100 results on '"Discrete Mathematics and Combinatorics"'
Search Results
2. Generative Stochastic Modeling of Strongly Nonlinear Flows with Non-Gaussian Statistics
- Author
-
Arbabi, Hassan, Sapsis, Themistoklis, Arbabi, Hassan, and Sapsis, Themistoklis
- Abstract
Strongly nonlinear flows, which commonly arise in geophysical and engineering turbulence, are characterized by persistent and intermittent energy transfer between various spatial and temporal scales. These systems are difficult to model and analyze due to combination of high dimensionality and uncertainty, and there has been much interest in obtaining reduced models, in the form of stochastic closures, that can replicate their non-Gaussian statistics in many dimensions. Here, we propose a data-driven framework to model stationary chaotic dynamical systems through nonlinear transformations and a set of decoupled stochastic differential equations (SDEs). Specifically, we use optimal transport to find a transformation from the distribution of time-series data to a multiplicative reference probability measure such as the standard normal distribution. Then we find the set of decoupled SDEs that admit the reference measure as the invariant measure, and also closely match the spectrum of the transformed data. As such, this framework represents the chaotic time series as the evolution of a stochastic system observed through the lens of a nonlinear map. We demonstrate the application of this framework in Lorenz-96 system, a 10-dimensional model of high-Reynolds cavity flow, and reanalysis climate data. These examples show that SDE models generated by this framework can reproduce the non-Gaussian statistics of systems with moderate dimensions (e.g. 10 and more), and predict super-Gaussian tails that are not readily available from little training data. These findings suggest that this class of models provide an efficient hypothesis space for learning strongly nonlinear flows from small amounts of data.
- Published
- 2024
3. WASTE TREATMENT FACILITY LOCATION FOR HOTEL CHAINS
- Author
-
Santos-Peñate, Dolores R., Suárez-Vega, Rafael R., Florido de la Nuez, Carmen, Santos-Peñate, Dolores R., Suárez-Vega, Rafael R., and Florido de la Nuez, Carmen
- Abstract
Tourism generates huge amounts of waste. About half of the waste generated by hotels is food and garden bio-waste. This bio-waste can be used to make compost and pellets. In turn, pellets can be used as an absorbent material in composters and as an energy source. We consider the problem of locating composting and pellet-making facilities so that the bio-waste generated by a chain of hotels can be managed at or close to the generation points. An optimization model is applied to locate the facilities and allocate the waste and products, and several scenarios are analysed. The study shows that, depending on the transportation, treatment waste and production management costs, the installation of facilities is profitable for the hotel chain.
- Published
- 2023
4. BAYESIAN IDENTIFICATION OF PYROLYSIS MODEL PARAMETERS FOR THERMAL PROTECTION MATERIALS USING AN ADAPTIVE GRADIENT-INFORMED SAMPLING ALGORITHM WITH APPLICATION TO A MARS ATMOSPHERIC ENTRY
- Author
-
UCL - SST/IMMC/TFL - Thermodynamics and fluid mechanics, Coheur, Joffrey, Magin, Thierry E., Chatelain, Philippe, Arnst, Maarten, UCL - SST/IMMC/TFL - Thermodynamics and fluid mechanics, Coheur, Joffrey, Magin, Thierry E., Chatelain, Philippe, and Arnst, Maarten
- Abstract
For space missions involving atmospheric entry, a thermal protection system is essential to shield the spacecraft and its payload from the severe aerothermal loads. Carbon/phenolic composite materials have gained renewed interest to serve as ablative thermal protection materials (TPMs). New experimental data relevant to the pyrolytic decomposition of the phenolic resin used in such carbon/phenolic composite TPMs have recently been published in the literature. In this paper, we infer from these new experimental data an uncertainty-quantified pyrolysis model. We adopt a Bayesian probabilistic approach to account for uncertainties in the model identification. We use an approximate likelihood function involving a weighted distance between the model predictions and the time-dependent experimental data. To sample from the posterior, we use a gradient-informed Markov chain Monte Carlo method, namely, a method based on an Ito stochastic differential equation, with an adaptive selection of the numerical parameters. To select the decomposition mechanisms to be represented in the pyrolysis model, we proceed by progressively increasing the complexity of the pyrolysis model until a satisfactory fit to the data is ultimately obtained. The pyrolysis model thus obtained involves six reactions and has 48 parameters. We demonstrate the use of the identified pyrolysis model in a numerical simulation of heat-shield surface recession in a Martian entry.
- Published
- 2023
5. WASTE TREATMENT FACILITY LOCATION FOR HOTEL CHAINS
- Author
-
Santos-Peñate, Dolores R., Suárez-Vega, Rafael R., Florido de la Nuez, Carmen, Santos-Peñate, Dolores R., Suárez-Vega, Rafael R., and Florido de la Nuez, Carmen
- Abstract
Tourism generates huge amounts of waste. About half of the waste generated by hotels is food and garden bio-waste. This bio-waste can be used to make compost and pellets. In turn, pellets can be used as an absorbent material in composters and as an energy source. We consider the problem of locating composting and pellet-making facilities so that the bio-waste generated by a chain of hotels can be managed at or close to the generation points. An optimization model is applied to locate the facilities and allocate the waste and products, and several scenarios are analysed. The study shows that, depending on the transportation, treatment waste and production management costs, the installation of facilities is profitable for the hotel chain.
