Formally Self-Dual Codes Related to Type II Codes

Size: px
Start display at page:

Download "Formally Self-Dual Codes Related to Type II Codes"

Transcription

1 Formally Self-Dual Codes Related to Type II Codes Koichi Betsumiya Graduate School of Mathematics Nagoya University Nagoya , Japan and Masaaki Harada Department of Mathematical Sciences Yamagata University Yamagata , Japan March 17, 2000 Abstract It is known that shadows play an important role in the study of self-dual codes. In this note, we give constructions of formally self-dual codes using self-dual codes and their shadows. We introduce a class of binary formally self-dual codes related to extremal Type II codes. A binary formally self-dual [24, 12, 7] code is obtained from the extended Golay code. It is shown that there is a unique binary [24, 12, 7] code with dual distance 7, up to equivalence. Keywords: Formally self-dual codes, Type II codes and codes over Z 2k. 1 Introduction Shadows play an important role in the study of self-dual codes. Shadows of binary Type I codes were introduced by Conway and Sloane [3]. They are used to determine upper bounds on the minimum weights of binary Type I codes. Brualdi and Pless [2] gave constructions This work was partially supported by the Grant-in-Aid for Scientific Research (No ), the Ministry of Education, Science, Sports and Culture, Japan, and the Sumitomo Foundation (No ), Japan. 1

2 of binary self-dual codes of lengths n + 2 and n + 4 from Type I codes of length n and their shadows by investigating orthogonality relations between the four cosets of the doubly-even subcode C 0 of a given Type I code C into C 0. Recently Type II codes codes over the ring Z 2k of integers modulo 2k have been introduced in [1] together with shadows for Type I codes over Z 2k. Shadows of Type I codes over Z 2k are widely studied in [5]. For example, shadows are used in [5] in order to construct larger self-dual codes as a generalization of the constructions in [2]. In this note, we study formally self-dual codes over Z 2k constructed from Type I codes with shadows. In Section 3, we give constructions of formally self-dual codes using self-dual codes and their shadows. In Section 4, we introduce a class of binary formally self-dual codes related to extremal Type II codes. In particular, we give the weight enumerator of a formally self-dual code related to an extremal Type II [72, 36, 16] code. The existence of an extremal Type II [72, 36, 16] code is a long-standing open problem. A binary formally self-dual [24, 12, 7] code is obtained from the extended Golay code. In Section 5, it is shown that there is a unique binary [24, 12, 7] code with dual distance 7, up to equivalence. 2 Self-Dual Codes and Shadows We give definitions for self-dual codes over Z 2k (see [1] for a complete description). The case k = 1 is usual binary codes. A code C of length n over Z 2k (or a Z 2k -code of length n) is a Z 2k -submodule of Z n 2k where Z 2k is the ring of the integers modulo 2k. The Hamming weight wt H (x) of a vector x in Z n 2k is the number of non-zero components. The Euclidean weight wt E (x) of a vector x = (x 1, x 2,..., x n ) is n i=1 min{x 2 i, (2k x i ) 2 }. The symmetrized weight enumerator of C is defined as swe C (x 0, x 1,..., x k ) = c C x n 0(c) 0 x n 1(c) 1 x n k 1(c) k 1 x n k(c) k, where n 0 (c), n 1 (c),..., n k 1 (c), n k (c) are the numbers of 0, ±1,..., ±(k 1), k components of c, respectively. For x = (x 1,..., x n ) and y = (y 1,..., y n ), we define the inner-product of x and y in Z n 2k by x y = x 1 y x n y n. The dual code C of C is defined as C = {x Z n 2k x y = 0 for all y C}. C is self-dual if C = C. Self-dual Z 2k -codes with the property that all Euclidean weights are divisible by 4k are called Type II [1]. A self-dual code which is not Type II is called Type I. A code C is a formally self-dual code with respect to the symmetrized weight enumerator if swe C (x 1, x 2,..., x k ) = swe C (x 1, x 2,..., x k ). A self-dual code is formally self-dual. Let C be a Type I Z 2k -code of length n. Let C 0 be the subcode of codewords whose Euclidean weights are a multiple of 4k. C 0 is a subcode of index 2 in C. Let C 2 be the unique nontrivial coset of C 0 into C. Then C0 can be written as a union of cosets of C 0 : 2

3 C0 = C 0 C 2 C 1 C 3. The shadow of C is defined to be S = C 1 C 3 (see [1], [5] for the details). Throughout this note, C i s (i = 0, 1, 2, 3) denote the cosets for C. 3 Construction of Formally Self-Dual Codes In this section, we give constructions of formally self-dual codes over Z 2k using self-dual codes and their shadows. Lemma 3.1 (Dougherty et al. [5]) Suppose that C is a Type I code over Z 2k of length n. If n 2 (mod 4) then Table 1 holds where the symbol in position (i, j) means that x y = 0 and the symbol means that x y = k for any vector x C i and any vector y C j. Table 1: Orthogonality Relations C 0 C 1 C 2 C 3 C 0 C 1 C 2 C 3 Proposition 3.2 Suppose that there are Type I Z 2k -codes C and D of lengths n and m, respectively where n m 2 (mod 4). If swe C1 (x 1, x 2,..., x k ) = swe C3 (x 1, x 2,..., x k ) and swe D1 (x 1, x 2,..., x k ) = swe D3 (x 1, x 2,..., x k ) then the code E = (C 0, D 0 ) (C 1, D 1 ) (C 3, D 2 ) (C 2, D 3 ), is a formally self-dual code with respect to the symmetrized weight enumerator, that is, swe E (x 1, x 2,..., x k ) = swe E (x 1, x 2,..., x k ). Proof. It follows from Lemma 3.1 that the dual code of E is E has symmetrized weight enumerator (C 0, D 0 ) (C 2, D 1 ) (C 1, D 2 ) (C 3, D 3 ). swe E (x 0, x 1,..., x k ) = swe C0 (x 0, x 1,..., x k ) swe D0 (x 0, x 1,..., x k ) +swe C1 (x 0, x 1,..., x k ) swe D1 (x 0, x 1,..., x k ) +swe C3 (x 0, x 1,..., x k ) swe D2 (x 0, x 1,..., x k ) +swe C2 (x 0, x 1,..., x k ) swe D3 (x 0, x 1,..., x k ). 3

