Parametrised Enumeration
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
A Proof of Cantor's Theorem
Cantor’s Theorem Joe Roussos 1 Preliminary ideas Two sets have the same number of elements (are equinumerous, or have the same cardinality) iff there is a bijection between the two sets. Mappings: A mapping, or function, is a rule that associates elements of one set with elements of another set. We write this f : X ! Y , f is called the function/mapping, the set X is called the domain, and Y is called the codomain. We specify what the rule is by writing f(x) = y or f : x 7! y. e.g. X = f1; 2; 3g;Y = f2; 4; 6g, the map f(x) = 2x associates each element x 2 X with the element in Y that is double it. A bijection is a mapping that is injective and surjective.1 • Injective (one-to-one): A function is injective if it takes each element of the do- main onto at most one element of the codomain. It never maps more than one element in the domain onto the same element in the codomain. Formally, if f is a function between set X and set Y , then f is injective iff 8a; b 2 X; f(a) = f(b) ! a = b • Surjective (onto): A function is surjective if it maps something onto every element of the codomain. It can map more than one thing onto the same element in the codomain, but it needs to hit everything in the codomain. Formally, if f is a function between set X and set Y , then f is surjective iff 8y 2 Y; 9x 2 X; f(x) = y Figure 1: Injective map. -
Linear Transformation (Sections 1.8, 1.9) General View: Given an Input, the Transformation Produces an Output
Linear Transformation (Sections 1.8, 1.9) General view: Given an input, the transformation produces an output. In this sense, a function is also a transformation. 1 4 3 1 3 Example. Let A = and x = 1 . Describe matrix-vector multiplication Ax 2 0 5 1 1 1 in the language of transformation. 1 4 3 1 31 5 Ax b 2 0 5 11 8 1 Vector x is transformed into vector b by left matrix multiplication Definition and terminologies. Transformation (or function or mapping) T from Rn to Rm is a rule that assigns to each vector x in Rn a vector T(x) in Rm. • Notation: T: Rn → Rm • Rn is the domain of T • Rm is the codomain of T • T(x) is the image of vector x • The set of all images T(x) is the range of T • When T(x) = Ax, A is a m×n size matrix. Range of T = Span{ column vectors of A} (HW1.8.7) See class notes for other examples. Linear Transformation --- Existence and Uniqueness Questions (Section 1.9) Definition 1: T: Rn → Rm is onto if each b in Rm is the image of at least one x in Rn. • i.e. codomain Rm = range of T • When solve T(x) = b for x (or Ax=b, A is the standard matrix), there exists at least one solution (Existence question). Definition 2: T: Rn → Rm is one-to-one if each b in Rm is the image of at most one x in Rn. • i.e. When solve T(x) = b for x (or Ax=b, A is the standard matrix), there exists either a unique solution or none at all (Uniqueness question). -
Studies on Enumeration of Acyclic Substructures in Graphs and Hypergraphs (グラフや超グラフに含まれる非巡回部分構造の列挙に関する研究)
CORE Metadata, citation and similar papers at core.ac.uk Provided by Hokkaido University Collection of Scholarly and Academic Papers Studies on Enumeration of Acyclic Substructures in Graphs and Hypergraphs (グラフや超グラフに含まれる非巡回部分構造の列挙に関する研究) Kunihiro Wasa February 2016 Division of Computer Science Graduate School of Information Science and Technology Hokkaido University Abstract Recently, due to the improvement of the performance of computers, we can easily ob- tain a vast amount of data defined by graphs or hypergraphs. However, it is difficult to look over all the data by mortal powers. Moreover, it is impossible for us to extract useful knowledge or regularities hidden in the data. Thus, we address to overcome this situation by using computational techniques such as data mining and machine learning for the data. However, we still confront a matter that needs to be dealt with the expo- nentially many substructures in input data. That is, we have to consider the following problem: given an input graph or hypergraph and a constraint, output all substruc- tures belonging to the input and satisfying the constraint without duplicates. In this thesis, we focus on this kind of problems and address to develop efficient enumeration algorithms for them. Since 1950's, substructure enumeration problems are widely studied. In 1975, Read and Tarjan proposed enumeration algorithms that list spanning trees, paths, and cycles for evaluating the electrical networks and studying program flow. Moreover, due to the demands from application area, enumeration algorithms for cliques, subtrees, and subpaths are applied to data mining and machine learning. In addition, enumeration problems have been focused on due to not only the viewpoint of application but also of the theoretical interest. -