- Published
- 2023
6. Double domination in rooted product graphs
- Author
-
Universitat Rovira i Virgili, Cabrera-Martínez, A; Estrada-Moreno, A, Universitat Rovira i Virgili, and Cabrera-Martínez, A; Estrada-Moreno, A
- Abstract
A set D of vertices of a graph G is a double dominating set of G if |N[v]∩D|≥2 for every v∈V(G), where N[v] represents the closed neighbourhood of v. The double domination number of G is the minimum cardinality among all double dominating sets of G. In this article, we show that if G and H are graphs with no isolated vertex, then for any vertex v∈V(H) there are six possible expressions, in terms of domination parameters of the factor graphs, for the double domination number of the rooted product graph G∘vH. Additionally, we characterize the graphs G and H that satisfy each of these expressions.
- Published
- 2023
7. LASSO: Listing All Subset Sums Obediently for Evaluating Unbounded Subset Sums
- Author
-
Burgoyne, Christopher N, Wheeler, Travis J, Burgoyne, Christopher N, and Wheeler, Travis J
- Abstract
In this study we present a novel algorithm, LASSO, for solving the unbounded and bounded subset sum problem. The LASSO algorithm was designed to solve the unbounded SSP quickly and to return all subsets summing to a target sum. As speed was the highest priority, we benchmarked the run time performance of LASSO against implementations of some common approaches to the bounded SSP, as well as the only comparable implementation for solving the unbounded SSP that we could find. In solving the bounded SSP, our algorithm had a significantly faster run time than the competing algorithms when the target sum returned at least one subset. When the target returned no subsets, LASSO had a poorer run time growth rate than the competing algorithms solving bounded subset sum. For solving the USSP LASSO was significantly faster than the only comparable algorithm for this problem, both in run time and run time growth rate.
- Published
- 2022
8. Intercalates in double and triple arrays
- Author
-
Nilson, Tomas and Nilson, Tomas
- Abstract
This paper addresses the question of how intercalates occur in the two known infinite families of triple arrays, the Paley triple arrays constructed in 2005 by Preece et al., and the Triple arrays from difference sets in 2017 by Nilson and Cameron. The main reason for doing this is that the number of such embedded Latin squares is often used when checking whether two arrays are isotopic or not. We determine sharp bounds for the number and density of intercalates for the main subclasses of these families respectively. We also prove the existence of an infinite family of triple arrays in which every two occurrences of an entry lie in an intercalate.
- Published
- 2022
- Full Text
- View/download PDF
9. Intercalates in double and triple arrays
- Author
-
Nilson, Tomas and Nilson, Tomas
- Abstract
This paper addresses the question of how intercalates occur in the two known infinite families of triple arrays, the Paley triple arrays constructed in 2005 by Preece et al., and the Triple arrays from difference sets in 2017 by Nilson and Cameron. The main reason for doing this is that the number of such embedded Latin squares is often used when checking whether two arrays are isotopic or not. We determine sharp bounds for the number and density of intercalates for the main subclasses of these families respectively. We also prove the existence of an infinite family of triple arrays in which every two occurrences of an entry lie in an intercalate.
- Published
- 2022
- Full Text
- View/download PDF
10. Intercalates in double and triple arrays
- Author
-
Nilson, Tomas and Nilson, Tomas
- Abstract
This paper addresses the question of how intercalates occur in the two known infinite families of triple arrays, the Paley triple arrays constructed in 2005 by Preece et al., and the Triple arrays from difference sets in 2017 by Nilson and Cameron. The main reason for doing this is that the number of such embedded Latin squares is often used when checking whether two arrays are isotopic or not. We determine sharp bounds for the number and density of intercalates for the main subclasses of these families respectively. We also prove the existence of an infinite family of triple arrays in which every two occurrences of an entry lie in an intercalate.
- Published
- 2022
- Full Text
- View/download PDF
11. Intercalates in double and triple arrays
- Author
-
Nilson, Tomas and Nilson, Tomas
- Abstract
This paper addresses the question of how intercalates occur in the two known infinite families of triple arrays, the Paley triple arrays constructed in 2005 by Preece et al., and the Triple arrays from difference sets in 2017 by Nilson and Cameron. The main reason for doing this is that the number of such embedded Latin squares is often used when checking whether two arrays are isotopic or not. We determine sharp bounds for the number and density of intercalates for the main subclasses of these families respectively. We also prove the existence of an infinite family of triple arrays in which every two occurrences of an entry lie in an intercalate.
- Published
- 2022
- Full Text
- View/download PDF
12. Intercalates in double and triple arrays
- Author
-
Nilson, Tomas and Nilson, Tomas
- Abstract
This paper addresses the question of how intercalates occur in the two known infinite families of triple arrays, the Paley triple arrays constructed in 2005 by Preece et al., and the Triple arrays from difference sets in 2017 by Nilson and Cameron. The main reason for doing this is that the number of such embedded Latin squares is often used when checking whether two arrays are isotopic or not. We determine sharp bounds for the number and density of intercalates for the main subclasses of these families respectively. We also prove the existence of an infinite family of triple arrays in which every two occurrences of an entry lie in an intercalate.