4 From the assumption on the symmetrized weight enumerators, E is formally self-dual. Remark. Since (x 1, y 1 ) (C 1, D 1 ) is not orthogonal to (x 3, y 2 ) (C 3, D 2 ), the code E is not self-dual. We consider some Type I codes over Z 4 as an example of the above construction. Examples of binary codes are given in the next section. Let A 1 be the self-dual Z 4 -code of length 1 with generator matrix (2). Let C and D be the direct sums of two and six copies of A 1. It turns out that C 0 = {(00), (22)}, C 2 = (20) + C 0, C 1 = (11) + C 0 and C 3 = (31) + C 0. Similarly, D 0 = {2(a 1, a 2, a 3, a 4, a 5, a 6 ) a i {0, 1}, 6 i=1 a i 0 (mod 2)}, D 2 = (200000) + D 0, D 1 = (111111) + D 0 and D 3 = (311111) + D 0. Hence we have swe C1 (x 0, x 1, x 2 ) = swe C3 (x 0, x 1, x 2 ) and swe D1 (x 0, x 1, x 2 ) = swe D3 (x 0, x 1, x 2 ). By the above proposition, a formally self-dual code of length 8 with respect to the symmetrized weight enumerator is constructed. The formally self-dual code has the following symmetrized weight enumerator x x x 0 x 2 1x x 0 x 6 1x x 2 0x x 3 0x 2 1x x 4 0x x 5 0x 2 1x x 6 0x x 8 0. Let C and D be codes over Z 2k such that the symmetrized weight enumerators of C and D are the same. The two lattices from C and D by Construction A (see [1] for the details) have the identical theta series. Thus the lattice from a formally self-dual code over Z 2k with respect to the symmetrized weight enumerator has the same theta series as the dual lattice. The lattice constructed from the above formally self-dual code over Z 4 has the following theta series q 3/ q q 5/ q 7/ q 4 +, which is the same as the dual lattice. 4 Binary Formally Self-Dual Codes In this section, we give constructions of binary formally self-dual codes. From now on, all codes are binary. These give a class of such codes related to extremal Type II codes. Proposition 4.1 Let C be a binary Type I code of length n with the shadow S = C 1 C 3 where C 0 is the subcode of doubly-even vectors of C. (1) Suppose that n 2 (mod 4). Let C be the code of length n+2 obtained by extending C0 as follows: (0, 0, C 0 ), (1, 0, C 2 ), (0, 1, C 1 ), (1, 1, C 3 ). If W C1 (y) = W C3 (y) then C is a formally self-dual code with weight enumerator W C0 (y) + y(w C1 (y) + W C2 (y)) + y 2 W C3 (y), 4

5 where W D (y) denotes the (Hamming) weight enumerator of D. (2) Suppose that n 0 (mod 4). Let C be the code of length n + 4 generated by (1, 0, 1, 1, 0,..., 0) and the following extension of C 0 : (0, 0, 0, 0, C 0 ), (1, 1, 0, 0, C 2 ), (1, 1, 1, 0, C 1 ), (0, 0, 1, 0, C 3 ). Then C is a formally self-dual code with weight enumerator (1 + y 3 )W C0 (y) + (y 2 + y 3 )(W C1 (y) + W C2 (y)) + (y + y 2 )W C3 (y). Proof. (1) is a special case of Proposition 3.2. The orthogonality relations between the cosets C 0, C 1, C 2 and C 3 were determined in [2, Tables I and II] (see also Table 1). It follows from the relation that D is the dual code of C. Since W C1 (y) = W C3 (y), C is formally self-dual. Similarly, the dual code of C is the code generated by (1, 1, 0, 1, 0,..., 0) and the following extension of C 0 : (0, 0, 0, 0, C 0 ), (0, 0, 1, 1, C 2 ), (0, 1, 1, 1, C 1 ), (0, 1, 0, 0, C 3 ). Thus C is formally self-dual. By the above construction, we give a class of formally self-dual codes related to extremal Type II codes. Corollary 4.2 If there is an extremal Type II [8k, 4k, 4[k/3]+4] code then there is a formally self-dual [8k, 4k, d 4[k/3] + 3] code. Proof. Let B be an extremal Type II [8k, 4k, 4[k/3] + 4] code. Let C be a Type I child of B, that is C is constructed from B by subtracting. Then C is a Type I [8k 2, 4k 1, 4[k/3]+2] code and the shadow has minimum weight 4[k/3] + 3. It follows from [6, Theorem 3.5] that W C1 (y) = W C3 (y). By Proposition 4.1, C is a formally self-dual code of length 8k. The minimum weight of C is min{d(c 2 ) + 1, d(c 3 ) + 1} where d(d) denotes the minimum weight of D. Since d(c 2 ) = 4[k/3] + 2 and d(c 3 ) 4[k/3] + 3, the minimum weight of C is greater than or equal to 4[k/3] + 3. If the above Type II code has generator matrix of the form ( I 4k A ) then the above formally self-dual code has the following generator matrix A.. I 4k

6 Recently Rains [7] shows that the minimum weight of a self-dual code of length n is bounded by 4 [ ] n , if n 22 (mod 24), d 4 [ ] n , otherwise, and that any self-dual [24l, 12l, 4l + 4] code is Type II. By Theorem 3.6 in [6], the child D of an extremal Type II [24l, 12l, 4l + 4] code has the shadow of minimum weight 4l + 3 exactly. Thus the formally self-dual code has smaller minimum weight than an extremal Type II code of the same length, but it has larger minimum weight than any Type I code of the same length. These cases are investigated. l = 1: The weight enumerators of a Type I code and its shadow are given in [3] for lengths up to 64 and length 72. Let C be the unique Type I [22, 11, 6] code, then W C (y) = y y y 10 +, W C1 (y) = 176y y Then C is a formally self-dual [24, 12, 7] code with weight enumerator y y y 9 +. l = 2: Let C be a Type I [48, 24, 10] code, then W C (y) = y y y 14 + W C1 (y) = 3312y y The extended quadratic residue code QR 48 of length 48 is only one known extremal Type II code of length 48. By the above corollary, a formally self-dual [48, 24, 11] code C 48 is constructed from QR 48. The weight enumerator of C 48 is y y y Note that only formally self-dual codes with minimum weight 10 which are not self-dual are previously known. l = 3: Let C be a Type I [70, 35, 14] code. The existence of such a code is not known. The next case is length 72 and related to an extremal Type II [72, 36, 16] code. The existence of an extremal Type II [72, 36, 16] code is a long-standing open problem. A formally self-dual code F 72 of length 72 is constructed from a Type I [70, 35, 14] code C by Proposition 4.1. The weight distribution of F 72 is listed in Table 2. Note that the weight distributions of C and its shadow are given in [4]. Thus we have the following: Corollary 4.3 If there is no linear [72, 36, 15] code with weight distribution given in Table 2, then there is no extremal Type II [72, 36, 16] code. 6