Functions and Inverses
Functions and Inverses CS 2800: Discrete Structures, Spring 2015 Sid Chaudhuri Recap: Relations and Functions ● A relation between sets A !the domain) and B !the codomain" is a set of ordered pairs (a, b) such that a ∈ A, b ∈ B !i.e. it is a subset o# A × B" Cartesian product – The relation maps each a to the corresponding b ● Neither all possible a%s, nor all possible b%s, need be covered – Can be one-one, one&'an(, man(&one, man(&man( Alice CS 2800 Bob A Carol CS 2110 B David CS 3110 Recap: Relations and Functions ● ) function is a relation that maps each element of A to a single element of B – Can be one-one or man(&one – )ll elements o# A must be covered, though not necessaril( all elements o# B – Subset o# B covered b( the #unction is its range/image Alice Balch Bob A Carol Jameson B David Mews Recap: Relations and Functions ● Instead of writing the #unction f as a set of pairs, e usually speci#y its domain and codomain as: f : A → B * and the mapping via a rule such as: f (Heads) = 0.5, f (Tails) = 0.5 or f : x ↦ x2 +he function f maps x to x2 Recap: Relations and Functions ● Instead of writing the #unction f as a set of pairs, e usually speci#y its domain and codomain as: f : A → B * and the mapping via a rule such as: f (Heads) = 0.5, f (Tails) = 0.5 2 or f : x ↦ x f(x) ● Note: the function is f, not f(x), – f(x) is the value assigned b( f the #unction f to input x x Recap: Injectivity ● ) function is injective (one-to-one) if every element in the domain has a unique i'age in the codomain – +hat is, f(x) = f(y) implies x = y Albany NY New York A MA Sacramento B CA Boston .. -
Primitive Recursive Functions Are Recursively Enumerable
AN ENUMERATION OF THE PRIMITIVE RECURSIVE FUNCTIONS WITHOUT REPETITION SHIH-CHAO LIU (Received April 15,1900) In a theorem and its corollary [1] Friedberg gave an enumeration of all the recursively enumerable sets without repetition and an enumeration of all the partial recursive functions without repetition. This note is to prove a similar theorem for the primitive recursive functions. The proof is only a classical one. We shall show that the theorem is intuitionistically unprovable in the sense of Kleene [2]. For similar reason the theorem by Friedberg is also intuitionistical- ly unprovable, which is not stated in his paper. THEOREM. There is a general recursive function ψ(n, a) such that the sequence ψ(0, a), ψ(l, α), is an enumeration of all the primitive recursive functions of one variable without repetition. PROOF. Let φ(n9 a) be an enumerating function of all the primitive recursive functions of one variable, (See [3].) We define a general recursive function v(a) as follows. v(0) = 0, v(n + 1) = μy, where μy is the least y such that for each j < n + 1, φ(y, a) =[= φ(v(j), a) for some a < n + 1. It is noted that the value v(n + 1) can be found by a constructive method, for obviously there exists some number y such that the primitive recursive function <p(y> a) takes a value greater than all the numbers φ(v(0), 0), φ(y(Ϋ), 0), , φ(v(n\ 0) f or a = 0 Put ψ(n, a) = φ{v{n), a). -
Polya Enumeration Theorem
Polya Enumeration Theorem Sasha Patotski Cornell University [email protected] December 11, 2015 Sasha Patotski (Cornell University) Polya Enumeration Theorem December 11, 2015 1 / 10 Cosets A left coset of H in G is gH where g 2 G (H is on the right). A right coset of H in G is Hg where g 2 G (H is on the left). Theorem If two left cosets of H in G intersect, then they coincide, and similarly for right cosets. Thus, G is a disjoint union of left cosets of H and also a disjoint union of right cosets of H. Corollary(Lagrange's theorem) If G is a finite group and H is a subgroup of G, then the order of H divides the order of G. In particular, the order of every element of G divides the order of G. Sasha Patotski (Cornell University) Polya Enumeration Theorem December 11, 2015 2 / 10 Applications of Lagrange's Theorem Theorem n! For any integers n ≥ 0 and 0 ≤ m ≤ n, the number m!(n−m)! is an integer. Theorem (ab)! (ab)! For any positive integers a; b the ratios (a!)b and (a!)bb! are integers. Theorem For an integer m > 1 let '(m) be the number of invertible numbers modulo m. For m ≥ 3 the number '(m) is even. Sasha Patotski (Cornell University) Polya Enumeration Theorem December 11, 2015 3 / 10 Polya's Enumeration Theorem Theorem Suppose that a finite group G acts on a finite set X . Then the number of colorings of X in n colors inequivalent under the action of G is 1 X N(n) = nc(g) jGj g2G where c(g) is the number of cycles of g as a permutation of X . -
Enumeration of Finite Automata 1 Z(A) = 1