- Published
- 2022
- Full Text
- View/download PDF
13. The adjacency dimension of graphs
- Author
-
Enginyeria Informàtica i Matemàtiques, Universitat Rovira i Virgili, S Bermudo; JM Rodríguez; JA Rodríguez-Velázquez; JM Sigarreta, Enginyeria Informàtica i Matemàtiques, Universitat Rovira i Virgili, and S Bermudo; JM Rodríguez; JA Rodríguez-Velázquez; JM Sigarreta
- Published
- 2022
14. From Italian domination in lexicographic product graphs to w-domination in graphs
- Author
-
Universitat Rovira i Virgili, Abel Cabrera Martinez; Alejandro Estrada-Moreno; Juan Alberto Rodriguez-Velazquez, Universitat Rovira i Virgili, and Abel Cabrera Martinez; Alejandro Estrada-Moreno; Juan Alberto Rodriguez-Velazquez
- Published
- 2022
15. Protection of Lexicographic Product Graphs
- Author
-
Universitat Rovira i Virgili, Klein DJ; Rodríguez-Velázquez JA, Universitat Rovira i Virgili, and Klein DJ; Rodríguez-Velázquez JA
- Abstract
In this paper, we study the weak Roman domination number and the secure domination number of lexicographic product graphs. In particular, we show that these two parameters coincide for almost all lexicographic product graphs. Furthermore, we obtain tight bounds and closed formulas for these parameters.
- Published
- 2022
16. Greedy Routing in Circulant Networks
- Author
-
Universitat Rovira i Virgili, Perez-Roses, Hebert; Bras-Amoros, Maria; Miguel Serradilla-Merinero, Jose, Universitat Rovira i Virgili, and Perez-Roses, Hebert; Bras-Amoros, Maria; Miguel Serradilla-Merinero, Jose
- Abstract
We address the problem of constructing large circulant networks with given degree and diameter, and efficient routing schemes. First we discuss the theoretical upper bounds and their asymptotics. Then we apply concepts and tools from the change-making problem to efficient routing in circulant graphs. With these tools we investigate some of the families of circulant graphs that have been proposed in the literature, and we construct tables of large circulant graphs and digraphs with efficient routing properties.
- Published
- 2022
17. An Algorithmic Exploration of Gracefully Labeling Cubic Graphs
- Author
-
Clare Kennedy, George and Clare Kennedy, George
- Abstract
The graceful labeling problem is a famous open problem in mathematics and computer science, first described by Alexander Rosa in 1967. The object of the problem is given a graph, is there a way to label the vertices of that graph uniquely with the numbers 0 to m, where m is the size of the graph, such that when its edges are labeled with the absolute differences of the vertex labels, the edges are labeled uniquely? Many different classes of graphs are conjectured to be graceful, the most famous being trees. This paper explores another class of graphs, connected cubic graphs, conjectured to be graceful by El-Zanati and Wannasit (2011), and shows that this is true for cases of graphs with 16 vertices or fewer. To do this, we use a backtracking algorithm to explore cubic graphs and other interesting classes of regular graphs.
- Published
- 2021
18. ON COLORING ORIENTED GRAPHS OF LARGE GIRTH
- Author
-
Morris, Michael and Morris, Michael
- Abstract
Missoula, MT
- Published
- 2021
19. A geometric lower bound on the extension complexity of polytopes based on the f-vector
- Author
-
UCL - SST/ICTM/INMA - Pôle en ingénierie mathématique, UCL - SSH/LIDAM/CORE - Center for operations research and econometrics, Dewez, Julien, Gillis, Nicolas, Glineur, François, UCL - SST/ICTM/INMA - Pôle en ingénierie mathématique, UCL - SSH/LIDAM/CORE - Center for operations research and econometrics, Dewez, Julien, Gillis, Nicolas, and Glineur, François
- Abstract
A linear extension of a polytope is any polytope which can be mapped onto via an affine transformation. The extension complexity of a polytope is the minimum number of facets of any linear extension of this polytope. In general, computing the extension complexity of a given polytope is difficult. The extension complexity is also equal to the nonnegative rank of any slack matrix of the polytope. In this paper, we introduce a new geometric lower bound on the extension complexity of a polytope, i.e., which relies only on the knowledge of some of its geometric characteristics. It is based on the monotone behaviour of the -vector of polytopes under affine maps. We present numerical results showing that this bound can improve upon existing geometric lower bounds, and provide a generalization of this lower bound for the nonnegative rank of any matrix.
- Published
- 2021
20. Riemannian gradient descent methods for graph-regularized matrix completion
- Author
-
UCL - SST/ICTM/INMA - Pôle en ingénierie mathématique, Dong, Shuyu, Absil, Pierre-Antoine, Gallivan, K.A., UCL - SST/ICTM/INMA - Pôle en ingénierie mathématique, Dong, Shuyu, Absil, Pierre-Antoine, and Gallivan, K.A.
- Abstract
Low-rank matrix completion is the problem of recovering the missing entries of a data matrix by using the assumption that the true matrix admits a good low-rank approximation. Much attention has been given recently to exploiting correlations between the column/row entities to improve the matrix completion quality. In this paper, we propose preconditioned gradient descent algorithms for solving the low-rank matrix completion problem with graph Laplacian-based regularizers. Experiments on synthetic data show that our approach achieves significant speedup compared to an existing method based on alternating minimization. Experimental results on real world data also show that our methods provide low-rank solutions of similar quality in comparable or less time than the state-of-the-art method.