7 Table 2: The weight distribution of F 72 Weight Frequency Weight Frequency [24, 12, 7] Codes with Dual Distance 7 In the previous section, a formally self-dual [24, 12, 7] code is constructed from the extended Golay code. In this section, it is shown that up to equivalence there is a unique [24, 12, 7] code with dual distance 7, that is, the minimum weight of the dual code is 7. We describe how [24, 12, 7] codes with dual distance 7 were classified. We say that a (1, 0)-matrix M is bi-sorted if the rows and columns of M are sorted as binary integers. Lemma 5.1 Any code is equivalent to a code with a generator matrix of the form ( I, A ) where A is bi-sorted. Proof. It is sufficient to show that we obtain a bi-sorted matrix from a given matrix X, by permuting the rows and columns. First we fix some notations used in this proof. Let X be an m n (1, 0)-matrix, x i and x i be the i-th row and column vector of X, respectively. Moreover let z = (z 1, z 2,..., z n ) be a (1, 0)-vector of length n. We may suppose without loss of generality that X = (x p1 x p 1+q 1 x p2 x p 2+q2 x pt x pt+qt ) such that x p k+i = x p k+i+1 for 0 i q k 1, 1 k t, and x p k x p k+1 for 1 k t 1. Let wx (z) k denote the number of non-zero 7

8 components of (z pk, z pk +1,..., z pk +q k ), and w X (z) denote (w X (z) 1, w X (z) 2,..., w X (z) t ). Let R k = {p k, p k + 1,..., p k + q k } and R X = {R 1, R 2,..., R t }. Let X (k) be the k n sub-matrix obtained from the first k rows of X. Suppose that X (k) is bi-sorted and w X(k) (x 1 ) w X(k) (x 2 ) w X(k) (x n ) on the lexicographic order for a fixed k. By permuting columns fixing X (k), X implies X where the each block of x k+1 in R X(k) is (0,..., 0, 1,..., 1). Then it is easy to see that X (k+1) is bi-sorted. Finally, by permuting the rows {k + 2, k + 3,..., n} of X, we obtain a matrix satisfying the assumption for k + 1 from X. By induction, the result follows. Every [24, 12] code is equivalent to a code with generator matrix of the form ( I, A ) where A is a bi-sorted (1, 0)-matrix. Thus we only need to consider the set of bi-sorted (1, 0)-matrices A, rather than the set of generator matrices. The set of bi-sorted matrices A was constructed, row by row, using a back-tracking algorithm under the condition that the first row is ( ) since the minimum weight is 7. Then our computer search shows that there are distinct 602 [24, 12, 7] codes under the condition the dual distance is 7. The C program, which generates the corresponding matrices, is available at Note that the codes have the same weight enumerator as the formally self-dual code of length 24 given in the previous section. Finally, we verified that all the codes are equivalent by Magma. Proposition 5.2 There is a unique [24, 12, 7] code C 24 with dual distance 7, up to equivalence. Remark. Since C 24 is equivalent to the formally self-dual [24, 12, 7] code given in the previous section, the automorphism group is the Mathieu group M 22. Finally we remark that [24, 12, 7] codes are not unique without the assumption that the dual distance is 7. Let B be a matrix obtained by changing a column of A to the all-zero column vector where ( I, A ) is a generator matrix of the extended Golay code. Then ( I, B ) generates a [24, 12, 7] code with dual distance 1. References [1] E. Bannai, S.T. Dougherty, M. Harada and M. Oura, Type II codes, even unimodular lattices, invariant rings, IEEE Trans. Inform. Theory 45 (1999) pp [2] R.A. Brualdi and V.S. Pless, Weight enumerators of self-dual codes, IEEE Trans. Inform. Theory 37 (1991) pp [3] J.H. Conway and N.J.A. Sloane, A new upper bound on the minimal distance of selfdual codes, IEEE Trans. Inform. Theory 36 (1990) pp

9 [4] S.T. Dougherty and M. Harada, New extremal self-dual codes of length 68, IEEE Trans. Inform. Theory 45 (1999) pp [5] S.T. Dougherty, M. Harada and P. Solé, Shadow lattices and shadow codes, Discrete Math., (to appear). [6] G.T. Kennedy and V.S. Pless, A coding theoretic approach to extending designs, Discrete Math. 142 (1995) pp [7] E. Rains, Shadow bounds for self-dual codes, IEEE Trans. Inform. Theory 44 (1998) pp

The Extended Quadratic Residue Code is the only (48; 24; 12) Self-Dual Doubly-Even Code

The Extended Quadratic Residue Code is the only (48; 24; 12) Self-Dual Doubly-Even Code Brock University Department of Computer Science The Extended Quadratic Residue Code is the only (48; 24; 12) Self-Dual Doubly-Even Code Sheridan K. Houghten, C.W.H. Lam, L.H. Thiel, and J.A. Parker Technical

More information

Construction C : an inter-level coded version of Construction C

Construction C : an inter-level coded version of Construction C Construction C : an inter-level coded version of Construction C arxiv:1709.06640v2 [cs.it] 27 Dec 2017 Abstract Besides all the attention given to lattice constructions, it is common to find some very

More information

Graph Adjacency Matrix Automata Joshua Abbott, Phyllis Z. Chinn, Tyler Evans, Allen J. Stewart Humboldt State University, Arcata, California

Graph Adjacency Matrix Automata Joshua Abbott, Phyllis Z. Chinn, Tyler Evans, Allen J. Stewart Humboldt State University, Arcata, California Graph Adjacency Matrix Automata Joshua Abbott, Phyllis Z. Chinn, Tyler Evans, Allen J. Stewart Humboldt State University, Arcata, California Abstract We define a graph adjacency matrix automaton (GAMA)

More information

1 Elementary number theory

1 Elementary number theory Math 215 - Introduction to Advanced Mathematics Spring 2019 1 Elementary number theory We assume the existence of the natural numbers and the integers N = {1, 2, 3,...} Z = {..., 3, 2, 1, 0, 1, 2, 3,...},

More information

A Reduction of Conway s Thrackle Conjecture

A Reduction of Conway s Thrackle Conjecture A Reduction of Conway s Thrackle Conjecture Wei Li, Karen Daniels, and Konstantin Rybnikov Department of Computer Science and Department of Mathematical Sciences University of Massachusetts, Lowell 01854

More information

392D: Coding for the AWGN Channel Wednesday, March 21, 2007 Stanford, Winter 2007 Handout #26. Final exam solutions

392D: Coding for the AWGN Channel Wednesday, March 21, 2007 Stanford, Winter 2007 Handout #26. Final exam solutions 92D: Coding for the AWGN Channel Wednesday, March 2, 27 Stanford, Winter 27 Handout #26 Problem F. (8 points) (Lexicodes) Final exam solutions In this problem, we will see that a simple greedy algorithm

More information

Math Introduction to Advanced Mathematics

Math Introduction to Advanced Mathematics Math 215 - Introduction to Advanced Mathematics Number Theory Fall 2017 The following introductory guide to number theory is borrowed from Drew Shulman and is used in a couple of other Math 215 classes.

More information

How Do More Golay Sequences Arise?

How Do More Golay Sequences Arise? How Do More Golay Sequences Arise? Frank Fiedler Jonathan Jedwab May 13, 2005 (revised May 17, 2006) Abstract In 1999 Davis and Jedwab gave a direct construction of Golay complementary sequences over Z

More information

CHAPTER 8. Copyright Cengage Learning. All rights reserved.

