• Title/Summary/Keyword: graph invariant

Search Result 19, Processing Time 0.011 seconds

INVARIANT GRAPH AND RANDOM BONY ATTRACTORS

  • Fateme Helen Ghane;Maryam Rabiee;Marzie Zaj
    • Journal of the Korean Mathematical Society
    • /
    • v.60 no.2
    • /
    • pp.255-271
    • /
    • 2023
  • In this paper, we deal with random attractors for dynamical systems forced by a deterministic noise. These kind of systems are modeled as skew products where the dynamics of the forcing process are described by the base transformation. Here, we consider skew products over the Bernoulli shift with the unit interval fiber. We study the geometric structure of maximal attractors, the orbit stability and stability of mixing of these skew products under random perturbations of the fiber maps. We show that there exists an open set U in the space of such skew products so that any skew product belonging to this set admits an attractor which is either a continuous invariant graph or a bony graph attractor. These skew products have negative fiber Lyapunov exponents and their fiber maps are non-uniformly contracting, hence the non-uniform contraction rates are measured by Lyapnnov exponents. Furthermore, each skew product of U admits an invariant ergodic measure whose support is contained in that attractor. Additionally, we show that the invariant measure for the perturbed system is continuous in the Hutchinson metric.

Topological Properties of Recursive Circulants : Disjoint Cycles and Graph Invariants (재귀원형군의 위상 특성 : 서로소인 사이클과 그래프 invariant)

  • Park, Jeong-Heum;Jwa, Gyeong-Ryong
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.26 no.8
    • /
    • pp.999-1007
    • /
    • 1999
  • 이 논문은 재귀원형군 G(2^m , 2^k )를 그래프 이론적 관점에서 고찰하고 정점이 서로소인 사이클과 그래프 invariant에 관한 위상 특성을 제시한다. 재귀원형군은 1 에서 제안된 다중 컴퓨터의 연결망 구조이다. 재귀원형군 {{{{G(2^m , 2^k )가 길이 사이클을 가질 필요 충분 조건을 구하고, 이 조건하에서 G(2^m , 2^k )는 가능한 최대 개수의 정점이 서로소이고 길이가l`인 사이클을 가짐을 보인다. 그리고 정점 및 에지 채색, 최대 클릭, 독립 집합 및 정점 커버에 대한 그래프 invariant를 분석한다.Abstract In this paper, we investigate recursive circulant G(2^m , 2^k ) from the graph theory point of view and present topological properties of G(2^m , 2^k ) concerned with vertex-disjoint cycles and graph invariants. Recursive circulant is an interconnection structure for multicomputer networks proposed in 1 . A necessary and sufficient condition for recursive circulant {{{{G(2^m , 2^k ) to have a cycle of lengthl` is derived. Under the condition, we show that G(2^m , 2^k ) has the maximum possible number of vertex-disjoint cycles of length l`. We analyze graph invariants on vertex and edge coloring, maximum clique, independent set and vertex cover.

SIGNED A-POLYNOMIALS OF GRAPHS AND POINCARÉ POLYNOMIALS OF REAL TORIC MANIFOLDS

  • Seo, Seunghyun;Shin, Heesung
    • Bulletin of the Korean Mathematical Society
    • /
    • v.52 no.2
    • /
    • pp.467-481
    • /
    • 2015
  • Choi and Park introduced an invariant of a finite simple graph, called signed a-number, arising from computing certain topological invariants of some specific kinds of real toric manifolds. They also found the signed a-numbers of path graphs, cycle graphs, complete graphs, and star graphs. We introduce a signed a-polynomial which is a generalization of the signed a-number and gives a-, b-, and c-numbers. The signed a-polynomial of a graph G is related to the $Poincar\acute{e}$ polynomial $P_{M(G)}(z)$, which is the generating function for the Betti numbers of the real toric manifold M(G). We give the generating functions for the signed a-polynomials of not only path graphs, cycle graphs, complete graphs, and star graphs, but also complete bipartite graphs and complete multipartite graphs. As a consequence, we find the Euler characteristic number and the Betti numbers of the real toric manifold M(G) for complete multipartite graphs G.

Cross-index of a Graph

  • Kawauchi, Akio;Shimizu, Ayaka;Yaguchi, Yoshiro
    • Kyungpook Mathematical Journal
    • /
    • v.59 no.4
    • /
    • pp.797-820
    • /
    • 2019
  • For every tree T, we introduce a topological invariant, called the T-cross-index, for connected graphs. The T-cross-index of a graph is a non-negative integer or infinity according to whether T is a tree basis of the graph or not. It is shown how this cross-index is independent of the other topological invariants of connected graphs, such as the Euler characteristic, the crossing number and the genus.