INFOI~MATION AND CONTROL 10, 499-508 (1967) Enumeration of Finite Automata 1 FRANK HARARY AND ED PALMER Department of Mathematics, University of Michigan, Ann Arbor, Michigan Harary ( 1960, 1964), in a survey of 27 unsolved problems in graphical enumeration, asked for the number of different finite automata. Re- cently, Harrison (1965) solved this problem, but without considering automata with initial and final states. With the aid of the Power Group Enumeration Theorem (Harary and Palmer, 1965, 1966) the entire problem can be handled routinely. The method involves a confrontation of several different operations on permutation groups. To set the stage, we enumerate ordered pairs of functions with respect to the product of two power groups. Finite automata are then concisely defined as certain ordered pah's of functions. We review the enumeration of automata in the natural setting of the power group, and then extend this result to enumerate automata with initial and terminal states. I. ENUMERATION THEOREM For completeness we require a number of definitions, which are now given. Let A be a permutation group of order m = ]A I and degree d acting on the set X = Ix1, x~, -.. , xa}. The cycle index of A, denoted Z(A), is defined as follows. Let jk(a) be the number of cycles of length k in the disjoint cycle decomposition of any permutation a in A. Let al, a2, ... , aa be variables. Then the cycle index, which is a poly- nomial in the variables a~, is given by d Z(A) = 1_ ~ H ~,~(°~ . (1) ~$ a EA k=l We sometimes write Z(A; al, as, .. -
Enumeration of Maximal Cliques from an Uncertain Graph
1 Enumeration of Maximal Cliques from an Uncertain Graph Arko Provo Mukherjee #1, Pan Xu ∗2, Srikanta Tirthapura #3 # Department of Electrical and Computer Engineering, Iowa State University, Ames, IA, USA Coover Hall, Ames, IA, USA 1 [email protected] 3 [email protected] ∗ Department of Computer Science, University of Maryland A.V. Williams Building, College Park, MD, USA 2 [email protected] Abstract—We consider the enumeration of dense substructures (maximal cliques) from an uncertain graph. For parameter 0 < α < 1, we define the notion of an α-maximal clique in an uncertain graph. We present matching upper and lower bounds on the number of α-maximal cliques possible within a (uncertain) graph. We present an algorithm to enumerate α-maximal cliques whose worst-case runtime is near-optimal, and an experimental evaluation showing the practical utility of the algorithm. Index Terms—Graph Mining, Uncertain Graph, Maximal Clique, Dense Substructure F 1 INTRODUCTION of the most basic problems in graph mining, and has been applied in many settings, including in finding overlapping Large datasets often contain information that is uncertain communities from social networks [14, 17, 18, 19], finding in nature. For example, given people A and B, it may not overlapping multiple protein complexes [20], analysis of be possible to definitively assert a relation of the form “A email networks [21] and other problems in bioinformat- knows B” using available information. Our confidence in ics [22, 23, 24]. such relations are commonly quantified using probability, and we say that the relation exists with a probability of p, for While the notion of a dense substructure and methods some value p determined from the available information. -
The Axiom of Choice and Its Implications
THE AXIOM OF CHOICE AND ITS IMPLICATIONS KEVIN BARNUM Abstract. In this paper we will look at the Axiom of Choice and some of the various implications it has. These implications include a number of equivalent statements, and also some less accepted ideas. The proofs discussed will give us an idea of why the Axiom of Choice is so powerful, but also so controversial. Contents 1. Introduction 1 2. The Axiom of Choice and Its Equivalents 1 2.1. The Axiom of Choice and its Well-known Equivalents 1 2.2. Some Other Less Well-known Equivalents of the Axiom of Choice 3 3. Applications of the Axiom of Choice 5 3.1. Equivalence Between The Axiom of Choice and the Claim that Every Vector Space has a Basis 5 3.2. Some More Applications of the Axiom of Choice 6 4. Controversial Results 10 Acknowledgments 11 References 11 1. Introduction The Axiom of Choice states that for any family of nonempty disjoint sets, there exists a set that consists of exactly one element from each element of the family. It seems strange at first that such an innocuous sounding idea can be so powerful and controversial, but it certainly is both. To understand why, we will start by looking at some statements that are equivalent to the axiom of choice. Many of these equivalences are very useful, and we devote much time to one, namely, that every vector space has a basis. We go on from there to see a few more applications of the Axiom of Choice and its equivalents, and finish by looking at some of the reasons why the Axiom of Choice is so controversial. -