CHAPTER 8. Copyright Cengage Learning. All rights reserved. CHAPTER 8 RELATIONS Copyright Cengage Learning. All rights reserved. SECTION 8.3 Equivalence Relations Copyright Cengage Learning. All rights reserved. The Relation Induced by a Partition 3 The Relation

More information

New Constructions of Non-Adaptive and Error-Tolerance Pooling Designs

New Constructions of Non-Adaptive and Error-Tolerance Pooling Designs New Constructions of Non-Adaptive and Error-Tolerance Pooling Designs Hung Q Ngo Ding-Zhu Du Abstract We propose two new classes of non-adaptive pooling designs The first one is guaranteed to be -error-detecting

More information

A geometric non-existence proof of an extremal additive code

A geometric non-existence proof of an extremal additive code A geometric non-existence proof of an extremal additive code Jürgen Bierbrauer Department of Mathematical Sciences Michigan Technological University Stefano Marcugini and Fernanda Pambianco Dipartimento

More information

Calculation of extended gcd by normalization

Calculation of extended gcd by normalization SCIREA Journal of Mathematics http://www.scirea.org/journal/mathematics August 2, 2018 Volume 3, Issue 3, June 2018 Calculation of extended gcd by normalization WOLF Marc, WOLF François, LE COZ Corentin

More information

Tiling Rectangles with Gaps by Ribbon Right Trominoes

Tiling Rectangles with Gaps by Ribbon Right Trominoes Open Journal of Discrete Mathematics, 2017, 7, 87-102 http://www.scirp.org/journal/ojdm ISSN Online: 2161-7643 ISSN Print: 2161-7635 Tiling Rectangles with Gaps by Ribbon Right Trominoes Premalatha Junius,

More information

9.5 Equivalence Relations

9.5 Equivalence Relations 9.5 Equivalence Relations You know from your early study of fractions that each fraction has many equivalent forms. For example, 2, 2 4, 3 6, 2, 3 6, 5 30,... are all different ways to represent the same

More information

On the Relationships between Zero Forcing Numbers and Certain Graph Coverings

On the Relationships between Zero Forcing Numbers and Certain Graph Coverings On the Relationships between Zero Forcing Numbers and Certain Graph Coverings Fatemeh Alinaghipour Taklimi, Shaun Fallat 1,, Karen Meagher 2 Department of Mathematics and Statistics, University of Regina,

More information

LATIN SQUARES AND THEIR APPLICATION TO THE FEASIBLE SET FOR ASSIGNMENT PROBLEMS

LATIN SQUARES AND THEIR APPLICATION TO THE FEASIBLE SET FOR ASSIGNMENT PROBLEMS LATIN SQUARES AND THEIR APPLICATION TO THE FEASIBLE SET FOR ASSIGNMENT PROBLEMS TIMOTHY L. VIS Abstract. A significant problem in finite optimization is the assignment problem. In essence, the assignment

More information

Homework #5 Solutions Due: July 17, 2012 G = G = Find a standard form generator matrix for a code equivalent to C.

Homework #5 Solutions Due: July 17, 2012 G = G = Find a standard form generator matrix for a code equivalent to C. Homework #5 Solutions Due: July 7, Do the following exercises from Lax: Page 4: 4 Page 34: 35, 36 Page 43: 44, 45, 46 4 Let C be the (5, 3) binary code with generator matrix G = Find a standard form generator

More information

Discrete Mathematics Lecture 4. Harper Langston New York University

Discrete Mathematics Lecture 4. Harper Langston New York University Discrete Mathematics Lecture 4 Harper Langston New York University Sequences Sequence is a set of (usually infinite number of) ordered elements: a 1, a 2,, a n, Each individual element a k is called a

More information

Lecture 12 March 4th

Lecture 12 March 4th Math 239: Discrete Mathematics for the Life Sciences Spring 2008 Lecture 12 March 4th Lecturer: Lior Pachter Scribe/ Editor: Wenjing Zheng/ Shaowei Lin 12.1 Alignment Polytopes Recall that the alignment

More information

AXIOMS FOR THE INTEGERS

AXIOMS FOR THE INTEGERS AXIOMS FOR THE INTEGERS BRIAN OSSERMAN We describe the set of axioms for the integers which we will use in the class. The axioms are almost the same as what is presented in Appendix A of the textbook,

More information

Chapter 2. Splitting Operation and n-connected Matroids. 2.1 Introduction

Chapter 2. Splitting Operation and n-connected Matroids. 2.1 Introduction Chapter 2 Splitting Operation and n-connected Matroids The splitting operation on an n-connected binary matroid may not yield an n-connected binary matroid. In this chapter, we provide a necessary and

More information

Lecture 22 Tuesday, April 10

Lecture 22 Tuesday, April 10 CIS 160 - Spring 2018 (instructor Val Tannen) Lecture 22 Tuesday, April 10 GRAPH THEORY Directed Graphs Directed graphs (a.k.a. digraphs) are an important mathematical modeling tool in Computer Science,

More information

arxiv: v2 [math.co] 11 May 2016

arxiv: v2 [math.co] 11 May 2016 THREE-PILE SHARING NIM AND THE QUADRATIC TIME WINNING STRATEGY arxiv:1506.06961v2 [math.co] 11 May 2016 NHAN BAO HO Abstract. We study a variant of 3-pile Nim in which a move consists of taking tokens

More information

LOW-density parity-check (LDPC) codes are widely

LOW-density parity-check (LDPC) codes are widely 1460 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 53, NO 4, APRIL 2007 Tree-Based Construction of LDPC Codes Having Good Pseudocodeword Weights Christine A Kelley, Member, IEEE, Deepak Sridhara, Member,

More information

arxiv: v1 [cs.it] 9 Feb 2009

arxiv: v1 [cs.it] 9 Feb 2009 On the minimum distance graph of an extended Preparata code C. Fernández-Córdoba K. T. Phelps arxiv:0902.1351v1 [cs.it] 9 Feb 2009 Abstract The minimum distance graph of an extended Preparata code P(m)

More information

Introduction to Sets and Logic (MATH 1190)

Introduction to Sets and Logic (MATH 1190) Introduction to Sets and Logic () Instructor: Email: shenlili@yorku.ca Department of Mathematics and Statistics York University Dec 4, 2014 Outline 1 2 3 4 Definition A relation R from a set A to a set

More information

The Connectivity and Diameter of Second Order Circuit Graphs of Matroids

The Connectivity and Diameter of Second Order Circuit Graphs of Matroids Graphs and Combinatorics (2012) 28:737 742 DOI 10.1007/s00373-011-1074-6 ORIGINAL PAPER The Connectivity and Diameter of Second Order Circuit Graphs of Matroids Jinquan Xu Ping Li Hong-Jian Lai Received:

More information

On the construction of nested orthogonal arrays

On the construction of nested orthogonal arrays isid/ms/2010/06 September 10, 2010 http://wwwisidacin/ statmath/eprints On the construction of nested orthogonal arrays Aloke Dey Indian Statistical Institute, Delhi Centre 7, SJSS Marg, New Delhi 110

More information

The Matrix-Tree Theorem and Its Applications to Complete and Complete Bipartite Graphs

The Matrix-Tree Theorem and Its Applications to Complete and Complete Bipartite Graphs The Matrix-Tree Theorem and Its Applications to Complete and Complete Bipartite Graphs Frankie Smith Nebraska Wesleyan University fsmith@nebrwesleyan.edu May 11, 2015 Abstract We will look at how to represent

More information

Generell Topologi. Richard Williamson. May 6, 2013

Generell Topologi. Richard Williamson. May 6, 2013 Generell Topologi Richard Williamson May 6, 2013 1 8 Thursday 7th February 8.1 Using connectedness to distinguish between topological spaces I Proposition 8.1. Let (, O ) and (Y, O Y ) be topological spaces.