- Published
- 2021
21. On a minimum enclosing ball of a collection of linear subspaces
- Author
-
UCL - SST/ICTM/INMA - Pôle en ingénierie mathématique, Marrinan, Tim, Absil, Pierre-Antoine, Gillis, Nicolas, UCL - SST/ICTM/INMA - Pôle en ingénierie mathématique, Marrinan, Tim, Absil, Pierre-Antoine, and Gillis, Nicolas
- Abstract
This paper concerns the minimax center of a collection of linear subspaces. For k-dimensional subspaces of an n-dimensional vector space, this can be cast as finding the center of a minimum enclosing ball on a Grassmann manifold. For subspaces of differing dimension, the setting becomes a disjoint union of Grassmannians rather than a single manifold, and the problem is no longer well-defined. However, natural geometric maps exist between these manifolds with a well-defined notion of distance for the images of the subspaces under the mappings. Solving the problem in this context leads to a candidate minimax center on each of the constituent manifolds, but does not provide intuition about which candidate is the best representation of the data. Additionally, the solutions of different rank are generally not nested so a deflationary approach will not suffice, and the problem must be solved independently on each manifold. We propose an optimization problem parametrized by the rank of the minimax center. The solution is computed with a subgradient algorithm applied to the dual problem. By scaling the objective and penalizing the information lost by the rank-k minimax center, we jointly recover an optimal dimension, ⁎ , and a subspace at the center of the minimum enclosing ball, ⁎ , that best represents the data.
- Published
- 2021
22. On bornological semi-abelian algebras
- Author
-
UCL - SST/ICTM - Institute of Information and Communication Technologies, Electronics and Applied Mathematics, Borceux, Francis, Clementino, Maria Manuel, UCL - SST/ICTM - Institute of Information and Communication Technologies, Electronics and Applied Mathematics, Borceux, Francis, and Clementino, Maria Manuel
- Abstract
If $\Bbb T$ is a semi-abelian algebraic theory, we prove that the category ${\rm Born}^{\Bbb T}$ of bornological $\Bbb T$-algebras is homological with semi-direct products. We give a formal criterion for the representability of actions in ${\rm Born}^{\Bbb T}$ and, for a bornological $\Bbb T$-algebra $X$, we investigate the relation between the representability of actions on $X$ as a $\Bbb T$-algebra and as a bornological $\Bbb T$-algebra. We investigate further the algebraic coherence and the algebraic local cartesian closedness of ${\rm Born}^{\Bbb T}$ and prove in particular that both properties hold in the case of bornological groups.
- Published
- 2021
23. A note on connected greedy edge colouring
- Author
-
Sub Algorithms and Complexity, Algorithms and Complexity, Bonamy, Marthe, Groenland, Carla, Muller, Carole, Narboni, Jonathan, Pekárek, Jakub, Wesolek, Alexandra, Sub Algorithms and Complexity, Algorithms and Complexity, Bonamy, Marthe, Groenland, Carla, Muller, Carole, Narboni, Jonathan, Pekárek, Jakub, and Wesolek, Alexandra
- Published
- 2021
24. Secure domination in rooted product graphs
- Author
-
Universitat Rovira i Virgili, Hernandez-Ortiz, Rangel; Montejano, Luis Pedro; Rodriguez-Velazquez, Juan Alberto, Universitat Rovira i Virgili, and Hernandez-Ortiz, Rangel; Montejano, Luis Pedro; Rodriguez-Velazquez, Juan Alberto
- Abstract
A secure dominating set of a graph G is a dominating set S satisfying that for every vertex v is an element of V(G)\S there exists a neighbour u is an element of S of v such that (S boolean OR {v})\{u} is a dominating set as well. The secure domination number, denoted by gamma(s) (G), is the minimum cardinality among all secure dominating sets of G. This concept was introduced in 2005 by Cockayne et al. and studied further in a number of works. The problem of computing the secure domination number is NP-Hard. This suggests finding the secure domination number for special classes of graphs or obtaining tight bounds on this invariant. The aim of this work is to obtain closed formulas for the secure domination number of rooted product graphs. We show that for any graph G of order n(G) and any graph H with root v, the secure domination number of the rooted product graph G. v H satisfies one of the following three formulas,gamma(s) (G o(nu) H) = n(G)(gamma(s)( H) - 1) + gamma (G), gamma(s)(G omicron(v) H) = n(G)(gamma(s) ( H) - 1) + gamma(s) (G) o(nu) gamma(s) (G o(nu) H) = n(G)gamma(s) (H), where gamma (G) denotes the domination number of G. We also characterize the graphs that satisfy each of these expressions. As a particular case of the study, we derive the corresponding results for corona graphs.
- Published
- 2021
25. A note on double domination in graphs
- Author
-
Universitat Rovira i Virgili, Cabrera-Martínez A; Rodríguez-Velázquez JA, Universitat Rovira i Virgili, and Cabrera-Martínez A; Rodríguez-Velázquez JA
- Abstract
Recently, Haynes, Hedetniemi and Henning published the book Topics in Domination in Graphs, which comprises 16 contributions that present advanced topics in graph domination, featuring open problems, modern techniques, and recent results. One of these contributions is the chapter Multiple Domination, by Hansberg and Volkmann, where they put into context all relevant research results on multiple domination that have been found up to 2020. In this note, we show how to improve some results on double domination that are included in the book.
- Published
- 2021
26. Secure Italian domination in graphs
- Author
-
Universitat Rovira i Virgili, Dettlaff, M.; Lemanska, M.; Rodriguez-Velazquez, J. A., Universitat Rovira i Virgili, and Dettlaff, M.; Lemanska, M.; Rodriguez-Velazquez, J. A.
