• Title/Summary/Keyword: Complete Graph

Search Result 185, Processing Time 0.022 seconds

EDGE COVERING COLORING OF NEARLY BIPARTITE GRAPHS

  • Wang Ji-Hui;Zhang Xia;Liu Guizhen
    • Journal of applied mathematics & informatics
    • /
    • v.22 no.1_2
    • /
    • pp.435-440
    • /
    • 2006
  • Let G be a simple graph with vertex set V(G) and edge set E(G). A subset S of E(G) is called an edge cover of G if the subgraph induced by S is a spanning subgraph of G. The maximum number of edge covers which form a partition of E(G) is called edge covering chromatic number of G, denoted by X'c(G). It is known that for any graph G with minimum degree ${\delta},\;{\delta}-1{\le}X'c(G){\le}{\delta}$. If $X'c(G) ={\delta}$, then G is called a graph of CI class, otherwise G is called a graph of CII class. It is easy to prove that the problem of deciding whether a given graph is of CI class or CII class is NP-complete. In this paper, we consider the classification of nearly bipartite graph and give some sufficient conditions for a nearly bipartite graph to be of CI class.

A NOTE ON DECOMPOSITION OF COMPLETE EQUIPARTITE GRAPHS INTO GREGARIOUS 6-CYCLES

  • Cho, Jung-Rae
    • Bulletin of the Korean Mathematical Society
    • /
    • v.44 no.4
    • /
    • pp.709-719
    • /
    • 2007
  • In [8], it is shown that the complete multipartite graph $K_{n(2t)}$ having n partite sets of size 2t, where $n{\geq}6\;and\;t{\geq}1$, has a decomposition into gregarious 6-cycles if $n{\equiv}0,1,3$ or 4 (mod 6). Here, a cycle is called gregarious if it has at most one vertex from any particular partite set. In this paper, when $n{\equiv}0$ or 3 (mod 6), another method using difference set is presented. Furthermore, when $n{\equiv}0$ (mod 6), the decomposition obtained in this paper is ${\infty}-circular$, in the sense that it is invariant under the mapping which keeps the partite set which is indexed by ${\infty}$ fixed and permutes the remaining partite sets cyclically.

ON BETA PRODUCT OF HESITANCY FUZZY GRAPHS AND INTUITIONISTIC HESITANCY FUZZY GRAPHS

  • Sunil M.P.;J. Suresh Kumar
    • Korean Journal of Mathematics
    • /
    • v.31 no.4
    • /
    • pp.485-494
    • /
    • 2023
  • The degree of hesitancy of a vertex in a hesitancy fuzzy graph depends on the degree of membership and non-membership of the vertex. We define a new class of hesitancy fuzzy graph, the intuitionistic hesitancy fuzzy graph in which the degree of hesitancy of a vertex is independent of the degree of its membership and non-membership. We introduce the idea of β-product of a pair of hesitancy fuzzy graphs and intuitionistic hesitancy fuzzy graphs and prove certain results based on this product.

PACKING TREES INTO COMPLETE K-PARTITE GRAPH

  • Peng, Yanling;Wang, Hong
    • Bulletin of the Korean Mathematical Society
    • /
    • v.59 no.2
    • /
    • pp.345-350
    • /
    • 2022
  • In this work, we confirm a weak version of a conjecture proposed by Hong Wang. The ideal of the work comes from the tree packing conjecture made by Gyárfás and Lehel. Bollobás confirms the tree packing conjecture for many small tree, who showed that one can pack T1, T2, …, $T_{n/\sqrt{2}}$ into Kn and that a better bound would follow from a famous conjecture of Erdős. In a similar direction, Hobbs, Bourgeois and Kasiraj made the following conjecture: Any sequence of trees T1, T2, …, Tn, with Ti having order i, can be packed into Kn-1,[n/2]. Further Hobbs, Bourgeois and Kasiraj [3] proved that any two trees can be packed into a complete bipartite graph Kn-1,[n/2]. Motivated by the result, Hong Wang propose the conjecture: For each k-partite tree T(𝕏) of order n, there is a restrained packing of two copies of T(𝕏) into a complete k-partite graph Bn+m(𝕐), where $m={\lfloor}{\frac{k}{2}}{\rfloor}$. Hong Wong [4] confirmed this conjecture for k = 2. In this paper, we prove a weak version of this conjecture.

GENERALIZATION ON PRODUCT DEGREE DISTANCE OF TENSOR PRODUCT OF GRAPHS

  • PATTABIRAMAN, K.
    • Journal of applied mathematics & informatics
    • /
    • v.34 no.3_4
    • /
    • pp.341-354
    • /
    • 2016
  • In this paper, the exact formulae for the generalized product degree distance, reciprocal product degree distance and product degree distance of tensor product of a connected graph and the complete multipartite graph with partite sets of sizes m0, m1, ⋯ , mr−1 are obtained.