More information

Unlabeled equivalence for matroids representable over finite fields

Unlabeled equivalence for matroids representable over finite fields Unlabeled equivalence for matroids representable over finite fields November 16, 2012 S. R. Kingan Department of Mathematics Brooklyn College, City University of New York 2900 Bedford Avenue Brooklyn,

More information

Non-zero disjoint cycles in highly connected group labelled graphs

Non-zero disjoint cycles in highly connected group labelled graphs Non-zero disjoint cycles in highly connected group labelled graphs Ken-ichi Kawarabayashi Paul Wollan Abstract Let G = (V, E) be an oriented graph whose edges are labelled by the elements of a group Γ.

More information

4&5 Binary Operations and Relations. The Integers. (part I)

4&5 Binary Operations and Relations. The Integers. (part I) c Oksana Shatalov, Spring 2016 1 4&5 Binary Operations and Relations. The Integers. (part I) 4.1: Binary Operations DEFINITION 1. A binary operation on a nonempty set A is a function from A A to A. Addition,

More information

Know the Well-ordering principle: Any set of positive integers which has at least one element contains a smallest element.

Know the Well-ordering principle: Any set of positive integers which has at least one element contains a smallest element. The first exam will be on Wednesday, September 22, 2010. The syllabus will be sections 1.1 and 1.2 in Lax, and the number theory handout found on the class web site, plus the handout on the method of successive

More information

arxiv: v1 [math.co] 24 Aug 2009

arxiv: v1 [math.co] 24 Aug 2009 SMOOTH FANO POLYTOPES ARISING FROM FINITE PARTIALLY ORDERED SETS arxiv:0908.3404v1 [math.co] 24 Aug 2009 TAKAYUKI HIBI AND AKIHIRO HIGASHITANI Abstract. Gorenstein Fano polytopes arising from finite partially

More information

Introduction to Graph Theory

Introduction to Graph Theory Introduction to Graph Theory George Voutsadakis 1 1 Mathematics and Computer Science Lake Superior State University LSSU Math 351 George Voutsadakis (LSSU) Introduction to Graph Theory August 2018 1 /

More information

Math 302 Introduction to Proofs via Number Theory. Robert Jewett (with small modifications by B. Ćurgus)

Math 302 Introduction to Proofs via Number Theory. Robert Jewett (with small modifications by B. Ćurgus) Math 30 Introduction to Proofs via Number Theory Robert Jewett (with small modifications by B. Ćurgus) March 30, 009 Contents 1 The Integers 3 1.1 Axioms of Z...................................... 3 1.

More information

Vertex Magic Total Labelings of Complete Graphs 1

Vertex Magic Total Labelings of Complete Graphs 1 Vertex Magic Total Labelings of Complete Graphs 1 Krishnappa. H. K. and Kishore Kothapalli and V. Ch. Venkaiah Centre for Security, Theory, and Algorithmic Research International Institute of Information

More information

LATIN SQUARES AND TRANSVERSAL DESIGNS

LATIN SQUARES AND TRANSVERSAL DESIGNS LATIN SQUARES AND TRANSVERSAL DESIGNS *Shirin Babaei Department of Mathematics, University of Zanjan, Zanjan, Iran *Author for Correspondence ABSTRACT We employ a new construction to show that if and if

More information

Graph Theory S 1 I 2 I 1 S 2 I 1 I 2

Graph Theory S 1 I 2 I 1 S 2 I 1 I 2 Graph Theory S I I S S I I S Graphs Definition A graph G is a pair consisting of a vertex set V (G), and an edge set E(G) ( ) V (G). x and y are the endpoints of edge e = {x, y}. They are called adjacent

More information

REGULAR GRAPHS OF GIVEN GIRTH. Contents

REGULAR GRAPHS OF GIVEN GIRTH. Contents REGULAR GRAPHS OF GIVEN GIRTH BROOKE ULLERY Contents 1. Introduction This paper gives an introduction to the area of graph theory dealing with properties of regular graphs of given girth. A large portion

More information

Interval-Vector Polytopes

Interval-Vector Polytopes Interval-Vector Polytopes Jessica De Silva Gabriel Dorfsman-Hopkins California State University, Stanislaus Dartmouth College Joseph Pruitt California State University, Long Beach July 28, 2012 Abstract

More information

The Further Mathematics Support Programme

The Further Mathematics Support Programme Degree Topics in Mathematics Groups A group is a mathematical structure that satisfies certain rules, which are known as axioms. Before we look at the axioms, we will consider some terminology. Elements

More information

arxiv: v4 [math.co] 25 Apr 2010

arxiv: v4 [math.co] 25 Apr 2010 QUIVERS OF FINITE MUTATION TYPE AND SKEW-SYMMETRIC MATRICES arxiv:0905.3613v4 [math.co] 25 Apr 2010 AHMET I. SEVEN Abstract. Quivers of finite mutation type are certain directed graphs that first arised

More information

Introduction III. Graphs. Motivations I. Introduction IV

Introduction III. Graphs. Motivations I. Introduction IV Introduction I Graphs Computer Science & Engineering 235: Discrete Mathematics Christopher M. Bourke cbourke@cse.unl.edu Graph theory was introduced in the 18th century by Leonhard Euler via the Königsberg

More information

On Jeśmanowicz Conjecture Concerning Pythagorean Triples

On Jeśmanowicz Conjecture Concerning Pythagorean Triples Journal of Mathematical Research with Applications Mar., 2015, Vol. 35, No. 2, pp. 143 148 DOI:10.3770/j.issn:2095-2651.2015.02.004 Http://jmre.dlut.edu.cn On Jeśmanowicz Conjecture Concerning Pythagorean

More information

Extended and generalized weight enumerators

Extended and generalized weight enumerators Extended and generalized weight enumerators Relinde Jurrius Ruud Pellikaan Eindhoven University of Technology, The Netherlands International Workshop on Coding and Cryptography, 2009 1/23 Outline Previous