- Abstract
An Italian dominating function (IDF) on a graph G is a function f : V(G) -> {0, 1, 2} such that for every vertex v with f (v) = 0, the total weight of f assigned to the neighbours of v is at least two, i.e., Sigma(u is an element of G(v)) f (u) >= 2. For any function f : V(G) -> {0, 1, 2} and any pair of adjacent vertices with f (v) = 0 and u with f (u) > 0, the function f(u -> v) is defined by f(u -> v)(v) = 1, f(u -> v)(u) = f (u) - 1 and f(u -> v)(x) = f ( x) whenever x is an element of V(G)\{u, v}. A secure Italian dominating function on a graph G is defined as an IDF f which satisfies that for every vertex v with f (v) = 0, there exists a neighbour u with f (u) > 0 such that f(u -> v) is an IDF. The weight of f is.( f) = Sigma(v is an element of V)(G) f (v). The minimum weight among all secure Italian dominating functions on G is the secure Italian domination number of G. This paper is devoted to initiating the study of the secure Italian domination number of a graph. In particular, we prove that the problem of finding this parameter is NP-hard and we obtain general bounds on it. Moreover, for certain classes of graphs, we obtain closed formulas for this novel parameter.
- Published
- 2021
27. A CONSTRUCTIVE CHARACTERIZATION OF VERTEX COVER ROMAN TREES
- Author
-
Universitat Rovira i Virgili, Cabrera Martinez, Abel; Kuziak, Dorota; Yero, Ismael G., Universitat Rovira i Virgili, and Cabrera Martinez, Abel; Kuziak, Dorota; Yero, Ismael G.
- Abstract
A Roman dominating function on a graph G = (V (G), E (G)) is a function f : V (G) -> {0, 1, 2} satisfying the condition that every vertex u for which f (u) = 0 is adjacent to at least one vertex v for which f (v) = 2. The Roman dominating function f is an outer-independent Roman dominating function on G if the set of vertices labeled with zero under f is an independent set. The outer-independent Roman domination number gamma(oiR) (G) is the minimum weight w(f ) = Sigma(v is an element of V), ((G)) f(v) of any outer-independent Roman dominating function f of G. A vertex cover of a graph G is a set of vertices that covers all the edges of G. The minimum cardinality of a vertex cover is denoted by alpha(G). A graph G is a vertex cover Roman graph if gamma(oiR) (G) = 2 alpha(G). A constructive characterization of the vertex cover Roman trees is given in this article.
- Published
- 2021
28. INDEPENDENT TRANSVERSAL TOTAL DOMINATION VERSUS TOTAL DOMINATION IN TREES
- Author
-
Universitat Rovira i Virgili, Cabrera Martinez, Abel; Peterin, Iztok; Yero, Ismael G., Universitat Rovira i Virgili, and Cabrera Martinez, Abel; Peterin, Iztok; Yero, Ismael G.
- Abstract
A subset of vertices in a graph G is a total dominating set if every vertex in G is adjacent to at least one vertex in this subset. The total domination number of G is the minimum cardinality of any total dominating set in G and is denoted by gamma(t)(G). A total dominating set of G having nonempty intersection with all the independent sets of maximum cardinality in G is an independent transversal total dominating set. The minimum cardinality of any independent transversal total dominating set is denoted by gamma(u) (G). Based on the fact that for any tree T, gamma(t) (T) <= gamma(u) (T) <= gamma(t) (T) + 1, in this work we give several relationship(s) between gamma(u) (T) and gamma(t) (T) for trees T which are leading to classify the trees which are satisfying the equality in these bounds.
- Published
- 2021
29. Closed formulas for the total Roman domination number of lexicographic product graphs
- Author
-
Universitat Rovira i Virgili, Martinez, Abel Cabrera; Rodriguez-Velazquez, Juan Alberto, Universitat Rovira i Virgili, and Martinez, Abel Cabrera; Rodriguez-Velazquez, Juan Alberto
- Abstract
Let G be a graph with no isolated vertex and f: V (G) -> {0, 1, 2} a function. Let V-i = {x is an element of V(G): f(x) = i} for every i is an element of {0, 1, 2}. We say that f is a total Roman dominating function on G if every vertex in V-0 is adjacent to at least one vertex in V-2 and the subgraph induced by V-1 boolean OR V-2 has no isolated vertex. The weight of f is omega(f) = Sigma(v is an element of V(G)) f (v). The minimum weight among all total Roman dominating functions on G is the total Roman domination number of G, denoted by gamma(tR)circle(G). It is known that the general problem of computing gamma(tR)(G) is NP-hard. In this paper, we show that if G is a graph with no isolated vertex and H is a nontrivial graph, then the total Roman domination number of the lexicographic product graph G circle H is given bygamma(tR)(G o H) = {2 gamma t(G) if gamma(H) >= 2,xi(G) if gamma(H) =1,where gamma(H) is the domination number of H, gamma(t)(G) is the total domination number of G and xi(G) is a domination parameter defined on G.
- Published
- 2021
30. Common information, matroid representation, and secret sharing for matroid ports
- Author
-
Universitat Rovira i Virgili, Bamiloshin, Michael; Ben-Efraim, Aner; Farras, Oriol; Padro, Carles, Universitat Rovira i Virgili, and Bamiloshin, Michael; Ben-Efraim, Aner; Farras, Oriol; Padro, Carles
- Abstract
Linear information and rank inequalities as, for instance, Ingleton inequality, are useful tools in information theory and matroid theory. Even though many such inequalities have been found, it seems that most of them remain undiscovered. Improved results have been obtained in recent works by using the properties from which they are derived instead of the inequalities themselves. We apply here this strategy to the classification of matroids according to their representations and to the search for bounds on secret sharing for matroid ports.