Efficient Mining of Frequent Subgraph with Connectivity Constraint

  • Moon, Hyun-S.;Lee, Kwang-H.;Lee, Do-Heon
    • Proceedings of the Korean Society for Bioinformatics Conference
    • /
    • 2005.09a
    • /
    • pp.267-271
    • /
    • 2005
  • The goal of data mining is to extract new and useful knowledge from large scale datasets. As the amount of available data grows explosively, it became vitally important to develop faster data mining algorithms for various types of data. Recently, an interest in developing data mining algorithms that operate on graphs has been increased. Especially, mining frequent patterns from structured data such as graphs has been concerned by many research groups. A graph is a highly adaptable representation scheme that used in many domains including chemistry, bioinformatics and physics. For example, the chemical structure of a given substance can be modelled by an undirected labelled graph in which each node corresponds to an atom and each edge corresponds to a chemical bond between atoms. Internet can also be modelled as a directed graph in which each node corresponds to an web site and each edge corresponds to a hypertext link between web sites. Notably in bioinformatics area, various kinds of newly discovered data such as gene regulation networks or protein interaction networks could be modelled as graphs. There have been a number of attempts to find useful knowledge from these graph structured data. One of the most powerful analysis tool for graph structured data is frequent subgraph analysis. Recurring patterns in graph data can provide incomparable insights into that graph data. However, to find recurring subgraphs is extremely expensive in computational side. At the core of the problem, there are two computationally challenging problems. 1) Subgraph isomorphism and 2) Enumeration of subgraphs. Problems related to the former are subgraph isomorphism problem (Is graph A contains graph B?) and graph isomorphism problem(Are two graphs A and B the same or not?). Even these simplified versions of the subgraph mining problem are known to be NP-complete or Polymorphism-complete and no polynomial time algorithm has been existed so far. The later is also a difficult problem. We should generate all of 2$^n$ subgraphs if there is no constraint where n is the number of vertices of the input graph. In order to find frequent subgraphs from larger graph database, it is essential to give appropriate constraint to the subgraphs to find. Most of the current approaches are focus on the frequencies of a subgraph: the higher the frequency of a graph is, the more attentions should be given to that graph. Recently, several algorithms which use level by level approaches to find frequent subgraphs have been developed. Some of the recently emerging applications suggest that other constraints such as connectivity also could be useful in mining subgraphs : more strongly connected parts of a graph are more informative. If we restrict the set of subgraphs to mine to more strongly connected parts, its computational complexity could be decreased significantly. In this paper, we present an efficient algorithm to mine frequent subgraphs that are more strongly connected. Experimental study shows that the algorithm is scaling to larger graphs which have more than ten thousand vertices.

  • PDF

ON CYCLIC DECOMPOSITIONS OF THE COMPLETE GRAPH INTO THE 2-REGULAR GRAPHS

  • Liang, Zhihe
    • Journal of applied mathematics & informatics
    • /
    • v.24 no.1_2
    • /
    • pp.261-271
    • /
    • 2007
  • The symbol C($m_1^{n_1}m_2^{n_2}{\cdots}m_s^{n_s}$) denotes a 2-regular graph consisting of $n_i$ cycles of length $m_i,\;i=1,\;2,\;{\cdots},\;s$. In this paper, we give some construction methods of cyclic($K_v$, G)-designs, and prove that there exists a cyclic($K_v$, G)-design when $G=C((4m_1)^{n_1}(4m_2)^{n_2}{\cdots}(4m_s)^{n_s}\;and\;v{\equiv}1(mod\;2|G|)$.

Complete Deadlock Detection in a Distributed System (분산처리 시스템하에서의 모든 교착상태 발견을 위한 알고리즘)

  • Lee, Soo-Jung
    • Journal of The Korean Association of Information Education
    • /
    • v.2 no.2
    • /
    • pp.269-277
    • /
    • 1998
  • In most of the distributed deadlock detection algorithms using messages called probes, only a portion of the generated messages are effectively used, and hence the wasted probes cause heavy communication traffic. In this paper, a distributed deadlock detection algorithm is proposed which can efficiently detect deadlocks making use of those residue probes. Our algorithm is complete in the sense that they detect not only those deadlocks in which the initiator is involved as most other algorithms do, but all the other deadlocks that are present anywhere in a connected wait-for-graph. To detect all the deadlocks, the algorithms known to be most efficient require O(ne) messages, where e and n are the number of edges and nodes in the graph, respectively. The single execution of the presented algorithm can accomplish the same task with O(e) messages.

  • PDF

Document Summarization Method using Complete Graph (완전그래프를 이용한 문서요약 연구)

  • Lyu, Jun-Hyun;Park, Soon-Cheol
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.10 no.2
    • /
    • pp.26-31
    • /
    • 2005
  • In this paper, we present the document summarizers which are simpler and more condense than the existing ones generally used in the web search engines. This method is a statistic-based summarization method using the concept of the complete graph. We suppose that each sentence as a vertex and the similarity between two sentences as a link of the graph. We compare this summarizer with those of Clustering and MMR techniques which are well-known as the good summarization methods. For the comparison, we use FScore using the summarization results generated by human subjects. Our experimental results verify the accuracy of this method, being about $30\%$ better than the others.

  • PDF

Anonymizing Graphs Against Weight-based Attacks with Community Preservation

  • Li, Yidong;Shen, Hong
    • Journal of Computing Science and Engineering
    • /
    • v.5 no.3
    • /
    • pp.197-209
    • /
    • 2011
  • The increasing popularity of graph data, such as social and online communities, has initiated a prolific research area in knowledge discovery and data mining. As more real-world graphs are released publicly, there is growing concern about privacy breaching for the entities involved. An adversary may reveal identities of individuals in a published graph, with the topological structure and/or basic graph properties as background knowledge. Many previous studies addressing such attacks as identity disclosure, however, concentrate on preserving privacy in simple graph data only. In this paper, we consider the identity disclosure problem in weighted graphs. The motivation is that, a weighted graph can introduce much more unique information than its simple version, which makes the disclosure easier. We first formalize a general anonymization model to deal with weight-based attacks. Then two concrete attacks are discussed based on weight properties of a graph, including the sum and the set of adjacent weights for each vertex. We also propose a complete solution for the weight anonymization problem to prevent a graph from both attacks. In addition, we also investigate the impact of the proposed methods on community detection, a very popular application in the graph mining field. Our approaches are efficient and practical, and have been validated by extensive experiments on both synthetic and real-world datasets.