More information

QED Q: Why is it called the triangle inequality? A: Analogue with euclidean distance in the plane: picture Defn: Minimum Distance of a code C:

QED Q: Why is it called the triangle inequality? A: Analogue with euclidean distance in the plane: picture Defn: Minimum Distance of a code C: Lecture 3: Lecture notes posted online each week. Recall Defn Hamming distance: for words x = x 1... x n, y = y 1... y n of the same length over the same alphabet, d(x, y) = {1 i n : x i y i } i.e., d(x,

More information

Some Results on the Incidence Coloring Number of Chordal Rings *

Some Results on the Incidence Coloring Number of Chordal Rings * Some Results on the Incidence Coloring Number of Chordal Rings * Kung-Fu Ding, Kung-Jui Pai,+ and Ro-Yu Wu Department of Industrial Engineering and Management, Ming Chi University of Technology, New Taipei

More information

2.2 Set Operations. Introduction DEFINITION 1. EXAMPLE 1 The union of the sets {1, 3, 5} and {1, 2, 3} is the set {1, 2, 3, 5}; that is, EXAMPLE 2

2.2 Set Operations. Introduction DEFINITION 1. EXAMPLE 1 The union of the sets {1, 3, 5} and {1, 2, 3} is the set {1, 2, 3, 5}; that is, EXAMPLE 2 2.2 Set Operations 127 2.2 Set Operations Introduction Two, or more, sets can be combined in many different ways. For instance, starting with the set of mathematics majors at your school and the set of

More information

Chapter 3: Theory of Modular Arithmetic 1. Chapter 3: Theory of Modular Arithmetic

Chapter 3: Theory of Modular Arithmetic 1. Chapter 3: Theory of Modular Arithmetic Chapter 3: Theory of Modular Arithmetic 1 Chapter 3: Theory of Modular Arithmetic SECTION A Introduction to Congruences By the end of this section you will be able to deduce properties of large positive

More information

Polyominoes and Polyiamonds as Fundamental Domains for Isohedral Tilings of Crystal Class D 2

Polyominoes and Polyiamonds as Fundamental Domains for Isohedral Tilings of Crystal Class D 2 Symmetry 2011, 3, 325-364; doi:10.3390/sym3020325 OPEN ACCESS symmetry ISSN 2073-8994 www.mdpi.com/journal/symmetry Article Polyominoes and Polyiamonds as Fundamental Domains for Isohedral Tilings of Crystal

More information

Trail Making Game. Hyun Sung Jun Jaehoon Kim Sang-il Oum Department of Mathematical Sciences KAIST, Daejeon, , Republic of Korea.

Trail Making Game. Hyun Sung Jun Jaehoon Kim Sang-il Oum Department of Mathematical Sciences KAIST, Daejeon, , Republic of Korea. Trail Making Game Hyun Sung Jun Jaehoon Kim Sang-il Oum Department of Mathematical Sciences KAIST, Daejeon, 305-701, Republic of Korea. May 7, 2009 Abstract Trail Making is a game played on a graph with

More information

Polyominoes and Polyiamonds as Fundamental Domains for Isohedral Tilings of Crystal Class D 2

Polyominoes and Polyiamonds as Fundamental Domains for Isohedral Tilings of Crystal Class D 2 Symmetry 2011, 3, 325-364; doi:10.3390/sym3020325 OPEN ACCESS symmetry ISSN 2073-8994 www.mdpi.com/journal/symmetry Article Polyominoes and Polyiamonds as Fundamental Domains for Isohedral Tilings of Crystal

More information

Algorithmic number theory Cryptographic hardness assumptions. Table of contents

Algorithmic number theory Cryptographic hardness assumptions. Table of contents Algorithmic number theory Cryptographic hardness assumptions Foundations of Cryptography Computer Science Department Wellesley College Fall 2016 Table of contents Introduction Primes and Divisibility Modular

More information

Is there a McLaughlin geometry?

Is there a McLaughlin geometry? Is there a McLaughlin geometry? Leonard H. Soicher School of Mathematical Sciences Queen Mary, University of London Mile End Road, London E1 4NS, UK email: L.H.Soicher@qmul.ac.uk February 9, 2006 Dedicated

More information

Trees. 3. (Minimally Connected) G is connected and deleting any of its edges gives rise to a disconnected graph.

Trees. 3. (Minimally Connected) G is connected and deleting any of its edges gives rise to a disconnected graph. Trees 1 Introduction Trees are very special kind of (undirected) graphs. Formally speaking, a tree is a connected graph that is acyclic. 1 This definition has some drawbacks: given a graph it is not trivial

More information

Minimum Number of Palettes in Edge Colorings

Minimum Number of Palettes in Edge Colorings Graphs and Combinatorics (2014) 30:619 626 DOI 10.1007/s00373-013-1298-8 ORIGINAL PAPER Minimum Number of Palettes in Edge Colorings Mirko Horňák Rafał Kalinowski Mariusz Meszka Mariusz Woźniak Received:

More information

arxiv:cs/ v1 [cs.it] 8 Feb 2007

arxiv:cs/ v1 [cs.it] 8 Feb 2007 Permutation Decoding and the Stopping Redundancy Hierarchy of Linear Block Codes Thorsten Hehn, Olgica Milenkovic, Stefan Laendner, Johannes B. Huber Institute for Information Transmission, University

More information

A note on the number of edges guaranteeing a C 4 in Eulerian bipartite digraphs

A note on the number of edges guaranteeing a C 4 in Eulerian bipartite digraphs A note on the number of edges guaranteeing a C 4 in Eulerian bipartite digraphs Jian Shen Department of Mathematics Southwest Texas State University San Marcos, TX 78666 email: js48@swt.edu Raphael Yuster

More information

SEQUENCES, MATHEMATICAL INDUCTION, AND RECURSION

SEQUENCES, MATHEMATICAL INDUCTION, AND RECURSION CHAPTER 5 SEQUENCES, MATHEMATICAL INDUCTION, AND RECURSION Copyright Cengage Learning. All rights reserved. SECTION 5.5 Application: Correctness of Algorithms Copyright Cengage Learning. All rights reserved.

More information

EDGE-COLOURED GRAPHS AND SWITCHING WITH S m, A m AND D m

EDGE-COLOURED GRAPHS AND SWITCHING WITH S m, A m AND D m EDGE-COLOURED GRAPHS AND SWITCHING WITH S m, A m AND D m GARY MACGILLIVRAY BEN TREMBLAY Abstract. We consider homomorphisms and vertex colourings of m-edge-coloured graphs that have a switching operation

More information

On Soft Topological Linear Spaces

On Soft Topological Linear Spaces Republic of Iraq Ministry of Higher Education and Scientific Research University of AL-Qadisiyah College of Computer Science and Formation Technology Department of Mathematics On Soft Topological Linear

More information

CSE 20 DISCRETE MATH. Winter

CSE 20 DISCRETE MATH. Winter CSE 20 DISCRETE MATH Winter 2017 http://cseweb.ucsd.edu/classes/wi17/cse20-ab/ Final exam The final exam is Saturday March 18 8am-11am. Lecture A will take the exam in GH 242 Lecture B will take the exam

More information

MATH 423 Linear Algebra II Lecture 17: Reduced row echelon form (continued). Determinant of a matrix.