- Published
- 2021
31. Local linearizations of rational matrices with application to rational approximations of nonlinear eigenvalue problems
- Author
-
UCL - SST/ICTM/INMA - Pôle en ingénierie mathématique, Dopico, Froilán M., Marcaida, Silvia, Quintana, María C., Van Dooren, Paul, UCL - SST/ICTM/INMA - Pôle en ingénierie mathématique, Dopico, Froilán M., Marcaida, Silvia, Quintana, María C., and Van Dooren, Paul
- Abstract
This paper presents a definition for local linearizations of rational matrices and studies their properties. This definition allows to introduce matrix pencils associated to a rational matrix that preserve its structure of zeros and poles in subsets of any algebraically closed field and also at infinity. This new theory of local linearizations captures and explains rigorously the properties of all the different pencils that have been used from the 1970's until 2020 for computing zeros, poles and eigenvalues of rational matrices. Particular attention is paid to those pencils that have appeared recently in the numerical solution of nonlinear eigenvalue problems through rational approximation.
- Published
- 2020
32. Drinfeld double of quantum groups, tilting modules and $\mathbb Z$-modular data associated to complex reflection groups
- Author
-
UCL - SST/IRMP - Institut de recherche en mathématique et physique, Lacabanne, Abel, UCL - SST/IRMP - Institut de recherche en mathématique et physique, and Lacabanne, Abel
- Abstract
Generalizing Lusztig’s work, Malle has associated to some imprimitive complex reflection group W a set of “unipotent characters”, which are in bijection of the usual unipotent characters of the associated finite reductive group if W is a Weyl group. He also obtained a partition of these characters into families and associated to each family a Z-modular datum. We construct a categorification of some of these data, by studying the category of tilting modules of the Drinfeld double of the quantum enveloping algebra of the Borel of a simple complex Lie algebra. As an application, we obtain a proof of a conjecture by Cuntz at the decategorified level.
- Published
- 2020
33. Target Control of Networked Systems
- Author
-
Francesco Sorrentino, Meeko Oishi, Marios Pattichis, John Russell, Klickstein, Isaac S, Francesco Sorrentino, Meeko Oishi, Marios Pattichis, John Russell, and Klickstein, Isaac S
- Subjects
- Networks
- Abstract
The control of complex networks is an emerging field yet it has already garnered interest from across the scientific disciplines, from robotics to sociology. It has quickly been noticed that many of the classical techniques from controls engineering, while applicable, are not as illuminating as they were for single systems of relatively small dimension. Instead, properties borrowed from graph theory provide equivalent but more practical conditions to guarantee controllability, reachability, observability, and other typical properties of interest to the controls engineer when dealing with large networked systems. This manuscript covers three topics investigated in detail by the author: (i) the role of the choice of target nodes (system outputs) on the control effort, (ii) creating and analyzing graphs with symmetry, and (iii) the relationship between graph structural properties and control effort.
- Published
- 2020
34. Target Control of Networked Systems
- Author
-
Francesco Sorrentino, Meeko Oishi, Marios Pattichis, John Russell, Klickstein, Isaac S, Francesco Sorrentino, Meeko Oishi, Marios Pattichis, John Russell, and Klickstein, Isaac S
- Subjects
- Networks
- Abstract
The control of complex networks is an emerging field yet it has already garnered interest from across the scientific disciplines, from robotics to sociology. It has quickly been noticed that many of the classical techniques from controls engineering, while applicable, are not as illuminating as they were for single systems of relatively small dimension. Instead, properties borrowed from graph theory provide equivalent but more practical conditions to guarantee controllability, reachability, observability, and other typical properties of interest to the controls engineer when dealing with large networked systems. This manuscript covers three topics investigated in detail by the author: (i) the role of the choice of target nodes (system outputs) on the control effort, (ii) creating and analyzing graphs with symmetry, and (iii) the relationship between graph structural properties and control effort.
- Published
- 2020
35. LEXICOGRAPHIC METRIC SPACES: BASIC PROPERTIES AND THE METRIC DIMENSION
- Author
-
Universitat Rovira i Virgili, Alberto Rotdriguez-Velazquez, Juan, Universitat Rovira i Virgili, and Alberto Rotdriguez-Velazquez, Juan
- Abstract
In this article, we introduce the concept of lexicographic metric space and, after discussing some basic properties of these metric spaces, such as completeness, boundedness, compactness and separability, we obtain a formula for the metric dimension of any lexicographic metric space.
- Published
- 2020
36. Isometry-dual flags of AG codes
- Author
-
Universitat Rovira i Virgili, Bras-Amoros, Maria; Duursma, Iwan; Hong, Euijin, Universitat Rovira i Virgili, and Bras-Amoros, Maria; Duursma, Iwan; Hong, Euijin
- Abstract
Consider a complete flag {0} = C-0 < C-1 < center dot center dot center dot < C-n = F-n of one-point AG codes of length n over the finite field F. The codes are defined by evaluating functions with poles at a given point Q in points P-1, ... , P-n distinct from Q. A flag has the isometry-dual property if the given flag and the corresponding dual flag are the same up to isometry. For several curves, including the projective line, Hermitian curves, Suzuki curves, Ree curves, and the Klein curve over the field of eight elements, the maximal flag, obtained by evaluation in all rational points different from the point Q, is self-dual. More generally, we ask whether a flag obtained by evaluation in a proper subset of rational points is isometry-dual. In Geil et al. (2011) it is shown, for a curve of genus g, that a flag of one-point AG codes defined with a subset of n > 2g + 2 rational points is isometry-dual if and only if the last code C-n in the flag is defined with functions of pole order at most n + 2g - 1. Using a different approach, we extend this characterization to all subsets of size n >= 2g + 2. Moreover we show that this is best possible by giving examples of isometry-dual flags with n = 2g + 1 such that Cn is generated by functions of pole order at most n + 2g - 2. We also prove a necessary condition, formulated in terms of maximum sparse ideals of the Weierstrass semigroup of Q, under which a flag of punctured one-point AG codes inherits the isometry-dual property from the original unpunctured flag.
