + m , γ k + l + δm/ k + l) for α, γ ∈ {0, 1, 2} and β, δ ∈ {0, 1}. We introduce an intersection lattice of 64 cut–cycle fourientation classes enumerated by generalized Tutte polynomial evaluations of this form. We prove these enumerations using a single deletion–contraction argument and classify axiomatically the set of fourientation classes to which our deletion–contraction argument applies. This work unifies and extends earlier results for fourientations due to Gessel and Sagan (Electron J Combin 3(2):Research Paper 9, 1996), results for partial orientations due to Backman (Adv Appl Math, forthcoming, 2014. arXiv:1408.3962), and Hopkins and Perkinson (Trans Am Math Soc 368(1):709–725, 2016), as well as results for total orientations due to Stanley (Discrete Math 5:171–178, 1973; Higher combinatorics (Proceedings of NATO Advanced Study Institute, Berlin, 1976). NATO Advanced Study Institute series, series C: mathematical and physical sciences, vol 31, Reidel, Dordrecht, pp 51–62, 1977), Las Vergnas (Progress in graph theory (Proceedings, Waterloo silver jubilee conference 1982), Academic Press, New York, pp 367–380, 1984), Greene and Zaslavsky (Trans Am Math Soc 280(1):97–126, 1983), and Gioan (Eur J Combin 28(4):1351–1366, 2007), which were previously unified by Gioan (2007), Bernardi (Electron J Combin 15(1):Research Paper 109, 2008), and Las Vergnas (Tutte polynomial of a morphism of matroids 6. A multi-faceted counting formula for hyperplane regions and acyclic orientations, 2012. arXiv:1205.5424). We conclude by describing how these classes of fourientations relate to geometric, combinatorial, and algebraic objects including bigraphical arrangements, cycle–cocycle reversal systems, graphic Lawrence ideals, Riemann–Roch theory for graphs, zonotopal algebra, and the reliability polynomial. Keywords: Partial graph orientations, Tutte polynomial, Deletion–contraction, Hyperplane arrangements, Cycle–cocycle reversal system, Chip-firing, G-parking functions, Abelian sandpile model, Riemann–Roch theory for graphs, Lawrence ideals, Zonotopal algebra, Reliability polynomialNational Science Foundation (U.S.) (Grant 1122374

    On the Coupling Time of the Heat-Bath Process for the Fortuin–Kasteleyn Random–Cluster Model

    Get PDF
    We consider the coupling from the past implementation of the random-cluster heat-bath process, and study its random running time, or coupling time. We focus on hypercubic lattices embedded on tori, in dimensions one to three, with cluster fugacity at least one. We make a number of conjectures regarding the asymptotic behaviour of the coupling time, motivated by rigorous results in one dimension and Monte Carlo simulations in dimensions two and three. Amongst our findings, we observe that, for generic parameter values, the distribution of the appropriately standardized coupling time converges to a Gumbel distribution, and that the standard deviation of the coupling time is asymptotic to an explicit universal constant multiple of the relaxation time. Perhaps surprisingly, we observe these results to hold both off criticality, where the coupling time closely mimics the coupon collector's problem, and also at the critical point, provided the cluster fugacity is below the value at which the transition becomes discontinuous. Finally, we consider analogous questions for the single-spin Ising heat-bath process

    Tutte polynomial of pseudofractal scale-free web

    Full text link
    The Tutte polynomial of a graph is a 2-variable polynomial which is quite important in both combinatorics and statistical physics. It contains various numerical invariants and polynomial invariants, such as the number of spanning trees, the number of spanning forests, the number of acyclic orientations, the reliability polynomial, chromatic polynomial and flow polynomial. In this paper, we study and gain recursive formulas for the Tutte polynomial of pseudofractal scale-free web (PSW) which implies logarithmic complexity algorithm is obtained to calculate the Tutte polynomial of PSW although it is NP-hard for general graph. We also obtain the rigorous solution for the the number of spanning trees of PSW by solving the recurrence relations derived from Tutte polynomial, which give an alternative approach for explicitly determining the number of spanning trees of PSW. Further more, we analysis the all-terminal reliability of PSW and compare the results with that of Sierpinski gasket which has the same number of nodes and edges with PSW. In contrast with the well-known conclusion that scale-free networks are more robust against removal of nodes than homogeneous networks (e.g., exponential networks and regular networks). Our results show that Sierpinski gasket (which is a regular network) are more robust against random edge failures than PSW (which is a scale-free network). Whether it is true for any regular networks and scale-free networks, is still a unresolved problem.Comment: 19pages,7figures. arXiv admin note: text overlap with arXiv:1006.533