MATH 423 Linear Algebra II Lecture 17: Reduced row echelon form (continued). Determinant of a matrix. MATH 423 Linear Algebra II Lecture 17: Reduced row echelon form (continued). Determinant of a matrix. Row echelon form A matrix is said to be in the row echelon form if the leading entries shift to the

More information

Revisiting the bijection between planar maps and well labeled trees

Revisiting the bijection between planar maps and well labeled trees Revisiting the bijection between planar maps and well labeled trees Daniel Cosmin Porumbel September 1, 2014 Abstract The bijection between planar graphs and well labeled trees was published by Cori and

More information

The simplex method and the diameter of a 0-1 polytope

The simplex method and the diameter of a 0-1 polytope The simplex method and the diameter of a 0-1 polytope Tomonari Kitahara and Shinji Mizuno May 2012 Abstract We will derive two main results related to the primal simplex method for an LP on a 0-1 polytope.

More information

The strong chromatic number of a graph

The strong chromatic number of a graph The strong chromatic number of a graph Noga Alon Abstract It is shown that there is an absolute constant c with the following property: For any two graphs G 1 = (V, E 1 ) and G 2 = (V, E 2 ) on the same

More information

On the Balanced Case of the Brualdi-Shen Conjecture on 4-Cycle Decompositions of Eulerian Bipartite Tournaments

On the Balanced Case of the Brualdi-Shen Conjecture on 4-Cycle Decompositions of Eulerian Bipartite Tournaments Electronic Journal of Graph Theory and Applications 3 (2) (2015), 191 196 On the Balanced Case of the Brualdi-Shen Conjecture on 4-Cycle Decompositions of Eulerian Bipartite Tournaments Rafael Del Valle

More information

EC500. Design of Secure and Reliable Hardware. Lecture 9. Mark Karpovsky

EC500. Design of Secure and Reliable Hardware. Lecture 9. Mark Karpovsky EC500 Design of Secure and Reliable Hardware Lecture 9 Mark Karpovsky 1 1 Arithmetical Codes 1.1 Detection and Correction of errors in arithmetical channels (adders, multipliers, etc) Let = 0,1,,2 1 and

More information

Computing the Minimum Hamming Distance for Z 2 Z 4 -Linear Codes

Computing the Minimum Hamming Distance for Z 2 Z 4 -Linear Codes Computing the Minimum Hamming Distance for Z 2 Z 4 -Linear Codes Marta Pujol and Mercè Villanueva Combinatorics, Coding and Security Group (CCSG) Universitat Autònoma de Barcelona (UAB) VIII JMDA, Almería

More information

Characterizing Finite Frobenius Rings Via Coding Theory

Characterizing Finite Frobenius Rings Via Coding Theory Characterizing Finite Frobenius Rings Via Coding Theory Jay A. Wood Department of Mathematics Western Michigan University http://homepages.wmich.edu/ jwood/ Algebra and Communications Seminar University

More information

Balanced Degree-Magic Labelings of Complete Bipartite Graphs under Binary Operations

Balanced Degree-Magic Labelings of Complete Bipartite Graphs under Binary Operations Iranian Journal of Mathematical Sciences and Informatics Vol. 13, No. 2 (2018), pp 1-13 DOI: 10.7508/ijmsi.2018.13.001 Balanced Degree-Magic Labelings of Complete Bipartite Graphs under Binary Operations

More information

GENERALIZED TRACEABILITY CODES

GENERALIZED TRACEABILITY CODES U.P.B. Sci. Bull., Series A, Vol. 78, Iss. 2, 2016 ISSN 1223-7027 GENERALIZED TRACEABILITY CODES Majid MAZROOEI 1, Ali ZAGHIAN 2 In this paper, we introduce generalizations of frameproof, secure frameproof,

More information

Definition: A graph G = (V, E) is called a tree if G is connected and acyclic. The following theorem captures many important facts about trees.

Definition: A graph G = (V, E) is called a tree if G is connected and acyclic. The following theorem captures many important facts about trees. Tree 1. Trees and their Properties. Spanning trees 3. Minimum Spanning Trees 4. Applications of Minimum Spanning Trees 5. Minimum Spanning Tree Algorithms 1.1 Properties of Trees: Definition: A graph G

More information

Rectangular Matrix Multiplication Revisited

Rectangular Matrix Multiplication Revisited JOURNAL OF COMPLEXITY, 13, 42 49 (1997) ARTICLE NO. CM970438 Rectangular Matrix Multiplication Revisited Don Coppersmith IBM Research, T. J. Watson Research Center, Yorktown Heights, New York 10598 Received

More information

Math 5593 Linear Programming Lecture Notes

Math 5593 Linear Programming Lecture Notes Math 5593 Linear Programming Lecture Notes Unit II: Theory & Foundations (Convex Analysis) University of Colorado Denver, Fall 2013 Topics 1 Convex Sets 1 1.1 Basic Properties (Luenberger-Ye Appendix B.1).........................

More information

Properly Colored Paths and Cycles in Complete Graphs

Properly Colored Paths and Cycles in Complete Graphs 011 ¼ 9 È È 15 ± 3 ¾ Sept., 011 Operations Research Transactions Vol.15 No.3 Properly Colored Paths and Cycles in Complete Graphs Wang Guanghui 1 ZHOU Shan Abstract Let K c n denote a complete graph on

More information

Math 776 Graph Theory Lecture Note 1 Basic concepts

Math 776 Graph Theory Lecture Note 1 Basic concepts Math 776 Graph Theory Lecture Note 1 Basic concepts Lectured by Lincoln Lu Transcribed by Lincoln Lu Graph theory was founded by the great Swiss mathematician Leonhard Euler (1707-178) after he solved

More information

Combinatorial Enumeration of Partitions of a Convex Polygon

Combinatorial Enumeration of Partitions of a Convex Polygon 1 2 3 47 6 23 11 Journal of Integer Sequences, Vol. 18 2015, Article 15.9.4 Combinatorial Enumeration of Partitions of a Convex Polygon Dong Zhang and Dongyi Wei Peking University Beijing 100871 P. R.