17 Axiom of Choice
Math 361 Axiom of Choice 17 Axiom of Choice De¯nition 17.1. Let be a nonempty set of nonempty sets. Then a choice function for is a function f sucFh that f(S) S for all S . F 2 2 F Example 17.2. Let = (N)r . Then we can de¯ne a choice function f by F P f;g f(S) = the least element of S: Example 17.3. Let = (Z)r . Then we can de¯ne a choice function f by F P f;g f(S) = ²n where n = min z z S and, if n = 0, ² = min z= z z = n; z S . fj j j 2 g 6 f j j j j j 2 g Example 17.4. Let = (Q)r . Then we can de¯ne a choice function f as follows. F P f;g Let g : Q N be an injection. Then ! f(S) = q where g(q) = min g(r) r S . f j 2 g Example 17.5. Let = (R)r . Then it is impossible to explicitly de¯ne a choice function for . F P f;g F Axiom 17.6 (Axiom of Choice (AC)). For every set of nonempty sets, there exists a function f such that f(S) S for all S . F 2 2 F We say that f is a choice function for . F Theorem 17.7 (AC). If A; B are non-empty sets, then the following are equivalent: (a) A B ¹ (b) There exists a surjection g : B A. ! Proof. (a) (b) Suppose that A B. -
Enumeration of Structure-Sensitive Graphical Subsets: Calculations (Graph Theory/Combinatorics) R
Proc. Nati Acad. Sci. USA Vol. 78, No. 3, pp. 1329-1332, March 1981 Mathematics Enumeration of structure-sensitive graphical subsets: Calculations (graph theory/combinatorics) R. E. MERRIFIELD AND H. E. SIMMONS Central Research and Development Department, E. I. du Pont de Nemours and Company, Experimental Station, Wilmington, Delaware 19898 Contributed by H. E. Simmons, October 6, 1980 ABSTRACT Numerical calculations are presented, for all Table 2. Qualitative properties of subset counts connected graphs on six and fewer vertices, of the -lumbers of hidepndent sets, connected sets;point and line covers, externally Quantity Branching Cyclization stable sets, kernels, and irredundant sets. With the exception of v, xIncreases Decreases the number of kernels, the numbers of such sets are al highly p Increases Increases structure-sensitive quantities. E Variable Increases K Insensitive Insensitive The necessary mathematical machinery has recently been de- Variable Variable veloped (1) for enumeration of the following types of special cr Decreases Increases subsets of the vertices or edges of a general graph: (i) indepen- p Increases Increases dent sets, (ii) connected sets, (iii) point and line covers, (iv;' ex- X Decreases Increases ternally stable sets, (v) kernels, and (vi) irredundant sets. In e Increases Increases order to explore the sensitivity of these quantities to graphical K Insensitive Insensitive structure we have employed this machinery to calculate some Decreases Increases explicit subset counts. (Since no more efficient algorithm is known for irredundant sets, they have been enumerated by the brute-force method of testing every subset for irredundance.) 1. e and E are always odd. The 10 quantities considered in ref. -
Matroid Enumeration for Incidence Geometry
Discrete Comput Geom (2012) 47:17–43 DOI 10.1007/s00454-011-9388-y Matroid Enumeration for Incidence Geometry Yoshitake Matsumoto · Sonoko Moriyama · Hiroshi Imai · David Bremner Received: 30 August 2009 / Revised: 25 October 2011 / Accepted: 4 November 2011 / Published online: 30 November 2011 © Springer Science+Business Media, LLC 2011 Abstract Matroids are combinatorial abstractions for point configurations and hy- perplane arrangements, which are fundamental objects in discrete geometry. Matroids merely encode incidence information of geometric configurations such as collinear- ity or coplanarity, but they are still enough to describe many problems in discrete geometry, which are called incidence problems. We investigate two kinds of inci- dence problem, the points–lines–planes conjecture and the so-called Sylvester–Gallai type problems derived from the Sylvester–Gallai theorem, by developing a new algo- rithm for the enumeration of non-isomorphic matroids. We confirm the conjectures of Welsh–Seymour on ≤11 points in R3 and that of Motzkin on ≤12 lines in R2, extend- ing previous results. With respect to matroids, this algorithm succeeds to enumerate a complete list of the isomorph-free rank 4 matroids on 10 elements. When geometric configurations corresponding to specific matroids are of interest in some incidence problems, they should be analyzed on oriented matroids. Using an encoding of ori- ented matroid axioms as a boolean satisfiability (SAT) problem, we also enumerate oriented matroids from the matroids of rank 3 on n ≤ 12 elements and rank 4 on n ≤ 9 elements. We further list several new minimal non-orientable matroids. Y. Matsumoto · H. Imai Graduate School of Information Science and Technology, University of Tokyo, Tokyo, Japan Y.