    A Comparison of Different Approaches to Unravel the Latent Structure within Metabolic Syndrome

    Get PDF
    Background: Exploratory factor analysis is a commonly used statistical technique in metabolic syndrome research to uncover latent structure amongst metabolic variables. The application of factor analysis requires methodological decisions that reflect the hypothesis of the metabolic syndrome construct. These decisions often raise the complexity of the interpretation from the output. We propose two alternative techniques developed from cluster analysis which can achieve a clinically relevant structure, whilst maintaining intuitive advantages of clustering methodology. Methods: Two advanced techniques of clustering in the VARCLUS and matroid methods are discussed and implemented on a metabolic syndrome data set to analyze the structure of ten metabolic risk factors. The subjects were selected from the normative aging study based in Boston, Massachusetts. The sample included a total of 847 men aged between 21 and 81 years who provided complete data on selected risk factors during the period 1987 to 1991. Results: Four core components were identified by the clustering methods. These are labelled obesity, lipids, insulin resistance and blood pressure. The exploratory factor analysis with oblique rotation suggested an overlap of the loadings identified on the insulin resistance and obesity factors. The VARCLUS and matroid analyses separated these components and were able to demonstrate associations between individual risk factors. Conclusions: An oblique rotation can be selected to reflect the clinical concept of a single underlying syndrome, howeve

    Efficient Explicit Constructions of Multipartite Secret Sharing Schemes

    Get PDF
    Multipartite secret sharing schemes are those having a multipartite access structure, in which the set of participants is divided into several parts and all participants in the same part play an equivalent role. Secret sharing schemes for multipartite access structures have received considerable attention due to the fact that multipartite secret sharing can be seen as a natural and useful generalization of threshold secret sharing. This work deals with efficient and explicit constructions of ideal multipartite secret sharing schemes, while most of the known constructions are either inefficient or randomized. Most ideal multipartite secret sharing schemes in the literature can be classified as either hierarchical or compartmented. The main results are the constructions for ideal hierarchical access structures, a family that contains every ideal hierarchical access structure as a particular case such as the disjunctive hierarchical threshold access structure and the conjunctive hierarchical threshold access structure, the constructions for three families of compartmented access structures, and the constructions for two families compartmented access structures with compartments. On the basis of the relationship between multipartite secret sharing schemes, polymatroids, and matroids, the problem of how to construct a scheme realizing a multipartite access structure can be transformed to the problem of how to find a representation of a matroid from a presentation of its associated polymatroid. In this paper, we give efficient algorithms to find representations of the matroids associated to several families of multipartite access structures. More precisely, based on know results about integer polymatroids, for each of those families of access structures above, we give an efficient method to find a representation of the integer polymatroid over some finite field, and then over some finite extension of that field, we give an efficient method to find a presentation of the matroid associated to the integer polymatroid. Finally, we construct ideal linear schemes realizing those families of multipartite access structures by efficient methods

    On the parity of colourings and flows

    Get PDF
    AbstractWe extend a result of Tarsi and show that the chromatic polynomial and flow polynomial evaluated at 1+k are up to sign the same modulo k2 for any integer k such that |k|⩾2

    Random planar graphs

    Get PDF
    We study various properties of the random planar graph Rn, drawn uniformly at random from the class Pn of all simple planar graphs on n labelled vertices. In particular, we show that the probability that Rn is connected is bounded away from 0 and from 1. We also show for example that each positive integer k, with high probability Rn has linearly many vertices of a given degree, in each embedding Rn has linearly many faces of a given size, and Rn has exponentially many automorphisms. © 2004 Elsevier Inc. All rights reserved

    Study for alternative refrigerants: part 1: composition shift in liquid recirculation systems: part 2: a simple prediction method for the condensation heat transfer of alternative refrigerants inside a microfin tube

    Get PDF
    Dottorato di ricerca in fisica tecnicaConsiglio Nazionale delle Ricerche - Biblioteca Centrale - P.le Aldo Moro, 7 Rome; Biblioteca Nazionale Centrale - P.za Cavalleggeri, 1, Florence / CNR - Consiglio Nazionale delle RichercheSIGLEITItal

    Higher matrix-tree theorems and Bernardi polynomial

    No full text
    • …
    corecore