- Published
- 2020
37. Double domination in lexicographic product graphs
- Author
-
Universitat Rovira i Virgili, Cabrera Martínez A; Cabrera García S; Rodríguez-Velázquez JA, Universitat Rovira i Virgili, and Cabrera Martínez A; Cabrera García S; Rodríguez-Velázquez JA
- Abstract
© 2020 Elsevier B.V. In a graph G, a vertex dominates itself and its neighbours. A subset S⊆V(G) is said to be a double dominating set of G if S dominates every vertex of G at least twice. The minimum cardinality among all double dominating sets of G is the double domination number. In this article, we obtain tight bounds and closed formulas for the double domination number of lexicographic product graphs G∘H in terms of invariants of the factor graphs G and H.
- Published
- 2020
38. On the super domination number of graphs
- Author
-
Universitat Rovira i Virgili, Klein DJ; Rodríguez-Velázquez JA; Yi E, Universitat Rovira i Virgili, and Klein DJ; Rodríguez-Velázquez JA; Yi E
- Abstract
© 2020 Azarbaijan Shahid Madani University The open neighborhood of a vertex v of a graph G is the set N(v) consisting of all vertices adjacent to v in G. For D ⊆ V (G), we define D = V (G) \ D. A set D ⊆ V (G) is called a super dominating set of G if for every vertex u ∈ D, there exists v ∈ D such that N(v) ∩ D = {u}. The super domination number of G is the minimum cardinality among all super dominating sets of G. In this paper, we obtain closed formulas and tight bounds for the super domination number of G in terms of several invariants of G. We also obtain results on the super domination number of corona product graphs and Cartesian product graphs.
- Published
- 2020
39. Weierstrass semigroup at m+1 rational points inmaximal curves which cannot be covered by the Hermitian curve
- Author
-
Universitat Rovira i Virgili, Castellanos, Alonso Sepulveda; Bras-Amoros, Maria, Universitat Rovira i Virgili, and Castellanos, Alonso Sepulveda; Bras-Amoros, Maria
- Abstract
We determine the Weierstrass semigroup H(P infinity,P1, horizontal ellipsis ,Pm) at several rational points on the maximal curves which cannot be covered by the Hermitian curve introduced in Tafazolian et al. (J Pure Appl Algebra 220(3):1122-1132, 2016). Furthermore, we present some conditions to find pure gaps. We use this semigroup to obtain AG codes with better relative parameters than comparable one-point AG codes arising from these curves.
- Published
- 2020
40. On the General Randic index of polymeric networks modelled by generalized Sierpinski graphs
- Author
-
Enginyeria Informàtica i Matemàtiques, Universitat Rovira i Virgili, Rodriguez-Velazquez, Juan A, Estrada-Moreno, Alejandro, Enginyeria Informàtica i Matemàtiques, Universitat Rovira i Virgili, Rodriguez-Velazquez, Juan A, and Estrada-Moreno, Alejandro
- Published
- 2019
41. Positivity Among P-Partition Generating Functions of Partially Ordered Sets
- Author
-
Lesnevich, Nate and Lesnevich, Nate
- Abstract
We find necessary and separate sufficient conditions for the difference between two labeled partially ordered set's (poset) partition generating functions to be positive in the fundamental basis. We define the notion of a jump sequence for a poset and show how different conditions on the jump sequences of two posets are necessary for those posets to have an order relation in the fundamental basis. Our sufficient conditions are of two types. First, we show how manipulating a poset's Hasse diagram produces a poset that is greater according to the fundamental basis. Secondly, we also provide tools to explain posets that are constructed by combining other posets in certain ways through the so-called Ur-operation. Finally, we are able to provide both necessary and sufficient conditions for positivity among posets of Greene shape (k,1) and among a subclass of caterpillar posets, and a complete (and graphically pleasing) representation of the order relations between posets of the former type.
- Published
- 2019
42. A New Study of Applying Complexity Theoretical Tools in Algorithm Design
- Author
-
Xu, Shuai and Xu, Shuai
- Abstract
Given n vectors with dimension m in Boolean domain, how to find two vectors whose pairwise Hamming distance is minimum? This problem is known as the Closest Pair Problem. If these vectors are generated uniformly at random except two of them are correlated with Pearson-correlation coefficient, then the problem is called the Light Bulb Problem. In this work, we propose a novel coding-based scheme for the Closest Pair Problem. We design both randomized and deterministic algorithms, which achieve the best-known running time when the length of input vectors m is small and the minimum distance is very small compared to m. When applied to the Light Bulb Problem, our result yields state-of-the-art deterministic running time when the Pearson-correlation coefficient is very large. Specifically, when it is greater than 0.9933, our deterministic algorithm runs faster than the previously best deterministic algorithm (Alman, SOSA 2019).