ON THE SCHULTZ POLYNOMIAL AND HOSOYA POLYNOMIAL OF CIRCUMCORONENE SERIES OF BENZENOID

  • Farahani, Mohammad Reza
    • Journal of applied mathematics & informatics
    • /
    • v.31 no.5_6
    • /
    • pp.595-608
    • /
    • 2013
  • Let G = (V, E) be a simple connected graph. The sets of vertices and edges of G are denoted by V = V (G) and E = E(G), respectively. In such a simple molecular graph, vertices represent atoms and edges represent bonds. The distance between the vertices $u$ and $v$ in V (G) of graph G is the number of edges in a shortest path connecting them, we denote by $d(u,v)$. In graph theory, we have many invariant polynomials for a graph G. In this paper, we focus on the Schultz polynomial, Modified Schultz polynomial, Hosoya polynomial and their topological indices of a molecular graph circumcoronene series of benzenoid $H_k$ and specially third member from this family. $H_3$ is a basic member from the circumcoronene series of benzenoid and its conclusions are base calculations for the Schultz polynomial and Hosoya polynomial of the circumcoronene series of benzenoid $H_k$ ($k{\geq}3$).

An enhanced method using NP-complete problem in Public Key Cryptography System (NP-complete 문제를 이용한 공개키 암호 시스템 개선)

  • Baek, Jaejong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.12
    • /
    • pp.2865-2870
    • /
    • 2015
  • Recently, due to the hardware computing enhancement such as quantum computers, the amount of information that can be processed in a short period of time is growing exponentially. The cryptography system proposed by Koblitz and Fellows has a problem that it can not be guaranteed that the problem finding perfect dominating set is NP-complete in specific 3-regular graphs because the number of invariant polynomial can not be generated enough. In this paper, we propose an enhanced method to improve the vulnerability in 3-regular graph by generating plenty of invariant polynomials.

The Implementation of Graph-based SLAM Using General Graph Optimization (일반 그래프 최적화를 활용한 그래프 기반 SLAM 구현)

  • Ko, Nak-Yong;Chung, Jun-Hyuk;Jeong, Da-Bin
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.4
    • /
    • pp.637-644
    • /
    • 2019
  • This paper describes an implementation of a graph-based simultaneous localization and mapping(SLAM) method called the General Graph Optimization. The General Graph Optimization formulates the SLAM problem using nodes and edges. The nodes represent the location and attitude of a robot in time sequence, and the edge between the nodes depict the constraint between the nodes. The constraints are imposed by sensor measurements. The General Graph Optimization solves the problem by optimizing the performance index determined by the constraints. The implementation is verified using the measurement data sets which are open for test of various SLAM methods.

GUI-based Detection of Usage-state Changes in Mobile Apps (GUI에 기반한 모바일 앱 사용상태 구분)

  • Kang, Ryangkyung;Seok, Ho-Sik
    • Journal of IKEEE
    • /
    • v.23 no.2
    • /
    • pp.448-453
    • /
    • 2019
  • Under the conflicting objectives of maximum user satisfaction and fast launching, there exist great needs for automated mobile app testing. In automated app testing, detection of usage-state changes is one of the most important issues for minimizing human intervention and testing of various usage scenarios. Because conventional approaches utilizing pre-collected training examples can not handle the rapid evolution of apps, we propose a novel method detecting changes in usage-state through graph-entropy. In the proposed method, widgets in a screen shot are recognized through DNNs and 'onverted graphs. We compared the performance of the proposed method with a SIFT (Scale-Invariant Feature Transform) based method on 20 real-world apps. In most cases, our method achieved superior results, but we found some situations where further improvements are required.

A NOTE ON DECOMPOSITION OF COMPLETE EQUIPARTITE GRAPHS INTO GREGARIOUS 6-CYCLES

  • Cho, Jung-Rae
    • Bulletin of the Korean Mathematical Society
    • /
    • v.44 no.4
    • /
    • pp.709-719
    • /
    • 2007
  • In [8], it is shown that the complete multipartite graph $K_{n(2t)}$ having n partite sets of size 2t, where $n{\geq}6\;and\;t{\geq}1$, has a decomposition into gregarious 6-cycles if $n{\equiv}0,1,3$ or 4 (mod 6). Here, a cycle is called gregarious if it has at most one vertex from any particular partite set. In this paper, when $n{\equiv}0$ or 3 (mod 6), another method using difference set is presented. Furthermore, when $n{\equiv}0$ (mod 6), the decomposition obtained in this paper is ${\infty}-circular$, in the sense that it is invariant under the mapping which keeps the partite set which is indexed by ${\infty}$ fixed and permutes the remaining partite sets cyclically.