More information

Zero forcing propagation time on oriented graphs

Zero forcing propagation time on oriented graphs Zero forcing propagation time on oriented graphs Adam Berliner a, Chassidy Bozeman b, Steve Butler b,, Minerva Catral c, Leslie Hogben b,d, Brenda Kroschel e, Jephian Chin-Hung Lin b, Nathan Warnberg f,

More information

A Method for Construction of Orthogonal Arrays 1

A Method for Construction of Orthogonal Arrays 1 Eighth International Workshop on Optimal Codes and Related Topics July 10-14, 2017, Sofia, Bulgaria pp. 49-54 A Method for Construction of Orthogonal Arrays 1 Iliya Bouyukliev iliyab@math.bas.bg Institute

More information

SCHOOL OF ENGINEERING & BUILT ENVIRONMENT. Mathematics. Numbers & Number Systems

SCHOOL OF ENGINEERING & BUILT ENVIRONMENT. Mathematics. Numbers & Number Systems SCHOOL OF ENGINEERING & BUILT ENVIRONMENT Mathematics Numbers & Number Systems Introduction Numbers and Their Properties Multiples and Factors The Division Algorithm Prime and Composite Numbers Prime Factors

More information

Progress Towards the Total Domination Game 3 4 -Conjecture

Progress Towards the Total Domination Game 3 4 -Conjecture Progress Towards the Total Domination Game 3 4 -Conjecture 1 Michael A. Henning and 2 Douglas F. Rall 1 Department of Pure and Applied Mathematics University of Johannesburg Auckland Park, 2006 South Africa

More information

On Shanks Algorithm for Modular Square Roots

On Shanks Algorithm for Modular Square Roots On Shanks Algorithm for Modular Square Roots Jan-Christoph Schlage-Puchta 29 May 2003 Abstract Let p be a prime number, p = 2 n q +1, where q is odd. D. Shanks described an algorithm to compute square

More information

Sparse Hypercube 3-Spanners

Sparse Hypercube 3-Spanners Sparse Hypercube 3-Spanners W. Duckworth and M. Zito Department of Mathematics and Statistics, University of Melbourne, Parkville, Victoria 3052, Australia Department of Computer Science, University of

More information

Multi-matrices and arithmetical operations with multi-matrices

Multi-matrices and arithmetical operations with multi-matrices 1 Multi-matrices and arithmetical operations with multi-matrices Constantin Scheau National College M. Viteazul, Ploiesti, Romania c_scheau@yahoo.com Abstract. The multi-space structure has been defined

More information

DISCRETE MATHEMATICS

DISCRETE MATHEMATICS DISCRETE MATHEMATICS WITH APPLICATIONS THIRD EDITION SUSANNA S. EPP DePaul University THOIVISON * BROOKS/COLE Australia Canada Mexico Singapore Spain United Kingdom United States CONTENTS Chapter 1 The

More information

1 Elementary number theory

1 Elementary number theory 1 Elementary number theory We assume the existence of the natural numbers and the integers N = {1, 2, 3,...} Z = {..., 3, 2, 1, 0, 1, 2, 3,...}, along with their most basic arithmetical and ordering properties.

More information

ON THE EMPTY CONVEX PARTITION OF A FINITE SET IN THE PLANE**

ON THE EMPTY CONVEX PARTITION OF A FINITE SET IN THE PLANE** Chin. Ann. of Math. 23B:(2002),87-9. ON THE EMPTY CONVEX PARTITION OF A FINITE SET IN THE PLANE** XU Changqing* DING Ren* Abstract The authors discuss the partition of a finite set of points in the plane

More information

Lecture 1. 1 Notation

Lecture 1. 1 Notation Lecture 1 (The material on mathematical logic is covered in the textbook starting with Chapter 5; however, for the first few lectures, I will be providing some required background topics and will not be

More information

Slides for Faculty Oxford University Press All rights reserved.

Slides for Faculty Oxford University Press All rights reserved. Oxford University Press 2013 Slides for Faculty Assistance Preliminaries Author: Vivek Kulkarni vivek_kulkarni@yahoo.com Outline Following topics are covered in the slides: Basic concepts, namely, symbols,

More information

FOUR EDGE-INDEPENDENT SPANNING TREES 1

FOUR EDGE-INDEPENDENT SPANNING TREES 1 FOUR EDGE-INDEPENDENT SPANNING TREES 1 Alexander Hoyer and Robin Thomas School of Mathematics Georgia Institute of Technology Atlanta, Georgia 30332-0160, USA ABSTRACT We prove an ear-decomposition theorem

More information

Ramsey s Theorem on Graphs

Ramsey s Theorem on Graphs Ramsey s Theorem on Graphs 1 Introduction Exposition by William Gasarch Imagine that you have 6 people at a party. We assume that, for every pair of them, either THEY KNOW EACH OTHER or NEITHER OF THEM

More information

Component Connectivity of Generalized Petersen Graphs

Component Connectivity of Generalized Petersen Graphs March 11, 01 International Journal of Computer Mathematics FeHa0 11 01 To appear in the International Journal of Computer Mathematics Vol. 00, No. 00, Month 01X, 1 1 Component Connectivity of Generalized

More information

Hashing. Yufei Tao. Department of Computer Science and Engineering Chinese University of Hong Kong

Hashing. Yufei Tao. Department of Computer Science and Engineering Chinese University of Hong Kong Department of Computer Science and Engineering Chinese University of Hong Kong In this lecture, we will revisit the dictionary search problem, where we want to locate an integer v in a set of size n or

More information

Testing Isomorphism of Strongly Regular Graphs

Testing Isomorphism of Strongly Regular Graphs Spectral Graph Theory Lecture 9 Testing Isomorphism of Strongly Regular Graphs Daniel A. Spielman September 26, 2018 9.1 Introduction In the last lecture we saw how to test isomorphism of graphs in which

More information

THE COMMUTATOR SUBGROUPS OF THE ALTERNATING KNOT GROUPS

THE COMMUTATOR SUBGROUPS OF THE ALTERNATING KNOT GROUPS PROCEEDINGS OF THE AMERICAN MATHEMATICAL SOCIETY Volume 28, No. 1, April 1971 THE COMMUTATOR SUBGROUPS OF THE ALTERNATING KNOT GROUPS KUNIO MURASUGI Abstract. The aim of this paper is to show that the

More information

CUT VERTICES IN ZERO-DIVISOR GRAPHS OF FINITE COMMUTATIVE RINGS

CUT VERTICES IN ZERO-DIVISOR GRAPHS OF FINITE COMMUTATIVE RINGS CUT VERTICES IN ZERO-DIVISOR GRAPHS OF FINITE COMMUTATIVE RINGS M. AXTELL, N. BAETH, AND J. STICKLES Abstract. A cut vertex of a connected graph is a vertex whose removal would result in a graph having

More information

A generalization of zero divisor graphs associated to commutative rings

A generalization of zero divisor graphs associated to commutative rings Proc. Indian Acad. Sci. (Math. Sci.) (2018) 128:9 https://doi.org/10.1007/s12044-018-0389-0 A generalization of zero divisor graphs associated to commutative rings M. AFKHAMI 1, A. ERFANIAN 2,, K. KHASHYARMANESH

More information