- Published
- 2019
43. Choose Your Own Adventure: An Analysis of Interactive Gamebooks Using Graph Theory
- Author
-
Adams, D'Andre, Beckelhymer, Daniela, Marr, Alison, Adams, D'Andre, Beckelhymer, Daniela, and Marr, Alison
- Abstract
"BEWARE and WARNING! This book is different from other books. You and YOU ALONE are in charge of what happens in this story." This is the captivating introduction to every book in the interactive novel series, Choose Your Own Adventure (CYOA). Our project uses the mathematical field of graph theory to analyze forty books from the CYOA book series for ages 9-12. We first began by drawing the digraphs of each book. Then we analyzed these digraphs by collecting structural data such as longest path length (i.e. longest story length) and number of vertices with outdegree zero (i.e. number of endings). In this paper we discuss the results of statistical analyses we used to compare books by author, year, and reader preference. We also discuss numerous errors we found in the description of certain books and the publication of others.
- Published
- 2019
44. On the super domination number of lexicographic product graphs
- Author
-
Universitat Rovira i Virgili, Dettlaff, M.; Lemanska, M.; Rodriguez-Velazquez, J. A.; Zuazua, R., Universitat Rovira i Virgili, and Dettlaff, M.; Lemanska, M.; Rodriguez-Velazquez, J. A.; Zuazua, R.
- Published
- 2019
45. On the weak Roman domination number of lexicographic product graphs
- Author
-
Universitat Rovira i Virgili, Valveny, Magdalena; Perez-Roses, Hebert; Rodriguez-Velazquez, Juan A., Universitat Rovira i Virgili, and Valveny, Magdalena; Perez-Roses, Hebert; Rodriguez-Velazquez, Juan A.
- Published
- 2019
46. On the k-metric dimension of metric spaces
- Author
-
Universitat Rovira i Virgili, Beardon, Alan F.; Rodriguez-Velazquez, Juan A., Universitat Rovira i Virgili, and Beardon, Alan F.; Rodriguez-Velazquez, Juan A.
- Published
- 2019
47. Local bounds for the optimal information ratio of secret sharing schemes
- Author
-
Universitat Rovira i Virgili, Farras, Oriol; Ribes-Gonzalez, Jordi; Ricci, Sara, Universitat Rovira i Virgili, and Farras, Oriol; Ribes-Gonzalez, Jordi; Ricci, Sara
- Published
- 2019
48. Voter Preference Structures in Multiple Office Elections
- Author
-
Tran, Tuyet-Anh L and Tran, Tuyet-Anh L
- Abstract
In a multiple office election, a voter's preference for one seat may depend on their prediction of the outcome of another seat. This encourages strategic voting, and in the worst case, no voter ballot matches the final outcome. A subset of seats is separable when a voter's preference on that subset is independent of their preference on the remaining seats. We explore three independent questions. First, we generate the preference for a two-party election whose separable sets are a given collection of subsets which are closed under unions and intersections. Second, we generate the preference for a two-party election whose non-trivial separable sets are two given sets and their intersection. Last, we generate all of the preferences for an election where every subset of seats is separable.
- Published
- 2018
49. Robustness and perturbations of minimal bases II: The case with given row degrees
- Author
-
UCL - SST/ICTM/INMA - Pôle en ingénierie mathématique, Dopico, Froilán M., Van Dooren, Paul, UCL - SST/ICTM/INMA - Pôle en ingénierie mathématique, Dopico, Froilán M., and Van Dooren, Paul
- Abstract
This paper studies generic and perturbation properties inside the linear space of polynomial matrices whose rows have degrees bounded by a given list of natural numbers, which in the particular case is just the set of polynomial matrices with degree at most d. Thus, the results in this paper extend to a much more general setting the results recently obtained in [29] only for polynomial matrices with degree at most d. Surprisingly, most of the properties proved in [29], as well as their proofs, remain to a large extent unchanged in this general setting of row degrees bounded by a list that can be arbitrarily inhomogeneous provided the well-known Sylvester matrices of polynomial matrices are replaced by the new trimmed Sylvester matrices introduced in this paper. The following results are presented, among many others, in this work: (1) generically the polynomial matrices in the considered set are minimal bases with their row degrees exactly equal to , and with right minimal indices differing at most by one and having a sum equal to , and (2), under perturbations, these generic minimal bases are robust and their dual minimal bases can be chosen to vary smoothly.
- Published
- 2018
50. Extensions of the Morse-Hedlund Theorem
- Author
-
Blaisdell, Eben and Blaisdell, Eben
- Abstract
Bi-infinite words are sequences of characters that are infinite forwards and backwards; for example "...ababababab...". The Morse-Hedlund theorem says that a bi-infinite word f repeats itself, in at most n letters, if and only if the number of distinct subwords of length n is at most n. Using the example, "...ababababab...", there are 2 subwords of length 3, namely "aba" and "bab". Since 2 is less than 3, we must have that "...ababababab..." repeats itself after at most 3 letters. In fact it does repeat itself every two letters. Interestingly, there are many extensions of this theorem to multiple dimensions and beyond. We prove a few results in two-dimensions, including a specific partial result of a question known as the Nivat conjecture. We also consider a novel extension to the more general setting of 'group actions', and we prove an optimal analogue of the Morse-Hedlund theorem in this setting.
- Published
- 2018
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.